Piggybacking Robots Human-Robot Overtrust in University Dormitory Security

Can overtrust in robots compromise physical security? We conducted a series of experiments in which a robot positioned outside a secure-access student dormitory asked passersby to assist it to gain access. We found individual participants were as likely to assist the robot in exiting the dormitory (...

Full description

Saved in:
Bibliographic Details
Published in2017 12th ACM/IEEE International Conference on Human-Robot Interaction (HRI pp. 426 - 434
Main Authors Booth, Serena, Tompkin, James, Pfister, Hanspeter, Waldo, Jim, Gajos, Krzysztof, Nagpal, Radhika
Format Conference Proceeding
LanguageEnglish
Published New York, NY, USA ACM 06.03.2017
SeriesACM Conferences
Subjects
Online AccessGet full text
ISBN9781450343367
1450343368
ISSN2167-2148
DOI10.1145/2909824.3020211

Cover

Abstract Can overtrust in robots compromise physical security? We conducted a series of experiments in which a robot positioned outside a secure-access student dormitory asked passersby to assist it to gain access. We found individual participants were as likely to assist the robot in exiting the dormitory (40% assistance rate, 4/10 individuals) as in entering (19%, 3/16 individuals). Groups of people were more likely than individuals to assist the robot in entering (71%, 10/14 groups). When the robot was disguised as a food delivery agent for the fictional start-up Robot Grub, individuals were more likely to assist the robot in entering (76%, 16/21 individuals). Lastly, we found participants who identified the robot as a bomb threat demonstrated a trend toward assisting the robot (87%, 7/8 individuals, 6/7 groups). Thus, we demonstrate that overtrust---the unfounded belief that the robot does not intend to deceive or carry risk---can represent a significant threat to physical security at a university dormitory.
AbstractList Can overtrust in robots compromise physical security? We positioned a robot outside a secure-access student dormitory and made it ask passersby for access. . Individual participants were as likely to assist the robot in exiting the dormitory (40% assistance rate, 4/10 individuals) as in entering (19%, 3/16 individuals). Groups of people were more likely than individuals to assist the robot in entering (71%, 10/14 groups). When the robot was disguised as a food delivery agent for the fictional start-up Robot Grub, individuals were more likely to assist the robot in entering (76%, 16/21 individuals). Lastly, participants who identified the robot as a bomb threat demonstrated a trend toward assisting the robot (87%, 7/8 individuals, 6/7 groups). Thus, overtrust-the unfounded belief that the robot does not intend to deceive or carry risk-can represent a significant threat to physical security at a university dormitory.
Can overtrust in robots compromise physical security? We conducted a series of experiments in which a robot positioned outside a secure-access student dormitory asked passersby to assist it to gain access. We found individual participants were as likely to assist the robot in exiting the dormitory (40% assistance rate, 4/10 individuals) as in entering (19%, 3/16 individuals). Groups of people were more likely than individuals to assist the robot in entering (71%, 10/14 groups). When the robot was disguised as a food delivery agent for the fictional start-up Robot Grub, individuals were more likely to assist the robot in entering (76%, 16/21 individuals). Lastly, we found participants who identified the robot as a bomb threat demonstrated a trend toward assisting the robot (87%, 7/8 individuals, 6/7 groups). Thus, we demonstrate that overtrust---the unfounded belief that the robot does not intend to deceive or carry risk---can represent a significant threat to physical security at a university dormitory.
Author Pfister, Hanspeter
Waldo, Jim
Tompkin, James
Booth, Serena
Gajos, Krzysztof
Nagpal, Radhika
Author_xml – sequence: 1
  givenname: Serena
  surname: Booth
  fullname: Booth, Serena
  email: serena.l.booth@gmail.com
  organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA
– sequence: 2
  givenname: James
  surname: Tompkin
  fullname: Tompkin, James
  email: james_tompkin@brown.edu
  organization: Brown University, Providence, RI, USA
– sequence: 3
  givenname: Hanspeter
  surname: Pfister
  fullname: Pfister, Hanspeter
  email: pfister@g.harvard.edu
  organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA
– sequence: 4
  givenname: Jim
  surname: Waldo
  fullname: Waldo, Jim
  email: jim_waldo@harvard.edu
  organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA
– sequence: 5
  givenname: Krzysztof
  surname: Gajos
  fullname: Gajos, Krzysztof
  email: kgajos@g.harvard.edu
  organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA
– sequence: 6
  givenname: Radhika
  surname: Nagpal
  fullname: Nagpal, Radhika
  email: rad@eecs.harvard.edu
  organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA
BookMark eNqN0D1PwzAQh3HzJlFKJgYGFkaWhPOdnbNHVPEmVQIhmC3bcaJQmqCkS789Qe3ExHTD768bnjNx3PVdEuJSQiGl0rdowRpUBQECSnkgMstmAiBFVPKhmKEsOUepzNEfOxXZOH4CAGoyTHImLl7bptkGH1dt11y_9aHfjOfipPZfY8r2dy4-Hu7fF0_58uXxeXG3zD1avcmTD9ZHVBR0AK5tzSkk1hMig7FclcrX0ZpKJYsll1RBJEZd1VwliInm4mr3t00pue-hXfth64wmZRgnvdmpj2sX-n41Ognut4DbF3D7AtO0-OfUhaFNNf0AyZFWUA
ContentType Conference Proceeding
Copyright 2017 ACM
Copyright_xml – notice: 2017 ACM
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1145/2909824.3020211
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781450343367
1450343368
EISSN 2167-2148
EndPage 434
ExternalDocumentID 8534872
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
ABLEC
ACM
ADPZR
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
GUFHI
IEGSK
OCL
RIE
RIL
AAWTH
ADZIZ
CHZPO
ID FETCH-LOGICAL-a295t-eab9ac243b5b07f9f7ebe75a29270897d64afc98d4e926763d0c3725df7de0ce3
IEDL.DBID RIE
ISBN 9781450343367
1450343368
IngestDate Wed Aug 20 06:21:00 EDT 2025
Wed Jan 31 06:48:21 EST 2024
IsPeerReviewed false
IsScholarly false
Keywords trust
overtrust
robotics
tailgating
piggybacking
secure access
Language English
License Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org
LinkModel DirectLink
MeetingName HRI '17: ACM/IEEE International Conference on Human-Robot Interaction
MergedId FETCHMERGED-LOGICAL-a295t-eab9ac243b5b07f9f7ebe75a29270897d64afc98d4e926763d0c3725df7de0ce3
PageCount 9
ParticipantIDs acm_books_10_1145_2909824_3020211
ieee_primary_8534872
acm_books_10_1145_2909824_3020211_brief
PublicationCentury 2000
PublicationDate 20170306
2017-March
PublicationDateYYYYMMDD 2017-03-06
2017-03-01
PublicationDate_xml – month: 03
  year: 2017
  text: 20170306
  day: 06
PublicationDecade 2010
PublicationPlace New York, NY, USA
PublicationPlace_xml – name: New York, NY, USA
PublicationSeriesTitle ACM Conferences
PublicationTitle 2017 12th ACM/IEEE International Conference on Human-Robot Interaction (HRI
PublicationTitleAbbrev HRI
PublicationYear 2017
Publisher ACM
Publisher_xml – name: ACM
SSID ssj0002538731
ssj0003204102
Score 1.9387218
Snippet Can overtrust in robots compromise physical security? We conducted a series of experiments in which a robot positioned outside a secure-access student...
