skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Failure Explanation in Privacy-Sensitive Contexts: An Integrated Systems Approach
In this paper, we explore how robots can properly explain failures during navigation tasks with privacy concerns. We present an integrated robotics approach to generate visual failure explanations, by combining a language-capable cognitive architecture (for recognizing intent behind commands), an object- and location-based context recognition system (for identifying the locations of people and classifying the context in which those people are situated) and an infeasibility proof-based motion planner (for explaining planning failures on the basis of contextually mediated privacy concerns). The behavior of this integrated system is validated using a series of experiments in a simulated medical environment.  more » « less
Award ID(s):
1849348
PAR ID:
10458324
Author(s) / Creator(s):
; ; ; ; ;
Date Published:
Journal Name:
IEEE International Conference on Robot and Human Interactive Communication (RO-MAN)
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    This paper examines people’s privacy concerns, perceptions of social benefits, and acceptance of various COVID-19 control measures that harness location information using data collected through an online survey in the U.S. and South Korea. The results indicate that people have higher privacy concerns for methods that use more sensitive and private information. The results also reveal that people’s perceptions of social benefits are low when their privacy concerns are high, indicating a trade-off relationship between privacy concerns and perceived social benefits. Moreover, the acceptance by South Koreans for most mitigation methods is significantly higher than that by people in the U.S. Lastly, the regression results indicate that South Koreans (compared to people in the U.S.) and people with a stronger collectivist orientation tend to have higher acceptance for the control measures because they have lower privacy concerns and perceive greater social benefits for the measures. These findings advance our understanding of the important role of geographic context and culture as well as people’s experiences of the mitigation measures applied to control a previous pandemic. 
    more » « less
  2. Monitoring the compliance of social distancing is critical for schools and offices to recover in-person operations in indoor spaces from the COVID-19 pandemic. Existing systems focus on vision- and wearable-based sensing approaches, which require direct line-of-sight or device-carrying and may also raise privacy concerns. To overcome these limitations, we introduce a new monitoring system for social distancing compliance based on footstep-induced floor vibration sensing. This system is device-free, non-intrusive, and perceived as more privacy-friendly. Our system leverages the insight that footsteps closer to the sensors generate vibration signals with larger amplitudes. The system first estimates the location of each person relative to the sensors based on signal energy and then infers the distance between two people. We evaluated the system through a real-world experiment with 8 people, and the system achieves an average accuracy of 97.8% for walking scenario classification and 80.4% in social distancing violation detection. 
    more » « less
  3. Passively collected big data sources are increasingly used to inform critical development policy decisions in low- and middle-income countries. While prior work highlights how such approaches may reveal sensitive information, enable surveillance, and centralize power, less is known about the corresponding privacy concerns, hopes, and fears of the people directly impacted by these policies --- people sometimes referred to asexperiential experts.To understand the perspectives of experiential experts, we conducted semi-structured interviews with people living in rural villages in Togo shortly after an entirely digital cash transfer program was launched that used machine learning and mobile phone metadata to determine program eligibility. This paper documents participants' privacy concerns surrounding the introduction of big data approaches in development policy. We find that the privacy concerns of our experiential experts differ from those raised by privacy and developmentdomain experts.To facilitate a more robust and constructive account of privacy, we discuss implications for policies and designs that take seriously the privacy concerns raised by both experiential experts and domain experts. 
    more » « less
  4. Over the past two decades, behavioral research in privacy has made considerable progress transitioning from acontextual studies to using contextualization as a powerful sensitizing device for illuminating the boundary conditions of privacy theories. Significant challenges and opportunities wait, however, on elevating and converging individually contextualized studies to a context-contingent theory that explicates the mechanisms through which contexts influence consumers’ privacy concerns and their behavioral reactions. This paper identifies the important barriers occasioned by this lack of context theorizing on the generalizability of privacy research findings and argues for accelerating the transition from the contextualization of individual research studies to an integrative understanding of context effects on privacy concerns. It also takes a first step toward this goal by providing a conceptual framework and the associated methodological instantiation for assessing how context-oriented nuances influence privacy concerns. Empirical evidence demonstrates the value of the framework as a diagnostic device guiding the selection of contextual contingencies in future research, so as to advance the pace of convergence toward context-contingent theories in information privacy. This paper was accepted by Anindya Ghose, information systems. 
    more » « less
  5. The increased adoption of smart home cameras (SHCs) foregrounds issues of surveillance, power, and privacy in homes and neighborhoods. However, questions remain about how people are currently using these devices to monitor and surveil, what the benefits and limitations are for users, and what privacy and security tensions arise between primary users and other stakeholders. We present an empirical study with 14 SHC users to understand how these devices are used and integrated within everyday life. Based on semistructured qualitative interviews, we investigate users’ motivations, practices, privacy concerns, and social negotiations. Our findings highlight the SHC as a perceptually powerful and spatially sensitive device that enables a variety of surveillant uses outside of basic home security—from formally surveilling domestic workers, to casually spying on neighbors, to capturing memories. We categorize surveillant SHC uses, clarify distinctions between primary and non primary users, and highlight under-considered design directions for addressing power imbalances among primary and non-primary users. 
    more » « less