Abstract
Cognitive technologies extend our cognitive abilities, yet they are currently deficient in many respects. According to fuzzy-trace theory, people are gist processors with a fuzzy-processing preference, and information is mentally represented along a fuzzy-to-verbatim continuum. An understanding of gist processing could form the basis of a new generation of more effective cognitive technologies. This suggests, first, the need for new tools to help Web page creators optimize gist representations of text. Such a system could provide feedback about the visitor’s gist and make recommendations about rewriting. It also suggests the need for new tools to help authors create more effective means of presenting quantitative data in visual form. The advocated approach capitalizes on the collective knowledge of communities of practice on the Web. Finally, it suggests the need for new tools for collecting input from users. The facial composite system EvoFIT is cited as an example.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Atkinson, R. C., &Juola, J. F. (1974). Search and decision processes in decision memory. In D. H. Krantz, R. C. Atkinson, R. D. Luce, & P. Suppes (Eds.),Contemporary developments in mathematical psychology: Vol. 1. Learning, memory, and thinking (pp. 243–293). San Francisco: Freeman.
Brainerd, C. J., &Reyna, V. F. (1989). Output-interference theory of dual-task deficits in memory development.Journal of Experimental Child Psychology,47, 1–18.
Brainerd, C. J., &Reyna, V. F. (1990). Gist is the grist: Fuzzy-trace theory and the new intuitionism.Developmental Review,10, 3–47.
Brainerd, C. J., &Reyna, V. F. (2005).The science of false memory. Oxford: Oxford University Press.
Britt, M. A., &Gabrys, G. L. (2001). Teaching advanced literacy skills for the World Wide Web. In C. R. Wolfe (Ed.),Learning and teaching on the World Wide Web (pp. 73–90). San Diego: Academic Press.
Britt, M. A., &Gabrys, G. [L.] (2004). Collecting responses through Web page drag and drop.Behavior Research Methods, Instruments, & Computers,36, 52–68.
Frowd, C. D. (2006).Adding holistic dimensions to a facial composite system. Manuscript submitted for publication.
Frowd, C. D., Bruce, V., Ness, H., Bowie, L., Paterson, J., Thomson-Bogner, C., et al. (2006).Parallel approaches to composite production: Interfaces that behave contrary to expectation. Unpublished manuscript.
Frowd, C. D., Carson, D., Ness, H., McQuiston-Surrett, D., Richardson, J., Baldwin, H., &Hancock, P. (2005). Contemporary composite techniques: The impact of a forensically-relevant target delay.Legal & Criminological Psychology,10, 63–81.
Jacoby, L. L. (1991). A process dissociation framework: Separating automatic from intentional uses of memory.Journal of Memory & Language,30, 513–541.
Landauer, T. K., &Dumais, S. T. (1997). A solution to Plato’s problem: The latent semantic analysis theory of acquisition, induction, and representation of knowledge.Psychological Review,104, 211–240.
Lund, K., &Burgess, C. (1996). Producing high-dimensional semantic spaces from lexical co-occurrence.Behavior Research Methods, Instruments, & Computers,28, 203–208.
Mandler, G. (1980). Recognizing: The judgment of previous occurrence.Psychological Review,87, 252–271.
Myers, C. W., &Schoelles, M. J. (2005). ProtoMatch: A tool for analyzing high-density, sequential eye gaze and cursor protocols.Behavior Research Methods,37, 256–270.
Nielson, J. (1999).Designing Web usability: The practice of simplicity. Indianapolis: New Riders.
Norman, D. (1992).Turn signals are the facial expressions of automobiles. Reading, MA: Addison-Wesley.
Oracle.com (2005). Oracle Text [Software]. Retrieved Nov. 11, 2005 at www.oracle.com/technology/products/text/index.html.
Oracle Text application developer’s guide (2005). Retrieved Nov. 11, 2005 at www.stanford.edu/dept/itss/docs/oracle/9i/text.920/a96517/cdefault.htm1008406.
Proctor, R. W. (2005). Methodology is more than research design and technology.Behavior Research Methods,37, 197–201.
Reyna, V. F., &Brainerd, C. J. (1989). Output interference, generic resources, and cognitive development.Journal of Experimental Child Psychology,47, 42–46.
Reyna, V. F., &Brainerd, C. J. (1995). Fuzzy-trace theory: An interim synthesis.Learning & Individual Differences,7, 1–75.
Reyna, V. F., Brainerd, C. J., & Connolly, T.(1990).Just the bottom line, please: A fuzzy-trace theory of framing effects in choice. Paper presented at the Fifth International Conference on the Foundation and Applications of Utility, Risk, and Decision Theories, Duke University.
Roti, S. (2005).Oracle’s universal server: The ConText server option. Retrieved Nov. 11, 2005 at www.oreview.com/9704roti.htm.
Tufte, E. (1983).The visual display of quantitative information. Cheshire, CT: Graphics Press.
Wodtke, C. (2003).Information architecture: Blueprints for the Web. Indianapolis: New Riders.
Wolfe, C. R. (1995). Information seeking on Bayesian conditional probability problems: A fuzzy-trace theory account.Journal of Behavioral Decision Making,8, 85–108.
Wolfe, C. R., Reyna, V. F., &Brainerd, C. J. (2005). Fuzzy-trace theory: Implications for transfer in teaching and learning. InTransfer of learning from a modern multidisciplinary perspective (pp. 53–88). Greenwich, CT: Information Age Press.
Author information
Authors and Affiliations
Corresponding author
Additional information
This is a somewhat revised version of the SCiP 2005 Presidential Address.
Rights and permissions
About this article
Cite this article
Wolfe, C.R. Cognitive technologies for gist processing. Behavior Research Methods 38, 183–189 (2006). https://doi.org/10.3758/BF03192767
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.3758/BF03192767