Article published In:
Social Cues in Robot Interaction, Trust and Acceptance
Edited by Alessandra Rossi, Kheng Lee Koay, Silvia Moros, Patrick Holthaus and Marcus Scheunemann
[Interaction Studies 20:3] 2019
► pp. 509529
References (33)
References
Alaiad, A., & Zhou, L. (2014). The determinants of home healthcare robots adoption: An empirical investigation. International journal of medical informatics, 83(11), 825–840. DOI logoGoogle Scholar
Broadbent, E., Stafford, R., & MacDonald, B. (2009). Acceptance of healthcare robots for the older population: Review and future directions. International Journal of Social Robotics, 1 (4), 319. DOI logoGoogle Scholar
Butler, D. J., Huang, J., Roesner, F., & Cakmak, M. (2015). The privacy-utility tradeoff for remotely teleoperated robots. In Proceedings of the tenth annual ACM/IEEE international conference on human-robot interaction (pp. 27–34). ACM.Google Scholar
Caine, K., Šabanovic, S., & Carter, M. (2012). The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults, 343–350. DOI logoGoogle Scholar
Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z., Hazlewood, W. R., Camp, L. J., Connelly, K. H., … Shankar, K. (2011). Digiswitch: A device to allow older adults to monitor and direct the collection and transmission of health information collected at home. Journal of medical systems, 35(5), 1181–1195. DOI logoGoogle Scholar
Cavoukian, A., et al. (2009). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada, 51. DOI logoGoogle Scholar
Cerrudo, C., & Apa, L. (2017). Hacking robots before skynet. IO Active Website.Google Scholar
Denning, T., Matuszek, C., Koscher, K., Smith, J. R., & Kohno, T. (2009). A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceedings of the 11th international conference on ubiquitous computing (pp. 105–114). ACM. DOI logoGoogle Scholar
Finn, R. L., Wright, D., & Friedewald, M. (2013). Seven types of privacy. In European data protection: coming of age (pp. 3–32). Springer. DOI logoGoogle Scholar
Gould, J. D., & Lewis, C. (1985). Designing for usability: key principles and what designers think. Communications of the ACM, 28(3), 300–311. DOI logoGoogle Scholar
Grönvall, E., & Kyng, M. (2013). On participatory design of home-based healthcare. Cognition, technology & work, 15(4), 389–401. DOI logoGoogle Scholar
Hansen, M., Jensen, M., & Rost, M. (2015). Protection goals for privacy engineering. In Security and privacy workshops (spw), 2015 IEEE (pp. 159–166). IEEE. DOI logoGoogle Scholar
Heuer, T., Schiering, I., & Gerndt, R. (2019). Me and my robot – sharing information with a new friend. In Privacy and identity management. fairness, accountability and transparency in the age of big data. ifip advances in information and communication technology. Springer (to appear). DOI logoGoogle Scholar
Hong, J. I., Ng, J. D., Lederer, S., & Landay, J. A. (2004). Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In Proceedings of the 5th conference on designing interactive systems: processes, practices, methods, and techniques (pp. 91–100). ACM.Google Scholar
Hubers, A., Andrulis, E., Scott, W. D., Scott, L., Stirrat, T., Tran, D., … Grimm, C. (2015). Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems. Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction Extended Abstracts – HRI’15 Extended Abstracts, 59–60. Retrieved from [URL] DOI logo
Iachello, G., & Hong, J. (2007). End-User Privacy in Human-Computer Interaction. Foundations and Trends® in Human-Computer Interaction, 1 (1), 1–137. Retrieved from [URL] DOI logo
International Federation of Robotics. (2018). Executive summary world robotics 2018 service robots. Retrieved from [URL]
Jana, S., Narayanan, A., & Shmatikov, V. (2013). A scanner darkly: Protecting user privacy from perceptual applications. Proceedings – IEEE Symposium on Security and Privacy, 349–363. DOI logoGoogle Scholar
Kitahara, I., Kogure, K., & Hagita, N. (2004). Stealth vision for protecting privacy. Proceedings – International Conference on Pattern Recognition, 41, 404–407. DOI logoGoogle Scholar
Lee, H. R., Šabanović, S., Chang, W.-L., Nagata, S., Piatt, J., Bennett, C., & Hakken, D. (2017). Steps toward participatory design of social robots: Mutual learning with older adults with depression. In Proceedings of the 2017 ACM/IEEE international conference on human-robot interaction (pp. 244–253). ACM. DOI logoGoogle Scholar
Lee, M. K., Tang, K. P., Forlizzi, J., & Kiesler, S. (2011). Understanding Users’ Perception of Privacy in Human-Robot Interaction. HRI ’11 Proceedings of the 6th international conference on Human-robot interaction, 181–182. Retrieved from [URL] DOI logo
Leenes, R., Palmerini, E., Koops, B.-J., Bertolini, A., Salvini, P., & Lucivero, F. (2017). Regulatory challenges of robotics: some guidelines for addressing legal and ethical issues. Law, Innovation and Technology, 9(1), 1–44. DOI logoGoogle Scholar
Lera, F. J. R., Llamas, C. F., Guerrero, Á. M., & Olivera, V. M. (2017). Cybersecurity of robotics and autonomous systems: Privacy and safety. In Robotics-legal, ethical and socioeconomic impacts. In Tech.. DOI logoGoogle Scholar
Pagallo, U. (2013). Robots in the cloud with privacy: A new threat to data protection? Computer Law and Security Review, 29(5), 501–508. DOI logoGoogle Scholar
Raval, N., Srivastava, A., Lebeck, K., Cox, L., & Machanavajjhala, A. (2014). Markit: Privacy markers for protecting visual secrets. In Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing: Adjunct publication (pp. 1289–1295). ACM.Google Scholar
Regulation (eu) 2016/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (general data protection eegulation). (n.d.)., 1–88.
Šabanović, S., Chang, W.-L., Bennett, C. C., Piatt, J. A., & Hakken, D. (2015). A robot of my own: participatory design of socially assistive robots for independently living older adults diagnosed with depression. In International conference on human aspects of it for the aged population (pp. 104–114). Springer. DOI logoGoogle Scholar
Siljee, J. (2015). Privacy transparency patterns. In Proceedings of the 20th european conference on pattern languages of programs (pp. 52:1–52:11). New York, NY, USA: ACM. Retrieved from DOI logoGoogle Scholar
Solove, D. J. (2004). The digital person: Technology and privacy in the information age. NyU Press.Google Scholar
Syrdal, D. S., Walters, M. L., Otero, N., Koay, K. L., & Dautenhahn, K. (2007). He knows when you are sleeping-privacy and the personal robot companion. In Proc. workshop human implications of human-robot interaction, association for the advancement of artificial intelligence (aaai’07) (pp. 28–33).Google Scholar
Tobe, F. (2017). Robotics industry growing faster than expected. Retrieved from [URL]
Vargas, P. A., Ho, W. C., Lim, M., Enz, S., & Aylett, R. (2009). To forget or not to forget: towards a roboethical memory control. Killer Robots or Friendly Fridges: the Social Understanding of Artificial Intelligence, AISB, 91, 18–23.Google Scholar
Yong, S., Lindskog, D., Ruhl, R., & Zavarsky, P. (2011). Risk mitigation strategies for mobile wi-fi robot toys from online pedophiles. In Privacy, security, risk and trust (passat) and 2011 IEEE third inernational conference on social computing (socialcom), 2011 IEEE third international conference on (pp. 1220–1223). IEEE. DOI logoGoogle Scholar
Cited by (11)

