Skip to main content
Log in

Designing Commercial Therapeutic Robots for Privacy Preserving Systems and Ethical Research Practices Within the Home

  • Published:
International Journal of Social Robotics Aims and scope Submit manuscript

Abstract

The migration of robots from the laboratory into sensitive home settings as commercially available therapeutic agents represents a significant transition for information privacy and ethical imperatives. We present new privacy paradigms and apply the fair information practices (FIPs) to investigate concerns unique to the placement of therapeutic robots in private home contexts. We then explore the importance and utility of research ethics as operationalized by existing human subjects research frameworks to guide the consideration of therapeutic robotic users—a step vital to the continued research and development of these platforms. Together, privacy and research ethics frameworks provide two complementary approaches to protect users and ensure responsible yet robust information sharing for technology development. We make recommendations for the implementation of these principles—paying particular attention to specific principles that apply to vulnerable individuals (i.e., children, disabled, or elderly persons)—to promote the adoption and continued improvement of long-term, responsible, and research-enabled robotics in private settings.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Notes

  1. Similar discussions of privacy implications from smart devices in the home can be seen with regard to Mattel’s “Hello Barbie” [21] and Samsung’s “Smart TV” [34].

  2. An exception would be if a private company receives federal grant money to fund a study, but even academic collaborations often do not trigger Institutional Review Board (IRB) oversight. Some companies have private ethical review practices or private IRBs, but these actions are not regulated or standardized.

  3. The Belmont Report refers to vulnerable populations as those that “either have limited capacities to consent, have subordinate relationships to the investigator or his institutions...or—by virtue of other aspects of their life—are especially vulnerable.” The Report goes on to specify that those with “limited capacities to consent” include children, fetuses, prisoners, mentally institutionalized, those under the influences of addiction, or those otherwise vulnerable as a consequence of their life situations (for example, those legally enfranchised to grant consent but are in reality incapable of sufficient comprehension, persons with prolonged illness) [36].

References

  1. 16 CFR Part 312—Children’s Online Privacy Protection Rule

  2. Alaiad A, Zhou L (2014) The determinants of home healthcare robots adoption: an empirical investigation. Int J Med Inform 83(11):825–840

    Article  Google Scholar 

  3. Anciaux N, Bonnet P, Bouganim L, Nguyen B, Pucheral P, Sandu-Popa I (2013) Trusted cells: a sea change for personnal data services. In: CIDR 2013—6th biennal conference on innovative database research

  4. Bennett CJ, Raab CD (2006) The governance of privacy: policy instruments in global perspective. 2nd and updated edition

  5. Broekens J, Heerink M, Rosendal H (2009) Assistive social robots in elderly care: a review. Gerontechnology 8(2):94–103

    Article  Google Scholar 

  6. Butler DJ, Huang J, Roesner F, Cakmak M (2015) The privacy-utility tradeoff for remotely teleoperated robots. In: Proceedings of the tenth annual ACM/IEEE international conference on human–robot interaction, ACM, New York, pp 27–34

  7. Caine K, Šabanović S, Carter M (2012) The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults. In: 2012 7th ACM/IEEE international conference on human–robot interaction (HRI), pp 343–350

  8. Calo R (2010) Robots and privacy. In: Lin P, Bekey G, Abney K (eds) Robot ethics: the ethical and social implications of robotics. MIT Press, Cambridge

    Google Scholar 

  9. Cao HL, Pop C, Simut R, Furnemónt R, De Beir A, Van de Perre G, Esteban PG, Lefeber D, Vanderborght B (2015) Probolino: a portable low-cost social device for home-based autism therapy. In: Social robotics. Springer, New York, pp 93–102

  10. Centers for Disease Control and Prevention (2015) Research data center: remote access. http://www.cdc.gov/rdc/b2accessmod/acs230.htm. Accessed 1 Mar 2015

  11. U.S. Congress: Federal Trade Commission Act 15 U.S.C (2006) 45. https://www.ftc.gov/sites/default/files/documents/statutes/federal-trade-commission-act/ftc_act_incorporatingus_safe_web_act.pdf

