recommended reading

People Like Being Bossed Around By Robots, Study Finds

Would you let a robot boss you around?

Would you let a robot boss you around? // Matt Rourke/AP

If science fiction has taught us anything, it’s that once humans start taking commands from robot overseers, we’re in trouble.

That’s why researchers at MIT’s artificial intelligence lab expected people to be uncomfortable deferring to a robot to assign them tasks. What they found instead, in an experiment on how humans and robots work in teams, was surprising: People not only didn’t mind when the bot was the boss; they actually preferred it to being in control themselves.

The study, published recently in Robotics: Science and Systems, examined productivity and job satisfaction in environments where people and robots collaborate, such as Amazon fulfillment centers. Computers can figure out a near-optimal plan for allocating tasks among workers and robots in seconds. But the researchers worried that this undermines workers’ senses of autonomy, leading to dissatisfaction and a decreased feeling of usefulness.

To test the theory, they designed an experiment that mimicked a factory setting using Lego sets that had to be brought from a “fetch” station to be assembled at a “build” station. Only a human could assemble the Legos, but either a human or a robot could fetch them.

Tasks were assigned three different ways: manually, in which the human test subject decided which tasks he or she would do and which tasks the robot would do; autonomously, in which all assignment was left up to the computer; and semi-autonomously, in which the human picked the tasks he or she wanted, and the remaining tasks were assigned by the scheduler.

The researchers expected workers to be more productive when a computer assigned tasks, and they were. But this scenario also made workers more satisfied. This might be because the robots were simply better at scheduling, which led to less downtime and an increased feeling of efficiency.

That said, more research is likely needed before real-world conclusions can be drawn. The study’s test subjects were “college students and young professionals whose livelihoods are not threatened by the possibility of robots replacing them.” Employees in professions to which robots pose an imminent threat—an ever-expanding set—might be less inclined to surrender control. And indeed, automated scheduling already makes life difficult for some low-wage hourly workers.

Here’s a video that describes the research in more detail:

Reprinted with permission from Quartz. The original story can be found here

Threatwatch Alert

Credential-stealing malware / User accounts compromised / Software vulnerability

Android Malware Infects More than 1M Phones, Adds 13,000 Devices a Day

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.