Zusammenfassung
Vertrauensaufbau und Vertrauensunterstützung sind erfolgskritisch für die Adoption neuer IT-Systeme. Umso erstaunlicher ist, dass in der Literatur kaum etwas zur systematischen Integration der Vielzahl an verhaltensorientierten Erkenntnissen zu Vertrauen in und um IT-Systeme in deren Entwicklung zu finden ist. Das Ziel dieses Artikels ist die Entwicklung einer Methode zur Ableitung vertrauensunterstützender Komponenten für sozio-technische ubiquitäre Systeme. Die Methode wird exemplarisch auf die Entwicklung einer ubiquitären Restaurantempfehlungsanwendung angewandt. Die Anwendung wird hierdurch um vier vertrauensunterstützende Komponenten angereichert. Die so entwickelte Anwendung wird anschließend im Rahmen eines Laborexperiments mit 166 Probanden evaluiert. Hierbei wird gezeigt, dass sowohl das Vertrauen in das sozio-technische ubiquitäre System, als auch die Absicht es zu nutzen signifikant erhöht werden konnten. Soweit es den Autoren bekannt ist, beschreibt dieser Artikel als Erster, wie Vertrauen in systematischer Art und Weise in die Entwicklung sozio-technischer ubiquitärer Systeme einbezogen werden und welchen Nutzen dies stiften kann.
Abstract
Trust has been shown as a crucial factor for the adoption of new technologies. Surprisingly, trust literature offers very little guidance for systematically integrating the vast amount of behavioral trust results into the development of computing systems. The aim of this article is to develop a method for deriving trust supporting components for ubiquitous computing systems. The method is used to derive four trust supporting components for a ubiquitous restaurant recommendation system. Afterwards, the system is evaluated using a laboratory experiment with 166 undergraduate students. The results show that the users’ trust as well as their intention to use the system could be significantly increased. To the best of our knowledge, this is the first article developing and evaluating a method for systematically integrating the behavioral trust results into the development of a computing system and its value.
Literatur
Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: Proceedings of the 33rd Hawai’i International Conference on System Sciences (HICSS 33), Maui, Hawai’i, 4–7 Januar 2000
Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice-Hall, Englewood Cliffs
Backhaus K, Erichson B, Plinke W, Weiber R (2006) Multivariate Analysemethoden, 11. Aufl. Springer, Berlin
Bart Y, Shankar V, Sultan F, Urban GL (2005) Are the drivers and role of online trust the same for all web sites and consumers? J Marketing 69(4):133–152
Beier G, Spiekermann S, Rothensee M (2006) Die Akzeptanz zukünftiger Ubiquitous Computing Anwendungen. In: Heinecke AM, Paul H (Hrsg) Mensch & Computer 2006: Mensch und Computer im Strukturwandel. Oldenbourg, München, S 145
Bell G, Dourish P (2007) Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Pers Ubiquit Comput 11(2):133–143
Berkovich M, Esch S, Mauro C, Leimeister JM, Krcmar H (2011) Towards an artifact model for requirements to IT-enabled product service systems. In: Proceedings of Wirtschaftsinformatik 2011, Zürich, 16–18 Februar 2011
Bharadwaj N, Matsuno K (2006) Investigating the antecedents and outcomes of customer firm transaction cost savings in a supply chain relationship. J Bus Res 59(1):62–72
Bortz J, Döring N (2005) Forschungsmethoden und Evaluation: für Human- und Sozialwissenschaftler, 3. Aufl. Springer, Berlin
Brinkkemper S (1996) Method engineering: engineering of information systems development methods and tools. Inf Softw Technol 38(4):275–280. doi:10.1016/0950-5849(95)01059-9
Christophersen T, Grape C (2007) Die Erfassung latenter Konstrukte mit Hilfe formativer und reflektiver Messmodelle. In: Alberts S et al. (Hrsg) Methodik der empirischen Forschung. Gabler, Wiesbaden, S 103–118
Chung L (2000) Non-functional requirements in software engineering. Kluwer, Bosten
Cleland-Huang J, Settimi R, BenKhadra O, Berezhanskaya E, Christina S (2005) Goal-centric traceability for managing non-functional requirements. ACM, New York, S 362–371
Cysneiros LM, do Prado Leite JCS, de Melo Sabat Neto J (2001) A framework for integrating non-functional requirements into conceptual models. Requirements Eng 6(2):97–115
Demers AJ (1994) Research issues in ubiquitous computing. Paper presented at the Symposium on Principles of Distributed Computing 1994, Los Angeles, California, United States
Doney PM, Cannon JP (1997) An examination of the nature of trust in buyer-seller relationships. J Marketing 61:35–51
Eberl P (2003) Vertrauen und Management. Schäffer-Poeschel, Stuttgart
Ebert TAE (2009) Facets of trust in relationships – a literature synthesis of highly ranked trust articles. J Bus Mark Manage 3(1):65–84
Fishbein M, Ajzen I (1975) Belief, attitude, intention, and behavior: an introduction to theory and research. Addison-Wesley, Reading, Mass
Forrester Research (2009) North American technographics media and marketing online survey. Forrester Research, Inc
Ganesan S (1994) Determinants of long-term orientation in buyer-seller relationships. J Marketing 58(2):1
Gefen D, Benbasat I, Pavlou PA (2008) A research agenda for trust in online environments. J Manage Info Syst 24:275–286
Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51–90
Gefen D, Straub DW (2004) Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services. Omega 32(6):407–424
Gehlert A, Schermann M, Pohl K, Krcmar H (2009) Towards a research method for theory-driven design research. In: Hansen HR, Karagiannis D, Fill H-G (Hrsg) 9. Internationale Tagung Wirtschaftsinformatik. Österreichische Computer Gesellschaft, Wien, S 441–450
Gregor S (2006) The nature of theory in information systems. MIS Q 30(3):611–642
Gross D, Yu E (2001) From non-functional requirements to design through patterns. Requirements Eng 6(1):18–36
Hevner AR, March ST, Jinsoo P, Ram S (2004) Design science in information systems research. MIS Q 28(1):75–105
Hoffmann A, Söllner M, Fehr A, Hoffmann H, Leimeister JM (2011) Towards an approach for developing socio-technical ubiquitous computing applications. Paper presented at the 41. Jahrestagung der Gesellschaft für Informatik, Berlin, Germany
Jarvis CB, Mackenzie SB, Podsakoff PM (2003) A critical review of construct indicators and measurement model misspecification in marketing and consumer research. J Cons Res 30(2):199–218
Kotonya G, Sommerville I (1996) Requirements engineering with viewpoints. Softw Eng J 11(1):5–18
Lee JD, See KA (2004) Trust in automation: designing for appropriate reliance. Hum Factors 46(1):50–80
Leimeister J, Krcmar H (2006) Community-Engineering Systematischer Aufbau und Betrieb Virtueller Communitys im Gesundheitswesen. Wirtschaftsinformatik 48(6):418–429. doi:10.1007/s11576-006-0094-y
Leimeister JM (2012) Dienstleistungsengineering & -management. Springer Gabler, Heidelberg
Leimeister JM, Ebner W, Krcmar H (2005) Design, implementation and evaluation of trust-supporting components in virtual communities for patients. J Manage Info Syst 21(4):101–135
Leimeister JM, Huber M, Bretschneider U, Krcmar H (2009) Leveraging crowdsourcing: activation-supporting components for IT-based ideas competition. J Manage Info Syst 26(1):197–224
Luhmann N (1979) Trust and power. Wiley, Chichester
Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manag Rev 20(3):709–734
McKnight DH, Choudhury V, Kacmar C (2002) Developing and validating trust measures for e-Commerce: an integrative typology. Info Syst Res 13(3):334–359
Morgan RM, Hunt SD (1994) The commitment-trust theory of relationship marketing. J Marketing 58(3):20
Muir BM (1994) Trust in automation: part I. Ergonomics 37(11):1905–1922
Muir BM, Moray N (1996) Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3):429–460
Mumford E, Weir M (1979) Computer systems in work design – the ETHICS method. Wiley, New York
Nass C, Fogg BJ, Moon Y (1996) Can computers be teammates? Int J Hum-Comp Stud 45(6):669–678. doi:10.1006/ijhc.1996.0073
Nass C, Moon Y, Fogg BJ, Reeves B, Dryer DC (1995) Can computer personalities be human personalities? Int J Hum-Comp Stud 43(2):223–239. doi:10.1006/ijhc.1995.1042
Nass C, Steuer J, Tauber ER (1994) Computers are social actors. In: Proceedings of the Conference on Human Factors in Computing Systems (CHI), Boston, Massachusetts, United States, April 1994
Nielsen (2009) Consumer confidence survey. The Nielson Company
Nielsen J (1993) Usability engineering. Morgan Kaufmann, Amsterdam
Patrick AS, Briggs P, Marsh S (2005) Designing systems that people will trust. In: Cranor L, Garfinkel S (Hrsg) Security and usability: designing secure systems that people can use. O’Reilly, Beijing
Pohl K (2008) Requirements Engineering. dpunkt. Verlag, Heidelberg
Pree W (1997) Komponentenbasierte Softwareentwicklung mit Frameworks. dpunkt. verlag, Heidelberg
Reeves B, Nass C (1996) The media equation: how people treat computers, television, and the new media like real people and places. Cambridge University Press, Stanford
Rekimoto J, Nagao K (1995) The world through the computer: computer augmented interaction with real world environments. Paper presented at the User interface and software technology 1995, Pittsburgh, Pennsylvania, United States
Resatsch F, Sandner U, Leimeister JM, Krcmar H (2008) Do point of sale RFID-based information services make a difference? Analyzing consumer perceptions for designing smart product information services in retail business. Electronic Mark 18(3):692–709
Rousseau DM (1998) Trust in organizations: frontiers of theory and research. Adm Sci Q 43(1):186–188
Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different at all: a cross disziplinary view of trust. Acad Manag Rev 23(3):393–404
Shankar V, Urban GL, Sultan F (2002) Online trust: a stakeholder perspective, concepts, implications, and future directions. J Strateg Inf Syst 11(3–4):325–344
Singh J, Sirdeshmukh D (2000) Agency and trust mechanisms in consumer satisfaction and loyalty judgments. J Acad Mark Sci 28(1):150–167
Söllner M, Hoffmann A, Hoffmann H, Leimeister JM (2011) Towards a theory of explanation and prediction for the formation of trust in IT artifacts. In: Proceedings of the SIGHCI 2011, Paper 6
Söllner M, Leimeister JM (2010) Did they all get it wrong? Towards a better measurement model of trust. Paper presented at the Academy of Management Annual Meeting 2010, Montréal, Canada, 6–10 August 2010
Sommerville I (2007) Software engineering, 8 Aufl. Addison-Wesley, Harlow
Spann M (2010) Synergien zwischen gestaltungsorientierter und verhaltensorientierter Wirtschaftsinformatik. Z betriebswirtschaftliche Forsch 62(6):677–679
Spiekermann S (2007) Privacy enhancing technologies for RFID in retail – an empirical investigation. In: UbiComp 2007: Ubiquitous Computing. S 56–72
Szyperski C (2002) Component software – beyond object-oriented programming, 2. Aufl. ACM Press, New York
Vance A, Elie-Dit-Cosaque C, Straub DW (2008) Examining trust in information technology artifacts: the effects of system quality and culture. J Manage Info Syst 24(4):73–100
Wang W, Benbasat I (2005) Trust in and adoption of online recommendation agents. J Assoc Info Syst 6(3):72–101
Weiser M (1991) The computer for the 21st century. Sci Am 265(3):94–104
Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):75–84. doi:http://doi.acm.org/10.1145/159544.159617
Zuboff S (1988) In the age of smart machines: the future of work technology and power. Basic Books, New York
Danksagung
Die in diesem Beitrag vorgestellte Methode ist im Rahmen des Forschungsprojekts VENUS entstanden. VENUS ist ein Forschungsprojekt des interdisziplinären Forschungszentrums für Informationstechnik-Gestaltung (ITeG) der Universität Kassel. Wir danken dem hessischen Ministerium für Wissenschaft und Kunst für die Finanzierung des Projekts im Rahmen der Landes-Offensive zur Entwicklung Wissenschaftlich-ökonomischer Exzellenz (LOEWE). Weiterführende Informationen erhalten Sie unter: http://www.iteg.uni-kassel.de/venus.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Söllner, M., Hoffmann, A., Hoffmann, H. et al. Vertrauensunterstützung für sozio-technische ubiquitäre Systeme. Z Betriebswirtsch 82 (Suppl 4), 109–140 (2012). https://doi.org/10.1007/s11573-012-0584-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11573-012-0584-x
Schlüsselwörter
- Vertrauen
- Vertrauensunterstützung
- Methode
- Gestaltung sozio-technischer ubiquitärer Systeme
- Laborexperiment