  12. de Montjoye YA, Wang SS, Pentland A, Anh DTT, Datta A et al (2012) On the trusted use of large-scale personal data. IEEE Data Eng Bull 35(4):5–8

    Google Scholar 

  13. Decker M (2008) Caregiving robots and ethical reflection: the perspective of interdisciplinary technology assessment. AI Soc 22(3):315–330

    Article  Google Scholar 

  14. Denning T, Matuszek C, Koscher K, Smith JR, Kohno T (2009) A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of the 11th international conference on ubiquitous computing. ACM, New York, pp 105–114

  15. Department of Health and Human Services (2016) HIPAA Administrative Simplification: Enforcement (45 CFR Parts 160 and 164). http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/privacyrule/finalenforcementrule06.pdf. Accessed 1 Mar 2016

  16. U.S. Department of Health and Human Services Food and Drug Administration (2016) Medical device data systems, medical image storage devices, and medical image communications devices. http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM401996.pdf. Accessed 1 Mar 2016

  17. Dittrich D, Kenneally E et al (2011) The Menlo Report: ethical principles guiding information and communication technology research. US Department of Homeland Security

  18. Edwards WK, Grinter RE (2001) At home with ubiquitous computing: seven challenges. In: Ubicomp 2001: ubiquitous computing. Springer, New York, pp 256–272

  19. Gellman R (2014) Fair information practices: a basic history. Available at SSRN 2415020

  20. Grimmelmann J (2015) The law and ethics of experiments on social media users

  21. Halzack S (2015) Privacy advocates try to keep ’creepy’ ’eavesdropping’ hello barbie from hitting shelves. https://www.washingtonpost.com/news/the-switch/wp/2015/03/11/privacy-advocates-try-to-keep-creepy-eavesdropping-hello-barbie-from-hitting-shelves/

  22. Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd international conference on mobile systems, applications, and services. ACM, New York, pp 177–189

  23. Horvitz E, Mulligan D (2015) Data, privacy, and the greater good. Science 349(6245):253–255

    Article  MathSciNet  Google Scholar 

  24. Jibo (2015) Meet Jibo, the worlds first social robot for the home. https://www.jibo.com/ (2014). Accessed 1 June 2015

  25. Johnson DG, Nissenbaum H (1995) Computers, ethics and social values

  26. JustoCat (2015) Justocat is proven to be a valuable tool in improving interaction with relatives and care givers. http://www.justocat.com/product/ (2015). Accessed 11 Oct 2015

  27. Kaminski ME (2015) Robots in the home: What will we have agreed to? Idaho Law Rev 51(3):661

  28. Khosla R, Nguyen K, Chu MT (2015) Socially assistive robot enabled home-based care for supporting people with autism

  29. Kramer AD, Guillory JE, Hancock JT (2014) Experimental evidence of massive-scale emotional contagion through social networks. Proc Nat Acad Sci 111(24):8788–8790

    Article  Google Scholar 

  30. Lerner JI, Mulligan DK (2008) Taking the long view on the fourth amendment: stored records and the sanctity of the home. Stanf Technol Law Rev 3:60

    Google Scholar 

  31. Lin P, Abney K, Bekey GA (2011) Robot ethics: the ethical and social implications of robotics. MIT press, Cambridge

    Google Scholar 

  32. Lisovich MA, Mulligan DK, Wicker SB (2010) Inferring personal information from demand-response systems. IEEE Secur Priv 8(1):11–20

    Article  Google Scholar 

  33. Liu C, Conn K, Sarkar N, Stone W (2007) Affect recognition in robot assisted rehabilitation of children with autism spectrum disorder. In: IEEE international conference on robotics and automation, pp 1755–1760

  34. Matyszczyk C (2015) Samsung changes smart TV privacy policy in wake of spying fears. http://www.cnet.com/news/samsung-changes-smarttv-privacy-policy-in-wake-of-spying-fears/

