Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

UC Irvine expert on metacognition: Megan Peters

How do our brains take in complex information from the world around us to help us make decisions? And what happens when there’s a mismatch between how well your brain thinks it’s performing this function and how well it’s actually doing? UC Irvine cognitive scientist Megan Peters takes a deep dive into metacognition - our ability to monitor our own cognitive processing. To reach Prof. Peters, contact Heather Ashbach at hashbach@uci.edu or 949-284-1577. “Our brains are fantastically powerful information processing systems. They take in information from the world around us through our eyes, ears, and other senses, and they process or transform that sensory information into rich internal representations — representations that we can then use to make useful decisions, to navigate effectively without running into things, and ultimately, to stay alive. And interestingly, our brains also can tell us when they’re doing a good job with all this processing, through a process called metacognition, or our ability to monitor our own cognitive processing. My name is Megan Peters, and I’m an associate professor in the department of Cognitive Sciences at UC Irvine. I’m also a Fellow in the Canadian Institute for Advanced Research Brain, Mind, & Consciousness program and I am president and chair of the board at Neuromatch. My research seeks to understand metacognition — how it works in the brain, and how it works at a computational or algorithm level — and it also seeks to understand what this metacognitive processing might have to do with the conscious experiences we have of our environments, of each other, and of ourselves. So in our research group, we use a combination of behavioral experiments with humans, brain imaging (like MRI scans), and computational approaches like mathematical modeling and machine learning or Artificial Intelligence, to try to unravel these mysteries. I think my favorite overall line of research right now has to do with cases where our brains’ self-monitoring sometimes seems to go wrong. So what I mean is, sometimes your brain “metacognitively” computes how well it thinks you’re doing at this “sensory information processing” task, but this ends up being completely different from how well you’re actually doing. Imagine it this way: you’re driving down a foggy road, at night in the dark. You probably can’t see very well, and you’d hope that your brain would also be able to tell you, “I can’t see super well right now, I should probably slow down.” And most of the time, your brain does this self-monitoring correctly, and you do slow down. But sometimes, under some kinds of conditions or visual information, your brain miscalculates, and it erroneously tells you, “Actually you can see just fine right now!” So this is a sort of “metacognitive illusion”: your brain is telling you “you’re doing great, you can see very clearly!” when in reality, the quality of the information that it’s receiving, and the processing it’s doing, is really poor, really bad — in essence, that means that you can feel totally confident in your abilities to accurately process the world around you, when in fact you’re interpreting the world totally incorrectly. Now normally, in everyday life, this doesn’t happen of course. But we can create conditions in the lab where this happens very robustly, which helps us understand when and how it might happen in the real world, too, and what the consequences might be. So this is fascinating both because it is a powerful tool for studying how your brain constructs that metacognitive feeling of confidence, and also because — in theory — it means that your subjective, conscious feeling of confidence might be doing something really different than just automatically or directly reading out how reliably you brain is processing information. And that could eventually provide a better way to investigate how our so-called phenomenological or conscious experiences can arise from activity patterns in your brain at all.” To reach Prof. Peters, contact Heather Ashbach at hashbach@uci.edu or 949-284-1577.

3 min. read

What You Need To Know About Cybersecurity From the Director of the Rensselaer Future of Computing Institute

Cyber threats have become one of the leading issues for corporations, governments, and public institutions across America. With ransomware attacks, hackers, and other nefarious threats, the issue is becoming a daily occurrence and leading news story. Rensselaer Polytechnic Institute’s James Hendler, director of the Future of Computing Institute, Tetherless World Professor of Computer, Web, and Cognitive Sciences, and director of the RPI-IBM Artificial Intelligence Research Collaboration, weighs in on what we should all know about cybersecurity. Overview Think about cybersecurity the way you think about home security – the more valuables you have, the more security you need. A normal user needs the equivalent of a lock on the door, which most of our computers provide out of the box. However, a user with a fair amount of personal information, who keeps financial records or runs a small business, probably wants a firewall or other additional protection. We used to tell people to protect their computers with firewalls, malware detectors, and the like, but now it is much more important to protect your web access, be wary of external sites, and keep your passwords secure and not easily guessed. Use of a password manager program can be really helpful for people who use a lot of different accounts. Threats The biggest threat facing individuals is identity theft caused by someone getting into an account that you don’t control. Most malware or password stealing comes via a phishing attack (a fake email that convinces you to click a bad link), so if you see an offer that looks too good to be true, don’t believe it. Never give out a password or personal information without confirming that it is legitimate. We also recommend not using major accounts (like Google, Facebook, etc.) to log in to new apps where you aren’t completely sure of the reliability – you’re safer if you use a separate password. It’s also worth noting that these kinds of attacks are now happening on cell phones – if you get a text saying your Amazon, Netflix, or other services have been shut off, be very careful. These companies almost never send out such messages, and if they do, they come via email, not text. For businesses, ransomware is becoming an increasing challenge. Frequent backups and dual authentication are absolute musts for small businesses. Large businesses, and especially those with cyber-physical connections such as a manufacturing device, must have someone on the team who understands internet technology. Outside audits done annually, at least, are also highly recommended. The biggest danger in cybersecurity is that people, especially in businesses, think that the software industry will fix things and that they don’t have to worry. That’s like expecting auto manufacturers to stop car theft, or the government to prevent all crime – these organizations certainly need to help, but they cannot be perfect. So while there definitely needs to be a role for manufacturers and government, people need to understand that the threats are now coming from social interactions such as phishing, or serious criminal enterprises such as ransomware attackers, and not just maladjusted teenagers. They must be ready to pay for some security if they have things on their network that need protection. The Cloud Cloud-based services are a major boon to cybersecurity for individuals and small businesses if, and only if, people protect their access. If a breach is reported to you by a company, don’t ignore it, change your password, and, whenever possible, use dual authentication. The cloud companies can afford to spend more on security than you can and thus your information stored in these services tends to be quite secure. However, people need to be careful in using the cloud. Just as you may trust a bank with your money, you want to be sure not to be robbed on your way there. Future Computing Systems and Cybersecurity New technologies, such as artificial intelligence (AI), are arising all the time in today’s fast-moving cyber world. As these technologies arise, they can create new opportunities for cybersecurity, but can also create new challenges. Cybercrime will never disappear, and each new capability comes with a price. Increased education and awareness of emerging computing technologies (blockchain, quantum, etc.) are important not just for the expert, but also for the general public. It is important to stay informed and pay attention to what is being reported. Just as buying a new appliance can be a great advantage at home (I love my new air-fryer), you also have to be sure to be using it appropriately (used wrong, it can cause fires). Looking to learn more or connect with an expert for your questions and coverage? James Hendler is the director of the Rensselaer Future of Computing Institute, Tetherless World Professor of Computer, Web, and Cognitive Sciences, and director of the RPI-IBM Artificial Intelligence Research Collaboration. Hendler has authored over 400 books, technical papers, and articles in the areas of Semantic Web, artificial intelligence, cybersecurity, and high-performance processing. Hendler is available to speak with media - simply click on his icon now to arrange an interview today.

James Hendler
4 min. read

Artificial Intelligence Playing a Powerful Role in Understanding and Fighting COVID-19

Artificial intelligence is emerging as a powerful new ally in tracking COVID-19, modeling the virus at the molecular level, and analyzing the myriad research results being published daily.  James Hendler, the Tetherless World Professor of Computer, Web, and Cognitive Sciences at Rensselaer, and director of the Rensselaer Institute of Data Exploration and Applications, is leading campus efforts to marshal AI resources for the purpose of battling the virus. “The bottom line is that, at heart, dealing with COVID-19 is a ‘big data’ problem, and AI is a crucial tool in the big data toolkit,” Hendler said. For example, IDEA and the Rensselaer Libraries have collaborated to maintain lists of COVID-19-related data sources and scholarly research publications. AI is being used to translate literally thousands of scientific insights from text-based research products into forms that can more easily be analyzed. Hendler and other Rensselaer AI experts are also involved in studying the spread of the virus under different policy measures at the local, then state and national, and ultimately global scale. Additionally, Rensselaer is part of the national COVID-19 High Performance Computing Consortium, which is offering researchers access to supercomputers for COVID-19 research. In addition to AiMOS, the most powerful supercomputer housed at a private university, Rensselaer is offering access to the expertise of world-class faculty, including in artificial intelligence. Hendler said AiMOS is one of the few facilities that can truly offer a platform optimized for artificial intelligence computing. “AI has helped us achieve an excellent understanding of the coronavirus and its interactions at the molecular level. That’s going to make it possible not only to model the virus, but also how it will interact with potential drug targets and vaccines,” said Hendler. “A platform like AiMOS is invaluable for molecular modeling in drug discovery, helping scientists cope with a huge and rapidly changing literature, and exploring means to model, and then mitigate, the spread of the disease. These are the kinds of things that modern AI can do.” Hendler has authored over 400 books, technical papers and articles in the areas of Semantic Web, artificial intelligence, agent-based computing and high performance processing. One of the originators of the “Semantic Web,” Hendler is the former Chief Scientist of the Information Systems Office at the U.S. Defense Advanced Research Projects Agency (DARPA) and was awarded a US Air Force Exceptional Civilian Service Medal. Among other organizations, he is a member of the National Academies Board on Research Data and Information, a fellow of the National Academy of Public Administration, and he serves as chair of the Association for Computing Machinery (ACM) U.S. technology policy committee.

James Hendler
2 min. read