Nowadays, it is commonly assumed that memory is a reconstruction of the past that is prone to various kinds of mistakes. Indeed, research examining memory errors has increased dramatically over the past years (see Gallo, 2006, 2010, for reviews). A type of memory error that has been extensively studied is the associative illusion of memory, using for this purpose the Deese/Roediger–McDermott (DRM) paradigm (Deese, 1959; Roediger & McDermott, 1995). In this paradigm, participants study words that are semantically related to a single nonpresented word (critical word). Following the study phase, in a memory test, critical words are often falsely recalled and recognized. This paradigm has been widely employed because it produces robust false-memory effects across different experiments and conditions (e.g., Beato & Arndt, 2014; Beato, Boldini, & Cadavid, 2012; Del Prete, Mirandola, Konishi, Cornoldi, & Ghetti, 2014; Pimentel & Albuquerque, 2013). Similarly, much research has been conducted to explore the variables that increase or decrease false memories (e.g., Beato, Cadavid, Pulido, & Pinho, 2013; Cadavid, Beato, & Fernandez, 2012; Flegal & Reuter-Lorenz, 2014; Graham, 2007; Unsworth & Brewer, 2010; Zhu et al., 2010). Theme identifiability is one of them, as we will subsequently discuss.

Several theoretical approaches have been used to explain the false-memory illusion in the DRM paradigm. The two main contemporary theories, fuzzy-trace theory (Brainerd & Reyna, 1990; Brainerd, Reyna, & Ceci, 2008; Reyna & Brainerd, 1995) and the activation-monitoring framework (Roediger, Balota, & Watson, 2001; Roediger, Watson, McDermott, & Gallo, 2001), converge in proposing two opposite processes that combine to elicit false memories: error-inflating processes and error-editing processes. The error-inflating processes would increase false memory and are available early in memory retrieval. On the other hand, the error-editing processes, when efficiently engaged, would allow one to reject the critical word as a studied word, decreasing false memory (Arndt & Gould, 2006). Therefore, false memory occurs when, first, error-inflating processes occur and, subsequently, error-editing processes fail. Gallo (2004, 2006) focused on the decision process that underlies error-editing processes and, taking it into account, distinguished two classes of editing processes: diagnostic monitoring and disqualifying monitoring.

Diagnostic monitoring occurs when the critical word is not accompanied by an expected recollection, leading to the rejection of that item (“if I had studied that item, I would remember it; I do not recall it, so it must not have occurred”). In other words, in the DRM paradigm, diagnostic decisions are made by taking into account the quality of the mnemonic evidence related to the critical words. The absence of expected recollections for those items underlies their successful rejection.

Instead, disqualifying monitoring happens when participants do recall certain information about an item that is incompatible with the occurrence of the critical word, allowing them to reject the questionable item (i.e., critical word) as having occurred (“if I had studied that item, I would not be able to remember this other information; because I do recall information that excludes that item as a studied one, it must have not occurred”). In this type of monitoring, the decision is made on the basis of the recollection of collateral information (Gallo, 2006).

One of the strategies employed in disqualifying monitoring is the identify-to-reject strategy (e.g., Carneiro et al., 2012). This strategy requires that, first, participants are able to detect the associative nature of the lists, noticing that all of the words in a list are related to a common theme. Second, they must identify a word that connects all of the listed items (theme word list or critical word). Third, participants have to realize that this word is not included in the list, labeling it as a nonpresented word. Finally, when the identified word (critical word) is presented in the recognition test, it is necessary to recall their earlier discovery that this was a nonpresented word, so they correctly reject the critical word as studied and avoid false recognition. Similarly, in a free recall task, the critical word is kept in mind in order not to falsely recall it (Gallo, 2006).

In the DRM paradigm context, it has been confirmed that participants frequently resort to an identify-to-reject strategy to disqualify the critical word, reducing the occurrence of false memories (e.g., Carneiro, Fernandez, & Dias, 2009; Gallo, Roberts, & Seamon, 1997).

Moreover, sometimes the identify-to-reject strategy is given to participants for the purpose of decreasing false-memory rates. Thus, in warning studies conducted with DRM lists, participants receive specific instructions about the false-memory effect, encouraging them to identify the nonpresented critical word that was related to all of the list words. Several studies have shown that this type of instructions dramatically decreased both false recall (e.g., Peters et al., 2008; Watson, Bunting, Poole, & Conway, 2005; Watson, McDermott, & Balota, 2004) and false recognition (e.g., Gallo et al., 1997; Gallo, Roediger, & McDermott, 2001; McCabe & Smith, 2002; McDermott & Roediger, 1998; Multhaup & Conner, 2002; Neuschatz, Benoit, & Payne, 2003; Peters et al., 2008; Westerberg & Marsolek, 2006).

Therefore, identification of the theme of the list (i.e., identification of the critical word) seems to be an essential factor when considering the error-editing processes. That is the reason why theme identifiability (identification of the critical word of each list) represents one of the most promising research fields within the domain of false memory. Getting to know how identifiable a critical word is after all of its associated items are presented constitutes an optimal way to explore how editing processes work when participants are shown a DRM list in false-memory experiments. More specifically, these editing processes are particularly efficient in lists with highly identifiable critical words, for which false-memory rates are lower (e.g., Carneiro et al., 2009; Carneiro et al., 2012; Carneiro & Fernandez, 2013; but see also Neuschatz et al., 2003, where false-memory rates decreased only when there was prior warning of the false-memory effect). To reach these conclusions, Carneiro et al. (2009) conducted a study in which they obtained theme identifiability indexes for one-critical-word lists while they explored false-memory production in both children and adults. They found that the level of identifiability of the critical word was inversely related to false recognition only among the adult participants. According to Carneiro et al. (2009), this finding suggests that adults are more likely than children to engage in an identify-to-reject strategy spontaneously. As a consequence, identifiability tasks could provide valuable data for how error-editing processes work in the human mind throughout a lifespan. In a more recent study, Carneiro et al. (2012) replicated the identifiability effect (lower false memory rates for higher identifiable critical words), in both visual and auditory conditions. Moreover, these authors proved that speeded presentation rates in the study phase and a speeded response condition at test interfere with the startup of the identify-to-reject strategy, eliminating the identifiability effect or even reversing the pattern (i.e., higher false-memory rates for more identifiable critical words). These interesting findings show the existing intricate relationship between error-editing processes and false memory, as well as the main role that identifiability tasks could play in unraveling the mechanisms involved in associative illusions of memory.

DRM lists are constructed on the basis of free association norms. In free association normative studies, a series of words (the cue) are presented, and participants are asked to provide the first word that comes to mind (the target). With this procedure, researchers establish a cue–target relationship and calculate the proportion of participants who elicit a determined target in response to a particular cue. This proportion is considered to be an index of the associative strength between the two words (McEvoy, Nelson, & Komatsu, 1999). In the DRM paradigm, two types of lists are generally constructed with free association norms. Forward associative strength (FAS) lists include a cue word as a critical word and several targets (i.e., words produced by cue word) as studied words. In backward associative strength (BAS) lists, one particular target is considered the critical word and several cue words that produced that target are included as studied words.

Initially, the DRM lists used in the study of false memories were FAS lists (e.g., Boldini, Beato, Cadavid, 2013; Gallo & Roediger, 2002; Roediger & McDermott, 1995; Stadler, Roediger, & McDermott, 1999), characterized by the fact that the critical words produced the studied words in free association tasks. However, subsequent research suggested that BAS (the associative strength from the studied items to the critical words) is the best predictor of false memories (e.g., Deese, 1959; Howe, Wimmer, & Blease, 2009; McEvoy et al., 1999; Robinson & Roediger, 1997; Roediger, Balota, & Watson, 2001). Consequently, in a recent DRM false-memory normative study conducted by Beato and Díez (2011), lists were constructed using BAS values, in line with other researchers who have pointed out the importance of employing BAS lists (e.g., Carneiro, Ramos, Costa, Garcia-Marques, & Albuquerque, 2011).

