Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Assessing Cognitive Interview Mnemonics And Their Effectiveness With Non-Native English Speakers, Bryan Keith Wylie Jun 2019

Assessing Cognitive Interview Mnemonics And Their Effectiveness With Non-Native English Speakers, Bryan Keith Wylie

FIU Electronic Theses and Dissertations

The cognitive interview is a widely recommended forensic interviewing strategy which elicits more details than comparison interviews. However, little research has attended to which of its component mnemonics drive the overall effect. Furthermore, some mnemonics—like asking witnesses to recall in reverse order—are cognitively demanding. Responding to cognitively demanding interview mnemonics may be challenging for witnesses who are already under heavy cognitive load, such as non-native English speakers. Speaking a second language is a cognitively difficult task that may leave non-native English speakers with limited cognitive resources to devote to complex interviewing mnemonics. Other mnemonics, though, may be particularly beneficial for …


Silenced Bodies: (En)Gendering Syrian Refugee Insecurity In Lebanon, Jessy Abouarab Mar 2019

Silenced Bodies: (En)Gendering Syrian Refugee Insecurity In Lebanon, Jessy Abouarab

FIU Electronic Theses and Dissertations

While there has been a shift in security studies from the security of states to that of people, realpolitik still takes place under the banner of an emerging discourse of ‘refugee crisis.’ Refugee insecurities are (en)gendered and experienced where their depth and breadth pose significant challenges to asylum seekers, neighboring host-states, and humanitarian agencies. To this end, this research captures the unique dynamics of a South-South refugee crisis in Lebanon, in which Syrians residents make up nearly one-third of its population. It applies a transnational feminist framework to trace how refugee security norms get defined, are managed, and how they …