Living in an Impossible World: Real-izing the Consequences of Intransitive Trust [Book Review]

Philosophy and Technology 26 (4):411-429 (2013)
  Copy   BIBTEX

Abstract

Many accounts of online trust are based upon mechanisms for building reputation. Trust is portrayed as desirable, and handing off trust is easier if trust is modelled to be transitive. But in the analysis of cyber-security protocols, trust is usually used as a substitute for certain knowledge: it follows that if there is no residual risk, then there is no need for trust. On this grimmer understanding, the less that users are required to trust, the better. Involuntary transitivity of trust becomes corrosive, because it prevents participants from having control—or even knowledge—of the risks to which their trust assumptions expose them. In this paper, we take the stance that controlling the transitivity of trust requires us to recognise trust as a non-referentially transparent modality, similar to but significantly weaker than the epistemic modalities, and to accept the corollary that imaginary (indeed—even impossible) threats can have real consequences that adversely affect online security. An apparently paradoxical outcome is that the desire of principals to keep their trust assumptions private can actually assist the design of systems to satisfy multiple security agendas. However, this approach requires agents to have the capability to predicate accurately about states of affairs that are logically inconsistent with their beliefs, and consequently, designing systems in this way becomes more akin to diplomacy than engineering

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 93,891

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Web 2.0 Social Networks: The Role of Trust.Sonja Grabner-Kräuter - 2009 - Journal of Business Ethics 90 (S4):505 - 522.
Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
The entanglement of trust and knowledge on the web.Judith Simon - 2010 - Ethics and Information Technology 12 (4):343-355.
Trust and Strategic Rationality.Bernd Lahno - 1995 - Rationality and Society 7 (4):442-464.
The Case of Online Trust.Matteo Turilli, Mariarosaria Taddeo & Antonino Vaccaro - 2010 - Knowledge, Technology & Policy 23 (3-4):333-345.
e-Trust and reputation.Thomas W. Simpson - 2011 - Ethics and Information Technology 13 (1):29-38.

Analytics

Added to PP
2013-08-21

Downloads
32 (#487,392)

6 months
6 (#701,126)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

How to do things with words.John Langshaw Austin - 1962 - Oxford [Eng.]: Clarendon Press. Edited by Marina Sbisá & J. O. Urmson.
Trust and antitrust.Annette Baier - 1986 - Ethics 96 (2):231-260.
The role of trust in knowledge.John Hardwig - 1991 - Journal of Philosophy 88 (12):693-708.

View all 14 references / Add more references