Smart Audio Report
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
FIT to WORK: IMPROVING the SECURITY of MONITORED EMPLOYEES' HEALTH DATA Elizabeth A. Brown INTRODUCTION Imagine Coming to Work
FIT TO WORK: IMPROVING THE SECURITY OF MONITORED EMPLOYEES' HEALTH DATA Elizabeth A. Brown1 INTRODUCTION Imagine coming to work one day and finding that your employer has given everyone in the company a wearable FitBit health monitor, free of charge. You pop the FitBit on, grateful for another bit of help in managing the health concerns that nag at you persistently but which never quite rise to the top of your priority list. At your next performance review, your supervisor expresses concern about your anxiety levels. Although your work output is slightly off, she notes, there has been a correlation in your lack of sleep and exercise, and she suspects you are depressed. You wonder how your employer might know these things, whether or not they are true, and then you remember the FitBit. Your supervisor then tells you that the promotion you had wanted is going to a colleague who is “better equipped to handle the demands of the job.” You interview for another job, and are asked to provide the password to the HealthDrive account that centralizes the fitness data all the apps on your iPhone collect about you during the day. Similar scenarios are playing out now in workplaces across the country, and will do so more frequently as the personal health sensor market and employee monitoring trends continue to grow. Employers are making key decisions based on employees’ biometric data, collected from specialized devices like a FitBit or the health-related apps installed on mobile phones. BP, for example, adjusts its employees’ health care premiums depending on how much physical activity their wearable FitBit devices monitor – devices that BP provides to thousands of employees, their spouses, and retirees for free. -
Listen Only When Spoken To: Interpersonal Communication Cues As Smart Speaker Privacy Controls
Proceedings on Privacy Enhancing Technologies ; 2020 (2):251–270 Abraham Mhaidli*, Manikandan Kandadai Venkatesh, Yixin Zou, and Florian Schaub Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls Abstract: Internet of Things and smart home technolo- 1 Introduction gies pose challenges for providing effective privacy con- trols to users, as smart devices lack both traditional Internet of Things (IoT) and smart home devices have screens and input interfaces. We investigate the poten- gained considerable traction in the consumer market [4]. tial for leveraging interpersonal communication cues as Technologies such as smart door locks, smart ther- privacy controls in the IoT context, in particular for mostats, and smart bulbs offer convenience and utility smart speakers. We propose privacy controls based on to users [4]. IoT devices often incorporate numerous sen- two kinds of interpersonal communication cues – gaze sors from microphones to cameras. Though these sensors direction and voice volume level – that only selectively are essential for the functionality of these devices, they activate a smart speaker’s microphone or voice recog- may cause privacy concerns over what data such devices nition when the device is being addressed, in order to and their sensors collect, how the data is processed, and avoid constant listening and speech recognition by the for what purposes the data is used [35, 41, 46, 47, 70]. smart speaker microphones and reduce false device acti- Additionally, these sensors are often in the background vation. We implement these privacy controls in a smart or hidden from sight, continuously collecting informa- speaker prototype and assess their feasibility, usability tion. -
Personification and Ontological Categorization of Smart Speaker-Based Voice Assistants by Older Adults
“Phantom Friend” or “Just a Box with Information”: Personification and Ontological Categorization of Smart Speaker-based Voice Assistants by Older Adults ALISHA PRADHAN, University of Maryland, College Park, USA LEAH FINDLATER, University of Washington, USA AMANDA LAZAR, University of Maryland, College Park, USA As voice-based conversational agents such as Amazon Alexa and Google Assistant move into our homes, researchers have studied the corresponding privacy implications, embeddedness in these complex social environments, and use by specific user groups. Yet it is unknown how users categorize these devices: are they thought of as just another object, like a toaster? As a social companion? Though past work hints to human- like attributes that are ported onto these devices, the anthropomorphization of voice assistants has not been studied in depth. Through a study deploying Amazon Echo Dot Devices in the homes of older adults, we provide a preliminary assessment of how individuals 1) perceive having social interactions with the voice agent, and 2) ontologically categorize the voice assistants. Our discussion contributes to an understanding of how well-developed theories of anthropomorphism apply to voice assistants, such as how the socioemotional context of the user (e.g., loneliness) drives increased anthropomorphism. We conclude with recommendations for designing voice assistants with the ontological category in mind, as well as implications for the design of technologies for social companionship for older adults. CCS Concepts: • Human-centered computing → Ubiquitous and mobile devices; • Human-centered computing → Personal digital assistants KEYWORDS Personification; anthropomorphism; ontology; voice assistants; smart speakers; older adults. ACM Reference format: Alisha Pradhan, Leah Findlater and Amanda Lazar. -
Samrt Speakers Growth at a Discount.Pdf
Technology, Media, and Telecommunications Predictions 2019 Deloitte’s Technology, Media, and Telecommunications (TMT) group brings together one of the world’s largest pools of industry experts—respected for helping companies of all shapes and sizes thrive in a digital world. Deloitte’s TMT specialists can help companies take advantage of the ever- changing industry through a broad array of services designed to meet companies wherever they are, across the value chain and around the globe. Contact the authors for more information or read more on Deloitte.com. Technology, Media, and Telecommunications Predictions 2019 Contents Foreword | 2 Smart speakers: Growth at a discount | 24 1 Technology, Media, and Telecommunications Predictions 2019 Foreword Dear reader, Welcome to Deloitte Global’s Technology, Media, and Telecommunications Predictions for 2019. The theme this year is one of continuity—as evolution rather than stasis. Predictions has been published since 2001. Back in 2009 and 2010, we wrote about the launch of exciting new fourth-generation wireless networks called 4G (aka LTE). A decade later, we’re now making predic- tions about 5G networks that will be launching this year. Not surprisingly, our forecast for the first year of 5G is that it will look a lot like the first year of 4G in terms of units, revenues, and rollout. But while the forecast may look familiar, the high data speeds and low latency 5G provides could spur the evolution of mobility, health care, manufacturing, and nearly every industry that relies on connectivity. In previous reports, we also wrote about 3D printing (aka additive manufacturing). Our tone was posi- tive but cautious, since 3D printing was growing but also a bit overhyped. -
Your Voice Assistant Is Mine: How to Abuse Speakers to Steal Information and Control Your Phone ∗ †
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone ∗ y Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang Department of Information Engineering The Chinese University of Hong Kong {dw013, lx012, zz113, khzhang}@ie.cuhk.edu.hk ABSTRACT General Terms Previous research about sensor based attacks on Android platform Security focused mainly on accessing or controlling over sensitive compo- nents, such as camera, microphone and GPS. These approaches Keywords obtain data from sensors directly and need corresponding sensor invoking permissions. Android Security; Speaker; Voice Assistant; Permission Bypass- This paper presents a novel approach (GVS-Attack) to launch ing; Zero Permission Attack permission bypassing attacks from a zero-permission Android application (VoicEmployer) through the phone speaker. The idea of 1. INTRODUCTION GVS-Attack is to utilize an Android system built-in voice assistant In recent years, smartphones are becoming more and more popu- module – Google Voice Search. With Android Intent mechanism, lar, among which Android OS pushed past 80% market share [32]. VoicEmployer can bring Google Voice Search to foreground, and One attraction of smartphones is that users can install applications then plays prepared audio files (like “call number 1234 5678”) in (apps for short) as their wishes conveniently. But this convenience the background. Google Voice Search can recognize this voice also brings serious problems of malicious application, which have command and perform corresponding operations. With ingenious been noticed by both academic and industry fields. According to design, our GVS-Attack can forge SMS/Email, access privacy Kaspersky’s annual security report [34], Android platform attracted information, transmit sensitive data and achieve remote control a whopping 98.05% of known malware in 2013. -
Smart Speakers & Their Impact on Music Consumption
Everybody’s Talkin’ Smart Speakers & their impact on music consumption A special report by Music Ally for the BPI and the Entertainment Retailers Association Contents 02"Forewords 04"Executive Summary 07"Devices Guide 18"Market Data 22"The Impact on Music 34"What Comes Next? Forewords Geoff Taylor, chief executive of the BPI, and Kim Bayley, chief executive of ERA, on the potential of smart speakers for artists 1 and the music industry Forewords Kim Bayley, CEO! Geoff Taylor, CEO! Entertainment Retailers Association BPI and BRIT Awards Music began with the human voice. It is the instrument which virtually Smart speakers are poised to kickstart the next stage of the music all are born with. So how appropriate that the voice is fast emerging as streaming revolution. With fans consuming more than 100 billion the future of entertainment technology. streams of music in 2017 (audio and video), streaming has overtaken CD to become the dominant format in the music mix. The iTunes Store decoupled music buying from the disc; Spotify decoupled music access from ownership: now voice control frees music Smart speakers will undoubtedly give streaming a further boost, from the keyboard. In the process it promises music fans a more fluid attracting more casual listeners into subscription music services, as and personal relationship with the music they love. It also offers a real music is the killer app for these devices. solution to optimising streaming for the automobile. Playlists curated by streaming services are already an essential Naturally there are challenges too. The music industry has struggled to marketing channel for music, and their influence will only increase as deliver the metadata required in a digital music environment. -
