{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:48:19Z","timestamp":1767905299294,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":155,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T00:00:00Z","timestamp":1691452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/T026723\/1"],"award-info":[{"award-number":["EP\/T026723\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,8]]},"DOI":"10.1145\/3600211.3604679","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T18:41:37Z","timestamp":1693334497000},"page":"131-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["A Systematic Review of Ethical Concerns with Voice Assistants"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0256-6740","authenticated-orcid":false,"given":"William","family":"Seymour","sequence":"first","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1755-0976","authenticated-orcid":false,"given":"Xiao","family":"Zhan","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6359-1627","authenticated-orcid":false,"given":"Mark","family":"Cot\u00e9","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6041-178X","authenticated-orcid":false,"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({ SOUPS}","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Kopo\u00a0M Ramokapane, and Jose Such. 2019. More than smart speakers: security and privacy perceptions of smart home personal assistants. In Fifteenth Symposium on Usable Privacy and Security ({ SOUPS} 2019). 451\u2013466."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3236344"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368426"},{"key":"e_1_3_2_1_5_1","volume-title":"Comparing Security and Privacy Attitudes Among US Users of Different Smartphone and Smart-Speaker Platforms. In Seventeenth Symposium on Usable Privacy and Security ({ SOUPS}","author":"Abrokwa Desiree","year":"2021","unstructured":"Desiree Abrokwa, Shruti Das, Omer Akgul, and Michelle\u00a0L Mazurek. 2021. Comparing Security and Privacy Attitudes Among US Users of Different Smartphone and Smart-Speaker Platforms. In Seventeenth Symposium on Usable Privacy and Security ({ SOUPS} 2021). 139\u2013158."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4337\/cilj.2019.02.04"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106466"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2020.3013490"},{"key":"e_1_3_2_1_9_1","volume-title":"Evaluating the quality of voice assistants","author":"Alagha Emily\u00a0Couvillon","year":"2019","unstructured":"Emily\u00a0Couvillon Alagha and Rachel\u00a0Renee Helbing. 2019. Evaluating the quality of voice assistants\u2019 responses to consumer health questions about vaccines: an exploratory comparison of Alexa, Google Assistant and Siri. BMJ health & care informatics 26, 1 (2019), e100075."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300233"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311956"},{"key":"e_1_3_2_1_12_1","volume-title":"Security and Privacy Issues with Virtual Private Voice Assistants. In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 0702\u20130708","author":"Anniappa Deeksha","year":"2021","unstructured":"Deeksha Anniappa and Yoohwan Kim. 2021. Security and Privacy Issues with Virtual Private Voice Assistants. In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 0702\u20130708."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3310422"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3236354"},{"key":"e_1_3_2_1_15_1","volume-title":"Intelligent Environments","author":"Ballati Fabio","year":"2018","unstructured":"Fabio Ballati, Fulvio Corno, and Luigi De\u00a0Russis. 2018. \u201cHey Siri, do you understand me?\u201d: Virtual Assistants and Dysarthria. In Intelligent Environments 2018. IOS Press, 557\u2013566."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5465\/amp.2007.24286163"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/21639159.2018.1466659"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376344"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12243"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11051-2_25"},{"key":"e_1_3_2_1_21_1","volume-title":"Misinformation in Third-party Voice Applications. In ACM conference on Conversational User Interfaces (CUI).","author":"Bispham Mary","year":"2023","unstructured":"Mary Bispham, Suliman Kalim Sattar, Clara Zard, Jide Edu, Guillermo Suarez-Tangil, and Jose Such. 2023. Misinformation in Third-party Voice Applications. In ACM conference on Conversational User Interfaces (CUI)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21072312"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1713845"},{"key":"e_1_3_2_1_24_1","volume-title":"Acceptance-Relevant Factors of Virtual Voice-Assistants. In 2019 IEEE International Professional Communication Conference (ProComm). IEEE, 101\u2013111","author":"Burbach Laura","year":"2019","unstructured":"Laura Burbach, Patrick Halbach, Nils Plettenberg, Johannes Nakayama, Martina Ziefle, and Andr\u00e9\u00a0Calero Valdez. 2019. \" Hey, Siri\",\" Ok, Google\",\" Alexa\". Acceptance-Relevant Factors of Virtual Voice-Assistants. In 2019 IEEE International Professional Communication Conference (ProComm). IEEE, 101\u2013111."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376789"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395479"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.682982"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3405755.3406129"},{"key":"e_1_3_2_1_29_1","volume-title":"Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users. In International Conference on Human-Computer Interaction. Springer, 305\u2013325","author":"Chalhoub George","year":"2020","unstructured":"George Chalhoub and Ivan Flechais. 