1,952
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Walking Away from the Robot: Negotiating Privacy with a Robot

      proceedings-article
      ,
      Proceedings of the 31st International BCS Human Computer Interaction Conference (HCI 2017) (HCI)
      digital make-believe, with delegates considering our expansive
      3 - 6 July 2017
      Privacy, Robots, Sensors, Internet of Things, Human-robot interaction, Movement
      Bookmark

            Abstract

            Privacy is often applied as an abstract concept in law and regulations. In everyday life, negotiating what information to share with whom, where, and at what times, and in what situations may be a challenge at home and in public space. We apply Palen and Dourish’s framework for understanding and discussing privacy to a setting of living with moving robots at home. We compare different ways sensors might be placed in a home environment, and what role proxemics, or motion technologies might have for the negotiation of privacy. By highlighting the role of the place and movement of the sensors, we discuss concrete privacy issues that are emerging with networked robot technologies at home. We hope to contribute new ways of thinking to users, designers, and analysts for creating and using mobile, networked technologies in domestic places.

            Content

            Author and article information

            Contributors
            Conference
            July 2017
            July 2017
            : 1-6
            Affiliations
            [0001]University of Oslo

            Postbox 1072 Blindern

            0316 Oslo
            Article
            10.14236/ewic/HCI2017.83
            bc1e9a7c-e96e-4955-9ac6-8aad8454a89f
            © Schulz et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2017 – Digital Make-Believe. Sunderland, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 31st International BCS Human Computer Interaction Conference (HCI 2017)
            HCI
            31
            Sunderland, UK
            3 - 6 July 2017
            Electronic Workshops in Computing (eWiC)
            digital make-believe, with delegates considering our expansive
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2017.83
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Privacy,Robots,Sensors,Internet of Things,Human-robot interaction,Movement

            reference

            1. 1975 “The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding” https://eric.ed.gov/?id=ED131515

            2. 1996 “Walking Away from the Desktop Computer: Distributed Collaboration and Mobility in a Product Design Team.” Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work 209 218 CSCW '96 New York, NY, USA ACM doi:10.1145/240080.240256

            3. 1993 “Design for Privacy in Ubiquitous Computing Environments.” Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13-17 September 1993 Milan, Italy ECSCW ’93 77 92 Springer Netherlands doi:10.1007/978-94-011-2094-4_6

            4. 2015 “The Privacy-Utility Tradeoff for Remotely Teleoperated Robots.” Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction 27 34 HRI '15 New York, NY, USA ACM doi:10.1145/2696454.2696484

            5. 2012 “The Effect of Monitoring by Cameras and Robots on the Privacy Enhancing Behaviors of Older Adults.” 2012 7th ACM/IEEE International Conference on Human-Robot Interaction (HRI) 343 50 doi:10.1145/2157689.2157807

            6. 2010 “Robots and Privacy.” SSRN Scholarly Paper ID 1599189 Rochester, NY Social Science Research Network https://pa-pers.ssrn.com/abstract=1599189

            7. 2011 “The Drone as Privacy Catalyst.” SSRN Scholarly Paper ID 2340753 Rochester, NY Social Science Research Network https://papers.ssrn.com/abstract=2340753

            8. 2007 “Benchmarks for Evaluating Socially Assistive Robotics.” Interaction Studies 8 3 423 39 doi:10.1075/is.8.3.07fei

            9. 2012 “On the Internet of Things, Trust Is Relative.” Constructing Ambient Intelligence 277 267 273 Communications in Computer and Information Science Berlin Springer Berlin Heidelberg

            10. 2010 “Negotiating Privacy Boundaries in Social Applications for Accessibility Mapping.” Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries 217 225 NordiCHI '10 New York, NY, USA ACM doi:10.1145/1868914.1868942

            11. 2015 “Using Video Manipulation to Protect Privacy in Remote Presence Systems.” Social Robotics 245 54 Lecture Notes in Computer Science 9388 Springer International Publishing doi:10.1007/978-3-319-25554-5_25

            12. 2015 “Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems.” Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction Extended Abstracts 59 60 HRI'15 Extended Abstracts New York, NY, USA ACM doi:10.1145/2701973.2702048

            13. 2007 “What Is a Human?: Toward Psychological Benchmarks in the Field of Human-robot Interaction.” Interaction Studies 8 3 363 90 doi:10.1075/is.8.3.04kah

            14. 2012 Human-Robot Interaction in Social Robotics CRC Press

            15. 2009 “Fall Detection in Toilet Rooms Using Thermal Imaging Sensors.” 2009 IEEE/SICE International Symposium on System Integration (SII) 83 88 doi: 10.1109/SI.2009.5384550

            16. 1968 2001: A Space Odyssey

            17. 2001 “Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems.” Ubicomp 2001: Ubiquitous Computing 2201 273 291 Springer Berlin/Heidelberg http://dx.doi.org/10.1007/3-540-45427-6_23

            18. 2011 “Vision-Based Contingency Detection.” Proceedings of the 6th International Conference on Human-Robot Interaction 297 304 HRI ’11 New York, NY, USA ACM doi:10.1145/1957656.1957780

            19. 2003 “Unpacking ‘Privacy’ for a Networked World.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 129 136 CHI ’03 New York, NY, USA ACM doi:10.1145/642611.642635

            20. 2016 “Evaluation of Physical Marker Interfaces for Protecting Visual Privacy from Mobile Robots.” 2016 25th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN) 787 94 doi: 10.1109/ROMAN.2016.7745209

            21. 2017 “Framing Effects on Privacy Concerns About a Home Telepresence Robot.” Proceedings of the 2017 ACM/IEEE International Conference on Human-Robot Interaction 435 444 HRI ’17 New York, NY, USA ACM doi:10.1145/2909824.3020218

            22. 2014 “A Case Study for Universal Design in the Internet of Things.” Universal Design 2014: Three Days of Creativity and Diversity 45 54 IOS Press http://ebooks.iospress.nl/volume/universal-de-sign-2014-three-davs-of-creativitv-and-diversity

            23. 2007 “He Knows When You Are Sleeping-Privacy and the Personal Robot Companion.” Proc. Workshop Human Implications of Human-robot Interaction, Association for the Advancement of Artificial Intelligence (AAAI’07) 28 33 http://www.aaai.org/Pa-pers/Workshops/2007/WS-07-07/WS07-07-006.pdf

            24. 2016 “Body Coupled Wideband Monopole Antenna.” 2016 Loughborough Antennas Propagation Conference (LAPC) 1 5 doi: 10.1109/LAPC.2016.7807483

            25. 1890 “The Right to Privacy.” Harvard Law Review 4 5 193 220 doi:10.2307/1321160

            Comments

            Comment on this article