{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:15:19Z","timestamp":1776104119392,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":98,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100007059","name":"Northwestern University","doi-asserted-by":"publisher","award":["CASMI"],"award-info":[{"award-number":["CASMI"]}],"id":[{"id":"10.13039\/100007059","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#1955227"],"award-info":[{"award-number":["#1955227"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713471","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:40:09Z","timestamp":1745469609000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Promises, Promises: Understanding Claims Made in Social Robot Consumer Experiences"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5813-9019","authenticated-orcid":false,"given":"Johanna","family":"Gunawan","sequence":"first","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0109-4486","authenticated-orcid":false,"given":"Sarah Elizabeth","family":"Gillespie","sequence":"additional","affiliation":[{"name":"Cybersecurity and Privacy Institute, Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7825-7226","authenticated-orcid":false,"given":"David","family":"Choffnes","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2475-5072","authenticated-orcid":false,"given":"Woodrow","family":"Hartzog","sequence":"additional","affiliation":[{"name":"School of Law, Boston University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5268-004X","authenticated-orcid":false,"given":"Christo","family":"Wilson","sequence":"additional","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, Boston, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"Adurbe. 2024. The Moxie child support robot gets new lease on life through open source. https:\/\/www.osnews.com\/story\/141401\/the-moxie-child-support-robot-gets-new-lease-on-life-through-open-source\/"},{"key":"e_1_3_3_3_3_2","series-title":"(SEC\u201919)","first-page":"585","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow, Samin\u00a0Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. Policylint: investigating internal privacy policy contradictions on Google play. In Proceedings of the 28th USENIX Conference on Security Symposium (Santa Clara, CA, USA) (SEC\u201919). USENIX Association, USA, 585\u2013602."},{"key":"e_1_3_3_3_4_2","unstructured":"Martin Armstrong. 2023. The market for smart home devices is expected to boom over the next 5 years. https:\/\/www.weforum.org\/agenda\/2022\/04\/homes-smart-tech-market\/"},{"key":"e_1_3_3_3_5_2","unstructured":"Michael Atleson. 2023. Keep your AI claims in check. https:\/\/www.ftc.gov\/business-guidance\/blog\/2023\/02\/keep-your-ai-claims-check"},{"key":"e_1_3_3_3_6_2","unstructured":"Michael Atleson. 2023. The Luring Test: AI and the engineering of consumer trust. https:\/\/www.ftc.gov\/consumer-alerts\/2023\/05\/luring-test-ai-and-engineering-consumer-trust"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2696454.2714388"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278741"},{"key":"e_1_3_3_3_9_2","unstructured":"Board of Governors of the Federal Reserve System Division of Consumer and Community Affairs. 2008. Federal Trade Commission Act Section 5: Unfair or Deceptive Acts or Practices. https:\/\/www.federalreserve.gov\/boarddocs\/supmanual\/cch\/200806\/ftca.pdf."},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Christoph B\u00f6sch Benjamin Erb Frank Kargl Henning Kopp and Stefan Pfattheicher. 2016. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. Proc. of PETS 2016 4 (2016) 237\u2013254. https:\/\/content.sciendo.com\/view\/journals\/popets\/2016\/4\/article-p237.xml","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"crossref","unstructured":"Glenn\u00a0A. Bowen. 2009. Document Analysis as a Qualitative Research Method. 9 (2009). Issue 2.","DOI":"10.3316\/QRJ0902027"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517498"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3568294.3580105"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2909824.3020258"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3512290.3543633"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32552-1_72"},{"key":"e_1_3_3_3_18_2","unstructured":"Justin Brookman and Signatory Parties. 2024. Letter: Groups call on FTC to develop clear guidance for use of \u201csoftware tethering\u201d. https:\/\/advocacy.consumerreports.org\/research\/group-letter-ftc-software-tethering"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484536"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589388"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3501712.3529747"},{"key":"e_1_3_3_3_22_2","unstructured":"Ashley Carman. 