{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:05:47Z","timestamp":1776107147695,"version":"3.50.1"},"reference-count":70,"publisher":"MDPI AG","issue":"19","license":[{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100005416","name":"Norwegian Research Council under the SecuRoPS project \u201cUser-centered Security Framework for Social Robots in Public Spaces\u201d","doi-asserted-by":"publisher","award":["321324"],"award-info":[{"award-number":["321324"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Background: As social robots increasingly integrate into public spaces, comprehending their security implications becomes paramount. This study is conducted amidst the growing use of social robots in public spaces (SRPS), emphasising the necessity for tailored security standards for these unique robotic systems. Methods: In this systematic mapping study (SMS), we meticulously review and analyse existing literature from the Web of Science database, following guidelines by Petersen et al. We employ a structured approach to categorise and synthesise literature on SRPS security aspects, including physical safety, data privacy, cybersecurity, and legal\/ethical considerations. Results: Our analysis reveals a significant gap in existing safety standards, originally designed for industrial robots, that need to be revised for SRPS. We propose a thematic framework consolidating essential security guidelines for SRPS, substantiated by evidence from a considerable percentage of the primary studies analysed. Conclusions: The study underscores the urgent need for comprehensive, bespoke security standards and frameworks for SRPS. These standards ensure that SRPS operate securely and ethically, respecting individual rights and public safety, while fostering seamless integration into diverse human-centric environments. This work is poised to enhance public trust and acceptance of these robots, offering significant value to developers, policymakers, and the general public.<\/jats:p>","DOI":"10.3390\/s23198056","type":"journal-article","created":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T10:48:31Z","timestamp":1695552511000},"page":"8056","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Security Aspects of Social Robots in Public Spaces: A Systematic Mapping Study"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5784-8481","authenticated-orcid":false,"given":"Samson Ogheneovo","family":"Oruma","sequence":"first","affiliation":[{"name":"Department of Computer Science and Communication, \u00d8stfold University College, 1757 Halden, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8647-7621","authenticated-orcid":false,"given":"Yonas Zewdu","family":"Ayele","sequence":"additional","affiliation":[{"name":"Department of Risk, Safety, and Security, Institute for Energy Technology, 1777 Halden, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7788-560X","authenticated-orcid":false,"given":"Fabien","family":"Sechi","sequence":"additional","affiliation":[{"name":"Department of Risk, Safety, and Security, Institute for Energy Technology, 1777 Halden, Norway"}]},{"given":"Hanne","family":"R\u00f8dsethol","sequence":"additional","affiliation":[{"name":"Department of Control Room and Interaction Design, Institute for Energy Technology, 1777 Halden, Norway"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ge, S.S., Cabibihan, J.J., Salichs, M.A., Broadbent, E., He, H., Wagner, A.R., and Castro-Gonz\u00e1lez, \u00c1. (2018, January 28\u201330). Social Robots in Public Spaces: A Meta-review. Proceedings of the Social Robotics, Qingdao, China. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-030-05204-1"},{"key":"ref_2","unstructured":"Aymerich-Franch, L., and Ferrer, I. (2020). Innovation in Advertising and Branding Communication, Routledge."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Kyrarini, M., Lygerakis, F., Rajavenkatanarayanan, A., Sevastopoulos, C., Nambiappan, H.R., Chaitanya, K.K., Babu, A.R., Mathew, J., and Makedon, F. (2021). A Survey of Robots in Healthcare. Technologies, 9.","DOI":"10.3390\/technologies9010008"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Ifenthaler, D., Isa\u00edas, P., and Sampson, D.G. (2022). Orchestration of Learning Environments in the Digital World, Springer International Publishing. Cognition and Exploratory Learning in the Digital Age.","DOI":"10.1007\/978-3-030-90944-4"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Oruma, S.O., S\u00e1nchez-Gord\u00f3n, M., Colomo-Palacios, R., Gkioulos, V., and Hansen, J.K. (2022). A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface. Computers, 11.","DOI":"10.3390\/computers11120181"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/ITP-04-2018-0203","article-title":"How Many Facets Does a \u201cSocial Robot\u201d Have? A Review of Scientific and Popular Definitions Online","volume":"33","author":"Sarrica","year":"2019","journal-title":"Inf. Technol. People"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.3390\/smartcities3040056","article-title":"Artificial Intelligence and Robotics in Smart City Strategies and Planned Smart Development","volume":"3","author":"Golubchikov","year":"2020","journal-title":"Smart Cities"},{"key":"ref_8","unstructured":"Moallem, A. (2023, January 23\u201328). Threat Actors and Methods of Attack to Social Robots in Public Spaces. Proceedings of the HCI for Cybersecurity, Privacy and Trust, Copenhagen, Denmark. Lecture Notes in Computer Science."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Morales, C.G., Carter, E.J., Tan, X.Z., and Steinfeld, A. (2019, January 17\u201319). Interaction Needs and Opportunities for Failing Robots. Proceedings of the 2019 on Designing Interactive Systems Conference, New York, NY, USA. DIS \u201919.","DOI":"10.1145\/3322276.3322345"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"63205","DOI":"10.1109\/ACCESS.2023.3288338","article-title":"Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey","volume":"11","author":"Oruma","year":"2023","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"101726","DOI":"10.1016\/j.techsoc.2021.101726","article-title":"The Ethical Issues of Social Assistive Robotics: A Critical Literature Review","volume":"67","author":"Boada","year":"2021","journal-title":"Technol. Soc."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"105528","DOI":"10.1016\/j.clsr.2021.105528","article-title":"Cybersecurity, Safety and Robots: Strengthening the Link between Cybersecurity and Safety in the Context of Care Robots","volume":"41","author":"Mahler","year":"2021","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_13","unstructured":"Mayoral-Vilches, V. (2021). Robot Cybersecurity, a Review. Int. J. Cyber Forensics Adv. Threat. Investig., 20."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"36:1","DOI":"10.1145\/3583741","article-title":"Core Challenges of Social Robot Navigation: A Survey","volume":"12","author":"Mavrogiannis","year":"2023","journal-title":"ACM Trans. Hum.-Robot Interact."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1177\/2050157919843961","article-title":"The Privacy Implications of Social Robots: Scoping Review and Expert Interviews","volume":"7","author":"Lutz","year":"2019","journal-title":"Mob. Media Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1007\/s00146-020-01125-5","article-title":"The Regulatory Intersections between Artificial Intelligence, Data Protection and Cyber Security: Challenges and Opportunities for the EU Legal Framework","volume":"36","year":"2021","journal-title":"AI Soc."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s12369-016-0392-5","article-title":"Acceptance of Social Robots by Elder People: Does Psychosocial Functioning Matter?","volume":"9","author":"Baisch","year":"2017","journal-title":"Int. J. Soc. Robot."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"6559","DOI":"10.1109\/LRA.2020.3015461","article-title":"A Feasibility Study of Culture-Aware Cloud Services for Conversational Robots","volume":"5","author":"Recchiuto","year":"2020","journal-title":"IEEE Robot. Autom. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Vulpe, A., Cr\u0103ciunescu, R., Dr\u0103gulinescu, A.M., Kyriazakos, S., Paikan, A., and Ziafati, P. (2021). Enabling Security Services in Socially Assistive Robot Scenarios for Healthcare Applications. Sensors, 21.","DOI":"10.3390\/s21206912"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","article-title":"Guidelines for Conducting Systematic Mapping Studies in Software Engineering: An Update","volume":"64","author":"Petersen","year":"2015","journal-title":"Inf. Softw. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Petersen, K., Feldt, R., Mujtaba, S., and Mattsson, M. (2008, January 26\u201327). Systematic Mapping Studies in Software Engineering. Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE), Bari, Italy.","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"ref_22","first-page":"1","article-title":"Procedures for Performing Systematic Reviews","volume":"Volume 33","author":"Kitchenham","year":"2004","journal-title":"Keele University Technical Report TR\/SE-0401"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2049","DOI":"10.1016\/j.infsof.2013.07.010","article-title":"A Systematic Review of Systematic Review Process Research in Software Engineering","volume":"55","author":"Kitchenham","year":"2013","journal-title":"Inf. Softw. Technol."},{"key":"ref_24","unstructured":"Weidt, F., and Rodrigo, S. (2016). Systematic Literature Review in Computer Science-a Practical Guide, Federal University of Juiz de Fora. Technical Report RelaTeDCC 002\/2016."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Oruma, S.O., Ayele, Y., Sechi, F., and R\u00f8dsehol, H. (2023). Supplementary Materials to \u201cSecurity Aspects of Social Robots in Public Spaces: A Systematic Mapping Study\u201d\u2014Mendeley Data. Mendeley Data.","DOI":"10.3390\/s23198056"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.infsof.2018.10.006","article-title":"Identifying, Categorizing and Mitigating Threats to Validity in Software Engineering Secondary Studies","volume":"106","author":"Ampatzoglou","year":"2019","journal-title":"Inf. Softw. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Sj\u00f8berg, D.I., and Bergersen, G.R. (2023, January 14\u201316). Improving the Reporting of Threats to Construct Validity. Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, Oulu, Finland. EASE \u201923.","DOI":"10.1145\/3593434.3593449"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/s10846-020-01286-x","article-title":"A Dynamic Behavior Control Framework for Physical Human-Robot Interaction","volume":"101","author":"Liu","year":"2020","journal-title":"J. Intell. Robot. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Farina, M., Zhdanov, P., Karimov, A., and Lavazza, A. (2022). AI and Society: A Virtue Ethics Approach. AI Soc., 1\u201314.","DOI":"10.1007\/s00146-022-01545-5"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Marchang, J., and Di Nuovo, A. (2022). Assistive Multimodal Robotic System (AMRSys): Security and Privacy Issues, Challenges, and Possible Solutions. Appl. Sci., 12.","DOI":"10.3390\/app12042174"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s10676-020-09573-9","article-title":"We Need to Talk about Deception in Social Robotics!","volume":"23","author":"Sharkey","year":"2021","journal-title":"Ethics Inf. Technol."},{"key":"ref_32","unstructured":"Cerrudo, C. (2017). Cybersecurity Insights, IOActive Inc."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"eaan6080","DOI":"10.1126\/scirobotics.aan6080","article-title":"Transparent, Explainable, and Accountable AI for Robotics","volume":"2","author":"Wachter","year":"2017","journal-title":"Sci. Robot."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"15060","DOI":"10.1007\/s11227-022-04487-3","article-title":"Building a Speech Recognition System with Privacy Identification Information Based on Google Voice for Social Robots","volume":"78","author":"Lin","year":"2022","journal-title":"J. Supercomput."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Krupp, M.M., Rueben, M., Grimm, C.M., and Smart, W.D. (2017, January 6\u20139). Privacy and Telepresence Robotics: What Do Non-scientists Think?. Proceedings of the Companion of the 2017 ACM\/IEEE International Conference on Human-Robot Interaction, New York, NY, USA. HRI \u201917.","DOI":"10.1145\/3029798.3038384"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Rueben, M., Bernieri, F.J., Grimm, C.M., and Smart, W.D. (2017, January 6\u20139). Framing Effects on Privacy Concerns about a Home Telepresence Robot. Proceedings of the 2017 ACM\/IEEE International Conference on Human-Robot Interaction, New York, NY, USA. HRI \u201917.","DOI":"10.1145\/2909824.3020218"},{"key":"ref_37","first-page":"207404","article-title":"Contextual Trust Model with a Humanoid Robot Defense for Attacks to Smart Eco-Systems","volume":"8","author":"Abate","year":"2020","journal-title":"IEEE Access Pract. Innov. Open Solut."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Silva, J.R., Sim\u00e3o, M., Mendes, N., and Neto, P. (2019, January 14\u201317). Navigation and Obstacle Avoidance: A Case Study Using Pepper Robot. Proceedings of the IECON 2019\u201445th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal.","DOI":"10.1109\/IECON.2019.8927009"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Barra, P., Bisogni, C., Rapuano, A., Abate, A.F., and Iovane, G. (2019, January 5\u20138). HiMessage: An Interactive Voice Mail System with the Humanoid Robot Pepper. Proceedings of the 2019 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), Fukuoka, Japan.","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00123"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Abate, A.F., Bisogni, C., Cascone, L., Castiglione, A., Costabile, G., and Mercuri, I. (2020, January 17\u201322). Social Robot Interactions for Social Engineering: Opportunities and Open Issues. Proceedings of the 2020 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), Calgary, AB, Canada.","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00097"},{"key":"ref_41","first-page":"1","article-title":"Cybersecurity, Value Sensing Robots for LGBTIQ+ Elderly, and the Need for Revised Codes of Conduct","volume":"24","author":"Poulsen","year":"2020","journal-title":"Australas. J. Inf. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Clark, G.W., Doran, M.V., and Andel, T.R. (2017, January 27\u201331). Cybersecurity Issues in Robotics. Proceedings of the 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Savannah, GA, USA.","DOI":"10.1109\/COGSIMA.2017.7929597"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"e10410","DOI":"10.2196\/10410","article-title":"Health Care Robotics: Qualitative Exploration of Key Challenges and Future Directions","volume":"20","author":"Cresswell","year":"2018","journal-title":"J. Med. Internet Res."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Fosch-Villaronga, E. (2019). Robots, Healthcare, and the Law: Regulating Automation in Personal Care, Routledge. [1st ed.].","DOI":"10.4324\/9780429021930"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Fosch-Villaronga, E., Felzmann, H., Ramos-Montero, M., and Mahler, T. (2018, January 1\u20135). Cloud Services for Robotic Nurses? Assessing Legal and Ethical Issues in the Use of Cloud Services for Healthcare Robots. Proceedings of the 2018 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), Madrid, Spain.","DOI":"10.1109\/IROS.2018.8593591"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.robot.2019.06.003","article-title":"Cloud Robotics Law and Regulation: Challenges in the Governance of Complex and Dynamic Cyber\u2013Physical Ecosystems","volume":"119","author":"Millard","year":"2019","journal-title":"Robot. Auton. Syst."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Kreps, D., Ess, C., Leenen, L., and Kimppa, K. (2018). This Changes Everything\u2014ICT and Climate Change: What Can We Do? IFIP Advances in Information and Communication Technology, Springer Nature Switzerland AG.","DOI":"10.1007\/978-3-319-99605-9"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s10506-017-9214-9","article-title":"Of, for, and by the People: The Legal Lacuna of Synthetic Persons","volume":"25","author":"Bryson","year":"2017","journal-title":"Artif. Intell. Law"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1109\/TMM.2018.2882744","article-title":"Emotion-Aware Multimedia Systems Security","volume":"21","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Multimed."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"eabd5186","DOI":"10.1126\/scirobotics.abd5186","article-title":"Persuasive Robots Should Avoid Authority: The Effects of Formal and Real Authority on Persuasion in Human-Robot Interaction","volume":"6","author":"Saunderson","year":"2021","journal-title":"Sci. Robot."},{"key":"ref_51","first-page":"11:1","article-title":"Stop Ignoring Me! On Fighting the Trivialization of Social Robots in Public Spaces","volume":"11","author":"Schneider","year":"2022","journal-title":"Acm Trans.-Hum. Interact."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Giansanti, D., and Gulino, R.A. (2021). The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives. Healthcare, 9.","DOI":"10.3390\/healthcare9121653"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s11948-019-00084-5","article-title":"Building Moral Robots: Ethical Pitfalls and Challenges","volume":"26","author":"Gordon","year":"2020","journal-title":"Sci. Eng. Ethics"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Miller, J., Williams, A.B., and Perouli, D. (2018, January 5\u20138). A Case Study on the Cybersecurity of Social Robots. Proceedings of the Companion of the 2018 ACM\/IEEE International Conference on Human-Robot Interaction, Chicago, IL, USA. HRI \u201918.","DOI":"10.1145\/3173386.3177078"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Akalin, N., Kristoffersson, A., and Loutfi, A. (2019). The Influence of Feedback Type in Robot-Assisted Training. Multimodal Technol. Interact., 3.","DOI":"10.3390\/mti3040067"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Korn, O. (2019). Social Robots: Technological, Societal and Ethical Aspects of Human-Robot Interaction, Springer International Publishing.","DOI":"10.1007\/978-3-030-17107-0"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Kheddar, A., Yoshida, E., Ge, S.S., Suzuki, K., Cabibihan, J.J., Eyssel, F., and He, H. (2017, January 22\u201324). An Evaluation Tool of the Effect of Robots in Eldercare on the Sense of Safety and Security. Proceedings of the Social Robotics, Tsukuba, Japan. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-319-70022-9"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s12369-021-00776-8","article-title":"Top of the Class: Mining Product Characteristics Associated with Crowdfunding Success and Failure of Home Robots","volume":"14","author":"Randall","year":"2022","journal-title":"Int. J. Soc. Robot."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1007\/s12369-019-00581-4","article-title":"TROS: Protecting Humanoids ROS from Privileged Attackers","volume":"12","author":"Mazzeo","year":"2020","journal-title":"Int. J. Soc. Robot."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Breiling, B., Dieber, B., and Schartner, P. (2017, January 24\u201327). Secure Communication for the Robot Operating System. Proceedings of the 2017 Annual IEEE International Systems Conference (SysCon), Montreal, QC, Canada.","DOI":"10.1109\/SYSCON.2017.7934755"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.robot.2017.09.017","article-title":"Security for the Robot Operating System","volume":"98","author":"Dieber","year":"2017","journal-title":"Robot. Auton. Syst."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Dieber, B., Kacianka, S., Rass, S., and Schartner, P. (2016, January 9\u201314). Application-Level Security for ROS-based Applications. Proceedings of the 2016 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), Daejeon, Republic of Korea.","DOI":"10.1109\/IROS.2016.7759659"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., Chaudhuri, R., and Vrontis, D. (2021). Usage Intention of Social Robots for Domestic Purpose: From Security, Privacy, and Legal Perspectives. Inf. Syst. Front., 1\u201316.","DOI":"10.1007\/s10796-021-10197-7"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1108\/IJIUS-09-2019-0051","article-title":"Impact of AI Regulation on Intention to Use Robots: From Citizens and Government Perspective","volume":"8","author":"Chatterjee","year":"2019","journal-title":"Int. J. Intell. Unmanned Syst."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Gutwirth, S., Leenes, R., and De Hert, P. (2016). Data Protection on the Move: Current Developments in ICT and Privacy\/Data Protection, Springer.","DOI":"10.1007\/978-94-017-7376-8"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3442678","article-title":"On the Safety of Mobile Robots Serving in Public Spaces: Identifying Gaps in EN ISO 13482:2014 and Calling for a New Standard","volume":"10","author":"Salvini","year":"2021","journal-title":"ACM Trans. Hum.-Robot Interact."},{"key":"ref_67","unstructured":"(2023, September 19). 7001-2021\u2014IEEE Standard for Transparency of Autonomous Systems. Available online: https:\/\/ieeexplore.ieee.org\/document\/9726144."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"665729","DOI":"10.3389\/frobt.2021.665729","article-title":"IEEE P7001: A Proposed Standard on Transparency","volume":"8","author":"Winfield","year":"2021","journal-title":"Front. Robot. AI"},{"key":"ref_69","unstructured":"(2023, September 19). ISO\/TS 15066: 2016 Robots and Robotic Devices\u2014Collaborative Robots. Available online: https:\/\/www.iso.org\/standard\/62996.html."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Oruma, S.O. (2023, January 14\u201316). Towards a User-centred Security Framework for Social Robots in Public Spaces. Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, Oulu, Finland. EASE \u201923.","DOI":"10.1145\/3593434.3593446"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/19\/8056\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:57:05Z","timestamp":1760129825000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/19\/8056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,24]]},"references-count":70,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["s23198056"],"URL":"https:\/\/doi.org\/10.3390\/s23198056","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,24]]}}}