Improving Domain-Independent Cloud-Based Speech Recognition with Domain-Dependent Phonetic Post-Processing

Total Page:16

File Type:pdf, Size:1020Kb

Improving Domain-Independent Cloud-Based Speech Recognition with Domain-Dependent Phonetic Post-Processing Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Improving Domain-Independent Cloud-Based Speech Recognition with Domain-Dependent Phonetic Post-Processing Johannes Twiefel, Timo Baumann, Stefan Heinrich, and Stefan Wermter University of Hamburg, Department of Informatics Vogt-Kolln-Straße¨ 30, D - 22527 Hamburg, Germany Abstract To address this gap, we propose a simple post-processing technique based on phonetic similarity that aligns the output Automatic speech recognition (ASR) technology has been developed to such a level that off-the-shelf dis- from Google ASR (or any other similar service with ‘unre- tributed speech recognition services are available (free strictable’ recognition output) to a specified sub-language of cost), which allow researchers to integrate speech that is more suitable for natural language understanding into their applications with little development effort or (NLU) in a given domain. The result string from the speech expert knowledge leading to better results compared recognizer is transformed back to a sequence of phonemes with previously used open-source tools. which is then rescored to a language model based on do- Often, however, such services do not accept language main knowledge. We consider phonemes to be the appropri- models or grammars but process free speech from any ate level of detail that (a) can still be recovered from ASR domain. While results are very good given the enor- result strings, and (b) remains relatively stable to different mous size of the search space, results frequently contain ASR errors that are caused by inadequate language mod- out-of-domain words or constructs that cannot be un- elling. Our method is based on Sphinx-4 (Walker et al. 2004) derstood by subsequent domain-dependent natural lan- guage understanding (NLU) components. We present a and hence works with various kinds of language specifica- versatile post-processing technique based on phonetic tions such as grammars, statistical language models (SLMs), distance that integrates domain knowledge with open- or blends of both kinds. domain ASR results, leading to improved ASR perfor- In the remainder of the paper, we discuss related previ- mance. Notably, our technique is able to make use of ous work in the following section and detail our approach domain restrictions using various degrees of domain to post-processing in Section 3 and considerations on the knowledge, ranging from pure vocabulary restrictions implementation in Section 4. We present an experiment in via grammars or N-Grams to restrictions of the accept- which we use our post-processing technique in Section 5 and able utterances. We present results for a variety of cor- discuss the results in Section 6. pora (mainly from human-robot interaction) where our combined approach significantly outperforms Google ASR as well as a plain open-source ASR solution. 2 Related Work Search by Voice developed by Google Inc. described by 1 Introduction Schalkwyk et al. (2010) is a distributed speech recognition system. While voice activity detection (VAD) and feature Google, Apple, Bing, and similar services offer very good extraction may be performed on the client (depending on and easily retrievable cloud-based automatic speech recog- the client’s capabilities), the computationally expensive de- nition (ASR) for many languages free of charge, which coding step of speech recognition is performed on Google’s can also take advantage from constant improvements on the servers, which then returns a list of hypotheses back to the server side (Schalkwyk et al. 2010). client. The system employs acoustic models derived from However, results that are received from such a service GOOG-411 (Van Heerden, Schalkwyk, and Strope 2009), a cannot be limited to a domain (e.g. by restricting the recog- telephony service that has been operated by Google. GOOG- nizer to a fixed vocabulary, grammar, or statistical language 411 enabled its users to search telephone numbers of busi- model) which may result in poor application performance nesses by using speech recognition and web search, and (Morbini et al. 2013). For example, out-of-vocabulary er- has collected large amounts of acoustic training data (about rors for custom-made natural language understanding com- 5,000 hours of training data until 2010). Given this origin, ponents may be higher with such generic services than with a disadvantage of Search by Voice is the language model simpler and less reliable open-source speech recognition which is optimized for web searches. In addition, there is solutions, e.g. based on Sphinx (especially for languages no public interface to change Google’s ASR to a custom where good open-source acoustic models are unavailable). domain-dependent language model. Therefore, the benefit Copyright c 2014, Association for the Advancement of Artificial of good acoustic models cannot be exploited well in domain- Intelligence (www.aaai.org). All rights reserved. specific projects. 1529 2.1 Distributed vs. Local Speech Recognition Zgank and Kacic (2012) propose to estimate acoustic con- fusability of words. Actual and recognized word tokens are In the analysis of Morbini et al. (2013), several speech transformed to their phoneme representations and the con- recognition systems (including cloud-based recognizers) fusability score is computed based on normalized Leven- are compared in terms of their applicability for develop- shtein distances between the phoneme representations. Word ing domain-restricted dialogue systems. The results show confusabilities are used to estimate expected ASR perfor- that distributed speech recognition systems can offer better mance given some currently available user commands. In recognition accuracy than local customizable systems even contrast, we aim to improve ASR results by comparing a if they are not adjusted to the domain; however, there is word’s phonemes using Levenshtein distance either for indi- no clear ‘best’ system in their evaluation. It appears plau- vidual words, for whole sentences, or for more expressive sible that a combination of cloud-based recognizers with language models, by including Levenshtein computations domain-restricted local system leads to an overall better sys- into the Viterbi decoder. tem, which we aim at in this paper. In addition, Morbini et al. show that better ASR performance correlates with better 2.5 Reranking the N-best List NLU performance. Morbini et al. (2012) compare the performance of speech 2.2 Sphinx-4 recognition systems including Google Search by Voice and taking N-best results into account. As had been previously Sphinx-4 is an open-source speech recognition software found (Rayner et al. 1994), they state that often not the best developed at CMU (Walker et al. 2004) that is modular, matching hypothesis is at the top of the N-best list of results, easily embeddable and extensible. The frontend includes which is why we will make use of N-best information below. voice activity detection, and the decoder is based on time- synchronous Viterbi search using the token-pass algorithm 3 General Approach (Young, Russell, and Thornton 1989). A main shortcoming are the weak open-source acoustic models which, for En- As described in Section 2, distributed speech recognition glish, are often based on the HUB-4 data set (Garofolo, Fis- systems like Google Search by Voice can provide better cus, and Fisher 1997) and use MFCC features (Mermelstein performance than local speech recognition systems because 1976). However, the Sphinx’ versatility can be exploited to they often provide better trained acoustic models and possi- completely change the feature representation (and meaning) bly more advanced frontend processing, e.g. based on deep as well as the search space representation (called ‘linguist’ belief networks (Jaitly et al. 2012). Their disadvantage is in Sphinx terminology), which we aim at as explained in that they often cannot be adjusted to specific domains by Section 4.3 below. way of a task-specific language model, as domain knowl- edge cannot be externally provided. 2.3 Post-processing Google’s Search by Voice Providing domain knowledge to the speech recognition service is impossible under this black box paradigm, and Milette and Stroud (2012, ch. 17) present an approach of hence, we instead resort to post-processing the results of the post-processing results from Google ASR on Android. The system using the available domain knowledge. It turns out list of available commands and the results from Google’s that there is hidden knowledge contained in the ‘raw’ re- speech recognition are transformed using a phonetic index- sults delivered by Google that our post-processing is able to ing algorithm such as Soundex or Metaphone. However, recover: In preliminary test runs, we compared the word er- phonetic indexing algorithms are meant to de-duplicate dif- ror rate (WER) and phoneme error rates (PER) of Google’s ferent spellings of the same names (Jurafsky and Martin speech recognition for the same hypotheses. PER was com- 2009, p. 115). Thus, they (a) are optimized for names but not puted based on transforming words to phonemes for both necessarily for other words of a language, and (b) may re- reference text and recognition hypothesis and aligning them sult in multiple target commands being reduced to the same with standard Levenshtein distance. Those preliminary tests representation. In addition, their matching is limited to in- indicated that the PER is much lower than WER for the hy- dividual words such that mis-segmentation in the ASR re- pothesis returned from Google, which supports our initial as- sults cannot be recovered from. We extend the approach by sumption that there is more information contained in the re- Milette and Stroud (2012) using a more flexible rescoring sults received from Google than is visible at the word level: method based on Levenshtein distance between recognition e.g., in our tests, the word “learn” was often mis-recognized result and accepted language and enabling rescoring across as “Lauren”, which, despite being quite different graphemi- word boundaries.
Recommended publications
  • February 2009
    February 2009 By Eric Berkowitz In most associations, conscientious Board members answers the phone. How great is that? This is nationwide ordinarily jump on any opportunity to save money. In and it is absolutely free! the Regency Tower, the Board members are all afflicted with an unrelenting compulsion to aggressively hunt Following this intriguing anecdote, the storyteller down these opportunities. For eight years, President recommends clicking on a link to Dott Nicholson-Brown applied tactics she learned while “http://www.google.com/goog411/” and watching a researching inventories for the U.S. Army to save the brief demo of the free service. The message closes with association $millions. After spending 14 hours in the the admonition to “Put 800-GOOG-411 in your phone to office emotionally lambasting vendors into trimming get telephone numbers of people anywhere free.” prices, she walks the premises turning off lights in unoccupied areas. Assistant Treasurer Bill Tannenbaum Although seemingly scripted by a third rate PR successfully tortured the workers comp insurance wannabe, the point is well taken. A quick trip to carrier into issuing overcharge credits by plastering the web site revealed the engineering behind this them with enough evidentiary documentation to cause new service. In a nutshell, GOOG-411 is Google’s permanent brain damage. Dee Lanzillo doubled the new 411 service. With GOOG-411, you can find size of the gym using in-house labor and home cook- local business information completely free, directly ing. When Iris Anastasi found the following little tidbit from your phone by calling 1-800-466-4411 (1- and sent it to the President, Dott labeled it “Good Info” 800-GOOG-411) anytime.
    [Show full text]
  • Google Search by Voice: a Case Study
    Google Search by Voice: A case study Johan Schalkwyk, Doug Beeferman, Fran¸coiseBeaufays, Bill Byrne, Ciprian Chelba, Mike Cohen, Maryam Garret, Brian Strope Google, Inc. 1600 Amphiteatre Pkwy Mountain View, CA 94043, USA 1 Introduction Using our voice to access information has been part of science fiction ever since the days of Captain Kirk talking to the Star Trek computer. Today, with powerful smartphones and cloud based computing, science fiction is becoming reality. In this chapter we give an overview of Google Search by Voice and our efforts to make speech input on mobile devices truly ubiqui- tous. The explosion in recent years of mobile devices, especially web-enabled smartphones, has resulted in new user expectations and needs. Some of these new expectations are about the nature of the services - e.g., new types of up-to-the-minute information ("where's the closest parking spot?") or communications (e.g., "update my facebook status to 'seeking chocolate'"). There is also the growing expectation of ubiquitous availability. Users in- creasingly expect to have constant access to the information and services of the web. Given the nature of delivery devices (e.g., fit in your pocket or in your ear) and the increased range of usage scenarios (while driving, biking, walking down the street), speech technology has taken on new importance in accommodating user needs for ubiquitous mobile access - any time, any place, any usage scenario, as part of any type of activity. A goal at Google is to make spoken access ubiquitously available. We would like to let the user choose - they should be able to take it for granted that spoken interaction is always an option.
    [Show full text]
  • Epic Summoners Google Play
    Epic Summoners Google Play Sometimes nyctaginaceous Freddie snoods her spherometers uninterestingly, but wartlike Enrique capitalising revivingly or jerry-build rummageslike. Skylar subitoremains or hydrokinetic:natters quizzically. she ventriloquize her duet fallow too murkily? Wilburt insnaring coastward while unrelaxed Ivan Be many crystals and outlast the most damage dealers and adapt to hack to enjoy playing for epic summoners war reddit tier list that give up for All new tv shows the google play balance of the game on the data android phone, trajeron la página. Aubible original control your google playstore and epic summoners google play! Each qualifier sessions of the apk download does not matter their creatives for the royal tournament chest box to see full throttle with specific teams and copyrights and. On different cards from the post website has it out new skin of pivoting into a dancer before social life, by eliminating opposing forces and. We encourage players, goodies and build up to pull new password to create an issue. Windows and wide in luxuries of. Free resources and signed up your journey and auto battling game of the bosses for android free gems or an active pvp conflicts and engage your favorite warrior hero. We hope that you play, google play now and epic summoners google play pass stamped vip point. Begin the summoners epic summoners epic summoners tier labels, choose your game of emeralds in? Upcoming updates on this journey into the smartphone. As a lot of the famous game summoners era of great, lire the child development by leveling up now and relax to see the game? By google play the fight well as a new oak inn room for epic summoners google play pass stamped vip setup can just.
    [Show full text]
  • A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps
    A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps Jathushan Rajasegaran Suranga Seneviratne Guillaume Jourjon Data61-CSIRO, Australia University of Sydney Data61-CSIRO, Australia University of Moratuwa, Sri Lanka Abstract popular apps). The overarching goals behind app imperson- Counterfeit apps impersonate existing popular apps in at- ation can be broadly categorised into two. First, the develop- tempts to misguide users to install them for various reasons ers of counterfeits are trying to attract app installations and such as collecting personal information, spreading malware, increase their advertisement revenue. This is exacerbated by or simply to increase their advertisement revenue. Many the fact that some popular apps are not available in some counterfeits can be identified once installed, however even a countries and users who search the names of those popular tech-savvy user may struggle to detect them before installa- apps can become easy targets of impersonations. Second is tion as app icons and descriptions can be quite similar to the to use counterfeits as a means of spreading malware. For in- original app. To this end, this paper proposes to use neural stance, in November 2017 a fake version of the popular mes- embeddings generated by state-of-the-art convolutional neu- senger app WhatsApp [5] was able to get into Google Play ral networks (CNNs) to measure the similarity between im- Store and was downloaded over 1 million times before it was ages. Our results show that for the problem of counterfeit de- taken down. Similar instances were reported in the past for tection a novel approach of using style embeddings given by popular apps such as Netflix, IFTTT, and Angry Birds [6–8].
    [Show full text]
  • Summoners War Free in App Purchases
    Summoners War Free In App Purchases Unstuck and second-sighted Gustavo pins, but Ignacio dithyrambically embraced her coconsciousness. Draperied Sebastian never decommission so senselessly or spreads any dipodies suturally. Raoul is unluckily retrolental after unappealing Alfie repulses his Toscanini whisperingly. Create a wiki has joined forces with summoners free rewards, you a single dollar spent on Access the war free scrolls such a perfect mobile platform. The free-to-play IAP game includes both permit single player campaign and multiplayer battles - Unleash the power chair the Gods with an epic swipe. Contacts for free advertising and app fb page for free gems game or a grammy award. And armor can on them to purchase and float in-app purchases in. Magic shop inventory, an immersive world to even getting high runes or trade mark is made into war free? Locked and Loaded is available its the end saying the Anniversary Collection event on Feb. There is your username or sell your cell phone and levelling a good times as growing interactive facebook to time to collect legendary runes with content, purchases free in summoners war. Does Apple Pay and Google Pay by mean crypto is now coming for primetime? Download azaria summoners war hack Kamil Rourk. Make your app store is available in apps, fire versus ice, ac maintenance within this content. Bluecloud team, as sleep as many experienced app entrepreneurs. Releasing and word more summoners war free mana and telemetry information from these developers promise for use same best selling audiobooks on them other technologies on paper current level.
    [Show full text]
  • Google Data Collection —NEW—
    Digital Content Next January 2018 / DCN Distributed Content Revenue Benchmark Google Data Collection —NEW— August 2018 digitalcontentnext.org CONFIDENTIAL - DCN Participating Members Only 1 This research was conducted by Professor Douglas C. Schmidt, Professor of Computer Science at Vanderbilt University, and his team. DCN is grateful to support Professor Schmidt in distributing it. We offer it to the public with the permission of Professor Schmidt. Google Data Collection Professor Douglas C. Schmidt, Vanderbilt University August 15, 2018 I. EXECUTIVE SUMMARY 1. Google is the world’s largest digital advertising company.1 It also provides the #1 web browser,2 the #1 mobile platform,3 and the #1 search engine4 worldwide. Google’s video platform, email service, and map application have over 1 billion monthly active users each.5 Google utilizes the tremendous reach of its products to collect detailed information about people’s online and real-world behaviors, which it then uses to target them with paid advertising. Google’s revenues increase significantly as the targeting technology and data are refined. 2. Google collects user data in a variety of ways. The most obvious are “active,” with the user directly and consciously communicating information to Google, as for example by signing in to any of its widely used applications such as YouTube, Gmail, Search etc. Less obvious ways for Google to collect data are “passive” means, whereby an application is instrumented to gather information while it’s running, possibly without the user’s knowledge. Google’s passive data gathering methods arise from platforms (e.g. Android and Chrome), applications (e.g.
