1. The document discusses how social psychology and behavioral economics have shown that human behaviors are sometimes driven by unconscious decision mechanisms and the perception of social signals unconsciously emitted during interactions.
2. It presents the thin-slice theory, which demonstrates that short snippets of nonverbal behavior can accurately predict important outcomes.
3. The document argues that computer vision and models of human behavior could benefit from incorporating insights about social signaling and seeing people as existing in a social context rather than as isolated individuals. Understanding social signals may enhance artificial perception of human activities and interactions.
Presented by Mike Forte at the Dorset NLP Forum, Thursday May 31st 2012.
Drawing out the common ground between the Jung-Graves model and Spiral Dynamics.
Presented by Mike Forte at the Dorset NLP Forum, Thursday May 31st 2012.
Drawing out the common ground between the Jung-Graves model and Spiral Dynamics.
Zombies or Cyborgs: is Facebook Eating Your Brain?guestcf1e8d8
While some present the dawn of the social web as a doomsday, we believe that social media technologies represent a secondary revolution to that described above by cyborg cognition theorist Andy Clark. Trapped within this debate lies the brain; recent advances in the neurosciences have thrown open our concept of the brain, revealing a neural substrate that is highly flexible and plastic (Green and Bavelier 2008). This phenomenal level of plasticity likely underpins much of what separates us from the animal kingdom, through a profound enhancement of our ability to use new technologies and their cultural co-products (Clark and Chalmers 1998; Schoenemann, et al. 2005; Shaw, et al. 2006). Yet many fear that this plasticity represents a precise threat to our cognitive stability in light of the technological invasion of Twitter-like websites. By investigating how the brain changes as we undergo profound self alteration via digital meditation, we can begin to unravel the biological mysteries of plasticity that underpin a vast array of issues in the humanities and social sciences.
Zombies or Cyborgs: Is Facebook Eating Your Brain?Micah Allen
In this talk, I review recent findings in neuroplasticity as well as basic methods for measuring functional and structural plasticity in the human brain. I apply insights from these findings to debate concerning the neurocognitive impact of our rising uses of social media networks. This talk reviews my ongoing empirical research in this area and ultimately suggest that we can reject the 'zombies' in favor of the adaptive social cyborg view of mind.
Join us as HBO hosts the IA/UX Meetup with Brian Cugelman, PhD. He will discuss how to design technologies that are more satisfying and persuasive, through applying simple strategies based on psychology and neuroscience.
You’ll enjoy a quick overview of Brian’s latest research on the neurochemistry of user cognition, emotion and behavior, with a focus on practical applications for websites, apps and digital campaigns.
Brian will discuss the intersection between emotion and technology, and show you how to translate a few simple concepts from psychology and neuroscience into interactive design strategies and practices.
Seattle Information Architecture & User Experience Meetup:
https://www.meetup.com/SeattleUX/events/235001579/
Security Is Like An Onion, That's Why It Makes You CryMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, vulnerability and compliance tools and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry. The one thing you can depend upon in an enterprise is that many of our users, even with training, will still make the wrong choices. They still click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc'. But what if this isn't because users hate us or are too stupid? What if all our complaints about not being heard and our instructions regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
Facial Expression Recognition System: A Digital Printing Applicationijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Zombies or Cyborgs: is Facebook Eating Your Brain?guestcf1e8d8
While some present the dawn of the social web as a doomsday, we believe that social media technologies represent a secondary revolution to that described above by cyborg cognition theorist Andy Clark. Trapped within this debate lies the brain; recent advances in the neurosciences have thrown open our concept of the brain, revealing a neural substrate that is highly flexible and plastic (Green and Bavelier 2008). This phenomenal level of plasticity likely underpins much of what separates us from the animal kingdom, through a profound enhancement of our ability to use new technologies and their cultural co-products (Clark and Chalmers 1998; Schoenemann, et al. 2005; Shaw, et al. 2006). Yet many fear that this plasticity represents a precise threat to our cognitive stability in light of the technological invasion of Twitter-like websites. By investigating how the brain changes as we undergo profound self alteration via digital meditation, we can begin to unravel the biological mysteries of plasticity that underpin a vast array of issues in the humanities and social sciences.
Zombies or Cyborgs: Is Facebook Eating Your Brain?Micah Allen
In this talk, I review recent findings in neuroplasticity as well as basic methods for measuring functional and structural plasticity in the human brain. I apply insights from these findings to debate concerning the neurocognitive impact of our rising uses of social media networks. This talk reviews my ongoing empirical research in this area and ultimately suggest that we can reject the 'zombies' in favor of the adaptive social cyborg view of mind.
Join us as HBO hosts the IA/UX Meetup with Brian Cugelman, PhD. He will discuss how to design technologies that are more satisfying and persuasive, through applying simple strategies based on psychology and neuroscience.
You’ll enjoy a quick overview of Brian’s latest research on the neurochemistry of user cognition, emotion and behavior, with a focus on practical applications for websites, apps and digital campaigns.
Brian will discuss the intersection between emotion and technology, and show you how to translate a few simple concepts from psychology and neuroscience into interactive design strategies and practices.
Seattle Information Architecture & User Experience Meetup:
https://www.meetup.com/SeattleUX/events/235001579/
Security Is Like An Onion, That's Why It Makes You CryMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, vulnerability and compliance tools and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry. The one thing you can depend upon in an enterprise is that many of our users, even with training, will still make the wrong choices. They still click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc'. But what if this isn't because users hate us or are too stupid? What if all our complaints about not being heard and our instructions regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
Facial Expression Recognition System: A Digital Printing Applicationijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Facial Expression Recognition System: A Digital Printing Applicationijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Chapter 7Thinking and IntelligenceFigure 7.1 Thinking .docxrobertad6
Chapter 7
Thinking and Intelligence
Figure 7.1 Thinking is an important part of our human experience, and one that has captivated people for centuries.
Today, it is one area of psychological study. The 19th-century Girl with a Book by José Ferraz de Almeida Júnior, the
20th-century sculpture The Thinker by August Rodin, and Shi Ke’s 10th-century painting Huike Thinking all reflect the
fascination with the process of human thought. (credit “middle”: modification of work by Jason Rogers; credit “right”:
modification of work by Tang Zu-Ming)
Chapter Outline
7.1 What Is Cognition?
7.2 Language
7.3 Problem Solving
7.4 What Are Intelligence and Creativity?
7.5 Measures of Intelligence
7.6 The Source of Intelligence
Introduction
Why is it so difficult to break habits—like reaching for your ringing phone even when you shouldn’t, such
as when you’re driving? How does a person who has never seen or touched snow in real life develop an
understanding of the concept of snow? How do young children acquire the ability to learn language with
no formal instruction? Psychologists who study thinking explore questions like these.
Cognitive psychologists also study intelligence. What is intelligence, and how does it vary from person
to person? Are “street smarts” a kind of intelligence, and if so, how do they relate to other types of
intelligence? What does an IQ test really measure? These questions and more will be explored in this
chapter as you study thinking and intelligence.
In other chapters, we discussed the cognitive processes of perception, learning, and memory. In this
chapter, we will focus on high-level cognitive processes. As a part of this discussion, we will consider
thinking and briefly explore the development and use of language. We will also discuss problem solving
and creativity before ending with a discussion of how intelligence is measured and how our biology
and environments interact to affect intelligence. After finishing this chapter, you will have a greater
appreciation of the higher-level cognitive processes that contribute to our distinctiveness as a species.
Chapter 7 | Thinking and Intelligence 217
7.1 What Is Cognition?
Learning Objectives
By the end of this section, you will be able to:
• Describe cognition
• Distinguish concepts and prototypes
• Explain the difference between natural and artificial concepts
Imagine all of your thoughts as if they were physical entities, swirling rapidly inside your mind. How is it
possible that the brain is able to move from one thought to the next in an organized, orderly fashion? The
brain is endlessly perceiving, processing, planning, organizing, and remembering—it is always active. Yet,
you don’t notice most of your brain’s activity as you move throughout your daily routine. This is only one
facet of the complex processes involved in cognition. Simply put, cognition is thinking, and it encompasses
the processes associated with perception, knowledge, problem solving, judgment, langu.
