Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3563609.3563643guideproceedingsArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Runtime permissions for privacy in proactive intelligent assistants

Published: 08 August 2022 Publication History

Abstract

Intelligent voice assistants may soon become proactive, offering suggestions without being directly invoked. Such behavior increases privacy risks, since proactive operation requires continuous monitoring of conversations. To mitigate this problem, our study proposes and evaluates one potential privacy control, in which the assistant requests permission for the information it wishes to use immediately after hearing it. To find out how people would react to runtime permission requests, we recruited 23 pairs of participants to hold conversations while receiving ambient suggestions from a proactive assistant, which we simulated in real time using the Wizard of Oz technique. The interactive sessions featured different modes and designs of runtime permission requests and were followed by in-depth interviews about people's preferences and concerns. Most participants were excited about the devices despite their continuous listening, but wanted control over the assistant's actions and their own data. They generally prioritized an interruption-free experience above more fine-grained control over what the device would hear.

References

[1]
California Consumer Privacy Act, 2018.
[2]
Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, 2019.
[3]
Noura Abdi, Xiao Zhan, Kopo M. Ramokapane, and Jose Such. Privacy norms for smart home personal assistants. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 2021.
[4]
Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. Tangible privacy: Towards user-centric sensor designs for bystander privacy. Proc. ACM Hum.-Comput. Interact., 4(CSCW2), October 2020.
[5]
Devdatta Akhawe and Adrienne Porter Felt. Alice in warningland: A large-scale field study of browser security warning effectiveness. In Proceedings of the 22nd USENIX Security Symposium, pages 257-272, 2013.
[6]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging. pages 787-796. ACM Press, 2015.
[7]
Amazon. Alexa Skills. https://www.amazon.com/alexaskills/b?ie=UTF8&node=13727921011.
[8]
Amazon. Configure Permissions for Customer Information in Your Skill. https://developer.amazon.com/en-US/docs/alexa/custom-skills/configure-permissions-for-customer-information-in-your-skill.html.
[9]
Amazon. Require a Voice Code for Purchases with Alexa. https://www.amazon.com/gp/help/customer/display.html?nodeId=GAA2RYUEDNT5ZSNK.
[10]
Amazon. Skill Certification Requirements. https://developer.amazon.com/en-US/docs/alexa/custom-skills/certification-requirements-for-custom-skills.html.
[11]
Amazon. What Are Alexa Voice Profiles? https://www.amazon.com/gp/help/customer/display.html?nodeId=GYCXKY2AB2QWZT2X.
[12]
Salvatore Andolina, Valeria Orso, Hendrik Schneider, Khalil Klouche, Tuukka Ruotsalo, Luciano Gamberini, and Giulio Jacucci. Investigating Proactive Search Support in Conversations. In Proceedings of the 2018 Designing Interactive Systems Conference, DIS '18, pages 1295-1307. ACM, 2018.
[13]
Julio Angulo and Martin Ortlieb. "WTH.!?!" experiences, reactions, and expectations related to online privacy panic situations. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015), pages 19-38, Ottawa, July 2015. USENIX Association.
[14]
Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2(2):59:1-59:23, July 2018.
[15]
David Armstrong, Ann Gosling, John Weinman, and Theresa Marteau. The Place of Inter-Rater Reliability in Qualitative Research: An Empirical Study. Sociology, 31(3):597-606, August 1997.
[16]
Paritosh Bahirat, Martijn Willemsen, Yangyang He, Qizhang Sun, and Bart Knijnenburg. Overlooking context: How do defaults and framing reduce deliberation in smart home privacy decision-making? In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 2021.
[17]
Natã M. Barbosa, Joon S. Park, Yaxing Yao, and Yang Wang. "What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes. Proceedings on Privacy Enhancing Technologies, 2019(4):211- 231, October 2019.
[18]
Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L Mazurek, Michael K Reiter, Manya Sleeper, and Blase Ur. The post anachronism: The temporal dimension of Facebook privacy. In Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society, pages 1-12. ACM, 2013.
[19]
Julia Bernd, Ruba Abu-Salma, and Alisa Frik. Bystanders' privacy: The perspectives of nannies on smart home surveillance. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20). USENIX Association, August 2020.
[20]
Virginia Braun and Victoria Clarke. Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2):77-101, January 2006.
[21]
Barry Brown, Moira McGregor, and Donald McMillan. Searchable objects: Search in everyday conversation. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW '15, pages 508-517, New York, NY, USA, 2015. Association for Computing Machinery.
[22]
Aylin Caliskan Islam, Jonathan Walsh, and Rachel Greenstadt. Privacy detective: Detecting private information and collective privacy behavior in a large social network. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pages 35-46, New York, NY, USA, 2014. Association for Computing Machinery.
[23]
Weicheng Cao, Chunqiu Xia, Sai Teja Peddinti, David Lie, Nina Taft, and Lisa M. Austin. A large scale study of user behavior, expectations and engagement with Android permissions. In 30th USENIX Security Symposium (USENIX Security 21), pages 803-820. USENIX Association, August 2021.
[24]
Juan Pablo Carrascal, Rodrigo De Oliveira, and Mauro Cherubini. To call or to recall? That's the research question. ACM Transactions on Computer-Human Interaction, 22(1), March 2015.
[25]
Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, and Hongxin Hu. Dangerous Skills Got Certified: Measuring the Trustworthiness of Amazon Alexa Platform. In ACM Conference on Computer and Communications Security (CCS), 2020.
[26]
Saksham Chitkara, Nishad Gothoskar, Suhas Harish, Jason I. Hong, and Yuvraj Agarwal. Does This App Really Need My Location?: Context-Aware Privacy Management for Smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1(3):42:1-42:22, September 2017.
[27]
Eugene Cho. Hey Google, Can I Ask You Something in Private? In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI '19, pages 258:1-258:9. ACM, 2019.
[28]
Camille Cobb, Sruti Bhagavatula, Kalil Anderson Garrett, Alison Hoffman, Varun Rao, and Lujo Bauer. "I would have to evaluate their objections": Privacy tensions between smart home device owners and incidental users. Proceedings on Privacy Enhancing Technologies, 2021(4):54-75, 2021.
[29]
Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. Informing the Design of a Personalized Privacy Assistant for the Internet of Things. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pages 1-13, Honolulu HI USA, April 2020. ACM.
[30]
Committee on Health Research and the Privacy of Health Information: The HIPAA Privacy Rule, Board on Health Sciences Policy, Board on Health Care Services, and Institute of Medicine. Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. National Academies Press, Washington, D.C., February 2009.
[31]
Nils Dahlbäck, Arne Jönsson, and Lars Ahrenberg. Wizard of Oz studies: Why and how. In Proceedings of the 1st International Conference on Intelligent User Interfaces, IUI '93, pages 193-200, New York, NY, USA, 1993. Association for Computing Machinery.
[32]
Anupam Das, Martin Degeling, Daniel Smullen, and Norman Sadeh. Personalized privacy assistants for the internet of things: Providing users with notice and choice. IEEE Pervasive Computing, 17(3):35-46, July 2018.
[33]
Daniel J. Dubois, Roman Kolcun, Anna Maria Mandalari, Muhammad Talha Paracha, David Choffnes, and Hamed Haddadi. When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers. Proceedings on Privacy Enhancing Technologies, 2020(4):255- 276, October 2020.
[34]
Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, and Sven Bugiel. Explanation beats context: The effect of timing & rationales on users' runtime permission decisions. In 30th USENIX Security Symposium (USENIX Security 21), pages 785-802. USENIX Association, August 2021.
[35]
European Parliament and the Council of the European Union. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC, 2016.
[36]
Adrienne Porter Felt, Serge Egelman, Matthew Finifter, Devdatta Akhawe, and David Wagner. How to Ask for Permission. In HotSec, 2012.
[37]
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. Android Permissions: User Attention, Comprehension, and Behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pages 3:1- 3:14, New York, NY, USA, 2012. ACM.
[38]
Christine Geeng and Franziska Roesner. Who's In Control?: Interactions In Multi-User Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI '19, pages 268:1-268:13. ACM, 2019.
