Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3679318.3685364acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnordichiConference Proceedingsconference-collections
research-article

Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱

Published: 13 October 2024 Publication History

Abstract

This paper explores the relationship between privacy concerns from voice assistant (VA) users and their persistent dependence on these devices for convenience. To gain a deeper understanding, we investigated using two studies. In the first study, we conducted semi-structured interviews with 13 participants, applying the lens of system justification theory. This approach enabled us to discover the cognitive and psychological mechanisms that people use when rationalizing and justifying their privacy versus convenience trade-off when using a VA. In the second study, we deployed VoxMox, a provotype, in three households. Our objective was to prompt participants to reflect more deeply on their privacy rationalizations and justifications, potentially motivating them to take action. Overall, our findings from both studies revealed several instances of apathetic attitudes toward privacy. We discuss privacy apathy in relation to the existing literature and offer research and design implications for breaking these attitudes in future studies.

Supplemental Material

ZIP File
Raw study data and analysis

References

[1]
Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security (Santa Clara, CA, USA) (SOUPS’19). USENIX Association, USA, 451–466.
[2]
Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum.-Comput. Interact. 4, CSCW2, Article 116 (oct 2020), 28 pages. https://doi.org/10.1145/3415187
[3]
Naja Kathrine Kollerup Als, Julie Corlin Mikkelsen, and Dimitrios Raptis. 2022. The Troubling Cups: Making Trouble at Work about Inequalities in Pay. In Nordic Human-Computer Interaction Conference (Aarhus, Denmark) (NordiCHI ’22). Association for Computing Machinery, New York, NY, USA, Article 45, 12 pages. https://doi.org/10.1145/3546155.3546679
[4]
Irwin Altman. 1975. The environment and social behavior: privacy, personal space, territory, and crowding. (1975).
[5]
Noah Apthorpe, Pardis Emami-Naeini, Arunesh Mathur, Marshini Chetty, and Nick Feamster. 2022. You, Me, and IoT: How Internet-Connected Consumer Devices Affect Interpersonal Relationships. ACM Trans. Internet Things 3, 4, Article 25 (sep 2022), 29 pages. https://doi.org/10.1145/3539737
[6]
Yannik Augustin, Astrid Carolus, and Carolin Wienrich. 2022. Privacy of AI-Based Voice Assistants: Understanding the Users’ Perspective: A Purposive Review and a Roadmap for Elevating Research on Privacy from a User-Oriented Perspective. In International Conference on Human-Computer Interaction. Springer, 309–321.
[7]
Shaowen Bardzell, Jeffrey Bardzell, Jodi Forlizzi, John Zimmerman, and John Antanitis. 2012. Critical Design and Critical Theory: The Challenge of Designing for Provocation. In Proceedings of the Designing Interactive Systems Conference (Newcastle Upon Tyne, United Kingdom) (DIS ’12). Association for Computing Machinery, New York, NY, USA, 288–297. https://doi.org/10.1145/2317956.2318001
[8]
Eric P.S. Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI ’15). Association for Computing Machinery, New York, NY, USA, 3295–3298. https://doi.org/10.1145/2702123.2702147
[9]
Andrea J Bingham and Patricia Witkowsky. 2021. Deductive and inductive approaches to qualitative data analysis. Analyzing and interpreting qualitative data: After the interview (2021), 133–146.
[10]
Laurens Boer and Jared Donovan. 2012. Provotypes for Participatory Innovation. In Proceedings of the Designing Interactive Systems Conference (Newcastle Upon Tyne, United Kingdom) (DIS ’12). Association for Computing Machinery, New York, NY, USA, 388–397. https://doi.org/10.1145/2317956.2318014
[11]
Laurens Boer, Jared Donovan, and Jacob Buur. 2013. Challenging industry conceptions with provotypes. CoDesign 9, 2 (2013), 73–89.
[12]
