Sharing Compromising Information as a Cooperative Strategy
Well-enforced norms create an opportunity for norm breakers to cooperate in ventures requiring trust. This is realized when norm breakers, by sharing evidence of their breaches, make themselves vulnerable to denunciation and therefore trustworthy. The sharing of compromising information (SCI) is a s...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Society for Sociological Science
2019-05-01
|
Series: | Sociological Science |
Subjects: | |
Online Access: | https://www.sociologicalscience.com/articles-v6-14-352/ |
_version_ | 1811312609630093312 |
---|---|
author | Diego Gambetta Wojtek Przepiorka |
author_facet | Diego Gambetta Wojtek Przepiorka |
author_sort | Diego Gambetta |
collection | DOAJ |
description | Well-enforced norms create an opportunity for norm breakers to cooperate in ventures requiring trust. This is realized when norm breakers, by sharing evidence of their breaches, make themselves vulnerable to denunciation and therefore trustworthy. The sharing of compromising information (SCI) is a strategy employed by criminals, politicians, and other actors wary of their partners’ trustworthiness in which the cost of ensuring compliance is offloaded on clueless norm enforcers. Here we introduce SCI as a sui generis cooperative strategy and test its functioning experimentally. In our experiment, subjects first acquire the label “dove” or “hawk” depending on how cooperative or uncooperative they are, respectively. Hawks acquire compromising information embodied in their label and can reveal it before an interaction with trust at stake. Unlike doves, hawks who reveal their label make themselves vulnerable to their partners, who can inflict a penalty on them after interaction. We find that even students in as artificial a setting as a computerized decision laboratory grasp the advantage of SCI and use it to cooperate. Our results corroborate the idea that compromising information can be conceived as a “hostage” that, when mutually exchanged, makes each party to the interaction vulnerable and therefore trustworthy in joint endeavours. |
first_indexed | 2024-04-13T10:40:15Z |
format | Article |
id | doaj.art-60f8a25dcabf4e6d92bab35eaa48604b |
institution | Directory Open Access Journal |
issn | 2330-6696 2330-6696 |
language | English |
last_indexed | 2024-04-13T10:40:15Z |
publishDate | 2019-05-01 |
publisher | Society for Sociological Science |
record_format | Article |
series | Sociological Science |
spelling | doaj.art-60f8a25dcabf4e6d92bab35eaa48604b2022-12-22T02:49:57ZengSociety for Sociological ScienceSociological Science2330-66962330-66962019-05-0161435237910.15195/v6.a14Sharing Compromising Information as a Cooperative StrategyDiego Gambetta0Wojtek Przepiorka1Collegio Carlo Alberto, TorinoUtrecht UniversityWell-enforced norms create an opportunity for norm breakers to cooperate in ventures requiring trust. This is realized when norm breakers, by sharing evidence of their breaches, make themselves vulnerable to denunciation and therefore trustworthy. The sharing of compromising information (SCI) is a strategy employed by criminals, politicians, and other actors wary of their partners’ trustworthiness in which the cost of ensuring compliance is offloaded on clueless norm enforcers. Here we introduce SCI as a sui generis cooperative strategy and test its functioning experimentally. In our experiment, subjects first acquire the label “dove” or “hawk” depending on how cooperative or uncooperative they are, respectively. Hawks acquire compromising information embodied in their label and can reveal it before an interaction with trust at stake. Unlike doves, hawks who reveal their label make themselves vulnerable to their partners, who can inflict a penalty on them after interaction. We find that even students in as artificial a setting as a computerized decision laboratory grasp the advantage of SCI and use it to cooperate. Our results corroborate the idea that compromising information can be conceived as a “hostage” that, when mutually exchanged, makes each party to the interaction vulnerable and therefore trustworthy in joint endeavours.https://www.sociologicalscience.com/articles-v6-14-352/Information SharingTrustCooperationSocial NormsNorm EnforcementVenture Game |
spellingShingle | Diego Gambetta Wojtek Przepiorka Sharing Compromising Information as a Cooperative Strategy Sociological Science Information Sharing Trust Cooperation Social Norms Norm Enforcement Venture Game |
title | Sharing Compromising Information as a Cooperative Strategy |
title_full | Sharing Compromising Information as a Cooperative Strategy |
title_fullStr | Sharing Compromising Information as a Cooperative Strategy |
title_full_unstemmed | Sharing Compromising Information as a Cooperative Strategy |
title_short | Sharing Compromising Information as a Cooperative Strategy |
title_sort | sharing compromising information as a cooperative strategy |
topic | Information Sharing Trust Cooperation Social Norms Norm Enforcement Venture Game |
url | https://www.sociologicalscience.com/articles-v6-14-352/ |
work_keys_str_mv | AT diegogambetta sharingcompromisinginformationasacooperativestrategy AT wojtekprzepiorka sharingcompromisinginformationasacooperativestrategy |