{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:37:18Z","timestamp":1760524638281,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":47,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819751006"},{"type":"electronic","value":"9789819751013"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5101-3_8","type":"book-chapter","created":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T18:01:46Z","timestamp":1720980106000},"page":"143-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Understanding Privacy in Smart Speakers: A Narrative Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9517-2970","authenticated-orcid":false,"given":"Abdulrhman","family":"Alorini","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0200-617X","authenticated-orcid":false,"given":"Abdullah Bin","family":"Sawad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8146-8032","authenticated-orcid":false,"given":"Sultan","family":"Alharbi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8722-6595","authenticated-orcid":false,"given":"Kiran","family":"Ijaz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7745-9667","authenticated-orcid":false,"given":"Mukesh","family":"Prasad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8328-5317","authenticated-orcid":false,"given":"A. Baki","family":"Kocaballi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,15]]},"reference":[{"issue":"1","key":"8_CR1","doi-asserted-by":"publisher","first-page":"205395171989174","DOI":"10.1177\/2053951719891748","volume":"7","author":"J Pridmore","year":"2020","unstructured":"Pridmore, J., Mols, A.: Personal choices and situated data: privacy negotiations and the acceptance of household intelligent personal assistants. Big Data Soc. 7(1), 2053951719891748 (2020)","journal-title":"Big Data Soc."},{"key":"8_CR2","unstructured":"Statista Consumer Market Insights. Revenue of the smart speakers industry Worldwide 2018\u20132028 (in million units) [Graph]. In Statista. Retrieved August 24, 2023. https:\/\/www.statista.com\/forecasts\/1367982\/smart-speaker-market-volume-worldwide"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"17841","DOI":"10.1109\/ACCESS.2017.2747626","volume":"5","author":"E Alepis","year":"2017","unstructured":"Alepis, E., Patsakis, C.: Monkey says, monkey does: security and privacy on voice assistants. IEEE Access 5, 17841\u201317851 (2017)","journal-title":"IEEE Access"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Porcheron, M., Fischer, J.E., Sharples, S.: Do Animals Have Accents? Talking with Agents in Multi-Party Conversation. City (2017)","DOI":"10.1145\/2998181.2998298"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Liao, Y., Vitak, J., Kumar, P., Zimmer, M., Kritikos, K.: Understanding the Role of Privacy and Trust in Intelligent Personal Assistant Adoption. Springer, City (2019)","DOI":"10.1007\/978-3-030-15742-5_9"},{"issue":"6221","key":"8_CR6","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013514 (2015)","journal-title":"Science"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Ramokapane, K.M., Misra, G., Such, J., Preibusch, S.: Truth or dare: Understanding and Predicting How Users Lie and Provide Untruthful Data Online. City (2021)","DOI":"10.1145\/3411764.3445625"},{"key":"8_CR8","volume-title":"The right to privacy","author":"S Warren","year":"1989","unstructured":"Warren, S., Brandeis, L.: The right to privacy. Columbia University Press, City (1989)"},{"key":"8_CR9","volume-title":"Privacy, Social Network Sites, and Social Relations","author":"DJ Houghton","year":"2014","unstructured":"Houghton, D.J., Joinson, A.N.: Privacy, Social Network Sites, and Social Relations. Routledge, City (2014)"},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/572277.572278","volume":"31","author":"HT Tavani","year":"2001","unstructured":"Tavani, H.T., Moor, J.H.: Privacy protection, control of information, and privacy-enhancing technologies. ACM SIGCAS Comput. Soc. 31(1), 6\u201311 (2001)","journal-title":"ACM SIGCAS Comput. Soc."},{"key":"8_CR11","unstructured":"Moor, J.H.: The ethics of privacy protection (1991)"},{"key":"8_CR12","doi-asserted-by":"publisher","DOI":"10.4324\/9781315246024-5","volume-title":"A Definition of Privacy","author":"RB Parker","year":"2017","unstructured":"Parker, R.B.: A Definition of Privacy. Routledge, City (2017)"},{"issue":"1","key":"8_CR13","first-page":"166","volume":"25","author":"AF Westin","year":"1968","unstructured":"Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1), 166 (1968)","journal-title":"Wash. Lee Law Rev."