Skip to content
Back to outputs

A call for evidence-based security tools

Research output: Contribution to journalArticlepeer-review

Standard

A call for evidence-based security tools. / Meijer, Ewout H.; Verschuere, Bruno; Vrij, Aldert; Merckelbach, Harald; Smulders, Fren; Leal, Sharon; Ben-Shakhar, Gershon; Granhag, Par Anders; Gamer, Matthias; Gronau, Nurit; Vossel, Gerhard; Spence, Sean.

In: Open Access Journal of Forensic Psychology, Vol. 1, 2009, p. 1-4.

Research output: Contribution to journalArticlepeer-review

Harvard

Meijer, EH, Verschuere, B, Vrij, A, Merckelbach, H, Smulders, F, Leal, S, Ben-Shakhar, G, Granhag, PA, Gamer, M, Gronau, N, Vossel, G & Spence, S 2009, 'A call for evidence-based security tools', Open Access Journal of Forensic Psychology, vol. 1, pp. 1-4. <http://www.forensicpsychologyunbound.ws/OAJFP/Volume_1__2009_files/Meijer%202009.pdf>

APA

Meijer, E. H., Verschuere, B., Vrij, A., Merckelbach, H., Smulders, F., Leal, S., Ben-Shakhar, G., Granhag, P. A., Gamer, M., Gronau, N., Vossel, G., & Spence, S. (2009). A call for evidence-based security tools. Open Access Journal of Forensic Psychology, 1, 1-4. http://www.forensicpsychologyunbound.ws/OAJFP/Volume_1__2009_files/Meijer%202009.pdf

Vancouver

Meijer EH, Verschuere B, Vrij A, Merckelbach H, Smulders F, Leal S et al. A call for evidence-based security tools. Open Access Journal of Forensic Psychology. 2009;1:1-4.

Author

Meijer, Ewout H. ; Verschuere, Bruno ; Vrij, Aldert ; Merckelbach, Harald ; Smulders, Fren ; Leal, Sharon ; Ben-Shakhar, Gershon ; Granhag, Par Anders ; Gamer, Matthias ; Gronau, Nurit ; Vossel, Gerhard ; Spence, Sean. / A call for evidence-based security tools. In: Open Access Journal of Forensic Psychology. 2009 ; Vol. 1. pp. 1-4.

Bibtex

@article{0354b9f479da48bd965bca867ca872eb,
title = "A call for evidence-based security tools",
abstract = "Since the 2001 attacks on the twin towers, policies on security have changed drastically, bringing about an increased need for tools that allow for the detection of deception. Many of the solutions offered today, however, lack scientific underpinning. We recommend two important changes to improve the (cost) effectiveness of security policy. To begin with, the emphasis of deception research should shift from technological to behavioural sciences. Secondly, the burden of proof should lie with the manufacturers of the security tools. Governments should not rely on security tools that have not passed scientific scrutiny, and should only employ those methods that have been proven effective. After all, the use of tools that do not work will only get us further from the truth. ",
author = "Meijer, {Ewout H.} and Bruno Verschuere and Aldert Vrij and Harald Merckelbach and Fren Smulders and Sharon Leal and Gershon Ben-Shakhar and Granhag, {Par Anders} and Matthias Gamer and Nurit Gronau and Gerhard Vossel and Sean Spence",
year = "2009",
language = "English",
volume = "1",
pages = "1--4",
journal = "Open Access Journal of Forensic Psychology",
issn = "1948-5115",

}

RIS

TY - JOUR

T1 - A call for evidence-based security tools

AU - Meijer, Ewout H.

AU - Verschuere, Bruno

AU - Vrij, Aldert

AU - Merckelbach, Harald

AU - Smulders, Fren

AU - Leal, Sharon

AU - Ben-Shakhar, Gershon

AU - Granhag, Par Anders

AU - Gamer, Matthias

AU - Gronau, Nurit

AU - Vossel, Gerhard

AU - Spence, Sean

PY - 2009

Y1 - 2009

N2 - Since the 2001 attacks on the twin towers, policies on security have changed drastically, bringing about an increased need for tools that allow for the detection of deception. Many of the solutions offered today, however, lack scientific underpinning. We recommend two important changes to improve the (cost) effectiveness of security policy. To begin with, the emphasis of deception research should shift from technological to behavioural sciences. Secondly, the burden of proof should lie with the manufacturers of the security tools. Governments should not rely on security tools that have not passed scientific scrutiny, and should only employ those methods that have been proven effective. After all, the use of tools that do not work will only get us further from the truth.

AB - Since the 2001 attacks on the twin towers, policies on security have changed drastically, bringing about an increased need for tools that allow for the detection of deception. Many of the solutions offered today, however, lack scientific underpinning. We recommend two important changes to improve the (cost) effectiveness of security policy. To begin with, the emphasis of deception research should shift from technological to behavioural sciences. Secondly, the burden of proof should lie with the manufacturers of the security tools. Governments should not rely on security tools that have not passed scientific scrutiny, and should only employ those methods that have been proven effective. After all, the use of tools that do not work will only get us further from the truth.

M3 - Article

VL - 1

SP - 1

EP - 4

JO - Open Access Journal of Forensic Psychology

JF - Open Access Journal of Forensic Psychology

SN - 1948-5115

ER -

ID: 2113624