To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Jiří Adámek, Czech Technical University in Prague,Stefan Milius, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany,Lawrence S. Moss, Indiana University, Bloomington
This chapter discusses terminal coalgebras obtained by methods other than the finitary iteration that we saw in Chapter 3. One way is by taking a quotient of a weakly terminal coalgebra. Another is to use Worrell’s Theorem: the terminal coalgebra of a finitary set functor is obtainable as a limit, using a doubled form of infinite iteration. The chapter also contains a number of presentations of the terminal coalgebra of the finite power-set functor on sets and of the first infinite limit of its terminal-coalgebra chain.
Jiří Adámek, Czech Technical University in Prague,Stefan Milius, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany,Lawrence S. Moss, Indiana University, Bloomington
This chapter presents the limit-colimit coincidence in categories enriched either in complete partial orders or in complete metric spaces. This chapter thus works in settings where one has a theory of approximations of objects, either as joins of $\omega$-chains or as limits of Cauchy sequences, and with endofunctors preserving this structure. There are some additional requirements, and we discuss examples. In the settings which do satisfy those requirements, the initial algebra and the terminal coalgebras exist and their structures are inverses, giving what is known as a canonical fixed point (a limit-colimit coincidence). We recover some known results on this topic due to Smyth and Plotkin in the ordered setting and to America and Rutten in the metric setting. We also discuss applications to solving domain equations.
Fifteen years ago in All Politics is Global, I developed a typological theory of global economic governance, arguing that globalization had not transformed international relations but merely expanded the arenas of contestation to include policy arenas that had previously been the exclusive province of domestic politics. In my model, what truly mattered to global governance was the distribution of preferences among the great powers. When great power coordination was achieved, then effective governance would be the outcome. When great power coordination was not, then global governance would exist in name only. Demands for greater content moderation across platforms have increased as the modern economy has become increasingly data-driven. Can any standards be negotiated at the global level? The likeliest result will be a hypocritical system of “sham governance.” Under this system, a few token agreements might be negotiated at the global level. Even these arrangements, however, will lack enforcement mechanisms and likely be honored only in the breach. The regulatory center of gravity will remain at the national level. Changes at the societal and global levels over the past fifteen years only reinforce the dynamics that lead to such an outcome.
Jiří Adámek, Czech Technical University in Prague,Stefan Milius, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany,Lawrence S. Moss, Indiana University, Bloomington
We motivate the book based on categorical formulations of recursion and induction. We also discuss the background that readers should have and preview many of the topics in the book.
Jiří Adámek, Czech Technical University in Prague,Stefan Milius, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany,Lawrence S. Moss, Indiana University, Bloomington
Jiří Adámek, Czech Technical University in Prague,Stefan Milius, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany,Lawrence S. Moss, Indiana University, Bloomington
An essential aspect of designing digital behaviors involves identifying, selecting, and properly designing the reinforcers within a digital space. These reinforcers function to increase the usage of digital services, aiming to achieve corporate objectives through habit formation. Reinforcers can be administered after the user performs the desired behavior; they can be delivered immediately, delayed by seconds or days, and may be administered directly by the technological device or indirectly by the natural environment. Identifying all possible reinforcers before the development of the digital service (reinforcer matrix) can impact the design or development of the service itself. The implementation of reinforcers should be prioritized, finding those that provide the most value in satisfying user needs. This is why identifying, selecting, and designing reinforcers is essential as a preliminary step to the service’s design and development. Once the various reinforcers are detected, it must be considered under what reinforcement schedule they will be administered in the different user interactions with the digital service. Most will be through a continuous reinforcement program, but many others may function better under an intermittent reinforcement program. In conclusion, once the appropriate reinforcers are found, the effects they might have in the environment and long term must be studied to minimize potential adverse effects that could arise in users and the business itself. Only when they are properly identified and selected, does the design of the signals that will indicate to the user the possibility of obtaining them begin. These signals are conceptualized as discriminative stimuli or deltas, and they form the bridge between the design of digital behavior and the design of the user experience.
