Academic publications
Academic Publications
An Inventory of Problems–29 (IOP–29) study investigating feigned schizophrenia and random responding in a British community sample
Compared to other Western countries, malingering research is still relatively scarce in the United Kingdom, partly because only a few brief and easy-to-use symptom validity tests (SVTs) have been validated for use with British test-takers. This online study examined the validity of the Inventory of Problems–29 (IOP–29) in detecting feigned schizophrenia and random responding in 151 British volunteers. Each participant took three IOP–29 test administrations: (a) responding honestly; (b) pretending to suffer from schizophrenia; and (c) responding at random. Additionally, they also responded to a schizotypy measure (O-LIFE) under standard instruction. The IOP–29’s feigning scale (FDS) showed excellent validity in discriminating honest responding from feigned schizophrenia (AUC = .99), and its classification accuracy was not significantly affected by the presence of schizotypal traits. Additionally, a recently introduced IOP–29 scale aimed at detecting random responding (RRS) demonstrated very promising results.
(From the journal abstract)
Winters, C. L., Giromini, L., Crawford, T. J., Ales, F., Viglione, D. J., & Warmelink, L. (2020). An Inventory of Problems–29 (IOP–29) study investigating feigned schizophrenia and random responding in a British community sample. Psychiatry, Psychology and Law, 1–20.
Quantifying smartphone “use”: Choice of measurement impacts relationships between “usage” and health
Problematic smartphone scales and duration estimates of use dominate research that considers the impact of smartphones on people and society. However, issues with conceptualization and subsequent measurement can obscure genuine associations between technology use and health. Here, we consider whether different ways of measuring “smartphone use,” notably through problematic smartphone use (PSU) scales, subjective estimates, or objective logs, lead to contrasting associations between mental and physical health. Across two samples including iPhone (n = 199) and Android (n = 46) users, we observed that measuring smartphone interactions with PSU scales produced larger associations between mental health when compared with subjective estimates or objective logs. Notably, the size of the relationship was fourfold in Study 1, and almost three times as large in Study 2, when relying on a PSU scale that measured smartphone “addiction” instead of objective use. Further, in regression models, only smartphone “addiction” scores predicted mental health outcomes, whereas objective logs or estimates were not significant predictors. We conclude that addressing people’s appraisals including worries about their technology usage is likely to have greater mental health benefits than reducing their overall smartphone use. Reducing general smartphone use should therefore not be a priority for public health interventions at this time.
(From the journal abstract)
Shaw, H., Ellis, D. A., Geyer, K., Davidson, B. I., Ziegler, F. V., & Smith, A. (2020). Quantifying smartphone “use”: Choice of measurement impacts relationships between “usage” and health. Technology, Mind, and Behavior, 1(2).
Understanding the Psychological Process of Avoidance-Based Self-Regulation on Facebook
In relation to social network sites, prior research has evidenced behaviors (e.g., censoring) enacted by individuals used to avoid projecting an undesired image to their online audiences. However, no work directly examines the psychological process underpinning such behavior. Drawing upon the theory of self-focused attention and related literature, a model is proposed to fill this research gap. Two studies examine the process whereby public self-awareness (stimulated by engaging with Facebook) leads to a self-comparison with audience expectations and, if discrepant, an increase in social anxiety, which results in the intention to perform avoidance-based self-regulation. By finding support for this process, this research contributes an extended understanding of the psychological factors leading to avoidance-based regulation when online selves are subject to surveillance.
(From the journal abstract)
Marder, B., Houghton, D., Joinson, A., Shankar, A., & Bull, E. (2016). Understanding the Psychological Process of Avoidance-Based Self-Regulation on Facebook. Cyberpsychology, Behavior, and Social Networking, 19(5), 321–327.
The development of structured guidelines for assessing risk in extremist offenders
This paper describes a methodology developed by the National Offender Management Service (NOMS) to assess risk and needs in convicted extremist offenders in England and Wales, and for the assessment of those offenders for whom there are credible concerns about their potential to commit such offences. A methodology was needed to provide an empirically-based systematic and transparent approach to the assessment of risk to inform proportionate risk management; increase understanding and confidence amongst front-line staff and decision-makers, and facilitate effective and targeted intervention. It outlines how the methodology was developed, the nature of the assessment, its theoretical underpinnings, the challenges faced and how these have been addressed. Learning from casework with offenders, from government commissioned research and the wider literature is presented in the form of 22 general factors (with an opportunity to capture additional idiosyncratic factors, i.e., 22+) that contribute to an individual formulation of risk and needs that bears on three dimensions of engagement, intent and capability. The relationship of this methodology, the Extremism Risk Guidelines (ERG 22+) with comparable guidelines, the Violent Extremism Risk Assessment 2 (VERA version 2) and the Multi-Level Guidelines (MLG), is also discussed. This paper also considers the ERG’s utility, validity and limitations.
(From the journal abstract)
Lloyd, M., & Dean, C. (2015). The development of structured guidelines for assessing risk in extremist offenders. Journal of Threat Assessment and Management, 2(1), 40–52.
Measurement practices exacerbate the generalizability crisis: Novel digital measures can help
Psychology’s tendency to focus on confirmatory analyses before ensuring constructs are clearly defined and accurately measured is exacerbating the generalizability crisis. Our growing use of digital behaviors as predictors has revealed the fragility of subjective measures and the latent constructs they scaffold. However, new technologies can provide opportunities to improve conceptualizations, theories, and measurement practices.
(From the journal abstract)
Davidson, B. I., Ellis, D. A., Stachl, C., Taylor, P., & Joinson, A. (2021). Measurement practices exacerbate the generalizability crisis: Novel digital measures can help [Preprint]. PsyArXiv.
To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit
We present a new signal for detecting deception: full body motion. Previous work on detecting deception from body movement has relied either on human judges or on specific gestures (such as fidgeting or gaze aversion) that are coded by humans. While this research has helped to build the foundation of the field, results are often characterized by inconsistent and contradictory findings, with small-stakes lies under lab conditions detected at rates little better than guessing. We examine whether a full body motion capture suit, which records the position, velocity, and orientation of 23 points in the subject’s body, could yield a better signal of deception. Interviewees of South Asian (n = 60) or White British culture (n = 30) were required to either tell the truth or lie about two experienced tasks while being interviewed by somebody from their own (n = 60) or different culture (n = 30). We discovered that full body motion–the sum of joint displacements–was indicative of lying 74.4% of the time. Further analyses indicated that including individual limb data in our full body motion measurements can increase its discriminatory power to 82.2%. Furthermore, movement was guilt- and penitential-related, and occurred independently of anxiety, cognitive load, and cultural background. It appears that full body motion can be an objective nonverbal indicator of deceit, showing that lying does not cause people to freeze.
(From the journal abstract)
Zee, S. van der, Poppe, R., Taylor, P. J., & Anderson, R. (2019). To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit. PLOS ONE, 14(4), e0215000.
Analysing openly recorded preinterview deliberations to detect deceit in collective interviews
Sham marriages occur frequently, and to detect them, partners are sometimes interviewed together. We examined an innovative method to detect deceit in such interviews. Fifty-three pairs of interviewees, either friends (truth tellers) or pretended to be friends (liars), were interviewed about their friendship. Just before the interview, they received the questions that would be asked in the interview and were invited to prepare the answers. We told them that these preinterview deliberations would be recorded. Based on the transcripts, we analysed cues to truthfulness (cues expected to be expressed more by truth tellers) and cues to deceit (cues expected to be expressed more by liars). Truth tellers and liars differed from each other, particularly regarding expressing cues to truthfulness. Preinterview deliberations that are recorded with awareness of the interviewees can be used for lie detection purposes. We discuss further venues in this new line of research.
(From the journal abstract)
Vrij, A., Jupe, L. M., Leal, S., Vernham, Z., & Nahari, G. (2020). Analysing openly recorded preinterview deliberations to detect deceit in collective interviews. Applied Cognitive Psychology, 34(1), 132–141.
Who said what and when? A timeline approach to eliciting information and intelligence about conversations, plots, and plans
The verbal content of interactions (what was said and who said what) can be important as evidence and intelligence information. Across 3 empirical studies, we examined memory for details of an overheard (Experiment 1) or witnessed (Experiments 2 and 3) conversation using a timeline technique adapted for the reporting of conversations between multiple speakers. Although participants in all conditions received the same general instructions, participants assigned to timeline reporting format reported more verbatim information and made fewer sequencing errors than those using a free recall format. In Experiments 2 and 3, using an extended version of the technique, participants using the timeline reporting format also reported more correct speaker attributions and provided more information about the individuals involved, without compromising overall accuracy rates. With a large effect size across experiments (total N = 134), these findings suggest that timeline reporting formats facilitate the reporting of episodic memories and benefit the reporting of conversations.
(From the journal abstract)
Hope, L., Gabbert, F., Kinninger, M., Kontogianni, F., Bracey, A., & Hanger, A. (2019). Who said what and when? A timeline approach to eliciting information and intelligence about conversations, plots, and plans. Law and Human Behavior, 43(3), 263–277.
