automatic response
Recently Published Documents


TOTAL DOCUMENTS

101
(FIVE YEARS 34)

H-INDEX

17
(FIVE YEARS 2)

2022 ◽  
Vol 12 ◽  
Author(s):  
Yu Sun ◽  
Jon-Chao Hong ◽  
Jian-Hong Ye

Knowledge sharing is the major driving force to maintain enterprises’ competitiveness. This study extends the current knowledge-sharing research by considering knowledge sharing as comprising four types: automatic response, rational reflection, ridiculed reflection, and deprived reflection, based on Kahneman’s (2011) types of system thinking. Drawing on the motivation-action-outcome model, this study explored how individuals’ intrinsic motivation can guide the action of knowledge sharing and reflect the outcome of creative self-efficacy in intelligent transportation jobs. By snowball sampling in intelligent transportation companies, a total of 232 effective questionnaires were collected, and confirmatory factor analysis with structural equation modeling was performed. The research results showed that: intrinsic motivation was positively related to the four types of knowledge sharing tendencies; automatic response was not significantly related to creative self-efficacy; rational reflection was positively associated with creative self-efficacy; but ridiculed and deprived reflection were negatively related to creative self-efficacy. These results can be applied to encourage employees to practice rational reflection in knowledge sharing to enhance their creative self-efficacy in intelligent transportation jobs.


Linguaculture ◽  
2021 ◽  
Vol 12 (2) ◽  
pp. 7-18
Author(s):  
Camelia Anghel

The article explores D. H. Lawrence’s technique of portrayal in the short story “England, My England” (1921) by applying the key terms annex-metaphor and “blind self” to Egbert, the central male character. The former term is coined by the author of the article as a means of understanding Lawrence’s treatment of his protagonist’s inner life. With the help of the daughter figure, the British author manages to shape the abstract character of notions, and to produce a figurative, volatile version of the father’s psyche. The latter concept, “blind self,” belongs to Lawrence himself, and can be transferred, the paper argues, from one character to another in the process of uncovering Egbert’s metaphorically shaped responses to different types of environment: the mystical, the social, the political. The idea of blindness is materialized as attraction towards nature, as denial of society or, on the contrary, as denial of the self, and, last but not least, as automatic response to the whims of history and national politics.


Author(s):  
L. Vainio ◽  
K. Tiippana ◽  
T. Peromaa ◽  
C. Kuuramo ◽  
I. Kurki

AbstractHabituated response tendency associated with affordance of an object is automatically inhibited if this affordance cue is extracted from a non-target object. This study presents two go/no-go experiments investigating whether this response control operates in response selection processes and whether it is linked to conflict-monitoring mechanisms. In the first experiment, the participants performed responses with one hand, and in the second experiment, with two hands. In addition, both experiments consisted of two blocks with varying frequency of go conditions (25%-go vs. 75%-go). The non-target-related response inhibition effect was only observed in Experiment 2 when the task required selecting between two hands. Additionally, the results did not reveal patterns typically related to conflict monitoring when go-frequency is manipulated and when a stimulus–response compatibility effect is examined relative to congruency condition of the previous trial. The study shows that the non-target-related response inhibition assists hand selection and is relatively resistant to conflict-monitoring processes.


Author(s):  
A. Shaji George ◽  
A. S. Hovan George ◽  
T. Baskar ◽  
Digvijay Pandey

