953 resultados para Human intelligence gathering
Resumo:
Ashton and colleagues concede in their response (Ashton, Lee, & Visser, in this issue), that neuroimaging methods provide a relatively unambiguous measure of the levels to which cognitive tasks co-recruit dif- ferent functional brain networks (task mixing). It is also evident from their response that they now accept that task mixing differs from the blended models of the classic literature. However, they still have not grasped how the neuroimaging data can help to constrain models of the neural basis of higher order ‘g’. Specifically, they claim that our analyses are invalid as we assume that functional networks have uncorrelated capacities. They use the simple analogy of a set of exercises that recruit multiple muscle groups to varying extents and highlight the fact that individual differences in strength may correlate across muscle groups. Contrary to their claim, we did not assume in the original article (Hampshire, High- field, Parkin, & Owen, 2012) that functional networks had uncorrelated capacities; instead, the analyses were specifically designed to estimate the scale of those correlations, which we referred to as spatially ‘diffuse’ factors
Resumo:
What makes one person more intellectually able than another? Can the entire distribution of human intelligence be accounted for by just one general factor? Is intelligence supported by a single neural system? Here, we provide a perspective on human intelligence that takes into account how general abilities or ‘‘factors’’ reflect the functional organiza- tion of the brain. By comparing factor models of individual differences in performance with factor models of brain functional organization, we demon- strate that different components of intelligence have their analogs in distinct brain networks. Using simulations based on neuroimaging data, we show that the higher-order factor ‘‘g’’ is accounted for by cognitive tasks corecruiting multiple networks. Finally, we confirm the independence of these com- ponents of intelligence by dissociating them using questionnaire variables. We propose that intelli- gence is an emergent property of anatomically distinct cognitive systems, each of which has its own capacity.
Resumo:
Mode of access: Internet.
Resumo:
The Scharff-technique is used for eliciting information from human sources. At the very core of the technique is the “illusion of knowing it all” tactic, which aims to inflate a source's perception of how much knowledge an interviewer holds about the event to be discussed. For the current study, we mapped the effects following two different ways of introducing this particular tactic; a traditional way of implementation where the interviewer explicitly states that s/he already knows most of the important information (the traditional condition), and a new way of implementation where the interviewer just starts to present the information that s/he holds (the just start condition). The two versions were compared in two separate experiments. In Experiment 1 (N = 60), we measured the participants’ perceptions of the interviewer's knowledge, and in Experiment 2 (N = 60), the participants’ perceptions of the interviewer's knowledge gaps. We found that participants in the just start condition (a) believed the interviewer had more knowledge (Experiment 1), and (b) searched less actively for gaps in the interviewer's knowledge (Experiment 2), compared to the traditional condition. We will discuss the current findings and how sources test and perceive the knowledge his or her interviewer possesses within a framework of social hypothesis testing.
Resumo:
Background Schizophrenia is associated with lower pre-morbid intelligence (IQ) in addition to (pre-morbid) cognitive decline. Both schizophrenia and IQ are highly heritable traits. Therefore, we hypothesized that genetic variants associated with schizophrenia, including copy number variants (CNVs) and a polygenic schizophrenia (risk) score (PSS), may influence intelligence. Method IQ was estimated with the Wechsler Adult Intelligence Scale (WAIS). CNVs were determined from single nucleotide polymorphism (SNP) data using the QuantiSNP and PennCNV algorithms. For the PSS, odds ratios for genome-wide SNP data were calculated in a sample collected by the Psychiatric Genome-Wide Association Study (GWAS) Consortium (8690 schizophrenia patients and 11 831 controls). These were used to calculate individual PSSs in our independent sample of 350 schizophrenia patients and 322 healthy controls. Results Although significantly more genes were disrupted by deletions in schizophrenia patients compared to controls (p = 0.009), there was no effect of CNV measures on IQ. The PSS was associated with disease status (R 2 = 0.055, p = 2.1 × 10 -7) and with IQ in the entire sample (R 2 = 0.018, p = 0.0008) but the effect on IQ disappeared after correction for disease status. Conclusions Our data suggest that rare and common schizophrenia-associated variants do not explain the variation in IQ in healthy subjects or in schizophrenia patients. Thus, reductions in IQ in schizophrenia patients may be secondary to other processes related to schizophrenia risk. © Cambridge University Press 2013.
Resumo:
The problem of quantification of intelligence of humans, and of intelligent systems, has been a challenging and controversial topic. IQ tests have been traditionally used to quantify human intelligence based on results of test designed by psychologists. It is in general very difficult to quantify intelligence. In this paper the authors consider a simple question-answering (Q-A) system and use this to quantify intelligence. The authors quantify intelligence as a vector with three components. The components consist of a measure of knowledge in asking questions, effectiveness of questions asked, and correctness of deduction. The authors formalize these parameters and have conducted experiments on humans to measure these parameters
Resumo:
We consider a multi-market framework where a set of firms compete on two oligopolistic markets. The cost of production of each firm allows for spillovers across markets, ensuring that output decisions for both markets have to be made jointly. Prior to competing in these markets, firms can establish links gathering business intelligence about other firms. A link formed by a firm generates two types of externalities for competitors and consumers. We characterize the business intelligence equilibrium networks and networks that maximize social welfare. By contrast with single market competition, we show that in multi-market competition there exist situations where intelligence gathering activities are underdeveloped with regard to social welfare and should be tolerated, if not encouraged, by public authorities.
Resumo:
In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.
Resumo:
Humans consciously and subconsciously establish various links, emerge semantic images and reason in mind, learn linking effect and rules, select linked individuals to interact, and form closed loops through links while co-experiencing in multiple spaces in lifetime. Machines are limited in these abilities although various graph-based models have been used to link resources in the cyber space. The following are fundamental limitations of machine intelligence: (1) machines know few links and rules in the physical space, physiological space, psychological space, socio space and mental space, so it is not realistic to expect machines to discover laws and solve problems in these spaces; and, (2) machines can only process pre-designed algorithms and data structures in the cyber space. They are limited in ability to go beyond the cyber space, to learn linking rules, to know the effect of linking, and to explain computing results according to physical, physiological, psychological and socio laws. Linking various spaces will create a complex space — the Cyber-Physical-Physiological-Psychological-Socio-Mental Environment CP3SME. Diverse spaces will emerge, evolve, compete and cooperate with each other to extend machine intelligence and human intelligence. From multi-disciplinary perspective, this paper reviews previous ideas on various links, introduces the concept of cyber-physical society, proposes the ideal of the CP3SME including its definition, characteristics, and multi-disciplinary revolution, and explores the methodology of linking through spaces for cyber-physical-socio intelligence. The methodology includes new models, principles, mechanisms, scientific issues, and philosophical explanation. The CP3SME aims at an ideal environment for humans to live and work. Exploration will go beyond previous ideals on intelligence and computing.
Resumo:
Since El Salvador’s civil war formally ended in 1992 the small Central American nation has undergone profound social changes and significant reforms. However, few changes have been as important or as devastating as the nation’s emergence as a central hub in the transnational criminal “pipeline” or series of recombinant, overlapping chains of routes and actors that illicit organizations use to traffic in drugs, money weapons, human being, endangered animals and other products. The erasing of the once-clear ideological lines that drove the civil war and the ability of erstwhile enemies to join forces in criminal enterprises in the post-war period is an enduring and dangerous characteristic of El Salvador’s transnational criminal evolution. Trained, elite cadres from both sides, with few legitimate job opportunities, found their skills were marketable in the growing criminal structures. The groups moved from kidnapping and extortion to providing protection services to transnational criminal organizations to becoming integral parts of the organizations themselves. The demand for specialized military and transportation services in El Salvador have exploded as the Mexican DTOs consolidate their hold on the cocaine market and their relationships with the transportista networks, which is still in flux. The value of their services has risen dramatically also because of the fact that multiple Mexican DTOs, at war with each other in Mexico and seeking to physically control the geographic space of the lucrative pipeline routes in from Guatemala to Panama, are eager to increase their military capabilities and intelligence gathering capacities. The emergence of multiple non-state armed groups, often with significant ties to the formal political structure (state) through webs of judicial, legislative and administrative corruption, has some striking parallels to Colombia in the 1980s, where multiple types of violence ultimately challenged the sovereignty of state and left a lasting legacy of embedded corruption within the nation’s political structure. Organized crime in El Salvador is now transnational in nature and more integrated into stronger, more versatile global networks such as the Mexican DTOs. It is a hybrid of both local crime – with gangs vying for control off specific geographic space so they can extract payment for the safe passage of illicit products – and transnational groups that need to use that space to successfully move their products. These symbiotic relationships are both complex and generally transient in nature but growing more consolidated and dangerous.