Abstract
Current research often tries to measure trust in technology or argues about the possibility or plausibility of trust in technology, while neglecting other influences Information Technology artefacts (IT) might have on situations involving trust. To broaden the outlook on this area, this article focuses on perspectives that can be taken in terms of the roles IT might play in interactions that involve trust. The results of this theoretical approach provide a role framework for IT in trust-related interactions distinguishing the role of IT between a) a simple interaction enabler between two other entities, b) a mechanism for mitigating risk in an interaction between two other entities, c) a tool used in an interaction, and d) a trustee in an interaction. In addition, assumptions on the differences these roles might have on the perception of the users, i.e. reliability, control, and trust, are given for each role. Giving future research and practitioners the possibility to use the roles of the framework as lenses for further work in the area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alzahrani, L., Al-Karaghouli, W., Weerakkody, V.: Analysing the critical factors influencing trust in e-government adoption from citizens’ perspective: a systematic review and a conceptual framework. Int. Bus. Rev. 26(1), 164–175 (2017). https://doi.org/10.1016/j.ibusrev.2016.06.004
Beck, R., Stenum Czepluch, J., Lollike, N., Malone, S.: Blockchain-the gateway to trust-free cryptographic transactions. In: Proceedings to the European Conference on Information Systems, ECIS, Research Papers (2016). https://aisel.aisnet.org/ecis2016_rp/153
Daft, R.L., Lengel, R.H.: Organizational information requirements, media richness and structural design. Manage. Sci. 32(5), 554–571 (1986). https://doi.org/10.1287/mnsc.32.5.554
Das, T., Teng, B.S.: The risk-based view of trust: a conceptual framework. J. Bus. Psychol. 19(1), 85–116 (2004). https://doi.org/10.1023/B:JOBU.0000040274.23551.1b
Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manage. Sci. 35(8), 982–1003 (1989). https://www.jstor.org/stable/2632151
Friedman, B., Khan Jr., P.H., Howe, D.C.: Trust online. Commun. ACM 43(12), 34–40 (2000). https://doi.org/10.1145/355112.355120
Gefen, D., Karahanna, E., Straub, D.W.: Trust and tam in online shopping: an integrated model. MIS Q. 27(1), 51–90 (2003). https://doi.org/10.2307/30036519
Gregor, S.: The nature of theory in information systems. MIS Q. 30(3), 611–642 (2006). https://doi.org/10.2307/25148742
Lankton, N.K., McKnight, D.H.: What does it mean to trust facebook? Examining technology and interpersonal trust beliefs. ACM SIGMIS Database DATABASE Adv. Inf. Syst. 42(2), 32–54 (2011). https://doi.org/10.1145/1989098.1989101
Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. Hum. Factors 46(1), 50–80 (2004). https://doi.org/10.1518/hfes.46.1.50_30392
Mayer, R.C., Davis, J.H., Schoorman, D.F.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995). https://doi.org/10.5465/AMR.1995.9508080335
McGregor, S.E., Charters, P., Holliday, T., Roesner, F.: Investigating the computer security practices and needs of journalists. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 15), pp. 399–414. \(\{\)USENIX\(\}\) Association, Washington, D.C. (2015). https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/mcgregor
McKnight, D.H., Carter, M., Thatcher, J.B., Clay, P.F.: Trust in a specific technology: an investigation of its components and measures. ACM Trans. Manage. Inf. Syst. 2(2), 1–25 (2011). https://doi.org/10.1145/1985347.1985353
Nass, C., Moon, Y.: Machines and mindlessness: social responses to computers. J. Soc. Issues 56(1), 81–103 (2000). https://doi.org/10.1111/0022-4537.00153
Nass, C., Steuer, J., Tauber, E.R.: Computers are social actors. In: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 72–78 (1994). https://doi.org/10.1145/191666.191703
Notheisen, B., Cholewa, J.B., Shanmugam, A.P.: Trading real-world assets on blockchain. Bus. Inf. Syst. Eng. 59(6), 425–440 (2017). https://doi.org/10.1007/s12599-017-0499-8
Rosenbloom, A.: Trusting technology: introduction. Commun. ACM 43(12), 31–32 (2000). https://doi.org/10.1145/355112.355119
Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C.: Not so different after all: a cross-discipline view of trust. Acad. Manage. Rev. 23(3), 393–404 (1998). https://doi.org/10.5465/amr.1998.926617
Schoorman, F.D., Wood, M.M., Breuer, C.: Would trust by any other name smell as sweet? reflections on the meanings and uses of trust across disciplines and context. In: Bornstein, B.H., Tomkins, A.J. (eds.) Motivating Cooperation and Compliance with Authority. NSM, vol. 62, pp. 13–35. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16151-8_2
Shareef, M.A., Archer, N., Dwivedi, Y.K.: An empirical investigation of electronic government service quality: from the demand-side stakeholder perspective. Total Qual. Manage. Bus. Excel. 26(3–4), 339–354 (2015). https://doi.org/10.1080/14783363.2013.832477
Shneiderman, B.: Designing trust into online experiences. Commun. ACM 43(12), 57–59 (2000). https://doi.org/10.1145/355112.355124
Söllner, M., Hoffmann, A., Hoffmann, H., Wacker, A., Leimeister, J.M.: Understanding the formation of trust in IT artifacts. In: Proceedings of the International Conference on Information Systems, ICIS (2012)
Söllner, M., Hoffmann, A., Leimeister, J.M.: Why different trust relationships matter for information systems users. Eur. J. Inf. Syst. 25(3), 274–287 (2016). https://doi.org/10.1057/ejis.2015.17
Solomon, R.C., Flores, F.: Building Trust: In Business, Politics, Relationships, and Life. Oxford University Press, Oxford (2003)
Stephanidis, C., et al.: Seven HCI grand challenges. Int. J. Hum. Comput. Inter. 35(14), 1229–1269 (2019). https://doi.org/10.1080/10447318.2019.1619259
Thielsch, M.T., Meeßen, S.M., Hertel, G.: Trust and distrust in information systems at the workplace. PeerJ 6, e5483 (2018). https://doi.org/10.7717/peerj.5483
Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003). https://doi.org/10.2307/30036540
Welch, E.W., Hinnant, C.C., Moon, M.J.: Linking citizen satisfaction with e-government and trust in government. J. Public Adm. Res. Theor. 15(3), 371–391 (2005). https://doi.org/10.1093/jopart/mui021
Acknowledgements
This work was supported by the “Trust and Communication in a Digitized World” research project (promotion reference 1712/1), funded by the German Research Foundation (DFG).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Koelmann, H. (2020). Perspectives on Information Technology Artefacts in Trust-Related Interactions. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2020. Lecture Notes in Computer Science(), vol 12210. Springer, Cham. https://doi.org/10.1007/978-3-030-50309-3_29
Download citation
DOI: https://doi.org/10.1007/978-3-030-50309-3_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50308-6
Online ISBN: 978-3-030-50309-3
eBook Packages: Computer ScienceComputer Science (R0)