Academia, Citations, Equality

A Manifest to Cite 50/50

I recently came across Women Also Know Stuff. I think it is a great initiative that helps to slowly combat systemic and structural inequality. They point to many female scientists in most social sciences and I wondered whether I could find a similar program in computer science. The answer was no because apparently we first need to get women into computer science. I would still love to see #WomenAlsoKnowComputerScience on twitter, alas the search results are empty. It is not that I don’t know great female compute scientist but maybe they lack exposition which makes it all the more harder to convince women to join the field.

What I thought could help would be a larger exposition in scientific citations. I will need to go a bit off-topic to explain my thinking but bare with me. Citations produce scale-free networks (Klemm & Eguiluz, 2002).

Comparison of a random network and a scale-free network. The scale free network shows super connecting nodes in grey. Taken from wikipedia.

That means that a few super-connected nodes (so-called hubs) take up almost all the citation. In general, if we as scientists need a citation to underline a concept, we are much more likely to end up citing such a super-connected node. What that means is that highly cited scientists will get even more cited and less cited scientists remain so. That is even if there science was better. Network effects (or economies of scales) ensure that not necessarily the best science is cited the most, but usually the one preserving the status quo (Wang, Veugelers, & Stephan, 2017). But the effect is even stronger than that. The big names (not only the citations) dominate the field to such an extend that alternative explanations favored by other scientists are locked out of the discussion until such a star departs from the field (Azoulay, Fons-Rosen, & Zivin, 2015).

So where does that leave us with citing female scientists? They are at a triple-disadvantage:

  1. They have been structurally excluded from the discipline
  2. They (usually) don’t have a big name so their citation counts don’t increase
  3. As there are no role models young women may not take up the field

However, and this is what I would like to stress most, it is not the quality of their research. Now, if citations are usually not awarded for merit only but mainly due to structural reasons, why not use them to start shifting the scales today such that in some day in the future women are equally represented in this field (and in many others) such as the statistical distribution of people would predict.

The Manifesto to Cite 50/50

Making a citation to underline a concept does not require us to only cite that one citation that we always use. We can vary whom we cite and we can choose to cite female scientists as well.

  • Citing a female scientist does not cost us anything in our career but it may help build those careers that eventually will bring equality.
  • Citing a female scientist when we only have male scientists at our hand makes us critically reflect our own field and possibly help us to engage with research more deeply to find female scientists.

We probably won’t reach a 50/50 quota any time soon in our citation lists but maybe we can start climbing towards it. I admit I am not there yet and I haven’t done this for any publication I produced yet, but I am of a mind to change this. Maybe you would like to contribute as well? Change is hard and so my first goal is to have at around 50% of publications having a female co-author (though first author would be preferable). I am sure I will fail miserably to reach that goal in the next few publications I make. But yesterday I sat down and tried to find a few women in the field that I could cite and it was surprising how relevant their research was and shocking how I barely heard of any of them (except those who despite the odds managed to become a big name of their own). I think that in the long-term this practice will also make me a better and more engaged scholar that (at least sometimes) manages to look beyond the in-group in which my work is circulating.

Computer Science and more

Now I know I specifically focused on computer science but probably such an attempt should not be confined to one discipline. It should be a truly interdisciplinary endeavor.

Azoulay, P., Fons-Rosen, C., & Zivin, J. S. G. (2015). Does science advance one funeral at a time? National Bureau of Economic Research.
Klemm, K., & Eguiluz, V. M. (2002 NaN). Highly clustered scale-free networks. Physical Review E. APS.
Wang, J., Veugelers, R., & Stephan, P. (2017 NaN). Bias against novelty in science: A cautionary tale for users of bibliometric indicators. Research Policy. Elsevier.

Standard
ETH, STP

Off to the Chicago Forum on Global Cities

Today I write you as part of a mini-series on my stay at the Chicago Forum on Global Cities (CFGC). I have been kindly sponsored by ETH Zurich and the Chicago Forum to participate in the event. I am currently sitting in my train to Zurich airport and I am looking forward to 3 days of intensive discussions on the future of global cities. You will also find a post about this event on the ETH Ambassadors Blog and ETH Global Facebook and you may look out for some tweets.

I hope for many interesting meetings and conversations at the Forum, especially about my main topics of interest Big Data in Smart Cities – for which I have a short policy brief with me designed in the Argumentation and Science Communication Course of the ISTP – as well as ways to design better cities based on Big Data and knowledge of human (navigation) behaviour – the topic of my soon to start PhD.

Standard
ETH, STP

PIE: Ex Post Evaluation: Establishing Causality without Experimentation

So far, we discussed evaluation based on ex ante Randomised Control Trials (RCT). In ex post experiments, we have an another opportunity for an evaluation. However, there are strong limitations:

  • Treatment manipulation is no longer possible,
  • observational data only (i.e. the outcome of social processes), and
  • baseline may be missing

To address these issues, the idea is to exploit naturally occurring randomisation (as if randomly assigned) and try to construct a valid counterfactual. In essence, we try to construct ex post RCT based on historical data. The advantage of such a experiment is, that it allows us to learn from the past.

Natural experiments

The randomisation has arisen naturally, for instance after a natural disaster, infrastructure failures or indiscriminate forms of violence. The key tasks here is to establish, that the treatment variation is random with the limitation that it can only be checked for observable parameters.

These natural experiments are also called quasi-experiment.

Regression Discontinuity Design (RDD)

An RDD exploits that the treatment variable A is determined, either completely or partially, by the value of an assignment variable X being on either side of a fixed cutpoint c. In the limit at cutpoint c the assignment of treatment is random/exogenous. The assumption is that units just left and right of the cutpoint c are identical except with regard to the treatment assignment.

A RDD and RCT are closely related considering that each participant is assigned a randomly generated number v from a uniform distribution over the range [0,1] such that T_i = 1 if v\geq0.5 and T_i=0 otherwise.

However, RDDs are more prone to several issues:

  • Omitted Variable Bias is possible (in contrast to well-designed RCTs), because a variable Z, which may affect T, change discontinously at the cutpoint c.
  • Units may be able to manipulate their value on assignment variable X to influence  treatment assignment around c.
  • Global functional form misspecification may lead to non-linearities being interpreted as discontinuities.

Instrumental Variable Regression (IV)

There is a set of problems where endogeneity or joint determinancy of X and Y, omitted variable bias (other variables) and measurement errors in X may be an issue.

An instrumental variable Z is introduced. It is considered a valid instrument if and only if:

  • Instrument relevance: Z must be correlated with X,
  • Instrument exogeneity: Z must be uncorrelated with all other determinants of Y.

Potential sources for instruments are:

  • Nature: e.g. geography, weather, biology in which a truly random source of variation influences X (no endogeneity).
  • History: e.g. things determined a long time ago, which were possibly endogenous contemporaneously, but no longer plausibly influence Y.
  • Institutions/Policies: e.g. formal or informal rules that influence the assignment of X in a way unrelated to Y.

Potential issues for IV Resssions are:

  • Conditional unconfoundedness of Z regarding X (ideally Z as if random with regard to X such as eligibility rule or encouragement design).
  • Weak instrument: Z and X are only weakly correlated.
  • Violation of exclusion restriction: Z affects Y independent of X.

Difference-in-Differences Estimation

Instead of comparing only one point in time, changes are compared over time (i.e. before and after the policy intervention) between participants units and non-participants units. This requires panel data of at least two time periods for participating and non-participating units before and after the policy intervention. Ideally, we have more than two pre-intervention periods.

All participating units should be included, but there are no particular assumptions about how non-participating units are selected. This allows for an arbitrary comparison group as long as they are a valid counterfactual.

However, as always, there are several issues:

  • Time-varying confounders could be an alternative explanation since we estimate time-invariant difference and any omitted variable would have an impact.
  • Parallel trend assumption is required to show that there is a similar trajectory and that the difference is due to the intervention.

Synthetic Control Methods (SCM)

While related to diff-in-diff estimation strategy, there are a few differences as SCM

  • can only have one participating unit;
  • does not need a fixed time period and can be applied more flexibly;
  • requires a continuous outcome;
  • relaxes the modelling assumptions of diff-in-diff; and
  • does not have a method for formal inference (yet).

Non-participating units can be chosen freely (like in diff-in-diff), but work best with many homogeneous units. It also requires panel data, but with multiple pre-intervention years. The longer the time frame available, the better SCM can construct a valid counterfactual. The synthetic control is constructed of weights of the non-participating units.

Typical issues that can arise are as the quality of synthetic control depends on:

  • number of potential controls,
  • homogeneity of potential controls,
  • richness of time varying dataset to create synthetic control,
  • number of pre-intervention period observations, and
  • smoothness of the outcome.

Matching

The idea behind matching is to find identical pairs on a key confounder with multiple confounders across multiple dimensions. This becomes exceedingly difficult and the proposed solution is to estimate each units participation propensity given observable characteristics. There are a variety of matching estimators with different advantages and disadvantages (e.g. nearest neighbour, coerced exact matching, genetic matching, etc.).

In matching, we look at the distribution of the treated and the untreated. Observations that are never treated or untreated should be excluded.

Usual pitfalls include:

  • Quality of matching estimate requires similar assumptions to hold  as regular regression (complete understanding of which factors affect the programme outcome).
  • Matching can be considered a non- or semi-parametric regression, hence not significantly different from a causal inference perspective than multivariate regression.

Conclusion

Quality of ex post evaluation relies on the validity of the counterfactual. RCTs are the gold standard but the ex post methods have the advantage of allowing us to learn from the past. There is no technical/statistical fix that will create a valid counterfactual: it is always a question of design. Finding valid counterfactuals in observational data requires innovative thinking and deep substantive knowledge.

Standard
ETH, STP

PIE: Ex Ante Evaluations: Randomised Control Trials

For a Randomised Control Trial (RCT) several elements are necessary. Evaluators need to be involved long before it ends – ideally from the conception. Randomisation must take place. The operationalisation and measurement must be defined. The data collection process and the data analysis must be performed rigorously. Randomisation and the data collection process is what makes the difference compared to other experiments.

To run a RCT partners are needed. Often firms and non-governmental organisations (NGOs) are partners since they benefit from evaluating their work. Governments are still rare partners, but the number of government-sponsored RCTs is increasing. The programme under evaluation can be either an actual programme (only simple impact evaluation) or pilot programmes (impact evaluation can become field experiments).

Randomisation needs to be chosen carefully. Usually, access, timing of access or encouragement to participant is randomised. The optimal test would run on access, but ethical concerns may make that impossible. Relaxation of access are obtained by introducing the treatment in waves or by encouraging the population to take up the treatment (and measuring the people who did not take it up as “non-accessed”).

A randomised trial can be run in many circumstances, for instance:

  • New program design,
  • New program,
  • New services,
  • New people,
  • New local,
  • Over- or under-subscription of existing programs,
  • Rotation of program benefits or burdens,
  • Admission cutoffs, and
  • Admission in phases.

The choice of the randomisation level is another important parameter. Often the type of treatment or randomisation opportunities determine the randomisation level. However, the best choice usually would be the individual level. If the level can be picked, there are still several considerations that need to be made when determining the level:

  • Unit of measurement (experiment constraint),
  • spillovers (interaction between observed units),
  • Attrition (loss of units throughout the observation),
  • Compliance (will the treatment work),
  • Statistical Power (number of units available), and
  • Feasibility (can the unit be observed (cost-)effectively).

Often a cross-cutting design is used. Where several treatments are applied and distributes across the units such that all combinations are observed. This allows to assess the individual treatments as well as the cross-interaction between treatments.

The data collection process can be described in three steps.

  1. Baseline Measurement (asserts whether the randomisation works and can assess the bias of non-compliance and attrition)
  2. Midstream Measurement (only in long-term projects)
  3. Endline Measurements (in combination with baseline measurements allows to estimate unit fixed effect (differences-in differences estimation)

Threats to RCTs

The four main threats to RCTs are partial compliance, attrition, spill-overs and evaluation-driven effects.

Partial compliance can be caused by several issues: Implementation staff may depart from the allocation or treatment procedures; Units in treatment group may not be treated or units in control group may be treated; Units in treatment group do not get complete treatment; and Unit exhibit opposite of compliance (so-called defiers).

Attrition may occur for specific reasons. However, often drop-out reasons cannot be measured (or the answer is refused).

Spillovers may occur on different levels: physical, behavioural, informational, general-equilibrium (market-wide) effects (i.e. long-term system-wide effects).

Evaluation-driven effects have been observed. The most important ones include:

  • Hawthorn effect (the treatment group changes behaviour due to being observed; the to counter the effect something that cannot be changed should be measured [alternatively, not telling that participants are observed would help, but is often unethical]);
  • John Henry effect (the control group changes behaviour due to believing being disadvantaged and trying to compensate);
  • resentment and demoralisation effect (selection into treatment and control changes behaviour);
  • demand effect (participants want to produce the result required by the observer or impress the observer);
  • anticipation effect (the psychological state of participants influences there performance [e.g. if they expected to be good at something they score better]); and
  • survey effect (the framing and order of tasks/questions will influence the response).

Summary

RCTs are seen as the gold standard when it comes to impact evaluation, but they are no panacea. Designing a rigorous impact evaluation requires innovative thinking and substantive knowledge of the program and policy area.

Funders in the U.S. and GB have begun to increasingly ask for RCT evaluation of programmes, especially in certain domestic policy areas (e.g. education) and development. Continental Europe is still somewhat lagging in this respect.

Standard
ETH, STP

PIE: The Fundamental Problem of Causal Inference

We evaluate policies for a multitude of reasons. On the one hand, we wish to increase our knowledge and learn about its underlying function to improve program design and effectiveness. On the other hand, considerations from economy, society, and politics are the reason behind the evaluation. This may include allocation decisions via cost-benefit analysis (economic), transparency and accountability (social), public sector reform and innovation (social), credibility (politics), and overcoming ideological (fact-free) bickering (politics).

Impact Evaluation can offer some answers. In particular,

  • the effect of a programme can be measured,
  • the effectiveness of the programme can be measured (i.e. how much better of are beneficiaries),
  • how much do outcomes change under alternative designs,
  • how differently are different people impacted, and
  • is the programme cost-effective.

A causal framework is required to obtain the answer. However, there are risks inherent to evaluation. Evaluations not free and unproblematic. The main issues are

  • cost time and resources,
  • distorted incentives by equating measurable and valuable whereby intrinsic motivation is crowded out,
  • Goodhart’s law, i.e. that a measure that becomes a target ceases to be a good measure (because people optimise towards the measure rather than the underlying objective that was evaluated via the measure), and
  • a tendency towards encrustation and self-fulfilling prophecy.

Not every programme needs or should be evaluated: the potential benefits should outweigh the costs.

Causal Inference

Three basic criteria for causation are identified by Hume. A spatial and temporal contiguity, a temporal succession and constant conjunction (Hume, 1740, 1748). The shortcomings were shown by Mill who noted that observation without experimentation (supposing no aid from deduction) can ascertain sequences of co-existences, but cannot prove causation (Mill, 1843). Lastly, Lewis refined the notion as “a cause is something that makes a difference, and the difference it makes must be a difference from what would have happened without it” (Lewis, 1974).

Causal Claim

A causal claim is a statement about what did not happen. A statement “X caused Y” means that Y is presnet, but Y would not have been present if X were not present. This the counterfactual approach to causality. In this approach there is no notion that just because X caused Y that X is the main or the only reason why Y happened or even that X is “responsible” for Y.

This leads a fundamental misunderstanding between attribution and contribution. Atribution would claim that X is the one and only cause for Y, whereas contribution merely states that X contributed towards the outcome Y. The approach cannot figure out the causes of Y, only whether some X contributed to bringing Y about. The reason is that there is never a single cause of Y and there is no reason that the effects of different causes should add up to 100% unless all causes could be added up. Furthermore, causes are not rival. The question should always be “how much does X contribute to Y”, not “does X cause Y”.

Causality and Causal Pathways

Causal mechanisms or causal chains are often used to illustrate causality. This can be misleading, as Holland points out: If A is planing action Y and B tries to prevent it, but C intervenes to stop B. Then both A and C contribute to Y, but Hume’s criteria are not fulfilled for the contribution of C to Y. (Holland, 1986)

Necessary and sufficient conditions

A necessary condition demands for Y to occur, X needs to happened X \implies Y. A sufficient condition demands that if X occurs then Y occurs not Y \implies not X.

In causal frameworks the conditions need to be related to allow for probabilistic conditions (probability of Y is higher if X is present) and contingencies (X causes Y if Z is present, but not otherwise).

No Causation Without Manipulation

The counterfactual approach requires one to be able to think through how things might look in different conditions. Causal claims should be restricted to conditions that can conceivably (not necessarily practically) be manipulated (Holland, 1986).

Ruben’s Potential Outcome Framework

In the framework a dichotomous treatment variable X with x \in \{0,1\} where x=1 means treated. Additionally, a dichotomous outcome variable Y with y \in \{0,1\}. Furthermore, we define Y^{x=1} as the potential outcome under the treatment and Y^{x=0} as the counterfactual outcome under no treatment.

The outcome of interest would be the individual causal/treatment effect (ITE): X has a causal effect on unit i‘s outcome Y if and only if Y^{x=1}\neq Y^{x=0}. However, only one of the outcomes is actually observable (factual). ITE’s are not defined, which is referred to as the fundamental problem of causal inference (Holland, 1986).

We need an alternative measure of the causal effect. It is still possible to figure out whether X causes Y on average if

    Pr\[X=1|Y=1\]-Pr\[X=1|Y=0\]=Pr\[Y^{x=1}=1\]-Pr\[Y^{x=0}=1\]

, i.e.treatment and control units are exchangeable (statistically speaking Y^X is stochastically indepented of X). Then and only then is the average treatment effect (ATE) of X and Y for a finite population N equal to

    Pr\[Y^{x=1}=1\]\neqPr\[Y^{x=0}=1\]

and

    E\[Y^{x=1}-Y^{x=0}\]

and

    \frac{1}{N}\sum_{i=1}^N \[Y^{x=1}-Y^{x=0}\]

.

Stochastic independence can be achieved  either with the scientific approach which relies on homogeneity assumption. This is impossible with heterogeneous units. The statistical approach relies on large numbers and can only achieve exchangeability on average. Furthermore, for the ATE we also need the Stable Unit Treatment Value Assumption (SUVTA) to hold, i.e. no variation in treatment across units and non-interference between the units of observation (treatment of one does not influence others).

References

Holland, P. W. (1986). Statistics and causal inference. Journal of the American Statistical Association, 81(396), 945–960.
Hume, D. (1740). An Abstract of a Book Lately Published; Entituled, A Treatise of Human Nature, &c: Wherein the Chief Argument of that Book is Farther Illustrated and Explained. (C. Borbet [ie Corbet], Ed.). over-against St. Dunstan’s Church, in Fleetstreet: Addison’s Head.
Hume, D. (1748). Philosophical Essays Concerning Human Understanding: By the Author of the Essays Moral and Political. opposite Katherine-Street, in the Strand: Millar A.
Lewis, D. (1974). Causation. The Journal of Philosophy, 70(17), 556–567.
Mill, J. S. (1843). A System of Logic. Parker.

Standard
ETH, STP

ASC: Concepts and Arguments

The evaluation of the correctness of arguments is the core of this blog post.

We will focus on justifications as premises are to be evaluated with the scientific method. However, the quality of premises must be considered. Only true premises can guarantee the truth of the conclusion, so the reasons must be impeccable. Therefore, acceptable premises can provide for the acceptance of the conclusion. Additionally, all premises must be consistent to form the conclusion.

Deductive inference (validity) is then used to come to the conclusion. An inference is valid, if all premises are true and the conclusion must be true (where the must refers to the relation between premisses and conclusion not the conclusion itself). Consequently, a valid inference cannot have a false conclusion from true premises.

A central feature of valid premises is that if the conclusion is false, then one of the premises must be false. However, if all premises are true, but the conclusion is still false, the inference must be invalid.

Formal validity is based on the structure of the assertion, not the meaning. (X \in  A \lor X \in B) \land \neg X \in B \implies X \in A.

Material validity is based on the relation between the concepts. E.g. a square has four sides of equal length.

Conditional Claims

A sufficient condition A for B A\implies B. Logically, B must be true if A occurs, but could be true due to different condition C. B is a necessary condition for A \neg B\implies \neg A. A is true at most if B is true, however, there could be a C that is also necessary for A to be true.

Inferential schemes for conditional claims If A then B are Modus Ponens A\implies B and Modus Tollens \neg B \implies \neg A. Invalid schemes include denying the antecedent \net A\implies \neg B and affirming the consequent B\implies A are a formal fallacy in reasoning (non-sequitur).

In the fallacy of equivocation the same expression is used in different ways in the premises than in the conclusion.

In the naturalistic fallacy a normative claim is deduced from a descriptive claim.

Non-deductive inferences claim to be correct (but not valid). An inference is correct iff its premises together provide a good reason for accepting its conclusion. However, a central characteristics of correct non-deductive inferences is that the conclusion can be false, even if the premises are true. The conclusion is supported with different degrees and can be strengthened or weakened with additional premises. Non-formal fallacies may occur if the reasons are too weak to support the conclusion.

Inductive inferences are an important class of non-deductive inferences, where the premises are analysed with the help the theory of probability and statistics. Enumerative induction concludes from a sample property distribution the whole population property distribution. Statistical syllogism derives from a population that two properties have been observed in common and concludes that one implies the other. Predictive induction observes two properties in a sample and concludes that one implies the other. Usual fallacies include too small samples, non-representative samples, relevant information not considered, and false deliberation regarding probability.

Argument by analogy

A claim is justified by analogy to another claim. This argument is often fallacious, as illustrative analogies (do not justify conclusions), irrelevant analogies, weak analogy, and not considering a relevant disanalogy.

Causal inferences

A factor F is considered to be a causally relevent if for an event, two situations must differ in that the event only occurs in the situation in which F is present. Typicall fallacies include inference from temporal sequence, inference from positive correlation, and inference the inverse causal relevance.

Inference to Best Explanation

A hypothesis is justified because it is the best (closest) explanation for the obtaining of certain facts.

Rules of reasoning

Shifting the burden of proof, instead of justifying a controversial claim, is done by attacking the opponents position or demanding justification. Other ways of shifting are appeals to authority.

