SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Automation: not all trust is
created equal
Vicki Chiang
10/1/13
Not All Trust Is Created Equal: Dispositional and
History-Based Trust in Human-Automation Interactions
Stephanie M. Merritt and Daniel R. Ilgen
Human Factors: The Journal of the Human Factors and
Ergonomics Society 2008
Central goal of the paper is to show empirically the connections
between individual user perceptions and trust in automation
interactions
• User personality traits such as extraversion mediates trust
• It is understood that there is a correlation between trust in machines
and trust in other people, but individual traits are not parsed out
(Parasuraman and Miller, 2004 and Parasuraman and Riley, 1997)
• Trust is dynamic and can be divided into dispositional/initial trust
(interaction naïve) and post-task trust (after interaction)
13 Hypotheses !
1: Initial trust is positively related to automation use on a subsequent task.
2: Propensity to trust machines is more strongly related to initial trust than to post-task trust.
3: Initial trust mediates the relationship between propensity to trust machines and automation use.
4: Extraversion is positively related to propensity to trust machines.
5: Initial trust in an automated system is positively associated with post-task trust.
6: Initial trust and post-task trust show evidence of discriminant validity.
7: Machine characteristics are more strongly related to post-task trust than to initial trust.
8: Automation use moderates the relationship of machine characteristics and post-task trust, such that
machine characteristics have a greater effect on post-task trust when use is high.
9: Significant variance in perceptions of machine characteristics exists even when actual machine
characteristics are constant.
10: Machine characteristics moderate the relationship of propensity to trust machines and post-task
trust.
11: Machine characteristics will moderate the relationship of propensity to trust machines and
perceptions of machine characteristics, such that more extreme levels of post-task trust will result when
both variables are either low or high.
12: Perceptions of machine characteristics account for additional variance in post-task trust beyond the
effects of the actual machine characteristics.
13: Perceptions of machine characteristics mediate the relationship between the interaction of
propensity to trust with actual machine characteristics and post-task trust.
Experimental design
• X-Ray screening task
o Computer based simulation of x-ray baggage screening
o X-ray images of suitcases with and without weapons
(limited to guns and knives) are shown on a monitor
o Study participants must quickly choose to “clear” or
“search” the baggage, based on whether or not they
believe that weapons are present.
o Participants are told that there is an automated machine
available to assist them (Automatic Weapons Detector or
AWD)
Experimental Design Continued
• 255 undergraduate student participants
o Study participants are separated into two groups: high
machine function and low machine function
o Study participants also answer a questionnaire to
determine their “propensity to trust machines”, extraversion
as well as control variables
o Participants receive AWD instruction and 1 minute demo
that included an error or breakdown in the AWD, after
which they rated their levels of trust.
o 20 minutes to screen as many bags as they could
o Lots of stats and correlations collected on participants
X-Ray Screening Task
Figure 1. X-Ray Screening
Task screenshot.
Downloaded from
hfs.sagepub.com by HFES
General on June 15, 2012
To simulate real world situations the operator must be quick
as well as accurate so a points system is assigned. Top scorer
wins $50.
Perceptions on machine characteristics for high and low AWD function groups
are statistically significant
AWD Machine Characteristics High vs Low Function
Factors and Correlations
Difference between initial trust and post-task trust is significant
Propensity to trust machines strongly correlates with initial trust, but does not
correlate with post-task trust.
Extraversion positively correlates to propensity to trust machines.
Automation use, machine characteristics and trust
• Automation use moderates the
relationship of machine characteristics
and post-task trust, such that machine
characteristics have a greater effect on
post-task trust when use is high.
Figure 2. Interaction between machine
characteristics and automation use predicting
post-task trust.
Figure 3. Interaction between propensity to trust
machines and machine characteristics predicting
post-task trust.
• Machine characteristics
moderate the relationship
of propensity to trust
machines and post-task
trust.
User Perceptions and Post-task Trust
• Hypothesis 12: Perceptions of machine
characteristics account for additional variance in
post-task trust beyond the effects of the actual
machine characteristics
• Hierarchical linear regression model was used and
“the effects of the actual machine characteristics
were significant (β = .51, p < .01)”.
• When perceptions were accounted for and added
to the model, it resulted in a large increase in
variance (∆R2 = .52, p < .01, 52%). Overall, the
model accounted for 78% of the variance in post-
task trust.
Conclusions
• The study empirically supports differences in trust in
human-automation interaction
o Trust is dynamic and affected by different factors
• User propensity to trust automation and machine
characteristics affect trust and vice versa
o Post-task trust is negatively affected when users with higher initial trust are
paired with a less reliable machine.
o Post-task trust is less effected by user propensity to trust machines with
more machine use
• User perceptions of automation are important and
measurable
o The same machine will be perceived differently by individual users
o Individual perceptions affect variance in trust by 52%
Future Research
• Research should take user’s individual perceptions
into account when studying trust
• Trust should be measured at different points in time
for greater accuracy
• Training on machines should be more individualized
to take user expectations and perceptions into
account
o Is this practical to implement?
Thank You

Weitere ähnliche Inhalte

Andere mochten auch

Conquérir la plus grande grotte du monde
Conquérir la plus grande grotte du mondeConquérir la plus grande grotte du monde
Conquérir la plus grande grotte du mondeVietnam Original Travel
 
Evangelho no lar com crianças (9)
Evangelho no lar com crianças (9)Evangelho no lar com crianças (9)
Evangelho no lar com crianças (9)Fatoze
 
12 pergunta 11
12   pergunta 1112   pergunta 11
12 pergunta 11Fatoze
 
Baie de xuan dai séduisante et poétique
Baie de xuan dai séduisante et poétiqueBaie de xuan dai séduisante et poétique
Baie de xuan dai séduisante et poétiqueVietnam Original Travel
 
Copy verb in cobol
Copy verb in cobolCopy verb in cobol
Copy verb in cobolRammurthyT
 
Ventas 1°h alejandra
Ventas 1°h alejandraVentas 1°h alejandra
Ventas 1°h alejandrapmblack
 

Andere mochten auch (7)

Conquérir la plus grande grotte du monde
Conquérir la plus grande grotte du mondeConquérir la plus grande grotte du monde
Conquérir la plus grande grotte du monde
 
Evangelho no lar com crianças (9)
Evangelho no lar com crianças (9)Evangelho no lar com crianças (9)
Evangelho no lar com crianças (9)
 
Caratula info
Caratula infoCaratula info
Caratula info
 
12 pergunta 11
12   pergunta 1112   pergunta 11
12 pergunta 11
 
Baie de xuan dai séduisante et poétique
Baie de xuan dai séduisante et poétiqueBaie de xuan dai séduisante et poétique
Baie de xuan dai séduisante et poétique
 
Copy verb in cobol
Copy verb in cobolCopy verb in cobol
Copy verb in cobol
 
Ventas 1°h alejandra
Ventas 1°h alejandraVentas 1°h alejandra
Ventas 1°h alejandra
 

Ähnlich wie Automation 1

High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systemsAlan Tatourian
 
A computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationA computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationKamal Spring
 
Applied Artificial Intelligence and Trust
Applied Artificial Intelligence and TrustApplied Artificial Intelligence and Trust
Applied Artificial Intelligence and TrustMinjoon Kim
 
A computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docxA computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docxPvrtechnologies Nellore
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization1crore projects
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
Responsible Machine Learning
Responsible Machine LearningResponsible Machine Learning
Responsible Machine LearningEng Teong Cheah
 
UX for AI-Powered Products: Balancing Magic and User Trust
UX for AI-Powered Products: Balancing Magic and User Trust UX for AI-Powered Products: Balancing Magic and User Trust
UX for AI-Powered Products: Balancing Magic and User Trust ELEKS
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET Journal
 
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.Souma Maiti
 
Interpretable Machine Learning_ Techniques for Model Explainability.
Interpretable Machine Learning_ Techniques for Model Explainability.Interpretable Machine Learning_ Techniques for Model Explainability.
Interpretable Machine Learning_ Techniques for Model Explainability.Tyrion Lannister
 
Loan Default Prediction Using Machine Learning Techniques
Loan Default Prediction Using Machine Learning TechniquesLoan Default Prediction Using Machine Learning Techniques
Loan Default Prediction Using Machine Learning TechniquesIRJET Journal
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligencemahaveermalhi1
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systemseSAT Journals
 

Ähnlich wie Automation 1 (20)

High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systems
 
A computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationA computational dynamic trust model for user authorization
A computational dynamic trust model for user authorization
 
Applied Artificial Intelligence and Trust
Applied Artificial Intelligence and TrustApplied Artificial Intelligence and Trust
Applied Artificial Intelligence and Trust
 
A computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docxA computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docx
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
Responsible Machine Learning
Responsible Machine LearningResponsible Machine Learning
Responsible Machine Learning
 
Trust in Digital Agents
Trust in Digital AgentsTrust in Digital Agents
Trust in Digital Agents
 
40
4040
40
 
UX for AI-Powered Products: Balancing Magic and User Trust
UX for AI-Powered Products: Balancing Magic and User Trust UX for AI-Powered Products: Balancing Magic and User Trust
UX for AI-Powered Products: Balancing Magic and User Trust
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
 
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
 
Interpretable Machine Learning_ Techniques for Model Explainability.
Interpretable Machine Learning_ Techniques for Model Explainability.Interpretable Machine Learning_ Techniques for Model Explainability.
Interpretable Machine Learning_ Techniques for Model Explainability.
 
Loan Default Prediction Using Machine Learning Techniques
Loan Default Prediction Using Machine Learning TechniquesLoan Default Prediction Using Machine Learning Techniques
Loan Default Prediction Using Machine Learning Techniques
 
Agent basedqos
Agent basedqosAgent basedqos
Agent basedqos
 
28
2828
28
 
28
2828
28
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligence
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systems
 

Kürzlich hochgeladen

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Kürzlich hochgeladen (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Automation 1

