TY - GEN
T1 - Runtime Permissions for Privacy in Proactive Intelligent Assistants
AU - Malkin, Nathan
AU - Wagner, David
AU - Egelman, Serge
N1 - Publisher Copyright:
© 2022 by The USENIX Association. All Rights Reserved.
PY - 2022
Y1 - 2022
N2 - Intelligent voice assistants may soon become proactive, offering suggestions without being directly invoked. Such behavior increases privacy risks, since proactive operation requires continuous monitoring of conversations. To mitigate this problem, our study proposes and evaluates one potential privacy control, in which the assistant requests permission for the information it wishes to use immediately after hearing it. To find out how people would react to runtime permission requests, we recruited 23 pairs of participants to hold conversations while receiving ambient suggestions from a proactive assistant, which we simulated in real time using the Wizard of Oz technique. The interactive sessions featured different modes and designs of runtime permission requests and were followed by in-depth interviews about people's preferences and concerns. Most participants were excited about the devices despite their continuous listening, but wanted control over the assistant's actions and their own data. They generally prioritized an interruption-free experience above more fine-grained control over what the device would hear.
AB - Intelligent voice assistants may soon become proactive, offering suggestions without being directly invoked. Such behavior increases privacy risks, since proactive operation requires continuous monitoring of conversations. To mitigate this problem, our study proposes and evaluates one potential privacy control, in which the assistant requests permission for the information it wishes to use immediately after hearing it. To find out how people would react to runtime permission requests, we recruited 23 pairs of participants to hold conversations while receiving ambient suggestions from a proactive assistant, which we simulated in real time using the Wizard of Oz technique. The interactive sessions featured different modes and designs of runtime permission requests and were followed by in-depth interviews about people's preferences and concerns. Most participants were excited about the devices despite their continuous listening, but wanted control over the assistant's actions and their own data. They generally prioritized an interruption-free experience above more fine-grained control over what the device would hear.
UR - http://www.scopus.com/inward/record.url?scp=85140903378&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85140903378&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85140903378
T3 - Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022
SP - 633
EP - 651
BT - Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022
PB - USENIX Association
T2 - 18th Symposium on Usable Privacy and Security, SOUPS 2022
Y2 - 7 August 2022 through 9 August 2022
ER -