Memory detection : theory and application of the concealed information test / / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer.
"Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2011 |
Language: | English |
Online Access: | |
Physical Description: | xvii, 319 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500674619 |
---|---|
ctrlnum |
(MiAaPQ)500674619 (Au-PeEL)EBL674619 (CaPaEBR)ebr10460543 (CaONFJC)MIL305457 (OCoLC)710974797 |
collection |
bib_alma |
record_format |
marc |
spelling |
Memory detection [electronic resource] : theory and application of the concealed information test / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer. Cambridge ; New York : Cambridge University Press, 2011. xvii, 319 p. : ill. Includes bibliographical references and index. Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer. "Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the validity of such methods is questionable. As an alternative, a knowledge-based approach known as the 'Concealed Information Test' has been developed which investigates whether the examinee recognizes secret information - for example a crime suspect recognizing critical crime details that only the culprit could know. The Concealed Information Test has been supported by decades of research, and is used widely in Japan. This is the first book to focus on this exciting approach and will be of interest to law enforcement agencies and academics and professionals in psychology, criminology, policing and law"-- Provided by publisher. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Lie detectors and detection. Memory. Deception. Electronic books. Verschuere, Bruno. Ben-Shakhar, Gershon. Meijer, Ewout. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=674619 Click to View |
language |
English |
format |
Electronic eBook |
author2 |
Verschuere, Bruno. Ben-Shakhar, Gershon. Meijer, Ewout. ProQuest (Firm) |
author_facet |
Verschuere, Bruno. Ben-Shakhar, Gershon. Meijer, Ewout. ProQuest (Firm) ProQuest (Firm) |
author2_variant |
b v bv g b s gbs e m em |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Verschuere, Bruno. |
title |
Memory detection theory and application of the concealed information test / |
spellingShingle |
Memory detection theory and application of the concealed information test / Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer. |
title_sub |
theory and application of the concealed information test / |
title_full |
Memory detection [electronic resource] : theory and application of the concealed information test / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer. |
title_fullStr |
Memory detection [electronic resource] : theory and application of the concealed information test / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer. |
title_full_unstemmed |
Memory detection [electronic resource] : theory and application of the concealed information test / edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer. |
title_auth |
Memory detection theory and application of the concealed information test / |
title_new |
Memory detection |
title_sort |
memory detection theory and application of the concealed information test / |
publisher |
Cambridge University Press, |
publishDate |
2011 |
physical |
xvii, 319 p. : ill. |
contents |
Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer. |
isbn |
9781139045001 (electronic bk.) |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV8078 |
callnumber-sort |
HV 48078 M46 42011 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=674619 |
illustrated |
Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
363 - Other social problems & services |
dewey-full |
363.25/4 |
dewey-sort |
3363.25 14 |
dewey-raw |
363.25/4 |
dewey-search |
363.25/4 |
oclc_num |
710974797 |
work_keys_str_mv |
AT verschuerebruno memorydetectiontheoryandapplicationoftheconcealedinformationtest AT benshakhargershon memorydetectiontheoryandapplicationoftheconcealedinformationtest AT meijerewout memorydetectiontheoryandapplicationoftheconcealedinformationtest AT proquestfirm memorydetectiontheoryandapplicationoftheconcealedinformationtest |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500674619 (Au-PeEL)EBL674619 (CaPaEBR)ebr10460543 (CaONFJC)MIL305457 (OCoLC)710974797 |
is_hierarchy_title |
Memory detection theory and application of the concealed information test / |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1792330711007494144 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04336nam a2200433 a 4500</leader><controlfield tag="001">500674619</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">101026s2011 enka sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2010045954</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780521136150 (pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780521769525</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139045001 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500674619</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL674619</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10460543</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL305457</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)710974797</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8078</subfield><subfield code="b">.M46 2011</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">363.25/4</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Memory detection</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">theory and application of the concealed information test /</subfield><subfield code="c">edited by Bruno Verschuere, Gershon Ben-Shakhar, Ewout Meijer.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cambridge ;</subfield><subfield code="a">New York :</subfield><subfield code="b">Cambridge University Press,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 319 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Machine generated contents note: Part I. Introduction: Introduction. Science on the rise: birth and development of the Concealed Information Test Christopher J. Patrick; 1. Encouraging the use of the Guilty Knowledge Test (GKT): what the GKT has to offer law enforcement William G. Iacono; Part II. The Laboratory: Theoretical and Empirical Foundations of the Concealed Information Test: 2. Detecting concealed information using autonomic measures Matthias Gamer; 3. Detecting concealed information in less than a second: response latency-based measures Bruno Verschuere and Jan De Houwer; 4. P300 in detecting concealed information J. Peter Rosenfeld; 5. Detecting of deception and concealed information using neuroimaging techniques Matthias Gamer; 6. New and old covert measures in the Concealed Information Test Eitan Elaad; 7. Theory of the Concealed Information Test Bruno Verschuere and Gershon Ben-Shakhar; Part III. Field Applications of Concealed Information Detection: Promises and Perils: 8. Limitations of the Concealed Information Test in criminal cases Donald J. Kraphol; 9. Validity of the Concealed Information Test in realistic contexts Eitan Elaad; 10. Leakage of information to innocent suspects M. T. Bradley, Clair A. Barefoot and Andrea M. Arsenault; 11. Countermeasures Gershon Ben-Shakhar; 12. Psychopathy and the detection of concealed information Bruno Verschuere; 13. Clinical applications of the Concealed Information Test John J. B. Allen; 14. Daily application of the Concealed Information Test: Japan Akemi Osugi; 15. The Concealed Information Test in the courtroom: legal aspects Gershon Ben-Shakhar and Mordechai Kremnitzer; Part IV. Conclusions: 16. Practical guidelines for developing a Concealed Information Test Ewout Meijer, Bruno Verschuere and Gershon Ben-Shakhar; Epilogue Gershon Ben-Shakhar, Bruno Verschuere and Ewout Meijer.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Traditional techniques for detecting deception, such as the 'lie-detector test' (or polygraph), are based upon the idea that lying is associated with stress. However, it is possible that people telling the truth will experience stress, whereas not all liars will. Because of this, the validity of such methods is questionable. As an alternative, a knowledge-based approach known as the 'Concealed Information Test' has been developed which investigates whether the examinee recognizes secret information - for example a crime suspect recognizing critical crime details that only the culprit could know. The Concealed Information Test has been supported by decades of research, and is used widely in Japan. This is the first book to focus on this exciting approach and will be of interest to law enforcement agencies and academics and professionals in psychology, criminology, policing and law"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Lie detectors and detection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Memory.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Deception.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Verschuere, Bruno.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ben-Shakhar, Gershon.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meijer, Ewout.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=674619</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |