Application of the heuristic-systematic model to computer code trustworthiness: The influence of reputation and transparency

Abstract Computer programs (code) are integral to the functions of current society. Yet, little is known about why programmers trust code they did not create. The current paper applied the heuristic-systematic model (HSM) of information processing to perceptions of code trust for reuse. The studies explored transparency (readability and organization) and reputation (source) as factors that influenced trust perceptions and time spent reviewing code using professional programmers. Source and readability manipulations led to higher trustworthiness assessments in the first study. Organization had nonlinear effects on trustworthiness. A three-way interaction including time was also found. The second online study largely replicated the first study’s main and interaction effects for trustworthiness, but the main effects on time were not significant. Our findings suggest the relationships of transparency on trustworthiness are not as straightforward as previously thought. Additionally, the findings of the current study expand the HSM to trust in code.

[1]  Charles A. Sutton,et al.  Learning natural coding conventions , 2014, SIGSOFT FSE.

[2]  M. Sherif,et al.  The psychology of attitudes. , 1946, Psychological review.

[3]  Shelly Chaiken,et al.  Percentage discounts, initial price, and bargain hunting : a heuristic-systematic approach to price search behavior , 1995 .

[4]  J. P. Wanous,et al.  Overall job satisfaction: how good are single-item measures? , 1997, The Journal of applied psychology.

[5]  Carlos Flavián,et al.  Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..

[6]  Fernando R. Jiménez,et al.  Too Popular to Ignore: The Influence of Online Reviews on Purchase Intentions of Search and Experience Products , 2013 .

[7]  A. Agnihotri,et al.  Online Review Helpfulness: Role of Qualitative Factors , 2016 .

[8]  John Hunt Java Style Guidelines , 1998 .

[9]  J. Freedman,et al.  Percentage discounts, initial price, and bargain hunting: A heuristic-systematic approach to price search behavior. , 1995 .

[10]  E. Wagenmakers,et al.  Hidden multiplicity in exploratory multiway ANOVA: Prevalence and remedies , 2014, Psychonomic Bulletin & Review.

[11]  P. Albert,et al.  Models for longitudinal data: a generalized estimating equation approach. , 1988, Biometrics.

[12]  David Davenport,et al.  Impact of maintainability defects on code inspections , 2010, ESEM '10.

[13]  S. Chaiken Heuristic versus systematic information processing and the use of source versus message cues in persuasion. , 1980 .

[14]  Gene M. Alarcon,et al.  Trustworthiness Perceptions of Computer Code: A Heuristic-Systematic Processing Model , 2018, HICSS.

[15]  Ann E. Schlosser Can including pros and cons increase the helpfulness and persuasiveness of online reviews? The interactive effects of ratings and arguments ☆ , 2011 .

[16]  Alan D. Mead,et al.  Inattentive Responding in MTurk and Other Online Samples , 2015, Industrial and Organizational Psychology.

[17]  Haotian Zhou,et al.  of Personality and Social Psychology The Pitfall of Experimenting on the Web : How Unattended Selective Attrition Leads to Surprising ( Yet False ) Research Conclusions , 2016 .

[18]  Mun Y. Yi,et al.  Untangling the antecedents of initial trust in Web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk , 2013, Decis. Support Syst..

[19]  Christopher J. Carpenter Making Compliance Seem More Important: The “Just-One-More” Technique of Gaining Compliance , 2014 .

[20]  S. Shyam Sundar,et al.  Mobile Persuasion: Can Screen Size and Presentation Mode Make a Difference to Trust? , 2016 .

[21]  Sharon Dunwoody,et al.  Linking the Heuristic-Systematic Model and Depth of Processing , 2002, Commun. Res..

[22]  Shelly Chaiken,et al.  Beyond accuracy: Defense and impression motives in heuristic and systematic information processing. , 1996 .

[23]  Tao Zhou,et al.  Understanding users' initial trust in mobile banking: An elaboration likelihood perspective , 2012, Comput. Hum. Behav..

[24]  Mark Harman,et al.  Why Source Code Analysis and Manipulation Will Always be Important , 2010, 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation.

[25]  Joseph B. Lyons,et al.  A Descriptive Model of Computer Code Trustworthiness , 2017 .

[26]  S. Chaiken,et al.  Promoting systematic processing in low-motivation settings: effect of incongruent information on processing and judgment. , 1991, Journal of personality and social psychology.

[27]  Alice H. Eagly,et al.  Heuristic and systematic information processing within and beyond the persuasion context. , 1989 .

[28]  Zhihua Qu,et al.  RoboLeader: An Intelligent Agent for Enhancing Supervisory Control of Multiple Robots , 2010 .

[29]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[30]  S. Chaiken,et al.  Heuristic processing can bias systematic processing: effects of source credibility, argument ambiguity, and task importance on attitude judgment. , 1994, Journal of personality and social psychology.

[31]  Gerd Gigerenzer,et al.  Heuristic decision making. , 2011, Annual review of psychology.

[32]  Miguel Ángel López-Navarro,et al.  The antecedent role of personal environmental values in the relationships among trust in companies, information processing and risk perception , 2014 .

[33]  Stephen L. Jones,et al.  Diagnosing the locus of trust: A temporal perspective for trustor, trustee, and dyadic influences on perceived trustworthiness. , 2016, The Journal of applied psychology.

[34]  Tony Gaddis Starting Out with Programming Logic and Design , 2007 .

[35]  Shelley E. Taylor,et al.  Social cognition, 2nd ed. , 1991 .

[36]  Raja Parasuraman,et al.  Adaptive Aiding of Human-Robot Teaming , 2011 .

[37]  Masooda Bashir,et al.  Trust in Automation , 2015, Hum. Factors.

[38]  Vern Paxson,et al.  The Matter of Heartbleed , 2014, Internet Measurement Conference.

[39]  Edgar Erdfelder,et al.  G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences , 2007, Behavior research methods.

[40]  J. Gross,et al.  Stairs or escalator? Using theories of persuasion and motivation to facilitate healthy decision making. , 2014, Journal of experimental psychology. Applied.

[41]  S. Chaiken,et al.  Motivated Heuristic and Systematic Processing , 1999 .