Microsoft Surface Duo Teardown Guide ID: 136576 - Draft: 2021-04-30
Microsoft Surface Duo Teardown Guide ID: 136576 - Draft: 2021-04-30 Microsoft Surface Duo Teardown An exploratory teardown of the Microsoft Surface Duo, a brand-new take on foldables with a surprisingly simple hinge but precious few concessions to repair. Written By: Taylor Dixon This document was generated on 2021-05-02 03:27:09 PM (MST). © iFixit — CC BY-NC-SA www.iFixit.com Page 1 of 16 Microsoft Surface Duo Teardown Guide ID: 136576 - Draft: 2021-04-30 INTRODUCTION Microsoft has reportedly been working on the Surface Duo for six years. We can probably tear it down in less time than that, but with any brand-new form factor, there are no guarantees. Here’s hoping the Duo boasts the repairability of recent Microsoft sequels like the Surface Laptop 3 or the Surface Pro X—otherwise, we could be in for a long haul. Let’s get this teardown started! For more teardowns, we’ve got a trio of social media options for you: for quick text we’ve got Twitter, for sweet pics there’s Instagram, and for the phablet of the media world there’s Facebook. If you’d rather get the full scoop on what we’re up to, sign up for our newsletter! TOOLS: T2 Torx Screwdriver (1) T3 Torx Screwdriver (1) T5 Torx Screwdriver (1) Tri-point Y000 Screwdriver (1) Spudger (1) Tweezers (1) Heat Gun (1) iFixit Opening Picks set of 6 (1) Plastic Cards (1) This document was generated on 2021-05-02 03:27:09 PM (MST). © iFixit — CC BY-NC-SA www.iFixit.com Page 2 of 16 Microsoft Surface Duo Teardown Guide ID: 136576 - Draft: 2021-04-30 Step 1 — Microsoft Surface Duo Teardown The long-awaited Surface Duo is here! For $1,400 you get two impossibly thin slices of hardware that you can fold up and put in your pocket.. -
Reuters Institute: the Future of Voice and the Implications for News
DIGITAL NEWS PROJECT NOVEMBER 2018 The Future of Voice and the Implications for News Nic Newman Contents About the Author 4 Acknowledgements 4 Executive Summary 5 1. Methodology and Approach 8 2. What is Voice? 10 3. How Voice is Being Used Today 14 4. News Usage in Detail 23 5. Publisher Strategies and Monetisation 32 6. Future Developments and Conclusions 40 References 43 Appendix: List of Interviewees 44 THE REUTERS INSTITUTE FOR THE STUDY OF JOURNALISM About the Author Nic Newman is Senior Research Associate at the Reuters Institute and lead author of the Digital News Report, as well as an annual study looking at trends in technology and journalism. He is also a consultant on digital media, working actively with news companies on product, audience, and business strategies for digital transition. Acknowledgements The author is particularly grateful to media companies and experts for giving their time to share insights for this report in such an enthusiastic and open way. Particular thanks, also, to Peter Stewart for his early encouragement and for his extremely informative daily Alexa ‘flash briefings’ on the ever changing voice scene. The author is also grateful to Differentology andY ouGov for the professionalism with which they carried out the qualitative and quantitative research respectively and for the flexibility in accommodating our complex and often changing requirements. The research team at the Reuters Institute provided valuable advice on methodology and content and the author is grateful to Lucas Graves and Rasmus Kleis Nielsen for their constructive and thoughtful comments on the manuscript. Also thanks to Alex Reid at the Reuters Institute for keeping the publication on track at all times. -
List of Brands
Global Consumer 2019 List of Brands Table of Contents 1. Digital music 2 2. Video-on-Demand 4 3. Video game stores 7 4. Digital video games shops 11 5. Video game streaming services 13 6. Book stores 15 7. eBook shops 19 8. Daily newspapers 22 9. Online newspapers 26 10. Magazines & weekly newspapers 30 11. Online magazines 34 12. Smartphones 38 13. Mobile carriers 39 14. Internet providers 42 15. Cable & satellite TV provider 46 16. Refrigerators 49 17. Washing machines 51 18. TVs 53 19. Speakers 55 20. Headphones 57 21. Laptops 59 22. Tablets 61 23. Desktop PC 63 24. Smart home 65 25. Smart speaker 67 26. Wearables 68 27. Fitness and health apps 70 28. Messenger services 73 29. Social networks 75 30. eCommerce 77 31. Search Engines 81 32. Online hotels & accommodation 82 33. Online flight portals 85 34. Airlines 88 35. Online package holiday portals 91 36. Online car rental provider 94 37. Online car sharing 96 38. Online ride sharing 98 39. Grocery stores 100 40. Banks 104 41. Online payment 108 42. Mobile payment 111 43. Liability insurance 114 44. Online dating services 117 45. Online event ticket provider 119 46. Food & restaurant delivery 122 47. Grocery delivery 125 48. Car Makes 129 Statista GmbH Johannes-Brahms-Platz 1 20355 Hamburg Tel. +49 40 2848 41 0 Fax +49 40 2848 41 999 [email protected] www.statista.com Steuernummer: 48/760/00518 Amtsgericht Köln: HRB 87129 Geschäftsführung: Dr. Friedrich Schwandt, Tim Kröger Commerzbank AG IBAN: DE60 2004 0000 0631 5915 00 BIC: COBADEFFXXX Umsatzsteuer-ID: DE 258551386 1. -
Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems Nan Zhang∗, Xianghang Mi∗, Xuan Fengy∗, XiaoFeng Wang∗, Yuan Tianz and Feng Qian∗ ∗Indiana University, Bloomington Email: fnz3, xmi, xw7, [email protected] yBeijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China Email: [email protected] zUniversity of Virginia Email: [email protected] Abstract—Virtual personal assistants (VPA) (e.g., Amazon skills by Amazon and actions by Google1) to offer further Alexa and Google Assistant) today mostly rely on the voice helps to the end users, for example, order food, manage bank channel to communicate with their users, which however is accounts and text friends. In the past year, these ecosystems known to be vulnerable, lacking proper authentication (from the user to the VPA). A new authentication challenge, from the VPA are expanding at a breathtaking pace: Amazon claims that service to the user, has emerged with the rapid growth of the VPA already 25,000 skills have been uploaded to its skill market to ecosystem, which allows a third party to publish a function (called support its VPA (including the Alexa service running through skill) for the service and therefore can be exploited to spread Amazon Echo) [1] and Google also has more than one thousand malicious skills to a large audience during their interactions actions available on its market for its Google Home system with smart speakers like Amazon Echo and Google Home. In this paper, we report a study that concludes such remote, large- (powered by Google Assistant). -
Smart Home Power Management Based on Internet of Things and Smart Sensor Networks
Sensors and Materials, Vol. 33, No. 5 (2021) 1687–1702 1687 MYU Tokyo S & M 2564 Smart Home Power Management Based on Internet of Things and Smart Sensor Networks Tzer-Long Chen,1 Tsan-Ching Kang,2 Chien-Yun Chang,3 Tsung-Chih Hsiao,4,5* and Chih-Cheng Chen,6,7** 1Department of Finance, Providence University, Taichung 43301, Taiwan 2College of Computing and Informatics, Providence University, Taichung 43301, Taiwan 3Department of Fashion Business and Merchandising, Ling Tung University, Taichung 40852, Taiwan 4College of Computer Science and Technology, Huaqiao University, Xiamen, Fujian 361021, China 5Xiamen Key Laboratory of Data Security and Blockchain Technology, Huaqiao University, Xiamen, Fujian 361021, China 6Department of Automatic Control Engineering, Feng Chia University, Taichung 40724, Taiwan 7Department of Aeronautical Engineering, Chaoyang University of Technology, Taichung 413310, Taiwan (Received October 21, 2020; accepted March 8, 2021) Keywords: smart home, Internet of Things, smartphone, app implementation, sensor networks We have developed a system that includes a newly designed smart socket for IoT sensors and a cloud platform for smart home power management. The system can initiate the platform service upon the user’s authentication and give suggestions based on the analysis of usage patterns. By sending data to the analysis system through the IoT, the system can recommend to the user the most suitable power management setting, calculate the power consumption requirement of the user, and determine whether it is within a reasonable range. The cloud platform employs a mobile device app, which adopts a graphical user interface. The app effectively provides users with information on their domestic power consumption. -
View Annual Report
As filed with the Securities and Exchange Commission on March 29, 2019 UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 20-F (Mark One) ‘ REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 OR È ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2018 OR ‘ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 OR ‘ SHELL COMPANY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of event requiring this shell company report For the transition period from to Commission file number 001-37821 LINE Kabushiki Kaisha (Exact name of Registrant as specified in its charter) LINE Corporation Japan (Translation of Registrant’s name into English) (Jurisdiction of incorporation or organization) JR Shinjuku Miraina Tower, 23rd Floor 4-1-6 Shinjuku Shinjuku-ku, Tokyo, 160-0022, Japan (Address of principal executive offices) Satoshi Yano Telephone: +81-3-4316-2050; E-mail: [email protected]; Facsimile: +81-3-4316-2131 (Name, telephone, e-mail and/or facsimile number and address of company contact person) Securities registered or to be registered pursuant to Section 12(b) of the Act. Title of Each Class Name of Each Exchange on Which Registered American Depositary Shares, each representing New York Stock Exchange, Inc. one share of common stock Common Stock * New York Stock Exchange, Inc. * Securities registered or to be registered pursuant to Section 12(g) of the Act.