Skip to main content
Log in

Vertrauensunterstützung für sozio-technische ubiquitäre Systeme

Trust support for ubiquitous computing systems

  • ZfB-Special Issue 4/2012
  • Published:
Zeitschrift für Betriebswirtschaft Aims and scope Submit manuscript

Zusammenfassung

Vertrauensaufbau und Vertrauensunterstützung sind erfolgskritisch für die Adoption neuer IT-Systeme. Umso erstaunlicher ist, dass in der Literatur kaum etwas zur systematischen Integration der Vielzahl an verhaltensorientierten Erkenntnissen zu Vertrauen in und um IT-Systeme in deren Entwicklung zu finden ist. Das Ziel dieses Artikels ist die Entwicklung einer Methode zur Ableitung vertrauensunterstützender Komponenten für sozio-technische ubiquitäre Systeme. Die Methode wird exemplarisch auf die Entwicklung einer ubiquitären Restaurantempfehlungsanwendung angewandt. Die Anwendung wird hierdurch um vier vertrauensunterstützende Komponenten angereichert. Die so entwickelte Anwendung wird anschließend im Rahmen eines Laborexperiments mit 166 Probanden evaluiert. Hierbei wird gezeigt, dass sowohl das Vertrauen in das sozio-technische ubiquitäre System, als auch die Absicht es zu nutzen signifikant erhöht werden konnten. Soweit es den Autoren bekannt ist, beschreibt dieser Artikel als Erster, wie Vertrauen in systematischer Art und Weise in die Entwicklung sozio-technischer ubiquitärer Systeme einbezogen werden und welchen Nutzen dies stiften kann.

Abstract

Trust has been shown as a crucial factor for the adoption of new technologies. Surprisingly, trust literature offers very little guidance for systematically integrating the vast amount of behavioral trust results into the development of computing systems. The aim of this article is to develop a method for deriving trust supporting components for ubiquitous computing systems. The method is used to derive four trust supporting components for a ubiquitous restaurant recommendation system. Afterwards, the system is evaluated using a laboratory experiment with 166 undergraduate students. The results show that the users’ trust as well as their intention to use the system could be significantly increased. To the best of our knowledge, this is the first article developing and evaluating a method for systematically integrating the behavioral trust results into the development of a computing system and its value.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Abb. 1
Abb. 2
Abb. 3
Abb. 4
Abb. 5
Abb. 6
Abb. 7

Literatur

  • Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: Proceedings of the 33rd Hawai’i International Conference on System Sciences (HICSS 33), Maui, Hawai’i, 4–7 Januar 2000

  • Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  • Backhaus K, Erichson B, Plinke W, Weiber R (2006) Multivariate Analysemethoden, 11. Aufl. Springer, Berlin

    Google Scholar 

  • Bart Y, Shankar V, Sultan F, Urban GL (2005) Are the drivers and role of online trust the same for all web sites and consumers? J Marketing 69(4):133–152

    Article  Google Scholar 

  • Beier G, Spiekermann S, Rothensee M (2006) Die Akzeptanz zukünftiger Ubiquitous Computing Anwendungen. In: Heinecke AM, Paul H (Hrsg) Mensch & Computer 2006: Mensch und Computer im Strukturwandel. Oldenbourg, München, S 145

    Google Scholar 

  • Bell G, Dourish P (2007) Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Pers Ubiquit Comput 11(2):133–143

    Article  Google Scholar 

  • Berkovich M, Esch S, Mauro C, Leimeister JM, Krcmar H (2011) Towards an artifact model for requirements to IT-enabled product service systems. In: Proceedings of Wirtschaftsinformatik 2011, Zürich, 16–18 Februar 2011

  • Bharadwaj N, Matsuno K (2006) Investigating the antecedents and outcomes of customer firm transaction cost savings in a supply chain relationship. J Bus Res 59(1):62–72

    Article  Google Scholar 

  • Bortz J, Döring N (2005) Forschungsmethoden und Evaluation: für Human- und Sozialwissenschaftler, 3. Aufl. Springer, Berlin

    Google Scholar 

  • Brinkkemper S (1996) Method engineering: engineering of information systems development methods and tools. Inf Softw Technol 38(4):275–280. doi:10.1016/0950-5849(95)01059-9

    Article  Google Scholar 

  • Christophersen T, Grape C (2007) Die Erfassung latenter Konstrukte mit Hilfe formativer und reflektiver Messmodelle. In: Alberts S et al. (Hrsg) Methodik der empirischen Forschung. Gabler, Wiesbaden, S 103–118

    Chapter  Google Scholar 

  • Chung L (2000) Non-functional requirements in software engineering. Kluwer, Bosten

    Google Scholar 

  • Cleland-Huang J, Settimi R, BenKhadra O, Berezhanskaya E, Christina S (2005) Goal-centric traceability for managing non-functional requirements. ACM, New York, S 362–371

    Google Scholar 

  • Cysneiros LM, do Prado Leite JCS, de Melo Sabat Neto J (2001) A framework for integrating non-functional requirements into conceptual models. Requirements Eng 6(2):97–115

  • Demers AJ (1994) Research issues in ubiquitous computing. Paper presented at the Symposium on Principles of Distributed Computing 1994, Los Angeles, California, United States

  • Doney PM, Cannon JP (1997) An examination of the nature of trust in buyer-seller relationships. J Marketing 61:35–51

    Article  Google Scholar 

  • Eberl P (2003) Vertrauen und Management. Schäffer-Poeschel, Stuttgart

    Google Scholar 

  • Ebert TAE (2009) Facets of trust in relationships – a literature synthesis of highly ranked trust articles. J Bus Mark Manage 3(1):65–84

    Article  Google Scholar 

  • Fishbein M, Ajzen I (1975) Belief, attitude, intention, and behavior: an introduction to theory and research. Addison-Wesley, Reading, Mass

    Google Scholar 

  • Forrester Research (2009) North American technographics media and marketing online survey. Forrester Research, Inc

  • Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. J Marketing 58(2):1

    Article  Google Scholar 

  • Gefen D, Benbasat I, Pavlou PA (2008) A research agenda for trust in online environments. J Manage Info Syst 24:275–286

    Article  Google Scholar 

  • Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51–90

    Google Scholar 

  • Gefen D, Straub DW (2004) Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services. Omega 32(6):407–424

    Article  Google Scholar 

  • Gehlert A, Schermann M, Pohl K, Krcmar H (2009) Towards a research method for theory-driven design research. In: Hansen HR, Karagiannis D, Fill H-G (Hrsg) 9. Internationale Tagung Wirtschaftsinformatik. Österreichische Computer Gesellschaft, Wien, S 441–450

    Google Scholar 

  • Gregor S (2006) The nature of theory in information systems. MIS Q 30(3):611–642

    Google Scholar 

  • Gross D, Yu E (2001) From non-functional requirements to design through patterns. Requirements Eng 6(1):18–36

    Article  Google Scholar 

  • Hevner AR, March ST, Jinsoo P, Ram S (2004) Design science in information systems research. MIS Q 28(1):75–105

    Google Scholar 

  • Hoffmann A, Söllner M, Fehr A, Hoffmann H, Leimeister JM (2011) Towards an approach for developing socio-technical ubiquitous computing applications. Paper presented at the 41. Jahrestagung der Gesellschaft für Informatik, Berlin, Germany

  • Jarvis CB, Mackenzie SB, Podsakoff PM (2003) A critical review of construct indicators and measurement model misspecification in marketing and consumer research. J Cons Res 30(2):199–218

    Article  Google Scholar 

  • Kotonya G, Sommerville I (1996) Requirements engineering with viewpoints. Softw Eng J 11(1):5–18

    Article  Google Scholar 

  • Lee JD, See KA (2004) Trust in automation: designing for appropriate reliance. Hum Factors 46(1):50–80

    Google Scholar 

  • Leimeister J, Krcmar H (2006) Community-Engineering Systematischer Aufbau und Betrieb Virtueller Communitys im Gesundheitswesen. Wirtschaftsinformatik 48(6):418–429. doi:10.1007/s11576-006-0094-y

    Article  Google Scholar 

  • Leimeister JM (2012) Dienstleistungsengineering & -management. Springer Gabler, Heidelberg

    Book  Google Scholar 

  • Leimeister JM, Ebner W, Krcmar H (2005) Design, implementation and evaluation of trust-supporting components in virtual communities for patients. J Manage Info Syst 21(4):101–135

    Google Scholar 

  • Leimeister JM, Huber M, Bretschneider U, Krcmar H (2009) Leveraging crowdsourcing: activation-supporting components for IT-based ideas competition. J Manage Info Syst 26(1):197–224

    Article  Google Scholar 

  • Luhmann N (1979) Trust and power. Wiley, Chichester

    Google Scholar 

  • Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manag Rev 20(3):709–734

    Google Scholar 

  • McKnight DH, Choudhury V, Kacmar C (2002) Developing and validating trust measures for e-Commerce: an integrative typology. Info Syst Res 13(3):334–359

    Article  Google Scholar 

  • Morgan RM, Hunt SD (1994) The commitment-trust theory of relationship marketing. J Marketing 58(3):20

    Article  Google Scholar 

  • Muir BM (1994) Trust in automation: part I. Ergonomics 37(11):1905–1922

    Article  Google Scholar 

  • Muir BM, Moray N (1996) Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3):429–460

    Article  Google Scholar 

  • Mumford E, Weir M (1979) Computer systems in work design – the ETHICS method. Wiley, New York

    Google Scholar 

  • Nass C, Fogg BJ, Moon Y (1996) Can computers be teammates? Int J Hum-Comp Stud 45(6):669–678. doi:10.1006/ijhc.1996.0073

    Article  Google Scholar 

  • Nass C, Moon Y, Fogg BJ, Reeves B, Dryer DC (1995) Can computer personalities be human personalities? Int J Hum-Comp Stud 43(2):223–239. doi:10.1006/ijhc.1995.1042

