Trust and Privacy in Distributed Work Groups

  • Denise AnthonyEmail author
  • Tristan HendersonEmail author
  • James KittsEmail author
Conference paper

Trust plays an important role in both group cooperation and economic exchange. As new technologies emerge for communication and exchange, established mechanisms of trust are disrupted or distorted, which can lead to the breakdown of cooperation or to increasing fraud in exchange. This paper examines whether and how personal privacy information about members of distributed work groups influences individuals' cooperation and privacy behavior in the group. Specifically, we examine whether people use others’ privacy settings as signals of trustworthiness that affect group cooperation. In addition, we examine how individual privacy preferences relate to trustworthy behavior. Understanding how people interact with others in online settings, in particular when they have limited information, has important implications for geographically distributed groups enabled through new information technologies. In addition, understanding how people might use information gleaned from technology usage, such as personal privacy settings, particularly in the absence of other information, has implications for understanding many potential situations that arise in pervasively networked environments.


Privacy Setting Personal Privacy Privacy Preference Online Setting Established Mechanism 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Zucker, LG (1986) Production of Trust: Institutional Sources of Economic Structure, 1840–1920. In Staw BM and Cummings LL (eds) Research in Organizational Behavior, volume 8. JAI Press Inc., Greenwich, CT.Google Scholar
  2. 2.
    Shapiro, SP (1987) The Social Control of Impersonal Trust. Am J Sociology 93:623–58.CrossRefGoogle Scholar
  3. 3.
    Baye, M (2002) Special Issue on The economics of the Internet and e-commerce. Advances in Applied Microeconomics. Volume 11.Google Scholar
  4. 4.
    Camp, LJ (2000) Trust and Risk in Internet Commerce. The MIT Press, Cambridge, MA.Google Scholar
  5. 5.
    Falcone R, Singh M, Tan YH (2001) Trust in Cyber-societies. Springer, Berlin.zbMATHCrossRefGoogle Scholar
  6. 6.
    Friedman E, Resnick P (2001) The Social Cost of Cheap Pseudonyms. J Econ & Management Str 10:173–199.CrossRefGoogle Scholar
  7. 7.
    Kollock P, (1999) The Production of Trust in Online Markets. Advance in Group Processes 16:99–123.Google Scholar
  8. 8.
    Lunn R, Suman M (2002) Experience and Trust in Online Shopping. In: Wellman B, Haythornthwaite C (eds) The Internet in Everyday Life. Blackwell, Oxford UK.Google Scholar
  9. 9.
    Osterwalder D, (2001) Trust through evaluation and certification? Soc Sc Comp Rev 19:32–46.CrossRefGoogle Scholar
  10. 10.
    Sambamurthy V, Jarvenpaa S, (eds) (2002). Special Issue on 'Trust in the Digital Economy.' J Strategic Inf Sys 11: 183–346.Google Scholar
  11. 11.
    Shapiro C, Varian H, (1999). Information Rules. A Strategic Guide to the Network Economy. Harvard Business School Press, Boston.Google Scholar
  12. 12.
    Anthony D, Smith SW,, Williamson T, (Forthcoming) Reputation and Reliability in Collective Goods: The case of the online encyclopedia Wikipedia. Rationality & Society.Google Scholar
  13. 13.
    Belanger F, Hiller J, Smith W, (2002) Trustworthiness in electronic commerce: the role of privacy, security and site attributes. J Strategic Info Sys 11: 245–270.CrossRefGoogle Scholar
  14. 14.
    Castells M, (2001) The Internet Galaxy. Oxford University Press, Oxford.Google Scholar
  15. 15.
    Wellman B, Haythornthwaite C, (eds) (2002) The Internet in Everyday Life. Blackwell, Oxford.Google Scholar
  16. 16.
    Anthony D, Lewis E, Who do you call in a crisis? Reliability and Capability for Trusted Communication. Conference paper at the International Sunbelt Social Networks Conference XXIV, May 2004, SloveniaGoogle Scholar
  17. 17.
    Knights D, Noble F, Vurdubakis T, Willmott H, (2001) Chasing Shadows: Control, Virtuality and the Production of Trust. Org Studies 22:311–336CrossRefGoogle Scholar
  18. 18.
    Hardin R (1991)Google Scholar
  19. 19.
    Hardin R (2001)Google Scholar
  20. 20.
    Lorenz E (1988)Google Scholar
  21. 21.
    Snijders C (1996) Trust and Commitments. Interuniversity Center for Social Science Theory and Methodology, Gronigen, Netherlands.Google Scholar
  22. 22.
    Luhmann N (1988) Familiarity, Confidence, Trust: Problems and Alternatives. In: Gambetta D (ed) Trust Making and Breaking Cooperative Relations. Basil Blackwell, New York.Google Scholar
  23. 23.
    Gambetta D (1988) Can We Trust Trust? In: Gambetta D (ed) Trust Making and Breaking Cooperative Relations. Basil Blackwell, New York.Google Scholar

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  1. 1.Dartmouth CollegeHanoverUSA
  2. 2.University of St. AndrewsScotlandUK
  3. 3.Columbia UniversityNew YorkUSA

Personalised recommendations