The effect of distraction on face and voice recognition
Autor: | Beth Parsons, Amy Dyson, Catherine Eaton-Brown, Greg J. Neil, Jess Barlow, Sarah V. Stevenage |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2013 |
Předmět: |
Adult
Male Matching (statistics) genetic structures Speech recognition Experimental and Cognitive Psychology Facial recognition system behavioral disciplines and activities Task (project management) Young Adult Discrimination Psychological Arts and Humanities (miscellaneous) Distraction Developmental and Educational Psychology Fixed interval Humans Attention Contrast (statistics) General Medicine Identification (information) Pattern Recognition Visual Social Perception Face (geometry) Face Auditory Perception Voice Female Perception Psychology psychological phenomena and processes |
Zdroj: | Stevenage, S V, Neil, G J, Barlow, J, Dyson, A, Eaton-Brown, C & Parsons, B 2013, ' The effect of distraction on face and voice recognition ', Psychological Research, vol. 77, no. 2, pp. 167-175 . https://doi.org/10.1007/s00426-012-0450-z |
Popis: | The results of two experiments are presented which explore the effect of distractor items on face and voice recognition. Following from the suggestion that voice processing is relatively weak compared to face processing, it was anticipated that voice recognition would be more affected by the presentation of distractor items between study and test compared to face recognition. Using a sequential matching task with a fixed interval between study and test that either incorporated distractor items or did not, the results supported our prediction. Face recognition remained strong irrespective of the number of distractor items between study and test. In contrast, voice recognition was significantly impaired by the presence of distractor items regardless of their number (Experiment 1). This pattern remained whether distractor items were highly similar to the targets or not (Experiment 2). These results offer support for the proposal that voice processing is a relatively vulnerable method of identification. |
Databáze: | OpenAIRE |
Externí odkaz: |