TY - GEN
T1 - A Call for Evidence-Based Security Tools
AU - Gronau-Bitan, Nurit
AU - Meijer, Ewout H.
AU - Ben-Shakhar, Gershon
PY - 2009
Y1 - 2009
N2 - Since the 2001 attacks on the twin towers, policies on security have changed drastically, bringing about an increased need for tools that allow for the detection of deception. Many of the solutions offered today, however, lack scientific underpinning. We recommend two important changes to improve the (cost) effectiveness of security policy. To begin with, the emphasis of deception research should shift from technological to behavioural sciences. Secondly, the burden of proof should lie with the manufacturers of the security tools. Governments should not rely on security tools that have not passed scientific scrutiny, and should only employ those methods that have been proven effective. After all, the use of tools that do not work will only get us further from the truth.
AB - Since the 2001 attacks on the twin towers, policies on security have changed drastically, bringing about an increased need for tools that allow for the detection of deception. Many of the solutions offered today, however, lack scientific underpinning. We recommend two important changes to improve the (cost) effectiveness of security policy. To begin with, the emphasis of deception research should shift from technological to behavioural sciences. Secondly, the burden of proof should lie with the manufacturers of the security tools. Governments should not rely on security tools that have not passed scientific scrutiny, and should only employ those methods that have been proven effective. After all, the use of tools that do not work will only get us further from the truth.
UR - https://www.researchgate.net/publication/228878609_A_call_for_evidence-based_security_tools
M3 - Article
VL - 1
SP - 1
EP - 4
JO - Open Access Journal of Forensic Psychology
JF - Open Access Journal of Forensic Psychology
ER -