Cover not available

Article published In: Social Cues in Robot Interaction, Trust and Acceptance
Edited by Alessandra Rossi, Kheng Lee Koay, Silvia Moros, Patrick Holthaus and Marcus Scheunemann
[Interaction Studies 20:3] 2019
► pp. 509529

Get fulltext from our e-platform
References (33)
References
Alaiad, A., & Zhou, L. (2014). The determinants of home healthcare robots adoption: An empirical investigation. International journal of medical informatics, 83(11), 825–840. Google Scholar logo with link to Google Scholar
Broadbent, E., Stafford, R., & MacDonald, B. (2009). Acceptance of healthcare robots for the older population: Review and future directions. International Journal of Social Robotics, 1 (4), 319. Google Scholar logo with link to Google Scholar
Butler, D. J., Huang, J., Roesner, F., & Cakmak, M. (2015). The privacy-utility tradeoff for remotely teleoperated robots. In Proceedings of the tenth annual ACM/IEEE international conference on human-robot interaction (pp. 27–34). ACM.Google Scholar logo with link to Google Scholar
Caine, K., Šabanovic, S., & Carter, M. (2012). The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults, 343–350. Google Scholar logo with link to Google Scholar
Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z., Hazlewood, W. R., Camp, L. J., Connelly, K. H., … Shankar, K. (2011). Digiswitch: A device to allow older adults to monitor and direct the collection and transmission of health information collected at home. Journal of medical systems, 35(5), 1181–1195. Google Scholar logo with link to Google Scholar
Cavoukian, A., et al. (2009). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada, 51. Google Scholar logo with link to Google Scholar
Cerrudo, C., & Apa, L. (2017). Hacking robots before skynet. IO Active Website.Google Scholar logo with link to Google Scholar
Denning, T., Matuszek, C., Koscher, K., Smith, J. R., & Kohno, T. (2009). A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceedings of the 11th international conference on ubiquitous computing (pp. 105–114). ACM. Google Scholar logo with link to Google Scholar
Finn, R. L., Wright, D., & Friedewald, M. (2013). Seven types of privacy. In European data protection: coming of age (pp. 3–32). Springer. Google Scholar logo with link to Google Scholar
Gould, J. D., & Lewis, C. (1985). Designing for usability: key principles and what designers think. Communications of the ACM, 28(3), 300–311. Google Scholar logo with link to Google Scholar
Grönvall, E., & Kyng, M. (2013). On participatory design of home-based healthcare. Cognition, technology & work, 15(4), 389–401. Google Scholar logo with link to Google Scholar
Hansen, M., Jensen, M., & Rost, M. (2015). Protection goals for privacy engineering. In Security and privacy workshops (spw), 2015 IEEE (pp. 159–166). IEEE. Google Scholar logo with link to Google Scholar
Heuer, T., Schiering, I., & Gerndt, R. (2019). Me and my robot – sharing information with a new friend. In Privacy and identity management. fairness, accountability and transparency in the age of big data. ifip advances in information and communication technology. Springer (to appear). Google Scholar logo with link to Google Scholar
Hong, J. I., Ng, J. D., Lederer, S., & Landay, J. A. (2004). Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In Proceedings of the 5th conference on designing interactive systems: processes, practices, methods, and techniques (pp. 91–100). ACM.Google Scholar logo with link to Google Scholar
Hubers, A., Andrulis, E., Scott, W. D., Scott, L., Stirrat, T., Tran, D., … Grimm, C. (2015). Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems. Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction Extended Abstracts – HRI’15 Extended Abstracts, 59–60. Retrieved from [URL]
Iachello, G., & Hong, J. (2007). End-User Privacy in Human-Computer Interaction. Foundations and Trends® in Human-Computer Interaction, 1 (1), 1–137. Retrieved from [URL]
International Federation of Robotics. (2018). Executive summary world robotics 2018 service robots. Retrieved from [URL]
