Section 5.3. The Time-Course of Trust


5.3. The Time-Course of Trust

The research on trust reviewed in earlier sections suggests a need for more explicit consideration of the ways in which trust develops over time. It is certainly worth distinguishing between the kinds of trust that support transient interactions and those that support longer-term relationships.[33] A number of authors[34] have suggested that three phases are important: a phase of initial trust, followed by a more protracted exchange, which then may or may not lead to a longer-term trusting relationship. If one considers trust in this developmental context, some of the findings in the literature make more sense. In particular, consideration of a developmental context helps to reconcile the tension between those models of trust suggesting that trust is a concept grounded in careful judgment of vendor expertise and experience, process predictability, degree of personalization, and communication integrity,[35] and those models suggesting that trust decisions depend much more heavily on the attractiveness and professional feel of a site.[36]

[33] For example, D. Meyerson, K. E. Weick, and R. M. Kramer, "Swift Trust and Temporary Groups," in R. M. Kramer and T. R. Tyler (eds.), Trust in Organizations: Frontiers of Theory and Research (Thousand Oaks, CA: Sage Publications, 1996), 166195.

[34] Elizabeth Sillence, Pam Briggs, Lesley Fishwick, and Peter Harris, "Trust and Mistrust of Online Health Sites," Proceedings of the 2004 Conference on Human Factors in Computing Systems (2004), 663670; Florian Egger, "From Interactions to Transactions: Designing the Trust Experience for Business-to-Consumer Electronic Commerce," Ph.D. Thesis, Eindhoven University of Technology, The Netherlands, 2003; http://www.ecommuse.com/research/publications/thesis.htm.

[35] For example, A. Bhattacherjee, "Individual Trust in Online Firms: Scale Development and Initial Trust," Journal of Management Information Systems 19:1 (2002), 213243; J. Lee, J. Kim, and J.Y. Moon, "What Makes Internet Users Visit Cyber Stores Again? Key Design Factors for Customer Loyalty," Proceedings of CHI '2000 (2000), 305312; D. H. McKnight, V. Choudhury, and C. Kacmar, "Developing and Validating Trust Measures for E-Commerce: An Integrative Typology," Information Systems Research 13:3 (2002), 334359.

[36] U. Steinbruck, H. Schaumburg, S. Duda, and T. Kreuger, "A Picture Says More Than a Thousand WordsPhotographs as Trust Builders in E-Commerce Websites," Proceedings of Conference on Human Factors in Computing Systems CHI 2002 (Extended Abstracts) (2002), 748749.

The importance of visual appeal in the early stages of interaction with a web site is not unexpected given that in face-to-face interaction, we often make judgments on the basis of the attractiveness of an individual, giving rise to the well-known halo effect.[37] Other influences on first impressions in face-to-face conversation include the small talk that strangers engage in. Some trust designers have tried to capture this in the design of relational agents that promote early trust. Thus, Bickmore and Cassell describe the use of small talk to build "like-mindedness" between interlocuters in the early stages of an interaction.[38] Although there is less documented research concerning trust in such interactions, the issue of how to make an agent trustworthy is likely to be important for future security systems.[39]

[37] See, for example, N. R. Bardack and F. T. McAndrew, "The Influence of Physical Attractiveness and Manner of Dress on Success in a Simulated Personnel Decision," Journal of Social Psychology 125 (1985), 777778; K. Dion, E. Bersheid, and E. Walster, "What is Beautiful is Good," Journal of Personality and Social Psychology 24 (1972), 285290.

[38] T. Bickmore and J. Cassell, "Relational Agents: A Model and Implementation of Building User Trust," Proceedings of Conference on Human Factors in Computing Systems CHI 2001 (2001), 396403.

[39] Andrew S. Patrick, "Building Trustworthy Software Agents," IEEE Internet Computing 6:6 (2002), 4653.

Another advantage of considering the developmental nature of trust is that it facilitates consideration of those factors that help to build trust and those that destroy it. A very early study of trust in automated systems demonstrated the intuitive finding that trust is slow to build up but can be destroyed very quickly.[40] This asymmetry is one of the reasons that researchers have suggested that the underlying processes involved in making or breaking trust are likely to be different. Thus, for example, McKnight et al.[41] describe two models, one for trust and one for distrust, and argue that disposition to trust and institution-based trust affects low/medium-risk perceptions, while disposition to distrust and institution-based distrust affects medium/high-risk perceptions. The authors found that in contexts where people were merely exploring a site, the disposition to trust was most salient. Once they had made up their minds to engage in a higher-risk interaction with the site, the disposition to distrust became more important. McKnight et al. also found that promoting some initial exploration of the site was easy initially (because of the readiness to trust) and that this initial exploration could then be used subsequently to overcome the inclination to distrust when the user went on to engage in risky behavior. Interestingly, McKnight also observed a kind of halo effect such that a professional and well-designed site was associated with a disposition to trust.

[40] J. Lee and N. Moray, "Trust, Control Strategies and Allocation of Function in Human-Machine Systems," Ergonomics 35:10 (1992), 12431270.

[41] D. Harrison McKnight and Norman L. Chervany, "Trust and Distrust De?nitions: One Bite at a Time," in R. Falcone, M. Singh, and Y.-H. Tan (eds.), Trust in Cyber-societies, LNAI 2246 (Springer, 2001) 27-54.

These findings are consistent with the heuristic-systematic models described earlier if we consider that people are initially disinclined to look for hard evidence of trust (in the form of systematic assessment of expertise and careful investigation of privacy and security policies), but are instead happy to engage with sites on the basis that they are attractive and easy to use.



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net