{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T05:00:56Z","timestamp":1764997256864,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030256289"},{"type":"electronic","value":"9783030256296"}],"license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-25629-6_7","type":"book-chapter","created":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T09:07:53Z","timestamp":1563959273000},"page":"42-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["From Apology to Compensation: A Multi-level Taxonomy of Trust Reparation for Highly Automated Virtual Assistants"],"prefix":"10.1007","author":[{"given":"Fernando","family":"Galdon","sequence":"first","affiliation":[]},{"given":"Stephen Jia","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1080\/00140139.2016.1190035","volume":"60","author":"PA Hancock","year":"2017","unstructured":"Hancock, P.A.: Imposing limits on autonomous systems. Ergonomics 60(2), 284\u2013291 (2017). \n                    https:\/\/doi.org\/10.1080\/00140139.2016.1190035","journal-title":"Ergonomics"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Wang, S.J., Moriarty, P.: Big Data for Urban Sustainability. Springer (2018)","DOI":"10.1007\/978-3-319-73610-5"},{"key":"7_CR3","volume-title":"Fields Interaction Design (FID): The Answer to Ubiquitous Computing-Supported Environments in the Post-Information Age","author":"SJ Wang","year":"2013","unstructured":"Wang, S.J.: Fields Interaction Design (FID): The Answer to Ubiquitous Computing-Supported Environments in the Post-Information Age. Homa & Sekey Books, Paramus (2013)"},{"issue":"5","key":"7_CR4","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1287\/orsc.13.5.497.7816","volume":"13","author":"WP Bottom","year":"2002","unstructured":"Bottom, W.P., Gibson, K., Daniels, S.E., Murnighan, J.K.: When talk is not cheap: substantive penance and expressions of intent in rebuilding cooperation. Organ. Sci. 13(5), 497\u2013513 (2002)","journal-title":"Organ. Sci."},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1037\/0021-9010.89.1.104","volume":"89","author":"PH Kim","year":"2004","unstructured":"Kim, P.H., Ferrin, D.L., Cooper, C.D., Dirks, K.T.: Removing the shadow of suspicion: the effects of apology versus denial for repairing competence-versus integrity-based trust violations. J. Appl. Psychol. 89(1), 104 (2004)","journal-title":"J. Appl. Psychol."},{"issue":"1","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1177\/1541931218621254","volume":"62","author":"SC Kohn","year":"2018","unstructured":"Kohn, S.C., Quinn, D., Pak, R., de Visser, E.J., Shaw, T.H.: Trust repair strategies with self-driving vehicles: an exploratory study. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 62(1), 1108\u20131112 (2018). \n                    https:\/\/doi.org\/10.1177\/1541931218621254","journal-title":"Proc. Hum. Factors Ergon. Soc. Annu. Meet."},{"issue":"3","key":"7_CR7","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/3468.844354","volume":"30","author":"R. Parasuraman","year":"2000","unstructured":"Parasuraman, R., Sheridan, T.B., Wickens, C.D.: A model for types and levels of human interaction with automation. IEEE Trans. Syst. Man Cybern. A Syst. Hum. 30, 286\u2013297 (2000)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1080\/14639220500370105","volume":"8","author":"CD Wickens","year":"2007","unstructured":"Wickens, C.D., Dixon, S.R.: The benefits of imperfect diagnostic automation: a synthesis of the literature. Theor. Issues Ergon. Sci. 8, 201\u2013212 (2007)","journal-title":"Theor. Issues Ergon. Sci."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1177\/0018720809338842","volume":"51","author":"L Wang","year":"2009","unstructured":"Wang, L., Jamieson, G.A., Hollands, J.G.: Trust and reliance on an automated combat identification system. Hum. Factors 51, 281\u2013291 (2009)","journal-title":"Hum. Factors"},{"issue":"2015","key":"7_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.dss.2015.01.009","volume":"71","author":"G Bansal","year":"2015","unstructured":"Bansal, G., Zahedi, F.M.: Trust violation and repair: The information privacy perspective. Decis. Support. Syst. 71(2015), 62\u201377 (2015)","journal-title":"Decis. Support. Syst."},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Sheridan, T.B., Verplank, W.L.: Human and Computer Control of Undersea Teleoperators. Defense Technical Information Center, Fort Belvoir, VA (1978). \n                    https:\/\/doi.org\/10.21236\/ADA057655","DOI":"10.21236\/ADA057655"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1177\/1555343417737203","volume":"12","author":"DB Kaber","year":"2018","unstructured":"Kaber, D.B.: Issues in human-automation interaction modeling: presumptive aspects of frameworks of types and levels of automation. J. Cogn. Eng. Decis. Mak. 12(1), 7\u201324 (2018). \n                    https:\/\/doi.org\/10.1177\/1555343417737203","journal-title":"J. Cogn. Eng. Decis. Mak."},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1177\/0018720816681350","volume":"59","author":"MR Endsley","year":"2017","unstructured":"Endsley, M.R.: From here to autonomy: lessons learned from human\u2013automation research. Hum. Factors: J. Hum. Factors Ergon. Soc. 59, 5\u201327 (2017). \n                    https:\/\/doi.org\/10.1177\/0018720816681350","journal-title":"Hum. Factors: J. Hum. Factors Ergon. Soc."},{"key":"7_CR14","unstructured":"Simpson, A., Brander, G.N., Portsdown, D.R.A.: Seaworthy trust: confidence in automated data fusion. In: Taylor, R.M. Reising, J. (eds.) The Human-Electronic Crew: can we Trust the Team, pp. 77\u201381. Defence Research Academy, Hampshire, UK (1995). \n                    http:\/\/www.dtic.mil\/dtic\/tr\/fulltext\/u2\/a308589.pdf"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1177\/0018720814547570","volume":"57","author":"KA Hoff","year":"2015","unstructured":"Hoff, K.A., Bashir, M.: Trust in automation: integrating empirical evidence on factors that influence trust. Hum. Factors: J. Hum. Factors Ergon. Soc. 57, 407\u2013434 (2015)","journal-title":"Hum. Factors: J. Hum. Factors Ergon. Soc."},{"key":"7_CR16","unstructured":"Galdon, F., Wang, S.J. (2019). Designing trust in highly automated virtual assistants: a taxonomy of levels of autonomy. In: International Conference on Industry 4.0 and Artificial Intelligence Technologies. Cambridge, UK. ISBN: 978-1-912532-07-0"}],"container-title":["Advances in Intelligent Systems and Computing","Human Interaction and Emerging Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-25629-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T11:28:54Z","timestamp":1564399734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-25629-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"ISBN":["9783030256289","9783030256296"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-25629-6_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"25 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IHIET","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Interaction and Emerging Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ihiet2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ihiet.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}