{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T04:51:39Z","timestamp":1776228699931,"version":"3.50.1"},"reference-count":255,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s12525-022-00605-4","type":"journal-article","created":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T06:05:06Z","timestamp":1669615506000},"page":"1993-2020","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":131,"title":["Trust in artificial intelligence: From a Foundational Trust Framework to emerging research opportunities"],"prefix":"10.1007","volume":"32","author":[{"given":"Roman","family":"Lukyanenko","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Maass","sequence":"additional","affiliation":[]},{"given":"Veda C.","family":"Storey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,28]]},"reference":[{"key":"605_CR1","doi-asserted-by":"publisher","unstructured":"Abdul, A., Vermeulen, J., Wang, D., Lim, B. Y., & Kankanhalli, M. (2018). Trends and trajectories for explainable, accountable and intelligible systems: An HCI research agenda. CHI Conference on Human Factors in Computing Systems, 1\u201318. https:\/\/doi.org\/10.1145\/3173574.3174156","DOI":"10.1145\/3173574.3174156"},{"key":"605_CR2","doi-asserted-by":"crossref","unstructured":"Abraham, R., & Ueda, Y. (2000). The chaos avant-garde: Memories of the early days of chaos theory. World Scientific. Retrieved\u00a0September 10, 2022, from https:\/\/books.google.ca\/books?id=olJqDQAAQBAJ","DOI":"10.1142\/4510"},{"issue":"11","key":"605_CR3","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1287\/mnsc.17.11.661","volume":"17","author":"RL Ackoff","year":"1971","unstructured":"Ackoff, R. L. (1971). Towards a system of systems concepts. Management Science, 17(11), 661\u2013671.\u00a0https:\/\/doi.org\/10.1287\/mnsc.17.11.661","journal-title":"Management Science"},{"issue":"1","key":"605_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1002\/(SICI)1099-1735(199603)13:1<13::AID-SRES66>3.0.CO;2-O","volume":"13","author":"RL Ackoff","year":"1996","unstructured":"Ackoff, R. L., & Gharajedaghi, J. (1996). Reflections on systems and their models. Systems Research, 13(1), 13\u201323.\u00a0https:\/\/doi.org\/10.1002\/(SICI)1099-1735(199603)13:13.0.CO;2-O","journal-title":"Systems Research"},{"key":"605_CR5","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi, A., & Berrada, M. (2018). Peeking inside the black-box: A survey on explainable artificial intelligence (XAI). IEEE Access, 6, 52138\u201352160.\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2018.2870052","journal-title":"IEEE Access"},{"key":"605_CR6","doi-asserted-by":"publisher","first-page":"101722","DOI":"10.1016\/j.techsoc.2021.101722","volume":"67","author":"WB Adamczyk","year":"2021","unstructured":"Adamczyk, W. B., Monasterio, L., & Fochezatto, A. (2021). Automation in the future of public sector employment: The case of Brazilian Federal Government. Technology in Society, 67, 101722.\u00a0https:\/\/doi.org\/10.1016\/j.techsoc.2021.101722","journal-title":"Technology in Society"},{"key":"605_CR7","volume-title":"Prediction machines: The simple economics of artificial intelligence","author":"A Agrawal","year":"2018","unstructured":"Agrawal, A., Gans, J., & Goldfarb, A. (2018). Prediction machines: The simple economics of artificial intelligence. Harvard Business Press."},{"key":"605_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/B978-0-12-214850-7.50022-X","volume-title":"Uncertainty in economics","author":"GA Akerlof","year":"1978","unstructured":"Akerlof, G. A. (1978). The market for \u201clemons\u201d: Quality uncertainty and the market mechanism. In Uncertainty in economics (pp. 235\u2013251). Elsevier.\u00a0https:\/\/doi.org\/10.1016\/B978-0-12-214850-7.50022-X"},{"key":"605_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1613\/jair.1.12202","volume":"70","author":"M Alfonseca","year":"2021","unstructured":"Alfonseca, M., Cebrian, M., Anta, A. F., Coviello, L., Abeliuk, A., & Rahwan, I. (2021). Superintelligence cannot be contained: Lessons from computability theory. Journal of Artificial Intelligence Research, 70, 65\u201376.\u00a0https:\/\/doi.org\/10.1613\/jair.1.12202","journal-title":"Journal of Artificial Intelligence Research"},{"key":"605_CR10","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2013.20","volume":"2","author":"M Allahbakhsh","year":"2013","unstructured":"Allahbakhsh, M., Benatallah, B., Ignjatovic, A., Motahari-Nezhad, H. R., Bertino, E., & Dustdar, S. (2013). Quality control in crowdsourcing systems: Issues and directions. IEEE Internet Computing, 2, 76\u201381.\u00a0https:\/\/doi.org\/10.1109\/MIC.2013.20","journal-title":"IEEE Internet Computing"},{"key":"605_CR11","doi-asserted-by":"publisher","unstructured":"Amaral, G., Guizzardi, R., Guizzardi, G., & Mylopoulos, J. (2020). Ontology-based modeling and analysis of trustworthiness requirements: Preliminary results.\u00a0In G. Dobbie, U. Frank, G. Kappel, S.W. Liddle, & H. C. Mayr (Eds.),\u00a0Conceptual Modeling. ER 2020. Lecture Notes in Computer Science\u00a0(vol. 12400, pp. 342\u2013352). Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-62522-1_25","DOI":"10.1007\/978-3-030-62522-1_25"},{"key":"605_CR12","doi-asserted-by":"publisher","unstructured":"Amaral, G., Sales, T. P., Guizzardi, G., & Porello, D. (2019). Towards a reference ontology of trust. In H. Panetto, C. Debruyne, M. Hepp, D. Lewis, C. Ardagna, & R. Meersman (Eds.),\u00a0On the move to meaningful internet systems: OTM 2019 Conferences. OTM 2019. Lecture Notes in Computer Science\u00a0(vol .11877, pp. 3\u201321). Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-33246-4_1","DOI":"10.1007\/978-3-030-33246-4_1"},{"key":"605_CR13","volume-title":"Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy","author":"I Anati","year":"2013","unstructured":"Anati, I., Gueron, S., Johnson, S., & Scarlata, V. (2013). Innovative technology for CPU based attestation and sealing. In\u00a0Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy\u00a0(vol. 13, no. 7). ACM New York."},{"key":"605_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511557675","volume-title":"Realist social theory: The morphogenetic approach","author":"MS Archer","year":"1995","unstructured":"Archer, M. S. (1995). Realist social theory: The morphogenetic approach. Cambridge University Press."},{"key":"605_CR15","doi-asserted-by":"publisher","unstructured":"Arnold, M., Bellamy, R. K., Hind, M., Houde, S., Mehta, S., Mojsilovic, A., Nair, R., Natesan Ramamurthy, K., Olteanu, A., Piorkowski, D., Reimer, D., Richards, J., Tsay J., & Varshney, K. R. (2019). FactSheets: Increasing trust in AI services through Supplier\u2019s declarations of conformity. IBM Journal of Research and Development, 63(4\/5). https:\/\/doi.org\/10.1147\/JRD.2019.2942288","DOI":"10.1147\/JRD.2019.2942288"},{"issue":"6","key":"605_CR16","doi-asserted-by":"publisher","first-page":"e15154","DOI":"10.2196\/15154","volume":"22","author":"O Asan","year":"2020","unstructured":"Asan, O., Bayrak, A. E., & Choudhury, A. (2020). Artificial intelligence and human trust in healthcare: Focus on clinicians. Journal of Medical Internet Research, 22(6), e15154.\u00a0https:\/\/doi.org\/10.2196\/15154","journal-title":"Journal of Medical Internet Research"},{"issue":"2","key":"605_CR17","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1086\/292745","volume":"96","author":"A Baier","year":"1986","unstructured":"Baier, A. (1986). Trust and antitrust. Ethics, 96(2), 231\u2013260.","journal-title":"Ethics"},{"issue":"5013","key":"605_CR18","doi-asserted-by":"publisher","first-page":"1668","DOI":"10.1126\/science.2047876","volume":"252","author":"JE Bailey","year":"1991","unstructured":"Bailey, J. E. (1991). Toward a science of metabolic engineering. Science, 252(5013), 1668\u20131675.\u00a0https:\/\/doi.org\/10.1126\/science.2047876","journal-title":"Science"},{"key":"605_CR19","volume-title":"Linked: The new science of networks","author":"A-L Barab\u00e1si","year":"2003","unstructured":"Barab\u00e1si, A.-L. (2003). Linked: The new science of networks. Basic Books."},{"key":"605_CR20","first-page":"375","volume":"11","author":"MA Bedau","year":"1997","unstructured":"Bedau, M. A. (1997). Weak emergence. Philosophical Perspectives, 11, 375\u2013399.","journal-title":"Philosophical Perspectives"},{"key":"605_CR21","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262026215.001.0001","volume-title":"Emergence: Contemporary readings in philosophy and science","author":"MA Bedau","year":"2008","unstructured":"Bedau, M. A., & Humphreys, P. E. (2008). Emergence: Contemporary readings in philosophy and science. MIT Press.\u00a0https:\/\/doi.org\/10.7551\/mitpress\/9780262026215.001.0001"},{"key":"605_CR22","doi-asserted-by":"publisher","unstructured":"Belchik, T. A. (2022). Artificial intelligence as a factor in labor productivity. In A. V. Bogoviz, A. E. Suglobov, A. N. Maloletko, & O. V. Kaurova (Eds.),\u00a0\u0421ooperation and sustainable development. Lecture Notes in Networks and Systems\u00a0(vol. 245). Springer. https:\/\/doi.org\/10.1007\/978-3-030-77000-6_62","DOI":"10.1007\/978-3-030-77000-6_62"},{"key":"605_CR23","doi-asserted-by":"publisher","unstructured":"Benamati, J., Serva, M. A., & Fuller, M. A. (2006). Are trust and distrust distinct constructs? An empirical study of the effects of trust and distrust among online banking users. In\u00a0Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 06, 121.2. IEEE Computer Society. https:\/\/doi.org\/10.1109\/HICSS.2006.63.","DOI":"10.1109\/HICSS.2006.63"},{"issue":"3","key":"605_CR24","doi-asserted-by":"publisher","first-page":"72","DOI":"10.17705\/1jais.00065","volume":"6","author":"I Benbasat","year":"2005","unstructured":"Benbasat, I., & Wang, W. (2005). Trust in and adoption of online recommendation agents. Journal of the Association for Information Systems, 6(3), 72\u2013101.\u00a0https:\/\/doi.org\/10.17705\/1jais.00065","journal-title":"Journal of the Association for Information Systems"},{"key":"605_CR25","unstructured":"Bengio, Y. (2012). Deep learning of representations for unsupervised and transfer learning. Proceedings of ICML Workshop on Unsupervised and Transfer Learning, 17\u201336."},{"key":"605_CR26","volume-title":"A realist theory of science","author":"R Bhaskar","year":"1978","unstructured":"Bhaskar, R. (1978). A realist theory of science. Harvester Press."},{"key":"605_CR27","doi-asserted-by":"publisher","unstructured":"Bickley, S. J., Chan, H. F., & Torgler, B. (2022). Artificial intelligence in the field of economics. Scientometrics, 1\u201330. https:\/\/doi.org\/10.1007\/s11192-022-04294-w","DOI":"10.1007\/s11192-022-04294-w"},{"issue":"4","key":"605_CR28","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1287\/isre.12.4.384.9702","volume":"12","author":"F Bodart","year":"2001","unstructured":"Bodart, F., Patel, A., Sim, M., & Weber, R. (2001). Should optional properties be used in conceptual modelling? A theory and three empirical tests. Information Systems Research, 12(4), 384\u2013405.\u00a0https:\/\/doi.org\/10.1287\/isre.12.4.384.9702","journal-title":"Information Systems Research"},{"issue":"6","key":"605_CR29","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1016\/j.socec.2009.05.004","volume":"38","author":"R Boero","year":"2009","unstructured":"Boero, R., Bravo, G., Castellani, M., & Squazzoni, F. (2009). Reputational cues in repeated trust games. The Journal of Socio-Economics, 38(6), 871\u2013877.\u00a0https:\/\/doi.org\/10.1016\/j.socec.2009.05.004","journal-title":"The Journal of Socio-Economics"},{"key":"605_CR30","unstructured":"Boon, S. D., & Holmes, J. G. (1991). The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. Cooperation and Prosocial Behavior, 190\u2013211."},{"issue":"1","key":"605_CR31","first-page":"1","volume":"2","author":"N Bostrom","year":"1998","unstructured":"Bostrom, N. (1998). How long before superintelligence? International Journal of Futures Studies, 2(1), 1\u20139.","journal-title":"International Journal of Futures Studies"},{"key":"605_CR32","volume-title":"Superintelligence: Paths, dangers, strategies","author":"N Bostrom","year":"2014","unstructured":"Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford University Press. Retrieved\u00a0September 10, 2022, from https:\/\/books.google.ca\/books?id=7_H8AwAAQBAJ"},{"issue":"2","key":"605_CR33","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1177\/0092070302250902","volume":"31","author":"TG Brashear","year":"2003","unstructured":"Brashear, T. G., Boles, J. S., Bellenger, D. N., & Brooks, C. M. (2003). An empirical test of trust-building processes and outcomes in sales manager-salesperson relationships. Journal of the Academy of Marketing Science, 31(2), 189\u2013200.\u00a0https:\/\/doi.org\/10.1177\/0092070302250902","journal-title":"Journal of the Academy of Marketing Science"},{"key":"605_CR34","volume-title":"The second machine age: Work, progress, and prosperity in a time of brilliant technologies","author":"E Brynjolfsson","year":"2014","unstructured":"Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies. WW Norton & Company."},{"key":"605_CR35","volume-title":"Sociology and modern systems theory","author":"W Buckley","year":"1967","unstructured":"Buckley, W. (1967). Sociology and modern systems theory.\u00a0Englewood Cliffs, New Jersey: Prentice-Hall."},{"key":"605_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-9924-0","volume-title":"Treatise on basic philosophy: Ontology I: The furniture of the world","author":"MA Bunge","year":"1977","unstructured":"Bunge, M. A. (1977). Treatise on basic philosophy: Ontology I: The furniture of the world. Reidel."},{"key":"605_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-9392-1","volume-title":"Treatise on basic philosophy: Ontology II: A world of systems","author":"MA Bunge","year":"1979","unstructured":"Bunge, M. A. (1979). Treatise on basic philosophy: Ontology II: A world of systems. Reidel Publishing Company."},{"key":"605_CR38","volume-title":"Finding philosophy in social science","author":"MA Bunge","year":"1996","unstructured":"Bunge, M. A. (1996). Finding philosophy in social science. Yale University Press."},{"key":"605_CR39","volume-title":"Emergence and convergence: Qualitative novelty and the unity of knowledge","author":"MA Bunge","year":"2003","unstructured":"Bunge, M. A. (2003a). Emergence and convergence: Qualitative novelty and the unity of knowledge. University of Toronto Press."},{"key":"605_CR40","volume-title":"Philosophical dictionary","author":"MA Bunge","year":"2003","unstructured":"Bunge, M. A. (2003b). Philosophical dictionary. Prometheus Books."},{"key":"605_CR41","doi-asserted-by":"publisher","DOI":"10.3138\/9781442672857","volume-title":"Chasing reality: Strife over realism","author":"MA Bunge","year":"2006","unstructured":"Bunge, M. A. (2006). Chasing reality: Strife over realism. University of Toronto Press."},{"key":"605_CR42","doi-asserted-by":"publisher","DOI":"10.4324\/9781315126388","volume-title":"Philosophy of science: Volume 2, from explanation to justification","author":"MA Bunge","year":"2017","unstructured":"Bunge, M. A. (2017). Philosophy of science: Volume 2, from explanation to justification. Routledge. Retrieved\u00a0September 10, 2022, from https:\/\/books.google.ca\/books?id=NtwzDwAAQBAJ"},{"key":"605_CR43","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1201\/9781482277180-3","volume-title":"Cybernetics and applied systems","author":"MA Bunge","year":"2018","unstructured":"Bunge, M. A. (2018). Systems everywhere. In Cybernetics and applied systems (pp. 23\u201341). CRC Press."},{"issue":"4","key":"605_CR44","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.17705\/1jais.00627","volume":"21","author":"A Castellanos","year":"2020","unstructured":"Castellanos, A., Tremblay, M., Lukyanenko, R., & Samuel, B. M. (2020). Basic classes in conceptual modeling: Theory and practical guidelines. Journal of the Association for Information Systems, 21(4), 1001\u20131044.\u00a0https:\/\/doi.org\/10.17705\/1jais.00627","journal-title":"Journal of the Association for Information Systems"},{"issue":"7623","key":"605_CR45","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1038\/538020a","volume":"538","author":"D Castelvecchi","year":"2016","unstructured":"Castelvecchi, D. (2016). Can we open the black box of AI? Nature News, 538(7623), 20.","journal-title":"Nature News"},{"issue":"10","key":"605_CR46","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/3359332","volume":"62","author":"VG Cerf","year":"2019","unstructured":"Cerf, V. G. (2019). AI is not an excuse! Communications of the ACM, 62(10), 7\u20137.\u00a0https:\/\/doi.org\/10.1145\/3359332","journal-title":"Communications of the ACM"},{"key":"605_CR47","unstructured":"Chamorro-Premuzic, T., Polli, F., & Dattner, B. (2019). Building ethical AI for talent management. Harvard Business Review, 21."},{"key":"605_CR48","doi-asserted-by":"crossref","unstructured":"Chien, S.-Y., Sycara, K., Liu, J.-S., & Kumru, A. (2016). Relation between trust attitudes toward automation, Hofstede\u2019s cultural dimensions, and big five personality traits. 60(1), 841\u2013845. SAGE Publications Sage CA: Los Angeles, CA.","DOI":"10.1177\/1541931213601192"},{"issue":"7625","key":"605_CR49","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1038\/538311a","volume":"538","author":"K Crawford","year":"2016","unstructured":"Crawford, K., & Calo, R. (2016). There is a blind spot in AI research. Nature, 538(7625), 311\u2013313.\u00a0https:\/\/doi.org\/10.1038\/538311a","journal-title":"Nature"},{"key":"605_CR50","volume-title":"AI: The tumultuous history of the search for artificial intelligence","author":"D Crevier","year":"1993","unstructured":"Crevier, D. (1993). AI: The tumultuous history of the search for artificial intelligence. Basic Books."},{"issue":"4","key":"605_CR51","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1037\/h0040957","volume":"52","author":"LJ Cronbach","year":"1955","unstructured":"Cronbach, L. J., & Meehl, P. E. (1955). Construct validity in psychological tests. Psychological Bulletin, 52(4), 281.\u00a0https:\/\/doi.org\/10.1037\/h0040957","journal-title":"Psychological Bulletin"},{"issue":"2","key":"605_CR52","doi-asserted-by":"publisher","first-page":"94","DOI":"10.7861\/futurehosp.6-2-94","volume":"6","author":"TH Davenport","year":"2019","unstructured":"Davenport, T. H., & Kalakota, R. (2019). The potential for artificial intelligence in healthcare. Future Healthcare Journal, 6(2), 94.\u00a0https:\/\/doi.org\/10.7861\/futurehosp.6-2-94","journal-title":"Future Healthcare Journal"},{"issue":"1","key":"605_CR53","first-page":"108","volume":"96","author":"TH Davenport","year":"2018","unstructured":"Davenport, T. H., & Ronanki, R. (2018). Artificial intelligence for the real world. Harvard Business Review, 96(1), 108\u2013116.\u00a0https:\/\/hbr.org\/2018\/01\/artificial-intelligence-for-the-real-world","journal-title":"Harvard Business Review"},{"issue":"3","key":"605_CR54","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.datak.2005.07.007","volume":"58","author":"I Davies","year":"2006","unstructured":"Davies, I., Green, P., Rosemann, M., Indulska, M., & Gallo, S. (2006). How do practitioners use conceptual modeling in practice? Data & Knowledge Engineering, 58(3), 358\u2013380.\u00a0https:\/\/doi.org\/10.1016\/j.datak.2005.07.007","journal-title":"Data & Knowledge Engineering"},{"key":"605_CR55","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.artint.2014.12.003","volume":"220","author":"E Davis","year":"2015","unstructured":"Davis, E. (2015). Ethical guidelines for a superintelligence. Artificial Intelligence, 220, 121\u2013124.\u00a0https:\/\/doi.org\/10.1016\/j.artint.2014.12.003","journal-title":"Artificial Intelligence"},{"issue":"4","key":"605_CR56","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1108\/07363760210433654","volume":"19","author":"S Davis","year":"2002","unstructured":"Davis, S. (2002). Brand asset management: How businesses can profit from the power of brand. Journal of Consumer Marketing, 19(4), 351\u2013358.\u00a0https:\/\/doi.org\/10.1108\/07363760210433654","journal-title":"Journal of Consumer Marketing"},{"issue":"2","key":"605_CR57","doi-asserted-by":"publisher","first-page":"373","DOI":"10.2307\/20721433","volume":"34","author":"A Dimoka","year":"2010","unstructured":"Dimoka, A. (2010). What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly, 34(2), 373\u20133A7.\u00a0https:\/\/doi.org\/10.2307\/20721433","journal-title":"MIS Quarterly"},{"issue":"5","key":"605_CR58","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/1125944.1125949","volume":"49","author":"B Dobing","year":"2006","unstructured":"Dobing, B., & Parsons, J. (2006). How UML is used. Communications of the ACM, 49(5), 109\u2013113.\u00a0https:\/\/doi.org\/10.1145\/1125944.1125949","journal-title":"Communications of the ACM"},{"issue":"1942\u20132679","key":"605_CR59","first-page":"23","volume":"1","author":"N Dokoohaki","year":"2008","unstructured":"Dokoohaki, N., & Matskin, M. (2008). Effective design of trust ontologies for improvement in the structure of socio-semantic trust networks. International Journal On Advances in Intelligent Systems, 1(1942\u20132679), 23\u201342.","journal-title":"International Journal On Advances in Intelligent Systems"},{"issue":"10","key":"605_CR60","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/2347736.2347755","volume":"55","author":"P Domingos","year":"2012","unstructured":"Domingos, P. (2012). A few useful things to know about machine learning. Communications of the ACM, 55(10), 78\u201387. https:\/\/doi.org\/10.1145\/2347736.2347755","journal-title":"Communications of the ACM"},{"key":"605_CR61","unstructured":"Domingos, P. (2015). The master algorithm: How the quest for the ultimate learning machine will remake our world. Basic Books. Retrieved\u00a0September 10, 2022, from https:\/\/books.google.com\/books?id=WpTSDQAAQBAJ"},{"key":"605_CR62","doi-asserted-by":"publisher","first-page":"0210","DOI":"10.23919\/MIPRO.2018.8400040","volume-title":"International convention on information and communication technology, electronics and microelectronics (MIPRO)","author":"FK Dosilovi\u0107","year":"2018","unstructured":"Dosilovi\u0107, F. K., Br\u010di\u0107, M., & Hlupi\u0107, N. (2018). Explainable artificial intelligence: A survey. In\u00a0International convention on information and communication technology, electronics and microelectronics (MIPRO) (pp. 0210\u20130215). IEEE. https:\/\/doi.org\/10.23919\/MIPRO.2018.8400040"},{"key":"605_CR63","unstructured":"Dubin, R. (1978). Theory building. Free Press. Retrieved\u00a0September 10, 2022, from http:\/\/books.google.ca\/books?id=a0NqAAAAMAAJ"},{"key":"605_CR64","unstructured":"Eisenstein, J. (2019). Introduction to Natural Language Processing. Cambridge, MA: MIT Press. Retrieved\u00a0September 10, 2022, from https:\/\/books.google.ca\/books?id=72yuDwAAQBAJ"},{"issue":"1","key":"605_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s44163-022-00021-9","volume":"2","author":"J Ellul","year":"2022","unstructured":"Ellul, J. (2022). Should we regulate artificial intelligence or some uses of software? Discover Artificial Intelligence, 2(1), 1\u20136.