2020. \u201cAlexa, are you spying on me?\u201d: Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users. In International Conference on Human-Computer Interaction. Springer, 305\u2013325."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423339"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300488"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376551"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_3_2_1_34_1","volume-title":"Virtual Assistants: An Accessibility Assessment in Virtual Assistants for People with Motor Disability on Mobile Devices. In International Conference on Applied Human Factors and Ergonomics","author":"Correia Walter","year":"2019","unstructured":"Walter Correia, Jefte Macedo, Marcelo Penha, Jonysberg Quintino, Fernanda Pellegrini, Marcelo Anjos, Fabiana Florentin, Andre Santos, and Fabio\u00a0QB Da\u00a0Silva. 2019. Virtual Assistants: An Accessibility Assessment in Virtual Assistants for People with Motor Disability on Mobile Devices. In International Conference on Applied Human Factors and Ergonomics. Springer, 239\u2013249."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1386\/tear_00014_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449157"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469886"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384732"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3340116"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459990.3465195"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0072"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2014.986642"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412383"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_22"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_1_46_1","unstructured":"Claus-Peter\u00a0H Ernst and Nils Herm-Stapelberg. 2020. The Impact of Gender Stereotyping on the Perceived Likability of Virtual Assistants. (2020)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1159\/000508499"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","unstructured":"Janik Festerling and Iram Siraj. 2021. Anthropomorphizing Technology: A Conceptual Review of Anthropomorphism Research and How it Relates to Children\u2019s Engagements with Digital Voice Assistants. Integrative Psychological and Behavioral Science (2021) 1\u201330. https:\/\/doi.org\/10.1007\/s12124-021-09668-y","DOI":"10.1007\/s12124-021-09668-y"},{"key":"e_1_3_2_1_49_1","volume-title":"When things are sensors for cloud AI: Protecting privacy through data collection transparency in the age of digital assistants. In 2017 Global Internet of Things Summit (GIoTS)","author":"Flikkema G","unstructured":"Paul\u00a0G Flikkema and Bertrand Cambou. 2017. When things are sensors for cloud AI: Protecting privacy through data collection transparency in the age of digital assistants. In 2017 Global Internet of Things Summit (GIoTS). IEEE, 1\u20134."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433949"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188448"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2019.8909098"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411170.3411260"},{"key":"e_1_3_2_1_55_1","volume-title":"Privacy Issues in Voice Assistant Ecosystems. In 2020 IEEE World Congress on Services (SERVICES). IEEE, 205\u2013212","author":"Germanos Georgios","year":"2020","unstructured":"Georgios Germanos, Dimitris Kavallieros, Nicholas Kolokotronis, and Nikolaos Georgiou. 2020. Privacy Issues in Voice Assistant Ecosystems. In 2020 IEEE World Congress on Services (SERVICES). IEEE, 205\u2013212."},{"key":"e_1_3_2_1_56_1","volume-title":"Relationship with Voice Assistants and How It Affects Privacy Concerns and Information Disclosure Behavior. In International Conference on Human-Computer Interaction","author":"Ghosh Charulata","unstructured":"Charulata Ghosh and Matthew\u00a0S Eastin. 2020. Understanding Users\u2019 Relationship with Voice Assistants and How It Affects Privacy Concerns and Information Disclosure Behavior. In International Conference on Human-Computer Interaction. Springer, 381\u2013392."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1668454"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2020.1834728"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340764.3344441"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340764.3344441"},{"key":"e_1_3_2_1_61_1","volume-title":"Burst of the filter bubble? Effects of personalization on the diversity of Google News. Digital journalism 6, 3","author":"Haim Mario","year":"2018","unstructured":"Mario Haim, Andreas Graefe, and Hans-Bernd Brosius. 2018. Burst of the filter bubble? Effects of personalization on the diversity of Google News. Digital journalism 6, 3 (2018), 330\u2013343."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466134"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPED.2019.8906642"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445901"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340330"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173578"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1957656.1957710"},{"key":"e_1_3_2_1_69_1","volume-title":"AMAZE: Recognizing Speakers with Amazon\u2019s Echo Dot Device. In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). IEEE, 494\u2013503","author":"Kalin Tiffany","year":"2019","unstructured":"Tiffany Kalin, Kerri Stone, and Tracy Camp. 2019. AMAZE: Recognizing Speakers with Amazon\u2019s Echo Dot Device. In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). IEEE, 494\u2013503."