{"title":"智能音箱中的隐私:系统的文献综述","authors":"Guglielmo Maccario, M. Naldi","doi":"10.1002/spy2.274","DOIUrl":null,"url":null,"abstract":"Parallel to the increasing use of smart speakers (aka virtual assistants), privacy concerns emerge. In this article, we provide a systematic review of the literature on privacy issues in smart speakers. Both Scopus and Web of Science databases are examined, as well as the preprint repository arXiv, to take into account the most recent contributions. That literature exhibits a continuously growing trend in the last 4 years, with the USA being the single largest contributor to the field. The topics debated in the literature concern the perception of privacy issues, their contribution to adoption choices, the identification of vulnerabilities, the proposal of possible countermeasures, and (last and least) the analysis of the legal cases that are arising.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Privacy in smart speakers: A systematic literature review\",\"authors\":\"Guglielmo Maccario, M. Naldi\",\"doi\":\"10.1002/spy2.274\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Parallel to the increasing use of smart speakers (aka virtual assistants), privacy concerns emerge. In this article, we provide a systematic review of the literature on privacy issues in smart speakers. Both Scopus and Web of Science databases are examined, as well as the preprint repository arXiv, to take into account the most recent contributions. That literature exhibits a continuously growing trend in the last 4 years, with the USA being the single largest contributor to the field. The topics debated in the literature concern the perception of privacy issues, their contribution to adoption choices, the identification of vulnerabilities, the proposal of possible countermeasures, and (last and least) the analysis of the legal cases that are arising.\",\"PeriodicalId\":29939,\"journal\":{\"name\":\"Security and Privacy\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2022-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/spy2.274\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spy2.274","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
随着智能音箱(又名虚拟助手)的日益普及,隐私问题也随之出现。在本文中,我们对智能扬声器中的隐私问题进行了系统的综述。我们会检查Scopus和Web of Science数据库,以及预印本库arXiv,以考虑到最新的贡献。在过去的4年里,这些文献呈现出持续增长的趋势,美国是该领域最大的贡献者。文献中讨论的主题涉及对隐私问题的看法,它们对采用选择的贡献,漏洞的识别,可能的对策的建议,以及(最后也是最不重要的)对正在出现的法律案件的分析。
Privacy in smart speakers: A systematic literature review
Parallel to the increasing use of smart speakers (aka virtual assistants), privacy concerns emerge. In this article, we provide a systematic review of the literature on privacy issues in smart speakers. Both Scopus and Web of Science databases are examined, as well as the preprint repository arXiv, to take into account the most recent contributions. That literature exhibits a continuously growing trend in the last 4 years, with the USA being the single largest contributor to the field. The topics debated in the literature concern the perception of privacy issues, their contribution to adoption choices, the identification of vulnerabilities, the proposal of possible countermeasures, and (last and least) the analysis of the legal cases that are arising.