information   60740

« earlier    

Why Too Much Data Disables Your Decision Making | Psychology Today
Two groups had to decide on accepting a loan application from a student with:
1) An unpaid debt of $5k
2) An unpaid debt of unclear value, $5k-$25k. This group could opt to wait until clear data became available. When it did, the experimenters fixed it at the same $5k.

Group 1 rejected the loan application 71%. Group 2 - only 21%!

This is why TV cliffhangers are so effective.

Evolutionarily, curiosity is useful. The downside is that we assign too much value to information. "Seeking out information comes with a downside, however, which accounts for the intriguing difference between the two groups. When data is missing, we overestimate its value. Our mind assumes that since we are expending resource locating information, it must be useful."

"Neurologically, information is addicting. Learning is associated with the release of dopamine, the same as powerful drugs like cocaine. It's why we are so vulnerable to an Internet rife with attention parasites that leave us worse for the wear."
psychology  overestimate  value  information  data  overload  addiction  cool  fascinating  study  surprising 
3 hours ago by dandv
Looking back in anger: One year of Snowden’s leaks | Al Jazeera America
One year ago, Russia granted Edward Snowden temporary asylum after a 39-day stay for the NSA whistleblower in the transit zone at Moscow’s Sheremetyevo Airport. Snowden had become stranded there while trying to flee to Latin America, where several countries had offered permanent asylum after the U.S. government filed charges against him for making off with thousands of classified documents about its surveillance programs.

Since then, the Snowden story has unfolded in dramatic ways for a nonstop 12 months — as the world reacted to the vast amount of information that his files contained — sparking revelation after revelation about some of the nation's most cherished secrets. It has also sparked a fierce policy debate over how to make intelligence organizations more accountable.
response  censorship  information  politics  activism  technology 
23 hours ago by tinkerkid
Timeline Outline View :
From Cave Paintings to the Internet cannot save you from information overload and offers no panacea for information insufficiency. Using Internet technology, it is designed to help you follow the development of information and media, and attitudes about them, from the beginning of records to the present. Containing annotated references to discoveries, developments of a social, scientific, theoretical or technological nature, as well as references to physical books, documents, artifacts, art works, and to websites and other digital media, it arranges, both chronologically and thematically, selected historical examples and recent developments of the methods used to record, distribute, exchange, organize, store, and search information. The database is designed to allow you to approach the topics in a wide variety of ways.
history  database  information 
yesterday by sbmandal

« earlier    

related tags

*category:history  *category:technology  2009  2010  2010s  2013  2014  27001  4g  a:jason-fagone  accepted  accord  action  activism  addiction  admin  administration  administrator  agelastic  agencies_  alexismadrigal  amended_  analysis  and  animals  anu  any  anyone  archaeology  architecture  archiving  are  arising  art  artikel  as  atmel  atrix  attachment  attiny  audio  australia  author  awareness  backup  be  behavior  biology  blog  book  books  boston  brand  brands  breastfeeding  brse  business  by  cabe  camper  can  cannot  car  censorship  charlottesville  charts  claude-shannon  claude  clothing  color  colors  comcast  communicates  communications  community  companies_  computer  computing  conference  confidential  contain  contained  cool  copying  culture  cutthecord  cve  cybersecurity  d:2014.06.17  damage  data  database  dataviz  ddj  deemed  denies  design  design_firm  development  dhs  dictionary  digital  disclosure_  discussion  dissemination_  distribution_  djl  do  documentation  draw  e-mail.  e-mail  e-mails  ebooks  electronics  embedded  encyclopedia  engine  engineering  enterprise  error  errors  ethical  ethics  faq  farm  fascinating  flash  flow  flows  for.  for  formats  forums  free  from  fromdiigo  future  gallery  gender  glossary  google  government  graphs  great  guaranteed  guide  guidelines  have  he  health  herein  historic  history  honda  housing  how-to  howto  howweread  identifiers  identity  in  inclusion  income  indigenousdx  info  infographics  infooverload  information-design  information-theory  inside  inspiration  intended  intercepted_  interesting  internet  internetasfavoritebook  internetasliterature  iot  is  iso/iec  it  jargon  javellana  john  journal  journalism  july  knowledge  kottke  learn  legal  legally  lgbtq  librarianship  library  life  lifehacker  light  livet  logo  lykke  mac  management  map  mapping  may  media  medicine  merchant  message  mexico  military  money  mpeg  multco  multilingual  music  necessarily  news  not  of  omissions  on  only  openaccess  opinion  or  oral  oregon  organisations  organization  other  overestimate  overload  p:matter  peterradoll  phone  planning  please  policy  politics  portland  prevention  primer  prison  privacy  privileged  process  professional  programming  prohibited.  psychology  radio  rattle  reading  recipient(s).  reference  references  reliance  represent  request  requirements  research  resource  response  responsibility  responsible  risks.  root  scamp  science  searchengine  secure  security  seminar  sex  shannon-information  shannon  shopping  site  skilsmisse  sleep  social  socialnetwork  software  solely  southamerica  standards  statement  stock  stockandflow  stream  study  surprising  synthesizer  sysadmin  system  taking  teaching  technology  terminology  testing  the  theory  these  they  this  those  timeline  tinderbox  tips  to  tom  tongue  tools  tor  towing  trailer  transportation  travel  tsb  twitter  ui  uk  unauthorised  us  use  ux  value  video  viruses.  visu  visual  visualisation  visualization  vitaly  vocabulary  vulnerability  w:6000  war  watch  web  webster  weight  who  wiki  with  women  wordpress  works  wowwowwow  writing  yes 

Copy this bookmark: