The National Crime Faculty and Offender Profiling

Wells S., & West A. (1998) The National Crime Faculty and Offender Profiling, pp 113-124, in Methods of Case Analysis: An International Symposium. Bundeskriminalamt. Vol. 38.2,Wiesbaden 1998.

Author: Simon Wells
Crisis Negotiation: From Suicide to Terrorism Intervention

Wells, S., Taylor P., & Giebels, E. (2013). Crisis Negotiation: From Suicide to Terrorism Intervention. In M. Olekalns & W. Adair (Eds.), Handbook of Negotiation Research (pp.473-498). Melbourne AU: Elgar, Edwards Publishing

Author: Simon Wells
Interviewing in criminal and intelligence-gathering contexts: Applying science

Wells, S., & Brandon, S. (2018) Interviewing in criminal and intelligence-gathering contexts: Applying science. International Journal of Forensic Medicine. 17(4) DOI:10.1080/14999013.2018.1536090

Author: Simon Wells
Negotiating in a Terrorist Environment

Wells, S., (2014). Negotiating in a Terrorist Environment. In J. Pearce, (Ed.), Terrorism Case Studies (pp. 144- 167). Oxford: Wiley.

Author: Simon Wells
Evaluating the effectiveness of a 5-day training on science-based methods of interrogation with U.S. federal, state, and local law enforcement investigators

Russano, M. B., Meissner, C. A., Atkinson, D. J., Brandon, S. E., Wells, S., Kleinman, S. M., Ray, D. G., & Jones, M. S. (2024). Evaluating the effectiveness of a 5-day training on science-based methods of interrogation with U.S. federal, state, and local law enforcement investigators. Psychology, Public Policy, and Law, 30(2), 105–120. https://doi.org/10.1037/law0000422

Author: Simon Wells
Urgent issues and prospects at the intersection of culture, memory, and witness interviews: Exploring the challenges for research and practice.

Hope, L., Anakwah, N., Antfolk, J., Brubacher, S. P., Flowe, H., Gabbert, F., Giebels, E., Kanja, W., Korkman, J., Kyo, A., Naka, M., Otgaar, H., Powell, M. B., Selim, H., Skrifvars, J., Sorkpah, I. K., Sowatey, E. A., Steele, L. C., Stevens, L., . . . Wells, S. (2022). Urgent issues and prospects at the intersection of culture, memory, and witness interviews: Exploring the challenges for research and practice. Legal and Criminological Psychology, 27(1), 1–31. https://doi.org/10.1111/lcrp.12202

Author: Simon Wells
Science Based Interviewing

Brandon, S.E. & Wells, S. (2020) Science Based Interviewing. BookBaby, New York

Author: Simon Wells
Commonalities and complementarities among the Cognitive Interview, ORBIT, the Cylinder Model, and Methods of Detecting Deception: Towards a Theory of Interrogation

Brandon, S. E., & Wells, S. (2019). Commonalities and complementarities among the Cognitive Interview, ORBIT, the Cylinder Model, and Methods of Detecting Deception: Towards a Theory of Interrogation. In J. Dickinson, N. Scriber Compo, R. Carol, M. McCauley & B. Schwartz (Eds.), Evidence-Based Investigative Interviewing. Routledge: New York, NY.

Author: Simon Wells
Science-based interviewing: Information elicitation

Brandon, S. E., Wells, S., & Seale, C. (2017). Science-based interviewing: Information elicitation. Journal of Investigative Psychology and Offender Profiling, 15. DOI:10.1002/jip.1496

Author: Simon Wells
Enhancing Practise Through Science

Brandon, S., Arthur,J., Ray, D., Meissner, C., Russano, M., Wells, S. & Kleinman, S. (2018). Enhancing Practise Through Science. Manuscript submitted for Publication.

Author: Simon Wells
Online Signals of Extremist Mobilisation

This study underscores that understanding and predicting extremist mobilisation requires focusing on specific behavioural indicators such as talk of violence and logistics.

Taken from the paper:

Abstract:

Psychological theories of mobilisation tend to focus on explaining people’s motivations for action, rather than mobilization (“activation”) processes. To investigate the online behaviours associated with mobilisation, we compared the online communications data of 26 people who subsequently mobilised to right-wing extremist action and 48 people who held similar extremist views but did not mobilize (N = 119,473 social media posts).

In a three-part analysis, involving content analysis (Part 1), topic modeling (Part 2), and machine learning (Part 3), we showed that communicating ideological or hateful content was not related to mobilisation, but rather mobilisation was positively related to talking about violent action, operational planning, and logistics.

Our findings imply that to explain mobilisation to extremist action, rather than the motivations for action, theories of collective action should extend beyond how individuals express grievances and anger, to how they equip themselves with the “know-how” and capability to act.

Conclusion:

In conclusion, we suggest that understanding extremist mobilisation and the initiation of action requires different theorising than radicalisation (or support for extremist collective action)—as they involve different processes (or at least different phases of a process). Our findings suggest that people who are intent on mobilising to extremist action are likely to post content about violent actions, operational planning, and logistics, as well as “leaking” emotional intensity through paralinguistic cues. In contrast, both people who support extremist action but are not intent on mobilising, and people who are, post-ideological and hateful content, so this content cannot help elucidate the mobilisation process. To enable accurate explanation and prediction of mobilisation, theories of collective action and mobilisation need to describe the behaviours and conditions that lead to a radicalised individual passing a psychological tipping point that enables action. In turn, these insights and methods may help law enforcement personnel to identify the “needles” of terrorism in an ever-growing “haystack” of extremist content.

Authors: Olivia Brown, Laura G. E. Smith, Brittany Davidson, Adam Joinson
Online Signals of Extremist Mobilization

Psychological theories of mobilization tend to focus on explaining people’s motivations for action, rather than mobilization (“activation”) processes. To investigate the online behaviors associated with mobilization, we compared the online communications data of 26 people who subsequently mobilized to right-wing extremist action and 48 people who held similar extremist views but did not mobilize (N = 119,473 social media posts). In a three-part analysis, involving content analysis (Part 1), topic modeling (Part 2), and machine learning (Part 3), we showed that communicating ideological or hateful content was not related to mobilization, but rather mobilization was positively related to talking about violent action, operational planning, and logistics. Our findings imply that to explain mobilization to extremist action, rather than the motivations for action, theories of collective action should extend beyond how individuals express grievances and anger, to how they equip themselves with the “know-how” and capability to act.

(From the journal abstract)


Brown, O., Smith, L. G. E., Davidson, B. I., Racek, D., & Joinson, A. (2024). Online Signals of Extremist Mobilization. Personality and Social Psychology Bulletin, 0(0). https://doi.org/10.1177/01461672241266866

Authors: Olivia Brown, Laura G. E. Smith, Adam Joinson
https://doi.org/10.1177/01461672241266866
Frame, Fame and Fear Traps: The Dialectic of Counter-Terrorism Strategic Communication

From the journal abstract:

This paper explores the challenges and complexities navigated and negotiated in public facing counter-terrorism strategic communication campaigns. Informed by frame analysis of campaign assets, practitioner interviews and public focus groups, the discussion pivots around three high-profile UK public messaging campaigns. Building from Goffman’s theory of “normal appearances” and the established concept of a “frame trap”, the analysis identifies two further shaping tensions. A “fear trap” occurs when counter-terrorism messages seek to “outbid” other risks in order to capture public attention, thereby unintentionally creating the negative emotional reactions sought through acts of terrorism, or overly-reassuring messages that induce public disengagement. In contrast, a “fame trap” results from creating “too much” public awareness of terrorism, by using commercial marketing logics. In practice, frame, fame and fear traps overlap and interact across different contexts, and the analysis uses the concept of a dialectic of anomaly and normality to highlight implications for future scholarship and practice.


Rice, C., Innes, M., & Ratcliffe, J. (2024). “Frame, Fame and Fear Traps: The Dialectic of Counter-Terrorism Strategic Communication.” Studies in Conflict & Terrorism, 1–21. https://doi.org/10.1080/1057610X.2024.2360669

Authors: Charis Rice, Martin Innes, Jenny Ratcliffe
https://doi.org/10.1080/1057610X.2024.2360669
Trust, and high control: an exploratory study of Counterproductive Work Behaviour in a high security organization

From journal abstract:

High security organizations utilize a fine balance between control and trust to maintain stability. Drawing on qualitative interviews with managers and employees concerning three Counterproductive Work Behaviour (CWB) incidents occurring within a “high control” organization, we explore the impact of this trust-control dynamic on individuals’ sensemaking, social relations and workplace behaviours. We explore Human Resource Management (HRM) control practices, contrasting levels of control (over and under-control), form (formal and informal), and consistency of control management, that variously destabilize the balance of trust and control. Framed by this dynamic, employees undertake CWB as a means of maintaining their trusting relationships, professional goals and well-being in an unpredictable workplace. We demonstrate the value of understanding the trust-control dynamic for CWB and identify potential lessons for prevention.


Searle, R. H. & Rice, C. (2024) Trust, and high control: an exploratory study of Counterproductive Work Behaviour in a high security organization, European Journal of Work and Organizational Psychology, DOI: 10.1080/1359432X.2024.2344870

Authors: Rosalind Searle, Charis Rice
https://www.tandfonline.com/doi/pdf/10.1080/1359432X.2024.2344870
How opposing ideological groups use online interactions to justify and mobilise collective action

The purpose of this pre-registered study was to investigate how different ideological groups justified and mobilised collective action online. We collected 6878 posts from the social media accounts of pro-Black Lives Matter (n = 13) and anti-Black Lives Matter (n = 9) groups who promoted collective action in the month after George Floyd's murder and the Black Lives Matter (BLM) protests and counter-protests. We used content analysis and natural language processing (NLP) to analyse the content and psychological function of the posts. We found that both groups perceived their action as ‘system-challenging’, with pro-BLM accounts focused more on outgroup actions to mobilise collective action, and anti-BLM accounts focused more on ingroup identity. The reverse pattern occurred when the accounts were attempting to justify action. The implications are that groups’ ideology and socio-structural position should be accounted for when understanding differences in how and why groups mobilise through online interactions.

(From the journal abstract)


Brown, O., Lowery, C., & Smith, L. G. E. (2022) How opposing ideological groups use online interactions to justify and mobilise collective action. European Journal of Social Psychology, 00, 1– 29. https://doi.org/10.1002/ejsp.2886

Authors: Olivia Brown, Laura G. E. Smith
https://doi.org/10.1002/ejsp.2886
Digital traces of offline mobilization

Since 2009, there has been an increase in global protests and related online activity. Yet, it is unclear how and why online activity is related to the mobilization of offline collective action. One proposition is that online polarization (or a relative change in intensity of posting mobilizing content around a salient grievance) can mobilize people offline. The identity-norm nexus and normative alignment models of collective action further argue that to be mobilizing, these posts need to be socially validated. To test these propositions, across two analyses, we used digital traces of online behavior and data science techniques to model people’s online and offline behavior around a mass protest. In Study 1a, we used Twitter behavior posted on the day of the protest by attendees or nonattendees (759 users; 7,592 tweets) to train and test a classifier that predicted, with 80% accuracy, who participated in offline collective action. Attendees used their mobile devices to plan logistics and broadcast their presence at the protest. In Study 1b, using the longitudinal Twitter data and metadata of a subset of users from Study 1a (209 users; 277,556 tweets), we found that participation in the protest was not associated with an individual’s online polarization over the year prior to the protest, but it was positively associated with the validation (“likes”) they received on their relevant posts. These two studies demonstrate that rather than being low cost or trivial, socially validated online interactions about a grievance are actually key to the mobilization and enactment of collective action.

(From the journal abstract)


Smith, L. G. E., Piwek, L., Hinds, J., Brown, O., & Joinson, A. (2023). Digital traces of offline mobilization. Journal of Personality and Social Psychology, 125(3), 496–518. https://doi.org/10.1037/pspa0000338

Authors: Laura G. E. Smith, Lukasz Piwek, Joanne Hinds, Olivia Brown, Adam Joinson
https://doi.org/10.1037/pspa0000338
Exploring cultural differences in eyewitness accounts using a self-administered reporting technique

In a globalised world, investigators often interact with witnesses from diverse cultural backgrounds. To date, there is a wealth of research on the use of evidence-based practices to facilitate recall and reporting in information elicitation contexts. However, research has been primarily conducted with participants from western (and typically individualistic) cultural contexts, ignoring the potential effects of cultural communication norms on memory reporting among other factors. We compared reports provided by two samples that contrast on the individualist-collectivist dimension (UK vs Lebanon). Participants (N = 118) witnessed a staged crime event and provided an account (in their native language) using a self-administered Timeline Technique or a Free Recall format, before responding to cued recall questions. As in previous research, UK participants reported more correct information when using the Timeline Technique compared to free recall. Contrary to hypotheses, participants in Lebanon provided a similar amount of information across reporting format conditions. Overall, Lebanese participants provided fewer correct details both in spontaneous self-administered reporting formats and in cued recall, compared to their UK counterparts. These findings have implications for information-gathering practices in cross-cultural interactions and highlight the (potential) need to modify existing techniques for different cultural contexts.

(From the journal abstract)


Hope, L., Kontogianni, F., et al. (2023) Exploring cultural differences in eyewitness accounts using a self-administered reporting technique, Psychology, Crime & Law, https://doi.org/10.1080/1068316X.2023.2279330

Authors: Lorraine Hope, Feni Kontogianni
https://doi.org/10.1080/1068316X.2023.2279330
The psychology of interoperability: A systematic review of joint working between the UK emergency services

Emergency responding requires effective interoperability, whereby different emergency teams combine efforts and expertise to contain and reduce the impact of an emergency. Within the United Kingdom, the capacity for the Emergency Services to be interoperable has been criticized by public enquiries. This systematic review had three goals to: (i) define interoperability; (ii) identify the structural principles that underpin interoperability and (iii) identify the psychological principles that outline how interoperability can be achieved. A PRISMA framework was used to identify 137 articles, including 94 articles from the systematic review, 15 articles from grey literature and 28 articles based on author expertise. We identified two structural principles of interoperability: (i) being able to communicate and exchange information effectively; and (ii) having a decentralized and flexible team network. We identified three psychological principles that informed how interoperability might be embedded in the team: (i) establishing trust between team members; (ii) developing secure team identities and (iii) building cohesive goals. We defined interoperability as a shared system of technology and teamwork built upon trust, identification, goals, communication and flexibility. Regular psychologically immersive training that targets these psychological principles will help to embed interoperability into the social fabric of multi-team systems operating in high-reliability organizations.

(From the journal abstract)


Power, N., Alcock, J., Philpot, R., & Levine, M. (2023). The psychology of interoperability: A systematic review of joint working between the UK emergency services. Journal of Occupational and Organizational Psychology, 00, 1–20. https://doi.org/10.1111/joop.12469

Authors: Nicola Power, Jennifer Alcock, Ricky Green, Mark Levine
https://bpspsychub.onlinelibrary.wiley.com/doi/full/10.1111/joop.12469
Obstacles and facilitators to intimate bystanders reporting violent extremism or targeted violence

The first people to suspect someone is planning an act of terrorism or violent extremism are often those closest to them. Encouraging friends or family to report an “intimate” preparing to perpetrate violence is a strategy for preventing violent extremist or targeted mass violence. We conducted qualitative-quantitative interviews with 123 diverse U.S. community members to understand what influences their decisions to report potential violent extremist or targeted mass violence. We used hypothetical scenarios adapted from studies in Australia, Canada, and the United Kingdom. Factors influencing reporting decisions include fears of causing harm to the potential violent actor, self, family, or relationships; not knowing when and how to report; mistrust of law enforcement; access to mental health services; and perceptions that law enforcement lacks prevention capabilities. White and non-White participants were concerned about law enforcement causing harm. Participants would contact professionals such as mental health before involving law enforcement and Black-identified participants significantly preferred reporting to non-law enforcement persons, most of whom are not trained in responding to targeted violence. However, participants would eventually involve law enforcement if the situation required. They preferred reporting in-person or by telephone versus on-line. We found no difference by the type of violent extremism or between ideologically motivated and non-ideologically motivated violence. This study informs intimate bystander reporting programmes in the U.S. To improve reporting, U.S. policymakers should attend to how factors like police violence shape intimate bystander reporting. Our socio-ecological model also situates intimate bystander reporting beside other population-based approaches to violence prevention.

(from the journal abstract)


Eisenman, D. P., Weine, S., Thomas, P., Grossman, M., Porter, N., Shah, N. D., Polutnik Smith, C., Brahmbhatt, Z. & Fernandes, M. (2023) Obstacles and facilitators to intimate bystanders reporting violent extremism or targeted violence, Critical Studies on Terrorism 10.1080/17539153.2023.2269011

Authors: Paul Thomas, Michele Grossman
https://doi.org/10.1080/17539153.2023.2269011
Lying through omitting information: examining the effect of a Model Statement interview protocol on verbal cues to deceit

Background/objectives: Practitioners frequently inform us that lying through omitting information is relevant to them, yet this topic has been largely ignored by verbal lie detection researchers. Method: In the present experiment participants watched a video recording of a secret meeting between three people. Truth tellers were instructed to recall the meeting truthfully, and lie tellers were instructed to pretend that one person (John) was not there. Participants were or were not exposed to a Model Statement during the interview. The dependent variables were ‘total details’ and ‘complications’. Results: Truth tellers reported more complications than lie tellers but lie tellers reported more details than truth tellers. The Model Statement resulted in more complications and details being reported. The Veracity x Model Statement interaction effect was not significant. In terms of self-reported strategies, the main veracity difference was that truth tellers were more inclined to ‘be detailed” than lie tellers. Discussion: We discuss the atypical finding (most details reported by lie tellers) and ideas for future research.

(From the journal abstract)


Leal, S., Vrij, A., Deeb, H., Burkhardt, J., Dabrowna, O. & Fisher, R. P. (2023). Verbal Cues to Deceit when Lying through Omitting Information: Examining the Effect of a Model Statement Interview Protocol. The European Journal of Psychology Applied to Legal Context, 15(1), 1 - 8. https://doi.org/10.5093/ejpalc2023a1

Authors: Aldert Vrij, Haneen Deeb
https://doi.org/10.5093/ejpalc2023a1
How researchers can make verbal lie detection more attractive for practitioners

Over the last 30 years deception researchers have changed their attention from observing nonverbal behaviour to analysing speech content. However, many practitioners we speak to are reluctant to make the change from nonverbal to verbal lie detection. In this article we present what practitioners believe is problematic about verbal lie detection: the interview style typically used is not suited for verbal lie detection; the most diagnostic verbal cue to deceit (total details) is not suited for lie detection purposes; practitioners are looking for signs of deception but verbal deception researchers are mainly examining cues that indicate truthfulness; cut-off points (decision rules to decide when someone is lying) do not exist; different verbal indicators are required for different types of lie; and verbal veracity indicators may be culturally defined. We discuss how researchers could address these problems.

(From the journal abstract)


Vrij, A., Fisher, R. P. & Leal, S. (2023) How researchers can make verbal lie detection more attractive for practitioners, Psychiatry, Psychology and Law, 30:3, 383-396, DOI: 10.1080/13218719.2022.2035842

Author: Aldert Vrij
https://doi.org/10.1080/13218719.2022.2035842
Actions speak louder than words: The Devil's Advocate questioning protocol in opinions about protester actions

The Devil's Advocate protocol has been developed to assist making veracity assessments when someone discusses their opinion. The present experiment focused on protester actions rather than controversial issues and also included an adapted version of the Verifiability Approach. Participants told the truth or lied about protester actions and the participants' answers to the eliciting opinion and Devil's Advocate questions were compared. The Devil's Advocate approach predicts the difference in answers (residue scores) to be more pronounced in truth tellers than in lie tellers in terms of quantity of the answers (number of words, details and arguments) and quality of the answers (plausibility, immediacy and clarity). The hypothesis was supported but only in terms of quality: Truth tellers' answers sounded more plausible and immediate and somewhat clearer than lie tellers' answers. Truth tellers also reported more digital verifiable sources than lie tellers.

(From the journal abstract)


Mann, S., Vrij, A., Deeb, H., Leal, S. (2022) Actions speak louder than words: The Devil's Advocate questioning protocol in opinions about protester actions, Applied Cognitive Psychology, https://doi.org/10.1002/acp.3979

Author: Aldert Vrij
https://doi.org/10.1002/acp.3979
Inoculating against the spread of Islamophobic and radical-Islamist disinformation

We report the results of a preregistered study that tested the effectiveness of inoculating participants against Islamophobic and radical-Islamist disinformation. Participants in the experimental (inoculation) condition watched a video that explained common rhetorical markers of radical-Islamist and Islamophobic disinformation that had been identified in an analysis of YouTube content. The information was presented in a neutral context not involving Islam and focused on analysis of the misleading argumentation. The control group watched a video about an unrelated topic. Participants were then exposed to target videos with “gateway” content that constituted an entry point to potential Islamist or Islamophobic radicalization. Both videos contained numerous items of disinformation. Participants then answered a variety of questions such as how likely they were to share the video, their level of agreement, and their perceived accuracy of the video. Participants who had received the inoculation displayed less agreement with the video content, perceived the video as less reliable, and were less likely to share it in comparison with participants in the control group. The study provides support for the use of argument-based inoculation in combatting extremist messages.

(From the journal abstract)


Lewandowsky, S., Yesilada, M. Inoculating against the spread of Islamophobic and radical-Islamist disinformation. Cogn. Research 6, 57 (2021). https://doi.org/10.1186/s41235-021-00323-z

Authors: Stephan Lewandowsky, Muhsin Yesilada
https://doi.org/10.1186/s41235-021-00323-z
Examining the efficacy of a digital version of the Self-Administered Interview

Objectives

The Self-Administered Interview (SAI©) is an investigative tool designed to facilitate the reporting of comprehensive initial statements by witnesses. Given increasing use of technology to communicate, many witnesses may prefer to provide investigators with accounts of what they have seen using online or mobile reporting platforms. Research shows that the SAI© elicits more accurate information from witnesses than other reporting formats. To date, however, the SAI© has only been tested in a paper-based format. The aim of the current research was to examine whether the benefits of the SAI© for witness reporting extend to digital reporting formats.

Method

In two experiments, we examined whether completing the SAI© on a computer or mobile device (as opposed to using a paper-based format) had any effect on the quantity or quality of information reported by mock witnesses. We also assessed whether the format of the initial report had any impact on performance in a delayed recall test.

Hypotheses

Based on available research on use of technology, we expected that witness accounts would be shorter when provided via mobile devices than via other formats. Drawing on past research outlined in the Introduction, we predicted that less detailed initial accounts would affect the quality of subsequent accounts.

Results

We found no differences between computer, mobile, or paper-based formats with respect to the quantity or quality of information reported in the SAI© or content of follow-up reports collected one-week later.

Conclusion

The findings suggest that administering the SAI© in online or mobile formats is unlikely to be detrimental to witness reporting. Given the time and resource costs associated with paper forms, as well as the additional functionality that digital presentation may afford, a digital SAI© may prove to be a useful investigative tool.

(From the journal abstract)


Gabbert, F., Hope, L., Horry, R., Drain, T. & Hughes, C. (2022) Examining the efficacy of a digital version of the Self-Administered Interview, Computers in Human Behavior Reports, https://doi.org/10.1016/j.chbr.2021.100159

Authors: Fiona Gabbert, Lorraine Hope
https://doi.org/10.1016/j.chbr.2021.100159
Integrating Insights About Human Movement Patterns from Digital Data into Psychological Sciences

Understanding people’s movement patterns has many important applications, from analyzing habits and social behaviors, to predicting the spread of disease. Information regarding these movements and their locations is now deeply embedded in digital data generated via smartphones, wearable sensors, and social-media interactions. Research has largely used data-driven modeling to detect patterns in people’s movements, but such approaches are often devoid of psychological theory and fail to capitalize on what movement data can convey about associated thoughts, feelings, attitudes, and behavior. This article outlines trends in current research in this area and discusses how psychologists can better address theoretical and methodological challenges in future work while capitalizing on the opportunities that digital movement data present. We argue that combining approaches from psychology and data science will improve researchers’ and policy makers’ abilities to make predictions about individuals’ or groups’ movement patterns. At the same time, an interdisciplinary research agenda will provide greater capacity to advance psychological theory.

(From the journal abstract)


Hinds, J., Brown, O., Smith, L. G. E., Piwek, L., Ellis, D. A., & Joinson, A. N. (2022). Integrating Insights About Human Movement Patterns From Digital Data Into Psychological Science. Current Directions in Psychological Science, 31(1), 88-95. https://doi.org/10.1177/09637214211042324

Authors: Olivia Brown, Laura G. E. Smith, David Ellis
https://doi.org/10.1177/09637214211042324
How the Content and Function of Online Interactions Relate to Endorsement of Conversative and Progressive Collective Actions

The purpose of this pre-registered study was to investigate how different ideological groups justified and mobilised collective action online. We collected 6878 posts from the social media accounts of pro-Black Lives Matter (n = 13) and anti-Black Lives Matter (n = 9) groups who promoted collective action in the month after George Floyd's murder and the Black Lives Matter (BLM) protests and counter-protests. We used content analysis and natural language processing (NLP) to analyse the content and psychological function of the posts. We found that both groups perceived their action as ‘system-challenging’, with pro-BLM accounts focused more on outgroup actions to mobilise collective action, and anti-BLM accounts focused more on ingroup identity. The reverse pattern occurred when the accounts were attempting to justify action. The implications are that groups’ ideology and socio-structural position should be accounted for when understanding differences in how and why groups mobilise through online interactions.

(From the journal abstract)


Brown, O., Lowery, C. & Smith, L. G. E. (2022) How opposing ideological groups use online interactions to justify and mobilise collective action, The European Journal of Social Psychology, https://doi.org/10.1002/ejsp.2886

Authors: Olivia Brown, Laura G. E. Smith
https://doi.org/10.1002/ejsp.2886
Online risk signals of offline terrorist offending

There has been a rise in the number of terrorist incidents in which social media use has been implicated in the planning and execution of the attack. Efforts to identify online risk signals of terrorist offending is challenging due to the existence of the specificity problem– that while many people express ideologically and hateful views, very few go on to commit terrorist acts. Here, we demonstrate that risk signals of terrorist offending can be identified in a sample of 119,473 online posts authored by 26 convicted right-wing extremists and 48 right-wing extremists who did not have convictions. Combining qualitative analysis with computational modelling, we show that it is not ideological or hateful content that indicates the risk of an offence, but rather content about violent action, operational planning, and logistics. Our findings have important implications for theories of mobilization and radicalization.

(From the journal abstract)


Brown, O., Smith, L. G. E., Davidson, B. I., Racek, D., & Joinson, A. (2023) Online risk signals of offline terrorist offending. PsyArXiv https://doi.org/10.31234/osf.io/hej3r

Authors: Olivia Brown, Adam Joinson, Laura G. E. Smith, Brittany Davidson
https://doi.org/10.31234/osf.io/hej3r
Cultural differences in the efficacy of unexpected questions, sketching, and timeline methods in eliciting cues to deception

Asking unexpected questions, asking the interviewee to sketch the room, and asking the interviewee to make a timeline are techniques that have been shown to help an interviewer detect deceit. However, evidence of the efficacy of these techniques comes from studies of North American and North-West European participants, who are on average more individualistic (i.e., value individual achievements and uniqueness over group achievements) than people from other parts of the world. In two experiments involving participants with individualistic and collectivistic cultural backgrounds, we provide a more culturally diverse test of these techniques. Specifically, this study describes two experiments that investigated these interviewing techniques with people who are recent migrants to the UK. Experiment 1 used the LIWC categories “I,” “we,” “cognitive processes,” and “social processes” as the dependent variables; Experiment 2 measured details provided in a sketch and a timeline. The results show no effects of veracity in either of these experiments, although various effects of cultural differences in the outcome variables were observed. This suggests that cues to deception may not necessarily generalize to people from different cultural backgrounds. These results highlight the importance of conducting lie detection research across different countries and cultures.

(From the journal abstract)


Tache, I., Warmelink, L., Taylor, P. & Hope, L. (2023) Cultural differences in the efficacy of unexpected questions, sketching, and timeline methods in eliciting cues to deception, Frontiers in Psychology. 14:1175333. doi:10.3389/fpsyg.2023.117533

Authors: Irina Tache, Lara Warmelink, Paul Taylor, Lorraine Hope
https://www.frontiersin.org/articles/10.3389/fpsyg.2023.1175333/full
A Diachronic Cross-Platforms Analysis of Violent Extremist Language in the Incel Online Ecosystem

The emergence and growth of incel subculture online has triggered a considerable body of research to date, most of which analyzing its worldview or mapping its position and connections within the broader manosphere. While this research has considerably enhanced our understanding of the incel phenomenon, it tends to offer a somewhat static, one-dimensional portrayal of what is—like all online subcultures and communities—a highly dynamic and multi-layered environment. Consequently, we lack sufficiently nuanced answers to what is arguably a critical question for law enforcement and academics alike: is this a violent extremist ideology? Using a uniquely extensive corpus covering a range of online spaces constitutive of the incelosphere spanning several years, we analyze the evolution of incel language across both time and platforms. Specifically, we test whether this language has grown more extreme over time as online spaces shutdown and others emerged. Our findings demonstrate that, while levels of violent extremist language do vary across the incelosphere, they have steadily increased in the main online spaces over the past 6 years. Further, we demonstrate that, while activity on these online spaces is responsive to offline events, the impact of these on violent extremist ideation is not uniform.

(From the Journal abstract)


Baele, S., Brace, L., & Ging, D. (2023) A Diachronic Cross-Platforms Analysis of Violent Extremist Language in the Incel Online Ecosystem, Terrorism and Political Violence, https://doi.org/10.1080/09546553.2022.2161373

Authors: Lewys Brace, Stephane Baele
https://doi.org/10.1080/21567689.2020.1732938
The problem with the internet: An affordance-based approach for psychological research on networked technologies

The internet is often viewed as the source of a myriad of benefits and harms. However, there are problems with using this notion of “the internet” and other high-level concepts to explain the influence of communicating via everyday networked technologies on people and society. Here, we argue that research on social influence in computer-mediated communication (CMC) requires increased precision around how and why specific features of networked technologies interact with and impact psychological processes and outcomes. By reviewing research on the affordances of networked technologies, we demonstrate how the relationship between features of “the internet” and “online behaviour” can be determined by both the affordances of the environment and the psychology of the user and community. To achieve advances in this field, we argue that psychological science must provide nuanced and precise conceptualisations, operationalisations, and measurements of “internet use” and “online behaviour”. We provide a template for how future research can become more systematic by examining how and why variables associated with the individual user, networked technologies, and the online community interact and intersect. If adopted, psychological science will be able to make more meaningful predictions about online and offline outcomes associated with communicating via networked technologies.


Olivia Brown, Laura G.E. Smith, Brittany I. Davidson, David A. Ellis,(2022) The problem with the internet: An affordance-based approach for psychological research on networked technologies, Acta Psychologica, Volume 228. 

Authors: Olivia Brown, Brittany Davidson, Laura G. E. Smith, David Ellis
https://doi.org/10.1016/j.actpsy.2022.103650
Fuzzy constructs in technology usage scales

The mass adoption of digital technologies raises questions about how they impact people and society. Associations between technology use and negative correlates (e.g., depression and anxiety) remain common. However, pre-registered studies have failed to replicate these findings. Regardless of direction, many designs rely on psychometric scales that claim to define and quantify a construct associated with technology engagement. These often suggest clinical manifestations present as disorders or addictions. Given their importance for research integrity, we consider what these scales might be measuring. Across three studies, we observe that many psychometric scales align with a single, identical construct despite claims they capture something unique. We conclude that many technology measures appear to measure a similar, poorly defined construct that sometimes overlaps with pre-existing measures of well-being. Social scientists should critically consider how they proceed methodologically and conceptually when developing psychometric scales in this domain to ensure research findings sit on solid foundations.


Brittany I. Davidson, Heather Shaw, David A. Ellis, (2022) Fuzzy constructs in technology usage scales, Computers in Human Behavior, Volume 133,

Authors: Brittany Davidson, Heather Shaw, David Ellis
https://doi.org/10.1016/j.chb.2022.107206
Cyber-enabled burglary of smart homes

Over the last few years, there has been a steady increase in smart home technology's pervasiveness, to the degree where consumer IoT is part of many homes. As our homes become complex cyber-physical spaces, the risk to our physical security from attacks originating in cyberspace becomes much more significant. Within the literature, there is much discussion about the technical vulnerabilities within the smart home. However, this is often not linked to a rich understanding of how an attacker could exploit them. In this paper, we focus on residential burglary and develop a rich understanding of the process by which residential burglary is committed and the effect of the smart home on this process. By combining two areas of the academic literature, residential burglary and smart-home security, this paper provides an academically grounded discussion that places the nascent vulnerabilities associated with the smart-home into the context of the process by which burglary is committed. The commission of residential burglary is a complex decision-making process, which the public often simplifies into planned or unplanned crimes; this is a dangerous oversimplification. The analysis identifies some increased risk during the target selection stage phase. However, in the short term, residential burglars are unlikely to exploit smart home technology routinely.


Hodges, Duncan. (2021). Cyber-Enabled Burglary of Smart Homes. Computers & Security. 110. 102418

Author: Duncan Hodges
https://doi.org/10.1016/j.cose.2021.102418
‘Language of lies’: Urgent issues and prospects in verbal lie detection research

Since its introduction into the field of deception detection, the verbal channel has become a rapidly growing area of research. The basic assumption is that liars differ from truth tellers in their verbal behaviour, making it possible to classify them by inspecting their verbal accounts. However, as noted in conferences and in private communication between researchers, the field of verbal lie detection faces several challenges that merit focused attention. The first author therefore proposed a workshop with the mission of promoting solutions for urgent issues in the field. Nine researchers and three practitioners with experience in credibility assessments gathered for 3 days of discussion at Bar-Ilan University (Israel) in the first international verbal lie detection workshop. The primary session of the workshop took place the morning of the first day. In this session, each of the participants had up to 10 min to deliver a brief message, using just one slide. Researchers were asked to answer the question: ‘In your view, what is the most urgent, unsolved question/issue in verbal lie detection?’ Similarly, practitioners were asked: ‘As a practitioner, what question/issue do you wish verbal lie detection research would address?’ The issues raised served as the basis for the discussions that were held throughout the workshop. The current paper first presents the urgent, unsolved issues raised by the workshop group members in the main session, followed by a message to researchers in the field, designed to deliver the insights, decisions, and conclusions resulting from the discussions.


Nahari, G., Ashkenazi, T., Fisher, R. P., Granhag, P. A., Hershkovitz, I., Masip, J., Meijer, E., Nisin, Z., Sarid, N., Taylor, P. J., Verschuere, B., & Vrij, A. (2019). Language of Lies: Urgent issues and prospects in verbal lie detection research. Legal and Criminological Psychology, 24, 1-23.

Authors: Galit Nahrari, Tzachi Ashkenazi, Ronald P. Fisher, Pär-Anders Granhag, Irit Hershkowitz, Jaume Masip, Ewout Meijer, Zvi Nisin, Paul Taylor, Bruno Verschuere, Aldert Vrij
https://doi.org/10.1111/lcrp.12148
The Relationship between Complications, Common Knowledge Details and Self-handicapping Strategies and Veracity: A Meta-analysis

Practitioners frequently inform us that variable ‘total details’ is not suitable for lie detection purposes in real life interviews. Practitioners cannot count the number of details in real time and the threshold of details required to classify someone as a truth teller or a lie teller is unknown. The authors started to address these issues by examining three new verbal veracity cues: complications, common knowledge details, and self-handicapping strategies. We present a meta-analysis regarding these three variables and compared the results with ‘total details’. Truth tellers reported more details (d = 0.28 to d = 0.45) and more complications (d = 0.51 to d = 0.62) and fewer common knowledge details (d = -0.40 to d = -0.46) and self-handicapping strategies (d = -0.37 to d = -0.50) than lie tellers. Complications was the best diagnostic veracity cue. The findings were similar for the initial free recall and the second recall in which only new information was examined. Four moderators (scenario, motivation, modality, and interview technique) did not affect the results. As a conclusion, complications in particular appear to be a good veracity indicator but more research is required. We included suggestions for such research.


Vrij, A., Palena, N., Leal, S., & Caso, L. (2021). The relationship between complications, common knowledge details and self-handicapping strategies and veracity: A meta-analysis. European Journal of Psychology Applied to Legal Context, 13 (2), 55-77

Authors: Aldert Vrij, Sharon Leal, Nicola Palena, Letizia Caso
https://doi.org/10.5093/ejpalc2021a7
Unraveling the Misconception About Deception and Nervous Behavior

In this article, we attempt to unravel the misconception about deception and nervous behavior. First we will cite research demonstrating that observers believe lie tellers display more nervous behaviors than truth tellers; that observers pay attention to nervous behaviors when they attempt to detect deception; and that lie tellers actually feel more nervous than truth tellers. This is all in alignment with a lie detection approach based on spotting nervous behaviors. We then will argue that the next, vital, step is missing: Research has found that lie tellers generally do not display more than truth tellers the nervous behaviors laypersons and professionals appear to focus on. If observers pay attention to nervous behaviors but lie tellers do not come across as being nervous, lie detection performance is expected to be poor. Research has supported this claim. We finally discuss ideas for research into lie detection based on non-verbal behaviors.


Vrij, A., & Fisher, R. P. (2020). Unravelling the misconception about deception and nervous behaviour. Frontiers in Psychology, section Personality and Social Psychology, 11, 1377

Authors: Aldert Vrij, Ronald P. Fisher
https://doi.org/10.3389/fpsyg.2020.01377
Extending the verifiability approach framework: The effect of initial questioning

The verifiability approach (VA) is a lie-detection tool that examines reported checkable details. Across two studies, we attempt to exploit liar's preferred strategy of repeating information by examining the effect of questioning adult interviewees before the VA. In Study 1, truth tellers (n = 34) and liars (n = 33) were randomly assigned to either an initial open or closed questioning condition. After initial questioning, participants were interviewed using the VA. In Study 2, truth tellers (n = 48) and liars (n = 48) were interviewed twice, with half of each veracity group randomly assigned to either the Information Protocol (an instruction describing the importance of reporting verifiable details) or control condition. Only truth tellers revised their initial statement to include verifiable detail. This pattern was most pronounced when initial questioning was open (Study 1) and when the information protocol was employed (Study 2). Thus, liar's preferred strategy of maintaining consistency between statements appears exploitable using the VA.


Harvey, A., Vrij, A., Leal, S., Sariktas, G., & Nahari, G. (2017). Extending the Verifiability Approach framework: Examining the effect of preliminary questioning on the VA procedure. Submitted to Applied Cognitive Psychology, 32, 787-804.

Authors: Aldert Vrij, Sharon Leal, Adam Charles Harvey, George Sarikas, Louise Jupe, Galit Nahrari
https://doi.org/10.1002/acp.3465
Psychological Perspectives on Interrogation

Proponents of “enhanced interrogation techniques” in the United States have claimed that such methods are necessary for obtaining information from uncooperative terrorism subjects. In the present article, we offer an informed, academic perspective on such claims. Psychological theory and research shows that harsh interrogation methods are ineffective. First, they are likely to increase resistance by the subject rather than facilitate cooperation. Second, the threatening and adversarial nature of harsh interrogation is often inimical to the goal of facilitating the retrieval of information from memory and therefore reduces the likelihood that a subject will provide reports that are extensive, detailed, and accurate. Third, harsh interrogation methods make lie detection difficult. Analyzing speech content and eliciting verifiable details are the most reliable cues to assessing credibility; however, to elicit such cues subjects must be encouraged to provide extensive narratives, something that does not occur in harsh interrogations. Evidence is accumulating for the effectiveness of rapport-based information-gathering approaches as an alternative to harsh interrogations. Such approaches promote cooperation, enhance recall of relevant and reliable information, and facilitate assessments of credibility. Given the available evidence that torture is ineffective, why might some laypersons, policymakers, and interrogation personnel support the use of torture? We conclude our review by offering a psychological perspective on this important question.


Vrij, A., Meissner, C. A, Fisher, R. P., Kassin, S. M., Morgan III, A., & Kleinman, S. (2017).  Psychological perspectives on interrogation.  Perspectives on Psychological Science, 12, 927-955.

Authors: Aldert Vrij, Christian Meissner, Ronald P. Fisher, Saul M Kassin, Charles A Morgan III, Steven M Kleinman
https://doi.org/10.1177%2F1745691617706515
A cognitive approach to lie detection: A metaanalysis

Introduction. This article provides a meta-analysis of a new, cognitive approach to (non-)verbal lie detection. This cognitive lie detection approach consists of three techniques: (1) imposing cognitive load, (2) encouraging interviewees to say more, and (3) asking unexpected questions.

Method. A meta-analysis was carried out on studies using the cognitive approach, 14 of which directly compared the cognitive approach to a standard approach.

Results. The cognitive lie detection approach produced superior accuracy results in truth detection (67%), lie detection (67%), and total detection (truth and lie detection combined, 71%) compared to a traditional standard approach (truth detection: 57%; lie detection: 47%; total detection: 56%).

Conclusions. Practitioners may find it useful to use a cognitive lie detection approach in their daily practice.


Vrij, A., Fisher, R., Blank, H. (2017). A cognitive approach to lie detection: A meta-analysis. Legal and Criminological Psychology, 22, 1-21.

Authors: Aldert Vrij, Ronald P. Fisher, Hartmund Blank
https://doi.org/10.1111/lcrp.12088
Language Style Matching : A Comprehensive List of Articles and Tools

Language style matching (LSM) is a technique in behavioural analytics which assess the stylistic similarities in language use across groups and individuals. The procedure targets the similarity of functions words, analysing the way people use language rather than the content. Function words consist of pronouns, articles, conjunctions, prepositions, auxiliary verbs e.t.c. which have a syntactical role in language. To assess the similarity of language use between interlocutors, the percentage of function words used can be compared within and across conversations using a metric designed to calculate the matching of specific word categories and overall LSM (Ireland et al., 2011) . It is also possible to assess language style matching to a group’s aggregate style. High language style matching is an indicator of interpersonal and group mimicry and has been shown to influence psychological factors and behavioural outcomes. These are listed in this preprint and categorised by topic. The list aims to be a complete summary of the existing literature to date exploring LSM. Therefore, please email the author if there are any projects and tools not listed below.


Shaw, H., Taylor, P., Conchie, S., & David Alexander Ellis, D. (2019, Mar 6). Language Style Matching: A Comprehensive List of Articles and Tools

Authors: Heather Shaw, Paul Taylor, Stacey Conchie, David Ellis
https://doi.org/10.31234/osf.io/yz4br
Reading Lies: Nonverbal Communication and Deception

The relationship between nonverbal communication and deception continues to attract much interest, but there are many misconceptions about it. In this review, we present a scientific view on this relationship. We describe theories explaining why liars would behave differently from truth tellers, followed by research on how liars actually behave and individuals’ ability to detect lies. We show that the nonverbal cues to deceit discovered to date are faint and unreliable and that people are mediocre lie catchers when they pay attention to behavior. We also discuss why individuals hold misbeliefs about the relationship between nonverbal behavior and deception—beliefs that appear very hard to debunk. We further discuss the ways in which researchers could improve the state of affairs by examining nonverbal behaviors in different ways and in different settings than they currently do.

(From the journal abstract)


Vrij, A., Hartwig, M., & Granhag, P. A. (2018). Reading lies: Nonverbal communication and deception. Annual Review of Psychology, 70, 297-315. Doi: annurev-psych-010418-103135

Authors: Aldert Vrij, Pär-Anders Granhag
10.1146/annurev-psych-010418-103135
Bystander reporting to prevent violent extremism and targeted violence: learning from practitioners

The willingness of friends or family to share concerns about an ‘intimate’ preparing to perpetrate public, mass violence, such as violent extremism or targeted violence, is considered a possible part of preventative strategies. To understand what is needed to help intimate bystanders share information on potential acts of violent extremism or targeted violence, we conducted 25 semi-structured qualitative interviews with experts in intimate bystander reporting, including law enforcement, social service and mental health providers, faith-based leaders, staff in school threat assessment programs, and community practitioners in California and Illinois. Results showed reporting was impeded by multiple factors, including lack of knowledge about violent extremism and reporting processes, fear of being incorrect, difficulty distinguishing between violent extremism and mental illness, low trust in law enforcement, and lack of standardized reporting processes. Practitioners said reporting could be improved by several interventions, including increasing awareness about reporting processes, improving reporting methods and policies, training community members who can take reports, and increasing trust between community members and law enforcement. Improving bystander reporting for targeted violence and violent extremism in the U.S. requires collaboratively strengthening law enforcement and community capacities based on sound theory, best practices, and monitoring and evaluation.

(From the journal abstract)


David P. Eisenman, Stevan Weine, Nilpa D. Shah, Nicole V. Jones, Chloe Polutnik Smith, Paul Thomas & Michele Grossman (2022): Bystander reporting to prevent violent extremism and targeted violence: learning from practitioners, Behavioral Sciences of Terrorism and Political Aggression, DOI: 10.1080/19434472.2022.2130960

Authors: Paul Thomas, Michele Grossman, Stevan Weine, Nilpa D Shah, Nicole V Jones, Chloe Polutnik Smith, David P Eisenman
https://www.tandfonline.com/doi/full/10.1080/19434472.2022.2130960
CLICKA: Collecting and leveraging identity cues with keystroke dynamics

The way in which IT systems are usually secured is through the use of username and password pairs. However, these credentials are all too easily lost, stolen or compromised. The use of behavioural biometrics can be used to supplement these credentials to provide a greater level of assurance in the identity of an authenticated user. However, user behaviours can also be used to ascertain other identifiable information about an individual. In this paper we build upon the notion of keystroke dynamics (the analysis of typing behaviours) to infer an anonymous user’s name and predict their native language. This work found that there is a discernible difference in the ranking of bigrams (based on their timing) contained within the name of a user and those that are not. As a result we propose that individuals will reliably type information they are familiar with in a discernibly different way. In our study we found that it should be possible to identify approximately a third of the bigrams forming an anonymous users name purely from how (not what) they type.

Authors: Oli Buckley, Duncan Hodges
https://doi.org/10.1016/j.cose.2022.102780
The Enabling Role of Internal Organizational Communication in Insider Threat Activity – Evidence From a High Security Organization

This paper explores the role of internal communication in one under-researched form of organizational crisis, insider threat – threat to an organization, its people or resources, from those who have legitimate access. In this case study, we examine a high security organization, drawing from in-depth interviews with management and employees concerning the organizational context and a real-life incident of insider threat. We identify the importance of three communication flows (top-down, bottom-up, and lateral) in explaining, and in this case, enabling, insider threat. Derived from this analysis, we draw implications for communication and security scholars, as well as practitioners, concerning: the impact of unintentional communication, the consequences of selective silence and the divergence in levels of shared understanding of security among different groups within an organization.

(From the journal abstract)


  Rice, C., & Searle, R. H. (2022). ‘The Enabling Role of Internal Organizational Communication in Insider Threat Activity – Evidence From a High Security Organization.’ Management Communication Quarterly. 

Authors: Charis Rice, Rosalind Searle
https://doi.org/10.1177%2F08933189211062250
An Inventory of Problems–29 (IOP–29) study investigating feigned schizophrenia and random responding in a British community sample

Compared to other Western countries, malingering research is still relatively scarce in the United Kingdom, partly because only a few brief and easy-to-use symptom validity tests (SVTs) have been validated for use with British test-takers. This online study examined the validity of the Inventory of Problems–29 (IOP–29) in detecting feigned schizophrenia and random responding in 151 British volunteers. Each participant took three IOP–29 test administrations: (a) responding honestly; (b) pretending to suffer from schizophrenia; and (c) responding at random. Additionally, they also responded to a schizotypy measure (O-LIFE) under standard instruction. The IOP–29’s feigning scale (FDS) showed excellent validity in discriminating honest responding from feigned schizophrenia (AUC = .99), and its classification accuracy was not significantly affected by the presence of schizotypal traits. Additionally, a recently introduced IOP–29 scale aimed at detecting random responding (RRS) demonstrated very promising results.

(From the journal abstract)


Winters, C. L., Giromini, L., Crawford, T. J., Ales, F., Viglione, D. J., & Warmelink, L. (2020). An Inventory of Problems–29 (IOP–29) study investigating feigned schizophrenia and random responding in a British community sample. Psychiatry, Psychology and Law, 1–20.

https://doi.org/10.1080/13218719.2020.1767720
Behavioral consistency in the digital age

Efforts to infer personality from digital footprints have focused on behavioral stability at the trait level without considering situational dependency. We repeat Shoda, Mischel, and Wright’s (1994) classic study of intraindividual consistency with data on 28,692 days of smartphone usage by 780 people. Using per app measures of ‘pickup’ frequency and usage duration, we found that profiles of daily smartphone usage were significantly more consistent when taken from the same user than from different users (d > 1.46). Random forest models trained on 6 days of behavior identified each of the 780 users in test data with 35.8% / 38.5% (pickup / duration) accuracy. This increased to 73.5% / 75.3% when success was taken as the user appearing in the top 10 predictions (i.e., top 1%). Thus, situation-dependent stability in behavior is present in our digital lives and its uniqueness provides both opportunities and risks to privacy.

(From the journal abstract)


Shaw, H., Taylor, P., Ellis, D. A., & Conchie, S. (2021). Behavioral consistency in the digital age [Preprint]. PsyArXiv.

Authors: Heather Shaw, Paul Taylor, David Ellis, Stacey Conchie
https://doi.org/10.31234/osf.io/r5wtn
Quantifying smartphone “use”: Choice of measurement impacts relationships between “usage” and health

Problematic smartphone scales and duration estimates of use dominate research that considers the impact of smartphones on people and society. However, issues with conceptualization and subsequent measurement can obscure genuine associations between technology use and health. Here, we consider whether different ways of measuring “smartphone use,” notably through problematic smartphone use (PSU) scales, subjective estimates, or objective logs, lead to contrasting associations between mental and physical health. Across two samples including iPhone (n = 199) and Android (n = 46) users, we observed that measuring smartphone interactions with PSU scales produced larger associations between mental health when compared with subjective estimates or objective logs. Notably, the size of the relationship was fourfold in Study 1, and almost three times as large in Study 2, when relying on a PSU scale that measured smartphone “addiction” instead of objective use. Further, in regression models, only smartphone “addiction” scores predicted mental health outcomes, whereas objective logs or estimates were not significant predictors. We conclude that addressing people’s appraisals including worries about their technology usage is likely to have greater mental health benefits than reducing their overall smartphone use. Reducing general smartphone use should therefore not be a priority for public health interventions at this time.

(From the journal abstract)


Shaw, H., Ellis, D. A., Geyer, K., Davidson, B. I., Ziegler, F. V., & Smith, A. (2020). Quantifying smartphone “use”: Choice of measurement impacts relationships between “usage” and health. Technology, Mind, and Behavior, 1(2).

https://doi.org/10.1037/tmb0000022
The Rise of Consumer Health Wearables: Promises and Barriers

Will consumer wearable technology ever be adopted or accepted by the medical community? Patients and practitioners regularly use digital technology (e.g., thermometers and glucose monitors) to identify and discuss symptoms. In addition, a third of general practitioners in the United Kingdom report that patients arrive with suggestions for treatment based on online search results. However, consumer health wearables are predicted to become the next “Dr Google.” One in six (15%) consumers in the United States currently uses wearable technology, including smartwatches or fitness bands. While 19 million fitness devices are likely to be sold this year, that number is predicted to grow to 110 million in 2018. As the line between consumer health wearables and medical devices begins to blur, it is now possible for a single wearable device to monitor a range of medical risk factors. Potentially, these devices could give patients direct access to personal analytics that can contribute to their health, facilitate preventive care, and aid in the management of ongoing illness. However, how this new wearable technology might best serve medicine remains unclear.

(From the journal abstract)


Piwek, L., Ellis, D. A., Andrews, S., & Joinson, A. (2016). The Rise of Consumer Health Wearables: Promises and Barriers. PLOS Medicine, 13(2), e1001953.

Authors: Lukasz Piwek, David Ellis, Adam Joinson
https://doi.org/10.1371/journal.pmed.1001953
Understanding the Psychological Process of Avoidance-Based Self-Regulation on Facebook

In relation to social network sites, prior research has evidenced behaviors (e.g., censoring) enacted by individuals used to avoid projecting an undesired image to their online audiences. However, no work directly examines the psychological process underpinning such behavior. Drawing upon the theory of self-focused attention and related literature, a model is proposed to fill this research gap. Two studies examine the process whereby public self-awareness (stimulated by engaging with Facebook) leads to a self-comparison with audience expectations and, if discrepant, an increase in social anxiety, which results in the intention to perform avoidance-based self-regulation. By finding support for this process, this research contributes an extended understanding of the psychological factors leading to avoidance-based regulation when online selves are subject to surveillance.

(From the journal abstract)


Marder, B., Houghton, D., Joinson, A., Shankar, A., & Bull, E. (2016). Understanding the Psychological Process of Avoidance-Based Self-Regulation on Facebook. Cyberpsychology, Behavior, and Social Networking, 19(5), 321–327.

https://doi.org/10.1089/cyber.2015.0564
The development of structured guidelines for assessing risk in extremist offenders

This paper describes a methodology developed by the National Offender Management Service (NOMS) to assess risk and needs in convicted extremist offenders in England and Wales, and for the assessment of those offenders for whom there are credible concerns about their potential to commit such offences. A methodology was needed to provide an empirically-based systematic and transparent approach to the assessment of risk to inform proportionate risk management; increase understanding and confidence amongst front-line staff and decision-makers, and facilitate effective and targeted intervention. It outlines how the methodology was developed, the nature of the assessment, its theoretical underpinnings, the challenges faced and how these have been addressed. Learning from casework with offenders, from government commissioned research and the wider literature is presented in the form of 22 general factors (with an opportunity to capture additional idiosyncratic factors, i.e., 22+) that contribute to an individual formulation of risk and needs that bears on three dimensions of engagement, intent and capability. The relationship of this methodology, the Extremism Risk Guidelines (ERG 22+) with comparable guidelines, the Violent Extremism Risk Assessment 2 (VERA version 2) and the Multi-Level Guidelines (MLG), is also discussed. This paper also considers the ERG’s utility, validity and limitations.

(From the journal abstract)


Lloyd, M., & Dean, C. (2015). The development of structured guidelines for assessing risk in extremist offenders. Journal of Threat Assessment and Management, 2(1), 40–52.

https://doi.org/10.1037/tam0000035
An Evidence Synthesis of Covert Online Strategies Regarding Intimate Partner Violence

This systematic review synthesizes evidence of how people use the internet to deploy covert strategies around escaping from, or perpetrating, intimate partner violence (IPV). Online tools and services can facilitate individuals leaving abusive relationships, yet they can also act as a barrier to departure. They may also enable abusive behaviors. A comprehensive literature search of published and unpublished studies in electronic databases was conducted. Two researchers independently screened abstracts and full texts for study eligibility and evaluated the quality of included studies. The systematic review includes 22 studies (9 qualitative and 11 cross-sectional studies, a randomized control trial [RCT] and a nonrandomized study [NRS]) published between 2004 and 2017. Four covert behaviors linked to covert online strategies around IPV were identified: presence online, granular control, use of digital support tools and services, and stalking and surveillance. The same technology that provides individuals with easy access to information and supportive services related to IPV, such as digital devices, tools, and services, also enables perpetrators to monitor or harass their partners. This review takes a rigorous interdisciplinary approach to synthesizing knowledge on the covert strategies adopted by people in relation to IPV. It has particular relevance to practitioners who support survivors in increasing awareness of the role of digital technologies in IPV, to law enforcement agencies in identifying new forms of evidence of abuse, and in enabling designers of online/social media applications to take the needs and vulnerabilities of IPV survivors into account.

(From the journal abstract)


Grimani, A., Gavine, A., & Moncur, W. (2020b). An Evidence Synthesis of Covert Online Strategies Regarding Intimate Partner Violence. Trauma, Violence, & Abuse, 152483802095798.

Authors: Aikaterini Grimani, Anna Gavine, Wendy Moncur
https://doi.org/10.1177/1524838020957985
An evidence synthesis of strategies, enablers and barriers for keeping secrets online regarding the procurement and supply of illicit drugs

This systematic review attempts to understand how people keep secrets online, and in particular how people use the internet when engaging in covert behaviours and activities regarding the procurement and supply of illicit drugs. With the Internet and social media being part of everyday life for most people in western and non-western countries, there are ever-growing opportunities for individuals to engage in covert behaviours and activities online that may be considered illegal or unethical. A search strategy using Medical Subject Headings terms and relevant key words was developed. A comprehensive literature search of published and unpublished studies in electronic databases was conducted. Additional studies were identified from reference lists of previous studies and (systematic) reviews that had similar objectives as this search, and were included if they fulfilled our inclusion criteria. Two researchers independently screened abstracts and full-texts for study eligibility and evaluated the quality of included studies. Disagreements were resolved by a consensus procedure. The systematic review includes 33 qualitative studies and one cross-sectional study, published between 2006 and 2018. Five covert behaviours were identified: the use of communication channels; anonymity; visibility reduction; limited posts in public; following forum rules and recommendations. The same technologies that provide individuals with easy access to information, such as social networking sites and forums, digital devices, digital tools and services, also increase the prevalence of inaccurate information, loss of privacy, identity theft and disinhibited communication. This review takes a rigorous interdisciplinary approach to synthesising knowledge on the strategies adopted by people in keeping secrets online. Whilst the focus is on the procurement and supply of illicit drugs, this knowledge is transferrable to a range of contexts where people keep secrets online. It has particular significance for those who design online/social media applications, and for law enforcement and security agencies.

(From the journal abstract)


Grimani, A., Gavine, A., & Moncur, W. (2020a). An evidence synthesis of strategies, enablers and barriers for keeping secrets online regarding the procurement and supply of illicit drugs. International Journal of Drug Policy, 75, 102621.

Authors: Aikaterini Grimani, Anna Gavine, Wendy Moncur
https://doi.org/10.1016/j.drugpo.2019.102621
A simple location-tracking app for psychological research

Location data gathered from a variety of sources are particularly valuable when it comes to understanding individuals and groups. However, much of this work has relied on participants’ active engagement in regularly reporting their location. More recently, smartphones have been used to assist with this process, but although commercial smartphone applications are available, these are often expensive and are not designed with researchers in mind. To overcome these and other related issues, we have developed a freely available Android application that logs location accurately, stores the data securely, and ensures that participants can provide consent or withdraw from a study at any time. Further recommendations and R code are provided in order to assist with subsequent data analysis.

(From the journal abstract)


Geyer, K., Ellis, D. A., & Piwek, L. (2019). A simple location-tracking app for psychological research. Behavior Research Methods, 51(6), 2840–2846.

Authors: Kristoffer Geyer, David Ellis, Lukasz Piwek
https://doi.org/10.3758/s13428-018-1164-y
Measurement practices exacerbate the generalizability crisis: Novel digital measures can help

Psychology’s tendency to focus on confirmatory analyses before ensuring constructs are clearly defined and accurately measured is exacerbating the generalizability crisis. Our growing use of digital behaviors as predictors has revealed the fragility of subjective measures and the latent constructs they scaffold. However, new technologies can provide opportunities to improve conceptualizations, theories, and measurement practices.

(From the journal abstract)


Davidson, B. I., Ellis, D. A., Stachl, C., Taylor, P., & Joinson, A. (2021). Measurement practices exacerbate the generalizability crisis: Novel digital measures can help [Preprint]. PsyArXiv.

https://doi.org/10.31234/osf.io/8abzy
Immersive simulations with extreme teams

Extreme teams (ETs) work in challenging, high pressured contexts, where poor performance can have severe consequences. These teams must coordinate their skill sets, align their goals, and develop shared awareness, all under stressful conditions. How best to research these teams poses unique challenges as researchers seek to provide applied recommendations while conducting rigorous research to test how teamwork models work in practice. In this article, we identify immersive simulations as one solution to this, outlining their advantages over existing methodologies and suggesting how researchers can best make use of recent advances in technology and analytical techniques when designing simulation studies. We conclude that immersive simulations are key to ensuring ecological validity and empirically reliable research with ETs.

(From the journal abstract)


Brown, O., Power, N., & Conchie, S. M. (2020). Immersive simulations with extreme teams. Organizational Psychology Review, 10(3–4), 115–135.

Authors: Olivia Brown, Nicola Power, Stacey Conchie
https://doi.org/10.1177/2041386620926037
To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit

We present a new signal for detecting deception: full body motion. Previous work on detecting deception from body movement has relied either on human judges or on specific gestures (such as fidgeting or gaze aversion) that are coded by humans. While this research has helped to build the foundation of the field, results are often characterized by inconsistent and contradictory findings, with small-stakes lies under lab conditions detected at rates little better than guessing. We examine whether a full body motion capture suit, which records the position, velocity, and orientation of 23 points in the subject’s body, could yield a better signal of deception. Interviewees of South Asian (n = 60) or White British culture (n = 30) were required to either tell the truth or lie about two experienced tasks while being interviewed by somebody from their own (n = 60) or different culture (n = 30). We discovered that full body motion–the sum of joint displacements–was indicative of lying 74.4% of the time. Further analyses indicated that including individual limb data in our full body motion measurements can increase its discriminatory power to 82.2%. Furthermore, movement was guilt- and penitential-related, and occurred independently of anxiety, cognitive load, and cultural background. It appears that full body motion can be an objective nonverbal indicator of deceit, showing that lying does not cause people to freeze.

(From the journal abstract)


Zee, S. van der, Poppe, R., Taylor, P. J., & Anderson, R. (2019). To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit. PLOS ONE, 14(4), e0215000.

https://doi.org/10.1371/journal.pone.0215000
Combining Verbal Veracity Assessment Techniques to Distinguish Truth Tellers from Lie Tellers

Cognitive Credibility Assessment (CCA) is a verbal lie detection tool consisting of several interview techniques. These techniques have been examined separately but never together. Reflecting the dynamic nature of CCA we combined several of the techniques (free recall followed by a model statement, followed by a reverse order instruction, and followed by a sketch instruction). We examined the new information provided after each stage of the interview and also compared the information provided in the initial recall with the information provided after the entire interview. A total of 47 truth tellers and 47 lie tellers went on a mission. Truth tellers were asked to report their mission truthfully, whereas lie tellers were requested to lie about several aspects of the mission. We measured the total units of information (total details) provided in the interview and the number of complications reported. The results indicate that the pre-registered hypothesis (Hypothesis 1) was supported for complications. Truth tellers reported more complications than lie tellers in each stage of the interview and the difference was more pronounced after the entire interview than after the free recall. As a conclusion, CCA was an effective lie detection method when complications were taken into account.

(From the journal abstract)


Vrij, A., Mann, S., Leal, S., & Fisher, R. P. (2020). Combining Verbal Veracity Assessment Techniques to Distinguish Truth Tellers from Lie Tellers. The European Journal of Psychology Applied to Legal Context, 13(1), 9–19.

Authors: Aldert Vrij, Samantha Mann, Sharon Leal, Ronald P. Fisher
https://doi.org/10.5093/ejpalc2021a2
‘Please tell me all you remember’: A comparison between British and Arab interviewees’ free narrative performance and its implications for lie detection

We examined how much information British and Arab truth tellers and lie tellers volunteer in an initial free narrative. Based on cultural differences in communication styles we predicted that British interviewees would report more details and more complications than Arab interviewees (culture main effect). We further predicted that truth tellers would report more details and complications than lie tellers (veracity main effect), particularly in the British sample (Veracity × Culture interaction effect). A total of 78 British and 76 Israeli-Arab participants took part. The experiment was carried out at a British university and an Israeli university. Participants carried out a mission. Truth tellers were instructed to report the mission truthfully in a subsequent interview whereas lie tellers were asked to lie about certain aspects of the mission. The three hypotheses were supported for details, whereas for complications only the predicted veracity main effect occurred.

(From the journal abstract)


Vrij, A., Leal, S., Mann, S., Vernham, Z., Dalton, G., Serok-Jeppa, O., Rozmann, N., Nahari, G., & Fisher, R. P. (2020). ‘Please tell me all you remember’: A comparison between British and Arab interviewees’ free narrative performance and its implications for lie detection. Psychiatry, Psychology and Law, 1–14.

Authors: Aldert Vrij, Sharon Leal, Samantha Mann, Zarah Vernham, Ronald P. Fisher
https://doi.org/10.1080/13218719.2020.1805812
Analysing openly recorded preinterview deliberations to detect deceit in collective interviews

Sham marriages occur frequently, and to detect them, partners are sometimes interviewed together. We examined an innovative method to detect deceit in such interviews. Fifty-three pairs of interviewees, either friends (truth tellers) or pretended to be friends (liars), were interviewed about their friendship. Just before the interview, they received the questions that would be asked in the interview and were invited to prepare the answers. We told them that these preinterview deliberations would be recorded. Based on the transcripts, we analysed cues to truthfulness (cues expected to be expressed more by truth tellers) and cues to deceit (cues expected to be expressed more by liars). Truth tellers and liars differed from each other, particularly regarding expressing cues to truthfulness. Preinterview deliberations that are recorded with awareness of the interviewees can be used for lie detection purposes. We discuss further venues in this new line of research.

(From the journal abstract)


Vrij, A., Jupe, L. M., Leal, S., Vernham, Z., & Nahari, G. (2020). Analysing openly recorded preinterview deliberations to detect deceit in collective interviews. Applied Cognitive Psychology, 34(1), 132–141.

https://doi.org/10.1002/acp.3601
Unraveling the Misconception About Deception and Nervous Behavior

In this article, we attempt to unravel the misconception about deception and nervous behavior. First we will cite research demonstrating that observers believe lie tellers display more nervous behaviors than truth tellers; that observers pay attention to nervous behaviors when they attempt to detect deception; and that lie tellers actually feel more nervous than truth tellers. This is all in alignment with a lie detection approach based on spotting nervous behaviors. We then will argue that the next, vital, step is missing: Research has found that lie tellers generally do not display more than truth tellers the nervous behaviors laypersons and professionals appear to focus on. If observers pay attention to nervous behaviors but lie tellers do not come across as being nervous, lie detection performance is expected to be poor. Research has supported this claim. We finally discuss ideas for research into lie detection based on non-verbal behaviors.

(From the journal abstract)


Vrij, A., & Fisher, R. P. (2020). Unraveling the Misconception About Deception and Nervous Behavior. Frontiers in Psychology, 11, 1377.

Authors: Aldert Vrij, Ronald P. Fisher
https://doi.org/10.3389/fpsyg.2020.01377
Which lie detection tools are ready for use in the criminal justice system?

We introduce ‘arousal based’ lie detection tools (the Behavior Analysis Interview, the Comparison Question polygraph Test, CQT) and ‘cognition based’ lie detection tools (imposing cognitive load, encouraging interviewees to say more, asking unexpected questions, Strategic Use of Evidence, Verifiability Approach and Concealed Information polygraph Test, CIT), and discuss whether they are ready for use in investigative interviews. We developed ten criteria on which to judge their suitability. The two arousal-based techniques (frequently used) fall short on numerous criteria. There are too many problems associated with the imposing cognitive load technique, but the other cognitive techniques are ready for use (encouraging interviewees to say more and Strategic Use of Evidence) or ready for use if they continue to receive support in empirical research (asking unexpected questions and Verifiability Approach). The CIT polygraph test cannot be included in a standard investigative interview but can be useful in addition to investigative interviewing.

(From the journal abstract)


Vrij, A., & Fisher, R. P. (2016). Which lie detection tools are ready for use in the criminal justice system? Journal of Applied Research in Memory and Cognition, 5(3), 302–307.

Authors: Aldert Vrij, Ronald P. Fisher
https://doi.org/10.1016/j.jarmac.2016.06.014
Plausibility: A Verbal Cue to Veracity worth Examining?

Truth tellers sound more plausible than lie tellers. Plausibility ratings do not require much time or cognitive resources, but a disadvantage is that it is measured subjectively on Likert scales. The aim of the current paper was to understand if plausibility can be predicted by three other verbal veracity cues that can be measured objectively by counting their frequency of occurrence: details, complications, and verifiable sources. If these objective cues could predict plausibility, observers could be instructed to pay attention to them when judging plausibility, which would make plausibility ratings somewhat more objective. We therefore re-analysed five existing datasets; all of them included plausibility, details and complications and two of them also verifiable sources as dependent variables. Plausibility was positively correlated with all three other tested cues, but mostly predicted by complications and verifiable sources, explaining on average almost 40% of the variance. Plausibility showed larger effect sizes in distinguishing truth tellers from lie tellers than the three other cues, perhaps because the plausibility cue consists of multiple components (complications and verifiable sources). Research has shown that the cues that showed the strongest relationship with veracity typically consisted of multiple components.

(From the journal abstract)


Vrij, A., Deeb, H., Leal, S., Granhag, P.-A., & Fisher, R. P. (2021). Plausibility: A Verbal Cue to Veracity worth Examining? The European Journal of Psychology Applied to Legal Context, 13(2), 47–53.

Authors: Aldert Vrij, Haneen Deeb, Sharon Leal, Pär-Anders Granhag, Ronald P. Fisher
https://doi.org/10.5093/ejpalc2021a4
A re-analysis that supports our main results: A reply to Levine et al

Levine et al. (2018) criticized our meta-analysis, but their conclusion was the same as ours: The cognitive approach to lie detection results in a modest improvement. We address and dismiss Levine et al.'s (2018) three criticisms. Regarding the ‘confound’, in our meta-analysis we averaged the results of two cells on statistical grounds, which does not constitute a confound in statistical terms. Regarding ‘aberrant controls’, that depends entirely on the benchmarks selected and type of statistical test and meta-analysis used. Regarding ‘unreliable data’, the claim that there is a positive relationship between ‘unreliable’ data and total accuracy in the cognitive lie detection conditions is not even supported by their own data (= .16). We conclude with a request to Levine et al. to focus on our shared aim: to develop interview protocols that enable lie detection.

(From the journal abstract)


Vrij, A., Blank, H., & Fisher, R. P. (2018). A re-analysis that supports our main results: A reply to Levine et al . Legal and Criminological Psychology, 23(1), 20–23.

Authors: Aldert Vrij, Ronald P. Fisher
https://doi.org/10.1111/lcrp.12121
The impact of rapport on intelligence yield: Police source handler telephone interactions with covert human intelligence sources

Covert Human Intelligence Sources (CHIS) provide unique access to criminals and organised crime groups, and their collection of intelligence is vital to understanding England and Wales’ threat picture. Rapport is essential to the establishment and maintenance of effective professional relationships between source handlers and their CHIS. Thus, rapport-based interviewing is a fundamental factor to maximising intelligence yield. The present research gained unprecedented access to 105 real-life audio recorded telephone interactions between England and Wales police source handlers and CHIS. This research quantified both the rapport component behaviours (e.g., attention, positivity, and coordination) displayed by the source handler and the intelligence yielded from the CHIS, in order to investigate the frequencies of these rapport components and their relationship to intelligence yield. Overall rapport, attention and coordination significantly correlated with intelligence yield, while positivity did not. Attention was the most frequently used component of rapport, followed by positivity, and then coordination.

(From the journal abstract)


Nunan, J., Stanier, I., Milne, R., Shawyer, A., Walsh, D., & May, B. (2020). The impact of rapport on intelligence yield: Police source handler telephone interactions with covert human intelligence sources. Psychiatry, Psychology and Law, 1–19.

Authors: Jordan Nunan, Ian Stanier, Becky Milne
https://doi.org/10.1080/13218719.2020.1784807
Eliciting human intelligence: Police source handlers’ perceptions and experiences of rapport during covert human intelligence sources (CHIS) interactions

Rapport is an integral part of interviewing, viewed as fundamental to the success of intelligence elicitation. One collection capability is human intelligence (HUMINT), the discipline charged with eliciting intelligence through interactions with human sources, such as covert human intelligence sources (CHIS). To date, research has yet to explore the perceptions and experiences of intelligence operatives responsible for gathering HUMINT within England and Wales. The present study consisted of structured interviews with police source handlers (N = 24). Rapport was perceived as essential, especially for maximising the opportunity for intelligence elicitation. Participants provided a range of rapport strategies while highlighting the importance of establishing, and maintaining, rapport. The majority of participants believed rapport could be trained to some degree. Thus, rapport was not viewed exclusively as a natural skill. However, participants commonly perceived some natural attributes are required to build rapport that can be refined and developed through training and experience.

(From the journal abstract)


Nunan, J., Stanier, I., Milne, R., Shawyer, A., & Walsh, D. (2020a). Eliciting human intelligence: Police source handlers’ perceptions and experiences of rapport during covert human intelligence sources (CHIS) interactions. Psychiatry, Psychology and Law, 27(4), 511–537.

Authors: Jordan Nunan, Becky Milne, Ian Stanier
https://doi.org/10.1080/13218719.2020.1734978
Source Handler perceptions of the interviewing processes employed with informants.

The collection of accurate, detailed, and timely intelligence buttresses critical law enforcement decision-making. However, the quality and quantity of the intelligence gathered relies heavily upon the interviewing techniques used to retrieve it. The perceptions of intelligence practitioners are key to developing an understanding of practices concerning intelligence collection. Yet, to date, no research has been undertaken that explores the United Kingdom’s Source Handlers’ perceptions of the interviewing processes employed with informants. The present study interviewed 24 Source Handlers from Counter Terrorism Dedicated Source Units in the United Kingdom. Five themes emerged from the interviews, (i) a comparison between interviewing and debriefing; (ii) the PEACE model in intelligence interviews; (iii) the importance of effective communication; (iv) Source Handlers’ use of cognitive retrieval techniques; and, (v) Source Handler interview training. The perceived commonalities between interviewing and debriefing provided support for the transferability of investigative interviewing research and practices into the collection of Human Intelligence (HUMINT), reiterating themes (ii), (iii), and (iv). Finally, participants highlighted a need for additional training concerning intelligence gathering techniques, as police officers who are responsible for gathering HUMINT could benefit from further professional development based on investigative interviewing research and professional practices.

(From the journal abstract)


Nunan, J., Stanier, I., Milne, R., Shawyer, A., & Walsh, D. (2020b). Source Handler perceptions of the interviewing processes employed with informants. Journal of Policing, Intelligence and Counter Terrorism, 15(3), 244–262.

Authors: Jordan Nunan, Ian Stanier, Becky Milne
https://doi.org/10.1080/18335330.2020.1820069
Characterizing the Linguistic Chameleon: Personal and Social Correlates of Linguistic Style Accommodation

Linguistic style accommodation between conversationalists is associated with positive social outcomes. We examine social power and personality as factors driving the occurrence of linguistic style accommodation, and the social outcomes of accommodation. Social power was manipulated to create 144 face-to-face dyadic interactions between individuals of high versus low power and 64 neutral power interactions. Particular configurations of personality traits (high self-monitoring, Machiavellianism and leadership, and low self-consciousness, impression management and agreeableness), combined with a low-power role, led to an increased likelihood of linguistic style accommodation. Further, greater accommodation by low-power individuals positively influenced perceptions of subjective rapport and attractiveness. We propose individual differences interact with social context to influence the conditions under which nonconscious communication accommodation occurs.

(From the journal abstract)


Muir, K., Joinson, A., Cotterill, R., & Dewdney, N. (2016). Characterizing the Linguistic Chameleon: Personal and Social Correlates of Linguistic Style Accommodation: Characterizing the Linguistic Chameleon. Human Communication Research, 42(3), 462–484.

Authors: Kate Muir, Adam Joinson
https://doi.org/10.1111/hcre.12083
Tracking the truth: The effect of face familiarity on eye fixations during deception

In forensic investigations, suspects sometimes conceal recognition of a familiar person to protect co-conspirators or hide knowledge of a victim. The current experiment sought to determine whether eye fixations could be used to identify memory of known persons when lying about recognition of faces. Participants’ eye movements were monitored whilst they lied and told the truth about recognition of faces that varied in familiarity (newly learned, famous celebrities, personally known). Memory detection by eye movements during recognition of personally familiar and famous celebrity faces was negligibly affected by lying, thereby demonstrating that detection of memory during lies is influenced by the prior learning of the face. By contrast, eye movements did not reveal lies robustly for newly learned faces. These findings support the use of eye movements as markers of memory during concealed recognition but also suggest caution when familiarity is only a consequence of one brief exposure.

(From the journal abstract)


Millen, A. E., Hope, L., Hillstrom, A. P., & Vrij, A. (2017). Tracking the truth: The effect of face familiarity on eye fixations during deception. Quarterly Journal of Experimental Psychology (2006), 70(5), 930–943.

Authors: Aldert Vrij, Anne Hillstrom, Lorraine Hope
https://doi.org/10.1080/17470218.2016.1172093
Encouraging interviewees to say more and deception: The ghostwriter method

Background

We examined a new method to encourage interviewees to say more, the ghostwriter method, and examined its effect on eliciting information and cues to deceit.

Method

A total of 150 truth tellers and liars either told the truth about a trip they made in the last 12 months or pretended to have made such a trip. They were allocated to a Control condition, a ‘Be detailed’ condition in which they were encouraged to report even small details and a ghostwriter condition in which they were told to imagine talking to a ghostwriter. The dependent variables were details, complications, common knowledge details, self-handicapping strategies, proportion of complications, plausibility, and verifiable sources.

Results

The ghostwriter condition elicited more details and revealed in plausibility a stronger cue to deceit than the other two conditions.

Conclusion

The ghostwriter method appears to be a promising tool for eliciting information and cues to deceit.

(From the journal abstract)


Leal, S., Vrij, A., Deeb, H., & Kamermans, K. (2019). Encouraging interviewees to say more and deception: The ghostwriter method. Legal and Criminological Psychology, 24(2), 273–287

Authors: Sharon Leal, Aldert Vrij, Haneen Deeb
https://doi.org/10.1111/lcrp.12152
Verbal cues to deceit when lying through omitting information

Background

Lying through omitting information has been neglected in verbal lie detection research. The task is challenging: Can we decipher from the truthful information a lie teller provides that s/he is hiding something? We expected this to be the case because of lie tellers’ inclination to keep their stories simple. We predicted lie tellers to provide fewer details and fewer complications than truth tellers, the latter particularly after exposure to a Model Statement.

Method

A total of 44 truth tellers and 41 lie tellers were interviewed about a conversation (debriefing interview) they had taken part in earlier. Lie tellers were asked not to discuss one aspect of that debriefing interview.

Results

Results showed that truth tellers reported more complications than lie tellers after exposure to a Model Statement.

Conclusion

Ideas about future research in lying through omissions are discussed.

(From the journal abstract)


Leal, S., Vrij, A., Deeb, H., Hudson, C., Capuozzo, P., & Fisher, R. P. (2020). Verbal cues to deceit when lying through omitting information. Legal and Criminological Psychology, 25(2), 278–294.

Authors: Sharon Leal, Aldert Vrij, Haneen Deeb, Ronald P. Fisher
https://doi.org/10.1111/lcrp.12180
Facilitating recall and particularisation of repeated events in adults using a multi-method interviewing format

Reports about repeated experiences tend to include more schematic information than information about specific instances. However, investigators in both forensic and intelligence settings typically seek specific over general information. We tested a multi-method interviewing format (MMIF) to facilitate recall and particularisation of repeated events through the use of the self-generated cues mnemonic, the timeline technique, and follow-up questions. Over separate sessions, 150 adult participants watched four scripted films depicting a series of meetings in which a terrorist group planned attacks and planted explosive devices. For half of our sample, the third witnessed event included two deviations (one new detail and one changed detail). A week later, participants provided their account using the MMIF, the timeline technique with self-generated cues, or a free recall format followed by open-ended questions. As expected, more information was reported overall in the MMIF condition compared to the other format conditions, for two types of details, correct details, and correct gist details. The reporting of internal intrusions was comparable across format conditions. Contrary to hypotheses, the presence of deviations did not benefit recall or source monitoring. Our findings have implications for information elicitation in applied settings and for future research on adults’ retrieval of repeated events.

(From the journal abstract)


Kontogianni, F., Rubinova, E., Hope, L., Taylor, P. J., Vrij, A., & Gabbert, F. (2021). Facilitating recall and particularisation of repeated events in adults using a multi-method interviewing format. Memory, 29(4), 471–485.

Authors: Feni Kontogianni, Lorraine Hope, Paul Taylor, Aldert Vrij, Fiona Gabbert
https://doi.org/10.1080/09658211.2021.1903508
Who said what and when? A timeline approach to eliciting information and intelligence about conversations, plots, and plans

The verbal content of interactions (what was said and who said what) can be important as evidence and intelligence information. Across 3 empirical studies, we examined memory for details of an overheard (Experiment 1) or witnessed (Experiments 2 and 3) conversation using a timeline technique adapted for the reporting of conversations between multiple speakers. Although participants in all conditions received the same general instructions, participants assigned to timeline reporting format reported more verbatim information and made fewer sequencing errors than those using a free recall format. In Experiments 2 and 3, using an extended version of the technique, participants using the timeline reporting format also reported more correct speaker attributions and provided more information about the individuals involved, without compromising overall accuracy rates. With a large effect size across experiments (total N = 134), these findings suggest that timeline reporting formats facilitate the reporting of episodic memories and benefit the reporting of conversations.

(From the journal abstract)


Hope, L., Gabbert, F., Kinninger, M., Kontogianni, F., Bracey, A., & Hanger, A. (2019). Who said what and when? A timeline approach to eliciting information and intelligence about conversations, plots, and plans. Law and Human Behavior, 43(3), 263–277.

https://doi.org/10.1037/lhb0000329
Memory and the operational witness: Police officer recall of firearms encounters as a function of active response role

Investigations after critical events often depend on accurate and detailed recall accounts from operational witnesses (e.g., law enforcement officers, military personnel, and emergency responders). However, the challenging, and often stressful, nature of such events, together with the cognitive demands imposed on operational witnesses as a function of their active role, may impair subsequent recall. We compared the recall performance of operational active witnesses with that of nonoperational observer witnesses for a challenging simulated scenario involving an armed perpetrator. Seventy-six police officers participated in pairs. In each pair, 1 officer (active witness) was armed and instructed to respond to the scenario as they would in an operational setting, while the other (observer witness) was instructed to simply observe the scenario. All officers then completed free reports and responded to closed questions. Active witnesses showed a pattern of heart rate activity consistent with an increased stress response during the event, and subsequently reported significantly fewer correct details about the critical phase of the scenario. The level of stress experienced during the scenario mediated the effect of officer role on memory performance. Across the sample, almost one-fifth of officers reported that the perpetrator had pointed a weapon at them although the weapon had remained in the waistband of the perpetrator’s trousers throughout the critical phase of the encounter. These findings highlight the need for investigator awareness of both the impact of operational involvement and stress-related effects on memory for ostensibly salient details, and reflect the importance of careful and ethical information elicitation techniques.

(From the journal abstract)


Hope, L., Blocksidge, D., Gabbert, F., Sauer, J. D., Lewinski, W., Mirashi, A., & Atuk, E. (2016). Memory and the operational witness: Police officer recall of firearms encounters as a function of active response role. Law and Human Behavior, 40(1), 23–35.

https://doi.org/10.1037/lhb0000159
What demographic attributes do our digital footprints reveal? A systematic review

To what extent does our online activity reveal who we are? Recent research has demonstrated that the digital traces left by individuals as they browse and interact with others online may reveal who they are and what their interests may be. In the present paper we report a systematic review that synthesises current evidence on predicting demographic attributes from online digital traces. Studies were included if they met the following criteria: (i) they reported findings where at least one demographic attribute was predicted/inferred from at least one form of digital footprint, (ii) the method of prediction was automated, and (iii) the traces were either visible (e.g. tweets) or non-visible (e.g. clickstreams). We identified 327 studies published up until October 2018. Across these articles, 14 demographic attributes were successfully inferred from digital traces; the most studied included gender, age, location, and political orientation. For each of the demographic attributes identified, we provide a database containing the platforms and digital traces examined, sample sizes, accuracy measures and the classification methods applied. Finally, we discuss the main research trends/findings, methodological approaches and recommend directions for future research.

(From the journal abstract)


Hinds, J., & Joinson, A. N. (2018). What demographic attributes do our digital footprints reveal? A systematic review. PLOS ONE, 13(11), e0207112.

Authors: Joanne Hinds, Adam Joinson
https://doi.org/10.1371/journal.pone.0207112
The Psychology of Criminal Investigation: From Theory to Practice

The contribution of psychological research to the prevention of miscarriages of justice and the development of effective investigative techniques is now established to a point where law enforcement agencies in numerous countries either employ psychologists as part of their staff, or work in cooperation with academic institutions. The application of psychology to investigation is particularly effective when academics and practitioners work together. This book brings together leading experts to discuss the application of psychology to criminal investigation.

This book offers an overview of models of investigation from a psychological and practical view point, covering topics such as investigative decision making, the presentation of evidence, witness testimony, the detection of deception, interviewing suspects and evidence-based police training. It is essential reading for students, researchers and practitioners engaged with police practice, investigation and forensic psychology.

(From the journal abstract)


Griffiths, A., & Milne, R. (Eds.). (2018). The Psychology of Criminal Investigation: From Theory to Practice (1st ed.). Routledge.

https://doi.org/10.4324/9781315637211
Do smartphone usage scales predict behavior?

Understanding how people use technology remains important, particularly when measuring the impact this might have on individuals and society. However, despite a growing body of resources that can quantify smartphone use, research within psychology and social science overwhelmingly relies on self-reported assessments. These have yet to convincingly demonstrate an ability to predict objective behavior. Here, and for the first time, we compare a variety of smartphone use and ‘addiction’ scales with objective behaviors derived from Apple's Screen Time application. While correlations between psychometric scales and objective behavior are generally poor, single estimates and measures that attempt to frame technology use as habitual rather than ‘addictive’ correlate more favorably with subsequent behavior. We conclude that existing self-report instruments are unlikely to be sensitive enough to accurately predict basic technology use related behaviors. As a result, conclusions regarding the psychological impact of technology are unreliable when relying solely on these measures to quantify typical usage.

(From the journal abstract)


Ellis, D. A., Davidson, B. I., Shaw, H., & Geyer, K. (2019). Do smartphone usage scales predict behavior? International Journal of Human-Computer Studies, 130, 86–92.

Authors: David Ellis, Brittany Davidson, Heather Shaw, Kristoffer Geyer
https://doi.org/10.1016/j.ijhcs.2019.05.004
Narratives in Action: Modelling the Types and Drivers of Sikh Activism in Diaspora

Using data gathered for an investigation of “Sikh radicalisation in Britain”, in this article I develop a typology of different types of activism among Sikhs in diaspora based on an analysis of historic and contemporary media sources (newspapers, radio, television, online), academic literature, ethnographic fieldwork and a series of semi-structured interviews with self-identifying Sikh activists. I assess the reasons behind a variety of different incidents involving Sikh activists, how Sikh activists view the drivers of their activism and to what extent this activism can be regarded as being “religiously motivated”. I critique existing typologies of “religious activism” by developing a typology of Sikh activism which challenges the distinction often made between “religious” and “political” action. I argue that “religiously motivated actions” must be understood in conjunction with narratives, incidents and issues specific to particular religious traditions and that generic motivations for these actions cannot be applied across all religious traditions.

(From the journal abstract)


Singh, J. (2020b). Narratives in Action: Modelling the Types and Drivers of Sikh Activism in Diaspora. Religions, 11(10), 539.

Author: Jasjit Singh
https://doi.org/10.3390/rel11100539
Radicalization: Trajectories in Research, Policy and Practice

This focus section provides welcome evidence of the strength of research and practice on radicalization in Germany and reflects the dynamics of debates within international policy and scholarship. The papers focus on a range of areas of research on radicalization and violent extremism covering micro-, meso- and macro-level processes alongside methods for countering and preventing violent extremism. Although the papers clearly articulate the challenges associated with carrying out research in this field, they also demonstrate the increasing scope of scholarship that is helping to explain, interpret and respond to violent extremism. By examining the wide-ranging influences on radicalization, this focus section extends an invitation to both broaden and deepen scholarship in the field: broadening research to develop more interdisciplinary, integrative frameworks to help interpret radicalization processes, and deepening it by interrogating and test-ing existing models and frameworks to develop more robust explanations of the pathways into and out of violence. This effort will be enhanced by greater use of theory from comparable areas of scholarship and by sustaining a research culture that nurtures rigorous, innovative methodologies able to capture the com-plexities of violent extremism. The papers in the focussection demonstrate that the field is in robust shapeand sets the stage for further research on radicaliza-tion and violent extremism.

(From the journal abstract)


Kim Knott & Benjamin Lee, 2020. Ideological Transmission in Extremist Contexts: Towards a Framework of How Ideas Are Shared. Politics, Religion & Ideology.

Author: Sarah Marsden
https://doi.org/10.4119/ijcv-3811
Examining Terrorism’s Persistence: A Relational Approach

 

 


Marsden, S. (n.d.). Examining Terrorism’s Persistence: A Relational Approach. Contemporary Voices: The St Andrews Journal of International Relations.

Author: Sarah Marsden
https://risweb.st-andrews.ac.uk/portal/en/researchoutput/examining-terrorisms-persistence-a-relational-approach(04deacf4-40b9-41bc-ae43-6dd301a5d0b4).html
Fascist aspirants: Fascist Forge and ideological learning in the extreme-right online milieu

Learning in extremist settings is often treated as operational, with little regard to how aspiring participants in extremist settings engage with complex and abstract ideological material. This paper examines learning in the context of the amorphous network of digital channels that compose the extreme-right online milieu. Through an in-depth qualitative analysis, we explore how well the prevailing model of extremist ideological learning (in ‘communities of practice’) accounts for the behaviour of aspiring participants of Fascist Forge, a now-defunct extreme-right web forum. The findings suggest that some of the social aspects of communities of practice have been replicated in the online setting of Fascist Forge. However, for a combination of technical and ideological reasons, the more directed and nurturing aspects of learning have not. Several issues are raised about the role of ideological learning in online communities, notably the open accessibility of extremist material, the lack of ideological control leading to potential mutation and innovation by self-learners, and the role of digital learning in the preparation, shaping and recruitment of individuals for real world organising and activism.

(From the journal abstract)


Lee, B., & Knott, K. (2021). Fascist aspirants: Fascist Forge and ideological learning in the extreme-right online milieu. Behavioral Sciences of Terrorism and Political Aggression, 1–25.

Authors: Ben Lee, Kim Knott
https://doi.org/10.1080/19434472.2020.1850842
Tips for Connecting Your Research with the Media

During the Religion and Diversity Project’s 2015 annual team meeting, team members and local journalists came together for a panel on presenting research results to the media. Following the lively discussion, on the basis of our experience of researching and working with the media, we were asked to identify key points for communicating research in the press, on radio and television. Here are our top five tips for media engagement, contextualized by our experiences and professional backgrounds.

(From the journal abstract)


Knott, K., & Lefebvre, S. (2016). Tips for Connecting Your Research with the Media. Bulletin for the Study of Religion, 45(1), 32–34. 

Author: Kim Knott
https://doi.org/10.1558/bsor.v45i1.29999
Social movements, structural violence, and conflict transformation in Northern Ireland: The role of loyalist paramilitaries

This article analyzes how social movements and collective actors can affect political and social transformation in a structurally violent society using the case study of Northern Ireland. We focus, in particular, on the crucial role played by collective actors within the loyalist community (those who want to maintain Northern Ireland’s place in the United Kingdom) in bringing about social and political transformation in a society blighted by direct, cultural, and structural violence both during the conflict and subsequent peace process. Drawing on data obtained through in-depth interviews with loyalist activists (including former paramilitaries), the article demonstrates the role and impact of loyalists and loyalism in Northern Ireland’s transition. We identify 5 conflict transformation challenges addressed by loyalist actors in a structurally violent society: de-mythologizing the conflict; stopping direct violence; resisting pressure to maintain the use of violence; development of robust activist identity; and the measurement of progress through reference to the parallel conflict transformation journey of their former republican enemies. The Northern Ireland case demonstrates the necessity for holistic conflict transformation strategies that attempt to stop not only direct attacks but also the cultural and structural violence that underpins and legitimize them. In so doing, the article contributes to a broader understanding of how and why paramilitary campaigns are brought to an end.

