333 research outputs found

    Ranking Risks

    Get PDF
    Dr. Fischhoff considers the role of government in helping citizens manage risks. He then offers a general procedure for risk ranking and concludes by discussing what can be done with a list of risks

    Acceptable Risk: A Conceptual Proposal

    Get PDF
    Challenging the de minimis risk concept, Dr. Fischhoff argues that risks ought not to be considered apart from a particular technology\u27s benefits. He argues, too, that the acceptability of particular kinds of risks should not be determined without considering the views of all persons who may be exposed. Finally, building upon the reasonable person construct, he suggests ways those goals might be achieved

    Need to Know: Analytical and Psychological Criteria

    Get PDF

    When Are Preferences Consistent? The Effects of Task Familiarity and Contextual Cues on Revealed and Stated Preferences

    Get PDF
    Traditionally, economists make a sharp distinction between stated and revealed preferences, viewing the latter as more fully meeting the assumptions of economic analysis. Here, we consider one form of empirical evidence regarding this belief: the consistency of choices in stated and revealed preference tasks. We show that both kinds of task can produce consistent choices, suggesting that both can measure underlying preferences, if necessary conditions are met. We propose that a necessary condition is that task be either familiar to those facing it or offer contextual cues that substitute for familiarity, such as prices in competitive markets or recommendations from trusted, knowledgeable sources. We show that how well decision makers achieve such understanding is often confounded with the method that researchers use. Considering task familiarity not only clarifies some of the conflicting evidence regarding revealed and stated preference methods, but raises potentially productive questions regarding the roles of social institutions in shaping preferences.Consistency, contingent valuation, framing, public goods, revealed preferences, stated preferences, validity

    Counting casualties: A framework for respectful, useful records

    Get PDF
    Counting casualties in conflict zones faces both practical and ethical concerns. Drawing on procedures from risk analysis, we propose a general approach. It represents each death by standard features, having either essential value, for capturing the social and cultural meaning of individual casualties, or instrumental value, for relating patterns of casualties to possible causes and effects. We illustrate the approach with the choices involved in attempts to record casualties in Iraq and the Israel-Palestine conflict, and with natural disasters, as exemplified by Hurricane Katrina. We advocate institutionalizing the approach, so that recording casualties increases understanding, rather than suspicio

    Prejudices about Bias

    Get PDF
    38 pagesMuch recent research in the area of judgment and decision making has been dominated by documentation of ways in which people's intuitive thought processes can lead them astray. Like other psychological results that have cast doubt on people's abilities, these accounts have generated considerable controversy. From the set of criticisms that have been raised, a set of generic criticisms that could be raised is developed here. These include aspersions of methodological malpractice, advancement of alternative standards of optimality, and development of error theories showing the insensitivity of events to these kinds of problems. Considering these critici.sms in general form offers some perspectives on the continuing debate, some guidance on how to improve its productivity, and some hypotheses for analyzing analogous controversies elsewhere in psychology

    Mutually Assured Support: A security doctrine for terrorist nuclear weapons threats (Special Issue: Terrorism Briefing for the New President)

    Get PDF
    If the United States were subject to a terrorist nuclear attack, its president would face overwhelming political pressure to respond decisively. A well-prepared response could help both to prevent additional attacks and to bring the perpetrators to justice. An instinctive response could be cataclysmically ineffective, inflicting enormous collateral damage without achieving either deterrence or justice. An international security doctrine of Mutually Assured Support can make the response to such attacks more effective as well as less likely—by requiring preparations that reduce the threat. The doctrine requires all subscribing nations to mobilize fully in support of the attacked nation, in return for a promise of nonretaliation. It provides a vehicle for domestic and international leadership, allowing the president to engage the American people, from a position of strength, around an issue that has had little public discussion. The authors describe its rationale, implications, and implementation

    Correction To: Better Beware: Comparing Metacognition for Phishing and Legitimate Emails (Metacognition and Learning, (2019), 14, 3, (343-362), 10.1007/S11409-019-09197-5)

    Get PDF
    The article Better beware: comparing metacognition for phishing and legitimate emails , written by Casey Inez Canfield, Baruch Fischhoff and Alex Davis, was originally published electronically on the publisher\u27s internet portal (currently SpringerLink) on 20 July 2019 without open access

    Better Beware: Comparing Metacognition for Phishing and Legitimate Emails

    Get PDF
    Every electronic message poses some threat of being a phishing attack. If recipients underestimate that threat, they expose themselves, and those connected to them, to identity theft, ransom, malware, or worse. If recipients overestimate that threat, then they incur needless costs, perhaps reducing their willingness and ability to respond over time. In two experiments, we examined the appropriateness of individuals\u27 confidence in their judgments of whether email messages were legitimate or phishing, using calibration and resolution as metacognition metrics. Both experiments found that participants had reasonable calibration but poor resolution, reflecting a weak correlation between their confidence and knowledge. These patterns differed for legitimate and phishing emails, with participants being better calibrated for legitimate emails, except when expressing complete confidence in their judgments, but consistently overconfident for phishing emails. The second experiment compared performance on the laboratory task with individuals\u27 actual vulnerability, and found that participants with better resolution were less likely to have malicious files on their home computers. That comparison raised general questions about the design of anti-phishing training and of providing feedback essential to self-regulated learning
    • …
    corecore