In the previous chapters, the theoretical foundations upon which the design of digital behaviors is based were presented. This chapter proposes a methodology to organize all this knowledge into a valid process for the design and development of Digital Operant Boxes, or equivalently, digital services. The aim of designing digital behaviors is the creation of behavioral blueprints of the user's potential interactions with the digital service, in such a way that reflects their personal, historical, and digital characteristics. To achieve this objective, this chapter presents a methodology “Digital Behavioral Design” which consists of two main phases with several stages in each: (1) Digital Behavior Analysis and (2) Drives and Operants Design. The Digital Behavior Analysis comprises the following stages: “Goal-Directed Behavior Design” and “Digital Behavioral Map”. This phase focuses on the molar behaviors of the user when using the digital service and allows the designer to present an initial approximation of the service’s behavioral blueprints. The second phase consists of 5 stages: “Behavioral Profiling”, “Reinforcer Matrix”, “Behavioral Competition Analysis”, “Hierarchy Map of Reinforcers”, and “Digital Blueprint”. These stages enable the designer to optimize the drives and reinforcers identified in the first phase and to finely tune the digital service. Therefore, “Digital Behavioral Design” becomes a tool for the designer of digital behaviors that will allow them to apply knowledge from behavioral and cognitive sciences to the design of digital services.
Various cognitive theories indicate how the brain and technology have interacted with each other in an iterative and progressive manner to shape human cognition. Technologies are cultural tools that emerged as a human response to address specific needs. These technologies have allowed us to overcome various ecological, social, and cultural challenges that have impacted the phylogenetic development of higher cognitive abilities that have elevated Homo sapiens above other species. In the digital age, technologies such as the internet, smartphones, and the various software applications that derive from them play a fundamental role in how we relate to ourselves and society. Understanding how humans interact with these technologies, and the effect they have on altering brain architecture, is essential for designing and developing better tools. This chapter summarizes the key findings that explain the consequences of using these technologies on our development and how behavior, through these means, has given rise to digital behavior. Digital behavior is the compendium of interactions and their consequences that occur on the individual when using a digital service. The design of digital behaviors can be described as a new sub-field of Human Factors and Engineering Psychology, with habit formation and need satisfaction serving as the main epistemological core of digital behavior design. The design of digital behaviors is a necessary discipline that can enhance user engagement with these technologies by improving cognitive ergonomics, thereby more effectively addressing the needs that users bring to these types of services.
Jiří Adámek, Czech Technical University in Prague,Stefan Milius, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany,Lawrence S. Moss, Indiana University, Bloomington
A set functor is an endofunctor on the category of sets. Although the topic of set functors is quite large, there are few if any chapter-length summaries directed to a researcher in the area of this book. This appendix collects the results on set functors that such a person ought to know, including the main preservation properties, such as preservation of weak pullbacks and of finite intersections. It contains the main examples of set functors used in the recent literature and a chart of their preservation properties. Studying monoid-valued functors, it connects the preservation properties of the functor to algebraic properties of the monoid. It presents Trnkova’s modification of a set functor at the empty set needed to obtain a functor preserving all finite intersections.
Jiří Adámek, Czech Technical University in Prague,Stefan Milius, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany,Lawrence S. Moss, Indiana University, Bloomington
This appendix summarizes all of the known fixed point theorems used in the book. In addition to the best known results of this type, it also contains Markowsky’s characterization of directed-complete partial orders, Iwamura’s Lemma, and Pataraia’s ordinal-free version of Zermelo’s Theorem (see Chapter 6). It also mentions induction principles related to these fixed point theorems.
Jiří Adámek, Czech Technical University in Prague,Stefan Milius, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany,Lawrence S. Moss, Indiana University, Bloomington
Jiří Adámek, Czech Technical University in Prague,Stefan Milius, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany,Lawrence S. Moss, Indiana University, Bloomington
Given an endofunctor F we can form various derived endofunctors whose initial algebras and terminal coalgebras are related to those of F. The most prominent example are coproducts of F with constant functors, yielding free F-algebras, cofree F-coalgebras, and free completely iterative F-algebras. An initial algebra exists for a composite functor FG if and only if it does for GF. We also present Freyd’s Iterated Square Theorem and its converse: A functor F on category with finite coproducts has an initial algebra precisely when FF does. The chapter also studies functors on slice categories and product categories, coproducts of functors, double-algebras, and coproducts of monads.
Global platforms present novel challenges. They serve as powerful conduits of commerce and global community. Yet their power to influence political and consumer behavior is enormous. Their responsibility for the use of this power – for their content – is statutorily limited by national laws such as Section 230 of the Communications Decency Act in the US. National efforts to demand and guide appropriate content moderation, and to avoid private abuse of this power, is in tension with concern in liberal states to avoid excessive government regulation, especially of speech. Diverse and sometimes contradictory national rules responding to these tensions on a national basis threaten to splinter platforms, and reduce their utility to both wealthy and poor countries. This edited volume sets out to respond to the question whether a global approach can be developed to address these tensions while maintaining or even enhancing the social contribution of platforms.