Abstract:Conversational AI (CAI) systems which encompass voice- and text-based assistants are on the rise and have been largely integrated into people's everyday lives. Despite their widespread adoption, users voice concerns regarding privacy, security and trust in these systems. However, the composition of these perceptions, their impact on technology adoption and usage and the relationship between privacy, security and trust perceptions in the CAI context remain open research challenges. This study contributes to the field by conducting a Systematic Literature Review and offers insights into the current state of research on privacy, security and trust perceptions in the context of CAI systems. The review covers application fields and user groups and sheds light on empirical methods and tools used for assessment. Moreover, it provides insights into the reliability and validity of privacy, security and trust scales, as well as extensively investigating the subconstructs of each item as well as additional concepts which are concurrently collected. We point out that the perceptions of trust, privacy and security overlap based on the subconstructs we identified. While the majority of studies investigate one of these concepts, only a few studies were found exploring privacy, security and trust perceptions jointly. Our research aims to inform on directions to develop and use reliable scales for users' privacy, security and trust perceptions and contribute to the development of trustworthy CAI systems.
What problem does this paper attempt to address?
### What problems does this paper attempt to solve?
This paper aims to explore and evaluate the current research status of privacy, security, and trust perception in Conversational AI (CAI) systems. Specifically, the author answers the following research questions through a Systematic Literature Review (SLR):
1. **What is the current research status regarding the interactive relationships among privacy, security, and trust perception in CAI systems and their impacts on other factors?**
- The research attempts to understand the interactions among privacy, security, and trust perception in CAI systems and explore how these perceptions affect technology adoption and use.
2. **What are the current conceptualizations, measurement methods, and tools used to study privacy, security, and trust perception? What are their advantages and limitations?**
- The research focuses on the existing conceptualization methods, measurement methods, and tools, especially how privacy leakage erodes trust and how users' perception of privacy and trust ensures the adoption and continuous use of CAI systems.
3. **How can reliable and effective privacy and trust research be carried out in the future?**
- The research hopes to provide directions for future scientific research work and encourage researchers to critically evaluate and discuss research in this field.
4. **What methods are used to study privacy, security, and trust perception in CAI systems?**
- By analyzing existing literature, understand commonly used research methods, such as quantitative research, surveys, experiments, case studies, etc.
5. **In the research of CAI systems, which constructs and sub - constructs have been studied?**
- Explore the specific components of privacy, security, and trust perception.
6. **In the research of CAI systems, how often are privacy, security, and trust perception scales used?**
- Count and analyze the usage of different scales.
7. **In the research of CAI systems, do the used privacy, security, and trust perception scales show reliability and validity?**
- Evaluate the reliability and validity of existing scales.
8. **In the research of CAI systems, are privacy, security, and trust perception studied simultaneously?**
- Explore whether there are multiple studies that examine these three aspects simultaneously.
9. **What other topics are studied when evaluating privacy, security, and trust perception?**
- Explore other research topics parallel to the research of privacy, security, and trust perception, such as user experience, technology adoption, etc.
Through these questions, the author hopes to fill the current gaps in research, provide theoretical support for the development of more trustworthy CAI systems, and promote further research in related fields.