\u00a0https:\/\/doi.org\/10.1007\/s44163-022-00021-9","journal-title":"Discover Artificial Intelligence"},{"issue":"6","key":"605_CR66","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1080\/0960085X.2019.1673672","volume":"28","author":"O Eriksson","year":"2019","unstructured":"Eriksson, O., Johannesson, P., & Bergholtz, M. (2019). The case for classes and instances-a response to representing instances: The case for reengineering conceptual modelling grammars. European Journal of Information Systems, 28(6), 681\u2013693.\u00a0https:\/\/doi.org\/10.1080\/0960085X.2019.1673672","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"605_CR67","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.infoandorg.2018.02.005","volume":"28","author":"S Faraj","year":"2018","unstructured":"Faraj, S., Pachidi, S., & Sayegh, K. (2018). Working and organizing in the age of the learning algorithm. Information and Organization, 28(1), 62\u201370.\u00a0https:\/\/doi.org\/10.1016\/j.infoandorg.2018.02.005","journal-title":"Information and Organization"},{"key":"605_CR68","doi-asserted-by":"crossref","unstructured":"Faulkner, P., & Simpson, T. (2017). The philosophy of trust. Oxford, England: Oxford University Press. Retrieved\u00a0September 10, 2022,\u00a0from https:\/\/books.google.ca\/books?id=YIgLDgAAQBAJ","DOI":"10.1093\/acprof:oso\/9780198732549.001.0001"},{"key":"605_CR69","doi-asserted-by":"publisher","unstructured":"Ferrucci, D. (2010). Build watson: An overview of DeepQA for the Jeopardy! challenge. Proceedings of the 19th International Conference on Parallel Architectures and Compilastion Techniques, 1\u20132. https:\/\/doi.org\/10.1145\/1854273.1854275","DOI":"10.1145\/1854273.1854275"},{"issue":"1","key":"605_CR70","doi-asserted-by":"publisher","first-page":"43","DOI":"10.17705\/1CAIS.02543","volume":"25","author":"P Fettke","year":"2009","unstructured":"Fettke, P. (2009). How conceptual modeling is used. Communications of the Association for Information Systems, 25(1), 43.\u00a0https:\/\/doi.org\/10.17705\/1CAIS.02543","journal-title":"Communications of the Association for Information Systems"},{"key":"605_CR71","unstructured":"Fettke, P. (2020). Conceptual modelling and artificial intelligence: Overview and research challenges from the perspective of predictive business process management. In Joint Proceedings of Modellierung 2020 Short, Workshop and Tools & Demo Papers Workshop on Models in AI (pp. 157\u2013164)."},{"key":"605_CR72","unstructured":"Filippouli, E. (2017). AI: The pinnacle of our ingenuity. Retrieved September 28, 2022, from Global Thinkers Forum website: https:\/\/www.globalthinkersforum.org\/news-and-resources\/news\/ai-the-pinnacle-of-our-ingenuity"},{"key":"605_CR73","unstructured":"Financial Times. (2021). Building trust in AI systems is essential. Financial Times. Retrieved September 10, 2022,\u00a0from https:\/\/www.ft.com\/content\/85b0882e-3e93-42e7-8411-54f4e24c7f87"},{"key":"605_CR74","volume-title":"Should we be afraid of AI?","author":"L Floridi","year":"2019","unstructured":"Floridi, L. (2019). Should we be afraid of AI? Aeon Magazine."},{"key":"605_CR75","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-030-81907-1_2","volume-title":"Ethics, governance, and policies in artificial intelligence","author":"L Floridi","year":"2021","unstructured":"Floridi, L., & Cowls, J. (2021). A unified framework of five principles for AI in society. In Ethics, governance, and policies in artificial intelligence (pp. 5\u201317). Springer.\u00a0https:\/\/doi.org\/10.1002\/9781119815075.ch45"},{"key":"605_CR76","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.techfore.2016.08.019","volume":"114","author":"CB Frey","year":"2017","unstructured":"Frey, C. B., & Osborne, M. A. (2017). The future of employment: How susceptible are jobs to computerisation? Technological Forecasting and Social Change, 114, 254\u2013280.\u00a0https:\/\/doi.org\/10.1016\/j.techfore.2016.08.019","journal-title":"Technological Forecasting and Social Change"},{"key":"605_CR77","volume-title":"Trust: The social virtues and the creation of prosperity","author":"F Fukuyama","year":"1996","unstructured":"Fukuyama, F. (1996). Trust: The social virtues and the creation of prosperity. Simon and Schuster."},{"key":"605_CR78","volume-title":"Designing organizations: Strategy, structure, and process at the business unit and Enterprise levels","author":"JR Galbraith","year":"2014","unstructured":"Galbraith, J. R. (2014). Designing organizations: Strategy, structure, and process at the business unit and enterprise levels. Wiley. Retrieved\u00a0September 10, 2022,\u00a0from https:\/\/books.google.ca\/books?id=KVd5AgAAQBAJ"},{"issue":"2","key":"605_CR79","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1111\/j.1467-9221.2012.00869.x","volume":"33","author":"R Garcia-Retamero","year":"2012","unstructured":"Garcia-Retamero, R., M\u00fcller, S. M., & Rousseau, D. L. (2012). The impact of value similarity and power on the perception of threat. Political Psychology, 33(2), 179\u2013193.\u00a0https:\/\/doi.org\/10.1111\/j.1467-9221.2012.00869.x","journal-title":"Political Psychology"},{"issue":"1","key":"605_CR80","doi-asserted-by":"publisher","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51\u201390.\u00a0https:\/\/doi.org\/10.2307\/30036519","journal-title":"MIS Quarterly"},{"issue":"2","key":"605_CR81","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1037\/h0024833","volume":"68","author":"K Giffin","year":"1967","unstructured":"Giffin, K. (1967). The contribution of studies of source credibility to a theory of interpersonal trust in the communication process. Psychological Bulletin, 68(2), 104.\u00a0https:\/\/doi.org\/10.1037\/h0024833","journal-title":"Psychological Bulletin"},{"key":"605_CR82","volume-title":"Simple heuristics that make us smart","author":"G Gigerenzer","year":"1999","unstructured":"Gigerenzer, G., & Todd, P. M. (1999). Simple heuristics that make us smart. Oxford University Press USA."},{"key":"605_CR83","unstructured":"Gill. (2020). Whoever leads in artificial intelligence in 2030 will rule the world until 2100. Brookings. Retrieved September 25, 2021 from https:\/\/www.brookings.edu\/blog\/future-development\/2020\/01\/17\/whoever-leads-in-artificial-intelligence-in-2030-will-rule-the-world-until-2100\/"},{"key":"605_CR84","doi-asserted-by":"publisher","first-page":"106607","DOI":"10.1016\/j.chb.2020.106607","volume":"115","author":"O Gillath","year":"2021","unstructured":"Gillath, O., Ai, T., Branicky, M. S., Keshmiri, S., Davison, R. B., & Spaulding, R. (2021). Attachment and trust in artificial intelligence. Computers in Human Behavior, 115, 106607.\u00a0https:\/\/doi.org\/10.1016\/j.chb.2020.106607","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"605_CR85","doi-asserted-by":"publisher","first-page":"627","DOI":"10.5465\/annals.2018.0057","volume":"14","author":"E Glikson","year":"2020","unstructured":"Glikson, E., & Woolley, A. W. (2020). Human trust in artificial intelligence: Review of empirical research. Academy of Management Annals, 14(2), 627\u2013660.\u00a0https:\/\/doi.org\/10.5465\/annals.2018.0057","journal-title":"Academy of Management Annals"},{"key":"605_CR86","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-45217-1_18","volume-title":"Cooperative information agents VII","author":"J Golbeck","year":"2003","unstructured":"Golbeck, J., Parsia, B., & Hendler, J. (2003). Trust networks on the semantic web. In Cooperative information agents VII (Vol. 2782, pp. 238\u2013249). Springer.\u00a0https:\/\/doi.org\/10.1007\/978-3-540-45217-1_18"},{"key":"605_CR87","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press."},{"key":"605_CR88","unstructured":"Goodman, N. (1972). Seven strictures on similarity. In N. Goodman (Ed.), Problems and projects (pp. 437\u2013447)."},{"issue":"1","key":"605_CR89","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10071-003-0203-x","volume":"7","author":"DR Griffin","year":"2004","unstructured":"Griffin, D. R., & Speck, G. B. (2004). New evidence of animal consciousness. Animal Cognition, 7(1), 5\u201318.\u00a0https:\/\/doi.org\/10.1007\/s10071-003-0203-x","journal-title":"Animal Cognition"},{"key":"605_CR90","doi-asserted-by":"publisher","unstructured":"Gulati, S., Sousa, S., & Lamas, D. (2017). Modelling trust: An empirical assessment.\u00a0In R. Bernhaupt, G. Dalvi, A.\u00a0K. Joshi, D. Balkrishan, J. O\u2019Neill, & M. Winckler (Eds.),\u00a0Human-Computer Interaction \u2013 INTERACT 2017. INTERACT 2017. Lecture Notes in Computer Science\u00a0(vol 10516). Springer. https:\/\/doi.org\/10.1007\/978-3-319-68059-0_3","DOI":"10.1007\/978-3-319-68059-0_3"},{"key":"605_CR91","unstructured":"Gunning, D. (2016). Explainable artificial intelligence (XAI). Defense advanced research projects agency. Defense Advanced Research Projects Agency (DARPA), nd Web, 2."},{"issue":"2","key":"605_CR92","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1609\/aimag.v40i2.2850","volume":"40","author":"D Gunning","year":"2019","unstructured":"Gunning, D., & Aha, D. W. (2019). DARPA\u2019s explainable artificial intelligence program. AI Magazine, 40(2), 44\u201358.\u00a0https:\/\/doi.org\/10.1609\/aimag.v40i2.2850","journal-title":"AI Magazine"},{"issue":"1","key":"605_CR93","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10551-022-05060-x","volume":"44","author":"M Haenlein","year":"2022","unstructured":"Haenlein, M., Huang, M.-H., & Kaplan, A. (2022). Guest editorial: Business ethics in the era of artificial intelligence. Journal of Business Ethics, 44(1), 1\u20133.\u00a0https:\/\/doi.org\/10.1007\/s10551-022-05060-x","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"605_CR94","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s11023-020-09517-8","volume":"30","author":"T Hagendorff","year":"2020","unstructured":"Hagendorff, T. (2020). The ethics of AI ethics: An evaluation of guidelines. Minds and Machines, 30(1), 99\u2013120.\u00a0https:\/\/doi.org\/10.1007\/s11023-020-09517-8","journal-title":"Minds and Machines"},{"key":"605_CR95","volume-title":"Homo Deus: A brief history of tomorrow","author":"YN Harari","year":"2016","unstructured":"Harari, Y. N. (2016). Homo Deus: A brief history of tomorrow. Random House."},{"key":"605_CR96","volume-title":"The grand design","author":"S Hawking","year":"2010","unstructured":"Hawking, S., & Mlodinow, L. (2010). The grand design. Random House Digital, Inc."},{"issue":"3","key":"605_CR97","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/3284751.3284760","volume":"4","author":"J Heer","year":"2018","unstructured":"Heer, J. (2018). The partnership on AI. AI Matters, 4(3), 25\u201326.\u00a0https:\/\/doi.org\/10.1145\/3284751.3284760","journal-title":"AI Matters"},{"issue":"3","key":"605_CR98","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1177\/0018720814547570","volume":"57","author":"KA Hoff","year":"2015","unstructured":"Hoff, K. A., & Bashir, M. (2015). Trust in automation: Integrating empirical evidence on factors that influence trust. Human Factors, 57(3), 407\u2013434.