
Eliciting Information
This issue looks at why we are more trusting online, eliciting information the friendly way, and which lie detection techniques work best.
- CREST Security Review
- Issue 1 : Eliciting Information
- Issue 2 : Cyber Security
- Issue 3 : Transmission
- Issue 4 : After Islamic State
- Issue 5 : Networks
- Issue 6 : Decision-Making
- Issue 7 : Transitions
- Issue 8 : Influence
- Issue 9 : Data
- Issue 10 : Stress And Resilience
- Issue 11 : Risk
- Issue 12 : COVID-19
- Issue 13 : Technology
- Issue 14 : Trust
- Issue 15 : Trauma
- Issue 16 : Innovation
- Issue 17 : Misinformation

Article
David Ellis, Lukasz Piwek
The future of wearable technology
Article
|2 min read

Article
Adam Joinson, Emma Williams
Eliciting Information Online
Article
|3 min read

Article
Robert A. Fein
Improving practice through research: The US and the Study on Educing Information
Article
|2 min read

Article
Paul Taylor
The A–Z of Information elicitation
Article
|3 min read

Article
Paul Taylor
The promise of social science
Article
|3 min read

Article
Simon Oleszkiewicz
Eliciting information the friendly way: Conceptualising the Scharff Technique
Article
|3 min read

Article
Lorraine Hope
How does memory work?
Article
|3 min read

Article
Aldert Vrij, Ronald P. Fisher
Which Lie Detection Tools are Ready for Use?
Article
|4 min read

Kim Knott, Matthew Francis
What’s the difference between Sunni and Shi’a Muslims?
3 min read

Article
Christian Meissner, Susan Brandon
Expanding the frontiers of interrogation research and practice
Article
|3 min read

Article
Jordan Nunan, Becky Milne
Turning research into practice in investigative interviewing
Article
|3 min read

Article
Debi Ashenden
Creativity and Cyber Security
Article
|2 min read

Poster
Paul Taylor
Mind map: Information Elicitation
Poster
|3 min read