Eliciting Information
This issue looks at why we are more trusting online, eliciting information the friendly way, and which lie detection techniques work best.
- CREST Security Review
- Issue 1 : Eliciting Information
- Issue 2 : Cyber Security
- Issue 3 : Transmission
- Issue 4 : After Islamic State
- Issue 5 : Networks
- Issue 6 : Decision-Making
- Issue 7 : Transitions
- Issue 8 : Influence
- Issue 9 : Data
- Issue 10 : Stress And Resilience
- Issue 11 : Risk
- Issue 12 : COVID-19
- Issue 14 : Trust
- Issue 13 : Technology
- Issue 15 : Trauma
- Issue 16 : Innovation
- Issue 17 : Misinformation
- Issue 18 : Communication
- Issue 19 : Deterrence
Download this issue
Articles in this Issue
Article
David Ellis, Lukasz Piwek
The future of wearable technology
Article |
2 min read
Article
Adam Joinson, Emma Williams
Eliciting Information Online
Article |
3 min read
Article
Robert A. Fein
Improving practice through research: The US and the Study on Educing Information
Article |
2 min read
Article
Paul Taylor
The A–Z of Information elicitation
Article |
3 min read
Article
Paul Taylor
The promise of social science
Article |
3 min read
Article
Simon Oleszkiewicz
Eliciting information the friendly way: Conceptualising the Scharff Technique
Article |
3 min read
Article
Lorraine Hope
How does memory work?
Article |
3 min read
Article
Aldert Vrij, Ronald P. Fisher
Which Lie Detection Tools are Ready for Use?
Article |
4 min read
Kim Knott, Matthew Francis
What’s the difference between Sunni and Shi’a Muslims?
3 min read
Article
Christian Meissner, Susan Brandon
Expanding the frontiers of interrogation research and practice
Article |
3 min read
Article
Jordan Nunan, Becky Milne
Turning research into practice in investigative interviewing
Article |
3 min read
Article
Debi Ashenden
Creativity and Cyber Security
Article |
2 min read
Poster
Paul Taylor
Mind map: Information Elicitation
Poster |
3 min read