Autonomy Acceptance Model (AAM): The Role of Autonomy and Risk in Security Robot Acceptance

The rapid deployment of security robots across our society calls for further examination of their acceptance. This study explored human acceptance of security robots by theoretically extending the technology acceptance model to include the impact of autonomy and risk. To accomplish this, an online e...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:2024 19th ACM/IEEE International Conference on Human-Robot Interaction (HRI) S. 840 - 849
Hauptverfasser: Ye, Xin, Jo, Wonse, Ali, Arsha, Bhatti, Samia Cornelius, Esterwood, Connor, Kassie, Hana Andargie, Peter Robert, Lionel
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: ACM 11.03.2024
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The rapid deployment of security robots across our society calls for further examination of their acceptance. This study explored human acceptance of security robots by theoretically extending the technology acceptance model to include the impact of autonomy and risk. To accomplish this, an online experiment involving 236 participants was conducted. Participants were randomly assigned to watch a video introducing a security robot operating at an autonomy level of low, moderate, or high, and presenting either a low or high risk to humans. This resulted in a 3 (autonomy) × 2 (risk) between-subjects design. The findings suggest that increased perceived usefulness, perceived ease of use, and trust enhance acceptance, while higher robot autonomy tends to decrease acceptance. Additionally, the physical risk associated with security robots moderates the relationship between autonomy and acceptance. Based on these results, this paper offer recommendations for future research on security robots.CCS CONCEPTS* Human-centered computing → HCI theory, concepts and models; Empirical studies in HCI.
AbstractList The rapid deployment of security robots across our society calls for further examination of their acceptance. This study explored human acceptance of security robots by theoretically extending the technology acceptance model to include the impact of autonomy and risk. To accomplish this, an online experiment involving 236 participants was conducted. Participants were randomly assigned to watch a video introducing a security robot operating at an autonomy level of low, moderate, or high, and presenting either a low or high risk to humans. This resulted in a 3 (autonomy) × 2 (risk) between-subjects design. The findings suggest that increased perceived usefulness, perceived ease of use, and trust enhance acceptance, while higher robot autonomy tends to decrease acceptance. Additionally, the physical risk associated with security robots moderates the relationship between autonomy and acceptance. Based on these results, this paper offer recommendations for future research on security robots.CCS CONCEPTS* Human-centered computing → HCI theory, concepts and models; Empirical studies in HCI.
Author Ye, Xin
Esterwood, Connor
Jo, Wonse
Bhatti, Samia Cornelius
Peter Robert, Lionel
Kassie, Hana Andargie
Ali, Arsha
Author_xml – sequence: 1
  givenname: Xin
  surname: Ye
  fullname: Ye, Xin
  email: xinye@umich.edu
  organization: University of Michigan,Ann Arbor,Michigan,USA
– sequence: 2
  givenname: Wonse
  surname: Jo
  fullname: Jo, Wonse
  email: wonse@umich.edu
  organization: University of Michigan,Ann Arbor,Michigan,USA
– sequence: 3
  givenname: Arsha
  surname: Ali
  fullname: Ali, Arsha
  email: arshaali@umich.edu
  organization: University of Michigan,Ann Arbor,Michigan,USA
– sequence: 4
  givenname: Samia Cornelius
  surname: Bhatti
  fullname: Bhatti, Samia Cornelius
  email: samiaco@umich.edu
  organization: University of Michigan,Ann Arbor,Michigan,USA
– sequence: 5
  givenname: Connor
  surname: Esterwood
  fullname: Esterwood, Connor
  email: cte@umich.edu
  organization: University of Michigan,Ann Arbor,Michigan,USA
– sequence: 6
  givenname: Hana Andargie
  surname: Kassie
  fullname: Kassie, Hana Andargie
  email: hanaandargie00@gmail.com
  organization: Addis Ababa University,Addis Ababa,Ethiopia
– sequence: 7
  givenname: Lionel
  surname: Peter Robert
  fullname: Peter Robert, Lionel
  email: lprobert@umich.edu
  organization: University of Michigan,Ann Arbor,Michigan,USA
BookMark eNpNzL1Lw0AYgPETFNSa2cXhRh1S38t95dxCqR_QItRsDuU-3uBhe1eSdMh_r6CI07P8eC7JacoJCblmMGdMyHuuGBit51xxCSBPSGG0qQWABl5V8pwUwxAdSGEYCFlfkPfmOOaU9xNtvMfDaJNHus4Bd_S2adZ3D7T9QLrJO6S5o3_YpkA3cfikMdE39Mc-jtO3cnn897kiZ53dDVj8dkbax2W7eC5Xr08vi2ZV2qo2Y6lFMCAYVkJ0WikfDA_ghEcuuWMqoAGmlFMd97V11hoOVnNnlGFWy47PyM3PNiLi9tDHve2nLQOloNY1_wLvIlFT
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1145/3610977.3635005
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798400703225
EndPage 849
ExternalDocumentID 10660878
Genre orig-research
GrantInformation_xml – fundername: China Scholarship Council
  funderid: 10.13039/501100004543
GroupedDBID 6IE
6IL
ACM
ALMA_UNASSIGNED_HOLDINGS
APO
CBEJK
LHSKQ
RIE
RIL
ID FETCH-LOGICAL-a289t-74d9041e244f766cd93d0b4ce353b16de90166b6f3c8abaa930a73b9691a75f3
IEDL.DBID RIE
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001239977500089&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Tue May 06 03:31:43 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a289t-74d9041e244f766cd93d0b4ce353b16de90166b6f3c8abaa930a73b9691a75f3
OpenAccessLink https://dl.acm.org/doi/pdf/10.1145/3610977.3635005
PageCount 10
ParticipantIDs ieee_primary_10660878
PublicationCentury 2000
PublicationDate 2024-March-11
PublicationDateYYYYMMDD 2024-03-11
PublicationDate_xml – month: 03
  year: 2024
  text: 2024-March-11
  day: 11
PublicationDecade 2020
PublicationTitle 2024 19th ACM/IEEE International Conference on Human-Robot Interaction (HRI)
PublicationTitleAbbrev HRI
PublicationYear 2024
Publisher ACM
Publisher_xml – name: ACM
SSID ssib054910458
Score 1.9068823
Snippet The rapid deployment of security robots across our society calls for further examination of their acceptance. This study explored human acceptance of security...
SourceID ieee
SourceType Publisher
StartPage 840
SubjectTerms Active appearance model
Autonomy
Computational modeling
Human computer interaction
Human-robot acceptance
Human-robot interaction
Risk
Robot
Robots
Security
Security robots
Technology acceptance model
Title Autonomy Acceptance Model (AAM): The Role of Autonomy and Risk in Security Robot Acceptance
URI https://ieeexplore.ieee.org/document/10660878
WOSCitedRecordID wos001239977500089&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV2_TwMhFCa2cXBSY42_w-CgAxWEg8PtYmxcbJraoYlDA9y7pLG5M-2df79Ar7WLg0yEEEh4kI8H73sfQrcm8T6y99gIA8eJR2hNDKSOWKEFLXwB6aLYhBoO0-lUj1qyeuTCAEAMPoN-qMa__LxyTXgq8ydcSpqqtIM6Ssk1WWuzebyfw8KnX5u-h4nkgYdU4kr1uQdVGvTpdvRTInwMDv858RHq_RLx8GgLMcdoD8oT9JE1daQi4MyFoJRgNxw0zRb4Lsve7p-wtz0eVwvAVYG3nU2Z4_F89YnnJX5vVet8L1vVO-P00GTwMnl-Ja1GAjHeVaqJErmmgoFH6UJJ6XLNc2qFA55wy2QOHu-ltLLgLjXWGM2pUdxqqZlRScFPUbesSjhDOBWJdn4AE-4kVoRAasN4YbTNaVIIOEe9sDCzr3UWjNlmTS7-aL9EB4_-AhDitRi7Qt162cA12nff9Xy1vIm2-wESO5tK
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8MgFCY6TfSkxhl_y8GDHjphUCjeGuMy47Ysc4clHhagr8mypTVb598vdN3cxYOcCCGQ8CAfD973PoTudeh8ZOexBRQsCxxCq0BDZAPDFSepKyBsKTYhe71oNFL9iqxecmEAoAw-g4avln_5SW6X_qnMnXAhSCSjXbQXct4kK7rWevs4T4f6b78qgQ_l4RPzycSlbDAHq8Qr1G0pqJQA0jr659THqP5LxcP9DcicoB3ITtFnvCxKMgKOrQ9L8ZbDXtVshh_iuPv4jJ318SCfAc5TvOmsswQPJospnmT4o9Ktc71MXmyNU0fD1uvwpR1UKgmBds5SEUieKMIpOJxOpRA2USwhhltgITNUJOAQXwgjUmYjbbRWjGjJjBKKahmm7AzVsjyDc4QjHirrBtD-VmK4D6XWlKVamYSEKYcLVPcLM_5a5cEYr9fk8o_2O3TQHnY7485b7_0KHTbddcBHb1F6jWrFfAk3aN9-F5PF_La04w9XR56R
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+19th+ACM%2FIEEE+International+Conference+on+Human-Robot+Interaction+%28HRI%29&rft.atitle=Autonomy+Acceptance+Model+%28AAM%29%3A+The+Role+of+Autonomy+and+Risk+in+Security+Robot+Acceptance&rft.au=Ye%2C+Xin&rft.au=Jo%2C+Wonse&rft.au=Ali%2C+Arsha&rft.au=Bhatti%2C+Samia+Cornelius&rft.date=2024-03-11&rft.pub=ACM&rft.spage=840&rft.epage=849&rft_id=info:doi/10.1145%2F3610977.3635005&rft.externalDocID=10660878