Abstract
Smart speakers with voice assistants, like Amazon Echo and Google Home, provide benefits and convenience but also raise privacy concerns due to their continuously listening microphones. We studied people's reasons for and against adopting smart speakers, their privacy perceptions and concerns, and their privacy-seeking behaviors around smart speakers. We conducted a diary study and interviews with seventeen smart speaker users and interviews with seventeen non-users. We found that many non-users did not see the utility of smart speakers or did not trust speaker companies. In contrast, users express few privacy concerns, but their rationalizations indicate an incomplete understanding of privacy risks, a complicated trust relationship with speaker companies, and a reliance on the socio-technical context in which smart speakers reside. Users trade privacy for convenience with different levels of deliberation and privacy resignation. Privacy tensions arise between primary, secondary, and incidental users of smart speakers. Finally, current smart speaker privacy controls are rarely used, as they are not well-aligned with users' needs. Our findings can inform future smart speaker designs; in particular we recommend better integrating privacy controls into smart speaker interaction.
- Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson. 2017. Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Comput. Surv., Vol. 50, 3, Article 44 (Aug. 2017), pages 41 pages. Google ScholarDigital Library
- Christopher Alexander. 1977. A pattern language: towns, buildings, construction. Oxford university press.Google Scholar
- Amazon. {n. d.} a. Amazon Echo (2nd Generation) -- Always Ready, Connected, and Fast. Just Ask. https://www.amazon.com/Generation-improved-sound-powered-design/dp/B06XCM9LJ4?Google Scholar
- Amazon. {n. d.} b. Amazon Echo Dot. https://www.amazon.com/dp/B01DFKC2SOGoogle Scholar
- Amazon. {n. d.} c. Amazon.Com Help : Alexa and Alexa Device FAQs. https://www.amazon.com/gp/help/customer/display.html?nodeId=201602230Google Scholar
- Apple. 2017. HomePod Reinvents Music in the Home. https://www.apple.com/newsroom/2017/06/homepod-reinvents-music-in-the-home/Google Scholar
- Mike Barnes. 2017. Alexa, Are You Listening? https://labs.mwrinfosecurity.com/blog/alexa-are-you-listeningGoogle Scholar
- Ruth Bartlett and Christine Milligan. 2015. What Is Diary Method? Bloomsbury Publishing .Google Scholar
- Eric P. S. Baumer, Jenna Burrell, Morgan G. Ames, Jed R. Brubaker, and Paul Dourish. 2015. On the Importance and Implications of Studying Technology Non -Use. interactions, Vol. 22, 2 (Feb. 2015), 52--56. Google ScholarDigital Library
- BBC. 2017. Amazon Hands over Echo 'murder' Data. BBC News (March 2017). http://www.bbc.com/news/technology-39191056Google Scholar
- BBC. 2018. Amazon Patents 'voice-Sniffing' Algorithms. BBC News (April 2018). http://www.bbc.com/news/technology-43725708Google Scholar
- Dieter Bohn. 2016. Google Home: A Speaker to Finally Take on the Amazon Echo. The Verge (May 2016). https://www.theverge.com/2016/5/18/11688376/google-home-speaker-announced-virtual-assistant-io-2016Google Scholar
- Nellie Bowles. 2018. Thermostats, Locks and Lights: Digital Tools of Domestic Abuse - The New York Times. https://www.nytimes.com/2018/06/23/technology/smart-home-devices-domestic-abuse.htmlGoogle Scholar
- Danah Boyd. 2007. Why youth (heart) social network sites: The role of networked publics in teenage social life. MacArthur foundation series on digital learning--Youth, identity, and digital media volume (2007), 119--142.Google Scholar
- A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agarwal, Stefan Saroiu, and Colin Dixon. 2011. Home Automation in the Wild: Challenges and Opportunities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM , New York, NY, USA, 2115--2124. Google ScholarDigital Library
