956 resultados para Predatory threat
Resumo:
The draft of the new law on the confidentiality of personal data severely curtails medical and epidemiological research. This might be detrimental and dangerous to public health. The project therefore has to be amended.
Resumo:
We report an experiment where participants observed an attack on their virtual body as experienced in an immersive virtual reality (IVR) system. Participants sat by a table with their right hand resting upon it. In IVR, they saw a virtual table that was registered with the real one, and they had a virtual body that substituted their real body seen from a first person perspective. The virtual right hand was collocated with their real right hand. Event-related brain potentials were recorded in two conditions, one where the participant"s virtual hand was attacked with a knife and a control condition where the knife only struck the virtual table. Significantly greater P450 potentials were obtained in the attack condition confirming our expectations that participants had a strong illusion of the virtual hand being their own, which was also strongly supported by questionnaire responses. Higher levels of subjective virtual hand ownership correlated with larger P450 amplitudes. Mu-rhythm event-related desynchronization in the motor cortex and readiness potential (C3C4) negativity were clearly observed when the virtual hand was threatened as would be expected, if the real hand was threatened and the participant tried to avoid harm. Our results support the idea that event-related potentials may provide a promising non-subjective measure of virtual embodiment. They also support previous experiments on pain observation and are placed into context of similar experiments and studies of body perception and body ownership within cognitive neuroscience.
Resumo:
Much research studies how individuals cope with disease threat by blaming out-groups and protecting the in-group. The model of collective symbolic coping (CSC) describes four stages by which representations of a threatening event are elaborated in the mass media: awareness, divergence, convergence, and normalization. We used the CSC model to predict when symbolic in-group protection (othering) would occur in the case of the avian influenza (AI) outbreak. Two studies documented CSC stages and showed that othering occurred during the divergence stage, characterized by an uncertain symbolic environment. Study 1 analysed media coverage of AI over time, documenting CSC stages of awareness and divergence. In Study 2, a two-wave repeated cross-sectional survey was conducted just after the divergence stage and a year later. Othering was measured by the number of foreign countries erroneously ticked by participants as having human victims. Individual differences in germ aversion and social dominance orientation interacted to predict othering during the divergence stage but not a year later. Implications for research on CSC and symbolic in-group protection strategies resulting from disease threat are discussed.
Resumo:
The Spanish Government has established post-market environmental monitoring (PMEM) as mandatory for genetically modified (GM) crop varieties cultivated in Spain. In order to comply with this regulation, effects of Bt maize varieties derived from the event MON810 on the predatory fauna were monitored for two years in northeast and central Spain. The study was carried out with a randomized block design in maize fields of 3-4 ha on which the abundance of plant-dwelling predators and the activity-density of soil-dwelling predators in Bt vs. non-Bt near-isogenic varieties were compared. To this end, the plots were sampled by visual inspection of a certain number of plants and pitfall traps 6 or 7 times throughout two seasons. No significant differences in predator densities on plants were found between Bt and non-Bt varieties. In the pitfall traps, significant differences between the two types of maize were found only in Staphylinidae, in which trap catches in non-Bt maize were higher than in Bt maize in central Spain. Based on the statistical power of the assays, surrogate arthropods for PMEM purposes are proposed; Orius spp. and Araneae for visual sampling and Carabidae, Araneae, and Staphylinidae for pitfall trapping. The other predator groups recorded in the study, Nabis sp. and Coccinellidae in visual sampling and Dermaptera in pitfall trapping, gave very poor power results. To help to establish a standardized protocol for PMEM of genetically modified crops, the effect-detecting capacity with a power of 0.8 of each predator group is given.
Resumo:
We report an experiment where participants observed an attack on their virtual body as experienced in an immersive virtual reality (IVR) system. Participants sat by a table with their right hand resting upon it. In IVR, they saw a virtual table that was registered with the real one, and they had a virtual body that substituted their real body seen from a first person perspective. The virtual right hand was collocated with their real right hand. Event-related brain potentials were recorded in two conditions, one where the participant"s virtual hand was attacked with a knife and a control condition where the knife only struck the virtual table. Significantly greater P450 potentials were obtained in the attack condition confirming our expectations that participants had a strong illusion of the virtual hand being their own, which was also strongly supported by questionnaire responses. Higher levels of subjective virtual hand ownership correlated with larger P450 amplitudes. Mu-rhythm event-related desynchronization in the motor cortex and readiness potential (C3-C4) negativity were clearly observed when the virtual hand was threatened as would be expected, if the real hand was threatened and the participant tried to avoid harm. Our results support the idea that event-related potentials may provide a promising non-subjective measure of virtual embodiment. They also support previous experiments on pain observation and are placed into context of similar experiments and studies of body perception and body ownership within cognitive neuroscience.
Resumo:
We report an experiment where participants observed an attack on their virtual body as experienced in an immersive virtual reality (IVR) system. Participants sat by a table with their right hand resting upon it. In IVR, they saw a virtual table that was registered with the real one, and they had a virtual body that substituted their real body seen from a first person perspective. The virtual right hand was collocated with their real right hand. Event-related brain potentials were recorded in two conditions, one where the participant"s virtual hand was attacked with a knife and a control condition where the knife only struck the virtual table. Significantly greater P450 potentials were obtained in the attack condition confirming our expectations that participants had a strong illusion of the virtual hand being their own, which was also strongly supported by questionnaire responses. Higher levels of subjective virtual hand ownership correlated with larger P450 amplitudes. Mu-rhythm event-related desynchronization in the motor cortex and readiness potential (C3-C4) negativity were clearly observed when the virtual hand was threatened as would be expected, if the real hand was threatened and the participant tried to avoid harm. Our results support the idea that event-related potentials may provide a promising non-subjective measure of virtual embodiment. They also support previous experiments on pain observation and are placed into context of similar experiments and studies of body perception and body ownership within cognitive neuroscience.
Resumo:
Dreaming is a pure form of phenomenality, created by the brain untouched by external stimulation or behavioral activity, yet including a full range of phenomenal contents. Thus, it has been suggested that the dreaming brain could be used as a model system in a biological research program on consciousness (Revonsuo, 2006). In the present thesis, the philosophical view of biological realism is accepted, and thus, dreaming is considered as a natural biological phenomenon, explainable in naturalistic terms. The major theoretical contribution of the present thesis is that it explores dreaming from a multidisciplinary perspective, integrating information from various fields of science, such as dream research, consciousness research, evolutionary psychology, and cognitive neuroscience. Further, it places dreaming into a multilevel framework, and investigates the constitutive, etiological, and contextual explanations for dreaming. Currently, the only theory offering a full multilevel explanation for dreaming, that is, a theory including constitutive, etiological, and contextual level explanations, is the Threat Simulation Theory (TST) (Revonsuo, 2000a; 2000b). The empirical significance of the present thesis lies in the tests conducted to test this specific theory put forth to explain the form, content, and biological function of dreaming. The first step in the empirical testing of the TST was to define exact criteria for what is a ‘threatening event’ in dreams, and then to develop a detailed and reliable content analysis scale with which it is possible to empirically explore and quantify threatening events in dreams. The second step was to seek answers to the following questions derived from the TST: How frequent threatening events are in dreams? What kind of qualities these events have? How threatening events in dreams relate to the most recently encoded or the most salient memory traces of threatening events experienced in waking life? What are the effects of exposure to severe waking life threat on dreams? The results reveal that threatening events are relatively frequent in dreams, and that the simulated threats are realistic. The most common threats include aggression, are targeted mainly against the dream self, and include simulations of relevant and appropriate defensive actions. Further, real threat experiences activate the threat simulation system in a unique manner, and dream content is modulated by the activation of long term episodic memory traces with highest negative saliency. To sum up, most of the predictions of the TST tested in this thesis received considerable support. The TST presents a strong argument that explains the specific design of dreams as threat simulations. The TST also offers a plausible explanation for why dreaming would have been selected for: because dreaming interacted with the environment in such a way that enhanced fitness of ancestral humans. By referring to a single threat simulation mechanism it furthermore manages to explain a wide variety of dream content data that already exists in the literature, and to predict the overall statistical patterns of threat content in different samples of dreams. The TST and the empirical tests conducted to test the theory are a prime example of what a multidisciplinary approach to mental phenomena can accomplish. Thus far, dreaming seems to have always resided in the periphery of science, never regarded worth to be studied by the mainstream. Nevertheless, when brought to the spotlight, the study of dreaming can greatly benefit from ideas in diverse branches of science. Vice versa, knowledge learned from the study of dreaming can be applied in various disciplines. The main contribution of the present thesis lies in putting dreaming back where it belongs, that is, into the spotlight in the cross-road of various disciplines.