2020. Jibo the social robot that was supposed to die is getting a second life. https:\/\/www.theverge.com\/2020\/7\/23\/21325644\/jibo-social-robot-ntt-disruptionfunding"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","unstructured":"Catherine Caudwell and Cherie Lacey. 2020. What do home robots want? The ambivalent power of cuteness in robotic relationships. Convergence 26 4 (2020) 956\u2013968. 10.1177\/1354856519837792 arXiv:10.1177\/1354856519837792","DOI":"10.1177\/1354856519837792"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3369457.3369463"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314232"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376459"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2008.4813386"},{"key":"e_1_3_3_3_28_2","unstructured":"Kate Darling. 2024. It\u2019s No Wonder People Are Getting Emotionally Attached to Chatbots. https:\/\/www.wired.com\/story\/its-no-wonder-people-are-getting-emotionally-attached-to-chatbots\/"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519659"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3638067.3638081"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3084330"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS58326.2023.10137912"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3029798.3038424"},{"key":"e_1_3_3_3_35_2","unstructured":"Inc. Embodied. 2024. Closing FAQs. https:\/\/moxierobot.com\/pages\/closing-faqs"},{"key":"e_1_3_3_3_36_2","unstructured":"EasyList filter\u00a0list project. 2024. EasyList. https:\/\/easylist.to\/easylist\/easylist.txt"},{"key":"e_1_3_3_3_37_2","unstructured":"EasyList filter\u00a0list project. 2024. EasyPrivacy. https:\/\/easylist.to\/easylist\/easyprivacy.txt"},{"key":"e_1_3_3_3_38_2","unstructured":"Ina Fried. 2024. Maker of AI robots for kids abruptly shutters. https:\/\/www.axios.com\/2024\/12\/10\/moxie-kids-robot-shuts-down"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"crossref","unstructured":"Norina Gasteiger Kate Loveys Mikaela Law and Elizabeth Broadbent. 2021. Friends from the future: a scoping review of research into robots and computer agents to combat loneliness in older people. Clinical interventions in aging (2021) 941\u2013971.","DOI":"10.2147\/CIA.S282709"},{"key":"e_1_3_3_3_40_2","unstructured":"James\u00a0J. Gibson. 1979. The Theory of Affordances. https:\/\/cs.brown.edu\/courses\/cs137\/2017\/readings\/Gibson-AFF.pdf"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300408"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642436"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Johanna Gunawan David Choffnes Woodrow Hartzog and Christo Wilson. 2021. A Comparative Study of Dark Patterns Across Mobile and Web Modalities. (Oct. 2021).","DOI":"10.1145\/3479521"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3530019.3535346"},{"key":"e_1_3_3_3_45_2","unstructured":"Scharon Harding. 2024. Startup will brick $800 emotional support robot for kids without refunds. https:\/\/arstechnica.com\/gadgets\/2024\/12\/startup-will-brick-800-emotional-support-robot-for-kids-without-refunds\/"},{"key":"e_1_3_3_3_46_2","unstructured":"Woodrow Hartzog. 2015. Unfair and Deceptive Robots. 74 785 (2015). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2602452"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3434073.3444661"},{"key":"e_1_3_3_3_48_2","unstructured":"Wonil Hwang. 2023. Online User Reviews: A Treasure Trove of UX Research? J. User Exper. 18 4 (Sept. 2023) 170\u2013174."},{"key":"e_1_3_3_3_49_2","unstructured":"Ellisa Jillson. 2021. Aiming for truth fairness and equity in your company\u2019s use of AI. https:\/\/www.ftc.gov\/business-guidance\/blog\/2021\/04\/aiming-truth-fairness-equity-your-companys-use-ai"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"crossref","unstructured":"David\u00a0O Johnson Raymond\u00a0H Cuijpers Kathrin Pollmann and Antoine\u00a0AJ Van\u00a0de Ven. 2016. Exploring the entertainment value of playing games with a humanoid robot. International Journal of Social Robotics 8 (2016) 247\u2013269.","DOI":"10.1007\/s12369-015-0331-x"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3568294.3580046"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3568162.3576967"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3628516.3659414"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","unstructured":"Keunjae Kim Kyungbin Kwon Anne Ottenbreit-Leftwich Haesol Bae and Krista Glazewski. 