Skip to main content
Log in

Virtues for agents in directed social networks

  • Original Research
  • Published:
Synthese Aims and scope Submit manuscript

Abstract

In the age of the Internet, people have increased access to information along multiple dimensions. It might seem that we are on our way to an epistemic utopia in which we spend less time and effort on basic cognitive tasks while devoting more time and effort to complex deliberation. However, though there are many accurate sources on the Internet, they must be sifted from the spammers, concern trolls, practical jokers, conspiracy theorists, counterintelligence sock-puppets, and outright liars who also proliferate online. We can approach this problem via the individual or via the network, asking two questions. First, holding the topology of the network constant, which moral and epistemic dispositions (e.g., trust, distrust, skepticism, curiosity) are conducive to successful inquiry by nodes at different positions within it? Second, holding the distribution of people’s epistemic dispositions constant, which network topologies are more likely to produce epistemic goods and avoid epistemic ills? To answer these questions, we need to combine virtue-theoretic reflection on individual dispositions with a nuanced understanding of the dynamics of networks. In this paper, I highlight and explore some important properties of such networks and connect those properties with dispositions that make someone an excellent member of an epistemic network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. See Alfano and Klein (2019) for more.

  2. See Alfano (2013, 2014, 2015, 2016), Alfano and Skorburg (2017a, b), and Alfano and Robinson (2017).

  3. For those who are not extremely online, spammers send a large number of irrelevant messages, often with the hope of getting money or other resources from recipients. Concern trolls pretend to care about a movement in complicated ways in order to distract advocates for that movement from their main task into pointless infighting. Counterintelligence sock-puppets are employed by their governments to impersonate citizens of other countries or dissidents within their own countries in order to muddy the epistemic and political waters.

  4. For more on the notion of epistemic vulnerability, see Gilson (2011) and Chinnery (2013).

  5. http://www.theguardian.com/us-news/ng-interactive/2015/jun/01/the-counted-police-killings-us-database. Accessed 15 September 2015.

  6. https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-2015-preliminary-statistics-for-law-enforcement-officers-killed-in-the-line-of-duty. Accessed 15 September 2015.

  7. http://www.gallup.com/poll/186308/americans-say-crime-rising.aspx. Accessed 15 September 2016.

  8. For a book-length case study of this, see Benkler et al. (2020).

  9. For further thoughts on the potential benefits of severing connections of trustful communication in certain contexts, see Peels and Blaauw (2016).

  10. Thanks to Dennis Whitcomb for this formulation.

  11. The literature on transactive memories (Dixon and Gould 1996) may also be construed in terms of virtuous (and vicious) echoes. Thanks to Alessandra Tanesini for pointing this out.

References

  • Alfano, M. (2013). Character as moral fiction. Cambridge University Press.

    Google Scholar 

  • Alfano, M. (2014). What are the bearers of virtues? In H. Sarkissian & J. C. Wright (Eds.), Advances in experimental moral psychology. (pp. 73–90). Continuum.

    Google Scholar 

  • Alfano, M. (2015). Becoming less unreasonable: A reply to Sherman. Social Epistemology Review and Reply Collective, 4(7), 59–62

    Google Scholar 

  • Alfano, M. (2016). Friendship and the structure of trust. In A. Masala & J. Webber (Eds.), From personality to virtue: Essays in the psychology and ethics of character. (pp. 186–206). Oxford: Oxford University Press.

    Google Scholar 

  • Alfano, M. (2017). The topology of communities of trust. Russian Sociological Review, 15(4), 30–56

    Google Scholar 

  • Alfano, M. (2018). The Nietzschean precedent for anti-reflective, dialogical agency. Behavioral and Brain Sciences, e37, 12–13

    Google Scholar 

  • Alfano, M., & Klein, C. (2019). Trust in a social and digital world. Social Epistemology Review and Reply Collective, 8(10), 1–8

    Google Scholar 

  • Alfano, M., & Robinson, B. (2017). Gossip as a burdened virtue. Ethical Theory and Moral Practice, 20, 473–482

    Google Scholar 

  • Alfano, M., & Skorburg, A. (2017b). The embedded and extended character hypotheses. In J. Kiverstein (Ed.), Handbook of philosophy of the social mind.Routledge.

    Google Scholar 

  • Alfano, M., & Skorburg, A. (2017a). Extended knowledge, the recognition heuristic, and epistemic injustice. In D. Pritchard, J. Kallestrup, O. Palermos, & A. Carter (Eds.), Extended knowledge.Oxford University Press.

    Google Scholar 

  • Baehr, J. (2015). Cultivating good minds: A philosophical and practical guide to educating for intellectual virtues. Retrieved 9 February, 2021, from https://intellectualvirtues.org/why-should-we-educate-for-intellectual-virtues-2-2/.

  • Beckman, M. (2016). Which countries’ terrorist attacks are ignored by the U.S. media? Fivethirtyeight. Retrieved 20 July, 2016, from http://fivethirtyeight.com/features/which-countries-terrorist-attacks-are-ignored-by-the-u-s-media/.

  • Benkler, Y., Faris, R., & Roberts, H. (2020). Network propaganda: Manipulation, disinformation, and radicalization in american politics. Oxford University Press.

    Google Scholar 

  • Black, D. (2013). Certitude, justification, and the principles of knowledge in Avicenna’s epistemology. In P. Adamson (Ed.), Interpreting Avicenna. (pp. 120–142). Cambridge University Press.

    Google Scholar 

  • Blustein, J. (2008). The moral demands of memory. Cambridge University Press.

    Google Scholar 

  • Boehm, C. (2012). Moral origins: The evolution of virtue, altruism, and shame. Basic Books.

    Google Scholar 

  • Callaway, E. (2011). Report finds massive fraud at Dutch universities. Nature, 479(7371), 15

    Google Scholar 

  • Chinnery, A. (2013). On epistemic vulnerability and open-mindedness. Philosophy of Education, 63–66.

  • Clark, A. (2002). Towards a science of the bio-technological mind. International Journal of Cognition and Technology, 1(1), 21–33

    Google Scholar 

  • Coady, C. (1995). Testimony: A philosophical study. Clarendon Press.

    Google Scholar 

  • DesAutels, P. (2009). Resisting organizational power. In L. Tessman (Ed.), Feminist Ethics And Social And Political Philosophy: Theorizing the non-ideal.Springer.

    Google Scholar 

  • DeVita Raeburn, E. (2004). The empty room: Surviving the loss of a brother or sister at any age. Scribner.

    Google Scholar 

  • Dixon, R., & Gould, O. (1996). Adults telling and retelling stories collaboratively. In P. Baltes & U. Staudinger (Eds.), Interactive minds: Life-span perspectives on the social foundation of cognition.Cambridge University Press.

    Google Scholar 

  • Doris, J. (2015). Talking to ourselves: Reflection, ignorance, and agency. Oxford University Press.

    Google Scholar 

  • Dropp, K., Kertzer, J., & Zeitzoff, T. (2014). The less Americans know about Ukraine’s location, the more they want U.S. to intervene. Retrieved 20 July, 2016, from http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/04/07/the-less-americans-know-about-ukraines-location-the-more-they-want-u-s-to-intervene.

  • Dunbar, R. (2004). Gossip in evolutionary perspective. Review of General Psychology, 8(2), 100–110

    Google Scholar 

  • Fire, M., Katz, G., & Elovici, Y. (2012). Strangers intrusion detection—Detecting spammers and fake profiles in social networks based on topology anomalies. Human Journal, 1(1), 26–39

    Google Scholar 

  • Fisher, P., Frenkel, T., Noll, L., Berry, M., & Yockelson, M. (2016). Promoting healthy child development via a two-generation translational neuroscience framework: The Filming Interactions to Nurture Development video coaching program. Child Development Perspectives, 10(4), 251–256

    Google Scholar 

  • Fiske, S., & Taylor, S. (1984). Social cognition. Addison-Wesley.

    Google Scholar 

  • Freeman, L. (1978). Centrality in social networks conceptual clarification. Social Networks, 1, 215–239

    Google Scholar 

  • Fricker, M. (2007). Epistemic injustice: Power and the ethics of knowing. Oxford University Press.

    Google Scholar 

  • Gilson, E. (2011). Vulnerability, ignorance, and oppression. Hypatia, 26(2), 308–332

    Google Scholar 

  • Goldberg, S. (2010). Relying on others: An essay in epistemology. Oxford University Press.

    Google Scholar 

  • Goldberg, S. (2013). Self-trust and extended trust. Res Philosophica, 90(2), 277–292

    Google Scholar 

  • Goldstein, D. G., & Gigerenzer, G. (2002). Models of ecological rationality: The recognition heuristic. Psychological Review, 109(1), 75–90

    Google Scholar 

  • Gottlieb, J. (2016). Report: Baylor regents say 19 football players accused of sexual assault since 2011. The Washington Post. Retrieved 17 November, 2016, from https://www.washingtonpost.com/news/early-lead/wp/2016/10/28/report-baylor-regents-say-19-football-players-accused-of-sexual-assault-since-2011/.

  • Govier, T. (1993). Self-trust, autonomy, and self-esteem. Hypatia, 8(1), 99–120

    Google Scholar 

  • Grice, H. P. (1975). Logic and conversation. In P. Cole & J. Morgan (Eds.), Syntax and semantics 3: Speech Acts.Academic Press.

    Google Scholar 

  • Haberman, M. (2016). Donald Trump retweets post with quote from Mussolini. The New York Times. Retrieved 27 March, 2017, from https://www.nytimes.com/politics/first-draft/2016/02/28/donald-trump-retweets-post-likening-him-to-mussolini.

  • Hardwig, J. (1991). The role of trust in knowledge. The Journal of Philosophy, 88(12), 693–708

    Google Scholar 

  • Hatch, J. (2016). How the women on Obama’s staff made sure their voices were heard: “Amplification” is where it’s at. Huffington Post. Retrieved 27 March, 2017, from http://www.huffingtonpost.com/entry/how-the-women-on-obamas-staff-made-sure-their-voices-were-heard_us_57d94d9fe4b0aa4b722d79fe.

  • Heersmink, R. (2017). A virtue epistemology of the internet: Search engines, intellectual virtues and education. Social Epistemology, 32, 1–12

    Google Scholar 

  • James, W. (1896/1979). The will to believe. In Burkhardt et al. (Eds.), The will to believe and other essays in popular philosophy (pp. 291–341). Harvard University Press.

  • Jones, K. (2012). The politics of intellectual self-trust. Social Epistemology, 26(2), 237–251

    Google Scholar 

  • Kawall, J. (2002). Other-regarding epistemic virtues. Ratio, 15(3), 257–275

    Google Scholar 

  • Khaleeli, H. (2016). #SayHerName: Why Kimberlé Crenshaw is fighting for forgotten women. The Guardian. Retrieved 27 March, 2017, from http://www.huffingtonpost.com/entry/how-the-women-on-obamas-staff-made-sure-their-voices-were-heard_us_57d94d9fe4b0aa4b722d79fe.

  • Krebs, V. (2002). Mapping networks of terrorist cells. Connections, 24(3), 43–52

    Google Scholar 

  • Kvanvig, J. (1992). The intellectual virtues and the life of the mind. Rowman & Littlefield.

    Google Scholar 

  • Lehrer, K. (1997). Self-trust: A study of reason, knowledge, and autonomy. Oxford University Press.

    Google Scholar 

  • Lotan, G. (2014). Israel, Gaza, war & data: Social networks and the art of personalizing propaganda. The World Post. Retrieved 1 June, 2017, from http://www.huffingtonpost.com/gilad-lotan/israel-gaza-war-social-networks-data_b_5658557.html.

  • Martin, J., & Cushman, F. (2015). To punish or to leave: Distinct cognitive processes underlie partner control and partner choice behaviors. PLoS ONE, 10(4), e0125193. https://doi.org/10.1371/journal.pone.0125193

    Article  Google Scholar 

  • McLeod, C. (2015). Trust. The Stanford Encyclopedia of Philosophy. Retrieved 1 September, 2016, from http://plato.stanford.edu/archives/fall2015/entries/trust/.

  • Medina, J. (2012). The epistemology of resistance: Gender and racial oppression, epistemic injustice, and resistant imaginations. Oxford University Press.

    Google Scholar 

  • Morton, A. (2013). Bounded Thinking: Intellectual Virtues For Limited Agents. Oxford University Press.

    Google Scholar 

  • Nguyen, T. (2016). Donald Trump Jr. shares white supremacist meme. Vanity Fair. Retrieved 27 March, 2017, from https://www.theguardian.com/lifeandstyle/2016/may/30/sayhername-why-kimberle-crenshaw-is-fighting-for-forgotten-women.

  • O’Connor, C., & Weatherall, J. (2019). The misinformation age: How false beliefs spread. Yale University Press.

    Google Scholar 

  • Pariser, E. (2011). The filter bubble: What the internet is hiding from you. Penguin Press.

    Google Scholar 

  • Pasnau, R. (2015). Disagreement and the value of self-trust. Philosophical Studies, 172(9), 2315–2339

    Google Scholar 

  • Peels, R., & Blaauw, M. (2016). The epistemic dimensions of ignorance. Cambridge University Press.

    Google Scholar 

  • Pennebaker, J. (2011). The secret life of pronouns: What our words say about us. Bloomsbury.

    Google Scholar 

  • Quealy, K. (2017). If Americans can find North Korea on a map, they’re more likely to prefer diplomacy. The New York Times. Retrieved 24 May, 2017, from https://www.nytimes.com/interactive/2017/05/14/upshot/if-americans-can-find-north-korea-on-a-map-theyre-more-likely-to-prefer-diplomacy.html.

  • Reid, E., Qin, J., Zhou, Y., Lai, G., Sageman, M., Weimann, G., & Chen, H. (2005). Collecting and analyzing the presence of terrorists on the web: A case study of jihad websites. In P. Kantor, G. Muresan, F. Roberts, D. D. Zeng, F. Y. Wang, H. C. Chen, & R. C. Merkle (Eds.), Intelligence and security informatics.Springer.

    Google Scholar 

  • Roberts, R., & Wood, J. (2007). Intellectual virtues: an essay in regulative epistemology. Oxford University Press.

    Google Scholar 

  • Roman, R., & Colle, R. (2003). Content creation for ICT development projects: Integrating normative approaches and community demand. Information Technology for Development, 10(2), 85–94

    Google Scholar 

  • Sable, M., Danis, F., Mauzy, D., & Gallagher, S. (2006). Barriers to reporting sexual assault for women and men: Perspectives of college students. Journal of American College Health, 55(3), 157–162

    Google Scholar 

  • Savage, D., Zhing, X., Yu, X., Chou, P., & Wang, Q. (2014). Anomaly detection in online social networks. Social Networks, 39(4), 62–70

    Google Scholar 

  • Senturk, R. (2005). Narrative social structure: Anatomy of the hadith transmission network, 610–1505. Stanford University Press.

    Google Scholar 

  • Shay, J. (1994). Achilles in Vietnam: Combat trauma and the undoing of character. Simon & Schuster.

    Google Scholar 

  • Shay, J. (2003). Odysseus in America: Combat trauma and the trials of homecoming. Scribner.

    Google Scholar 

  • Smith, C. P., & Freyd, J. (2014). Institutional betrayal. American Psychologist, 69(6), 575–587

    Google Scholar 

  • Šubelj, L., Furlan, U., & Bajec, M. (2011). An expert system for detecting automobiles insurance fraud using social network analysis. Expert Systems Applications, 38(1), 1039–1052

    Google Scholar 

  • Tessman, L. (2005). Burdened virtues: Virtue ethics for liberatory struggles. Oxford University Press.

    Google Scholar 

  • Tirrell, L. (2017). Toxic speech: Toward an epidemiology of discursive harm. Philosophical Topics, 45(2), 139–162

    Google Scholar 

  • Tversky, A., & Kahneman, D. (1973). Availability: A heuristic for judging frequency and probability. Cognitive Psychology, 5, 207–232

    Google Scholar 

  • Vargas, M. (2016). Responsibility and the limits of conversation. Criminal Law and Philosophy, 10, 221–240

    Google Scholar 

  • Williams, J. & Cave, D. (2017). Australia grapples with campus assaults, and reprisals against victims. The New York Times. Retrieved 29 June, 2017, from https://www.nytimes.com/2017/06/21/world/australia/australia-land-of-bro-culture-grapples-with-campus-assaults.html.

  • Wong, D. (2006). Natural Moralities. Oxford: Oxford University Press.

    Google Scholar 

  • Zollman, K. (2007). The communication structure of epistemic communities. Philosophy of Science, 74(5), 574–587

    Google Scholar 

  • Zollman, K. J. (2010). The epistemic benefit of transient diversity. Erkenntnis, 72(1), 17

    Google Scholar 

Download references

Acknowledgements

This publication was supported by a subaward agreement from the University of Connecticut with funds provided by Grant No. 58942 from John Templeton Foundation and by grants from the John Templeton Foundation (#61378) and the Australian Research Council (DP190101507). Its contents are solely the responsibility of the authors and do not necessarily represent the official views of UConn or John Templeton Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mark Alfano.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The article belongs to the topical collection on New Directions in Social Epistemology, edited by Adam Carter and Christoph Kelp.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alfano, M. Virtues for agents in directed social networks. Synthese 199, 8423–8442 (2021). https://doi.org/10.1007/s11229-021-03169-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11229-021-03169-6

Keywords

Navigation