Skip to main content
Log in

Exploring the impact of trust information visualization on mobile application usage

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Trust allows people to live in a risky and uncertain situation by providing the means to decrease complexity. It is the key to decision making and engaging in usage. Visualizing trust information could thus leverage usage behavior and decisions. This article explores the impact of trust information visualization on mobile application usage with a three-stage experiment conducted in both Finland and China (1) by studying users’ opinions on the importance of mobile applications, (2) by evaluating the impact of a trust indicator on mobile application usage, and (3) by evaluating the impact of a trust/reputation indicator on mobile application usage. Although the results achieved in this study for Finland and China showed small differences on usage willingness and remarkable difference on trust information check willingness, both countries indicated that visualizing the reputation value of an application and/or the individual trust value of a user can assist in mobile application usage with different importance rates. In addition, the article discusses possible reasons for the difference in impact in Finland and China, other impact factors related to mobile application usage, and implications of our experiments with regard to a trust management system for mobile applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Anderson JC, Narus JA (1990) A model of distributor firm and manufacturer firm working partnerships. Marketing 54(1):42–58

    Article  Google Scholar 

  2. Antifakos S, Kern N, Schiele B, Schwaninger A (2005) Towards improving trust in context-aware systems by displaying system confidence. In: Proceedings of the 7th international conference on human computer interaction with mobile devices and services. ACM Press, New York, NY, pp 9–14

  3. Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 5(2)

  4. Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11–33

    Article  Google Scholar 

  5. Awad N, Ragowsky A (2008) Establishing trust in Electronic commerce through online word of mouth: an examination across genders. J Manage Inf Syst 24(4):101–121

    Article  Google Scholar 

  6. Baba ML, Falkenburg DR, Hill DH (1996) Technology management and American culture: implications for business process redesign. Res Technol Manage 39(6):44–54

    Google Scholar 

  7. Basso A, Goldberg D, Greenspan S, Weimer D (2001) Emotional and cognitive factors underlying judgments of trust e-commerce. In: Proceedings 3rd ACM conference on electronic commerce. ACM Press, New York, pp 137–143

  8. Bhattacherjee A (2002) Individual trust in online firms: scale development and initial test. J Manage Inf Syst 19(1):211–241

    Google Scholar 

  9. Bickmore T, Cassell J (2001) Relational agents: a model and implementation of building user trust. Proc CHI 2001:396–403

    Google Scholar 

  10. Briggs P, Burford B, De Angeli A, Lynch P (2002) Trust in online advice. Social Sci Comput Rev 20(3):321–332

    Google Scholar 

  11. Corritore CL, Kracher B, Wiedenbeck S (2003) On-line trust: concepts, evolving themes, a model. Int J Human Comput Stud Trust Technol 58(6):737–758

    Article  Google Scholar 

  12. Cramer H, Evers V, Ramlal S, Someren M, Rutledge L, Stash N, Aroyo L, Wielinga B (2008) The effects of transparency on trust in and acceptance of a content-based art recommender. User Model User Adap Inter 18(5):455–496

    Article  Google Scholar 

  13. Denning DE (1993) A new paradigm for trusted systems. In: Proceedings of the 1992–1993 workshop on new security paradigms

  14. Deutsch M (1960) Trust, trustworthiness, and the F Scale. J Abnorm Soc Psychol 61(1):138–140

    Article  Google Scholar 

  15. Deutsch M (1973) The resolution of conflict: constructive and destructive processes. Yale University Press, New Haven

    Google Scholar 

  16. Dunn JR, Schweitzer ME (2005) Feeling and believing: the influence of emotion on trust. J Pers Soc Psychol 88(5):736–748

    Article  Google Scholar 

  17. Fishbein M, Ajzen I (1975) Beliefs, attitude, intention and behavior: an introduction to theory and research. Addison-Wesley, Reading, MA

    Google Scholar 

  18. Fogg BJ, Marshall J, Kameda T, Solomon J, Rangnekar A, Boyd J, Brown B (2001) Web credibility research: a method for online experiments and early study results. In: Proceedings of CHI2001, extended abstracts. ACM Press, New York, pp 295–296

  19. Fogg BJ, Marshall J, Laraki O, Osipovich A, Varma C, Fang N, Paul J, Rangnekar A, Shon J, Swani P, Treinen M (2001) What makes web sites credible? A report on a large quantitative study. In: Proceedings of CHI2001. ACM Press, New York, pp 61–68

  20. Fogg BJ (2002) Persuasive technology: using computers to change what we think and do. Morgan Kaufman, San Francisco

    Google Scholar 

  21. Fox A (1974) Beyond contract: work, power, and trust relations. Faber, London, UK

    Google Scholar 

  22. Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv 4th Quart 3(4):2–16

    Google Scholar 

  23. Herlocker JL, Konstan JA, Riedl J (2000) Explaining collaborative filtering recommendations. In: Proceedings of the 2000 ACM conference on computer supported cooperative work. ACM Press, New York, pp 241–250