\u00a0https:\/\/doi.org\/10.1177\/0018720814547570","journal-title":"Human Factors"},{"key":"605_CR99","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/3206157.3206174","volume-title":"Proceedings of the 2018 international conference on big data and education","author":"SD Holcomb","year":"2018","unstructured":"Holcomb, S. D., Porter, W. K., Ault, S. V., Mao, G., & Wang, J. (2018). Overview on deepmind and its alphago zero AI. In\u00a0Proceedings of the 2018 International Conference on Big Data and Education (pp. 67\u201371).\u00a0https:\/\/doi.org\/10.1145\/3206157.3206174"},{"issue":"2","key":"605_CR100","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s40708-016-0042-6","volume":"3","author":"A Holzinger","year":"2016","unstructured":"Holzinger, A. (2016). Interactive machine learning for health informatics: When do we need the human-in-the-loop? Brain Informatics, 3(2), 119\u2013131.\u00a0https:\/\/doi.org\/10.1007\/s40708-016-0042-6","journal-title":"Brain Informatics"},{"issue":"7","key":"605_CR101","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1007\/s10489-018-1361-5","volume":"49","author":"A Holzinger","year":"2019","unstructured":"Holzinger, A., Plass, M., Kickmeier-Rust, M., Holzinger, K., Cri\u015fan, G. C., Pintea, C.-M., & Palade, V. (2019). Interactive machine learning: Experimental evidence for the human in the algorithmic loop. Applied Intelligence, 49(7), 2401\u20132414.\u00a0https:\/\/doi.org\/10.1007\/s10489-018-1361-5","journal-title":"Applied Intelligence"},{"issue":"3","key":"605_CR102","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/S0963-8687(03)00034-9","volume":"12","author":"R-L Hsiao","year":"2003","unstructured":"Hsiao, R.-L. (2003). Technology fears: Distrust and cultural persistence in electronic marketplace adoption. The Journal of Strategic Information Systems, 12(3), 169\u2013199.\u00a0https:\/\/doi.org\/10.1016\/S0963-8687(03)00034-9","journal-title":"The Journal of Strategic Information Systems"},{"key":"605_CR103","doi-asserted-by":"publisher","unstructured":"Huang, J., & Fox, M. S. (2006). An ontology of trust: Formal semantics and transitivity. In\u00a0International Conference on Electronic Commerce\u00a0(pp. 259\u2013270). https:\/\/doi.org\/10.1145\/1151454.1151499","DOI":"10.1145\/1151454.1151499"},{"issue":"2","key":"605_CR104","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1177\/1094670517752459","volume":"21","author":"M-H Huang","year":"2018","unstructured":"Huang, M.-H., & Rust, R. T. (2018). Artificial intelligence in service. Journal of Service Research, 21(2), 155\u2013172.\u00a0https:\/\/doi.org\/10.1177\/1094670517752459","journal-title":"Journal of Service Research"},{"key":"605_CR105","unstructured":"Hunt, E. (2019). The social animals that are inspiring new behaviours for robot swarms. The Conversation. Retrieved\u00a0September 10, 2022,\u00a0from http:\/\/theconversation.com\/the-social-animals-that-are-inspiring-new-behaviours-for-robot-swarms-113584"},{"key":"605_CR106","doi-asserted-by":"publisher","unstructured":"Hvalshagen, M., Lukyanenko, R., & Samuel, B. M. (2023). Empowering users with narratives: Examining the efficacy of narratives for understanding data-oriented conceptual models. Information Systems Research, 1\u201338. https:\/\/doi.org\/10.1287\/isre.2022.1141","DOI":"10.1287\/isre.2022.1141"},{"key":"605_CR107","doi-asserted-by":"publisher","unstructured":"Jacovi, A., Marasovi\u0107, A., Miller, T., & Goldberg, Y. (2021). Formalizing trust in artificial intelligence: Prerequisites, causes and goals of human trust in AI. In\u00a0Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency\u00a0(pp. 624\u2013635). https:\/\/doi.org\/10.1145\/3442188.3445923","DOI":"10.1145\/3442188.3445923"},{"issue":"4","key":"605_CR108","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/07421222.1998.11518185","volume":"14","author":"SL Jarvenpaa","year":"1998","unstructured":"Jarvenpaa, S. L., Knoll, K., & Leidner, D. E. (1998). Is anybody out there? Antecedents of trust in global virtual teams. Journal of Management Information Systems, 14(4), 29\u201364.\u00a0https:\/\/doi.org\/10.1080\/07421222.1998.11518185","journal-title":"Journal of Management Information Systems"},{"issue":"6","key":"605_CR109","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1287\/orsc.10.6.791","volume":"10","author":"SL Jarvenpaa","year":"1999","unstructured":"Jarvenpaa, S. L., & Leidner, D. E. (1999). Communication and trust in global virtual teams. Organization Science, 10(6), 791\u2013815.\u00a0https:\/\/doi.org\/10.1287\/orsc.10.6.791","journal-title":"Organization Science"},{"issue":"1","key":"605_CR110","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1019104520776","volume":"1","author":"SL Jarvenpaa","year":"2000","unstructured":"Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an internet store. Information Technology and Management, 1(1), 45\u201371.\u00a0https:\/\/doi.org\/10.1023\/A:1019104520776","journal-title":"Information Technology and Management"},{"key":"605_CR111","doi-asserted-by":"publisher","first-page":"65","DOI":"10.12688\/wellcomeopenres.17550.1","volume":"7","author":"E Jermutus","year":"2022","unstructured":"Jermutus, E., Kneale, D., Thomas, J., & Michie, S. (2022). Influences on user trust in healthcare artificial intelligence: A systematic review. Wellcome Open Research, 7, 65.\u00a0https:\/\/doi.org\/10.12688\/wellcomeopenres.17550.1","journal-title":"Wellcome Open Research"},{"key":"605_CR112","first-page":"81","volume-title":"The application of artificial intelligence at Chinese digital platform giants: Baidu","author":"K Jia","year":"2018","unstructured":"Jia, K., Kenney, M., Mattila, J., & Seppala, T. (2018). The application of artificial intelligence at Chinese digital platform giants: Baidu (p. 81). ETLA Reports."},{"issue":"9","key":"605_CR113","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1038\/s42256-019-0088-2","volume":"1","author":"A Jobin","year":"2019","unstructured":"Jobin, A., Ienca, M., & Vayena, E. (2019). The global landscape of AI ethics guidelines. Nature Machine Intelligence, 1(9), 389\u2013399.\u00a0https:\/\/doi.org\/10.1038\/s42256-019-0088-2","journal-title":"Nature Machine Intelligence"},{"key":"605_CR114","volume-title":"Emergence: The connected lives of ants, brains, cities, and software","author":"S Johnson","year":"2002","unstructured":"Johnson, S. (2002). Emergence: The connected lives of ants, brains, cities, and software. Simon and Schuster."},{"issue":"3","key":"605_CR115","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1147\/sj.423.0498","volume":"42","author":"C Keser","year":"2003","unstructured":"Keser, C. (2003). Experimental games for the design of reputation management systems. IBM Systems Journal, 42(3), 498\u2013506.\u00a0https:\/\/doi.org\/10.1147\/sj.423.0498","journal-title":"IBM Systems Journal"},{"issue":"1","key":"605_CR116","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1287\/isre.1060.0081","volume":"17","author":"V Khatri","year":"2006","unstructured":"Khatri, V., Vessey, I., Ramesh, V., Clay, P., & Park, S.-J. (2006). Understanding conceptual schemas: Exploring the role of application and IS domain knowledge. Information Systems Research, 17(1), 81\u201399.\u00a0https:\/\/doi.org\/10.1287\/isre.1060.0081","journal-title":"Information Systems Research"},{"issue":"4","key":"605_CR117","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/3516517","volume":"65","author":"K Kirkpatrick","year":"2022","unstructured":"Kirkpatrick, K. (2022). Still waiting for self-driving cars. Communications of the ACM, 65(4), 12\u201314.\u00a0https:\/\/doi.org\/10.1145\/3516517","journal-title":"Communications of the ACM"},{"issue":"4","key":"605_CR118","first-page":"30","volume":"60","author":"D Kiron","year":"2019","unstructured":"Kiron, D., & Schrage, M. (2019). Strategy for and with AI. MIT Sloan Management Review, 60(4), 30\u201335.","journal-title":"MIT Sloan Management Review"},{"key":"605_CR119","unstructured":"Knight, W. (2017). DARPA is funding projects that will try to open up AI\u2019s black boxes. MIT Technology Review."},{"issue":"4","key":"605_CR120","doi-asserted-by":"publisher","first-page":"941","DOI":"10.2307\/25148760","volume":"30","author":"SYX Komiak","year":"2006","unstructured":"Komiak, S. Y. X., & Benbasat, I. (2006). The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941\u2013960.\u00a0https:\/\/doi.org\/10.2307\/25148760","journal-title":"MIS Quarterly"},{"issue":"12","key":"605_CR121","doi-asserted-by":"publisher","first-page":"727","DOI":"10.17705\/1jais.00180","volume":"9","author":"SYX Komiak","year":"2008","unstructured":"Komiak, S. Y. X., & Benbasat, I. (2008). A two-process view of trust and distrust building in recommendation agents: A process-tracing study. Journal of the Association for Information Systems, 9(12), 727\u2013747.\u00a0https:\/\/doi.org\/10.17705\/1jais.00180","journal-title":"Journal of the Association for Information Systems"},{"issue":"10","key":"605_CR122","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1002\/fee.1436","volume":"14","author":"M Kosmala","year":"2016","unstructured":"Kosmala, M., Wiggins, A., Swanson, A., & Simmons, B. (2016). Assessing data quality in citizen science. Frontiers in Ecology and the Environment, 14(10), 551\u2013560.\u00a0https:\/\/doi.org\/10.1002\/fee.1436","journal-title":"Frontiers in Ecology and the Environment"},{"key":"605_CR123","doi-asserted-by":"publisher","first-page":"105785","DOI":"10.1016\/j.ssci.2022.105785","volume":"152","author":"B Ko\u017cuch","year":"2022","unstructured":"Ko\u017cuch, B., & Sienkiewicz-Ma\u0142yjurek, K. (2022). Building collaborative trust in public safety networks. Safety Science, 152, 105785.\u00a0https:\/\/doi.org\/10.1016\/j.ssci.2022.105785","journal-title":"Safety Science"},{"issue":"1","key":"605_CR124","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1080\/21515581.2018.1552592","volume":"9","author":"F Kroeger","year":"2019","unstructured":"Kroeger, F. (2019). Unlocking the treasure trove: How can Luhmann\u2019s theory of trust enrich trust research? Journal of Trust Research, 9(1), 110\u2013124.\u00a0https:\/\/doi.org\/10.1080\/21515581.2018.1552592","journal-title":"Journal of Trust Research"},{"issue":"3","key":"605_CR125","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.compedu.2010.10.008","volume":"56","author":"I Kubiszewski","year":"2011","unstructured":"Kubiszewski, I., Noordewier, T., & Costanza, R. (2011). Perceived credibility of internet encyclopedias. Computers & Education, 56(3), 659\u2013667.\u00a0https:\/\/doi.org\/10.1016\/j.compedu.2010.10.008","journal-title":"Computers & Education"},{"issue":"3","key":"605_CR126","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/3173087","volume":"61","author":"B Kuipers","year":"2018","unstructured":"Kuipers, B. (2018). How can we trust a robot? Communications of the ACM, 61(3), 86\u201395.\u00a0https:\/\/doi.org\/10.1145\/3173087","journal-title":"Communications of the ACM"},{"issue":"3","key":"605_CR127","doi-asserted-by":"publisher","first-page":"e190058","DOI":"10.1148\/ryai.2019190058","volume":"1","author":"CP Langlotz","year":"2019","unstructured":"Langlotz, C. P. (2019). Will artificial intelligence replace radiologists? Radiology. Artificial Intelligence, 1(3), e190058.\u00a0https:\/\/doi.org\/10.1148\/ryai.2019190058","journal-title":"Artificial Intelligence"},{"issue":"2","key":"605_CR128","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/2963175.2963179","volume":"47","author":"J Lansing","year":"2016","unstructured":"Lansing, J., & Sunyaev, A. (2016). Trust in cloud computing: Conceptual typology and trust-building antecedents. ACM Sigmis Database: The Database for Advances in Information Systems, 47(2), 58\u201396.