The challenge of securing critical data increases year after year. Evolving technology developments, involving the growth in cloud and the Internet of Things adoption make businesses' confidential data more vulnerable to sophisticated attackers. Protect the Whole Organization by using the Industry’s First Extended Detection and Response (XDR) Platform Security teams have been inundated with inaccurate, inadequate alerts. As a result of today's siloed security tools, specialists should pivot from the console to the console to piece together investigative clues, which will result in horribly slow investigations. Although they’ve implemented countless tools, teams still lack enterprise-wide visibility as well as the deep analytics necessary to locate threats. Confronted with a lack of security professionals, teams need to streamline operations. Extended Detection and Response is the world's very first extended detection and response platform which integrates endpoint, network, as well as cloud data to halt advanced attacks. It combines prevention, investigation, detection, and response in a single platform for unparalleled security and operational effectiveness. In combination with a Managed Threat Hunting assistance, XDR offers continuous protection and industry-leading coverage. A new and more comprehensive approach to detection and response is clearly needed, one which not just includes traditional endpoints but then also includes the enhanced attack surface like the network and cloud. Luckily, these are only a few of the difficulties XDR was intended to solve. XDR unites and extends detection and response capacity through multiple security layers, offering security teams along with centralized end-to-end enterprise visibility, strong analytics, automatic response across the entire technology stack. XDR, clients can get integrated and proactive security measures designed to protect the whole technology stack, which makes it easier for security analysts to detect and stop attacks in progress prior to the impact to the business. Companies of all sizes and types, irrespective of their levels of cybersecurity expertise, is necessary to be considered sophisticated detection, improved visibility, and immediate response to sophisticated threats. The goal here is to explain what XDR is and how it empowers Information Technology, security teams, to stop threats and put them on the defensive. And also show how it provides superior extensibility and analytics which will fit the needs of the future. In the present article, we’ll describe the fundamentals of XDR, and demonstrate how it help out for organizations as well as how it facilitates new security challenges. Moreover, this research paper will be useful for organizations to understand XDR in-depth, as well as how XDR can assist organizations in preventing cyberattacks as well as simplifying and improving security processes. In addition, this paper explains XDR, the capability of current and emerging technologies to offer greater visibility, collect and correlate threat information, andutilize analytics and automation to detect today and future attacks.


Psych ◽  
2021 ◽  
Vol 3 (3) ◽  
pp. 422-446
Author(s):  
Nico Andersen ◽  
Fabian Zehner

In this paper, we introduce shinyReCoR: a new app that utilizes a cluster-based method for automatically coding open-ended text responses. Reliable coding of text responses from educational or psychological assessments requires substantial organizational and human effort. The coding of natural language in responses to tests depends on the texts’ complexity, corresponding coding guides, and the guides’ quality. Manual coding is thus not only expensive but also error-prone. With shinyReCoR, we provide a more efficient alternative. The use of natural language processing makes texts utilizable for statistical methods. shinyReCoR is a Shiny app deployed as an R-package that allows users with varying technical affinity to create automatic response classifiers through a graphical user interface based on annotated data. The present paper describes the underlying methodology, including machine learning, as well as peculiarities of the processing of language in the assessment context. The app guides users through the workflow with steps like text corpus compilation, semantic space building, preprocessing of the text data, and clustering. Users can adjust each step according to their needs. Finally, users are provided with an automatic response classifier, which can be evaluated and tested within the process.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Inés López-López ◽  
Mariola Palazón ◽  
José Antonio Sánchez-Martínez

PurposeThis paper analyzes the effect of company response style and complaint source on silent observers' reactions to a service failure episode vented on Twitter.Design/methodology/approachIn a 2 × 2 experimental design, company response style (personalized vs automatic) and complaint source (ordinary Twitter user vs influencer) were manipulated to test the hypotheses.FindingsComplaint source moderates the effect of company response style on brand image, purchase intention and electronic word-of-mouth (eWOM). Thus, the authors found that a personalized response to a complaint, compared to an automatic response, leads to a more favorable brand image as well as purchase intention and eWOM intention when the complainant is an ordinary Twitter user. However, the automatic response, compared to the personalized one, is better perceived when the complainant is an influencer. The authors also found that service failure response attribution and the emotions elicited during the firm–complainant interaction mediate the previous effects.Research limitations/implicationsThis paper deals with the company's initial reaction after a complaint is posted on Twitter; however, the complaint-handling process is longer, and both the customer and silent observers await a resolution. Future research could tackle subsequent stages of the process and different recovery strategies.Practical implicationsThe study offers meaningful insights regarding complaint handling on Twitter and how the effectiveness of the company response style depends on the complaint source. Marketers should offer adapted personalized responses to prompt positive behavioral intentions for ordinary Twitter users, who represent prospective consumers. However, a personalized response given to an influencer may be perceived more negatively, as silent observers may interpret that the company offers such a response just because the complaint comes from a well-known person who can reach many users and not because of an honest interest in serving consumers.Originality/valueThis research focuses on the underresearched area of the impact of online complaints on silent observers, a large group of prospective consumers quietly exposed to complaints aired on Twitter. The underlying mechanisms are also identified.


2021 ◽  
Author(s):  
Natalie Schwob ◽  
Amanda J. Epping ◽  
Jared Taglialatela ◽  
Daniel J. Weiss

This paper is to appear in Animal Behavior and Cognition. ----- Pre-crastination refers to the propensity to initiate tasks at the earliest possible moment. Research with human adults has found that some individuals consistently chose to transport a nearby object a further distance rather than delay initiation of the transport to select an object closer to the target. This phenomenon has never been tested in animals using analogous methods. Consequently, we tested bonobos – the species most closely related to humans - using two versions of a comparable transport task. Overall, we found that all five bonobos tended to select the first object they encountered to transport to the goal. Unlike humans, the bonobos sometimes transported both available objects. Two of the five bonobos consistently pre-crastinated, a similar proportion to that found in human experiments. However, if the pre-crastination choice was non-functional, the bonobos chose the motorically efficient choice. In sum, our findings provide an existence proof for pre-crastination tendencies in some bonobos, akin to the distribution of this trait in humans. We discuss the possibility that the pre-crastination choice represents an automatic response triggered by the affordances of the objects encountered.


2021 ◽  
Author(s):  
Maayan Katzir ◽  
Eliran Halali

Previous research on social preferences has found that reciprocal behavior is an automatic response, which requires less cognitive control than self-interested behavior. However, research on unethicality has demonstrated that cognitive control is required to resist the temptation to benefit from engaging in an unethical act, thus suggesting that self-interested behaviors are automatic. By manipulating information asymmetry (i.e., advantage) among trust game receivers, we examined whether the automatic tendency to positively reciprocate a kind gesture is driven by a genuine motivation to be fair, or whether it reflects a motivation to appear fair. In an equal-information condition, we replicated previous findings by showing that limited cognitive control, due to ego-depletion, promotes reciprocal behavior (Experiments 1 & 2). However, this effect did not replicate under time-constraint, an additional manipulation to limit cognitive control (Experiment 3). Importantly, in an advantaged-information condition, under ego-depletion (Experiments 1 & 2) or time-constraint (Experiments 3 & 4) manipulation, participants did not exhibit enhanced reciprocity. Rather, in three out of these four experiments, and as confirmed by a meta-analysis that additionally included a pilot experiment, participants exploited their information advantage and positively reciprocated to a lesser extent than participants whose cognitive control was intact. These results suggest that the automatic preference for reciprocity might be more driven by a self-serving motivation to appear (rather than to be) fair than is typically credited. We further discuss various other findings supporting the notion that what may appear as automatic pro-sociality may in fact reflect an automatic self-serving motivation of self-presentation


2021 ◽  
pp. 174702182110071
Author(s):  
Baptist Liefooghe ◽  
Ariane Jim ◽  
Jan De Houwer

Automatic behaviour is supposedly underlain by the unintentional retrieval of processing episodes, which are stored during the repeated overt practice of a task or activity. In the present study, we investigated whether covertly practicing a task (e.g., repeatedly imagining responding to a stimulus) also leads to the storage of processing episodes and thus to automatic behaviour. Participants first either responded overtly or covertly to stimuli according to a first categorization task in a practice phase. We then measured the presence of automatic response-congruency effects in a subsequent test phase that involved a different categorization task but the same stimuli and responses. Our results indicate that covert practice can lead to a response-congruency effect. We conclude that covert practice can lead to automatic behaviour and discuss the different components of covert practice, such as motor imagery, visual imagery, and inner speech, that contribute to the formation of processing episodes in memory.


2021 ◽  
Vol 15 ◽  
Author(s):  
Sebastian P. H. Speer ◽  
Ale Smidts ◽  
Maarten A. S. Boksem

There is a long-standing debate regarding the cognitive nature of (dis)honesty: Is honesty an automatic response or does it require willpower in the form of cognitive control in order to override an automatic dishonest response. In a recent study (Speer et al., 2020), we proposed a reconciliation of these opposing views by showing that activity in areas associated with cognitive control, particularly the inferior frontal gyrus (IFG), helped dishonest participants to be honest, whereas it enabled cheating for honest participants. These findings suggest that cognitive control is not needed to be honest or dishonest per se but that it depends on an individual’s moral default. However, while our findings provided insights into the role of cognitive control in overriding a moral default, they did not reveal whether overriding honest default behavior (non-habitual dishonesty) is the same as overriding dishonest default behavior (non-habitual honesty) at the neural level. This speaks to the question as to whether cognitive control mechanisms are domain-general or may be context specific. To address this, we applied multivariate pattern analysis to compare neural patterns of non-habitual honesty to non-habitual dishonesty. We found that these choices are differently encoded in the IFG, suggesting that engaging cognitive control to follow the norm (that cheating is wrong) fundamentally differs from applying control to violate this norm.


Sign in / Sign up

Export Citation Format

Share Document