{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T01:30:18Z","timestamp":1777944618219,"version":"3.51.4"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T00:00:00Z","timestamp":1504137600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s00146-017-0758-8","type":"journal-article","created":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T14:54:15Z","timestamp":1504191255000},"page":"509-533","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Comparative legal study on privacy and personal data protection for robots equipped with artificial intelligence: looking at functional and technological aspects"],"prefix":"10.1007","volume":"34","author":[{"given":"Kaori","family":"Ishii","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,8,31]]},"reference":[{"key":"758_CR1","unstructured":"Article 29 Data Protection Working Party (2013) WP29 Opinion 3\/2013 on purpose limitation. \n                    http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2013\/wp203_en.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR2","volume-title":"I, Robot","author":"I Asimov","year":"2004","unstructured":"Asimov I (2004) I, Robot, 2004th edn. Bantam Books, New York","edition":"2004"},{"key":"758_CR3","first-page":"17","volume-title":"Robot ethics: the ethical and social implications of robotics","author":"G Bekey","year":"2012","unstructured":"Bekey G (2012) Current trends in robotics: technology and ethics. In: Lin P, Abney K, Bekey G (eds) Robot ethics: the ethical and social implications of robotics. MIT Press, Massachusetts, pp 17\u201334"},{"key":"758_CR4","first-page":"187","volume-title":"Robot ethics: the ethical and social implications of robotics","author":"R Calo","year":"2012","unstructured":"Calo R (2012) Robots and Privacy. In: Lin P, Abney K, Bekey G (eds) Robot ethics: the ethical and social implications of robotics. MIT Press, Massachusetts, pp 187\u2013202"},{"key":"758_CR5","volume-title":"Robot Law","year":"2016","unstructured":"Calo R, Froomkin M, Kerr I (eds) (2016) Robot Law. Edward Elgar Publishing, Massachusetts"},{"key":"758_CR6","volume-title":"Rossum universal robots","author":"K \u010capek","year":"2013","unstructured":"\u010capek K (2013) Rossum universal robots, English edn. Createspace, Seattle","edition":"English"},{"key":"758_CR7","unstructured":"Cavoukian A (2011a) Privacy by design: the 7 foundational principles. \n                    https:\/\/www.ipc.on.ca\/wp-content\/uploads\/Resources\/7foundationalprinciples.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR8","unstructured":"Cavoukian A (2011b) The 7 foundational principles: implementation and mapping of fair information practices. \n                    https:\/\/www.ipc.on.ca\/wp-content\/uploads\/Resources\/pbd-implement-7found-principles.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR9","unstructured":"Cavoukian A (2012a) Operationalizing privacy by design: a guide to implementing strong privacy practices. \n                    http:\/\/www.ontla.on.ca\/library\/repository\/mon\/26012\/320221.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR10","unstructured":"Cavoukian A (2012b) Abandon zero-sum, simplistic either\/or solutions\u2014positive-sum is paramount: achieving public safety and privacy. \n                    http:\/\/www.ontla.on.ca\/library\/repository\/mon\/26011\/320090.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR11","first-page":"1","volume-title":"Smart data: privacy meets evolutionary robotics","author":"A Cavoukian","year":"2013","unstructured":"Cavoukian A (2013) Privacy by design and the promise of SmartData. In: Harvey I, Globe A, Tomko G, Borrett D, Kwan H, Hatzinakos D (eds) Smart data: privacy meets evolutionary robotics. Springer, New York, pp 1\u20139"},{"issue":"1","key":"758_CR12","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1002\/aris.1440370103","volume":"37","author":"G Chowdhury","year":"2003","unstructured":"Chowdhury G (2003) Natural language processing. Annu Rev Inf Sci Technol 37(1):51\u201389","journal-title":"Annu Rev Inf Sci Technol"},{"key":"758_CR13","volume-title":"A treatise on the law of torts or the wrongs which arise independent of contract","author":"TM Cooley","year":"1888","unstructured":"Cooley TM (1888) A treatise on the law of torts or the wrongs which arise independent of contract, 2nd edn. Callaghan, Chicago","edition":"2"},{"key":"758_CR14","unstructured":"European Data Protection Supervisor (2016) Artificial intelligence, robotics, privacy and data protection: room document for the 38th data protection and privacy commissioners. \n                    https:\/\/secure.edps.europa.eu\/EDPSWEB\/webdav\/site\/mySite\/shared\/Documents\/Cooperation\/Conference_int\/16-10-19_Marrakesh_AI_paper_EN.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR15","unstructured":"European Parliament (2017) the committee on legal affairs published a report with recommendations to the commission on civil law rules on robotics. \n                    http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?pubRef=-\/\/EP\/\/NONSGML+REPORT+A8-2017-0005+0+DOC+PDF+V0\/\/EN\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR17","unstructured":"Executive Office of the President (2014) Big data: seizing opportunities, preserving values. \n                    https:\/\/obamawhitehouse.archives.gov\/sites\/default\/files\/docs\/big_data_privacy_report_5.1.14_final_print.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR18","unstructured":"Executive Office of the President, National Science and Technology Council, Committee on Technology (2016) Preparing for the future of artificial intelligence. \n                    https:\/\/obamawhitehouse.archives.gov\/sites\/default\/files\/whitehouse_files\/microsites\/ostp\/NSTC\/preparing_for_the_future_of_ai.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR19","unstructured":"Federal Trade Commission (2000) Online profiling: a report to congress. \n                    https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/online-profiling-federal-trade-commission-report-congress-part-2\/onlineprofilingreportjune2000.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR20","unstructured":"Federal Trade Commission (2012a) Protecting Consumer privacy in an era of rapid change: recommendations for businesses and policymakers. \n                    https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations\/120326privacyreport.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR21","unstructured":"Federal Trade Commission (2012b) Spokeo to Pay $800,000 to settle FTC charges company allegedly marketed information to employers and recruiters in violation of FCRA, June 12. \n                    https:\/\/www.ftc.gov\/news-events\/press-releases\/2012\/06\/spokeo-pay-800000-settle-ftc-charges-company-allegedly-marketed\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR22","unstructured":"Federal Trade Commission (2015) Internet of things: privacy and security in a connected world. \n                    https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy\/150127iotrpt.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR23","unstructured":"Federal Trade Commission (2016) Big data a tool for inclusion or exclusion? Understanding the issues. \n                    https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/big-data-tool-inclusion-or-exclusion-understanding-issues\/160106big-data-rpt.pdf\n                    \n                  . Accessed 7 Feb 2017"},{"key":"758_CR24","unstructured":"Heaton JB, Polson NG, Witte JH (2016) Deep learning in finance. \n                    https:\/\/pdfs.semanticscholar.org\/9308\/45234a42985b0f85215d30d7d0dfd9b65aab.pdf\n                    \n                  . Accessed 12 July 2017"},{"issue":"3","key":"758_CR25","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1111\/j.1468-2230.2010.00806.x","volume":"73","author":"M Hildebrandt","year":"2010","unstructured":"Hildebrandt M, Koops BJ (2010) The challenges of ambient law and legal protection in the profiling era. The Mod Law Rev 73(3):428\u2013460","journal-title":"The Mod Law Rev"},{"key":"758_CR26","unstructured":"House of Commons, Science and Technology Committee (2016) Robotics and artificial intelligence: fifth report of session 2016\u201317. \n                    https:\/\/www.publications.parliament.uk\/pa\/cm201617\/cmselect\/cmsctech\/145\/145.