Skip to main content

Currently Skimming:

4 Trust
Pages 23-34

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 23...
... have taught her that useful and actionable information from intelligence analysis requires both collaboration among analysts and access to reliable data and sources. Therefore, she said, building trust in every aspect of the intelligence analysis process is critical to generating the kind of information policy makers need in order to make decisions of national security significance.
From page 24...
... Yet Dunning reported that this game has been played nearly 4,000 times in various settings, and each time, some percentage of Players 1 and 2 do give up the money. He added that when players in some studies based on this experiment were asked what percentage of people they believed would return $10 to Player 1, the average answer was approximately 45 percent, whereas the experimental data showed this percentage to be 80 percent.1 More interesting, he said, a full majority of Player 1s gave their $5 to Player 2s even though on average they felt more likely not to get any money back.
From page 25...
... People in some countries, including Thailand, Morocco, and China, he elaborated, have a small radius of others whom they consider trustworthy, primarily family and neighbors, while those in other countries, including Switzerland, Italy, Australia, and Sweden, have a much larger trust radius, encompassing people outside their country, those of other religions, and complete strangers.3 Dunning noted that social and behavioral scientists are only beginning to understand the dynamics at play in these differences. Dunning then highlighted four research directions that could be followed to further understanding of the dynamics of trust: 1.
From page 26...
... , is a behavioral intention, not an action. • Risk taking in relationships: Mayer noted that this construct is defined as the risk-taking action, or actual trusting behavior, that occurs as a result of behavioral intention.
From page 27...
... In explaining this model, Mayer made two additional points. First, constraining risk is different from increasing trust; and second, the entire trust process occurs within a context, which may also play a role in the development of trust.
From page 28...
... • Interplay of religion, culture, and trust: Mayer stated that how trust in different religions plays out across cultures is a daunting, worldwide issue that needs to be addressed by research. In closing, Mayer emphasized that it will be essential for future research on trust to be interdisciplinary and that the structures of universities allow for such collaboration between disciplines.
From page 29...
... But, he continued, the more interesting finding was that other people in the study did not trust those who were willing to commit this act. Although this was a study of human beings, he asserted, it also provides insight into why people do not trust technology: "Because technology really does a cost-benefit calculation, it compares one life versus five lives, it says five is greater than one, and it pushes." Waytz believes that one reason people do not trust machines is that technology is too cost-benefit oriented, and incapable of implementing such moral rules as "do no harm." Another reason humans distrust technology, according to Waytz, is simply because they do not understand it.
From page 30...
... Finally, Waytz noted that the work by his own group suggests that designing machines with such emotional features as a name, an emotional voice, a gender, or human-like facial features could increase people's willingness to trust machines to perform emotional tasks. Waytz also identified three ways to consider optimal human–machine partnerships: (1)
From page 31...
... To illustrate the potential for humans' identification of outliers to improve computations, Waytz described research from the Massachusetts Institute of Technology on a platform used to detect cyberattacks.12 With this platform, he said, the human analysts provided feedback to the computer regarding false positives, helping the machine learn and thereby decreasing the rate of false positives in the next round. To explain machines' reduction of emotional labor, Waytz provided the example of customer service representatives, who bear a high emotional burden from constantly dealing with frustrated customers.
From page 32...
... To trust the scientific findings derived with computational methods, she said, people need to understand the methods, including their computational implementation. She suggested that heavily computational techniques may call for new branches of the scientific method,14,15 and she stated that computational reproducibility and the resulting trust in computational data will not be firmly established "until we have standards for dissemination, transparency, and verifiability for the computational results, as we do for deductive and empirical research [the first two branches of the scientific method]
From page 33...
... She suggested further that if citations of original data sources became standard practice, researchers' data collection efforts could be rewarded, and a culture could develop "where there are greater incentives for sharing artifacts that are associated with trust and verifiability." Additionally, she argued that digital scholarly artifacts should be adequately documented, although she acknowledged that this poses a challenge, particularly in terms of establishing and disseminating clear documentation rules. Finally, she suggested that journals should conduct reproducibility checks as part of the publication process, stating that since journals are the "gateway to a scholarly record," they can play an important role in verifying digital artifacts.16 Stodden closed by emphasizing that implementation of these ideas for enhancing reproducibility represents a difficult and ongoing task, and she argued that funding agencies should support research in these areas to facilitate implementation.
From page 34...
... could be integrated, prioritized, and sequenced to improve trust in the IC and the quality of intelligence support. The panelists voiced a number of ideas in response, including the importance of first relying on the default propensity to trust, leaving room for gut reactions and judgment calls, and educating people on the benefits of trusting others.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.