COMPARISONS OF SYNTHESIZED AND INDIVIDUAL
REINFORCEMENT CONTINGENCIES DURING
FUNCTIONAL ANALYSIS
WAYNE W. FISHER, BRIAN D. GREER, PATRICK W. ROMANI,
AMANDA N. ZANGRILLO, AND TODD M. OWEN
UNIVERSITY OF NEBRASKA MEDICAL CENTER’S MUNROE-MEYER INSTITUTE
Researchers typically modify individual functional analysis (FA) conditions after results are
inconclusive (Hanley, Iwata, & McCord, 2003). Hanley, Jin, Vanselow, and Hanratty (2014)
introduced a marked departure from this practice, using an interview-informed synthesized
contingency analysis (IISCA). In the test condition, they delivered multiple contingencies simul-
taneously (e.g., attention and escape) after each occurrence of problem behavior; in the control
condition, they delivered those same reinforcers noncontingently and continuously. In the cur-
rent investigation, we compared the results of the IISCA with a more traditional FA in which
we evaluated each putative reinforcer individually. Four of 5 participants displayed destructive
behavior that was sensitive to the individual contingencies evaluated in the traditional FA. By
contrast, none of the participants showed a response pattern consistent with the assumption of
the IISCA. We discuss the implications of these findings on the development of accurate and
efficient functional analyses.
Key words: assessment of problem behavior, false-positive outcome, functional analysis, inde-
pendent effects, interaction effects
The development of functional analysis
(FA) represents one of the most important
advancements in the treatment of severe prob-
lem behavior (Beavers, Iwata, & Lerman,
2013), an event in the history of behavior anal-
ysis that has been described as landmark
(Betz & Fisher, 2011). Identification of the
antecedents that evoke and the consequences
that reinforce problem behavior via an FA
enables effective behavioral intervention. It does
so because an FA provides information on
(a) how to discontinue the contingency
between problem behavior and its reinforcer
(i.e., extinction) and (b) how to deliver that
reinforcer contingent on an appropriate
response or on a time-based schedule (Fisher &
Bouxsein, 2011; Vollmer & Athens, 2011;
Vollmer, Iwata, Zarcone, Smith, & Maza-
leski, 1993).
The FA method developed by Iwata, Dorsey,
Slifer, Bauman, and Richman (1982/1994) has
been the most widely used, researched, and
cited form of functional analysis (Beavers et al.,
2013; Hanley, Iwata, & McCord, 2003). This
method involves a control condition and a
series of test conditions based on the hypothe-
sized operant functions of self-injurious
behavior (SIB) described by Carr (1977):
(a) social-positive reinforcement (e.g., attention),
(b) social-negative reinforcement (e.g., escape
from nonpreferred activities), or (c) automatic
reinforcement (e.g., sensory stimulation).
Each FA test condition in the Iwata
et al. (1982/1994) method has three functional
components: a unique discriminative stimulus
(SD), a specific establishing op.
137JOURNAL OF APPLIED BEHAVIOR ANALYSIS 2002, 35, 137–154 AnastaciaShadelb
137
JOURNAL OF APPLIED BEHAVIOR ANALYSIS 2002, 35, 137–154 NUMBER 2 (SUMMER 2002)
USE OF A STRUCTURED DESCRIPTIVE ASSESSMENT
METHODOLOGY TO IDENTIFY VARIABLES
AFFECTING PROBLEM BEHAVIOR
CYNTHIA M. ANDERSON AND ETHAN S. LONG
WEST VIRGINIA UNIVERSITY
This study evaluated a variation of functional assessment methodology, the structured
descriptive assessment (SDA). The SDA is conducted in an individual’s natural environ-
ment and involves systematically manipulating antecedent variables while leaving conse-
quences free to vary. Results were evaluated by comparing the results of an SDA with
results obtained from an analogue functional analysis with 4 children who exhibited
problem behavior. For 3 of 4 participants, the results of the two assessments suggested
similar hypotheses about variables maintaining problem behavior. Interventions based on
the results of the SDA were implemented for 3 children and resulted in significant
reductions in rates of problem behavior.
DESCRIPTORS: functional assessment, functional analysis, intervention, problem
behavior
Research has demonstrated the utility of
the analogue functional analysis methodol-
ogy developed by Iwata, Dorsey, Slifer, Bau-
man, and Richman (1982/1994) for identi-
fying sources of reinforcement that maintain
aberrant behavior. This methodology sys-
tematically assesses situations hypothesized
to be analogueous to those in the natural
environment by directly manipulating pu-
tative antecedents and consequences for
problem behavior. The major advantage of
this methodology compared to other meth-
ods of functional assessment is that it allows
greater control over the environment, result-
ing in a more direct inference of functional
relations.
In contrast to the analogue functional
analysis, descriptive assessments involve di-
rect observation of behavior and events in
the individual’s natural environment and in-
Ethan Long is now at the Kennedy Krieger Insti-
tute, Baltimore, Maryland.
We thank Carie English, Shannon Haag, Bridget
Hayes, Ellen McCartney, and Mary Mich for their
assistance with data collection and analysis.
Address correspondence to Cynthia M. Anderson,
Department of Psychology, Box 6040, West Virginia
University, Morgantown, West Virginia 26506-6040
(e-mail: [email protected]).
volve less control over environmental vari-
ables. Descriptive assessments may yield in-
formation about naturally occurring sched-
ules of reinforcement and idiosyncratic var-
iables associated with problem behavior
(e.g., Fisher, Adelinis, Thompson, Worsdell,
& Zarcone, 1998; Mueller, Sterling-Turner,
& Scattone, 2001). As a result, descriptive
assessments may enhance understanding of
how reinforcement operates in the natural
environment.
Recent research suggests that descriptive
assessment may be beneficial in augmenting
analogue functional analyses. For example,
hypotheses about environment–behavior re-
lations might be developed via descriptive
assessment when results of an analogue ...
137JOURNAL OF APPLIED BEHAVIOR ANALYSIS 2002, 35, 137–154 ChantellPantoja184
137
JOURNAL OF APPLIED BEHAVIOR ANALYSIS 2002, 35, 137–154 NUMBER 2 (SUMMER 2002)
USE OF A STRUCTURED DESCRIPTIVE ASSESSMENT
METHODOLOGY TO IDENTIFY VARIABLES
AFFECTING PROBLEM BEHAVIOR
CYNTHIA M. ANDERSON AND ETHAN S. LONG
WEST VIRGINIA UNIVERSITY
This study evaluated a variation of functional assessment methodology, the structured
descriptive assessment (SDA). The SDA is conducted in an individual’s natural environ-
ment and involves systematically manipulating antecedent variables while leaving conse-
quences free to vary. Results were evaluated by comparing the results of an SDA with
results obtained from an analogue functional analysis with 4 children who exhibited
problem behavior. For 3 of 4 participants, the results of the two assessments suggested
similar hypotheses about variables maintaining problem behavior. Interventions based on
the results of the SDA were implemented for 3 children and resulted in significant
reductions in rates of problem behavior.
DESCRIPTORS: functional assessment, functional analysis, intervention, problem
behavior
Research has demonstrated the utility of
the analogue functional analysis methodol-
ogy developed by Iwata, Dorsey, Slifer, Bau-
man, and Richman (1982/1994) for identi-
fying sources of reinforcement that maintain
aberrant behavior. This methodology sys-
tematically assesses situations hypothesized
to be analogueous to those in the natural
environment by directly manipulating pu-
tative antecedents and consequences for
problem behavior. The major advantage of
this methodology compared to other meth-
ods of functional assessment is that it allows
greater control over the environment, result-
ing in a more direct inference of functional
relations.
In contrast to the analogue functional
analysis, descriptive assessments involve di-
rect observation of behavior and events in
the individual’s natural environment and in-
Ethan Long is now at the Kennedy Krieger Insti-
tute, Baltimore, Maryland.
We thank Carie English, Shannon Haag, Bridget
Hayes, Ellen McCartney, and Mary Mich for their
assistance with data collection and analysis.
Address correspondence to Cynthia M. Anderson,
Department of Psychology, Box 6040, West Virginia
University, Morgantown, West Virginia 26506-6040
(e-mail: [email protected]).
volve less control over environmental vari-
ables. Descriptive assessments may yield in-
formation about naturally occurring sched-
ules of reinforcement and idiosyncratic var-
iables associated with problem behavior
(e.g., Fisher, Adelinis, Thompson, Worsdell,
& Zarcone, 1998; Mueller, Sterling-Turner,
& Scattone, 2001). As a result, descriptive
assessments may enhance understanding of
how reinforcement operates in the natural
environment.
Recent research suggests that descriptive
assessment may be beneficial in augmenting
analogue functional analyses. For example,
hypotheses about environment–behavior re-
lations might be developed via descriptive
assessment when results of an analogue ...
This document is a thesis presented by Sarah Kenehan to fulfill requirements for a BA Honours degree in psychology from Maynooth University. The thesis explores the effect of rule order manipulation on implicit self-esteem as measured by the Implicit Relational Assessment Procedure (IRAP). Forty-one undergraduate students participated in the study and were split into two groups where the order of rules presented in the IRAP was varied. Preliminary results showed some differences between groups, especially for self-positive and other-positive trial types, but these differences were not statistically significant. The findings suggest that implicit responding on the IRAP may be influenced by rule order effects.
A PROCEDURE FOR IDENTIFYING PRECURSORS TOPROBLEM BEHAVIOR.docxbartholomeocoombs
A PROCEDURE FOR IDENTIFYING PRECURSORS TO
PROBLEM BEHAVIOR
BRANDON HERSCOVITCH, EILEEN M. ROSCOE, MYRNA E. LIBBY,
JASON C. BOURRET, AND WILLIAM H. AHEARN
NEW ENGLAND CENTER FOR CHILDREN
NORTHEASTERN UNIVERSITY
We describe a procedure for differentiating among potential precursor responses for use in a
functional analysis. Conditional probability analysis of descriptive assessment data identified
three potential precursors. Results from the indirect assessment corresponded with those
obtained from the descriptive assessment. The top-ranked response identified as a precursor
according to the indirect assessment had the strongest relation according to the probability
analysis. When contingencies were arranged for the precursor in a functional analysis, the same
function was identified as for target behavior, supporting the utility of indirect and descriptive
methods to identify precursor behavior empirically.
DESCRIPTORS: descriptive assessment, functional analysis, precursors, problem behavior,
response-class hierarchies
_______________________________________________________________________________
Functional analysis (Iwata, Dorsey, Slifer,
Bauman, & Richman, 1982/1994) involves
manipulating antecedents and consequences
for the target behavior of interest. Because a
functional analysis requires the repeated occur-
rence of a target response, it may not be
appropriate for response topographies that pose
risk of harm to others (e.g., severe aggression) or
the client (e.g., self-injury). One modification
that has addressed this concern involves a
functional analysis of precursor behavior (i.e.,
arranging contingencies for responses that
reliably precede the target behavior) based on
previous research showing that response topog-
raphies that occur in close temporal proximity
are often members of the same response class,
and by providing differential reinforcement for
earlier responses in the response-class hierarchy,
later more severe responses occur less often
(Harding et al., 2001; Lalli, Mace, Wohn, &
Livezey, 1995; Richman, Wacker, Asmus,
Casey, & Andelman, 1999).
Smith and Churchill (2002) conducted a
functional analysis of precursor behavior and
found similar outcomes from a functional
analysis of the target behavior and a functional
analysis of the hypothesized precursor behavior.
A study by Najdowski, Wallace, Ellsworth,
MacAleese, and Cleveland (2008) extended this
work by demonstrating that an intervention
based on a functional analysis of precursor
behavior was effective in eliminating partici-
pants’ precursor behavior. The implication of
these findings is that outcomes from functional
analyses of precursor responses may be used to
infer the function of more severe topographies
that occur later in the response-class hierarchy.
A potential limitation associated with both of
these studies is that indirect assessments alone
were used to identify precursor responses. Such
assessments have sometimes been found to have
poor reliab.
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxSusanaFurman449
Journal of Organizational Behavior
J. Organiz. Behav. 31, 24–44 (2010)
Published online 22 May 2009 in Wiley InterScience
(www.interscience.wiley.com) DOI: 10.1002/job.621
Towards a multi-foci approach to
workplace aggression: A meta-analytic
review of outcomes from different
yperpetrators
M. SANDY HERSHCOVIS1* AND JULIAN BARLING2
1I. H. Asper School of Business, University of Manitoba, Winnipeg, Manitoba, Canada
2Queen’s School of Business, Queen’s University, Kingston, Ontario, Canada
Summary Using meta-analysis, we compare three attitudinal outcomes (i.e., job satisfaction, affective
commitment, and turnover intent), three behavioral outcomes (i.e., interpersonal deviance,
organizational deviance, and work performance), and four health-related outcomes (i.e.,
general health, depression, emotional exhaustion, and physical well being) of workplace
aggression from three different sources: Supervisors, co-workers, and outsiders. Results from
66 samples show that supervisor aggression has the strongest adverse effects across the
attitudinal and behavioral outcomes. Co-worker aggression had stronger effects than outsider
aggression on the attitudinal and behavioral outcomes, whereas there was no significant
difference between supervisor, co-worker, and outsider aggression for the majority of the
health-related outcomes. These results have implications for how workplace aggression is
conceptualized and measured, and we propose new research questions that emphasize a multi-
foci approach. Copyright # 2009 John Wiley & Sons, Ltd.
I admit that, before I was bullied, I couldn’t understand why employees would shy-away from doing
anything about it. When it happened to me, I felt trapped. I felt like either no one believed me or no
one cared. This bully was my direct boss and went out of his way to make me look and feel
incompetent. . . I dreaded going to work and cried myself to sleep every night. I was afraid of
losing my job because I started to question my abilities and didn’t think I’d find work elsewhere.
(HR professional as posted on a New York Times blog, 2008).
Introduction
Growing awareness of psychological forms of workplace aggression has stimulated research interest in
the consequences of these negative behaviors. Workplace aggression is defined as negative acts that are
* Correspondence to: M. Sandy Hershcovis, I. H. Asper School of Business, University of Manitoba, Winnipeg, Manitoba,
Canada. E-mail: [email protected]
yAn earlier version of this study was presented at the 65th Annual Meeting of the Academy of Management, Honolulu, HI.
Received 28 April 2008
Revised 17 March 2009
Copyright # 2009 John Wiley & Sons, Ltd. Accepted 4 April 2009
mailto:[email protected]
www.interscience.wiley.com
25 AGGRESSION META-ANALYSIS
perpetrated against an organization or its members and that victims are motivated to avoid (Neuman &
Baron, 2005; Raver & Barling, 2007). Much of this research (e.g., .
MOTIVATING OPERATIONS AND TERMS TO DESCRIBE THEM: SOME FURTHER REFINEMENTSelitebehavior
This document discusses refinements to terminology used to describe motivating operations (MOs) in behavior analysis. It suggests that:
1) Not all motivating events are establishing operations, as some decrease rather than increase the effectiveness of consequences. These are better described as abolishing operations (AOs).
2) A single MO can affect multiple behaviors both positively and negatively.
3) MOs influence the punishing as well as reinforcing effectiveness of consequences by altering how desirable those consequences are.
The document discusses experimental research methods. It defines key terms like experimental design, independent variable, dependent variable, and control variables. It explains that the experimenter manipulates the independent variable to determine its effect on the dependent variable, while controlling for other influences. The document also outlines the basic process for conducting experimental studies, including selecting a problem, developing a design, executing the procedure, analyzing data, and forming conclusions. Overall, the summary provides an overview of experimental research methodology and its basic terminology and procedures.
137JOURNAL OF APPLIED BEHAVIOR ANALYSIS 2002, 35, 137–154 AnastaciaShadelb
137
JOURNAL OF APPLIED BEHAVIOR ANALYSIS 2002, 35, 137–154 NUMBER 2 (SUMMER 2002)
USE OF A STRUCTURED DESCRIPTIVE ASSESSMENT
METHODOLOGY TO IDENTIFY VARIABLES
AFFECTING PROBLEM BEHAVIOR
CYNTHIA M. ANDERSON AND ETHAN S. LONG
WEST VIRGINIA UNIVERSITY
This study evaluated a variation of functional assessment methodology, the structured
descriptive assessment (SDA). The SDA is conducted in an individual’s natural environ-
ment and involves systematically manipulating antecedent variables while leaving conse-
quences free to vary. Results were evaluated by comparing the results of an SDA with
results obtained from an analogue functional analysis with 4 children who exhibited
problem behavior. For 3 of 4 participants, the results of the two assessments suggested
similar hypotheses about variables maintaining problem behavior. Interventions based on
the results of the SDA were implemented for 3 children and resulted in significant
reductions in rates of problem behavior.
DESCRIPTORS: functional assessment, functional analysis, intervention, problem
behavior
Research has demonstrated the utility of
the analogue functional analysis methodol-
ogy developed by Iwata, Dorsey, Slifer, Bau-
man, and Richman (1982/1994) for identi-
fying sources of reinforcement that maintain
aberrant behavior. This methodology sys-
tematically assesses situations hypothesized
to be analogueous to those in the natural
environment by directly manipulating pu-
tative antecedents and consequences for
problem behavior. The major advantage of
this methodology compared to other meth-
ods of functional assessment is that it allows
greater control over the environment, result-
ing in a more direct inference of functional
relations.
In contrast to the analogue functional
analysis, descriptive assessments involve di-
rect observation of behavior and events in
the individual’s natural environment and in-
Ethan Long is now at the Kennedy Krieger Insti-
tute, Baltimore, Maryland.
We thank Carie English, Shannon Haag, Bridget
Hayes, Ellen McCartney, and Mary Mich for their
assistance with data collection and analysis.
Address correspondence to Cynthia M. Anderson,
Department of Psychology, Box 6040, West Virginia
University, Morgantown, West Virginia 26506-6040
(e-mail: [email protected]).
volve less control over environmental vari-
ables. Descriptive assessments may yield in-
formation about naturally occurring sched-
ules of reinforcement and idiosyncratic var-
iables associated with problem behavior
(e.g., Fisher, Adelinis, Thompson, Worsdell,
& Zarcone, 1998; Mueller, Sterling-Turner,
& Scattone, 2001). As a result, descriptive
assessments may enhance understanding of
how reinforcement operates in the natural
environment.
Recent research suggests that descriptive
assessment may be beneficial in augmenting
analogue functional analyses. For example,
hypotheses about environment–behavior re-
lations might be developed via descriptive
assessment when results of an analogue ...
137JOURNAL OF APPLIED BEHAVIOR ANALYSIS 2002, 35, 137–154 ChantellPantoja184
137
JOURNAL OF APPLIED BEHAVIOR ANALYSIS 2002, 35, 137–154 NUMBER 2 (SUMMER 2002)
USE OF A STRUCTURED DESCRIPTIVE ASSESSMENT
METHODOLOGY TO IDENTIFY VARIABLES
AFFECTING PROBLEM BEHAVIOR
CYNTHIA M. ANDERSON AND ETHAN S. LONG
WEST VIRGINIA UNIVERSITY
This study evaluated a variation of functional assessment methodology, the structured
descriptive assessment (SDA). The SDA is conducted in an individual’s natural environ-
ment and involves systematically manipulating antecedent variables while leaving conse-
quences free to vary. Results were evaluated by comparing the results of an SDA with
results obtained from an analogue functional analysis with 4 children who exhibited
problem behavior. For 3 of 4 participants, the results of the two assessments suggested
similar hypotheses about variables maintaining problem behavior. Interventions based on
the results of the SDA were implemented for 3 children and resulted in significant
reductions in rates of problem behavior.
DESCRIPTORS: functional assessment, functional analysis, intervention, problem
behavior
Research has demonstrated the utility of
the analogue functional analysis methodol-
ogy developed by Iwata, Dorsey, Slifer, Bau-
man, and Richman (1982/1994) for identi-
fying sources of reinforcement that maintain
aberrant behavior. This methodology sys-
tematically assesses situations hypothesized
to be analogueous to those in the natural
environment by directly manipulating pu-
tative antecedents and consequences for
problem behavior. The major advantage of
this methodology compared to other meth-
ods of functional assessment is that it allows
greater control over the environment, result-
ing in a more direct inference of functional
relations.
In contrast to the analogue functional
analysis, descriptive assessments involve di-
rect observation of behavior and events in
the individual’s natural environment and in-
Ethan Long is now at the Kennedy Krieger Insti-
tute, Baltimore, Maryland.
We thank Carie English, Shannon Haag, Bridget
Hayes, Ellen McCartney, and Mary Mich for their
assistance with data collection and analysis.
Address correspondence to Cynthia M. Anderson,
Department of Psychology, Box 6040, West Virginia
University, Morgantown, West Virginia 26506-6040
(e-mail: [email protected]).
volve less control over environmental vari-
ables. Descriptive assessments may yield in-
formation about naturally occurring sched-
ules of reinforcement and idiosyncratic var-
iables associated with problem behavior
(e.g., Fisher, Adelinis, Thompson, Worsdell,
& Zarcone, 1998; Mueller, Sterling-Turner,
& Scattone, 2001). As a result, descriptive
assessments may enhance understanding of
how reinforcement operates in the natural
environment.
Recent research suggests that descriptive
assessment may be beneficial in augmenting
analogue functional analyses. For example,
hypotheses about environment–behavior re-
lations might be developed via descriptive
assessment when results of an analogue ...
This document is a thesis presented by Sarah Kenehan to fulfill requirements for a BA Honours degree in psychology from Maynooth University. The thesis explores the effect of rule order manipulation on implicit self-esteem as measured by the Implicit Relational Assessment Procedure (IRAP). Forty-one undergraduate students participated in the study and were split into two groups where the order of rules presented in the IRAP was varied. Preliminary results showed some differences between groups, especially for self-positive and other-positive trial types, but these differences were not statistically significant. The findings suggest that implicit responding on the IRAP may be influenced by rule order effects.
A PROCEDURE FOR IDENTIFYING PRECURSORS TOPROBLEM BEHAVIOR.docxbartholomeocoombs
A PROCEDURE FOR IDENTIFYING PRECURSORS TO
PROBLEM BEHAVIOR
BRANDON HERSCOVITCH, EILEEN M. ROSCOE, MYRNA E. LIBBY,
JASON C. BOURRET, AND WILLIAM H. AHEARN
NEW ENGLAND CENTER FOR CHILDREN
NORTHEASTERN UNIVERSITY
We describe a procedure for differentiating among potential precursor responses for use in a
functional analysis. Conditional probability analysis of descriptive assessment data identified
three potential precursors. Results from the indirect assessment corresponded with those
obtained from the descriptive assessment. The top-ranked response identified as a precursor
according to the indirect assessment had the strongest relation according to the probability
analysis. When contingencies were arranged for the precursor in a functional analysis, the same
function was identified as for target behavior, supporting the utility of indirect and descriptive
methods to identify precursor behavior empirically.
DESCRIPTORS: descriptive assessment, functional analysis, precursors, problem behavior,
response-class hierarchies
_______________________________________________________________________________
Functional analysis (Iwata, Dorsey, Slifer,
Bauman, & Richman, 1982/1994) involves
manipulating antecedents and consequences
for the target behavior of interest. Because a
functional analysis requires the repeated occur-
rence of a target response, it may not be
appropriate for response topographies that pose
risk of harm to others (e.g., severe aggression) or
the client (e.g., self-injury). One modification
that has addressed this concern involves a
functional analysis of precursor behavior (i.e.,
arranging contingencies for responses that
reliably precede the target behavior) based on
previous research showing that response topog-
raphies that occur in close temporal proximity
are often members of the same response class,
and by providing differential reinforcement for
earlier responses in the response-class hierarchy,
later more severe responses occur less often
(Harding et al., 2001; Lalli, Mace, Wohn, &
Livezey, 1995; Richman, Wacker, Asmus,
Casey, & Andelman, 1999).
