Virtual assistant privacy

Last updated

Unlike virtual receptionists which ensure quality customer service, Virtual assistants are software technology that assist users complete various tasks . [1] Well known virtual assistants include Amazon Alexa, and Siri, produced by Apple. Other companies, such as Google and Microsoft, also have virtual assistants. There are privacy issues concerning what information can go to the third party corporations that operate virtual assistants and how this data can potentially be used. [2]

Contents

Because virtual assistants similarly to robots or other artificial intelligence are often considered "nurturing" bodies, consumers may overlook potential controversies and value their convenience more than their privacy. When forming relationships with devices, humans tend to become closer to those that perform humanly functions, which is what virtual assistants do. [3] In order to allow users both convenience and assistance, privacy by design and the Virtual Security Button (VS Button) propose methods in which both are possible.

One layer versus multilayer authentication

The Virtual Security Button, which would detect motion, has been proposed as a method of adding multilayer authentication to devices that currently only have a single layer; devices with single layer authentication solely require a voice to be activated. This voice could be any person, not necessarily the intended human, which makes the method unreliable. [4] Multilayer authentication requires multiple layers of security to authorize a virtual assistant to work. The Virtual Security button would provide a second layer of authentication for devices, such as Alexa, that would be triggered by both movement and the voice combined. [4]

A specific instance in which there are issues with the lack of verification necessary to unlock access to the virtual assistants and to give them commands is when an Amazon Alexa is left in a living quarters unattended. [4] Currently, there is only one layer of authentication which is the voice; there is not a layer that requires the owner of the virtual assistant to be present. Thus, with only one barrier to access all of the information virtual assistants have access to, concerns regarding the security of information exchanged are raised. Such privacy concerns have influenced the technology sector to think of ways to add more verification, such as a Virtual Security Button. [4]

Voice authentication with Siri

The "Hey Siri" function allows the iPhone to listen through ambient sound until this phrase ("Hey Siri") is spotted. Once this phrase is spotted, Siri is triggered to respond. [5] In order to not always be listened to, an iPhone user can turn off the "Hey Siri" function. Without this function turned on, the device will not always be listening for those two words and other information will not be overheard in the process. [5] This voice authentication serves as a singular layer, since only the voice is used to authenticate the user.

Examples of virtual assistants

Amazon Alexa

This virtual assistant is linked to the "Echo" speaker created by Amazon and is primarily a device controlled by the voice that can play music, give information to the user, and perform other functions. [6] Since the device is controlled by the voice, there are no buttons involved in its usage. The device does not have a measure to determine whether or not the voice heard is actually the consumer. [4] The Virtual Security Button (VS Button) has been proposed as a potential method to add more security to this virtual assistant. [4]

The benefits of adding a VS button to Alexa

The VS button uses technology from wifi networks to sense human kinematic movements. [4] Home burglary poses a danger, as smart lock technology can be activated since there will be motion present. [4] Thus, the VS button providing a double-check method before allowing Alexa to be utilized would lessen such dangerous scenarios from occurring. [4] The introduction of the Virtual Security button would add another level of authentication, hence adding privacy to the device. [4]

Apple’s Siri

Siri is Apple Corporation's virtual assistant and is utilized on the iPhone. Siri gathers the information that users input and has the ability to utilize this data. [2] The ecosystem of the technological interface is vital in determining the amount of privacy; the ecosystem is where the information lives. Other information that can be compromised is location information if one uses the GPS feature of the iPhone. [7] Any information, such as one's location, that is given away in an exchange with a virtual assistant is stored in these ecosystems. [7]

Hey Siri

"Hey Siri" allows Siri to be voice-activated. The device continues to collect ambient sounds until it finds the words "Hey Siri." [5] This feature can be helpful for those who are visually impaired, as they can access their phone's applications through solely their voice. [8]

Siri's level of authentication

Apple's Siri also has solely one level of authentication. If one has a passcode, in order to utilize various features, Siri will require the passcode to be inputted. However, consumers value convenience so passcodes are not in all devices. [4]

Cortana

Cortana, Microsoft's virtual assistant, is another voice activated virtual assistant that only requires the voice; hence, it also utilizes solely the singular form of authentication. [6] The device does not utilize the VS button previously described to have a second form of authentication present. The commands that the device utilizes mostly have to do with saying what the weather is, calling one of the user's contacts, or giving directions. All of these commands require an insight into the user's life because in the process of answering these queries, the device looks through data which is a privacy risk.

Google Assistant

Google Assistant, which was originally dubbed Google Now, is the most human-like virtual assistant. [6] The similarities between humans and this virtual assistant stem from the natural language utilized as well as the fact that this virtual assistant in particular is very knowledgeable about the tasks that humans would like them to complete prior to the user's utilization of these tasks. This prior knowledge makes the interaction much more natural. Some of these interactions specifically are called promotional commands. [6]

Automated virtual assistants in ride sharing

Ride sharing companies like Uber and Lyft utilize artificial intelligence to scale their scopes of business. In order to create adaptable prices that change with the supply and demand of rides, such companies use technological algorithms to determine "surge" or "prime time" pricing. [9] Moreover, this artificial intelligence feature helps to allay privacy concerns regarding the potential exchange of confidential user information between Uber and Lyft employees. However, even the artificial intelligence utilized can "interact" with each other, so these privacy concerns for the companies are still relevant. [9]

Accessibility of terms of use

The terms of use that one has to approve when first getting their device is what gives corporations like Apple Corporation access to information. These agreements outline both the functions of devices, what information is private, and any other information that the company thinks is necessary to expose. [10] Even for customers that do read this information, the information is often decoded in a vague and unclear manner. The text is objectively a small font and is often considered too wordy or lengthy in scope for the average user. [10]

Privacy by design

Privacy by design makes the interface more secure for the user. Privacy by design is when a product's blueprint incorporates aspects of privacy into how the object or program is created. [11] Even technology uses that have little to do with location have the ability to track one's location. For example, WiFi networks are a danger for those trying to keep their locations private. Various organizations are working toward making privacy by design more regulated so that more companies do it. [11]

If a product does not have privacy by design, the producer might consider adding modes of privacy to the product. The goal is for organizations to be formed to ensure that privacy by design is done using a standard; this standard would make privacy by design more reliable and trustworthy than privacy by choice. [11] The standard would have to be high enough to not allow for loopholes of information to infringe upon, and such rules may apply to virtual assistants.

Various patents have controlled the requirement of technology, such as artificial intelligence, to include various modes of privacy by nature. These proposals have included Privacy by Design, which occurs when aspects of privacy are incorporated into the blueprint of a device. [12] This way, corporations do not have to build privacy into their designs in the future; designs can be written with privacy in mind. This would allow for a more fail-safe method to make sure that algorithms of privacy would not leave even edge cases out. [11]

Artificial intelligence

Artificial intelligence as a whole attempts to emulate human actions and provide the menial services that humans provide, but should not have to be bothered with. [13] In the process of automating these actions, various technological interfaces are formed.

The problem that has to be solved has to do with the concept that in order to process information and perform their functions, virtual assistants curate information. [13] What they do with this information and how the information can be compromised is vital to note for both the field of virtual assistants and artificial intelligence more broadly.

Controversy

There have been controversies surrounding the opinions that virtual assistants can have. As the technology has evolved, there is potential for the virtual assistants to possess controversial positions on issues which can cause uproar. These views can be political, which can be impactful on society since virtual assistants are used so widely. [14]

Crowdsourcing is also controversial; although it allows for innovation from the users, it can perhaps act as a cop-out for companies to take credit where, in reality, the customers have created a new innovation. [15]

Wizard of Oz approach

One way to research human-robot interaction is called the Wizard of Oz approach. Specifically, this approach aims to have a human leader of a study fill in for a robot while the user completes a task for research purposes. [16] In addition to humans evaluating artificial intelligence and robots, the Wizard of Oz approach is being introduced. When technology becomes close to being human-like, the Wizard of Oz approach says that this technology has the ability to evaluate and augment other artificial intelligence technology. Moreover, the method also suggests that technology, in order to be utilized, does not necessarily have to be human-like. [16] Thus, in order to be utilized, as long as they have useful features, virtual assistants do not have to focus all of their innovation on becoming more human-like.

Related Research Articles

Authentication Act of proving an assertion, often the identity of a computer system user

Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The benefits of a VPN include increases in functionality, security, and management of the private network. It provides access to resources that are inaccessible on the public network and is typically used for remote workers. Encryption is common, although not an inherent part of a VPN connection.

Internet security Branch of computer security specifically related to Internet, often involving browser security and the World Wide Web

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

Speaker recognition is the identification of a person from characteristics of voices. It is used to answer the question "Who is speaking?" The term voice recognition can refer to speaker recognition or speech recognition. Speaker verification contrasts with identification, and speaker recognition differs from speaker diarisation.

A voice-user interface (VUI) makes spoken human interaction with computers possible, using speech recognition to understand spoken commands and answer questions, and typically text to speech to play a reply. A voice command device (VCD) is a device controlled with a voice user interface.

Voice search, also called voice-enabled, allows the user to use a voice command to search the Internet, a website, or an app.

