190
Views
0
CrossRef citations to date
0
Altmetric
Articles

Enhancing the understanding of suspicion development across time: two studies on human versus virtual teammates, goal type, impulsivity, and contrast effects

ORCID Icon, &
Pages 1253-1269 | Received 14 Mar 2021, Accepted 20 Apr 2022, Published online: 27 May 2022

References

  • Baumeister, R. F., E. Bratslavsky, C. Finkenauer, and K. D. Vohs. 2001. “Bad is Stronger Than Good.” Review of General Psychology 5 (4): 323–370.
  • Bobko, P., A. J. Barelka, and L. M. Hirshfield. 2014. “The Construct of State-Level Suspicion: A Model and Research Agenda for Automated and Information Technology (IT) Contexts.” Human Factors: The Journal of the Human Factors and Ergonomics Society 56 (3): 489–508. doi:10.1177/0018720813497052.
  • Bobko, P., A. J. Barelka, L. M. Hirshfield, and J. B. Lyons. 2014. “The Construct of Suspicion and How It Can Benefit Theories and Models in Organizational Science.” Journal of Business and Psychology 29, 335–342, doi:10.1007/s10869-014-9360-y.
  • Boyes, M. E., and D. J. French. 2009. “Having a Cyberball: Using a Ball-Throwing Game as an Experimental Social Stressor to Examine the Relationship Between Neuroticism and Coping.” Personality and Individual Differences 47: 396–401. doi:10.1016/j.paid.2009.04.005.
  • Burgoon, J. K. 1993. “Interpersonal Expectations, Expectancy Violations, and Emotional Communication.” Journal of Language and Social Psychology 12: 30–48. doi:10.1177/0261927X93121003.
  • Burgoon, J. K., and J. B. Walther. 1990. “Nonverbal Expectancies and the Evaluative Consequences of Violations.” Human Communication Research 17: 232–265. doi:10.1111/j.1468-2958.1990.tb00232.x.
  • Calhoun, C. S., P. Bobko, J. J. Gallimore, and J. B. Lyons. 2019. “Linking Precursors of Interpersonal Trust to Human-Automation Trust: An Expanded Typology and Exploratory Experiment.” Journal of Trust Research 9: 28–46. doi:10.1080/21515581.2019.1579730.
  • Chaiken, S., and A. Ledgerwood. 2012. “A Theory of Heuristic and Systematic Information Processing.” Handbook of Theories of Social Psychology 1: 246–266. doi:10.4135/9781446249215.n13.
  • Chiou, E. K., and J. D. Lee. 2021. “Trusting Automation: Designing for Responsivity and Resilience.” Human Factors: The Journal of the Human Factors and Ergonomics Society. doi:10.1177/00187208211009995.
  • Confessore, N., and N. Corasaniti. 2016. Rage and Suspicion Reign as Americans, Painfully Split, Cast their Votes. https://www.nytimes.com/2016/11/09/us/politics/trump-clinton-supporters.html.
  • Dickman, S. J. 1990. “Functional and Dysfunctional Impulsivity: Personality and Cognitive Correlates.” Journal of Personality and Social Psychology 58 (1): 95–102. doi:10.1037/0022-3514.58.1.95.
  • Gay, C., B. Horowitz, J. J. Elshaw, P. Bobko, and I. Kim. 2019. “Operator Suspicion and Human-Machine Team Performance Under Mission Scenarios of Unmanned Ground Vehicle Operation.” IEEE Access 7: 36371–36379. doi:10.1109/ACCESS.2019.2901258.
  • Glikson, E., and A. W. Woolley. 2020. “Human Trust in Artificial Intelligence: Review of Empirical Research.” Academy of Management Annals 14: 627–660. doi:10.5465/annals.2018.0057.
  • Goodwin, P., S. Gönül, D. Önkal, A. Kocabıyıkoğlu, and C. I. Göğüş. 2019. “Contrast Effects in Judgmental Forecasting When Assessing the Implications of Worst and Best Case Scenarios.” Journal of Behavioral Decision Making 32 (5): 536–549. doi:10.1002/bdm.2130.
