177 resultados para social information processing, aggression, victimization, violence
em Queensland University of Technology - ePrints Archive
Resumo:
Gray‘s (2000) revised Reinforcement Sensitivity Theory (r-RST) was used to investigate personality effects on information processing biases to gain-framed and loss-framed anti-speeding messages and the persuasiveness of these messages. The r-RST postulates that behaviour is regulated by two major motivational systems: reward system or punishment system. It was hypothesised that both message processing and persuasiveness would be dependent upon an individual‘s sensitivity to reward or punishment. Student drivers (N = 133) were randomly assigned to view one of four anti-speeding messages or no message (control group). Individual processing differences were then measured using a lexical decision task, prior to participants completing a personality and persuasion questionnaire. Results indicated that participants who were more sensitive to reward showed a marginally significant (p = .050) tendency to report higher intentions to comply with the social gain-framed message and demonstrate a cognitive processing bias towards this message, than those with lower reward sensitivity.
Resumo:
Organizations make increasingly use of social media in order to compete for customer awareness and improve the quality of their goods and services. Multiple techniques of social media analysis are already in use. Nevertheless, theoretical underpinnings and a sound research agenda are still unavailable in this field at the present time. In order to contribute to setting up such an agenda, we introduce digital social signal processing (DSSP) as a new research stream in IS that requires multi-facetted investigations. Our DSSP concept is founded upon a set of four sequential activities: sensing digital social signals that are emitted by individuals on social media; decoding online data of social media in order to reconstruct digital social signals; matching the signals with consumers’ life events; and configuring individualized goods and service offerings tailored to the individual needs of customers. We further contribute to tying loose ends of different research areas together, in order to frame DSSP as a field for further investigation. We conclude with developing a research agenda.
Resumo:
Background When observers are asked to identify two targets in rapid sequence, they often suffer profound performance deficits for the second target, even when the spatial location of the targets is known. This attentional blink (AB) is usually attributed to the time required to process a previous target, implying that a link should exist between individual differences in information processing speed and the AB. Methodology/Principal Findings The present work investigated this question by examining the relationship between a rapid automatized naming task typically used to assess information-processing speed and the magnitude of the AB. The results indicated that faster processing actually resulted in a greater AB, but only when targets were presented amongst high similarity distractors. When target-distractor similarity was minimal, processing speed was unrelated to the AB. Conclusions/Significance Our findings indicate that information-processing speed is unrelated to target processing efficiency per se, but rather to individual differences in observers' ability to suppress distractors. This is consistent with evidence that individuals who are able to avoid distraction are more efficient at deploying temporal attention, but argues against a direct link between general processing speed and efficient information selection.
Resumo:
utomatic pain monitoring has the potential to greatly improve patient diagnosis and outcomes by providing a continuous objective measure. One of the most promising methods is to do this via automatically detecting facial expressions. However, current approaches have failed due to their inability to: 1) integrate the rigid and non-rigid head motion into a single feature representation, and 2) incorporate the salient temporal patterns into the classification stage. In this paper, we tackle the first problem by developing a “histogram of facial action units” representation using Active Appearance Model (AAM) face features, and then utilize a Hidden Conditional Random Field (HCRF) to overcome the second issue. We show that both of these methods improve the performance on the task of pain detection in sequence level compared to current state-of-the-art-methods on the UNBC-McMaster Shoulder Pain Archive.
Resumo:
Loneliness is a distressing, complex, universal phenomena. This review focuses on loneliness in children and adolescents, specifically examining research on the relationship between young people’s social anxiety and loneliness and the role of bullying victimization and loneliness. The three concepts are distinct, yet inextricably intertwined as antecedents and consequences of each other. The constructs are bi-directional, often forming a feedback loop or negative cycle. Implications for interventions are addressed.
