{"id":"https://openalex.org/W7128693978","doi":"https://doi.org/10.48550/arxiv.2602.10142","title":"Privacy by Voice: Modeling Youth Privacy-Protective Behavior in Smart Voice Assistants","display_name":"Privacy by Voice: Modeling Youth Privacy-Protective Behavior in Smart Voice Assistants","publication_year":2026,"publication_date":"2026-02-09","ids":{"openalex":"https://openalex.org/W7128693978","doi":"https://doi.org/10.48550/arxiv.2602.10142"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.10142","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049979288","display_name":"Molly Campbell","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Campbell, Molly","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5078540596","display_name":"Ajay Kumar Shrestha","orcid":"https://orcid.org/0000-0002-1081-7036"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shrestha, Ajay Kumar","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049979288"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12128","display_name":"AI in Service Interactions","score":0.8708999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12128","display_name":"AI in Service Interactions","score":0.8708999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11519","display_name":"Digital Mental Health Interventions","score":0.04910000041127205,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10709","display_name":"Social Robot Interaction and HRI","score":0.006399999838322401,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.5882999897003174},{"id":"https://openalex.org/keywords/negotiation","display_name":"Negotiation","score":0.5160999894142151},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.508899986743927},{"id":"https://openalex.org/keywords/risk-perception","display_name":"Risk perception","score":0.47859999537467957},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.4657000005245209},{"id":"https://openalex.org/keywords/grounded-theory","display_name":"Grounded theory","score":0.45989999175071716},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.4577000141143799}],"concepts":[{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.5882999897003174},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5702000260353088},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.5160999894142151},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.508899986743927},{"id":"https://openalex.org/C163355716","wikidata":"https://www.wikidata.org/wiki/Q2154783","display_name":"Risk perception","level":3,"score":0.47859999537467957},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.4657000005245209},{"id":"https://openalex.org/C156325361","wikidata":"https://www.wikidata.org/wiki/Q1152864","display_name":"Grounded theory","level":3,"score":0.45989999175071716},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.4577000141143799},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.44130000472068787},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4165000021457672},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.3952000141143799},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37369999289512634},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.36469998955726624},{"id":"https://openalex.org/C89785696","wikidata":"https://www.wikidata.org/wiki/Q2290753","display_name":"Theory of planned behavior","level":3,"score":0.36000001430511475},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.35580000281333923},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3529999852180481},{"id":"https://openalex.org/C75630572","wikidata":"https://www.wikidata.org/wiki/Q538904","display_name":"Applied psychology","level":1,"score":0.3384999930858612},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.32420000433921814},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C123269153","wikidata":"https://www.wikidata.org/wiki/Q1897038","display_name":"Theory of reasoned action","level":2,"score":0.30059999227523804},{"id":"https://openalex.org/C198477413","wikidata":"https://www.wikidata.org/wiki/Q7647069","display_name":"Survey data collection","level":2,"score":0.2831999957561493},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2572999894618988}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.10142","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.10142","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.10142","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.10142","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.7158315181732178,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Smart":[0],"Voice":[1],"Assistants":[2],"(SVAs)":[3],"are":[4],"deeply":[5],"embedded":[6],"in":[7,45],"the":[8,13,16,88,94,158,187],"lives":[9],"of":[10,71,91,96,189],"youth,":[11],"yet":[12,132],"mechanisms":[14],"driving":[15],"privacy-protective":[17,65],"behaviors":[18,66],"among":[19],"young":[20,182],"users":[21],"remain":[22],"poorly":[23],"understood.":[24],"This":[25,105,164],"study":[26,165],"investigates":[27],"how":[28,151],"Canadian":[29],"youth":[30,73],"(aged":[31],"16-24)":[32],"negotiate":[33],"privacy":[34,50,61],"with":[35],"SVAs":[36],"by":[37,103,137],"developing":[38],"and":[39,58,64,145,154,174],"testing":[40],"a":[41,107],"structural":[42,80],"model":[43,124],"grounded":[44],"five":[46],"key":[47],"constructs:":[48],"perceived":[49,53],"risks":[51],"(PPR),":[52],"benefits":[54],"(PPBf),":[55],"algorithmic":[56],"transparency":[57],"trust":[59],"(ATT),":[60],"self-efficacy":[62,159],"(PSE),":[63],"(PPB).":[67],"A":[68],"cross-sectional":[69],"survey":[70],"N=469":[72],"was":[74],"analyzed":[75],"using":[76],"partial":[77],"least":[78],"squares":[79],"equation":[81],"modeling.":[82],"Results":[83],"reveal":[84],"that":[85,126,180],"PSE":[86],"is":[87,100],"strongest":[89],"predictor":[90],"PPB,":[92],"while":[93],"effect":[95],"ATT":[97],"on":[98],"PPB":[99],"fully":[101],"mediated":[102],"PSE.":[104],"identifies":[106],"critical":[108],"efficacy":[109],"gap,":[110],"where":[111],"youth's":[112],"confidence":[113],"must":[114],"first":[115],"be":[116],"built":[117],"up":[118],"for":[119,161],"them":[120],"to":[121,172],"act.":[122],"The":[123],"confirms":[125],"PPBf":[127],"directly":[128],"discourages":[129],"protective":[130,162],"action,":[131],"also":[133],"indirectly":[134],"fosters":[135],"it":[136,176],"slightly":[138],"boosting":[139],"self-efficacy.":[140],"These":[141],"findings":[142],"empirically":[143],"validate":[144],"extend":[146],"earlier":[147],"qualitative":[148],"work,":[149],"quantifying":[150],"policy":[152],"overload":[153],"hidden":[155],"controls":[156],"erode":[157],"necessary":[160],"action.":[163],"contributes":[166],"an":[167],"evidence-based":[168],"pathway":[169],"from":[170],"perception":[171],"action":[173],"translates":[175],"into":[177],"design":[178],"imperatives":[179],"empower":[181],"digital":[183],"citizens":[184],"without":[185],"sacrificing":[186],"utility":[188],"SVAs.":[190]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-13T00:00:00"}
