Abstract
Getting to know new people online to later meet them offline for neighbourhood help, carpooling, or online dating has never been as easy as nowadays by social media performing computer-mediated introductions (CMIs). Unfortunately, interacting with strangers poses high risks such as unfulfilled expectations, fraud, or assaults. People most often tolerate risks if they believe others are trustworthy. However, conducting an online trustworthiness assessment usually is a challenge. Online cues differ from offline ones and people are either lacking awareness for the assessment’s relevance or find it too complicated. On these grounds, this work aims to aid software engineers to develop CMI that supports users in their online trustworthiness assessment. We focus on trust-related software features and nudges to i) increase user awareness, ii) trigger the trustworthiness assessment and iii) enable the assessment online. For that reason, we extend feature models to provide software engineers the possibility to create and document software features or nudges for trustworthiness assessment. The extended feature models for trustworthiness assessments can serve as reusable catalogues for validating features in terms of their impact on the trustworthiness assessment and for configuring CMI software product lines. Moreover, this work provides an example of how the extended feature models can be applied to catfishing protection in online dating.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Obada-Obieh, B., Somayaji, A.: Can I believe you? Establishing trust in computer mediated introductions. In: Proceedings of the 2017 New Security Paradigms Workshop, pp. 94–106 (2017)
Jozsa, K., Kraus, A., Korpak, A.K., Birnholtz, J., Moskowitz, D.A., Macapagal, K.: “Safe behind my screen’’: adolescent sexual minority males’ perceptions of safety and trustworthiness on geosocial and social networking apps. Arch. Sex. Behav. 50(7), 2965–2980 (2021). https://doi.org/10.1007/s10508-021-01962-5
Yi, J., Yuan, G., Yoo, C.: The effect of the perceived risk on the adoption of the sharing economy in the tourism industry: the case of Airbnb. Inf. Process. Manage. 57(1), 102–108 (2020)
Couch, D., Liamputtong, P.: Online dating and mating: perceptions of risk and health among online users. Health Risk Soc. 9(3), 275–294 (2007)
Son, J.Y., Kim, S.S.: Internet users’ information privacy-protective responses: a taxonomy and a nomological model. MIS Q. 32, 503–529 (2008)
Hang, L., Kim, D.H.: SLA-based sharing economy service with smart contract for resource integrity in the internet of things. Appl. Sci. 9(17), 3602 (2019)
Becerra, M., Lunnan, R., Huemer, L.: Trustworthiness, risk, and the transfer of tacit and explicit knowledge between alliance partners. J. Manage. Stud. 45(4), 691–713 (2008)
Lewicki, R.J., Wiethoff, C.: Trust, Trust Development, and Trust Repair. The Handbook of Conflict Resolution: Theory and Practice 1(1), 86–107 (2000)
Bialski, P., Batorski, D.: From online familiarity to offline trust: how a virtual community creates familiarity and trust between strangers. Social Computing and Virtual Communities, pp. 179–204 (2010)
Bonnefon, J.F., Hopfensitz, A., De Neys, W.: The modular nature of trustworthiness detection. J. Exp. Psychol. Gen. 142(1), 143 (2013)
Ding, S., Yang, S.L., Fu, C.: A novel evidential reasoning based method for software trustworthiness evaluation under the uncertain and unreliable environment. Expert Syst. Appl. 39(3), 2700–2709 (2012)
Borchert, A., Díaz Ferreyra, N.E., Heisel, M.: Building trustworthiness in computer-mediated introduction: a facet-oriented framework. In: International Conference on Social Media and Society, pp. 39–46 (2020)
Cassell, J., Bickmore, T.: External manifestations of trustworthiness in the interface. Commun. ACM 43(12), 50–56 (2000)
Mishra, A.K.: Organizational responses to crisis. Trust in organizations. Front. Theor. Res. 3(5), 261–287 (1996)
Mcknight, D.H., Carter, M., Thatcher, J.B., Clay, P.F.: Trust in a specific technology: an investigation of its components and measures. ACM Trans. Manage. Inf. Syst. 2(2), 1–25 (2011)
Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)
Büttner, O.B., Göritz, A.S.: Perceived trustworthiness of online shops. J. Consum. Behav. 7(1), 35–50 (2008)
McKnight, D.H., Chervany, N.L.: What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. Int. J. Electron. Commer. 6(2), 35–59 (2001)
Borchert, A., Heisel, M.: The role of trustworthiness facets for developing social media applications: a structured literature review. Information 13(1), 34 (2022)
Hsi, I., Potts, C.: Studying the evolution and enhancement of software features. In: icsm, p. 143 (2000)
