A New Kind of Social Science: The Path Beyond Current (IR) Methodologies May Lie Beneath Them
A New Kind of Social Science: The Path Beyond Current (IR) Methodologies May Lie Beneath Them
A New Kind of Social Science: The Path Beyond Current (IR) Methodologies May Lie Beneath Them
The Path Beyond Current (IR) Methodologies May Lie Beneath Them
by
Valerie M. Hudson, Brigham Young University
Philip A. Schrodt, University of Kansas
Ray D. Whitmer, Jhax.Ltd.
Version 0.8B2
Last Update: 26 March 2004
Paper prepared for delivery at the Annual Meeting of the International Studies Association,
Montreal, Quebec, Canada, March 2004.
Authors can be contacted via email at the following addresses:
[email protected], [email protected], and [email protected].
This research was supported in part grants from the College of Family, Home, and Social
Sciences, Brigham Young University, the U.S. National Science Foundation grant SES-0096086,
and the General Research Fund of the University of Kansas.
The analytical web site for this project, which includes the graphic tools for analyzing event
patterns is http://ep.jhax.org. The data sets discussed in this paper, as well as a pdf
version of the paper with color graphics, can be downloaded from the KEDS project web site:
http://www.ku.edu/~keds/.
Abstract
Existing formal models of political behavior have followed the lead of the natural sciences
and generally focused on methods that use continuous-variable mathematics. Stephen Wolfram
has recently produced an extended critique of that approach in the natural sciences, and
suggested that a great deal of natural behavior can be accounted for using rules that involve
discrete patterns. Wolframs work generally does not consider models in the social sciences but
given the similarity between many of the techniques for modeling in the natural and social
sciences, his critique can readily be applied to models of social behavior as well. We argue
further that pattern-based models are particularly relevant to modeling human behavior because
human cognitive abilities are far more developed in the domain of pattern recognition than in the
domain of continuous-variable mathematics. We test the possibility of finding pattern-based
behavior in international behavior by looking at event data for the Israel-Palestine conflict for the
period 1979-2003. Using a new web-based tool explicitly designed for the analysis of event data
patterns, we experiment with three general patterns: the classic tit-for-tat, an olive branch
pattern designed to detect attempts at de-escalation, and four meta-rules that look at the
relationship between prior conflict and the propensity of the actors to engage in reciprocal
behavior. Our analysis shows that these patterns can be found repeatedly in the data, and their
frequency corresponds to changes in the qualitative characteristics of the conflict.
University of Leiden ISA-RC33 keynote address, Cologne, 5 October 2000. ISA-RC33 is the methodological
sub-section of the International Sociology Association. That ISA, not our ISA...
Mathematical
approaches
Statistical
approaches
Elements of understanding
Figure 1: Complexity and the Confines of Mathematical and Statistical Analysis
To date, the response to this situation has also been less than helpful. One response, very
common, is to simply apply mathematical or statistical methods beyond the confines where their
use is justified. This results in a strange methodological anomie, where one uses these methods
as if all is straightforward, while becoming ever more disengaged in one's questions and answers
from the reality wrestled with on a day-to-day basis by those who live within it. Statistically
speaking, we cannot justify assumptions of random or normal distribution in much of what we
are studying as social scientists. These assumptions, when used without justification outside of
areas noted in Figure 1 where aggregation and large-sample properties cause statistical
regularities, are actually an effort to avoid the issue of complexity. Mathematically speaking, we
have an enormous N-body problemin the sense of the problem in astrophysics, not statistics,
for which we have very little in the way of methodological capabilities. In a sense, we also have
a parallel problem in small N situations, where idiosyncratic factors such as the fact that the AlAqksa Mosque, the Western Wall and the Church of the Holy Sepulcher are within a 500-meter
radius of each other is intensely important to this conflict but it is decidedly not a large-sample
property subject to the normal or Poisson distribution. So we use simplifying assumptions that
evade the complexity with which we cannot cope.
4
For example, most contemporary analyses of nominal variables use either dummy variable regression (nominal
independent variables) or variations on logit analysis (nominal dependent variables). Both techniques are
essentially mathematical tricks for treating the nominal variables as if they were interval, and their estimation is
entirely in the domain of continous variables.
As Wolfram puts it, "it is in many cases clear that the whole notion of continuity is just an idealization--although
one that happens to be almost required if one wants to make use of traditional mathematical methods." (Wolfram,
2003, 729).
4The
literature on pattern recognition in human problem solving goes back to the 1960s, for example Newell and
Simon 1972, Simon 1982, and Margolis 1987.
See Newell and Simon (1972), chapter 14. Newell and Simon argue that the capacity of associative memory is
effectively unlimited because the amount of time required to store items is sufficiently long that life-span, rather
than memory capacity, is the constraint.
Robert Kennedy, and the crisis was in 1962, not 1963. The fact that the attorney general was the President's
brother and actively involved in the crisis aids in the recall; I suspect most people could not answer the same
10
Human associative
memory may be able to handle, subcognitively, complex episodic political information such as
precedent retrieval in part because the brain evolved in part to handle comparable problems.8
Subcognitive Processing: Seeing, Feeling, and Understanding
Studying associative recall is problematic because the process occurs in the non-verbal,
unconscious or subcognitive9 part of the brain: it is a form of information processing that we can
do but not articulate. In the foreign policy field such reasoning is typically called "intuition" or
"feel." But a better description might be "seeing" or "perceiving." A typical example of this
approach to foreign policy analysis is found in the following quote from Kissinger:
Statesmanship requires above all a sense of nuance and proportion, the ability to perceive
the essential among the mass of apparent facts, and an intuition as to which of many
equally plausible hypotheses about the future is likely to prove true.(Kissinger 1979,39)
Subcognitive information retrieval involves nothing mystical; the process can be, and has
quite extensively been, empirically studied (see Collins and Smith 1988; Reber 1993). One
can engage in very complex information processing without being aware of how one is doing
it, even using introspection. Lashley notes:
No activity of the mind is ever conscious. [Lashley's italics] This sounds like a paradox,
but it is nonetheless true. A couple of illustrations should suffice. Look at a complicated
scene. It consists of a number of objects standing out against an indistinct background:
Masters (1989) provides a thorough discussion of the possible connections between evolution and political
behavior; Axelrod (1984) and Simon (1990) note that evolution may have predisposed humans to altruistic
behaviors, a definite change for the bellicose "Social Darwinism" of a century ago.
This term is from Douglas Hofstadter (1985) via Holland et al (1986). The word is attractive since unlike
"unconscious" it implies active information processing; it avoids the Freudian overtones of "subconscious" and it
is more general than the term "nonverbal". Jackendoff (1987), while dealing with an entirely different set of
domains, provides an excellent discussion of subcognitive information processing and a guide to much of the
relevant psychological literature in the linguistic and visual perception domains; Springer and Deutsch (1981) give
a semi-popular review of the related literature on split-brain experiments.
11
10
Indeed, it is interesting to speculate that so many of our students have trouble understanding social phenomena
through mathematics and statistics not because they are less intelligent, but because such techniques seem to the
normal mind to be less powerful and less informative than simple social intuition which, far from being
simple is in fact phenomenally complex. Perhaps the Post-Autistic Economics Movement may be seen as
having chosen its name with care, for perhaps those who find these methods easy to use and particularly insightful
may have brains that are somewhat atypical. This is not to necessarily suggest a pathological mental
conditionthe dramatic example of one of the giants of game theory, John Nash, notwithstandingbut rather that
the tools through politics can be most comfortably understood may be quite different for those attracted to the
contemplative abstractions of the academic life and those attracted to the rapid-paced, crisis-laden human
interactions of the policy world.
11
The focus here is on the Weberian "rational-legal" bureaucracy that dominates foreign policy decision-making
structures in the modern era. This applies even in "revolutionary" situations: For example, the taking of American
hostages in Iran during 1979-80 was outside the normal range of international behavior, but the attempts at
resolving that issue were very much normal, including the unsuccessful rescue attempt and the eventually
successful mediation by Algeria and other international agents. Similarly, the rhetoric surrounding the Iran-Iraq
13
war and the personal animosity between Saddam Hussein and Khomeini provided personalistic aspects to that
conflictas would the animosity between Saddam Hussein and various U.S. presidents named George Bush in
the period 1990-2003 and between but the military interactions were bureaucratically quite conventional.
12
Thorough treatments of the role of rules and heuristics can also be found in Majeski (1987), Mefford (1991), and
Sylvan, Goel and Chandrasekran (1990); the approach also permeates the Kahneman, Slovic and Tversky research.
14
19
20
21
22
23
13
Discussions of machine coding can be found in Gerner et al. (1994), Schrodt and Gerner (1994), Huxtable and
Pevehouse (1996), and Bond et al. (1997).
24
14
There is a guidebook to using the website, which is provided in our appendix, but is also online at that same URL.
As of 15 March 2004, the default values in the web site are set to the rules analyzed in this paper, and therefore it
25
can be used to generate a complex display without entering any specific values. The discussion that follows
assumes that you want to look at something other than the default rules.
