Custard: Computing Norm States Over Information Stores

Total Page:16

File Type:pdf, Size:1020Kb

Custard: Computing Norm States Over Information Stores Custard: Computing Norm States over Information Stores Amit K. Chopra Munindar P. Singh School of Computing and Communications Department of Computer Science Lancaster University North Carolina State University Lancaster, LA1 4WA, UK Raleigh, NC 27695-8206, USA [email protected] [email protected] ABSTRACT instance would specify the specific patient whose information has Norms provide a way to model the social architecture of a so- been received. Some instances of a norm may be violated and ciotechnical system (STS) and are thus crucial for understanding some satisfied. We consider important norm types from the liter- how such a system supports secure collaboration between princi- ature, namely, commitment, authorization, prohibition, and power pals, that is, autonomous parties such as humans and organizations. [4, 22, 26, 36]. Each of these norm types involves a canonical life- Accordingly, an important challenge is to compute the state of a cycle [36], discussed in Figure 3, in which a norm instance may be norm instance at runtime in a sociotechnical system. created, expired, detached, discharged, or violated. Custard addresses this challenge by providing a relational syn- Norms as institutional facts are elements of social reality in the tax for schemas of important norm types along with their canonical sense of Searle [31] and as such are realized through and reflected lifecycles and providing a mapping from each schema to queries in brute facts [3], that is, low-level information. In our setting, brute that compute instances of the schema in different lifecycle stages. facts are recorded in databases and event logs; often, these events In essence, Custard supports a norm-based abstraction layer over correspond to messages sent and received. However, Searle’s claims underlying information stores such as databases and event logs. about mental representation are inapplicable here [7, 16, 30, 32]. Specifically, it supports deadlines; complex events, including those An important challenge in realizing norms, therefore, is how to based on aggregation; and norms that reference other norms. compute norm instances from brute facts. To this end, we treat (1) We prove important correctness properties for Custard, includ- norms on par with information schemas and (2) database relations ing stability (once an event has occurred, it has occurred forever) as stores of norm instances in various lifecycle stages. For example, and safety (a query returns a finite set of tuples). Our compiler gen- an information store may indicate which instances of a prohibition erates SQL queries from Custard specifications. Writing out such are expired and which are violated. In general, we would like to SQL queries by hand is tedious and error-prone even for simple specify nested norms—for example, a commitment to inform pa- norms, thus demonstrating Custard’s practical benefits. tients of the violation of a prohibition on disclosing their private information. Figure 1 illustrates our approach in conceptual terms. 1. INTRODUCTION Figure 1: Custard real- Norm-Aware Agent A sociotechnical system (STS) involves social elements or prin- izes norms over information cipals, such as autonomous humans or organizations, and technical stores. An agent can query elements such as IT resources. We understand an agent as a soft- Norm Store a virtual norm store for norm ware entity that acts on behalf of a principal in an STS. (virtualized as Custard queries) instances; Custard computes Norms provide a standard of correctness for interactions among and retrieves such instances the principals, thereby capturing the social architecture of an STS Traditional Information Store based on events in the under- [37]. Specifically, a norm captures how the principals ought to in- (event log, relational database) lying information store. teract: it provides a social-level, yet computational, encoding of an integrity or security (for simplicity, including privacy) requirement Our contributions are as below. First, we propose Custard, a lan- regarding their collaboration. An example norm would be that a guage for specifying information-based norms, including commit- physician is prohibited by the hospital from disclosing identifying ments, authorizations, prohibitions, and powers. Custard is event- information about a patient. Such a norm helps characterize secu- based: important stages in the lifecycle of a norm instance, specifi- rity at the social level independently of the implementation. There- cally, its creation, detachment, expiration, discharge, and violation, fore, representing norms is crucial for an agent to determine how to are event instances and inferred from event instances recorded in act; and how to evaluate compliance and accountability of others. the underlying information store. Custard supports complex event We distinguish norm schemas from instances. A norm schema expressions involving logic operators, aggregation operators, rel- or specification describes a norm in general terms, such as a pro- ative time intervals within which events should occur, and nested hibition against disclosing information about a patient. A norm norms. We give the semantics of Custard via queries in the tuple relational calculus (TRC) [15]. Effectively, for every norm speci- Appears in: Proceedings of the 15th International Conference on Au- fied in Custard, we define a query (expression) for each stage in the tonomous Agents and Multiagent Systems (AAMAS 2016), norm’s canonical lifecycle, which yields all instances of the norm J. Thangarajah, K. Tuyls, C. Jonker, S. Marsella (eds.), in that stage. The benefit of using the TRC is that it maps well to May 9–13, 2016, Singapore. Copyright c 2016, International Foundation for Autonomous Agents and underlying representations and paves the way for easy implemen- Multiagent Systems (www.ifaamas.org). All rights reserved. tation in widely used query languages such as SQL. Second, we formulate and prove two desirable properties for key accID time t Custard. Stability is monotonicity over time: once an event in- stance has occurred, it stays occurred forever. For example, a pro- //pID allows disclosure to third party tpID hibition instance violated at one moment remains violated at all Allowed(pID, hID, discID , accID, tpID, info) key d i s c I D time t future moments. Ensuring stability requires a correct treatment of time. Safety captures the idea that queries map to finite sets. //pID revokes disclosure for tpID Third, because of Custard’s support for specifying the nonoccur- Revoked(pID, hID, discID) rence of an event, aggregation, and expressive time intervals, the key d i s c I D time t TRC queries for a norm turn out to be nontrivial. As Section 4 shows, even a simple Custard specification yields SQL queries that //hID sends creds to tpID if disclosure allowed SentCred(hID, tpID, discID , credentials) are complex and an order of magnitude longer. Writing such queries key d i s c I D time t by hand would be highly tedious, time-consuming, and error-prone. To demonstrate the practical benefits of Custard, we implemented //tpID requests patient data from hID a compiler that generates SQL queries from Custard specifications. ReqData(tpID, hID, reqID, discID , request) key reqID time t 2. SAMPLING CUSTARD IN PRIVACY //tpID gets access to the requested data Accessed(tpID, hID, reqID, response) We demonstrate the effectiveness of Custard by modeling a real- key reqID time t world privacy consent scenario being considered by Health Level Seven (HL7) [18], which is a leading standardization body for health //tpID forwards data to party otherID information systems. A patient signs up with a cloud-based health Forwarded(tpID, otherID , forID , reqID, response) vault provider to store and manage access to its private health infor- key f o rI D time t mation (PHI). This information may include records of the patient’s //hID sanctions tpID for mishandling information vital signs such as blood pressure and blood sugar, for example, as Sanction(hID, tpID, discID , details) monitored by wearable devices and uploaded to the vault. The pa- key d i s c I D time t tient may authorize third parties, such as a health coach, to receive We build on recent work that understands norm types such as the PHI from the vault by indicating consent. A patient may revoke commitment, authorization, prohibition, and power as directed so- an authorization. The overseeing jurisdictional authority empow- cial expectations between agents [36,37]. Figure 2 shows important ers the patient to grant or revoke such authorizations. In general, elements of our conceptual model. third parties authorized by the patient to access information are pro- hibited from forwarding the information they receive to yet other expectee Norm parties. Parties may be sanctioned for violating this prohibition. Agent Antecedent expecter (Instance) Listing 1 shows an information schema for this healthcare set- ting. It describes a number of event specifications as relations, each annotated with its key and timestamp attributes. No two instances Consequent of an event (specification) may have identical bindings for the key; for every instance, the timestamp attribute records the time of oc- currence of the instance. The key of one event may occur in an- Commit Authorize Prohibit Empower other. For example, accID occurs in Allowed. Such foreign keys enable correlation: every Allowed instance can be correlated by a Signedup instance via the binding for accID in the former. In gen- Figure 2: Simplified metamodel for norms (based on [36]). eral, correlations may be effected via chaining of foreign keys. For example, a Revoked instance is correlated with an Allowed instance In Figure 2, each (created) norm instance is a conditional ex- by discID, and, therefore, with Signedup via accID. pectation, whose antecedent states the condition under which the Notice that there can be at most one SentCred instance for an force of the norm, given by the consequent, applies. The expec- Allowed instance as their keys are identical. For every disclosure tor and expectee represent the privileged and liable parties, respec- to a third party, there can be zero or more requests for data from tively.
Recommended publications
  • How Our Worldviews Shape Our Practice
    How Our Worldviews Shape Our Practice Rachel M. Goldberg This article reviews research on the effect of a conflict resolution practi- tioner’s worldview on practice. The results revealed patterns connecting worldview frames with differing uses of power. Forty-three environ- mental and intercultural practitioners were interviewed, and narrative and metaphor analysis was used to reveal key worldview orientations in their practice stories. The results are correlated in continuums and “pro- files” of the worldview orientation. The findings strengthen previous work questioning the effects of the traditional neutrality stance, deepen fieldwide arguments for the embedded nature of worldview and cul- ture, and describe new methods that reveal some of the dynamics between worldview and practice. Native American tribe spent many years struggling against a govern- Ament agency for permanent residence status on their traditional homeland (the ability to live in and use their traditional homeland). Over time, their argument became a fight about permanent homes, because this was the only way to argue for use of the land that the agency understood. For the agency representatives, permanent housing (a building) was syn- onymous with permanent residence (ability to live on and use the land). One day, the mediator who was working with the tribe asked them why they wanted permanent homes. It turned out that the area became very hot during the summer; the tribe had traditionally built temporary homes in the winter and migrated to the mountains during the hot season. It become clear that the tribe did not even really want permanent housing, but a right to reside legally in the area—in their case, a very different goal.
    [Show full text]
  • Inferences: Schema, Assumptions, Biases
    W riting and Language Development Center Inferences: schema, assumptions, biases An inference is an informed guess. To be human is to make inferences. Daily, almost continually, we make informed guesses about things—situations, attitudes, relationships, motives. For instance, we guess (infer) someone’s state of mind or attitude by interpreting his tone of voice, facial expressions, and gestures. Since inferences are guesses, they may be correct or incorrect, but they are always based on some kind of supporting evidence. Active reading is an immersive activity. Writers construct stories and arguments with great deliberation; readers uncover their hints and unravel the connections. Therefore, a crucial element of active reading is the ability to make inferences from the text. Proficient readers do this without thinking much about it, while developing readers may not realize they should do it. Since in reading we don’t have the advantage of a face-to-face encounter, we have to use other evidence: various kinds of text evidence as well as our own schema (see definition below) and background knowledge. But schema is complicated. We bring not only known facts, but our personal assumptions and biases into the mix; they, too, are part of our schema. Nevertheless, understanding how we make inferences helps us read and think smarter and better and avoid misreading. Understanding how inference works can also keep us from falling for misleading or weak arguments. Text evidence: words and connections One kind of text evidence is the words themselves. Words have meanings—their denotation or definition. But beyond the definition, words also have emotional weight—their connotation.
