Negative Consequences of Anthropomorphized Technology: A Bias-Threat-Illusion Model

Attributing human-like traits to information technology (IT) — leading to what is called anthropomorphized technology (AT)—is increasingly common by users of IT. Previous IS research has offered varying perspectives on AT, although it primarily focuses on the positive consequences. This paper aims to clarify the construct of AT and proposes a “bias–threat–illusion” model to classify the negative consequences of AT. Drawing on “threefactor theory of anthropomorphism” from social psychology and integrating self-regulation theory, we propose that failing to regulate the use of elicited agent knowledge and to control the intensified psychological needs (i.e., sociality and effectance) when interacting with AT leads to negative consequences: “transferring human bias,” “inducing threat to human agency,” and “creating illusionary relationship.” Based on this bias–threat–illusion model, we propose theory-driven remedies to attenuate negative consequences. We conclude with implications for IS theories and practice.

[1]  Blake E. Ashforth,et al.  “My Company Is Friendly,” “Mine’s a Rebel”: Anthropomorphism and Shifting Organizational Identity From “What” to “Who” , 2020 .

[2]  P. Dumouchel,et al.  Anthropomorphism in Human–Robot Co-evolution , 2018, Front. Psychol..

[3]  Alan R. Dennis,et al.  Interacting Like Humans? Understanding the Effect of Anthropomorphism on Consumer's Willingness to Pay in Online Auctions , 2017, HICSS.

[4]  Eric Horvitz,et al.  Long-Term Trends in the Public Perception of Artificial Intelligence , 2016, AAAI.

[5]  E. Wan,et al.  Judging a Book by Its Cover? The Effect of Anthropomorphism on Product Attribute Processing and Consumer Preference , 2016 .

[6]  Yixing Chen,et al.  Revealing sensitive information in personal interviews: Is self-disclosure easier with humans or avatars and under what conditions? , 2016, Comput. Hum. Behav..

[7]  Sara Kim,et al.  Anthropomorphized Helpers Undermine Autonomy and Enjoyment in Computer Games , 2016 .

[8]  Izak Benbasat,et al.  Effects of rational and social appeals of online recommendation agents on cognition- and affect-based trust , 2016, Decis. Support Syst..

[9]  Sara Moussawi Investigating Personal Intelligent Agents in Everyday Life through a Behavioral Lens , 2016 .

[10]  Nancy K. Lankton,et al.  Technology, Humanness, and Trust: Rethinking Trust in Technology , 2015, J. Assoc. Inf. Syst..

[11]  Ofir Turel,et al.  Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users , 2015, Eur. J. Inf. Syst..

[12]  Ann Majchrzak,et al.  Interactive Self-Regulatory Theory for Sharing and Protecting in Interorganizational Collaborations , 2015 .

[13]  Elena Karahanna,et al.  Online Recommendation Systems in a B2C E-Commerce Context: A Review and Future Directions , 2015, J. Assoc. Inf. Syst..

[14]  Monideepa Tarafdar,et al.  The dark side of information technology , 2015 .

[15]  N. Epley,et al.  The mind in the machine: Anthropomorphism increases trust in an autonomous vehicle , 2014 .

[16]  Fangyuan Chen A motivational account of product anthropomorphism : effects on product perceptions and consumer states , 2014 .

[17]  Marina Puzakova,et al.  When Humanizing Brands Goes Wrong: The Detrimental Effect of Brand Anthropomorphization amid Product Wrongdoings , 2013 .

[18]  Andrew N. K. Chen,et al.  Can Online Wait Be Managed? The Effect of Filler Interfaces and Presentation Modes on Perceived Waiting Time Online , 2012, MIS Q..

[19]  S. Shyam Sundar,et al.  Anthropomorphism of computers: Is it mindful or mindless? , 2012, Comput. Hum. Behav..

[20]  Alexander Serenko,et al.  Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users , 2011, MIS Q..

[21]  Hongki Kim,et al.  What If Your Avatar Looks Like You? Dual-Congruity Perspectives for Avatar Use , 2011, MIS Q..

[22]  N. Sharkey,et al.  Granny and the robots: ethical issues in robot care for the elderly , 2012, Ethics and Information Technology.

[23]  Ayelet Fishbach,et al.  How Positive and Negative Feedback Motivate Goal Pursuit , 2010 .

[24]  Jonathan Gratch,et al.  Virtual humans elicit socially anxious interactants' verbal self‐disclosure , 2010, Comput. Animat. Virtual Worlds.

[25]  Mark A. Fuller,et al.  Designing Interfaces with Social Presence: Using Vividness and Extraversion to Create Social Recommendation Agents , 2009, J. Assoc. Inf. Syst..

[26]  Milena M. Head,et al.  Exploring human images in website design: a multi-method approach , 2009 .

[27]  Izak Benbasat,et al.  Evaluating Anthropomorphic Product Recommendation Agents: A Social Relationship Perspective to Designing Information Systems , 2009, J. Manag. Inf. Syst..

[28]  Keng Siau,et al.  Are Male and Female Avatars Perceived Equally in 3D Virtual Worlds? , 2009, AMCIS.

[29]  A. Tiwana Does technological modularity substitute for control? A study of alliance performance in software outsourcing , 2008 .

[30]  R. Wiers,et al.  Working memory capacity and self-regulatory behavior: toward an individual differences perspective on behavior determination by automatic versus controlled processes. , 2008, Journal of personality and social psychology.

[31]  J. Cacioppo,et al.  On seeing human: a three-factor theory of anthropomorphism. , 2007, Psychological review.

[32]  D. Wegner,et al.  Dimensions of Mind Perception , 2007, Science.

[33]  Antonella De Angeli,et al.  Sex Stereotypes and Conversational Agents , 2006 .

[34]  Christian Rauh,et al.  The Influence of the Avatar on Online Perceptions of Anthropomorphism, Androgyny, Credibility, Homophily, and Attraction , 2005, J. Comput. Mediat. Commun..

[35]  Anne Beaudry,et al.  Understanding User Responses to Information Technology: A Coping Model of User Adaption , 2005, MIS Q..

[36]  Izak Benbasat,et al.  Trust In and Adoption of Online Recommendation Agents , 2005, J. Assoc. Inf. Syst..

[37]  Robert LaRose,et al.  Unregulated Internet Usage: Addiction, Habit, or Deficient Self-Regulation? , 2003 .

[38]  Anthony G. Greenwald,et al.  Targets of discrimination: Effects of race on responses to weapons holders , 2003 .

[39]  C. Nass,et al.  Machines and Mindlessness , 2000 .

[40]  C. Carver,et al.  On the Self-Regulation of Behavior , 1998 .

[41]  R. Baumeister,et al.  Ego depletion: is the active self a limited resource? , 1998, Journal of personality and social psychology.

[42]  Matthew Lombard,et al.  At the Heart of It All: The Concept of Presence , 2006 .

[43]  B. J. Fogg,et al.  Computers are social actors: a review of current research , 1997 .

[44]  Laura L. Carstensen,et al.  Social and emotional patterns in adulthood: support for socioemotional selectivity theory. , 1992, Psychology and aging.

[45]  Jay F. Nunamaker,et al.  Systems Development in Information Systems Research , 1990, J. Manag. Inf. Syst..

[46]  G. Bodenhausen,et al.  Social stereotypes and information-processing strategies: the impact of task complexity. , 1987, Journal of personality and social psychology.

[47]  C. Carver,et al.  Control theory: a useful conceptual framework for personality-social, clinical, and health psychology. , 1982, Psychological bulletin.