Skip to main content

Analysing the Use of Voice Assistants in Domestic Settings Through the Lens of Activity Theory

  • Conference paper
  • First Online:
Human-Computer Interaction (HCII 2023)

Abstract

The paper analyses the use of voice assistants in people’s homes through the lens of activity theory guided by concepts such as mental models, context, the relationship between subject and tool as well as contradictions. Activity theory sees conversational devices including voice assistants not as ends in themselves, but as tools to aid the performance of a particular activity or practice. After a brief overview of the use of activity theory in HCI research, the empirical data gathered in an interdisciplinary project on the use of voice-enabled technology are discussed with a focus on the contradictions that have emerged in the course of our study. Contradictions have emerged with respect to the traditional view of home as private, which clashes with the fact that voice assistants may transmit personal data to external bodies. Another contradiction relates to the gulf between people’s expectations of smartness and the current shortcomings of commercial voice assistants. Finally, the paper presents suggestions for how one might design conversational technology in a way that helps resolve those contradictions and cope with the emerging phenomena such as autonomous agents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Swiss National Science Foundation under grant number SINERGIA CRSII5_189955.

  2. 2.

    See https://www.washingtonpost.com/technology/2022/06/11/google-ai-lamda-blake-lemoine).

References

  1. Ammari, T., Kaye, J., Tsai, J.Y., Bentley, F.: Music, search, and IoT: how people (really) use voice assistants. ACM Trans. Comput. Hum. Interact. 26(3), 1–17 (2019)

    Article  Google Scholar 

  2. Barth, S., de Jong, M.D., Junger, M., Hartel, P.H., Roppelt, J.C.: Putting the privacy paradox to the test: online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics Inform. 41, 55–69 (2019)

    Article  Google Scholar 

  3. Bender, E.M., Gebru, T., McMillan-Major, A., Shmitchell, S.: On the dangers of stochastic parrots: Can language models be too big? In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 610–623 (2021)

    Google Scholar 

  4. Blayone, T.J.: Theorising effective uses of digital technology with activity theory. Technol. Pedagog. Educ. 28(4), 447–462 (2019)

    Article  Google Scholar 

  5. Bødker, S.: Through the interface: a human activity approach to user interface design. CRC Press (2021)

    Google Scholar 

  6. Castells, M.: The Internet galaxy: Reflections on the Internet, business, and society. Oxford University Press on Demand (2002)

    Google Scholar 

  7. Clemmensen, T., Kaptelinin, V., Nardi, B.: Making HCI theory work: an analysis of the use of activity theory in HCI research. Behav. Inf. Technol. 35(8), 608–627 (2016)

    Article  Google Scholar 

  8. Corbin, J.M.: The Corbin and Strauss chronic illness trajectory model: an update. Res. Theory Nurs. Pract. 12(1), 33 (1998)

    Google Scholar 

  9. Engeström, Y.: Expansive learning at work: toward an activity theoretical reconceptualization. J. Educ. Work. 14(1), 133–156 (2001)

    Article  Google Scholar 

  10. Engeström, Y., Escalante, V.: Mundane tool or object of affection? The rise and fall of the postal buddy. Context and consciousness: Activity Theory and Human-Computer Interaction, pp. 325–373 (1996)

    Google Scholar 

  11. Floridi, L., Chiriatti, M.: GPT-3: Its nature, scope, limits, and consequences. Mind. Mach. 30(4), 681–694 (2020)

    Article  Google Scholar 

  12. Gerber, N., Gerber, P., Volkamer, M.: Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226–261 (2018)

    Article  Google Scholar 

  13. Graf, E., Zessinger, D.: Alexa, know your limits: developing a framework for the accepted and desired degree of product smartness for digital voice assistants. SN Business Econ. 2(6), 1–33 (2022)

    Article  Google Scholar 

  14. Jain, S., Basu, S., Dwivedi, Y.K., Kaur, S.: Interactive voice assistants - does brand credibility assuage privacy risks? J. Bus. Res. 139, 701–717 (2022)

    Article  Google Scholar 

  15. Kaptelinin, V., Nardi, B.: Activity theory in HCI: fundamentals and reflections. Synthesis Lect. Human-Centered Inform. 5(1), 1–105 (2012)

