{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T10:38:59Z","timestamp":1779100739511,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T00:00:00Z","timestamp":1638230400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["5091121"],"award-info":[{"award-number":["5091121"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,30]]},"DOI":"10.1145\/3520495.3520525","type":"proceedings-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T22:19:51Z","timestamp":1663280391000},"page":"182-189","source":"Crossref","is-referenced-by-count":17,"title":["Designing Trustworthy User Interfaces"],"prefix":"10.1145","author":[{"given":"Valentin","family":"Zieglmeier","sequence":"first","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Antonia Maria","family":"Lehene","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1016\/j.future.2017.11.026","article-title":"Security, privacy and trust of user-centric solutions","volume":"80","author":"Akram Raja\u00a0Naeem","year":"2018","unstructured":"Raja\u00a0Naeem Akram , Hsiao-Hwa Chen , Javier Lopez , Damien Sauveron , and Laurence\u00a0 T. Yang . 2018 . Security, privacy and trust of user-centric solutions . Future Generation Computer Systems 80 (2018), 417 \u2013 420 . Raja\u00a0Naeem Akram, Hsiao-Hwa Chen, Javier Lopez, Damien Sauveron, and Laurence\u00a0T. Yang. 2018. Security, privacy and trust of user-centric solutions. Future Generation Computer Systems 80 (2018), 417\u2013420.","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904006"},{"key":"e_1_3_2_1_3_1","volume-title":"Ceiling and Threshold of PaaS Tools: The Role of Learnability in Tool Adoption","author":"Alves Rui","unstructured":"Rui Alves and Nuno\u00a0Jardim Nunes . 2016. Ceiling and Threshold of PaaS Tools: The Role of Learnability in Tool Adoption . In Human-Centered and Error-Resilient Systems Development, Cristian Bogdan, Jan Gulliksen, Stefan Sauer, Peter Forbrig, Marco Winckler, Chris Johnson, Philippe Palanque, Regina Bernhaupt, and Filip Kis (Eds.). Springer , Cham ., 335\u2013347. Rui Alves and Nuno\u00a0Jardim Nunes. 2016. Ceiling and Threshold of PaaS Tools: The Role of Learnability in Tool Adoption. In Human-Centered and Error-Resilient Systems Development, Cristian Bogdan, Jan Gulliksen, Stefan Sauer, Peter Forbrig, Marco Winckler, Chris Johnson, Philippe Palanque, Regina Bernhaupt, and Filip Kis (Eds.). Springer, Cham., 335\u2013347."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 33rd ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM","author":"Angulo Julio","year":"2015","unstructured":"Julio Angulo , Simone Fischer-H\u00fcbner , Tobias Pulls , and Erik W\u00e4stlund . 2015 . Usable transparency with the Data Track: a tool for visualizing data disclosures . In Proceedings of the 33rd ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM , 1803\u20131808. Julio Angulo, Simone Fischer-H\u00fcbner, Tobias Pulls, and Erik W\u00e4stlund. 2015. Usable transparency with the Data Track: a tool for visualizing data disclosures. In Proceedings of the 33rd ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 1803\u20131808."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085777.1085780"},{"key":"e_1_3_2_1_6_1","volume-title":"\u00a0Walwanis Nelson","author":"Wheeler Atkinson Beth","year":"2007","unstructured":"Beth F.\u00a0 Wheeler Atkinson , Troy\u00a0 O. Bennett , G.\u00a0 Susanne Bahr , and Melissa M . \u00a0Walwanis Nelson . 2007 . Development of a Multiple Heuristics Evaluation Table (MHET) to Support Software Development and Usability Analysis. In Universal Acess in Human Computer Interaction. Coping with Diversity, Constantine Stephanidis (Ed.). Vol.\u00a04554. Springer , Berlin, Heidelberg, 563\u2013572. Beth F.\u00a0Wheeler Atkinson, Troy\u00a0O. Bennett, G.\u00a0Susanne Bahr, and Melissa M.\u00a0Walwanis Nelson. 2007. Development of a Multiple Heuristics Evaluation Table (MHET) to Support Software Development and Usability Analysis. In Universal Acess in Human Computer Interaction. Coping with Diversity, Constantine Stephanidis (Ed.). Vol.\u00a04554. Springer, Berlin, Heidelberg, 563\u2013572."},{"key":"e_1_3_2_1_7_1","first-page":"170","article-title":"Factors Affecting User Perception of a Spoken Language vs. Textual Search Interface: A Content Analysis","volume":"28","author":"Begany M.","year":"2015","unstructured":"Grace\u00a0 M. Begany , Ning Sa , and Xiaojun Yuan . 