Piggybacking Robots Human-Robot Overtrust in University Dormitory Security
Can overtrust in robots compromise physical security? We conducted a series of experiments in which a robot positioned outside a secure-access student dormitory asked passersby to assist it to gain access. We found individual participants were as likely to assist the robot in exiting the dormitory (...
Saved in:
Published in | 2017 12th ACM/IEEE International Conference on Human-Robot Interaction (HRI pp. 426 - 434 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
New York, NY, USA
ACM
06.03.2017
|
Series | ACM Conferences |
Subjects |
Human-centered computing
> Human computer interaction (HCI)
> HCI design and evaluation methods
> Field studies
Human-centered computing
> Human computer interaction (HCI)
> HCI design and evaluation methods
> User studies
Security and privacy
> Human and societal aspects of security and privacy
> Social aspects of security and privacy
|
Online Access | Get full text |
ISBN | 9781450343367 1450343368 |
ISSN | 2167-2148 |
DOI | 10.1145/2909824.3020211 |
Cover
Abstract | Can overtrust in robots compromise physical security? We conducted a series of experiments in which a robot positioned outside a secure-access student dormitory asked passersby to assist it to gain access. We found individual participants were as likely to assist the robot in exiting the dormitory (40% assistance rate, 4/10 individuals) as in entering (19%, 3/16 individuals). Groups of people were more likely than individuals to assist the robot in entering (71%, 10/14 groups). When the robot was disguised as a food delivery agent for the fictional start-up Robot Grub, individuals were more likely to assist the robot in entering (76%, 16/21 individuals). Lastly, we found participants who identified the robot as a bomb threat demonstrated a trend toward assisting the robot (87%, 7/8 individuals, 6/7 groups). Thus, we demonstrate that overtrust---the unfounded belief that the robot does not intend to deceive or carry risk---can represent a significant threat to physical security at a university dormitory. |
---|---|
AbstractList | Can overtrust in robots compromise physical security? We positioned a robot outside a secure-access student dormitory and made it ask passersby for access. . Individual participants were as likely to assist the robot in exiting the dormitory (40% assistance rate, 4/10 individuals) as in entering (19%, 3/16 individuals). Groups of people were more likely than individuals to assist the robot in entering (71%, 10/14 groups). When the robot was disguised as a food delivery agent for the fictional start-up Robot Grub, individuals were more likely to assist the robot in entering (76%, 16/21 individuals). Lastly, participants who identified the robot as a bomb threat demonstrated a trend toward assisting the robot (87%, 7/8 individuals, 6/7 groups). Thus, overtrust-the unfounded belief that the robot does not intend to deceive or carry risk-can represent a significant threat to physical security at a university dormitory. Can overtrust in robots compromise physical security? We conducted a series of experiments in which a robot positioned outside a secure-access student dormitory asked passersby to assist it to gain access. We found individual participants were as likely to assist the robot in exiting the dormitory (40% assistance rate, 4/10 individuals) as in entering (19%, 3/16 individuals). Groups of people were more likely than individuals to assist the robot in entering (71%, 10/14 groups). When the robot was disguised as a food delivery agent for the fictional start-up Robot Grub, individuals were more likely to assist the robot in entering (76%, 16/21 individuals). Lastly, we found participants who identified the robot as a bomb threat demonstrated a trend toward assisting the robot (87%, 7/8 individuals, 6/7 groups). Thus, we demonstrate that overtrust---the unfounded belief that the robot does not intend to deceive or carry risk---can represent a significant threat to physical security at a university dormitory. |
