Skip to main content

Meeting Strangers Online: Feature Models for Trustworthiness Assessment

  • Conference paper
  • First Online:
Human-Centered Software Engineering (HCSE 2022)

Abstract

Getting to know new people online to later meet them offline for neighbourhood help, carpooling, or online dating has never been as easy as nowadays by social media performing computer-mediated introductions (CMIs). Unfortunately, interacting with strangers poses high risks such as unfulfilled expectations, fraud, or assaults. People most often tolerate risks if they believe others are trustworthy. However, conducting an online trustworthiness assessment usually is a challenge. Online cues differ from offline ones and people are either lacking awareness for the assessment’s relevance or find it too complicated. On these grounds, this work aims to aid software engineers to develop CMI that supports users in their online trustworthiness assessment. We focus on trust-related software features and nudges to i) increase user awareness, ii) trigger the trustworthiness assessment and iii) enable the assessment online. For that reason, we extend feature models to provide software engineers the possibility to create and document software features or nudges for trustworthiness assessment. The extended feature models for trustworthiness assessments can serve as reusable catalogues for validating features in terms of their impact on the trustworthiness assessment and for configuring CMI software product lines. Moreover, this work provides an example of how the extended feature models can be applied to catfishing protection in online dating.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.tinder.com.

References

  1. Obada-Obieh, B., Somayaji, A.: Can I believe you? Establishing trust in computer mediated introductions. In: Proceedings of the 2017 New Security Paradigms Workshop, pp. 94–106 (2017)

    Google Scholar 

  2. Jozsa, K., Kraus, A., Korpak, A.K., Birnholtz, J., Moskowitz, D.A., Macapagal, K.: “Safe behind my screen’’: adolescent sexual minority males’ perceptions of safety and trustworthiness on geosocial and social networking apps. Arch. Sex. Behav. 50(7), 2965–2980 (2021). https://doi.org/10.1007/s10508-021-01962-5

    Article  Google Scholar 

  3. Yi, J., Yuan, G., Yoo, C.: The effect of the perceived risk on the adoption of the sharing economy in the tourism industry: the case of Airbnb. Inf. Process. Manage. 57(1), 102–108 (2020)

    Article  Google Scholar 

  4. Couch, D., Liamputtong, P.: Online dating and mating: perceptions of risk and health among online users. Health Risk Soc. 9(3), 275–294 (2007)

    Article  Google Scholar 

  5. Son, J.Y., Kim, S.S.: Internet users’ information privacy-protective responses: a taxonomy and a nomological model. MIS Q. 32, 503–529 (2008)

    Article  Google Scholar 

  6. Hang, L., Kim, D.H.: SLA-based sharing economy service with smart contract for resource integrity in the internet of things. Appl. Sci. 9(17), 3602 (2019)

    Article  Google Scholar 

  7. Becerra, M., Lunnan, R., Huemer, L.: Trustworthiness, risk, and the transfer of tacit and explicit knowledge between alliance partners. J. Manage. Stud. 45(4), 691–713 (2008)

    Article  Google Scholar 

  8. Lewicki, R.J., Wiethoff, C.: Trust, Trust Development, and Trust Repair. The Handbook of Conflict Resolution: Theory and Practice 1(1), 86–107 (2000)

    Google Scholar 

  9. Bialski, P., Batorski, D.: From online familiarity to offline trust: how a virtual community creates familiarity and trust between strangers. Social Computing and Virtual Communities, pp. 179–204 (2010)

    Google Scholar 

  10. Bonnefon, J.F., Hopfensitz, A., De Neys, W.: The modular nature of trustworthiness detection. J. Exp. Psychol. Gen. 142(1), 143 (2013)

    Article  Google Scholar 

  11. Ding, S., Yang, S.L., Fu, C.: A novel evidential reasoning based method for software trustworthiness evaluation under the uncertain and unreliable environment. Expert Syst. Appl. 39(3), 2700–2709 (2012)

    Article  Google Scholar 

  12. Borchert, A., Díaz Ferreyra, N.E., Heisel, M.: Building trustworthiness in computer-mediated introduction: a facet-oriented framework. In: International Conference on Social Media and Society, pp. 39–46 (2020)

    Google Scholar 

  13. Cassell, J., Bickmore, T.: External manifestations of trustworthiness in the interface. Commun. ACM 43(12), 50–56 (2000)

    Article  Google Scholar 

  14. Mishra, A.K.: Organizational responses to crisis. Trust in organizations. Front. Theor. Res. 3(5), 261–287 (1996)

    Google Scholar 

  15. Mcknight, D.H., Carter, M., Thatcher, J.B., Clay, P.F.: Trust in a specific technology: an investigation of its components and measures. ACM Trans. Manage. Inf. Syst. 2(2), 1–25 (2011)

    Article  Google Scholar 

  16. Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)

    Article  Google Scholar 

  17. Büttner, O.B., Göritz, A.S.: Perceived trustworthiness of online shops. J. Consum. Behav. 7(1), 35–50 (2008)

    Article  Google Scholar 

  18. McKnight, D.H., Chervany, N.L.: What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. Int. J. Electron. Commer. 6(2), 35–59 (2001)

    Article  Google Scholar 

  19. Borchert, A., Heisel, M.: The role of trustworthiness facets for developing social media applications: a structured literature review. Information 13(1), 34 (2022)

    Article  Google Scholar 

  20. Hsi, I., Potts, C.: Studying the evolution and enhancement of software features. In: icsm, p. 143 (2000)

    Google Scholar 

  21. Anton, A.I.: Goal identification and refinement in the specification of software-based information systems. Georgia Institute of Technology (1997)

