Dogs’ Eavesdropping from People’s Reactions in Third Party Interactions
نویسندگان
چکیده
Eavesdropping involves the acquisition of information from third-party interactions, and can serve to indirectly attribute reputation to individuals. There is evidence on eavesdropping in dogs, indicating that they can develop a preference for people based on their cooperativeness towards others. In this study, we tested dogs' eavesdropping abilities one step further. In a first experiment, dogs could choose between cooperative demonstrators (the donors) who always gave food to an approaching third person (the beggar); here, the only difference between donors was whether they received positive or negative reactions from the beggar (through verbal and gestural means). Results showed that dogs preferentially approached the donor who had received positive reactions from the beggar. By contrast, two different conditions showed that neither the beggar's body gestures nor the verbal component of the interaction on their own were sufficient to affect the dogs' preferences. We also ran two further experiments to test for the possibility of dogs' choices being driven by local enhancement. When the donors switched places before the choice, dogs chose at random. Similarly, in a nonsocial condition in which donors were replaced by platforms, subjects chose at chance levels. We conclude that dogs' nonrandom choices in the present protocol relied on the simultaneous presence of multiple cues, such as the place where donors stood and several features of the beggar's behavior (gestural and verbal reactions, and eating behavior). Nonetheless, we did not find conclusive evidence that dogs discriminated the donors by their physical features, which is a prerequisite of reputation attribution.
منابع مشابه
On the (un)reliability of eavesdropping
We investigate the reliability of current generation eavesdropping tools and show that obtaining “high fidelity” transcripts is harder than previously assumed. Even in situations highly favorable to the eavesdropper, simple unilateral countermeasures are shown to be sufficient to prevent all tested systems from reliably reconstructing communicated messages. Less than a third of the tested syste...
متن کاملEmotional eavesdropping: infants selectively respond to indirect emotional signals.
Two experiments examined whether 18-month-olds learn from emotions directed to a third party. Infants watched an adult perform actions on objects, and an Emoter expressed Anger or Neutral affect toward the adult in response to her actions. The Emoter then became neutral and infants were given access to the objects. Infants' actions were influenced by their memory of the Emoter's affect. Moreove...
متن کاملHindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynamic configuration of an encrypted tunnel between the two nodes’ IPsec gateways. The main contribution of this paper is to propose a solution that is fully distributed and does not rely on any global Trusted Third Party ...
متن کاملOn the Reliability of Current Generation Network Eavesdropping Tools
This paper analyzes the problem of interception of Internet traffic from the eavesdropper’s point of view. We examine the reliability and accuracy of transcripts, and show that obtaining “high fidelity” transcripts is harder than previously assumed. Even in highly favorable situations, such as capturing unencrypted traffic using standard protocols, simple – and entirely unilateral – countermeas...
متن کاملTesting for Asymmetric Information in Automobile Insurance Market an Iranian Insurance Company
The presence of asymmetric information is an important source of efficiency loss for insurance companies and could reduce profitability. In this paper, we test the conditional independence of coverage choice and risk, where “conditional” means conditional on all variables observed by the insurer. We use two parametric methods: a pair of probits and a bivariate probit model. The data includes al...
متن کامل