Attention and conscious perception as perception Sample Clauses

Attention and conscious perception as perception action mediators It is often considered that our capacity-limited brain is not equipped to process the multiple information present in our environment in real-time. Therefore, at- tention is required to select relevant information from irrelevant sources in order to meet task goals (Xxxxx, 1890). By definition, this implies a focus of processing resources for attended stimuli as compared to non-attended stimuli (Xxxxxxxx & Xxxxxxxx, 2004). The effects of selective attention have been widely studied in humans through cueing paradigms (Xxxxxx & Xxxxxxxx, 1990; Xxxxxx, 1980), in which a cue provides a prior information about the possible location of a future target to detect in the visual display. Whether the cue allows reliable predictions about the location of appearance of the future target (valid trials), facilitation effects are commonly reported, i.e. participants tend to respond faster and with higher accuracy as compared to invalid trials. Hence, attention could be defined as a cognitive mechanism that bias perception to enhance the subject’s capacity to process and to act upon a given stimulus. Although nobody disputes the view that attention acts as a spatial spotlight that biases perception to opti- mize the processing of a given visual object or stimulus (Xxxxxx, 1980), there is increasing evidence that the primary role of attention is motor preparation, even when no motor execution is required. Indeed, according to action-based theories of selective attention (Xxxxxxxxxx, Xxxxxx, & Xxxxxxx, 1994; Tipper, Lor- tie, & Xxxxxx, 1992), attention does not arise through the intervention of specific attentional circuits but overlaps motor preparation. This theory, namely the “premotor theory of attention” has been tested empirically in studies requiring themotor preparation of eye movements (Sheliga, Riggio, & Xxxxxxxxxx, 1994; Xxx xxx Xxxxxxxx & Xxxxxxxx, 2007; Xxx xxx Xxxxxxxx, 2010). Indeed, an eye move- ment or a saccade brings the central focus of the eye from a starting point to an endpoint. Hence, a specific spatial location must be selected as an endpoint for the saccade, requiring necessarily selective attention for motor preparation. Thus, oculomotor settings appear as prevailing paradigms to reveal the relation- ships between attention and motor preparation. In a study proposed by Xxxxxxx et al. (1994), the trajectory of the saccade was shown to be influenced by the spatial position of a precued imperative target which was displayed from five ...
AutoNDA by SimpleDocs

Related to Attention and conscious perception as perception

  • VISIBILITY OF FUNDING FROM THE OFFICIAL DEVELOPMENT ASSISTANCE Unless the SAIDC requests or agrees otherwise, any communication or publication made by the Final Beneficiary that relates to the action, including at conferences, seminars or in any information or promotional materials (such as brochures, leaflets, posters, presentations in electronic form, etc.), including tangible assets acquired from the project must: (a) indicate that the action has received funding from the Official Development Assistance, SlovakAid and (b) display the SlovakAid logo. When displayed in association with another logo, the SlovakAid logo must have appropriate prominence. The obligation to display the SlovakAid logo does not confer on the Final Beneficiary a right of exclusive use. The Final Beneficiary may not appropriate the SlovakAid logo or any similar trademark or logo, either by registration or by any other means. For the purposes of the first, second and third subparagraphs and under the conditions specified therein, the Final Beneficiary may use the SlovakAid logo without first obtaining permission from the SAIDC.

  • Your Liability for Unauthorized Transfers Immediately following your discovery of an unauthorized Payment Instruction, you shall communicate with customer care for the Service in the manner set forth in Section 6 of the General Terms above. You acknowledge and agree that time is of the essence in such situations. If you tell us within two (2) Business Days after you discover your password or other means to access your account through which you access the Service has been lost or stolen, your liability is no more than $50.00 should someone access your account without your permission. If you do not tell us within two (2) Business Days after you learn of such loss or theft, and we can prove that we could have prevented the unauthorized use of your password or other means to access your account if you had told us, you could be liable for as much as $500.00. If your monthly financial institution statement contains payments that you did not authorize, you must tell us at once. If you do not tell us within sixty (60) days after the statement was sent to you, you may lose any amount transferred without your authorization after the sixty (60) days if we can prove that we could have stopped someone from taking the money had you told us in time. If a good reason (such as a long trip or a hospital stay) prevented you from telling us, we will extend the time periods specified above to a reasonable period.

  • EMPLOYEE DEVELOPMENT AND TRAINING 1. The State agrees to provide advice and counseling to employees with respect to career advancement opportunities and agency developments which have an impact on their careers.

  • INFORMATION AND CONFIDENTIALITY 20.1 Each party recognises that under this Agreement it may receive Confidential Information belonging to the other.

  • Access, Information and Confidentiality (i) From the Signing Date until the date on which all of the Preferred Shares have been redeemed in whole, the Company will permit, and shall cause each of the Company’s Subsidiaries to permit, Treasury, the Oversight Officials and their respective agents, consultants, contractors and advisors to (x) examine any books, papers, records, Tax returns (including all schedules attached thereto), data and other information; (y) make copies thereof; and (z) discuss the affairs, finances and accounts of the Company and the Company Subsidiaries with the personnel of the Company and the Company Subsidiaries, all upon reasonable notice; provided, that:

  • Contact in Event of Unauthorized Transfer If you believe your Card and/or access code has been lost or stolen or that someone has transferred or may transfer money from your account without your permission, either call us immediately at:

  • Communications and Confidentiality The Contractor agrees that it will make no statements, press releases, or publicity releases concerning the Contract or its subject matter or otherwise disclose or permit to be disclosed any of the data or other information obtained or furnished in compliance with the Contract, or any particulars thereof, during the period of the Contract, without first notifying the Department’s Contract Manager or the Department designated contact person and securing prior written consent. The Contractor must maintain confidentiality of all confidential data, files, and records related to the services and commodities provided pursuant to the Contract and must comply with all state and federal laws, including, but not limited to sections 381.004, 384.29, 392.65, and 456.057, F.S. The Contractor’s confidentiality procedures must be consistent with the most recent version of the Department security policies, protocols, and procedures. The Contractor must also comply with any applicable professional standards with respect to confidentiality of information.

  • Rights of Employees to Representation Any aggrieved person may be represented at all stages of the grievance procedure by himself/herself and, at his/her option, by a representative selected or approved by the Association. It is further recognized that any adjustment reached without a representative of the Association present shall be without prejudice to the Association.

  • Vientisäätely Sitoudut siihen, ettei Apple-ohjelmistoa viedä edelleen suorasti eikä epäsuorasti ulkomaille, ellei tähän ole erikseen annettu lupaa Yhdysvaltain tai sen oikeustoimialueen/niiden oikeustoimialueiden laeissa, jo(i)sta Apple-ohjelmisto on hankittu. Erityisesti Apple-ohjelmistoa ei saa viedä suorasti tai epäsuorasti (a) Yhdysvaltojen vientikiellossa olevaan maahan tai (b) kenellekään U.S. Treasury Departmentin Specially Designated Nationals -luettelossa olevalle tai U.S. Department of Commercen Denied Person’s List- tai Entity List -luetteloissa tai missään muissa rajoitusten alaisten osapuolten luetteloissa olevalle. Apple-ohjelmistoa käyttämällä annat takuun siitä, ettet ole missään tällaisessa maassa tai luettelossa. Takaat myös, että et käytä Apple-ohjelmistoa mihinkään sellaiseen tarkoitukseen, joka on kielletty Yhdysvaltain laissa, mukaan lukien (mutta näihin rajoittumatta) ohjusten, ydinaseiden tai kemiallisten tai biologisten aseiden kehitys, suunnittelu, valmistus tai tuotanto.

  • Confidentiality of Contractor Information The Contractor acknowledges and agrees that this Contract and any and all Contractor information obtained by the State in connection with this Contract are subject to the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq. The State will not disclose information for which a reasonable claim of exemption can be made pursuant to 1 V.S.A. § 317(c), including, but not limited to, trade secrets, proprietary information or financial information, including any formulae, plan, pattern, process, tool, mechanism, compound, procedure, production data, or compilation of information which is not patented, which is known only to the Contractor, and which gives the Contractor an opportunity to obtain business advantage over competitors who do not know it or use it. The State shall immediately notify Contractor of any request made under the Access to Public Records Act, or any request or demand by any court, governmental agency or other person asserting a demand or request for Contractor information. Contractor may, in its discretion, seek an appropriate protective order, or otherwise defend any right it may have to maintain the confidentiality of such information under applicable State law within three business days of the State’s receipt of any such request. Contractor agrees that it will not make any claim against the State if the State makes available to the public any information in accordance with the Access to Public Records Act or in response to a binding order from a court or governmental body or agency compelling its production. Contractor shall indemnify the State for any costs or expenses incurred by the State, including, but not limited to, attorneys’ fees awarded in accordance with 1 V.S.A. § 320, in connection with any action brought in connection with Contractor’s attempts to prevent or unreasonably delay public disclosure of Contractor’s information if a final decision of a court of competent jurisdiction determines that the State improperly withheld such information and that the improper withholding was based on Contractor’s attempts to prevent public disclosure of Contractor’s information. The State agrees that (a) it will use the Contractor information only as may be necessary in the course of performing duties, receiving services or exercising rights under this Contract; (b) it will provide at a minimum the same care to avoid disclosure or unauthorized use of Contractor information as it provides to protect its own similar confidential and proprietary information; (c) except as required by the Access to Records Act, it will not disclose such information orally or in writing to any third party unless that third party is subject to a written confidentiality agreement that contains restrictions and safeguards at least as restrictive as those contained in this Contract; (d) it will take all reasonable precautions to protect the Contractor’s information; and (e) it will not otherwise appropriate such information to its own use or to the use of any other person or entity. Contractor may affix an appropriate legend to Contractor information that is provided under this Contract to reflect the Contractor’s determination that any such information is a trade secret, proprietary information or financial information at time of delivery or disclosure.

Time is Money Join Law Insider Premium to draft better contracts faster.