  35. Moor JH (2006) Using genetic information while protecting the privacy of the soul. In: Tawani HT (ed) Ethics, computing, and genomics. Jones and Bartlett, Sudbury, pp 109–119

    Google Scholar 

  36. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, Bethesda, MD (1978) The Belmont report: ethical principles and guidelines for the protection of human subjects of research: Appendix Report Vol. 1. ERIC Clearinghouse

  37. Nissenbaum H (2004) Privacy as contextual integrity. Wash Law Rev 79:119

    Google Scholar 

  38. Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Palo Alto

    Google Scholar 

  39. Riek LD, Howard D (2014) A code of ethics for the human–robot interaction profession. In: Proceedings of we robot

  40. Robinson H, MacDonald B, Broadbent E (2014) The role of healthcare robots for older people at home: a review. Int J Soc Robot 6(4):575–591

    Article  Google Scholar 

  41. RoboKind: Advanced Social Robots (2016) Robots4autism: Meet milo. http://www.robokindrobots.com/robots4autism-home/. Accessed 1 Mar 2016

  42. RobotCenter (2015) Paro therapeutic robot seal. http://www.robotcenter.co.uk/products/paro-therapeutic-robot-seal (2015). Accessed 11 Oct 2015

  43. RobotsLab (2015) Nao evolution - v5. http://shop.robotslab.com/products/nao-h25 (2015). Accessed 11 Oct 2015

  44. Scott SL (2010) A modern bayesian look at the multi-armed bandit. Appl Stoch Models Bus Ind 26(6):639–658

    Article  MathSciNet  Google Scholar 

  45. Sharkey A, Sharkey N (2012) Granny and the robots: ethical issues in robot care for the elderly. Ethics Inf Technol 14(1):27–40

    Article  Google Scholar 

  46. Stopczynski A, Pietri R, Pentland A, Lazer D, Lehmann S (2014) Privacy in sensor-driven human data collection: a guide for practitioners. arXiv preprint arXiv:1403.5299

  47. Sung JY, Guo L, Grinter RE, Christensen HI (2007) My roomba is rambo: intimate home appliances. In: Proceedings of the 9th international conference on Ubiquitous computing. Springer, Berlin, pp 145–162

  48. Tavani HT (2008) Informational privacy: concepts, theories, and controversies. In: Himma KE, Tavani HT (eds) The handbook of information and computer ethics. Wiley, Hoboken, pp 131–164

    Chapter  Google Scholar 

  49. The National Commission for Protection of Human Subjects of Biomedical and Behavioral Research (1979) The Belmont Report—Office of the Secretary, Ethical Principles and Guidelines for the Protection of Human Subjects Research

  50. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research (1977) Report and recommendations research involving children. https://videocast.nih.gov/pdf/ohrp_research_involving_children.pdf

  51. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research (1978) Research involving those institutionalized as mentally infirm. https://videocast.nih.gov/pdf/ohrp_research_mentally_infirm.pdf

  52. The Nuremberg Code (1949) Trials of war criminals before the Nuremberg military tribunals under control council law 10:181–182

  53. Thompson RM (2014) The fourth amendment third-party doctrine. Congressional Research Service

  54. US Department of Health and Human Services and others (2009) Code of federal regulations. Title 45 Public welfare. Department of Health and Human Services. Part 46: Protection of human subjects

  55. Westin AF (1968) Privacy and freedom. Wash Lee Law Rev 25(1):166

    Google Scholar 

Download references

Acknowledgments

This research was supported by the Hewlett Foundation through the UC Berkeley Center for Long- Term Cybersecurity (CLTC). The authors would also like to acknowledge the reviewers for their valuable feedback.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elaine Sedenberg.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sedenberg, E., Chuang, J. & Mulligan, D. Designing Commercial Therapeutic Robots for Privacy Preserving Systems and Ethical Research Practices Within the Home. Int J of Soc Robotics 8, 575–587 (2016). https://doi.org/10.1007/s12369-016-0362-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12369-016-0362-y

Keywords

Navigation