The Biology of Risk | John Coates

John Coates; The Hour Between Dog and Wolf: How Risk Taking Transforms Us, Body and Mind; Penguin; 2013-09-24; 252 pages; kindle: no, paper: $5+SHT.


John Coates; The Biology of Risk; an oped; In Sunday Review of the New York Times (NYT); 2014-06-07.

John Coates is a research fellow at Cambridge who traded derivatives for Goldman Sachs and ran a desk for Deutsche Bank. He is the author of “The Hour Between Dog and Wolf: How Risk Taking Transforms Us, Body and Mind.”

<quote>The Fed could dampen this cycle. It has, in interest rate policy, not one tool but two: the level of rates and the uncertainty of rates. Given the sensitivity of risk preferences to uncertainty, the Fed could use policy uncertainty and a higher volatility of funds to selectively target risk taking in the financial community. People running factories or coffee shops or drilling wells might not even notice. And that means the Fed could keep the level of rates lower than otherwise to stimulate the economy.</quote>


Via: backfill



The cortisol studies aren’t at issue so much as the choice of starting point for the financial causality claim.  Taking 1960 or 1950 as the starting point seems to give different results; i.e. less obvious causality.



Source: StockCharts

Economic Value of Online Advertising and Data

John Deighton, Peter A. Johnson; The Value of Data: Consequences for Insight, Innovation & Efficiency in the U.S. Economy; Direct Marketing Association (DMA); 2013-10-18; 103 pages; mentioned.



Ad-Supported Internet Responsible for 5.1 Million U.S. Jobs, Contributes $530 Billion to U.S. Economy in 2011 Alone, According to IAB Study; press release; 2012-10-01.
Teaser: New York, California, Washington, Massachusetts, and Illinois are the Top 5 States Where Companies Drive Digital Industry Jobs

Via: backfill, backfill

Selecting Eff ective Means to Any End: Futures and Ethics of Persuasion Pro filing | Kaptein, Eckles

Maurits Kaptein, Dean Eckles; Selecting E ective Means to Any End: Futures and Ethics of Persuasion Pro filing; In Persuasive Technology; Lecture Notes in Computer Science; Volume 6137, 2010; pages 82-93 (12 pages); landing.


Interactive persuasive technologies can and do adapt to individuals. Existing systems identify and adapt to user preferences within a specifi c domain: e.g., a music recommender system adapts its recommended songs to user preferences. This paper is concerned with adaptive persuasive systems that adapt to individual di fferences in the effectiveness of particular means, rather than selecting di fferent ends. We give special attention to systems that implement persuasion profiling, adapting to individual differences, in the e ffects of influence strategies. We argue that these systems are worth separate consideration and raise unique ethical issues for two reasons:

  1. their end-independence implies that systems trained in one context can be used in other, unexpected contexts and
  2. they do not rely on, and are generally disadvantaged by, disclosing that they are adapting to individual di fferences.

We use examples of these systems to illustrate some ethically and practically challenging futures that these characteristics make possible.


  1. Introduction
  2. Adaptive persuasive technologies
    • Ends and means adaptation
  3. Influence Strategies and implementations
  4. Persuasion profiles
  5. Consequences of means-adaptation
    1. End-independence
      • Implications of end-independence
    2. Non-disclosure
      • Implications of non-disclosure
  6. Ethical Considerations
  7. Limitations
  8. Conclusions


Forensic Identification of GSM Mobile Phones | Hasse, Gloe, Beck

Jakob Hasse, Thomas Gloe (dence), Martin Beck (T.U. Dresden); Forensic Identification of GSM Mobile Phones; In Proceedings of IH & MM Sec (huh?); 2013-06-17; 10 pages.


With the rapid growth of GSM telecommunication, special requirements arise in digital forensics to identify mobile phones operating in a GSM network. This paper introduces a novel method to identify GSM devices based on physical characteristics of the radio frequency hardware. An implementation of a specialised receiver software allows passive monitoring of GSM traffic along with physical layer burst extraction even for handover and frequency hopping techniques. We introduce time-based patterns of modulation errors as a unique device-dependent feature and carefully remove random effects of the wireless communication channel. Using our characteristics, we could distinguish 13 mobile phones at an overall success rate of 97.62% under realworld conditions. This work proves practical feasibility of physical layer identification scenarios capable of tracking or authenticating GSM-based devices.


  • Paul Marks; Any cellphone can be traced by its digital fingerprint; In New Scientist; 2013-08-01.

    • Jakob Hasse et al.
    • Technical University of Dresden
    • Testing: N=13 devices (the ones “laying around their lab”)
    • Scope: 2G phones
    • Precision: identify the source handset with an accuracy of 97.6 per cent.
    • Quotes, Jakob Hasse:
      • “Our method does not send anything to the mobile phones. It works completely passively and just listens to the ongoing transmissions of a mobile phone – it cannot be detected.”
      • [Results on 2G only but] “defects are present in every radio device, so it should also be possible to do this with 3G and 4G phones.”
    • Quotes. attributed to random other people, for color & balance:

Innovation Economics: The Race for Global Advantage | Ezell, Atkinson

Robert D. Atkinson, Stephen J. Ezell; Innovation Economics: The Race for Global Advantage; Yale University Press; 2012-09; 440 pages; kindle: $17.


<quote>The authors explore how a weak innovation economy not only contributed to the Great Recession but is delaying America’s recovery from it and how innovation in the United States compares with that in other developed and developing nations. Atkinson and Ezell then lay out a detailed, pragmatic road map for America to regain its global innovation advantage by 2020, as well as maximize the global supply of innovation and promote sustainable globalization.</quote> ref


Claimed: <quote>[W]hen a machine replaces a worker, there is a second order effect: the organization using the machine saves money and that money it flows back into to the economy either through lower prices, higher wages for the remaining workers, or higher profits. In all three cases that money gets spent which stimulates demand that other companies respond to by hiring more workers.</quote>


Via: backfill

Abrupt rise of new machine ecology beyond human response time | Johnson, Zhao, Hunsader, Qi, Johnson, Meng, Tivnan

Niel Johnson, Guannan Zhao, Eric Hunsader, Hong Qi, Nicholas Johnson, Jing Meng, Brian Tivnan; Abrupt rise of new machine ecology beyond human response time; In Nature Scientific Reports; 2013-09-11; landing


Society’s techno-social systems are becoming ever faster and more computer-orientated. However, far from simply generating faster versions of existing behaviour, we show that this speed-up can generate a new behavioural regime as humans lose the ability to intervene in real time. Analyzing millisecond-scale data for the world’s largest and most powerful techno-social system, the global financial market, we uncover an abrupt transition to a new all-machine phase characterized by large numbers of subsecond extreme events. The proliferation of these subsecond events shows an intriguing correlation with the onset of the system-wide financial collapse in 2008. Our findings are consistent with an emerging ecology of competitive machines featuring ‘crowds’ of predatory algorithms, and highlight the need for a new scientific theory of subsecond financial phenomena.


Via: backfill

Consequences of Repeated Blood-Brain Barrier Disruption in Football Players | Marchi, Bazarian, Puvenna, Janigro, Ghosh, Zhong, Zhu, Blackman, Stewart, Ellis, Butler, Janigro

Nicola Marchi, Jeffrey J. Bazarian, Vikram Puvenna, Mattia Janigro, Chaitali Ghosh, Jianhui Zhong, Tong Zhu, Eric Blackman, Desiree Stewart, Jasmina Ellis, Robert Butler, Damir Janigro. Consequences of Repeated Blood-Brain Barrier Disruption in Football Players; In PLoS ONE; 2013; 8 (3): e56805 DOI: 10.1371/journal.pone.0056805


The acknowledgement of risks for traumatic brain injury in American football players has prompted studies for sideline concussion diagnosis and testing for neurological deficits. While concussions are recognized etiological factors for a spectrum of neurological sequelae, the consequences of sub-concussive events are unclear. We tested the hypothesis that blood-brain barrier disruption (BBBD) and the accompanying surge of the astrocytic protein S100B in blood may cause an immune response associated with production of auto-antibodies. We also wished to determine whether these events result in disrupted white matter on diffusion tensor imaging (DT) scans. Players from three college football teams were enrolled (total of 67 volunteers). None of the players experienced a concussion. Blood samples were collected before and after games (n = 57); the number of head hits in all players was monitored by movie review and post-game interviews. S100B serum levels and auto-antibodies against S100B were measured and correlated by direct and reverse immunoassays (n = 15 players; 5 games). A subset of players underwent DTI scans pre- and post-season and after a 6-month interval (n = 10). Cognitive and functional assessments were also performed. After a game, transient BBB damage measured by serum S100B was detected only in players experiencing the greatest number of sub-concussive head hits. Elevated levels of auto-antibodies against S100B were elevated only after repeated sub-concussive events characterized by BBBD. Serum levels of S100B auto-antibodies also predicted persistence of MRI-DTI abnormalities which in turn correlated with cognitive changes. Even in the absence of concussion, football players may experience repeated BBBD and serum surges of the potential auto-antigen S100B. The correlation of serum S100B, auto-antibodies and DTI changes support a link between repeated BBBD and future risk for cognitive changes.


Via: backfill

Susan Patton, and then came the blowback and forth, and forth and back

After Ms. Patton’s outburst, the chattering classes are still going at it … months later … In fact the mommy track concept has been up for ping-pong debate for more than half a decade now … in fact one can say that this subject is evergreen …

In archaeological order (original at the bottom)


Original Trigger

Susan Patton; Advice for the young women of Princeton: the daughters I never had; letter to the editor of the Daily Princetonian; 2013-03-29; landing.

The Previous Generation

  • ; Marry Him!; In The Atlantic; 2008-03-01; 5800 words (very long)
    Teaser: The case for settling for Mr. Good Enough

    • Why Smart Men Marry Smart Women, a book, 2007.
    • Men Are Like Fish: What Every Woman Needs to Know About Catching a Man
    • Find a Husband After 35 Using What I Learned at Harvard Business School.
    • Mikki Morrissette; Choosing Single Motherhood: The Thinking Woman’s Guide,

Ethos Operating System


  • Xen
  • MinimaLT, previously noted


All Publications

An annotated computer systems security bibliography; Jon A. Solworth, editor (broken link 2013-07-11)

W. Michael Petullo; Rethinking Operating System Interfaces to Support Robust Network Applications; Ph.D. Dissertation; University of Illinois, Chicago; 2013; 260 pages.


This dissertation describes the network programming environment provided by Ethos, an operating system designed for security. Often, the interfaces provided by existing systems are very low-level. Experience shows that programmers on these systems have difficulty managing the resulting complexity when writing network applications. They must implement or integrate their own key isolation, encryption, authentication protocols, and authorization policies. Administrators must con figure the same, often independently for each application. Ethos eases the burden on application programmers and system administrators by providing more abstract interfaces and reducing code duplication. Instead of relying on applications to protect secret keys, Ethos keeps them in kernel space and allows their indirect use by applications through cryptographic system calls (e.g., sign). Ethos encrypts all network traffic and performs network authentication at the system level. Moving these protections to the operating system kernel allows Ethos to provide more informed access control, reducing the need for application-internal controls. Thus Ethos provides a number of security properties unavailable in other systems. In many cases, Ethos application developers can write robust applications with zero lines of application-speci c security code. Likewise, administrators do not need to learn application-specifi c confi guration options. Instead, the majority of their work uses system-wide mechanisms, affecting all applications individually and the system in aggregate. Many of the protections provided by Ethos sound straightforward to implement. However, we shall show that the system design that makes them possible is highly interconnected and not entirely self-evident. For example, how can Ethos authenticate at the system level when it is impossible for a system administrator to know every user that may be encountered on the Internet? In other cases, our design decisions became feasible only recently due to developments in hardware. Our hope is that our design appears clean, concise, and possibly — in retrospect — somewhat obvious.

W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange; MinimaLT: Minimal-Latency Networking Through Better Security; In Some Conference; 2013; 13 pages.


