Should we expect means-end rational agents to preserve their goals? Southan, Ward and Semler are skeptical.| Reflective altruism
Contributors: Wharton People Analytics Faculty Director Matthew Bidwell, Kira Choi & Isabel Fernandez-Mateo We explore how career paths are shaped by the involvement of search firms in hiring. Drawing on theories of market intermediation, we argue that search firms constrain horizontal moves across functions and industries by favoring workers from…Read More The post Brokered Careers: The Role of Search Firms in Managerial Career Mobility appeared first on People Analytics.| People Analytics
Contributors: Wharton People Analytics Postdoctoral Researcher Louis Hickman & Nigel Bosch, Vincent Ng, Rachel Saef, Louis Tay, Sang Eun Woo Organizations are increasingly adopting automated video interviews (AVIs) to screen job applicants despite a paucity of research on their reliability, validity, and generalizability. In this study, we address this gap by…Read More The post Automated Video Interview Personality Assessments: Reliability, Validity, and Generalizability Investigations ap...| People Analytics
Contributors: Robert W Rebele, Peter Koval, Luke D Smillie Research that helps people change their behavior has the potential to improve the quality of lives, but it is too often approached in a way that divorces behavior from the people who need to enact it. In this paper, we propose…Read More The post Personality-informed intervention design: Examining how trait regulation can inform efforts to change behavior appeared first on People Analytics.| People Analytics
Contributor: Matthew A. Killingsworth Past research has found that experienced well-being does not increase above incomes of $75,000/y. This finding has been the focus of substantial attention from researchers and the general public, yet is based on a dataset with a measure of experienced well-being that may or may not…Read More The post Experienced well-being rises with income, even above $75,000 per year appeared first on People Analytics.| People Analytics
Contributors: Stephanie J. Creary, Nancy Rothbard, Elena Mariscal, Olivia Moore, Jared Scruggs, and Natalia Villarmán During year 1 of the project, team members Elena Mariscal WG’20, Olivia Moore WG’20, and Natalia Villarman WG’20, conducted interviews and helped organize an in-person convening at Wharton in conjunction with the Wharton People Analytics…Read More The post Evidence-Based Solutions for Inclusion in the Workplace: Actions for Middle Managers appeared first on People An...| People Analytics
By: Reb Rebele and Adam Grant The Atlantic We didn’t sign a consent form, but we’re all participants in the world’s largest natural experiment in behavior change. In response to the coronavirus pandemic, millions if not billions of people around the globe are pleading for systemic solutions. In the meantime,…Read More The post A Trick to Stop Touching Your Face appeared first on People Analytics.| People Analytics
The Cambridge Cybercrime Centre‘s eight one day conference on cybercrime was held on Monday, 23rd June 2025, which marked 10 years of the Centre.| Light Blue Touchpaper
Power-seeking theorems aim to formally demonstrate that artificial agents are likely to seek power in problematic ways. I argue that leading power-seeking theorems do not succeed.| Reflective altruism
by Kieron Ivy Turk, Anna Talas, and Alice Hutchings| Light Blue Touchpaper
Many longtermists think that existential risk mitigation escapes the scope-limiting factors. To what extent is this true? The post The scope of longtermism (Part 5: A case study – Existential risk) appeared first on Reflective altruism.| Reflective altruism
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.” Abstract:As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To mitigate this risk, we propose Guillotine, a hypervisor architecture for sandboxing powerful AI models—models that, by accident or malice, can generate existential threats to humanity. Although Guillotine borrows some well-known virtualizat...| Schneier on Security
In an article in the February, 2025 issue of Communications of the ACM, I join 20 coauthors from across academia and industry in writing about the remarkable opportunity for universal strong memory safety in low-level Trusted Computing Bases (TCBs) enabled by recent advances in type- and memory-safe systems programming languages (e.g., the Rust language), hardware memory protection (e.g., our work on CHERI), formal methods, and software compartmentalisation. These technologies are seeing incr...| Light Blue Touchpaper
Rapid diminution occurs when the probabilities of large long-term impacts diminish more quickly than their sizes increase. Rapid diminution tends to shrink the scope of longtermism.| Reflective altruism
In this paper and blog series, I suggest that the scope of longtermism may be narrower than many longtermists suppose.| Reflective altruism
Professor Heckman’s latest research on the Perry Preschoolers at midlife finds multi-generation gains for the participants and children of participants in the areas of education, health, employment and civic life. The research provides a compelling indication that early childhood education can be an effective way to break the cycle of poverty. Select download to access… The post Perry Preschool: Intergenerational Effects Academic Papers appeared first on The Heckman Equation.| The Heckman Equation
The seventeenth Security and Human Behavior workshop was hosted by Bruce Schneier at Harvard University in Cambridge, Massachusetts on the 4th and 5th of June 2024 (Schneier blog).| Light Blue Touchpaper
Researchers have demonstrated a worm that spreads through prompt injection. Details: In one instance, the researchers, acting as attackers, wrote an email including the adversarial text prompt, which “poisons” the database of an email assistant using retrieval-augmented generation (RAG), a way for LLMs to pull in extra data from outside its system. When the email is retrieved by the RAG, in response to a user query, and is sent to GPT-4 or Gemini Pro to create an answer, it “jailbreaks ...| Schneier on Security
We were welcomed to WEIS 2023 in the University of Geneva by Afroditi Anastasaki from UNITAR, the UN Institute for Training and Research, whose mission is training diplomats, particularly from less developed countries. Her agency has recently been working on digital empowerment and digital sovereignty, which encompasses many questions around how states can maintain sovereignty in today’s complex online world. There will be a digital sovereignty hackathon on Friday and Saturday where UNITAR,...| Light Blue Touchpaper