[1] | Skolnick JH (1961) Scientific Theory and Scientific Evidence: An Analysis of Lie-Detection. The Yale Law Journal 70: 694–728.
|
[2] | Wolpe PR, Foster KR, Langleben DD (2005) Emerging neurotechnologies for lie-detection: Promises and perils. The American Journal of Bioethics 5: 39–49. doi: 10.1080/15265160590923367
|
[3] | Vrij A (2008) Detecting lies and deceit: Pitfalls and opportunities. Wiley-Interscience.
|
[4] | Committee to Review the Scientific Evidence on the Polygraph, National Research Council (2003) The Polygraph and Lie Detection. The National Academies Press.
|
[5] | Kleinmuntz B, Szucko JJ (1984) Lie detection in ancient and modern times. A call for contemporary scientific study. The American psychologist 39: 766–776. doi: 10.1037/0003-066x.39.7.766
|
[6] | Lykken DT (1998) A tremor in the blood: Uses and abuses of the lie detector. Plenum Press.
|
[7] | Saxe L, Dougherty D, Cross T (1985) The validity of polygraph testing: Scientific analysis and public controversy. American Psychologist 40: 355. doi: 10.1037/0003-066x.40.3.355
|
[8] | Farwell LA, Donchin E (1991) The Truth Will Out: Interrogative Polygraphy (”Lie Detection”) With Event-Related Brain Potentials. Psychophysiology 28: 531–547. doi: 10.1111/j.1469-8986.1991.tb01990.x
|
[9] | Rosenfeld JP, Labkovsky E, Winograd M, Lui MA, Vandenboom C, et al. (2008) The Complex Trial Protocol (CTP): A new, countermeasure-resistant, accurate, P300-based method for detection of concealed information. Psychophysiology 45: 906–919. doi: 10.1111/j.1469-8986.2008.00708.x
|
[10] | Langleben DD, Schroeder L, Maldjian Ja, Gur RC, McDonald S, et al. (2002) Brain activity during simulated deception: an event-related functional magnetic resonance study. NeuroImage 15: 727–732. doi: 10.1006/nimg.2001.1003
|
[11] | Wang G, Chen H, Atabakhsh H (2004) Automatically detecting deceptive criminal identities. Communications of the ACM 47: 70–76. doi: 10.1145/971617.971618
|
[12] | Inbau FE, Reid JE (1964) Lie-Detector Technique: A Reliable and Valuable Investigative Aid, The. American Bar Association Journal 50: 470–473.
|
[13] | Honts CR, Amato SL, Gordon AK (2001) Effects of spontaneous countermeasures used against the comparison question test. Polygraph 30: 1–9.
|
[14] | Hu X, Hegeman D, Landry E, Rosenfeld JP (2012) Increasing the number of irrelevant stimuli increases ability to detect countermeasures to the P300-based Complex Trial Protocol for concealed information detection. Psychophysiology 49: 85–95. doi: 10.1111/j.1469-8986.2011.01286.x
|
[15] | Ganis G, Rosenfeld JP, Meixner J, Kievit Ra, Schendan HE (2011) Lying in the scanner: covert countermeasures disrupt deception detection by functional magnetic resonance imaging. NeuroImage 55: 312–319. doi: 10.1016/j.neuroimage.2010.11.025
|
[16] | Meixner JB, Rosenfeld JP (2010) Countermeasure mechanisms in a P300-based concealed information test. Psychophysiology 47: 57–65. doi: 10.1111/j.1469-8986.2009.00883.x
|
[17] | Labkovsky E, Rosenfeld JP (2012) The P300-based, complex trial protocol for concealed information detection resists any number of sequential countermeasures against up to five irrelevant stimuli. Applied psychophysiology and biofeedback 37: 1–10. doi: 10.1007/s10484-011-9171-0
|
[18] | Lui M, Rosenfeld JP (2009) The application of subliminal priming in lie detection: Scenario for identification of members of a terrorist ring. Psychophysiology 46: 889–903. doi: 10.1111/j.1469-8986.2009.00810.x
|
[19] | Maoz K, Breska A, Ben-Shakhar G (2012) Orienting response elicitation by personally significant information under subliminal stimulus presentation: demonstration using the concealed information test. Psychophysiology 49: 1610–1617. doi: 10.1111/j.1469-8986.2012.01470.x
|
[20] | Giesbrecht B, Bischof WF, Kingstone A (2003) Visual masking during the attentional blink: tests of the object substitution hypothesis. Journal of Experimental Psychology: Human Perception and Performance 29: 238. doi: 10.1037//0096-1523.29.1.238
|
[21] | Bowman H, Wyble B (2007) The simultaneous type, serial token model of temporal attention and working memory. Psychological Review 114: 38–70. doi: 10.1037/0033-295x.114.1.38
|
[22] | Bowman H, Filetti M, Janssen D, Su L, Alsufyani A, et al. (2013) Subliminal salience search illustrated: EEG identity and deception detection on the fringe of awareness. PLoS ONE 8: e54258. doi: 10.1371/journal.pone.0054258
|
[23] | Luck SJ, Vogel EK, Shapiro KL (1996) Word meanings can be accessed but not reported during the attentional blink. Nature 383: 616–618. doi: 10.1038/383616a0
|
[24] | Craston P, Wyble B, Chennu S, Bowman H (2009) The attentional blink reveals serial working memory encoding: evidence from virtual and human event-related potentials. Journal of Cognitive Neuroscience 21: 550–566. doi: 10.1162/jocn.2009.21036
|
[25] | Chennu S, Craston P, Wyble B, Bowman H (2009) Attention Increases the Temporal Precision of Conscious Perception: Verifying the Neural-ST2 Model. PLoS Computational Biology 5: e1000576. doi: 10.1371/journal.pcbi.1000576
|
[26] | Delorme A, Makeig S (2004) EEGLAB: an open source toolbox for analysis of single-trial EEG dynamics including independent component analysis. Journal of Neuroscience Methods 134: 9–21. doi: 10.1016/j.jneumeth.2003.10.009
|
[27] | Polich J, Comerchero MD (2003) P3a from visual stimuli: typicality, task, and topography. Brain topography 15: 141–152. doi: 10.1023/a:1022637732495
|
[28] | Blair RC, Karniski W (1993) An alternative method for significance testing of waveform difference potentials. Psychophysiology 30: 518–524. doi: 10.1111/j.1469-8986.1993.tb02075.x
|
[29] | Hayasaka S, Nichols TE (2004) Combining voxel intensity and cluster extent with permutation test framework. Neuroimage 23: 54–63. doi: 10.1016/j.neuroimage.2004.04.035
|
[30] | Whitlock MC (2005) Combining probability from independent tests: the weighted Z-method is superior to Fisher’s approach. Journal of Evolutionary Biology 18: 1368–1373. doi: 10.1111/j.1420-9101.2005.00917.x
|
[31] | Ludbrook J (2008) Analysis of 2×2 tables of frequencies: matching test to experimental design. International Journal of Epidemiology 37: 1430–1435. doi: 10.1093/ije/dyn162
|
[32] | Fay MP, Proschan MA (2010) Wilcoxon-Mann-Whitney or t-test? On assumptions for hypothesis tests and multiple interpretations of decision rules. Statistics surveys 4: 1–39. doi: 10.1214/09-ss051
|
[33] | Fischler I, Jin Y-S, Boaz TL, Perry NW, Childers DG (1987) Brain potentials related to seeing one’s own name. Brain and Language 30: 245–262. doi: 10.1016/0093-934x(87)90101-5
|
[34] | Fischer C, Dailler F, Morlet D (2008) Novelty P3 elicited by the subject’s own name in comatose patients. Clinical Neurophysiology 119: 2224–2230. doi: 10.1016/j.clinph.2008.03.035
|
[35] | Tateuchi T, Itoh K, Nakada T (2012) Neural mechanisms underlying the orienting response to subject’s own name: an event-related potential study. Psychophysiology 49: 786–791. doi: 10.1111/j.1469-8986.2012.01363.x
|
[36] | Holeckova I, Fischer C, Giard M-H, Delpuech C, Morlet D (2006) Brain responses to a subject’s own name uttered by a familiar voice. Brain Research 1082: 142–152. doi: 10.1016/j.brainres.2006.01.089
|
[37] | Polich J (2007) Updating P300: an integrative theory of P3a and P3b. Clinical neurophysiology 118: 2128–2148. doi: 10.1016/j.clinph.2007.04.019
|
[38] | Bergstr?m ZM, Anderson MC, Buda M, Simons JS, Richardson-Klavehn A (2013) Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests. Biological Psychology 94: 1–11. doi: 10.1016/j.biopsycho.2013.04.012
|