13 research outputs found

    Eliciting information and cues to deception using a model statement: Examining the effect of presentation modality

    Get PDF
    Forensic interviewing involves gathering information from a suspect or eyewitness. Administering a model statement during an interview results in greater information elicitation, which can enhance lie detection. Typically, a model statement is a highly detailed statement, on an unrelated topic to that of the interview. This study examined the effect of manipulating the modality of the MS, either by allowing participants to listen to (Audio-MS), or read (Written-MS) a model statement. A total of 162 (81 truth tellers, 81 liars) participants were randomly allocated to one of three interviewing conditions where they received either the Audio-MS, Written-MS, or No-MS (control condition). Truth tellers honestly reported a “spy” mission, whereas liars performed a covert mission and lied about their activities. Results showed both model statements were equally more effective at eliciting information and facilitating lie detection, compared with a control condition. Theoretical and practical implications are discussed

    A critical analysis of the Model Statement literature: Should this tool be used in practice?

    Get PDF
    Investigators need to elicit detailed statements from interviewees to find potential leads, whilst simultaneously judging if a statement is genuine or fabricated. Researchers have proposed that the Model Statement (MS) can both (a) increase information elicitation from interviewees and (b) amplify the verbal differences between liars and truth tellers, thereby enhancing lie-detection accuracy. Based upon a critical analysis of the MS literature, we argue that this tool is not currently ready for practical usage, as its utility has not been fully established. We highlight a diverse range of existing MS scripts, and a greater diversity in the dependent measures examined in conjunction with this tool. More robust replications of these procedures are needed. We also highlight why some measures of verbal content may not be suitable as outcome measures and suggest that new research could use the well-established reality monitoring criteria to allow for standardisation across studies

    Applying the asymmetric information management technique to insurance claims

    Get PDF
    This study investigates the Asymmetric Information Management (AIM) technique's ability to detect fraudulent insurance claims submitted online. The AIM instructions inform claimants that, inter alia, more detailed statements are easier to accurately classify as genuine or fabricated. To test this, truth tellers (n=55) provided an honest statement about a lost or stolen item, while liars (n=53) provided a false claim. All claimants were randomly assigned to either receive the control or AIM instructions. We found that truth tellers provided more information in the AIM condition (compared to the control condition), and discriminant analysis classificatory performance was improved slightly. Unfortunately, the AIM instructions had little effect on the amount of information liars provided. Thus, the AIM technique is useful for supporting truth tellers to be more detailed, but more work needs to be conducted to assess why liars in this study did not adapt a withholding strategy

    Sexual offending and barriers to employability: Public perceptions of who to hire

    Get PDF
    Employment can reduce reoffending, yet many employers refrain from hiring candidates with prior convictions, particularly for sexual offences. This study explored employability ratings before and after a disclosure and barring service (DBS) check for a public facing job. The DBS check revealed either (i) rape, (ii) sexual activity with a child, (iii) possession of indecent photographs of children, or (iv) no criminal conviction. We measured ratings of trustworthiness, company value, and role suitability before and after the disclosure. Participants were then invited to keep or reject the candidate. As predicted, individuals with a prior sexual offence were perceived as less trustworthy, valuable, or suitable for employment. Those with contact offences (sexual activity with a child 80%, rape, 57%) received higher rejections than those with possession of photographs of children convictions (49%). Participants provided qualitative responses for their decision making. This data indicates directions for future research for enhancing employment opportunities

    Lie-detection by strategy manipulation: Developing an Asymmetric Information Management (AIM) technique

    Get PDF
    Liars can, when prompted, provide detailed statements. Ideally, interview protocols to improve lie-detection should (a) encourage forthcoming verbal strategies from truth tellers and (b) encourage withholding verbal strategies from liars. Previous research has investigated (a) but not (b). We designed an asymmetric information management (AIM) instruction—informing interviewees, inter alia, that more detailed statements are easier to accurately classify as genuine or fabricated—to encourage truth tellers to be verbally forthcoming and to encourage liars to be verbally withholding. Truth tellers (n = 52) and liars (n = 52) took part in one of two counterbalanced missions, and were assigned to either the AIM or control interviewing condition. Truth tellers provided (and liars withheld) more information in the AIM condition (compared to the control condition), and thus, discriminant analysis classificatory performance was improved. Therefore, a simple instruction can simultaneously modify the respective strategies of liars and truth tellers

    Using specific model statements to elicit information and cues to deceit in information-gathering interviews

    Get PDF
    Model Statements are designed to modify an interviewee's expectation of the amount of details required during an interview. This study examined tailored Model Statements, emphasising either spatial (Spatial-MS), or temporal (Temporal-MS) details, compared to a control condition (no-MS). Participants (63 liars, 63 truth-tellers) were randomly allocated to one of three interviewing conditions. Truth-tellers honestly reported a spy mission, whereas liars performed a covert mission and lied about their activities. The Spatial-MS elicited more spatial details than the control, particularly for truth-tellers. The Temporal-MS elicited more temporal details than the control, for truth-tellers and liars combined. Results indicate that the composition of different Model Statements increases the amount of details provided and, regarding spatial details, affects truth-teller's and liar's statements differently. Thus, Model Statements can be constructed to elicit information and magnify cues to deceit

    Applying the asymmetric information management (AIM) technique to virtual interviewing

    Get PDF
    The Asymmetric Information Management (AIM) technique enhances verbal lie-detection by encouraging truth tellers (but not liars) to be forthcoming with information. We examined the AIM technique's utility for correctly distinguishing genuine and fabricated statements reported during a virtual interview. Truth tellers (n = 85) honestly reported their recollection of a 30-minute walk. Liars pretended to have engaged in a similar activity (n = 86). Participants were randomly assigned to either the AIM or Control condition and provided either a verbal or written statement. Truth tellers in the AIM condition reported more detailed statements (vs. the Control condition). Liars in the AIM condition reported less detailed statements (vs. the Control condition). More genuine and fabricated statements were correctly classified in the AIM condition (72% accuracy) compared to the Control condition (59% accuracy). No differences between disclosure type emerged. Results support the use of the AIM technique for facilitating verbal lie-detection

    Social media reactions of nurses to the documentary Stacey Dooley: On the Psych Ward

    No full text
    AbstractBackground/AimsMental health nursing is becoming a more transparent discipline. Increasingly, documentaries have provided the general public with insights regarding these therapeutic ward environments. The opinions of staff working in such places is important for ensuring the accuracy of the information, and the usefulness of what is publicly aired. This study explored the social media comments of nursing staff (as the experts) who viewed the Stacey Dooley: On the Psych Ward documentary.MethodsSocial media (Facebook and Twitter) were searched for comments on the documentary 3 weeks after the documentary was aired. In total, 4008 Facebook comments and 604 tweets were downloaded and assessed. Comments that did not relate to the documentary were excluded. A total of 31 Facebook comments and 54 tweets were used for analysis.ResultsSome evidence of criticism towards the presenter was found, as well as the use of an award-winning hospital as a non-representative – and unrealistic – example of psychiatric care. In general, healthcare staff felt that the documentary was useful for informing the general public, as well as students.ConclusionsDocumentaries such as this one that capture the realities of working on mental health wards have educational merit

    Implementing converged security risk management: drivers, barriers, and facilitators

    No full text
    Converged security risk management is an approach that addresses interdependencies between security-related business functions that have traditionally been managed by separate departments within organizations. It is a more effective means of addressing organizational security risks and threats than tackling physical and information security challenges separately, given that the boundaries between the two are frequently blurred. However, fully converged security remains the exception rather than the rule, leaving organizations increasingly vulnerable as their adoption and reliance on digital technologies accelerates. Through interviews with eight senior security professionals, this research identified key factors critical to effective converged security risk management, expressed as ‘drivers,’ ‘barriers,’ and ‘facilitators.’ The practitioners’ accounts illuminated how the modern threat landscape continues to drive further the need for such an approach, while the traditional separation of corporate security departments from the information security function in organizations remains a barrier. A greater focus on training and education, as well as soft skills, were identified as key priorities in the drive for an effective converged approach
    corecore