Abstract
Abstract
Proxy failure in academia has progressed much ahead of what John et al. describe. We see advanced phenomena such as proxy complimentarity in which different players push each others' proxy failures; proxy exploitation in which external agents exploit players' proxies and predatory proxies that devour the goal itself. Academics need to avoid proxy failures by designing behaviorally sound systems.
Publisher
Cambridge University Press (CUP)