96 resultados para Music Cognition
Resumo:
The present study tested a possible explanation for the positive relationship between the motivation to engage in cognitive endeavors (need for cognition, NFC) and indicators of affective adjustment (e.g., higher self-esteem, lower depression) that has been demonstrated in previous studies. We suggest that dispositional self-control capacity mediates this relationship, since NFC has been found to be related to self-control capacity, and self-control capacity is crucial for adjustment. NFC, dispositional self-control capacity, self-esteem, habitual depressive mood, and tendency to respond in a socially desirable manner were measured among 150 university students via self-report. Regression analyses and Sobel tests revealed that self-control capacity was a potential mediator of the positive relationship between NFC and affective adjustment. The findings were robust in terms of social desirability.
Resumo:
In the present study, we examined the hypothesis that individuals’ motivational tendency to engage in effortful information processing (i.e., their need for cognition; NFC) is positively related to their self-control capacity. This hypothesis was based on previous findings that effortful information processing and self-control both depend on a joint strength resource, and that this resource is boosted by frequent use. NFC was assessed via questionnaire. One week later, the participants (N = 46) completed a test of self-control capacity (Stroop Task). As expected, NFC was positively related to self-control capacity but unrelated to general processing speed.
Resumo:
Freely available software has popularized “mousetracking” to study cognitive processing; this involves the on-line recording of cursor positions while participants move a computer mouse to indicate their choice. Movement trajectories of the cursor can then be reconstructed off-line to assess the efficiency of responding in time and across space. Here we focus on the process of selecting among alternative numerical responses. Several studies have recently measured the mathematical mind with cursor movements while people decided about number magnitude or parity, computed sums or differences, or simply located numbers on a number line. After some general methodological considerations about mouse tracking we discuss several conceptual concerns that become particularly evident when “mousing” the mathematical mind.
Resumo:
Intact cognitive abilities are fundamental for driving. Driving-relevant cognition may be affected in older drivers due to aging or cognitive impairment. The aim of this study was to investigate the effects of cognitive impairment on driving-relevant cognition in older persons. Performance in selective and divided attention, eye-hand-coordination, executive functions and the ability to regulate distance and speed of 18 older persons with CI-Group (cognitive impairment group) was compared to performance of older control group (18 age and gender-matched cognitively normal subjects) and young control group (18 gender-matched young subjects). The CI-Group showed poorer performance than the other two control groups in all cognitive tasks (significance level (p) < 0.001, effect size (partial η2) = 0.63). Differences between cognitively impaired and cognitively normal subjects were still significant after controlling for age (effect sizes from 0.14 to 0.28). Dual tasking affected performance of cognitively impaired subjects more than performance of the other two groups (p = 0.016, partial η2 = 0.14). Results show that cognitive impairment has age-independent detrimental effects on selective and divided attention, eye-hand-coordination, executive functions and the ability to regulate distance and speed. Largest effect sizes are found for reaction times in attention tasks.
Resumo:
Previous findings are inconsistent with regard to whether men are judged as being more or less competent leaders than women. However, masculine-relative to feminine-looking persons seem to be judged consistently as more competent leaders. Can this different impact of biological sex and physical appearance be due to the disparate availability of meta-cognitive knowledge about both sources? The results of Study 1 indicated that individuals possess meta-cognitive knowledge about a possible biasing influence of persons’ biological sex, but not for their physical appearance. In Study 2, participants judged the leadership competence of a male versus female stimulus person with either masculine or feminine physical appearance. In addition, the available cognitive capacity was manipulated. When high capacity was available, participants corrected for the influence of stimulus persons’ sex, but they fell prey to this influence under cognitive load. However, the effect of physical appearance was not moderated by cognitive capacity.
Resumo:
Content providers from the music industry argue that peer-to-peer (P2P) networks such as KaZaA, Morpheus, iMesh, or Audiogalaxy are an enormous threat to their business. They furthermore blame these networks for their recent decline in sales figures. For this reason, an empirical investigation was conducted during a period of 6 weeks on one of the most popular files-sharing systems, in order to determine the quantity and quality of pirated music songs shared. We present empirical evidence as to what extent and in which quality music songs are being shared. A number of hypotheses are outlined and were tested. We studied, among other things, the number of users online and the number of flies accessible on such networks, the free riding problem, and the duration per search request. We further tested to see if there are any differences in the accessibility of songs based on the nationality of the artist, the language of the song, and the corresponding chart position. Finally, we outline the main hurdles users may face when downloading illegal music and the probability of obtaining high quality music tracks on such peer-to-peer networks.
Resumo:
Digital Rights Management Systems (DRMS) are seen by content providers as the appropriate tool to, on the one hand, fight piracy and, on the other hand, monetize their assets. Although these systems claim to be very powerful and include multiple protection technologies, there is a lack of understanding about how such systems are currently being implemented and used by content providers. The aim of this paper is twofold. First, it provides a theoretical basis through which we present shortly the seven core protection technologies of a DRMS. Second, this paper provides empirical evidence that the seven protection technologies outlined in the first section of this paper are the most commonly used technologies. It further evaluates to what extent these technologies are being used within the music and print industry. It concludes that the three main Technologies are encryption, password, and payment systems. However, there are some industry differences: the number of protection technologies used, the requirements for a DRMS, the required investment, or the perceived success of DRMS in fighting piracy.
Resumo:
Technology advances in hardware, software and IP-networks such as the Internet or peer-to-peer file sharing systems are threatening the music business. The result has been an increasing amount of illegal copies available on-line as well as off-line. With the emergence of digital rights management systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Although these systems are very powerful and include multiple technologies to prevent piracy, it is as of yet unknown to what extent such systems are currently being used by content providers. We provide empirical analyses, results, and conclusions related to digital rights management systems and the protection of digital content in the music industry. It shows that most content providers are protecting their digital content through a variety of technologies such as passwords or encryption. However, each protection technology has its own specific goal, and not all prevent piracy. The majority of the respondents are satisfied with their current protection but want to reinforce it for the future, due to fear of increasing piracy. Surprisingly, although encryption is seen as the core DRM technology, only few companies are currently using it. Finally, half of the respondents do not believe in the success of DRMS and their ability to reduce piracy.