trust in it: factors, metrics and models
TRANSCRIPT
![Page 2: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/2.jpg)
+Hi! I’m Dr. Clare Hooper I enjoy exploring boundaries
quantitative and qualitative industry and academia
I’m into HCI, web science, user experience, ubicomp, hypertext
Recent topics include design, inclusive research, crime, social media and trust
![Page 3: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/3.jpg)
+TRIFoRMTRust in IT: Factors, metRics, Models
Trust Mistrust
Reliable
Accurate
Useable
Insecure
Unpredictable
![Page 4: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/4.jpg)
+Multidisciplinary approach
Computer science, health science, social science and engineering
The University of Southampton… Faculty of Health Sciences (Jane Prichard) Faculty of Business and Law (Melanie
Ashleigh) IT Innovation Centre (Clare Hooper, Brian
Pickering, Mike Surridge, Stefanie Wiegand)
![Page 5: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/5.jpg)
+The problem
What are the trusting beliefs of users of IT systems?
What factors influence trust of systems?
How can we model those factors and trust levels?
![Page 6: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/6.jpg)
+
Trust in a system may be too high or low compared with its actual trustworthiness (security) Trigger adequate trust
perceptions allowing users to make risk-aware, informed decisions
Methodologies to increase trustworthiness
www.it-innovation.soton.ac.uk/projects/optet
![Page 7: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/7.jpg)
+TRIFoRM How do users develop
and apply trust to systems?
Models to determine when user trust is out of balance with system trustworthiness
Add to set of warnings and reassurances that OPTET can provide
![Page 8: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/8.jpg)
+The process
Literature
• State of the art from social sciences
• Analyse trust models from OPTET
Data gathering
• Semi-structured interviews• Service users and a service
provider
Thematic analysis
• Identify and model threats• Identify threat controls and key
issues
![Page 9: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/9.jpg)
+The process
Literature
• State of the art from social sciences
• Analyse trust models from OPTET
Data gathering
• Semi-structured interviews• Service users and a service
provider
Thematic analysis
• Identify and model threats• Identify threat controls and key
issues
![Page 10: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/10.jpg)
+The process
Literature
• State of the art from social sciences
• Analyse trust models from OPTET
Data gathering
• Semi-structured interviews• Service users and a service
provider
Thematic analysis
• Identify and model threats• Identify threat controls and key
issues
![Page 11: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/11.jpg)
+Model of trust
![Page 12: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/12.jpg)
+Rheumatoid Arthritis App (RApp)
![Page 13: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/13.jpg)
Technology Acceptanc
e (3+1)
Demographics
HCI
Trust Transfer
Cognitive Impairment
+ve Effects on H2H
Interaction
Fault Tolerance
(2+1)
Usefulness (4+1) Ease of
Use (5+1)
Risk Taking (4+1)
Convenience
(4+0)
![Page 14: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/14.jpg)
Technology Acceptanc
e (3+1)
Demographics
HCI
Trust Transfer
Cognitive Impairment
+ve Effects on H2H
Interaction
Fault Tolerance
(2+1)
Usefulness (4+1) Ease of
Use (5+1)
Risk Taking (4+1)
Convenience
(4+0)
![Page 15: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/15.jpg)
Technology Acceptanc
e (3+1)
Demographics
HCI
Trust Transfer
Cognitive Impairment
+ve Effects on H2H
Interaction
Fault Tolerance
(2+1)
Usefulness (4+1) Ease of
Use (5+1)
Risk Taking (4+1)
Convenience
(4+0)
![Page 16: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/16.jpg)
Technology Acceptanc
e (3+1)
Demographics
HCI
Trust Transfer
Cognitive Impairment
+ve Effects on H2H
Interaction
Fault Tolerance
(2+1)
Usefulness (4+1) Ease of
Use (5+1)
Risk Taking (4+1)
Convenience
(4+0)
![Page 17: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/17.jpg)
Technology Acceptanc
e (3+1)
Demographics
HCI
Trust Transfer
Cognitive Impairment
+ve Effects on H2H
Interaction
Fault Tolerance
(2+1)
Usefulness (4+1) Ease of
Use (5+1)
Risk Taking (4+1)
Convenience
(4+0)
![Page 18: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/18.jpg)
Technology Acceptanc
e (3+1)
Demographics
HCI
Trust Transfer
Cognitive Impairment
+ve Effects on H2H
Interaction
Fault Tolerance
(2+1)
Usefulness (4+1) Ease of
Use (5+1)
Risk Taking (4+1)
Convenience
(4+0)
![Page 19: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/19.jpg)
Technology Acceptanc
e (3+1)
Demographics
HCI
Trust Transfer
Cognitive Impairment
+ve Effects on H2H
Interaction
Fault Tolerance
(2+1)
Usefulness (4+1) Ease of
Use (5+1)
Risk Taking (4+1)
Convenience
(4+0)
![Page 20: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/20.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 21: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/21.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 22: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/22.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 23: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/23.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 24: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/24.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 25: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/25.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 26: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/26.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 27: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/27.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 28: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/28.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 29: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/29.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 30: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/30.jpg)
Trust Transfer (4+1)
Trust in Experts (2+1)
+ve Effects on H2H
Interaction (5+1)
Age (1+0) Physical Health (2+0)
-ve Effects on H2H
Interaction (4+1)
Experience (4+0)
Cognitive Impairmen
t (2+0)
Trust in Process (4+1) Demo-
graphics (4+1)
![Page 31: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/31.jpg)
+Threat 1: User Disengagement
![Page 32: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/32.jpg)
+Threat 2: Unusable System
![Page 33: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/33.jpg)
+Monitoring technology to manage pain: issues Likelihood of user risk-taking
and fault-tolerance: users are more vulnerable. We must be cognisant of user
motivation and application domain throughout design
Relationships are important. Interviewees were concerned that such technology might change their relationship with
healthcare providers be trusted by their healthcare
providers
Users
Carers
Systems
Stake-holders
![Page 34: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/34.jpg)
+Summary: process
![Page 35: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/35.jpg)
+Summary: outputs and findings Usefulness and ease of use are
key – of course! Also: demographics,
motivation, domain Users managing pain are
mistake-tolerant and more likely to take risks
Trust transfer and H2H interactions affect H2T trust Technology should enhance,
not replace, H2H interaction The right amount of data Displayed in the right way,
at the right time
OPTET augmented its model
Other projects used TRIFoRM outputs
Work continued by INTRMS: Individual and Network Trust in Remote Monitoring Systems
Trust in the healthcare environment is a complex interaction between technology utility and convenience and its affect on existing human interaction
![Page 36: Trust in IT: Factors, Metrics and Models](https://reader035.vdocument.in/reader035/viewer/2022062401/58eba1f21a28ab52538b4761/html5/thumbnails/36.jpg)
+Thank you
I’m new to Vancouver; please introduce yourself
I’m available for consultancy HCI, web science, user
experience, ubicomp, hypertext
Design, inclusive research, crime, social media and trust
Stay in touch [email protected] twitter.com/ClareJHooper