{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:31Z","timestamp":1750220011456,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:00:00Z","timestamp":1689724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/T026723\/1"],"award-info":[{"award-number":["EP\/T026723\/1"]}]},{"name":"COMET project TED2021-132900A-I00","award":["MCIN\/AEI \/10.13039\/501100011033"],"award-info":[{"award-number":["MCIN\/AEI \/10.13039\/501100011033"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,19]]},"DOI":"10.1145\/3571884.3604307","type":"proceedings-article","created":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T18:04:11Z","timestamp":1689617051000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Misinformation in Third-party Voice Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5907-7869","authenticated-orcid":false,"given":"Mary","family":"Bispham","sequence":"first","affiliation":[{"name":"Informatics, King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1673-9232","authenticated-orcid":false,"given":"Suliman Kalim","family":"Sattar","sequence":"additional","affiliation":[{"name":"Informatics, King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3389-6612","authenticated-orcid":false,"given":"Clara","family":"Zard","sequence":"additional","affiliation":[{"name":"Informatics, King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7278-7373","authenticated-orcid":false,"given":"Xavier","family":"Ferrer-Aran","sequence":"additional","affiliation":[{"name":"Informatics, King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1325-8740","authenticated-orcid":false,"given":"Jide","family":"Edu","sequence":"additional","affiliation":[{"name":"Informatics, King's College London, United Kingdom and Computer and Information Sciences, University of Strathclyde, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0455-2553","authenticated-orcid":false,"given":"Guillermo","family":"Suarez-Tangil","sequence":"additional","affiliation":[{"name":"IMDEA Networks Institue, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6041-178X","authenticated-orcid":false,"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({ SOUPS}","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Kopo\u00a0M Ramokapane, and Jose Such. 2019. More than smart speakers: security and privacy perceptions of smart home personal assistants. In Fifteenth Symposium on Usable Privacy and Security ({ SOUPS} 2019). 451\u2013466."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_2_1_3_1","volume-title":"Evaluating the quality of voice assistants","author":"Alagha Emily\u00a0Couvillon","year":"2019","unstructured":"Emily\u00a0Couvillon Alagha and Rachel\u00a0Renee Helbing. 2019. Evaluating the quality of voice assistants\u2019 responses to consumer health questions about vaccines: an exploratory comparison of Alexa, Google Assistant and Siri. BMJ health & care informatics 26, 1 (2019), e100075."},{"key":"e_1_3_2_1_4_1","volume-title":"Shaden Shaar, Hamed Firooz, and Preslav Nakov.","author":"Alam Firoj","year":"2021","unstructured":"Firoj Alam, Stefano Cresci, Tanmoy Chakraborty, Fabrizio Silvestri, Dimiter Dimitrov, Giovanni Da\u00a0San Martino, Shaden Shaar, Hamed Firooz, and Preslav Nakov. 2021. A Survey on Multimodal Disinformation Detection. arXiv preprint arXiv:2103.12541 (2021)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26148-5_32"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479158"},{"key":"e_1_3_2_1_7_1","volume-title":"Rasa: Open source language understanding and dialogue management. arXiv preprint arXiv:1712.05181","author":"Bocklisch Tom","year":"2017","unstructured":"Tom Bocklisch, Joey Faulkner, Nick Pawlowski, and Alan Nichol. 2017. Rasa: Open source language understanding and dialogue management. arXiv preprint arXiv:1712.05181 (2017)."},{"volume-title":"Regulating the spread of online misinformation","author":"Brown \u00c9tienne","key":"e_1_3_2_1_8_1","unstructured":"\u00c9tienne Brown. 2021. Regulating the spread of online misinformation. In The Routledge Handbook of Political Epistemology. Routledge, 214\u2013225."},{"key":"e_1_3_2_1_9_1","volume-title":"Diet: Lightweight language understanding for dialogue systems. arXiv preprint arXiv:2004.09936","author":"Bunk Tanja","year":"2020","unstructured":"Tanja Bunk, Daksh Varshneya, Vladimir Vlasov, and Alan Nichol. 2020. Diet: Lightweight language understanding for dialogue systems. arXiv preprint arXiv:2004.09936 (2020)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423339"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Travis Coan Constantine Boussalis John Cook and Mirjam Nanko. 2021. Computer-assisted detection and classification of misinformation about climate change. (2021).","DOI":"10.31235\/osf.io\/crxfm"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.30658\/hmc.3.2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2020.1847379"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449157"},{"key":"e_1_3_2_1_15_1","volume-title":"Universal dependencies. Computational linguistics 47, 2","author":"de Marneffe Marie-Catherine","year":"2021","unstructured":"Marie-Catherine de Marneffe, Christopher\u00a0D Manning, Joakim Nivre, and Daniel Zeman. 2021. Universal dependencies. Computational linguistics 47, 2 (2021), 255\u2013308."},{"volume-title":"Assessing and Measuring the Privacy Practices of Voice Assistant Applications. Ph.\u00a0D. Dissertation","author":"Edu Jide","key":"e_1_3_2_1_16_1","unstructured":"Jide Edu. 2022. Assessing and Measuring the Privacy Practices of Voice Assistant Applications. Ph.\u00a0D. Dissertation. King\u2019s College London."},{"key":"e_1_3_2_1_17_1","volume-title":"SkillVet: Automated Traceability Analysis of Amazon Alexa Skills","author":"Edu Jide","year":"2021","unstructured":"Jide Edu, Xavier Ferrer-Aran, Jose Such, and Guillermo Suarez-Tangil. 2021. SkillVet: Automated Traceability Analysis of Amazon Alexa Skills. IEEE Transactions on Dependable and Secure Computing (2021)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512289"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412383"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2196\/19018"},{"key":"e_1_3_2_1_21_1","volume-title":"Skillexplorer: Understanding the behavior of skills in large scale. In 29th { USENIX} Security Symposium ({ USENIX} Security 20). 2649\u20132666.","author":"Guo Zhixiu","year":"2020","unstructured":"Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. Skillexplorer: Understanding the behavior of skills in large scale. In 29th { USENIX} Security Symposium ({ USENIX} Security 20). 2649\u20132666."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392854"},{"key":"e_1_3_2_1_23_1","unstructured":"Bahruz Jabiyev Jeremiah Onaolapo VT Burlington Gianluca Stringhini and Engin Kirda. [n. d.]. Game of FAME: Automatic Detection of FAke MEmes. ([n. d.])."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412869"},{"volume-title":"27th { USENIX} Security Symposium ({ USENIX} Security 18). 33\u201347.","author":"Kumar Deepak","key":"e_1_3_2_1_25_1","unstructured":"Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. 2018. Skill squatting attacks on Amazon Alexa. In 27th { USENIX} Security Symposium ({ USENIX} Security 18). 33\u201347."},{"key":"e_1_3_2_1_26_1","volume-title":"The science of fake news. Science 359, 6380","author":"Lazer MJ","year":"2018","unstructured":"David\u00a0MJ Lazer, Matthew\u00a0A Baum, Yochai Benkler, Adam\u00a0J Berinsky, Kelly\u00a0M Greenhill, Filippo Menczer, Miriam\u00a0J Metzger, Brendan Nyhan, Gordon Pennycook, David Rothschild, 2018. The science of fake news. Science 359, 6380 (2018), 1094\u20131096."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23111"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-publhealth-090419-102409"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735461.2735468"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446389"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87031-7_6"},{"key":"e_1_3_2_1_32_1","volume-title":"Fake news","author":"Molina D","year":"2021","unstructured":"Maria\u00a0D Molina, S\u00a0Shyam Sundar, Thai Le, and Dongwon Lee. 2021. \u201cFake news\u201d is not simply false information: a concept explication and taxonomy of online content. American behavioral scientist 65, 2 (2021), 180\u2013212."},{"key":"e_1_3_2_1_33_1","volume-title":"Stanza: A Python natural language processing toolkit for many human languages. arXiv preprint arXiv:2003.07082","author":"Qi Peng","year":"2020","unstructured":"Peng Qi, Yuhao Zhang, Yuhui Zhang, Jason Bolton, and Christopher\u00a0D Manning. 2020. Stanza: A Python natural language processing toolkit for many human languages. arXiv preprint arXiv:2003.07082 (2020)."},{"key":"e_1_3_2_1_34_1","volume-title":"Legal Obligation and Ethical Best Practice: Towards Meaningful Verbal Consent for Voice Assistants. In 2023 CHI Conference on Human Factors in Computing Systems. ACM, 285","author":"Seymour William","year":"2023","unstructured":"William Seymour, Mark Cot\u00e9, and Jose Such. 2023. Legal Obligation and Ethical Best Practice: Towards Meaningful Verbal Consent for Voice Assistants. In 2023 CHI Conference on Human Factors in Computing Systems. ACM, 285."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 7, CSCW1","author":"Seymour William","year":"2023","unstructured":"William Seymour and Jose Such. 2023. Ignorance is Bliss? The Effect of Explanations on Perceptions of Voice Assistants. Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (2023), 1\u201324."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479515"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2021.102604"},{"key":"e_1_3_2_1_38_1","volume-title":"What do You Know About the COVID-19 Vaccine?\"\u2013(Mis) perceptions of Mass Immunization Among Voice Assistant Users. arXiv preprint arXiv:2105.07854","author":"Sharevski Filipo","year":"2021","unstructured":"Filipo Sharevski, Anna Slowinski, Peter Jachim, and Emma Pieroni. 2021. \" Hey Alexa, What do You Know About the COVID-19 Vaccine?\"\u2013(Mis) perceptions of Mass Immunization Among Voice Assistant Users. arXiv preprint arXiv:2105.07854 (2021)."},{"key":"e_1_3_2_1_39_1","volume-title":"arXiv e-prints","author":"Su Dan","year":"2020","unstructured":"Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, and Wei Wang. 2020. \" Are you home alone?\"\" Yes\" Disclosing Security and Privacy Vulnerabilities in Alexa Skills. arXiv e-prints (2020), arXiv\u20132010."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2017.1360143"},{"key":"e_1_3_2_1_41_1","volume-title":"Sok: Hate, harassment, and the changing landscape of online abuse.","author":"Thomas Kurt","year":"2021","unstructured":"Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick\u00a0Gage Kelley, Deepak Kumar, 2021. Sok: Hate, harassment, and the changing landscape of online abuse. (2021)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-019-09516-z"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478101"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373464.3373475"}],"event":{"name":"CUI '23: ACM conference on Conversational User Interfaces","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Eindhoven Netherlands","acronym":"CUI '23"},"container-title":["Proceedings of the 5th International Conference on Conversational User Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571884.3604307","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571884.3604307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:13Z","timestamp":1750182673000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571884.3604307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,19]]},"references-count":44,"alternative-id":["10.1145\/3571884.3604307","10.1145\/3571884"],"URL":"https:\/\/doi.org\/10.1145\/3571884.3604307","relation":{},"subject":[],"published":{"date-parts":[[2023,7,19]]},"assertion":[{"value":"2023-07-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}