{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T17:15:57Z","timestamp":1776791757234,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,26]],"date-time":"2018-02-26T00:00:00Z","timestamp":1519603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,26]]},"DOI":"10.1145\/3171221.3171269","type":"proceedings-article","created":{"date-parts":[[2018,3,6]],"date-time":"2018-03-06T13:17:07Z","timestamp":1520342227000},"page":"379-387","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Be More Transparent and Users Will Like You"],"prefix":"10.1145","author":[{"given":"Jonathan","family":"Vitale","sequence":"first","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"given":"Meg","family":"Tonkin","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney , Australia"}]},{"given":"Sarita","family":"Herse","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney , Australia"}]},{"given":"Suman","family":"Ojha","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"given":"Jesse","family":"Clark","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"given":"Mary-Anne","family":"Williams","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"given":"Xun","family":"Wang","sequence":"additional","affiliation":[{"name":"Commonwealth Bank of Australia, Sydney, Australia"}]},{"given":"William","family":"Judge","sequence":"additional","affiliation":[{"name":"Commonwealth Bank of Australia, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2018,2,26]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5120\/7242-0218"},{"key":"e_1_3_2_1_3_1","volume-title":"Culnan and Sandra Milberg","author":"Mary","year":"1998","unstructured":"Mary J. Culnan and Sandra Milberg . 1998 . The second exchange: Managing customer information in marketing relationships. (July. 1998). Mary J. Culnan and Sandra Milberg. 1998. The second exchange: Managing customer information in marketing relationships. (July. 1998)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_6_1","volume-title":"Human neural systems for face recognition and social communication. Biological psychiatry","author":"Haxby James V.","year":"2002","unstructured":"James V. Haxby , Elizabeth A. Hoffman , and M. Ida Gobbini . 2002. Human neural systems for face recognition and social communication. Biological psychiatry Vol. 51 , 1 ( 2002 ), 59--67. James V. Haxby, Elizabeth A. Hoffman, and M. Ida Gobbini. 2002. Human neural systems for face recognition and social communication. Biological psychiatry Vol. 51, 1 (2002), 59--67."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(98)80069-2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2010.2062550"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN.2006.314398"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9112-x"},{"key":"e_1_3_2_1_11_1","volume-title":"Towards robust experimental design for user studies in security and privacy The 4th LASER Workshop (2016): Learning from Authoritative Security Experiment Results","author":"Krol Kat","unstructured":"Kat Krol , Jonathan M. Spring , Simon Parkin , and M. Angela Sasse . 2016. Towards robust experimental design for user studies in security and privacy The 4th LASER Workshop (2016): Learning from Authoritative Security Experiment Results . IEEE , 21--31. Kat Krol, Jonathan M. Spring, Simon Parkin, and M. Angela Sasse. 2016. Towards robust experimental design for user studies in security and privacy The 4th LASER Workshop (2016): Learning from Authoritative Security Experiment Results. IEEE, 21--31."},{"key":"e_1_3_2_1_12_1","volume-title":"Privacy by design-principles of privacy-aware ubiquitous systems Ubicomp 2001: Ubiquitous Computing","author":"Langheinrich Marc","unstructured":"Marc Langheinrich . 2001. Privacy by design-principles of privacy-aware ubiquitous systems Ubicomp 2001: Ubiquitous Computing . Springer International Publishing , 273--291. Marc Langheinrich. 2001. Privacy by design-principles of privacy-aware ubiquitous systems Ubicomp 2001: Ubiquitous Computing. Springer International Publishing, 273--291."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89350-9_6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01049386"},{"key":"e_1_3_2_1_16_1","volume-title":"The mobot museum robot installations: A five year experiment Proceedings of IEEE\/RSJ International Conference on Intelligent Robots and Systems","author":"Nourbakhsh Illah R.","year":"2003","unstructured":"Illah R. Nourbakhsh , Clayton Kunz , and Thomas Willeke . 2003. The mobot museum robot installations: A five year experiment Proceedings of IEEE\/RSJ International Conference on Intelligent Robots and Systems , 2003 (IROS 2003), Vol. Vol. 4 . IEEE , 3636--3641. Illah R. Nourbakhsh, Clayton Kunz, and Thomas Willeke. 2003. The mobot museum robot installations: A five year experiment Proceedings of IEEE\/RSJ International Conference on Intelligent Robots and Systems, 2003 (IROS 2003), Vol. Vol. 4. IEEE, 3636--3641."},{"key":"e_1_3_2_1_17_1","volume-title":"About the E-Privacy Directive: towards a third generation of data protection legislation? Data protection in a profiled world","author":"Poullet Yves","unstructured":"Yves Poullet . 