Skip to main content
Contribution to Book
Opinions or Algorithms: An Investigation of Trust in People Versus Automation in App Store Security
Human Aspects of Information Security, Privacy, and Trust (2015)
  • David Schuster, San Jose State University
  • Mary L Still, San Jose State University
  • Jeremiah D Still, San Jose State University
  • Ji J Lim
  • Cary S Feria, San Jose State University
  • Christian P Rohrer
Abstract

Mobile application (app) stores are a critical source of information about risk in an uncertain environment. App stores ought to assess and communicate the risk associated with an installation so that users are discouraged from installing risky or harmful apps in app stores. However, only a limited number of studies offer designers information about how to communicate risk effectively. We focused on the user’s trust associated with security information stemming from crowd-sourced evaluations compared to those generated from an automated system. Both of these sources of security information are pervasively used to indicate possible risk associated with an app. We investigated whether biases exist for a particular source of information given similar amount of security information being available. We found that participants preferred to install apps rated by automation to those rated by humans despite equivalence in stated risk. Further, we found evidence of a gender difference in trust in automation.

Keywords
  • Mobile device security,
  • App stores,
  • Trust in automation,
  • Interpersonal trust
Disciplines
Publication Date
July 21, 2015
Editor
Theo Tryfonas and Ioannis Askoxylakis
Publisher
Springer International Publishing
Series
Lecture Notes in Computer Science
ISBN
978-3-319-20375-1
Publisher Statement
SJSU users: use the following link to login and access the article via SJSU databases.
Citation Information
David Schuster, Mary L Still, Jeremiah D Still, Ji J Lim, et al.. "Opinions or Algorithms: An Investigation of Trust in People Versus Automation in App Store Security" Human Aspects of Information Security, Privacy, and Trust Vol. 9190 (2015)
Available at: http://works.bepress.com/david_schuster/30/