SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Privacy Concerns and Social Robots
Presenting New Empirical Evidence
New Friends Conference
Barcelona, November 3 2016
Christoph Lutz, christoph.lutz@bi.no - @lutzid Aurelia Tamò, @a_a_tamo
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 2 Agenda
• Background
• Survey Methods
• Results
• Implications & Outlook
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 3
Background
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 4
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 5
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 6
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 7
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 8
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 9
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 10
Methods
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 11 Data and Method
• Amazon Mechanical Turk survey with 500 individuals
• Respondents based in the United States
• 55% male, 45% female
• Most respondents have some college or a Bachelor’s degree (72%)
• Most respondents are employed (62%) or self-employed (16%) but
some other groups as well (students, unemployed, homemaker)
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 12 Robots in Different Social Contexts
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 13 Measurement (1/2)
Informational Privacy Concerns: Social (3 items)
Other users…
…engaging in identity theft through the robot
…hacking into the robot
…stalking me via the robot
Informational Privacy Concerns: Institutional (4 items)
The robot manufacturer…
…insufficiently protecting personal data
…tracking and analyzing personal data
…selling personal data to third parties
…sharing personal data with government agencies
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 14 Measurement (2/2)
Physical Concerns (5 items)
The robot…
…damaging or dirtying personal belongings,
…asking me personal questions
…entering areas it shouldn’t access
…using items it shouldn’t use
Social Bonding Concerns (4 items)
I become too emotionally attached to the robot.
I develop too intimate feelings towards the robot.
I develop an unhealthy friendship with the robot.
I become dependent on the robot.
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 15
Results
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 16
Informational Privacy Concerns: Social
(Other Users)
3.04 3.53 2.93
Identity Theft Hacking Stalking
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 17
Informational Privacy Concerns: Institutional
(Manufacturer)
3.70 3.71 3.74 3.72
Insufficient Data
Protection
Tracking and
Analyzing Data
Selling Data Sharing Data with
Government
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 18 Physical Privacy Concerns: Robot (1/2)
2.56 1.90 2.14
Damaging or Dirtying
Personal Belongings
Asking Personal
Questions
Snooping through
Personal Belongings
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 19 Physical Privacy Concerns: Robot (2/2)
2.40 2.08
Entering Areas It
Shouldn‘t Access
Using Items It
Shouldn‘t Use
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 20 Bonding Privacy Concerns: Robot - User
1.71
Emotional Attachment
1.36 1.52 2.32
Intimate Feelings Unhealthy
Friendship
Dependence
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 21 Summary and Further Findings
Type of Concern Average Value (1-5)
Informational Privacy Concerns:
Social (Other users)
3.17
Informational Privacy Concerns:
Institutional (Manufacturer)
3.72
Physical Privacy Concerns 2.25
Bonding Privacy Concerns 1.73
• High correlations between informational privacy concerns: social
and informational privacy concerns: institutional
• Moderate correlations (0.3) between informational privacy
concerns: institutional and physical privacy concerns
• Low correlations between bonding privacy concerns and other
concerns
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 22 Summary and Further Findings
• Privacy concerns correlate (weakly but) significantly with users‘ general
attitude towards robots. In particular, access concerns have a negative effect.
• Access concerns reduce users‘ trust in robots – and/or trust reduces users‘
access concerns.
• Interestingly, bonding concerns increase users‘ trust in robots – and/or trust
reduces users‘ bonding concerns.
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 23
Implications and Outlook
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 24 Implications
• Privacy concerns about robots are pronounced among respondents
• Necessity to distinguish different types of privacy concerns
• Informational privacy concerns: institutional most pronounced
⇒ Robots manufacturers should think about data protection!
⇒ Depiction of robots and AI in popular culture covers aspects most users
don’t worry about (bonding).
⇒ Users might underestimate robots’ bonding potential.
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 25 Outlook
• More (empirical) resarch to be done on robots and privacy
• Next step for us: bringing pieces together into a testable model
New Friends 2016
Privacy and Social Robots
Tamò & Lutz
Page 26
Thank You For Sharing
Your Thoughts
Norwegian Business School (BI)
Center for Internet & Society
Nydalsvn. 37 / N-0442 Oslo

Más contenido relacionado

La actualidad más candente

Policy for Social Media
Policy for Social MediaPolicy for Social Media
Policy for Social MediaMatthew Moore
 
Research, Education, and Cybersecurity Policies in India
Research, Education, and Cybersecurity Policies in India Research, Education, and Cybersecurity Policies in India
Research, Education, and Cybersecurity Policies in India IIIT Hyderabad
 
Workshop on Data Collection & Network Analysis with @Netlytic & the iGraph R ...
Workshop on Data Collection & Network Analysis with @Netlytic & the iGraph R ...Workshop on Data Collection & Network Analysis with @Netlytic & the iGraph R ...
Workshop on Data Collection & Network Analysis with @Netlytic & the iGraph R ...Toronto Metropolitan University
 
Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media IIIT Hyderabad
 
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...Farida Vis
 
Battle lines
Battle linesBattle lines
Battle linesswarooo
 
Social Media Data Collection & Network Analysis with Netlytic and R
Social Media Data Collection & Network Analysis with Netlytic and R Social Media Data Collection & Network Analysis with Netlytic and R
Social Media Data Collection & Network Analysis with Netlytic and R Toronto Metropolitan University
 
Credibility, Identity Resolution, Privacy, and Policing in Online Social Media
Credibility, Identity Resolution, Privacy, and Policing in Online Social MediaCredibility, Identity Resolution, Privacy, and Policing in Online Social Media
Credibility, Identity Resolution, Privacy, and Policing in Online Social MediaIIIT Hyderabad
 
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
2010   sept - mobile web africa - marc smith - says who - mapping social medi...2010   sept - mobile web africa - marc smith - says who - mapping social medi...
2010 sept - mobile web africa - marc smith - says who - mapping social medi...Marc Smith
 
Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media IIIT Hyderabad
 
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...IIIT Hyderabad
 
Shareworthiness and Motivated Reasoning in Hyper-Partisan News Sharing Behavi...
Shareworthiness and Motivated Reasoning in Hyper-Partisan News Sharing Behavi...Shareworthiness and Motivated Reasoning in Hyper-Partisan News Sharing Behavi...
Shareworthiness and Motivated Reasoning in Hyper-Partisan News Sharing Behavi...Axel Bruns
 
The Use of Social Media during the 2014 Crisis In Ukraine
The Use of Social Media during the 2014 Crisis In UkraineThe Use of Social Media during the 2014 Crisis In Ukraine
The Use of Social Media during the 2014 Crisis In Ukraine Toronto Metropolitan University
 
2013 Oxford Digital Humanities Summer School Workshop
2013 Oxford Digital Humanities Summer School Workshop2013 Oxford Digital Humanities Summer School Workshop
2013 Oxford Digital Humanities Summer School WorkshopEric Meyer
 
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...CODE BLUE
 

La actualidad más candente (20)

Policy for Social Media
Policy for Social MediaPolicy for Social Media
Policy for Social Media
 
Research, Education, and Cybersecurity Policies in India
Research, Education, and Cybersecurity Policies in India Research, Education, and Cybersecurity Policies in India
Research, Education, and Cybersecurity Policies in India
 
Workshop on Data Collection & Network Analysis with @Netlytic & the iGraph R ...
Workshop on Data Collection & Network Analysis with @Netlytic & the iGraph R ...Workshop on Data Collection & Network Analysis with @Netlytic & the iGraph R ...
Workshop on Data Collection & Network Analysis with @Netlytic & the iGraph R ...
 
Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media
 
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
 
Battle lines
Battle linesBattle lines
Battle lines
 
Social Media Data Collection & Network Analysis with Netlytic and R
Social Media Data Collection & Network Analysis with Netlytic and R Social Media Data Collection & Network Analysis with Netlytic and R
Social Media Data Collection & Network Analysis with Netlytic and R
 
Credibility, Identity Resolution, Privacy, and Policing in Online Social Media
Credibility, Identity Resolution, Privacy, and Policing in Online Social MediaCredibility, Identity Resolution, Privacy, and Policing in Online Social Media
Credibility, Identity Resolution, Privacy, and Policing in Online Social Media
 
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
2010   sept - mobile web africa - marc smith - says who - mapping social medi...2010   sept - mobile web africa - marc smith - says who - mapping social medi...
2010 sept - mobile web africa - marc smith - says who - mapping social medi...
 
Who are We Studying: Humans or Bots?
Who are We Studying: Humans or Bots? Who are We Studying: Humans or Bots?
Who are We Studying: Humans or Bots?
 
Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media
 
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
 
Shareworthiness and Motivated Reasoning in Hyper-Partisan News Sharing Behavi...
Shareworthiness and Motivated Reasoning in Hyper-Partisan News Sharing Behavi...Shareworthiness and Motivated Reasoning in Hyper-Partisan News Sharing Behavi...
Shareworthiness and Motivated Reasoning in Hyper-Partisan News Sharing Behavi...
 
Counting Women
Counting WomenCounting Women
Counting Women
 
Baresch2011
Baresch2011Baresch2011
Baresch2011
 
The Use of Social Media during the 2014 Crisis In Ukraine
The Use of Social Media during the 2014 Crisis In UkraineThe Use of Social Media during the 2014 Crisis In Ukraine
The Use of Social Media during the 2014 Crisis In Ukraine
 
2013 Oxford Digital Humanities Summer School Workshop
2013 Oxford Digital Humanities Summer School Workshop2013 Oxford Digital Humanities Summer School Workshop
2013 Oxford Digital Humanities Summer School Workshop
 
Rogers data days_2014_slides_opti
Rogers data days_2014_slides_optiRogers data days_2014_slides_opti
Rogers data days_2014_slides_opti
 
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
 
IGDTUW workshop
IGDTUW workshopIGDTUW workshop
IGDTUW workshop
 

Destacado

Online Non-Participation - Exploring Abstinence from Participatory Internet Uses
Online Non-Participation - Exploring Abstinence from Participatory Internet UsesOnline Non-Participation - Exploring Abstinence from Participatory Internet Uses
Online Non-Participation - Exploring Abstinence from Participatory Internet UsesChristoph Lutz
 
The Dark Side of Online Participation (AoIR 2016 talk)
The Dark Side of Online Participation (AoIR 2016 talk)The Dark Side of Online Participation (AoIR 2016 talk)
The Dark Side of Online Participation (AoIR 2016 talk)Christoph Lutz
 
Overexposed Portraits: Technology Overload and the Identities of the Young
Overexposed Portraits: Technology Overload and the Identities of the YoungOverexposed Portraits: Technology Overload and the Identities of the Young
Overexposed Portraits: Technology Overload and the Identities of the YoungChristoph Lutz
 
Nordic Centre for Internet & Society - An Introduction
Nordic Centre for Internet & Society - An IntroductionNordic Centre for Internet & Society - An Introduction
Nordic Centre for Internet & Society - An IntroductionChristoph Lutz
 
Content Creation on the Internet and the Participation Divide in Germany
Content Creation on the Internet and the Participation Divide in GermanyContent Creation on the Internet and the Participation Divide in Germany
Content Creation on the Internet and the Participation Divide in GermanyChristoph Lutz
 
Participatory Surprises - Exploring the Intersections of Serendipity, Partici...
Participatory Surprises - Exploring the Intersections of Serendipity, Partici...Participatory Surprises - Exploring the Intersections of Serendipity, Partici...
Participatory Surprises - Exploring the Intersections of Serendipity, Partici...Christoph Lutz
 
Open Data and Social Media
Open Data and Social MediaOpen Data and Social Media
Open Data and Social MediaChristoph Lutz
 
A Social Milieu Approach to the Online Participation Divides in Germany
A Social Milieu Approach to the Online Participation Divides in GermanyA Social Milieu Approach to the Online Participation Divides in Germany
A Social Milieu Approach to the Online Participation Divides in GermanyChristoph Lutz
 
Musikalische Geschmacksbreite und symbolische Grenzziehung im Internet
Musikalische Geschmacksbreite und symbolische Grenzziehung im InternetMusikalische Geschmacksbreite und symbolische Grenzziehung im Internet
Musikalische Geschmacksbreite und symbolische Grenzziehung im InternetChristoph Lutz
 
Connected for Success: How Network Centrality on ResearchGate Relates to Bibl...
Connected for Success: How Network Centrality on ResearchGate Relates to Bibl...Connected for Success: How Network Centrality on ResearchGate Relates to Bibl...
Connected for Success: How Network Centrality on ResearchGate Relates to Bibl...Christoph Lutz
 
Acm sig comm_robocode-ethicists
Acm sig comm_robocode-ethicistsAcm sig comm_robocode-ethicists
Acm sig comm_robocode-ethicistsChristoph Lutz
 
Beyond Citation Counts - The Potential of Academic Social Network Sites for S...
Beyond Citation Counts - The Potential of Academic Social Network Sites for S...Beyond Citation Counts - The Potential of Academic Social Network Sites for S...
Beyond Citation Counts - The Potential of Academic Social Network Sites for S...Christoph Lutz
 
Social Media in Science and Altmetrics - New Ways of Measuring Research Impact
Social Media in Science and Altmetrics - New Ways of Measuring Research Impact Social Media in Science and Altmetrics - New Ways of Measuring Research Impact
Social Media in Science and Altmetrics - New Ways of Measuring Research Impact Christoph Lutz
 
Agile for Embedded & System Software Development : Presented by Priyank KS
Agile for Embedded & System Software Development : Presented by Priyank KS Agile for Embedded & System Software Development : Presented by Priyank KS
Agile for Embedded & System Software Development : Presented by Priyank KS oGuild .
 
Interfaces to ubiquitous computing
Interfaces to ubiquitous computingInterfaces to ubiquitous computing
Interfaces to ubiquitous computingswati sonawane
 
iBeacons: Security and Privacy?
iBeacons: Security and Privacy?iBeacons: Security and Privacy?
iBeacons: Security and Privacy?Jim Fenton
 
Demystifying dependency Injection: Dagger and Toothpick
Demystifying dependency Injection: Dagger and ToothpickDemystifying dependency Injection: Dagger and Toothpick
Demystifying dependency Injection: Dagger and ToothpickDanny Preussler
 
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...Paolo Sammicheli
 

Destacado (20)

Online Non-Participation - Exploring Abstinence from Participatory Internet Uses
Online Non-Participation - Exploring Abstinence from Participatory Internet UsesOnline Non-Participation - Exploring Abstinence from Participatory Internet Uses
Online Non-Participation - Exploring Abstinence from Participatory Internet Uses
 
The Dark Side of Online Participation (AoIR 2016 talk)
The Dark Side of Online Participation (AoIR 2016 talk)The Dark Side of Online Participation (AoIR 2016 talk)
The Dark Side of Online Participation (AoIR 2016 talk)
 
Overexposed Portraits: Technology Overload and the Identities of the Young
Overexposed Portraits: Technology Overload and the Identities of the YoungOverexposed Portraits: Technology Overload and the Identities of the Young
Overexposed Portraits: Technology Overload and the Identities of the Young
 
Nordic Centre for Internet & Society - An Introduction
Nordic Centre for Internet & Society - An IntroductionNordic Centre for Internet & Society - An Introduction
Nordic Centre for Internet & Society - An Introduction
 
Content Creation on the Internet and the Participation Divide in Germany
Content Creation on the Internet and the Participation Divide in GermanyContent Creation on the Internet and the Participation Divide in Germany
Content Creation on the Internet and the Participation Divide in Germany
 
The WorldBot 2014
The WorldBot 2014The WorldBot 2014
The WorldBot 2014
 
Participatory Surprises - Exploring the Intersections of Serendipity, Partici...
Participatory Surprises - Exploring the Intersections of Serendipity, Partici...Participatory Surprises - Exploring the Intersections of Serendipity, Partici...
Participatory Surprises - Exploring the Intersections of Serendipity, Partici...
 
Open Data and Social Media
Open Data and Social MediaOpen Data and Social Media
Open Data and Social Media
 
A Social Milieu Approach to the Online Participation Divides in Germany
A Social Milieu Approach to the Online Participation Divides in GermanyA Social Milieu Approach to the Online Participation Divides in Germany
A Social Milieu Approach to the Online Participation Divides in Germany
 
Musikalische Geschmacksbreite und symbolische Grenzziehung im Internet
Musikalische Geschmacksbreite und symbolische Grenzziehung im InternetMusikalische Geschmacksbreite und symbolische Grenzziehung im Internet
Musikalische Geschmacksbreite und symbolische Grenzziehung im Internet
 
Connected for Success: How Network Centrality on ResearchGate Relates to Bibl...
Connected for Success: How Network Centrality on ResearchGate Relates to Bibl...Connected for Success: How Network Centrality on ResearchGate Relates to Bibl...
Connected for Success: How Network Centrality on ResearchGate Relates to Bibl...
 
Acm sig comm_robocode-ethicists
Acm sig comm_robocode-ethicistsAcm sig comm_robocode-ethicists
Acm sig comm_robocode-ethicists
 
Beyond Citation Counts - The Potential of Academic Social Network Sites for S...
Beyond Citation Counts - The Potential of Academic Social Network Sites for S...Beyond Citation Counts - The Potential of Academic Social Network Sites for S...
Beyond Citation Counts - The Potential of Academic Social Network Sites for S...
 
Social Media in Science and Altmetrics - New Ways of Measuring Research Impact
Social Media in Science and Altmetrics - New Ways of Measuring Research Impact Social Media in Science and Altmetrics - New Ways of Measuring Research Impact
Social Media in Science and Altmetrics - New Ways of Measuring Research Impact
 
Agile for Embedded & System Software Development : Presented by Priyank KS
Agile for Embedded & System Software Development : Presented by Priyank KS Agile for Embedded & System Software Development : Presented by Priyank KS
Agile for Embedded & System Software Development : Presented by Priyank KS
 
3.7 heap sort
3.7 heap sort3.7 heap sort
3.7 heap sort
 
Interfaces to ubiquitous computing
Interfaces to ubiquitous computingInterfaces to ubiquitous computing
Interfaces to ubiquitous computing
 
iBeacons: Security and Privacy?
iBeacons: Security and Privacy?iBeacons: Security and Privacy?
iBeacons: Security and Privacy?
 
Demystifying dependency Injection: Dagger and Toothpick
Demystifying dependency Injection: Dagger and ToothpickDemystifying dependency Injection: Dagger and Toothpick
Demystifying dependency Injection: Dagger and Toothpick
 
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
Agile London: Industrial Agility, How to respond to the 4th Industrial Revolu...
 

Similar a Privacy Concerns and Social Robots

Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Event Detectionification And Event Identification
Event Detectionification And Event IdentificationEvent Detectionification And Event Identification
Event Detectionification And Event IdentificationCarli Ferrante
 
Online Search And Society: Could Your Best Friend Be Your Worst Enemy?
Online Search And Society: Could Your Best Friend Be Your Worst Enemy?Online Search And Society: Could Your Best Friend Be Your Worst Enemy?
Online Search And Society: Could Your Best Friend Be Your Worst Enemy?Rachel Noonan
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxphilipnelson29183
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Michelle Ferrier
 
Argumentative Essay Cats Better Than Dogs
Argumentative Essay Cats Better Than DogsArgumentative Essay Cats Better Than Dogs
Argumentative Essay Cats Better Than DogsVanessa Perkins
 
Secure Data Transmission Through Multiple Hops
Secure Data Transmission Through Multiple HopsSecure Data Transmission Through Multiple Hops
Secure Data Transmission Through Multiple HopsTara Smith
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 
The use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processThe use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processPreeti Bhaskar
 
The use of social media in the recruitment process
The use of social media in the recruitment processThe use of social media in the recruitment process
The use of social media in the recruitment processBhagyashree Zope
 
Disadvantages Of Internet Research Paper
Disadvantages Of Internet Research PaperDisadvantages Of Internet Research Paper
Disadvantages Of Internet Research PaperTiffany Surratt
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social MediaDavid Cain
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationNathan Wright
 
Lecture 4: How do we MINE, ANALYSE & VISUALISE the Social Web? (VU Amsterdam ...
Lecture 4: How do we MINE, ANALYSE & VISUALISE the Social Web? (VU Amsterdam ...Lecture 4: How do we MINE, ANALYSE & VISUALISE the Social Web? (VU Amsterdam ...
Lecture 4: How do we MINE, ANALYSE & VISUALISE the Social Web? (VU Amsterdam ...Lora Aroyo
 

Similar a Privacy Concerns and Social Robots (20)

Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
Digital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPLDigital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPL
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Event Detectionification And Event Identification
Event Detectionification And Event IdentificationEvent Detectionification And Event Identification
Event Detectionification And Event Identification
 
Online Search And Society: Could Your Best Friend Be Your Worst Enemy?
Online Search And Society: Could Your Best Friend Be Your Worst Enemy?Online Search And Society: Could Your Best Friend Be Your Worst Enemy?
Online Search And Society: Could Your Best Friend Be Your Worst Enemy?
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Argumentative Essay Cats Better Than Dogs
Argumentative Essay Cats Better Than DogsArgumentative Essay Cats Better Than Dogs
Argumentative Essay Cats Better Than Dogs
 
Secure Data Transmission Through Multiple Hops
Secure Data Transmission Through Multiple HopsSecure Data Transmission Through Multiple Hops
Secure Data Transmission Through Multiple Hops
 
Social Crime
Social CrimeSocial Crime
Social Crime
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
Capsm twitter study 2010
Capsm twitter study 2010Capsm twitter study 2010
Capsm twitter study 2010
 
The use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processThe use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-process
 
The use of social media in the recruitment process
The use of social media in the recruitment processThe use of social media in the recruitment process
The use of social media in the recruitment process
 
Disadvantages Of Internet Research Paper
Disadvantages Of Internet Research PaperDisadvantages Of Internet Research Paper
Disadvantages Of Internet Research Paper
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
 
Lecture 4: How do we MINE, ANALYSE & VISUALISE the Social Web? (VU Amsterdam ...
Lecture 4: How do we MINE, ANALYSE & VISUALISE the Social Web? (VU Amsterdam ...Lecture 4: How do we MINE, ANALYSE & VISUALISE the Social Web? (VU Amsterdam ...
Lecture 4: How do we MINE, ANALYSE & VISUALISE the Social Web? (VU Amsterdam ...
 

Último

THE HISTOLOGY OF THE CARDIOVASCULAR SYSTEM 2024.pptx
THE HISTOLOGY OF THE CARDIOVASCULAR SYSTEM 2024.pptxTHE HISTOLOGY OF THE CARDIOVASCULAR SYSTEM 2024.pptx
THE HISTOLOGY OF THE CARDIOVASCULAR SYSTEM 2024.pptxAkinrotimiOluwadunsi
 
geometric quantization on coadjoint orbits
geometric quantization on coadjoint orbitsgeometric quantization on coadjoint orbits
geometric quantization on coadjoint orbitsHassan Jolany
 
PSP3 employability assessment form .docx
PSP3 employability assessment form .docxPSP3 employability assessment form .docx
PSP3 employability assessment form .docxmarwaahmad357
 
Main Exam Applied biochemistry final year
Main Exam Applied biochemistry final yearMain Exam Applied biochemistry final year
Main Exam Applied biochemistry final yearmarwaahmad357
 
Unit 3, Herbal Drug Technology, B Pharmacy 6th Sem
Unit 3, Herbal Drug Technology, B Pharmacy 6th SemUnit 3, Herbal Drug Technology, B Pharmacy 6th Sem
Unit 3, Herbal Drug Technology, B Pharmacy 6th SemHUHam1
 
Digitized Continuous Magnetic Recordings for the August/September 1859 Storms...
Digitized Continuous Magnetic Recordings for the August/September 1859 Storms...Digitized Continuous Magnetic Recordings for the August/September 1859 Storms...
Digitized Continuous Magnetic Recordings for the August/September 1859 Storms...Sérgio Sacani
 
Application of Foraminiferal Ecology- Rahul.pptx
Application of Foraminiferal Ecology- Rahul.pptxApplication of Foraminiferal Ecology- Rahul.pptx
Application of Foraminiferal Ecology- Rahul.pptxRahulVishwakarma71547
 
World Water Day 22 March 2024 - kiyorndlab
World Water Day 22 March 2024 - kiyorndlabWorld Water Day 22 March 2024 - kiyorndlab
World Water Day 22 March 2024 - kiyorndlabkiyorndlab
 
An intro to explainable AI for polar climate science
An intro to  explainable AI for  polar climate scienceAn intro to  explainable AI for  polar climate science
An intro to explainable AI for polar climate scienceZachary Labe
 
Bureau of Indian Standards Specification of Shampoo.pptx
Bureau of Indian Standards Specification of Shampoo.pptxBureau of Indian Standards Specification of Shampoo.pptx
Bureau of Indian Standards Specification of Shampoo.pptxkastureyashashree
 
SUKDANAN DIAGNOSTIC TEST IN PHYSICAL SCIENCE ANSWER KEYY.pdf
SUKDANAN DIAGNOSTIC TEST IN PHYSICAL SCIENCE ANSWER KEYY.pdfSUKDANAN DIAGNOSTIC TEST IN PHYSICAL SCIENCE ANSWER KEYY.pdf
SUKDANAN DIAGNOSTIC TEST IN PHYSICAL SCIENCE ANSWER KEYY.pdfsantiagojoderickdoma
 
Substances in Common Use for Shahu College Screening Test
Substances in Common Use for Shahu College Screening TestSubstances in Common Use for Shahu College Screening Test
Substances in Common Use for Shahu College Screening TestAkashDTejwani
 
Legacy Analysis of Dark Matter Annihilation from the Milky Way Dwarf Spheroid...
Legacy Analysis of Dark Matter Annihilation from the Milky Way Dwarf Spheroid...Legacy Analysis of Dark Matter Annihilation from the Milky Way Dwarf Spheroid...
Legacy Analysis of Dark Matter Annihilation from the Milky Way Dwarf Spheroid...Sérgio Sacani
 
IB Biology New syllabus B3.2 Transport.pptx
IB Biology New syllabus B3.2 Transport.pptxIB Biology New syllabus B3.2 Transport.pptx
IB Biology New syllabus B3.2 Transport.pptxUalikhanKalkhojayev1
 
Pests of wheat_Identification, Bionomics, Damage symptoms, IPM_Dr.UPR.pdf
Pests of wheat_Identification, Bionomics, Damage symptoms, IPM_Dr.UPR.pdfPests of wheat_Identification, Bionomics, Damage symptoms, IPM_Dr.UPR.pdf
Pests of wheat_Identification, Bionomics, Damage symptoms, IPM_Dr.UPR.pdfPirithiRaju
 
Thermonuclear explosions on neutron stars reveal the speed of their jets
Thermonuclear explosions on neutron stars reveal the speed of their jetsThermonuclear explosions on neutron stars reveal the speed of their jets
Thermonuclear explosions on neutron stars reveal the speed of their jetsSérgio Sacani
 
Identification of Superclusters and Their Properties in the Sloan Digital Sky...
Identification of Superclusters and Their Properties in the Sloan Digital Sky...Identification of Superclusters and Their Properties in the Sloan Digital Sky...
Identification of Superclusters and Their Properties in the Sloan Digital Sky...Sérgio Sacani
 
Genomics and Bioinformatics basics from genome to phenome
Genomics and Bioinformatics basics from genome to phenomeGenomics and Bioinformatics basics from genome to phenome
Genomics and Bioinformatics basics from genome to phenomeAjay Kumar Mahato
 
Applied Biochemistry feedback_M Ahwad 2023.docx
Applied Biochemistry feedback_M Ahwad 2023.docxApplied Biochemistry feedback_M Ahwad 2023.docx
Applied Biochemistry feedback_M Ahwad 2023.docxmarwaahmad357
 
Genetic Engineering in bacteria for resistance.pptx
Genetic Engineering in bacteria for resistance.pptxGenetic Engineering in bacteria for resistance.pptx
Genetic Engineering in bacteria for resistance.pptxaishnasrivastava
 

Último (20)

THE HISTOLOGY OF THE CARDIOVASCULAR SYSTEM 2024.pptx
THE HISTOLOGY OF THE CARDIOVASCULAR SYSTEM 2024.pptxTHE HISTOLOGY OF THE CARDIOVASCULAR SYSTEM 2024.pptx
THE HISTOLOGY OF THE CARDIOVASCULAR SYSTEM 2024.pptx
 
geometric quantization on coadjoint orbits
geometric quantization on coadjoint orbitsgeometric quantization on coadjoint orbits
geometric quantization on coadjoint orbits
 
PSP3 employability assessment form .docx
PSP3 employability assessment form .docxPSP3 employability assessment form .docx
PSP3 employability assessment form .docx
 
Main Exam Applied biochemistry final year
Main Exam Applied biochemistry final yearMain Exam Applied biochemistry final year
Main Exam Applied biochemistry final year
 
Unit 3, Herbal Drug Technology, B Pharmacy 6th Sem
Unit 3, Herbal Drug Technology, B Pharmacy 6th SemUnit 3, Herbal Drug Technology, B Pharmacy 6th Sem
Unit 3, Herbal Drug Technology, B Pharmacy 6th Sem
 
Digitized Continuous Magnetic Recordings for the August/September 1859 Storms...
Digitized Continuous Magnetic Recordings for the August/September 1859 Storms...Digitized Continuous Magnetic Recordings for the August/September 1859 Storms...
Digitized Continuous Magnetic Recordings for the August/September 1859 Storms...
 
Application of Foraminiferal Ecology- Rahul.pptx
Application of Foraminiferal Ecology- Rahul.pptxApplication of Foraminiferal Ecology- Rahul.pptx
Application of Foraminiferal Ecology- Rahul.pptx
 
World Water Day 22 March 2024 - kiyorndlab
World Water Day 22 March 2024 - kiyorndlabWorld Water Day 22 March 2024 - kiyorndlab
World Water Day 22 March 2024 - kiyorndlab
 
An intro to explainable AI for polar climate science
An intro to  explainable AI for  polar climate scienceAn intro to  explainable AI for  polar climate science
An intro to explainable AI for polar climate science
 
Bureau of Indian Standards Specification of Shampoo.pptx
Bureau of Indian Standards Specification of Shampoo.pptxBureau of Indian Standards Specification of Shampoo.pptx
Bureau of Indian Standards Specification of Shampoo.pptx
 
SUKDANAN DIAGNOSTIC TEST IN PHYSICAL SCIENCE ANSWER KEYY.pdf
SUKDANAN DIAGNOSTIC TEST IN PHYSICAL SCIENCE ANSWER KEYY.pdfSUKDANAN DIAGNOSTIC TEST IN PHYSICAL SCIENCE ANSWER KEYY.pdf
SUKDANAN DIAGNOSTIC TEST IN PHYSICAL SCIENCE ANSWER KEYY.pdf
 
Substances in Common Use for Shahu College Screening Test
Substances in Common Use for Shahu College Screening TestSubstances in Common Use for Shahu College Screening Test
Substances in Common Use for Shahu College Screening Test
 
Legacy Analysis of Dark Matter Annihilation from the Milky Way Dwarf Spheroid...
Legacy Analysis of Dark Matter Annihilation from the Milky Way Dwarf Spheroid...Legacy Analysis of Dark Matter Annihilation from the Milky Way Dwarf Spheroid...
Legacy Analysis of Dark Matter Annihilation from the Milky Way Dwarf Spheroid...
 
IB Biology New syllabus B3.2 Transport.pptx
IB Biology New syllabus B3.2 Transport.pptxIB Biology New syllabus B3.2 Transport.pptx
IB Biology New syllabus B3.2 Transport.pptx
 
Pests of wheat_Identification, Bionomics, Damage symptoms, IPM_Dr.UPR.pdf
Pests of wheat_Identification, Bionomics, Damage symptoms, IPM_Dr.UPR.pdfPests of wheat_Identification, Bionomics, Damage symptoms, IPM_Dr.UPR.pdf
Pests of wheat_Identification, Bionomics, Damage symptoms, IPM_Dr.UPR.pdf
 
Thermonuclear explosions on neutron stars reveal the speed of their jets
Thermonuclear explosions on neutron stars reveal the speed of their jetsThermonuclear explosions on neutron stars reveal the speed of their jets
Thermonuclear explosions on neutron stars reveal the speed of their jets
 
Identification of Superclusters and Their Properties in the Sloan Digital Sky...
Identification of Superclusters and Their Properties in the Sloan Digital Sky...Identification of Superclusters and Their Properties in the Sloan Digital Sky...
Identification of Superclusters and Their Properties in the Sloan Digital Sky...
 
