Fig. 2From: Configuring user information by considering trust threatening factors associated with automated vehiclesExamples of a a front and rear view image, b an interior cluster view, and c an exterior view of the virtual driving simulatorBack to article page