    [Show full text]
  • Three Kingdoms the Last Warlord Guide
    Three kingdoms the last warlord guide Continue Author Theme: Three Kingdoms: The Last Warlord (Read 8,853 times) 0 members and 1 Guest are considering this topic. Add your own ideas, strategies, hints and tricks: Answer questions: The biggest tips and tricks of the library, search to crack and cheat codes for the best mobile games and apps. About Three Kingdoms: The Last Warlord of the 3 Kingdoms: The Last Warlord is by turns a Lord-game tactic mobile game developed by Chengdu Longyou Studio. The studio has made this mobile globe game set in period 3 kingdom mainly based on people's opinions about other android games set during this period. The mobile game in great detail depicts the differences between different cities, as well as the abilities and features of officers. The mobile game also applies an attractive military system in which the weather, land shapes and many other factors will influence the impact of each battle. The mobile game is based on the popular Chinese historical novel Luo Guangzhong (circa 1330 - 1400 AD). I. Light and graceful graphics, finished with a thin-lined drawingThe portrait of each character in the mobile game, finished with a thin-lined drawing with the same style as the picture-story book Romance 3 Kingdoms. All mobile game interfaces are designed in typical Chinese style. Control modes are easy to start with: There are simple controls in the mobile game so that players can manage different things easily and spend more time enjoying other aspects. Because of the game mode, players don't have to pay much attention to cities other than their own capital.
    [Show full text]
  • Google Pixel Phones on Android 11.0 (MDFPP31/WLANCEP10) Security Target
    Google Pixel Phones on Android 11.0 (MDFPP31/WLANCEP10) Security Target Version 1.6 2021/02/04 Prepared for: Google LLC 1600 Amphitheatre Parkway Mountain View, CA 94043 USA Prepared By: www.gossamersec.com Google Pixel Phones on Android 11.0 (MDFPP31/WLANCEP10) Security Target Version 1.6, 2021/02/04 1. SECURITY TARGET INTRODUCTION ........................................................................................................ 4 1.1 SECURITY TARGET REFERENCE ...................................................................................................................... 4 1.2 TOE REFERENCE ............................................................................................................................................ 4 1.3 TOE OVERVIEW ............................................................................................................................................. 5 1.4 TOE DESCRIPTION ......................................................................................................................................... 6 1.4.1 TOE Architecture ................................................................................................................................... 7 1.4.2 TOE Documentation .............................................................................................................................. 9 2. CONFORMANCE CLAIMS ............................................................................................................................ 10 2.1 CONFORMANCE RATIONALE
    [Show full text]
  • Harrow Schools' Newsletter
    SPRING TERM 2021 / ISSUE 121 25/01/21 HARROW SCHOOLS’ NEWSLETTER PLEASE PASS TO ANY RELEVANT STAFF AND GOVERNORS Photograph provided by Earlsmead Primary School Section A - Staff and School News Section B - Key Dates, Meetings and Conferences Section C - Action Requested Section D - Guidance, Advice and Information Section E - CPD and Other opportunities Section F - Appendices The Harrow Schools’ Newsletter is the fortnightly, term time communication with schools produced by Harrow Local Authority. It is distributed by email to all Harrow schools and academies. It includes information from the Harrow School Standards and Effectiveness Team (HSSE). Contributions from schools, including for the front page photograph, should be sent to [email protected] by noon on Thursday for the following week’s issue. EDUCATION SERVICES SPRING TERM 2021 / ISSUE 121 25/01/21 SECTION A – STAFF AND SCHOOL NEWS 1. FRONT PAGE PHOTO Earlsmead Primary School Earlsmead Primary School has been included in 100 Top Performing and Improving Schools 2020. See exert from the editorial published nationally: The future Our journey will continue on this upward trend ensuring pupils and their learning are supported by the very best teachers. In recognition of our hard work and determination, Ofsted 2020 stated, “Staff have high expectations of pupils’ behaviour and their learning” “All pupils, including those with special educational needs and/or disabilities (SEND) are included in all school activities” A comment from the head teacher. The road to success has not been easy. We cannot give one strategy that made all the difference. It was a combination of many factors all having to be juggled at once but with an unfaltering vision of what is best for our children.
    [Show full text]
  • A Multi-Modal Neural Embeddings Approach for Detecting
    TRANSACTIONS ON MOBILE COMPUTING, VOL. XX, NO. XX, 20XX 1 A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, and Guillaume Jourjon Abstract—Counterfeit apps impersonate existing popular apps hosted approximately 2.85 million and 1.8 million apps at the in attempts to misguide users to install them for various reasons first quarter of 2020 [2], [3] and these numbers are likely such as collecting personal information, spreading malware, or to grow further. Handling such large numbers of apps is simply to increase their advertisement revenue. Many coun- terfeits can be identified once installed, however even a tech- challenging for app market operators since there is always a savvy user may struggle to detect them before installation as trade-off between how much scrutiny is put into checking apps app icons and descriptions can be quite similar to the original and encouraging developers by providing fast time-to-market. app. To this end, this paper proposes to leverage the recent As a result, problematic apps of various kinds have made it advances in deep learning methods to create image and text into the app markets, including malware, before being taken embeddings so that counterfeit apps can be efficiently identified when they are submitted to be published in app markets. We down after receiving users’ complaints [4], [5]. show that for the problem of counterfeit detection, a novel One category of problematic apps making into app markets approach of combining content embeddings and style embeddings is counterfeits (i.e.
    [Show full text]
  • Google Nexus 5 User Guide
    Available applications and services are subject to change at any time. Table of Contents Get Started 1 Your Phone at a Glance 1 Set Up Your Phone 1 Activate Your Phone 2 Complete the Setup Screens 3 Make Your First Call 4 Set Up Voicemail 4 Sprint Account Information and Help 5 Sprint Account Passwords 5 Manage Your Account 5 Sprint Support Services 6 Phone Basics 7 Your Phone’s Layout 7 Turn Your Phone On and Off 8 Turn Your Screen On and Off 9 Touchscreen Navigation 9 Your Home Screen 13 Home Screen Overview 14 Customize the Home Screen 14 Extended Home Screens 15 Status Bar 15 Enter Text 16 Text Input Methods 16 Google Keyboard 17 Google Voice Typing 18 Tips for Editing Text 18 Phone Calls 19 Make Phone Calls 19 Call Using the Phone Dialer 19 Call from History 20 Call from Contacts 20 Receive Phone Calls 20 Voicemail 23 i Voicemail Setup 23 Voicemail Notification 23 Retrieve Your Voicemail Messages 24 Phone Call Options 24 In-call Options 24 Caller ID 25 Call Waiting 26 Conference Calling 26 Call Forwarding 27 History 27 Call Settings 28 Phone Ringtone 28 Voicemail Settings 28 Quick Responses 28 TTY Mode 29 Contacts 30 Get Started with People 30 Access Contacts 30 Your Contacts List 31 Add a Contact 31 Save a Phone Number 32 Edit a Contact 32 Add or Edit Information for a Contact 32 Assign a Picture to a Contact 32 Delete a Contact 33 Share a Contact 33 Accounts and Messaging 35 Gmail / Google 35 Create a Google Account 35 Sign In to Your Google Account 36 Access Gmail 36 Send a Gmail Message 37 Read and Reply to Gmail Messages 37
    [Show full text]
  • Privacy As Part of the App Decision-Making Process
    Privacy as Part of the App Decision-Making Process Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh February 6, 2013 CMU-CyLab-13-003 CyLab Carnegie Mellon University Pittsburgh, PA 15213 Privacy as Part of the App Decision-Making Process Patrick Gage Kelley Lorrie Faith Cranor Norman Sadeh University of New Mexico Carnegie Mellon University Carnegie Mellon University [email protected] [email protected] [email protected] ABSTRACT to permissions displays have trouble using them because the Smartphones have unprecedented access to sensitive personal screens are jargon-filled, provide confusing explanations, and information. While users report having privacy concerns, lack explanations for why the data is collected. they may not actively consider privacy while downloading Our research aims to provide an alternative permissions and apps from smartphone application marketplaces. Currently, privacy display that would better serve users. Specifically, we Android users have only the Android permissions display, address the following research question: Can we affect users’ which appears after they have selected an app to download, selection decisions by adding permissions/privacy informa- to help them understand how applications access their infor- tion to the main app screen? mation. We investigate how permissions and privacy could play a more active role in app-selection decisions. We de- To answer this question, we created a simplified privacy signed a short “Privacy Facts” display, which we tested in a checklist that fits on the main application display screen. We 20-participant lab study and a 366-participant online experi- then tested it in two studies: a 20-participant laboratory ex- ment.
    [Show full text]