Memory detection: theory and application of the concealed information test
Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the valid...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2011
|
Schlagworte: | |
Online-Zugang: | BSB01 UBG01 UBW01 Volltext |
Zusammenfassung: | Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the validity of such methods is questionable. As an alternative, a knowledge-based approach known as the 'Concealed Information Test' has been developed which investigates whether the examinee recognizes secret information - for example a crime suspect recognizing critical crime details that only the culprit could know. The Concealed Information Test has been supported by decades of research, and is used widely in Japan. This is the first book to focus on this exciting approach and will be of interest to law enforcement agencies and academics and professionals in psychology, criminology, policing and law |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Beschreibung: | 1 Online-Ressource (xvii, 319 Seiten) Diagramme |
ISBN: | 9780511975196 |
DOI: | 10.1017/CBO9780511975196 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043923135 | ||
003 | DE-604 | ||
005 | 20220323 | ||
007 | cr|uuu---uuuuu | ||
008 | 161202s2011 |||| o||u| ||||||eng d | ||
020 | |a 9780511975196 |c Online |9 978-0-511-97519-6 | ||
024 | 7 | |a 10.1017/CBO9780511975196 |2 doi | |
035 | |a (ZDB-20-CBO)CR9780511975196 | ||
035 | |a (OCoLC)852510546 | ||
035 | |a (DE-599)BVBBV043923135 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-473 |a DE-20 | ||
082 | 0 | |a 363.25/4 |2 22 | |
245 | 1 | 0 | |a Memory detection |b theory and application of the concealed information test |c edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2011 | |
300 | |a 1 Online-Ressource (xvii, 319 Seiten) |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
505 | 8 | |a Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer | |
520 | |a Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the validity of such methods is questionable. As an alternative, a knowledge-based approach known as the 'Concealed Information Test' has been developed which investigates whether the examinee recognizes secret information - for example a crime suspect recognizing critical crime details that only the culprit could know. The Concealed Information Test has been supported by decades of research, and is used widely in Japan. This is the first book to focus on this exciting approach and will be of interest to law enforcement agencies and academics and professionals in psychology, criminology, policing and law | ||
650 | 4 | |a Lie detectors and detection | |
650 | 4 | |a Memory | |
650 | 4 | |a Deception | |
650 | 0 | 7 | |a Implizites Wissen |0 (DE-588)4161419-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Lügendetektor |0 (DE-588)4168214-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Lügendetektor |0 (DE-588)4168214-2 |D s |
689 | 0 | 1 | |a Implizites Wissen |0 (DE-588)4161419-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Verschuere, Bruno |0 (DE-588)1012810690 |4 edt | |
700 | 1 | |a Ben Shaḥar, Gershon |d 1942- |0 (DE-588)11207300X |4 edt | |
700 | 1 | |a Meijer, Ewout |d 1975- |0 (DE-588)1225826969 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-521-13615-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-521-76952-5 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9780511975196 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029332214 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9780511975196 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511975196 |l UBG01 |p ZDB-20-CBO |q UBG_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511975196 |l UBW01 |p ZDB-20-CBO |q UBW_EBA_CBO_Kauf_2020 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176847069511680 |
---|---|
any_adam_object | |
author2 | Verschuere, Bruno Ben Shaḥar, Gershon 1942- Meijer, Ewout 1975- |
author2_role | edt edt edt |
author2_variant | b v bv s g b sg sgb e m em |
author_GND | (DE-588)1012810690 (DE-588)11207300X (DE-588)1225826969 |
author_facet | Verschuere, Bruno Ben Shaḥar, Gershon 1942- Meijer, Ewout 1975- |
building | Verbundindex |
bvnumber | BV043923135 |
collection | ZDB-20-CBO |
contents | Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer |
ctrlnum | (ZDB-20-CBO)CR9780511975196 (OCoLC)852510546 (DE-599)BVBBV043923135 |
dewey-full | 363.25/4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/4 |
dewey-search | 363.25/4 |
dewey-sort | 3363.25 14 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
doi_str_mv | 10.1017/CBO9780511975196 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05134nmm a2200553zc 4500</leader><controlfield tag="001">BV043923135</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220323 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161202s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511975196</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-511-97519-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9780511975196</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9780511975196</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)852510546</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043923135</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/4</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Memory detection</subfield><subfield code="b">theory and application of the concealed information test</subfield><subfield code="c">edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 319 Seiten)</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the validity of such methods is questionable. As an alternative, a knowledge-based approach known as the 'Concealed Information Test' has been developed which investigates whether the examinee recognizes secret information - for example a crime suspect recognizing critical crime details that only the culprit could know. The Concealed Information Test has been supported by decades of research, and is used widely in Japan. This is the first book to focus on this exciting approach and will be of interest to law enforcement agencies and academics and professionals in psychology, criminology, policing and law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Lie detectors and detection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Memory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Deception</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Implizites Wissen</subfield><subfield code="0">(DE-588)4161419-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Lügendetektor</subfield><subfield code="0">(DE-588)4168214-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Lügendetektor</subfield><subfield code="0">(DE-588)4168214-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Implizites Wissen</subfield><subfield code="0">(DE-588)4161419-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Verschuere, Bruno</subfield><subfield code="0">(DE-588)1012810690</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ben Shaḥar, Gershon</subfield><subfield code="d">1942-</subfield><subfield code="0">(DE-588)11207300X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meijer, Ewout</subfield><subfield code="d">1975-</subfield><subfield code="0">(DE-588)1225826969</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-521-13615-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-521-76952-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9780511975196</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029332214</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511975196</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511975196</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBG_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511975196</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBW_EBA_CBO_Kauf_2020</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043923135 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:38:41Z |
institution | BVB |
isbn | 9780511975196 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029332214 |
oclc_num | 852510546 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG DE-20 |
owner_facet | DE-12 DE-473 DE-BY-UBG DE-20 |
physical | 1 Online-Ressource (xvii, 319 Seiten) Diagramme |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO UBG_PDA_CBO ZDB-20-CBO UBW_EBA_CBO_Kauf_2020 |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Memory detection theory and application of the concealed information test edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer Cambridge Cambridge University Press 2011 1 Online-Ressource (xvii, 319 Seiten) Diagramme txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the validity of such methods is questionable. As an alternative, a knowledge-based approach known as the 'Concealed Information Test' has been developed which investigates whether the examinee recognizes secret information - for example a crime suspect recognizing critical crime details that only the culprit could know. The Concealed Information Test has been supported by decades of research, and is used widely in Japan. This is the first book to focus on this exciting approach and will be of interest to law enforcement agencies and academics and professionals in psychology, criminology, policing and law Lie detectors and detection Memory Deception Implizites Wissen (DE-588)4161419-7 gnd rswk-swf Lügendetektor (DE-588)4168214-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Lügendetektor (DE-588)4168214-2 s Implizites Wissen (DE-588)4161419-7 s 1\p DE-604 Verschuere, Bruno (DE-588)1012810690 edt Ben Shaḥar, Gershon 1942- (DE-588)11207300X edt Meijer, Ewout 1975- (DE-588)1225826969 edt Erscheint auch als Druck-Ausgabe, Paperback 978-0-521-13615-0 Erscheint auch als Druck-Ausgabe 978-0-521-76952-5 https://doi.org/10.1017/CBO9780511975196 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Memory detection theory and application of the concealed information test Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer Lie detectors and detection Memory Deception Implizites Wissen (DE-588)4161419-7 gnd Lügendetektor (DE-588)4168214-2 gnd |
subject_GND | (DE-588)4161419-7 (DE-588)4168214-2 (DE-588)4143413-4 |
title | Memory detection theory and application of the concealed information test |
title_auth | Memory detection theory and application of the concealed information test |
title_exact_search | Memory detection theory and application of the concealed information test |
title_full | Memory detection theory and application of the concealed information test edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer |
title_fullStr | Memory detection theory and application of the concealed information test edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer |
title_full_unstemmed | Memory detection theory and application of the concealed information test edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer |
title_short | Memory detection |
title_sort | memory detection theory and application of the concealed information test |
title_sub | theory and application of the concealed information test |
topic | Lie detectors and detection Memory Deception Implizites Wissen (DE-588)4161419-7 gnd Lügendetektor (DE-588)4168214-2 gnd |
topic_facet | Lie detectors and detection Memory Deception Implizites Wissen Lügendetektor Aufsatzsammlung |
url | https://doi.org/10.1017/CBO9780511975196 |
work_keys_str_mv | AT verschuerebruno memorydetectiontheoryandapplicationoftheconcealedinformationtest AT benshahargershon memorydetectiontheoryandapplicationoftheconcealedinformationtest AT meijerewout memorydetectiontheoryandapplicationoftheconcealedinformationtest |