Smith and Churchill (2002) conducted a
functional analysis of precursor behavior and
found similar outcomes from a functional
analysis of the target behavior and a functional
analysis of the hypothesized precursor behavior.
A study by Najdowski, Wallace, Ellsworth,
MacAleese, and Cleveland (2008) extended this
work by demonstrating that an intervention
based on a functional analysis of precursor
behavior was effective in eliminating partici-
pants’ precursor behavior. The implication of
these findings is that outcomes from functional
analyses of precursor responses may be used to
infer the function of more severe topographies
that occur later in the response-class hierarchy.
A potential limitation associated with both of
these studies is that indirect assessments alone
were used to identify precursor responses. Such
assessments have sometimes been found to have
poor reliab.
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxSusanaFurman449
Journal of Organizational Behavior
J. Organiz. Behav. 31, 24–44 (2010)
Published online 22 May 2009 in Wiley InterScience
(www.interscience.wiley.com) DOI: 10.1002/job.621
Towards a multi-foci approach to
workplace aggression: A meta-analytic
review of outcomes from different
yperpetrators
M. SANDY HERSHCOVIS1* AND JULIAN BARLING2
1I. H. Asper School of Business, University of Manitoba, Winnipeg, Manitoba, Canada
2Queen’s School of Business, Queen’s University, Kingston, Ontario, Canada
Summary Using meta-analysis, we compare three attitudinal outcomes (i.e., job satisfaction, affective
commitment, and turnover intent), three behavioral outcomes (i.e., interpersonal deviance,
organizational deviance, and work performance), and four health-related outcomes (i.e.,
general health, depression, emotional exhaustion, and physical well being) of workplace
aggression from three different sources: Supervisors, co-workers, and outsiders. Results from
66 samples show that supervisor aggression has the strongest adverse effects across the
attitudinal and behavioral outcomes. Co-worker aggression had stronger effects than outsider
aggression on the attitudinal and behavioral outcomes, whereas there was no significant
difference between supervisor, co-worker, and outsider aggression for the majority of the
health-related outcomes. These results have implications for how workplace aggression is
conceptualized and measured, and we propose new research questions that emphasize a multi-
foci approach. Copyright # 2009 John Wiley & Sons, Ltd.
I admit that, before I was bullied, I couldn’t understand why employees would shy-away from doing
anything about it. When it happened to me, I felt trapped. I felt like either no one believed me or no
one cared. This bully was my direct boss and went out of his way to make me look and feel
incompetent. . . I dreaded going to work and cried myself to sleep every night. I was afraid of
losing my job because I started to question my abilities and didn’t think I’d find work elsewhere.
(HR professional as posted on a New York Times blog, 2008).
Introduction
Growing awareness of psychological forms of workplace aggression has stimulated research interest in
the consequences of these negative behaviors. Workplace aggression is defined as negative acts that are
* Correspondence to: M. Sandy Hershcovis, I. H. Asper School of Business, University of Manitoba, Winnipeg, Manitoba,
Canada. E-mail: [email protected]
yAn earlier version of this study was presented at the 65th Annual Meeting of the Academy of Management, Honolulu, HI.
Received 28 April 2008
Revised 17 March 2009
Copyright # 2009 John Wiley & Sons, Ltd. Accepted 4 April 2009
mailto:[email protected]
www.interscience.wiley.com
25 AGGRESSION META-ANALYSIS
perpetrated against an organization or its members and that victims are motivated to avoid (Neuman &
Baron, 2005; Raver & Barling, 2007). Much of this research (e.g., .
MOTIVATING OPERATIONS AND TERMS TO DESCRIBE THEM: SOME FURTHER REFINEMENTSelitebehavior
This document discusses refinements to terminology used to describe motivating operations (MOs) in behavior analysis. It suggests that:
1) Not all motivating events are establishing operations, as some decrease rather than increase the effectiveness of consequences. These are better described as abolishing operations (AOs).
2) A single MO can affect multiple behaviors both positively and negatively.
3) MOs influence the punishing as well as reinforcing effectiveness of consequences by altering how desirable those consequences are.
The document discusses experimental research methods. It defines key terms like experimental design, independent variable, dependent variable, and control variables. It explains that the experimenter manipulates the independent variable to determine its effect on the dependent variable, while controlling for other influences. The document also outlines the basic process for conducting experimental studies, including selecting a problem, developing a design, executing the procedure, analyzing data, and forming conclusions. Overall, the summary provides an overview of experimental research methodology and its basic terminology and procedures.
·Response GuidelinesReply to the posts of two peer.docxlanagore871
·
Response Guidelines
Reply to the posts of two peers in this discussion. You may want to share insights you have related to your peer's application of research concepts, or ask a clarifying question. You may choose to comment on how the article presented by your peer is relevant to your own professional interests. Each peer response need to have at least two references.
1
st
Peer posting
Chang et al. (2016) conducted a study to determine if there was an answer to the contradicting study results regarding the brain activity in schizophrenics and their siblings. Earlier research has given mixed results stating that schizophrenics have excessive brain activity and others show that they have incoherent activity. The same mixed results showed up in research on siblings of schizophrenics. This study used amplitudes of low-frequency fluctuations (ALFF) as well as regional homogeneity (Reho). The used the ALFF and Reho to track the intensity as well as any synchronization of local spontaneous neuronal activity among three groups of participants (Chang et al., 2016).
Repovs and Barch (2012) conducted a study using a similar research design but instead they were looking for how functional connectivity may differ in schizophrenics when there is no cognitive task involved, a light cognitive task, and then a more demanding cognitive task. The study used participants who were diagnosed with schizophrenia and their siblings, and health individuals and their siblings. These four different groups helped to determine if there was any difference between a sibling of an individual with schizophrenia compared to siblings that were not impaired. The study focused on the working memory of the individuals. fMRI scans were used as well as other basic imaging and recall memory assessment activities (Repovs & Barch, 2012).
The study conducted by Chang et al. (2016) was using reliable testing techniques in regards to the neuronal activity that was tracked. The sample size was not very large but did have the randomized factor by comparing the results to not one but two variables (siblings and non-related healthy individuals). Had the sample size been larger the results could likely be more generalizable. The participants were gathered using participants from a other studies the researchers had done. There were 27 participants who were diagnosed with schizophrenia, 27 non effected siblings, and 27 healthy unrelated participants. The research design was used to map the activity in the brain of all three groups in different circumstances so they could compare the results to find any commonalities or clear differences. This method of research helped to determine if there was any validity to the claims of either excessive brain activity or incoherent activity in schizophrenics and their siblings. This study seems to be a quasi-experimental study since it has a group used for comparison but it does not use random assignment (Sherperis, Young & .
Researchers must focus on validity in experiments to ensure they are measuring the intended variables. There are two main types of validity: internal and external. Internal validity concerns whether the independent variable caused changes in the dependent variable, rather than other extraneous variables. External validity relates to how well results generalize to the target population. To increase internal validity, researchers use controls like random assignment and measure potential extraneous variables. While controls boost internal validity, they reduce external validity by limiting realistic behavior. To improve external validity, researchers aggregate data from many subjects and trials, include multiple dependent variables, and conduct experiments in natural settings.
The Causal Relation Between Job Attitudes and PerformanceA .docxmamanda2
The Causal Relation Between Job Attitudes and Performance:
A Meta-Analysis of Panel Studies
Michael Riketta
Aston University
Do job attitudes cause performance, or is it the other way around? To answer this perennial question, the
author conducted meta-analytic regression analyses on 16 studies that had repeatedly measured perfor-
mance and job attitudes (i.e., job satisfaction or organizational commitment). The effect of job attitudes
on subsequent performance, with baseline performance controlled, was weak but statistically significant
(� � .06). The effect was slightly stronger for commitment than for satisfaction and depended negatively
on time lag. Effects of performance on subsequent job attitudes were elusive (� � .00 across all studies),
which suggests that job attitudes are more likely to influence performance than vice versa.
Keywords: job satisfaction, organizational commitment, performance, organizational citizenship behav-
ior, meta-analysis
Few topics in industrial and organizational psychology have
received as much attention as has the relation between job attitudes
and performance (e.g., Brief & Weiss, 2002; Judge, Thoresen,
Bono, & Patton, 2001; Meyer & Allen, 1997; Mowday, Porter, &
Steers, 1982; Staw, Sutton, & Pelled, 1994). Numerous meta-
analyses (e.g., Cooper-Hakim & Viswesvaran, 2005; Harrison,
Newman, & Roth, 2006; Judge et al., 2001; Meyer, Stanley,
Herscovitch, & Topolnytsky, 2002; Riketta, 2002) have demon-
strated that positive job attitudes, such as commitment and satis-
faction, are accompanied by better work outcomes. Although the
existence of positive correlations is well established, the causal
relationship between job attitudes and performance is still unclear.
Do job attitudes increase performance? Is it the other way around?
Or are the frequently observed correlations between job attitudes
and performance spurious (e.g., due to common causes)? The vast
majority of empirical studies on job attitudes and performance are
mute on these issues because of their cross-sectional designs. The
same is true of the aforementioned meta-analyses. Thus, the long-
standing debate about the causal relationship between job attitudes
and individual performance (e.g., Harrison et al., 2006; Judge et
al., 2001; March & Sutton, 1997; Organ, 1977; Schwab & Cum-
mings, 1970) is far from being resolved.
The goal in this article is to contribute to this debate by provid-
ing the most controlled (to date) meta-analytic test of causal links
between job attitudes and performance. This article is built around
a meta-analysis of panel studies on these two constructs. These
studies permit the extent to which job attitudes predict perfor-
mance to be disentangled from the extent to which performance
predicts job attitudes. In this article, meta-analytic regression anal-
ysis is applied to the aggregated correlations to estimate the unique
effect of job attitudes on performance (with baseline performance
controlled) and the unique ef.
When conducting an experiment, researchers must focus on validity, or ensuring they are measuring what they intend to. There are two main types of validity - internal and external. Internal validity refers to ensuring the independent variable is truly causing changes in the dependent variable, not other extraneous variables. External validity concerns how well results generalize to the target population. To improve validity, researchers should control for extraneous variables through techniques like random assignment and defining variables well. They can also improve external validity through aggregation, multivariate designs, and minimizing reactivity to elicit more natural behaviors.
This document discusses experimental research design. It defines experimental research as a method that can truly test hypotheses about cause-and-effect relationships. It then explains key aspects of experimental design including experimental and control groups, pre-tests and post-tests, independent and dependent variables, and methods for controlling extraneous variables like randomization and matching. Finally, it discusses types of experimental designs and factors that can affect the validity of experimental research.
DOI 10.1007s00213-008-1173-0REVIEWThe role of impul.docxelinoraudley582231
DOI 10.1007/s00213-008-1173-0
REVIEW
The role of impulsive behavior in drug abuse
Jennifer L. Perry & Marilyn E. Carroll
Received: 6 August 2007 /Accepted: 14 April 2008 /Published online: 5 July 2008
Psychopharmacology (2008) 200:1–26
20 Psychopharmacology (2008) 200:1–26
Psychopharmacology (2008) 200:1–26 21
# Springer-Verlag 2008
Abstract
Background Impulsivity is a multifaceted construct that has recently been recognized as a factor contributing to enhanced vulnerability to drug abuse.
Objectives In the present review, we focus on two facets of impulsivity (and tasks that measure them): (1) impulsive choice (delay discounting task) and (2) inhibitory failure (go/no-go, stop signal reaction time, and five-choice serial reaction time tasks). We also describe how performance on each of these tasks is associated with drug-related behavior during phases of drug abuse that capture the essential features of addiction (acquisition, escalation, and reinstatement of drug-seeking after drug access has terminated). Three hypotheses (H) regarding the relationship between impulsivity and drug abuse are discussed: (1) increased levels of impulsivity lead to drug abuse (H1), (2) drugs of abuse increase impulsivity (H2), and (3) impulsivity and drug abuse are associated through a common third factor (H3). Conclusion Impulsivity expressed as impulsive choice or inhibitory failure plays a role in several key transition phases of drug abuse. There is evidence to support all three nonexclusive hypotheses. Increased levels of impulsivity lead to acquisition of drug abuse (H1) and subsequent escalation or dysregulation of drug intake. Drugs of abuse may increase impulsivity (H2), which is an additional contributor to escalation/dysregulation. Abstinence, relapse,
J. L. Perry (*)
Minneapolis Medical Research Foundation,
S-3, 860, 914 South 8th Street, Minneapolis, MN 55404, USA e-mail: [email protected]
M. E. Carroll
Department of Psychiatry,
University of Minnesota Medical School,
MMC 392,
Minneapolis, MN 55455, USA
and treatment may be influenced by both H1 and H2. In addition, there is a relationship between impulsivity and other drug abuse vulnerability factors, such as sex, hormonal status, reactivity to nondrug rewards, and early environmental experiences that may impact drug intake during all phases of addiction (H3). Relating drug abuse and impulsivity in phases of addiction via these three hypotheses provides a heuristic model from which future experimental questions can be addressed.
Keywords Abstinence . Acquisition . Animal models .
Delay discounting . Drug abuse . Dysregulation . Escalation .
Five-choice serial reaction time task . Go/no-go task .
Impulsive choice . Impulsivity. Inhibition . Relapse .
Stop signal reaction time task . Treatment
Introduction
A growing number of studies using behavioral, neurobiological, and imaging techniques have confirmed a strong association between impulsivity and addictive behaviors such as drug abuse, bin.
Applied Behavior Analysis (ABA) is a technique used to change behaviors through reinforcement and modification of environmental factors. Studies have shown ABA to be effective in improving skills and reducing problematic behaviors for individuals with autism when applied early on. However, some argue ABA follows a "cookbook" approach and does not account for each child's individual needs and experience of autism. Effective ABA requires training parents to understand their child's behaviors and needs to develop personalized intervention plans rather than relying on statistics.
This article provides guidance on analyzing conditional indirect effects, also known as moderated mediation. It aims to clarify conflicting definitions of moderated mediation and describe approaches for estimating and testing hypotheses about conditional indirect effects. These include standard errors for hypothesis testing, bootstrapping methods, and techniques for probing significant conditional indirect effects. The article introduces an SPSS macro and illustrates these methods using data on the indirect effect of student interest on math performance.
Attitudes and attitude changePetty, Richard E; Wegener, Duane T;.docxcelenarouzie
Attitudes and attitude change
Petty, Richard E; Wegener, Duane T; Fabrigar, Leandre R.Annual Review of Psychology; Palo Alto Vol. 48, (1997): 609-47.
1. Full text
2. Full text - PDF
3. Abstract/Details
Abstract
TranslateAbstract
We review empirical and conceptual developments over the past four years (1992-1995) on attitudes and persuasion. A voluminous amount of material was produced concerning attitude structure, attitude change, and the consequences of holding attitudes. In the structure area, particular attention is paid to work on attitude accessibility, ambivalence, and the affective versus cognitive bases of attitudes. In persuasion, our review examines research that has focused on high effort cognitive processes (central route), low effort processes (peripheral route), and the multiple roles by which variables can have an impact on attitudes. Special emphasis is given to work on cognitive dissonance and other biases in message processing, and on the multiple processes by which mood influences evaluations. Work on the consequences of attitudes focuses on the impact of attitudes on behavior and social judgments.
Full text
· TranslateFull text
·
Headnote
ABSTRACT
Headnote
We review empirical and conceptual developments over the past four years (1992-1995) on attitudes and persuasion. A voluminous amount of material was produced concerning attitude structure, attitude change, and the consequences of holding attitudes. In the structure area, particular attention is paid to work on attitude accessiblity, ambivalence, and the affective versus cognitive bases of attitudes. In persuasion, our review examines research that has focused on high effort cognitive processes (central route), low effort processes (peripheral route), and the multiple roles by which variables can have an impact on attitudes. Special emphasis is given to work on cognitive dissonance and other biases in message processing, and on the multiple processes by which mood influences evaluations. Work on the consequences of attitudes focuses on the impact of attitudes on behavior and social judgments.
Enlarge this image.
CONTENTS
Enlarge this image.
CONTENTS
INTRODUCTION
Because of the sheer amount of published research from 1992 to 1995, Allport's (1935) statement that "attitude" is the single most indispensable construct in social psychology may again be true. In addition, a plethora of new books (e.g. Eagly & Chaiken 1993, Perloff 1993, Petty & Krosnick 1995, Shavitt & Brock 1994, Stiff 1994) provided further testament to the vitality of the field.
Because of space limitations, many interesting applications of attitude change theory, especially in the areas of counseling and consumer psychology (e.g. Heesacker et al 1995), cannot be included in this review. We note that interest in attitude measurement remains strong. In recent years, a small cottage industry has developed around studying the best ways to ask questions in attitude surveys (e.g. Schwarz & Sudman 1996, Tanur .
Benchmarking the Effectiveness of Psychotherapy Treatment for .docxikirkton
Benchmarking the Effectiveness of Psychotherapy Treatment for Adult
Depression in a Managed Care Environment: A Preliminary Study
Takuya Minami
University of Utah
Bruce E. Wampold and Ronald C. Serlin
University of Wisconsin–Madison
Eric G. Hamilton
PacifiCare Behavioral Health
George S. (Jeb) Brown
Center for Clinical Informatics
John C. Kircher
University of Utah
This preliminary study evaluated the effectiveness of psychotherapy treatment for adult clinical depres-
sion provided in a natural setting by benchmarking the clinical outcomes in a managed care environment
against effect size estimates observed in published clinical trials. Overall results suggest that effect size
estimates of effectiveness in a managed care context were comparable to effect size estimates of efficacy
observed in clinical trials. Relative to the 1-tailed 95th-percentile critical effect size estimates, effec-
tiveness of treatment provided in this setting was observed to be between 80% (patients with comorbidity
and without antidepressants) and 112% (patients without comorbidity concurrently on antidepressants) as
compared to the benchmarks. Because the nature of the treatments delivered in the managed care
environment were unknown, it was not possible to make conclusions about treatments. However, while
replications are warranted, concerns that psychotherapy delivered in a naturalistic setting is inferior to
treatments delivered in clinical trials appear unjustified.
Keywords: benchmarking, effectiveness, managed care, clinical trials, depression
More than a decade has passed since estimating the effect of
psychotherapy as it is delivered in natural settings was identified as
a critical issue in psychotherapy research (e.g., Barlow, 1981;
Cohen, 1965; Luborsky, 1972; Seligman, 1995; Strupp, 1989;
Weisz, Donenberg, Han, & Weiss, 1995). Although the benefits of
psychotherapy have been investigated in laboratory environments
with randomized clinical trials (RCTs) and found to be substantial
as early as the late 1970s (Smith & Glass, 1977; also Smith, Glass,
& Miller, 1980), surprisingly little is known about the effects of
psychotherapy in natural settings. The dichotomy of laboratory and
natural settings was emphasized by Seligman (1995), who discrim-
inated between efficacy, which is now used to denote the effects of
psychotherapy in RCTs, and effectiveness, which is used to denote
the effects of psychotherapy in clinical practice.
The few studies that have investigated effectiveness over the
years have provided mixed results, attributed in part to a variety of
methodologies used to investigate effectiveness because of diffi-
culty in using a randomized control group design in natural set-
tings. Notably, three methods have been used to estimate the
effects of psychotherapy in natural settings: clinical representa-
tiveness, direct comparison, and benchmarking. Clinical represen-
tativeness studies, including some of the analyses conducted by
Smith et al ...
Face Construct And Criterion-Related Validity EssayDeb Birch
The document discusses validity and reliability as they relate to psychological assessment tools. It describes different types of validity, including face validity, construct validity, and criterion-related validity. Face validity assesses whether a test appears to measure what it intends to, construct validity examines how well a test measures a theoretical construct, and criterion-related validity determines whether test scores correlate with a criterion measure. The document also discusses reliability and notes that internal consistency and test-retest reliability are two important reliability considerations. Internal consistency ensures items on a test consistently measure the same construct, while test-retest reliability examines consistency of scores over time.
Inferential Analysis
Chapter 20
NUR 6812Nursing Research
Florida National University
Introduction - Inferential Analysis
We will discuss analysis of variance and regression, which are technically part of the same family of statistics known as the general linear method but are used to achieve different analytical goals
ANALYSIS OF VARIANCE
Analysis of variance (ANOVA) is used so often that Iversen and Norpoth (1987) said they once had a student who thought this was the name of an Italian statistician.
You can think of analysis of variance as a whole family of procedures beginning with the simple and frequently used t-test and becoming quite complicated with the use of multiple dependent variables (MANOVA, to be explained later in this chapter) and covariates.
Although the simpler varieties of these statistics can actually be calculated by hand, it is assumed that you will use a statistical software package for your calculations.
If you want to see how these calculations are done, you could try to compute a correlation, chi-square, t-test, or ANOVA yourself (see Yuker, 1958; Field, 2009), but in general it is too time consuming and too subject to human error to do these by hand.
IMPORTANT TERMINOLOGY
Several terms are used in these analyses that you need to be familiar with to understand the analyses themselves and the results. Many will already be familiar to you.
Statistical significance: This indicates the probability that the differences found are a result of error, not the treatment. Stated in terms of the P value, the convention is to accept either a 1% (P ≤ 0.01), or 1 out of 100, or 5% (P ≤ 0.05), or 5 out of 100, possibility that any differences seen could have been due to error (Cortina & Dunlap, 2007).
Research hypothesis: A research hypothesis is a declarative statement of the expected relationship between the dependent and independent variable(s).
Null hypothesis: The null hypothesis, based on the research hypothesis, states that the predicted relationships will not be found or that those found could have occurred by chance, meaning the difference will not be statistically significant.
Effect size: This is defined by Cortina and Dunlap as “the amount of variance in one variable accounted for by another in the sample at hand” (2007, p. 231). Effect size estimates are helpful adjuncts to significance testing. An important limitation, however, is that they are heavily influenced by the type of treatment or manipulation that occurred and the measures that are used.
Confidence intervals: Although sometimes suggested as an adjunct or replacement for the significance level, confidence intervals are determined in part by the alpha (significance level) (Cortina & Dunlap, 2007). Likened to a margin of error, the confidence intervals indicate the range within which the true difference between means may lie. A narrow confidence interval implies high precision; we can specify believable values within a narrow range ...
Inferential Analysis
Chapter 20
NUR 6812Nursing Research
Florida National University
Introduction - Inferential Analysis
We will discuss analysis of variance and regression, which are technically part of the same family of statistics known as the general linear method but are used to achieve different analytical goals
ANALYSIS OF VARIANCE
Analysis of variance (ANOVA) is used so often that Iversen and Norpoth (1987) said they once had a student who thought this was the name of an Italian statistician.
You can think of analysis of variance as a whole family of procedures beginning with the simple and frequently used t-test and becoming quite complicated with the use of multiple dependent variables (MANOVA, to be explained later in this chapter) and covariates.
Although the simpler varieties of these statistics can actually be calculated by hand, it is assumed that you will use a statistical software package for your calculations.
If you want to see how these calculations are done, you could try to compute a correlation, chi-square, t-test, or ANOVA yourself (see Yuker, 1958; Field, 2009), but in general it is too time consuming and too subject to human error to do these by hand.
IMPORTANT TERMINOLOGY
Several terms are used in these analyses that you need to be familiar with to understand the analyses themselves and the results. Many will already be familiar to you.
Statistical significance: This indicates the probability that the differences found are a result of error, not the treatment. Stated in terms of the P value, the convention is to accept either a 1% (P ≤ 0.01), or 1 out of 100, or 5% (P ≤ 0.05), or 5 out of 100, possibility that any differences seen could have been due to error (Cortina & Dunlap, 2007).
Research hypothesis: A research hypothesis is a declarative statement of the expected relationship between the dependent and independent variable(s).
