Coye Cheshire & Andrew Fiore March 6, 2016 // Computer-Mediated Communication Trust and Trustworthiness Part II.

Slides:



Advertisements
Similar presentations
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Advertisements

 Lab #1  Intro to Experiments and Experimental Design 2.
Coye Cheshire & Andrew Fiore March 21, 2012 // Computer-Mediated Communication Collective Action and CMC: Game Theory Approaches and Applications.
May 21, 2015 // Computer-Mediated Communication Trust and Trustworthiness In Computer-Mediated Communication.
Playing Games for Reviewing Math Concepts Susan Fife, Ed. D. Houston Community College.
Coye Cheshire & Andrew Fiore June 3, 2015 // Computer-Mediated Communication Reputation (Part II)
Coye Cheshire & Andrew Fiore 17 January 2012 // Computer-Mediated Communication Introductions, terminology, & taxonomy.
Coye Cheshire & Andrew Fiore June 10, 2015 // Computer-Mediated Communication Trust and Trustworthiness.
Coye Cheshire & Andrew Fiore June 11, 2015 // Computer-Mediated Communication Introductions, terminology, & taxonomy.
Coye Cheshire & Andrew Fiore June 12, 2015 // Computer-Mediated Communication Social Presentation and Perception.
Coye Cheshire & Andrew Fiore June 13, 2015 // Computer-Mediated Communication Trust and Trustworthiness Part II.
Info 203: Social and Organizational Issues of Information Course Introduction: Social Science Perspectives on Information and Information Technology.
Coye Cheshire & Andrew Fiore June 19, 2015 // Computer-Mediated Communication Iterated Prisoner’s Dilemma.
Computer-Mediated Communication — Cheshire & Fiore
Coye Cheshire & Andrew Fiore June 21, 2015 // Computer-Mediated Communication Media richness.
Coye Cheshire & Andrew Fiore June 21, 2015 // Computer-Mediated Communication Reputation (Part I)
Coye Cheshire & Andrew Fiore June 21, 2015 // Computer-Mediated Communication Introductions, terminology, & taxonomy.
Coye Cheshire & Andrew Fiore June 22, 2015 // Computer-Mediated Communication Intimate relationships.
Coye Cheshire & Andrew Fiore June 23, 2015 // Computer-Mediated Communication CMC in Society.
Coye Cheshire & Andrew Fiore June 24, 2015 // Computer-Mediated Communication Collective Action and Public Goods II.
Coye Cheshire & Andrew Fiore June 24, 2015 // Computer-Mediated Communication Online Communities.
Coye Cheshire & Andrew Fiore June 26, 2015 // Computer-Mediated Communication Online Communities II.
Coye Cheshire & Andrew Fiore June 26, 2015 // Computer-Mediated Communication CMC & Society.
Coye Cheshire & Andrew Fiore June 28, 2015 // Computer-Mediated Communication Game Theory, Games, and CMC.
Coye Cheshire & Andrew Fiore June 28, 2015 // Computer-Mediated Communication Defining and Justifying Problems.
Coye Cheshire & Andrew Fiore June 28, 2015 // Computer-Mediated Communication Games!
Coye Cheshire & Andrew Fiore June 28, 2015 // Computer-Mediated Communication Social Presentation.
Coye Cheshire & Andrew Fiore June 30, 2015 // Computer-Mediated Communication Qualitative analysis of CMC.
Coye Cheshire & Andrew Fiore June 30, 2015 // Computer-Mediated Communication Online Communities.
Coye Cheshire & Andrew Fiore June 30, 2015 // Computer-Mediated Communication Media Richness.
Ch. 3.1 – Measurements and Their Uncertainty
Coye Cheshire & Andrew Fiore July 16, 2015 // Computer-Mediated Communication Information Pools.
Coye Cheshire & Andrew Fiore July 16, 2015 // Computer-Mediated Communication Intimate relationships.
Chasmine King Vocabulary. aggregator a web-based or installed application that aggregates related, frequently updated content from various Internet sources.
Agenda, Day 2  Questions about syllabus? About myths?  Prisoner’s dilemma  Prisoner’s dilemma vs negotiation  Play a single round  Play multiple rounds.
Using and Expressing Measurements
Accuracy, Precision, and Error
SIGNIFICANT FIGURES AND SCIENTIFIC NOTATION Using Scientific Measurements.
Reputational advantages and disadvantages of punishment toward norm-violators Yutaka Horita Toshio Yamagishi Hokkaido University 13th international conference.
Reputation and Trust. Uncertainty and Risk 3 What are the Solutions to Uncertainty in the Social Environment?  Proxy’s and ‘inferred trustworthiness’
© Copyright Pearson Prentice Hall Measurements and Their Uncertainty > Slide 1 of Using and Expressing Measurements A ___________________ is a quantity.
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
Online political consumption _________________ Conference on The politics of consumption/the consumption of politics Claes H. de Vreese The Amsterdam School.
DATA ABOUT YOU & ME Group 3 – Data About You Presentation - Casey.
All about me… anywhere in the world! Social Network Websites are places on the internet that allow us to : Click here to look at some examples Click on.
Coye Cheshire & Andrew Fiore November 15, 2015 // Computer-Mediated Communication Community, Science, and CMC.
Explicit versus Implicit Contracts for Dividing the Benefits of Cooperation Marco Casari and Timothy Cason Purdue University.
MA471 Fall 2003 Lecture 2. On With The Games Today we are going to watch each group play a couple of rounds of cards. We will go through the game slowly.
Scientific Measurement Measurements and their Uncertainty Dr. Yager Chapter 3.1.
Multiply Positive and Negative Numbers August 26, 2015.
Slide 1 of 48 Measurements and Their Uncertainty
EXPERIMENTS Lecture 5. Administrative STATA Course Mailing List Info:   No subject  In body.
Comparing and Ordering Whole Numbers Objective  By the end of this lesson, you will be able to compare whole numbers and order whole numbers through.
HAVENECESSARY A mobile phone A CD player A computer A laptop computer A DVD player An MP3 player A digital camera An electronic dictionary A video camera.
Picking Apples. Subtraction game. Turn over two cards from 0-10 Work out the difference. If you have an apple with this amount put a counter on it. First.
Auctions Great Lakes Institute of Management, Chennai March 4, 2012.
Coye Cheshire March 2, 2016 // Computer-Mediated Communication Information Pools and Incentives for Collective Action.
Measurements and their Uncertainty
Coye Cheshire & Jen King January 2016 // Computer-Mediated Communication Introductions, terminology, & taxonomy.
June 10, 2016 // Computer-Mediated Communication Trust, Trustworthiness and Reputation In Computer-Mediated Communication.
OVERCOMING COORDINATION FAILURE THROUGH NEIGHBORHOOD CHOICE ~AN EXPERIMENTAL STUDY~ Maastricht University Arno Riedl Ingrid M.T. Rohde Martin Strobel.
Coye Cheshire July 20, 2016 // Computer-Mediated Communication Reputation (Part II)
Name: Date: Author: Version:
8-1 – 8-4 Polynomial Word Problems
Computer-Mediated Communication
Computer-Mediated Communication
Computer-Mediated Communication
Computer-Mediated Communication
Computer-Mediated Communication
Computer-Mediated Communication
Presentation transcript:

Coye Cheshire & Andrew Fiore March 6, 2016 // Computer-Mediated Communication Trust and Trustworthiness Part II

Projects and Assignment #1  Assignment 1 is a short 2-3 page description of your group project idea and the division of labor within the group.  Due Tuesday October 7 th at beginning of class (one assignment per group, 2 printed copies)  Groups should sign up for a meeting time with us (directions on the assignment page)  courses.ischool.berkeley.edu/i216/f08/assignment1.php courses.ischool.berkeley.edu/i216/f08/assignment1.php 3/6/2016Computer-Mediated Communication — Cheshire & Fiore1

3/6/2016Computer-Mediated Communication — Cheshire & Fiore2 Sources of Uncertainty in Exchange/Interaction Quality of ‘goods’ or ‘services’ Structural uncertainty of an exchange Uncertainty about finding an exchange partner ?

Privacy and Trust (Paine and Schoefield 2008) Dimensions of Privacy  Informational  Accessibility  Expressive “Actual” vs “Perceived” Privacy 3/6/2016Computer-Mediated Communication — Cheshire & Fiore3

Capturing Online Trust? 3/6/2016Computer-Mediated Communication — Cheshire & Fiore4

3/6/2016Computer-Mediated Communication — Cheshire & Fiore5 Trust Networks Under Uncertainty “Trust Networks”  System view  Ego-centric view

3/6/2016Computer-Mediated Communication — Cheshire & Fiore6 What are the Solutions to Uncertainty in CMC Environments? Proxies and ‘inferred trustworthiness’ Institutional backing Closed Systems versus Open Systems  Experiential, often negative- only reputations (not explicit) 3 rd party (explicit) reputation

3/6/2016Computer-Mediated Communication — Cheshire & Fiore7 Using ‘Games’ to Understand Trust- Building

3/6/2016Computer-Mediated Communication — Cheshire & Fiore8 Rules for the CMC trust game…  Two players  Each player gets 10 items (X’s) from the experimenter on each round.  Players simultaneously decide whether to ‘entrust’ 0 to 10 of their items to the other player.  Players decide whether to return the items to the partner or not.  If player returns the items, the experimenter DOUBLES the amount returned to the partner.  The player can just keep the entrusted items; then nothing is returned to the partner.

For Example… 3/6/2016Computer-Mediated Communication — Cheshire & Fiore9 Player A entrusts 1 X’s Player B entrusts 3 X’s Player APlayer B Player A returns the 3 X; Player B gets 6X! Player B returns the 1 X; Player A gets 2X! At the end of the round, you keep whatever you did not entrust, plus whatever you earned or kept from your partner!!

3/6/2016Computer-Mediated Communication — Cheshire & Fiore10 Debriefing… What were the risks? What were the sources of uncertainty? What are the opportunity cost(s) in this game? Does the game play any differently when there are repeated interactions with the same partner, compared to when there are new, random partners?

3/6/2016Computer-Mediated Communication — Cheshire & Fiore11 Trust-Building Processes in US and Japan

3/6/2016Computer-Mediated Communication — Cheshire & Fiore12 Trust-Building Processes in US and Japan

3/6/2016Computer-Mediated Communication — Cheshire & Fiore13 Freq. Random PartnerFixed Partner One-shot interaction  solicitations  attachments from unknown sources Iterated interaction  Peer-to-peer digital goods exchange  Online “pick-up” games (e.g., cards)  Online communities  Online auctions  Chat programs  Massively multiplayer games Continuity Internet situations by frequency & continuity

3/6/2016Computer-Mediated Communication — Cheshire & Fiore14 Freq. Random PartnerFixed Partner One-shot interaction ? Iterated interaction ?? Continuity CMC and Trust-Building

Meta Reviewers for this Week:  Gopal Vaswani  (gvaswani [at] ischool.berkeley.edu)  Carol Chen  (carolc [at] ischool.berkeley.edu)  Heather Dolan  (HDOLAN [at] GMAIL.COM)  Emrehan Kirimli  (emrehan [at] berkeley.edu) 3/6/2016Computer-Mediated Communication — Cheshire & Fiore15

The CMC Trust Paradox: Certainty Defeats Trust? 3/6/2016Computer-Mediated Communication — Cheshire & Fiore16