Article published in:
Social Cues in Robot Interaction, Trust and Acceptance
Edited by Alessandra Rossi, Kheng Lee Koay, Silvia Moros, Patrick Holthaus and Marcus Scheunemann
[Interaction Studies 20:3] 2019
► pp. 509529
References

References

Alaiad, A., & Zhou, L.
(2014) The determinants of home healthcare robots adoption: An empirical investigation. International journal of medical informatics, 83(11), 825–840. CrossrefGoogle Scholar
Broadbent, E., Stafford, R., & MacDonald, B.
(2009) Acceptance of healthcare robots for the older population: Review and future directions. International Journal of Social Robotics, 1 (4), 319. CrossrefGoogle Scholar
Butler, D. J., Huang, J., Roesner, F., & Cakmak, M.
(2015) The privacy-utility tradeoff for remotely teleoperated robots. In Proceedings of the tenth annual ACM/IEEE international conference on human-robot interaction (pp. 27–34). ACM.Google Scholar
Caine, K., Šabanovic, S., & Carter, M.
(2012) The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults, 343–350. CrossrefGoogle Scholar
Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z., Hazlewood, W. R., Camp, L. J., Connelly, K. H., … Shankar, K.
(2011) Digiswitch: A device to allow older adults to monitor and direct the collection and transmission of health information collected at home. Journal of medical systems, 35(5), 1181–1195. CrossrefGoogle Scholar
Cavoukian, A., et al.
(2009) Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada, 5. CrossrefGoogle Scholar
Cerrudo, C., & Apa, L.
(2017) Hacking robots before skynet. IO Active Website.Google Scholar
Denning, T., Matuszek, C., Koscher, K., Smith, J. R., & Kohno, T.
(2009) A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceedings of the 11th international conference on ubiquitous computing (pp. 105–114). ACM.Google Scholar
Finn, R. L., Wright, D., & Friedewald, M.
(2013) Seven types of privacy. In European data protection: coming of age (pp. 3–32). Springer. CrossrefGoogle Scholar
Gould, J. D., & Lewis, C.
(1985) Designing for usability: key principles and what designers think. Communications of the ACM, 28(3), 300–311. CrossrefGoogle Scholar
Grönvall, E., & Kyng, M.
(2013) On participatory design of home-based healthcare. Cognition, technology & work, 15(4), 389–401. CrossrefGoogle Scholar
Hansen, M., Jensen, M., & Rost, M.
(2015) Protection goals for privacy engineering. In Security and privacy workshops (spw), 2015 IEEE (pp. 159–166). IEEE. CrossrefGoogle Scholar
Heuer, T., Schiering, I., & Gerndt, R.
(2019) Me and my robot – sharing information with a new friend. In Privacy and identity management. fairness, accountability and transparency in the age of big data. ifip advances in information and communication technology. Springer (to appear). CrossrefGoogle Scholar
[ p. 527 ]
Hong, J. I., Ng, J. D., Lederer, S., & Landay, J. A.
(2004) Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In Proceedings of the 5th conference on designing interactive systems: processes, practices, methods, and techniques (pp. 91–100). ACM.Google Scholar
Hubers, A., Andrulis, E., Scott, W. D., Scott, L., Stirrat, T., Tran, D., … Grimm, C.
(2015) Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems. Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction Extended Abstracts – HRI’15 Extended Abstracts, 59–60. Retrieved from http://​dl​.acm​.org​/citation​.cfm​?doid​=2701973​.2702048 Crossref
Iachello, G., & Hong, J.
(2007) End-User Privacy in Human-Computer Interaction. Foundations and Trends® in Human-Computer Interaction, 1 (1), 1–137. Retrieved from http://​www​.nowpublishers​.com​/article​/Details​/HCI​-004 Crossref
International Federation of Robotics
(2018) Executive summary world robotics 2018 service robots. Retrieved from https://​ifr​.org​/downloads​/press2018​/Executive​_Summary​_WR​_Service​_Robots​_2018​.pdf
Jana, S., Narayanan, A., & Shmatikov, V.
(2013) A scanner darkly: Protecting user privacy from perceptual applications. Proceedings – IEEE Symposium on Security and Privacy, 349–363. CrossrefGoogle Scholar
