2007
DOI: 10.1016/j.ijpsycho.2007.08.001
|View full text |Cite
|
Sign up to set email alerts
|

The P300 is sensitive to concealed face recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

6
102
2

Year Published

2009
2009
2017
2017

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(110 citation statements)
references
References 42 publications
6
102
2
Order By: Relevance
“…Some have applied various other knowledge-imparting procedures (Gamer and Berti 2009;Lefebvre et al 2007Lefebvre et al , 2009Meijer et al 2007). Some have detected recognition of well-known personal information such as pictures of known individuals (Meijer et al 2007(Meijer et al , 2009). These studies have met some but not all of the brain fingerprinting scientific standards.…”
Section: Replications Of Brain Fingerprinting Science In Other Indepmentioning
confidence: 99%
“…Some have applied various other knowledge-imparting procedures (Gamer and Berti 2009;Lefebvre et al 2007Lefebvre et al , 2009Meijer et al 2007). Some have detected recognition of well-known personal information such as pictures of known individuals (Meijer et al 2007(Meijer et al , 2009). These studies have met some but not all of the brain fingerprinting scientific standards.…”
Section: Replications Of Brain Fingerprinting Science In Other Indepmentioning
confidence: 99%
“…Several ERP studies found that RTs successfully identified concealed information (Allen, Iacono, & Danielson, 1992;Meijer, Smulders, Merckelbach, & Wolf, 2007;Rosenfeld, Biroschak, & Furedy, 2006;Rosenfeld, Soskins, Bosh, & Ryan, 2004;Verschuere, Rosenfeld, Winograd, Labkovsky, & Wiersema, 2008). Seymour, Seifert, Shafto, and Mosmann (2000) examined whether concealed information can be detected using only RTs, without concurrent ERP recordings.…”
Section: The Rt-based Concealed Information Testmentioning
confidence: 99%
“…Yet Rosenfeld (2011) remarks that neither of these studies is fully representative. In the fi rst, the amplitude of the potential (part of the bootstrapping method based on the volume of the amplitude) was calculated according to the baseline-to-peak method instead of the peakto peak method more effi cient in the case of disclosure of concealed information (see : Soskins, Rosenfeld, Niendam 2001;Meijer, Smulders, Merckelbach, Wolf 2007). In turn, all the methods used in the second study proved very low effi ciency, and the high results in the one proposed by Allen concerned only certain cases of using detection prevention methods in the 3SP procedure.…”
Section: Guilty or Innocent? Individual Assessment Proceduresmentioning
confidence: 99%