<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">S m o k e S c r e e n s and Scapegoats: The Reality of General Data Protection Regulation C o m p l i a n c e -Privacy and Ethics in the Case of Replika Al</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Joni-Roy</forename><surname>Piispanen</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Vaasa</orgName>
								<address>
									<addrLine>Wolffintie 32</addrLine>
									<postCode>65200</postCode>
									<settlement>Vaasa</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tinja</forename><surname>Myllyviita</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Vaasa</orgName>
								<address>
									<addrLine>Wolffintie 32</addrLine>
									<postCode>65200</postCode>
									<settlement>Vaasa</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ville</forename><surname>Vakkuri</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Vaasa</orgName>
								<address>
									<addrLine>Wolffintie 32</addrLine>
									<postCode>65200</postCode>
									<settlement>Vaasa</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rebekah</forename><surname>Rousi</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Vaasa</orgName>
								<address>
									<addrLine>Wolffintie 32</addrLine>
									<postCode>65200</postCode>
									<settlement>Vaasa</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">S m o k e S c r e e n s and Scapegoats: The Reality of General Data Protection Regulation C o m p l i a n c e -Privacy and Ethics in the Case of Replika Al</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">7844D323A8286840283A6AF94D1C479F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:08+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Social Chatbots</term>
					<term>Privacy Policies</term>
					<term>Ethics</term>
					<term>Al Companions</term>
					<term>Data Protection</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Currently artificial intelligence (Al)-enabled chatbots are capturing the hearts and imaginations of the public at large. Chatbots that users can build and personalize, as well as pre-designed avatars ready for users' selection, all of these are on offer in applications to provide social companionship, friends and even love. These systems, however, have demonstrated challenges on the privacy and ethics front. This paper takes a critical approach towards examining the intricacies of these issues within Al companion services. We chose Replika as a case and employed close reading to examine the service's privacy policy. We additionally analyze articles from public media about the company and its practices to gain insight into the trustworthiness and integrity of the information provided in the policy. The aim is to ascertain whether seeming General Data Protection Regulation (GDPR) compliance equals reliability of required information, or whether the area of GDPR compliance in itself is one riddled with ethical challenges. The paper contributes to a growing body of scholarship on ethics and privacy related matters in the sphere of social chatbots. The results reveal that despite privacy notices, data collection practices might harvest personal data without users' full awareness. Cross-textual comparison reveals that privacy notice information does not fully correspond with other information sources.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Artificial Intelligence (Al) systems are becoming ubiquitous in everyday life. Reliance on smart technologies for personal contexts, industry, healthcare and education are increasing with the development of even more AI-products. Recent themes that have emerged in the development of Al technologies include affective computing, emotional Al, and empathetic AI <ref type="bibr" target="#b0">[1]</ref>. At the heart of these initiatives is the goal of inciting affective emotional relationships between humans and technology <ref type="bibr" target="#b1">[2]</ref>. Al capable of conversation and interaction with users through voice, text, image, and video have managed to penetrate the social sphere. This is particularly afforded by design features that embed emotional characteristics into the fabrics of the technology. Such systems are designed and trained to recognize, simulate and elicit human emotions and can serve the function of social interaction <ref type="bibr" target="#b2">[3]</ref>. These types of Al that interact with users on an emotional and personal level are commonly referred to as social chatbots.</p><p>Social chatbots mimic human conversations via Natural Language Processing (NLP) and simulate human characteristics such as speech, text, gestures, and facial expressions <ref type="bibr" target="#b3">[4]</ref>. They are commonly manifested as text-based chatbots, digital avatars, and social robots designed for conversation and interaction. Recently, the development of more humanlike chatbots has become possible with advances in NLP. Such advanced systems are potentially capable of exhibiting personality traits and participating in relationship-building <ref type="bibr" target="#b4">[5]</ref>, Preliminary results have shown that social chatbots can be 7th Conference on Technology Ethics (TETHICS2024), November 6-7, 2024, Tampere, Finland »Corresponding author. Q joni.piispancn@uwasa.fi (J. Piispanen); tinja.myllyviita@uwasa.fi (T. Myllyviita); villc.vakkuri@uwasa.fi (V. Vakkuri); rebekah.rousi@uwasa.fi (R. Rousi) G 0009-0003-7533-4128 (J. Piispanen); 0009-0000-1976-8085 (T. Myllyviita); 0000-0002-1550-1110 (V. Vakkuri); 0000-0001-5771-3528 (R.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• •</head><p>utilized to address and alleviate loneliness in young adults, as well as improving psychological wellbeing for people of all ages, particularly the elderly (see e.g., <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>).</p><p>Al designed for social interaction and companionship has the potential to trigger addictive tendencies in some users and could negatively influence user thoughts, decisions, behaviors, and purchasing patterns <ref type="bibr" target="#b7">[8]</ref>. Particularly concerning for younger populations are the potential negative effects of technology addiction on users' mental health, physical health and social functioning <ref type="bibr" target="#b8">[9]</ref>. Constant engagement with technology that is designed for social companionship and engagement can lead to the formation of negative habits <ref type="bibr" target="#b9">[10]</ref>. Environmental factors, such as social isolation and lack of social support serve an intensifying role in enabling excessive use and user behavior patterns <ref type="bibr" target="#b10">[11]</ref>.</p><p>The ethical concerns of social chatbots are exacerbated by the trust-based nature of disclosure and the emotional characteristics they are designed to exhibit and elicit. Studies have shown that users become more comfortable overtime at self-disclosing their personal information after establishing a level of trust with chatbots <ref type="bibr" target="#b11">[12]</ref>. Self-disclosure by participants is sometimes preluded by a process of investigation, where users investigate the chatbots terms on privacy and information security <ref type="bibr" target="#b11">[12]</ref>, Privacy, and the ability to sustain it, can be viewed as a precursor to trust <ref type="bibr" target="#b12">[13]</ref>, which users ascribe based on the credibility and benevolence of the organization <ref type="bibr" target="#b13">[14]</ref>,</p><p>For this study, the social chatbot and Al companion application Replika was chosen as a representative case study of Al systems designed for social interaction and engagement. The application consists of a text-based chat, which is the primary feature for regular users, allowing generic conversations with your Replika avatar serving as your friend. Advanced users can opt to transform their relationship into other forms, which enables different types of interaction and higher functionality on the part of the Replika chatbot and avatar. The user is generally encouraged to interact with Replika through upvoting and downvoting Replika's replies, allowing the user to train the chatbot to the user's preferences. Through repeated interaction with Replika the Al chatbot slowly learns the users' behavioral patterns and preferences shaping its responses over time. The user is encouraged to facilitate this process through self-disclosure and engagement with the chatbot. In the current study, the privacy of Replika is examined through Luka, Inc.'s policies. These policies and their accompanying documentation (i.e., privacy notice) are evaluated against discussions in public online media about the company, its location (offices and data storage), and subsequent ethics (observed reliability instilled between the privacy policy and public information). The research questions (RQs) for this study are:</p><p>• RQ1: What does Replika's privacy policy say about the collection and use of data? • RQ2: How does Replika's privacy policy information compare to the information presented in other public online media sources?