\u00a0https:\/\/doi.org\/10.1145\/2963175.2963179","journal-title":"ACM Sigmis Database: The Database for Advances in Information Systems"},{"key":"605_CR129","doi-asserted-by":"crossref","unstructured":"Larsen, K. R., Lukyanenko, R., Muller, R., Storey, V. C., Vander Meer, D., Parsons, J., & Hovorka, D. S. (2020). Validity in design science research. In\u00a0International Conference on Design Science Research in Information Systems and Technology\u00a0(pp. 1\u201315). Springer Berlin\/Heidelberg.","DOI":"10.1007\/978-3-030-64823-7_25"},{"issue":"5915","key":"605_CR130","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1126\/science.1167742","volume":"323","author":"D Lazer","year":"2009","unstructured":"Lazer, D., Pentland, A. S., Adamic, L., Aral, S., Barabasi, A. L., Brewer, D.,\u00a0Christakis, N., Contractor, N., Fowler, J., Gutmann, M.,\u00a0Jebara, T., King, G., Macy, M., Roy, D., Van Alstyne, M. (2009). Life in the network: The coming age of computational social science. Science (New York, N.Y.), 323(5915), 721.\u00a0https:\/\/doi.org\/10.1126\/science.1167742","journal-title":"Science (New York, N.Y.)"},{"issue":"1","key":"605_CR131","doi-asserted-by":"publisher","first-page":"271","DOI":"10.3390\/ijerph18010271","volume":"18","author":"D Lee","year":"2021","unstructured":"Lee, D., & Yoon, S. N. (2021). Application of artificial intelligence-based technologies in the healthcare industry: Opportunities and challenges. International Journal of Environmental Research and Public Health, 18(1), 271.\u00a0https:\/\/doi.org\/10.3390\/ijerph18010271","journal-title":"International Journal of Environmental Research and Public Health"},{"issue":"2","key":"605_CR132","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1177\/0018720819872672","volume":"62","author":"JD Lee","year":"2020","unstructured":"Lee, J. D., & Kolodge, K. (2020). Exploring trust in self-driving vehicles through text analysis. Human Factors, 62(2), 260\u2013277.\u00a0https:\/\/doi.org\/10.1177\/0018720819872672","journal-title":"Human Factors"},{"issue":"1","key":"605_CR133","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1518\/hfes.46.1.50.30392","volume":"46","author":"JD Lee","year":"2004","unstructured":"Lee, J. D., & See, K. A. (2004). Trust in automation: Designing for appropriate reliance. Human Factors, 46(1), 50\u201380.\u00a0https:\/\/doi.org\/10.1518\/hfes.46.1.50_30392","journal-title":"Human Factors"},{"issue":"1","key":"605_CR134","doi-asserted-by":"publisher","first-page":"343","DOI":"10.25300\/MISQ\/2021\/15941","volume":"45","author":"DE Leidner","year":"2021","unstructured":"Leidner, D. E., & Tona, O. (2021). The CARE theory of dignity amid personal data digitalization. MIS Quarterly, 45(1), 343\u2013370.\u00a0https:\/\/doi.org\/10.25300\/MISQ\/2021\/15941","journal-title":"MIS Quarterly"},{"issue":"1","key":"605_CR135","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-021-92904-7","volume":"11","author":"J Li","year":"2021","unstructured":"Li, J., Zhou, Y., Yao, J., & Liu, X. (2021). An empirical investigation of trust in AI in a Chinese petrochemical enterprise based on institutional theory. Scientific Reports, 11(1), 1\u201312.\u00a0https:\/\/doi.org\/10.1038\/s41598-021-92904-7","journal-title":"Scientific Reports"},{"issue":"2","key":"605_CR136","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s101110050029","volume":"2","author":"K Li","year":"2000","unstructured":"Li, K., & Wieringa, P. A. (2000). Understanding perceived complexity in human supervisory control. Cognition, Technology & Work, 2(2), 75\u201388.\u00a0https:\/\/doi.org\/10.1007\/s101110050029","journal-title":"Cognition, Technology & Work"},{"key":"605_CR137","unstructured":"Lohr, S. (2021). What ever happened to IBM\u2019s Watson? The New York Times. Retrieved\u00a0September 10, 2022,\u00a0from https:\/\/www.nytimes.com\/2021\/07\/16\/technology\/what-happened-ibm-watson.html"},{"key":"605_CR138","unstructured":"Lorenz, E. (1972). Predictability. 139th AAAS Meeting, 1\u20136."},{"issue":"1","key":"605_CR139","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/biomedinformatics2010001","volume":"2","author":"J L\u00f6tsch","year":"2021","unstructured":"L\u00f6tsch, J., Kringel, D., & Ultsch, A. (2021). Explainable artificial intelligence (XAI) in biomedicine: Making AI decisions trustworthy for physicians and patients. BioMedInformatics, 2(1), 1\u201317.\u00a0https:\/\/doi.org\/10.3390\/biomedinformatics2010001","journal-title":"BioMedInformatics"},{"key":"605_CR140","volume-title":"Social systems","author":"N Luhmann","year":"1995","unstructured":"Luhmann, N. (1995). Social systems. Stanford University Press. Retrieved\u00a0September 10, 2022,\u00a0from https:\/\/books.google.ca\/books?id=zVZQW4gxXk4C"},{"issue":"1","key":"605_CR141","first-page":"94","volume":"6","author":"N Luhmann","year":"2000","unstructured":"Luhmann, N. (2000). Familiarity, confidence, trust: Problems and alternatives. Trust: Making and Breaking Cooperative Relations, 6(1), 94\u2013107.","journal-title":"Trust: Making and Breaking Cooperative Relations"},{"key":"605_CR142","volume-title":"Trust and power","author":"N Luhmann","year":"2018","unstructured":"Luhmann, N. (2018). Trust and power. John Wiley & Sons."},{"key":"605_CR143","volume-title":"Introduction to systems theory","author":"N Luhmann","year":"2012","unstructured":"Luhmann, N., & Gilgen, P. (2012). Introduction to systems theory. Wiley. Retrieved\u00a0September 10, 2022,\u00a0from https:\/\/books.google.ca\/books?id=3mnUSAAACAAJ"},{"key":"605_CR144","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-030-21297-1_15","volume-title":"Information systems engineering in responsible information systems","author":"R Lukyanenko","year":"2019","unstructured":"Lukyanenko, R., Castellanos, A., Parsons, J., Chiarini Tremblay, M., & Storey, V. C. (2019a). Using conceptual modeling to support machine learning. In C. Cappiello & M. Ruiz (Eds.), Information systems engineering in responsible information systems (pp. 170\u2013181). Springer International Publishing.\u00a0https:\/\/doi.org\/10.1007\/978-3-030-21297-1_15"},{"key":"605_CR145","first-page":"1","volume-title":"Americas conference on information systems","author":"R Lukyanenko","year":"2021","unstructured":"Lukyanenko, R., Castellanos, A., Samuel, B. M., Tremblay, M., & Maass, W. (2021a). Research agenda for basic explainable AI. Americas Conference on Information Systems (pp. 1\u20138)."},{"key":"605_CR146","first-page":"1","volume-title":"1st international workshop on conceptual modeling meets artificial intelligence and data-driven decision making","author":"R Lukyanenko","year":"2020","unstructured":"Lukyanenko, R., Castellanos, A., Storey, V. C., Castillo, A., Tremblay, M. C., & Parsons, J. (2020). Superimposition: Augmenting machine learning outputs with conceptual models for explainable AI. In\u00a01st international workshop on conceptual modeling meets artificial intelligence and data-driven decision making (pp. 1\u201312). Springer."},{"issue":"1","key":"605_CR147","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/JDM.2018010101","volume":"29","author":"R Lukyanenko","year":"2018","unstructured":"Lukyanenko, R., & Parsons, J. (2018). Beyond Micro-tasks: Research opportunities in observational crowdsourcing. Journal of Database Management (JDM), 29(1), 1\u201322.\u00a0https:\/\/doi.org\/10.4018\/JDM.2018010101","journal-title":"Journal of Database Management (JDM)"},{"issue":"1","key":"605_CR148","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/0960085X.2018.1488567","volume":"28","author":"R Lukyanenko","year":"2019","unstructured":"Lukyanenko, R., Parsons, J., & Samuel, B. M. (2019b). Representing instances: The case for reengineering conceptual modeling grammars. European Journal of Information Systems, 28(1), 68\u201390. https:\/\/doi.org\/10.1080\/0960085X.2018.1488567","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"605_CR149","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s10270-021-00862-5","volume":"20","author":"R Lukyanenko","year":"2021","unstructured":"Lukyanenko, R., Storey, V. C., & Pastor, O. (2021b). Foundations of information technology based on Bunge\u2019s systemist philosophy of reality. Software and Systems Modeling, 20(1), 921\u2013938.\u00a0https:\/\/doi.org\/10.1007\/s10270-021-00862-5","journal-title":"Software and Systems Modeling"},{"key":"605_CR150","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.datak.2022.102062","volume":"141","author":"R Lukyanenko","year":"2022","unstructured":"Lukyanenko, R., Storey, V. C., & Pastor, O. (2022). System: A Core conceptual modeling construct for capturing complexity. Data & Knowledge Engineering, 141, 1\u201329.\u00a0https:\/\/doi.org\/10.1016\/j.datak.2022.102062","journal-title":"Data & Knowledge Engineering"},{"key":"605_CR151","first-page":"1","volume-title":"\u201cDigital first\u201d era \u2014 A joint AIS SIGSAND\/SIGPrag workshop","author":"R Lukyanenko","year":"2022","unstructured":"Lukyanenko, R., & Weber, R. (2022). A realist ontology of digital objects and digitalized systems. In\u00a0\u201cDigital first\u201d era \u2014 A joint AIS SIGSAND\/SIGPrag workshop (pp. 1\u20135). Virtual Workshop."},{"issue":"2","key":"605_CR152","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1080\/21515581.2018.1531766","volume":"8","author":"F Lumineau","year":"2018","unstructured":"Lumineau, F., & Schilke, O. (2018). Trust development across levels of analysis: An embedded-agency perspective. Journal of Trust Research, 8(2), 238\u2013248.\u00a0https:\/\/doi.org\/10.1080\/21515581.2018.1531766","journal-title":"Journal of Trust Research"},{"key":"605_CR153","unstructured":"Maass, W., Castellanos, A., Tremblay, M. C., Lukyanenko, R., & Storey, V. C. (2022a). Concept Superimposition: Using conceptual modeling method for explainable AI. In\u00a0AAAI Spring Symposium: MAKE 2022\u00a0(pp. 1\u20136). Palm Springs."},{"key":"605_CR154","first-page":"1","volume-title":"International conference on information systems","author":"W Maass","year":"2022","unstructured":"Maass, W., Castellanos, A., Tremblay, M., & Lukyanenko, R. (2022b). AI Explainability: A conceptual model embedding. In\u00a0International Conference on Information Systems (pp. 1\u20138)."},{"key":"605_CR155","doi-asserted-by":"publisher","unstructured":"Maass, W., & Storey, V. C. (2021). Pairing conceptual modeling with machine learning. Data & Knowledge Engineering, 101\u2013123. https:\/\/doi.org\/10.1016\/j.datak.2021.101909","DOI":"10.1016\/j.datak.2021.101909"},{"key":"605_CR156","doi-asserted-by":"crossref","unstructured":"Maass, W., Storey, V. C., & Lukyanenko, R. (2021). From mental models to machine learning models via conceptual models. In\u00a0Exploring Modeling Methods for Systems Analysis and Development (EMMSAD 2021)\u00a0(pp. 1\u20138). Melbourne, Australia.","DOI":"10.1007\/978-3-030-79186-5_19"},{"key":"605_CR157","volume-title":"Rebooting AI: Building artificial intelligence we can trust","author":"G Marcus","year":"2019","unstructured":"Marcus, G., & Davis, E. (2019). Rebooting AI: Building artificial intelligence we can trust. Pantheon Books.\u00a0"},{"key":"605_CR158","unstructured":"Marr, B. (2018). Is artificial intelligence dangerous? 6 AI risks everyone should know about. Forbes. Retrieved May 13, 2022, from https:\/\/www.forbes.com\/sites\/bernardmarr\/2018\/11\/19\/is-artificial-intelligence-dangerous-6-ai-risks-everyone-should-know-about\/"},{"issue":"3","key":"605_CR159","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709\u2013734.