{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T11:46:07Z","timestamp":1765453567541,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2022-03689"],"award-info":[{"award-number":["RGPIN-2022-03689"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,3]]},"DOI":"10.1145\/3748699.3749782","type":"proceedings-article","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T07:01:29Z","timestamp":1765350089000},"page":"122-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating user perceptions of trust in persuasive technology: A comparative study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7821-5853","authenticated-orcid":false,"given":"Parinda","family":"Rahman","sequence":"first","affiliation":[{"name":"University of British Columbia, Kelowna, British Columbia, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2976-3039","authenticated-orcid":false,"given":"Ifeoma","family":"Adaji","sequence":"additional","affiliation":[{"name":"University of British Columbia, Kelowna, Canada"}]}],"member":"320","published-online":{"date-parts":[[2025,12,9]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79460-6_18"},{"key":"e_1_3_3_1_3_2","unstructured":"Nor\u00a0Aishah Ahad Teh\u00a0Sin Yin Abdul\u00a0Rahman Othman and Che\u00a0Rohani Yaacob. 2011. Sensitivity of normality tests to non-normal data. Sains Malaysiana Volume 40 Issue 6 June 2011 Pages 637-641 (2011)."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Nancy\u00a0R Buchan Rachel\u00a0TA Croson and Sara Solnick. 2008. Trust and gender: An examination of behavior and beliefs in the Investment Game. Journal of Economic Behavior & Organization 68 3-4 (2008) 466\u2013476.","DOI":"10.1016\/j.jebo.2007.10.006"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Francesca Cabiddu Ludovica Moi Gerardo Patriotta and David\u00a0G Allen. 2022. Why do users trust algorithms? A review and conceptualization of initial trust and trust over time. European management journal 40 5 (2022) 685\u2013706.","DOI":"10.1016\/j.emj.2022.06.001"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Laura\u00a0L Carstensen. 1992. Social and emotional patterns in adulthood: support for socioemotional selectivity theory. Psychology and aging 7 3 (1992) 331.","DOI":"10.1037\/\/0882-7974.7.3.331"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"},{"key":"e_1_3_3_1_8_2","volume-title":"Practical nonparametric statistics","author":"Conover William\u00a0Jay","year":"1999","unstructured":"William\u00a0Jay Conover. 1999. Practical nonparametric statistics. john wiley & sons."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Pauline Dixon and Pam Woolner. 2012. Quantitative data analysis: using SPSS. RJ Briggs M. Coleman &M. Morrison (Ed.). Research Methods in Educational Leadership &Management (2012) 340\u2013363.","DOI":"10.4135\/9781473957695.n23"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.4324\/9780203781906"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Alan\u00a0C Elliott and Linda\u00a0S Hynan. 2011. A SAS\u00ae macro implementation of a multiple comparison post hoc test for a Kruskal\u2013Wallis analysis. Computer methods and programs in biomedicine 102 1 (2011) 75\u201380.","DOI":"10.1016\/j.cmpb.2010.11.002"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Alan Feingold. 1994. Gender differences in personality: a meta-analysis. Psychological bulletin 116 3 (1994) 429.","DOI":"10.1037\/\/0033-2909.116.3.429"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Brian\u00a0J Fogg. 2002. Persuasive technology: using computers to change what we think and do. Ubiquity 2002 December (2002) 2.","DOI":"10.1145\/764008.763957"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Catherine\u00a0O Fritz Peter\u00a0E Morris and Jennifer\u00a0J Richler. 2012. Effect size estimates: current use calculations and interpretation. Journal of experimental psychology: General 141 1 (2012) 2.","DOI":"10.1037\/a0024338"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174023"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Kevin\u00a0Anthony Hoff and Masooda Bashir. 2015. Trust in automation: Integrating empirical evidence on factors that influence trust. Human factors 57 3 (2015) 407\u2013434.","DOI":"10.1177\/0018720814547570"},{"key":"e_1_3_3_1_17_2","unstructured":"Shafiq Hussain. [n. d.]. Future of Digital Marketing: Innovation Privacy and Consumer Trust. ([n. d.])."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Jiun-Yin Jian Ann\u00a0M Bisantz and Colin\u00a0G Drury. 2000. Foundations for an empirically determined scale of trust in automated systems. International journal of cognitive ergonomics 4 1 (2000) 53\u201371.","DOI":"10.1207\/S15327566IJCE0401_04"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Hyun Kang. 2021. Sample size determination and power analysis using the G* Power software. Journal of educational evaluation for health professions 18 (2021).","DOI":"10.3352\/jeehp.2021.18.17"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Maurice\u00a0G Kendall and B\u00a0Babington Smith. 1939. The problem of m rankings. The annals of mathematical statistics 10 3 (1939) 275\u2013287.","DOI":"10.1214\/aoms\/1177732186"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Teun Lucassen and Jan\u00a0Maarten Schraagen. 2011. Factual accuracy and trust in information: The role of expertise. Journal of the American Society for Information Science and Technology 62 7 (2011) 1232\u20131242.","DOI":"10.1002\/asi.21545"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Thomas\u00a0W MacFarland Jan\u00a0M Yates Thomas\u00a0W MacFarland and Jan\u00a0M Yates. 2016. Kruskal\u2013Wallis H-test for oneway analysis of variance (ANOVA) by ranks. Introduction to nonparametric statistics for the biological sciences using R (2016) 177\u2013211.","DOI":"10.1007\/978-3-319-30634-6_6"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Winter Mason and Siddharth Suri. 2012. Conducting behavioral research on Amazon\u2019s Mechanical Turk. Behavior research methods 44 1 (2012) 1\u201323.","DOI":"10.3758\/s13428-011-0124-6"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"D\u00a0Harrison Mcknight Michelle Carter Jason\u00a0Bennett Thatcher and Paul\u00a0F Clay. 2011. Trust in a specific technology: An investigation of its components and measures. ACM Transactions on management information systems (TMIS) 2 2 (2011) 1\u201325.","DOI":"10.1145\/1985347.1985353"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"D\u00a0Harrison McKnight Vivek Choudhury and Charles Kacmar. 2002. The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The journal of strategic information systems 11 3-4 (2002) 297\u2013323.","DOI":"10.1016\/S0963-8687(02)00020-3"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Miriam\u00a0J Metzger and Andrew\u00a0J Flanagin. 2013. Credibility and trust of information in online environments: The use of cognitive heuristics. Journal of pragmatics 59 (2013) 210\u2013220.","DOI":"10.1016\/j.pragma.2013.07.012"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Rafal Michalski Jerzy Grobelny and Waldemar Karwowski. 2006. The effects of graphical interface design characteristics on human\u2013computer interaction task efficiency. International Journal of Industrial Ergonomics 36 11 (2006) 959\u2013977.","DOI":"10.1016\/j.ergon.2006.06.013"},{"key":"e_1_3_3_1_28_2","unstructured":"Philip Nickel and Andreas Spahn. 2012. Trust discourse ethics and persuasive technology. Persuasive Technology 37 (2012)."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3701571.3701572"},{"key":"e_1_3_3_1_30_2","unstructured":"Neil Richards and Woodrow Hartzog. 2018. The pathologies of digital consent. Wash. UL Rev. 96 (2018) 1461."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Kim\u00a0Bartel Sheehan. 2002. Toward a typology of Internet users and online privacy concerns. The information society 18 1 (2002) 21\u201332.","DOI":"10.1080\/01972240252818207"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Jie Tang Umair Akram and Wenjing Shi. 2021. Why people need privacy? The role of privacy fatigue in app users\u2019 intention to disclose privacy: based on personality traits. Journal of Enterprise Information Management 34 4 (2021) 1097\u20131120.","DOI":"10.1108\/JEIM-03-2020-0088"},{"key":"e_1_3_3_1_33_2","unstructured":"Maciej Tomczak and Ewa Tomczak. 2014. The need to report effect size estimates revisited. An overview of some recommended measures of effect size. (2014)."},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Sandra Wachter Brent Mittelstadt and Chris Russell. 2020. Bias preservation in machine learning: the legality of fairness metrics under EU non-discrimination law. W. Va. L. Rev. 123 (2020) 735.","DOI":"10.2139\/ssrn.3792772"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"Ruijie Wang Reece Bush-Evans Emily Arden-Close Elvira Bolat John McAlaney Sarah Hodge Sarah Thomas and Keith Phalp. 2023. Transparency in persuasive technology immersive technology and online marketing: Facilitating users\u2019 informed decision making and practical implications. Computers in Human Behavior 139 (2023) 107545.","DOI":"10.1016\/j.chb.2022.107545"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Ye\u00a0Diana Wang and Henry\u00a0H Emurian. 2005. Trust in e-commerce: consideration of interface design factors. Journal of Electronic Commerce in Organizations (JECO) 3 4 (2005) 42\u201360.","DOI":"10.4018\/jeco.2005100103"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"crossref","unstructured":"Seounmi Youn. 2009. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer affairs 43 3 (2009) 389\u2013418.","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"John Zerilli Umang Bhatt and Adrian Weller. 2022. How transparency modulates trust in artificial intelligence. Patterns 3 4 (2022).","DOI":"10.1016\/j.patter.2022.100455"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16607-5_40"}],"event":{"name":"GoodIT '25: International Conference on Information Technology for Social Good","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"],"location":"Antwerp Belgium","acronym":"GoodIT '25"},"container-title":["Proceedings of the 2025 International Conference on Information Technology for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748699.3749782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T11:00:42Z","timestamp":1765450842000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3748699.3749782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":38,"alternative-id":["10.1145\/3748699.3749782","10.1145\/3748699"],"URL":"https:\/\/doi.org\/10.1145\/3748699.3749782","relation":{},"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"2025-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}