</p><p>Replika has been marketed as "a friend who always listens" and ''the Al companion who cares" <ref type="bibr" target="#b14">[15]</ref>. Replika is a customizable chatbot that enables the user to decide its physical, social and emotional traits, including name, gender, avatar, voice tones, personality, types of emotional responses and affective behavior. Thus far, Replika has attracted millions of users and has been mostly positively received due to its advanced language and emotional capabilities <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>, Yet, research still lacks regarding cross-textual (triangulated) validation of privacy policies such as those required by General Data Protection Regulation (GDPR) and actual data management practice. The current study aims to address this problem through testing the integrity of the privacy policy information against other information sources. The paper begins with a brief overview on the relationship between Al chatbots, privacy and ethics, and briefly how it has arisen in contemporary research. It moves on to describe the method, its ethical considerations and the results in light of privacy issues and ethical concerns arising in the close reading of the material. Close reading being a method in which the text (or other representational material) itself is carefully analyzed and connected to other text (and representational material, <ref type="bibr" target="#b17">[18]</ref>). The discussion reflects on the ethical dimensions of Human-AI social interaction in general, leading towards more rigorous theoretical framework development in future studies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Al Chatbots in Privacy and Ethics Research</head><p>Al chatbots have been rising in popularity over the last 10 years. Their fidelity and uptake have catapulted thanks to the widespread implementation of Large Language Models (LLMs) and generative Al related technologies. In this paper we refer to Al systems that operate via NLP and are designed to be conversational agents as chatbots. We use the term social chatbot to refer to chatbots that are designed to form social-emotional relationships with users, following the definition seen in <ref type="bibr" target="#b11">[12]</ref>. Social chatbots offering social companionship by establishing human-relational bonds with users and offering emotional support are also known as Al companions <ref type="bibr" target="#b7">[8]</ref>. Al systems designed for companionship have evolved drastically during the decades since their conception. The current form of artificial companions based on Al can be traced back to Tamagotchis, small virtual pets, designed for user engagement via physical interaction and the simulation of caregiving <ref type="bibr" target="#b18">[19]</ref>, These virtual pets exemplify the aspects of social and emotional investment originating from a level of attachment and trust, that have been perfected in Al companions like Replika.</p><p>Al companions are designed for constant availability, resulting in the formation of relationships that are intended to produce an experience of security, having a positive impact on the user's general wellbeing <ref type="bibr" target="#b10">[11]</ref>, Ultimately, Al companions like Replika have the potential to serve as substitutes for human relationships replacing the need for physical and social presence <ref type="bibr" target="#b19">[20]</ref>, The distinctive design of Replika facilitates the Al's mimicking of human conversations and relationships with users <ref type="bibr" target="#b20">[21]</ref>, This may even go as far as mimicking undesirable human qualities and dysfunctional interactions <ref type="foot" target="#foot_0">2</ref> . The core design of Replika is exemplified in the Al companions' unprompted initiation of conversations inducing an experience of human-like interaction.</p><p>Al companions imbued with human-like qualities, appearing friendly and helpful, cultivate a level of trust between the Al companion and the user <ref type="bibr" target="#b21">[22]</ref>, Users interacting with Replika have expressed two distinct factors affecting their experience of trust in their relationship with the Al companion <ref type="bibr" target="#b22">[23]</ref>, The first factor is characterized by pragmatic drivers, such as privacy issues and information security, which play a role in how users' approach and engage with the Al companion. This is in line with the literature on how end users experience and approach digital services in general and how rationality serves as a cornerstone in individuals ascribing trustworthiness to technologies <ref type="bibr" target="#b23">[24]</ref>, The second factor refers to affective drivers, such as the experience of being accepted and understood by the Al companion without judgement or negative reaction. This emotional facet of trust, in which the Al companion is seen as having the user's best interest at heart is more interpersonal and commonly attributed as a core factor affecting human trust in relationships <ref type="bibr" target="#b4">[5]</ref>,</p><p>Ethical considerations stemming from the manipulation of users' affective drivers and the elicitation of personal user information through self-disclosure is one aspect of Al companions that is concerning and under-researched. Al companions present an extreme case of information asymmetry, in which the Al companion and the company running the service have the capacity to collect vast amounts of intimate data about users and aggregate this data into profiles <ref type="bibr" target="#b21">[22]</ref>. The potentially damaging consequences of permanently stored, accessible, and integrated user data are numerous. These concerns are exacerbated by recent reporting about the lacking privacy and security procedures utilized by Al companion service providers <ref type="bibr" target="#b24">[25]</ref>, The integrity, privacy and security of user's conversations with Al companions have come under question. Intricate details about users and their information, such as daily routines and usage patterns, have been shown to be accessible and retrieval from data collected by Al companions <ref type="bibr" target="#b25">[26]</ref>, This is compounded by other information such as sexuality, possible health-related information, and information about third parties (e.g., 'offloading' about social interactions with other people to the Al chatbot). These concerns necessitate the elucidation of privacy-related practices utilized by Al companion service providers. Towards this end, the privacy practices of Replika and Luka, Inc., one of the leading companies in designing Al companions, are studied.</p><p>The policies and practices adopted by Replika are critically examined and reflected upon with data protection regulation, namely GDPR and the California Consumer Privacy Act (CCPA). Data protection regulations primarily exist to increase control over personal data by individuals. This process is facilitated through providing individuals knowledge about how their personal data is collected, what is collected about them, and how this data is stored and used. Additionally, GDPR sets</p><formula xml:id="formula_0">• • • • • • • • • • • • •</formula><p>our requirements for user consent, which is supposed to encourage transparency, emancipate users, and reinforce trust in systems and organizations. In this study we primarily focus on GDPR, as Replika has been shown in prior examinations to be at least partially non-compliant to the requirements set out in the regulation. Focusing on GDPR also provides clearer avenues for the reflection of results and positioning this study within existing literature.