کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
5033989 1370048 2017 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Eliciting Information from People Who Pose a Threat: Counter-Interview Strategies Examined
ترجمه فارسی عنوان
ارزیابی اطلاعات از افرادی که تهدیدی ایجاد می کنند: استراتژی های مقابله با مصاحبه مورد بررسی قرار گرفته است
کلمات کلیدی
ارزیابی تهدید، تحریک اطلاعات، استراتژی ضد مصاحبه، مصاحبه پژوهشی، قصد واقعی،
موضوعات مرتبط
علوم انسانی و اجتماعی روانشناسی روان شناسی کاربردی
چکیده انگلیسی
Threat managers-who aim to identify potential danger-typically collect information from sources around persons who pose a threat rather than questioning the threateners themselves. To elicit valuable information from threateners, it is important to understand the strategies they use to withstand interviews (i.e., counter-interview strategies). In the experiment, participants (N = 179) communicated a threat that they intended to actualize (actualizers) or not (bluffers), and were subsequently questioned about the threat using an interview protocol intended to communicate high or low suspicion. The findings showed that threatening required self-regulation. Participants were forthcoming, yet strategic and adaptive to the targets' response. Actualizers provided fewer details on how to implement the threat than did bluffers, and, when subjected to follow-up questions bluffers increased the information provision more than did actualizers. Knowledge on counter-interview strategies of threateners may contribute to the development of interview protocols that can be used to assess risk for violence.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Applied Research in Memory and Cognition - Volume 6, Issue 2, June 2017, Pages 158-166
نویسندگان
, , , ,