Attenuation theory

Attenuation theory is a model of selective attention proposed by Anne Treisman, and can be seen as a revision of Donald Broadbent's filter model. Treisman proposed attenuation theory as a means to explain how unattended stimuli sometimes came to be processed in a more rigorous manner than what Broadbent's filter model could account for.[1] As a result, attenuation theory added layers of sophistication to Broadbent's original idea of how selective attention might operate: claiming that instead of a filter which barred unattended inputs from ever entering awareness, it was a process of attenuation.[2] Thus, the attenuation of unattended stimuli would make it difficult, but not impossible to extract meaningful content from irrelevant inputs, so long as stimuli still possessed sufficient "strength" after attenuation to make it through a hierarchical analysis process.[2]

Brief overview and previous research

Selective attention theories are aimed at explaining why and how individuals tend to process only certain parts of the world surrounding them, while ignoring others. Given that sensory information is constantly besieging us from the five sensory modalities, it was of interest to not only pinpoint where selection of attention took place, but also explain how people prioritize and process sensory inputs.[3] Early theories of attention such as those proposed by Broadbent and Treisman took a bottleneck perspective.[2][4] That is, they inferred that it was impossible to attend to all the sensory information available at any one time due to limited processing capacity. As a result of this limited capacity to process sensory information, there was believed to be a filter that would prevent overload by reducing the amount of information passed on for processing.[5]

Methodology

Early research came from an era primarily focused upon audition and explaining phenomena such as the cocktail party effect.[6] From this stemmed interest about how people can pick and choose to attend to certain sounds in our surroundings, and at a deeper level, how the processing of attended speech signals differ from those not attended to.[7] Auditory attention is often described as the selection of a channel, message, ear, stimulus, or in the more general phrasing used by Treisman, the "selection between inputs".[8] As audition became the preferred way of examining selective attention, so too did the testing procedures of dichotic listening and shadowing.[6]

Dichotic listening

Dichotic listening is an experimental procedure used to demonstrate the selective filtering of auditory inputs, and was primarily utilized by Broadbent.[4] In a dichotic listening task, participants would be asked to wear a set of headphones and attend to information presented to both ears (two channels), or a single ear (one channel) while disregarding anything presented in the opposite channel. Upon completion of a listening task, participants would then be asked to recall any details noticed about the unattended channel.[9]

Shadowing

Shadowing can be seen as an elaboration upon dichotic listening. In shadowing, participants go through largely the same process, only this time they are tasked with repeating aloud information heard in the attended ear as it is being presented. This recitation of information is carried out so that the experimenters can verify participants are attending to the correct channel, and the number of words perceived (recited) correctly can be scored for later use as a dependent variable.[2] Due to its live rehearsal characteristic, shadowing is a more versatile testing procedure because manipulations to channels and their immediate results can be witnessed in real time.[10] It is also favored for being more accurate since shadowing is less dependent upon participants' ability to recall words heard correctly.[10]

Broadbent's filter model as a stepping stone

Information processing model of Broadbent's filter

Donald Broadbent's filter model is the earliest bottleneck theory of attention and served as a foundation for which Anne Treisman would later build her model of attenuation upon.[9] Broadbent proposed the idea that the mind could only work with so much sensory input at any given time, and as a result, there must be a filter that allows us to selectively attend to things while blocking others out. It was posited that this filter preceded pattern recognition of stimuli, and that attention dictated what information reached the pattern recognition stage by controlling whether or not inputs were filtered out.[4]

The first stage of the filtration process extracts physical properties for all stimuli in parallel manner.[9] The second stage was claimed to be of limited capacity, and so this is where the selective filter was believed to reside in order to protect from a sensory processing overload.[9] Based upon the physical properties extracted at the initial stage, the filter would allow only those stimuli possessing certain criterion features (e.g., pitch, loudness, location) to pass through. According to Broadbent, any information not being attended to would be filtered out, and should be processed only insofar as the physical qualities necessitated by the filter.[4] Since selection was sensitive to physical properties alone, this was thought to be the reason why people possessed so little knowledge regarding the contents of an unattended message.[9] All higher level processing, such as the extraction of meaning, happens post-filter. Thus, information on the unattended channel should not be comprehended. As a consequence, events such as hearing one's own name when not paying attention should be an impossibility since this information should be filtered out before you can process its meaning.

Criticisms leading to a theory of attenuation

As noted above, the filter model of attention runs into difficulty when attempting to explain how it is that people come to extract meaning from an event that they should be otherwise unaware of. For this reason, and as illustrated by the examples below, Treisman proposed attenuation theory as a means to explain how unattended stimuli sometimes came to be processed in a more rigorous manner than what Broadbent's filter model could account for.[1]

  • For two messages identical in content, it has been shown that by varying the time interval between the onset of the irrelevant message in relation to the attended message, participants may notice the message duplicity.[11]
  • When participants were presented with the message "you may now stop" in the unattended ear, a significant number do so.[12]
  • In a classic demonstration of the cocktail party phenomenon, participants who had their own name presented to them via the unattended ear often remark about having heard it.[12]
  • Participants with training or practice can more effectively perceive content from the unattended channel while attending to another.[12][13]
  • Semantic processing of unattended stimuli has been demonstrated by altering the contextual relevance of words presented to the unattended ear. Participants heard words from the unattended ear more regularly if they were high in contextual relevance to the attended message.[14]

Attenuation model of selective attention

Information processing model of Treisman's Attenuation theory

How attenuation occurs

Treisman's attenuation model of selective attention retains both the idea of an early selection process, as well as the mechanism by which physical cues are used as the primary point of discrimination.[3] However, unlike Broadbent's model, the filter now attenuates unattended information instead of filtering it out completely.[1] Treisman further elaborated upon this model by introducing the concept of a threshold to explain how some words came to be heard in the unattended channel with greater frequency than others. Every word was believed to contain its own threshold that dictated the likelihood that it would be perceived after attenuation.[15]

After the initial phase of attenuation, information is then passed on to a hierarchy of analyzers that perform higher level processes to extract more meaningful content (see "Hierarchical analyzers" section below).[1] The crucial aspect of attenuation theory is that attended inputs will always undergo full processing, whereas irrelevant stimuli often lack a sufficiently low threshold to be fully analyzed, resulting in only physical qualities being remembered rather than semantics.[3] Additionally, attenuation and then subsequent stimuli processing is dictated by the current demands on the processing system. It is often the case that not enough resources are present to thoroughly process unattended inputs.[15]

Recognition threshold

The operation of the recognition threshold is simple: for every possible input, an individual has a certain threshold or "amount of activation required" in order to perceive it. The lower this threshold, the more easily and likely an input is to be perceived, even after undergoing attenuation.[16]

Context and priming

Context plays a key role in reducing the threshold required to recognize stimuli by creating an expectancy for related information.[9] Context acts by a mechanism of priming, wherein related information becomes momentarily more pertinent and accessible – lowering the threshold for recognition in the process.[3] An example of this can be seen in the statement "the recess bell rang", where the word rang and its synonyms would experience a lowered threshold due to the priming facilitated by the words that precede it.

Subjective importance

Words that possess subjective importance (e.g., help, fire) will have a lower threshold than those that do not.[2] Words of great individual importance, such as your own name, will have a permanently low threshold and will be able to come into awareness under almost all circumstances.[17] On the other hand, some words are more variable in their individual meaning, and rely upon their frequency of use, context, and continuity with the attended message in order to be perceived.[17]

Degree of attenuation

The degree of attenuation can change in relation to the content of the underlying message; with larger amounts of attenuation taking place for incoherent messages that possess little benefit to the person hearing them.[1] Incoherent messages receive the greatest amounts of attenuation because any interference they might exhibit upon the attended message would be more detrimental than that of comprehensible, or complimentary information.[1] The level of attenuation can have a profound impact on whether an input will be perceived or not, and can dynamically vary depending upon attentional demands.[18]

Hierarchy of analyzers

The hierarchical system of analysis is one of maximal economy: while facilitating the potential for important, unexpected, or unattended stimuli to be perceived, it ensures that those messages sufficiently attenuated do not get through much more than the earliest stages of analysis, preventing an overburden on sensory processing capacity.[2] If attentional demands (and subsequent processing demands) are low, full hierarchy processing takes place. If demands are high, attenuation becomes more aggressive, and only allows important or relevant information from the unattended message to be processed.[1] The hierarchical analysis process is characterized by a serial nature, yielding a unique result for each word or piece of data analyzed.[17] Attenuated information passes through all the analyzers only if the threshold has been lowered in their favor, if not, information only passes insofar as its threshold allows.[17]

The nervous system sequentially analyzes an input, starting with the general physical features such as pitch and loudness, followed by identifications of words and meaning (e.g., syllables, words, grammar and semantics).[8] The hierarchical process also serves an essential purpose if inputs are identical in terms of voice, amplitude, and spatial cues. Should all of these physical characteristics be identical between messages, then attenuation can not effectively take place at an early level based on these properties. Instead, attenuation will occur during the identification of words and meaning, and this is where the capacity to handle information can be scarce.[8]

Evidence

Following messages to the unattended ear

During shadowing experiments, Treisman would present a unique stream of prosaic stimuli to each ear. Sometime during shadowing, the stimuli would then swap over to the opposite side so that the formerly shadowed message was now presented to the unattended ear. Participants would often "follow" the message over to the unattended ear before realizing their mistake,[14] especially if the stimuli had a high degree of continuity.[19] This "following of the message" illustrates how the unattended ear is still extracting some degree of information from the unattended channel, and contradicts Broadbent's filter model that would expect participants to be completely oblivious of the change in the unattended channel.[14]

Manipulating the onset of messages

In a series of experiments carried out by Treisman (1964), two messages identical in content would be played, and the amount of time between the onset of the irrelevant message in relation to the shadowed message would be varied. Participants were never informed of the message duplicity, and the time lag between messages would be altered until participants remarked about the similarity. If the irrelevant message was allowed to lead, it was found that the time gap could not exceed 1.4 seconds.[1] This was believed to be a result of the irrelevant message undergoing attenuation and receiving no processing beyond the physical level. This lack of deep processing necessitates the irrelevant message be held in the sensory store before comparison to the shadowed message, making it vulnerable to decay.[1] In contrast, when the shadowed message led, the irrelevant message could lag behind it by as much as five seconds and participants could still perceive the similarity. This shows that the shadowed message is not decaying as quickly, and coincides with what attenuation theory would predict: the shadowed message receives no attenuation, undergoes full processing, and then gets passed on to working memory where it can be held for a comparatively longer duration than the unattended message in the sensory store.[1]

Variations upon this method involved using identical messages spoken in different voices (e.g., gender), or manipulating whether the message was composed of non-words to examine the effect of not being able to extract meaning. In all cases, support was found for a theory of attenuation.[1][6]

Bilingual shadowing

Bilingual students were found to recognize that a message presented to the unattended channel was the same as the one being attended to, even when presented in a different language.[1] This was achieved by having participants shadow a message presented in English, while playing the same message in French to the unattended ear. Once again, this shows extraction of meaningful information from the speech signal above and beyond physical characteristics alone.[6]

Electrical shock and unattended words

Corteen and Dunn (1974) paired electrical shock with target words. The electric shocks were presented at very low intensity, so low that the participants did not know when the shock occurred. It was found that if these words were later presented in the absence of shock, participants would respond automatically with a galvanic skin response (GSR) even when played in the unattended ear. Furthermore, GSR's were found to generalize to synonyms of unattended target words, implying that word processing was taking place at a level deeper than what Broadbent's model would predict.[20]

Von Voorhis and Hillyard (1977) used an EEG to observe event-related potentials (ERPs) of visual stimuli. Participants were asked to attend to, or disregard specific stimuli presented. Results demonstrated that when attending to visual stimuli, the amount of voltage fluctuation was greater at occipital sites for attended stimuli when compared to unattended stimuli. Voltage modulations were observed after 100ms of stimuli onset, consistent with what would be predicted by attenuation of irrelevant inputs.[21]

Effects of attentional demand on brain activity

In a fMRI study that examined if meaning was implicitly extracted from unattended words, or if the extraction of meaning could be avoided by simultaneously presenting distracting stimuli; it was found that when competing stimuli create sufficient attentional demand, no brain activity was observed in response to the unattended words, even when directly fixated upon.[22] These results are in keeping with what would be predicted by an attenuation style of selection and run contrary to classical late selection theory.[23]

Competing theories

In 1963, Deutsch & Deutsch proposed a late selection model of how selective attention operates. They proposed all stimuli get processed in full, with the crucial difference being a filter placed later in the information processing routine, just before the entrance into working memory. The late selection process supposedly operated on the semantic characteristics of a message, barring inputs from memory and subsequent awareness if they did not possess desired content.[19] According to this model, the depreciated awareness of unattended stimuli came from denial into working memory and the controlled generation of responses to it.[9] The Deutsch & Deutsch model was later revised by Norman in 1968, who added that the strength of an input was also an important factor for its selection.[24]

A criticism of both the original Deutsch & Deutsch model, as well as the revised Deutsch–Norman selection model is that all stimuli, including those deemed irrelevant, are processed fully.[10] When contrast against Treisman's attenuation model, the late selection approach appears wasteful with its thorough processing of all information before selection of admittance into working memory.[17]

See also

References

  1. Treisman, A. (1964). "Monitoring and storage of irrelevant messages in selective attention". Journal of Verbal Learning and Verbal Behavior. 3 (6): 449–459. doi:10.1016/S0022-5371(64)80015-3.
  2. Treisman, A. M.; Riley, J. G. (1969). "Is selective attention selective perception or selective response? A further test". Journal of Experimental Psychology. 79 (1): 27–34. doi:10.1037/h0026890. PMID 5785632.
  3. Treisman, A. M. (1964). "The Effect of Irrelevant Material on the Efficiency of Selective Listening". The American Journal of Psychology. 77 (4): 533–546. doi:10.2307/1420765. JSTOR 1420765. PMID 14251963.
  4. Broadbent, D. E. (1958). Perception and communication. doi:10.1037/10037-000. hdl:11858/00-001M-0000-002A-EAB4-A.
  5. Friedenberg, Jay (2011). Cognitive Science: An Introduction to the Study of Mind. Sage Publications. pp. 98–101. ISBN 978-1-4129-7761-6.
  6. Kahneman, Daniel (1973). Attention and Effort. Prentice Hall. pp. 122–123. ISBN 978-0-13-050518-7.
  7. Morton, J. (1969). "Interaction of information in word recognition". Psychological Review. 76 (2): 165–178. CiteSeerX 10.1.1.408.5489. doi:10.1037/h0027366.
  8. Treisman, A. M. (1964). "Verbal Cues, Language, and Meaning in Selective Attention". The American Journal of Psychology. 77 (2): 206–219. doi:10.2307/1420127. JSTOR 1420127. PMID 14141474.
  9. Driver, J. (2001). "A selective review of selective attention research from the past century". British Journal of Psychology. 92: 53–78. CiteSeerX 10.1.1.473.2890. doi:10.1348/000712601162103. PMID 11802865. S2CID 18011722.
  10. Karowski, Waldemar (2006). International Encyclopedia of Ergonomics and Human Factors, Second Edition. CRC Press. p. 439. ISBN 978-0-415-30430-6.
  11. Cherry, E. C. (1953). "Some Experiments on the Recognition of Speech, with One and with Two Ears". The Journal of the Acoustical Society of America. 25 (5): 975–979. Bibcode:1953ASAJ...25..975C. doi:10.1121/1.1907229. hdl:11858/00-001M-0000-002A-F750-3.
  12. Moray, N. (1959). "Attention in dichotic listening: Affective cues and the influence of instructions". Quarterly Journal of Experimental Psychology. 11: 56–60. doi:10.1080/17470215908416289. S2CID 144324766.
  13. Underwood, G. (1974). "Moray vs. The rest: The effects of extended shadowing practice". Quarterly Journal of Experimental Psychology. 26 (3): 368–372. doi:10.1080/14640747408400426. PMID 4414715. S2CID 37457098.
  14. Treisman, A. M. (1960). "Contextual cues in selective listening". Quarterly Journal of Experimental Psychology. 12 (4): 242–248. doi:10.1080/17470216008416732. S2CID 143620860.
  15. Treisman, A. M. (1969). "Strategies and models of selective attention". Psychological Review. 76 (3): 282–299. doi:10.1037/h0027242. PMID 4893203.
  16. Cowan, Nelson (1997). Attention and Memory: An Integrated Framework. Oxford University Press. pp. 137–139. ISBN 978-0-19-511910-7.
  17. Treisman, Anne (1964). "Selective Attention in Man". British Medical Bulletin. 20 (1): 12–16. doi:10.1093/oxfordjournals.bmb.a070274. PMID 14104089.
  18. Galotti, Kathleen (2009). Cognitive Psychology: In and Out of the Laboratory. Nelson College Indigenous. pp. 105–107. ISBN 978-0-17-644065-7.
  19. Deutsch, J. A.; Deutsch, D. (1963). "Attention: Some Theoretical Considerations". Psychological Review. 70: 80–90. doi:10.1037/h0039515. PMID 14027390.
  20. Corteen, R. S.; Dunn, D. (1974). "Shock-associated words in a non attended message: A test for momentary awareness". Journal of Experimental Psychology. 102 (6): 1143–1144. doi:10.1037/h0036362.
  21. Van Voorhis, S. T.; Hillyard, S. A. (1977). "Visual evoked potentials and selective attention to points in space". Perception & Psychophysics. 22: 54–62. doi:10.3758/bf03206080.
  22. Rees, G; Russell, C.; Frith, C.; Driver, J. (1999). "Inattentional blindness versus inattentional amnesia for fixated but ignored words". Science. 286 (5449): 2504–2507. CiteSeerX 10.1.1.308.5448. doi:10.1126/science.286.5449.2504. PMID 10617465.
  23. Lavie, N (2000). Selective attention and cognitive control: Dissociating attentional functions through different types of load. Cambridge, MA: MIT Press. pp. 175–197.
  24. Norman, D. A. (1968). "Toward a theory of memory and attention". Psychological Review. 75 (6): 522–536. doi:10.1037/h0026699.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.