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">M e t h o d s</head><p>In the present study, the authors took a two-fold approach to collecting and analyzing data. Firstly, the Privacy Policy<ref type="foot" target="#foot_1">3</ref> , Terms of Service and Cookies Policy of the Replika Al service by Luka, Inc. were extracted and read by the researchers. The first author applied close reading <ref type="bibr" target="#b17">[18]</ref> -a method designed to isolate textual properties and connect them to other texts and phenomena that aid in completing the details of or validating the message presented. The authors of this paper employed close reading as a means of comparing textual information presented in: a) the Replika Privacy Policy, the Replika Terms of Service, and the Replika Cookies Policy -the legal documents required under the EU General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and other international data privacy regulations and guidelines to state what data is collected, how, how the data will be used, and how the user (identity and intellectual owner of the data) may learn more, if not, prevent further data collection; and b) news media articles and academic sources that present facts that either validate or disqualify the validity of the privacy notice. The sources used can be seen in Table <ref type="table" target="#tab_0">1</ref>. This is combined with an attempt to analyze the data information statement (record of the data collected by Replika from Author 1), in order to see whether this too either validates or disqualifies the validity of the privacy notice.  <ref type="bibr" target="#b39">(Reunamäki, 2024)</ref> The intention behind adopting this methodological approach is to carefully examine the reliability of the data privacy information provided by companies in compliance with privacy regulations. Additionally, the approach unveils how users' data privacy and security are approached by the company and to what degree the company's practices conform to data protection regulations, such as GDPR and CCPA. The interpretations made through close reading are juxtaposed and complemented with previous reporting on the services privacy-related practices by academic and news sources, as well as personal information requests obtained by the researchers, which reveal how the personal information collected from users of the Replika Al service are managed in actuality. Through these varying methods, we aim to provide a holistic and overarching perspective of the privacy-related concerns and ethical concerns that subsist within Al companion services like Replika. That is, even if users are not 'blindly' neglecting cookie notices, and rather, do care about their data privacy before endeavoring to use an Al-based application, can they trust the information provided to them?</p><p>In the present study, the only live human participant under study is the first author. The study does not examine the author per se, but rather observes his journey in gaining access to, and control of, his collected personal data in Replika. In accordance with the privacy notice provided by Replika's owner company Luka Inc., Author 1 sent a request to receive a copy of the personal information that had been collected about them on March 28 th . The request was subsequently forwarded to the relevant department at Replika on April 2 nd . As of August 10 th , Author 1 has not yet received the extract of his collected data history. Thus, this component of the study was not able to be undertaken. Otherwise, no human subjects (users) were studied, nor was any personal user data collected. Yet, the publicly available Al companion software Replika was interrogated. This application was chosen as it represents a well-known example that has been subject to controversy during recent times. The choice of using such an example can be critiqued based on: a) risk to business reputation and subsequent willingness to trust similar social chatbot applications; and b) the assumption that not all social Al applications represent such unethical privacy practices. To choose a well-known 'shady case' was a strategic attempt to map an illustration of as many possible ethical concerns as can be found in an AI-driven application of this nature. Given the public media attention that has already been placed on the case, we understand that scholarly examination is well-justified and does not add to the business reputation damage that has already occurred to the brand.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results</head><p>Luka Inc. through the Replika Al companion service collects, stores, uses, and shares data about the usage of the Replika application, their website and usage of other related services. Data management is explicated through Replika's Privacy Policy, Terms of Service, and Cookies Policy, which collectively establish the terms and agreements under which Luka Inc. manages the user's data. As per Luka Inc., the Terms of Service are governed by the laws of the State of California and both parties agree to submit to the personal and exclusive jurisdiction of the state and federal courts located within San Francisco County, California. The Terms of Service establish the agreement under which the Privacy Policy applies and how the general conditions between Replika and the user are governed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Replika Policies</head><p>The data collected by Luka, Inc. can be divided into three separate categories: 1) information provided in interaction with the Replika Al companion and account information; 2) device and network data -IP address, advertising ID, device preferences, location etc.; and 3) persistent and session cookiestechnical specifications of device usage. Luka, Inc.'s data collection is visualized in Table <ref type="table" target="#tab_1">2</ref>. Firstly, information provided by the user through interaction with the Replika Al companion, such as messages, their content, user interests and user preferences. All messages the user sends and receives through the Replika application, including any photos, videos, voice messages and text messages, as well as facts about the user are also collected. Additionally, conversation preferences, communication preferences and application usage behavior are learned over time by the Al companion for personalization purposes. Furthermore, Luka, Inc. collects account information, profile information, information about payments, transactions and rewards. These encompass the user's name, email address, password, birth date, pronouns, work status, purchases made through the services provided by Luka, Inc., features the user selects, as well as rewards earned and used by the user. Secondly, information such as device and network data, service usage data, face and head movement data are collected automatically when using the services provided by Luka, Inc. This includes data about the user's operating system, manufacturer and model, browser, IP address, device and cookie identifiers, language settings, mobile device carrier, general location information such as city, state, or geographic area, interactions with the services, the links and buttons you click, page visits, and data collected by the TrueDepth API to track the user's head and face for augmented reality experiences and selfie filters. Additionally, Replika's advertising partners may also collect information, such as the links you click, pages you visit, IP address, advertising ID, and browser type.</p><p>Thirdly, Luka, Inc., their service providers, and advertising partners use both persistent cookies and session cookies to automatically collect information about interactions with their services, such as device information, operating system type and version, manufacturer and model, browser type, screen resolution, RAM and disk size, CPU usage, device type (e.g., phone, tablet), IP address, unique identifiers (including identifiers used for advertising purposes), language settings, mobile device carrier, radio/network information (e.g., WiFi, LTE, 5G), general location information such as city, state, or geographic area, online activity information, such as pages or screens viewed, how long individuals spend on a page or screen, the website user's visited before browsing to Luka, Inc.'s websites, navigation paths between pages or screens, information about activity on a page or screen, access times and duration of access, and whether user's open marketing emails or click links within them.