Memory detection : theory and application of the concealed information test / / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer.

"Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2011
Language:English
Online Access:
Physical Description:xvii, 319 p. :; ill.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 500674619
ctrlnum (MiAaPQ)500674619
(Au-PeEL)EBL674619
(CaPaEBR)ebr10460543
(CaONFJC)MIL305457
(OCoLC)710974797
collection bib_alma
record_format marc
spelling Memory detection [electronic resource] : theory and application of the concealed information test / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer.
Cambridge ; New York : Cambridge University Press, 2011.
xvii, 319 p. : ill.
Includes bibliographical references and index.
Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer.
"Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the validity of such methods is questionable. As an alternative, a knowledge-based approach known as the 'Concealed Information Test' has been developed which investigates whether the examinee recognizes secret information - for example a crime suspect recognizing critical crime details that only the culprit could know. The Concealed Information Test has been supported by decades of research, and is used widely in Japan. This is the first book to focus on this exciting approach and will be of interest to law enforcement agencies and academics and professionals in psychology, criminology, policing and law"-- Provided by publisher.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Lie detectors and detection.
Memory.
Deception.
Electronic books.
Verschuere, Bruno.
Ben-Shakhar, Gershon.
Meijer, Ewout.
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=674619 Click to View
language English
format Electronic
eBook
author2 Verschuere, Bruno.
Ben-Shakhar, Gershon.
Meijer, Ewout.
ProQuest (Firm)
author_facet Verschuere, Bruno.
Ben-Shakhar, Gershon.
Meijer, Ewout.
ProQuest (Firm)
ProQuest (Firm)
author2_variant b v bv
g b s gbs
e m em
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Verschuere, Bruno.
title Memory detection theory and application of the concealed information test /
spellingShingle Memory detection theory and application of the concealed information test /
Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer.
title_sub theory and application of the concealed information test /
title_full Memory detection [electronic resource] : theory and application of the concealed information test / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer.
title_fullStr Memory detection [electronic resource] : theory and application of the concealed information test / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer.
title_full_unstemmed Memory detection [electronic resource] : theory and application of the concealed information test / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer.
title_auth Memory detection theory and application of the concealed information test /
title_new Memory detection
title_sort memory detection theory and application of the concealed information test /
publisher Cambridge University Press,
publishDate 2011
physical xvii, 319 p. : ill.
contents Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer.
isbn 9781139045001 (electronic bk.)
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV8078
callnumber-sort HV 48078 M46 42011
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=674619
illustrated Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 363 - Other social problems & services
dewey-full 363.25/4
dewey-sort 3363.25 14
dewey-raw 363.25/4
dewey-search 363.25/4
oclc_num 710974797
work_keys_str_mv AT verschuerebruno memorydetectiontheoryandapplicationoftheconcealedinformationtest
AT benshakhargershon memorydetectiontheoryandapplicationoftheconcealedinformationtest
AT meijerewout memorydetectiontheoryandapplicationoftheconcealedinformationtest
AT proquestfirm memorydetectiontheoryandapplicationoftheconcealedinformationtest
status_str n
ids_txt_mv (MiAaPQ)500674619
(Au-PeEL)EBL674619
(CaPaEBR)ebr10460543
(CaONFJC)MIL305457
(OCoLC)710974797
is_hierarchy_title Memory detection theory and application of the concealed information test /
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1792330711007494144
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04336nam a2200433 a 4500</leader><controlfield tag="001">500674619</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">101026s2011 enka sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2010045954</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780521136150 (pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780521769525</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139045001 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500674619</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL674619</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10460543</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL305457</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)710974797</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8078</subfield><subfield code="b">.M46 2011</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">363.25/4</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Memory detection</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">theory and application of the concealed information test /</subfield><subfield code="c">edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cambridge ;</subfield><subfield code="a">New York :</subfield><subfield code="b">Cambridge University Press,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 319 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the validity of such methods is questionable. As an alternative, a knowledge-based approach known as the 'Concealed Information Test' has been developed which investigates whether the examinee recognizes secret information - for example a crime suspect recognizing critical crime details that only the culprit could know. The Concealed Information Test has been supported by decades of research, and is used widely in Japan. This is the first book to focus on this exciting approach and will be of interest to law enforcement agencies and academics and professionals in psychology, criminology, policing and law"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Lie detectors and detection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Memory.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Deception.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Verschuere, Bruno.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ben-Shakhar, Gershon.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meijer, Ewout.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=674619</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>