2 Designed to provide secondary reinforcers (tokens) for appropriate behavior. Can also be removed...

17

Transcript of 2 Designed to provide secondary reinforcers (tokens) for appropriate behavior. Can also be removed...

Page 1: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.
Page 2: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

2

Designed to provide secondary reinforcers (tokens) for appropriate behavior.

Can also be removed for inappropriate behavior.

Is often used in group homes, educational settings, and institutional settings.

Page 3: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Are behavior change systems Three major components

1. Specified list of behaviors to reinforce2. Tokens or points for emitting those

behaviors3. A menu of back-up reinforcers for which

the learner can exchange tokens/points

(Effectiveness of tokens as reinforcers depends upon the power of the back-up reinforcers)

Page 4: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

4

Tokens can be anything Stars Coins Cigarettes

Page 5: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

5

Can use token economies for early grades to increase student performance Stars

Page 6: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

6

Business Bonus Charts Can increase work performance.

Medical Weight reduction, food control for

diabetes, Flossing.

Page 7: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Identify target behaviorsEvaluate the behavior to be changedSelect tokensSelect menu of back-up reinforcers Identify target behaviors/rulesEstablish ratio exchangeSpecify when/how tokens will be

dispensed and exchangedField test

Page 8: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Select measurable/observable behaviors

Specify criteria for task completionStart with a small number of

behaviorsEnsure learners possess

prerequisite skillsIt is okay to individualize…rules

don’t have to be the same for everybody

Page 9: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Need to establish a baselineNeed ongoing monitoring during the

interventionNeed to see if your intervention was

successful

Page 10: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Washers, checkers, coupons, poker chips, tally marks, holes punched in cards…

Considerations Must be safe Need to control counterfeiting and

bootlegging Must be durable Accessible Cheap

Token should not be a desirable object

Page 11: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Identify what the token can be exchanged for

Select a menu Use naturally-occurring activities when possible

Privileges Tangibles and edibles can be used as well Follow ethical and legal rules

Page 12: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Establish a Ratio of Exchange Initial ratio should be small After that, adjust ratio for maintenance

Procedure for Dispensation May need storage containers

Procedure for Exchange Usually a “store” of some sort Initially, have store open frequently Over time, this can be more intermittent

Page 13: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Do before you implement the program

Tally tokens you would have given without actually giving them

Analyze data to determine if the system seems appropriate

Page 14: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Avoiding “Battles” Be matter of fact when learners don’t

earn tokens; don’t nag Stay neutral; avoid confrontation about

tokens Response cost included?

Most interventions include response cost Learners need to be aware of behaviors

resulting in response cost/procedures Make the cost fit the severity of behavior▪ Avoid having learners go “in the hole”

Page 15: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Initial training Describe the procedure to learners Model the procedure for token delivery Model the procedure for token exchange

Ongoing training Booster sessions may be needed occasionally

Management issues Teach students how/where to store tokens (secure

location) Discourage hoarding and encourage savings in some

students Chronic rule breakers deserve special consideration

Page 16: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Plan for maintenance and generalization Pair tokens with social approval Gradually increase number of responses

required to earn tokens Gradually decrease length of time it is in

place Gradually increase number of “natural”

reinforcers and fade out use of contrived reinforcers

Systematically increase price of more desirable items

Fade physical evidence of token over time

Page 17: 2  Designed to provide secondary reinforcers (tokens) for appropriate behavior.  Can also be removed for inappropriate behavior.  Is often used in.

Can be intrusive and difficult to implement Can be cumbersome Can be so rewarding to interventionist that

he/she doesn’t want to remove it Ensure it doesn’t run counter to agency or

Federal mandates