{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:17:01Z","timestamp":1753273021092,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340330","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Alexa's Voice Recording Behavior"],"prefix":"10.1145","author":[{"given":"Yousra","family":"Javed","sequence":"first","affiliation":[{"name":"Illinois State University, IL, USA"}]},{"given":"Shashank","family":"Sethi","sequence":"additional","affiliation":[{"name":"Illinois State University, IL, USA"}]},{"given":"Akshay","family":"Jadoun","sequence":"additional","affiliation":[{"name":"Illinois State University, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Manage Alexa Content and Devices. https:\/\/www.amazon.com\/mycd.  2019. Manage Alexa Content and Devices. https:\/\/www.amazon.com\/mycd."},{"volume-title":"Jun Tang and Aleksandra Korolova","year":"2017","author":"Abdulaziz Alhadlaq Marwan Almaymoni","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2019. Alexa and Alexa Device Terms Warranties and Notices. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=201602230.  Amazon. 2019. Alexa and Alexa Device Terms Warranties and Notices. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=201602230."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon. 2019. Alexa Feature Help. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=201602040\/.  Amazon. 2019. Alexa Feature Help. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=201602040\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Malarie Gokey. 2018. The best smart speaker you can buy. https:\/\/www.businessinsider.com\/best-smart-speaker-amazon-echo.  Malarie Gokey. 2018. The best smart speaker you can buy. https:\/\/www.businessinsider.com\/best-smart-speaker-amazon-echo."},{"volume-title":"Always On: Privacy Implications of Microphone-Enabled Devices. In Future of privacy forum. https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC5714311\/","year":"2016","author":"Gray Stacey","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Jeffrey Voas Hyunji Chung Michaela Iorga and Sangjin Lee. {n. d.}. Alexa Can I Trust You? https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC5714311\/.  Jeffrey Voas Hyunji Chung Michaela Iorga and Sangjin Lee. {n. d.}. Alexa Can I Trust You? https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC5714311\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","year":"2014","author":"Kang Ruogu","key":"e_1_3_2_1_9_1"},{"volume-title":"Symposium on Usable Privacy and Security (SOUPS)","year":"2010","author":"Kelley Patrick Gage","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Bret Kinsella. 2017. Amazon Alexa Skill Count Passes 15 000 in the U.S. https:\/\/voicebot.ai\/2017\/07\/02\/amazon-alexa-skill-count-passes-15000-in-the-u-s\/.  Bret Kinsella. 2017. Amazon Alexa Skill Count Passes 15 000 in the U.S. https:\/\/voicebot.ai\/2017\/07\/02\/amazon-alexa-skill-count-passes-15000-in-the-u-s\/."},{"volume-title":"Privacy Indexes: A Survey of Westin's Studies. Technical Report CMU-ISRI-5-138","year":"2005","author":"Kumaraguru Ponnurangam","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"H. Lee and A. Kobsa. 2016. Understanding user privacy in Internet of Things environments. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). 407--412.  H. Lee and A. Kobsa. 2016. Understanding user privacy in Internet of Things environments. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). 407--412.","DOI":"10.1109\/WF-IoT.2016.7845392"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_2_1_16_1","unstructured":"David Nield. 2018. Alexa vs Siri vs Google Assistant vs Cortana vs Bixby. https:\/\/www.popsci.com\/digital-assistant-showdown  David Nield. 2018. Alexa vs Siri vs Google Assistant vs Cortana vs Bixby. https:\/\/www.popsci.com\/digital-assistant-showdown"},{"key":"e_1_3_2_1_17_1","unstructured":"Anne Pfeifle. 2012. Alexa What Should We Do About Privacy? Protecting Privacy for Users of Voice-Activated Devices. In Washington Law Review. https:\/\/digital.law.washington.edu\/dspace-law\/bitstream\/handle\/1773.1\/1778\/93WLR0421.pdf  Anne Pfeifle. 2012. Alexa What Should We Do About Privacy? Protecting Privacy for Users of Voice-Activated Devices. In Washington Law Review. https:\/\/digital.law.washington.edu\/dspace-law\/bitstream\/handle\/1773.1\/1778\/93WLR0421.pdf"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022260"},{"key":"e_1_3_2_1_20_1","unstructured":"Matt Weinberger. 2017. Why Amazon's Echo is totally dominating. https:\/\/www.businessinsider.com\/amazon-echo-google-home-microsoft-cortana-apple-siri-2017-1.  Matt Weinberger. 2017. Why Amazon's Echo is totally dominating. https:\/\/www.businessinsider.com\/amazon-echo-google-home-microsoft-cortana-apple-siri-2017-1."},{"volume-title":"10th Symposium On Usable Privacy and Security (SOUPS 2014","year":"2014","author":"Woodruff Allison","key":"e_1_3_2_1_21_1"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340330"}},"subtitle":["A Survey of User Understanding and Awareness"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":21,"alternative-id":["10.1145\/3339252.3340330","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340330","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}