Furthermore, Beato and Díez’s (2011) lists had one characteristic that made them especially innovative: Specifically, the BAS DRM lists included six associated words simultaneously related to three critical words, instead of including a single critical word per list. There are several reasons to believe that three-critical-word lists are an improvement over one-critical-word lists. First, lists with multiple critical words could hinder successful triggering of spontaneous error-editing processes. Thus, in three-critical-word DRM lists, it would be more difficult to (a) realize the associative structure of the list, (b) spontaneously identify all of the critical words, and (c) control the false-memory effect. Second, assuming that two opposite processes are involved in false memories (error-editing and error-inflating processes), discouraging the engagement of the error-editing processes would allow for a more precise exploration of the error-inflating processes. Since spontaneous error-editing processes are not as easy to engage in multiple-critical-word lists, these materials allow for a better evaluation of how associative variables have an impact on memory error-inflating processes. Third, lists with three critical words contributed to satisfy a compelling methodological need in event-related potential (ERP) DRM research. Commonly, these studies seek to examine the similarities and differences between true and false memories (e.g., Curran, Schacter, Johnson, & Spinks, 2001). Whereas the ERPs for true memories are obtained from averaging trials for studied-item hits, the ERPs for false memories are obtained from averaging critical-word false alarm trials. In classical DRM/ERP studies, the lists include only one critical word and 15 studied words, and, consequently, the number of averageable critical-word trials is significantly lower than the number of true-memory trials. Since the signal-to-noise (S/N) ratio (a measure of the quality of the signal) increases with the number of trials included in the average, the small number of critical trials creates a methodological challenge to obtain reliable ERP waveforms for false memories. Furthermore, the disparity between the S/N ratios found in true and false memory ERP waveforms make comparisons difficult to interpret (Luck, 2005). Alternative solutions to this problem have been proposed (Curran et al., 2001; Wiese & Daum, 2006), but they have failed to maintain the DRM associative structure in the lists (see Beato & Díez, 2011, for a discussion of this alternative). Thus, three-critical-word DRM lists, the materials employed in this study, seem to constitute adequate materials to study (1) how error-editing processes are involved in false memories, (2) how error-inflating processes have an impact on false memory, and (3) false-memory ERP waveforms.

In traditional one-critical-word DRM lists, the theme identifiability is the proportion of participants who identify the critical word in each list (e.g., Carneiro & Fernandez, 2013; Carneiro et al., 2009; Carneiro et al., 2011; Carneiro et al., 2012). In the present normative study, our goal was to investigate the theme identifiability for three-critical-word lists. Accordingly, we obtained theme identifiability for each one of the three critical words included in each list (hereafter referred to as the theme identifiability per critical word), consistent with the methodology of one-critical-word DRM research (i.e., the proportion of participants able to identify each critical word was computed). Also, for purposes of comparison with traditional DRM lists, each of which has one value for theme identifiability, we averaged the identifiability values of the three critical words within each list to obtain the theme identifiability per list.

In the present normative study, we obtained the theme identifiability from the Spanish lists previously published by Beato and Díez (2011). Two types of instructions were used for this purpose. On the one hand, we aimed to know the theme identifiability when we employed the traditional instructions previously used in other studies (i.e., without-explanation instructions; e.g., Carneiro et al., 2009). On the other, we wanted to obtain theme identifiability values when participants were made aware of how the lists were built and of the false-memory effect (i.e., with-explanation instructions). In the latter case, they were explicitly encouraged to search for the critical word. The first type of instructions made it possible to compare the normative data obtained in this study with those obtained in previous studies employing both FAS (e.g., Carneiro et al., 2009) and BAS (Carneiro et al., 2011) lists with only one critical word per list. Meanwhile, the second type of instructions provided new theme identifiability normative data, this time with warning instructions.

In summary, in this study, for the first time, we obtained theme identifiability norms in Spanish. Also for the first time, theme identifiability values were obtained in associative lists with three critical words per list. Furthermore, it was also the first time that theme identifiability values were obtained by using a warning instruction. In future research, these new data can help us understand the role of theme identifiability in the formation of false memories.

Method

Participants

Four hundred seven undergraduate students participated in this study. All of them were native Spanish speakers. Their ages ranged from 18 to 41 years (M = 20.09, SD = 2.87), and 80.59 % were women. The participants volunteered, received course credit for their participation, and signed written informed consent.

Materials

Sixty associative lists composed of six associates with BAS to the same three critical words were employed in this study. The lists were obtained from a previous Spanish DRM normative study (Beato & Díez, 2011; see the Appendix for all of the stimuli and their approximate English translations). For the application of the study, the lists were distributed in four groups of 15 lists, so that no associate or critical words were repeated within each set.

The associates within each list were arranged in decreasing order of their associative relationship to the critical words (i.e., BAS) and were digitalized with a male voice. Because the present lists included three critical words, BAS values were obtained (1) for each critical word and (2) for each DRM list. The BAS values for each critical lure word were determined by the sum of the associative strengths of its six associated words (range = 0.20–2.34, M = 0.83, SD = 0.47). Similarly, the associative strength value of each list (i.e., the BAS list strength) was calculated as the sum of the BAS values for the three critical words (range = 1.35–4.00, M = 2.50, SD = 0.52; Beato & Díez, 2011).

The materials used in this study covered a broad spectrum of the possible range of BAS values in the DRM paradigm. The highest BAS list strength value (4.00) represents the maximum that could be obtained in DRM lists with three critical words. This value is considerably higher than the lowest BAS list strength (1.35) presented in this study. This lower end of the spectrum is similar to that employed in previous DRM experiments conducted with both one (Knott, Dewhurst, & Howe, 2012) and three (Cadavid et al., 2012) critical words.

For the theme identifiability test, a response booklet was created, including a first page that collected information about the participant. As in previous studies (Carneiro et al., 2009), on each of the remaining pages were spaces to write three possible response words or themes per list (subsequently considered as the first, second, and third possible responses).

The normative study of theme identifiability in the associative word lists was conducted employing two different types of instructions. Specifically, all participants listened to the six-word lists, and approximately half of them were instructed to write the words that they thought best described the themes of each list (e.g., Carneiro et al., 2009; the without-explanation condition, hereafter). In the without-explanation condition, the instructions were:

You are going to listen to six-word lists. Your task consists of finding the words that you think best define the topics of the list. In other words, you must discover the possible themes of each list and write them down. To fill out the booklet, first you must listen carefully to all of the words on the list. Only when the presentation of the list is finished can you write down the three words you think best describe the themes of the list. I will let you know when the time to answer is finished, and when a new list starts.

The rest of the participants received a brief explanation about false-memory effect and how the lists had been built (the with-explanation condition, hereafter). In this condition, the instructions were as follows:

You are going to listen to six-word lists. These six words are simultaneously related to three other words that you are not going to hear. Your task consists of discovering which are those three related but unpresented words. In order to do so, you must take into account that the three words are related to every single word that was actually presented. For example, imagine you listen to the list premio [prize], ganar [win], copa [cup], triunfo [triumph], ganador [winner], and campeón [champion]. All these words are associated with PODIO [PODIUM], TROFEO [TROPHY], and VENCEDOR [VICTORIOUS]. These three last words would be the words that you must determine and write down in the booklet. This type of list has been built to study memory distortions, more specifically false memory. People often make the mistake of considering the related but unpresented words as if they were actually studied. For example, when participants study the previous list, they often falsely recall or recognize PODIO, TROFEO, and VENCEDOR as studied words. To fill out the booklet, first you must listen carefully to all the words of the list. Only when the presentation of the list is finished can you write down the three words you think are related to all of the six words on the list. I will let you know when the time to answer is finished, and when a new list starts.

In sum, in the with-explanation condition, as opposed to the without-explanation condition, participants were informed about the associative structure of the materials and how that type of list has been used to induce memory distortions. In addition, participants assigned to this condition were shown a sample DRM list with its related critical words, serving as an example of the types of words they were expected to produce. Then, they were instructed to figure out what the three critical words of each list were and to write them down. This manipulation aimed to trigger more elaborate and DRM-related strategies to identify the critical words.

Procedure

Participants were run in group sessions. After signing the consent form, they were informed that the purpose of the study was to analyze the relationships between different words. Then they received the assigned instructions for each condition—with explanation or without explanation, with the characteristics mentioned above. Subsequently, they listened to the word lists through the speakers. The order of presentation of the lists was random, and six different orders were created. The words were presented by a male voice at a rate of one word every 2 s. Following the presentation of each list, participants would be asked to write the three possible answers per list for approximately 30 s. The same procedure was repeated until the end of the 15 session lists.

Results and discussion

The Appendix includes the 60 six-word lists with their three critical words apiece, the BAS values per critical word, and the identifiability for each critical word in the without-explanation and with-explanation conditions. Intrusion rates and numbers of participants are specified per list.

Every time a participant was able to identify a critical word within each list, it was considered a “hit,” regardless of whether the word was written in first, second, or third place in the booklet. Therefore, each participant could have zero, one, two, or three hits per list. Every response that did not correspond to a critical word was considered an “intrusion.” There were very few blank responses in both the with- and without-explanation conditions (.03 and .06, respectively).

