Runtime Permissions for Privacy in Proactive Intelligent Assistants

Nathan Malkin, David Wagner, Serge Egelman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

Intelligent voice assistants may soon become proactive, offering suggestions without being directly invoked. Such behavior increases privacy risks, since proactive operation requires continuous monitoring of conversations. To mitigate this problem, our study proposes and evaluates one potential privacy control, in which the assistant requests permission for the information it wishes to use immediately after hearing it. To find out how people would react to runtime permission requests, we recruited 23 pairs of participants to hold conversations while receiving ambient suggestions from a proactive assistant, which we simulated in real time using the Wizard of Oz technique. The interactive sessions featured different modes and designs of runtime permission requests and were followed by in-depth interviews about people's preferences and concerns. Most participants were excited about the devices despite their continuous listening, but wanted control over the assistant's actions and their own data. They generally prioritized an interruption-free experience above more fine-grained control over what the device would hear.

Original languageEnglish (US)
Title of host publicationProceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022
PublisherUSENIX Association
Pages633-651
Number of pages19
ISBN (Electronic)9781939133304
StatePublished - 2022
Externally publishedYes
Event18th Symposium on Usable Privacy and Security, SOUPS 2022 - Boston, United States
Duration: Aug 7 2022Aug 9 2022

Publication series

NameProceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022

Conference

Conference18th Symposium on Usable Privacy and Security, SOUPS 2022
Country/TerritoryUnited States
CityBoston
Period8/7/228/9/22

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Runtime Permissions for Privacy in Proactive Intelligent Assistants'. Together they form a unique fingerprint.

Cite this