首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The author reviews the evidence for the beneficial effects of the Self-Directed Search (SDS), indicates that Hanson and Prediger have misinterpreted the theory, that their evidence is misleading, and that other evidence indicates that males and females of the same type are similar. The virtues of raw scores are summarized. The author recalls some methodological adventures and outlines where we are now in this controversy about the measurement of interests for special groups.  相似文献   

2.
3.
Three experiments examined contingent attentional capture, which is the finding that cuing effects are larger when cues are perceptually similar to a target than when they are dissimilar to the target. This study also analyzed response times (RTs) in terms of the underlying distributions for valid cues and invalid cues. Specifically, an ex-Gaussian analysis and a vincentile analysis examined the influence of top-down attentional control settings on the shift and skew of RT distributions and how the shift and the skew contributed to the cuing effects in the mean RTs. The results showed that cue/target similarity influenced the size of cuing effects. The RT distribution analyses showed that the cuing effects reflected only a shifting effect, not a skewing effect, in the RT distribution between valid cues and invalid cues. That is, top-down attentional control moderated the cuing effects in the mean RTs through distribution shifting, not distribution skewing. The results support the contingent orienting hypothesis (Folk, Remington, & Johnston, Journal of Experimental Psychology: Human Perception and Performance, 18, 1030–1044, 1992) over the attentional disengagement account (Theeuwes, Atchley, & Kramer, 2000) as an explanation for when top-down attentional settings influence the selection of salient stimuli.  相似文献   

4.
Abstract

The idea that perceptions of high personal risk lead people to adopt precautionary behavior (the “motivational hypothesis”) is mainly tested with correlational data. A review of studies from selective journals reveals a high proportion with methodological and conceptual problems that make them invalid as tests of this hypthesis. Three problems arc emphasized: (1) the misinterpretation of correlations from cross-sectional studies as testing the motivational hypothesis when they actually indicate the accuracy of risk perceptions; (2) the failure to control for prior behavior in prospective studies; and (3) the we of prospective studies in situations of little behavior change. Path models are used to help explain these problems. Recommendations for selecting research designs and for calculating the least problematic correlations are given, along with warnings about the many assumptions needed to interpret even these correlations.

Summary

Overall, 27 of the 61 cross-sectional analyses listed in Tables 2 and 3 were conducted using clearly inappropriate variables. The appropriateness of the remaining correlations rest on one or two rather questionable assumptions: (1) that people do not distort their risk perceptions to justify their behavior or intentions and (2) that negative screening results a problem like breast cancer do not affect perceptions of future risk. The correlations preferred for testing the motivational hypothesis are listed in Table 4.

Summary

When the amount of precautionary behavior in a population has become relatively stable and behavior at time t+1 is well-predicted from behavior at time t, no independent variable other than Bt will have much predictive value in a prospective design. To avoid this problem, research should be conducted at a time when a substantial change in behavior is occurring, such as soon after the risk is recognized. If this is not possible, interventions that lead people to change their behavior (e.g., by raising risk perceptions or by lowering barriers to action) are required. In effect, they remove the system from equilibrium and allow one to watch what happens as people seek a new equilibrium. The least satisfactory choice is to use a cross-sectional correlation, such as R H?B, that represents a summation over previous changes in behavior. The assumptions required to interpret such a correlation have been discussed earlier.  相似文献   

5.
This research examines the processes respondents use to answer personality test items. A total of 158 true/false items from four scales of the Personality Research Form and the California Psychological Inventory were used as stimuli. University students (N = 120) responded to each item and indicated one of nine strategies used in deciding on a response. Obtained response strategy ratings for items were reliable and their frequencies corresponded closely to previous findings with other items. Subsequently, the associations between item response strategy frequencies and item-total correlations were computed. Congruent with previous research, better items avoided behaviours or experiences and evoked responding based on traits and on referring to the statements of others. The associations between item response strategies and other indices of item quality are discussed and implications regarding scale development are offered.  相似文献   

6.
7.
8.
9.
Using a cognitive architecture to examine what develops   总被引:1,自引:0,他引:1  
Different theories of development propose alternative mechanisms by which development occurs. Cognitive architectures can be used to examine the influence of each proposed mechanism of development while keeping all other mechanisms constant. An ACT-R computational model that matched adult behavior in solving a 21-block pyramid puzzle was created. The model was modified in three ways that corresponded to mechanisms of development proposed by developmental theories. The results showed that all the modifications (two of capacity and one of strategy choice) could approximate the behavior of 7-year-old children on the task. The strategy-choice modification provided the closest match on the two central measures of task behavior (time taken per layer, r = .99, and construction attempts per layer, r = .73). Modifying cognitive architectures is a fruitful way to compare and test potential developmental mechanisms, and can therefore help in specifying "what develops."  相似文献   

10.
We evaluated a preliminary method for examining the antecedent and consequent contributions to noncompliance exhibited by two children with disabilities. In Phase 1, we assessed whether noncompliance was a result of a skill deficit. For one participant, we then conducted a functional analysis to determine the variables maintaining noncompliance in Phase 2. In Phase 3, we conducted a treatment evaluation to increase compliance for each participant. We identified the antecedent and consequent variables responsible for noncompliance and developed an effective intervention for both participants.  相似文献   

11.
12.
13.
We welcome the discussion prompted by our data (Larsen & Baddeley, this issue 2003). In the case of Macken and Jones (this issue 2003), we note that much of it concerns inconsistency between their findings and those of ourselves and/or others, emphasizing the need for further replication. We welcome the emphasis that Neath, Farley, and Surprenant (this issue 2003) place on the importance of strategy. This is likely to be an issue of increasing importance in the field, although we have doubts about the correlational approach adopted by Neath et al. Finally, we welcome the demonstration by Page and Norris (this issue 2003) that their primacy model is able to give a computationally explicit account of the irrelevant speech effect within a broad phonological loop framework.  相似文献   

14.
This paper focuses on a central aspect of the “picture theory” in the Tractatus – the “identity requirement” – namely the idea that a proposition represents elements in reality as combined in the same way as its elements are combined. After introducing the Tractatus' views on the nature of the proposition, I engage with a “nominalist” interpretation, according to which the Tractatus holds that relations are not named in propositions. I claim that the nominalist account can only be maintained by rejecting the “identity requirement.” I then consider an opposite – “realist” – interpretation, according to which Tractarian names include names of properties and relations. I argue that, although it can accommodate the “identity requirement,” the realist interpretation falls short of providing a correct interpretation of the Tractatus' conception of a name. I conclude by presenting an alternative account (to both nominalism and realism) of the Tractatus' conception of a name.  相似文献   

15.
We expected a positive boosting effect of a performance-based extrinsic reward on motivation and performance for those with higher control-related resources (i.e., perceived task control and trait self-control) and a positive compensating effect for those who lacked these resources. Study 1 supported compensation. Those with lower resources experienced a beneficial effect of reward on motivation and performance (i.e., compared to no reward). In Study 2, coping was examined as a mechanism. Again, reward compensated for lower resources, enhancing motivation, and performance due to enhanced coping. For those with higher resources, reward boosted motivation and performance due to coping. Thus, the interactive effects of reward and resources are paradoxical: higher resources can maximize the utility of a reward, but reward can also compensate for low resources.  相似文献   

16.
17.
The diffusion model (Ratcliff, 1978) and the leaky competing accumulator model (LCA, Usher & McClelland, 2001) were tested against two-choice data collected from the same subjects with the standard response time procedure and the response signal procedure. In the response signal procedure, a stimulus is presented and then, at one of a number of experimenter-determined times, a signal to respond is presented. The models were fit to the data from the two procedures simultaneously under the assumption that responses in the response signal procedure were based on a mixture of decision processes that had already terminated at response boundaries before the signal and decision processes that had not yet terminated. In the latter case, decisions were based on partial information in one variant of each model or on guessing in a second variant. Both variants of the diffusion model fit the data well and both fit better than either variant of the LCA model, although the differences in numerical goodness-of-fit measures were not large enough to allow decisive selection between the models.  相似文献   

18.
The aim of the study was to elucidate whether and how reliance on a second language impacts the learning of new information under very basic learning conditions. The paradigm used to investigate this issue required individuals to learn a series of associations between numerals and particular letter strings. Participants were two groups of university students: (1) individuals for whom spoken Hebrew was the mother tongue and written Hebrew a primary orthography (L1 group), and (2) individuals for whom Hebrew, both spoken and written, was a second language (L2 group). Data were collected under two conditions. In the language-dependent condition (LDC), the paradigm required learning associations between eight numerals and the letter strings of eight familiar Hebrew words. In the language-independent condition (LIC), it required learning associations between eight numerals and eight random letter strings in Hebrew. Results suggest that learners may be significantly disadvantaged when compelled to learn new information mediated in a second language. This disadvantage appears to manifest itself at a very basic learning level and in instances where new information is mediated by language that is fairly overlearned by the L2 learner.  相似文献   

19.
In 2 studies, we investigated the validity and usefulness of a bull's eye hierarchical mapping measure to examine the content and structure of attachment networks. The bull's eye identified network differences between people of different attachment styles and between different ages. Attachment networks varied in the number of members and their hierarchical organization as a function of attachment style. Secure individuals included a higher number of secure relationships in their networks and placed them closer to the core self than their insecure relationships, as well as closer than did dismissing‐avoidant individuals. The bull's eye also allowed for the observation of meaningful interrelations between network members. Study 2 utilized a cross‐sectional design by which we observed network fluidity from mid‐ to late‐adolescence in addition to attachment style differences. One important finding was that late‐adolescents placed their friends closer to the core self than did midadolescents, reflecting increased use of peers as close attachment figures.  相似文献   

20.
We appreciate the thoughtful responses we have received on ‘Disclosing New Worlds’. We will respond to the concerns raised by grouping them under three general themes. First, a number of questions arise from lack of clarity about how the matters we undertook to discuss ‐ especially solidarity ‐ appear when one starts by thinking about the primacy of skills and practices. Under this heading we consider (a) whether we need more case studies to make our points, and (b) whether national and other solidarities require willingness to die for the values that produce that solidarity. Second, we take up questions concerning the historical character of the skills of entrepreneurs, virtuous citizens, and culture figures. Here we shall (a) emphasize how we distinguish ourselves from earlier writers on these subjects, (b) consider essentialism, relational identities, and exclusion, (c) answer a number of Habermasian concerns raised by Hoy, (d) speak to Taylor's concern regarding the contingency of solidarity and forgetting, and (e) take up Grant's objection that we are both formalists and relativists. Third, we shall take up the concern, raised mostly by Borgmann, that historical disclosing, that is to say history as the West has known it, is over, and that now all that can be done by those who transform the practices is to make them more and more technological.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号