{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T17:44:17Z","timestamp":1766511857966,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":97,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819523979"},{"type":"electronic","value":"9789819523986"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2398-6_16","type":"book-chapter","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T17:38:49Z","timestamp":1766511529000},"page":"212-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SoK: A Systematic Review of\u00a0Privacy and\u00a0Security in\u00a0Healthcare Robotics"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9524-8427","authenticated-orcid":false,"given":"Mayank","family":"Grover","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"16_CR1","unstructured":"Adhikari, A., Das, S., Dewri, R.: Natural language processing of privacy policies: a survey. arXiv preprint arXiv:2501.10319 (2025)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Afroze, D., Tu, Y., Hei, X.: Securing the future: exploring privacy risks and security questions in robotic systems. In: International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, pp. 148\u2013157. Springer (2023)","DOI":"10.1007\/978-3-031-51630-6_10"},{"issue":"11","key":"16_CR3","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1002\/sec.253","volume":"4","author":"C Armbrust","year":"2011","unstructured":"Armbrust, C., Mehdi, S.A., Reichardt, M., Koch, J., Berns, K.: Using an autonomous robot to maintain privacy in assistive environments. Secur. Commun. Netw. 4(11), 1275\u20131293 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Aryania, A., Huertas-Garcia, R., Forgas-Coll, S., Angulo, C., Aleny\u00e0, G.: Effects of privacy warning on the intention to disclose personal information during interaction with a robot in public spaces. Int. J. Soc. Robot., 1\u201319 (2025)","DOI":"10.1007\/s12369-025-01244-3"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Basan, E., Makarevich, O., Abramov, E., Popov, D.: Analysis of the initial security of the robotics system. In: Proceedings of the 12th International Conference on Security of Information and Networks, pp.\u00a01\u20138 (2019)","DOI":"10.1145\/3357613.3357625"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Baselizadeh, A., Lindblom, D.S., Khaksar, W., Uddin, M.Z., Torresen, J.: Comparative analysis of vision-based sensors for human monitoring in care robots: exploring the utility-privacy trade-off. In: 2024 33rd IEEE International Conference on Robot and Human Interactive Communication (ROMAN), Pasadena, CA, USA, pp. 1794\u20131801 (2024). https:\/\/doi.org\/10.1109\/RO-MAN60168.2024.10731223","DOI":"10.1109\/RO-MAN60168.2024.10731223"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Baselizadeh, A., Uddin, M.Z., Khaksar, W., Lindblom, D.S., Torresen, J.: Prima-care: privacy-preserving multi-modal dataset for human activity recognition in care robots. In: Companion of the 2024 ACM\/IEEE International Conference on Human-Robot Interaction, pp. 233\u2013237 (2024)","DOI":"10.1145\/3610978.3640701"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Bihlmaier, A., et al.: Ros-based cognitive surgical robotics. In: Robot Operating System (ROS) The Complete Reference, vol. 1, pp. 317\u2013342 (2016)","DOI":"10.1007\/978-3-319-26054-9_12"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Callander, N., Ram\u00edrez-Duque, A.A., Foster, M.E.: Navigating the human-robot interaction landscape. Practical guidelines for privacy-conscious social robots. In: Companion of the 2024 ACM\/IEEE International Conference on Human-Robot Interaction, pp. 283\u2013287 (2024)","DOI":"10.1145\/3610978.3640637"},{"issue":"5","key":"16_CR10","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s10877-023-01013-5","volume":"37","author":"AJ Cartwright","year":"2023","unstructured":"Cartwright, A.J.: The elephant in the room: cybersecurity in healthcare. J. Clin. Monit. Comput. 37(5), 1123\u20131132 (2023)","journal-title":"J. Clin. Monit. Comput."