Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls

Abstract Internet of Things and smart home technologies pose challenges for providing effective privacy controls to users, as smart devices lack both traditional screens and input interfaces. We investigate the potential for leveraging interpersonal communication cues as privacy controls in the IoT context, in particular for smart speakers. We propose privacy controls based on two kinds of interpersonal communication cues – gaze direction and voice volume level – that only selectively activate a smart speaker’s microphone or voice recognition when the device is being addressed, in order to avoid constant listening and speech recognition by the smart speaker microphones and reduce false device activation. We implement these privacy controls in a smart speaker prototype and assess their feasibility, usability and user perception in two lab studies. We find that privacy controls based on interpersonal communication cues are practical, do not impair the smart speaker’s functionality, and can be easily used by users to selectively mute the microphone. Based on our findings, we discuss insights regarding the use of interpersonal cues as privacy controls for smart speakers and other IoT devices.

[1]  Sunny Consolvo,et al.  Living in a glass house: a survey of private moments in the home , 2011, UbiComp '11.

[2]  Philip T. Kortum,et al.  Determining what individual SUS scores mean: adding an adjective rating scale , 2009 .

[3]  Michael Weber,et al.  Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making , 2015, IEEE Pervasive Computing.

[4]  Marc Langheinrich,et al.  Privacy in Mobile and Pervasive Computing , 2018, Privacy in Mobile and Pervasive Computing.

[5]  Ilaria Liccardi,et al.  Consumer Attitudes Towards Privacy and Security in Home Assistants , 2018, CHI Extended Abstracts.

[6]  Romit Roy Choudhury,et al.  BackDoor: Sounds that a microphone can record, but that humans can't hear , 2018, GETMBL.

[7]  Chuhan Gao,et al.  Traversing the Quagmire that is Privacy in your Smart Home , 2018, IoT S&P@SIGCOMM.

[8]  Maya Cakmak,et al.  Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys , 2017, CHI.

[9]  Franziska Roesner,et al.  End User Security and Privacy Concerns with Smart Homes , 2017, SOUPS.

[10]  Roel Vertegaal,et al.  AuraOrb: using social awareness cues in the design of progressive notification appliances , 2006, OZCHI '06.

[11]  Lorrie Faith Cranor,et al.  A Design Space for Effective Privacy Notices , 2015, SOUPS.

[12]  C. Nickerson A note on a concordance correlation coefficient to evaluate reproducibility , 1997 .

[13]  Frank Bentley,et al.  Music, Search, and IoT , 2019, ACM Trans. Comput. Hum. Interact..

[14]  Milo Mileff,et al.  Head movements in the context of speech in Arabic, Bulgarian, Korean, and African-American Vernacular English , 2007 .

[15]  Marc Langheinrich,et al.  Privacy and trust issues with invisible computers , 2005, CACM.

[16]  Tadayoshi Kohno,et al.  A spotlight on security and privacy risks with future household robots: attacks and lessons , 2009, UbiComp.

[17]  J. Balloun,et al.  The Effect of Voice Volume on the Perception of Personality , 1978 .

[18]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[19]  Florian Schaub,et al.  Context-Adaptive Privacy Mechanisms , 2018, Handbook of Mobile Data Privacy.

[20]  Michael Weber,et al.  PriCal: context-adaptive privacy in ambient calendar displays , 2014, UbiComp.

[21]  Michael W. Kramer,et al.  Interpersonal communication. , 1977, Australian family physician.

[22]  Ibrahim Ethem Bagci,et al.  Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants , 2019, 2019 IEEE Security and Privacy Workshops (SPW).

[23]  Josephine Lau,et al.  Alexa, Are You Listening? , 2018, Proc. ACM Hum. Comput. Interact..

[24]  Eija Ventola,et al.  Handbook of interpersonal communication , 2008 .

[25]  Elizabeth D. Mynatt,et al.  Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .

[26]  S. Feldstein,et al.  Changes in Vocal Intensity as a Function of Interspeaker Influence , 1972 .

[27]  Nick Feamster,et al.  User Perceptions of Privacy in Smart Homes , 2018, ArXiv.

[28]  Mohammad Emtiyaz Khan,et al.  SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[29]  Alfred Kobsa,et al.  Privacy preference modeling and prediction in a simulated campuswide IoT environment , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[30]  C. Goodwin Conversational Organization: Interaction Between Speakers and Hearers , 1981 .

[31]  Hiroshi Ishiguro,et al.  Effect of Robot’s Whispering Behavior on People’s Motivation , 2013, Int. J. Soc. Robotics.

[32]  Francesco Caltagirone,et al.  Snips Voice Platform: an embedded Spoken Language Understanding system for private-by-design voice interfaces , 2018, ArXiv.

[33]  David A. Wagner,et al.  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[34]  G. Miller,et al.  Handbook of Interpersonal Communication , 1985 .

[35]  Blase Ur,et al.  Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance , 2014, UbiComp.

[36]  David A. Wagner,et al.  Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights , 2015, CHI.

[37]  Antti Oulasvirta,et al.  Long-term effects of ubiquitous surveillance in the home , 2012, UbiComp.

[38]  Kang G. Shin,et al.  Continuous Authentication for Voice Assistants , 2017, MobiCom.

[39]  Andreas Jacobsson,et al.  On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[40]  Pavel Slavík,et al.  Acoustic control of mouse pointer , 2006, Universal Access in the Information Society.

[41]  Romit Roy Choudhury,et al.  Inaudible Voice Commands: The Long-Range Attack and Defense , 2018, NSDI.

[42]  Maya Cakmak,et al.  The Privacy-Utility Tradeoff for Remotely Teleoperated Robots , 2015, 2015 10th ACM/IEEE International Conference on Human-Robot Interaction (HRI).

[43]  Bill N. Schilit,et al.  Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.

[44]  Zied Mani,et al.  Drivers of consumers’ resistance to smart products , 2017 .

[45]  Jose M. Such,et al.  More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants , 2019, SOUPS @ USENIX Security Symposium.

[46]  Serge Egelman,et al.  Privacy Attitudes of Smart Speaker Users , 2019, Proc. Priv. Enhancing Technol..

[47]  C. Fichten,et al.  Verbal and nonverbal communication cues in daily conversations and dating. , 1992 .

[48]  Lujo Bauer,et al.  Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.

[49]  Florian Schaub,et al.  Privacy and Trust in Ambient Intelligent Environments , 2016 .

[50]  Henry A. Kautz,et al.  Capturing Spontaneous Conversation and Social Dynamics: A Privacy-Sensitive Data Collection Effort , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[51]  J. B. Brooke,et al.  SUS: A 'Quick and Dirty' Usability Scale , 1996 .

[52]  Shruti Sannon,et al.  "Alexa is my new BFF": Social Roles, User Satisfaction, and Personification of the Amazon Echo , 2017, CHI Extended Abstracts.

[53]  Tom Gross,et al.  Ambient interfaces in a Web-based theatre of work , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[54]  Albrecht Schmidt,et al.  Implicit human computer interaction through context , 2000, Personal Technologies.

[55]  Roel Vertegaal,et al.  Media eyepliances: using eye tracking for remote control focus selection of appliances , 2005, CHI Extended Abstracts.

[56]  James A. Landay,et al.  Voice Games: Investigation Into the Use of Non-speech Voice Input for Making Computer Games More Accessible , 2011, IFIP TC13 International Conference on Human-Computer Interaction.

[57]  Joseph Turow,et al.  The corporate cultivation of digital resignation , 2019, New Media Soc..

[58]  Anton Nijholt,et al.  Eye gaze patterns in conversations: there is more to conversational agents than meets the eyes , 2001, CHI.

[59]  Jose M. Such,et al.  Smart Home Personal Assistants , 2019, ACM Comput. Surv..

[60]  Michael Zimmer,et al.  Understanding the Role of Privacy and Trust in Intelligent Personal Assistant Adoption , 2019, iConference.

[61]  James R. Lewis,et al.  The System Usability Scale: Past, Present, and Future , 2018, Int. J. Hum. Comput. Interact..

[62]  M. Natale CONVERGENCE OF MEAN VOCAL INTENSITY IN DYADIC COMMUNICATION AS A FUNCTION OF SOCIAL DESIRABILITY , 1975 .

[63]  Serge Egelman,et al.  Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms , 2015, CHI.