[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Public Access

Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls

Published: 11 November 2022 Publication History

Abstract

Smart voice assistants such as Amazon Alexa and Google Home are becoming increasingly pervasive in our everyday environments. Despite their benefits, their miniaturized and embedded cameras and microphones raise important privacy concerns related to surveillance and eavesdropping. Recent work on the privacy concerns of people in the vicinity of these devices has highlighted the need for 'tangible privacy', where control and feedback mechanisms can provide a more assured sense of whether the camera or microphone is 'on' or 'off'. However, current designs of these devices lack adequate mechanisms to provide such assurances. To address this gap in the design of smart voice assistants, especially in the case of disabling microphones, we evaluate several designs that incorporate (or not) tangible control and feedback mechanisms. By comparing people's perceptions of risk, trust, reliability, usability, and control for these designs in a between-subjects online experiment (N=261), we find that devices with tangible built-in physical controls are perceived as more trustworthy and usable than those with non-tangible mechanisms. Our findings present an approach for tangible, assured privacy especially in the context of embedded microphones.

References

[1]
Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 451--466.
[2]
Noura Abdi, Xiao Zhan, Kopo M. Ramokapane, and Jose Such. 2021. Privacy Norms for Smart Home Personal Assistants. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, Article 558, 14 pages.
[3]
Hezam Akram Abdulghani, Niels Alexander Nijdam, Anastasija Collen, and Dimitri Konstantas. 2019. A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective. Symmetry, Vol. 11, 6 (2019), 774.
[4]
Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-boo: I see your smart home activities, even encrypted!. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 207--218.
[5]
Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum.-Comput. Interact., Vol. 4, CSCW2, Article 116 (Oct. 2020), 28 pages.
[6]
Tawfiq Ammari, Jofish Kaye, Janice Y Tsai, and Frank Bentley. 2019. Music, Search, and IoT: How People (Really) Use Voice Assistants. ACM Trans. Comput. Hum. Interact., Vol. 26, 3 (2019), 17--1.
[7]
Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044, Vol. abs/1708.05044 (2017).
[8]
David Armstrong, Ann Gosling, John Weinman, and Theresa Marteau. 1997. The place of inter-rater reliability in qualitative research: An empirical study. Sociology, Vol. 31, 3 (1997), 597--606.
[9]
Katrin Arning and Martina Ziefle. 2007. Understanding age differences in PDA acceptance and performance. Computers in Human Behavior, Vol. 23, 6 (2007), 2904--2927.
[10]
Terje Aven and Ortwin Renn. 2009. On risk defined as an event where the outcome is uncertain. Journal of risk research, Vol. 12, 1 (2009), 1--11.
[11]
Nazmiye Balta-Ozkan, Oscar Amerighi, and Benjamin Boteler. 2014. A comparison of consumer perceptions towards smart homes in the UK, Germany and Italy: reflections for policy and future research. Technology Analysis & Strategic Management, Vol. 26, 10 (2014), 1176--1195.
[12]
G Beier. 1999. Locus of control when interacting with technology (Kontrollüberzeugungen im Umgang mit Technik). Report Psychologie, Vol. 24, 9 (1999), 684--693.
[13]
Karen Bonilla and Aqueasha Martin-Hammond. 2020. Older adults' perceptions of intelligent voice assistant privacy, transparency, and online privacy guidelines. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020).
[14]
Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences: Privacy and the control paradox. Social psychological and personality science, Vol. 4, 3 (2013), 340--347.
[15]
John Brooke. 1996. Sus: a ?quick and dirty'usability. Usability evaluation in industry, Vol. 189 (1996).
[16]
Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On Privacy and Security Challenges in Smart Connected Homes. In 2016 European Intelligence and Security Informatics Conference (EISIC). 172--175.
[17]
Michael Buhrmester, Tracy Kwang, and Samuel D Gosling. 2016. Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality data?, Vol. 6 (2016).
[18]
Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In 25th $$USENIX$$ Security Symposium ($$USENIX$$ Security 16). 513--530.
[19]
Nico Castelli, Corinna Ogonowski, Timo Jakobi, Martin Stein, Gunnar Stevens, and Volker Wulf. 2017. What Happened in My Home?: An End-User Development Approach for Smart Home Data Visualization. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). ACM, New York, NY, USA, 853--866.
[20]
Ann Cavoukian. 2009. Privacy by design. (2009).
[21]
S. Ceccacci and M. Mengoni. 2017. Designing Smart Home Interfaces: Traditional vs Virtual Prototyping. In Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments (Island of Rhodes, Greece) (PETRA '17). Association for Computing Machinery, New York, NY, USA, 67--74.
[22]
Marie Chan, Daniel Estève, Christophe Escriba, and Eric Campo. 2008. A review of smart homes-Present state and future challenges. Computer methods and programs in biomedicine, Vol. 91, 1 (2008), 55--81.
[23]
Varun Chandrasekaran, Suman Banerjee, Bilge Mutlu, and Kassem Fawaz. 2021. PowerCut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Smart Speakers. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 535--552.
[24]
Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu, and Suman Banerjee. 2018. Characterizing privacy perceptions of voice assistants: A technology probe study. arXiv preprint arXiv:1812.00263, Vol. 135 (2018).
[25]
Gary Charness and Uri Gneezy. 2012. Strong evidence for gender differences in risk taking. Journal of Economic Behavior & Organization, Vol. 83, 1 (2012), 50--58.
[26]
Hsuan-Ting Chen and Wenhong Chen. 2015. Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychology, Behavior, and Social Networking, Vol. 18, 1 (2015), 13--19.
[27]
Yuxin Chen, Huiying Li, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y Zhao, and Haitao Zheng. 2019. Understanding the effectiveness of ultrasonic microphone jammer. arXiv preprint arXiv:1904.08490, Vol. abs/1904.08490 (2019).
[28]
Eugene Cho. 2019. Hey Google, can I ask you something in private?. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--9.
[29]
Eugene Cho, S Shyam Sundar, Saeed Abdullah, and Nasim Motalebi. 2020. Will deleting history make alexa more trustworthy? effects of privacy and content customization on user experience of smart speakers. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.
[30]
Yaliang Chuang, Lin-Lin Chen, and Yoga Liu. 2018. Design Vocabulary for Human-IoT Systems Communication. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI '18). ACM, New York, NY, USA, Article 274, 11 pages.
[31]
Hyunji Chung, Michaela Iorga, Jeffrey Voas, and Sangjin Lee. 2017. Alexa, can I trust you? Computer, Vol. 50, 9 (2017), 100--104.
[32]
Scott Clifford, Ryan M Jewell, and Philip D Waggoner. 2015. Are samples drawn from Mechanical Turk valid for research on political ideology? Research & Politics, Vol. 2, 4 (2015), 2053168015622072.
[33]
Sofia Elena Colesca. 2009. Understanding trust in e-government. Engineering Economics, Vol. 63, 3 (2009).
[34]
Ry Crist and Andrew Gebhart. 2018. Everything you need to know about the Amazon Echo. CNET, September, Vol. 21 (2018).
[35]
TK Das and Bing-Sheng Teng. 2004. The risk-based view of trust: A conceptual framework. journal of Business and Psychology, Vol. 19, 1 (2004), 85--116.
[36]
Nora A Draper and Joseph Turow. 2019. The corporate cultivation of digital resignation. New Media & Society, Vol. 21, 8 (2019), 1824--1839.
[37]
Kiran K Edara. 2014. Key word determinations from voice data. US Patent 8,798,995.
[38]
Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, and Lorrie Faith Cranor. 2021. Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to Purchase IoT Devices?. In 2021 IEEE Symposium on Security and Privacy (SP). 1937--1954.
[39]
Huan Feng, Kassem Fawaz, and Kang G Shin. 2017. Continuous authentication for voice assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. 343--355.
[40]
Andy Field, Jeremy Miles, and Zoë Field. 2012. Discovering statistics using R. Sage publications.
[41]
Morten Fjeld, Sissel Guttormsen Schar, Domenico Signorello, and Helmut Krueger. 2002. Alternative tools for tangible interaction: A usability evaluation. In Proceedings. International Symposium on Mixed and Augmented Reality. IEEE, 157--318.
[42]
Ivan Fléchais. 2005. Designing secure and usable systems. PhD diss., University College London (2005).
[43]
Noria Foukia, David Billard, and Eduardo Solana. 2016. PISCES: A framework for privacy by design in IoT. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 706--713.
[44]
Nathaniel Fruchter and Ilaria Liccardi. 2018. Consumer attitudes towards privacy and security in home assistants. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. 1--6.
[45]
Chuhan Gao, Varun Chandrasekaran, Kassem Fawaz, and Suman Banerjee. 2018. Traversing the quagmire that is privacy in your smart home. In Proceedings of the 2018 Workshop on IoT Security and Privacy. 22--28.
[46]
Vaibhav Garg, Kevin Benton, and L. Jean Camp. 2014. The Privacy Paradox: A Facebook Case Study. In Proceedings of the 42nd Research Conference on Communication, Information and Internet Policy.
[47]
Siddharth Gulati, Sonia Sousa, and David Lamas. 2018. Modelling trust in human-like technologies. In Proceedings of the 9th Indian Conference on Human Computer Interaction. 1--10.
[48]
Pamela J Hinds. 1998. User control and its many facets: A study of perceived control in human-computer interaction. Hewlett Packard Laboratories California.
[49]
Gary Horcher. 2018. Woman says her Amazon device recorded private conversation, sent it out to random contact. KIRO News (2018).
[50]
