Applying the asymmetric information management (AIM) technique to virtual interviewing

被引:0
作者
Porter, Cody Normitta [1 ,2 ]
Taylor, Rachel [3 ]
Lee, Rory [2 ]
Chioatto, Eleonora [2 ]
Hill, Max [2 ]
Harvey, Adam Charles [1 ]
机构
[1] Univ West England UWE Bristol, Dept Social Sci, Bristol, England
[2] Univ Portsmouth, Inst Criminal Justice Studies, Portsmouth, England
[3] Univ South Wales, Psychol Dept, Newport, Wales
关键词
AIM technique; information elicitation; lie-detection; FACE-TO-FACE; IMPRESSION-FORMATION; MEDIA; COMMUNICATION; STATEMENTS; DECEPTION; CHILDREN; ACCOUNTS; RAPPORT; WRITTEN;
D O I
10.1002/acp.4049
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
The asymmetric information management (AIM) technique enhances verbal lie-detection by encouraging truth tellers (but not liars) to be forthcoming with information. We examined the AIM technique's utility for correctly distinguishing genuine and fabricated statements reported during a virtual interview. Truth tellers (n = 85) honestly reported their recollection of a 30-minute walk. Liars pretended to have engaged in a similar activity (n = 86). Participants were randomly assigned to either the AIM or Control condition and provided either a verbal or written statement. Truth tellers in the AIM condition reported more detailed statements (vs. the Control condition). Liars in the AIM condition reported less detailed statements (vs. the Control condition). More genuine and fabricated statements were correctly classified in the AIM condition (72% accuracy) compared to the Control condition (59% accuracy). No differences between disclosure type emerged. Results support the use of the AIM technique for facilitating verbal lie-detection.
引用
收藏
页码:470 / 479
页数:10
相关论文
共 49 条
  • [1] Bailenson J. N., 2021, Technology, Mind, and Behavior, V2, P1, DOI DOI 10.1037/TMB0000030
  • [2] Brysbaert Marc, 2019, J Cogn, V2, P16, DOI 10.5334/joc.72
  • [3] The investigative interviewing of children and other vulnerable witnesses: Psychological research and working/professional practice
    Bull, Ray
    [J]. LEGAL AND CRIMINOLOGICAL PSYCHOLOGY, 2010, 15 (01) : 5 - 23
  • [4] Burgoon J. K., 2003, 36th Hawaii International Conference on Systems Sciences
  • [5] Deception in computer-mediated communication
    Carlson, JR
    George, JF
    Burgoon, JK
    Adkins, M
    White, CH
    [J]. GROUP DECISION AND NEGOTIATION, 2004, 13 (01) : 5 - 28
  • [6] COHEN J, 1994, AM PSYCHOL, V49, P997, DOI 10.1037/0003-066X.50.12.1103
  • [7] A POWER PRIMER
    COHEN, J
    [J]. PSYCHOLOGICAL BULLETIN, 1992, 112 (01) : 155 - 159
  • [8] Collins R., 2002, Psychiatry, Psychology and Law, V9, P69, DOI [10.1375/pplt.2002.9.1.69, DOI 10.1375/PPLT.2002.9.1.69]
  • [9] Interviewing techniques and the assessment of statement credibility
    Colwell, K
    Hiscock, CK
    Memon, A
    [J]. APPLIED COGNITIVE PSYCHOLOGY, 2002, 16 (03) : 287 - 300
  • [10] Crown Prosecution Service, 2021, COR INT PROT NAT POL