    [Show full text]
  • Mental Models Concepts for System Dynamics Research
    Report No. 6 January 7, 1998 Mental Models Concepts for System Dynamics Research James K. Doyle1 David N. Ford 2 System Dynamics Review, in press. 1 Department of Social Science and Policy Studies, 100 Institute Rd., Worcester Polytechnic Institute, Worcester, MA 01609. Email: [email protected]. 2 Department of Information Science, University of Bergen, N-5020 Bergen, Norway. E-mail: [email protected] ABSTRACT Although "mental models" are of central importance to system dynamics research and practice, the field has yet to develop an unambiguous and agreed upon definition of them. To begin to address this problem, existing definitions and descriptions of mental models in system dynamics and several literatures related to cognitive science were reviewed and compared. Available definitions were found to be overly brief, general, and vague, and different authors were found to markedly disagree on the basic characteristics of mental models. Based on this review, we concluded that in order to reduce the amount of confusion in the literature, the mental models concept should be "unbundled" and the term "mental models" should be used more narrowly. To initiate a dialogue through which the system dynamics community might achieve a shared understanding of mental models, we proposed a new definition of "mental models of dynamic systems" accompanied by an extended annotation that explains the definitional choices made and suggests terms for other cognitive structures left undefined by narrowing the mental model concept. Suggestions for future research that could improve the field's ability to further define mental models are discussed. 2 A difficulty for those who want to understand or to appraise mental models is that their proponents seem to have somewhat different views.
    [Show full text]
  • FRAMING PROCESSES and SOCIAL MOVEMENTS: an Overview and Assessment
    P1: FQK June 3, 2000 15:56 Annual Reviews AR105-26 Annu. Rev. Sociol. 2000. 26:611–39 Copyright c 2000 by Annual Reviews. All rights reserved FRAMING PROCESSES AND SOCIAL MOVEMENTS: An Overview and Assessment Robert D. Benford Department of Sociology, University of Nebraska, Lincoln, Nebraska 68588-0324; e-mail: [email protected] David A. Snow Department of Sociology, University of Arizona, Tucson, Arizona 85721; e-mail: [email protected] Key Words social movements, frame, collective action, reality construction, culture ■ Abstract The recent proliferation of scholarship on collective action frames and framing processes in relation to social movements indicates that framing processes have come to be regarded, alongside resource mobilization and political opportunity processes, as a central dynamic in understanding the character and course of social movements. This review examines the analytic utility of the framing literature for un- derstanding social movement dynamics. We first review how collective action frames have been conceptualized, including their characteristic and variable features. We then examine the literature related to framing dynamics and processes. Next we review the literature regarding various contextual factors that constrain and facilitate framing processes. We conclude with an elaboration of the consequences of framing processes for other movement processes and outcomes. We seek throughout to provide clarifi- cation of the linkages between framing concepts/processes and other conceptual and theoretical formulations relevant to social movements, such as schemas and ideology. by Universitat Pompeu Fabra on 05/08/06. For personal use only. INTRODUCTION Annu. Rev. Sociol. 2000.26:611-639. Downloaded from arjournals.annualreviews.org The concept of frame has considerable currency in the social sciences today.
    [Show full text]
  • Interpretive Frameworks
    Volume 46 Number 3 Article 2 March 2018 The Common Thread in Kuyper, Kuhn and Cognitive Psychology: Interpretive Frameworks Daniel F. A. Hitchcock Follow this and additional works at: https://digitalcollections.dordt.edu/pro_rege Part of the Christianity Commons, and the Cognitive Psychology Commons Recommended Citation Hitchcock, Daniel F. A. (2018) "The Common Thread in Kuyper, Kuhn and Cognitive Psychology: Interpretive Frameworks," Pro Rege: Vol. 46: No. 3, 14 - 23. Available at: https://digitalcollections.dordt.edu/pro_rege/vol46/iss3/2 This Feature Article is brought to you for free and open access by the University Publications at Digital Collections @ Dordt. It has been accepted for inclusion in Pro Rege by an authorized administrator of Digital Collections @ Dordt. For more information, please contact [email protected]. The Common Thread in Kuyper, Kuhn and Cognitive Psychology: Interpretive Frameworks guage, or culture. The idea that subjectivity influences the way we interpret the world is not new; neither is the idea that subjective factors influence the meth- ods, discoveries, and applications of human col- lective efforts. Over the last half-century, the bastion of objective reason has been crumbling at its Enlightenment foundation. Fatal blows have come from insights in psychology and the phi- losophy of science. Although modern positivis- tic science has been mortally wounded, I believe an integrative approach can be taken between a strong relativistic position on truth and an abso- by Daniel Hitchcock lutist one. The Christian faith as a worldview le- gitimizes the assertion that there is a “real world” “We see and understand things not as they as well as the belief that we perceive it through are but as we are.” ~Anthony de Mello— interpretive lenses, which I will be calling “inter- Awareness (1990) pretive frameworks.” These frameworks can yield a plurality of views, including imperfect ones.
    [Show full text]
  • Schema on Delete Update
    Schema On Delete Update Antibacterial Rudolf generate: he competing his salon prudently and recently. Passible Lauren pickeers sothat eugenically utensil get-ups that Skippyunpriestly protuberated and professes very rhetorically.querulously. Caryatidal Collin smoodged her potamogetons The same location defined on schema update does multiple methods using sql statements along and possibly a snapshot when multiple employees These schema update one of delete a list of your support. INNER JOIN Employees ON employee. If theme or index analyzers, you wish to execute either an UPDATE through an INSERT depending on whether a given benefit from EMP has children match in EMP_COMMISSION. To rename a palace, even if they would if been accepted by obsolete old schema. Deleting a delete. But update on delete rows to execute. SQL Server DROP SCHEMA Statement By Practical Examples. How true I delete a schema in MySQL? However, ordering is guaranteed to see kept. Initializes the values for the callback or collection results of the actual support to enforce the tables will pick it also generates a newly created column? To quote this value rule can collapse a registry editor or shift the Allow Schema Updates check dictionary in the Schema snap-in on can delete schema objects in. This command does not regain a transaction, such by data chain from going outside. These commands are used to create vary and delete schemas. Resetting Entity Framework Migrations to a versatile Slate Rick. Disabled or enables referential integrity checking for machine whole database. Use CREATE INDEX to express an index on clause or more columns of iron table.
    [Show full text]
  • The Application of Schema Theory to the Analysis of Literary Discourse. Guy
    A theory of discourse deviation: the application of schema theory to the analysis of literary discourse. Guy William Davidson Cook Submitted in accordance with the requirements for the degree of PhD. The University of Leeds, School of English. June 1990. - ii - Abstract. Schema theory suggests that people understand texts and experiences by comparing them with stereotypical mental representations of similar cases. This thesis examines the relevance of this theory (as developed in some Artificial Intelligence (AI) work of the 1970s and 1980s) to literary theory and the analysis of literary texts. The general theoretical framework is that of discourse analysis. In this approach, the usefulness of schema theory is already widely acknowledged for the contribution it can make to an explanation of 'coherence': the quality of meaningfulness and unity perceived in discourse. Building upon this framework, relevant AI work on text processing is discussed, evaluated, and applied to literary and non-literary discourse. The argument then moves on to literary theory, and in particular to the 'scientific' tradition of formalism, structuralism and Jakobsonian stylistics. The central concept of this tradition is 'defamiliarization': the refreshing of experience through deviation from expectation. In structuralism, attention has been concentrated on text structure, and in Jakobsonian stylistics on language. It is argued that whereas AI work on text pays little attention to linguistic and textual form, seeking to 'translate' texts into a neutral representation of 'content', the literary theories referred to above have erred in the opposite direction, and concentrated exclusively on form. Through contrastive analyses of literary and non-literary discourse, it is suggested that neither approach is capable of accounting for •literariness* on its own.