Virginia Braun, Victoria Clarke, Nikki Hayfield, Hannah Frith, Helen Malson, Naomi Moller, and Iduna Shah-Beckley. 2019. Qualitative story completion: Possibilities and potential pitfalls. Qualitative Research in Psychology 16, 1 (2019), 136–155.
[13]
Ryan Calo. 2011. Against notice skepticism in privacy (and elsewhere). Notre Dame L. Rev. 87 (2011), 1027.
[14]
George Chalhoub, Martin J Kraemer, Norbert Nthala, and Ivan Flechais. 2021. “It Did Not Give Me an Option to Decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 555, 16 pages. https://doi.org/10.1145/3411764.3445691
[15]
David Chatting, Nick Taylor, and Jon Rogers. 2021. Design for Reappearance in Smart Technologies. In CSCW 2021 Workshop on Designing for Data Awareness.
[16]
Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, and Haitao Zheng. 2020. Wearable Microphone Jamming. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3313831.3376304
[17]
Zhenfang Chen, Daragh Byrne, and Dina EL-Zanfaly. 2022. Google Home, Listen: Building Helper Intelligences for Non-Verbal Sound. In Proceedings of the 14th Conference on Creativity and Cognition (Venice, Italy) (C&C ’22). Association for Computing Machinery, New York, NY, USA, 619–622. https://doi.org/10.1145/3527927.3535202
[18]
Naver Clova. [n.d.]. Naver Clova, Brown and Sally, howpublished = "https://linecorp.com/en/pr/news/en/2018/2219", year = 2023, note = "[Online; accessed 12-September-2023]".
[19]
Naver Clova. [n.d.]. Naver Clova, Homepage, howpublished = "https://clova.ai/speech/en", year = 2023, note = "[Online; accessed 12-September-2023]".
[20]
Melissa Dahl. 2018. Cringeworthy: A theory of awkwardness. Penguin.
[21]
Christian Debes, Andreas Merentitis, Sergey Sukhanov, Maria Niessen, Nikolaos Frangiadakis, and Alexander Bauer. 2016. Monitoring Activities of Daily Living in Smart Homes: Understanding human behavior. IEEE Signal Processing Magazine 33, 2 (2016), 81–94. https://doi.org/10.1109/MSP.2015.2503881
[22]
Audrey Desjardins, Timea Tihanyi, Freesoul El Shabazz-Thompson, Brock Craft, and Julia Saimo. 2023. THE INNER EAR: CAPTURING AND PHYSICALIZING HOME VIBRATIONS. In Proceedings of the 2023 ACM Designing Interactive Systems Conference (Pittsburgh, PA, USA) (DIS ’23). Association for Computing Machinery, New York, NY, USA, 594–607. https://doi.org/10.1145/3563657.3596070
[23]
Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory D. Abowd, and Sauvik Das. 2023. Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 2473–2490. https://www.usenix.org/conference/usenixsecurity23/presentation/do
[24]
Nora A Draper and Joseph Turow. 2019. The corporate cultivation of digital resignation. New media & society 21, 8 (2019), 1824–1839.
[25]
Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (Santa Clara, CA, USA) (SOUPS ’17). USENIX Association, USA, 399–412.
[26]
William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2014. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. ACM Trans. Comput. Syst. 32, 2, Article 5 (jun 2014), 29 pages. https://doi.org/10.1145/2619091
[27]
Christine Geeng and Anonymous Author. 2020. EGregor: An Eldritch Privacy Mental Model for Smart Assistants. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI EA ’20). Association for Computing Machinery, New York, NY, USA, 1–9. https://doi.org/10.1145/3334480.3381827
[28]
Christine Geeng and Franziska Roesner. 2019. Who’s In Control? Interactions In Multi-User Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3290605.3300498
[29]
Julia Hanson, Miranda Wei, Sophie Veys, Matthew Kugler, Lior Strahilevitz, and Blase Ur. 2020. Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers’ Privacy Perceptions and Decisions to Disclose Private Information. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3313831.3376415
[30]
Eszter Hargittai and Alice Marwick. 2016. “What can I really do?” Explaining the privacy paradox with online apathy. International journal of communication 10 (2016), 21.
[31]
