Skip to main content

2019 | OriginalPaper | Buchkapitel

Trust in Automated Software Repair

The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust

verfasst von : Tyler J. Ryan, Gene M. Alarcon, Charles Walter, Rose Gamble, Sarah A. Jessup, August Capiola, Marc D. Pfahler

Erschienen in: HCI for Cybersecurity, Privacy and Trust

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Automation and autonomous systems are becoming increasingly pervasive in society, as are the software systems that control them. There is a need for safe and secure software systems. Automated code repair provides a promising solution. The present research investigates programmers’ perceptions of trustworthiness and trust in automated code repair, how those perceptions and intentions differed from code ostensibly repaired by a human, and the effects of repair transparency. The present research comprises two studies, each with a unique sample. The first sample included inexperienced developers (N = 24), and the second sample included experienced developers (N = 24). Participants were presented with five different pieces of code before and after being repaired by an automated code repair program, and were asked to rate the trustworthiness of the repairs and whether they would endorse using the code. Each study was a 2 × 2 between-subjects design with repeated measures. The first factor manipulated the purported source of the repairs (human vs automated code repair program). The second factor manipulated the transparency of the repairs (deleted vs commented out). Results suggest that inexperienced developers find automated code repair more trustworthy than repairs made by a human. Both experienced and inexperienced developers trusted the human repairer less after reviewing the repairs, but did not significantly differ in their intentions to trust the automated code repair program after reviewing the repairs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Details of the multiple imputation procedure are available from the first author.
 
Literatur
5.
Zurück zum Zitat Carzaniga, A., Gorla, A., Mattavelli, A., Perino, N., Pezzè, M.: Automatic recovery from runtime failures. In: Proceedings of the 2013 International Conference on Software Engineering, pp. 782–791. IEEE Press, Piscataway (2013) Carzaniga, A., Gorla, A., Mattavelli, A., Perino, N., Pezzè, M.: Automatic recovery from runtime failures. In: Proceedings of the 2013 International Conference on Software Engineering, pp. 782–791. IEEE Press, Piscataway (2013)
12.
Zurück zum Zitat Cox, B., et al.: N-variant systems: a secretless framework for security through diversity. In: Proceedings of the 15th Conference on USENIX Security Symposium, pp. 105–120. USENIX Association, Berkeley (2006) Cox, B., et al.: N-variant systems: a secretless framework for security through diversity. In: Proceedings of the 15th Conference on USENIX Security Symposium, pp. 105–120. USENIX Association, Berkeley (2006)
17.
Zurück zum Zitat Sheridan, T.B.: Humans and Automation: System Design and Research Issues. Wiley, New York (2002) Sheridan, T.B.: Humans and Automation: System Design and Research Issues. Wiley, New York (2002)
26.
Zurück zum Zitat Ryan, T.J., Walter, C., Alarcon, G.M., Gamble, R.F., Jessup, S.A., Capiola, A.: The influence of personality on code reuse. In: Proceedings of the 52nd Hawaii International Conference on System Sciences, University of Hawaii, Manoa, 8–11 January 2019 Ryan, T.J., Walter, C., Alarcon, G.M., Gamble, R.F., Jessup, S.A., Capiola, A.: The influence of personality on code reuse. In: Proceedings of the 52nd Hawaii International Conference on System Sciences, University of Hawaii, Manoa, 8–11 January 2019
30.
Zurück zum Zitat Dzindoler, M.T., Beck, H.P., Pierce, L.G., Dawe, L.A.: A framework of automation use. Technical report, Army Research Laboratory (2001) Dzindoler, M.T., Beck, H.P., Pierce, L.G., Dawe, L.A.: A framework of automation use. Technical report, Army Research Laboratory (2001)
32.
Zurück zum Zitat Ryan, T.J., Walter, C., Alarcon, G.M., Gamble, R.F., Jessup, S.A., Capiola, A.A.: Individual differences in trust in code: the moderating effects of personality on the trustworthiness-trust relationship. In: Stephanidis, C. (ed.) HCI 2018. CCIS, vol. 850, pp. 370–376. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-92270-6_53CrossRef Ryan, T.J., Walter, C., Alarcon, G.M., Gamble, R.F., Jessup, S.A., Capiola, A.A.: Individual differences in trust in code: the moderating effects of personality on the trustworthiness-trust relationship. In: Stephanidis, C. (ed.) HCI 2018. CCIS, vol. 850, pp. 370–376. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-319-92270-6_​53CrossRef
45.
Zurück zum Zitat Brooks, P.B.: No Silver Bullet. Elsevier Science Publishers B.V, North-Holland (1986) Brooks, P.B.: No Silver Bullet. Elsevier Science Publishers B.V, North-Holland (1986)
46.
Zurück zum Zitat Gibson, J.J.: The Senses Considered as Perceptual Systems. Houghton Mifflin, Oxford (1966) Gibson, J.J.: The Senses Considered as Perceptual Systems. Houghton Mifflin, Oxford (1966)
51.
52.
Zurück zum Zitat Nakajima, H., Higo, Y., Yokoyama, H., Kusumoto, S.: Toward developer-like automated program repair – modification comparisons between GenProg and developers. In: 23rd Asia-Pacific Software Engineering Conference, pp. 241–248, IEEE Press, Hamilton (2016). https://doi.org/10.1109/apsec.2016.042 Nakajima, H., Higo, Y., Yokoyama, H., Kusumoto, S.: Toward developer-like automated program repair – modification comparisons between GenProg and developers. In: 23rd Asia-Pacific Software Engineering Conference, pp. 241–248, IEEE Press, Hamilton (2016). https://​doi.​org/​10.​1109/​apsec.​2016.​042
Metadaten
Titel
Trust in Automated Software Repair
verfasst von
Tyler J. Ryan
Gene M. Alarcon
Charles Walter
Rose Gamble
Sarah A. Jessup
August Capiola
Marc D. Pfahler
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-22351-9_31