Memory and the operational witness: Police officer recall of firearms encounters as a function of active response role
Investigations after critical events often depend on accurate and detailed recall accounts from operational witnesses (e.g., law enforcement officers, military personnel, and emergency responders). However, the challenging, and often stressful, nature of such events, together with the cognitive demands imposed on operational witnesses as a function of their active role, may impair subsequent recall. We compared the recall performance of operational active witnesses with that of nonoperational observer witnesses for a challenging simulated scenario involving an armed perpetrator. Seventy-six police officers participated in pairs. In each pair, 1 officer (active witness) was armed and instructed to respond to the scenario as they would in an operational setting, while the other (observer witness) was instructed to simply observe the scenario. All officers then completed free reports and responded to closed questions. Active witnesses showed a pattern of heart rate activity consistent with an increased stress response during the event, and subsequently reported significantly fewer correct details about the critical phase of the scenario. The level of stress experienced during the scenario mediated the effect of officer role on memory performance. Across the sample, almost one-fifth of officers reported that the perpetrator had pointed a weapon at them although the weapon had remained in the waistband of the perpetrator’s trousers throughout the critical phase of the encounter. These findings highlight the need for investigator awareness of both the impact of operational involvement and stress-related effects on memory for ostensibly salient details, and reflect the importance of careful and ethical information elicitation techniques.
(From the journal abstract)
Hope, L., Blocksidge, D., Gabbert, F., Sauer, J. D., Lewinski, W., Mirashi, A., & Atuk, E. (2016). Memory and the operational witness: Police officer recall of firearms encounters as a function of active response role. Law and Human Behavior, 40(1), 23–35.
The Psychology of Criminal Investigation: From Theory to Practice
The contribution of psychological research to the prevention of miscarriages of justice and the development of effective investigative techniques is now established to a point where law enforcement agencies in numerous countries either employ psychologists as part of their staff, or work in cooperation with academic institutions. The application of psychology to investigation is particularly effective when academics and practitioners work together. This book brings together leading experts to discuss the application of psychology to criminal investigation.
This book offers an overview of models of investigation from a psychological and practical view point, covering topics such as investigative decision making, the presentation of evidence, witness testimony, the detection of deception, interviewing suspects and evidence-based police training. It is essential reading for students, researchers and practitioners engaged with police practice, investigation and forensic psychology.
(From the journal abstract)
Griffiths, A., & Milne, R. (Eds.). (2018). The Psychology of Criminal Investigation: From Theory to Practice (1st ed.). Routledge.
Development of the Reporting Information about Networks and Groups (RING) task: a method for eliciting information from memory about associates, groups, and networks
Eliciting detailed and comprehensive information about the structure, organisation and relationships between individuals involved in organised crime gangs, terrorist cells and networks is a challenge in investigations and debriefings. Drawing on memory theory, the purpose of this paper is to develop and test the Reporting Information about Networks and Groups (RING) task, using an innovative piece of information elicitation software.
Using an experimental methodology analogous to an intelligence gathering context, participants (n=124) were asked to generate a visual representation of the “network” of individuals attending a recent family event using the RING task.
All participants successfully generated visual representations of the relationships between people attending a remembered social event. The groups or networks represented in the RING task output diagrams also reflected effective use of the software functionality with respect to “describing” the nature of the relationships between individuals.
The authors succeeded in establishing the usability of the RING task software for reporting detailed information about groups of individuals and the relationships between those individuals in a visual format. A number of important limitations and issues for future research to consider are examined.
The RING task is an innovative development to support the elicitation of targeted information about networks of people and the relationships between them. Given the importance of understanding human networks in order to disrupt criminal activity, the RING task may contribute to intelligence gathering and the investigation of organised crime gangs and terrorist cells and networks.
(From the journal abstract)
Hope, L, Kontogianni, F, Geyer, K & Thomas, WD 2019, 'Development of the Reporting Information about Networks and Groups (RING) task: a method for eliciting information from memory about associates, groups, and networks', The Journal of Forensic Practice. https://doi.org/10.1108/JFP-04-2019-0011
Staying Engaged in Terrorism: Narrative Accounts of Sustaining Participation in Violent Extremism
Research exploring radicalization pathways and how and why people become involved in terrorism has expanded since the 9/11 attacks. Likewise, over the last decade research exploring de-radicalization and desistence from terrorism has grown and expanded in an attempt to promote exit from extremist or terror groups.
However, research studies on how individuals sustain engagement in terrorism and their involvement with extremist organizations, often in the face of great adversity, are absent from the body of research.
To address this scarcity of research this study analyzed accounts of engagement in violent extremism produced by Northern Irish loyalist and republican paramilitaries in order to explore how their paramilitary lifestyle, perpetration of acts of political violence and the pressure from countering threats posed by rival groups, and the State security forces impacted on them.
The analysis utilized a hybrid of thematic analysis and interpretative phenomenological analysis (IPA). The themes raised through the analysis reflected the psychological, social and economic hardship associated with this lifestyle. The narrative accounts also illustrated psychological changes associated to engagement in violence and from insulation within tightly knit extremist groups.
As most of the participants faced incarceration during their paramilitary careers, themes also reflected on the impact imprisonment had on them. The themes explored factors that sustained their involvement, including the role of identity development and identity fusion in sustaining their extremism, the impact of insulated group membership, feelings of efficacy, dehumanization processes, community support, and beliefs in the utility of violence.
(From the journal abstract)
Neil Ferguson & James W. McAuley, 2020. Staying engaged in terrorism: narrative accounts of sustaining participation in violent extremism. Frontiers in psychology.
https://doi.org/10.3389/fpsyg.2020.01338
Source Handler telephone interactions with covert human intelligence sources: An exploration of question types and intelligence yield
Law enforcement agencies gather intelligence in order to prevent criminal activity and pursue criminals. In the context of human intelligence collection, intelligence elicitation relies heavily upon the deployment of appropriate evidence‐based interviewing techniques (a topic rarely covered in the extant research literature).
The present research gained unprecedented access to audio recorded telephone interactions (N = 105) between Source Handlers and Covert Human Intelligence Sources (CHIS) from England and Wales. The research explored the mean use of various question types per interaction and across all questions asked in the sample, as well as comparing the intelligence yield for appropriate and inappropriate questions.
Source Handlers were found to utilise vastly more appropriate questions than inappropriate questions, though they rarely used open‐ended questions. Across the total interactions, appropriate questions (by far) were associated with the gathering of much of the total intelligence yield. Implications for practise are discussed.
(From the journal abstract)
Jordan Nunan, Ian Stanier, Rebecca Milne, Andrea Shawyer and Dave Walsh, 2020. Source Handler telephone interactions with covert human intelligence sources: An exploration of question types and intelligence yield. Applied Cognitive Psychology.
https://doi.org/10.1002/acp.3726
Community reporting on violent extremism by 'intimates': emergent findings from international evidence
To promote early intervention strategies, Countering/Preventing Violent Extremism (C/PVE) policies internationally seek to encourage community reporting by 'intimates' about someone close to them engaging in terrorist planning.
Yet historically, we have scant evidence around what either helps or hinders intimates to share concerns with authorities. We address that deficit here through a state-of-the-art assessment of what we currently know about effective related C/PVE approaches to community reporting, based on key findings from a groundbreaking Australian study and its UK replication.
The consistency of qualitative findings from nearly 100 respondents offers new paradigms for policy and practice.
(From the journal abstract)
Paul Thomas, Michele Grossman, Kris Christmann, and Shamim Miah, 2020. Community reporting on violent extremism by 'intimates': emergent findings from international evidence. Critical Studies on Terrorism. https://doi.org/10.1080/17539153.2020.1791389
How is Extraversion related to Social Media Use? A Literature Review
With nearly 3.5 billion people now using some form of social media, understanding its relationship with personality has become a crucial focus of psychological research.
As such, research linking personality traits to social media behaviour has proliferated in recent years, resulting in a disparate set of literature that is rarely synthesised. To address this, we performed a systematic search that identified 182 studies relating extraversion to social media behaviour.
Our findings highlight that extraversion and social media are studied across six areas: 1) content creation, 2) content reaction, 3) user profile characteristics, 4) patterns of use, 5) perceptions of social media, and 6) aggression, trolling, and excessive use.
We compare these findings to offline behaviour and identify parallels such as extraverts' desire for social attention and their tendency to display positivity. Extraverts are also likely to use social media, spend more time using one or more social media platforms, and regularly create content.
We discuss how this evidence will support the future development and design of social media platforms, and its application across a variety of disciplines such as marketing and human-computer interaction.
(From the journal abstract)
Thomas Bowden-Green, Joanne Hinds & Adam Joinson, 2020. How is extraversion related to social media use? A literature review. Personality and Individual Differences. https://doi.org/10.1016/j.paid.2020.110040
ISIS Propaganda: A Full-Spectrum Extremist Message
This book offers a comprehensive overview and analysis of the Islamic State's use of propaganda.
Combining a range of different theoretical perspectives from across the social sciences, and using rigorous methods, the authors trace the origins of the Islamic State's message, laying bare the strategic logic guiding its evolution, examining each of its multi-media components, and showing how these elements work together to radicalize audiences' worldviews.
This volume highlights the challenges that this sort of "full-spectrum propaganda" raises for counter terrorism forces. It is not only a one-stop resource for any analyst of IS and Salafi-jihadism, but also a rich contribution to the study of text and visual propaganda, radicalization and political violence, and international security.
(From the book abstract)
Stephane J. Baele, Katharine A. Boyd, and Travis G. Coan. 2020. ‘ISIS Propaganda: A Full-Spectrum Extremist Message’. Oxford, New York: Oxford University Press. ISBN: 9780190932459
When and How are Lies Told? And the Role of Culture and Intentions in Intelligence-Gathering Interviews
Purpose
Lie‐tellers tend to tell embedded lies within interviews. In the context of intelligence‐gathering interviews, human sources may disclose information about multiple events, some of which may be false. In two studies, we examined when lie‐tellers from low‐ and high‐context cultures start reporting false events in interviews and to what extent they provide a similar amount of detail for the false and truthful events. Study 1 focused on lie‐tellers' intentions, and Study 2 focused on their actual responses.
