{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:07:56Z","timestamp":1768014476538,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2232653, CNS-2426397"],"award-info":[{"award-number":["CNS-2232653, CNS-2426397"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Google PSS Faculty Award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1145\/3708359.3712125","type":"proceedings-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:50:34Z","timestamp":1742388634000},"page":"1016-1031","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Mental Models of Generative AI Chatbot Ecosystems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0995-4710","authenticated-orcid":false,"given":"Xingyi","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, Virginia, USA,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6886-294X","authenticated-orcid":false,"given":"Xiaozheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburgh, Virginia, USA,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5108-0181","authenticated-orcid":false,"given":"Sunyup","family":"Park","sequence":"additional","affiliation":[{"name":"College of Information Studies, University of Maryland, College Park, Maryland, USA,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7900-9265","authenticated-orcid":false,"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, Virginia, USA,"}]}],"member":"320","published-online":{"date-parts":[[2025,3,24]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE security & privacy 3 1 (2005) 26\u201333.","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"crossref","unstructured":"Eleni Adamopoulou and Lefteris Moussiades. 2020. Chatbots: History technology and applications. Machine Learning with Applications 2 (2020) 100006.","DOI":"10.1016\/j.mlwa.2020.100006"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"David Baidoo-Anu and Leticia\u00a0Owusu Ansah. 2023. Education in the era of generative artificial intelligence (AI): Understanding the potential benefits of ChatGPT in promoting teaching and learning. Journal of AI 7 1 (2023) 52\u201362.","DOI":"10.61969\/jai.1337500"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.747"},{"key":"e_1_3_3_3_7_2","volume-title":"Transforming qualitative information: Thematic analysis and code development","author":"Boyatzis Richard\u00a0E","year":"1998","unstructured":"Richard\u00a0E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage."},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","unstructured":"danah boyd and Eszter Hargittai. 2010. Facebook Privacy Settings: Who Cares? First Monday 15 (07 2010). 10.5210\/fm.v15i8.3086","DOI":"10.5210\/fm.v15i8.3086"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","unstructured":"Cristian Bravo-Lillo Lorrie\u00a0Faith Cranor Julie Downs and Saranga Komanduri. 2011. Bridging the Gap in Computer Security Warnings: A Mental Model Approach. IEEE Security and Privacy 9 2 (2011) 18\u201326. 10.1109\/MSP.2010.198","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"L\u00a0Jean Camp. 2009. Mental models of privacy and security. IEEE Technology and society magazine 28 3 (2009) 37\u201346.","DOI":"10.1109\/MTS.2009.934142"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"publisher","unstructured":"L.\u00a0Jean Camp. 2009. Mental models of privacy and security. IEEE Technology and Society Magazine 28 3 (2009) 37\u201346. 10.1109\/MTS.2009.934142","DOI":"10.1109\/MTS.2009.934142"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","unstructured":"Fred\u00a0H. Cate. 2010. The Limits of Notice and Choice. IEEE Security and Privacy 8 2 (2010) 59\u201362. 10.1109\/MSP.2010.84","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_3_3_3_13_2","unstructured":"Benjamin Cheatham Kia Javanmardian and Hamid Samandari. 2019. Confronting the risks of artificial intelligence. McKinsey Quarterly 2 38 (2019) 1\u20139."},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Chaoran Chen Daodao Zhou Yanfang Ye Toby Jia-jun Li and Yaxing Yao. 2025. CLEAR: Towards Contextual LLM-Empowered Privacy Policy Analysis and Risk Generation for Large Language Model Applications. 30th International Conference on Intelligent User Interfaces (2025).","DOI":"10.1145\/3708359.3712156"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"crossref","unstructured":"Yang Cheng and Hua Jiang. 2020. How do AI-driven chatbots impact user experience? Examining gratifications perceived privacy risk satisfaction loyalty and continued use. Journal of Broadcasting & Electronic Media 64 4 (2020) 592\u2013614.","DOI":"10.1080\/08838151.2020.1834296"},{"key":"e_1_3_3_3_16_2","unstructured":"Lorrie\u00a0Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. & High Tech. L. 10 (2012) 273."},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"crossref","unstructured":"Robert Dale. 2016. The return of the chatbots. Natural Language Engineering 22 5 (2016) 811\u2013817.","DOI":"10.1017\/S1351324916000243"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"crossref","unstructured":"Fiona Fui-Hoon\u00a0Nah Ruilin Zheng Jingyuan Cai Keng Siau and Langtao Chen. 2023. Generative AI and ChatGPT: Applications challenges and AI-human collaboration. 277\u2013304\u00a0pages.","DOI":"10.1080\/15228053.2023.2233814"},{"key":"e_1_3_3_3_20_2","unstructured":"Artur\u00a0d\u2019Avila Garcez Sebastian Bader Howard Bowman Luis\u00a0C Lamb Leo de Penning BV Illuminoo Hoifung Poon and COPPE\u00a0Gerson Zaverucha. 2022. Neural-symbolic learning and reasoning: A survey and interpretation. Neuro-Symbolic Artificial Intelligence: The State of the Art 342 1 (2022) 327."},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"crossref","unstructured":"Ella Glikson and Anita\u00a0Williams Woolley. 2020. Human trust in artificial intelligence: Review of empirical research. Academy of Management Annals 14 2 (2020) 627\u2013660.","DOI":"10.5465\/annals.2018.0057"},{"key":"e_1_3_3_3_22_2","unstructured":"Google. 2023. Bard Extention. (2023). https:\/\/support.google.com\/gemini"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501985"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445387"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","unstructured":"Philipp Hacker Andreas Engel and Marco Mauer. 2023. Regulating ChatGPT and Other Large Generative AI Models. Association for Computing Machinery New York NY USA. 10.1145\/3593013.3594067","DOI":"10.1145\/3593013.3594067"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39540-7_3"},{"key":"e_1_3_3_3_28_2","unstructured":"Philip\u00a0N Johnson-Laird Vittorio Girotto and Paolo Legrenzi. 1998. Mental models: a gentle guide for outsiders. Sistemi Intelligenti 9 68 (1998) 33."},{"key":"e_1_3_3_3_29_2","first-page":"39","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 39\u201352. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/kang"},{"key":"e_1_3_3_3_30_2","first-page":"39","volume-title":"Eleventh symposium on usable privacy and security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. { \u201cMy} data just goes { Everywhere:\u201d} user mental models of the internet and implications for privacy and security. In Eleventh symposium on usable privacy and security (SOUPS 2015). 39\u201352."},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_3_32_2","unstructured":"Ku\u00a0Chhaya\u00a0A Khanzode and Ravindra\u00a0D Sarode. 2020. Advantages and disadvantages of artificial intelligence and machine learning: A literature review. International Journal of Library & Information Science (IJLIS) 9 1 (2020) 3."},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/VL\/HCC51201.2021.9576440"},{"key":"e_1_3_3_3_34_2","first-page":"437","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Kitkowska Agnieszka","year":"2020","unstructured":"Agnieszka Kitkowska, Mark Warner, Yefim Shulman, Erik W\u00e4stlund, and Leonardo\u00a0A. Martucci. 2020. Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 437\u2013456. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/kitkowska"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519004"},{"key":"e_1_3_3_3_36_2","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Knijnenburg Bart","year":"2016","unstructured":"Bart Knijnenburg and David Cherry. 2016. Comics as a medium for privacy notices. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)."},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"crossref","unstructured":"Tu Le Zixin Wang Danny Huang Yaxing Yao and Yuan Tian. 2024. Towards Real-time Voice Interaction Data Collection Monitoring and Ambient Light Privacy Notification for Voice-controlled Services. Symposium on Usable Security and Privacy (USEC) 2024.","DOI":"10.14722\/usec.2024.23039"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642116"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","unstructured":"Alexandra Mai Leonard Guelmino Katharina Pfeffer Edgar Weippl and Katharina Krombholz. 