Jana, S., Narayanan, A., & Shmatikov, V. (2013). A scanner darkly: Protecting user privacy from perceptual applications. Proceedings – IEEE Symposium on Security and Privacy, 349–363. Google Scholar logo with link to Google Scholar
Kitahara, I., Kogure, K., & Hagita, N. (2004). Stealth vision for protecting privacy. Proceedings – International Conference on Pattern Recognition, 41, 404–407. Google Scholar logo with link to Google Scholar
Lee, H. R., Šabanović, S., Chang, W.-L., Nagata, S., Piatt, J., Bennett, C., & Hakken, D. (2017). Steps toward participatory design of social robots: Mutual learning with older adults with depression. In Proceedings of the 2017 ACM/IEEE international conference on human-robot interaction (pp. 244–253). ACM. Google Scholar logo with link to Google Scholar
Lee, M. K., Tang, K. P., Forlizzi, J., & Kiesler, S. (2011). Understanding Users’ Perception of Privacy in Human-Robot Interaction. HRI ’11 Proceedings of the 6th international conference on Human-robot interaction, 181–182. Retrieved from [URL]
Leenes, R., Palmerini, E., Koops, B.-J., Bertolini, A., Salvini, P., & Lucivero, F. (2017). Regulatory challenges of robotics: some guidelines for addressing legal and ethical issues. Law, Innovation and Technology, 9(1), 1–44. Google Scholar logo with link to Google Scholar
Lera, F. J. R., Llamas, C. F., Guerrero, Á. M., & Olivera, V. M. (2017). Cybersecurity of robotics and autonomous systems: Privacy and safety. In Robotics-legal, ethical and socioeconomic impacts. In Tech.. Google Scholar logo with link to Google Scholar
Pagallo, U. (2013). Robots in the cloud with privacy: A new threat to data protection? Computer Law and Security Review, 29(5), 501–508. Google Scholar logo with link to Google Scholar
Raval, N., Srivastava, A., Lebeck, K., Cox, L., & Machanavajjhala, A. (2014). Markit: Privacy markers for protecting visual secrets. In Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing: Adjunct publication (pp. 1289–1295). ACM.Google Scholar logo with link to Google Scholar
Regulation (eu) 2016/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (general data protection eegulation). (n.d.)., 1–88.
Šabanović, S., Chang, W.-L., Bennett, C. C., Piatt, J. A., & Hakken, D. (2015). A robot of my own: participatory design of socially assistive robots for independently living older adults diagnosed with depression. In International conference on human aspects of it for the aged population (pp. 104–114). Springer. Google Scholar logo with link to Google Scholar
Siljee, J. (2015). Privacy transparency patterns. In Proceedings of the 20th european conference on pattern languages of programs (pp. 52:1–52:11). New York, NY, USA: ACM. Retrieved from Google Scholar logo with link to Google Scholar
Solove, D. J. (2004). The digital person: Technology and privacy in the information age. NyU Press.Google Scholar logo with link to Google Scholar
Syrdal, D. S., Walters, M. L., Otero, N., Koay, K. L., & Dautenhahn, K. (2007). He knows when you are sleeping-privacy and the personal robot companion. In Proc. workshop human implications of human-robot interaction, association for the advancement of artificial intelligence (aaai’07) (pp. 28–33).Google Scholar logo with link to Google Scholar
Tobe, F. (2017). Robotics industry growing faster than expected. Retrieved from [URL]
Vargas, P. A., Ho, W. C., Lim, M., Enz, S., & Aylett, R. (2009). To forget or not to forget: towards a roboethical memory control. Killer Robots or Friendly Fridges: the Social Understanding of Artificial Intelligence, AISB, 91, 18–23.Google Scholar logo with link to Google Scholar
Yong, S., Lindskog, D., Ruhl, R., & Zavarsky, P. (2011). Risk mitigation strategies for mobile wi-fi robot toys from online pedophiles. In Privacy, security, risk and trust (passat) and 2011 IEEE third inernational conference on social computing (socialcom), 2011 IEEE third international conference on (pp. 1220–1223). IEEE. Google Scholar logo with link to Google Scholar
Cited by (22)

