328 resultados para Illusion
Resumo:
The NHS Trust v A (a child) & Ors [2007] EWHC 169
Resumo:
Although the Ebbinghaus illusion is commonly used as an example of a simple size-contrast effect, previous studies have emphasised its complexity by identifying many factors that potentially influence the magnitude of the illusion. Here, in a series of three experiments, we attempt to simplify this complexity. In each trial, subjects saw a display comprising, on one side, a target stimulus surrounded by inducers and, on the other, an isolated probe stimulus. Their task was to indicate whether the probe appeared larger or smaller than the target. Probe size was adjusted with a one-up, one-down staircase procedure to find the point of subjective equality between probe and target. From these experiments, we argue that the apparent effects of inducer size are often confounded by the relative completeness of the inducing surround and that factors such as the similarity of the inducers and target are secondary. We suggest a simple model that can explain most of the data in terms of just two primary and independent factors: the relative size of the inducers and target, and the distance between the inducers and the target. The balance between these two factors determines whether the size of the target is underestimated or overestimated. © 2005 a Pion publication.
Resumo:
Focusing illusion describes how, when making choices, people may put disproportionate attention on certain attributes of the options and hence, causing those options to be overvalued. For instance, in deciding whether or not to take out a loan, people may focus more on getting the loan than on its small and dispersed costs. Building on recent literature on focusing illusion in economic choice, we theoretically propose and empirically test that focusing illusion can be advantageously exploited such that attention is put back on the ignored attributes. To demonstrate this, we use hypothetical loan decisions where people choose between loans with different repayment plans to finance a purchase. We show that when adding a steeply decreasing-installments plan to the original choice set of not borrowing or borrowing under a fixed-installments plan, the preference for the fixed-installments plan is lessened. This is because preference for the fixed-installments plan shifted towards not borrowing. We discuss potential applications of our results in designing choice sets of intertemporal sequences.
Resumo:
Acknowledgements We thank Brian Roberts and Mike Harris for responding to our questions regarding their paper; Zoltan Dienes for advice on Bayes factors; Denise Fischer, Melanie Römer, Ioana Stanciu, Aleksandra Romanczuk, Stefano Uccelli, Nuria Martos Sánchez, and Rosa María Beño Ruiz de la Sierra for help collecting data; Eva Viviani for managing data collection in Parma. We thank Maurizio Gentilucci for letting us use his lab, and the Centro Intradipartimentale Mente e Cervello (CIMeC), University of Trento, and especially Francesco Pavani for lending us his motion tracking equipment. We thank Rachel Foster for proofreading. KKK was supported by a Ph.D. scholarship as part of a grant to VHF within the International Graduate Research Training Group on Cross-Modal Interaction in Natural and Artificial Cognitive Systems (CINACS; DFG IKG-1247) and TS by a grant (DFG – SCHE 735/3-1); both from the German Research Council.
Resumo:
The Scharff-technique is used for eliciting information from human sources. At the very core of the technique is the “illusion of knowing it all” tactic, which aims to inflate a source's perception of how much knowledge an interviewer holds about the event to be discussed. For the current study, we mapped the effects following two different ways of introducing this particular tactic; a traditional way of implementation where the interviewer explicitly states that s/he already knows most of the important information (the traditional condition), and a new way of implementation where the interviewer just starts to present the information that s/he holds (the just start condition). The two versions were compared in two separate experiments. In Experiment 1 (N = 60), we measured the participants’ perceptions of the interviewer's knowledge, and in Experiment 2 (N = 60), the participants’ perceptions of the interviewer's knowledge gaps. We found that participants in the just start condition (a) believed the interviewer had more knowledge (Experiment 1), and (b) searched less actively for gaps in the interviewer's knowledge (Experiment 2), compared to the traditional condition. We will discuss the current findings and how sources test and perceive the knowledge his or her interviewer possesses within a framework of social hypothesis testing.
Resumo:
What is in Hora da Estrela, by Clarice Lispector, missing in O quarto de despejo, by Carolina Maria de Jesus, to which only the first is considered "fiction"? The question is less obvious than it seems and the answer is steeped in power relations. Purpose of this article is to discuss how the definition of what is (or is not) literature, the literary relationships that establish the canon and thus the formation of the History of Literature permeate the question of aesthetic legitimacy. In the first part of the article, "How and why consider such and such works as 'literature'?" Tract of the relationship between literature and more value added in terms of understanding the birth of fiction. In the second part, "The truth of the unholy Hora da estrela," argue about the intimate relationship between Clarice Lispector, Rodrigo S. M. and Macabéa, to demonstrate the symbiosis between the three; configured as a work that is intended less fictional than what understand it. The third, "The illusion sacred in Quarto de Despejo" attempt to demonstrate how the book of Carolina Maria de Jesus matches all criteria that Richard Shusterman (1998) points out how certain work that needed to be considered "literature", making it a fiction more than what the caption printed on it ("Diary of a slum") reveals.
Resumo:
This thesis consists of a confessional narrative, What My Mother Doesn’t Know, and an accompanying exegesis, And Why I Should (Maybe) Tell Her. The creative piece employs the confessional mode as a subversive device in three separate narratives, each of which situates the bed as a site of resistance. The exegesis investigates how this self-disclosure in a domestic space flouts the governing rules of self-representation, specifically: telling the truth, respecting privacy and displaying normalcy. The female confession, I argue, creates an alternative space in women’s autobiography where notions of truth-telling can be undermined, the political dimensions of personal experience can be uncovered and the discourse of normality can be negotiated. In particular, women’s confessions told in, on or about the bed, dismantle the genre’s illusion of self and confirm the representative aspects of women’s experience. Framed within these parameters of power and powerlessness, the exegesis includes textual analyses of Charlotte Perkins Gilman’s The Yellow Wallpaper (1892), Tracey Emin’s My Bed (1999) and Lauren Slater’s Lying (2000), each of which exposes in a bedroom space, the author’s most obscure, intimate and traumatic experiences. Situated firmly within and against the genre’s traditional masculine domain, the exegesis also includes mediations on the creative work that validate the bed as my fabric for confession.
Resumo:
Dangerous Places is a novel about the gap between mythological (or 'dreamed') constructions of reality and actual life. The story centres on V en, a married woman with two young children. Her love for her children is fiercely protective and encompassing, but she feels alienated from her husband and to a certain extent her society; so when her first love, Yanni, re-enters her life,she is strongly tempted to resume her affair with him. She is however seduced more by the memories she has 'mythologized' about him than by his physical reality; in the course of the novel she is forced to come to terms with her own delusions. The subplot of the novel involves other characters who are caught between illusion and reality as well, and who deal with 'truth' in differing ways. The themes of the book are explored using a number of structures which underlie and support the surface story. The Greek myths of Adonis/ Aphrodite and Hades/Persephone are framing agents for the plot, and the setting in contemporary Brisbane and North Stradbroke Island is symbolic.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
This paper examines discussions of Generation Y within higher education discourse, arguing the sector’s use of the term to describe students is misguided for three reasons. First, portraying students as belonging to Generation Y homogenises people undertaking higher education as young, middle-class and technologically literate. Second, speaking of Generation Y students allows constructivism to be reinvented as a ‘new’ learning and teaching philosophy. Third, the Generation Y university student has become a central figure in concerns about technology’s role in learning and teaching. While the notion of the ‘Generation Y student’ creates the illusion that higher education institutions understand their constituents, ultimately, it is of little value in explaining young adults’ educational experiences.
Resumo:
The Moon appears to be much larger closer to the horizon than when higher in the sky. This is called the ‘Moon Illusion’ since the observed size of the Moon is not actually larger when the Moon is just above the horizon. This article describes a technique for verifying that the observed size of the Moon in not larger on the horizon. The technique can be easily performed in a high school teaching environment. Moreover, the technique demonstrates the surprising fact that the observed size of the Moon is actually smaller on the horizon due to atmospheric refraction. For the purposes of this paper, several images of the moon were taken with the Moon close to the horizon and close to the zenith. Images were processed using a free program called ImageJ. The Moon was found to be 5.73 ±0.04% smaller in area on the horizon then at the zenith.
Resumo:
This study investigated how contemporary puppet-based theatre can create deeply imaginative experiences for adult audiences. Designed to interrogate the potential effects of double-vision (Tillis, 1992), the theories of the sublime (Kant, 2008; 2003) and the uncanny (Jentsch, 1906; Freud, 1919) were used to create a series of creative guidelines. As practice-led research, the project embraced an iterative approach consisting of two cycles for creative experimentation, and a third for the creation of the final performance work The Harbinger, presented as a part of La Boite Theatre Company’s mainstage season. A theoretical investigation was also conducted to inform the developing practice.
Resumo:
This article analyses Yeondoo Jung's exhibition at MAAP Space, Brisbane. Jung's video artworks works often reveal their mechanisms of pictorial illusion, and expose the apparatuses by which still and moving images are constructed more generally. This article examines the two specific works exhibited at MAAP Space, and situates them in the contexts of moving image theory and practice.
Resumo:
Mobility across space is an exemplary characteristic of the global era and an important aspect of the cultural experience of many people in advanced industrialised nations. Mobility evokes powerful images that effectively counter any illusion of stationary life and provide a break from the insularity of the local and parochial. High levels of mobility are simultaneously a fact, a necessity and a cultural aspiration. In recent times, debates about mobility in social theory have considered the relationship between mobility and cosmopolitan culture and identities (Hannerz, 1990, Urry, 1990, 2000, Beck, 2006). Against this backdrop, this paper also draws on some of the more recent discussions about the emergence of globalised and cosmopolitan identities among young people (Beck and Beck-Gernsheim, 2009). Using data from a longitudinal study of young people in Queensland, this paper provides an insight into young people’s aspirations about future mobility. The data affirm Skeggs’ (2004) comment that mobility is an unequal resource, and demonstrate that aspirations of future mobility reflect numerous social, economic and cultural realities of young people’s lives. This inevitably leads us to problematise the established, and often abstract, nexus between cosmopolitanism and mobility in contemporary debates about cosmopolitanism.
Resumo:
2012 saw the publication of competing and complementary lines of Australian “classics”: “A&R Australian Classics” (HarperCollins) and “Text Classics” (Text Publishing). While Angus and Robertson were key in establishing a canon of Australian children’s classics in the twentieth century, it was the Text Classics line which included a selection of young people’s titles in their 2013. In turn, Penguin Australia launched a selection of “Australian Children’s Classics”. In so doing, these publishers were drawing on particular literary and visual cultural traditions in Australian children’s literature. Public assertions of a particular selection of children’s books reveals not only contemporary assumptions about desirable childhood experiences but about the operation of nostalgia therein. In encouraging Australian adults to judge books by their covers, such gestures imply that Australian children may be similarly understood. Importantly, the illusion of unity, sameness, and legibility which is promised by circumscribed canons of “classic” children’s literature may well imply a desire for similarly illusory, unified, legible, “classic” childhood. This paper attends to public attempts to materialise (and legitimise) a canon of classic Australian children’s literature. In particular, it considers the ways in which publishing, postage stamps, and book awards make visible a range of children’s books, but do so in order to either fix or efface the content or meaning of the books themselves. Moving between assertions of the best books for children from the 1980s to today, and of the social values circulated within those books, this paper considers the possibilities and problematics of an Australian children’s canon.