  • 1. Automation: not all trust is created equal Vicki Chiang 10/1/13
  • 2. Not All Trust Is Created Equal: Dispositional and History-Based Trust in Human-Automation Interactions Stephanie M. Merritt and Daniel R. Ilgen Human Factors: The Journal of the Human Factors and Ergonomics Society 2008 Central goal of the paper is to show empirically the connections between individual user perceptions and trust in automation interactions • User personality traits such as extraversion mediates trust • It is understood that there is a correlation between trust in machines and trust in other people, but individual traits are not parsed out (Parasuraman and Miller, 2004 and Parasuraman and Riley, 1997) • Trust is dynamic and can be divided into dispositional/initial trust (interaction naïve) and post-task trust (after interaction)
  • 3. 13 Hypotheses ! 1: Initial trust is positively related to automation use on a subsequent task. 2: Propensity to trust machines is more strongly related to initial trust than to post-task trust. 3: Initial trust mediates the relationship between propensity to trust machines and automation use. 4: Extraversion is positively related to propensity to trust machines. 5: Initial trust in an automated system is positively associated with post-task trust. 6: Initial trust and post-task trust show evidence of discriminant validity. 7: Machine characteristics are more strongly related to post-task trust than to initial trust. 8: Automation use moderates the relationship of machine characteristics and post-task trust, such that machine characteristics have a greater effect on post-task trust when use is high. 9: Significant variance in perceptions of machine characteristics exists even when actual machine characteristics are constant. 10: Machine characteristics moderate the relationship of propensity to trust machines and post-task trust. 11: Machine characteristics will moderate the relationship of propensity to trust machines and perceptions of machine characteristics, such that more extreme levels of post-task trust will result when both variables are either low or high. 12: Perceptions of machine characteristics account for additional variance in post-task trust beyond the effects of the actual machine characteristics. 13: Perceptions of machine characteristics mediate the relationship between the interaction of propensity to trust with actual machine characteristics and post-task trust.
  • 4. Experimental design • X-Ray screening task o Computer based simulation of x-ray baggage screening o X-ray images of suitcases with and without weapons (limited to guns and knives) are shown on a monitor o Study participants must quickly choose to “clear” or “search” the baggage, based on whether or not they believe that weapons are present. o Participants are told that there is an automated machine available to assist them (Automatic Weapons Detector or AWD)
  • 5. Experimental Design Continued • 255 undergraduate student participants o Study participants are separated into two groups: high machine function and low machine function o Study participants also answer a questionnaire to determine their “propensity to trust machines”, extraversion as well as control variables o Participants receive AWD instruction and 1 minute demo that included an error or breakdown in the AWD, after which they rated their levels of trust. o 20 minutes to screen as many bags as they could o Lots of stats and correlations collected on participants
  • 6. X-Ray Screening Task Figure 1. X-Ray Screening Task screenshot. Downloaded from hfs.sagepub.com by HFES General on June 15, 2012 To simulate real world situations the operator must be quick as well as accurate so a points system is assigned. Top scorer wins $50.
  • 7. Perceptions on machine characteristics for high and low AWD function groups are statistically significant AWD Machine Characteristics High vs Low Function
  • 8. Factors and Correlations Difference between initial trust and post-task trust is significant Propensity to trust machines strongly correlates with initial trust, but does not correlate with post-task trust. Extraversion positively correlates to propensity to trust machines.
  • 9. Automation use, machine characteristics and trust • Automation use moderates the relationship of machine characteristics and post-task trust, such that machine characteristics have a greater effect on post-task trust when use is high. Figure 2. Interaction between machine characteristics and automation use predicting post-task trust. Figure 3. Interaction between propensity to trust machines and machine characteristics predicting post-task trust. • Machine characteristics moderate the relationship of propensity to trust machines and post-task trust.
  • 10. User Perceptions and Post-task Trust • Hypothesis 12: Perceptions of machine characteristics account for additional variance in post-task trust beyond the effects of the actual machine characteristics • Hierarchical linear regression model was used and “the effects of the actual machine characteristics were significant (β = .51, p < .01)”. • When perceptions were accounted for and added to the model, it resulted in a large increase in variance (∆R2 = .52, p < .01, 52%). Overall, the model accounted for 78% of the variance in post- task trust.
  • 11. Conclusions • The study empirically supports differences in trust in human-automation interaction o Trust is dynamic and affected by different factors • User propensity to trust automation and machine characteristics affect trust and vice versa o Post-task trust is negatively affected when users with higher initial trust are paired with a less reliable machine. o Post-task trust is less effected by user propensity to trust machines with more machine use • User perceptions of automation are important and measurable o The same machine will be perceived differently by individual users o Individual perceptions affect variance in trust by 52%
  • 12. Future Research • Research should take user’s individual perceptions into account when studying trust • Trust should be measured at different points in time for greater accuracy • Training on machines should be more individualized to take user expectations and perceptions into account o Is this practical to implement?

Hinweis der Redaktion

  1. hello
  2. Parasuraman and Miller showed that etiquette in machine communication affected trust in automationParasuraman and Riley reviewed several papers that showed a connection between trust and automation reliance in different situations, but not through the lens of individual differences.
  3. All hypothesis point to individual perceptions of automation and the relationship between those perceptions and the different stages of trust.
  4. After 20 minutes questioned post-task
  5. Here is a picture of what the X-ray baggage simulation would look likeAnd the points system to encourage accuracy and speed, just like in real life airport baggage screening. The top score won a prize.
  6. The participants were split into two groups, high machine function and low machine function, where the machine characteristics were different.They checked to make sure that in each characteristic there was a statistically significant difference between high and low groups.
  7. Table shows all the factors measured for the participants and the correlation between several factors.Difference between initial trust and post-task trust is significant-assessments of trust taken at different times seem to represent two different qualitative forms of trustTraits such as extraversion positively correlates to propensity to trust machines, which correlates with initial trust, but does not correlate with post-task trust. An example of how individual user differences affect trust. These means were used to calculate several models to prove or disprove hypothesis.
  8. On the flip side,Automation use and machine characteristics also influence trust. Low automation use, post-task trust is essentially the same, but when use is high the difference in trust is significantWhen the propensity to trust machines is high, trust is greater in a high function machine, but drops much lower in the low function machine setting. The authors believe this has to do with the expectation of machine function that does not match the outcome, so the user loses trust in the machine.
  9. However, that although the actual machine characteristics were fixed and the same (within each high/low function condition), the perception of the machine characteristics varied in post-task trust.