{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T03:22:31Z","timestamp":1765423351609,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031153419"},{"type":"electronic","value":"9783031153426"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15342-6_37","type":"book-chapter","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T23:02:35Z","timestamp":1662418955000},"page":"485-498","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Voice Assistants: (Physical) Device Use Perceptions, Acceptance, and Privacy Concerns"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4864-3155","authenticated-orcid":false,"given":"Ali","family":"Farooq","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4779-9345","authenticated-orcid":false,"given":"Debora","family":"Jeske","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5322-6554","authenticated-orcid":false,"given":"Paul","family":"van Schaik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2496-0992","authenticated-orcid":false,"given":"Michael","family":"Moran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,6]]},"reference":[{"issue":"3","key":"37_CR1","doi-asserted-by":"publisher","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"CL Anderson","year":"2010","unstructured":"Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613\u2013643 (2010)","journal-title":"MIS Q."},{"issue":"5","key":"37_CR2","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1080\/1369118X.2020.1713845","volume":"23","author":"SR Brause","year":"2020","unstructured":"Brause, S.R., Blank, G.: Externalized domestication: smart speaker assistants, networks and domestication theory. Inf. Commun. Soc. 23(5), 751\u2013763 (2020)","journal-title":"Inf. Commun. Soc."},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Burbach, L., Halbach, P., Plettenberg, N., Nakayama, J., Ziefle, M., Valdez, A.C.: \u201cHey, Siri\u201d, \u201cOk, Google\u201d, \u201cAlexa\u201d. Acceptance-relevant factors of virtual voice-assistants. In: 2019 IEEE International Professional Communication Conference (ProComm), pp. 101\u2013111 (2019)","DOI":"10.1109\/ProComm.2019.00025"},{"issue":"2","key":"37_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/g9020018","volume":"9","author":"D Chavanne","year":"2018","unstructured":"Chavanne, D.: Generalized trust, need for cognitive closure, and the perceived acceptability of personal data collection. Games 9(2), 1\u201318 (2018)","journal-title":"Games"},{"key":"37_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-030-15742-5_8","volume-title":"Information in Contemporary Society. iConference 2019","author":"C Chhetri","year":"2019","unstructured":"Chhetri, C., Motti, V.G.: Eliciting privacy concerns for smart home devices from a user centre perpsective. In: Taylor, N., Christian-Lamb, C., Martin, M., Nardi, B. (eds.) iConference 2019. LNCS, vol. 11420, pp. 91\u2013101. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15742-5_8"},{"issue":"3","key":"37_CR6","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"6","key":"37_CR7","first-page":"1","volume":"147","author":"A De Barcelos Silva","year":"2020","unstructured":"De Barcelos Silva, A., et al.: Intelligent personal assistants: a systematic literature review. Expert Syst. Appl. 147(6), 1\u201313 (2020). Article 113193","journal-title":"Expert Syst. Appl."},{"key":"37_CR8","unstructured":"Dee, C.: Voice search: the latest statistics and trends for 2022 and beyond. Algolia, 15 November 2022 (2021). https:\/\/www.algolia.com\/blog\/product\/voice-search-the-latest-statistics-and-trends-for-2022-and-beyond\/. Accessed 18 June 2022"},{"issue":"3","key":"37_CR9","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s10796-017-9774-y","volume":"21","author":"YK Dwivedi","year":"2019","unstructured":"Dwivedi, Y.K., Rana, N.P., Jeyaraj, A., Clement, M., Williams, M.: D: Re-examining the unified theory of acceptance and use of technology (UTAUT): Towards a revised theoretical model. Inf. Syst. Front. 21(3), 719\u2013734 (2019)","journal-title":"Inf. Syst. Front."},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Easwara Moorthy, A., Vu, K.P.L.: Privacy concerns for use of voice activated personal assistant in the public space. Int. J. Hum.\u2013Comput. Interact. 31(4), 307\u2013335 (2015)","DOI":"10.1080\/10447318.2014.986642"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Farooq, A., Ndiege, J.R.A., Isoaho, J.: Factors affecting security behavior of kenyan students: an integration of protection motivation theory and theory of planned behavior. In: 2019 IEEE AFRICON, pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/AFRICON46755.2019.9133764"},{"issue":"1","key":"37_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s00779-018-1174-x","volume":"23","author":"M Ford","year":"2018","unstructured":"Ford, M., Palmer, W.: Alexa, are you listening to me? An analysis of Alexa voice service network traffic. Pers. Ubiquit. Comput. 23(1), 67\u201379 (2018). https:\/\/doi.org\/10.1007\/s00779-018-1174-x","journal-title":"Pers. Ubiquit. Comput."},{"issue":"5\/6","key":"37_CR13","first-page":"1","volume":"47","author":"NRJ Frick","year":"2021","unstructured":"Frick, N.R.J., Wilms, K.L., Brachten, F., Hetjens, T., Stieglitz, S., Ross, B.: The perceived surveillance of conversations through smart devices. Electron. Commer. Res. Appl. 47(5\/6), 1\u201316 (2021). Article ID: 101046","journal-title":"Electron. Commer. Res. Appl."},{"key":"37_CR14","unstructured":"Gallagher, C.: Ireland and Finland: similar countries with vastly different security approaches. The Irish Times, 26 February 2022. https:\/\/www.irishtimes.com\/news\/ireland\/irish-news\/ireland-and-finland-similar-countries-with-vastly-different-security-approaches-1.4812357. Accessed 18 June 2022"},{"issue":"2","key":"37_CR15","first-page":"1","volume":"44","author":"A Hong","year":"2019","unstructured":"Hong, A., Nam, C., Kim, S.: What will be the possible barriers to consumers\u2019 adoption of smart home services? Telecommunications Policy 44(2), 1\u201315 (2019). Article ID 101867","journal-title":"Telecommunications Policy"},{"key":"37_CR16","unstructured":"IMD: IMD World Digital Competitiveness Ranking 2021 (2021). https:\/\/www.imd.org\/globalassets\/wcc\/docs\/release-2021\/digital_2021.pdf. Accessed 18 June 2022"},{"key":"37_CR17","unstructured":"Insteon: Insteon. Superior Smart Lighting and Electrical Control. https:\/\/www.insteon.com. Accessed 6 Nov 2021"},{"issue":"3","key":"37_CR18","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1108\/IJWHM-02-2021-0042","volume":"15","author":"D Jeske","year":"2022","unstructured":"Jeske, D.: Remote workers\u2019 experiences with electronic monitoring during Covid-19: Implications and recommendations. Int. J. Workplace Health Manag. 15(3), 393\u2013409 (2022)","journal-title":"Int. J. Workplace Health Manag."},{"issue":"2","key":"37_CR19","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.tourman.2010.01.011","volume":"32","author":"MJ Kim","year":"2011","unstructured":"Kim, M.J., Chung, N., Lee, C.K.: The effect of perceived trust on electronic commerce: Shopping online for tourism products and services in South Korea. Tour. Manage. 32(2), 256\u2013265 (2011)","journal-title":"Tour. Manage."},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 1\u201331 (2018). Article ID: 102","DOI":"10.1145\/3274371"},{"issue":"3","key":"37_CR21","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s10796-019-09975-1","volume":"22","author":"K Lee","year":"2020","unstructured":"Lee, K., Lee, K.Y., Sheehan, L.: Hey Alexa! A Magic Spell of Social Glue?: Sharing a Smart Voice Assistant Speaker and Its Impact on Users\u2019 Perception of Group Harmony. Inf. Syst. Front. 22(3), 563\u2013583 (2020)","journal-title":"Inf. Syst. Front."},{"issue":"5","key":"37_CR22","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1108\/INTR-06-2020-0327","volume":"31","author":"KY Lee","year":"2021","unstructured":"Lee, K.Y., Sheehan, L., Lee, K., Chang, Y.: The continuation and recommendation intention of artificial intelligence-based voice assistant systems (AIVAS): the influence of personal traits. Internet Res. 31(5), 1899\u20131939 (2021)","journal-title":"Internet Res."},{"key":"37_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-030-15742-5_9","volume-title":"Information in Contemporary Society","author":"Y Liao","year":"2019","unstructured":"Liao, Y., Vitak, J., Kumar, P., Zimmer, M., Kritikos, K.: Understanding the role of privacy and trust in intelligent personal assistant adoption. In: Taylor, N.G., Christian-Lamb, C., Martin, M.H., Nardi, B. (eds.) iConference 2019. LNCS, vol. 11420, pp. 102\u2013113. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15742-5_9"},{"issue":"10","key":"37_CR24","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.chb.2019.05.009","volume":"99","author":"G McLean","year":"2019","unstructured":"McLean, G., Osei-Frimpong, K.: Hey Alexa\u2026 examine the variables influencing the use of artificial intelligent in-home voice assistants. Comput. Hum. Behav. 