Knowledge, Technology & Policy

, Volume 23, Issue 3–4, pp 461–482 | Cite as

Competence and Trust in Choice Architecture

Special Issue

Abstract

Richard Thaler and Cass Sunstein’s Nudge advances a theory of how designers can improve decision-making in various situations where people have to make choices. We claim that the moral acceptability of nudges hinges in part on whether they can provide an account of the competence required to offer nudges, an account that would serve to warrant our general trust in choice architects. What needs to be considered, on a methodological level, is whether they have clarified the competence required for choice architects to prompt subtly our behaviour toward making choices that are in our best interest from our own perspectives. We argue that, among other features, an account of the competence required to offer nudges would have to clarify why it is reasonable to expect that choice architects can understand the constraints imposed by semantic variance. Semantic variance refers to the diverse perceptions of meaning, tied to differences in identity and context, that influence how users interpret nudges. We conclude by suggesting that choice architects can grasp semantic variance if Thaler and Sunstein’s approach to design is compatible with insights about meaning expressed in science and technology studies and the philosophy of technology.

Keywords

Trust Nudge Libertarian paternalism Design ethics Expertise Interface 

References

  1. Baier, A. (1986). Trust and anti-trust. Ethics, 96, 231–260.CrossRefGoogle Scholar
  2. Bijker, W. E. (1995). Of bicycles, bakelites, and bulbs: Toward a theory of sociotechnical change, inside technology. Cambridge: MIT.Google Scholar
  3. Bijker, W. E., Hughes, T. P., & Pinch, T. J. (1987). The social construction of technological systems: New directions in the sociology and history of technology. Cambridge: MIT.Google Scholar
  4. Cerbone, D. (2009). (book 1) Ironic technics; (book 2) postphenomenology and technoscience: the Peking University lectures. Notre Dame Philosophical Reviews.Google Scholar
  5. Collins, H. M., & Evans, R. (2007). Rethinking expertise. Chicago: University of Chicago Press.Google Scholar
  6. Epstein, S. (1994). Integration of the cognitive and the psychodynamic unconscious. The American Psychologist, 49, 709–724.CrossRefGoogle Scholar
  7. Feng, P., & Feenberg, A. (2008a). Critical theory of technology and the design process. In P. E. Vermaas, P. Kroess, A. Light, & S. Moore (Eds.), Philosophy and design. New York: Springer.Google Scholar
  8. Feng, P., & Feenberg, A. (2008b). Thinking about design: Critical theory of technology and the design process. In P. E. Vermass, P. Kroes, A. Light, & S. A. Moore (Eds.), Philosophy and design: From engineering to architecture. Dordrecht: Springer.Google Scholar
  9. Fogg, Brian J. (1997). Charismatic computers: Creating more likable and persuasive interactive technologies by leveraging principles from social psychology. Thesis (Ph D), Stanford University.Google Scholar
  10. Fogg, B. J. (2003). Persuasive technology: Using computers to change what we think and do. Amsterdam: Morgan Kaufmann Publishers.Google Scholar
  11. Franssen, M., & Bucciarelli, L. L. (2004). On rationality in engineering design. Journal of Mechanical Design, 126(6), 945–949.CrossRefGoogle Scholar
  12. Hardwig, J. (1985). Epistemic dependence. Journal of Philosophy, 82(7), 335–349.CrossRefGoogle Scholar
  13. Hardwig, J. (1991). The role of trust in knowledge. Journal of Philosophy, 88(12), 693–708.CrossRefGoogle Scholar
  14. Hieronymi, P. (2008). The reasons of trust. Australasian Journal of Philosophy, 86(2), 213–236.CrossRefGoogle Scholar
  15. Hinchman, E. (2005a). Advising as inviting to trust. Canadian Journal of Philosophy, 35(3), 355–386.Google Scholar
  16. Hinchman, E. (2005b). Telling as inviting to trust. Philosophy and Phenomenological Research, 70(3), 562–587.CrossRefGoogle Scholar
  17. Holton, R. (1994). Deciding to trust, coming to believe. Australasian Journal of Philosophy, 72(1), 63–76.CrossRefGoogle Scholar
  18. Ihde, D. (1977). Experimental phenomenology: An introduction. New York: Putnam.Google Scholar
  19. Ihde, D. (2007). Listening and voice: Phenomenologies of sound (2nd ed.). Albany: State University of New York Press.Google Scholar
  20. Jones, K. (1996). Trust as an affective attitude. Ethics, 107(1), 4–25.CrossRefGoogle Scholar
  21. Latour, B. (2000). Technology is society made durable. In K. Grint (Ed.), Work and society: A reader. Cambridge: Polity.Google Scholar
  22. Law, J. (1991). The sociology of monsters: Essays on power, technology and domination. London: Routledge.Google Scholar
  23. Levitt, S. D., & Dubner, S. J. (2005). Freakonomics: A rogue economist explores the hidden side of everything (1st ed.). New York: William Morrow.Google Scholar
  24. Lobel, O & Amir, O. (2009). Stumble, predict, nudge: how behavioral economics informs law and policy. Columbia Law Review 108.Google Scholar
  25. Pinch, T. (2009). On making infrastructure visible: putting the non-humans to rights. Cambridge Journal of Economics, 34(1), 77–89.CrossRefGoogle Scholar
  26. Rizzo, M. J., & Whitman, D. G. (2008). Little brother is watching you: New paternalism on the slippery slopes. SSRN eLibrary.Google Scholar
  27. Rolin, K. (2002). Gender and trust in science. Hypatia: A Journal of Feminist Philosophy, 17(4), 95–118.Google Scholar
  28. Scheman, N. (2001). Epistemology resuscitated: Objectivity as trustworthiness. In N. Tuana & S. Morgen (Eds.), Engendering rationalities. Albany: SUNY.Google Scholar
  29. Selinger, E. (2006). Postphenomenology: A critical companion to ihde. Albany: State University of New York Press.Google Scholar
  30. Shrader-Frechette, K. (2005). Flawed attacks on contemporary human rights: Laudan, Sunstein, and the cost-benefit state. Human Rights Review, 7(1), 92–110.CrossRefGoogle Scholar
  31. Stevenson, D. (2005). Libertarian paternalism: the cocaine vaccine as a test case for the sunstein/thaler model. Rutgers Journal of Law and Urban Policy 3.Google Scholar
  32. Taddeo, M. (2009). Defining trust and e-trust: Old theories and new problems. International Journal of Technology and Human Interaction (IJTHI) Official Publication of the Information Resources Management Association, 5(2), 23–35.Google Scholar
  33. Thaler, R., & Sunstein, C. (2003a). Libertarian paternalism. The American Economic Review, 93(2), 175–179.CrossRefGoogle Scholar
  34. Thaler, R., & Sunstein, C. (2003b). Libertarian paternalism is not an oxymoron. University of Chicago Law Review, 70(4), 1159–1202.CrossRefGoogle Scholar
  35. Thaler, R., & Sunstein, C. (2008). Nudge: Improving decisions about health, wealth, and happiness. New Haven: Yale University Press.Google Scholar
  36. Verbeek, P.-P. (2005). Artifacts and attachment: A post-script philosophy of mediation. In H. Harbers (Ed.), Inside the politics of technology. Amsterdam: University of Amsterdam Press.Google Scholar
  37. Verbeek, P.-P. (2009). Ambient intelligence and persuasive technology: the blurring boundaries between human and technology. NanoEthics, 3(3), 231–242.CrossRefGoogle Scholar
  38. Vermaas, Pieter E. (2008). Philosophy and design from engineering to architecture. [Dordrecht]: Springer. http://rave.ohiolink.edu/ebooks/ebc/9781402065910.
  39. Wilholt, T. (2009). Bias and values in scientific research. Studies in History and Philosophy of Science, 40, 92–101.CrossRefGoogle Scholar
  40. Winner, L. (1980). Do artifacts have politics? Daedalus 109 (1).Google Scholar
  41. Wright, S. (2009). Trust and trustworthiness. Philosophia.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  1. 1.Rochester Institute of TechnologyRochesterUSA
  2. 2.Michigan State UniversityEast LansingUSA

Personalised recommendations