{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T17:00:02Z","timestamp":1775581202925,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry for Economic Affairs and Energy","award":["01MK20011A"],"award-info":[{"award-number":["01MK20011A"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3617072.3617106","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:47:04Z","timestamp":1697219224000},"page":"296-311","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Privacy Strategies for Conversational AI and their Influence on Users' Perceptions and Decision-Making"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2994-2336","authenticated-orcid":false,"given":"Anna","family":"Leschanowsky","sequence":"first","affiliation":[{"name":"Fraunhofer IIS, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2193-9861","authenticated-orcid":false,"given":"Birgit","family":"Popp","sequence":"additional","affiliation":[{"name":"Fraunhofer IIS, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6758-4491","authenticated-orcid":false,"given":"Nils","family":"Peters","sequence":"additional","affiliation":[{"name":"International Audio Laboratories Erlangen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_3_1","volume-title":"Ambiguity and Privacy. In Workshop on the Economics of Information Security.","author":"Acquisti Alessandro","year":"2005","unstructured":"Alessandro Acquisti and Jens Grossklags. 2005. Uncertainty, Ambiguity and Privacy. In Workshop on the Economics of Information Security."},{"key":"e_1_3_2_1_4_1","volume-title":"Information Theory and an Extension of the Maximum Likelihood Principle","author":"Akaike Hirotogu","unstructured":"Hirotogu Akaike. 1998. Information Theory and an Extension of the Maximum Likelihood Principle. Springer New York, New York, NY, 199\u2013213."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2020.0931"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_2_1_7_1","volume-title":"Privacy in Speech Interfaces","author":"B\u00e4ckstr\u00f6m Tom","unstructured":"Tom B\u00e4ckstr\u00f6m, Birgit Br\u00fcggemeier, and Johannes Fischer. 2020. Privacy in Speech Interfaces. VDE Verlag, Germany. 11\u201314 pages."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476087"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01582-9"},{"key":"e_1_3_2_1_11_1","unstructured":"H Brignull M Leiser C Santos and K Doshi. 2023. Deceptive patterns \u2013 user interfaces designed to trick you. https:\/\/www.deceptive.design\/"},{"key":"e_1_3_2_1_12_1","volume-title":"SUS-A quick and dirty usability scale. Usability evaluation in industry 189, 194","author":"John Brooke","year":"1996","unstructured":"John Brooke 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry 189, 194 (1996), 4\u20137."},{"key":"e_1_3_2_1_13_1","volume-title":"HCI International 2020 - Late Breaking Papers: User Experience Design and Case Studies, Constantine Stephanidis, Aaron Marcus, Elizabeth Rosenzweig, Pei-Luen\u00a0Patrick Rau","author":"Br\u00fcggemeier Birgit","unstructured":"Birgit Br\u00fcggemeier, Michael Breiter, Miriam Kurz, and Johanna Schiwy. 2020. User Experience of Alexa, Siri and Google Assistant When Controlling Music \u2013 Comparison of Four Questionnaires. In HCI International 2020 - Late Breaking Papers: User Experience Design and Case Studies, Constantine Stephanidis, Aaron Marcus, Elizabeth Rosenzweig, Pei-Luen\u00a0Patrick Rau, Abbas Moallem, and Matthias Rauterberg (Eds.). Springer International Publishing, Cham, 600\u2013618."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101269"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449287"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300488"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650212450585"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1108\/ACI-06-2022-0148"},{"key":"e_1_3_2_1_20_1","unstructured":"European Commission. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Thomas Gro\u00df. 2020. Validity and Reliability of the Scale Internet Users\u2019 Information Privacy Concern (IUIPC) [Extended Version].","DOI":"10.2478\/popets-2021-0026"},{"key":"e_1_3_2_1_22_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). Twelth Symposium On Usable Privacy and Security (SOUPS","author":"Harkous Hamza","year":"2016","unstructured":"Hamza Harkous, Kassem Fawaz, Kang\u00a0G. Shin, and Karl Aberer. 2016. PriBots: Conversational Privacy with Chatbots, In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). Twelth Symposium On Usable Privacy and Security (SOUPS 2016)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.47.11.1383"},{"key":"e_1_3_2_1_24_1","unstructured":"ITU-T P.808. 2021. Subjective Evaluation of Speech Quality with a Crowdsourcing Approach."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340330"},{"key":"e_1_3_2_1_26_1","volume-title":"fast and slow. Farrar, Straus and Giroux","author":"Kahneman Daniel","unstructured":"Daniel Kahneman. 2011. Thinking, fast and slow. Farrar, Straus and Giroux, New York."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78468-3_24"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmjqs-2015-004417"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_1_30_1","volume-title":"Conducting Research Using Crowdsourcing Platforms: Best Practices. https:\/\/research.cc.lehigh.edu\/crowdsourcing. [Online","author":"Lehigh University","year":"2022","unstructured":"Lehigh University. 2022. Conducting Research Using Crowdsourcing Platforms: Best Practices. https:\/\/research.cc.lehigh.edu\/crowdsourcing. [Online; accessed 2022-01-27]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.21437\/SPSC.2021-16"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35921-7_14"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_34_1","volume-title":"Consumer Market Research Handbook","author":"Marton-Williams J.","unstructured":"J. Marton-Williams. 1986. Questionnaire design, Consumer Market Research Handbook. McGraw-Hill Book Company, London."},{"key":"e_1_3_2_1_35_1","volume-title":"Situational Privacy and Self-Disclosure","author":"Masur K.","unstructured":"Philipp\u00a0K. Masur. 2019. Situational Privacy and Self-Disclosure. Springer International Publishing, Cham."},{"key":"e_1_3_2_1_36_1","unstructured":"Open\u00a0Voice Network. 2022. Privacy Principles and Capabilities Unique to Voice."},{"key":"e_1_3_2_1_37_1","volume-title":"International Journal of Manpower 37 (07","author":"Neumann Oliver","year":"2016","unstructured":"Oliver Neumann. 2016. Does misfit loom larger than fit? Experimental evidence on motivational person-job fit, public service motivation, and prospect theory. International Journal of Manpower 37 (07 2016), 822\u2013839."},{"key":"e_1_3_2_1_38_1","volume-title":"California Consumer Privacy Act. https:\/\/theccpa.org\/. [Online","author":"State of California. 2018.","year":"2023","unstructured":"State of California. 2018. California Consumer Privacy Act. https:\/\/theccpa.org\/. [Online; accessed 2023-02-11]."},{"key":"e_1_3_2_1_39_1","volume-title":"California Consumer Privacy Rights Act. https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5. [Online","author":"State of California. 2020.","year":"2023","unstructured":"State of California. 2020. California Consumer Privacy Rights Act. https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5. [Online; accessed 2023-02-11]."},{"key":"e_1_3_2_1_40_1","unstructured":"National People\u2019s\u00a0Congress of\u00a0the People\u2019s Republic\u00a0of China. 2020. Personal Information Protection Law of the People\u2019s Republic of China. https:\/\/digichina.stanford.edu\/work\/translation-personal-information-protection-law-of-the-peoples-republic-of-china-effective-nov-1-2021\/. [Online; accessed 2023-02-11]."},{"key":"e_1_3_2_1_41_1","volume-title":"Virginia Consumer Data Protection Act. https:\/\/law.lis.virginia.gov\/vacode\/title59.1\/chapter53\/section59.1-577\/. [Online","author":"Virginia Commonwealth","year":"2023","unstructured":"Commonwealth of Virginia. 2021. Virginia Consumer Data Protection Act. https:\/\/law.lis.virginia.gov\/vacode\/title59.1\/chapter53\/section59.1-577\/. [Online; accessed 2023-02-11]."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554213"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148783"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0086"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-022-01864-x"},{"key":"e_1_3_2_1_46_1","volume-title":"Quantifying the user experience: practical statistics for user research","author":"Sauro Jeff","unstructured":"Jeff Sauro and James\u00a0R. Lewis. 2016. Quantifying the user experience: practical statistics for user research (2nd edition ed.). Elsevier, Morgan Kaufmann, Amsterdam Boston Heidelberg.","edition":"2"},{"key":"e_1_3_2_1_47_1","volume-title":"Usable and useful privacy interfaces. An Introduction to Privacy for Technology Professionals","author":"Schaub Florian","year":"2020","unstructured":"Florian Schaub and Lorrie\u00a0Faith Cranor. 2020. Usable and useful privacy interfaces. An Introduction to Privacy for Technology Professionals (2020), 176\u2013299."},{"key":"e_1_3_2_1_48_1","volume-title":"Internet users","author":"Schomakers Eva-Maria","year":"2019","unstructured":"Eva-Maria Schomakers, Chantal Lidynia, Dirk M\u00fcllmann, and Martina Ziefle. 2019. Internet users\u2019 perceptions of information sensitivity \u2013 insights from Germany. International Journal of Information Management 46 (June 2019), 142\u2013150."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176344136"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1214\/10-STS330"},{"key":"e_1_3_2_1_51_1","unstructured":"Katie Teague. 2021. Amazon Apple and Google are always listening: How to opt out and delete your voice recordings - CNET. https:\/\/www.cnet.com\/home\/smart-home\/alexa-delete-what-i-just-said-heres-how-to-prevent-amazon-from-listening-in\/. [Online; accessed 2021-12-13]."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwc"},{"key":"e_1_3_2_1_53_1","volume-title":"Yale University Press","author":"Thaler H.","unstructured":"Richard\u00a0H. Thaler and Cass\u00a0R. Sunstein. 2008. Nudge. Yale University Press, New Haven, CT and London."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116688035"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03206482"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488038"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134748"},{"key":"e_1_3_2_1_59_1","first-page":"3","article-title":"Measuring Hofstede\u2019s Five Dimensions of Cultural Values at the Individual Level: Development and Validation of CVSCALE","volume":"23","author":"Yoo Boonghee","year":"2011","unstructured":"Boonghee Yoo, Naveen Donthu, and Tomasz Lenartowicz. 2011. Measuring Hofstede\u2019s Five Dimensions of Cultural Values at the Individual Level: Development and Validation of CVSCALE. Journal of International Consumer Marketing 23, 3-4 (2011), 193\u2013210.","journal-title":"Journal of International Consumer Marketing"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00424-4"}],"event":{"name":"EuroUSEC 2023: The 2023 European Symposium on Usable Security","location":"Copenhagen Denmark","acronym":"EuroUSEC 2023"},"container-title":["Proceedings of the 2023 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:07Z","timestamp":1750178167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":60,"alternative-id":["10.1145\/3617072.3617106","10.1145\/3617072"],"URL":"https:\/\/doi.org\/10.1145\/3617072.3617106","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}