Minimal Latency Tunneling (MinimaLT) is a new network protocol that provides ubiquitous encryption for maximal confi dentiality, including protecting packet headers. MinimaLT provides server and user authentication, extensive Denial-of-Service protections, and IP mobility while approaching perfect forward secrecy. We describe the protocol, demonstrate its performance relative to TLS and unencrypted TCP/IP, and analyze its protections, including its resilience against DoS attacks. By exploiting the properties of its cryptographic protections, MinimaLT is able to eliminate three-way handshakes and thus create connections faster than unencrypted TCP/IP.

W. Michael Petullo, Jon A Solworth; Poster: Rethinking Operating System Interfaces to Support Robust Applications; In IEEE Security Something Something; 2012; poster; 2 pages.


In current systems, application developers must provide substantial security-critical code — including code to handle authentication — in their applications. The result is that application flaws often undermine system security. We are building Ethos, an Operating System (OS) that leverages the kernel’s complete mediation property to guarantee more security protections—including network encryption and authentication—across all applications. Here we provide an overview of Ethos and a subset of its system call interface.

Via: backfill, backfill

Gloating & Fingerwagging about the Technical Hiring Process

On the occasion of the gloating on the occasion of Mea Culpa by the self-styled Thought Leaders in the field.


Wow … this area is evergreen in blogland, no shortage of advice, and definitely. not. self. serving.


If Entrepreneurs are the New Labor then programmers are the New Labor’s labor. The advice is on how to hire labor. Programmers are thus Old Labor in the complete sense; of variable cost time and materials.

Venkatesh Rao; in Forbes; 2012-09-03.

<quote>There is dignity to labor just as there is romance to entrepreneurship.</quote>.  There is even a whole day given over annually to the celebration of that.

Advertising Papers & Demonstrations | VLDB 2013

Via: Accepted Papers & Demonstrations; Very Large Data Bases; 2013-08-26 -> 2013-08-30


(Industrial) Papers of Interest


  • MillWheel => Google
  • F1 => Google, 2 papers
  • Quantcast File System (QFS) => Quantcast
  • Turn DMP => Turn
  • WOO => Yahoo!
  • Unicorn => Facebook
  • Scuba => Facebook
  • A/B Testing on HADOOP => eBay
  • Piranha => Twitter


  • MillWheel: Fault-Tolerant Stream Processing at Internet Scale; Tyler Akidau, Alex Balikov, Kaya Bekiroglu, Slava Chernyak, Josh Haberman, Reuven Lax (Google), Sam McVeety (Google), Daniel Mills, Sam Whittle
  • F1: A Distributed SQL Database That Scales; Jeff Shute (Google), Radek Vingralek (Google), Bart Samwel (Google), Ben Handy (Google), Chad Whipkey (Google), Eric Rollins (Google), Mircea Oancea (Google), Kyle Littlefield (Google), David Menestrina (Google), Stephan Ellner (Google), John Cieslewicz (Google), Ian Rae (UW Madisoni)
  • The Quantcast File System; Silvius Rus (Quantcast), Jim Kelly (Quantcast)
  • Overview of Turn Data Management Platform for Digital Advertising; Hazem Elmeleegy (Turn Inc.), Yinan Li (Turn Inc), Yan Qi (Turn Inc), Peter Wilmot (Turn Inc), Mingxi Wu (Turn Inc), Santanu Kolay (Turn Inc), Ali Dasdan (Turn Inc), Songting Chen (Facebook Inc)
  • Online, Asynchronous Schema Change in F1; Radek Vingralek (Google), Ian Rae (UW Madison), Eric Rollins (Google), Jeff Shute (Google), Sukhdeep Sodhi (Google)
  • WOO: A Scalable and Multi-tenant Platform for Continuous Knowledge Base Synthesis; Mandar Rahurkar (Yahoo Labs!), Kedar Bellare (Yahoo Research), Carlo Curino (Microsoft), Ashwin Machanavajjhala (Duke University), Peter Mika (Yahoo! Labs Barcelona), Aamod Sane (Yahoo!)
  • Unicorn: A System for Searching the Social Graph; Michael Curtiss (Facebook), Iain Becker (Facebook), Tudor Bosman (Facebook), Sergey Doroshenko (Facebook), Lucian Grijincu (Facebook), Tom Jackson (Facebook), Sandhya Kunnatur (Facebook), Soren Lassen (Facebook), Philip Pronin (Facebook), Sriram Sankar (Facebook), Guanghao Shen (Facebook), Gintaras Woss (Facebook), Chao Yang (Facebook), Ning Zhang (Facebook)
  • Scuba: Diving into Data at Facebook; Janet Wiener (Facebook), Vinayak Borkar (Facebook), Subbu Subramanian (Facebook)
  • Optimization Strategies for A/B Testing on HADOOP; Andrii Cherniak (University of Pittsburgh), Huma Zaidi (eBay Inc), Vladimir Zadorozhny (University of Pittsburgh)
  • Piranha: Optimizing Short Jobs in Hadoop; Khaled Elmeleegy (Twitter)

