3. Understanding Digital Trust

Strings of information

Defining Trust

Trust is the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party“.
(Mayer et al.)

Thus, trust is built if a person assumes that the aspired beneficial result is more likely to occur than a bad outcome. In this context there is no possibility to influence the process. The following example illustrates this situation; a mother leaved her baby to a babysitter. She is aware of the fact that the consequences of her choice depend heavily on the behavior of the babysitter. In addition, she knows that the damage from a bad outcome of this engagement carries more weight than the benefit of a good outcome. Important factors in the trust equation are missing control, vulnerability and the existence of risk (Petermann, 1985).

The existence of multiple options and diverse scenarios lead to ambiguity and risk. According to Lumann, individuals must reduce complexity in order to eventually make a decision in such a situation. Trust is such a mechanism that reduces social complexity. This context is best captured in the definition of trust developed by Mayer, Davis and Schoorman (1995: 712).

Trust can be an efficiently help to overcome the agency dilemma. In economics the principal-agent problem describes a situation where a person or entity (the agent) acts on behalf of another person (the principal). Due to information asymmetry, which is omnipresent in digital markets, the agent can either act in the interest of the principal or not by acting for example selfishly. Trust can solve such problems by absorbing behavioral risks (Ripperger, 1998). In situations where information asymmetry is present, screening and signaling activities are often inefficient due to high information cost. Trust can reduce such agency-cost (including imminent utility losses). It can increase the agent’s intrinsic motivation to act in the principal’s interest.

You must trust and believe in people, or life becomes impossible.
(Anton Chekhov)

A trust relationship as such can be seen as a principal-agent relationship. The relationship between a trusting party and a trusted party build on an implicit contract. Trust is provided as a down payment by the principal. The accepting agent can either honor this ex ante payment or disappoint the principal.

Principal-Agent

According to the principle-agent theory a trusting party faces three risks:

1

Adverse Selection: When selecting an agent, the principal faces the risk of choosing of an unwanted partner. Hidden characteristics of an agent or his service are not transparent to the principal before the contract is made. These leaves room for the agent to act opportunistically.

2

Moral Hazard: If information asymmetry incurs after the contact has been closes (ex post) the risk of moral hazard arises. The principal has insufficient information about the exertion level of the agent that fulfills the service. External effect such as environmental conditions can also influence the agent’s actions.

3

Hold Up: This type of risk is particularly relevant for the discussion about the use of personal data. It describes the risk that occurs if the principal makes specific investment such as providing sensitive data. After closing of the contract, the agent can abuse this one-sided investment to the detriment of the principal. The subjective insecurity about the integrity of the agent based on potential hidden intentions.

The described risks can be reduced through signaling and screening activities. Signaling is a strategy for agents to communicate their very nature, their true character. The provision of Certification and quality seals are expels for signaling activities. On the other hand, a principal tries to identify the true nature of an agent by applying screening activities. However, screening is only effective if signals are valid (the agent actually owns this characteristic) and if the absence of such as signal indicates the lack of this trait.

Introducing the Iceberg Trust Model

iceberg.digital

Trust Constructs and Cues

Institution-based trust
Disposition to trust
Trusting beliefs
Trusting intentions

The iceberg model suggests four clusters of trust cues that sit at the tip of the iceberg: Reciprocity, brand, social adaptor and social protector. Each cluster holds again a set of trust signals or trust design patterns that can be considered by marketing professionals in order to engender trust. Chapter two and the discussion of the principle-agent problem highlights the importance of trust cues in online transactions. “Perceptions of a trust cue triggers preestablished cognitive and affective associations in the user’s mind, which allows for speedy information processing” (Hoffmann et al., 2015, 142).

Iceberg.digital Online Trust Model

Reciprocity:

 

Reciprocity is a social construct that describes the act of rewarding kind actions by responding to a positive action with another positive action. The benefits to be gained from transactions in the digital space originate in the willingness of individuals to take risks by placing trust in others that are regarded to act competently, benevolently and morally. A fair degree of reciprocity in the exchange of data, money, products and services reduces user’s concerns and eventually induces trust (Sheehan/Hoy, 2000). A user that provides personal data to an online service – either actively or passively –perceives this to be an input into an exchange. They expect an outcome of adequate value. A fair level of reciprocity is reached through transparent exchange of information for appropriate compensation. The table bellow shows the most relevant signals or strategic elements that establish positive reciprocity.

Value

A business needs to offer fair reciprocal benefits that are directly relevant to the data the business is collecting and storing. If the business if taking advantage of information that is not necessary to the service being provided, additional compensation needs to be considered. Because of their bounded rationality, consumers often are likely to trade off long-term privacy for short-term benefits.

Eventually, trust is about encapsulated interest, a kind of closed loop of each party’s self-interest.

Transparency

Fair and open information practices are an essential enabler for reciprocity. Users must be able to find all relevant information quickly. This leads to a reduction in real or perceived information asymmetry. Customer data advocacy can require altruistic information practices.

Social translucence (refer to social protector) is an important element of transparency.

Terms & Conditions

Standard legal information such as Terms & Condition as well as security and privacy policies must be provided proactively and in an accessible way. Users need to be made aware of information collection as well of the way information is used. Consistency of this content over time is an important signal that facilitates trusting intentions.

Warranties

Warranties and guarantees support the perception of fair reciprocity and therefore signal trustworthiness. Opportunistic behavior will entail expenses for the agent.

Contact & Service

Pre- and aftersales service as well as any other touch point allowing a user to get in contact with an agent is a terrific opportunity to shape customer experience. Failures in this strategic element are penalized with distrust and unfavorable feedback.

Reliability is relatively easy to demonstrate online. It is critical to respond quickly on customer requests.

3rd Party Sharing

Sharing data with 3rd parties has a very strong effect on the user’s willingness to provide data. Avoid data sharing behind the back of the user – even if legal compliance is given.

Social Mirror

In particular in social (e.g. non profit) situation, users can often not easily see benefits from providing data. A social mirror can facilitate this process by supporting awareness of the situation and the context in which this data adds value. In addition, data can be used to generate insights that motivate users to participate (e.g. shared health data).

This trust cue refers to the concept of social capital. This kind of capital refers to connections among individuals – social networks and the norms of reciprocity and trustworthiness that arises from them. The cue is similar to the social translucence (please refer category “social protector”). However, it highlights rather the importance of the collective value than the social impact of a certain behavior.

Accountability

Users expect that access to their data will be used responsibly and in his best interests. If a company cannot meet these expectations or if an unfavorable incident occurs, businesses must demonstrate accountability. This requires processes and organizational precautions that allow reacting responsibly and fast.

Compliance is either a state of being in accordance with established guidelines or specifications, or the process of becoming so. The definition of compliance can also encompass efforts to ensure that organizations are abiding by both industry regulations and government legislation.

In an age when platforms offer branded services without owning physical assets or employing the providers (e.g. Uber doesn’t own cars and doesn’t employ drivers), issues of accountability are increasingly complex. Transparency and commitment regarding own accountability are increasingly stronger trust clues.

Brand

 

A second powerful signal that promotes trusting beliefs is the brand of an entity. A company makes a certain commitment when investing in its brand, reputation and awareness. Due to the fact that brand building is a very expensive endeavor, consumers perceive this signal as very trustworthy. Capital invested into a brand can be considered a pledge that is at stake with every customer interaction and every transaction. Whether the investment pays of or whether it’s lost depends heavily on the true competency of a company. Strategic elements such as brand recognition, image and website design are supposed to trigger associations in the user’s cognitive system that prompt a feeling of familiarity.

“Brands arose as a way to compensate for the dehumanizing effects of the Industrial Age” (Rushkoff, 2017). They are essentially symbols of origin and authenticity.

Brand Image

 

The identity of a company triggers associations that together constitute the brand image. It is the impression in the consumers’ mind of a brand’s total personality. Brand image is developed over time through advertising campaigns with a consistent theme, and is authenticated through the consumers’ direct experience.

In the digital age, brands need to focus on delivering authentic experiences and get comfortable with transparency.

Recognition & Reach

Brand recognition is the extent to which a consumer or the general public is able to identify a brand by its attributes such as the logo of a product or service, tag line, packaging or advertising campaign. Familiarity through frequent exposure has been shown to elicit positive feelings towards the brand stimulus.

Consumers are more willing to rely on large and well-established providers. Digital consumer prefer brands with a broad reach. Search engine marketing is a relevant element that influences a brand’s relevance and reach. Many new business models rely on a competitive advantage in the ability to generate leads through search engine optimization (SEO) and search engine advertising (SEA).

Familiarity by Design

Design Patterns & Skeuomorphism: Skeuomorphism makes interface objects familiar to users by using concepts they recognize. Use of objects that mimic their real-world counterparts in how they appear and/or how the user can interact with them. A well-known example is the recycle bin icon used for discarding files.

California Roll principle: The California Roll is a type of sushi that has been developed to accustom Americans to the unknown food. People don’t want something truly new, they want the familiar done differently.

Privacy by Design advances the view that the future of privacy cannot be assured solely by compliance with legislation and regulatory frameworks; rather, privacy assurance must become an organization’s default mode of operation. It is an approach to systems engineering, which takes privacy into account throughout the whole engineering process. Privacy needs to be embedded, by default, during the architecture, design and construction of the processes.

Design Thinking describes a paradigm – not a method – for innovation. It integrates human, business and technical factors in problem forming, solving and design. The user (human) centered approach to design has been extended beyond user needs and product specification to include the „human-machine-experience“.

Relevance

 

Digital customers are very demanding regarding the relevance of a product, service or information as such. Mass customization and personalization foster a good customer experience. The ability to process large amount of data allows to individualize transactions and to align production on pseudo-individual customer requirements.

Trough personalization a customer gets the feeling of being treated as a segment of one. Service provider can offer individual solutions and therefore increase perceived competency by giving better and faster access to relevant information. Personalization works best in markets with fragmented customer needs.

Content & Story

 

Ever since the days of bonfires and cave paintings, humans have used storytelling as a tool for social bonding. Content marketing and storytelling done right are elemental means to engender trust. Well-constructed narratives attract attention and  build an emotional connection. With trust toward media, organizations and institutions diminishing, stories present an underrated vehicle for fostering such connections and eventually to establishing credibility. Attributes of stories that build trust are; genuine, authentic, transparent, meaningful and familiar.

 

Design Quality

 

The quality of a brand’s digital presences (web, mobile, etc.) can foster brand reputation and enhance brand recognition. High site quality signals that the company has the required level of competence.

Important elements of design quality are usability, accessibility and the resulting user experience.

A particularly important paradigm leading the design process is processes “Privacy by Design”:

Privacy by Design advances the view that the future of privacy cannot be assured solely by compliance with legislation and regulatory frameworks; rather, privacy assurance must become an organization’s default mode (privacy by default) of operation. It is an approach to systems engineering, which takes privacy into account throughout the whole engineering process.

Privacy needs to be embedded, by default, during the architecture, design and construction of the processes. The demonstrated ability to secure and protect digital data needs to be part of the brand identity.

Done right, this design principle increases the perception of security. This refers to the perception that networks, computers, programs and in particular data is at all times protected from attack, damage or unauthorized access.

User Control

 

 

Companies can signal willingness to empower users by providing measures of user control. Such measures can create the impression that an individual can actively reduce the risk of data abuse. Hence, a consumer perceives lower cost of a transaction. This makes the transaction more attractive and therefore engenders trust.

An essential element of user control is the application of permission-based systems. Permissions must base on the user’s dynamic consent. This consent involves a continuing obligation to comply with the user’s choice.

Trust-less Systems

 

Trust-less Systems can replace confidence in the trust of an organization or the government with the cryptographic security of mathematics. Recent innovations around cryptographic currencies and the Blockchain protocol in particular provide the ability to avoid the need for a trusted third party. Agency problems such as moral hazard and hold up arise from imperfections of the human nature. The cryptographic security of mathematics makes human interaction – the weakest link – obsolete.

The Blockchain protocol enables the trustless exchange of any kind of digital asset from domain name signatures, digital contracts, digital titles to physical assets like cars and houses.

Digital Identity

 

Trust Influencers

 

Trust influencers are groups of people who can disproportionately influence a significant change in the way we evaluate situations, make decisions and eventually act. They allow the masses (late adopters and laggards) to eventually make trust leaps by setting new social norms.

Although trust influencers show similarities to social media influencers they draw on a different concept. Trust influencers can be compared to champions and agents defined by the Change Management Methodology;

Champions (or ambassadors) believe in and want the change and attempt to obtain commitment and resources for it, but may lack the sponsorship to drive it.

Agents implement change.  Agents have implementation responsibility through planning and executing implementation. At least part, if not all of change agent performance is evaluated and reinforced on the success of this implementation.

Influencers gain their power form the theory of “social proof”. People tend to be willing to place an enormous amount of trust in the collective knowledge (wisdom) of the crowd.

Affiliation & Belonging

 

 

In contrast to a lock-in strategy, companies can gain customer loyalty by focusing on values a customer can relate to. Whereas the element of personalization is highly effective from a signaling perspective, the development of a feeling of affiliation and belonging can be successful from a screening perspective. “The feeling of belonging to a community, which deepens over time, leads to positive feelings and positive evaluation of the group members generating a communal sense of trust (Einwiller et. al. 2000: 2).

Reputation Systems

Reputation can be considered as a collective measure of trustworthiness – in the sense of reliability – based on the referrals or ratings from members in a community (Josang et. al. 2007). Signals from reputation systems are among the most popular elements screened by web users. The grown familiarity of users with these mechanisms is not only a benefit but also a risk. Reputation systems are not immune to manipulation.

Valuable reputation information is embodied in a person’s social graph. The latter refers to the connections between an individual and the other people, places and things it interacts with in an online social network.

Keep in mind that trust usually lies within the group with the expertise rather than the group with a similar need.

3rd Party Endorsements

 

 

Third-party endorsements are primarily independent statements of certification authorities or other experts that attest honesty and trustworthiness. They usually facilitate the transfer of positive cognitive associations with the endorser to the endorsee. Signaling objective security measures through 3rd party certificates or guarantees enhance the feeling of security and generate trust.

Because of their high potential to increase the persuasiveness of the communication, companies can also draw on heuristic cues as communicators (Eagly/Chaiken, 1993). These are cues that are based on experience or common sense. Their use is meant to save time and reduce demands for thinking. Examples are experts, attractive persons or majorities.

Social media influencers are a new kind of endorsers. They indicate the increasing importance of collective experience (vs. personal experience) on trust. People tend to trust messages from persons they know (e.g. friends and family). That’s why Word-of-mouth marketing is a powerful means to engender trust (refer also to social adaptor; Trust Influencers).

Social Translucence

 

 

 

In the digital space, we often lack the many social cues that tell us what’s happening. E.g. if we return shoes bought on Zalando we take the parcel to the next post office. Upon scanning the package, we are handed out a receipt. Such physical cues are typically missing in online transaction. Social translucence is an approach to designing systems that support social processes. Its goal is to increase transparency by making properties of the physical world that support graceful human-human communication visible in digital interactions (Erickson T., Kellogg W. A., 2000).

Translucence can be brought to a next level by confirming a person’s online identity by matching it to offline ID documents such as a driving license and a passport (e.g. Airbnb’s Verified ID).

Data Context

An interesting study to establish insights into these issues and to inform development of appropriate policy frameworks has been conducted by Microsoft in 2012 and 2013 (Nguyen et al., 2013). The following objective variables have been recognized to impact user sensitivity in sharing personal data or trust in entities they interact with:

The results reinforced the relevance of context, indicating that what is considered acceptable use of data is personal, subject to change, and reflects differences in cultural and social norms (S. 231).
Data Context
Click here for a visualization of the acceptability of data use that varies for different scenarios, in different countries.
Data Conext Numbers

The importance of the two factors of data context “collection method” and “data use” equates to today’s notice/consent model. It is best practice to collect personal data from users actively participating in the transaction and upon informed consent by these users. However, “in the world of big data, most data will be passively collected or generated, i.e., without active user awareness, and it would be impractical if not impossible for users to give express consent with respect to all data collected” (Nguyen et al., 2013, S. 233). The remaining context variables as well as the trust cues can and must be leveraged to increase user acceptance in order to harness the potential of big data.

Did you know ?

You can now directly contribute to iceberg.digital. Click here to contribute.

Contact Us

    Your Name (required)

    Your Email (required)

    Subject

    Your Message

    Please master this little challenge by retyping these letters and numbers
    [recaptcha]

    Contribute to iceberg.digital

    Use this form to directly contribute to the iceberg project

    9+6=
    View latest Contributions
    • I noticed that your iceberg.digital website could be missing out on approximately 1K visitors daily. Our AI powered traffic system is tailored to boost your site’s visibility: https://ow.ly/BkSO50U3isZ We’re offering a free trial that includes four thousand targeted visitors to show the potential benefits. After......

    • I saw that your iceberg.digital website might be missing out on approximately 1,000 visitors daily. Our AI powered traffic system is tailored to boost your site’s visibility: https://ow.ly/82vQ50TR2qR We’re offering a free trial that includes 4,000 targeted visitors to show the potential benefits. After the......

    • I saw that your iceberg.digital website may be missing out on approximately a thousand visitors daily. Our AI powered traffic system is tailored to enhance your site’s visibility: https://ow.ly/T4ag50TR2oM We’re offering a free trial that includes 4,000 targeted visitors to show the potential benefits. After......