Genomics and Bioinformatics basics from genome to phenome
Genomics and Bioinformatics basics from genome to phenomeGenomics and Bioinformatics basics from genome to phenome
Genomics and Bioinformatics basics from genome to phenome
 
Applied Biochemistry feedback_M Ahwad 2023.docx
Applied Biochemistry feedback_M Ahwad 2023.docxApplied Biochemistry feedback_M Ahwad 2023.docx
Applied Biochemistry feedback_M Ahwad 2023.docx
 
Genetic Engineering in bacteria for resistance.pptx
Genetic Engineering in bacteria for resistance.pptxGenetic Engineering in bacteria for resistance.pptx
Genetic Engineering in bacteria for resistance.pptx
 

Privacy Concerns and Social Robots

  • 1. Privacy Concerns and Social Robots Presenting New Empirical Evidence New Friends Conference Barcelona, November 3 2016 Christoph Lutz, christoph.lutz@bi.no - @lutzid Aurelia Tamò, @a_a_tamo
  • 2. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 2 Agenda • Background • Survey Methods • Results • Implications & Outlook
  • 3. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 3 Background
  • 4. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 4
  • 5. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 5
  • 6. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 6
  • 7. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 7
  • 8. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 8
  • 9. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 9
  • 10. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 10 Methods
  • 11. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 11 Data and Method • Amazon Mechanical Turk survey with 500 individuals • Respondents based in the United States • 55% male, 45% female • Most respondents have some college or a Bachelor’s degree (72%) • Most respondents are employed (62%) or self-employed (16%) but some other groups as well (students, unemployed, homemaker)
  • 12. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 12 Robots in Different Social Contexts
  • 13. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 13 Measurement (1/2) Informational Privacy Concerns: Social (3 items) Other users… …engaging in identity theft through the robot …hacking into the robot …stalking me via the robot Informational Privacy Concerns: Institutional (4 items) The robot manufacturer… …insufficiently protecting personal data …tracking and analyzing personal data …selling personal data to third parties …sharing personal data with government agencies
  • 14. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 14 Measurement (2/2) Physical Concerns (5 items) The robot… …damaging or dirtying personal belongings, …asking me personal questions …entering areas it shouldn’t access …using items it shouldn’t use Social Bonding Concerns (4 items) I become too emotionally attached to the robot. I develop too intimate feelings towards the robot. I develop an unhealthy friendship with the robot. I become dependent on the robot.
  • 15. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 15 Results
  • 16. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 16 Informational Privacy Concerns: Social (Other Users) 3.04 3.53 2.93 Identity Theft Hacking Stalking
  • 17. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 17 Informational Privacy Concerns: Institutional (Manufacturer) 3.70 3.71 3.74 3.72 Insufficient Data Protection Tracking and Analyzing Data Selling Data Sharing Data with Government
  • 18. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 18 Physical Privacy Concerns: Robot (1/2) 2.56 1.90 2.14 Damaging or Dirtying Personal Belongings Asking Personal Questions Snooping through Personal Belongings
  • 19. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 19 Physical Privacy Concerns: Robot (2/2) 2.40 2.08 Entering Areas It Shouldn‘t Access Using Items It Shouldn‘t Use
  • 20. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 20 Bonding Privacy Concerns: Robot - User 1.71 Emotional Attachment 1.36 1.52 2.32 Intimate Feelings Unhealthy Friendship Dependence
  • 21. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 21 Summary and Further Findings Type of Concern Average Value (1-5) Informational Privacy Concerns: Social (Other users) 3.17 Informational Privacy Concerns: Institutional (Manufacturer) 3.72 Physical Privacy Concerns 2.25 Bonding Privacy Concerns 1.73 • High correlations between informational privacy concerns: social and informational privacy concerns: institutional • Moderate correlations (0.3) between informational privacy concerns: institutional and physical privacy concerns • Low correlations between bonding privacy concerns and other concerns
  • 22. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 22 Summary and Further Findings • Privacy concerns correlate (weakly but) significantly with users‘ general attitude towards robots. In particular, access concerns have a negative effect. • Access concerns reduce users‘ trust in robots – and/or trust reduces users‘ access concerns. • Interestingly, bonding concerns increase users‘ trust in robots – and/or trust reduces users‘ bonding concerns.
  • 23. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 23 Implications and Outlook
  • 24. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 24 Implications • Privacy concerns about robots are pronounced among respondents • Necessity to distinguish different types of privacy concerns • Informational privacy concerns: institutional most pronounced ⇒ Robots manufacturers should think about data protection! ⇒ Depiction of robots and AI in popular culture covers aspects most users don’t worry about (bonding). ⇒ Users might underestimate robots’ bonding potential.
  • 25. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 25 Outlook • More (empirical) resarch to be done on robots and privacy • Next step for us: bringing pieces together into a testable model
  • 26. New Friends 2016 Privacy and Social Robots Tamò & Lutz Page 26 Thank You For Sharing Your Thoughts Norwegian Business School (BI) Center for Internet & Society Nydalsvn. 37 / N-0442 Oslo