{"id":"https://openalex.org/W2991536929","doi":"https://doi.org/10.1109/isncc.2019.8909098","title":"Can I Trust Her? Intelligent Personal Assistants and GDPR","display_name":"Can I Trust Her? Intelligent Personal Assistants and GDPR","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2991536929","doi":"https://doi.org/10.1109/isncc.2019.8909098","mag":"2991536929"},"language":"en","primary_location":{"id":"doi:10.1109/isncc.2019.8909098","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc.2019.8909098","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059211616","display_name":"Eoghan Furey","orcid":"https://orcid.org/0000-0002-6697-1462"},"institutions":[{"id":"https://openalex.org/I18452974","display_name":"Letterkenny Institute of Technology","ror":"https://ror.org/04ps1tq95","country_code":"IE","type":"education","lineage":["https://openalex.org/I18452974"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Eoghan Furey","raw_affiliation_strings":["Department of Computing, Letterkenny Institute of Technology, Letterkcnny, County Donegal, Ireland"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Letterkenny Institute of Technology, Letterkcnny, County Donegal, Ireland","institution_ids":["https://openalex.org/I18452974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110697698","display_name":"Juanita Blue","orcid":null},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Juanita Blue","raw_affiliation_strings":["Intelligent Systems Research Centre, University of Ulster, Derry, Northern Ireland, UK"],"affiliations":[{"raw_affiliation_string":"Intelligent Systems Research Centre, University of Ulster, Derry, Northern Ireland, UK","institution_ids":["https://openalex.org/I138801177"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059211616"],"corresponding_institution_ids":["https://openalex.org/I18452974"],"apc_list":null,"apc_paid":null,"fwci":5.6104,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95807401,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.741544783115387},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6936900019645691},{"id":"https://openalex.org/keywords/echo","display_name":"Echo (communications protocol)","score":0.6365196704864502},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5703049302101135},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5327776670455933},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.507546067237854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5044554471969604},{"id":"https://openalex.org/keywords/european-union","display_name":"European union","score":0.464413583278656},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.43352705240249634},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.41471990942955017},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.41263347864151},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.26216721534729004}],"concepts":[{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.741544783115387},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6936900019645691},{"id":"https://openalex.org/C2779426996","wikidata":"https://www.wikidata.org/wiki/Q18389128","display_name":"Echo (communications protocol)","level":2,"score":0.6365196704864502},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5703049302101135},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5327776670455933},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.507546067237854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5044554471969604},{"id":"https://openalex.org/C2910001868","wikidata":"https://www.wikidata.org/wiki/Q458","display_name":"European union","level":2,"score":0.464413583278656},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.43352705240249634},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.41471990942955017},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.41263347864151},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.26216721534729004},{"id":"https://openalex.org/C105639569","wikidata":"https://www.wikidata.org/wiki/Q582577","display_name":"Economic policy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc.2019.8909098","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc.2019.8909098","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1495768301","https://openalex.org/W1543239856","https://openalex.org/W2268619641","https://openalex.org/W2278186831","https://openalex.org/W2300106907","https://openalex.org/W2529556398","https://openalex.org/W2532717356","https://openalex.org/W2713640100","https://openalex.org/W2736639187","https://openalex.org/W2763074088","https://openalex.org/W2793354072","https://openalex.org/W2885531739","https://openalex.org/W2885826513","https://openalex.org/W2886130191","https://openalex.org/W2886572798","https://openalex.org/W2898154467","https://openalex.org/W2900594219","https://openalex.org/W2904596937","https://openalex.org/W2913944561","https://openalex.org/W4235182489","https://openalex.org/W6744914631","https://openalex.org/W6753534120","https://openalex.org/W6754140522"],"related_works":["https://openalex.org/W4251916081","https://openalex.org/W2127837371","https://openalex.org/W3176177457","https://openalex.org/W2247933473","https://openalex.org/W2098937825","https://openalex.org/W2015210388","https://openalex.org/W4245730406","https://openalex.org/W2498129867","https://openalex.org/W2465865879","https://openalex.org/W3082926850"],"abstract_inverted_index":{"Voice":[0,87],"Command":[1],"Devices":[2],"and":[3,15,20,26,46,91,95,115,192,248,260,280],"the":[4,53,59,72,81,84,101,136,148,199,208,223,228,257,271,276,281],"Intelligent":[5],"Personal":[6,103],"Assistants":[7],"they":[8],"embody":[9],"have":[10],"become":[11],"ubiquitous":[12],"in":[13,36,130],"homes":[14],"offer":[16],"individuals":[17,289],"many":[18],"convenient":[19],"entertaining":[21],"features.":[22],"The":[23,119,225],"Amazon":[24],"Echo":[25,163],"its":[27],"intelligent":[28],"personal":[29,50,139,174,189,193],"assistant,":[30],"\u201cAlexa\u201d,":[31],"is":[32,196,218],"a":[33,69,160,169,184,240,265],"leading":[34],"innovation":[35],"this":[37,153],"area.":[38],"This":[39,144,156],"novel":[40],"research":[41,226],"examines":[42],"aspects":[43],"of":[44,52,61,71,74,86,138,141,186,222,242,256,267],"trust":[45,94,149,247,274,291],"privacy":[47,96,137,261,293],"relating":[48],"to":[49,57,80,111,116,134,167,211,230,284,290],"use":[51],"Echo.":[54,82],"It":[55],"aims":[56],"demonstrate":[58],"types":[60],"data":[62,104,140,187],"that":[63,76,159],"may":[64,77,176],"be":[65,78,168,177,235],"vocally":[66],"extracted":[67],"from":[68,152,198,295],"selection":[70],"multitude":[73],"applications":[75],"linked":[79],"In":[83],"era":[85],"IoT,":[88],"Big":[89],"Data":[90,123,201],"Artificial":[92],"Intelligence,":[93],"concerns":[97],"are":[98,182,262],"paramount":[99],"for":[100],"individual.":[102],"has":[105,145],"never":[106],"been":[107],"more":[108],"valuable,":[109],"both":[110],"large":[112],"reputable":[113],"corporations":[114],"criminal":[117],"groups.":[118],"European":[120],"Union's":[121],"General":[122],"Protection":[124],"Regulations":[125],"(GDPR)":[126],"came":[127],"into":[128],"force":[129],"May":[131],"2018,":[132],"aiming":[133],"protect":[135],"EU":[142],"citizens.":[143],"further":[146],"highlighted":[147],"issues":[150],"stemming":[151],"technological":[154],"medium.":[155],"paper":[157],"demonstrates":[158],"typically":[161],"configured":[162],"device":[164],"can":[165,234],"prove":[166],"vulnerable":[170,210],"channel":[171],"by":[172,203,213],"which":[173,231],"information":[175,191,195],"accessed.":[178],"Where":[179],"no":[180],"safeguards":[181],"implemented,":[183],"plethora":[185],"including":[188],"identifiable":[190],"health":[194],"available":[197],"device.":[200,224,258],"exposure":[202],"simple":[204],"vocal":[205],"request":[206],"leaves":[207],"system":[209],"inquisition":[212],"any":[214],"unauthorized":[215],"individual":[216],"who":[217],"within":[219],"\u201cear":[220],"shot\u201d":[221],"explores":[227],"extent":[229],"these":[232,285],"risks":[233],"reduced":[236],"or":[237],"mitigated,":[238],"offering":[239],"set":[241],"recommendations":[243,286],"aimed":[244],"at":[245],"building":[246],"preserving":[249],"user":[250],"privacy,":[251],"while":[252],"still":[253],"enabling":[254],"functionality":[255],"Trust":[259],"based":[263],"on":[264],"triad":[266],"shared":[268],"responsibility.":[269],"While":[270],"GDPR":[272],"enforces":[273],"between":[275],"voice":[277],"service":[278],"providers":[279],"consumers,":[282],"adherence":[283],"will":[287],"empower":[288],"against":[292],"breaches":[294],"local":[296],"sources.":[297]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
