369 research outputs found

    Early time-locked gamma response and gender specificity

    Get PDF
    Cataloged from PDF version of article.The aim was to investigate whether gender is a causative factor in the gamma status according to which some individuals respond with time-locked, early gamma response, G+, while the others do not show this response, G-. The sample consisted of 42 volunteer participants (between 19 and 37 years of age with at least 9 years of education). There were 22 females and 20 males. Data were collected under the oddball paradigm. Auditory stimulation (10 ms r/f time, 50 ms duration, 65 dB SPL) consisted of target (2000 Hz; p = .20) stimuli that occurred randomly within a series of standard stimuli (1000 Hz; p = .80). Gamma responses were studied in the amplitude frequency characteristics, in the digitally filtered event-related potentials (f-ERPs) and in the distributions which were obtained using the recently developed time-frequency component analysis (TFCA) technique. Participants were classified into G+ and G- groups with a criterion of full agreement between the results of an automated gamma detection technique and expert opinion. The 2 × 2 × 2 ANOVA on f-ERPs and 2 × 2 × 2 multivariate ANOVA on TFCA distributions showed the main effect of gamma status and gender as significant, and the interaction between gamma status and gender as nonsignificant. Accordingly, individual difference in gamma status is a reliable phenomenon, but this does not depend on gender. There are conflicting findings in the literature concerning the effect of gender on ERP components (N100, P300). The present study showed that if the gamma status is not included in research designs, it may produce a confounding effect on ERP parameters. © 2005 Elsevier B.V. All rights reserved

    Empathy at Play:Embodying Posthuman Subjectivities in Gaming

    Get PDF
    In this article, we address the need for a posthuman account of the relationship between the avatar and player. We draw on a particular line of posthumanist theory associated closely with the work of Karen Barad, Rosi Braidotti and N. Katherine Hayles that suggests a constantly permeable, fluid and extended subjectivity, displacing the boundaries between human and other. In doing so, we propose a posthuman concept of empathy in gameplay, and we apply this concept to data from the first author’s 18-month ethnographic field notes of gameplay in the MMORPG World of Warcraft. Exploring these data through our analysis of posthuman empathy, we demonstrate the entanglement of avatar–player, machine–human relationship. We show how empathy allows us to understand this relationship as constantly negotiated and in process, producing visceral reactions in the intra-connected avatar–player subject as well as moments of co-produced in-game action that require ‘affective matching’ between subjective and embodied experiences. We argue that this account of the avatar–player relationship extends research in game culture, providing a horizontal, non-hierarchical discussion of its most necessary interaction

    The Use of Private Mobile Phones at War:Accounts From the Donbas Conflict

    Get PDF
    Studying technology use in unstable and life-threatening conditions can help highlight assumptions of use built into technologies and foreground contradictions in the design of devices and services. This paper provides an account of how soldiers, volunteers, and civilians use mobile technologies in wartime, reporting on fieldwork conducted in Western Russia and Eastern Ukraine with people close to or participating directly in the armed conflict in the Donbas region. We document how private mobile phones and computers became a crucial but ambiguous infrastructure despite their lack of durability in extreme conditions of a military conflict, and their government and military surveillance potential. Our participants rely on a combination of myths and significant technical knowledge to negotiate the possibilities mobile technologies offer and the life-threatening reality of enemy surveillance they engender. We consider the problems of always-on, always-connected devices under conditions of war and surveillance and our responsibilities as HCI practitioners in the design of social technologies

    Exploring the role of Facebook in re-shaping backpacker’s social interactions

    Get PDF
    The recent Facebook launch of Timeline, Social Graph Search, and the increased use of the mobile Facebook apps has resulted in some important implications for the use of Facebook by backpackers. The purpose of this paper is to (re) explore how Facebook has impacted social relationships between backpackers and their personal, professional, and ‘fellow traveller’ networks, particularly in-light of these recent changes to Facebook and the increased reduction of anonymity while travelling. An exploratory survey was administered to 216 backpackers through social media. Descriptive analysis was conducted to explore the perceived social risks and benefits of Facebook in the context of the backpacking experience

    Social navigation

    Get PDF
    In this chapter we present one of the pioneer approaches in supporting users in navigating the complex information spaces, social navigation support. Social navigation support is inspired by natural tendencies of individuals to follow traces of each other in exploring the world, especially when dealing with uncertainties. In this chapter, we cover details on various approaches in implementing social navigation support in the information space as we also connect the concept to supporting theories. The first part of this chapter reviews related theories and introduces the design space of social navigation support through a series of example applications. The second part of the chapter discusses the common challenges in design and implementation of social navigation support, demonstrates how these challenges have been addressed, and reviews more recent direction of social navigation support. Furthermore, as social navigation support has been an inspirational approach to various other social information access approaches we discuss how social navigation support can be integrated with those approaches. We conclude with a review of evaluation methods for social navigation support and remarks about its current state

    Troubling stories of the end of occupy : feminist narratives of betrayal at occupy Glasgow

    Get PDF
    This article offers a feminist take on the question of why Occupy camps closed down, in the form of a narrative analysis of interviews from participants in Occupy Glasgow. In response to the emergence of an activist discourse emphasising the role of external forces in camp closure and the existence of a longer-term legacy in terms of individual and community politicisation, I build here on feminist interventions that point instead to serious internal problems within the camps and thus to a more limited legacy. Interrogating the plotting, characterisation and denouement of interviewee narratives, I show that feminist participants in Occupy Glasgow characterise the trajectory of the camp as a tragedy, attribute responsibility for the camp’s demise to co-campers and sometimes to themselves, and present the outcome of Occupy Glasgow as limited, and in some cases even traumatic. This raises serious questions about the culmination and outcomes of Occupy in Glasgow and more generally, and indicates the extent of the hard work remaining if future mobilisation against neoliberal austerity is to be more inclusive and sustainable. The article closes by considering the theoretical implications for the wider question of why movements come to an end

    Context Is Everything Sociality and Privacy in Online Social Network Sites

    Full text link
    International audienceSocial Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymoron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of 'friend'. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network Sites

    An evidence review of face masks against COVID-19

    Get PDF
    The science around the use of masks by the public to impede COVID-19 transmission is advancing rapidly. In this narrative review, we develop an analytical framework to examine mask usage, synthesizing the relevant literature to inform multiple areas: population impact, transmission characteristics, source control, wearer protection, sociological considerations, and implementation considerations. A primary route of transmission of COVID-19 is via respiratory particles, and it is known to be transmissible from presymptomatic, paucisymptomatic, and asymptomatic individuals. Reducing disease spread requires two things: limiting contacts of infected individuals via physical distancing and other measures and reducing the transmission probability per contact. The preponderance of evidence indicates that mask wearing reduces transmissibility per contact by reducing transmission of infected respiratory particles in both laboratory and clinical contexts. Public mask wearing is most effective at reducing spread of the virus when compliance is high. Given the current shortages of medical masks, we recommend the adoption of public cloth mask wearing, as an effective form of source control, in conjunction with existing hygiene, distancing, and contact tracing strategies. Because many respiratory particles become smaller due to evaporation, we recommend increasing focus on a previously overlooked aspect of mask usage: mask wearing by infectious people ("source control") with benefits at the population level, rather than only mask wearing by susceptible people, such as health care workers, with focus on individual outcomes. We recommend that public officials and governments strongly encourage the use of widespread face masks in public, including the use of appropriate regulation

    Glatiramer Acetate Treatment Normalizes Deregulated microRNA Expression in Relapsing Remitting Multiple Sclerosis

    Get PDF
    The expression of selected microRNAs (miRNAs) known to be involved in the regulation of immune responses was analyzed in 74 patients with relapsing remitting multiple sclerosis (RRMS) and 32 healthy controls. Four miRNAs (miR-326, miR-155, miR-146a, miR-142-3p) were aberrantly expressed in peripheral blood mononuclear cells from RRMS patients compared to controls. Although expression of these selected miRNAs did not differ between treatment-naïve (n = 36) and interferon-beta treated RRMS patients (n = 18), expression of miR-146a and miR-142-3p was significantly lower in glatiramer acetate (GA) treated RRMS patients (n = 20) suggesting that GA, at least in part, restores the expression of deregulated miRNAs in MS
    corecore