<s>
Virtual	B-Protocol
assistants	I-Protocol
are	O
software	B-Application
technology	I-Application
that	O
assist	O
users	O
complete	O
various	O
tasks	O
.	O
</s>
<s>
Well	O
known	O
virtual	B-Protocol
assistants	I-Protocol
include	O
Amazon	B-Application
Alexa	I-Application
,	O
and	O
Siri	B-Application
,	O
produced	O
by	O
Apple	O
.	O
</s>
<s>
Other	O
companies	O
,	O
such	O
as	O
Google	B-Application
and	O
Microsoft	O
,	O
also	O
have	O
virtual	B-Protocol
assistants	I-Protocol
.	O
</s>
<s>
There	O
are	O
privacy	O
issues	O
concerning	O
what	O
information	O
can	O
go	O
to	O
the	O
third	O
party	O
corporations	O
that	O
operate	O
virtual	B-Protocol
assistants	I-Protocol
and	O
how	O
this	O
data	O
can	O
potentially	O
be	O
used	O
.	O
</s>
<s>
Because	O
virtual	B-Protocol
assistants	I-Protocol
similarly	O
to	O
robots	O
or	O
other	O
artificial	B-Application
intelligence	I-Application
are	O
often	O
considered	O
"	O
nurturing	O
"	O
bodies	O
,	O
consumers	O
may	O
overlook	O
potential	O
controversies	O
and	O
value	O
their	O
convenience	O
more	O
than	O
their	O
privacy	O
.	O
</s>
<s>
When	O
forming	O
relationships	O
with	O
devices	O
,	O
humans	O
tend	O
to	O
become	O
closer	O
to	O
those	O
that	O
perform	O
humanly	O
functions	O
,	O
which	O
is	O
what	O
virtual	B-Protocol
assistants	I-Protocol
do	O
.	O
</s>
<s>
Multilayer	O
authentication	O
requires	O
multiple	O
layers	O
of	O
security	O
to	O
authorize	O
a	O
virtual	B-Protocol
assistant	I-Protocol
to	O
work	O
.	O
</s>
<s>
The	O
Virtual	O
Security	O
button	O
would	O
provide	O
a	O
second	O
layer	O
of	O
authentication	O
for	O
devices	O
,	O
such	O
as	O
Alexa	B-Application
,	O
that	O
would	O
be	O
triggered	O
by	O
both	O
movement	O
and	O
the	O
voice	O
combined	O
.	O
</s>
<s>
A	O
specific	O
instance	O
in	O
which	O
there	O
are	O
issues	O
with	O
the	O
lack	O
of	O
verification	O
necessary	O
to	O
unlock	O
access	O
to	O
the	O
virtual	B-Protocol
assistants	I-Protocol
and	O
to	O
give	O
them	O
commands	O
is	O
when	O
an	O
Amazon	B-Application
Alexa	I-Application
is	O
left	O
in	O
a	O
living	O
quarters	O
unattended	O
.	O
</s>
<s>
Currently	O
,	O
there	O
is	O
only	O
one	O
layer	O
of	O
authentication	O
which	O
is	O
the	O
voice	O
;	O
there	O
is	O
not	O
a	O
layer	O
that	O
requires	O
the	O
owner	O
of	O
the	O
virtual	B-Protocol
assistant	I-Protocol
to	O
be	O
present	O
.	O
</s>
<s>
Thus	O
,	O
with	O
only	O
one	O
barrier	O
to	O
access	O
all	O
of	O
the	O
information	O
virtual	B-Protocol
assistants	I-Protocol
have	O
access	O
to	O
,	O
concerns	O
regarding	O
the	O
security	O
of	O
information	O
exchanged	O
are	O
raised	O
.	O
</s>
<s>
The	O
"	O
Hey	B-Application
Siri	I-Application
"	O
function	O
allows	O
the	O
iPhone	B-Device
to	O
listen	O
through	O
ambient	O
sound	O
until	O
this	O
phrase	O
(	O
"	O
Hey	B-Application
Siri	I-Application
"	O
)	O
is	O
spotted	O
.	O
</s>
<s>
Once	O
this	O
phrase	O
is	O
spotted	O
,	O
Siri	B-Application
is	O
triggered	O
to	O
respond	O
.	O
</s>
<s>
In	O
order	O
to	O
not	O
always	O
be	O
listened	O
to	O
,	O
an	O
iPhone	B-Device
user	O
can	O
turn	O
off	O
the	O
"	O
Hey	B-Application
Siri	I-Application
"	O
function	O
.	O
</s>
<s>
This	O
virtual	B-Protocol
assistant	I-Protocol
is	O
linked	O
to	O
the	O
"	O
