2017
DOI: 10.1109/mc.2017.3571053
|View full text |Cite
|
Sign up to set email alerts
|

“Alexa, Can I Trust You?”

Abstract: Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA) – diagnostics offer the possibility of securer IVA ecosystems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
110
0
5

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 204 publications
(120 citation statements)
references
References 3 publications
5
110
0
5
Order By: Relevance
“…Our finding about the value conflict between privacy and convenience is consistent with Chung et al‘s () observations about the privacy risks of digital assistants. Jackson and Orebaugh () provide a thorough discussion of the potential implications of digital assistants for users’ privacy in legal cases, such as Arkansas v. Bates , in which the state of Arkansas sought to compel Amazon to release recordings from an Amazon Echo that was in essence a witness to a murder.…”
Section: Discussionsupporting
confidence: 92%
See 1 more Smart Citation
“…Our finding about the value conflict between privacy and convenience is consistent with Chung et al‘s () observations about the privacy risks of digital assistants. Jackson and Orebaugh () provide a thorough discussion of the potential implications of digital assistants for users’ privacy in legal cases, such as Arkansas v. Bates , in which the state of Arkansas sought to compel Amazon to release recordings from an Amazon Echo that was in essence a witness to a murder.…”
Section: Discussionsupporting
confidence: 92%
“…Our finding about trust in the manufacturer echoed Chung et al‘s () argument that digital assistants need to be designed to be trustworthy. This finding is also consistent with Kelton et al‘s () observation that trust in information is derived in part from trust in the author of the information, so it is logical that a similar pattern applies for information technology.…”
Section: Discussionsupporting
confidence: 80%
“…SPAs have an agent program running on SPA-enabled devices (endpoints) such as Apple's iPhone, iPad, and Mac, Amazon's Echo or Google's Home. The main functionality, the "brain" of an SPA, is typically housed as a cloud service that uses machine learning and natural language processing techniques to handle voice data (converting voice-to-text, performing linguistic context analysis, and providing answers to questions, [14]). SPA providers offer rich ecosystems with intuitive interfaces that allow a large number of users to create their skills without having in-depth programming knowledge, thereby increasing SPA providers' own business value.…”
Section: Smart Personal Assistantsmentioning
confidence: 99%
“…If the data from the figure 5 is indicative of a trend of the popularity of virtual assistants, then we can extrapolate that virtual assistants will become commonly used by the public in the near future. It would then be advantageous for developers of virtual assistants to carefully consider the security aspect of developing these systems in order to ensure the overall safety of the public [8]. A software agent called Automated Nursing Agent (ANA) has tremendously improved how family members take care of their elderly loved ones by using the at-home elderly care methodology.…”
Section: Rq1 How Might a Component Based Approach Affect The Developmentioning
confidence: 99%