Skip to main content

Understanding Privacy in Smart Speakers: A Narrative Review

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2024)

Abstract

With the rise in the widespread use of smart speakers, voice-based interactions have become increasingly convenient with their accessibility benefits. However, the inherent “always on” feature of these devices has amplified user privacy concerns, especially given their pervasive presence in homes. To examine this complex phenomenon, we performed a narrative review to understand diverse perspectives on various perspectives on privacy related to smart speakers. Our analysis highlights the intricate landscape of privacy, encompassing its implementation, perception, and action. Notably, current literature often fails to address these dimensions of privacy in a comprehensive manner. Consequently, future research should adopt a holistic perspective on privacy in this rapidly evolving domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Pridmore, J., Mols, A.: Personal choices and situated data: privacy negotiations and the acceptance of household intelligent personal assistants. Big Data Soc. 7(1), 2053951719891748 (2020)

    Article  Google Scholar 

  2. Statista Consumer Market Insights. Revenue of the smart speakers industry Worldwide 2018–2028 (in million units) [Graph]. In Statista. Retrieved August 24, 2023. https://www.statista.com/forecasts/1367982/smart-speaker-market-volume-worldwide

  3. Alepis, E., Patsakis, C.: Monkey says, monkey does: security and privacy on voice assistants. IEEE Access 5, 17841–17851 (2017)

    Article  Google Scholar 

  4. Porcheron, M., Fischer, J.E., Sharples, S.: Do Animals Have Accents? Talking with Agents in Multi-Party Conversation. City (2017)

    Google Scholar 

  5. Liao, Y., Vitak, J., Kumar, P., Zimmer, M., Kritikos, K.: Understanding the Role of Privacy and Trust in Intelligent Personal Assistant Adoption. Springer, City (2019)

    Google Scholar 

  6. Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509–514 (2015)

    Article  Google Scholar 

  7. Ramokapane, K.M., Misra, G., Such, J., Preibusch, S.: Truth or dare: Understanding and Predicting How Users Lie and Provide Untruthful Data Online. City (2021)

    Google Scholar 

  8. Warren, S., Brandeis, L.: The right to privacy. Columbia University Press, City (1989)

    Google Scholar 

  9. Houghton, D.J., Joinson, A.N.: Privacy, Social Network Sites, and Social Relations. Routledge, City (2014)

    Google Scholar 

  10. Tavani, H.T., Moor, J.H.: Privacy protection, control of information, and privacy-enhancing technologies. ACM SIGCAS Comput. Soc. 31(1), 6–11 (2001)

    Article  Google Scholar 

  11. Moor, J.H.: The ethics of privacy protection (1991)

    Google Scholar 

  12. Parker, R.B.: A Definition of Privacy. Routledge, City (2017)

    Book  Google Scholar 

  13. Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1), 166 (1968)

    Google Scholar 

  14. Tabassum, M., et al.: Investigating users’ preferences and expectations for always-listening voice assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4), 1–23 (2019)

    Article  MathSciNet  Google Scholar 

  15. Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 1–31 (2018)

    Google Scholar 

  16. Lopatovska, I., et al.: Talk to me: exploring user interactions with the Amazon Alexa. J. Librariansh. Inf. Sci. 51(4), 984–997 (2019)

    Article  Google Scholar 

  17. Maccario, G., Naldi, M.: Privacy in smart speakers: a systematic literature review. Secur. Priv. 6(1), e274 (2023)

    Article  Google Scholar 

  18. Bolton, T., Dargahi, T., Belguith, S., Al-Rakhami, M.S., Sodhro, A.H.: On the security and privacy challenges of virtual assistants. Sensors 21(7), 2312 (2021)

    Article  Google Scholar 

  19. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)

    Article  Google Scholar 

  20. Karyda, M., Gritzalis, S., Park, J.H., Kokolakis, S.: Privacy and fair information practices in ubiquitous environments: research challenges and future directions. Internet Res. 19(2), 194–208 (2009)

    Article  Google Scholar 

  21. Kumpu, V.: Privacy and the emergence of the “ubiquitous computing society”: the struggle over the meaning of “privacy” in the case of the Apple location tracking scandal. Technol. Soc. 34(4), 303–310 (2012)

    Article  Google Scholar 

  22. Dritsas, S., Gritzalis, D., Lambrinoudakis, C.: Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics Inform. 23(3), 196–210 (2006)

    Article  Google Scholar 

  23. Michael, K., Clarke, R.: Location and tracking of mobile devices: Überveillance stalks the streets. Comput. Law Secur. Rev. 29(3), 216–228 (2013)

