- document
-
Kox, E.S. (author), Siegling, L. (author), Kerstholt, J.H. (author)Autonomous agents (AA) will increasingly be deployed as teammates instead of tools. In many operational situations, flawless performance from AA cannot be guaranteed. This may lead to a breach in the human’s trust, which can compromise collaboration. This highlights the importance of thinking about how to deal with error and trust violations...article 2022
- document
-
Stoter, A.J.R. (author), Rietveld, B. (author), Jansen, V. (author), Bastiaansen, H.J.M. (author)The ambition of the EU Data Strategy can be summarized as a ‘federation of interoperable data spaces’. Currently, a multitude of architectures, frameworks and protocols is used by various data spaces. The Data Sharing Coalition has provided an architecture framework for interoperability between data spaces, making use of a harmonization domain...conference paper 2022
- document
-
Kox, E. (author), Barnhoorn, J. (author), Rabago Mayer, L. (author), Temel, A. (author), Klunder, T. (author)How can we observe how people respond to consequential errors by an artificial agent in a realistic yet highly controllable environment? We created a threat-detection house-search task in virtual reality in which participants form a Human-Agent Team (HAT) with an autonomous drone. By simulating risk, we amplify the feeling of reliance and the...bookPart 2022
- document
-
Kox, E.S. (author), Kerstholt, J.H. (author), Hueting, T.F. (author), de Vries, P.W. (author)Trust is a fundamental aspect of teamwork in Human-Agent Teams (HATs). Trust violations are an inevitable aspect of the cycle of trust, so effective trust repair strategies are needed to ensure durable and successful team performance. This study explores the effectiveness of four trust repair strategies. In a first-person shooter resembling HAT...conference paper 2022
- document
-
Broecks, K.P.F. (author), Jack, C. (author), ter Mors, E. (author), Boomsma, C. (author), Shackley, S. (author)Carbon Capture and Storage at industrial processes (industrial CCS) is expected to play an important role in reducing industrial CO2 emissions in the short term. Industrial CCS involves capturing CO2 from industrial processes, such as steel and cement making, and storing the CO2 underground. This study examined the public opinion of industrial...article 2021
- document
-
Kox, E.S. (author), Kerstholt, J.H. (author), Hueting, T.F. (author), de Vries, P.W. (author)The role of intelligent agents becomes more social as they are expected to act in direct interaction, involvement and/or interdependency with humans and other artificial entities, as in Human-Agent Teams (HAT). The highly interdependent and dynamic nature of teamwork demands correctly calibrated trust among team members. Trust violations are an...article 2021
- document
-
de Visser, E.J. (author), Peeters, M.M.M. (author), Jung, M.F. (author), Kohn, S. (author), Shaw, T.H. (author), Pak, R. (author), Neerincx, M.A. (author)The introduction of artificial teammates in the form of autonomous social robots, with fewer social abilities compared to humans, presents new challenges for human–robot team dynamics. A key characteristic of high performing human-only teams is their ability to establish, develop, and calibrate trust over long periods of time, making the...article 2020
- document
-
Bastiaansen, H.J.M. (author), Kollenstart, M. (author), Dalmolen, S. (author), van Engers, T.M. (author)Organizations increasingly collaborate in digital ecosystems, whilst being aware that data is becoming a key asset. They require improved data control capabilities that prevent their shared data from being misused. Currently, such capabilities are typically realized as situation-specific closed ecosystem solutions in a 'hub-model' approach. This...conference paper 2020
- document
-
Seepers, R.M. (author), Smulders, A.C.M. (author), Meeuwissen, H.B. (author)Zero trust’ is een term die steeds meer draagvlak krijgt binnen de cybersecuritygemeenschap. Centraal achter het zero trust-gedachtegoed is dat er fundamenteel anders moet worden omgegaan met de beveiligingsarchitectuur van een organisatie en haar (IT) infrastructuur: van ‘trust, but verify’ naar ‘don’t trust, verify!’ [1]. In een zero trust...article 2020
- document
-
Wijn, R. (author), van der Weerdt, C. (author), van der Kleij, R. (author), Young, H. (author)Trust is paramount for creating social and business relations, adopting technology, cooperating and creating economic value. With an increasingly digital economy, no wonder the importance of digital trust is advocated by so many scholars and businesses alike. However, contrary to purported common wisdom, we propose that actual trust is not...bookPart 2020
- document
-
Waa, J.V.D. (author), Schoonderwoerd, T. (author), Diggelen, J.V. (author), Neerincx, M. (author)Decision support systems (DSS) have improved significantly but are more complex due to recent advances in Artificial Intelligence. Current XAI methods generate explanations on model behaviour to facilitate a user's understanding, which incites trust in the DSS. However, little focus has been on the development of methods that establish and...article 2020
- document
-
Bastiaansen, H.J.M. (author), Dalmolen, S. (author), Kollenstart, M. (author), van Engers, T.M. (author)Organizations increasingly collaborate in digital ecosystems, whilst being aware that data is becoming a key asset. They require improved data control capabilities that prevent their shared data from being misused. Currently, such capabilities are typically realized as situation-specific closed ecosystem solutions in a ‘hub-model’ approach. This...conference paper 2020
- document
-
Walker, F. (author), Steinke, J. (author), Martens, M.H. (author), Verwey, W.B. (author)To maximize road safety, driver trust in an automated vehicle should be aligned with the vehicle's technical reliability, avoiding under- and over-estimation of its capabilities. This is known as trust calibration. In the study reported here, we asked how far participant assessments of vehicle capabilities aligned with those of the engineers....article 2020
- document
-
de Visser, E.J. (author), Peeters, M.M.H. (author), Jung, M.F. (author), Kohn, S. (author), Shaw, T.H. (author), Pak, R. (author), Neerincx, M.A. (author)The introduction of artificial teammates in the form of autonomous social robots, with fewer social abilities compared to humans, presents new challenges for human–robot team dynamics. A key characteristic of high performing human-only teams is their ability to establish, develop, and calibrate trust over long periods of time, making the...article 2019
- document
-
Walker, F. (author), Wang, J. (author), Martens, M.H. (author), Verwey, W.B. (author)Studies show that drivers’ intention to use automated vehicles is strongly modulated by trust. It follows that their benefits are unlikely to be achieved if users do not trust them. To date, most studies of trust in automated vehicles have relied on self-reports. However, questionnaires cannot capture real-time changes in drivers’ trust, and are...article 2019
- document
-
Tielman, M.L. (author), Neerincx, M.A. (author), Brinkman, W.P. (author)BACKGROUND: Systems incorporating virtual agents can play a major role in electronic-mental (e-mental) health care, as barriers to care still prevent some patients from receiving the help they need. To properly assist the users of these systems, a virtual agent needs to promote motivation. This can be done by offering motivational messages....article 2019
- document
-
Koning, R. (author), Deljoo, A. (author), Meijer, L. (author), Laat, C.D. (author), Grosso, P. (author)Collaborative defences against, for example, Distributed Denial of Service attacks require trust between the collaborators. Even in a trusted alliance of collaborators, some members are more trusted than others with the execution of a specific task. This paper shows that trust can be used as a criterion in collaborative defences against attacks...conference paper 2019
- document
-
Dalmolen, S. (author), Bastiaansen, H.J.M. (author), Moonen, H. (author), Hofman, W.J. (author), Punter, L.M. (author), Cornelisse, E. (author)In support of the trend towards ever more complex supply chain collaboration for the Physical Internet, a trusted, multi-tenant (and interoperable) data sharing infrastructure has to be enabled. Trust is a condition sine qua non organizations may not be prepared to share potentially competitive sensitive information. As such, trust has to be an...conference paper 2018
- document
-
Kerstholt, J.H. (author), Duijnhoven, H.L. (author), Paton, D. (author)Worldwide there is a growing need for citizens to prepare for environmental risks to mitigate potential adversity. In order to predict preparedness, behavioral models typically used variables at an individual level of analysis, such as risk perception and assessment of the effectiveness of possible actions (response-efficacy). The present study...article 2017
- document
-
Wang, W. (author), van Lint, C.L. (author), Brinkman, W.P. (author), Rövekamp, T.J.M. (author), van Dijk, S. (author), van der Boog, P.J.M. (author), Neerincx, M.A. (author)Background: Self-management support systems (SMSS) have been proposed for renal transplant patients to increase their autonomy and reduce the number of hospital visits. For the design and implementation of such systems, it is important to understand factors influencing patients’ acceptance of a SMSS. This paper aims to identify these key factors...article 2017