Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

The Effect Of Age, Syntax Complexity, And Cognitive Ability On The Rate Of Semantic Illusions, Sara Anne Goring Jan 2023

The Effect Of Age, Syntax Complexity, And Cognitive Ability On The Rate Of Semantic Illusions, Sara Anne Goring

CGU Theses & Dissertations

Semantic illusions are recognition errors that occur when an individual fails to notice that information contradicts their prior knowledge (Barton & Sanford, 1993; Erickson & Mattson, 1981). For example, after hearing the question, “If a plane crashes while flying over state lines, where should the survivors be buried?” many start to consider the legality or appropriateness of the scenario despite knowing “survivors” should not be buried. Having more knowledge does not necessarily prevent individuals from overlooking illusory information/misinformation. Older adults tend to have greater crystallized intelligence than young adults, yet these age groups appear to detect illusory information at equivalent …


A Multinational Study Of The Etiology And Clinical Teleology Of Moral Evaluations Of Patient Behaviors, Anna Yu Lee Jan 2020

A Multinational Study Of The Etiology And Clinical Teleology Of Moral Evaluations Of Patient Behaviors, Anna Yu Lee

CGU Theses & Dissertations

This dissertation is a collection of four studies which collectively explore a hypothesized construct of ‘moral evaluation of patient behaviors’ (MEPB) as a driver of health professionals’ readiness to interact humanistically with their patients. In these studies, ‘humanistic interactions’ refer to the non-technical, intangible skills and factors of clinical competence; the factors specifically explored in these studies were compassion toward patients, self-efficacy for treating patients, and optimism toward patient treatment. For the purpose of specificity, all factors were examined as they pertained to patients with substance use disorders. Survey data from a convenience sample of 524 health professionals (i.e. physicians, …


Examining The Influence Of Source-Message Incongruence On Source Trustworthiness And Attitudes Regarding Hazardous Waste Cleanup Decisions, Lori Garner Manes Jan 2019

Examining The Influence Of Source-Message Incongruence On Source Trustworthiness And Attitudes Regarding Hazardous Waste Cleanup Decisions, Lori Garner Manes

CGU Theses & Dissertations

Research has shown that when a source proffers a message that is incongruent with its expected position on a topic, it can have an effect on the perceived trustworthiness of the communicator, the persuasiveness of the message, and the extent to which the receiver elaborates the message. However, research in this area has not been consistent. Questions remain as to whether sourcemessage incongruence enhances source trustworthiness, attitude change, or both, relative to source-message congruence. Focusing on an environmental risk management context involving the cleanup of a hazardous waste site, this research investigated how source-message incongruence influenced perceptions of source trustworthiness, …


A Secure Behavior Modification Sensor System For Physical Activity Improvement, Alan Price Jan 2011

A Secure Behavior Modification Sensor System For Physical Activity Improvement, Alan Price

CGU Theses & Dissertations

Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit.

In this research, exploration was conducted involving the "infrastructure" and "intelligence" aspects of a wireless sensor network through a Behavior Modification Sensor System. First was to understand how a secure wireless sensor network could be established through the symmetric distribution of keys (the securing of the infrastructure), and it involves …


Eliciting User Requirements Using Appreciative Inquiry, Carol Kernitzki Gonzales Jan 2010

Eliciting User Requirements Using Appreciative Inquiry, Carol Kernitzki Gonzales

CGU Theses & Dissertations

Many software development projects fail because they do not meet the needs of users, are over-budget, and abandoned. To address this problem, the user requirements elicitation process was modified based on principles of Appreciative Inquiry. Appreciative Inquiry, commonly used in organizational development, aims to build organizations, processes, or systems based on success stories using a hopeful vision for an ideal future. Spanning five studies, Appreciative Inquiry was evaluated for its effectiveness with eliciting user requirements. In the first two cases, it was compared with traditional approaches with end-users and proxy-users. The third study was a quasi-experiment comparing the use of …