Security and Privacy Concerns in The Implementation of Virtual Assistants in Multinational Companies

Authors

  • Okpomu, E. Bethel Department of Computer Science, School of Applied Science, Federal Polytechnic, Ekowe, Bayelsa State, Nigeria
  • George, Yebimodei Esther School of Management Sciences, Dept of Business Administration and Management, Ekowe, Bayelsa State, Nigeria

Keywords:

Multinational Companies, Virtual Assistants, Security Concerns, Privacy Concerns

Abstract

This study examines the adoption of virtual assistants in multinational companies operating in Nigeria, exploring their multifaceted implications for operational efficiency, customer engagement, and data security. Virtual assistants have emerged as indispensable tools for streamlining administrative tasks, enhancing customer service, and facilitating remote collaboration, particularly amidst the challenges posed by the COVID-19 pandemic. However, alongside the benefits come significant concerns regarding data security and user privacy. Leveraging a comprehensive review of existing literature and case studies of multinational companies in Nigeria, this study identifies key security and privacy challenges associated with virtual assistant implementations, including the risk of data breaches, privacy infringements, and malicious attacks. Furthermore, the study proposes a series of proactive strategies for mitigating these risks, emphasizing the importance of robust security measures, regular audits, adherence to privacy regulations, transparent data handling practices, user education, and continuous monitoring. By implementing these recommendations, multinational companies can effectively safeguard sensitive data, protect user privacy rights, and foster trust and accountability in virtual assistant deployments.

References

Almuhimedi, H., Wilson, S., Liu, N., Sadeh, N., Acquisti, A., & Cranor, L. F. (2015). A field study on mobile app privacy nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (787-796).

Andersen, H. H., Bærendtsen, A., Olesen, T. B., & Paldam, M. (2019). The market for privacy in social networks. PLOS ONE, 14(3), 0214055.

Angwin, J., & Parris Jr, A. (2011). We experiment on human beings! Confronting the myths of big data and more. The Wall Street Journal, 12(13), 2014-08.

Balebako, R., Jung, J., Lu, W., Marcu, G., & Cranor, L. F. (2013). Little brothers watching you: Raising awareness of data leaks on smartphones. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (259-268).

Cahn, A., Julian, K., & Verma, D. C. (2019). Privacy and Security in the Era of Always-On Listening Devices. IEEE Security & Privacy, 17(2), 77-85.

Calo, R. (2010). Privacy and markets: A love story. Theoretical Inquiries in Law, 11(1), 29-51.

Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Identity in the Information Society, 2(2), 223-234.

Cavoukian, A., & Castro, D. (2017). Privacy by Design: The Definitive Workshop. Apress.

Cranor, L. F. (2008). Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. IEEE Security & Privacy, 6(2), 56-59.

Dhillon, G., & Moores, T. T. (2001). Internet security: cryptographic principles, algorithms, and protocols. John Wiley & Sons.

European Union Agency for Cybersecurity (2021). Threat Landscape for IoT and IIoT Devices: Firmware and Supply Chain Security. (ENISA).

Goodwin, M. (2019). Privacy, Security, and Trust in the Digital World. Journal of Business Ethics, 158(4), 949-951.

Hadlington, L. J., & Parsons, K. (2017). The impact of cybersecurity threats on well-being: A systematic review. Applied Ergonomics, 65, 211-218.

Hall, C. M., Haywood, L., & Brymer, R. A. (2008). Tourism and innovation. Routledge.

Harkous, H., Fawaz, K., Shin, K. G., & Aberer, K. (2018). Polisis: Automated analysis and presentation of privacy policies using deep learning. In Proceedings of the 27th International Conference on World Wide Web (pp. 2243-2246).

Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.

Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh, N., & Wetherall, D. (2013). A conundrum of permissions: installing applications on an Android smartphone. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 627-636).

Kügler, M., & Smolnik, S. (2014). The influence of external forces on information systems security—A review of the literature. Information & Management, 51(5), 582-5.

Marelli, L., Stewart, K. A., & Arrott, M. (2017). The influence of privacy and security concerns on online trust: A literature review. Journal of Internet Commerce, 16(1), 1-24.

Martin, K., Shilton, K., & Callaghan, M. (2016). The privacy and security implications of energy-provisioning data: A case study of smart meters. EPJ Data Science, 5(1), 1-20.

McDonald, A. M., & Cranor, L. F. (2008). The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society, 4(3), 543-568.

Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3), 15-29.

Narayanan, A., & Shmatikov, V. (2009). De-anonymizing social networks. In 2009 30th IEEE Symposium on Security and Privacy (pp. 173-187). IEEE.

Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. WW Norton & Company.

Siponen, M. T., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487-502.

Solove, D. J. (2008). Understanding privacy. Harvard University Press.

Sweeney, L., & Abu, A. (2009). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 321(5874), 1-9.

Von Solms, R., & Von Solms, S. H. (2004). Information security governance: a holistic approach. In Proceedings of the 4th World Conference on Information Security Education (pp. 73-78).

Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., & Cranor, L. F. (2011). I regretted the minute I pressed share: A qualitative study of regrets on Facebook. Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS), 10-pp.

Warkentin, M., Johnston, A. C., & Shropshire, J. (2011). The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20(3), 267-284.

Zimmeck, S., Wilson, S., & Sadeh, N. (2017). Identifying contexts of privacy loss: A survey and a user study. ACM Transactions on Privacy and Security (TOPS), 20(3), 1-37.

Downloads

Published

2024-03-30

How to Cite

Okpomu, E. Bethel, & George, Yebimodei Esther. (2024). Security and Privacy Concerns in The Implementation of Virtual Assistants in Multinational Companies. American Journal of Current Tendency and Innovation, 1(2), 17–31. Retrieved from https://publishingjournals.org/ajcti/article/view/42

Issue

Section

Articles