Skip to main content

Perspectives on Information Technology Artefacts in Trust-Related Interactions

  • Conference paper
  • First Online:
HCI for Cybersecurity, Privacy and Trust (HCII 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12210))

Included in the following conference series:

Abstract

Current research often tries to measure trust in technology or argues about the possibility or plausibility of trust in technology, while neglecting other influences Information Technology artefacts (IT) might have on situations involving trust. To broaden the outlook on this area, this article focuses on perspectives that can be taken in terms of the roles IT might play in interactions that involve trust. The results of this theoretical approach provide a role framework for IT in trust-related interactions distinguishing the role of IT between a) a simple interaction enabler between two other entities, b) a mechanism for mitigating risk in an interaction between two other entities, c) a tool used in an interaction, and d) a trustee in an interaction. In addition, assumptions on the differences these roles might have on the perception of the users, i.e. reliability, control, and trust, are given for each role. Giving future research and practitioners the possibility to use the roles of the framework as lenses for further work in the area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alzahrani, L., Al-Karaghouli, W., Weerakkody, V.: Analysing the critical factors influencing trust in e-government adoption from citizens’ perspective: a systematic review and a conceptual framework. Int. Bus. Rev. 26(1), 164–175 (2017). https://doi.org/10.1016/j.ibusrev.2016.06.004

    Article  Google Scholar 

  2. Beck, R., Stenum Czepluch, J., Lollike, N., Malone, S.: Blockchain-the gateway to trust-free cryptographic transactions. In: Proceedings to the European Conference on Information Systems, ECIS, Research Papers (2016). https://aisel.aisnet.org/ecis2016_rp/153

  3. Daft, R.L., Lengel, R.H.: Organizational information requirements, media richness and structural design. Manage. Sci. 32(5), 554–571 (1986). https://doi.org/10.1287/mnsc.32.5.554

    Article  Google Scholar 

  4. Das, T., Teng, B.S.: The risk-based view of trust: a conceptual framework. J. Bus. Psychol. 19(1), 85–116 (2004). https://doi.org/10.1023/B:JOBU.0000040274.23551.1b

    Article  Google Scholar 

  5. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manage. Sci. 35(8), 982–1003 (1989). https://www.jstor.org/stable/2632151

  6. Friedman, B., Khan Jr., P.H., Howe, D.C.: Trust online. Commun. ACM 43(12), 34–40 (2000). https://doi.org/10.1145/355112.355120

    Article  Google Scholar 

  7. Gefen, D., Karahanna, E., Straub, D.W.: Trust and tam in online shopping: an integrated model. MIS Q. 27(1), 51–90 (2003). https://doi.org/10.2307/30036519

    Article  Google Scholar 

  8. Gregor, S.: The nature of theory in information systems. MIS Q. 30(3), 611–642 (2006). https://doi.org/10.2307/25148742

    Article  Google Scholar 

  9. Lankton, N.K., McKnight, D.H.: What does it mean to trust facebook? Examining technology and interpersonal trust beliefs. ACM SIGMIS Database DATABASE Adv. Inf. Syst. 42(2), 32–54 (2011). https://doi.org/10.1145/1989098.1989101

    Article  Google Scholar 

  10. Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. Hum. Factors 46(1), 50–80 (2004). https://doi.org/10.1518/hfes.46.1.50_30392

    Article  Google Scholar 

  11. Mayer, R.C., Davis, J.H., Schoorman, D.F.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995). https://doi.org/10.5465/AMR.1995.9508080335

    Article  Google Scholar 

  12. McGregor, S.E., Charters, P., Holliday, T., Roesner, F.: Investigating the computer security practices and needs of journalists. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 15), pp. 399–414. \(\{\)USENIX\(\}\) Association, Washington, D.C. (2015). https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/mcgregor

  13. McKnight, D.H., Carter, M., Thatcher, J.B., Clay, P.F.: Trust in a specific technology: an investigation of its components and measures. ACM Trans. Manage. Inf. Syst. 2(2), 1–25 (2011). https://doi.org/10.1145/1985347.1985353