2010. About the E-Privacy Directive: towards a third generation of data protection legislation? Data protection in a profiled world . Springer International Publishing , 3--30. Yves Poullet. 2010. About the E-Privacy Directive: towards a third generation of data protection legislation? Data protection in a profiled world. Springer International Publishing, 3--30."},{"key":"e_1_3_2_1_18_1","volume-title":"The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise. Computer Law & Security Review","author":"Romanou Anna","year":"2017","unstructured":"Anna Romanou . 2017. The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise. Computer Law & Security Review ( 2017 ), 1--12. 1007\/978-3-319-70022-9_50 Anna Romanou. 2017. The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise. Computer Law & Security Review (2017), 1--12. 1007\/978-3-319-70022-9_50"},{"key":"e_1_3_2_1_19_1","volume-title":"2017 b. Would you like to sample? Robot engagement in a shopping centre Proceedings of the 26th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN","author":"Tonkin Meg","year":"2017","unstructured":"Meg Tonkin , Jonathan Vitale , Suman Ojha , Mary-Anne Williams , Paul Fuller , William Judge , and Wang Xun . 2017 b. Would you like to sample? Robot engagement in a shopping centre Proceedings of the 26th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN 2017 ). IEEE , 42--49. Meg Tonkin, Jonathan Vitale, Suman Ojha, Mary-Anne Williams, Paul Fuller, William Judge, and Wang Xun. 2017 b. Would you like to sample? Robot engagement in a shopping centre Proceedings of the 26th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN 2017). IEEE, 42--49."},{"key":"e_1_3_2_1_20_1","unstructured":"Carl W. Turner Merrill Zavod and William Yurcik. 2001. Factors that affect the perception of security and privacy of ecommerce web sites Fourth International Conference on Electronic Commerce Research Dallas TX. Citeseer 628--636.  Carl W. Turner Merrill Zavod and William Yurcik. 2001. Factors that affect the perception of security and privacy of ecommerce web sites Fourth International Conference on Electronic Commerce Research Dallas TX. Citeseer 628--636."},{"key":"e_1_3_2_1_21_1","first-page":"439","article-title":"Privacy by Design in Machine Learning Data Collection: A User Experience Experimentation Symposium on Designing the User Experience of Machine Learning Systems","volume":"2017","author":"Vitale Jonathan","year":"2017","unstructured":"Jonathan Vitale , Meg Tonkin , Xun Wang , Suman Ojha , Mary-Anne Williams , and William Judge . 2017 . Privacy by Design in Machine Learning Data Collection: A User Experience Experimentation Symposium on Designing the User Experience of Machine Learning Systems . AAAI Spring Symposia 2017 , 439 -- 442 . Jonathan Vitale, Meg Tonkin, Xun Wang, Suman Ojha, Mary-Anne Williams, and William Judge. 2017. Privacy by Design in Machine Learning Data Collection: A User Experience Experimentation Symposium on Designing the User Experience of Machine Learning Systems. AAAI Spring Symposia 2017, 439--442.","journal-title":"AAAI Spring Symposia"},{"key":"e_1_3_2_1_22_1","volume-title":"Socially Impaired Robots: Human Social Disorders and Robots' Socio-Emotional Intelligence 6th International Conference on Social Robotics. Springer, 350--359","author":"Vitale Jonathan","year":"2014","unstructured":"Jonathan Vitale , Mary-Anne Williams , and Benjamin Johnston . 2014 . Socially Impaired Robots: Human Social Disorders and Robots' Socio-Emotional Intelligence 6th International Conference on Social Robotics. Springer, 350--359 . Jonathan Vitale, Mary-Anne Williams, and Benjamin Johnston. 2014. Socially Impaired Robots: Human Social Disorders and Robots' Socio-Emotional Intelligence 6th International Conference on Social Robotics. Springer, 350--359."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.478"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34103-8_5"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2017.1313816"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.12.008"}],"event":{"name":"HRI '18: ACM\/IEEE International Conference on Human-Robot Interaction","location":"Chicago IL USA","acronym":"HRI '18","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction","IEEE-RAS Robotics and Automation"]},"container-title":["Proceedings of the 2018 ACM\/IEEE International Conference on Human-Robot Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171221.3171269","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3171221.3171269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:52Z","timestamp":1750215772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171221.3171269"}},"subtitle":["A Robot Privacy and User Experience Design Experiment"],"short-title":[],"issued":{"date-parts":[[2018,2,26]]},"references-count":25,"alternative-id":["10.1145\/3171221.3171269","10.1145\/3171221"],"URL":"https:\/\/doi.org\/10.1145\/3171221.3171269","relation":{},"subject":[],"published":{"date-parts":[[2018,2,26]]},"assertion":[{"value":"2018-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}