756
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Alexa, Is My Data Safe? The (Ir)relevance of Privacy in Smart Speakers Reviews

&
Pages 1244-1256 | Received 13 Jul 2021, Accepted 17 Mar 2022, Published online: 20 Apr 2022

References

  • Abdi, N., Ramokapane, K. M., & Such, J. M. (2019). More than smart speakers: Security and privacy perceptions of smart home personal assistants. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019) (pp. 451–466). Usenix.
  • Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). The 1st ACM Conference, Privacy in e-commerce: examining user scenarios and privacy preferences. In Proceedings of on Electronic Commerce (pp. 1–8). ACM.
  • Barnes, M. (2017). Alexa, are you listening. MWR Info Security.
  • Beneteau, E., Boone, A., Wu, Y., Kientz, J. A., Yip, J., & Hiniker, A. (2020). Parenting with alexa: exploring the introduction of smart speakers on family dynamics [Paper presentation]. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1–13). ACM. https://doi.org/10.1145/3313831.3376344
  • Buttice, V., Colombo, M. G., & Wright, M. (2017). Serial crowdfunding, social capital, and project success. Entrepreneurship Theory and Practice, 41(2), 183–207. https://doi.org/10.1111/etap.12271
  • Carlini, N., Mishra, P., Vaidya, T., Zhang, Y., Sherr, M., Shields, C. (2016). Hidden voice commands. In 25th {USENIX} Security Symposium ({USENIX} Security 16) (pp. 513–530). Usenix.
  • Cho, E., Sundar, S. S., Abdullah, S., Motalebi, N. (2020). Will deleting history make Alexa more trustworthy? Effects of privacy and content customization on user experience of smart speakers. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1–13). ACM.
  • Cho, J. (2018). Mental models and home virtual assistants (HVAS) [Paper presentation]. Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (pp. 1–6). ACM. https://doi.org/10.1145/3170427.3180286
  • Clark, J. W., Snyder, P., McCoy, D., Kanich, C. (2015). “I saw images I didn’t even know I had” understanding user perceptions of cloud storage privacy. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1641–1644). ACM.
  • Conner, K. (2020). We tested all 4 Amazon Echo wake words. Here’s what we learned about AlexaCnet. https://www.cnet.com/home/smart-home/we-tested-all-4-amazon-echo-wake-words-heres-what-we-learned-about-alexa/
  • Dubois, D. J., Kolcun, R., Mandalari, A. M., Paracha, M. T., Choffnes, D., & Haddadi, H. (2020). When speakers are all ears: Characterizing misactivations of IoT smart speakers. Proceedings on Privacy Enhancing Technologies, 2020(4), 255–276. https://doi.org/10.2478/popets-2020-0072
  • Edu, J. S., Such, J. M., & Suarez-Tangil, G. (2019). Smart home personal assistants: A security and privacy review. arXiv Preprint arXiv:1903.05593.
  • Emami-Naeini, P., Dixon, H., Agarwal, Y., & Cranor, L. F. (2019). Exploring how privacy and security factor into IoT device purchase behavior [Paper presentation]. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (pp. 1–12). ACM. https://doi.org/10.1145/3290605.3300764
  • Fellbaum, C. (2010). Wordnet. In Theory and applications of ontology: Computer applications (pp. 231–243). Springer.
  • Garg, R., & Sengupta, S. (2020). He is just like me: A study of the long-term use of smart speakers by parents and children. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4(1), 1–24. https://doi.org/10.1145/3381002
  • Guzman, A. L. (2019). Voices in and of the machine: Source orientation toward mobile virtual assistants. Computers in Human Behavior, 90, 343–350. https://doi.org/10.1016/j.chb.2018.08.009
  • Huang, Y., Obada-Obieh, B., Beznosov, K. (2020). Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1–13). ACM.
  • Hutto, C., Gilbert, E. (2014). Vader: A parsimonious rule-based model for sentiment analysis of social media text. In Proceedings of the International AAAI Conference on Web and Social Media (Vol. 8). AAAI.
  • Ikoro, V., Sharmina, M., Malik, K., & Batista-Navarro, R. (2018). Analyzing sentiments expressed on Twitter by UK energy company consumers. In 2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS) (pp. 95–98). IEEE. https://doi.org/10.1109/SNAMS.2018.8554619
  • Jatnika, D., Bijaksana, M. A., & Suryani, A. A. (2019). Word2Vec model analysis for semantic similarities in English words. Procedia Computer Science, 157, 160–167. https://doi.org/10.1016/j.procs.2019.08.153
  • Jivani, A. G. (2011). A comparative study of stemming algorithms. International Journal of Computer Applications in Technology, 2(6), 1930–1938.
  • Kim, Y. B., Kim, J. G., Kim, W., Im, J. H., Kim, T. H., Kang, S. J., & Kim, C. H. (2016). Predicting fluctuations in cryptocurrency transactions based on user comments and replies. PLoS One, 11(8), e0161197. https://doi.org/10.1371/journal.pone.0161197
  • Kowalczuk, P. (2018). Consumer acceptance of smart speakers: A mixed methods approach. Journal of Research in Interactive Marketing, 12(4), 418–431. https://doi.org/10.1108/JRIM-01-2018-0022
  • Krasniqi, X., & Hajrizi, E. (2016). Use of IoT technology to drive the automotive industry from connected to full autonomous vehicles. IFAC-PapersOnLine, 49(29), 269–274. https://doi.org/10.1016/j.ifacol.2016.11.078
  • Kwartler, T. (2017). Text mining in practice with. R John Wiley & Sons.
  • Lau, J., Zimmerman, B., Schaub, F. (2018). Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1–31. https://doi.org/10.1145/3274371
  • Lee, H. J. (2018). A ghost in the shell? Influences of AI features on product evaluations of smart speakers with customer reviews. Journal of Information Technology Services, 17(2), 191–205. https://doi.org/10.9716/KITS.2018.17.2.191
  • Lee, J. H., Seon, H. J., & Lee, H. J. (2020). Positioning of smart speakers by applying text mining to consumer reviews: Focusing on artificial intelligence factors. Knowledge Management Research, 21(1), 197–210. https://doi.org/10.15813/kmr.2020.21.1.011
  • Liao, Y., Vitak, J., Kumar, P., Zimmer, M., Kritikos, K. (2019). Understanding the role of privacy and trust in intelligent personal assistant adoption. In International Conference on Information (pp. 102–113). Springer.
  • Lim, S. (2020, June 3). Emerging platforms: Xiaodu is riding China’s smart speaker rise. https://www.thedrum.com/news/2020/06/03/emerging-platforms-xiaodu-riding-chinas-smart-speaker-rise)
  • Lugano, G. (2017). Virtual assistants and self-driving cars [Paper presentation]. 2017 15th International Conference on ITS Telecommunications (ITST) (pp. 1–5). IEEE. https://doi.org/10.1109/ITST.2017.7972192
  • Lutz, C., & Newlands, G. (2021). Privacy and smart speakers: A multi-dimensional approach. The Information Society, 37(3), 1–16. https://doi.org/10.1080/01972243.2021.1897914
  • Lynskey, D. (2019). ‘Alexa, are you invading my privacy?’ – The dark side of our voice assistants. The Guardian. https://www.theguardian.com/technology/2019/oct/09/alexa-are-you-invading-my-privacy-the-dark-side-of-our-voice-assistants
  • Madakam, S., Lake, V., Lake, V., Lake, V., et al. (2015). Internet of things (IoT): A literature review. Journal of Computer and Communications, 03(05), 164–173. https://doi.org/10.4236/jcc.2015.35021
  • Major, D., Huang, D. Y., Chetty, M., & Feamster, N. (2022). Alexa, who am I speaking to?: Understanding users’ ability to identify third-party apps on amazon Alexa. ACM Transactions on Internet Technology, 22(1), 1–22. https://doi.org/10.1145/3446389
  • Malkin, N., Deatrick, J., Tong, A., Wijesekera, P., Egelman, S., & Wagner, D. (2019). Privacy attitudes of smart speaker users. Proceedings on Privacy Enhancing Technologies, 2019(4), 250–271. https://doi.org/10.2478/popets-2019-0068
  • Manikonda, L., Deotale, A., Kambhampati, S. (2018). What’s up with privacy? User preferences and privacy concerns in intelligent personal assistants. In Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society (pp. 229–235). ACM. https://doi.org/10.48550/arXiv.1711.07543
  • Matt Day, N. D., & Turner, G. (2019). Amazon workers are listening to what you tell AlexaBloomberg. https://www.bloomberg.com/news/articles/2019-04-10/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio
  • Mccue, T. (2019). Alexa is listening all the time: Here’s how to stop it. Forbes. https://www.forbes.com/sites/tjmccue/2019/04/19/alexa-is-listening-all-the-time-heres-how-to-stop-it/?sh=7f6e91d45e2d
  • Meyer, D., Hornik, K., & Feinerer, I. (2008). Text mining infrastructure in R. Journal of Statistical Software, 25(5), 1–54. https://doi.org/10.18637/jss.v025.i05
  • Mikolov, T., Chen, K., Corrado, G., & Dean, J. (2013). Efficient estimation of word representations in vector space. arXiv Preprint arXiv:1301.3781.
  • Mikolov, T., Sutskever, I., Chen, K., Corrado, G., & Dean, J. (2013). Distributed representations of words and phrases and their compositionality. arXiv Preprint arXiv:1310.4546.
  • Miller, G. A. (1995). Wordnet: A lexical database for English. Communications of the ACM, 38(11), 39–41. https://doi.org/10.1145/219717.219748
  • Mitev, R., Pazii, A., Miettinen, M., Enck, W., & Sadeghi, A.-R. (2020). LeakyPick: IoT audio spy detector [Paper presentation]. Annual Computer Security Applications Conference (pp. 694–705). ACM. https://doi.org/10.1145/3427228.3427277
  • Morello, R., De Capua, C., Fulco, G., & Mukhopadhyay, S. C. (2017). A smart power meter to monitor energy flow in smart grids: The role of advanced sensing and IoT in the electric grid of the future. IEEE Sensors Journal, 17(23), 7828–7837. https://doi.org/10.1109/JSEN.2017.2760014
  • Naldi, M. (2019). A review of sentiment computation methods with R packages. arXiv Preprint arXiv:1901.08319.
