TRUST in COGNITIVE AGENTS by Ewart Jan De Visser a Dissertation

Total Page:16

File Type:pdf, Size:1020Kb

TRUST in COGNITIVE AGENTS by Ewart Jan De Visser a Dissertation THE WORLD IS NOT ENOUGH: TRUST IN COGNITIVE AGENTS by Ewart Jan de Visser A Dissertation Submitted to the Graduate Faculty of George Mason University in Partial Fulfillment of The Requirements for the Degree of Doctor of Philosophy Psychology Committee: Director Department Chairperson Program Director Dean, College of Humanities and Social Sciences Date: Summer Semester 2012 George Mason University Fairfax, VA The World Is Not Enough: Trust in Cognitive Agents A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Ewart Jan de Visser Master of Arts George Mason University, 2007 Bachelor of Arts University of North Carolina at Wilmington, 2005 Director: Raja Parasuraman, University Professor Department of Psychology Summer Semester 2012 George Mason University Fairfax, VA Copyright c 2012 by Ewart Jan de Visser All Rights Reserved ii Dedication I dedicate this dissertation to Jos, Olga, Emmy, and Yorick. Your unconditional love and trust has kept me going. De raderen draaien...nog steeds. iii Acknowledgments My FILM 101 teacher told me on the first day of class that creating a movie constitutes a small miracle. It is no different with a dissertation. Many of the ideas, methods, and procedures contained in this work were conceived, adjusted, and refined after many discussions with a number of people. I have been blessed to be surrounded by such a group of loving, caring, and supportive people throughout my graduate studies, and I would like to mention these individuals here with a few words. Raja, you have supported me in every way possible throughout my Ph.D. I cannot imagine a better advisor. Thank you for your patience and support at all times and for setting the bar high. Thank you for showing me gradualness, modesty, and passion in science. I am also pleased to report that I have met your three unofficial Ph.D. goals, including eating your delicious spicy food, publishing one first authored publication in a respectable journal, and beating you once in pool. Frank, it was serendipity that you arrived at George Mason at the time of my proposal writings on trust. You have directed me to all the neuroeconomic aspects of trust, which has greatly enhanced my work. Thanks for all your crucial help in finalizing my proposal and critical comments on my work. I have enjoyed our many idea-filled meetings at the Jazzman cafe. Patrick, thanks for the many scientific and personal discussions on the philosophy of science, trust, and a host of other topics near the JC bike rack. Thanks for pushing me towards R and Latex in the end; my thesis rests on its structure. Tyler, thanks for all the daily soulful conversations, our frequent ice-tea runs with Delicious Dutch Delectables, frequent encouragement to emerge from the fog and get to the story, numerous visits to the man-cave, dissertation writing sessions at Bus Boys and Poets, award winning movie making, all the fun times in San Francisco, Miami, and Vegas, and for being a true friend. I would like to thank the following Arch Lab members and research assistants who have helped me with developing the materials for this dissertation, collecting and coding data, and helped me to develop the software to run the experiment. These include Steve Scheid, Stephanie Chalk, Laya Muralidharan, Rizhna Chener, Andreina Daza, Andres Arredondo, Saman Berenji, Lara Moody and Melissa Smith. I would also like to thank Peter-Paul van Maanen, Peter Twieg, Adam Emfield, and Bill Miller for assistance in programming the experimental task. Furthermore, I would like to thank Asaf Beasley for providing the AMP task and Kevin Young for providing the Balloon Task. To the The Fisherman Circle, you are my foundation. To my dad, thank you for keeping me on track to finish, reading my writings, and promoting my work to others. To my mom, thanks for the for reminders to get the PhD done, the wonderful time at the Ole Mink farm, frequent visits to the USA with dad, and even making my graduation goal your password (please change it now). To my sister, thank you for being a golden angel and keeping me iv on the ground. To my lil bro, thanks for providing humorous reviews, notifying me of the latest I-phone games on my breaks, and completing your awesome thesis ahead of me. To Jasmine, thank you for daily morning technical and emotional phone support, your mangos, melons, and lentils, our late night skype writing nights, and the fun classes we shared together for distraction and relaxation. To Minhaj, thank you for the writing sessions in the Caribou coffee shop in the early stages of my dissertation. Thank you for listening with enthusiasm to the formation of my ideas on this topic, showing and reminding me how to remain a Homo Ludens, and explaining to me how desis became the greatest nation on earth. Finally, I would like to thank the American Psychological Association (APA) for awarding me a Dissertation Research Award that supported this work and the grant FA9550-10-1-0385 from the Air Force Office of Scientific Research. The creation of something new is not accomplished by the intellect but by the play instinct acting from inner necessity. - Carl Jung v Table of Contents Page ListofFigures........................................ viii Abstract........................................... x 1TrustinCybersocieties................................ 1 1.1 Introduction.................................... 1 1.2 Human-Human Trust . 3 1.2.1 Threat Policy and Action . 5 1.2.2 Threat Assessment . 5 1.2.3 Trust Evolution . 7 1.3 Human-Automation Trust . 8 1.3.1 Agent Belief . 9 1.3.2 Agent Experience . 9 1.4 Human-Human Trust vs. Human-Automation Trust . 10 1.4.1 Agent Belief . 11 1.5 AgentExperience................................. 14 1.5.1 Task Difficulty .............................. 14 1.5.2 Etiquette ................................. 14 1.5.3 TrustRepair ............................... 15 1.5.4 Feedback ................................. 16 1.5.5 Level of Automation Assistance . 16 1.5.6 Trust Evolution . 17 1.5.7 Individual Differences .......................... 17 1.6 The Cognitive Agent Experiments . 18 1.6.1 TheCurrentStudy............................ 19 2 MethodsandResults ................................. 23 2.1 Experiment1 ................................... 23 2.1.1 Method .................................. 23 2.1.2 Results .................................. 30 2.1.3 Discussion................................. 38 2.2 Experiment2 ................................... 38 vi 2.2.1 Method .................................. 38 2.2.2 Results .................................. 39 2.2.3 Discussion................................. 47 2.3 Experiment3 ................................... 47 2.3.1 Method .................................. 47 2.3.2 Results .................................. 48 2.3.3 Discussion................................. 53 2.4 Experiment4 ................................... 54 2.4.1 Method .................................. 54 2.4.2 Results .................................. 55 2.5 Discussion..................................... 62 3 GeneralDiscussion................................... 64 3.1 Human-Human Trust and Human-Automation Trust are Different . 64 3.2 Agent Belief interacts with Agent Experience . 66 3.3 The Cognitive Agent Spectrum Is Useful for Categorizing Agents . 67 3.4 Limitations . 68 3.5 Implications for Design and Training . 69 3.6 FutureResearch ................................. 69 3.7 Conclusion .................................... 70 A BenevolentStories ................................... 72 A.1 Computer Agent Story: PC-Check . 72 A.2 Avatar Agent Story: TaxFiler . 73 A.3 Human Agent Story: Matt O’Shea . 75 B MalevolentStories ................................... 77 B.1 Computer Agent Story: SecCrack . 77 B.2 Avatar Agent Story: TXTSPY . 78 B.3 Human Agent Story: Matt O’Shea . 80 References . 82 vii List of Figures Figure Page 1.1 The Eastern Scheldt storm surge barrier (Dutch: “Oosterscheldekering”). 3 1.2 Advanced organizer: Trust threat taxonomy . 4 2.1 Theexperimentaldesign............................. 24 2.2 The Cognitive Agent Spectrum . 25 2.3 The Cognitive Agents . 26 2.4 The TNO Trust Task (T 3). ........................... 28 2.5 Agent by reliability for pattern recognition performance in Experiment 1. The red dashed line indicates chance performance on the task. 31 2.6 Agent by reliability for overall performance in Experiment 1. 32 2.7 Agent by reliability for compliance in Experiment 1. The red triangles indicate calibrated performance. 33 2.8 Agent by reliability for self-reliance in Experiment 1. 35 2.9 Agent by reliability for trust in Experiment 1. The red triangles indicate calibratedtrust................................... 36 2.10 Agent by time for perceived morality in Experiment 1. 37 2.11 Agent by reliability for overall performance in Experiment 2. The red dashed line indicates chance performance on the task. 41 2.12 Agent by reliability for compliance in Experiment 2. The red triangles indicate calibrated performance. 42 2.13 Agent by reliability for self-reliance in Experiment 2. 43 2.14 Agent by reliability for trust in Experiment 2. The red triangles indicate calibratedtrust................................... 44 2.15 Agent by Time for perceived security in Experiment 2. 45 2.16 Agent by Time for perceived morality in Experiment 2. 46 2.17 Agent by reliability for overall performance in Experiment 3. 49 2.18 Agent by reliability for compliance in Experiment 3. The red triangles indicate calibrated performance.
