skip to main content
article
Free Access

Trust and etiquette in high-criticality automated systems

Published:01 April 2004Publication History
First page image

References

  1. Bainbridge, L. Ironies of automation. Automatica (1983), 775--779.Google ScholarGoogle Scholar
  2. Cassell, J. and Bickmore, T. Negotiated collusion: Modeling social language and its relationship effects in intelligent agents. User Modeling and Adaptive Interfaces 12 (2002), 1--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Horvitz, E. Principles of mixed-initiative user interfaces. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (Pittsburgh, PA, May 1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Horvitz, E., Kadie, C., Paek, T. and Hovel, D. Models of attention in computing and communication: From principles to applications. Commun. ACM 46, 3 (Mar 2003), 52--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lee, J.D., and Moray, N. Trust, control strategies, and allocation of function in human-machine systems. Ergonomics 35 (1992), 1243--1270.Google ScholarGoogle ScholarCross RefCross Ref
  6. Lee, J.D., and See, K.A. Trust in computer technology: Designing for appropriate reliance. Human Factors (2003).Google ScholarGoogle Scholar
  7. Nass, C., Moon, Y., Fogg, B.J., Reeves, B., and Dryer, D.C. Can computer personalities be human personalities? International J. Human-Computer Studies 43 (1995), 223--239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Parasuraman, R., and Byrne, E.A. Automation and human performance in aviation. Principles of Aviation Psychology. P. Tsang and M. Vidulich, Eds. Erlbaum, Mahwah, NJ, 2003, 311--356.Google ScholarGoogle Scholar
  9. Parasuraman, R., Molloy, R., and Singh, I. L. Performance consequences of automation-induced "complacency." International J. Aviation Psychology 3 (1993), 1--23.Google ScholarGoogle ScholarCross RefCross Ref
  10. Parasuraman, R., and Riley, V.A. Humans and automation: Use, misuse, disuse, abuse. Human Factors 39 (1997), 230--253.Google ScholarGoogle ScholarCross RefCross Ref
  11. Reeves, B., and Nass, C. The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places. Cambridge University Press/CSLI, NY, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Sheridan, T.B. Humans and Automation. Wiley, NY, 2002.Google ScholarGoogle Scholar

Index Terms

  1. Trust and etiquette in high-criticality automated systems

        Recommendations

        Reviews

        D.C. Charles Hair

        The idea of an information city (IC) has been around for quite awhile. In many universities, user groups, and management teams, it can be found in a variety of different forms. For example, some universities use a forum in which faculty members can express their opinions and ideas. The forum is usually for a given period of time, in which the faculty member has to react. This is a useful means of communicating when the members of the IC are physically located at sites that are a distance from the university or organization. This paper considers ICs that are closely located physically, such as small town communities or Boy Scout troops. The question is how to bring the members of these organizations together on a face-to-face basis, as well as through the Internet. Sproull and Patterson begin their paper with the gist of their concept, with the statement: "Let the most rewarding aspects of our virtual experience and online social interactions also guide participation in our real-world physical communities." Their concept is a good one, but the question is: how do we do this__?__ The authors have some suggestions for research that are worth following up on, which might make their concept a reality. I recommend this paper as an open source of ideas for things to accomplish in the future. Online Computing Reviews Service

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 47, Issue 4
          Human-computer etiquette
          April 2004
          90 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/975817
          Issue’s Table of Contents

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 April 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format