“Alexa, how do you protect my privacy?” A quantitative study of user preferences and requirements about smart speaker privacy settings

IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Computers & Security Pub Date : 2025-04-01 Epub Date: 2025-01-06 DOI:10.1016/j.cose.2024.104302
Luca Hernández Acosta, Delphine Reinhardt
{"title":"“Alexa, how do you protect my privacy?” A quantitative study of user preferences and requirements about smart speaker privacy settings","authors":"Luca Hernández Acosta,&nbsp;Delphine Reinhardt","doi":"10.1016/j.cose.2024.104302","DOIUrl":null,"url":null,"abstract":"<div><div>Voice assistants are becoming increasingly popular. While users may benefit from the convenience of voice interactions, the use of voice assistants raises privacy issues. To address them, existing voice assistants propose some privacy settings. However, we are lacking knowledge about (1) which privacy settings are important to users, (2) what are their preferences about their application, and (3) what are their requirements beyond existing privacy settings. Gaining such knowledge is important to understand why users may not use these settings and to identify which settings should be introduced to allow users to better protect their privacy. To this end, we have conducted a quantitative online study with 1,103 German smart speaker owners. Detailed insights are provided into how beliefs about data handling practices, usage of existing privacy settings, affinity for technology interaction, and privacy attitudes vary depending on the brand of smart speakers used by participants. These findings reveal discrepancies in user trust and preferences across different manufacturers. Additionally, statistical evaluations, including effect size calculations, are introduced, alongside expanded results with detailed explanations to enhance the contextual understanding of the findings. The study provides recommendations for manufacturers and policymakers to improve transparency, usability, and education on privacy settings. Practical guidelines for privacy-preserving features are included, advancing understanding of user needs and aiding in the design of better solutions. In addition to partly replicating findings obtained with different samples, the results show that the currently available privacy settings do not fully cover user requirements and indicate a general desire for more transparency and control over the collected data. Our results hence serve as basis for designing future privacy-preserving solutions.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"151 ","pages":"Article 104302"},"PeriodicalIF":5.4000,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824006084","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2025/1/6 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Voice assistants are becoming increasingly popular. While users may benefit from the convenience of voice interactions, the use of voice assistants raises privacy issues. To address them, existing voice assistants propose some privacy settings. However, we are lacking knowledge about (1) which privacy settings are important to users, (2) what are their preferences about their application, and (3) what are their requirements beyond existing privacy settings. Gaining such knowledge is important to understand why users may not use these settings and to identify which settings should be introduced to allow users to better protect their privacy. To this end, we have conducted a quantitative online study with 1,103 German smart speaker owners. Detailed insights are provided into how beliefs about data handling practices, usage of existing privacy settings, affinity for technology interaction, and privacy attitudes vary depending on the brand of smart speakers used by participants. These findings reveal discrepancies in user trust and preferences across different manufacturers. Additionally, statistical evaluations, including effect size calculations, are introduced, alongside expanded results with detailed explanations to enhance the contextual understanding of the findings. The study provides recommendations for manufacturers and policymakers to improve transparency, usability, and education on privacy settings. Practical guidelines for privacy-preserving features are included, advancing understanding of user needs and aiding in the design of better solutions. In addition to partly replicating findings obtained with different samples, the results show that the currently available privacy settings do not fully cover user requirements and indicate a general desire for more transparency and control over the collected data. Our results hence serve as basis for designing future privacy-preserving solutions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
“Alexa,你怎么保护我的隐私?”智能音箱隐私设置的用户偏好和需求的定量研究
语音助手正变得越来越受欢迎。虽然用户可能会从语音交互的便利性中受益,但语音助手的使用引发了隐私问题。为了解决这些问题,现有的语音助手提出了一些隐私设置。然而,我们缺乏关于(1)哪些隐私设置对用户来说是重要的,(2)他们对应用程序的偏好是什么,以及(3)他们在现有隐私设置之外的需求是什么。获得这些知识对于理解用户可能不使用这些设置的原因以及确定应该引入哪些设置以允许用户更好地保护其隐私非常重要。为此,我们对1103名德国智能音箱用户进行了定量在线研究。详细分析了数据处理实践、现有隐私设置的使用、对技术交互的亲和力和隐私态度如何因参与者使用的智能扬声器品牌而异。这些发现揭示了不同制造商在用户信任和偏好上的差异。此外,还介绍了统计评估,包括效应量计算,以及详细解释的扩展结果,以加强对研究结果的背景理解。该研究为制造商和政策制定者提供了建议,以提高隐私设置的透明度、可用性和教育。其中包括隐私保护功能的实用指导方针,促进对用户需求的理解并帮助设计更好的解决方案。除了部分复制不同样本获得的结果外,结果还表明,目前可用的隐私设置不能完全覆盖用户需求,并表明人们普遍希望对收集的数据有更多的透明度和控制。因此,我们的研究结果可以作为设计未来隐私保护解决方案的基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
期刊最新文献
Modeling of physical unclonable functions (PUF): A systematic literature review A hybrid machine learning and cryptography-based predictive probability model for enhancing security and privacy in cloud-IoT environment Empirical assessment of the code comprehension effort needed to attack programs protected with obfuscation Privacy-preserving VPN handshakes with Schnorr-based zero-knowledge proofs Human-factor vulnerabilities of automation in SOCs: A mixed-methods multigroup analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1