  • Groys, B., and C. Strathausen. 2012. Under Suspicion: A Phenomenology of Media. Columbia University Press. doi:10.5860/choice.50-1388
  • Hakim, Z. M., N. C. Ebner, D. S. Oliveira, S. J. Getz, B. E. Levin, T. Lin, K. Lloyd, V. T. Lai, M. D. Grilli, and R. C. Wilson. 2021. “The Phishing Email Suspicion Test (PEST) a lab-Based Task for Evaluating the Cognitive Mechanisms of Phishing Detection.” Behavior Research Methods 53 (3): 1342–1352.
  • Hall, J. L., and A. Rao. 2020. “Non-Technical Skills Needed by Cyber Security Graduates.” In 2020 IEEE Global Engineering Education Conference (EDUCON), 354–358. doi:10.1109/EDUCON45650.2020.9125105.
  • Hilton, J. L., S. Fein, and D. T. Miller. 1993. “Suspicion and Dispositional Inference.” Personality and Social Psychology Bulletin 19: 501–512. doi:10.1177/0146167293195003.
  • Hoff, K. A., and M. Bashir. 2015. “Trust in Automation: Integrating Empirical Evidence on Factors that Influence Trust.” Human Factors 57 (3): 407–434. doi:10.1177/0018720814547570.
  • Knezevich, A., and J. Fenton. 2017. “Blacktivist” Account Linked to Russia Raised Suspicion Among Baltimore Activists. Baltimore Sun. http://www.baltimoresun.com/news/maryland/bs-md-ci-blacktivist-social-media-20170929-story.html.
  • Kosoff, M. 2017. Mark Zuckerberg’s Russia problem is Bigger Than Facebook. Vanity Fair. https://www.vanityfair.com/news/2017/09/mark-zuckerbergs-russia-problem-is-bigger-than-facebook.
  • Lankton, N. K., D. H. Mcknight, and J. Tripp. 2015. “Technology, Humanness, and Trust: Rethinking Trust in Technology.” Journal of the Association for Information Systems 16 (10): 880–918. doi:10.17705/1jais.00411.
  • Lee, J. D., and K. A. See. 2004. “Trust in Automation: Designing for Appropriate Reliance.” Human Factors: The Journal of the Human Factors and Ergonomics Society 46: 50–80. doi:10.1518/hfes.46.1.50_30392.
  • Lewicki, R. J., and C. Brinsfield. 2017. “Trust Repair.” Annual Review of Organizational Psychology and Organizational Behavior 4: 287–313. doi:10.1146/annurev-orgpsych-032516-113147.
  • Lewicki, R. J., D. J. Mcallister, and R. J. Bies. 1998. “Trust and Distrust: New Relationships and Realities.” Academy of Management Review 23 (3): 438–458. doi:10.5465/AMR.1998.926620.
  • Lewin, K. 1951. Field Theory in Social Science. New York: Harpers.
  • Locke, E. A., and G. P. Latham. 2002. “Building a Practically Useful Theory of Goal Setting and Task Motivation: A 35-Year Odyssey.” American Psychologist 57: 705–717. doi:10.1037/0003-066X.57.9.705.
  • Lyons, J. B., S. Mahoney, K. T. Wynne, and M. A. Roebke. 2018. “Viewing Machines as Teammates : A Qualitative Study.” In 2018 AAAI Spring Symposium Series.
  • Madhavan, P., and D. A. Wiegmann. 2007. “Effects of Information Source, Pedigree, and Reliability on Operator Interaction with Decision Support Systems.” Human Factors: The Journal of the Human Factors and Ergonomics Society 49: 773–785. doi:10.1518/001872007X230154.
  • Mahoney, S. 2015. People more Suspicious, More Informed about Corporate Social Responsibility. https://www.mediapost.com/publications/article/250808/people-more-suspicious-more-informed-about-corpor.html.
  • Marks, M. A., J. E. Mathieu, and S. J. Zaccaro. 2001. “A Temporally Based Framework and Taxonomy of Team Processes.” Academy of Management Review 26 (3): 356–376. doi:10.5465/AMR.2001.4845785.
  • Matusik, J. G., J. R. Hollenbeck, F. K. Matta, and J. K. Oh. 2019. “Dynamic Systems Theory and Dual Change Score Models: Seeing Teams Through the Lens of Developmental Psychology.” Academy of Management Journal 62 (6): 1760–1788. doi:10.5465/amj.2017.1358.
  • Mayer, R. C., J. H. Davis, and F. D. Schoorman. 1995. “An Integrative Model of Organizational Trust.” Academy of Management Review 20 (3): 709–734. doi:10.2307/258792.
  • McCormac, A., T. Zwaans, K. Parsons, D. Calic, M. Butavicius, and M. Pattinson. 2017. “Individual Differences and Information Security Awareness.” Computers in Human Behavior 69: 151–156. doi:10.1016/j.chb.2016.11.065.
  • Mcknight, D. H., and V. Choudhury. 2006. “Distrust and Trust in B2C E-Commerce: Do They Differ?.” Proceedings of the 8th International Conference on Electronic Commerce: The New E-Commerce: Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet 482–491. doi:10.1145/1151454.1151527.
  • McKnight, D. H., V. Choudhury, and C. Kacmar. 2002. “Developing and Validating Trust Measures for e-Commerce: An Integrative Typology.” Information Systems Research 13: 334–359. doi:10.1287/isre.13.3.334.81.
  • McNeese, N. J., M. Demir, N. J. Cooke, and C. Myers. 2018. “Teaming With a Synthetic Teammate: Insights Into Human-Autonomy Teaming.” Human Factors: The Journal of the Human Factors and Ergonomics Society 60: 262–273. doi:10.1177/0018720817743223.
  • Merritt, S. M., J. L. Unnerstall, D. Lee, and K. Huber. 2015. “Measuring Individual Differences in the Perfect Automation Schema.” Human Factors: The Journal of the Human Factors and Ergonomics Society 57: 740–753. doi:10.1177/0018720815581247.
  • Montoya, A. K. 2019. “Moderation Analysis in two-Instance Repeated Measures Designs: Probing Methods and Multiple Moderator Models.” Behavior Research Methods 51 (1): 61–82. doi:10.3758/s13428-018-1088-6.
  • Nass, C., and Y. Moon. 2000. “Machines and Mindlessness: Social Responses to Computers.” Journal of Social Issues 56: 81–103. doi:10.1111/0022-4537.00153.
  • Nass, C., J. Steuer, and E. R. Tauber. 1994. “Computer are Social Actors.” Conference on Human Factors in Computing Systems - Proceedings, 72–84. doi:10.1145/259963.260288.
  • Ordóñez, L. D., M. E. Schweitzer, A. D. Galinsky, and M. H. Bazerman. 2009. “On Good Scholarship, Goal Setting, and Scholars Gone Wild.” Academy of Management Perspectives 23 (3): 82–87. doi:10.5465/amp.2009.43479265.
  • Patton, J. H., M. S. Stanford, and E. S. Barratt. 1995. “Factor Structure of the Barratt Impulsiveness Scale.” Journal of Clinical Psychology 51: 768–774. doi:10.1002/1097-4679(199511)51:6<768::AID-JCLP2270510607>3.0.CO;2-1.
  • Ployhart, R. E., and R. J. Vandenberg. 2010. “Longitudinal Research: The Theory, Design, and Analysis of Change.” Journal of management 36 (1): 94–120. doi: 10.1177/0149206309352110.
  • Rainie, L., S. Keeter, and A. Perrin. 2019. Trust and Distrust in America: Many Americans Think Declining Trust in the Government and in Each Other Makes it Harder to Solve Key Problems. They Have a Wealth of Ideas About What’s Gone Wrong and how to Fix it. Pew Research Center.
  • Seeber, I., E. Bittner, R. O. Briggs, T. De Vreede, G. De Vreede, A. Elkins, R. Maier, et al. 2020. “Machines as Teammates: A Research Agenda on AI in Team Collaboration.” Information and management 57 (2): 103174. doi:10.1016/j.im.2019.103174.
  • Shepherd, T. 2017. Bernie Sanders: People Have a Right to be Suspicious Race is Influencing Trump’s Response to Puerto Rico devastation. Washington Examiner. http://www.washingtonexaminer.com/bernie-sanders-people-have-a-right-to-be-suspicious-race-is-influencing-trumps-response-to-puerto-rico-devastation/article/2636201.
  • Simons, D. J., and C. F. Chabris. 1999. “Gorillas in our Midst: Sustained Inattentional Blindness for Dynamic Events.” Perception 28: 1059–1074. doi:10.1068/p281059.
  • Siponen, M. T. 2000. “A Conceptual Foundation for Organizational Information Security Awareness.” Information Management & Computer Security 8 (1): 31–41. http://www.emerald-library.com.
  • Stanford, M. S., C. W. Mathias, D. M. Dougherty, S. L. Lake, N. E. Anderson, and J. H. Patton. 2009. “Fifty Years of the Barratt Impulsiveness Scale: An Update and Review.” Personality and Individual Differences, 385–395. doi:10.1016/j.paid.2009.04.008.
  • Steger, I. 2017. Artificial Intelligence has Brought “doubt and suspicion” to The Ancient World of Japanese Chess. https://qz.com/906447/artificial-intelligence-has-brought-doubt-and-suspicion-to-the-ancient-world-of-shogi-or-japanese-chess/.
  • Tversky, A., and D. Kahneman. 1992. “Advances in Prospect Theory: Cumulative Representation of Uncertainty.” In Journal of Risk and Uncertainty 5, 297–323, https://link.springer.com/article/10.1007/BF00122574.
  • Van Prooijen, J. W., and R. E. De Vries. 2016. “Organizational Conspiracy Beliefs: Implications for Leadership Styles and Employee Outcomes.” Journal of Business and Psychology 31: 479–491. doi:10.1007/s10869-015-9428-3.
  • Vishwanath, A., B. Harrison, and Y. J. Ng. 2018. “Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility.” Communication Research 45 (8): 1146–1166. doi:10.1177/0093650215627483.
  • Waytz, A., J. Heafner, and N. Epley. 2014. “The Mind in the Machine: Anthropomorphism Increases Trust in an Autonomous Vehicle.” Journal of Experimental Social Psychology 52: 113–117. doi:10.1016/j.jesp.2014.01.005.
  • Wesselmann, E. D., J. H. Wirth, and M. J. Bernstein. 2017. “Expectations of Social Inclusion and Exclusion.” Frontiers in Psychology 8: 112. doi:10.3389/fpsyg.2017.00112.
  • Wesselmann, E. D., J. H. Wirth, D. K. Mroczek, and K. D. Williams. 2012. “Dial a Feeling: Detecting Moderation of Affect Decline During Ostracism.” Personality and Individual Differences 536: 580–586. doi:10.1016/j.paid.2012.04.039.
  • Whiteside, S. P., and D. R. Lynam. 2001. “The Five Factor Model and Impulsivity: Using a Structural Model of Personality to Understand Impulsivity.” Personality and Individual Differences 30: 669–689. doi:10.1016/S0191-8869(00)00064-7.
  • Williams, K. D. 2009. “Chapter 6 Ostracism. A Temporal Need-Threat Model.” Advances in Experimental Social Psychology 41: 275–314. doi:10.1016/S0065-2601(08)00406-1.
  • Williams, E. J., A. Beardmore, and A. N. Joinson. 2017. “Individual Differences in Susceptibility to Online Influence: A Theoretical Review.” Computers in Human Behavior 72: 412–421. doi:10.1016/j.chb.2017.03.002.
  • Williams, E. J., J. Hinds, and A. N. Joinson. 2018. “Exploring Susceptibility to Phishing in the Workplace.” International Journal of Human Computer Studies 120 (July): 1–13. doi:10.1016/j.ijhcs.2018.06.004.
  • Williams, K. D., and B. Jarvis. 2006. “Cyberball: A Program for use in Research on Interpersonal Ostracism and Acceptance.” Behavior Research Methods 38: 174–180. doi:10.3758/BF03192765.
  • Wirth, J. H., M. J. Bernstein, E. D. Wesselmann, and A. S. LeRoy. 2017. “Social Cues Establish Expectations of Rejection and Affect the Response to Being Rejected.” Group Processes and Intergroup Relations 20: 32–51. doi:10.1177/1368430215596073.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.