We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The General Strike of 1926 broke out as Alan's first term started. He dearly loved a bit of adventure and so was delighted with the opportunity the strike gave of a novel mode of arrival at school – a new school at that. Landing at mid-day at Southampton from France, he sent a telegram to his housemaster, Mr. Geoffrey O'Hanlon, promising to report next day. Then he disposed of his trunk, and set out armed with a map to bicycle to the school. When he hopefully suggested the possibility of bicycling, I insisted that he should not attempt the whole sixty miles in one day, thinking he might be ruthlessly made to attend early school next day. He spent the night at Blandford at the Crown Hotel, where he seems to have caused some diversion, for the whole staff turned out next morning to see him on his way. His bill for dinner, bed and breakfast was purely nominal – six shillings. This unusual way of arrival won him some notoriety and was even reported in the local press. His enterprise stood him in good stead a year or two later; when progress was at a low ebb his housemaster, seeking some redeeming feature remarked: “Well, after all he did bicycle here.”
Alan's first letter from Westcott House, Sherborne, informs us that “Mr. O'Hanlon is very nice” and indeed he proved to be the perfect housemaster, towhomwe owe anundying debt of gratitude.
The aim of this book is to trace from early days the development of a mathematician and scientist of great originality and to record details from which a selection may be made by a future biographer. Owing to the enforced silence regarding my son's activities in the Foreign Office during the Second World War, there is, except for some few anecdotes, a regrettable gap of six years in the narrative. The book is divided into two parts. The former and major part is mainly biographical but contains sufficient scientific material to indicate the scope and depth of my son's research. The second part affords more technical particulars which might prove wearisome to the general reader: but these barely touch the fringe of his work on Computing Machines and Morphogenesis. His writings on these and other subjects, together with a posthumous paper on Morphogenesis, prepared by Dr. N.E. Hoskin and Dr. B. Richards, can be studied in the volume of his collected works, which is to be published by the North-Holland Publishing Company, Amsterdam. I am indebted to many of my son's friends – too numerous to name – for their recollections. Here I take this opportunity to express my gratitude to various American mathematicians and scientists for their particularly courteous interest and co-operation. For their scrutiny of my typescript and valuable suggestions and advice, my special thanks go to Professor M.H.A. Newman, F.R.S., Mrs. Newman (Lyn Irvine), Mr. Geoffrey O'Hanlon and to Mr. Nowell Smith, who also read the proofs.
There are two radically different approaches to robot navigation: the first is to use a map of the robot's environment; the second uses a set of action reflexes to enable a robot to react rapidly to local sensory information. Hybrid approaches combining features of both also exist. This book is the first to propose a method for evaluating the different approaches that shows how to decide which is the most appropriate for a given situation. It begins by describing a complete implementation of a mobile robot including sensor modelling, map–building (a feature–based map and a grid–based free–space map), localisation, and path–planning. Exploration strategies are then tested experimentally in a range of environments and starting positions. The author shows the most promising results are observed from hybrid exploration strategies which combine the robustness of reactive navigation and the directive power of map–based strategies.
This book is devoted to recursion in programming, the technique by which the solution to a problem is expressed partly in terms of the solution to a simpler version of the same problem. Ultimately the solution to the simplest version must be given explicitly. In functional programming, recursion has received its full due since it is quite often the only repetitive construct. However, the programming language used here is Pascal and the examples have been chosen accordingly. It makes an interesting contrast with the use of recursion in functional and logic programming. The early chapters consider simple linear recursion using examples such as finding the highest common factor of a pair of numbers, and processing linked lists. Subsequent chapters move up through binary recursion, with examples which include the Towers of Hanoi problem and symbolic differentiation, to general recursion. The book contains well over 100 examples.
