{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:19:15Z","timestamp":1769206755749,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3450325","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"325-327","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Assessing the Alignment of Social Robots with Trustworthy AI Design Guidelines"],"prefix":"10.1145","author":[{"given":"Ankur","family":"Chattopadhyay","sequence":"first","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY, USA"}]},{"given":"Abdikadar","family":"Ali","sequence":"additional","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY, USA"}]},{"given":"Danielle","family":"Thaxton","sequence":"additional","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"CES 2019 Best of Innovation Award. Robolink Zumi. Accessed","author":"Winner","year":"2020","unstructured":"Winner of CES 2019 Best of Innovation Award. Robolink Zumi. Accessed Nov. 13, 2020 . https:\/\/www.robolink.com\/zumi\/ Winner of CES 2019 Best of Innovation Award. Robolink Zumi. Accessed Nov. 13, 2020. https:\/\/www.robolink.com\/zumi\/"},{"key":"e_1_3_2_2_2_1","unstructured":"IEEE Global Initiative on Ethics of Autonomous & Intelligent Systems. IEEE A\/IS.https:\/\/standards.ieee.org\/industry-connections\/ec\/autonomous-systems.html.  IEEE Global Initiative on Ethics of Autonomous & Intelligent Systems. IEEE A\/IS.https:\/\/standards.ieee.org\/industry-connections\/ec\/autonomous-systems.html."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Ishaani Priyadarshini. 2018. Cyber Security Risks in Robotics. In Cyber Security and Threats. IGI Global 1235 - 1250.  Ishaani Priyadarshini. 2018. Cyber Security Risks in Robotics. In Cyber Security and Threats. IGI Global 1235 - 1250.","DOI":"10.4018\/978-1-5225-5634-3.ch061"},{"key":"e_1_3_2_2_4_1","volume-title":"Educational Toy Robot for Kids. Anki Cozmo. Accessed","author":"Fun A","year":"2020","unstructured":"A Fun , Educational Toy Robot for Kids. Anki Cozmo. Accessed Nov. 13, 2020 . https:\/\/ankicozmorobot.com\/ A Fun, Educational Toy Robot for Kids. Anki Cozmo. Accessed Nov. 13, 2020. https:\/\/ankicozmorobot.com\/"},{"key":"e_1_3_2_2_5_1","volume-title":"Andrew Williams and Debbie Perouli","author":"Kinzler Matt","year":"2019","unstructured":"Matt Kinzler , Justin Miller , Zhou Wu , Andrew Williams and Debbie Perouli . 2019 . Cybersecurity Vulnerabilities in Two Artificially Intelligent Humanoids on the Market. In Workshop on Technology and Consumer Protection (ConPro '19), held in conjunction with 40th IEEE Symposium on Security and Privacy . Matt Kinzler, Justin Miller, Zhou Wu, Andrew Williams and Debbie Perouli. 2019. Cybersecurity Vulnerabilities in Two Artificially Intelligent Humanoids on the Market. In Workshop on Technology and Consumer Protection (ConPro '19), held in conjunction with 40th IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173386.3177078"},{"key":"e_1_3_2_2_7_1","volume-title":"Detecting Abnormal Social Robot Behavior through Emotion Recognition. Master's Thesis Dissertation","author":"Rajapaksha Pathiranage Subhash Rajapaksha","unstructured":"Subhash Rajapaksha Rajapaksha Pathiranage . 2019. Detecting Abnormal Social Robot Behavior through Emotion Recognition. Master's Thesis Dissertation . Marquette University , Milwaukee, Wisconsin . Subhash Rajapaksha Rajapaksha Pathiranage. 2019. Detecting Abnormal Social Robot Behavior through Emotion Recognition. Master's Thesis Dissertation. Marquette University, Milwaukee, Wisconsin."},{"key":"e_1_3_2_2_8_1","first-page":"1","volume-title":"Dignity too?\" Said the Robot: Human Dignity as the Basis for the Governance of Robotics. Minds and Machines","author":"Zardiashvili Lexo","unstructured":"Lexo Zardiashvili and Eduard Fosch-Villaronga . 2020. \"Oh , Dignity too?\" Said the Robot: Human Dignity as the Basis for the Governance of Robotics. Minds and Machines pp 1 - 23 . Lexo Zardiashvili and Eduard Fosch-Villaronga. 2020. \"Oh, Dignity too?\" Said the Robot: Human Dignity as the Basis for the Governance of Robotics. Minds and Machines pp 1 - 23."},{"key":"e_1_3_2_2_9_1","volume-title":"Barbara Neuhofer and Roman Egger","author":"Simon Olga","year":"2020","unstructured":"Olga Simon , Barbara Neuhofer and Roman Egger . 2020 . Human-robot interaction: Conceptualising trust in frontline teams through LEGO\u00ae Serious Play\u00ae. Tourism Management Perspectives, 35: 100692, ISSN 2211--9736. Olga Simon, Barbara Neuhofer and Roman Egger. 2020. Human-robot interaction: Conceptualising trust in frontline teams through LEGO\u00ae Serious Play\u00ae. Tourism Management Perspectives, 35: 100692, ISSN 2211--9736."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335595.3335609"},{"key":"e_1_3_2_2_11_1","unstructured":"Dmitry Dereshev. 2018. Smart Wonder: Cute Helpful Secure Domestic Social Robots. Doctoral thesis - PhD Dissertation Northumbria University.  Dmitry Dereshev. 2018. Smart Wonder: Cute Helpful Secure Domestic Social Robots. Doctoral thesis - PhD Dissertation Northumbria University."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-018-0849-1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430984.3431966"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3450325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450325"}},"subtitle":["A Preliminary Research Study"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":13,"alternative-id":["10.1145\/3422337.3450325","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3450325","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}