Severity: Warning
Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 197
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 197
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 271
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3165
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 597
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 511
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 317
Function: require_once
98%
921
2 minutes
20
Intentional misunderstandings take advantage of the ambiguity of language to do what someone said, instead of what they actually wanted. These purposeful misconstruals or loopholes are a familiar facet of fable, law, and everyday life. Engaging with loopholes requires a nuanced understanding of goals (your own and those of others), ambiguity, and social alignment. As such, loopholes provide a unique window into the normal operations of cooperation and communication. Despite their pervasiveness and utility in social interaction, research on loophole behavior is scarce. Here, we combine a theoretical analysis with empirical data to give a framework of loophole behavior. We first establish that loopholes are widespread, and exploited most often in equal or subordinate relationships (Study 1). We show that people reliably distinguish loophole behavior from both compliance and non-compliance (Study 2), and that people predict that others are most likely to exploit loopholes when their goals are in conflict with their social partner's and there is a cost for non-compliance (Study 3). We discuss these findings in light of other computational frameworks for communication and joint-planning, as well as discuss how loophole behavior might develop and the implications of this work for human-machine alignment.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1016/j.cognition.2025.106131 | DOI Listing |