{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T12:48:02Z","timestamp":1768567682465,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T00:00:00Z","timestamp":1726444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,16]]},"DOI":"10.1145\/3686038.3686045","type":"proceedings-article","created":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T10:20:48Z","timestamp":1726482048000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A risk-based trust framework for assuring the humans in human-machine teaming"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1529-1088","authenticated-orcid":false,"given":"Zena","family":"Assaad","sequence":"first","affiliation":[{"name":"The Australian National University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,9,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.17.11.661"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.23890\/IJAST.vm01is02.0201"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1515\/pjbr-2021-0029"},{"key":"e_1_3_2_1_4_1","volume-title":"Engineering Interactive Computing Systems Conference","author":"Assaad Z.","year":"2022","unstructured":"Assaad, Z., 2022. A Proposed Risk Categorisation Model for Human-Machine Teaming, in: EICS \u201922: Engineering Interactive Computing Systems Conference. Sophia Antipolis, France."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597512.3600205"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Banks E. 2005. Catastrophic Risk. John Wiley & Sons.","DOI":"10.1002\/9781118673492"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250150912"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Barros G. 2010. Herbert A. Simon and the Concept of Rationality: Boundaries and Procedures. Brazilian Journal of Political Economy 30. https:\/\/doi.org\/10.1590\/S0101-31572010000300006","DOI":"10.1590\/S0101-31572010000300006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.11.020"},{"key":"e_1_3_2_1_10_1","volume-title":"Treatise on basic philosophy: Ontology II: A world of systems","author":"Bunge M.A.","unstructured":"Bunge, M.A., 1979. Treatise on basic philosophy: Ontology II: A world of systems. Reidel Publishing Company."},{"key":"e_1_3_2_1_11_1","first-page":"340","volume-title":"International Conference on Autonomous Agents and Multiagent Systems","author":"Cheng M.","year":"2021","unstructured":"Cheng, M., Yin, C., Zhang, J., Nazarian, S., Deshmukh, J., Bogdan, P., 2021. A General Trust Framework for Multi-Agent Systems. Presented at the International Conference on Autonomous Agents and Multiagent Systems, pp. 332\u2013340."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815595"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Chong L. Zhang G. Goucher-Lambert K. Kotovsky K. Cagan J. 2022. Human Confidence in Artificial Intelligence and in Themselves: The Evolution and Impact of Confidence on Adoption of AI Advice. Computers un HNuman Behavior 127. https:\/\/doi.org\/10.1016\/j.chb.2021.107018","DOI":"10.1016\/j.chb.2021.107018"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHMS53169.2021.9582655"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:JOBU.0000040274.23551.1b"},{"key":"e_1_3_2_1_16_1","volume-title":"Systems Engineering Practice","author":"Faulconbridge I.","unstructured":"Faulconbridge, I., Ryan, M.J., 2014. Systems Engineering Practice. Argos Press, Canberra, Australia."},{"key":"e_1_3_2_1_17_1","first-page":"503","volume-title":"Cockpit Automation: Still Struggling to Catch Up\u2026, in: Human Factors in Aviation","author":"Ferris T.","year":"2010","unstructured":"Ferris, T., Sarter, N., Wickens, C.D., 2010. Cockpit Automation: Still Struggling to Catch Up\u2026, in: Human Factors in Aviation. Academic Press, pp. 479\u2013503."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Fiok K. Farahani F.V. Karwowski W. Ahram T. n.d. Explainable artificial intelligence for education and training. he Journal of Defense Modeling and Simulation 19 133\u2013144. https:\/\/doi.org\/10.1177\/15485129211028651","DOI":"10.1177\/15485129211028651"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00146924"},{"key":"e_1_3_2_1_20_1","first-page":"303","volume-title":"Interpersonal Behavior: Communication and Understanding in Relationships.","author":"Gabarro J.J.","unstructured":"Gabarro, J.J., 1978. The Development of Trust, Influence, and Expectations, in: Interpersonal Behavior: Communication and Understanding in Relationships. Englewood Cliffs, NJ: Prentice-Hall, pp. 290\u2013303."},{"key":"e_1_3_2_1_21_1","volume-title":"The Springer Series on Foundations and Applications of Artificial Intelligence","author":"Gill K.S.","unstructured":"Gill, K.S., 1988. Artificial Intelligence and Social Action: Education and Training, in: The Springer Series on Foundations and Applications of Artificial Intelligence. Springer, London."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Gillath O. Ai T. Branicky M.S. Keshmiri S. Davison R.B. Spaulding R. 2021. Attachment and trust in artificial intelligence. Computers in Human Behavior 115. https:\/\/doi.org\/10.1016\/j.chb.2020.106607","DOI":"10.1016\/j.chb.2020.106607"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Hall D.E. 2004. Subjectivity. Taylor & Francis.","DOI":"10.4324\/9780203644072"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/nous.12000"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/251319"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2469\/faj.v60.n6.2669"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/00048409412345881"},{"key":"e_1_3_2_1_28_1","volume-title":"Unmanned Aircraft Systems (UAS) (No. CIR328)","author":"Cir","unstructured":"ICAO, 2011. ICAO Cir 328, Unmanned Aircraft Systems (UAS) (No. CIR328). International Civil Aviation Organization."},{"key":"e_1_3_2_1_29_1","first-page":"96","article-title":"A hierarchical framework to analyze shared control conflicts between human and machine. 13th IFAC Symposium on Analysis","volume":"49","author":"Itoh M.","year":"2016","unstructured":"Itoh, M., Flemisch, F., Abbink, D., 2016. A hierarchical framework to analyze shared control conflicts between human and machine. 13th IFAC Symposium on Analysis, Design and Evaluation of Human-Machine Systems 49, 96\u2013101.","journal-title":"Design and Evaluation of Human-Machine Systems"},{"key":"e_1_3_2_1_30_1","unstructured":"Jakubowski M. Venkatesan R. Yacobi Y. 2010. Quantifying Trust. Cryptology ePrint Archive."},{"key":"e_1_3_2_1_31_1","volume-title":"What is a System? (Student works)","author":"Johnson L.","unstructured":"Johnson, L., 2021. What is a System? (Student works). University of Texas Libraries."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"e_1_3_2_1_33_1","volume-title":"The Unpredictable Species","author":"Lieberman P.","unstructured":"Lieberman, P., 2013. The Unpredictable Species. Princeton University Press."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","unstructured":"Luckcuck M. Farrell M. Dennis Louise.A. Dixon C. Fisher M. 2019. Formal Specification and Verification of Autonomous Robotic Systems: A Survey. ACM Comput. Surv 52. https:\/\/doi.org\/10.1145\/3342355","DOI":"10.1145\/3342355"},{"key":"e_1_3_2_1_35_1","volume-title":"Trust and power","author":"Luhmann N.","unstructured":"Luhmann, N., 2018. Trust and power. John Wiley & Sons."},{"key":"e_1_3_2_1_36_1","volume-title":"Social systems","author":"Luhmann N.","unstructured":"Luhmann, N., 1995. Social systems. Stanford University Press."},{"key":"e_1_3_2_1_37_1","first-page":"1993","article-title":"Trust in artificial intelligence: From a Foundational Trust Framework to emerging research opportunities","volume":"32","author":"Lukyanenko R.","year":"2022","unstructured":"Lukyanenko, R., Maass, W., Storey, V.C., 2022. Trust in artificial intelligence: From a Foundational Trust Framework to emerging research opportunities. The International Journal of Networked Business 32, 1993\u20132020.","journal-title":"The International Journal of Networked Business"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"Lyons J. B. Sycara K. Lewis M. Capiola A. 2021. Human\u2013Autonomy Teaming: Definitions Debates and Directions. Frontiers in Psychology 12. https:\/\/doi.org\/10.3389\/fpsyg.2021.589585","DOI":"10.3389\/fpsyg.2021.589585"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60591-3_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05890-5_21"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75018-3_14"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1518\/107118191786755698"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327108ijap0801_3"},{"key":"e_1_3_2_1_44_1","unstructured":"National Institute of Standards and Technology 2023. Artificial Intelligence Risk Management Framework (AI RMF 1.0) (No. NIST AI 100-1). U.S. Department of Commerce."},{"key":"e_1_3_2_1_45_1","volume-title":"Science and Decisions: Advancing Risk Assessment","author":"National Research Council of the National Academies, 2009.","unstructured":"National Research Council of the National Academies, 2009. Science and Decisions: Advancing Risk Assessment. The National Academic Press, Washington, D.C."},{"key":"e_1_3_2_1_46_1","series-title":"Australian Army Occasional Paper No. No. 7","volume-title":"From Tools to Teammates: Human-Machine Teaming and the Future of Command and Control in the Australian Army","author":"Neads A.","unstructured":"Neads, A., Galbreath, D.J., Farrell, T., 2021. From Tools to Teammates: Human-Machine Teaming and the Future of Command and Control in the Australian Army (Australian Army Occasional Paper No. No. 7). Australian Army Research Centre."},{"key":"e_1_3_2_1_47_1","volume-title":"Springer Handbook of Automation","author":"Nof Y.","unstructured":"Nof, Shimon.Y., 2009. Springer Handbook of Automation, First edition. ed. Springer Berlin, Heidelberg."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwc"},{"key":"e_1_3_2_1_49_1","unstructured":"OED O. 2022. Oxford University Press."},{"key":"e_1_3_2_1_50_1","unstructured":"Parasuraman R. Barnes M. Cosenzo K. 2007. Adaptive Automation for Human-Robot Teaming in Future Command and Control Systems. The International C2 Journal 1 43\u201368."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872097778543886"},{"key":"e_1_3_2_1_52_1","volume-title":"Trust Management","author":"Quercia D.","unstructured":"Quercia, D., Hailes, S., Capra, L., 2006. B-Trust: Bayesian Trust Framework for Pervasive Computing, in: Trust Management. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_53_1","first-page":"322","volume-title":"The Future of Drone Use","author":"Ravich T.","unstructured":"Ravich, T., 2016. A Comparative Global Analysis of Drone Laws: Best Practices and Policies, in: The Future of Drone Use. Springer, pp. 301\u2013322."},{"key":"e_1_3_2_1_54_1","volume-title":"The Morality of Freedom","author":"Raz J.","unstructured":"Raz, J., 1986. The Morality of Freedom. Clarendon Press."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/soc4.12391"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/15027570.2018.1481907"},{"key":"e_1_3_2_1_57_1","first-page":"122","volume-title":"Vigilance and Performance in Automatized Systems","author":"Roscoe A.H.","unstructured":"Roscoe, A.H., 1989. Flight Deck Automation and Pilot Workload, in: Vigilance and Performance in Automatized Systems. Springer, pp. 111\u2013122."},{"key":"e_1_3_2_1_58_1","volume-title":"Algorithms and autonomy: the ethics of automated decision systems","author":"Rubel A.","unstructured":"Rubel, A., Castro, C., Pham, A.K., 2021. Algorithms and autonomy: the ethics of automated decision systems. Cambridge University Press, Cambridge, United Kingdom\u202f; New York, NY."},{"key":"e_1_3_2_1_59_1","series-title":"Pearson series in","volume-title":"Artificial intelligence: a modern approach","author":"Russell S.J.","unstructured":"Russell, S.J., Norvig, P., 2021. Artificial intelligence: a modern approach, Fourth edition. ed, Pearson series in artificial intelligence. Pearson, Hoboken."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v8i4.623"},{"key":"e_1_3_2_1_61_1","unstructured":"Schlosser M. 2019. Agency."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1501434.1501494"},{"key":"e_1_3_2_1_63_1","volume-title":"Human and Computer Control of Undersea Teleoperators (","author":"Sheridan T., B.","unstructured":"Sheridan, T., B., Verplank, W., L., 1978. Human and Computer Control of Undersea Teleoperators (Technical Report), Mechanical Engineering, Massachusetts Institute of Technology. Cambridge, Massachusetts."},{"key":"e_1_3_2_1_64_1","first-page":"18","volume-title":"Utility and Probability. The New Palgrave","author":"Simon H.A.","unstructured":"Simon, H.A., 1990. Bounded Rationality, in: Utility and Probability. The New Palgrave, Palgrave Macmillan, London., pp. 15\u201318."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aju.2013.08.011"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-022-00168-2"},{"key":"e_1_3_2_1_67_1","volume-title":"Computing, and Cooperation","author":"Suchman L.A.","unstructured":"Suchman, L.A., 1990. Cognition, Computing, and Cooperation. Chapter 2: What is Human-Machine Interaction? Ablex Publishing Coporation, Norwood, New Jersey."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1111\/theo.12177"},{"key":"e_1_3_2_1_69_1","volume-title":"RTO HFM Symposium on \u201cThe Role of Humans in Intelligent and Automated Systems,\u201d RTO-MP-088","author":"Tarnowski E.","year":"2002","unstructured":"Tarnowski, E., 2002. Cockpit Automation Philosophy. Presented at the RTO HFM Symposium on \u201cThe Role of Humans in Intelligent and Automated Systems,\u201d RTO-MP-088, Warsaw, Poland."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","unstructured":"Ullrich D. Butz A. Diefenbach S. 2021. The Development of Overtrust: An Empirical Simulation and Psychological Analysis in the Context of Human\u2013Robot Interaction. Frontiers in Robotics and AI 8. https:\/\/doi.org\/10.3389\/frobt.2021.554578","DOI":"10.3389\/frobt.2021.554578"},{"key":"e_1_3_2_1_71_1","unstructured":"von Bertalanffy 1968. General system theory: Foundations development applications. Braziller."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-10-2017-0489"},{"key":"e_1_3_2_1_73_1","volume-title":"Sourcebook of Family Theories and Methods.. A Contextual Approach","author":"Whitchurch G.G.","unstructured":"Whitchurch, G.G., Constantine, L.L., 1993. Systems Theory, in: Sourcebook of Family Theories and Methods.. A Contextual Approach, Edited by P.G. Boss, W.J. Doherty, R. LaRossa, W.R. Schumm, & S.K. Steinmetz. New York: Plenum Press, New York."},{"key":"e_1_3_2_1_74_1","first-page":"461","volume-title":"Human Factors in Aviation","author":"Wiener E.L.","unstructured":"Wiener, E.L., 1988. Cockpit automation, in: Human Factors in Aviation. Academic Press, pp. 433\u2013461."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1080\/1463922X.2016.1260181"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-022-00592-6"}],"event":{"name":"TAS '24: Second International Symposium on Trustworthy Autonomous Systems","location":"Austin TX USA","acronym":"TAS '24"},"container-title":["Proceedings of the Second International Symposium on Trustworthy Autonomous Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686038.3686045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686038.3686045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:50Z","timestamp":1750287230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686038.3686045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,16]]},"references-count":76,"alternative-id":["10.1145\/3686038.3686045","10.1145\/3686038"],"URL":"https:\/\/doi.org\/10.1145\/3686038.3686045","relation":{},"subject":[],"published":{"date-parts":[[2024,9,16]]},"assertion":[{"value":"2024-09-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}