Deconstructing Bias

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Groupy and Non-Groupy Behavior: Deconstructing Bias in Social Preferences

This paper deconstructs social preferences in group contexts and resolves the contradiction between laboratory findings of inequity aversion and the destructive reality of group conflict. The paper replicates previous results that subjects are—on average—inequity averse towards out-group participants and more so towards in-group. However, the mean is not representative. Using a with-in subject ...

متن کامل

Groupy and Not Groupy Behavior: Deconstructing Bias in Social Preferences

This paper finds systematically different individual behavior in group settings. Each participant allocates income in two treatments, a minimal group setting and a political group setting. A large set of subjects show ingroup bias in both, indicating that bias depends on group division per se rather than group identity. Other subjects show no bias in either setting. While the average subject is...

متن کامل

Deconstructing SYNtax

There are at least two distinct ways of conceiving of syntax: the set of rules that enable speakers and listeners to combine the meaning of expressions (compositional syntax), or the set of formal constraints on the combinations of expressions (formal syntax). The question that occupies us in this paper is whether all languages include a significant formal syntax component or whether there are ...

متن کامل

Deconstructing stemness.

Stem cells are unique in their capacity to self-renew and generate differentiated progeny to maintain tissues throughout life. A common molecular program for stem cells has remained elusive. We discuss what the molecular logic of stemness may be. We suggest that it may not be coupled to distinct cellular properties such as self-renewal or multipotency, but rather to the stable suspension at a s...

متن کامل

Deconstructing Xen

Hypervisors have quickly become essential but are vulnerable to attack. Unfortunately, efficiently hardening hypervisors is challenging because they lack a privileged security monitor and decomposition strategies. In this work we systematically analyze the 191 Xen hypervisor vulnerabilities from Xen Security Advisories, revealing that the majority (144) are in the core hypervisor not Dom0. We t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Academic Medicine

سال: 2020

ISSN: 1040-2446

DOI: 10.1097/acm.0000000000003263