},{"issue":"4","key":"8_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3369807","volume":"3","author":"M Tabassum","year":"2019","unstructured":"Tabassum, M., et al.: Investigating users\u2019 preferences and expectations for always-listening voice assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4), 1\u201323 (2019)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 1\u201331 (2018)","DOI":"10.1145\/3274371"},{"issue":"4","key":"8_CR16","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1177\/0961000618759414","volume":"51","author":"I Lopatovska","year":"2019","unstructured":"Lopatovska, I., et al.: Talk to me: exploring user interactions with the Amazon Alexa. J. Librariansh. Inf. Sci. 51(4), 984\u2013997 (2019)","journal-title":"J. Librariansh. Inf. Sci."},{"issue":"1","key":"8_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.274","volume":"6","author":"G Maccario","year":"2023","unstructured":"Maccario, G., Naldi, M.: Privacy in smart speakers: a systematic literature review. Secur. Priv. 6(1), e274 (2023)","journal-title":"Secur. Priv."},{"issue":"7","key":"8_CR18","doi-asserted-by":"publisher","first-page":"2312","DOI":"10.3390\/s21072312","volume":"21","author":"T Bolton","year":"2021","unstructured":"Bolton, T., Dargahi, T., Belguith, S., Al-Rakhami, M.S., Sodhro, A.H.: On the security and privacy challenges of virtual assistants. Sensors 21(7), 2312 (2021)","journal-title":"Sensors"},{"issue":"1","key":"8_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Comput."},{"issue":"2","key":"8_CR20","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1108\/10662240910952346","volume":"19","author":"M Karyda","year":"2009","unstructured":"Karyda, M., Gritzalis, S., Park, J.H., Kokolakis, S.: Privacy and fair information practices in ubiquitous environments: research challenges and future directions. Internet Res. 19(2), 194\u2013208 (2009)","journal-title":"Internet Res."},{"issue":"4","key":"8_CR21","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.techsoc.2012.10.002","volume":"34","author":"V Kumpu","year":"2012","unstructured":"Kumpu, V.: Privacy and the emergence of the \u201cubiquitous computing society\u201d: the struggle over the meaning of \u201cprivacy\u201d in the case of the Apple location tracking scandal. Technol. Soc. 34(4), 303\u2013310 (2012)","journal-title":"Technol. Soc."},{"issue":"3","key":"8_CR22","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.tele.2005.07.005","volume":"23","author":"S Dritsas","year":"2006","unstructured":"Dritsas, S., Gritzalis, D., Lambrinoudakis, C.: Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics Inform. 23(3), 196\u2013210 (2006)","journal-title":"Telematics Inform."},{"issue":"3","key":"8_CR23","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.clsr.2013.03.004","volume":"29","author":"K Michael","year":"2013","unstructured":"Michael, K., Clarke, R.: Location and tracking of mobile devices: \u00dcberveillance stalks the streets. Comput. Law Secur. Rev. 29(3), 216\u2013228 (2013)","journal-title":"Comput. Law Secur. Rev."},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Barkhuus, L.: The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI. City (2012)","DOI":"10.1145\/2207676.2207727"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/s00779-007-0163-2","volume":"12","author":"JT Lehikoinen","year":"2008","unstructured":"Lehikoinen, J.T., Lehikoinen, J., Huuskonen, P.: Understanding privacy regulation in ubicomp interactions. Pers. Ubiquit. Comput. 12, 543\u2013553 (2008)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"1","key":"8_CR26","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.tele.2005.12.005","volume":"24","author":"M Friedewald","year":"2007","unstructured":"Friedewald, M., Vildjiounaite, E., Punie, Y., Wright, D.: Privacy, identity and security in ambient intelligence: a scenario analysis. Telematics Inform. 24(1), 15\u201329 (2007)","journal-title":"Telematics Inform."},{"issue":"1","key":"8_CR27","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MPRV.2015.5","volume":"14","author":"F Schaub","year":"2015","unstructured":"Schaub, F., K\u00f6nings, B., Weber, M.: Context-adaptive privacy: leveraging context awareness to support privacy decision making. IEEE Pervasive Comput. 14(1), 34\u201343 (2015)","journal-title":"IEEE Pervasive Comput."},{"issue":"4","key":"8_CR28","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.clsr.2010.05.007","volume":"26","author":"D Wright","year":"2010","unstructured":"Wright, D., et al.: Sorting out smart surveillance. Comput. Law Secur. Rev. 26(4), 343\u2013354 (2010)","journal-title":"Comput. Law Secur. Rev."