{"id":"https://openalex.org/W7147698289","doi":"https://doi.org/10.1109/icaiic68212.2026.11454179","title":"Privacy by Voice: Modeling Youth Privacy-Protective Behavior in Smart Voice Assistants","display_name":"Privacy by Voice: Modeling Youth Privacy-Protective Behavior in Smart Voice Assistants","publication_year":2026,"publication_date":"2026-02-24","ids":{"openalex":"https://openalex.org/W7147698289","doi":"https://doi.org/10.1109/icaiic68212.2026.11454179"},"language":null,"primary_location":{"id":"doi:10.1109/icaiic68212.2026.11454179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic68212.2026.11454179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2602.10142","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Molly Campbell","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Molly Campbell","raw_affiliation_strings":["Vancouver Island University,Computer Science Department,Nanaimo,Canada"],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Ajay Kumar Shrestha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ajay Kumar Shrestha","raw_affiliation_strings":["Vancouver Island University,Computer Science Department,Nanaimo,Canada"],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8911336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"917","last_page":"924"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12128","display_name":"AI in Service Interactions","score":0.8453999757766724,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12128","display_name":"AI in Service Interactions","score":0.8453999757766724,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11519","display_name":"Digital Mental Health Interventions","score":0.0617000013589859,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10709","display_name":"Social Robot Interaction and HRI","score":0.00839999970048666,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.5885000228881836},{"id":"https://openalex.org/keywords/negotiation","display_name":"Negotiation","score":0.5156999826431274},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.5085999965667725},{"id":"https://openalex.org/keywords/risk-perception","display_name":"Risk perception","score":0.47940000891685486},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.46549999713897705},{"id":"https://openalex.org/keywords/grounded-theory","display_name":"Grounded theory","score":0.45989999175071716},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.45730000734329224}],"concepts":[{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.5885000228881836},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5698000192642212},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.5156999826431274},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.5085999965667725},{"id":"https://openalex.org/C163355716","wikidata":"https://www.wikidata.org/wiki/Q2154783","display_name":"Risk perception","level":3,"score":0.47940000891685486},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.46549999713897705},{"id":"https://openalex.org/C156325361","wikidata":"https://www.wikidata.org/wiki/Q1152864","display_name":"Grounded theory","level":3,"score":0.45989999175071716},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.4415999948978424},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4165000021457672},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.39480000734329224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37380000948905945},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.36419999599456787},{"id":"https://openalex.org/C89785696","wikidata":"https://www.wikidata.org/wiki/Q2290753","display_name":"Theory of planned behavior","level":3,"score":0.359499990940094},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.3562000095844269},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35370001196861267},{"id":"https://openalex.org/C75630572","wikidata":"https://www.wikidata.org/wiki/Q538904","display_name":"Applied psychology","level":1,"score":0.3393000066280365},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.32350000739097595},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.31540000438690186},{"id":"https://openalex.org/C123269153","wikidata":"https://www.wikidata.org/wiki/Q1897038","display_name":"Theory of reasoned action","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C198477413","wikidata":"https://www.wikidata.org/wiki/Q7647069","display_name":"Survey data collection","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2574999928474426}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icaiic68212.2026.11454179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic68212.2026.11454179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2602.10142","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2602.10142","pdf_url":"https://arxiv.org/pdf/2602.10142","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2602.10142","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2602.10142","pdf_url":"https://arxiv.org/pdf/2602.10142","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7306621074676514}],"awards":[],"funders":[{"id":"https://openalex.org/F6823727674","display_name":"Office of the Privacy Commissioner of Canada","ror":"https://ror.org/0164vvh82"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7147698289.pdf","grobid_xml":"https://content.openalex.org/works/W7147698289.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W31286121","https://openalex.org/W1545190392","https://openalex.org/W1980336349","https://openalex.org/W1991246983","https://openalex.org/W2034684087","https://openalex.org/W2045468017","https://openalex.org/W2057364222","https://openalex.org/W2079868099","https://openalex.org/W2093625697","https://openalex.org/W2096178490","https://openalex.org/W2097427281","https://openalex.org/W2098685541","https://openalex.org/W2102303925","https://openalex.org/W2143002484","https://openalex.org/W2157989366","https://openalex.org/W2163241745","https://openalex.org/W2256253289","https://openalex.org/W2483131285","https://openalex.org/W2609588687","https://openalex.org/W2899225656","https://openalex.org/W2905811773","https://openalex.org/W2955829435","https://openalex.org/W2996107505","https://openalex.org/W2999829621","https://openalex.org/W3006739978","https://openalex.org/W3030768883","https://openalex.org/W3161499990","https://openalex.org/W4281489174","https://openalex.org/W4285587316","https://openalex.org/W4292808503","https://openalex.org/W4296367208","https://openalex.org/W4323539976","https://openalex.org/W4393932201","https://openalex.org/W4394883863","https://openalex.org/W4406949799","https://openalex.org/W4411188359","https://openalex.org/W4411995859","https://openalex.org/W4412742116","https://openalex.org/W4417004111","https://openalex.org/W7131393346","https://openalex.org/W7131431261"],"related_works":[],"abstract_inverted_index":{"Smart":[0],"Voice":[1],"Assistants":[2],"(SVAs)":[3],"are":[4],"deeply":[5],"embedded":[6],"in":[7,45],"the":[8,13,16,94,100,164,193],"lives":[9],"of":[10,71,97,102,195],"youth,":[11],"yet":[12,138],"mechanisms":[14],"driving":[15],"privacy-protective":[17,65],"behaviors":[18,66],"among":[19],"young":[20,188],"users":[21],"remain":[22],"poorly":[23],"understood.":[24],"This":[25,111,170],"study":[26,171],"investigates":[27],"how":[28,157],"Canadian":[29],"youth":[30,79],"(aged":[31],"16-24)":[32],"negotiate":[33],"privacy":[34,50,61],"with":[35],"SVAs":[36],"by":[37,109,143],"developing":[38],"and":[39,58,64,151,160,180],"testing":[40],"a":[41,113],"structural":[42,86],"model":[43,130],"grounded":[44],"five":[46],"key":[47],"constructs:":[48],"perceived":[49,53],"risks":[51],"(PPR),":[52],"benefits":[54],"(PPBf),":[55],"algorithmic":[56],"transparency":[57],"trust":[59],"(ATT),":[60],"self-efficacy":[62,165],"(PSE),":[63],"(PPB).":[67],"A":[68],"cross-sectional":[69],"survey":[70],"<tex":[72],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[73],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\mathbf{N}":[74],"\\boldsymbol{=}":[75],"\\mathbf{4":[76],"6":[77],"9}$</tex>":[78],"was":[80],"analyzed":[81],"using":[82],"partial":[83],"least":[84],"squares":[85],"equation":[87],"modeling.":[88],"Results":[89],"reveal":[90],"that":[91,132,186],"PSE":[92],"is":[93,106],"strongest":[95],"predictor":[96],"PPB,":[98],"while":[99],"effect":[101],"ATT":[103],"on":[104],"PPB":[105],"fully":[107],"mediated":[108],"PSE.":[110],"identifies":[112],"critical":[114],"efficacy":[115],"gap,":[116],"where":[117],"youth's":[118],"confidence":[119],"must":[120],"first":[121],"be":[122],"built":[123],"up":[124],"for":[125,167],"them":[126],"to":[127,178],"act.":[128],"The":[129],"confirms":[131],"PPBf":[133],"directly":[134],"discourages":[135],"protective":[136,168],"action,":[137],"also":[139],"indirectly":[140],"fosters":[141],"it":[142,182],"slightly":[144],"boosting":[145],"self-efficacy.":[146],"These":[147],"findings":[148],"empirically":[149],"validate":[150],"extend":[152],"earlier":[153],"qualitative":[154],"work,":[155],"quantifying":[156],"policy":[158],"overload":[159],"hidden":[161],"controls":[162],"erode":[163],"necessary":[166],"action.":[169],"contributes":[172],"an":[173],"evidence-based":[174],"pathway":[175],"from":[176],"perception":[177],"action":[179],"translates":[181],"into":[183],"design":[184],"imperatives":[185],"empower":[187],"digital":[189],"citizens":[190],"without":[191],"sacrificing":[192],"utility":[194],"SVAs.":[196]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-02-14T00:00:00"}
