Friday, January 31, 2025
Home Blog Page 1096

A method of ‘look twice, forgive once’ can sustain social cooperation

0
A method of ‘look twice, forgive once’ can sustain social cooperation


A method of 'look twice, forgive once' can sustain social cooperation
‘Look twice, forgive once’ solves both the scoring and the punishment dilemmas. Credit: Nature (2024). DOI: 10.1038/s41586-024-07977-x

The theory of indirect reciprocity holds that people who earn a good reputation by helping others are more likely to be rewarded by third parties, but widespread cooperation depends on agreement about reputations.

In most theoretical models examining how reputations impact people’s desire to cooperate with one another, reputations are binary—good or bad—and based on limited information. But there is a lot of information available about people’s behavior in today’s world, especially with social media.

Biology professors Joshua B. Plotkin of the University of Pennsylvania and Corina Tarnita of Princeton University lead teams that have been collaborating on theoretical research about cooperation. Sebastián Michel-Mata, a doctoral student in Tarnita’s lab, came up with the idea of addressing how to judge someone in an information-rich environment.

“The current theory of indirect reciprocity suggests that reputations can only work in a few societies, those with complex norms of judgment and public institutions that can enforce agreement,” Michel-Mata says. But, as an anthropologist, he sees that such societies are the exception and not the rule, and he wondered about the simple idea that reputations are summaries of multiple actions.

“Prior models have typically assumed that a single action determines someone’s reputation, but I think there’s more nuance to how we assign reputations to people. We often look at multiple actions someone has taken and see if they are mostly good actions or bad actions,” says Mari Kawakatsu, a postdoctoral researcher in Plotkin’s lab.

Through mathematical modeling, the research team showed that looking at multiple actions and forgiving some bad actions is a method of judging behavior that is sufficient to sustain cooperation, a method they call “look twice, forgive once.” Their research is published in Nature.

This builds on previous work Plotkin led about indirect reciprocity. For example, he worked with Kawakatsu and postdoctoral researcher Taylor A. Kessinger on a paper calculating how much gossip is necessary to reach sufficient consensus to sustain cooperation.

Plotkin says of the new paper, “Even if different people in a society subscribe to different norms of judgment, ‘look twice, forgive once’ still generates sufficient consensus to promote cooperation.”

He adds that this method maintains cooperation without gossip or public institutions, which confirms the original hypothesis that Michel-Mata, first author on the paper, had that public institutions are not a prerequisite for reputation-based cooperation. It also offers an important alternative when public institutions exist but erosion of trust in institutions inhibits cooperation.

Kessinger says that, as in the paper about gossip, the game-theoretical model here is a one-shot donation game, also known as a simplified prisoner’s dilemma. Each player can choose to help or not help their partner, and players will periodically update their views of each other’s reputations by observing each other’s interactions with other players, to see if the partner cooperates or “defects” with others. More periodically, players update their strategies.

The idea of indirect reciprocity is “not that I’m nice to Mari because she was nice to me; it’s that I’m nice to Mari because she was nice to Josh, and I have a good opinion of Josh,” Kessinger says.

In this study, “the basic idea is that if you observed two interactions of somebody and at least one of them was an action that you would consider good, then you cooperate with that player, but otherwise you defect with them.”

Kawakatsu says all co-authors were surprised that the “look twice, forgive once” strategy couldn’t be displaced by other strategies, such as always cooperating or always defecting, looking at more than two actions from another player, or forgiving a different proportion of “bad actions.”

Tarnita says that, perhaps most surprisingly, looking more than twice didn’t yield an additional benefit. “Information turned out to be a double-edged sword, so that even when information was freely accessible, individuals did not typically evolve to use all of it,” she says.

Michel-Mata notes that the overall simplicity and robustness of their findings indicate that this behavioral strategy might be old in human societies. The authors see potential for anthropologists and behavioral scientists to build on their work.

The Plotkin and Tarnita labs are continuing to collaborate by exploring how people interact in more than one context, such as at work and in their personal lives. “This touches on a range of contemporary social problems,” Kessinger says, “where private misbehavior becomes a matter of public record.”

More information:
Sebastián Michel-Mata et al, The evolution of private reputations in information-abundant landscapes, Nature (2024). DOI: 10.1038/s41586-024-07977-x

Citation:
A method of ‘look twice, forgive once’ can sustain social cooperation (2024, September 26)
retrieved 26 September 2024
from https://phys.org/news/2024-09-method-sustain-social-cooperation.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Sea robins use leg-like fins to taste and navigate seafloor, researchers discover

0
Sea robins use leg-like fins to taste and navigate seafloor, researchers discover


This fish has legs
Sea robin (Prionotus carolinus). Credit: Anik Grearson

Sea robins are ocean fish particularly suited to their bottom-dwelling lifestyle. Six leg-like appendages make them so adept at scurrying, digging, and finding prey that other fish tend to hang out with them and pilfer their spoils.

A chance encounter in 2019 with these strange, legged fish at Cape Cod’s Marine Biological Laboratory was enough to inspire Corey Allard to want to study them.

“We saw they had some sea robins in a tank, and they showed them to us, because they know we like weird animals,” said Allard, a postdoctoral fellow in the lab of Nicholas Bellono, professor in the Department of Molecular and Cellular Biology. The Bellono lab investigates the sensory biology and cellular physiology of many marine animals, including octopuses, jellyfish, and sea slugs.

“Sea robins are an example of a species with a very unusual, very novel trait,” Allard continued. “We wanted to use them as a model to ask, ‘How do you make a new organ?'”






Sea robin. Credit: Anik Grearson, MBARI, CC BY-SA

Allard’s ensuing deep dive into sea robin biology led to a collaboration with Stanford researchers studying the fish’s developmental genetics and culminated in back-to-back papers in Current Biology, co-authored by Bellono and Amy Herbert and David Kingsley at Stanford University, and others.

The studies provide the most comprehensive understanding to date on how sea robins use their legs, what genes control the emergence of those legs, and how these animals could be used as a conceptual framework for evolutionary adaptations.

Sea robin “legs” are actually extensions of their pectoral fins, of which they have three on each side. Allard first sought to determine whether the legs are bona fide sensory organs, which scientists had suspected but never confirmed. He ran experiments observing captive sea robins hunting prey, in which they alternate between short bouts of swimming and “walking.”

They also occasionally scratch at the sand surface to find buried prey, like mussels and other shellfish, without visual cues. The researchers realized that the legs were sensitive to both mechanical and chemical stimuli. They even buried capsules containing only single chemicals, and the fish could easily find them.

Serendipity led to another chance discovery. They received a fresh shipment of fish mid-study that looked like the originals, but the new fish, Allard said, did not dig and find buried prey or capsules like the originals could. “I thought they were just some duds, or maybe the setup didn’t work,” Bellono recalled.

It turned out the researchers had acquired a different species of sea robin. In their studies, they ended up characterizing them both—Prionotus carolinus, which dig to find buried prey and are highly sensitive to touch and chemical signals, and P. evolans, which lack these sensory capabilities and use their legs for locomotion and probing, but not for digging.

Examining the leg differences between the two fish, they found that the digging variety’s were shovel-shaped and covered in protrusions called papillae, similar to our taste buds. The non-digging fish’s legs were rod-shaped and lacked papillae. Based on these differences, the researchers concluded that papillae are evolutionary sub-specializations.

Allard’s paper describing the evolution of sea robins’ novel sensory organs included analysis of sea robin specimens from the Museum of Comparative Zoology to examine leg morphologies across species and time. The digging species are restricted to only a few locations, he found, suggesting a relatively recent evolution of this trait.

Studying sea robin legs wasn’t just about hanging out with weird animals (although that was fun too). The walking fish are a potentially powerful model organism to compare specialized traits, and to teach us about how evolution allows for adaptation to very specific environments.

About 6 million years ago, humans evolved the ability to walk upright, separating from their primate ancestors. Bipedalism is a defining feature of our species, and we only know so much about how, when, and why that change occurred.

Sea robins and their adaptation to living on the ocean floor could offer clues. For example, there are genetic transcription factors that control the development of the sea robins’ legs that are also found in the limbs of other animals, including humans.

The second study that was focused on genetics included the Kingsley lab at Stanford; Italian physicist Agnese Seminara; and biologist Maude Baldwin from the Max Planck Institute in Germany; and comprehensively examined the genetic underpinnings of the walking fish’s unusual trait.