Chapter 7Thinking and IntelligenceFigure 7.1 Thinking .docxmccormicknadine86
Chapter 7
Thinking and Intelligence
Figure 7.1 Thinking is an important part of our human experience, and one that has captivated people for centuries.
Today, it is one area of psychological study. The 19th-century Girl with a Book by José Ferraz de Almeida Júnior, the
20th-century sculpture The Thinker by August Rodin, and Shi Ke’s 10th-century painting Huike Thinking all reflect the
fascination with the process of human thought. (credit “middle”: modification of work by Jason Rogers; credit “right”:
modification of work by Tang Zu-Ming)
Chapter Outline
7.1 What Is Cognition?
7.2 Language
7.3 Problem Solving
7.4 What Are Intelligence and Creativity?
7.5 Measures of Intelligence
7.6 The Source of Intelligence
Introduction
Why is it so difficult to break habits—like reaching for your ringing phone even when you shouldn’t, such
as when you’re driving? How does a person who has never seen or touched snow in real life develop an
understanding of the concept of snow? How do young children acquire the ability to learn language with
no formal instruction? Psychologists who study thinking explore questions like these.
Cognitive psychologists also study intelligence. What is intelligence, and how does it vary from person
to person? Are “street smarts” a kind of intelligence, and if so, how do they relate to other types of
intelligence? What does an IQ test really measure? These questions and more will be explored in this
chapter as you study thinking and intelligence.
In other chapters, we discussed the cognitive processes of perception, learning, and memory. In this
chapter, we will focus on high-level cognitive processes. As a part of this discussion, we will consider
thinking and briefly explore the development and use of language. We will also discuss problem solving
and creativity before ending with a discussion of how intelligence is measured and how our biology
and environments interact to affect intelligence. After finishing this chapter, you will have a greater
appreciation of the higher-level cognitive processes that contribute to our distinctiveness as a species.
Chapter 7 | Thinking and Intelligence 217
7.1 What Is Cognition?
Learning Objectives
By the end of this section, you will be able to:
• Describe cognition
• Distinguish concepts and prototypes
• Explain the difference between natural and artificial concepts
Imagine all of your thoughts as if they were physical entities, swirling rapidly inside your mind. How is it
possible that the brain is able to move from one thought to the next in an organized, orderly fashion? The
brain is endlessly perceiving, processing, planning, organizing, and remembering—it is always active. Yet,
you don’t notice most of your brain’s activity as you move throughout your daily routine. This is only one
facet of the complex processes involved in cognition. Simply put, cognition is thinking, and it encompasses
the processes associated with perception, knowledge, problem solving, judgment, langu ...
Contemporary Challenges for a Social Signal processing cscpconf
This paper provides a short overview of Social Signal Processing. The exploration of how we react to the world and interact with it and each other remains one of the greatest scientific challenges. Latest research trends in cognitive sciences argue that our common view of intelligence is too narrow, ignoring a crucial range of abilities that matter immensely for how people do in life. This range of abilities is called social intelligence and includes the ability to express and recognize social signals produced during social interactions like agreement, politeness, empathy, friendliness, conflict, etc., coupled with the ability to manage them in to get along well with others while winning their cooperation. Social Signal Processing (SSP) is the new research domain that aims at understanding and modeling social interactions (human-science goals), and at providing computers with similar abilities in human-computer interaction scenarios (technological goals). SSP is in its infancy and the journey towards artificial social intelligence and socially-aware computing is still long, the paper outlines its future perspectives and some of its most promising applications.
Summary of the Persuasive Technology 2009 conference, presented at the Mini-UPA (Boston UPA chapter) conference on May 26, 2009 by Carolyn Snyder, PT 09 attendee.
A New Model: Advancing Organizational Security Through PeacebuildingMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, and vulnerability and compliance tools, and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry.