Can overtrust in robots compromise physical security? We positioned a robot outside a secure-access student dormitory and made it ask passersby for access. ....
SourceID ieee
acm
SourceType Publisher
StartPage 426
SubjectTerms Computer systems organization -- Embedded and cyber-physical systems -- Robotics
Computer systems organization -- Embedded and cyber-physical systems -- Robotics -- Robotic autonomy
General and reference -- Cross-computing tools and techniques -- Empirical studies
General and reference -- Cross-computing tools and techniques -- Experimentation
Human-centered computing -- Human computer interaction (HCI) -- Empirical studies in HCI
Human-centered computing -- Human computer interaction (HCI) -- HCI design and evaluation methods -- Field studies
Human-centered computing -- Human computer interaction (HCI) -- HCI design and evaluation methods -- User studies
Human-robot interaction
Robots
Security
Security and privacy -- Human and societal aspects of security and privacy
Security and privacy -- Human and societal aspects of security and privacy -- Privacy protections
Security and privacy -- Human and societal aspects of security and privacy -- Social aspects of security and privacy
Security and privacy -- Intrusion/anomaly detection and malware mitigation -- Social engineering attacks
Security and privacy -- Security in hardware
Social and professional topics -- Computing -- technology policy -- Privacy policies
Weapons
Subtitle Human-Robot Overtrust in University Dormitory Security
Title Piggybacking Robots
URI https://ieeexplore.ieee.org/document/8534872
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEN4AJ734ABVfWRMTLxbKPtiuV5UYDUpUEm7NvkqIsTVQDvjr3d1WUGOit922h81MO990Ht8AcMq00YJwFghNTWDx2K6s1x_IDhUYMymNJ3Ht33dvhuR2REcVcL7shTHG-OIz03JLn8vXmZq7UFnbQov1r63BrTLGi16tZTwF2S-XlRktt8coJB1XvLNbEOLSNuIhjxBpYeshITcxqCrU67ehKh5Tehug_3maopTkpTXPZUu9_yBq_O9xN0Fj1b0HB0tc2gIVk26D9S_Eg3VwN5iMxwsplAuUw8dMZvnsAvqAfuB38MHNaXb9GHCSwlX1BrzKHANANl3Ap3LyXQMMe9fPlzdBOVYhEIjTPDBCcqEQwZLKkCU8YVaRjNqbiIURZ7pLRKJ4pInhqGvtjw4VZojqxCo2VAbvgFqapWYPQCaiUGOpXeaXUKy46UTKeSCJteeRwU1wYmUcu_-FWVy0QNO41ENc6qEJzv58JpbTiUmaoO6EHL8VPBxxKd_93y8fgDXkINjXix2CmpWZObIORC6P_ZvzAbLfv_E
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLZgHIALbxjPICFxoaNLmqXhykODbYB4SNyqvIomxIrGOIxfj9OWDRAS3JI0h8hObcePzwB7wjqrIikCZbkLUB_jCK3-QNe5Ykxo7XIQ185lo3kfXTzwhwk4GNXCOOfy5DNX88M8lm8z8-ZdZYeoWtC-RoE7xfFVIYpqrZFHheK_K8qYlp8zGkZ1n76zWkDi8kMqQxnTqMbQRqK-Z9CkMs_f2qrkWuVsDjqf5ymSSZ5qbwNdM-8_oBr_e-B5WB7X75HrkWZagAnXW4TZL9CDS9C67j4-DrUy3lVObjKdDV6PSO7SD_IZufKdmn1FBun2yDh_g5xkHgMg6w_Jbdn7bhnuz07vjptB2VghUFTyQeCUlsrQiGmuQ5HKVCArBcePVISxFLYRqdTI2EZO0gZKIBsaJii3KbI2NI6tQKWX9dwaEKHi0DJtfew34sxIV4-Nt0FSlOixY1XYRRon_sXwmhRF0Dwp-ZCUfKjC_p97Et3vurQKS57IyUuBxJGU9F3_fXkHppt3nXbSPr9sbcAM9Qo5zx7bhArSz22hOTHQ2_kt-gD6Y8NC
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+12th+ACM%2FIEEE+International+Conference+on+Human-Robot+Interaction+%28HRI&rft.atitle=Piggybacking+Robots%3A+Human-Robot+Overtrust+in+University+Dormitory+Security&rft.au=Booth%2C+Serena&rft.au=Tomokin%2C+James&rft.au=Pfister%2C+Hanspeter&rft.au=Waldo%2C+Jim&rft.date=2017-03-01&rft.pub=ACM&rft.eissn=2167-2148&rft.spage=426&rft.epage=434&rft_id=info:doi/10.1145%2F2909824.3020211&rft.externalDocID=8534872
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450343367/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450343367/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450343367/sc.gif&client=summon&freeimage=true