Misinformation in Third-party Voice Applications

被引:0
|
作者
Bispham, Mary [1 ]
Sattar, Suliman Kalim [1 ]
Zard, Clara [1 ]
Ferrer-Aran, Xavier [1 ]
Edu, Jide [2 ]
Suarez-Tangil, Guillermo [3 ]
Such, Jose [1 ]
机构
[1] Kings Coll London, London, England
[2] Univ Strathclyde, Glasgow, Lanark, Scotland
[3] IMDEA Networks Inst, Madrid, Spain
基金
英国工程与自然科学研究理事会;
关键词
voice assistants; online harm; misinformation; FAKE NEWS;
D O I
10.1145/3571884.3604307
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the potential for spreading misinformation via third-party voice applications in voice assistant ecosystems such as Amazon Alexa and Google Assistant. Our work fills a gap in prior work on privacy issues associated with third-party voice applications, looking at security issues related to outputs from such applications rather than compromises to privacy from user inputs. We define misinformation in the context of third-party voice applications and implement an infrastructure for testing third-party voice applications using automated natural language interaction. Using our infrastructure, we identify - for the first time - several instances of misinformation in third-party voice applications currently available on the Google Assistant and Amazon Alexa platforms. We then discuss the implications of our work for developing measures to pre-empt the threat of misinformation and other types of harmful content in third-party voice assistants becoming more significant in the future.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Leakage of Sensitive Information to Third-Party Voice Applications
    Bispham, Mary
    Zard, Clara
    Sattar, Suliman
    Ferrer-Aran, Xavier
    Suarez-Tangil, Guillermo
    Such, Jose
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2022, 2022,
  • [2] Voice attractiveness and decision making in third-party punishment
    Shang, Junchen
    Liu, Zhihui
    Liu, Chang Hong
    PSYCH JOURNAL, 2024, 13 (01) : 142 - 144
  • [3] Visualizations of Third-Party Applications on DCS Systems
    Kujawa, Marcin
    Piotrowski, Robert
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 1767 - 1770
  • [4] Using third-party purchasing to push third-party logistics
    Long, JS
    Zhao, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 400 - 404
  • [5] AppMonitor: restricting information leakage to third-party applications
    Rathore, Nemi Chandra
    Tripathy, Somanath
    SOCIAL NETWORK ANALYSIS AND MINING, 2020, 10 (01)
  • [6] A look into user privacy and third-party applications in Facebook
    Seng, Sovantharith
    Al-Ameen, Mahdi Nasrullah
    Wright, Matthew
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (02) : 283 - 313
  • [7] THIRD-PARTY EVALUATION
    ETRIS, SF
    MATERIALS RESEARCH AND STANDARDS, 1972, 12 (11): : 7 - +
  • [8] AppMonitor: restricting information leakage to third-party applications
    Nemi Chandra Rathore
    Somanath Tripathy
    Social Network Analysis and Mining, 2020, 10
  • [9] Third-party payers
    不详
    JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 2005, 136 (10): : 1378 - 1378
  • [10] Third-Party Certification
    Goergen, Michael T., Jr.
    JOURNAL OF FORESTRY, 2009, 107 (05) : 232 - 232