    Google Scholar 

  22. Glinz, M.: On non-functional requirements. In: 15th IEEE International Requirements Engineering Conference, pp. 21–26. IEEE (2007)

    Google Scholar 

  23. User Interface Design Patterns. www.cs.helsinki.fi/u/salaakso/patterns/. Accessed 11 Apr 2022

  24. Welie.com - Patterns in Interaction Design. www.welie.com/patterns/index.php. Accessed 11 Apr 2022

  25. Zetterholm, M., Elm, P., Salavati, S.: Designing for pandemics: a design concept based on technology mediated nudging for health behavior change. In: 54th Hawaii International Conference on System Sciences, pp. 3474–3483 (2021)

    Google Scholar 

  26. Meske, C., Potthoff, T.: The DINU-model-a process model for the design of nudges (2017)

    Google Scholar 

  27. Acquisti, A., et al.: Nudges for privacy and security: understanding and assisting users’ choices online. ACM Comput. Surv. 50(3), 1–41 (2017)

    Article  Google Scholar 

  28. Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009)

    Google Scholar 

  29. Thaler, R.H., Sunstein, C.R.: Nudge: Wie man kluge Entscheidungen anstößt. Ullstein eBooks (2009)

    Google Scholar 

  30. Sunstein, C.R.: Nudging: a very short guide. J. Consum. Policy 37(4), 583–588 (2014)

    Article  Google Scholar 

  31. Kang, K.C., Cohen, S.G., Hess, J.A., Novak, W.E., Peterson, A.S.: Feature-oriented domain analysis (FODA) feasibility study. Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst. (1990)

    Google Scholar 

  32. Czarnecki, K., Eisenecker, U.W.: Generative programming (2000)

    Google Scholar 

  33. Pohl, K., Böckle, G., Van Der Linden, F.: Software product line engineering: foundations, principles, and techniques, vol. 1. Springer, Heidelberg (2005)

    Google Scholar 

  34. Riebisch, M.: Towards a more precise definition of feature models. Model. Variability Object-Oriented Prod. Lines 64–76 (2003)

    Google Scholar 

  35. Benavides, D., Trinidad, P., Ruiz-Cortés, A.: Automated reasoning on feature models. In: Pastor, O., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 491–503. Springer, Heidelberg (2005). https://doi.org/10.1007/11431855_34

    Chapter  Google Scholar 

  36. Xiong, J.: New Software Engineering Paradigm Based on Complexity Science: An Introduction to NSE. Springer, NY (2011). https://doi.org/10.1007/978-1-4419-7326-9

  37. Arnowitz, J., Arent, M., Berger, N.: Effective Prototyping for Software Makers. Elsevier (2010)

    Google Scholar 

  38. Simmons, M., Lee, J.S.: Catfishing: a look into online dating and impersonation. In: Meiselwitz, G. (ed.) HCII 2020. LNCS, vol. 12194, pp. 349–358. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-49570-1_24

    Chapter  Google Scholar 

  39. Kaskazi, A.: Social network identity: Facebook, Twitter and identity negotiation theory. In: iConference 2014 Proceedings (2014)

    Google Scholar 

  40. Mcdougall, S.J., Curry, M.B., De Bruijn, O.: Measuring symbol and icon characteristics: norms for concreteness, complexity, meaningfulness, familiarity, and semantic distance for 239 symbols. Behav. Res. Meth. Instrum. Comput. 31(3), 487–519 (1999). https://doi.org/10.3758/BF03200730

    Article  Google Scholar 

  41. Koch, C.M.: To catch a catfish: a statutory solution for victims of online impersonation. U. Colo. L. Rev. 88, 233 (2017)

    Google Scholar 

  42. Martinez, C., Díaz, N., Gonnet, S., Leone, H.: A Petri net variability model for software product lines. Electron. J. SADIO (EJS) 13, 35–53 (2014)

    Google Scholar 

  43. Benavides, D., Segura, S., Trinidad, P., Cortés, A.R.: FAMA: tooling a framework for the automated analysis of feature models. VaMoS (2007)

    Google Scholar 

  44. von der Maßen, T., Lichter, H.: RequiLine: a requirements engineering tool for software product lines. In: van der Linden, F.J. (ed.) PFE 2003. LNCS, vol. 3014, pp. 168–180. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24667-1_13

    Chapter  Google Scholar 

  45. Thorndike, E.L.: A constant error in psychological ratings. J. Appl. Psychol. 4(1), 25 (1920)

    Article  Google Scholar 

  46. Campanelli, A.S., Parreiras, F.S.: Agile methods tailoring-a systematic literature review. J. Syst. Softw. 110, 85–100 (2015)

    Article  Google Scholar 

  47. Yang, T., Bolchini, D.: Branded interactions: predicting perceived product traits and user image from interface consistency and visual guidance. Interact. Comput. 26(5), 465–487 (2014)

    Article  Google Scholar 

  48. Metzger, A., Pohl, K.: Software product line engineering and variability management: achievements and challenges. In: Future of Software Engineering Proceedings, pp. 70–84 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Angela Borchert .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Borchert, A., Ferreyra, N.E.D., Heisel, M. (2022). Meeting Strangers Online: Feature Models for Trustworthiness Assessment. In: Bernhaupt, R., Ardito, C., Sauer, S. (eds) Human-Centered Software Engineering. HCSE 2022. Lecture Notes in Computer Science, vol 13482. Springer, Cham. https://doi.org/10.1007/978-3-031-14785-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-14785-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-14784-5

  • Online ISBN: 978-3-031-14785-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics