Abstract
Intelligent voice assistants (IVA) are on the rise: They are implemented into new smart mobile and stationary devices such as smartphones, smart watches, tablets, cars, and smart speakers. Being surrounded by always-on microphones, however, can be perceived as a threat to one’s privacy since audio recordings are saved in the cloud and processed for e.g., marketing purposes. However, only a minority of users adapts their user behavior such as self-disclosure according to their privacy concerns. Research has attempted to find answers for this paradoxical outcome through concepts such as the privacy calculus or the privacy cynicism. Moreover, literature revealed that a large group of users lacks privacy awareness and privacy literacy preventing them from engaging in privacy-preserving behavior. Since previous studies in the scope of IVAs focused primarily on interviews or cross-sectional studies testing models predicting user behavior, desiderata for elevating future research are presented. This leads to a more user-centric approach incorporating e.g., a motivational-affective perspective and investigation of causalities.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alepis, E., Patsakis, C.: Monkey says, monkey does: security and privacy on voice assistants. IEEE Access 5, 17841–17851 (2017). https://doi.org/10.1109/access.2017.2747626
Balakrishnan, J., Dwivedi, Y.K., Hughes, L., Boy, F.: Enablers and inhibitors of ai-powered voice assistants: a dual-factor approach by integrating the status quo bias and technology acceptance model. Inf. Syst. Front. , 1–22 (2021). https://doi.org/10.1007/s10796-021-10203-y
Barnes, S.B.: A privacy paradox: social networking in the United States. First Mon. 11(9), 5 (2006). https://doi.org/10.5210/fm.v11i9.1394
Bonilla, K., Martin-Hammond, A.: Older Adults’ Perceptions of Intelligent Voice Assistant Privacy, Transparency, and Online Privacy Guidelines (2020)
Buchanan, T., Paine, C., Joinson, A.N., Reips, U.-D.: Development of measures of online privacy concern and protection for use on the Internet. J. Am. Soc. Inform. Sci. Technol. 58(2), 157–165 (2007). https://doi.org/10.1002/asi.20459
Burgoon, J.K., Parrott, R., Le Poire, B.A., Kelley, D.L., Walther, J.B., Perry, D.: Maintaining and restoring privacy through communication in different types of relationships. J. Soc. Pers. Relat. 6(2), 131–158 (1989)
Business Wire (2020). https://www.businesswire.com/news/home/20200427005609/en/Juniper-Research-Number-Voice-Assistant-Devices-Overtake
Buteau, E., Lee, J.: Hey Alexa, why do we use voice assistants? the driving factors of voice assistant technology use. Commun. Res. Rep. 38(5), 336–345 (2021)
Carolus, A., Binder, J.F., Muench, R., Schmidt, C., Schneider, F., Buglass, S.L.: Smartphones as digital companions: characterizing the relationship between users and their phones. New Media Soc. 21(4), 914–938 (2019)
Carolus, A., Muench, R., Schmidt, C., Schneider, F.: Impertinent mobiles-effects of politeness and impoliteness in human-smartphone interaction. Comput. Hum. Behav. 93, 290–300 (2019)
Carolus, A., Wienrich, C., Toerke, A., Friedel, T., Schwietering, C.: ‘Alexa, I feel for you!’-observers’ empathetic reactions towards a conversational agent. Front. Comput. Sci. 3, 46 (2021)
Choi, H., Park, J., Jung, Y.: The role of privacy fatigue in online privacy behavior. Comput. Hum. Behav. 81, 42–51 (2018)
Conti, G., Sobiesk, E.: An honest man has nothing to fear: user perceptions on web-based information disclosure. In: Proceedings of the 3rd symposium on Usable privacy and security, Pittsburgh, Pennsylvania, USA (2007). https://doi.org/10.1145/1280680.1280695
Courtney, M.: Careless talk costs privacy [digital assistants]. Eng. Technol. 12(10), 50–53 (2017). https://doi.org/10.1049/et.2017.1005
Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 319–340 (1989)
Dienlin, T.: The privacy process model. Medien und Privatheit, 105–122 (2014)
Dienlin, T., Metzger, M.J.: An extended privacy calculus model for SNSS: analyzing self-disclosure and self-withdrawal in a representative U.S. sample. J. Comput.-Mediated Commun. 21(5), 368–383 (2016). https://doi.org/10.1111/jcc4.12163
Dienlin, T., Trepte, S.: Is the privacy paradox a relic of the past? an in-depth analysis of privacy attitudes and privacy behaviors. Eur. J. Soc. Psychol. 45(3), 285–297 (2015). https://doi.org/10.1002/ejsp.2049
Easwara Moorthy, A., Vu, K.-P.L.: Privacy concerns for use of voice activated personal assistant in the public space. Int. J. Hum. Comput. Interact. 31(4), 307–335 (2014). https://doi.org/10.1080/10447318.2014.986642
Edu, J.S., Such, J.M., Suarez-Tangil, G.: Smart home personal assistants. ACM Comput. Surv. 53(6), 1–36 (2021). https://doi.org/10.1145/3412383
Festinger, L.: A Theory of Cognitive Dissonance, vol. 2. Stanford University Press (1962)
Fruchter, N., Liccardi, I.: (2018, 2018/4//). Consumer attitudes towards privacy and security in home assistants. In: Conference on Human Factors in Computing Systems – Proceedings (2018)
Hagendorff, T.: Post-Privacy oder der Verlust der Informationskontrolle. In: Behrendt, H., Loh, W., Matzner, T., Misselhorn, C. (eds.) Privatsphäre 4.0, pp. 91–106. J.B. Metzler, Stuttgart (2019). https://doi.org/10.1007/978-3-476-04860-8_6
Hargittai, E., Marwick, A.: What can I really do? explaining the privacy paradox with online apathy. Int. J. Commun. 10, 21 (2016)
Harrison McKnight, D., Choudhury, V., Kacmar, C.: The impact of initial consumer trust on intentions to transact with a web site: a trust building model. J. Strateg. Inf. Syst. 11(3–4), 297–323 (2002). https://doi.org/10.1016/s0963-8687(02)00020-3
Hoffmann, C. P., Lutz, C., Ranzini, G.: Privacy cynicism: a new approach to the privacy paradox. cyberpsychology: J. Psychosoc. Res. Cyberspace, 10(4) (2016). https://doi.org/10.5817/cp2016-4-7
Kahneman, D., Tversky, A.: prospect theory: an analysis of decision under risk. Econometrica 47(2), 263–292 (1979). https://doi.org/10.1142/9789814417358_0006
Krasnova, H., Veltri, N.F., Günther, O.: Self-disclosure and privacy calculus on social networking sites: the role of culture. Bus. Inf. Syst. Eng. 4(3), 127–135 (2012). https://doi.org/10.1007/s12599-012-0216-6
Kumar, D., et al.: Emerging threats in Internet of Things voice services. IEEE Secur. Priv. 17(4), 18–24 (2019). https://doi.org/10.1109/msec.2019.2910013
Lau, J., Zimmerman, B., Schaub, F.: Alexa, Are you listening? In: Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), pp. 1–31. (2018) https://doi.org/10.1145/3274371
Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977). https://doi.org/10.1111/j.1540-4560.1977.tb01880.x
Lee, H., Park, H., Kim, J.: Why do people share their context information on social network services? a qualitative study and an experimental study on users’ behavior of balancing perceived benefit and risk. Int. J. Hum Comput Stud. 71(9), 862–877 (2013). https://doi.org/10.1016/j.ijhcs.2013.01.005
Liao, Y., Vitak, J., Kumar, P., Zimmer, M., Kritikos, K.: Understanding the role of privacy and trust in intelligent personal assistant adoption. In: Taylor, N.G., Christian-Lamb, C., Martin, M.H., Nardi, B. (eds.) iConference 2019. LNCS, vol. 11420, pp. 102–113. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-15742-5_9
Lutz, C., Newlands, G.: Privacy and smart speakers: a multi-dimensional approach. Information Society 37(3), 147–162 (2021). https://doi.org/10.1080/01972243.2021.1897914/SUPPL_FILE/UTIS_A_1897914_SM1205.DOCX
Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004). https://doi.org/10.1287/isre.1040.0032
Miltgen, C.L., Popovič, A., Oliveira, T.: Determinants of end-user acceptance of biometrics: integrating the “Big 3” of technology acceptance with privacy context. Decis. Support Syst. 56, 103–114 (2013)
