Social robots as companions play an increasingly important role in our everyday life. However, reaching the full
potential of social robots and the interaction between humans and robots requires permanent collection and processing of personal
data of users, e.g. video and audio data for image and speech recognition. In order to foster user acceptance, trust and to
address legal requirements as the General Data Protection Regulation of the EU, privacy needs to be integrated in the design
process of social robots. The Privacy by Design approach by Cavoukian indicates the relevance of a privacy-respecting development
and outlines seven abstract principle.
In this paper two methods as a hands-on guideline to fulfill the principles are presented and discussed in the
content of the Privacy by Design approach. Privacy risks of a typical robot scenario are identified, analyzed and solutions are
proposed on the basis of the seven types of privacy and the privacy protection goals.
Alaiad, A., & Zhou, L. (2014). The determinants of home healthcare robots adoption: An empirical investigation. International journal of medical informatics, 83(11), 825–840.
Broadbent, E., Stafford, R., & MacDonald, B. (2009). Acceptance of healthcare robots for the older population: Review and future directions. International Journal of Social Robotics, 1 (4), 319.
Butler, D. J., Huang, J., Roesner, F., & Cakmak, M. (2015). The privacy-utility tradeoff for remotely teleoperated robots. In Proceedings of the tenth annual ACM/IEEE international conference on human-robot interaction (pp. 27–34). ACM.
Caine, K., Šabanovic, S., & Carter, M. (2012). The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults, 343–350.
Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z., Hazlewood, W. R., Camp, L. J., Connelly, K. H., … Shankar, K. (2011). Digiswitch: A device to allow older adults to monitor and direct the collection and transmission of health information collected at home. Journal of medical systems, 35(5), 1181–1195.
Cavoukian, A., et al. (2009). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada, 51.
Cerrudo, C., & Apa, L. (2017). Hacking robots before skynet. IO Active Website.
Denning, T., Matuszek, C., Koscher, K., Smith, J. R., & Kohno, T. (2009). A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceedings of the 11th international conference on ubiquitous computing (pp. 105–114). ACM.
Finn, R. L., Wright, D., & Friedewald, M. (2013). Seven types of privacy. In European data protection: coming of age (pp. 3–32). Springer.
Gould, J. D., & Lewis, C. (1985). Designing for usability: key principles and what designers think. Communications of the ACM, 28(3), 300–311.
Grönvall, E., & Kyng, M. (2013). On participatory design of home-based healthcare. Cognition, technology & work, 15(4), 389–401.
Hansen, M., Jensen, M., & Rost, M. (2015). Protection goals for privacy engineering. In Security and privacy workshops (spw), 2015 IEEE (pp. 159–166). IEEE.
Heuer, T., Schiering, I., & Gerndt, R. (2019). Me and my robot – sharing information with a new friend. In Privacy and identity management. fairness, accountability and transparency in the age of big data. ifip advances in information and communication technology. Springer (to appear).
Hong, J. I., Ng, J. D., Lederer, S., & Landay, J. A. (2004). Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In Proceedings of the 5th conference on designing interactive systems: processes, practices, methods, and techniques (pp. 91–100). ACM.
Hubers, A., Andrulis, E., Scott, W. D., Scott, L., Stirrat, T., Tran, D., … Grimm, C. (2015). Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems. Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction Extended Abstracts – HRI’15 Extended Abstracts, 59–60. Retrieved from [URL]
Iachello, G., & Hong, J. (2007). End-User Privacy in Human-Computer Interaction. Foundations and Trends® in Human-Computer Interaction, 1 (1), 1–137. Retrieved from [URL]
International Federation of Robotics. (2018). Executive summary world robotics 2018 service robots. Retrieved from [URL]
Jana, S., Narayanan, A., & Shmatikov, V. (2013). A scanner darkly: Protecting user privacy from perceptual applications. Proceedings – IEEE Symposium on Security and Privacy, 349–363.
Kitahara, I., Kogure, K., & Hagita, N. (2004). Stealth vision for protecting privacy. Proceedings – International Conference on Pattern Recognition, 41, 404–407.
Lee, H. R., Šabanović, S., Chang, W.-L., Nagata, S., Piatt, J., Bennett, C., & Hakken, D. (2017). Steps toward participatory design of social robots: Mutual learning with older adults with depression. In Proceedings of the 2017 ACM/IEEE international conference on human-robot interaction (pp. 244–253). ACM.
Lee, M. K., Tang, K. P., Forlizzi, J., & Kiesler, S. (2011). Understanding Users’ Perception of Privacy in Human-Robot Interaction. HRI ’11 Proceedings of the 6th international conference on Human-robot interaction, 181–182. Retrieved from [URL]
Leenes, R., Palmerini, E., Koops, B.-J., Bertolini, A., Salvini, P., & Lucivero, F. (2017). Regulatory challenges of robotics: some guidelines for addressing legal and ethical issues. Law, Innovation and Technology, 9(1), 1–44.
