Picture of person typing on laptop with programming code visible on the laptop screen

World class computing and information science research at Strathclyde...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by University of Strathclyde researchers, including by researchers from the Department of Computer & Information Sciences involved in mathematically structured programming, similarity and metric search, computer security, software systems, combinatronics and digital health.

The Department also includes the iSchool Research Group, which performs leading research into socio-technical phenomena and topics such as information retrieval and information seeking behaviour.

Explore

Patterns of malingering and compliance in measures of interrogative suggestibility

Bain, Stella and Baxter, James S. (2006) Patterns of malingering and compliance in measures of interrogative suggestibility. Personality and Individual Differences, 30 (3). pp. 453-461. ISSN 0191-8869

Full text not available in this repository. Request a copy from the Strathclyde author

Abstract

This study aimed to compare indicators of malingering with those of compliance on the Gudjonsson Suggestibility Scales (GSS 1). It was hypothesised that participants issued with instructions either to appear susceptible to leading questions or to comply with an interviewer's perceived requirements would show unique patterns of GSS scores, allowing them to be differentiated from each other, and from a control group. The study had a single-factor between participants design. Participants were tested in one of three conditions: Misled, Compliant, or Standard instructions. Sixty-six participants took part in the study. Results indicated unique patterns of scoring in all three conditions; all three groups were distinguishable from each other. Results support previous studies which indicate that some patterns of malingering may be identifiable on the GSS. However, compliant responding may not be readily distinguishable from genuine vulnerability. Results are discussed in terms of the theoretical distinction between suggestibility and compliance.