Skip to main content

Living with Listening Services: Privacy and Control in IoT

  • Conference paper
Internet Science (INSCI 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9089))

Included in the following conference series:

  • 1985 Accesses

Abstract

In this paper we discuss the impact to home, work, and civil life from the deployment of continuous listening services. An example service we call the Continuous Speech Stream (CSS), would provide a real time list of keywords generated from the user’s spoken interactions with others. Based on a user-study that engaged 10 users to record a full day of audio for processing into a sample stream, we report the concerns expressed by our participants on being misrepresented by their speech, unintentionally sharing sensitive data, and being unable to curate their presentation of self. We offer an initial set of recommendations for the design, testing, and deployment of IoT based services built on such rich, personal data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Not in front of the telly: Warning over ’listening’ TV, BBC News, http://www.bbc.co.uk/news/technology-31296188 (accessed on February 25, 2015)

  2. Bernd, C.S., Eden, G., et al.: Responsible research and innovation in infor-mation and communication technology: Identifying and engaging with the ethical implications of ICTs. Responsible Innovation 199 (1988)

    Google Scholar 

  3. Chon, Y., Lane, N.D., et al.: Understanding the coverage and scalability of place-centric crowdsensing. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 3–12. ACM (2013)

    Google Scholar 

  4. Espeland, W.N., Stevens, M.L.: A Sociology of Quantification. European Journal of Sociology / Archives Européennes de Sociologie 49(03), 401–436 (2008)

    Article  Google Scholar 

  5. Fazel, A., Chakrabartty, S.: An overview of statistical pattern recognition techniques for speaker verification. IEEE Circuits and Systems Magazine 11(2), 62–81 (2011)

    Article  Google Scholar 

  6. Kilgour, J., Carletta, J., et al.: The Ambient Spotlight: Queryless desktop search from meeting speech. In: Proceedings of the 2010 International Workshop on Searching Spontaneous Conversational Speech, pp. 49–52. ACM (2010)

    Google Scholar 

  7. Kozlov, D., Veijalainen, J., et al.: Security and privacy threats in IoT architec-tures. In: Proceedings of the 7th International Conference on Body Area Networks, pp. 256–262. ICST (Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering) (2012)

    Google Scholar 

  8. Kumar, A., Paek, T., et al.: Voice typing: a new speech interaction model for dictation on touchscreen devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2277–2286. ACM (2012)

    Google Scholar 

  9. Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of Westin’s studies (2005)

    Google Scholar 

  10. Lane, N.D., Miluzzo, E., et al.: A survey of mobile phone sensing. IEEE Communications Magazine 48(9), 140–150 (2010)

    Article  Google Scholar 

  11. Lloret, E., Palomar, M.: Text summarisation in progress: a literature re-view. Artificial Intelligence Review 37(1), 1–41 (2012)

    Article  Google Scholar 

  12. McMillan, D., Loriette, A., et al.: Repurposing Conversation: Experiments with the Continuous Speech Stream. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM (2015)

    Google Scholar 

  13. McMillan, D., Morrison, A., et al.: Categorised ethical guidelines for large scale mobile HCI. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1853–1862. ACM (2013)

    Google Scholar 

  14. Morris, I.: Apple’s Siri And Microsoft’s Cortana Record Your Voice, And Someone Is Listening, Forbes.com, http://forbes.com/2015/02/24/apples-siri-and-microsofts-cortana-record-your-voice-and-someone-is-listening/ (accessed on February 25, 2015 )

  15. Morrison, A., McMillan, D., et al.: Improving consent in large scale mobile HCI through personalised representations of data. In: Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational, pp. 471–480. ACM (2014)

    Google Scholar 

  16. Oulasvirta, A., Pihlajamaa, A., et al.: Long-term effects of ubiquitous surveil-lance in the home. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp. 41–50. ACM (2012)

    Google Scholar 

  17. Owen, R., Macnaghten, P., et al.: Responsible research and innovation: From science in society to science for society, with society. Science and Public Policy 39(6), 751–760 (2012)

    Article  Google Scholar 

  18. Pagliery, J.: FBI lets suspects go to protect ’Stingray’ secrets, CNN, http://money.cnn.com/2015/03/18/technology/security/police-stingray-phone-tracker/ (accessed on March 24, 2015)

  19. Schoeman, F.D.: Philosophical dimensions of privacy: An anthology. Cambridge University Press (1984)

    Google Scholar 

  20. Tur, G., De Mori, R.: Spoken language understanding: Systems for ex-tracting semantic information from speech. John Wiley & Sons (2011)

    Google Scholar 

  21. Waibel, A., Schultz, T., et al.: SMaRT: The smart meeting room task at ISL. In: Proceedings of, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 754, pp. IV-752–IV-755. IEEE (2003)

    Google Scholar 

  22. Whittaker, S., Hirschberg, J., et al.: SCANMail: a voicemail interface that makes speech browsable, readable and searchable. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 275–282. ACM (2002)

    Google Scholar 

  23. Wyatt, D., Choudhury, T., et al.: Inferring colocation and conversation net-works from privacy-sensitive audio with implications for computational social sci-ence. ACM Transactions on Intelligent Systems and Technology (TIST) 2(1), 7 (2011)

    Google Scholar 

  24. Yankelovich, N., Levow, G.-A., et al.: Designing SpeechActs: Issues in speech user interfaces. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 369–376. ACM Press/Addison-Wesley Publishing Co. (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Donald McMillan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

McMillan, D., Loriette, A. (2015). Living with Listening Services: Privacy and Control in IoT. In: Tiropanis, T., Vakali, A., Sartori, L., Burnap, P. (eds) Internet Science. INSCI 2015. Lecture Notes in Computer Science(), vol 9089. Springer, Cham. https://doi.org/10.1007/978-3-319-18609-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18609-2_8

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18608-5

  • Online ISBN: 978-3-319-18609-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics