Tuesday, August 2, 2022

People relied too much on their self-perceptions, which were more negative than the impressions they made; & understood that others saw them more positively than how they saw themselves, but they did not understand the extent of this positivity

Elsaadawy, N., & Carlson, E. N. (2022). Do you make a better or worse impression than you think? Journal of Personality and Social Psychology, Aug 2022. https://doi.org/10.1037/pspp0000434

Abstract: Are people’s metaperceptions, or their beliefs about how others perceive them, too positive, too negative, or spot on? Across six samples of new acquaintances (total N = 1,113) and/or well-known acquaintances (total N = 1,336), we indexed metabias (i.e., the mean-level difference between metaperceptions and impressions) on a broad range of attributes to test: (a) how biased people are on average, (b) whether bias is pervasive or limited to particular contexts (level of acquaintanceship) or attributes (e.g., liking judgments or traits), (c) whether bias is consistent across attributes, and (d) what explains bias. On average, participants demonstrated a negative metabias on most attributes for both new and well-known acquaintances, suggesting that people generally fail to appreciate how positively they are seen by others. However, there was variability around this average such that, whereas most participants were negatively biased (48%), many were accurate (34%), and some were positively biased (18%). Bias was also consistent across traits, suggesting that knowing people’s metabias for one attribute offers some insight into their relative bias for other attributes. What explained metabias? Generally, people relied too much on their self-perceptions, which were more negative than the impressions they made, although bias for new acquaintances involved additional factors. That said, people understood that others saw them more positively than how they saw themselves, but they did not understand the extent of this positivity. These results offer a general framework for understanding metabias and add to the growing literature, demonstrating that people are not positively biased. 


Rolf Degen summarizing... Sociologists conduct comparatively very few replications, but it looks like it would turn out badly if they did

Reproducibility in the Social Sciences. James W. Moody et al. Annual Review of Sociology, Vol. 48:65-85 (July 2022). https://doi.org/10.1146/annurev-soc-090221-035954

Abstract: Concern over social scientists’ inability to reproduce empirical research has spawned a vast and rapidly growing literature. The size and growth of this literature make it difficult for newly interested academics to come up to speed. Here, we provide a formal text modeling approach to characterize the entirety of the field, which allows us to summarize the breadth of this literature and identify core themes. We construct and analyze text networks built from 1,947 articles to reveal differences across social science disciplines within the body of reproducibility publications and to discuss the diversity of subtopics addressed in the literature. This field-wide view suggests that reproducibility is a heterogeneous problem with multiple sources for errors and strategies for solutions, a finding that is somewhat at odds with calls for largely passive remedies reliant on open science. We propose an alternative rigor and reproducibility model that takes an active approach to rigor prior to publication, which may overcome some of the shortfalls of the postpublication model.

Keywords: data replication, reproducibility


Deadly fungus can multiply by having sex, which could produce more drug-resistant, virulent strains

Yue Wang, Jianping Xu. Population genomic analyses reveal evidence for limited recombination in the superbug Candida auris in nature. Computational and Structural Biotechnology Journal, 2022; 20: 3030 DOI: 10.1016/j.csbj.2022.06.030

Abstract: Candida auris is a recently emerged, multidrug-resistant pathogenic yeast capable of causing a diversity of human infections worldwide. Genetic analyses based on whole-genome sequences have clustered strains in this species into five divergent clades, with each clade containing limited genetic variation and one of two mating types, MTLa or MTLα. The patterns of genetic variations suggest simultaneous emergence and clonal expansion of multiple clades of this pathogen across the world. At present, it is unclear whether recombination has played any role during the evolution of C. auris. In this study, we analyzed patterns of associations among single nucleotide polymorphisms in both the nuclear and the mitochondrial genomes of 1,285 strains to investigate potential signatures of recombination in natural C. auris populations. Overall, we found that polymorphisms in the nuclear and mitochondrial genomes clustered the strains similarly into the five clades, consistent with a lack of evidence for recombination among the clades after their divergence. However, variable percentages of SNP pairs showed evidence of phylogenetic incompatibility and linkage equilibrium among samples in both the nuclear and the mitochondrial genomes, with the percentages higher in the total population than those within individual clades. Our results are consistent with limited but greater frequency of recombination before the divergence of the clades than afterwards. SNPs at loci related to antifungal resistance showed frequencies of recombination similar to or lower than those observed for SNPs in other parts of the genome. Together, though very limited, evidence for the observed recombination for both before and after the divergence of the clades suggests the possibility for continuous genetic exchange in natural populations of this important yeast pathogen.

4. Discussions

In this study, we analyzed the whole genome SNPs of 1,286 C. auris strains collected from across the world over the past 20+ years to investigate the potential signatures of recombination in this species. SNPs in both the nuclear and mitochondrial genomes were analyzed, both in the total sample as well as for each of the four clades where multiple strains have been sequenced. Our analyses revealed signatures of infrequent recombination in both the total sample as well as within each of the four individual clades. In addition, specific groups of SNPs, including those in genes involved in antifungal drug resistance as well as those that are shared among all four clades, were separately analyzed to help identify the potential contributors to the observed signatures of recombination. Different patterns of allelic associations were found among the sample types and between the nuclear and mitochondrial genomes. Below we discuss the main findings of our analyses and the major implications of our results.

4.1. Comparison between nuclear and mitochondrial genomes

The 1,285 genomes analyzed here represented all the strains of C. auris that have been sequenced and deposited in GenBank by researchers, up to May 2022. Multiple studies have analyzed variable numbers of strains, with the largest number of strains analyzed by Muñoz et al. [20] where 304 strains from many geographic regions were included. Most studies have focused on nuclear genomes. Analyses of nuclear genomes in those studies revealed that the global population of C. auris could be grouped into five distinct clades, with Clades I to IV represented by multiple strains in each while Clade V was represented by only one whole-genome sequenced strain (so far). However, one previous study analyzed mitogenome variations. Based on mitogenome SNPs of 130 C. auris strains, Misas et al. [69] showed that the mitogenome and nuclear genome SNPs clustered the strains into four similar clades. However, their analyses included only one Clade II strain and their results based on 10 Clade III strains from South Africa revealed no mitogenome sequence variation within Clade III. Our analyses here significantly expanded the sample sizes of all four clades with a total of 1,285 strains. While a similar pattern of sequence divergence within C. auris into five clades for both the nuclear genome and the mitochondrial genome was observed as previously reported (20,70), our analyses also revealed several notable features. Specifically, first, despite having more than twice as many strains as the earlier study (210 vs 86), we found no unambiguous SNP within the mitogenome of Clade IV, similar to that found by Misas et al. [69]. Second, the inclusion of 23 additional Clade II strains (versis one strain in the Misas et al. study) revealed no mitogenome SNP within Clade II. Third, the inclusion of 504 additional strains from more diverse geographic sources in Clade III (i.e., 514 in this study vs 10 in the Misas et al study) revealed abundant mitogenome SNPs within Clade III. Together, these analyses revealed that the amounts of sequence variations between the nuclear and mitochondrial genomes differed at both the whole species as well as within individual clades. At the whole species level, the SNP frequency in the nuclear genome was 1.876% (232,179/12.37×106), about six times of that of the mitochondrial genome (0.315%; 89/28212).

The lower observed genetic variation in the mitochondrial genome than in the nuclear genome has been reported in several other fungal species, including the human pathogen Cryptococcus gattii species complex and the ectomycorrhizal mushroom Tricholoma matsutake species complex [71][72][73]. However within individual clades, while two clades (Clades II and IV) showed limited to no mitochondrial SNPs (consistent with the overall pattern within the species), the remaining two clades (Clades I and III) showed greater mitochondrial SNP frequencies than their respective nuclear genomes. At present, the mechanisms for the different amounts of sequence diversity between the two genomes among the clades are unknown. The small sample size and limited ecological niches (mostly from ear discharges) might have contributed to no mitochondrial sequence variation in Clade II. However, this explanation cannot hold for Clade IV where 210 strains from four continents and a variety of human body sites were examined, similar to those of Clades I and III strains in this study (Table S1). Geographically, strains of Clades II and IV are predominantly found in East Asia and the Americas respectively while Clades I and III are predominantly from South Asia and Africa respectively. It is possible that the higher temperature and other potential environmental factors in South Asia and Africa may have contributed to the higher mutation rates in mitochondrial genomes than in nuclear genomes in Clades I and III. The mechanisms for the observed divergent mitochondrial vs nuclear genetic variations among the four clades within C. auris remain to be elucidated.

4.2. Evidence of recombination

At both the species and individual clade levels, though the frequencies were generally low, evidence for PI was observed in both the nuclear and the mitochondrial genomes, with a significant proportion of those PI SNP pairs also in linkage equilibrium. However, the frequencies of PI SNP pairs differed among the samples. Overall, the frequency of nuclear PI SNP pairs at the species level was from twice to over 30 times of those within individual clades (Table 3Table 4). A similar pattern was also observed for the mitochondrial genome SNPs. Together, these results suggested that there was more frequent recombination before the divergence of the clades than after individual clades were established. Specifically, though signatures of recombination were also detected within each of the four clades after their respective divergence, clonal reproduction and expansion seemed more dominant in natural populations of C. auris after the divergence of clades than before their divergence. Our observed pattern is largely consistent with the expectations of each clade having only one mating type and therefore less likely to mate and recombine among strains of the same clade.

Relative to the frequent reports of recombination in the nuclear genomes of fungal populations, reports of mitochondrial genome recombination are still rare. However, the list of fungal species and populations showing evidence of mitogenome recombination is growing. For example, since 1998, mitochondrial DNA recombination has been reported for the honey mushroom Armillaria gallica [74], the commercial button mushroom Agaricus bisporus [75], the wild ectomycorrhizal mushroom Russula virescens species complex [76], and the opportunistic human fungal pathogen Cryptococcus gattii species complex [71]. In the commercial mushroom A. bisporus, the observed frequency of mitochondrial loci with PI was correlated with the life cycles of two varieties within the species, with the outcrossing heterothallic population showing more evidence of mitochondrial genome recombination than the secondarily homothallic populations [75].

Because the ancestral population of C. auris contained strains of both mating types, evidence for recombination in the total sample was expected. The higher rate of SNP pairs that showed evidence for PI than those within individual clades is consistent with sexual recombination in the ancient population of this species. The absence of incongruent relationships among clades between nuclear and mitochondrial genome phylogenies is consistent with the absence of mating and recombination among the four clades after their divergence from each other. However, the observed PIs among SNP pairs within individual clades after their divergence are puzzling. Specifically, each clade is known to contain strains of only one mating type, MTLa for Clades I and IV, and MTLα for Clades II and III. In addition, we found limited evidence of parallel mutations in the genes that are most likely under parallel selective pressure, the antifungal drug resistance-related genes. While we cannot completely exclude the possibility that convergent mutations might have contributed to some of the observed PIs, our analyses revealed that even if they existed, such an effect would likely be minimal. However, evidence for recombination have been found in natural fungal populations known to contain only a single mating type. For example, same-sex mating has been reported in the human fungal pathogen Cryptococcus neoformans species complex and such mating can generate genetic recombinants, similar to what have been reported for opposite-sex mating and to natural populations containing strains of both mating types [77]. It is possible that low-frequency same-sex mating could have similarly happened to the individual C. auris clades to generate the observed PIs and linkage equilibrium. Alternatively, low frequency strains of the alternative mating type may exist within each of the four clades in nature and mating between strains of opposite mating types could have generated the observed signatures of recombination. Indeed, these two possibilities are not mutually exclusive, and both could have contributed to the observed signatures of recombination. Broader and more intensive sampling as well as experimental investigations of genetic crosses are needed in order to test these two possibilities.

