{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2025:Y4VDIMW3MY6TSZK27WC5V4EFWE","short_pith_number":"pith:Y4VDIMW3","canonical_record":{"source":{"id":"2510.03559","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2025-10-03T23:14:22Z","cross_cats_sorted":["cs.HC"],"title_canon_sha256":"fb6fb2bae4b3459f772aa19624f4b516ceb955fa50f17918b583e51d0b287e81","abstract_canon_sha256":"922d964afecbb4d599ef339992f6f9c79af1e596dcd84a0f0acf98fe99235159"},"schema_version":"1.0"},"canonical_sha256":"c72a3432db663d39655afd85daf085b1025b214cdedacf961b28731e66b15e9e","source":{"kind":"arxiv","id":"2510.03559","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2510.03559","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"arxiv_version","alias_value":"2510.03559v2","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2510.03559","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"pith_short_12","alias_value":"Y4VDIMW3MY6T","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"pith_short_16","alias_value":"Y4VDIMW3MY6TSZK2","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"pith_short_8","alias_value":"Y4VDIMW3","created_at":"2026-05-22T01:03:15Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2025:Y4VDIMW3MY6TSZK27WC5V4EFWE","target":"record","payload":{"canonical_record":{"source":{"id":"2510.03559","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2025-10-03T23:14:22Z","cross_cats_sorted":["cs.HC"],"title_canon_sha256":"fb6fb2bae4b3459f772aa19624f4b516ceb955fa50f17918b583e51d0b287e81","abstract_canon_sha256":"922d964afecbb4d599ef339992f6f9c79af1e596dcd84a0f0acf98fe99235159"},"schema_version":"1.0"},"canonical_sha256":"c72a3432db663d39655afd85daf085b1025b214cdedacf961b28731e66b15e9e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-22T01:03:15.632445Z","signature_b64":"5lrtrJG3ymMjOL/KJHcDf2w2sUQ2VLjvqu0Pyru+/rbNav6VyUjges/ElP8OdrJ5izMcETc23AaxjvM1ega6Cw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c72a3432db663d39655afd85daf085b1025b214cdedacf961b28731e66b15e9e","last_reissued_at":"2026-05-22T01:03:15.631724Z","signature_status":"signed_v1","first_computed_at":"2026-05-22T01:03:15.631724Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2510.03559","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-22T01:03:15Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Qtx20thp0qOzrUQL99k6ydlDm7o3y3DQIx9n008Gr02CtnxVT5hPzdJOIlp6QmO3nouRcv6nNZJobhfOR6JyDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T05:15:17.795392Z"},"content_sha256":"568b29331570ab76367205930b881532c77813923987cf3d09e23e625469f773","schema_version":"1.0","event_id":"sha256:568b29331570ab76367205930b881532c77813923987cf3d09e23e625469f773"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2025:Y4VDIMW3MY6TSZK27WC5V4EFWE","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"PrivacyMotiv: Speculative Persona Journeys for Empathic and Motivating Privacy Reviews in UX Design","license":"http://creativecommons.org/licenses/by-sa/4.0/","headline":"","cross_cats":["cs.HC"],"primary_cat":"cs.CR","authors_text":"Jianing Wen, Tianshi Li, Toby Jia-Jun Li, Yaxing Yao, Zeya Chen","submitted_at":"2025-10-03T23:14:22Z","abstract_excerpt":"UX professionals routinely conduct design reviews, yet privacy concerns are often overlooked, not only due to limited tools, but more fundamentally from low intrinsic motivation, driven by limited privacy knowledge, weak empathy for unexpectedly affected users, and low autonomy in identifying harms. We present PrivacyMotiv, an LLM-powered system that generates vulnerability-centered personas, persona journey stories, and traceable design diagnoses grounded in lo-fi user flows to support privacy-oriented UX design review. In a within-subjects study with professional UX practitioners (N=16), Pri"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2510.03559","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2510.03559/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-22T01:03:15Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XpP7VmjLpNgVeGoNFq3KVrrjdP9ODzPptQShEQe2C9xSHXTVR/GD1G0mEBbdu92XwxYcEy8oRmR2UzJJvNgOBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T05:15:17.795800Z"},"content_sha256":"74ac9088817c30bf087da63616fe12f26fdefda0b7870a5d541949eb4d97d74a","schema_version":"1.0","event_id":"sha256:74ac9088817c30bf087da63616fe12f26fdefda0b7870a5d541949eb4d97d74a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/Y4VDIMW3MY6TSZK27WC5V4EFWE/bundle.json","state_url":"https://pith.science