Literature DB >> 29378964

Stimulus generalization as a mechanism for learning to trust.

Oriel FeldmanHall1, Joseph E Dunsmoor2, Alexa Tompary3, Lindsay E Hunter4, Alexander Todorov4, Elizabeth A Phelps3,5,6.   

Abstract

How do humans learn to trust unfamiliar others? Decisions in the absence of direct knowledge rely on our ability to generalize from past experiences and are often shaped by the degree of similarity between prior experience and novel situations. Here, we leverage a stimulus generalization framework to examine how perceptual similarity between known individuals and unfamiliar strangers shapes social learning. In a behavioral study, subjects play an iterative trust game with three partners who exhibit highly trustworthy, somewhat trustworthy, or highly untrustworthy behavior. After learning who can be trusted, subjects select new partners for a second game. Unbeknownst to subjects, each potential new partner was parametrically morphed with one of the three original players. Results reveal that subjects prefer to play with strangers who implicitly resemble the original player they previously learned was trustworthy and avoid playing with strangers resembling the untrustworthy player. These decisions to trust or distrust strangers formed a generalization gradient that converged toward baseline as perceptual similarity to the original player diminished. In a second imaging experiment we replicate these behavioral gradients and leverage multivariate pattern similarity analyses to reveal that a tuning profile of activation patterns in the amygdala selectively captures increasing perceptions of untrustworthiness. We additionally observe that within the caudate adaptive choices to trust rely on neural activation patterns similar to those elicited when learning about unrelated, but perceptually familiar, individuals. Together, these findings suggest an associative learning mechanism efficiently deploys moral information encoded from past experiences to guide future choice.
Copyright © 2018 the Author(s). Published by PNAS.

Entities:  

Keywords:  amygdala; caudate; social learning; stimulus generalization; trust

Mesh:

Year:  2018        PMID: 29378964      PMCID: PMC5816167          DOI: 10.1073/pnas.1715227115

Source DB:  PubMed          Journal:  Proc Natl Acad Sci U S A        ISSN: 0027-8424            Impact factor:   11.205


The ubiquity of social interaction and collaboration throughout human evolution underscores the importance of adaptive social decision making (1). For instance, deciding whether to trust is a daily activity occurring with varying levels of consequence, from telling trivial secrets to loaning significant amounts of money. Choosing to place one’s own well-being into the hands of another typically necessitates first-hand experiences demonstrating the integrity of a partner’s reputation (2–4). However, people are frequently confronted with situations in which they must decide whether to trust a stranger in the absence of any prior experience. In contexts void of reputational information or direct prior knowledge, what governs decisions to trust? Associative learning theory provides useful and straightforward descriptions of how experience shapes learning to guide value-based behaviors (5, 6). One principle of associative learning is that value can spread or transfer between stimuli that perceptually or conceptually resemble one another, known as stimulus generalization (7–9). As stimuli rarely occur in the exact same form from one encounter to the next, similarity-based stimulus generalization mechanisms can be highly adaptive. Given that stimulus generalization is a learning process well-documented across species within the nonsocial domain (10, 11), it is conceivable that a related mechanism operates in highly complex social environments (12), such as deciding when to trust or cooperate with unfamiliar others. To investigate this possibility we designed a task to test whether the transfer of learned value (i.e., stimulus generalization) occurs within the social domain, specifically among moral behaviors exhibited by individuals. In other words, do strangers gain positive and negative social value simply because they resemble another person whose social value is known, and do differences in the strength of this resemblance determine decisions to trust? In our first experiment, we employed a classic trust game, which can be considered a form of associative conditioning, as subjects learn the social value (in this case, trustworthiness) associated with specific individuals over a series of trials. Subjects were endowed with $10 and acted as the investor in an iterative trust game, deciding whether to entrust their money with three different players (conditioning phase, Fig. 1). On each trial, subjects knew that any money invested would be multiplied four times, and the other player could then either share the money back with the subject (reciprocate) or keep the money for himself (defect). Each player was either highly trustworthy (reciprocation reinforced 93%), somewhat trustworthy (neutral: reciprocation reinforced 60%), or not at all trustworthy (reciprocation reinforced 7%). Subjects successfully learned which player could be trusted, as the money entrusted to the trustworthy player ($5.47, SD ± 2.2) was significantly greater than the amount of money sent to either the neutral ($4.42, SD ± 2.2) or untrustworthy ($1.17, SD ± 1.4) players [repeated measures ANOVA: F(2,56) = 77.8, P < 0.001, η2 = 0.72, all pairwise comparisons P < 0.001; Fig. 1].
Fig. 1.

Conditioning and generalization phases. (A) In the conditioning phase subjects played an iterative trust game where they learned about three different partners who were either trustworthy, untrustworthy, or somewhat trustworthy (i.e., neutral). (B) Subjects learned to invest the most money in the trustworthy partner and the least amount of money in the untrustworthy player. Error bars reflect 1 SEM. (C) In a second task—the generalization phase—subjects selected partners to play with in a subsequent trust game. Unbeknownst to the subject, potential partners were morphed with one of the three original players (in increments of 11%). This allowed us to test whether adaptive choice relies on similarity-based stimulus generalization. The example morph gradient shows six individuals who were morphed with the original untrustworthy partner, resulting in a smooth perceptual continuum (see for more details). (D) Perceived similarity to the original player and trust type predicts choosing to play with the morph, where the x axis denotes similarity and the y axis denotes the likelihood of a decision to play (1) or refrain from playing (0) with the partner. A hierarchal regression reveals subjects were incrementally biased in selecting morphs that resembled past individuals associated with trustworthy outcomes and averse to selecting morphs that resembled past individuals associated with untrustworthy outcomes (fitted data are plotted above, but raw data can be found in ). These behavioral tuning profiles were structurally asymmetric, such that subjects were more likely to avoid morphs that even slightly resembled past untrustworthy individuals (tested by comparing slopes of lines and through pairwise comparisons to neutral gradient). ***P < 0.001; ns, not significant.

Conditioning and generalization phases. (A) In the conditioning phase subjects played an iterative trust game where they learned about three different partners who were either trustworthy, untrustworthy, or somewhat trustworthy (i.e., neutral). (B) Subjects learned to invest the most money in the trustworthy partner and the least amount of money in the untrustworthy player. Error bars reflect 1 SEM. (C) In a second task—the generalization phase—subjects selected partners to play with in a subsequent trust game. Unbeknownst to the subject, potential partners were morphed with one of the three original players (in increments of 11%). This allowed us to test whether adaptive choice relies on similarity-based stimulus generalization. The example morph gradient shows six individuals who were morphed with the original untrustworthy partner, resulting in a smooth perceptual continuum (see for more details). (D) Perceived similarity to the original player and trust type predicts choosing to play with the morph, where the x axis denotes similarity and the y axis denotes the likelihood of a decision to play (1) or refrain from playing (0) with the partner. A hierarchal regression reveals subjects were incrementally biased in selecting morphs that resembled past individuals associated with trustworthy outcomes and averse to selecting morphs that resembled past individuals associated with untrustworthy outcomes (fitted data are plotted above, but raw data can be found in ). These behavioral tuning profiles were structurally asymmetric, such that subjects were more likely to avoid morphs that even slightly resembled past untrustworthy individuals (tested by comparing slopes of lines and through pairwise comparisons to neutral gradient). ***P < 0.001; ns, not significant. To test for generalization of learning, in a second task subjects could now select their partners for a future trust game. Each trial presented a picture of a person’s face alongside an image of a silhouette (generalization phase, Fig. 1)—indicating a random new partner (13). Unbeknownst to subjects, these faces were generated by morphing each of the original players from the conditioning phase with new, never-before-seen faces (stimuli were matched on multiple dimensions, including perceived attractiveness and trustworthiness). This resulted in a smooth and linear continuum of morphed stimuli at 11% increments (Fig. 1), which served as the final stimuli for the generalization phase (see for details on morph creation, normalization of stimuli, and final selection; ). Critically, subjects believed the morphs were real people and potential partners for the next trust game, ensuring that the decision to trust was not affected by conscious awareness that the morphs were derivatives of the players from the preceding trust game (e.g., in debriefing subjects did not report being aware that these were morphed faces and believed each face was a unique individual; see for details of extensive piloting and debriefing measures). This distinguishes our paradigm from more classic stimulus generalization designs in which simple sensory stimuli (e.g., tones or lights) vary along an explicit unimodal continuum. This perceptual morph gradient allows us to test whether aversive experiences with one individual (e.g., the untrustworthy partner in the conditioning phase) leads to inferring that related individuals (e.g., the morphs in the generalization phase) are aversive and untrustworthy and thus should be avoided. Since subjects successfully learned which of the three original players could be trusted and which could not, we might expect subjects to be incrementally biased in selecting morphs that more closely resemble past individuals associated with positive outcomes (high rates of reciprocation) and to avoid morphs that more closely resemble past individuals associated with negative outcomes (high rates of defection)—even though morphs were thought to be distinct individuals unrelated to the previous players. Accordingly, we investigated two key questions: (i) Is perceptual similarity of the morphs implicitly used to guide novel decisions to trust unfamiliar others, and (ii) do these putative generalization gradients evoke structurally similar behavioral tuning profiles (e.g., adaptively refraining from or choosing to trust at the same rate)? To answer these questions, we ran a hierarchal logistic regression (14), where both trustworthiness type (whether faces were morphed with the original trustworthy, untrustworthy, or neutral player) and perceptual similarity (increasing similarity to the original players) were entered as predictors of choosing to play with the morph. We found that as perceptual resemblance to the original trustworthy player increased subjects were significantly more likely to choose the morph as a partner for a future trust game (trust type × perceptual similarity: P < 0.001; Fig. 1 and Table 1; raw data in ). The opposite generalization pattern was observed for untrustworthy morphs; the greater the perceptual similarity to the original untrustworthy player, the less likely subjects were to select the morph for a second trust game. Evidence of a similarity heuristic (15, 16) biasing subsequent choice demonstrates that social learning in the appetitive and aversive domains relies—at least in part—on comparing current experiences with past experiences. Critically, there was no effect of the neutral morph continuum on choice: Subjects were just as likely to choose the morph that most closely resembled the original neutral player as they were the morph that least likely resembled the neutral player (P > 0.1).
Table 1.

Exp. 1:

Coefficient (β)Estimate (SE)t valueP value
Intercept0.42 (0.04)9.150.001**
Untrustworthy−0.13 (0.04)−3.36<0.001***
Trustworthy0.09 (0.03)2.430.02*
Perceptual Similarity0.22 (0.16)1.370.17
Untrustworthy × Perceptual Similarity−0.65 (0.16)−3.85<0.001***
Trustworthy × Perceptual Similarity0.40 (0.17)2.360.01*

Hierarchical logistic regression where choice is indexed by subject and trial (0 = morph not selected, 1 = morph selected), trust type (indicator variable: 0 = neutral, such that neutral serves as the reference category, −1 = untrustworthy, 1 = trustworthy), and perceptual similarity (which was mean-centered) is indexed linearly by morph increment. ***P < 0.001, **P < 0.01, *P < 0.05.

Exp. 1: Hierarchical logistic regression where choice is indexed by subject and trial (0 = morph not selected, 1 = morph selected), trust type (indicator variable: 0 = neutral, such that neutral serves as the reference category, −1 = untrustworthy, 1 = trustworthy), and perceptual similarity (which was mean-centered) is indexed linearly by morph increment. ***P < 0.001, **P < 0.01, *P < 0.05. The shape of the behavioral tuning profiles—choosing to trust or distrust the morphs as a function of increasing perceptual similarity to the original players in the conditioning phase—can be taken as an indication of the strength of generalization, since the rate at which responses increase quantitatively characterizes the strength of the generalization of learned associations. For instance, tuning profiles that are wide and flat depict a slowly decaying gradient reflective of broad overgeneralization of learned stimuli. Given that the conditioning literature illustrates asymmetrical learning in the aversive and appetitive domains (17)—which has been likened to a “better safe than sorry” strategy for aversive phenomena (18)—we further posited that there may be similar asymmetries in tuning profiles between trustworthy and untrustworthy morph gradients. In line with this prediction, we observed that the generalization gradient for untrustworthy morphs was wider than that for the trustworthy morphs, despite the original players’ being perfectly inversely matched in their reinforcement rates [the slope of the trustworthy and untrustworthy gradients’ coefficients from the regression (Table 1) were significantly different from one another (t (28) = −6.13, P < 0.001)]. This generalization asymmetry was further confirmed with a repeated measures ANOVA trust type × morph interaction [F(10,280) = 10.76, P < 0.001, η2 = 0.26] (pairwise comparisons for untrustworthy > neutral morph increments were significant until 56% similarity, P < 0.001; pairwise comparisons for trustworthy > neutral morph increments were only significant until 67% similarity, P < 0.001; Fig. 1 and see for raw data). That subjects preferentially avoided the untrustworthy morphs more so than engaging with the trustworthy morphs suggests an asymmetric overgeneralization toward individuals perceived to be morally aversive. Identifying and characterizing the neural circuitry supporting decisions to trust can further elucidate how this generalization mechanism is precisely deployed and instantiated during social learning. One possibility is that adaptively choosing to trust individuals bearing a greater resemblance to the original trustworthy player should elicit blood-oxygen-level-dependent (BOLD) activation in a network typically associated with trust and social reward [e.g., caudate and dorsal medial prefrontal cortex (dmPFC) (2, 3, 19–23)], while the opposite pattern of behavior should reveal activity in regions critical for processing aversive and socially threatening stimuli [e.g., the amygdala and anterior insula (20, 24–26)]. Therefore, in a second experiment, we sought to replicate our behavioral findings while also probing the underlying BOLD activity supporting adaptive decisions to trust unfamiliar others. While in the scanner, subjects (n = 28) followed the same experimental structure described in the first experiment, completing both conditioning and generalization phases. As before, we found that during conditioning subjects learned which players could be trusted and which could not (). Furthermore, the asymmetric behavioral tuning profiles were again observed in the generalization phase, replicating the findings from Exp. 1: As perceptual resemblance to the original player increases, subjects are significantly more likely to choose the morph along the trustworthy gradient and not choose the morph along the untrustworthy gradient (Table 2), such that morphs associated with the original player who broke trust and facilitated aversive outcomes were again more broadly and systematically avoided (see for details).
Table 2.

