scholarly journals Evaluating the relative contributions of copying and reconstruction processes in cultural transmission episodes

PLoS ONE ◽  
2021 ◽  
Vol 16 (9) ◽  
pp. e0256901
Author(s):  
James W. A. Strachan ◽  
Arianna Curioni ◽  
Merryn D. Constable ◽  
Günther Knoblich ◽  
Mathieu Charbonneau

The ability to transmit information between individuals through social learning is a foundational component of cultural evolution. However, how this transmission occurs is still debated. On the one hand, the copying account draws parallels with biological mechanisms for genetic inheritance, arguing that learners copy what they observe and novel variations occur through random copying errors. On the other hand, the reconstruction account claims that, rather than directly copying behaviour, learners reconstruct the information that they believe to be most relevant on the basis of pragmatic inference, environmental and contextual cues. Distinguishing these two accounts empirically is difficult based on data from typical transmission chain studies because the predictions they generate frequently overlap. In this study we present a methodological approach that generates different predictions of these accounts by manipulating the task context between model and learner in a transmission episode. We then report an empirical proof-of-concept that applies this approach. The results show that, when a model introduces context-dependent embedded signals to their actions that are not intended to be transmitted, it is possible to empirically distinguish between competing predictions made by these two accounts. Our approach can therefore serve to understand the underlying cognitive mechanisms at play in cultural transmission and can make important contributions to the debate between preservative and reconstructive schools of thought.

2018 ◽  
Vol 28 (1) ◽  
pp. 3-9 ◽  
Author(s):  
Gesine Dreisbach ◽  
Kerstin Fröber

Goal-directed behavior in a constantly changing environment requires a dynamic balance between two antagonistic modes of control: On the one hand, goals need to be maintained and shielded from distraction (stability), and on the other hand, goals need to be relaxed and flexibly updated whenever significant changes occur (flexibility). A dysregulation of this stability-flexibility balance can result in overly rigid or overly distractible behavior, and it is therefore important to understand how this balance is regulated in a context-sensitive, adaptive manner. In the present article, we review recent evidence on how positive affect, reward prospect, and task context modulate the stability-flexibility balance. Two distinct underlying cognitive mechanisms will be discussed: Flexibility may result either from lowering the updating threshold in working memory or from keeping multiple tasks active in working memory. Critically, these two mechanisms allow different (testable) predictions: Whereas lowering the updating threshold should ease the access of new information in working memory and thereby increase flexibility in general, concurrent task activation should only increase flexibility between the respective tasks.


2019 ◽  
Author(s):  
Ángel V. Jiménez ◽  
Alex Mesoudi

Cultural evolutionary theories define prestige as social rank that is freely conferred on individuals possessing superior knowledge or skill, in order to gain opportunities to learn from such individuals. Consequently, information provided by prestigious individuals should be more memorable, and hence more likely to be culturally transmitted, than information from non-prestigious sources, particularly for novel, controversial arguments about which pre-existing opinions are absent or weak. It has also been argued that this effect extends beyond the prestigious individual’s relevant domain of expertise. We tested whether the prestige and relevance of the sources of novel, controversial arguments affected the transmission of those arguments, independently of their content. In a four-generation linear transmission chain experiment, British participants (N=192) recruited online read two conflicting arguments in favour of or against the replacement of textbooks by computer tablets in schools. Each of the two conflicting arguments was associated with one of three sources with different levels of prestige and relevance (high prestige, high relevance; high prestige, low relevance; low prestige, low relevance). Participants recalled the pro-tablets and anti-tablets arguments associated with each source and their recall was then passed to the next participant within their chain. Contrary to our predictions, we did not find a reliable effect of either the prestige or relevance of the sources of information on transmission fidelity. We discuss whether the lack of a reliable effect of prestige on recall might be a consequence of differences between how prestige operates in this experiment and in everyday life.


2021 ◽  
pp. 1-26
Author(s):  
Ruth Schmidt ◽  
Katelyn Stenger

Abstract Despite widespread recognition that behavioral public policy (BPP) needs to move beyond nudging if the field is to achieve more significant impact, problem-solving approaches remain optimized to achieve tactical success and are evaluated by short-term metrics with the assumption of stable systems. As a result, current methodologies may contribute to the development of solutions that appear well formed but become ‘brittle’ in the face of more complex contexts if they fail to consider important contextual cues, broader system forces, and emergent conditions, which can take three distinct forms: contextual, systemic, and anticipatory brittleness. The Covid-19 pandemic and vaccination rollout present an opportunity to identify and correct interventional brittleness with a new methodological approach – strategic BPP (SBPP) – that can inform the creation of more resilient solutions by embracing more diverse forms of evidence and applied foresight, designing interventions within ecosystems, and iteratively developing solutions. To advance the case for adopting a SBPP and ‘roughly right’ modes of inquiry, we use the Covid-19 vaccination rollout to define a new methodological roadmap, while also acknowledging that taking a more strategic approach may challenge current BPP norms.


2003 ◽  
Vol 14 (4) ◽  
pp. 339-355
Author(s):  
Javier Alfonso Gil

Because bioeconomics is born of the interaction between the biological activity system and its socio-economic activity system, a holistic methodological approach is essential to study the relations between them. However, it must search for increasing levels of reductionism within each discipline to delve into the ultimate nature of each one of the intervening forces, whether economic or biological. This paper explores the economic forces. Through the biological capacity to comprehend, man and by extension, society, accumulates knowledge, the fulcrum from which he is able to dominate over his natural habitat. From this ‘point d’appui’, man builds two basic tools to assist him in achieving the goal of bettering his social condition. On the one hand, he creates institutions that allow him to “live with others” and, on the other, he develops technology that helps him to “live better with others”. Institutions, also referred to as ‘social technology’, tend toward stability over time while technology or ‘material technology’, tends toward instability, which would suggest that, normally, the mechanics of change will originate in material technology and, from there, progress to social technology by way of the political market. The level of progress and development attained depends on the quantity and rate of growth of knowledge applied by a society. In the process, man and his collectivity are forced to adopt new views of their environment through new shared mental models. The concurrence of equipment and political market will ultimately become the prime mover of institutional and economic change as well as change in mentality. Both technologies must keep on an adaptive course of stable evolution since discrepancies arising between them can cause tension between the various social groups. Adequate management of technological shock is essential to avoid extreme situations of social conflict. Herein lie the most important political decisions that a government must confront over the long term.


Finisterra ◽  
2012 ◽  
Vol 36 (72) ◽  
Author(s):  
Teresa Pinto Correia ◽  
António Cancela Abreu ◽  
Rosário Oliveira

IDENTIFICATION AND CHARACTERISATION OF LANDSCAPE IN PORTUGAL –This paper presents the concepts and methodology used in the study «Identification and characterisation of landscape in continental Portugal» undertaken by theDepartment of Landscape and Biophysical Planning of the University of Evora for the General Directorate for Spatial Planning and Urban Development (DGOT-DU) at the Ministry of the Environment and Spatial Planning, between 1999 and 2001. On the one hand, the methodological approach developed is based on the methodologies used recently for the same purpose in different European countries and on the way landscape has been considered in various European documents in the last years. On the other hand, it is also based on the team’s concern to approach the landscape as an holistic entity, and to examine its various components: ecological, cultural, socio-economic and sensorial. The set aim has been to define landscape units and to characterize these units in relation to the present landscape and the recorded trends, related problems and possibilities. Thus, the cartography relative to selected variables has been combined and related to satellite images and field surveys. The results of cross-referencing all this information has than been combined with expert examination of landscape coherence and character within each unit. The assessment was completed after careful bibliographic research and consultation with regional experts. The result is a flexible approach that combines objective analysis with a more subjective assessment, which the team considered fundamental for a true understanding of landscape.


2019 ◽  
Author(s):  
Jennifer M Rodd

This chapter focuses on the process by which stored knowledge about a word’s form (orthographic or phonological) maps onto stored knowledge about its meaning. This mapping is made challenging by the ambiguity that is ubiquitous in natural language: most familiar words can refer to multiple different concepts. This one-to-many mapping from form to meaning within the lexicon is a core feature of word-meaning access. Fluent, accurate word-meaning access requires that comprehenders integrate multiple cues in order to determine which of a word’s possible semantic features are relevant in the current context. Specifically, word-meaning access is guided by (i) distributional information about the a priori relative likelihoods of different word meanings and (ii) a wide range of contextual cues that indicate which meanings are most likely in the current context.


Author(s):  
Tahani Aljohani ◽  
Alexandra I. Cristea

Massive Open Online Courses (MOOCs) have become universal learning resources, and the COVID-19 pandemic is rendering these platforms even more necessary. In this paper, we seek to improve Learner Profiling (LP), i.e. estimating the demographic characteristics of learners in MOOC platforms. We have focused on examining models which show promise elsewhere, but were never examined in the LP area (deep learning models) based on effective textual representations. As LP characteristics, we predict here the employment status of learners. We compare sequential and parallel ensemble deep learning architectures based on Convolutional Neural Networks and Recurrent Neural Networks, obtaining an average high accuracy of 96.3% for our best method. Next, we predict the gender of learners based on syntactic knowledge from the text. We compare different tree-structured Long-Short-Term Memory models (as state-of-the-art candidates) and provide our novel version of a Bi-directional composition function for existing architectures. In addition, we evaluate 18 different combinations of word-level encoding and sentence-level encoding functions. Based on these results, we show that our Bi-directional model outperforms all other models and the highest accuracy result among our models is the one based on the combination of FeedForward Neural Network and the Stack-augmented Parser-Interpreter Neural Network (82.60% prediction accuracy). We argue that our prediction models recommended for both demographics characteristics examined in this study can achieve high accuracy. This is additionally also the first time a sound methodological approach toward improving accuracy for learner demographics classification on MOOCs was proposed.


2015 ◽  
Vol 8 (4) ◽  
pp. 45-60
Author(s):  
B.G. Meshcheryakov ◽  
A.I. Nazarov ◽  
L.G. Chesnokova ◽  
D.V. Yushchenkova

The article describes an experiment which used a new methodological approach to the study of covert recognition of faces by means of registration electro-dermal activity under short-term exposure of familiar and unfamiliar faces and the backward facelike masking stimulus. In contrast to previous studies the control of stimulus awareness allows us to evaluate not just the correct recognitions, but false alarms too. We used as the familiar faces not faces of the well-known persons, but faces of persons from the inner circle of subjects, including the subject’s own face. We confirmed the hypothesis that the characteristics of the electro-dermal reactions in response to familiar and unfamiliar faces will not be different in subjects with a high level of false alarms. However, for the group of subjects with practically zero false alarm rate and zero discriminability of familiar and unfamiliar faces an analysis of electro-dermal reactions have been mixed. On the one hand, as analysis on a group level showed, nor electrocutaneous reactions frequency, nor their amplitudes were not significantly different for the familiar and unfamiliar faces. On the other hand, it is clearly that these individual median and mean values of the amplitudes of subject's reactions are in average more than 2 times stronger when viewed familiar faces than viewed unfamiliar ones. These results leave a good chance to prove the effect of covert identification of faces in further experimentation with other groups of subjects


2021 ◽  
Author(s):  
Alberto Acerbi

Cultural evolution researchers use transmission chain experiments to investigate which content is more likely to survive when transmitted from one individual to another. These experiments resemble oral storytelling, where individuals need to understand, memorise, and reproduce the content. However, prominent contemporary forms of cultural transmission—think an online sharing— only involve the willingness to transmit the content. Here I present two fully preregistered online experiments that explicitly investigated the differences between these two modalities of transmission. The first experiment (N=1080) examined whether negative content, information eliciting disgust, and threat-related information were better transmitted than their neutral counterpart in a traditional transmission chain set-up. The second experiment (N=1200), used the same material, but participants were asked whether they would share or not the content in two conditions: in a large anonymous social network, or with their friends, in their favourite social network. Negative content was both better transmitted in transmission chain experiments and shared more than its neutral counterpart. Threat-related information was successful in transmission chain experiments but not when sharing, and, finally, information eliciting disgust was not advantaged in either. Overall, the results present a composite picture, suggesting that the interactions between the specific content and the medium of transmission are important and, possibly, that content biases are stronger when memorisation and reproduction are involved in the transmission—like in oral transmission—than when they are not—like in online sharing.


Author(s):  
Giovanni Camurati ◽  
Aurélien Francillon ◽  
François-Xavier Standaert

Recently, some wireless devices have been found vulnerable to a novel class of side-channel attacks, called Screaming Channels. These leaks might appear if the sensitive leaks from the processor are unintentionally broadcast by a radio transmitter placed on the same chip. Previous work focuses on identifying the root causes, and on mounting an attack at a distance considerably larger than the one achievable with conventional electromagnetic side channels, which was demonstrated in the low-noise environment of an anechoic chamber. However, a detailed understanding of the leak, attacks that take full advantage of the novel vector, and security evaluations in more practical scenarios are still missing. In this paper, we conduct a thorough experimental analysis of the peculiar properties of Screaming Channels. For example, we learn about the coexistence of intended and unintended data, the role of distance and other parameters on the strength of the leak, the distortion of the leakmodel, and the portability of the profiles. With such insights, we build better attacks. We profile a device connected via cable with 10000·500 traces. Then, 5 months later, we attack a different instance at 15m in an office environment. We recover the AES-128 key with 5000·1000 traces and key enumeration up to 223. Leveraging spatial diversity, we mount some attacks in the presence of obstacles. As a first example of application to a real system, we show a proof-of-concept attack against the authentication method of Google Eddystone beacons. On the one side, this work lowers the bar for more realistic attacks, highlighting the importance of the novel attack vector. On the other side, it provides a broader security evaluation of the leaks, helping the defender and radio designers to evaluate risk, and the need of countermeasures.


Sign in / Sign up

Export Citation Format

Share Document