skip to main content
research-article

Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers

Published:01 November 2018Publication History
Skip Abstract Section

Abstract

Smart speakers with voice assistants, like Amazon Echo and Google Home, provide benefits and convenience but also raise privacy concerns due to their continuously listening microphones. We studied people's reasons for and against adopting smart speakers, their privacy perceptions and concerns, and their privacy-seeking behaviors around smart speakers. We conducted a diary study and interviews with seventeen smart speaker users and interviews with seventeen non-users. We found that many non-users did not see the utility of smart speakers or did not trust speaker companies. In contrast, users express few privacy concerns, but their rationalizations indicate an incomplete understanding of privacy risks, a complicated trust relationship with speaker companies, and a reliance on the socio-technical context in which smart speakers reside. Users trade privacy for convenience with different levels of deliberation and privacy resignation. Privacy tensions arise between primary, secondary, and incidental users of smart speakers. Finally, current smart speaker privacy controls are rarely used, as they are not well-aligned with users' needs. Our findings can inform future smart speaker designs; in particular we recommend better integrating privacy controls into smart speaker interaction.

References

  1. Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson. 2017. Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Comput. Surv., Vol. 50, 3, Article 44 (Aug. 2017), pages 41 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Christopher Alexander. 1977. A pattern language: towns, buildings, construction. Oxford university press.Google ScholarGoogle Scholar
  3. Amazon. {n. d.} a. Amazon Echo (2nd Generation) -- Always Ready, Connected, and Fast. Just Ask. https://www.amazon.com/Generation-improved-sound-powered-design/dp/B06XCM9LJ4?Google ScholarGoogle Scholar
  4. Amazon. {n. d.} b. Amazon Echo Dot. https://www.amazon.com/dp/B01DFKC2SOGoogle ScholarGoogle Scholar
  5. Amazon. {n. d.} c. Amazon.Com Help : Alexa and Alexa Device FAQs. https://www.amazon.com/gp/help/customer/display.html?nodeId=201602230Google ScholarGoogle Scholar
  6. Apple. 2017. HomePod Reinvents Music in the Home. https://www.apple.com/newsroom/2017/06/homepod-reinvents-music-in-the-home/Google ScholarGoogle Scholar
  7. Mike Barnes. 2017. Alexa, Are You Listening? https://labs.mwrinfosecurity.com/blog/alexa-are-you-listeningGoogle ScholarGoogle Scholar
  8. Ruth Bartlett and Christine Milligan. 2015. What Is Diary Method? Bloomsbury Publishing .Google ScholarGoogle Scholar
  9. Eric P. S. Baumer, Jenna Burrell, Morgan G. Ames, Jed R. Brubaker, and Paul Dourish. 2015. On the Importance and Implications of Studying Technology Non -Use. interactions, Vol. 22, 2 (Feb. 2015), 52--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. BBC. 2017. Amazon Hands over Echo 'murder' Data. BBC News (March 2017). http://www.bbc.com/news/technology-39191056Google ScholarGoogle Scholar
  11. BBC. 2018. Amazon Patents 'voice-Sniffing' Algorithms. BBC News (April 2018). http://www.bbc.com/news/technology-43725708Google ScholarGoogle Scholar
  12. Dieter Bohn. 2016. Google Home: A Speaker to Finally Take on the Amazon Echo. The Verge (May 2016). https://www.theverge.com/2016/5/18/11688376/google-home-speaker-announced-virtual-assistant-io-2016Google ScholarGoogle Scholar
  13. Nellie Bowles. 2018. Thermostats, Locks and Lights: Digital Tools of Domestic Abuse - The New York Times. https://www.nytimes.com/2018/06/23/technology/smart-home-devices-domestic-abuse.htmlGoogle ScholarGoogle Scholar
  14. Danah Boyd. 2007. Why youth (heart) social network sites: The role of networked publics in teenage social life. MacArthur foundation series on digital learning--Youth, identity, and digital media volume (2007), 119--142.Google ScholarGoogle Scholar
  15. A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agarwal, Stefan Saroiu, and Colin Dixon. 2011. Home Automation in the Wild: Challenges and Opportunities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM , New York, NY, USA, 2115--2124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Bugeja, A. Jacobsson, and P. Davidsson. 2016. On Privacy and Security Challenges in Smart Connected Homes. In 2016 European Intelligence and Security Informatics Conference (EISIC ). 172--175.Google ScholarGoogle Scholar
  17. Daniel J. Butler, Justin Huang, Franziska Roesner, and Maya Cakmak. 2015. The Privacy -Utility Tradeoff for Remotely Teleoperated Robots. In Proceedings of the Tenth Annual ACM /IEEE International Conference on Human -Robot Interaction (HRI '15). ACM, New York, NY, USA, 27--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Rishi Chandra. 2017. Welcoming Mini and Max to the Google Home Family. https://www.blog.google/products/home/welcoming-mini-and-max-google-home-family/Google ScholarGoogle Scholar
