Abstract
Threat managers—who aim to identify potential danger—typically collect information from sources around persons who pose a threat rather than questioning the threateners themselves. To elicit valuable information from threateners, it is important to understand the strategies they use to withstand interviews (i.e., counter-interview strategies). In the experiment, participants (N = 179) communicated a threat that they intended to actualize (actualizers) or not (bluffers), and were subsequently questioned about the threat using an interview protocol intended to communicate high or low suspicion. The findings showed that threatening required self-regulation. Participants were forthcoming, yet strategic and adaptive to the targets’ response. Actualizers provided fewer details on how to implement the threat than did bluffers, and, when subjected to follow-up questions bluffers increased the information provision more than did actualizers. Knowledge on counter-interview strategies of threateners may contribute to the development of interview protocols that can be used to assess risk for violence.
Original language | English |
---|---|
Pages (from-to) | 158-166 |
Journal | Journal of Applied Research in Memory and Cognition |
Volume | 6 |
Issue number | 2 |
Early online date | 29 Nov 2016 |
DOIs | |
Publication status | Published - Jun 2017 |
Keywords
- threat assessment
- informtation elicitation
- counter-interview strategy
- investigative interviewing
- true intent