Trust and Political Economy: Comparing the Effects of Institutions on Inter-Firm Cooperation

Cooperation between small firms in “industrial districts,” where the production process may be radically dis-integrated, poses an important challenge to current political science theories of trust and cooperation. In this article, the author suggests that the problems posed by these districts—the existence of apparently irrational forms of trust in the political economy and of high-trust forms of cooperation in societies with low levels of interpersonal trust—may be explained if one adopts a more sophisticated institutional approach. The author shows how institutions may affect trust between economic actors and thus cooperation in two case studies of industrial districts, mechanical engineering in Bologna, Italy, and Stuttgart, Germany, and shows that empirical evidence supports the hypothesis that trust may depend on institutions and vary with institutional context.

Henry Farrell (2005),”Trust and Political Economy: Comparing the Effects of Institutions on Inter-Firm Cooperation,” Comparative Political Studies, 38, 5:459-483.

Access the full article here

Other Writing:

Essay

The Twilight of America’s Financial Empire – with Abraham Newman

When Iraqi lawmakers voted to expel U.S. forces from the country earlier this month, the Trump administration’s response was swift and forceful: it refused to withdraw and, for good measure, threatened financial retaliation, saying it would freeze Iraq’s accounts at the U.S. Federal Reserve. The threat seems to have been effective. Although Iraqi officials still ...
Read Article
Essay

Defending Democratic Mechanisms and Institutions against Disinformation Attacks – with Bruce Schneier

To better understand influence attacks, we proposed an approach that models democracy itself as an information system and explains how democracies are vulnerable to certain forms of information attacks that autocracies naturally resist. Our model combines ideas from both international security and computer security, avoiding the limitations of both in explaining how influence attacks may ...
Read Article