    Article  Google Scholar 

  • Nass C, Steuer J, Tauber ER (1994) Computers are social actors. In: Proceedings of the Conference on Human Factors in Computing Systems (CHI), Boston, Massachusetts, United States, April 1994

  • Nielsen (2009) Consumer confidence survey. The Nielson Company

  • Nielsen J (1993) Usability engineering. Morgan Kaufmann, Amsterdam

    Google Scholar 

  • Patrick AS, Briggs P, Marsh S (2005) Designing systems that people will trust. In: Cranor L, Garfinkel S (Hrsg) Security and usability: designing secure systems that people can use. O’Reilly, Beijing

    Google Scholar 

  • Pohl K (2008) Requirements Engineering. dpunkt. Verlag, Heidelberg

    Google Scholar 

  • Pree W (1997) Komponentenbasierte Softwareentwicklung mit Frameworks. dpunkt. verlag, Heidelberg

    Google Scholar 

  • Reeves B, Nass C (1996) The media equation: how people treat computers, television, and the new media like real people and places. Cambridge University Press, Stanford

    Google Scholar 

  • Rekimoto J, Nagao K (1995) The world through the computer: computer augmented interaction with real world environments. Paper presented at the User interface and software technology 1995, Pittsburgh, Pennsylvania, United States

  • Resatsch F, Sandner U, Leimeister JM, Krcmar H (2008) Do point of sale RFID-based information services make a difference? Analyzing consumer perceptions for designing smart product information services in retail business. Electronic Mark 18(3):692–709

    Google Scholar 

  • Rousseau DM (1998) Trust in organizations: frontiers of theory and research. Adm Sci Q 43(1):186–188

    Article  Google Scholar 

  • Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different at all: a cross disziplinary view of trust. Acad Manag Rev 23(3):393–404

    Article  Google Scholar 

  • Shankar V, Urban GL, Sultan F (2002) Online trust: a stakeholder perspective, concepts, implications, and future directions. J Strateg Inf Syst 11(3–4):325–344

    Article  Google Scholar 

  • Singh J, Sirdeshmukh D (2000) Agency and trust mechanisms in consumer satisfaction and loyalty judgments. J Acad Mark Sci 28(1):150–167

    Article  Google Scholar 

  • Söllner M, Hoffmann A, Hoffmann H, Leimeister JM (2011) Towards a theory of explanation and prediction for the formation of trust in IT artifacts. In: Proceedings of the SIGHCI 2011, Paper 6

  • Söllner M, Leimeister JM (2010) Did they all get it wrong? Towards a better measurement model of trust. Paper presented at the Academy of Management Annual Meeting 2010, Montréal, Canada, 6–10 August 2010

  • Sommerville I (2007) Software engineering, 8 Aufl. Addison-Wesley, Harlow

    Google Scholar 

  • Spann M (2010) Synergien zwischen gestaltungsorientierter und verhaltensorientierter Wirtschaftsinformatik. Z betriebswirtschaftliche Forsch 62(6):677–679

    Google Scholar 

  • Spiekermann S (2007) Privacy enhancing technologies for RFID in retail – an empirical investigation.  In: UbiComp 2007: Ubiquitous Computing. S 56–72

  • Szyperski C (2002) Component software – beyond object-oriented programming, 2. Aufl. ACM Press, New York

    Google Scholar 

  • Vance A, Elie-Dit-Cosaque C, Straub DW (2008) Examining trust in information technology artifacts: the effects of system quality and culture. J Manage Info Syst 24(4):73–100

    Article  Google Scholar 

  • Wang W, Benbasat I (2005) Trust in and adoption of online recommendation agents. J Assoc Info Syst 6(3):72–101

    Google Scholar 

  • Weiser M (1991) The computer for the 21st century. Sci Am 265(3):94–104

    Article  Google Scholar 

  • Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):75–84. doi:http://doi.acm.org/10.1145/159544.159617

    Article  Google Scholar 

  • Zuboff S (1988) In the age of smart machines: the future of work technology and power. Basic Books, New York

    Google Scholar 

Download references

Danksagung

Die in diesem Beitrag vorgestellte Methode ist im Rahmen des Forschungsprojekts VENUS entstanden. VENUS ist ein Forschungsprojekt des interdisziplinären Forschungszentrums für Informationstechnik-Gestaltung (ITeG) der Universität Kassel. Wir danken dem hessischen Ministerium für Wissenschaft und Kunst für die Finanzierung des Projekts im Rahmen der Landes-Offensive zur Entwicklung Wissenschaftlich-ökonomischer Exzellenz (LOEWE). Weiterführende Informationen erhalten Sie unter: http://www.iteg.uni-kassel.de/venus.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthias Söllner.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Söllner, M., Hoffmann, A., Hoffmann, H. et al. Vertrauensunterstützung für sozio-technische ubiquitäre Systeme. Z Betriebswirtsch 82 (Suppl 4), 109–140 (2012). https://doi.org/10.1007/s11573-012-0584-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11573-012-0584-x

Schlüsselwörter

JEL Classification

Keywords

Navigation