Recommended publications
  • The Hidden Structure of Overimitation
    The hidden structure of overimitation Derek E. Lyons*†, Andrew G. Young‡, and Frank C. Keil* *Department of Psychology, Yale University, Box 208205, New Haven, CT 06520; and ‡Department of Psychology, University of Wisconsin, Brogden Hall, Madison, WI 53706 Edited by Susan E. Carey, Harvard University, Cambridge, MA, and approved October 18, 2007 (received for review May 11, 2007) Young children are surprisingly judicious imitators, but there are than in the utility of the actions that they copy. Others suggest that also times when their reproduction of others’ actions appears children overimitate ‘‘because they [see] the behavior of the dem- strikingly illogical. For example, children who observe an adult onstrator as intentional, even if they did appreciate that some parts inefficiently operating a novel object frequently engage in what of the demonstration were causally irrelevant’’ (ref. 10, p. 179). That we term overimitation, persistently reproducing the adult’s un- is, the intentionality of the adult’s action may constitute an implicit necessary actions. Although children readily overimitate irrelevant social demand for children, leading them to infer that they are actions that even chimpanzees ignore, this curious effect has ‘‘supposed’’ to imitate. A final possibility is that overimitation may previously attracted little interest; it has been assumed that chil- simply be a byproduct of habit. Overimitation may arise, in other dren overimitate not for theoretically significant reasons, but words, because imitation ‘‘remains habitual even in a specific rather as a purely social exercise. In this paper, however, we situation in which less fidelity would actually afford more effi- challenge this view, presenting evidence that overimitation re- ciency’’ (ref.
    [Show full text]
  • Andrea Deoudes, Kinetics: a Clock Reaction
    A Kinetics Experiment The Rate of a Chemical Reaction: A Clock Reaction Andrea Deoudes February 2, 2010 Introduction: The rates of chemical reactions and the ability to control those rates are crucial aspects of life. Chemical kinetics is the study of the rates at which chemical reactions occur, the factors that affect the speed of reactions, and the mechanisms by which reactions proceed. The reaction rate depends on the reactants, the concentrations of the reactants, the temperature at which the reaction takes place, and any catalysts or inhibitors that affect the reaction. If a chemical reaction has a fast rate, a large portion of the molecules react to form products in a given time period. If a chemical reaction has a slow rate, a small portion of molecules react to form products in a given time period. This experiment studied the kinetics of a reaction between an iodide ion (I-1) and a -2 -1 -2 -2 peroxydisulfate ion (S2O8 ) in the first reaction: 2I + S2O8 I2 + 2SO4 . This is a relatively slow reaction. The reaction rate is dependent on the concentrations of the reactants, following -1 m -2 n the rate law: Rate = k[I ] [S2O8 ] . In order to study the kinetics of this reaction, or any reaction, there must be an experimental way to measure the concentration of at least one of the reactants or products as a function of time. -2 -2 -1 This was done in this experiment using a second reaction, 2S2O3 + I2 S4O6 + 2I , which occurred simultaneously with the reaction under investigation. Adding starch to the mixture -2 allowed the S2O3 of the second reaction to act as a built in “clock;” the mixture turned blue -2 -2 when all of the S2O3 had been consumed.
    [Show full text]
  • The Art of Thinking Clearly
    For Sabine The Art of Thinking Clearly Rolf Dobelli www.sceptrebooks.co.uk First published in Great Britain in 2013 by Sceptre An imprint of Hodder & Stoughton An Hachette UK company 1 Copyright © Rolf Dobelli 2013 The right of Rolf Dobelli to be identified as the Author of the Work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means without the prior written permission of the publisher, nor be otherwise circulated in any form of binding or cover other than that in which it is published and without a similar condition being imposed on the subsequent purchaser. A CIP catalogue record for this title is available from the British Library. eBook ISBN 978 1 444 75955 6 Hardback ISBN 978 1 444 75954 9 Hodder & Stoughton Ltd 338 Euston Road London NW1 3BH www.sceptrebooks.co.uk CONTENTS Introduction 1 WHY YOU SHOULD VISIT CEMETERIES: Survivorship Bias 2 DOES HARVARD MAKE YOU SMARTER?: Swimmer’s Body Illusion 3 WHY YOU SEE SHAPES IN THE CLOUDS: Clustering Illusion 4 IF 50 MILLION PEOPLE SAY SOMETHING FOOLISH, IT IS STILL FOOLISH: Social Proof 5 WHY YOU SHOULD FORGET THE PAST: Sunk Cost Fallacy 6 DON’T ACCEPT FREE DRINKS: Reciprocity 7 BEWARE THE ‘SPECIAL CASE’: Confirmation Bias (Part 1) 8 MURDER YOUR DARLINGS: Confirmation Bias (Part 2) 9 DON’T BOW TO AUTHORITY: Authority Bias 10 LEAVE YOUR SUPERMODEL FRIENDS AT HOME: Contrast Effect 11 WHY WE PREFER A WRONG MAP TO NO
    [Show full text]
  • 08-1521 Mcdonald V. Chicago (06/28/2010)
    (Slip Opinion) OCTOBER TERM, 2009 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337. SUPREME COURT OF THE UNITED STATES Syllabus MCDONALD ET AL. v. CITY OF CHICAGO, ILLINOIS, ET AL. CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SEVENTH CIRCUIT No. 08–1521. Argued March 2, 2010—Decided June 28, 2010 Two years ago, in District of Columbia v. Heller, 554 U. S. ___, this Court held that the Second Amendment protects the right to keep and bear arms for the purpose of self-defense and struck down a Dis- trict of Columbia law that banned the possession of handguns in the home. Chicago (hereinafter City) and the village of Oak Park, a Chi- cago suburb, have laws effectively banning handgun possession by almost all private citizens. After Heller, petitioners filed this federal suit against the City, which was consolidated with two related ac- tions, alleging that the City’s handgun ban has left them vulnerable to criminals. They sought a declaration that the ban and several re- lated City ordinances violate the Second and Fourteenth Amend- ments. Rejecting petitioners’ argument that the ordinances are un- constitutional, the court noted that the Seventh Circuit previously had upheld the constitutionality of a handgun ban, that Heller had explicitly refrained from opining on whether the Second Amendment applied to the States, and that the court had a duty to follow estab- lished Circuit precedent.
