{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T11:55:31Z","timestamp":1726228531240},"publisher-location":"Cham","reference-count":69,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031408779"},{"type":"electronic","value":"9783031408786"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40878-6_14","type":"book-chapter","created":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T13:03:22Z","timestamp":1693832602000},"page":"249-269","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Reinterpreting Vulnerability to\u00a0Tackle Deception in\u00a0Principles-Based XAI for\u00a0Human-Computer Interaction"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8689-285X","authenticated-orcid":false,"given":"Rachele","family":"Carli","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9816-7439","authenticated-orcid":false,"given":"Davide","family":"Calvaresi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,5]]},"reference":[{"key":"14_CR1","unstructured":"Adrienne, K.: Effective enforcement of human rights: the Tysiac v. Poland case. Studia Iuridica Auctoritate Universitatis Pecs Publicata 143, 186 (2009)"},{"key":"14_CR2","unstructured":"AI HLEG: High-level expert group on artificial intelligence (2019)"},{"key":"14_CR3","unstructured":"Anjomshoae, S., Najjar, A., Calvaresi, D., Fr\u00e4mling, K.: Explainable agents and robots: results from a systematic literature review. In: 18th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2019, Montreal, Canada, 13\u201317 May 2019, pp. 1078\u20131088. International Foundation for Autonomous Agents and Multiagent Systems (2019)"},{"key":"14_CR4","unstructured":"UN General Assembly, et al.: Universal declaration of human rights. UN General Assembly 302(2), 14\u201325 (1948)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s00146-020-01008-9","volume":"36","author":"K Astromsk\u0117","year":"2021","unstructured":"Astromsk\u0117, K., Pei\u010dius, E., Astromskis, P.: Ethical and legal challenges of informed consent applying artificial intelligence in medical diagnostic consultations. AI & Soc. 36, 509\u2013520 (2021). https:\/\/doi.org\/10.1007\/s00146-020-01008-9","journal-title":"AI & Soc."},{"key":"14_CR6","unstructured":"Baker, R.S., De Carvalho, A., Raspat, J., Aleven, V., Corbett, A.T., Koedinger, K.R.: Educational software features that encourage and discourage \u201cgaming the system\u201d. In: Proceedings of the 14th International Conference on Artificial Intelligence in Education, pp. 475\u2013482 (2009)"},{"issue":"2","key":"14_CR7","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s12369-019-00588-x","volume":"12","author":"J Banks","year":"2020","unstructured":"Banks, J.: Theory of mind in social robots: replication of five established human tests. Int. J. Soc. Robot. 12(2), 403\u2013414 (2020)","journal-title":"Int. J. Soc. Robot."},{"key":"14_CR8","first-page":"331","volume":"35","author":"LR Barroso","year":"2012","unstructured":"Barroso, L.R.: Here, there, and everywhere: human dignity in contemporary law and in the transnational discourse. BC Int\u2019l Comp. L. Rev. 35, 331 (2012)","journal-title":"BC Int\u2019l Comp. L. Rev."},{"key":"14_CR9","unstructured":"Beyleveld, D., Brownsword, R.: Human Dignity in Bioethics and Biolaw (2001)"},{"key":"14_CR10","unstructured":"Biran, O., Cotton, C.: Explanation and justification in machine learning: a survey. In: IJCAI-17 Workshop on Explainable AI (XAI), vol. 8, pp. 8\u201313 (2017)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Bissoli, L., et al.: A virtual coaching platform to support therapy compliance in obesity. In: 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 694\u2013699. IEEE (2022)","DOI":"10.1109\/COMPSAC54236.2022.00118"},{"key":"14_CR12","unstructured":"Brade\u0161ko, L., Mladeni\u0107, D.: A survey of chatbot systems through a Loebner Prize competition. In: Proceedings of Slovenian Language Technologies Society Eighth Conference of Language Technologies, vol. 2, pp. 34\u201337 (2012)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Bublitz, J.C.: The Nascent right to psychological integrity and mental self-determination. In: The Cambridge Handbook of New Human Rights: Recognition, Novelty, Rhetoric, pp. 387\u2013403 (2020)","DOI":"10.1017\/9781108676106.031"},{"issue":"6","key":"14_CR14","doi-asserted-by":"publisher","first-page":"666","DOI":"10.3390\/electronics10060666","volume":"10","author":"D Calvaresi","year":"2021","unstructured":"Calvaresi, D., et al.: EREBOTS: privacy-compliant agent-based platform for multi-scenario personalized health-assistant chatbots. Electronics 10(6), 666 (2021)","journal-title":"Electronics"},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Calvaresi, D., et al.: Ethical and legal considerations for nutrition virtual coaches. AI Ethics, 1\u201328 (2022). https:\/\/doi.org\/10.1007\/s43681-022-00237-6","DOI":"10.1007\/s43681-022-00237-6"},{"issue":"2","key":"14_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s12652-016-0374-3","volume":"8","author":"D Calvaresi","year":"2017","unstructured":"Calvaresi, D., Cesarini, D., Sernani, P., Marinoni, M., Dragoni, A.F., Sturm, A.: Exploring the ambient assisted living domain: a systematic review. J. Ambient. Intell. Humaniz. Comput. 8(2), 239\u2013257 (2017)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0747-5632(86)90004-X","volume":"2","author":"LR Caporael","year":"1986","unstructured":"Caporael, L.R.: Anthropomorphism and mechanomorphism: two faces of the human machine. Comput. Hum. Behav. 2(3), 215\u2013234 (1986)","journal-title":"Comput. Hum. Behav."},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Carli, R., Najjar, A., Calvaresi, D.: Risk and exposure of XAI in persuasion and argumentation: the case of manipulation. In: Calvaresi, D., Najjar, A., Winikoff, M., Fr\u00e4mling, K. (eds.) Explainable and Transparent AI and Multi-Agent Systems, EXTRAAMAS 2022. LNCS, vol. 13283, pp. 204\u2013220. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15565-9_13","DOI":"10.1007\/978-3-031-15565-9_13"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Ch\u2019ng, S.I., Yeong, L.S., Ang, X.Y.: Preliminary findings of using chat-bots as a course FAQ tool. In: 2019 IEEE Conference on e-Learning, e-Management & e-Services (IC3e), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/IC3e47558.2019.8971786"},{"issue":"11\u201312","key":"14_CR20","first-page":"125","volume":"6","author":"P Cisek","year":"1999","unstructured":"Cisek, P.: Beyond the computer metaphor: behaviour as interaction. J. Conscious. Stud. 6(11\u201312), 125\u2013142 (1999)","journal-title":"J. Conscious. Stud."},{"key":"14_CR21","unstructured":"European Commission: Charter of fundamental rights of the European Union, 2012\/c 326\/02. Official Journal of the European Union (2012)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Coons, C., Weber, M.: Manipulation: Theory and Practice. Oxford University Press (2014)","DOI":"10.1093\/acprof:oso\/9780199338207.001.0001"},{"key":"14_CR23","unstructured":"Crevier, D.: AI: The Tumultuous History of the Search for Artificial Intelligence. Basic Books, Inc. (1993)"},{"issue":"1","key":"14_CR24","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1037\/1093-4510.2.1.37","volume":"2","author":"H Crowther-Heyck","year":"1999","unstructured":"Crowther-Heyck, H.: George A. Miller, language, and the computer metaphor and mind. Hist. Psychol. 2(1), 37 (1999)","journal-title":"Hist. Psychol."},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Dennett, D.C.: The Intentional Stance. MIT Press (1987)","DOI":"10.1017\/S0140525X00058611"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Dicke, K.: The founding function of human dignity in the universal declaration of human rights. In: The Concept of Human Dignity in Human Rights Discourse, pp. 111\u2013120. Brill Nijhoff (2001)","DOI":"10.1163\/9789004478190_008"},{"key":"14_CR27","unstructured":"Druce, J., Niehaus, J., Moody, V., Jensen, D., Littman, M.L.: Brittle AI, causal confusion, and bad mental models: challenges and successes in the XAI program. arXiv preprint arXiv:2106.05506 (2021)"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Edmonds, B.: The constructibility of artificial intelligence (as defined by the Turing test). In: The Turing test: The Elusive Standard of Artificial Intelligence, pp. 145\u2013150 (2003)","DOI":"10.1007\/978-94-010-0105-2_7"},{"issue":"4","key":"14_CR29","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1037\/0033-295X.114.4.864","volume":"114","author":"N Epley","year":"2007","unstructured":"Epley, N., Waytz, A., Cacioppo, J.T.: On seeing human: a three-factor theory of anthropomorphism. Psychol. Rev. 114(4), 864 (2007)","journal-title":"Psychol. Rev."},{"issue":"1","key":"14_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3917\/riej.058.0001","volume":"58","author":"M Fabre-Magnan","year":"2007","unstructured":"Fabre-Magnan, M.: La dignit\u00e9 en droit: un axiome. Revue interdisciplinaire d\u2019\u00e9tudes juridiques 58(1), 1\u201330 (2007)","journal-title":"Revue interdisciplinaire d\u2019\u00e9tudes juridiques"},{"issue":"SE\/1","key":"14_CR31","doi-asserted-by":"publisher","first-page":"23","DOI":"10.35551\/PFQ_2021_s_1_2","volume":"66","author":"E Fejes","year":"2021","unstructured":"Fejes, E., Fut\u00f3, I.: Artificial intelligence in public administration-supporting administrative decisions. P\u00c9NZ\u00dcGYI SZEMLE\/Public Finan. Q. 66(SE\/1), 23\u201351 (2021)","journal-title":"P\u00c9NZ\u00dcGYI SZEMLE\/Public Finan. Q."},{"key":"14_CR32","unstructured":"Fineman, M.A.: Vulnerability: Reflections on a New Ethical Foundation for Law and Politics. Ashgate Publishing, Ltd. (2013)"},{"issue":"3","key":"14_CR33","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1111\/j.1439-0310.2008.01603.x","volume":"115","author":"ML Glocker","year":"2009","unstructured":"Glocker, M.L., Langleben, D.D., Ruparel, K., Loughead, J.W., Gur, R.C., Sachser, N.: Baby schema in infant faces induces cuteness perception and motivation for caretaking in adults. Ethology 115(3), 257\u2013263 (2009)","journal-title":"Ethology"},{"key":"14_CR34","doi-asserted-by":"publisher","first-page":"3473","DOI":"10.1007\/s10462-022-10256-8","volume":"56","author":"M Graziani","year":"2022","unstructured":"Graziani, M., et al.: A global taxonomy of interpretable AI: unifying the terminology for the technical and social sciences. Artif. Intell. Rev. 56, 3473\u20133504 (2022)","journal-title":"Artif. Intell. Rev."},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Guzman, A.L.: Making AI safe for humans: a conversation with Siri. In: Socialbots and Their Friends, pp. 85\u2013101. Routledge (2016)","DOI":"10.4324\/9781315637228-11"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Heri, C.: Responsive Human Rights: Vulnerability, Ill-treatment and the ECtHR. Bloomsbury Academic (2021)","DOI":"10.5040\/9781509941261"},{"issue":"2","key":"14_CR37","first-page":"63","volume":"24","author":"F Ippolito","year":"2019","unstructured":"Ippolito, F.: La vulnerabilit\u00e0 quale principio emergente nel diritto internazionale dei diritti umani? Ars Interpretandi 24(2), 63\u201393 (2019)","journal-title":"Ars Interpretandi"},{"issue":"24","key":"14_CR38","doi-asserted-by":"publisher","first-page":"16657","DOI":"10.3390\/ijerph192416657","volume":"19","author":"J Kim","year":"2022","unstructured":"Kim, J., Park, K., Ryu, H.: Social values of care robots. Int. J. Environ. Res. Public Health 19(24), 16657 (2022)","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Knijn, T., Lepianka, D.: Justice and Vulnerability in Europe: An Interdisciplinary Approach. Edward Elgar Publishing (2020)","DOI":"10.4337\/9781839108488"},{"issue":"1","key":"14_CR40","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1111\/j.1748-720X.2007.00123.x","volume":"35","author":"LM Kopelman","year":"2007","unstructured":"Kopelman, L.M.: The best interests standard for incompetent or incapacitated persons of all ages. J. Law Med. Ethics 35(1), 187\u2013196 (2007)","journal-title":"J. Law Med. Ethics"},{"key":"14_CR41","unstructured":"Korn, J.H.: Illusions of Reality: A History of Deception in Social Psychology. SUNY Press (1997)"},{"key":"14_CR42","unstructured":"Lee, S.l., Lau, I.Y.m., Kiesler, S., Chiu, C.Y.: Human mental models of humanoid robots. In: Proceedings of the 2005 IEEE International Conference on Robotics and Automation, pp. 2767\u20132772. IEEE (2005)"},{"key":"14_CR43","unstructured":"Leonard, A.: Bots: The Origin of the New Species. Wired Books, Incorporated (1997)"},{"issue":"4","key":"14_CR44","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/s10602-008-9056-2","volume":"19","author":"TC Leonard","year":"2008","unstructured":"Leonard, T.C.: Richard H. Thaler, Cass R. Sunstein, Nudge: improving decisions about health, wealth, and happiness. Constit. Polit. Econ. 19(4), 356\u2013360 (2008)","journal-title":"Constit. Polit. Econ."},{"issue":"4","key":"14_CR45","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1521\/jaap.1.1986.14.4.473","volume":"14","author":"B Magid","year":"1986","unstructured":"Magid, B.: The meaning of projection in self psychology. J. Am. Acad. Psychoanal. 14(4), 473\u2013483 (1986)","journal-title":"J. Am. Acad. Psychoanal."},{"issue":"1","key":"14_CR46","first-page":"102","volume":"14","author":"A Margalit","year":"2016","unstructured":"Margalit, A.: Autonomy: errors and manipulation. Jerusalem Rev. Legal Stud. 14(1), 102\u2013112 (2016)","journal-title":"Jerusalem Rev. Legal Stud."},{"key":"14_CR47","doi-asserted-by":"crossref","unstructured":"Marshall, J.: Personal Freedom Through Human Rights Law? Autonomy, Identity and Integrity under the European Convention on Human Rights. Brill (2008)","DOI":"10.1163\/ej.9789004170599.i-234"},{"key":"14_CR48","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3758\/BF03201006","volume":"18","author":"DW Massaro","year":"1986","unstructured":"Massaro, D.W.: The computer as a metaphor for psychological inquiry: considerations and recommendations. Behav. Res. Meth. Instrum. Comput. 18, 73\u201392 (1986)","journal-title":"Behav. Res. Meth. Instrum. Comput."},{"key":"14_CR49","unstructured":"United States. President\u2019s Commission for the Study of Ethical Problems in Medicine and Biomedical and Behavioral Research: Making Health Care Decisions Volume One: Report (1982)"},{"key":"14_CR50","unstructured":"Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley (2003)"},{"issue":"1","key":"14_CR51","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1111\/0022-4537.00153","volume":"56","author":"C Nass","year":"2000","unstructured":"Nass, C., Moon, Y.: Machines and mindlessness: social responses to computers. J. Soc. Issues 56(1), 81\u2013103 (2000)","journal-title":"J. Soc. Issues"},{"key":"14_CR52","doi-asserted-by":"crossref","unstructured":"Nass, C., Steuer, J., Tauber, E.R.: Computers are social actors. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 72\u201378 (1994)","DOI":"10.1145\/191666.191703"},{"key":"14_CR53","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190080365.001.0001","volume-title":"Deceitful Media: Artificial Intelligence and Social Life After the Turing Test","author":"S Natale","year":"2021","unstructured":"Natale, S.: Deceitful Media: Artificial Intelligence and Social Life After the Turing Test. Oxford University Press, USA (2021)"},{"key":"14_CR54","doi-asserted-by":"publisher","DOI":"10.4324\/9781315202082","volume-title":"A Networked Self and Human Augmentics, Artificial Intelligence, Sentience","author":"Z Papacharissi","year":"2018","unstructured":"Papacharissi, Z.: A Networked Self and Human Augmentics, Artificial Intelligence, Sentience. Routledge, UK (2018)"},{"key":"14_CR55","unstructured":"Reeves, B., Nass, C.: Media Equation Theory (1996). Accessed 5 Mar 2009"},{"key":"14_CR56","doi-asserted-by":"publisher","unstructured":"Roberts, T., Zheng, Y.: Datafication, dehumanisation and participatory development. In: Zheng, Y., Abbott, P., Robles-Flores, J.A. (eds.) Freedom and Social Inclusion in a Connected World, ICT4D 2022. IFIP Advances in Information and Communication Technology, vol. 657, pp. 377\u2013396. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19429-0_23","DOI":"10.1007\/978-3-031-19429-0_23"},{"issue":"3","key":"14_CR57","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1163\/15718182-02102007","volume":"21","author":"M Sabatello","year":"2013","unstructured":"Sabatello, M.: Children with disabilities: a critical appraisal. Int. J. Child. Rights 21(3), 464\u2013487 (2013)","journal-title":"Int. J. Child. Rights"},{"key":"14_CR58","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/s12124-020-09523-6","volume":"54","author":"HS S\u00e6tra","year":"2020","unstructured":"S\u00e6tra, H.S.: The parasitic nature of social AI: Sharing minds with the mindless. Integr. Psychol. Behav. Sci. 54, 308\u2013326 (2020)","journal-title":"Integr. Psychol. Behav. Sci."