4.3. Genes adjacent to clade-shared SNPs

Our analyses revealed three clade-shared SNP regions, with SNPs in two of these regions showing high frequency of PI with other SNPs in the genome. Interestingly, all three clade-shared SNP regions are in intergenic regions between genes coding for hydrolases, oxidoreductases, and transcription factors with potential impacts on cell growth and lifespan (Table 7). For example, the ortholog of B9J08_000508, the downstream gene of clade-shared SNP region 1, is known to regulate the target of rapamycin complex 1 (TORC1) signaling. TORC1 is a multiprotein signaling complex functions as the organizer that incorporate internal and external cues to regulate cell growth and cell cycle progression [78]. A recent study demonstrated that TORC1 signaling plays an important role in controlling NaCl resistance through Sir2 in Saccharomyces cerevisiae [79]. The clade-shared SNPs within the upstream region of TORC1 gene may be involved in regulating the expression levels of TORC1.

Interestingly, the downstream gene of clade-shared SNP region 2, B9J08_002254, codes for a protein containing a putative FMN-binding domain which is known to be most frequently found in bacteria. It has been hypothesized that proteins containing such a domain in fungi may have been horizontally transferred from bacterial to fungal genomes [80]. Indeed, multiple independent transfers of such genes and the associated upstream sequences from bacteria to strains of C. auris in different clades could have contributed to the observed distributions of clade-shared polymorphisms and PIs. Our BLAST searches revealed that based on the amino acid sequence, the closest match to B9J08_002254 was in the bacterial genus Achromobacter, with a 99% query coverage and an E value of 1e-54.

The two genes located upstream and downstream of the clade-shared SNP region #3 were B9J08_003771 and B9J08_003772. Gene B9J08_003771 has a predicted unfolded protein-binding activity, while B9J08_003772 has a predicted DNA-binding transcription factor activity, zinc ion binding activity, and transcriptional regulation activity. The unfolded protein response is known to help human fungal pathogens survive in the host through balancing the load of proteins entering the endoplasmic reticulum and the protein-folding capacity of the organelle [81]. For example, in C. albicans, the zinc finger protein CZF1 is one of the DNA-binding proteins of the Cys6Zn2 class of transcriptional regulators with a multitude of functions such as biofilm induction, hyphal growth regulation, white-opaque switch, and yeast cell adherence [82][83][84][85][86]. While functionally likely important, how the polymorphisms in the intergenic regions of these two genes contribute to strain and population fitness remains to be investigated.

4.4. Conclusions and perspectives

This study identified limited but unambiguous evidence of recombination in both the total sample and within individual clades. In addition, evidence of recombination was found in both the nuclear and mitochondrial genomes, as well as between the nuclear and mitochondrial genomes. Overall, signatures of recombination were more prominent in the total sample than within individual clades, consistent with greater frequencies of recombination before the divergence of the four clades than after their divergence. At present, while several possibilities were suggested, the mechanism(s) for the observed recombination is not known. Nevertheless, the signatures of recombination identified here suggested a number of avenues from which further investigations could be conducted, including more extensive sampling for alternative mating types within each clade, laboratory attempts of both same-sex and opposite-sex mating, and identifying the adaptive significance of clade-shared SNPs. Such investigations should allow us to better understand the genetic architecture of virulence and drug resistance evolution within and among the divergent clades of this pathogen in natural and clinical environments.


Did pollination exist before plants? Yes, some seaweeds depend on crustaceans for fertilization

Did pollination exist before plants? Research shows that seaweeds depend on crustaceans for fertilization. Jeff Ollerton, Xong-Xi Ren. Science Vol 377, Issue No. 6605, Jul 28 2022, pp. 471-472. DOI: 10.1126/science.add3198

Abstract: The sexual reproduction of seed plants involves the transfer of male gametes—in pollen—to their female gametes. In flowering plants (angiosperms), this is performed with the stigma of flowers, whereas the gymnosperms (such as conifers and cycads) produce a diversity of structures on their reproductive axes to accomplish the same task. This transfer of male gametes is generally known as “pollination” and can be mediated by animals, wind, or water. Animal pollination, principally by insects, is the dominant strategy for angiosperms but also occurs in the extant gymnosperms, as well as some species of mosses. Outside of these plants, no other group of organisms has been demonstrated to interact with animals in this way, until now. On page 528 of this issue, Lavaut et al. (1) demonstrate that a living species of red seaweed, Gracilaria gracilis, uses the isopod crustacean Idotea balthica to transfer its male gametes, substantially extending the phylogenetic scope of species that use animals as pollinators.


Monday, August 1, 2022

A review of the genetic basis of problematic Internet use

A review of the genetic basis of problematic Internet use. Anna Maria Werling, Edna Grünblatt. Current Opinion in Behavioral Sciences, Volume 46, August 2022, 101149. https://doi.org/10.1016/j.cobeha.2022.101149

Highlights

PUI is an increasing problem in mental health around the globe.

PUI shares some clinical similarities with other substance-related disorders.

Candidate genes of the serotonergic and dopaminergic pathways have been found in PUI.

Promising multifaceted approaches, include genotyping/phenotyping, and polygenetics.

Transcriptomics and epigenomics may support research, expanding the knowledge of PUI.


Abstract: Problematic Internet use (PUI) has become of increasing interest in mental health. Despite the rising number of PUI in all ages, the exact underpinning etiology is still missing. There is increasing evidence that, in particular, genetic, environmental, and personality factors are involved in the development and maintenance of PUI. However, the neurobiological mechanism of PUI has not been yet extensively investigated, and still reports conflicting results. Previous studies have focused on candidate genes, mainly of the serotonergic, dopaminergic, or acetylcholinergic pathways known partly as risk factors in other substance-use disorders. This review focuses on preexisting literature on the genetic basis of PUI, and implications for future research approaches to fill the gap of its etiology. Understanding the exact etiology and potential genetic mechanism is the basis for a better understanding of PUI and future therapy implications.


Keywords: Problematic Internet useInternet-use disorderInternet addictiongaming disordergambling disordergenegeneticsenvironmentgenome-wide association studySNPstranscriptomicepigenomicpolygenic risk factorbehavioural traitsepigenetic


Genetic evidence for problematic Internet use

PUI is regarded as a multidimensional syndrome with overlapping symptoms for substance-related and addictive disorders [1] and impulse-control disorders 11124130. The syndrome comprises characteristic symptoms, such as impaired control about the use of the Internet, mental engagement with the Internet, symptoms resulted by reduced use such as craving and withdrawal, increasing the amount of use, failed attempts to reduce the Internet use, lying about the extent of the use, loss of interest in activities, difficulties with relationships, and negative psychosocial consequences (e.g. 1142133158157). Recently, two new diagnoses of behavioral addictions were added to Chapter 6 of ICD-11 [147]GD and gambling disorder. Both diagnoses are characterized by a persistent or recurrent pattern of gaming behavior online or offline. Additionally, all three criteria have to be fulfilled, impaired control over play, priority of games over other interests and activities of life, and continuation of gaming, despite negative consequences and impairments in various life areas. Furthermore, the pattern of gaming has to be seen for at least for 12 months, or less when the symptoms are severe. These criteria seem to have been used to date as a blueprint for other PUI behaviors, and in genetic studies. Owing to its above-mentioned characteristic symptoms for alcohol or drug addiction, experts suspect a vulnerability to PUI/IA to be associated with a genetic predisposition [130]. However, in contrast to other forms of addictive behavior (such as gambling and psychoactive substance abuse), only little research has investigated genetic risk factors in PUI. However, growing evidence reveals that behavioral addictions such as IA or compulsive Internet use resemble other substance-related addictions in different views [41] and they probably share similar neurobiological underpinnings. Twin studies to date have demonstrated a moderate-to-high heritability of substance use and addiction [139]. Surprisingly, with regard to the increasing research of PUI, studies exploring the genetic background of PUI are rather limited. Up to date, only few studies have investigated the heritability in PUI 8284 and resulted in 40% up to nearly 70% 4787141. Based on twin studies, some individuals are more susceptible to PUI than others due to their genetic vulnerabilities. Various types of (behavioral) addictions such as substance abuse and gambling have already shown significant gene-loci association, identifying successfully genetic markers 11814349•61. To investigate the interplay between genetic and environmental influences, some studies also focused on specific facets as potential mediating sources such as self-directedness or self-regulation [47]. Here, the heritability varies from being negligible up to explaining 44% of the variation [47]. Other samples investigated the sole genetic role and revealed a highly genetic role up to 68% in a Turkish sample of young twin pairs [31]. Other studies also demonstrated a genetic influence with 41–48% 14187, or 58% in girls and 66% for boys 8284. Other studies investigating mobile-phone use showed moderate heritabilities for various aspects of its use (such as talk and text frequency) and varied from 34% to 60% [94] or IGD from 48% to 66% [64]. Other studies show that the heritability for compulsive Internet disorder for boys is the same with girls [141]. Interestingly, comparing heritability between adults and adolescents, heritability estimates for adults were lower, and for some assessment scales, genetic influence was even negligible compared with adolescents [47]. This shows that the genetic contribution may change over the life span.

Sunday, July 31, 2022

Violence against all, pregnant women & children included: Organized violence from the rulers

This is human nature... From Maribel Fierro's Violence against women in Andalusi historical sources third/ninth-seventh/thirteenth centuries). In: Violence in the Islamic thought from the Quran to the Mongols, Robert Gleave, Istvan Kristo-Nagy, Eds. 2015. Cleaned of references:

The situation in Cordoba during the fitna barbariyya – so-called because the Cordobans rejected and fought against those caliphs who were supported by the Berbers – is described along the same lines: depravity reigned, wine was drunk publicly and adultery and sodomy were allowed. The Cordobans who showed a preference for Sulaymān al-Mustaʿīn – known as the caliph of the Berbers – were killed, together with some of the women who were with them; and other women were eventually sold as if they were prisoners of war. [...]. The caliph Muḥammad b. Hishām b. ʿAbd al-Jabbār al-Mahdī ordered the houses of the Cordoban Berbers to be pillaged and allowed their harems to be violated: women were made captive and sold in the dār al-banāt, and pregnant women were killed.

After al-Mahdī had escaped from Cordoba and was trying to recover his authority, his ally, the general Wāḍiḥ, made a pact with the Christians, according to which, among other things, the Christians were allowed to take the wives of the Berbers they defeated. When al-Mahdi returned to power, in spite of the fact that the Berbers had left Cordoba, he ordered that anybody resembling a Berber be killed, including children and pregnant women.

[...] 

Every man was killed, the harems were dishonoured and the virgins raped: blood fell down to their feet, and they were left naked and crying. The blacks and the lowest soldiers of the Zirid troops took possession of the women, so that their tents became full with them, until the Zirid king Badis took pity on them after three days. They were then left alone, naked and barefoot, and made their way to other villages and fortresses.

[...]

Captivity and enslavement were bad enough, but there was also no lack of cruelty, which is often represented when dealing with the treatment of virgins. The military leader of the Christians [...] included among the captives that were his part of the booty virgins who were eight and ten years old. The conquerors took possession of the houses with their inhabitants and all their belongings: women were raped in front of their relatives, those who were married in front of their husbands, and virgins in front of their fathers, who were powerless, because they were held in chains; Muslim women so abused were eventually passed to slaves, so that they could then take pleasure with them.


It is very difficult to know how much of this is re-writing history to make the previous ruler look bad, how much is propaganda against the religious enemies, etc. But even so, some of these things happened, probably in lesser numbers than we can read in the sources.

Individuals tend to conform to the group's moral judgments even without the presence of the group's members, but people with utilitarian inclinations conform to a greater extent and more frequently than people with deontological inclinations

The Effects of Individual Moral Inclinations on Group Moral Conformity. I. Z Marton-Alper, A. Sobeh, S.G Shamay-Tsoory. Current Research in Behavioral Sciences, July 30 2022, 100078. https://doi.org/10.1016/j.crbeha.2022.100078

Highlights

• Individuals tend to conform to the group's moral judgments even without the presence of the group's members.

• Individual's moral inclination affects their conformity tendency.

• people with utilitarian inclinations conform to a greater extent and more frequently than people with deontological inclinations.

Abstract: Conformity has been shown to affect behaviors ranging from attitudes to moral decisions. The current research examined how individual moral inclination (i.e., utilitarian vs. deontological) affects moral conformity in online settings. To this end we designed a trolley-like moral dilemma paradigm in which participants rated moral decisions both individually and after being exposed to other people's ratings. We validated the task with 363 participants, demonstrating that in online settings individuals tend to conform to the group's moral judgments. Using an additional 346 participants, we showed that individual differences influence the conformity tendency, such that people with utilitarian inclinations conform to a greater extent and more frequently than people with deontological inclinations. We conclude that people with prior utilitarian inclinations are more disposed to moral conformity.

Keywords: ConformityMoralityUtilitarianDeontologicalOnline


Adolescent and young adult daily mobility patterns were moderately to highly heritable

Individual differences in adolescent and young adult daily mobility patterns and their relationships to big five personality traits: a behavioral genetic analysis. Jordan D. Alexander et al. Journal of Research in Personality, July 29 2022, 104277. https://doi.org/10.1016/j.jrp.2022.104277

Abstract: Youth behavior changes and their relationships to personality have generally been investigated using self-report studies, which are subject to reporting biases and confounding variables. Supplementing these with objective measures, like GPS location data, and twin-based research designs, which help control for confounding genetic and environmental influences, may allow for more rigorous, causally informative research on adolescent behavior patterns. To investigate this possibility, this study aimed to (1) investigate whether behavior changes during the transition from adolescence to emerging adulthood are evident in changing mobility patterns, (2) estimate the influence of adolescent personality on mobility patterns, and (3) estimate genetic and environmental influences on mobility, personality, and the relationship between them. Twins aged Fourteen to twenty-two (N=709, 55% female) provided a baseline personality measure, the Big Five Inventory, and multiple years of smartphone GPS data from June 2016 - December 2019. Mobility, as measured by daily locations visited and distance travelled, was found via mixed effects models to increase during adolescence before declining slightly in emerging adulthood. Mobility was positively associated with Extraversion and Conscientiousness (r of 0.17 - 0.25, r of 0.10 - 0.16) and negatively with Openness (r of -0.11 - -0.13). ACE models found large genetic (A = 0.56 - 0.81) and small-moderate environmental (C of 0.12 - 0.28, E of 0.07 - 0.15) influences on mobility. A and E influences were highly shared across mobility measures (rg = 0.70, re= 0.58). Associations between mobility and personality were partially explained by mutual genetic influences (rg of -0.27 - 0.53). Results show that as autonomy increases during adolescence and emerging adulthood, we see corresponding increases in youth mobility. Furthermore, the heritability of mobility patterns and their relationship to personality demonstrate that mobility patterns are informative, psychologically meaningful behaviors worthy of continued interest in psychology.


Introduction

In many cultures, late adolescence is the first period of substantial autonomy during the lifespan. Adolescents spend less time with their parents and more time with their peers and exert far greater control over their daily lives and activities than in childhood (Steinberg & Morris, 2001). In the United States and other western countries, developmental milestones like learning to drive, beginning to work, attending college, and leaving home all take place during late adolescence and further contribute to this expansion of autonomy (Remschmidt, 1994). As adolescents grow increasingly autonomous, adolescent personality plays a greater role in their daily experiences, behavior patterns, and life experiences (Johnson et al., 2013, McAdams et al., 2013). For example, adolescent personality is predictive of engagement in social activities, academic or career aspirations, artistic expression, and interest in recreational drug use (DeYoung et al., 2008; Wrzus et al., 2013). Additionally, life events under some degree of an adolescent’s control, like school suspensions, breaking up with a romantic partner, and starting or losing a job are also significantly associated with adolescent personality (Billig et al., 1996).


As behavior patterns which emerge during adolescence, such as eating habits, exercise, substance use, and sexual decision making, are highly predictive of important health outcomes, understanding how factors like personality contribute to their development carries significant scientific and public health implications (Alberga et al., 2012, Chambers et al., 2003, Sawyer et al., 2018). Understanding how adolescents move through and engage with their environments can help scientists, clinicians, and policy makers understand risk trajectories, identify at risk individuals, and design interventions to reduce the incidence of health problems like obesity or substance use.


Psychologists have historically relied on observational, self-report-based studies to understand developmental changes in adolescent behavior patterns. Self-report surveys are efficient to administer and adaptable to a wide variety of psychological constructs; they have helped us glean important insights into how adolescents’ daily activities change and how they are influenced by factors like personality (Csikszentmihalyi et al., 2014, Wrzus et al., 2013). However, while self-report based observational studies have proven useful, they come with methodological limitations that limit our ability to draw generalizable conclusions. For instance, they do not directly measure behavior, are subject to response biases, are limited by participant self-knowledge, and are often burdensome for participants to complete (Paulus & Vazire, 2007). Additionally, observational research is prone to confounding variables which can produce spurious correlations and render interpretation particularly difficult (Grimes & Schulz, 2002).


The limitations of self-report data can in part be mitigated through additional measures which are less prone to the biases associated with self-report. Smartphone GPS data, for example, can be used to unobtrusively observe and quantify aspects of participants’ daily activities (Harari et al., 2016; Miller, 2012). Smartphone data offer standardized, objective measures of participants’ locations and movement patterns which may be useful in corroborating the findings of existing research on adolescents’ daily lives. Previous research has demonstrated that human mobility patterns can be reliably measured using GPS data (Andrade et al., 2019) and that such patterns are meaningfully related to personality and daily activities in adolescence and young adulthood. Several studies have reported relationships between daily mobility patterns and personality traits in adolescence and young adulthood (Ai et al., 2019, Alessandretti et al., 2018, Stachl et al., 2020). Additionally, mobility based measures have been used to predict adolescent psychological and health outcomes like alcohol use, affect, anxiety and depression symptoms, and sleep patterns in adolescent and college aged samples (Jacobson and Bhattacharya, 2022, Ren et al., 2022, Santani et al., 2018, Sathyanarayana et al., 2016).


However, existing research has been conducted over short time spans in relatively small samples of adolescents, and research observing mobility patterns over the course of adolescence has yet to be conducted. Hence it remains an open question how mobility patterns change during this period of growing autonomy. Such information can help inform claims about how daily life changes during adolescence and help provide further information about whether daily mobility patterns contain useful information about human behavior over longer time spans.


Such research can be further improved by using twin data, which can help us understand where individual differences in adolescents’ daily mobility patterns come from and how they are related to potential explanatory variables like personality. Twin data allows researchers to measure the extent of genetic and environmental contributions to variation in a trait or behavior. Additionally, multivariate behavioral genetic models using twin data can assess whether associations between traits result from mutual genetic or environmental influences. Hence, twin studies can help alleviate the problem of confounding variables in observational research by providing additional understanding of the nature and origins of correlational patterns: helping to parse the extent to which associations between variables are explained by genetic, shared environmental, or non-shared environmental factors (McGue et al., 2010). Twin-based analyses can thereby offer evidence for whether adolescent mobility patterns stem more from heritable traits, such as their preferences for particular activities, or from aspects of their environment, such as how many kilometers away from school they live. Furthermore, measuring the degree of overlapping genetic influences on mobility and personality can offer further insight into why mobility might be heritable, perhaps partly due to the influence of other heritable behavioral traits, like personality.


The present study thus had three primary aims. First, to assess whether changes in autonomy and daily activities which occur during adolescence and emerging adulthood are reflected in adolescent mobility patterns. Second, to investigate how changes in mobility are related to adolescent personality. Third and finally, to estimate how mobility and its relationship to personality are influenced by genetic, shared environmental, and non-shared environmental factors.


Saturday, July 30, 2022

From 2012... Party Evolutions in Moral Intuitions: A Text-Analysis of US Political Party Platforms from 1856-2008

Motyl, Matt, Party Evolutions in Moral Intuitions: A Text-Analysis of US Political Party Platforms from 1856-2008 (October 8, 2012). SSRN: http://dx.doi.org/10.2139/ssrn.2158893

Abstract: The theory of political realignments has been debated since its conception. The prevailing perspective is that critical political realignments generally do not occur in the way they were initially described. Rather, it seems more likely that if political realignments occur, they tend to be more gradual, secular realignments akin to issue evolution where parties slowly change their positions on issues over time. The focus of this analysis is on examining how each party’s moral intuitions change, as determined by a textual analysis of the Democratic and Republican party’s platforms from 1856-2008. The data suggest that, in general, the usage of words related to each of 5 moral intuitions move together over time for both parties. However, in 1896 and 1932, the Democratic and Republican parties diverge in their emphasis on harm, fairness, and authority-related moral intuitions. Furthermore, it appears that the clearest instance of party evolution in their moral intuitions occurred between 1896 and 1932, suggesting a fundamental shift in both party’s views of the federal government’s role in promoting individual welfare.

Keywords: morality, moral foundations, moral intuitions, polarization, realignment, party platforms, Democrat, Republican





Women tend to consume luxury goods as a way to signal their mating standards to men and thereby deter undesirable pursuers

The Mate Screening Motive: How Women Use Luxury Consumption to Signal to Men. Qihui Chen, Yajin Wang, Nailya Ordabayeva. Journal of Consumer Research, ucac034, July 26 2022. https://doi.org/10.1093/jcr/ucac034

Abstract: Previous research has found that for men, activating a mating motive increases luxury consumption as a way to attract a romantic partner. However, little is known about the role of luxury consumption in women’s romantic endeavors. The present research conceptualizes a mate screening motive which explains how women use luxury consumption to romantically signal to men. Six studies and two follow-ups conducted in controlled and field settings show that the mate screening motive boosts women’s consumption of luxury goods as a way to signal their mating standards to men and thereby deter undesirable pursuers. The effect is diminished when mate screening is less necessary such as when external screening tools are available (e.g., screening filters on dating websites), the quality of potential mates is high, and the focus is on selecting a desirable partner rather than deterring undesirable pursuers. The findings have important implications for understanding how consumers use products and brands in romantic relationships, and for designing marketing strategies and communication for luxury brands, commercial dating services, and dating apps. Our findings also provide insights for consumers on how to use brands and products as effective communication devices in romantic endeavors.


Keywords: mating motive, mate screening motive, romantic relationship, luxury consumption, conspicuous consumption


The Economic Limits of Bitcoin and Anonymous, Decentralized Trust on the Blockchain

Budish, Eric B., The Economic Limits of Bitcoin and Anonymous, Decentralized Trust on the Blockchain (June 27, 2022). University of Chicago, Becker Friedman Institute for Economics Working Paper No. 83, 2022. SSRN: http://dx.doi.org/10.2139/ssrn.4148014

Abstract: Satoshi Nakamoto invented a new form of trust. This paper presents a three equation argument that Nakamoto’s new form of trust, while undeniably ingenious, is extremely expensive: the recurring, 'flow' payments to the anonymous, decentralized compute power that maintains the trust must be large relative to the one-off, 'stock' benefits of attacking the trust. This result also implies that the cost of securing the trust grows linearly with the potential value of attack — e.g., securing against a $1 billion attack is 1000 times more expensive than securing against a $1 million attack. A way out of this flow-stock argument is if both (i) the compute power used to maintain the trust is non-repurposable, and (ii) a successful attack would cause the economic value of the trust to collapse. However, vulnerability to economic collapse is itself a serious problem, and the model points to specific collapse scenarios. The analysis thus suggests a 'pick your poison' economic critique of Bitcoin and its novel form of trust: it is either extremely expensive relative to its economic usefulness or vulnerable to sabotage and collapse.


A Discussion of Responses to this Paper’s Argument

This paper first circulated in shorter form in June 2018. I received a lot of comments and counterarguments in response to the paper’s main line of argument. I have tried to handle the central line of counter-argument throughout the main text of this updated draft. This is the point made by Huberman, Leshno and Moallemi (2021) and many practitioners that we should compare Bitcoin’s costs to the costs of market power in traditional finance, which are also high.24 I hope the present draft of the text makes more clear the conditional nature of the paper’s argument: if Bitcoin becomes more economically useful, then it will have to get even more expensive, linearly, or it will be vulnerable to attack. I hope as well that the more explicit computational simulations, for varying levels of Vattack all the way up to $100 billion, make clear that the way Bitcoin’s security cost model scales is importantly different from how costs scale for traditional finance protected by rule-of-law. In this appendix I discuss several of the other most common comments and counter-arguments I have received about this paper since it was first circulated.

A.1 Community

As noted above in Section 5, a majority attack on Bitcoin, or any other major cryptocurrency, would be widely noticed. A line of argument I heard frequently in response to the June 2018 draft is that the Bitcoin community would organize a response to the attack. For example, the community could organize a “hard fork” off of the state of the blockchain just prior to the attack, which would include all transactions perceived to be valid, void any perceived-as-invalid transactions, possibly confiscate or void the attacker’s other Bitcoin holdings if these are traceable, and possibly change the hash function or find some other way to ignore or circumvent the attacker’s majority of compute power.25 The community response argument seems valid as an argument that attacks might be more expensive or difficult to execute than is modeled here, but it raises two important issues. 24See Philippon (2015) and Greenwood and Scharfstein (2013) on high costs of traditional finance, and see Cochrane (2013) for a counterpoint. 25The phrase “hard fork” means that in addition to coordinating on a particular fork of a blockchain if there are multiple — in this case, the attacker’s chain, which is the longest, and the chain the community is urging be coordinated on in response — the code used by miners is updated as well. This could include hard-coded state information such as the new chain or information about voided Bitcoins held by the attacker, code updates such as a new hash function, etc. First, and most obviously, the argument contradicts the notion of anonymous, decentralized trust. It relies on a specific set of trusted individuals in the Bitcoin community. Second, consider the community response argument from the perspective of a traditional financial institution. In the event of a large-scale attack that involves billions of dollars, the traditional financial institution would, in this telling, be left in the hands of the Bitcoin community. At present, reliance on a tight-knit community of those most invested in Bitcoin (whether financially, intellectually, etc.), may sound reassuring — those with the most to lose would rally together to save it. But now imagine the hypothetical future in which Bitcoin becomes a more integral part of the global financial system, and imagine there is a fight over whether an entity like a Goldman Sachs is entitled to billions of dollars worth of Bitcoin that it believes was stolen — but the longest chain says otherwise. Will the “vampire squid” be made whole by the “Bitcoin community?” Quite possibly, but one can hopefully see the potential weakness of relying on an amorphous community as a source of trust for global finance.

A.2 Rule of Law

A related line of argument is that, in the event of a large-scale attack specifically on a financial institution such as a bank or exchange, rule of law would step in. For example, the financial institutions depicted as the victims of a double-spend in Figure 2, once they realize they no longer have the Bitcoins paid to them because of the attack, would obtain help from rule-of-law tracing down the attacker and recovering the stolen funds. This response, too, seems internally valid while contradicting the idea of anonymous, decentralized trust. It also seems particularly guilty of wanting to “have your cake and eat it too.” In this view, cryptocurrencies are mostly based on anonymous, decentralized trust — hence evading most forms of scrutiny by regulators and law enforcement — but, if there is a large attack, then rule-of-law will come to the rescue.

A.3 Counterattacks

Moroz et al. (2020) extend the analysis in Budish (2018) to enable the victim of a double-spending attack to attack back. They consider a game in which there is an Attacker and a Defender. If the Attacker double spends against the Defender for v dollars, the Defender can then retaliate, themselves organizing a 51% or more majority, to attack back so that the original honest chain becomes the longest chain again. This allows the Defender to recover their property. For example, suppose the escrow period is 6, denote the initial double-spend transaction as taking place in block 1, and suppose the attacker chain replaces the honest chain as soon as the escrow period elapses, as in Figure 2. Notationally, suppose the honest chain consists of blocks {1, 2, ..., 7} at the time the honest chain is replaced, and the attacker chain that replaces it is {1’, 2’, ..., 7’, 8’}. If the Defender can quickly organize a majority of their own, then they can build off of the {1, 2, ..., 7} chain, and eventually surpass the attacker chain, recovering their property. For example, maybe the honest chain reaches block 10 before the Attacker chain reaches block 10’, so then {1, 2, ..., 10} is the new longest chain and the Defender has their property back from the correct transaction in block 1. This argument is game theoretically valid, and indeed there are theoretical subtleties to the argument that the reader can appreciate for themselves in the paper. That said, it relies on every large-scale participant in the Bitcoin system being able and willing to conduct a 51% attack on a moment’s notice. This is kind of like requiring every major financial institution to have not just security guards, but access to a standing army.

A.4 Modification to Nakamoto I: Increase Throughput

Bitcoin processes about 2000 transactions per block, which is about 288,000 per day or 105 million per year. In contrast, Visa processes about 165 billion transactions per year (Visa, 2021). The reader will notice that the logic in equations (1)-(3) does not depend directly on the number of transactions in a block. If the number of transactions in a Bitcoin block were to increase by 1000x (to roughly Visa’s level), then the required pblock to keep Bitcoin secure against a given scale of attack Vattack, per equation (3) would not change. Thus, the required cost per transaction to keep Bitcoin secure against a given scale of attack would decline by a factor of 1000. In this scenario of a 1000x throughput increase, Bitcoin’s security costs per transaction are still large, but less astonishingly so. In the base case, to secure Bitcoin against a $1 billion attack would require costs per transaction of $31 instead of $31,000. To secure against a $100 billion attack would require costs per transaction of $3,100 instead of $3.1 million. A subtlety is that as the number of transactions per block grows, so too might the scope for attack. That is, Vattack might grow as well. Still, this seems a promising response to the logic of this paper. A particularly interesting variation on this idea is the paradigm called “Level 2.” In this paradigm, the Bitcoin blockchain (“Level 1”) would be used for relatively large transactions, but smaller transactions would be conducted off-chain, possibly supported with traditional forms of trust, with just occasional netting on the main Bitcoin blockchain. In this paradigm, as well, the large transactions on chain could also have a long escrow period, making attacks more expensive.26 26I thank Neha Narula for several helpful conversations about this approach.

A.5 Modification to Nakamoto II: Tweak Longest-Chain Convention

The discussion above in A.1 expressed skepticism about the “community” response to the logic of this paper. However, what about modifying the longest-chain convention to try to encode what the community would want to do in the event of an attack. The modification to the longest-chain convention could take advantage of two specific features of double-spending attacks: 1. The Attacker has to sign transactions both to the victim of the double-spending attack — call this the Bank — and to another account they control — call this the Cousin account. The fact that there are multiple-signed transactions for the same funds is an initial proof that something suspicious has happened. 2. The Attacker has to make the signed transaction to the Bank public significantly before — in “real-world clock time” — the signed transaction to their Cousin account. The difficulty with just using facts #1 and #2 to void the transaction to the Cousin is alluded to with the phrase “real-world clock time.” Part of what the Nakamoto (2008) blockchain innovation accomplishes is a sequencing of data that does not rely on an external, trusted, time-stamping device. Relatedly, the difficulty with just using fact #1 and having the policy “if there are multiple correctly signed transactions sending the same funds, destroy the funds” is that the victim of the double-spending attack, the Bank, will by now have sent real-world financial assets to the Attacker — and this transaction, in the real world (off the blockchain), cannot be voided no matter how we modify the blockchain protocol. A different way to put the concern is that such a policy would allow any party that sends funds on the blockchain in exchange for goods or financial assets off the blockchain, to then void the counterparty’s received funds after the fact. This seems a recipe for sabotage of the traditional financial sector. The open question, then, is whether the protocol can be modified so that in the event of fact #1, multiple signed transactions, there is some way to appeal to fact #2, grounded in the sequencing of events in real-world clock time, not adjudicated by the longest-chain convention’s determination of the sequence of events.

One pursuit along these lines is Leshno, Pass and Shi (in preparation).

A.6 A Different Consensus Protocol: Proof-of-Stake

Proof-of-stake is widely discussed as an alternative consensus protocol to Nakamoto’s (2008) proofof-work. In this paradigm, rather than earning the probabilistic right to validate blocks from performing computational work, one earns the probabilistic right to validate blocks from locking up stake in the cryptocurrency. The usual motivation for proof-of-stake relative to proof-of-work — the deadweight loss and environmental harm associated with proof-of-work mining, which as noted currently utilizes about 0.3-0.8% of global electricity consumption — is in fact completely orthogonal to the concerns in this paper. In its simplest form, proof-of-stake is vunerable to exactly the same critique (1)-(3) as proof-of-work. Just conceptualize c as the rental cost of stake (i.e., the opportunity cost of locking up one unit of the cryptocurrency), as opposed to the rental cost of capital plus variable electricity cost of running the capital. The amount of stake that will be locked up for validation will depend on the compensation to stakers, as in equation (1). This amount of stake in turn determines the level of security against majority attack, as in equation (2). Thus, equation (3) obtains, with the per-block compensation to stakers needing to be large relative to the value of a majority attack. See Gans and Gandal (2019). However, while in its simplest form proof-of-stake is vulnerable to the same economic limits as proof-of-work, the use of stakes rather than computational work may open new possibilities for establishing trust and thwarting attacks. The advantage is that stakes, unlike computational work, have memory. 27 It is possible, for instance, to grant more trust to stakes that have been locked up for a long period of time, and that have never behaved suspiciously (see Appendix A.5 just above), than to stakes that have only recently been locked up. Stakes can also be algorithmically confiscated by the protocol, whereas ASIC machines exist in the “real world”, outside of the grasp of the protocol. Thus, it seems possible that proof-of-stake could make majority attack significantly more expensive (relative to the level of economic activity) than it is under proof-of-work. That said, proof-of-stake has other potential weaknesses relative to proof-of-work, such as the “nothing-atstake” and “grinding” problems, and its game-theoretic foundations are less well understood. See Halaburda et al. (forthcoming), Section 3.6 for a detailed discussion, and Saleh (2021) for an early game-theoretic analysis. Notably, Ethereum, the second-largest cryptocurrency after Bitcoin, has been considering a move to proof-of-stake for some time. See Buterin (2014, 2016, 2020); Buterin and Griffith (2019). Much of the other research on proof-of-stake also seems to be happening outside of the traditional academic process. It will be interesting to see if a proof-of-stake protocol proves to be a convincing response to the logic of this paper.

Countries with a larger fraction of people with very strict civic norms have proportionally more societal-level rule violations; if perceived norms are so strict that they do not differentiate between small and large violations, then, conditional on a violation occurring, a large violation is individually optimal

Social norms and dishonesty across societies. Diego Aycinena et al. Proceedings of the National Academy of Sciences, July 28, 2022. 119 (31) e2120138119. https://doi.org/10.1073/pnas.2120138119


Significance: Much of the research in the experimental and behavioral sciences finds that stronger prosocial norms lead to higher levels of prosocial behavior. Here, we show that very strict prosocial norms are negatively correlated with prosocial behavior. Using laboratory experiments on honesty, we demonstrate that individuals who hold very strict norms of honesty are more likely to lie to the maximal extent. Further, countries with a larger fraction of people with very strict civic norms have proportionally more societal-level rule violations. We show that our findings are consistent with a simple behavioral rationale. If perceived norms are so strict that they do not differentiate between small and large violations, then, conditional on a violation occurring, a large violation is individually optimal.


Abstract: Social norms have long been recognized as an important factor in curtailing antisocial behavior, and stricter prosocial norms are commonly associated with increased prosocial behavior. In this study, we provide evidence that very strict prosocial norms can have a perverse negative relationship with prosocial behavior. In laboratory experiments conducted in 10 countries across 5 continents, we measured the level of honest behavior and elicited injunctive norms of honesty. We find that individuals who hold very strict norms (i.e., those who perceive a small lie to be as socially unacceptable as a large lie) are more likely to lie to the maximal extent possible. This finding is consistent with a simple behavioral rationale. If the perceived norm does not differentiate between the severity of a lie, lying to the full extent is optimal for a norm violator since it maximizes the financial gain, while the perceived costs of the norm violation are unchanged. We show that the relation between very strict prosocial norms and high levels of rule violations generalizes to civic norms related to common moral dilemmas, such as tax evasion, cheating on government benefits, and fare dodging on public transportation. Those with very strict attitudes toward civic norms are more likely to lie to the maximal extent possible. A similar relation holds across countries. Countries with a larger fraction of people with very strict attitudes toward civic norms have a higher society-level prevalence of rule violations.