{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:50:05Z","timestamp":1743094205024,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030256289"},{"type":"electronic","value":"9783030256296"}],"license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-25629-6_2","type":"book-chapter","created":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T09:07:53Z","timestamp":1563959273000},"page":"10-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Addressing Accountability in Highly Autonomous Virtual Assistants"],"prefix":"10.1007","author":[{"given":"Fernando","family":"Galdon","sequence":"first","affiliation":[]},{"given":"Stephen Jia","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"issue":"2","key":"2_CR1","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1080\/00140139.2016.1190035","volume":"60","author":"PA Hancock","year":"2017","unstructured":"Hancock, P.A.: Imposing limits on autonomous systems. Ergonomics 60(2), 284\u2013291 (2017)","journal-title":"Ergonomics"},{"issue":"7729","key":"2_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1038\/s41586-018-0637-6","volume":"563","author":"Edmond Awad","year":"2018","unstructured":"Awad, E., Dsouza, S., Kim, R., Schulz, J., Henrich, J., Shariff, A., Bonnefon, J.F., Rahwan, I.: The moral machine experiment. Nature (2018). \n                    https:\/\/doi.org\/10.1038\/s41586-018-0637-6","journal-title":"Nature"},{"key":"2_CR3","unstructured":"Jin, H., Wang, S.: Voice-based determination of physical and emotional characteristics of user (2018). \n                    http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.htm&r=1&p=1&f=G&l=50&d=PTXT&S1=10,096,319&OS=10,096,319&RS=10,096,319"},{"key":"2_CR4","unstructured":"Ortega, B.P.A., Maini, V.: Building safe artificial intelligence: specification, robustness, and assurance specification: de ne the purpose of the system. Medium. Retrieved from \n                    https:\/\/medium.com\/@deepmindsafetyresearch\/building-safe-artificial-intelligence-52f5f75058f\n                    \n                   (2018)"},{"key":"2_CR5","unstructured":"Wang, S.J.: Fields interaction design (FID): the answer to ubiquitous computing supported environments in the post-information age. Homa & Sekey Books (2013)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Wang, S.J., Moriarty, P.: Big Data for Urban Sustainability. Springer (2018)","DOI":"10.1007\/978-3-319-73610-5"},{"key":"2_CR7","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. Proceedings of the 35th International Conference on Machine Learning. Stockholm, Sweden, PMLR 80 (2018)"},{"key":"2_CR8","unstructured":"Uesato, J., O\u2019Donoghue, B., van den Oord, A., Kohli, P.: Adversarial risk and the dangers of evaluating against weak attacks. Proceedings of the 35th International Conference on Machine Learning. Stockholm, Sweden, PMLR 80 (2018)"},{"key":"2_CR9","unstructured":"Ehlers, R.: Formal verification of piece-wise linear feed-forward neural networks. BT - Automated Technology for Verification and Analysis - 15th International Symposium, ATVA 2017, Pune, India, October 3\u20136, 2017, Proceedings (2017)"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-63387-9_5","volume-title":"Computer Aided Verification","author":"Guy Katz","year":"2017","unstructured":"Katz, G., Barrett, C.W., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient SMT solver for verifying deep neural networks. BT - Computer Aided Verification - 29th International Conference, CAV 2017, Heidelberg, Germany, July 24\u201328, 2017, Proceedings, Part I (2017)"},{"key":"2_CR11","unstructured":"Mirman, M., Gehr, T., Vechev, M.: Differentiable abstract interpretation for provably robust neural networks. Proceedings of the 35th International Conference on Machine Learning, in PMLR 80, pp. 3578\u20133586 (2018)"},{"key":"2_CR12","unstructured":"Kohli, P., Gowal, S., Dvijotham, K., Uesato, J.: Towards robust and verified AI: specification testing, robust training, and formal verification. Deepmind. Medium 28 March 2019. \n                    https:\/\/deepmind.com\/blog\/robust-and-verified-ai\/\n                    \n                   (2019). Accessed 29 Mar 2019"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Sheridan, T.B., Verplank, W.L.: Human and computer control of Undersea teleoperators: Fort Belvoir, VA: Defense Technical Information Center (1978). \n                    https:\/\/doi.org\/10.21236\/ADA057655","DOI":"10.21236\/ADA057655"},{"issue":"1","key":"2_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1177\/1555343417737203","volume":"12","author":"DB Kaber","year":"2018","unstructured":"Kaber, D.B.: Issues in human-automation interaction modeling: presumptive aspects of frameworks of types and levels of automation. J. Cogn. Eng. Decis. Making 12(1), 7\u201324 (2018). \n                    https:\/\/doi.org\/10.1177\/1555343417737203","journal-title":"J. Cogn. Eng. Decis. Making"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1177\/0018720816681350","volume":"59","author":"MR Endsley","year":"2017","unstructured":"Endsley, M.R.: From here to autonomy: lessons learned from human\u2013automation research. Hum. Factors: The J. Hum. Factors Ergon. Soc. 59, 5\u201327 (2017). \n                    https:\/\/doi.org\/10.1177\/0018720816681350","journal-title":"Hum. Factors: The J. Hum. Factors Ergon. Soc."},{"key":"2_CR16","unstructured":"Simpson, A., Brander, G.N., Portsdown, D.R.A.: Seaworthy trust: confidence in automated data fusion. In: Taylor, R.M., Reising, J. (eds.) The Human-Electronic Crew: Can We Trust the Team, pp, 77\u201381. Hampshire, UK: Defence Research Academy. Retrieved from \n                    http:\/\/www.dtic.mil\/dtic\/tr\/fulltext\/u2\/a308589.pdf\n                    \n                   (1995)"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1177\/0018720814547570","volume":"57","author":"KA Hoff","year":"2015","unstructured":"Hoff, K.A., Bashir, M.: Trust in automation: integrating empirical evidence on factors that influence trust. Hum. Factors: The J. Hum. Factors Ergon. Soc. 57, 407\u2013434 (2015)","journal-title":"Hum. Factors: The J. Hum. Factors Ergon. Soc."},{"key":"2_CR18","unstructured":"Galdon, F., Wang, S.J.: Designing trust in highly automated virtual assistants: a taxonomy of levels of autonomy. International Conference on Industry 4.0 and Artificial Intelligence Technologies. Cambridge, UK. ISBN: 978-1-912532-07-0 (2019)"}],"container-title":["Advances in Intelligent Systems and Computing","Human Interaction and Emerging Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-25629-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T11:28:30Z","timestamp":1564399710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-25629-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"ISBN":["9783030256289","9783030256296"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-25629-6_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"25 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IHIET","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Interaction and Emerging Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ihiet2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ihiet.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}