Martin Adam , Christopher Diebel , Marc Goutier , Alexander Benlian
{"title":"Navigating autonomy and control in human-AI delegation: User responses to technology- versus user-invoked task allocation","authors":"Martin Adam , Christopher Diebel , Marc Goutier , Alexander Benlian","doi":"10.1016/j.dss.2024.114193","DOIUrl":null,"url":null,"abstract":"<div><p>Users can increasingly delegate to information systems (IS) – that is transferring rights and responsibilities regarding certain tasks – even to the degree that IS can act autonomously (i.e., without the intervention or supervision of users). What is more, IS increasingly offer to assume the rights and responsibilities for a task not only in response to user prompts (i.e., user-invoked delegation) but also without user prompts (i.e., IS-invoked delegation). Yet, little is known about whether, how, and why users agree to delegation when they are asked by the IS in contrast to when they self-initiate the delegation. Drawing on self-affirmation theory, we investigate user acceptance of IS- versus user-invoked delegation in two complementary online experiments in software development. Our core findings reveal that IS-invoked (vs. user-invoked) delegation increases users' perceived self-threat and thus decreases their willingness to accept delegation. This threatening effect is larger the less (vs. more) the user perceives control after the potential delegation. Taken together, we uncover defensive user responses to IS-invoked delegation. Furthermore, we shed light on the underlying and moderating mechanisms representing the reasons and contextual features that explain and mitigate these defensive measures. These findings have significant implications for IS designers seeking to improve user-IS collaboration and outcomes by employing IS-invoked delegation.</p></div>","PeriodicalId":55181,"journal":{"name":"Decision Support Systems","volume":"180 ","pages":"Article 114193"},"PeriodicalIF":6.7000,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Decision Support Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167923624000265","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Users can increasingly delegate to information systems (IS) – that is transferring rights and responsibilities regarding certain tasks – even to the degree that IS can act autonomously (i.e., without the intervention or supervision of users). What is more, IS increasingly offer to assume the rights and responsibilities for a task not only in response to user prompts (i.e., user-invoked delegation) but also without user prompts (i.e., IS-invoked delegation). Yet, little is known about whether, how, and why users agree to delegation when they are asked by the IS in contrast to when they self-initiate the delegation. Drawing on self-affirmation theory, we investigate user acceptance of IS- versus user-invoked delegation in two complementary online experiments in software development. Our core findings reveal that IS-invoked (vs. user-invoked) delegation increases users' perceived self-threat and thus decreases their willingness to accept delegation. This threatening effect is larger the less (vs. more) the user perceives control after the potential delegation. Taken together, we uncover defensive user responses to IS-invoked delegation. Furthermore, we shed light on the underlying and moderating mechanisms representing the reasons and contextual features that explain and mitigate these defensive measures. These findings have significant implications for IS designers seeking to improve user-IS collaboration and outcomes by employing IS-invoked delegation.
用户可以越来越多地向信息系统(IS)授权--即转移某些任务的权利和责任--甚至到了 IS 可以自主行动(即无需用户干预或监督)的程度。此外,越来越多的信息系统不仅根据用户的提示(即用户授权),而且在没有用户提示的情况下(即信息系统授权),主动承担任务的权利和责任。然而,人们对用户是否同意、如何同意以及为什么同意由 IS 提出的委托与用户自己发起的委托形成鲜明对比知之甚少。借鉴自我肯定理论,我们在两个互补的软件开发在线实验中调查了用户对 IS 委托与用户主动委托的接受程度。我们的核心研究结果表明,由 IS(相对于由用户)发起的委托会增加用户感知到的自我威胁,从而降低他们接受委托的意愿。用户对潜在授权后的控制感知越少(与越多),这种威胁效应就越大。综上所述,我们揭示了用户对 IS 诱导的授权的防御性反应。此外,我们还揭示了代表解释和减轻这些防御措施的原因和背景特征的基本机制和调节机制。这些研究结果对于寻求通过采用 IS 诱导授权来改善用户与 IS 之间的协作和结果的 IS 设计者具有重要意义。
期刊介绍:
The common thread of articles published in Decision Support Systems is their relevance to theoretical and technical issues in the support of enhanced decision making. The areas addressed may include foundations, functionality, interfaces, implementation, impacts, and evaluation of decision support systems (DSSs).