“Alexa, how do you protect my privacy?” A quantitative study of user preferences and requirements about smart speaker privacy settings

LH Acosta, D Reinhardt - Computers & Security, 2025 - Elsevier
Voice assistants are becoming increasingly popular. While users may benefit from the
convenience of voice interactions, the use of voice assistants raises privacy issues. To …

Internet of Things Security and Privacy Labels Should Empower Consumers

LF Cranor, Y Agarwal, P Emami-Naeini - Communications of the ACM, 2024 - dl.acm.org
Internet of Things Security and Privacy Labels Should Empower Consumers Page 1 THE
WHITE HOUSE launched a new US Cyber Trust Mark in July 2023, unveiling the design and …

[HTML][HTML] The magazine archive includes every article published in Communications of the ACM for over the past 50 years.

T Haigh - Communications of the ACM, 2013 - acmwebvm01.acm.org
Hiding Secrets in Software: A Cryptographic Approach to Program Obfuscation | May 2016 |
Communications of the ACM ACM acm-header Google, Inc. (search) Sign In Go ACM.org Join …