2015 . Factors Affecting User Perception of a Spoken Language vs. Textual Search Interface: A Content Analysis . Interacting with Computers 28 , 2 (2015), 170 \u2013 180 . Grace\u00a0M. Begany, Ning Sa, and Xiaojun Yuan. 2015. Factors Affecting User Perception of a Spoken Language vs. Textual Search Interface: A Content Analysis. Interacting with Computers 28, 2 (2015), 170\u2013180.","journal-title":"Interacting with Computers"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Regina Bernhaupt. 2010. Usability and user experience evaluation methods. In Mass Customization for Personalized Communication Environments: Integrating Human Factors Constantinos Mourlas and Panagiotis Germanakos (Eds.). IGI Global Chapter\u00a013 232\u2013243.  Regina Bernhaupt. 2010. Usability and user experience evaluation methods. In Mass Customization for Personalized Communication Environments: Integrating Human Factors Constantinos Mourlas and Panagiotis Germanakos (Eds.). IGI Global Chapter\u00a013 232\u2013243.","DOI":"10.4018\/978-1-60566-260-2.ch013"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Emilie Bigras Marc-Antoine Jutras Sylvain S\u00e9n\u00e9cal Pierre-Majorique L\u00e9ger Chrystel Black Nicolas Robitaille Karine Grande and Christian Hudon. 2018. In AI We Trust: Characteristics Influencing Assortment Planners\u2019 Perceptions of AI Based Recommendation Agents. In HCI in Business Government and Organizations Fiona Fui-Hoon Nah and Bo\u00a0Sophia Xiao (Eds.). Springer Cham. 3\u201316.  Emilie Bigras Marc-Antoine Jutras Sylvain S\u00e9n\u00e9cal Pierre-Majorique L\u00e9ger Chrystel Black Nicolas Robitaille Karine Grande and Christian Hudon. 2018. In AI We Trust: Characteristics Influencing Assortment Planners\u2019 Perceptions of AI Based Recommendation Agents. In HCI in Business Government and Organizations Fiona Fui-Hoon Nah and Bo\u00a0Sophia Xiao (Eds.). Springer Cham. 3\u201316.","DOI":"10.1007\/978-3-319-91716-0_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(00)00029-7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1108\/02635570710719034"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 14th Americas Conference on Information Systems, Vol.\u00a05. 3242\u20133251","author":"Christy","unstructured":"Christy M.\u00a0K. Cheung and Matthew K.\u00a0O. Lee. 2008. Online consumer reviews: Does negative electronic word-of-mouth hurt more? . In Proceedings of the 14th Americas Conference on Information Systems, Vol.\u00a05. 3242\u20133251 . Christy M.\u00a0K. Cheung and Matthew K.\u00a0O. Lee. 2008. Online consumer reviews: Does negative electronic word-of-mouth hurt more?. In Proceedings of the 14th Americas Conference on Information Systems, Vol.\u00a05. 3242\u20133251."},{"key":"e_1_3_2_1_13_1","article-title":"The Effect of Culture on Trust in Automation: Reliability and Workload","volume":"8","author":"Chien Shih-Yi","year":"2018","unstructured":"Shih-Yi Chien , Michael Lewis , Katia Sycara , Jyi-Shane Liu , and Asiye Kumru . 2018 . The Effect of Culture on Trust in Automation: Reliability and Workload . ACM Transactions on Interactive Intelligent Systems 8 , 4 (2018). Shih-Yi Chien, Michael Lewis, Katia Sycara, Jyi-Shane Liu, and Asiye Kumru. 2018. The Effect of Culture on Trust in Automation: Reliability and Workload. ACM Transactions on Interactive Intelligent Systems 8, 4 (2018).","journal-title":"ACM Transactions on Interactive Intelligent Systems"},{"key":"e_1_3_2_1_14_1","volume-title":"Cross-Cultural Design, P.\u00a0L.\u00a0Patrick Rau (Ed.)","author":"Chien Shih-Yi","unstructured":"Shih-Yi Chien , Zhaleh Semnani-Azad , Michael Lewis , and Katia Sycara . 2014. Towards the Development of an Inter-cultural Scale to Measure Trust in Automation . In Cross-Cultural Design, P.\u00a0L.\u00a0Patrick Rau (Ed.) . Springer , Cham ., 35\u201346. Shih-Yi Chien, Zhaleh Semnani-Azad, Michael Lewis, and Katia Sycara. 2014. Towards the Development of an Inter-cultural Scale to Measure Trust in Automation. In Cross-Cultural Design, P.\u00a0L.\u00a0Patrick Rau (Ed.). Springer, Cham., 35\u201346."},{"key":"e_1_3_2_1_15_1","volume-title":"Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems","author":"Constantine L.","year":"2006","unstructured":"Larry\u00a0 L. Constantine . 2006 . Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems . In Advanced Information Systems Engineering, Eric Dubois and Klaus Pohl (Eds.). Springer , Berlin, Heidelberg , 20\u201330. Larry\u00a0L. Constantine. 2006. Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems. In Advanced Information Systems Engineering, Eric Dubois and Klaus Pohl (Eds.). Springer, Berlin, Heidelberg, 20\u201330."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00041-7"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 11th Americas Conference on Information Systems, Vol.\u00a05. AIS, 2419\u20132427","author":"Corritore L.","year":"2005","unstructured":"Cynthia\u00a0 L. Corritore , Robert\u00a0 P. Marble , Susan Wiedenbeck , Beverly Kracher , and Ashwin Chandran . 2005 . Measuring online trust of websites: Credibility, perceived ease of use, and risk . In Proceedings of the 11th Americas Conference on Information Systems, Vol.\u00a05. AIS, 2419\u20132427 . Cynthia\u00a0L. Corritore, Robert\u00a0P. Marble, Susan Wiedenbeck, Beverly Kracher, and Ashwin Chandran. 2005. Measuring online trust of websites: Credibility, perceived ease of use, and risk. In Proceedings of the 11th Americas Conference on Information Systems, Vol.\u00a05. AIS, 2419\u20132427."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2013.03.007"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.08.005"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300835"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, Vol.\u00a02. 561\u2013564","author":"Du Yongqin","year":"2009","unstructured":"Yongqin Du and Jin Zhao . 2009 . An Empirical Study of End-User Trust in a Web Information System . In Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, Vol.\u00a02. 561\u2013564 . Yongqin Du and Jin Zhao. 2009. An Empirical Study of End-User Trust in a Web Information System. In Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, Vol.\u00a02. 561\u2013564."},{"key":"e_1_3_2_1_22_1","first-page":"55","article-title":"How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store","volume":"22","author":"Everard Andrea","year":"2006","unstructured":"Andrea Everard and Dennis\u00a0 F. Galletta . 2006 . How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store . Journal of Management Information Systems 22 , 3 (2006), 55 \u2013 95 . Andrea Everard and Dennis\u00a0F. Galletta. 2006. How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store. Journal of Management Information Systems 22, 3 (2006), 55\u201395.","journal-title":"Journal of Management Information Systems"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2016.2620901"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662240810912747"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807075015"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1140892.1709369"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 1999 SIGCHI Conference on Human Factors in Computing Systems. ACM, 80\u201387","author":"J.","unstructured":"Brian\u00a0 J. Fogg and Hsiang Tseng. 1999. The Elements of Computer Credibility . In Proceedings of the 1999 SIGCHI Conference on Human Factors in Computing Systems. ACM, 80\u201387 . Brian\u00a0J. Fogg and Hsiang Tseng. 1999. The Elements of Computer Credibility. In Proceedings of the 1999 SIGCHI Conference on Human Factors in Computing Systems. ACM, 80\u201387."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1108\/02640470510631245"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(00)00021-9"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 1995 IFIP International Conference on Engineering for Human-Computer Interaction. Springer, 293\u2013306","author":"Gram Christian","year":"1996","unstructured":"Christian Gram . 1996 . A software engineering view of user interface design . In Proceedings of the 1995 IFIP International Conference on Engineering for Human-Computer Interaction. Springer, 293\u2013306 . Christian Gram. 1996. A software engineering view of user interface design. In Proceedings of the 1995 IFIP International Conference on Engineering for Human-Computer Interaction. Springer, 293\u2013306."},{"key":"e_1_3_2_1_33_1","volume-title":"Trust-based decision-making for smart and adaptive environments.User Modeling and User-Adapted Interaction 25","author":"Hammer Stephan","year":"2015","unstructured":"Stephan Hammer , Michael Wi\u00dfner , and Elisabeth Andr\u00e9 . 2015. Trust-based decision-making for smart and adaptive environments.User Modeling and User-Adapted Interaction 25 ( 2015 ), 267\u2013293. Stephan Hammer, Michael Wi\u00dfner, and Elisabeth Andr\u00e9. 2015. Trust-based decision-making for smart and adaptive environments.User Modeling and User-Adapted Interaction 25 (2015), 267\u2013293."},{"key":"e_1_3_2_1_34_1","volume-title":"Can You Trust Your Robot?Ergonomics in Design 19, 3","author":"Hancock A.","year":"2011","unstructured":"Peter\u00a0 A. Hancock , Deborah\u00a0 R. Billings , and Kristin\u00a0 E. Schaefer . 2011. Can You Trust Your Robot?Ergonomics in Design 19, 3 ( 2011 ), 24\u201329. Peter\u00a0A. Hancock, Deborah\u00a0R. Billings, and Kristin\u00a0E. Schaefer. 2011. Can You Trust Your Robot?Ergonomics in Design 19, 3 (2011), 24\u201329."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720811417254"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 2008 SIGCHI Conference on Human Factors in Computing Systems. ACM, 855\u2013864","author":"Hartmann Jan","year":"2008","unstructured":"Jan Hartmann , Antonella De\u00a0Angeli , and Alistair Sutcliffe . 2008 . Framing the User Experience: Information Biases on Website Quality Judgement . In Proceedings of the 2008 SIGCHI Conference on Human Factors in Computing Systems. ACM, 855\u2013864 . Jan Hartmann, Antonella De\u00a0Angeli, and Alistair Sutcliffe. 2008. Framing the User Experience: Information Biases on Website Quality Judgement. In Proceedings of the 2008 SIGCHI Conference on Human Factors in Computing Systems. ACM, 855\u2013864."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1108\/JOSM-11-2016-0299"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 5thInternational Conference on Trust and Trustworthy Computing. Springer, 92\u2013109","author":"Hasan Zahid","year":"2012","unstructured":"Zahid Hasan , Alina Krischkowsky , and Manfred Tscheligi . 2012 . Modelling user-centered-trust (UCT) in software systems: interplay of trust, affect and acceptance model . In Proceedings of the 5thInternational Conference on Trust and Trustworthy Computing. Springer, 92\u2013109 . Zahid Hasan, Alina Krischkowsky, and Manfred Tscheligi. 2012. Modelling user-centered-trust (UCT) in software systems: interplay of trust, affect and acceptance model. In Proceedings of the 5thInternational Conference on Trust and Trustworthy Computing. Springer, 92\u2013109."},{"key":"e_1_3_2_1_39_1","volume-title":"User experience \u2013 a research agenda.Behaviour & Information Technology 25, 2","author":"Hassenzahl Marc","year":"2006","unstructured":"Marc Hassenzahl and Noam Tractinsky . 2006. User experience \u2013 a research agenda.Behaviour & Information Technology 25, 2 ( 2006 ), 91\u201397. Marc Hassenzahl and Noam Tractinsky. 2006. User experience \u2013 a research agenda.Behaviour & Information Technology 25, 2 (2006), 91\u201397."},{"key":"e_1_3_2_1_40_1","first-page":"307","article-title":"Trust in e-Commerce: Evaluating the Impact of Third-Party Seals","volume":"3","author":"Head M.","year":"2002","unstructured":"Milena\u00a0 M. Head and Khaled Hassanein . 2002 . Trust in e-Commerce: Evaluating the Impact of Third-Party Seals . Quarterly Journal of Electronic Commerce 3 , 3 (2002), 307 \u2013 325 . Milena\u00a0M. Head and Khaled Hassanein. 2002. Trust in e-Commerce: Evaluating the Impact of Third-Party Seals. Quarterly Journal of Electronic Commerce 3, 3 (2002), 307\u2013325.","journal-title":"Quarterly Journal of Electronic Commerce"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720814547570"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2013.24"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 21st European Conference on Information Systems. AIS.","author":"Hoffmann Axel","year":"2013","unstructured":"Axel Hoffmann , Holger Hoffmann , and Matthias S\u00f6llner . 2013 . Fostering Initial Trust in Applications - Developing and Evaluating Requirement Patterns for Application Websites . In Proceedings of the 21st European Conference on Information Systems. AIS. Axel Hoffmann, Holger Hoffmann, and Matthias S\u00f6llner. 2013. Fostering Initial Trust in Applications - Developing and Evaluating Requirement Patterns for Application Websites. In Proceedings of the 21st European Conference on Information Systems. AIS."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0631-1"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-010-0212-x"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327566IJCE0401_04"},{"key":"e_1_3_2_1_47_1","volume-title":"Human Experiments in Trust Dynamics","author":"Jonker M.","unstructured":"Catholijn\u00a0 M. Jonker , Joost J.\u00a0P. Schalken , Jan Theeuwes , and Jan Treur . 2004. Human Experiments in Trust Dynamics . In Trust Management, Christian Jensen, Stefan Poslad, and Theo Dimitrakos (Eds.). Springer, Berlin , Heidelberg , 206\u2013220. Catholijn\u00a0M. Jonker, Joost J.\u00a0P. Schalken, Jan Theeuwes, and Jan Treur. 2004. Human Experiments in Trust Dynamics. In Trust Management, Christian Jensen, Stefan Poslad, and Theo Dimitrakos (Eds.). Springer, Berlin, Heidelberg, 206\u2013220."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jit.2000095"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 5th International Conference on Trust and Trustworthy Computing. Springer","author":"Kirlappos Iacovos","year":"2012","unstructured":"Iacovos Kirlappos , M.\u00a0 Angela Sasse , and Nigel Harvey . 2012 . Why Trust Seals Don\u2019t Work: A Study of User Perceptions and Behavior . In Proceedings of the 5th International Conference on Trust and Trustworthy Computing. Springer , Berlin, Heidelberg, 308\u2013324. Iacovos Kirlappos, M.\u00a0Angela Sasse, and Nigel Harvey. 2012. Why Trust Seals Don\u2019t Work: A Study of User Perceptions and Behavior. In Proceedings of the 5th International Conference on Trust and Trustworthy Computing. Springer, Berlin, Heidelberg, 308\u2013324."},{"key":"e_1_3_2_1_50_1","volume-title":"Komiak and Izak Benbasat","author":"Sherrie","year":"2006","unstructured":"Sherrie Y.\u00a0X. Komiak and Izak Benbasat . 2006 . The effects of personalization and familiarity on trust and adoption of recommendation agents.MIS Quarterly 30, 4 (2006), 941\u2013960. Sherrie Y.\u00a0X. Komiak and Izak Benbasat. 2006. The effects of personalization and familiarity on trust and adoption of recommendation agents.MIS Quarterly 30, 4 (2006), 941\u2013960."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2018.1547842"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.12.001"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139208967392"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.06.004"},{"key":"e_1_3_2_1_56_1","volume-title":"Human-Computer Interaction \u2013 INTERACT","author":"Li Yanan","year":"2013","unstructured":"Yanan Li and Yong Wang . 2013. Social Influence from Personalized Recommendations to Trusting Beliefs of Websites: Intermediate Role of Social Presence . In Human-Computer Interaction \u2013 INTERACT 2013 , Paula Kotz\u00e9, Gary Marsden , Gitte Lindgaard, Janet Wesson, and Marco Winckler (Eds.). Springer , Berlin, Heidelberg, 632\u2013639. Yanan Li and Yong Wang. 2013. Social Influence from Personalized Recommendations to Trusting Beliefs of Websites: Intermediate Role of Social Presence. In Human-Computer Interaction \u2013 INTERACT 2013, Paula Kotz\u00e9, Gary Marsden, Gitte Lindgaard, Janet Wesson, and Marco Winckler (Eds.). Springer, Berlin, Heidelberg, 632\u2013639."},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 11thAustralasian Conference on Information Systems. 6\u20138.","author":"Madsen Maria","year":"2000","unstructured":"Maria Madsen and Shirley Gregor . 2000 . Measuring human-computer trust . In Proceedings of the 11thAustralasian Conference on Information Systems. 6\u20138. Maria Madsen and Shirley Gregor. 2000. Measuring human-computer trust. In Proceedings of the 11thAustralasian Conference on Information Systems. 6\u20138."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.05.025"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720811411912"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720812465081"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872008X288574"},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the 2014 International Conference on Human-Centred Software Engineering. 164\u2013181","author":"Mirnig G.","year":"2014","unstructured":"Alexander\u00a0 G. Mirnig , Sandra Troesterer , Elke Beck , and Manfred Tscheligi . 2014 . To trust or not to trust . In Proceedings of the 2014 International Conference on Human-Centred Software Engineering. 164\u2013181 . Alexander\u00a0G. Mirnig, Sandra Troesterer, Elke Beck, and Manfred Tscheligi. 2014. To trust or not to trust. In Proceedings of the 2014 International Conference on Human-Centred Software Engineering. 164\u2013181."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.54.16942"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234775"},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support. 175\u2013178","author":"Oleson E.","year":"2011","unstructured":"Kristin\u00a0 E. Oleson , Deborah\u00a0 R. Billings , Vivien Kocsis , Jessie Y.\u00a0C. Chen , and Peter\u00a0 A. Hancock . 2011 . Antecedents of trust in human-robot collaborations . In Proceedings of the 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support. 175\u2013178 . Kristin\u00a0E. Oleson, Deborah\u00a0R. Billings, Vivien Kocsis, Jessie Y.\u00a0C. Chen, and Peter\u00a0A. Hancock. 2011. Antecedents of trust in human-robot collaborations. In Proceedings of the 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support. 175\u2013178."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.012"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975844"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872097778543886"},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the 22ndInternational Conference on World Wide Web. ACM, 1123\u20131130","author":"Pattanaphanchai Jarutas","year":"2013","unstructured":"Jarutas Pattanaphanchai , Kieron O\u2019Hara , and Wendy Hall . 2013 . Trustworthiness Criteria for Supporting Users to Assess the Credibility of Web Information . In Proceedings of the 22ndInternational Conference on World Wide Web. ACM, 1123\u20131130 . Jarutas Pattanaphanchai, Kieron O\u2019Hara, and Wendy Hall. 2013. Trustworthiness Criteria for Supporting Users to Assess the Credibility of Web Information. In Proceedings of the 22ndInternational Conference on World Wide Web. ACM, 1123\u20131130."},{"key":"e_1_3_2_1_70_1","volume-title":"Designing for human-centered systems: Situational risk as a factor of trust in automation.Proceedings of the Human Factors and Ergonomics Society Annual Meeting 54, 25","author":"Perkins LeeAnn","year":"2010","unstructured":"LeeAnn Perkins , Janet\u00a0 E. Miller , Ali Hashemi , and Gary Burns . 2010. Designing for human-centered systems: Situational risk as a factor of trust in automation.Proceedings of the Human Factors and Ergonomics Society Annual Meeting 54, 25 ( 2010 ), 2130\u20132134. LeeAnn Perkins, Janet\u00a0E. Miller, Ali Hashemi, and Gary Burns. 2010. Designing for human-centered systems: Situational risk as a factor of trust in automation.Proceedings of the Human Factors and Ergonomics Society Annual Meeting 54, 25 (2010), 2130\u20132134."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0323-6"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2007.04.004"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662240110410165"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Sebastian Schnorf Martin Ortlieb and Nikhil Sharma. 2014. Trust Transparency & Control in Inferred User Interest Models. In CHI \u201914 Extended Abstracts on Human Factors in Computing Systems. ACM 2449\u20132454.  Sebastian Schnorf Martin Ortlieb and Nikhil Sharma. 2014. Trust Transparency & Control in Inferred User Interest Models. In CHI \u201914 Extended Abstracts on Human Factors in Computing Systems. ACM 2449\u20132454.","DOI":"10.1145\/2559206.2581141"},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of the 2015 Winter Simulation Conference. IEEE, 1056\u20131067","author":"Serge R.","year":"2015","unstructured":"Stephen\u00a0 R. Serge , Jonathan\u00a0 A. Stevens , and Latika Eifert . 2015 . Make It Usable: Highlighting the Importance of Improving the Intuitiveness and Usability of a Computer-Based Training Simulation . In Proceedings of the 2015 Winter Simulation Conference. IEEE, 1056\u20131067 . Stephen\u00a0R. Serge, Jonathan\u00a0A. Stevens, and Latika Eifert. 2015. Make It Usable: Highlighting the Importance of Improving the Intuitiveness and Usability of a Computer-Based Training Simulation. In Proceedings of the 2015 Winter Simulation Conference. IEEE, 1056\u20131067."},{"key":"e_1_3_2_1_76_1","volume-title":"Proceedings of the 2004 SIGCHI Conference on Human Factors in Computing Systems. ACM, 663\u2013670","author":"Sillence Elizabeth","year":"2004","unstructured":"Elizabeth Sillence , Pam Briggs , Lesley Fishwick , and Peter Harris . 2004 . Trust and Mistrust of Online Health Sites . In Proceedings of the 2004 SIGCHI Conference on Human Factors in Computing Systems. ACM, 663\u2013670 . Elizabeth Sillence, Pam Briggs, Lesley Fishwick, and Peter Harris. 2004. Trust and Mistrust of Online Health Sites. In Proceedings of the 2004 SIGCHI Conference on Human Factors in Computing Systems. ACM, 663\u2013670."},{"key":"e_1_3_2_1_77_1","volume-title":"Proceedings of the 10th Annual Workshop on HCI Research in MIS. AIS, 1\u20135.","author":"S\u00f6llner Matthias","year":"2011","unstructured":"Matthias S\u00f6llner , Axel Hoffmann , Holger Hoffmann , and Jan\u00a0Marco Leimeister . 2011 . Towards a theory of explanation and prediction for the formation of trust in IT artifacts . In Proceedings of the 10th Annual Workshop on HCI Research in MIS. AIS, 1\u20135. Matthias S\u00f6llner, Axel Hoffmann, Holger Hoffmann, and Jan\u00a0Marco Leimeister. 2011. Towards a theory of explanation and prediction for the formation of trust in IT artifacts. In Proceedings of the 10th Annual Workshop on HCI Research in MIS. AIS, 1\u20135."},{"key":"e_1_3_2_1_78_1","volume-title":"Expressive and classical aesthetics: two distinct concepts with highly similar effect patterns in user\u2013artefact interaction.Behaviour & Information Technology 33, 11","author":"Sonderegger Andreas","year":"2014","unstructured":"Andreas Sonderegger , Juergen Sauer , and Janine Eichenberger . 2014. Expressive and classical aesthetics: two distinct concepts with highly similar effect patterns in user\u2013artefact interaction.Behaviour & Information Technology 33, 11 ( 2014 ), 1180\u20131191. Andreas Sonderegger, Juergen Sauer, and Janine Eichenberger. 2014. Expressive and classical aesthetics: two distinct concepts with highly similar effect patterns in user\u2013artefact interaction.Behaviour & Information Technology 33, 11 (2014), 1180\u20131191."},{"key":"e_1_3_2_1_79_1","volume-title":"Proceedings of the 2014 International Conference on Multimedia, Interaction, Design and Innovation. ACM, 1\u20138.","author":"Sousa S\u00f3nia","year":"2014","unstructured":"S\u00f3nia Sousa , Ilya \u0160morgun , David Lamas , and Arman Arakelyan . 2014 . A design space for trust-enabling interaction design . In Proceedings of the 2014 International Conference on Multimedia, Interaction, Design and Innovation. ACM, 1\u20138. S\u00f3nia Sousa, Ilya \u0160morgun, David Lamas, and Arman Arakelyan. 2014. A design space for trust-enabling interaction design. In Proceedings of the 2014 International Conference on Multimedia, Interaction, Design and Innovation. ACM, 1\u20138."},{"key":"e_1_3_2_1_80_1","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting 53","author":"Stanton S.","year":"2009","unstructured":"Nash\u00a0 S. Stanton , Stuart\u00a0 A. Ragsdale , and Ernesto\u00a0 A. Bustamante . 2009 . The Effects of System Technology and Probability Type on Trust, Compliance, and Reliance . Proceedings of the Human Factors and Ergonomics Society Annual Meeting 53 , 18 (2009), 1368\u20131372. Nash\u00a0S. Stanton, Stuart\u00a0A. Ragsdale, and Ernesto\u00a0A. Bustamante. 2009. The Effects of System Technology and Probability Type on Trust, Compliance, and Reliance. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 53, 18 (2009), 1368\u20131372."},{"key":"e_1_3_2_1_81_1","volume-title":"Trust: From Cognition to Conceptual Models and Design","author":"Sutcliffe Alistair","year":"2006","unstructured":"Alistair Sutcliffe . 2006 . Trust: From Cognition to Conceptual Models and Design . In Advanced Information Systems Engineering, Eric Dubois and Klaus Pohl (Eds.). Springer , Berlin, Heidelberg , 3\u201317. Alistair Sutcliffe. 2006. Trust: From Cognition to Conceptual Models and Design. In Advanced Information Systems Engineering, Eric Dubois and Klaus Pohl (Eds.). Springer, Berlin, Heidelberg, 3\u201317."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2005100104"},{"key":"e_1_3_2_1_83_1","unstructured":"Bruce Tognazzini. 2014. First Principles of Interaction Design. https:\/\/asktog.com\/atc\/principles-of-interaction-design\/ Visited on 2020-07-09.  Bruce Tognazzini. 2014. First Principles of Interaction Design. https:\/\/asktog.com\/atc\/principles-of-interaction-design\/ Visited on 2020-07-09."},{"key":"e_1_3_2_1_84_1","volume-title":"The Correlation between Visual Complexity and User Trust in On-line Shopping: Implications for Design","author":"Tseng Kai-Ti","unstructured":"Kai-Ti Tseng and Yuan-Chi Tseng . 2014. The Correlation between Visual Complexity and User Trust in On-line Shopping: Implications for Design . In Human-Computer Interaction. Applications and Services, Masaaki Kurosu (Ed.). Springer , Cham ., 90\u201399. Kai-Ti Tseng and Yuan-Chi Tseng. 2014. The Correlation between Visual Complexity and User Trust in On-line Shopping: Implications for Design. In Human-Computer Interaction. Applications and Services, Masaaki Kurosu (Ed.). Springer, Cham., 90\u201399."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/301353.301402"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.04.003"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00213.x"},{"key":"e_1_3_2_1_88_1","first-page":"1","article-title":"Introducing hat graphs","volume":"4","author":"Witt K.","year":"2019","unstructured":"Jessica\u00a0 K. Witt . 2019 . Introducing hat graphs . Cognitive Research: Principles and Implications 4 , 1(2019), 1 \u2013 17 . Jessica\u00a0K. Witt. 2019. Introducing hat graphs. Cognitive Research: Principles and Implications 4, 1(2019), 1\u201317.","journal-title":"Cognitive Research: Principles and Implications"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2014.04.012"},{"key":"e_1_3_2_1_90_1","volume-title":"Perceived security determinants in e-commerce among Turkish university students.Behaviour & Information Technology 24, 4","author":"Yenisey M.","year":"2005","unstructured":"Mehmet\u00a0 M. Yenisey , A.\u00a0 Ant Ozok , and Gavriel Salvendy . 2005. Perceived security determinants in e-commerce among Turkish university students.Behaviour & Information Technology 24, 4 ( 2005 ), 259\u2013274. Mehmet\u00a0M. Yenisey, A.\u00a0Ant Ozok, and Gavriel Salvendy. 2005. Perceived security determinants in e-commerce among Turkish university students.Behaviour & Information Technology 24, 4 (2005), 259\u2013274."},{"key":"e_1_3_2_1_91_1","article-title":"Brains or Beauty: How to Engender Trust in User-Agent Interactions","volume":"17","author":"Yuksel F.","year":"2016","unstructured":"Beste\u00a0 F. Yuksel , Penny Collisson , and Mary Czerwinski . 2016 . Brains or Beauty: How to Engender Trust in User-Agent Interactions . ACM Transactions on Internet Technology 17 , 2 (2016). Beste\u00a0F. Yuksel, Penny Collisson, and Mary Czerwinski. 2016. Brains or Beauty: How to Engender Trust in User-Agent Interactions. ACM Transactions on Internet Technology 17, 2 (2016).","journal-title":"ACM Transactions on Internet Technology"},{"key":"e_1_3_2_1_92_1","unstructured":"Valentin Zieglmeier and Alexander Pretschner. 2021. Trustworthy transparency by design. arxiv:2103.10769\u00a0[cs.SE]  Valentin Zieglmeier and Alexander Pretschner. 2021. Trustworthy transparency by design. arxiv:2103.10769\u00a0[cs.SE]"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.08.006"}],"event":{"name":"OzCHI '21: 33rd Australian Conference on Human-Computer Interaction","location":"Melbourne VIC Australia","acronym":"OzCHI '21"},"container-title":["33rd Australian Conference on Human-Computer Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3520495.3520525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3520495.3520525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:33Z","timestamp":1750183773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3520495.3520525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,30]]},"references-count":91,"alternative-id":["10.1145\/3520495.3520525","10.1145\/3520495"],"URL":"https:\/\/doi.org\/10.1145\/3520495.3520525","relation":{},"subject":[],"published":{"date-parts":[[2021,11,30]]}}}