Anton, A.I.: Goal identification and refinement in the specification of software-based information systems. Georgia Institute of Technology (1997)
Glinz, M.: On non-functional requirements. In: 15th IEEE International Requirements Engineering Conference, pp. 21–26. IEEE (2007)
User Interface Design Patterns. www.cs.helsinki.fi/u/salaakso/patterns/. Accessed 11 Apr 2022
Welie.com - Patterns in Interaction Design. www.welie.com/patterns/index.php. Accessed 11 Apr 2022
Zetterholm, M., Elm, P., Salavati, S.: Designing for pandemics: a design concept based on technology mediated nudging for health behavior change. In: 54th Hawaii International Conference on System Sciences, pp. 3474–3483 (2021)
Meske, C., Potthoff, T.: The DINU-model-a process model for the design of nudges (2017)
Acquisti, A., et al.: Nudges for privacy and security: understanding and assisting users’ choices online. ACM Comput. Surv. 50(3), 1–41 (2017)
Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009)
Thaler, R.H., Sunstein, C.R.: Nudge: Wie man kluge Entscheidungen anstößt. Ullstein eBooks (2009)
Sunstein, C.R.: Nudging: a very short guide. J. Consum. Policy 37(4), 583–588 (2014)
Kang, K.C., Cohen, S.G., Hess, J.A., Novak, W.E., Peterson, A.S.: Feature-oriented domain analysis (FODA) feasibility study. Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst. (1990)
Czarnecki, K., Eisenecker, U.W.: Generative programming (2000)
Pohl, K., Böckle, G., Van Der Linden, F.: Software product line engineering: foundations, principles, and techniques, vol. 1. Springer, Heidelberg (2005)
Riebisch, M.: Towards a more precise definition of feature models. Model. Variability Object-Oriented Prod. Lines 64–76 (2003)
Benavides, D., Trinidad, P., Ruiz-Cortés, A.: Automated reasoning on feature models. In: Pastor, O., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 491–503. Springer, Heidelberg (2005). https://doi.org/10.1007/11431855_34
Xiong, J.: New Software Engineering Paradigm Based on Complexity Science: An Introduction to NSE. Springer, NY (2011). https://doi.org/10.1007/978-1-4419-7326-9
Arnowitz, J., Arent, M., Berger, N.: Effective Prototyping for Software Makers. Elsevier (2010)
Simmons, M., Lee, J.S.: Catfishing: a look into online dating and impersonation. In: Meiselwitz, G. (ed.) HCII 2020. LNCS, vol. 12194, pp. 349–358. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-49570-1_24
Kaskazi, A.: Social network identity: Facebook, Twitter and identity negotiation theory. In: iConference 2014 Proceedings (2014)
Mcdougall, S.J., Curry, M.B., De Bruijn, O.: Measuring symbol and icon characteristics: norms for concreteness, complexity, meaningfulness, familiarity, and semantic distance for 239 symbols. Behav. Res. Meth. Instrum. Comput. 31(3), 487–519 (1999). https://doi.org/10.3758/BF03200730
Koch, C.M.: To catch a catfish: a statutory solution for victims of online impersonation. U. Colo. L. Rev. 88, 233 (2017)
Martinez, C., Díaz, N., Gonnet, S., Leone, H.: A Petri net variability model for software product lines. Electron. J. SADIO (EJS) 13, 35–53 (2014)
Benavides, D., Segura, S., Trinidad, P., Cortés, A.R.: FAMA: tooling a framework for the automated analysis of feature models. VaMoS (2007)
von der Maßen, T., Lichter, H.: RequiLine: a requirements engineering tool for software product lines. In: van der Linden, F.J. (ed.) PFE 2003. LNCS, vol. 3014, pp. 168–180. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24667-1_13
Thorndike, E.L.: A constant error in psychological ratings. J. Appl. Psychol. 4(1), 25 (1920)
Campanelli, A.S., Parreiras, F.S.: Agile methods tailoring-a systematic literature review. J. Syst. Softw. 110, 85–100 (2015)
Yang, T., Bolchini, D.: Branded interactions: predicting perceived product traits and user image from interface consistency and visual guidance. Interact. Comput. 26(5), 465–487 (2014)
Metzger, A., Pohl, K.: Software product line engineering and variability management: achievements and challenges. In: Future of Software Engineering Proceedings, pp. 70–84 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Borchert, A., Ferreyra, N.E.D., Heisel, M. (2022). Meeting Strangers Online: Feature Models for Trustworthiness Assessment. In: Bernhaupt, R., Ardito, C., Sauer, S. (eds) Human-Centered Software Engineering. HCSE 2022. Lecture Notes in Computer Science, vol 13482. Springer, Cham. https://doi.org/10.1007/978-3-031-14785-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-14785-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-14784-5
Online ISBN: 978-3-031-14785-2
eBook Packages: Computer ScienceComputer Science (R0)