SlideShare une entreprise Scribd logo
1  sur  18
Human-computer Trust
Theoretical underpinnings 
HCI perspective 
• Study computing and computational artifacts as they 
relate to the human condition. 
Participation 
Cooperation 
Trust perspective 
• Study how it can be crucial element in human 
relationship 
Human Computer Trust 
• Represents the Value centered Interactions 
The interception of Human-Computer interactions 
components; and The dynamic nature of trust in 
relationships
key principles 
The ongoing cultural shift 
• a ever-widening range of digital artifacts is 
transforming our daily lives. 
The way we 
communicate, 
locate, play, learn, 
and much more 
How we relate to technology is 
• less and less about the… devices; and 
• more about the… activities. 
Information technology context is 
• becoming pervasive; and 
Computing is 
• becoming ubiquitous
WHY TRUST….
Contextual aim 
Trust contemplates 
• Social phenomena 
• A complex two-way relationship 
Trust emerges from 
• An interpersonal organization 
• A specific social situation 
• A specific social context 
• Positive experiences 
• Interactions 
• Active participation 
• Cooperative relations 
SUPPORT 
& 
SUSTAIN
Contextual aim 
Trusting represents 
• A reinsurance element 
Trusting comes associated 
• With certain properties that help to support 
users intended behaviours 
Trusting relies on 
• The identification of trustworthy making 
qualities 
What underlies 
people's beliefs
The research…
The research contemplates 
A need for identify 
1. trust social values (qualities) that underlies 
people’s trust beliefs 
1. The reliability of those trustworthy making 
qualities 
1. How those (trustworthy making qualities) 
are represented in today’s ongoing cultural 
shift
Stage 1 (the process) 
What is trust 
social 
phenomena? 
Trust concept 
map 
Extensive 
literature review 
Online 
communities 
concept map 
Participatory 
design sessions 
Modeling Trust as a social phenomena 
A social-technical 
model of trust 
Technology 
acceptance 
models 
1
Stage 2 (Validation) 
How does trust 
relate to users' 
activities? 
Trust trust effects 
in basic online 
activities 
survey 
Elicitation of trust 
effects in 
interactions 
survey 
trust concept map 
model of trust 
Trust survey 
trust concept map 
model of trust 
OLC concept 
map 
Eliciting the reliability of those trustworthy making qualities 
A model of 
Human-computer 
Trust 
2
Results (associated notions) 
Trusting is… 
• process of believing in others behaviours 
Reflects a 
• risk 
While some are more 
willing to take the 
risks others don’t 
Level of 
commitment of 
both parts 
Strong incentives to 
believe that 
determinate person, 
service or tool is in 
fact trustworthy
Predominant factors 
Attitudes towards sharing 
• Shared history & identity 
• Respect and have honorable intentions 
• Be reliable 
• Be known 
• Sympathy & friendliness 
Attitudes towards relate 
• Honesty & transparency 
• know the person 
• Be willing to 
• Empathy 
• Reliable source 
Attitudes towards communicate 
• Honest & Transparent behaviours 
• Receive support 
• Feel secure 
• Share similar interests 
Trust Predisposition 
Reciprocity 
Competency 
Benevolency 
Predictability 
Honesty
Trust & Privacy by safe we mean… 
felling a degree of control who will read 
or have access to their shared 
resources, comments and assignments. 
Students feel safe to share
Trust & collaboration 
Is much related with commitments 
• But those are perceived differently from person to 
person 
Trust influence commitments 
• group working dynamic 
Major needs -> 
• Predict how if others will behave as expected
Trust-enabling interactions 
By observing trust enabling qualities we can 
• Enables more honest & transparent behaviours 
• Predict others activities patterns 
• Perceive others competencies 
• creates emphatic relations which, enable Social 
engagement, 
• Diminish group hostility which, increase group 
commitment 
• Foster group motivation & willingness to cooperate
Human Computer Trust model 
Trust Predisposition 
Motivation 
Willingness 
Competency 
Predictability 
Reciprocity 
Benovelence 
Honesty 
Expectations 
Contributes 
Rational perception 
Emotional 
perception 
Relationships 
Contributes 
Commitments 
Intentions 
Predisposition to cooperate 
Predisposition to relate 
Behaviours 
Engagement 
Qualities Beliefs intentions Attitudes
Application 
Support the design of a instrument to Assess/ 
evaluate trust-enabling interaction design 
qualities 
Sousa, S., Lamas, D.; 
Shmorgun, I.; Arakelyan, A. 
(2014). 
A design space for trust 
enabling interaction design. 
In MIDI 2014, ACM (2014) 
This toolset provides 
designers lenses to 
assess the act of 
design for trust-enable 
interactions and further 
evaluate if their design 
propositions have 
been reflected in the 
design outcome.
Thank you!

Contenu connexe

En vedette

How To SASS - af morningtrain.dk
How To SASS - af morningtrain.dkHow To SASS - af morningtrain.dk
How To SASS - af morningtrain.dkMorning Train
 
Workshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluationWorkshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluationSónia
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Sónia
 
eduHcc lesson2-3
eduHcc lesson2-3eduHcc lesson2-3
eduHcc lesson2-3Sónia
 
Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2Sónia
 
Trust workshop
Trust workshopTrust workshop
Trust workshopSónia
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsSónia
 
IFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languagesIFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languagesSónia
 

En vedette (20)

How To SASS - af morningtrain.dk
How To SASS - af morningtrain.dkHow To SASS - af morningtrain.dk
How To SASS - af morningtrain.dk
 
Workshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluationWorkshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluation
 
Lesson 17
Lesson 17Lesson 17
Lesson 17
 
Lesson 16
Lesson 16Lesson 16
Lesson 16
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 07
Lesson 07Lesson 07
Lesson 07
 
Lesson 03
Lesson 03Lesson 03
Lesson 03
 
Lesson 03
Lesson 03Lesson 03
Lesson 03
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2
 
Css ms megha
Css ms meghaCss ms megha
Css ms megha
 
HTML Lesson 1
HTML Lesson 1HTML Lesson 1
HTML Lesson 1
 
eduHcc lesson2-3
eduHcc lesson2-3eduHcc lesson2-3
eduHcc lesson2-3
 
Lesson 02
Lesson 02Lesson 02
Lesson 02
 
Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2
 
Trust workshop
Trust workshopTrust workshop
Trust workshop
 
Lesson 12
Lesson 12Lesson 12
Lesson 12
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactions
 
HTML Lesson 5
HTML Lesson 5HTML Lesson 5
HTML Lesson 5
 
Lesson 11
Lesson 11Lesson 11
Lesson 11
 
IFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languagesIFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languages
 

Similaire à 20 06-2014

Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust onlineTina Guenther
 
CVS Surveyors |Hows build-up trust in Business | Presentation
CVS Surveyors |Hows build-up trust in Business | PresentationCVS Surveyors |Hows build-up trust in Business | Presentation
CVS Surveyors |Hows build-up trust in Business | PresentationCVSSurveyors701
 
Social capital compressed version
Social capital compressed versionSocial capital compressed version
Social capital compressed versionZHICHAO ZHU
 
How do we change everything when everything is changing?
How do we change everything when everything is changing?How do we change everything when everything is changing?
How do we change everything when everything is changing?Catherine Howe
 
'Social Media, The Organisation and Me', British Academy of Management 2012
'Social Media, The Organisation and Me', British Academy of Management 2012'Social Media, The Organisation and Me', British Academy of Management 2012
'Social Media, The Organisation and Me', British Academy of Management 2012Dr. Chris James Carter
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization1crore projects
 
Integration afternoon 1 intro 6 july 2010
Integration afternoon 1 intro 6 july 2010Integration afternoon 1 intro 6 july 2010
Integration afternoon 1 intro 6 july 2010GOOD Agency
 
Account Recovery is Hard• Forgot your password” there’s many w.docx
Account Recovery is Hard• Forgot your password” there’s many w.docxAccount Recovery is Hard• Forgot your password” there’s many w.docx
Account Recovery is Hard• Forgot your password” there’s many w.docxdaniahendric
 
Ppt perception and individual Decision Making
Ppt perception and individual Decision MakingPpt perception and individual Decision Making
Ppt perception and individual Decision MakingDeni Triyanto
 
The Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoThe Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoLina Angel
 
1©McGraw-Hill Education. All rights reserved. Authorized o
1©McGraw-Hill Education. All rights reserved. Authorized o1©McGraw-Hill Education. All rights reserved. Authorized o
1©McGraw-Hill Education. All rights reserved. Authorized oTatianaMajor22
 
Iri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust FrameworkIri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust FrameworkLassonde School of Engineering
 
Organization Network Analysis
Organization Network AnalysisOrganization Network Analysis
Organization Network AnalysisSwathi Dhilip
 
Toby lowe - The Gathering Feb 2020
Toby lowe - The Gathering Feb 2020Toby lowe - The Gathering Feb 2020
Toby lowe - The Gathering Feb 2020VolunteerScotland
 
Anne Gregory om The trusted adviser
Anne Gregory om The trusted adviserAnne Gregory om The trusted adviser
Anne Gregory om The trusted adviserNilla Peterson
 
Communication and Collaboration Best Practices for High-Growth, Dispersed Teams
Communication and Collaboration Best Practices for High-Growth, Dispersed TeamsCommunication and Collaboration Best Practices for High-Growth, Dispersed Teams
Communication and Collaboration Best Practices for High-Growth, Dispersed TeamsBianca Leong
 
The Strategically Networked Organization
The Strategically Networked Organization The Strategically Networked Organization
The Strategically Networked Organization Hanna Lehtimäki
 

Similaire à 20 06-2014 (20)

Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust online
 
Iri weak ties and innovation report out - final
Iri weak ties and  innovation   report out - finalIri weak ties and  innovation   report out - final
Iri weak ties and innovation report out - final
 
CVS Surveyors |Hows build-up trust in Business | Presentation
CVS Surveyors |Hows build-up trust in Business | PresentationCVS Surveyors |Hows build-up trust in Business | Presentation
CVS Surveyors |Hows build-up trust in Business | Presentation
 
Social capital compressed version
Social capital compressed versionSocial capital compressed version
Social capital compressed version
 
How do we change everything when everything is changing?
How do we change everything when everything is changing?How do we change everything when everything is changing?
How do we change everything when everything is changing?
 
'Social Media, The Organisation and Me', British Academy of Management 2012
'Social Media, The Organisation and Me', British Academy of Management 2012'Social Media, The Organisation and Me', British Academy of Management 2012
'Social Media, The Organisation and Me', British Academy of Management 2012
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization
 
Trust, weak ties and innovation
Trust, weak ties and innovationTrust, weak ties and innovation
Trust, weak ties and innovation
 
Integration afternoon 1 intro 6 july 2010
Integration afternoon 1 intro 6 july 2010Integration afternoon 1 intro 6 july 2010
Integration afternoon 1 intro 6 july 2010
 
Account Recovery is Hard• Forgot your password” there’s many w.docx
Account Recovery is Hard• Forgot your password” there’s many w.docxAccount Recovery is Hard• Forgot your password” there’s many w.docx
Account Recovery is Hard• Forgot your password” there’s many w.docx
 
Ppt perception and individual Decision Making
Ppt perception and individual Decision MakingPpt perception and individual Decision Making
Ppt perception and individual Decision Making
 
The Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoThe Best from the UX Summit in Chicago
The Best from the UX Summit in Chicago
 
1©McGraw-Hill Education. All rights reserved. Authorized o
1©McGraw-Hill Education. All rights reserved. Authorized o1©McGraw-Hill Education. All rights reserved. Authorized o
1©McGraw-Hill Education. All rights reserved. Authorized o
 
Iri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust FrameworkIri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust Framework
 
Organization Network Analysis
Organization Network AnalysisOrganization Network Analysis
Organization Network Analysis
 
Toby lowe - The Gathering Feb 2020
Toby lowe - The Gathering Feb 2020Toby lowe - The Gathering Feb 2020
Toby lowe - The Gathering Feb 2020
 
Anne Gregory om The trusted adviser
Anne Gregory om The trusted adviserAnne Gregory om The trusted adviser
Anne Gregory om The trusted adviser
 
Communication and Collaboration Best Practices for High-Growth, Dispersed Teams
Communication and Collaboration Best Practices for High-Growth, Dispersed TeamsCommunication and Collaboration Best Practices for High-Growth, Dispersed Teams
Communication and Collaboration Best Practices for High-Growth, Dispersed Teams
 
The Strategically Networked Organization
The Strategically Networked Organization The Strategically Networked Organization
The Strategically Networked Organization
 

Plus de Sónia

MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)Sónia
 
MG673 - Session 1
MG673 - Session 1MG673 - Session 1
MG673 - Session 1Sónia
 
Workshop 1
Workshop 1Workshop 1
Workshop 1Sónia
 
Ifi7184 lesson7
Ifi7184 lesson7Ifi7184 lesson7
Ifi7184 lesson7Sónia
 
Ifi7184 lesson6
Ifi7184 lesson6Ifi7184 lesson6
Ifi7184 lesson6Sónia
 
Ifi7184 lesson5
Ifi7184 lesson5Ifi7184 lesson5
Ifi7184 lesson5Sónia
 
Ifi7184 lesson4
Ifi7184 lesson4Ifi7184 lesson4
Ifi7184 lesson4Sónia
 
Ifi7174 lesson4
Ifi7174 lesson4Ifi7174 lesson4
Ifi7174 lesson4Sónia
 
Ifi7174 lesson3
Ifi7174 lesson3Ifi7174 lesson3
Ifi7174 lesson3Sónia
 
Ifi7184 lesson3
Ifi7184 lesson3Ifi7184 lesson3
Ifi7184 lesson3Sónia
 
Ifi7174 lesson1
Ifi7174 lesson1Ifi7174 lesson1
Ifi7174 lesson1Sónia
 
Ifi7184.DT lesson 2
Ifi7184.DT lesson 2Ifi7184.DT lesson 2
Ifi7184.DT lesson 2Sónia
 
IFI7184.DT about the course
IFI7184.DT about the courseIFI7184.DT about the course
IFI7184.DT about the courseSónia
 
Comparative evaluation
Comparative evaluationComparative evaluation
Comparative evaluationSónia
 
Ifi7155 Contextualization
Ifi7155 ContextualizationIfi7155 Contextualization
Ifi7155 ContextualizationSónia
 
Hcc lesson7
Hcc lesson7Hcc lesson7
Hcc lesson7Sónia
 
Hcc lesson6
Hcc lesson6Hcc lesson6
Hcc lesson6Sónia
 
Human Centered Computing (introduction)
Human Centered Computing (introduction)Human Centered Computing (introduction)
Human Centered Computing (introduction)Sónia
 
Ifi7155 project-final
Ifi7155 project-finalIfi7155 project-final
Ifi7155 project-finalSónia
 
Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)Sónia
 

Plus de Sónia (20)

MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)
 
MG673 - Session 1
MG673 - Session 1MG673 - Session 1
MG673 - Session 1
 
Workshop 1
Workshop 1Workshop 1
Workshop 1
 
Ifi7184 lesson7
Ifi7184 lesson7Ifi7184 lesson7
Ifi7184 lesson7
 
Ifi7184 lesson6
Ifi7184 lesson6Ifi7184 lesson6
Ifi7184 lesson6
 
Ifi7184 lesson5
Ifi7184 lesson5Ifi7184 lesson5
Ifi7184 lesson5
 
Ifi7184 lesson4
Ifi7184 lesson4Ifi7184 lesson4
Ifi7184 lesson4
 
Ifi7174 lesson4
Ifi7174 lesson4Ifi7174 lesson4
Ifi7174 lesson4
 
Ifi7174 lesson3
Ifi7174 lesson3Ifi7174 lesson3
Ifi7174 lesson3
 
Ifi7184 lesson3
Ifi7184 lesson3Ifi7184 lesson3
Ifi7184 lesson3
 
Ifi7174 lesson1
Ifi7174 lesson1Ifi7174 lesson1
Ifi7174 lesson1
 
Ifi7184.DT lesson 2
Ifi7184.DT lesson 2Ifi7184.DT lesson 2
Ifi7184.DT lesson 2
 
IFI7184.DT about the course
IFI7184.DT about the courseIFI7184.DT about the course
IFI7184.DT about the course
 
Comparative evaluation
Comparative evaluationComparative evaluation
Comparative evaluation
 
Ifi7155 Contextualization
Ifi7155 ContextualizationIfi7155 Contextualization
Ifi7155 Contextualization
 
Hcc lesson7
Hcc lesson7Hcc lesson7
Hcc lesson7
 
Hcc lesson6
Hcc lesson6Hcc lesson6
Hcc lesson6
 
Human Centered Computing (introduction)
Human Centered Computing (introduction)Human Centered Computing (introduction)
Human Centered Computing (introduction)
 
Ifi7155 project-final
Ifi7155 project-finalIfi7155 project-final
Ifi7155 project-final
 
Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)
 

20 06-2014

  • 2. Theoretical underpinnings HCI perspective • Study computing and computational artifacts as they relate to the human condition. Participation Cooperation Trust perspective • Study how it can be crucial element in human relationship Human Computer Trust • Represents the Value centered Interactions The interception of Human-Computer interactions components; and The dynamic nature of trust in relationships
  • 3. key principles The ongoing cultural shift • a ever-widening range of digital artifacts is transforming our daily lives. The way we communicate, locate, play, learn, and much more How we relate to technology is • less and less about the… devices; and • more about the… activities. Information technology context is • becoming pervasive; and Computing is • becoming ubiquitous
  • 5. Contextual aim Trust contemplates • Social phenomena • A complex two-way relationship Trust emerges from • An interpersonal organization • A specific social situation • A specific social context • Positive experiences • Interactions • Active participation • Cooperative relations SUPPORT & SUSTAIN
  • 6. Contextual aim Trusting represents • A reinsurance element Trusting comes associated • With certain properties that help to support users intended behaviours Trusting relies on • The identification of trustworthy making qualities What underlies people's beliefs
  • 8. The research contemplates A need for identify 1. trust social values (qualities) that underlies people’s trust beliefs 1. The reliability of those trustworthy making qualities 1. How those (trustworthy making qualities) are represented in today’s ongoing cultural shift
  • 9. Stage 1 (the process) What is trust social phenomena? Trust concept map Extensive literature review Online communities concept map Participatory design sessions Modeling Trust as a social phenomena A social-technical model of trust Technology acceptance models 1
  • 10. Stage 2 (Validation) How does trust relate to users' activities? Trust trust effects in basic online activities survey Elicitation of trust effects in interactions survey trust concept map model of trust Trust survey trust concept map model of trust OLC concept map Eliciting the reliability of those trustworthy making qualities A model of Human-computer Trust 2
  • 11. Results (associated notions) Trusting is… • process of believing in others behaviours Reflects a • risk While some are more willing to take the risks others don’t Level of commitment of both parts Strong incentives to believe that determinate person, service or tool is in fact trustworthy
  • 12. Predominant factors Attitudes towards sharing • Shared history & identity • Respect and have honorable intentions • Be reliable • Be known • Sympathy & friendliness Attitudes towards relate • Honesty & transparency • know the person • Be willing to • Empathy • Reliable source Attitudes towards communicate • Honest & Transparent behaviours • Receive support • Feel secure • Share similar interests Trust Predisposition Reciprocity Competency Benevolency Predictability Honesty
  • 13. Trust & Privacy by safe we mean… felling a degree of control who will read or have access to their shared resources, comments and assignments. Students feel safe to share
  • 14. Trust & collaboration Is much related with commitments • But those are perceived differently from person to person Trust influence commitments • group working dynamic Major needs -> • Predict how if others will behave as expected
  • 15. Trust-enabling interactions By observing trust enabling qualities we can • Enables more honest & transparent behaviours • Predict others activities patterns • Perceive others competencies • creates emphatic relations which, enable Social engagement, • Diminish group hostility which, increase group commitment • Foster group motivation & willingness to cooperate
  • 16. Human Computer Trust model Trust Predisposition Motivation Willingness Competency Predictability Reciprocity Benovelence Honesty Expectations Contributes Rational perception Emotional perception Relationships Contributes Commitments Intentions Predisposition to cooperate Predisposition to relate Behaviours Engagement Qualities Beliefs intentions Attitudes
  • 17. Application Support the design of a instrument to Assess/ evaluate trust-enabling interaction design qualities Sousa, S., Lamas, D.; Shmorgun, I.; Arakelyan, A. (2014). A design space for trust enabling interaction design. In MIDI 2014, ACM (2014) This toolset provides designers lenses to assess the act of design for trust-enable interactions and further evaluate if their design propositions have been reflected in the design outcome.