Author | Pfister, Hanspeter Waldo, Jim Tompkin, James Booth, Serena Gajos, Krzysztof Nagpal, Radhika |
Author_xml | – sequence: 1 givenname: Serena surname: Booth fullname: Booth, Serena email: serena.l.booth@gmail.com organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA – sequence: 2 givenname: James surname: Tompkin fullname: Tompkin, James email: james_tompkin@brown.edu organization: Brown University, Providence, RI, USA – sequence: 3 givenname: Hanspeter surname: Pfister fullname: Pfister, Hanspeter email: pfister@g.harvard.edu organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA – sequence: 4 givenname: Jim surname: Waldo fullname: Waldo, Jim email: jim_waldo@harvard.edu organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA – sequence: 5 givenname: Krzysztof surname: Gajos fullname: Gajos, Krzysztof email: kgajos@g.harvard.edu organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA – sequence: 6 givenname: Radhika surname: Nagpal fullname: Nagpal, Radhika email: rad@eecs.harvard.edu organization: Harvard John A. Paulson School of Engineering and Applied Sciences, Cambridge, MA, USA |
BookMark | eNqN0D1PwzAQh3HzJlFKJgYGFkaWhPOdnbNHVPEmVQIhmC3bcaJQmqCkS789Qe3ExHTD768bnjNx3PVdEuJSQiGl0rdowRpUBQECSnkgMstmAiBFVPKhmKEsOUepzNEfOxXZOH4CAGoyTHImLl7bptkGH1dt11y_9aHfjOfipPZfY8r2dy4-Hu7fF0_58uXxeXG3zD1avcmTD9ZHVBR0AK5tzSkk1hMig7FclcrX0ZpKJYsll1RBJEZd1VwliInm4mr3t00pue-hXfth64wmZRgnvdmpj2sX-n41Ognut4DbF3D7AtO0-OfUhaFNNf0AyZFWUA |
ContentType | Conference Proceeding |
Copyright | 2017 ACM |
Copyright_xml | – notice: 2017 ACM |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1145/2909824.3020211 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 9781450343367 1450343368 |
EISSN | 2167-2148 |
EndPage | 434 |
ExternalDocumentID | 8534872 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IL 6IN AAJGR ABLEC ACM ADPZR ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IEGSK OCL RIE RIL AAWTH ADZIZ CHZPO |
ID | FETCH-LOGICAL-a295t-eab9ac243b5b07f9f7ebe75a29270897d64afc98d4e926763d0c3725df7de0ce3 |
IEDL.DBID | RIE |
ISBN | 9781450343367 1450343368 |
IngestDate | Wed Aug 20 06:21:00 EDT 2025 Wed Jan 31 06:48:21 EST 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Keywords | trust overtrust robotics tailgating piggybacking secure access |
Language | English |
License | Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org |
LinkModel | DirectLink |
MeetingName | HRI '17: ACM/IEEE International Conference on Human-Robot Interaction |
MergedId | FETCHMERGED-LOGICAL-a295t-eab9ac243b5b07f9f7ebe75a29270897d64afc98d4e926763d0c3725df7de0ce3 |
PageCount | 9 |
ParticipantIDs | acm_books_10_1145_2909824_3020211 ieee_primary_8534872 acm_books_10_1145_2909824_3020211_brief |
PublicationCentury | 2000 |
PublicationDate | 20170306 2017-March |
PublicationDateYYYYMMDD | 2017-03-06 2017-03-01 |
PublicationDate_xml | – month: 03 year: 2017 text: 20170306 day: 06 |
PublicationDecade | 2010 |
PublicationPlace | New York, NY, USA |
PublicationPlace_xml | – name: New York, NY, USA |
PublicationSeriesTitle | ACM Conferences |
PublicationTitle | 2017 12th ACM/IEEE International Conference on Human-Robot Interaction (HRI |
PublicationTitleAbbrev | HRI |
PublicationYear | 2017 |
Publisher | ACM |
Publisher_xml | – name: ACM |
SSID | ssj0002538731 ssj0003204102 |
Score | 1.9387218 |