\u00a0https:\/\/doi.org\/10.5465\/amr.1995.9508080335","journal-title":"Academy of Management Review"},{"key":"605_CR160","volume-title":"Machine, platform, crowd: Harnessing our digital future","author":"A McAfee","year":"2017","unstructured":"McAfee, A., & Brynjolfsson, E. (2017). Machine, platform, crowd: Harnessing our digital future. WW Norton & Company."},{"issue":"1","key":"605_CR161","doi-asserted-by":"publisher","first-page":"24","DOI":"10.2307\/256727","volume":"38","author":"DJ McAllister","year":"1995","unstructured":"McAllister, D. J. (1995). Affect-and cognition-based trust as foundations for interpersonal cooperation in organizations. Academy of Management Journal, 38(1), 24\u201359.\u00a0https:\/\/doi.org\/10.5465\/256727","journal-title":"Academy of Management Journal"},{"issue":"2","key":"605_CR162","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1985347.1985353","volume":"2","author":"DH Mcknight","year":"2011","unstructured":"Mcknight, D. H., Carter, M., Thatcher, J. B., & Clay, P. F. (2011). Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems (TMIS), 2(2), 1\u201325.\u00a0https:\/\/doi.org\/10.1145\/1985347.1985353","journal-title":"ACM Transactions on Management Information Systems (TMIS)"},{"issue":"3","key":"605_CR163","doi-asserted-by":"publisher","first-page":"473","DOI":"10.2307\/259290","volume":"23","author":"DH McKnight","year":"1998","unstructured":"McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473\u2013490.\u00a0https:\/\/doi.org\/10.5465\/amr.1998.926622","journal-title":"Academy of Management Review"},{"issue":"3","key":"605_CR164","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1037\/0033-295X.85.3.207","volume":"85","author":"DL Medin","year":"1978","unstructured":"Medin, D. L., & Schaffer, M. M. (1978). Context theory of classification learning. Psychological Review, 85(3), 207\u2013238.\u00a0https:\/\/doi.org\/10.1037\/0033-295X.85.3.207","journal-title":"Psychological Review"},{"issue":"6","key":"605_CR165","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3457607","volume":"54","author":"N Mehrabi","year":"2021","unstructured":"Mehrabi, N., Morstatter, F., Saxena, N., Lerman, K., & Galstyan, A. (2021). A survey on bias and fairness in machine learning. ACM Computing Surveys (CSUR), 54(6), 1\u201335.\u00a0https:\/\/doi.org\/10.1145\/3457607","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"605_CR166","doi-asserted-by":"publisher","unstructured":"Miller, T., Howe, P., & Sonenberg, L. (2017). Explainable AI: Beware of inmates running the asylum or: How I learnt to stop worrying and love the social and behavioural sciences. ArXiv Preprint. https:\/\/doi.org\/10.48550\/arXiv.1712.00547","DOI":"10.48550\/arXiv.1712.00547"},{"key":"605_CR167","unstructured":"Minsky, M. (1974). A framework for representing knowledge. M.I.T. A.I.Laboratory."},{"issue":"6","key":"605_CR168","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/TSE.2009.67","volume":"35","author":"DL Moody","year":"2009","unstructured":"Moody, D. L. (2009). The \u201cphysics\u201d of notations: Toward a scientific basis for constructing visual notations in software engineering. Software Engineering, IEEE Transactions On, 35(6), 756\u2013779.\u00a0https:\/\/doi.org\/10.1109\/TSE.2009.67","journal-title":"Software Engineering, IEEE Transactions On"},{"issue":"4","key":"605_CR169","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1177\/1350507606073424","volume":"37","author":"T Mooradian","year":"2006","unstructured":"Mooradian, T., Renzl, B., & Matzler, K. (2006). Who trusts? Personality, trust and knowledge sharing. Management Learning, 37(4), 523\u2013540.\u00a0https:\/\/doi.org\/10.1177\/1350507606073424","journal-title":"Management Learning"},{"issue":"2","key":"605_CR170","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1111\/cars.12191","volume":"55","author":"C Morgner","year":"2018","unstructured":"Morgner, C. (2018). Trust and society: Suggestions for further development of Niklas Luhmann\u2019s theory of trust. Canadian Review of Sociology\/Revue Canadienne de Sociologie, 55(2), 232\u2013256.\u00a0https:\/\/doi.org\/10.1111\/cars.12191","journal-title":"Canadian Review of Sociology\/Revue Canadienne de Sociologie"},{"key":"605_CR171","doi-asserted-by":"publisher","unstructured":"Mueller, S. T., Hoffman, R. R., Clancey, W., Emrey, A., & Klein, G. (2019). Explanation in human-AI systems: A literature meta-review, synopsis of key ideas and publications, and bibliography for explainable AI. ArXiv Preprint. https:\/\/doi.org\/10.48550\/arXiv.1902.01876","DOI":"10.48550\/arXiv.1902.01876"},{"key":"605_CR172","volume-title":"The big book of concepts","author":"G Murphy","year":"2004","unstructured":"Murphy, G. (2004). The big book of concepts. MIT Press."},{"issue":"3\u20134","key":"605_CR173","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0306-4379(98)00005-2","volume":"23","author":"J Mylopoulos","year":"1998","unstructured":"Mylopoulos, J. (1998). Information modeling in the time of the revolution. Information Systems, 23(3\u20134), 127\u2013155.\u00a0https:\/\/doi.org\/10.1016\/S0306-4379(98)00005-2","journal-title":"Information Systems"},{"key":"605_CR174","doi-asserted-by":"publisher","DOI":"10.4135\/9781446288856","volume-title":"Validity in educational and psychological assessment","author":"P Newton","year":"2014","unstructured":"Newton, P., & Shaw, S. (2014). Validity in educational and psychological assessment. Sage."},{"key":"605_CR175","doi-asserted-by":"publisher","unstructured":"Oksanen, A., Savela, N., Latikka, R., & Koivula, A. (2020). Trust toward robots and artificial intelligence: An experimental approach to human\u2013technology interactions online. Frontiers in Psychology, 3336. https:\/\/doi.org\/10.3389\/fpsyg.2020.568256","DOI":"10.3389\/fpsyg.2020.568256"},{"key":"605_CR176","doi-asserted-by":"publisher","unstructured":"Par\u00e9, G., Marsan, J., Jaana, M., Tamim, H., & Lukyanenko, R. (2020). IT vendors\u2019 legitimation strategies and market share: The case of EMR systems. Information & Management, 57(5), 103291.https:\/\/doi.org\/10.1016\/j.im.2020.103291","DOI":"10.1016\/j.im.2020.103291"},{"issue":"5","key":"605_CR177","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/3488376","volume":"65","author":"J Park","year":"2022","unstructured":"Park, J., & Kim, J. (2022). A data-driven exploration of the race between human labor and machines in the 21st century. Communications of the ACM, 65(5), 79\u201387.\u00a0https:\/\/doi.org\/10.1145\/3488376","journal-title":"Communications of the ACM"},{"issue":"7216","key":"605_CR178","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1038\/4551040a","volume":"455","author":"J Parsons","year":"2008","unstructured":"Parsons, J., & Wand, Y. (2008a). A question of class. Nature, 455(7216), 1040\u20131041.\u00a0https:\/\/doi.org\/10.1038\/4551040a","journal-title":"Nature"},{"issue":"4","key":"605_CR179","doi-asserted-by":"publisher","first-page":"839","DOI":"10.2307\/25148874","volume":"32","author":"J Parsons","year":"2008","unstructured":"Parsons, J., & Wand, Y. (2008b). Using cognitive principles to guide classification in information systems modeling. MIS Quarterly, 32(4), 839\u2013868.\u00a0https:\/\/doi.org\/10.2307\/25148874","journal-title":"MIS Quarterly"},{"key":"605_CR180","doi-asserted-by":"publisher","unstructured":"Petersen, B. K., Chowhan, J., Cooke, G. B., Gosine, R., & Warrian, P. J. (2022). Automation and the future of work: An intersectional study of the role of human capital, income, gender and visible minority status. Economic and Industrial Democracy, 0143831X221088301. https:\/\/doi.org\/10.1177\/0143831X221088301","DOI":"10.1177\/0143831X221088301"},{"key":"605_CR181","volume-title":"How to solve it: A new aspect of mathematical method","author":"G Polya","year":"2004","unstructured":"Polya, G. (2004). How to solve it: A new aspect of mathematical method. Princeton University Press."},{"key":"605_CR182","unstructured":"Pratt, L. Y. (1992). Discriminability-based transfer between neural networks. Advances in Neural Information Processing Systems, 5."},{"issue":"1","key":"605_CR183","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11747-019-00710-5","volume":"48","author":"A Rai","year":"2020","unstructured":"Rai, A. (2020). Explainable AI: From black box to glass box. Journal of the Academy of Marketing Science, 48(1), 137\u2013141.\u00a0https:\/\/doi.org\/10.1007\/s11747-019-00710-5","journal-title":"Journal of the Academy of Marketing Science"},{"key":"605_CR184","volume-title":"Who\u2019s afraid of AI?: Fear and promise in the age of thinking machines","author":"T Ramge","year":"2019","unstructured":"Ramge, T. (2019). Who\u2019s afraid of AI?: Fear and promise in the age of thinking machines. The Experiment."},{"key":"605_CR185","first-page":"1","volume-title":"Sizing the prize: What\u2019s the real value of AI for your business and how can you capitalise","author":"AS Rao","year":"2017","unstructured":"Rao, A. S., & Verweij, G. (2017). Sizing the prize: What\u2019s the real value of AI for your business and how can you capitalise (pp. 1\u201330). PwC Publication."},{"issue":"1","key":"605_CR186","doi-asserted-by":"publisher","first-page":"269","DOI":"10.25300\/MISQ\/2021\/16027","volume":"45","author":"J Recker","year":"2021","unstructured":"Recker, J., Lukyanenko, R., Sabegh, M. A., Samuel, B. M., & Castellanos, A. (2021). From representation to mediation: A new agenda for conceptual modeling research in a digital world. MIS Quarterly, 45(1), 269\u2013300. https:\/\/doi.org\/10.25300\/MISQ\/2021\/16027","journal-title":"MIS Quarterly"},{"key":"605_CR187","doi-asserted-by":"publisher","unstructured":"Riedl, R. (2022) Is trust in artificial intelligence systems related to user personality? Review of empirical evidence and future research directions. Electronic Markets, 32(4). https:\/\/doi.org\/10.1007\/s12525-022-00594-4","DOI":"10.1007\/s12525-022-00594-4"},{"key":"605_CR188","unstructured":"Reimer, U., Bork, D., Fettke, P., & Tropmann-Frick, M. (2020). Preface of the first Workshop \"Models in AI\"\u00a0(pp. 128\u2013129). http:\/\/ceur-ws.org\/Vol-2542\/MOD-KI-preface.pdf"},{"issue":"1","key":"605_CR189","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1037\/0022-3514.49.1.95","volume":"49","author":"JK Rempel","year":"1985","unstructured":"Rempel, J. K., Holmes, J. G., & Zanna, M. P. (1985). Trust in close relationships. Journal of Personality and Social Psychology, 49(1), 95\u2013112.","journal-title":"Journal of Personality and Social Psychology"},{"key":"605_CR190","first-page":"1","volume-title":"Proceedings of the 55th Hawaii international conference on system sciences (HICSS2022)","author":"M Renner","year":"2022","unstructured":"Renner, M., Lins, S., S\u00f6llner, M., Thiebes, S., & Sunyaev, A. (2022). Understanding the necessary conditions of multi-source trust transfer in artificial intelligence. In\u00a0Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS2022) (pp. 1\u201310).\u00a0http:\/\/hdl.handle.net\/10125\/80057"},{"key":"605_CR191","volume-title":"Value matters: Studies in axiology","author":"N Rescher","year":"2013","unstructured":"Rescher, N. (2013). Value matters: Studies in axiology (Vol. 8). Walter de Gruyter."},{"key":"605_CR192","unstructured":"Reuters, T. (2021). Toyota halts use of self-driving vehicle at Paralympic village after collision with visually impaired athlete. CBC Sports. Retrieved April 5, 2022, from https:\/\/www.cbc.ca\/sports\/paralympics\/toyota-halts-self-driving-vehicles-use-after-olympic-village-accident-1.6157569"},{"issue":"4","key":"605_CR193","doi-asserted-by":"publisher","first-page":"172","DOI":"10.17705\/1thci.00134","volume":"12","author":"LP Robert Jr","year":"2020","unstructured":"Robert Jr., L. P., Bansal, G., Melville, N., & Stafford, T. (2020). Introduction to the special issue on AI fairness, trust, and ethics. AIS Transactions on Human-Computer Interaction, 12(4), 172\u2013178.\u00a0https:\/\/doi.org\/10.17705\/1thci.00134","journal-title":"AIS Transactions on Human-Computer Interaction"},{"key":"605_CR194","unstructured":"Rosch, E. (1977). Classification of real-world objects: Origins and representations in cognition\u00a0(pp. 212\u2013222). In P. N. Johnson-Laird & P. C. Wason, (Eds.). Cambridge University Press."},{"issue":"2","key":"605_CR195","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S0306-4379(01)00048-5","volume":"27","author":"M Rosemann","year":"2002","unstructured":"Rosemann, M., & Green, P. (2002). Developing a meta model for the Bunge\u2013Wand\u2013Weber ontological constructs. Information Systems, 27(2), 75\u201391.\u00a0https:\/\/doi.org\/10.1016\/S0306-4379(01)00048-5","journal-title":"Information Systems"},{"issue":"1","key":"605_CR196","first-page":"127","volume":"72","author":"F Rossi","year":"2018","unstructured":"Rossi, F. (2018). Building trust in artificial intelligence. Journal of International Affairs, 72(1), 127\u2013134.\u00a0https:\/\/jia.sipa.columbia.edu\/building-trust-artificial-intelligence","journal-title":"Journal of International Affairs"},{"key":"605_CR197","doi-asserted-by":"publisher","DOI":"10.4324\/9781351035743","volume-title":"The psychology of interpersonal trust: Theory and research","author":"KJ Rotenberg","year":"2019","unstructured":"Rotenberg, K. J. (2019). The psychology of interpersonal trust: Theory and research. Routledge."},{"issue":"3","key":"605_CR198","doi-asserted-by":"publisher","first-page":"393","DOI":"10.5465\/amr.1998.926617","volume":"23","author":"DM Rousseau","year":"1998","unstructured":"Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393\u2013404.\u00a0https:\/\/doi.org\/10.5465\/amr.1998.926617","journal-title":"Academy of Management Review"},{"issue":"9","key":"605_CR199","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1177\/001872679304600907","volume":"46","author":"CF Sabel","year":"1993","unstructured":"Sabel, C. F. (1993). Studied trust: Building new forms of cooperation in a volatile economy. Human Relations, 46(9), 1133\u20131170.\u00a0https:\/\/doi.org\/10.1177\/001872679304600907","journal-title":"Human Relations"},{"issue":"05","key":"605_CR200","doi-asserted-by":"publisher","first-page":"01","DOI":"10.31695\/IJERAT.2020.3612","volume":"6","author":"MN Sadiku","year":"2020","unstructured":"Sadiku, M. N., Fagbohungbe, O. I., & Musa, S. M. (2020). Artificial intelligence in cyber security. International Journal of Engineering Research and Advanced Technology, 6(05), 01\u201307.\u00a0https:\/\/doi.org\/10.31695\/IJERAT.2020.3670","journal-title":"International Journal of Engineering Research and Advanced Technology"},{"key":"605_CR201","unstructured":"Saif, I., & Ammanath, B. (2020). Trustworthy AI is a framework to help manage unique risk. MIT Technology Review, 1\u20135. https:\/\/www.technologyreview.com\/2020\/03\/25\/950291\/trustworthy-ai-is-a-framework-to-help-manage-unique-risk\/"},{"key":"605_CR202","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/17538947.2015.1039609","volume":"1","author":"CF Salk","year":"2015","unstructured":"Salk, C. F., Sturn, T., See, L., Fritz, S., & Perger, C. (2015). Assessing quality of volunteer crowdsourcing contributions: Lessons from the cropland capture game. International Journal of Digital Earth, 1, 1\u201317.\u00a0https:\/\/doi.org\/10.1080\/17538947.2015.1039609","journal-title":"International Journal of Digital Earth"},{"key":"605_CR203","doi-asserted-by":"publisher","unstructured":"Sambasivan, N., Kapania, S., Highfill, H., Akrong, D., Paritosh, P., & Aroyo, L. M. (2021). \u201cEveryone wants to do the model work, not the data work\u201d: Data cascades in high-stakes AI. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 39, 1\u201315. https:\/\/doi.org\/10.1145\/3411764.3445518","DOI":"10.1145\/3411764.3445518"},{"issue":"3","key":"605_CR204","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1147\/rd.33.0210","volume":"3","author":"AL Samuel","year":"1959","unstructured":"Samuel, A. L. (1959). Some studies in machine learning using the game of checkers. IBM Journal of Research and Development, 3(3), 210\u2013229.\u00a0https:\/\/doi.org\/10.1147\/rd.116.0601","journal-title":"IBM Journal of Research and Development"},{"issue":"4","key":"605_CR205","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.25300\/MISQ\/2018\/13255","volume":"42","author":"BM Samuel","year":"2018","unstructured":"Samuel, B. M., Khatri, V., & Ramesh, V. (2018). Exploring the effects of extensional versus intentional representations on domain understanding. MIS Quarterly, 42(4), 1187\u20131209.\u00a0https:\/\/doi.org\/10.25300\/MISQ\/2018\/13255","journal-title":"MIS Quarterly"},{"key":"605_CR206","doi-asserted-by":"publisher","unstructured":"Sanders, T., Oleson, K. E., Billings, D. R., Chen, J. Y., & Hancock, P. A. (2011). A model of human-robot trust: Theoretical model development. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting\u00a0(vol. 55, no. 1, pp. 1432\u20131436). SAGE Publications. https:\/\/doi.org\/10.1177\/1071181311551298","DOI":"10.1177\/1071181311551298"},{"issue":"1","key":"605_CR207","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.aap.2021.106454","volume":"163","author":"JM Scanlon","year":"2021","unstructured":"Scanlon, J. M., Kusano, K. D., Daniel, T., Alderson, C., Ogle, A., & Victor, T. (2021). Waymo simulated driving behavior in reconstructed fatal crashes within an autonomous vehicle operating domain. Accident Analysis & Prevention, 163(1), 106\u2013154.\u00a0https:\/\/doi.org\/10.1016\/j.aap.2021.106454","journal-title":"Accident Analysis & Prevention"},{"key":"605_CR208","unstructured":"Scheman, N. (2015). Epistemology resuscitated: Objectivity as trustworthiness. In Shifting Ground: Knowledge and Reality, Transgression and Trustworthiness. Oxford University Press."},{"issue":"3","key":"605_CR209","first-page":"27","volume":"6","author":"SL Schlindwein","year":"2004","unstructured":"Schlindwein, S. L., & Ison, R. (2004). Human knowing and perceived complexity: Implications for systems practice. Emergence: Complexity and Organization, 6(3), 27\u201332.","journal-title":"Emergence: Complexity and Organization"},{"key":"605_CR210","doi-asserted-by":"publisher","first-page":"102253","DOI":"10.1016\/j.joep.2020.102253","volume":"78","author":"E Schniter","year":"2020","unstructured":"Schniter, E., Shields, T. W., & Sznycer, D. (2020). Trust in humans and robots: Economically similar but emotionally different. Journal of Economic Psychology, 78, 102253.\u00a0https:\/\/doi.org\/10.1016\/j.joep.2020.102253","journal-title":"Journal of Economic Psychology"},{"issue":"5","key":"605_CR211","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1016\/j.jesp.2008.05.003","volume":"44","author":"Y Schul","year":"2008","unstructured":"Schul, Y., Mayo, R., & Burnstein, E. (2008). The value of distrust. Journal of Experimental Social Psychology, 44(5), 1293\u20131302.\u00a0https:\/\/doi.org\/10.1016\/j.jesp.2008.05.003","journal-title":"Journal of Experimental Social Psychology"},{"key":"605_CR212","volume-title":"The construction of social reality","author":"JR Searle","year":"1995","unstructured":"Searle, J. R. (1995). The construction of social reality. Simon and Schuster."},{"key":"605_CR213","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:osobl\/9780195396171.001.0001","volume-title":"Making the social world: The structure of human civilization","author":"JR Searle","year":"2010","unstructured":"Searle, J. R. (2010). Making the social world: The structure of human civilization. Oxford University Press."},{"key":"605_CR214","first-page":"48","volume-title":"\u201cMeaningful information\u201d and the right to explanation","author":"A Selbst","year":"2018","unstructured":"Selbst, A., & Powles, J. (2018). \u201cMeaningful information\u201d and the right to explanation (pp. 48\u201348). PMLR."},{"issue":"3","key":"605_CR215","doi-asserted-by":"publisher","first-page":"553","DOI":"10.2307\/25148856","volume":"32","author":"G Shanks","year":"2008","unstructured":"Shanks, G., Tansley, E., Nuredini, J., Tobin, D., & Weber, R. (2008). Representing part-whole relations in conceptual modeling: An empirical evaluation. MIS Quarterly, 32(3), 553\u2013573.\u00a0https:\/\/doi.org\/10.2307\/25148856","journal-title":"MIS Quarterly"},{"key":"605_CR216","unstructured":"Shartsis, A. (2019). Council post: Dynamic pricing: The secret weapon used by the world\u2019s most successful companies. Forbes. Retrieved April 8, 2022 from https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/01\/08\/dynamic-pricing-the-secret-weapon-used-by-the-worlds-most-successful-companies\/"},{"issue":"1","key":"605_CR217","doi-asserted-by":"crossref","first-page":"51","DOI":"10.17509\/ijert.v3i1.45652","volume":"3","author":"J Shaturaev","year":"2022","unstructured":"Shaturaev, J. (2022). Economies and management as a result of the fourth industrial revolution: An education perspective. Indonesian Journal of Educational Research and Technology, 3(1), 51\u201358.","journal-title":"Indonesian Journal of Educational Research and Technology"},{"issue":"2","key":"605_CR218","first-page":"47","volume":"31","author":"K Siau","year":"2018","unstructured":"Siau, K., & Wang, W. (2018). Building trust in artificial intelligence, machine learning, and robotics. Cutter Business Technology Journal, 31(2), 47\u201353.","journal-title":"Cutter Business Technology Journal"},{"issue":"1","key":"605_CR219","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1027\/1016-9040\/a000169","volume":"19","author":"M Siegrist","year":"2014","unstructured":"Siegrist, M., & Zingg, A. (2014). The role of public trust during pandemics. European Psychologist, 19(1), 23\u201332.\u00a0https:\/\/doi.org\/10.1027\/1016-9040\/a000169","journal-title":"European Psychologist"},{"issue":"5","key":"605_CR220","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1111\/j.1467-8721.2007.00517.x","volume":"16","author":"JA Simpson","year":"2007","unstructured":"Simpson, J. A. (2007). Psychological foundations of trust. Current Directions in Psychological Science, 16(5), 264\u2013268.\u00a0https:\/\/doi.org\/10.1111\/j.1467-8721.2007.00517.x","journal-title":"Current Directions in Psychological Science"},{"issue":"4","key":"605_CR221","doi-asserted-by":"publisher","first-page":"97","DOI":"10.9785\/cri-2019-200402","volume":"20","author":"NA Smuha","year":"2019","unstructured":"Smuha, N. A. (2019). The EU approach to ethics guidelines for trustworthy artificial intelligence. Computer Law Review International, 20(4), 97\u2013106.\u00a0https:\/\/doi.org\/10.9785\/cri-2019-200402","journal-title":"Computer Law Review International"},{"key":"605_CR222","doi-asserted-by":"publisher","unstructured":"S\u00f6llner, M., Hoffmann, A., Hoffmann, H., & Leimeister, J. M. (2012). How to use behavioral research insights on trust for HCI system design. In\u00a0CHI\u201912 Extended Abstracts on Human Factors in Computing Systems (pp. 1703\u20131708). https:\/\/doi.org\/10.1145\/2212776.2223696","DOI":"10.1145\/2212776.2223696"},{"key":"605_CR223","unstructured":"S\u00f6llner, M., & Leimeister, J. M. (2013). What we really know about antecedents of trust: A critical review of the empirical information systems literature on trust. In\u00a0Psychology of Trust: New Research, D. Gefen. Verlag\/Publisher: Nova Science Publishers. Available at SSRN: https:\/\/ssrn.com\/absract=2475385"},{"key":"605_CR224","unstructured":"Stackpole, B. (2019). AI ain\u2019t for everyone\u2014Who trusts bots, and why. MIT Sloan, 1\u20132. https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/ai-aint-everyone-who-trusts-bots-and-why"},{"issue":"2","key":"605_CR225","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1111\/bioe.12891","volume":"36","author":"G Starke","year":"2022","unstructured":"Starke, G., van den Brule, R., Elger, B. S., & Haselager, P. (2022). Intentional machines: A defence of trust in medical artificial intelligence. Bioethics, 36(2), 154\u2013161.\u00a0https:\/\/doi.org\/10.1111\/bioe.12891","journal-title":"Bioethics"},{"key":"605_CR226","unstructured":"Steinke, F., Fritsch, T., & Silbermann, L. (2012). Trust in ambient assisted living (AAL)-a systematic review of trust in automation and assistance systems. International Journal on Advances in Life Sciences, 4(3\u20134)."},{"issue":"1","key":"605_CR227","doi-asserted-by":"publisher","first-page":"25","DOI":"10.2307\/249508","volume":"17","author":"VC Storey","year":"1993","unstructured":"Storey, V. C., & Goldstein, R. C. (1993). Knowledge-based approaches to database design. MIS Quarterly, 17(1), 25\u201346.\u00a0https:\/\/doi.org\/10.2307\/249508","journal-title":"MIS Quarterly"},{"key":"605_CR228","doi-asserted-by":"publisher","unstructured":"Storey, V. C., Lukyanenko, R., Parsons, J., & Maass, W. (2022). Explainable AI: Opening the black box or Pandora\u2019s box? Communications of the ACM, 65(4), 27\u201329. https:\/\/doi.org\/10.1145\/3490699","DOI":"10.1145\/3490699"},{"issue":"2","key":"605_CR229","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1086\/205983","volume":"13","author":"H Sturt","year":"1903","unstructured":"Sturt, H. (1903). Happiness. The international. The Journal of Ethics, 13(2), 207\u2013221.","journal-title":"The Journal of Ethics"},{"key":"605_CR230","doi-asserted-by":"publisher","unstructured":"Taddeo, M. (2021). On the risks of trusting artificial intelligence: The case of cybersecurity. In: J. Cowls, & J. Morley (Eds.),\u00a0The 2020 Yearbook of the Digital Ethics Lab. Digital Ethics Lab Yearbook (pp. 97\u2013108). Springer. https:\/\/doi.org\/10.1007\/978-3-030-80083-3_10","DOI":"10.1007\/978-3-030-80083-3_10"},{"issue":"12","key":"605_CR231","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1038\/s42256-019-0109-1","volume":"1","author":"M Taddeo","year":"2019","unstructured":"Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557\u2013560.\u00a0https:\/\/doi.org\/10.1038\/s42256-019-0109-1","journal-title":"Nature Machine Intelligence"},{"issue":"2","key":"605_CR232","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1145\/7474.7475","volume":"18","author":"TJ Teorey","year":"1986","unstructured":"Teorey, T. J., Yang, D., & Fry, J. P. (1986). A logical design methodology for relational databases using the extended entity-relationship model. ACM Computing Surveys, 18(2), 197\u2013222.\u00a0https:\/\/doi.org\/10.1145\/7474.7475","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"605_CR233","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s12525-020-00441-4","volume":"31","author":"S Thiebes","year":"2021","unstructured":"Thiebes, S., Lins, S., & Sunyaev, A. (2021). Trustworthy artificial intelligence. Electronic Markets, 31(2), 447\u2013464.\u00a0https:\/\/doi.org\/10.1007\/s12525-020-00441-4","journal-title":"Electronic Markets"},{"key":"605_CR234","unstructured":"Thompson, N. (2018). When tech knows you better than you know yourself. WIRED, 1\u20134."},{"key":"605_CR235","unstructured":"Tversky, A., Kahneman, D., & Moser, P. (1990). Judgment under uncertainty: Heuristics and biases. Rationality in Action: Contemporary Approaches, 171\u2013188."},{"issue":"3","key":"605_CR236","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3516423","volume":"65","author":"MY Vardi","year":"2022","unstructured":"Vardi, M. Y. (2022). ACM, ethics, and corporate behavior. Communications of the ACM, 65(3), 5\u20135.\u00a0https:\/\/doi.org\/10.1145\/3516423","journal-title":"Communications of the ACM"},{"key":"605_CR237","unstructured":"Verissimo, P., Correia, M., Neves, N. F., & Sousa, P. (2009). Intrusion-resilient middleware design and validation. In Information Assurance, Security and Privacy Services (Vol. 4, pp. 615\u2013678)."},{"issue":"1","key":"605_CR238","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s43856-021-00028-w","volume":"1","author":"KN Vokinger","year":"2021","unstructured":"Vokinger, K. N., Feuerriegel, S., & Kesselheim, A. S. (2021). Mitigating bias in machine learning for medicine. Communications Medicine, 1(1), 1\u20133.\u00a0https:\/\/doi.org\/10.1038\/s43856-021-00028-w","journal-title":"Communications Medicine"},{"key":"605_CR239","unstructured":"von Bertalanffy, L. (1968). General system theory: Foundations, development, applications. Braziller."},{"key":"605_CR240","unstructured":"von Neumann, J. (1958). The computer and the brain. New Haven, CT: Yale University Press."},{"issue":"2","key":"605_CR241","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1093\/idpl\/ipx005","volume":"7","author":"S Wachter","year":"2017","unstructured":"Wachter, S., Mittelstadt, B., & Floridi, L. (2017). Why a right to explanation of automated decision-making does not exist in the general data protection regulation. International Data Privacy Law, 7(2), 76\u201399.","journal-title":"International Data Privacy Law"},{"key":"605_CR242","unstructured":"Wakabayashi, D. (2018). Self-driving Uber car kills pedestrian in Arizona, where robots roam. The New York Times. Retrieved September 10, 2022,\u00a0from https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/uber-driverless-fatality.html"},{"issue":"7537","key":"605_CR243","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1038\/518020a","volume":"518","author":"MM Waldrop","year":"2015","unstructured":"Waldrop, M. M. (2015). No drivers required. Nature, 518(7537), 20.\u00a0https:\/\/doi.org\/10.1038\/518020a","journal-title":"Nature"},{"key":"605_CR244","doi-asserted-by":"publisher","first-page":"121540","DOI":"10.1016\/j.techfore.2022.121540","volume":"177","author":"Y Wan","year":"2022","unstructured":"Wan, Y., Gao, Y., & Hu, Y. (2022). Blockchain application and collaborative innovation in the manufacturing industry: Based on the perspective of social trust. Technological Forecasting and Social Change, 177, 121540.\u00a0https:\/\/doi.org\/10.1016\/j.techfore.2022.121540","journal-title":"Technological Forecasting and Social Change"},{"issue":"4","key":"605_CR245","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1287\/isre.13.4.363.69","volume":"13","author":"Y Wand","year":"2002","unstructured":"Wand, Y., & Weber, R. (2002). Research commentary: Information systems and conceptual modeling\u2014A research agenda. Information Systems Research, 13(4), 363\u2013376.\u00a0https:\/\/doi.org\/10.1287\/isre.13.4.363.69","journal-title":"Information Systems Research"},{"key":"605_CR246","first-page":"1","volume-title":"Americas conference on information systems","author":"W Wang","year":"2018","unstructured":"Wang, W., & Siau, K. (2018). Trusting artificial intelligence in healthcare. Americas Conference on Information Systems (pp. 1\u20131)."},{"key":"605_CR247","doi-asserted-by":"publisher","unstructured":"Wanner, J., Herm, L.-V., Heinrich, K., & Janiesch, C. (2022). The effect of transparency and trust on intelligent system acceptance: Evidence from a user-based study. Electronic Markets, 32(4).\u00a0https:\/\/doi.org\/10.1007\/s12525-022-00593-5","DOI":"10.1007\/s12525-022-00593-5"},{"key":"605_CR248","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S0191-3085(04)26003-8","volume":"26","author":"JM Weber","year":"2004","unstructured":"Weber, J. M., Malhotra, D., & Murnighan, J. K. (2004). Normal acts of irrational trust: Motivated attributions and the trust development process. Research in Organizational Behavior, 26, 75\u2013101.\u00a0https:\/\/doi.org\/10.1016\/S0191-3085(04)26003-8","journal-title":"Research in Organizational Behavior"},{"issue":"3","key":"605_CR249","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s11229-010-9786-3","volume":"177","author":"KP Whyte","year":"2010","unstructured":"Whyte, K. P., & Crease, R. P. (2010). Trust, expertise, and the philosophy of science. Synthese, 177(3), 411\u2013425.\u00a0https:\/\/doi.org\/10.1007\/s11229-010-9786-3","journal-title":"Synthese"},{"key":"605_CR250","first-page":"1","volume-title":"International conference on conceptual modeling","author":"C Woo","year":"2011","unstructured":"Woo, C. (2011). The role of conceptual modeling in managing and changing the business. International Conference on Conceptual Modeling (pp. 1\u201312). Springer."},{"key":"605_CR251","doi-asserted-by":"publisher","DOI":"10.1007\/978-4-431-53936-0","volume-title":"Trust: The evolutionary game of mind and society","author":"T Yamagishi","year":"2011","unstructured":"Yamagishi, T. (2011). Trust: The evolutionary game of mind and society. Springer."},{"key":"605_CR252","doi-asserted-by":"publisher","DOI":"10.1201\/b18612","volume-title":"Artificial superintelligence: A futuristic approach","author":"RV Yampolskiy","year":"2015","unstructured":"Yampolskiy, R. V. (2015). Artificial superintelligence: A futuristic approach. cRc Press."},{"key":"605_CR253","doi-asserted-by":"publisher","unstructured":"Yang, R. & Wibowo, S. (2022) User trust in artificial intelligence: A comprehensive conceptual framework. Electronic Markets, 32(4). https:\/\/doi.org\/10.1007\/s12525-022-00592-6","DOI":"10.1007\/s12525-022-00592-6"},{"issue":"303","key":"605_CR254","first-page":"184","volume":"1","author":"E Yudkowsky","year":"2008","unstructured":"Yudkowsky, E. (2008). Artificial intelligence as a positive and negative factor in global risk. Global Catastrophic Risks, 1(303), 184.","journal-title":"Global Catastrophic Risks"},{"issue":"1","key":"605_CR255","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1177\/0146167204271305","volume":"31","author":"M Yuki","year":"2005","unstructured":"Yuki, M., Maddux, W. W., Brewer, M. B., & Takemura, K. (2005). Cross-cultural differences in relationship-and group-based trust. Personality and Social Psychology Bulletin, 31(1), 48\u201362.\u00a0https:\/\/doi.org\/10.1177\/0146167204271305","journal-title":"Personality and Social Psychology Bulletin"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-022-00605-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12525-022-00605-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-022-00605-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T16:13:23Z","timestamp":1728490403000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12525-022-00605-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,28]]},"references-count":255,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["605"],"URL":"https:\/\/doi.org\/10.1007\/s12525-022-00605-4","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"value":"1019-6781","type":"print"},{"value":"1422-8890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,28]]},"assertion":[{"value":"28 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}