279
Views
0
CrossRef citations to date
0
Altmetric
Articles

Construction and validation of an updated perfect automation schema (uPAS) scale

ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon &
Pages 241-266 | Received 28 Jan 2022, Accepted 19 May 2022, Published online: 06 Jun 2022

References

  • Bartlett, F. C. 1932. Remembering: A Study in Experimental and Social Psychology. Cambridge: Cambridge University Press.
  • Beals, D. E. 1998. “Reappropriating Schema: Conceptions of Development from Bartlett and Bakhtin.” Mind, Culture, and Activity 5 (1): 3–24. doi:10.1207/s15327884mca0501_2.
  • Bennett, R. J., and S. L. Robinson. 2000. “Development of a Measure of Workplace Deviance.” The Journal of Applied Psychology 85 (3): 349–360. doi:10.1037/0021-9010.85.3.349.
  • Brewer, W. F. 2000. “Bartlett’s Concept of the Schema and Its Impact on Theories of Knowledge Representation in Contemporary Cognitive Psychology.” In Bartlett, Culture, and Cognition, edited by A. Saito, 69–89. London: Psychology Press.
  • Brewer, W., and J. Treyens. 1981. “Role of Schemata in Memory for Places.” Cognitive Psychology 13 (2): 207–230. doi:10.1016/0010-0285(81)90008-6.
  • Chang, S. J., A. Van Witteloostuijn, and L. Eden. 2010. “From the Editors: Common Method Variance in International Business Research.” Journal of International Business Studies 41 (2): 178–184. doi:10.1057/jibs.2009.88.
  • Curran, P. G. 2016. “Methods for the detection of carelessly invalid responses in survey data.” Journal of Experimental Social Psychology 66: 4–19. doi:10.1016/j.jesp.2015.07.006.
  • Davidson, D. 1994. “Recognition and Recall of Irrelevant and Interruptive Atypical Actions in Script-Based Stories.” Journal of Memory and Language 33 (6): 757–775. doi:10.1006/jmla.1994.1036.
  • DeVellis, R. F. 2016. Scale Development: Theory and Applications. 4th ed. California: SAGE.
  • Dzindolet, M. T. H. P. Beck, L. G. Pierce, and L. A. Dawe. 2001. A Framework of Automation Use (Report No. ARL-TR-2412). Aberdeen Proving Ground, MD: Army Research Laboratory. https://apps.dtic.mil/dtic/tr/fulltext/u2/a390225.pdf.
  • Dzindolet, M. T., S. A. Peterson, R. A. Pomranky, L. G. Pierce, and H. P. Beck. 2003. “The Role of Trust in Automation Reliance.” International Journal of Human-Computer Studies 58 (6): 697–718. doi:10.1016/S1071-5819(03)00038-7.
  • Dzindolet, M. T., L. G. Pierce, H. P. Beck, and L. A. Dawe. 2002. “The Perceived Utility of Human and Automated Aids in a Visual Detection Task.” Human Factors 44 (1): 79–94. doi:10.1518/0018720024494856.
  • Fiske, S. 1998. “Stereotyping, Prejudice, and Discrimination.” In The Handbook of Social Psychology, edited by D. Gilbert, S. Fiske, & G. Lindzey. 4th ed., Vol. 2, 257–411. New York: McGraw-Hill.
  • Furr, R. M. 2011. Scale Construction and Psychometrics for Social and Personality Psychology. California: SAGE.
  • Fyock, J., and C. Stangor. 1994. “The Role of Memory Biases in Stereotype Maintenance.” British Journal of Social Psychology 33 (3): 331–344. doi:10.1111/j.2044-8309.1994.tb01029.x.
  • Goldberg, L. R. 1992. “The Development of Markers for the Big-Five Factor Structure.” Psychological Assessment 4 (1): 26–42. doi:10.1037/1040-3590.4.1.26.
  • Goldberg, L. R., J. A. Johnson, H. W. Eber, R. Hogan, M. C. Ashton, C. R. Cloninger, and H. C. Gough. 2006. “The International Personality Item Pool and the Future of Public-Domain Personality Measures.” Journal of Research in Personality 40 (1): 84–96. doi:10.1016/j.jrp.2005.08.007.
  • Hu, L. T., and P. M. Bentler. 1999. “Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria versus New Alternatives.” Structural Equation Modeling: A Multidisciplinary Journal 6 (1): 1–55. doi:10.1080/10705519909540118.
  • Huang, J. L., N. A. Bowling, M. Liu, and Y. Li. 2015. “Detecting Insufficient Effort Responding with an Infrequency Scale: Evaluating Validity and Participant Reactions.” Journal of Business and Psychology 30 (2): 299–311. doi:10.1007/s10869-014-9357-6.
  • Huang, J. L., P. G. Curran, J. Keeney, E. M. Poposki, and R. P. DeShon. 2012. “Detecting and Deterring Insufficient Effort Responding to Surveys.” Journal of Business and Psychology 27 (1): 99–114. doi:10.1007/s10869-011-9231-8.
  • Jackson, D. N., S. V. Paunonen, and P. F. Tremblay. 2000. Six Factor Personality Questionnaire: Technical Manual. Port Huron: Sigma Assessment Systems.
  • Jian, J. Y., A. M. Bisantz, and C. G. Drury. 2000. “Foundations for an empirically determined scale of trust in automated systems.” International Journal of Cognitive Ergonomics, 4 (1): 53–71. doi:10.1207/S15327566IJCE0401_04.
  • Lee, K., and M. C. Ashton. 2004. “Psychometric Properties of the HEXACO Personality Inventory.” Multivariate Behavioral Research 39 (2): 329–358. doi:10.1207/s15327906mbr3902_8.
  • Lee, J. D., and K. A. See. 2004. “Trust in Automation: Designing for Appropriate Reliance.” Human Factors 46 (1): 50–80. doi:10.1518/hfes.46.1.50_30392.
  • Litman, L., J. Robinson, and T. Abberbock. 2017. “TurkPrime.com: A Versatile Crowdsourcing Data Acquisition Platform for the Behavioral Sciences.” Behavior Research Methods 49 (2): 433–442. doi:10.3758/s13428-016-0727-z.
  • Lyons, J. B., and S. Y. Guznov. 2019. “Individual Differences in Human-Machine Trust: A Multi-Study Look at the Perfect Automation Schema.” Theoretical Issues in Ergonomics Science 20 (4): 440–458. doi:10.1080/1463922X.2018.1491071.
  • Lyons, J. B. C. S. Nam, S. A. Jessup, T. Q. Vo, and K. T. Wynne. 2020. “The Role of Individual Differences as Predictors of Trust in Autonomous Security Robots.” Proceedings of the 2020 IEEE International Conference on Human-Machine Systems, 1–5. Rome. doi:10.1109/ICHMS49158.2020.9209544.
  • Lyons, J. B., T. Vo, K. T. Wynne, S. Mahoney, C. S. Nam, and D. Gallimore. 2020. “Trusting Autonomous Security Robots: The Role of Reliability and Stated Social Intent.” Human Factors Advance online publication. doi:https://doi.org/10.1177/0018720820901629.
  • Madhavan, P., and D. A. Wiegmann. 2007. “Similarities and Differences between Human-Human and Human-Automation Trust: An Integrative Review.” Theoretical Issues in Ergonomics Science 8 (4): 277–301. doi:10.1080/14639220500337708.
  • Matthews, G., J. Lin, A. R. Panganiban, and M. D. Long. 2020. “Individual Differences in Trust in Autonomous Robots: Implications for Transparency.” IEEE Transactions on Human-Machine Systems 50 (3): 234–244. doi:10.1109/THMS.2019.2947592.
  • McKelvey, R., and W. Zavoina. 1975. “A Statistical Model for the Analysis of Ordinal Level Dependent Variables.” The Journal of Mathematical Sociology 4 (1): 103–120. doi:10.1080/0022250X.1975.9989847.
  • Merritt, S. M., A. Ako-Brew, W. J. Bryant, A. Staley, M. McKenna, A. Leone, and L. Shirase. 2019. “Automation-Induced Complacency Potential: Development and Validation of a New Scale.” Frontiers in Psychology 10. Article 225. doi:10.3389/fpsyg.2019.00225.
  • Merritt, S. M., J. L. Unnerstall, D. Lee, and K. Huber. 2015. “Measuring Individual Differences in the Perfect Automation Schema.” Human Factors 57 (5): 740–753. doi:10.1177/0018720815581247.
  • Mosier, K. L., and L. J. Skitka. 1996. “Human Decision Makers and Automated Decision Aids: Made for Each Other?” In Automation and Human Performance: Theory and Application, edited by R. Parasuraman and M. Mouloua, 201–220. Mahwah: Lawrence Erlbaum Associates.
  • Peterson, C., and M. E. P. Seligman. 2004. Character Strengths and Virtues: A Handbook and Classification. Oxford: Oxford University Press & American Psychological Association.
  • Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff. 2003. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies.” The Journal of Applied Psychology 88 (5): 879–903. doi:10.1037/0021-9010.88.5.879.
  • R Core Team. 2017. “R: A Language and Environment for Statistical Computing.” R Foundation for Statistical Computing, Vienna, Austria. URL https://www.R-project.org/.
  • Revelle, W. R. 2017. Psych: Procedures for personality and psychological research (Version 2.0.9) [Computer software]. The Comprehensive R Archive Network. https://CRAN.R-project.org/package=psych.
  • Rosseel, Y. 2012. “Lavaan: An R Package for Structural Equation Modeling and More. (Version 0.5-12-BETA).” Journal of Statistical Software 48 (2): 1–36. doi:10.18637/jss.v048.i02.
  • Rumelhart, D. E. 1980. “Schemata: The Building Blocks of Cognition.” In Theoretical Issues in Reading, edited by R. Spiro, B. Bruce, and W. Brewer, 33–58. Mahwah: Lawrence Erlbaum Associates.
  • Schneider, T. R., S. A. Jessup, C. Stokes, S. Rivers, M. Lohani, and M. McCoy. 2017. The Influence of Trust Propensity on Behavioral Trust [Poster Session]. Boston, MA, United States: APA 2017 Convention.
  • Simms, L. J., L. R. Goldberg, J. E. Roberts, D. Watson, J. Welte, and J. H. Rotterman. 2011. “Computerized Adaptive Assessment of Personality Disorder: Introducing the CAT-PD Project.” Journal of Personality Assessment 93 (4): 380–389. doi:10.1080/00223891.2011.577475.
  • Stangor, C., and D. McMillan. 1992. “Memory for Expectancy-Congruent and Expectancy-Incongruent Information: A Review of the Social and Social Developmental Literatures.” Psychological Bulletin 111 (1): 42–61. doi:10.1037/0033-2909.111.1.42.
  • Tabachnick, B. G, and L. S. Fidell. 2007. Using Multivariate Statistics. Needham Heights: Allyn & Bacon.
  • United States Air Force. 2019. Science and technology strategy: Strengthening USAF science and technology for 2030 and beyond. https://www.af.mil/Portals/1/documents/2019%20SAF%20story%20attachments/Air%20Force%20Science%20and%20Technology%20Strategy.pdf
  • Veall, M. R., and K. F. Zimmermann. 1994. “Evaluating pseudo-R2’s for Binary Probit Models.” Quality & Quantity 28 (2): 151–164. doi:10.1007/BF01102759.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.