SlideShare a Scribd company logo
1 of 38
Approaches to Studying
Attention
I. Classic Approaches
A. Dichotic Listening
B. The Cocktail Party Effect
I. Classic Approaches
A. Dichotic Listening – present auditory
information via stereo headphones,
participants shadowed (e.g. repeated)
the information from one ear
Cherry (1953)
I. Classic Approaches
A. Dichotic Listening – present auditory
information via stereo headphones,
participants shadowed (e.g. repeated)
the information from one ear
1. Participants could report minimal information
about the unattended message
2. Sex of the speaker and speech vs. Noise
3. Led to filter theories of attention
I. Classic Approaches
B. The Cocktail Party Effect
- subjects can recognize
their own name in the
unattended channel
(Moray, 1959)
II. Sustained Attention
A. Vigilance Tasks
B. Signal Detection Analysis
C. Applications of Sustained Attention
II. Sustained Attention
A. Vigilance – refers to a person’s ability to attend to an
area in which a stimulus may appear of long periods of
time.
II. Sustained Attention
B. Signal Detection
1. Signal-Detection Theory (SDT) – concerns
our ability to detect the presence of a
“signal”
a. “Signal” can be a sound, light, letter in a group of
distracter letters, tumor in an x-ray
b. Four possible outcomes…
1. Signal-Detection Theory
Signal
Present
Signal Absent
“YES” HIT FALSE
ALARM
“NO” MISS CORRECT
REJECTION
Observer
Response
II. Sustained Attention
B. Signal Detection
1. Signal-Detection Theory (SDT) – concerns
our ability to detect the presence of a
“signal”
a. “Signal” can be a sound, light, letter in a group of
distracter letters, tumor in an x-ray
b. Four possible outcomes…
c. Performance is determined by how difficult it is to
detect a stimulus and the observer’s bias
(criterion) - e.g. their willingness to make a false
alarm vs. a miss
II. Sustained Attention
B. Signal Detection
c. Performance is determined by how difficult it is to
detect a stimulus and the observer’s bias – e.g.
their willingness to make a false alarm vs. a miss
d. A liberal observer will make more false alarms,
but have fewer misses
e. A conservative observer will have fewer false
alarms, but more misses
f. Examples
II. Sustained Attention
C. Applications of Sustained Attention
1. Air traffic control, military radar operator, plant
operator, airport screening
2. Studies demonstrate reduced hit rates over time (e.g.
increased misses) – due to changes in bias (criterion)
3. Training and technology can assist in overcoming this
change in bias
4. In one study, we found abstinent smokers were more
likely to miss a target during a vigilance task
5. In other research, we found a negative relationship
between androgens and vigilance performance
III. Selective Attention
A. Selective Attention refers to the ability to
focus attention on a specific object,
location, message or other stimulus
B. Requires an allocation of attentional
resources
1. We have limited cognitive resources to
allocate to tasks
2. Cognitive load is the amount of resources
required to carry out a task
3. Automatic tasks use fewer resources
III. Selective Attention
C. Examples of Selective Attention Tasks
1. Dichotic listening
2. Flanker Task
3. Stroop Task
Flanker Task
Participants instructed to press the ‘z’key
when A or B are the center letter or ‘m’
when C or D and ignore the ‘flankers’
Compatible Trial B A B
Incompatible C A C
Neutral X A X
Stroop Task
GREEN RED BLUE
BLUE ORANGE YELLOW
RED BLUE GREEN
ORANGE GREEN RED
YELLOW BLUE ORANGE
RED YELLOW BLUE
GREEN RED YELLOW
YELLOW GREEN ORANGE
IV. Visual Attention
A. Spatial Orienting
1. Posner Cueing paradigm
2. Evidence that the ignored locations are
inhibited
B. Object Orienting
IV. Visual Attention
A. Spatial Orienting
1. Posner Cueing paradigm
2. Evidence that the ignored locations are inhibited
3. Location based attention part of the where pathway
B. Object Orienting
1. A distinct system for directing attention to objects
2. The object orienting system is part of the what
pathway
V. Feature Integration Theory
A. Visual Search – refers to scanning the
environment for particular features
1. Performance will depend on the target and
background (e.g. distracters)
2. Examples
V. Feature Integration Theory
A. Visual Search – refers to scanning the
environment for particular features
1. Performance will depend on the target and
background (e.g. distracters)
2. Examples
3. A feature search occurs when only a single
feature is required to detect the target
V. Feature Integration Theory
A. Visual Search
3. A feature search
occurs when only
a single feature is
required to detect
the target – aka
“pop-out”
V. Feature Integration Theory
A. Visual Search
3. A feature search
occurs when only a
single feature is
required to detect the
target – aka “pop-
out”
4. A conjunction search
is required when two
features must be
used in conjunction
to detect the target
V. Feature Integration Theory
A. Visual Search
3. A feature search occurs when only a
single feature is required to detect the
target – aka “pop-out”
4. A conjunction search is required when
two features must be used in conjunction
to detect the target
B. Feature-Integration Theory – explains
the ease of feature searches compared
to conjunction searches
V. Feature Integration Theory
B. Feature-Integration Theory – explains the ease
of feature searches compared to conjunction
searches
1. Each feature associated with a “mental
map” across the visual field
2. For every stimulus, the features are
represented immediately, simultaneously
and pre-attentively
3. During a feature search, we monitor the
relevant map for the presence of the
feature
4. This can be done in parallel (all at once)
5. Thus feature searches are independent of
the size of the display
V. Feature Integration Theory
B. Feature-Integration Theory
3. During a feature search, we monitor the
relevant map for the presence of the
feature
4. This can be done in parallel (all at once)
5. Thus feature searches are independent of
the size of the display
6. In a conjunction search, for each object
the features must be bound together
7. Use our attentional resources to
accomplish feature binding
8. Conjunction searches are therefore
carried out sequentially – one object at a
time
VI. Attention and Visual
Perception
A. Inattentional Blindness
1. Neisser – the girl with the umbrella
2. Paying attention to one aspect of a visual scene
makes one ‘blind’ to the other aspects of the
scene
B. Change-Blindness
VI. Attention and Visual
Perception
C. Inhibitory Accounts of Visual Attention
1. Attention is directed to objects, locations or
different aspects of a stimulus (Stroop)
2. The ignored stimuli are actively inhibited
3. This is shown by increased RTs
4. Evidence
• Negative priming – Tipper (1985)
• Spatial Orienting – Posner et al (1980)
• Stroop Effect
VII. Divided Attention – Capacity
Theories
A. Aim – to explain how we can perform
more than one task at a time, e.g. dual-
task performance
B. View
1. General, limited pool of resources
2. The amount of cognitive resources required
by a task depends on how complex the task
is (task complexity)
VII. Divided Attention – Capacity
Theories
B. View
1. General, limited pool of resources
2. The amount of cognitive resources required
by a task depends on how complex the task
is (task complexity)
3. Allocation of Resources – when the pool of
resources is insufficient, must allocate
resources – some tasks may suffer
VII. Divided Attention – Capacity
Theories
B. View
3. Allocation of Resources – when the pool of
resources is insufficient, must allocate
resources – some tasks may suffer
4. Allocation Policy – how do we allocate?
• Enduring dispositions – “built-in” stimuli that will
always capture our attention
• Momentary intentions – situational dispositions to
allocate resources depending on the situation
VII. Divided Attention – Capacity
Theories
B. View
4. Allocation Policy – how do we allocate?
• Enduring dispositions – “built-in” stimuli that will
always capture our attention
• Momentary intentions – situational dispositions to
allocate resources depending on the situation
C. Predictions
1. Can attend to more than one thing so long
as resources not exceeded
C. Divided Attention – Capacity
Theories
C. Predictions
1. Can attend to more than one thing so long
as resources not exceeded
2. Performance on one task will decline if the
resource pool is exceeded
3. The system is flexible
D. Automaticity is key – well practiced tasks
require fewer resources
VIII. Applications of Attention
Remember, attention
like all cognitive
processes has limits
Any additional tasks
take away resources
from other tasks
Cell phones and
driving
VIII. Applications of Attention
Remember, attention
like all cognitive
processes has limits
Any additional tasks
take away resources
from other tasks
Cell phones and
driving
Heads-up displays –
inhibitory accounts…

More Related Content

Similar to approachestoattention-4.ppt

Advange-and-Disadvantages-of-descritive-method-report.pptx
Advange-and-Disadvantages-of-descritive-method-report.pptxAdvange-and-Disadvantages-of-descritive-method-report.pptx
Advange-and-Disadvantages-of-descritive-method-report.pptx
abdurakibtingsonjali
 
Foundation of education (1)
Foundation of education (1)Foundation of education (1)
Foundation of education (1)
Arneyo
 
Attention
Attention Attention
Attention
gsjus
 

Similar to approachestoattention-4.ppt (20)

Data collection techniques
Data collection techniquesData collection techniques
Data collection techniques
 
Observation
ObservationObservation
Observation
 
Cognitive psychology
Cognitive psychologyCognitive psychology
Cognitive psychology
 
Advange-and-Disadvantages-of-descritive-method-report.pptx
Advange-and-Disadvantages-of-descritive-method-report.pptxAdvange-and-Disadvantages-of-descritive-method-report.pptx
Advange-and-Disadvantages-of-descritive-method-report.pptx
 
Qualitative Research
Qualitative ResearchQualitative Research
Qualitative Research
 
Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)
 
Observation Method
Observation Method Observation Method
Observation Method
 
Observation Method
Observation MethodObservation Method
Observation Method
 
Observation: tool for data collection
Observation: tool for data collectionObservation: tool for data collection
Observation: tool for data collection
 
Qualitative research
Qualitative researchQualitative research
Qualitative research
 
Naturalistic observation pesentation.pptx
Naturalistic observation pesentation.pptxNaturalistic observation pesentation.pptx
Naturalistic observation pesentation.pptx
 
The Nature of Science
The Nature of ScienceThe Nature of Science
The Nature of Science
 
Organizational Behaviour - Individual Determinants of OB II
Organizational Behaviour - Individual Determinants of OB IIOrganizational Behaviour - Individual Determinants of OB II
Organizational Behaviour - Individual Determinants of OB II
 
Urban Neighbourhood Analysis (UNA) using Mixed Method Research Design
Urban Neighbourhood Analysis (UNA) using Mixed Method Research DesignUrban Neighbourhood Analysis (UNA) using Mixed Method Research Design
Urban Neighbourhood Analysis (UNA) using Mixed Method Research Design
 
What is qualitative research? Discuss the methods of qualitative research.pdf
What is qualitative research?  Discuss the methods of qualitative research.pdfWhat is qualitative research?  Discuss the methods of qualitative research.pdf
What is qualitative research? Discuss the methods of qualitative research.pdf
 
Descriptive
DescriptiveDescriptive
Descriptive
 
Science
ScienceScience
Science
 
Foundation of education (1)
Foundation of education (1)Foundation of education (1)
Foundation of education (1)
 
Attention
Attention Attention
Attention
 
Role_of_Statistics_in_Geography.ppt
Role_of_Statistics_in_Geography.pptRole_of_Statistics_in_Geography.ppt
Role_of_Statistics_in_Geography.ppt
 

Recently uploaded

Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
Areesha Ahmad
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Lokesh Kothari
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Sérgio Sacani
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
Sérgio Sacani
 

Recently uploaded (20)

High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 

approachestoattention-4.ppt

  • 2. I. Classic Approaches A. Dichotic Listening B. The Cocktail Party Effect
  • 3. I. Classic Approaches A. Dichotic Listening – present auditory information via stereo headphones, participants shadowed (e.g. repeated) the information from one ear
  • 5. I. Classic Approaches A. Dichotic Listening – present auditory information via stereo headphones, participants shadowed (e.g. repeated) the information from one ear 1. Participants could report minimal information about the unattended message 2. Sex of the speaker and speech vs. Noise 3. Led to filter theories of attention
  • 6. I. Classic Approaches B. The Cocktail Party Effect - subjects can recognize their own name in the unattended channel (Moray, 1959)
  • 7. II. Sustained Attention A. Vigilance Tasks B. Signal Detection Analysis C. Applications of Sustained Attention
  • 8. II. Sustained Attention A. Vigilance – refers to a person’s ability to attend to an area in which a stimulus may appear of long periods of time.
  • 9. II. Sustained Attention B. Signal Detection 1. Signal-Detection Theory (SDT) – concerns our ability to detect the presence of a “signal” a. “Signal” can be a sound, light, letter in a group of distracter letters, tumor in an x-ray b. Four possible outcomes…
  • 10. 1. Signal-Detection Theory Signal Present Signal Absent “YES” HIT FALSE ALARM “NO” MISS CORRECT REJECTION Observer Response
  • 11. II. Sustained Attention B. Signal Detection 1. Signal-Detection Theory (SDT) – concerns our ability to detect the presence of a “signal” a. “Signal” can be a sound, light, letter in a group of distracter letters, tumor in an x-ray b. Four possible outcomes… c. Performance is determined by how difficult it is to detect a stimulus and the observer’s bias (criterion) - e.g. their willingness to make a false alarm vs. a miss
  • 12. II. Sustained Attention B. Signal Detection c. Performance is determined by how difficult it is to detect a stimulus and the observer’s bias – e.g. their willingness to make a false alarm vs. a miss d. A liberal observer will make more false alarms, but have fewer misses e. A conservative observer will have fewer false alarms, but more misses f. Examples
  • 13. II. Sustained Attention C. Applications of Sustained Attention 1. Air traffic control, military radar operator, plant operator, airport screening 2. Studies demonstrate reduced hit rates over time (e.g. increased misses) – due to changes in bias (criterion) 3. Training and technology can assist in overcoming this change in bias 4. In one study, we found abstinent smokers were more likely to miss a target during a vigilance task 5. In other research, we found a negative relationship between androgens and vigilance performance
  • 14. III. Selective Attention A. Selective Attention refers to the ability to focus attention on a specific object, location, message or other stimulus B. Requires an allocation of attentional resources 1. We have limited cognitive resources to allocate to tasks 2. Cognitive load is the amount of resources required to carry out a task 3. Automatic tasks use fewer resources
  • 15. III. Selective Attention C. Examples of Selective Attention Tasks 1. Dichotic listening 2. Flanker Task 3. Stroop Task
  • 16. Flanker Task Participants instructed to press the ‘z’key when A or B are the center letter or ‘m’ when C or D and ignore the ‘flankers’ Compatible Trial B A B Incompatible C A C Neutral X A X
  • 17. Stroop Task GREEN RED BLUE BLUE ORANGE YELLOW RED BLUE GREEN ORANGE GREEN RED YELLOW BLUE ORANGE RED YELLOW BLUE GREEN RED YELLOW YELLOW GREEN ORANGE
  • 18. IV. Visual Attention A. Spatial Orienting 1. Posner Cueing paradigm 2. Evidence that the ignored locations are inhibited B. Object Orienting
  • 19. IV. Visual Attention A. Spatial Orienting 1. Posner Cueing paradigm 2. Evidence that the ignored locations are inhibited 3. Location based attention part of the where pathway B. Object Orienting 1. A distinct system for directing attention to objects 2. The object orienting system is part of the what pathway
  • 20. V. Feature Integration Theory A. Visual Search – refers to scanning the environment for particular features 1. Performance will depend on the target and background (e.g. distracters) 2. Examples
  • 21.
  • 22.
  • 23.
  • 24. V. Feature Integration Theory A. Visual Search – refers to scanning the environment for particular features 1. Performance will depend on the target and background (e.g. distracters) 2. Examples 3. A feature search occurs when only a single feature is required to detect the target
  • 25. V. Feature Integration Theory A. Visual Search 3. A feature search occurs when only a single feature is required to detect the target – aka “pop-out”
  • 26. V. Feature Integration Theory A. Visual Search 3. A feature search occurs when only a single feature is required to detect the target – aka “pop- out” 4. A conjunction search is required when two features must be used in conjunction to detect the target
  • 27. V. Feature Integration Theory A. Visual Search 3. A feature search occurs when only a single feature is required to detect the target – aka “pop-out” 4. A conjunction search is required when two features must be used in conjunction to detect the target B. Feature-Integration Theory – explains the ease of feature searches compared to conjunction searches
  • 28. V. Feature Integration Theory B. Feature-Integration Theory – explains the ease of feature searches compared to conjunction searches 1. Each feature associated with a “mental map” across the visual field 2. For every stimulus, the features are represented immediately, simultaneously and pre-attentively 3. During a feature search, we monitor the relevant map for the presence of the feature 4. This can be done in parallel (all at once) 5. Thus feature searches are independent of the size of the display
  • 29. V. Feature Integration Theory B. Feature-Integration Theory 3. During a feature search, we monitor the relevant map for the presence of the feature 4. This can be done in parallel (all at once) 5. Thus feature searches are independent of the size of the display 6. In a conjunction search, for each object the features must be bound together 7. Use our attentional resources to accomplish feature binding 8. Conjunction searches are therefore carried out sequentially – one object at a time
  • 30. VI. Attention and Visual Perception A. Inattentional Blindness 1. Neisser – the girl with the umbrella 2. Paying attention to one aspect of a visual scene makes one ‘blind’ to the other aspects of the scene B. Change-Blindness
  • 31. VI. Attention and Visual Perception C. Inhibitory Accounts of Visual Attention 1. Attention is directed to objects, locations or different aspects of a stimulus (Stroop) 2. The ignored stimuli are actively inhibited 3. This is shown by increased RTs 4. Evidence • Negative priming – Tipper (1985) • Spatial Orienting – Posner et al (1980) • Stroop Effect
  • 32. VII. Divided Attention – Capacity Theories A. Aim – to explain how we can perform more than one task at a time, e.g. dual- task performance B. View 1. General, limited pool of resources 2. The amount of cognitive resources required by a task depends on how complex the task is (task complexity)
  • 33. VII. Divided Attention – Capacity Theories B. View 1. General, limited pool of resources 2. The amount of cognitive resources required by a task depends on how complex the task is (task complexity) 3. Allocation of Resources – when the pool of resources is insufficient, must allocate resources – some tasks may suffer
  • 34. VII. Divided Attention – Capacity Theories B. View 3. Allocation of Resources – when the pool of resources is insufficient, must allocate resources – some tasks may suffer 4. Allocation Policy – how do we allocate? • Enduring dispositions – “built-in” stimuli that will always capture our attention • Momentary intentions – situational dispositions to allocate resources depending on the situation
  • 35. VII. Divided Attention – Capacity Theories B. View 4. Allocation Policy – how do we allocate? • Enduring dispositions – “built-in” stimuli that will always capture our attention • Momentary intentions – situational dispositions to allocate resources depending on the situation C. Predictions 1. Can attend to more than one thing so long as resources not exceeded
  • 36. C. Divided Attention – Capacity Theories C. Predictions 1. Can attend to more than one thing so long as resources not exceeded 2. Performance on one task will decline if the resource pool is exceeded 3. The system is flexible D. Automaticity is key – well practiced tasks require fewer resources
  • 37. VIII. Applications of Attention Remember, attention like all cognitive processes has limits Any additional tasks take away resources from other tasks Cell phones and driving
  • 38. VIII. Applications of Attention Remember, attention like all cognitive processes has limits Any additional tasks take away resources from other tasks Cell phones and driving Heads-up displays – inhibitory accounts…