Sharing Compromising Information as a Cooperative Strategy

Well-enforced norms create an opportunity for norm breakers to cooperate in ventures requiring trust. This is realized when norm breakers, by sharing evidence of their breaches, make themselves vulnerable to denunciation and therefore trustworthy. The sharing of compromising information (SCI) is a s...

Full description

Bibliographic Details
Main Authors: Diego Gambetta, Wojtek Przepiorka
Format: Article
Language:English
Published: Society for Sociological Science 2019-05-01
Series:Sociological Science
Subjects:
Online Access:https://www.sociologicalscience.com/articles-v6-14-352/
_version_ 1811312609630093312
author Diego Gambetta
Wojtek Przepiorka
author_facet Diego Gambetta
Wojtek Przepiorka
author_sort Diego Gambetta
collection DOAJ
description Well-enforced norms create an opportunity for norm breakers to cooperate in ventures requiring trust. This is realized when norm breakers, by sharing evidence of their breaches, make themselves vulnerable to denunciation and therefore trustworthy. The sharing of compromising information (SCI) is a strategy employed by criminals, politicians, and other actors wary of their partners’ trustworthiness in which the cost of ensuring compliance is offloaded on clueless norm enforcers. Here we introduce SCI as a sui generis cooperative strategy and test its functioning experimentally. In our experiment, subjects first acquire the label “dove” or “hawk” depending on how cooperative or uncooperative they are, respectively. Hawks acquire compromising information embodied in their label and can reveal it before an interaction with trust at stake. Unlike doves, hawks who reveal their label make themselves vulnerable to their partners, who can inflict a penalty on them after interaction. We find that even students in as artificial a setting as a computerized decision laboratory grasp the advantage of SCI and use it to cooperate. Our results corroborate the idea that compromising information can be conceived as a “hostage” that, when mutually exchanged, makes each party to the interaction vulnerable and therefore trustworthy in joint endeavours.
first_indexed 2024-04-13T10:40:15Z
format Article
id doaj.art-60f8a25dcabf4e6d92bab35eaa48604b
institution Directory Open Access Journal
issn 2330-6696
2330-6696
language English
last_indexed 2024-04-13T10:40:15Z
publishDate 2019-05-01
publisher Society for Sociological Science
record_format Article
series Sociological Science
spelling doaj.art-60f8a25dcabf4e6d92bab35eaa48604b2022-12-22T02:49:57ZengSociety for Sociological ScienceSociological Science2330-66962330-66962019-05-0161435237910.15195/v6.a14Sharing Compromising Information as a Cooperative StrategyDiego Gambetta0Wojtek Przepiorka1Collegio Carlo Alberto, TorinoUtrecht UniversityWell-enforced norms create an opportunity for norm breakers to cooperate in ventures requiring trust. This is realized when norm breakers, by sharing evidence of their breaches, make themselves vulnerable to denunciation and therefore trustworthy. The sharing of compromising information (SCI) is a strategy employed by criminals, politicians, and other actors wary of their partners’ trustworthiness in which the cost of ensuring compliance is offloaded on clueless norm enforcers. Here we introduce SCI as a sui generis cooperative strategy and test its functioning experimentally. In our experiment, subjects first acquire the label “dove” or “hawk” depending on how cooperative or uncooperative they are, respectively. Hawks acquire compromising information embodied in their label and can reveal it before an interaction with trust at stake. Unlike doves, hawks who reveal their label make themselves vulnerable to their partners, who can inflict a penalty on them after interaction. We find that even students in as artificial a setting as a computerized decision laboratory grasp the advantage of SCI and use it to cooperate. Our results corroborate the idea that compromising information can be conceived as a “hostage” that, when mutually exchanged, makes each party to the interaction vulnerable and therefore trustworthy in joint endeavours.https://www.sociologicalscience.com/articles-v6-14-352/Information SharingTrustCooperationSocial NormsNorm EnforcementVenture Game
spellingShingle Diego Gambetta
Wojtek Przepiorka
Sharing Compromising Information as a Cooperative Strategy
Sociological Science
Information Sharing
Trust
Cooperation
Social Norms
Norm Enforcement
Venture Game
title Sharing Compromising Information as a Cooperative Strategy
title_full Sharing Compromising Information as a Cooperative Strategy
title_fullStr Sharing Compromising Information as a Cooperative Strategy
title_full_unstemmed Sharing Compromising Information as a Cooperative Strategy
title_short Sharing Compromising Information as a Cooperative Strategy
title_sort sharing compromising information as a cooperative strategy
topic Information Sharing
Trust
Cooperation
Social Norms
Norm Enforcement
Venture Game
url https://www.sociologicalscience.com/articles-v6-14-352/
work_keys_str_mv AT diegogambetta sharingcompromisinginformationasacooperativestrategy
AT wojtekprzepiorka sharingcompromisinginformationasacooperativestrategy