99(10), 28\u201337 (2019)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"37_CR25","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s11301-019-00171-8","volume":"70","author":"O Michler","year":"2019","unstructured":"Michler, O., Decker, R., Stummer, C.: To trust or not to trust smart consumer products: a literature review of trust-building factors. Manag. Rev. Q. 70(3), 391\u2013420 (2019). https:\/\/doi.org\/10.1007\/s11301-019-00171-8","journal-title":"Manag. Rev. Q."},{"issue":"5","key":"37_CR26","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MITP.2019.2958914","volume":"22","author":"D Pal","year":"2020","unstructured":"Pal, D., Arpnikanondt, C., Razzaque, M.A., Funilkul, S.: To trust or not-trust: privacy issues with voice assistants. IT Prof. 22(5), 46\u201353 (2020)","journal-title":"IT Prof."},{"issue":"8","key":"37_CR27","doi-asserted-by":"publisher","first-page":"2118","DOI":"10.1016\/j.tele.2018.07.013","volume":"35","author":"K Park","year":"2018","unstructured":"Park, K., Kwak, C., Lee, J., Ahn, J.H.: The effect of platform characteristics on the adoption of smart speakers: empirical evidence in South Korea. Telemat. Inform. 35(8), 2118\u20132132 (2018)","journal-title":"Telemat. Inform."},{"issue":"11","key":"37_CR28","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.intmar.2021.03.005","volume":"56","author":"L Lucia-Palacios","year":"2021","unstructured":"Lucia-Palacios, L., P\u00e9rez-L\u00f3pez, R.: Effects of home voice assistants\u2019 autonomy on instrusiveness and usefulness: direct, indirect, and moderating effects of interactivity. J. Interact. Mark. 56(11), 41\u201354 (2021)","journal-title":"J. Interact. Mark."},{"issue":"1","key":"37_CR29","first-page":"421","volume":"93","author":"A Pfeifle","year":"2018","unstructured":"Pfeifle, A.: Alexa, what should we do about privacy? Protecting privacy for users of voice-activated devices. Wash. Law Rev. 93(1), 421\u2013458 (2018)","journal-title":"Wash. Law Rev."},{"key":"37_CR30","unstructured":"Tan, Y.: Talking smart. The World of Chinese, 11 March 2021. https:\/\/www.theworldofchinese.com\/2021\/03\/chinese-smart-speakers-market\/. Accessed 6 Nov 2021"},{"issue":"May","key":"37_CR31","first-page":"1","volume":"149","author":"F Sharevski","year":"2021","unstructured":"Sharevski, F., Jachim, P., Treebridge, P., Li, A., Babin, A., Adadevoh, C.: Meet Malexa, Alexa\u2019s malicious twin: Malware-induced misperception through intelligent voice assistants. Int. J. Hum.-Comput. Stud. 149(May), 1\u201313 (2021). Article ID: 102604","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"37_CR32","doi-asserted-by":"crossref","unstructured":"Sohn, K., Kwon, O.: Technology acceptance theories and factors influencing artificial Intelligence-based intelligent products. Telemat. Inform. 47 (2020). Article 101324","DOI":"10.1016\/j.tele.2019.101324"},{"issue":"3","key":"37_CR33","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","journal-title":"MIS Q."},{"issue":"1","key":"37_CR34","doi-asserted-by":"publisher","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"V Venkatesh","year":"2012","unstructured":"Venkatesh, V., Thong, J.Y., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36(1), 157\u2013178 (2012)","journal-title":"MIS Q."},{"issue":"3","key":"37_CR35","first-page":"1108","volume":"18","author":"C Yan","year":"2021","unstructured":"Yan, C., Zhang, G., Ji, X., Zhang, T., Zhang, T., Xu, W.: The feasibility of injecting inaudible voice commands to voice assistants. IEEE Trans. Dependable Secure Comput. 18(3), 1108\u20131124 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."}],"container-title":["Lecture Notes in Computer Science","The Role of Digital Technologies in Shaping the Post-Pandemic World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15342-6_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T14:25:24Z","timestamp":1710339924000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15342-6_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031153419","9783031153426"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15342-6_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Newcastle upon Tyne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/i3e2022.com\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}