Null hypothesis: The null hypothesis, based on the research hypothesis, states that the predicted relationships will not be found or that those found could have occurred by chance, meaning the difference will not be statistically significant.
Effect size: This is defined by Cortina and Dunlap as “the amount of variance in one variable accounted for by another in the sample at hand” (2007, p. 231). Effect size estimates are helpful adjuncts to significance testing. An important limitation, however, is that they are heavily influenced by the type of treatment or manipulation that occurred and the measures that are used.
Confidence intervals: Although sometimes suggested as an adjunct or replacement for the significance level, confidence intervals are determined in part by the alpha (significance level) (Cortina & Dunlap, 2007). Likened to a margin of error, the confidence intervals indicate the range within which the true difference between means may lie. A narrow confidence interval implies high precision; we can specify believable values within a narrow range ...
This document discusses key aspects of experimental research design in education. It defines experimental research as research where the researcher manipulates an independent variable to determine its effect on a dependent variable while controlling other factors. The document outlines the major components of an experimental design, including identifying independent and dependent variables, determining experimental treatments and control groups, and controlling for extraneous variables. It also discusses threats to the validity of experimental research and different types of experimental designs.
Escape-to-Attention as a Potential Variable forMaintaining P.docxrusselldayna
Escape-to-Attention as a Potential Variable for
Maintaining Problem Behavior in the School Setting
Jana M. Sarno and Heather E. Sterling
The University of Southern Mississippi
Michael M. Mueller
Southern Behavioral Group
Brad Dufrene, Daniel H. Tingstrom, and D. Joe Olmi
The University of Southern Mississippi
Abstract. Mueller, Sterling-Turner, and Moore (2005) reported a novel escape-
to-attention (ETA) functional analysis condition in a school setting with one child.
The current study replicates Mueller et al.’s functional analysis procedures with
three elementary school-age boys referred for problem behavior. Functional
analysis verified the participant’s problem behavior was maintained by escape
from academic demands. Follow-up functional analyses in which target behaviors
in escape versus ETA conditions were compared resulted in higher levels of target
behavior in the ETA condition for 2 of the 3 participants. The current study also
extended previous research by including a treatment analysis. Treatments de-
signed to address escape and attention functions were more effective at reducing
the target behaviors than treatments designed to target escape alone for all 3
participants. Results and implications for future research are discussed.
Incorporating experimental analyses
into a functional behavioral assessment is an
effective and time-efficient approach for the
assessment and treatment of problem behavior
(Hanley, Iwata, & McCord, 2003; Mueller,
Sterling-Turner, & Moore, 2005; Mueller,
Nkosi, & Hine, in press). The functional anal-
ysis methodology developed by Iwata, Dorsey,
Slifer, Bauman, and Richman (1982) is an
analogue evaluation of problem behavior in
which purported reinforcers are withheld and
then delivered contingent upon target behav-
ior. In their original work, Iwata and col-
leagues measured levels of target behaviors
during experimental conditions (i.e., attention,
escape, alone) and compared the data to levels
of target behavior in a control condition in
which the reinforcers were available noncon-
tingently. Iwata et al.’s methodology has been
used extensively to identify the behavioral
function of self-injurious behavior in clinical
settings and has been used with a variety of
behaviors and in other nonclinical settings.
Although use of functional analysis proce-
This article was taken, in part, from the first author’s thesis.
Correspondence regarding this article should be addressed to Heather E. Sterling, The University of
Southern Mississippi, 118 College Drive, #5025, Hattiesburg, MS 39406; E-mail: [email protected]
Copyright 2011 by the National Association of School Psychologists, ISSN 0279-6015
School Psychology Review,
2011, Volume 40, No. 1, pp. 57–71
57
dures is reported less commonly in school
settings (Hanley et al., 2003), studies have
been reported with examples of disruptive
school-based behaviors reinforced by peer at-
tention (e.g., Broussard & Northup, 1997),
teacher attention, (e.g., G.
This document presents research on the implications of the Hawthorne Effect and its links to firm performance. It begins with an introduction and background on the Hawthorne Effect. The study aims to determine if the Hawthorne Effect can improve firm performance by examining its relationship to employee behavior, working environment, and productivity levels. The methodology discusses using surveys distributed to employees at three firms to collect data, which is analyzed using statistical software. Preliminary findings suggest the Hawthorne Effect is positively associated with treating employees fairly and providing necessary tools/facilities. The document concludes by discussing recommendations and areas for future research.
Understanding The Experimental Research Design(Part I)DrShalooSaini
The document discusses experimental research design. Experimental research is conducted to study cause-and-effect relationships between variables. The experimental research design process involves selecting sample subjects, grouping subjects, identifying and controlling non-experimental factors, developing a measurement instrument, and determining the time, place and duration of the experiment. Extraneous variables must also be controlled as they can alter results. There are three ways to control extraneous variables: randomization, matching, and statistical control. R.A. Fisher suggested three principles of experimental design: the principle of replication, the principle of randomization, and the principle of local control.
Variables and Control in Research MethodologyRajatRajVerma3
This document discusses different types of variables that can be studied in psychological research, including independent, dependent, extraneous, and confounding variables. It provides examples and describes how to conceptualize and operationally define variables. The key aspects of gaining control in an experiment are discussed, including controlling subject variables through matching or random assignment, controlling situation variables, and using strategies like blinding or placebos. Extraneous variables should be controlled through randomization, the design of the study, matching, or statistical techniques like analysis of covariance.
BUSI 330Collaborative Marketing Plan Final Draft Instructions.docxrichardnorman90310
BUSI 330
Collaborative Marketing Plan Final Draft Instructions
Include the following in your Group Discussion Board Forum:
1. A report with the final Marketing Plan that includes the three previous drafts, attached as an MS Word file. In addition, this final MP must include the following sections:
· Marketing Programs & Financial Projections.
You should review pp. 54–55 of the text for examples of the key issues that should be discussed within these sections of the MP. You will need a comprehensive marketing program, which includes a discussion of: the Product Strategy, the Pricing Strategy, the Promotion Strategy and the Distribution (channels) Strategy.
The last section on Financial Projections should show a 5-year projection of expected revenues. In addition, you should present some type of idea when BE (break-even) will take place. Companies that introduce new products generally do not make a profit in “year 1” because of the high development and marketing costs required to test and launch the product. Obtaining costs will be difficult, but you should try to estimate costs.
· Executive Summary (ES)
Finally, once the MP is written, you will need to write the Executive Summary. The ES is written last but is placed right after the Table of Contents. You will want the reader to see the ES first. if they like it, they may read on. If it does not excite the reader, the MP will likely be discounted. The ES should contain only the most important findings, conclusions, and recommendations contained within your plan.
· The Table of Contents
The Table of Contents contains a list of the major sections of your marketing plan with the names of the group members that participated in the actual writing of each section. This will allow the instructor to evaluate each member’s contribution to the overall group project.
· Appendices
The only Appendix required is a reference list. Keep in mind that data and key information may need citations, but will surely require a reference list. A plan with no references will be considered marginal since information sources add considerable credibility to the ideas in your plan.
Your Collaborative Marketing Plan Final Draft must be submitted by 11:59 p.m. (ET) on Friday of Module/Week 8.
Running head: 1
4Group 4-Crystal ArzolaEdwin BrannanLevi ClarkJennifer HardyBrodee Whichard
Liberty UniversityDraft 1-Marketing Plan
1. Executive Summary
Our marketing plan is for the pediatric rack system used by g-tube patients to be distributed and sold through the Fortune 500 company, Owens & Minor.
2. Company Description
Owens and Minor was established by cofounders Otho O. Owens and G. Gilmer Minor in 1882 to provide healthcare services for the local Richmond community. What started as a drugstore, in a now historic landmark, quickly grew to buy out competitor drugstore Bodeker Drug Company in 1954. With this acquisition, the company briefly changed names to Owens, Minor & Bodeker, commonly known in that day as OMB. In pre.
More Related Content
Similar to COMPARISONS OF SYNTHESIZED AND INDIVIDUALREINFORCEMENT CONTI.docx
·Response GuidelinesReply to the posts of two peer.docxlanagore871
·
Response Guidelines
Reply to the posts of two peers in this discussion. You may want to share insights you have related to your peer's application of research concepts, or ask a clarifying question. You may choose to comment on how the article presented by your peer is relevant to your own professional interests. Each peer response need to have at least two references.
1
st
Peer posting
Chang et al. (2016) conducted a study to determine if there was an answer to the contradicting study results regarding the brain activity in schizophrenics and their siblings. Earlier research has given mixed results stating that schizophrenics have excessive brain activity and others show that they have incoherent activity. The same mixed results showed up in research on siblings of schizophrenics. This study used amplitudes of low-frequency fluctuations (ALFF) as well as regional homogeneity (Reho). The used the ALFF and Reho to track the intensity as well as any synchronization of local spontaneous neuronal activity among three groups of participants (Chang et al., 2016).
Repovs and Barch (2012) conducted a study using a similar research design but instead they were looking for how functional connectivity may differ in schizophrenics when there is no cognitive task involved, a light cognitive task, and then a more demanding cognitive task. The study used participants who were diagnosed with schizophrenia and their siblings, and health individuals and their siblings. These four different groups helped to determine if there was any difference between a sibling of an individual with schizophrenia compared to siblings that were not impaired. The study focused on the working memory of the individuals. fMRI scans were used as well as other basic imaging and recall memory assessment activities (Repovs & Barch, 2012).
The study conducted by Chang et al. (2016) was using reliable testing techniques in regards to the neuronal activity that was tracked. The sample size was not very large but did have the randomized factor by comparing the results to not one but two variables (siblings and non-related healthy individuals). Had the sample size been larger the results could likely be more generalizable. The participants were gathered using participants from a other studies the researchers had done. There were 27 participants who were diagnosed with schizophrenia, 27 non effected siblings, and 27 healthy unrelated participants. The research design was used to map the activity in the brain of all three groups in different circumstances so they could compare the results to find any commonalities or clear differences. This method of research helped to determine if there was any validity to the claims of either excessive brain activity or incoherent activity in schizophrenics and their siblings. This study seems to be a quasi-experimental study since it has a group used for comparison but it does not use random assignment (Sherperis, Young & .
Researchers must focus on validity in experiments to ensure they are measuring the intended variables. There are two main types of validity: internal and external. Internal validity concerns whether the independent variable caused changes in the dependent variable, rather than other extraneous variables. External validity relates to how well results generalize to the target population. To increase internal validity, researchers use controls like random assignment and measure potential extraneous variables. While controls boost internal validity, they reduce external validity by limiting realistic behavior. To improve external validity, researchers aggregate data from many subjects and trials, include multiple dependent variables, and conduct experiments in natural settings.
The Causal Relation Between Job Attitudes and PerformanceA .docxmamanda2
The Causal Relation Between Job Attitudes and Performance:
A Meta-Analysis of Panel Studies
Michael Riketta
Aston University
Do job attitudes cause performance, or is it the other way around? To answer this perennial question, the
author conducted meta-analytic regression analyses on 16 studies that had repeatedly measured perfor-
mance and job attitudes (i.e., job satisfaction or organizational commitment). The effect of job attitudes
on subsequent performance, with baseline performance controlled, was weak but statistically significant
(� � .06). The effect was slightly stronger for commitment than for satisfaction and depended negatively
on time lag. Effects of performance on subsequent job attitudes were elusive (� � .00 across all studies),
which suggests that job attitudes are more likely to influence performance than vice versa.
Keywords: job satisfaction, organizational commitment, performance, organizational citizenship behav-
ior, meta-analysis
Few topics in industrial and organizational psychology have
received as much attention as has the relation between job attitudes
and performance (e.g., Brief & Weiss, 2002; Judge, Thoresen,
Bono, & Patton, 2001; Meyer & Allen, 1997; Mowday, Porter, &
Steers, 1982; Staw, Sutton, & Pelled, 1994). Numerous meta-
analyses (e.g., Cooper-Hakim & Viswesvaran, 2005; Harrison,
Newman, & Roth, 2006; Judge et al., 2001; Meyer, Stanley,
Herscovitch, & Topolnytsky, 2002; Riketta, 2002) have demon-
strated that positive job attitudes, such as commitment and satis-
faction, are accompanied by better work outcomes. Although the
existence of positive correlations is well established, the causal
relationship between job attitudes and performance is still unclear.
Do job attitudes increase performance? Is it the other way around?
Or are the frequently observed correlations between job attitudes
and performance spurious (e.g., due to common causes)? The vast
majority of empirical studies on job attitudes and performance are
mute on these issues because of their cross-sectional designs. The
same is true of the aforementioned meta-analyses. Thus, the long-
standing debate about the causal relationship between job attitudes
and individual performance (e.g., Harrison et al., 2006; Judge et
al., 2001; March & Sutton, 1997; Organ, 1977; Schwab & Cum-
mings, 1970) is far from being resolved.
The goal in this article is to contribute to this debate by provid-
ing the most controlled (to date) meta-analytic test of causal links
between job attitudes and performance. This article is built around
a meta-analysis of panel studies on these two constructs. These
studies permit the extent to which job attitudes predict perfor-
mance to be disentangled from the extent to which performance
predicts job attitudes. In this article, meta-analytic regression anal-
ysis is applied to the aggregated correlations to estimate the unique
effect of job attitudes on performance (with baseline performance
controlled) and the unique ef.
When conducting an experiment, researchers must focus on validity, or ensuring they are measuring what they intend to. There are two main types of validity - internal and external. Internal validity refers to ensuring the independent variable is truly causing changes in the dependent variable, not other extraneous variables. External validity concerns how well results generalize to the target population. To improve validity, researchers should control for extraneous variables through techniques like random assignment and defining variables well. They can also improve external validity through aggregation, multivariate designs, and minimizing reactivity to elicit more natural behaviors.
This document discusses experimental research design. It defines experimental research as a method that can truly test hypotheses about cause-and-effect relationships. It then explains key aspects of experimental design including experimental and control groups, pre-tests and post-tests, independent and dependent variables, and methods for controlling extraneous variables like randomization and matching. Finally, it discusses types of experimental designs and factors that can affect the validity of experimental research.
DOI 10.1007s00213-008-1173-0REVIEWThe role of impul.docxelinoraudley582231
DOI 10.1007/s00213-008-1173-0
REVIEW
The role of impulsive behavior in drug abuse
Jennifer L. Perry & Marilyn E. Carroll
Received: 6 August 2007 /Accepted: 14 April 2008 /Published online: 5 July 2008
Psychopharmacology (2008) 200:1–26
20 Psychopharmacology (2008) 200:1–26
Psychopharmacology (2008) 200:1–26 21
# Springer-Verlag 2008
Abstract
Background Impulsivity is a multifaceted construct that has recently been recognized as a factor contributing to enhanced vulnerability to drug abuse.
Objectives In the present review, we focus on two facets of impulsivity (and tasks that measure them): (1) impulsive choice (delay discounting task) and (2) inhibitory failure (go/no-go, stop signal reaction time, and five-choice serial reaction time tasks). We also describe how performance on each of these tasks is associated with drug-related behavior during phases of drug abuse that capture the essential features of addiction (acquisition, escalation, and reinstatement of drug-seeking after drug access has terminated). Three hypotheses (H) regarding the relationship between impulsivity and drug abuse are discussed: (1) increased levels of impulsivity lead to drug abuse (H1), (2) drugs of abuse increase impulsivity (H2), and (3) impulsivity and drug abuse are associated through a common third factor (H3). Conclusion Impulsivity expressed as impulsive choice or inhibitory failure plays a role in several key transition phases of drug abuse. There is evidence to support all three nonexclusive hypotheses. Increased levels of impulsivity lead to acquisition of drug abuse (H1) and subsequent escalation or dysregulation of drug intake. Drugs of abuse may increase impulsivity (H2), which is an additional contributor to escalation/dysregulation. Abstinence, relapse,
J. L. Perry (*)
Minneapolis Medical Research Foundation,
S-3, 860, 914 South 8th Street, Minneapolis, MN 55404, USA e-mail: [email protected]
M. E. Carroll
Department of Psychiatry,
University of Minnesota Medical School,
MMC 392,
Minneapolis, MN 55455, USA
and treatment may be influenced by both H1 and H2. In addition, there is a relationship between impulsivity and other drug abuse vulnerability factors, such as sex, hormonal status, reactivity to nondrug rewards, and early environmental experiences that may impact drug intake during all phases of addiction (H3). Relating drug abuse and impulsivity in phases of addiction via these three hypotheses provides a heuristic model from which future experimental questions can be addressed.
Keywords Abstinence . Acquisition . Animal models .
Delay discounting . Drug abuse . Dysregulation . Escalation .
Five-choice serial reaction time task . Go/no-go task .
Impulsive choice . Impulsivity. Inhibition . Relapse .
Stop signal reaction time task . Treatment
Introduction
A growing number of studies using behavioral, neurobiological, and imaging techniques have confirmed a strong association between impulsivity and addictive behaviors such as drug abuse, bin.
Applied Behavior Analysis (ABA) is a technique used to change behaviors through reinforcement and modification of environmental factors. Studies have shown ABA to be effective in improving skills and reducing problematic behaviors for individuals with autism when applied early on. However, some argue ABA follows a "cookbook" approach and does not account for each child's individual needs and experience of autism. Effective ABA requires training parents to understand their child's behaviors and needs to develop personalized intervention plans rather than relying on statistics.
This article provides guidance on analyzing conditional indirect effects, also known as moderated mediation. It aims to clarify conflicting definitions of moderated mediation and describe approaches for estimating and testing hypotheses about conditional indirect effects. These include standard errors for hypothesis testing, bootstrapping methods, and techniques for probing significant conditional indirect effects. The article introduces an SPSS macro and illustrates these methods using data on the indirect effect of student interest on math performance.
Attitudes and attitude changePetty, Richard E; Wegener, Duane T;.docxcelenarouzie
Attitudes and attitude change
Petty, Richard E; Wegener, Duane T; Fabrigar, Leandre R.Annual Review of Psychology; Palo Alto Vol. 48, (1997): 609-47.
1. Full text
2. Full text - PDF
3. Abstract/Details
Abstract
TranslateAbstract
We review empirical and conceptual developments over the past four years (1992-1995) on attitudes and persuasion. A voluminous amount of material was produced concerning attitude structure, attitude change, and the consequences of holding attitudes. In the structure area, particular attention is paid to work on attitude accessibility, ambivalence, and the affective versus cognitive bases of attitudes. In persuasion, our review examines research that has focused on high effort cognitive processes (central route), low effort processes (peripheral route), and the multiple roles by which variables can have an impact on attitudes. Special emphasis is given to work on cognitive dissonance and other biases in message processing, and on the multiple processes by which mood influences evaluations. Work on the consequences of attitudes focuses on the impact of attitudes on behavior and social judgments.
Full text
· TranslateFull text
·
Headnote
ABSTRACT
Headnote
We review empirical and conceptual developments over the past four years (1992-1995) on attitudes and persuasion. A voluminous amount of material was produced concerning attitude structure, attitude change, and the consequences of holding attitudes. In the structure area, particular attention is paid to work on attitude accessiblity, ambivalence, and the affective versus cognitive bases of attitudes. In persuasion, our review examines research that has focused on high effort cognitive processes (central route), low effort processes (peripheral route), and the multiple roles by which variables can have an impact on attitudes. Special emphasis is given to work on cognitive dissonance and other biases in message processing, and on the multiple processes by which mood influences evaluations. Work on the consequences of attitudes focuses on the impact of attitudes on behavior and social judgments.
Enlarge this image.
CONTENTS
Enlarge this image.
CONTENTS
INTRODUCTION
Because of the sheer amount of published research from 1992 to 1995, Allport's (1935) statement that "attitude" is the single most indispensable construct in social psychology may again be true. In addition, a plethora of new books (e.g. Eagly & Chaiken 1993, Perloff 1993, Petty & Krosnick 1995, Shavitt & Brock 1994, Stiff 1994) provided further testament to the vitality of the field.
Because of space limitations, many interesting applications of attitude change theory, especially in the areas of counseling and consumer psychology (e.g. Heesacker et al 1995), cannot be included in this review. We note that interest in attitude measurement remains strong. In recent years, a small cottage industry has developed around studying the best ways to ask questions in attitude surveys (e.g. Schwarz & Sudman 1996, Tanur .
Benchmarking the Effectiveness of Psychotherapy Treatment for .docxikirkton
Benchmarking the Effectiveness of Psychotherapy Treatment for Adult
Depression in a Managed Care Environment: A Preliminary Study
Takuya Minami
University of Utah
Bruce E. Wampold and Ronald C. Serlin
University of Wisconsin–Madison
Eric G. Hamilton
PacifiCare Behavioral Health
George S. (Jeb) Brown
Center for Clinical Informatics
John C. Kircher
University of Utah
This preliminary study evaluated the effectiveness of psychotherapy treatment for adult clinical depres-
sion provided in a natural setting by benchmarking the clinical outcomes in a managed care environment
against effect size estimates observed in published clinical trials. Overall results suggest that effect size
estimates of effectiveness in a managed care context were comparable to effect size estimates of efficacy
observed in clinical trials. Relative to the 1-tailed 95th-percentile critical effect size estimates, effec-
tiveness of treatment provided in this setting was observed to be between 80% (patients with comorbidity
and without antidepressants) and 112% (patients without comorbidity concurrently on antidepressants) as
compared to the benchmarks. Because the nature of the treatments delivered in the managed care
environment were unknown, it was not possible to make conclusions about treatments. However, while
replications are warranted, concerns that psychotherapy delivered in a naturalistic setting is inferior to
treatments delivered in clinical trials appear unjustified.
Keywords: benchmarking, effectiveness, managed care, clinical trials, depression
More than a decade has passed since estimating the effect of
psychotherapy as it is delivered in natural settings was identified as
a critical issue in psychotherapy research (e.g., Barlow, 1981;
Cohen, 1965; Luborsky, 1972; Seligman, 1995; Strupp, 1989;
Weisz, Donenberg, Han, & Weiss, 1995). Although the benefits of
psychotherapy have been investigated in laboratory environments
with randomized clinical trials (RCTs) and found to be substantial
as early as the late 1970s (Smith & Glass, 1977; also Smith, Glass,
& Miller, 1980), surprisingly little is known about the effects of
psychotherapy in natural settings. The dichotomy of laboratory and
natural settings was emphasized by Seligman (1995), who discrim-
inated between efficacy, which is now used to denote the effects of
psychotherapy in RCTs, and effectiveness, which is used to denote
the effects of psychotherapy in clinical practice.
The few studies that have investigated effectiveness over the
years have provided mixed results, attributed in part to a variety of
methodologies used to investigate effectiveness because of diffi-
culty in using a randomized control group design in natural set-
tings. Notably, three methods have been used to estimate the
effects of psychotherapy in natural settings: clinical representa-
tiveness, direct comparison, and benchmarking. Clinical represen-
tativeness studies, including some of the analyses conducted by
Smith et al ...
Face Construct And Criterion-Related Validity EssayDeb Birch
The document discusses validity and reliability as they relate to psychological assessment tools. It describes different types of validity, including face validity, construct validity, and criterion-related validity. Face validity assesses whether a test appears to measure what it intends to, construct validity examines how well a test measures a theoretical construct, and criterion-related validity determines whether test scores correlate with a criterion measure. The document also discusses reliability and notes that internal consistency and test-retest reliability are two important reliability considerations. Internal consistency ensures items on a test consistently measure the same construct, while test-retest reliability examines consistency of scores over time.
Inferential Analysis
Chapter 20
NUR 6812Nursing Research
Florida National University
Introduction - Inferential Analysis
We will discuss analysis of variance and regression, which are technically part of the same family of statistics known as the general linear method but are used to achieve different analytical goals
ANALYSIS OF VARIANCE
Analysis of variance (ANOVA) is used so often that Iversen and Norpoth (1987) said they once had a student who thought this was the name of an Italian statistician.
