Identification and Influence of Perceived Risks on Smart Speaker Use Behavior

Bibtex

Cite as text

						@Select Types{,
							 
							 
							 
							 
							 
							Journal   = "Band-1",
							 Title= "Identification and Influence of Perceived Risks on Smart Speaker Use Behavior", 
							Author= "Maximilian Haug, Philipp Rössler, Heiko Gewald", 
							Doi= "https://doi.org/10.30844/wi_2020_l5-haug", 
							 Abstract= "Smart speakers gain more and more attraction from users. However, the technology is still relatively new and users feel uneasy about how and what functionality to use. This research investigates users’ perception about risks associated with the use of smart speakers. In a qualitative study in which users could engage with smart speakers for a 2-month time frame, we found that risks show to be partly hypothetical and users develop unlikely risk scenarios which prevent them from using the whole functionality spectrum of a smart speaker.

", 
							 Keywords= "Smart Speaker, Perceived Risks, Privacy, Security.
", 
							}
					
Maximilian Haug, Philipp Rössler, Heiko Gewald: Identification and Influence of Perceived Risks on Smart Speaker Use Behavior. Online: https://doi.org/10.30844/wi_2020_l5-haug (Abgerufen 23.05.24)

Abstract

Abstract

Smart speakers gain more and more attraction from users. However, the technology is still relatively new and users feel uneasy about how and what functionality to use. This research investigates users’ perception about risks associated with the use of smart speakers. In a qualitative study in which users could engage with smart speakers for a 2-month time frame, we found that risks show to be partly hypothetical and users develop unlikely risk scenarios which prevent them from using the whole functionality spectrum of a smart speaker.

Keywords

Schlüsselwörter

Smart Speaker, Perceived Risks, Privacy, Security.

References

Referenzen

[1] Steinharter, H. and T. Kuhn, Künstliche Intelligenz – Bitte ein Bot, in Wirtschaftswoche. 2016. p. 51-52.

[2] Lopatovska, I., et al., Talk to me: Exploring user interactions with the Amazon Alexa. Journal of Librarianship, 2018.

[3] Crossler, R.E., K.-K.R. Choo, and F. Bélanger. Intelligent Home Assistant Use in the Home Environment. in Twenty-fourth Americas Conference on Information Systems. 2018. New Orleans.

[4] Appiah Otoo, B. and A.F. Salam, Mediating Effect of Intelligent Voice Assistant (IVA), User Experience and Effective Use on Service Quality and Service Satisfaction and Loyalty, in Thirty ninth International Conference on Information Systems. 2018: San Francisco.

[5] Hoy, M.B., Alexa, Siri, Cortana, and More: An Introduction to Voice Assistants. Med Ref Serv Q, 2018. 37(1): p. 81-88.

[6] Moorthy, A.E. and K.-P.L. Vu, Privacy Concerns for Use of Voice Activated Personal Assistant in the Public Space. International Journal of Human- Computer Interaction, 2014. 31(4): p. 307-335.

[7] Mallat, N., V. Tuunainen, and K. Wittkowski. Voice Activated Personal Assistants – Consumer Use Contexts and Usage Behavior. in Twenty-third Americas Conference on Information Systems. 2017. Boston.

[8] Jiang, J., et al., Automatic Online Evaluation of Intelligent Assistants, in Proceedings of the 24th International Conference on World Wide Web – WWW ’15. 2015. p. 506-516.

[9] Han, S. and H. Yang, Understanding adoption of intelligent personal assistants – A parasocial relationship perspective. Industrial Management & Data Systems, 2017. 118(3).

[10] Goksel-Canbek, N. and M.E. Mutlu, On the track of Artificial Intelligence: Learning with Intelligent Personal Assistants. International Journal of Human Sciences, 2016. 13(1).

[11] Mihale-Wilson, C., J. Zibuschka, and O. Hinz, About user preferences and willingness to pay for a secure and privacy protective ubiquitous personal assistant, in Twenty-Fifth European Conference on Information Systems (ECIS). 2017: Guimarães.

[12] Smith, H.J., T. Dinev, and H. Xu, Information privacy research: an interdisciplinary review. MIS quarterly, 2011. 35(4): p. 989-1016.

[13] Xu, H., et al., Examining the formation of individual’s privacy concerns: Toward an integrative view. ICIS 2008 proceedings, 2008: p. 6.

[14] Malhotra, N.K., S.S. Kim, and J. Agarwal, Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, 2004. 15(4): p. 336-355.

[15] Xu, H., The effects of self-construal and perceived control on privacy concerns. ICIS 2007 proceedings, 2007: p. 125.

[16] Bansal, G. and D. Gefen, The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision support systems, 2010. 49(2): p. 138-150.

[17] Chen, K. and A.I. Rea Jr, Protecting personal information online: A survey of user privacy concerns and control techniques. Journal of Computer Information Systems, 2004. 44(4): p. 85-92.

[18] Airehrour, D., J. Gutierrez, and S.K. Ray, Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 2016. 66: p. 198-213.

[19] Fink, G.A., et al. Security and privacy grand challenges for the Internet of Things. in 2015 International Conference on Collaboration Technologies and Systems (CTS). 2015. IEEE.

[20] Henze, M., et al., A comprehensive approach to privacy in the cloud-based Internet of Things. Future Generation Computer Systems, 2016. 56: p. 701- 718.

[21] Malina, L., et al., On perspective of security and privacy-preserving solutions in the internet of things. Computer Networks, 2016. 102: p. 83-95.

[22] Porras, J., et al. Security In The Internet Of Things-A Systematic Mapping Study. in Proceedings of the 51st Hawaii International Conference on System Sciences. 2018.

[23] Klopfer, P.H. and D.I. Rubenstein, The concept privacy and its biological basis. Journal of social Issues, 1977. 33(3): p. 52-65.

[24] Posner, R.A., The economics of privacy. The American economic review, 1981. 71(2): p. 405-409.

[25] Featherman, M.S. and P.A. Pavlou, Predicting e-services adoption: a perceived risk facets perspective. International journal of human-computer studies, 2003. 59(4): p. 451-474.

[26] Dinev, T., et al., Privacy calculus model in e-commerce–a study of Italy and the United States. European Journal of Information Systems, 2006. 15(4): p. 389-402.

[27] Huberman, A., M. Miles, and J. Saldana, Qualitative data analysis: A methods sourcebook. 2013, Thousand Oaks, CA: Sage Publications Inc.

[28] Flick, U., An introduction to qualitative research. 2018: Sage Publications Limited.

[29] Bauer, R.A., Consumer behavior as risk taking. Chicago, IL, 1960: p. 384- 398.

[30] Plachkinova, M., A. Vo, and A. Alluhaidan, Emerging trends in smart home security, privacy, and digital forensics, in Twenty-second Americas Conference on Information Systems. 2016: San Diego.

[31] Gewald, H., K. Wüllenweber, and T. Weitzel, THE INFLUENCE OF PERCEIVED RISKS ON BANKING MANAGERS’INTENTION TO OUTSOURCE BUSINESS PROCESSES: A STUDY OF THE GERMAN BANKING AND FINANCE INDUSTRY. Journal of Electronic Commerce Research, 2006. 7(2).

[32] Lei, X., et al. The Insecurity of Home Digital Voice Assistants- Vulnerabilities, Attacks and Countermeasures. in IEEE Conference on Communications and Network Security (CNS). 2018.

[33] Wirth, J., C. Maier, and S. Laumer. The Influence of Resignation on the Privacy Calculus in the Context of Social Networking Sites: An Empirical Analysis. in Proceedings of the Twenty-Sixth European Conference on Information Systems. 2018. Portsmouth, UK.

[34] Edwards, A.L., The social desirability variable in personality assessment and research. 1957.

Most viewed articles

Meist angesehene Beiträge

GITO events | library.gito