{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T21:21:01Z","timestamp":1770326461889,"version":"3.49.0"},"reference-count":67,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2023,4,3]]},"DOI":"10.1080\/10447318.2022.2058780","type":"journal-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T07:15:16Z","timestamp":1650438916000},"page":"1244-1256","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":12,"title":["Alexa, Is My Data Safe? The (Ir)relevance of Privacy in Smart Speakers Reviews"],"prefix":"10.1080","volume":"39","author":[{"given":"Guglielmo","family":"Maccario","sequence":"first","affiliation":[{"name":"Department of Economics, UNINT University, Rome, Italy"}]},{"given":"Maurizio","family":"Naldi","sequence":"additional","affiliation":[{"name":"Department of Law, Economics, Politics, and Modern Languages, LUMSA University, Rome, Italy"}]}],"member":"301","published-online":{"date-parts":[[2022,4,20]]},"reference":[{"key":"CIT0001","first-page":"451","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)","author":"Abdi N.","year":"2019"},{"key":"CIT0002","volume-title":"The 1st ACM Conference","author":"Ackerman M. S.","year":"1999"},{"key":"CIT0003","unstructured":"Barnes, M. (2017). Alexa, are you listening. MWR Info Security."},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"Beneteau, E., Boone, A., Wu, Y., Kientz, J. A., Yip, J. & Hiniker, A. (2020). Parenting with alexa: exploring the introduction of smart speakers on family dynamics [Paper presentation]. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1\u201313). ACM. https:\/\/doi.org\/10.1145\/3313831.3376344","DOI":"10.1145\/3313831.3376344"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1111\/etap.12271"},{"key":"CIT0006","volume-title":"25th {USENIX","author":"Carlini N.","year":"2016"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376551"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3180286"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702535"},{"key":"CIT0010","unstructured":"Conner, K. (2020). We tested all 4 Amazon Echo wake words. Here\u2019s what we learned about AlexaCnet. https:\/\/www.cnet.com\/home\/smart-home\/we-tested-all-4-amazon-echo-wake-words-heres-what-we-learned-about-alexa\/"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0072"},{"key":"CIT0012","author":"Edu J. S.","year":"2019","journal-title":"arXiv Preprint arXiv:1903.05593"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-8847-5_10"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/3381002"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.08.009"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14550"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/SNAMS.2018.8554619"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.08.153"},{"issue":"6","key":"CIT0021","first-page":"1930","volume":"2","author":"Jivani A. G.","year":"2011","journal-title":"International Journal of Computer Applications in Technology"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0161197"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1108\/JRIM-01-2018-0022"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.11.078"},{"key":"CIT0025","doi-asserted-by":"crossref","unstructured":"Kwartler, T. (2017). Text mining in practice with. R John Wiley & Sons.","DOI":"10.1002\/9781119282105"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"issue":"2","key":"CIT0027","first-page":"191","volume":"17","author":"Lee H. J.","year":"2018","journal-title":"Journal of Information Technology Services,"},{"issue":"1","key":"CIT0028","first-page":"197","volume":"21","author":"Lee J. H.","year":"2020","journal-title":"Knowledge Management Research,"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15742-5_9"},{"key":"CIT0030","unstructured":"Lim, S. (2020, June 3). Emerging platforms: Xiaodu is riding China\u2019s smart speaker rise. https:\/\/www.thedrum.com\/news\/2020\/06\/03\/emerging-platforms-xiaodu-riding-chinas-smart-speaker-rise)"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2017.7972192"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2021.1897914"},{"key":"CIT0033","unstructured":"Lynskey, D. (2019). \u2018Alexa, are you invading my privacy?