Kitahara, I., Kogure, K., & Hagita, N.
(2004) Stealth vision for protecting privacy. Proceedings – International Conference on Pattern Recognition, 4, 404–407. CrossrefGoogle Scholar
Lee, H. R., Šabanović, S., Chang, W.-L., Nagata, S., Piatt, J., Bennett, C., & Hakken, D.
(2017) Steps toward participatory design of social robots: Mutual learning with older adults with depression. In Proceedings of the 2017 ACM/IEEE international conference on human-robot interaction (pp. 244–253). ACM.Google Scholar
Lee, M. K., Tang, K. P., Forlizzi, J., & Kiesler, S.
(2011) Understanding Users’ Perception of Privacy in Human-Robot Interaction. HRI ’11 Proceedings of the 6th international conference on Human-robot interaction, 181–182. Retrieved from http://​dl​.acm​.org​/citation​.cfm​?id​=1957721 Crossref
Leenes, R., Palmerini, E., Koops, B.-J., Bertolini, A., Salvini, P., & Lucivero, F.
(2017) Regulatory challenges of robotics: some guidelines for addressing legal and ethical issues. Law, Innovation and Technology, 9(1), 1–44. CrossrefGoogle Scholar
Lera, F. J. R., Llamas, C. F., Guerrero, Á. M., & Olivera, V. M.
(2017) Cybersecurity of robotics and autonomous systems: Privacy and safety. In Robotics-legal, ethical and socioeconomic impacts. In Tech.. CrossrefGoogle Scholar
Pagallo, U.
(2013) Robots in the cloud with privacy: A new threat to data protection? Computer Law and Security Review, 29(5), 501–508. CrossrefGoogle Scholar
Raval, N., Srivastava, A., Lebeck, K., Cox, L., & Machanavajjhala, A.
(2014) Markit: Privacy markers for protecting visual secrets. In Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing: Adjunct publication (pp. 1289–1295). ACM.Google Scholar
Regulation (eu) 2016/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (general data protection eegulation)
n.d.)., 1–88.
[ p. 528 ]
Šabanović, S., Chang, W.-L., Bennett, C. C., Piatt, J. A., & Hakken, D.
(2015) A robot of my own: participatory design of socially assistive robots for independently living older adults diagnosed with depression. In International conference on human aspects of it for the aged population (pp. 104–114). Springer. CrossrefGoogle Scholar
Siljee, J.
(2015) Privacy transparency patterns. In Proceedings of the 20th european conference on pattern languages of programs (pp. 52:1–52:11). New York, NY, USA: ACM. Retrieved from CrossrefGoogle Scholar
Solove, D. J.
(2004) The digital person: Technology and privacy in the information age. NyU Press.Google Scholar
Syrdal, D. S., Walters, M. L., Otero, N., Koay, K. L., & Dautenhahn, K.
(2007) He knows when you are sleeping-privacy and the personal robot companion. In Proc. workshop human implications of human-robot interaction, association for the advancement of artificial intelligence (aaai’07) (pp. 28–33).Google Scholar
Tobe, F.
(2017) Robotics industry growing faster than expected. Retrieved from https://​www​.therobotreport​.com​/robotics​-industry​-growing​-faster​-than​-expected
Vargas, P. A., Ho, W. C., Lim, M., Enz, S., & Aylett, R.
(2009) To forget or not to forget: towards a roboethical memory control. Killer Robots or Friendly Fridges: the Social Understanding of Artificial Intelligence, AISB, 9, 18–23.Google Scholar
Yong, S., Lindskog, D., Ruhl, R., & Zavarsky, P.
(2011) Risk mitigation strategies for mobile wi-fi robot toys from online pedophiles. In Privacy, security, risk and trust (passat) and 2011 IEEE third inernational conference on social computing (socialcom), 2011 IEEE third international conference on (pp. 1220–1223). IEEE. CrossrefGoogle Scholar
[ p. 529 ]
Cited by

Cited by 1 other publications

Reinhardt, Delphine, Monisha Khurana & Luca Hernández Acosta
2021. “I still need my privacy”: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots. Pervasive and Mobile Computing 74  pp. 101397 ff. Crossref logo

This list is based on CrossRef data as of 14 september 2021. Please note that it may not be complete. Sources presented here have been supplied by the respective publishers. Any errors therein should be reported to them.