    Article  Google Scholar 

  14. Nass, C., Moon, Y.: Machines and mindlessness: social responses to computers. J. Soc. Issues 56(1), 81–103 (2000). https://doi.org/10.1111/0022-4537.00153

    Article  Google Scholar 

  15. Nass, C., Steuer, J., Tauber, E.R.: Computers are social actors. In: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 72–78 (1994). https://doi.org/10.1145/191666.191703

  16. Notheisen, B., Cholewa, J.B., Shanmugam, A.P.: Trading real-world assets on blockchain. Bus. Inf. Syst. Eng. 59(6), 425–440 (2017). https://doi.org/10.1007/s12599-017-0499-8

    Article  Google Scholar 

  17. Rosenbloom, A.: Trusting technology: introduction. Commun. ACM 43(12), 31–32 (2000). https://doi.org/10.1145/355112.355119

    Article  Google Scholar 

  18. Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manage. Rev. 23(3), 393–404 (1998). https://doi.org/10.5465/amr.1998.926617

    Article  Google Scholar 

  19. Schoorman, F.D., Wood, M.M., Breuer, C.: Would trust by any other name smell as sweet? reflections on the meanings and uses of trust across disciplines and context. In: Bornstein, B.H., Tomkins, A.J. (eds.) Motivating Cooperation and Compliance with Authority. NSM, vol. 62, pp. 13–35. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16151-8_2

    Chapter  Google Scholar 

  20. Shareef, M.A., Archer, N., Dwivedi, Y.K.: An empirical investigation of electronic government service quality: from the demand-side stakeholder perspective. Total Qual. Manage. Bus. Excel. 26(3–4), 339–354 (2015). https://doi.org/10.1080/14783363.2013.832477

    Article  Google Scholar 

  21. Shneiderman, B.: Designing trust into online experiences. Commun. ACM 43(12), 57–59 (2000). https://doi.org/10.1145/355112.355124

    Article  Google Scholar 

  22. Söllner, M., Hoffmann, A., Hoffmann, H., Wacker, A., Leimeister, J.M.: Understanding the formation of trust in IT artifacts. In: Proceedings of the International Conference on Information Systems, ICIS (2012)

    Google Scholar 

  23. Söllner, M., Hoffmann, A., Leimeister, J.M.: Why different trust relationships matter for information systems users. Eur. J. Inf. Syst. 25(3), 274–287 (2016). https://doi.org/10.1057/ejis.2015.17

    Article  Google Scholar 

  24. Solomon, R.C., Flores, F.: Building Trust: In Business, Politics, Relationships, and Life. Oxford University Press, Oxford (2003)

    Book  Google Scholar 

  25. Stephanidis, C., et al.: Seven HCI grand challenges. Int. J. Hum. Comput. Inter. 35(14), 1229–1269 (2019). https://doi.org/10.1080/10447318.2019.1619259

    Article  Google Scholar 

  26. Thielsch, M.T., Meeßen, S.M., Hertel, G.: Trust and distrust in information systems at the workplace. PeerJ 6, e5483 (2018). https://doi.org/10.7717/peerj.5483

    Article  Google Scholar 

  27. Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003). https://doi.org/10.2307/30036540

    Article  Google Scholar 

  28. Welch, E.W., Hinnant, C.C., Moon, M.J.: Linking citizen satisfaction with e-government and trust in government. J. Public Adm. Res. Theor. 15(3), 371–391 (2005). https://doi.org/10.1093/jopart/mui021

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the “Trust and Communication in a Digitized World” research project (promotion reference 1712/1), funded by the German Research Foundation (DFG).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Holger Koelmann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Koelmann, H. (2020). Perspectives on Information Technology Artefacts in Trust-Related Interactions. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2020. Lecture Notes in Computer Science(), vol 12210. Springer, Cham. https://doi.org/10.1007/978-3-030-50309-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-50309-3_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-50308-6

  • Online ISBN: 978-3-030-50309-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics