INTEGRITY-BASED TRUST VIOLATIONS WITHIN HUMAN-MACHINE TEAMING
McGuire, Mollie R.
Bingham, Brian S.
MetadataShow full item record
Successful human-machine teaming requires humans to trust machines. While many claim to welcome automation, there is also mistrust of machines, which may stem from more than competence concerns. Human-automation trust research to date has considered automation capable of competence-based trust violations (CBTV), but integrity-based trust violations (IBTV) should also be studied. Future advances in artificial intelligence and cyber warfare could result in the perception—and possible reality—of automation committing IBTVs. The current study paired human participants with an automated teammate to complete a sequence of computer-based visual search and investment tasks. During each session, the automation committed either an IBTV or CBTV, and participants’ trust responses were measured through self-reported trust, trust-based reliance behavior, time spent making reliance decisions, and investment behavior. The results found that (a) average self-reported trust in the automation was significantly lower in the IBTV than the CBTV condition, (b) personal investment behavior was more consistent with reported trust levels than reliance behavior and may be a better gauge of trust, and (c) trust behavior differed more between IBTV and CBTV conditions among participants who invested more in their automated teammate. The differences found in participant trust response between conditions are enough to warrant further research into how humans react to automation committing IBTVs.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Automated network protocol reachability analysis with supertrace algorithm and TESTGEN : automated generation of test sequence for a formal protocol specification Basaran, Cuneyt (Monterey, California. Naval Postgraduate School, 1994);The automation of reachability analysis is an important step in verification of network protocols. The memory size needed for the full state analysis of complex protocols is usually very large and not available on most of ...
Auguston, Mikhail (2009-06);A formalism is suggested for specifying environment behavior models for software test scenario generation based on attributed event grammars. The environment model may contain descriptions of the events triggered by the ...
Walliser, James C. (Monterey, California. Naval Postgraduate School, 2011-06);Automated systems perform functions that were previously executed by a human. When using automation, the role of the human changes from operator to supervisor. For effective operation, the human must appropriately calibrate ...