Show simple item record

dc.contributor.supervisorHollins, Tim
dc.contributor.authorRandle, James
dc.contributor.otherFaculty of Healthen_US
dc.date.accessioned2022-03-23T14:35:11Z
dc.date.available2022-03-23T14:35:11Z
dc.date.issued2022
dc.identifier10595298en_US
dc.identifier.urihttp://hdl.handle.net/10026.1/18969
dc.description.abstract

This thesis aimed to investigate in detail the processes underlying the control of recall accuracy. It is believed that recall accuracy control comprises processes occurring at memory search and post-retrieval. There is a large body of research concerning post-retrieval monitoring processes; however, less is known about how memory search is constrained and what factors affect this process.Chapter 2 developed and tested a new paradigm for measuring the accuracy of constrained search and monitoring processes simultaneously. Participants were able to selectively retrieve one of two lists irrespective of which list was the target list, indicating successful constrained search. A key role for context reinstatement in constraining search was established through source clustering. Participants were also highly accurate in monitoring the correctness of retrieved items. Chapter 3 required participants to constrain search to one of two sources within a single list of items (Mixed-lists). Participants were able to do this, although search accuracy was poorer than for List membership (Chapter 2). Despite this, monitoring accuracy did not differ between List membership and Mixed-lists. Only source monitoring was sensitive to source manipulations within a single experiment. Chapter 4 presented an alternative method of measuring constrained search, which relies on curve fitting of recall latencies to estimate the size of a participant’s search set. This method successfully reproduced the findings from Experiments 2.3 (List membership) and 3.2 (Mixed-lists). Unfortunately due to poor curve fits, attempts to replicate findings from Experiment 3.1 were unsuccessful. Chapter 5 presents a retrieval model which attempts to replicate the typical pattern of declining search accuracy as the recall period progresses, with the assumption that participants’ ability to search for targets does not decline throughout the recall period. This model was able to produce accuracy curves which fit the search accuracy data fairly well; however, predictions for other recall metrics were poor. On the whole, this research demonstrates that in order to constrain search, participants must reinstate the context of the target source at retrieval, and that the success of constrained search is dependent upon the type of context or source which is encoded. Source monitoring data were generally in line with the predictions of the Source Monitoring Framework (Johnson et al., 1993).

en_US
dc.description.sponsorshipPlymouth University School of Psychologyen_US
dc.language.isoen
dc.publisherUniversity of Plymouth
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectMemoryen_US
dc.subjectMetamemoryen_US
dc.subjectEpisodic memoryen_US
dc.subjectLong-term memoryen_US
dc.subjectMemory searchen_US
dc.subjectSource monitoringen_US
dc.subjectMetacognitionen_US
dc.subject.classificationPhDen_US
dc.titleContributions of Source-Constrained Search and Late Monitoring to Recall Accuracyen_US
dc.typeThesis
plymouth.versionpublishableen_US
dc.identifier.doihttp://dx.doi.org/10.24382/820
dc.rights.embargoperiodNo embargoen_US
dc.type.qualificationDoctorateen_US
rioxxterms.versionNA


Files in this item

Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV