Abstract
In this paper we discuss the impact to home, work, and civil life from the deployment of continuous listening services. An example service we call the Continuous Speech Stream (CSS), would provide a real time list of keywords generated from the user’s spoken interactions with others. Based on a user-study that engaged 10 users to record a full day of audio for processing into a sample stream, we report the concerns expressed by our participants on being misrepresented by their speech, unintentionally sharing sensitive data, and being unable to curate their presentation of self. We offer an initial set of recommendations for the design, testing, and deployment of IoT based services built on such rich, personal data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Not in front of the telly: Warning over ’listening’ TV, BBC News, http://www.bbc.co.uk/news/technology-31296188 (accessed on February 25, 2015)
Bernd, C.S., Eden, G., et al.: Responsible research and innovation in infor-mation and communication technology: Identifying and engaging with the ethical implications of ICTs. Responsible Innovation 199 (1988)
Chon, Y., Lane, N.D., et al.: Understanding the coverage and scalability of place-centric crowdsensing. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 3–12. ACM (2013)
Espeland, W.N., Stevens, M.L.: A Sociology of Quantification. European Journal of Sociology / Archives Européennes de Sociologie 49(03), 401–436 (2008)
Fazel, A., Chakrabartty, S.: An overview of statistical pattern recognition techniques for speaker verification. IEEE Circuits and Systems Magazine 11(2), 62–81 (2011)
Kilgour, J., Carletta, J., et al.: The Ambient Spotlight: Queryless desktop search from meeting speech. In: Proceedings of the 2010 International Workshop on Searching Spontaneous Conversational Speech, pp. 49–52. ACM (2010)
Kozlov, D., Veijalainen, J., et al.: Security and privacy threats in IoT architec-tures. In: Proceedings of the 7th International Conference on Body Area Networks, pp. 256–262. ICST (Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering) (2012)
Kumar, A., Paek, T., et al.: Voice typing: a new speech interaction model for dictation on touchscreen devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2277–2286. ACM (2012)
Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of Westin’s studies (2005)
Lane, N.D., Miluzzo, E., et al.: A survey of mobile phone sensing. IEEE Communications Magazine 48(9), 140–150 (2010)
Lloret, E., Palomar, M.: Text summarisation in progress: a literature re-view. Artificial Intelligence Review 37(1), 1–41 (2012)
McMillan, D., Loriette, A., et al.: Repurposing Conversation: Experiments with the Continuous Speech Stream. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM (2015)
McMillan, D., Morrison, A., et al.: Categorised ethical guidelines for large scale mobile HCI. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1853–1862. ACM (2013)
Morris, I.: Apple’s Siri And Microsoft’s Cortana Record Your Voice, And Someone Is Listening, Forbes.com, http://forbes.com/2015/02/24/apples-siri-and-microsofts-cortana-record-your-voice-and-someone-is-listening/ (accessed on February 25, 2015 )
Morrison, A., McMillan, D., et al.: Improving consent in large scale mobile HCI through personalised representations of data. In: Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational, pp. 471–480. ACM (2014)
Oulasvirta, A., Pihlajamaa, A., et al.: Long-term effects of ubiquitous surveil-lance in the home. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp. 41–50. ACM (2012)
Owen, R., Macnaghten, P., et al.: Responsible research and innovation: From science in society to science for society, with society. Science and Public Policy 39(6), 751–760 (2012)
Pagliery, J.: FBI lets suspects go to protect ’Stingray’ secrets, CNN, http://money.cnn.com/2015/03/18/technology/security/police-stingray-phone-tracker/ (accessed on March 24, 2015)
Schoeman, F.D.: Philosophical dimensions of privacy: An anthology. Cambridge University Press (1984)
Tur, G., De Mori, R.: Spoken language understanding: Systems for ex-tracting semantic information from speech. John Wiley & Sons (2011)
Waibel, A., Schultz, T., et al.: SMaRT: The smart meeting room task at ISL. In: Proceedings of, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 754, pp. IV-752–IV-755. IEEE (2003)
Whittaker, S., Hirschberg, J., et al.: SCANMail: a voicemail interface that makes speech browsable, readable and searchable. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 275–282. ACM (2002)
Wyatt, D., Choudhury, T., et al.: Inferring colocation and conversation net-works from privacy-sensitive audio with implications for computational social sci-ence. ACM Transactions on Intelligent Systems and Technology (TIST)Â 2(1), 7 (2011)
Yankelovich, N., Levow, G.-A., et al.: Designing SpeechActs: Issues in speech user interfaces. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 369–376. ACM Press/Addison-Wesley Publishing Co. (1995)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
McMillan, D., Loriette, A. (2015). Living with Listening Services: Privacy and Control in IoT. In: Tiropanis, T., Vakali, A., Sartori, L., Burnap, P. (eds) Internet Science. INSCI 2015. Lecture Notes in Computer Science(), vol 9089. Springer, Cham. https://doi.org/10.1007/978-3-319-18609-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-18609-2_8
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18608-5
Online ISBN: 978-3-319-18609-2
eBook Packages: Computer ScienceComputer Science (R0)