首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 34 毫秒
1.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   

2.
Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered instead. Trust (i.e. full write-access) is ‘backgrounded’ by means of a permanent mobilization of Wikipedians to monitor incoming edits. Computational approaches have been developed for the purpose, yielding both sophisticated monitoring tools that are used by human patrollers, and bots that operate autonomously. Measures of reputation are also under investigation within Wikipedia; their incorporation in monitoring efforts, as an indicator of the trustworthiness of editors, is envisaged. These collective monitoring efforts are interpreted as focusing on avoiding possible damage being inflicted on Wikipedian spaces, thereby being allowed to keep the discretionary powers of editing intact for all users. Further, the essential differences between backgrounding and substituting trust are elaborated. Finally it is argued that the Wikipedian monitoring of new edits, especially by its heavy reliance on computational tools, raises a number of moral questions that need to be answered urgently.  相似文献   

3.
A program for the simulation of rational social normative trust, predictive `trust,' and predictive reliance between agents will be introduced. It offers a tool for social scientists or a trust component for multi-agent simulations/multi-agent systems, which need to include trust between agents to guide the decisions about the course of action. It is based on an analysis of rational social normative trust (RSNTR) (revised version of M. Tuomela 2002), which is presented and briefly argued. For collective agents, belief conditions for collective agency should be added. For the various forms of trust agents must have (at least) subjectively rational reasons to believe that the conditions of the trust account are fulfilled. A list of such reasons (of varied weights), e.g., given by empirical research, can manually be built into a parameter file or be generated by a calling program in a fixed format. From this list of reasons the program randomly generates a belief base for the agents of the artificial society. Reasons can be chained together so that one set of reasons satisfies several belief conditions. The program checks if the conditions are fulfilled for the artificial agents' social normative trust/predictive `trust'/`predictive reliance' in another agent that he will perform an action X. Each outcome is logged to a result file. In conclusion we discuss various aspects of the application of a trust component of the suggested kind in empirical research, social simulation, and multi-agent systems. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

4.
Renting a property via a peer-to-peer platform involves a variety of risks. Humans inherently, subconsciously use facial cues as important shortcuts in making assessments about other persons. On property sharing platforms, such as Airbnb, facial cues can be used in a similar fashion alongside reputational information. According to Dangerous Decisions Theory (DDT), intuitive evaluations of trustworthiness based on faces can bias subsequent assessment of an individual, requiring further information sources to make a more balanced assessment. In this study we apply DDT to demonstrate that evaluations based on perceived facial trustworthiness are overvalued; when combined with reputational measures, such as ‘super host’ status, such assessments are diminished. The study is based on deep learning to classify host faces for a large data set of online accommodation (n = 78,386). The research demonstrates that facial trust cues in online platforms should be treated with caution and must be combined with more objective measures of reputation in order to reduce the effects of overvaluation. The paper concludes with implications for practice and future research.  相似文献   

5.
Open-source communities that focus on content rely squarely on the contributions of invisible strangers in cyberspace. How do such communities handle the problem of trusting that strangers have good intentions and adequate competence? This question is explored in relation to communities in which such trust is a vital issue: peer production of software (FreeBSD and Mozilla in particular) and encyclopaedia entries (Wikipedia in particular). In the context of open-source software, it is argued that trust was inferred from an underlying ‘hacker ethic’, which already existed. The Wikipedian project, by contrast, had to create an appropriate ethic along the way. In the interim, the assumption simply had to be that potential contributors were trustworthy; they were granted ‘substantial trust’. Subsequently, projects from both communities introduced rules and regulations which partly substituted for the need to perceive contributors as trustworthy. They faced a design choice in the continuum between a high-discretion design (granting a large amount of trust to contributors) and a low-discretion design (leaving only a small amount of trust to contributors). It is found that open-source designs for software and encyclopaedias are likely to converge in the future towards a mid-level of discretion. In such a design the anonymous user is no longer invested with unquestioning trust.  相似文献   

6.
Vendors and clients collaborate on outsourcing projects through virtual teams. Trust is an important indicator of mutual relationships that lead to successful projects. This study’s objective is to investigate the determinants of trust in different stages of collaboration during offshore software-development outsourcing. Using a case study approach to collect data, we find that reputation, a cognition-based trust factor, influences clients’ trust in vendors in the team-forming stage. Responsible team climate, a knowledge-based trust factor, impacts clients’ trust in vendors in the team-storming and norming stages of software design and development. Structural assurance, an institutional trust factor, encourages vendors’ trust in clients in the same team-storming and norming stages of software design and development. Benefit, a calculative-based trust factor, influences vendors’ trust in clients in the team-performing stage of software delivery and implementation. Our research findings have implications for software-outsourcing collaboration theories and practices and may have implications beyond that sphere, including team building in multiple contexts and environments.  相似文献   

7.
Trust online can be a hazardous affair; many are trustworthy, but some people use the anonymity of the web to behave very badly indeed. So how can we improve the quality of evidence for trustworthiness provided online? I focus on one of the devices we use to secure others’ trustworthiness: tracking past conduct through online reputation systems. Yet existing reputation systems face problems. I analyse these, and in the light of this develop some principles for system design, towards overcoming these challenges. In providing better evidence for trustworthiness online, so we can also encourage people actually to be trustworthy more often, which is an ethically welcome outcome.  相似文献   

8.
刘迎春  谢年春  李佳 《现代情报》2009,40(3):117-125
[目的/意义] 在资源质量参差不齐的虚拟学习社区中,通过度量知识贡献者的信誉来间接判断资源质量,有利于解决用户的资源选择难题。[方法/过程] 采用文献分析法确定了虚拟学习社区用户信任知识贡献者的主要影响因素,分析了虚拟学习社区用户的行为结构与信任影响因素之间的关系,并在此基础上通过问卷调查法构建了虚拟学习社区知识贡献者信誉评价指标体系,最后将评价指标体系应用于"计算机技术论坛"中进行社区可信用户识别实验。[结果/结论] 研究发现,知识贡献者的信誉评价可从用户的权威性和专业知识能力两方面进行,且基于信誉评价指标体系的信誉度量方式具有较高的可信用户识别性能。  相似文献   

9.
多安全域环境下的访问控制是域间进行协作必须要解决的问题之一。交互主体间的陌生性以及共享资源的敏感性成为跨域建立信任关系的主要障碍。自动信任协商的提出提供了解决这一问题的新途径,它通过协作主体间信任证和访问控制策略的反复交互披露,在资源的请求者和提供者之间自动地建立起信任关系。在分析现有自动信任协商技术的基础上,针对信任协商中存在的证书敏感属性信息泄露的问题提出了改进的方案。该方案可有选择性地披露信任证的敏感属性,从而达到协商过程中减少敏感信息泄露和提高协商系统抗攻击能力的目的。  相似文献   

10.
张洁梅  马悦杰 《科研管理》2021,42(3):139-149
虚拟社区用户忠诚对于虚拟社区的长期可持续性发展尤为重要。本研究以知识分享行为(知识共享数量和质量)为中介变量,探讨社会资本(信任、社会联结性、共同愿景)和外部动机(互惠动机、声誉动机)对社区忠诚的作用机理,并通过结构方程模型进行验证。研究结果表明,信任和外部动机通过知识共享数量和质量对社区忠诚有显著正向影响,社会联结性仅通过知识共享数量对社区忠诚有显著影响;信任和外部动机对知识共享数量和质量有显著正向影响,社会联结性仅显著影响知识共享数量,而共同愿景对知识共享数量和质量均无显著影响;知识共享行为对社区忠诚有显著正向影响,并且知识共享质量对社区忠诚的影响更显著。该结论为企业重视虚拟社区用户知识分享行为从而吸引和留住虚拟社区用户提供了决策支持,为企业更好的运营虚拟社区并利用虚拟社区获得可持续发展提供了重要启示。  相似文献   

11.
In this paper, I examine the ethics of e-trust and e-trustworthiness in the context of health care, looking at direct computer-patient interfaces (DCPIs), information systems that provide medical information, diagnosis, advice, consenting and/or treatment directly to patients without clinicians as intermediaries. Designers, manufacturers and deployers of such systems have an ethical obligation to provide evidence of their trustworthiness to users. My argument for this claim is based on evidentialism about trust and trustworthiness: the idea that trust should be based on sound evidence of trustworthiness. Evidence of trustworthiness is a broader notion than one might suppose, including not just information about the risks and performance of the system, but also interactional and context-based information. I suggest some sources of evidence in this broader sense that make it plausible that designers, manufacturers and deployers of DCPIs can provide evidence to users that is cognitively simple, easy to communicate, yet rationally connected with actual trustworthiness.  相似文献   

12.
This study enhances the existing literature on online trust by integrating the consumers’ product evaluations model and technology adoption model in e-commerce environments. In this study, we investigate how perceived value influences the perceptions of online trust among online buyers and their willingness to repurchase from the same website. This study proposes a research model that compares the relative importance of perceived value and online trust to perceived usefulness in influencing consumers’ repurchase intention. The proposed model is tested using data collected from online consumers of e-commerce. The findings show that although trust and e-commerce adoption components are critical in influencing repurchase intention, product evaluation factors are also important in determining repurchase intention. Perceived quality is influenced by the perceptions of competitive price and website reputation, which in turn influences perceived value; and perceived value, website reputation, and perceived risk influence online trust, which in turn influence repurchase intention. The findings also indicate that the effect of perceived usefulness on repurchase intention is not significant whereas perceived value and online trust are the major determinants of repurchase intention. Major theoretical contributions and practical implications are discussed.  相似文献   

13.
【目的/意义】本文以虚拟学术社区用户为研究对象,探究其知识交流行为影响因素,为虚拟学术社区提升平台活跃度及用户知识交流效率提供建议。【方法/过程】文章在UTAUT模型的基础上,引入感知信任和激励两个变量,构建了虚拟学术社区用户知识交流影响因素模型,并通过问卷调查进行实证研究。【结果/结论】研究表明社会影响、感知信任和激励对用户知识交流意愿存在显著正向影响,绩效期望对用户知识交流意愿存在显著负向影响,努力期望、便利条件对于知识交流意愿的影响不显著。  相似文献   

14.
公私合作(PPP)被认为是通过公共部门和私人部门合作来提升公共服务水平的重要模式.在PPP合作中,信任作为一种重要的合作关系规范,直接影响到合作效果,同时合作方所面临的环境不确定性和合作方行为的不确定性这两方面的外在因素会对信任-合作效果之间的关系起到相应的调节作用.在此理论假设的基础上,对中国背景下高科技生物制药行业PPP合作进行实证研究,研究表明,合作方之间的信任确实会增强合作效果,然而外部环境的不确定性会弱化信任-合作效果之间的正向关系,合作伙伴方行为的不确定性会强化信任-合作效果之间的正向关系.  相似文献   

15.
彭本红  冯良清 《科技与管理》2011,13(1):29-33,45
信任机制是模块化生产网络顺利运作的保障。研究了信任在模块化生产网络中的重要作用,分析了模块化生产网络的3种主要角色。构建了模块集成商与供应商之间的信任博弈模型,并建立了基于声誉的动态激励模型。结果表明:模块化生产网络的信任机制实质上是一种利益博弈问题,信任博弈具有帕累托改进性质的分配规则;声誉成为成员合作的一个有效激励,而动态激励机制注意到了模块供应商基于长期合作的声誉维护,起到了增强激励效应的作用。  相似文献   

16.
【目的/意义】研究从用户节点和网络全局两个视角出发,基于用户相似度与信任度对虚拟学术社区中学者 进行推荐,提高学者推荐的质量。【方法/过程】首先,利用 LDA 主题模型挖掘学者发表的博文主题,计算博文相似 度;通过学者共同好友比例计算好友相似度;然后将博文相似度和好友相似度融合计算用户相似度;最后,融合用 户相似度和信任度进行学者推荐。【结果/结论】提出虚拟学术社区中基于用户相似度与信任度的学者推荐方法,综 合利用用户节点和网络全局信息,为虚拟学术社区用户进行学者推荐。【创新/局限】从用户节点和网络全局两个角 度进行学者信息融合,有效提高了虚拟学术社区中学者推荐的质量。局限在于本文主要考虑的是学者在网络全局 中的信任度,用户节点间的交互信任关系还有待进一步研究。  相似文献   

17.
吉鸿荣 《现代情报》2010,30(7):16-19,23
组织间信任对组织间知识转移的正向影响非常显著。文章从信任对虚拟企业组织间知识转移的影响分析入手,探讨虚拟企业组织间知识转移信任机制的构建:建立了虚拟企业组织间信任——知识转移的得益矩阵;将虚拟企业的组织间信任分为初始信任阶段、信任发展阶段、信任维护阶段、信任再发展阶段等4个阶段,并建立了虚拟企业组织间知识转移的信任机制模型。  相似文献   

18.
【目的/意义】研究在线医疗社区医生主页中的医生文本信息与图片信息对患者择医行为的影响,期望为患 者在线择医行为的研究提供更深入的多源信息融合方面的理论依据,并为提高在线问诊的服务质量提供参考意 见。【方法/过程】本文以信任源理论为基础,从影响信任的声誉可信度、能力可信度和面孔可信度三个维度出发构 建患者在线择医模型,收集春雨医生网站文本、图片和其他相关信息,基于深度学习,识别医生照片中的面孔特征, 并基于多源信息,通过回归分析验证理论模型。【结果/结论】医生的声誉可信度对患者择医行为有显著的正向影 响,而医生的能力可信度负向影响着患者的择医行为。照片信息方面,严肃、不出众的医生外观形象能够促进患者 对医生的信任,进而正向影响患者的择医行为,照片的面孔吸引力可以削弱医院等级带来的负面影响。【创新/局 限】本文将图片信息加入患者择医决策行为研究中,充分考虑了患者生成信息与系统生成信息对患者择医行为的 影响。  相似文献   

19.
The online merchant of an e-marketplace consists of an intermediary, providing the market infrastructure, and the community of sellers conducting business within that infrastructure. Typically, consumers willingly buy from unknown sellers within an e-marketplace, despite the apparent risk, since they trust the institutional mechanisms furnished by the relatively well-known intermediary. Consumers’ trust in one component of the e-marketplace merchant may not only affect their trust in the other, but also influence the way consumers make online purchases. This paper explores the impact of trust on consumer behavior in e-marketplaces. An empirical study has been conducted to accomplish our research objectives, using a questionnaire survey of 222 active e-marketplace shoppers in Korea. The results reveal that consumer trust in an intermediary has a strong influence upon both attitudinal loyalty and purchase intentions, although consumer trust in the community of sellers has no significant effect on the two constructs representing consumer behavior. In addition, it was found that trust is transferred from an intermediary to the community of sellers, implying that the trustworthiness of the intermediary plays a critical role in determining the extent to which consumers trust and accept the sellers in the e-marketplace. This paper offers some implications from the findings of the research.  相似文献   

20.
In a recent and provocative essay, Christopher Bartel attempts to resolve the gamer’s dilemma. The dilemma, formulated by Morgan Luck, goes as follows: there is no principled distinction between virtual murder and virtual pedophilia. So, we’ll have to give up either our intuition that virtual murder is morally permissible—seemingly leaving us over-moralizing our gameplay—or our intuition that acts of virtual pedophilia are morally troubling—seemingly leaving us under-moralizing our game play. Bartel’s attempted resolution relies on establishing the following three theses: (1) virtual pedophilia is child pornography, (2) the consumption of child pornography is morally wrong, and (3) virtual murder is not murder. Relying on Michael Rea’s definition of pornography, I argue that we should reject thesis one, but since Bartel’s moral argument in thesis two does not actually rely thesis one that his resolution is not thereby undermined. Still, even if we grant that there are adequate resources internal to Bartel’s account to technically resolve the gamer’s dilemma his reasoning is still unsatisfying. This is so because Bartel follows Neil Levy in arguing that virtual pedophilia is wrong because it harms women. While I grant Levy’s account, I argue that this is the wrong kind of reason to resolve the gamer’s dilemma because it is indirect. What we want is to know what is wrong with virtual child pornography itself. Finally, I suggest alternate moral resources for resolving the gamer’s dilemma that are direct in a way that Bartel’s resources are not.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号