Cody Normitta Porter
Lie-detection by strategy manipulation: Developing an Asymmetric Information Management (AIM) technique
Porter, Cody Normitta; Morrison, Ed; Fitzgerald, Ryan J.; Taylor, Rachel; Harvey, Adam Charles
Authors
Ed Morrison
Ryan J. Fitzgerald
Rachel Taylor
Adam Charles Harvey
Abstract
Liars can, when prompted, provide detailed statements. Ideally, interview protocols to improve lie-detection should (a) encourage forthcoming verbal strategies from truth tellers and (b) encourage withholding verbal strategies from liars. Previous research has investigated (a) but not (b). We designed an asymmetric information management (AIM) instruction—informing interviewees, inter alia, that more detailed statements are easier to accurately classify as genuine or fabricated—to encourage truth tellers to be verbally forthcoming and to encourage liars to be verbally withholding. Truth tellers (n = 52) and liars (n = 52) took part in one of two counterbalanced missions, and were assigned to either the AIM or control interviewing condition. Truth tellers provided (and liars withheld) more information in the AIM condition (compared to the control condition), and thus, discriminant analysis classificatory performance was improved. Therefore, a simple instruction can simultaneously modify the respective strategies of liars and truth tellers.
Journal Article Type | Article |
---|---|
Acceptance Date | Jan 24, 2020 |
Online Publication Date | Mar 20, 2020 |
Publication Date | Jun 1, 2020 |
Deposit Date | Mar 12, 2021 |
Publicly Available Date | Mar 21, 2021 |
Journal | Journal of Applied Research in Memory and Cognition |
Print ISSN | 2211-3681 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 9 |
Issue | 2 |
Pages | 232-241 |
DOI | https://doi.org/10.1016/j.jarmac.2020.01.004 |
Keywords | AIM technique Deception, Lie-detection, Information elicitation, Forensic interviewing |
Public URL | https://uwe-repository.worktribe.com/output/7197887 |
Files
Lie-detection by strategy manipulation: Developing an Asymmetric Information Management (AIM) technique
(420 Kb)
PDF
Licence
http://creativecommons.org/licenses/by-nc-nd/4.0/
Publisher Licence URL
http://www.rioxx.net/licenses/all-rights-reserved
Copyright Statement
This is the author's accepted manuscript. The final published version is available here: https://doi.org/10.1016/j.jarmac.2020.01.004
You might also like
Implementing converged security risk management: Drivers, barriers, and facilitators
(2022)
Journal Article
A critical analysis of the Model Statement literature: Should this tool be used in practice?
(2020)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search