{"id":"https://openalex.org/W2999829621","doi":"https://doi.org/10.1145/3368860.3368867","title":"Privacy controls for always-listening devices","display_name":"Privacy controls for always-listening devices","publication_year":2019,"publication_date":"2019-09-23","ids":{"openalex":"https://openalex.org/W2999829621","doi":"https://doi.org/10.1145/3368860.3368867","mag":"2999829621"},"language":"en","primary_location":{"id":"doi:10.1145/3368860.3368867","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3368860.3368867","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3368860.3368867","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the New Security Paradigms Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3368860.3368867","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081583467","display_name":"Nathan Malkin","orcid":"https://orcid.org/0000-0001-8195-4671"},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nathan Malkin","raw_affiliation_strings":["University of California"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000020874","display_name":"Serge Egelman","orcid":"https://orcid.org/0000-0003-2288-0785"},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Serge Egelman","raw_affiliation_strings":["University of California"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062174672","display_name":"David Wagner","orcid":"https://orcid.org/0000-0001-7728-4273"},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Wagner","raw_affiliation_strings":["University of California"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081583467"],"corresponding_institution_ids":["https://openalex.org/I2803209242"],"apc_list":null,"apc_paid":null,"fwci":5.8558,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.96026357,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"78","last_page":"91"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12128","display_name":"AI in Service Interactions","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/active-listening","display_name":"Active listening","score":0.9054670333862305},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.8041640520095825},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7155629992485046},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5602355003356934},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.4869872033596039},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.43686628341674805},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.43422698974609375},{"id":"https://openalex.org/keywords/echo","display_name":"Echo (communications protocol)","score":0.41575270891189575},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39622217416763306},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3690716624259949},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.28951314091682434},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10645738244056702},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.0675501823425293}],"concepts":[{"id":"https://openalex.org/C177291462","wikidata":"https://www.wikidata.org/wiki/Q423038","display_name":"Active listening","level":2,"score":0.9054670333862305},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.8041640520095825},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7155629992485046},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5602355003356934},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.4869872033596039},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.43686628341674805},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43422698974609375},{"id":"https://openalex.org/C2779426996","wikidata":"https://www.wikidata.org/wiki/Q18389128","display_name":"Echo (communications protocol)","level":2,"score":0.41575270891189575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39622217416763306},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3690716624259949},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28951314091682434},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10645738244056702},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0675501823425293},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C46312422","wikidata":"https://www.wikidata.org/wiki/Q11024","display_name":"Communication","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3368860.3368867","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3368860.3368867","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3368860.3368867","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the New Security Paradigms Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:escholarship.org:ark:/13030/qt1bk3p2x5","is_oa":true,"landing_page_url":"https://escholarship.org/uc/item/1bk3p2x5","pdf_url":"https://escholarship.org/uc/item/1bk3p2x5","source":{"id":"https://openalex.org/S4306400115","display_name":"eScholarship (California Digital Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801248553","host_organization_name":"California Digital Library","host_organization_lineage":["https://openalex.org/I2801248553"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"},{"id":"pmh:oai:escholarship.org:ark:/13030/qt31667803","is_oa":false,"landing_page_url":"https://escholarship.org/uc/item/31667803","pdf_url":null,"source":{"id":"https://openalex.org/S4306400115","display_name":"eScholarship (California Digital Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801248553","host_organization_name":"California Digital Library","host_organization_lineage":["https://openalex.org/I2801248553"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"etd"}],"best_oa_location":{"id":"doi:10.1145/3368860.3368867","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3368860.3368867","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3368860.3368867","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the New Security Paradigms Workshop","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[{"id":"https://openalex.org/G5564951057","display_name":"TWC: Medium: Collaborative: Security and Privacy for Wearable and Continuous Sensing Platforms","funder_award_id":"1514211","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"},{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"},{"id":"https://openalex.org/F4320333609","display_name":"Center for Long-Term Cybersecurity, University of California Berkeley","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2999829621.pdf","grobid_xml":"https://content.openalex.org/works/W2999829621.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W1559155956","https://openalex.org/W1640628807","https://openalex.org/W1882297107","https://openalex.org/W2589063696","https://openalex.org/W2810493596","https://openalex.org/W2888849322","https://openalex.org/W2965288462","https://openalex.org/W3211846114","https://openalex.org/W4383956206"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2170801710","https://openalex.org/W2384861574","https://openalex.org/W2952704802","https://openalex.org/W4294565801","https://openalex.org/W2142306706"],"abstract_inverted_index":{"Intelligent":[0],"voice":[1],"assistants":[2],"(IVAs)":[3],"and":[4,18,51,106],"other":[5],"voice-enabled":[6],"devices":[7,77],"already":[8],"form":[9],"an":[10],"integral":[11],"component":[12],"of":[13,16,53,74,121],"the":[14,35,48,72,119],"Internet":[15],"Things":[17],"will":[19,30],"continue":[20],"to":[21,60,68,110],"grow":[22],"in":[23,42],"popularity.":[24],"As":[25],"their":[26],"capabilities":[27],"evolve,":[28],"they":[29],"move":[31],"beyond":[32],"relying":[33],"on":[34],"wake-words":[36],"today's":[37],"IVAs":[38],"use,":[39],"engaging":[40],"instead":[41],"continuous":[43,49],"listening.":[44],"Though":[45],"potentially":[46],"useful,":[47],"recording":[50],"analysis":[52],"speech":[54],"can":[55],"pose":[56],"a":[57,95,99,112],"serious":[58],"threat":[59],"individuals'":[61],"privacy.":[62],"Ideally,":[63],"users":[64],"would":[65],"be":[66],"able":[67],"limit":[69],"or":[70],"control":[71],"types":[73],"information":[75],"such":[76,90],"have":[78],"access":[79],"to.":[80],"But":[81],"existing":[82],"technical":[83],"approaches":[84,109],"are":[85],"insufficient":[86],"for":[87,102],"enforcing":[88],"any":[89],"restrictions.":[91],"To":[92],"begin":[93],"formulating":[94],"solution,":[96],"we":[97],"develop":[98],"systematic":[100],"methodology":[101],"studying":[103],"continuous-listening":[104],"applications":[105],"survey":[107],"architectural":[108],"designing":[111],"system":[113],"that":[114],"enhances":[115],"privacy":[116],"while":[117],"preserving":[118],"benefits":[120],"always-listening":[122],"assistants.":[123]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
