3,183
Views
17
CrossRef citations to date
0
Altmetric
Research Article

Application of the heuristic-systematic model to computer code trustworthiness: The influence of reputation and transparency

, , , , , & | (Reviewing Editor) show all
Article: 1389640 | Received 10 May 2017, Accepted 28 Sep 2017, Published online: 26 Oct 2017

References

  • Agnihotri, A., & Bhattacharya, S. (2016). Online review helpfulness: Role of qualitative factors. Psychology & Marketing, 33(11), 1006–1017. doi:10.1002/mar.20934
  • Alarcon, G. M., Militello, L. G., Ryan, P., Jessup, S. A., Calhoun, C. S., & Lyons, J. B. (2017). A descriptive model of computer code trustworthiness. Journal of Cognitive Engineering and Decision Making, 11(2), 107–121. doi:10.1177/1555343416657236
  • Alarcon, G. M., & Ryan, T. J. (in press). Trustworthiness perceptions of computer code: A heuristic-systematic processing model. In Proceedings of the Hawaii International Conference on System Sciences, USA (Vol. 51, pp. 1–10).
  • Albayrak, O., & Davenport, D. (2010). Impact of maintainability defects on code inspections. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (Vol. 50, pp. 1–4). doi:10.1145/1852786.1852850
  • Allamanis, M., Barr, E. T., Bird, C., & Sutton, C. (2014). Learning natural coding conventions. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, China (pp. 281–293). doi:10.1145/2635868.2635883
  • Carpenter, C. J. (2014). Making compliance seem more important: The “just-one-more” technique of gaining compliance. Communication Research Reports, 31(2), 163–170. doi:10.1080/08824096.2014.907144
  • Chaiken, S. (1980). Heuristic versus systematic information processing and the use of source versus message cues in persuasion. Journal of Personality and Social Psychology, 39(5), 752–766.10.1037/0022-3514.39.5.752
  • Chaiken, S., Giner-Sorolla, R., & Chen, S. (1996). Beyond accuracy: Defense and impression motives in heuristic and systematic information processing. In P. M. Gollwitzer, J. A. Bargh, P. M. Gollwitzer, & J. A. Bargh (Eds.), The psychology of action: Linking cognition and motivation to behavior (pp. 553–578). New York, NY: Guilford Press.
  • Chaiken, S., Liberman, A., & Eagly, A. H. (1989). Heuristic and systematic information processing within and beyond the persuasion context. In J. S. Uleman, J. A. Bargh, J. S. Uleman, & J. A. Bargh (Eds.), Unintended thought (pp. 212–252). New York, NY: Guilford Press.
  • Chaiken, S., & Maheswaran, D. (1994). Heuristic processing can bias systematic processing: Effects of source credibility, argument ambiguity, and task importance on attitude judgment. Journal of Personality and Social Psychology, 66(3), 460–473. doi:10.1037/0022-3514.66.3.460
  • Chen, J. Y. C., Barnes, M. J., Qu, Z., & Snyder, M. G. (2010). RoboLeader: An intelligent agent for enhancing supervisory control of multiple robots (Technical Report ARL-TR-5239). Army Research Laboratory. 10.21236/ADA514855
  • Chen, S., Duckworth, K., & Chaiken, S. (1999). Motivated heuristic and systematic processing. Psychological Inquiry, 10(1), 44–49. doi:10.1207/s15327965pli1001_6
  • Cramer, A. J., van Ravenzwaaij, D., Matzke, D., Steingroever, H., Wetzels, R., Grasman, R. P., … Wagenmakers, E. (2016). Hidden multiplicity in exploratory multiway ANOVA: Prevalence and remedies. Psychonomic Bulletin & Review, 23(5), 640–647. doi:10.3758/s13423-015-0913-5
  • CVE Mitre. (2014). Heartbleed OpenSSL bug [CVE-2014-0160]. Retrieved from https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160
  • Darke, P. R., Freedman, J. L., & Chaiken, S. (1995). Percentage discounts, initial price, and bargain hunting: A heuristic-systematic approach to price search behavior. Journal of Applied Psychology, 80(5), 580–586. doi:10.1037/0021-9010.80.5.580
  • Durumeric, Z., Kasten, J., Adrian, D., Halderman, A., Bailey, M., Li, F., & Paxson, V. (2014). The matter of Heartbleed. ICM, 14, 5–7. doi:10.1145/2663716.2663755
  • Eagly, A. H., & Chaiken, S. (1993). The psychology of attitudes. Orlando, FL: Harcourt Brace Jovanovich College Publishers.
  • Faul, F., Erdfelder, E., Lang, A.-G., & Buchner, A. (2007). G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior Research Methods, 39(2), 175–191. doi:10.3758/BF03193146
  • Fiske, S. T., & Taylor, S. E. (1991). Social cognition (2nd ed.). New York, NY: McGraw-Hill.
  • Flavián, C., & Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy. Industrial Management & Data Systems, 106(5), 601–620. doi:10.1108/02635570610666403
  • Fleischer, A., Mead, A. D., & Huang, J. (2015). Inattentive responding in MTurk and other online samples. Industrial Organizational Psychology: Perspectives on Science and Practice, 8, 192–202. doi:10.1017/iop.2015.25
  • Gaddis, T. (2016). Starting out with programming logic and design (4th ed.). New York, NY: Pearson.
  • Gigerenzer, G., & Gaissmaier, W. (2011). Heuristic Decision Making. Annual Review of Psychology, 62(1), 451–482. doi:10.1146/annurev-psych-120709-145346
  • Google. (2015). Java Style Guidelines. Retrieved from https://google.github.io/styleguide/javaguide.html
  • Griffin, R. J., Neuwirth, K., Giese, J., & Dunwoody, S. (2002). Linking the heuristic-systematic model and depth of processing. Communication Research, 29(6), 705–732. doi:10.1177/009365002237833
  • Grubb, B. (2014, April 15). Heartbleed disclosure timeline: Who knew what and when. Sydney Morning Herald. Retrieved from http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk
  • Harman, M. (2010). Why source code analysis and manipulation will always be important. In Proceedings of the 10th IEEE Working Conference on Source Code Analysis and Manipulation (pp. 7–9). Washington, DC: IEEE Computer Society.
  • Hautala, L. S. (2015, June 23). Programmers are copying security flaws into your software, researchers warn. CNET. Retrieved from http://www.cnet.com/news/programmers-are-copyingsecurity-flaws-into-your-software-researchers-warn/
  • Hoff, K. A., & Bashir, M. (2015). Trust in automation integrating empirical evidence on factors that influence trust. Human Factors: The Journal of the Human Factors and Ergonomics Society, 57(3), 407–434.10.1177/0018720814547570
  • Jiménez, F. R., & Mendoza, N. A. (2013). Too popular to ignore: The influence of online reviews on purchase intentions of search and experience products. Journal of Interactive Marketing, 27(3), 226–235. doi:10.1016/j.intmar.2013.04.004
  • Jones, S. L., & Shah, P. P. (2016). Diagnosing the locus of trust: A temporal perspective for trustor, trustee, and dyadic influences on perceived trustworthiness. Journal of Applied Psychology, 101(3), 392–414. doi:10.1037/apl0000041
  • Kim, K. J., & Sundar, S. S. (2016). Mobile persuasion: Can screen size and presentation mode make a difference to trust? Human Communication Research, 42(1), 45–70. doi:10.1111/hcre.12064
  • Maheswaran, D., & Chaiken, S. (1991). Promoting systematic processing in low-motivation settings: Effect of incongruent information on processing and judgment. Journal of Personality and Social Psychology, 61(1), 13–25. doi:10.1037/0022-3514.61.1.13
  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20, 709–734. doi:10.2307/258792
  • Schlosser, A. E. (2011). Can including pros and cons increase the helpfulness and persuasiveness of online reviews? The interactive effects of ratings and arguments. Journal of Consumer Psychology, 21(3), 226–239. doi:10.1016/j.jcps.2011.04.002
  • Sun Microsystems. (1997). Java code conventions. Retrieved from http://www.oracle.com/technetwork/java/codeconventions-150003.pdf
  • Suri, G., Sheppes, G., Leslie, S., & Gross, J. J. (2014). Stairs or escalator? Using theories of persuasion and motivation to facilitate healthy decision making. Journal of Experimental Psychology: Applied, 20, 295–302. doi:10.1037/xap0000026
  • Tortosa-Edo, V., López-Navarro, M. A., Llorens-Monzonís, J., & Rodríguez-Artola, R. M. (2014). The antecedent role of personal environmental values in the relationships among trust in companies, information processing and risk perception. Journal of Risk Research, 17(8), 1019–1035. doi:10.1080/13669877.2013.841726
  • de Visser, E., & Parasuraman, R. (2011). Adaptive aiding of human-robot teaming: Effects of imperfect automation on performance, trust, and workload. Journal of Cognitive Engineering and Decision Making, 5(2), 209–231. doi:10.1177/1555343411410160
  • Wanous, J. P., Reichers, A. E., & Hudy, M. J. (1997). Overall job satisfaction: How good are single-item measures? Journal of Applied Psychology, 82(2), 247–252. doi:10.1037/0021-9010.82.2.247
  • Yi, M. Y., Yoon, J. J., Davis, J. M., & Lee, T. (2013). Untangling the antecedents of initial trust in Web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk. Decision Support Systems, 55(1), 284–295. doi:10.1016/j.dss.2013.01.029
  • Zeger, S. L., Liang, K. Y., & Albert, P. S. (1988). Models for longitudinal data: A generalized estimating equation approach. Biometrics, 44(4), 1049–1060. doi:10.2307/2531734
  • Zhou, T. (2012). Understanding users’ initial trust in mobile banking: An elaboration likelihood perspective. Computers in Human Behavior, 28(4), 1518–1525. doi:10.1016/j.chb.2012.03.021
  • Zhou, H., & Fishbach, A. (2016). The pitfall of experimenting on the web: How unattended selective attrition leads to surprising (yet false) research conclusions. Journal of Personality and Social Psychology, 111(4), 493–504. doi:10.1037/pspa0000056