Mori, M., MacDorman, K.F., Kageki, N.: The uncanny valley [from the field]. IEEE Robot. Autom. Mag. 19(2), 98–100 (2012)
O’Brien, N., Sohail, M.: Infrequent use of AI-enabled personal assistants through the lens of cognitive dissonance theory. In: Stephanidis, C., Antona, M., Ntoa, S. (eds.) HCII 2020. CCIS, vol. 1293, pp. 342–350. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60700-5_44
Pal, D., Arpnikanondt, C., Razzaque, M.A.: Personal information disclosure via voice assistants: the personalization–privacy paradox. SN Comput. Sci. 1(5), 1–17 (2020). https://doi.org/10.1007/s42979-020-00287-9
Pal, D., Arpnikanondt, C., Razzaque, M.A., Funilkul, S.: To trust or not-trust: privacy issues with voice assistants. IT Prof. 22(5), 46–53 (2020). https://doi.org/10.1109/mitp.2019.2958914
Petronio, S.: Communication privacy management theory: what do we know about family privacy regulation? J. Fam. Theory Rev. 2(3), 175–196 (2010). https://doi.org/10.1111/j.1756-2589.2010.00052.x
Pradhan, A., Mehta, K., Findlater, L.: Accessibility came by accident use of voice-controlled intelligent personal assistants by people with disabilities. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1-13 (2018)
Pridmore, J., Zimmer, M., Vitak, J., Mols, A., Trottier, D.: Intelligent personal assistants and the intercultural negotiations of dataveillance in platformed households. epublications.marquette.edu (2019). https://epublications.marquette.edu/comp_fac/33/
Reeves, B., Nass, C.: The media equation: how people treat computers, television, and new media like real people. Cambridge, UK 10, 236605 (1996)
Robinson, L., et al.: Digital inequalities and why they matter. Inf. Commun. Soc. 18(5), 569–582 (2015). https://doi.org/10.1080/1369118x.2015.1012532
Simon, H.A.: Rational decision making in business organizations. Am. Econ. Rev. 69(4), 493–513 (1979). https://doi.org/10.2307/1808698
Smith, D., Xu.: Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989–1015 (2011). https://doi.org/10.2307/41409970
Sun, Y., Wang, N., Shen, X.-L., Zhang, J. X.: Location information disclosure in location-based social network services: privacy calculus, benefit structure, and gender differences. Comput. Hum. Behav. 52, 278–292 (2015). https://doi.org/10.1016/j.chb.2015.06.006
Turow, J., Hennessy, M., Draper, N.: The tradeoff fallacy: how marketers are misrepresenting American consumers and opening them up to exploitation. Available at SSRN 2820060 (2015)
Vimalkumar, M., Sharma, S.K., Singh, J.B., Dwivedi, Y.K.: ‘Okay google, what about my privacy?’: user’s privacy perceptions and acceptance of voice based digital assistants. Comput. Hum. Behav. 120, 106763 (2021). https://doi.org/10.1016/j.chb.2021.106763
Warren, T.: Amazon explains how Alexa recorded a private conversation and sent it to another user (2018). https://www.theverge.com/2018/5/24/17391898/amazon-alexa-private-conversation-recording-explanation
Westin, A.F.: Privacy and Freedom. Atheneum (1967)
Young, A.L., Quan-Haase, A.: Privacy protection strategies on facebook. Inf. Commun. Soc. 16(4), 479–500 (2013). https://doi.org/10.1080/1369118x.2013.777757
Zeng, E., Mare, S., Roesner, F.: End user security and privacy concerns with smart homes. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 65–80 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Augustin, Y., Carolus, A., Wienrich, C. (2022). Privacy of AI-Based Voice Assistants: Understanding the Users’ Perspective. In: Salvendy, G., Wei, J. (eds) Design, Operation and Evaluation of Mobile Communications. HCII 2022. Lecture Notes in Computer Science, vol 13337. Springer, Cham. https://doi.org/10.1007/978-3-031-05014-5_26
Download citation
DOI: https://doi.org/10.1007/978-3-031-05014-5_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-05013-8
Online ISBN: 978-3-031-05014-5
eBook Packages: Computer ScienceComputer Science (R0)