  24. Huang H, Keser C, Leland J, Shachat J (2003) Trust, the Internet and the digital divide. IBM Syst J 42(3):507–518

    Article  Google Scholar 

  25. Karvonen K (2001) Designing trust for a universal audience: a multicultural study on the formation of trust in the internet in the Nordic countries. In: Stephanidis C (ed) First international conference on universal access in human-computer interaction, vol 3. Erlbaum, Mahwah, NJ, pp 1078–1082

    Google Scholar 

  26. Kim J, Moon JY (1997) Designing towards emotional usability in customer interfaces-trustworthiness of cyber-banking system interfaces. Interact Comput 10:1–29

    Article  MathSciNet  MATH  Google Scholar 

  27. Kim J, Moon J (1998) Designing towards emotional usability in customer interfaces: trustworthiness of cyber-banking system interfaces. Interact Comput 10:1–29

    Article  Google Scholar 

  28. Lee KC, Chung N (2009) Understanding factors affecting trust in and satisfaction with mobile banking in Korea: a modified DeLone and McLean’s model perspective. Interact Comput 21(5–6):385–392

    Article  Google Scholar 

  29. Lee J, Kim J, Moon JY (2000) What makes internet users visit cyber stores again? Key design factors for customer loyalty. In: Proceedings of CHI2000. ACM press, New York, pp 305–312

  30. Lee J, Moray N (1992) Trust, control strategies and allocation of function in human-machine systems. Ergonomics 35(10):1243–1270

    Article  Google Scholar 

  31. Liu Z, Joy AW, Thompson RA (2004) A dynamic trust model for mobile ad hoc networks. In: Proceedings of the 10th IEEE international workshop on future trends of distributed computing systems (FTDCS 2004), pp 80–85

  32. Lohse GL, Spiller P (1998) Electronic shopping. Commun ACM 41(7):81–87

    Article  Google Scholar 

  33. Lumsden J, MacKay L (2006) How does personality affect trust in B2C e-commerce? In: Proceedings 8th international conference on electronic commerce: the new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet. ACM Press, New York, NY, pp 471–481

  34. McCrickard DS, Czerwinski M, Bartram L (2003) Introduction: design and evaluation of notification user interfaces. Int J Hum Comput Stud 58(5):509–514

    Article  Google Scholar 

  35. McKnight DH, Chervany NL (2001) Trust and distrust definitions: one bite at a time. In: Falcone R, Singh M, Tan Y-H (eds) Trust in cyber-societies. Springer, Berlin

    Google Scholar 

  36. McKnight DH, Choudhury V, Kacmar C (2002) Developing and validating trust measures for e-commerce: an integrative typology. Inf Syst Res 13(3):334–359

    Article  Google Scholar 

  37. Mui L (2003) Computational models of trust and reputation: agents, evolutionary games, and social networks. Doctoral dissertation, Massachusetts Institute of Technology, 2003

  38. Muir BM (1987) Trust between humans and machines, and the design of decision aids. Int J Man Mach Syst 27:527–539

    Article  MathSciNet  Google Scholar 

  39. Muir BM (1994) Trust in automation part I: theoretical issues in the study of trust and human intervention in automated systems. Ergonomics 37(11):1905–1922

    Article  Google Scholar 

  40. Muir BM, Moray N (1996) Trust in automation part II: experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3):429–469

    Article  Google Scholar 

  41. Nielsen J (1999) Trust or bust: communicating trustworthiness in Web design. http://www.useit.com/alertbox/990307.html

  42. Nielsen J, Molich R, Snyder S, Farrell C (2000) E-commerce user experience: trust. Nielsen Norman Group

  43. Olson JS, Zheng J, Bos N, Olson GM, Veinott E (2002) Trust without touch: jumpstarting long-distance trust with initial social activities. In: Proceedings of CHI2002, pp 141–146

  44. PhoneScreen: http://wikis.in.nokia.com/AlphaLabs/PhoneScreen

  45. Pu P, Chen L (2007) Trust-inspiring explanation interfaces for recommender systems. Knowl Based Syst 20(6):542–556

    Article  Google Scholar 

  46. Riegelsberger J (2003) Interpersonal cues and consumer trust in e-commerce. In: Proceedings of CHI2003, extended abstracts, ACM press, New York, pp 718–719

  47. Riegelsberger J, Sasse MA (2001) Trust builders and trustbusters: the role of trust cues in interfaces to E-commerce applications. In: Towards the E-society: proceedings of the first IFIP conference on E-commerce, E-society, and E-Government, pp 17–30

  48. Riegelsberger J, Angela Sasse M, McCarthy JD (2005) Do people trust their eyes more than ears? Media bias in detecting cues of expertise. In: Proceedings of CHI2005. ACM Press, New York, pp 1745–1748

  49. Riegelsberger J, Sasse AM, McCarthy JD (2005) The mechanics of trust: a framework for research and design. Int J Hum Comput Stud 62(3):381–422

    Article  Google Scholar 

  50. Riley V (1996) Operator reliance on automation: theory and data. In: Parasuraman R, Mouloua M (eds) Automation and human performance: theory and applications. Lawrence Erlbaum Associates, Mahwah, New Jersey, pp 19–36

  51. Rukzio E, Hamard J, Noda C, Luca AD (2006) Visualization of uncertainty in context aware mobile applications. In: Proceedings of mobile HCI. ACM Press, New York, NY, pp 247–250

  52. Schechter SE, Dhamija R, Ozment A, Fischer I (2007) The emperor’s new security indicators. In: Proceedings of 2007 IEEE symposium on security and privacy, pp 51–65

  53. Shelat B, Egger FN (2002) What makes people trust online gambling sites? In: Proceedings of CHI2002, extended abstracts. ACM Press, New York, pp 852–853

  54. Sheppard BH, Hartwick J, Warshaw PR (1988) The theory of reasoned action: a meta analysis of past research with recommendations for modifications in future research. Consumer Res 15(3):325–343

    Article  Google Scholar 

  55. Sheridan T (1980) Computer control and human alienation. Technol Rev 83:61–73

    Google Scholar 

  56. Sillence E, Briggs P, Harris P, Fishwick L (2006) A framework for understanding trust factors in web-based health advice. Int J Hum Comput Stud 64(8):697–713

    Article  Google Scholar 

  57. SnagIt: http://www.techsmith.com/screen-capture.asp

  58. Steinbrück U, Schaumburg H, Duda S, Kruger T (2002) A picture says more than a thousand words—photographs as trust builders in e-commerce websites. In: Proceedings of CHI2002, extended abstracts. ACM Press, New York, pp 748–749

  59. Tan FB, Sutherland P (2004) Online consumer trust: a multi-dimensional model. J Electron Commer Org (JECO) 2(3):40–58

    Article  Google Scholar 

  60. Venkatesh V, Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage Sci 46(2):186–204

    Article  Google Scholar 

  61. Wang YD, Emurian HH (2005) An overview of online trust: concepts, elements and implications. Comput Hum Behav 21:105–125

    Article  Google Scholar 

  62. Yamagishi T, Yamagishi M (1994) Trust and commitment in the United States and Japan. Motiv Emot 18:129–166

    Article  Google Scholar 

  63. Yan Z (2007) Trust management for mobile computing platforms. Dissertation, Helsinki University of Technology

  64. Yan Z (2010) Trust modeling and management in digital environments: from social concept to system development. IGI Global. doi:10.4018/978-1-61520-682-7

    Google Scholar 

  65. Yan Z, Dong Y, Niemi V, Yu GL (2009) Exploring trust of mobile applications based on user behaviors. InTrust 2009. LNCS 6163:212–226

    Google Scholar 

  66. Yan Z, Holtmanns S (2008) Trust modeling and management: from social trust to digital trust. In: Subramanian R (ed) Computer security, privacy and politics: current issues, challenges and solutions. IGI Global

  67. Yan Z, Niemi V (2009) A methodology towards usable trust management. Proc Auton Trust Comput ATC09, LNCS 5586:179–193

    Google Scholar 

  68. Yan Z, Yan R (2009) Formalizing trust based on usage behaviours for mobile applications. Proc ATC09 LNCS 5586:194–208

    Google Scholar 

  69. Yan Z, Zhang P, Deng RH (2012) TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications. Pers Ubiquit Comput 16(5):485–506. doi:10.1007/s00779-011-0420-2

    Article  Google Scholar 

  70. Zimmerman J, Kurapati K (2002) Exposing profiles to build trust in a recommender. In: Proceedings of CHI2001, extended abstracts. ACM Press, New York, pp 608–609

  71. Zuboff S (1988) In the age of the smart machine. Basic Books, New York

    Google Scholar 

Download references

Acknowledgments

This work is supported by the Fundamental Research Funds for the Central Universities under Grant K5051201032. The authors would like to thank Prof. Rong Yan’s coordination and help on the work described in this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yan, Z., Liu, C., Niemi, V. et al. Exploring the impact of trust information visualization on mobile application usage. Pers Ubiquit Comput 17, 1295–1313 (2013). https://doi.org/10.1007/s00779-013-0636-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-013-0636-4

Keywords

Navigation