Investigating users' preferences and expectations for always-listening voice assistants
Many consumers now rely on different forms of voice assistants, both stand-alone devices
and those built into smartphones. Currently, these systems react to specific wake-words …
and those built into smartphones. Currently, these systems react to specific wake-words …
Runtime permissions for privacy in proactive intelligent assistants
Intelligent voice assistants may soon become proactive, offering suggestions without being
directly invoked. Such behavior increases privacy risks, since proactive operation requires …
directly invoked. Such behavior increases privacy risks, since proactive operation requires …
Privacy controls for always-listening devices
Intelligent voice assistants (IVAs) and other voice-enabled devices already form an integral
component of the Internet of Things and will continue to grow in popularity. As their …
component of the Internet of Things and will continue to grow in popularity. As their …
Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives
As intelligent voice assistants become more widespread and the scope of their listening
increases, they become attractive targets for attackers. In the future, a malicious actor could …
increases, they become attractive targets for attackers. In the future, a malicious actor could …
Designing prosthetic memory: audio or transcript, that is the question
Audio recordings and the corresponding transcripts are often used as prosthetic memory
(PM) after meetings and lectures. While current research is mainly developing novel features …
(PM) after meetings and lectures. While current research is mainly developing novel features …
Aspects of personal information valuation in web browsing and mobile communication
JP Carrascal Ruiz - 2015 - tdx.cat
The goal of this dissertation is to provide insights into how web and mobile phone call users
assign value to their personal information. Two user studies are presented. The first one …
assign value to their personal information. Two user studies are presented. The first one …
[PDF][PDF] A Complete Bibliography of ACM Transactions on Computer-Human Interaction
NHF Beebe - 2024 - ctan.math.utah.edu
A Complete Bibliography of ACM Transactions on Computer-Human Interaction Page 1 A
Complete Bibliography of ACM Transactions on Computer-Human Interaction Nelson HF …
Complete Bibliography of ACM Transactions on Computer-Human Interaction Nelson HF …