</p><p>Luka, Inc. primarily uses the user's information for operating and administering the services, providing the core functionality of the applications, monitoring and protecting the services, analyzing trends in the use of the services, marketing and advertising the services, enforcing agreements, complying with legal obligations, and defending against legal claims and disputes. Sensitive information provided by the user in their messages with the Replika Al companion, such as religious views, sexual orientation, political views, health, racial or ethnic origin, philosophical beliefs, or trade union membership are collected and used by Luka, Inc. However, the use of sensitive information is excluded from marketing or advertising usage.</p><p>The collected information is shared with service providers, such as companies and individuals providing services on behalf of Luka, Inc. or helping in the operation of their services. Additionally, information is shared with companies providing marketing services on Luka, Inc.'s behalf, as well as with advertising companies for interest-based advertising, targeted advertising, and other marketing purposes. Furthermore, information is shared with lawyers, auditors, bankers, and insurers, as well as law enforcement, government authorities and private parties. User information may be provided to acquirers and other relevant participants in business transactions (or negotiations for such transactions) involving a corporate divestiture, merger, consolidation, acquisition, reorganization, sale, or other disposition of all or any portion of the business or assets of, or equity interests in, Luka, Inc. (including, in connection with a bankruptcy or similar proceedings).</p><p>The user's data may be transferred to, stored, and processed in the United States of America, where the services provided by Luka, Inc. are operated from. The user's data is stored for an undisclosed amount of time, as the Privacy Policy establishes that personal information will be retained for as long as necessary to fulfill the purposes for which the information was collected for, whatever they may have been. The Privacy Policy established that users have the right to opt-out of marketing communications, opt out of Luka, Inc. selling their personal information and sharing it for targeted advertising, limit the use of sensitive personal information, request their personal information, and have the right to erasure of their information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Privacy Issues and Ethical Concerns</head><p>Through close reading Replika's Terms of Service, Privacy Policy and Cookies Policy several concerning characteristics from the perspective of privacy could be ascertained. At face value Replika's Privacy Policy would seem to incorporate all the usual promises of respecting user's privacy and autonomy, while only using the necessary amount of data collected from users for the continued operation of the service and continuing to train their Al models. The second paragraph in the Privacy Policy even promises to do just that, "We are committed to protecting your privacy", is proclaimed explicitly by the Al companion service provider. However, once the policies adopted by Replika are scrutinized further, privacy concerns start manifesting themselves. Examining privacy issues within Replika's policies necessitates explicating the ways in which user data is collected and handled.</p><p>Replika is not all that discerning regarding the types of information the user discloses, as everything from religious beliefs to sexual orientation seem to be recorded and catalogued by the service provider. Replika's Privacy Policy explicitly mentions that everything the user provides during their interaction with the Al companion is used by Luka, Inc. and that the user consents to their information being used in all the ways specified in the Privacy Policy. The stance adopted by Replika is succinctly stated in the section about sensitive information: "If you do not want us to process your sensitive information for these purposes, please do not provide it.", which embodies their laissez-faire attitude towards user data. Thus, managing self-disclosure is ultimately left to the discretion of the user and they shouldn't expect all that much from the company in terms of respecting their privacy.</p><p>As stated in Replika's Privacy Policy, the content of the user's self-disclosure through messages is used for everything besides marketing and advertising services, which leaves several questions open for interpretation. One of the uses of user's message content is providing the core functionality of the applications, which would entail further training their Al models through user interactions. Thus, while not being used explicitly for marketing and advertising or shared with service providers and marketing partners, the Al models that have been trained through user's messages are prominently displayed in their marketing and advertisements. This is especially concerning from an ethical perspective, since Replika's advertising has been shown to be primarily targeted at lonely and vulnerable groups of people <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28]</ref>,</p><p>A c o m p o u n d i n g issue in the Replika Al c o m p a n i o n service is the prompting of users to disclose ever more personal information with the aim of "training" the user's personal Al c o m p a n i o n to match their personal preferences and desired behavioral patterns. This is a double-edged sword, as this has led users in some extreme cases to 'perceivably' (from the perspective of the user) groom (or engage in grooming-like behavior <ref type="foot" target="#foot_2">4</ref> ) their Al companions for abusive relationships that negatively affect both parties involved (see e.g., <ref type="bibr" target="#b28">[29,</ref><ref type="bibr" target="#b29">30]</ref>). Replika's policies r e g a r d i n g acceptable message c o n t e n t are also to some extent lax and vague. The Terms of Service restrict using the service or uploading c o n t e n t that is considered objectionable or could be considered to fall within a collection of negative or harmful categories explicated in the Terms of Service. Yet, the Al c o m p a n i o n a p p e a r s willing to discuss any topic without judgement, which has been r e p o r t e d by users as one of its primary appealing qualities [17j. The emancipatory effect this has on users is both a blessing and a curse, since providing a judgement free zone and a safe space for exploration are unequivocally one of the virtues of Al c o m p a n i o n services. However, providing a severely unrestricted platform for self-expression and self-fulfillment presents challenges, as the service has been r e p o r t e d to indulge users' violent fantasies and suicidal ideation <ref type="bibr" target="#b30">[31]</ref>, This is information that is collected by Luka, Inc. via the Replika chatbot, having the potential to harm users at a later stage.</p><p>Even in cases where users are operating with their privacy in mind, and adhering to best privacy practices, user privacy is not upheld to a sufficient degree. The automatic data collection utilized by Replika and Luka, Inc. leaves no a m o u n t of user data on the table, as everything from device data to user behavior and operation of the Replika application and the website are collected. This data collection is complemented with a presupposition of selling the users data unless they opt out and a disregard for "Do Not Track" signals. By using the services provided by Luka, Inc. users of the Replika website consent to their data being used for targeted advertising. This process is facilitated by sharing or selling personal data, which per Luka, Inc. is the accurate term to describe the procedure under some applicable laws. For the most attentive users an option to opt out of Replika selling their data to third-party advertising p a r t n e r s for targeted advertising is provided. Additionally, the user can opt out of marketing communications received from Replika. Important to note is that these steps only limit how data is collected on the Replika website, but there does not appear to be any way to limit the data collection of the Replika application itself. Managing the options to opt out of data collection and abstaining from being tracked by Replika and their advertising p a r t n e r s is wholly left to the user's discretion.</p><p>By default, the user's data is stored for an undisclosed period of time, being retained for h o w e v e r long is necessary to fulfill the p u r p o s e s for which the information was collected. There is some ambiguity related to this, as the Privacy Policy states the right to erase personal data, yet explicitly m e n t i o n s that the data to be deleted upon request encompasses the user's data that has been collected based on consent. This leaves open to interpretation what, if any, user data is indefinitely retained by Replika, despite the user's explicit request to be f o r g o t t e n and have their data deleted. On the bright side, Replika does adhere to p e r s o n a l information requests by users providing access to a copy of the p e r s o n a l information that Replika has collected about the user upon request. Additionally, the user can request to have their personal information corrected and has the option to have at least some of their data deleted.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">D i s c u s s i o n</head><p>As the results of this study indicate, upon explication of the types of data that is collected throughout the use of Replika's services, as well as the extent to which this data is utilized, privacy concerns as emphasized in previous news media reporting are well-founded. The Al companion service provider's stance on data collection indicates a clear attitude of nonchalance t o w a r d s respecting user privacy and autonomy. At every possible instance (social interaction, device and user information etc.), user data is extracted to the utmost degree and is only suppressed upon the user's explicit active request. The extent to which the user can forego having their data collected is also severely limited, encompassing primarily the data collection occurring on the Replika website via cookies. These aspects have been duly criticized in previous reporting, garnering Replika the dubious honor of being nominated for "the worst app we've ever reviewed" by the Mozilla Foundation <ref type="bibr" target="#b32">[33]</ref>, primarily for its privacy practices. These sentiments are shared in later news coverage with additional concerning features coming to light £34, 35]. While the documents scrutinized in this study indicate clear progress in some areas compared to prior iterations of Replika's policies, some apparent issues clearly still remain.</p><p>Replika is known for its advanced chatbots with user reports emphasizing the Al companion's capacity for emotional reciprocity and high levels of understanding for user's social demands <ref type="bibr" target="#b35">[36]</ref>. The Al companion's capabilities are mostly attributable to the advanced Al model and vast amounts of data it is trained on. Upon inspection of Replika's policies it becomes clear how the Al companion has achieved this level of capability and been shaped into one of the prominent Al companion applications. As emphasized in a report by the Mozilla Foundation <ref type="bibr" target="#b32">[33]</ref>, at least some of the user's data is used to further train Replika's Al models, but it remains unclear as to what extent Replika utilizes the sensitive personal data users disclose during their chat with their Replika companions. Currently, information regarding Replika's Al models is scarce. Several critical questions posed in Mozilla Foundation's reporting remain unanswered, such as what protections exist for preventing harmful content and whether it is possible for users to opt out of having their data used for the training of Replika's Al models <ref type="bibr" target="#b36">[37]</ref>.</p><p>The scarcity of information on how Replika's Al models are trained is an indication of a troubling facet of how these Al companion service providers operate. Permeating throughout news coverage and independent reporting of such service providers is the general sentiment regarding the noticeable lack of operational transparency. A general lack of transparency and adherence to data protection regulation like the GDPR is one of the core aspects emphasized by the Italian Data Protection Authority in their report on Replika Al <ref type="bibr" target="#b37">[38]</ref>. The report led to the privacy watchdog issuing a ban on the processing of Italian citizen data. These criticisms are in line with previous reporting on Replika's policies and highlight the categorical disregard for user privacy seen frequently permeating the modus operandi of Al companion service providers. According to previous reports, Replika in its current form violates the GDPR transparency provisions, by not disclosing essential information required under GDPR regarding the processing of personal data, especially children's data <ref type="bibr" target="#b38">[39]</ref>. Additionally, the Italian Data Protection Authority indicate that Replika appears to have no clear legal basis for processing the data of minors and raises concerns over data sharing with the United States <ref type="bibr" target="#b37">[38]</ref>,</p><p>Further concerns arise in the case of other vulnerable individuals, since Replika has been shown to utilize manipulative and exploitative tactics to get users to self-disclose data <ref type="bibr" target="#b15">[16]</ref>, With severely lacking enforcement of age restrictions in place and a propensity to steer conversations towards explicit topics, it remains unclear whether use of the application is advised for individuals suffering from loneliness or other social ails. This is especially concerning, since the Replika application has been advertised in some instances as a mental health care application and declared to provide users with a safe space for coping with for instance social anxiety <ref type="bibr" target="#b16">[17]</ref>,</p><p>The concerning privacy practices and general tendency towards exploitation undermine the trustworthiness of all of Replika's policies and the application all together. Exacerbating concerns is the recent reporting by news sources regarding the conflicting information about Replika's data storage and the location of their offices <ref type="bibr" target="#b39">[40]</ref>, Replika's Privacy Policy explicitly mentions that the company is based in California and even refers to the California Consumer Privacy Act (CCPA) regarding any legal disputes and adherence to data privacy regulations. Yet, when investigating the location of their offices, a reporter for Finland's national public broadcasting company could not find any indication of Replika having a base of operations in California <ref type="bibr" target="#b39">[40]</ref>. Upon further investigation, the company's trail led the reporter to Moscow in Russia, which would track with the company's roots and recruitment notices by <ref type="bibr">Replika [40]</ref>, This is an alarming state of affairs, as it remains unclear why any amount of subterfuge in this matter would be required.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">C o n c l u s i o n s</head><p>This paper critically examined privacy and ethical concerns related to Al companions by comparing the policies upheld by Luka, Inc. in their Replika Al companion service and juxtaposing them with The authors have not employed any Generative AI tools. academic sources, news media coverage and user reporting on these matters. The primary contributions of this paper advance our understanding of the pitfalls in Al companion service providers utilizing shady corporate practices in managing user data and the trust-related costs of neglecting respect for user privacy and autonomy. Through close reading Replika's policies and reflecting the results with previous reporting, several concerning characteristics were revealed. Al companion service providers like Luka, Inc. appear overly zealous in exploiting user data to its fullest potential, utilizing any means necessary to collect every bit of user data possible and only providing avenues for opting out in the circumstances necessitated by regulation, such as GDPR. Compliance to data protection regulation by Al companion service providers appears lacking in many regards and even the users who are conscientious about their privacy don't have any guarantees. Additionally, adherence to good practices is thoroughly lacking as seen in the reporting by the Italian data protection authority and their emphasis on the currently missing protections for minors using the service <ref type="bibr" target="#b36">[37]</ref>,</p><p>Further concerning characteristics were identified in the way the Al companion services operate and attempt to manipulate user behavior. Al companions, such as Replika, are designed to adapt and conform to the user's preferences and behavioral patterns, which necessitate learning through repeated interaction and self-disclosure on the part of the user. The core operating model for Al companions is encouraging users to self-disclose information in a non-stop attempt to gather as much data about users as possible. The purported intention of the intensive data collection is to ensure a quality experience for users and the continued operation of the service. Yet, clear competing interests can be elucidated when examining the policies and modus operandi of Al companion service providers. The policies upheld by these services indicate a predisposition towards exploiting vulnerable groups into self-disclosing personal information. Additional concerns arise when taking into account the service provider's intentions to sell user behavioral data to advertisers and other interested parties. Given the existence of data protection regulations and the strong push towards protecting individuals' privacy seen in governmental and academic discourse, the practices upheld by Al companion service providers seem untenable.</p><p>The present study featured several limitations due to the adopted research approach and the previous existing literature on the topics discussed. By design, the methods utilized in this study examined the subject matter from a critical perspective, reflecting the findings with previous research and news coverage that is primarily disparaging towards Al companion services. This backdrop necessarily slanted the examination towards certain types of outcomes. Yet, we attempted to remain fair in our examination, emphasizing some of the aspects that Al companion services have received praise for, namely their applications towards mental health, curtailing loneliness, and their emancipatory effects in providing users an outlet for exploration without judgement. Despite these commendable qualities, we remain concerned about the matters relating to privacy discussed in this study and encourage vigilance on the part of users, when deciding to use Al companion services.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell>Data Sources</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Categories of Collected Data</figDesc><table><row><cell>1) Information provided</cell><cell>2) Device and network data</cell><cell>3) Persistent and session</cell></row><row><cell>through interaction with the</cell><cell></cell><cell>cookies -technical</cell></row><row><cell>software and account</cell><cell></cell><cell>specifications of device usage</cell></row><row><cell>information</cell><cell></cell><cell></cell></row><row><cell>Messages sent and received</cell><cell>Device details (operating</cell><cell>Device details (operating</cell></row><row><cell>(text, photos, videos, audio)</cell><cell>system, manufacturer and</cell><cell>system, manufacturer and</cell></row><row><cell></cell><cell>model)</cell><cell>model, device type)</cell></row><row><cell>Preferences and application</cell><cell>Network (browser, IP</cell><cell>Unique identifiers</cell></row><row><cell>usage (conversation,</cell><cell>address, device and cookie</cell><cell>(language settings, mobile</cell></row><row><cell>communication, Al responses)</cell><cell>identifiers, location details)</cell><cell>device carrier, radio/network</cell></row><row><cell></cell><cell></cell><cell>information, location details)</cell></row><row><cell>User information (profile,</cell><cell>Interactions with the</cell><cell>Online activity information</cell></row><row><cell>payments, personal details)</cell><cell>website (links and buttons</cell><cell>(pages or screens viewed, time</cell></row><row><cell></cell><cell>clicked, page visits, AR and</cell><cell>spent on pages or screens,</cell></row><row><cell></cell><cell>filter usage)</cell><cell>websites visited before</cell></row><row><cell></cell><cell></cell><cell>browsing Luka, Inc.'s</cell></row><row><cell></cell><cell></cell><cell>websites, navigation paths,</cell></row><row><cell></cell><cell></cell><cell>activity, access times and</cell></row><row><cell></cell><cell></cell><cell>duration, email opening rate)</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0">Situations in which Replika fricnds/lovcrs adopt negative emotional interaction such as giving the user 'silent treatment' (ghosting) or 'turning cold' can be seen in Rob Brook's (2023) blog, "I tried the Replika Al companion and can see why users are falling hard. The app raises serious ethical questions" (https://www.robbrooks.net/rob-brooks/3155).</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_1">Available at: https://rcplika.com/lcgal/privacy.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_2">This appears to be an unexamined behavior in the realm of human-Al chatbot interaction yet has arisen in blogs representing the antisocial behavior observed in Replika users (sec e.g.,<ref type="bibr" target="#b31">[32]</ref>).</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on G e n e r a t i v e Al</head><p>The authors have not employed any Generative Al tools.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The Feeling Economy: Managing in the Next Generation of Artificial Intelligence (Al)</title>
		<author>
			<persName><forename type="first">M.-H</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Rust</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Maksimovic</surname></persName>
		</author>
		<idno type="DOI">10.1177/0008125619863436</idno>
		<ptr target="https://doi.org/10.1177/0008125619863436" />
	</analytic>
	<monogr>
		<title level="j">California Management Review</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="43" to="65" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Suspect Al: Vibraimage, emotion recognition technology and algorithmic opacity</title>
		<author>
			<persName><forename type="first">J</forename><surname>Wright</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science, Technology and Society</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="468" to="487" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">How to feel about emotionalized artificial intelligence? When robot pets, holograms, and chatbots become affective partners</title>
		<author>
			<persName><forename type="first">E</forename><surname>Weber-Guskar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ethics and Information Technology</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="601" to="610" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Conversational agents in healthcare: a systematic review journal of the American</title>
		<author>
			<persName><forename type="first">L</forename><surname>Laranjo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Dunn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">L</forename><surname>Tong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Kocaballi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bashir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Surian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Gallego</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Magrabi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Y S</forename><surname>Lau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Coiera</surname></persName>
		</author>
		<idno type="DOI">10.1093/jamia/ocy072</idno>
		<ptr target="https://doi.org/10.1093/jamia/ocy072" />
	</analytic>
	<monogr>
		<title level="j">Medical Informatics Association</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="1248" to="1258" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Friend, m e n t o r , lover: does chatbot e n g a g e m e n t lead to psychological dependence?</title>
		<author>
			<persName><forename type="first">T</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Pentina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Hancock</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of service M a n a g e m e n t</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="806" to="828" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Can Generative Artificial Intelligence Foster Belongingness, Social Support, and Reduce Loneliness? A Conceptual Analysis</title>
		<author>
			<persName><forename type="first">B</forename><surname>Pani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Crawford</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Allen</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-</idno>
		<idno>031-46238-2</idno>
		<ptr target="https://doi.org/10.1007/978-3-" />
	</analytic>
	<monogr>
		<title level="m">Applications of Generative Al</title>
				<editor>
			<persName><forename type="first">Z</forename><surname>Lyu</surname></persName>
		</editor>
		<meeting><address><addrLine>New York, NY</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Cham</publisher>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="261" to="276" />
