Articles
The Oversimplification of Conflict Intervention
As decision methodologies regarding when/if to intervene internationally are being revisited we thought it was worth looking at the behavioural issues associated with how information is processed by various parties to gain support for action. The perennial troubling...
Political Context and Fear
Higher tension levels have been exhibited in international relations during the last week and we are interested in how these translate into altered collective behaviours. At the political level the domestic context is crucial but group membership and history are big...
Non-Public Knowledge
Non-public information transfer can be (depending upon the circumstance) immoral, illegal or both. For people willing to participate in the exploitation of such data points the dangers are not limited to the consequences of getting caught - biases tend towards their...
Consumers and Data Usage
Recent revelations about data transfers and usage around elections have brought to the surface behaviours and techniques designed to remain invisible. The big question for all of the technology industry is whether people will begin withholding the data many business...
Gaming Addiction and Reward Strategies
Computer game producers are highly sophisticated when implementing behavioural techniques designed to inspire and maintain loyalty (as defined by interaction times, money spent). Taking those methodologies into the realms of employer-employee relations provides some...
The Conjunction Fallacy
The conjunction fallacy develops from a violation of the simple probability rule that two events both occurring is less likely than one of those events happening on its own. Numerous studies have shown that people use stereotypes and can fixate on the wrong items of...