Trust, Control, and Design

A qualitative study of computer scientists’ use of e-mail in Australian universities shows that computer scientists equate trust with control. They seek information that gives them control to personalise and scrutinise the system. In equating trust solely with control, computer scientists are unlike middle-income residential users or young people. The level of control that is demanded is often so great that computer scientists do not use the technologies they design. For “ordinary users,” “comfort” and “caring” — are important dimensions of trust. Computer scientists also differ from young users of new information and communication technologies. Young users see control primarily as physical control, rather than control over information to personalize and scrutinize the system.

[1]  Phoebe Sengers,et al.  Designing Comprehensible Agents , 1999, IJCAI.

[2]  Shankar Ganesan Determinants of Long-Term Orientation in Buyer-Seller Relationships , 1994 .

[3]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[4]  David A. Wagner,et al.  A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.

[5]  D. Collard,et al.  Trust : making and breaking cooperative relations , 1989 .

[6]  David Bollier,et al.  The future of electronic commerce : a report of the fourth annual Aspen Institute Roundtable on Information Technology, Aspen, Colorado, August 17-20, 1995 , 1996 .

[7]  Kwok Ching Tsui,et al.  The Intelligent Assistant: An Overview , 2000, Intelligent Systems and Soft Computing.

[8]  P. Agre The soul gained and lost: artificial intelligence as a philosophical project , 1995 .

[9]  Dietrich Fahrenholtz,et al.  Towards a Sociological View of Trust in Computer Science , 2001 .

[10]  Alan Cooper,et al.  The Inmates are Running the Asylum , 1999, Software-Ergonomie.

[11]  Max Blackston,et al.  Observations: Building Brand Equity by Managing the Brand's Relationships , 2000, Journal of Advertising Research.

[12]  E. Rogers Diffusion of Innovations , 1962 .

[13]  P. Kollock The Emergence of Exchange Structures: An Experimental Study of Uncertainty, Commitment, and Trust , 1994, American Journal of Sociology.

[14]  Dan S. Wallach,et al.  Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[15]  Bart Selman,et al.  An Experiment in the Design of Software Agents , 1994, AAAI.

[16]  N. Denzin,et al.  Handbook of Qualitative Research. Second Edition. , 2000 .

[17]  A. Giddens The consequences of modernity , 1990 .

[18]  A. Strauss,et al.  Basics of qualitative research: Grounded theory procedures and techniques. , 1992 .

[19]  Thomas A. Finholt,et al.  Social Issues in Computing: Putting Computing in Its Place , 1994 .