Open borders?

The map pictured below visualizes the average daily totals of people entering the USA from Mexico by car, bus, or on foot at various ports of entry along the U.S.-Mexico border.

Credit: The Los Angeles Times

Posted in Uncategorized | 2 Comments

Was “the father of philosophy” a wealthy playboy?

File under: “revisionist history that is probably true.” Although the Athenian philosopher Plato presents the great Socrates as “a man of humble background, little education, few means and unappealing looks,” Plato was probably painting a false or incomplete picture of his erudite mentor, at least according to this intriguing essay by Armand D’Angour, a fellow of Jesus College at Oxford and the author of the book Socrates in Love: The Making of a Philosopher (2019). In brief, there is some evidence to indicate that the flesh-and-bones Socrates was, in fact, not only a wealthy playboy but also an enemy of Athenian democracy. Here is an excerpt from Professor D’Angour’s excellent essay (h/t: Brian Leiter): Continue reading

Posted in Uncategorized | Leave a comment

Taxonomy of half-empty, half-full water glasses

Posted in Uncategorized | 1 Comment

World firearms census

Hat tip: u/chartr, via reddit

Posted in Uncategorized | 1 Comment

Infinite Jest Update (April)

We cracked open this mammoth tome in March and are now on page 430, having just finished reading David Foster Wallace’s allegory about the allocation of scarce resources, which also happens to be one of the most fundamental questions in a wide variety of scholarly disciplines, including economics, political philosophy, and law. DFW’s haunting allegory is set on a ledge in the Sonora Desert, where a pair of the most memorable characters in North American literature, Hugh (Helen) Steeply and Remy Marathe, discuss a hypothetical scenario involving a single-serving portion of pea soup. (My colleague Linda Essig provides a good summary of the substance of Steeply and Marathe’s ruminations here.) We shall press on and provide additional updates next month.

Image result for steeply marathe

Source: Jon Beasley-Murray

Posted in Uncategorized | Leave a comment

Publication bias

Thus far, we have identified several common forms of “data fraud,” including cherry picking, data dredging, and the false cause fallacy. Yet all of these myriad forms of data fraud might be mere symptoms of a larger problem: publication bias. Just as TV and print media compete to report on the most salient or salacious events that will grab their viewers’ or readers’ attention (“If it bleeds, it leads”), scientific journals likewise compete to publish studies with the most exciting, novel, or “sexy” findings. But the problem with this fetish for novelty or salience is that it generates a scholarly market failure, one resulting in the overproduction of sexy studies, or in the words of the good folks at Geckoboard (a UK-based consulting firm), “For every study that shows statistically significant results, there may have been many similar tests that were inconclusive…. Not knowing how many ‘boring’ studies were filed away impacts our ability to judge the validity of the results we read about. When a company claims a certain activity had a major positive impact on growth, other companies may have tried the same thing without success, so they don’t talk about it.” That is why both the news media and the most prestigious scholarly journals often end up presenting such a distorted picture of reality.

Image result for publication bias

Credit: Franco, et al.

Posted in Uncategorized | 4 Comments

False cause fallacy

Thus far we have seen the related statistical sins of cherry picking and data dredging. Today, let’s talk about the false cause fallacy (or “false causality” for short), which occurs when you observe two events that appear together and then leap to the conclusion that one event must have caused the other. (Here is a mundane example. The video below presents many more.) In reality, just because two events occur together does not mean that one caused the other. The causation may run in the opposite direction or some unobserved third factor might be the underlying cause of both events or there might be no direct or indirect causation at all!

Posted in Uncategorized | 3 Comments

Data dredging

Let’s proceed with our parade of fraudulent data practices, shall we? Next up is data dredging (a/k/a “p-hacking”), a more sophisticated (and less transparent) form of cherry picking. In the words of Wikipedia: “The process of data dredging involves automatically testing huge numbers of hypotheses about a single data set by exhaustively searching … for combinations of variables that might show a correlation ….” This form of data fraud thus occurs when researchers perform multiple statistical tests on a single set of data and then selectively publish only those results that satisfy some test of statistical significance. Such ex post results, however, are often just spurious correlations. The lesson here is this: beware of so-called “statistically significant” results. To avoid perpetrating this form of data fraud (and reduce positive-results bias to boot), some journals and funding organizations are now requiring researchers to preregister their clinical trials, stating in advance what hypotheses they are going to be testing.

Image result for data dredging
Posted in Uncategorized | 3 Comments

Cherry picking

We presented a collection of fraudulent data practices in our previous post. Now, let’s consider each fraudulent technique in turn, beginning with the “Texas sharpshooter fallacy” or cherry picking: the practice of selecting results that fit your claim and excluding those that don’t. According to the good folks at Geckoboard (a London-based consulting firm), this practice is “[t]he worst and most harmful example of being dishonest with data. When making a case, …. people often only highlight data that backs their case, rather than the entire body of results. It’s prevalent in public debate and politics, where two sides can both present data that backs their position. Cherry picking can be deliberate or accidental. Commonly, when you’re receiving data second hand, there’s an opportunity for someone choosing what data to share to distort the truth to whatever opinion they’re peddling. When on the receiving end of data, it’s important to ask yourself: ‘What am I not being told?’”

Posted in Uncategorized | 2 Comments

Taxonomy of fraudulent data practices

Posted in Uncategorized | 1 Comment