Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

An Overview of Lie Detection Methods

Authors

[ 1 ] Instytut Sieci Teleinformatycznych, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ 2 ] Politechnika Poznańska | [ P ] employee | [ S ] student

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication

2023

Chapter type

chapter in monograph / paper

Publication language

english

Keywords
EN
  • Lie Detection
  • AI
  • overview
Abstract

EN Advancements in technology and behavioral sciences have intensified interdisciplinary research in the area of lie detection methods. Traditional approaches, such as polygraphs, face criticism for their limitations. This article reviews the evolution of lie detection methods, from the historical development of polygraphy to modern techniques leveraging Artificial Intelligence (AI). The authors review the contributions of AI in areas such as magnetic resonance imaging, thermal imaging, and facial microexpression analysis. The focus is on assessing the potential and challenges of AI-based lie detection and examining the implications within the context of forensic and judicial applications. The article also discusses EU regulations on AI, emphasizing the need for transparency, documentation, and risk assessment in forensic science.

Pages (from - to)

319 - 325

Book

Proceedings of the 42nd International Business Information Management Association Computer Science Conference IBIMA, 29-30 November 2023, Seville, Spain. Theory and Practice in Modern Computing: From Artificial Intelligence to Computer Security

Presented on

42nd International Business Information Management Association Computer Science Conference IBIMA, 29-30.11.2023, Seville, Spain

Ministry points / chapter

5

Ministry points / conference (CORE)

70

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.