Feeds

Profs: Eating Belgian truffles will make you buy a Mac

Homemade meringues = Linux, presumably*

Build a business case: developing custom apps

In a development whose majorness would be hard to overemphasise, research by topflight eggheads has revealed that eating just one Belgian truffle could turn you into a Mac fanboy, or indeed girl.

The news comes to us from the periodical read by all corporate spammers who are serious about their profession, The Journal of Consumer Research, publishing the results of an in-depth analysis by selling-people-stuff profs Juliano Laran (University of Miami) and Chris Janiszewski (University of Florida).

The two salesman-academics ran a study which involved giving one group of people a chocolate truffle, and asking another group to be strong and abstain. It appears that scoffing just one fancy choc, according to the profs, tends to unleash a "what the hell" syndrome. The truffle-gobblers then feel a strong desire for more treats - for instance ice cream, pizza, and potato chips - while the puritanical group found it easy to spurn any further delicious but possibly nutritionally unwise offerings.

If that was all, frankly we wouldn't have bothered you. But it's not.

"A second study again had people eat or resist a chocolate truffle and asked them to indicate how much they desired several products that are symbols of status [for example] an Apple computer... People who ate the truffle desired the status products significantly more than those who had to resist the truffle," write Laran and Janiszewski.

There you have it. Eating overpriced chocs which come in a pretty, wantable box will lead to the purchase of... well, you get the idea.

"Our research shows that small acts may lead people to unconsciously seek more indulgence," the authors conclude.

Their paper is called Behavioral Consistency and Inconsistency in the Resolution of Goal Conflict, and will be published in the April '09 edition of the The Journal of Consumer Research. ®

Bootnote

*Requires some skill to achieve at home; tends to make the achiever incomprehensibly smug. The natural Windows types would, by extension, tend to favour mainstream, occasionally faulty but accessible treats (doughnuts, perhaps) lying between the intuitive, gorgeous truffle and recondite delicacies fashioned from commonly available basic ingredients and open-source knowledge. Insert your alternative OS-as-confectionery analogies here.

Next gen security for virtualised datacentres

More from The Register

next story
Boffins attempt to prove the UNIVERSE IS JUST A HOLOGRAM
Is this the real life? Is this just fantasy?
China building SUPERSONIC SUBMARINE that travels in a BUBBLE
Shanghai to San Fran in two hours would be a trick, though
Our LOHAN spaceplane ballocket Kickstarter climbs through £8000
Through 25 per cent but more is needed: Get your UNIQUE rewards!
CRR-CRRRK, beep, beep: Mars space truck backs out of slippery sand trap
Curiosity finds new drilling target after course correction
SpaceX prototype rocket EXPLODES over Texas. 'Tricky' biz, says Elon Musk
No injuries or near injuries. Flight stayed in designated area
Galileo, Galileo! Galileo, Galileo! Galileo fit to go. Magnifico
I'm just a poor boy, nobody loves me. But at least I can find my way with ESA GPS by 2017
Astronomers scramble for obs on new comet
Amateur gets fifth confirmed discovery
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.