Lera, F. J. R., Llamas, C. F., Guerrero, Á. M., & Olivera, V. M. (2017). Cybersecurity of robotics and autonomous systems: Privacy and safety. In Robotics-legal, ethical and socioeconomic impacts. In Tech..
Pagallo, U. (2013). Robots in the cloud with privacy: A new threat to data protection?Computer Law and Security Review, 29(5), 501–508.
Raval, N., Srivastava, A., Lebeck, K., Cox, L., & Machanavajjhala, A. (2014). Markit: Privacy markers for protecting visual secrets. In Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing: Adjunct publication (pp. 1289–1295). ACM.
Regulation (eu) 2016/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (general data protection eegulation). (n.d.)., 1–88.
Šabanović, S., Chang, W.-L., Bennett, C. C., Piatt, J. A., & Hakken, D. (2015). A robot of my own: participatory design of socially assistive robots for independently living older adults diagnosed with depression. In International conference on human aspects of it for the aged population (pp. 104–114). Springer.
Siljee, J. (2015). Privacy transparency patterns. In Proceedings of the 20th european conference on pattern languages of programs (pp. 52:1–52:11). New York, NY, USA: ACM. Retrieved from
Solove, D. J. (2004). The digital person: Technology and privacy in the information age. NyU Press.
Syrdal, D. S., Walters, M. L., Otero, N., Koay, K. L., & Dautenhahn, K. (2007). He knows when you are sleeping-privacy and the personal robot companion. In Proc. workshop human implications of human-robot interaction, association for the advancement of artificial intelligence (aaai’07) (pp. 28–33).
Tobe, F. (2017). Robotics industry growing faster than expected. Retrieved from [URL]
Vargas, P. A., Ho, W. C., Lim, M., Enz, S., & Aylett, R. (2009). To forget or not to forget: towards a roboethical memory control. Killer Robots or Friendly Fridges: the Social Understanding of Artificial Intelligence, AISB, 91, 18–23.
Yong, S., Lindskog, D., Ruhl, R., & Zavarsky, P. (2011). Risk mitigation strategies for mobile wi-fi robot toys from online pedophiles. In Privacy, security, risk and trust (passat) and 2011 IEEE third inernational conference on social computing (socialcom), 2011 IEEE third international conference on (pp. 1220–1223). IEEE.
Cited by (12)
Cited by 12 other publications
Augustine, Angelika A. & Friederike F. Eyssel
2024. Motives and risks of self-disclosure to robots versus humans. ACM Transactions on Human-Robot Interaction
Jain, Pranut, Andrew Xu, Thomas Downes, Injung Kim, Talha Khan, Jacob T. Biehl & Adam J. Lee
2024. Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive Exposure. Proceedings of the ACM on Human-Computer Interaction 8:CSCW1 ► pp. 1 ff.
Neumann, Paul, Sebastian Thomas Büttner, Luca Hernández Acosta, Delphine Reinhardt & Michael Prilla
2024. Proceedings of Mensch und Computer 2024, ► pp. 448 ff.
Song, Bo, Hongda Xu, Wenna Hu, Yi Li & Yingzhi Guo
2024. How to calculate privacy: privacy concerns and service robots’ use intention in hospitality. Current Issues in Tourism 27:21 ► pp. 3401 ff.
Williams, Tom
2024. Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction, ► pp. 46 ff.
Ahtinen, Aino, Nasim Beheshtian & Kaisa Väänänen
2023. Proceedings of the 2023 ACM/IEEE International Conference on Human-Robot Interaction, ► pp. 331 ff.
2023. International Conference on Human-Agent Interaction, ► pp. 115 ff.
Dietrich, Manuel, Matti Krüger & Thomas H. Weisswange
2023. What should a robot disclose about me? A study about privacy-appropriate behaviors for social robots. Frontiers in Robotics and AI 10
Heuer, Tanja & Ina Schiering
2022. Einsatz von Robotik als Assistive Technologie. In Assistive Technologien im Sozial- und Gesundheitssektor [Gesundheit. Politik - Gesellschaft - Wirtschaft, ], ► pp. 29 ff.
Song, Bo, Meng Zhang & Peipei Wu
2022. Driven by technology or sociality? Use intention of service robots in hospitality from the human–robot interaction perspective. International Journal of Hospitality Management 106 ► pp. 103278 ff.
Heuer, Tanja, Ina Schiering & Reinhard Gerndt
2021. Privacy framework for context-aware robot development. Paladyn, Journal of Behavioral Robotics 12:1 ► pp. 468 ff.
2021. “I still need my privacy”: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots. Pervasive and Mobile Computing 74 ► pp. 101397 ff.
This list is based on CrossRef data as of 20 november 2024. Please note that it may not be complete. Sources presented here have been supplied by the respective publishers.
Any errors therein should be reported to them.