{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T08:39:17Z","timestamp":1773909557327,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030157418","type":"print"},{"value":"9783030157425","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15742-5_9","type":"book-chapter","created":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T03:02:45Z","timestamp":1552359765000},"page":"102-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":82,"title":["Understanding the Role of Privacy and Trust in Intelligent Personal Assistant Adoption"],"prefix":"10.1007","author":[{"given":"Yuting","family":"Liao","sequence":"first","affiliation":[]},{"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[]},{"given":"Priya","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Zimmer","sequence":"additional","affiliation":[]},{"given":"Katherine","family":"Kritikos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,13]]},"reference":[{"issue":"4","key":"9_CR1","first-page":"3","volume":"8","author":"RP Bagozzi","year":"2007","unstructured":"Bagozzi, R.P.: The legacy of the technology acceptance model and a proposal for a paradigm shift. J. Assoc. Inf. Syst. 8(4), 3 (2007)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"9\u201310","key":"9_CR2","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1016\/j.jbusres.2009.02.028","volume":"63","author":"A-S Cases","year":"2010","unstructured":"Cases, A.-S., et al.: Web site spill over to email campaigns: the role of privacy, trust and shoppers\u2019 attitudes. J. Bus. Res. 63(9\u201310), 993\u2013999 (2010)","journal-title":"J. Bus. Res."},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"S15","DOI":"10.1016\/j.diin.2017.06.010","volume":"22","author":"H Chung","year":"2017","unstructured":"Chung, H., et al.: Digital forensic approaches for Amazon Alexa ecosystem. Digit. Investig. 22, S15\u2013S25 (2017)","journal-title":"Digit. Investig."},{"key":"9_CR4","unstructured":"Chung, H., Lee, S.: Intelligent virtual assistant knows your life. CoRRabs\/1803.00466 (2018)"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13, 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"5","key":"9_CR6","doi-asserted-by":"publisher","first-page":"2103","DOI":"10.1007\/s10639-016-9535-4","volume":"22","author":"T Doleck","year":"2017","unstructured":"Doleck, T., et al.: Examining the antecedents of social networking sites use among CEGEP students. Educ. Inf. Technol. 22(5), 2103\u20132123 (2017)","journal-title":"Educ. Inf. Technol."},{"key":"9_CR7","volume-title":"Ties That Bind: A Social Contracts Approach to Business Ethics","author":"T Donaldson","year":"1999","unstructured":"Donaldson, T., Dunfee, T.W.: Ties That Bind: A Social Contracts Approach to Business Ethics. Harvard Business School Press, Boston (1999)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Dorai, G., et al.: I know what you did last summer: your smart home Internet of Things and your iPhone forensically ratting you out. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, pp. 49:1\u201349:10. ACM, New York (2018)","DOI":"10.1145\/3230833.3232814"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Druga, S., et al.: \u201cHey Google is it OK if I eat you?\u201d: initial explorations in child-agent interaction. In: Proceedings of the 2017 Conference on Interaction Design and Children, pp. 595\u2013600. ACM, New York (2017)","DOI":"10.1145\/3078072.3084330"},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.giq.2015.06.003","volume":"33","author":"YK Dwivedi","year":"2016","unstructured":"Dwivedi, Y.K., et al.: A generalised adoption model for services: a cross-country comparison of mobile health (m-health). Gov. Inf. Q. 33(1), 174\u2013187 (2016)","journal-title":"Gov. Inf. Q."},{"issue":"8","key":"9_CR11","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/j.jbusres.2006.02.006","volume":"59","author":"MA Eastlick","year":"2006","unstructured":"Eastlick, M.A., et al.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59(8), 877\u2013886 (2006)","journal-title":"J. Bus. Res."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Fruchter, N., Liccardi, I.: Consumer attitudes towards privacy and security in home assistants. In: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, pp. LBW0501\u2013LBW0506. ACM, New York (2018)","DOI":"10.1145\/3170427.3188448"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Lopatovska, I., et al.: Talk to me: exploring user interactions with the Amazon Alexa. J. Librariansh. Inf. Sci., 1\u201314 (2018)","DOI":"10.1177\/0961000618759414"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Lopatovska, I., Williams, H.: Personification of the Amazon Alexa: BFF or a mindless companion. In: Proceedings of the 2018 Conference on Human Information Interaction & Retrieval, pp. 265\u2013268. ACM Press, New Brunswick (2018)","DOI":"10.1145\/3176349.3176868"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Luger, E., Sellen, A.: \u201cLike Having a Really Bad PA\u201d: the Gulf between user expectation and experience of conversational agents. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 5286\u20135297. ACM, New York (2016)","DOI":"10.1145\/2858036.2858288"},{"issue":"4","key":"9_CR16","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s10551-012-1215-8","volume":"111","author":"KE Martin","year":"2012","unstructured":"Martin, K.E.: Diminished or just different?: A factorial vignette study of privacy as a social contract. J. Bus. Ethics 111(4), 519\u2013539 (2012)","journal-title":"J. Bus. Ethics"},{"issue":"3","key":"9_CR17","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s10551-015-2565-9","volume":"137","author":"KE Martin","year":"2015","unstructured":"Martin, K.E.: Understanding privacy online: development of a social contract approach to privacy. J. Bus. Ethics 137(3), 551\u2013569 (2015)","journal-title":"J. Bus. Ethics"},{"issue":"9","key":"9_CR18","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1016\/j.jbusres.2009.02.025","volume":"63","author":"P McCole","year":"2010","unstructured":"McCole, P., et al.: Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. J. Bus. Res. 63(9), 1018\u20131024 (2010)","journal-title":"J. Bus. Res."},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.dss.2013.05.010","volume":"56","author":"C Miltgen","year":"2013","unstructured":"Miltgen, C., et al.: Determinants of end-user acceptance of biometrics: Integrating the \u201cBig 3\u201d of technology acceptance with privacy context. Decis. Support Syst. 56, 103\u2013114 (2013)","journal-title":"Decis. Support Syst."},{"issue":"4","key":"9_CR20","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s10551-008-9960-4","volume":"87","author":"AD Miyazaki","year":"2008","unstructured":"Miyazaki, A.D.: Perceived ethicality of insurance claim fraud: do higher deductibles lead to lower ethical standards? J. Bus. Ethics 87(4), 589\u2013598 (2008)","journal-title":"J. Bus. Ethics"},{"issue":"4","key":"9_CR21","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1080\/10447318.2014.986642","volume":"31","author":"AE Moorthy","year":"2015","unstructured":"Moorthy, A.E., Vu, K.-P.L.: Privacy concerns for use of voice activated personal assistant in the public space. Int. J. Hum. Comput. Interact. 31(4), 307\u2013335 (2015)","journal-title":"Int. J. Hum. Comput. Interact."},{"key":"9_CR22","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79, 119\u2013157 (2004)","journal-title":"Wash. Law Rev."},{"key":"9_CR23","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, Stanford (2010)"},{"key":"9_CR24","unstructured":"Olmstead, K.: Nearly half of Americans use digital voice assistants, mostly on their smartphones (2017). \n                      http:\/\/www.pewresearch.org\/fact-tank\/2017\/12\/12\/nearly-half-of-americans-use-digital-voice-assistants-mostly-on-their-smartphones\/"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Porcheron, M., et al.: \u201cDo Animals Have Accents?\u201d: talking with agents in multi-party conversation. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 207\u2013219. ACM, New York (2017)","DOI":"10.1145\/2998181.2998298"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Pradhan, A., et al.: \u201cAccessibility came by accident\u201d: use of voice-controlled intelligent personal assistants by people with disabilities. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 459:1\u2013459:13. ACM, New York (2018)","DOI":"10.1145\/3173574.3174033"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Purington, A., et al.: \u201cAlexa is my new BFF\u201d: social roles, user satisfaction, and personification of the Amazon echo. In: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2853\u20132859. ACM, New York (2017)","DOI":"10.1145\/3027063.3053246"},{"key":"9_CR28","unstructured":"Shoot, B.: St. Louis University Installs Amazon Echo Dots Campus-Wide (2018). \n                      http:\/\/fortune.com\/2018\/08\/15\/amazon-alexa-echo-back-to-school-dorm-room\/"},{"key":"9_CR29","unstructured":"Stutzman, F., Hartzog, W.: Obscurity by design: an approach to building privacy into social media. In: Workshop on Reconciling Privacy with Social Media. ACM (2012)"},{"issue":"1","key":"9_CR30","doi-asserted-by":"publisher","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"V Venkatesh","year":"2012","unstructured":"Venkatesh, V., et al.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36(1), 157\u2013178 (2012)","journal-title":"MIS Q."},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., et al.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425\u2013478 (2003)","journal-title":"MIS Q."},{"key":"9_CR32","volume-title":"Handbook of Media Use and Well-Being","author":"J Vitak","year":"2016","unstructured":"Vitak, J.: A digital path to happiness? In: Reinecke, L., Oliver, M.B. (eds.) Handbook of Media Use and Well-Being. Routledge, New York (2016)"},{"key":"9_CR33","unstructured":"Welch, C.: Amazon made a special version of Alexa for hotels that put Echo speakers in their rooms (2018). \n                      https:\/\/www.theverge.com\/2018\/6\/19\/17476688\/amazon-alexa-for-hospitality-announced-hotels-echo"},{"key":"9_CR34","unstructured":"Xu, H., et al.: Measuring mobile users\u2019 concerns for information privacy. In: Proceedings of the International Conference on Information Systems 2012 on Digital Innovation in the Service Economy, pp. 1\u201316 (2012)"},{"key":"9_CR35","unstructured":"Zeng, E., et al.: End user security and privacy concerns with smart homes. In: Symposium on Usable Privacy and Security (SOUPS 2017), pp. 65\u201380 (2017)"}],"container-title":["Lecture Notes in Computer Science","Information in Contemporary Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15742-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T08:40:11Z","timestamp":1558341611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15742-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030157418","9783030157425"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15742-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington, DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/the-iconference\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"133","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"44","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"33","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"88 short papers were submitted in addition to the 133 full papers.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}