Echo	B-Device
"	O
speaker	O
created	O
by	O
Amazon	O
and	O
is	O
primarily	O
a	O
device	O
controlled	O
by	O
the	O
voice	O
that	O
can	O
play	O
music	O
,	O
give	O
information	O
to	O
the	O
user	O
,	O
and	O
perform	O
other	O
functions	O
.	O
</s>
<s>
The	O
Virtual	O
Security	O
Button	O
(	O
VS	O
Button	O
)	O
has	O
been	O
proposed	O
as	O
a	O
potential	O
method	O
to	O
add	O
more	O
security	O
to	O
this	O
virtual	B-Protocol
assistant	I-Protocol
.	O
</s>
<s>
Thus	O
,	O
the	O
VS	O
button	O
providing	O
a	O
double-check	O
method	O
before	O
allowing	O
Alexa	B-Application
to	O
be	O
utilized	O
would	O
lessen	O
such	O
dangerous	O
scenarios	O
from	O
occurring	O
.	O
</s>
<s>
Siri	B-Application
is	O
Apple	O
Corporation	O
's	O
virtual	B-Protocol
assistant	I-Protocol
and	O
is	O
utilized	O
on	O
the	O
iPhone	B-Device
.	O
</s>
<s>
Siri	B-Application
gathers	O
the	O
information	O
that	O
users	O
input	O
and	O
has	O
the	O
ability	O
to	O
utilize	O
this	O
data	O
.	O
</s>
<s>
The	O
ecosystem	O
of	O
the	O
technological	O
interface	B-Application
is	O
vital	O
in	O
determining	O
the	O
amount	O
of	O
privacy	O
;	O
the	O
ecosystem	O
is	O
where	O
the	O
information	O
lives	O
.	O
</s>
<s>
Other	O
information	O
that	O
can	O
be	O
compromised	O
is	O
location	O
information	O
if	O
one	O
uses	O
the	O
GPS	O
feature	O
of	O
the	O
iPhone	B-Device
.	O
</s>
<s>
Any	O
information	O
,	O
such	O
as	O
one	O
's	O
location	O
,	O
that	O
is	O
given	O
away	O
in	O
an	O
exchange	O
with	O
a	O
virtual	B-Protocol
assistant	I-Protocol
is	O
stored	O
in	O
these	O
ecosystems	O
.	O
</s>
<s>
"	O
Hey	B-Application
Siri	I-Application
"	O
allows	O
Siri	B-Application
to	O
be	O
voice-activated	O
.	O
</s>
<s>
Apple	O
's	O
Siri	B-Application
also	O
has	O
solely	O
one	O
level	O
of	O
authentication	O
.	O
</s>
<s>
If	O
one	O
has	O
a	O
passcode	O
,	O
in	O
order	O
to	O
utilize	O
various	O
features	O
,	O
Siri	B-Application
will	O
require	O
the	O
passcode	O
to	O
be	O
inputted	O
.	O
</s>
<s>
Cortana	O
,	O
Microsoft	O
's	O
virtual	B-Protocol
assistant	I-Protocol
,	O
is	O
another	O
voice	O
activated	O
virtual	B-Protocol
assistant	I-Protocol
that	O
only	O
requires	O
the	O
voice	O
;	O
hence	O
,	O
it	O
also	O
utilizes	O
solely	O
the	O
singular	O
form	O
of	O
authentication	O
.	O
</s>
<s>
Google	B-Application
Assistant	O
,	O
which	O
was	O
originally	O
dubbed	O
Google	B-Application
Now	I-Application
,	O
is	O
the	O
most	O
human-like	O
virtual	B-Protocol
assistant	I-Protocol
.	O
</s>
<s>
The	O
similarities	O
between	O
humans	O
and	O
this	O
virtual	B-Protocol
assistant	I-Protocol
stem	O
from	O
the	O
natural	O
language	O
utilized	O
as	O
well	O
as	O
the	O
fact	O
that	O
this	O
virtual	B-Protocol
assistant	I-Protocol
in	O
particular	O
is	O
very	O
knowledgeable	O
about	O
the	O
tasks	O
that	O
humans	O
would	O
like	O
them	O
to	O
complete	O
prior	O
to	O
the	O
user	O
's	O
utilization	O
of	O
these	O
tasks	O
.	O
</s>
<s>
Ride	O
sharing	O
companies	O
like	O
Uber	B-Application
and	O
Lyft	B-Application
utilize	O
artificial	B-Application
intelligence	I-Application
to	O
scale	O
their	O
scopes	O
of	O
business	O
.	O
</s>
<s>
Moreover	O
,	O
this	O
artificial	B-Application
intelligence	I-Application
feature	O
helps	O
to	O
allay	O
privacy	O
concerns	O
