Computer-Mediated Communication

Slides:



Advertisements
Similar presentations
Nagel: Unraveling in Guessing Games: An Experimental Study Economics 328 Spring 2005.
Advertisements

Cristina Bicchieri University of Pennsylvania (work done in collaboration with Azi Lev-On and Alex Chavez)
Face To Face vs. Mediated Interaction Joseph Miller Michael Osborn Jaclyn Duket Ohn’Jay Walker.
Econ 2610: Principles of Microeconomics Yogesh Uppal
May 21, 2015 // Computer-Mediated Communication Trust and Trustworthiness In Computer-Mediated Communication.
Coye Cheshire & Andrew Fiore June 13, 2015 // Computer-Mediated Communication Trust and Trustworthiness Part II.
The Presentation of Self in Online Life: The Importance of Nicknames in Online Environments. Eimi Lev and Anat Lewinsky Department of Communication University.
Coye Cheshire & Andrew Fiore June 26, 2015 // Computer-Mediated Communication CMC & Society.
Norm Theory and Descriptive Translation Studies
If you must print – please switch to Outline View to conserve paper.
1 University of Auckland Winter Week Lectures Third Lecture 4 July 2007 Associate Professor Ananish Chaudhuri Department of Economics University of Auckland.
Game Theory, Strategic Decision Making, and Behavioral Economics 11 Game Theory, Strategic Decision Making, and Behavioral Economics All men can see the.
Chapter 12 Choices Involving Strategy Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
Social Information Processing Theory
TESTING THE WATERS: USING COLLECTIVE REAL OPTIONS TO MANAGE THE SOCIAL DILEMMA OF STRATEGIC ALLIANCES MATTHEW W. MCCARTER JOSEPH T. MAHONEY GREGORY B.
By: Isaiah Magpali-Isaac, Tatianna Smith, Viris Colmenero Farrelly, Daniel, Lazarus, John, & Roberts, Gilbert (2007). Altruists Attract. Evolutionary Psychology.
Direct Teacher: Professor Ng Reporter: Cindy Pineapple 1 Summarized from :
McGraw-Hill/Irwin Copyright  2008 by The McGraw-Hill Companies, Inc. All rights reserved. GAME THEORY, STRATEGIC DECISION MAKING, AND BEHAVIORAL ECONOMICS.
1 The Determinants of Managerial Decisions Under Risk Martin G. Kocher University of Innsbruck Ganna Pogrebna Columbia University Matthias Sutter University.
Overview of the IWB Research. The IWB Research Literature: Is overwhelmingly positive about their potential. Primarily based on the views of teachers.
HIERARCHY FROM EXCHANGE Joseph M. Whitmeyer UNC Charlotte August, 2003.
UNIT IV ECONOMIC SYSTEMS AND TRADE Part 3: Gains from Trade.
Online students’ perceived self-efficacy: Does it change? Presenter: Jenny Tseng Professor: Ming-Puu Chen Date: July 11, 2007 C. Y. Lee & E. L. Witta (2001).
RESEARCH METHODS IN INDUSTRIAL PSYCHOLOGY & ORGANIZATION Pertemuan Matakuliah: D Sosiologi dan Psikologi Industri Tahun: Sep-2009.
Online shoppers’ perceptions of e-retailers’ ethics, cultural orientation, and loyalty An exploratory study in Taiwan MA Chu-Yi, Chen.
Coye Cheshire & Andrew Fiore March 6, 2016 // Computer-Mediated Communication Trust and Trustworthiness Part II.
Clifford Nass, B.J. Fogg, Youngme Moon ation_conformity.html.
June 10, 2016 // Computer-Mediated Communication Trust, Trustworthiness and Reputation In Computer-Mediated Communication.
Social Networks and Trust: not the Experimental Evidence you may Expect Daniela Di Cagno Emanuela Sciubba Luiss Guido Carli, Rome Birkbeck College, London.
Chapter 12 Game Theory Presented by Nahakpam PhD Student 1Game Theory.
Discussion Smart and Illicit: Who Becomes an Entrepreneur and Do They Earn More? LEVINE-RUBINSTEIN by Itay Goldstein, Wharton.
Understanding Interpersonal Communication
Chapter 7 Play and Game Culture. Chapter 7 Play and Game Culture.
Proposal Selection Form
Chapter 9 Audit Sampling: An Application to Substantive Tests of Account Balances McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Chapter 9: Authentic Leadership
Theories and Methods in Social Psychology
Rational Choice Sociology
Module 32 Game Theory.
Morals and Markets Armin Falk & Nora Szech
Exploring Corporate Strategy 7th Edition
Habits resist temporary threats to goal pursuit
Lecture 3.1 THEORIES Realism
Chapter 4: Studying Behavior
Chapter 7: Interpersonal Relationships
Self-disclosure and Trust
Do you interact with anyone on any form of social media that you do not actually know in real life? think about it…
Computer-Mediated Communication
DISC Behavior Profile Module 00-2 Modified: 9/20/2018.
Chapter 9: Authentic Leadership
Computer-Mediated Communication
PSY 301 PAPER Education for Service-- psy301paper.com.
Teaching with Instructional Software
Computer-Mediated Communication
Computer-Mediated Communication
Computer-Mediated Communication
Whose Skin Is In The Game?
Exploring Corporate Strategy 7th Edition
The Role of Incentives and Communication in Strategic Alliances: An Experimental Investigation Strategic Management Journal, (2010) Rajshree Agarwal,
Research and Methodology
Prisoner’s Dilemma (aka Reds & Blues)
Presenter: Nipun Agarwal
Experiments II: Validity and Design Considerations
Computer-Mediated Communication
Introduction to Computer-mediated Communication
SOCIAL INFORMATION PROCESSING THEORY
Chapter 9 Authentic Leadership
The Four Goals of Psychology
Marketing Experiments I
Information on Communication
Presentation transcript:

Computer-Mediated Communication Trust and Trustworthiness Part II

Announcements and Stuff Meeting Times! Forum for Coming Week: We want to hear about your opinions on various online reputation systems (Favorites? Failures? Suggested changes? Give some links/examples) 11/30/2018 Computer-Mediated Communication

Privacy and Trust (Paine and Schoefield 2008) Dimensions of Privacy Informational (psychological) Accessibility (physical) Expressive (interactional) “Actual” vs “Perceived” Privacy 11/30/2018 Computer-Mediated Communication

Computer-Mediated Communication But to argue that privacy has no direct effect at all? I take issue with the fact that they draw this conclusion based on a very short list of studies, all of which are extremely limited in their scope and focus on very narrow dimensions of privacy. In particular, the work in behavioral economics frames privacy as a cost issue, and not all privacy issues are related to cost, either in time or actual money. -Jen K. 11/30/2018 Computer-Mediated Communication

Hardin’s Conception of Trust 11/30/2018 Computer-Mediated Communication

Computer-Mediated Communication There are a few assumptions here that I don't entirely agree with. One, that we actively choose whether or not to enter into a relationship and who we enter into a relationship with based on whether we trust them or not. We are often in situations where relationships are thrust upon us, often based on role/job interdependence and a reliance on one and another to fulfill expectations. -Meena N. 11/30/2018 Computer-Mediated Communication

Computer-Mediated Communication Hardin takes a linear and predictive view that trust is built by iterated reciprocal exchanges, while last week's paper found that the naïve are more trusting. (The combination of "those who frequently engage in such activities also tend to have a greater sense of Internet discretion " - Dan T. 11/30/2018 Computer-Mediated Communication

“Social Intelligence”

(From Cheshire et al. 2010) + = Higher Internet Vigilance

(From Cheshire et al. 2010) + Lower Perceived Information Control =

Are we capturing online trust? George Hayes– any thoughts on Netflix prize and relating “trust” issue back to privacy… 11/30/2018 Computer-Mediated Communication

Using Games and Game Theory to Understand Trust-Building What exactly is it that participants are exchanging in these games? Usually some sort of currency that can be redeemed for money at the end of the session, thereby establishing some risk. - We have to explain what Prisoner’s Dilemma is 11/30/2018 Computer-Mediated Communication

Rules for the CMC trust game… Two players Each player gets 5 items from the experimenter on each round. Players simultaneously decide whether to ‘entrust’ 0 to 5 of their items to the other player. Players decide whether to return the items to the partner or not. If player returns the items, the experimenter DOUBLES the amount returned to the partner (operationalizing benefit of fulfilled entrustment). But, each player can just keep the entrusted items; then nothing is returned to the partner. 11/30/2018 Computer-Mediated Communication

Computer-Mediated Communication For Example… Player A entrusts 1 X’s Player A returns the 3 X; Player B gets 6X! Player A Player B Player B returns the 1 X; Player A gets 2X! At the end of the round, you keep whatever you did not entrust, plus whatever you earned or kept from your partner!! Player B entrusts 3 X’s 11/30/2018 Computer-Mediated Communication

Computer-Mediated Communication Debriefing… What were the risks? What were the sources of uncertainty? What are the opportunity cost(s) in this game? Does the game play any differently when there are repeated interactions with the same partner, compared to when there are new, random partners? 11/30/2018 Computer-Mediated Communication

Computer-Mediated Communication Bos et. al 2002: Effects of four types of CMC Channels on Trust Development 11/30/2018 Computer-Mediated Communication

Computer-Mediated Communication Bos et. al 2002: Effects of four types of CMC Channels on Trust Development 11/30/2018 Computer-Mediated Communication

Computer-Mediated Communication I question how well these laboratory findings translate into actual interactions. We trust someone to do a particular thing. And in this case, the thing is a very specific, rather artificial social dilemma game, performed in a controlled setting. If the goal of this study was to gain insight into effective collaboration across long distances, how well does the social dilemma game model actual work? -Yo-Shang C. 11/30/2018 Computer-Mediated Communication

Computer-Mediated Communication However, the Bos et al. study may not be strong evidence for trust needing touch. First, the experimenters banned social conversation from the experiment. This immediately placed the “richer” media conditions at an advantage because visual and aural cues normally compensated for in CMC social communication could not be in this sterile environment. Second, and related, such games are artificial in the extreme and have little relationship to how people actually use media. Third, the time given to the experiment was not sufficient for the text-based condition to “catch up” with the media with faster communication exchange (Walther, 1992). Finally, the use of self-reports for trust is unreliable because people tend to rate richer media as higher in trust, despite evidence that communication is more effective without identity cues for experienced users (Tanis & Postmes, 2007). -Paine, Schofield and Joinson 2008 11/30/2018 Computer-Mediated Communication

Media Switching and Social Media Choice 11/30/2018 Computer-Mediated Communication