},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"122862","DOI":"10.1016\/j.techfore.2023.122862","volume":"196","author":"S Chatterjee","year":"2023","unstructured":"Chatterjee, S., Chaudhuri, R., Vrontis, D.: Acceptance of social robot and its challenges: from privacy calculus perspectives. Technol. Forecast. Soc. Chang. 196, 122862 (2023)","journal-title":"Technol. Forecast. Soc. Chang."},{"issue":"7","key":"16_CR12","doi-asserted-by":"publisher","first-page":"2446","DOI":"10.55730\/1300-0632.3950","volume":"30","author":"S Chaudjary","year":"2022","unstructured":"Chaudjary, S., Kakkar, R., Gupta, R., Tanwar, S., Agrawal, S., Sharma, R.: Blockchain and federated learning-based security solutions for telesurgery system: a comprehensive review. Turk. J. Electr. Eng. Comput. Sci. 30(7), 2446\u20132488 (2022)","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Collins, S., et al.: \u201cSocially assistive robot privacy model\u201d: a multi-model approach to evaluating socially assistive robot privacy concerns. In: International Conference on Social Robotics, pp. 280\u2013289. Springer (2024)","DOI":"10.1007\/978-981-96-3522-1_25"},{"key":"16_CR14","unstructured":"Das, S.: A risk-reduction-based incentivization model for human-centered multi-factor authentication. Indiana University (2020)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Das, S., Dev, J., Camp, L.J.: Privacy preserving policy framework: user-aware and user-driven. In: The 47th Research Conference on Communication, Information and Internet Policy, TPRC47 (2019)","DOI":"10.2139\/ssrn.3445942"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Das, S., Kim, A., Camp, L.J.: Organizational security: implementing a risk-reduction-based incentivization model for MFA adoption. In: Proceedings of the International Conference on Financial Cryptography and Data Security (2021)","DOI":"10.2139\/ssrn.3768846"},{"key":"16_CR17","unstructured":"Das, S., Kim, A., Tingle, Z., Nippert-Eng, C.: All about phishing exploring user research through a systematic literature review. In: Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019) (2019)"},{"issue":"1","key":"16_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/ICS-12-2020-0204","volume":"30","author":"S Das","year":"2022","unstructured":"Das, S., Nippert-Eng, C., Camp, L.J.: Evaluating user susceptibility to phishing attacks. Inf. Comput. Secur. 30(1), 1\u201318 (2022)","journal-title":"Inf. Comput. Secur."},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Das, S., Salman, A.: A review of security threats from e-waste. In: Development in E-Waste Management: Sustainability and Circular Economy Aspects, p.\u00a0165 (2023)","DOI":"10.1201\/9781003301899-13"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Das, S., Wang, B., Kim, A., Camp, L.J.: MFA is a necessary chore!: exploring user mental models of multi-factor authentication technologies. In: HICSS, pp. 1\u201310 (2020)","DOI":"10.24251\/HICSS.2020.669"},{"key":"16_CR21","unstructured":"Das, S., et\u00a0al.: SoK: a proposal for incorporating accessible gamified cybersecurity awareness training informed by a systematic literature review. In: Proceedings of the Workshop on Usable Security and Privacy (USEC) (2022)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Dassanayake, D., Buddhika, M., Maduranga, I., Seneviratne, J., Kumarage, W.: Revolutionizing manufacturing: the role of robotics in the 21st century. J. Desk Res. Rev. Anal. 2(1) (2024)","DOI":"10.4038\/jdrra.v2i1.30"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"D\u00f3czi, R., et al.: Increasing ROS 1.x communication security for medical surgery robot. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 004444\u2013004449. IEEE (2016)","DOI":"10.1109\/SMC.2016.7844931"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"D\u00fczg\u00fcn, R., Noah, N., Mayer, P., Das, S., Volkamer, M.: SoK: a systematic literature review of knowledge-based authentication on augmented reality head-mounted displays. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1\u201312 (2022)","DOI":"10.1145\/3538969.3539011"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Ellis, J.R., et al.: The halo effect: perceptions of information privacy among healthcare chatbot users. J. Am. Geriatr. Soc. (2025)","DOI":"10.1111\/jgs.19393"},{"issue":"1","key":"16_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s44206-025-00167-w","volume":"4","author":"A Fedosov","year":"2025","unstructured":"Fedosov, A., Tam\u00f2-Larrieux, A., Lutz, C., Fosch-Villaronga, E., \u010cartolovni, A.: Privacy-friendly and trustworthy technology for society. Digit. Soc. 4(1), 1\u201312 (2025)","journal-title":"Digit. Soc."},{"issue":"7","key":"16_CR27","first-page":"1248","volume":"1","author":"E Fosch-Villaronga","year":"2018","unstructured":"Fosch-Villaronga, E., Drukarch, H., Custers, B.: Privacy considerations for socially assistive robots. Management 1(7), 1248\u20131255 (2018)","journal-title":"Management"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Gawanmeh, A., Alomari, A.: Taxonomy analysis of security aspects in cyber physical systems applications. In: 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/ICCW.2018.8403559"},{"key":"16_CR29","first-page":"77","volume":"5","author":"HP Ghongade","year":"2025","unstructured":"Ghongade, H.P., Bhadre, A.A.: A comprehensive approach to cybersecurity and healthcare systems using artificial intelligence and robotics. Cyber-Phys. Syst. Innov. Transf. Soc. 5, 77\u2013119 (2025)","journal-title":"Cyber-Phys. Syst. Innov. Transf. Soc."},{"issue":"2","key":"16_CR30","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.rcim.2010.06.009","volume":"27","author":"P Gomes","year":"2011","unstructured":"Gomes, P.: Surgical robotics: Reviewing the past, analysing the present, imagining the future. Robot. Comput. Integr. Manuf. 27(2), 261\u2013266 (2011)","journal-title":"Robot. Comput. Integr. Manuf."},{"issue":"1","key":"16_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3689216","volume":"14","author":"R Grabler","year":"2025","unstructured":"Grabler, R., Koeszegi, S.T.: Privacy beyond data: assessment and mitigation of privacy risks in robotic technology for elderly care. ACM Trans. Hum. Robot Interact. 14(1), 1\u201323 (2025)","journal-title":"ACM Trans. Hum. Robot Interact."},{"issue":"9","key":"16_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3723050","volume":"57","author":"A Haskard","year":"2025","unstructured":"Haskard, A., Herath, D.: Secure robotics: navigating challenges at the nexus of safety, trust, and cybersecurity in cyber-physical systems. ACM Comput. Surv. 57(9), 1\u201348 (2025)","journal-title":"ACM Comput. Surv."},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Huang, Y., et al.: Systemization of knowledge (SoK): goals, coverage, and evaluation in cybersecurity and privacy games. In: Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, pp. 1\u201327 (2025)","DOI":"10.1145\/3706598.3713798"},{"issue":"5","key":"16_CR34","first-page":"2429","volume":"14","author":"S Jain","year":"2022","unstructured":"Jain, S., Doriya, R.: Security framework to healthcare robots for secure sharing of healthcare data from cloud. Int. J. Inf. Technol. 14(5), 2429\u20132439 (2022)","journal-title":"Int. J. Inf. Technol."},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Jangid, A., Dubey, P.K., Chandavarkar, B.: Security issues and challenges in healthcare automated devices. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 19\u201323. IEEE (2020)","DOI":"10.1109\/COMSNETS48256.2020.9027291"},{"issue":"1","key":"16_CR36","doi-asserted-by":"publisher","first-page":"100039","DOI":"10.1016\/j.chbah.2023.100039","volume":"2","author":"S Jayaraman","year":"2024","unstructured":"Jayaraman, S., Phillips, E.K., Church, D., Riek, L.D.: Privacy and utility perceptions of social robots in healthcare. Comput. Hum. Behav. Artif. Hum. 2(1), 100039 (2024)","journal-title":"Comput. Hum. Behav. Artif. Hum."