regarding	O
the	O
potential	O
exchange	O
of	O
confidential	O
user	O
information	O
between	O
Uber	B-Application
and	O
Lyft	B-Application
employees	O
.	O
</s>
<s>
However	O
,	O
even	O
the	B-Application
artificial	I-Application
intelligence	I-Application
utilized	O
can	O
"	O
interact	O
"	O
with	O
each	O
other	O
,	O
so	O
these	O
privacy	O
concerns	O
for	O
the	O
companies	O
are	O
still	O
relevant	O
.	O
</s>
<s>
Privacy	O
by	O
design	O
makes	O
the	O
interface	B-Application
more	O
secure	O
for	O
the	O
user	O
.	O
</s>
<s>
The	O
standard	O
would	O
have	O
to	O
be	O
high	O
enough	O
to	O
not	O
allow	O
for	O
loopholes	O
of	O
information	O
to	O
infringe	O
upon	O
,	O
and	O
such	O
rules	O
may	O
apply	O
to	O
virtual	B-Protocol
assistants	I-Protocol
.	O
</s>
<s>
Various	O
patents	O
have	O
controlled	O
the	O
requirement	O
of	O
technology	O
,	O
such	O
as	O
artificial	B-Application
intelligence	I-Application
,	O
to	O
include	O
various	O
modes	O
of	O
privacy	O
by	O
nature	O
.	O
</s>
<s>
Artificial	B-Application
intelligence	I-Application
as	O
a	O
whole	O
attempts	O
to	O
emulate	O
human	O
actions	O
and	O
provide	O
the	O
menial	O
services	O
that	O
humans	O
provide	O
,	O
but	O
should	O
not	O
have	O
to	O
be	O
bothered	O
with	O
.	O
</s>
<s>
In	O
the	O
process	O
of	O
automating	O
these	O
actions	O
,	O
various	O
technological	O
interfaces	B-Application
are	O
formed	O
.	O
</s>
<s>
The	O
problem	O
that	O
has	O
to	O
be	O
solved	O
has	O
to	O
do	O
with	O
the	O
concept	O
that	O
in	O
order	O
to	O
process	O
information	O
and	O
perform	O
their	O
functions	O
,	O
virtual	B-Protocol
assistants	I-Protocol
curate	O
information	O
.	O
</s>
<s>
What	O
they	O
do	O
with	O
this	O
information	O
and	O
how	O
the	O
information	O
can	O
be	O
compromised	O
is	O
vital	O
to	O
note	O
for	O
both	O
the	O
field	O
of	O
virtual	B-Protocol
assistants	I-Protocol
and	O
artificial	B-Application
intelligence	I-Application
more	O
broadly	O
.	O
</s>
<s>
There	O
have	O
been	O
controversies	O
surrounding	O
the	O
opinions	O
that	O
virtual	B-Protocol
assistants	I-Protocol
can	O
have	O
.	O
</s>
<s>
As	O
the	O
technology	O
has	O
evolved	O
,	O
there	O
is	O
potential	O
for	O
the	O
virtual	B-Protocol
assistants	I-Protocol
to	O
possess	O
controversial	O
positions	O
on	O
issues	O
which	O
can	O
cause	O
uproar	O
.	O
</s>
<s>
These	O
views	O
can	O
be	O
political	O
,	O
which	O
can	O
be	O
impactful	O
on	O
society	O
since	O
virtual	B-Protocol
assistants	I-Protocol
are	O
used	O
so	O
widely	O
.	O
</s>
<s>
In	O
addition	O
to	O
humans	O
evaluating	O
artificial	B-Application
intelligence	I-Application
and	O
robots	O
,	O
the	O
Wizard	O
of	O
Oz	O
approach	O
is	O
being	O
introduced	O
.	O
</s>
<s>
When	O
technology	O
becomes	O
close	O
to	O
being	O
human-like	O
,	O
the	O
Wizard	O
of	O
Oz	O
approach	O
says	O
that	O
this	O
technology	O
has	O
the	O
ability	O
to	O
evaluate	O
and	O
augment	O
other	O
artificial	B-Application
intelligence	I-Application
technology	O
.	O
</s>
<s>
Thus	O
,	O
in	O
order	O
to	O
be	O
utilized	O
,	O
as	O
long	O
as	O
they	O
have	O
useful	O
features	O
,	O
virtual	B-Protocol
assistants	I-Protocol
do	O
not	O
have	O
to	O
focus	O
all	O
of	O
their	O
innovation	O
on	O
becoming	O
more	O
human-like	O
.	O
</s>
