Trust in Computers: The Computers-Are-Social-Actors (CASA) Paradigm and Trustworthiness Perception in Human-Computer Communication

Although computers, when first invented, emerged in the image of a massive, beast-like machine (Laurel, 1993) or a “giant calculator” (Turkle, 1995), they have evolved to reside in almost every corner of our daily lives. We no longer use computers only as a computing tool, but use them for a variety of purposes including, but not limited to, learning, shopping, entertainment, and social interaction. In these various venues of computer use, people not just rely on computers for connecting and communicating with others (i.e., computer-mediated communication: CMC), but, in many cases, communicate with computers (human-computer communication: HCC). Thanks to the advances in digital technologies and to the availability of higher bandwidths, the ways in which people communicate with computers and computer agents—pre-programmed digital ABsTRAcT

[1]  D. Byrne,et al.  Attraction and similarity of personality characteristics. , 1967, Journal of personality and social psychology.

[2]  K. Giffin The contribution of studies of source credibility to a theory of interpersonal trust in the communication process. , 1967, Psychological bulletin.

[3]  P. Ekman,et al.  Nonverbal Leakage and Clues to Deception †. , 1969, Psychiatry.

[4]  C. Hendrick,et al.  Effects of salience of stimulus inconsistency on impression formation. , 1972, Journal of personality and social psychology.

[5]  P. Ekman,et al.  Detecting deception from the body or face. , 1974 .

[6]  Lawrence R. Wheeless,et al.  THE MEASUREMENT OF TRUST AND ITS RELATIONSHIP TO SELF‐DISCLOSURE , 1977 .

[7]  Madeline E. Heilman,et al.  High school students' occupational interest as a function of projected sex ratios in male-dominated occupations. , 1979 .

[8]  Yaacov Schul,et al.  The informational basis of social judgements: Under what conditions are inconsistent trait descriptions processed as easily as consistent ones? , 1983 .

[9]  J. M. Digman PERSONALITY STRUCTURE: EMERGENCE OF THE FIVE-FACTOR MODEL , 1990 .

[10]  C. Semmes DEVELOPING TRUST , 1991 .

[11]  Steven J. Plimpton,et al.  Massively parallel methods for engineering and science problems , 1994, CACM.

[12]  Pattie Maes,et al.  Agents that reduce work and information overload , 1994, CACM.

[13]  Daniel J. McAllister Affect- and Cognition-Based Trust as Foundations for Interpersonal Cooperation in Organizations , 1995 .

[14]  B. J. Fogg,et al.  Can computer personalities be human personalities? , 1995, Int. J. Hum. Comput. Stud..

[15]  C. Nass,et al.  How “Real” Are Computer Personalities? , 1996 .

[16]  Clifford Nass,et al.  Are Computers Gender-Neutral? Gender Stereotypic Responses to Computers , 1997 .

[17]  C. Nass,et al.  Are Machines Gender Neutral? Gender‐Stereotypic Responses to Computers With Voices , 1997 .

[18]  Brant R. Burleson,et al.  The Impact of Situational Variables on Helpers' Perceptions of Comforting Messages , 1997 .

[19]  E. Harmon-Jones,et al.  Empathy and attitudes: can feeling for a member of a stigmatized group improve feelings toward the group? , 1997, Journal of personality and social psychology.

[20]  Clifford Nass,et al.  Are computers scapegoats? Attributions of responsibility in human-computer interaction , 1998, Int. J. Hum. Comput. Stud..

[21]  N. Anderson,et al.  Communication of Sexual Risk Behavior among Late Adolescents , 1998, Western journal of nursing research.

[22]  D. Winter,et al.  Traits and motives: toward an integration of two traditions in personality research. , 1998, Psychological review.

[23]  Youngme Moon Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .

[24]  C. Nass,et al.  Machines and Mindlessness , 2000 .

[25]  Justine Cassell,et al.  External manifestations of trustworthiness in the interface , 2000, CACM.

[26]  James C. Lester,et al.  Animated Pedagogical Agents: Face-to-Face Interaction in Interactive Learning Environments , 2000 .

[27]  S. Johnson,et al.  Attachment injuries in couple relationships: a new perspective on impasses in couples therapy. , 2001, Journal of marital and family therapy.

[28]  C. Nass,et al.  Does computer-synthesized speech manifest personality? Experimental tests of recognition, similarity-attraction, and consistency-attraction. , 2001, Journal of experimental psychology. Applied.

[29]  E. Finley,et al.  Survivors of intimate partner violence speak out , 2003 .

[30]  D. Ferrin,et al.  Removing the shadow of suspicion: the effects of apology versus denial for repairing competence- versus integrity-based trust violations. , 2004, The Journal of applied psychology.

[31]  Trudy L. Hanson,et al.  The impact of teacher immediacy and perceived caring on teacher competence and trustworthiness , 2004 .

[32]  Cheryl Campanella Bracken,et al.  Social Presence and Children: Praise, Intrinsic Motivation, and Learning With Computers , 2004 .

[33]  Clifford Nass,et al.  Computers that care: investigating the effects of orientation of emotion exhibited by an embodied computer agent , 2005, Int. J. Hum. Comput. Stud..

[34]  C. Nass,et al.  When a Talking-Face Computer Agent Is Half-Human and Half-Humanoid: Human Identity and Consistency Preference. , 2007 .

[35]  Clifford Nass,et al.  The Case for Caring Colearners: The Effects of a Computer‐Mediated Colearner Agent on Trust and Learning , 2007 .

[36]  Jean-Marc Seigneur,et al.  Collaborative Computer Security and Trust Management , 2009 .

[37]  Conghui Liu,et al.  Human-Machine Trust Interaction: A Technical Overview , 2010, Int. J. Dependable Trust. Inf. Syst..

[38]  Zheng Yan,et al.  Trust Modeling and Management in Digital Environments: From Social Concept to System Development , 2010 .

[39]  Helen N. Rothberg,et al.  Knowledge Assets, E-Networks and Trust , 2010 .

[40]  International Journal of Dependable and Trustworthy Information Systems , 2022 .