Skip to main content
Log in

Incorporating behavioral trust theory into system development for ubiquitous applications

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Trust has been shown to be a key factor for technology adoption by users, that is, users prefer to use applications they trust. While existing literature on trust originating in computer science mostly revolves around aspects of information security, authentication, etc., research on trust in automation—originating from behavioral sciences—almost exclusively focuses on the sociotechnical context in which applications are embedded. The behavioral theory of trust in automation aims at explaining the formation of trust, helping to identify countermeasures for users’ uncertainties that lead to lessened trust in an application. We hence propose an approach to augment the system development process of ubiquitous systems with insights into behavioral trust theory. Our approach enables developers to derive design elements that help foster trust in their application by performing four key activities: identifying users’ uncertainties, linking them to trust antecedents from theory, deducting functional requirements and finally designing trust-supporting design elements (TSDEs). Evaluating user feedback on two recommender system prototypes, gathered in a study with over 160 participants, we show that by following our process, we were able to derive four TSDEs that helped to significantly increase the users’ trust in the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semant Sci Serv Agents World Wide Web 5(2):58–71

    Article  Google Scholar 

  2. Stephens RT (2004) A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry. Paper presented at the 42nd annual Southeast Regional Conference (ACM-SE), Huntsville, 02–03 April 2004

  3. Gerd tom Markotten D, Kaiser J (2000) Usable security—challenges and model for e-commerce systems. Wirtschaftsinformatik 6:531–538

    Article  Google Scholar 

  4. Lee JD, See KA (2004) Trust in automation: designing for appropriate reliance. Hum Factors 46(1):50–80

    Google Scholar 

  5. Söllner M, Hoffmann A, Hoffmann H, Leimeister JM (2012) How to use behavioral research insights on trust for HCI system design. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2012), Austin, 05–10 May 2012

  6. Sommerville I (2007) Software engineering, 8th edn. Addison-Wesley, Harlow

    MATH  Google Scholar 

  7. Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51–90

    Google Scholar 

  8. Viega J, Kohno T, Potter B (2001) Trust (and mistrust) in secure applications. Commun ACM 44(2):31–36

    Article  Google Scholar 

  9. Avizienis A, Laprie J-C, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11–33

    Article  Google Scholar 

  10. Sillence E, Briggs P, Fishwick L, Harris P (2004) Trust and mistrust of online health sites. Paper presented at the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2004), Vienna, 24–29 April 2004

  11. Rousseau DM, Sitkin SB (1998) Not so different at all: a cross disciplinary view of trust. Acad Manag Rev 23(3):393–404

    Article  Google Scholar 

  12. Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manag Rev 20(3):709–734

    Google Scholar 

  13. Gambetta D (1990) Can we trust trust? In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213–237

    Google Scholar 

  14. Vance A, Elie-Dit-Cosaque C, Straub DW (2008) Examining trust in information technology artifacts: the effects of system quality and culture. J Manag Inf Syst 24(4):73–100

    Article  Google Scholar 

  15. Jarvis CB, Mackenzie SB, Podsakoff PM (2003) A critical review of construct indicators and measurement model misspecification in marketing and consumer research. J Consum Res 30(2):199–218

    Article  Google Scholar 

  16. Muir BM (1994) Trust in automation: part I. Theoretical issues in the study of trust and human intervention in automated systems. Ergonomics 37(11):1905–1922

    Article  Google Scholar 

  17. Söllner M, Leimeister JM (2010) 15 years of measurement model misspecification in trust research? A theory based approach to solve this problem. In: 10th Academy of Management Annual Meeting, Rome

  18. Shankar V, Urban GL, Sultan F (2002) Online trust: a stakeholder perspective, concepts, implications, and future directions. J Strateg Inf Syst 11(3–4):325–344

    Article  Google Scholar 

  19. Söllner M, Hoffmann A, Hoffmann H, Leimeister JM (2011) Towards a theory of explanation and prediction for the formation of trust in IT artifacts. Paper presented at the 10. Annual Workshop on HCI Research in MIS, Shanghai, 04 December 2011

  20. Shirey R (2000) RFC 4949—internet security glossary, version 2. The Internet Society, Geneva

  21. Leimeister JM, Ebner W, Krcmar H (2005) Design, implementation, and evaluation of trust-supporting components in virtual communities for patients. J Manag Inf Syst 21(4):101–135

    Google Scholar 

  22. Manouchehri S, Söllner M, Leimeister JM (2010) Trust as a design aspect of context aware systems. In: Beigl M, Cazorla-Almeida FJ (eds) Proceedings of the 23rd international conference on architecture of computing systems (ARCS 2010), Hannover, Germany, pp 183–190

  23. Patrick AS, Briggs P, Marsh S (2005) Designing systems that people will trust. In: Cranor L, Garfinkel S (eds) Security and usability: designing secure systems that people can use. O’Reilly, Sebastopol, pp 75–100

    Google Scholar 

  24. Sutcliffe A (1998) Scenario-based requirements analysis. Requir Eng 3(1):48–65

    Article  Google Scholar 

  25. Kotonya G, Sommerville I (1996) Requirements engineering with viewpoints. Softw Eng J 11(1):5–18

    Article  Google Scholar 

  26. Herrmann A, Daneva M (2008) Requirements prioritization based on benefit and cost prediction: an agenda for future research. Paper presented at the 16th IEEE International Requirements Engineering Conference, Barcelona, 08–12 September 2008

  27. Boehm B, Grünbacher P, Briggs RO (2001) Developing groupware for requirements negotiation: lessons learned. IEEE Distrib Syst Online 18(3):46–55

    Google Scholar 

  28. Pohl K (2008) Requirements engineering. dpunkt Verlag, Heidelberg

  29. Chung L, Nixon BA, Yu E, Mylopoulos J (2000) Non-functional requirements in software engineering. Kluwer, Boston

    Book  MATH  Google Scholar 

  30. Cleland-Huang J, Settimi R, BenKhadra O, Berezhanskaya E, Christina S (2005) Goal-centric traceability for managing non-functional requirements. In: 27th international conference on software engineering. ACM, St. Louis, pp 362–371

  31. Gross D, Yu E (2001) From non-functional requirements to design through patterns. Requir Eng 6(1):18–36

    Article  MATH  MathSciNet  Google Scholar 

  32. Withall S (2007) Software requirement patterns. Microsoft Press, Redmond

    Google Scholar 

  33. Martin D, Rouncefield M, Sommerville I (2006) Patterns for dependable design. In: Clarke K, Hardstone G, Rouncefield M, Sommerville I (eds) Trust in technology: a socio-technical perspective. Springer, Doordrecht, pp 147–168

    Chapter  Google Scholar 

  34. Melville P, Sindhwani V (2010) Recommender systems. In: Sammut C, Webb G (eds) Encyclopedia of machine learning. Springer, Berlin, pp 829–837

    Google Scholar 

  35. Lewis C, Rieman J (1993) Task-centered user interface design: a practical introduction. University of Colorado, Boulder

    Google Scholar 

  36. Nielsen J (1993) Usability engineering. Morgan Kaufmann, San Francisco

    MATH  Google Scholar 

  37. Kotonya G, Sommerville I (1998) Requirements engineering: processes and techniques. Wiley, Chichester

    Google Scholar 

  38. Forrester Research (2009) North American Technographics Media and Marketing Online Survey. Forrester Research, Inc., Cambridge

  39. Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the facebook. In: Danezis G, Golle P (eds) Privacy enhancing technologies, vol 4258. Lecture notes in computer science. Springer, Berlin, pp 36–58. doi:10.1007/11957454_3

  40. Salber D, Coutaz J (1993) Applying the Wizard of Oz technique to the study of multimodal systems. In: Bass L, Gornostaev J, Unger C (eds) Selected papers from the third international conference on human-computer interaction, vol 753. Lecture notes in computer science. Springer, Berlin, pp 219–230

    Google Scholar 

  41. Muir BM, Moray N (1996) Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3):429–460

    Article  Google Scholar 

Download references

Acknowledgments

The authors thank Hesse’s Ministry of Higher Education, Research, and the Arts for funding their research within the VENUS research cluster at the interdisciplinary Research Center for Information System Design (ITeG) at Kassel University as part of the research funding program "LOEWE". Parts of this research was developed in the scope of the project Value4Cloud, funded by the German Federal Ministry for Economics and Technology (FKZ: 01MD11043A).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Holger Hoffmann.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hoffmann, H., Söllner, M. Incorporating behavioral trust theory into system development for ubiquitous applications. Pers Ubiquit Comput 18, 117–128 (2014). https://doi.org/10.1007/s00779-012-0631-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0631-1

Keywords

Navigation