{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:48:19Z","timestamp":1776782899968,"version":"3.51.2"},"reference-count":70,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/05037\/2020"],"award-info":[{"award-number":["UIDB\/05037\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Human Behavior and Emerging Technologies"],"published-print":{"date-parts":[[2022,12,16]]},"abstract":"<jats:p>Recently there has been an increasing demand for technologies (automated and intelligent machines) that brings benefits to organizations and society. Similar to the widespread use of personal computers in the past, today\u2019s needs are towards facilitating human-machine technology appropriation, especially in highly risky and regulated industries like robotics, manufacturing, automation, military, finance, or healthcare. In this context, trust can be used as a critical element to instruct how human-machine interaction should occur. Considering the context-dependency and multidimensional trust, this study seeks to find a way to measure the effects of perceived trust in a collaborative robot (cobot), regardless of its literal credibility as a real person. This article aims at translating, adapting, and validating a Human-Computer Trust Scale (HCTM) in human-robot interaction (HRI) context and its application to cobots. The Human-Robot Interaction Trust Scale (HRITS) involved 239 participants and included eleven items. The 2nd order CFA with a general factor called \u201ctrust\u201d have proven to be empirically robust (<jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:mtext>CFI<\/a:mtext>\n                        <a:mo>=<\/a:mo>\n                        <a:mn>.94<\/a:mn>\n                     <\/a:math>\n                  <\/jats:inline-formula>; <jats:inline-formula>\n                     <c:math xmlns:c=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\">\n                        <c:mtext>TLI<\/c:mtext>\n                        <c:mo>=<\/c:mo>\n                        <c:mn>.93<\/c:mn>\n                     <\/c:math>\n                  <\/jats:inline-formula>; <jats:inline-formula>\n                     <e:math xmlns:e=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M3\">\n                        <e:mtext>SRMR<\/e:mtext>\n                        <e:mo>=<\/e:mo>\n                        <e:mn>.04<\/e:mn>\n                     <\/e:math>\n                  <\/jats:inline-formula>; and <jats:inline-formula>\n                     <g:math xmlns:g=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M4\">\n                        <g:mtext>RMSEA<\/g:mtext>\n                        <g:mo>=<\/g:mo>\n                        <g:mn>.05<\/g:mn>\n                     <\/g:math>\n                  <\/jats:inline-formula>) [<jats:inline-formula>\n                     <i:math xmlns:i=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M5\">\n                        <i:mtext>CR<\/i:mtext>\n                        <i:mo>=<\/i:mo>\n                        <i:mn>.84<\/i:mn>\n                     <\/i:math>\n                  <\/jats:inline-formula>; <jats:inline-formula>\n                     <k:math xmlns:k=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M6\">\n                        <k:mtext>AVE<\/k:mtext>\n                        <k:mo>=<\/k:mo>\n                        <k:mn>.58<\/k:mn>\n                     <\/k:math>\n                  <\/jats:inline-formula>, and <jats:inline-formula>\n                     <m:math xmlns:m=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M7\">\n                        <m:mtext>MaxR<\/m:mtext>\n                        <m:mfenced open=\"(\" close=\")\">\n                           <m:mrow>\n                              <m:mtext>H<\/m:mtext>\n                           <\/m:mrow>\n                        <\/m:mfenced>\n                        <m:mo>=<\/m:mo>\n                        <m:mn>.92<\/m:mn>\n                     <\/m:math>\n                  <\/jats:inline-formula>]; results indicated a good measurement of the general factor trust, and the model satisfied the criteria for measure trust. An analysis of the differences in perceptions of trust by gender was conducted using a <jats:inline-formula>\n                     <q:math xmlns:q=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M8\">\n                        <q:mi>t<\/q:mi>\n                     <\/q:math>\n                  <\/jats:inline-formula>-test. This analysis showed that statistical differences by gender exist (<jats:inline-formula>\n                     <s:math xmlns:s=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M9\">\n                        <s:mi>p<\/s:mi>\n                        <s:mo>=<\/s:mo>\n                        <s:mn>.04<\/s:mn>\n                     <\/s:math>\n                  <\/jats:inline-formula>). This study\u2019s results allowed for a better understanding of trust in HRI, specifically regarding cobots. The validation of a Portuguese scale for trust assessment in HRI can give a valuable contribution to designing collaborative environments between humans and robots.<\/jats:p>","DOI":"10.1155\/2022\/6437441","type":"journal-article","created":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:50:09Z","timestamp":1671238209000},"page":"1-12","source":"Crossref","is-referenced-by-count":42,"title":["A Trust Scale for Human-Robot Interaction: Translation, Adaptation, and Validation of a Human Computer Trust Scale"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8280-9887","authenticated-orcid":true,"given":"Ana","family":"Pinto","sequence":"first","affiliation":[{"name":"University of Coimbra, Centre for Business and Economics Research (CEBER), Faculty of Sciences and Technology, 3030-790 Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5865-1389","authenticated-orcid":true,"given":"S\u00f3nia","family":"Sousa","sequence":"additional","affiliation":[{"name":"University of Tr\u00e1s-os-Montes e Alto Douro (UTAD), Vila Real, Portugal"},{"name":"School of digital technologies, Tallinn University, 10120 Tallinn, Estonia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7193-3615","authenticated-orcid":true,"given":"Ana","family":"Sim\u00f5es","sequence":"additional","affiliation":[{"name":"Instituto de Engenharia de Sistemas e Computadores, Tecnologia e Ci\u00eancia (INESC TEC), 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2777-3244","authenticated-orcid":true,"given":"Joana","family":"Santos","sequence":"additional","affiliation":[{"name":"Environmental Health Scientific Area, School of Health of Polytechnic, Institute of Porto (ESS|P.Porto), LETA\/INEGI, Faculdade de Engenharia, Universidade do Porto, 4200-072 Porto, Portugal"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.2777\/17322"},{"key":"2","volume-title":"European Commission, and Directorate-General for Research and Innovation, Industry 5.0: towards a sustainable, human-centric and resilient European industry","author":"M. Breque","year":"2021"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.1121"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2016.08.001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN.2014.6926329"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1870758"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.4271\/2016-01-0337"},{"key":"8","article-title":"Lightweight robots in manual assembly - best to start simply","author":"W. Bauer","year":"2016"},{"key":"9","article-title":"Guidelines for trust in future ATM systems","volume-title":"A Literature Review","author":"C. Kelly","year":"2003"},{"key":"10","volume-title":"Trustworthy AI Is Human-Centered","author":"I. B. M. Watson","year":"2021"},{"key":"11","volume-title":"Principles on artificial intelligence","author":"OECD","year":"2019"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2020.1741118"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.2759\/346720"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1080\/00140139608964474"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1207\/s15327566ijce0401_04"},{"key":"16","first-page":"6","article-title":"Measuring human-computer trust","volume-title":"11th Australasian conference on information systems","author":"M. Madsen","year":"2000"},{"key":"17","volume-title":"Guidelines for trust in future ATM systems: measures","author":"P. Goillau","year":"2003"},{"key":"18","volume-title":"The Perception and Measurement of Human-Robot Trust","author":"K. Schaefer","year":"2013"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7668-0_10"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-012-0144-0"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1177\/0018720811417254"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1967.tb01454.x"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2015.1070547"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/3173087"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07482-5_13"},{"key":"27","first-page":"127","article-title":"What we really know about antecedents of trust: a critical review of the empirical information systems literature on trust","volume-title":"Psychology of Trust: New Research","author":"M. S\u00f6llner","year":"2013"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/3173386.3176991"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/3434073.3444677"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s11238-007-9043-5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05044-7__3"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"33","first-page":"213","article-title":"Can we trust trust?","volume-title":"Trust: Making and breaking cooperative relations","author":"D. Gambetta","year":"1988"},{"key":"34","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"D. Gambetta","year":"1988"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1656779"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68059-0_3"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/3297121.3297124"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1109069.1109097"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106469"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2020.2991864"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1145\/3171221.3171268"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-020-00703-3"},{"key":"44","article-title":"Robots and robotic devices-safety requirements, part 2: robot systems and integration","author":"ISO\/TC 299, ISO 10218-2","year":"2011"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642616"},{"key":"46","volume-title":"Factorial Survey Experiments","author":"K. Auspurg","year":"2014"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1142\/9789814417358_0006"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1177\/0038038587021001008"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.5220\/0003919102580264"},{"key":"50","volume-title":"Investiga\u00e7\u00e3o por Question\u00e1rio","author":"M. M. Hill","year":"2012","edition":"2nd"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.4103\/sja.SJA_203_17"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1075\/hts.1.thi1"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420087"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.33140\/IJP\/01\/01\/00001"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/9385364"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.5455\/jbh.20160615121755"},{"key":"57","volume-title":"Confirmatory Factor Analysis for Applied Research","author":"T. A. Brown","year":"2015","edition":"2nd"},{"key":"58","volume-title":"Principles and Practice of Structural Equation Modeling","author":"R. B. Kline","year":"2015"},{"key":"59","volume-title":"Using Multivariate Statistics","author":"B. G. Tabachnick","year":"2019","edition":"7th"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1518\/001872097778543886"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25813-8_8"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.4324\/9781315757421"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1080\/13662716.2019.1632695"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372834"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1002\/(sici)1520-6653(199923)13:4<24::aid-dir3>3.0.co;2-o"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2007.10.006"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.4236\/ojbm.2016.41006"},{"key":"68","volume-title":"Confidence not competence: what holds women back from embracing tech in development","author":"C. Tedesco","year":"2019"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.5465\/annals.2018.0057"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.5220\/0010237701610173"}],"container-title":["Human Behavior and Emerging Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/hbet\/2022\/6437441.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/hbet\/2022\/6437441.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/hbet\/2022\/6437441.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:50:25Z","timestamp":1671238225000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/hbet\/2022\/6437441\/"}},"subtitle":[],"editor":[{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":70,"alternative-id":["6437441","6437441"],"URL":"https:\/\/doi.org\/10.1155\/2022\/6437441","relation":{},"ISSN":["2578-1863"],"issn-type":[{"value":"2578-1863","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,16]]}}}