Resumo:
Purpose: This study investigated the impact of simulated hyperopic anisometropia and sustained near work on performance of academic-related measures in children. Methods: Participants included 16 children (mean age: 11.1 ± 0.8 years) with minimal refractive error. Academic-related outcome measures included a reading test (Neale Analysis of Reading Ability), visual information processing tests (Coding and Symbol Search subtests from the Wechsler Intelligence Scale for Children) and a reading-related eye movement test (Developmental Eye Movement test). Performance was assessed with and without 0.75 D of imposed monocular hyperopic defocus (administered in a randomised order), before and after 20 minutes of sustained near work. Unilateral hyperopic defocus was systematically assigned to either the dominant or non-dominant sighting eye to evaluate the impact of ocular dominance on any performance decrements. Results: Simulated hyperopic anisometropia and sustained near work both independently reduced performance on all of the outcome measures (p<0.001). A significant interaction was also observed between simulated anisometropia and near work (p<0.05), with the greatest decrement in performance observed during simulated anisometropia in combination with sustained near work. Laterality of the refractive error simulation (ocular dominance) did not significantly influence the outcome measures (p>0.05). A reduction of up to 12% in performance was observed across the range of academic-related measures following sustained near work undertaken during the anisometropic simulation. Conclusion: Simulated hyperopic anisometropia significantly impaired academic–related performance, particularly in combination with sustained near work. The impact of uncorrected habitual anisometropia on academic-related performance in children requires further investigation.
Resumo:
Loneliness is a distressing, complex, universal phenomena. This chapter focuses on loneliness in children and adolescents, specifically examining research on the relationship between young people’s social anxiety and loneliness and the role of bullying victimisation and loneliness. It answers the question does social anxiety and bullying victimization create loneliness in young people. It was found from a review of the literature that all three concepts are distinct yet inextricably intertwined as antecedents and consequences of each other. The constructs are bi-directional, often forming a feedback loop or negative cycle. In addition these variables can also be mediating and moderating variables. Implications for interventions are discussed.
Resumo:
The Rapid Visual Information Processing (RVIP) task, a serial discrimination task where task performance believed to reflect sustained attention capabilities, is widely used in behavioural research and increasingly in neuroimaging studies. To date, functional neuroimaging research into the RVIP has been undertaken using block analyses, reflecting the sustained processing involved in the task, but not necessarily the transient processes associated with individual trial performance. Furthermore, this research has been limited to young cohorts. This study assessed the behavioural and functional magnetic resonance imaging (fMRI) outcomes of the RVIP task using both block and event-related analyses in a healthy middle aged cohort (mean age = 53.56 years, n = 16). The results show that the version of the RVIP used here is sensitive to changes in attentional demand processes with participants achieving a 43% accuracy hit rate in the experimental task compared with 96% accuracy in the control task. As shown by previous research, the block analysis revealed an increase in activation in a network of frontal, parietal, occipital and cerebellar regions. The event related analysis showed a similar network of activation, seemingly omitting regions involved in the processing of the task (as shown in the block analysis), such as occipital areas and the thalamus, providing an indication of a network of regions involved in correct trial performance. Frontal (superior and inferior frontal gryi), parietal (precuenus, inferior parietal lobe) and cerebellar regions were shown to be active in both the block and event-related analyses, suggesting their importance in sustained attention/vigilance. These networks and the differences between them are discussed in detail, as well as implications for future research in middle aged cohorts.
Resumo:
This research studied the prevalence and impact of workplace cyberbullying as perceived by public servants working in government organisations across Australia. Using Social Information Processing theory, this research found employees reported task- and person-related cyberbullying that was associated with increased workplace stress, diminished job satisfaction and performance, and reduced confidence in their organisations' anti-bullying intervention and protection strategies. Furthermore, workplace cyberbullying can create a concealed, online work culture that undermines employee and organisational productivity. These results are significant for employers' duty-of-care obligations, and represent a cogent argument for improved workplace cultures in support to Australia's future organisational and economic performance.
Resumo:
We examine the impact of individual-specific information processing strategies (IPSs) on the inclusion/exclusion of attributes on the parameter estimates and behavioural outputs of models of discrete choice. Current practice assumes that individuals employ a homogenous IPS with regards to how they process attributes of stated choice (SC) experiments. We show how information collected exogenous of the SC experiment on whether respondents either ignored or considered each attribute may be used in the estimation process, and how such information provides outputs that are IPS segment specific. We contend that accounting the inclusion/exclusion of attributes will result in behaviourally richer population parameter estimates.
Resumo:
Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how to protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting users’ personal information. The research has also posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.
Resumo:
Many contend that the logical solution to woman abuse in marriage/cohabitation is for women to exit through legal separation, divorce, or other means. However, a growing body of empirical work shows that separation or divorce does not necessarily solve the problem of woman abuse. For example, in addition to experiencing lethal or nonlethal forms of physical violence and psychological abuse, many women who try to leave, or who have left their male partners, are sexually assaulted. The main objective of this paper is to critically review the extant empirical and theoretical work on separation/divorcesexual assault. Suggestions for future research and theorizing are also provided.
Resumo:
Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting user’s personal information. The research has posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.