Fostering Initial Trust In Applications - Developing And Evaluating Requirement Patterns For Application Websites

When users first encounter an application, or decide which application from a number of options to use, their initial trust in this application is a determinant for their willingness to adopt it. At this time, users have not yet had a chance to interact with the application, and hence their perceptions are based on the application presentation on the website rather than on the application’s actual performance. To help providers select supporting measures for the website to improve the perceived trustworthiness of their application, we propose a set of requirement patterns. Patterns are used in requirements engineering to recognize important and recurring issues, thus reducing the effort during requirements specification. We developed them from trust theory, following the design-science based evaluation framework for patterns. To evaluate the feasibility of our approach, 17 teams used the patterns to specify a website for a mobile application. The results indicate that the teams frequently used ten of our proposed patterns. A subsequent survey regarding pattern quality shows an overall acceptance and that the team members rated the patterns as comprehensible, understandable and helpful. We hence conclude that our approach to incorporating trust-based requirements to foster initial trust in application website specifications is feasible.

[1]  Jan Marco Leimeister,et al.  The Emergence of Mutual and Shared Understanding in the System Development Process , 2013, REFSQ.

[2]  Sarah Spiekermann,et al.  Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation , 2007, UbiComp.

[3]  Venkatesh Shankar,et al.  Online trust: a stakeholder perspective, concepts, implications, and future directions , 2002, J. Strateg. Inf. Syst..

[4]  Scott Dick,et al.  Consumer trust in e-commerce web sites , 2011, ACM Comput. Surv..

[5]  Jagdip Singh,et al.  Agency and trust mechanisms in consumer satisfaction and loyalty judgments , 2000 .

[6]  Barbara Paech,et al.  RePa Requirements Pattern Template , 2012 .

[7]  Jun He,et al.  Understanding the Sources and Impacts of Trust in E-Commerce: a Meta-Analysis , 2011, AMCIS.

[8]  Holger Hoffmann,et al.  Twenty Software Requirement Patterns to Specify Recommender Systems that Users will Trust , 2012, ECIS.

[9]  Ivy Hooks,et al.  WRITING GOOD REQUIREMENTS , 1994 .

[10]  Paul A. Pavlou,et al.  Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..

[11]  Jan Marco Leimeister,et al.  Towards trust-based software requirement patterns , 2012, 2012 Second IEEE International Workshop on Requirements Patterns (RePa).

[12]  Martin Bichler,et al.  Design science in information systems research , 2006, Wirtschaftsinf..

[13]  Lorrie Faith Cranor,et al.  Security and Usability: Designing Secure Systems that People Can Use , 2005 .

[14]  Feng Li,et al.  A Holistic Framework for Trust in Online Transactions , 2012 .

[15]  Lorrie Faith Cranor,et al.  Trust modelling for online transactions: a phishing scenario , 2006, PST.

[16]  S. Gregor,et al.  Measuring Human-Computer Trust , 2000 .

[17]  Carme Quer,et al.  A Metamodel for Software Requirement Patterns , 2010, REFSQ.

[18]  Jan Marco Leimeister,et al.  Understanding the Formation of Trust in IT Artifacts , 2012, ICIS.

[19]  Panagiotis Kanellis,et al.  INVESTIGATING TRUST IN E-COMMERCE: A LITERATURE REVIEW AND A MODEL FOR ITS FORMATION IN CUSTOMER RELATIONSHIPS , 2001 .

[20]  John D. Lee,et al.  Trust in Automation: Designing for Appropriate Reliance , 2004 .

[21]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[22]  Carme Quer,et al.  A pattern-based method for building requirements documents in call-for-tender processes , 2009, Int. J. Comput. Sci. Appl..

[23]  G. Zaltman,et al.  Factors affecting trust in market research relationships. , 1993 .

[24]  N. Luhmann Trust and Power , 1979 .

[25]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[26]  Ardion Beldad,et al.  How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust , 2010, Comput. Hum. Behav..

[27]  Kevin Zheng Zhou,et al.  Alternative Origins to Interorganizational Trust: An Interdependence Perspective on the Shadow of the Past and the Shadow of the Future , 2007, Organ. Sci..

[28]  Jessie Y. C. Chen,et al.  A Meta-Analysis of Factors Affecting Trust in Human-Robot Interaction , 2011, Hum. Factors.

[29]  Stephen Withall Software Requirement Patterns , 2007 .

[30]  Gregory A. Bigley,et al.  Straining for Shared Meaning in Organization Science: Problems of Trust and Distrust , 1998 .

[31]  Clyde W. Holsapple,et al.  The dynamics of trust in B2C e-commerce: a research model and agenda , 2005, Inf. Syst. E Bus. Manag..

[32]  John D. Murphy,et al.  A design science based evaluation framework for patterns , 2010, DATB.

[33]  Rellie Derfler-Rozin,et al.  Logos and Initial Compliance: A Strong Case of Mindless Trust , 2008, Organ. Sci..

[34]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[35]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[36]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..