Based on the extensive research of source monitoring, a tool was setup to discriminate innocent subjects from neutral and strategic offender subjects. In a three stage source monitoring test,...Show moreBased on the extensive research of source monitoring, a tool was setup to discriminate innocent subjects from neutral and strategic offender subjects. In a three stage source monitoring test, offender subjects were expected to make more attribution mistakes than innocent subjects and it was explored whether strategic offenders could suppress the source confusion. Innocent subjects have better source memory than offender subjects and strategic offenders are more accurate on all items compared to neutral offenders. This indicates that the tool is able to discriminate between the different groups. Focusing on the items only seen at T1 (this resembles the crime scene), no significant results were found. The main purpose of this study was to explore whether source confusion could be observed in this particular setting. This is confirmed but to develop a tool, more research is needed. Due to the exploratory nature of the study, some limitations are mentioned.Show less
Due to its nature and the impact of its consequences, cybercrime is in need of innovative methods of criminal investigation. Apart from interrogations and computer focused investigations,...Show moreDue to its nature and the impact of its consequences, cybercrime is in need of innovative methods of criminal investigation. Apart from interrogations and computer focused investigations, cybercrime, due to its recent growing occurrence, still lacks effective methods to detect those who are behind it. The goal of the present research is to validate a new method: Implicit Memory Method for Criminal Investigation (IMMCI), a psychological test that is designed to elicit true recognition memory from illegally visited internet sites. Our study was set up to answer the following question: to what extent is IMMCI a reliable method for measuring true recognition memory of internet sites that a person is unwilling to reveal? To answer this question we simulated visitors and not-visitors of digital displays: i.e. participants were divided into two conditions, called perpetrators and innocents. The experiment consisted of three sessions. The first two were exposure sessions (pictures of digital displays were presented) while the third one was the test session (recognition memory test and source memory test for the pictures presented at t1 and t2). IMMCI in the lab, showed that people are relatively good at true recognition memory of the displays, but poor at telling the temporal source. Overall participants were good at remembering whether they saw an item (recognition memory) but not so good at remembering when they saw it (source memory). In practice, this combined effect might be used in a memory method that reveals implicit knowledge of items seen in the illegal cyber space.Show less