2023. Exploring middle school students\u2019 common naive conceptions of AI concepts and the evolution of these ideas. 10.1007\/s10639-023-11600-3","DOI":"10.1007\/s10639-023-11600-3"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581432"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2019.8673274"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2893360"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314251"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319502.3374777"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3371382.3378376"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/HRI53351.2022.9889521"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3029798.3038378"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","unstructured":"Pekka Mertala and Janne Fagerlund. 2024. Finnish 5th and 6th graders\u2019 misconceptions about artificial intelligence. 10.1016\/j.ijcci.2023.100630","DOI":"10.1016\/j.ijcci.2023.100630"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3526114.3558698"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681909"},{"key":"e_1_3_3_3_66_2","unstructured":"Arvind Narayanan and Sayash Kapoor. 2022. Introducing the AI Snake Oil Book Project. (2022). https:\/\/www.aisnakeoil.com\/p\/introducing-the-ai-snake-oil-book"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"crossref","unstructured":"Nazan Nazan\u00a0Colmekcioglu Rexa Marvi Pantea Foroudi and Fefzi Okumus. 2022. Generation susceptibility and response regarding negativity: An in-depth analysis on negative online reviews. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0148296322007172","DOI":"10.1016\/j.jbusres.2022.08.033"},{"key":"e_1_3_3_3_68_2","volume-title":"The Design of Everyday Things: Revised and Expanded Edition","author":"Norman Don","year":"2013","unstructured":"Don Norman. 2013. The Design of Everyday Things: Revised and Expanded Edition. Basic Books."},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIS52602.2021.00012"},{"key":"e_1_3_3_3_70_2","series-title":"(HRI \u201919)","first-page":"606","volume-title":"Proceedings of the 14th ACM\/IEEE International Conference on Human-Robot Interaction","author":"Ogawa Rui","year":"2020","unstructured":"Rui Ogawa, Sung Park, and Hiroyuki Umemuro. 2020. How Humans Develop Trust in Communication Robots: A Phased Model Based on Interpersonal Trust. In Proceedings of the 14th ACM\/IEEE International Conference on Human-Robot Interaction (Daegu, Republic of Korea) (HRI \u201919). IEEE Press, 606\u2013607."},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3626705.3627780"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3029798.3038312"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/2157689.2157805"},{"key":"e_1_3_3_3_74_2","unstructured":"Paolo Pirjanian. 2024. Important Moxie Update\u2013Community-Driven Path Forward. https:\/\/www.linkedin.com\/posts\/paolopirjanian_openmoxie-update-for-serverless-operations-activity-7275851306701889536-8G7q\/"},{"key":"e_1_3_3_3_75_2","unstructured":"Elvira Pollina and Martin Coulter. 2023. Italy bans U.S.-based AI chatbot Replika from using personal data. https:\/\/www.reuters.com\/technology\/italy-bans-us-based-ai-chatbot-replika-using-personal-data-2023-02-03\/"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","unstructured":"Lena Recki Dennis Lawo Veronika Krau\u00df Dominik Pins and Alexander Boden. 2024. \"You Can either Blame Technology or Blame a Person...\" \u2014 A Conceptual Model of Users\u2019 AI-Risk Perception as a Tool for HCI. Proc. ACM Hum.-Comput. Interact. 8 CSCW2 Article 457 (Nov. 2024) 25\u00a0pages. 10.1145\/3686996","DOI":"10.1145\/3686996"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"crossref","unstructured":"Nicole\u00a0Lee Robinson Timothy\u00a0Vaughan Cottier and David\u00a0John Kavanagh. 2019. Psychosocial health interventions by social robots: systematic review of randomized controlled trials. Journal of medical Internet research 21 5 (2019) e13203.","DOI":"10.2196\/13203"},{"key":"e_1_3_3_3_78_2","unstructured":"Kevin Roose. 2024. Can A.I. Be Blamed for a Teen\u2019s Suicide?https:\/\/www.nytimes.com\/2024\/10\/23\/technology\/characterai-lawsuit-teen-suicide.html"},{"key":"e_1_3_3_3_79_2","series-title":"(HRI \u201919)","first-page":"522","volume-title":"Proceedings of the 14th ACM\/IEEE International Conference on Human-Robot Interaction","author":"Rosenberg-Kima Rinat","year":"2020","unstructured":"Rinat Rosenberg-Kima, Yaacov Koren, Maya Yachini, and Goren Gordon. 2020. Human-Robot-Collaboration (HRC): Social Robots as Teaching Assistants for Training Activities in Small Groups. In Proceedings of the 14th ACM\/IEEE International Conference on Human-Robot Interaction (Daegu, Republic of Korea) (HRI \u201919). IEEE Press, 522\u2013523."},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"publisher","unstructured":"Andres Rosero Elizabeth Dula Harris Kelly Bertram\u00a0F. Malle and Elizabeth\u00a0K. Phillips. 2022. Human perceptions of social robot deception behaviors: an exploratory analysis. 10.3389\/frobt.2024.1409712\/full","DOI":"10.3389\/frobt.2024.1409712\/full"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"crossref","unstructured":"Paul Rozin and Edward\u00a0B. Royzman. 2001. Negativity Bias Negativity Dominance Contagion. Issue 4.","DOI":"10.1207\/S15327957PSPR0504_2"},{"key":"e_1_3_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3554364.3559114"},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"publisher","unstructured":"Brennan Schaffner Neha\u00a0A. Lingareddy and Marshini Chetty. 2022. Understanding Account Deletion and Relevant Dark Patterns on Social Media. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 Article 417 (nov 2022) 43\u00a0pages. 10.1145\/3555142","DOI":"10.1145\/3555142"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377815.3381382"},{"key":"e_1_3_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74188-4_7"},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/HRI53351.2022.9889592"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"crossref","unstructured":"Daniel Solove and Woodrow Hartzog. 2014. The FTC and the New Common Law of Privacy. Issue 583. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2312913","DOI":"10.2139\/ssrn.2312913"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"publisher","unstructured":"Kaiwen Sun Jingjie Li Yixin Zou Jenny Radesky Christopher Brooks and Florian Schaub. 2024. Unfulfilled Promises of Child Safety and Privacy: Portrayals and Use of Children in Smart Home Marketing. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 Article 145 (April 2024) 29\u00a0pages. 10.1145\/3637422","DOI":"10.1145\/3637422"},{"key":"e_1_3_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278726"},{"key":"e_1_3_3_3_90_2","doi-asserted-by":"publisher","unstructured":"Manuela\u00a0M. Veloso. 2018. The Increasingly Fascinating Opportunity for Human-Robot-AI Interaction: The CoBot Mobile Service Robots. J. Hum.-Robot Interact. 7 1 Article 5 (may 2018) 2\u00a0pages. 10.1145\/3209541","DOI":"10.1145\/3209541"},{"key":"e_1_3_3_3_91_2","unstructured":"Anthony\u00a0J. Viera and Joanne\u00a0M. Garrett. 2005. Understanding interobserver agreement: the kappa statistic. 37 (2005). Issue 5. https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/15883903:"},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/3363384.3363396"},{"key":"e_1_3_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09823-9_4"},{"key":"e_1_3_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/3434073.3444666"},{"key":"e_1_3_3_3_95_2","unstructured":"Ben Wodecki. 2024. Researchers Use GPT-4 to Control Humanoid Robots with Natural Language. (2024). https:\/\/aibusiness.com\/nlp\/researchers-use-gpt-4-to-control-humanoid-robots-with-natural-language"},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"publisher","unstructured":"Richmond\u00a0Y. Wong. 2021. Tactics of Soft Resistance in User Experience Professionals\u2019 Values Work. Proc. ACM Hum.-Comput. Interact. 5 CSCW2 Article 355 (Oct. 2021) 28\u00a0pages. 10.1145\/3479499","DOI":"10.1145\/3479499"},{"key":"e_1_3_3_3_97_2","doi-asserted-by":"crossref","unstructured":"Hansol Woo Gerald\u00a0K LeTendre Trang Pham-Shouse and Yuhan Xiong. 2021. The use of social robots in classrooms: A review of field-based studies. Educational Research Review 33 (2021) 100388.","DOI":"10.1016\/j.edurev.2021.100388"},{"key":"e_1_3_3_3_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560416"},{"key":"e_1_3_3_3_99_2","doi-asserted-by":"publisher","unstructured":"Unai Zabala Igor Rodriguez Jos\u00e9\u00a0Mar\u00eda Mart\u00ednez-Otzeta and Elena Lazkano. 2021. Expressing Robot Personality through Talking Body Language. 11 10 (2021). 10.3390\/app11104639","DOI":"10.3390\/app11104639"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713471","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:33:18Z","timestamp":1751607198000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":98,"alternative-id":["10.1145\/3706598.3713471","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713471","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}