Understanding active and passive users: The effects of an active user using normal, hard and unreliable technologies on user assessment of trust in technology and co-user

Enid MONTAGUE*, Jie XU

*Corresponding author for this work

Research output: Journal PublicationsJournal Article (refereed)peer-review

34 Citations (Scopus)

Abstract

The aim of this study was to understand how passive users perceive the trustworthiness of active users and technologies under varying technological conditions. An experimental study was designed to vary the functioning of technologies that active users interacted with, while passive users observed these interactions. Active and passive user ratings of technology and partner were collected. Exploratory data analysis suggests that passive users developed perceptions of technologies based on the functioning of the technology and how the active user interacted with the technology. Findings from this research have implications for the design of technologies in environments where active and passive users interact with technologies in different ways. Future work in this area should explore interventions that lead to enhanced affective engagement and trust calibration. © 2011.
Original languageEnglish
Pages (from-to)702-712
Number of pages11
JournalApplied Ergonomics
Volume43
Issue number4
Early online date20 Dec 2011
DOIs
Publication statusPublished - Jul 2012
Externally publishedYes

Funding

This publication was supported by grant 1UL1RR025011 from the Clinical & Translational Science Award (CTSA) program of the National Center for Research Resources of the National Institutes of Health. The University of Wisconsin-Madison Systems Engineering Initiative for Patient Safety (SEIPS) provided support on this project http://cqpi.engr.wisc.edu.

Keywords

  • Passive user
  • Trust in team
  • Trust in technology

Fingerprint

Dive into the research topics of 'Understanding active and passive users: The effects of an active user using normal, hard and unreliable technologies on user assessment of trust in technology and co-user'. Together they form a unique fingerprint.

Cite this