2021 ISCA Symposium on Security and Privacy in Speech Communication 2021
DOI: 10.21437/spsc.2021-12
|View full text |Cite
|
Sign up to set email alerts
|

Intuitive Privacy from Acoustic Reach: A Case for Networked Voice User-Interfaces

Abstract: The effect that advances in voice interface technologies have on privacy has not yet received the attention it deserves. Systems in which multiple devices collaborate to provide a unified user-interface amplify those worries about privacy. We discuss ethical implications of voice enabled devices on privacy in typical scenarios at home, office, in a car and in the public. From our findings, it follows that the reach of voice can be exploited as a feature to intuitively define the extent of privacy. In particula… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…It is important to consider that users have an intuition and can be assumed to be competent to gauge their level of privacy and security only when it relates to human capabilities [309], [310]. However, where computer systems go beyond human, to super-human capabilities, users generally cannot be expected to have an intuition with respect to their security and privacy when they interact with the system.…”
Section: K Ethics Privacy Security and Sustainabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…It is important to consider that users have an intuition and can be assumed to be competent to gauge their level of privacy and security only when it relates to human capabilities [309], [310]. However, where computer systems go beyond human, to super-human capabilities, users generally cannot be expected to have an intuition with respect to their security and privacy when they interact with the system.…”
Section: K Ethics Privacy Security and Sustainabilitymentioning
confidence: 99%
“…For example, data intentionally shared can unintentionally leak related information or, as a form of function creep, data can be used in unexpected ways. Moreover, users' ignorance can lead to breaches, they can be tricked or coerced to share information, or their hardware or service providers can be hacked [313]. As a general policy, it is therefore important to develop products and services using the privacy-by-design approach, where the design and development process includes, from the beginning, impact assessment of security and privacy.…”
Section: K Ethics Privacy Security and Sustainabilitymentioning
confidence: 99%