Cited by 22 other publications

Abbasi, Nida Itrat, Leigh Levinson, Selma Šabanović & Hatice Gunes
2026. Proceedings of the 21st ACM/IEEE International Conference on Human-Robot Interaction,  pp. 1050 ff. DOI logo
Altintas, Murat Hakan, Can Efecan Akhan & Burcu Yalcin
2026. Humanoid service robots in hotels: consumer interactions and evaluations. Journal of Hospitality and Tourism Technology  pp. 1 ff. DOI logo
Ahtinen, Aino, Salla Jarske, Aparajita Chowdhury, Hilla Kiuru, Paula Vasara, Heli Valokivi, Harri Siirtola & Roope Raisamo
2025. 2025 34th IEEE International Conference on Robot and Human Interactive Communication (RO-MAN),  pp. 345 ff. DOI logo
Alenljung, Beatrice, Erik Billing & Catharina Gillsjö
2025. Social Robots at Homes: Exploring Potential Value Together with Older Adults. In Human-Computer Interaction [Lecture Notes in Computer Science, 15769],  pp. 237 ff. DOI logo
Augustine, Angelika & Friederike Eyssel
2025. Motives and Risks of Self-Disclosure to Robots versus Humans. ACM Transactions on Human-Robot Interaction 14:1  pp. 1 ff. DOI logo
Collins, Sawyer, Čedomir Stanojević, Casey Bennett, Zachary Henkel, Kenna Baugus Henkel, Nikki M. Abbott, Cindy L. Bethel & Selma Śabanović
2025. “Socially Assistive Robot Privacy Model”: A Multi-model Approach to Evaluating Socially Assistive Robot Privacy Concerns. In Social Robotics [Lecture Notes in Computer Science, 15561],  pp. 280 ff. DOI logo
Jiang, Xiaocong & Tianyang Luo
2025. From negative feedback to actionable insights: a computational analysis of service robot adoption challenges in Chinese hotels. Engineering Management in Production and Services 17:3  pp. 1 ff. DOI logo
Parts, Joosep, Janika Leoste, Kalle Tammemäe & Slavko Rakic
2025. A Systematic Scoping Review of Privacy Challenges and Privacy Enhancing Technologies in Teleoperated Robotics. IEEE Access 13  pp. 216724 ff. DOI logo
Reinhardt, Delphine & Archan Misra
2025. Toward Privacy-Respecting Service Robots. IEEE Pervasive Computing 24:3  pp. 63 ff. DOI logo
Vozna, Alina & Stefania Costantini
2025. Ethical, Legal, and Societal Dimensions of AI-Driven Social Robots in Elderly Healthcare. Intelligenza Artificiale: The international journal of the AIxIA DOI logo
Helgert, André, Lukas Erle, Sabrina Langer, Carolin Straßmann & Sabrina C. Eimler
2024. 2024 33rd IEEE International Conference on Robot and Human Interactive Communication (ROMAN),  pp. 1162 ff. DOI logo
Jain, Pranut, Andrew Xu, Thomas Downes, Injung Kim, Talha Khan, Jacob T. Biehl & Adam J. Lee
2024. Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive Exposure. Proceedings of the ACM on Human-Computer Interaction 8:CSCW1  pp. 1 ff. DOI logo
Neumann, Paul, Sebastian Thomas Büttner, Luca Hernández Acosta, Delphine Reinhardt & Michael Prilla
2024. Proceedings of Mensch und Computer 2024,  pp. 448 ff. DOI logo
Song, Bo, Hongda Xu, Wenna Hu, Yi Li & Yingzhi Guo
2024. How to calculate privacy: privacy concerns and service robots’ use intention in hospitality. Current Issues in Tourism 27:21  pp. 3401 ff. DOI logo
Williams, Tom
2024. Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction,  pp. 46 ff. DOI logo
Ahtinen, Aino, Nasim Beheshtian & Kaisa Väänänen
2023. Proceedings of the 2023 ACM/IEEE International Conference on Human-Robot Interaction,  pp. 331 ff. DOI logo
Ahtinen, Aino, Aparajita Chowdhury, Valentina Ramírez Millan, Chia-Hsin Wu & Gayathri Menon
2023. International Conference on Human-Agent Interaction,  pp. 115 ff. DOI logo
Dietrich, Manuel, Matti Krüger & Thomas H. Weisswange
2023. What should a robot disclose about me? A study about privacy-appropriate behaviors for social robots. Frontiers in Robotics and AI 10 DOI logo
Heuer, Tanja & Ina Schiering
2022. Einsatz von Robotik als Assistive Technologie. In Assistive Technologien im Sozial- und Gesundheitssektor [Gesundheit. Politik - Gesellschaft - Wirtschaft, ],  pp. 29 ff. DOI logo
Song, Bo, Meng Zhang & Peipei Wu
2022. Driven by technology or sociality? Use intention of service robots in hospitality from the human–robot interaction perspective. International Journal of Hospitality Management 106  pp. 103278 ff. DOI logo
Heuer, Tanja, Ina Schiering & Reinhard Gerndt
2021. Privacy framework for context-aware robot development. Paladyn, Journal of Behavioral Robotics 12:1  pp. 468 ff. DOI logo
Reinhardt, Delphine, Monisha Khurana & Luca Hernández Acosta
2021. “I still need my privacy”: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots. Pervasive and Mobile Computing 74  pp. 101397 ff. DOI logo

This list is based on CrossRef data as of 17 march 2026. Please note that it may not be complete. Sources presented here have been supplied by the respective publishers. Any errors therein should be reported to them.

Mobile Menu Logo with link to supplementary files background Layer 1 prag Twitter_Logo_Blue