Advertisement

Individual Differences in Trust in Code: The Moderating Effects of Personality on the Trustworthiness-Trust Relationship

  • Tyler J. Ryan
  • Charles Walter
  • Gene M. AlarconEmail author
  • Rose F. Gamble
  • Sarah A. Jessup
  • August A. Capiola
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 850)

Abstract

The daily use of technology has made people ever more reliant on software. It is important these software systems are produced in a manner that is both efficient and secure. In this context, psychological trust of software is a pertinent aspect of research. The present study explored the relationship of trustworthiness ratings, propensity to trust, and trait suspicion on software reuse. In addition, we explored personality as a moderator of the trustworthiness-reuse relationship, as hypothesized in the interpersonal trust literature [1]. We recruited participants from Amazon’s Mechanical Turk and requested they assess classes of Java code. Analyses revealed trait suspicion influenced decisions to reuse code and moderated the trustworthiness-trust relationship. A dual-process model of information processing was adopted for interpretation of these effects. Implications include contributions to research and theory on psychological trust, as well as practical implications for personnel selection with regard to software production.

Keywords

Trust Suspicion Software reuse 

References

  1. 1.
    Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20, 709–734 (1995).  https://doi.org/10.5465/AMR.1995.9508080335CrossRefGoogle Scholar
  2. 2.
    Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. Hum. Factors 46, 50–80 (2004).  https://doi.org/10.1518/hfes.46.1.50_30392CrossRefGoogle Scholar
  3. 3.
    Frakes, W.B., Kang, K.: Software reuse research: status and future. IEEE Trans. Softw. Eng. 31, 529–536 (2005).  https://doi.org/10.1109/TSE.2005.85CrossRefGoogle Scholar
  4. 4.
    Banker, R.D., Kauffman, R.J.: Reuse and productivity in integrated computer-aided software engineering: an empirical study. MIS Q. 14, 375–401 (1991).  https://doi.org/10.2307/249649CrossRefGoogle Scholar
  5. 5.
    Lim, W.C.: Effects of reuse on quality, productivity, and economics. IEEE Softw. 11, 23–30 (1994).  https://doi.org/10.1109/52.311048CrossRefGoogle Scholar
  6. 6.
    Alarcon, G.M., Militello, L.G., Ryan, P., Jessup, S.A., Calhoun, C.S., Lyons, J.B.: A descriptive model of computer code trustworthiness. J. Cognit. Eng. Decis. Mak. 11, 107–121 (2017).  https://doi.org/10.1177/1555343416657236CrossRefGoogle Scholar
  7. 7.
    Alarcon, G.M., Ryan, T.J.: Trustworthiness perceptions of computer code: a heuristic-systematic processing model. In: Proceedings of 51st Hawaii International Conference on System Sciences, pp. 5384–5393 (2018). http://hdl.handle.net/10125/50560
  8. 8.
    Alarcon, G.M., Gamble, R., Jessup, S.A., Walter, C., Ryan, T.J., Wood, D.W., Calhoun, C.: Application of the heuristic-systematic model to computer code trustworthiness: the influence of reputation and transparency. Cogent Psychol. 4, 1389640 (2017).  https://doi.org/10.1080/23311908.2017.1389640CrossRefGoogle Scholar
  9. 9.
    Chaiken, S.: Heuristic versus systematic information processing and the use of source versus message cues in persuasion. J. Pers. Soc. Psychol. 39, 752–766 (1980).  https://doi.org/10.1037/0022-3514.39.5.752CrossRefGoogle Scholar
  10. 10.
    Chen, S., Duckworth, K., Chaiken, S.: Motivated heuristic and systematic processing. Psychol. Inq. 10, 44–49 (1999).  https://doi.org/10.1207/s15327965pli1001_6CrossRefGoogle Scholar
  11. 11.
    Funder, D.C.: The Personality Puzzle. WW Norton & Co, New York (1997)Google Scholar
  12. 12.
    Cruz, S., da Silva, F.Q., Capretz, L.F.: Forty years of research on personality in software engineering: a mapping study. Comput. Hum. Behav. 46, 94–113 (2015).  https://doi.org/10.1016/j.chb.2014.12.008CrossRefGoogle Scholar
  13. 13.
    Sfetsos, P., Stamelos, I., Angelis, L., Deligiannis, I.: An experimental investigation of personality types impact on pair effectiveness in pair programming. Empirical Softw. Eng. 14, 187–266 (2009).  https://doi.org/10.1007/s10664-008-9093-5CrossRefGoogle Scholar
  14. 14.
    Soomro, A.B., Salleh, N., Mendes, E., Grundy, J., Burch, G., Nordin, A.: The effect of software engineers’ personality traits on team climate and performance: a systematic literature review. Inf. Softw. Technol. 73, 52–65 (2016).  https://doi.org/10.1016/j.infsof.2016.01.006CrossRefGoogle Scholar
  15. 15.
    Jones, S.L., Shah, P.P.: Diagnosing the locus of trust: a temporal perspective for trustor, trustee, and dyadic influences on perceived trustworthiness. J. Appl. Psychol. 101, 392–414 (2016).  https://doi.org/10.1037/apl0000041CrossRefGoogle Scholar
  16. 16.
    Calhoun, C., Bobko, P., Schuelke, M., Jessup, S., Ryan, T., Walter, C., Gamble, R.F., Hirshfield, L., Bowling, N., Bragg, C., Khazon, S.: Suspicion, Trust, and Automation (SRA International Inc. Publication No. AFRL-RH-WP-TR-2017-0002) (2017). https://pdfs.semanticscholar.org/de09/24c9e525b8003a28c75eec1554baacb6d15a.pdf
  17. 17.
    Mayer, R.C., Davis, J.H.: The effect of the performance appraisal system on trust for management: a field quasi-experiment. J. Appl. Psychol. 84, 123–136 (1999).  https://doi.org/10.1037/0021-9010.84.1.123CrossRefGoogle Scholar
  18. 18.
    Google: Java Style Guidelines (2014). https://google.github.io/styleguide/javaguide.html
  19. 19.
    Zeger, S.L., Liang, K.Y., Albert, P.S.: Models for longitudinal data: a generalized estimating equation approach. Biometrics 44, 1049–1060 (1988).  https://doi.org/10.2307/2531734MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Pan, W.: Akaike’s information criterion in generalized estimating equations. Biometrics 57, 120–125 (2001).  https://doi.org/10.1111/j.0006-341X.2001.00120.xMathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© This is a U.S. government work and its text is not subject to copyright protection in the United States; however, its text may be subject to foreign copyright protection 2018

Authors and Affiliations

  • Tyler J. Ryan
    • 1
  • Charles Walter
    • 2
  • Gene M. Alarcon
    • 3
    Email author
  • Rose F. Gamble
    • 2
  • Sarah A. Jessup
    • 3
  • August A. Capiola
    • 4
  1. 1.SRA International, Inc., A CSRA CompanyDaytonUSA
  2. 2.University of TulsaTulsaUSA
  3. 3.U.S. Air Force Research Laboratory711th HPW RHXSDaytonUSA
  4. 4.Consortium Research Fellows ProgramLancasterUSA

Personalised recommendations