    Article  Google Scholar 

  24. Barkhuus, L.: The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI. City (2012)

    Google Scholar 

  25. Lehikoinen, J.T., Lehikoinen, J., Huuskonen, P.: Understanding privacy regulation in ubicomp interactions. Pers. Ubiquit. Comput. 12, 543–553 (2008)

    Article  Google Scholar 

  26. Friedewald, M., Vildjiounaite, E., Punie, Y., Wright, D.: Privacy, identity and security in ambient intelligence: a scenario analysis. Telematics Inform. 24(1), 15–29 (2007)

    Article  Google Scholar 

  27. Schaub, F., Könings, B., Weber, M.: Context-adaptive privacy: leveraging context awareness to support privacy decision making. IEEE Pervasive Comput. 14(1), 34–43 (2015)

    Article  Google Scholar 

  28. Wright, D., et al.: Sorting out smart surveillance. Comput. Law Secur. Rev. 26(4), 343–354 (2010)

    Article  Google Scholar 

  29. Lahlou, S., Langheinrich, M., Röcker, C.: Privacy and trust issues with invisible computers. Commun. ACM 48(3), 59–60 (2005)

    Article  Google Scholar 

  30. Peng, Z., Kaji, K., Kawaguchi, N.: Privacy protection in WiFi-based location estimation. IEEE, City (2014)

    Book  Google Scholar 

  31. Kumar, R., Rajalakshmi, S.: Mobile sensor cloud computing: controlling and securing data processing over smart environment through mobile sensor cloud computing (MSCC). IEEE, City (2013)

    Google Scholar 

  32. Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Pers. Ubiquit. Comput. 8, 430–439 (2004)

    Article  Google Scholar 

  33. Pallapa, G., Roy, N., Das, S.K.: A scheme for quantizing privacy in context-aware ubiquitous computing (2008)

    Google Scholar 

  34. Altman, I.: The environment and social behavior: privacy, personal space, territory, and crowding (1975)

    Google Scholar 

  35. Malik, N.A., Tomlinson, A.: Privacy and consent in pervasive networks. Inf. Secur. Tech. Rep. 14(3), 138–142 (2009)

    Article  Google Scholar 

  36. Bunnig, C., Cap, C.H.: Ad hoc privacy management in ubiquitous computing environments. IEEE, City (2009)

    Book  Google Scholar 

  37. Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. City (2004)

    Google Scholar 

  38. Huang, Y., Obada-Obieh, B., Beznosov, K.: Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks. City (2020)

    Google Scholar 

  39. Price, B.A., Adam, K., Nuseibeh, B.: Keeping ubiquitous computing to yourself: a practical model for user control of privacy. Int. J. Hum. Comput. Stud. 63(1–2), 228–253 (2005)

    Article  Google Scholar 

  40. Meng, N., Keküllüoğlu, D., Vaniea, K.: Owning and sharing: privacy perceptions of smart speaker users. Proc. ACM Hum. Comput. Interact. 5(CSCW1), 1–29 (2021)

    Google Scholar 

  41. Ur, B., Leon, P.G., Cranor, L.F., Shay, R., Wang, Y.: Smart, useful, scary, creepy: perceptions of online behavioral advertising. City (2012)

    Google Scholar 

  42. Abdi, N., Ramokapane, K.M., Such, J.M.: More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. City (2019)

    Google Scholar 

  43. Manikonda, L., Deotale, A., Kambhampati, S.: What’s up with privacy? User preferences and privacy concerns in intelligent personal assistants. City (2018)

    Google Scholar 

  44. Tuttle, H.: Facebook scandal raises data privacy concerns. Risk Manage. 65(5), 6–9 (2018)

    Google Scholar 

  45. Hinds, J., Williams, E.J., Joinson, A.N.: “It wouldn’t happen to me”: privacy concerns and perspectives following the Cambridge analytica scandal. Int. J. Hum. Comput. Stud. 143, 102498 (2020)

    Article  Google Scholar 

  46. Chung, H., Lee, S.: Intelligent virtual assistant knows your life. arXiv preprint arXiv:1803.00466 (2018)

  47. Zhu, F., Carpenter, S., Kulkarni, A.: Understanding identity exposure in pervasive computing environments. Pervasive Mob. Comput. 8(5), 777–794 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdulrhman Alorini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alorini, A., Sawad, A.B., Alharbi, S., Ijaz, K., Prasad, M., Kocaballi, A.B. (2024). Understanding Privacy in Smart Speakers: A Narrative Review. In: Zhu, T., Li, Y. (eds) Information Security and Privacy. ACISP 2024. Lecture Notes in Computer Science, vol 14897. Springer, Singapore. https://doi.org/10.1007/978-981-97-5101-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-5101-3_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-5100-6

  • Online ISBN: 978-981-97-5101-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics