The Interplay Between Human and Machine Agency

Human-machine networks affect many aspects of our lives: from sharing experiences with family and friends, knowledge creation and distance learning, and managing utility bills or providing feedback on retail items, to more specialised networks providing decision support to human operators and the delivery of health care via a network of clinicians, family, friends, and both physical and virtual social robots. Such networks rely on increasingly sophisticated machine algorithms, e.g., to recommend friends or purchases, to track our online activities in order to optimise the services available, and assessing risk to help maintain or even enhance people’s health. Users are being offered ever increasing power and reach through these networks by machines which have to support and allow users to be able to achieve goals such as maintaining contact, making better decisions, and monitoring their health. As such, this comes down to a synergy between human and machine agency in which one is dependent in complex ways on the other. With that agency questions arise about trust, risk and regulation, as well as social influence and potential for computer-mediated self-efficacy. In this paper, we explore these constructs and their relationships and present a model based on review of the literature which seeks to identify the various dependencies between them.

[1]  J. Lewis,et al.  The Social Dynamics of Trust: Theoretical and Empirical Research, 1985–2012 , 2012 .

[2]  Xiaolan Fu,et al.  Effects of culture, social presence, and group composition on trust in technology‐supported decision‐making groups , 2010, Inf. Syst. J..

[3]  Jeremy N. Bailenson,et al.  The Unbearable Likeness of Being Digital: The Persistence of Nonverbal Social Norms in Online Virtual Environments , 2007, Cyberpsychology Behav. Soc. Netw..

[4]  Jeremy Rose,et al.  Machine Agency as Perceived Autonomy: An Action Perspective , 2000, Organizational and Social Perspectives on IT.

[5]  Mun Y. Yi,et al.  Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model , 2003, Int. J. Hum. Comput. Stud..

[6]  Wouter Poortinga,et al.  Exploring the Dimensionality of Trust in Risk Regulation , 2003, Risk analysis : an official publication of the Society for Risk Analysis.

[7]  S. Shyam Sundar,et al.  Balancing human agency and object agency: an end-user interview study of the internet of things , 2012, UbiComp.

[8]  A. Bandura Self-efficacy mechanism in human agency , 2024, Psihologìâ ì suspìlʹstvo.

[9]  Ohbyung Kwon,et al.  An empirical study of the factors affecting social network service use , 2010, Comput. Hum. Behav..

[10]  Batya Friedman,et al.  Human agency and responsible computing: Implications for computer system design , 1992, J. Syst. Softw..

[11]  Sushil Jajodia,et al.  Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.

[12]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[13]  Dan Jong Kim,et al.  Exploring Online Transaction Self-Efficacy in Trust Building in B2C E-Commerce , 2009, J. Organ. End User Comput..

[14]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[15]  P. Haggard,et al.  Automation Technology and Sense of Control: A Window on Human Agency , 2012, PloS one.

[16]  Jeremy Rose,et al.  Socio-Theoretic Accounts of IS: The Problem of Agency , 2005, Scand. J. Inf. Syst..

[17]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[18]  Konstantin Beznosov,et al.  The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.

[19]  Hsi-Peng Lu,et al.  Why people use social networking sites: An empirical study integrating network externalities and motivation theory , 2011, Comput. Hum. Behav..

[20]  Sally A. Applin,et al.  Cooperation Between Humans and Robots: Applied Agency in Autonomous Processes , 2015 .

[21]  Sue Bennett,et al.  The 'digital natives' debate: A critical review of the evidence , 2008, Br. J. Educ. Technol..

[22]  Dan J. Kim,et al.  A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2019 .

[23]  Anthony D. Miyazaki,et al.  Reducing online privacy risk to facilitate e‐service adoption: the influence of perceived ease of use and corporate credibility , 2010 .

[24]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[25]  J. Rose,et al.  The Double Dance of Agency : a socio-theoretic account of how machines and humans interact , 2005 .

[26]  A. Bandura Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.

[27]  Mireille Hildebrandt,et al.  Privacy, Due Process and the Computational Turn : The Philosophy of Law Meets the Philosophy of Technology , 2013 .

[28]  J. H. Davis,et al.  An Integrative Model of Organizational Trust: Past, Present, and Future , 2007 .

[29]  Mireille Hildebrandt,et al.  Profile Transparency by Design? Re-enabling Double Contingency , 2013 .

[30]  Vincent T. Covello,et al.  Actual and Perceived Risk: A Review of the Literature , 1984 .

[31]  Akbar Zaheer,et al.  Trust as an Organizing Principle Bill McEvily , 2003 .

[32]  E A Leventhal,et al.  Population risk, actual risk, perceived risk, and cancer control: a discussion. , 1999, Journal of the National Cancer Institute. Monographs.

[33]  Dong-Hee Shin,et al.  The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..

[34]  Vegard Engen,et al.  Machine Agency in Human-Machine Networks; Impacts and Trust Implications , 2016, HCI.

[35]  Ahmet Akin,et al.  Social self-efficacy, academic locus of control, and internet addiction , 2010, Comput. Educ..

[36]  K. Stewart Trust Transfer on the World Wide Web , 2002 .

[37]  Jason Bennett Thatcher,et al.  Does Technology Trust Substitute Interpersonal Trust?: Examining Technology Trust's Influence on Individual Decision-Making , 2012, J. Organ. End User Comput..

[38]  David Meyer,et al.  The role of perceived enjoyment and social norm in the adoption of technology with network externalities , 2008, Eur. J. Inf. Syst..

[39]  Marshall Scott Poole,et al.  Interpersonal Traits, Complementarity, and Trust in Virtual Collaboration , 2004, J. Manag. Inf. Syst..

[40]  C. Arun,et al.  Survey on interoperability, security, trust, privacy standardization of cloud computing , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[41]  Harsha Gangadharbatla Facebook Me , 2008 .

[42]  Jason Bennett Thatcher,et al.  Trust in a specific technology: An investigation of its components and measures , 2011, TMIS.

[43]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[44]  Sally A. Applin,et al.  Watching Me, Watching You. (Process surveillance and agency in the workplace) , 2013, 2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life.

[45]  Christopher R. Jones,et al.  Net generation students: agency and choice and the new technologies , 2010, J. Comput. Assist. Learn..

[46]  Batya Friedman,et al.  Trust online , 2000, CACM.

[47]  Saonee Sarker,et al.  The Role of Communication and Trust in Global Virtual Teams: A Social Network Perspective , 2011, J. Manag. Inf. Syst..

[48]  Nicole C. Krämer,et al.  Impression Management 2.0 , 2008, J. Media Psychol. Theor. Methods Appl..

[49]  N Moray,et al.  Trust, control strategies and allocation of function in human-machine systems. , 1992, Ergonomics.

[50]  K. Strater,et al.  Strategies and struggles with privacy in an online social networking community , 2008 .

[51]  Jeremy Rose,et al.  The Problem of Agency; How Humans Act, How Machines Act , 2003 .

[52]  George Bravos,et al.  Online Appendix to : Understanding Human-Machine Networks : A Cross-Disciplinary Survey , 2017 .

[53]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.

[54]  Chun-Ming Chang,et al.  Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations , 2007, Int. J. Hum. Comput. Stud..

[55]  Albert Bandura,et al.  On the Functional Properties of Perceived Self-Efficacy Revisited , 2012 .

[56]  Paul M. Leonardi,et al.  When Flexible Routines Meet Flexible Technologies: Affordance, Constraint, and the Imbrication of Human and Material Agencies , 2011, MIS Q..

[57]  D. Gefen,et al.  Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .

[58]  H. J. Smith,et al.  Exploring information privacy regulation, risks, trust, and behavior , 2015, Inf. Manag..

[59]  Donald A. Norman,et al.  Living with complexity , 2011 .

[60]  Nizar Souiden,et al.  The interplay of counter-conformity motivation, social influence, and trust in customers' intention to adopt Internet banking services: The case of an emerging country , 2016 .

[61]  Asbjørn Følstad,et al.  Automation in Human-Machine Networks: How Increasing Machine Agency Affects Human Agency , 2017, ICMMI.

[62]  Matthew K. O. Lee,et al.  A theoretical model of intentional social action in online social networks , 2010, Decis. Support Syst..

[63]  Jason Bennett Thatcher,et al.  The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems , 2011, IEEE Transactions on Engineering Management.

[64]  Ali Şimşek The Relationship between Computer Anxiety and Computer Self-Efficacy , 2011 .

[65]  Ardion Beldad,et al.  How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust , 2010, Comput. Hum. Behav..

[66]  Mireille Hildebrandt,et al.  Smart Technologies and the End(s) of Law. Novel Entanglements of Law and Technology , 2015 .

[67]  Ellen Garbarino,et al.  GENDER DIFFERENCES IN THE PERCEIVED RISK OF BUYING ONLINE AND THE EFFECTS OF RECEIVING A SITE RECOMMENDATION , 2004 .

[68]  Richard D. Johnson,et al.  The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time , 2007, J. Assoc. Inf. Syst..

[69]  W. S. Chow,et al.  Social network, social trust and shared goals in organizational knowledge sharing , 2008, Inf. Manag..

[70]  Jason Bennett Thatcher,et al.  Internal and External Dimensions of Computer Self-Efficacy: An Empirical Examination , 2008, IEEE Transactions on Engineering Management.

[71]  A. Kellerman,et al.  The Constitution of Society : Outline of the Theory of Structuration , 2015 .

[72]  B. J. Fogg,et al.  Persuasive computers: perspectives and research directions , 1998, CHI.

[73]  Marilyn E. Gist,et al.  Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability , 1992 .

[74]  Qiang Tu,et al.  The Impact of Computer Self-Efficacy and Technology Dependence on Computer-Related Technostress: A Social Cognitive Theory Perspective , 2011, Int. J. Hum. Comput. Interact..