slides - Courses

Download Report

Transcript slides - Courses

Computer-Mediated
Communication
Trust and Trustworthiness
In Computer-Mediated Communication
//
April 13, 2015
First of all…
Why Care about Internet Trust?
4/13/2015
Computer-Mediated Communication
1
The Internet
4/13/2015
Computer-Mediated Communication
2
Revisiting Privacy and Security:
Issues of Trust
…”trust” others not to share our
information
…”trust” systems to route and
protect information
…”trust” 3rd parties not to
collect/track our information
traces and not use them publicly
for advertising, targeting potential
criminal behavior, non-normative
behavior, etc?
4/13/2015
Computer-Mediated Communication
3
TRUST AND
TRUSTWORTHINESS
4/13/2015
Computer-Mediated Communication
4
Defining Trustworthiness
An assessment of one’s future
behavior
‘Trustworthiness’ is a characteristic
that we infer
Theoretically linked to perceived
competence and motivations of a
given individual

Competence to act in a way
we deem appropriate

Motivation to act in our best
interests
4/13/2015
Computer-Mediated Communication
5
Competence and Motivation in Online Goods and Services:
Which is More Important to Potential Buyers?
4/13/2015
Computer-Mediated Communication
6
Results: Who is the Most Trustworthy Seller?
High
Competence
and Low
Motivation
High
Motivation
and Low
Competence
Competence to act
in a way we
deem
appropriate
Motivation to act in
our best
interests
Camera
(goods)
4/13/2015
Photography/
Web(Service)
Computer-Mediated Communication
7
Competence!
Motivation!
Vs.
4/13/2015
Computer-Mediated Communication
8
Signaling Trustworthiness
Symbols
indicators of trust-warranting
properties in a person
(Conventional Signals)
Symptoms
by-product of actions that
are associated with trust
(Assessment Signals)
4/13/2015
Computer-Mediated Communication
9
The multidisciplinary problem of trust
“Although some philosophers write about trust that is not
interpersonal, including ‘institutional trust’… trust in
government… and ‘self-trust’… most would agree that
these forms of ‘trust’ are coherent only if they share
important features of (i.e. can be modeled on)
interpersonal trust. This is why I say that the dominant
paradigm of trust is interpersonal.”
(McLeod 2006)
4/13/2015
Computer-Mediated Communication
10
Different Definitional Approaches to Trust
Cognitive Psychology
 Trust as “personality trait”
(dispositional trust)
 Trust as learned experience
(learned trust)
Philosophy
 Trust versus reliance, security
Sociology and Social Psychology
 Trust as behavior
(situational and relational trust)
 Trust builds through risktaking
 Assessment of
trustworthiness based on
perceptions of others’
characteristics
4/13/2015
Computer-Mediated Communication
11
Defining Interpersonal Trust
(Sociological Use)
“Trust exists when one party to the relation
believes the other party has incentive to act
in his or her interest or to take his or her
interest to heart.”
“one in which
confidence is
placed”
“to have or place
confidence in;
depend on”
4/13/2015
“to place in the care
of another; entrust”
“dependence on
something future or
contingent”
“reliance on
something in the
future; hope”
Computer-Mediated Communication
12
Trust-Building in the Sociological,
Relational Sense
Interpersonal Trust
Trust as an attitude about others’ desire
and ability to act in a positive way
towards us in a given context
Involves repeated interactions between
parties
Theoretically linked to risk-taking
Also distinct from the concept of
‘cooperation’
4/13/2015
Computer-Mediated Communication
13
Conditions for Trust
 Trust is optimistic; the
opposite is distrust.
 The truster accepts some
level of risk or vulnerability
 There must exist a potential
for betrayal
See: http://plato.stanford.edu/entries/trust/
4/13/2015
Computer-Mediated Communication
14
“Trust on the internet is surely not an attitude at all. It
starts with a choice, do you choose to trust your
online interactions or not? Then the trust is measured
off of what follows…Attitude was the wrong
word.Trust is a choice just like the choice to
participate in an online community or some sort of
virtual interaction.” -Maurice
1/30/12
Cheshire & Fiore — Computer-Mediated Communication
15
“
No noble thing
can be done
without risks.
”
— Michel Eyquem de Montaigne
4/13/2015
Computer-Mediated Communication
16
Risk
What is at stake in a given
situation/interaction?
Risks may be defined by
the situation (e.g., a
warzone, transition
economies, etc.)
Risks may be vary across
exchange situations with
the same partners (in many
cases the participants can
change the relative risks)
4/13/2015
Computer-Mediated Communication
17
Uncertainty
Ambiguity about the result of an interaction
4/13/2015
Computer-Mediated Communication
18
Trust, Uncertainty and Commitment
Peter Kollock (1994) – “rice and rubber markets”
 uncertainty about quality leads to commitment and trust
4/13/2015
Computer-Mediated Communication
19
Sources of Uncertainty in Interpersonal
Interaction and Exchange
Quality of ‘goods’ or
‘services’
Structural uncertainty of
an exchange
Uncertainty about finding
an exchange partner
4/13/2015
Computer-Mediated Communication
?
20
Betrayal…
4/13/2015
Computer-Mediated Communication
21
Building Trust and Role of Agency
Behavioral Components
 Expected Behavior
 Observed Behavior
 Agency and choice are
relevant for both parties in
dyadic interpersonal
relationships (though trust
may not be mutual).
4/13/2015
Computer-Mediated Communication
22
What about Trust in Systems?
Nissenbaum 2004
Locus of Betrayal
 If we trust someone to do
something, if he/she/it does not
do so we are disappointed.
 But can this ‘betrayal’
really occur with inanimate
objects? (computer, online
service, software)
4/13/2015
Computer-Mediated Communication
23
“Trust” in Information, Systems,
Interfaces?
Trust vs. Credibility
Trust vs. Reliability,
Security
4/13/2015
Computer-Mediated Communication
24
Confidence, Credibility, Reliability in Systems
 In all fairness, it is
increasingly difficult to tell
the difference between
human interaction versus
a human-machine
interaction.
4/13/2015
Computer-Mediated Communication
25
Break
4/13/2015
Computer-Mediated Communication
26
Using Games and Game Theory to
Understand Trust-Building
4/13/2015
Computer-Mediated Communication
27
Rules for the CMC trust game…
 Two players
 Each player gets 5 items from the experimenter on
each round.
 Players simultaneously decide whether to ‘entrust’
0 to 5 of their items to the other player.
 Players decide whether to return the items to the
partner or not.
 If player returns the items, the experimenter DOUBLES
the amount returned to the partner (operationalizing
benefit of fulfilled entrustment).
 But, each player can just keep the entrusted items; then
nothing is returned to the partner.
4/13/2015
Computer-Mediated Communication
28
For Example…
Player A
entrusts 1 X’s
Player A
Player A returns the
3 X; Player B gets
6X!
Player B
Player B returns the
1 X; Player A gets
2X!
At the end of the round, you keep
Player
whatever
you didBnot entrust, plus
whatever
you earned
or kept from your
entrusts
3 X’s
partner!!
4/13/2015
Computer-Mediated Communication
29
Let’s play a few
rounds…
4/13/2015
Computer-Mediated Communication
30
Debriefing…
What were the risks?
What were the sources of
uncertainty?
Does the game play any
differently when there are
repeated interactions with the
same partner, compared to
when there are new, random
partners?
4/13/2015
Computer-Mediated Communication
31
Bos et. al 2002: Effects of four types of
CMC Channels on Trust Development
4/13/2015
Computer-Mediated Communication
32
Bos et. al 2002: Effects of four types of
CMC Channels on Trust Development
4/13/2015
Computer-Mediated Communication
33
“Having worked in collaborative offices for almost 20
years, with three of those years being part of a 10person team with people in 4 locations, the kind of
trust measured between students in a social game
doesn't seem to me to be AT ALL related to the kinds
of trust that support effective work, not even as "a
good start on developing trust that [coworkers] will
fulfill other obligations." Questions of skill, deadline
habits, whether someone has shown themselves to
be appropriately detail-oriented on a given task-none of these things are related to the particular
flavor of "exploitative and self-protective behaviors"
measured by the game.” -Lisa
1/30/12
Cheshire & Fiore — Computer-Mediated Communication
34
Other considerations about trust
and online social media and
CMC…
4/13/2015
Computer-Mediated Communication
35
4/13/2015
Computer-Mediated Communication
36
4/13/2015
Computer-Mediated Communication
37
Different Forms of Trust and Trustworthiness Matter.
From: Fiore and Cheshire, “Trust and Computer-Mediated Online Relationships”
4/13/2015
Computer-Mediated Communication
38
“Cheshire writes, " Online dating is largely about learning to use the
affordances of online communication channels with low personal risk, with
the purpose of finding individuals who are, among other things, sufficiently
trustworthy to meet in person." Adding to this point, couldn't it be said that
much of the trustworthiness of someone on an online dating site be
inferred by other real-life interactions with people from the site. For
instance, if nothing bad has happened to you or your friends on previous
dates coordinated through the site, might you automatically ascribe more
trustworthiness to potential partners overall? While this is specific to
situations where you have the opportunity to physically meet those who
you are interacting online I think it would be interesting to discuss the ebb
and flow between human-to-human trust building on and offline.” -Laura
1/30/12
Cheshire & Fiore — Computer-Mediated Communication
39
What are the “Solutions” to Uncertainty in CMC
Environments?
Proxies and ‘inferred
trustworthiness’
Institutional backing
Closed Systems versus
Open Systems
 Experiential, often negativeonly reputations (not explicit)
3rd party (explicit) reputation
4/13/2015
Computer-Mediated Communication
40
“I work on the Open Badges (openbadges.org) project at Mozilla, and I'm
particularly attracted to the idea of third-party reputation information as an
additional source of data. By seeing that an institution or individual has
vouched for a person's competency, I can potentially trust them more in
that situation for a given topic. Badges are just one model of how this idea
has been implemented -- LinkedIn endorsements is another. And
ultimately, I think they're working toward answering a problem that is quite
difficult; how can a technical system provide trustworthy signals of an
individual's competency?” -Dave
“information systems aren't only comprised of technical components and
algorithms. For example, we may trust the results and recommendations
from Google, LinkedIn, Amazon, Netflix (this one is questionable.), and
blame the system or people associated with the maintenance of the
system if they aren't in line with user expectation. But, we forget the ratings
and results are in fact not just algorithms--they are the actions of ordinary
Internet users. Online activities from the users can influence the results
and the degree which something is relevant to us. However, we often times
fail to see or remember aspect is a part of the black box.” -Tine
1/30/12
Cheshire & Fiore — Computer-Mediated Communication
41
The Downside to Over-Commitment and Trust?
 Mizruchi and Stearns (2001) commercial bankers and
customers:
 Uncertainty leads to reliance on close
relations/colleagues with strong ties
 Reliance on trust networks leads
banks to be less successful in closing
deals, lower organizational
effectiveness
The key point is that trust networks are
important for a community, but we also
have to be willing to take chances and
risks– nothing worth having comes
without risk.
4/13/2015
“We’ve considered every potential
risk except the risks of avoiding all
risks.”
Computer-Mediated Communication
42
Also…The Downside to Sanctions and
Assurance Structures
 Reliance on interpersonal
mechanisms of trust building often
replaced by organizational
assurance structures (monitoring
and sanctioning)
 Paradoxically, these assurance
structures reduce possibility of
ongoing trust relations
4/13/2015
Computer-Mediated Communication
43
The Certainty-Trust Contradiction
4/13/2015
Computer-Mediated Communication
44