    Article  Google Scholar 

  16. Kaptelinin, V., Nardi, B.: Activity theory as a framework for human-technology interaction research (2018)

    Google Scholar 

  17. Karanasios, S., Nardi, B., Spinuzzi, C., Malaurent, J.: Moving forward with activity theory in a digital world. Mind Cult. Act. 28(3), 234–253 (2021)

    Article  Google Scholar 

  18. Kuuti, K.: Activity theory as a potential framework for HCI research. Context and Consciousness, Activity Theory and Human-Computer Interaction, The MIT Press, Cambridge, MA and London (2001)

    Google Scholar 

  19. Luger, E., Sellen, A.: “Like having a really bad PA”. The gulf between user expectation and experience of conversational agents. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 5286–5297 (2016)

    Google Scholar 

  20. Maier, E., Doerk, M., Muri, M., Reimer, U., Riss, U.: What does privacy mean to users of voice assistants in their homes? In: Proceedings ETHICOMP 2022, p. 300 (2022)

    Google Scholar 

  21. Marcus, G.: AI platforms like ChatGPT are easy to use but also potentially dangerous. Scientific American 12 (2022)

    Google Scholar 

  22. May, R., Denecke, K.: Security, privacy, and healthcare-related conversational agents: a scoping review. Inform. Health Soc. Care 47(2), 194–210 (2022)

    Article  Google Scholar 

  23. Newman, N.: Journalism, media and technology trends and predictions 2018. Reuters Institute for the Study of Journalism (2018)

    Google Scholar 

  24. Olafsson, S., O’Leary, T., Bickmore, T.: Coerced change-talk with conversational agents promotes confidence in behavior change. In: Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare, pp. 31–40 (2019)

    Google Scholar 

  25. Riss, U.V., Maier, E., Doerk, M.: Perceived risks of the data economy: autonomy and the case of voice assistants. In: Proceedings ETHICOMP 2022, p. 375 (2022)

    Google Scholar 

  26. Schwalb, P., Klecun, E.: The role of contradictions and norms in the design and use of telemedicine: healthcare professionals’ perspective. AIS Trans. Human-Comput. Interac. 11(3), 117–135 (2019)

    Article  Google Scholar 

  27. Seymour, W.: Re-thinking smartness: designing more ethical connected devices for the home, Ph. D. thesis, University of Oxford (2020)

    Google Scholar 

  28. Seymour, W., Van Kleek, M.: Exploring interactions between trust, anthropomorphism, and relationship development in voice assistants. Proceed. ACM Human-Comput. Inter. 5(CSCW2), 1–16 (2021)

    Article  Google Scholar 

  29. Shorter, M., et al.: Materialising the immaterial: Provotyping to explore voice assistant complexities. In: Designing Interactive Systems Conference, pp. 1512–1524 (2022)

    Google Scholar 

  30. Solove, D.J.: The myth of the privacy paradox. Geo. Wash. L. Rev. 89, 1 (2021)

    Google Scholar 

  31. Véliz, C.: Privacy is power. Melville House New York (2021)

    Google Scholar 

  32. Winegar, A.G., Sunstein, C.R.: How much is data privacy worth? A preliminary investigation. J. Consum. Policy 42, 425–440 (2019)

    Article  Google Scholar 

  33. Woll, A., Bratteteig, T.: Activity theory as a framework to analyze technology-mediated elderly care. Mind Cult. Act. 25(1), 6–21 (2018)

    Article  Google Scholar 

  34. Woźniak, P.W., et al.: Creepy technology: What is it and how do you measure it? In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1–13 (2021)

    Google Scholar 

  35. Zionchenko, V., Munipov, V.: Fundamentals of ergonomics. Ergon. Major Writings 1, 17–37 (2005)

    Google Scholar 

Download references

Acknowledgement

The research results presented in this paper are part of a project funded by Swiss National Science Foundation (http://dx.doi.org/10.13039/501100001711) under grant number SINERGIA CRSII5_189955.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ulrich Reimer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maier, E., Reimer, U. (2023). Analysing the Use of Voice Assistants in Domestic Settings Through the Lens of Activity Theory. In: Kurosu, M., Hashizume, A. (eds) Human-Computer Interaction. HCII 2023. Lecture Notes in Computer Science, vol 14013. Springer, Cham. https://doi.org/10.1007/978-3-031-35602-5_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35602-5_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35601-8

  • Online ISBN: 978-3-031-35602-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics