SlideShare a Scribd company logo
1 of 41
The value of trust:
understanding the
scale and depth of
the user’s
perspective
Koen Willaert
Shenja van der Graaf
IT as a Utility
Conference
Southampton
Starting point
Context
 Importance of trust in online environments
is widely acknowledged.
 Even though trust is important in real world
too, this is even more so online due to the
lack of the providers’ physical presence
and the rare frequency of transactions
between two entities.
Trust definition
Trust in an ICT system is a property of
individual users of the system representing
their subjective view about the system.
Users who don’t trust the system are
disinclined to use it.
OPTET takes the view that trust is a good
thing, because it helps users to benefit from
new, innovative ICT systems which they
might otherwise reject.
Trust definition broken up
 Two actors: trustor + trustee
 Risk assessment + decision making
 Two outcomes: trust level and the trustor’s
decision to engage (or not) with a trustee
by taking into account the associated risks
and benefits.
… has
received
sufficient
attention, yet
general
tendency to
readily assume
that trust is
intrinsically
beneficial…
Is trust intrinsically beneficial?
 ‘A market in which participants are trusted
to the correct degree is as efficient as a
market with complete trustworthiness’ *
 Thus, high trust is not panacea but trust
should correctly reflect trustworthiness!
* Brainov, Sandholm, “Contracting with uncertain level of trust”, In Proceedings of the 1st
ACM conference on Electronic commerce (EC '99)
Finding the correct balance
Trust
Worthy
Trust
Information Asymmetry
Goal OPTET: reaching a next level
of automation in this process
10
Gap
Social sciences:
Trust antecedents
Impact of ‘trust by
design’ solutions
….
Computer sciences:
Computational
models
Autonomous
decision making
Reputation
systems/
recommenders
…
Gap
Social sciences:
Abstract/general
level
Predicting trust in
specific system in
particular situation?
Subgroups/segmen
tation?
Researching
Trustworthiness?
Computer sciences:
….it is widely
recognized that trust
is highly subjective
… but the effects of
trustor’s attributes
are in most cases
ignored in
computational trust
models
Goal
 Explore for both
individual trustors
as for
organisations/servi
ce providers issues
related to finding
the right balance
between Trust and
Trustworthiness
 Research and
integrate subjective
attributes in a trust
computational
model for individual
trustors towards an
online system
Survey research based on model
McKnight
Results Individual
trustors
Methodology
Datamining on 8 trust related
concepts:
Trust stance
Trust beliefs in general
professionals
Institution based trust
General trust sense levels
ICT-domain specific sense of
trust levels
Motivation to engage in
trust related seeking
behavior
Trust related
competences
Perceived importance of
trustworthiness design elements
Survey details:
Online survey
Period: February-March 2013
28 countries
Major representation of UK
(32%) and Greece (18%)
90 subjects included in analysis
Mostly 5 point Likert scale items
K-means clustering for
segmentation purposes
Anova
16
Trust seeking behaviour
18/03/2014 17
General
(n= 90)
High Trust
(n = 24)
Ambivalent
(n= 20)
Highly
active
Trust
seeking
(n=28)
Medium
active
Trust
seeking
(n=18)
Mean Mean Mean Mean Mean F Sig.
I look for information about the reputation of the organization 4,01 3,83 3,75 4,50 3,78 4,307 ,007
I look for information about the (physical) location of the
organization
3,61 3,42 3,20 4,29 3,28 7,980 ,000
I look for information about laws that are applicable with regard
to my interaction with the organization
3,07 2,75 2,50 3,86 2,89 14,627 ,000
I look for any guarantees regarding confidentiality of the
information that I provide
3,67 3,38 3,00 4,54 3,44 14,992 ,000
I look for any information about complaint procedures in case
of problems
3,37 2,79 2,90 4,18 3,39 14,188 ,000
I look for any information about who is liable in case of
problems
3,28 2,67 2,70 4,25 3,22 20,876 ,000
I look for trust marks or seals of approval 3,58 3,42 3,15 4,18 3,33 6,289 ,001
Anova
Motivation to engage in trust related seeking behavior
Individual trustors segments
Ambivalent
22%
Ambivalent
22%
Highly
Active trust
seeking
31%
Highly
Active trust
seeking
31%
Medium
Active trust
seeking
20%
Medium
Active trust
seeking
20%
High Trust
27%
High Trust
27%
Segment 1: Ambivalent Trust
Ambivalent
22%
Ambivalent
22%
 Medium to high
trust stance
 Moderate seeking
activity
 Low competence
level
 ‘Forced’ trust
 Simple heuristics
Segment 2: High Trust
 High trust stance
 Limited seeking
activity
 Medium
competence level
High Trust
27%
High Trust
27%
Segment 3: Highly active trust
seeking
 Low to medium
trust stance
 Very thorough
trustworthiness
investigations
beyond cues from
service provider
 Medium
competence level
 Procedures in case
of problems
Highly
active trust
seeking
31%
Highly
active trust
seeking
31%
Segment 4: Medium active trust
seeking
 Low to medium
trust stance
 Medium level
seeking activity
 Medium to high
competence level
 Procedures in case
of problems
Medium
Active trust
seeking
20%
Medium
Active trust
seeking
20%
Trust levels
General
(n= 90)
High Trust
(n = 24)
Ambivalent
(n= 20)
Highly
active
Trust
seeking
(n=28)
Medium
active
Trust
seeking
(n=18)
Mean Mean Mean Mean Mean F Sig.
