skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Organizational Trust in the Age of the Fourth Industrial Revolution: Shifts in the Form, Production, and Targets of Trust
In this essay, we argue that the advent of the Fourth Industrial Revolution calls for a reexamination of trust patterns within and across organizations. We identify fundamental changes in terms of (1) what form organizational trust takes, (2) how it is produced, and (3) who needs to be trusted. First, and most broadly, trust is likely to become more impersonal and systemic. Trust between actors is increasingly substituted by trust in a system based on digital technology. Second, in terms of trust production modes, characteristic- and institution-based trust production will gain in importance. Third, despite the move toward system trust, there will nonetheless be a need to trust certain individuals; however, these trustees are no longer the counterparts to the interaction but rather third parties in charge of the technological systems and data. Thus, the focal targets of interpersonal trust are changing.  more » « less
Award ID(s):
1943688
PAR ID:
10371834
Author(s) / Creator(s):
 ;  ;  
Publisher / Repository:
SAGE Publications
Date Published:
Journal Name:
Journal of Management Inquiry
Volume:
32
Issue:
1
ISSN:
1056-4926
Page Range / eLocation ID:
p. 21-34
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Are competent actors still trusted when they promote themselves? The answer to this question could have far-reaching implications for understanding trust production in a variety of economic exchange settings in which ability and impression management play vital roles, from succeeding in one’s job to excelling in the sales of goods and services. Much social science research assumes an unconditional positive impact of an actor’s ability on the trust placed in that actor: in other words, competence breeds trust. In this report, however, we challenge this assumption. Across a series of experiments, we manipulated both the ability and the self-promotion of a trustee and measured the level of trust received. Employing both online laboratory studies ( n = 5,606) and a field experiment ( n = 101,520), we find that impression management tactics (i.e., self-promotion and intimidation) can substantially backfire, at least for those with high ability. An explanation for this effect is encapsuled in attribution theory, which argues that capable actors are held to higher standards in terms of how kind and honest they are expected to be. Consistent with our social attribution account, mediation analyses show that competence combined with self-promotion decreases the trustee’s perceived benevolence and integrity and, in turn, the level of trust placed in that actor. 
    more » « less
  2. Our review of common, popular risk analysis frameworks finds that they are very homogenous in their approach. These are considered IT Security Industry ”best practices.” However, one wonders if they are indeed ”best”, as evinced by the almost daily news of large companies suffering major compromises. Embedded in these ”best practices” is the notion that ”trust” is ”good”, i.e. is a desirable feature: ”trusted computing,” ”trusted third party,” etc. We argue for the opposite: that vulnerabilities stem from trust relationships. We propose a a paradigm for risk analysis centered around identifying and minimizing trust relationships. We argue that by bringing trust relationships to the foreground, we can identify paths to compromise that would otherwise go undetected; a more comprehensive assessment of vulnerability, from which one can better prioritize and reduce risk. 
    more » « less
  3. Abstract Artificial intelligence (AI) represents technologies with human‐like cognitive abilities to learn, perform, and make decisions. AI in precision agriculture (PA) enables farmers and farm managers to deploy highly targeted and precise farming practices based on site‐specific agroclimatic field measurements. The foundational and applied development of AI has matured considerably over the last 30 years. The time is now right to engage seriously with the ethics and responsible practice of AI for the well‐being of farmers and farm managers. In this paper, we identify and discuss both challenges and opportunities for improving farmers’ trust in those providing AI solutions for PA. We highlight that farmers’ trust can be moderated by how the benefits and risks of AI are perceived, shared, and distributed. We propose four recommendations for improving farmers’ trust. First, AI developers should improve model transparency and explainability. Second, clear responsibility and accountability should be assigned to AI decisions. Third, concerns about the fairness of AI need to be overcome to improve human‐machine partnerships in agriculture. Finally, regulation and voluntary compliance of data ownership, privacy, and security are needed, if AI systems are to become accepted and used by farmers. 
    more » « less
  4. Blockchain technology is the cornerstone of digital trust and systems’ decentralization. The necessity of eliminating trust in computing systems has triggered researchers to investigate the applicability of Blockchain to decentralize the conventional security models. Specifically, researchers continuously aim at minimizing trust in the well-known Public Key Infrastructure (PKI) model which currently requires a trusted Certificate Authority (CA) to sign digital certificates. Recently, the Automated Certificate Management Environment (ACME) was standardized as a certificate issuance automation protocol. It minimizes the human interaction by enabling certificates to be automatically requested, verified, and installed on servers. ACME only solved the automation issue, but the trust concerns remain as a trusted CA is required. In this paper we propose decentralizing the ACME protocol by using the Blockchain technology to enhance the current trust issues of the existing PKI model and to eliminate the need for a trusted CA. The system was implemented and tested on Ethereum Blockchain, and the results showed that the system is feasible in terms of cost, speed, and applicability on a wide range of devices including Internet of Things (IoT) devices. 
    more » « less
  5. When people want to conduct a transaction, but doing so would be morally disreputable, they can obfuscate the fact that they are engaging in an exchange while still arranging for a set of transfers that are effectively equivalent to an exchange. Obfuscation through structures such as gift-giving and brokerage is pervasive across a wide range of disreputable exchanges, such as bribery and sex work. In this article, we develop a theoretical account that sheds light on when actors are more versus less likely to obfuscate. Specifically, we report a series of experiments addressing the effect of trust on the decision to engage in obfuscated disreputable exchange. We find that actors obfuscate more often with exchange partners high in loyalty-based trustworthiness, with expected reciprocity and moral discomfort mediating this effect. However, the effect is highly contingent on the type of trust; trust facilitates obfuscation when it is loyalty-based, but this effect flips when trust is ethics-based. Our findings not only offer insights into the important role of relational context in shaping moral understandings and choices about disreputable exchange, but they also contribute to scholarship on trust by demonstrating that distinct forms of trust can have diametrically opposed effects. 
    more » « less