Exp. 2:

Coefficient (β)Estimate (SE)t valueP value
Intercept0.43 (0.08)5.23<0.001***
Untrustworthy−0.11 (0.03)−3.36<0.001***
Trustworthy0.17 (0.04)4.07<0.001***
Perceptual Similarity0.007 (0.15)0.050.96
Untrustworthy × Perceptual Similarity−0.49 (0.15)−3.18<0.001***
Trustworthy × Perceptual Similarity0.66 (0.14)4.62<0.001***

Hierarchical logistic regression where choice is indexed by subject and trial (0 = morph not selected, 1 = morph selected), trust type (indicator variable: 0 = neutral, −1 = untrustworthy, 1 = trustworthy), and perceptual similarity (which was mean-centered) is indexed linearly by morph increment. ***P < 0.001.

Exp. 2: Hierarchical logistic regression where choice is indexed by subject and trial (0 = morph not selected, 1 = morph selected), trust type (indicator variable: 0 = neutral, −1 = untrustworthy, 1 = trustworthy), and perceptual similarity (which was mean-centered) is indexed linearly by morph increment. ***P < 0.001. To probe BOLD activity indexing the perceptual similarity of trustworthy and untrustworthy morphs gradients to their respective original players we focused on the presentation of the faces during the choice epoch of the generalization phase (fixed 3 s). We hypothesized that subjects’ ability to adaptively refrain from trusting or choose to trust during the generalization phase might rely on discrete BOLD signals that scale with perceptual similarity along the untrustworthy and trustworthy generalization gradient. Using univariate analyses, we applied parametric regressors delineating each perceptual increment along the morph gradient and separately compared activation to trustworthy and untrustworthy morph gradients to morphs along the neutral gradient. This enabled a whole-brain examination of the BOLD signal tracking perceptual similarity of trustworthy and untrustworthy partners. Comparison with the neutral gradient serves as a conservative baseline to control for regions that may also generally scale with perceptual similarity. Results revealed that activity in the amygdala tracked morphs that gradually resembled the original untrustworthy player (parametric untrustworthy gradient > parametric neutral gradient; Fig. 2 and ), while the opposite contrast—increasing similarity toward the original trustworthy player compared with increasing similarity of the neutral player—revealed increasing activation in the dmPFC (), two regions known to be associated with judgments of untrustworthiness and trustworthiness, respectively (20).
Fig. 2.

BOLD activity differentially tracks untrustworthy and trustworthy perceptual similarity gradients. (A) Univariate parametric analysis indexing perceptual similarity of the morphs along the untrustworthy gradient > perceptual similarity of the morphs along the neutral gradient in the generalization phase reveal BOLD signal in the amygdala (x = 34, y = 4, z = −26, z-value = 3.82) scales with increasing untrustworthiness. (B) The same analysis tracking perceptual similarity of the morphs along the trustworthy gradient > perceptual similarity of the morphs along the neutral gradient illustrate BOLD activity in the dmPFC (x = 4, y = 42, z = 56, z-value = 3.24).

BOLD activity differentially tracks untrustworthy and trustworthy perceptual similarity gradients. (A) Univariate parametric analysis indexing perceptual similarity of the morphs along the untrustworthy gradient > perceptual similarity of the morphs along the neutral gradient in the generalization phase reveal BOLD signal in the amygdala (x = 34, y = 4, z = −26, z-value = 3.82) scales with increasing untrustworthiness. (B) The same analysis tracking perceptual similarity of the morphs along the trustworthy gradient > perceptual similarity of the morphs along the neutral gradient illustrate BOLD activity in the dmPFC (x = 4, y = 42, z = 56, z-value = 3.24). Univariate analyses, however, are less well suited for investigating the content of neural representations (27, 28). Accordingly, we used multivariate pattern similarity analysis (PSA) to further characterize how perceptual information and choice are represented in key regions of interest. Probing patterns of BOLD signal across voxels allows us to examine whether social value spreads via an associative learning mechanism at the neural level. In other words, we can test for similarity between the structure of the activation patterns supporting learning about a trustworthy or untrustworthy player in the conditioning phase and the activation patterns elicited at each subsequent morph increment in the generalization phase. If value learned during the initial episode is transferred to subsequent interactions, then morphs that increasingly resemble the original untrustworthy player may evoke activation patterns that are incrementally more similar to the activation patterns that supported learning about the original player’s untrustworthiness. These perceptual neural tuning profiles—the correlation between activation patterns during learning about the untrustworthy player and the activation patterns later elicited at each morph increment—should scale with perceptual similarity along the generalization gradient. Beyond perceptual similarity, there is also the possibility that a discrete generalization mechanism for choice will be reflected at the neural level, which would be consistent with animal lesion work demonstrating an important distinction between the ability to perceptually and behaviorally discriminate along a generalization gradient (29). If this were the case, the observed adaptive behavioral tuning profiles—for example, engaging with morphs that look increasingly more like the original trustworthy player and avoiding morphs that look increasingly more like the original untrustworthy player—should be mirrored at the neural level. This choice model posits that if stimulus generalization is related to the initial learning episode then neural patterns active during learning may also be similarly active when guiding subsequent choice, henceforth referred to as choice neural tuning profiles. In our PSA used to address these two predictions the activation patterns evoked at each morph increment along the generalization gradient were correlated with the activation patterns evoked from the original player in the initial learning phase (Pearson’s; Fig. 3). For each region of interest (ROI), a mixed-effects hierarchical linear regression model was fit with choice, perceptual similarity, and trust type as predictors of the similarity patterns (PS) between each morph increment in the generalization phase and the activation pattern corresponding to that morph’s original player in the conditioning phase. This model captures both the effects of perceptual similarity and adaptive choice in predicting the neural similarity of representational content between each morph and the corresponding original player (see and for analysis details). ROIs were created from thresholded T maps on a conjunction analysis of all trust types presented during the conditioning phase () given our a priori hypothesis about which brain regions would be involved when learning to trust (discussed below).
Fig. 3.

Amygdala tracks the perceptual tuning profiles of untrustworthy individuals. (A) Increasingly similar patterns (derived from PSA) in the left amygdala reveal a neural tuning profile that tracks perceived increases in untrustworthiness. No relationship was found for either the trustworthy or neutral gradients. (B) PSA correlated (Pearson’s r) activation patterns evoked at each morph increment along the generalization gradient to those evoked when initially learning about the original players (separately for each original trustworthy, untrustworthy, and neutral player).

Amygdala tracks the perceptual tuning profiles of untrustworthy individuals. (A) Increasingly similar patterns (derived from PSA) in the left amygdala reveal a neural tuning profile that tracks perceived increases in untrustworthiness. No relationship was found for either the trustworthy or neutral gradients. (B) PSA correlated (Pearson’s r) activation patterns evoked at each morph increment along the generalization gradient to those evoked when initially learning about the original players (separately for each original trustworthy, untrustworthy, and neutral player). Based on prior work (30–34) and the results from our univariate analysis, there are candidate brain regions, including the amygdala, that should be more sensitive to exhibiting an incremental change in pattern similarity along the perceptual untrustworthy gradient. For example, much work has characterized the role of the amygdala during emotional learning (35–37), such as fear generalization (10, 38) and social avoidance (39), which provides a convincing case for exploring whether aversive social phenomena, such as perceiving distrustful individuals, also evoke a similar perceptual neural tuning profile in the amygdala. Results reveal that at the perceptual level the amygdala exhibits a neural tuning profile—increasingly similar patterns—that tracks perceived increases in untrustworthiness (P < 0.001; Fig. 3 and Table 3, further confirmed with an anatomical ROI: ). This relationship between perceptual similarity with the original untrustworthy player and patterns in the amygdala remains robust when accounting for overall univariate BOLD activity (). Simply put, the activation patterns within the amygdala recruited when initially learning about the untrustworthy player were increasingly correlated with the activation patterns recruited as the morphs progressively resembled the original untrustworthy player. This relationship did not extend to either the trustworthy or neutral gradients.
Table 3.

Amygdala:

Coefficient (β)Estimate (SE)t valueP value
Intercept−0.18 (0.04)−4.27<0.001***
Untrustworthy × Perceptual Similarity0.05 (0.01)3.640.003**
Trustworthy × Perceptual Similarity−0.017 (0.01)−0.980.32
Untrustworthy × Choice0.15 (0.08)1.700.09
Trustworthy × Choice0.143 (0.11)1.240.21

ROI from conjunction of face presentation across all trust types during the initial learning episode (conditioning phase; ). ***P < 0.001, **P < 0.01.

Amygdala: ROI from conjunction of face presentation across all trust types during the initial learning episode (conditioning phase; ). ***P < 0.001, **P < 0.01. We further theorized that when adaptively choosing which morph to play with (Fig. 4) a network involved in trust and distrust (26, 40–42), which includes the ventromedial prefrontal cortex (vmPFC) and anterior insula (AI), may index decisions to refrain from playing with morphs that resemble untrustworthy past players. Conversely, given the abundance of evidence documenting the role the caudate plays in encoding reward (43, 44)—especially when deciding whether to trust (2, 3)—we posited that activation patterns within the caudate might selectively scale along the trustworthy gradient.
Fig. 4.

Neural regions supporting adaptive choice tuning profiles. (A) In the imaging experiment, behavioral tuning profiles reveal that subjects incrementally engaged with morphs that look increasingly more like the original trustworthy player and incrementally avoided morphs that look increasingly more like the original untrustworthy player. There was no effect of the neutral gradient (P > 0.1). Plotted raw data can be found in . Morph gradient is shown with six individuals who were morphed with the trustworthy partner. (B) To probe whether adaptive choices relied on similar patterns of activation to the original learning episode we correlated patterns of activity when learning about the trustworthy and untrustworthy players in the conditioning phase with decisions to adaptively engage in, or refrain from, playing with trustworthy or untrustworthy morphs. (C) Patterns of activation (derived from PSA) in the caudate support choosing morphs that look like the original trustworthy player. This relationship was only observed in the trustworthy condition. We further observed that patterns of activation in the vmPFC selectively support adaptively refraining from choosing morphs that look like the original untrustworthy player. ***P < 0.001, **P < 0.01, *P < 0.05.

Neural regions supporting adaptive choice tuning profiles. (A) In the imaging experiment, behavioral tuning profiles reveal that subjects incrementally engaged with morphs that look increasingly more like the original trustworthy player and incrementally avoided morphs that look increasingly more like the original untrustworthy player. There was no effect of the neutral gradient (P > 0.1). Plotted raw data can be found in . Morph gradient is shown with six individuals who were morphed with the trustworthy partner. (B) To probe whether adaptive choices relied on similar patterns of activation to the original learning episode we correlated patterns of activity when learning about the trustworthy and untrustworthy players in the conditioning phase with decisions to adaptively engage in, or refrain from, playing with trustworthy or untrustworthy morphs. (C) Patterns of activation (derived from PSA) in the caudate support choosing morphs that look like the original trustworthy player. This relationship was only observed in the trustworthy condition. We further observed that patterns of activation in the vmPFC selectively support adaptively refraining from choosing morphs that look like the original untrustworthy player. ***P < 0.001, **P < 0.01, *P < 0.05. Consistent with the notion that there are distinct perceptual and behavioral generalization gradients reflected at the neural level, we found that refraining from engaging with the untrustworthy morph (a putatively adaptive choice) evoked a neural tuning profile in the vmPFC (even when controlling for perceptual similarity, Fig. 4 and Table 4; see for AI data). These choice neural tuning profiles in the vmPFC were only observed for the untrustworthy gradient (results replicate when choice is the dependent variable predicted by the interaction between perceptual similarity and neural pattern similarity, P = 0.01). In contrast, when selecting morphs along the trustworthy gradient the caudate selectively exhibited increasingly similar neural patterns that mirrored the observed incremental increases in trusting behavior (Fig. 4 and Table 5; results replicate when choice is the dependent variable predicted by the interaction between perceptual similarity and neural pattern similarity, P = 0.04). Further interrogating each subject’s data at the trial-by-trial level for the morphs that have the greatest perceptual ambiguity (45–56% morph increments, which corresponds to identical visual stimuli across all conditions) provides converging evidence for choices predicting pattern similarity when holding perceptual similarity constant. This highly conservative analysis revealed that deciding to play with the morph predicted increasing pattern similarity in the caudate in the trustworthy condition (; the vmPFC exhibited a similar pattern but failed to reach significance within the untrustworthy condition, : see ).
Table 4.

vmPFC:

Coefficient (β)Estimate (SE)t valueP value
Intercept0.01 (0.02)0.770.44
Untrustworthy × Perceptual Similarity0.007 (0.004)1.310.19
Trustworthy × Perceptual Similarity0.007 (0.01)0.650.51
Untrustworthy × Choice−0.101 (0.04)−2.780.005**
Trustworthy × Choice0.01 (0.06)0.210.84

ROI from conjunction of face presentation across all trust types during the initial learning episode (conditioning phase; ). **P < 0.01.

Table 5.

Caudate:

Coefficient (β)Estimate (SE)t valueP value
Intercept−0.06 (0.02)−2.350.019*
Untrustworthy × Perceptual Similarity0.01 (0.01)1.410.15
Trustworthy × Perceptual Similarity−0.014 (0.02)−1.100.28
Untrustworthy × Choice0.046 (0.06)0.710.47
Trustworthy × Choice0.19 (0.08)2.480.01**

ROI from conjunction of face presentation across all trust types during the initial learning episode (conditioning phase; ). **P < 0.01, *P < 0.05.

vmPFC: ROI from conjunction of face presentation across all trust types during the initial learning episode (conditioning phase; ). **P < 0.01. Caudate: ROI from conjunction of face presentation across all trust types during the initial learning episode (conditioning phase; ). **P < 0.01, *P < 0.05.

Discussion

Trust is a basic component of human social life (45). However, little is understood about the cognitive and neural mechanisms supporting learning to trust in the absence of explicit reputational information. Here we demonstrate that a mechanism related to generalizing associative value—a process documented across species—is also deployed in humans in highly complex social decision-making environments. We find that strangers bearing greater resemblance to past individuals previously known to be trustworthy are trusted more and those who resemble individuals previously known to be untrustworthy are trusted less. These behavioral tuning profiles are asymmetrically deployed, whereby individuals are distrusted more when even minimally resembling someone previously associated with untrustworthy and aversive outcomes. Wider generalization in the aversive domain accords with the idea that incorrectly identifying a dangerous stimulus as safe is more costly than treating a safe stimulus as a threat (46). These behavioral tuning profiles were mirrored at the neural level. Within the perceptual domain, the amygdala’s functional role in tracking untrustworthiness was supported by both increasing univariate BOLD activity and multivariate activation pattern similarity, such that patterns of neural representation were elicited in a graded fashion along the untrustworthy gradient. These findings extend previous work linking the amygdala to threat processing and judgments of trustworthiness (32–34), revealing that not only does its hemodynamic activity reflect involvement in extracting information about an individual’s untrustworthiness (20), but it also functionally encodes information about untrustworthiness on a representational level. This higher-level functional analysis permits a fine-grained approach for inferring mental states, demonstrating that the amygdala represents critical information about potentially threatening individuals. When perceiving a stranger who looks similar to a past untrustworthy individual the amygdala evokes a pattern of BOLD representations similar to the representations that support initial learning. Evidence of a neural tuning profile tracking perceptual similarity in a graded fashion (15) implies that the amygdala selectively encodes the transfer of negative social value between individuals perceptually resembling one another. We further observed that neural tuning profiles in the caudate and vmPFC track the behavioral patterns to choose partners who might procure positive outcomes and avoid partners who might yield negative outcomes, respectively. These findings indicate that in the absence of direct and explicit information about an individual’s reputation, adaptive decisions to trust or withhold trust rely on activation patterns similar to those elicited when learning about other unrelated, but perceptually familiar, individuals. These choice neural tuning profiles capture behavior above and beyond mere tracking of perceptual similarity, revealing that at the neural level an associative learning mechanism efficiently deploys moral information encoded from past experiences to guide future choice. Together these findings suggest that when deciding whom to trust humans rely on an efficient, albeit rudimentary, learning heuristic that facilitates adaptive engagement. A similarity-based generalization mechanism can be highly adaptive because it enables many stimuli—in this case, unfamiliar individuals—to acquire value from minimal learning. Even without any direct experience of untrustworthiness individuals implicitly deemed as potentially untrustworthy are systematically avoided. Future work that probes whether initial learning rates bias the efficacy of generalization would be an important next step for understanding whether specific contexts facilitate rapid learning. Importantly, our task is a departure from canonical stimulus generalization tasks in which novel stimuli are often perceived to explicitly overlap with the initial stimulus. Subjects in our experiments believed they were selecting real partners for the next game and therefore treated each potential partner as unique. This indicates that even in the absence of conscious awareness social learning relies on neural processes that make comparisons between current and past experiences to bias decisions about who can be trusted. Ultimately, the finding that complex, dyadic social choices seem to be buoyed by behavioral and neural mechanisms that operate across domains and species suggests that a domain-general system governs many types of emotional learning.

Materials and Methods

Across all experiments 91 subjects were recruited and brought into the laboratory to partake in either a behavioral or imaging task. Subject size of each experiment was based on extant research (13). All subjects were paid $15/h for the behavioral study or $25/h for the imaging study and could make up to an additional $20 based on their decisions during the task. Subjects provided written consent and all experiments were approved by the New York University Committee on Activities Involving Human Subjects. Experimental procedures—which included an iterative trust game with three trustees and a task where subjects could select their own partners for a second trust game—were similar across experiments, with minor exceptions (). Individuals presented for the second trust game were morphs of the original trustees, set at 11% increments between the original trustee and a new, neutrally rated face [for a total of eight new morphs, although the morphs closest to the original player (89% increment) and novel individual (12% increment) were not included in the final gradient], which created a linear continuum of increasing perceptual similarity along six morph increments (Fig. 1 and ). For the imaging experiment, subjects also completed a face localizer task and anatomical scan. Multivariate PSA was computed in each participant’s native space separately for each ROI. Specifically, we assessed the neural similarity between the trustworthy, untrustworthy, and neutral players in the conditioning phase to their respective morphed faces in the generalization phase (see for details on how pattern similarity was assessed). This allowed us to probe the representational structure of the activation patterns elicited at each morph increment along the trustworthy, untrustworthy, and neutral gradients, testing whether morphs bearing greater perceptual similarity to the original players would elicit activation patterns that were increasingly similar to those observed during initial learning. Thus, the neural representation of each original player and each morph increment was operationalized as a vector of t statistics corresponding to the voxelwise responses in a given ROI. Neural similarity scores for each morph were calculated as the Pearson correlations between that morph’s vector and the vector corresponding to the original player during the conditioning phase. Each ROI-specific PS mixed effects linear regression had the same structure and parameters: where PS is a vector of the correlations (Fisher-transformed values) of the neural pattern similarity between each of the six morph increments and the corresponding original player, for the three trust types, per subject. Choice is indexed by the overall performance at each morph increment (whereby each subject has a composite score of choices across the same trial type, lying between 0 and 1 for each morph increment: 1 indicates choosing the morph and 0 indicates not choosing the morph) and trust type is an indicator variable where 0 = neutral, −1 = untrustworthy, and 1 = trustworthy. This theory driven model captures both the effects of perceptual similarity and adaptive choice in predicting the neural similarity of representational content between each morph and the corresponding original player (ref. 47, p. 776). For further details see .
  43 in total

1.  Automatic and intentional brain responses during evaluation of trustworthiness of faces.

Authors:  J S Winston; B A Strange; J O'Doherty; R J Dolan
Journal:  Nat Neurosci       Date:  2002-03       Impact factor: 24.884

2.  Response of dorsomedial prefrontal cortex predicts altruistic behavior.

Authors:  Adam Waytz; Jamil Zaki; Jason P Mitchell
Journal:  J Neurosci       Date:  2012-05-30       Impact factor: 6.167

3.  Getting to know you: reputation and trust in a two-person economic exchange.

Authors:  Brooks King-Casas; Damon Tomlin; Cedric Anen; Colin F Camerer; Steven R Quartz; P Read Montague
Journal:  Science       Date:  2005-04-01       Impact factor: 47.728

4.  Conscious and unconscious emotional learning in the human amygdala.

Authors:  J S Morris; A Ohman; R J Dolan
Journal:  Nature       Date:  1998-06-04       Impact factor: 49.962

Review 5.  Anxiety: an evolutionary approach.

Authors:  Melissa Bateson; Ben Brilot; Daniel Nettle
Journal:  Can J Psychiatry       Date:  2011-12       Impact factor: 4.356

6.  Seeing is believing: trustworthiness as a dynamic belief.

Authors:  Luke J Chang; Bradley B Doll; Mascha van 't Wout; Michael J Frank; Alan G Sanfey
Journal:  Cogn Psychol       Date:  2010-09       Impact factor: 3.468

Review 7.  Fear Generalization and Anxiety: Behavioral and Neural Mechanisms.

Authors:  Joseph E Dunsmoor; Rony Paz
Journal:  Biol Psychiatry       Date:  2015-04-20       Impact factor: 13.382

8.  Perceptions of moral character modulate the neural systems of reward during the trust game.

Authors:  M R Delgado; R H Frank; E A Phelps
Journal:  Nat Neurosci       Date:  2005-10-16       Impact factor: 24.884

9.  The tendency to trust is reflected in human brain structure.

Authors:  Brian W Haas; Alexandra Ishak; Ian W Anderson; Megan M Filkowski
Journal:  Neuroimage       Date:  2014-12-05       Impact factor: 6.556

10.  Impaired recognition of social emotions following amygdala damage.

Authors:  Ralph Adolphs; Simon Baron-Cohen; Daniel Tranel
Journal:  J Cogn Neurosci       Date:  2002-11-15       Impact factor: 3.225

View more
  16 in total

1.  A learning model can explain both shared and idiosyncratic first impressions from faces.

Authors:  Richard Cook; Harriet Over
Journal:  Proc Natl Acad Sci U S A       Date:  2020-07-14       Impact factor: 11.205

2.  Generalization of conditioned fear along a dimension of increasing positive valence.

Authors:  Mason McClay; Augustin C Hennings; Alex Reidel; Joseph E Dunsmoor
Journal:  Neuropsychologia       Date:  2020-10-10       Impact factor: 3.139

Review 3.  The application of computational models to social neuroscience: promises and pitfalls.

Authors:  Caroline J Charpentier; John P O'Doherty
Journal:  Soc Neurosci       Date:  2018-09-12       Impact factor: 2.083

Review 4.  Decision neuroscience and neuroeconomics: Recent progress and ongoing challenges.

Authors:  Jeffrey B Dennison; Daniel Sazhin; David V Smith
Journal:  Wiley Interdiscip Rev Cogn Sci       Date:  2022-02-08

Review 5.  The computational challenge of social learning.

Authors:  Oriel FeldmanHall; Matthew R Nassar
Journal:  Trends Cogn Sci       Date:  2021-09-25       Impact factor: 20.229

6.  Individual differences in trust evaluations are shaped mostly by environments, not genes.

Authors:  Clare A M Sutherland; Nichola S Burton; Jeremy B Wilmer; Gabriëlla A M Blokland; Laura Germine; Romina Palermo; Jemma R Collova; Gillian Rhodes
Journal:  Proc Natl Acad Sci U S A       Date:  2020-04-27       Impact factor: 11.205

7.  Anxious behaviour in a demonstrator affects observational learning.

Authors:  Ida Selbing; Andreas Olsson
Journal:  Sci Rep       Date:  2019-06-24       Impact factor: 4.379

8.  Effects of Male Defendants' Attractiveness and Trustworthiness on Simulated Judicial Decisions in Two Different Swindles.

Authors:  Qun Yang; Bing Zhu; Qian Zhang; Yuchao Wang; Ruiheng Hu; Shengmin Liu; Delin Sun
Journal:  Front Psychol       Date:  2019-09-26

9.  Young children learn first impressions of faces through social referencing.

Authors:  Adam Eggleston; Elena Geangu; Steven P Tipper; Richard Cook; Harriet Over
Journal:  Sci Rep       Date:  2021-07-20       Impact factor: 4.379

10.  Pervasive influence of idiosyncratic associative biases during facial emotion recognition.

Authors:  Marwa El Zein; Valentin Wyart; Julie Grèzes
Journal:  Sci Rep       Date:  2018-06-11       Impact factor: 4.379

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.