To determine the influence of knowledge schemata on inhibitory processes we analysed how the typicality of the actions of an event modulated retrieval-induced forgetting (RIF). Participants were presented with a realistic videotape of a bank robbery. Based on a normative study, high- and low-typicality actions of the event were determined. After watching the video, participants practised retrieving either half of the high- or half of the low-typicality actions, and their performance was compared against a no-practice control group. Tests given immediately after the event and after a 1-week retention interval demonstrated significant RIF for low-typicality actions exclusively when low-typicality actions were practised, but a comparable forgetting effect did not emerge for highly schematic actions. These findings confirm that highly integrated script knowledge protects high-typicality actions of an event from inhibitory processes, and demonstrate that RIF's effects last far longer than has been previously found.
This study analyses retrieval-induced forgetting (RIF) in eyewitness memory. Selective retrieval of specific information about an event could cause eyewitnesses to forget related contents. Based on a video of a man being robbed while withdrawing money from a cash machine, we examined the effects of partial retrieval on the most relevant aspects of the event: actions (Experiment 1) and offender characteristics (Experiment 2), in both immediate and long-term recall (24 hours). In both experiments long-term recall was a replica of immediate recall for correct information as well as errors. The effects of partial retrieval practice were also repeated in long-term recall. Conventional RIF was found for offender characteristics but selective retrieval of the actions of the event produced no comparable effect. It is assumed that the organisation and integration of the actions of the event protected them from RIF. rather than being a negative aspect of memory, the act of forgetting is an indication of proper memory function. In order to retrieve information effectively, we need to rely on a mechanism that can resolve interference from memories that compete for recall Bjork, 1989), a mechanism that blocks or inhibits the retrieval of competing items. A procedure widely used to explore forgetting triggered by inhibitory processes is the retrieval practice paradigm .The classic paradigm has four phases: study, retrieval practice, distractor task and final recall task. In the encoding phase participants are given lists of category-exemplar pairs (e.g. fruit-orange, drink-gin). Next, they practice retrieving half of the studied exemplars from half of the categories, prompted by cues to facilitate recall (e.g. fruit-or___). Following a distractor task, participants are given the names of the categories (e.g. fruit, drinks) and asked to recall all of the studied elements. Recall of three types of elements is assessed: practiced elements (e.g. orange, Rpþ items), unpracticed elements from the practiced category (e.g. apple, RpÀ items) and unpracticed elements from the categories without retrieval practice (e.g. gin, Nrp elements) which serve as a baseline. This paradigm APPLIED COGNITIVE PSYCHOLOGY
We study the critical effect of quarantine on the propagation of epidemics on an adaptive network of social contacts. For this purpose, we analyze the susceptible-infected-recovered (SIR) model in the presence of quarantine, where susceptible individuals protect themselves by disconnecting their links to infected neighbors with probability w, and reconnecting them to other susceptible individuals chosen at random. Starting from a single infected individual, we show by an analytical approach and simulations that there is a phase transition at a critical rewiring (quarantine) threshold w c separating a phase (w < w c ) where the disease reaches a large fraction of the population, from a phase (w ≥ w c ) where the disease does not spread out. We find that in our model the topology of the network strongly affects the size of the propagation, and that w c increases with the mean degree and heterogeneity of the network. We also find that w c is reduced if we perform a preferential rewiring, in which the rewiring probability is proportional to the degree of infected nodes.
We study the statistical properties of the SIR epidemics in heterogeneous networks, when an epidemic is defined as only those SIR propagations that reach or exceed a minimum size s c . Using percolation theory to calculate the average fractional size M SIR of an epidemic, we find that the strength of the spanning link percolation cluster P ∞ is an upper bound to M SIR . For small values of s c , P ∞ is no longer a good approximation, and the average fractional size has to be computed directly. The value of s c for which P ∞ is a good approximation is found to depend on the transmissibility T of the SIR. We also study Q, the probability that an SIR propagation reaches the epidemic mass s c , and find that it is well characterized by percolation theory. We apply our results to real networks (DIMES and Tracerouter) to measure the consequences of the choice s c on predictions of average outcome sizes of computer failure epidemics.Key words: Epidemic spread on networks, Percolation PACS: 64.60.ah, 87.23.Ge, The study of disease spread has seen renewed interest recently [1,2,3] due the emergence of new infectious lethal diseases such as AIDS and SARS [4,5]. New tools, ranging from powerful computer models [6] to new conceptual developments [1,7,8,9,10,11], have emerged in hopes of understanding and addressing the problem effectively. Among the new tools that have become available to tackle infectious dis- Preprint submitted to Elsevier 7 August 2008ease propagation, complex network theory [12,13] has seen considerable interest [5,2], as a way to address the shortcomings of more classic approaches [4] where all individuals in the population of interest are assumed to have an equal probability to infect all other individuals (random-mixing). In contrast to the random-mixing approach, complex networks (heterogenous mixing) assume that each individual (represented by a node) has a defined set of contacts (represented by links) to other specific individuals (called neighbors), and infections can be propagated only through these contacts. This new technical framework has produced novel insights that are expected to help considerably in the fight against infectious diseases [9,5].The use of complex network theory requires a few pieces of information in order to be correctly applied. First, it is important to understand the kind of disease being considered, as this will dictate the specifics of the network model that needs to be used. For example, the flu virus usually spreads among people that come in contact even briefly, leading to networks with fat-tailed distributions of connections with large average degree [6]. On the other hand, sexually transmitted diseases are better described by more sparse, and fairly heterogeneous contact networks [4]. Thus, these two examples easily illustrate one of the complications of the problem: the structure of the network to be used. Other aspects involve the life cycle of the pathogen, seasonality, etc. Additionally, social and practical aspects involving public health policy a...
The aim of the present study was to analyse memory performance in young and older adults based on a robbery scenario. The study examined free recall and the recognition of actions, people and details, as well as the Remember/Know/Guess judgements that accompanied recognition. Recognition was evaluated both immediately and 1 week later, although performance was not affected by the retention interval. In the free recall task, the older adults remembered less information than the younger adults but we found no differences between the two with regard to errors. Participants accepted more false actions, thus achieving higher recognition accuracy for people and details. They also categorized false alarms for actions more often as remember than as know or guess judgements. This pattern of results was more pronounced in the older adults, suggesting that aging is an important factor in false memories for events.
We examined the memory for central and peripheral information concerning a crime and the acceptance of false information. We also studied eyewitnesses' confidence in their memory. Participants were shown a video depicting a bank robbery and a questionnaire was used to introduce false central and peripheral information. The next day the participants completed a recognition task in which they rated the confidence of their responses. Performance was better for central information and participants registered more false alarms for peripheral contents. The cognitive system's limited attentional capacity and the greater information capacity of central elements may facilitate processing the more important information. The presentation of misinformation seriously impaired eyewitness memory by prompting a more lenient response criterion. Participants were more confident with central than with peripheral information. Eyewitness memory is easily distorted in peripheral aspects but it is more difficult to make mistakes with central information. However, when false information is introduced, errors in central information can be accompanied by high confidence, thus rendering them credible and legally serious.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.