{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:47:57Z","timestamp":1772041677501,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation (NSF)","award":["2239605, 2228616, 2114920, 2228617, 2120369, 2129164, 2114982"],"award-info":[{"award-number":["2239605, 2228616, 2114920, 2228617, 2120369, 2129164, 2114982"]}]},{"DOI":"10.13039\/501100006374","name":"Open Technology Fund","doi-asserted-by":"publisher","award":["B00236-1220-00"],"award-info":[{"award-number":["B00236-1220-00"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"HKPolyU Grant","award":["ZVG0"],"award-info":[{"award-number":["ZVG0"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645409","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1081-1091","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5264-7573","authenticated-orcid":false,"given":"Song","family":"Liao","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7603-0765","authenticated-orcid":false,"given":"Mohammed","family":"Aldeen","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5193-2107","authenticated-orcid":false,"given":"Jingwen","family":"Yan","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4819-5406","authenticated-orcid":false,"given":"Long","family":"Cheng","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5224-9970","authenticated-orcid":false,"given":"Haipeng","family":"Cai","sequence":"additional","affiliation":[{"name":"Washington State University, Pullman, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-247X","authenticated-orcid":false,"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Alexa-hosted Skills. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/hostedskills\/ alexa-hosted-skills-create.html."},{"key":"e_1_3_2_2_2_1","unstructured":"Alexa Skills Privacy Requirements. https:\/\/developer.amazon.com\/fr\/docs\/customskills\/security-testing-for-an-alexa-skill.html#25-privacy-requirements. Accessed: 25-Nov-2020."},{"key":"e_1_3_2_2_3_1","unstructured":"California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"e_1_3_2_2_4_1","unstructured":"California Online Privacy Protection Act (CalOPPA). https:\/\/consumercal.org\/about-cfc\/cfc-education-foundation\/californiaonline-privacy-protection-act-caloppa-3\/."},{"key":"e_1_3_2_2_5_1","unstructured":"Children's Online Privacy Protection Rule (COPPA). https:\/\/www.ftc.gov\/legallibrary\/ browse\/rules\/childrens-online-privacy-protection-rule-coppa."},{"key":"e_1_3_2_2_6_1","unstructured":"Configure Permissions for Customer Information in Your Skill. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/configurepermissions-for-customer-information-in-your-skill.html."},{"key":"e_1_3_2_2_7_1","unstructured":"General Data Protection Regulation. https:\/\/gdpr-info.eu."},{"key":"e_1_3_2_2_8_1","unstructured":"Google fined \"50 million for GDPR violation in France. https:\/\/www.theverge.com\/2019\/1\/21\/18191591\/google-gdpr-fine-50-millioneuros-data-consent-cnil."},{"key":"e_1_3_2_2_9_1","unstructured":"Google Privacy Policy Guidance. https:\/\/developers.google.com\/assistant\/console\/policies\/privacy-policy-guide."},{"key":"e_1_3_2_2_10_1","unstructured":"Health Insurance Portability and Accountability Act of 1996 (HIPAA). https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html."},{"key":"e_1_3_2_2_11_1","unstructured":"How voice assistants are changing our lifestyle. https:\/\/voxpow.com\/blog\/howvoice-assistants-are-changing-our-lifestyle\/."},{"key":"e_1_3_2_2_12_1","unstructured":"Selenium WebDriver. https:\/\/pypi.org\/project\/selenium\/."},{"key":"e_1_3_2_2_13_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. More than smart speakers: Security and privacy perceptions of smart home personal assistants. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), Santa Clara, CA, 2019. USENIX Association."},{"key":"e_1_3_2_2_14_1","first-page":"585","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow, Samin Yaseer Mahmud,WenyuWang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. Policylint: Investigating internal privacy policy contradictions on google play. In Proceedings of the 28th USENIX Conference on Security Symposium, page 585--602, 2019."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423339"},{"key":"e_1_3_2_2_16_1","volume-title":"Bert: Pretraining of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. Bert: Pretraining of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805, 2018."},{"key":"e_1_3_2_2_17_1","article-title":"Automated traceability analysis of amazon alexa skills","author":"Edu Jide","year":"2021","unstructured":"Jide Edu, Xavi Ferrer Aran, Jose Such, and Guillermo Suarez-Tangil. Skillvet: Automated traceability analysis of amazon alexa skills. IEEE Transactions on Dependable and Secure Computing, 2021.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512289"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497766"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2013.6707742"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622621"},{"key":"e_1_3_2_2_22_1","first-page":"2649","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20)","author":"Guo Zhixiu","year":"2020","unstructured":"Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. Skillexplorer: Understanding the behavior of skills in large scale. In 29th {USENIX} Security Symposium ({USENIX} Security 20), pages 2649--2666, 2020."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Umar Iqbal Pouneh Nikkhah Bahrami Rahmadi Trimananda Hao Cui Alexander Gamero-Garrido Daniel Dubois David Choffnes Athina Markopoulou Franziska Roesner and Zubair Shafiq. Your echos are heard: Tracking profiling and ad targeting in the amazon smart speaker ecosystem. arXiv preprint arXiv:2204.10920 2022.","DOI":"10.1145\/3618257.3624803"},{"key":"e_1_3_2_2_24_1","first-page":"33","volume-title":"Michael Bailey. Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium (USENIX Security)","author":"Kumar Deepak","year":"2018","unstructured":"Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium (USENIX Security), pages 33--47, 2018."},{"key":"e_1_3_2_2_25_1","volume-title":"Noah Apthorpe, and Yuan Tian. Skillbot: Identifying risky content for children in alexa skills. ACM Transactions on Internet Technology (TOIT), 22(3):1--31","author":"Le Tu","year":"2022","unstructured":"Tu Le, Danny Yuxing Huang, Noah Apthorpe, and Yuan Tian. Skillbot: Identifying risky content for children in alexa skills. ACM Transactions on Internet Technology (TOIT), 22(3):1--31, 2022."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23111"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556957"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616650"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427250"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0004"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560436"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450022"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563195"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380179"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432233"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3186969"},{"issue":"3","key":"e_1_3_2_2_38_1","first-page":"1","article-title":"Demystifying the vetting process of voice-controlled skills on markets. Proceedings of the ACM on Interactive, Mobile","volume":"5","author":"Wang Dawei","year":"2021","unstructured":"Dawei Wang, Kai Chen, and Wei Wang. Demystifying the vetting process of voice-controlled skills on markets. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(3):1--28, 2021.","journal-title":"Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560416"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0028"},{"key":"e_1_3_2_2_41_1","volume-title":"31st USENIX Security Symposium (USENIX Security","author":"Young Jeffrey","year":"2022","unstructured":"Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, and Huixing Deng. {SkillDetective}: Automated {Policy-Violation} detection of voice assistant applications in the wild. In 31st USENIX Security Symposium (USENIX Security , 2022."},{"key":"e_1_3_2_2_42_1","volume-title":"IEEE Symposium on Security and Privacy (SP)","author":"Zhang Nan","year":"2019","unstructured":"Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, and Feng Qian. Understanding and mitigating the security risks of voice-controlled thirdparty skills on amazon alexa and google home. In IEEE Symposium on Security and Privacy (SP), 2019."}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645409","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:23:49Z","timestamp":1755822229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645409"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":42,"alternative-id":["10.1145\/3589334.3645409","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645409","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}