You can think of analysis of variance as a whole family of procedures beginning with the simple and frequently used t-test and becoming quite complicated with the use of multiple dependent variables (MANOVA, to be explained later in this chapter) and covariates.
Although the simpler varieties of these statistics can actually be calculated by hand, it is assumed that you will use a statistical software package for your calculations.
If you want to see how these calculations are done, you could try to compute a correlation, chi-square, t-test, or ANOVA yourself (see Yuker, 1958; Field, 2009), but in general it is too time consuming and too subject to human error to do these by hand.
IMPORTANT TERMINOLOGY
Several terms are used in these analyses that you need to be familiar with to understand the analyses themselves and the results. Many will already be familiar to you.
Statistical significance: This indicates the probability that the differences found are a result of error, not the treatment. Stated in terms of the P value, the convention is to accept either a 1% (P ≤ 0.01), or 1 out of 100, or 5% (P ≤ 0.05), or 5 out of 100, possibility that any differences seen could have been due to error (Cortina & Dunlap, 2007).
Research hypothesis: A research hypothesis is a declarative statement of the expected relationship between the dependent and independent variable(s).
Null hypothesis: The null hypothesis, based on the research hypothesis, states that the predicted relationships will not be found or that those found could have occurred by chance, meaning the difference will not be statistically significant.
Effect size: This is defined by Cortina and Dunlap as “the amount of variance in one variable accounted for by another in the sample at hand” (2007, p. 231). Effect size estimates are helpful adjuncts to significance testing. An important limitation, however, is that they are heavily influenced by the type of treatment or manipulation that occurred and the measures that are used.
Confidence intervals: Although sometimes suggested as an adjunct or replacement for the significance level, confidence intervals are determined in part by the alpha (significance level) (Cortina & Dunlap, 2007). Likened to a margin of error, the confidence intervals indicate the range within which the true difference between means may lie. A narrow confidence interval implies high precision; we can specify believable values within a narrow range ...
Inferential Analysis
Chapter 20
NUR 6812Nursing Research
Florida National University
Introduction - Inferential Analysis
We will discuss analysis of variance and regression, which are technically part of the same family of statistics known as the general linear method but are used to achieve different analytical goals
ANALYSIS OF VARIANCE
Analysis of variance (ANOVA) is used so often that Iversen and Norpoth (1987) said they once had a student who thought this was the name of an Italian statistician.
You can think of analysis of variance as a whole family of procedures beginning with the simple and frequently used t-test and becoming quite complicated with the use of multiple dependent variables (MANOVA, to be explained later in this chapter) and covariates.
Although the simpler varieties of these statistics can actually be calculated by hand, it is assumed that you will use a statistical software package for your calculations.
If you want to see how these calculations are done, you could try to compute a correlation, chi-square, t-test, or ANOVA yourself (see Yuker, 1958; Field, 2009), but in general it is too time consuming and too subject to human error to do these by hand.
IMPORTANT TERMINOLOGY
Several terms are used in these analyses that you need to be familiar with to understand the analyses themselves and the results. Many will already be familiar to you.
Statistical significance: This indicates the probability that the differences found are a result of error, not the treatment. Stated in terms of the P value, the convention is to accept either a 1% (P ≤ 0.01), or 1 out of 100, or 5% (P ≤ 0.05), or 5 out of 100, possibility that any differences seen could have been due to error (Cortina & Dunlap, 2007).
Research hypothesis: A research hypothesis is a declarative statement of the expected relationship between the dependent and independent variable(s).
Null hypothesis: The null hypothesis, based on the research hypothesis, states that the predicted relationships will not be found or that those found could have occurred by chance, meaning the difference will not be statistically significant.
Effect size: This is defined by Cortina and Dunlap as “the amount of variance in one variable accounted for by another in the sample at hand” (2007, p. 231). Effect size estimates are helpful adjuncts to significance testing. An important limitation, however, is that they are heavily influenced by the type of treatment or manipulation that occurred and the measures that are used.
Confidence intervals: Although sometimes suggested as an adjunct or replacement for the significance level, confidence intervals are determined in part by the alpha (significance level) (Cortina & Dunlap, 2007). Likened to a margin of error, the confidence intervals indicate the range within which the true difference between means may lie. A narrow confidence interval implies high precision; we can specify believable values within a narrow range ...
This document discusses key aspects of experimental research design in education. It defines experimental research as research where the researcher manipulates an independent variable to determine its effect on a dependent variable while controlling other factors. The document outlines the major components of an experimental design, including identifying independent and dependent variables, determining experimental treatments and control groups, and controlling for extraneous variables. It also discusses threats to the validity of experimental research and different types of experimental designs.
Escape-to-Attention as a Potential Variable forMaintaining P.docxrusselldayna
Escape-to-Attention as a Potential Variable for
Maintaining Problem Behavior in the School Setting
Jana M. Sarno and Heather E. Sterling
The University of Southern Mississippi
Michael M. Mueller
Southern Behavioral Group
Brad Dufrene, Daniel H. Tingstrom, and D. Joe Olmi
The University of Southern Mississippi
Abstract. Mueller, Sterling-Turner, and Moore (2005) reported a novel escape-
to-attention (ETA) functional analysis condition in a school setting with one child.
The current study replicates Mueller et al.’s functional analysis procedures with
three elementary school-age boys referred for problem behavior. Functional
analysis verified the participant’s problem behavior was maintained by escape
from academic demands. Follow-up functional analyses in which target behaviors
in escape versus ETA conditions were compared resulted in higher levels of target
behavior in the ETA condition for 2 of the 3 participants. The current study also
extended previous research by including a treatment analysis. Treatments de-
signed to address escape and attention functions were more effective at reducing
the target behaviors than treatments designed to target escape alone for all 3
participants. Results and implications for future research are discussed.
Incorporating experimental analyses
into a functional behavioral assessment is an
effective and time-efficient approach for the
assessment and treatment of problem behavior
(Hanley, Iwata, & McCord, 2003; Mueller,
Sterling-Turner, & Moore, 2005; Mueller,
Nkosi, & Hine, in press). The functional anal-
ysis methodology developed by Iwata, Dorsey,
Slifer, Bauman, and Richman (1982) is an
analogue evaluation of problem behavior in
which purported reinforcers are withheld and
then delivered contingent upon target behav-
ior. In their original work, Iwata and col-
leagues measured levels of target behaviors
during experimental conditions (i.e., attention,
escape, alone) and compared the data to levels
of target behavior in a control condition in
which the reinforcers were available noncon-
tingently. Iwata et al.’s methodology has been
used extensively to identify the behavioral
function of self-injurious behavior in clinical
settings and has been used with a variety of
behaviors and in other nonclinical settings.
Although use of functional analysis proce-
This article was taken, in part, from the first author’s thesis.
Correspondence regarding this article should be addressed to Heather E. Sterling, The University of
Southern Mississippi, 118 College Drive, #5025, Hattiesburg, MS 39406; E-mail: [email protected]
Copyright 2011 by the National Association of School Psychologists, ISSN 0279-6015
School Psychology Review,
2011, Volume 40, No. 1, pp. 57–71
57
dures is reported less commonly in school
settings (Hanley et al., 2003), studies have
been reported with examples of disruptive
school-based behaviors reinforced by peer at-
tention (e.g., Broussard & Northup, 1997),
teacher attention, (e.g., G.
This document presents research on the implications of the Hawthorne Effect and its links to firm performance. It begins with an introduction and background on the Hawthorne Effect. The study aims to determine if the Hawthorne Effect can improve firm performance by examining its relationship to employee behavior, working environment, and productivity levels. The methodology discusses using surveys distributed to employees at three firms to collect data, which is analyzed using statistical software. Preliminary findings suggest the Hawthorne Effect is positively associated with treating employees fairly and providing necessary tools/facilities. The document concludes by discussing recommendations and areas for future research.
Understanding The Experimental Research Design(Part I)DrShalooSaini
The document discusses experimental research design. Experimental research is conducted to study cause-and-effect relationships between variables. The experimental research design process involves selecting sample subjects, grouping subjects, identifying and controlling non-experimental factors, developing a measurement instrument, and determining the time, place and duration of the experiment. Extraneous variables must also be controlled as they can alter results. There are three ways to control extraneous variables: randomization, matching, and statistical control. R.A. Fisher suggested three principles of experimental design: the principle of replication, the principle of randomization, and the principle of local control.
Variables and Control in Research MethodologyRajatRajVerma3
This document discusses different types of variables that can be studied in psychological research, including independent, dependent, extraneous, and confounding variables. It provides examples and describes how to conceptualize and operationally define variables. The key aspects of gaining control in an experiment are discussed, including controlling subject variables through matching or random assignment, controlling situation variables, and using strategies like blinding or placebos. Extraneous variables should be controlled through randomization, the design of the study, matching, or statistical techniques like analysis of covariance.
Similar to COMPARISONS OF SYNTHESIZED AND INDIVIDUALREINFORCEMENT CONTI.docx (20)
BUSI 330Collaborative Marketing Plan Final Draft Instructions.docxrichardnorman90310
BUSI 330
Collaborative Marketing Plan Final Draft Instructions
Include the following in your Group Discussion Board Forum:
1. A report with the final Marketing Plan that includes the three previous drafts, attached as an MS Word file. In addition, this final MP must include the following sections:
· Marketing Programs & Financial Projections.
You should review pp. 54–55 of the text for examples of the key issues that should be discussed within these sections of the MP. You will need a comprehensive marketing program, which includes a discussion of: the Product Strategy, the Pricing Strategy, the Promotion Strategy and the Distribution (channels) Strategy.
The last section on Financial Projections should show a 5-year projection of expected revenues. In addition, you should present some type of idea when BE (break-even) will take place. Companies that introduce new products generally do not make a profit in “year 1” because of the high development and marketing costs required to test and launch the product. Obtaining costs will be difficult, but you should try to estimate costs.
· Executive Summary (ES)
Finally, once the MP is written, you will need to write the Executive Summary. The ES is written last but is placed right after the Table of Contents. You will want the reader to see the ES first. if they like it, they may read on. If it does not excite the reader, the MP will likely be discounted. The ES should contain only the most important findings, conclusions, and recommendations contained within your plan.
· The Table of Contents
The Table of Contents contains a list of the major sections of your marketing plan with the names of the group members that participated in the actual writing of each section. This will allow the instructor to evaluate each member’s contribution to the overall group project.
· Appendices
The only Appendix required is a reference list. Keep in mind that data and key information may need citations, but will surely require a reference list. A plan with no references will be considered marginal since information sources add considerable credibility to the ideas in your plan.
Your Collaborative Marketing Plan Final Draft must be submitted by 11:59 p.m. (ET) on Friday of Module/Week 8.
Running head: 1
4Group 4-Crystal ArzolaEdwin BrannanLevi ClarkJennifer HardyBrodee Whichard
Liberty UniversityDraft 1-Marketing Plan
1. Executive Summary
Our marketing plan is for the pediatric rack system used by g-tube patients to be distributed and sold through the Fortune 500 company, Owens & Minor.
2. Company Description
Owens and Minor was established by cofounders Otho O. Owens and G. Gilmer Minor in 1882 to provide healthcare services for the local Richmond community. What started as a drugstore, in a now historic landmark, quickly grew to buy out competitor drugstore Bodeker Drug Company in 1954. With this acquisition, the company briefly changed names to Owens, Minor & Bodeker, commonly known in that day as OMB. In pre.
BUSI 460 – LT Assignment Brief 1
ACADEMIC YEAR 2020 – SPRING TERM
MBA
(MASTER OF BUSINESS ADMINISTRATION)
BUSI 460 – CONSLTING PRACTICE
INSTRUCTOR: DR. PAURIC P. O’ROURKE
LEARNING TEAM (LT) ASSIGNMENT BRIEF –
LAYERED
TOPIC: LT CONSULTING PROJECT CASE STUDY
35% OF TOTAL COURSE GRADE
(Part 1-5% -W6, Part 2-10% -W7, Part 3 - 15%-W10 &
Part 4 - 5%- W11)
SUBMISSION DATES: VARIES - WEEKS 6, 7, 10 &
11 ONLINE VIA STUDENT PORTAL(MOODLE)
TURNITIN LINK
Self-Selected Learning Team Group (LT Group)
N= Name. Cell = Mobile. e = E Mail Address. f/t/i = Facebook. or Twitter or Instagram Account
Members of Group Written Assignment Learning Team:
1.N:______________ C: __________ e: ___________f/t/i: ___________
2.N:______________ C: __________ e: ___________f/t/i: ___________
3.N:_______________ C: __________ e: ___________f/t/i: ___________
4.N:______________ C: __________ e: ___________f/t/i: ___________
If you change any of your contact details, such as cell number, you are obliged to let your team members know in advance asap.
Important: Sharing such personal contact details is totally optional and up to each individual student but it does make arranging
meetings outside of class time, which you will have to do in this subject must easier. Sharing of such information is on the strict basis
BUSI 460 – LT Assignment Brief 2
and understanding that such information will not be misused or passed on to third parties without the individual’s consent. Any breach
of this will be reported to the University Authorities.
Learning Outcomes:
On successful completion of this assignment the student will be able:
1. To develop abilities to gather, analyse, interpret and evaluate information on a
management consulting task and project related topic(s).
2. To strengthen conceptual and analytical skills in the study management
consulting.
3. To build tangible links between the theory and practice of management
consulting.
4. To heighten awareness and understanding of management consulting in action
and gain greater self-awareness of oneself as a consultant.
5. To develop and present thoughts, arguments, and informed opinions in a logical
and coherent way.
6. To develop creativity and critical management skills.
7. To develop skills in case study navigation and analysis.
8. To demonstrate academic and management research, proposal, report writing
and composition skills with academic and business integrity.
9. To consistently apply the APA system of academic referencing.
10. To demonstrate word processing and IT skills
11. To develop project and time management skills.
12. To develop team working skills in order to function as a high performance team.
13. To develop healthy and functional work habits in progressing confidently and
consistently towards a defined submission deadline date.
Learning Team (LT) Assignment – Overall Task
Usin.
BUS475 week#7Diversity in the work environment promotes accept.docxrichardnorman90310
BUS475 week#7
Diversity in the work environment promotes acceptance, respect, and teamwork despite differences in race, age, gender, language, political beliefs, religion, sexual orientation, communication styles, and other differences. Discuss the following:
If you were starting a business that required you to hire new personnel, would diversity be a priority? How important would it be to you on a list of other considerations? Explain.
.
BUS475week#5In Chapter 11 of your textbook, you explored import.docxrichardnorman90310
BUS475/week#5
In Chapter 11 of your textbook, you explored important areas of risk and opportunity for society and companies such as the role of technology in business and society, cybersecurity, privacy, robotics, genetically engineering and others.
Discuss questions or concerns or enthusiasm you have regarding one of these areas (or other similar area of your choice) that are changing due to technological advance
.
BUS475week#6Share a recent or current event in which a busine.docxrichardnorman90310
BUS475/week#6
Share a recent or current event in which a business or government failed to protect consumers. What were the failures? Who were the victims? What can or could be done to prevent such failures in the future? Do your findings change the way you will support the company in the future?
You are encouraged to share resources that introduce or illuminate the event.
.
BUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docxrichardnorman90310
BUS/475v10
Project Plan
BUS/475 v10
Page 2 of 2
Wk 4 – Apply: Project Plan
Project Title: Project Objectives:
· List project objective
· List project objective
· List project objective
Operational Step
Responsible Person
Timeline
Example
Project Title: Desert Taco Opportunity
Description: Based on initial feedback from customer surveys, online discussion/social media groups, and SWOT analyses, you’ve determined that there is an opportunity to increase your organization’s customer base through the introduction of desert tacos in your food truck menu.Project Objectives:
· Identify the top 3 potential customer groups for this opportunity and describe their characteristics and preferences
Operational Step
Responsible Person
Timeline
Review the organization’s customer database to determine potential customer groups
Leo (Market Research Manager)
9/30 (1 week)
Identify the top 3 groups to target based upon volume, brand loyalty, and location
Betty (Director of Marketing)
10/7 (2 weeks)
Survey customers regarding food preferences and potential menu items
Tom (Customer Service Representative)
10/21 (4 weeks)
Share customer feedback with inventory and operational teams
Betty/Tom
10/28 (5 weeks)
Determine the top 5 locations and times to complete a pilot study with your test market.
Operational Step
Responsible Person
Timeline
Review sales data to determine peak sales opportunities by location
Jim (Director of Sales)
9/30 (1 week)
Identify the top 5 locations in which to conduct the desert taco pilot
Jim
10/7 (2 weeks)
Create marketing collateral and social media communications to promote the desert taco pilot
Oliver (Media Relations Manager)
10/21 (4 weeks)
Provide expected volume and product information for the inventory team
Jim
10/7 (2 weeks)
Estimate the required inventory and supply chain needs necessary to support the desert taco pilot
Operational Step
Responsible Person
Timeline
Based on expected customer volume, locations, and times, determine the product inventory required to support the pilot.
Louise (Controller)
10/14 (3 weeks)
Source supply companies and obtain product pricing quotes and delivery timelines.
Louise
10/21 (4 weeks)
Determine shipment and storage needs to support the pilot.
Louise and Ben (Operations Manager)
10/21 (4 weeks)
Purchase product for the pilot and arrange transportation to support the desert taco pilot at the various locations.
Louise
10/28 (5 weeks)
Copyright 2019 by University of Phoenix. All rights reserved.
Copyright 2019 by University of Phoenix. All rights reserved.
Running head: TESLA EXPANSION 2
TESLA EXPANSION 2
Tesla Global Expansion
Shawn Cyr
BUS 475
31 March 2020
Mr. Simpson
The opportunity which Tesla needs to exploit is to go into expand its market into the developing countries. The reason for choosing this opportunity is that Tesla today operates in a small market. The company has the majority of its revenues from the United States with a small percentage from China. .
BUS472L – Unit 2 & 4 AssignmentStudent Name ___________________.docxrichardnorman90310
BUS472L – Unit 2 & 4 Assignment
Student Name: ______________________
Instructions:
Unit 2: Replace fields within [brackets] with applicable data for your project. First, list out deliverables and work packages; which align to your project scope. Feel free to add additional lines as applicable based on your project size. Ensure to update the WBS # and indent lines as applicable. Add in estimated start and completion dates, owners (person responsible for ensuring the activity is completed), and then shade the applicable columns to represent the length of each activity to create a Gantt chart. Ignore the predecessor column for Unit 2. Then fill in the Resource Chart, the resources should align to the activity owners that you assigned in your WBS.
Unit 4: Update your WBS below to include predecessors (this will be the WBS # of the activity that must be completed prior to starting that activity). Note be sure to check then your expected start and completion dates reflect properly based on your predecessors. Next, set at least two tasks to run in parallel. Finally, complete the below critical path and resource constraint/leveling instructions below.
Project WBS (Unit 2 & 4)
WBS #
Activity Name
Expected
Start
Expected Completion
Activity Owner
Predecessor
1st Quarter
2nd Quarter
3rd Quarter
4th Quarter
UNIT 4
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
1
[Project Name]
1.1
Initiate
1.1.1
[Deliverable 1]
[2/1/2020]
[3/15/2020]
[Bob Smith]
1.1.2
[Deliverable 2]
[3/15/2020]
[4/30/2020]
1.2
Planning
1.2.1
[Deliverable 3]
1.3
Execution
1.3.1
[Deliverable 4]
1.3.1.1
[Work Package 1]
1.3.1.2
[Work Package 2]
1.3.2
[Deliverable 5]
1.3.3
[Deliverable 6]
1.4
Close
1.4.1
[Deliverable 7]
Resource Chart: (Unit 2)
Name
Role
% of time dedicated to the project
[Bob Smith]
Project Manager
95%
Critical Path: (Unit 4)
The project critical path is important; because if an activity on the critical path delays; the project delays. In looking at your project, what activities are on your critical path (note all might be if you have your activities in serial sequence)? How could you work to limit the number of activities on the critical path? How could you proactively put measures in place so if an activity slips by a couple days the entire success of the project is not jeopardized? Respond with at least 5-6 sentences.
Response:
Resource Constraints: (Unit 4)
Your project may or may not have resource constraints. A resource constraint would be present if you have an individual working on one or multiple activities and do not have enough capacity in order to finish that activity on time. In reflection of your pr.
BUS308 Week 4 Lecture 1
Examining Relationships
Expected Outcomes
After reading this lecture, the student should be familiar with:
1. Issues around correlation
2. The basics of Correlation analysis
3. The basics of Linear Regression
4. The basics of the Multiple Regression
Overview
Often in our detective shows when the clues are not providing a clear answer – such as
we are seeing with the apparent continuing contradiction between the compa-ratio and salary
related results – we hear the line “maybe we need to look at this from a different viewpoint.”
That is what we will be doing this week.
Our investigation changes focus a bit this week. We started the class by finding ways to
describe and summarize data sets – finding measures of the center and dispersion of the data with
means, medians, standard deviations, ranges, etc. As interesting as these clues were, they did not
tell us all we needed to know to solve our question about equal work for equal pay. In fact, the
evidence was somewhat contradictory depending upon what measure we focused on. In Weeks 2
and 3, we changed our focus to asking questions about differences and how important different
sample outcomes were. We found that all differences were not important, and that for many
relatively small result differences we could safely ignore them for decision making purposes –
they were due to simple sampling (or chance) errors. We found that this idea of sampling error
could extend into work and individual performance outcomes observed over time; and that over-
reacting to such differences did not make much sense.
Now, in our continuing efforts to detect and uncover what the data is hiding from us, we
change focus again as we start to find out why something happened, what caused the data to act
as it did; rather than merely what happened (describing the data as we have been doing). This
week we move from examining differences to looking at relationships; that is, if some measure
changes does another measure change as well? And, if so, can we use this information to make
predictions and/or understand what underlies this common movement?
Our tools in doing this involve correlation, the measurement of how closely two
variables move together; and regression, an equation showing the impact of inputs on a final
output. A regression is similar to a recipe for a cake or other food dish; take a bit of this and
some of that, put them together, and we get our result.
Correlation
We have seen correlations a lot, and probably have even used them (formally or
informally). We know, for example, that all other things being equal; the more we eat. the more
we weigh. Kids, up to the early teens, grow taller the older they get. If we consistently speed,
we will get more speeding tickets than those who obey the speed limit. The more efforts we put
into studying, the better grades we get. All of these are examples of correlations.
Correlatio.
BUS301 Memo Rubric Spring 2020 - Student.docxBUS301 Writing Ru.docxrichardnorman90310
BUS301 Memo Rubric Spring 2020 - Student.docx
BUS301 Writing Rubric
Performance Dimensions
N/A
Not Met
Met
Comments
Organization (OABC)
Opening gets attention, provides context, and introduces topic
0
1
Agenda previews content of the document
0
1
Body
0
2
Sound paragraphing decisions (length and development)
Paragraphs limited to one topic per paragraph
Complete discussion of one topic before moving to next topic
Transitions and flow between paragraphs smooth
The overall flow/logic/structure of document is apparent
Closing summarizes and concludes, recommends, if appropriate
0
1
Content
The content of the document is relevant; information meaningful
0
2
The document is developed with adequate support and examples
0
2
The content is accurate and appropriate, with insightful analysis
0
2
Proofreading
The grammar and spelling are correct (proofread)
0
3
Punctuation—comma usage, capitalization, etc.—used correctly
0
3
The sentence structure and length are appropriate
0
1
Format
Appropriate formatting is used for type of document written
0
1
Good use of font, margins, spacing, headings, and visuals
0
1
[11/2016]
Example - Good - Corrected student example Spring 2020.docx
TO: Professor __________
FROM: Suzy Student
DATE: February 1, 2020
SUBJECT: Out of Class Experience – Cybersecurity Conference
Cybersecurity is a topic everyone should be concerned about, so I attended the 3rd Annual Cybersecurity Event held in the Grawn Atrium. I gained insight and knowledge from listening to the speakers that came from different kinds of industries. In this memo, I will discuss what I learned from the speaker and two takeaways: 1) cybersecurity is everywhere, 2) personal identifiable information, and 3) cybersecurity for the business student.
