{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T08:57:42Z","timestamp":1773392262583,"version":"3.50.1"},"reference-count":58,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/arso.2018.8625758","type":"proceedings-article","created":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T03:39:37Z","timestamp":1548733177000},"page":"77-84","source":"Crossref","is-referenced-by-count":49,"title":["Themes and Research Directions in Privacy-Sensitive Robotics"],"prefix":"10.1109","author":[{"given":"Matthew","family":"Rueben","sequence":"first","affiliation":[]},{"given":"Alexander Mois","family":"Aroyo","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Lutz","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Schmolz","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Van Cleynenbreugel","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Corti","sequence":"additional","affiliation":[]},{"given":"Siddharth","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"William D.","family":"Smart","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"How This Internet of Things Stuffed Animal Can Be Remotely Turned Into a Spy Device","author":"franceschi","year":"2017"},{"key":"ref38","article-title":"Hackers can hijack Wi-Fi Hello Barbie to spy on your children","author":"gibbs","year":"2015"},{"key":"ref33","article-title":"Privacy in human-robot interaction: Survey and future work","author":"rueben","year":"0","journal-title":"We Robot 2016 the Fifth Annual Conference on Legal and Policy Issues relating to Robotics University of Miami School of Law 2016 Discussant Ashkan Soltani Independent Researcher"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-016-0362-y"},{"key":"ref31","first-page":"1","article-title":"Walking away from the robot: Negotiating privacy with a robot","author":"schulz","year":"2017","journal-title":"Proceedings of British HCI Conference"},{"key":"ref30","article-title":"Privacy and healthcare robots&#x2014;an ANT analysis","author":"lutz","year":"0","journal-title":"We Robot 2016 the Fifth Annual Conference on Legal and Policy Issues relating to Robotics University of Miami School of Law 2016 Discussant Matt Beane University of California Santa Barbara"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2909824.3020211"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2856272"},{"key":"ref35","first-page":"472","article-title":"Section 2.6: Social Engineering and HIPAA","author":"trinckes","year":"2012","journal-title":"The Definitive Guide to Complying with the HIPAA\/HITECH Privacy and Security Rules Auerbach Publications"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6201212"},{"key":"ref28","first-page":"983","article-title":"Averting robot eyes","volume":"76","author":"kaminski","year":"2016","journal-title":"Md L Rev"},{"key":"ref27","first-page":"661","article-title":"Robots in the home: What will we have agreed to?","volume":"51","author":"kaminski","year":"2014","journal-title":"Idaho Law Review"},{"key":"ref29","first-page":"21","article-title":"Robocode-ethicists: Privacy-friendly robots, an` ethical responsibility of engineers?","author":"lutz","year":"2015","journal-title":"Proceedings of the ACM Web Science Conference ACM"},{"key":"ref2","author":"inness","year":"1992","journal-title":"Privacy Intimacy and Isolation"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN.2016.7745209"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2909824.3020218"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278768"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1145\/3171221.3171269","article-title":"Be more transparent and users will like you: A robot privacy and user experience design experiment","author":"vitale","year":"2018","journal-title":"Proceedings of the 2018 ACM\/IEEE International Conference on Human-Robot Interaction ACM"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-319-70022-9_50","article-title":"Embodiment, privacy and social robots: May I remember you?","author":"tonkin","year":"2017","journal-title":"International Journal of Social Robotics"},{"key":"ref26","first-page":"29","article-title":"The drone as a privacy catalyst","volume":"64","author":"calo","year":"2011","journal-title":"Stan L Rev Online"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN.2017.8172495"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"ref58","author":"solove","year":"2008","journal-title":"Understanding Privacy"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2012.04.077"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4604_6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"ref10","first-page":"119","article-title":"Privacy and the Question of Technology","volume":"22","author":"austin","year":"2003","journal-title":"Law and Philosophy"},{"key":"ref11","first-page":"483","article-title":"A typology of privacy","volume":"38","author":"koops","year":"2016","journal-title":"U Pa J Int&#x2019;l L"},{"key":"ref40","article-title":"Privacy by Design: The 7 Foundational Principles. Information and Privacy Commissioner of Ontario","author":"cavoukian","year":"2016"},{"key":"ref12","first-page":"28","article-title":"He knows when you are sleeping&#x2014;privacy and the personal robot companion","author":"syrdal","year":"2007","journal-title":"in Workshop on the Human Implications of Human-Robot Interaction Association for the Advancement of Artificial Intelligence (AAAI &#x2019;07)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2157689.2157807"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5898\/JHRI.5.3.Wong"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620564"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1957656.1957721"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-3-319-25554-5_25","article-title":"Using video manipulation to protect privacy in remote presence systems","author":"hubers","year":"2015","journal-title":"International Journal of Social Robotics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2696454.2696484"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3029798.3038341"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1991.tb00023.x"},{"key":"ref3","article-title":"Robots and privacy","author":"calo","year":"2010","journal-title":"Robot Ethics the Ethical and Social Implications of Robotics"},{"key":"ref6","article-title":"A taxonomy of privacy constructs for privacy-sensitive robotics","author":"rueben","year":"0","journal-title":"arXiv 1701 00841v1 [cs CY]"},{"key":"ref5","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"nissenbaum","year":"2004","journal-title":"Wash L Rev"},{"key":"ref8","first-page":"215","article-title":"Privacy: its meaning and value","author":"moore","year":"2003","journal-title":"American Philosophical Quart"},{"key":"ref7","article-title":"Privacy","author":"decew","year":"2013","journal-title":"The Stanford Encyclopedia of Philosophy fall 2013 ed"},{"key":"ref49","first-page":"1","article-title":"Regulating healthcare robots: Maximizing opportunities while minimizing risks","volume":"22","author":"simshaw","year":"2015","journal-title":"Rich JL & Tech"},{"key":"ref9","author":"altman","year":"1975","journal-title":"The Environment and Social Behavior Privacy Personal Space Territory and Crowding"},{"key":"ref46","first-page":"609","article-title":"Strict liability in European codification. Torn between objects, activities and their risks","volume":"44","author":"buyuksagis","year":"2012","journal-title":"Geo J Int&#x2019;l L"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1177\/0018720811417254"},{"key":"ref48","first-page":"583","article-title":"The FTC and the new common law of privacy","volume":"114","author":"solove","year":"2014","journal-title":"Colum L Rev"},{"key":"ref47","first-page":"109","article-title":"To testify or not to testify: A comparative analysis of Australian and American approaches to a parent-child testimonial exemption","volume":"46","author":"farber","year":"2010","journal-title":"Tex Int&#x2019;l LJ"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2655719"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.5898\/JHRI.5.3.Hartzog"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"}],"event":{"name":"2018 IEEE Workshop on Advanced Robotics and its Social Impacts (ARSO)","location":"Genova, Italy","start":{"date-parts":[[2018,9,27]]},"end":{"date-parts":[[2018,9,29]]}},"container-title":["2018 IEEE Workshop on Advanced Robotics and its Social Impacts (ARSO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8612448\/8625716\/08625758.pdf?arnumber=8625758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:41:50Z","timestamp":1643240510000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8625758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/arso.2018.8625758","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}