},{"issue":"3","key":"8_CR29","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1047671.1047705","volume":"48","author":"S Lahlou","year":"2005","unstructured":"Lahlou, S., Langheinrich, M., R\u00f6cker, C.: Privacy and trust issues with invisible computers. Commun. ACM 48(3), 59\u201360 (2005)","journal-title":"Commun. ACM"},{"key":"8_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/ICMU.2014.6799059","volume-title":"Privacy protection in WiFi-based location estimation","author":"Z Peng","year":"2014","unstructured":"Peng, Z., Kaji, K., Kawaguchi, N.: Privacy protection in WiFi-based location estimation. IEEE, City (2014)"},{"key":"8_CR31","volume-title":"Mobile sensor cloud computing: controlling and securing data processing over smart environment through mobile sensor cloud computing (MSCC)","author":"R Kumar","year":"2013","unstructured":"Kumar, R., Rajalakshmi, S.: Mobile sensor cloud computing: controlling and securing data processing over smart environment through mobile sensor cloud computing (MSCC). IEEE, City (2013)"},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/s00779-004-0305-8","volume":"8","author":"MS Ackerman","year":"2004","unstructured":"Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Pers. Ubiquit. Comput. 8, 430\u2013439 (2004)","journal-title":"Pers. Ubiquit. Comput."},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Pallapa, G., Roy, N., Das, S.K.: A scheme for quantizing privacy in context-aware ubiquitous computing (2008)","DOI":"10.1049\/cp:20081139"},{"key":"8_CR34","unstructured":"Altman, I.: The environment and social behavior: privacy, personal space, territory, and crowding (1975)"},{"issue":"3","key":"8_CR35","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.istr.2009.10.002","volume":"14","author":"NA Malik","year":"2009","unstructured":"Malik, N.A., Tomlinson, A.: Privacy and consent in pervasive networks. Inf. Secur. Tech. Rep. 14(3), 138\u2013142 (2009)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"8_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/CENTRIC.2009.20","volume-title":"Ad hoc privacy management in ubiquitous computing environments","author":"C Bunnig","year":"2009","unstructured":"Bunnig, C., Cap, C.H.: Ad hoc privacy management in ubiquitous computing environments. IEEE, City (2009)"},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. City (2004)","DOI":"10.1145\/990064.990087"},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Huang, Y., Obada-Obieh, B., Beznosov, K.: Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks. City (2020)","DOI":"10.1145\/3313831.3376529"},{"issue":"1\u20132","key":"8_CR39","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ijhcs.2005.04.008","volume":"63","author":"BA Price","year":"2005","unstructured":"Price, B.A., Adam, K., Nuseibeh, B.: Keeping ubiquitous computing to yourself: a practical model for user control of privacy. Int. J. Hum. Comput. Stud. 63(1\u20132), 228\u2013253 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"8_CR40","doi-asserted-by":"crossref","unstructured":"Meng, N., Kek\u00fcll\u00fco\u011flu, D., Vaniea, K.: Owning and sharing: privacy perceptions of smart speaker users. Proc. ACM Hum. Comput. Interact. 5(CSCW1), 1\u201329 (2021)","DOI":"10.1145\/3449119"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Ur, B., Leon, P.G., Cranor, L.F., Shay, R., Wang, Y.: Smart, useful, scary, creepy: perceptions of online behavioral advertising. City (2012)","DOI":"10.1145\/2335356.2335362"},{"key":"8_CR42","unstructured":"Abdi, N., Ramokapane, K.M., Such, J.M.: More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. City (2019)"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Manikonda, L., Deotale, A., Kambhampati, S.: What\u2019s up with privacy? User preferences and privacy concerns in intelligent personal assistants. City (2018)","DOI":"10.1145\/3278721.3278773"},{"issue":"5","key":"8_CR44","first-page":"6","volume":"65","author":"H Tuttle","year":"2018","unstructured":"Tuttle, H.: Facebook scandal raises data privacy concerns. Risk Manage. 65(5), 6\u20139 (2018)","journal-title":"Risk Manage."},{"key":"8_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102498","volume":"143","author":"J Hinds","year":"2020","unstructured":"Hinds, J., Williams, E.J., Joinson, A.N.: \u201cIt wouldn\u2019t happen to me\u201d: privacy concerns and perspectives following the Cambridge analytica scandal. Int. J. Hum. Comput. Stud. 143, 102498 (2020)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"8_CR46","unstructured":"Chung, H., Lee, S.: Intelligent virtual assistant knows your life. arXiv preprint arXiv:1803.00466 (2018)"},{"issue":"5","key":"8_CR47","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.pmcj.2011.06.007","volume":"8","author":"F Zhu","year":"2012","unstructured":"Zhu, F., Carpenter, S., Kulkarni, A.: Understanding identity exposure in pervasive computing environments. Pervasive Mob. Comput. 8(5), 777\u2013794 (2012)","journal-title":"Pervasive Mob. Comput."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5101-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T18:02:58Z","timestamp":1720980178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5101-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819751006","9789819751013"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5101-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acisp24.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}