Hilary Hutchinson, Wendy Mackay, Bo Westerlund, Benjamin B. Bederson, Allison Druin, Catherine Plaisant, Michel Beaudouin-Lafon, Stéphane Conversy, Helen Evans, Heiko Hansen, Nicolas Roussel, and Björn Eiderbäck. 2003. Technology probes: inspiring design for and with families. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Ft. Lauderdale, Florida, USA) (CHI ’03). Association for Computing Machinery, New York, NY, USA, 17–24. https://doi.org/10.1145/642611.642616
[32]
Rikke Hagensby Jensen, Enrique Encinas, and Dimitrios Raptis. 2022. Spicing It Up: From Ubiquitous Devices to Tangible Things Through Provocation. In Sixteenth International Conference on Tangible, Embedded, and Embodied Interaction (Daejeon, Republic of Korea) (TEI ’22). Association for Computing Machinery, New York, NY, USA, Article 33, 15 pages. https://doi.org/10.1145/3490149.3502257
[33]
John T Jost, Mahzarin R Banaji, and Brian A Nosek. 2004. A decade of system justification theory: Accumulated evidence of conscious and unconscious bolstering of the status quo. Political psychology 25, 6 (2004), 881–919.
[34]
Frederike Jung, Kai von Holdt, Ronja Krüger, Jochen Meyer, and Wilko Heuten. 2022. I Do. Do I? – Understanding User Perspectives on the Privacy Paradox. In Proceedings of the 25th International Academic Mindtrek Conference (Tampere, Finland) (Academic Mindtrek ’22). Association for Computing Machinery, New York, NY, USA, 268–277. https://doi.org/10.1145/3569219.3569358
[35]
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A "Nutrition Label" for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security (Mountain View, California, USA) (SOUPS ’09). Association for Computing Machinery, New York, NY, USA, Article 4, 12 pages. https://doi.org/10.1145/1572532.1572538
[36]
Julie A. Kientz, Shwetak N. Patel, Brian Jones, Ed Price, Elizabeth D. Mynatt, and Gregory D. Abowd. 2008. The Georgia Tech Aware Home. In CHI ’08 Extended Abstracts on Human Factors in Computing Systems (Florence, Italy) (CHI EA ’08). Association for Computing Machinery, New York, NY, USA, 3675–3680. https://doi.org/10.1145/1358628.1358911
[37]
Tore Knudsen. [n.d.]. Project Alias, Homepage, howpublished = "https://www.toreknudsen.dk/work/project-alias", year = 2023, note = "[Online; accessed 12-September-2023]".
[38]
Marion Koelle, Katrin Wolf, and Susanne Boll. 2018. Beyond LED Status Lights - Design Requirements of Privacy Notices for Body-worn Cameras. In Proceedings of the Twelfth International Conference on Tangible, Embedded, and Embodied Interaction(TEI ’18). Association for Computing Machinery, New York, NY, USA, 177–187. https://doi.org/10.1145/3173225.3173234
[39]
Vinay Koshy, Joon Sung Sung Park, Ti-Chung Cheng, and Karrie Karahalios. 2021. “We Just Use What They Give Us”: Understanding Passenger User Perspectives in Smart Homes. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 41, 14 pages. https://doi.org/10.1145/3411764.3445598
[40]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening? Privacy Perceptions, Concerns and Privacy-Seeking Behaviors with Smart Speakers. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 102 (nov 2018), 31 pages. https://doi.org/10.1145/3274371
[41]
Natalia Lavado-Nalvaiz, Laura Lucia-Palacios, and Raúl Pérez-López. 2022. The role of the humanisation of smart home speakers in the personalisation–privacy paradox. Electronic Commerce Research and Applications 53 (2022), 101146. https://doi.org/10.1016/j.elerap.2022.101146
[42]
Kun Liu, Kun Fu, Jing Yu Yang, and Ahmad Al Asady. 2023. A system justification theory of entrepreneurial attitudinal change during a crisis. Entrepreneurship Theory and Practice 47, 3 (2023), 893–923.
[43]
Christoph Lutz, Christian Pieter Hoffmann, and Giulia Ranzini. 2020. Data capitalism and the user: An exploration of privacy cynicism in Germany. New media & society 22, 7 (2020), 1168–1187.
[44]
Shrirang Mare, Logan Girvin, Franziska Roesner, and Tadayoshi Kohno. 2019. Consumer Smart Homes: Where We Are and Where We Need to Go. In Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications (Santa Cruz, CA, USA) (HotMobile ’19). Association for Computing Machinery, New York, NY, USA, 117–122. https://doi.org/10.1145/3301293.3302371
[45]
Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. 2020. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts.Proc. Priv. Enhancing Technol. 2020, 2 (2020), 436–458.
[46]
Karola Marky, Sarah Prange, Florian Krell, Max Mühlhäuser, and Florian Alt. 2020. “You Just Can’t Know about Everything”: Privacy Perceptions of Smart Home Visitors. In Proceedings of the 19th International Conference on Mobile and Ubiquitous Multimedia (Essen, Germany) (MUM ’20). Association for Computing Machinery, New York, NY, USA, 83–95. https://doi.org/10.1145/3428361.3428464
[47]
Nora McDonald and Andrea Forte. 2020. The Politics of Privacy Theories: Moving from Norms to Vulnerabilities. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10.1145/3313831.3376167
[48]
Preben Mogensen. 1992. Towards a Provotyping Approach in Systems Development.Scand. J. Inf. Syst. 4, 1 (1992), 5.
[49]
Adam D Moore. 2015. Privacy rights: Moral and legal foundations. Penn State Press.
[50]
Aarthi Easwara Moorthy and Kim-Phuong L. Vu. 2015. Privacy Concerns for Use of Voice Activated Personal Assistant in the Public Space. International Journal of Human–Computer Interaction 31, 4 (2015), 307–335. https://doi.org/10.1080/10447318.2014.986642 arXiv:https://doi.org/10.1080/10447318.2014.986642
[51]
Guillaume Nadon, Marcus Feilberg, Mathias Johansen, and Irina Shklovski. 2018. In the User We Trust: Unrealistic Expectations of Facebook’s Privacy Mechanisms. In Proceedings of the 9th International Conference on Social Media and Society (Copenhagen, Denmark) (SMSociety ’18). Association for Computing Machinery, New York, NY, USA, 138–149. https://doi.org/10.1145/3217804.3217906
[52]
Jaime L Napier, Anesu N Mandisodza, Susan M Andersen, and John T Jost. 2006. System justification in responding to the poor and displaced in the aftermath of Hurricane Katrina. Analyses of social issues and public policy 6, 1 (2006), 57–73.
[53]
Helen Nissenbaum. 2009. Privacy in context. In Privacy in Context. Stanford University Press.
[54]
Sandra Petronio. 2002. Boundaries of privacy: Dialectics of disclosure. Suny Press.
[55]
James Pierce, Sarah Fox, Nick Merrill, and Richmond Wong. 2018. Differential Vulnerabilities and a Diversity of Tactics: What Toolkits Teach Us about Cybersecurity. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 139 (nov 2018), 24 pages. https://doi.org/10.1145/3274408
[56]
Dimitrios Raptis, Rikke Hagensby Jensen, Jesper Kjeldskov, and Mikael B. Skov. 2017. Aesthetic, Functional and Conceptual Provocation in Research Through Design. In Proceedings of the 2017 Conference on Designing Interactive Systems (Edinburgh, United Kingdom) (DIS ’17). Association for Computing Machinery, New York, NY, USA, 29–41. https://doi.org/10.1145/3064663.3064739
[57]
Jon Rogers, Loraine Clarke, Martin Skelly, Nick Taylor, Pete Thomas, Michelle Thorne, Solana Larsen, Katarzyna Odrozek, Julia Kloiber, Peter Bihr, Anab Jain, Jon Arden, and Max von Grafenstein. 2019. Our Friends Electric: Reflections on Advocacy and Design Research for the Voice Enabled Internet. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3290605.3300344
[58]
Alex Sciuto, Arnita Saini, Jodi Forlizzi, and Jason I. Hong. 2018. "Hey Alexa, What’s Up?": A Mixed-Methods Studies of In-Home Conversational Agent Usage. In Proceedings of the 2018 Designing Interactive Systems Conference (Hong Kong, China) (DIS ’18). Association for Computing Machinery, New York, NY, USA, 857–868. https://doi.org/10.1145/3196709.3196772
[59]
John S. Seberger, Marissel Llavore, Nicholas Nye Wyant, Irina Shklovski, and Sameer Patil. 2021. Empowering Resignation: There’s an App for That. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 552, 18 pages. https://doi.org/10.1145/3411764.3445293
[60]
John S. Seberger, Irina Shklovski, Emily Swiatek, and Sameer Patil. 2022. Still Creepy After All These Years:The Normalization of Affective Discomfort in App Use. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI ’22). Association for Computing Machinery, New York, NY, USA, Article 159, 19 pages. https://doi.org/10.1145/3491102.3502112
[61]
