To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
When the first e-commerce services emerged in the late 1990s, consumer trust in online transactions was identified as a potential major hurdle. Researchers of human-computer interaction (HCI) started to investigate how interface and interaction medium design might make these services appear more trustworthy to users. Jens Riegelsberger (then a doctoral student) and the first author were part of that first cohort (Riegelsberger and Sasse 2001). We soon realized that much of the HCI research was very much focused on increasing user trust in Web sites through design elements, but did not consider (1) existing substantive knowledge from other disciplines on the role and mechanics of trust, and (2) existing methodological knowledge on how to conduct valid studies on trust formation and its impact on behavior. To address this, we reviewed and integrated existing knowledge to prepare a foundation for HCI research, which was published in two research papers: to address point 2, a prescription for valid HCI methods for studying trust, The Researcher's Dilemma (Riegelsberger et al. 2003a); and to address point 1, a framework for HCI research and The Mechanics of Trust (Riegelsberger et al. 2005).
The key message from the latter paper was the need for HCI researchers to engage with technology developers to create trustworthy systems, rather than focus on influencing trust perceptions at the user interface level. In the worst case, the latter could lead to manipulating user trust perceptions to place trust in systems that are not trustworthy, which would be socially and ethically irresponsible. The way forward, we argued, was to design systems that encouraged trustworthy behavior from all participants, by creating the right economic incentives and creating reliable trust signaling. In the current chapter, the authors summarize this prescription and reiterate the argument for it, because it is still valid today. We then review progress over the past eight years to consider to what extent the prescription has been implemented. Although our conclusion may seem sobering, it really is not: the security signals offered by service providers are not accurate enough and require too much user effort.
Trust – and its lack – is a hot issue. This is especially true of public discussion of one of the defining features of contemporary life – namely, computers and the varied technologies that are built on them. We want trust but doubt whether it is well-grounded. Nor is it clear how it could be so grounded. Where is rational trust to be found? Call this the search for trust. Meanwhile, computers become a more pervasive part of our lives. Uncertainty and risk increase. The search is urgent.
There is an obvious way to resolve the search for trust. To build trust in a technological world, we need to know what trust is. Philosophers answer questions of the form “what is f?” They do so paradigmatically through conceptual analysis. Therefore, philosophers should analyze trust, thereby answering the question “what is trust?” Such an analysis will explain when trust is grounded and when it is not. It will then be possible to identify how trust can be grounded in the specific context of the new modes of living that computing technologies have created. The response concludes: let's get started.
Several of the prior chapters in this book allude to the work of Harold Garfinkel and his seminal Studies in Ethnomethodology (1967). One of the great lessons that one can take from that book is the idea that society is made up of people who “do” sociological theory or, rather, people who construct and deploy “lay-sociological theorizing” to both interpret and organize the world around them. Their everyday reasoning is a form of sociology Garfinkel would have us believe. Today, of course, the idea that people theorize in this sense, that they reason sociologically, has suffused itself throughout the discipline of sociology and its cognates. Take Michel De Certeau (1984), for example, or another sociologist of the quotidian, Henri Lefebrve (2004). Both argue that the social world is constructed, “enacted” through the deployment of interpretative skills and agency – through people's capacity to reason in particular ways. And consider other social sciences, such as anthropology. Here Tim Ingold (2011) argues that people construct their places of dwelling through conscious acts of “dialogic engagement”: they attend to, work with, and reflect on the things and persons around in ways that directs them in new trajectories, lines of action. All of this is a form of reasoning, Ingold claims.
The subtle differences between these various views notwithstanding, that people reason in a way that can be characterized as sociological, and that, as a result, the thing called society has the shape it has, is virtually commonplace in contemporary thinking. The word “theorizing,” however, has been ameliorated with alternate formulas by these (and other) authors. We have just listed some of the alternative words and phrases used: people enact their reasoning and they rationally engage their reasoning as part of how they produce dwellings. These and other formula stand as proxy for theorizing. One of the motivations for using alternatives is that many commentators, including those just mentioned, would appear to prefer keeping the term “theory” as a label for their own thinking rather than as one applicable to the non-professional arena. To put it directly, this move allows them to valorize what they do while giving lay persons’ actions a more prosaic, less consequential air.
One view of cyberspace is that it is made up of technology: personal computers, the routers that support the Internet, huge data centers, and the like. Another view is that cyberspace is made up of people: people who interact over the Internet; people who run the Internet and the data centers; people who regulate, invest, set standards, and do all the other actions that make up the experience of cyberspace. The latter view is probably the more relevant; technology is only the foundation.
If cyberspace were only technology, we might properly ignore issues of trust. We might ask whether we have confidence that the technology will function as intended, and our everyday experience tells us when that confidence might be misplaced. But to the extent that cyberspace is made up of people, we should ask whether issues of trust are important in the proper functioning of cyberspace. I argue that trust is central in many ways.
Trust, as I use the term, is a relationship between trustor and trustee in which the trustor is willing to assume that the trustee will act in the best interest of the trustor. This does not mean that the trustor can predict exactly what the behavior of the trustee will be, but that the trustee will use judgment and intelligence to restrict the range of actions undertaken. One who is not trustworthy may be malicious or simply inattentive, incompetent, or in an unsuited role: trust is usually accepted with respect to a particular role.
In reality, the Internet, as a networking person would define it, has not changed much since it was commercialized in the 1990s. The main Internet concept is still there, and so are its core technologies and applications; for example, the protocols that are responsible for transferring bits between two computers have been virtually unchanged since the inception of the Internet. However, many things have evolved and have tremendously impacted the way we communicate, perform computation, and conduct business online.
This chapter highlights recent trends and technology evolutions that appear to be shaping perhaps not the Internet itself (as seen in the strict definition of a networking person), but everything around traditional approaches to computing and communication. In my opinion, there are three main such transforming trends: the Cloud and the promise it brings for computing; the new Web with its intertwined services and applications; and Big Data computing, which opens up new horizons and opportunities with fast processing of diverse, dynamic, and massive-scale datasets. Each of these trends is not disconnected from the others, but interlinked, which – as I discuss – is the case with every aspect of the Internet today. This maze of interconnected services, applications, users, and devices is one of the two main themes that are omnipresent in the Internet today. The other is an implicit notion of shared trust, a trust that appears to transfer – irrespective of user intentions – through the links of this maze, reforms our online experiences, and also bears tough challenges for user privacy.
In early 2011, Pepsi made headlines by announcing that after more than 20 years, they would forego advertising during the Super Bowl. Instead, PepsiCo decided to award more than $20 million in grants to fund community projects. Anyone could submit a grant application online, and award winners would be chosen by popular vote. News of Pepsi’s contest spread across social media, and with each mention, the Pepsi name was further associated with a philanthropic brand image. Contestants extended the brand promotion as they campaigned for their own personal causes, driving more traffic to Pepsi’s website.
In a similar move, P&G, one of the world’s largest marketing organizations, announced in February 2012 that they would reduce their marketing budget by $10 billion over the next four years. Much of the savings would be achieved by shifting their efforts away from traditional offline marketing methods in favor of digital marketing tools such as online banner ads, viral marketing, and social media marketing.
As individuals, we make decisions about whether to post our opinions to social media and what opinions to post. When we make these decisions, we are subject to a host of social influences. While we may have intended to express our thoughts on the latest restaurant that we visited or a movie that we recently saw, posting comments online doesn’t occur in a vacuum. Based on what others have said previously, what we choose to say (that is, if we choose to say anything at all) may change once we sit down at the computer.
Earlier chapters discussed how our opinion formation and expression behaviors change as we are exposed to the opinions that others have already posted. In turn, the opinions we express today will affect how others behave in the future. Social media platforms can be seen as opinion ecosystems where our viewpoints interact and influence those of other contributors. Some opinions will be discouraged and driven out of the ecosystem through selection effects. Other opinions adapt to the environment as a result of a variety of adjustment effects. As a result, the collective opinion of the posting population evolves.
A search of employment opportunities in social media inevitably turns up something like the following:
Social Media Associate: Act as administrator of the company blog and social media feeds as well as representing the company on all social media platforms. Create compelling content to drive traffic. Primary role is to engage community members.
In other words, the employer wants a communications associate whose main job is to tweet and blog.
Like many organizations, the employer represented here views social media as just another platform for advertising and communications. The person in charge of the social media efforts may be informed about the organization’s overall strategy, but his or her role is to simply use social media to communicate this strategy to the target consumer or constituency. This perspective on how social media fits into the organization can be very limiting and potentially problematic. Let’s break down the pitfalls associated with this line of reasoning.
It used to be that when a new movie was released, moviegoers would look to the opinions of professional movie critics before deciding whether to see it. Under this paradigm, professional critics wielded an enormous amount of power and influence to either make or break a new movie. In today’s environment, however, social media host reviews from anyone who wants to share an opinion. And now, before we head out to the theaters, we look online for not only the reviews provided by professional movie critics but also the reviews posted by friends, and sometimes even strangers, who have already seen the movie.
Arguably, social media have the potential to give a voice to everyone, making us less reliant on the opinions of a few experts. As consumers, that means that we have available to us a wider variety of opinions. Thus, we can follow the opinions of trusted sources who share our views rather than individuals whom others have deemed to be experts. This means that through social media, an organization or business has access to the wide variety of opinions held by its various customers and stakeholders. Their opinions, rather than those of a few top executives, can now drive many of the organization’s strategic decisions. Is this a good thing? Should a company trust HiPPO (the Highest Paid Person’s Opinion) or should it follow the opinions of masses on social media?
It has become a staple in American politics that in just about every speech or debate, presidential candidates manage to work in a story about the struggles of Mr. and Mrs. John Smith from a swing state. Candidates talk to thousands of voters on the campaign trail. But these are the stories that they remember and choose to retell because, to them, they represent the stories of the larger population.
It is easy to understand why politicians latch on to these anecdotes. On a daily basis, teams of advisors and crowds of voters share their stories and offer their opinions on everything from taxes to foreign policies to healthcare reform. Even what they wear comes under scrutiny and often garners volumes of unsolicited feedback. How do politicians and other decision makers parse through all of these suggestions to identify the handful of opinions that are truly important and relevant to the larger population? Put bluntly, how do we know that the average American cares about Mr. and Mrs. John Smith’s stories?
Occasionally, we find ourselves in situations where we express an opinion that doesn’t perfectly represent the opinion that we actually hold. You don’t really like the sweater your aunt gave you last Christmas, but you tell her how much you love it and wear it anyway. Your boss’s jokes just aren’t that funny, but you at least let out a little chuckle. These are just some of the situations we find ourselves in when social norms contribute to our putting forth a viewpoint that isn’t entirely consistent with what we actually think.
In some cases, we’re just being polite when we pay someone a compliment, or we are simply choosing the path of least resistance. Even when we do hold strong opinions about a particular topic, we may temper what we say based on how we think someone else might react. We adjust our opinions to better conform to the social contexts in which we find ourselves.
In the previous chapter we discussed how environmental cues can affect whether or not we express any opinion at all. In this chapter, we discuss how our environment affects what opinion we express; in particular, we focus on the effects that others in our environment have on our opinion expression behavior.
In his book Crossing the Chasm, Geoffrey Moore argues that for a product to succeed in the mass market, it must cross the chasm that separates the innovative consumers from the rest of the market, the previously discussed imitators. But simply getting the approval of the innovators is not enough to penetrate the mass market. Instead, a few influential individuals among the innovator population can play a critical role in bridging the gap between the innovator population and the mass market.
Is this the only path toward success for a new product? In a study of how information is transmitted across a social network, Watts and Dodd demonstrate that it is not always the influential power of a few that leads to the diffusion of information. An alternative path for diffusion of information exists if there is “a critical mass of easily influenced individuals” who can fuel the viral takeoff of an product, idea, or opinion.
In the world of Facebook, Twitter, and Yelp, water-cooler conversations with co-workers and backyard small talk with neighbors have moved from the physical world to the digital arena. Previous exchanges with familiar and trusted individuals have been replaced by large-scale chatter accessible to acquaintances and strangers. Discussions that once went unrecorded now leave traces that can be explored years later. The way in which we share information and opinions has changed irrevocably.
In this new landscape, organizations ranging from Fortune 500 companies to government agencies to political campaigns continuously monitor online opinions in an effort to guide their actions. Are consumers satisfied with our product? How are our policies being perceived? Do voters agree with our platform? Brand managers, marketers, and campaign managers can potentially find answers to these questions by monitoring the opinions shared through social media.
But measuring online opinion is more complex than just reading a few posted reviews. In this book, we move beyond the current practice of social media monitoring and introduce the concept of social media intelligence. While social media monitoring is an essential step in developing a social media intelligence platform, it is by nature descriptive and retrospective. That is, social media monitoring describes what has already happened. It does not prescribe or guide an organization’s next steps.
The current state of social media intelligence is one where organizations are investing in social media monitoring but drowning in social media data and metrics. In an effort to make sense of the seemingly infinite volume of data that social media produces on a daily basis, analysts are computing an equally overwhelming number of metrics. The problem is that organizations are measuring what is easy to measure with the data. Twitter data are easy to collect and volume metrics are easy to compute, so metrics like the number of Twitter mentions or the number of Twitter followers are over-emphasized. Rather than going after the low hanging fruit, we need to shift our focus from measuring what’s easy to measure to measuring what matters. In other words, what are the metrics that will influence our strategic decision making? And our ability to define these metrics will depend on a firm understanding of opinion science.
Organizations have also struggled with integrating the intelligence gathered from social media data with other sources of data that marketing researchers have relied on for decades. Many organizations are faced with multiple research reports produced from traditional focus groups, customers surveys, in-store sales data, and social media. In several cases, the social media reports don’t align with other studies, especially when the social media metrics are not adjusted to accommodate the various biases we know exist from the opinion science research. When faced with these conflicting reports, organizations tend to favor the tried and tested offline methods over the very new and untested social media metrics. But organizations shouldn’t give up on social media intelligence quite that quickly, especially while social media tools are in their infancy. An integrated research approach that includes both the traditional offline methods and social media intelligence can be very effective, timely, and cost-efficient. The key is to track the right social media metrics and integrate social media intelligence efforts with other marketing research programs. Integration would involve the alignment of social media metrics with the offline metrics in such a way that the multiple sources of marketing intelligence complement one another. Social media intelligence can be used as an early indicator of general problem areas and offline methods can used to investigate further as a follow-up study.
Let’s say you just had a great dining experience at a new restaurant that opened down the street. Or you just saw the worst movie of your life. Many people with these experiences turn to social media to talk about their experiences and share their opinions (we discuss why people do this in Chapters 2–4). Some may write a lengthy review on their blog. Others may write shorter reviews and post to a review site (like Yelp or Rotten Tomatoes). And still others may choose to engage in a lengthy back-and-forth discussion about the merits and pitfalls of the experience in an online discussion forum.
Expressing opinions in this way is not new behavior. In the past, we referred to this as word-of-mouth behavior. Neighbors talking to neighbors about their new cars. Co-workers having conversations around the water cooler about a new computer or the latest events unfolding in their favorite television programs. But there are two fundamental differences between offline word-of-mouth activity and online conversations occurring in social media.