},{"issue":"4","key":"14_CR59","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1016\/j.chb.2007.07.008","volume":"24","author":"A Sarrafzadeh","year":"2008","unstructured":"Sarrafzadeh, A., Alexander, S., Dadgostar, F., Fan, C., Bigdeli, A.: \u201cHow do you know that i don\u2019t understand?\u2019\u2019 A look at the future of intelligent tutoring systems. Comput. Hum. Behav. 24(4), 1342\u20131363 (2008)","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"14_CR60","doi-asserted-by":"publisher","first-page":"70","DOI":"10.21061\/jte.v23i2.a.5","volume":"23","author":"B Schneider","year":"2012","unstructured":"Schneider, B.: You are not a gadget: a manifesto. J. Technol. Educ. 23(2), 70\u201372 (2012)","journal-title":"J. Technol. Educ."},{"key":"14_CR61","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11948-012-9381-8","volume":"18","author":"D Schreiber","year":"2012","unstructured":"Schreiber, D.: On social attribution: implications of recent cognitive neuroscience research for race, law, and politics. Sci. Eng. Ethics 18, 557\u2013566 (2012)","journal-title":"Sci. Eng. Ethics"},{"issue":"CSCW2","key":"14_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3479515","volume":"5","author":"W Seymour","year":"2021","unstructured":"Seymour, W., Van Kleek, M.: Exploring interactions between trust, anthropomorphism, and relationship development in voice assistants. Proc. ACM Hum. Comput. Interact. 5(CSCW2), 1\u201316 (2021)","journal-title":"Proc. ACM Hum. Comput. Interact."},{"issue":"1","key":"14_CR63","doi-asserted-by":"publisher","first-page":"50","DOI":"10.5325\/shaw.40.1.0050","volume":"40","author":"L Switzky","year":"2020","unstructured":"Switzky, L.: Eliza effects: Pygmalion and the early development of artificial intelligence. Shaw 40(1), 50\u201368 (2020)","journal-title":"Shaw"},{"key":"14_CR64","unstructured":"Timmer, A.: A quiet revolution: vulnerability in the European court of human rights. In: Vulnerability, pp. 147\u2013170. Routledge (2016)"},{"key":"14_CR65","unstructured":"Trower, T.: Bob and beyond: a Microsoft insider remembers (2010)"},{"key":"14_CR66","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-1-4020-6710-5_3","volume-title":"Parsing the Turing Test","author":"AM Turing","year":"2009","unstructured":"Turing, A.M.: Computing machinery and intelligence. In: Epstein, R., Roberts, G., Beber, G. (eds.) Parsing the Turing Test, pp. 23\u201365. Springer, Dordrecht (2009). https:\/\/doi.org\/10.1007\/978-1-4020-6710-5_3"},{"issue":"4","key":"14_CR67","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1086\/286655","volume":"7","author":"LA White","year":"1940","unstructured":"White, L.A.: The symbol: the origin and basis of human behavior. Philos. Sci. 7(4), 451\u2013463 (1940)","journal-title":"Philos. Sci."},{"issue":"1","key":"14_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/19368623.2021.1926037","volume":"31","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Liu, Y., Lv, X., Ai, J., Li, Y.: Anthropomorphism and customers\u2019 willingness to use artificial intelligence service agents. J. Hospitality Mark. Manage. 31(1), 1\u201323 (2022)","journal-title":"J. Hospitality Mark. Manage."},{"key":"14_CR69","unstructured":"Zatti, P.: Note sulla semantica della dignit\u00e0. Maschere del diritto volti della vita, pp. 24\u201349 (2009)"}],"container-title":["Lecture Notes in Computer Science","Explainable and Transparent AI and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40878-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T13:05:17Z","timestamp":1693832717000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40878-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031408779","9783031408786"],"references-count":69,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40878-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"5 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EXTRAAMAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Explainable, Transparent Autonomous Agents and Multi-Agent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"extraamas2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/extraamas.ehealth.hevs.ch\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Between 3 and 5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"~1\/2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}