Beruflich Dokumente
Kultur Dokumente
DOI 10.1007/s00779-013-0636-4
ORIGINAL ARTICLE
Received: 23 August 2011 / Accepted: 17 December 2012 / Published online: 23 January 2013
Springer-Verlag London 2013
Z. Yan (&)
The State Key Laboratory of Integrated Services Networks,
Xidian University, No. 2 South Taibai Road,
Xian 710071, China
e-mail: zhengyan.pz@gmail.com; zyan@xidian.edu.cn;
zheng.yan@aalto.fi
Z. Yan
Department of Communications and Networking,
School of Electrical Engineering, Aalto University, Otakaari 5,
02150 Espoo, Finland
C. Liu G. Yu
Renmin University of China, No. 59, Zhongguancun Street,
Haidian District, Beijing 100872, China
e-mail: liuconghui2001@gmail.com
G. Yu
e-mail: yugllxl@sina.com
V. Niemi
Department of Mathematics and Statistics,
University of Turku, 20014 Turku, Finland
e-mail: valtteri.niemi@utu.fi
1 Introduction
Mobile devices have evolved into an open platform to
execute various applications. A mobile application is a
software package that can be installed and executed in
mobile devices. An example of such an application is a
mobile web browser to access the Internet. Generally,
mobile applications developed by various vendors can be
downloaded for installation. This situation means that there
are a number of mobile applications with similar functions
available for users. The future market could thus be competitive. For this reason, the trustworthiness of the mobile
application is a central issue impacting not only user
selection and usage but also the ultimate success of the
application.
Trust is a multidimensional, multidisciplinary, and
multifaceted concept, for which there are various definitions, many of which can be found in the literature.
Common to these definitions are the notions of confidence,
123
1296
123
1296
123
1297
123
1298
123
3 Method
3.1 Research questions
User trust in a mobile application is built up over time and
changes with application use due to the influence of many
factors. We developed a system to estimate individual trust
based on the usage behaviors of a user (e.g., usage behavior
about normal usage statistics, reflection behavior related to
application performance and user experience, and correlation behavior regarding similarly functioned applications)
[65, 67, 69]. We achieved an individual trust model by
mathematically formalizing trust behavior measures that
were investigated in a large-scale user study [68]. The
individual trust is calculated by the mobile device of the
user based on trust behavior observations.
The reputation value of an application is generated by
aggregating the individual trust and ratings. It is issued by a
reputation service provider, designed by Yan et al. [69].
We use a number to indicate the individual trust and reputation values, respectively. Their values range from 0 to 1,
representing the range of full distrust to full trust. We use a
rectangle bar to indicate the individual trust value and a
trapezoid bar to indicate the reputation value in our
experiments. The individual trust value is presented by the
trust indicator. The trust/reputation indicator presents both
values.
1299
Table 1 The design of Experiments 2 and 3
Experiment variables
Block 1
Block 2
Indicator availability
No
Yes
E2
Application importance
Indicated (trust
value) 9 (reputation
value)
(low, medium,
high) 9 (low,
medium, high)
(low, medium,
high) 9 (low,
medium, high)
Indicator availability
No
Yes
Application importance
E3
123
1300
123
Number of
participants
Percent (%)
Finland
Finland
China
China
34.8
3.8
0.51 h/day
39.2
15.4
15 h/day
11
21.7
42.3
10
23
26
4.3
100
38.5
100
18
13
78.3
50
22
26
95.7
100
Non-network accessed
applications
23
26
100
100
4.1.3 Procedure
At the beginning of each test, we first introduced the basic
concepts (e.g., mobile application and IR) with examples.
We then briefly described the experiment purpose and
procedure, as well as the testing toolkit design. Before the
real test, each participant practiced on three example
testing slides to become familiar with the experiment
toolkit.
In this experiment, each participant completed a series
of application scenarios to assess his/her opinion on
application importance. For each scenario, shown as a text
1301
IR low
IR medium
IR high
FI
CN
FI
CN
FI
CN
LifeBlog
LifeBlog
Gizmo
MobiReader
Nokia Maps
Camera
Video download
TextTV
Yahoo!Go
Yahoo!Go
Gmail
Fring
Shozu
Web browser
M-realplayer
M-realplayer
Web browser
Music player
IR average
.292
.341
.478
.539
.719
.773
IR stdev
.010
.038
.059
.008
.042
.014
Application names
China
Mobile
applications
Usage
experience
percentage
(%)
Mobile
applications
Camera
100
Camera
87.7
Game
Music player
78.5
Notes
82.6
Show caller ID
66.9
Music player
78.3
Mobile realplayer
62.3
Internet
search
78.3
Game
60.0
6
7
Web browser
Gallery
73.9
69.6
Palringo
Radio
59.2
55.4
Radio
69.6
Foreca
54.6
Gmail
65.2
Voice recorder
53.1
10
Mobile
realplayer
60.9
Trippo weather
broadcast
51.5
Finland
87.0
Usage
experience
percentage
(%)
123
1302
4.2.3 Participants
123
1303
Number of
participants
Percent (%)
Finland
Finland
China
China
33.3
6.7
0.51 h/day
40
53.3
15 h/day
26.7
6.7
33.3
15
15
100
100
4.2.5 Results
4.2.5.1 Usage willingness with and without a trust indicator An analysis of variance (ANOVA) was performed
to test the impact of the trust indicator on mobile application usage, with the IR (high, medium, and low) and TI
value (high, medium, and low) as within-subject factors,
reported in Table 6. We found significant main effects of
the IR and the trust value (TV), indicating that the willingness of continuously using a mobile application
increased with the IR from low to high and the TV from
low to high, shown in Fig. 3 with standard errors. The
interaction between IR and TV was not significant in both
countries. This interaction indicated that the effect of TV
did not differ over application scenarios with different IRs.
We conducted paired sample t tests to examine the
impact of the trust indicator on mobile application usage.
Table 7 compares the results in two countries. We found
that usage willingness was higher in Finland, but somehow
a bit lower in China (for the IR high and medium applications), with the trust value indicated as high (TV_H) than
that without any trust indicator (NO_TI). This usage willingness difference reached a marginal significance level in
Finland. Usage willingness was lower with medium and
low trust value indicators (TV_M and TV_L) than that
without any trust indicator. The results showed that the
trust indicator had a significant impact on usage willingness. The willingness also varied according to the displayed trust value. The results implied that the existence of
a TI might have a positive impact in Finland (in case of a
Total
13
86.7
26.7
15
15
100
100
Non-network accessed
applications
15
14
100
93.3
Effects in Finland
(FI)
IR
TV
IR 9 TV
123
1304
0.8
0.7
IR low
IR medium
IR high
No indicator
TI low
TI medium
Willing Scale
Willing Scale
TI high
0.6
0.5
0.4
0.3
0.2
0.1
0
No indicator
1
0.9
0.8
TI medium
TI high
0.7
0.7
0.6
IR low
0.6
0.5
IR medium
IR high
0.4
IR low
IR medium
IR high
0.3
0.2
0.1
0
No indicator
TI low
TI medium
TI high
Willing Scale
Willing Scale
TI low
0.5
0.4
0.3
0.2
0
No indicator
TI low
TI medium
TI high
Finland
t
China
p
NO_TITV_L
7.416
\.000
3.374
=.005
NO_TITV_M
3.703
\.006
3.510
\.005
NO_TITV_H
-1.673
=.133
-.511
=.617
123
NO_TITV_L
Finland
China
-4.976
\.001
3.525
\.005
3.263
\.01
2.353
\.05
NO_TITV_M
.136
NO_TITV_H
3.363
.895
\.01
1305
willingness to check trust information. The check willingness was lower when there was a TI than that without TI
in China. In Finland, however, the check willingness was
higher when there was low trust indication than that
without TI. This implies that the Chinese participants relied
on (or believed in) the TI more than the European participants. The European participants were more curious about
the trust information details if a low trust value was shown.
The trust value significantly influenced their check willingness. For most tested mobile applications, the average
willingness to know the trust value was approximately 0.5
in both countries, implying that it is significant to provide a
feature to show trust information during mobile application
usage.
According to the data collected in Experiment 2
(Table 5), European participants (86.7 %) had more
experience in using internet-access applications (e.g.,
Email service and web browser) than Chinese participants
(26.7 %). The mobile phone usage time of the Chinese
participants was much longer than European ones. The
results indicated that mobile internet applications were still
not popular in China, but the mobile phone played an
important role in the life of Chinese university students.
Table 9 tabulates the interview results from Experiment
2. It implies that most participants would like to share
usage information in both countries, but the percentage was
higher in Finland than in China. In China, more participants did not want to share personal usage information. In
both countries, most participants thought that usage information was private; indeed, a higher percentage was
Answer
Number of
participants
Percentage (%)
Finland
China
Finland
China
Yes
12
10
80
66.7
No
6.7
26.6
Neutral
13.3
6.7
Total
15
15
100
100
Yes
11
14
73.3
93.3
No
26.7
6.7
100
Neutral
Total
15
15
Menu
46.7
60
Shortcut
keys
Touch
screen
26.7
60
Others
13.3
13.3
Total
18
15
120
100
123
1306
Number of
participants
Percent (%)
Finland
Finland
China
China
4.3.3 Results
13.3
6.7
0.51 h/day
46.7
20
15 h/day
40
60
13.3
15
15
100
100
Total
13
86.7
53.3
15
15
100
100
Non-network accessed
applications
15
12
100
80
to 29 years and majored in arts (60 %), science and technology (13.3 %), and business (26.7 %). Table 10 provides
information about the participants mobile application
usage experience.
The procedure of this experiment was the same as that
of Experiment 2. For each scenario, the participant was
asked to answer similar questions to E2 as below.
123
4.3.3.1 Usage willingness with and without a trust/reputation indicator The usage willingness scale was subjected to ANOVA with three within-subject factors: IR
(high, medium, and low), indicated trust value (TV) (high,
medium, and low), and indicated reputation value (RV)
(high, medium, and low), reported in Table 11. We found
significant main effects of IR, TV, and RV, indicating that
the willingness of continuous usage increased with the IR
from low to high, the indicated trust value from low to
high, and the indicated reputation value from low to high in
Table 11 Experiment 3 ANOVA results on usage willingness
Factors
IR
TV
RV
IR 9 TV
TV 9 RV
IR 9 TV 9 RV
1307
H
H
I_
H
I_
TR
TR
L
H
I_
TR
I_
M
TR
TR
I_
I_
L
M
LH
I_
TR
I_
TR
TR
LL
I_
to
ca
TR
di
N
in
LM
IR high
Willing Scale
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
IR low
IR medium
IR high
I_
H
TR
I_
H
L
TR
I_
H
TR
I_
M
M
M
I_
TR
L
TR
TR
I_
H
I_
L
TR
LM
I_
I_
LL
TR
TR
at
di
c
in
o
N
Pairs
Finland
t
China
p
NO_TRITRI_LL
8.506
.000
5.903
.000
NO_TRITRI_LM
7.018
.000
10.118
.000
NO_TRITRI_LH
NO_TRITRI_ML
5.196
6.053
.001
.000
7.106
4.850
.000
.000
NO_TRITRI_MM
3.461
.009
4.027
.001
NO_TRITRI_MH
.542
.603
1.906
.077
NO_TRITRI_HL
3.708
.006
2.854
.013
NO_TRITRI_HM
.105
.919
1.372
.192
NO_TRITRI_HH
-3.782
.005
-1.639
.123
or
Willing Scale
Fig. 6 Usage willingness with and without a trust/reputation indicator (Finland and China)
123
1308
0.8
Questions
0.7
Answer
Number of
participants
Percent (%)
Finland
Finland
China
Willing Scale
0.6
0.5
0.4
0.3
IR low
IR medium
IR high
0.2
0.1
0
in
di
ca
to
r
TR
I_
LL
TR
I_
LM
TR
I_
LH
TR
I_
M
L
TR
I_
M
M
TR
I_
M
H
TR
I_
H
L
TR
I_
H
M
TR
I_
H
H
0.9
Willing Scale
IR low
IR medium
IR high
0.8
0.7
0.6
Yes
60
53.3
No
33.3
40
Neutral
6.7
6.7
100
Total
15
15
100
Yes
11
13
73.3
86.6
No
20
6.7
6.7
6.7
15
15
100
100
Neutral
Total
0.5
0.4
China
Menu
53.3
60
Shortcut
keys
Touch
screen
20
26.6
20
6.7
Others
13.3
6.7
Total
16
15
106.6
100
0.3
0.2
0.1
H
H
I_
H
I_
TR
TR
L
H
I_
TR
TR
I_
M
I_
TR
I_
LH
I_
TR
LM
TR
LL
TR
I_
I_
TR
in
di
ca
to
Table 13 Paired samples t test on check willingness with and without a trust/reputation indicator
Pairs
Finland
t
China
p
2.943
.019
4.447
.001
CW_NOTRITRI_LM
3.840
.005
4.999
.000
CW_NOTRITRI_LH
CW_NOTRITRI_ML
-.710
1.784
.498
.112
1.957
3.758
.071
.002
CW_NOTRITRI_MM
7.428
.000
3.525
.003
CW_NOTRITRI_MH
3.908
.004
2.225
.043
CW_NOTRITRI_HL
-1.728
.122
2.130
.051
CW_NOTRITRI_HM
5.654
.000
2.827
.031
CW_NOTRITRI_HH
4.983
.001
1.390
.186
CW_NOTRITRI_LL
123
were different. This result implied that the Chinese participants relied on (or believed in) the TRI more than the
European participants. The European participants were
more curious about the trust information details if the
displayed trust value sharply differed from the reputation
value. The trust and reputation values interactions with
each other significantly influenced the check willingness.
In addition, the average willingness to know the trust/
reputation value was above 0.5 for most tested mobile
applications in both countries, implying that it is significant
to provide a feature to show trust information during
mobile application usage.
Table 10 shows that we obtained results similar to those
from Experiment 2. The phone usage time in China was
generally much longer than that in Finland. However,
fewer Chinese participants experienced internet-access
mobile applications than European participants.
Table 14 tabulates the interview results of Experiment
3. In both countries, over half of the participants would like
to share usage information, but the percentage was slightly
higher in Finland than in China. In China, more participants did not want to share personal usage information. In
both countries, most people thought the usage information
was private, but the percentage was higher in China than in
Finland. In both countries, about half of the participants
preferred getting the trust information details via a menu.
More participants liked using touch screen in Finland than
in China. In both countries, some participants preferred
shortcut key access.
1309
participants were similar in both countries, potential reasons for these differences include culture deviation, past
usage experiences, the technical background of the participants, and regional technology development status.
Cultural difference influenced trust in an on-line environment [25]. The same influence could also apply to
mobile application scenarios. More generally, social trust
levels varied substantially among countries [24]. The culture-dependent nature of trust suggests that trust in HCI
may need to be verified when it is extrapolated from one
culture to another. Zuboff [71] found that the culture
associated with people who had been exposed to computers
led to trust and acceptance of automation. There was significant deviation between Chinese and European participants, reflecting the difference of eastern and western
cultures. Our experimental results showed little difference
in usage willingness and obvious difference in check
willingness. One explanation could be that the Chinese
participants more easily trusted the information provided
by a system and did not want to figure out the real reasons
behind it, though they could become caustic if some
information was provided. Conversely, the European participants were more curious about the reasons behind the
difference between individual trust and reputation. The
European participants wanted to explore why the trust
value was low and why there was a sharp difference
between these two pieces of information. These participants generally reacted more positively to the indicated
trust information compared to the Chinese participants. The
importance of mobile applications influenced their behaviors more than those of the Chinese participants.
Deviation of past usage experience could be another
reason behind the different results. Riley [50] found that
pilots who were accustomed to using automation trusted
and relied on automation more than students who were not
familiar with it. These results showed that past experiences
influenced trust in a digital system. Though mobile phone
usage time was generally longer in China than that in
Finland, the applications experienced by and familiar to the
Chinese participants were different than those in Finland.
For unfamiliar applications, participants could hesitate to
make a usage decision, even if additional trust information
was provided. The participants could, however, be curious
about consuming useful and important applications, even
having no previous experience. This is more obvious in
China than Finland, shown by a higher average willingness
to use applications in the situation without any indicator in
China than in Finland.
Apart from the above, the technical background of
participants could be another factor that may impact
application usage. In Finland, most participants had a
background in information and computer science, while
most participants majored in arts and business in China.
123
1310
The knowledge background could influence usage behaviors even in the same situation. Conversely, the technology
development situations were obviously different in the two
countries. The above factors could cause different past
usage experiences for the participants and their familiarity
with related technologies. However, these two factors are
important factors influencing trust and use. The technical
background and regional technology development status
could thus be other potential reasons that might cause
different experimental results in two countries.
5.3 Implications
We found that usage willingness without any trust information indication was a bit lower than that with high trust
or high trust/high reputation indication. This result implied
that the blind or initial trust of the participants was generally high. This finding is the same as in previous research
[38, 39]. We suggest that the initial individual trust value,
indicated by the trust management system, should be set
correspondingly high when a user has no experience with
an application, especially when trying to encourage usage.
This value can later be evolved (increased or decreased)
according to accumulated usage experience and behaviors
[68, 69]. The results also implied that the TRI was more
instructive for mobile application usage than the TI, though
the TI could also independently impact usage behavior and
decisions; the Chinese participants somehow showed suspicion about the TI.