Cited by 11 other publications

Jain, Pranut, Andrew Xu, Thomas Downes, Injung Kim, Talha Khan, Jacob T. Biehl & Adam J. Lee
2024. Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive Exposure. Proceedings of the ACM on Human-Computer Interaction 8:CSCW1  pp. 1 ff. DOI logo
Neumann, Paul, Sebastian Thomas Büttner, Luca Hernández Acosta, Delphine Reinhardt & Michael Prilla
2024. Proceedings of Mensch und Computer 2024,  pp. 448 ff. DOI logo
Song, Bo, Hongda Xu, Wenna Hu, Yi Li & Yingzhi Guo
2024. How to calculate privacy: privacy concerns and service robots’ use intention in hospitality. Current Issues in Tourism 27:21  pp. 3401 ff. DOI logo
Williams, Tom
2024. Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction,  pp. 46 ff. DOI logo
Ahtinen, Aino, Nasim Beheshtian & Kaisa Väänänen
2023. Proceedings of the 2023 ACM/IEEE International Conference on Human-Robot Interaction,  pp. 331 ff. DOI logo
Ahtinen, Aino, Aparajita Chowdhury, Valentina Ramírez Millan, Chia-Hsin Wu & Gayathri Menon
2023. International Conference on Human-Agent Interaction,  pp. 115 ff. DOI logo
Dietrich, Manuel, Matti Krüger & Thomas H. Weisswange
2023. What should a robot disclose about me? A study about privacy-appropriate behaviors for social robots. Frontiers in Robotics and AI 10 DOI logo
Heuer, Tanja & Ina Schiering
2022. Einsatz von Robotik als Assistive Technologie. In Assistive Technologien im Sozial- und Gesundheitssektor [Gesundheit. Politik - Gesellschaft - Wirtschaft, ],  pp. 29 ff. DOI logo
Song, Bo, Meng Zhang & Peipei Wu
2022. Driven by technology or sociality? Use intention of service robots in hospitality from the human–robot interaction perspective. International Journal of Hospitality Management 106  pp. 103278 ff. DOI logo
Heuer, Tanja, Ina Schiering & Reinhard Gerndt
2021. Privacy framework for context-aware robot development. Paladyn, Journal of Behavioral Robotics 12:1  pp. 468 ff. DOI logo
Reinhardt, Delphine, Monisha Khurana & Luca Hernández Acosta
2021. “I still need my privacy”: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots. Pervasive and Mobile Computing 74  pp. 101397 ff. DOI logo

This list is based on CrossRef data as of 18 october 2024. Please note that it may not be complete. Sources presented here have been supplied by the respective publishers. Any errors therein should be reported to them.