Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessMarch 2026 LinksLessWrong AIPolymarket Kalshi ArbitrageDEV CommunityBMAD-Method: AI-Driven Agile Development That Actually Works (Part 1: Core Framework)DEV CommunityBehind the Scenes: How Database Traffic Control WorksDEV CommunityWe Built the Same Agent Three Times Before It WorkedDEV CommunityWhy Cybersecurity Compliance Is Now a Strategic Business Asset — Not Just a Legal ObligationDEV CommunityScan Any Document to a Searchable PDF For Free, Right in Your BrowserDEV CommunityAI Writes Better UI Without React Than With ItDEV CommunityScan Any Document to a Searchable PDF — For Free, Right in Your BrowserDEV CommunityWhy LLM orchestration is broken (and how cryptographic agent identities fix it)DEV CommunityBeyond the Hype: A Practical Guide to Integrating AI into Your Development WorkflowDEV CommunityBoston Becomes First Major District to Bring AI Literacy Into Classrooms - GoverningGoogle News: AIBlack Hat USADark ReadingBlack Hat AsiaAI BusinessMarch 2026 LinksLessWrong AIPolymarket Kalshi ArbitrageDEV CommunityBMAD-Method: AI-Driven Agile Development That Actually Works (Part 1: Core Framework)DEV CommunityBehind the Scenes: How Database Traffic Control WorksDEV CommunityWe Built the Same Agent Three Times Before It WorkedDEV CommunityWhy Cybersecurity Compliance Is Now a Strategic Business Asset — Not Just a Legal ObligationDEV CommunityScan Any Document to a Searchable PDF For Free, Right in Your BrowserDEV CommunityAI Writes Better UI Without React Than With ItDEV CommunityScan Any Document to a Searchable PDF — For Free, Right in Your BrowserDEV CommunityWhy LLM orchestration is broken (and how cryptographic agent identities fix it)DEV CommunityBeyond the Hype: A Practical Guide to Integrating AI into Your Development WorkflowDEV CommunityBoston Becomes First Major District to Bring AI Literacy Into Classrooms - GoverningGoogle News: AI

Gender-Based Heterogeneity in Youth Privacy-Protective Behavior for Smart Voice Assistants: Evidence from Multigroup PLS-SEM

arXivMarch 31, 202610 min read0 views
Source Quiz

arXiv:2603.27117v1 Announce Type: cross Abstract: This paper investigates how gender shapes privacy decision-making in youth smart voice assistant (SVA) ecosystems. Using survey data from 469 Canadian youths aged 16-24, we apply multigroup Partial Least Squares Structural Equation Modeling to compare males (N=241) and females (N=174) (total N = 415) across five privacy constructs: Perceived Privacy Risks (PPR), Perceived Privacy Benefits (PPBf), Algorithmic Transparency and Trust (ATT), Privacy Self-Efficacy (PSE), and Privacy Protective Behavior (PPB). Results provide exploratory evidence of — Molly Campbell, Yulia Bobkova, Ajay Kumar Shrestha

View PDF

Abstract:This paper investigates how gender shapes privacy decision-making in youth smart voice assistant (SVA) ecosystems. Using survey data from 469 Canadian youths aged 16-24, we apply multigroup Partial Least Squares Structural Equation Modeling to compare males (N=241) and females (N=174) (total N = 415) across five privacy constructs: Perceived Privacy Risks (PPR), Perceived Privacy Benefits (PPBf), Algorithmic Transparency and Trust (ATT), Privacy Self-Efficacy (PSE), and Privacy Protective Behavior (PPB). Results provide exploratory evidence of gender heterogeneity in selected pathways. The direct effect of PPR on PPB is stronger for males (Male: \b{eta} = 0.424; Female: \b{eta} = 0.233; p < 0.1), while the indirect effect of ATT on PPB via PSE is stronger for females (Female: \b{eta} = 0.229; Male: \b{eta} = 0.132; p < 0.1). Descriptive analysis of non-binary (N=15) and prefer-not-to-say participants (N=39) shows lower trust and higher perceived risk than the binary groups, motivating future work with adequately powered gender-diverse samples. Overall, the findings provide exploratory evidence that gender may moderate key privacy pathways, supporting more responsive transparency and control interventions for youth SVA use.

Comments: To appear in IEEE CCECE 2026 proceedings

Subjects:

Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)

Cite as: arXiv:2603.27117 [cs.CR]

(or arXiv:2603.27117v1 [cs.CR] for this version)

https://doi.org/10.48550/arXiv.2603.27117

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Ajay Shrestha [view email] [v1] Sat, 28 Mar 2026 04:11:05 UTC (481 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Gender-Base…researchpaperarxivaiartificial-…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 142 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers