-The trust literature emphasizes trust in automation, influence in our daily lives. Those who are skeptical of this thus neglecting the interpersonal aspects of how distributed assertion are encouraged to work a day without email, chat personnel develop trust. Interpersonal trust represents the rooms, blogs, wikis, conferencing software, and or file willingness of individuals to accept vulnerabilities from the exchange systems! Yet despite their omnipresent presence in actions of others. Vulnerability is critical aspect of trust our daily lives, researchers still have a great deal to understand research, yet few studies have manipulated vulnerability. Non-about the costs and or benefits of different collaborative tools. verbal cues may have an influence on the trust process, The purpose of the present investigation is to discuss trust as a suggesting that features of collaborative tools may influence how research topic for military researchers and introduce a research individuals build trust. The present study will implement a 3x4 p mixed design. Participants will select a convoy route based on: platorm design to nffi collaborative tools on trust.1) graphical displays of enemy zones and historical Improvised Explosive Device (IED) occurrences; 2) route parameters (e.g., 1. COLLABORATION fuel required); and 3) information from a local expert. Vulnerability will be manipulated by altering the frequency of Collaboration involves the cooperative exchange of IEDs and the location of 'red forces' to create low, moderate, information of two or more entities, toward a common goal, and high vulnerability conditions (within subjects factor). and the resulting product is a novel idea, action, and or plan Information from local experts will be presented via one of four conditions: 1) audio/video with low emotion; 2) audio/video with [2]. rthe te tools tat areusedrin promoi high emotion; and 3) audio only; and 4) chat (between subjects collabration are a callei 'ror systems. Tasheon using tempnoloray-mediita operates tionsas a dtbed technology (IT) solutions are unable to reach their projected fashion using technology-mediated communications as a key gol an.notntl o h iitr,ti ubri ihs enabler for many operations. A fundamental attribute of the Network Centric Warfare (NCW) concept is the ability to for IT in the defense sector [6]. Software designers tend to leverage advanced information systems to facilitate self-focus purely on technology solutions without considering the synchronization and enhanced battlespace awareness among broader social and organizational context within which users distributed forces (see [1] for a review). Thus, computer-of collaborative tools must operate. Researchers have outlined mediated interactions will be the drivers for collaboration three essential facets of collaboration: technology, social among future soldiers. This is evidenced by the ubiquity of culture, and knowledge [7], thus suggesting that the collaborative tools in the military and their inextricable collaboration domain ...