56,102 research outputs found

    Adaptive false memory: Imagining future scenarios increases false memories in the DRM paradigm

    Get PDF
    Previous research has shown that rating words for their relevance to a future scenario enhances memory for those words. The current study investigated the effect of future thinking on false memory using the Deese/Roediger–McDermott (DRM) procedure. In Experiment 1, participants rated words from 6 DRM lists for relevance to a past or future event (with or without planning) or in terms of pleasantness. In a surprise recall test, levels of correct recall did not vary between the rating tasks, but the future rating conditions led to significantly higher levels of false recall than the past and pleasantness conditions did. Experiment 2 found that future rating led to higher levels of false recognition than did past and pleasantness ratings but did not affect correct recognition. The effect in false recognition was, however, eliminated when DRM items were presented in random order. Participants in Experiment 3 were presented with both DRM lists and lists of unrelated words. Future rating increased levels of false recognition for DRM lures but did not affect correct recognition for DRM or unrelated lists. The findings are discussed in terms of the view that false memories can be associated with adaptive memory functions

    False memory ≠ false memory: DRM errors are unrelated to the misinformation effect

    Get PDF
    The DRM method has proved to be a popular and powerful, if controversial, way to study 'false memories'. One reason for the controversy is that the extent to which the DRM effect generalises to other kinds of memory error has been neither satisfactorily established nor subject to much empirical attention. In the present paper we contribute data to this ongoing debate. One hundred and twenty participants took part in a standard misinformation effect experiment, in which they watched some CCTV footage, were exposed to misleading post-event information about events depicted in the footage, and then completed free recall and recognition tests. Participants also completed a DRM test as an ostensibly unrelated filler task. Despite obtaining robust misinformation and DRM effects, there were no correlations between a broad range of misinformation and DRM effect measures (mean r  = -.01). This was not due to reliability issues with our measures or a lack of power. Thus DRM 'false memories' and misinformation effect 'false memories' do not appear to be equivalent

    Evaluation of the volumetric erosion of spherical electrical contacts using the defect removal method

    No full text
    Volumetric erosion is regarded as a significant index for studying the erosion process of electrical switching contacts. Three-dimensional (3-D) surface measurement techniques provide an approach to investigate the geometric characteristics and volumetric erosion of electrical contacts. This paper presents a concrete data-processing procedure for evaluating volumetric erosion of spherical electrical contacts from 3-D surface measurement data using the defect removal method (DRM). The DRM outlined by McBride is an algorithm for evaluating the underlying form (prior to erosion) parameters of the surfaces with localized erosion and allowing the erosion characteristics themselves to be isolated. In this paper, a number of spherical electrical contacts that had undergone various electrical operations were measured using a 3-D surface profiler, the underlying form parameters of the eroded contacts were evaluated using the DRM, and then the volumetric erosions were isolated and calculated. The analysis of the correlations between the volumetric erosion and the number of switching cycles of electrical operation that the contacts had undergone showed a more accurate and reliable volumetric erosion evaluation using the DRM than that without using the DRM

    An Inverse Geometry Problem for the Localization of Skin Tumours by Thermal Analysis

    Get PDF
    In this paper, the Dual Reciprocity Method (DRM) is coupled to a Genetic Algorithm (GA) in an inverse procedure through which the size and location of a skin tumour may be obtained from temperature measurements at the skin surface. The GA is an evolutionary process which does not require the calculation of sensitivities, search directions or the definition of initial guesses. The DRM in this case requires no internal nodes. It is also shown that the DRM approximation function used is not an important factor for the problem considered here. Results are presented for tumours of different sizes and positions in relation to the skin surface

    White Knight or Trojan Horse? The Consequences of Digital Rights Management for Consumers, Firms and Society

    Get PDF
    Due to its ability to solve all main problems associated with digital goods, Digital Rights Management is the favourite option used by companies to tackle piracy. The aim of this article is to discuss the consequences of DRM for consumers, firms and society. The rationales of DRM are discussed and the expected benefits for firms are presented.. In contrast, consumers are shown to be likely to see few benefits in DRM. This article demonstrates that even a standard DRM system is unlikely to improve social welfare. The article concludes with some public policy recommendations.Digital Rights Management, Digital Goods, Piracy, Excludability, Durability, Sampling.

    Inducing false memories by manipulating memory self-efficacy

    Get PDF
    The aim of this paper is to investigate the relationship between self-efficacy and false memories using the Deese/Roediger–McDermott (DRM) paradigm, whereby people falsely remember words not presented in lists. In two studies participants were presented with DRM lists and asked to recall and recognize presented items. In the first study, we found a significant relationship between memory self-efficacy (MSE) and susceptibility to associative memory illusions, both in recall and recognition. They also received the Memory Self-Efficacy Questionnaire (MSEQ), the Big Five Questionnaire (BFQ) and the backward digit span (BDS) test. In the second study, MSE was manipulated in order to assess whether changes influenced the sensitivity parameter in DRM tasks. Results showed that the manipulation was effective in decreasing self-efficacy, which in turn affected the probability of reporting critical lures as well as sensitivity. Possible explanations for the effect are discussed

    DRM and Privacy

    Get PDF
    Interrogating the relationship between copyright enforcement and privacy raises deeper questions about the nature of privacy and what counts, or ought to count, as privacy invasion in the age of networked digital technologies. This Article begins, in Part II, by identifying the privacy interests that individuals enjoy in their intellectual activities and exploring the different ways in which certain implementations of DRM technologies may threaten those interests. Part III considers the appropriate scope of legal protection for privacy in the context of DRM, and argues that both the common law of privacy and an expanded conception of consumer protection law have roles to play in protecting the privacy of information users. As Parts II and III demonstrate, consideration of how the theory and law of privacy should respond to the development and implementation of DRM technologies also raises the reverse question: How should the development and implementation of DRM technologies respond to privacy theory and law? As artifacts designed to regulate user behavior, DRM technologies already embody value choices. Might privacy itself become one of the values embodied in DRM design? Part IV argues that with some conceptual and procedural adjustments, DRM technologies and related standard-setting processes could be harnessed to preserve and protect privacy
    corecore