    [Show full text]
  • The Visser Chronicles
    1 Animorphs Chronicles 3 Visser K.A. Applegate *Converted to EBook by asmodeus *edited by Dace k 2 Prologue “Honey?” No answer. My husband was watching a game on television. He was preoccupied. “Honey?” I repeated, adding more urgency to my tone of voice. He looked over. Smiled sheepishly. “What’s up?” “Marco’s fever is down. I think he’s basically over this thing. He’s asleep. Anyway, I was thinking of getting some fresh air.” He muted the television. “Good idea. It’s tough when they’re sick, huh? Kids. He’s okay, though, huh?” “It’s just a virus.” “Yeah, well, take some time, you’ve been carrying the load. And if you’re going to the store- “ “Actually, I think I’ll go down to the marina.” He laughed and shook his head. “Ever since you bought that boat… I think Marco has some competition as the favorite child in this household.” He frowned. “You’re not taking it out, are you? Looks kind of gloomy out.” I made a smile. “Just want to make sure it’s well secured, check the ropes and all.” He was back with the game. He winced at some error made by his preferred team. “Uh-huh. Okay.” I stepped back, turned, and walked down the hall. The door to Marco’s room was ajar. I paused to look inside. I almost couldn’t do otherwise because the other voice in my head, the beaten-down, repressed human voice, was alive and screaming and screaming at me, begging me, pleading <No! No! No!> Marco was still asleep.
    [Show full text]
  • The Effects of Stimulus Structure and Familiarity on Same-Different Comparison* HOWARD S
    Perception & Psychophysics 1973. Vol. 14. No. 3.413-420 The effects of stimulus structure and familiarity on same-different comparison* HOWARD S. HOCK+ Florida A tlantic University. Boca Raton. Florida 33432 It was hypothesized that performance in the same-different comparison task is based on two modes of processing: (I) structural processes that organize the detailed parts of a stimulus into a well-formed whole, and (2) analytic processes that decompose the stimulus into features. This hypothesis was supported, but with the unexpected finding of individual differences in the mode of processing underlying "same" responses. Those Ss in the "same" condition whose reaction times were faster for symmetrical than for asymmetrical patterns supported the hypothesis for structural processes. The remaining Ss in the "same" condition, as well as all the Ss in the "different" condition, were unaffected by symmetry. These Ss supported the hypothesis for analytic processes. Although familiarity effects were obtained for both structural and analytic Ss, the rotation of the familiar patterns into an unfamiliar orientation virtually eliminated familiarity effects for the structural Ss, bu t left them intact for analytic Ss. In recent years, there has been extensive research "different" response can be based on the detection of using the same-different comparison task, which involves any differentiating feature, while a correct "same" the measurement of reaction times for "same" and response must be the result of an exhaustive comparison "different" responses to pairs of simultaneously (or of all the features of the stimuli. On this basis, "same" sequentially) presented stimuli. For the most part, this responses could be as fast as "different" responses, but research has been based on the assumption that feature they should never be faster.
    [Show full text]
  • A Novel Decision Making Model of the Globalizing Consumer Behavior
    A NOVEL DECISION - MAKING MODEL OF THE GLOBALIZING CONSUMER BEHAVIOR: EVIDENCE FROM CHINESE MIDDLE - CLASS CONSUMERS WHO PURCHASE LUXURY GOODS FROM OVERSEAS MARKETS Presented by Yang Liu Southern New Hampshire University 2500 North River Road, Manchester, New Hampshire 03106, USA Dissertation Committee: Dr. Aysun Ficici, Chair Professor of International Business and Strategy Dr. Massood Samii Professor of International Business Dr. Tej Dhakar Professor of Management Science Dr. Ling Ling Wang Assistant Professor of International Business Worcester State University 1 Dedication I would like to dedicate my dissertation to my grandparents who raised me up and taught me perseverance. I would also like to dedicate my dissertation to my parents who encourage me to pursue this path, always support me, and teach me to be principled, ethical and intellectual. Finally, I would like to dedicate my dissertation to my friend, Wei Liu who through his giftedness accompanied me in the hard times during this journey. 3 Acknowledgments I would like to thank my Dissertation Committee Chair, Professor Aysun Ficici who has supported me from the very beginning of my doctoral journey. As my Dissertation Committee Chair, she guided me structurally both qualitatively and quantitatively through her deep knowledge in variety of subject areas, who also stayed with me after hours to work on my dissertation with me. She taught me how to be a good researcher, a good writer, and an academician. I would like to thank Professor Tej Dhakar for his valuable assistance in providing me feedback in my quantitative research. I would like to thank Professor Massood Samii for guiding me in the process and sharing his deep knowledge in the field of strategy.
    [Show full text]
  • NIH Public Access Author Manuscript Dev Sci
    NIH Public Access Author Manuscript Dev Sci. Author manuscript; available in PMC 2012 March 1. NIH-PA Author ManuscriptPublished NIH-PA Author Manuscript in final edited NIH-PA Author Manuscript form as: Dev Sci. 2011 March ; 14(2): 372±384. doi:10.1111/j.1467-7687.2010.00986.x. Adaptation to novel accents by toddlers Katherine S. White and Richard N. Aslin University of Rochester Abstract Word recognition is a balancing act: listeners must be sensitive to phonetic detail to avoid confusing similar words, yet, at the same time, be flexible enough to adapt to phonetically variable pronunciations, such as those produced by speakers of different dialects or by non-native speakers. Recent work has demonstrated that young toddlers are sensitive to phonetic detail during word recognition; pronunciations that deviate from the typical phonological form lead to a disruption of processing. However, it is not known whether young word learners show the flexibility that is characteristic of adult word recognition. The present study explores whether toddlers can adapt to artificial accents in which there is a vowel category shift with respect to the native language. 18– 20-month-olds heard mispronunciations of familiar words (e.g., vowels were shifted from [a] to [æ]: “dog” pronounced as “dag”). In test, toddlers were tolerant of mispronunciations if they had recently been exposed to the same vowel shift, but not if they had been exposed to standard pronunciations or other vowel shifts. The effects extended beyond particular items heard in exposure to words sharing the same vowels. These results indicate that, like adults, toddlers show flexibility in their interpretation of phonological detail.
    [Show full text]
  • Science Fiction Stories with Good Astronomy & Physics
    Science Fiction Stories with Good Astronomy & Physics: A Topical Index Compiled by Andrew Fraknoi (U. of San Francisco, Fromm Institute) Version 7 (2019) © copyright 2019 by Andrew Fraknoi. All rights reserved. Permission to use for any non-profit educational purpose, such as distribution in a classroom, is hereby granted. For any other use, please contact the author. (e-mail: fraknoi {at} fhda {dot} edu) This is a selective list of some short stories and novels that use reasonably accurate science and can be used for teaching or reinforcing astronomy or physics concepts. The titles of short stories are given in quotation marks; only short stories that have been published in book form or are available free on the Web are included. While one book source is given for each short story, note that some of the stories can be found in other collections as well. (See the Internet Speculative Fiction Database, cited at the end, for an easy way to find all the places a particular story has been published.) The author welcomes suggestions for additions to this list, especially if your favorite story with good science is left out. Gregory Benford Octavia Butler Geoff Landis J. Craig Wheeler TOPICS COVERED: Anti-matter Light & Radiation Solar System Archaeoastronomy Mars Space Flight Asteroids Mercury Space Travel Astronomers Meteorites Star Clusters Black Holes Moon Stars Comets Neptune Sun Cosmology Neutrinos Supernovae Dark Matter Neutron Stars Telescopes Exoplanets Physics, Particle Thermodynamics Galaxies Pluto Time Galaxy, The Quantum Mechanics Uranus Gravitational Lenses Quasars Venus Impacts Relativity, Special Interstellar Matter Saturn (and its Moons) Story Collections Jupiter (and its Moons) Science (in general) Life Elsewhere SETI Useful Websites 1 Anti-matter Davies, Paul Fireball.
    [Show full text]
  • A Novel Framework for Threat Analysis of Machine Learning-Based Smart Healthcare Systems
    A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems Nur Imtiazul Haque∗, Mohammad Ashiqur Rahman∗, Md Hasan Shahriar∗ Alvi Ataur Khalil∗ and Selcuk Uluagacy ∗Analytics for Cyber Defense (ACyD) Lab, yCyber-Physical Systems Security Lab Department of Electrical and Computer Engineering Florida International University, Miami, USA f nhaqu004, marahman, mshah068, akhal042, suluagacg@fiu.edu Abstract—Smart healthcare systems (SHSs) are providing fast and triggers implantable medical devices (IMDs) for real-time and efficient disease treatment leveraging wireless body sensor medication and treatment. Currently, healthcare facilities are networks (WBSNs) and implantable medical devices (IMDs)- more efficient, accessible, and personalized as the SHS is based internet of medical things (IoMT). In addition, IoMT-based SHSs are enabling automated medication, allowing communication ameliorating disease diagnostic tools, treatment for patients, among myriad healthcare sensor devices. However, adversaries and healthcare devices, thus improving the quality of lives [6]. can launch various attacks on the communication network and However, an SHS requires processing a lot of historical data to the hardware/firmware to introduce false data or cause data identify anomalous sensor measurements. The data related to unavailability to the automatic medication system endangering healthcare and medication are affluent. They can be utilized to the patient’s life. In this paper, we propose SHChecker, a novel threat analysis framework
    [Show full text]
  • CEAC 104 GENERAL CHEMISTRY Experiment 4 Effect of Concentration and Temperature on Rate of Reaction (Dissappearing Cross)
    CEAC 104 GENERAL CHEMISTRY Experiment 4 Effect of Concentration and Temperature on Rate of Reaction (Dissappearing Cross) Purpose: To observe the effect of concentration and temperature upon the rate of the reaction of sodium thiosulfate with hydrochloric acid. APPARATUS AND CHEMICALS: Sodium thiosulfate solution Thermometer Bunsen burner Hydrochloric acid Measuring cylinder Piece of paper Distilled water Conical flask Wire gauze THEORY: On the basis of experiments you've performed, you probably have already noticed that reactions occur at varying speeds. There is an entire spectrum of reaction speeds, ranging from very slow to extremely fast. For example, the rusting of iron is reasonably slow, whereas the decomposition of TNT is extremely fast. The branch of chemistry that is concerned with the rates of reactions is called chemical kinetics. Experiments show that rates of reactions in solution depend upon: 1. The nature of the reactants 2. The concentration of the reactants 3. The temperature 4. Catalysis. Before a reaction can occur, the reactants must come into direct contact via collisions of the reacting particles. However, even then, the reacting particles (ions or molecules) must collide with sufficient energy to result in a reaction; if they do not, their collisions are ineffective and analogous to collisions of billiard balls. With these considerations in mind, we can quantitatively explain how the various factors influence the rates of reactions. Concentration: Changing the concentration of a solute in solution alters the number of particles per unit volume. The more particles present in a given volume, the greater the probability of them colliding. Hence, increasing the concentration of a solute in solution increases the number of collisions per unit time and therefore, increases the rate of reaction.
    [Show full text]
  • The Case of Spatial Reorientation
    •¢.*~ " " r', ;: , ." ,; ! COGNITION ELSEVIER Cognition 61 (1996) 195-232 Modularity and development: the case of spatial reorientation Linda Hermer*, Elizabeth Spelke Department of Psychology, Cornell University, Uris Hall, Ithaca NY 14853, USA Received 27 March 1995, final version 20 February 1996 Abstract In a series of experiments, young children who were disoriented in a novel environment reoriented themselves in accord with the large-scale shape of the environment but not in accord with nongeometric properties of the environment such as the color of a wall, the patterning on a box, or the categorical identity of an object. Because children's failure to reorient by nongeometric information cannot be attributed to limits on their ability to detect, remember, or use that.information for other purposes, this failure suggests that children's reorientation, at least in relatively novel environments, depends on a mechanism that is informationally encapsulated and task-specific: two hallmarks of modular cognitive processes. Parallel studies with rats suggest that children share this mechanism with at least some adult nonhuman mammals. In contrast, our own studies of human adults, who readily solved our tasks by conjoining nongeometric and geometric information, indicated that the most striking limitations of this mechanism are overcome during human development. These findings support broader proposals concerning the domain specificity of humans' core cognitive abilities, the conservation of cognitive abilities across related species and
    [Show full text]