{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T23:09:52Z","timestamp":1772492992276,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/V011189\/1"],"award-info":[{"award-number":["EP\/V011189\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,26]]},"DOI":"10.1145\/3514094.3534129","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T22:25:13Z","timestamp":1658960713000},"page":"845-855","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Model for Governing Information Sharing in Smart Assistants"],"prefix":"10.1145","author":[{"given":"Xiao","family":"Zhan","sequence":"first","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"given":"Stefan","family":"Sarkadi","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"given":"Natalia","family":"Criado","sequence":"additional","affiliation":[{"name":"Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain"}]},{"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,7,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Fifteenth USENIX Symposium on Usable Privacy and Security ({SOUPS}","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi , Kopo Ramokapane , and Jose Such . 2019 . More than smart speakers: security and privacy perceptions of smart home personal assistants . In Fifteenth USENIX Symposium on Usable Privacy and Security ({SOUPS} 2019). Noura Abdi, Kopo Ramokapane, and Jose Such. 2019. More than smart speakers: security and privacy perceptions of smart home personal assistants. In Fifteenth USENIX Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_3_2_2_4_1","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 123--140.","author":"Apthorpe Noah","unstructured":"Noah Apthorpe , Sarah Varghese , and Nick Feamster . 2019. Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus {COPPA} . In 28th {USENIX} Security Symposium ({USENIX} Security 19). 123--140. Noah Apthorpe, Sarah Varghese, and Nick Feamster. 2019. Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus {COPPA}. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 123--140."},{"key":"e_1_3_2_2_5_1","volume-title":"Dagstuhl Follow-Ups","volume":"4","author":"Balke Tina","year":"2013","unstructured":"Tina Balke , C\u00e9lia da Costa Pereira , Frank Dignum , Emiliano Lorini , Antonino Rotolo , Wamberto Vasconcelos , and Serena Villata . 2013 . Norms in MAS: definitions and related concepts . In Dagstuhl Follow-Ups , Vol. 4 . Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Tina Balke, C\u00e9lia da Costa Pereira, Frank Dignum, Emiliano Lorini, Antonino Rotolo, Wamberto Vasconcelos, and Serena Villata. 2013. Norms in MAS: definitions and related concepts. In Dagstuhl Follow-Ups, Vol. 4. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1835408.1835411"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Sebastian Benthall Seda G\u00fcrses Helen Nissenbaum etal 2017. Contextual integrity through the lens of computer science. Now Publishers.  Sebastian Benthall Seda G\u00fcrses Helen Nissenbaum et al. 2017. Contextual integrity through the lens of computer science. Now Publishers.","DOI":"10.1561\/9781680833850"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897063"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_3_2_2_10_1","volume-title":"Ensuring trustworthy and ethical behaviour in intelligent logical agents. Journal of Logic and Computation","author":"Costantini Stefania","year":"2020","unstructured":"Stefania Costantini . 2020. Ensuring trustworthy and ethical behaviour in intelligent logical agents. Journal of Logic and Computation ( 2020 ). Stefania Costantini. 2020. Ensuring trustworthy and ethical behaviour in intelligent logical agents. Journal of Logic and Computation (2020)."},{"key":"e_1_3_2_2_11_1","volume-title":"Open issues for normative multi-agent systems. AI communications","author":"Criado Natalia","year":"2011","unstructured":"Natalia Criado , Estefania Argente , and V Botti . 2011. Open issues for normative multi-agent systems. AI communications , Vol. 24 , 3 ( 2011 ), 233--264. Natalia Criado, Estefania Argente, and V Botti. 2011. Open issues for normative multi-agent systems. AI communications, Vol. 24, 3 (2011), 233--264."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2021.02.008"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.013"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44569-2_2"},{"key":"e_1_3_2_2_15_1","volume-title":"Responsible artificial intelligence: how to develop and use AI in a responsible way","author":"Dignum Virginia","unstructured":"Virginia Dignum . 2019. Responsible artificial intelligence: how to develop and use AI in a responsible way . Springer Nature . Virginia Dignum. 2019. Responsible artificial intelligence: how to develop and use AI in a responsible way. Springer Nature."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278745"},{"key":"e_1_3_2_2_17_1","volume-title":"Muhammad Talha Paracha, David Choffnes, and Hamed Haddadi.","author":"Dubois Daniel J","year":"2020","unstructured":"Daniel J Dubois , Roman Kolcun , Anna Maria Mandalari , Muhammad Talha Paracha, David Choffnes, and Hamed Haddadi. 2020 . When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers. Proceedings on Privacy Enhancing Technologies , Vol. 2020 , 4 (2020), 255--276. Daniel J Dubois, Roman Kolcun, Anna Maria Mandalari, Muhammad Talha Paracha, David Choffnes, and Hamed Haddadi. 2020. When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 4 (2020), 255--276."},{"key":"e_1_3_2_2_18_1","volume-title":"SkillVet: Automated Traceability Analysis of Amazon Alexa Skills","author":"Edu Jide","year":"2021","unstructured":"Jide Edu , Xavier Ferrer-Aran , Jose Such , and Guillermo Suarez-Tangil . 2021. SkillVet: Automated Traceability Analysis of Amazon Alexa Skills . IEEE Transactions on Dependable and Secure Computing (TDSC) ( 2021 ). Jide Edu, Xavier Ferrer-Aran, Jose Such, and Guillermo Suarez-Tangil. 2021. SkillVet: Automated Traceability Analysis of Amazon Alexa Skills. IEEE Transactions on Dependable and Secure Computing (TDSC) (2021)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512289"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412383"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2021.3056293"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.4180836"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-004-2895-2"},{"key":"e_1_3_2_2_24_1","volume-title":"SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Guo Zhixiu","year":"2020","unstructured":"Zhixiu Guo , Zijin Lin , Pan Li , and Kai Chen . 2020 . SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium (USENIX Security 20) . 2649--2666. Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium (USENIX Security 20). 2649--2666."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_2_2_26_1","unstructured":"Ilir Kola Catholijn M Jonker and M Birna van Riemsdijk. 2018. Modelling the Social Environment: Towards Socially Adaptive Electronic Partners.. In MRC@ IJCAI. 30--34.  Ilir Kola Catholijn M Jonker and M Birna van Riemsdijk. 2018. Modelling the Social Environment: Towards Socially Adaptive Electronic Partners.. In MRC@ IJCAI. 30--34."},{"key":"e_1_3_2_2_27_1","volume-title":"Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction","volume":"2","author":"Lau Josephine","year":"2018","unstructured":"Josephine Lau , Benjamin Zimmerman , and Florian Schaub . 2018 . Alexa, Are You Listening?: Privacy Perceptions , Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction , Vol. 2 , CSCW (2018), 102. Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 102."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606605"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-019-00600-8"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_3_2_2_31_1","first-page":"176","article-title":"Measuring privacy: an empirical test using context to expose confounding variables","volume":"18","author":"Martin Kirsten","year":"2016","unstructured":"Kirsten Martin and Helen Nissenbaum . 2016 . Measuring privacy: an empirical test using context to expose confounding variables . Colum. Sci. & Tech. L. Rev. , Vol. 18 (2016), 176 . Kirsten Martin and Helen Nissenbaum. 2016. Measuring privacy: an empirical test using context to expose confounding variables. Colum. Sci. & Tech. L. Rev., Vol. 18 (2016), 176.","journal-title":"Colum. Sci. & Tech. L. Rev."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2018.00039"},{"key":"e_1_3_2_2_33_1","volume-title":"Jordi Solsona Belenguer, and Hideaki Kuzuoka","author":"McMillan Donald","year":"2019","unstructured":"Donald McMillan , Barry Brown , Ikkaku Kawaguchi , Razan Jaber , Jordi Solsona Belenguer, and Hideaki Kuzuoka . 2019 . Designing with Gaze : Tama--a Gaze Activated Smart-Speaker. Proceedings of the ACM on Human-Computer Interaction, Vol. 3 , CSCW ( 2019), 1--26. Donald McMillan, Barry Brown, Ikkaku Kawaguchi, Razan Jaber, Jordi Solsona Belenguer, and Hideaki Kuzuoka. 2019. Designing with Gaze: Tama--a Gaze Activated Smart-Speaker. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--26."},{"key":"e_1_3_2_2_34_1","volume-title":"Yixin Zou, and Florian Schaub.","author":"Mhaidli Abraham","year":"2020","unstructured":"Abraham Mhaidli , Manikandan Kandadai Venkatesh , Yixin Zou, and Florian Schaub. 2020 . Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls. Proceedings on Privacy Enhancing Technologies , Vol. 2020 , 2 (2020), 251--270. Abraham Mhaidli, Manikandan Kandadai Venkatesh, Yixin Zou, and Florian Schaub. 2020. Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 2 (2020), 251--270."},{"key":"e_1_3_2_2_35_1","volume-title":"Explanation in artificial intelligence: Insights from the social sciences. Artificial Intelligence","author":"Miller T.","year":"2018","unstructured":"T. Miller . 2018. Explanation in artificial intelligence: Insights from the social sciences. Artificial Intelligence ( 2018 ). T. Miller. 2018. Explanation in artificial intelligence: Insights from the social sciences. Artificial Intelligence (2018)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.4180831"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110073"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51924-7_2"},{"key":"e_1_3_2_2_39_1","volume-title":"International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). 916--924","author":"Mosca Francesca","year":"2021","unstructured":"Francesca Mosca and Jose Such . 2021 . ELVIRA: an Explainable Agent for Value and Utility-driven Multiuser Privacy . In International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). 916--924 . Francesca Mosca and Jose Such. 2021. ELVIRA: an Explainable Agent for Value and Utility-driven Multiuser Privacy. In International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). 916--924."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-021-09543-5"},{"key":"e_1_3_2_2_41_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004 . Privacy as contextual integrity . Wash. L. Rev. , Vol. 79 (2004), 119 . Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev., Vol. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_2_42_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum . 2009. Privacy in context: Technology, policy, and the integrity of social life . Stanford University Press . Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press."},{"key":"e_1_3_2_2_43_1","volume-title":"International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2012","author":"Perotti Alan","year":"2012","unstructured":"Alan Perotti , Guido Boella , Silvano Colombo Tosatto , Artur S d' Avila Garcez , Valerio Genovese , and Leon van der Torre. 2012. Learning and reasoning about norms using neural-symbolic systems . In International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2012 , Valencia, Spain , June 4-8, 2012 . 1023--1030. Alan Perotti, Guido Boella, Silvano Colombo Tosatto, Artur S d'Avila Garcez, Valerio Genovese, and Leon van der Torre. 2012. Learning and reasoning about norms using neural-symbolic systems. In International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2012, Valencia, Spain, June 4-8, 2012. 1023--1030."},{"key":"e_1_3_2_2_44_1","volume-title":"International Conference on Agreement Technologies. Springer, 3--17","author":"Sarkadi \u015etefan","year":"2018","unstructured":"\u015etefan Sarkadi , Alison R Panisson , Rafael H Bordini , Peter McBurney , and Simon Parsons . 2018 . Towards an approach for modelling uncertain theory of mind in multi-agent systems . In International Conference on Agreement Technologies. Springer, 3--17 . \u015etefan Sarkadi, Alison R Panisson, Rafael H Bordini, Peter McBurney, and Simon Parsons. 2018. Towards an approach for modelling uncertain theory of mind in multi-agent systems. In International Conference on Agreement Technologies. Springer, 3--17."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/AAI28931207"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432233"},{"key":"e_1_3_2_2_47_1","volume-title":"Fourth AAAI Conference on Human Computation and Crowdsourcing.","author":"Shvartzshnaider Yan","year":"2016","unstructured":"Yan Shvartzshnaider , Schrasing Tong , Thomas Wies , Paula Kift , Helen Nissenbaum , Lakshminarayanan Subramanian , and Prateek Mittal . 2016 . Learning privacy expectations by crowdsourcing contextual informational norms . In Fourth AAAI Conference on Human Computation and Crowdsourcing. Yan Shvartzshnaider, Schrasing Tong, Thomas Wies, Paula Kift, Helen Nissenbaum, Lakshminarayanan Subramanian, and Prateek Mittal. 2016. Learning privacy expectations by crowdsourcing contextual informational norms. In Fourth AAAI Conference on Human Computation and Crowdsourcing."},{"key":"e_1_3_2_2_48_1","volume-title":"Global Smart Speaker Vendor & OS Shipment and Installed Base Market Share by Region: Q4","author":"Analytics Strategy","year":"2019","unstructured":"Strategy Analytics . 2020. Global Smart Speaker Vendor & OS Shipment and Installed Base Market Share by Region: Q4 2019 . Strategy Analytics. 2020. Global Smart Speaker Vendor & OS Shipment and Installed Base Market Share by Region: Q4 2019."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/663"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208039"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888913000180"},{"key":"e_1_3_2_2_53_1","article-title":"Privacy policy negotiation in social media","volume":"11","author":"Such Jose","year":"2016","unstructured":"Jose Such and Michael Rovatsos . 2016 . Privacy policy negotiation in social media . ACM Transactions on Autonomous and Adaptive Systems (TAAS) , Vol. 11 , 1 (2016). Jose Such and Michael Rovatsos. 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems (TAAS), Vol. 11, 1 (2016).","journal-title":"ACM Transactions on Autonomous and Adaptive Systems (TAAS)"},{"key":"e_1_3_2_2_54_1","volume-title":"Alexa Skills: Cheat Sheet. https:\/\/www.techrepublic.com\/article\/alexa-skills-cheat-sheet\/","year":"2020","unstructured":"TechRepublic. 2020 . Alexa Skills: Cheat Sheet. https:\/\/www.techrepublic.com\/article\/alexa-skills-cheat-sheet\/ TechRepublic. 2020. Alexa Skills: Cheat Sheet. https:\/\/www.techrepublic.com\/article\/alexa-skills-cheat-sheet\/"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351556.3351588"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33792-6_36"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395601"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2900622"},{"key":"e_1_3_2_2_59_1","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 159--176.","author":"Zeng Eric","unstructured":"Eric Zeng and Franziska Roesner . 2019. Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study . In 28th {USENIX} Security Symposium ({USENIX} Security 19). 159--176. Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 159--176."}],"event":{"name":"AIES '22: AAAI\/ACM Conference on AI, Ethics, and Society","location":"Oxford United Kingdom","acronym":"AIES '22","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","AAAI"]},"container-title":["Proceedings of the 2022 AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514094.3534129","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3514094.3534129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:36Z","timestamp":1750186956000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514094.3534129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,26]]},"references-count":59,"alternative-id":["10.1145\/3514094.3534129","10.1145\/3514094"],"URL":"https:\/\/doi.org\/10.1145\/3514094.3534129","relation":{},"subject":[],"published":{"date-parts":[[2022,7,26]]},"assertion":[{"value":"2022-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}