Previously & Separately

Grandpa and the Snapper: The Wellbeing of the Elderly Who Live with Children | Angus Deaton, Arthur Stone

Angus S. Deaton, Arthur Stone; Grandpa and the Snapper: The Wellbeing of the Elderly Who Live with Children; NBER Working Paper No. w19100; 2013-06; 27 pages.


  • Method:
    • Cantril ladder running from 0 (the worst possible life for you) to 10 (the best possible life for you).
    • Using the Gallup Healthways Wellbeing Index data from the United States, which has collected 1,000 daily observations from adults (aged 18 or older) from the beginning of 2008 through to the end of 2012
  • (from the concluding paragraph) <quote>In places where fertility is high, the elderly generally have relatively higher life evaluation when they live in a household containing a person under 15, and where fertility is low, they generally have lower life evaluation. Where high fertility is seen as desirable, older people do not feel that their life is compromised by living in a family with a young child. In such countries, they are also less likely to be angered, stressed, or worried by the presence of children. Our results are consistent with the view that the negative evaluative and emotional consequences for the elderly of living with children are most likely a consequence of the fertility transition.</quote>


Liberellas versus Konservatives: Social Status, Ideology, and Birth Names in the United States | J. Eric Oliver, Tomas Wood, Alexandra Bass

J. Eric Oliver, Tomas Wood, Alexandra Bass (U. Chicago); Liberellas versus Konservatives: Social Status, Ideology, and Birth Names in the United States; Paper presented at the 2013 Midwestern Political Science Association Annual Meeting; 2013-04-01; 47 pages.


Despite much public speculation, there is little scholarly research on whether or how ideology shapes American consumer behavior. Borrowing from previous studies, we theorize that ideology is associated with different forms of taste and conspicuous consumption: liberals are more drawn to indicators of “cultural capital” and more feminine symbols while conservatives favor more explicit signs of “economic capital” and masculine cues. These ideas are tested using birth certificate, U.S. Census, and voting records from California in 2004. We find strong differences in birth naming practices related to race, economic status, and ideology. Although higher status mothers of all races favor more popular birth names, high status liberal mothers more often choose uncommon, culturally obscure birth names. Liberals also favor birth names with “softer, feminine” sounds while conservatives favor names with “harder, masculine” phonemes. These findings have signficant implications for both studies of consumption and debates about ideology and political fragmentation in the United States.



  • (was
  • <quote>With the approval of the California Committee for the Protection of Human Subjects, the data were drawn including the first names of all children, mothers, and fathers (where available), and the mother’s education, race, ethnicity, and addresses. By cross-referencing the listed address with Google maps, the longitude and latitude of for each respondent with an identiĕable address record was calculated. With arcGIS, this geographic information was used to identify the census tract of each birth mother, which was then matched with demographic data from 2000 U.S. Census. In addition, the geocodes were used to identify the voting precinct of each mother and, using precinct shape files, the voting records from the general election of 2004, which are stored in the Statewide Database for the State of California archived at the University of California. Together, these files provide a profile of both the individual characteristics of each mother and the demographic and political characteristics of their neighborhoods.</quote>

Unique in the Crowd: The privacy bounds of human mobility | de Montjoye, Hidalgo, Verleysen, Blondel

Yves-Alexandre de Montjoye, Cesar A. Hidalgo, Michel Verleysen & Vincent D. Blondel; Unique in the Crowd: The privacy bounds of human mobility; In Scientific Reports; 2013-03-25; accepted: 2013-02-04, received: 2012-10-01; 5 pages.


