{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T08:51:12Z","timestamp":1779353472570,"version":"3.51.4"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,10,11]],"date-time":"2011-10-11T00:00:00Z","timestamp":1318291200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cogn Tech Work"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s10111-011-0194-3","type":"journal-article","created":{"date-parts":[[2011,10,10]],"date-time":"2011-10-10T10:38:09Z","timestamp":1318243089000},"page":"39-49","source":"Crossref","is-referenced-by-count":422,"title":["Extending the Technology Acceptance Model to assess automation"],"prefix":"10.1007","volume":"14","author":[{"given":"Mahtab","family":"Ghazizadeh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John D.","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Linda Ng","family":"Boyle","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2011,10,11]]},"reference":[{"issue":"4","key":"194_CR1","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1080\/095373203000136033","volume":"15","author":"I Adamson","year":"2003","unstructured":"Adamson I, Shine J (2003) Extending the new Technology Acceptance Model to measure the end user information systems satisfaction in a mandatory environment: a bank\u2019s treasury. Technol Anal Strateg Manag 15(4):441\u2013455","journal-title":"Technol Anal Strateg Manag"},{"issue":"2","key":"194_CR2","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50(2):179\u2013211","journal-title":"Organ Behav Hum Decis Process"},{"issue":"4","key":"194_CR3","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1177\/106480469500300403","volume":"3","author":"AD Andre","year":"1995","unstructured":"Andre AD, Wickens CD (1995) When users want what\u2019s not best for them. Ergon Des Q Hum Factors Appl 3(4):10\u201314","journal-title":"Ergon Des Q Hum Factors Appl"},{"key":"194_CR4","doi-asserted-by":"crossref","unstructured":"Bailey RW (1993) Performance versus preference. In: Proceedings of human factors and Ergonomics society 37th annual meeting, pp 282\u2013286","DOI":"10.1177\/154193129303700406"},{"issue":"4","key":"194_CR5","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/S0378-7206(98)00026-3","volume":"33","author":"A Bajaj","year":"1998","unstructured":"Bajaj A, Nidumolu SR (1998) A feedback model to understand information system usage. Inf Manag 33(4):213\u2013224","journal-title":"Inf Manag"},{"issue":"5","key":"194_CR6","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1086\/261957","volume":"102","author":"BD Bernheim","year":"1994","unstructured":"Bernheim BD (1994) A theory of conformity. J Polit Econ 102(5):841\u2013877","journal-title":"J Polit Econ"},{"issue":"4","key":"194_CR7","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1057\/palgrave.ejis.3000438","volume":"11","author":"SA Brown","year":"2002","unstructured":"Brown SA, Massey AP, Montoya-Weiss MM, Burkman JR (2002) Do I really have to? user acceptance of mandated technology. Eur J Inf Syst 11(4):283\u2013295","journal-title":"Eur J Inf Syst"},{"issue":"1","key":"194_CR8","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1111\/j.1365-2575.2005.00183.x","volume":"15","author":"L Carter","year":"2005","unstructured":"Carter L, B\u00e9langer F (2005) The utilization of e government services: citizen trust, innovation and acceptance factors. Inf Syst J 15(1):5\u201325","journal-title":"Inf Syst J"},{"key":"194_CR9","doi-asserted-by":"crossref","first-page":"6217","DOI":"10.1016\/j.eswa.2010.11.047","volume":"38","author":"CF Chen","year":"2011","unstructured":"Chen CF, Chen PC (2011) Applying the TAM to travelers\u2019 usage intentions of GPS devices. Expert Syst Appl 38:6217\u20136221","journal-title":"Expert Syst Appl"},{"key":"194_CR10","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis FD (1989) Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Q 13:319\u2013340","journal-title":"MIS Q"},{"issue":"1","key":"194_CR11","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1006\/ijhc.1996.0040","volume":"45","author":"FD Davis","year":"1996","unstructured":"Davis FD, Venkatesh V (1996) A critical assessment of potential measurement biases in the Technology Acceptance Model: three experiments. Int J Hum Comput Stud 45(1):19\u201345","journal-title":"Int J Hum Comput Stud"},{"issue":"8","key":"194_CR12","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"FD Davis","year":"1989","unstructured":"Davis FD, Bagozzi RP, Warshaw PR (1989) User acceptance of computer technology: a comparison of two theoretical models. Manag Sci 35(8):982\u20131003","journal-title":"Manag Sci"},{"key":"194_CR13","unstructured":"Dishaw MT, Strong DM (1998) Experience as a moderating variable in a task-technology fit model. In: Proceedings of fourth Americas conference on information systems, pp 722\u2013724"},{"issue":"1","key":"194_CR14","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S0378-7206(98)00101-3","volume":"36","author":"MT Dishaw","year":"1999","unstructured":"Dishaw MT, Strong DM (1999) Extending the Technology Acceptance Model with task-technology fit constructs. Inf Manag 36(1):9\u201321","journal-title":"Inf Manag"},{"key":"194_CR15","unstructured":"El Jaafari M, Forzy JF, Navarro J, Mars F, Hoc JM (2008) User acceptance and effectiveness of warning and motor priming assistance devices in car driving. In: Proceedings of European conference on human centred design for intelligent transport systems, pp 311\u2013320"},{"key":"194_CR16","volume-title":"Belief, attitude, intention and behavior: an introduction to theory and research","author":"M Fishbein","year":"1975","unstructured":"Fishbein M, Ajzen I (1975) Belief, attitude, intention and behavior: an introduction to theory and research. Addison-Wesley, Reading"},{"key":"194_CR17","doi-asserted-by":"crossref","unstructured":"Flach JM, Vicente KJ, Tanabe F, Monta K, Rasmussen J (1998) An ecological approach to interface design. In: Proceedings of the human factors and Ergonomics society 42nd annual meeting, vol 42, pp 295\u2013299","DOI":"10.1177\/154193129804200324"},{"key":"194_CR18","unstructured":"Fogg BJ, Marshall J, Laraki O, Osipovich A, Varma C, Fang N, Paul J, Rangnekar A, Shon J, Swani P (2001) What makes Web sites credible? A report on a large quantitative study. In: Proceedings of CHI 2001 conference on human factors in computing systems, pp 61\u201368"},{"issue":"5","key":"194_CR19","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1109\/TSMCA.2005.855783","volume":"36","author":"J Gao","year":"2006","unstructured":"Gao J, Lee JD (2006) Extending the decision field theory to model operators\u2019 reliance on automation in supervisory control situations. IEEE Trans Syst Man Cybern A Syst Hum 36(5):943\u2013959","journal-title":"IEEE Trans Syst Man Cybern A Syst Hum"},{"issue":"5","key":"194_CR20","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.ergon.2006.01.013","volume":"36","author":"J Gao","year":"2006","unstructured":"Gao J, Lee JD, Zhang Y (2006) A dynamic model of interaction between reliance on automation and cooperation in multi-operator multi-automation situations. Int J Ind Ergon 36(5):511\u2013526","journal-title":"Int J Ind Ergon"},{"issue":"1","key":"194_CR21","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51\u201390","journal-title":"MIS Q"},{"issue":"2","key":"194_CR22","doi-asserted-by":"crossref","first-page":"213","DOI":"10.2307\/249689","volume":"19","author":"DL Goodhue","year":"1995","unstructured":"Goodhue DL, Thompson RL (1995) Task-technology fit and individual performance. MIS Q 19(2):213\u2013236","journal-title":"MIS Q"},{"issue":"3","key":"194_CR23","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/TSMCA.2003.817040","volume":"33","author":"MA Goodrich","year":"2003","unstructured":"Goodrich MA, Boer ER (2003) Model-based human-centered task automation: a case study in ACC system design. IEEE Trans Syst Man Cybern A Syst Hum 33(3):325\u2013336","journal-title":"IEEE Trans Syst Man Cybern A Syst Hum"},{"issue":"4","key":"194_CR24","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1037\/1076-898X.6.4.322","volume":"6","author":"WD Gray","year":"2000","unstructured":"Gray WD, Boehm-Davis DA (2000) Milliseconds matter: an introduction to microstrategies and to their use in describing and predicting interactive behavior. J Exp Psychol Appl 6(4):322","journal-title":"J Exp Psychol Appl"},{"issue":"1","key":"194_CR25","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1147\/sj.361.0124","volume":"36","author":"PJ Guinan","year":"2010","unstructured":"Guinan PJ, Cooprider JG, Sawyer S (2010) The effective use of automated application development tools. IBM Syst J 36(1):124\u2013139","journal-title":"IBM Syst J"},{"issue":"4","key":"194_CR26","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1287\/mnsc.40.4.440","volume":"40","author":"J Hartwick","year":"1994","unstructured":"Hartwick J, Barki H (1994) Explaining the role of user participation in information system use. Manag Sci 40(4):440\u2013465","journal-title":"Manag Sci"},{"issue":"4","key":"194_CR27","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1006\/ijhc.2000.0454","volume":"54","author":"JM Hoc","year":"2001","unstructured":"Hoc JM (2001) Towards a cognitive approach to human-machine cooperation in dynamic situations. Int J Hum Comput Stud 54(4):509\u2013540","journal-title":"Int J Hum Comput Stud"},{"issue":"6","key":"194_CR28","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/S0020-7373(83)80034-0","volume":"18","author":"E Hollnagel","year":"1983","unstructured":"Hollnagel E, Woods DD (1983) Cognitive systems engineering: new wine in new bottles. Int J Man Mach Stud 18(6):583\u2013600","journal-title":"Int J Man Mach Stud"},{"key":"194_CR29","doi-asserted-by":"crossref","DOI":"10.1201\/9781420038194","volume-title":"Joint cognitive systems: foundations of cognitive systems engineering","author":"E Hollnagel","year":"2005","unstructured":"Hollnagel E, Woods DD (2005) Joint cognitive systems: foundations of cognitive systems engineering. CRC Press, Boca Raton"},{"key":"194_CR30","doi-asserted-by":"crossref","unstructured":"Inagaki T (2003) Adaptive automation: sharing and trading of control. Handbook of cognitive task design 147\u2013169","DOI":"10.1201\/9781410607775.ch8"},{"issue":"3","key":"194_CR31","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10111-006-0034-z","volume":"8","author":"T Inagaki","year":"2006","unstructured":"Inagaki T (2006) Design of human\u2013machine interactions in light of domain-dependence of human-centered automation. Cognit Technol Work 8(3):161\u2013167","journal-title":"Cognit Technol Work"},{"issue":"11","key":"194_CR32","doi-asserted-by":"crossref","first-page":"2540","DOI":"10.1093\/ietfec\/e90-a.11.2540","volume":"90","author":"T Inagaki","year":"2007","unstructured":"Inagaki T, Itoh M, Nagai Y (2007) Support by warning or by action: which is appropriate under mismatches between driver intent and traffic conditions? IEICE Trans Fundam Electron Commun Comput Sci 90(11):2540","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"issue":"2","key":"194_CR33","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1299\/jmtl.1.213","volume":"1","author":"T Inagaki","year":"2008","unstructured":"Inagaki T, Itoh M, Nagai Y (2008) Driver support functions under resource-limited situations. J Mech Syst Transp Logist 1(2):213\u2013222","journal-title":"J Mech Syst Transp Logist"},{"issue":"2","key":"194_CR34","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1111\/j.1540-5915.1997.tb01315.x","volume":"28","author":"CM Jackson","year":"1997","unstructured":"Jackson CM, Chow S, Leitch RA (1997) Toward an understanding of the behavioral intention to use an information system. Decis Sci 28(2):357\u2013389","journal-title":"Decis Sci"},{"issue":"2","key":"194_CR35","doi-asserted-by":"crossref","first-page":"183","DOI":"10.2307\/249751","volume":"23","author":"E Karahanna","year":"1999","unstructured":"Karahanna E, Straub DW, Chervany NL (1999) Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Q 23(2):183\u2013213","journal-title":"MIS Q"},{"issue":"4","key":"194_CR36","doi-asserted-by":"crossref","first-page":"781","DOI":"10.2307\/25148754","volume":"30","author":"E Karahanna","year":"2006","unstructured":"Karahanna E, Agarwal R, Angst CM (2006) Reconceptualizing compatibility beliefs in technology acceptance research. MIS Q 30(4):781\u2013804","journal-title":"MIS Q"},{"key":"194_CR37","first-page":"1076","volume-title":"First international conference on universal Access in human-computer interaction","author":"K Karvonen","year":"2001","unstructured":"Karvonen K, Parkkinen J (2001) Signs of trust: a semiotic study of trust formation in the Web. In: Smith MJ, Salvendy G, Harris D, Koubek RJ (eds) First international conference on universal Access in human-computer interaction, vol 1. Erlbaum, Mahwah, pp 1076\u20131080"},{"issue":"5","key":"194_CR38","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1287\/mnsc.1040.0326","volume":"51","author":"SS Kim","year":"2005","unstructured":"Kim SS, Malhotra NK (2005) A longitudinal model of continued IS use: an integrative view of four mechanisms underlying postadoption phenomena. Manag Sci 51(5):741\u2013755","journal-title":"Manag Sci"},{"issue":"1","key":"194_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0953-5438(97)00037-4","volume":"10","author":"J Kim","year":"1998","unstructured":"Kim J, Moon JY (1998) Designing towards emotional usability in customer interfaces\u2013trustworthiness of cyber-banking system interfaces. Interact Comput 10(1):1\u201329","journal-title":"Interact Comput"},{"issue":"2","key":"194_CR40","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1177\/001872089303500203","volume":"35","author":"A Kirlik","year":"1993","unstructured":"Kirlik A (1993) Modeling strategic behavior in human-automation interaction: why an \u201caid\u201d can (and should) go unused. Hum Factors J Hum Fact Ergon Soc 35(2):221\u2013242","journal-title":"Hum Factors J Hum Fact Ergon Soc"},{"issue":"10","key":"194_CR41","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1080\/00140139208967392","volume":"35","author":"JD Lee","year":"1992","unstructured":"Lee J, Moray N (1992) Trust, control strategies and allocation of function in human-machine systems. Ergonomics 35(10):1243\u20131270","journal-title":"Ergonomics"},{"issue":"1","key":"194_CR42","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1006\/ijhc.1994.1007","volume":"40","author":"JD Lee","year":"1994","unstructured":"Lee JD, Moray N (1994) Trust, self-confidence, and operators\u2019 adaptation to automation. Int J Hum Comput Stud 40(1):153","journal-title":"Int J Hum Comput Stud"},{"issue":"1","key":"194_CR43","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1518\/hfes.46.1.50.30392","volume":"46","author":"JD Lee","year":"2004","unstructured":"Lee JD, See KA (2004) Trust in automation: designing for appropriate reliance. Hum Factors J Hum Factors Ergon Soc 46(1):50","journal-title":"Hum Factors J Hum Factors Ergon Soc"},{"issue":"3","key":"194_CR44","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0378-7206(01)00143-4","volume":"40","author":"P Legris","year":"2003","unstructured":"Legris P, Ingham J, Collerette P (2003) Why do people use information technology? a critical review of the Technology Acceptance Model. Inf Manag 40(3):191\u2013204","journal-title":"Inf Manag"},{"issue":"5","key":"194_CR45","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1177\/009365088015005006","volume":"15","author":"D Leonard-Barton","year":"1988","unstructured":"Leonard-Barton D (1988) Implementation characteristics of organizational innovations: limits and opportunities for management strategies. Commun Res 15(5):603\u2013631","journal-title":"Commun Res"},{"issue":"1","key":"194_CR46","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1037\/1076-898X.6.1.44","volume":"6","author":"N Moray","year":"2000","unstructured":"Moray N, Inagaki T, Itoh M (2000) Adaptive automation, trust, and self-confidence in fault management of time-critical tasks. J Exp Psychol Appl 6(1):44","journal-title":"J Exp Psychol Appl"},{"issue":"5\u20136","key":"194_CR47","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1016\/S0020-7373(87)80013-5","volume":"27","author":"BM Muir","year":"1987","unstructured":"Muir BM (1987) Trust between humans and machines, and the design of decision aids. Int J Man Mach Stud 27(5\u20136):527\u2013539","journal-title":"Int J Man Mach Stud"},{"issue":"3","key":"194_CR48","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1080\/00140139608964474","volume":"39","author":"BM Muir","year":"1996","unstructured":"Muir BM, Moray N (1996) Trust in automation: II. Experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3):429\u2013460","journal-title":"Ergonomics"},{"issue":"3","key":"194_CR49","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1016\/j.aap.2009.07.008","volume":"42","author":"J Navarro","year":"2010","unstructured":"Navarro J, Mars F, Forzy JF, El-Jaafari M, Hoc JM (2010) Objective and subjective evaluation of motor priming and warning systems applied to lateral control assistance. Accid Anal Prev 42(3):904\u2013912","journal-title":"Accid Anal Prev"},{"issue":"4","key":"194_CR50","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/175276.175282","volume":"37","author":"J Nielsen","year":"1994","unstructured":"Nielsen J, Levy J (1994) Measuring usability: preference versus performance. Commun ACM 37(4):66\u201375","journal-title":"Commun ACM"},{"issue":"2","key":"194_CR51","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1518\/001872097778543886","volume":"39","author":"R Parasuraman","year":"1997","unstructured":"Parasuraman R, Riley V (1997) Humans and automation: use, misuse, disuse, abuse. Hum Factors 39(2):230\u2013253","journal-title":"Hum Factors"},{"issue":"3","key":"194_CR52","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/3468.844354","volume":"30","author":"R Parasuraman","year":"2000","unstructured":"Parasuraman R, Sheridan TB, Wickens CD (2000) A model for types and levels of human interaction with automation. IEEE Trans Syst Man Cybern A Syst Hum 30(3):286\u2013297","journal-title":"IEEE Trans Syst Man Cybern A Syst Hum"},{"issue":"2","key":"194_CR53","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1518\/155534308X284417","volume":"2","author":"R Parasuraman","year":"2008","unstructured":"Parasuraman R, Sheridan TB, Wickens CD (2008) Situation awareness, mental workload, and trust in automation: viable, empirically supported cognitive engineering constructs. J Cognit Eng Decis Mak 2(2):140\u2013160","journal-title":"J Cognit Eng Decis Mak"},{"issue":"3","key":"194_CR54","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"PA Pavlou","year":"2003","unstructured":"Pavlou PA (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the Technology Acceptance Model. Int J Electron Commer 7(3):101\u2013134","journal-title":"Int J Electron Commer"},{"key":"194_CR55","unstructured":"Rawstorne P, Jayasuriya R, Caputi P (1998) An integrative model of information systems use in mandatory environments. In: Proceedings of the nineteenth international conference on information systems, pp 325\u2013330"},{"key":"194_CR56","volume-title":"How people treat computers, television and new media like real people and places","author":"B Reeves","year":"1996","unstructured":"Reeves B, Nass C (1996) How people treat computers, television and new media like real people and places. Cambridge University Press, New York"},{"issue":"1","key":"194_CR57","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1037\/0022-3514.49.1.95","volume":"49","author":"JK Rempel","year":"1985","unstructured":"Rempel JK, Holmes JG, Zanna MP (1985) Trust in close relationships. J Pers Soc Psychol 49(1):95\u2013112","journal-title":"J Pers Soc Psychol"},{"key":"194_CR58","volume-title":"Diffusion of innovations","author":"EM Rogers","year":"1995","unstructured":"Rogers EM (1995) Diffusion of innovations, 4th edn. The Free Press, New York","edition":"4"},{"key":"194_CR59","doi-asserted-by":"crossref","unstructured":"Roth EM, Bennett KB, Woods DD (1987) Human interaction with an\u201d intelligent\u201d machine. Int J Man-Mach Stud 27(5\u20136):479\u2013525","DOI":"10.1016\/S0020-7373(87)80012-3"},{"issue":"1","key":"194_CR60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/0003-066X.35.1.1","volume":"35","author":"JB Rotter","year":"1980","unstructured":"Rotter JB (1980) Interpersonal trust, trustworthiness, and gullibility. Am Psychol 35(1):1\u20137","journal-title":"Am Psychol"},{"issue":"4","key":"194_CR61","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1177\/001872088803000405","volume":"30","author":"WB Rouse","year":"1988","unstructured":"Rouse WB (1988) Adaptive aiding for human\/computer control. Hum Factors J Hum Factors Ergon Soc 30(4):431\u2013443","journal-title":"Hum Factors J Hum Factors Ergon Soc"},{"key":"194_CR62","first-page":"1926","volume":"2","author":"NB Sarter","year":"1997","unstructured":"Sarter NB, Woods DD, Billings CE (1997) Automation surprises. Handbook Hum Fact Ergon 2:1926\u20131943","journal-title":"Handbook Hum Fact Ergon"},{"key":"194_CR63","first-page":"37","volume-title":"Automation and human performance: theory and applications","author":"MW Scerbo","year":"1996","unstructured":"Scerbo MW (1996) Theoretical perspectives on adaptive automation. In: Parasuraman R, Mouloua M (eds) Automation and human performance: theory and applications. Lawrence Erlbaum Associates, Inc., Mahwah, pp 37\u201363"},{"issue":"3","key":"194_CR64","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.ijhcs.2006.10.001","volume":"65","author":"BD Seppelt","year":"2007","unstructured":"Seppelt BD, Lee JD (2007) Making adaptive cruise control (ACC) limits visible. Int J Hum Comput Stud 65(3):192\u2013205","journal-title":"Int J Hum Comput Stud"},{"key":"194_CR65","volume-title":"Telerobotics, automation and human supervisory control","author":"TB Sheridan","year":"1992","unstructured":"Sheridan TB (1992) Telerobotics, automation and human supervisory control. The MIT press, Cambridge"},{"key":"194_CR66","doi-asserted-by":"crossref","unstructured":"Sheridan TB, Verplank WL (1978) Human and computer control of undersea teleoperators. Tech Rep MIT Man-Machine Systems Laboratory, Cambridge, MA","DOI":"10.21236\/ADA057655"},{"issue":"2","key":"194_CR67","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S Taylor","year":"1995","unstructured":"Taylor S, Todd PA (1995) Understanding information technology usage: a test of competing models. Inf Syst Res 6(2):144\u2013176","journal-title":"Inf Syst Res"},{"issue":"1","key":"194_CR68","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/07421222.1994.11518035","volume":"11","author":"RL Thompson","year":"1994","unstructured":"Thompson RL, Higgins CA, Howell JM (1994) Influence of experience on personal computer utilization: testing a conceptual model. J Manag Inf Syst 11(1):167\u2013187","journal-title":"J Manag Inf Syst"},{"issue":"1","key":"194_CR69","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0968-090X(96)00025-3","volume":"5","author":"JD Laan Van Der","year":"1997","unstructured":"Van Der Laan JD, Heino A, De Waard D (1997) A simple procedure for the assessment of acceptance of advanced transport telematics. Transp Res C Emerg Technol 5(1):1\u201310","journal-title":"Transp Res C Emerg Technol"},{"issue":"4","key":"194_CR70","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1287\/isre.11.4.342.11872","volume":"11","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the Technology Acceptance Model. Inf Syst Res 11(4):342\u2013365","journal-title":"Inf Syst Res"},{"issue":"2","key":"194_CR71","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V, Davis FD (2000) A theoretical extension of the Technology Acceptance Model: four longitudinal field studies. Manag Sci 46(2):186\u2013204","journal-title":"Manag Sci"},{"issue":"3","key":"194_CR72","first-page":"425","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. Inf Manag 27(3):425\u2013478","journal-title":"Inf Manag"},{"key":"194_CR73","unstructured":"Wilkinson R (2011) The many meanings of adoption. In: Pannell D, Vanclay F (eds) Changing land management: adoption of new practices by rural landholders. CSIRO Publishing, Collingwood VIC 3066, Australia, p 39"},{"key":"194_CR74","doi-asserted-by":"crossref","first-page":"93","DOI":"10.3141\/2156-11","volume":"2156","author":"C Xu","year":"2010","unstructured":"Xu C, Wang W, Chen J, Wang W, Yang C, Li Z (2010) Analyzing travelers\u2019 intention to accept travel information: structural equation modeling. Transp Res Rec J Transp Res Board 2156:93\u2013110","journal-title":"Transp Res Rec J Transp Res Board"},{"issue":"3","key":"194_CR75","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.im.2005.08.006","volume":"43","author":"MY Yi","year":"2006","unstructured":"Yi MY, Jackson JD, Park JS, Probst JC (2006) Understanding information technology acceptance by individual professionals: toward an integrative view. Inf Manag 43(3):350\u2013363","journal-title":"Inf Manag"}],"container-title":["Cognition, Technology &amp; Work"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-011-0194-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10111-011-0194-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-011-0194-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T03:42:42Z","timestamp":1560742962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10111-011-0194-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,11]]},"references-count":75,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["194"],"URL":"https:\/\/doi.org\/10.1007\/s10111-011-0194-3","relation":{},"ISSN":["1435-5558","1435-5566"],"issn-type":[{"value":"1435-5558","type":"print"},{"value":"1435-5566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,11]]}}}