The one thing you can depend upon in an enterprise is that many of your users, even with training, will still make the wrong choices. They will violate BYOD restrictions, click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc. But what if this isn't because users hate us or are too stupid? What if all our ignored policies and procedures regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
Humans are wired to be emotional beings. Emotions influence most of our decisions, good and bad. In failing to understand how this is at the root of user non-compliance, no matter how much money we spend on expensive hardware and software, we will fail to achieve the goal of good organizational security.
IBDisc3.0instructionswe will discuss how cultural issues coul.docxwilcockiris
IBDisc3.0instructions
we will discuss how cultural issues could impact different business situations. Address the following questions:
· Do you think the impact of cultural diversity is positive or negative? What, if anything, can management do mitigate any negative impact or build upon a positive impact?
· In your opinion, should the "outsider" change his/her behavior or should the "local" work to be understanding?
· When looking at language and communication as they apply to international management, which do you see as more important – language or communication? Should business people be fluent in a second language?
· How does understanding the communications context of countries impact our business relationships and meetings?
· Why would this be important to negotiations and other business transactions?
Please use at least 3 scholarly sources and cite using APA format. Make at least 400 words.
Assessment Key for Sections 1 through 4:
1
2
3
4
Unacceptable
Several pieces of key information were missing and many of the explanations were poor/unclear
Needs Work
One or two pieces of key information were omitted and/or some of the explanation was unclear
Good
All of the information was included and explained clearly with a minor omission
Superior
All information was included, was very clearly explained (and presentation was enhanced in some way)
Section 1. Introduction. This should include:
Presenters’ names
The title and author(s) of the article
A clear statement of the purpose of the study and statement of the authors' hypothesis or hypotheses
A brief review of previous research setting the stage for the present investigation
Definition of vocabulary that will be important for your audience in understanding the article
Overall quality of this section of presentation:
1 2 3 4
Unacceptable Acceptable Good Superior
Section 2. The research design and data collected. This section should include:
A description of the participants
A description of the tasks that participants were given (and why they were given them)
A description of the order of tasks and how they were administered
An explanation of the data that were collected
An explanation of why the study was designed this way (how it enables the researchers to test their
hypothesis/hypotheses)
Overall quality of this section of presentation:
1 2 3 4
Unacceptable Acceptable Good Superior
Section 3. Results. This section should include:
Presentation and explanation of the data
Graphs/tables/figures to aid in the explanation (make sure you EXPLAIN what these show)
Whether the hypothesis was supported and what that means
Overall quality of this section of presentation:
1 2 3 4
Unacceptable Acceptable Good Superior
Section 4. Conclusions/Discussion related to the article. This section should include:.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
4. Computación y señales sociales
Pág. 4
Index
A new look to human behavior
A new opportunity for machine perception
A new opportunity for machine perception
Social Signals Processing
Social Signals Processing
5. Computación y señales sociales
Pág. 5
A new look to human behavior
Racism and racial segregation.
The thin‐slice theory
y
FROM TWO APPARENTLY NON CONNECTED
FROM TWO APPARENTLY NON‐CONNECTED
TOPICS TO A NEW COMPUTING PARADIGM…
7. Computación y señales sociales
Pág. 7
Nobel Prize winner Thomas C. Schelling in a 1971
article applied game theory to explain on a
explain,
hypothetical level, how racially mixed neighborhoods
could quickly become segregated even if the people
segregated,
involved are not very segregationist.
9. Computación y señales sociales
Pág. 9
THE BIRTH OF SOCIAL PHYSICS/NETWORK SCIENCE
Schelling’s game implies that social outcomes needn’t,
at least in some cases, reflect in any obvious way the
l i fl i b i h
desires or intentions, habits or attitudes of anyone
at all.
t ll
His implicit point is that social happenings can have
Hi i li i i i h i lh i h
simple origins and are subject to laws not unlike
those of physics (complexity, network analysis,
small world effects, power laws, etc.)
12. Computación y señales sociales
Pág. 12
THE EXPERIMENT
In a 1993 study published in the Journal of Personality and Social
Psychology (V l 64 N 3) A b d and a colleague videotaped
P h l (Vol. 64, No. 3), Ambady d ll id t d
13 graduate teaching fellows as they taught their classes.
She then took three random 10‐second clips from each tape,
combined them into one 30‐second clip for each teacher and
showed the silent clips to students who did not know the
teachers. Students assigned a rate to each teacher.
g
THIN SLICE of BEHAVIOR
Then, Ambady correlated that rating with the teachers' end‐of‐
, y g
semester evaluations from actual students.
13. Computación y señales sociales
Pág. 13
THE RESULT
THE RESULT
"We were shocked at how high the correlation
g
was," she says. It was 0.76. In social psychology
anything above 0.6 is considered very strong.
y g y g
These results have been re‐validated in several experiments
and extended to other tasks and environments.
14. Computación y señales sociales
Pág. 14
THIN SLICING and PERCEPTION
What is important is not what we say but
how we behave d i
h b h during the interaction.
h i i
Voice Face Body
Characteristics Expressions Head Postures
Pitch Frowningg
Loudness Head Nod
Head Nod
Smiling Head Shake
Speaking rate Lip‐Pout
Turn taking Head Tilt‐back
Tense‐Mouth …
… …
Body Gestures
y
Gaze Shoulder shrug
Forward lean
Who is she looking at? Hand behind head
Gaze dynamics …
Conjugate lateral eye movement
Fast blink
…
15. Computación y señales sociales
Pág. 15
THIN SLICING THEORY
Thin slices have been shown to have predictive
validity in a number of different contexts:
• teaching (teacher expectancy on students
teaching (teacher expectancy on students,
teacher bias, teacher effectiveness),
• learning (student achievement),
learning (student achievement),
• job performance (telephone operators, sales
managers, management consultants),
managers, management consultants),
• employment interviews,
• health care (doctors effectiveness, patient
health care (doctors effectiveness, patient
satisfaction), etc.
16. Computación y señales sociales
Pág. 16
THIN SLICING THEORY
One of the most impressive examples of thin slices
of data predicting important, long‐term
consequences is marital research conducted by
Gottman and his colleagues.
Carrère and Gottman (1999) were able to predict
marital outcomes over a six year period based on
human social signaling micro‐coding over just the
first 3 minutes of a marital conflict (i.e., a thin slice
of expressive behavior).
17. Computación y señales sociales
Pág. 17
• Importance interest and other social attitudes are reflected in
Importance, interest and other social attitudes are reflected in
speaking style and body language.
• People automatically perceive this information and can use it
p yp
to accurately predict behavior (even being unaware of it!).
22. Computación y señales sociales
Pág. 22
P. Ekman is the most well‐known advocate of this approach, which is based
roughly on the theory that people perceive others’ emotions through
stereotyped displays of facial expression, tone of voice, etc.
The simplicity and perceptual grounding of this theory has recently given rise
to considerable interest in the computational literature .
Are we taking about emotions?
24. Computación y señales sociales
Pág. 24
Conclusions
1. Social psychology, behavioral economics and other
experimental social sciences h
i l i l i have shown that some
h h
interesting human behaviors are not directly related to
our conscious experience but are driven by rather
experience,
“simple” unconscious decision mechanisms.
2. Moreover,
2 Moreover some of these decision mechanisms are based
on the (unconscious) perception of social signals that are
(
(unconsciously) emitted by all of us when interacting with
y) y g
others.
3.
3 These two approaches defy the classical “cognitive
cognitive
science” approach for understanding human behavior.
25. Computación y señales sociales
Pág. 25
Conclusions
A fundamental assumption of cognitive science is that
the individual is the correct unit of analysis for
understanding human intelligence.
These approaches present evidence that the social
networks containing the individuals are an important
additional unit of analysis, and that this `network
intelligence’ is significantly mediated by non‐linguistic
processes.
26. Computación y señales sociales
Pág. 26
And what about computer
perception of the world?
A new opportunity for machine
A new opportunity for machine
p
perception
p
27. Computación y señales sociales
Pág. 27
The Original Sin of Computer Vision
The Original Sin of Computer Vision
Computer Vision models are based/inspired in
cognitive models from the beginning (Marr & the
theory of reconstruction)
reconstruction).
This models are based on the individual and do not
individual,
consider the social world in which we live.
People is considered just an another “object” that can
be identified tracked etc
identified, tracked, etc.
28. Computación y señales sociales
Pág. 28
One legend in AI: In 1967 Marvin Minsky assigned a graduate student (Gerald Sussman) to the
problem of computer vision, believing that the problem could be largely solved within one
summer.
29. Computación y señales sociales
Pág. 29
The summer project was not successful, but its approach to solve the problem
has not changed a lot from then….
Definition:
As a scientific discipline, computer vision is concerned with the
theory and technology for building artificial systems that obtain
information from images. The image data can take many forms,
such as a video sequence, views from multiple cameras, or multi‐
dimensional d t f
di i l data from a medical scanner.
di l
obtain information from images
=
physical word description
31. Computación y señales sociales
Pág. 31
What about understanding people?
THE CANONICAL VIEW
1. There is a great need for computer programs that can
1 Th i t df t th t
describe and predict people activities from video,
2. This is difficult to do, because it is hard to identify and
This is difficult to do, because it is hard to identify and
track people in video sequences, because we have no
common vocabulary for describing what people are
doing, and because the interpretation of what people
are doing depends very strongly on context.
That’s true, but this is not the whole truth: there is
also a lack of appropriate models for understanding
pp p g
people and their social world.
32. Computación y señales sociales
Pág. 32
Artificial Human Perception is focused on:
Artificial H man Perception is foc sed on
Identity, gender, ethnicity, age, etc.
Emotions
Activities
Gestures (for interaction)
Gestures (for interaction)
But this model of human behavior
is not complete…
33. Computación y señales sociales
Pág. 33
From: A.Vinciarelli, M.Pantic, H.Boulard, Social signal processing: Survey of an emerging domain, Image and Vision Computing, Volume 27, Issue 12, November
2009, Pages 1743‐1759
34. Computación y señales sociales
Pág. 34
Social Signals
Voice Face Body
Characteristics Expressions Head Postures
Pitch Frowning Head Nod
Loudness Smiling Head Shake
Speaking rate Lip‐Pout Head Tilt‐back
… Tense‐Mouth
Tense Mouth …
…
Body Gestures
Gaze Shoulder shrug
Forward lean
Forward lean
Who is she looking at? Hand behind head
Gaze dynamics …
Conjugate lateral eye movement
Fast blink
…
35. Computación y señales sociales
Pág. 35
What we know about social signaling?
It’s short term: People need about 30+ seconds of
observation to infer information from it.
It’s important: there are some real social contexts where
human decisions are mainly (but not exclusively) based
human decisions are mainly (but not exclusively) based
on the content conveyed by this specific, non conscious
communication channel between humans.
It’s a collective game: Information is mainly encoded in
the interaction dynamics (voice and gestures = nonverbal
h d ( d b l
cues).
Arms, body, face, eyes...
Turn‐taking, emphasys,
36. Computación y señales sociales
Pág. 36
We can built social signal detectors by analyzing speech and
body movements
movements.
This signals can be aggregated in communicative patterns
(some of them were proposed by Charles Darwin!)
1.
1 Influence patterns (speaking pitch patterns of turn taking
patterns (speaking pitch, patterns of turn taking,
etc.) It is an indicator of dominance.
2. Activity patterns (energy expended in the communication) It
. patterns (energy expended in the communication) It
is an indicator of interest and excitement.
3. Mimicry patterns (reflexive copying of smiles, interjections,
yp py g j
head nodding) It is an indicator of empathy.
4. Consistency (emphasys and timing). It is an indicator of
determination (+) and openess (‐).
37. Computación y señales sociales
Pág. 37
Functions
F i
1. Forming impressions.
2. Expressing emotions.
3. Sending relational messages (power, persuasion,
dominance, deception…)
dominance deception )
4. Managing interactions.
5. Etc.
38. Computación y señales sociales
Pág. 38
Social cues Example social behaviours Tech.
Emotion Personality Status Dominance Persuasion Regulation Rapport Speech analysis Computer vision Biometry
Physical appearance
Height √ √ √ √
Attractiveness √ √ √ √ √ √ √
Body shape √ √ √ √
Gesture and posture
Hand gestures √ √ √ √ √ √ √
Posture √ √ √ √ √ √ √ √ √
Walking √ √ √ √ √
Face and eyes behaviour
Facial
√ √ √ √ √ √ √ √ √
expressions
Gaze behaviour √ √ √ √ √ √ √ √
Focus of
√ √ √ √ √ √ √ √
attention
Vocal behaviour
Prosody √ √ √ √ √ √
Turn taking √ √ √ √ √ √ √
Vocal outbursts √ √ √ √ √ √ √
Silence √ √ √ √
Space and environment
Distance √ √ √ √ √ √
Seating
√ √ √ √
arrangement
From: A.Vinciarelli, M.Pantic, H.Boulard, Social signal processing: Survey of an emerging domain, Image and Vision Computing, Volume 27, Issue 12, November 2009, Pages 1743‐1759
40. Computación y señales sociales
Pág. 40
How?
H ?
1. Processing real‐time video/audio and detecting and
analyzing social signals.
2. Building rich descriptions from these signals (social
messages).
g )
3. Understanding syntax and semantics of social
messages (social language) by mining examples and
learning to predict.
42. Computación y señales sociales
Pág. 42
Reading Faces
People automatically evaluate faces on
multiple trait dimensions and these
dimensions, and these
evaluations predict important social
outcomes, ranging from electoral success
to sentencing decisions.
to sentencing decisions
Aggressiveness, dominance, confidence,
attractiveness, trustworthiness,
attractiveness, trustworthiness,
competence, etc.
46. Computación y señales sociales
Pág. 46
Body Behavior + Non Verbal Speech
Body Behavior + Non Verbal Speech
(MIT)
1. Speed dating prediction.
2. Call center customer
2 Call center customer
satisfaction.
3. One‐minute elevator
3 “One minute elevator
pitch” assessment.
4. Depression monitoring.
4 Depression monitoring
5. Etc.
47. Computación y señales sociales
Pág. 47
In these scenarios,
we can get an
we can get an
outcome
prediction with a
level of accuracy
level of accuracy
between 80 and
90%
48. Computación y señales sociales
Pág. 48
Organization Dynamics:
Other experiments show that it is
p
possible to identify:
y
•Connectors and central people
in a social network
l k
•The boss in an organization
•The leader of a team
•The outcome of negotiations
•The degree of persuasiveness in
speech Automatically captured group
•Group affiliations
p dynamics
52. Computación y señales sociales
Pág. 52
Dominance in computer mediated discussions
Data
Blogging heads New
gg g
York Times data base
(http://video.nytimes.com/)
Experiments
Observers inquiry
Manual test
Automatic test
Signals
Si l
Head nodding
Speaking time (A/V)
SSuccessful f l
interruptions
Floor grabbing
Gesticulation
i l i
52
53. Computación y señales sociales
Pág. 53
Social Signals and Reality Shows
Can we predict who will be fired?
Can we predict who will be fired?
:
The Apprentice is a reality television show that originated in the United
States on NBC. Billed as "The Ultimate Job Interview," the show depicted a
group of 15‐18 businessmen and ‐women competing in an elimination‐style
competition for a one‐year, $250,000 job of running one of host and
executive producer Donald Trump's companies.
54. Computación y señales sociales
Pág. 54
Conclusions
• Social signal processing can contribute to the understanding of the
role of non‐verbal behaviour during social interactions (a new tool
for social sciences).
• The range of application areas for socially aware systems touches
on many aspects of computing, and as computing becomes more
ubiquitous, practically every aspect of i
bi i i ll f interaction with objects,
i i h bj
and the environment, as well as human‐human interaction will
make use of these techniques (situated communication support
q ( pp
tools, human‐computer interaction tools, intelligent tutoring
systems, telecommunication facilities, intelligent multimedia
servers,
ser ers health monitorin s stems intelli ent robots )
monitoring systems, intelligent