15
The Kansas Event Data System project has a Levant data set at http://www.ku.edu/~keds/data.html/levant.html
that is updated every three months, and at the present time (March 2004) is current to 31 December 2003.
However, due to a change in the availability of Reuters report, that data set switches to Agence France Presse as a
source after 30 September 1999, and the frequency of events reported by AFP is substantially greater than that
reported by Reuters. In addition, the final months of the Reuters data appear to be extremely sparseprobably due
to the gradual deterioration of Reuters services that eventually led us to switch to AFPand consequently the
apparent absence events in 1999 may be an artifact of the data.
16
Which is to say the display works just fine on Schrodts Macintosh G5 but crashed Hudsons Dell.
26
ISR
PAL
31
15
10
5
0
-5
-10
ISR
PAL
30
25
20
15
10
5
0
-5
-10
-15
-20
ISR
PAL
33
34
In essence, the red and black boxes represent escalation; the purple and yellow de-escalation. If
none of the meta-rules apply, the final column is left blank.
Making sense of the meta-rules has thus far proven more difficult than we anticipated, in
part because they fluctuate quickly. Graphs similar to those used for tit-for-tat and the olivebranch rules are not particularly informative, so instead we spent some time simply looking
through the entire display and trying to determine patterns using that highly sensitive pattern
recognition device, the human visual cortex. Using this method, two meta-patterns seem to be
evident.
First, to use Wolframs phrasing, purple grows. In the parts of display prior to the Oslo
Agreement in 1993, signals are usually umambiguous: there is either conflict or the absence of
conflict, and the meta-boxes are either black, red, or absent (cooperation is rare during this
period, as we saw in Figure 5). In the post-Oslo period, in contrast, purple becomes more and
more dominant, indicative of mixed conflict and cooperation.
This is, in all likelihood, a reflection of a critical change in the situation: the rise of Islamic
militant groups to challenge the legitimacy of the Palestinian Authority and the Palestine
Liberation Organization as the sole voices of the Palestinian opposition to Israel. A second
factor that may also be contributing to this is the increase in visible international mediation,
particularly by the United State and Europe, who know strongly encourage talks between Israel
and Palestinian representative even there is a high level of violence on the ground. Prior to Oslo,
when there was no mutual recognition between the two sides, talks (if present at all, and they
usually werent) were in secret or through intermediaries, whereas now both sides have to
respond to public calls for negotiations even in times of conflict.
35
Conclusion
Event data have in employed in the analysis of international behavior for over four
decades, but arguably we are still trying to learn how to use them effectively. This type of
36
38
<871115>cC
<871122>DcDcCcD
<871129>DdCCCDDcd
<871206>DdDDDCDcCD
<871213>dDDDDDDDcdDD
<871220>DDDdDDDDcdDCD
<871227>cDCdddDD
<880103>DDdDDDDDCDDDDcDcDdDdDddDdDD
<880110>DCdCDddDDDDDDdcDDdDcdCcDdDDddCDCddDdDDDDDDDDCcdcd
<880117>cccCCDcCcDDDdddDDCddDdddDD
<880124>dCDDCDdDCdDdDDDDdCdDDD
<880131>dDDDDcDDDcdDDCCdDccdDcDcdDDDDDcCDD
<880207>ddDDDDDDDCDcCcCcddDDDDCCcDDcC
<880214>CccCDCDDDcCDCcDDDDDDDD
Using this as the input, tit-for-tat on a weekly basis can be found using a short perl
program where the core code is:
40
In this program fragment, $last is the string from the previous week; $line is the string from
the current week; and $thres is the minimum threshold for the number of events. The variables
$iISR and $iPAL
take the value zero if the actors are not using tit-for-tat and non-zero-values if
they are. When these variables are read into Excel, this produces a chart such as the one in
Figure 7.
ISR TFT
PAL TFT
41
42
43
Bibliography
Abelson, Robert P. 1973. "The Structure of Belief Systems." In Computer Models of Thought
and Language, edited by R.C. Schank and K.M. Colby. San Francisco: Freeman.
Allison, Graham T. 1971. The Essence of Decision. Boston: Little, Brown.
Anderson, John R. 1983. The Architecture of Cognition. Cambridge: Harvard University Press.
Anderson, James A. and Edward Rosenfeld. eds. 1988. Neurocomputing: Foundations of
Research. Cambridge: MIT Press.
Andriole, Stephen J. and Gerald W. Hopple. 1988. Defense Applications of Artificial
Intelligence. Lexington MA: Lexington.
Axelrod, Robert. 1984. The Evolution of Cooperation. New York: Basic Books
Bickerton, Ian J. and Carla L. Klausner. 1998. A Concise History of the Arab-Israeli Conflict.
(3rd edition) Upper Saddle River, NJ: Prentice-Hall.
Bond, Doug, J. Craig Jenkins, Charles L. Taylor, and Kurt Schock. 1997. Mapping Mass
Political Conflict and Civil Society: The Automated Development of Event Data. Journal of
Conflict Resolution 41: 553-579.
Boynton, G. R. 1991. "The Expertise of the Senate Foreign Relations Committee." In Artificial
Intelligence and International Politics, edited by Valerie Hudson. Boulder: Westview.
Boynton, G. R. n.d. "Interpretive Triples and Reasoning About Foreign Policy." Photocopied
manuscript.
Bull, Hedley. 1966. "International Theory: The Case for a Classical Approach." World Politics
18:361-377.
Carbonell, Jaime G. 1978. "POLITICS: Automated Ideological Reasoning." Cognitive Science
2:27-51.
Chase, W.G. and H.A. Simon. 1973. "Perception in Chess." Cognitive Psychology 4:55-81.
Collins, Allan and Edward E. Smith, eds. 1988. Readings in Cognitive Science: A Perspectice
from Psychology and Artificial Intelligence. San Mateo CA: Morgan Kaufmann.
Dixon, William J. 1986. "Reciprocity in United States-Soviet Relations: Multiple Symmetry or
Issue Linkage." American Journal of Political Science 30:421-45.
Fullbrook, Edward, "A Brief History of the Post-Autistic Economics Movement," November 21,
2001, http://www.paecon.net. Accessed 14 March 2004
Gause, F. Gregory. 1999. "Systemic Approaches to Middle East International Relations."
International Studies Review1,1:11-32.
Gerner, Deborah J. 1994. One Land, Two Peoples: The Conflict over Palestine. (2nd ed.)
Boulder, CO: Westview Press.
44
45
46
47
Appendix 1: Instructions for Using the JHAX Event Pattern Web Site
Created by Ray Whitmer
Last revision: 2003/12/18 19:48:36 GMT
1. Introduction
The JHAX Event Prediction Website http://ep.jhax.org.is a web-based program
that manipulates and displays data about world events. This page focuses on the technical
aspects of the program, ignoring many significant things such as qualities of the data and the
search for rules that might usefully predict events, etc.
2. Source Code
The Java Programs and Java Server Programs on these pages were written by Ray
Whitmer and have been released under the GPL, meaning roughly that anyone can use them
freely (both in terms of source rights and cost) as long as they are not redistributed as part of a
non-free program. The sources may be viewed or downloaded on the internet without
registration of any form.
When you follow the Java Programs link above, you see a list of several files that contain
some of the main parts of the code. If you click on the version number, you will that version of
the file. From either of these links, you can click on "download" to get an exact copy of the file.
Clicking on the file name takes you to a history of the file.
EventDisplay is the main object that constitutes the event display of the program. It knows
what all the program parameters are, how to get them and send them, and how to use them to
create a textual or graphical display. Event is a simple object representing a single event that
may be read from a file. EventTypePattern assigns a name to patterns of these event types, each
interfacing to the scheduling. Servlet causes a virtual graphic to be drawn from a special
graphics URL referenced by pages where a graphical display has been requested. Mostly this
just calls back into the EventDisplay class. Displayable controls drawing each symbol for the
graphical display.
The JHAX.org main source page has links to sources and documentation of various
systems.
48
53
54
4. Counter Expressions
A counter expression computes some number usually based on event counts. This can be
an event type, a pattern name, a number, or an expression.
4.1 Event Type
When as a counter expression, the event type refers to the number of matching events in
the current unit of time.
An event type is a source actor, followed by dash, followed by a target actor, followed by
dash, followed by the verb, as follows:
<source actor>-<target actor>-<verb>
The event type is aways interpreted after mapping the actors and codes, so the source and
target actors must each be targets in the actor map field and the verb must be from the event
codes field. If, for example, the actor map produces source and target actors A and B and the
code maps to the target verb MaterialCooperation, then the corresponding event type to refer to
the count of such events is A-B-MaterialCooperation.
55
56
57
58
Column 2:
Blue box
Blue arrow
Column 3:
Green arrow
Red solid box
Red empty box
Yellow solid box
Yellow empty box
Column 4:
Blue arrow
Red solid box
Red empty box
Yellow solid box
Yellow empty box
Column 5:
Black box
Red box
Purple box
Yellow box
59
60
61
62
63