108. Robert Wilson: 10 simple rules for computational modelling, phishing, and reproducibility
Robert (Bob) Wilson is an Associate Professor of Psychology at Georgia Tech. We talk about his tutorial paper (w/ Anne Collins) on computational modelling, and some of his recent work on detecting phishing.BJKS Podcast is a podcast about neuroscience, psychology, and anything vaguely related, hosted by Benjamin James Kuper-Smith.Support the show: https://geni.us/bjks-patreonTimestamps0:00:00: Bob's strange path through computational cognitive neuroscience0:07:37: Phishing: a computational model with real-life applications0:25:46: Start discussing Bob's paper 10 simple rules for computational modeling of behavioral data0:32:15: Rule 0: Why even do computational modelling?0:46:24: Rules 1 & 2: Design a good experiment & Design a good model1:02:51: Rule 3: Simulate!1:05:48: Rules 4 & 5: Parameter estimation and recovery1:18:28: Rule 6: Model recovery1:25:55: Rules 7 & 8: Collect data and validate the model1:33:15: Rule 9: Latent variable analysis1:36:24: Rule 10: Report your results1:37:46: Computational modelling and the open science movement1:40:17: A book or paper more people should read1:43:35: Something Bob wishes he'd learnt sooner1:47:18: Advice for PhD students/postdocsPodcast linksWebsite: https://geni.us/bjks-podTwitter: https://geni.us/bjks-pod-twtRobert's linksWebsite: https://geni.us/wilson-webGoogle Scholar: https://geni.us/wilson-scholarTwitter: https://geni.us/wilson-twtBen's linksWebsite: https://geni.us/bjks-webGoogle Scholar: https://geni.us/bjks-scholarTwitter: https://geni.us/bjks-twtReferencesEpisodes w/ Paul Smaldino: https://geni.us/bjks-smaldinohttps://geni.us/bjks-smaldino_2Bechara, Damasio, Damasio, & Anderson (1994). Insensitivity to future consequences following damage to human prefrontal cortex. Cognition.Feng, Wang, Zarnescu & Wilson (2021). The dynamics of explore–exploit decisions reveal a signal-to-noise mechanism for random exploration. Scientific Reports.Grilli, ... & Wilson (2021). Is this phishing? Older age is associated with greater difficulty discriminating between safe and malicious emails. The Journals of Gerontology: Series B.Hakim, Ebner, ... & Wilson (2021). The Phishing Email Suspicion Test (PEST) a lab-based task for evaluating the cognitive mechanisms of phishing detection. Behavior research methods.Harootonian, Ekstrom & Wilson (2022). Combination and competition between path integration and landmark navigation in the estimation of heading direction. PLoS Computational Biology.Hopfield (1982). Neural networks and physical systems with emergent collective computational abilities. PNAS.MacKay (2003). Information theory, inference and learning algorithms.Miller, Eugene & Pribram (1960). Plans and the Structure of Behaviour.Sweis, Abram, Schmidt, Seeland, MacDonald III, Thomas, & Redish (2018). Sensitivity to “sunk costs” in mice, rats, and humans. Science.Walasek & Stewart (2021). You cannot accurately estimate an individual’s loss aversion using an accept–reject task. Decision.Wilson & Collins (2019). Ten simple rules for the computational modeling of behavioral data. Elife.