Online stores 3,92 4,21 4,00 3,57 4,00 5,247 ,002
Social networks 3,30 3,88 3,35 2,96 3,00 4,266 ,007
Professional online networks 3,69 4,21 3,63 3,30 3,63 4,474 ,006
Online governmental services 4,17 4,63 4,45 3,71 3,94 10,214 ,000
Online banking 4,27 4,63 4,70 3,75 4,11 7,999 ,000
Online health services 3,67 4,33 4,00 3,00 2,89 11,014 ,000
Online review sites 3,19 3,30 3,05 3,21 3,18 ,391 ,760
Anova
ICT-domain
Results
Organisations /
service providers
Methodology Organizations
Datamining on trust related
concepts:
Trust stance
Trust beliefs in general
professionals
Institution based trust
General trust sense levels
ICT-domain specific sense of
trust levels
Motivation to engage in
trust related seeking
behavior
Trust related
competences
Active assessment of the
trustworthiness of own and third
party applications
Trustworthiness design
elements
Survey details:
Online survey
Period: February-March 2013
Pool of international, national,
regional and local organisations
48 commercial organisation + 57
public organisations
Mostly 5 point Likert scale items
K-means clustering for
segmentation purposes
Anova
25
Organisational profile segments
Low Trust
Low
competence
6%
Low Trust
Low
competence
6%
Low Trust
High
seeking
28%
Low Trust
High
seeking
28%
High Trust
High
seeking
39%
High Trust
High
seeking
39%
High Trust
Low seeking
26%
High Trust
Low seeking
26%
Organisational segment 1:
Low trust – Low Competency
 Lower ability to understand
terms of services and to
detect threats and misuses
 Trustworthiness assessments
are likely to be less efficient or
inaccurate
 Negative views towards the
professionalism and the
expertise of other parties
 Ambivalence
 Lower ability to provide
guarantees to customers
 Lower ability to provide
information about applicable
laws governing their
relationship with their
customers
Low Trust
Low
competence
6%
Low Trust
Low
competence
6%
Organisational segment 2:
High trust – Low seeking
 Risk of overestimating the
actual trustworthiness
 Lower motivation to collect
trustworthiness information
(for instance real time
monitoring)
 Intend to provide less
guarantees to customers
 Intend to provide less
information about applicable
laws governing their
relationship with their
customers
 Less concerned about the
influence of current and near
future technology trends on
online trust/privacy and online
trust/security
High Trust
Low seeking
26%
High Trust
Low seeking
26%
Organisational segment 3:
Low trust – High seeking
 Less risk inducing behaviors
than the two previous clusters
 Less positive view on current
and future safeguards,
regulations and technological
advances
Low Trust
High
seeking
28%
Low Trust
High
seeking
28%
Organisational segment 4:
High trust – High seeking
 High trust stance and positive
views on current and future
safeguards, regulations and
technological advances.
 Active seeking behavior
High Trust
High
seeking
39%
High Trust
High
seeking
39%
Implications
Mapping Individual and organisational
segments
Low Trust
High
seeking
28%
Low Trust
High
seeking
28%
High Trust
High
seeking
39%
High Trust
High
seeking
39%
Highly
active trust
seeking
31%
Highly
active trust
seeking
31%
Medium
Active trust
seeking
20%
Medium
Active trust
seeking
20%
High Trust
Low seeking
26%
High Trust
Low seeking
26%
Low Trust
Low
competence
6%
Low Trust
Low
competence
6%
Ambivalent
22%
Ambivalent
22%
High Trust
26%
High Trust
26%
Tailored ‘Trust by design’ solutions
AmbivalentAmbivalent
 Referrals
 Easy to scan,
simple and
straightforward
cues
 Familiarity
 Technically working
well
Tailored ‘Trust by design’ solutions
 Quick scanning of
cues
 Look & feelHigh Trust
Low seeking
High Trust
Low seeking
Tailored ‘Trust by design’ solutions
 Clear terms of
service + data
policy
 Contact
information
 Outline on legal
frameworks
 Offers a complaint
mechanism
 Large set + variety
of cues
Highly
Active trust
seeking
Highly
Active trust
seeking
Tailored ‘Trust by design’ solutions
 Clear terms of
service + data
policy
 Display the
financing
organization
Medium
Active trust
seeking
Medium
Active trust
seeking
Risks associated to organisational
trust profiles
High Trust
Low seeking
High Trust
Low seeking
Low Trust
Low
competence
Low Trust
Low
competence
Low Trust
High
seeking
Low Trust
High
seeking
High Trust
High
seeking
High Trust
High
seeking
 Negative
outlook on
future trends
and
development
s
 ? Inaccurate
trustworthine
ss estimation,
 Inability to
explain terms
of services /
offer
guarantees
 A too high
trust level in
comparison
to the actual
trustworthine
ss
Conclusions +
outcome
Conclusion
 Both congruence + asymmetry between individual
trustors and organisational profiles
 Diverging implications
 Prioritizations in terms of actions for
organisations/service providers
 Services providers need to develop ‘trust by
design’ solutions targeted various trustors
segments
Outcome: Trust Modelling and Estimation
based on subjective attributes
40
High TrustHigh Trust Ambivalent
trust
Ambivalent
trust
Highly active
trust seeking
Highly active
trust seeking
Medium active
trust seeking
Medium active
trust seeking
Trust stanceTrust stance
Trust related
competences
Trust related
competences
Motivation to engage in
trust seeking behavior
Motivation to engage in
trust seeking behavior
User segments
Core trust attributes underlying segmentation
Translation of trust attributes into trust estimator
Future work

More Related Content

What's hot

Marketing - Internet Advertisement
Marketing - Internet AdvertisementMarketing - Internet Advertisement
Marketing - Internet Advertisement
Bishnu Kumar
 
Forrester big data_predictive_analytics
Forrester big data_predictive_analyticsForrester big data_predictive_analytics
Forrester big data_predictive_analytics
Shyam Sarkar
 
Quality Progress_October 2012_Brandt
Quality Progress_October 2012_BrandtQuality Progress_October 2012_Brandt
Quality Progress_October 2012_Brandt
Randy Brandt
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
Eric Young
 

What's hot (20)

Marketing - Internet Advertisement
Marketing - Internet AdvertisementMarketing - Internet Advertisement
Marketing - Internet Advertisement
 
Forrester big data_predictive_analytics
Forrester big data_predictive_analyticsForrester big data_predictive_analytics
Forrester big data_predictive_analytics
 
Big Data - What it Really Means for VOC and Customer Experience Professionals
Big Data - What it Really Means for VOC and Customer Experience ProfessionalsBig Data - What it Really Means for VOC and Customer Experience Professionals
Big Data - What it Really Means for VOC and Customer Experience Professionals
 
Quality Progress_October 2012_Brandt
Quality Progress_October 2012_BrandtQuality Progress_October 2012_Brandt
Quality Progress_October 2012_Brandt
 
Machine learning for customer classification
Machine learning for customer classificationMachine learning for customer classification
Machine learning for customer classification
 
Making Analytics Actionable for Financial Institutions (Part II of III)
Making Analytics Actionable for Financial Institutions (Part II of III)Making Analytics Actionable for Financial Institutions (Part II of III)
Making Analytics Actionable for Financial Institutions (Part II of III)
 
Whitepaper: Unlocking the Mobile Security Potential
Whitepaper: Unlocking the Mobile Security PotentialWhitepaper: Unlocking the Mobile Security Potential
Whitepaper: Unlocking the Mobile Security Potential
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
 
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...
IRJET- Strength and Workability of High Volume Fly Ash Self-Compacting Concre...
 
