Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fatih Ozgul (2016)
Analysis of topologies and key players in terrorist networksSocio-economic Planning Sciences, 56
Feni Kontogianni, Lorraine Hope, Paul Taylor, A. Vrij, F. Gabbert (2018)
The Benefits of a Self-Generated Cue Mnemonic for Timeline InterviewingJournal of Applied Research in Memory and Cognition
Fatih Özgül, C. Bowerman (2014)
Characteristics of Terrorists Networks Based on Ideology and Practices2014 European Network Intelligence Conference
Interviewing Witnesses
H. Roediger, A. Butler (2011)
The critical role of retrieval practice in long-term retentionTrends in Cognitive Sciences, 15
M. Bostock (2018)
D3 Data-Driven Documents
M. Sparrow (1991)
The application of network analysis to criminal intelligence: An assessment of the prospectsSocial Networks, 13
Drew Leins, R. Fisher, Leonie Pludwinski, J. Rivard, Belinda Robertson (2014)
Interview Protocols to Facilitate Human Intelligence Sources' Recollections of MeetingsApplied Cognitive Psychology, 28
Lorraine Hope, F. Gabbert, Max Kinninger, Feni Kontogianni, Alexandra Bracey, Adam Hanger (2019)
Who said what and when? A timeline approach to eliciting information and intelligence about conversations, plots, and plans.Law and human behavior, 43 3
Christopher Kelly, Jeaneé Miller, A. Redlich, Steven Kleinman (2013)
A Taxonomy of Interrogation MethodsPsychology, Public Policy and Law, 19
F. Calderoni (2014)
Social Network Analysis of Organized Criminal Groups
A. Kriegler (2014)
Using social network analysis to profile organised crime
K. Taha, Paul Yoo (2019)
Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication ChannelsIEEE Transactions on Information Forensics and Security, 14
John Anderson (1983)
A spreading activation theory of memory.Journal of Verbal Learning and Verbal Behavior, 22
Chris Smith, A. Papachristos (2016)
Trust Thy Crooked NeighborAmerican Sociological Review, 81
P. Klerks (2001)
The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands
Lorraine Hope, R. Mullis, F. Gabbert (2013)
Who? what? when? using a timeline technique to facilitate recall of a complex eventJournal of applied research in memory and cognition, 2
Eliciting detailed and comprehensive information about the structure, organisation and relationships between individuals involved in organised crime gangs, terrorist cells and networks is a challenge in investigations and debriefings. Drawing on memory theory, the purpose of this paper is to develop and test the Reporting Information about Networks and Groups (RING) task, using an innovative piece of information elicitation software.Design/methodology/approachUsing an experimental methodology analogous to an intelligence gathering context, participants (n=124) were asked to generate a visual representation of the “network” of individuals attending a recent family event using the RING task.FindingsAll participants successfully generated visual representations of the relationships between people attending a remembered social event. The groups or networks represented in the RING task output diagrams also reflected effective use of the software functionality with respect to “describing” the nature of the relationships between individuals.Practical implicationsThe authors succeeded in establishing the usability of the RING task software for reporting detailed information about groups of individuals and the relationships between those individuals in a visual format. A number of important limitations and issues for future research to consider are examined.Originality/valueThe RING task is an innovative development to support the elicitation of targeted information about networks of people and the relationships between them. Given the importance of understanding human networks in order to disrupt criminal activity, the RING task may contribute to intelligence gathering and the investigation of organised crime gangs and terrorist cells and networks.
Journal of Forensic Practice – Emerald Publishing
Published: Nov 8, 2019
Keywords: Memory; Organized crime; Terrorism; Interviewing
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.