    [Show full text]
  • Beliefs About Emotions and Emotion Schemas 1
    Running Head: BELIEFS ABOUT EMOTIONS AND EMOTION SCHEMAS 1 Disentangling beliefs about emotions from emotion schemas Jennifer C. Veilleux Kaitlyn D. Chamberlain Danielle E. Baker Elise A. Warner University of Arkansas Corresponding Author: Jennifer C. Veilleux, Ph.D. University of Arkansas 216 Memorial Hall Fayetteville, AR 72701 Phone: 479-575-5329 Fax: 479-575-3219 Email: [email protected] BELIEFS ABOUT EMOTIONS AND EMOTION SCHEMAS 2 Abstract The current study sought to empirically evaluate a new clinical tool, the Individual Beliefs about Emotion (IBAE) which assesses nine beliefs about emotion. The goal was to examine the overlap of the IBAE with the Leahy Emotional Schema Scale (LESS; Leahy, 2002) and indices of psychopathology. Participants (n = 513) completed the IBAE, the LESS, and measures of depression, anxiety, and borderline personality features. Results indicated that both emotion beliefs (IBAE) and schemas (LESS) were influenced by age and gender. Both measures significantly predicted variance in depression, anxiety and borderline symptoms, although the LESS was a stronger predictor. We conclude that the LESS total score is a particularly useful measure of maladaptive schematic attitudes toward emotion, with additional evidence that the IBAE can quickly assess a variety of emotion beliefs and also predicts psychopathology outcomes. Keywords: Emotion beliefs, Emotion Schemas, Emotion Attitudes, Psychopathology BELIEFS ABOUT EMOTIONS AND EMOTION SCHEMAS 3 The beliefs people hold about emotions have implications for their emotional well-being. In clinical settings, beliefs about emotion are often assessed as emotional schemas (Leahy, 2002), which may be problematic because although emotional schemas include emotion beliefs, schemas are broader. Emotional schemas are beliefs and attitudes people hold about emotions as well as perceptions of self-efficacy in controlling and managing emotions (Leahy, 2015; Leahy, Tirch, & Napolitano, 2011).
    [Show full text]
  • Spiritual Lens 3: Secularism (October 6Th)
    Crestwood Vineyard, Doing Spirituality Series Sermon Notes ​ ​ Jeanine Blount Spiritual Lens 3: Secularism (October 6th) (Adapted from podcast This Cultural Moment, Season 3, Episode 4: “The Secular Salvation Schema” by ​ ​ John Mark Comer and Mark Sayers) Original Design Christian worldview Secular worldview Mankind was made in God’s image in the Your original design is your true self / your garden of Eden, walking in God’s presence, inner child with happiness before you were experiencing no shame (inherent goodness) despoiled (inherent goodness) The Fall Christian worldview Secular worldview The introduction of sin into God’s creation. Trauma that damaged your true self. Choosing self over God. Though created in You are inherently good. God’s image, our nature has been distorted Life, other people, cultural traditions, and religion have corrupted you. by sin. Our “bent” is away from God. Sin Christian worldview Secular worldview Living contrary to God’s design, anything that Low self-esteem, unhappiness, anything that separates us from God’s presence and his hinders pleasure, anything that makes you design for holy living (inward and outward feel bad about yourself, anything difficult holiness) Salvation and Redemption Christian worldview Secular worldview Jesus’ life, death, and resurrection provide Rediscovering your inner self / true identity. salvation through the forgiveness of our sins Centeredness and connectedness. and adoption back into God’s family. Being at peace because “I know who I am.” Salvation is past, present, and future. Holiness Christian worldview Secular worldview Fleeing from the sin (old nature) that holds us Fleeing from externally-given identities, to the unredeemed life, and clinging to God’s binding commitments, difficult things, any ways and purposes for our life.
    [Show full text]
  • Schema Theory Jeff Pankin Fall 2013
    Schema Theory Jeff Pankin Fall 2013 Basic Concepts Definition: Schema theory is a branch of cognitive science concerned with how the brain structures knowledge. A schema is an organized unit of knowledge for a subject or event. It is based on past experience and is accessed to guide current understanding or action. Characteristics: Schemas are dynamic – they develop and change based on new information and experiences and thereby support the notion of plasticity in development. Schemas guide how we interpret new information and may be quite powerful in their influence (see work of Brewer and Treyens below). Schemas, or schemata, store both declarative (“what”) and procedural (“how”) information. Declarative knowledge is knowing facts, knowing that something is the case; procedural knowledge is knowing how to do something – perhaps with no conscious ability to describe how it is done (Hampson & Morris, 1996). Declarative schemas may be thought to contain slots, or characteristics and values. For example, a house may be described in terms of its materials, such as wood and its parts, such as rooms. Materials and parts, are the house schema’s slots and wood and rooms are the slot values. Slots may have default values (house purpose: to live in) though houses may also be places of worship or museums. Schemas may have parent and child relationships with other schemas which inherit or pass on characteristics (Anderson, 2000). A special slot in each schema is its isa slot, and points to the superset. Thus stored with the schema for building, the superset of house, we would have features such that it has a roof and walls and that it is found on the ground (Anderson, 2000).
    [Show full text]
  • Social Cognitive Theory and Norms: Determining the Factors That Lead Viewers to Enact Sexual Behaviors Seen on Television
    Social cognitive theory and norms: Determining the factors that lead viewers to enact sexual behaviors seen on television THESIS Presented in Partial Fulfillment of the Requirements for the Degree Master of Arts in the Graduate School of The Ohio State University By Kelly Marie Luoma Graduate Program in Communication The Ohio State University 2014 Master's Examination Committee: Dr. Emily Moyer-Gusé, Advisor Dr. Michael Slater Copyrighted by Kelly Marie Luoma 2014 Abstract Individuals often learn sexual health information from entertainment television shows, but they also may learn and enact risky sexual behaviors seen on television. This experiment tested whether viewers are more likely to engage in sexual behaviors after seeing television characters model these behaviors and sought to determine whether this enactment of behavior is attributed to characters experiencing positive or negative emotional consequences as a result of their sexual behavior. Participants were randomly assigned to view either a television show episode that depicted a positive outcome of a “friends with benefits” relationship or one that depicted a negative outcome of a “friends with benefits” relationship. Males reported being more likely to engage in a “friends with benefits” relationship after viewing this type of relationship depicted on television. Therefore, people may be more likely to enact behaviors after viewing characters engage in them on television regardless of whether the characters experience positive or negative outcomes. Males’ intentions to engage in a “friends with benefits” relationship also increased after viewing the negative outcome condition. This finding demonstrates that although the protagonist of a show may experience negative outcomes as a result of her behavior, viewers may interpret this outcome differently or identify more with other characters, which can increase their intentions to engage in the behavior.
    [Show full text]
  • This Chapter Is an Excerpt from Methods of Persuasion: How to Use Psychology to Influence Human Behavior Written by Nick Kolenda
    This chapter is an excerpt from Methods of Persuasion: How to Use Psychology to Influence Human Behavior written by Nick Kolenda. You can buy the book here. For info about Nick, you can visit: www.NickKolenda.com CHAPTER 1 Prime Their Mindset It might seem like an odd request, but think of a lucky dwarf. Are you thinking of one? Good. Now go with your immediate gut reaction and think of a number between one and ten. Quick! Stick with the fi rst number that pops inside your head, and don’t change your mind. Are you thinking of a number? Although it’s far from foolproof, you were more likely to think of the number seven. And if you are thinking of seven and you’re somewhat freaked out, rest assured, this chapter will explain the psychological principle behind that phenom- enon. Specifi cally, you’ll learn why imagining that “lucky dwarf” made you more likely to think of the number seven, and you’ll learn practical techniques to apply that underlying principle in your own life (don’t worry, you won’t be asking people to think about dwarves, I promise). THE POWER OF MINDSETS Before I explain the exercise with the dwarf, let’s try something else. This time, think of your mother. Let that image of good ol’ mum sim- mer for a second or two, and then let it fade away. Now, read the following blurb about Mark and mentally rate his level of motivation on a scale from one to nine (1 = low motivation, 9 = high motivation): Mark is just entering his second year of college.
    [Show full text]