/pith/Y4VDIMW3MY6TSZK27WC5V4EFWE/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/Y4VDIMW3MY6TSZK27WC5V4EFWE/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T05:15:17Z","links":{"resolver":"https://pith.science/pith/Y4VDIMW3MY6TSZK27WC5V4EFWE","bundle":"https://pith.science/pith/Y4VDIMW3MY6TSZK27WC5V4EFWE/bundle.json","state":"https://pith.science/pith/Y4VDIMW3MY6TSZK27WC5V4EFWE/state.json","well_known_bundle":"https://pith.science/.well-known/pith/Y4VDIMW3MY6TSZK27WC5V4EFWE/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2025:Y4VDIMW3MY6TSZK27WC5V4EFWE","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"922d964afecbb4d599ef339992f6f9c79af1e596dcd84a0f0acf98fe99235159","cross_cats_sorted":["cs.HC"],"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2025-10-03T23:14:22Z","title_canon_sha256":"fb6fb2bae4b3459f772aa19624f4b516ceb955fa50f17918b583e51d0b287e81"},"schema_version":"1.0","source":{"id":"2510.03559","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2510.03559","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"arxiv_version","alias_value":"2510.03559v2","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2510.03559","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"pith_short_12","alias_value":"Y4VDIMW3MY6T","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"pith_short_16","alias_value":"Y4VDIMW3MY6TSZK2","created_at":"2026-05-22T01:03:15Z"},{"alias_kind":"pith_short_8","alias_value":"Y4VDIMW3","created_at":"2026-05-22T01:03:15Z"}],"graph_snapshots":[{"event_id":"sha256:74ac9088817c30bf087da63616fe12f26fdefda0b7870a5d541949eb4d97d74a","target":"graph","created_at":"2026-05-22T01:03:15Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2510.03559/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"UX professionals routinely conduct design reviews, yet privacy concerns are often overlooked, not only due to limited tools, but more fundamentally from low intrinsic motivation, driven by limited privacy knowledge, weak empathy for unexpectedly affected users, and low autonomy in identifying harms. We present PrivacyMotiv, an LLM-powered system that generates vulnerability-centered personas, persona journey stories, and traceable design diagnoses grounded in lo-fi user flows to support privacy-oriented UX design review. In a within-subjects study with professional UX practitioners (N=16), Pri","authors_text":"Jianing Wen, Tianshi Li, Toby Jia-Jun Li, Yaxing Yao, Zeya Chen","cross_cats":["cs.HC"],"headline":"","license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2025-10-03T23:14:22Z","title":"PrivacyMotiv: Speculative Persona Journeys for Empathic and Motivating Privacy Reviews in UX Design"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2510.03559","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:568b29331570ab76367205930b881532c77813923987cf3d09e23e625469f773","target":"record","created_at":"2026-05-22T01:03:15Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"922d964afecbb4d599ef339992f6f9c79af1e596dcd84a0f0acf98fe99235159","cross_cats_sorted":["cs.HC"],"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2025-10-03T23:14:22Z","title_canon_sha256":"fb6fb2bae4b3459f772aa19624f4b516ceb955fa50f17918b583e51d0b287e81"},"schema_version":"1.0","source":{"id":"2510.03559","kind":"arxiv","version":2}},"canonical_sha256":"c72a3432db663d39655afd85daf085b1025b214cdedacf961b28731e66b15e9e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c72a3432db663d39655afd85daf085b1025b214cdedacf961b28731e66b15e9e","first_computed_at":"2026-05-22T01:03:15.631724Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-22T01:03:15.631724Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"5lrtrJG3ymMjOL/KJHcDf2w2sUQ2VLjvqu0Pyru+/rbNav6VyUjges/ElP8OdrJ5izMcETc23AaxjvM1ega6Cw==","signature_status":"signed_v1","signed_at":"2026-05-22T01:03:15.632445Z","signed_message":"canonical_sha256_bytes"},"source_id":"2510.03559","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:568b29331570ab76367205930b881532c77813923987cf3d09e23e625469f773","sha256:74ac9088817c30bf087da63616fe12f26fdefda0b7870a5d541949eb4d97d74a"],"state_sha256":"108c22774bf4c365a475f8c5f8d1e63da415320c08189fa018a8342d56f9d8d4"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"VQ6N2wDwvSxOWLKfJ2k67wq4YSaqWN/+GpjBCj3Az8HIWOyPVM1NsjKD4/x+TaT6LcgM5u8ruimPLRF34dfeBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T05:15:17.798827Z","bundle_sha256":"e4f71a1b604f1e18477dbb56d57edd642ab89b29600ed9eae380ebd63db27d7d"}}