2022. Mental Models Of the Internet And Its Online Risks: Children And Their Parent(s). Springer-Verlag Berlin Heidelberg. 10.1007\/978-3-031-05563-8_4","DOI":"10.1007\/978-3-031-05563-8_4"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201323.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/CONIT51480.2021.9498508"},{"key":"e_1_3_3_3_42_2","unstructured":"Meta. 2024. Meet Your New Assistant: Meta AI Built With Llama 3. https:\/\/about.fb.com\/news\/2024\/04\/meet-your-new-assistant-meta-ai-built-with-llama-3\/. Accessed: 2024-06-01."},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Microsoft. 2023. Announcing Microsoft Copilot: Your Everyday AI Companion. https:\/\/blogs.microsoft.com\/blog\/2023\/09\/21\/announcing-microsoft-copilot-your-everyday-ai-companion\/. Accessed: 2024-06-01.","DOI":"10.1007\/979-8-8688-0419-9_2"},{"key":"e_1_3_3_3_44_2","unstructured":"Microsoft. 2024. Bringing the Full Power of Copilot to More People and Businesses. https:\/\/blogs.microsoft.com\/blog\/2024\/01\/01\/bringing-the-full-power-of-copilot-to-more-people-and-businesses\/. Accessed: 2024-06-01."},{"key":"e_1_3_3_3_45_2","unstructured":"Microsoft. 2024. Introducing Copilot for Microsoft 365. https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2024\/01\/01\/introducing-copilot-for-microsoft-365\/. Accessed: 2024-06-01."},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","unstructured":"Neville Moray. 1998. Identifying mental models of complex human\u2013machine systems. International Journal of Industrial Ergonomics 22 4 (1998) 293\u2013297. 10.1016\/S0169-8141(97)00080-2","DOI":"10.1016\/S0169-8141(97)00080-2"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503719"},{"key":"e_1_3_3_3_48_2","unstructured":"Meenakshi Nadimpalli. 2017. Artificial intelligence risks and benefits. International Journal of Innovative Research in Science Engineering and Technology 6 6 (2017)."},{"key":"e_1_3_3_3_49_2","volume-title":"Proc. of the 1st IEEE European Symposium on Security and Privacy","author":"Naiakshina Alena","year":"2016","unstructured":"Alena Naiakshina, Anastasia Danilova, Sergej Dechand, Kat Krol, M\u00a0Angela Sasse, and Matthew Smith. 2016. Poster: Mental models\u2013User understanding of messaging and encryption. In Proc. of the 1st IEEE European Symposium on Security and Privacy."},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"crossref","unstructured":"Lumini\u021ba Nicolescu and Monica\u00a0Teodora Tudorache. 2022. Human-computer interaction in customer service: the experience with AI chatbots\u2014a systematic literature review. Electronics 11 10 (2022) 1579.","DOI":"10.3390\/electronics11101579"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"crossref","unstructured":"Amin\u00a0Heyrani Nobari Muhammad\u00a0Fathy Rashad and Faez Ahmed. 2021. Creativegan: Editing generative adversarial networks for creative design synthesis. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2103.06242 (2021).","DOI":"10.1115\/DETC2021-68103"},{"key":"e_1_3_3_3_52_2","unstructured":"OpenAI. 2023. ChatGPT Plugins. (2023). https:\/\/openai.com\/index\/chatgpt-plugins"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409662"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Joel\u00a0R Reidenberg Travis Breaux Lorrie\u00a0Faith Cranor Brian French Amanda Grannis James\u00a0T Graves Fei Liu Aleecia McDonald Thomas\u00a0B Norton Rohan Ramanath et\u00a0al. 2015. Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding. Berkeley Tech. LJ 30 (2015) 39.","DOI":"10.2139\/ssrn.2418297"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"crossref","unstructured":"Wiebke Reim Josef \u00c5str\u00f6m and Oliver Eriksson. 2020. Implementation of artificial intelligence (AI): a roadmap for business model innovation. AI 1 2 (2020) 11.","DOI":"10.3390\/ai1020011"},{"key":"e_1_3_3_3_56_2","first-page":"0","volume-title":"Proceedings of the European Conference on Computer Vision (ECCV) Workshops","author":"Sbai Othman","year":"2018","unstructured":"Othman Sbai, Mohamed Elhoseiny, Antoine Bordes, Yann LeCun, and Camille Couprie. 2018. Design: Design inspiration from generative networks. In Proceedings of the European Conference on Computer Vision (ECCV) Workshops. 0\u20130."},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","unstructured":"Florian Schaub Rebecca Balebako and Lorrie\u00a0Faith Cranor. 2017. Designing Effective Privacy Notices and Controls. IEEE Internet Computing 21 3 (2017) 70\u201377. 10.1109\/MIC.2017.75","DOI":"10.1109\/MIC.2017.75"},{"key":"e_1_3_3_3_58_2","first-page":"1","volume-title":"Eleventh symposium on usable privacy and security (SOUPS 2015)","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam\u00a0L Durity, and Lorrie\u00a0Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh symposium on usable privacy and security (SOUPS 2015). 1\u201317."},{"key":"e_1_3_3_3_59_2","unstructured":"Harsh Shivam. 2024. Meta goes after OpenAI Microsoft Google with Llama 3 AI model: Details. Business Standard (2024). https:\/\/www.business-standard.com\/technology\/tech-news\/meta-goes-after-openai-microsoft-google-with-llama-3-ai-model-details-124041900368_1.html Accessed: 2024-06-01."},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502137"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","unstructured":"Andrew Thatcher and Mike Greyling. 1998. Mental models of the Internet. International Journal of Industrial Ergonomics 22 4 (1998) 299\u2013305. 10.1016\/S0169-8141(97)00081-4","DOI":"10.1016\/S0169-8141(97)00081-4"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"crossref","unstructured":"Quentin Vanhaelen Yen-Chu Lin and Alex Zhavoronkov. 2020. The advent of generative chemistry. ACS Medicinal Chemistry Letters 11 8 (2020) 1496\u20131505.","DOI":"10.1021\/acsmedchemlett.0c00088"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"crossref","unstructured":"Kuang-Wen Wu Shaio\u00a0Yan Huang David\u00a0C Yen and Irina Popova. 2012. The effect of online privacy policy on consumer privacy concern and trust. Computers in human behavior 28 3 (2012) 889\u2013897.","DOI":"10.1016\/j.chb.2011.12.008"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"crossref","unstructured":"Yaxing Yao Justin\u00a0Reed Basdeo Oriana\u00a0Rosata Mcdonough and Yang Wang. 2019. Privacy perceptions and designs of bystanders in smart homes. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201324.","DOI":"10.1145\/3359161"},{"key":"e_1_3_3_3_68_2","unstructured":"Yaxing Yao Yun Huang and Yang Wang. 2019. Unpacking People\u2019s Understandings of Bluetooth Beacon Systems-A Location-Based IoT Technology. (2019)."},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998316"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025907"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"crossref","unstructured":"Shikun Zhang Yuanyuan Feng Yaxing Yao Lorrie\u00a0Faith Cranor and Norman Sadeh. 2022. How usable are ios app privacy labels? Proceedings on Privacy Enhancing Technologies (2022).","DOI":"10.56553\/popets-2022-0106"},{"key":"e_1_3_3_3_72_2","unstructured":"Zhiping Zhang Michelle Jia Bingsheng Yao Sauvik Das Ada Lerner Dakuo Wang Tianshi Li et\u00a0al. 2023. \" It\u2019s a Fair Game\u201d or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.11653 (2023)."},{"key":"e_1_3_3_3_73_2","unstructured":"Jianlong Zhou Heimo M\u00fcller Andreas Holzinger and Fang Chen. 2023. Ethical ChatGPT: Concerns challenges and commandments. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2305.10646 (2023)."},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"crossref","unstructured":"Jakub Z\u0142otowski Diane Proudfoot Kumar Yogeeswaran and Christoph Bartneck. 2015. Anthropomorphism: opportunities and challenges in human\u2013robot interaction. International journal of social robotics 7 (2015) 347\u2013360.","DOI":"10.1007\/s12369-014-0267-6"}],"event":{"name":"IUI '25: 30th International Conference on Intelligent User Interfaces","location":"Cagliari Italy","acronym":"IUI '25","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 30th International Conference on Intelligent User Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708359.3712125","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708359.3712125","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708359.3712125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:06Z","timestamp":1750298226000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708359.3712125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":73,"alternative-id":["10.1145\/3708359.3712125","10.1145\/3708359"],"URL":"https:\/\/doi.org\/10.1145\/3708359.3712125","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]},"assertion":[{"value":"2025-03-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}