[39]
Arup Kumar Ghosh, Karla Badillo-Urquiola, Mary Beth Rosson, Heng Xu, John M. Carroll, and Pamela J. Wisniewski. A matter of control or safety? Examining parental use of technical monitoring apps on teens' mobile devices. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pages 1-14. Association for Computing Machinery, New York, NY, USA, 2018.
[40]
Google. Link your voice to your devices with Voice Match. https://support.google.com/assistant/answer/9071681.
[41]
Google. Android 6.0 Changes. https://developer.android.com/about/versions/marshmallow/android-6.0-changes, 2015.
[42]
Yue Huang, Borke Obada-Obieh, and Konstantin (Kosta) Beznosov. Amazon vs. My brother: How users of shared smart speakers perceive and cope with privacy risks. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI '20, pages 1-13, New York, NY, USA, 2020. Association for Computing Machinery.
[43]
Rupert Jones. Voice recognition: Is it really as secure as it sounds? The Guardian, September 2018.
[44]
Smirity Kaushik, Yaxing Yao, Pierre Dewitte, and Yang Wang. "How I Know For Sure": People's perspectives on solely automated Decision-Making (SADM). In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), pages 159-180. USENIX Association, August 2021.
[45]
J. F. Kelley. An empirical methodology for writing user-friendly natural language computer applications. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '83, pages 193-196, New York, NY, USA, 1983. Association for Computing Machinery.
[46]
Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Jim Blyth, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography and Data Security, pages 68-79, Berlin, Heidelberg, 2012. Springer Berlin Heidelberg.
[47]
Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. Privacy as part of the app decision-making process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 3393-3402. Association for Computing Machinery, New York, NY, USA, 2013.
[48]
Mohammad Taha Khan, Maria Hyun, Chris Kanich, and Blase Ur. Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI '18, pages 543:1- 543:12, New York, NY, USA, 2018. ACM.
[49]
Jonathan Kilgour, Jean Carletta, and Steve Renals. The Ambient Spotlight: Queryless desktop search from meeting speech. In Proceedings of the 2010 International Workshop on Searching Spontaneous Conversational Speech, SSCS '10, pages 49-52, New York, NY, USA, 2010. Association for Computing Machinery.
[50]
Ilker Koksal. The Sales Of Smart Speakers Skyrocketed. Forbes, March 2020.
[51]
Vinay Koshy, Joon Sung Sung Park, Ti-Chung Cheng, and Karrie Karahalios. "We just use what they give us": Understanding passenger user perspectives in smart homes. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 2021.
[52]
Jacob Leon Kröger, Otto Hans-Martin Lutz, and Philip Raschke. Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference. In Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, and Samuel Fricker, editors, Privacy and Identity Management. Data for Better Living: AI and Privacy, volume 576, pages 242-258. Springer International Publishing, Cham, 2020.
[53]
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium (USENIX Security 18), pages 33-47. USENIX Association, 2018.
[54]
Christoffer Lambertsson. Expectations of Privacy in Voice Interaction-A Look at Voice Controlled Bank Transactions. Technical report, 2017.
[55]
Frederic Lardinois. Google makes it easier to chat with its Assistant. Techcrunch, May 2022.
[56]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proc. ACM Hum.-Comput. Interact., 2(CSCW):102:1-102:31, November 2018.
[57]
Bing Liu and Ian Lane. Attention-Based Recurrent Neural Network Models for Joint Intent Detection and Slot Filling. In Interspeech 2016, pages 685-689, September 2016.
[58]
David Major, Danny Yuxing Huang, Marshini Chetty, and Nick Feamster. Alexa, who am I speaking to?: Understanding users' ability to identify third-party apps on Amazon Alexa. ACM Transactions on Internet Technology, 22(1), September 2021.
[59]
David J. Major, Danny Yuxing Huang, Marshini Chetty, and Nick Feamster. Alexa, Who Am I Speaking To? Understanding Users' Ability to Identify Third-Party Apps on Amazon Alexa. arXiv:1910.14112 [cs], October 2019.
[60]
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies, 2019(4):250-271, 2019.
[61]
Lydia Manikonda, Aditya Deotale, and Subbarao Kambhampati. What's Up with Privacy?: User Preferences and Privacy Concerns in Intelligent Personal Assistants. In Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, AIES '18, pages 229-235, New York, NY, USA, 2018. ACM.
[62]
David Maulsby, Saul Greenberg, and Richard Mander. Prototyping an intelligent agent through Wizard of Oz. In Proceedings of the INTERACT '93 and CHI '93 Conference on Human Factors in Computing Systems, CHI '93, pages 277-284, New York, NY, USA, 1993. Association for Computing Machinery.
[63]
Michelle L. Mazurek, Peter F. Klemperer, Richard Shay, Hassan Takabi, Lujo Bauer, and Lorrie Faith Cranor. Exploring reactive access control. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2085-2094, Vancouver BC Canada, May 2011. ACM.
[64]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proc. ACM Hum.-Comput. Interact., 3(CSCW), November 2019.
[65]
Moira McGregor and John C. Tang. More to Meetings: Challenges in Using Speech-Based Technology to Support Meetings. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW '17, pages 2208-2220, New York, NY, USA, 2017. ACM.
[66]
Wei Meng, Ren Ding, Simon P. Chung, Steven Han, and Wenke Lee. The Price of Free: Privacy Leakage in Personalized Mobile In-App Ads. In Proceedings 2016 Network and Distributed System Security Symposium, San Diego, CA, 2016. Internet Society.
[67]
Richard Mitev, Markus Miettinen, and Ahmad-Reza Sadeghi. Alexa lied to me: Skill-based man-in-the-middle attacks on virtual assistants. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, Asia CCS '19, pages 465-478, New York, NY, USA, 2019. Association for Computing Machinery.
[68]
Kate Moran. Collecting Metrics During Qualitative Studies, June 2021.
[69]
Helen Nissenbaum. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, Stanford, Calif, 2009.
[70]
Marije Nouwen, Maarten Van Mechelen, and Bieke Zaman. A value sensitive design approach to parental software for young children. In Proceedings of the 14th International Conference on Interaction Design and Children, IDC '15, pages 363-366, New York, NY, USA, 2015. Association for Computing Machinery.
[71]
George Orwell. Nineteen Eighty-Four. Secker & Warburg, London, 1949.
[72]
R. Parasuraman, T.B. Sheridan, and C.D. Wickens. A model for types and levels of human interaction with automation. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 30(3):286- 297, 2000.
[73]
Pew Research Center. Public Perceptions of Privacy and Security in the Post-Snowden Era. Technical report, Pew Research Center, November 2014.
[74]
Kurt Wesley Piersol and Gabriel Beddingfield. Prewakeword speech processing, 2020.
[75]
Alexander Ponticello, Matthias Fassl, and Katharina Krombholz. Exploring authentication for security-sensitive tasks on smart home voice assistants. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), pages 475-492. USENIX Association, August 2021.
[76]
Laurel D. Riek. Wizard of oz studies in HRI: A systematic review and new reporting guidelines. J. Hum.-Robot Interact., 1(1):119-136, July 2012.
[77]
Aafaq Sabir, Evan Lafontaine, and Anupam Das. Hey Alexa, Who Am I Talking to?: Analyzing Users' Perception and Awareness Regarding Third-party Alexa Skills. In CHI Conference on Human Factors in Computing Systems, pages 1-15, New Orleans LA USA, April 2022. ACM.
[78]
Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pages 1-17, Ottawa, 2015. USENIX Association.
[79]
Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, and Thorsten Holz. Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers. arXiv:2008.00508 [cs], August 2020.
[80]
John S. Seberger, Marissel Llavore, Nicholas Nye Wyant, Irina Shklovski, and Sameer Patil. Empowering resignation: There's an app for that. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 2021.
[81]
Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, and Xinxin Jin. Can systems explain permissions better? Understanding users' misperceptions under smartphone runtime permission model. In 30th USENIX Security Symposium (USENIX Security 21), pages 751-768. USENIX Association, August 2021.
[82]
Yang Shi, Yang Wang, Ye Qi, John Chen, Xiaoyao Xu, and Kwan-Liu Ma. IdeaWall: Improving creative collaboration through combinatorial visual stimuli. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW '17, pages 594-603, New York, NY, USA, 2017. Association for Computing Machinery.
[83]
