146,580 research outputs found

    Insensitivity to social reputation in autism

    Get PDF
    People act more prosocially when they know they are watched by others, an everyday observation borne out by studies from behavioral economics, social psychology, and cognitive neuroscience. This effect is thought to be mediated by the incentive to improve one's social reputation, a specific and possibly uniquely human motivation that depends on our ability to represent what other people think of us. Here we tested the hypothesis that social reputation effects are selectively impaired in autism, a developmental disorder characterized in part by impairments in reciprocal social interactions but whose underlying cognitive causes remain elusive. When asked to make real charitable donations in the presence or absence of an observer, matched healthy controls donated significantly more in the observer's presence than absence, replicating prior work. By contrast, people with high-functioning autism were not influenced by the presence of an observer at all in this task. However, both groups performed significantly better on a continuous performance task in the presence of an observer, suggesting intact general social facilitation in autism. The results argue that people with autism lack the ability to take into consideration what others think of them and provide further support for specialized neural systems mediating the effects of social reputation

    The mechanics of trust: a framework for research and design

    Get PDF
    With an increasing number of technologies supporting transactions over distance and replacing traditional forms of interaction, designing for trust in mediated interactions has become a key concern for researchers in human computer interaction (HCI). While much of this research focuses on increasing users’ trust, we present a framework that shifts the perspective towards factors that support trustworthy behavior. In a second step, we analyze how the presence of these factors can be signalled. We argue that it is essential to take a systemic perspective for enabling well-placed trust and trustworthy behavior in the long term. For our analysis we draw on relevant research from sociology, economics, and psychology, as well as HCI. We identify contextual properties (motivation based on temporal, social, and institutional embeddedness) and the actor's intrinsic properties (ability, and motivation based on internalized norms and benevolence) that form the basis of trustworthy behavior. Our analysis provides a frame of reference for the design of studies on trust in technology-mediated interactions, as well as a guide for identifying trust requirements in design processes. We demonstrate the application of the framework in three scenarios: call centre interactions, B2C e-commerce, and voice-enabled on-line gaming

    Screening, Competition, and Job Design

    Get PDF
    In recent decades, many firms offered more discretion to their employees, often increasing the productivity of effort but also leaving more opportunities for shirking. These “high-performance work systems” are difficult to understand in terms of standard moral hazard models. We show experimentally that complementarities between high effort discretion, rent-sharing, screening opportunities, and competition are important driving forces behind these new forms of work organization. We document in particular the endogenous emergence of two fundamentally distinct types of employment strategies. Employers either implement a control strategy, which consists of low effort discretion and little or no rent-sharing, or they implement a trust strategy, which stipulates high effort discretion and substantial rent-sharing. If employers cannot screen employees, the control strategy prevails, while the possibility of screening renders the trust strategy profitable. The introduction of competition substantially fosters the trust strategy, reduces market segmentation, and leads to large welfare gains for both employers and employees

    Cheating-Resilient Incentive Scheme for Mobile Crowdsensing Systems

    Full text link
    Mobile Crowdsensing is a promising paradigm for ubiquitous sensing, which explores the tremendous data collected by mobile smart devices with prominent spatial-temporal coverage. As a fundamental property of Mobile Crowdsensing Systems, temporally recruited mobile users can provide agile, fine-grained, and economical sensing labors, however their self-interest cannot guarantee the quality of the sensing data, even when there is a fair return. Therefore, a mechanism is required for the system server to recruit well-behaving users for credible sensing, and to stimulate and reward more contributive users based on sensing truth discovery to further increase credible reporting. In this paper, we develop a novel Cheating-Resilient Incentive (CRI) scheme for Mobile Crowdsensing Systems, which achieves credibility-driven user recruitment and payback maximization for honest users with quality data. Via theoretical analysis, we demonstrate the correctness of our design. The performance of our scheme is evaluated based on extensive realworld trace-driven simulations. Our evaluation results show that our scheme is proven to be effective in terms of both guaranteeing sensing accuracy and resisting potential cheating behaviors, as demonstrated in practical scenarios, as well as those that are intentionally harsher

    Towards Secure Blockchain-enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory

    Full text link
    In Internet of Vehicles (IoV), data sharing among vehicles is essential to improve driving safety and enhance vehicular services. To ensure data sharing security and traceability, highefficiency Delegated Proof-of-Stake consensus scheme as a hard security solution is utilized to establish blockchain-enabled IoV (BIoV). However, as miners are selected from miner candidates by stake-based voting, it is difficult to defend against voting collusion between the candidates and compromised high-stake vehicles, which introduces serious security challenges to the BIoV. To address such challenges, we propose a soft security enhancement solution including two stages: (i) miner selection and (ii) block verification. In the first stage, a reputation-based voting scheme for the blockchain is proposed to ensure secure miner selection. This scheme evaluates candidates' reputation by using both historical interactions and recommended opinions from other vehicles. The candidates with high reputation are selected to be active miners and standby miners. In the second stage, to prevent internal collusion among the active miners, a newly generated block is further verified and audited by the standby miners. To incentivize the standby miners to participate in block verification, we formulate interactions between the active miners and the standby miners by using contract theory, which takes block verification security and delay into consideration. Numerical results based on a real-world dataset indicate that our schemes are secure and efficient for data sharing in BIoV.Comment: 12 pages, submitted for possible journal publicatio
    • …
    corecore