A Textbook on Automata Theory has been designed for students of computer science. Adopting a comprehensive approach to the subject, the book presents various concepts with adequate explanations. The logical and structured treatment of the subject promotes better understanding and assimilation. Lucid and well-structured presentation makes the book user-friendly. The book cover the curricula for M.C.A., B.E.(Computer Science) and M.Sc. (Computer Science) at various universities and gives students a strong foundation for advanced studies in the field.Key features:- A wide array of solved examples and applications Numerous illustrations supporting theoretical inputs Exercises at the end of each chapter for practice Notation for describing machine models A brief history of mathematicians and computer scientists
On an everyday basis, we communicate with one another using various technological media, such as text messaging, social networking tools, and electronic mail, in work, educational, and personal settings. As a consequence of the increasing frequency of use and importance of computer-supported interaction, social scientists in particular have heeded the call to understand the social processes involved in such interactions. In this volume, the editors explore how aspects of a situation interact with characteristics of a person to help explain our technologically supported social interactions. The person-by-situation interaction perspective recognizes the powerful role of the situation and social forces on behavior, thought, and emotion, but also acknowledges the importance of person variables in explaining social interaction, including power and gender, social influence, truth and deception, ostracism, and leadership. This important study is of great relevance to modern readers, who are more and more frequently using technology to communicate with one another.
In this chapter we take a broad view of the social psychology of intergroup relations and apply it to the internet. We start by addressing two popular propositions about the internet. The first of these is that the internet is a safe haven for racists who, using the cover of anonymity, engage in hostile flaming of members of other communities. We can call this first proposition the anonymous cyberhate view of the internet. The second popular proposition is the idea that the internet is a hotbed of social activism where people develop plans to change the world using a device that spans continental boundaries. We call this second proposition the global activist view of the internet.
Let us be clear that there is some truth to both propositions and it is easy to find evidence for both of them. Our contention, however, is that both of the propositions are gross oversimplifications that tend to lead commentators and observers to misunderstand the dynamics present in this medium.
No doubt, social interactions supported by modern technologies have become an important part of our personal, professional, and political lives. At least since the last decade social psychologists have become interested in studying interactions that are mediated by modern technologies such as the internet. Research topics have focused on how computer-mediated interactions differ from traditional face-to-face interactions. One aspect that has drawn a lot of attention is that computer-mediated interactions have greater potential for anonymity. As a consequence, many studies have focused on the effects of whether or not the actor is identifiable to the people she is interacting with, referencing the SIDE model (Spears et al., 1990, 2001). SIDE stands for Social Identity De-individuation Effects. The model proposes that social identity moderates the effects of anonymity. It proposes that deindividuation can accentuate social influence when one identifies strongly with an online group but reduce social influence in the absence of strong identity.
When studying social interactions that are supported by new technologies, there is an inclination to start with the premise that social behavior is in some or all ways fundamentally different as a result of the technology. A notable exception is the research on the SIDE model, which started with the position that deindividuation and social identity have been studied in social psychology at least over the last three decades (Diener, 1977, 1979), and that we could learn from applying what we know from these research traditions to advance our understanding of the role of anonymity in computer-mediated interactions.
Social interaction leads – online as much as offline – to mutual, more or less equal social influence of the interacting parties on each other. Internet users send out information, summaries of subjective experiences, and opinions using communication tools. Recipients acquire unconsciously new insights or strive to learn or form an opinion about a topic. Research studying the facilitating and hindering factors for such media-based social influence has a long-standing history (for a summary of the early work see Williams, 1977). Nonetheless, the interplay between personality characteristics and media attributes as preconditions of social influence has hardly received any attention yet. Therefore, the current chapter will apply interactionism (Endler and Magnusson, 1976) to online social influence. The combination of personal and situational variables is relevant in the context of new communication media as in any other context, because individuals may respond differently to the specific situational conditions provided by computer-mediated communication (CMC). (For initial evidence see Amichai-Hamburger et al., 2002; Cress, 2005; Guadagno and Cialdini, 2002; Hertel et al., 2008; Sassenberg et al., 2005.) Hence, considering individual differences for the prediction of media effects will allow more precise predictions about the impact of CMC on social influence.
In this chapter, different types of social influence will be introduced and the features of CMC that are relevant for social influence will be discussed. Afterwards, the research on these types of social influence in CMC will be reviewed. This review serves two purposes. First, it will show that almost all existing research in this domain has focused on the impact of situational characteristics that either (a) are inherent in the technology (e.g., few social context cues) or (b) result from the social setting in which CMC takes place (e.g., the impact of group norms on a person's attitudes). Second, it will outline how the moderation of social influence processes by communication media characteristics is best explained by the interactionist approach that includes inter-individual differences (e.g., personality traits). Before this approach is described, the few studies that take into account the moderating impact of inter-individual differences between users on the effects of situational characteristics (i.e., personality traits or cognitive styles) will be summarized. (For a framework model putting forward a similar argument for CMC research in general see Joinson, 2003.)
Contemporary web-based communication technologies often present a juxtaposition of multiple sources. In January of 2009, for instance, CNN.com and Facebook.com partnered so that internet users could see and hear President Barack Obama's inauguration in one window, and read and write comments about it with myriad other viewers in another window. YouTube.com presents not only videos but also the comments that viewers have posted about the video. Facebook.com supports individuals’ self-descriptive information online, but also “wall postings” by a profile owner's friends, which may enhance, modify, or contradict the self-presentations individuals attempt to make. Sellers on eBay advertise goods online, and other buyers’ ratings of those sellers are a click away. Travel sites offer hotel listings alongside ratings and reviews by previous guests. And in addition to the overt comments and statements left online by people, the computational systems supporting these interactions often provide interesting statistical coefficients summarizing the evaluations or even the electronic footprints users leave behind: How many people rated a product evaluation as useful? How many times has a viral video been viewed, or a journal article been downloaded? How many friends does an individual have on Facebook? In all of these cases, there is a central message, and there are socially generated responses. How do these mutual sources of influence affect users?
New communication technologies are changing the manner of reception by which individuals acquire information from institutional, interpersonal, and peer information sources. Technology changes the temporal and contiguous presentations of these sources, and may in fact change the information processing and social influence dynamics among these sources; that is, the sequence with which sources are sampled or the simultaneity with which they appear may have potent effects on the information processing filters and biases. Such developments in communication technologies are raising new questions and resurrecting old questions about the interplay of interpersonal and mass communication. New technologies blur the boundaries between interpersonal and mass communication events and/or the roles that communicators take using new systems. Arguments have been made that the “convergence” of old and new media demands new and unified perspectives on traditionally segregated processes. “Media convergence” is a term that has been used to connote several phenomena that are brought about by advancements in telecommunication technology that may change some aspect of the communication process. Sometimes the term refers to the blending of previously individuated mass media: one can watch movies on one's computer, for example. We wish to discuss another kind of convergence: the potential for simultaneous communication via computers of both mass and interpersonal channels. Additionally, new and salient sources of information are present, and potentially influential, via contemporary online information systems: peer communication and computational summaries of social behavior. How these forms and sources of information coalesce, confirm, or contradict one another asks for conceptual and analytic frameworks to address them. New technologies invite research that will advance understanding of how individuals conceptualize communication and interpret messages, and how their attitudes are changed as a result of new mediated message forms and content.
The internet is a defining feature of modern life. Individuals increasingly conduct social interactions online or use other forms of mediated communication, such as text messaging. Understanding how this communication medium affects interpersonal interactions and relationships is a key task for psychologists. Specifically, researchers have been interested in the extent to which individuals are willing to trust others that they encounter online, and the degree to which this trust is justified.
Developing trusting relationships is important if connections forged online are to move to deeper levels. Trusting relationships may be more likely to provide social support and other beneficial outcomes. Of course, just as in offline relationships, appropriate calibration of trust levels is also important. If individuals are too trusting in their online interactions, others may take advantage of them. An optimal level of trust is one in which the person is open to gaining deep and fulfilling relationships, but is not gullible enough to be cheated or taken advantage of (Rotter, 1980; Yamagishi, 2001).
This chapter presents a basic overview of ostracism, describing the reasons for its use, the situations in which it can occur, and the effects it has on its targets. Ostracism can happen in both face-to-face and electronic-based (e.g., internet, cell phones, and virtual reality) interpersonal interactions. The authors describe a variety of experimental research methods that have been used to study the effects of ostracism in both of these interpersonal contexts, comparing and contrasting the results of these different studies. Particular attention is paid to studies involving electronic-based interactions. Both immediate and long-term effects of ostracism on targets’ behaviors are discussed, focusing specifically on how people can be negatively impacted by being ostracized in an electronic-based interaction. The authors discuss how the nature of electronic-based interactions may affect people's reactions to ostracism in novel ways, providing greater understanding of the similarities and differences between face-to-face and electronic-based interactions. These findings are reexamined and explained in the context of virtual bravado – uninhibited behavior perhaps due to the anonymity provided by electronic-based communication. Finally, future directions of research are suggested for studying ostracism in electronic-based interactions, as well as people's general behavior in these types of interactions.
Introduction
There are several needs that are essential to our lives as human beings, and the desire to satisfy these needs influences our attitudes, behaviors, and interactions. Four of the most fundamental human social needs are the needs for belonging, self-esteem, control, and meaningful existence (Williams, 2001, 2009). Humans have a need to belong – they desire interpersonal relationships and meaningful interactions (Baumeister and Leary, 1995). Humans also have a desire to have reasonably high self-esteem (Leary et al., 1995; Tesser, 1988). Humans also have more action-focused needs; they desire some degree of control over their environment (Friedland et al., 1992), and knowledge that their existence matters to others (Greenberg et al., 1986; Solomon et al., 1991).
The new communications technologies are developing at such a fast pace that it is difficult for research and theorizing to keep up. Although exploring the range of applications and instantiations of the latest forms of computer-mediated communication (CMC), texting, and video-based phone systems provides many useful insights, research and theorizing that lag behind the technological developments will run the risk of being phenomenon- and even technology-driven, making it difficult to anticipate new uses and consequences. In this chapter we therefore adopt a theory-focused approach to make some sense of the effects of the new technologies (as Kurt Lewin said, there is nothing so practical as a good theory), and a primarily experimental methodology to test this. We focus on a theoretical framework that we have developed over a number of years to gain insights into the effects of CMC in social and organizational settings: the SIDE model. We have found this model useful in helping to correct a tendency, in the literature on CMC in particular, to underestimate the role of social influences on and within these technologies, and an equal (and perhaps opposite) tendency to overestimate their capacity to counteract the impact of status and power.
In particular, we think this theoretical model has been useful in helping us to understand (and predict) some of the more counterintuitive findings of behavior found using computer-mediated communication. The idea that people actually conform when isolated from and anonymous to their group is a good example of such an effect explained by the SIDE model. Gender, which is a key focus in the present chapter, also forms an interesting case study in this respect. Much theorizing and research has proposed that women might become more assertive and less submissive when liberated by the anonymity of CMC. Our research suggests that this is not necessarily the case. The SIDE model helps to explicate when and why the technology helps disempowered groups to transcend inequalities of status and power, and when it leaves them more vulnerable to the power divide. Of course, people are not just passively exposed to the effects of technologies such as CMC – a key argument is that they provide strategic opportunities for people to “manage” their identities contra “less mediated” face-to-face communication. So, for example, when women are given the chance to conceal or deceive their gender identity, do they do this, and if so, with what effect? And are these strategies and effects similar for other groups and categories? After outlining our model and providing some evidence of empirical support, we concentrate on the “gender divide” as one important test case, in which the social and power dimensions of these communications technologies in particular can be examined in some detail. Finally, we consider some of the implications of these findings for gender, as well as relations between groups divided by power and status in general.