Therefore, theme identifiability was obtained for each of the 180 critical words (theme identifiability per critical word). Furthermore, the theme identifiability per critical word was averaged across the three words included in each of the lists, obtaining 60 values of theme identifiability per list. In addition, the intrusion rate was computed for each list.

Theme identifiability without explanation of the false-memory effect

Theme identifiability per list

Although all lists produced theme identifiability, a detailed analysis showed wide differences in the theme identifiabilities for each list (the mean percentages of the three critical words; range = 24 %–61 %, M = 41.00, SD = 25.20). Some lists yielded lower levels of theme identifiability (e.g., 24 % for the list CIUDAD [city], LUGAR [place], PUEBLO [village]: villa [town], municipio [municipality], localidad [locality], comarca [district], localización [location], región [region]) than did other lists (e.g., 61 % for both AMOR [love], NOVIO [boyfriend], PAREJA [couple]: pretendiente [suitor], cariño [fondness], relación [relationship], enamorado [in love], besar [to kiss], caricia [caress]; and CALOR [heat], FRÍO [cold], INVIERNO [winter]: estufa [stove], abrigo [coat], manta [blanket], bufanda [scarf], escalofrío [chill], gorro [bonnet]).

Theme identifiability per critical word

The theme identifiability for individual critical words was also highly variable (range = 0 %–96 %, M = 41.00, SD = 27.00). More precisely, none of the participants produced as a possible theme the critical words FRESA [strawberry] and ROSA [rose], whereas the critical word FIESTA [party] showed the highest theme identifiability (96 %).

These results are consistent with previous studies (e.g., Carneiro et al., 2009; Carneiro et al., 2011) that displayed high variability in theme identifiability values. For example, Carneiro et al. (2009), employing one-critical-word FAS lists, obtained identifiability rates that ranged from 1 % to 77 % (M = 36.42). Still greater was the variability found by Carneiro et al. (2011) using BAS lists (from 1 % to 92.9 %, M = 42.20).

Theme identifiability of any of the three critical words, among the first, second, or third possible responses

Hit responses to any of the critical words written in the first, second, or third possible response spaces differed considerably, F(2, 759) = 813.58, p < .001 (p < .001 in all post-hoc comparisons). Specifically, 55.5 % of hits occurred in the first possible response, 30 % appeared in the second possible response, and, finally, 14.5 % of correct theme identifications happened in the third possible response. As we can see, most of the theme identifiability happened in the first possible response (over 50 % of the time), but the other two possible responses also provided important data (almost 50 % of responses).

Theme identifiability with explanation of the false-memory effect

Theme identifiability per list

When participants received instructions with an explanation of the false-memory effect, we also found that all lists produced theme identifiability. Similarly, analysis of the data indicated high variability in the percentages of theme identifiability, with values ranging from 19 % (FÚTBOL [football], JUEGO [game], PELOTA [tennis ball]: balón [ball], deportes [sports], béisbol [baseball], baloncesto [basketball], bola [pellet], tenis [tennis]) to 68 % (AIRE [air], CIELO [sky], VOLAR [to fly]: globo [balloon], cometa [kite], avión [plane], helicóptero [helicopter], pájaro [bird], águila [eagle]) (M = 46.30, SD = 11.50).

Theme identifiability per critical word

The theme identifiability analysis for critical words also showed wide variability. Specifically, the critical words CURA [clergyman], CHOCOLATE [chocolate], CATARRO [catarrh], MONJE [monk], ROSA [rose], and TEMOR [awe] were never identified as themes, whereas the critical word FIESTA [party] showed the highest theme identifiability (100 %). On the whole, the mean theme identifiability for the 60 three-critical-word lists was 46.30 % (SD = 28.50). This value was considerably higher than those obtained in previous studies employing traditional instructions with FAS lists (e.g., Carneiro et al., 2009: 36 %).

Theme identifiability of any of the three critical words, among the first, second, or third possible responses

As in the data presented above, hit responses to any of the critical words in the first, second, or third possible response spaces differed considerably, F(2, 456) = 536.88, p < .001 (p < .001 in all post-hoc comparisons). Specifically, the first possible response provided the highest rate of hits (53.2 %), followed by the second (31.2 %) and third (15.6 %) possible responses.