William Seymour, Martin J. Kraemer, Reuben Binns, and Max Van Kleek. 2020. Informing the Design of Privacy-Empowering Tools for the Connected Home. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10.1145/3313831.3376264
[62]
William Seymour and Max Van Kleek. 2020. Does Siri Have a Soul? Exploring Voice Assistants Through Shinto Design Fictions. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI EA ’20). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3334480.3381809
[63]
Sujay Shalawadi, Christopher Getschmann, Niels van Berkel, and Florian Echtler. 2024. Manual, Hybrid, and Automatic Privacy Covers for Smart Home Cameras. In Proceedings of the 2024 ACM Designing Interactive Systems Conference (IT University of Copenhagen, Denmark) (DIS ’24). Association for Computing Machinery, New York, NY, USA, 3453–3470. https://doi.org/10.1145/3643834.3661569
[64]
Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI ’14). Association for Computing Machinery, New York, NY, USA, 2347–2356. https://doi.org/10.1145/2556288.2557421
[65]
Michael Shorter, Bettina Minder, Jon Rogers, Matthias Baldauf, Aurelio Todisco, Sabine Junginger, Aysun Aytaç, and Patricia Wolf. 2022. Materialising the Immaterial: Provotyping to Explore Voice Assistant Complexities. In Proceedings of the 2022 ACM Designing Interactive Systems Conference (Virtual Event, Australia) (DIS ’22). Association for Computing Machinery, New York, NY, USA, 1512–1524. https://doi.org/10.1145/3532106.3533519
[66]
Daniel J Solove. 2005. A taxonomy of privacy. U. Pa. l. Rev. 154 (2005), 477.
[67]
Daniel J Solove. 2008. Understanding privacy. (2008).
[68]
Daniel J Solove. 2012. Introduction: Privacy self-management and the consent dilemma. Harv. L. Rev. 126 (2012), 1880.
[69]
Daniel J Solove. 2021. The myth of the privacy paradox. Geo. Wash. L. Rev. 89 (2021), 1.
[70]
Kevin M. Storer, Tejinder K. Judge, and Stacy M. Branham. 2020. "All in the Same Boat": Tradeoffs of Voice Assistant Ownership for Mixed-Visual-Ability Families. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10.1145/3313831.3376225
[71]
Yolande Strengers and Jenny Kennedy. 2021. The smart wife: Why Siri, Alexa, and other smart home devices need a feminist reboot. Mit Press.
[72]
Madiha Tabassum, Tomasz Kosiński, Alisa Frik, Nathan Malkin, Primal Wijesekera, Serge Egelman, and Heather Richter Lipford. 2020. Investigating Users’ Preferences and Expectations for Always-Listening Voice Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3, 4, Article 153 (sep 2020), 23 pages. https://doi.org/10.1145/3369807
[73]
Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. "I don’t own the data": End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 435–450. https://www.usenix.org/conference/soups2019/presentation/tabassum
[74]
Nick Taylor, Jon Rogers, Loraine Clarke, Martin Skelly, Jayne Wallace, Pete Thomas, Babitha George, Romit Raj, Mike Shorter, and Michelle Thorne. 2021. Prototyping Things: Reflecting on Unreported Objects of Design Research for IoT. In Proceedings of the 2021 ACM Designing Interactive Systems Conference (Virtual Event, USA) (DIS ’21). Association for Computing Machinery, New York, NY, USA, 1807–1816. https://doi.org/10.1145/3461778.3462037
[75]
Christian Tiefenau, Maximilian Häring, Eva Gerlitz, and Emanuel von Zezschwitz. 2019. Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?arXiv preprint arXiv:1911.07701 (2019).
[76]
Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders versus intrusiveness: teens’ and parents’ perspectives on home-entryway surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing(UbiComp ’14). Association for Computing Machinery, New York, NY, USA, 129–139. https://doi.org/10.1145/2632048.2632107
[77]
Jennifer M Urban and Chris Jay Hoofnagle. 2014. The privacy pragmatic as privacy vulnerable. In Symposium on Usable Privacy and Security (SOUPS 2014) Workshop on Privacy Personas and Segmentation (PPS).
[78]
Jojanneke Van der Toorn and John T Jost. 2014. Twenty years of system justification theory: Introduction to the special issue on “Ideology and system justification processes”., 413–419 pages.
[79]