Eva Hornecker and Jacob Buur. 2006. Getting a grip on tangible interaction: a framework on physical space and social interaction. In Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 437--446.
[51]
Roberto Hoyle, Luke Stark, Qatrunnada Ismail, David Crandall, Apu Kapadia, and Denise Anthony. 2020. Privacy Norms and Preferences for Photos Posted Online. ACM Transactions on Computer-Human Interaction (ACM TOCHI), Vol. 27, 4, Article 30 (Aug. 2020), 27 pages.
[52]
Yue Huang, Borke Obada-Obieh, and Konstantin Beznosov. 2020. Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.
[53]
Jiun-Yin Jian, Ann M Bisantz, and Colin G Drury. 2000. Foundations for an empirically determined scale of trust in automated systems. International journal of cognitive ergonomics, Vol. 4, 1 (2000), 53--71.
[54]
Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In 10th Symposium On Usable Privacy and Security ($$SOUPS$$ 2014). 37--49.
[55]
Bjørn Karmann. 2018. Project Alias. http://bjoernkarmann.dk/project_alias. Accessed: 2021-06--30.
[56]
RM Khan and MA Khan. 2007. Academic sojourners, culture shock and intercultural adaptation: A trend analysis. Studies About Languages, Vol. 10 (2007), 38--46.
[57]
Harri Kiljander et al. 2004. Evolution and usability of mobile phone interaction styles. Helsinki University of Technology.
[58]
Demetrius Klitou. 2014. Privacy-invading technologies and privacy by design. Information Technology and Law Series, Vol. 25 (2014), 27--45.
[59]
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. 2018. Skill squatting attacks on Amazon Alexa. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 33--47.
[60]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, are you listening? privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 1--31.
[61]
Hannah Limerick, David Coyle, and James W Moore. 2014. The experience of agency in human-computer interactions: a review. Frontiers in human neuroscience, Vol. 8 (2014), 643.
[62]
Di Liu, Randolph G Bias, Matthew Lease, and Rebecca Kuipers. 2012. Crowdsourcing for usability testing. Proceedings of the American Society for Information Science and Technology, Vol. 49, 1 (2012), 1--10.
[63]
Yuchen Liu, Ziyu Xiang, Eun Ji Seong, Apu Kapadia, and Donald S. Williamson. 2021. Defending Against Microphone-Based Attacks with Personalized Noise. Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2021, 2 (2021), 130--150.
[64]
Maria Madsen and Shirley Gregor. 2000. Measuring human-computer trust. In 11th australasian conference on information systems, Vol. 53. Citeseer, 6--8.
[65]
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy attitudes of smart speaker users. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 4 (2019), 250--271.
[66]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--23.
[67]
Donald McMillan, Barry Brown, Ikkaku Kawaguchi, Razan Jaber, Jordi Solsona Belenguer, and Hideaki Kuzuoka. 2019. Designing with Gaze: Tama--a Gaze Activated Smart-Speaker. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--26.
[68]
Adam W Meade and S Bartholomew Craig. 2012. Identifying careless responses in survey data. Psychological methods, Vol. 17, 3 (2012), 437.
[69]
Abraham H Mhaidli, Manikandan Kandadai Venkatesh, Yixin Zou, Florian Schaub, and M Kandadai. 2020. Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls. Proc. Priv. Enhancing Technol., Vol. 2020, 2 (2020), 251--270.
[70]
Don Norman. 2014. Turn signals are the facial expressions of automobiles. Diversion Books.
[71]
Kieron O'Hara. 2016. The seven veils of privacy. IEEE Internet Computing, Vol. 20, 2 (2016), 86--91.
[72]
Ilesanmi Olade, Christopher Champion, Haining Liang, and Charles Fleming. 2019. The $Smart^2$ Speaker Blocker: An Open-Source Privacy Filter for Connected Home Speakers. arXiv preprint arXiv:1901.04879, Vol. abs/1901.04879 (2019).
[73]
Jason W Osborne, Anna B Costello, and J Thomas Kellow. 2014. Best practices in exploratory factor analysis. CreateSpace Independent Publishing Platform Louisville, KY.
[74]
Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli V"ah"akangas, Tero Hasu, Niklas Vainio, and Petri Myllym"aki. 2012. Long-term effects of ubiquitous surveillance in the home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. 41--50.
[75]
Yvonne O'Connor, Wendy Rowan, Laura Lynch, and Ciara Heavin. 2017. Privacy by design: informed consent and internet of things for smart health. Procedia computer science, Vol. 113 (2017), 653--658.
[76]
Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow. 2015. IoTPOT: Analysing the rise of IoT compromises. In 9th $$USENIX$$ Workshop on Offensive Technologies ($$WOOT$$ 15).
[77]
Sameer Patil, Roman Schlegel, Apu Kapadia, and Adam J. Lee. 2014. Reflection or Action?: How Feedback and Control Affect Location Sharing Decisions. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI '14). 101--110.
[78]
Joann Peck and Terry L Childers. 2003. To have and to hold: The influence of haptic information on product judgments. Journal of Marketing, Vol. 67, 2 (2003), 35--48.
[79]