Analysis of potential predictor variables of theme identifiability

As in previous studies, a high amount of variability was found in theme identifiability. With the aim of better understanding the nature of this variability, a multiple regression analysis was conducted on the theme identifiability data for each of the conditions. For each analysis, five variables (age of acquisition, BAS, FAS, word length, and written frequency) based on the characteristics of the critical words were entered simultaneously into the equation to predict theme identifiability. These variables have been explored in previous studies interested in variability phenomena in DRM lists (e.g., Carneiro et al., 2009; Roediger, Watson, et al., 2001). Both the age-of-acquisition and written frequency indexes were obtained from Alonso, Fernandez, and Díez’s (2015) study, whereas the BAS and FAS values were obtained from Fernandez, Díez, and Alonso’s (2009) database.

The regression analysis conducted on the theme identifiability data collected in the with-explanation condition revealed that the total model explained 33 % of the variance, F(5, 157) = 15.053, p < .001, adjusted R 2 = .30. As is shown in Table 1, the results indicated that BAS, word length, and written frequency were significantly related to theme identifiability, ps < .001. In the with-explanation condition, BAS appears to be the strongest predictor of theme identifiability, β = .530, sr = .512, t = 7.505.

Table 1 Summary of multiple regression analyses on theme identifiability (with- and without-explanation conditions), in which age of acquisition, backward associative strength (BAS), forward associative strength (FAS), word length, and written frequency were employed as predictors

Another multiple regression analysis was run, including the same five variables (age of acquisition, BAS, FAS, word length, and written frequency) and with theme identifiability in the without-explanation condition as the dependent variable. In this case, the total model explained 35 % of the variance, F(5, 157) = 15.928, p < .001, adjusted R 2 = .32. Again, only BAS, word length, and written frequency were significantly related to theme identifiability in the without-explanation condition, ps < .001 (see Table 1 for the regression coefficients and standard errors). As in the with-explanation condition, BAS was the strongest predictor of theme identifiability in the without-explanation condition, β = .555, sr = .512, t = 7.927.

Relationship between BAS, intrusion rate, and theme identifiability with and without explanation

In order to determine whether there was a relationship between BAS and theme identifiability with and without explanation of the false-memory effect, two correlational analyses were conducted.

Theme identifiability per critical word

The first correlational analysis evaluated the relationship between BAS and theme identifiability with and without explanation per critical word. The analysis included 180 values of BAS per critical word, 180 values of theme identifiability per critical word in the with-explanation condition, and 180 values of theme identifiability in the without-explanation condition. This analysis showed significant correlations between BAS and theme identifiability both with and without explanation, r = .52, p < .001; r = .54, p < .001, respectively. Furthermore, we also found a significant positive correlation between theme identifiability in the with- and without-explanation conditions per critical word, r = .91, p < .001.

Theme identifiability per list

In the second correlational analysis, we included BAS list strength, theme identifiability per list (in both the with- and without-explanation conditions), and intrusions per list in both conditions (words generated that were not critical words). This analysis included 60 values of BAS per list, 60 values of theme identifiability per list in the with-explanation condition, 60 values of theme identifiability in the without-explanation condition, 60 values of intrusions per list in the with-explanation condition, and 60 values of intrusions per list in the without-explanation condition. Again, we obtained significant correlations between BAS and theme identifiability with explanation, r = .33, p = .011, and between BAS and theme identifiability without explanation, r = .44, p < .001. Also, we found a significant correlation between theme identifiability per list in the with- and without-explanation conditions, r = .80, p < .001. Furthermore, we found a significant negative correlation between BAS list strength and intrusions obtained both with and without explanation of the false-memory effect, r = –.31, p = .015; r = –.37, p = .004, respectively. When we analyzed the relationship between theme identifiability and intrusions in the with- and without-explanation conditions, as expected, we found significant negative correlations between theme identifiability and intrusions with explanation, r = –.97, p < .001, and between theme identifiability and intrusions without explanation, r = –.91, p < .001. A significant correlation between intrusions with and without explanation also emerged, r = .73, p < .001.

These analyses suggest that, independently of the type of instructions (with or without explanation), the higher the theme identifiability, the higher the BAS, and the higher the theme identifiability, the lower the intrusions. Similar results had been found in previous studies with classical instructions (without explanation) and one-critical-word lists (e.g., Carneiro et al., 2011).

Theme identifiability and intrusion rates between conditions

To confirm that the new instructions used to obtain theme identifiability provided relevant information to the field, we further analyzed whether to include an explanation of the false-memory effect significantly modified theme identifiability. The independent-samples t test confirmed that participants showed higher theme identifiability when we explained the false-memory effect (M = 46, SD = 9.8) than without such explanation (M = 41, SD = 9.2), a statistically significant difference of 5.1 % (95 % confidence interval [CI], 3.2 to 7.0), t(405) = 5.327, p < .001, d = 0.545.

Another independent-samples t test was conducted to explore whether there were differences in the rates of intrusions provided by participants assigned to the with-explanation condition (M = 51.1, SD = 9.6) and the without-explanation condition (M = 52.8, SD = 11.7). The two types of instructions did not significantly affect the intrusions produced, showing a difference of –1.7 (95 % CI, –3.93 to 0.46), t(405) = –1.553, p = .061, d = –0.15.

Conclusions

The aim of this normative study was to empirically obtain theme identifiability values for 60 lists of six words in Spanish (e.g., escena [scene], estreno [premiere], escenario [stage], trama [plot], actor [actor], and ficción [fiction]) that were simultaneously associated with three critical words (e.g., CINE [cinema], PELÍCULA [film], and TEATRO [theatre]). Previous studies had found identifiability values for other languages, such as English (Neuschatz et al., 2003) or Portuguese (e.g., Carneiro et al., 2009); however, to our knowledge, the present study represents the first attempt to develop theme identifiability norms in Spanish. These norms could be useful in selecting DRM materials for experiments conducted with Spanish speakers, both monolingual and bilingual. Moreover, for the first time, we obtained theme identifiability values in associative word lists that were built by taking into account BAS and including multiple critical words. Furthermore, another important contribution of this work was that theme identifiability values were obtained using two different types of instructions. On the one hand, instructions like the ones previously used in other studies (i.e., instructions without explanation) were employed. On the other hand, theme identifiability was also obtained with instructions explaining how the lists were built and the false-memory effect (i.e., instructions with explanation). The first type of instructions made it possible to compare our normative data with those obtained in previous normative studies that had employed this type of instructions (e.g., Carneiro et al., 2009; Carneiro et al., 2011), whereas the second type of instructions provided, for the first time in the literature, theme identifiability normative data when participants were aware of the existence of critical words related to the associative lists. The latter type of data is particularly interesting for studies designed to examine the error-editing processes in false memory, and more specifically, disqualifying monitoring that employs the identify-to-reject strategy.

The results confirmed that it is possible to obtain theme identifiability, although it should also be noted that the lists showed wide differences in theme identifiability (without explanation, range = 24 %–61 %; with explanation, range = 19 %–68 %). A high variability was also found when considering theme identifiability per critical word (without explanation, range = 0 %–96 %; with explanation, range = 0 %–100 %). This fairly wide variability was also observed in previous theme identifiability studies, all of which had one critical word per list (e.g., Carneiro et al., 2009, range from 1 % to 77 %; Carneiro et al., 2011, range from 1 % to 92.9 %).

To better understand why this variability occurs, separate multiple regression analyses were conducted on the theme identifiability data in the with- and without-explanation conditions. The results indicated similar patterns of results in both conditions. Age of acquisition and FAS did not predict theme identifiability in any conditions, but BAS, word length, and written frequency were significantly related to theme identifiability in both the with- and without-explanation conditions. Specifically, BAS was the strongest predictor of theme identifiability.

In addition, although in both conditions the potential predicting variables showed similar patterns of results, we observed higher theme identifiability in the with-explanation than in the without-explanation condition. Therefore, this disparity in theme identifiability does not seem to be a consequence of differential effects of the critical-word characteristics included in this study (i.e., age of acquisition, BAS, FAS, word length, and written frequency). Instead, the type of instructions seems to engage different error-editing processes in both conditions. Specifically, the instructions used in the with-explanation condition seem to be appropriate to boost the performance in deliberated error-editing processes, obtaining a higher theme identifiability. Thus, we were able to confirm that the new instructions, used for the very first time to obtain theme identifiability, provided relevant information to the field.

In summary, the increased identifiability when the false-memory effect is explained suggests that this is an appropriate way to obtain identifiability indexes and that it can be used in future investigations. Specifically, these new theme identifiability values will be very useful to understand the effect that certain variables (e.g., warnings) might have on false memories, opening a whole new range of experimental possibilities. Moreover, the results of the present normative study can be employed in future research aimed at examining the relationship between identifiability and false memories and, more specifically, at analyzing to what extent the identify-to-reject strategy is decisive in the production of accurate memories.