The researchers used techniques including transcriptomic and genomic editing to identify which gene transcription factors are used in leg formation and function in the sea robins. They also generated hybrids between two sea robin species with distinct leg shapes to explore the genetic basis for these differences.

“Amy and Corey did a lot to describe this animal, and I think it’s pretty rare to go from the description of the behavior, to the description of the molecules, to the description of an evolutionary hypothesis,” Bellono said. “I think this is a nice blueprint for how one poses a scientific question and rigorously follows it with a curious and open mind.”

More information:
Evolution of novel sensory organs in fish with legs, Current Biology (2024). DOI: 10.1016/j.cub.2024.08.014. www.cell.com/current-biology/f … 0960-9822(24)01126-6

Ancient developmental genes underlie evolutionary novelties in walking fish, Current Biology (2024). DOI: 10.1016/j.cub.2024.08.042. www.cell.com/current-biology/f … 0960-9822(24)01157-6

Provided by
Harvard University


Citation:
Sea robins use leg-like fins to taste and navigate seafloor, researchers discover (2024, September 26)
retrieved 26 September 2024
from https://phys.org/news/2024-09-sea-robins-leg-fins-seafloor.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Uncovering melt pool dynamics in metal manufacturing

0
Uncovering melt pool dynamics in metal manufacturing


Bubbling up: Uncovering melt pool dynamics in metal manufacturing
Lovejoy Mutswatiwa, left, a doctoral student in engineering science and mechanics, holds a high-power ultrasonic transducer used to sonicate molten metal as it cools, while Chris Kube, associate professor of engineering science and of acoustics, looks over an experimental setup of ongoing research focused on optimizing ultrasound wave parameters for molten metal processing. Credit: Kate Myers/Penn State

Manually shaking or vibrating molten metal using ultrasonic waves helps reduce air bubbles, cracks and grain sizes in a finished metal part. Metal 3D printing researchers hypothesized that vibrations were the key to increasing quality, but until now, the mechanisms were not well understood.

Using high-energy X-ray imaging, a team of researchers led by Christopher Kube, associate professor of engineering science and of acoustics in the Penn State College of Engineering, captured footage of a cross-section of liquid metal as it cooled.

Their results confirmed longstanding hypotheses in the field that through local pressure changes, ultrasonic vibrations encourage air bubbles to increase in number, enlarge, migrate to the surface of a melt pool and pop.

Sonication, or vibration by ultrasound, also increases the speed that metal cools, which helps suppress additional bubbles from forming. The team published their findings in Communications Materials.

“Metal additive manufacturing has inherent constraints on part quality due to the process,” Kube said. “Our work aims to alleviate these constraints by utilizing external forces like ultrasound to afford better control of the process, leading to higher quality and better performing parts.”

To arrive at their findings, collaborators from the Advanced Photon Source at the Argonne National Laboratory used high-energy synchrotron X-ray imaging of an aluminum alloy sample as it was simultaneously melted by a laser and sonicated by an ultrasonic transducer.

Unlike the type of X-ray used at the doctor’s office, synchrotron X-ray can pass through metal and image hundreds of thousands of frames per second to see changes inside the materials very quickly, Kube explained.

The result was an X-ray video with direct visualization of the bubble behavior. Kube’s lab then corroborated the results through computational fluid dynamics simulations. Lovejoy Mutswatiwa, doctoral student in engineering science and mechanics at Penn State and first author on the paper, explained that the faster metal is solidified, the smaller the grain size will be.

“Grain size can affect a material’s performance, including corrosion resistance, strength, toughness, ductility and bending,” Mutswatiwa said. “Finer grain size allows a metal to be stronger and hold up under pressure.”





On the right, ultrasound sonication is applied to a sample of aluminum alloy. By influencing local pressure changes, the sonication causes air bubbles to enlarge, increase in number and pop at the surface of the melt pool – increasing the quality of the finished product. Credit: Chris Kube and Lovejoy Mutswatiwa

The experimental setup—a single laser melting a tiny point—allowed the researchers to infer what happens when the laser melts at points along a prescribed path, according to Mutswatiwa.

“If we understand the process at a small scale, it’s easy to apply to the whole additive manufacturing process,” Mutswatiwa said. “These results could also help us integrate more alloys into the additive manufacturing process.”

