Trusting Virtual Trust

Ethics and Information Technology 7 (3):167-180 (2005)
  Copy   BIBTEX

Abstract

Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). Based on this theory Pettit argues that trust between virtual strangers is impossible: they lack all evidence about one another, which prevents the imputation of trustworthiness and renders the reliance on trust-responsiveness ridiculous. I argue that this argument is flawed, both empirically and theoretically. In several virtual communities amazing acts of trust between pure virtuals have been observed. I propose that these can be explained as follows. On the one hand, social cues, reputation, reliance on third parties, and participation in (quasi-) institutions allow imputing trustworthiness to varying degrees. On the other, precisely trust-responsiveness is also relied upon, as a necessary supplement to primary trust. In virtual markets, esteem as a fair trader is coveted while it contributes to building up one’s reputation. In task groups, a hyperactive style of action may be adopted which amounts to assuming (not: inferring) trust. Trustors expect that their virtual co-workers will reply in kind while such an approach is to be considered the most appropriate in cyberspace. In non-task groups, finally, members often display intimacies while they are confident someone else ‘out there’ will return them. This is facilitated by the one-to-many, asynchronous mode of communication within mailing lists.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 90,616

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Online diaries: Reflections on trust, privacy, and exhibitionism.Paul Laat - 2008 - Ethics and Information Technology 10 (1):57-69.
Editorial: Ethical reflections on the virtual frontier. [REVIEW]Lucas D. Introna - 2000 - Ethics and Information Technology 2 (1):1-2.
The case for e-trust.Mariarosaria Taddeo & Luciano Floridi - 2011 - Ethics and Information Technology 13 (1):1–3.
Computer ethics: Its birth and its future.Terrell Ward Bynum - 2001 - Ethics and Information Technology 3 (2):109-112.
Philosophy and computing. An introduction, Luciano Floridi.Lorenzo Magnai - 2000 - Ethics and Information Technology 2 (2):137-138.

Analytics

Added to PP
2017-02-20

Downloads
8 (#1,138,679)

6 months
2 (#670,035)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Paul B. De Laat
University of Groningen

Citations of this work

Communication, risk, trust.Barna Kovács - 2021 - Empedocles European Journal for the Philosophy of Communication 12 (1):91-101.
Responsibility of and Trust in ISPs.Raphael Cohen-Almagor - 2010 - Knowledge, Technology & Policy 23 (3):381-397.

View all 7 citations / Add more citations

References found in this work

The Cunning of Trust.Philip Pettit - 1995 - Philosophy and Public Affairs 24 (3):202-225.
The Cunning of Trust.Philip Perth - 1995 - Philosophy and Public Affairs 24 (3):202-225.
Trust, Reliance and the Internet.Philip Pettit - 2004 - Analyse & Kritik 26 (1):108-121.

Add more references