51 resultados para Communication Sciences and Disorders
Resumo:
Objectives. While older adults often display memory deficits, with practice they can sometimes selectively remember valuable information at the expense of less value information. We examined age-related differences and similarities in memory for health-related information under conditions where some information was critical to remember. Method. In Experiment 1, participants studied three lists of allergens, ranging in severity from 0 (not a health risk) to 10 (potentially fatal), with the instruction that it was particularly important to remember items to which a fictional relative was most severely allergic. After each list, participants received feedback regarding their recall of the high-value allergens. Experiment 2 examined memory for health benefits, presenting foods that were potentially beneficial to the relative’s immune system. Results. While younger adults exhibited better overall memory for the allergens, both age groups in Experiment 1 developed improved selectivity across the lists, with no evident age differences in severe allergen recall by List 2. Selectivity also developed in Experiment 2, although age differences for items of high health benefit were present. Discussion. The results have implications for models of selective memory in older age, and for how aging influences the ability to strategically remember important information within health-related contexts.
Resumo:
Internationally in secondary schools, lessons are typically taught by subject specialists, raising the question of how to accommodate teaching which bridges the sciences and humanities. This is the first study to look at how students make sense of the teaching they receive in two subjects (science and religious education) when one subject’s curriculum explicitly refers to cross-disciplinary study and the other does not. Interviews with 61 students in seven schools in England suggested that students perceive a permeable boundary between science and their learning in science lessons and also a permeable boundary between religion and their learning in RE lessons, yet perceive a firm boundary between science lessons and RE lessons. We concluded that it is unreasonable to expect students to transfer instruction about cross-disciplinary perspectives across such impermeable subject boundaries. Finally we consider the implications of these findings for the successful management of cross-disciplinary education.
Resumo:
From consideration of children's rights in general and equal opportunities for disabled children in particular, it is important to consult children about barriers and supports to learning and participation. Finding appropriate and feasible ways, however, to incorporate this into educational programmes for younger children can present challenges. Here we report on what happened when teachers from reception classes in England for children aged 4–5 years implemented activities designed to access pupils' views about what helps or hinders at school. Teachers evaluated the feasibility and usefulness of the activities and, together with a small sample of children's responses, this showed that young children could indeed identify aspects of school life they like or dislike, laying the foundations for identifying barriers and supports to learning. Teachers' responses highlighted the importance of careful choice of activity to meet the needs of young children, particularly those with communication difficulties and/or low self-confidence, with staff in some cases adapting and merging activities to suit pupils' needs. Sensitive issues emerged concerning the introduction of consultation activities early in children's school careers. The implications of a compliant rather than collaborative approach by teachers are discussed in the context of children's right to have their views heard, and their developing understanding of difference.
Resumo:
Electronic word-of-mouth (eWOM) is recognised as a means of interpersonal communication and a powerful marketing tool. However, previous studies have focussed on related motivations, and limited attention has been given to understanding the antecedents of eWOM communication behaviour in the travel industry. This study proposes a full and partial mediation model, which brings together for the first time three key antecedents: adoption of electronic communication technology, consumer dis/satisfaction with travel consumption experience, and subjective norm. The model aims to understand the impact of these antecedents on travellers' attitude towards eWOM communication and intention to use eWOM communication media. The data were collected from international travellers (n = 524), and structural equation modelling is used to test the conceptual framework. The findings of the study suggest that overall attitude towards eWOM communication partially mediates the impact of the traveller's adoption of electronic communication technology and subjective norm, and fully mediates the impact of consumer dis/satisfaction with travel consumption experience on travellers' intention to use eWOM communication media.
Resumo:
This study investigates flash flood forecast and warning communication, interpretation, and decision making, using data from a survey of 418 members of the public in Boulder, Colorado, USA. Respondents to the public survey varied in their perceptions and understandings of flash flood risks in Boulder, and some had misconceptions about flash flood risks, such as the safety of crossing fast-flowing water. About 6% of respondents indicated consistent reversals of US watch-warning alert terminology. However, more in-depth analysis illustrates the multi-dimensional, situationally dependent meanings of flash flood alerts, as well as the importance of evaluating interpretation and use of warning information along with alert terminology. Some public respondents estimated low likelihoods of flash flooding given a flash flood warning; these were associated with lower anticipated likelihood of taking protective action given a warning. Protective action intentions were also lower among respondents who had less trust in flash flood warnings, those who had not made prior preparations for flash flooding, and those who believed themselves to be safer from flash flooding. Additional analysis, using open-ended survey questions about responses to warnings, elucidates the complex, contextual nature of protective decision making during flash flood threats. These findings suggest that warnings can play an important role not only by notifying people that there is a threat and helping motivate people to take protective action, but also by helping people evaluate what actions to take given their situation.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.