Recipient design in tacit communication.
نویسندگان
چکیده
The ability to design tailored messages for specific listeners is an important aspect of human communication. The present study investigates whether a mere belief about an addressee's identity influences the generation and production of a communicative message in a novel, non-verbal communication task. Participants were made to believe they were playing a game with a child or an adult partner, while a confederate acted as both child and adult partners with matched performance and response times. The participants' belief influenced their behavior, spending longer when interacting with the presumed child addressee, but only during communicative portions of the game, i.e. using time as a tool to place emphasis on target information. This communicative adaptation attenuated with experience, and it was related to personality traits, namely Empathy and Need for Cognition measures. Overall, these findings indicate that novel nonverbal communicative interactions are selected according to a socio-centric perspective, and they are strongly influenced by participants' traits.
منابع مشابه
Recipient design in human communication: simple heuristics or perspective taking?
Humans have a remarkable capacity for tuning their communicative behaviors to different addressees, a phenomenon also known as recipient design. It remains unclear how this tuning of communicative behavior is implemented during live human interactions. Classical theories of communication postulate that recipient design involves perspective taking, i.e., the communicator selects her behavior bas...
متن کاملStreamlining the planning approval process for a sustainable urban development: A case study for unwinding man-made complexities
The urban development process displays regressive tacit-dominant knowledge areas and their tacit level would impede their movements during multi-level knowledge transfers among stakeholders. The accuracy of a knowledge may be distorted when recipient stakeholders fail to understand a specific knowledge for its purpose. Earlier studies by the authors had highlighted complex yet dynamic environme...
متن کاملChip Implementation of Text Encryption and Decryption Algorithms
Cryptography is the science of using mathematics to encrypt and decrypt data. It enables to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. A common goal of cryptographic research i...
متن کاملThe limits of fast and frugal heuristics in evolving a language de novo
Humans have a remarkable capacity for communicating even in situations where they cannot use any pre-established language. The skill to quickly evolve a language de novo is well reported within the field of experimental semiotics [4]. Arguably, one of the reasons that humans can do this so successfully is their ability to tune their communicative behaviors to addressees, a phenomenon also known...
متن کاملProduct Conceptual Design Based On Tacit Knowledge and Ontology
With the coming of knowledge economy era, The traditional product design knowledge can not fully meet the user’s demands for products. Improving the design quality of the product is the primary way to maximize the benefits, and the product conceptual design directly determines the quality of product design, The users’ tacit knowledge is the source of the product conceptual design, therefore, th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Cognition
دوره 111 1 شماره
صفحات -
تاریخ انتشار 2009