  • Naraparaju, S. (2020). Fingerprinting voice applications on smart speakers over encrypted traffic [Paper presentation]. 2020 IEEE Conference on Communications and Network Security (CNS) (pp. 1–2). IEEE. https://doi.org/10.1109/CNS48642.2020.9162257
  • Ofcom. (2020). Online nation: 2020 Report (Tech. Rep.). Ofcom. https://www.ofcom.org.uk/_data/assets/pdf_file/0027/196407/online-nation-2020-report.pdf)
  • Park, H., Kim, J. H. (2018). Perception of virtual assistant and smart speaker: Semantic network analysis and sentiment analysis. In Proceedings of the Korean Institute of Information and Commucation Sciences Conference (pp. 213–216). KoreaScience.
  • Park, W., Choi, S., & Yi, M. (2020). Extracting principal smartness dimensions of smart speakers using topic modeling and sentiment analysis [Paper presentation]. 2020 IEEE International Conference on Big Data and Smart Computing (BigComp) (pp. 283–286). IEEE. https://doi.org/10.1109/BigComp48618.2020.00-60
  • Patel, K. K., & Patel, S. M., et al. (2016). Internet of things-IoT: Definition, characteristics, architecture, enabling technologies, application & future challenges. International Journal of Engineering Science and Computing, 6(5), 6122–6130. https://doi.org/10.4010/2016.1482.
  • Porter, M. F. (2001). Snowball: A language for stemming algorithms. Snowball.
  • Rajaraman, A., & Ullman, J. D. (2011). Mining of massive datasets. Cambridge University Press.
  • Samuel, J., Ali, G., Rahman, M., Esawi, E., & Samuel, Y. (2020). Covid-19 public sentiment insights and machine learning for tweets classification. Information, 11(6), 314. https://doi.org/10.3390/info11060314
  • Schmidt, B., Borrison, R., Cohen, A., Dix, M., Gärtler, M., & Hollender, M. (2018). Industrial virtual assistants. Challenges and opportunities [Paper presentation]. Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers (pp. 794–801). ACM.
  • Schönherr, L., Golla, M., Eisenhofer, T., Wiele, J., Kolossa, D., & Holz, T. (2020). Unacceptable, where is my privacy? Exploring accidental triggers of smart speakers. arXiv Preprint arXiv:2008.00508.
  • Shaban, H. (2018). An Amazon Echo recorded a family’s conversation, then sent it to a random person in their contacts, report says. The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2018/05/24/an-amazon-echo-recorded-a-familys-conversation-then-sent-it-to-a-random-person-in-their-contacts-report-says/
  • Shuleivitz, J. (2018). Alexa, Should we trust you? The Atlantic. https://www.theatlantic.com/magazine/archive/2018/11/alexa-how-will-you-change-us/570844/.
  • Sudharsan, B., Corcoran, P., & Ali, M. I. (2019). Smart speaker design and implementation with biometric authentication and advanced voice interaction capability. AICS, 2563, 305–316.
  • Suresh, P., Daniel, J. V., Parthasarathy, V., & Aswathy, R. (2014). A state of the art review on the internet of things (IoT) history, technology and fields of deployment [Paper presentation]. In 2014 International Conference on Science Engineering and Management Research (ICSEMR) (pp. 1–8). IEEE. https://doi.org/10.1109/ICSEMR.2014.7043637
  • Tabassum, M., Kosinski, T., Lipford, H. R. (2019). “I don’t own the data”: End user perceptions of smart home device data practices and risks. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). Usenix.
  • Tyagi, S., Agarwal, A., Maheshwari, P. (2016). A conceptual framework for IoT-based healthcare system using cloud computing. In 2016 6th International Conference-Cloud System and Big Data Engineering (Confluence) (pp. 503–507). IEEE.
  • White, R. W. (2018). Skill discovery in virtual assistants. Communications of the ACM, 61(11), 106–113. https://doi.org/10.1145/3185336
  • Zeng, E., Mare, S., & Roesner, F. (2017). End user security and privacy concerns with smart homes. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017) (pp. 65–80). Usenix.
  • Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., & Xu, W. (2017). Dolphinattack: Inaudible voice commands. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 103–117). ACM.
  • Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., & Qian, F. (2019). Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems [Paper presentation]. In 2019 IEEE Symposium on Security and Privacy (SP) (pp. 1381–1396). IEEE. https://doi.org/10.1109/SP.2019.00016
  • Zheng, S., Apthorpe, N., Chetty, M., Feamster, N. (2018). User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1–20. https://doi.org/10.1145/3274469

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.