Methods
Participants were asked to think of one false event and three truthful events. Study 1 (N = 100) was an online study in which participants responded to a questionnaire about where they would position the false event when interviewed and they rated the amount of detail they would provide for the events. Study 2 (N = 126) was an experimental study that involved interviewing participants about the events.
Results
Although there was no clear preference for lie position, participants seemed to report the false event at the end rather than at the beginning of the interview. Also, participants provided a similar amount of detail across events. Results on intentions (Study 1) partially overlapped with results on actual responses (Study 2). No differences emerged between low‐ and high‐context cultures.
Conclusions
This research is a first step towards understanding verbal cues that assist investigative practitioners in saving their cognitive and time resources when detecting deception regardless of interviewees' cultural background. More research on similar cues is encouraged.
(From the journal abstract)
Haneen Deeb, Aldert Vrij, Sharon Leal, Brianna L. Verigin & Steven M. Kleinman, 2020. When and how are lies told? And the role of culture and intentions in intelligence‐gathering interviews. Legal and Criminological Psychology. https://doi.org/10.1111/lcrp.12171
“Tell me more about this…”: An examination of the efficacy of follow-up open questions following an initial account
In information gathering interviews, follow‐up questions are asked to clarify and extend initial witness accounts. Across two experiments, we examined the efficacy of open‐ended questions following an account about a multi‐perpetrator event.
In Experiment 1, 50 mock‐witnesses used the timeline technique or a free recall format to provide an initial account. Although follow‐up questions elicited new information (18–22% of the total output) across conditions, the response accuracy (60%) was significantly lower than that of the initial account (83%). In Experiment 2 (N = 60), half of the participants received pre‐questioning instructions to monitor accuracy when responding to follow‐up questions. New information was reported (21–22% of the total output) across conditions, but despite using pre‐questioning instructions, response accuracy (75%) was again lower than the spontaneously reported information (87.5%).
Follow‐up open‐ended questions prompt additional reporting; however, practitioners should be cautious to corroborate the accuracy of new reported details.
(From the journal abstract)
Feni Kontogianni, Lorraine Hope, Paul Taylor, Aldert Vrij & Fiona Gabbert, 2020. “Tell me more about this…”: An examination of the efficacy of follow‐up open questions following an initial account. Applied Cognitive Psychology. https://doi.org/10.1002/acp.3675
Techniques of disinformation: Constructing and communicating “soft facts” after terrorism
Informed by social media data collected following four terror attacks in the UK in 2017, this article delineates a series of “techniques of disinformation” used by different actors to try and influence how the events were publicly defined and understood.
By studying the causes and consequences of misleading information following terror attacks, the article contributes empirically to the neglected topic of social reactions to terrorism. It also advances scholarship on the workings of disinforming communications, by focusing on a domain other than political elections, which has been the empirical focus for most studies of disinformation to date.
Theoretically, the analysis is framed by drawing an analogy with Gresham Sykes and David Matza’s (1957) account of the role of “techniques of neutralization” originally published in the American Sociological Review. The connection being that where they studied deviant behaviour, a similar analytic lens can usefully be applied to disinformation cast as “deviant” information.
(From the journal abstract)
Martin Innes, 2019. Techniques of disinformation: Constructing and communicating “soft facts” after terrorism. British Journal of Sociology. https ://doi.org/10.1111/1468-4446.12735
Detecting smugglers: Identifying strategies and behaviours in individuals in possession of illicit objects
Behaviour detection officers' task is to spot potential criminals in public spaces, but scientific research concerning what to look for is scarce. In two experiments, 52 (Experiment 1A) and 60 (Experiment 2A) participants carried out a mission involving a ferry crossing. Half were asked to smuggle an object; the other half were non‐smugglers. In Experiment 2A, two confederates appeared to approach as if looking for someone on the ferry.
Smugglers, more than non‐smugglers, reported afterwards to have felt nervous, self‐conscious, and conspicuous and to attempt behavioural control during the ferry crossing. The secretly videotaped ferry crossings were shown to 104 (Experiment 1B) and 120 (Experiment 2B) observers, tasked to identify the smugglers. Although they reported paying attention mostly to signs of nervousness, lie detection accuracy rate was poor (48% in Experiment 1 and 39.2% in Experiment 2) because their perceptions of nervousness did not match the experiences of nervousness reported by the (non)smugglers.
(From the journal abstract)
Samantha Mann, Haneen Deeb, Aldert Vrij, Lorraine Hope & Lavinia Pontigia, 2019. Detecting Smugglers: Identifying strategies and behaviours in individuals in possession of illicit objects. Applied Cognitive Psychology. https://doi.org/10.1002/acp.3622
Fading lies: applying the verifiability approach after a period of delay
We tested the utility of applying the Verifiability Approach (VA) to witness statements after a period of delay. The delay factor is important to consider because interviewees are often not interviewed directly after witnessing an event.
A total of 64 liars partook in a mock crime and then lied about it during an interview, seven days later. Truth tellers (n = 78) partook in activities of their own choosing and told the truth about it during their interview, seven days later.
All participants were split into three groups, which provided three different verbal instructions relating to the interviewer’s aim to assess the statements for the inclusion of verifiable information: no information protocol (IP) (n = 43), the standard-IP (n = 46) and an enhanced-IP (n = 53). In addition to the standard VA approach of analysing verifiable details, we further examined verifiable witness information and verifiable digital information and made a distinction between verifiable details and verifiable sources.
We found that truth tellers reported more verifiable digital details and sources than liars.
(From the journal abstract)
Louise Jupe, Aldert Vrij, Sharon Leal & Galit Nahari, 2019. Fading lies: applying the verifiability approach after a period of delay. Psychology, Crime & Law. https://doi.org/10.1080/1068316X.2019.1669594
“Language of Lies”: Urgent Issues and Prospects in Verbal Lie Detection Research
Since its introduction into the field of deception detection, the verbal channel has become a rapidly growing area of research. The basic assumption is that liars differ from truth tellers in their verbal behaviour, making it possible to classify them by inspecting their verbal accounts. However, as noted in conferences and in private communication between researchers, the field of verbal lie detection faces several challenges that merit focused attention. The first author therefore proposed a workshop with the mission of promoting solutions for urgent issues in the field. Nine researchers and three practitioners with experience in credibility assessments gathered for 3 days of discussion at Bar‐Ilan University (Israel) in the first international verbal lie detection workshop. The primary session of the workshop took place the morning of the first day. In this session, each of the participants had up to 10 min to deliver a brief message, using just one slide. Researchers were asked to answer the question: ‘In your view, what is the most urgent, unsolved question/issue in verbal lie detection?’ Similarly, practitioners were asked: ‘As a practitioner, what question/issue do you wish verbal lie detection research would address?’ The issues raised served as the basis for the discussions that were held throughout the workshop. The current paper first presents the urgent, unsolved issues raised by the workshop group members in the main session, followed by a message to researchers in the field, designed to deliver the insights, decisions, and conclusions resulting from the discussions.
(From the journal abstract)
Galit Nahari, Tzachi Ashkenazi, Ronald P. Fisher, Pär-Anders Granhag, Irit Hershkowitz, Jaume Masip, Ewout H. Meijer, et al. 2019. ‘“Language of Lies”: Urgent Issues and Prospects in Verbal Lie Detection Research’. Legal and Criminological Psychology, 24 (1): 1–23. https://doi.org/10.1111/lcrp.12148.
Vulnerable Witnesses: The Investigation Stage’. In Vulnerable People and the Criminal Justice System: A Guide to Law and Practice
This chapter covers one of a number issues in the book Vulnerable People and the Criminal Justice System: A Guide to Law and Practice. The following description is from the publisher's website.
Over the last 25 years there has been a growing recognition that the way in which cases involving the vulnerable are investigated, charged and tried needs to change. Successive judgments of the Court of Appeal have re-enforced the message that advocates and judges have a duty to ensure vulnerable witnesses and defendants are treated fairly and allowed to participate effectively in the process.
How do practitioners recognise who is or may be vulnerable? How should that person be interviewed? What account should police and the CPS take of a defendant's vulnerabilities? How should advocates adjust their questioning of vulnerable witnesses and defendants whilst still complying with their duties to their client? How should judges manage a trial to ensure the effective participation of vulnerable witnesses and defendants? Vulnerable People and the Criminal Justice System, written by leading experts in the field, gathers together for the first time answers to these questions and many more. It provides a practical, informative and thought-provoking guide to recognising, assessing and responding to vulnerability in witnesses and defendants at each stage of the criminal process.
Backed by authoritative research and first-hand experience and drawing on recent case law, this book enables practitioners to deal with cases involving vulnerable people with calmness, authority, and confidence.
(From the book abstract)
Rebecca Milne, and Kevin Smith. 2017. ‘Vulnerable Witnesses: The Investigation Stage’. In Vulnerable People and the Criminal Justice System: A Guide to Law and Practice, edited by Penny Cooper and Heather Norton. Oxford, New York: Oxford University Press. https://global.oup.com/academic/product/vulnerable-people-and-the-criminal-justice-system-9780198801115.
Using the Model Statement to Elicit Verbal Differences Between Truth Tellers and Liars: The Benefit of Examining Core and Peripheral Details
Research has shown that a model statement elicits more information during an interview and that truth tellers and liars report a similar amount of extra information. We hypothesised that veracity differences would arise if the total amount of information would be split up into core details and peripheral details. A total of 119 truth tellers and liars reported a stand-out event that they had experienced in the last two years. Truth tellers had actually experienced the event and liars made up a story. Half of the participants were given a model statement during the interview. After exposure to a model statement, truth tellers and liars reported a similar amount of extra core information, but liars reported significantly more peripheral information. The variable details becomes an indicator of deceit in a model statement interview protocol as long as a distinction is made between core and peripheral details.
(From the journal abstract)
Sharon Leal, Aldert Vrij, Haneen Deeb, and Louise Jupe. 2018. ‘Using the Model Statement to Elicit Verbal Differences Between Truth Tellers and Liars: The Benefit of Examining Core and Peripheral Details’. Journal of Applied Research in Memory and Cognition, 7 (4): 610–17. https://doi.org/10.1016/j.jarmac.2018.07.001.
Extending the Verifiability Approach Framework: The Effect of Initial Questioning
The verifiability approach (VA) is a lie‐detection tool that examines reported checkable details. Across two studies, we attempt to exploit liar's preferred strategy of repeating information by examining the effect of questioning adult interviewees before the VA. In Study 1, truth tellers (n = 34) and liars (n = 33) were randomly assigned to either an initial open or closed questioning condition. After initial questioning, participants were interviewed using the VA. In Study 2, truth tellers (n = 48) and liars (n = 48) were interviewed twice, with half of each veracity group randomly assigned to either the Information Protocol (an instruction describing the importance of reporting verifiable details) or control condition. Only truth tellers revised their initial statement to include verifiable detail. This pattern was most pronounced when initial questioning was open (Study 1) and when the information protocol was employed (Study 2). Thus, liar's preferred strategy of maintaining consistency between statements appears exploitable using the VA.
(From the journal abstract)
Adam Charles Harvey, Aldert Vrij, George Sarikas, Sharon Leal, Louise Jupe, and Galit Nahari. 2018. ‘Extending the Verifiability Approach Framework: The Effect of Initial Questioning’. Applied Cognitive Psychology, 32 (6): 787–804. https://doi.org/10.1002/acp.3465.
Terrorist Decision Making in the Context of Risk, Attack Planning, and Attack Commission
Terrorists from a wide array of ideological influences and organizational structures consider security and risk on a continuous and rational basis. The rationality of terrorism has been long noted of course but studies tended to focus on organizational reasoning behind the strategic turn toward violence. A more recent shift within the literature has examined rational behaviors that underpin the actual tactical commission of a terrorist offense. This article is interested in answering the following questions: What does the cost–benefit decision look like on a single operation? What does the planning process look like? How do terrorists choose between discrete targets? What emotions are felt during the planning and operational phases? What environmental cues are utilized in the decision-making process? Fortunately, much insight is available from the wider criminological literature where studies often provide offender-oriented accounts of the crime commission process. We hypothesize similar factors take place in terrorist decision making and search for evidence within a body of terrorist autobiographies.
(From the journal abstract)
Paul Gill, Zoe Marchment, Emily Corner, and Noémie Bouhana. 2018. ‘Terrorist Decision Making in the Context of Risk, Attack Planning, and Attack Commission’. Studies in Conflict & Terrorism: https://doi.org/10.1080/1057610X.2018.1445501.
‘Russia’ In Routledge Handbook of Terrorism and Counterterrorism
This chapter on 'Russia' is one of a series of case studies in the Routledge Handbook of Terrorism and Counterterrorism. The following description is from the publisher's website.
This new Handbook provides a comprehensive, state-of-the-art overview of current knowledge and debates on terrorism and counterterrorism, as well as providing a benchmark for future research.
The attacks of 9/11 and the ‘global war on terror’ and its various legacies have dominated international politics in the opening decades of the 21st century. In response to the dramatic rise of terrorism, within the public eye and the academic world, the need for an accessible and comprehensive overview of these controversial issues remains profound. The Routledge Handbook of Terrorism and Counterterrorism seeks to fulfil this need. The volume is divided into two key parts:
Part I: Terrorism: This section provides an overview of terrorism, covering the history of terrorism, its causes and characteristics, major tactics and strategies, major trends and critical contemporary issues such as radicalisation and cyber-terrorism. It concludes with a series of detailed case studies, including the IRA, Hamas and Islamic State.
Part II: Counterterrorism: This part draws on the main themes and critical issues surrounding counterterrorism. It covers the major strategies and policies, key events and trends and the impact and effectiveness of different approaches. This section also concludes with a series of case studies focused on major counterterrorism campaigns.
This book will be of great interest to all students of terrorism and counterterrorism, political violence, counter-insurgency, criminology, war and conflict studies, security studies and IR more generally.
(From the book abstract)
Cerwyn Moore. 2019. ‘Russia’. In Routledge Handbook of Terrorism and Counterterrorism, edited by Andrew Silke, 1st Edition, 604–14. Abingdon: Routledge. https://www.routledge.com/Routledge-Handbook-of-Terrorism-and-Counterterrorism-1st-Edition/Silke/p/book/9781138819085.
Violent Extremism: A Comparison of Approaches to Assessing and Managing Risk
The task of assessing and managing risk of violence has evolved considerably in the last 25 years, and the field of violent extremism has the potential to stand on the shoulders of the giants of this time. Therefore, the objective of this study was to identify good practice in the risk field and to apply that to the specific area of risk in relation to violent extremism – in order that developments here accord to highest standards of practice achieved so far elsewhere.
Method and Results
We begin by addressing the essential requirement to define the task of assessing and managing the risk of violent extremism – What is its purpose and parameters, who are its practitioners, in what contexts is this activity delivered, and how might any such context both facilitate and hinder the objectives of the task? Next, we map the terrain – What guidance is already available to assist practitioners in their work of understanding and managing the risk of violent extremism, and by what standards may we judge the quality of this and future guidance in the contexts in which is it applied? Finally, we explore options for the development of the field in terms of the empirical basis upon which the risks presented by individuals and the organizations to which they may affiliate are assessed, understood, and managed.
Conclusions
Recommendations are proposed in relation to each of these three areas of concern with a view to supporting the rapid and credible advancement of this growing and vital area of endeavour.
(From the journal abstract)
Caroline Logan and Monica Lloyd. 2019. ‘Violent Extremism: A Comparison of Approaches to Assessing and Managing Risk’. Legal and Criminological Psychology, 24 (1): 141–61. https://doi.org/10.1111/lcrp.12140.
The Psychology of Conspiracy Theories
What psychological factors drive the popularity of conspiracy theories, which explain important events as secret plots by powerful and malevolent groups? What are the psychological consequences of adopting these theories? We review the current research and find that it answers the first of these questions more thoroughly than the second. Belief in conspiracy theories appears to be driven by motives that can be characterized as epistemic (understanding one’s environment), existential (being safe and in control of one’s environment), and social (maintaining a positive image of the self and the social group). However, little research has investigated the consequences of conspiracy belief, and to date, this research does not indicate that conspiracy belief fulfills people’s motivations. Instead, for many people, conspiracy belief may be more appealing than satisfying. Further research is needed to determine for whom, and under what conditions, conspiracy theories may satisfy key psychological motives.
(From the journal abstract)
Karen Douglas, Robbie M. Sutton, and Aleksandra Cichocka. 2017. ‘The Psychology of Conspiracy Theories’. Current Directions in Psychological Science, 26 (6): 538–42. https://doi.org/10.1177/0963721417718261.
Telling Stories of Terrorism: A Framework for Applying Narrative Approaches to the Study of Militant’s Self-Accounts
Narrative has recently garnered much attention in the study of terrorism but remains poorly understood. This paper offers some initial steps towards translating the promise of narrative approaches into a set of steps for systematically analysing and understanding terrorists’ own accounts of their engagement with extremism and militancy. This approach rests on the assumption that terrorist authored accounts are more than post-hoc rhetorical exercises that aim to persuade others, or even the authors themselves, of the righteousness of their political cause or otherwise mitigate their responsibility for their involvement in violence. In particular, I advance a framework for methodically applying narrative approaches to terrorist authored texts, in particular, autobiographies. In doing so, I will demonstrate how this approach can help better comprehend how individuals involved in militancy understand the world, draw upon existing narrative resources and give meaning to their actions.
(From the journal abstract)
Simon Copeland. 2018. ‘Telling Stories of Terrorism: A Framework for Applying Narrative Approaches to the Study of Militant’s Self-Accounts’. Behavioral Sciences of Terrorism and Political Aggression: 1–22. https://doi.org/10.1080/19434472.2018.1525417.
Understanding Conspiracy Theories
Scholarly efforts to understand conspiracy theories have grown significantly in recent years, and there is now a broad and interdisciplinary literature. In reviewing this body of work, we ask three specific questions. First, what factors are associated with conspiracy beliefs? Our review of the literature shows that conspiracy beliefs result from a range of psychological, political, and social factors. Next, how are conspiracy theories communicated? Here, we explain how conspiracy theories are shared among individuals and spread through traditional and social media platforms. Next, what are the societal risks and rewards associated with conspiracy theories? By focusing on politics and science, we argue that conspiracy theories do more harm than good. We conclude by suggesting several promising avenues for future research.
(From the journal abstract)
Karen Douglas, Joseph E. Uscinski, Robbie M. Sutton, Aleksandra Cichocka, Turkay Nefes, Chee Siang Ang, and Farzin Deravi. 2019. ‘Understanding Conspiracy Theories’. Political Psychology, 40 (S1): 3–35. https://doi.org/10.1111/pops.12568.
Exploring Susceptibility to Phishing in the Workplace
Phishing emails provide a means to infiltrate the technical systems of organisations by encouraging employees to click on malicious links or attachments. Despite the use of awareness campaigns and phishing simulations, employees remain vulnerable to phishing emails. The present research uses a mixed methods approach to explore employee susceptibility to targeted phishing emails, known as spear phishing. In study one, nine spear phishing simulation emails sent to 62,000 employees over a six-week period were rated according to the presence of authority and urgency influence techniques. Results demonstrated that the presence of authority cues increased the likelihood that a user would click a suspicious link contained in an email. In study two, six focus groups were conducted in a second organisation to explore whether additional factors within the work environment impact employee susceptibility to spear phishing. We discuss these factors in relation to current theoretical approaches and provide implications for user communities.
