{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:58:05Z","timestamp":1743134285098,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319218335"},{"type":"electronic","value":"9783319218342"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-21834-2_4","type":"book-chapter","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T15:06:28Z","timestamp":1461164788000},"page":"41-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Justification and Transparency Explanations in Dialogue Systems to Maintain Human-Computer Trust"],"prefix":"10.1007","author":[{"given":"Florian","family":"Nothdurft","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Minker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,21]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Fogg BJ, Tseng H (1999) The elements of computer credibility. In: Proceedings of the SIGCHI conference on human factors in computing systems. CHI \u201999ACM, New York, pp 80\u201387","DOI":"10.1145\/302979.303001"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Glass A, McGuinness DL, Wolverton M (2008) Toward establishing trust in adaptive agents. In: IUI \u201908: Proceedings of the 13th international conference on intelligent user interfaces. ACM, New York, pp 227\u2013236","DOI":"10.1145\/1378773.1378804"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1518\/hfes.46.1.50.30392","volume":"46","author":"JD Lee","year":"2004","unstructured":"Lee JD, See KA (2004) Trust in automation: designing for appropriate reliance. Hum Factors: J Hum Factors Ergon Soc 46(1):50\u201380","journal-title":"Hum Factors: J Hum Factors Ergon Soc"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Lim BY, Dey AK, Avrahami D (2009) Why and why not explanations improve the intelligibility of context-aware intelligent systems. In: Proceedings of the SIGCHI conference on human factors in computing systems. CHI \u201909ACM, New York, pp 2119\u20132128","DOI":"10.1145\/1518701.1519023"},{"key":"4_CR5","unstructured":"Madsen M, Gregor S (2000) Measuring human-computer trust. In: Proceedings of the 11th australasian conference on information systems, pp 6\u20138"},{"issue":"3","key":"4_CR6","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manag Rev 20(3):709\u2013734","journal-title":"Acad Manag Rev"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Muir BM (1992) Trust in automation: Part i. Theoretical issues in the study of trust and human intervention in automated systems. In: Ergonomics, pp 1905\u20131922","DOI":"10.1080\/00140139408964957"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Nothdurft F, Bertrand G, Lang H, Minker W (2012) Adaptive explanation architecture for maintaining human-computer trust. In: 36th Annual IEEE computer software and applications conference. COMPSAC","DOI":"10.1109\/COMPSAC.2012.28"},{"issue":"2","key":"4_CR9","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1518\/001872097778543886","volume":"39","author":"R Parasuraman","year":"1997","unstructured":"Parasuraman R, Riley V (1997) Humans and automation: use, misuse, disuse, abuse. Hum Factors: J Hum Factors Ergonomics Soc 39(2):230\u2013253","journal-title":"Hum Factors: J Hum Factors Ergonomics Soc"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1026\/0012-1924.51.4.195","volume":"4","author":"B Rammstedt","year":"2005","unstructured":"Rammstedt B, John OP (2005) Short version of the \u2018big five inventory\u2019 (bfi-k). Diagnostica: Zeitschrift fuer psychologische Diagnostik und differentielle Psychologie 4:195\u2013206","journal-title":"Diagnostica: Zeitschrift fuer psychologische Diagnostik und differentielle Psychologie"},{"key":"4_CR11","unstructured":"S\u00f8rmo F, Cassens J (2004) Explanation goals in case-based reasoning. In: Proceedings of the ECCBR 2004 workshops"},{"issue":"5","key":"4_CR12","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/301353.301402","volume":"42","author":"S Tseng","year":"1999","unstructured":"Tseng S, Fogg BJ (1999) Credibility and computing technology. Commun ACM 42(5):39\u201344","journal-title":"Commun ACM"}],"container-title":["Signals and Communication Technology","Situated Dialog in Speech-Based Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21834-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T14:47:21Z","timestamp":1676990841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21834-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319218335","9783319218342"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21834-2_4","relation":{},"ISSN":["1860-4862","1860-4870"],"issn-type":[{"type":"print","value":"1860-4862"},{"type":"electronic","value":"1860-4870"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}