(From the journal abstract)


Ferguson, N., McDaid, S., & McAuley, J. W. (2018). Social movements, structural violence, and conflict transformation in Northern Ireland: The role of loyalist paramilitaries. Peace and Conflict: Journal of Peace Psychology, 24(1), 19–26.

Authors: Neil Ferguson, James McAuley
https://doi.org/10.1037/pac0000274
Staying Engaged in Terrorism: Narrative Accounts of Sustaining Participation in Violent Extremism

Research exploring radicalization pathways and how and why people become involved in terrorism has expanded since the 9/11 attacks. Likewise, over the last decade research exploring de-radicalization and desistence from terrorism has grown and expanded in an attempt to promote exit from extremist or terror groups. However, research studies on how individuals sustain engagement in terrorism and their involvement with extremist organizations, often in the face of great adversity, are absent from the body of research. To address this scarcity of research this study analyzed accounts of engagement in violent extremism produced by Northern Irish loyalist and republican paramilitaries in order to explore how their paramilitary lifestyle, perpetration of acts of political violence and the pressure from countering threats posed by rival groups, and the State security forces impacted on them. The analysis utilized a hybrid of thematic analysis and interpretative phenomenological analysis (IPA). The themes raised through the analysis reflected the psychological, social and economic hardship associated with this lifestyle. The narrative accounts also illustrated psychological changes associated to engagement in violence and from insulation within tightly knit extremist groups. As most of the participants faced incarceration during their paramilitary careers, themes also reflected on the impact imprisonment had on them. The themes explored factors that sustained their involvement, including the role of identity development and identity fusion in sustaining their extremism, the impact of insulated group membership, feelings of efficacy, dehumanization processes, community support, and beliefs in the utility of violence.

(From the journal abstract)


Ferguson, N., & McAuley, J. W. (2020b). Staying Engaged in Terrorism: Narrative Accounts of Sustaining Participation in Violent Extremism. Frontiers in Psychology, 11, 1338.

Authors: Neil Ferguson, James McAuley
https://doi.org/10.3389/fpsyg.2020.01338
Prophets and Loss: How “Soft Facts” on Social Media Influenced the Brexit Campaign and Social Reactions to the Murder of Jo Cox MP

This article examines “soft facts” about security issues in the 2016 Brexit referendum campaign. Soft facts arise when information provenance is uncertain, and are forms of malleable and contingent knowledge, such as rumors, conspiracy theories, and propaganda. There is a growing appreciation that digital communications environments are especially conducive to the dissemination of these kinds of information. Informed by empirical data comprising forty-five thousand nine hundred and fifty-seven data points collected by monitoring social media before and after the UK Brexit referendum campaign (June 16–October 12, 2016), the analysis examines how and why a series of soft facts concerning Brexit were mobilized. By developing the concept of “digital prophecy,” the article explores how influence is exerted by online prophets who were connecting current events to past grievances, to advance negative predictions about the future. This starts to capture the tradecraft of digital influencing, in ways that move beyond the structural topologies of communication networks. In policy terms, the analysis reminds us of the need to attend not just to how influence is achieved through fake news (e.g., using social media bots to amplify a message), but also why influence is sought in the first place.

(From the journal abstract)


Dobreva, D., Grinnell, D., & Innes, M. (2020). Prophets and Loss: How “Soft Facts” on Social Media Influenced the Brexit Campaign and Social Reactions to the Murder of Jo Cox MP. Policy & Internet, 12(2), 144–164.

Authors: Diyana Dobreva, Daniel Grinnell, Martin Innes
https://doi.org/10.1002/poi3.203
Violence and Restraint within Antifa: A View from the United States

In recent months recurrent calls have been made by conservative right-wing politicians to designate Antifa a “domestic terrorist organization” in the United States. Fixated on the spectacle of its Black Bloc tactics they have equated Antifa, what is essentially an ad-hoc, non-hierarchical, geographically dispersed social movement comprised of local autonomous activist groups, with organized violent extremists. And yet, the evidence for such an equation has been mostly limited to a handful of instances that usually bare the hallmarks of political exaggeration or are alternatively attributable to individuals loosely associated with the Antifa movement. Why is this so? How do militant anti-fascists in the US understand violence and exercise restraint in their use of it? This article seeks an answer to these questions based on interviews with activists from Portland’s Rose City Antifa, one of the United States’ most well-known Antifa groups, and an analysis of a collection of the group’s Tweets. It reveals that Antifa exercises considerable restraint, internally and externally, with regards to both the literal and rhetorical use of violence within its street and digital activism. In turn it calls upon others to exercise reciprocal levels of restraint by ceasing their labelling of Antifa as a “domestic terrorist” organization.

(From the journal abstract)


Copsey, N., & Merrill, S. (2020). Violence and Restraint within Antifa: A View from the United States. Perspectives on Terrorism, 14(6), 122–138.

Authors: Nigel Copsey, Samuel Merrill
https://www.jstor.org/stable/26964730
Why do people spread false information online? The effects of message and viewer characteristics on self-reported likelihood of sharing social media disinformation

Individuals who encounter false information on social media may actively spread it further, by sharing or otherwise engaging with it. Much of the spread of disinformation can thus be attributed to human action. Four studies (total N = 2,634) explored the effect of message attributes (authoritativeness of source, consensus indicators), viewer characteristics (digital literacy, personality, and demographic variables) and their interaction (consistency between message and recipient beliefs) on self-reported likelihood of spreading examples of disinformation. Participants also reported whether they had shared real-world disinformation in the past. Reported likelihood of sharing was not influenced by authoritativeness of the source of the material, nor indicators of how many other people had previously engaged with it. Participants’ level of digital literacy had little effect on their responses. The people reporting the greatest likelihood of sharing disinformation were those who thought it likely to be true, or who had pre-existing attitudes consistent with it. They were likely to have previous familiarity with the materials. Across the four studies, personality (lower Agreeableness and Conscientiousness, higher Extraversion and Neuroticism) and demographic variables (male gender, lower age and lower education) were weakly and inconsistently associated with self-reported likelihood of sharing. These findings have implications for strategies more or less likely to work in countering disinformation in social media.

(From the journal abstract)


Buchanan, T. (2020). Why do people spread false information online? The effects of message and viewer characteristics on self-reported likelihood of sharing social media disinformation. PLOS ONE, 15(10), e0239666.

Author: Tom Buchanan
https://doi.org/10.1371/journal.pone.0239666
The ‘tarrant effect’: What impact did far-right attacks have on the 8chan forum?

This paper analyses the impact of a series of mass shootings committed in 2018–2019 by right-wing extremists on 8chan/pol, a prominent far-right online forum. Using computational methods, it offers a detailed examination of how attacks trigger shifts in both forum activity and content. We find that while each shooting is discussed by forum participants, their respective impact varies considerably. We highlight, in particular, a ‘Tarrant effect’: the considerable effect Brenton Tarrant’s attack of two mosques in Christchurch, New Zealand, had on the forum. Considering the rise in far-right terrorism and the growing and diversifying online far-right ecosystem, such interactive offline-online effects warrant the attention of scholars and security professionals.

(From the journal abstract)


[SB1] 

Baele, S. J., Brace, L., & Coan, T. G. (2020). The ‘tarrant effect’: What impact did far-right attacks have on the 8chan forum? Behavioral Sciences of Terrorism and Political Aggression, 1–23. [SB2] .

 

 

Authors: Stephane Baele, Lewys Brace, Travis Coan
https://doi.org/10.1080/19434472.2020.1862274
Lethal Images: Analyzing Extremist Visual Propaganda from ISIS and Beyond

Violent extremist groups regularly use pictures in their propaganda. This practice, however, remains insufficiently understood. Conceptualizing visual images as amplifiers of narratives and emotions, the present article offers an original theoretical framework and measurement method for examining the synchronic and diachronic study of the manipulative use of images by violent extremist groups. We illustrate this framework and method with a systematic analysis of the 2,058 pictures contained in the Islamic State's propaganda magazines targeting Western audiences, exposing the “visual style” of the group, and highlighting the trends and shifts in the evolution of this style following developments on the ground.

(From the journal abstract)


[SB1] Baele, S. J., Boyd, K. A., & Coan, T. G. (2020). Lethal Images: Analyzing Extremist Visual Propaganda from ISIS and Beyond. Journal of Global Security Studies, 5(4), 634–657.

 

Authors: Stephane Baele, Katharine Boyd, Travis Coan
https://doi.org/10.1093/jogss/ogz058
The role of information sharing on decision delay during multiteam disaster response

Multiteam systems (MTSs) are comprised of two or more interconnected teams working toward shared superordinate goals but with unique sub-goals. To date, research has predominantly focused on how decisions are made and has viewed these cognitive processes as occurring within individuals. However, for MTSs operating in extreme environments such as disasters, it is often not a question of how decisions are made, but what is causing delays and failures to make decisions. To understand the causes of decision delay within these complex networks, it is important to focus on decision processes at the multiteam level. Using naturalistic observational and interview data collected during a multi-site, multiteam emergency response to a large-scale disaster exercise, this study examines both information sharing (what was shared, with whom, how long this took), and decision processes across teams (situational awareness—SA, plan formulation, and plan execution). Findings demonstrate that interdependencies in cognitive processes exist across individuals where goals overlap. Decision delay is not only caused by failure to develop SA within a team preventing their ability to formulate and execute plans but also by the inability of other teams to execute their plans. The implications of these findings for developing targeted interventions are discussed.

(From the journal abstract)


Waring, S., Alison, L., Humann, M., & Shortland, N. (2019). The role of information sharing on decision delay during multiteam disaster response. Cognition, Technology & Work, 22(2), 263-279. https://link.springer.com/article/10.1007/s10111-019-00570-7)

Authors: Sara Waring, Laurence Alison, Michael Humann
https://link.springer.com/article/10.1007/s10111-019-00570-7)
Communication and coordination across event phases: A multi-team system emergency response

This paper explores how multi-agency response teams communicate and coordinate in different phases of a simulated terrorist incident. Procedural guidelines state that responders should coordinate their response to a major emergency across two phases: ‘response’ (when the incident is ongoing) and ‘recovery’ (when the threat has subsided, but the legacy of the incident is ongoing). However, no research has examined whether these phases map to the behaviours of responders in situ. To address this, we used measures of communication and coordination to examine how behaviours evolved during a simulated terrorist incident in the United Kingdom. We grounded our approach within the theoretical literature on multi-team systems. It was found that the current response/recovery classification does not fit the nuanced context of an emergency. Instead, a three-phase structure of ‘response/resolve/recovery’ is more reflective of behaviour. It was also found that coordination between agencies improved when communication networks became less centralized. This suggests that collaborative working in multi-team systems may be improved by adopting decentralized communication networks.

(From the journal abstract)


Brown, O., Power, N. and Conchie, S.M. (2021), Communication and coordination across event phases: A multi-team system emergency response. J Occup Organ Psychol.

Authors: Olivia Brown, Nicola Power, Stacey Conchie
https://doi.org/10.1111/joop.12349
Development of the Reporting Information about Networks and Groups (RING) task: a method for eliciting information from memory about associates, groups, and networks

Eliciting detailed and comprehensive information about the structure, organisation and relationships between individuals involved in organised crime gangs, terrorist cells and networks is a challenge in investigations and debriefings. Drawing on memory theory, the purpose of this paper is to develop and test the Reporting Information about Networks and Groups (RING) task, using an innovative piece of information elicitation software.

Using an experimental methodology analogous to an intelligence gathering context, participants (n=124) were asked to generate a visual representation of the “network” of individuals attending a recent family event using the RING task.

All participants successfully generated visual representations of the relationships between people attending a remembered social event. The groups or networks represented in the RING task output diagrams also reflected effective use of the software functionality with respect to “describing” the nature of the relationships between individuals.

The authors succeeded in establishing the usability of the RING task software for reporting detailed information about groups of individuals and the relationships between those individuals in a visual format. A number of important limitations and issues for future research to consider are examined.

The RING task is an innovative development to support the elicitation of targeted information about networks of people and the relationships between them. Given the importance of understanding human networks in order to disrupt criminal activity, the RING task may contribute to intelligence gathering and the investigation of organised crime gangs and terrorist cells and networks.

(From the journal abstract)


Hope, L, Kontogianni, F, Geyer, K & Thomas, WD 2019, 'Development of the Reporting Information about Networks and Groups (RING) task: a method for eliciting information from memory about associates, groups, and networks', The Journal of Forensic Practicehttps://doi.org/10.1108/JFP-04-2019-0011

Staying Engaged in Terrorism: Narrative Accounts of Sustaining Participation in Violent Extremism

Research exploring radicalization pathways and how and why people become involved in terrorism has expanded since the 9/11 attacks. Likewise, over the last decade research exploring de-radicalization and desistence from terrorism has grown and expanded in an attempt to promote exit from extremist or terror groups.

However, research studies on how individuals sustain engagement in terrorism and their involvement with extremist organizations, often in the face of great adversity, are absent from the body of research.

To address this scarcity of research this study analyzed accounts of engagement in violent extremism produced by Northern Irish loyalist and republican paramilitaries in order to explore how their paramilitary lifestyle, perpetration of acts of political violence and the pressure from countering threats posed by rival groups, and the State security forces impacted on them.

The analysis utilized a hybrid of thematic analysis and interpretative phenomenological analysis (IPA). The themes raised through the analysis reflected the psychological, social and economic hardship associated with this lifestyle. The narrative accounts also illustrated psychological changes associated to engagement in violence and from insulation within tightly knit extremist groups.

As most of the participants faced incarceration during their paramilitary careers, themes also reflected on the impact imprisonment had on them. The themes explored factors that sustained their involvement, including the role of identity development and identity fusion in sustaining their extremism, the impact of insulated group membership, feelings of efficacy, dehumanization processes, community support, and beliefs in the utility of violence.

(From the journal abstract)


Neil Ferguson & James W. McAuley, 2020. Staying engaged in terrorism: narrative accounts of sustaining participation in violent extremism. Frontiers in psychology.
https://doi.org/10.3389/fpsyg.2020.01338

An evidence synthesis of strategies, enablers and barriers for keeping secrets online regarding the procurement and supply of illicit drugs

This systematic review attempts to understand how people keep secrets online, and in particular how people use the internet when engaging in covert behaviours and activities regarding the procurement and supply of illicit drugs.

With the Internet and social media being part of everyday life for most people in western and non-western countries, there are ever-growing opportunities for individuals to engage in covert behaviours and activities online that may be considered illegal or unethical.

A search strategy using Medical Subject Headings terms and relevant key words was developed. A comprehensive literature search of published and unpublished studies in electronic databases was conducted.

Additional studies were identified from reference lists of previous studies and (systematic) reviews that had similar objectives as this search, and were included if they fulfilled our inclusion criteria. Two researchers independently screened abstracts and full-texts for study eligibility and evaluated the quality of included studies. Disagreements were resolved by a consensus procedure. The systematic review includes 33 qualitative studies and one cross-sectional study, published between 2006 and 2018.

Five covert behaviours were identified: the use of communication channels; anonymity; visibility reduction; limited posts in public; following forum rules and recommendations. The same technologies that provide individuals with easy access to information, such as social networking sites and forums, digital devices, digital tools and services, also increase the prevalence of inaccurate information, loss of privacy, identity theft and disinhibited communication.

This review takes a rigorous interdisciplinary approach to synthesising knowledge on the strategies adopted by people in keeping secrets online. Whilst the focus is on the procurement and supply of illicit drugs, this knowledge is transferrable to a range of contexts where people keep secrets online. It has particular significance for those who design online/social media applications, and for law enforcement and security agencies.

(From the journal abstract)


Aikaterini Grimani, Anna Gavine and Wendy Moncur, 2020. An evidence synthesis of strategies, enablers and barriers for keeping secrets online regarding the procurement and supply of illicit drugs. International Journal of Drug Policy.  https://doi.org/10.1016/j.drugpo.2019.102621

Authors: Aikaterini Grimani, Wendy Moncur, Anna Gavine
Source Handler telephone interactions with covert human intelligence sources: An exploration of question types and intelligence yield

Law enforcement agencies gather intelligence in order to prevent criminal activity and pursue criminals. In the context of human intelligence collection, intelligence elicitation relies heavily upon the deployment of appropriate evidence‐based interviewing techniques (a topic rarely covered in the extant research literature).

The present research gained unprecedented access to audio recorded telephone interactions (N = 105) between Source Handlers and Covert Human Intelligence Sources (CHIS) from England and Wales. The research explored the mean use of various question types per interaction and across all questions asked in the sample, as well as comparing the intelligence yield for appropriate and inappropriate questions.

Source Handlers were found to utilise vastly more appropriate questions than inappropriate questions, though they rarely used open‐ended questions. Across the total interactions, appropriate questions (by far) were associated with the gathering of much of the total intelligence yield. Implications for practise are discussed.

(From the journal abstract)


Jordan Nunan, Ian Stanier, Rebecca Milne, Andrea Shawyer and Dave Walsh, 2020. Source Handler telephone interactions with covert human intelligence sources: An exploration of question types and intelligence yield. Applied Cognitive Psychology. 
https://doi.org/10.1002/acp.3726

Community reporting on violent extremism by 'intimates': emergent findings from international evidence

To promote early intervention strategies, Countering/Preventing Violent Extremism (C/PVE) policies internationally seek to encourage community reporting by 'intimates' about someone close to them engaging in terrorist planning.

Yet historically, we have scant evidence around what either helps or hinders intimates to share concerns with authorities. We address that deficit here through a state-of-the-art assessment of what we currently know about effective related C/PVE approaches to community reporting, based on key findings from a groundbreaking Australian study and its UK replication.

The consistency of qualitative findings from nearly 100 respondents offers new paradigms for policy and practice.

(From the journal abstract)


Paul Thomas, Michele Grossman, Kris Christmann, and Shamim Miah, 2020. Community reporting on violent extremism by 'intimates': emergent findings from international evidence. Critical Studies on Terrorism. https://doi.org/10.1080/17539153.2020.1791389

How is Extraversion related to Social Media Use? A Literature Review

With nearly 3.5 billion people now using some form of social media, understanding its relationship with personality has become a crucial focus of psychological research.

As such, research linking personality traits to social media behaviour has proliferated in recent years, resulting in a disparate set of literature that is rarely synthesised. To address this, we performed a systematic search that identified 182 studies relating extraversion to social media behaviour.

Our findings highlight that extraversion and social media are studied across six areas: 1) content creation, 2) content reaction, 3) user profile characteristics, 4) patterns of use, 5) perceptions of social media, and 6) aggression, trolling, and excessive use.

We compare these findings to offline behaviour and identify parallels such as extraverts' desire for social attention and their tendency to display positivity. Extraverts are also likely to use social media, spend more time using one or more social media platforms, and regularly create content.

We discuss how this evidence will support the future development and design of social media platforms, and its application across a variety of disciplines such as marketing and human-computer interaction.

(From the journal abstract)


Thomas Bowden-Green, Joanne Hinds & Adam Joinson, 2020. How is extraversion related to social media use? A literature review. Personality and Individual Differences. https://doi.org/10.1016/j.paid.2020.110040

ISIS Propaganda: A Full-Spectrum Extremist Message

This book offers a comprehensive overview and analysis of the Islamic State's use of propaganda.

Combining a range of different theoretical perspectives from across the social sciences, and using rigorous methods, the authors trace the origins of the Islamic State's message, laying bare the strategic logic guiding its evolution, examining each of its multi-media components, and showing how these elements work together to radicalize audiences' worldviews.

This volume highlights the challenges that this sort of "full-spectrum propaganda" raises for counter terrorism forces. It is not only a one-stop resource for any analyst of IS and Salafi-jihadism, but also a rich contribution to the study of text and visual propaganda, radicalization and political violence, and international security.

(From the book abstract)


Stephane J. Baele, Katharine A. Boyd, and Travis G. Coan. 2020. ‘ISIS Propaganda: A Full-Spectrum Extremist Message’. Oxford, New York: Oxford University Press. ISBN: 9780190932459 

When and How are Lies Told? And the Role of Culture and Intentions in Intelligence-Gathering Interviews

Purpose
Lie‐tellers tend to tell embedded lies within interviews. In the context of intelligence‐gathering interviews, human sources may disclose information about multiple events, some of which may be false. In two studies, we examined when lie‐tellers from low‐ and high‐context cultures start reporting false events in interviews and to what extent they provide a similar amount of detail for the false and truthful events. Study 1 focused on lie‐tellers' intentions, and Study 2 focused on their actual responses.

Methods
Participants were asked to think of one false event and three truthful events. Study 1 (N = 100) was an online study in which participants responded to a questionnaire about where they would position the false event when interviewed and they rated the amount of detail they would provide for the events. Study 2 (N = 126) was an experimental study that involved interviewing participants about the events.

Results
Although there was no clear preference for lie position, participants seemed to report the false event at the end rather than at the beginning of the interview. Also, participants provided a similar amount of detail across events. Results on intentions (Study 1) partially overlapped with results on actual responses (Study 2). No differences emerged between low‐ and high‐context cultures.

Conclusions
This research is a first step towards understanding verbal cues that assist investigative practitioners in saving their cognitive and time resources when detecting deception regardless of interviewees' cultural background. More research on similar cues is encouraged.

(From the journal abstract)


Haneen Deeb, Aldert Vrij, Sharon Leal, Brianna L. Verigin & Steven M. Kleinman, 2020. When and how are lies told? And the role of culture and intentions in intelligence‐gathering interviews. Legal and Criminological Psychology. https://doi.org/10.1111/lcrp.12171

“Tell me more about this…”: An examination of the efficacy of follow-up open questions following an initial account

In information gathering interviews, follow‐up questions are asked to clarify and extend initial witness accounts. Across two experiments, we examined the efficacy of open‐ended questions following an account about a multi‐perpetrator event.

In Experiment 1, 50 mock‐witnesses used the timeline technique or a free recall format to provide an initial account. Although follow‐up questions elicited new information (18–22% of the total output) across conditions, the response accuracy (60%) was significantly lower than that of the initial account (83%). In Experiment 2 (N = 60), half of the participants received pre‐questioning instructions to monitor accuracy when responding to follow‐up questions. New information was reported (21–22% of the total output) across conditions, but despite using pre‐questioning instructions, response accuracy (75%) was again lower than the spontaneously reported information (87.5%).

Follow‐up open‐ended questions prompt additional reporting; however, practitioners should be cautious to corroborate the accuracy of new reported details.

(From the journal abstract)


Feni Kontogianni, Lorraine Hope, Paul Taylor, Aldert Vrij & Fiona Gabbert, 2020. “Tell me more about this…”: An examination of the efficacy of follow‐up open questions following an initial account. Applied Cognitive Psychology. https://doi.org/10.1002/acp.3675

Ideological Transmission in Extremist Contexts: Towards a Framework of How Ideas Are Shared

Despite their centrality in academic and policy debates about radicalization and political violence, ideologies have been conceived narrowly, as cognitive, top-down, coherent and systematic.

In general, those who have used the concept of ideology have failed to draw on ideological theory or on recent insights about its practice and embodiment, or location in space and time.

Our interest is less in the content of ideology than in how it is shared by those for whom it matters. We offer an interpretive framework, based on six key questions about ideological transmission: What ideas, beliefs, and values are shared, how and why, by whom, and in which spatial and temporary contexts?

Following a discussion about the methodological pros and cons of the framework, it is tested on a series of interviews with members of Aum Shinrikyo, the Japanese religious group responsible for the Tokyo subway attack in 1995. We assess the strengths and limitations of the framework for analysing the various dimensions of ideological transmission before considering what it adds to our understanding of the relationship between extreme beliefs and violent behaviour.

(From the journal abstract)


Benjamin Lee, Kim Knott. (2022) Fascist aspirants: Fascist Forge and ideological learning in the extreme-right online milieu. Behavioral Sciences of Terrorism and Political Aggression 14:3, pages 216-240.

Authors: Kim Knott, Ben Lee
https://doi.org/10.1080/21567689.2020.1732938
Sketching while narrating as a tool to detect deceit

In none of the deception studies that used drawings to date, was the effect of sketching on both speech content and drawing content examined, making it unclear what the full potential is of the use of drawings as a lie detection tool. A total of 122 truth tellers and liars took part in the study who did or did not sketch while narrating their allegedly experienced event. We formulated hypotheses about the total amount of information and number of complications reported and about various features of the drawings. Participants in the Sketch‐present condition provided more information than participants in the Sketch‐absent condition, and truth tellers reported more details than liars, but only in the Sketch‐present condition. In contrast to previous research, no Veracity differences occurred regarding the content of the drawings, perhaps because sketching was introduced as a tool that facilitated verbal recall and not as a stand‐alone tool.

(From the journal abstract)


Aldert Vrij, Samantha Mann, Sharon Leal, Ronald P. Fisher & Haneen Deeb, 2020. Sketching while narrating as a tool to detect deceit. Applied Cognitive Psychology. https://doi.org/10.1002/acp.3646

Authors: Aldert Vrij, Samantha Mann, Sharon Leal, Ronald P. Fisher, Haneen Deeb
Techniques of disinformation: Constructing and communicating “soft facts” after terrorism

Informed by social media data collected following four terror attacks in the UK in 2017, this article delineates a series of “techniques of disinformation” used by different actors to try and influence how the events were publicly defined and understood.

By studying the causes and consequences of misleading information following terror attacks, the article contributes empirically to the neglected topic of social reactions to terrorism. It also advances scholarship on the workings of disinforming communications, by focusing on a domain other than political elections, which has been the empirical focus for most studies of disinformation to date.

Theoretically, the analysis is framed by drawing an analogy with Gresham Sykes and David Matza’s (1957) account of the role of “techniques of neutralization” originally published in the American Sociological Review. The connection being that where they studied deviant behaviour, a similar analytic lens can usefully be applied to disinformation cast as “deviant” information.

(From the journal abstract)


Martin Innes, 2019. Techniques of disinformation: Constructing and communicating “soft facts” after terrorism. British Journal of Sociology. https ://doi.org/10.1111/1468-4446.12735

Detecting smugglers: Identifying strategies and behaviours in individuals in possession of illicit objects

Behaviour detection officers' task is to spot potential criminals in public spaces, but scientific research concerning what to look for is scarce. In two experiments, 52 (Experiment 1A) and 60 (Experiment 2A) participants carried out a mission involving a ferry crossing. Half were asked to smuggle an object; the other half were non‐smugglers. In Experiment 2A, two confederates appeared to approach as if looking for someone on the ferry.

Smugglers, more than non‐smugglers, reported afterwards to have felt nervous, self‐conscious, and conspicuous and to attempt behavioural control during the ferry crossing. The secretly videotaped ferry crossings were shown to 104 (Experiment 1B) and 120 (Experiment 2B) observers, tasked to identify the smugglers. Although they reported paying attention mostly to signs of nervousness, lie detection accuracy rate was poor (48% in Experiment 1 and 39.2% in Experiment 2) because their perceptions of nervousness did not match the experiences of nervousness reported by the (non)smugglers.

(From the journal abstract)


Samantha Mann, Haneen Deeb, Aldert Vrij, Lorraine Hope & Lavinia Pontigia, 2019. Detecting Smugglers: Identifying strategies and behaviours in individuals in possession of illicit objects. Applied Cognitive Psychology. https://doi.org/10.1002/acp.3622

Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors

The online space is a haven for extremists of all kinds. Although efforts to remove violent and extremist content are increasing, there is a widely accepted need to also contest extremist messages with counter messages designed to undermine and disrupt extremist narratives.

While the majority of academic focus has been on large and well‐funded efforts linked to governments, this article considers the experiences of informal actors who are active in contesting extremist messaging but who lack the support of large institutions.

Informal actors come without some of the baggage that accompanies formal counter message campaigns, which have been attacked as lacking in credibility and constituting “just more government propaganda.” This has been noted by some of the wider countering violent extremism industry and the appetite for incorporating “real‐world” content in their campaigns seems to be rising.

This article fills a gap in our knowledge of the experiences of informal counter messaging actors. Through a series of in‐depth qualitative interviews it demonstrates that, despite the potentially serious risks of incorporating greater levels of informal content, there is an appetite among informal actors to engage with formal campaigns where they can be selective over who they work with and maintain a degree of control.

(From the journal abstract)


Benjamin Lee, 2019. Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors. Policy & Internet. https://doi.org/10.1002/poi3.210

Author: Ben Lee
Radicalization or Reaction: Understanding Engagement in Violent Extremism in Northern Ireland

Over the last decade various theoretical models of radicalization or pathways into engagement in violent extremism have been developed. However, there is a dearth of primary data based on direct contact with violent extremists to test these models.

In order to address this weakness, we analyzed accounts of engagement in violent extremism produced by former Northern Irish loyalist and republican paramilitaries to explore their understanding of how and why they engaged in this seemingly politically motivated violence.

A thematic analysis incorporating aspects of interpretative phenomenological analysis was employed to gain an understanding of these accounts. While the analysis of the interview transcripts produced findings that share similarities with many of the theoretical models, they challenge the importance of ideological radicalization in fueling initial engagement in violent extremism. Instead, the results demonstrate the importance of collective identity, reaction to events, perceived threats, community grievance, and peer and family influences in fueling initial engagement with the armed groups. Insulation and small‐group pressures within the organizations then amplify identity, threat perceptions, and biases, which increase feelings of efficacy and engagement in violence.

Finally, the findings discuss the role of imprisonment in ideologically radicalizing the participants, which in turn allows the paramilitaries to both sustain and rationalize their violent extremism.

(From the journal abstract)


Neil Ferguson & James W. McAuley, 2019. Radicalization or Reaction: Understanding Engagement in Violent Extremism in Northern Ireland. Political Psychology. https://doi.org/10.1111/pops.12618

Authors: Neil Ferguson, James McAuley
Fading lies: applying the verifiability approach after a period of delay

We tested the utility of applying the Verifiability Approach (VA) to witness statements after a period of delay. The delay factor is important to consider because interviewees are often not interviewed directly after witnessing an event.

A total of 64 liars partook in a mock crime and then lied about it during an interview, seven days later. Truth tellers (n = 78) partook in activities of their own choosing and told the truth about it during their interview, seven days later.

All participants were split into three groups, which provided three different verbal instructions relating to the interviewer’s aim to assess the statements for the inclusion of verifiable information: no information protocol (IP) (n = 43), the standard-IP (n = 46) and an enhanced-IP (n = 53). In addition to the standard VA approach of analysing verifiable details, we further examined verifiable witness information and verifiable digital information and made a distinction between verifiable details and verifiable sources.

We found that truth tellers reported more verifiable digital details and sources than liars.

(From the journal abstract)


Louise Jupe, Aldert Vrij, Sharon Leal & Galit Nahari, 2019. Fading lies: applying the verifiability approach after a period of delay. Psychology, Crime & Law. https://doi.org/10.1080/1068316X.2019.1669594

“Language of Lies”: Urgent Issues and Prospects in Verbal Lie Detection Research

Since its introduction into the field of deception detection, the verbal channel has become a rapidly growing area of research. The basic assumption is that liars differ from truth tellers in their verbal behaviour, making it possible to classify them by inspecting their verbal accounts. However, as noted in conferences and in private communication between researchers, the field of verbal lie detection faces several challenges that merit focused attention. The first author therefore proposed a workshop with the mission of promoting solutions for urgent issues in the field. Nine researchers and three practitioners with experience in credibility assessments gathered for 3 days of discussion at Bar‐Ilan University (Israel) in the first international verbal lie detection workshop. The primary session of the workshop took place the morning of the first day. In this session, each of the participants had up to 10 min to deliver a brief message, using just one slide. Researchers were asked to answer the question: ‘In your view, what is the most urgent, unsolved question/issue in verbal lie detection?’ Similarly, practitioners were asked: ‘As a practitioner, what question/issue do you wish verbal lie detection research would address?’ The issues raised served as the basis for the discussions that were held throughout the workshop. The current paper first presents the urgent, unsolved issues raised by the workshop group members in the main session, followed by a message to researchers in the field, designed to deliver the insights, decisions, and conclusions resulting from the discussions.

(From the journal abstract)


Galit Nahari, Tzachi Ashkenazi, Ronald P. Fisher, Pär-Anders Granhag, Irit Hershkowitz, Jaume Masip, Ewout H. Meijer, et al. 2019. ‘“Language of Lies”: Urgent Issues and Prospects in Verbal Lie Detection Research’. Legal and Criminological Psychology, 24 (1): 1–23. https://doi.org/10.1111/lcrp.12148.

Vulnerable Witnesses: The Investigation Stage’. In Vulnerable People and the Criminal Justice System: A Guide to Law and Practice

This chapter covers one of a number issues in the book Vulnerable People and the Criminal Justice System: A Guide to Law and Practice. The following description is from the publisher's website.

Over the last 25 years there has been a growing recognition that the way in which cases involving the vulnerable are investigated, charged and tried needs to change. Successive judgments of the Court of Appeal have re-enforced the message that advocates and judges have a duty to ensure vulnerable witnesses and defendants are treated fairly and allowed to participate effectively in the process.

How do practitioners recognise who is or may be vulnerable? How should that person be interviewed? What account should police and the CPS take of a defendant's vulnerabilities? How should advocates adjust their questioning of vulnerable witnesses and defendants whilst still complying with their duties to their client? How should judges manage a trial to ensure the effective participation of vulnerable witnesses and defendants? Vulnerable People and the Criminal Justice System, written by leading experts in the field, gathers together for the first time answers to these questions and many more. It provides a practical, informative and thought-provoking guide to recognising, assessing and responding to vulnerability in witnesses and defendants at each stage of the criminal process.

Backed by authoritative research and first-hand experience and drawing on recent case law, this book enables practitioners to deal with cases involving vulnerable people with calmness, authority, and confidence.

(From the book abstract)


Rebecca Milne, and Kevin Smith. 2017. ‘Vulnerable Witnesses: The Investigation Stage’. In Vulnerable People and the Criminal Justice System: A Guide to Law and Practice, edited by Penny Cooper and Heather Norton. Oxford, New York: Oxford University Press. https://global.oup.com/academic/product/vulnerable-people-and-the-criminal-justice-system-9780198801115.

Using the Model Statement to Elicit Verbal Differences Between Truth Tellers and Liars: The Benefit of Examining Core and Peripheral Details

Research has shown that a model statement elicits more information during an interview and that truth tellers and liars report a similar amount of extra information. We hypothesised that veracity differences would arise if the total amount of information would be split up into core details and peripheral details. A total of 119 truth tellers and liars reported a stand-out event that they had experienced in the last two years. Truth tellers had actually experienced the event and liars made up a story. Half of the participants were given a model statement during the interview. After exposure to a model statement, truth tellers and liars reported a similar amount of extra core information, but liars reported significantly more peripheral information. The variable details becomes an indicator of deceit in a model statement interview protocol as long as a distinction is made between core and peripheral details.

(From the journal abstract)


Sharon Leal, Aldert Vrij, Haneen Deeb, and Louise Jupe. 2018. ‘Using the Model Statement to Elicit Verbal Differences Between Truth Tellers and Liars: The Benefit of Examining Core and Peripheral Details’. Journal of Applied Research in Memory and Cognition, 7 (4): 610–17. https://doi.org/10.1016/j.jarmac.2018.07.001.

https://doi.org/10.1016/j.jarmac.2018.07.001
Memory at the Sharp End: The Costs of Remembering With Others in Forensic Contexts

In many applied contexts where accurate and reliable information informs operational decision‐making, emergency response resource allocation, efficient investigation, judicial process, and, ultimately, the delivery of justice, the costs of unfettered conversational remembering can be high. To date, research has demonstrated that conversations between co‐witnesses in the immediate aftermath of witnessed events and co‐witness retellings of witnessed events often impair both the quality and quantity of information reported subsequently. Given the largely negative impact of conversational remembering on the recall of both individual witnesses and groups of witnesses in this context, this review explores the reasons why these costs occur, the conditions under which costs are exacerbated, and how, in practical terms, the costs can be reduced in order to maximize the accuracy and completeness of witness accounts.

(From the journal abstract)


Lorraine Hope, and Fiona Gabbert. 2018. ‘Memory at the Sharp End: The Costs of Remembering With Others in Forensic Contexts’. Topics in Cognitive Science: https://doi.org/10.1111/tops.12357.

Authors: Lorraine Hope, Fiona Gabbert
Extending the Verifiability Approach Framework: The Effect of Initial Questioning

The verifiability approach (VA) is a lie‐detection tool that examines reported checkable details. Across two studies, we attempt to exploit liar's preferred strategy of repeating information by examining the effect of questioning adult interviewees before the VA. In Study 1, truth tellers (n = 34) and liars (n = 33) were randomly assigned to either an initial open or closed questioning condition. After initial questioning, participants were interviewed using the VA. In Study 2, truth tellers (n = 48) and liars (n = 48) were interviewed twice, with half of each veracity group randomly assigned to either the Information Protocol (an instruction describing the importance of reporting verifiable details) or control condition. Only truth tellers revised their initial statement to include verifiable detail. This pattern was most pronounced when initial questioning was open (Study 1) and when the information protocol was employed (Study 2). Thus, liar's preferred strategy of maintaining consistency between statements appears exploitable using the VA.

(From the journal abstract)


Adam Charles Harvey, Aldert Vrij, George Sarikas, Sharon Leal, Louise Jupe, and Galit Nahari. 2018. ‘Extending the Verifiability Approach Framework: The Effect of Initial Questioning’. Applied Cognitive Psychology, 32 (6): 787–804. https://doi.org/10.1002/acp.3465.

Terrorist Decision Making in the Context of Risk, Attack Planning, and Attack Commission

Terrorists from a wide array of ideological influences and organizational structures consider security and risk on a continuous and rational basis. The rationality of terrorism has been long noted of course but studies tended to focus on organizational reasoning behind the strategic turn toward violence. A more recent shift within the literature has examined rational behaviors that underpin the actual tactical commission of a terrorist offense. This article is interested in answering the following questions: What does the cost–benefit decision look like on a single operation? What does the planning process look like? How do terrorists choose between discrete targets? What emotions are felt during the planning and operational phases? What environmental cues are utilized in the decision-making process? Fortunately, much insight is available from the wider criminological literature where studies often provide offender-oriented accounts of the crime commission process. We hypothesize similar factors take place in terrorist decision making and search for evidence within a body of terrorist autobiographies.

(From the journal abstract)


Paul Gill, Zoe Marchment, Emily Corner, and Noémie Bouhana. 2018. ‘Terrorist Decision Making in the Context of Risk, Attack Planning, and Attack Commission’. Studies in Conflict & Terrorism: https://doi.org/10.1080/1057610X.2018.1445501.

Eliciting Human Intelligence: The Effects of Social Exclusion and Inclusion on Information Disclosure

Eliciting information from semicooperative sources presents a major challenge in investigative and intelligence settings. This research examines the role of the human need to belong in individuals' willingness to disclose critical information. We hypothesised that social exclusion would exert a threat to individuals' need to belong and self‐esteem, which would make them strive for social reconnection through sharing information with others. In two experiments (N = 150 and N = 135), social exclusion and inclusion were manipulated before participants were given the opportunity to disclose critical information in a semicooperative game setting (Study 1) or a mock intelligence interview (Study 2). Social exclusion did not influence information disclosure in any of the experiments. Instead, however, social inclusion unexpectedly increased information disclosure in the interview setting. We conclude that prior social experiences can influence the outcome of subsequent interviews, but the precise mechanisms underlying such influence are currently unknown.

(From the journal abstract)

Karl Ask, Emma Ejelöv, and Pär Anders Granhag. 2019. ‘Eliciting Human Intelligence: The Effects of Social Exclusion and Inclusion on Information Disclosure’. Journal of Investigative Psychology and Offender Profiling, 16 (1): 3–17. https://doi.org/10.1002/jip.1516.

Author: Karl Ask
‘Russia’ In Routledge Handbook of Terrorism and Counterterrorism

This chapter on 'Russia' is one of a series of case studies in the Routledge Handbook of Terrorism and Counterterrorism. The following description is from the publisher's website.

This new Handbook provides a comprehensive, state-of-the-art overview of current knowledge and debates on terrorism and counterterrorism, as well as providing a benchmark for future research.

The attacks of 9/11 and the ‘global war on terror’ and its various legacies have dominated international politics in the opening decades of the 21st century. In response to the dramatic rise of terrorism, within the public eye and the academic world, the need for an accessible and comprehensive overview of these controversial issues remains profound. The Routledge Handbook of Terrorism and Counterterrorism seeks to fulfil this need. The volume is divided into two key parts:

Part I: Terrorism: This section provides an overview of terrorism, covering the history of terrorism, its causes and characteristics, major tactics and strategies, major trends and critical contemporary issues such as radicalisation and cyber-terrorism. It concludes with a series of detailed case studies, including the IRA, Hamas and Islamic State.

Part II: Counterterrorism: This part draws on the main themes and critical issues surrounding counterterrorism. It covers the major strategies and policies, key events and trends and the impact and effectiveness of different approaches. This section also concludes with a series of case studies focused on major counterterrorism campaigns.

This book will be of great interest to all students of terrorism and counterterrorism, political violence, counter-insurgency, criminology, war and conflict studies, security studies and IR more generally.

(From the book abstract)


Cerwyn Moore. 2019. ‘Russia’. In Routledge Handbook of Terrorism and Counterterrorism, edited by Andrew Silke, 1st Edition, 604–14. Abingdon: Routledge. https://www.routledge.com/Routledge-Handbook-of-Terrorism-and-Counterterrorism-1st-Edition/Silke/p/book/9781138819085.

Violent Extremism: A Comparison of Approaches to Assessing and Managing Risk

The task of assessing and managing risk of violence has evolved considerably in the last 25 years, and the field of violent extremism has the potential to stand on the shoulders of the giants of this time. Therefore, the objective of this study was to identify good practice in the risk field and to apply that to the specific area of risk in relation to violent extremism – in order that developments here accord to highest standards of practice achieved so far elsewhere.

Method and Results

We begin by addressing the essential requirement to define the task of assessing and managing the risk of violent extremism – What is its purpose and parameters, who are its practitioners, in what contexts is this activity delivered, and how might any such context both facilitate and hinder the objectives of the task? Next, we map the terrain – What guidance is already available to assist practitioners in their work of understanding and managing the risk of violent extremism, and by what standards may we judge the quality of this and future guidance in the contexts in which is it applied? Finally, we explore options for the development of the field in terms of the empirical basis upon which the risks presented by individuals and the organizations to which they may affiliate are assessed, understood, and managed.

Conclusions

Recommendations are proposed in relation to each of these three areas of concern with a view to supporting the rapid and credible advancement of this growing and vital area of endeavour.

(From the journal abstract)


Caroline Logan and Monica Lloyd. 2019. ‘Violent Extremism: A Comparison of Approaches to Assessing and Managing Risk’. Legal and Criminological Psychology, 24 (1): 141–61. https://doi.org/10.1111/lcrp.12140.

Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging

Online countermessaging—communication that seeks to disrupt the online content disseminated by extremist groups and individuals—is a core component of contemporary counterterrorism strategies. Countermessaging has been heavily criticized, not least on the grounds of effectiveness. Whereas current debates are focused on the role of government and large organizations in developing and disseminating countermessages, this article argues that such approaches overlook the informal production of countermessages. Recognizing the appetite for “natural world” content among those engaged in countermessaging, this article highlights some of the potential benefits of informal approaches to countermessaging. At the same time, the article also acknowledges the risks that may result from closer working between countermessaging organizations and informal actors.

(From the journal abstract)


Benjamin Lee. 2018. ‘Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging’. Studies in Conflict & Terrorism: 1–17. https://doi.org/10.1080/1057610X.2018.1513697.

Author: Ben Lee
Applying the Study of Religions in the Security Domain: Knowledge, Skills, and Collaboration

Since the 1990s, scholars of religion on both sides of the Atlantic have been drawn into engagement with law enforcement agencies and security policymakers and practitioners, particularly for their expertise on new religious movements and Islam. Whilst enabling researchers to contribute to real-world challenges, this relationship has had its frustrations and difficulties, as well as its benefits and opportunities. Drawing on examples from the UK, Canada, and the US, I set out the relationship between religion and the contemporary security landscape before discussing some of the key issues arising in security research partnerships. I then turn to the question of knowledge exchange and translation in the study of religions, developing the distinction between ‘know what’ (knowledge about religions and being religiously literate), ‘know why’ (explaining religions and making the link to security threats), and ‘know how’ (researcher expertise and skills in engagement with practitioners).

(From the journal abstract)


Kim Knott. 2018. ‘Applying the Study of Religions in the Security Domain: Knowledge, Skills, and Collaboration’. Journal of Religious and Political Practice, 4 (3): 354–73. https://doi.org/10.1080/20566093.2018.1525901.

Author: Kim Knott
The Psychology of Conspiracy Theories

What psychological factors drive the popularity of conspiracy theories, which explain important events as secret plots by powerful and malevolent groups? What are the psychological consequences of adopting these theories? We review the current research and find that it answers the first of these questions more thoroughly than the second. Belief in conspiracy theories appears to be driven by motives that can be characterized as epistemic (understanding one’s environment), existential (being safe and in control of one’s environment), and social (maintaining a positive image of the self and the social group). However, little research has investigated the consequences of conspiracy belief, and to date, this research does not indicate that conspiracy belief fulfills people’s motivations. Instead, for many people, conspiracy belief may be more appealing than satisfying. Further research is needed to determine for whom, and under what conditions, conspiracy theories may satisfy key psychological motives.