Virtual assistant Mobile software agent

An intelligent virtual assistant (IVA) or intelligent personal assistant (IPA) is a software agent that can perform tasks or services for an individual based on commands or questions. The term "chatbot" is sometimes used to refer to virtual assistants generally or specifically accessed by online chat. In some cases, online chat programs are exclusively for entertainment purposes. Some virtual assistants are able to interpret human speech and respond via synthesized voices. Users can ask their assistants questions, control home automation devices and media playback via voice, and manage other basic tasks such as email, to-do lists, and calendars with verbal commands. A similar concept, however with differences, lays under the dialogue systems.

Siri Software based personal assistant from Apple Inc.

Siri is a virtual assistant that is part of Apple Inc.'s iOS, iPadOS, watchOS, macOS, tvOS, and audioOS operating systems. It uses voice queries, gesture based control, focus-tracking and a natural-language user interface to answer questions, make recommendations, and perform actions by delegating requests to a set of Internet services. With continued use, it adapts to users' individual language usages, searches and preferences, returning individualized results.

A lock screen is a computer user interface element used by various operating systems. They regulate immediate access to a device by requiring the user to perform a certain action in order to receive access, such as entering a password, using a certain button combination, or performing a certain gesture using a device's touchscreen. There are various authentication methods to get past the lock screen, with the most popular and common ones being personal identification numbers (PINs), the Android pattern lock, and biometrics.

Cortana (virtual assistant) Personal assistant by Microsoft

Cortana is a virtual assistant developed by Microsoft which uses the Bing search engine to perform tasks such as setting reminders and answering questions for the user.

Amazon Echo, often shortened to Echo, is an American brand of smart speakers developed by Amazon. Echo devices connect to the voice-controlled intelligent personal assistant service Alexa, which will respond when a user says "Alexa". Users may change this wake word to "Amazon", "Echo", "Computer", as well as some other options. The features of the device include voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, and playing audiobooks, in addition to providing weather, traffic and other real-time information. It can also control several smart devices, acting as a home automation hub.

Amazon Alexa, also known simply as Alexa, is a virtual assistant technology largely based on a Polish speech synthesiser named Ivona, bought by Amazon in 2013. It was first used in the Amazon Echo smart speaker and the Echo Dot, Echo Studio and Amazon Tap speakers developed by Amazon Lab126. It is capable of voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, sports, and other real-time information, such as news. Alexa can also control several smart devices using itself as a home automation system. Users are able to extend the Alexa capabilities by installing "skills" such as weather programs and audio features. It uses automatic speech recognition, natural language processing, and other forms of weak AI to perform these tasks.

A smart speaker is a type of loudspeaker and voice command device with an integrated virtual assistant that offers interactive actions and hands-free activation with the help of one "hot word". Some smart speakers can also act as a smart device that utilizes Wi-Fi, Bluetooth and other protocol standards to extend usage beyond audio playback, such as to control home automation devices. This can include, but is not limited to, features such as compatibility across a number of services and platforms, peer-to-peer connection through mesh networking, virtual assistants, and others. Each can have its own designated interface and features in-house, usually launched or controlled via application or home automation software. Some smart speakers also include a screen to show the user a visual response.

Network eavesdropping, also known as eavesdropping attack, sniffing attack, or snooping attack, is a method that retrieves user information through the internet. This attack happens on electronic devices like computers and smartphones. This network attack typically happens under the usage of unsecured networks, such as public wifi connections or shared electronic devices. Eavesdropping attacks through the network is considered one of the most urgent threats in industries that rely on collecting and storing data.

Face ID Facial recognition system by Apple

Face ID is a facial recognition system designed and developed by Apple Inc. for the iPhone and iPad Pro. The system allows biometric authentication for unlocking a device, making payments, accessing sensitive data, providing detailed facial expression tracking for Animoji, as well as six degrees of freedom (6DOF) head-tracking, eye-tracking, and other features. Initially released in November 2017 with the iPhone X, it has since been updated and introduced to several new iPhone models, and all iPad Pro models.

A conversational user interface (CUI) is a user interface for computers that emulates a conversation with a real human. Historically, computers have relied on text-based user interfaces and graphical user interfaces (GUIs) to translate the user's desired action into commands the computer understands. While an effective mechanism of completing computing actions, there is a learning curve for the user associated with GUI. Instead, CUIs provide opportunity for the user to communicate with the computer in their natural language rather than in a syntax specific commands.

AliGenie is a China-based open-platform intelligent personal assistant launched and developed by Alibaba Group, currently used in the Tmall Genie smart speaker. The platform was introduced in 2017, along with the Tmall Genie X1, at Alibaba's 2017 Computing Conference in Hangzhou.

Female gendering of AI technologies is the use of artificial intelligence (AI) technologies gendered as female, such as in digital voice or written assistants. These gender-specific aspects of AI technologies, created both by humans as well as by algorithms, were discussed in a 2019 policy paper and two complements under the title I'd blush if I could. Closing gender divides in digital skills through education. Published under an open access licence by EQUALS Global Partnership and UNESCO, it has prompted further discussion on gender-related bias in the global virtual space.

Celia is an artificially intelligent virtual assistant developed by Huawei for their latest Android-based EMUI smartphones that lack Google Services and a Google Assistant. The assistant can perform day-to-day tasks, which include making a phone call, setting a reminder and checking the weather. It was unveiled on 7 April 2020 and got publicly released on 27 April 2020 via an OTA update solely to selected devices that can update their software to EMUI 10.1.

References

  1. System and method for distributed virtual assistant platforms (patent) , retrieved 2018-11-09
  2. 1 2 Sadun, Erica; Sande, Steve (2012). Talking to Siri . Que Publishing. ISBN   9780789749734.
  3. Turkle, Sherry. "A Nascent Robotics Culture: New Complicities for Companionship" (PDF). MIT.
  4. 1 2 3 4 5 6 7 8 9 10 11 Lei, Xinyu; Tu, Guan-Hua; Liu, Alex X.; Li, Chi-Yu; Xie, Tian (2017). "The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study". arXiv: 1712.03327 .{{cite journal}}: Cite journal requires |journal= (help)
  5. 1 2 3 Zhang, Guoming; Yan, Chen; Ji, Xiaoyu; Zhang, Tianchen; Zhang, Taimin; Xu, Wenyuan (2017). "DolphinAttack". Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17. pp. 103–117. arXiv: 1708.09537 . doi:10.1145/3133956.3134052. ISBN   9781450349468. S2CID   2419970.
  6. 1 2 3 4 López, Gustavo; Quesada, Luis; Guerrero, Luis A. (2018). "Alexa vs. Siri vs. Cortana vs. Google Assistant: A Comparison of Speech-Based Natural User Interfaces". Advances in Human Factors and Systems Interaction. Advances in Intelligent Systems and Computing. Vol. 592. pp. 241–250. doi:10.1007/978-3-319-60366-7_23. ISBN   978-3-319-60365-0.
  7. 1 2 Andrienko, Gennady; Gkoulalas-Divanis, Aris; Gruteser, Marco; Kopp, Christine; Liebig, Thomas; Rechert, Klaus (2013). "Report from Dagstuhl". ACM SIGMOBILE Mobile Computing and Communications Review. 17 (2): 7. doi:10.1145/2505395.2505398. S2CID   1357034.
  8. Ye, Hanlu; Malu, Meethu; Oh, Uran; Findlater, Leah (2014). "Current and future mobile and wearable device use by people with visual impairments". Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14. pp. 3123–3132. CiteSeerX   10.1.1.453.6994 . doi:10.1145/2556288.2557085. ISBN   9781450324731. S2CID   2787361.
  9. 1 2 Ballard, Dyllan; Naik, Amar. "ALGORITHMS, ARTIFICIAL INTELLIGENCE, AND JOINT CONDUCT" (PDF). Competition Policy International.
  10. 1 2 Stylianou, Konstantinos K. (2010). "An Evolutionary Study of Cloud Computing Services Privacy Terms". John Marshall Journal of Computer & Information Law. 27 (4).
  11. 1 2 3 4 Cavoukian, Ann; Bansal, Nilesh; Koudas, Nick. "Building Privacy into Mobile Location Analytics (MLA) Through Privacy by Design" (PDF). Privacy by Design. FTC.
  12. Personal virtual assistant (patent) , retrieved 2018-10-30
  13. 1 2 Cite book|title=Machines who think : a personal inquiry into the history and prospects of artificial intelligence|author=McCorduck, Pamela|date=2004|publisher=A.K. Peters|isbn=978-1568812052|edition=25th anniversary update|location=Natick, Mass.|oclc=52197627}}[ page needed ]
  14. Barberá, Pablo; Jost, John T.; Nagler, Jonathan; Tucker, Joshua A.; Bonneau, Richard (2015). "Tweeting from Left to Right". Psychological Science. 26 (10): 1531–1542. doi:10.1177/0956797615594620. PMID   26297377. S2CID   4649581.
  15. Budak, Ceren; Goel, Sharad; Rao, Justin M. (2016). "Fair and Balanced? Quantifying Media Bias through Crowdsourced Content Analysis". Public Opinion Quarterly. 80: 250–271. doi:10.1093/poq/nfw007.
  16. 1 2 Dahlbäck, Nils; Jönsson, Arne; Ahrenberg, Lars (1993). "Wizard of Oz Studies: Why and How". Proceedings of the 1st International Conference on Intelligent User Interfaces. IUI '93. New York, NY, USA: ACM: 193–200. doi:10.1145/169891.169968. ISBN   9780897915564. S2CID   1611353.