Currently, over 10,000 alloys are used in conventional manufacturing, but less than 10% of them can be used in additive manufacturing due to problems with porosity and cracking, Mutswatiwa explained.

“We are trying to increase the number of alloys we can print with while maintaining the quality of conventional manufacturing,” he said. “Though still a highly experimental technology, using ultrasound in metal manufacturing is showing promise to help avoid defects in metal.”

Kube’s team was recently awarded a three-year grant to extend the ultrasonic technique into a large-scale additive process known as gas metal wire arc additive manufacturing. The project aims to transition the technique from a fundamental investigation to real applications to help manufacturing efforts in the U.S. Navy’s nuclear fleet.

“We proved at a small scale that ultrasound can impact melt pools in additive manufacturing,” Kube said. “Our next step is to positively leverage the impact to help the Navy produce higher quality and better performing parts.”

More information:
Lovejoy Mutswatiwa et al, High-speed synchrotron X-ray imaging of melt pool dynamics during ultrasonic melt processing of Al6061, Communications Materials (2024). DOI: 10.1038/s43246-024-00584-3

Citation:
Bubbling up: Uncovering melt pool dynamics in metal manufacturing (2024, September 26)
retrieved 26 September 2024
from https://techxplore.com/news/2024-09-uncovering-pool-dynamics-metal.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Security protocol leverages quantum mechanics to shield data from attackers during cloud-based computation

0
Security protocol leverages quantum mechanics to shield data from attackers during cloud-based computation


New security protocol shields data from attackers during cloud-based computation
Optical implementation. Credit: arXiv (2024). DOI: 10.48550/arxiv.2408.05629

Deep-learning models are being used in many fields, from health care diagnostics to financial forecasting. However, these models are so computationally intensive that they require the use of powerful cloud-based servers.

This reliance on cloud computing poses significant security risks, particularly in areas like health care, where hospitals may be hesitant to use AI tools to analyze confidential patient data due to privacy concerns.

To tackle this pressing issue, MIT researchers have developed a security protocol that leverages the quantum properties of light to guarantee that data sent to and from a cloud server remain secure during deep-learning computations.

By encoding data into the laser light used in fiber optic communications systems, the protocol exploits the fundamental principles of quantum mechanics, making it impossible for attackers to copy or intercept the information without detection.

Moreover, the technique guarantees security without compromising the accuracy of the deep-learning models. In tests, the researchers demonstrated that their protocol could maintain 96% accuracy while ensuring robust security measures.

“Deep learning models like GPT-4 have unprecedented capabilities but require massive computational resources.

“Our protocol enables users to harness these powerful models without compromising the privacy of their data or the proprietary nature of the models themselves,” says Kfir Sulimany, an MIT postdoc in the Research Laboratory for Electronics (RLE) and lead author of a paper posted to the arXiv preprint server on this security protocol.

Sulimany is joined on the paper by Sri Krishna Vadlamani, an MIT postdoc; Ryan Hamerly, a former postdoc now at NTT Research, Inc.; Prahlad Iyengar, an electrical engineering and computer science (EECS) graduate student; and senior author Dirk Englund, a professor in EECS, principal investigator of the Quantum Photonics and Artificial Intelligence Group and of RLE.

The research was recently presented at the Annual Conference on Quantum Cryptography (Qcrypt 2024).

A two-way street for security in deep learning

The cloud-based computation scenario the researchers focused on involves two parties—a client that has confidential data, like medical images, and a central server that controls a deep learning model.

The client wants to use the deep-learning model to make a prediction, such as whether a patient has cancer based on medical images, without revealing information about the patient.

In this scenario, sensitive data must be sent to generate a prediction. However, during the process the patient data must remain secure.

Also, the server does not want to reveal any parts of the proprietary model that a company like OpenAI spent years and millions of dollars building.

“Both parties have something they want to hide,” adds Vadlamani.

In digital computation, a bad actor could easily copy the data sent from the server or the client.

Quantum information, on the other hand, cannot be perfectly copied. The researchers leverage this property, known as the no-cloning principle, in their security protocol.

For the researchers’ protocol, the server encodes the weights of a deep neural network into an optical field using laser light.

A neural network is a deep-learning model that consists of layers of interconnected nodes, or neurons, that perform computation on data. The weights are the components of the model that do the mathematical operations on each input, one layer at a time. The output of one layer is fed into the next layer until the final layer generates a prediction.

The server transmits the network’s weights to the client, which implements operations to get a result based on their private data. The data remain shielded from the server.

At the same time, the security protocol allows the client to measure only one result, and it prevents the client from copying the weights because of the quantum nature of light.

Once the client feeds the first result into the next layer, the protocol is designed to cancel out the first layer so the client can’t learn anything else about the model.

“Instead of measuring all the incoming light from the server, the client only measures the light that is necessary to run the deep neural network and feed the result into the next layer. Then the client sends the residual light back to the server for security checks,” Sulimany explains.

Due to the no-cloning theorem, the client unavoidably applies tiny errors to the model while measuring its result. When the server receives the residual light from the client, the server can measure these errors to determine if any information was leaked. Importantly, this residual light is proven to not reveal the client data.

A practical protocol

Modern telecommunications equipment typically relies on optical fibers to transfer information because of the need to support massive bandwidth over long distances. Because this equipment already incorporates optical lasers, the researchers can encode data into light for their security protocol without any special hardware.

When they tested their approach, the researchers found that it could guarantee security for server and client while enabling the deep neural network to achieve 96% accuracy.

The tiny bit of information about the model that leaks when the client performs operations amounts to less than 10% of what an adversary would need to recover any hidden information. Working in the other direction, a malicious server could only obtain about 1% of the information it would need to steal the client’s data.

“You can be guaranteed that it is secure in both ways—from the client to the server and from the server to the client,” Sulimany says.

“A few years ago, when we developed our demonstration of distributed machine learning inference between MIT’s main campus and MIT Lincoln Laboratory, it dawned on me that we could do something entirely new to provide physical-layer security, building on years of quantum cryptography work that had also been shown on that testbed,” says Englund.

“However, there were many deep theoretical challenges that had to be overcome to see if this prospect of privacy-guaranteed distributed machine learning could be realized. This didn’t become possible until Kfir joined our team, as Kfir uniquely understood the experimental as well as theory components to develop the unified framework underpinning this work.”

In the future, the researchers want to study how this protocol could be applied to a technique called federated learning, where multiple parties use their data to train a central deep-learning model. It could also be used in quantum operations, rather than the classical operations they studied for this work, which could provide advantages in both accuracy and security.

“This work combines in a clever and intriguing way techniques drawing from fields that do not usually meet, in particular, deep learning and quantum key distribution. By using methods from the latter, it adds a security layer to the former, while also allowing for what appears to be a realistic implementation.

“This can be interesting for preserving privacy in distributed architectures. I am looking forward to seeing how the protocol behaves under experimental imperfections and its practical realization,” says Eleni Diamanti, a CNRS research director at Sorbonne University in Paris, who was not involved with this work.

More information:
Kfir Sulimany et al, Quantum-secure multiparty deep learning, arXiv (2024). DOI: 10.48550/arxiv.2408.05629

Journal information:
arXiv


This story is republished courtesy of MIT News (web.mit.edu/newsoffice/), a popular site that covers news about MIT research, innovation and teaching.

Citation:
Security protocol leverages quantum mechanics to shield data from attackers during cloud-based computation (2024, September 26)
retrieved 26 September 2024
from https://phys.org/news/2024-09-protocol-leverages-quantum-mechanics-shield.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

How social structure influences the way people share money

0
How social structure influences the way people share money


How social structure influences the way people share money
Scatter plot of consumption expenditure (y-axis) versus sub-clan identifiers (x-axis) plotted separately for members of age set societies (light diamonds) and kin-based societies (dark circles). Credit: American Economic Review (2024). DOI: 10.1257/aer.20211856

People around the globe often depend on informal financial arrangements, borrowing and lending money through social networks. Understanding this sheds light on local economies and helps fight poverty.

Now, a study co-authored by an MIT economist illuminates a striking case of informal finance: In East Africa, money moves in very different patterns depending on whether local societies are structured around family units or age-based groups.

That is, while much of the world uses the extended family as a basic social unit, hundreds of millions of people live in societies with stronger age-based cohorts. In these cases, people are initiated into adulthood together and maintain closer social ties with each other than with extended family. That affects their finances, too.

“We found there are major impacts in that social structure really does matter for how people form financial ties,” says Jacob Moscona, an MIT economist and co-author of the newly published study.

He adds, “In age-based societies when someone gets a cash transfer, the money flows in a big way to other members of their age cohort but not to other [younger or older] members of an extended family. And you see the exact opposite pattern in kin-based groups, where money is transferred within the family but not the age cohort.”

This leads to measurable health effects. In kin-based societies, grandparents often share their pension payments with grandchildren. In Uganda, the study reveals, an additional year of pension payments to a senior citizen in a kin-based society reduces the likelihood of child malnourishment by 5.5%, compared to an age-based society where payments are less likely to move across generations.

The paper, “Age Set versus Kin: Culture and Financial Ties in East Africa,” is published in the September issue of the American Economic Review. The authors are Moscona, the 3M Career Development Assistant Professor of Economics in MIT’s Department of Economics; and Awa Ambra Seck, an assistant professor at Harvard Business School.

Studying informal financial arrangements has long been an important research domain for economists. MIT Professor Robert Townsend, for one, helped advance this area of scholarship with innovative studies of finances in rural Thailand.

At the same time, the specific matter of analyzing how age-based social groups function, in comparison to the more common kin-based groups, has tended to be addressed more by anthropologists than economists.

Among the Maasai people in Northern Kenya, for example, anthropologists have observed that age-group friends have closer ties to each other than anyone apart from a spouse and children. Maasai age-group cohorts frequently share food and lodging, and more extensively than they do even with siblings. The current study adds economic data points to this body of knowledge.

To conduct the research, the scholars first analyzed the Kenyan government’s Hunger Safety Net Program (HSNP), a cash transfer project initiated in 2009 covering 48 locations in Northern Kenya. The program included both age-based and kin-based social groups, allowing for a comparison of its effects.

In age-based societies, the study shows, there was a spillover in spending by HSNP recipients on others in the age cohort, with zero additional cash flows to those in other generations; in kin-based societies, they also found a spillover across generations, but without informal cash flows otherwise.

In Uganda, where both kin-based and age-based societies exist, the researchers studied the national roll-out of the Senior Citizen Grant (SCG) program, initiated in 2011, which consists of a monthly cash transfer to seniors of about $7.50, equivalent to roughly 20% of per-capita spending. Similar programs exist or are being rolled out across sub-Saharan Africa, including in regions where age-based organization is common.

Here again, the researchers found financial flows aligned to kin-based and age-based social ties. In particular, they show that the pension program had large positive effects on child nutrition in kin-based households, where ties across generations are strong; the team found zero evidence of these effects in age-based societies.

“These policies had vastly different effects on these two groups, on account of the very different structure of financial ties,” Moscona says.

To Moscona, there are at least two large reasons to evaluate the variation between these financial flows: understanding society more thoroughly and rethinking how to design social programs in these circumstances.

“It’s telling us something about how the world works, that social structure is really important for shaping these [financial] relationships,” Moscona says. “But it also has a big potential impact on policy.”

After all, if a social policy is designed to help limit childhood poverty, or senior poverty, experts will want to know how the informal flow of cash in a society interacts with it. The current study shows that understanding social structure should be a high-order concern for making policies more effective.

“In these two ways of organizing society, different people are on average more vulnerable,” Moscona says. “In the kin-based groups, because the young and the old share with each other, you don’t see as much inequality across generations.

“But in age-based groups, the young and the old are left systematically more vulnerable. And in kin-based groups, some entire families are doing much worse than others, while in age-based societies the age sets often cut across lineages or extended families, making them more equal. That’s worth considering if you’re thinking about poverty reduction.”

More information:
Jacob Moscona et al, Age Set versus Kin: Culture and Financial Ties in east Africa, American Economic Review (2024). DOI: 10.1257/aer.20211856

This story is republished courtesy of MIT News (web.mit.edu/newsoffice/), a popular site that covers news about MIT research, innovation and teaching.

Citation:
How social structure influences the way people share money (2024, September 26)
retrieved 26 September 2024
from https://phys.org/news/2024-09-social-people-money.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link