(From the journal abstract)


Karen Douglas, Robbie M. Sutton, and Aleksandra Cichocka. 2017. ‘The Psychology of Conspiracy Theories’. Current Directions in Psychological Science, 26 (6): 538–42. https://doi.org/10.1177/0963721417718261.

Telling Stories of Terrorism: A Framework for Applying Narrative Approaches to the Study of Militant’s Self-Accounts

Narrative has recently garnered much attention in the study of terrorism but remains poorly understood. This paper offers some initial steps towards translating the promise of narrative approaches into a set of steps for systematically analysing and understanding terrorists’ own accounts of their engagement with extremism and militancy. This approach rests on the assumption that terrorist authored accounts are more than post-hoc rhetorical exercises that aim to persuade others, or even the authors themselves, of the righteousness of their political cause or otherwise mitigate their responsibility for their involvement in violence. In particular, I advance a framework for methodically applying narrative approaches to terrorist authored texts, in particular, autobiographies. In doing so, I will demonstrate how this approach can help better comprehend how individuals involved in militancy understand the world, draw upon existing narrative resources and give meaning to their actions.

(From the journal abstract)


Simon Copeland. 2018. ‘Telling Stories of Terrorism: A Framework for Applying Narrative Approaches to the Study of Militant’s Self-Accounts’. Behavioral Sciences of Terrorism and Political Aggression: 1–22. https://doi.org/10.1080/19434472.2018.1525417.

Understanding Conspiracy Theories

Scholarly efforts to understand conspiracy theories have grown significantly in recent years, and there is now a broad and interdisciplinary literature. In reviewing this body of work, we ask three specific questions. First, what factors are associated with conspiracy beliefs? Our review of the literature shows that conspiracy beliefs result from a range of psychological, political, and social factors. Next, how are conspiracy theories communicated? Here, we explain how conspiracy theories are shared among individuals and spread through traditional and social media platforms. Next, what are the societal risks and rewards associated with conspiracy theories? By focusing on politics and science, we argue that conspiracy theories do more harm than good. We conclude by suggesting several promising avenues for future research.

(From the journal abstract)


Karen Douglas, Joseph E. Uscinski, Robbie M. Sutton, Aleksandra Cichocka, Turkay Nefes, Chee Siang Ang, and Farzin Deravi. 2019. ‘Understanding Conspiracy Theories’. Political Psychology, 40 (S1): 3–35. https://doi.org/10.1111/pops.12568.

Exploring Susceptibility to Phishing in the Workplace

Phishing emails provide a means to infiltrate the technical systems of organisations by encouraging employees to click on malicious links or attachments. Despite the use of awareness campaigns and phishing simulations, employees remain vulnerable to phishing emails. The present research uses a mixed methods approach to explore employee susceptibility to targeted phishing emails, known as spear phishing. In study one, nine spear phishing simulation emails sent to 62,000 employees over a six-week period were rated according to the presence of authority and urgency influence techniques. Results demonstrated that the presence of authority cues increased the likelihood that a user would click a suspicious link contained in an email. In study two, six focus groups were conducted in a second organisation to explore whether additional factors within the work environment impact employee susceptibility to spear phishing. We discuss these factors in relation to current theoretical approaches and provide implications for user communities.

Highlights

  • Susceptibility to phishing emails is explored in an ecologically valid setting.
  • Authority and urgency techniques are found to impact employee susceptibility.
  • Context-specific factors are also likely to impact employee susceptibility.
  • A range of targeted initiatives are required to address susceptibility factors.

(From the journal abstract)


Emma Williams, Joanne Hinds, and Adam N. Joinson. 2018. ‘Exploring Susceptibility to Phishing in the Workplace’. International Journal of Human-Computer Studies, 120 (December): 1–13. https://doi.org/10.1016/j.ijhcs.2018.06.004.

Digital Hoarding Behaviours: Measurement and Evaluation

The social and psychological characteristics of individuals who hoard physical items are quite well understood, however very little is known about the psychological characteristics of those who hoard digital items and the kinds of material they hoard. In this study, we designed a new questionnaire (Digital Behaviours Questionnaire: DBQ) comprising 2 sections: the Digital Hoarding Questionnaire (DHQ) assessing two key components of physical hoarding (accumulation and difficulty discarding); and the second measuring the extent of digital hoarding in the workplace (Digital Behaviours in the Workplace Questionnaire: DBWQ).

In an initial study comprising 424 adults we established the psychometric properties of the questionnaires. In a second study, we presented revised versions of the questionnaires to a new sample of 203 adults, and confirmed their validity and reliability. Both samples revealed that digital hoarding was common (with emails being the most commonly hoarded items) and that hoarding behaviours at work could be predicted by the 10 item DHQ. Digital hoarding was significantly higher in employees who identified as having ‘data protection responsibilities’, suggesting that the problem may be influenced by working practices. In sum, we have validated a new psychometric measure to assess digital hoarding, documented some of its psychological characteristics, and shown that it can predict digital hoarding in the workplace.

(From the journal abstract)


Nick Neave, Pam Briggs, Kerry McKellar, and Elizabeth Sillence. 2019. ‘Digital Hoarding Behaviours: Measurement and Evaluation’. Computers in Human Behavior, 96 (July): 72–77. https://doi.org/10.1016/j.chb.2019.01.037.

Human and Computer Personality Prediction From Digital Footprints

Is it possible to judge someone accurately from his or her online activity? The Internet provides vast opportunities for individuals to present themselves in different ways, from simple self-enhancement to malicious identity fraud. We often rely on our Internet-based judgments of others to make decisions, such as whom to socialize with, date, or employ. Recently, personality-perception researchers have turned to studying social media and digital devices in order to ask whether a person’s digital traces can reveal aspects of his or her identity. Simultaneously, advances in “big data” analytics have demonstrated that computer algorithms can predict individuals’ traits from their digital traces. In this article, we address three questions: What do we currently know about human- and computer-based personality assessments? How accurate are these assessments? Where are these fields heading? We discuss trends in the current findings, provide an overview of methodological approaches, and recommend directions for future research.

(From the journal abstract)


Joanne Hinds and Adam Joinson. 2019. ‘Human and Computer Personality Prediction From Digital Footprints’. Current Directions in Psychological Science, https://doi.org/10.1177/0963721419827849.

What Demographic Attributes Do Our Digital Footprints Reveal?

To what extent does our online activity reveal who we are? Recent research has demonstrated that the digital traces left by individuals as they browse and interact with others online may reveal who they are and what their interests may be. In the present paper we report a systematic review that synthesises current evidence on predicting demographic attributes from online digital traces. Studies were included if they met the following criteria: (i) they reported findings where at least one demographic attribute was predicted/inferred from at least one form of digital footprint, (ii) the method of prediction was automated, and (iii) the traces were either visible (e.g. tweets) or non-visible (e.g. clickstreams). We identified 327 studies published up until October 2018. Across these articles, 14 demographic attributes were successfully inferred from digital traces; the most studied included gender, age, location, and political orientation. For each of the demographic attributes identified, we provide a database containing the platforms and digital traces examined, sample sizes, accuracy measures and the classification methods applied. Finally, we discuss the main research trends/findings, methodological approaches and recommend directions for future research.

(From the journal abstract)


Joanne Hinds and Adam N. Joinson. 2018. ‘What Demographic Attributes Do Our Digital Footprints Reveal? A Systematic Review’. PLOS ONE, 13 (11): e0207112. https://doi.org/10.1371/journal.pone.0207112.

In Their Own Words: Employee Attitudes towards Information Security

The purpose of this study is to uncover employee attitudes towards information security and to address the issue of social acceptability bias in information security research.

Design/methodology/approach

The study used personal construct psychology and repertory grids as the foundation for the study in a mixed-methods design. Data collection consisted of 11 in-depth interviews followed by a survey with 115 employee responses. The data from the interviews informed the design of the survey.

Findings

The results of the interviews identified a number of themes around individual responsibility for information security and the ability of individuals to contribute to information security. The survey demonstrated that those employees who thought the that organisation was driven by the need to protect information also thought that the risks were overstated and that their colleagues were overly cautious. Conversely, employees who thought that the organisation was driven by the need to optimise its use of information felt that the security risks were justified and that colleagues took too many risks.

Research limitations/implications

The survey findings were not statistically significant, but by breaking the survey results down further across business areas, it was possible to see differences within groups of individuals within the organisation.

Originality/value

The literature review highlights the issue of social acceptability bias and the problem of uncovering weakly held attitudes. In this study, the use of repertory grids offers a way of addressing these issues.

(From the journal abstract)


Debi Ashenden. 2018. ‘In Their Own Words: Employee Attitudes towards Information Security’. Information and Computer Security, 26 (3): 327–37. https://doi.org/10.1108/ICS-04-2018-0042.

Within-Subjects Verbal Lie Detection Measures: A Comparison between Total Detail and Proportion of Complications

We examined whether the verbal cue, proportion of complications, was a more diagnostic cue to deceit than the amount of information provided (e.g., total number of details).

Method

In the experiment, 53 participants were interviewed. Truth tellers (n = 27) discussed a trip they had made during the last twelve months; liars (n = 26) fabricated a story about such a trip. The interview consisted of an initial recall followed by a model statement (a detailed account of an experience unrelated to the topic of investigation) followed by a post‐model statement recall. The key dependent variables were the amount of information provided and the proportion of all statements that were complications.

Results

The proportion of complications was significantly higher amongst truth tellers than amongst liars, but only in the post‐model statement recall. The amount of information provided did not discriminate truth tellers from liars in either the initial or post‐model statement recall.

Conclusion

The proportion of complications is a more diagnostic cue to deceit than the amount of information provided as it takes the differential verbal strategies of truth tellers and liars into account.

(From the journal abstract)


Aldert Vrij, Sharon Leal, Louise Jupe, and Adam Harvey. 2018. ‘Within-Subjects Verbal Lie Detection Measures: A Comparison between Total Detail and Proportion of Complications’. Legal and Criminological Psychology, 23 (2): 265–79. https://doi.org/10.1111/lcrp.12126.

The Cognitive Interview and Its Use for People with Autism Spectrum Disorder

This chapter first discusses the structure of the cognitive interview (CI) and its tenets for eliciting detailed and accurate information from cooperative witnesses. The original CI was comprised of four mnemonics: report everything (RE), mental reinstatement of context (MRC), change temporal order (CTO), and change perspective (CP). The chapter then explores the protocol's effectiveness for application with individuals with autism spectrum disorder (ASD), considering modifications for use with a population group that has difficulties communicating personal experiences. The memory profile of people with ASD suggests that problems arise when people with ASD are called on to use complex strategies to encode or retrieve information. A modified version of the MRC and the use of the sketch plan MRC help people with ASD to provide information that is comparable in accuracy to that of members of the typical population.

(From the journal abstract)


Joanne Richards and Rebecca Milne. 2018. ‘The Cognitive Interview and Its Use for People with Autism Spectrum Disorder’. In The Wiley Handbook of Memory, Autism Spectrum Disorder, and the Law, 245–69. John Wiley & Sons, Ltd. https://doi.org/10.1002/9781119158431.ch13.

Using Specific Model Statements to Elicit Information and Cues to Deceit in Information-Gathering Interviews

Model Statements are designed to modify an interviewee's expectation of the amount of details required during an interview. This study examined tailored Model Statements, emphasising either spatial (Spatial-MS), or temporal (Temporal-MS) details, compared to a control condition (no-MS). Participants (63 liars, 63 truth-tellers) were randomly allocated to one of three interviewing conditions. Truth-tellers honestly reported a spy mission, whereas liars performed a covert mission and lied about their activities. The Spatial-MS elicited more spatial details than the control, particularly for truth-tellers. The Temporal-MS elicited more temporal details than the control, for truth-tellers and liars combined. Results indicate that the composition of different Model Statements increases the amount of details provided and, regarding spatial details, affects truth-teller's and liar's statements differently. Thus, Model Statements can be constructed to elicit information and magnify cues to deceit.

(From the journal abstract)


Cody Porter, Aldert Vrij, Sharon Leal, Zarah Vernham, Giacomo Salvanelli, and Niall McIntyre. 2018. ‘Using Specific Model Statements to Elicit Information and Cues to Deceit in Information-Gathering Interviews’. Journal of Applied Research in Memory and Cognition, 7 (1): 132–42. https://doi.org/10.1016/j.jarmac.2017.10.003.

The Internal Brakes on Violent Escalation: A Typology

Most groups do less violence than they are capable of. Yet while there is now an extensive literature on the escalation of or radicalisation towards violence, particularly by ‘extremist’ groups or actors, and while processes of de-escalation or de-radicalisation have also received significant attention, processes of non- or limited escalation have largely gone below the analytical radar.

This article contributes to current efforts to address this limitation in our understanding of the dynamics of political aggression by developing a descriptive typology of the ‘internal brakes’ on violent escalation: the mechanisms through which members of the groups themselves contribute to establish and maintain limits upon their own violence. We identify five underlying logics on which the internal brakes operate: strategic, moral, ego maintenance, outgroup definition, and organisational.

The typology is developed and tested using three very different case studies: the transnational and UK jihadi scene from 2005 to 2016; the British extreme right during the 1990s, and the animal liberation movement in the UK from the mid-1970s until the early 2000s.

(From the journal abstract)


Joel Busher, Donald Holbrook & Graham Macklin 2018. ‘The internal brakes on violent escalation: a typology’. Behavioral Sciences of Terrorism and Political Aggression 10.1080/19434472.2018.1551918

Reframing Intelligence Interviews: The Applicability of Psychological Research to HUMINT Elicitation

Effective discovery and subsequent threat mitigation is predicated on accurate, timely and detailed actionable information. Information, an important element within intelligence and investigation ensures appropriate judicial disposal in Law Enforcement Agency’s (LEA) efforts to bring offenders to justice.

The value of information to delivering community safety is reflected in associated policy, practice, and process. Effective interviewing, in both its formal and informal interactive states, offers a significant opportunity to elicit critical strategic and tactical information that both informs and drives LEA activity.

It is unexpected then, that within the context of information collection, not only are human interactions between LEA and members of the public under-exploited but also, when the intention is to collect information, how unsatisfactorily it is approached and executed.

It is apparent that the required elicitation skills, including rapport building and the identification of source motivation, are not sufficiently taught, and the governing policy is overly cautious with a negligible evidence base.

Whilst this chapter focuses on the psychological aspects of techniques available for gathering information, and in particular intelligence collection, the underlying psychological principles of conducting an effective interview are relevant to a wider audience.

(From the book abstract)


Stanier, I. P., and Jordan Nunan (2018). Reframing Intelligence Interviews: The Applicability of Psychological Research to HUMINT Elicitation. In A. Griffiths, & R. Milne (Eds.), The Psychology of Criminal Investigation: From Theory to Practice (pp. 226-248). London: Routledge. https://doi.org/10.4324/9781315637211

Using the model statement to elicit verbal differences between truth tellers and liars amongst Arab interviewees: A partial replication of Leal, Vrij, Deeb, and Jupe (2018)

Leal, Vrij, Deeb, and Jupe (2018) found—with British participants—that a model statement elicited (a) more information and (b) a cue to deceit: After exposure to a model statement, liars reported significantly more peripheral information than truth tellers.

We sought to replicate these findings with Arabs living in Israel. Truth tellers and liars reported a stand‐out event that they had (truth tellers) or pretended to have (liars) experienced in the last 2 years. Half of the participants were given a model statement in the second phase of the interview. Replicating Leal et al. (2018a), (a) truth tellers reported more core details than liars initially and (b) a model statement resulted in more additional core and peripheral details in the second phase of the interview. Unlike in Leal et al. (2018a), a model statement did not have a differential effect on truth tellers in the current experiment.

(From the journal abstract)


Sharon Leal, Aldert Vrij, Zarah Vernham et al, 2019. Using the model statement to elicit verbal differences between truth tellers and liars amongst Arab interviewees: A partial replication of Leal, Vrij, Deeb, and Jupe (2018). Applied Cognitive Psychology. https://doi.org/10.1002/acp.3536

Authors: Aldert Vrij, Sharon Leal, Zarah Vernham
Deception and truth detection when analyzing nonverbal and verbal cues

In this article, I present my view on the significant developments and theoretical/empirical tipping points in nonverbal and verbal deception and lie detection from the last 30 years and on prospects for future research in this domain.

I discuss three major shifts in deception detection research: (a) From observing target persons' nonverbal behavior to analyzing their speech; (b) from lie detection based on differences between truth tellers and liars' levels of arousal to lie detection based on the different cognitive processes or strategies adopted to appear convincing; and (c) from passively observing target persons to actively interviewing them to elicit or enhance verbal cues to deceit.

Finally, I discuss my ideas for future research, focusing on initiatives from my own lab.

Hopefully, this will stimulate other researchers to explore innovative ideas in the verbal deception research domain, which already has seen so much progress in the last decade.

(From the journal abstract)

 


Vrij, Aldert. 2018. Deception and truth detection when analyzing nonverbal and verbal cues. Applied Cognitive Psychology. 10.1002/acp.3457.

Author: Aldert Vrij
Racialisation, ‘Religious Violence’ and Radicalisation: The Persistence of Narratives of ‘Sikh Extremism

Recent years have seen concerns raised in media and by policymakers about rising levels of ‘Sikh extremism’ and ‘Sikh radicalisation’ in Western Sikh diasporas.

In this article I analyse why these concerns persist, particularly given the general non-violent nature of ‘Sikh militancy’ (Wallace . “Sikh Militancy and Non-Violence.” In Sikhism In Global Context, edited by Pashaura Singh, 122–144. Oxford University Press) and the relatively few incidents of terrorism beyond those which took place during the height of Sikh militancy in the 1980s.

I argue that these concerns are a consequence of an underlying ‘anxiety about anti-assimilationist religious others’ impacted by (a) the racialisation of religious minorities which began in the colonial period, (b) a specific type of ‘Indian secularism’ which frames Indian legislation and media reporting and (c) the post 9/11 securitisation and increased surveillance of Sikh bodies as part of the ‘War on Terror’ with its concerns about ‘religious violence’ and the necessity of the secular nation state to ensure that any such violence is suitably policed.

This article will be of interest to those examining the racialisation and representations of religious minorities in Western liberal democracies and the impact of securitisation policies on these communities.

(From the journal abstract)


Jasjit Singh, 2019. Racialisation, ‘religious violence’ and radicalisation: the persistence of narratives of ‘Sikh extremism’. Journal of Ethnic and Migration Studies. https://doi.org/10.1080/1369183X.2019.1623018

Author: Jasjit Singh
Mimicry in Online Conversations: An Exploratory Study of Linguistic Analysis Techniques

A number of computational techniques have been proposed that aim to detect mimicry in online conversations. In this paper, we investigate how well these reflect the prevailing cognitive science model, i.e. the Interactive Alignment Model. We evaluate Local Linguistic Alignment, word vectors, and Language Style Matching and show that these measures tend to show the features we expect to see in the IAM, but significantly fall short of the work of human classifiers on the same data set. This reflects the need for substantial additional research on computational techniques to detect mimicry in online conversations. We suggest further work needed to measure these techniques and others more accurately.

(From the journal abstract)


Carrick, Tom, Awais Rashid, and Paul. J. Taylor. 2016. ‘Mimicry in Online Conversations: An Exploratory Study of Linguistic Analysis Techniques’. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 732–36. http://eprints.lancs.ac.uk/80520/1/asonam_mimicry.pdf

Predicting Collective Action from Micro-Blog Data

Global and national events in recent years have shown that social media, and particularly micro-blogging services such as Twitter, can be a force for good (e.g., Arab Spring) and harm (e.g., London riots). In both of these examples, social media played a key role in group formation and organisation, and in the coordination of the group’s subsequent collective actions (i.e., the move from rhetoric to action).

Surprisingly, despite its clear importance, little is understood about the factors that lead to this kind of group development and the transition to collective action. This paper focuses on an approach to the analysis of data from social media to detect weak signals, i.e., indicators that initially appear at the fringes, but are, in fact, early indicators of such large-scale real-world phenomena.

Our approach is in contrast to existing research which focuses on analysing major themes, i.e., the strong signals, prevalent in a social network at a particular point in time. Analysis of weak signals can provide interesting possibilities for forecasting, with online user-generated content being used to identify and anticipate possible offline future events. We demonstrate our approach through analysis of tweets collected during the London riots in 2011 and use of our weak signals to predict tipping points in that context.

(From the journal abstract)


Charitonidis, Christos, Awais Rashid, and Paul J. Taylor. 2017. ‘Predicting Collective Action from Micro-Blog Data’. In Prediction and Inference from Social Networks and Social Media, 141–70. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-51049-1_7.

The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing

Reliable information is critical for investigations in forensic and security settings; however, obtaining reliable information for complex events can be challenging. In this study, we extend the timeline technique, which uses an innovative and interactive procedure where events are reported on a physical timeline. To facilitate remembering we tested two additional mnemonics, self-generated cues (SGC), which witnesses produce themselves, against other-generated cues (OGC) which are suggested by the interviewer.

One hundred and thirty-two participants witnessed a multi-perpetrator theft under full or divided attention and provided an account using the timeline comparing the efficacy of SGC, OGC, and no cues (control). Mock-witnesses who used self-generated cues provided more correct details than mock-witnesses in the other-generated or no cues conditions, with no cost to accuracy, under full but not under divided attention. Promising results on SGC suggest that they might be a useful addition to current interviewing techniques.

(From the journal abstract)


Kontogianni, Feni, Lorraine Hope, Paul J. Taylor, Aldert Vrij, and Fiona Gabbert. 2018. ‘The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing’. Journal of Applied Research in Memory and Cognition, April. https://doi.org/10.1016/j.jarmac.2018.03.006.

Cross-Cultural Verbal Deception

Background
‘Interviewing to detect deception’ research is sparse across different Ethnic Groups. In the present experiment, we interviewed truth tellers and liars from British, Chinese, and Arab origins. British interviewees belong to a low‐context culture (using a communication style that relies heavily on explicit and direct language), whereas Chinese and Arab interviewees belong to high‐context cultures (communicate in ways that are implicit and rely heavily on context).

Method
Interviewees were interviewed in pairs and 153 pairs took part. Truthful pairs discussed an actual visit to a nearby restaurant, whereas deceptive pairs pretended to have visited a nearby restaurant. Seventeen verbal cues were examined.

Results
Cultural cues (differences between cultures) were more prominent than cues to deceit (differences between truth tellers and liars). In particular, the British interviewees differed from their Chinese and Arab counterparts and the differences reflected low‐ and high‐context culture communication styles.

Conclusion
Cultural cues could quickly lead to cross‐cultural verbal communication errors: the incorrect interpretation of a cultural difference as a cue to deceit.

(From the journal abstract)


Leal, Sharon, Aldert Vrij, Zarah Vernham, Gary Dalton, Louise Jupe, Adam Harvey, and Galit Nahari. 2018. ‘Cross-Cultural Verbal Deception’. Legal and Criminological Psychology, June. https://doi.org/10.1111/lcrp.12131.

‘It’s not paranoia when they are really out to get you’: the role of conspiracy theories in the context of heightened security

Conspiracy theories have been seen as important supporting components in extreme political beliefs. This paper considers conspiracy theories in the counter jihad movement, an international network combining cultural nationalism with xenophobia towards Muslims.

This paper evaluates the nature of conspiracy belief through the analysis of several key texts published by counter jihad activists, and of content published on a daily basis by three core websites. The findings show the Islamisation conspiracy theory to be highly modular, with authors able to mix and match villains.

The analysis of daily published content demonstrates that, at the routine level, conspiracy theory is rarely used openly as a call to action.

This is in keeping with other examples of conspiracy theory in extreme right wing movements in which conspiracy is seen as justification for existing prejudices. However, the political and security context the counter jihad operates in also affords the movement opportunities to support some of their claims, often by reproducing or reinterpreting mainstream or quasi-mainstream reporting, without reverting openly to conspiracy tropes.

In the case of the counter jihad movement, as well as potentially other far-right movements, conspiracy theory may be taking a back seat to a more sophisticated public relations approach.

(From the journal abstract)


Lee, Benjamin J. 2017. ‘It’s Not Paranoia When They Are Really out to Get You: The Role of Conspiracy Theories in the Context of Heightened Security’. Behavioral Sciences of Terrorism and Political Aggression 9 (1): 4–20. https://doi.org/10.1080/19434472.2016.1236143.

Out with the Old and … In with the Old? A Critical Review of the Financial War on Terrorism on the Islamic State of Iraq and Levant

This article critically considers the effectiveness of the ‘Financial War on Terrorism’ on the funding streams of the Islamic State of Iraq and Levant (ISIL).

The next section of the article highlights how the international community concentrated on tackling money laundering prior to the terrorist attacks in September 2001 and how this policy dramatically altered. In particular, this section concentrates on the development of and definition of the ‘Financial War on Terrorism’.

The final part of the article seeks to determine if the ‘Financial War on Terrorism’ is able to tackle the funding streams of ISIL.

(From the journal abstract)


Ryder, Nicholas. 2018. ‘Out with the Old and … In with the Old? A Critical Review of the Financial War on Terrorism on the Islamic State of Iraq and Levant’. Studies in Conflict & Terrorism 41 (2): 79–95. http://eprints.uwe.ac.uk/28343/.

The Rise and Fall of the English Defence League: Self-Governance, Marginal Members and the Far Right

What determines the success or failure of far-right organisations? This article uses new qualitative data to explain the sudden rise and subsequent decline of the English Defence League, an anti-Islamic, street protest organisation established in the UK in 2009.

We explain the rise and fall of the English Defence League through the lens of the theory of collective action to show that the English Defence League initially motivated activism by supplying selective incentives that were enhanced by the participation of others.

The pursuit of ‘participatory crowding’ led to indiscriminate recruitment into the organisation that enabled numbers to expand into the thousands, but ultimately caused the English Defence League’s downfall because it resulted in the presence of large numbers of ‘marginal members’ with low levels of commitment whose subsequent exit was decisively destructive.

Self-governance mechanisms to ensure greater loyalty from members could have prevented the English Defence League’s decline but would also have limited its initial success.

(From the journal abstract)


Morrow, Elizabeth A, and John Meadowcroft. 2018. ‘The Rise and Fall of the English Defence League: Self-Governance, Marginal Members and the Far Right’. Political Studies, June. https://doi. org/10.1177/0032321718777907.

Lessons from the Extreme: What Business Negotiators Can Learn from Hostage Negotiations

Editors’ Note: The high-stakes world of the hostage negotiator draws instinctive respect from other negotiators. But if you operate in another domain, you could be excused for thinking that hostage negotiation has nothing to do with you.

That impression, it turns out, is quite often wrong. Here, two researchers draw parallels to several kinds of business and other disputes in which it often seems that one of the parties acts similarly to a hostage taker. Understanding what hostage negotiators have learned to do in response can be a real asset to a negotiator faced with one of these situations.

(From the book abstract)


Taylor, Paul J., and William A. Donohue. 2017. ‘Lessons from the Extreme: What Business Negotiators Can Learn from Hostage Negotiations’. In Negotiator’s Desk Reference, edited by Chris Honeyman and Andrea Kupfer Schneider. DRI Press. www.ndrweb.com.

Can Programming Frameworks Bring Smartphones into the Mainstream of Psychological Science?

Smartphones continue to provide huge potential for psychological science and the advent of novel research frameworks brings new opportunities for researchers who have previously struggled to develop smartphone applications.

However, despite this renewed promise, smartphones have failed to become a standard item within psychological research. Here we consider the key issues that continue to limit smartphone adoption within psychological science and how these barriers might be diminishing in light of ResearchKit and other recent methodological developments.

We conclude that while these programming frameworks are certainly a step in the right direction it remains challenging to create usable research-orientated applications with current frameworks.

Smartphones may only become an asset for psychology and social science as a whole when development software that is both easy to use and secure becomes freely available.

(From the journal abstract)


Piwek, Lukasz, David A. Ellis, and Sally Andrews. 2016. ‘Can Programming Frameworks Bring Smartphones into the Mainstream of Psychological Science?’ Frontiers in Psychology 7. https://doi. org/10.3389/fpsyg.2016.01252.

Psychological and Behavioral Examinations of Online Terrorism

It has long been recognised that terrorists make use of the internet as one of many means through which to further their cause. This use of the internet has fuelled a large number of studies seeking to understand terrorists' use of online environments.

This chapter provides an overview of current understandings of online terrorist behavior, coupled with an outline of the qualitative and quantitative approaches that can and have been adopted to research this phenomenon. The chapter closes with a discussion of the contentious issue of ethics in online terrorism research.

The aim of the chapter is to equip readers with the necessary knowledge and skills to conduct their own research into terrorists' online behavior, taking best ethical practices into consideration when doing so.

(From the book abstract)


Prentice, Sheryl, and Paul J. Taylor. 2018. ‘Psychological and Behavioral Examinations of Online Terrorism’. In Psychological and Behavioral Examinations in Cyber Security, edited by John McAlaney, 151–71. https://www.igi-global.com/chapter/psychological-and-behavioral-examinations-of-online-terrorism/199887.

Same Kind of Different: Affordances, Terrorism, and the Internet

The rapid development of the Internet as a cornerstone of private and social life has provoked a growing effort by law enforcement and security agencies to understand what role the Internet plays in terrorism. Paul Gill, Emily Corner, Maura Conway, Amy Thornton, Mia Bloom, and John Horgan's (2017, this issue) effort to identify empirically when and how terrorists engage with the Internet is thus timely and important.

Understanding when terrorists use the Internet is valuable for investigators who must evaluate the immediacy of the risk posed by a suspect or cell. Knowing the typical patterns of use (or lack of use) can facilitate inferences about a cell's preparedness, the nature of its support, and even the goal of its attack. Understanding how terrorists use the Internet is essential for policy makers who must construct legislation to deter citizens from terrorism while retaining their rights to freedom.

This is arguably best accomplished by legislation targeted at a narrow set of Internet uses that are, as far as possible, exclusively associated with illegal actions.

In this policy essay, we focus on two of Gill et al.’s (2017) main contributions. We argue that, subject to robust independent replication, they encourage thought about the functions of the Internet for terrorists, which in turn may have implications that offer useful guidance for policy and practice. Alongside the article's conceptual contributions, Gill et al. also assert to have resolved several pragmatic challenges and we suggest ways in which their solutions, if developed fully, could offer value to the security analyst community. Finally, we take stock of where Gill et al.’s contribution has left us and review the next steps.

(From the journal abstract)


Taylor, Paul J., Donald Holbrook, and Adam Joinson. 2017. ‘Same Kind of Different’. Criminology & Public Policy 16 (1): 127–33. https://doi.org/10.1111/1745-9133.12285.

Between Caucasus and Caliphate: The Splintering of the North Caucasus Insurgency

In December 2014, several high-ranking field commanders from the Caucasus Emirate (Imarat Kavkaz, IK), an insurgent and designated terrorist group in Russia’s North Caucasus, pledged allegiance to the Islamic State (IS). Following the subsequent defection of many of the IK’s surviving commanders, IS consolidated its regional presence with the establishment of a formal branch, the Caucasus Wilayah (IS/CW).

This paper uses Social Movement Theory’s concept of framing to interpret North Caucasus insurgent leaders’ response to the Syrian conflict and identify the differences in the competing factions’ articulated ideologies. It finds that IS/CW leaders have sought to draw on the emotional appeal of the “caliphate” and redirect it back into the local insurgency, while neglecting to articulate alternative tactics or goals.

Those leaders who remained loyal to the IK, by contrast, rooted their opposition in jihadi scholarship and rejected the legitimacy of the “caliphate”. However, apparent ideological differences have been exacerbated by communication difficulties that have hindered leaders’ ability to negotiate internal and external pressures.

This paper contributes to understandings of the differences between the competing factions, illustrates how groups can seek to strengthen their appeal by avoiding explicitness, and demonstrates the importance of operational context in considering ideological change.

(From the journal abstract)


Youngman, Mark. 2016. ‘Between Caucasus and Caliphate: The Splintering of the North Caucasus Insurgency’. Caucasus Survey 4 (3): 194–217. https://doi.org/10.1080/23761199.2016.1215055.

Broader, Vaguer, Weaker: The Evolving Ideology of the Caucasus Emirate Leadership

In October 2007, veteran Chechen field commander Dokka Umarov proclaimed the formation of the Caucasus Emirate (IK), formalising the victory of the North Caucasus insurgency’s Islamist wing over its nationalist-separatists. During Umarov’s time as leader, the North Caucasus experienced sustained violence and the IK claimed responsibility for multiple terrorist attacks in and beyond the region.

However, despite the importance of ideology in understanding insurgent behaviour, the IK’s ideology and Umarov’s role in shaping it remain understudied. Using Social Movement Theory’s concept of framing to analyse Umarov’s communiqués throughout his lengthy tenure (June 2006–September 2013), this article identifies three distinct phases in Umarov’s ideological positioning of the insurgency: nationalist-jihadist (June 2006–October 2007); Khattabist (October 2007–late 2010); and partially hybridised (late 2010–September 2013).

The article contributes to debates over typologies of jihadist actors by highlighting the difficulties in applying them to the North Caucasus and provides a clearer understanding of the IK’s ideological transformation and the limits to its engagement with external actors.

The article also illustrates that weakness was a key factor in explaining that transformation and identifies several avenues for research that could further enhance our understanding of the IK’s ideology and the role it plays.

(From the journal abstract)


Youngman, Mark. 2016. ‘Broader, Vaguer, Weaker: The Evolving Ideology of the Caucasus Emirate Leadership’. Terrorism and Political Violence 0 (0): 1–23. https://doi.org/10.1080/09546553.2016.1229666

Employees: The Front Line in Cyber Security

What happens if you lose trust in the systems on which you rely? If the displays and dashboards tell you everything is operating normally but, with your own eyes, you can see that this is not the case? This is what apparently happened with the Stuxnet virus attack on the Iranian nuclear programme in 2010.

Dr Debi Ashenden, CREST lead on protective security and risk assessment, writes that with cyber attacks set to rise, it’s important that we empower employees to defend our front line.

(From the journal abstract)


Ashenden, Debi. 2017. ‘Employees: The Front Line in Cyber Security’. The Chemical Engineer, February 2017, 908 edition. https://crestresearch. ac.uk/comment/employees-front-line-cyber-security/.

 

Technology and the Formation of Socially Positive Behaviours

‘Behaviour change’ has become a buzz phrase of growing importance to policymakers and researchers. There is an increasing focus on exploring the relationship between social organisation and individual action, and on intervening to influence societal outcomes like population health and climate change. Researchers continue to grapple with methodologies, intervention strategies and ideologies around ‘social change’.

Multidisciplinary in approach, this important book draws together insights from a selection of the principal thinkers in fields including public health, transport, marketing, sustainability and technology. The book explores the political and historical landscape of behaviour change, and trends in academic theory, before examining new innovations in both practice and research. It will be a valuable resource for academics, policy makers, practitioners, researchers and students wanting to locate their thinking within this rapidly evolving field.

(From the publisher's description)


Joinson, Adam, and Lukasz Piwek. 2016. ‘Technology and the Formation of Socially Positive Behaviours’. In Beyond Behaviour Change - Key Issues, Interdisciplinary Approaches and Future Directions, edited by Fiona Spotswood. Bristol: Policy Press. Accessed 20 July 2018. https://policy.bristoluniversitypress.co.uk/beyond-behaviour-change.

Culture Moderates Changes in Linguistic Self-Presentation and Detail Provision When Deceiving Others

Change in our language when deceiving is attributable to differences in the affective and cognitive experience of lying compared to truth telling, yet these experiences are also subject to substantial individual differences. On the basis of previous evidence of cultural differences in self-construal and remembering, we predicted and found evidence for cultural differences in the extent to which truths and lies contained self (versus other) references and perceptual (versus social) details.

Participants (N = 320) of Black African, South Asian, White European and White British ethnicity completed a catch-the-liar task in which they provided genuine and fabricated statements about either their past experiences or an opinion and counter-opinion. Across the four groups we observed a trend for using more/fewer first-person pronouns and fewer/more third-person pronouns when lying, and a trend for including more/fewer perceptual details and fewer/more social details when lying.

Contrary to predicted cultural differences in emotion expression, all participants showed more positive affect and less negative affect when lying. Our findings show that liars deceive in ways that are congruent with their cultural values and norms, and that this may result in opposing changes in behaviour.

(From the journal abstract)


Taylor, Paul J., Samuel Larner, Stacey M. Conchie, and Tarek Menacere. 2017. ‘Culture Moderates Changes in Linguistic Self-Presentation and Detail Provision When Deceiving Others’. Royal Society Open Science 4 (6). https://doi.org/10.1098/rsos.170128.

Collective Interviewing: The Use of a Model Statement to Differentiate between Pairs of Truth-Tellers and Pairs of Liars

Purpose
The current experiment examined the use of a model statement for aiding lie detection and gathering additional information during interviews in which pairs of suspects were interviewed together (i.e., collective interviewing). A model statement is an example of an answer, unrelated to the topic under investigation, which is played to suspects to demonstrate how much information the interviewer wants them to provide in response to the question asked.

Method
Pairs of truth‐tellers visited a restaurant together, whereas pairs of liars completed a mock crime. The task for all pairs was to convince an interviewer that they were visiting a restaurant together at the time the crime was committed. Half the truth‐telling pairs and half the lying pairs were exposed to a model statement, whilst the other halves were not.

Results
Truth‐telling pairs were more detailed and showed more interactions than lying pairs, particularly in the model statement present condition.

Conclusions
Being exposed to a model statement in a collective interview magnified the differences between pairs of truth‐tellers and pairs of liars in reporting detail and interacting with one another. A model statement is simple to implement and can be applied to many real‐world investigative interviewing settings whereby the focus is on lie detection and gathering as much information as possible.

(From the journal abstract)


Vernham, Zarah, Aldert Vrij, and Sharon Leal. 2018. ‘Collective Interviewing: The Use of a Model Statement to Differentiate between Pairs of Truth-Tellers and Pairs of Liars’. Legal and Criminological Psychology, July. https://doi.org/10.1111/lcrp.12136.

 

Authors: Aldert Vrij, Sharon Leal, Zarah Vernham
Individual Differences in Susceptibility to Online Influence: A Theoretical Review

Scams and other malicious attempts to influence people are continuing to proliferate across the globe, aided by the availability of technology that makes it increasingly easy to create communications that appear to come from legitimate sources. The rise in integrated technologies and the connected nature of social communications means that online scams represent a growing issue across society, with scammers successfully persuading people to click on malicious links, make fraudulent payments, or download malicious attachments.

However, current understanding of what makes people particularly susceptible to scams in online contexts, and therefore how we can effectively reduce potential vulnerabilities, is relatively poor. So why are online scams so effective? And what makes people particularly susceptible to them? This paper presents a theoretical review of literature relating to individual differences and contextual factors that may impact susceptibility to such forms of malicious influence in online contexts.

A holistic approach is then proposed that provides a theoretical foundation for research in this area, focusing on the interaction between the individual, their current context, and the influence message itself, when considering likely response behaviour.

(From the journal abstract)


Williams, Emma J., Amy Beardmore, and Adam N. Joinson. 2017. ‘Individual Differences in Susceptibility to Online Influence: A Theoretical Review’. Computers in Human Behavior 72 (July): 412–21. https://doi.org/10.1016/j.chb.2017.03.002.

Press Accept to Update Now: Individual Differences in Susceptibility to Malevolent Interruptions

Increasingly, connected communication technologies have resulted in people being exposed to fraudulent communications by scammers and hackers attempting to gain access to computer systems for malicious purposes. Common influence techniques, such as mimicking authority figures or instilling a sense of urgency, are used to persuade people to respond to malevolent messages by, for example, accepting urgent updates. An ‘accept’ response to a malevolent influence message can result in severe negative consequences for the user and for others, including the organisations they work for.

This paper undertakes exploratory research to examine individual differences in susceptibility to fraudulent computer messages when they masquerade as interruptions during a demanding memory recall primary task compared to when they are presented in a post-task phase. A mixed-methods approach was adopted to examine when and why people choose to accept or decline three types of interrupting computer update message (genuine, mimicked, and low authority) and the relative impact of such interruptions on performance of a serial recall memory primary task.

Results suggest that fraudulent communications are more likely to be accepted by users when they interrupt a demanding memory-based primary task, that this relationship is impacted by the content of the fraudulent message, and that influence techniques used in fraudulent communications can over-ride authenticity cues when individuals decide to accept an update message. Implications for theories, such as the recently proposed Suspicion, Cognition and Automaticity Model and the Integrated Information Processing Model of Phishing Susceptibility, are discussed.

(From the journal abstract)


Williams, Emma J., Phillip L. Morgan, and Adam N. Joinson. 2017. ‘Press Accept to Update Now: Individual Differences in Susceptibility to Malevolent Interruptions’. Decision Support Systems 96 (April): 119–29. https://doi.org/10.1016/j.dss.2017.02.014.

Security Dialogues: Building Better Relationships between Security and Business

In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes.

By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

(From the journal abstract)


Ashenden, Debi, and Darren Lawrence. 2016. ‘Security Dialogues: Building Better Relationships between Security and Business’. IEEE Security Privacy 14 (3): 82–87. https://www.computer.org/cms/Computer.org/ComputingNow/issues/2016/08/msp2016030082.pdf.

Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCI

The idea that the internet may enable an individual to become radicalized has been of increasing concern over the last two decades. Indeed, the internet provides individuals with an opportunity to access vast amounts of information and to connect to new people and new groups.

Together, these prospects may create a compelling argument that radicalization via the internet is plausible. So, is this really the case? Can viewing ‘radicalizing’ material and interacting with others online actually cause someone to subsequently commit violent and/or extremist acts? In this article, we discuss the potential role of the internet in radicalization and relate to how cybersecurity and certain HCI ‘affordances’ may support it.

We focus on how the design of systems provides opportunities for extremist messages to spread and gain credence, and how an application of HCI and user-centered understanding of online behavior and cybersecurity might be used to counter extremist messages.

By drawing upon existing research that may be used to further understand and address internet radicalization, we discuss some future research directions and associated challenges.

(From the journal abstract)


Hinds, Joanne, and Adam Joinson. 2017. 'Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCI'. In Human Aspects of Information Security, Privacy and Trust, 481–93. Lecture Notes in Computer Science. Springer, Cham. https://researchportal.bath.ac.uk/en/publications/radicalization-the-internet-and-cybersecurity-opportunities-and-c

Research on the Timeline Technique

The research in this paper by CREST member Professor Lorraine Hope was used as the basis for our short guide to using The Timeline Technique in interviewing. The technique can be useful in helping interviewees recall and report events from a particular timeframe. In this paper it is demonstrated that using the technique aids more accurate recall of details of an event than using a free-recall approach (e.g. by asking someone to repeat everything they can remember about an event). You can download the guide here. You can download this paper via the link below the abstract.


 

Who? What? When? Using a timeline technique to facilitate recall of a complex event

Journal of Applied Research in Memory and Cognition
Volume 2, Issue 1, March 2013, Pages 20–24
Authors: Lorraine Hope, Rebecca Mullis, Fiona Gabbert

Abstract

Accurately recalling a complex multi-actor incident presents witnesses with a cognitively demanding retrieval task. Given the important role played by temporal context in the retrieval process, the current research tests an innovative timeline technique to elicit information about multiple perpetrators and their actions. Adopting a standard mock witness paradigm, participants were required to provide an account of a witnessed event. In Experiment 1, the timeline technique facilitated the reporting of more correct details than a free recall, immediately and at a two-week retention interval, at no cost to accuracy. Accounts provided using the timeline technique included more correct information about perpetrator specific actions and fewer sequencing errors. Experiment 2 examined which mnemonic components of the timeline technique might account for these effects. The benefits of exploiting memory organization and reducing cognitive constraints on information flow are likely to underpin the apparent timeline advantage.

Highlights:

  • Accurately recalling a complex multi-actor incident presents witnesses with a cognitively demanding retrieval task.
  • Adopting a mock witness paradigm, we tested an innovative timeline technique to elicit information about a complex crime.
  • The timeline technique facilitated reporting of more correct details than a free recall, at no cost to accuracy, both immediately and after a delay.
  • Timeline reports included more correct information about perpetrator specific actions and fewer incident sequencing errors.
  • Exploiting memory organization and reducing constraints on information flow may underpin the apparent timeline advantage.
You can download this paper at the following link:

http://www.sciencedirect.com/science/article/pii/S221136811300003X

Research on the verifiability approach in interviewing

The research in this paper contributed to the CREST guide on checkable details in interviewing. It demonstrates a method interviewers can use to aid in determining whether someone is telling the truth or not. You can download the guide here. For more information on the research behind the guide you can download this paper via the link below.


 

The Verifiability Approach: Countermeasures Facilitate its Ability to Discriminate Between Truths and Lies

Applied Cognitive Psychology
Volume 28 Issue 1 (January/February 2014), Pages 122-128
Author(s): Galit Nahari, Aldert Vrij, Ronald P. Fisher
DOI: 10.1002/acp.2974

Abstract

According to the verifiability approach, liars tend to provide details that cannot be checked by the investigator and awareness of this increases the investigator's ability to detect lies. In the present experiment, we replicated previous findings in a more realistic paradigm and examined the vulnerability of the verifiability approach to countermeasures. For this purpose, we collected written statements from 44 mock criminals (liars) and 43 innocents (truth tellers), whereas half of them were told before writing the statements that the verifiability of their statements will be checked. Results showed that ‘informing’ encouraged truth tellers but not liars to provide more verifiable details and increased the ability to detect lies. These findings suggest that verifiability approach is less vulnerable to countermeasures than other lie detection tools. On the contrary, in the current experiment, notifying interviewees about the mechanism of the approach benefited lie detection.

You can download this paper at the following link.

http://onlinelibrary.wiley.com/doi/10.1002/acp.2974/abstract

Subscribe to the CREST newsletter.

Get the latest news, events and research into security threats delivered directly to your inbox.
Sign up now
Back to top