},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Jayaraman, S., Phillips, E.K., Church, D., Riek, L.D.: Social robots in healthcare: characterizing privacy considerations. In: Companion of the 2024 ACM\/IEEE International Conference on Human-Robot Interaction, pp. 568\u2013572 (2024)","DOI":"10.1145\/3610978.3640713"},{"key":"16_CR38","doi-asserted-by":"publisher","first-page":"103853","DOI":"10.1016\/j.ijhm.2024.103853","volume":"122","author":"SJ Jia","year":"2024","unstructured":"Jia, S.J., Chi, O.H., Lu, L.: Social robot privacy concern (SRPC): rethinking privacy concerns within the hospitality domain. Int. J. Hosp. Manag. 122, 103853 (2024)","journal-title":"Int. J. Hosp. Manag."},{"key":"16_CR39","doi-asserted-by":"crossref","unstructured":"Jones, J.M., Duezguen, R., Mayer, P., Volkamer, M., Das, S.: A literature review on virtual reality authentication. In: Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, 7\u20139 July 2021, Proceedings 15, pp. 189\u2013198. Springer (2021)","DOI":"10.1007\/978-3-030-81111-2_16"},{"key":"16_CR40","doi-asserted-by":"publisher","first-page":"123034","DOI":"10.1016\/j.techfore.2023.123034","volume":"198","author":"SMS Khaksar","year":"2024","unstructured":"Khaksar, S.M.S., Shahmehr, F.S., Miah, S., Daim, T., Ozdemir, D.: Privacy concerns versus personalisation benefits in social robot acceptance by employees: a paradox theory-contingency perspective. Technol. Forecast. Soc. Chang. 198, 123034 (2024)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"16_CR41","unstructured":"Khaksar, W., Saplacan, D., Bygrave, L.A., Torresen, J.: Robotics in elderly healthcare: a review of 20 recent research projects. arXiv preprint arXiv:2302.04478 (2023)"},{"key":"16_CR42","doi-asserted-by":"crossref","unstructured":"Khang, A.: Medical Robotics and AI-Assisted Diagnostics for a High-Tech Healthcare Industry. IGI Global (2024)","DOI":"10.4018\/979-8-3693-2105-8"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Kim, J., Levinson, L., Ota, J., \u0160abanovi\u0107, S., Smart, W.D.: Privacy-sensitive robotics: perceptions, measures, and metrics. In: 2025 20th ACM\/IEEE International Conference on Human-Robot Interaction (HRI), pp. 1976\u20131978. IEEE (2025)","DOI":"10.1109\/HRI61500.2025.10974048"},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Kishnani, U., Madabhushi, S., Das, S.: Blockchain in oil and gas supply chain: a literature review from user security and privacy perspective. In: International Symposium on Human Aspects of Information Security and Assurance, pp. 296\u2013309. Springer (2023)","DOI":"10.1007\/978-3-031-38530-8_24"},{"key":"16_CR45","doi-asserted-by":"crossref","unstructured":"Ko, H., Keoh, S.L., Jin, J.: Privacy protection for cloud-based robotic networks. In: Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications, pp. 195\u2013222 (2017)","DOI":"10.1002\/9781119226079.ch10"},{"key":"16_CR46","doi-asserted-by":"publisher","first-page":"110133","DOI":"10.1016\/j.comnet.2023.110133","volume":"238","author":"N Kumar","year":"2024","unstructured":"Kumar, N., Ali, R.: A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile internet. Comput. Netw. 238, 110133 (2024)","journal-title":"Comput. Netw."},{"key":"16_CR47","doi-asserted-by":"publisher","unstructured":"Kuo, I.-H., Jayawardena, C., Broadbent, E., Stafford, R.Q., MacDonald, B.A.: HRI evaluation of a healthcare service robot. In: Ge, S.S., Khatib, O., Cabibihan, J.-J., Simmons, R., Williams, M.-A. (eds.) ICSR 2012. LNCS (LNAI), vol. 7621, pp. 178\u2013187. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34103-8_18","DOI":"10.1007\/978-3-642-34103-8_18"},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Levinson, L.: Contextual understanding of teen & youth privacy perceptions with social robots. In: 2025 20th ACM\/IEEE International Conference on Human-Robot Interaction (HRI), pp. 1869\u20131871. IEEE (2025)","DOI":"10.1109\/HRI61500.2025.10974259"},{"issue":"3","key":"16_CR49","doi-asserted-by":"publisher","first-page":"542","DOI":"10.3390\/electronics13030542","volume":"13","author":"JT Licardo","year":"2024","unstructured":"Licardo, J.T., Domjan, M., Orehova\u010dki, T.: Intelligent robotics-a systematic review of emerging technologies and trends. Electronics 13(3), 542 (2024)","journal-title":"Electronics"},{"key":"16_CR50","doi-asserted-by":"crossref","unstructured":"Liedo, B.: Navigating autonomy, privacy, and ageism in robot home care with aged users: a preliminary analysis of rob-in. Bioethics (2024)","DOI":"10.1111\/bioe.13340"},{"key":"16_CR51","doi-asserted-by":"publisher","unstructured":"Lindblom, D.S., van Otterdijk, M., Torresen, J.: A qualitative observational video-based study on perceived privacy in social robots\u2019 based on robots appearances. In: 2024 IEEE International Conference on Advanced Robotics and Its Social Impacts (ARSO), Hong Kong, pp. 74\u201379 (2024). https:\/\/doi.org\/10.1109\/ARSO60199.2024.10557941","DOI":"10.1109\/ARSO60199.2024.10557941"},{"key":"16_CR52","doi-asserted-by":"crossref","unstructured":"Van\u00a0der Loos, H.M., Reinkensmeyer, D.J., Guglielmelli, E.: Rehabilitation and health care robotics. In: Springer Handbook of Robotics, pp. 1685\u20131728 (2016)","DOI":"10.1007\/978-3-319-32552-1_64"},{"key":"16_CR53","doi-asserted-by":"crossref","unstructured":"Luntovskyy, A.: A survey on advanced security and ensured user privacy for distributed systems. In: 2024 9th International Conference on Smart and Sustainable Technologies (SpliTech), pp. 01\u201307. IEEE (2024)","DOI":"10.23919\/SpliTech61897.2024.10612496"},{"key":"16_CR54","doi-asserted-by":"crossref","unstructured":"Lutz, C., Tam\u00f2, A.: Privacy and healthcare robots\u2013an ant analysis. In: We Robot, pp. 1\u201325 (2016)","DOI":"10.1145\/2786451.2786465"},{"key":"16_CR55","doi-asserted-by":"crossref","unstructured":"Majumdar, R., Das, S.: SoK: an evaluation of quantum authentication through systematic literature review. In: Proceedings of the Workshop on Usable Security and Privacy (USEC). Internet Society Auckland, New Zealand (2021)","DOI":"10.2139\/ssrn.3859056"},{"issue":"4","key":"16_CR56","doi-asserted-by":"publisher","first-page":"2174","DOI":"10.3390\/app12042174","volume":"12","author":"J Marchang","year":"2022","unstructured":"Marchang, J., Di Nuovo, A.: Assistive multimodal robotic system (AMRSys): security and privacy issues, challenges, and possible solutions. Appl. Sci. 12(4), 2174 (2022)","journal-title":"Appl. Sci."},{"key":"16_CR57","doi-asserted-by":"crossref","unstructured":"Marchang, J., Di\u00a0Nuovo, A., Elliott, C., Meese, H., Vinanzi, S., Zecca, M.: Security and privacy in assistive robotics: cybersecurity challenges for healthcare. UK-RAS White paper Series (2023)","DOI":"10.31256\/WP2023.1"},{"key":"16_CR58","doi-asserted-by":"crossref","unstructured":"Mawanda, R., Keishing, S., Wang, J., Marchang, J.: Secure by design smart authentication for care robots to support the elderly. In: 2024 IEEE International Conference on Industrial Technology (ICIT), pp.\u00a01\u20136. IEEE (2024)","DOI":"10.1109\/ICIT58233.2024.10541033"},{"key":"16_CR59","doi-asserted-by":"crossref","unstructured":"Mookherji, S., Odelu, V., Prasath, R.: Analysis of a lightweight authentication protocol for remote surgery applications under the CK-adversary model. In: 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), pp.\u00a01\u20135. IEEE (2022)","DOI":"10.1109\/COMSNETS53615.2022.9668389"},{"key":"16_CR60","doi-asserted-by":"crossref","unstructured":"Mutongi, C., Rigava, B.: Robotics in healthcare: the African perspective. In: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), pp. 1\u201310. IEEE (2024)","DOI":"10.1109\/ICAIC60265.2024.10433838"},{"issue":"2","key":"16_CR61","doi-asserted-by":"publisher","first-page":"e1490","DOI":"10.1002\/widm.1490","volume":"13","author":"VS Naresh","year":"2023","unstructured":"Naresh, V.S., Thamarai, M.: Privacy-preserving data mining and machine learning in healthcare: applications, challenges, and solutions. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 13(2), e1490 (2023)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"16_CR62","doi-asserted-by":"crossref","unstructured":"Nieto\u00a0Agraz, C., Hinrichs, P., Eichelberg, M., Hein, A.: Is the robot spying on me? A study on perceived privacy in telepresence scenarios in a care setting with mobile and humanoid robots. Int. J. Soc. Robot., 1\u201315 (2024)","DOI":"10.1007\/s12369-024-01153-x"},{"key":"16_CR63","doi-asserted-by":"crossref","unstructured":"Nkoom, M., Hounsinou, S.G., Crosby, G.V.: Securing the internet of robotic things (IoRT) against DDoS attacks: a federated learning with differential privacy clustering approach. Comput. Secur., 104493 (2025)","DOI":"10.1016\/j.cose.2025.104493"},{"issue":"3\u20134","key":"16_CR64","doi-asserted-by":"publisher","first-page":"e2020","DOI":"10.1002\/cav.2020","volume":"32","author":"N Noah","year":"2021","unstructured":"Noah, N., Das, S.: Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review. Comput. Anim. Virtual Worlds 32(3\u20134), e2020 (2021)","journal-title":"Comput. Anim. Virtual Worlds"},{"key":"16_CR65","doi-asserted-by":"crossref","unstructured":"Noah, N., Das, S.: From pins to gestures: analyzing knowledge-based authentication schemes for augmented and virtual reality. IEEE Trans. Vis. Comput. Graph. (2025)","DOI":"10.1109\/TVCG.2025.3549862"},{"key":"16_CR66","doi-asserted-by":"crossref","unstructured":"Noah, N., Thakur, S., Beck, J., Das, S.: Evaluating privacy & security of online dating applications with a focus on older adults. In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 666\u2013677. IEEE (2024)","DOI":"10.1109\/EuroSPW61312.2024.00081"},{"issue":"3","key":"16_CR67","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MRA.2010.937861","volume":"17","author":"AM Okamura","year":"2010","unstructured":"Okamura, A.M., Matari\u0107, M.J., Christensen, H.I.: Medical and health-care robotics. IEEE Robot. Autom. Mag. 17(3), 26\u201337 (2010)","journal-title":"IEEE Robot. Autom. Mag."},{"issue":"13","key":"16_CR68","doi-asserted-by":"publisher","first-page":"2586","DOI":"10.3390\/app9132586","volume":"9","author":"ED O\u00f1a","year":"2019","unstructured":"O\u00f1a, E.D., Garcia-Haro, J.M., Jard\u00f3n, A., Balaguer, C.: Robotics in health care: perspectives of robot-aided interventions in clinical practice for rehabilitation of upper limbs. Appl. Sci. 9(13), 2586 (2019)","journal-title":"Appl. Sci."},{"key":"16_CR69","doi-asserted-by":"crossref","unstructured":"Oruma, S.O.: Towards a user-centred security framework for social robots in public spaces. In: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, pp. 292\u2013297 (2023)","DOI":"10.1145\/3593434.3593446"},{"key":"16_CR70","doi-asserted-by":"crossref","unstructured":"Pramesha\u00a0Chandrasiri, G., Halgamuge, M.N., Subhashi\u00a0Jayasekara, C.: A comparative study in the application of IoT in health care: data security in telemedicine. Secur. Priv. Trust IoT Environ., 181\u2013202 (2019)","DOI":"10.1007\/978-3-030-18075-1_9"},{"issue":"15","key":"16_CR71","doi-asserted-by":"publisher","first-page":"6820","DOI":"10.3390\/s23156820","volume":"23","author":"L Ragno","year":"2023","unstructured":"Ragno, L., Borboni, A., Vannetti, F., Amici, C., Cusano, N.: Application of social robots in healthcare: review on characteristics, requirements, technical solutions. Sensors 23(15), 6820 (2023)","journal-title":"Sensors"},{"key":"16_CR72","unstructured":"Research, G.V.: Medical robotic systems market size, share & trend analysis report by type (cleanroom robots, robotic prosthetics, medical service robots), region, and segment forecasts, 2024\u20132030 (2024). https:\/\/www.grandviewresearch.com\/industry-analysis\/medical-robotic-systems-market. Accessed 9 May 2025"},{"key":"16_CR73","doi-asserted-by":"crossref","unstructured":"Saha, H.N., Debnath, S.: Security and privacy of IoT devices in healthcare systems. In: Smart Healthcare System Design: Security and Privacy Aspects, pp. 143\u2013165 (2022)","DOI":"10.1002\/9781119792253.ch7"},{"issue":"Suppl. 1","key":"16_CR74","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1093\/geroni\/igad104.2642","volume":"7","author":"S Saka","year":"2023","unstructured":"Saka, S., Das, S.: Safeguarding in the internet of things age: a comprehensive review of security and privacy risks for older adults. Innov. Aging 7(Suppl. 1), 819 (2023)","journal-title":"Innov. Aging"},{"key":"16_CR75","doi-asserted-by":"crossref","unstructured":"Saka, S., Das, S.: Evaluating privacy measures in healthcare apps predominantly used by older adults. In: 2024 Conference on Building a Secure & Empowered Cyberspace (BuildSEC), pp. 79\u201386. IEEE (2024)","DOI":"10.1109\/BuildSEC64048.2024.00020"},{"key":"16_CR76","doi-asserted-by":"crossref","unstructured":"Schomakers, E.M., Ziefle, M.: Privacy concerns and the acceptance of technologies for aging in place. In: Human Aspects of IT for the Aged Population. Design for the Elderly and Technology Acceptance: 5th International Conference, ITAP 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, 26\u201331 July 2019, Proceedings, Part I 21, pp. 313\u2013331. Springer (2019)","DOI":"10.1007\/978-3-030-22012-9_23"},{"key":"16_CR77","doi-asserted-by":"crossref","unstructured":"Selvaraj, P., Doraikannan, S.: Privacy and security issues on wireless body area and IoT for remote healthcare monitoring. In: Intelligent Pervasive Computing Systems for Smarter Healthcare pp. 227\u2013253 (2019)","DOI":"10.1002\/9781119439004.ch10"},{"key":"16_CR78","doi-asserted-by":"crossref","unstructured":"Shahi, A., Bajaj, G., GolharSathawane, R., Mendhe, D., Dogra, A.: Integrating robot-assisted surgery and AI for improved healthcare outcomes. In: 2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), pp.\u00a01\u20135. IEEE (2024)","DOI":"10.1109\/ICONSTEM60960.2024.10568646"},{"issue":"1","key":"16_CR79","doi-asserted-by":"publisher","first-page":"e1918911","DOI":"10.1001\/jamanetworkopen.2019.18911","volume":"3","author":"KH Sheetz","year":"2020","unstructured":"Sheetz, K.H., Claflin, J., Dimick, J.B.: Trends in the adoption of robotic surgery for common surgical procedures. JAMA Netw. Open 3(1), e1918911 (2020)","journal-title":"JAMA Netw. Open"},{"issue":"4","key":"16_CR80","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1159\/000319015","volume":"57","author":"T Shibata","year":"2011","unstructured":"Shibata, T., Wada, K.: Robot therapy: a new approach for mental healthcare of the elderly-a mini-review. Gerontology 57(4), 378\u2013386 (2011)","journal-title":"Gerontology"},{"key":"16_CR81","doi-asserted-by":"publisher","first-page":"976838","DOI":"10.3389\/frai.2022.976838","volume":"5","author":"S Shrestha","year":"2022","unstructured":"Shrestha, S., Das, S.: Exploring gender biases in ml and AI academic research through systematic literature review. Front. Artif. Intell. 5, 976838 (2022)","journal-title":"Front. Artif. Intell."},{"key":"16_CR82","doi-asserted-by":"crossref","unstructured":"Shrestha, S., Irby, E., Thapa, R., Das, S.: SoK: a systematic literature review of Bluetooth security threats and mitigation measures. In: International Symposium on Emerging Information Security and Applications, pp. 108\u2013127. Springer (2022)","DOI":"10.1007\/978-3-030-93956-4_7"},{"key":"16_CR83","doi-asserted-by":"crossref","unstructured":"Sirigu, G., Carminati, B., Ferrari, E.: Privacy and security issues for human digital twins. In: 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), pp.\u00a01\u20139. IEEE (2022)","DOI":"10.1109\/TPS-ISA56441.2022.00011"},{"key":"16_CR84","doi-asserted-by":"crossref","unstructured":"Stephenson, S., Pal, B., Fan, S., Fernandes, E., Zhao, Y., Chatterjee, R.: SoK: Authentication in augmented and virtual reality. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 267\u2013284. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"16_CR85","unstructured":"Surani, A., Das, S.: Understanding privacy and security postures of healthcare chatbots. In: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, CHI, vol.\u00a022, pp.\u00a01\u20137 (2022)"},{"key":"16_CR86","doi-asserted-by":"crossref","unstructured":"Tang, B., Sullivan, D., Cagiltay, B., Chandrasekaran, V., Fawaz, K., Mutlu, B.: Confidant: a privacy controller for social robots. In: 2022 17th ACM\/IEEE International Conference on Human-Robot Interaction (HRI), pp. 205\u2013214. IEEE (2022)","DOI":"10.1109\/HRI53351.2022.9889540"},{"key":"16_CR87","doi-asserted-by":"crossref","unstructured":"Tanimu, J.A., Abada, W.: Addressing cybersecurity challenges in robotics: a comprehensive overview. Cyber Secur. Appl., 100074 (2024)","DOI":"10.1016\/j.csa.2024.100074"},{"key":"16_CR88","doi-asserted-by":"crossref","unstructured":"Tazi, F., Dykstra, J., Rajivan, P., Das, S.: SoK: evaluating privacy and security vulnerabilities of patients\u2019 data in healthcare. In: International Workshop on Socio-technical Aspects in Security, pp. 153\u2013181. Springer (2022)","DOI":"10.1007\/978-3-031-10183-0_8"},{"key":"16_CR89","unstructured":"Tazi, F., Nandakumar, A., Dykstra, J., Rajivan, P., Das, S.: SoK: analysis of user-centered studies focusing on healthcare privacy & security. SOUPS (2023)"},{"issue":"2","key":"16_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3650116","volume":"5","author":"F Tazi","year":"2024","unstructured":"Tazi, F., Nandakumar, A., Dykstra, J., Rajivan, P., Das, S.: SoK: analyzing privacy and security of healthcare data from the user perspective. ACM Trans. Comput. Healthc. 5(2), 1\u201331 (2024)","journal-title":"ACM Trans. Comput. Healthc."},{"issue":"2","key":"16_CR91","doi-asserted-by":"publisher","first-page":"329","DOI":"10.3390\/jcp2020018","volume":"2","author":"F Tazi","year":"2022","unstructured":"Tazi, F., Shrestha, S., De La Cruz, J., Das, S.: SoK: an evaluation of the secure end user experience on the dark net through systematic literature review. J. Cybersecur. Priv. 2(2), 329\u2013357 (2022)","journal-title":"J. Cybersecur. Priv."},{"issue":"2","key":"16_CR92","first-page":"37","volume":"2","author":"A Vercelli","year":"2018","unstructured":"Vercelli, A., Rainero, I., Ciferri, L., Boido, M., Pirri, F.: Robots in elderly care. DigitCult - Sci. J. Digit. Cult. 2(2), 37\u201350 (2018)","journal-title":"DigitCult - Sci. J. Digit. Cult."},{"issue":"20","key":"16_CR93","doi-asserted-by":"publisher","first-page":"6912","DOI":"10.3390\/s21206912","volume":"21","author":"A Vulpe","year":"2021","unstructured":"Vulpe, A., Cr\u0103ciunescu, R., Dr\u0103gulinescu, A.M., Kyriazakos, S., Paikan, A., Ziafati, P.: Enabling security services in socially assistive robot scenarios for healthcare applications. Sensors 21(20), 6912 (2021)","journal-title":"Sensors"},{"key":"16_CR94","doi-asserted-by":"crossref","unstructured":"Xu, M., Islam, M., Bai, L., Ren, H.: Privacy-preserving synthetic continual semantic segmentation for robotic surgery. IEEE Trans. Med. Imaging (2024)","DOI":"10.1109\/TMI.2024.3364969"},{"key":"16_CR95","doi-asserted-by":"crossref","unstructured":"Yousef, K.M.A., Mohd, B.J., Amra, M., Kamel, Y., AlMajali, A.: Security risk assessment of humanoid robotics: DARWIN-OP2 as case study. In: 2024 25th International Arab Conference on Information Technology (ACIT), pp.\u00a01\u20135. IEEE (2024)","DOI":"10.1109\/ACIT62805.2024.10876987"},{"key":"16_CR96","unstructured":"Zezulak, A., Tazi, F., Das, S.: SoK: evaluating privacy and security concerns of using web services for the disabled population. In: 7th Workshop on Technology and Consumer Protection (ConPro\u201923) (2023)"},{"key":"16_CR97","first-page":"101146","volume":"55","author":"M Zibarzani","year":"2024","unstructured":"Zibarzani, M., Abumalloh, R.A., Nilashi, M.: Adoption behavioural intention of robots in last mile food delivery: the importance of environmental friendliness and moderating impacts of privacy and security concerns. Res. Transp. Bus. Manage. 55, 101146 (2024)","journal-title":"Res. Transp. Bus. Manage."}],"container-title":["Lecture Notes in Computer Science","Social Robotics + AI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2398-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T17:38:58Z","timestamp":1766511538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2398-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819523979","9789819523986"],"references-count":97,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2398-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSR+AI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Robotics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socrob2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsr2025.eu\/icsr-2025-about\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}