{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:36:27Z","timestamp":1776108987382,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BMBF","award":["02K18D180"],"award-info":[{"award-number":["02K18D180"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,29]]},"DOI":"10.1145\/3632634.3655884","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T15:05:09Z","timestamp":1716995109000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Augmented Reality, Trust and Technology Malfunctions: An Initial Theory and Empirical Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5728-2625","authenticated-orcid":false,"given":"Bj\u00f6rn","family":"Konopka","sequence":"first","affiliation":[{"name":"TU Dortmund University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9825-7522","authenticated-orcid":false,"given":"Kay","family":"H\u00f6nemann","sequence":"additional","affiliation":[{"name":"TU Dortmund University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0401-287X","authenticated-orcid":false,"given":"Manuel","family":"Wiesche","sequence":"additional","affiliation":[{"name":"TU Dortmund University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Icek Ajzen and M. Fishbein. 1980. Understanding Attitudes and Predicting Social Behavior. Englewood cliffs."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/12460125.2021.1958505"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/259289"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290802121230"},{"key":"e_1_3_2_1_5_1","volume-title":"Tripp","author":"Bies Robert J.","year":"1996","unstructured":"Robert J. Bies and Thomas M. Tripp. 1996. Beyond Distrust: \u201cGetting Even\u201d and the Need for Revenge. In Trust in Organizations: Frontiers of Theory and Research. SAGE Publications, Inc, 2455 Teller Road,\u00a0Thousand Oaks\u00a0California\u00a091320\u00a0United States, 246\u2013260."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2020.08.041"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022243719889336"},{"key":"e_1_3_2_1_8_1","unstructured":"K. Cheng J. Tian T. Kohno and F. Roesner. 2023. Exploring user reactions and mental models towards perceptual manipulation attacks in mixed reality. Usenix Security 18."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800313"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Trust Violation in Electronic Commerce: Customer Concerns and Reactions","volume":"49","author":"Goles T.","year":"2009","unstructured":"T. Goles, S. V. Rao, S. Lee, and J. Warren. 2009. Trust Violation in Electronic Commerce: Customer Concerns and Reactions. Journal of Computer Information Systems 49, 4, 1\u20139.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_2_1_11_1","unstructured":"Joseph F. Hair G. T. M. Hult Christian M. Ringle and Marko Sarstedt. 2022. A primer on partial least squares structural equation modeling (PLS-SEM). SAGE Los Angeles [i 5 pozosta\u0142ych]."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2307\/3033584"},{"key":"e_1_3_2_1_13_1","volume-title":"Rauschnabel","author":"Hein Daniel W. E.","year":"2016","unstructured":"Daniel W. E. Hein and Philipp A. Rauschnabel. 2016. Augmented Reality Smart Glasses and Knowledge Management: A Conceptual Framework for Enterprise Social Networks. In Enterprise Social Networks, Alexander Rossmann, Gerald Stei and Markus Besch, Eds. Springer Fachmedien Wiesbaden, Wiesbaden, 83\u2013109."},{"key":"e_1_3_2_1_14_1","volume-title":"Sinkovics","author":"Henseler J\u00f6rg","year":"2009","unstructured":"J\u00f6rg Henseler, Christian M. Ringle, and Rudolf R. Sinkovics. 2009. The use of partial least squares path modeling in international marketing. In New Challenges to International Marketing. Advances in International Marketing. Emerald Group Publishing Limited, 277\u2013319."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.04.054"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/259293"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"R. M. Kramer. 1999. Trust and distrust in organizations: emerging perspectives enduring questions. Annual review of psychology 50 569\u2013598.","DOI":"10.1146\/annurev.psych.50.1.569"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Johannes Kraus David Scholz Dina Stiegemeier and Martin Baumann. 2020. The More You Know: Trust Dynamics and Calibration in Highly Automated Driving and the Effects of Take-Overs System Malfunction and System Transparency. Human factors 62 5 718\u2013736. DOI: https:\/\/doi.org\/10.1177\/0018720819853686.","DOI":"10.1177\/0018720819853686"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2013.09.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00411"},{"key":"e_1_3_2_1_21_1","volume-title":"See","author":"Lee John D.","year":"2004","unstructured":"John D. Lee and Katrina A. See. 2004. Trust in automation: designing for appropriate reliance. Human factors 46, 1, 50\u201380."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0279231"},{"key":"e_1_3_2_1_23_1","volume-title":"Bunker","author":"Lewicki Roy J.","year":"1996","unstructured":"Roy J. Lewicki and Barbara B. Bunker. 1996. Developing and Maintaining Trust in Work Relationships. In Trust in Organizations: Frontiers of Theory and Research. SAGE Publications, Inc, 2455 Teller Road,\u00a0Thousand Oaks\u00a0California\u00a091320\u00a0United States, 114\u2013139."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.2307\/259288"},{"key":"e_1_3_2_1_25_1","volume-title":"Foundations of Trusted Autonomy, Hussein A","author":"Lewis Michael","unstructured":"Michael Lewis, Katia Sycara, and Phillip Walker. 2018. The Role of Trust in Human-Robot Interaction. In Foundations of Trusted Autonomy, Hussein A. Abbass, Jason Scholz and Darryn J. Reid, Eds. Studies in Systems, Decision and Control. Springer International Publishing, Cham, 135\u2013159."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2008.01.001"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10971-4"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2307\/256727"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872006779166334"},{"key":"e_1_3_2_1_31_1","volume-title":"Encyclopedia of Management.","author":"McKnight D. H.","unstructured":"D. H. McKnight. 2005. Trust in Information Technology. In Encyclopedia of Management. Vol. 7, G. B. Davis, Ed. Blackwell."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2307\/1252308"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/259230"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0229132"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0065"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_3_2_1_39_1","first-page":"1","article-title":"Responses to Trust Violation: A Theoretical Framework","volume":"48","author":"Rao S. V.","year":"2007","unstructured":"S. V. Rao and S. Lee. 2007. Responses to Trust Violation: A Theoretical Framework. Journal of Computer Information Systems 48, 1.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_2_1_40_1","unstructured":"C. Ringle S. Wende and J.-M. Becker. 2022. SmartPLS 4. Retrieved from."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393868"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/1099-1379(200008)21:5<525::AID-JOB40>3.0.CO;2-T"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.4030150306"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/01492063221089897"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2019.106159"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2009.2028320"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00428"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1108\/03090560710773336"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230410"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.54.6.1063"}],"event":{"name":"SIGMIS-CPR '24: 2024 Computers and People Research Conference","location":"Murfreesboro TN USA","acronym":"SIGMIS-CPR '24","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"]},"container-title":["Proceedings of the 2024 Computers and People Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632634.3655884","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632634.3655884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:54Z","timestamp":1750294674000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632634.3655884"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,29]]},"references-count":50,"alternative-id":["10.1145\/3632634.3655884","10.1145\/3632634"],"URL":"https:\/\/doi.org\/10.1145\/3632634.3655884","relation":{},"subject":[],"published":{"date-parts":[[2024,5,29]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}