NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Carlson, Curt A.; Lockamyeir, Robert F.; Wooten, Alex R.; Jones, Alyssa R.; Carlson, Maria A.; Hemby, Jacob A. – Applied Cognitive Psychology, 2023
The identification procedure can greatly affect eyewitness performance, but this may be contingent upon a relatively weak memory for the perpetrator. In a large preregistered experiment (N = 13,728), we manipulated memory strength and tested participants with a target-present or -absent showup or lineup (size 3 or 6). All fillers were…
Descriptors: Informed Consent, Memory, Observation, Accuracy
Peer reviewed Peer reviewed
Direct linkDirect link
Mace, John H.; Zhu, Jian; Kruchten, Emilee A.; McNally, Kevin – Applied Cognitive Psychology, 2023
Research on involuntary autobiographical memories has made significant progress over the past two decades. One question in this area concerns whether involuntary memories are functional, or merely cognitive failures. Survey methods have been used to assess the question of involuntary memory functionality, but with mixed results, with some…
Descriptors: Memory, Recall (Psychology), Autobiographies, Cognitive Processes
Peer reviewed Peer reviewed
Direct linkDirect link
Catlin, Mary; Piggott, Danielle; Scherr, Kyle C.; Vallano, Jonathan P. – Applied Cognitive Psychology, 2023
Victims of sexual violence are often punished by the legal system when their version of the incident--or fact finders' perception of their version--violates expected sexual violence schemas. We investigated the influence of sexual violence schemas on mock jurors' ability to accurately recognize facts presented in a hypothetical case. Participants…
Descriptors: Court Litigation, Simulation, Informed Consent, Rape
Peer reviewed Peer reviewed
Direct linkDirect link
Sarno, Dawn M.; Harris, Maggie W.; Black, Jeffrey – Applied Cognitive Psychology, 2023
Phishing research presents conflicting findings regarding the psychological predictors of phishing susceptibility. The present work aimed to resolve these discrepancies by utilizing a diverse online sample and email set. Participants completed a survey that included an email classification task and measured several individual differences,…
Descriptors: Computer Security, Electronic Mail, Deception, At Risk Persons