Original definition Predictive Analytics SPSS Jan 15, 2003 Intriduction Slides
Original definition Predictive Analytics SPSS Jan 15, 2003 Intriduction SlidesOriginal definition Predictive Analytics SPSS Jan 15, 2003 Intriduction Slides
Original definition Predictive Analytics SPSS Jan 15, 2003 Intriduction Slides
 
Analytics & Customer Engagement
Analytics &  Customer EngagementAnalytics &  Customer Engagement
Analytics & Customer Engagement
 
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw NearUse AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
Use AI to Build Member Loyalty as Medicare Eligibility Dates Draw Near
 
Contract Management in the Business Services Industry
Contract Management in the Business Services IndustryContract Management in the Business Services Industry
Contract Management in the Business Services Industry
 
Importance of High Availability for B2B e-Commerce
Importance of High Availability for B2B e-CommerceImportance of High Availability for B2B e-Commerce
Importance of High Availability for B2B e-Commerce
 
W acto07
W acto07W acto07
W acto07
 
Robust Analytics for Health Plans in an Era of Reform
Robust Analytics for Health Plans in an Era of ReformRobust Analytics for Health Plans in an Era of Reform
Robust Analytics for Health Plans in an Era of Reform
 
Marketsoft and marketing cube data quality to cc-v3
Marketsoft and marketing cube   data quality to cc-v3Marketsoft and marketing cube   data quality to cc-v3
Marketsoft and marketing cube data quality to cc-v3
 
The Path to Customer-Centric Service
The Path to Customer-Centric ServiceThe Path to Customer-Centric Service
The Path to Customer-Centric Service
 
Unit ii data analytics
Unit ii data analytics Unit ii data analytics
Unit ii data analytics
 
Predictive modelling
Predictive modellingPredictive modelling
Predictive modelling
 

Similar to The value of trust: understanding the scale and depth of the user’s perspective by Koen Willaert

The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
Capgemini
 
Top 5 Demand Generation Strategies
Top 5 Demand Generation StrategiesTop 5 Demand Generation Strategies
Top 5 Demand Generation Strategies
dreamforce2006
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docxCONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
aidaclewer
 
Novetta Entity Analytics
Novetta Entity AnalyticsNovetta Entity Analytics
Novetta Entity Analytics
Novetta
 

Similar to The value of trust: understanding the scale and depth of the user’s perspective by Koen Willaert (20)

The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
Outsourcing security survey0706 (1)
Outsourcing security survey0706 (1)Outsourcing security survey0706 (1)
Outsourcing security survey0706 (1)
 
Top 5 Demand Generation Strategies
Top 5 Demand Generation StrategiesTop 5 Demand Generation Strategies
Top 5 Demand Generation Strategies
 
Provider Authentication for Health Information Exchange
Provider Authentication for Health Information ExchangeProvider Authentication for Health Information Exchange
Provider Authentication for Health Information Exchange
 
Trust in E-Business based on Website Quality, Brand Name, and Security and Pr...
Trust in E-Business based on Website Quality, Brand Name, and Security and Pr...Trust in E-Business based on Website Quality, Brand Name, and Security and Pr...
Trust in E-Business based on Website Quality, Brand Name, and Security and Pr...
 
Analitiği Kullanarak Yüksek Performans Göstermek ve Lider Olmak Hakan Yılmaz...
Analitiği Kullanarak Yüksek Performans Göstermek ve Lider Olmak  Hakan Yılmaz...Analitiği Kullanarak Yüksek Performans Göstermek ve Lider Olmak  Hakan Yılmaz...
Analitiği Kullanarak Yüksek Performans Göstermek ve Lider Olmak Hakan Yılmaz...
 
2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey
 
The future of digital trust
The future of digital trust The future of digital trust
The future of digital trust
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Trust: How to Get It, Keep It, Measure It and Regain It
Trust: How to Get It, Keep It, Measure It and Regain It Trust: How to Get It, Keep It, Measure It and Regain It
Trust: How to Get It, Keep It, Measure It and Regain It
 
Trust Enabled Ecosystems
Trust Enabled EcosystemsTrust Enabled Ecosystems
Trust Enabled Ecosystems
 
Security services in noida redscorpionsecurity.in
Security services in noida redscorpionsecurity.inSecurity services in noida redscorpionsecurity.in
Security services in noida redscorpionsecurity.in
 
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealQuality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
 
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docxCONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
 
Vendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto SeriesVendor Management - Compliance Checklist Manifesto Series
Vendor Management - Compliance Checklist Manifesto Series
 
Accenture Distribution and Agency Management Survey: Reimagining insurance di...
Accenture Distribution and Agency Management Survey: Reimagining insurance di...Accenture Distribution and Agency Management Survey: Reimagining insurance di...
Accenture Distribution and Agency Management Survey: Reimagining insurance di...
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
AIST Presentation: Platforms for Growth: Technology Innovations in the Insura...
AIST Presentation: Platforms for Growth: Technology Innovations in the Insura...AIST Presentation: Platforms for Growth: Technology Innovations in the Insura...
AIST Presentation: Platforms for Growth: Technology Innovations in the Insura...
 
Novetta Entity Analytics
Novetta Entity AnalyticsNovetta Entity Analytics
Novetta Entity Analytics
 

More from IT as a Utility Network+ (ITaaU)

More from IT as a Utility Network+ (ITaaU) (18)

Cloud maker itaauconference2014
Cloud maker itaauconference2014Cloud maker itaauconference2014
Cloud maker itaauconference2014
 
Taking IT for Granted - David De Roure
Taking IT for Granted - David De RoureTaking IT for Granted - David De Roure
Taking IT for Granted - David De Roure
 
RCUK presentation to the ITaaU community conference by John Baird, Claire Wil...
RCUK presentation to the ITaaU community conference by John Baird, Claire Wil...RCUK presentation to the ITaaU community conference by John Baird, Claire Wil...
RCUK presentation to the ITaaU community conference by John Baird, Claire Wil...
 
The bakery presentation by Anisah Osman Britton
The bakery presentation by Anisah Osman BrittonThe bakery presentation by Anisah Osman Britton
The bakery presentation by Anisah Osman Britton
 
: The value of urgent reconfiguration of IT utilities: the air traffic contro...
: The value of urgent reconfiguration of IT utilities: the air traffic contro...: The value of urgent reconfiguration of IT utilities: the air traffic contro...
: The value of urgent reconfiguration of IT utilities: the air traffic contro...
 
TOLIVS: A Typology of Loss in Vaccine Supply Chains by Ioannis Daskalopoulos
TOLIVS: A Typology of Loss in Vaccine Supply Chains by Ioannis DaskalopoulosTOLIVS: A Typology of Loss in Vaccine Supply Chains by Ioannis Daskalopoulos
TOLIVS: A Typology of Loss in Vaccine Supply Chains by Ioannis Daskalopoulos
 
Using Wireless Networks to Support First Responders and Resilience in Upland ...
Using Wireless Networks to Support First Responders and Resilience in Upland ...Using Wireless Networks to Support First Responders and Resilience in Upland ...
Using Wireless Networks to Support First Responders and Resilience in Upland ...
 
Trusted Tiny Things by Edoardo Pignotti
Trusted Tiny Things by Edoardo PignottiTrusted Tiny Things by Edoardo Pignotti
Trusted Tiny Things by Edoardo Pignotti
 
Weightless Machine Communications by Yao (Frank) Gao
Weightless Machine Communications by Yao (Frank) GaoWeightless Machine Communications by Yao (Frank) Gao
Weightless Machine Communications by Yao (Frank) Gao
 
Fail Fast Flair: Ustwo Passion and Digital Products by Joe McCleod
Fail Fast Flair: Ustwo Passion and Digital Products by Joe McCleodFail Fast Flair: Ustwo Passion and Digital Products by Joe McCleod
Fail Fast Flair: Ustwo Passion and Digital Products by Joe McCleod
 
Business Models for CDIT Clusters: The Transformational Challenge for the Bou...
Business Models for CDIT Clusters: The Transformational Challenge for the Bou...Business Models for CDIT Clusters: The Transformational Challenge for the Bou...
Business Models for CDIT Clusters: The Transformational Challenge for the Bou...
 
Libraries of the Future by Lizzie Tait
Libraries of the Future by Lizzie TaitLibraries of the Future by Lizzie Tait
Libraries of the Future by Lizzie Tait
 
Communities on the Clouds by Tom Lodge
Communities on the Clouds by Tom LodgeCommunities on the Clouds by Tom Lodge
Communities on the Clouds by Tom Lodge
 
Well Sorted by Tom Methven
Well Sorted by Tom MethvenWell Sorted by Tom Methven
Well Sorted by Tom Methven
 
Open Data Institute (ODI) Overview by Andrea Cox
Open Data Institute (ODI) Overview by Andrea CoxOpen Data Institute (ODI) Overview by Andrea Cox
Open Data Institute (ODI) Overview by Andrea Cox
 
Mapping for Change by Karen Martin
Mapping for Change by Karen MartinMapping for Change by Karen Martin
Mapping for Change by Karen Martin
 
CloudSME EU project by Tamas Kiss
CloudSME EU project by Tamas KissCloudSME EU project by Tamas Kiss
CloudSME EU project by Tamas Kiss
 
Putting the Person into Personalization by Elizabeth Churchill
Putting the Person into Personalization by Elizabeth ChurchillPutting the Person into Personalization by Elizabeth Churchill
Putting the Person into Personalization by Elizabeth Churchill
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

The value of trust: understanding the scale and depth of the user’s perspective by Koen Willaert

  • 1. The value of trust: understanding the scale and depth of the user’s perspective Koen Willaert Shenja van der Graaf IT as a Utility Conference Southampton
  • 3. Context  Importance of trust in online environments is widely acknowledged.  Even though trust is important in real world too, this is even more so online due to the lack of the providers’ physical presence and the rare frequency of transactions between two entities.
  • 4. Trust definition Trust in an ICT system is a property of individual users of the system representing their subjective view about the system. Users who don’t trust the system are disinclined to use it. OPTET takes the view that trust is a good thing, because it helps users to benefit from new, innovative ICT systems which they might otherwise reject.
  • 5. Trust definition broken up  Two actors: trustor + trustee  Risk assessment + decision making  Two outcomes: trust level and the trustor’s decision to engage (or not) with a trustee by taking into account the associated risks and benefits.
  • 6. … has received sufficient attention, yet general tendency to readily assume that trust is intrinsically beneficial…
  • 7. Is trust intrinsically beneficial?  ‘A market in which participants are trusted to the correct degree is as efficient as a market with complete trustworthiness’ *  Thus, high trust is not panacea but trust should correctly reflect trustworthiness! * Brainov, Sandholm, “Contracting with uncertain level of trust”, In Proceedings of the 1st ACM conference on Electronic commerce (EC '99)
  • 8. Finding the correct balance Trust Worthy Trust
  • 10. Goal OPTET: reaching a next level of automation in this process 10
  • 11. Gap Social sciences: Trust antecedents Impact of ‘trust by design’ solutions …. Computer sciences: Computational models Autonomous decision making Reputation systems/ recommenders …
  • 12. Gap Social sciences: Abstract/general level Predicting trust in specific system in particular situation? Subgroups/segmen tation? Researching Trustworthiness? Computer sciences: ….it is widely recognized that trust is highly subjective … but the effects of trustor’s attributes are in most cases ignored in computational trust models
  • 13. Goal  Explore for both individual trustors as for organisations/servi ce providers issues related to finding the right balance between Trust and Trustworthiness  Research and integrate subjective attributes in a trust computational model for individual trustors towards an online system
  • 14. Survey research based on model McKnight
  • 16. Methodology Datamining on 8 trust related concepts: Trust stance Trust beliefs in general professionals Institution based trust General trust sense levels ICT-domain specific sense of trust levels Motivation to engage in trust related seeking behavior Trust related competences Perceived importance of trustworthiness design elements Survey details: Online survey Period: February-March 2013 28 countries Major representation of UK (32%) and Greece (18%) 90 subjects included in analysis Mostly 5 point Likert scale items K-means clustering for segmentation purposes Anova 16
  • 17. Trust seeking behaviour 18/03/2014 17 General (n= 90) High Trust (n = 24) Ambivalent (n= 20) Highly active Trust seeking (n=28) Medium active Trust seeking (n=18) Mean Mean Mean Mean Mean F Sig. I look for information about the reputation of the organization 4,01 3,83 3,75 4,50 3,78 4,307 ,007 I look for information about the (physical) location of the organization 3,61 3,42 3,20 4,29 3,28 7,980 ,000 I look for information about laws that are applicable with regard to my interaction with the organization 3,07 2,75 2,50 3,86 2,89 14,627 ,000 I look for any guarantees regarding confidentiality of the information that I provide 3,67 3,38 3,00 4,54 3,44 14,992 ,000 I look for any information about complaint procedures in case of problems 3,37 2,79 2,90 4,18 3,39 14,188 ,000 I look for any information about who is liable in case of problems 3,28 2,67 2,70 4,25 3,22 20,876 ,000 I look for trust marks or seals of approval 3,58 3,42 3,15 4,18 3,33 6,289 ,001 Anova Motivation to engage in trust related seeking behavior
  • 18. Individual trustors segments Ambivalent 22% Ambivalent 22% Highly Active trust seeking 31% Highly Active trust seeking 31% Medium Active trust seeking 20% Medium Active trust seeking 20% High Trust 27% High Trust 27%
  • 19. Segment 1: Ambivalent Trust Ambivalent 22% Ambivalent 22%  Medium to high trust stance  Moderate seeking activity  Low competence level  ‘Forced’ trust  Simple heuristics
  • 20. Segment 2: High Trust  High trust stance  Limited seeking activity  Medium competence level High Trust 27% High Trust 27%
  • 21. Segment 3: Highly active trust seeking  Low to medium trust stance  Very thorough trustworthiness investigations beyond cues from service provider  Medium competence level  Procedures in case of problems Highly active trust seeking 31% Highly active trust seeking 31%
  • 22. Segment 4: Medium active trust seeking  Low to medium trust stance  Medium level seeking activity  Medium to high competence level  Procedures in case of problems Medium Active trust seeking 20% Medium Active trust seeking 20%
  • 23. Trust levels General (n= 90) High Trust (n = 24) Ambivalent (n= 20) Highly active Trust seeking (n=28) Medium active Trust seeking (n=18) Mean Mean Mean Mean Mean F Sig. Online stores 3,92 4,21 4,00 3,57 4,00 5,247 ,002 Social networks 3,30 3,88 3,35 2,96 3,00 4,266 ,007 Professional online networks 3,69 4,21 3,63 3,30 3,63 4,474 ,006 Online governmental services 4,17 4,63 4,45 3,71 3,94 10,214 ,000 Online banking 4,27 4,63 4,70 3,75 4,11 7,999 ,000 Online health services 3,67 4,33 4,00 3,00 2,89 11,014 ,000 Online review sites 3,19 3,30 3,05 3,21 3,18 ,391 ,760 Anova ICT-domain
  • 25. Methodology Organizations Datamining on trust related concepts: Trust stance Trust beliefs in general professionals Institution based trust General trust sense levels ICT-domain specific sense of trust levels Motivation to engage in trust related seeking behavior Trust related competences Active assessment of the trustworthiness of own and third party applications Trustworthiness design elements Survey details: Online survey Period: February-March 2013 Pool of international, national, regional and local organisations 48 commercial organisation + 57 public organisations Mostly 5 point Likert scale items K-means clustering for segmentation purposes Anova 25
  • 26. Organisational profile segments Low Trust Low competence 6% Low Trust Low competence 6% Low Trust High seeking 28% Low Trust High seeking 28% High Trust High seeking 39% High Trust High seeking 39% High Trust Low seeking 26% High Trust Low seeking 26%
  • 27. Organisational segment 1: Low trust – Low Competency  Lower ability to understand terms of services and to detect threats and misuses  Trustworthiness assessments are likely to be less efficient or inaccurate  Negative views towards the professionalism and the expertise of other parties  Ambivalence  Lower ability to provide guarantees to customers  Lower ability to provide information about applicable laws governing their relationship with their customers Low Trust Low competence 6% Low Trust Low competence 6%
  • 28. Organisational segment 2: High trust – Low seeking  Risk of overestimating the actual trustworthiness  Lower motivation to collect trustworthiness information (for instance real time monitoring)  Intend to provide less guarantees to customers  Intend to provide less information about applicable laws governing their relationship with their customers  Less concerned about the influence of current and near future technology trends on online trust/privacy and online trust/security High Trust Low seeking 26% High Trust Low seeking 26%
  • 29. Organisational segment 3: Low trust – High seeking  Less risk inducing behaviors than the two previous clusters  Less positive view on current and future safeguards, regulations and technological advances Low Trust High seeking 28% Low Trust High seeking 28%
  • 30. Organisational segment 4: High trust – High seeking  High trust stance and positive views on current and future safeguards, regulations and technological advances.  Active seeking behavior High Trust High seeking 39% High Trust High seeking 39%
  • 32. Mapping Individual and organisational segments Low Trust High seeking 28% Low Trust High seeking 28% High Trust High seeking 39% High Trust High seeking 39% Highly active trust seeking 31% Highly active trust seeking 31% Medium Active trust seeking 20% Medium Active trust seeking 20% High Trust Low seeking 26% High Trust Low seeking 26% Low Trust Low competence 6% Low Trust Low competence 6% Ambivalent 22% Ambivalent 22% High Trust 26% High Trust 26%
  • 33. Tailored ‘Trust by design’ solutions AmbivalentAmbivalent  Referrals  Easy to scan, simple and straightforward cues  Familiarity  Technically working well
  • 34. Tailored ‘Trust by design’ solutions  Quick scanning of cues  Look & feelHigh Trust Low seeking High Trust Low seeking
  • 35. Tailored ‘Trust by design’ solutions  Clear terms of service + data policy  Contact information  Outline on legal frameworks  Offers a complaint mechanism  Large set + variety of cues Highly Active trust seeking Highly Active trust seeking
  • 36. Tailored ‘Trust by design’ solutions  Clear terms of service + data policy  Display the financing organization Medium Active trust seeking Medium Active trust seeking
  • 37. Risks associated to organisational trust profiles High Trust Low seeking High Trust Low seeking Low Trust Low competence Low Trust Low competence Low Trust High seeking Low Trust High seeking High Trust High seeking High Trust High seeking  Negative outlook on future trends and development s  ? Inaccurate trustworthine ss estimation,  Inability to explain terms of services / offer guarantees  A too high trust level in comparison to the actual trustworthine ss
  • 39. Conclusion  Both congruence + asymmetry between individual trustors and organisational profiles  Diverging implications  Prioritizations in terms of actions for organisations/service providers  Services providers need to develop ‘trust by design’ solutions targeted various trustors segments
  • 40. Outcome: Trust Modelling and Estimation based on subjective attributes 40 High TrustHigh Trust Ambivalent trust Ambivalent trust Highly active trust seeking Highly active trust seeking Medium active trust seeking Medium active trust seeking Trust stanceTrust stance Trust related competences Trust related competences Motivation to engage in trust seeking behavior Motivation to engage in trust seeking behavior User segments Core trust attributes underlying segmentation Translation of trust attributes into trust estimator

Editor's Notes

  1. But achieving a balance between trust and trustworthiness is not a trivial task. The main reason is information asymmetry among users and providers, concerning the trustworthiness of the latter.
  2. E.g. reputation mechanism providing referrals, disregarding the importance of personal trust drivers
  3. To assist a service provider (trustee) in choosing the trustworthiness level (which we assume cannot be strategically altered later) and the price(s) that will maximize its profits.
  4. Ambivalence on one hand these organisations are concerned about trust but on the other hand fail to master it.
  5. are needed to let organizations evolve towards the ‘High trust – High seeking’ standard. Seeking behavior should be in place before focusing on the trust beliefs, also compentence levels should be increase as a first priority if they are considered sub standard.