Joann Peck and Jennifer Wiggins Johnson. 2011. Autotelic need for touch, haptics, and persuasion: The role of involvement. Psychology & Marketing, Vol. 28, 3 (2011), 222--239.
[80]
Charith Perera, Ciaran McCormick, Arosha K Bandara, Blaine A Price, and Bashar Nuseibeh. 2016. Privacy-by-design framework for assessing internet of things applications and platforms. In Proceedings of the 6th International Conference on the Internet of Things. 83--92.
[81]
Qualtrics. 2021. Qualtrics XM. Accessed: 2021-06--10.
[82]
Joel Ross, Lilly Irani, M Six Silberman, Andrew Zaldivar, and Bill Tomlinson. 2010. Who are the crowdworkers? Shifting demographics in Mechanical Turk. In CHI'10 extended abstracts on Human factors in computing systems. 2863--2872.
[83]
Mary Beth Rosson and John M Carroll. 2009. Scenario-based design. In Human-computer interaction. CRC Press, 161--180.
[84]
Matthias Rothensee. 2008. User acceptance of the intelligent fridge: empirical results from a simulation. In The internet of things. Springer, 123--139.
[85]
Yosiyuki Sakamoto, Makio Ishiguro, and Genshiro Kitagawa. 1986. Akaike information criterion statistics. Dordrecht, The Netherlands: D. Reidel, Vol. 81, 10.5555 (1986), 26853.
[86]
Mike Scaife and Yvonne Rogers. 1996. External cognition: how do graphical representations work? International journal of human-computer studies, Vol. 45, 2 (1996), 185--213.
[87]
Kim Bartel Sheehan. 1999. An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of interactive marketing, Vol. 13, 4 (1999), 24--38.
[88]
Kim Bartel Sheehan. 2002. Toward a typology of Internet users and online privacy concerns. The information society, Vol. 18, 1 (2002), 21--32.
[89]
Dong-Hee Shin. 2010. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers, Vol. 22, 5 (2010), 428--438.
[90]
Dong-Hee Shin. 2012. Cross-analysis of usability and aesthetic in smart devices: what influences users' preferences? Cross Cultural Management: An International Journal, Vol. 19 (2012), 563--587.
[91]
Ben Shneiderman and Catherine Plaisant. 2010. Designing the user interface: Strategies for effective human-computer interaction. Pearson Education India.
[92]
Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smart-home IoT devices. In 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob). IEEE, 163--167.
[93]
Lennart Sjöberg, Bjørg-Elin Moen, and Torbjørn Rundmo. 2004. Explaining risk perception. An evaluation of the psychometric paradigm in risk perception research, Vol. 10, 2 (2004), 665--612.
[94]
Paul Slovic. 1987. Perception of risk. Science, Vol. 236, 4799 (1987), 280--285.
[95]
Madiha Tabassum, Tomasz Kosi'nski, Alisa Frik, Nathan Malkin, Primal Wijesekera, Serge Egelman, and Heather Richter Lipford. 2019b. Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 3, 4 (2019), 1--23.
[96]
Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019a. " I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2019). 435--450.
[97]
Brygg Ullmer and Hiroshi Ishii. 2000. Emerging frameworks for tangible user interfaces. IBM systems journal, Vol. 39, 3.4 (2000), 915--931.
[98]
Elise Van Den Hoven, Evelien Van De Garde-Perik, Serge Offermans, Koen Van Boerdonk, and Kars-Michiel H Lenssen. 2013. Moving Tangible Interaction Systems to the Next Level. IEEE Computer, Vol. 46, 8 (2013), 70--76.
[99]
G Gary Wang. 2002. Definition and review of virtual prototyping. J. Comput. Inf. Sci. Eng., Vol. 2, 3 (2002), 232--236.
[100]
Consumer Watchdog. 2017. Google, Amazon Patent Filings Reveal Digital Home Assistant Privacy Problems.
[101]
Stephan AG Wensveen, Johan Partomo Djajadiningrat, and CJ Overbeeke. 2004. Interaction frogger: a design framework to couple action and function through feedback and feedforward. In Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques. 177--184.
[102]
Heng Xu, Tamara Dinev, H Jeff Smith, and Paul Hart. 2008. Examining the formation of individual's privacy concerns: Toward an integrative view., Vol. 6 (2008).
[103]
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019. Defending my castle: A co-design study of privacy mechanisms for smart homes. In Proceedings of the 2019 chi conference on human factors in computing systems. 1--12.
[104]
An Gie Yong, Sean Pearce, et al. 2013. A beginner's guide to factor analysis: Focusing on exploratory factor analysis. Tutorials in quantitative methods for psychology, Vol. 9, 2 (2013), 79--94.
[105]
Eva-Maria Zeissig, Chantal Lidynia, Luisa Vervier, Andera Gadeib, and Martina Ziefle. 2017. Online privacy perceptions of older adults. In International Conference on Human Aspects of IT for the Aged Population. Springer, 181--200.
[106]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In thirteenth symposium on usable privacy and security ($$SOUPS$$ 2017). 65--80.
[107]
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. 2017. Dolphinattack: Inaudible voice commands. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 103--117.
[108]
Oren Zuckerman. 2015. Objects for change: A case study of a tangible user interface for behavior change. In Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. 649--654.

Cited By

View all
  • (2024)Magic Mirror: Designing a Weight Change Visualization for Domestic UseProceedings of the ACM on Human-Computer Interaction10.1145/36981498:ISS(569-596)Online publication date: 24-Oct-2024
  • (2024)Evaluating privacy, security, and trust perceptions in conversational AIComputers in Human Behavior10.1016/j.chb.2024.108344159:COnline publication date: 1-Oct-2024
  • (2024)“Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements About Smart Speaker Privacy SettingsICT Systems Security and Privacy Protection10.1007/978-3-031-65175-5_11(148-161)Online publication date: 26-Jul-2024
  • Show More Cited By

Index Terms

  1. Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue CSCW2
      CSCW
      November 2022
      8205 pages
      EISSN:2573-0142
      DOI:10.1145/3571154
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 November 2022
      Published in PACMHCI Volume 6, Issue CSCW2

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IoT devices
      2. privacy assurance
      3. smart voice assistant
      4. tangible design

      Qualifiers

      • Research-article

      Funding Sources

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)334
      • Downloads (Last 6 weeks)53
      Reflects downloads up to 16 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Magic Mirror: Designing a Weight Change Visualization for Domestic UseProceedings of the ACM on Human-Computer Interaction10.1145/36981498:ISS(569-596)Online publication date: 24-Oct-2024
      • (2024)Evaluating privacy, security, and trust perceptions in conversational AIComputers in Human Behavior10.1016/j.chb.2024.108344159:COnline publication date: 1-Oct-2024
      • (2024)“Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements About Smart Speaker Privacy SettingsICT Systems Security and Privacy Protection10.1007/978-3-031-65175-5_11(148-161)Online publication date: 26-Jul-2024
      • (2024)The Social and Ethical Challenges of the MetaverseThe Metaverse for the Healthcare Industry10.1007/978-3-031-60073-9_4(59-75)Online publication date: 29-Jun-2024
      • (2023)Powering for privacyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620376(2473-2490)Online publication date: 9-Aug-2023
      • (2023)Alexa, it is creeping over me – Exploring the impact of privacy concerns on consumer resistance to intelligent voice assistantsAsia Pacific Journal of Marketing and Logistics10.1108/APJML-10-2022-086936:2(261-292)Online publication date: 26-Jul-2023

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media