Exploitative Epistemic Trust

In Trust in Epistemology. New York City, New York, Vereinigte Staaten: pp. 241-264 (2020)
Download Edit this record How to cite View on PhilPapers
Abstract
Where there is trust, there is also vulnerability, and vulnerability can be exploited. Epistemic trust is no exception. This chapter maps the phenomenon of the exploitation of epistemic trust. I start with a discussion of how trust in general can be exploited; a key observation is that trust incurs vulnerabilities not just for the party doing the trusting, but also for the trustee (after all, trust can be burdensome), so either party can exploit the other. I apply these considerations to epistemic trust, specifically in testimonial relationships. There, we standardly think of a hearer trusting a speaker. But we miss an important aspect of this relationship unless we consider too that the speaker standardly trusts the hearer. Given this mutual trust, and given that both trustees and trusters can exploit each other, we have four possibilities for exploitation in epistemic-trust relationships: a speaker exploiting a hearer (a) by accepting his trust or (b) by imposing her trust on him, and a hearer exploiting a speaker (c) by accepting her trust or (d) by imposing his trust on her. One result is that you do not need to betray someone to exploit him – you can exploit him just as easily by doing what he trusts you for.
Categories
(categorize this paper)
PhilPapers/Archive ID
DOREET-2
Upload history
Archival date: 2019-11-08
View other versions
Added to PP index
2019-11-08

Total views
306 ( #21,792 of 2,454,404 )

Recent downloads (6 months)
78 ( #8,488 of 2,454,404 )

How can I increase my downloads?

Downloads since first upload
This graph includes both downloads from PhilArchive and clicks on external links on PhilPapers.