The relevance of reasoning demands that an argument is in favour of owns claim. Throwing in arguments that are not related to the claim break relevance.

The accuracy of reasoning is undermined by a “straw man”-fallacy, where an exaggeration or change of claims of the opponent is introduced to make it more susceptible to criticism. More generally, a different claim is attributed to opponent to attack them.

The freedom of speech needs to be preserved by allowing criticism and justification of arguments. Fallacies include argument ad baculum (if you believe A than you believe B), argument ad misercordiam (have pity because X), and argument ad hominem (attacking the person, rather than the argument).

Implicit premises must be stated if they complete the argument. Fallacies include attributing false implicit premises to opponents and not accepting implicit premises in one owns arguments.

Shared premises have to be accepted to reach a reasonable agreement about a controversial claim. Fallacies include retreating from shared premises or attributing claims to be shared premises.

Accepting results of previous argumentation is necessary. Otherwise fallacies such as argument ad ignorantiam  (taking absence of evidence as evidence of absence) or equating the defence of a claim with its acceptance.

 

Standard
ETH, STP

SMABSC: Cognitive Agents

Cognitive models are a representation of an agent control mechanism resembling the cognitive architecture of a mind.  It can be understood as a control system (e.g. a flow graph how to react) that takes sensory inputs and produces motor outputs (Piaget, 1985).

More advanced models include adaptive memory (Anderson, 1983).

Famous models include SOaR: State Operator and Result (Laird, Newell, & Rosenbloom, 1987); BDI: Belief, Desire, and Intention (Bratman, Israel, & Pollack, 1988); PECS: Physics, Emotions, Cognitive, Social (Urban & Schmidt, 2001); ACT-R: Adaptive Control of Thought – Rational (Anderson, Matessa, & Lebiere, 1997); CLARION: Connectionist Learning with Adapative Rule Induction On-line (Sun, 2006); and Agent Zero (Epstein, 2014).

The communality of all these is summed up in this slide from the University of Michigan:

 

References

Anderson, J. R. (1983). A spreading activation theory of memory. Journal of Verbal Learning and Verbal Behavior, 22(3), 261–295.
Anderson, J. R., Matessa, M., & Lebiere, C. (1997). ACT-R: A theory of higher level cognition and its relation to visual attention. Human-Computer Interaction, 12(4), 439–462.
Bratman, M. E., Israel, D. J., & Pollack, M. E. (1988). Plans and resource‐bounded practical reasoning. Computational Intelligence, 4(3), 349–355.
Epstein, J. M. (2014). Agent_Zero: Toward neurocognitive foundations for generative social science. Princeton University Press.
Laird, J. E., Newell, A., & Rosenbloom, P. S. (1987). Soar: An architecture for general intelligence. Artificial Intelligence, 33(1), 1–64.
Piaget, J. (1985). The equilibration of cognitive structures: The central problem of intellectual development. University of Chicago Press.
Sun, R. (2006). The CLARION cognitive architecture: Extending cognitive modeling to social simulation. In Cognition and multi-agent interaction: From cognitive modeling to social simulation (pp. 79–99). Cambridge University Press.
Urban, C., & Schmidt, B. (2001). PECS–agent-based modelling of human behaviour. In Emotional and Intelligent–The Tangled Knot of Social Cognition. Presented at the AAAI Fall Symposium Series, North Falmouth, MA.

Standard
ETH, STP

SMABSC: Disease Propagation

The SIR model was introduced as a mathematical model with differential equations (Kermack & McKendrick, 1927). The basic states are Susceptible, Infected, and Recovered.

N_i = \frac{dS}{dt}+\frac{di}{dt}+\frac{dR}{dt}

In the SIR model, the fundamental trajectory of disease propagation could be captured, immunity was acquired after disease and the population is homogeneous.

But the SIR model has short-comings:

  • populations are not infinite and increase/decrease over time,
  • populations are spatial objects and have (voluntary) spatial interactions,
  • populations are heterogeneous, including isolated sub-populations with irregular interactions as well as significant distances.
  • populations are driven by endogenous social factors and constrained by exogenous environmental circumscription.

Additional states were introduces such as Exposed (i.e. dormant infections that does not infect others yet) and Maternal immunity (i.e. individuals that cannot be infected). The order has been rearranged such as SIS, SEIS, SIRS.

These models still did not address explicit spatial reference to population loci & transportation networks, distribution of social & medical information (temporal and spatial), mechanisms to simulate voluntary & forced quarantines, treatment options and their delivery (temporal and spatial), and characteristics of pathogens and disease vector.

Questions that needs to be answered about a model is the form of circumscription (Carneiro, 1961, 1987, 1988) (e.g. social and environmental forces), instantiation topologies (i.e. abstract or logical relationships, social networks, or space), activation schemes (e.g. random, uniform random, Poisson), and encapsulation.

References

Carneiro, R. L. (1961). Slash-and-burn cultivation among the Kuikuru and it implications for cultural development in the Amazon Basin. In J. Wilbert (Ed.), The evolution of horticultural systems in native South America, causes and consequences. “Antropológica” (pp. 47–67). Caracas, Venezuela: Editorial Sucre.
Carneiro, R. L. (1987). Further reflections on resource concentration and its role in the rise of the state. In L. Manzanilla (Ed.), Studies in the Neolithic and Urban Revolutions (pp. 245–260). Oxford, UK: Archaeopress.
Carneiro, R. L. (1988). The Circumscription Theory: Challenge and response. The American Behavioral Scientist, 31(4), 497–511.
Kermack, W. O., & McKendrick, A. G. (1927). A contribution to the mathematical theory of epidemics. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 115(772).

Standard
ETH, STP

ISN: Communities and cliques

Dyads are not yet interesting for network research. However, starting at triads interesting behaviour appear. In triads, balance and control appear. Triads appear more commonly in social networks than in random graphs.

Clustering coeffcient

The clustering coefficient measures the amount of transitivity in a network. When A is related to B, and B is in turn related to C, then A is also related to C. The index ranges from 0 to 1. In social networks it is usually between 0.3 and 0.6.

Triad counts

Four patterns are counted between all vertices. Empty (three vertices with no connections), 1-Edge (two vertices are connected via an edge and one vertex is not), 2-Edge (One vertex is connected to both other vertices with an edge) and Triangle (all vertices are connected).

Groups of more than 3

There are a few technical description that are extensions (and modifications) of the complete for more than 3 nodes:

  • Clique: Maximal complete subgraph of n \geq 3
  • k-cliques: Relaxation to k > 1, where k is geodesic length
  • k-core: Subgraph where each node adjacent to at least k other nodes
  • k-plex: Maximal subgraph of g nodes where each node adjacent to no fewer than g-k nodes

Communities

Communities are densely connected within and sparsely connected with others. A community structure can affect individuals, groups, networks and give insights into how social systems work.

Community detection

Community detection is a computationally difficult problem. Knowing the optimal solution is not always possible. Algorithmic approximations are often used to detect communities.

Modularity

Modularity is always smaller than 1, but can also take negative values. Higher values means more edges within modules.

Q = \frac{1}{2m}\sum_{ij}\delta(C_i,C_j)(A_{ij}-P_{ij})

Where A_{ij} encodes that an edge exists and [latex]P_{ij} the probability of an edge existing and m the number of edges and \delta(C_i,C_j) describes whether two nodes are inside the same module.

Kernighan-Lin Algorithm

Based on a pre-determined number of communities is randomly assigned and the modularity score is computed for switching any node. The highest achievable modularity with a single switch is assigned. The process is repeated until no more switches could improve the score. The solution, however, is not necessarily optimal, a local maxima may be chosen based on the random initial assignment. The algorithm should be repeated

Edge-Betweenness Clustering Algorithm

Evaluate the edge-betweenness of each edge in the network. Find the edge with the highest score and delete it. As long as the disconnection between two components increases modularity, the algorithm continues. While there is no random variation involved, it may not find the optimal solution, it may not maximise modularity and modularity is slow.

Fast-Greedy Clustering Algorithm

Starting with an empty graph where each node is its own community. The modularity for each possibly join between two nodes is computed and the one with the highest modularity is chosen. The process is repeated until no further increase in modularity is possible. An issue is, that small communities are easily missed. However, a dendrogram allows to judge how many communities could be present.

 

 

Standard
ETH, STP

PE: Redistribution

The focus of today’s lecture will be on redistribution as discussed in Chapter 3(Mueller, 2003). Additionally, we will discuss papers quantitatively assessing the situation (De Haan & Sturm , 2017; Sturm & de Haan, 2015).

A justification for the state can be redistribution. But redistribution itself can be argued for based on different reasons. In this post, we will illuminate the main arguments. First three voluntary redistribution arguments will be covered, then we will have a look at involuntarily redistribution.

Redistribution as insurance

If one assumes Rawls’ veil of ignorance (Rawls, 2009), redistribution can be seen as an insurance against the uncertainties of what kind of role one will assume in society. Insurance can be covered privately, so at first state intervention may seem inadequate. However, since people can assess their risk, high-risk individuals would select the insurance whereas low-risk individuals would shun the insurance. To overcome the issue of adverse selection, public insurance is introduced. The issue of adverse selection has been introduced by Akerlof (Akerlof, 1970) and shows that information asymmetry can break markets. The public insurance overcomes this issue by forcing a pareto-optimum on a societal level. Typical cases for this are health care insurance, unemployment insurance, and retirement insurance.

Redistribution as public good

Another justification comes from altruism or empathy (“warm glow”). The utility equation is expanded to max U_m + \alphaU_o where 0\leq\alpha\leq1.

Redistribution as fairness norm

The assumption that fairness is an important norm, is the basis for this redistribution argument. The classical example is the dictator game, where anonymous individuals are paired and one gets an amount of money and may share it with the other. Usually, any individual share around 30% with the other despite being able to keep everything and not knowing anything about the other. So far, the assumption is that the random element of the game let people share their gain because they also could have ended up on the other side.

Redistribution as allocative efficiency

If two individuals (P and U) work a fixed amount of land. The productivity of P is 100 whereas U‘ productivity is 50. The connecting curve describes the production possibility frontier. Any initial allocation (e.g. A may not be optimal on a societal level (i.e. A is not tangential on a 45° line), the societal optimum would be in B, which is however unacceptable for U. The inefficient allocation would end up at A'. The state could either redistribute land to reach B or production to reach C. Note that C in the graph should amount to a value above 100. Alternatively, private contracting could reach the same result given that the state enforces property rights and contracts.

The example is based on (Bös & Kolmar, 2003).

Redistribution as taking

Groups can lobby to increase their utility U by increasing their income Y based on their political resources R available. However, if two antagonistic groups lobby their policies may cancel each other leaving them only with the additional cost of lobbying without any gains.

Measuring redistribution

To measure redistribution, inequality needs to be measured first. A typical measure of inequality is done via the Lorenz curves and the Gini coefficient (Gini, 1912). The Gini coeffcient is the ratio of areas under two curves. The Gini market coefficient (before taxes) and the Gini net coefficient (after taxes and subsidies) are subdivisions that taken at ratio help to assess redistribution.

The causation of inequality is difficult to assess. Some argue for politics (Stiglitz, 2014), whereas others argue for the market-based economies (Muller, 2013). A new line of inquiry attributes inequality to ethno-linguistic fractionalisation reducing the interest in redistribution (Desmet, Ortuño-Ortín, & Wacziarg, 2012).

Sturm  and de Haan (Sturm & de Haan, 2015) follow up on the argument and examine the relationship between capitalism and income inequality. A large sample of countries is analysed using an adjusted economic freedom (EF) index as proxy for capitalism and Gini coefficients as proxy for income inequality. Additionally, they analyse the relation between income inequality and fractionalistion given similar capitalist systems. For the first analysis, there is no conclusive evidence that capitalism and income inequality are linked. However, if fractionalisation is taken into account, than inequality can be explained based on the level of fractionalisation. The more fractionalised a society is, the less redistribution takes place and consequently inequality remains high.

In a second paper de Haan and Sturm (De Haan & Sturm , 2017) analyse how the financial development impacts income inequality. Previous research on financial development, financial liberalisation and banking crises (theoretical and empirical) has been ambiguous. TBC.

References

Akerlof, G. A. (1970). “The market for” lemons”: Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 488–500.
Bös, D., & Kolmar, M. (2003). Anarchy, efficiency, and redistribution. Journal of Public Economics, 87(11), 2431–2457.
De Haan, J., & Sturm , J.-E. (2017). Finance and Income Inequality: A review and new evidence. European Journal of Political Economy, Forthcoming.
Desmet, K., Ortuño-Ortín, I., & Wacziarg, R. (2012). The  Political Economy of Linguistic Cleavages. Journal of Development Economics, 97(2), 322–338.
Gini, C. (1912). Variabilità e mutabilità. In E. Pizetti & T. Salvemini (Eds.), Memorie di metodologica statistica (p. 1). Rome: Libreria Eredi Virgilio Veschi.
Mueller, D. C. (2003). Public Choice III. Cambridge, UK: Cambridge University Press.
Muller, J. Z. (2013). Capitalism and inequality: What the right and the left get wrong. Foreign Affairs, 92(2), 30–51.
Rawls, J. (2009). A theory of justice. Harvard university press.
Stiglitz, J. (2014). Inequality is not inevitable. New York Times, pp. 1–2.
Sturm, S., Jan-Egbert, & de Haan, J. (2015). Income Inequality, Capitalism and Ethno- Linguistic Fractionalization. American Economic Review: Papers and Proceedings, 105(5), 593–597.

Standard