Abstract

Well-enforced norms create an opportunity for norm breakers to cooperate in ventures requiring trust. This is realized when norm breakers, by sharing evidence of their breaches, make themselves vulnerable to denunciation and therefore trustworthy. The sharing of compromising information (SCI) is a strategy employed by criminals, politicians, and other actors wary of their partners’ trustworthiness in which the cost of ensuring compliance is offloaded on clueless norm enforcers. Here we introduce SCI as a sui generis cooperative strategy and test its functioning experimentally. In our experiment, subjects first acquire the label “dove” or “hawk” depending on how cooperative or uncooperative they are, respectively. Hawks acquire compromising information embodied in their label and can reveal it before an interaction with trust at stake. Unlike doves, hawks who reveal their label make themselves vulnerable to their partners, who can inflict a penalty on them after interaction. We find that even students in as artificial a setting as a computerized decision laboratory grasp the advantage of SCI and use it to cooperate. Our results corroborate the idea that compromising information can be conceived as a “hostage” that, when mutually exchanged, makes each party to the interaction vulnerable and therefore trustworthy in joint endeavours.

Highlights

  • Well-enforced norms create an opportunity for norm breakers to cooperate in ventures requiring trust

  • How can criminals trust one another to share the robbery’s loot fairly? How can politicians trust their comrades’ promises of future rewards to be delivered in return for their present support? How can adulterers trust that their lovers will never blackmail them? sharing of compromising information (SCI), we argue, is one powerful answer

  • At the end of the first part (T0), 92 subjects (49.5 percent) had defected fewer than three times and received the label “dove,” and 94 subjects (50.5 percent) had defected three times or more and received the label “hawk.” Figure 3 shows the proportion of decisions to stay out, cooperate, and defect made by doves, by hawks, and overall in the first part of our experiment

Read more

Summary

Introduction

Well-enforced norms create an opportunity for norm breakers to cooperate in ventures requiring trust. Hypothesis 3 (H3): In the VG with an information-sharing stage and a norm-enforcement stage, a dove will trust and cooperate with another dove as much as a hawk with a hawk and more than a dove with a hawk or a hawk with a dove.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call