scispace - formally typeset
Open AccessJournal ArticleDOI

On Transparency and Accountability of Smart Assistants in Smart Cities

Haroon Elahi, +3 more
- 06 Dec 2019 - 
- Vol. 9, Iss: 24, pp 5344
Reads0
Chats0
TLDR
It is discovered that GA has unusual permission requirements and sensitive Application Programming Interface (API) usage, and its privacy requirements are not transparent to smartphone users, which makes the risk assessment and accountability of GA difficult posing risks to establishing private and secure personal spaces in a smart city.
Abstract
Smart Assistants have rapidly emerged in smartphones, vehicles, and many smart home devices. Establishing comfortable personal spaces in smart cities requires that these smart assistants are transparent in design and implementation—a fundamental trait required for their validation and accountability. In this article, we take the case of Google Assistant (GA), a state-of-the-art smart assistant, and perform its diagnostic analysis from the transparency and accountability perspectives. We compare our discoveries from the analysis of GA with those of four leading smart assistants. We use two online user studies (N = 100 and N = 210) conducted with students from four universities in three countries (China, Italy, and Pakistan) to learn whether risk communication in GA is transparent to its potential users and how it affects them. Our research discovered that GA has unusual permission requirements and sensitive Application Programming Interface (API) usage, and its privacy requirements are not transparent to smartphone users. The findings suggest that this lack of transparency makes the risk assessment and accountability of GA difficult posing risks to establishing private and secure personal spaces in a smart city. Following the separation of concerns principle, we suggest that autonomous bodies should develop standards for the design and development of smart city products and services.

read more

Citations
More filters
Journal ArticleDOI

Smart City Dimensions and Associated Risks: Review of literature

TL;DR: In this article, the authors present a review of smart city dimensions, smart city assessment tools, available technologies, and the technical and non-technical risk parameters related to smart cities implementation.
Journal ArticleDOI

The First Two Decades of Smart City Research from a Risk Perspective

TL;DR: In this paper, the authors identified the origin, trends, and categories of risks from previous studies on smart cities and categorized smart city risks into three main themes: organizational, social, and technological.
Journal ArticleDOI

Resistance of IoT Sensors against DDoS Attack in Smart Home Environment.

TL;DR: The article examines how IoT devices and the entire smart home will behave if they become victims of a DDoS attack aimed at the smart home from the outside and demonstrates the resistance of real IoT sensors against DDoSattack.
Journal ArticleDOI

Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones

TL;DR: The number and abilities of smartphone bloatware applications need to be constrained proportionally to their practical utilities for their users, and they must conform to security and privacy requirements for trustworthy systems.
References
More filters
Journal ArticleDOI

Perception of risk.

Paul Slovic
- 17 Apr 1987 - 
TL;DR: This research aims to aid risk analysis and policy-making by providing a basis for understanding and anticipating public responses to hazards and improving the communication of risk information among lay people, technical experts, and decision-makers.
Journal ArticleDOI

Big other: surveillance capitalism and the prospects of an information civilization

TL;DR: An emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ is described and its implications for ‘information civilization’ are considered and a distributed and largely uncontested new expression of power is christened: ‘Big Other.’
Proceedings ArticleDOI

Android permissions demystified

TL;DR: Stowaway, a tool that detects overprivilege in compiled Android applications, is built and finds that about one-third of applications are overprivileged.
Journal ArticleDOI

Significant Permission Identification for Machine-Learning-Based Android Malware Detection

TL;DR: Significant Permission IDentification (SigPID), a malware detection system based on permission usage analysis to cope with the rapid increase in the number of Android malware, is introduced.
Proceedings ArticleDOI

Checking app behavior against app descriptions

TL;DR: Applied on a set of 22,500+ Android applications, the CHABADA prototype identified several anomalies and flagged 56% of novel malware as such, without requiring any known malware patterns.
Related Papers (5)