skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Cross-domain semantic alignment: Concrete concepts are more abstract than you think
We can easily evaluate similarities between concepts within semantic domains, e.g., doctor and nurse, or violin and piano. Here, we show that people are also able to evaluate similarities across domains, e.g., aligning doctors with pianos and nurses with violins. We argue that understanding how people do this is important for understanding conceptual organization and the ubiquity of metaphorical language. We asked people to answer questions of the form "If a nurse were an animal, they would be a(n)…" (Experiment 1 and 2), and asked them to explain the basis for their response (Experiment 1). People converged to a surprising degree (e.g., 20% answered "cat"). In Experiment 3, we presented people with cross-domain mappings of the form "If a nurse were an animal, they would be a cat” and asked them to indicate how good each mapping was. The results showed that the targets people chose and their goodness ratings of a given response were predicted by similarity along abstract semantic dimensions such as valence, speed, and genderedness. Reliance on such dimensions was also the most common explanation for their responses. Altogether, we show that people can evaluate similarity between very different domains in predictable ways, suggesting that either seemingly concrete concepts are represented along relatively abstract dimensions (e.g., weak-strong) or that they can be readily projected onto these dimensions.  more » « less
Award ID(s):
2020969
PAR ID:
10349046
Author(s) / Creator(s):
;
Date Published:
Journal Name:
Philosophical transactions of the Royal Society of London
ISSN:
2053-924X
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Parks, Beth (Ed.)
    We describe a study focusing on students' and faculty members' reasoning about problems of differing cognitive complexity related to the double-slit experiment (DSE) with single particles. In the first phase of the study, students in advanced quantum mechanics courses were asked these questions in written form. Additionally, individual interviews were conducted with ten students in which they were asked follow-up questions to make their thought processes explicit on the challenging problems. Students did well on the straightforward problem, showing they had some knowledge of the DSE after traditional instruction, but they struggled on the more complex ones. Even if explicitly asked to do so in interviews, students were often uncomfortable performing calculations or making approximations and simplifications, instead preferring to stick with their gut feeling. In the second phase of the study, the problems were broken down into more pointed questions to investigate whether students had knowledge of relevant concepts, whether they would do calculations as part of their solution approach if explicitly asked, and whether they explicitly noted using their gut feeling. While the faculty members' responses suggest that they could seamlessly move between conceptual and quantitative reasoning, most students were unable to combine concepts represented by different equations to solve the problems quantitatively. We conclude with instructional implications. 
    more » « less
  2. Denison, S.; Mack, M.; Xu, Y.; Armstrong, B.C. (Ed.)
    Do people perceive shapes to be similar based purely on their physical features? Or is visual similarity influenced by top-down knowledge? In the present studies, we demonstrate that top-down information – in the form of verbal labels that people associate with visual stimuli – predicts visual similarity as measured using subjective (Experiment 1) and objective (Experiment 2) tasks. In Experiment 1, shapes that were previously calibrated to be (putatively) perceptually equidistant were more likely to be grouped together if they shared a name. In Experiment 2, more nameable shapes were easier for participants to discriminate from other images, again controlling for their perceptual distance. We discuss what these results mean for constructing visual stimuli spaces that are perceptually uniform and discuss theoretical implications of the fact that perceptual similarity is sensitive to top-down information such as the ease with which an object can be named. 
    more » « less
  3. null (Ed.)
    Automated computer vision systems have been applied in many domains including security, law enforcement, and personal devices, but recent reports suggest that these systems may produce biased results, discriminating against people in certain demographic groups. Diagnosing and understanding the underlying true causes of model biases, however, are challenging tasks because modern computer vision systems rely on complex black-box models whose behaviors are hard to decode. We propose to use an encoder-decoder network developed for image attribute manipulation to synthesize facial images varying in the dimensions of gender and race while keeping other signals intact. We use these synthesized images to measure counterfactual fairness of commercial computer vision classifiers by examining the degree to which these classifiers are affected by gender and racial cues controlled in the images, e.g., feminine faces may elicit higher scores for the concept of nurse and lower scores for STEM-related concepts. 
    more » « less
  4. While security technology can be nearly impenetrable, the people behind the computer screens are often easily manipulated, which makes the human factor the biggest threat to cybersecurity. This study examined whether college students disclosed private information about themselves, and what type of information they shared. The study utilized pretexting, in which attackers impersonate individuals in certain roles and often involves extensive research to ensure credibility. The goal of pretexting is to create situations where individuals feel safe releasing information that they otherwise might not. The pretexts used for this study were based on the natural inclination to help, where people tend to want to help those in need, and reciprocity, where people tend to return favors given to them. Participants (N=51) answered survey questions that they thought were for a good cause or that would result in a reward. This survey asked for increasingly sensitive information that could be used maliciously to gain access to identification, passwords, or security questions. Upon completing the survey, participants were debriefed on the true nature of the study and were interviewed about why they were willing to share information via the survey. Some of the most commonly skipped questions included “Student ID number” and “What is your mother’s maiden name?”. General themes identified from the interviews included the importance of similarities between the researcher and the subject, the researcher’s adherence to the character role, the subject’s awareness of question sensitivity, and the overall differences between online and offline disclosure. Findings suggest that college students are more likely to disclose private information if the attacker shares a similar trait with the target or if the attacker adheres to the character role they are impersonating. Additionally, this study sheds light on the research limitations, emphasizes the relevance of the human factor in security and privacy, and offers recommendations for future research. 
    more » « less
  5. null (Ed.)
    Knowing the descriptive norm concerning others' prosociality could affect your behavior, but would you seek out or avoid such knowledge? This high‐powered preregistered experiment explores the effect of both forced and optionally revealed descriptive norms on real monetary donations. These norms were established by learning the proportion of previous participants who had donated to a charitable organization that the respondent now was asked to donate to. For those learning about a norm, participants were more likely to donate if they were shown that a majority donates, compared with if they were shown that a minority donates. For the participants who were asked if they wanted to reveal the norm or not, we found that about half choose to reveal the norm. Those who avoided revealing the norm donated less frequently; both compared with revealers and with those who were forced to view the norm. However, these norm avoiders also donate a higher mean amount. Taken together, this hints at norm avoiders being composed of both altruistic and non‐altruistic people, with fewer of those who are undecided. This type of norm avoidance may be more related to information avoidance motives rather than mere curiosity or reactance. The present findings can inspire further research into the motives of norm avoidance. 
    more » « less