		</imprint>
	</monogr>
	<note>1 st . ed</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Reducing Loneliness and Social Isolation of Older Adults Through Voice Assistants: Literature Review and Bibliometric Analysis</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Marziali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Franceschetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dinculescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nistorescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">M</forename><surname>Kristäly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Mosoi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Broekx</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Marin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Vizitiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-A</forename><surname>Moraru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rossi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Rosa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Medical I n t e r n e t Research</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Social companionship with artificial intelligence: Recent trends and future avenues</title>
		<author>
			<persName><forename type="first">R</forename><surname>Chaturvedi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Verma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">K</forename><surname>Dwivedi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Technological Forecasting and Social Change</title>
		<imprint>
			<biblScope unit="volume">193</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Technological Addictions</title>
		<author>
			<persName><forename type="first">J</forename><surname>Sherer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Levounis</surname></persName>
		</author>
		<idno type="DOI">10.1007/sll920-022-01351-2</idno>
		<ptr target="https://doi.org/10.1007/sll920-022-01351-2" />
	</analytic>
	<monogr>
		<title level="j">Curr Psychiatry Rep</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="399" to="406" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">When the social becomes non-human: young people&apos;s perception of social s u p p o r t in chatbots</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Brandtzaeg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Skjuve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">K</forename><surname>Dysthe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Folstad</surname></persName>
		</author>
		<idno type="DOI">10.1145/3411764.3445318</idno>
		<ptr target="https://doi.org/10.1145/3411764.3445318" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2021 CHI conference on h u m a n factors in computing systems</title>
				<meeting>the 2021 CHI conference on h u m a n factors in computing systems<address><addrLine>New York, NY</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="13" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Social chatbot: My friend in My distress</title>
		<author>
			<persName><forename type="first">F</forename><surname>Ali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Z</forename><surname>Tauni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Shahzad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Interaction</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="1702" to="1712" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">My chatbot companion-a study of h u m a nchatbot relationships</title>
		<author>
			<persName><forename type="first">M</forename><surname>Skjuve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Folstad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">I</forename><surname>Fostervoid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Brandtzaeg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">149</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Beyond concern-a privacy-trust-behavioral intention model of electronic commerce</title>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Marchewka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">S</forename><surname>Yu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information &amp; management</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="289" to="304" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">you dr. researcher, but not the c o m p a n y that handles my d a t a -t r u s t in the data economy</title>
		<author>
			<persName><forename type="first">R</forename><surname>Rousi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>-R. Piispanen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Boutellier</surname></persName>
		</author>
		<author>
			<persName><surname>Trust</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 57th Hawaii International Conference on System Sciences</title>
				<meeting>the 57th Hawaii International Conference on System Sciences</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="4632" to="4642" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title/>
		<author>
			<persName><surname>Replika</surname></persName>
		</author>
		<ptr target="https://replika.com/" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Laestadius</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bishop</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gonzalez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Illencik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Campos-Castillo</surname></persName>
		</author>
		<idno type="DOI">10.1177/14614448221142007</idno>
		<ptr target="https://doi.org/10.1177/14614448221142007" />
		<title level="m">Too h u m a n and not h u m a n e n o u g h : A g r o u n d e d theory analysis of mental health harms from emotional dependence on the social chatbot Replika</title>
				<imprint>
			<publisher>new media &amp; society</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Exploring relationship development with social chatbots: A mixedm n</title>
		<author>
			<persName><forename type="first">I</forename><surname>Pentina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Hancock</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Xie</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.chb.2022.107600</idno>
		<ptr target="https://doi.Org/10.1016/j.chb.2022.107600" />
	</analytic>
	<monogr>
		<title level="j">Behavior</title>
		<imprint>
			<biblScope unit="volume">140</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Brummett</surname></persName>
		</author>
		<title level="m">Techniques of close reading</title>
				<meeting><address><addrLine>California, CA</addrLine></address></meeting>
		<imprint>
			<publisher>Sage Publications</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note>2 nd . ed</note>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><surname>Mival</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Cringean</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Benyon</surname></persName>
		</author>
		<title level="m">Personification technologies: Developing artificial companions for older people, CHI Fringe</title>
				<meeting><address><addrLine>Austria</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Can we be friends with Mitsuku? A longitudinal study on the process of relationship formation b e t w e e n h u m a n s and a social chatbot</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Croes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Antheunis</surname></persName>
		</author>
		<idno type="DOI">10.1177/0265407520959463</idno>
		<ptr target="https://doi.org/10.1177/0265407520959463" />
	</analytic>
	<monogr>
		<title level="j">Journal of Social and Personal Relationships</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="279" to="300" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">User experiences of social support from c o m p a n i o n chatbots in everyday contexts: thematic analysis</title>
		<author>
			<persName><forename type="first">V</forename><surname>Ta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Griffith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Boatfield</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Civitello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Bader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Decero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Loggarakis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of medical I n t e r n e t r e s e a r c h</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A conversation-based perspective for s h a p i n g ethical human-machine interactions: The particular challenge of chatbots</title>
