Search results
1 – 10 of over 1000Marcia Combs, Casey Hazelwood and Randall Joyce
Digital voice assistants use wake word engines (WWEs) to monitor surrounding audio for detection of the voice assistant's name. There are two failed conditions for a WWE, false…
Abstract
Purpose
Digital voice assistants use wake word engines (WWEs) to monitor surrounding audio for detection of the voice assistant's name. There are two failed conditions for a WWE, false negative and false positive. Wake word false positives threaten a loss of personal privacy because, upon activation, the digital assistant records audio to the voice cloud service for processing.
Design/methodology/approach
This observational study attempted to identify which Amazon Alexa wake word and Amazon Echo smart speaker resulted in the fewest number of human voice false positives. During an eight-week period, false-positive data were collected from four different Amazon Echo smart speakers located in a small apartment with three female roommates.
Findings
Results from this study suggest the number of human voice false positives are related to wake word selection and Amazon Echo hardware. Results from this observational study determined that the wake word Alexa resulted in the fewest number of false positives.
Originality/value
This study suggests Amazon Alexa users can better protect their privacy by selecting Alexa as their wake word and selecting smart speakers with the highest number of microphones in the far-field array with 360-degree geometry.
Details
Keywords
Euodia Vermeulen and Sara Grobbelaar
In this article we aim to understand how the network formed by fitness tracking devices and associated apps as a subset of the broader health-related Internet of things is capable…
Abstract
Purpose
In this article we aim to understand how the network formed by fitness tracking devices and associated apps as a subset of the broader health-related Internet of things is capable of spreading information.
Design/methodology/approach
The authors used a combination of a content analysis, network analysis, community detection and simulation. A sample of 922 health-related apps (including manufacturers' apps and developers) were collected through snowball sampling after an initial content analysis from a Google search for fitness tracking devices.
Findings
The network of fitness apps is disassortative with high-degree nodes connecting to low-degree nodes, follow a power-law degree distribution and present with low community structure. Information spreads faster through the network than an artificial small-world network and fastest when nodes with high degree centrality are the seeds.
Practical implications
This capability to spread information holds implications for both intended and unintended data sharing.
Originality/value
The analysis confirms and supports evidence of widespread mobility of data between fitness and health apps that were initially reported in earlier work and in addition provides evidence for the dynamic diffusion capability of the network based on its structure. The structure of the network enables the duality of the purpose of data sharing.
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support…
Abstract
As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support society, ecology and economy. One of the solutions has been developing smart sustainable cities. Smart sustainable cities are cities as systems, where their infrastructure, different subsystems and different functional domains are virtually connected to the information and communication technologies (ICT) and internet via sensors and devices and the Internet of Things (IoT), to collect and process real-time Big Data and make efficient, effective and sustainable solutions for a democratic and liveable city for its various stakeholders. This chapter explores the concepts and practices of sustainable smart cities across the globe and explores the use of technologies such as IoT, Blockchain technology and Cloud computing, etc. their challenges and then presents a view on business models for sustainable smart cities.
Details
Keywords
The research aims to understand how smart speakers are perceived by their actual and potential users, their attitude towards smart speakers and consequently their intention to use…
Abstract
Purpose
The research aims to understand how smart speakers are perceived by their actual and potential users, their attitude towards smart speakers and consequently their intention to use them.
Design/methodology/approach
The authors apply a structural equation modelling (SEM) approach to test the research hypotheses through data coming from a structured questionnaire.
Findings
The results show that the higher the importance attributed to usefulness and ease of use, the higher the positive attitude that in turn positively affects the intention to use smart speakers. A significant relationship also emerged between task technology fit and attitude towards smart speakers, as well as between perceived enjoyment and attitude towards smart speakers. Perceived privacy risk, innovativeness and social attraction have been found to not significantly impact attitudes towards smart speakers.
Originality/value
Although several academic studies have focused on various aspects of smart technologies, only a few studies discuss the factors that push consumers to use smart speakers for activities related to commercial transactions. Therefore, looking at the rapid rise of smart speakers for daily tasks and the gradual acceptance of voice interaction with digital tools, the authors proposed a study about Italian users' intention to use smart speakers. Specifically, to fill the gap in the existing literature, the authors applied a SEM approach to identify utilitarian and hedonic benefits that motivate the use of these devices.
Details
Keywords
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details
Keywords
Norita Ahmad and Arief M. Zulkifli
This study aims to provide a systematic review about the Internet of Things (IoT) and its impacts on happiness. It intends to serve as a platform for further research as it is…
Abstract
Purpose
This study aims to provide a systematic review about the Internet of Things (IoT) and its impacts on happiness. It intends to serve as a platform for further research as it is sparse in in-depth analysis.
Design/methodology/approach
This systematic review initially observed 2,501 literary articles through the ScienceDirect and WorldCat search engines before narrowing it down to 72 articles based on subject matter relevance in the abstract and keywords. Accounting for duplicates between search engines, the count was reduced to 66 articles. To finally narrow down all the literature used in this systematic review, 66 articles were given a critical readthrough. The count was finally reduced to 53 total articles used in this systematic review.
Findings
This paper necessitates the claim that IoT will likely impact many aspects of our everyday lives. Through the literature observed, it was found that IoT will have some significant and positive impacts on people's welfare and lives. The unprecedented nature of IoTs impacts on society should warrant further research moving forward.
Research limitations/implications
While the literature presented in this systematic review shows that IoT can positively impact the perceived or explicit happiness of people, the amount of literature found to supplement this argument is still on the lower end. They also necessitate the need for both greater depth and variety in this field of research.
Practical implications
Since technology is already a pervasive element of most people’s contemporary lives, it stands to reason that the most important factors to consider will be in how we might benefit from IoT or, more notably, how IoT can enhance our levels of happiness. A significant implication is its ability to reduce the gap in happiness levels between urban and rural areas.
Originality/value
Currently, the literature directly tackling the quantification of IoTs perceived influence on happiness has yet to be truly discussed broadly. This systematic review serves as a starting point for further discussion in the subject matter. In addition, this paper may lead to a better understanding of the IoT technology and how we can best advance and adapt it to the benefits of the society.
Details