Trustworthiness Facets: History
Please note this is an old version of this entry, which may differ significantly from the current revision.
Contributor:

Trustworthiness facets are considered essential characteristics for assessing the trustworthiness of parties with whom one interacts, such as other people, technologies, or organizations. It is assumed that the better a social media application supports its users in their trustworthiness assessment, the safer and more promising user interactions will be.

  • Trustworthiness
  • Trust
  • computer-mediated introductions

1. Trustworthiness Facets

“Trustworthiness facets” is a term that is coined in the computer-mediated introductions (CMIs) context. They encompass attributes possessed by the involved parties of CMI, which are (i) organizations that present themselves on the CMI platform, like advertisers or the CMI service provider, (ii) the corresponding CMI software and (iii) CMI users [5]. Trustworthiness facets are desirable characteristics from which an individual can infer whether the parties involved are able and willing to act as desired and expected, and thus are trustworthy [5,14]. They may be personality traits or descriptive qualities. As CMI users assess the involved parties by their trustworthiness, the three parties take the role of so-called trustees while CMI users simultaneously are trustors, who may place their trust in the others [18].
Since the three trustees differ in their nature of existence as institution, technology, and individual, different trustworthiness facets have been identified by different streams of research. Social and organizational psychology, sociology, economics and computer science partly identified facets that can be led back to the factors of trustworthiness ability, benevolence and integrity [5]. The factors of trustworthiness are considered the attributes primarily associated with trustworthiness [5]. Originally determined for the interpersonal context, these attributes have been widely used for other trustee types, such as organizations and technologies [19,20,21]. Most often, researchers have adapted their definitions to their respective context and kept the terminology or renamed them for their purposes, such as competence for ability [22] or fairness for integrity [23]. As another example, Caldwell and Clapham determine competence, quality assurance and financial balance for organizational trustworthiness as a comparison to ability for interpersonal trustworthiness [22]. By these adoptions, some facets may have either the same terminology but different definitions or different terminologies despite describing a similar phenomenon.
Furthermore, former research identified facets for the various trustee types that are not based on the factors of trustworthiness. As an example, for trustworthiness facets of technology, Mohammadi et al. related software qualities to the trustworthiness of software [24]. Software qualities describe characteristics that enhance software [25]. They encompass characteristics necessary for the functioning of a system concerning the back-end as well as those for the front-end that are partly directly perceivable for the user [25].

2. Placing Trustworthiness Facets in the Context of Trust

Trustworthiness facets are in line with the trust definition of McKnight et al. [14]. They define trust as a reflection of an individual’s beliefs about a trustee’s possession of suitable attributes necessary to perform as expected in a given situation [5,14]. This reflection of beliefs is irrespective of the trustor’s ability to monitor or control the trustee [5]. It rather depends on the trustor’s personal characteristics and how she subjectively perceives the trustee’s trustworthiness and related facets. This process of trustworthiness assessment is usually a bilateral exchange of trustor and trustee in terms of interpersonal interactions to result in an effective engagement. The trustee is interested in showing her trustworthiness by presenting her facets while the trustor perceives what the trustee reveals [26]. As trustor and trustee take simultaneously both roles in an interaction, it is a mutual process [27].
A trustworthiness assessment takes place when initiating or continuing an interaction [28]. It involves the evaluation of facets and the extent to which they are available. An unmet trustworthiness assessment may mean that trustworthiness facets are insufficiently available or irrelevant for the given situation. This may result in the impression of the party being untrustworthy and might lead to a termination of an interaction. Furthermore, the trustor may assess other attributes besides the trustworthiness facets, such as general personality traits, values, or goals. These are significant for the development of identification-based trust, which means that trust is established due to the fact that an individual identifies with a trustee [29]. If the trustor does not identify with the trustee, this might lead to the termination of an interaction, as well [29].
The process of evaluating trustworthiness facets differs in terms of timing. At the beginning of the first interaction, the trustor has no experience with the trustee. The trustworthiness assessment cannot draw on a knowledge base. Therefore, the interaction is foremost based on the trustor’s first judgement of given cues by the trustee from which trustworthiness facets or other attributes can be inferred. These are relevant for cognitive categorization processes concerning the trustee on which basis the trustor develops initial trust [19,30]. Categorization processes can include (i) reputation categorization, (ii) stereotyping and (iii) unit grouping [19]. Reputation categorization makes use of second-hand information on which basis the trustor attributes trustworthiness facets to the trustee. Stereotyping means to put a trustee into a general category, which is also associated with certain facets. Unit grouping describes that the trustor places the trustee in the same category as herself. This positively affects the trustworthiness assessment, since the trustor beliefs in sharing a social identity and, thus similar appreciated attributes and facets [31]. It can be concluded that although categorization processes and the trustworthiness assessment mutually define each other, perceived trustworthiness facets are strongly biased by cognitive processes.
In addition to categorization processes, calculative processes may also play a role leading to calculus-based trust [32]. The decision to start trusting and interacting with another party depends on rationally derived costs and benefits that may accompany or result from an interaction. The derivation process can be related to the trustee’s predictability and further facets that influence the trustor’s expectations concerning an interaction [32]. If the benefits exceed the costs, the trustor is likelier to interact with the trustee and extend her trust [33]. Again, a mutual influence can be observed between calculation processes and the trustworthiness assessment.
In general, it can be argued that initial trust is based on an insufficient knowledge base and assumptions made by the trustor [14]. Knowledge about the actual and past performance of the trustee are yet missing. This changes during an interaction when initial trust develops to knowledge-based trust. The knowledge base about the trustee increases and enables insights about potentially existent trustworthiness facets. On these grounds, the trustworthiness assessment is more reliable during the knowledge-based trust phase than during the initial trust phase [20]. Therefore, the facet-oriented approach can be particularly assigned to knowledge-based trust [14]. At that point, a trustor knows a trustee well enough to predict the trustee’s behavior to a certain extent regarding a specific situation [30]. As trustor and trustee have a common history, knowledge-based trust is more persistent than initial trust. While initial trust strongly depends on rapidly changing costs and benefits and made impressions, knowledge-based trust is more stable when it comes to performance lapses or circumstance changes [29].
In the context of CMI, both initial trust and knowledge-based trust are relevant as people get to know and interact with each other on the CMI platform. For example, in online dating, the selection of a person of interest is rather driven by assumptions from the first impression, where profile photos or profile information serve as cues [34]. These are used for categorization processes, as for example gender stereotyping [35]. After first interactions, online dating users gain more knowledge about trustees during interactions, which facilitates the trustworthiness assessment. Some online dating platforms, such as affiny.co.uk or neu.de, allow their users to stepwise disclose more personal information, such as photos, when people feel more secure after having built knowledge-based trust to the other end-user first.
Initial and knowledge-based trust is also relevant for the interaction with CMI organizations and applications. Initial trust in a service provider is most often based on customer familiarity with the organization, its reputation, quality of provided information about the company and the service, certifications from third parties and attractive rewards for using the technology [36]. Trust in the service provider can foster initial trust in the software, which impacts why a user chooses to use a particular application [37]. During software usage, knowledge-based trust in both the service provider and the application can develop. According to Siau and Shen [36], trust in the service provider further develops while using its application by assessing the quality of the software, the provider’s competence and integrity, appropriate privacy policies and security controls, the possibility of open communication and community building as well as external auditing. Trust in the software especially develops when it is perceived as reliable. Even if the trustworthiness assessment is not satisfactory concerning the service provider during software use, but for the software itself, the user may continue to use the application [14].

3. Trust-Building through Software in the Past

The development of trust between individuals through software has been researched and considered for software engineering in the past. Jones and Marsh introduced the TRUST notation for social media of Computer Supported Cooperative Work [38]. The notation respects the elements knowledge, importance of interaction, utility of cooperation, basic trust and conceptual trust as a basis to record and evaluate interpersonal and group activities online. Thereby, TRUST serves as a tool for discussions in terms of software design for human-computer-human interactions.
In the context of e-commerce, Tran proposes a framework for trust modelling to protect buying agents from dishonest selling agents [39]. Their proposed algorithm is based on a trustworthiness threshold, which weighs among others price, quality and expected value of a product, as well as cooperation and penalty factor of an interaction. Thereby, the approach of Tran rather follows the principle of calculative-based trust. With their framework, buying agents may evaluate the trustworthiness of selling agents by software features including trust ratings.
Another trust modelling approach is the method for trust-related software features, called TrustSoFt, which is especially created for CMI [13]. Based on users’ trust concerns, software goals are derived in order to oppose the user concerns. In addition, trustworthiness facets are identified that would counteract the concerns if they were present in the respective context. On these grounds, requirements and features for the software to be developed are elicited. Resulting software features shall support users in assessing the trustworthiness of involved parties as a strategy to cope with their concerns. The overview of trustworthiness facets presented in this work can be regarded as a useful tool for applying TrustSoFt.

This entry is adapted from the peer-reviewed paper 10.3390/info13010034

This entry is offline, you can click here to edit this entry!
ScholarVision Creations