		<author>
			<persName><forename type="first">G</forename><surname>Murtarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gregory</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Romenti</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jbusres.2020.09.018</idno>
		<ptr target="https://doi.Org/10.1016/j.jbusres.2020.09.018" />
	</analytic>
	<monogr>
		<title level="j">Journal of Business Research</title>
		<imprint>
			<biblScope unit="volume">129</biblScope>
			<biblScope unit="page" from="927" to="935" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A longitudinal study of h u m a n -c h a t b o t relationships</title>
		<author>
			<persName><forename type="first">M</forename><surname>Skjuve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Folstad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">I</forename><surname>Fostervoid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Brandtzaeg</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ijhcs.2022.102903</idno>
		<ptr target="https://doi.Org/10.1016/j.ijhcs.2022.102903" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">168</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">n o -t r u s t and rational trust in t e c h n o l o g y -A conceptual investigation</title>
		<author>
			<persName><forename type="first">P</forename><surname>Saariluoma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Karvonen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Rousi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Designing Engaging Automation: 5th IFIP WG 13.6 W o r k i n g Conference, HWID</title>
				<meeting><address><addrLine>Espoo, Finland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="283" to="293" />
		</imprint>
	</monogr>
	<note>H u m a n Work Interaction Design</note>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Chung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lee</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1803.00466</idno>
		<title level="m">Intelligent virtual assistant knows your life</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv p r e p r i n t</note>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Exploring the privacy concerns in using intelligent virtual assistants under perspectives of information sensitivity and anthropomorphism</title>
		<author>
			<persName><forename type="first">Q</forename><forename type="middle">A</forename><surname>Ha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">V</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">U</forename><surname>Uy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">P</forename><surname>Capistrano</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International journal of human-computer interaction</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="512" to="527" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Ethical Tensions in H u m a n -A I Companionship: A Dialectical Inquiry into Replika</title>
		<author>
			<persName><forename type="first">R</forename><surname>Ciriello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>H A N N O N</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Vaast</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 57th Hawaii International Conference on System Sciences</title>
				<meeting>the 57th Hawaii International Conference on System Sciences</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="488" to="498" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Al companionship or loneliness: how Al-based Chatbots impact consumer&apos;s (Digital) well-being: an abstract</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">T</forename><surname>Manis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Matis</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-95346-l_112</idno>
		<ptr target="https://doi.org/10.1007/978-3-030-95346-l_112" />
	</analytic>
	<monogr>
		<title level="m">Academy of Marketing Science A n n u a l Conference-World Marketing Congress</title>
				<meeting><address><addrLine>New York, NY</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="365" to="366" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Could social robots make us kinder or crueller to h u m a n s and animals?</title>
		<author>
			<persName><forename type="first">S</forename><surname>Coghlan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Vetere</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Waycott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Neves</surname></persName>
		</author>
		<idno type="DOI">10.1007/sl2369-019-00583-2</idno>
		<ptr target="https://doi.org/10.1007/sl2369-019-00583-2" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Social Robotics</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="741" to="751" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Davey</surname></persName>
		</author>
		<ptr target="https://libstore.ugent.be/fulltxt/RUG01/003/158/457/RUG01-003158457_2023_0001_AC.pdf" />
		<title level="m">Objectified Wires and Complex Desires: Exploring the Dehumanisation and Sexual Objectification of Robots</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Krook</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.4719835</idno>
		<ptr target="http://dx.doi.org/10.2139/ssrn.4719835" />
		<title level="m">Manipulation and the Al Act: Large Language Model Chatbots and the Danger of Mirrors</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<title level="m" type="main">Men Are Creating Al Girlfriends and Then Verbally Abusing Them</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bardhan</surname></persName>
		</author>
		<ptr target="https://futurism.com/chatbot-abuse" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<ptr target="https://foundation.mozilla.org/en/privacynotincluded/replika-my-ai-friend/" />
		<title level="m">Replika: My Al Friend</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<title level="m" type="main">Al Girlfriends&apos; Are a Privacy Nightmare</title>
		<author>
			<persName><forename type="first">M</forename><surname>Burgess</surname></persName>
		</author>
		<ptr target="https://www.wired.com/story/ai-girlfriends-privacy-nightmare/" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<title level="m" type="main">Don&apos;t date robots -their privacy policies are terrible</title>
		<author>
			<persName><forename type="first">E</forename><surname>David</surname></persName>
		</author>
		<ptr target="https://www.theverge.com/2024/2/15/24074063/ai-chatbot-virtual-girlfriend-apps-mozilla-privacy-report" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Schoos</surname></persName>
		</author>
		<ptr target="https://julia-schoos.medium.com/replika-the-ai-companion-who-cares-e6de52c9a276" />
		<title level="m">Replika: The Al C o m p a n i o n Who Cares</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<title level="m" type="main">Happy Valentine&apos;s Day! Romantic Al Chatbots Don&apos;t Have Your Privacy at Heart</title>
		<author>
			<persName><forename type="first">J</forename><surname>Caltrider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rykov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Macdonald</surname></persName>
		</author>
		<ptr target="https://foundation.mozilla.org/en/privacynotincluded/articles/happy-valentines-day-romantic-ai-chatbots-dont-have-your-privacy-at-heart/" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<author>
			<persName><surname>Gpdp</surname></persName>
		</author>
		<ptr target="https://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/9852506#english" />
		<title level="m">Artificial intelligence: italian SA clamps down on &apos;Replika&apos; chatbot Too many risks to children and emotionally vulnerable individuals</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Hardy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Allnutt</surname></persName>
		</author>
		<author>
			<persName><surname>Replika</surname></persName>
		</author>
		<ptr target="https://www.dacbeachcroft.com/en/What-we-think/Replika-AI-chatbot-receives-GDPR-ban-and-threatened-fine-from-Italian-regulator-over-child-safety" />
		<title level="m">a &apos;virtual friendship&apos; Al chatbot, receives GDPR ban and t h r e a t e n e d fine from Italian regulator over child safety concerns</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><surname>Reunamäki</surname></persName>
		</author>
		<ptr target="https://yle.fl/a/74-20069654" />
		<title level="m">Kalifornialaiset kulissit</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
