{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T11:18:07Z","timestamp":1773141487306,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/T026723\/1"],"award-info":[{"award-number":["EP\/T026723\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3580967","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:27:20Z","timestamp":1681964840000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Legal Obligation and Ethical Best Practice: Towards Meaningful Verbal Consent for Voice Assistants"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0256-6740","authenticated-orcid":false,"given":"William","family":"Seymour","sequence":"first","affiliation":[{"name":"Department of Informatics, Kings College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6359-1627","authenticated-orcid":false,"given":"Mark","family":"Cote","sequence":"additional","affiliation":[{"name":"Department of Digital Humanities, King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6041-178X","authenticated-orcid":false,"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"Department of Informatics, King's College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","volume-title":"Usenix Fifteenth Symposium on Usable Privacy and Security (SOUPS). 451\u2013466","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Marvin Ramokapane, and Jose Such. 2019. More than smart speakers: security and privacy perceptions of smart home personal assistants. In Usenix Fifteenth Symposium on Usable Privacy and Security (SOUPS). 451\u2013466."},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517652"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311956"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mex.2021.101401"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0020476"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423339"},{"key":"e_1_3_3_3_8_1","volume-title":"Guidance on obtaining participants","author":"Central University Research\u00a0Ethics Committee. 2021.","unstructured":"Central University Research\u00a0Ethics Committee. 2021. Guidance on obtaining participants\u2019 consent orally. Technical Report. University of Oxford. https:\/\/researchsupport.admin.ox.ac.uk\/governance\/ethics\/resources\/consent Accessed 27 July 2022."},{"key":"e_1_3_3_3_9_1","volume-title":"SkillVet: Automated Traceability Analysis of Amazon Alexa Skills","author":"Edu Jide","year":"2021","unstructured":"Jide Edu, Xavi\u00a0Ferrer Aran, Jose Such, and Guillermo Suarez-Tangil. 2021. SkillVet: Automated Traceability Analysis of Amazon Alexa Skills. IEEE Transactions on Dependable and Secure Computing (2021)."},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512289"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412383"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451230"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_3_3_15_1","volume-title":"SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Guo Zhixiu","year":"2020","unstructured":"Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium (USENIX Security 20). 2649\u20132666."},{"key":"e_1_3_3_3_16_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Harkous Hamza","year":"2016","unstructured":"Hamza Harkous, Kassem Fawaz, Kang\u00a0G Shin, and Karl Aberer. 2016. {PriBots}: Conversational Privacy with Chatbots. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)."},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702523"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0033"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445312"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502012"},{"key":"e_1_3_3_3_25_1","volume-title":"Linstone and Murray Turoff","author":"A.","year":"1975","unstructured":"Harold\u00a0A. Linstone and Murray Turoff. 1975. The Delphi method : techniques and applications. Addison-Wesley Pub. Co., Advanced Book Program."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/0961000618759414"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481371"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493446"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519687"},{"key":"e_1_3_3_3_30_1","volume-title":"Runtime Permissions for Privacy in Proactive Intelligent Assistants. In Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Malkin Nathan","year":"2022","unstructured":"Nathan Malkin, David Wagner, and Serge Egelman. 2022. Runtime Permissions for Privacy in Proactive Intelligent Assistants. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 633\u2013651."},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449119"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/0022-4537.00153"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191703"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300745"},{"key":"e_1_3_3_3_35_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79(2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557121"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355584"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517510"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.265102930"},{"key":"e_1_3_3_3_40_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam\u00a0L. Durity, and Lorrie\u00a0Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 1\u201317. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/schaub"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543829.3544521"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479515"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445107"},{"key":"e_1_3_3_3_45_1","unstructured":"European Union. 2016-05-04. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation).Official Journal L110 59(2016-05-04) 1\u201388."},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41366-018-0313-9"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376210"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.04.013"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478101"},{"key":"e_1_3_3_3_51_1","volume-title":"USENIX Security Symposium.","author":"Young Jeffrey","year":"2022","unstructured":"Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, and Huixing Deng. 2022. SkillDetective: Automated Policy-Violation detection of voice assistant applications in the wild. In USENIX Security Symposium."},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490632.3490662"},{"key":"e_1_3_3_3_53_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in {Multi-User} Smart Homes: A Design Exploration and {In-Home} User Study. In 28th USENIX Security Symposium (USENIX Security 19). 159\u2013176."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514094.3534129"},{"key":"e_1_3_3_3_55_1","volume-title":"The age of surveillance capitalism: The fight for a human future at the new frontier of power","author":"Zuboff Shoshana","unstructured":"Shoshana Zuboff. 2019. The age of surveillance capitalism: The fight for a human future at the new frontier of power. Profile Books."}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3580967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:54Z","timestamp":1750178874000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":55,"alternative-id":["10.1145\/3544548.3580967","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3580967","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}