Manya Sleeper, Justin Cranshaw, Patrick Gage Kelley, Blase Ur, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. "I read my Twitter the next morning and was astonished": A conversational perspective on Twitter regrets. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 3277- 3286. Association for Computing Machinery, New York, NY, USA, 2013.
[84]
Daniel J. Solove. The Myth of the Privacy Paradox. George Washington Law Review, 89, February 2020.
[85]
Madiha Tabassum, Tomasz Kosiński, Alisa Frik, Nathan Malkin, Primal Wijesekera, Serge Egelman, and Heather Richter Lipford. Investigating users' preferences and expectations for always-listening voice assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3(4), December 2019.
[86]
Welderufael B. Tesfay, Jetzabel Serna, and Kai Rannenberg. PrivacyBot: Detecting privacy sensitive information in unstructured texts. In 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS), pages 53-60, October 2019.
[87]
Joseph Turow, Michael Hennessy, and Nora Draper. Persistent misperceptions: Americans' misplaced confidence in privacy policies, 2003-2015. Journal of Broadcasting & Electronic Media, 62(3):461-478, 2018.
[88]
Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan. Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments. MIS Quarterly, 42(2):355-380, February 2018.
[89]
Anthony Vance, Brock Kirwan, Daniel Bjornn, Jeffrey Jenkins, and Bonnie Brinton Anderson. What do we really know about how habituation to warnings occurs over time? A longitudinal FMRI study of habituation and polymorphic warnings. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pages 2215-2227. Association for Computing Machinery, New York, NY, USA, 2017.
[90]
Sarah Theres Völkel, Daniel Buschek, Malin Eiband, Benjamin R. Cowan, and Heinrich Hussmann. Eliciting and analysing users' envisioned dialogues with perfect voice assistants. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, CHI '21, New York, NY, USA, 2021. Association for Computing Machinery.
[91]
Jing Wei, Tilman Dingler, and Vassilis Kostakos. Developing the proactive speaker prototype based on Google Home. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, CHI EA '21, New York, NY, USA, 2021. Association for Computing Machinery.
[92]
Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. Android Permissions Remystified: A Field Study on Contextual Integrity. In 24th USENIX Security Symposium (USENIX Security 15), pages 499-514, Washington, D.C., August 2015. USENIX Association.
[93]
Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, and Konstantin Beznosov. The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences. In 2017 IEEE Symposium on Security and Privacy (SP), pages 1077-1093, May 2017.
[94]
Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Laura Brandimarte, and Alessandro Acquisti. Would a Privacy Fundamentalist Sell Their DNA for $1000...If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences. In Proceedings of the 2014 Symposium on Usable Privacy and Security, pages 1-18. USENIX Association, 2014.
[95]
Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. Privacy perceptions and designs of bystanders in smart homes. Proc. ACM Hum.- Comput. Interact., 3(CSCW), November 2019.
[96]
Bob Yirka. Google Nest hacker finds evidence of Google considering getting rid of 'Hey Google' hot words. Tech Xplore, October 2020.
[97]
Eric Zeng, Shrirang Mare, and Franziska Roesner. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pages 65-80, Santa Clara, CA, 2017. USENIX Association.
[98]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact., 2(CSCW):200:1-200:20, November 2018.
[99]
Marrian Zhou. Amazon's Alexa Guard can alert you if an Echo detects smoke alarm, breaking glass. CNET News, December 2018.

Index Terms

  1. Runtime permissions for privacy in proactive intelligent assistants
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        SOUPS'22: Proceedings of the Eighteenth USENIX Conference on Usable Privacy and Security
        August 2022
        706 pages
        ISBN:978-1-939133-30-4

        Sponsors

        • Ethyca
        • NSF
        • Google Inc.
        • Meta

        Publisher

        USENIX Association

        United States

        Publication History

        Published: 08 August 2022

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate 15 of 49 submissions, 31%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 09 Nov 2024

        Other Metrics

        Citations

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media