  19. Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A. Kientz. 2011. Living in a Glass House: A Survey of Private Moments in the Home. In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp '11). ACM, New York, NY, USA, 41--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak N. Patel, and Julie A. Kientz. 2012. Investigating Receptiveness to Sensing and Inference in the Home Using Sensor Proxies. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12). ACM, New York, NY, USA, 61--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. James Clawson, Jessica A. Pater, Andrew D. Miller, Elizabeth D. Mynatt, and Lena Mamykina. 2015. No Longer Wearing: Investigating the Abandonment of Personal Health -Tracking Technologies on Craigslist. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). ACM, New York, NY, USA, 647--658. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Tamara Dinev and Paul Hart. 2006. An Extended Privacy Calculus Model for E-Commerce Transactions. Info. Sys. Research, Vol. 17, 1 (March 2006), 61--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Daniel A. Epstein, Monica Caraway, Chuck Johnston, An Ping, James Fogarty, and Sean A. Munson. 2016. Beyond Abandonment to Next Steps : Understanding and Designing for Life After Personal Informatics Tool Use. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 1109--1113. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Adam Clark Estes. 2017. Don't Buy Anyone an Echo. https://gizmodo.com/dont-buy-anyone-an-echo-1820981732Google ScholarGoogle Scholar
  25. European Parliament and Council. 2016. Regulation EU 2016/679 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of such Data (General Data Protection Regulation). Official Journal of the European Union (2016), 88. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679Google ScholarGoogle Scholar
  26. Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. "A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 667, 13 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Gartner. 2016. Gartner Says Worldwide Spending on VPA -Enabled Wireless Speakers Will Top $2 Billion by 2020. http://www.gartner.com/newsroom/id/3464317Google ScholarGoogle Scholar
  28. Google. {n. d.} a. Data Security & Privacy on Google Home - Google Home Help. https://support.google.com/googlehome/answer/7072285?hl=enGoogle ScholarGoogle Scholar
  29. Google. {n. d.} b. Google Home. https://store.google.com/product/google_homeGoogle ScholarGoogle Scholar
  30. Greenberg, Andy. 2017. A Hacker Turned an Amazon Echo Into a 'Wiretap '. https://www.wired.com/story/amazon-echo-wiretap-hack/Google ScholarGoogle Scholar
  31. Jacob Kastrenakes. 2018. Google Sold over 6 Million Home Speakers since Mid-October. https://www.theverge.com/2018/1/5/16855982/google-home-sales-figures-holidays-2017Google ScholarGoogle Scholar
  32. Swati Khandelwal. 2017. Bluetooth Hack Affects 20 Million Amazon Echo and Google Home Devices. The Hacker News (Nov. 2017). http://thehackernews.com/2017/11/amazon-alexa-hacking-bluetooth.htmlGoogle ScholarGoogle Scholar
  33. Andreas Kirmse. 2012. Privacy in Smart Homes . Technical Report. http://kirmandi.rumeln.net/data/paper-Privacy.in.Smart.Homes.pdfGoogle ScholarGoogle Scholar
  34. Christoffer Lambertsson. 2017. Expectations of Privacy in Voice Interaction textendashA Look at Voice Controlled Bank Transactions. Ph.D. Dissertation. KTH Royal Institute of Technology.Google ScholarGoogle Scholar
  35. Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 2189--2201. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys That Listen: A Study of Parents, Children, and Internet -Connected Toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 5197--5207. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Sarah Mennicken and Elaine M. Huang. 2012. Hacking the Natural Habitat: An In -the-Wild Study of Smart Homes, Their Development, and the People Who Live in Them. In Pervasive Computing. Springer, Berlin, Heidelberg, 143--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Aarthi Easwara Moorthy and Kim-Phuong L. Vu. 2013. Voice Activated Personal Assistant: Privacy Concerns in the Public Space. M.S. California State University, Long Beach, United States -- California. https://search.proquest.com/docview/1513579796/abstract/DFF130DF16554E2FPQ/1Google ScholarGoogle Scholar
  39. Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). Santa Clara, CA. https://www.usenix.org/system/files/conference/soups2017/soups2017-naeini.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli Vähäkangas, Tero Hasu, Niklas Vainio, and Petri Myllymäki. 2012. Long-Term Effects of Ubiquitous Surveillance in the Home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12). ACM , New York, NY, USA, 41--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Ty Pendleburg. 2016. Denon HEOS and Amazon Alexa Voice Control Combine Forces. https://www.cnet.com/news/denon-heos-and-amazon-alexa-voice-control-combine-forces/Google ScholarGoogle Scholar
  42. Yury Pinsky. 2017. Tomato, Tomahto. Google Home Now Supports Multiple Users. https://www.blog.google/products/assistant/tomato-tomahto-google-home-now-supports-multiple-users/Google ScholarGoogle Scholar
  43. Martin Porcheron, Joel E. Fischer, Stuart Reeves, and Sarah Sharples. 2018. Voice Interfaces in Everyday Life. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 640, bibinfonumpages12 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Franc cois Portet, Michel Vacher, Caroline Golanski, Camille Roux, and Brigitte Meillon. 2013. Design and Evaluation of a Smart Home Voice Interface for the Elderly: Acceptability and Objection Aspects. Personal and Ubiquitous Computing, Vol. 17, 1 (Jan. 2013), 127--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's Watching Me: Assessing the Effectiveness of Webcam Indicator Lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 1649--1658. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Alisha Pradhan, Kanika Mehta, and Leah Findlater. 2018. "Accessibility Came by Accident": Use of Voice-Controlled Intelligent Personal Assistants by People with Disabilities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 459, bibinfonumpages13 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Elissa M. Redmiles, Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. 2017. A Summary of Survey Methodology Best Practices for Security and Privacy Researchers. (May 2017).Google ScholarGoogle Scholar
  48. Joel R Reidenberg, Jaspreet Bhatia, Travis D Breaux, and Thomas B Norton. 2016. Ambiguity in privacy policies and the impact of regulation. The Journal of Legal Studies, Vol. 45, S2 (2016), S163--S190.Google ScholarGoogle ScholarCross RefCross Ref
  49. Johnny Salda na. 2015. The Coding Manual for Qualitative Researchers. SAGE.Google ScholarGoogle Scholar
  50. Christine Satchell and Paul Dourish. 2009. Beyond the User: Use and Non -Use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer -Human Interaction Special Interest Group: Design: Open 24/7 (OZCHI '09). ACM, New York, NY, USA, 9--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. F. Schaub, R. Balebako, and L. F. Cranor. 2017. Designing Effective Privacy Notices and Controls. IEEE Internet Computing, Vol. 21, 3 (May 2017), 70--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Cranor. 2015a. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security. Ottawa, 1--17. https://www.usenix.org/conference/soups2015/proceedings/presentation/schaub Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. F. Schaub, B. Könings, and M. Weber. 2015b. Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making. IEEE Pervasive Computing, Vol. 14, 1 (Jan. 2015), 34--43.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Andrew Shuman. 2017. Hey Cortana, Set a Reminder: Harman Kardon Invoke Voice-Activated Speaker Available October 22. https://blogs.windows.com/windowsexperience/2017/10/20/harman-kardon-invoke-voice-activated-speaker-available-october-22/Google ScholarGoogle Scholar
  55. Patrick Spence. 2017. Welcome to the Sonic Internet. http://blog.sonos.com/en/welcome-sonic-internet/Google ScholarGoogle Scholar
  56. The Verge. 2017. Amazon may give app developers access to Alexa audio recordings. https://www.theverge.com/2017/7/12/15960596/amazon-alexa-echo-speaker-audio-recordings-developers-dataGoogle ScholarGoogle Scholar
  57. Daphne Townsend, Frank Knoefel, and Rafik Goubran. 2011. Privacy versus Autonomy: A Tradeoff Model for Smart Home Monitoring Technologies. In 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society. 4749--4752.Google ScholarGoogle ScholarCross RefCross Ref
  58. Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders Versus Intrusiveness: Teens ' and Parents ' Perspectives on Home -Entryway Surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14). ACM, New York, NY, USA, 129--139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Smart, Useful, Scary, Creepy : Perceptions of Online Behavioral Advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). ACM, New York, NY, USA, 4:1--4:15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Blase Ur, Melwyn Pak Yong Ho, Stephen Brawner, Jiyun Lee, Sarah Mennicken, Noah Picard, Diane Schulze, and Michael L. Littman. 2016. Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 3227--3231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Chris Welch. 2014. Amazon Just Surprised Everyone with a Crazy Speaker That Talks to You. https://www.theverge.com/2014/11/6/7167793/amazon-echo-speaker-announcedGoogle ScholarGoogle Scholar
  62. Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust Me: Doubts and Concerns Living with the Internet of Things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (DIS '16). ACM, New York, NY, USA, 427--434. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017. Santa Clara, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Don H. Zimmerman and D. Lawrence Wieder. 1977. The Diary: "Diary -Interview Method". Urban Life; Newbury Park, Calif., Vol. 5, 4 (Jan. 1977), 479--498. http://search.proquest.com/docview/1292940175/citation/A16505C65BA645C4PQ/1Google ScholarGoogle Scholar

Index Terms

  1. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Proceedings of the ACM on Human-Computer Interaction
            Proceedings of the ACM on Human-Computer Interaction  Volume 2, Issue CSCW
            November 2018
            4104 pages
            EISSN:2573-0142
            DOI:10.1145/3290265
            Issue’s Table of Contents

            Copyright © 2018 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 November 2018
            Published in pacmhci Volume 2, Issue CSCW

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader