Hostname: page-component-5d59c44645-zlj4b Total loading time: 0 Render date: 2024-02-23T11:52:23.168Z Has data issue: false hasContentIssue false

TRUSTWORTHINESS AND TRUTH: THE EPISTEMIC PITFALLS OF INTERNET ACCOUNTABILITY

Published online by Cambridge University Press:  29 October 2013

Abstract

Since anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech. This paper provides a veritistic argument that accountability mechanisms can cause significant epistemic problems for internet encyclopedias and social media communities. I show that accountability mechanisms can undermine both the dissemination of true beliefs and the detection of error. Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication.

Type
Articles
Copyright
Copyright © Cambridge University Press 2013 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

‘‘A Gay Girl in Damascus’ How the Hoax Unfolded.’ 2011. The Telegraph. Retrieved June 27, 2011, from http://www.telegraph.co.uk/news/worldnews/middleeast/syria/8572884/A-Gay-Girl-in-Damascus-how-the-hoax-unfolded.html.Google Scholar
Abbas, F. 2011. ‘Let Us Not Allow ‘A Gay Girl in Damascus’ to Discredit All Blogging.’ The Huffington Post. Retrieved June 27, 2011, from http://www.huffingtonpost.com/faisal-abbas/let-us-not-allow-a-gay-gi_b_880215.html.Google Scholar
Abbas, A. and Boundaoui, A. 2011. ‘A Gay (Straight) Girl (Man) in Damascus (Edinburgh): The Politics behind the Roleplay.’ KABOBfest. Retrieved March 4, 2012, from http://www.kabobfest.com/2011/06/a-gay-girl-in-damascus.html.Google Scholar
Adler, J. 1994. ‘Testimony, Trust, Knowing.’ Journal of Philosophy, 91: 264–75.Google Scholar
Anderson, E. 1995. ‘The Democratic University: The Role of Justice in the Production of Knowledge, Social Philosophy and Policy.’ Social Philosophy & Policy, 12: 186219.Google Scholar
Associated Press. 2011. ‘Woman's Decapitation Linked to Web Posts about Mexican Drug Cartel.’ The Guardian. Retrieved January 20, 2013, from http://www.guardian.co.uk/world/2011/sep/25/mexico-woman-decapitated-social-network.Google Scholar
Batson, C.D. 2002. ‘Addressing the Altruism Question Experimentally.’ In Post, S.G., Underwood, L.G., Schloss, J.P. and Hurlbut, W.B. (eds), Altruism and Altruistic Love: Science, Philosophy, and Religion in Dialogue, pp. 89105. New York, NY: Oxford University Press.Google Scholar
Bell, M. and Flock, E. 2011. ‘‘A Gay Girl in Damascus’ Comes Clean.’ Washington Post. Retrieved July 24, 2011, from http://www.washingtonpost.com/lifestyle/style/a-gay-girl-in-damascus-comes-clean/2011/06/12/AGkyH0RH_story_1.html.Google Scholar
Blais, M. 1987. ‘Epistemic Tit for Tat.’ Journal of Philosophy, 84: 363–75.Google Scholar
BlogHer n.d. ‘What are Your Community Guidelines?’ Retrieved December 20, 2012, from http://www.blogher.com/what-are-your-community-guidelines.Google Scholar
Borland, J. 2007. ‘See Who's Editing Wikipedia – Diebold, the CIA, a Campaign.’ Wired. Retrieved January 24, 2012, from http://www.wired.com/politics/onlinerights/news/2007/08/wiki_tracker?currentPage=all.Google Scholar
Brennan, G. and Pettit, P. 2008. ‘Esteem, Identifiability, and the Internet.’ In van den Hoven, J. and Weckert, J. (eds), Information Technology and Moral Philosophy, pp. 175–94. New York, NY: Cambridge University Press.Google Scholar
Burnham, T.C. 2003. ‘Engineering Altruism: A Theoretical and Experimental Investigation of Anonymity and Gift Giving.’ Journal of Economic Behavior & Organization, 50: 133–44.Google Scholar
Citizendium contributors. ‘Why Real Names?’ Citizendium. Retrieved December 20, 2012, from http://en.citizendium.org/wiki/CZ:FAQ#Why_real_names.3F.Google Scholar
Citron, D.K. 2010. ‘Civil Rights in Our Information Age.’ In Levmore, S. and Nussbaum, M.C. (eds), The Offensive Internet: Speech, Privacy, and Reputation, pp. 3149. Cambridge, MA: Harvard University Press.Google Scholar
Coady, D. 2011. ‘An Epistemic Defence of the Blogosphere.’ Journal of Applied Philosophy, 28: 277–94.Google Scholar
Coady, D. 2012. What to Believe Now: Applying Epistemology to Contemporary Issues. Malden, MA: Wiley-Blackwell.Google Scholar
Connolly, T., Jessup, L.M. and Valacich, J.S. 1990. ‘Effects of Anonymity and Evaluative Tone on Idea Generation in Computer-Mediated Groups.’ Management Science, 36: 689703.CrossRefGoogle Scholar
de Laat, P.B. 2008. ‘Online Diaries: Reflections on Trust, Privacy, and Exhibitionism.’ Ethics and Information Technology, 10: 5769.Google Scholar
de Laat, P.B. 2012 a. ‘Open Source Production of Encyclopedias: Editorial Policies at the Intersection of Organization and Epistemological Trust.’ Social Epistemology, 26: 71103.Google Scholar
de Laat, P.B. 2012 b. ‘Coercion or Empowerment? Moderation of Content in Wikipedia as ‘Essentially Contested’ Bureaucratic Rules.’ Ethics and Information Technology, 14: 123–35.CrossRefGoogle Scholar
Fathi, N. 2007. ‘Despite Denials, Gays Insist They Exist, if Quietly, in Iran.’ New York Times. Retrieved January 19, 2013, from http://www.nytimes.com/2007/09/30/world/middleeast/30gays.html.Google Scholar
Fricker, M. 2007. Epistemic Injustice: Power and Ethics in Knowing. Oxford: Oxford University Press.Google Scholar
Fricker, M. 2011. ‘Rational Authority and Social Power: Towards a Truly Social Epistemology.’ In Goldman, A.I. and Whitcomb, D. (eds), Social Epistemology: Essential Readings, pp. 5468. New York, NY: Oxford University Press.Google Scholar
Giles, J. 2005. ‘Internet Encyclopaedias Go Head to Head.’ Nature, 438 (7070): 900–1.Google Scholar
Gneezy, U. 2005. ‘The Role of Consequences.’ American Economic Review, 95: 384–94.Google Scholar
Goldman, A.I. 1992. Liaisons: Philosophy Meets the Cognitive and Social Sciences. Cambridge, MA: MIT Press.Google Scholar
Goldman, A.I. 1999. Knowledge in a Social World. New York, NY: Oxford University Press.Google Scholar
Goldman, A.I. 2002. Pathways to Knowledge. New York, NY: Oxford University Press.Google Scholar
Goldman, A.I. 2008. ‘The Social Epistemology of Blogging.’ In van den Hoven, J. and Weckert, J. (eds), Information Technology and Moral Philosophy. New York, NY: Cambridge University Press.Google Scholar
Goldman, A.I. 2011. ‘A Guide to Social Epistemology.’ In Goldman, A.I. and Whitcomb, D. (eds), Social Epistemology: Essential Readings, pp. 1137. New York, NY: Oxford University Press.Google Scholar
Griffith, V. 2008. ‘WikiScanner FAQ.’ Retrieved December 7, 2012, from http://virgil.gr/31.Google Scholar
Griffith, V. n.d. ‘WikiWatcher FAQ.’ Retrieved December 7, 2012, from http://www.virgil.gr/67.html.Google Scholar
Hamwi, S. and Nassar, D. 2011. “From Damascus with Love: Blogging in a Totalitarian State.’ Gay Middle East. Retrieved March 3, 2012, from http://gaymiddleeast.com/news/news%20317.htm.Google Scholar
HarassMap.org n.d. ‘HarassMap Executive Summary.’ Retrieved December 20, 2012, from http://harassmap.files.wordpress.com/2008/12/harassmap_executive_summary.pdf.Google Scholar
Hardin, R. 2002. Trust and Trustworthiness. New York, NY: Russell Sage Foundation.Google Scholar
Hassan, N. 2011. ‘Syrian Blogger Amina Abdallah Kidnapped by Armed Men.’ The Guardian. Retrieved April 3, 2012, from http://www.guardian.co.uk/world/2011/jun/07/syrian-blogger-amina-abdallah-kidnapped.Google Scholar
Henry, L. 2011 a. ‘Painful Doubts about Amina.’ Retrieved March 3, 2012, from http://bookmaniac.org/painful-doubts-about-amina/.Google Scholar
Henry, L. 2011 b. ‘Gay Girl in Damascus Blogging Hoax: Chasing Amina.’ Retrieved March 4, 2012, from http://www.blogher.com/gay-girl-damascus-blogging-hoax-chasing-amina.Google Scholar
Howard, P. and Hussein, M. 2011. ‘The Role of Digital Media.’ Journal of Democracy, 22: 3548.CrossRefGoogle Scholar
Intemann, K. 2010. ‘25 Years of Feminist Empiricism and Standpoint Theory: Where Are We Now?Hypatia, 25:778–96.Google Scholar
James, W. 2007/1897. The Will to Believe and Other Essays in Popular Philosophy. New York, NY: Cosimo.Google Scholar
Kaczynski, A. 2012. ‘Councilman Pushes for Charges against Twitter User Who Spread Falsehoods.’ Buzzfeed.com. Retrieved January 28, 2012, from http://www.buzzfeed.com/andrewkaczynski/councilman-pushes-for-charges-against-twitter-user.Google Scholar
Keen, A. 2012. ‘Twitterers: Take Responsibility for Your Reckless Claims.’ CNN.com. Retrieved February 1, 2013, from http://www.cnn.com/2012/11/27/opinion/twitter-war-keen/index.html.Google Scholar
Kelly, D. and Roeddert, E. 2008. ‘Racial Cognition and the Ethics of Implicit Bias.’ Philosophy Compass, 3: 522–40.Google Scholar
Klein, E., Clark, C., and Herskovitz, P. 2003. ‘Philosophical Dimensions of Anonymity in Group Support Systems: Ethical Implications of Social Psychological Consequences.’ Computers in Human Behavior, 19: 355–82.Google Scholar
Levmore, S. 2010. ‘The Internet's Anonymity Problem.’ In Levmore, S. and Nussbaum, M.C. (eds), The Offensive Internet: Speech, Privacy, and Reputation, pp. 5067. Cambridge, MA: Harvard University Press.Google Scholar
Longino, H. 1990. Science as Social Knowledge. Princeton, NJ: Princeton University Press.Google Scholar
Longino, H. 2002. The Fate of Knowledge. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Magnus, P.D. 2009. ‘On Trusting Wikipedia.’ Episteme, 6: 7490.Google Scholar
Matthews, P. and Simon, J. 2012. ‘Evaluating and Enriching Online Knowledge Exchange: A Socio-epistemological Perspective.’ In Lazakidou, A. (ed), Virtual Communities, Social Networks and Collaboration, pp. 3559. New York, NY: Springer.Google Scholar
Mazar, N. and Ariely, D. 2006. ‘Dishonesty in Everyday Life and Its Policy Implications.’ Journal of Public Policy & Marketing, 25: 117–26.Google Scholar
Mazar, N., Amir, O. and Ariely, D. 2008. ‘The Dishonesty of Honest People: A Theory of Self-Concept Maintenance.’ Journal of Marketing Research, 45: 633–44.Google Scholar
Munn, N.J. 2012. ‘The New Political Blogosphere.’ Social Epistemology, 26: 5570.Google Scholar
Mustafaraj, E., Metaxas, P., Finn, S. and Monroy-Hernández, A. 2012. ‘Hiding in Plain Sight: A Tale of Trust and Mistrust inside a Community of Citizen Reporters.’ Sixth International AAAI Conference on Weblogs and Social Media, 250–7.Google Scholar
Nagin, D.S. and Pogarsky, G. 2003. ‘An Experimental Investigation of Deterrence: Cheating, Self-Serving Bias, and Impulsivity.’ Criminology, 41: 501–27.Google Scholar
Nassar, D. 2011. ‘Foreign Policy: Damascus Still Has Gay Girls.’ NPR.org. Retrieved March 30, 2012, from http://www.npr.org/2011/06/16/137217280/foreign-policy-damascus-still-has-gay-girls.Google Scholar
O’Neill, O. 2002. A Question of Trust. New York, NY: Cambridge University Press.Google Scholar
Ostrom, E. 2005. ‘Policies that Crowd out Reciprocity and Collective Action.’ In Gintis, H., Bowles, S., Boyd, R. and Fehr, E. (eds), Moral Sentiments and Material Interests, pp. 253–75. Cambridge, MA: MIT Press.Google Scholar
Project Implicit. n.d. Project Implicit Information Website. Retrieved January 23, 2012, from http://www.projectimplicit.net/index.php.Google Scholar
Rescher, N. 1989. Cognitive Economy: An Inquiry into the Economic Dimension of the Theory of Knowledge. Pittsburgh, PA: University of Pittsburgh Press.Google Scholar
Sanger, L.M. 2009. ‘The Fate of Expertise after Wikipedia.’ Episteme, 6: 5273.Google Scholar
Sarkeesian, A. 2012. ‘TED: The Mirror.’ Retrieved March 23, 2013, from http://tedxwomen.org/speakers/anita-sarkeesian-2/.Google Scholar
Simon, J. 2010. ‘The Entanglement of Trust and Knowledge on the Web.’ Ethics and Information Technology, 12: 343–55.Google Scholar
Sober, E. and Wilson, D.S. 1998. Unto Others: The Evolution and Psychology of Unselfish Behavior. Cambridge, MA: Harvard University Press.Google Scholar
Tollefsen, D.P. 2009. ‘Wikipedia and the Epistemology of Testimony.’ Episteme, 6: 824.Google Scholar
Twitter. ‘FAQs about Verified Accounts.’ Retrieved November 19, 2012, from https://support.twitter.com/articles/119135-faqs-about-verified-accounts#.Google Scholar
Viégas, F.B., Wattenberg, M. and Dave, K. 2004. ‘Studying cooperation and conflict between authors with history flow visualizations.’ Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 6: 575–82.Google Scholar
Wallace, K.A. 1999. ‘Anonymity.’ Ethics and Information Technology, 1: 2131.CrossRefGoogle Scholar
Whittle, S. 1998. ‘The Trans-Cyberian Mail Way.’ Social & Legal Studies, 7: 389408.Google Scholar
Wikipedia contributors. ‘Category: Wikipedia Behavioral Guidelines.’ Wikipedia, The Free Encyclopedia. Retrieved December 20, 2012, from http://en.wikipedia.org/wiki/Category:Wikipedia_behavioral_guidelines.Google Scholar
Wikipedia contributors. ‘Wikipedia: Counter-Vandalism Unit/Vandalism studies/Study1.’ Wikipedia, The Free Encyclopedia. Retrieved December 10, 2012, from http://en.wikipedia.org/wiki/Wikipedia:Counter-Vandalism_Unit/Vandalism_studies/Study1.Google Scholar
Wikipedia contributors. ‘Wikipedia: Protection Policy.’ Wikipedia, The Free Encyclopedia. Retrieved February 10, 2012, from http://en.wikipedia.org/wiki/Wikipedia:Protection_policy.Google Scholar
Wray, K.B. 2009. ‘The Epistemic Cultures of Science and Wikipedia: A Comparison.’ Episteme, 6: 3851.Google Scholar
York, J. 2011. ‘Journalistic Verification, Amina Arraf, and Haystack.’ Retrieved January 19, 2013, from http://jilliancyork.com/2011/06/10/journalistic-verification-amina-arraf-and-haystack/.Google Scholar