433 resultados para Watercolor illusion


Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is well established that people tend to rate themselves as better than average across many domains. To maintain these illusions, it is suggested that people distort feedback about their own and others' performance. This study examined expert/novice differences in self-ratings when people compared themselves with others of the same level of expertise and background as themselves. Given that a key expert characteristic is increased self-monitoring, we predicted that experts in a domain may have a reduced illusion of superiority because they are more aware of their actual ability. We compared expert police drivers with novice police drivers and found that this prediction was not supported. Expert police drivers rated themselves as superior to equally qualified drivers, to the same degree as novices, Cohen's d = .03 ns. Despite their extensive additional training and experience, experts still appear to be as susceptible to illusions of superiority Lis everyone else. (C) 2004 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Different components of driving skill relate to accident involvement in different ways. For instance, while hazard-perception skill has been found to predict accident involvement, vehicle-control skill has not. We found that drivers rated themselves superior to both their peers and the average driver on 18 components of driving skill (N = 181 respondents). These biases were greater for hazard-perception skills than for either vehicle-control skills or driving skill in general. Also, ratings of hazard-perception skill related to self-perceived safety after overall skill was controlled for. We suggest that although drivers appear to appreciate the role of hazard perception in safe driving, any safety benefit to be derived from this appreciation may be undermined by drivers' inflated opinions of their own hazard-perception skill. We also tested the relationship between illusory beliefs about driving skill and risk taking and looked at ways of manipulating drivers' illusory beliefs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose. Drivers adopt smaller safety margins when pulling out in front of motorcycles compared with cars. This could partly account for why the most common motorcycle/car accident involves a car violating a motorcyclist's right of way. One possible explanation is the size-arrival effect in which smaller objects are perceived to arrive later than larger objects. That is, drivers may estimate the time to arrival of motorcycles to be later than cars because motorcycles are smaller. Methods. We investigated arrival time judgments using a temporal occlusion paradigm. Drivers recruited from the student population (n = 28 and n = 33) saw video footage of oncoming vehicles and had to press a response button when they judged that vehicles would reach them. Results. In experiment 1, the time to arrival of motorcycles was estimated to be significantly later than larger vehicles (a car and a van) for different approach speeds and viewing times. In experiment 2, we investigated an alternative explanation to the size-arrival effect: that the smaller size of motorcycles places them below the threshold needed for observers to make an accurate time to arrival judgment using tau. We found that the motorcycle/car difference in arrival time estimates was maintained for very short occlusion durations when tau could be estimated for both motorcycles and cars. Conclusions. Results are consistent with the size-arrival effect and are inconsistent with the tau threshold explanation. Drivers estimate motorcycles will reach them later than cars across a range of conditions. This could have safety implications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the Thatcher illusion, a face with inverted eyes and mouth looks abnormal when upright but not when inverted. Behavioral studies have shown that thatcherization of an upright face disrupts perceptual processing of the local configuration. We recorded high-density EEG from normal observers to study ERP correlates of the illusion during the perception of faces and nonface objects, to determine whether inversion and thatcherization affect similar neural mechanisms. Observers viewed faces and houses in four conditions (upright vs. inverted, and normal vs. thatcherized) while detecting an oddball category (chairs). Thatcherization delayed the N170 component over occipito-temporal cortex to faces, but not to houses. This modulation matched the illusion as it was larger for upright than inverted faces. The P1 over medial occipital regions was delayed by face inversion but unaffected by thatcherization. Finally, face thatcherization delayed P2 over occipito-temporal but not over parietal regions, while inversion affected P2 across categories. All effects involving thatcherization were face-specific. These results indicate that effects of face inversion and feature inversion (in thatcherized faces) can be distinguished on a functional as well as neural level, and that they affect configural processing of faces in different time windows. © 2006 Elsevier Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The NHS Trust v A (a child) & Ors [2007] EWHC 169

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the Ebbinghaus illusion is commonly used as an example of a simple size-contrast effect, previous studies have emphasised its complexity by identifying many factors that potentially influence the magnitude of the illusion. Here, in a series of three experiments, we attempt to simplify this complexity. In each trial, subjects saw a display comprising, on one side, a target stimulus surrounded by inducers and, on the other, an isolated probe stimulus. Their task was to indicate whether the probe appeared larger or smaller than the target. Probe size was adjusted with a one-up, one-down staircase procedure to find the point of subjective equality between probe and target. From these experiments, we argue that the apparent effects of inducer size are often confounded by the relative completeness of the inducing surround and that factors such as the similarity of the inducers and target are secondary. We suggest a simple model that can explain most of the data in terms of just two primary and independent factors: the relative size of the inducers and target, and the distance between the inducers and the target. The balance between these two factors determines whether the size of the target is underestimated or overestimated. © 2005 a Pion publication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Focusing illusion describes how, when making choices, people may put disproportionate attention on certain attributes of the options and hence, causing those options to be overvalued. For instance, in deciding whether or not to take out a loan, people may focus more on getting the loan than on its small and dispersed costs. Building on recent literature on focusing illusion in economic choice, we theoretically propose and empirically test that focusing illusion can be advantageously exploited such that attention is put back on the ignored attributes. To demonstrate this, we use hypothetical loan decisions where people choose between loans with different repayment plans to finance a purchase. We show that when adding a steeply decreasing-installments plan to the original choice set of not borrowing or borrowing under a fixed-installments plan, the preference for the fixed-installments plan is lessened. This is because preference for the fixed-installments plan shifted towards not borrowing. We discuss potential applications of our results in designing choice sets of intertemporal sequences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Acknowledgements We thank Brian Roberts and Mike Harris for responding to our questions regarding their paper; Zoltan Dienes for advice on Bayes factors; Denise Fischer, Melanie Römer, Ioana Stanciu, Aleksandra Romanczuk, Stefano Uccelli, Nuria Martos Sánchez, and Rosa María Beño Ruiz de la Sierra for help collecting data; Eva Viviani for managing data collection in Parma. We thank Maurizio Gentilucci for letting us use his lab, and the Centro Intradipartimentale Mente e Cervello (CIMeC), University of Trento, and especially Francesco Pavani for lending us his motion tracking equipment. We thank Rachel Foster for proofreading. KKK was supported by a Ph.D. scholarship as part of a grant to VHF within the International Graduate Research Training Group on Cross-Modal Interaction in Natural and Artificial Cognitive Systems (CINACS; DFG IKG-1247) and TS by a grant (DFG – SCHE 735/3-1); both from the German Research Council.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Scharff-technique is used for eliciting information from human sources. At the very core of the technique is the “illusion of knowing it all” tactic, which aims to inflate a source's perception of how much knowledge an interviewer holds about the event to be discussed. For the current study, we mapped the effects following two different ways of introducing this particular tactic; a traditional way of implementation where the interviewer explicitly states that s/he already knows most of the important information (the traditional condition), and a new way of implementation where the interviewer just starts to present the information that s/he holds (the just start condition). The two versions were compared in two separate experiments. In Experiment 1 (N = 60), we measured the participants’ perceptions of the interviewer's knowledge, and in Experiment 2 (N = 60), the participants’ perceptions of the interviewer's knowledge gaps. We found that participants in the just start condition (a) believed the interviewer had more knowledge (Experiment 1), and (b) searched less actively for gaps in the interviewer's knowledge (Experiment 2), compared to the traditional condition. We will discuss the current findings and how sources test and perceive the knowledge his or her interviewer possesses within a framework of social hypothesis testing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis consists of a confessional narrative, What My Mother Doesn’t Know, and an accompanying exegesis, And Why I Should (Maybe) Tell Her. The creative piece employs the confessional mode as a subversive device in three separate narratives, each of which situates the bed as a site of resistance. The exegesis investigates how this self-disclosure in a domestic space flouts the governing rules of self-representation, specifically: telling the truth, respecting privacy and displaying normalcy. The female confession, I argue, creates an alternative space in women’s autobiography where notions of truth-telling can be undermined, the political dimensions of personal experience can be uncovered and the discourse of normality can be negotiated. In particular, women’s confessions told in, on or about the bed, dismantle the genre’s illusion of self and confirm the representative aspects of women’s experience. Framed within these parameters of power and powerlessness, the exegesis includes textual analyses of Charlotte Perkins Gilman’s The Yellow Wallpaper (1892), Tracey Emin’s My Bed (1999) and Lauren Slater’s Lying (2000), each of which exposes in a bedroom space, the author’s most obscure, intimate and traumatic experiences. Situated firmly within and against the genre’s traditional masculine domain, the exegesis also includes mediations on the creative work that validate the bed as my fabric for confession.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dangerous Places is a novel about the gap between mythological (or 'dreamed') constructions of reality and actual life. The story centres on V en, a married woman with two young children. Her love for her children is fiercely protective and encompassing, but she feels alienated from her husband and to a certain extent her society; so when her first love, Yanni, re-enters her life,she is strongly tempted to resume her affair with him. She is however seduced more by the memories she has 'mythologized' about him than by his physical reality; in the course of the novel she is forced to come to terms with her own delusions. The subplot of the novel involves other characters who are caught between illusion and reality as well, and who deal with 'truth' in differing ways. The themes of the book are explored using a number of structures which underlie and support the surface story. The Greek myths of Adonis/ Aphrodite and Hades/Persephone are framing agents for the plot, and the setting in contemporary Brisbane and North Stradbroke Island is symbolic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.