Criminal Identity Deception and Deception Detection in Law Enforcement
暂无分享,去创建一个
[1] J. Krebs. Deception: Perspectives on Human and Nonhuman Deceit, Robert W. Mitchell, Nicholas S. Thompson (Eds.). State University of New York Press, New York (1986), xxix , 1986 .
[2] P. Andersen,et al. Handbook of Communication and Emotion , 1998 .
[3] Dale Hample,et al. Purposes and effects of lying , 1980 .
[4] Hsinchun Chen,et al. Using Coplink to Analyze Criminal-Justice Data , 2002, Computer.
[5] Gang Wang,et al. Automatically detecting deceptive criminal identities , 2004, CACM.
[6] Günter Köhnken,et al. Training police officers to detect deceptive eyewitness statements: Does it work? , 1987 .
[7] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[8] Judith Donath,et al. Identity and deception in the virtual community , 1998 .
[9] Robert W. Mitchell,et al. Deception, perspectives on human and nonhuman deceit , 1986 .
[10] P. Kollock,et al. Communities in Cyberspace , 2002 .
[11] Judee K. Burgoon,et al. Emotional expression in the deception process , 1996 .
[12] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[13] R. Kraut,et al. Behavioral roots of person perception: The deception judgments of customs inspectors and laymen. , 1980 .
[14] A. Vrij. Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice , 2000 .
[15] P. Ekman,et al. Who can catch a liar? , 1991, The American psychologist.
[16] M. Knapp,et al. Telling It Like It Isn't: A Review of Theory and Research on Deceptive Communications. , 1979 .
[17] Objective and subjective indicators of deception , 1993 .
[18] Laura K. Guerrero,et al. Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .
[19] B. Depaulo,et al. On-the-Job Experience and Skill at Detecting Deception1 , 1986 .
[20] Gonzalo Navarro,et al. A guided tour to approximate string matching , 2001, CSUR.
[21] P. Ekman. Telling lies: clues to deceit in the marketplace , 1985 .
[22] Roger Clarke,et al. Human Identification in Information Systems , 1994 .