Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3613905.3650971acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Work in Progress

Investigating Limits and Effectiveness of Privacy Conversations: the Case of Service Robots in an Office Environment

Published: 11 May 2024 Publication History

Abstract

Social robots, capable of moving and acting autonomously in spaces inhabited by humans, are becoming more and more a reality. From a privacy-sensitive design perspective, and compared to digital technology, robots present additional challenges, as they are equipped with many sensors to acquire data to move around autonomously and interact with their users. This may raise privacy concerns and privacy conversations have been proposed as a means to address such concerns. In this paper we present a study of the effectiveness of such conversations, the topics addressed and the types of questions asked. Our findings illustrate the potential of such conversations with an embodied, or, with a virtual agent, according to the user convenience and type of inquiry. They also illustrate a variety of conversation styles. These positive results are counterbalanced by current technical limitations of conversational agents. They also show that in some cases conversations with humans are preferred.

Supplemental Material

MP4 File - Video Preview
Video Preview
Transcript for: Video Preview

References

[1]
Louise Barkhuus. 2012. The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Austin, Texas, USA) (CHI ’12). Association for Computing Machinery, New York, NY, USA, 367–376. https://doi.org/10.1145/2207676.2207727
[2]
Cara Bloom, Joshua Tan, Javed Ramjohn, and Lujo Bauer. 2017. Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles. In Symposium On Usable Privacy and Security.
[3]
Wasja Brunotte, Larissa Chazette, Lukas Kohler, Jil Klunder, and Kurt Schneider. 2022. What About My Privacy?Helping Users Understand Online Privacy Policies. In Proceedings of the International Conference on Software and System Processes and International Conference on Global Software Engineering. ACM, Pittsburgh PA USA, 56–65. https://doi.org/10.1145/3529320.3529327
[4]
M. Ryan Calo. 2011. Against Notice Skepticism In Privacy (And Elsewhere). Notre Dame Law Review 87 (03 2011).
[5]
Nico Ebert, Kurt Alexander Ackermann, and Björn Scheppler. 2021. Bolder is Better: Raising User Awareness through Salient and Concise Privacy Notices. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI ’21). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3411764.3445516
[6]
Martin Ford. 2016. The Rise of the Robots: Technology and the Threat of Mass Unemployment. Oneworld Publications. https://books.google.fr/books?id=us2kjgEACAAJ
[7]
Eduard Fosch Villaronga, Heike Felzmann, Robin Pierce, Silvia Conca, Aviva Groot, Aida Ponce Del Castillo, and Scott Robbins. 2018. Nothing Comes between My Robot and Me: Privacy and Human-Robot Interaction in Robotised Healthcare. https://doi.org/10.5040/9781509926237.ch-004
[8]
Scientific Software Development GmbH. 2023. Atlasti. https://atlasti.com/ [Accessed: (September 2023)].
[9]
Wentao Guo, Jay Rodolitz, and Eleanor Birrell. 2020. Poli-see: An Interactive Tool for Visualizing Privacy Policies. In Proceedings of the 19th Workshop on Privacy in the Electronic Society. ACM, Virtual Event USA, 57–71. https://doi.org/10.1145/3411497.3420221
[10]
Hamza Harkous, Kassem Fawaz, Kang G. Shin, and Karl Aberer. 2016. PriBots: Conversational Privacy with Chatbots. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO. https://www.usenix.org/conference/soups2016/workshop-program/wfpn/presentation/harkous
[11]
Christian Hoffmann, Christoph Lutz, and Giulia Ranzini. 2016. Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 10 (12 2016). https://doi.org/10.5817/CP2016-4-7
[12]
Danie A. Horne. 2007-06-01. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors.The journal of consumer affairs. 41, 1 (2007-06-01).
[13]
Timo Jakobi, Fatemeh Alizadeh, Martin Marburger, and Gunnar Stevens. 2021. A Consumer Perspective on Privacy Risk Awareness of Connected Car Data Use. (2021). https://doi.org/10.1145/3473856.3473891 Accepted: 2021-09-03T19:10:19Z Publisher: ACM.
[14]
Min Kyung Lee, Daniel Kusbit, Evan Metsky, and Laura Dabbish. 2015. Working with Machines: The Impact of Algorithmic and Data-Driven Management on Human Workers. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI ’15). Association for Computing Machinery, New York, NY, USA, 1603–1612. https://doi.org/10.1145/2702123.2702548
[15]
Christoph Lutz, Maren Schöttler, and Christian Hoffmann. 2019. The Privacy Implications of Social Robots: Scoping Review and Expert Interviews. Mobile Media & Communication 7 (09 2019), 412–434. https://doi.org/10.1177/2050157919843961
[16]
Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. Journal of Law and Policy for the Information Society 4 (2008), 543–568.
[17]
NAVER. 2023. Rookie is working hard at NAVER 1784. https://youtu.be/6eGtl5LQpf8 [Accessed: (January 2024)].
[18]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79, 1 (Feb. 2004), 119–157.
[19]
OpenAI. 2021. ChatGPT. https://openai.com/[Accessed: (May 2023)].
[20]
Leysia Palen and Paul Dourish. 2003. Unpacking "Privacy" for a Networked World. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Ft. Lauderdale, Florida, USA) (CHI ’03). Association for Computing Machinery, New York, NY, USA, 129–136. https://doi.org/10.1145/642611.642635
[21]
Domink Pins, Timo Jakobi, Gunnar Stevens, Fatemeh Alizadeh, and Jana Krüger. 2023. Finding, getting and understanding: The User Journey for the GDPR’S Right to Access. 41 (05 2023), 2174–2200.
[22]
[22] Prolific. 2024. https://www.prolific.com/ [Accessed: (January 2024)].
[23]
Matthew Rueben, Alexander Mois Aroyo, Christoph Lutz, Johannes Schmölz, Pieter Van Cleynenbreugel, Andrea Corti, Siddharth Agrawal, and William D. Smart. 2018. Themes and Research Directions in Privacy-Sensitive Robotics. In 2018 IEEE Workshop on Advanced Robotics and Its Social Impacts (ARSO) (Genova, Italy). IEEE Press, 77–84. https://doi.org/10.1109/ARSO.2018.8625758
[24]
Matthew Rueben, Cindy M. Grimm, Frank J. Bernieri, and William D. Smart. 2017. A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics. (2017). https://doi.org/10.48550/ARXIV.1701.00841
[25]
Rahul Shome, Zachary Kingston, and Lydia E. Kavraki. 2023. Robots as AI Double Agents: Privacy in Motion Planning. http://arxiv.org/abs/2308.03385 arXiv:2308.03385 [cs].
[26]
Richmond Y. Wong and Deirdre K. Mulligan. 2019. Bringing Design to the Privacy Table: Broadening “Design” in “Privacy by Design” Through the Lens of HCI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–17. https://doi.org/10.1145/3290605.3300492
[27]
Daseul Yang, Yu-Jung Chae, Doogon Kim, Yoonseob Lim, Dong Hwan Kim, ChangHwan Kim, Sung-Kee Park, and Changjoo Nam. 2022. Effects of Social Behaviors of Robots in Privacy-Sensitive Situations. International Journal of Social Robotics 14, 2 (March 2022), 589–602. https://doi.org/yang2022

Cited By

View all
  • (2025)The privacy paradox in interactions with service robots in the workplaceThe International Journal of Human Resource Management10.1080/09585192.2024.2445135(1-28)Online publication date: 6-Jan-2025

Index Terms

  1. Investigating Limits and Effectiveness of Privacy Conversations: the Case of Service Robots in an Office Environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI EA '24: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems
    May 2024
    4761 pages
    ISBN:9798400703317
    DOI:10.1145/3613905
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 May 2024

    Check for updates

    Author Tags

    1. human-robot interaction
    2. privacy

    Qualifiers

    • Work in progress
    • Research
    • Refereed limited

    Conference

    CHI '24

    Acceptance Rates

    Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)189
    • Downloads (Last 6 weeks)36
    Reflects downloads up to 22 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)The privacy paradox in interactions with service robots in the workplaceThe International Journal of Human Resource Management10.1080/09585192.2024.2445135(1-28)Online publication date: 6-Jan-2025

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media