{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T02:44:37Z","timestamp":1771037077596,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T00:00:00Z","timestamp":1626134400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T00:00:00Z","timestamp":1626134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Research Council of Science and Technology, Korea","award":["CRC-15-04-KIST"],"award-info":[{"award-number":["CRC-15-04-KIST"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J of Soc Robotics"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12369-021-00809-2","type":"journal-article","created":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T11:04:12Z","timestamp":1626174252000},"page":"589-602","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Effects of Social Behaviors of Robots in Privacy-Sensitive Situations"],"prefix":"10.1007","volume":"14","author":[{"given":"Daseul","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yu-Jung","family":"Chae","sequence":"additional","affiliation":[]},{"given":"Doogon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Yoonseob","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Dong Hwan","family":"Kim","sequence":"additional","affiliation":[]},{"given":"ChangHwan","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sung-Kee","family":"Park","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9169-0785","authenticated-orcid":false,"given":"Changjoo","family":"Nam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,13]]},"reference":[{"key":"809_CR1","unstructured":"Argyle M, Cook M (1976) Gaze and mutual gaze"},{"issue":"2","key":"809_CR2","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","volume":"49","author":"G Bansal","year":"2010","unstructured":"Bansal G, Gefen D et al (2010) The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis Support Syst 49(2):138\u2013150","journal-title":"Decis Support Syst"},{"issue":"2","key":"809_CR3","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1002\/asi.20459","volume":"58","author":"T Buchanan","year":"2007","unstructured":"Buchanan T, Paine C, Joinson AN, Reips UD (2007) Development of measures of online privacy concern and protection for use on the internet. J Am Soc Inf Sci Technol 58(2):157\u2013165","journal-title":"J Am Soc Inf Sci Technol"},{"issue":"1","key":"809_CR4","first-page":"206","volume":"6","author":"JK Burgoon","year":"1982","unstructured":"Burgoon JK (1982) Privacy and communication. Ann Int Commun Assoc 6(1):206\u2013249","journal-title":"Ann Int Commun Assoc"},{"key":"809_CR5","doi-asserted-by":"crossref","unstructured":"Caine K, \u0160abanovic S, Carter M (2012) The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults. In: Proceedings of ACM\/IEEE international conference on human\u2013robot interaction (HRI), pp 343\u2013350","DOI":"10.1145\/2157689.2157807"},{"issue":"1","key":"809_CR6","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1515\/pjbr-2021-0013","volume":"12","author":"A Chatzimichali","year":"2021","unstructured":"Chatzimichali A, Harrison R, Chrysostomou D (2021) Toward privacy-sensitive human\u2013robot interaction: privacy terms and human-data interaction in the personal robot era. Paladyn J Behav Robot 12(1):160\u2013174","journal-title":"Paladyn J Behav Robot"},{"issue":"3","key":"809_CR7","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF02310555","volume":"16","author":"LJ Cronbach","year":"1951","unstructured":"Cronbach LJ (1951) Coefficient alpha and the internal structure of tests. Psychometrika 16(3):297\u2013334","journal-title":"Psychometrika"},{"issue":"1","key":"809_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1509\/jppm.19.1.20.16944","volume":"19","author":"MJ Culnan","year":"2000","unstructured":"Culnan MJ (2000) Protecting privacy online: is self-regulation working? J Public Policy Mark 19(1):20\u201326","journal-title":"J Public Policy Mark"},{"key":"809_CR9","doi-asserted-by":"crossref","unstructured":"Denning T, Matuszek C, Koscher K, Smith JR, Kohno T (2009) A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of international conference on ubiquitous computing, pp 105\u2013114","DOI":"10.1145\/1620545.1620564"},{"key":"809_CR10","doi-asserted-by":"crossref","unstructured":"Fernandes FE, Yang G, Do HM, Sheng W (2016) Detection of privacy-sensitive situations for social robots in smart homes. In: Proceedings of IEEE international conference on automation science and engineering (CASE), pp 727\u2013732","DOI":"10.1109\/COASE.2016.7743474"},{"key":"809_CR11","volume-title":"The hidden dimension","author":"ET Hall","year":"1966","unstructured":"Hall ET (1966) The hidden dimension, vol 609. Doubleday, Garden City"},{"key":"809_CR12","doi-asserted-by":"publisher","DOI":"10.1561\/9781601980779","volume-title":"End-user privacy in human\u2013computer interaction","author":"G Iachello","year":"2007","unstructured":"Iachello G, Hong J (2007) End-user privacy in human\u2013computer interaction, vol 1. Now Publishers Inc, Delft"},{"key":"809_CR13","doi-asserted-by":"crossref","unstructured":"Jeon H, Yang KM, Park S, Choi J, Lim Y (2018) An ontology-based home care service robot for persons with dementia. In: IEEE international symposium on robot and human interactive communication (RO-MAN), pp 540\u2013545","DOI":"10.1109\/ROMAN.2018.8525668"},{"issue":"7","key":"809_CR14","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1016\/j.jalz.2019.06.4060","volume":"15","author":"G Kim","year":"2019","unstructured":"Kim G, Jeon H, Park S, Lim Y (2019) Care support system using ontological model of caring patient with dementia. Alzheimer Dementia J Alzheimer\u2019s Assoc 15(7):1449\u20131450","journal-title":"Alzheimer Dementia J Alzheimer\u2019s Assoc"},{"key":"809_CR15","doi-asserted-by":"crossref","unstructured":"Koelle M, Wolf K, Boll S (2018) Beyond led status lights-design requirements of privacy notices for body-worn cameras. In: Proceedings of international conference on tangible, embedded, and embodied interaction, pp 177\u2013187","DOI":"10.1145\/3173225.3173234"},{"issue":"4","key":"809_CR16","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s00391-016-1066-5","volume":"49","author":"T K\u00f6rtner","year":"2016","unstructured":"K\u00f6rtner T (2016) Ethical challenges in the use of social service robots for elderly people. Zeitschrift f\u00fcr Gerontologie und Geriatrie 49(4):303\u2013307","journal-title":"Zeitschrift f\u00fcr Gerontologie und Geriatrie"},{"key":"809_CR17","doi-asserted-by":"crossref","unstructured":"Lee MK, Tang KP, Forlizzi J, Kiesler S (2011) Understanding users! perception of privacy in human\u2013robot interaction. In: Proceedings of ACM\/IEEE international conference on human\u2013robot interaction (HRI), pp 181\u2013182","DOI":"10.1145\/1957656.1957721"},{"issue":"6","key":"809_CR18","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1016\/S0020-7489(00)00111-5","volume":"38","author":"H Leino-Kilpi","year":"2001","unstructured":"Leino-Kilpi H, V\u00e4lim\u00e4ki M, Dassen T, Gasull M, Lemonidou C, Scott A, Arndt M (2001) Privacy: a review of the literature. Int J Nurs Stud 38(6):663\u2013671","journal-title":"Int J Nurs Stud"},{"key":"809_CR19","doi-asserted-by":"crossref","unstructured":"Li L, Bayuelo A, Bobadilla L, Alam T, Shell DA (2019) Coordinated multi-robot planning while preserving individual privacy. In: Proceedings of IEEE international conference on robotics and automation (ICRA), pp 2188\u20132194","DOI":"10.1109\/ICRA.2019.8794460"},{"key":"809_CR20","doi-asserted-by":"crossref","unstructured":"Lu DV, Smart WD (2013) Towards more efficient navigation for robots and humans. In: Proceedings of IEEE\/RSJ international conference on intelligent robots and systems (IROS), pp 1707\u20131713","DOI":"10.1109\/IROS.2013.6696579"},{"issue":"1","key":"809_CR21","doi-asserted-by":"publisher","first-page":"87","DOI":"10.30658\/hmc.1.6","volume":"1","author":"C Lutz","year":"2020","unstructured":"Lutz C, Tam\u00f2-Larrieux A (2020) The robot privacy paradox: understanding how privacy concerns shape intentions to use social robots. Hum Mach Commun 1(1):87\u2013111","journal-title":"Hum Mach Commun"},{"key":"809_CR22","doi-asserted-by":"crossref","unstructured":"Mumm J, Mutlu B (2011) Human-robot proxemics: physical and psychological distancing in human\u2013robot interaction. In: Proceedings of ACM\/IEEE of international conference on human\u2013robot interaction (HRI), pp 331\u2013338","DOI":"10.1145\/1957656.1957786"},{"key":"809_CR23","doi-asserted-by":"crossref","unstructured":"O\u2019Kane JM, Shell DA (2015) Automatic design of discreet discrete filters. In: Proceedings of IEEE international conference on robotics and automation (ICRA), pp 353\u2013360","DOI":"10.1109\/ICRA.2015.7139023"},{"issue":"12","key":"809_CR24","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1016\/0277-9536(89)90239-6","volume":"29","author":"R Parrott","year":"1989","unstructured":"Parrott R, Burgoon JK, Burgoon M, LePoire BA (1989) Privacy between physicians and patients: more than a matter of confidentiality. Soc Sci Med 29(12):1381\u20131385","journal-title":"Soc Sci Med"},{"issue":"1","key":"809_CR25","doi-asserted-by":"publisher","first-page":"119","DOI":"10.5898\/JHRI.1.1.Riek","volume":"1","author":"LD Riek","year":"2012","unstructured":"Riek LD (2012) Wizard of oz studies in HRI: a systematic review and new reporting guidelines. J Hum Robot Interact 1(1):119\u2013136","journal-title":"J Hum Robot Interact"},{"key":"809_CR26","doi-asserted-by":"crossref","unstructured":"Rueben M, Aroyo AM, Lutz C, Schm\u00f6lz J, Van\u00a0Cleynenbreugel P, Corti A, Agrawal S, Smart WD (2018) Themes and research directions in privacy-sensitive robotics. In: Proceedings of IEEE workshop on advanced robotics and its social impacts (ARSO), pp 77\u201384","DOI":"10.1109\/ARSO.2018.8625758"},{"key":"809_CR27","doi-asserted-by":"crossref","unstructured":"Rueben M, Bernieri FJ, Grimm CM, Smart WD (2016) User feedback on physical marker interfaces for protecting visual privacy from mobile robots. In: Proceedings of international conference on human\u2013robot interaction (HRI), pp 507\u2013508","DOI":"10.1109\/HRI.2016.7451829"},{"key":"809_CR28","doi-asserted-by":"crossref","unstructured":"Rueben MR (2018) Privacy-sensitive robotics. Ph.D. thesis, Oregon State University","DOI":"10.1145\/3029798.3029805"},{"issue":"3","key":"809_CR29","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1080\/09540091.2017.1318356","volume":"29","author":"B Schafer","year":"2017","unstructured":"Schafer B, Edwards L (2017) I spy, with my little sensor\u201d: fair data handling practices for robots between privacy, copyright and security. Connect Sci 29(3):200\u2013209","journal-title":"Connect Sci"},{"key":"809_CR30","doi-asserted-by":"crossref","unstructured":"Schulz T, Herstad J (2017) Walking away from the robot: negotiating privacy with a robot. In: Proceedings of British computer society human computer interaction conference, p\u00a083","DOI":"10.14236\/ewic\/HCI2017.83"},{"key":"809_CR31","doi-asserted-by":"crossref","unstructured":"Schulz T, Tj\u00f8stheim I (2013) Increasing trust perceptions in the internet of things. In: International conference on human aspects of information security, privacy, and trust. Springer, pp 167\u2013175","DOI":"10.1007\/978-3-642-39345-7_18"},{"key":"809_CR32","unstructured":"Syrdal DS, Walters ML, Otero N, Koay KL, Dautenhahn K (2007) He knows when you are sleeping-privacy and the personal robot companion. In: booktitle=AAAI workshop human implications of human\u2013robot interaction, pp 28\u201333"},{"key":"809_CR33","doi-asserted-by":"crossref","unstructured":"Takayama L, Pantofaru C (2009) Influences on proxemic behaviors in human\u2013robot interaction. In: Proceedings of IEEE\/RSJ international conference on intelligent robots and systems (IROS), pp 5495\u20135502","DOI":"10.1109\/IROS.2009.5354145"},{"key":"809_CR34","doi-asserted-by":"crossref","unstructured":"Templeman R, Korayem M, Crandall DJ, Kapadia A (2014) Placeavoider: steering first-person cameras away from sensitive spaces. In: NDSS, pp 23\u201326","DOI":"10.14722\/ndss.2014.23014"},{"issue":"1","key":"809_CR35","first-page":"166","volume":"25","author":"AF Westin","year":"1968","unstructured":"Westin AF (1968) Privacy and freedom. Wash Lee Law Rev 25(1):166","journal-title":"Wash Lee Law Rev"},{"key":"809_CR36","doi-asserted-by":"crossref","unstructured":"Zhang C, Tian Y, Capezuti E (2012) Privacy preserving automatic fall detection for elderly using rgbd cameras. In: Proceedings of international conference on computers for handicapped persons, pp 625\u2013633","DOI":"10.1007\/978-3-642-31522-0_95"},{"issue":"2\u20133","key":"809_CR37","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1177\/0278364918772025","volume":"38","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Shell DA (2019) Complete characterization of a class of privacy-preserving tracking problems. Int J Robot Res 38(2\u20133):299\u2013315","journal-title":"Int J Robot Res"}],"container-title":["International Journal of Social Robotics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12369-021-00809-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12369-021-00809-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12369-021-00809-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:07:08Z","timestamp":1648598828000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12369-021-00809-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,13]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["809"],"URL":"https:\/\/doi.org\/10.1007\/s12369-021-00809-2","relation":{},"ISSN":["1875-4791","1875-4805"],"issn-type":[{"value":"1875-4791","type":"print"},{"value":"1875-4805","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,13]]},"assertion":[{"value":"17 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}