We study fifteen months of human mobility data for one and a half million individuals and find that human mobility traces are highly unique. In fact, in a dataset where the location of an individual is specified hourly, and with a spatial resolution equal to that given by the carrier’s antennas, four spatio-temporal points are enough to uniquely identify 95% of the individuals. We coarsen the data spatially and temporally to find a formula for the uniqueness of human mobility traces given their resolution and the available outside information. This formula shows that the uniqueness of mobility traces decays approximately as the 1/10 power of their resolution. Hence, even coarse datasets provide little anonymity. These findings represent fundamental constraints to an individual’s privacy and have important implications for the design of frameworks and institutions dedicated to protect the privacy of individuals.


Overearning | Christopher Hsee, Jiao Zhang, Cindy Cai, Shirley Zhang

Christopher K. Hsee, Jiao Zhang, Cindy F. Cai, Shirley Zhang; Overearning; In Psychological Science; landing; 2012-08-28. 20 pages.


High productivity and high earning rates brought about by modern technologies make it possible for people to work less and enjoy more, yet many continue to work assiduously to earn more. Do people overearn—forgo leisure to work and earn beyond their needs? This question is understudied, partly because in real life, determining the right amount of earning and defining overearning are difficult. In this research, we introduced a minimalistic paradigm that allows researchers to study overearning in a controlled laboratory setting. Using this paradigm, we found that individuals do overearn, even at the cost of happiness, and that overearning is a result of mindless accumulation—a tendency to work and earn until feeling tired rather than until having enough. Supporting the mindless-accumulation notion, our results show, first, that individuals work about the same amount regardless of earning rates and hence are more likely to overearn when earning rates are high than when they are low, and second, that prompting individuals to consider the consequences of their earnings or denying them excessive earnings can disrupt mindless accumulation and enhance happiness.


Also backfill

Two Studies Show Guitar Increases Male Facebook Attractiveness | Tiffert, Gazeil, Baram & Guéguen, Meineri, Fischer-Lokou

Two studies replicating the same concept, on the occasion of Nicolas Guéguen’s publication in 2013 in a peer-reviewed venue of a previous study of the concept which was published in 2012 in a low-review venue.

Sigal Tifferet, Ofir Gaziel, Yoav Baram; Guitar Increases Male Facebook Attractiveness: Preliminary Support for the Sexual Selection Theory of Music; In Letters on Evolutionary Behavioral Science; Vol. 3, No. 1; 2012; pages 4-6, 3 pages; landing.

Music is a universal phenomenon that has genetic and brain-localized features. As such, it warrants adaptive evolutionary explanations. While some scholars believe that music arose as a by-product of other adaptations, others argue that music is likely to have served some adaptive function, for example in coalition signaling or mother-child bonding. The sexual selection theory of music suggests that music serves as a signal in mate selection. While this claim is prevalent, it lacks empirical evidence. A facebook (sic) experiment revealed that women replied more positively to friendship requests from a man shown in a photo holding a guitar. These results offer initial support for the sexual selection theory of music.

Nicolas Guéguen, Sébastien Meineri, Jacques Fischer-Lokou; Men’s music ability and attractiveness to women in a real-life courtship context; In Psychology of Music; Vol. 41, No 2; 2013-03; paywalled.

This experiment tested the assumption that music plays a role in sexual selection. Three hundred young women were solicited in the street for their phone number by a young male confederate who held either a guitar case or a sports bag in his hands or had no bag at all. Results showed that holding a guitar case was associated with greater compliance to the request, thus suggesting that musical practice is associated with sexual selection.

Vanessa A. Sluming, John T. Manning; Second to fourth digit ratio in elite musicians: Evidence for musical ability as an honest signal of male fitness; In Evolution and Human Behavior; Vol. 21, No. 1; 2000-01; pages 1-9, 8 pages; paywalled.

Abstract Prenatal testosterone may facilitate musical ability. The ratio of the length of the second and fourth digit (2D:4D) is probably determined in utero and is negatively related to adult testosterone concentrations and sperm numbers per ejaculate. Therefore, 2D:4D may be a marker for prenatal testosterone levels. We tested the association between 2D:4D and musical ability by measuring the ratio in 70 musicians (54 men and 16 women) recruited from a British symphony orchestra. The men had significantly lower 2D:4D ratios (indicating high testosterone) than controls (n = 86). The mean 2D:4D of women did not differ significantly from controls (n = 78). Rankings of musical ability within the orchestra were associated with male 2D:4D (high rank = low 2D:4D). Differences in 2D:4D ratio were not found among instrument groups, suggesting that 2D:4D was not related to mechanical advantages in playing particular intruments. Concert audiences showed evidence of a female-biased sex ratio in seats close to the orchestra. This preliminary study supports the thesis that music is a sexually selected trait in men that indicates fertilizing capacity and perhaps good genes. However, the association between low 2D:4D ratio and orchestra membership and high status within the orchestra may result from testosterone-mediated competitive ability. Further tests of the association between 2D:4D and musical ability per se are necessary.

Cited in the Pacific Standard promotion article (below).


  • Study 1 (Tifferet, Gaziel, Baram) participants
    <quote>100 females listed as members of student facebook groups in Israel (Tel-Aviv University and Ben Gurion University) who were identified in their facebook status as single. The mean age as reported on the facebook profiles was 24.4 (SD = 1.7).</quote>
  • Study 2 (Guéguen, Meineri, Fischer-Lokou) participants
    <quote> It featured a 20-year-old man “previously evaluated as having a high level of physical attractiveness.” One sunny Saturday afternoon, in the shopping district of a medium-sized French city, this good-looking guy approached 300 young women (aged approximately 18 to 22). He introduced himself, declared “I think you’re really pretty,” and asked for her phone number so they could arrange to have a drink. For one-third of these brief encounters, he was carrying what was clearly a guitar case. For another third, he was holding a sports bag; for the final third, he was empty-handed.</quote>
  • <quote>Guéguen reports that he has just finished a replication of the Israeli study, except that the subject of the Facebook profile was a woman. He found whether or not she was strumming a guitar in her photo made no difference in respondents’ willingness to be her “friend.” So adding music to the equation appears to increase the attractiveness of men, but not women.</quote> cite


Also backfill


From Tifferet, Gaziel, Baram

How Institutions Think | Mary Douglas

Mary Douglas; How Institutions Think; Syracuse University Press; 1st edition; 1986-07; 146 pages.
The Frank W. Abrams Lectures


  • Purity and Danger
  • Natural Symbols
  • Implicit Meanings
  • risk and Blame

Mentioned in Review

  • Olson Logic of Action
  • Ludwig Fleck; The Genesis and Development of a Scientific Fact (Entstehung und Entwicklung einer wissenschaftlichen Tatsache)
    on the discovery of syphilis
  • Berger Social Construction of Reality

Privacy technologies: An annotated syllabus | Arvind Narayanan

Via: Arvind Narayanan; Privacy technologies: An annotated syllabus; In His Blog; 2013-04-16.

In order of appearance; embellishments, corrections, errors: mine.

Talking Points HTML/PDF

What Do People Do At Work? | Michael J. Handel

Michael J. Handel (OECD, Dept. Sociology Northwestern University); What Do People Do At Work?; 2010-06-20; 53 pages.
Teaser: A Profile of U.S. Jobs from the Survey of Workplace Skills, Technology, and Management Practices (STAMP)


The original is less breathless whereas “counting” is considered part of “any math” and “reading an invoice” is a distinct category of study. The category of “computer literacy” is a distinct category. The concept “uses spreadsheets” intersects with both math use and computer use. <quote>An unexpectedly large proportion of clerical and sales workers report spending most of their time doing data entry or filling out forms (31%), which is suggestive of deskilling, but this is very atypical for the workforce as a whole.</quote>


Jordan Weismann; Here’s How Little Math Americans Actually Use at Work; In The Atlantic; 2013-04-24.

Also backfilled