Except for the experimental tests, we also interviewed
all participants in both China and Finland. All Experiment
1 participants (100 %) in China thought their past usage
history information could help their consuming decisions
on mobile applications, while 78.3 % of the participants in
Finland held the same opinion, though 8.7 % had a different opinion and 13 % were neutral. In Finland, 87 % of
the participants thought other usage information is helpful
when making a usage decision, 4.3 % did not agree on it,
and 8.7 % were neutral. In China, 88.5 % of the participants provided a positive answer; no participants gave a
negative answer, and 11.5 % were neutral. The above data
additionally indicated the assistance of personal and public
usage information on mobile application consumption.
This result also indicates the foundation of trust and reputation generation based on trust behavior statistics [68,
69]. The result further implied that it was useful to provide
usage statistics when the user would like to check the
detailed trust information. This information explains the
credibility of trust and reputation, thus enhancing user
confidence on the trust management system of mobile
applications.
From interviews with 60 Chinese and European participants in Experiments 2 and 3, we found that most
123
1311
References
1. Anderson JC, Narus JA (1990) A model of distributor firm and
manufacturer firm working partnerships. Marketing 54(1):4258
2. Antifakos S, Kern N, Schiele B, Schwaninger A (2005) Towards
improving trust in context-aware systems by displaying system
confidence. In: Proceedings of the 7th international conference on
human computer interaction with mobile devices and services.
ACM Press, New York, NY, pp 914
3. Artz D, Gil Y (2007) A survey of trust in computer science and
the semantic web. Web Semantics: Science, Services and Agents
on the World Wide Web 5(2)
4. Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic
concepts and taxonomy of dependable and secure computing.
IEEE Trans Dependable Secure Comput 1(1):1133
5. Awad N, Ragowsky A (2008) Establishing trust in Electronic
commerce through online word of mouth: an examination across
genders. J Manage Inf Syst 24(4):101121
6. Baba ML, Falkenburg DR, Hill DH (1996) Technology management and American culture: implications for business process
redesign. Res Technol Manage 39(6):4454
7. Basso A, Goldberg D, Greenspan S, Weimer D (2001) Emotional
and cognitive factors underlying judgments of trust e-commerce.
In: Proceedings 3rd ACM conference on electronic commerce.
ACM Press, New York, pp 137143
8. Bhattacherjee A (2002) Individual trust in online firms: scale
development and initial test. J Manage Inf Syst 19(1):211241
9. Bickmore T, Cassell J (2001) Relational agents: a model and
implementation of building user trust. Proc CHI 2001:396403
10. Briggs P, Burford B, De Angeli A, Lynch P (2002) Trust in
online advice. Social Sci Comput Rev 20(3):321332
11. Corritore CL, Kracher B, Wiedenbeck S (2003) On-line trust:
concepts, evolving themes, a model. Int J Human Comput Stud
Trust Technol 58(6):737758
12. Cramer H, Evers V, Ramlal S, Someren M, Rutledge L, Stash N,
Aroyo L, Wielinga B (2008) The effects of transparency on trust
in and acceptance of a content-based art recommender. User
Model User Adap Inter 18(5):455496
13. Denning DE (1993) A new paradigm for trusted systems. In:
Proceedings of the 19921993 workshop on new security
paradigms
14. Deutsch M (1960) Trust, trustworthiness, and the F Scale. J Abnorm Soc Psychol 61(1):138140
15. Deutsch M (1973) The resolution of conflict: constructive and
destructive processes. Yale University Press, New Haven
16. Dunn JR, Schweitzer ME (2005) Feeling and believing: the
influence of emotion on trust. J Pers Soc Psychol 88(5):736748
17. Fishbein M, Ajzen I (1975) Beliefs, attitude, intention and
behavior: an introduction to theory and research. Addison-Wesley, Reading, MA
18. Fogg BJ, Marshall J, Kameda T, Solomon J, Rangnekar A, Boyd
J, Brown B (2001) Web credibility research: a method for online
experiments and early study results. In: Proceedings of CHI2001,
extended abstracts. ACM Press, New York, pp 295296
19. Fogg BJ, Marshall J, Laraki O, Osipovich A, Varma C, Fang N,
Paul J, Rangnekar A, Shon J, Swani P, Treinen M (2001) What
makes web sites credible? A report on a large quantitative study.
In: Proceedings of CHI2001. ACM Press, New York, pp 6168
20. Fogg BJ (2002) Persuasive technology: using computers to
change what we think and do. Morgan Kaufman, San Francisco
21. Fox A (1974) Beyond contract: work, power, and trust relations.
Faber, London, UK
22. Grandison T, Sloman M (2000) A survey of trust in internet
applications. IEEE Commun Surv 4th Quart 3(4):216
123
1312
23. Herlocker JL, Konstan JA, Riedl J (2000) Explaining collaborative filtering recommendations. In: Proceedings of the 2000 ACM
conference on computer supported cooperative work. ACM
Press, New York, pp 241250
24. Huang H, Keser C, Leland J, Shachat J (2003) Trust, the Internet
and the digital divide. IBM Syst J 42(3):507518
25. Karvonen K (2001) Designing trust for a universal audience: a
multicultural study on the formation of trust in the internet in the
Nordic countries. In: Stephanidis C (ed) First international conference on universal access in human-computer interaction, vol 3.
Erlbaum, Mahwah, NJ, pp 10781082
26. Kim J, Moon JY (1997) Designing towards emotional usability in
customer interfaces-trustworthiness of cyber-banking system
interfaces. Interact Comput 10:129
27. Kim J, Moon J (1998) Designing towards emotional usability in
customer interfaces: trustworthiness of cyber-banking system
interfaces. Interact Comput 10:129
28. Lee KC, Chung N (2009) Understanding factors affecting trust in
and satisfaction with mobile banking in Korea: a modified DeLone and McLeans model perspective. Interact Comput
21(56):385392
29. Lee J, Kim J, Moon JY (2000) What makes internet users visit
cyber stores again? Key design factors for customer loyalty. In:
Proceedings of CHI2000. ACM press, New York, pp 305312
30. Lee J, Moray N (1992) Trust, control strategies and allocation of
function in human-machine systems. Ergonomics 35(10):1243
1270
31. Liu Z, Joy AW, Thompson RA (2004) A dynamic trust model for
mobile ad hoc networks. In: Proceedings of the 10th IEEE
international workshop on future trends of distributed computing
systems (FTDCS 2004), pp 8085
32. Lohse GL, Spiller P (1998) Electronic shopping. Commun ACM
41(7):8187
33. Lumsden J, MacKay L (2006) How does personality affect trust
in B2C e-commerce? In: Proceedings 8th international conference on electronic commerce: the new e-commerce: innovations
for conquering current barriers, obstacles and limitations to
conducting successful business on the internet. ACM Press, New
York, NY, pp 471481
34. McCrickard DS, Czerwinski M, Bartram L (2003) Introduction:
design and evaluation of notification user interfaces. Int J Hum
Comput Stud 58(5):509514
35. McKnight DH, Chervany NL (2001) Trust and distrust definitions: one bite at a time. In: Falcone R, Singh M, Tan Y-H (eds)
Trust in cyber-societies. Springer, Berlin
36. McKnight DH, Choudhury V, Kacmar C (2002) Developing and
validating trust measures for e-commerce: an integrative typology. Inf Syst Res 13(3):334359
37. Mui L (2003) Computational models of trust and reputation:
agents, evolutionary games, and social networks. Doctoral dissertation, Massachusetts Institute of Technology, 2003
38. Muir BM (1987) Trust between humans and machines, and the
design of decision aids. Int J Man Mach Syst 27:527539
39. Muir BM (1994) Trust in automation part I: theoretical issues in
the study of trust and human intervention in automated systems.
Ergonomics 37(11):19051922
40. Muir BM, Moray N (1996) Trust in automation part II: experimental studies of trust and human intervention in a process
control simulation. Ergonomics 39(3):429469
41. Nielsen J (1999) Trust or bust: communicating trustworthiness in
Web design. http://www.useit.com/alertbox/990307.html
42. Nielsen J, Molich R, Snyder S, Farrell C (2000) E-commerce user
experience: trust. Nielsen Norman Group
43. Olson JS, Zheng J, Bos N, Olson GM, Veinott E (2002) Trust
without touch: jumpstarting long-distance trust with initial social
activities. In: Proceedings of CHI2002, pp 141146
123
1313
applications. Pers Ubiquit Comput 16(5):485506. doi:10.1007/
s00779-011-0420-2
70. Zimmerman J, Kurapati K (2002) Exposing profiles to build trust
in a recommender. In: Proceedings of CHI2001, extended
abstracts. ACM Press, New York, pp 608609
71. Zuboff S (1988) In the age of the smart machine. Basic Books,
New York
123