Cybersecurity is Everywhere
The conference was an opportunity to learn about cybersecurity. The first speaker talked about how companies are attacked in many different ways every day. The “bad guys” are trying to steal company information as well as employee information. Both kinds of information are valuable on the black market. The second speaker talked about the internet of things (IoT). These are things that are attached to the internet. The speaker talked about autonomous cars and medical equipment (heart) that talks to the internet. She talked about how cyber can and should influence designs. “Things” must be created with cybersecurity included in every step of the design. The last speaker talked about how my information has value. The “bad guys” steal my information and people want to buy it. Making money is one reason hackers steal millions of records.
Personal Identifiable Information
Personal Identifiable Information (PII) is any information relating to an identifiable person. There are laws in place to help make sure this information is secure. This topic is a takeaway for me because I had no idea my data had any value t.
BUS 206 Milestone Two Template To simplify completi.docxrichardnorman90310
BUS 206 Milestone Two Template
To simplify completing this milestone, use this template to help you write your essay. You may use each
heading as a starter sentence and then discuss the legal issues presented in the case study using the
following guide, if you choose. Be sure to explain and elaborate on how each term applies to the story.
Be sure to incorporate the facts of the case into your explanation and analysis.
Remember that the document you submit should follow the formatting guidelines described in the
Milestone Two Guidelines and Rubric document.
A. Various elements must be present to prove that a valid contract exists between Sam and the
chain store.
The four elements to a contract are . (Chapter 13)
The first element of would be deemed to exist if [describe facts that
are or should be present].
The second element of would be deemed to exist if [describe facts
that are or should be present].
The third element of would be deemed to exist if [describe facts that
are or should be present].
The fourth element of would be deemed to exist if [describe facts
that are or should be present].
If the elements of a contract did exist between these parties, there could still be some
possible reasons why a contract might not be valid based on facts not present in the
scenario. For example, if Sam was a minor at the time he made the agreement with
the chain store, the contract would not be valid because . List
some other reasons and elaborate on why a contract might be invalid.
Discuss and explain any other information you deem relevant to this answer.
(Chapters 13, 14, 15, and 16)
B. Even if there is not a valid legal contract between Sam and the chain store, there may still be
a quasi-contract (Chapter 13) or elements of what is called a promissory estoppel. (Chapter
15)
A quasi-contract is defined as . In this case, a quasi-contract may exist
if the following facts are true: . (Chapter 13)
A promissory estoppel is defined as . This principle might apply to this
case if . (Chapters 13 and 16)
Discuss and explain any other information you deem relevant to this answer.
C. The rights and obligations of both the landlord and tenant depend upon the term of their
contract. Such a contract may be verbal or in writing under a standard residential lease
agreement. (Chapters 13 and 50)
Some facts that may support that Sam is in breach of that contract are
.
Some facts that may support that Sam is not in breach of that contract are
. (Chapters 16, 17, and 50)
Discuss and explain any other information you deem relevant to this answer.
D. Based upon those rights and obligations, Sam’s landlord has/does not have grounds to evict
because .
Elaborate and explain.
E. Some defenses Sam might raise if his landlord tries to evict him include
because .
Elaborate .
Bunker Hill Community College MAT 093 Foundations of Mathema.docxrichardnorman90310
Ryan has monthly expenses of $1883 leaving her with $82 per month after paying all her bills. If she saves $150 per month, it will take her 12 months to save two months' salary of $3600 for an emergency fund. The document provides a multi-step math word problem to solve involving Ryan's monthly income and expenses. It then provides additional math word problems involving geometry, fractions, percentages, and other calculations to solve. The problems are from a midterm exam for a foundations of mathematics course and include a grading rubric.
Bullying and cyberbullying of adolescents have become increasingly p.docxrichardnorman90310
Bullying and cyberbullying of adolescents have become increasingly popular media topics. Why do you think schools are often ineffective in reducing rates of bullying and cyberbullying? Imagine you are an administrator at a middle or high school. What specific activities would you engage in to deter students from bullying their peers?
.
Building an Information Technology Security Awareness an.docxrichardnorman90310
Building an Information
Technology Security Awareness
and Training Program
Mark Wilson and Joan Hash
NIST Special Publication 800-50
C O M P U T E R S E C U R I T Y
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899-8933
October 2003
U.S. Department of Commerce
Donald L. Evans, Secretary
Technology Administration
Phillip J. Bond, Under Secretary for Technology
National Institute of Standards and Technology
Arden L. Bement, Jr., Director
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s
measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of
concept implementations, and technical analyses to advance the development and productive use of
information technology. ITL’s responsibilities include the development of technical, physical,
administrative, and management standards and guidelines for the cost-effective security and privacy of
sensitive unclassified information in Federal computer systems. This Special Publication 800-series
reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative
activities with industry, government, and academic organizations.
U.S. GOVERNMENT PRINTING OFFICE
WASHINGTON: 2003
For sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov — Phone: (202) 512-1800 — Fax: (202) 512-2250
Mail: Stop SSOP, Washington, DC 20402-0001
NIST Special Publication 800-50
Authority
This document has been developed by the National Institute of Standards and Technology (NIST) in
furtherance of its statutory responsibilities under the Federal Information Security Management Act
(FISMA) of 2002, Public Law 107-347.
NIST is responsible for developing standards and guidelines, including minimum requirements, for
providing adequate information security for all agency operations and assets, but such standards and
guidelines shall not apply to national security systems. This guideline is consistent with the requirements
of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency
Information Systems, as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental
information is provided A-130, Appendix III.
This guideline has been prepared for use by federal agencies. It may be used by nongovernmental
organizations on a voluntary basis and is not subject to copyright. (Attribution would be appreciated by
NIST.)
Nothing in this document should be taken to contradict standards and guidelines made mandatory and
binding on federal agencies by the Secretary of Commerce under statutory author.
Building a company with the help of IT is really necessary as most.docxrichardnorman90310
Building a company with the help of IT is really necessary as most of the daily things are running via technology these days and while using technology you must have some minimum criteria for all of those who are using it. Usually, the company must make some policies for internal use and external use, so that where someone crosses the line, they are able to catch hold of them and take a severe action as per the business policies. Now this is really important because due to an error from one person there are other people who would get affected, and there are multiple stages to those areas, that checks the severity of all of those mistakes.
Here some of them that is general while making policies, such as visiting pornographic web sites using company computer is not allowed, disrupting another’s data or computer system and sharing corporate database information. When employees make any of these mistakes, then companies have authorities to terminate employees from the business. Usually every employee is supposed work as per the basic rules or you can say acceptable usage policy. While using company materials and internet, because most of the office work is done over the internet, like using cloud or any other online applications. This allows you to have full access to outside world, but you must know what are the DO’s and Don’t’s. This will help you stick to the company for long time and also grow with the company as much as possible (Information Resources Management Association. International Conference).
These are made by looking at the history, because most of the employees have made some worst things in the history for personal benefits and ended sharing company details with outsiders, and hampered own company value. Using such valuable data, someone from outside can take over the company or misuse the data or they can do anything that can hurt the business directly. When the business owners are going under loss, the company can take actions against such activity or people who are committing those mistakes.
References
Information Resources Management Association. International Conference. Challenges of Information Technology Management in the 21st Century:
Primary Source Document
with Questions (DBQs)
E X C E R P T S F R O M I N S T R U C T I O N S T O M Y D A U G H T E R
By Song Siyŏl
Introduction
Song Siyŏl (1607‐1689) was a prominent scholar and official. This piece was written for his oldest daughter on the
occasion of her marriage and subsequently became an important tutelary text that circulated among elite families.
By the time this text was written, the patterns of patrilocal residence and patrilineal descent advocated by Neo‐
Confucian reformers early in the Chosŏn dynasty had become well established.
Document Excerpt with Questions (Longer selection follows this section)
From Sources of Korean Tradition, edited by Yŏng‐ho Ch’oe, Peter H. Lee, .
Building a Comprehensive Health HistoryBuild a health histor.docxrichardnorman90310
Building a Comprehensive Health History
Build a health history for a 55-year-old Asian female living in a high-density public housing complex –
Introduction of the paper, then explain
1. How would your communication and interview techniques for building a health history differ with each patient?
2. How might you target your questions for building a health history based on the patient’s social determinants of health?
3. What risk assessment instruments would be appropriate to use with the patient, or what questions would you ask the patient to assess his or her health risks?
4. Identify any potential health-related risks based upon the patient’s age, gender, ethnicity, or environmental setting that should be taken into consideration.
5. Select one of the risk assessment instruments presented in Chapter 1 or Chapter 5 of the Seidel's Guide to Physical Examination text, or another tool with which you are familiar, related to your selected patient.
6. Develop at least eight targeted questions you would ask the selected patient to assess his or her health risks and begin building a health history.
Resources
Ball, J. W., Dains, J. E., Flynn, J. A., Solomon, B. S., & Stewart, R. W. (2019). Seidel's guide to physical examination: An interprofessional approach (9th ed.). St. Louis, MO: Elsevier Mosby.
· Chapter 1, “The History and Interviewing Process”
· Chapter 5, “Recording Information” provides methods for maintaining clear and accurate records, also explore the legal aspects of patient records.
Sullivan, D. D. (2019). Guide to clinical documentation (3rd ed.). Philadelphia, PA: F. A. Davis.
· Chapter 2, "The Comprehensive History and Physical Exam" (pp. 19–29)
R Ryanne, W., & Lori A, O. (2015). Implementation of health risk assessments with family health history: barriers and benefits. Postgraduate Medical Journal, 1079, 508.
Lushniak, B. D. (2015). Surgeon general’s perspectives: family health history: using the past to improve future health. Public Health Reports, 1, 3.
Jardim, T. V., Sousa, A. L. L., Povoa, T. I. R., Barroso, W. K. S., Chinem, B., Jardim, L., Bernardes, R., Coca, A., & Jardim, P. C. B. V. (2015). The natural history of cardiovascular risk factors in health professionals: 20-year follow-up. BMC Public Health, 15, 1111.
ITS 832
Chapter 5
From Building a Model to Adaptive Robust
Decision Making Using Systems Modeling
InformationTechnology in a Global Economy
Professor Miguel Buleje
Introduction
• Modeling & Simulation
• Fields that develops and applies computational methods to
address complex system
• Addresses problems related to complex issues
• Focus on decision making abilities
• Opportunities to leverage interdisciplinary approach, and learn
across fields to understand complex systems.
• Legacy System Dynamics (SD) modeling and others
methods are presented
• Recent innovations
• What the future holds
• Examples
Systems Modeling
• Dynamic complexity
• Behavior evolves over time
• Mode.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
COMPARISONS OF SYNTHESIZED AND INDIVIDUALREINFORCEMENT CONTI.docx
1. COMPARISONS OF SYNTHESIZED AND INDIVIDUAL
REINFORCEMENT CONTINGENCIES DURING
FUNCTIONAL ANALYSIS
WAYNE W. FISHER, BRIAN D. GREER, PATRICK W.
ROMANI,
AMANDA N. ZANGRILLO, AND TODD M. OWEN
UNIVERSITY OF NEBRASKA MEDICAL CENTER’S
MUNROE-MEYER INSTITUTE
Researchers typically modify individual functional analysis
(FA) conditions after results are
inconclusive (Hanley, Iwata, & McCord, 2003). Hanley, Jin,
Vanselow, and Hanratty (2014)
introduced a marked departure from this practice, using an
interview-informed synthesized
contingency analysis (IISCA). In the test condition, they
delivered multiple contingencies simul-
taneously (e.g., attention and escape) after each occurrence of
problem behavior; in the control
condition, they delivered those same reinforcers
noncontingently and continuously. In the cur-
rent investigation, we compared the results of the IISCA with a
more traditional FA in which
we evaluated each putative reinforcer individually. Four of 5
participants displayed destructive
behavior that was sensitive to the individual contingencies
evaluated in the traditional FA. By
contrast, none of the participants showed a response pattern
consistent with the assumption of
2. the IISCA. We discuss the implications of these findings on the
development of accurate and
efficient functional analyses.
Key words: assessment of problem behavior, false-positive
outcome, functional analysis, inde-
pendent effects, interaction effects
The development of functional analysis
(FA) represents one of the most important
advancements in the treatment of severe prob-
lem behavior (Beavers, Iwata, & Lerman,
2013), an event in the history of behavior anal-
ysis that has been described as landmark
(Betz & Fisher, 2011). Identification of the
antecedents that evoke and the consequences
that reinforce problem behavior via an FA
enables effective behavioral intervention. It does
so because an FA provides information on
(a) how to discontinue the contingency
between problem behavior and its reinforcer
(i.e., extinction) and (b) how to deliver that
reinforcer contingent on an appropriate
response or on a time-based schedule (Fisher &
Bouxsein, 2011; Vollmer & Athens, 2011;
Vollmer, Iwata, Zarcone, Smith, & Maza-
leski, 1993).
The FA method developed by Iwata, Dorsey,
Slifer, Bauman, and Richman (1982/1994) has
been the most widely used, researched, and
cited form of functional analysis (Beavers et al.,
2013; Hanley, Iwata, & McCord, 2003). This
method involves a control condition and a
series of test conditions based on the hypothe-
3. sized operant functions of self-injurious
behavior (SIB) described by Carr (1977):
(a) social-positive reinforcement (e.g., attention),
(b) social-negative reinforcement (e.g., escape
from nonpreferred activities), or (c) automatic
reinforcement (e.g., sensory stimulation).
Each FA test condition in the Iwata
et al. (1982/1994) method has three functional
components: a unique discriminative stimulus
(SD), a specific establishing operation (EO),
and a putative reinforcing consequence (Betz &
Grants 5R01HD079113-02 and 1R01HD083214-01
from the National Institute of Child Health and Human
Development provided partial support for this research.
Patrick Romani is now at The University of Colorado
School of Medicine and Children’s Hospital Colorado.
Correspondence concerning this article should be
addressed to Amanda N. Zangrillo, Center for Autism
Spectrum Disorders, 985450 Nebraska Medical Center,
Omaha, Nebraska 68198 (e-mail: [email protected]
unmc.edu).
doi: 10.1002/jaba.314
JOURNAL OF APPLIED BEHAVIOR ANALYSIS 2016, 49,
596–616 NUMBER 3 (FALL)
596
Fisher, 2011). Iwata et al. included a unique
SD in each test condition to decrease the likeli-
4. hood that the reinforcement effects from one
test condition carried over and affected levels of
the target response in other test conditions (i.e.,
multiple-treatment interference). They included
the EO for the putative reinforcer in each test
condition to evoke the target response and to
increase the likelihood that it contacted the
reinforcing consequence. Finally, the Iwata
et al. method included a specific reinforcing
consequence, typically delivered on a dense
(fixed-ratio 1) schedule.
Hanley et al. (2003) and Beavers
et al. (2013) described several procedural varia-
tions of the Iwata et al. (1982/1994) FA
method. In some cases, researchers have altered
this method based on indirect assessments,
direct assessments, or both (Betz & Fisher,
2011; Hanley et al., 2003). Indirect assess-
ments are ones in which there is no direct
observation of the target behavior; instead,
informants who have observed the individual’s
target behavior answer questions about behav-
ioral function via interviews or rating scales
(e.g., Hanley, 2012; Roscoe, Schlichenmeyer, &
Dube, 2015). Indirect assessments, when used
alone, tend to have poor reliability and validity
for identifying the functions of problem behav-
ior (Kelley, LaRue, Roane, & Gadaire, 2011;
Rooker, DeLeon, Borrero, Frank-Crawford, &
Roscoe, 2015). By contrast, a direct assessment
involves observation and measurement of the
target behavior and the antecedents and conse-
quences that precede and follow it in the natu-
ral environment (Bijou, Peterson, & Ault,
1968; Roscoe et al., 2015; Thompson & Iwata,
5. 2001, 2007). Direct assessments tend to be
highly reliable, and they often find significant
correlations between problem behavior and cer-
tain putative reinforcers (e.g., attention, escape;
Thompson & Iwata, 2001). However, direct
assessments typically produce unacceptably
high levels of false-positive outcomes (e.g., they
inaccurately identify attention as a reinforcer
for problem behavior when attention is only
temporally associated with the response;
Thompson & Iwata, 2001, 2007). Neverthe-
less, indirect and direct assessments have been
successfully used to modify FA test and control
conditions after an initial FA produced incon-
clusive results (e.g., Bowman, Fisher, Thomp-
son, & Piazza, 1997; Fisher, Adelinis,
Thompson, Worsdell, & Zarcone, 1998; Ros-
coe et al., 2015; Tiger, Hanley, & Bes-
sette, 2006).
Hanley, Jin, Vanselow, and Hanratty (2014)
described a marked departure from prior FA
methods in which they used a structured but
open-ended interview (see the appendix of
Hanley, 2012) in combination with brief,
informal observations to develop an efficient
FA that included a single test condition and a
single control condition, henceforth referred to
as an interview-informed synthesized contin-
gency analysis (IISCA). The IISCA differs from
a traditional FA (i.e., one based on Iwata et al.,
1982/1994) in at least two important ways.
First, a traditional FA exposes the individual to
a control condition and one or more test condi-
tions in which the effects of individual rein-
6. forcement contingencies are evaluated one at a
time to identify the specific contingency or
contingencies that maintain problem behavior.
By contrast, the IISCA combines multiple
EOs, SDs, and consequences from multiple
contingencies into a single test condition, but
does not isolate any specific operant function.
Second, Iwata et al. (1982/1994) derived the
original test conditions of a traditional FA from
empirical research that showed that individual
reinforcement contingencies often maintained
problem behavior (e.g., Berkson & Mason,
1963; Carr, Newsom, & Binkoff, 1976;
Lovaas, Freitag, Gold, & Kassorla, 1965).
Therefore, a traditional FA generally starts with
the evaluation of individual but general contin-
gencies (positive, negative, and automatic rein-
forcement) and proceeds to the assessment of
more idiosyncratic (or combined) contingencies
597SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
only when the individual’s problem behavior
proves to be insensitive to those general
contingencies.
By contrast, the IISCA uses the results of a
structured interview and informal observations
to generate a single test condition that typically
includes multiple contingencies that may be
general (e.g., escape) or idiosyncratic (e.g., rein-
forcement of the individual’s mands contingent
on problem behavior). Thus, the traditional FA
assumes that individual contingencies produce
7. primarily independent effects on problem
behavior, and Iwata et al. (1982/1994)
designed the traditional FA to test for those
independent effects. By contrast, the IISCA
assumes simultaneous (or interactive) control of
behavior by multiple contingencies (Sidman,
1960/1988); however, Jessel, Hanley, and
Ghaemmaghami (in press) did not design the
IISCA to test for those interactive effects
(except with one participant, described below).
An interactive effect is one in which two or
more independent variables act simultaneously
to produce different effects on responding than
the effects produced by those variables individ-
ually. The primary method used for analyzing
interactive effects is for the experimenter to
compare a test condition that combines
(or synthesizes) the relevant independent vari-
ables with a set of control conditions that pres-
ent each of the relevant independent variables
in isolation (Barlow & Hersen, 1984; Sidman,
1960/1988). Thus, a direct within-subject
comparison of the IISCA and traditional FA
procedures provides a way to compare the
interaction-effects assumption of the IISCA
with the independent-effects assumption of the
traditional FA. Figure 1 shows four relevant
outcomes that might result from such a
comparison.
Figure 1 (top) shows hypothetical data that
are consistent with the assumption of the tradi-
tional FA regarding independent contingency
effects. The results of the traditional FA show
that the EO and contingency for tangible
8. positive reinforcement evoked and maintained
problem behavior, whereas the results of the
IISCA show no additional effect (i.e., no inter-
action effect) of synthesizing tangible positive
reinforcement with an escape contingency and
contingent attention. Figure 1 (second panel)
shows hypothetical data that are consistent with
the assumption of the IISCA that problem
behavior is primarily sensitive to simultaneous
(or interactive) control of problem behavior.
The results of the traditional FA show no evi-
dence of independent effects for any of the
individual contingencies (and their respective
EOs), whereas the results of the IISCA show
that the EOs and contingencies associated with
escape and attention interacted to maintain
problem behavior. Figure 1 (third panel)
depicts hypothetical data in which the results of
the traditional FA show that the contingencies
(and corresponding EOs) for tangible-positive
reinforcement and for escape-maintained prob-
lem behavior when implemented individually,
albeit at moderate rates. The results of the
IISCA show that the EOs and contingencies
associated with escape and those associated with
tangible items interacted to produce higher and
more consistent rates of problem behavior than
either contingency (and its respective EO) pro-
duced individually. That is, the synthesized test
condition of the IISCA produced more robust
effects than any of the individual contingencies
of the traditional FA. Overall, the hypothetical
data in Figure 1 (third panel) illustrate a situa-
tion in which an individual’s problem behavior
is sensitive to both individual and synthesized
9. contingencies (i.e., both independent and inter-
active effects). Finally, Figure 1 (fourth panel)
depicts hypothetical data in which an indivi-
dual’s problem behavior is insensitive to both
individual and synthesized contingencies.
A large body of research has shown that
problem behavior is often sensitive to the indi-
vidual contingencies that are implemented in
traditional FAs (see Beavers et al., 2013). In
addition, a growing body of research by Hanley
WAYNE W. FISHER et al.598
5 10 15 20 25 30
0
1
2
3
Tangible
Traditional FA IISCA
Escape to tangibles
and attention
Toy play EscapeAttention Independent
Effects
10. 5 10 15 20 25 30
0
1
2
3
Traditional FA IISCA
Interactive
Effects
Escape to attention
5 10 15 20 25 30
0
1
2
3
Traditional FA IISCA
Independent and
Interactive Effects
Escape to tangibles
5 10 15 20 25 30
0
1
11. 2
3
Traditional FA IISCA
No Independent or
Interactive Effects
Escape to tangibles
and attention
SESSIONS
P
R
O
B
L
E
M
B
E
H
A
V
IO
R
P
12. E
R
M
IN
U
T
E
Figure 1. Hypothetical data patterns showing independent
effects (top panel), interactive effects (second panel),
independent and interactive effects (third panel), and no
independent or interactive effects (bottom panel).
599SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
and colleagues has shown that problem behav-
ior is often sensitive to one or more of the con-
tingencies implemented simultaneously in an
IISCA (Ghaemmaghami, Hanley, & Jessel, in
press; Hanley et al., 2014; Jessel et al., in
press). However, investigators have conducted
within-subject comparisons of individual and
synthesized contingencies with just one partici-
pant (Gail in Hanley et al., 2014, who showed
a response pattern similar to the hypothetical
results shown in the second panel of Figure 1).
Thus, this is the only published case for which
it is possible to compare the independent and
interactive effects of FA contingencies. There-
fore, in this study we conducted traditional FAs
(that analyzed individual contingencies) and
13. IISCAs (that analyzed synthesized contingen-
cies) with five consecutive participants to pro-
vide information on the extent to which these
participants showed problem behavior that was
(a) sensitive primarily to individual contingen-
cies, (b) sensitive primarily to the interactive
effects of synthesized contingencies, or
(c) sensitive to both individual and interactive
contingency effects.
METHOD
Subjects
Five children who had been referred to a
severe behavior disorders program at a
university-based clinic for the assessment and
treatment of severe problem behaviors partici-
pated. Participants attended the clinic 2 to
5 days per week for 3 to 6 hr per day.
Alan, a 3-year-old boy who had been diag-
nosed with autism spectrum disorder (ASD),
engaged in aggression (hitting, pushing, kick-
ing) and SIB (head hitting). He communicated
using gestures and picture exchanges. Allie, a 5-
year-old girl who had been diagnosed with
ASD, engaged in SIB (body slamming to the
ground). She communicated using gestures and
card touches. Cameron, a 7-year-old boy who
had been diagnosed with ASD, engaged in SIB
(head banging) and aggression (scratching, bit-
ing). He communicated using gestures and pic-
ture exchanges. Sylvia, a 5-year-old girl who
had been diagnosed with oppositional defiant
14. disorder, displayed aggression (hitting, kicking,
biting) and property destruction (e.g., throwing
materials). She spoke in complete and complex
sentences. Tina, an 8-year-old girl who had
been diagnosed with oppositional defiant disor-
der, attention deficit hyperactivity disorder,
combined type, and bipolar disorder, engaged
in aggression (hitting, kicking, biting), SIB
(hair pulling), and property destruction (throw-
ing task materials). She spoke in complete and
complex sentences.
Setting and Materials
We conducted the IISCAs and traditional
FAs in clinic therapy rooms ( 3 m by 3 m)
equipped with one-way observation panels. We
used padded treatment rooms for Alan’s,
Allie’s, and Cameron’s sessions due to the
health risks associated with their SIB. We fol-
lowed the safety precautions described by Betz
and Fisher (2011) to minimize any health risks
associated with the FAs.
Each therapy room contained a table, chairs,
and work or leisure items relevant to the condi-
tion. For the traditional FA, we included leisure
items in certain sessions (as specified below)
that we identified based on caregiver nomina-
tion and a paired-stimulus preference assess-
ment (Fisher, Piazza, Bowman, & Amari,
1996; Fisher et al., 1992). We included
demand materials that we identified based on
caregiver nomination for Allie, Cameron, and
Sylvia. For Alan and Tina, we used caregiver
and teacher nomination to identify a set of
15. instructions that we systematically assessed via a
demand-latency assessment (Call, Pabico, &
Lomas, 2009) and choice arrangement similar
to a paired-choice stimulus assessment. For
example, each task was presented in a choice
arrangement with every other task (e.g., a
WAYNE W. FISHER et al.600
choice between cleaning and math problems;
Fisher et al., 1992); selection resulted in the
use of graduated guidance to complete the task,
which resulted in a hierarchy of task prefer-
ences. We included tasks in the relevant tests
conditions (listed below) that produced the
shortest latencies to problem behavior and low-
est preference rankings relative to other tasks.
Similarly, we used the results of the open-
ended interview and structured observation ses-
sion (both described below) to construct the
IISCA conditions, including the materials and
demands (described below).
Measurement
Trained observers collected data on the fre-
quency of target responses using laptop compu-
ters with a specialized data-collection program
(DataPal). We used the computer program to
convert data collected during the IISCA and
traditional FA to a rate measure (responses per
minute). We graphed the data from the struc-
tured observations as a cumulative record. For
Alan, Cameron, Sylvia, and Tina, we defined
16. aggression as forceful contact of the patient’s
feet, legs, arms, or hands with the therapist’s
body from a distance of at least 15 cm and
contact between the participant’s teeth and any
portion of the therapist’s body or clothing. For
Sylvia and Tina, we defined property destruction
as hitting or kicking hard surfaces (e.g., walls)
from a distance of at least 15 cm with force,
knocking over desks, or throwing task materi-
als. For Tina, we defined SIB as holding her
hair with her hand and forcefully pulling her
hair away from her head. For Alan and
Cameron, we defined SIB as hitting his head
against a therapist’s body (Alan) or the ground
(Cameron) from a distance of at least 15 cm
with force. For Allie, we defined SIB as contact
between her back, stomach, or buttocks and
the floor from a distance of at least 15 cm.
We assessed interobserver agreement by hav-
ing a second observer simultaneously but
independently record data during at least 19%
of sessions for each participant. To calculate
exact-agreement interobserver agreement, we
partitioned sessions into successive 10-s inter-
vals and compared observer records in each
interval. If both observers recorded the same
number of responses for a specific target behav-
ior in an interval (including zero), we scored
that interval as an agreement for that behavior.
For each target behavior, we summed the num-
ber of agreements in a session and then divided
that number by the total number of intervals in
a session and converted the resulting quotient
to a percentage. Coefficients during the struc-
17. tured observation averaged 97% (range, 90%
to 100%) for Alan, 93% (range, 84% to
100%) for Allie, 93% (range, 71% to 100%)
for Cameron, 96% (range, 89% to 100%) for
Sylvia, and 91% (range, 74% to 100%) for
Tina. Coefficients during the IISCA and tradi-
tional FA averaged 98% (range, 87% to 100%)
for Alan, 99% (range, 70% to 100%) for Allie,
99% (range, 83% to 100%) for Cameron,
99% (range, 97% to 100%) for Sylvia, and
97% (range, 95% to 100%) for Tina.
Design
We used a multielement design to identify
the function of problem behavior during both
the IISCAs and traditional FAs. We used an
ABAB reversal design for Alan, Allie, and
Cameron and an AB design for Sylvia and Tina
to compare the results obtained with the IIS-
CAs and traditional FAs. We randomized and
counterbalanced the ordering of the IISCAs
and traditional FAs across participants. Finally,
we conducted the open-ended interview and
then the structured observation session shortly
before the IISCA and used the information
from those preassessments to design the IISCA
using procedures based on Hanley
et al. (2014). We did not use the results of
these preassessments to modify the traditional
FAs; instead, we used our typical intake
601SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
18. procedures that included a comprehensive evalu-
ation prior to placement (record review, behav-
ioral history, and behavioral observation) and
structured preference assessments to select the
materials used in the control, attention, and tan-
gible conditions. In addition, we informally
interviewed caregivers to select the materials
used and demands issued for the traditional
FA. We used similar, but not identical, materials
during the IISCA and traditional FA. Table 1
depicts the relevant stimuli included in each
condition of the IISCA and traditional
FA. Trained behavior therapists (ranging from
bachelor to postdoctoral level) collected all pre-
assessment information and implemented the
IISCA and traditional FA, with the exception of
Sylvia whose caregiver conducted portions of the
assessment under the close supervision of the
first two authors and the corresponding author.
Open-Ended Functional Assessment Interview
One therapist conducted the open-ended
functional assessment interview with the
patient’s caregiver using the procedures
described by Hanley et al. (2014). The inter-
view lasted approximately 25 min. Each
caregiver responded to 20 questions. Questions
targeted seven broad areas, including identifica-
tion of the operational definitions for the target
problem behavior, identification of the anteced-
ent conditions likely to evoke problem behav-
ior, and determination of the consequences
that typically followed problem behavior in the
natural environment. The therapist often asked
19. follow-up questions to clarify or gain more
information about caregiver responses to partic-
ular items.
Structured Observations
After the open-ended functional assessment
interview, the therapist conducted a structured
observation in one continuous session that
lasted about 25 min, using procedures outlined
in Hanley et al. (2014). To evaluate the effects
of various EOs for problem behavior related to
positive reinforcers, the therapist began the ses-
sion by providing free access to preferred toys
and attention and delivering no demands for
4 min; this served as the control condition for
the structured observation. Then, at approxi-
mately the 4-min mark, the therapist intro-
duced an EO for problem behavior by
Table 1
Demands and Materials Used in the IISCA and FA Conditions
Demands in IISCA
(test condition)
Demands in FA
(escape condition)
Tangible items in
IISCA (test condition)
Tangible items in FA
(tangible condition)
Alan Shape sorting, dressing and
21. Academic worksheets, cleaning,
folding laundry, picking up
toys
iPad, Play-Doh,
journal
iPad, Play-Doh,
journal
Tina Cleaning, brushing hair Cleaning, brushing hair,
academic worksheets
Light-up ball, Play-
Doh, books
Light-up ball, Play-
Doh, books
Note. Half of the escape sessions of Alan’s FA included high-
preference demands, and the other half included low-
preference demands. Data from sessions with high-preference
demands are not presented but are available from the cor-
responding author.
WAYNE W. FISHER et al.602
restricting access to the positive reinforcer with
which the participant currently interacted. For
example, Cameron engaged in isolated play
with an iPad at the 4-min mark, and the thera-
pist removed the iPad but continued to talk to
Cameron without issuing any demands (i.e.,
the therapist introduced only the EO for tangi-
22. ble reinforcement because that is what the par-
ticipant consumed at the time mark). If the
participant engaged with multiple positive rein-
forcers at the prescribed time mark (i.e., play-
ing with toys and the therapist simultaneously),
the therapist removed both positive reinforcers
as the EO. The therapist delivered the
restricted reinforcer (e.g., the iPad) for about
20 s either contingent on problem behavior or
after 30 s, whichever came first. This process of
introducing the EO for a reinforcer after the
participant interacted with that reinforcer and
then returning it either contingent on problem
behavior or after 30 s elapsed continued for
about 4 min.
At approximately 8 min into the structured
observation session, the therapist again pro-
vided free access to preferred toys and attention
for another 4 min. At approximately 12 min
into the session, the therapist restricted the par-
ticipant’s access to toys, attention, or both
(as described above) and simultaneously issued
a series of nonpreferred demands reported to
evoke problem behavior during the open-ended
interview (i.e., a combined EO that included
both positive and negative reinforcement). For
example, for Cameron, the therapist removed
the iPad and issued demands that reportedly
evoked problem behavior. The therapist discon-
tinued demands and returned the positive rein-
forcer (e.g., attention, toys, or both) for about
20 s contingent on problem behavior or after
30 s elapsed, whichever came first. At the end
of the reinforcement interval, the therapist
again removed the positive reinforcer the par-
23. ticipant engaged with and simultaneously intro-
duced nonpreferred demands. This process of
the therapist simultaneously introducing the
EOs for escape and the positive reinforcer and
then terminating the demands and returning
the positive reinforcer either contingent on
problem behavior or after 30 s elapsed contin-
ued for about 4 min.
At about 16 min into the session, the thera-
pist again provided free access to preferred toys
and attention for another 4 min. At about
20 min into the session, the therapist and par-
ticipant briefly left the treatment room and
took a short walk while the observers removed
the toys from the room. When the therapist
and participant returned, the therapist issued a
series of nonpreferred demands reported to
evoke problem behavior during the open-ended
interview (i.e., the therapist presented only the
EO for negative reinforcement). The therapist
discontinued demands for about 20 s contin-
gent on problem behavior or after 30 s elapsed,
whichever came first. At the end of the rein-
forcement (i.e., escape) interval, the therapist
again introduced nonpreferred demands. This
process of the therapist introducing the EO for
escape and then terminating the demands con-
tingent on problem behavior or after 30 s
elapsed continued for about 4 min. For partici-
pants who displayed problem behavior during
the structured observation (Alan, Allie, and
Cameron), we examined the cumulative record
of responding to identify the individual EO or
combined EOs that evoked problem behavior.
24. Synthesized Analysis
Synthesized (test). We used the results of the
open-ended interview and structured observa-
tions to design the synthesized test condition for
each participant using procedures outlined by
Hanley et al. (2014). That is, to construct the
test condition, we combined each of the EOs
identified during the interview or the structured
observations into a single synthesized
EO. Contingent on problem behavior, we
removed those EOs by delivering the corre-
sponding reinforcers for 20 s. For example, for
603SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
Cameron, we withdrew the iPad and initiated
nonpreferred demands as the EO at the start of
the test session, and we terminated those
demands and returned the iPad for 20 s contin-
gent on problem behavior. Based on the inter-
view and structured observations, we combined
attention, tangible items, and demands into a
synthesized contingency for the test condition
for the other four participants. That is, we
restricted attention and tangible items and
initiated nonpreferred demands at the start of
the test session, and we terminated the demands
and provided access to attention and the tangi-
ble items contingent on problem behavior. Each
test and control session lasted 5 min.
Toy play (control). We used the results of the
25. open-ended interview and structured observa-
tions to design the control condition for each
participant using procedures outlined by Han-
ley et al. (2014). That is, the therapist delivered
all of the putative reinforcers for problem
behavior identified during the interview or
structured observation throughout each control
condition. For all participants, the therapist
provided free access to tangible items, presented
no demands, and delivered attention (e.g.,
“Nice job playing!”) approximately every 20 s
throughout each control session. We added
attention to the control condition for Cameron
to approximate the rate of attention delivered
when the therapist provided instructions during
the synthesized test condition, despite the
results of his interview and structured observa-
tion, which both suggested that attention was
an unlikely reinforcer for his problem behavior.
Traditional FA
We conducted a traditional FA based on pro-
cedures described by Iwata et al. (1982/1994)
with modifications outlined by Fisher, Piazza,
and Chiang (1996) and Querim et al. (2013).
That is, we conducted a series of consecutive
ignore sessions to determine whether problem
behavior persisted in the absence of social
contingencies as a test for automatic reinforce-
ment (Querim et al.). For all participants, we
observed near-zero rates of problem behavior in
this ignore condition. Therefore, we omitted
these data from the figures (to simplify interpre-
tation). In addition, we equated the durations of
26. the EOs and reinforcement intervals across the
social-reinforcement test conditions (Fisher,
Piazza, & Chiang). We provide detailed descrip-
tions of each FA condition below.
Toy play. The therapist provided access to
highly preferred items and continuous access to
attention in the form of spoken and physical
attention. Preferred items remained freely avail-
able, and no demands were issued.
Attention. The therapist provided approxi-
mately 2 min of presession access to attention
and a low-preference item. The therapist
diverted attention towards activities such as
completing paperwork or reading a magazine.
Contingent on problem behavior, the therapist
provided access to attention in the form of ver-
bal reprimands for 20 s.
Tangible. The therapist provided approxi-
mately 2 min of presession access to the highly
preferred items, after which the therapist began
restricting access to the items. Contingent on
problem behavior, the therapist provided access
to the tangible item for 20 s.
Escape. The therapist instructed the partici-
pant to complete nonpreferred demands using
a three-step, progressive prompting procedure
(verbal, model, and physical guidance). The
therapist delivered praise contingent on compli-
ance with the verbal or modeled prompt. Con-
tingent on problem behavior, the therapist
provided a break (or escape) from the nonpre-
ferred demands for 20 s.
27. RESULTS
Open-Ended Interview and Structured
Observation
Alan’s caregivers reported during the inter-
view that he frequently displayed problem
WAYNE W. FISHER et al.604
behavior when they restricted his access to tan-
gible items (particularly an iPad) or when they
instructed him to complete nonpreferred
demands. In addition, the caregivers reported
that they frequently delivered attention follow-
ing problem behavior (e.g., talked to him in a
soothing voice, held and rocked him, or some
combination). Results of the structured obser-
vation session indicated that when Alan had
free access to attention and tangible items, he
consumed both reinforcers together during
each opportunity. In addition, when the thera-
pist restricted access to both attention and tan-
gible items simultaneously, Alan displayed
problem behavior during 75% of the occasions.
Also, when the therapist delivered instructions
in isolation, he displayed problem behavior
during 80% of occasions. However, when the
therapist combined all three EOs (i.e.,
restricted access to attention and tangible items
and introduced nonpreferred demands), he dis-
played problem behavior on just one occa-
sion (17%).
28. Allie’s caregivers reported during the inter-
view that she frequently displayed problem
behavior when they restricted her access to tan-
gible items or prompted her to make a change
in her routine, which usually involved the
introduction of nonpreferred demands. In addi-
tion, they reported that they provided attention
following problem behavior. Results of the
structured observation session indicated that
when Allie had free access to attention and tan-
gible items, she consumed both reinforcers each
time (100%). In addition, when the therapist
restricted access to both attention and tangible
items simultaneously, Allie displayed problem
behavior each time (100%). When the thera-
pist delivered instructions in isolation, she dis-
played problem behavior during 33% of
occasions, with problem behavior following
each of the final four instructions. Finally,
when the therapist combined all three EOs
(i.e., restricted access to attention and tangible
items and introduced nonpreferred demands),
she displayed problem behavior each
time (100%).
Cameron’s caregivers reported during the
interview that he frequently displayed problem
behavior when they restricted his access to tan-
gible items (e.g., iPad, TV) and when they
instructed him to complete nonpreferred tasks.
Results of the structured observation session
indicated that when Cameron had free access
to attention and tangible items, he exclusively
and continuously interacted with an iPad by
29. himself. In addition, when the therapist
restricted access to the iPad, Cameron immedi-
ately displayed problem behavior each time
(100%). When the therapist combined the
EOs for tangible reinforcement and escape by
restricting access to the iPad and delivering
nonpreferred demands, he displayed problem
behavior on 75% of occasions. However, when
the therapist introduced the EO for negative
reinforcement in isolation by introducing non-
preferred demands after the observers removed
the iPad from the room, he displayed no prob-
lem behavior (0%).
Sylvia’s caregivers reported during the inter-
view that she frequently displayed problem
behavior when they restricted her access to
attention (e.g., parent talking on the phone) or
tangible items (e.g., Legos) and when they
instructed her to complete nonpreferred tasks
(e.g., to pick up toys). Results of the structured
observation session indicated that when she had
free access to attention and tangible items, she
consistently consumed both. However, she did
not display problem behavior during any of the
EO manipulations during the structured
observation.
Tina’s caregivers reported during the inter-
view that she frequently displayed problem
behavior when they restricted her access to
attention (e.g., parent busy cooking dinner) or
tangible items (e.g., when her sister had one of
Tina’s preferred toys) and when they instructed
her to complete nonpreferred tasks (e.g., to
clean her room). Results of the structured
30. 605SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
observation session indicated that when Tina
had free access to attention and tangible items,
she consistently consumed both. However, like
Sylvia, Tina did not display problem behavior
during any of the EO manipulations during the
structured observation.
IISCA and Traditional FA Results
Figure 2 shows the results of the IISCA and
traditional FA for Alan, Allie, and Cameron.
Initial results from the traditional FA for Alan
(first phase, top) clearly showed that negative
reinforcement (i.e., escape from nonpreferred
10 20 30 40 50 60 70
0
1
2
3
4
Multielement Pairwise
Traditional FA
Traditional FAIISCA IISCA
31. Alan
New
Tangible
5 10 15 20 25 30 35 40
0
2
4
6
AllieToy play
Attention
Escape
Tangible
Traditional FA Traditional FAIISCA IISCA
Synthesized
10 20 30 40 50
0
1
2
33. IN
U
T
E
Figure 2. Responses per minute of problem behavior across
traditional functional analysis (FA) and the interview-
informed synthesized contingency analysis (IISCA) for Alan,
Allie, and Cameron. We replaced Alan’s initial tangible
items with an iPad beginning in Session 31.
WAYNE W. FISHER et al.606
demands) reinforced his problem behavior and
that attention, when delivered contingent on
problem behavior in isolation, did not. The ini-
tial results also suggested that tangible positive
reinforcement may have reinforced Alan’s prob-
lem behavior, but did so somewhat inconsist-
ently (i.e., rates in four of six tangible sessions
exceeded the zero rates of problem behavior
observed in the control condition). Therefore,
we conducted a pairwise analysis in the second
phase that included only the tangible and toy
play conditions, which produced equivocal
results regarding a potential tangible function
for problem behavior until we replaced the
existing tangible items with an iPad in Session
31 based on parent report that removal of the
iPad triggered problem behavior more consist-
ently than other toys.
Results of the initial IISCA conducted with
34. Alan (third phase, top) clearly showed that the
synthesized contingency of escape combined
with attention and tangible reinforcement pro-
duced higher rates of problem behavior than
the control condition, which produced no
problem behavior. During the fourth phase, we
reintroduced the multielement traditional FA,
which produced high and relatively stable rates
of problem behavior in both the escape and
tangible conditions and near-zero rates in the
toy play and attention conditions. Finally, in
the fifth phase, we reintroduced the IISCA and
replicated the findings of the third phase. Over-
all, Alan displayed problem behavior reinforced
by the individual contingencies of the tradi-
tional FA, with little to no evidence suggesting
that the synthesized contingencies of the IISCA
interacted to produce more robust reinforce-
ment effects than the traditional FA.
Figure 2 (middle) shows the results of the
IISCA and traditional FA for Allie. Results of
the initial IISCA (first phase, middle) showed
that the synthesized contingency of escape com-
bined with attention and tangible reinforcers
produced high and stable rates of problem
behavior. Allie also displayed high rates of
problem behavior in the first two toy play ses-
sions of this phase, but then the rates of prob-
lem behavior decreased to zero for the
remaining two toy play sessions. In the second
phase, results of the traditional FA clearly
demonstrated that tangible items reinforced
problem behavior and that attention and
35. escape, when implemented individually, did
not. During the third phase, we reintroduced
the IISCA, which produced high and relatively
stable rates of problem behavior in the test con-
dition and zero rates of problem behavior in the
control condition. In the fourth phase, we rein-
troduced the traditional FA and replicated the
findings of the second phase. Finally, Allie dis-
played low rates of problem behavior in half of
the escape sessions. Therefore, to rule in or rule
out an escape function more definitively, we
compared her levels of responding in the escape
condition with the toy play condition using the
structured, visual inspection criteria described
by Roane, Fisher, Kelley, Mevers, and Bouxsein
(2013). These results failed to reach the criteria
necessary for concluding that negative reinforce-
ment contributed to the maintenance of
problem behavior. Overall, Allie displayed prob-
lem behavior reinforced by the individual
contingencies of the traditional FA, without any
evidence suggesting that the synthesized contin-
gencies of the IISCA interacted to produce
more robust reinforcement effects than the indi-
vidual contingencies of the traditional FA.
Figure 2 (bottom) shows the results of the
traditional FA and IISCA for Cameron. As dis-
played in the first phase, during the traditional
FA, tangible items reinforced problem behav-
ior, but attention and escape did not. Results
of the initial IISCA (second phase, bottom)
showed that the synthesized contingency of
escape combined with tangible reinforcement
produced substantially higher rates of problem
behavior than the control condition, but some-
36. what lower rates during the first two test condi-
tion sessions relative to the tangible condition
of the traditional FA during the prior phase.
607SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
We closely replicated the results produced by
the traditional FA and IISCA in the third and
fourth phases, respectively, and we observed
approximately equal rates of problem behavior
in the tangible condition of the FA and the test
condition of the IISCA. Finally, Cameron dis-
played low to moderate rates of problem behav-
ior in 30% of the escape sessions. Therefore, to
rule in or rule out an escape function more
definitively, we compared his levels of respond-
ing in the escape condition with the toy play
condition using the structured visual inspection
criteria described by Roane et al. (2013). These
results failed to reach the criteria necessary for
concluding that negative reinforcement contrib-
uted to the maintenance of Cameron’s problem
behavior.
Overall, Cameron displayed problem behav-
ior reinforced by the individual contingencies
of the traditional FA, with little or no evidence
suggesting that the synthesized contingencies of
the IISCA interacted to produce an accentuated
reinforcement effect relative to the traditional
FA. In fact, when we observed differences (dur-
ing the first two IISCA test sessions), it
appeared that adding an escape contingency to
the tangible contingency may have temporarily
37. lessened the reinforcing effects of the tangible
contingency, a potential interaction effect that
would be in opposition to that predicted by the
assumption of the IISCA.
Figure 3 (top) shows the results obtained
during the IISCA and traditional FA conducted
with Sylvia. Sylvia displayed no problem
5 10 15 20
0
1
2
Sylvia
Caregiver Caregiver
Traditional FA
Therapist (Ther.) Therapist
IISCA
5 10 15 20 25 30
0
1
2
Tina
39. R
P
E
R
M
IN
U
T
E
Figure 3. Responses per minute of problem behavior across the
interview-informed synthesized contingency analysis
(IISCA) and traditional functional analysis (FA) for Sylvia and
Tina.
WAYNE W. FISHER et al.608
behavior during either the IISCA or the tradi-
tional FA, regardless of whether a therapist or
her caregiver conducted the sessions.
Figure 3 (bottom) shows the results obtained
during the IISCA and traditional FA conducted
with Tina. During the first phase, a therapist
conducted the IISCA, and Tina displayed no
problem behavior. In the second phase, her
caregiver implemented the IISCA, and Tina
displayed high and stable rates of problem
behavior in the synthesized test condition and
near-zero rates of problem behavior in the con-
40. trol condition. During the third phase, a thera-
pist conducted the traditional FA, which
produced high and relatively stable rates of
responding in the tangible condition and zero
or near-zero rates of problem behavior in the
other test and control conditions, indicating
that tangible items reinforced problem behavior
and that attention and escape did not. Overall,
Tina displayed problem behavior reinforced by
the individual contingencies of the traditional
FA, without any evidence suggesting that the
synthesized contingencies of the IISCA inter-
acted to produce more robust reinforcement
effects than the traditional FA.
Table 2 shows a summary of the individual
and interactive functions of problem behavior
identified during the open-ended interview, the
structured observations, the IISCA, and the
traditional FA for all five participants. We used
the results of the IISCA and traditional FA as
the criterion variables to evaluate the validity of
the open-ended interview and structured obser-
vations. Stimuli listed in regular typeface in
Table 2 are ones that we confirmed to be func-
tionally relevant because the traditional FA
showed that the stimulus functioned as rein-
forcement for problem behavior. In addition,
we also would have confirmed a stimulus as
functionally relevant if the comparison of the
results of the IISCA and traditional FA revealed
an interaction effect involving that stimulus
(e.g., response patterns similar to the hypotheti-
cal data presented in Panel 2 or Panel 3 of
Figure 1). However, we did not observe such
41. interactive effects with any of the five partici-
pants. Stimuli listed in boldface type in Table 2
are ones that we determined to be functionally
irrelevant because they did not function as rein-
forcement for problem behavior either inde-
pendently or interactively. Finally, the stimulus
listed in italics is one that the structured obser-
vation failed to implicate that we later con-
firmed to be functionally relevant during the
traditional FA. Across the five participants, the
open-ended interview accurately implicated five
functions (36%) and inaccurately implicated
nine irrelevant functions (64%) compared to
the results of the traditional FA and IISCA.
Table 2
Comparative Results of the Open-Ended Interview, Structured
Observations, IISCA, and Traditional FA
Participant
Open-ended
interview Structured observation IISCA Traditional FA
Alan Attention, tangible,
escape
Attention, tangible,
escape
Differentiated, without individual or
interaction effects
Tangible, escape
Allie Attention, tangible,
escape
42. Attention, tangible,
escape
Differentiated, without individual or
interaction effects
Tangible
Cameron Tangible, escape Tangible or tangible
and escape
Differentiated, without individual or
interaction effects
Tangible
Sylvia Attention, tangible,
escape
No problem behavior
observed
No problem behavior observed No problem behavior
observed
Tina Attention, tangible,
escape
No problem behavior
observed
Differentiated, without individual or
interaction effects
Tangible
43. Note. Functionally relevant stimuli identified during the open-
ended interview and structured observation are presented
in regular typeface, irrelevant stimuli are in boldface type, and
missed functions are in italics.
609SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
The structured observations accurately impli-
cated three functions (43%), inaccurately
implicated three irrelevant functions (43%),
and failed to implicate one relevant function
(i.e., the tangible function).
Thus, in summary, Alan’s synthesized con-
tingency included attention, tangible reinforce-
ment, and escape, but only tangible items and
escape reinforced his problem behavior; atten-
tion did not. Allie’s synthesized contingency
included attention, tangible reinforcement, and
escape, but only tangible items reinforced her
problem behavior; attention and escape did
not. Cameron’s synthesized contingency
included tangible reinforcement and escape,
but only tangible items reinforced his problem
behavior; escape did not. Sylvia’s synthesized
contingency included attention, tangible rein-
forcement, and escape, but none of these con-
sequences reinforced her problem behavior. It
is important to note that both the IISCA and
the traditional FA produced this same result
with Sylvia (no problem behavior in any FA
condition), as did the structured observation.
Tina’s synthesized contingency included atten-
44. tion, tangible reinforcement, and escape, but
only tangible items reinforced her problem
behavior; attention and escape did not. Finally,
the four participants with differentiated tradi-
tional FA and IISCA results (Alan, Allie,
Cameron, and Tina), all showed response pat-
terns similar to the hypothetical data in
Figure 1 (top), indicating that the functional
contingencies that reinforced their problem
behavior operated independently rather than
interactively, which is consistent with the
assumption of the traditional FA but not the
IISCA.
Comparisons of the levels of experimental con-
trol. Jessel, Hanley, and Ghaemmaghami
(2015) compared the results of 34 applications
of the IISCA by their research group with all
other types of FAs published in the extant liter-
ature using a rating scale that categorized ana-
lyses as showing strong, moderate, or weak
experimental control. They concluded that the
IISCA produced clearer outcomes and stronger
experimental control than all other FA meth-
ods, including traditional, brief, trial-based,
latency-based, and other FAs (Iwata et al.,
1982/1994; Kodak, Fisher, Paden, & Dickes,
2013; Neidert, Iwata, Dempsey, & Thomason-
Sassi, 2013; Northup et al., 1991). However,
Jessel et al.’s results are limited in that they did
not involve within-subject comparisons of the
IISCA with the other FA methods. To address
this limitation, we analyzed the strength of
experimental control of the IISCAs and tradi-
tional FAs with the current within-subject data
45. sets using the same scale as Jessel et al.
The first and second authors independently
reviewed each of the relevant test–control com-
parisons for both the IISCA (synthesized
vs. control) and the traditional FA (e.g., tangi-
ble vs. toy play) using the Jessel et al. (2015)
scale, and we agreed on all ratings (exact agree-
ment was 100%). We excluded Sylvia’s data
because she displayed no problem behavior
during either analysis. Results indicated that
the IISCAs and traditional FAs produced
(a) strong experimental control for 75% and
80% of comparisons, respectively; (b) moderate
experimental control for 0% and 20% of com-
parisons, respectively; and (c) weak experimen-
tal control for 25% and 0% of comparisons,
respectively. Thus, our results showed that both
methods typically produced strong experimen-
tal control. Our findings, derived from within-
subject comparisons of the two approaches, do
not support Jessel et al.’s assertion that the
IISCA produces stronger experimental control
than the traditional FA.
Function-based treatments. For Sylvia, who
displayed no problem behavior during any
observations or analyses, we provided training
to her parents in general behavior-management
strategies. We developed function-based treat-
ments for the four participants who displayed
problem behavior during the traditional FA
and IISCA. Given that the results indicated
WAYNE W. FISHER et al.610
46. that these four participants displayed problem
behavior reinforced by individual contingencies,
we developed functional communication train-
ing (FCT) interventions based on the individual
contingencies implicated by the traditional
FA. We compared the final three treatment data
points from the treatment analyses with the
baseline average for each participant and found
that FCT reduced problem behavior by an aver-
age of 98% (Alan’s tangible function = 100%
reduction; Alan’s escape function = 94% reduc-
tion; Allie’s tangible function = 97% reduction;
Cameron’s tangible function = 100% reduc-
tion; Tina’s tangible function = 100% reduc-
tion). These results provide further evidence
that individual (rather than interactive) contin-
gencies reinforced the problem behavior dis-
played by these four participants because
function-based treatments designed to address
individual contingencies proved to be highly
effective.
DISCUSSION
We compared the results of a traditional FA
with those of the IISCA with five consecutive
participants who had been referred for the
assessment and treatment of severe problem
behavior to test the assumptions associated with
each approach. Four of the five participants
showed a response pattern consistent with the
assumption of the traditional FA that the puta-
tive contingencies (and corresponding EOs) for
problem behavior primarily act independently
47. to reinforce problem behavior (e.g., the EOs
and contingencies for attention act independ-
ently of the EOs and contingencies for escape).
None of the five participants showed a response
pattern consistent with the assumption of the
IISCA that the putative contingencies (and cor-
responding EOs) for problem behavior prima-
rily act in combination (or interactively) to
reinforce problem behavior (e.g., the assump-
tion that the EOs and contingencies for tangi-
ble items interact with the EOs and
contingencies for escape to produce a differen-
tial effect). Finally, one of the five participants
displayed no problem behaviors during either
the traditional FA or the IISCA.
The traditional FA assessed putative rein-
forcement contingencies individually and
demonstrated that problem behavior was sensi-
tive to at least one of the individual contingen-
cies tested with four of the participants. Those
same four participants also showed differen-
tiated responding between the synthesized test
and control conditions of the IISCA. However,
comparisons of the results of the traditional FA
and IISCA revealed no evidence of interaction
effects between the individual contingencies
when we combined those contingencies during
the IISCA. That is, the synthesized contingen-
cies of the IISCA did not produce more robust
reinforcement effects than the relevant individ-
ual contingencies of the traditional FA. For
example, Cameron displayed equivalent levels
of problem behavior when this response pro-
duced only tangible reinforcement during the
48. traditional FA as when it produced the combi-
nation of tangible items and escape during the
IISCA. Thus, for this participant, the escape
contingency that we included in the synthe-
sized contingency of the IISCA appeared to be
irrelevant to the function of problem behavior
(i.e., the tangible item reinforced problem
behavior equally well with and without the
escape contingency). Comparisons between the
results of the traditional FA and IISCA showed
that the IISCA included functionally irrelevant
contingencies for all four participants for whom
we observed differentiated responding during
the traditional FA and IISCA.
The IISCA identified three operant functions
of problem behavior (attention, tangible, and
escape) for three of the participants, two oper-
ant functions of problem behavior (tangible
and escape) for one participant, and no operant
function for the remaining participant. Com-
parisons between the results from the tradi-
tional FA and IISCA confirmed the results of
611SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
the IISCA only for this participant. That is, the
two analyses agreed that this participant’s prob-
lem behavior was not sensitive to attention,
tangible items, or escape as reinforcement in a
clinic setting when we evaluated those contin-
gencies individually or as components of a
synthesized contingency. For the other four
participants, comparisons between the tradi-
49. tional FA and IISCA results showed that the
IISCA included one functionally irrelevant con-
tingency for two participants (Alan and
Cameron) and two functionally irrelevant con-
tingencies for the other two (Allie and Tina).
When we compared the results of compo-
nents used to develop the IISCA with the
results of the traditional FA and IISCA, the
open-ended interview implicated more func-
tionally irrelevant contingencies (64%) than
functionally relevant contingencies (36%). In
addition, the structured observation implicated
about the same percentage (30%) of function-
ally irrelevant contingencies as functional rele-
vant contingencies (30%), but it also missed
one functionally relevant contingency (i.e., the
tangible function for Tina).
Several researchers have examined the predic-
tive validity of indirect functional assessments
by comparing the results of these measures with
the findings of a traditional FA, and the results
have typically yielded unacceptably low levels
of agreement between the two approaches (e.g.,
Newton & Sturmey, 1991; Paclawskyj, Mat-
son, Rush, Smalls, & Vollmer, 2001; Zarcone,
Rodgers, Iwata, Rourke, & Dorsey, 1991). The
results of studies that have examined the pre-
dictive validity of direct assessments using tradi-
tional FAs as the criterion variable have
produced similarly disappointing results (e.g.,
Lerman & Iwata, 1993; Piazza et al., 2003;
St. Peter, Vollmer, Bourret, Borrero, & Slo-
man, 2005; Thompson & Iwata, 2007). The
IISCA represents a unique departure from these
50. prior studies in that it uses an open-ended
interview and informal observations to design
and individualize an efficient FA, an approach
that has proven to be useful for identifying idi-
osyncratic functions after a traditional FA pro-
duced inconclusive results (e.g., Bowman et al.,
1997; Roscoe et al., 2015). Thus, it seems rea-
sonable to examine whether behavior analysts
could use the results of indirect and direct
functional assessments on the front end, before
any experimental manipulations, to design
more individualized and accurate FAs. Unfortu-
nately, with the current participants, the IISCA
was no more accurate than other approaches
that rely heavily on the results of indirect and
direct assessments. That is, the individualized
IISCA that we developed from the indirect and
direct measures produced no appreciable
improvements in predictive validity over levels
of convergence with a traditional FA observed
in prior studies (e.g., Lerman & Iwata, 1993;
Paclawskyj et al., 2001; Thompson & Iwata,
2007; Zarcone et al., 1991). Similar to the
results of direct assessment methods, the open-
ended interview and structured observations
most often erroneously implicated contingent
attention as a reinforcer for problem behavior
(Thompson & Iwata, 2001, 2007).
Overall, we observed low levels of agreement
between the IISCA and the traditional FA,
regardless of whether we used the results of the
open-ended interview, the structured observa-
tions, or the overall IISCA. Moreover, we
attempted to find ways to use the results of the
51. open-ended interview and structured observa-
tion to improve the levels of convergence with
the traditional FA without much success. For
example, we asked, “What if we only included
reinforcers in the synthesized contingency
implicated by both the open-ended interview
and the structured observation?” Analysis and
interpretation of the data in this manner did
not appreciably alter the levels of agreement
with the traditional FA.
One possible advantage of the IISCA over a
traditional FA is that the former may have
increased ecological validity because it uses the
open-ended interview to tie the contingencies
WAYNE W. FISHER et al.612
included in the synthesized contingency to ones
that are purported to operate in the natural
environment for each individual. However, the
current results provide little evidence for the
increased ecological validity of the IISCA. In
fact, in the current investigation, the open-
ended interview and structured observation had
only a slight differential effect on the reinfor-
cers that we included in the synthesized contin-
gency of the IISCA. For four of the
participants, we included attention, tangible
items, and escape, and for the remaining partic-
ipant (Cameron), we included tangible items
and escape. Thus, if we had not conducted the
interview and observation and simply tested a
synthesized contingency that involved all of the
52. typical putative reinforcers reported in the liter-
ature (attention, tangible items, and escape)
with all participants, we would have produced
highly similar results. If we had used this alter-
native contingency synthesis approach (i.e.,
combining attention, tangible items, and escape
into a single contingency with every partici-
pant), we would have included one additional
functionally irrelevant contingency (attention
for Cameron) relative to the IISCA and pro-
duced one less missed function (i.e., we would
have included the tangible function that was
missed by the structured observation conducted
with Tina). We also would have saved the
roughly 50 min per participant that the open-
ended interviews and structured observations
required.
Jessel et al. (in press) suggested that the
IISCA might have advantages over other forms
of FA in terms of safety (e.g., reduced exposure
to EOs). We found no differences between the
analyses regarding the safety of the participants
in the current investigation. None of the parti-
cipants experienced injuries, minor or other-
wise, during either analysis. Our results are in
general agreement with Kahng et al. (2015),
who found similar levels of injury from SIB
during traditional FAs as during other times of
the day outside the FA sessions.
We caution practitioners who wish to incor-
porate the IISCA into their clinical practice due
to its simplicity and efficiency, given the ques-
tions regarding its validity raised by the results
of the current investigation. Clearly, researchers
53. should collect additional data on the levels and
types of convergence and divergence between
the IISCA and the traditional FA with more
participants before drawing firm conclusions
regarding the validity of the IISCA. Neverthe-
less, we are concerned that clinicians may
derive a false sense of confidence from the
experimental analysis component of the IISCA
because it rapidly and consistently produces
clearly differentiated responding between the
synthesized test and control conditions. As
mentioned above, practitioners would likely
produce similarly rapid and consistent levels of
experimental differentiation simply by includ-
ing the three most common reinforcers for
problem behavior (attention, tangible, and
escape) in every synthesized contingency analy-
sis, but doing so will also produce inaccurate
information about which contingencies rein-
force problem behavior and which ones do not.
Inclusion of both functional and irrelevant
consequences in a synthesized contingency may
create potential problems. It ostensibly leads to
more complex and labor-intensive interventions
(e.g., delivery of multiple consequences when
just one is sufficient). Moreover, delivery of
escape either contingent on an alternative
response or on a time-based schedule when tan-
gible items (or attention) exclusively reinforce
problem behavior will necessarily result in less
academic instruction or work for the
individual.
We do not suggest that we found no value
in the open-ended interview or the structured
54. observation. We believe that open-ended inter-
views provide structure and greater technologi-
cal rigor than many previous studies that have
used indirect measures to develop idiosyncratic
FAs following inconclusive traditional FAs
(e.g., Bowman et al., 1997; Fisher, Lindauer,
613SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
Alterson, & Thompson, 1998). In addition, we
believe that we have described the structured
observation procedure that we used in the cur-
rent study in clear and operational terms that
will facilitate replication of the procedures by
future researchers, whereas most prior studies
have outlined less formal observation proce-
dures (e.g., Fisher, Adelinis, et al., 1998; Han-
ley et al., 2014). In fact, the structured
observations in the current study might repre-
sent a preliminary FA because we systematically
manipulated putative reinforcement contingen-
cies and measured their effects.
Prior research supports these types of indi-
rect and direct assessments for designing idio-
syncratic FAs following inconclusive traditional
FAs (e.g., Bowman et al., 1997). The current
findings raise doubts regarding whether behav-
ior analysts should use indirect and direct
assessments to develop synthesized test condi-
tions before they test general reinforcement
contingencies (e.g., positive, negative, and auto-
matic reinforcement) individually with a tradi-
tional FA. Future researchers should conduct
55. additional within-subject comparisons of the
IISCA and traditional FA with larger cohorts of
participants to provide a more definitive evalua-
tion of the strengths and limitations of the
IISCA.
REFERENCES
Barlow, D. H., & Hersen, M. (1984). Single case experi-
mental designs: Strategies for studying behavior change
(2nd ed.). New York, NY: Pergamon.
Beavers, G. A., Iwata, B. A., & Lerman, D. C. (2013).
Thirty years of research on the functional analysis of
problem behavior. Journal of Applied Behavior Analy-
sis, 46, 1–21. doi: 10.1002/jaba.30
Berkson, G., & Mason, W. A. (1963). Stereotyped move-
ments of mental defectives: III. Situation effects.
American Journal of Mental Deficiency, 68, 409–412.
Betz, A. M., & Fisher, W. W. (2011). Functional analy-
sis: History and methods. In W. W. Fisher,
C. C. Piazza, & H. S. Roane (Eds.), Handbook of
applied behavior analysis (pp. 206–225). New York,
NY: Guilford.
Bijou, S. W., Peterson, R. F., & Ault, M. H. (1968). A
method to integrate descriptive and experimental field
studies at the level of data and empirical concepts.
Journal of Applied Behavior Analysis, 1, 175–191. doi:
10.1901/jaba.1968.1-175
Bowman, L. G., Fisher, W. W., Thompson, R. H., &
Piazza, C. C. (1997). On the relation of mands and
the function of destructive behavior. Journal of
56. Applied Behavior Analysis, 30, 251–265. doi:
10.1901/jaba.1997.30-251
Call, N. A., Pabico, R. S., & Lomas, J. E. (2009). Use of
latency to problem behavior to evaluate demands for
inclusion in functional analyses. Journal of Applied
Behavior Analysis, 42, 723–728. doi: 10.1901/
jaba.2009.42-723
Carr, E. G. (1977). The motivation of self-injurious
behavior: A review of some hypotheses. Psychological
Bulletin, 84, 800–816. doi: 10.1037//0033-
2909.84.4.800
Carr, E. G., Newsom, C. D., & Binkoff, J. A. (1976).
Stimulus control of self-destructive behavior in a psy-
chotic child. Journal of Abnormal Child Psychology, 4,
139–153. doi: 10.1007/bf00916518
Fisher, W. W., Adelinis, J. D., Thompson, R. H.,
Worsdell, A. S., & Zarcone, J. R. (1998). Functional
analysis and treatment of destructive behavior main-
tained by termination of “don’t” (and symmetrical
“do”) requests. Journal of Applied Behavior Analysis,
31, 339–356. doi: 10.1901/jaba.1998.31-339
Fisher, W. W., & Bouxsein, K. (2011). Developing
function-based reinforcement procedures for problem
behavior. In W. W. Fisher, C. C. Piazza, &
H. S. Roane (Eds.), Handbook of applied behavior
analysis (pp. 335–347). New York, NY: Guilford.
Fisher, W. W., Lindauer, S. E., Alterson, C. J., &
Thompson, R. H. (1998). Assessment and treatment
of destructive behavior maintained by stereotypic
object manipulation. Journal of Applied Behavior
57. Analysis, 31, 513–527. doi: 10.1901/
jaba.1998.31-513
Fisher, W. W., Piazza, C. C., Bowman, L. G., &
Amari, A. (1996). Integrating caregiver report with
systematic choice assessment to enhance reinforcer
identification. American Journal of Mental Retarda-
tion, 101, 15–25.
Fisher, W., Piazza, C. C., Bowman, L. G.,
Hagopian, L. P., Owens, J. C., & Slevin, I. (1992).
A comparison of two approaches for identifying rein-
forcers for persons with severe and profound disabil-
ities. Journal of Applied Behavior Analysis, 25,
491–498. doi: 10.1901/jaba.1992.25-491
Fisher, W. W., Piazza, C. C., & Chiang, C. L. (1996).
Effects of equal and unequal reinforcer duration dur-
ing functional analysis. Journal of Applied Behavior
Analysis, 29, 117–120. doi: 10.1901/
jaba.1996.29-117
WAYNE W. FISHER et al.614
http://dx.doi.org/10.1002/jaba.30
http://dx.doi.org/10.1901/jaba.1968.1-175
http://dx.doi.org/10.1901/jaba.1997.30-251
http://dx.doi.org/10.1901/jaba.2009.42-723
http://dx.doi.org/10.1901/jaba.2009.42-723
http://dx.doi.org/10.1037//0033-2909.84.4.800
http://dx.doi.org/10.1037//0033-2909.84.4.800
http://dx.doi.org/10.1007/bf00916518
http://dx.doi.org/10.1901/jaba.1998.31-339
http://dx.doi.org/10.1901/jaba.1998.31-513
http://dx.doi.org/10.1901/jaba.1998.31-513
http://dx.doi.org/10.1901/jaba.1992.25-491
58. http://dx.doi.org/10.1901/jaba.1996.29-117
http://dx.doi.org/10.1901/jaba.1996.29-117
Ghaemmaghami, M., Hanley, G. P., & Jessel, J.
(in press). Contingencies are necessary for promoting
delay tolerance. Journal of Applied Behavior Analysis.
Hanley, G. P. (2012). Functional assessment of problem
behavior: Dispelling myths, overcoming implementa-
tion obstacles, and developing new lore. Behavior
Analysis in Practice, 5, 54–72.
Hanley, G. P., Iwata, B. A., & McCord, B. E. (2003).
Functional analysis of problem behavior: A review.
Journal of Applied Behavior Analysis, 36, 147–185.
doi: 10.1901/jaba.2003.36-147
Hanley, G. P., Jin, C. S., Vanselow, N. R., &
Hanratty, L. A. (2014). Producing meaningful
improvements in problem behavior of children with
autism via synthesized analyses and treatments. Jour-
nal of Applied Behavior Analysis, 47, 16–36. doi:
10.1002/jaba.106
Iwata, B. A., Dorsey, M. F., Slifer, K. J.,
Bauman, K. E., & Richman, G. S. (1994). Toward a
functional analysis of self-injury. Journal of Applied
Behavior Analysis, 27, 197–209. doi: 10.1901/
jaba.1994.27-197 (Reprinted from Analysis and Inter-
vention in Developmental Disabilities, 2, 3–20, 1982)
Jessel, J., Hanley, G. P., & Ghaemmaghami, M. (2015).
Determining the efficiency of and control shown in dif-
ferent functional analysis formats. Manuscript submit-
ted for publication.
59. Jessel, J., Hanley, G. P., & Ghaemmaghami, M.
(in press). Interview-informed synthesized contin-
gency analyses: Thirty replications and reanalysis.
Journal of Applied Behavior Analysis.
Kahng, S., Hausman, N. L., Fisher, A. B.,
Donaldson, J. M., Cox, J. R., Lugo, M., &
Wiskow, K. M. (2015). The safety of functional ana-
lyses of self-injurious behavior. Journal of Applied
Behavior Analysis, 48, 107–114. doi: 10.1002/
jaba.168
Kelley, M. E., LaRue, R. H., Roane, H. S., &
Gadaire, D. M. (2011). Indirect behavioral assess-
ments: Interviews and rating scales. In W. W. Fisher,
C. C. Piazza, & H. S. Roane (Eds.), Handbook of
applied behavior analysis (pp. 182–190). New York,
NY: Guilford.
Kodak, T., Fisher, W. W., Paden, A., & Dickes, N.
(2013). Evaluation of the utility of a discrete-trial
functional analysis in early intervention classrooms.
Journal of Applied Behavior Analysis, 46, 301–306.
doi: 10.1002/jaba.2
Lerman, D. C., & Iwata, B. A. (1993). Descriptive and
experimental analyses of variables maintaining self-
injurious behavior. Journal of Applied Behavior
Analysis, 26, 293–319. doi: 10.1901/
jaba.1993.26-293
Lovaas, O. I., Freitag, G., Gold, V. J., & Kassorla, I. C.
(1965). Experimental studies in childhood schizo-
phrenia: Analysis of self-destructive behavior. Journal
of Experimental Child Psychology, 2, 67–84. doi:
60. 10.1016/0022-0965(65)90016-0
Neidert, P. L., Iwata, B. A., Dempsey, C. M., &
Thomason-Sassi, J. L. (2013). Latency of response
during the functional analysis of elopement. Journal
of Applied Behavior Analysis, 46, 312–316. doi:
10.1002/jaba.11
Newton, J. T., & Sturmey, P. (1991). The Motivation
Assessment Scale: Inter-rater reliability and internal
consistency in a British sample. Journal of Intellectual
Disability Research, 35, 472–474. doi: 10.1111/
j.1365-2788.1991.tb00429.x
Northup, J., Wacker, D., Sasso, G., Steege, M.,
Cigrand, K., Cook, J., & DeRaad, A. (1991). A brief
functional analysis of aggressive and alternative behav-
ior in an outclinic setting. Journal of Applied Behavior
Analysis, 24, 509–522. doi: 10.1901/
jaba.1991.24-509
Paclawskyj, T. R., Matson, J. L., Rush, K. S.,
Smalls, Y., & Vollmer, T. R. (2001). Assessment of
the convergent validity of the Questions About
Behavioral Function scale with analogue functional
analysis and the Motivation Assessment Scale. Journal
of Intellectual Disability Research, 45, 484–494. doi:
10.1046/j.1365-2788.2001.00364.x
Piazza, C. C., Fisher, W. W., Brown, K. A., Shore, B. A.,
Patel, M. R., Katz, R. M., … Blakely-Smith, A.
(2003). Functional analysis of inappropriate mealtime
behaviors. Journal of Applied Behavior Analysis, 36,
187–204. doi: 10.1901/jaba.2003.36-187
Querim, A. C., Iwata, B. A., Roscoe, E. M.,
61. Schlichenmeyer, K. J., Virués Ortega, J., &
Hurl, K. E. (2013). Functional analysis screening for
problem behavior maintained by automatic reinforce-
ment. Journal of Applied Behavior Analysis, 46,
47–60. doi: 10.1002/jaba.26
Roane, H. S., Fisher, W. W., Kelley, M. E.,
Mevers, J. L., & Bouxsein, K. J. (2013). Using modi-
fied visual-inspection criteria to interpret functional
analysis outcomes. Journal of Applied Behavior Analy-
sis, 46, 130–146. doi: 10.1002/jaba.13
Rooker, G. W., DeLeon, I. G., Borrero, C. S. W., Frank-
Crawford, M. A., & Roscoe, E. M. (2015). Reducing
ambiguity in the functional assessment of problem
behavior. Behavioral Interventions, 30, 1–35. doi:
10.1002/bin.1400
Roscoe, E. M., Schlichenmeyer, K. J., & Dube, W. V.
(2015). Functional analysis of problem behavior: A
systematic approach for identifying idiosyncratic vari-
ables. Journal of Applied Behavior Analysis, 48,
289–314. doi: 10.1002/jaba.201
Sidman, M. (1988). Tactics of scientific research: Evaluating
experimental data in psychology. New York, NY: Basic
Books. (Original work published 1960)
St. Peter, C. C., Vollmer, T. R., Bourret, J. C.,
Borrero, C. S. W., & Sloman, K. N. (2005). On the
role of attention in naturally occurring matching rela-
tions. Journal of Applied Behavior Analysis, 38,
429–443. doi: 10.1901/jaba.2005.172-04
615SYNTHESIZED AND INDIVIDUAL CONTINGENCIES
63. design of a functional analysis: A case example invol-
ving a preschooler’s hand mouthing. Education and
Treatment of Children, 29, 107–124.
Vollmer, T. R., & Athens, E. (2011). Developing
function-based extinction procedures for problem
behavior. In W. W. Fisher, C. C. Piazza, &
H. S. Roane (Eds.), Handbook of applied behavior
analysis (pp. 317–334). New York, NY: Guilford.
Vollmer, T. R., Iwata, B. A., Zarcone, J. R.,
Smith, R. G., & Mazaleski, J. L. (1993). The role of
attention in the treatment of attention-maintained
self-injurious behavior: Noncontingent reinforcement
and differential reinforcement of other behavior. Jour-
nal of Applied Behavior Analysis, 26, 9–21. doi:
10.1901/jaba.1993.26-9
Zarcone, J. R., Rodgers, T. A., Iwata, B. A.,
Rourke, D. A., & Dorsey, M. F. (1991). Reliability
analysis of the Motivation Assessment Scale: A failure
to replicate. Research in Developmental Disabilities,
12, 349–360. doi: 10.1016/0891-4222(91)90031-m
Received August 11, 2015
Final acceptance December 7, 2015
Action Editor, Dorothea Lerman
WAYNE W. FISHER et al.616
http://dx.doi.org/10.1901/jaba.2001.34-169
http://dx.doi.org/10.1901/jaba.2007.56-06
http://dx.doi.org/10.1901/jaba.1993.26-9
http://dx.doi.org/10.1016/0891-4222(91)90031-m
COMPARISONS OF SYNTHESIZED AND INDIVIDUAL
REINFORCEMENT CONTINGENCIES DURING
64. FUNCTIONAL ANALYSISMETHODSubjectsSetting and
MaterialsMeasurementDesignOpen-Ended Functional
Assessment InterviewStructured ObservationsSynthesized
AnalysisSynthesized (test)Toy play (control)Traditional FAToy
playAttentionTangibleEscapeRESULTSOpen-Ended Interview
and Structured ObservationIISCA and Traditional FA
ResultsComparisons of the levels of experimental
controlFunction-based treatmentsDISCUSSIONREFERENCES
TECHNICAL AND TUTORIALS
Some Tools for Carrying Out a Proposed Process for
Supervising
Experience Hours for Aspiring Board Certified
Behavior Analysts®
Katie Lynn Garza1 & Heather M. McGee1 & Yannick A.
Schenk1
&
Rebecca R. Wiskirchen1
Published online: 14 April 2017
# Association for Behavior Analysis International 2017
Abstract While task clarification, goal setting, feedback, and
behavioral skills training (BST) are well-supported methods
for performance improvement, there is no standardized ap-
proach to supervising aspiring Board Certified Behavior
Analysts® (BCBAs®) that specifies how such practices
should be used within a comprehensive supervision system,
namely for supervising those who are still accruing experience
hours for the purpose of becoming board certified. This article
outlines a systematic approach to BCBA supervision and pro-
65. vides a set of tools that supervisors can use to ensure that they
are engaging in empirically based supervision practices.
Keywords BCBA supervision . Supervision process .
Supervisionmaterials
The Behavior Analyst Certification Board® (BACB®)
Supervisor Training Curriculum Outline specifies that
BCBAs trained in supervision techniques should be able to
describe the purpose and important features of supervision,
use behavioral skills training, including the use of effective
performance feedback to teach targeted skills, evaluate the
effectiveness of their supervision, and proactively engage in
professional development activities to improve supervisory
performance (BACB, 2012b). Each of these repertoires is es-
sential for providing adequate supervision. We believe that of
equal importance is a supervisor’s ability to conduct supervi-
sion within a process that accounts for the contingencies act-
ing upon his environment and the environment of his
supervisees. Insight from the work that has been done in or-
ganizational behavior management (OBM) can help us design
effective supervision systems.
Behavior analysts should be accustomed to using a
behavior-analytic technology to produce behavior change pro-
grams for clients. However, manymay not be as accustomed to
using the same technology to train and supervise individuals
seeking certification, especially those who have limited practi-
cal experience. Organizational behavior management is a sub-
field of applied behavior analysis that focuses specifically on
organizational problems (Bucklin, Alvero, Dickinson, Austin,
& Jackson, 2000). Because the same empirical approach that is
followed in clinically focused behavior analysis is used in or-
ganizational behavior management, much of the research find-
66. ings from the OBM literature can be used to aid in the devel-
opment of applied behavior analysis (ABA) practices, includ-
ing the supervision of others.
For example, it is clear that ensuring that consequences are
contingent on the target performance improves that particular
target performance. Komaki (1986) set out to, Bspecifically
identify and empirically determine what constitutes effective
supervisory behavior^ (p. 270). The author found that effec-
tive managers spent significantly more time monitoring per-
formance and used work sampling as a specific form of per-
formance monitoring more often than marginally effective
supervisors. Komaki also found that there was no difference
between the groups regarding the number of positive, nega-
tive, or neutral consequences between effective and marginal-
ly effective managers. In other words, Beffective managers
were no more likely than the marginal managers to provide
positive consequences, and they were no less likely to provide
negative consequences^ (pp. 275–6). The author concluded
Electronic supplementary material The online version of this
article
(doi:10.1007/s40617-017-0186-8) contains supplementary
material,
which is available to authorized users.
* Katie Lynn Garza
[email protected]
1 Department of Psychology, Western Michigan University,
1903 W.
Michigan Avenue, Kalamazoo, MI 49008-5439, USA
Behav Analysis Practice (2018) 11:62–70
DOI 10.1007/s40617-017-0186-8
http://dx.doi.org/10.1007/s40617-017-0186-8
67. http://crossmark.crossref.org/dialog/?doi=10.1007/s40617-017-
0186-8&domain=pdf
that because effective managers spent more time monitoring,
their consequences were more likely to be contingent on, rath-
er than independent of, employees’ performance.
Task clarification, goal setting, and feedback are common
practices that have been used in a variety of settings to im-
prove on-the-job performance. Tittelbach, DeAngelis,
Sturmey, and Alvero (2007) used a task clarification, goal
setting, and feedback intervention to improve punctuality,
greeting, and correct front-desk behavior of student advisors
in a university counseling center. Loewy and Bailey (2007)
used graphic feedback, goal setting, and manager praise to
improve customer service (i.e., greeting, eye contact, and
smiling) in two locations of a home improvement store. Gil
and Carter (2016) used graphic feedback, later combined with
goal setting and performance feedback to improve data col-
lection adherence of direct care staff in a large residential
treatment facility. It is reasonable to expect the application of
these practices to the supervision of aspiring BCBAs to result
in supervisees’ performance improvement in key behavior-
analytic skills.
In 2016, Behavior Analysis in Practice released a special
section on supervision. Prior to its publication, few articles
had been published on recommended practices for the super-
vision of aspiring BCBAs. The special section includes arti-
cles on ethical considerations in supervision (Sellers, Alai-
Rosales, & MacDonald, 2016), recommendations for
conducting group supervision (Valentino, LeBlanc, &
Sellers, 2016), recommendations for addressing barriers to
supervision (Sellers, LeBlanc, & Valentino, 2016), an exami-
nation of the relationship between supervision hours, supervi-
68. sor credentials, years of experience, and supervisor caseload
on ABA treatment outcomes (Dixon et al., 2016), and recom-
mended practice guidelines and approaches to supervision
(Sellers, Valentino, & LeBlanc, 2016; Hartley, Courtney,
Rosswurm, & LaMarca, 2016; Turner, Fischer, & Luiselli,
2016).
Interestingly, though the supervision model presented
by Turner et al. (2016) closely resembles the process that
will be presented in this paper, the two systems were
established by two separate groups in two separate loca-
tions. The current paper further enhances the literature
base on supervision by emphasizing that supervision is a
process with a beginning, middle, and end and by provid-
ing templates to assist supervisors in carrying out that
process.
Knowing the general flow of a supervisory relationship
from beginning to end helps supervisors to keep their docu-
mentation organized and plan for supervisees’ training and
assessment needs. This is especially important given that su-
pervision may often be a secondary job for BCBAs, resulting
in time constraints and competing job responsibilities (Garza,
Peterson, McGee, Jackson, & Malott, manuscript in
preparation).
In a survey to assess the needs of individuals supervising
experience hours for aspiring BCBAs, 18% of participants
indicated that lack of available information or materials was
a barrier to using assessment in supervision. Furthermore,
30% of participants indicated that time or competing contin-
gencies were a barrier to completing assessments in supervi-
sion. When asked to indicate barriers to the use of behavioral
skills training in supervision practices, 54% of participants
indicated that lack of time was a barrier, and 48% of partici-
pants indicated that there were too many skills to teach. The
69. majority of participants also indicated that additional materials
would be useful for teaching most items in sections I and II of
the BACB Task List (Garza et al., manuscript in preparation).
In response to these expressed needs, the purpose of this paper
is to present a concise process for supervising aspiring
BCBAs and to provide materials to assist supervisors in pro-
viding high-quality supervision. Supervision for BCBA expe-
rience hours can be conceptualized as a process that occurs in
five phases: establishing a supervisory relationship, skills as-
sessment, training, ongoing performance monitoring, and
ending the supervisory relationship. The steps involved in
each of these phases will be discussed below. Those phases
that are already discussed at length in the existing literature on
supervision will be covered in less detail than those for which
the existing literature does not address how to complete the
phase in the context of BCBA supervision. In addition, strat-
egies for ongoing professional development will be discussed.
Establishing a Supervisory Relationship
Individuals may receive supervision as part of a university
practicum, from a supervisor within the organization at which
he or she works, or from a BCBA who offers contracted su-
pervision services. Regardless of the arrangement of supervi-
sion, no experience hours can be accrued before both the su-
pervisor and supervisee sign a contract outlining the respon-
sibilities of each party. The BACB Experience Standards out-
line the specific items that must be included in the contract
(BACB, 2016), and the BACB® website offers several sam-
ple contracts to use as a template. We recommend using these
templates as a guide and modifying the contract to describe
the specific assessments and experience opportunities that the
supervisee can expect to encounter within the organization in
which experience hours will be accrued. We also recommend
using universities’ or other organizations’ legal or contract
departments as a resource for reviewing contracts for proper
70. legalese whenever such resources are available.
In our professional experience, we have heard supervisors
express concern that they could get locked into a supervisory
relationship with a supervisee who does not make adequate
progress or who engages in unprofessional behavior. In their
Experience Standards, the BACB specifies that contracts
Behav Analysis Practice (2018) 11:62–70 63
should, Bdelineate the consequences should the parties not
adhere to their responsibilities (including proper termination
of the relationship)^ (2016, p. 3). If there are circumstances
under which a supervisor would be unwilling to continue su-
pervising an individual, those circumstances should be clearly
outlined in the supervision contract in order to protect both
parties.
During an initial meeting, the supervisor should describe
the purpose of supervision as described in the BACB’s
Supervisor Training Curriculum Outline and go over the su-
pervision contract with the supervisee. We recommend read-
ing over the terms of the contract aloud during the meeting,
pausing after each section to allow for questions, and having
the supervisee sign his or her initials after each section of the
agreement. This protects both parties by ensuring that there is
a legitimate and understood agreement between the supervisor
and supervisee. Once both parties sign the contract, the super-
visory relationship has been officially established.
Sellers, Valentino, and LeBlanc (2016) provide excellent
rationale and guidelines for effective establishment of the su-
pervisor–supervisee relationship. We recommend reviewing
their practice guidelines for more detailed information on cre-
71. ating supervision contracts, setting clear expectations for the
supervisee, specifically setting expectations regarding feed-
back in the supervision process, and creating a Bcommitted
and positive^ supervisory relationship (p. 276). Turner et al.
(2016) also discuss strategies for establishing a supervisory
relationship that results in collaborative and ethical practices.
In a manner similar to Sellers et al. (2016), Turner et al. (2016)
emphasize the importance of setting clear performance expec-
tations and clearly defining the supervisory relationship.
Skills Assessment
After establishing the supervisory relationship, a supervisor
must determine which performances and corresponding Task
List (BACB, 2012a) items the supervisee currently possesses
and which will need to be developed over the course of super-
vision. This determination is made through a performance/
skills assessment. In assessment, the supervisor is either ob-
serving performance or reviewing products of performance
without providing prompts, coaching, or instructional feed-
back. These components of training and performancemanage-
ment could bias the results of the assessment. Assessment
should be done before beginning the training process because
it helps the supervisor pinpoint which skills the supervisee can
successfully practice independently. This allows the supervi-
sor to focus training efforts on skills the supervisee has not yet
mastered. In our discussion of assessment, we will first present
a method for supervisors to define the scope of their assess-
ment, followed by a method for conducting the assessment,
and, finally, a method for using the results of the assessment.
Job Model
Job models can take different forms and be called by different
names (e.g., role/responsibility matrix) but typically include
the accomplishments or performance responsibilities associat-
72. ed with the job. Additional information, such as tasks required
to complete the performance, measures of performance, goals
or standards for performance, inputs to performance, recipi-
ents of outputs of performance, and how feedback on perfor-
mance will be provided, are sometimes also included in the
job model (Gilbert, 1996; Rummler & Brache, 2012).
Because training (discussed in the next section) can be a
time-consuming process, we recommend conducting an anal-
ysis of the position supervisees will hold in the organization.
This analysis helps supervisors identify which skills the
supervisee will actually practice throughout the supervisory
relationship. If the organization cannot provide specific train-
ing on a particular skill, it is categorized as a low priority for
assessment and training. If the skill is practiced regularly with-
in the organization, it is a high priority for assessment and, if
needed, training. This is not to say that the skills not practiced
within the organization are not important to the field of behav-
ior analysis or would not be worthwhile for the supervisee to
learn. However, it is best to match the training setting to the
environment in which the performance will occur naturally
(Kazbour, McGee, Mooney, Masica, & Brinkerhoff, 2013;
Mager, 1997). If there are no natural practice opportunities
within the organization, it is best to leave the training to a site
in which those opportunities are available.
Job models can be conceptualized as a sort of task clarifi-
cation, which is a widely supported performance improve-
ment intervention in OBM (Cunningham & Austin, 2007;
Gravina, VanWagner, & Austin, 2008; Durgin, Mahoney,
Cox, Weetjens, & Poling, 2014; Slowiak, 2014). Job models
can be organized in different ways depending on their specific
utility within the organization. In the context of supervision
for aspiring BCBAs, it is appropriate to examine which Task
List (BACB, 2012a) items are practiced when a supervisee
engages in each given performance that is part of her position
73. within the organization.
Appendix 1 is an example of a job model for a behavior
consulting organization. On the top of the form, there is a
space to indicate the name of the position (e.g., graduate ther-
apist), the supervisor (e.g., KS), and the job purpose (e.g., to
provide clinical services to adults and children with develop-
mental disabilities and develop professional skills for provid-
ing effective and ethical treatment). Specifying the purpose of
the job helps establish the scope of the position and distin-
guish the position from others within the organization. This
decreases the likelihood of ambiguity as to whose responsibil-
ity it is to engage in a given responsibility. Job responsibilities
or performances are listed in the left column of the table, and
the corresponding BACB Task List items are listed in the right
64 Behav Analysis Practice (2018) 11:62–70
column. For example, a graduate therapist in the behavior
consulting organization might conduct a functional behavior
assessment, but they might not be responsible for conducting
discrete trial training.
We identified 11 different tasks from the Task List that
someone might engage in to complete a functional behavior
assessment: G-01 Breview records and available data at the
outset of the case,^ G-02 Bconsider biological/medical vari-
ables that may be affecting the client,^ G-03 Bconduct a pre-
liminary assessment of the client in order to identify the referral
problem,^ G-04 Bexplain behavioral concepts using nontech-
nical language,^ G-06 Bprovide behavior-analytic services in
collaboration with others who support and/or provide services
to one’s clients,^ G-07 Bpractice within one’s limits of profes-
sional competence in applied behavior analysis, and obtain
74. consultation, supervision, and training, or make referrals as
necessary,^ G-08 Bidentify and make environmental changes
that reduce the need for behavior analysis services,^ I-01
Bdefine behavior in observable and measurable terms,^ I-02
Bdefine environmental variables in observable and measurable
terms,^ I-03 Bdesign and implement individualized behavioral
assessment procedures,^ and I-07 Bdesign and conduct prefer-
ence assessments to identify putative reinforcers^ (BACB,
2012a, pp. 6, 7). Note that job performances could be more
narrowly defined if it is likely that supervisees within the or-
ganization will complete components of the larger perfor-
mance independently. For example, functional assessment in-
terview, descriptive assessment, and functional analysis can be
listed as separate performances on the job model if they are
likely to be practiced as discrete performances that involve the
use of unique sets of skills from the Task List.
Once all of the job responsibilities and corresponding Task
List items are identified for the job position, a list of all of the
Task List items that can be practiced while the supervisee is in
that position can be compiled. The Task List items for which
there are no natural practice opportunities can be better
assessed and trained in another position, perhaps in another
organization. While all of the skills on the Task List are rele-
vant to behavior analysis as a field, not all of the skills are
relevant to every job position. For example, in organizations
that do not provide group instruction to clients, there may be
few or no opportunities to use Direct Instruction (item F-03 on
the Task List). There also may not be an opportunity to use a
full range of experimental designs (Section I.B. on the Task
List) within many organizations. Although these skills are
valuable, eliminating them from a training program allows
the supervisor to focus on teaching the skills that are immedi-
ately relevant for the supervisee’s role in the organization.
This, in turn, eliminates some competition between training
supervisees and the supervisor’s other job responsibilities.
75. Once all of Task List items that can be practiced within a
supervisee’s job role have been identified, supervisors can
conduct a focused assessment to determine training needs.
Assessment of Skills
Assessing supervisees’ ability to perform the Task List items
identified as relevant to the supervisee’s job position can also
decrease the time supervisees spend on training. Assessment
helps determine which skills must be trained and which can be
practiced without training, thereby preventing unnecessary
training and premature independent practice. Furthermore,
initial assessment allows supervisors to obtain a baseline mea-
sure of their supervisees’ performance, which allows them to
evaluate their own supervisory effectiveness (Kazdin, 1982).
There are different methods to assess supervisees’ ability to
perform job responsibilities. We recommend the following
sequence of assessment: self-assessment, oral and written
quizzes, and validation of self-assessment through review of
permanent products and observation.
Turner et al. (2016) discuss the use of initial baseline as-
sessment, including the use of direct observation; use of infor-
mal assessment such as interviews, conversation, and portfo-
lio review; review of course syllabi; discussion of progress
with previous supervisors; and review of the Task List. Here,
we present multiple steps of baseline assessment and discuss a
tool that can be used to organize assessment data for ongoing
use in the supervision process.
Self-assessment involves having the supervisee rate her
skill level for each job responsibility and/or task list skill.
While behavior analysts might be hesitant to use self-
assessment methods in their supervision practices, asking a
supervisee to rate her ability to perform a skill has some ben-
efits. Sellers et al. (2016) recommend having supervisees self-