{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T12:35:47Z","timestamp":1771677347694,"version":"3.50.1"},"reference-count":90,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T00:00:00Z","timestamp":1675123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Trust and Influence Programme","award":["FA8655-22-1-7051"],"award-info":[{"award-number":["FA8655-22-1-7051"]}]},{"name":"Trust and Influence Programme","award":["964220"],"award-info":[{"award-number":["964220"]}]},{"name":"European Office of Aerospace Research and Development","award":["FA8655-22-1-7051"],"award-info":[{"award-number":["FA8655-22-1-7051"]}]},{"name":"European Office of Aerospace Research and Development","award":["964220"],"award-info":[{"award-number":["964220"]}]},{"name":"US Air Force Office of Scientific Research","award":["FA8655-22-1-7051"],"award-info":[{"award-number":["FA8655-22-1-7051"]}]},{"name":"US Air Force Office of Scientific Research","award":["964220"],"award-info":[{"award-number":["964220"]}]},{"name":"AI-Mind","award":["FA8655-22-1-7051"],"award-info":[{"award-number":["FA8655-22-1-7051"]}]},{"name":"AI-Mind","award":["964220"],"award-info":[{"award-number":["964220"]}]},{"name":"European Union\u2019s Horizon 2020 research and innovation programme","award":["FA8655-22-1-7051"],"award-info":[{"award-number":["FA8655-22-1-7051"]}]},{"name":"European Union\u2019s Horizon 2020 research and innovation programme","award":["964220"],"award-info":[{"award-number":["964220"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["MTI"],"abstract":"<jats:p>The Internet revolution in 1990, followed by the data-driven and information revolution, has transformed the world as we know it. Nowadays, what seam to be 10 to 20 years ago, a science fiction idea (i.e., machines dominating the world) is seen as possible. This revolution also brought a need for new regulatory practices where user trust and artificial Intelligence (AI) discourse has a central role. This work aims to clarify some misconceptions about user trust in AI discourse and fight the tendency to design vulnerable interactions that lead to further breaches of trust, both real and perceived. Findings illustrate the lack of clarity in understanding user trust and its effects on computer science, especially in measuring user trust characteristics. It argues for clarifying those notions to avoid possible trust gaps and misinterpretations in AI adoption and appropriation.<\/jats:p>","DOI":"10.3390\/mti7020013","type":"journal-article","created":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T01:36:59Z","timestamp":1675215419000},"page":"13","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Challenges and Trends in User Trust Discourse in AI Popularity"],"prefix":"10.3390","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5865-1389","authenticated-orcid":false,"given":"Sonia","family":"Sousa","sequence":"first","affiliation":[{"name":"School of Digital Technologies, Tallinn University, Narva Mnt 25, 10120 Tallinn, Estonia"},{"name":"Escola de Ci\u00eancias e Tecnologia, Universidade de Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"},{"name":"INESC TEC-Institute for Systems and Computer Engineering, Technology and Science, 4000-008 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5376-6128","authenticated-orcid":false,"given":"Jos\u00e9","family":"Cravino","sequence":"additional","affiliation":[{"name":"Escola de Ci\u00eancias e Tecnologia, Universidade de Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"},{"name":"CIDTFF\u2014Centro de Investiga\u00e7\u00e3o em Did\u00e1tica e Tecnologia na Forma\u00e7\u00e3o de Formadores, Universidade de Aveiro, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3040-9080","authenticated-orcid":false,"given":"Paulo","family":"Martins","sequence":"additional","affiliation":[{"name":"Escola de Ci\u00eancias e Tecnologia, Universidade de Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"},{"name":"INESC TEC-Institute for Systems and Computer Engineering, Technology and Science, 4000-008 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1504\/IJIEM.2010.035624","article-title":"Information security and privacy in healthcare: Current state of research","volume":"6","author":"Appari","year":"2010","journal-title":"Int. J. Internet Enterp. Manag."},{"key":"ref_2","unstructured":"Oper, T., and Sousa, S. (2020). HCI International 2020-Posters: 22nd International Conference, HCII 2020, Copenhagen, Denmark, 19\u201324 July 2020, Proceedings, Part III 22, Springer International Publishing."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"e33951","DOI":"10.2196\/33951","article-title":"Modeling Trust in COVID-19 Contact-Tracing Apps Using the Human-Computer Trust Scale: Online Survey Study","volume":"9","author":"Sousa","year":"2022","journal-title":"JMIR Hum. Factors"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s42454-021-00029-z","article-title":"Factors influencing content credibility in Facebook\u2019s news feed","volume":"3","author":"Sousa","year":"2021","journal-title":"Hum.-Intell. Syst. Integr."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1093\/jcmc\/zmz026","article-title":"Rise of machine agency: A framework for studying the psychology of human\u2013AI interaction (HAII)","volume":"25","author":"Sundar","year":"2020","journal-title":"J. Comput.-Mediat. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"McCarthy, J. (2007). What Is Artificial Intelligence?, Springer.","DOI":"10.1145\/1283920.1283926"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/201977.201989","article-title":"A modern, agent-oriented approach to introductory artificial intelligence","volume":"6","author":"Russell","year":"1995","journal-title":"Acm Sigart Bull."},{"key":"ref_8","unstructured":"Xu, W., Dainoff, M.J., Ge, L., and Gao, Z. (2021). From Human-Computer Interaction to Human-AI Interaction: New Challenges and Opportunities for Enabling Human-Centered AI. arXiv."},{"key":"ref_9","unstructured":"WIRED (2022, December 06). AI Needs Human-Centered Design. Available online: https:\/\/www.wired.com\/brandlab\/2018\/05\/ai-needs-human-centered-design\/."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s43681-020-00008-1","article-title":"Lessons learned from AI ethics principles for future actions","volume":"1","author":"Hickok","year":"2021","journal-title":"AI Ethics"},{"key":"ref_11","unstructured":"Watson, I. (2022, December 06). Trustworthy AI Research. Available online: https:\/\/research.ibm.com\/topics\/trustworthy-ai."},{"key":"ref_12","unstructured":"Floridi, L., Cowls, J., Beltrametti, M., Chatila, R., Chazerand, P., Dignum, V., Luetge, C., Madelin, R., Pagallo, U., and Rossi, F. (2021). Ethics, Governance, and Policies in Artificial Intelligence, Springer."},{"key":"ref_13","unstructured":"Bryson, J.J. (2020). The Oxford Handbook of Ethics of AI, Oxford University Press."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3419764","article-title":"Bridging the gap between ethics and practice: Guidelines for reliable, safe, and trustworthy Human-Centered AI systems","volume":"10","author":"Shneiderman","year":"2020","journal-title":"ACM Trans. Interact. Intell. Syst. (TiiS)"},{"key":"ref_15","unstructured":"Zhang, Z.T., and Hu\u00dfmann, H. (2021, January 13\u201317). How to Manage Output Uncertainty: Targeting the Actual End User Problem in Interactions with AI. Proceedings of the IUI Workshops, College Station, TX, USA."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1080\/10447318.2020.1741118","article-title":"Human-centered artificial intelligence: Reliable, safe & trustworthy","volume":"36","author":"Shneiderman","year":"2020","journal-title":"Int. J. Hum. Interact."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1007\/s00146-019-00931-w","article-title":"In AI we trust? Perceptions about automated decision-making by artificial intelligence","volume":"35","author":"Araujo","year":"2020","journal-title":"AI Soc."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lopes, A.G. (2021, January 15\u201316). HCI Four Waves within Different Interaction Design Examples. Proceedings of the IFIP Working Conference on Human Work Interaction Design, Beijing, China.","DOI":"10.1007\/978-3-031-02904-2_4"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"627","DOI":"10.5465\/annals.2018.0057","article-title":"Human trust in artificial intelligence: Review of empirical research","volume":"14","author":"Glikson","year":"2020","journal-title":"Acad. Manag. Ann."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ajenaghughrure, I.B., Sousa, S.D.C., and Lamas, D. (2020). Measuring Trust with Psychophysiological Signals: A Systematic Mapping Study of Approaches Used. Multimodal Technol. Interact., 4.","DOI":"10.3390\/mti4030063"},{"key":"ref_21","first-page":"146","article-title":"Confian\u00e7a e tecnologia: Pr\u00e1ticas, conceitos e ferramentas","volume":"45","author":"Sousa","year":"2021","journal-title":"Rev. Ib\u00e9rica Sist. Tecnol. Informa\u00c7"},{"key":"ref_22","first-page":"1095","article-title":"A systematic literature review of user trust in AI-enabled systems: An HCI perspective","volume":"38","author":"Bach","year":"2022","journal-title":"Int. J. Hum. Interact."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"6814","DOI":"10.1109\/TVT.2018.2822762","article-title":"Humanlike driving: Empirical decision-making system for autonomous vehicles","volume":"67","author":"Li","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MAHC.2006.70","article-title":"Remembering the office of the future: The origins of word processing and office automation","volume":"28","author":"Haigh","year":"2006","journal-title":"IEEE Ann. Hist. Comput."},{"key":"ref_25","unstructured":"Harrison, S., Tatar, D., and Sengers, P. (May, January 28). The three paradigms of HCI. Proceedings of the Alt. Chi. Session at the SIGCHI Conference on Human Factors in Computing Systems, San Jose, CA, USA."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"B\u00f8dker, S. (2006, January 14\u201318). When second wave HCI meets third wave challenges. Proceedings of the 4th Nordic Conference on Human-Computer Interaction: Changing Roles, Oslo, Norway.","DOI":"10.1145\/1182475.1182476"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Davis, B., Glenski, M., Sealy, W., and Arendt, D. (2020, January 25\u201330). Measure Utility, Gain Trust: Practical Advice for XAI Researchers. Proceedings of the 2020 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX), Salt Lake City, UT, USA.","DOI":"10.1109\/TREX51495.2020.00005"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/s11023-019-09502-w","article-title":"The Pragmatic Turn in Explainable Artificial Intelligence (XAI)","volume":"29","year":"2019","journal-title":"Minds Mach."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ashby, S., Hanna, J., Matos, S., Nash, C., and Faria, A. (2019, January 19\u201320). Fourth-wave HCI meets the 21st century manifesto. Proceedings of the Halfway to the Future Symposium, Nottingham, UK.","DOI":"10.1145\/3363384.3363467"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"257","DOI":"10.24908\/ss.v17i1\/2.13238","article-title":"Surveillance Capitalism: An Interview with Shoshana Zuboff","volume":"17","author":"Zuboff","year":"2019","journal-title":"Surveill. Soc."},{"key":"ref_31","unstructured":"Marcus, G., and Davis, E. (2019). Rebooting AI: Building Artificial Intelligence We Can Trust, Vintage."},{"key":"ref_32","unstructured":"Doshi-Velez, F., and Kim, B. (2017). Towards a rigorous science of interpretable machine learning. arXiv."},{"key":"ref_33","unstructured":"OECD (2022, December 06). Tools for Trustworthy AI. Available online: https:\/\/www.oecd.org\/science\/tools-for-trustworthy-ai-008232ec-en.htm."},{"key":"ref_34","unstructured":"EU (2019). Ethics Guidelines for Trustworthy AI, European Commission. Report."},{"key":"ref_35","unstructured":"Mayer, R.C., Davis, J.H., and Schoorman, F.D. (2006). Organizational Trust: A Reader, Academy of Management."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"189","DOI":"10.31887\/DCNS.2020.22.2\/mhilbert","article-title":"Digital technology and social change: The digital transformation of society from a historical perspective","volume":"22","author":"Hilbert","year":"2020","journal-title":"Dialogues Clin. Neurosci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/s12525-020-00441-4","article-title":"Trustworthy artificial intelligence","volume":"31","author":"Thiebes","year":"2021","journal-title":"Electron. Mark."},{"key":"ref_38","unstructured":"D\u00f6rner, D. (1978). Cognitive Psychology and Instruction, Springer."},{"key":"ref_39","unstructured":"Smith, C.J. (2019). Designing trustworthy AI: A human-machine teaming framework to guide development. arXiv."},{"key":"ref_40","unstructured":"Leijnen, S., Aldewereld, H., van Belkom, R., Bijvank, R., and Ossewaarde, R. (2022, December 06). An agile framework for trustworthy AI. NeHuAI@ ECAI. Available online: https:\/\/www.semanticscholar.org\/paper\/An-agile-framework-for-trustworthy-AI-Leijnen-Aldewereld\/880049a16c8fea47dcfe07450668f5507db5e96d."},{"key":"ref_41","unstructured":"Seigneur, J.M. (2005). Trust, Security, and Privacy in Global Computing. [Ph.D. Thesis, University of Dublin]."},{"key":"ref_42","first-page":"127","article-title":"Building trust in artificial intelligence","volume":"72","author":"Rossi","year":"2018","journal-title":"J. Int. Aff."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1080\/01449290500330331","article-title":"User experience-a research agenda","volume":"25","author":"Hassenzahl","year":"2006","journal-title":"Behav. Inf. Technol."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.im.2014.12.001","article-title":"Antecedents and consequences of mobile phone usability: Linking simplicity and interactivity to satisfaction, trust, and brand loyalty","volume":"52","author":"Lee","year":"2015","journal-title":"Inf. Manag."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/1015530.1015549","article-title":"Technology as experience","volume":"11","author":"McCarthy","year":"2004","journal-title":"Interactions"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MCS.2020.3019151","article-title":"Human trust-based feedback control: Dynamically varying automation transparency to optimize human-machine interactions","volume":"40","author":"Akash","year":"2020","journal-title":"IEEE Control Syst. Mag."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Wogu, I.A.P., Misra, S., Udoh, O.D., Agoha, B.C., Sholarin, M.A., and Ahuja, R. (2020, January 20\u201321). Artificial Intelligence Politicking and Human Rights Violations in UK?s Democracy: A Critical Appraisal of the Brexit Referendum. Proceedings of the The International Conference on Recent Innovations in Computing, Jammu, India.","DOI":"10.1007\/978-981-15-8297-4_49"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/235008.235010","article-title":"Quality of experience: Defining the criteria for effective interaction design","volume":"3","author":"Alben","year":"1996","journal-title":"Interactions"},{"key":"ref_49","unstructured":"Sousa, S.C., Tomberg, V., Lamas, D.R., and Laanpere, M. (2011). Advances in Web-Based Learning-ICWL 2011, Springer."},{"key":"ref_50","unstructured":"Sousa, S., Lamas, D., and Hudson, B. (2006, January 13\u201317). Reflection on the influence of online trust in online learners performance. Proceedings of the E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Honolulu, HI, USA."},{"key":"ref_51","first-page":"1","article-title":"Leveraging Trust to Support Online Learning Creativity\u2013A Case Study","volume":"30","author":"Sousa","year":"2012","journal-title":"ELearning Pap."},{"key":"ref_52","first-page":"258","article-title":"The Implications of Trust on Moderating Learner\u2019s Online Interactions\u2014A Socio-technical Model of Trust","volume":"Volume 2","year":"2012","journal-title":"Proceedings of the CSEDU 2012-Proceedings of the 4th International Conference on Computer Supported Education"},{"key":"ref_53","first-page":"1","article-title":"Technology, humanness, and trust: Rethinking trust in technology","volume":"16","author":"Lankton","year":"2015","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Falcone, R., Singh, M.P., and Tan, Y. (2002). Trust in Cyber-Societies: Integrating the Human and Artificial Perspectives, Springer.","DOI":"10.1007\/3-540-45547-7"},{"key":"ref_55","unstructured":"Gambetta, D. (1998). Can We Trust Trust?, Basil Blackwell."},{"key":"ref_56","first-page":"94","article-title":"Familiarity, confidence, trust: Problems and alternatives","volume":"6","author":"Luhmann","year":"2000","journal-title":"Trust. Mak. Break. Coop. Relations"},{"key":"ref_57","unstructured":"Cavoukian, A., and Jonas, J. (2012). Privacy by Design in the Age of Big Data, Information and Privacy Commissioner of Ontario."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Gulati, S., Sousa, S., and Lamas, D. (2019). Design, development and evaluation of a human-computer trust scale. Behav. Inf. Technol., 1\u201312.","DOI":"10.1037\/t75524-000"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Gulati, S., Sousa, S., and Lamas, D. (2017, January 25\u201329). Modelling Trust: An Empirical Assessment. Proceedings of the 16th IFIP TC 13 International Conference on Human-Computer Interaction\u2014INTERACT 2017-Volume 10516, Mumbai, India.","DOI":"10.1007\/978-3-319-68059-0_3"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Gulati, S., Sousa, S., and Lamas, D. (2018, January 16\u201318). Modelling trust in human-like technologies. Proceedings of the 9th Indian Conference on Human Computer Interaction, Bangalore, India.","DOI":"10.1145\/3297121.3297124"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s40660-016-0011-7","article-title":"Value creation through trust in technological-mediated social participation","volume":"2","author":"Sousa","year":"2016","journal-title":"Technol. Innov. Educ."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","article-title":"Reputation systems: Facilitating trust in Internet interactions","volume":"43","author":"Resnick","year":"2000","journal-title":"Commun. ACM"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1108\/JIC-04-2019-0079","article-title":"How does intellectual capital align with cyber security?","volume":"20","author":"Renaud","year":"2019","journal-title":"J. Intellect. Cap."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Hansen, M. (2007, January 1\u20137). Marrying transparency tools with user-controlled identity management. Proceedings of the IFIP International Summer School on the Future of Identity in the Information Society, Brno, Czech Republic.","DOI":"10.1007\/978-0-387-79026-8_14"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1002\/asi.20459","article-title":"Development of measures of online privacy concern and protection for use on the Internet","volume":"58","author":"Buchanan","year":"2007","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Fimberg, K., and Sousa, S. (2020, January 25\u201329). The Impact of Website Design on Users\u2019 Trust Perceptions. Proceedings of the International Conference on Applied Human Factors and Ergonomics, San Diego, CA, USA.","DOI":"10.1145\/3419249.3420086"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.intmar.2017.01.001","article-title":"A Meta-analysis of Online Trust Relationships in E-commerce","volume":"38","author":"Kim","year":"2017","journal-title":"J. Interact. Mark."},{"key":"ref_68","first-page":"24","article-title":"Can you trust your robot?","volume":"19","author":"Hancock","year":"2011","journal-title":"Ergon. Des."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Stephanidis, C., Kurosu, M., Chen, J.Y.C., Fragomeni, G., Streitz, N., Konomi, S., Degen, H., and Ntoa, S. (2021, January 24\u201329). A Toolkit to Enable the Design of Trustworthy AI. Proceedings of the HCI International 2021-Late Breaking Papers: Multimodality, eXtended Reality, and Artificial Intelligence, Virtual Event.","DOI":"10.1007\/978-3-030-90963-5"},{"key":"ref_70","unstructured":"Hardin, R. (2002). Trust and Trustworthiness, Russell Sage Foundation."},{"key":"ref_71","unstructured":"Bauer, P.C. (2022, December 06). Conceptualizing trust and trustworthiness. Political Concepts Working Paper Series. Available online: https:\/\/www.semanticscholar.org\/paper\/Conceptualizing-Trust-and-Trustworthiness-Bauer\/e21946ddb6c3d66a347957d1e3cef434f63b22fb."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","article-title":"Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)","volume":"6","author":"Adadi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_73","unstructured":"Sousa, S. (2006). Online Distance Learning: Exploring the Interaction between Trust and Performance. [Ph.D Thesis, Seffield Hallam University]."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1007\/s12083-014-0288-9","article-title":"A topological potential weighted community-based recommendation trust model for P2P networks","volume":"8","author":"Han","year":"2015","journal-title":"Peer- Netw. Appl."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1139922.1139924","article-title":"Trust beyond security: An expanded trust model","volume":"49","author":"Hoffman","year":"2006","journal-title":"Commun. ACM"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"175","DOI":"10.2753\/MIS0742-1222270108","article-title":"Technology dominance in complex decision making: The case of aided credibility assessment","volume":"27","author":"Jensen","year":"2010","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1089\/cpb.2008.0263","article-title":"More information than you ever wanted: Does Facebook bring out the green-eyed monster of jealousy?","volume":"12","author":"Muise","year":"2009","journal-title":"CyberPsychology Behav."},{"key":"ref_78","unstructured":"EU, A.H. (2022, December 06). Assessment List for Trustworthy Artificial Intelligence (ALTAI) for Self-Assessment. Available online: https:\/\/digital-strategy.ec.europa.eu\/en\/library\/assessment-list-trustworthy-artificial-intelligence-altai-self-assessment."},{"key":"ref_79","first-page":"6","article-title":"Measuring human-computer trust","volume":"Volume 53","author":"Madsen","year":"2000","journal-title":"Proceedings of the 11th Australasian Conference on Information Systems"},{"key":"ref_80","unstructured":"Goillau, P., Kelly, C., Boardman, M., and Jeannot, E. (2003). Guidelines for Trust in Future ATM Systems-Measures, European Organisation for the Safety of Air Navigation. Available online: https:\/\/skybrary.aero\/bookshelf\/guidelines-trust-future-atm-systems-measures-0."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s11238-007-9043-5","article-title":"The self-fulfilling property of trust: An experimental study","volume":"63","author":"Bachrach","year":"2007","journal-title":"Theory Decis."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Ajenaghughrure, I.B., da Costa Sousa, S.C., and Lamas, D. (2020, January 6\u20138). Risk and Trust in artificial intelligence technologies: A case study of Autonomous Vehicles. Proceedings of the 2020 13th International Conference on Human System Interaction (HSI), Tokyo, Japan.","DOI":"10.1109\/HSI49210.2020.9142686"},{"key":"ref_83","first-page":"4","article-title":"Trust in and adoption of online recommendation agents","volume":"6","author":"Benbasat","year":"2005","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_84","unstructured":"S\u00f6llner, M., Hoffmann, A., Hoffmann, H., Wacker, A., and Leimeister, J.M. (2012). Understanding the Formation of Trust in IT Artifacts, Association for Information Systems."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"12:1","DOI":"10.1145\/1985347.1985353","article-title":"Trust in a Specific Technology: An Investigation of Its Components and Measures","volume":"2","author":"Mcknight","year":"2011","journal-title":"ACM Trans. Manage. Inf. Syst."},{"key":"ref_86","unstructured":"Gefen, D. (2013). Psychology of Trust: New Research, Nova Science Publishers."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/355112.355120","article-title":"Trust online","volume":"43","author":"Friedman","year":"2000","journal-title":"Commun. ACM"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Zheng, J., Veinott, E., Bos, N., Olson, J.S., and Olson, G.M. (2002, January 20\u201325). Trust without touch: Jumpstarting long-distance trust with initial social activities. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Minneapolis, MN, USA.","DOI":"10.1145\/503376.503402"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/355112.355124","article-title":"Designing trust into online experiences","volume":"43","author":"Shneiderman","year":"2000","journal-title":"Commun. ACM"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1080\/00140139608964474","article-title":"Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation","volume":"39","author":"Muir","year":"1996","journal-title":"Ergonomics"}],"container-title":["Multimodal Technologies and Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2414-4088\/7\/2\/13\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:19:43Z","timestamp":1760120383000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2414-4088\/7\/2\/13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,31]]},"references-count":90,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["mti7020013"],"URL":"https:\/\/doi.org\/10.3390\/mti7020013","relation":{},"ISSN":["2414-4088"],"issn-type":[{"value":"2414-4088","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,31]]}}}