Search results
1 – 10 of over 2000Constant Van Graan, Vera Roos and Matthews Katjene
A significant increase in financial crime globally emphasises the importance of forensic interviewing to obtain useful and reliable information as part of a commercial forensic…
Abstract
Purpose
A significant increase in financial crime globally emphasises the importance of forensic interviewing to obtain useful and reliable information as part of a commercial forensic investigation. Previous research has identified two interviewing strategies that are aligned with the legal framework in South Africa: the PEACE model (P = preparation and planning; E = engage and explain; A = account, clarify and challenge; C = closure; E = evaluation) and the person-centred approach (PCA). The purpose of this paper is to explore the theoretical underpinnings and application of the PEACE model and the PCA as commercial investigative strategies aligned with the legal context in South Africa.
Design/methodology/approach
A scoping review was undertaken to identify literature relevant to the theoretical assumptions and application of the PEACE model and the PCA.
Findings
Literature for the most part reports on the PEACE model but offers very little information about the PCA. A critical analysis revealed that the PEACE model incorporates a clear guiding structure for eliciting information but lacks content needed to create an optimal interpersonal context. To promote this, the PCA proposes that interviewers demonstrate three relational variables: empathy, congruence and unconditional positive regard. The PCA suggests a basic structure for interviewing (beginning, middle and end), while providing very little guidance on how to structure the forensic interview and what information is to be elicited in each phase.
Originality/value
Combining the PEACE model and PCA presents an integrated interviewing technique best suited for obtaining useful and reliable information admissible in a South African court of law. The PEACE model has a clear structure, and the PCA assists in creating an optimal interpersonal context to obtain information in an interview.
Details
Keywords
David La Rooy, Sonja P Brubacher, Anu Aromäki-Stratos, Mireille Cyr, Irit Hershkowitz, Julia Korkman, Trond Myklebust, Makiko Naka, Carlos E. Peixoto, Kim P Roberts, Heather Stewart and Michael E Lamb
The purpose of this paper is to review an evidence-based tool for training child forensic interviewers called the National Institute of Child Health and Human Development Protocol…
Abstract
Purpose
The purpose of this paper is to review an evidence-based tool for training child forensic interviewers called the National Institute of Child Health and Human Development Protocol (NICHD Protocol), with a specific focus on how the Protocol is being adapted in various countries.
Design/methodology/approach
The authors include international contributions from experienced trainers, practitioners, and scientists, who are already using the Protocol or whose national or regional procedures have been directly influenced by the NICHD Protocol research (Canada, Finland, Israel, Japan, Korea, Norway, Portugal, Scotland, and USA). Throughout the review, these experts comment on: how and when the Protocol was adopted in their country; who uses it; training procedures; challenges to implementation and translation; and other pertinent aspects. The authors aim to further promote good interviewing practice by sharing the experiences of these international experts.
Findings
The NICHD Protocol can be easily incorporated into existing training programs worldwide and is available for free. It was originally developed in English and Hebrew and is available in several other languages.
Originality/value
This paper reviews an evidence-based tool for training child forensic interviewers called the NICHD Protocol. It has been extensively studied and reviewed over the past 20 years. This paper is unique in that it brings together practitioners who are actually responsible for training forensic interviewers and conducting forensic interviews from all around the world.
Details
Keywords
The purpose of this paper is to educate forensic interviewers about autism spectrum disorder (ASD) and tools for interviewing youth with ASD when there are concerns of child…
Abstract
Purpose
The purpose of this paper is to educate forensic interviewers about autism spectrum disorder (ASD) and tools for interviewing youth with ASD when there are concerns of child sexual abuse (CSA).
Design/methodology/approach
Research is reviewed to discuss risk factors for CSA in youth with ASD, why CSA is often not recognized and research-based strategies for forensically interviewing youth with ASD.
Findings
Youth with ASD are at increased risk of CSA compared to neurotypical peers, but recognition of CSA in youth with ASD can be difficult. Forensic interviewing strategies can help interviewers obtain reports of CSA from youth with ASD.
Practical implications
Given the increase in prevalence of ASD and the increased risk of CSA, forensic interviewers need to have information about ASD, about why CSA may not be recognized, about risk factors for CSA and, especially, about how to accommodate for ASD when conducting forensic interviews.
Originality/value
This paper provides a novel framework for considering evidence-based practices for forensically interviewing youth with ASD when there are concerns of CSA. Specifically, this paper includes multiple, but related areas, in one article including research related to ASD, risk factors for CSA in those with ASD, obstacles to identifying CSA and the implications of this research for specific strategies regarding how to forensically interview youth with ASD when there are concerns of CSA.
Details
Keywords
Alyson Kettles, Cindy Peternelj‐Taylor, Phil Woods, Anita Hufft, Tom Van Erven, Hans Martin, Uwe Donisch‐Siedel, Alison Kuppen, Colin Holmes, Roger Almvik, Trond Hatling and David Robinson
Over the last decade there has been considerable growth in the role that psychiatric nurses play in providing care for the mentally disordered offender (MDO). Yet there has been…
Abstract
Over the last decade there has been considerable growth in the role that psychiatric nurses play in providing care for the mentally disordered offender (MDO). Yet there has been little written about this specialty from a global perspective. Examination of the literature illustrates a large body of research and development programmes reporting the development of services to the MDO, for example, self‐harm and clinical risk assessment. Such service development is growing at a rapid pace, yet training and education to meet the needs of this patient group is something that is added onto post registration courses. Furthermore, the lack of vision and career pathways into forensic care is stifling a growing profession, which is subject to continual permanent change and investigation. Leaders and professional associations have contributed little to this unique nursing group which plays a major role in the multidisciplinary care of a very demanding set of patient needs.
Bonita Kramer, Michael Seda and Georgiy Bobashev
This paper aims to determine current views of educators and practitioners regarding forensic accounting education, given the recent dramatic growth in the number of colleges and…
Abstract
Purpose
This paper aims to determine current views of educators and practitioners regarding forensic accounting education, given the recent dramatic growth in the number of colleges and universities offering such education.
Design/methodology/approach
Survey, with statistical analysis of responses.
Findings
Results find that while both groups agree the demand for forensic accounting services will increase in the near future and that they prefer a separate course or degree be offered at the graduate and undergraduate levels, there are several significant differences between the educators’ and practitioners’ opinions on forensic accounting content and preferred teaching techniques. Practitioners consider topics outside traditional accounting as more important to include in forensic accounting education, and more highly value teaching techniques that add an experiential learning component.
Practical implications
Results can be useful to educators who have not considered offering forensic accounting courses or who wish to refine or update their existing forensic accounting education. Students seeking a career in forensic accounting can also use these results to facilitate their course choices to develop skills that employers value.
Social implications
These results find that practitioners value some nontraditional accounting skills, such as in forensic technology and interviewing, more highly than academics, which suggests accounting educators may need to develop interdisciplinary approaches to forensic accounting education.
Originality/value
As the number of institutions offering forensic accounting education has dramatically increased, current views of forensic accounting educators and practitioners are needed.
Details
Keywords
Laura Farrugia, Gavin Oxburgh and Fiona Gabbert
Effective forensic interviewing is crucial, particularly if the interview is the only source of evidence. Whilst there are a number of interview models that advocate for…
Abstract
Purpose
Effective forensic interviewing is crucial, particularly if the interview is the only source of evidence. Whilst there are a number of interview models that advocate for reflective practice, the evaluation of interviews rarely gets the time or attention it deserves. This is concerning, given that interviewer skills drop significantly after six months, and there are limited opportunities for refresher training. This study aims to explore how law enforcement officers reflect upon and evaluate their interviews and seek their insight into what they believe an effective evaluation tool would constitute.
Design/methodology/approach
A total of 32 officers from three police forces in England and Wales and six international security organisations completed a qualitative questionnaire that explored their views on how interview evaluation is conducted and the impact on the interview, and how technology could assist in this important stage in terms of usability, efficacy and capability of a new evaluation tool.
Findings
Thematic analysis was used, resulting in three overall themes being identified from the data. These focused on current evaluation methods, barriers to conducting evaluations and technological solutions.
Originality/value
The findings are discussed in relation to interviewing and the development of tools to assist in evaluations. Implications for practice include the need for much more effort to be put into (re)introducing the evaluation stage into training to ensure that officers are allowed to reflect upon and evaluate their interview performance.
Details
Keywords
Purpose – This study examined the often minimized relationship between child sexual abuse and the body and asked: How, and by what means, is the body experienced by children after…
Abstract
Purpose – This study examined the often minimized relationship between child sexual abuse and the body and asked: How, and by what means, is the body experienced by children after sexual abuse? The purpose of this work is to present children's interpretations of embodiment in their own words.
Methodology – Data include 10 years of semi-structured videotaped forensic interviews of children and youth seen for reported cases of sexual abuse. Utilizing an analytic-inductive method, children's verbal reports of sexual abuse were examined from a symbolic interactionist perspective in terms of re/productions of the body.
Findings – Discourse analyses revealed how children evaluated the body and negotiated related emotions. Youth ascribed meaning to the body as both materiality and social interaction. The body was experienced as object and somatic presence, as a marked or stigmatized body, and as a means of control and resistance. Through their own words, youth revealed how violence draws attention to embodiment, power, and subjectivity.
Value – Despite increased public and policy attention, limited research has explored how children describe their experiences of sexual abuse. This study addresses this serious gap in the literature by approaching the sexually abused body as a critical site of social meaning and social order. Of significant import, this work brings children's voices to the forefront; it shows how youth actively negotiate embodiment and expands work with child participants. It will be of value to practitioners working with children and to scholars in the fields of sexual victimization, sociology of the body and children/childhood.
Joakim Kävrestad, Fredrik Eriksson and Marcus Nohlberg
Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remains the…
Abstract
Purpose
Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remains the most common type of authentication. As long and complex passwords are encouraged by research studies and practitioners alike, computer users design passwords using strategies that enable them to remember their passwords. This paper aims to present a taxonomy of those password creation strategies in the form of a model describing various strategies used to create passwords.
Design/methodology/approach
The study was conducted in a three-step process beginning with a short survey among forensic experts within the Swedish police. The model was then developed by a series of iterative semi-structured interviews with forensic experts. In the third and final step, the model was validated on 5,000 passwords gathered from 50 different password databases that have leaked to the internet.
Findings
The result of this study is a taxonomy of password creation strategies presented as a model that describes the strategies as properties that a password can hold. Any given password can be classified as holding one or more of the properties outlined in the model.
Originality/value
On an abstract level, this study provides insight into password creation strategies. As such, the model can be used as a tool for research and education. It can also be used by practitioners in, for instance, penetration testing to map the most used password creation strategies in a domain or by forensic experts when designing dictionary attacks.
Details