{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:07:38Z","timestamp":1764842858161,"version":"3.37.3"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Trust and Influence Program","award":["21IOE051"],"award-info":[{"award-number":["21IOE051"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/mc.2023.3287563","type":"journal-article","created":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T18:48:12Z","timestamp":1709923692000},"page":"46-58","source":"Crossref","is-referenced-by-count":18,"title":["Human-Centered Trustworthy Framework: A Human\u2013Computer Interaction Perspective"],"prefix":"10.1109","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5865-1389","authenticated-orcid":false,"given":"Sonia","family":"Sousa","sequence":"first","affiliation":[{"name":"School of Digital Technologies, Tallinn University, Tallinn, Estonia"}]},{"given":"David","family":"Lamas","sequence":"additional","affiliation":[{"name":"School of Digital Technologies, Tallinn University, Tallinn, Estonia"}]},{"given":"Jos\u00e9","family":"Cravino","sequence":"additional","affiliation":[{"name":"University of Tr&#x00E1;s-os-Montes e Alto Douro, Vila Real, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3040-9080","authenticated-orcid":false,"given":"Paulo","family":"Martins","sequence":"additional","affiliation":[{"name":"University of Tr&#x00E1;s-os-Montes e Alto Douro, Vila Real, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-019-00931-w"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02904-2_4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-020-00008-1"},{"key":"ref4","first-page":"1","article-title":"How to manage output uncertainty: Targeting the actual end user problem in interactions with AI","volume-title":"Proc. ACM IUI Workshops","author":"Zhang","year":"2021"},{"article-title":"From human-computer interaction to human-AI interaction: New challenges and opportunities for enabling human-centered AI","year":"2021","author":"Xu","key":"ref5"},{"issue":"22","key":"ref6","first-page":"1","article-title":"Smarter together: Why artificial intelligence needs human-centered design","volume-title":"Deloitte Rev.","author":"Guszcza","year":"2018"},{"volume-title":"Trustworthy AI","year":"2023","author":"Watson","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81907-1_3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmz026"},{"issue":"45","key":"ref10","first-page":"146","article-title":"Confiana e tecnologia: Prticas, conceitos e ferramentas","volume":"45","author":"Sousa","year":"2021","journal-title":"Rev. Ibrica Sist. Tecnol. Inf."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/mti4030063"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2138826"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2095478"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5465\/annals.2018.0057"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3419764"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102551"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v4i4.579"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79026-8_14"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85607-6_49"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2196\/33951"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6437441"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420087"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/trex51495.2020.00005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-019-09502-w"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3363384.3363467"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v17i1\/2.13238"},{"volume-title":"Rebooting AI: Building Artificial Intelligence We Can Trust","year":"2019","author":"Marcus","key":"ref27"},{"issue":"1","key":"ref28","first-page":"127","article-title":"Building trust in artificial intelligence","volume":"72","author":"Rossi","year":"2018","journal-title":"J. Int. Affairs"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2020.1741118"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0088-2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3518482"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2070107"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05297-3_17"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ithings\/cpscom.2011.88"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25813-8_8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37285-8_21"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50732-9_30"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1186\/s40660-016-0011-7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s42454-021-00029-z"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/0144929x.2019.1656779"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/hsi49210.2020.9142686"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.21236\/ADA045771"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2307\/259290"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355124"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2643572.2643578"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.654735"},{"volume-title":"Assessment list for trustworthy artificial intelligence (ALTAI) for self-assessment","year":"2021","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/tts.2021.3066209"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.4324\/9780429505379-11"},{"volume-title":"Measuring the User Experience: Collecting, Analyzing, and Presenting Usability Metrics","year":"2013","author":"Albert","key":"ref50"},{"volume-title":"Observing the User Experience: A Practitioners Guide to User Research","year":"2003","author":"Kuniavsky","key":"ref51"},{"volume-title":"Tools for trustworthy AI","year":"2021","key":"ref52"},{"volume-title":"Ethics guidelines for trustworthy AI","year":"2019","key":"ref53"},{"volume-title":"Conceptualizing trust and trustworthiness","year":"2019","author":"Bauer","key":"ref54"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-022-00592-6"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-020-01276-x"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1111\/jbl.12198"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s11238-007-9043-5"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"ref60","first-page":"94","article-title":"Familiarity, confidence, trust: Problems and alternatives","volume-title":"Trust: Making Breaking Cooperative Relations","author":"Luhmann","year":"2000"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.2753\/mis0742-1222260210"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00411"},{"article-title":"Designing trustworthy AI: A human-machine teaming framework to guide development","year":"2019","author":"Smith","key":"ref64"},{"key":"ref65","first-page":"75","article-title":"An agile framework for trustworthy AI","volume-title":"Proc. NeHuAI@ ECAI","author":"Leijnen","year":"2020"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780199288496.003.0004"},{"volume-title":"Privacy by Design in the Age of Big Data","year":"2012","author":"Cavoukian","key":"ref67"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"issue":"44","key":"ref69","first-page":"11","article-title":"Complexity and information overload in society: Why increasing efficiency leads to decreasing?","volume":"1","author":"Heylighen","year":"2002","journal-title":"Inf. Soc."},{"volume-title":"US Senate subpoenas heads of Google, Facebook and Twitter","year":"2020","key":"ref70"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/10461644\/10461710.pdf?arnumber=10461710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T22:39:50Z","timestamp":1710196790000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10461710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":70,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mc.2023.3287563","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}