Rosa Van Koningsbruggen, Sujay Shalawadi, Eva Hornecker, and Florian Echtler. 2022. Frankie: Exploring How Self-Tracking Technologies Can Go from Data-Centred to Human-Centred. In Proceedings of the 21st International Conference on Mobile and Ubiquitous Multimedia (Lisbon, Portugal) (MUM ’22). Association for Computing Machinery, New York, NY, USA, 243–250. https://doi.org/10.1145/3568444.3568470
[80]
Adeola Wale-Kolade and Peter Axel Nielsen. 2016. Apathy Towards the Integration of Usability Work: A Case of System Justification. Interacting with Computers 28, 4 (June 2016), 437–450. https://doi.org/10.1093/iwc/iwv016 _eprint: https://academic.oup.com/iwc/article-pdf/28/4/437/6771899/iwv016.pdf.
[81]
Jayne Wallace, Jon Rogers, Michael Shorter, Pete Thomas, Martin Skelly, and Richard Cook. 2018. The SelfReflector: Design, IoT and the High Street. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI ’18). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3173574.3173997
[82]
Alan F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166.
[83]
Maximiliane Windl, Albrecht Schmidt, and Sebastian S. Feger. 2023. Investigating Tangible Privacy-Preserving Mechanisms for Future Smart Homes. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (Hamburg, Germany) (CHI ’23). Association for Computing Machinery, New York, NY, USA, Article 70, 16 pages. https://doi.org/10.1145/3544548.3581167
[84]
Sara Wolf, Benedikt Steinmüller, Frauke Mörike, Simon Luthe, and Jörn Hurtienne. 2023. The God-I-Box: Iteratively Provotyping Technology-Mediated Worship Services. In Proceedings of the 2023 ACM Designing Interactive Systems Conference (Pittsburgh, PA, USA) (DIS ’23). Association for Computing Machinery, New York, NY, USA, 1710–1723. https://doi.org/10.1145/3563657.3596029
[85]
Richmond Y. Wong, Jason Caleb Valdez, Ashten Alexander, Ariel Chiang, Olivia Quesada, and James Pierce. 2023. Broadening Privacy and Surveillance: Eliciting Interconnected Values with a Scenarios Workbook on Smart Home Cameras. In Proceedings of the 2023 ACM Designing Interactive Systems Conference (, Pittsburgh, PA, USA, ) (DIS ’23). Association for Computing Machinery, New York, NY, USA, 1093–1113. https://doi.org/10.1145/3563657.3596012
[86]
Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (Nov. 2019), 59:1–59:24. https://doi.org/10.1145/3359161
[87]
Jason C. Yip, Kiley Sobel, Xin Gao, Allison Marie Hishikawa, Alexis Lim, Laura Meng, Romaine Flor Ofiana, Justin Park, and Alexis Hiniker. 2019. Laughing is Scary, but Farting is Cute: A Conceptual Model of Children’s Perspectives of Creepy Technologies. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–15. https://doi.org/10.1145/3290605.3300303
[88]
Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 159–176. https://www.usenix.org/conference/usenixsecurity19/presentation/zeng
[89]
Hui Zhang, Munmun De Choudhury, and Jonathan Grudin. 2014. Creepy but Inevitable? The Evolution of Social Networking. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (Baltimore, Maryland, USA) (CSCW ’14). Association for Computing Machinery, New York, NY, USA, 368–378. https://doi.org/10.1145/2531602.2531685
[90]
Shoshana Zuboff. 2019. The age of surveillance capitalism: The fight for a human future at the new frontier of power: Barack Obama’s books of 2019. Profile books.

Index Terms

  1. Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    NordiCHI '24: Proceedings of the 13th Nordic Conference on Human-Computer Interaction
    October 2024
    1236 pages
    ISBN:9798400709661
    DOI:10.1145/3679318
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 October 2024

    Check for updates

    Author Tags

    1. apathy
    2. privacy
    3. provotype
    4. self-cringe
    5. system justification theory
    6. voice assistants

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    Conference

    NordiCHI 2024

    Acceptance Rates

    Overall Acceptance Rate 379 of 1,572 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Oct 2024

    Other Metrics

    Citations

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media