SlideShare a Scribd company logo
Applied Artificial
Intelligence and Trust - The
Case of Autonomous
Vehicles and Medical
Assistance Devices
+ Technological Forecasting
& Social Change
- Monika Hengstler et al.
/ 김민준
Table of Contents
2
1. Paper 1
1. Background
2. Trust
3. Trust in the Technology
4. Case Studies
5. Results
2. Paper 2
1. Perceived Safety
2. Anthropomorphism
3. Experimental Results
3. Takeaways
Background
ADAS 및 자율주행의 인지부하
3
Google Self-driving Car
• Starting in 2012, Google’s self-driving cars
logged 1,600,000 km by June of 2015
• A total of 14 accidents recorded by July 2015
— no accidents caused by Google
14 accidents on 1,600,000 km? Pretty good!!
Background
ADAS 및 자율주행의 인지부하
4
Google Self-driving Car
14 accidents on 1,600,000 km? Pretty good!!
People complained that Google’s
self-driving cars were “unpredictable”
• Starting in 2012, Google’s self-driving cars
logged 1,600,000 km by June of 2015
• A total of 14 accidents recorded by July 2015
— no accidents caused by Google
Trust
5
“In interpersonal relationships, the essence of trust is the willingness
to be vulnerable to the actions of another person” (Mayer et al., 1995)
“Trust provides a valid foundation for describing the relationship between huma
1. Trust in the technology
2. Trust in the innovating firm and its communication
Trust, Perceived Risk, and Trust in Innovation
Trust and Perceived Risk
6
Perceived Risk
: a combination of uncertainty plus the seriousness
of the outcome involved
Perceived Risk in Innovation?
: uncertainty about the possibility of failure of a new product, or
the likelihood that the product will not work properly
directly linked with adoption
Trust, Perceived Risk, and Trust in Innovation
Trust in the Technology
7
1. Trust is mainly driven by the predictability of the technology
2. Over time, the driver of trust becomes dependability (consistent)
3. Ultimately, the relationship shifts to faith (reliability)
Trust, Perceived Risk, and Trust in Innovation
Trust in the Innovating Firm and its Communication
8
“Trust in the innovating firm and its communication
influence the adoption decision…” (Sternthal et al. 1978)
Trust, Perceived Risk, and Trust in Innovation
Trust in the Innovating Firm and its Communication
9
“… Particularly in the early stage of
commercialization, when customer
knowledge is low and an extensive public
discourse have not yet emerged…”
Trust, Perceived Risk, and Trust in Innovation
Trust in the Innovating Firm and its Communication
10
“… Particularly in the early stage of
commercialization, when customer
knowledge is low and an extensive public
discourse have not yet emerged…”
Trust, Perceived Risk, and Trust in Innovation
Case Studies
11
Selection Criteria
1. Identified industries in which applications of AI have
provoked skepticism
2. Selected cases that satisfied four conditions:
1. the application contains a component of AI
2. the application compensates for human flaws or
supplements human decision making
3. the application is on the market or is close to market
introduction
4. the application requires user involvement
Selection Criteria
Case Studies
12
Healthcare Automation
Medical Technology
IBM Watson
HP
AiCure
Fraunhofer IPA
Care-O-Bot 3
Case Studies
13
Transportation Automation
Transportation Industry
BMW
Deutsche Bahn
ZF Friedrichshafen AGDaimler -
Future Trucks
VAG Nürnberg
Data Collection
14
Sources
1. Semi-structured Interviews
2. Informal follow-ups via emails and phone calls
3. Archival data
Pilot Interviews
managers & engineers from the target industries
+ executives from outside the target industries
Results
15
Insights Gained from Target Analysis
1. Operational safety is necessary to initiate performance trust
2. Data security is an eminent factor influencing trust
3. Cognitive Compatibility, Trialability, Usability
• A fundamental determinant of trust in the technology
• A flawed system will not be trusted
• Operational safety is necessary, but not sufficient for acceptance
Results
16
Insights Gained from Target Analysis
1. Operational safety is necessary to initiate performance trust
2. Data security is an eminent factor influencing trust
3. Cognitive Compatibility, Trialability, Usability
• In transportation, data security = operational safety
• In healthcare, privacy protection is a major issue since all
applications deal with sensitive personal data
Results
17
Insights Gained from Target Analysis
1. Operational safety is necessary to initiate performance trust
2. Data security is an eminent factor influencing trust
3. Cognitive Compatibility, Trialability, Usability
• Cognitive compatibility : compatibility between what people feel
or think about an innovation - Understandability
• Trialability : a strategy to enhance understanding.
Displaying technological progress and providing a visualization
of the concrete benefits, and thereby reducing perceived risk
• Usability : ease of use, an intuitive interface, balance between
control and autonomy
Can Autonomous Vehicles
be Safe and Trustworthy?
Effects of Appearance and
Autonomy of Unmanned
Driving Systems
+ Int’l Journal of HCI
- Jae-Gil Lee et al.
/ 김민준
x 2016 Spring
Perceived Safety
Reducing Human Error
19
Automation is believed to be an effective way to reduce the human errors that con
Unmanned driving systems may increase perceived safety by explicitly removing
Perceived Safety
Reducing Human Error
20
Automation is believed to be an effective way to reduce the human errors that con
Unmanned driving systems may increase perceived safety by explicitly removing
Not Currently Possible
Anthropomorphism and Social Presence
Increasing Humanness
21
Anthropomorphism
: the attribution of humanlike characteristics to inanimate,
artificial agents such as computers and robots
Individuals mindlessly apply social rules and expectations when they interact with
Anthropomorphism and Social Presence
Increasing Humanness
22
Anthropomorphism and Social Presence
Increasing Humanness
23
Assigning anthropomorphic cues such as
agency, gender, and personality
is one way to make the quality of
human-robot interaction
more socially meaningful
= increasing trust
Human-like appearance and high
autonomy in an unmanned driving system
enhance the system’s similarity to humans
Anthropomorphism and Social Presence
Increasing Humanness
24
Assigning anthropomorphic cues such as
agency, gender, and personality
is one way to make the quality of
human-robot interaction
more socially meaningful
= increasing trust
Human-like appearance and high
autonomy in an unmanned driving system
enhance the system’s similarity to humans
Experiment Setup
The Effects of Appearance and Autonomy on User Perception
25
Results
The Effects of Appearance and Autonomy on User Perception
26
Pearson’s r correlation analyses conducted to examine the
relationship between social presence and the measure variables
Takeaways
Findings on Semi-autonomous Vehicles and their Perceptions
27
How do we make semi-autonomous driving appear
more human than it is?
There needs to be a trialability factor
: how do we allow other drivers to predict, and ultimately
have faith in semi-autonomous vehicles
Finding the balance between control and autonomy

More Related Content

What's hot

The AI Now Report The Social and Economic Implications of Artificial Intelli...
The AI Now Report  The Social and Economic Implications of Artificial Intelli...The AI Now Report  The Social and Economic Implications of Artificial Intelli...
The AI Now Report The Social and Economic Implications of Artificial Intelli...
Willy Marroquin (WillyDevNET)
 
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
Kelvin Ross
 
Umano AI
Umano AIUmano AI
Hands-Free Healthcare: How an Echo Rewrites the Playbook (Digital Health Summ...
Hands-Free Healthcare: How an Echo Rewrites the Playbook (Digital Health Summ...Hands-Free Healthcare: How an Echo Rewrites the Playbook (Digital Health Summ...
Hands-Free Healthcare: How an Echo Rewrites the Playbook (Digital Health Summ...
Jill Gilbert
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
CheapSSLsecurity
 

What's hot (6)

The AI Now Report The Social and Economic Implications of Artificial Intelli...
The AI Now Report  The Social and Economic Implications of Artificial Intelli...The AI Now Report  The Social and Economic Implications of Artificial Intelli...
The AI Now Report The Social and Economic Implications of Artificial Intelli...
 
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
ACS EMERGING & DEEP TECH WEBINAR: THE RISE OF AI AND DATA SCIENCE AND ITS IMP...
 
Umano AI
Umano AIUmano AI
Umano AI
 
Hands-Free Healthcare: How an Echo Rewrites the Playbook (Digital Health Summ...
Hands-Free Healthcare: How an Echo Rewrites the Playbook (Digital Health Summ...Hands-Free Healthcare: How an Echo Rewrites the Playbook (Digital Health Summ...
Hands-Free Healthcare: How an Echo Rewrites the Playbook (Digital Health Summ...
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
 

Viewers also liked

Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
Minjoon Kim
 
모바일 디자인 패턴 갤러리
모바일 디자인 패턴 갤러리모바일 디자인 패턴 갤러리
모바일 디자인 패턴 갤러리
HyukJin Kim
 
Choice, transparency, coordination, and quality among direct to-consumer tele...
Choice, transparency, coordination, and quality among direct to-consumer tele...Choice, transparency, coordination, and quality among direct to-consumer tele...
Choice, transparency, coordination, and quality among direct to-consumer tele...
Nuri Na
 
Developing a Mobile Application for Elderly People: Human-Centered Design App...
Developing a Mobile Application for Elderly People: Human-Centered Design App...Developing a Mobile Application for Elderly People: Human-Centered Design App...
Developing a Mobile Application for Elderly People: Human-Centered Design App...
A-juAn
 
Interacting with an Inferred World: the Challenge of Machine Learning for Hum...
Interacting with an Inferred World: the Challenge of Machine Learning for Hum...Interacting with an Inferred World: the Challenge of Machine Learning for Hum...
Interacting with an Inferred World: the Challenge of Machine Learning for Hum...
Minjoon Kim
 
MuscleMemory
MuscleMemoryMuscleMemory
MuscleMemory
Hyunjin Yoo
 
W3C HTML5 CT Forum 2016 - Revisited
W3C HTML5 CT Forum 2016 - RevisitedW3C HTML5 CT Forum 2016 - Revisited
W3C HTML5 CT Forum 2016 - Revisited
Minjoon Kim
 
healbegobe experience
healbegobe experiencehealbegobe experience
healbegobe experience
Hyunjeong Lee
 
2015 s:s ux trend report
2015 s:s ux trend report2015 s:s ux trend report
2015 s:s ux trend report
Hyunjeong Lee
 
The future sign and its three dimensions
The future sign and  its three dimensionsThe future sign and  its three dimensions
The future sign and its three dimensions
Nuri Na
 
Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016
Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016
Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016
Hyunjeong Lee
 
Ai voice shock 2017 리뷰
Ai voice shock 2017 리뷰Ai voice shock 2017 리뷰
Ai voice shock 2017 리뷰
Slava Han
 
The IoTivity Project - Linux Foundation Collaborative Projects & Open Interco...
The IoTivity Project - Linux Foundation Collaborative Projects & Open Interco...The IoTivity Project - Linux Foundation Collaborative Projects & Open Interco...
The IoTivity Project - Linux Foundation Collaborative Projects & Open Interco...
Minjoon Kim
 
Menu의 어원과 정의& mobile에서의 메뉴
Menu의 어원과 정의& mobile에서의 메뉴Menu의 어원과 정의& mobile에서의 메뉴
Menu의 어원과 정의& mobile에서의 메뉴
yoonjungwon
 
UX 조사 방법과 테크닉
UX 조사 방법과 테크닉UX 조사 방법과 테크닉
UX 조사 방법과 테크닉
Yoojung Kim
 
Visual Encodings of Temporal Uncertainty- A Comparative User Study
Visual Encodings of Temporal Uncertainty- A Comparative User Study Visual Encodings of Temporal Uncertainty- A Comparative User Study
Visual Encodings of Temporal Uncertainty- A Comparative User Study
yoonjungwon
 
Ambient influence
Ambient influenceAmbient influence
Ambient influence
Hyunjin Yoo
 
The effect of social media comments on consumers’ responses to food safety in...
The effect of social media comments on consumers’ responses to food safety in...The effect of social media comments on consumers’ responses to food safety in...
The effect of social media comments on consumers’ responses to food safety in...
Nuri Na
 
160428 Do Users' Perceptions of Password Security Match Reality?
160428 Do Users' Perceptions of Password Security Match Reality?160428 Do Users' Perceptions of Password Security Match Reality?
160428 Do Users' Perceptions of Password Security Match Reality?
Hyesoo Yoo
 

Viewers also liked (20)

Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
 
모바일 디자인 패턴 갤러리
모바일 디자인 패턴 갤러리모바일 디자인 패턴 갤러리
모바일 디자인 패턴 갤러리
 
Choice, transparency, coordination, and quality among direct to-consumer tele...
Choice, transparency, coordination, and quality among direct to-consumer tele...Choice, transparency, coordination, and quality among direct to-consumer tele...
Choice, transparency, coordination, and quality among direct to-consumer tele...
 
Developing a Mobile Application for Elderly People: Human-Centered Design App...
Developing a Mobile Application for Elderly People: Human-Centered Design App...Developing a Mobile Application for Elderly People: Human-Centered Design App...
Developing a Mobile Application for Elderly People: Human-Centered Design App...
 
Interacting with an Inferred World: the Challenge of Machine Learning for Hum...
Interacting with an Inferred World: the Challenge of Machine Learning for Hum...Interacting with an Inferred World: the Challenge of Machine Learning for Hum...
Interacting with an Inferred World: the Challenge of Machine Learning for Hum...
 
MuscleMemory
MuscleMemoryMuscleMemory
MuscleMemory
 
W3C HTML5 CT Forum 2016 - Revisited
W3C HTML5 CT Forum 2016 - RevisitedW3C HTML5 CT Forum 2016 - Revisited
W3C HTML5 CT Forum 2016 - Revisited
 
healbegobe experience
healbegobe experiencehealbegobe experience
healbegobe experience
 
2015 s:s ux trend report
2015 s:s ux trend report2015 s:s ux trend report
2015 s:s ux trend report
 
The future sign and its three dimensions
The future sign and  its three dimensionsThe future sign and  its three dimensions
The future sign and its three dimensions
 
Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016
Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016
Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016
 
Ai voice shock 2017 리뷰
Ai voice shock 2017 리뷰Ai voice shock 2017 리뷰
Ai voice shock 2017 리뷰
 
The IoTivity Project - Linux Foundation Collaborative Projects & Open Interco...
The IoTivity Project - Linux Foundation Collaborative Projects & Open Interco...The IoTivity Project - Linux Foundation Collaborative Projects & Open Interco...
The IoTivity Project - Linux Foundation Collaborative Projects & Open Interco...
 
Menu의 어원과 정의& mobile에서의 메뉴
Menu의 어원과 정의& mobile에서의 메뉴Menu의 어원과 정의& mobile에서의 메뉴
Menu의 어원과 정의& mobile에서의 메뉴
 
UX 조사 방법과 테크닉
UX 조사 방법과 테크닉UX 조사 방법과 테크닉
UX 조사 방법과 테크닉
 
김혁진
김혁진김혁진
김혁진
 
Visual Encodings of Temporal Uncertainty- A Comparative User Study
Visual Encodings of Temporal Uncertainty- A Comparative User Study Visual Encodings of Temporal Uncertainty- A Comparative User Study
Visual Encodings of Temporal Uncertainty- A Comparative User Study
 
Ambient influence
Ambient influenceAmbient influence
Ambient influence
 
The effect of social media comments on consumers’ responses to food safety in...
The effect of social media comments on consumers’ responses to food safety in...The effect of social media comments on consumers’ responses to food safety in...
The effect of social media comments on consumers’ responses to food safety in...
 
160428 Do Users' Perceptions of Password Security Match Reality?
160428 Do Users' Perceptions of Password Security Match Reality?160428 Do Users' Perceptions of Password Security Match Reality?
160428 Do Users' Perceptions of Password Security Match Reality?
 

Similar to Applied Artificial Intelligence and Trust

200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report
david19860080
 
What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?
Nozha Boujemaa
 
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
IJCI JOURNAL
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
Altimeter, a Prophet Company
 
'Humans still needed' - research project reveals impact of artificial intelli...
'Humans still needed' - research project reveals impact of artificial intelli...'Humans still needed' - research project reveals impact of artificial intelli...
'Humans still needed' - research project reveals impact of artificial intelli...
Chartered Institute of Public Relations
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
Juniper Networks
 
Learning from the People: Responsibly Encouraging Adoption of Contact Tracing...
Learning from the People: Responsibly Encouraging Adoption of Contact Tracing...Learning from the People: Responsibly Encouraging Adoption of Contact Tracing...
Learning from the People: Responsibly Encouraging Adoption of Contact Tracing...
Elissa Redmiles
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
Edgar Alejandro Villegas
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
Role of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfRole of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdf
Bob Marcus
 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018
Peerasak C.
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
FireEye, Inc.
 
AI Technology Longevity Wealth Planning
AI Technology Longevity Wealth PlanningAI Technology Longevity Wealth Planning
AI Technology Longevity Wealth Planning
JDean8
 
Report Car HMI USA 2019
Report Car HMI USA 2019Report Car HMI USA 2019
Report Car HMI USA 2019
Maria Willamowius
 
Virginia Dignum, Associate professor on Social Artificial Intelligence at TU ...
Virginia Dignum, Associate professor on Social Artificial Intelligence at TU ...Virginia Dignum, Associate professor on Social Artificial Intelligence at TU ...
Virginia Dignum, Associate professor on Social Artificial Intelligence at TU ...
Codiax
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)
PwC France
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
University of Geneva
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
AVG Technologies
 
Robotics and Artificial Intelligence.pdf
Robotics and Artificial Intelligence.pdfRobotics and Artificial Intelligence.pdf
Robotics and Artificial Intelligence.pdf
shafayanwer866
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
 

Similar to Applied Artificial Intelligence and Trust (20)

200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report200820 digital-wallet-interview-findings-report
200820 digital-wallet-interview-findings-report
 
What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?
 
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
 
'Humans still needed' - research project reveals impact of artificial intelli...
'Humans still needed' - research project reveals impact of artificial intelli...'Humans still needed' - research project reveals impact of artificial intelli...
'Humans still needed' - research project reveals impact of artificial intelli...
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Learning from the People: Responsibly Encouraging Adoption of Contact Tracing...
Learning from the People: Responsibly Encouraging Adoption of Contact Tracing...Learning from the People: Responsibly Encouraging Adoption of Contact Tracing...
Learning from the People: Responsibly Encouraging Adoption of Contact Tracing...
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Role of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfRole of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdf
 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
AI Technology Longevity Wealth Planning
AI Technology Longevity Wealth PlanningAI Technology Longevity Wealth Planning
AI Technology Longevity Wealth Planning
 
Report Car HMI USA 2019
Report Car HMI USA 2019Report Car HMI USA 2019
Report Car HMI USA 2019
 
Virginia Dignum, Associate professor on Social Artificial Intelligence at TU ...
Virginia Dignum, Associate professor on Social Artificial Intelligence at TU ...Virginia Dignum, Associate professor on Social Artificial Intelligence at TU ...
Virginia Dignum, Associate professor on Social Artificial Intelligence at TU ...
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
Robotics and Artificial Intelligence.pdf
Robotics and Artificial Intelligence.pdfRobotics and Artificial Intelligence.pdf
Robotics and Artificial Intelligence.pdf
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...
 

More from Minjoon Kim

A Literature Review of Quantitative Persona Creation
A Literature Review of Quantitative Persona CreationA Literature Review of Quantitative Persona Creation
A Literature Review of Quantitative Persona Creation
Minjoon Kim
 
Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Mak...
Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Mak...Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Mak...
Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Mak...
Minjoon Kim
 
A Picture-based Approach to Recommender Systems
A Picture-based Approach to Recommender SystemsA Picture-based Approach to Recommender Systems
A Picture-based Approach to Recommender Systems
Minjoon Kim
 
Preference Elicitation as an Optimization Problem - Sepliarskaia, et al
Preference Elicitation as an Optimization Problem - Sepliarskaia, et alPreference Elicitation as an Optimization Problem - Sepliarskaia, et al
Preference Elicitation as an Optimization Problem - Sepliarskaia, et al
Minjoon Kim
 
Relating Personality Types with User Preferences in Multiple Entertainment Do...
Relating Personality Types with User Preferences in Multiple Entertainment Do...Relating Personality Types with User Preferences in Multiple Entertainment Do...
Relating Personality Types with User Preferences in Multiple Entertainment Do...
Minjoon Kim
 
Behavioral Change Theories in HCI
Behavioral Change Theories in HCIBehavioral Change Theories in HCI
Behavioral Change Theories in HCI
Minjoon Kim
 
The User Experience of Chatbots - Nielsen Norman Group
The User Experience of Chatbots - Nielsen Norman GroupThe User Experience of Chatbots - Nielsen Norman Group
The User Experience of Chatbots - Nielsen Norman Group
Minjoon Kim
 
HCI Research as Problem-Solving
HCI Research as Problem-SolvingHCI Research as Problem-Solving
HCI Research as Problem-Solving
Minjoon Kim
 
iConference 2017 후기
iConference 2017 후기iConference 2017 후기
iConference 2017 후기
Minjoon Kim
 
Towards A Rigorous Science of Interpretable Machine Learning
Towards A Rigorous Science of Interpretable Machine LearningTowards A Rigorous Science of Interpretable Machine Learning
Towards A Rigorous Science of Interpretable Machine Learning
Minjoon Kim
 
Contextual Aspects of Typical Viewing Situations - Vanattenhoven, Geerts
Contextual Aspects of Typical Viewing Situations - Vanattenhoven, GeertsContextual Aspects of Typical Viewing Situations - Vanattenhoven, Geerts
Contextual Aspects of Typical Viewing Situations - Vanattenhoven, Geerts
Minjoon Kim
 

More from Minjoon Kim (11)

A Literature Review of Quantitative Persona Creation
A Literature Review of Quantitative Persona CreationA Literature Review of Quantitative Persona Creation
A Literature Review of Quantitative Persona Creation
 
Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Mak...
Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Mak...Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Mak...
Nudge Me Right: Personalizing Online Security Nudges to People’s Decision-Mak...
 
A Picture-based Approach to Recommender Systems
A Picture-based Approach to Recommender SystemsA Picture-based Approach to Recommender Systems
A Picture-based Approach to Recommender Systems
 
Preference Elicitation as an Optimization Problem - Sepliarskaia, et al
Preference Elicitation as an Optimization Problem - Sepliarskaia, et alPreference Elicitation as an Optimization Problem - Sepliarskaia, et al
Preference Elicitation as an Optimization Problem - Sepliarskaia, et al
 
Relating Personality Types with User Preferences in Multiple Entertainment Do...
Relating Personality Types with User Preferences in Multiple Entertainment Do...Relating Personality Types with User Preferences in Multiple Entertainment Do...
Relating Personality Types with User Preferences in Multiple Entertainment Do...
 
Behavioral Change Theories in HCI
Behavioral Change Theories in HCIBehavioral Change Theories in HCI
Behavioral Change Theories in HCI
 
The User Experience of Chatbots - Nielsen Norman Group
The User Experience of Chatbots - Nielsen Norman GroupThe User Experience of Chatbots - Nielsen Norman Group
The User Experience of Chatbots - Nielsen Norman Group
 
HCI Research as Problem-Solving
HCI Research as Problem-SolvingHCI Research as Problem-Solving
HCI Research as Problem-Solving
 
iConference 2017 후기
iConference 2017 후기iConference 2017 후기
iConference 2017 후기
 
Towards A Rigorous Science of Interpretable Machine Learning
Towards A Rigorous Science of Interpretable Machine LearningTowards A Rigorous Science of Interpretable Machine Learning
Towards A Rigorous Science of Interpretable Machine Learning
 
Contextual Aspects of Typical Viewing Situations - Vanattenhoven, Geerts
Contextual Aspects of Typical Viewing Situations - Vanattenhoven, GeertsContextual Aspects of Typical Viewing Situations - Vanattenhoven, Geerts
Contextual Aspects of Typical Viewing Situations - Vanattenhoven, Geerts
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Applied Artificial Intelligence and Trust

  • 1. Applied Artificial Intelligence and Trust - The Case of Autonomous Vehicles and Medical Assistance Devices + Technological Forecasting & Social Change - Monika Hengstler et al. / 김민준
  • 2. Table of Contents 2 1. Paper 1 1. Background 2. Trust 3. Trust in the Technology 4. Case Studies 5. Results 2. Paper 2 1. Perceived Safety 2. Anthropomorphism 3. Experimental Results 3. Takeaways
  • 3. Background ADAS 및 자율주행의 인지부하 3 Google Self-driving Car • Starting in 2012, Google’s self-driving cars logged 1,600,000 km by June of 2015 • A total of 14 accidents recorded by July 2015 — no accidents caused by Google 14 accidents on 1,600,000 km? Pretty good!!
  • 4. Background ADAS 및 자율주행의 인지부하 4 Google Self-driving Car 14 accidents on 1,600,000 km? Pretty good!! People complained that Google’s self-driving cars were “unpredictable” • Starting in 2012, Google’s self-driving cars logged 1,600,000 km by June of 2015 • A total of 14 accidents recorded by July 2015 — no accidents caused by Google
  • 5. Trust 5 “In interpersonal relationships, the essence of trust is the willingness to be vulnerable to the actions of another person” (Mayer et al., 1995) “Trust provides a valid foundation for describing the relationship between huma 1. Trust in the technology 2. Trust in the innovating firm and its communication Trust, Perceived Risk, and Trust in Innovation
  • 6. Trust and Perceived Risk 6 Perceived Risk : a combination of uncertainty plus the seriousness of the outcome involved Perceived Risk in Innovation? : uncertainty about the possibility of failure of a new product, or the likelihood that the product will not work properly directly linked with adoption Trust, Perceived Risk, and Trust in Innovation
  • 7. Trust in the Technology 7 1. Trust is mainly driven by the predictability of the technology 2. Over time, the driver of trust becomes dependability (consistent) 3. Ultimately, the relationship shifts to faith (reliability) Trust, Perceived Risk, and Trust in Innovation
  • 8. Trust in the Innovating Firm and its Communication 8 “Trust in the innovating firm and its communication influence the adoption decision…” (Sternthal et al. 1978) Trust, Perceived Risk, and Trust in Innovation
  • 9. Trust in the Innovating Firm and its Communication 9 “… Particularly in the early stage of commercialization, when customer knowledge is low and an extensive public discourse have not yet emerged…” Trust, Perceived Risk, and Trust in Innovation
  • 10. Trust in the Innovating Firm and its Communication 10 “… Particularly in the early stage of commercialization, when customer knowledge is low and an extensive public discourse have not yet emerged…” Trust, Perceived Risk, and Trust in Innovation
  • 11. Case Studies 11 Selection Criteria 1. Identified industries in which applications of AI have provoked skepticism 2. Selected cases that satisfied four conditions: 1. the application contains a component of AI 2. the application compensates for human flaws or supplements human decision making 3. the application is on the market or is close to market introduction 4. the application requires user involvement Selection Criteria
  • 12. Case Studies 12 Healthcare Automation Medical Technology IBM Watson HP AiCure Fraunhofer IPA Care-O-Bot 3
  • 13. Case Studies 13 Transportation Automation Transportation Industry BMW Deutsche Bahn ZF Friedrichshafen AGDaimler - Future Trucks VAG Nürnberg
  • 14. Data Collection 14 Sources 1. Semi-structured Interviews 2. Informal follow-ups via emails and phone calls 3. Archival data Pilot Interviews managers & engineers from the target industries + executives from outside the target industries
  • 15. Results 15 Insights Gained from Target Analysis 1. Operational safety is necessary to initiate performance trust 2. Data security is an eminent factor influencing trust 3. Cognitive Compatibility, Trialability, Usability • A fundamental determinant of trust in the technology • A flawed system will not be trusted • Operational safety is necessary, but not sufficient for acceptance
  • 16. Results 16 Insights Gained from Target Analysis 1. Operational safety is necessary to initiate performance trust 2. Data security is an eminent factor influencing trust 3. Cognitive Compatibility, Trialability, Usability • In transportation, data security = operational safety • In healthcare, privacy protection is a major issue since all applications deal with sensitive personal data
  • 17. Results 17 Insights Gained from Target Analysis 1. Operational safety is necessary to initiate performance trust 2. Data security is an eminent factor influencing trust 3. Cognitive Compatibility, Trialability, Usability • Cognitive compatibility : compatibility between what people feel or think about an innovation - Understandability • Trialability : a strategy to enhance understanding. Displaying technological progress and providing a visualization of the concrete benefits, and thereby reducing perceived risk • Usability : ease of use, an intuitive interface, balance between control and autonomy
  • 18. Can Autonomous Vehicles be Safe and Trustworthy? Effects of Appearance and Autonomy of Unmanned Driving Systems + Int’l Journal of HCI - Jae-Gil Lee et al. / 김민준 x 2016 Spring
  • 19. Perceived Safety Reducing Human Error 19 Automation is believed to be an effective way to reduce the human errors that con Unmanned driving systems may increase perceived safety by explicitly removing
  • 20. Perceived Safety Reducing Human Error 20 Automation is believed to be an effective way to reduce the human errors that con Unmanned driving systems may increase perceived safety by explicitly removing Not Currently Possible
  • 21. Anthropomorphism and Social Presence Increasing Humanness 21 Anthropomorphism : the attribution of humanlike characteristics to inanimate, artificial agents such as computers and robots Individuals mindlessly apply social rules and expectations when they interact with
  • 22. Anthropomorphism and Social Presence Increasing Humanness 22
  • 23. Anthropomorphism and Social Presence Increasing Humanness 23 Assigning anthropomorphic cues such as agency, gender, and personality is one way to make the quality of human-robot interaction more socially meaningful = increasing trust Human-like appearance and high autonomy in an unmanned driving system enhance the system’s similarity to humans
  • 24. Anthropomorphism and Social Presence Increasing Humanness 24 Assigning anthropomorphic cues such as agency, gender, and personality is one way to make the quality of human-robot interaction more socially meaningful = increasing trust Human-like appearance and high autonomy in an unmanned driving system enhance the system’s similarity to humans
  • 25. Experiment Setup The Effects of Appearance and Autonomy on User Perception 25
  • 26. Results The Effects of Appearance and Autonomy on User Perception 26 Pearson’s r correlation analyses conducted to examine the relationship between social presence and the measure variables
  • 27. Takeaways Findings on Semi-autonomous Vehicles and their Perceptions 27 How do we make semi-autonomous driving appear more human than it is? There needs to be a trialability factor : how do we allow other drivers to predict, and ultimately have faith in semi-autonomous vehicles Finding the balance between control and autonomy