润润分享 http://blog.sciencenet.cn/u/runrun 谦谦君子,温润如玉!

博文

(214)functional behavioral treatment protocols

已有 1100 次阅读 2019-5-7 21:29 |系统分类:科研笔记

Functional Behavioral Assessment, Diagnosis, and Treatment

Third Edition

Ennio Cipani, PhD

pages 231-

socially mediated access functions:premack contingency option

in a premack contingency,the desired reinforcer is produced following the client's success-ful compliance with a designated regimen of tasks or demands.you don't get your dessert until you eat your vegetables.

a requirement to perform a set of tasks that will delay but not elimate access to the reinforceing item or event.

procedures for premack contingency

1.either at certain times of the day or under certain antecedent conditions that occassion the target access behaviors,require the client to engages in a simple designated task,determined by an analysis of client's level of ability.

2.whether the client completes the requirement of the task,provide the reinforcer

3.repeat steps 1 and 2 with each request

4.as a function of success in ameliorating the target behavior,progressively increase the duration or quantity of the task required.

5.ensure that the target behavior does not produce the desired reinforcer(extinction)

increase the duration or complexity of each task

increase the number of tasks required to earn reinforcer

some children do not undergo such conditioning and learn to engage in disruptive and disastrous behaviors to continually access attention or prefered items or activities,the same problem can occur once the person is taught to request reinforcers,requesting may occur too often once developed,with access to the tangible or social reinforcer provided beyond a reasonable level.

一個小朋友平時想要什麼東西習慣用手用力打大人,扯大人衣服或者使用其他不適當的行為,教會孩子表達,說我要xx,或者用手指一指要的東西,孩子會用這種方式後可能會經常說我想要這個,我想要哪個,凡事都有個度,過度就成了問題。我柔柔喜歡用打印機打印東西,剛開始會哭或者拉我的說,意思是要複印,後來會表達我要機,老是說我要機就會覺得很煩,也不可能她每次說要都給她,打印前會安排她做點事情,扔垃圾,插電源,完成後才能用打印機

socially mediated access function:access mand(request)option brief description

the desired reinforcer,whether it be social attention or access to tangible reinforcer,is accessed upon an appropriate request(mand)from the client.

first determine what specific form the request should take,next,when the new requesting behavior occurs,it is reinforced each time with the specific items or event that was requested,if the target behavior occurs,the reinforcer is not provide until the person engages in the specified requesting behavior.

procedures

1.identify the reinforcer(e.g.,food,toys,drink,physical contact)

2.identify the time and setting when the reinforcer is not readily available,and ensure that the client is slightly deprived of it(i.e.,wants it).it is essential that the client be motivated to access the desired item or event,the judgement of when the client wants the item can generally be along the same conditions and times under which the socially mediated access target behavior occurred,using the same level of deprivation that existed as a motivating condition for the problem behavior,you now use the following procedures to develop the replacement behavior

3.determin the initial request respond to be targeted for reinforcement(with access to specific reinforcer).for example,vocal response,manual signed response,pointing to a communication board,and so forth

4.present the general instruction"what do you want?"with the item.or activity within sight

5.use a prompt that is intrusive as necessary to evoke the request

6.contingent upon the occurrence of the specified requesting behavior,present the reinforcer in small quantities(e.g.,a piece of food) or short duration(e.g.,2 minutes of toy play),and record the occurrence of the behavior on the data sheet

7.if the target behavior occurs,remove the reinforcer for a short period of time and start again at step 4

8.repeat steps 3-6 for as long as the person is motivated to request the reinforcer,when the persons' enthusiasm wanes,end access to the reinforcer until motivation can be re-established

9.as the client becomes more competent,provide less of a promt,and time delay the prompt, allowing him or her the opportunity to respond ahead of the promt

10.provide the opportunties for requesting in real life by occasionally depriving the client of some reinforcer for a brief period of time,then reinforcing(and if necessary prompting) the request

teaching a requesting behavior(mand) works by establishing an alternate form of behavior that will allow the person to move effectively and efficiently access the same maintaining reinforcer as the target behavior










https://blog.sciencenet.cn/blog-602248-1177492.html

上一篇:(213)functional behavioral treatment protocols
下一篇:(215)functional behavioral treatment protocols for SME
收藏 IP: 121.9.250.*| 热度|

1 柳林涛

该博文允许注册用户评论 请点击登录 评论 (2 个评论)

数据加载中...

Archiver|手机版|科学网 ( 京ICP备07017567号-12 )

GMT+8, 2024-3-29 20:37

Powered by ScienceNet.cn

Copyright © 2007- 中国科学报社

返回顶部