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR27","unstructured":"Institute for Information and Communications Policy of the Ministry of Internal Affairs and Communications (2016) AI network review meeting report: challenges for achieving wisdom network society (WINS). \n                    http:\/\/www.soumu.go.jp\/menu_news\/s-news\/01iicp01_02000050.html\n                    \n                  . Accessed 12 July 2017 (in Japanese)"},{"key":"758_CR28","unstructured":"International Conference of Data Protection and Privacy Commissioners (2010) Resolution on privacy by design. The 32nd international conference of data protection and privacy commissioners. \n                    https:\/\/icdppc.org\/wp-content\/uploads\/2015\/02\/32-Conference-Israel-resolution-on-Privacy-by-Design.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR29","unstructured":"Japanese Cabinet (2016) Japan revitalization strategy 2016. \n                    http:\/\/www.kantei.go.jp\/jp\/singi\/keizaisaisei\/pdf\/2016_zentaihombun_en.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR30","unstructured":"Kroll JA, Huey J, Barocas S, Felten EW, Reindenberg JR, Robinson DG, Yu H (eds) (2016) Accountable Algorithms. Univ. of Pa. Law Rev, vol 165, p 633"},{"key":"758_CR31","volume-title":"Singularity is near","author":"R Kurzweil","year":"2006","unstructured":"Kurzweil R (2006) Singularity is near. Penguin Books, London"},{"key":"758_CR32","unstructured":"Kusuda Y (2005) A history of Japanese service robots. \n                    http:\/\/sts.kahaku.go.jp\/diversity\/document\/system\/pdf\/016.pdf\n                    \n                  . Accessed 12 July 2017 (in Japanese)"},{"key":"758_CR33","volume-title":"The law of privacy in Canada","author":"B McIsaac","year":"2016","unstructured":"McIsaac B, Shields R, Klein K (2016) The law of privacy in Canada, 2016th edn. Carswell, Toronto","edition":"2016"},{"key":"758_CR34","volume-title":"The assault on privacy: computers, data banks, and dossiers","author":"A Miller","year":"1971","unstructured":"Miller A (1971) The assault on privacy: computers, data banks, and dossiers. University of Michigan Press, Michigan"},{"key":"758_CR35","doi-asserted-by":"crossref","unstructured":"Mittelstadt BD, Allo P, Taddeo M, Wachter S, Floridi L (2016) The ethics of algorithms: mapping the debate. Big Data Soc July\u2013December 1\u201321","DOI":"10.1177\/2053951716679679"},{"issue":"1","key":"758_CR36","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum H (2004) Privacy as contextual integrity. Wash. Law Rev. 79(1):119\u2013158","journal-title":"Wash. Law Rev."},{"key":"758_CR37","unstructured":"Office of the Privacy Commissioner of Canada (2016) Consent and privacy \n                    https:\/\/www.priv.gc.ca\/media\/1806\/consent_201605_e.pdf\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR38","unstructured":"Office of the Under Secretary of Defense for Acquisition, Technology and Logistics (2016) Report of the defense science board summer study on autonomy. \n                    https:\/\/www.hsdl.org\/?view&did=794641\n                    \n                  . Accessed 12 July 2017"},{"key":"758_CR39","first-page":"1","volume-title":"Investigating cyber law and cyber ethics: issues, impacts and practices","author":"U Pagallo","year":"2011","unstructured":"Pagallo U (2011) Responsibility, jurisdiction, and the future of \u201cprivacy by design\u201d. In: Dudley A, Braman J, Vincenti G (eds) Investigating cyber law and cyber ethics: issues, impacts and practices. IGI Global, Pennsylvania, pp 1\u201320"},{"key":"758_CR40","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1016\/j.clsr.2013.07.012","volume":"29","author":"U Pagallo","year":"2013","unstructured":"Pagallo U (2013) Robot in the cloud with privacy: a new threat to data protection? Comput Law Secur Rev 29:501\u2013508","journal-title":"Comput Law Secur Rev"},{"key":"758_CR41","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061","volume-title":"The black box society: the secret algorithm behind money and information","author":"F Pasquale","year":"2015","unstructured":"Pasquale F (2015) The black box society: the secret algorithm behind money and information. Harvard University Press, Massachusetts"},{"key":"758_CR42","doi-asserted-by":"publisher","first-page":"383","DOI":"10.2307\/3478805","volume":"48","author":"W Prosser","year":"1960","unstructured":"Prosser W (1960) Privacy. Calif Law Rev 48:383\u2013423","journal-title":"Calif Law Rev"},{"key":"758_CR43","volume-title":"Artificial intelligence: a modern approach","year":"2016","unstructured":"Russel S, Norvig P (eds) (2016) Artificial intelligence: a modern approach, 3rd edn. Pearson, Essex","edition":"3"},{"key":"758_CR44","unstructured":"Roth A, Dwork C (2014) The algorithmic foundations of differential privacy. Found Trends\u00ae Theor Comput Sci 9(3\u20134):211\u2013407"},{"issue":"3","key":"758_CR45","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1147\/rd.33.0210","volume":"3","author":"AL Samuel","year":"1959","unstructured":"Samuel AL (1959) Some studies in machine learning using the game of checkers. IBM J 3(3):211\u2013229","journal-title":"IBM J"},{"key":"758_CR46","first-page":"315","volume":"17","author":"VM Sch\u00f6nberger","year":"2016","unstructured":"Sch\u00f6nberger VM, Padova Y (2016) Regime change? Enabling big data through europe\u2019s New data protection regulation. Columbia Sci Technol Law Rev 17:315","journal-title":"Columbia Sci Technol Law Rev"},{"key":"758_CR47","first-page":"2","volume":"2021","author":"F Shimpo","year":"2017","unstructured":"Shimpo F (2017) The eight principles of robot law. Curr Law (Tokinohourei) 2021:2\u20133 (in Japanese)","journal-title":"Curr Law (Tokinohourei)"},{"key":"758_CR48","volume-title":"Ethics and technology: controversies, questions, and strategies for ethical computing","author":"H Tavan","year":"2015","unstructured":"Tavan H (2015) Ethics and technology: controversies, questions, and strategies for ethical computing, 5th edn. Wiley, New Jersey","edition":"5"},{"key":"758_CR49","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-1-4614-6409-9_2","volume-title":"Smart data: privacy meets evolutionary robotics","author":"G Tomko","year":"2013","unstructured":"Tomko G (2013) SmartData: the need, the goal and the challenge. In: Harvey I, Globe A, Tomko G, Borrett D, Kwan H, Hatzinakos D (eds) Smart data: privacy meets evolutionary robotics. Springer, New York, pp 11\u201325"},{"issue":"236","key":"758_CR50","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1093\/mind\/LIX.236.433","volume":"59","author":"AM Turing","year":"1950","unstructured":"Turing AM (1950) Computing machinery and intelligence. Mind 59(236):433\u2013460","journal-title":"Mind"},{"key":"758_CR51","first-page":"41","volume-title":"Privacy, due process and the computational turn\u2014the philosophy of law meets the philosophy of technology","author":"M Otterlo Van","year":"2013","unstructured":"Van Otterlo M (2013) A machine learning view on profiling. In: Hildebrandt M, de Vries K (eds) Privacy, due process and the computational turn\u2014the philosophy of law meets the philosophy of technology. Routledge, Abingdon, pp 41\u201364"},{"key":"758_CR52","volume-title":"Dictionary of robotics","author":"W Waldman","year":"1985","unstructured":"Waldman W (1985) Dictionary of robotics. Macmillan, London"},{"key":"758_CR53","volume-title":"Spheres of justice: a defense of pluralism and equality","author":"M Walzer","year":"1984","unstructured":"Walzer M (1984) Spheres of justice: a defense of pluralism and equality. Basic Books, New York"},{"key":"758_CR54","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4:193\u2013220","journal-title":"Harv Law Rev"},{"key":"758_CR55","volume-title":"Privacy and freedom","author":"AF Westin","year":"1967","unstructured":"Westin AF (1967) Privacy and freedom. Atheneum, New York"},{"key":"758_CR56","unstructured":"White House (2015) Administration discussion draft consumer privacy bill of rights act. \n                    http:\/\/europrivacy.info\/wp-content\/uploads\/2015\/10\/privacy-USA-cpbr-act-of-2015-discussion-draft.pdf\n                    \n                  . Accessed 12 July 2017"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-017-0758-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00146-017-0758-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-017-0758-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T06:04:48Z","timestamp":1565589888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00146-017-0758-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,31]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["758"],"URL":"https:\/\/doi.org\/10.1007\/s00146-017-0758-8","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,31]]},"assertion":[{"value":"24 February 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}