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802686"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50732-9_71"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308532.3329466"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300669"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138849"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","unstructured":"Olya Kudina and Mark Coeckelbergh. 2021. \u201cAlexa define empowerment\u201d: voice assistants at home appropriation and technoperformances. Journal of Information Communication and Ethics in Society (2021). https:\/\/doi.org\/10.1108\/JICES-06-2020-0072","DOI":"10.1108\/JICES-06-2020-0072"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376665"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466455"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09975-1"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2021.102608"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427250"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15742-5_9"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3317597"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS52051.2020.9340199"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445488"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2019.105366"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176349.3176868"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771839.2771910"},{"key":"e_1_3_2_1_89_1","volume-title":"Privacy and smart speakers: A multi-dimensional approach","author":"Lutz Christoph","year":"2021","unstructured":"Christoph Lutz and Gemma Newlands. 2021. Privacy and smart speakers: A multi-dimensional approach. The Information Society (2021), 1\u201316."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138860"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449119"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427277"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-151-4-200908180-00135"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.21407"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209626.3209709"},{"key":"e_1_3_2_1_97_1","volume-title":"The effect of voice and humour on users","author":"Moussawi Sara","year":"2020","unstructured":"Sara Moussawi and Raquel Benbunan-Fich. 2020. The effect of voice and humour on users\u2019 perceptions of personal intelligent agents. Behaviour & Information Technology (2020), 1\u201324."},{"key":"e_1_3_2_1_98_1","volume-title":"How perceptions of intelligence and anthropomorphism affect adoption of personal intelligent agents. Electronic Markets","author":"Moussawi Sara","year":"2020","unstructured":"Sara Moussawi, Marios Koufaris, and Raquel Benbunan-Fich. 2020. How perceptions of intelligence and anthropomorphism affect adoption of personal intelligent agents. Electronic Markets (2020), 1\u201322."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162257"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191703"},{"key":"e_1_3_2_1_101_1","volume-title":"Wired for speech: How voice activates and advances the human-computer relationship","author":"Nass Clifford\u00a0Ivar","unstructured":"Clifford\u00a0Ivar Nass and Scott Brave. 2005. Wired for speech: How voice activates and advances the human-computer relationship. MIT press Cambridge, MA."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1525023"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01210-7"},{"key":"e_1_3_2_1_104_1","volume-title":"Privacy in context","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum. 2020. Privacy in context. Stanford University Press."},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.34"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00287-9"},{"key":"e_1_3_2_1_107_1","volume-title":"Running experiments on amazon mechanical turk. Judgment and Decision making 5, 5","author":"Paolacci Gabriele","year":"2010","unstructured":"Gabriele Paolacci, Jesse Chandler, and Panagiotis\u00a0G Ipeirotis. 2010. Running experiments on amazon mechanical turk. Judgment and Decision making 5, 5 (2010), 411\u2013419."},{"key":"e_1_3_2_1_108_1","volume-title":"Cognitive and Affective Response to the Risk to Privacy from a Smart Speaker. International Journal of Human\u2013Computer Interaction 37, 8","author":"Park Jonghwa","year":"2021","unstructured":"Jonghwa Park, Hanbyul Choi, and Yoonhyuk Jung. 2021. Users\u2019 Cognitive and Affective Response to the Risk to Privacy from a Smart Speaker. International Journal of Human\u2013Computer Interaction 37, 8 (2021), 759\u2013771."},{"key":"e_1_3_2_1_109_1","first-page":"421","article-title":"Alexa, what should we do about privacy: Protecting privacy for users of voice-activated devices","volume":"93","author":"Pfeifle Anne","year":"2018","unstructured":"Anne Pfeifle. 2018. Alexa, what should we do about privacy: Protecting privacy for users of voice-activated devices. Wash. L. Rev. 93 (2018), 421.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"crossref","unstructured":"Anthony Phipps Karim Ouazzane Vassil Vassilev 2021. Your password is music to my ears: cloud-based authentication using sound. (2021).","DOI":"10.1109\/Confluence51648.2021.9377126"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.5555\/265013"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174214"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359316"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469595.3469607"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174033"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719891748"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053246"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449206"},{"key":"e_1_3_2_1_119_1","volume-title":"Challenges and Issues in Securing Data Privacy in IoT and Connected Devices. In 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 665\u2013670","author":"Sahu Prakhar","year":"2019","unstructured":"Prakhar Sahu, SK Singh, and Pankaj Kumar. 2019. Challenges and Issues in Securing Data Privacy in IoT and Connected Devices. In 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 665\u2013670."},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375188"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3439231.3440603"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1080\/07393148.2019.1595288"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78635-9_63"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196772"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395501"},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479515"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470017"},{"key":"e_1_3_2_1_128_1","volume-title":"Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities. Complex Systems Informatics and Modeling Quarterly24","author":"Sharif Khairunisa","year":"2020","unstructured":"Khairunisa Sharif and Bastian Tenbergen. 2020. Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities. Complex Systems Informatics and Modeling Quarterly24 (2020), 15\u201330."},{"key":"e_1_3_2_1_129_1","volume-title":"The Emerald International Handbook of Technology-Facilitated Violence and Abuse","author":"Slupska Julia","unstructured":"Julia Slupska and Leonie\u00a0Maria Tanczer. 2021. Threat modeling intimate partner violence: tech abuse as a cybersecurity challenge in the Internet of Things. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald Publishing Limited."},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376225"},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383652.3423906"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171221.3171275"},{"key":"e_1_3_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/663"},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1080\/09502386.2019.1671469"},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/3405755.3406123"},{"key":"e_1_3_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369807"},{"key":"e_1_3_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451623"},{"key":"e_1_3_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376760"},{"key":"e_1_3_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459990.3460730"},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555546"},{"key":"e_1_3_2_1_141_1","first-page":"69","article-title":"The impact of selected stakeholders on family business continuity and family harmony","volume":"16","author":"Venter Elmarie","year":"2012","unstructured":"Elmarie Venter, S Van\u00a0der Merwe, and Shelley Farrington. 2012. The impact of selected stakeholders on family business continuity and family harmony. Southern African Business Review 16, 2 (2012), 69\u201396.","journal-title":"Southern African Business Review"},{"key":"e_1_3_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106763"},{"key":"e_1_3_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428469"},{"key":"e_1_3_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2019.0205"},{"key":"e_1_3_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.169"},{"key":"e_1_3_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.33137\/ijournal.v6i1.35264"},{"key":"e_1_3_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404983.3405513"},{"key":"e_1_3_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/365153.365168"},{"key":"e_1_3_2_1_149_1","unstructured":"Mark West Rebecca Kraut and Han Ei\u00a0Chew. 2019. I\u2019d blush if I could: closing gender divides in digital skills through education. (2019)."},{"key":"e_1_3_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.21437"},{"key":"e_1_3_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-014-0813-0"},{"key":"e_1_3_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300772"},{"key":"e_1_3_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2019.04.005"},{"key":"e_1_3_2_1_154_1","first-page":"78","article-title":"Understanding anthropomorphisation in social robotics","volume":"16","author":"Zawieska Karolina","year":"2012","unstructured":"Karolina Zawieska, Brian\u00a0R Duffy, and A Stro\u0144ska. 2012. Understanding anthropomorphisation in social robotics. Pomiary Automatyka Robotyka 16, 11 (2012), 78\u201382.","journal-title":"Pomiary Automatyka Robotyka"},{"key":"e_1_3_2_1_155_1","volume-title":"28th { USENIX} Security Symposium ({ USENIX} Security 19). 159\u2013176.","author":"Zeng Eric","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In 28th { USENIX} Security Symposium ({ USENIX} Security 19). 159\u2013176."}],"event":{"name":"AIES '23: AAAI\/ACM Conference on AI, Ethics, and Society","location":"Montr\u00e9al QC Canada","acronym":"AIES '23","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"]},"container-title":["Proceedings of the 2023 AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600211.3604679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600211.3604679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:39Z","timestamp":1750178259000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600211.3604679"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,8]]},"references-count":155,"alternative-id":["10.1145\/3600211.3604679","10.1145\/3600211"],"URL":"https:\/\/doi.org\/10.1145\/3600211.3604679","relation":{},"subject":[],"published":{"date-parts":[[2023,8,8]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}