\u2019 \u2013 The dark side of our voice assistants. The Guardian. https:\/\/www.theguardian.com\/technology\/2019\/oct\/09\/alexa-are-you-invading-my-privacy-the-dark-side-of-our-voice-assistants"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2015.35021"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1145\/3446389"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278773"},{"key":"CIT0038","unstructured":"Matt Day, N. D. & Turner, G. (2019). Amazon workers are listening to what you tell AlexaBloomberg. https:\/\/www.bloomberg.com\/news\/articles\/2019-04-10\/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio"},{"key":"CIT0039","unstructured":"Mccue, T. (2019). Alexa is listening all the time: Here\u2019s how to stop it. Forbes. https:\/\/www.forbes.com\/sites\/tjmccue\/2019\/04\/19\/alexa-is-listening-all-the-time-heres-how-to-stop-it\/?sh=7f6e91d45e2d"},{"issue":"5","key":"CIT0040","first-page":"1","volume":"25","author":"Meyer D.","year":"2008","journal-title":"Journal of Statistical Software,"},{"key":"CIT0041","volume-title":"arXiv Preprint arXiv:1301.3781","author":"Mikolov T.","year":"2013"},{"key":"CIT0042","volume-title":"arXiv Preprint arXiv:1310.4546","author":"Mikolov T.","year":"2013"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"CIT0044","doi-asserted-by":"crossref","unstructured":"Mitev, R., Pazii, A., Miettinen, M., Enck, W. & Sadeghi, A.R. (2020). LeakyPick: IoT audio spy detector [Paper presentation]. Annual Computer Security Applications Conference (pp. 694\u2013705). ACM. https:\/\/doi.org\/10.1145\/3427228.3427277","DOI":"10.1145\/3427228.3427277"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2760014"},{"key":"CIT0046","volume-title":"arXiv Preprint arXiv:1901.08319","author":"Naldi M.","year":"2019"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162257"},{"key":"CIT0048","unstructured":"Ofcom. (2020). Online nation: 2020 Report (Tech. Rep.). Ofcom. https:\/\/www.ofcom.org.uk\/_data\/assets\/pdf_file\/0027\/196407\/online-nation-2020-report.pdf)"},{"key":"CIT0049","volume-title":"Proceedings of the Korean Institute of Information and Commucation Sciences Conference","author":"Park H.","year":"2018"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp48618.2020.00-60"},{"issue":"5","key":"CIT0051","first-page":"6122","volume":"6","author":"Patel K. K.","year":"2016","journal-title":"International Journal of Engineering Science and Computing,"},{"key":"CIT0052","unstructured":"Porter, M. F. (2001). Snowball: A language for stemming algorithms. Snowball."},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139058452"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.3390\/info11060314"},{"key":"CIT0055","doi-asserted-by":"crossref","unstructured":"Schmidt, B., Borrison, R., Cohen, A., Dix, M., G\u00e4rtler, M. & Hollender, M. (2018). Industrial virtual assistants. Challenges and opportunities [Paper presentation]. Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers (pp. 794\u2013801). ACM.","DOI":"10.1145\/3267305.3274131"},{"key":"CIT0056","volume-title":"arXiv Preprint arXiv:2008.00508","author":"Sch\u00f6nherr L.","year":"2020"},{"key":"CIT0057","unstructured":"Shaban, H. (2018). An Amazon Echo recorded a family\u2019s conversation, then sent it to a random person in their contacts, report says. The Washington Post. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2018\/05\/24\/an-amazon-echo-recorded-a-familys-conversation-then-sent-it-to-a-random-person-in-their-contacts-report-says\/"},{"key":"CIT0058","unstructured":"Shuleivitz, J. (2018). Alexa, Should we trust you? The Atlantic. https:\/\/www.theatlantic.com\/magazine\/archive\/2018\/11\/alexa-how-will-you-change-us\/570844\/."},{"key":"CIT0059","first-page":"305","volume":"2563","author":"Sudharsan B.","year":"2019","journal-title":"AICS"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEMR.2014.7043637"},{"key":"CIT0061","unstructured":"Tabassum, M., Kosinski, T., Lipford, H. R. (2019). \u201cI don\u2019t own the data\u201d: End user perceptions of smart home device data practices and risks. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). Usenix."},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2016.7508172"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1145\/3185336"},{"key":"CIT0064","unstructured":"Zeng, E., Mare, S. & Roesner, F. (2017). End user security and privacy concerns with smart homes. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017) (pp. 65\u201380). Usenix."},{"key":"CIT0065","doi-asserted-by":"crossref","unstructured":"Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T. & Xu, W. (2017). Dolphinattack: Inaudible voice commands. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 103\u2013117). ACM.","DOI":"10.1145\/3133956.3134052"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00016"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2022.2058780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,9]],"date-time":"2023-03-09T10:40:04Z","timestamp":1678358404000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2022.2058780"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,20]]},"references-count":67,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,4,3]]}},"alternative-id":["10.1080\/10447318.2022.2058780"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2022.2058780","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-07-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-27","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}