Snippet | Can overtrust in robots compromise physical security? We conducted a series of experiments in which a robot positioned outside a secure-access student... Can overtrust in robots compromise physical security? We positioned a robot outside a secure-access student dormitory and made it ask passersby for access. .... |
SourceID | ieee acm |
SourceType | Publisher |
StartPage | 426 |
SubjectTerms | Computer systems organization -- Embedded and cyber-physical systems -- Robotics Computer systems organization -- Embedded and cyber-physical systems -- Robotics -- Robotic autonomy General and reference -- Cross-computing tools and techniques -- Empirical studies General and reference -- Cross-computing tools and techniques -- Experimentation Human-centered computing -- Human computer interaction (HCI) -- Empirical studies in HCI Human-centered computing -- Human computer interaction (HCI) -- HCI design and evaluation methods -- Field studies Human-centered computing -- Human computer interaction (HCI) -- HCI design and evaluation methods -- User studies Human-robot interaction Robots Security Security and privacy -- Human and societal aspects of security and privacy Security and privacy -- Human and societal aspects of security and privacy -- Privacy protections Security and privacy -- Human and societal aspects of security and privacy -- Social aspects of security and privacy Security and privacy -- Intrusion/anomaly detection and malware mitigation -- Social engineering attacks Security and privacy -- Security in hardware Social and professional topics -- Computing -- technology policy -- Privacy policies Weapons |
Subtitle | Human-Robot Overtrust in University Dormitory Security |
Title | Piggybacking Robots |
URI | https://ieeexplore.ieee.org/document/8534872 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEN4AJ734ABVfWRMTLxbKPtiuV5UYDUpUEm7NvkqIsTVQDvjr3d1WUGOit922h81MO990Ht8AcMq00YJwFghNTWDx2K6s1x_IDhUYMymNJ3Ht33dvhuR2REcVcL7shTHG-OIz03JLn8vXmZq7UFnbQov1r63BrTLGi16tZTwF2S-XlRktt8coJB1XvLNbEOLSNuIhjxBpYeshITcxqCrU67ehKh5Tehug_3maopTkpTXPZUu9_yBq_O9xN0Fj1b0HB0tc2gIVk26D9S_Eg3VwN5iMxwsplAuUw8dMZvnsAvqAfuB38MHNaXb9GHCSwlX1BrzKHANANl3Ap3LyXQMMe9fPlzdBOVYhEIjTPDBCcqEQwZLKkCU8YVaRjNqbiIURZ7pLRKJ4pInhqGvtjw4VZojqxCo2VAbvgFqapWYPQCaiUGOpXeaXUKy46UTKeSCJteeRwU1wYmUcu_-FWVy0QNO41ENc6qEJzv58JpbTiUmaoO6EHL8VPBxxKd_93y8fgDXkINjXix2CmpWZObIORC6P_ZvzAbLfv_E |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLZgHIALbxjPICFxoaNLmqXhykODbYB4SNyqvIomxIrGOIxfj9OWDRAS3JI0h8hObcePzwB7wjqrIikCZbkLUB_jCK3-QNe5Ykxo7XIQ185lo3kfXTzwhwk4GNXCOOfy5DNX88M8lm8z8-ZdZYeoWtC-RoE7xfFVIYpqrZFHheK_K8qYlp8zGkZ1n76zWkDi8kMqQxnTqMbQRqK-Z9CkMs_f2qrkWuVsDjqf5ymSSZ5qbwNdM-8_oBr_e-B5WB7X75HrkWZagAnXW4TZL9CDS9C67j4-DrUy3lVObjKdDV6PSO7SD_IZufKdmn1FBun2yDh_g5xkHgMg6w_Jbdn7bhnuz07vjptB2VghUFTyQeCUlsrQiGmuQ5HKVCArBcePVISxFLYRqdTI2EZO0gZKIBsaJii3KbI2NI6tQKWX9dwaEKHi0DJtfew34sxIV4-Nt0FSlOixY1XYRRon_sXwmhRF0Dwp-ZCUfKjC_p97Et3vurQKS57IyUuBxJGU9F3_fXkHppt3nXbSPr9sbcAM9Qo5zx7bhArSz22hOTHQ2_kt-gD6Y8NC |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+12th+ACM%2FIEEE+International+Conference+on+Human-Robot+Interaction+%28HRI&rft.atitle=Piggybacking+Robots%3A+Human-Robot+Overtrust+in+University+Dormitory+Security&rft.au=Booth%2C+Serena&rft.au=Tomokin%2C+James&rft.au=Pfister%2C+Hanspeter&rft.au=Waldo%2C+Jim&rft.date=2017-03-01&rft.pub=ACM&rft.eissn=2167-2148&rft.spage=426&rft.epage=434&rft_id=info:doi/10.1145%2F2909824.3020211&rft.externalDocID=8534872 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450343367/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450343367/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450343367/sc.gif&client=summon&freeimage=true |