Privacy Attitudes of Smart Speaker Users
暂无分享,去创建一个
Serge Egelman | Primal Wijesekera | David Wagner | Nathan Malkin | Joe Deatrick | Allen Tong | D. Wagner | Serge Egelman | Primal Wijesekera | Nathan Malkin | Joe Deatrick | Allen Tong
[1] K. B. Hafner,et al. On assessing interrater agreement for multiple attribute responses. , 1989, Biometrics.
[2] Subbarao Kambhampati,et al. What's up with Privacy?: User Preferences and Privacy Concerns in Intelligent Personal Assistants , 2017, AIES.
[3] Lujo Bauer,et al. Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.
[4] Earlence Fernandes,et al. Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[5] Frank Bentley,et al. Understanding the Long-Term Use of Smart Speaker Assistants , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[6] Christoffer Lambertsson,et al. Expectations of Privacy in Voice Interaction – A Look at Voice Controlled Bank Transactions , 2017 .
[7] Tadayoshi Kohno,et al. A spotlight on security and privacy risks with future household robots: attacks and lessons , 2009, UbiComp.
[8] Blase Ur,et al. The post anachronism: the temporal dimension of facebook privacy , 2013, WPES.
[9] Andreas Jacobsson,et al. On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[10] Nick Feamster,et al. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[11] Aarthi Easwara Moorthy. Voice activated personal assistant: Privacy concerns in the public space , 2013 .
[12] Eugene Cho,et al. Hey Google, Can I Ask You Something in Private? , 2019, CHI.
[13] Franziska Roesner,et al. Who's In Control?: Interactions In Multi-User Smart Homes , 2019, CHI.
[14] Serge Egelman,et al. "What Can't Data Be Used For?": Privacy Expectations about Smart TVs in the U.S. , 2018 .
[15] Franziska Roesner,et al. End User Security and Privacy Concerns with Smart Homes , 2017, SOUPS.
[16] Helen Nissenbaum,et al. Privacy in Context , 2009 .
[17] Alexander Tsesis. The Right to Erasure: Privacy, Data Brokers, and the Indefinite Retention of Data , 2014 .
[18] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[19] Josephine Lau,et al. Alexa, Are You Listening? , 2018, Proc. ACM Hum. Comput. Interact..
[20] Sunny Consolvo,et al. An Experience Sampling Study of User Reactions to Browser Warnings in the Field , 2018, CHI.
[21] Chris Kanich,et al. Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage , 2018, CHI.
[22] Nick Feamster,et al. User Perceptions of Smart Home IoT Privacy , 2018, Proc. ACM Hum. Comput. Interact..
[23] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[24] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[25] Kim-Phuong L. Vu,et al. Privacy Concerns for Use of Voice Activated Personal Assistant in the Public Space , 2015, Int. J. Hum. Comput. Interact..
[26] Yier Jin,et al. Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.
[27] Elaine M. Huang,et al. Hacking the Natural Habitat: An In-the-Wild Study of Smart Homes, Their Development, and the People Who Live in Them , 2012, Pervasive.
[28] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[29] Antti Oulasvirta,et al. Long-term effects of ubiquitous surveillance in the home , 2012, UbiComp.
[30] Adi Shamir,et al. IoT Goes Nuclear: Creating a Zigbee Chain Reaction , 2017, IEEE Security & Privacy.
[31] Serge Egelman,et al. Information Disclosure Concerns in The Age of Wearable Computing , 2016 .
[32] Krishna P. Gummadi,et al. Longitudinal Privacy Management in Social Media: The Need for Better Controls , 2017, IEEE Internet Computing.