Avoidance is implicated as a factor in a variety of psychological problems. It has been shown that avoidance functions can transfer throughout relational networks. This study attempted to replicate previous findings of transfer of avoidance functions through relational networks. This study also attempted to establish a behavioral phenomenon called conditioned suppression. Two relational networks were established using matching to sample training. Following this training, one stimulus from one network was paired with gruesome photos and another stimulus from the second network was paired with photos of flowers, in a respondent conditioning procedure. Alternative operant behavior was measure before, during, and after the introduction the aversive stimuli – the gruesome photos. These phases served as measures of conditioned suppression. It was expected that the other stimuli in each relational network would acquire operant and respondent functions similar to those acquired by the stimulus from its relational network used in the respondent conditioning procedures. Ultimately, it was expected that each member of both relational networks would be established as discriminative stimuli for avoidance and non-avoidance behavior. This study failed to replicate the findings on transfer of function from previous studies. Orderly but unexpected results for the conditioned suppression phases were obtained. A number of methodological issues could have been responsible for these findings.
|Advisor:||Sandoz, Emily K.|
|Commitee:||Perkins, David R., Smith, Theodore S.|
|School:||University of Louisiana at Lafayette|
|School Location:||United States -- Louisiana|
|Source:||MAI 56/01M(E), Masters Abstracts International|
|Subjects:||Behavioral psychology, Cognitive psychology|
|Keywords:||Avoidance, Conditioned suppression, Relational frame theory, Stimulus equivalence, Transfer of function|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be