- J. Bugeja, A. Jacobsson, and P. Davidsson. 2016. On Privacy and Security Challenges in Smart Connected Homes. In 2016 European Intelligence and Security Informatics Conference (EISIC ). 172--175.Google Scholar
- Daniel J. Butler, Justin Huang, Franziska Roesner, and Maya Cakmak. 2015. The Privacy -Utility Tradeoff for Remotely Teleoperated Robots. In Proceedings of the Tenth Annual ACM /IEEE International Conference on Human -Robot Interaction (HRI '15). ACM, New York, NY, USA, 27--34. Google ScholarDigital Library
- Rishi Chandra. 2017. Welcoming Mini and Max to the Google Home Family. https://www.blog.google/products/home/welcoming-mini-and-max-google-home-family/Google Scholar
- Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A. Kientz. 2011. Living in a Glass House: A Survey of Private Moments in the Home. In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp '11). ACM, New York, NY, USA, 41--44. Google ScholarDigital Library
- Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak N. Patel, and Julie A. Kientz. 2012. Investigating Receptiveness to Sensing and Inference in the Home Using Sensor Proxies. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12). ACM, New York, NY, USA, 61--70. Google ScholarDigital Library
- James Clawson, Jessica A. Pater, Andrew D. Miller, Elizabeth D. Mynatt, and Lena Mamykina. 2015. No Longer Wearing: Investigating the Abandonment of Personal Health -Tracking Technologies on Craigslist. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). ACM, New York, NY, USA, 647--658. Google ScholarDigital Library
- Tamara Dinev and Paul Hart. 2006. An Extended Privacy Calculus Model for E-Commerce Transactions. Info. Sys. Research, Vol. 17, 1 (March 2006), 61--80. Google ScholarDigital Library
- Daniel A. Epstein, Monica Caraway, Chuck Johnston, An Ping, James Fogarty, and Sean A. Munson. 2016. Beyond Abandonment to Next Steps : Understanding and Designing for Life After Personal Informatics Tool Use. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 1109--1113. Google ScholarDigital Library
- Adam Clark Estes. 2017. Don't Buy Anyone an Echo. https://gizmodo.com/dont-buy-anyone-an-echo-1820981732Google Scholar
- European Parliament and Council. 2016. Regulation EU 2016/679 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of such Data (General Data Protection Regulation). Official Journal of the European Union (2016), 88. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679Google Scholar
- Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. "A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 667, 13 pages. Google ScholarDigital Library
- Gartner. 2016. Gartner Says Worldwide Spending on VPA -Enabled Wireless Speakers Will Top $2 Billion by 2020. http://www.gartner.com/newsroom/id/3464317Google Scholar
- Google. {n. d.} a. Data Security & Privacy on Google Home - Google Home Help. https://support.google.com/googlehome/answer/7072285?hl=enGoogle Scholar
- Google. {n. d.} b. Google Home. https://store.google.com/product/google_homeGoogle Scholar
- Greenberg, Andy. 2017. A Hacker Turned an Amazon Echo Into a 'Wiretap '. https://www.wired.com/story/amazon-echo-wiretap-hack/Google Scholar
- Jacob Kastrenakes. 2018. Google Sold over 6 Million Home Speakers since Mid-October. https://www.theverge.com/2018/1/5/16855982/google-home-sales-figures-holidays-2017Google Scholar
- Swati Khandelwal. 2017. Bluetooth Hack Affects 20 Million Amazon Echo and Google Home Devices. The Hacker News (Nov. 2017). http://thehackernews.com/2017/11/amazon-alexa-hacking-bluetooth.htmlGoogle Scholar
- Andreas Kirmse. 2012. Privacy in Smart Homes . Technical Report. http://kirmandi.rumeln.net/data/paper-Privacy.in.Smart.Homes.pdfGoogle Scholar
- Christoffer Lambertsson. 2017. Expectations of Privacy in Voice Interaction textendashA Look at Voice Controlled Bank Transactions. Ph.D. Dissertation. KTH Royal Institute of Technology.Google Scholar
- Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 2189--2201. Google ScholarDigital Library
- Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys That Listen: A Study of Parents, Children, and Internet -Connected Toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 5197--5207. Google ScholarDigital Library
- Sarah Mennicken and Elaine M. Huang. 2012. Hacking the Natural Habitat: An In -the-Wild Study of Smart Homes, Their Development, and the People Who Live in Them. In Pervasive Computing. Springer, Berlin, Heidelberg, 143--160. Google ScholarDigital Library
- Aarthi Easwara Moorthy and Kim-Phuong L. Vu. 2013. Voice Activated Personal Assistant: Privacy Concerns in the Public Space. M.S. California State University, Long Beach, United States -- California. https://search.proquest.com/docview/1513579796/abstract/DFF130DF16554E2FPQ/1Google Scholar
- Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). Santa Clara, CA. https://www.usenix.org/system/files/conference/soups2017/soups2017-naeini.pdf Google ScholarDigital Library
- Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli Vähäkangas, Tero Hasu, Niklas Vainio, and Petri Myllymäki. 2012. Long-Term Effects of Ubiquitous Surveillance in the Home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12). ACM , New York, NY, USA, 41--50. Google ScholarDigital Library
- Ty Pendleburg. 2016. Denon HEOS and Amazon Alexa Voice Control Combine Forces. https://www.cnet.com/news/denon-heos-and-amazon-alexa-voice-control-combine-forces/Google Scholar
- Yury Pinsky. 2017. Tomato, Tomahto. Google Home Now Supports Multiple Users. https://www.blog.google/products/assistant/tomato-tomahto-google-home-now-supports-multiple-users/Google Scholar
- Martin Porcheron, Joel E. Fischer, Stuart Reeves, and Sarah Sharples. 2018. Voice Interfaces in Everyday Life. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 640, bibinfonumpages12 pages. Google ScholarDigital Library
- Franc cois Portet, Michel Vacher, Caroline Golanski, Camille Roux, and Brigitte Meillon. 2013. Design and Evaluation of a Smart Home Voice Interface for the Elderly: Acceptability and Objection Aspects. Personal and Ubiquitous Computing, Vol. 17, 1 (Jan. 2013), 127--144. Google ScholarDigital Library
- Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's Watching Me: Assessing the Effectiveness of Webcam Indicator Lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 1649--1658. Google ScholarDigital Library
- Alisha Pradhan, Kanika Mehta, and Leah Findlater. 2018. "Accessibility Came by Accident": Use of Voice-Controlled Intelligent Personal Assistants by People with Disabilities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 459, bibinfonumpages13 pages. Google ScholarDigital Library
- Elissa M. Redmiles, Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. 2017. A Summary of Survey Methodology Best Practices for Security and Privacy Researchers. (May 2017).Google Scholar
- Joel R Reidenberg, Jaspreet Bhatia, Travis D Breaux, and Thomas B Norton. 2016. Ambiguity in privacy policies and the impact of regulation. The Journal of Legal Studies, Vol. 45, S2 (2016), S163--S190.Google ScholarCross Ref
- Johnny Salda na. 2015. The Coding Manual for Qualitative Researchers. SAGE.Google Scholar
- Christine Satchell and Paul Dourish. 2009. Beyond the User: Use and Non -Use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer -Human Interaction Special Interest Group: Design: Open 24/7 (OZCHI '09). ACM, New York, NY, USA, 9--16. Google ScholarDigital Library
- F. Schaub, R. Balebako, and L. F. Cranor. 2017. Designing Effective Privacy Notices and Controls. IEEE Internet Computing, Vol. 21, 3 (May 2017), 70--77. Google ScholarDigital Library
- Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Cranor. 2015a. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security. Ottawa, 1--17. https://www.usenix.org/conference/soups2015/proceedings/presentation/schaub Google ScholarDigital Library
- F. Schaub, B. Könings, and M. Weber. 2015b. Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making. IEEE Pervasive Computing, Vol. 14, 1 (Jan. 2015), 34--43.Google ScholarDigital Library
- Andrew Shuman. 2017. Hey Cortana, Set a Reminder: Harman Kardon Invoke Voice-Activated Speaker Available October 22. https://blogs.windows.com/windowsexperience/2017/10/20/harman-kardon-invoke-voice-activated-speaker-available-october-22/Google Scholar
- Patrick Spence. 2017. Welcome to the Sonic Internet. http://blog.sonos.com/en/welcome-sonic-internet/Google Scholar
- The Verge. 2017. Amazon may give app developers access to Alexa audio recordings. https://www.theverge.com/2017/7/12/15960596/amazon-alexa-echo-speaker-audio-recordings-developers-dataGoogle Scholar
- Daphne Townsend, Frank Knoefel, and Rafik Goubran. 2011. Privacy versus Autonomy: A Tradeoff Model for Smart Home Monitoring Technologies. In 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society. 4749--4752.Google ScholarCross Ref
- Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders Versus Intrusiveness: Teens ' and Parents ' Perspectives on Home -Entryway Surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14). ACM, New York, NY, USA, 129--139. Google ScholarDigital Library
- Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Smart, Useful, Scary, Creepy : Perceptions of Online Behavioral Advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). ACM, New York, NY, USA, 4:1--4:15. Google ScholarDigital Library
- Blase Ur, Melwyn Pak Yong Ho, Stephen Brawner, Jiyun Lee, Sarah Mennicken, Noah Picard, Diane Schulze, and Michael L. Littman. 2016. Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 3227--3231. Google ScholarDigital Library
- Chris Welch. 2014. Amazon Just Surprised Everyone with a Crazy Speaker That Talks to You. https://www.theverge.com/2014/11/6/7167793/amazon-echo-speaker-announcedGoogle Scholar
- Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust Me: Doubts and Concerns Living with the Internet of Things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (DIS '16). ACM, New York, NY, USA, 427--434. Google ScholarDigital Library
- Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017. Santa Clara, CA. Google ScholarDigital Library
- Don H. Zimmerman and D. Lawrence Wieder. 1977. The Diary: "Diary -Interview Method". Urban Life; Newbury Park, Calif., Vol. 5, 4 (Jan. 1977), 479--498. http://search.proquest.com/docview/1292940175/citation/A16505C65BA645C4PQ/1Google Scholar
Index Terms
- Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers
Recommendations
“Hey, Alexa” “Hey, Siri”, “OK Google” ….” exploring teenagers’ interaction with artificial intelligence (AI)-enabled voice assistants during the COVID-19 pandemic
AbstractAI-enabled virtual voice assistants have eased user interaction and user experience. The current study aims to understand how teenagers interact and engage with voice assistants. The rationale of usage, perceptions, patterns and expectations of ...
Highlights- Qualitative insight into teenagers' engagement with AI-enabled voice assistants.
- UTAUT2 is used as the theoretical framework.
- Children have acknowledged the performance expectancy of smart speakers.
- Intrinsic motivations have a ...
A survey on privacy issues and solutions for Voice-controlled Digital Assistants
AbstractWith the development and increasing deployment of smart home devices, voice control supports comfortable end user interactions. However, potential end users may refuse to use Voice-controlled Digital Assistants (VCDAs) because of ...
Designing Voice-First Ambient Interfaces to Support Aging in Place
DIS '23: Proceedings of the 2023 ACM Designing Interactive Systems ConferenceWe focus on the stories of five older adults who became voice assistant users through our study, and with whom we speculated about future interfaces through two design probes, one for health data reporting and one for positive reminiscing. We delivered ...
Comments