Pigeons responded on concurrent variable-interval 180-sec variable-interval 36-sec schedules during Conditions 1 and 3 of Experiment 1. Condition 2 arranged variable-interval 60-sec schedules for both response alternatives. The schedule assigned to the alternative that was associated with the variable-interval 36-sec schedule in Conditions 1 and 3 operated only when the subject responded on that alternative. The proportion of time spent responding on the alternative with the conventional variable-interval 60-sec schedule increased during Condition 2, but exclusive choice of that alternative did not develop. This result is inconsistent with maximization of the overall reinforcement rate and with maximization of the momentary probability of reinforcement (momentary maximizing). Increasing time proportions were also found in Experiment 2, which arranged similar conditions, except that reinforcement was provided on a variable-time basis. The time proportions were close to the momentary maximizing prediction in Experiment 2. The results of both experiments can be explained if it is assumed that time allocation is controlled by delayed reinforcement of changeovers between alternatives. 相似文献
The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy‐four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineering attacks, (b) authority (1 of the 6 persuasion principles) is used considerably more often than others, and (c) single‐principle attack steps occur more often than multiple‐principle ones. The social engineers identified in the scenarios more often used persuasion principles compared to other social influences. The scenario analysis illustrates how to exploit the human element in security. The findings support the view that security mechanisms should include not only technical but also social countermeasures. 相似文献
According to the temporal need-threat model, different responses toward social exclusion stem from the fact that different needs are threatened. Because evidence for this account is mixed, we tested a goal-directed account in which the chosen behavior depends not only on the threatened need but also on the behavior that has the highest expectancy of repairing that need. In two experiments, participants were excluded using the cyberball paradigm. They were then either assigned to a condition in which they could choose to send aggressive or prosocial messages to the other players or to a condition in which they could send aggressive, prosocial, or moralizing messages. We hypothesized that the expectancy to repair threatened needs would be higher for moralizing behavior than for aggressive and prosocial behavior, which would result in moralizing behavior in the second condition. Both experiments provided partial support for our hypothesis, suggesting that the reactions to social exclusion might be goal directed.
In an electronic brainstorming session, experts and users of methods for multi-criteria decision analysis discussed editorial policies for a journal which is confronted with the conflicts between isolated schools of thought. The present paper describes the session and highlights how experts in multi-criteria decision analysis view the applications of their own methods on their own decision problems. 相似文献