Revisiting Trust in Machines: Examining Human–Machine Trust Using a Reprogrammed Pasteurizer Task

Author(s):  
Jieun Lee ◽  
Yusuke Yamani ◽  
Makoto Itoh

Automated technologies have brought a number of benefits to professional domains, expanding the area in which humans can perform optimally in complex work environments. Human–automation trust has become an important aspect when designing acceptable automated systems considering general users who have no comprehensive knowledge of the systems. Muir and Moray (1996) proposed a model of human–machine trust incorporating predictability, dependability, and faith as predictors of overall trust in machines. Though Muir and Moray (1996) predicted that trust in machines grows from predictability, then dependability, and finally faith, their results suggested the opposite. This study will reexamine their theoretical framework and test which of the three dimensions governs initial trust in automation. Participants will be trained to operate a simulated pasteurization plant, as in Muir and Moray (1996), and they will be asked to maximize system performance in the pasteurizing task. We hypothesized that faith governs overall trust early in the interaction with the automated system, then dependability, and finally predictability as lay automation users become more familiar with the system. We attempt to replicate the results of Muir and Moray (1996) and argue that their model should be revised for trust development for general automation users.

Author(s):  
Cyrus K. Foroughi ◽  
Shannon Devlin ◽  
Richard Pak ◽  
Noelle L. Brown ◽  
Ciara Sibley ◽  
...  

Objective Assess performance, trust, and visual attention during the monitoring of a near-perfect automated system. Background Research rarely attempts to assess performance, trust, and visual attention in near-perfect automated systems even though they will be relied on in high-stakes environments. Methods Seventy-three participants completed a 40-min supervisory control task where they monitored three search feeds. All search feeds were 100% reliable with the exception of two automation failures: one miss and one false alarm. Eye-tracking and subjective trust data were collected. Results Thirty-four percent of participants correctly identified the automation miss, and 67% correctly identified the automation false alarm. Subjective trust increased when participants did not detect the automation failures and decreased when they did. Participants who detected the false alarm had a more complex scan pattern in the 2 min centered around the automation failure compared with those who did not. Additionally, those who detected the failures had longer dwell times in and transitioned to the center sensor feed significantly more often. Conclusion Not only does this work highlight the limitations of the human when monitoring near-perfect automated systems, it begins to quantify the subjective experience and attentional cost of the human. It further emphasizes the need to (1) reevaluate the role of the operator in future high-stakes environments and (2) understand the human on an individual level and actively design for the given individual when working with near-perfect automated systems. Application Multiple operator-level measures should be collected in real-time in order to monitor an operator’s state and leverage real-time, individualized assistance.


2020 ◽  
Vol 3 (7) ◽  
pp. 153-164 ◽  
Author(s):  
Hennadii Hulak

The components of ensuring the warranty of automated systems, which are subject to increased requirements in connection with their use in many sensitive areas of public activity, including national security and defense, critical industrial technologies, energy and communications, banking, environmental protection , technologies of legitimate distance learning, etc. Certain components can significantly affect the quality and reliability of information services in regulatory conditions. In particular, the special role of the functional security of the cryptographic subsystem in terms of supporting the performance of the automated system for its tasks and functions in general, as well as in terms of ensuring the confidentiality and integrity of information. The components of the cryptographic subsystem have been identified, the poor or incorrect operation of which negatively affects the security of these subsystems. The types of the most dangerous attacks on these subsystems are analyzed, their classification from the point of view of possibility of realization in modern scientific and technical conditions and depending on capacity of available computing means and technologies on the basis of which the most real and dangerous variant of realization of remote attacks on software implementation of cryptographic subsystem is defined. . Based on the analysis, a method for evaluating the quality of cryptographic transformations based on a modified algorithm for solving the problem of finding solutions of systems of linear equations with distorted right-hand parts using the so-called decoding based on "lists" of first-order "shortened" Reed-Muller codes is proved. the correctness of the proposed algorithm.


2018 ◽  
Vol 43 (5) ◽  
pp. 718-751 ◽  
Author(s):  
Ruth A. Imose ◽  
Lisa M. Finkelstein

Science designed to understand the effects of diversity in organizations and science designed to understand the processes and outcomes of emotional labor have accumulated with increased rapidity, but rarely have the two research streams merged. We present a conceptual framework to integrate diversity with emotional labor, with the goals of prompting new research pathways and forging better understanding of the role emotional labor processes play in diverse work environments. This multilevel framework allows for conceptualizing and testing ideas about the interplay of both of these concepts at the individual and team levels, and introduces potential boundary conditions for their effects.


Author(s):  
Carla Sofia Vicente Negrão

In an increasingly digital environment that results in the technological advance of the fourth Industrial Revolution, it becomes interesting to understand the agribusiness success in a digital economy. The purpose of this chapter is to develop a theoretical framework for agribusiness success in Industry 4.0, so that future empirical research could be carried out. The research uses a literature review based on business success. First, it is essential to explore business success and then its determinants. Based on a holistic approach, a new conceptual model for agribusiness success is developed in three dimensions: growth, productivity, and performance, whether enterprises use e-business or not. The researcher suggests the impact of e-commerce, internationalization, strategic alignment, and managers characteristics as explanatory variables of the agribusiness success. The theoretical framework provides a different way forward for both managers and business advisors about what are the agribusiness success and those factors that may explain it.


Author(s):  
Timothy J. Wright ◽  
Austin M. Svancara ◽  
William J. Horrey

Even owners of the most advanced vehicles often have little understanding of the available in-vehicle technology. Accessible safety-critical information and standard instructional and operational components are potential routes to increase drivers’ knowledge. This article presents a review of information obtained from automobile manufacturers’ websites and operator manuals aimed toward passenger vehicle automated system consumers. This review revealed target areas for researchers, manufacturers, and policy makers to consider. Systems offering comparable functionality varied greatly in their nomenclature, type of feedback provided to drivers, and the accessibility of information about the systems. Also, information pertaining to systems limits was difficult to obtain.


Author(s):  
Daniel B. Quinn ◽  
Richard Pak ◽  
Ewart J. de Visser

Trust is a critical component to both human-automation and human-human interactions. Interface manipulations, such as visual anthropomorphism and machine politeness, have been used to affect trust in automation. However, these design strategies are meant to primarily facilitate initial trust formation but have not been examined as a means to actively repair trust that has been violated by a system failure. Previous research has shown that trust in another party can be effectively repaired after a violation using various strategies, but there is little evidence substantiating such strategies in human-automation context. The current study will examine the effectiveness of trust repair strategies, derived from a human-human or human-organizational context, in human-automation interaction.


2009 ◽  
Vol 28 (2) ◽  
pp. 122-128
Author(s):  
Velibor Čabarkapa ◽  
Mirjana Đerić ◽  
Zoran Stošić

Testing of IQ™ 200 Automated Urine Analyzer Analytical Performances in Comparison with Manual Techniques Automation is necessary in laboratory systems. It enables reduction of time required for sample analysis, as well as standardization of methods. However, automation of urine control in laboratories is much less common than in hematological analyses. Not long ago, the necessary automated systems for urine analysis have also been developed. The objective of this study is a comparison of the IQ™ 200 automated system for urine analyzing with standardized manual urine analyzing techniques. Comparative analysis of 300 samples was performed by the IQ™ 200 system and by the standardized methods of manual microscopy and chemical urine analysis. The results acquired point to very high compatibility between urine analyses by manual techniques and by the automated system IQ™ 200, and in some analyses IQ™ 200 showed higher sensitivity. It can be concluded, with the aim of standardization and shortening of time required for urine analysis, that utilization of automated urine analyzing systems is recommendable, especially in institutions with a large number of daily analyses. This is also supported by the fact that operation procedure on automated systems is much more simple in comparison to manual techniques.


Author(s):  
Thomas Fletcher ◽  
Chandan Chandan ◽  
Eyad Masad ◽  
Krishna Sivakumar

A unified computer-automated system was designed and developed for characterizing the shape of fine and coarse aggregates. The unique features of the system and the experimental design considerations are described. These considerations are related to the required image resolution, field of view, and lighting scheme. The unique features of the system include the ability to analyze fine and coarse aggregates and to quantify texture, angularity, and the three dimensions of form. The developed system is used to measure aggregate shape properties for a wide range of fine and coarse aggregates, and the results are compared with hot-mix asphalt laboratory performance. The analysis shows that the developed procedure yields detailed information on shape properties of aggregates in a short time. The measurements have very good correlation with the resistance of asphalt mixes to permanent deformation measured in the laboratory using different wheel-tracking devices.


1992 ◽  
Vol 114 (1) ◽  
pp. 50-58 ◽  
Author(s):  
Sabri Tosunoglu ◽  
Shyng-Her Lin ◽  
Delbert Tesar

Although serial manipulator arms modeled with rigid links show full system controllability in the joint space, this condition does not necessarily hold for flexible robotic systems. In particular, in certain robot configurations, called inaccessible robot positions, one or more of the flexibilities may not be accessed directly by the actuators. This condition may significantly deteriorate system performance as reported earlier by the authors (Tosunoglu et al., 1988, 1989). The present study addresses the relationship between the accessibility and controllability concepts and establishes accessibility as a distinct concept from controllability. Although the theoretical framework is developed for general n-link, spatial manipulators modeled with m oscillation components, example case studies demonstrate the concepts on one- and two-link arms for brevity. Specifically, it is shown that although inaccessibility and uncontrollability may coincide in certain instances (as shown on a one-link arm), counter examples may be found where an arm in an inaccessible position can simultaneously demonstrate full system controllability (as shown on a two-link arm).


Sign in / Sign up

Export Citation Format

Share Document