Skip to main content

Exploring Trust of Mobile Applications Based on User Behaviors

(Work-in-Progress)

  • Conference paper
Trusted Systems (INTRUST 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6163))

Included in the following conference series:

Abstract

A mobile application is a software package that can be installed and executed on a mobile device. Which mobile application is more trustworthy for a user to purchase, download, install, consume or recommend becomes a crucial issue that impacts its final success. This paper explores trust of mobile applications based on users’ behaviors. It proposes a conceptual trust model according to trust behavior study. We achieve our model through Principal Component Analysis (PCA), reliability analysis, Confirmatory Factor Analysis (CFA) based on data collected from a questionnaire survey. It is indicated that a user’s trust behavior is a multidimensional construct composed of three main aspects: using behavior, reflection behavior, and correlation behavior. They are further delineated into twelve measurable sub-constructs and relate to a number of external factors. The data analysis showed that the questionnaire has positive psychometric properties with respect to model construct validity and reliability. Particularly, the practical significance of our work towards usable trust management, the limitations of current empirical study and future work are also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. McKnight, D.H., Choudhury, V., Kacmar, C.: Developing and Validating Trust Measures for E-Commerce: an Integrative Typology. Information Systems Research 13(3), 334–359 (2002)

    Article  Google Scholar 

  2. Marsh, S.: Formalising Trust as a Computational Concept. Doctoral dissertation, University of Stirling (1994)

    Google Scholar 

  3. Yan, Z., Holtmanns, S.: Trust Modeling and Management: from Social Trust to Digital Trust. In: Book chapter of Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions. IGI Global (2008)

    Google Scholar 

  4. Yan, Z., Yan, R.: Formalizing Trust Based on Usage Behaviours for Mobile Applications. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. LNCS, vol. 5586, pp. 194–208. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Yan, Z., Niemi, V.: A Methodology towards Usable Trust Management. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. LNCS, vol. 5586, pp. 179–193. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Li, X., Valacich, J.S., Hess, T.J.: Predicting User Trust in Information Systems: a Comparison of Competing Trust Models. In: Proc. of 37th Annual Hawaii International Conference on System Sciences, 10 p. (2004)

    Google Scholar 

  7. Bigley, G.A., Pearce, J.L.: Straining for Shared Meaning in Organization Science. Problems of Trust and Distrust. Acad. Management Rev. 23(3), 405–421 (1998)

    Google Scholar 

  8. Fishbein, M., Ajzen, I.: Beliefs, Attitude, Intention and Behavior: an Introduction to Theory and Research. Addison-Wesley, Reading (1975)

    Google Scholar 

  9. Anderson, J.C., Narus, J.A.: A model of Distributor Firm and Manufacturer Firm Working Partnerships. Marketing 54(1), 42–58 (1990)

    Article  Google Scholar 

  10. Fox, A.: Beyond Contract: Work, Power, and Trust Relations. Faber, London (1974)

    Google Scholar 

  11. Deutsch, M.: The Resolution of Conflict: Constructive and Destructive Processes. Yale University Press, New Haven (1973)

    Google Scholar 

  12. Sheppard, B.H., Hartwick, J., Warshaw, P.R.: The Theory of Reasoned Action; A Meta Analysis of Past Research with Recommendations for Modifications in Future Research. Consumer Res. 15(3), 325–343 (1988)

    Article  Google Scholar 

  13. Venkatesh, V., Davis, F.D.: A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Sci. 46(2), 186–204 (2000)

    Article  Google Scholar 

  14. Grabner-Kräuter, S., Kaluscha, E.A.: Empirical Research in On-line Trust: a Review and Critical Assessment. Int. J. of Human-Computer Studies 58(6), 783–812 (2003)

    Article  Google Scholar 

  15. Muir, B.M.: Trust in Automation: Part I. Theoretical Issues in the Study of Trust and Human Intervention in Automated Systems. Ergonomics 37(11), 1905–1922 (1994)

    Article  Google Scholar 

  16. Muir, B.M.: Trust in Automation Part II: Experimental Studies of Trust and Human Intervention in a Process Control Simulation. Ergonomics 39(3), 429–469 (1996)

    Article  Google Scholar 

  17. Lee, J., Moray, N.: Trust, Control Strategies and Allocation of Function in Human-Machine Systems. Ergonomics 35(10), 1243–1270 (1992)

    Article  Google Scholar 

  18. Yan, Z., Niemi, V., Dong, Y., Yu, G.: A User Behavior Based Trust Model for Mobile Applications. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol. 5060, pp. 455–469. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  19. Fabrigar, L.R., Wegener, D.T., MacCallum, R.C., Strahan, E.J.: Evaluating the Use of Exploratory Factor Analysis in Psychological Research. Psychological Methods 4(3), 272–299 (1999)

    Article  Google Scholar 

  20. Anderson, J.C., Gerbing, D.W.: Structural Equation Modeling in Practice: a Review and Recommended Two-Step Approach. Psychological Bulletin 103(3), 411–423 (1988)

    Article  Google Scholar 

  21. Corritore, C.L., Kracher, B., Wiedenbeck, S.: On-line Trust: Concepts, Evolving Themes, a Model. Int. J. of Human-Computer Studies, Trust and Technology 58(6), 737–758 (2003)

    Article  Google Scholar 

  22. Crocker, L., Algina, J.: Introduction to Classical and Modern Test Theory. Thomson Leaning (1986)

    Google Scholar 

  23. Nunnally, J.C.: Psychometric Theory, 2nd edn. McGraw-Hill, New York (1978)

    Google Scholar 

  24. Gefen, D., Straub, D., Boudreau, M.: Structural Equation Modeling and Regression: Guidelines for Research Practice. Comm. AiS 7(7), 1–78 (2000)

    Google Scholar 

  25. Jiang, J.J., Klein, G.: Supervisor Support and Career Anchor Impact on the Career Satisfaction of the Entry-level Information Systems Professional. Management Inform. Systems 16(3), 219–240 (1999/2000)

    Google Scholar 

  26. Browne, M.W., Cudeck, R.: Alternative Ways of Assessing Model Fit. In: BoUen, K.A., Long, J.S. (eds.) Testing Structural Equation Models. Sage, Beverly Hills (1992)

    Google Scholar 

  27. Bentler, P.M., Bonnett, D.G.: Significance Tests and Goodness of Fit in the Analysis of Covariance Structures. Psychological Bulletin 88(3), 588–606 (1980)

    Article  Google Scholar 

  28. Bentler, P.M.: EQS Structural Equations Program Manual. BMDP Statistical Software. Los Angeles (1989)

    Google Scholar 

  29. Carlson, D., Kacmar, K., Williams, L.: Construction and Initial Validation of a Multidimensional Measure of Work-Family Conflict. Journal of Vocational Behavior 56(2), 249–276 (2000)

    Article  Google Scholar 

  30. Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. on Dependable and Secure Computing 1(1), 11–33 (2004)

    Article  Google Scholar 

  31. Yan, Z.: Trust Management for Mobile Computing Platforms, PhD dissertation, Dept. of Electrical and Communication Eng., Helsinki Univ. of Technology (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yan, Z., Dong, Y., Niemi, V., Yu, G. (2010). Exploring Trust of Mobile Applications Based on User Behaviors. In: Chen, L., Yung, M. (eds) Trusted Systems. INTRUST 2009. Lecture Notes in Computer Science, vol 6163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14597-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14597-1_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14596-4

  • Online ISBN: 978-3-642-14597-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics