Skip to main content

METHODS article

Front. Psychol.
Sec. Media Psychology
Volume 15 - 2024 | doi: 10.3389/fpsyg.2024.1280089
This article is part of the Research Topic Coping with an AI-Saturated World: Psychological Dynamics and Outcomes of AI-Mediated Communication View all 6 articles

Privacy boundary management of smart speakers from the perspective of human-computer interaction ——An empirical study based on the users in China

Provisionally accepted
  • Southwest University of Political Science & Law, Chongqing, China

The final, formatted version of the article will be published soon.

    Artificial intelligence speakers developed based on voice interaction provide relevant services by collecting voice data, which poses a risk to users' information privacy. To analyze the privacy management behaviors of Chinese users when using smart speakers, this study constructed a structural equation model based on the Communication Privacy Management (CPM) theory and surveyed 485 subjects. This study extends the CPM theory by arguing that the boundary formation stage has an impact on subsequent boundary coordination in an individual's privacy management process. The privacy boundary formation stage includes users' personalization benefits, privacy concerns, and privacy literacy. Boundary coordination includes privacy disclosure, boundary linkage and boundary control. The results of the study found that smart speaker users' privacy management strategies are influenced by personalization benefits, privacy concerns, and privacy literacy. Personalization benefits had a positive effect on privacy disclosure, boundary linkage, and a negative effect on privacy control. Privacy concerns and privacy literacy have a negative impact on privacy disclosure, boundary linkage, and a positive impact on privacy control. Using smart speakers as an example, this study hopes to generalize the findings on privacy management strategies when using the Internet of Things (IoT).

    Keywords: Smart speaker, Communication Privacy Management theory, Boundary management, boundary rule formation, boundary coordination

    Received: 19 Aug 2023; Accepted: 10 Jun 2024.

    Copyright: © 2024 Feng. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Bobo Feng, Southwest University of Political Science & Law, Chongqing, China

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.