publications
My publications in reversed chronological order.
2024
- ACM THRIInvestigation of Low-Moral Actions by Malicious Anonymous Operators of Avatar RobotsTaha Shaheen , Dražen Brščić , and Takayuki KandaACM Transactions on Human-Robot Interaction, Sep 2024
Avatar robots allow a teleoperator to interact with the people and environment of a remote place. Malicious operators can use this technology to perpetrate malicious or low-moral actions. In this study, we used hazard identification workshops to identify low-moral actions that are possible through the locomotor movement, cameras, and microphones of an avatar robot. We conducted three workshops, each with four potential future users of avatars, to brainstorm possible low-moral actions. As avatars are not yet widespread, we gave participants experience with this technology by having them control both a simulated avatar and a real avatar as a malicious anonymous operator in a variety of situations. They also experienced sharing space with an avatar controlled by a malicious anonymous operator. We categorized the ideas generated from the workshops using affinity diagram analysis and identified four major categories: violate privacy and security, inhibit, annoy, and destroy or hurt. We also identified subcategories for each. In the second half of this study, we discuss all low-moral action subcategories in terms of their detection, mitigation, and prevention by studying literature from autonomous, social, teleoperated, and telepresence robots as well as other fields where relevant.
@article{shaheen2024lowmoralactions, author = {Shaheen, Taha and Br\v{s}\v{c}i\'{c}, Dra\v{z}en and Kanda, Takayuki}, title = {Investigation of Low-Moral Actions by Malicious Anonymous Operators of Avatar Robots}, year = {2024}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3696466}, doi = {10.1145/3696466}, journal = {ACM Transactions on Human-Robot Interaction}, month = sep, keywords = {avatar robots, low-moral actions, hazard identification, malicious users, ethics}, }