{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:33:52Z","timestamp":1772642032069,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000006","name":"ONR","doi-asserted-by":"publisher","award":["N00014-16-1-2892,N00014-18-1-2442,N00014-18-1-2840,N00014-9-1-2119"],"award-info":[{"award-number":["N00014-16-1-2892,N00014-18-1-2442,N00014-18-1-2840,N00014-9-1-2119"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"AFOSR","doi-asserted-by":"publisher","award":["FA9550-18-1-0067"],"award-info":[{"award-number":["FA9550-18-1-0067"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,7]]},"DOI":"10.1109\/hri53351.2022.9889475","type":"proceedings-article","created":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T19:46:56Z","timestamp":1664480816000},"page":"1119-1123","source":"Crossref","is-referenced-by-count":4,"title":["Modeling the Interplay between Human Trust and Monitoring"],"prefix":"10.1109","author":[{"given":"Zahra","family":"Zahedi","sequence":"first","affiliation":[{"name":"School of Computing and AI Arizona State University"}]},{"given":"Sarath","family":"Sreedharan","sequence":"additional","affiliation":[{"name":"School of Computing and AI Arizona State University"}]},{"given":"Mudit","family":"Verma","sequence":"additional","affiliation":[{"name":"School of Computing and AI Arizona State University"}]},{"given":"Subbarao","family":"Kambhampati","sequence":"additional","affiliation":[{"name":"School of Computing and AI Arizona State University"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3359616"},{"key":"ref11","article-title":"Trust-aware planning: Modeling trust evolution in longitudinal human-robot interaction","author":"zahedi","year":"2021","journal-title":"XAIP and PlanRob workshops at ICAPS"},{"key":"ref12","author":"cain","year":"2016","journal-title":"Trust and complacency in cyber security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/0018720815581940"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963172"},{"key":"ref15","article-title":"Design for interpretability","author":"kulkarni","year":"2019","journal-title":"ICAPS Workshop on Explainable AI Planning (XAIP)"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"55e","DOI":"10.7717\/peerj-cs.55","article-title":"Probabilistic program-ming in python using pymc3","volume":"2","author":"salvatier","year":"2016","journal-title":"PeerJ Computer Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"ref3","first-page":"116","article-title":"Complacency: Is the term useful for air safety","volume":"117","author":"wiener","year":"1981","journal-title":"Proceedings of the 26th Corporate Aviation Safety Seminar"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/1071181321651309"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2018.03.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/00140139408964957"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3371382.3378262"},{"key":"ref2","author":"hurst","year":"1982","journal-title":"Pilot Error The Human Factors"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720810376055"},{"key":"ref9","article-title":"To monitor or to trust: observing robot's behavior based on a game-theoretic model of trust","author":"sengupta","year":"2019","journal-title":"proc Trust Workshop at AAMAS2006"}],"event":{"name":"2022 17th ACM\/IEEE International Conference on Human-Robot Interaction (HRI)","location":"Sapporo, Japan","start":{"date-parts":[[2022,3,7]]},"end":{"date-parts":[[2022,3,10]]}},"container-title":["2022 17th ACM\/IEEE International Conference on Human-Robot Interaction (HRI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9889327\/9889305\/09889475.pdf?arnumber=9889475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T23:04:58Z","timestamp":1667516698000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9889475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/hri53351.2022.9889475","relation":{},"subject":[],"published":{"date-parts":[[2022,3,7]]}}}