{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:45:19Z","timestamp":1776105919652,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031422799","type":"print"},{"value":"9783031422805","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42280-5_24","type":"book-chapter","created":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T18:04:47Z","timestamp":1692900287000},"page":"379-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Trust in\u00a0Facial Recognition Systems: A Perspective from\u00a0the\u00a0Users"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2852-2348","authenticated-orcid":false,"given":"Gabriela","family":"Beltr\u00e3o","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5865-1389","authenticated-orcid":false,"given":"Sonia","family":"Sousa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0295-453X","authenticated-orcid":false,"given":"David","family":"Lamas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,25]]},"reference":[{"key":"24_CR1","unstructured":"Mozambique\u2019s Digital Transformation. https:\/\/www.trade.gov\/market-intelligence\/mozambiques-digital-transformation"},{"key":"24_CR2","unstructured":"on Artificial Intelligence, H.L.E.G.: Assessment list for trustworthy artificial intelligence (Altai) for self-assessment, July 2020. https:\/\/digital-strategy.ec.europa.eu\/en\/library\/assessment-list-trustworthy-artificial-intelligence-altai-self-assessment"},{"key":"24_CR3","doi-asserted-by":"publisher","unstructured":"Bach, T.A., Khan, A., Hallock, H., Beltr\u00e3o, G., Sousa, S.: A systematic literature review of user trust in AI-enabled systems: an HCI perspective. International Journal of Human-Computer Interaction, pp. 1\u201316 (2022). https:\/\/doi.org\/10.1080\/10447318.2022.2138826","DOI":"10.1080\/10447318.2022.2138826"},{"key":"24_CR4","first-page":"156","volume":"141","author":"P Bazeley","year":"2004","unstructured":"Bazeley, P.: Issues in mixing qualitative and quantitative approaches to research. Appl. Qual. Methods Market. Manage. Res. 141, 156 (2004)","journal-title":"Appl. Qual. Methods Market. Manage. Res."},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-030-90238-4_35","volume-title":"HCI International 2021 - Late Breaking Papers: Design and User Experience","author":"G Beltr\u00e3o","year":"2021","unstructured":"Beltr\u00e3o, G., Sousa, S.: Factors influencing trust in WhatsApp: a cross-cultural study. In: Stephanidis, C., et al. (eds.) HCII 2021. LNCS, vol. 13094, pp. 495\u2013508. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90238-4_35"},{"key":"24_CR6","doi-asserted-by":"publisher","unstructured":"Bostrom, R.P., Heinen, J.S.: MIS problems and failures: a socio-technical perspective. part i: The causes. MIS Q. 17\u201332 (1977). https:\/\/doi.org\/10.2307\/248710","DOI":"10.2307\/248710"},{"key":"24_CR7","unstructured":"Commission, E.: Annexes to the proposal for a regulation of the european parliament and of the council laying down harmonised rules on artificial intelligence (artificial intelligence act) and amending certain union legislative acts (2021). https:\/\/ec.europa.eu\/newsroom\/dae\/redirection\/document\/75789"},{"key":"24_CR8","unstructured":"Commission, E.: Proposal for a regulation of the European parliament and of the council laying down harmonised rules on artificial intelligence(artificial intelligence act) and amending certain union legislative acts (2021). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?qid=1623335154975 &uri=CELEX%3A52021PC0206"},{"issue":"7771","key":"24_CR9","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1038\/d41586-019-02514-7","volume":"572","author":"K Crawford","year":"2019","unstructured":"Crawford, K.: Halt the use of facial-recognition technology until it is regulated. Nature 572(7771), 565\u2013566 (2019)","journal-title":"Nature"},{"key":"24_CR10","unstructured":"Creswell, J.W., Clark, V.L.P.: Designing and Conducting Mixed Methods Research. Sage Publications (2017)"},{"issue":"2","key":"24_CR11","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s12369-019-00596-x","volume":"12","author":"E De Visser","year":"2020","unstructured":"De Visser, E., et al.: Towards a theory of longitudinal trust calibration in human-robot teams. Int. J. Soc. Robot. 12(2), 459\u2013478 (2020). https:\/\/doi.org\/10.1007\/s12369-019-00596-x","journal-title":"Int. J. Soc. Robot."},{"key":"24_CR12","doi-asserted-by":"publisher","unstructured":"Fimberg, K., Sousa, S.: The impact of website design on users\u2019 trust perceptions. In: Markopoulos, E., Goonetilleke, R., Ho, A., Luximon, Y. (eds.) Advances in Creativity, Innovation, Entrepreneurship and Communication of Design. AHFE 2020. AISC, vol. 1218, pp. 267\u2013274. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51626-0_34","DOI":"10.1007\/978-3-030-51626-0_34"},{"key":"24_CR13","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1656779","author":"B Gebru","year":"2022","unstructured":"Gebru, B., Zeleke, L., Blankson, D., Nabil, M., Nateghi, S., Homaifar, A., Tunstel, E.: A review on human-machine trust evaluation: human-centric and machine-centric perspectives. IEEE Trans. Human Mach. Syst. (2022). https:\/\/doi.org\/10.1080\/0144929X.2019.1656779","journal-title":"IEEE Trans. Human Mach. Syst."},{"issue":"10","key":"24_CR14","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1080\/0144929X.2019.1656779","volume":"38","author":"S Gulati","year":"2019","unstructured":"Gulati, S., Sousa, S., Lamas, D.: Design, development and evaluation of a human-computer trust scale. Behav. Inf. Technol. 38(10), 1004\u20131015 (2019). https:\/\/doi.org\/10.1080\/0144929X.2019.1656779","journal-title":"Behav. Inf. Technol."},{"key":"24_CR15","unstructured":"Hao, K.: South Africa\u2019s private surveillance machine is fueling a digital apartheid (2022). https:\/\/www.technologyreview.com\/2022\/04\/19\/1049996\/south-africa-ai-surveillance-digital-apartheid\/"},{"key":"24_CR16","unstructured":"Johnson, K.: How Wrongful Arrests Based on AI Derailed 3 Men\u2019s Lives (2022). https:\/\/www.wired.com\/story\/wrongful-arrests-ai-derailed-3-mens-lives\/?mc_cid=187337992f"},{"key":"24_CR17","unstructured":"Johnson, K.: Iran Says Face Recognition Will ID Women Breaking Hijab Laws (2023). https:\/\/www.wired.com\/story\/iran-says-face-recognition-will-id-women-breaking-hijab-laws\/"},{"key":"24_CR18","doi-asserted-by":"publisher","first-page":"139110","DOI":"10.1109\/ACCESS.2020.3011028","volume":"8","author":"L Li","year":"2020","unstructured":"Li, L., Mu, X., Li, S., Peng, H.: A review of face recognition technology. IEEE Access 8, 139110\u2013139120 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3011028","journal-title":"IEEE Access"},{"issue":"3","key":"24_CR19","doi-asserted-by":"publisher","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709\u2013734 (1995). https:\/\/doi.org\/10.5465\/amr.1995.9508080335","journal-title":"Acad. Manag. Rev."},{"key":"24_CR20","unstructured":"Miles, M.B., Huberman, A.M., Salda\u00f1a, J.: Qualitative Data Analysis: A Methods Sourcebook. Sage publications (2018)"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Miles, S., Rowe, G.: The laddering technique. Doing social psychology research, pp. 305\u2013343 (2004)","DOI":"10.1002\/9780470776278.ch13"},{"key":"24_CR22","doi-asserted-by":"publisher","unstructured":"Pinto, A., Sousa, S., Silva, C., Coelho, P.: Adaptation and validation of the HCTM scale into human-robot interaction portuguese context: a study of measuring trust in human-robot interactions. In: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, pp. 1\u20134 (2020). https:\/\/doi.org\/10.1145\/3419249.3420087","DOI":"10.1145\/3419249.3420087"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Putnam, R.D.: Bowling alone: America\u2019s declining social capital. In: The City Reader, pp. 188\u2013196. Routledge (2015)","DOI":"10.4324\/9781315748504-30"},{"key":"24_CR24","doi-asserted-by":"publisher","unstructured":"Reynolds, T.J., Gutman, J.: Laddering theory, method, analysis, and interpretation. In: Understanding consumer decision making, pp. 40\u201379. Psychology Press (2001). https:\/\/doi.org\/10.4324\/9781410600844-9","DOI":"10.4324\/9781410600844-9"},{"key":"24_CR25","unstructured":"Roser, M., Ritchie, H., Ortiz-Ospina, E.: Internet. Our World in Data (2015). https:\/\/ourworldindata.org\/internet"},{"issue":"2","key":"24_CR26","doi-asserted-by":"publisher","DOI":"10.2196\/33951","volume":"9","author":"S Sousa","year":"2022","unstructured":"Sousa, S., Kalju, T., et al.: Modeling trust in COVID-19 contact-tracing apps using the human-computer trust scale: online survey study. JMIR Hum. Factors 9(2), e33951 (2022). https:\/\/doi.org\/10.2196\/33951","journal-title":"JMIR Hum. Factors"},{"key":"24_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-319-07482-5_13","volume-title":"Learning and Collaboration Technologies. Designing and Developing Novel Learning Experiences","author":"S Sousa","year":"2014","unstructured":"Sousa, S., Lamas, D., Dias, P.: A model for human-computer trust. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2014. LNCS, vol. 8523, pp. 128\u2013137. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07482-5_13"},{"key":"24_CR28","doi-asserted-by":"publisher","unstructured":"Urquhart, L.D., McGarry, G., Crabtree, A.: Legal provocations for HCI in the design and development of trustworthy autonomous systems. In: Nordic Human-Computer Interaction Conference, pp. 1\u201312 (2022). https:\/\/doi.org\/10.1145\/3546155.3546690","DOI":"10.1145\/3546155.3546690"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42280-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T18:07:49Z","timestamp":1692900469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42280-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031422799","9783031422805"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42280-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"25 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"York","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"406","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4,01","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,75","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Courses: 6 Industrial Experiences: 2 Interactive demos: 10 Panels: 2 Keynotes: 2 Posters: 44 Workshop summaries: 16- Submissions -As for full paper: 220 As for short papers: 186","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}