Resumo:
Predation is an important selective force that has led to the evolution of a variety of fascinating anti-predator adaptations, such as many types of protective coloration and prey behaviours. Because the evolution of life has begun in the aquatic environment and many anti-predator adaptations are found already in relative primitive taxa, it is likely that many of these adaptations evolved initially in the aquatic environment. Yet, there has been surprisingly little research on the mechanisms and function of antipredator adaptations in aquatic systems. To understand the function of anti-predator adaptations and natural selection imposed on prey appearance and behaviour, I have investigated how protective coloration can be used, either as such or together with behavioural adaptations, to manipulate predator behaviour and decrease predation risk. To this end I conducted a series of behaviour ecological laboratory experiments in which I manipulated the visual appearance of artificial backgrounds and prey items. In paper I of this thesis, I investigated background choice as an anti-predator strategy, by observing the habitat choice of the least killifish (Heterandria formosa) between pairs of artificial backgrounds, both in the presence and absence of predation threat. It has been suggested that prey could decrease their risk of being detected by predators either by preferring backgrounds into which they blend or by preferring visually complex backgrounds. The least killifish preferred a background that matched their patterning to a background that mismatched it, showing that they are able to respond to cues of visual similarity between their colour pattern and the surrounding environment. Interestingly however, in female least killifish visual complexity of the background was a more important cue for habitat safety and may override or act together with background matching when searching for a safe habitat. It is possible that in females, preference for visually complex backgrounds is associated with lower opportunity costs than preference for matching backgrounds would be. Generally, the least killifish showed stronger preference while under predation threat, indicating that their background choice behaviour is an antipredator adaptation. Many aquatic prey species have eyespots, which are colour patterns that consist of roughly concentric rings and have received their name because they for humans often resemble the vertebrate eye. I investigated the anti-predator function of eyespots against predation by fish in papers II, III and IV. Some eyespots have been suggested to benefit prey by diverting the strikes of predators away from vital parts of the prey body or towards a direction that facilitates prey escape. Although proposed over a century ago, the divertive effect of eyespots has proven to be difficult to show experimentally. In papers II and III, I tested for divertive effect of eyespots towards attacking fish by presenting artificial prey with eyespots to laboratory reared three-spined sticklebacks (Gasterosteus aculeatus). I found that eyespots strongly influenced the behaviour of attacking sticklebacks and effectively drew their strikes towards the eyespots. To further investigate this divertive effect and whether the specific shape of eyespots is important for it, I tested in paper III the response of fish also to other markings than eyespots. I found that eyespots were generally more effective in diverting the first strikes of attacking fish compared to other prey markings. My findings suggest that the common occurrence of eyespots in aquatic prey species can at least partly be explained by the divertive effect of the eyespot shape, possibly together with the relative simple developmental mechanisms underlying circular colour patterns. An eyebar is a stripe that runs through the eye, and this pattern has been suggested to obscure the real eyes of the prey by visually blending parts of the eyes and head of the prey and by creating false edges. In paper III, I show that an eyebar effectively disrupts an eyelike shape. This suggests that eyebars provide an effective way to conceal the eyes and consequently obstruct detection and recognition of prey. This experiment also demonstrates that through concealment of the eyes, eyebars could be used to enhance the divertive effect of eyespots, which can explain the common occurrence of eyebars in many species of fish that have eyespots. Larger eyespots have been shown to intimidate some terrestrial predators, such as passerine birds, either because they resemble the eyes of the predator’s own enemy or because highly salient features may have an intimidating effect. In papers II and IV, I investigated whether the occurrence of eyespots in some aquatic prey could be explained by their intimidating effect predatory fish. In paper IV, I also investigated the reason for the intimidating effect of eyelike prey marks. In paper II, I found no clear intimidating effect of eyespots, whereas in paper IV, using a different approach, I found that sticklebacks hesitated to attack towards eyelike but not towards non-eyelike marks. Importantly, paper IV therefore presents the first rigorous evidence for the idea that eye mimicry, and not merely conspicuousness, underlies the intimidating effect. It also showed that the hesitation shown by fish towards eyelike marks is partly an innate response that is reinforced by encounters with predators. Collectively, this thesis shows that prey colour pattern and the visual appearance of the habitat influence the behaviour of fish. The results demonstrate that protective coloration provides numerous distinctive ways for aquatic prey to escape predation. Thus, visual perception and behaviour of fish are important factors shaping the appearance and behaviours of aquatic prey.
Resumo:
In vitro tests were carried out on the pathogenicity of nine isolates of the predatory fungi of the genus Monacrosporium (5 M. sinense isolates, 3 M. appendiculatum and 1 M. thaumasium isolate) for a phytonematode (second stage juveniles from Meloidogyne incognita, race 3), a free-living nematode (Panagrellus spp), and two gastrointestinal parasitic nematodes of cattle (infective larvae of Cooperia punctata and Haemonchus placei). A suspension containing 2,000 nematodes from each species was added to Petri dishes containing fungi and grown on 2% water-agar medium at 25oC in the dark for up to 7 days. The dishes were examined every other day for 7 days and predation-free nematodes were counted. The results showed that the free-living nematodes, Panagrellus spp, were the most susceptible (P<0.05), followed by the phytonematode M. incognita, while the controls were ³98.5% viable. However, a variable susceptibility of the nematodes to different fungi was observed. This indicates that the use of predatory fungi for the environmental control of nematodes will be limited by the multiplicity of nematodes in the environment and their differential susceptibility to fungal isolates of the same genus.
Resumo:
A former study with scenarios conducted in Hawaii has suggested that humans share with non-human mammals the same basic defensive strategies - risk assessment, freezing, defensive threat, defensive attack, and flight. The selection of the most adaptive strategy is strongly influenced by features of the threat stimulus - magnitude, escapability, distance, ambiguity, and availability of a hiding place. Aiming at verifying if these strategies would be consistent in a different culture, 12 defensive scenarios were translated into Portuguese and adapted to the Brazilian culture. The sample consisted of male and female undergraduate students divided into two groups: 76 students, who evaluated the five dimensions of each scenario and 248 medical students, who chose the most likely response for each scenario. In agreement with the findings from studies of non-human mammal species, the scenarios were able to elicit different defensive behavioral responses, depending on features of the threat. "Flight" was chosen as the most likely response in scenarios evaluated as an unambiguous and intense threat, but with an available route of escape, whereas "attack" was chosen in an unambiguous, intense and close dangerous situation without an escape route. Less urgent behaviors, such as "check out", were chosen in scenarios evaluated as less intense, more distant and more ambiguous. Moreover, the results from the Brazilian sample were similar to the results obtained in the original study with Hawaiian students. These data suggest that a basic repertoire of defensive strategies is conserved along the mammalian evolution because they share similar functional benefits in maintaining fitness.
Resumo:
The objective of the present study was to evaluate the response of social anxiety disorder (SAD) patients to threat scenarios. First-choice responses to 12 scenarios describing conspecific threatening situations and mean scores of defensive direction and defensive intensity dimensions were compared between 87 SAD patients free of medication and 87 matched healthy controls (HC). A significant gender difference in the first-choice responses was identified for seven scenarios among HCs but only for two scenarios among SAD patients. A significantly higher proportion of SAD patients chose "freezing" in response to "Bush" and "Noise" scenarios, whereas the most frequent response by HCs to these scenarios was "check out". SAD males chose "run away" and "yell" more often than healthy men in response to the scenarios "Park" and "Elevator", respectively. There was a positive correlation between the severity of symptoms and both defensive direction and defensive intensity dimensions. Factorial analysis confirmed the gradient of defensive reactions derived from animal studies. SAD patients chose more urgent defensive responses to threat scenarios, seeming to perceive them as more dangerous than HCs and tending to move away from the source of threat. This is consistent with the hypothesis that the physiopathology of anxiety disorders involves brain structures responsible for defensive behaviors.