Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-hfldf Total loading time: 0 Render date: 2024-05-14T16:51:17.576Z Has data issue: false hasContentIssue false

Chapter 3 - Trust and Digitalization

Review of Behavioral and Neuroscience Evidence

from Part I - Fundamental Level of Trust

Published online by Cambridge University Press:  09 December 2021

Frank Krueger
Affiliation:
George Mason University, Virginia
Get access

Summary

Determining whom to trust and whom not to trust has been critical since the early days of ancient civilizations. However, with the increasing use of digital technologies, trust situations have changed. We communicate less face-to-face. Rather, we communicate with other people over the Internet (e.g., Facebook) or we interact with technological artifacts (e.g., chatbots on the Internet or autonomous vehicles). This trend towards digitalization has major implications. It affects both the role of trust and how we should conceptualize trust and trustworthiness. In this chapter, insights on phenomena related to trust in a digital world are reviewed. This review integrates findings from various levels of analysis, including behavioral and neurophysiological. The structure of this chapter is based on four different scenarios of trust in a digital world that were developed by the author. Scenario A describes a technology-free situation of human-human interaction. Scenario B outlines a situation of computer-mediated human-human interaction. Scenario C denotes a situation of direct human-technology interaction. Scenario D refers to a situation of computer-mediated human-technology interaction. The common denominator of all situations is that a human acts in the role of trustor, while the role of trustee can be either another human or a technological artifact.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2021

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Appel, J., von der Pütten, A., Krämer, N. C., & Gratch, J. (2012). Does humanity matter? Analyzing the importance of social cues and perceived agency of a computer system for the emergence of social reactions during human-computer interaction. Advances in Human-Computer Interaction, 2012, Article 324694. https://doi.org/10.1155/2012/324694CrossRefGoogle Scholar
Ba, S. L., & Pavlou, P. A. (2002). Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly, 26(3), 243268. https://doi.org/10.2307/4132332Google Scholar
Baumgartner, T., Heinrichs, M., Vonlanthen, A., Fischbacher, U., & Fehr, E. (2008). Oxytocin shapes the neural circuitry of trust and trust adaptation in humans. Neuron, 58(4), 639650. https://doi.org/10.1016/j.neuron.2008.04.009Google Scholar
Bellucci, G., Chernyak, S. V., Goodyear, K., Eickhoff, S. B., & Krueger, F. (2017). Neural signatures of trust in reciprocity: A coordinate-based meta-analysis. Human Brain Mapping, 38(3), 12331248. https://doi.org/10.1002/hbm.23451CrossRefGoogle ScholarPubMed
Bente, G., Rüggenberg, S., Krämer, N. C., & Eschenburg, F. (2008). Avatar-mediated networking: Increasing social presence and interpersonal trust in net-based collaborations. Human Communication Research, 34(2), 287318. https://doi.org/10.1111/j.1468-2958.2008.00322.xGoogle Scholar
Berg, J., Dickhaut, J., & McCabe, K. (1995). Trust, reciprocity, and social-history. Games and Economic Behavior, 10(1), 122142. https://doi.org/10.1006/game.1995.1027Google Scholar
Brave, S., Nass, C., & Hutchinson, K. (2005). Computers that care: Investigating the effects or orientation of emotion exhibited by an embodied computer agent. International Journal of Human-Computer Studies, 62(2), 161178. https://doi.org/10.1016/j.ijhcs.2004.11.002CrossRefGoogle Scholar
Cesarini, D., Dawes, C. T., Fowler, J. H., Johannesson, M., Lichtenstein, P., & Wallace, B. (2008). Heritability of cooperative behavior in the trust game. Proceedings of the National Academy of Sciences, 105(10), 37213726. https://doi.org/10.1073/pnas.0710069105CrossRefGoogle ScholarPubMed
Coricelli, G., & Nagel, R. (2009). Neural correlates of depth of strategic reasoning in medial prefrontal cortex. Proceedings of the National Academy of Sciences, 106(23), 91639168. https://doi.org/10.1073/pnas.0807721106CrossRefGoogle ScholarPubMed
De Visser, E. J., Monfort, S. S., McKendrick, R., et al. (2016). Almost human: Anthropomorphism increases trust resilience in cognitive agents. Journal of Experimental Psychology: Applied, 22(3), 331349. https://doi.org/10.1037/xap0000092Google Scholar
Dimoka, A. (2010). What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly, 34(2), 373396. https://doi.org/10.2307/20721433Google Scholar
Fehr, E. (2009a). On the economics and biology of trust. Journal of the European Economic Association, 7(2–3), 235266. https://doi.org/10.1162/JEEA.2009.7.2-3.235Google Scholar
Fehr, E. (2009b). Social preferences and the brain. In Glimcher, P. W., Camerer, C. F., Fehr, E., & Poldrack, R. A. (Eds.), Neuroeconomics: Decision making and the brain (pp. 215232). Academic Press. https://doi.org/10.1016/B978–0-12-374176-9.00015-4Google Scholar
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153160. https://doi.org/10.1016/j.chb.2008.08.006Google Scholar
Fogg, B. J., & Nass, C. (1997). How users reciprocate to computers: An experiment that demonstrates behavior change. Proceedings of the Conference on Human Factors in Computing Systems, 1997, 331332. https://doi.org/10.1145/1120212.1120419Google Scholar
Friedman, B., Kahn, P. H. Jr., & Howe, D. C. (2000). Trust online. Communications of the ACM, 43(12), 3440. https://doi.org/10.1145/355112.355120Google Scholar
Friedman, B., & Millett, L. I. (1997). Reasoning about computers as moral agents: A research note. In Friedman, B. (Ed.), Human values and the design of computer technology (pp. 201205). CSLI Publications.Google Scholar
Gallagher, H. L., Jack, A. I., Roepstorff, A., & Frith, C. D. (2002). Imaging the intentional stance in a competitive game. NeuroImage, 16(3), 814821. https://doi.org/10.1006/nimg.2002.1117Google Scholar
Gallivan, M. J. (2001). Striking a balance between trust anti control in a virtual organization: A content analysis of open source software case studies. Information Systems Journal, 11(4), 277304. https://doi.org/10.1046/j.1365-2575.2001.00108.xCrossRefGoogle Scholar
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 5190. https://doi.org/10.2307/30036519Google Scholar
Hancock, P. A., Billings, D. R., Schaefer, K. E., Chen, J. Y. C., de Visser, E. J., & Parasuraman, R. (2011). A meta-analysis of factors affecting trust in human-robot interaction. Human Factors, 53(5), 517527. https://doi.org/10.1177/0018720811417254CrossRefGoogle ScholarPubMed
Hubert, M., Hubert, M., Linzmajer, M., Riedl, R., & Kenning, P. (2018). Trust me if you can: Neurophysiological insights on the influence of consumer impulsiveness on trustworthiness evaluations in online settings. European Journal of Marketing, 52(1–2), 118146. https://doi.org/10.1108/EJM-12-2016-0870CrossRefGoogle Scholar
ITU. (2019). Measuring digital development: Facts and figures 2019. www.itu.int/en/ITU-D/Statistics/Documents/facts/FactsFigures2019.pdfGoogle Scholar
Jarvenpaa, S. L., Shaw, T. R., & Staples, D. S. (2004). Toward contextualized theories of trust: The role of trust in global virtual teams. Information Systems Research, 15(3), 250267. https://doi.org/10.1287/isre.1040.0028Google Scholar
Javor, A., Ransmayr, G., Struhal, W., & Riedl, R. (2016). Parkinson patients’ initial trust in avatars: Theory and evidence. PLoS ONE, 11(11), Article e0165998. https://doi.org/10.1371/journal.pone.0165998Google Scholar
Javor, A., Riedl, R., Kirchmayr, M., Reichenberger, M., & Ransmayr, G. (2015). Trust behavior in Parkinson’s disease: Results of a trust game experiment. BMC Neurology, 15(126), 17. https://doi.org/10.1186/s12883–015-0374-5Google Scholar
Johnson, N. D., & Mislin, A. A. (2011). Trust games: A meta-analysis. Journal of Economic Psychology, 32(5), 865889. https://doi.org/10.1016/j.joep.2011.05.007Google Scholar
Johnson, T. J., & Kaye, B. K. (2009). In blog we trust? Deciphering credibility of components of the Internet among politically interested internet users. Computers in Human Behavior, 25(1), 175182. https://doi.org/10.1016/j.chb.2008.08.004Google Scholar
Junglas, I. A., Johnson, N. A., Steel, D. J., Abraham, C., & Loughlin, P. M. (2007). Identity formation, learning styles and trust in virtual worlds. The DATA BASE for Advances in Information Systems, 38(4), 9096. https://doi.org/10.1145/1314234.1314251CrossRefGoogle Scholar
Kanwisher, N., McDermott, J., & Chun, M. M. (1997). The fusiform face area: A module in human extrastriate cortex specialized for face perception. Journal of Neuroscience, 17(11), 43024311. https://doi.org/10.1523/JNEUROSCI.17-11-04302.1997Google Scholar
Kopton, I., Sommer, J., Winkelmann, A., Riedl, R., & Kenning, P. (2013). Users’ trust building processes during their initial connecting behavior in social networks: behavioral and neural evidence. Proceedings of the International Conference on Information Systems, 107.Google Scholar
Krach, S., Blümel, I., Marjoram, D., et al. (2009). Are women better mindreaders? Sex differences in neural correlates of mentalizing detected with functional MRI. BMC Neuroscience, 10, 111. https://doi.org/10.1186/1471-2202-10-9CrossRefGoogle ScholarPubMed
Krach, S., Hegel, F., Wrede, B., Sagerer, G., Binkofski, F., & Kircher, T. (2008). Can machines think? Interaction and perspective taking with robots investigated via fMRI. PLoS ONE, 3(7), Article e2597. https://doi.org/10.1371/journal.pone.0002597CrossRefGoogle ScholarPubMed
Krueger, F., McCabe, K., et al. (2007). Neural correlates of trust. Proceedings of the National Academy of Sciences, 104(50), 2008420089. https://doi.org/10.1073/pnas.0710103104CrossRefGoogle ScholarPubMed
Krueger, F., & Meyer-Lindenberg, A. (2019). Toward a model of interpersonal trust drawn from neuroscience, psychology, and economics. Trends in Neurosciences, 42(2), 92101. https://doi.org/10.1016/j.tins.2018.10.004CrossRefGoogle Scholar
Lankton, N. K., & McKnight, D. H. (2011). What does it mean to trust Facebook? Examining technology and interpersonal trust beliefs. The DATA BASE for Advances in Information Systems, 42(2), 3254. https://doi.org/10.1145/1989098.1989101Google Scholar
Lankton, N. K., McKnight, D. H., & Tripp, J. (2015). Technology, humanness, and trust: Rethinking trust in technology. Journal of the Association for Information Systems, 16(10), 880918. https://doi.org/10.17705/1jais.00411Google Scholar
Lee, J., & Moray, N. (1992). Trust, control strategies and allocation of function in human-machine systems. Ergonomics, 35(10), 12431270. https://doi.org/10.1080/00140139208967392Google Scholar
Luhmann, N. (1979). Trust and power. Wiley.Google Scholar
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709734. https://doi.org/10.2307/258792Google Scholar
McCabe, K., Houser, D., Ryan, L., Smith, V., & Trouard, T. (2001). A functional imaging study of cooperation in two-person reciprocal exchange. Proceedings of the National Academy of Sciences, 98(20), 1183211835. https://doi.org/10.1073/pnas.211415698CrossRefGoogle ScholarPubMed
McKnight, D. H., Carter, M., Thatcher, J. B., & Clay, P. F. (2011). Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems, 2(2), Article 12. https://doi.org/10.1145/1985347.1985353Google Scholar
McKnight, D. H., & Chervany, N. L. (2001). Trust and distrust definitions: One bite at a time. In Falcone, R., Singh, M., & Tan, Y. H. (Eds.), Trust in cyber-societies: Integrating the human and artificial perspectives (pp. 2754). Springer. https://doi.org/10.1007/3-540-45547-7_3Google Scholar
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334359. https://doi.org/10.1287/isre.13.3.334.81CrossRefGoogle Scholar
Muir, B. M. (1987). Trust between humans and machines, and the design of decision aids. International Journal of Man-Machine Studies, 27(5–6), 527539. https://doi.org/10.1016/S0020–7373(87)80013-5Google Scholar
Nass, C., Steuer, J. S., Henriksen, L., & Dryer, D. C. (1994). Machines, social attributions, and ethopoeia: Performance assessments of computers subsequent to “self-” or “other-” evaluations. International Journal of Human-Computer Studies, 40(3), 543559. https://doi.org/10.1006/ijhc.1994.1025Google Scholar
Nass, C., Steuer, J. S., Tauber, E., & Reeder, H. (1993). Anthropomorphism, agency, and ethopoeia: Computers as social actors. Proceedings of the INTERCHI ‘93 Conference on Human Factors in Computing Systems, 1993, 111112. https://doi.org/10.1145/259964.260137Google Scholar
Nicolaou, A. I., & McKnight, D. H. (2006). Perceived information quality in data exchanges: Effects on risk, trust, and intention to use. Information Systems Research, 17(4), 392414. https://doi.org/10.1287/isre.1060.0103CrossRefGoogle Scholar
Paravastu, N., Gefen, D., & Creason, S. (2014). Understanding trust in IT artifacts: An evaluation of the impact of trustworthiness and trust on satisfaction with antiviral software. The DATA BASE for Advances in Information Systems, 45(4), 3050. https://doi.org/10.1145/2691517.2691520CrossRefGoogle Scholar
Paul, D. L., & McDaniel, R. R. (2004). A field study of the effect of interpersonal trust on virtual collaborative relationship performance. MIS Quarterly, 28(2), 183227. https://doi.org/10.2307/25148633CrossRefGoogle Scholar
Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 3759. https://doi.org/10.1287/isre.1040.0015CrossRefGoogle Scholar
Piccoli, G., & Ives, B. (2003). Trust and the unintended effects of behavior control in virtual teams. MIS Quarterly, 27(3), 365395. https://doi.org/10.2307/30036538Google Scholar
Reeves, B., & Nass, C. (1996). The media equation: How people treat computers, television, and new media like real people and places. Cambridge University Press/CSLI.Google Scholar
Riedl, R., Hubert, M., & Kenning, P. (2010). Are there neural gender differences in online trust? An fMRI study on the perceived trustworthiness of eBay offers. MIS Quarterly, 34(2), 397428. https://doi.org/10.2307/20721434Google Scholar
Riedl, R., & Javor, A. (2012). The biology of trust: Integrating evidence from genetics, endocrinology and functional brain imaging. Journal of Neuroscience, Psychology, and Economics, 5(2), 6391. https://doi.org/10.1037/a0026318CrossRefGoogle Scholar
Riedl, R., Mohr, P., Kenning, P., Davis, F. D., & Heekeren, H. (2011). Trusting humans and avatars: Behavioral and neural evidence. Proceedings of the 32nd International Conference on Information Systems, 2011, 123.Google Scholar
Riedl, R., Mohr, P., Kenning, P., Davis, F. D., & Heekeren, H. (2014). Trusting humans and avatars: A brain imaging study based on evolution theory. Journal of Management Information Systems, 30(4), 83114. https://doi.org/10.2753/MIS0742–1222300404Google Scholar
Rilling, J. K, Gutman, D. A., Zeh, T. R., Pagnoni, G., Berns, G. S., & Kilts, C. D. (2002). A neural basis for social cooperation. Neuron, 35(2), 395405. https://doi.org/10.1016/S0896–6273(02)00755-9Google Scholar
Rilling, J. K., Sanfey, A. G., Aronson, J. A., Nystrom, L. E., & Cohen, J. D. (2004). The neural correlates of theory of mind within interpersonal interactions. NeuroImage, 22(4), 16941703. https://doi.org/10.1016/j.neuroimage.2004.04.015Google Scholar
Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. F. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393404. https://doi.org/10.5465/amr.1998.926617Google Scholar
Seppänen, R., Blomqvist, K., & Sundqvist, S. (2007). Measuring inter-organizational trust: A critical review of the empirical research in 1990–2003. Industrial Marketing Management, 36(2), 249265. https://doi.org/10.1016/j.indmarman.2005.09.003Google Scholar
Söllner, M., Hoffmann, A., Hoffmann, H., Wacker, A., & Leimeister, J. M. (2012). Understanding the formation of trust in IT artifacts. Proceedings of the International Conference on Information Systems, 2012.Google Scholar
Söllner, M., Hoffmann, A., & Leimeister, J. M. (2016). Why different trust relationships matter for information systems users. European Journal of Information Systems, 25(3), 274287. https://doi.org/10.1057/ejis.2015.17Google Scholar
Swan, J. E., Bowers, M. R., & Richardson, L. D. (1999). Customer trust in the salesperson: An integrative review and meta-analysis of the empirical literature. Journal of Business Research, 44(2), 93107. https://doi.org/10.1016/S0148–2963(97)00244-0Google Scholar
Toulmin, S. (1958). The use of argument. Cambridge University Press.Google Scholar
Tzieropoulos, H. (2013). The trust game in neuroscience: A short review. Social Neuroscience, 8(5), 407416. https://doi.org/10.1080/17470919.2013.832375Google Scholar
Wang, W., & Benbasat, I. (2005). Trust in and adoption of online recommendation agents. Journal of the Association for Information Systems, 6(3), 72101. https://doi.org/10.17705/1jais.00065Google Scholar
Waytz, A., Heafner, J., & Epley, N. (2014). The mind in the machine: Anthropomorphism increases trust in an autonomous vehicle. Journal of Experimental Social Psychology, 52, 113117. https://doi.org/10.1016/j.jesp.2014.01.005Google Scholar
Winston, J. S., Strange, B. A., O’Doherty, J., & Dolan, R. J. (2002). Automatic and intentional brain responses during evaluation of trustworthiness of faces. Nature Neuroscience, 5(3), 277283. https://doi.org/10.1038/nn816CrossRefGoogle ScholarPubMed
Yanquing, D., Edwards, J. S., & Dwivedi, Y. K. (2019). Artificial intelligence for decision making in the era of Big Data: Evolution, challenges and research agenda. International Journal of Information Management, 48, 6371. https://doi.org/10.1016/j.ijinfomgt.2019.01.021Google Scholar
Zuboff, S. (1988). In the age of the smart machine: The future of work and power. Basic Books.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×