Highlights
- Susceptibility to phishing emails is explored in an ecologically valid setting.
- Authority and urgency techniques are found to impact employee susceptibility.
- Context-specific factors are also likely to impact employee susceptibility.
- A range of targeted initiatives are required to address susceptibility factors.
(From the journal abstract)
Emma Williams, Joanne Hinds, and Adam N. Joinson. 2018. ‘Exploring Susceptibility to Phishing in the Workplace’. International Journal of Human-Computer Studies, 120 (December): 1–13. https://doi.org/10.1016/j.ijhcs.2018.06.004.
Digital Hoarding Behaviours: Measurement and Evaluation
The social and psychological characteristics of individuals who hoard physical items are quite well understood, however very little is known about the psychological characteristics of those who hoard digital items and the kinds of material they hoard. In this study, we designed a new questionnaire (Digital Behaviours Questionnaire: DBQ) comprising 2 sections: the Digital Hoarding Questionnaire (DHQ) assessing two key components of physical hoarding (accumulation and difficulty discarding); and the second measuring the extent of digital hoarding in the workplace (Digital Behaviours in the Workplace Questionnaire: DBWQ).
In an initial study comprising 424 adults we established the psychometric properties of the questionnaires. In a second study, we presented revised versions of the questionnaires to a new sample of 203 adults, and confirmed their validity and reliability. Both samples revealed that digital hoarding was common (with emails being the most commonly hoarded items) and that hoarding behaviours at work could be predicted by the 10 item DHQ. Digital hoarding was significantly higher in employees who identified as having ‘data protection responsibilities’, suggesting that the problem may be influenced by working practices. In sum, we have validated a new psychometric measure to assess digital hoarding, documented some of its psychological characteristics, and shown that it can predict digital hoarding in the workplace.
(From the journal abstract)
Nick Neave, Pam Briggs, Kerry McKellar, and Elizabeth Sillence. 2019. ‘Digital Hoarding Behaviours: Measurement and Evaluation’. Computers in Human Behavior, 96 (July): 72–77. https://doi.org/10.1016/j.chb.2019.01.037.
Human and Computer Personality Prediction From Digital Footprints
Is it possible to judge someone accurately from his or her online activity? The Internet provides vast opportunities for individuals to present themselves in different ways, from simple self-enhancement to malicious identity fraud. We often rely on our Internet-based judgments of others to make decisions, such as whom to socialize with, date, or employ. Recently, personality-perception researchers have turned to studying social media and digital devices in order to ask whether a person’s digital traces can reveal aspects of his or her identity. Simultaneously, advances in “big data” analytics have demonstrated that computer algorithms can predict individuals’ traits from their digital traces. In this article, we address three questions: What do we currently know about human- and computer-based personality assessments? How accurate are these assessments? Where are these fields heading? We discuss trends in the current findings, provide an overview of methodological approaches, and recommend directions for future research.
(From the journal abstract)
Joanne Hinds and Adam Joinson. 2019. ‘Human and Computer Personality Prediction From Digital Footprints’. Current Directions in Psychological Science, https://doi.org/10.1177/0963721419827849.
What Demographic Attributes Do Our Digital Footprints Reveal?
To what extent does our online activity reveal who we are? Recent research has demonstrated that the digital traces left by individuals as they browse and interact with others online may reveal who they are and what their interests may be. In the present paper we report a systematic review that synthesises current evidence on predicting demographic attributes from online digital traces. Studies were included if they met the following criteria: (i) they reported findings where at least one demographic attribute was predicted/inferred from at least one form of digital footprint, (ii) the method of prediction was automated, and (iii) the traces were either visible (e.g. tweets) or non-visible (e.g. clickstreams). We identified 327 studies published up until October 2018. Across these articles, 14 demographic attributes were successfully inferred from digital traces; the most studied included gender, age, location, and political orientation. For each of the demographic attributes identified, we provide a database containing the platforms and digital traces examined, sample sizes, accuracy measures and the classification methods applied. Finally, we discuss the main research trends/findings, methodological approaches and recommend directions for future research.
(From the journal abstract)
Joanne Hinds and Adam N. Joinson. 2018. ‘What Demographic Attributes Do Our Digital Footprints Reveal? A Systematic Review’. PLOS ONE, 13 (11): e0207112. https://doi.org/10.1371/journal.pone.0207112.
In Their Own Words: Employee Attitudes towards Information Security
The purpose of this study is to uncover employee attitudes towards information security and to address the issue of social acceptability bias in information security research.
Design/methodology/approach
The study used personal construct psychology and repertory grids as the foundation for the study in a mixed-methods design. Data collection consisted of 11 in-depth interviews followed by a survey with 115 employee responses. The data from the interviews informed the design of the survey.
Findings
The results of the interviews identified a number of themes around individual responsibility for information security and the ability of individuals to contribute to information security. The survey demonstrated that those employees who thought the that organisation was driven by the need to protect information also thought that the risks were overstated and that their colleagues were overly cautious. Conversely, employees who thought that the organisation was driven by the need to optimise its use of information felt that the security risks were justified and that colleagues took too many risks.
Research limitations/implications
The survey findings were not statistically significant, but by breaking the survey results down further across business areas, it was possible to see differences within groups of individuals within the organisation.
Originality/value
The literature review highlights the issue of social acceptability bias and the problem of uncovering weakly held attitudes. In this study, the use of repertory grids offers a way of addressing these issues.
(From the journal abstract)
Debi Ashenden. 2018. ‘In Their Own Words: Employee Attitudes towards Information Security’. Information and Computer Security, 26 (3): 327–37. https://doi.org/10.1108/ICS-04-2018-0042.
Within-Subjects Verbal Lie Detection Measures: A Comparison between Total Detail and Proportion of Complications
We examined whether the verbal cue, proportion of complications, was a more diagnostic cue to deceit than the amount of information provided (e.g., total number of details).
Method
In the experiment, 53 participants were interviewed. Truth tellers (n = 27) discussed a trip they had made during the last twelve months; liars (n = 26) fabricated a story about such a trip. The interview consisted of an initial recall followed by a model statement (a detailed account of an experience unrelated to the topic of investigation) followed by a post‐model statement recall. The key dependent variables were the amount of information provided and the proportion of all statements that were complications.
Results
The proportion of complications was significantly higher amongst truth tellers than amongst liars, but only in the post‐model statement recall. The amount of information provided did not discriminate truth tellers from liars in either the initial or post‐model statement recall.
Conclusion
The proportion of complications is a more diagnostic cue to deceit than the amount of information provided as it takes the differential verbal strategies of truth tellers and liars into account.
(From the journal abstract)
Aldert Vrij, Sharon Leal, Louise Jupe, and Adam Harvey. 2018. ‘Within-Subjects Verbal Lie Detection Measures: A Comparison between Total Detail and Proportion of Complications’. Legal and Criminological Psychology, 23 (2): 265–79. https://doi.org/10.1111/lcrp.12126.
The Cognitive Interview and Its Use for People with Autism Spectrum Disorder
This chapter first discusses the structure of the cognitive interview (CI) and its tenets for eliciting detailed and accurate information from cooperative witnesses. The original CI was comprised of four mnemonics: report everything (RE), mental reinstatement of context (MRC), change temporal order (CTO), and change perspective (CP). The chapter then explores the protocol's effectiveness for application with individuals with autism spectrum disorder (ASD), considering modifications for use with a population group that has difficulties communicating personal experiences. The memory profile of people with ASD suggests that problems arise when people with ASD are called on to use complex strategies to encode or retrieve information. A modified version of the MRC and the use of the sketch plan MRC help people with ASD to provide information that is comparable in accuracy to that of members of the typical population.
(From the journal abstract)
Joanne Richards and Rebecca Milne. 2018. ‘The Cognitive Interview and Its Use for People with Autism Spectrum Disorder’. In The Wiley Handbook of Memory, Autism Spectrum Disorder, and the Law, 245–69. John Wiley & Sons, Ltd. https://doi.org/10.1002/9781119158431.ch13.
Using Specific Model Statements to Elicit Information and Cues to Deceit in Information-Gathering Interviews
Model Statements are designed to modify an interviewee's expectation of the amount of details required during an interview. This study examined tailored Model Statements, emphasising either spatial (Spatial-MS), or temporal (Temporal-MS) details, compared to a control condition (no-MS). Participants (63 liars, 63 truth-tellers) were randomly allocated to one of three interviewing conditions. Truth-tellers honestly reported a spy mission, whereas liars performed a covert mission and lied about their activities. The Spatial-MS elicited more spatial details than the control, particularly for truth-tellers. The Temporal-MS elicited more temporal details than the control, for truth-tellers and liars combined. Results indicate that the composition of different Model Statements increases the amount of details provided and, regarding spatial details, affects truth-teller's and liar's statements differently. Thus, Model Statements can be constructed to elicit information and magnify cues to deceit.
(From the journal abstract)
Cody Porter, Aldert Vrij, Sharon Leal, Zarah Vernham, Giacomo Salvanelli, and Niall McIntyre. 2018. ‘Using Specific Model Statements to Elicit Information and Cues to Deceit in Information-Gathering Interviews’. Journal of Applied Research in Memory and Cognition, 7 (1): 132–42. https://doi.org/10.1016/j.jarmac.2017.10.003.
The Internal Brakes on Violent Escalation: A Typology
Most groups do less violence than they are capable of. Yet while there is now an extensive literature on the escalation of or radicalisation towards violence, particularly by ‘extremist’ groups or actors, and while processes of de-escalation or de-radicalisation have also received significant attention, processes of non- or limited escalation have largely gone below the analytical radar.
This article contributes to current efforts to address this limitation in our understanding of the dynamics of political aggression by developing a descriptive typology of the ‘internal brakes’ on violent escalation: the mechanisms through which members of the groups themselves contribute to establish and maintain limits upon their own violence. We identify five underlying logics on which the internal brakes operate: strategic, moral, ego maintenance, outgroup definition, and organisational.
The typology is developed and tested using three very different case studies: the transnational and UK jihadi scene from 2005 to 2016; the British extreme right during the 1990s, and the animal liberation movement in the UK from the mid-1970s until the early 2000s.
(From the journal abstract)
Joel Busher, Donald Holbrook & Graham Macklin 2018. ‘The internal brakes on violent escalation: a typology’. Behavioral Sciences of Terrorism and Political Aggression 10.1080/19434472.2018.1551918
Reframing Intelligence Interviews: The Applicability of Psychological Research to HUMINT Elicitation
Effective discovery and subsequent threat mitigation is predicated on accurate, timely and detailed actionable information. Information, an important element within intelligence and investigation ensures appropriate judicial disposal in Law Enforcement Agency’s (LEA) efforts to bring offenders to justice.
The value of information to delivering community safety is reflected in associated policy, practice, and process. Effective interviewing, in both its formal and informal interactive states, offers a significant opportunity to elicit critical strategic and tactical information that both informs and drives LEA activity.
It is unexpected then, that within the context of information collection, not only are human interactions between LEA and members of the public under-exploited but also, when the intention is to collect information, how unsatisfactorily it is approached and executed.
It is apparent that the required elicitation skills, including rapport building and the identification of source motivation, are not sufficiently taught, and the governing policy is overly cautious with a negligible evidence base.
Whilst this chapter focuses on the psychological aspects of techniques available for gathering information, and in particular intelligence collection, the underlying psychological principles of conducting an effective interview are relevant to a wider audience.
(From the book abstract)
Stanier, I. P., and Jordan Nunan (2018). Reframing Intelligence Interviews: The Applicability of Psychological Research to HUMINT Elicitation. In A. Griffiths, & R. Milne (Eds.), The Psychology of Criminal Investigation: From Theory to Practice (pp. 226-248). London: Routledge. https://doi.org/10.4324/9781315637211
Mimicry in Online Conversations: An Exploratory Study of Linguistic Analysis Techniques
A number of computational techniques have been proposed that aim to detect mimicry in online conversations. In this paper, we investigate how well these reflect the prevailing cognitive science model, i.e. the Interactive Alignment Model. We evaluate Local Linguistic Alignment, word vectors, and Language Style Matching and show that these measures tend to show the features we expect to see in the IAM, but significantly fall short of the work of human classifiers on the same data set. This reflects the need for substantial additional research on computational techniques to detect mimicry in online conversations. We suggest further work needed to measure these techniques and others more accurately.
(From the journal abstract)
Carrick, Tom, Awais Rashid, and Paul. J. Taylor. 2016. ‘Mimicry in Online Conversations: An Exploratory Study of Linguistic Analysis Techniques’. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 732–36. http://eprints.lancs.ac.uk/80520/1/asonam_mimicry.pdf
Predicting Collective Action from Micro-Blog Data
Global and national events in recent years have shown that social media, and particularly micro-blogging services such as Twitter, can be a force for good (e.g., Arab Spring) and harm (e.g., London riots). In both of these examples, social media played a key role in group formation and organisation, and in the coordination of the group’s subsequent collective actions (i.e., the move from rhetoric to action).
Surprisingly, despite its clear importance, little is understood about the factors that lead to this kind of group development and the transition to collective action. This paper focuses on an approach to the analysis of data from social media to detect weak signals, i.e., indicators that initially appear at the fringes, but are, in fact, early indicators of such large-scale real-world phenomena.
Our approach is in contrast to existing research which focuses on analysing major themes, i.e., the strong signals, prevalent in a social network at a particular point in time. Analysis of weak signals can provide interesting possibilities for forecasting, with online user-generated content being used to identify and anticipate possible offline future events. We demonstrate our approach through analysis of tweets collected during the London riots in 2011 and use of our weak signals to predict tipping points in that context.
(From the journal abstract)
Charitonidis, Christos, Awais Rashid, and Paul J. Taylor. 2017. ‘Predicting Collective Action from Micro-Blog Data’. In Prediction and Inference from Social Networks and Social Media, 141–70. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-51049-1_7.
The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing
Reliable information is critical for investigations in forensic and security settings; however, obtaining reliable information for complex events can be challenging. In this study, we extend the timeline technique, which uses an innovative and interactive procedure where events are reported on a physical timeline. To facilitate remembering we tested two additional mnemonics, self-generated cues (SGC), which witnesses produce themselves, against other-generated cues (OGC) which are suggested by the interviewer.
One hundred and thirty-two participants witnessed a multi-perpetrator theft under full or divided attention and provided an account using the timeline comparing the efficacy of SGC, OGC, and no cues (control). Mock-witnesses who used self-generated cues provided more correct details than mock-witnesses in the other-generated or no cues conditions, with no cost to accuracy, under full but not under divided attention. Promising results on SGC suggest that they might be a useful addition to current interviewing techniques.
(From the journal abstract)
Kontogianni, Feni, Lorraine Hope, Paul J. Taylor, Aldert Vrij, and Fiona Gabbert. 2018. ‘The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing’. Journal of Applied Research in Memory and Cognition, April. https://doi.org/10.1016/j.jarmac.2018.03.006.
Cross-Cultural Verbal Deception
Background
‘Interviewing to detect deception’ research is sparse across different Ethnic Groups. In the present experiment, we interviewed truth tellers and liars from British, Chinese, and Arab origins. British interviewees belong to a low‐context culture (using a communication style that relies heavily on explicit and direct language), whereas Chinese and Arab interviewees belong to high‐context cultures (communicate in ways that are implicit and rely heavily on context).
Method
Interviewees were interviewed in pairs and 153 pairs took part. Truthful pairs discussed an actual visit to a nearby restaurant, whereas deceptive pairs pretended to have visited a nearby restaurant. Seventeen verbal cues were examined.
Results
Cultural cues (differences between cultures) were more prominent than cues to deceit (differences between truth tellers and liars). In particular, the British interviewees differed from their Chinese and Arab counterparts and the differences reflected low‐ and high‐context culture communication styles.
Conclusion
Cultural cues could quickly lead to cross‐cultural verbal communication errors: the incorrect interpretation of a cultural difference as a cue to deceit.
(From the journal abstract)
Leal, Sharon, Aldert Vrij, Zarah Vernham, Gary Dalton, Louise Jupe, Adam Harvey, and Galit Nahari. 2018. ‘Cross-Cultural Verbal Deception’. Legal and Criminological Psychology, June. https://doi.org/10.1111/lcrp.12131.
‘It’s not paranoia when they are really out to get you’: the role of conspiracy theories in the context of heightened security
Conspiracy theories have been seen as important supporting components in extreme political beliefs. This paper considers conspiracy theories in the counter jihad movement, an international network combining cultural nationalism with xenophobia towards Muslims.
This paper evaluates the nature of conspiracy belief through the analysis of several key texts published by counter jihad activists, and of content published on a daily basis by three core websites. The findings show the Islamisation conspiracy theory to be highly modular, with authors able to mix and match villains.
The analysis of daily published content demonstrates that, at the routine level, conspiracy theory is rarely used openly as a call to action.
This is in keeping with other examples of conspiracy theory in extreme right wing movements in which conspiracy is seen as justification for existing prejudices. However, the political and security context the counter jihad operates in also affords the movement opportunities to support some of their claims, often by reproducing or reinterpreting mainstream or quasi-mainstream reporting, without reverting openly to conspiracy tropes.
In the case of the counter jihad movement, as well as potentially other far-right movements, conspiracy theory may be taking a back seat to a more sophisticated public relations approach.
(From the journal abstract)
Lee, Benjamin J. 2017. ‘It’s Not Paranoia When They Are Really out to Get You: The Role of Conspiracy Theories in the Context of Heightened Security’. Behavioral Sciences of Terrorism and Political Aggression 9 (1): 4–20. https://doi.org/10.1080/19434472.2016.1236143.
Out with the Old and … In with the Old? A Critical Review of the Financial War on Terrorism on the Islamic State of Iraq and Levant
This article critically considers the effectiveness of the ‘Financial War on Terrorism’ on the funding streams of the Islamic State of Iraq and Levant (ISIL).
The next section of the article highlights how the international community concentrated on tackling money laundering prior to the terrorist attacks in September 2001 and how this policy dramatically altered. In particular, this section concentrates on the development of and definition of the ‘Financial War on Terrorism’.
The final part of the article seeks to determine if the ‘Financial War on Terrorism’ is able to tackle the funding streams of ISIL.
(From the journal abstract)
Ryder, Nicholas. 2018. ‘Out with the Old and … In with the Old? A Critical Review of the Financial War on Terrorism on the Islamic State of Iraq and Levant’. Studies in Conflict & Terrorism 41 (2): 79–95. http://eprints.uwe.ac.uk/28343/.
The Rise and Fall of the English Defence League: Self-Governance, Marginal Members and the Far Right
What determines the success or failure of far-right organisations? This article uses new qualitative data to explain the sudden rise and subsequent decline of the English Defence League, an anti-Islamic, street protest organisation established in the UK in 2009.
We explain the rise and fall of the English Defence League through the lens of the theory of collective action to show that the English Defence League initially motivated activism by supplying selective incentives that were enhanced by the participation of others.
The pursuit of ‘participatory crowding’ led to indiscriminate recruitment into the organisation that enabled numbers to expand into the thousands, but ultimately caused the English Defence League’s downfall because it resulted in the presence of large numbers of ‘marginal members’ with low levels of commitment whose subsequent exit was decisively destructive.
Self-governance mechanisms to ensure greater loyalty from members could have prevented the English Defence League’s decline but would also have limited its initial success.
(From the journal abstract)
Morrow, Elizabeth A, and John Meadowcroft. 2018. ‘The Rise and Fall of the English Defence League: Self-Governance, Marginal Members and the Far Right’. Political Studies, June. https://doi. org/10.1177/0032321718777907.
Lessons from the Extreme: What Business Negotiators Can Learn from Hostage Negotiations
Editors’ Note: The high-stakes world of the hostage negotiator draws instinctive respect from other negotiators. But if you operate in another domain, you could be excused for thinking that hostage negotiation has nothing to do with you.
That impression, it turns out, is quite often wrong. Here, two researchers draw parallels to several kinds of business and other disputes in which it often seems that one of the parties acts similarly to a hostage taker. Understanding what hostage negotiators have learned to do in response can be a real asset to a negotiator faced with one of these situations.
(From the book abstract)
Taylor, Paul J., and William A. Donohue. 2017. ‘Lessons from the Extreme: What Business Negotiators Can Learn from Hostage Negotiations’. In Negotiator’s Desk Reference, edited by Chris Honeyman and Andrea Kupfer Schneider. DRI Press. www.ndrweb.com.
Can Programming Frameworks Bring Smartphones into the Mainstream of Psychological Science?
Smartphones continue to provide huge potential for psychological science and the advent of novel research frameworks brings new opportunities for researchers who have previously struggled to develop smartphone applications.
However, despite this renewed promise, smartphones have failed to become a standard item within psychological research. Here we consider the key issues that continue to limit smartphone adoption within psychological science and how these barriers might be diminishing in light of ResearchKit and other recent methodological developments.
We conclude that while these programming frameworks are certainly a step in the right direction it remains challenging to create usable research-orientated applications with current frameworks.
Smartphones may only become an asset for psychology and social science as a whole when development software that is both easy to use and secure becomes freely available.
(From the journal abstract)
Piwek, Lukasz, David A. Ellis, and Sally Andrews. 2016. ‘Can Programming Frameworks Bring Smartphones into the Mainstream of Psychological Science?’ Frontiers in Psychology 7. https://doi. org/10.3389/fpsyg.2016.01252.
Psychological and Behavioral Examinations of Online Terrorism
It has long been recognised that terrorists make use of the internet as one of many means through which to further their cause. This use of the internet has fuelled a large number of studies seeking to understand terrorists' use of online environments.
This chapter provides an overview of current understandings of online terrorist behavior, coupled with an outline of the qualitative and quantitative approaches that can and have been adopted to research this phenomenon. The chapter closes with a discussion of the contentious issue of ethics in online terrorism research.
The aim of the chapter is to equip readers with the necessary knowledge and skills to conduct their own research into terrorists' online behavior, taking best ethical practices into consideration when doing so.
(From the book abstract)
Prentice, Sheryl, and Paul J. Taylor. 2018. ‘Psychological and Behavioral Examinations of Online Terrorism’. In Psychological and Behavioral Examinations in Cyber Security, edited by John McAlaney, 151–71. https://www.igi-global.com/chapter/psychological-and-behavioral-examinations-of-online-terrorism/199887.
Same Kind of Different: Affordances, Terrorism, and the Internet
The rapid development of the Internet as a cornerstone of private and social life has provoked a growing effort by law enforcement and security agencies to understand what role the Internet plays in terrorism. Paul Gill, Emily Corner, Maura Conway, Amy Thornton, Mia Bloom, and John Horgan's (2017, this issue) effort to identify empirically when and how terrorists engage with the Internet is thus timely and important.
Understanding when terrorists use the Internet is valuable for investigators who must evaluate the immediacy of the risk posed by a suspect or cell. Knowing the typical patterns of use (or lack of use) can facilitate inferences about a cell's preparedness, the nature of its support, and even the goal of its attack. Understanding how terrorists use the Internet is essential for policy makers who must construct legislation to deter citizens from terrorism while retaining their rights to freedom.
This is arguably best accomplished by legislation targeted at a narrow set of Internet uses that are, as far as possible, exclusively associated with illegal actions.
In this policy essay, we focus on two of Gill et al.’s (2017) main contributions. We argue that, subject to robust independent replication, they encourage thought about the functions of the Internet for terrorists, which in turn may have implications that offer useful guidance for policy and practice. Alongside the article's conceptual contributions, Gill et al. also assert to have resolved several pragmatic challenges and we suggest ways in which their solutions, if developed fully, could offer value to the security analyst community. Finally, we take stock of where Gill et al.’s contribution has left us and review the next steps.
(From the journal abstract)
Taylor, Paul J., Donald Holbrook, and Adam Joinson. 2017. ‘Same Kind of Different’. Criminology & Public Policy 16 (1): 127–33. https://doi.org/10.1111/1745-9133.12285.
Between Caucasus and Caliphate: The Splintering of the North Caucasus Insurgency
In December 2014, several high-ranking field commanders from the Caucasus Emirate (Imarat Kavkaz, IK), an insurgent and designated terrorist group in Russia’s North Caucasus, pledged allegiance to the Islamic State (IS). Following the subsequent defection of many of the IK’s surviving commanders, IS consolidated its regional presence with the establishment of a formal branch, the Caucasus Wilayah (IS/CW).
This paper uses Social Movement Theory’s concept of framing to interpret North Caucasus insurgent leaders’ response to the Syrian conflict and identify the differences in the competing factions’ articulated ideologies. It finds that IS/CW leaders have sought to draw on the emotional appeal of the “caliphate” and redirect it back into the local insurgency, while neglecting to articulate alternative tactics or goals.
Those leaders who remained loyal to the IK, by contrast, rooted their opposition in jihadi scholarship and rejected the legitimacy of the “caliphate”. However, apparent ideological differences have been exacerbated by communication difficulties that have hindered leaders’ ability to negotiate internal and external pressures.
This paper contributes to understandings of the differences between the competing factions, illustrates how groups can seek to strengthen their appeal by avoiding explicitness, and demonstrates the importance of operational context in considering ideological change.
(From the journal abstract)
Youngman, Mark. 2016. ‘Between Caucasus and Caliphate: The Splintering of the North Caucasus Insurgency’. Caucasus Survey 4 (3): 194–217. https://doi.org/10.1080/23761199.2016.1215055.
Broader, Vaguer, Weaker: The Evolving Ideology of the Caucasus Emirate Leadership
In October 2007, veteran Chechen field commander Dokka Umarov proclaimed the formation of the Caucasus Emirate (IK), formalising the victory of the North Caucasus insurgency’s Islamist wing over its nationalist-separatists. During Umarov’s time as leader, the North Caucasus experienced sustained violence and the IK claimed responsibility for multiple terrorist attacks in and beyond the region.
However, despite the importance of ideology in understanding insurgent behaviour, the IK’s ideology and Umarov’s role in shaping it remain understudied. Using Social Movement Theory’s concept of framing to analyse Umarov’s communiqués throughout his lengthy tenure (June 2006–September 2013), this article identifies three distinct phases in Umarov’s ideological positioning of the insurgency: nationalist-jihadist (June 2006–October 2007); Khattabist (October 2007–late 2010); and partially hybridised (late 2010–September 2013).
The article contributes to debates over typologies of jihadist actors by highlighting the difficulties in applying them to the North Caucasus and provides a clearer understanding of the IK’s ideological transformation and the limits to its engagement with external actors.
The article also illustrates that weakness was a key factor in explaining that transformation and identifies several avenues for research that could further enhance our understanding of the IK’s ideology and the role it plays.
(From the journal abstract)
Youngman, Mark. 2016. ‘Broader, Vaguer, Weaker: The Evolving Ideology of the Caucasus Emirate Leadership’. Terrorism and Political Violence 0 (0): 1–23. https://doi.org/10.1080/09546553.2016.1229666
Employees: The Front Line in Cyber Security
What happens if you lose trust in the systems on which you rely? If the displays and dashboards tell you everything is operating normally but, with your own eyes, you can see that this is not the case? This is what apparently happened with the Stuxnet virus attack on the Iranian nuclear programme in 2010.
Dr Debi Ashenden, CREST lead on protective security and risk assessment, writes that with cyber attacks set to rise, it’s important that we empower employees to defend our front line.
(From the journal abstract)
Ashenden, Debi. 2017. ‘Employees: The Front Line in Cyber Security’. The Chemical Engineer, February 2017, 908 edition. https://crestresearch. ac.uk/comment/employees-front-line-cyber-security/.
Technology and the Formation of Socially Positive Behaviours
‘Behaviour change’ has become a buzz phrase of growing importance to policymakers and researchers. There is an increasing focus on exploring the relationship between social organisation and individual action, and on intervening to influence societal outcomes like population health and climate change. Researchers continue to grapple with methodologies, intervention strategies and ideologies around ‘social change’.
Multidisciplinary in approach, this important book draws together insights from a selection of the principal thinkers in fields including public health, transport, marketing, sustainability and technology. The book explores the political and historical landscape of behaviour change, and trends in academic theory, before examining new innovations in both practice and research. It will be a valuable resource for academics, policy makers, practitioners, researchers and students wanting to locate their thinking within this rapidly evolving field.
(From the publisher's description)
Joinson, Adam, and Lukasz Piwek. 2016. ‘Technology and the Formation of Socially Positive Behaviours’. In Beyond Behaviour Change - Key Issues, Interdisciplinary Approaches and Future Directions, edited by Fiona Spotswood. Bristol: Policy Press. Accessed 20 July 2018. https://policy.bristoluniversitypress.co.uk/beyond-behaviour-change.
Culture Moderates Changes in Linguistic Self-Presentation and Detail Provision When Deceiving Others
Change in our language when deceiving is attributable to differences in the affective and cognitive experience of lying compared to truth telling, yet these experiences are also subject to substantial individual differences. On the basis of previous evidence of cultural differences in self-construal and remembering, we predicted and found evidence for cultural differences in the extent to which truths and lies contained self (versus other) references and perceptual (versus social) details.
Participants (N = 320) of Black African, South Asian, White European and White British ethnicity completed a catch-the-liar task in which they provided genuine and fabricated statements about either their past experiences or an opinion and counter-opinion. Across the four groups we observed a trend for using more/fewer first-person pronouns and fewer/more third-person pronouns when lying, and a trend for including more/fewer perceptual details and fewer/more social details when lying.
Contrary to predicted cultural differences in emotion expression, all participants showed more positive affect and less negative affect when lying. Our findings show that liars deceive in ways that are congruent with their cultural values and norms, and that this may result in opposing changes in behaviour.
(From the journal abstract)
Taylor, Paul J., Samuel Larner, Stacey M. Conchie, and Tarek Menacere. 2017. ‘Culture Moderates Changes in Linguistic Self-Presentation and Detail Provision When Deceiving Others’. Royal Society Open Science 4 (6). https://doi.org/10.1098/rsos.170128.
Individual Differences in Susceptibility to Online Influence: A Theoretical Review
Scams and other malicious attempts to influence people are continuing to proliferate across the globe, aided by the availability of technology that makes it increasingly easy to create communications that appear to come from legitimate sources. The rise in integrated technologies and the connected nature of social communications means that online scams represent a growing issue across society, with scammers successfully persuading people to click on malicious links, make fraudulent payments, or download malicious attachments.
However, current understanding of what makes people particularly susceptible to scams in online contexts, and therefore how we can effectively reduce potential vulnerabilities, is relatively poor. So why are online scams so effective? And what makes people particularly susceptible to them? This paper presents a theoretical review of literature relating to individual differences and contextual factors that may impact susceptibility to such forms of malicious influence in online contexts.
A holistic approach is then proposed that provides a theoretical foundation for research in this area, focusing on the interaction between the individual, their current context, and the influence message itself, when considering likely response behaviour.
(From the journal abstract)
Williams, Emma J., Amy Beardmore, and Adam N. Joinson. 2017. ‘Individual Differences in Susceptibility to Online Influence: A Theoretical Review’. Computers in Human Behavior 72 (July): 412–21. https://doi.org/10.1016/j.chb.2017.03.002.
Press Accept to Update Now: Individual Differences in Susceptibility to Malevolent Interruptions
Increasingly, connected communication technologies have resulted in people being exposed to fraudulent communications by scammers and hackers attempting to gain access to computer systems for malicious purposes. Common influence techniques, such as mimicking authority figures or instilling a sense of urgency, are used to persuade people to respond to malevolent messages by, for example, accepting urgent updates. An ‘accept’ response to a malevolent influence message can result in severe negative consequences for the user and for others, including the organisations they work for.
This paper undertakes exploratory research to examine individual differences in susceptibility to fraudulent computer messages when they masquerade as interruptions during a demanding memory recall primary task compared to when they are presented in a post-task phase. A mixed-methods approach was adopted to examine when and why people choose to accept or decline three types of interrupting computer update message (genuine, mimicked, and low authority) and the relative impact of such interruptions on performance of a serial recall memory primary task.
Results suggest that fraudulent communications are more likely to be accepted by users when they interrupt a demanding memory-based primary task, that this relationship is impacted by the content of the fraudulent message, and that influence techniques used in fraudulent communications can over-ride authenticity cues when individuals decide to accept an update message. Implications for theories, such as the recently proposed Suspicion, Cognition and Automaticity Model and the Integrated Information Processing Model of Phishing Susceptibility, are discussed.
(From the journal abstract)
Williams, Emma J., Phillip L. Morgan, and Adam N. Joinson. 2017. ‘Press Accept to Update Now: Individual Differences in Susceptibility to Malevolent Interruptions’. Decision Support Systems 96 (April): 119–29. https://doi.org/10.1016/j.dss.2017.02.014.
Security Dialogues: Building Better Relationships between Security and Business
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes.
By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.
(From the journal abstract)
Ashenden, Debi, and Darren Lawrence. 2016. ‘Security Dialogues: Building Better Relationships between Security and Business’. IEEE Security Privacy 14 (3): 82–87. https://www.computer.org/cms/Computer.org/ComputingNow/issues/2016/08/msp2016030082.pdf.
Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCI
The idea that the internet may enable an individual to become radicalized has been of increasing concern over the last two decades. Indeed, the internet provides individuals with an opportunity to access vast amounts of information and to connect to new people and new groups.
Together, these prospects may create a compelling argument that radicalization via the internet is plausible. So, is this really the case? Can viewing ‘radicalizing’ material and interacting with others online actually cause someone to subsequently commit violent and/or extremist acts? In this article, we discuss the potential role of the internet in radicalization and relate to how cybersecurity and certain HCI ‘affordances’ may support it.
We focus on how the design of systems provides opportunities for extremist messages to spread and gain credence, and how an application of HCI and user-centered understanding of online behavior and cybersecurity might be used to counter extremist messages.
By drawing upon existing research that may be used to further understand and address internet radicalization, we discuss some future research directions and associated challenges.
(From the journal abstract)
Hinds, Joanne, and Adam Joinson. 2017. 'Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCI'. In Human Aspects of Information Security, Privacy and Trust, 481–93. Lecture Notes in Computer Science. Springer, Cham. https://researchportal.bath.ac.uk/en/publications/radicalization-the-internet-and-cybersecurity-opportunities-and-c
Research on the Timeline Technique
The research in this paper by CREST member Professor Lorraine Hope was used as the basis for our short guide to using The Timeline Technique in interviewing. The technique can be useful in helping interviewees recall and report events from a particular timeframe. In this paper it is demonstrated that using the technique aids more accurate recall of details of an event than using a free-recall approach (e.g. by asking someone to repeat everything they can remember about an event). You can download the guide here. You can download this paper via the link below the abstract.
Who? What? When? Using a timeline technique to facilitate recall of a complex event
Journal of Applied Research in Memory and Cognition
Volume 2, Issue 1, March 2013, Pages 20–24
Authors: Lorraine Hope, Rebecca Mullis, Fiona Gabbert
Abstract
Accurately recalling a complex multi-actor incident presents witnesses with a cognitively demanding retrieval task. Given the important role played by temporal context in the retrieval process, the current research tests an innovative timeline technique to elicit information about multiple perpetrators and their actions. Adopting a standard mock witness paradigm, participants were required to provide an account of a witnessed event. In Experiment 1, the timeline technique facilitated the reporting of more correct details than a free recall, immediately and at a two-week retention interval, at no cost to accuracy. Accounts provided using the timeline technique included more correct information about perpetrator specific actions and fewer sequencing errors. Experiment 2 examined which mnemonic components of the timeline technique might account for these effects. The benefits of exploiting memory organization and reducing cognitive constraints on information flow are likely to underpin the apparent timeline advantage.
Highlights:
- Accurately recalling a complex multi-actor incident presents witnesses with a cognitively demanding retrieval task.
- Adopting a mock witness paradigm, we tested an innovative timeline technique to elicit information about a complex crime.
- The timeline technique facilitated reporting of more correct details than a free recall, at no cost to accuracy, both immediately and after a delay.
- Timeline reports included more correct information about perpetrator specific actions and fewer incident sequencing errors.
- Exploiting memory organization and reducing constraints on information flow may underpin the apparent timeline advantage.
You can download this paper at the following link:
http://www.sciencedirect.com/science/article/pii/S221136811300003X
Research on the verifiability approach in interviewing
The research in this paper contributed to the CREST guide on checkable details in interviewing. It demonstrates a method interviewers can use to aid in determining whether someone is telling the truth or not. You can download the guide here. For more information on the research behind the guide you can download this paper via the link below.
The Verifiability Approach: Countermeasures Facilitate its Ability to Discriminate Between Truths and Lies
Applied Cognitive Psychology
Volume 28 Issue 1 (January/February 2014), Pages 122-128
Author(s): Galit Nahari, Aldert Vrij, Ronald P. Fisher
DOI: 10.1002/acp.2974
Abstract
According to the verifiability approach, liars tend to provide details that cannot be checked by the investigator and awareness of this increases the investigator's ability to detect lies. In the present experiment, we replicated previous findings in a more realistic paradigm and examined the vulnerability of the verifiability approach to countermeasures. For this purpose, we collected written statements from 44 mock criminals (liars) and 43 innocents (truth tellers), whereas half of them were told before writing the statements that the verifiability of their statements will be checked. Results showed that ‘informing’ encouraged truth tellers but not liars to provide more verifiable details and increased the ability to detect lies. These findings suggest that verifiability approach is less vulnerable to countermeasures than other lie detection tools. On the contrary, in the current experiment, notifying interviewees about the mechanism of the approach benefited lie detection.
You can download this paper at the following link.
http://onlinelibrary.wiley.com/doi/10.1002/acp.2974/abstract