Fig. 1From: Configuring user information by considering trust threatening factors associated with automated vehiclesThe identified scenarios based on the distrust events investigationBack to article page