
Voice Assistants and Privacy: How Much Do Alexa, Siri, and Google Know About You? | IJCT Volume 12 – Issue 6 | IJCT-V12I6P22

International Journal of Computer Techniques
ISSN 2394-2231
Volume 12, Issue 6 | Published: November – December 2025
Table of Contents
ToggleAuthor
Syeda Firdous Fatema , Prajwal Prakash Kulkarni ,
Assistant Prof. Rubina Sheikh
Abstract
Voice assistants have fundamentally transformed the landscape of human-computer interaction, ushering in an era of conversational computing that was once confined to science fiction. Amazon Alexa, Apple Siri, and Google Assistant represent the vanguard of this technological revolution, offering users unprecedented convenience through natural language interfaces. These AI-powered systems have seamlessly integrated into our daily lives, embedded in smartphones, smart speakers, automobiles, and an expanding ecosystem of Internet of Things (IoT) devices.
The proliferation of voice assistants reflects a broader shift toward ambient computing, where technology becomes increasingly invisible yet omnipresent. Users can now control smart home devices, make purchases, access information, schedule appointments, and perform countless other tasks through simple voice commands. This hands-free interaction model has proven particularly valuable for accessibility, enabling individuals with mobility limitations to interact with technology more easily.
However, the convenience of voice assistants comes with significant privacy implications that are often poorly understood by users. These devices operate on an “always-listening” paradigm, continuously monitoring ambient audio for wake words or activation phrases. This constant surveillance capability, combined with the intimate nature of voice data and the potential for accidental activations, creates a complex privacy landscape that demands careful examination.
The voice data collected by these systems is extraordinarily rich, containing not only the explicit content of user requests but also implicit information such as emotional state, health conditions, personal relationships, daily routines, and even physical location. This biometric data is processed through sophisticated machine learning algorithms that can infer patterns and preferences, creating detailed user profiles that extend far beyond the original voice commands.
Keywords
^KEYWORDS^
Conclusion
The identified limitations significantly affect the generalizability of research findings. Results should be interpreted as indicative of privacy practices and user attitudes within the specific sample and context studied, rather than definitive conclusions applicable to all voice assistant users globally.
References
Abbasi, A., Sadeghi, A. R., & Rahmati, A. (2021). Privacy and security in voice assistants: A comprehensive survey. ACM Computing Surveys, 54(9), 1-36. https://doi.org/10.1145/3465171
Amazon.com, Inc. (2023). Alexa privacy hub. https://www.amazon.com/alexa-privacy
Apple Inc. (2023). Siri privacy whitepaper. https://www.apple.com/privacy/docs/
Chen, L., Wang, X., & Liu, Y. (2020). Cross-cultural analysis of privacy attitudes toward voice assistants in East Asian markets. International Journal of Human-Computer Studies, 142, 102461. https://doi.org/10.1016/j.ijhcs.2020.102461
Chung, H., Park, J., & Lee, S. (2017). Digital forensic approaches for Amazon Alexa ecosystem. Digital Investigation, 22, 15-25. https://doi.org/10.1016/j.diin.2017.06.010
California Consumer Privacy Act. (2018). California Civil Code § 1798.100 et seq.
European Union. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Union, L119, 1-88.
Federal Trade Commission. (2019). FTC staff report: Internet of Things: Privacy and security in a connected world. https://www.ftc.gov/reports/internet-things-privacy-security-connected-world
Government of India. (2019). The Personal Data Protection Bill, 2019. https://www.prsindia.org/billtrack/personal-data-protection-bill-2019
Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514. https://doi.org/10.1126/science.aaa1465
Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., & Feamster, N. (2017). Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic. arXiv preprint arXiv:1708.05044. https://doi.org/10.48550/arXiv.1708.05044
Seymour, W., Kraemer, M. J., Binns, R., & Van Kleek, M. (2020). Informing the design of privacy-empowering tools for the connected home. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 1-14. https://doi.org/10.1145/3313831.3376264
Accenture. (2020). Human + machine: Reimagining work in the age of AI. https://www.accenture.com/us-en/insights/future-workforce/human-machine-collaboration
IBM Security. (2021). Cost of a data breach report 2021. https://www.ibm.com/security/data-breach
McKinsey & Company. (2021). The age of AI: Artificial intelligence and the future of work. https://www.mckinsey.com/featured-insights/future-of-work/ai-automation-and-the-future-of-work-ten-things-to-solve-for
PwC. (2020). AI and workforce evolution: How AI is transforming the workplace. https://www.pwc.com/us/en/tech-effect/ai-analytics/ai-workforce-evolution.html Alexa Skills Kit Documentation. (2023). Privacy and data handling in Alexa skills. https://developer.amazon.com/en-US/docs/alexa/custom-skills/handle-requests-sent-by-alexa.html
Apple Developer Documentation. (2023). SiriKit programming guide. https://developer.apple.com/documentation/sirikit
Google Assistant Developer Documentation. (2023). Actions on Google privacy and data handling requirements. https://developers.google.com/assistant/console/policies/privacy-requirements
CHI Conference on Human Factors in Computing Systems. (2018-2023). Proceedings of various years focusing on voice interfaces and privacy. ACM Digital Library.
IEEE Symposium on Security and Privacy. (2017-2023). Proceedings focusing on IoT and voice security. IEEE Computer Society.
USENIX Security Symposium. (2018-2023). Proceedings on privacy-enhancing technologies. USENIX Association.
Workshop on Privacy in the Electronic Society (WPES). (2017-2023). Annual workshop proceedings. ACM Digital Library.
How to Cite This Paper
Syeda Firdous Fatema , Prajwal Prakash Kulkarni ,
Assistant Prof. Rubina Sheikh (2025). Voice Assistants and Privacy: How Much Do Alexa, Siri, and Google Know About You?. International Journal of Computer Techniques, 12(6). ISSN: 2394-2231.
Related Posts:








