Miradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos

En este libro se presenta, en su primera parte, un abordaje narrativo respecto al concepto del engaño y sobre cómo ha sido su estudio, caracterizado principalmente por el análisis de las respuestas psicofisiológicas y el comportamiento verbal en la detección de relatos honestos y deshonestos. Con es...

Full description

Autores:
Carvajal-Builes, Juan Camilo
Barreto-Galeano, María Idaly
Tipo de recurso:
Book
Fecha de publicación:
2024
Institución:
Universidad Católica de Colombia
Repositorio:
RIUCaC - Repositorio U. Católica
Idioma:
spa
OAI Identifier:
oai:repository.ucatolica.edu.co:10983/31422
Acceso en línea:
https://hdl.handle.net/10983/31422
https://doi.org/10.14718/9786287554702.2024
Palabra clave:
Comportamiento verbal-relatos personales
Verdad y mentira-aspectos psicológicos
Verdad y mentira-aspectos psicológicos
Análisis lingüístico- aspectos psicológicos
Conducta-investigaciones
Percepción visual- aspectos psicológicos
Interrogatorio de testigos- estudio de casos
150 - Psicología
Engaño
Testimonio
Testigos
Credibilidad
Eye tracker
LIWC
Rights
restrictedAccess
License
Derechos Reservados - Universidad Católica de Colombia, 2024
id UCATOLICA2_2135ccefe60560d8b64e9f8505ca16ac
oai_identifier_str oai:repository.ucatolica.edu.co:10983/31422
network_acronym_str UCATOLICA2
network_name_str RIUCaC - Repositorio U. Católica
repository_id_str
dc.title.none.fl_str_mv Miradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos
title Miradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos
spellingShingle Miradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos
Comportamiento verbal-relatos personales
Verdad y mentira-aspectos psicológicos
Verdad y mentira-aspectos psicológicos
Análisis lingüístico- aspectos psicológicos
Conducta-investigaciones
Percepción visual- aspectos psicológicos
Interrogatorio de testigos- estudio de casos
150 - Psicología
Engaño
Testimonio
Testigos
Credibilidad
Eye tracker
LIWC
title_short Miradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos
title_full Miradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos
title_fullStr Miradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos
title_full_unstemmed Miradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos
title_sort Miradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos
dc.creator.fl_str_mv Carvajal-Builes, Juan Camilo
Barreto-Galeano, María Idaly
dc.contributor.author.none.fl_str_mv Carvajal-Builes, Juan Camilo
Barreto-Galeano, María Idaly
dc.subject.armarc.none.fl_str_mv Comportamiento verbal-relatos personales
Verdad y mentira-aspectos psicológicos
Verdad y mentira-aspectos psicológicos
Análisis lingüístico- aspectos psicológicos
Conducta-investigaciones
Percepción visual- aspectos psicológicos
Interrogatorio de testigos- estudio de casos
topic Comportamiento verbal-relatos personales
Verdad y mentira-aspectos psicológicos
Verdad y mentira-aspectos psicológicos
Análisis lingüístico- aspectos psicológicos
Conducta-investigaciones
Percepción visual- aspectos psicológicos
Interrogatorio de testigos- estudio de casos
150 - Psicología
Engaño
Testimonio
Testigos
Credibilidad
Eye tracker
LIWC
dc.subject.ddc.none.fl_str_mv 150 - Psicología
dc.subject.proposal.none.fl_str_mv Engaño
Testimonio
Testigos
Credibilidad
Eye tracker
LIWC
description En este libro se presenta, en su primera parte, un abordaje narrativo respecto al concepto del engaño y sobre cómo ha sido su estudio, caracterizado principalmente por el análisis de las respuestas psicofisiológicas y el comportamiento verbal en la detección de relatos honestos y deshonestos. Con esto, el lector contará con diversos elementos conceptuales, teóricos y metodológicos para entender lo planteado en la segunda parte de esta obra, en la cual se abordan distintos estudios empíricos con énfasis en la detección del engaño por medio del eye tracker y el análisis del estilo lingüístico, constituyendo así un procedimiento validado para la detección de engaño. Al final se muestran los resultados de distintos análisis estadísticos robustos en cuanto a las diferencias en el comportamiento visual y el estilo lingüístico en los relatos honestos y deshonestos de hombres y mujeres en un estudio simulado con testigos de un delito, y se presenta una propuesta explicativa y predictiva de la conducta de engaño, con la cual se hacen sugerencias y recomendaciones para futuras investigaciones. (Tomado de la fuente).
publishDate 2024
dc.date.accessioned.none.fl_str_mv 2024-09-04T17:54:30Z
dc.date.available.none.fl_str_mv 2024-09-04T17:54:30Z
dc.date.issued.none.fl_str_mv 2024-09
dc.type.none.fl_str_mv Libro
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_2f33
dc.type.coarversion.none.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.content.none.fl_str_mv Text
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/book
dc.type.redcol.none.fl_str_mv http://purl.org/redcol/resource_type/LIB
dc.type.version.none.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_2f33
status_str publishedVersion
dc.identifier.citation.none.fl_str_mv Carvajal-Builes, J. P., & Barreto-Galeano, M. I. (2024). Miradas y palabras que engañan. Comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos. Editorial Universidad Católica de Colombia. https://doi.org/10.14718/9786287554702.2024
dc.identifier.isbn.none.fl_str_mv 9786287554696
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/10983/31422
dc.identifier.url.none.fl_str_mv https://doi.org/10.14718/9786287554702.2024
identifier_str_mv Carvajal-Builes, J. P., & Barreto-Galeano, M. I. (2024). Miradas y palabras que engañan. Comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos. Editorial Universidad Católica de Colombia. https://doi.org/10.14718/9786287554702.2024
9786287554696
url https://hdl.handle.net/10983/31422
https://doi.org/10.14718/9786287554702.2024
dc.language.iso.none.fl_str_mv spa
language spa
dc.relation.ispartofseries.none.fl_str_mv Colección Logos Vestigium; no. 19
dc.relation.references.none.fl_str_mv Alonso-Quecuty, M. (1993). Información postevento y reality monitoring: cuando el testigo “no puede ser honesto”. En Psicología forense experimental (pp. 85-98). Promolibro.
Amado, B., Arce, R., & Fariña, F. (2015). Undeutsch hypothesis and Criteria Based Content Analysis: A meta-analytic review. The European Journal of Psychology Applied to Legal Context, 7(1), 3-12. http://dx.doi.org/10.1016/j.ejpal.2014.11.002
American Psychiatric Association. (2013). Guía de consulta de los criterios diagnósticos del DSM 5. Arlington.
Andreú, A. (2000). Las técnicas de análisis de contenido: una revisión actualizada. Fundación Centro Estudios Andaluces, Universidad de Granada, 10(2), 1-34. https://abacoenred.org/wp-content/uploads/2019/02/Las-técnicas-de-análisisde- contenido-una-revisión-actualizada.pdf
Arce, R., & Fariña, F. (2005). Peritación psicológica de la credibilidad del testimonio, la huella psíquica y la simulación: el sistema de evaluación global (SEG). Papeles del Psicólogo, 26, 59-77. http://www.papelesdelpsicologo.es/pdf/1247.pdf
Arce, R., & Fariña, F. (2006). Psicología del testimonio y evaluación cognitiva de la veracidad de testimonios y declaraciones. En J. C. Sierra, E. M. Jiménez & G. Buela- Casal (Coords.), Psicología forense: Manual de técnicas y aplicaciones (pp. 563- 601). Biblioteca Nueva. https://uforense.org/wp-content/uploads/2020/12/2006- psicologxa-del-testimonio-xarce-y-farixax-2006x-2020-12-22.pdf
Ben-Shakhar, B., Gamer, M., Iacono, W., Meijer, E., & Verschuere, B. (2015). Preliminary Process Theory does not validate the Comparison Question Test: A comment on Palmatier and Rovner (2015). International Journal of Psychophysiology, 95(1), 16-19. http://dx.doi.org/10.1016/j.ijpsycho.2014.08.582
Bowman, H., Filetti, M., Alsufyani, A., Janssen, D., & Su, L. (2014). Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. Plos One, 9(3). https://doi.org/10.1371/journal.pone.0090595
Buller, D., & Burgoon, J. (1994). Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18(2), 155-184. https://link.springer.com/article/10.1007/ BF02170076
Cameron, M., Gudaitis, T., Holt, T., & Kilger, M. (2015). The psychology of deception. En Deception in the digital age (1.ª ed.) (pp. 1-50). Elsevier. https://www.elsevier. com/books/deception-in-the-digital-age/malin/978-0-12-411630-6
Carvajal-Builes, J. (2017). Detección de engaño a través de medidas psicofisiológicas y carga cognitiva como alternativa explicativa. En Y. Gómez, A. Ceballos & O. Ruiz (Coords.), Congreso Desafíos de la psicología 2017, un compromiso con la salud y el bienestar (pp. 50-53). Universidad de Nariño. http://sired.udenar.edu. co/6007/1/Desafios_de_la_Psicologia2017.pdf
Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2017). Debate sobre la detección del engaño por medio de mediciones neurofisiológicas. En C. Pavajaeu & C. Gutiérrez de Piñeres (Eds.), Neurociencias y derecho: reflexiones sobre la cognición social, el libre albedrío, la dignidad humana, la culpabilidad y la prueba novel (pp. 269-278). Universidad Externado de Colombia.
Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2018b). Instrumentos, medidas, procedimientos y procedencia de los estudios producidos para la detección del engaño a través de medidas psicofisiológicas. Revista Criminalidad, 60(2), 75-88. http://www.scielo.org.co/pdf/crim/v60n2/1794-3108-crim-60-02-00075.pdf
Carvajal-Builes, J., Barreto, I., & Gutiérrez de Piñeres, C. (2024). Deception detection based on the linguistic style of honest and dishonest stories. Journal of Forensic Practice, 26(1), 46-59. https://doi.org/10.1108/JFP-07-2023-0035
Carvajal-Builes, J., Blanco, C., & López, M. (2018a). Validación de indicadores de mentira a través del lenguaje no verbal. Misión Jurídica, 11(14), 169-183. https:// dialnet.unirioja.es/servlet/articulo?codigo=6997363
Carvajal-Builes, J., Gómez-Durán, E., & Barreto, I. (2021). Comportamiento visual y engaño: Una revisión sistematizada. Anuario de psicología, 51(2), 120-129. https://revistes.ub.edu/index.php/Anuario-psicologia/article/view/30221
Carvajal-Builes, J., Rhenals, J., Muñoz, T., & Chaparro, S. (2020). Psicología del testimonio: evidencia actual de su desarrollo. En L. Jiménez-Ardila (Ed.), Subcampos Aplicados de la Psicología Jurídica (pp. 77-93). Editorial Universidad Católica de Colombia. https://repository.ucatolica.edu.co/entities/publication/ 5c3fb91f-1a6d-48d4-8a9e-5ddc1144af76
Christ, S., Van Essen, D., Watson, J., Brubaker, L., & McDermott, K. (2009). The contributions of prefrontal cortex and executive control to deception: evidence from activation likelihood estimate meta-analyses. Cerebral Cortex, 19(7), 1557- 1566. https://www.ncbi.nlm.nih.gov/pubmed/18980948
Constitución Política de Colombia. (1991). 7 de julio de 1991 (Colombia). http://www. secretariasenado.gov.co/senado/basedoc/constitucion_politica_1991.html
Cook, A., Hacker, D., Webb, A., Osher, D., & Kristjansson, S. (2012). Lyin’ eyes: Ocularmotor measures of reading reveal deception. Journal of Experimental Psychology, 18(3), 301-313. https://doi.org/10.1037/a0028307
Cornack, S., Morrison, K., Paik, J., Wisner, A., & Zhu, X. (2014). Information Manipulation Theory 2: A Propositional Theory of Deceptive Discourse Production. Journal of Language and Social Psychology, 33(4), 1-30. https://doi. org/10.1177/0261927X14534656
Csaba, K. (2013). The influence of stimulation/accomodation tests for the polygraph examination economy. Forensic Science, 14(4), 1404-1410. http://bit.ly/3yN8iW1
Depaulo, B., Malone, B., Muhlenbruck, L., Charlton, K., & Cooper, H. (2003). Cues to deception. Psychological Bulletin, 129(1), 74-118. https://doi. org/10.1037/0033-2909.129.1.74
Dietrich, A., Hu, X., & Rosenfeld, J. (2014). The Effects of Sweep Numbers Per Average and Protocol Type on the Accuracy of the P300-Based Concealed Information Test. Applied Psychophysiology Biofeedback, 39, 67-73. https://doi.org/10.1007/ s10484-014-9244-y
Domjan, M. (2010). Principios de aprendizaje y conducta (6.ª ed.). C. L. Editores.
Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068
Ebrahimzadeh, E., Alavi, S., Bijar, A., & Pakkeshal, A. (2013). A novel approach for detection of deception using Smoothed Pseudo Wigner-Ville Distribution (SPWVD). Journal Biomedical Science and Engineering, 6(1), 8-18. https://doi. org/10.4236/jbise.2013.61002
Elaad, E., & Reizer, A. (2015). Personality Correlates of the Self-Assessed Abilities to Tell and Detect Lies, Tell Truths, and Believe Others. Journal of Individual Differences, 36(3), 163-169. https://doi.org/10.1027/1614-0001/a000168
Elaad, E., & Sommerfeld, E. (2016). Effects of Guilt, Disbelief, and Assessed Lie-Truth Telling Abilities on Physiological Responses in the Guilty Action Test. Psychology, 7(8), 1075-1091. https://doi.org/10.4236/psych.2016.78108
Fu, H., Qiu, W., Ma, H., & Ma, Q. (2017). Neurocognitive mechanisms underlying deceptive hazard evaluation: An event-related potential investigation. Plos One, 12(8), e0182892. https://doi.org/10.1371/journal.pone.0182892
Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Aplications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032
Fuller, C., Biros, D., Burgoon, J., & Nunamaker, J. (2013). An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception. Group Decision Negotiation, 22, 117-134. https://doi.org/10.1007/s10726-012-9300-z
Gamer, M., & Ambach, W. (2014). Deception research today. Frontiers in Psychology, 5. https://doi.org/10.3389/fpsyg.2014.00256
García, E. (2008). Neuropsicología y educación. De las neuronas espejo a la teoría de la mente. Revista de Psicología y Educación, 1(3), 69-90. https://hdl.handle. net/20.500.14352/50447
García, E., González, J., & Maestú, F. (2011). Neuronas espejo y teoría de la mente en la explicación de la empatía. Ansiedad y Estrés, 17(2-3), 265-279. https://hdl. handle.net/20.500.14352/42302
Godoy-Cervera, V., & Higueras, L. (2005). El análisis de contenido basado en criterios (CBCA) en la evaluación de la credibilidad del testimonio. Papeles del psicólogo, 26(92), 92-98. https://www.redalyc.org/articulo.oa?id=77809204
Granhag, A., & Hartwig, M. (2008). A new theoretical perspective on deception detection: On the psychology of instrumental mindreading. Crime and Law, 14(3), 189-200. https://doi.org/10.1080/10683160701645181
Honts, C. (2014). Countermeasures and credibility assessment. En D. C. Raskin, C. R. Honts, & J. C. Kircher (Eds.), Credibility assessment: Scientific research and applications (pp. 131-158). Elsevier Academic press. https://doi.org/10.1016/ B978-0-12-394433-7.00004-X
Hu, X., Chen, H., & Fu, G. (2012). A repeated lie becomes a truth? The effect of intentional control and training on deception. Frontiers in Psychology, 3, 1-6. https://doi.org/10.3389/fpsyg.2012.00488
Hu, X., Evans, A., Wu, H., Lee, K., & Fu, G. (2013). An interfering dot-probe task facilitates the detection of mock crime memory in a reaction time (RT)-based concealed information test. Acta Psychologica, 142(2), 278285. https://doi. org/10.1016/j.actpsy.2012.12.006
Jennings, M. (2015). Psychophysiological Significance of Successful Deception in Comparison with Unsuccessful Deception. W. University.
Juárez, J., & Sala, E. (2011). Entrevistando a niños preescolares víctimas de abuso sexual y/o maltrato familiar. Centre d’Estudis Jurídics i Formació Especialitzada. https://www.fundacionenpantalla.org/attachments/article/13/entrevista %20 abuso %20sexual %20en %20prescolares.pdf
Jung, E., Kang, K., & Kim, Y. (2013). Frontoparietal activity during deceptive responses in the P300-based guilty knowledge test: An sLORETA study. Neuroimage, 78, 305-315. https://doi.org/10.1016/j.neuroimage.2013.04.027
Jung, K., & Lee, J. (2012). Cognitive and emotional correlates of different types of deception. Social Behaviour and Personality, 40(4), 575-584. https://doi. org/10.2224/sbp.2012.40.4.575
Köhnken, G. (2004). Statement validity analysis and the “detection of the truth.” En P. A. Granhag & L. Strömwall (Eds.), The detection of deception in forensic contexts (pp. 41-63). Cambridge University Press. https://psycnet.apa.org/doi/10.1017/ CBO9780511490071.003
Lemos, S. (2005). Simulación, engaño y mentira. Papeles del psicólogo, 26(92), 57-58. http://www.papelesdelpsicologo.es/pdf/1246.pdf
Leue, A., & Beauducel, A. (2015). Effects of injustice sensitivity and sex on the P3 amplitude during deception. Biologycal Psychology, 109, 29-36. https://www. ncbi.nlm.nih.gov/pubmed/25910957
Ley 1090 de 2006. Por la cual se reglamenta el ejercicio de la profesión de Psicología, se dicta el Código Deontológico y Bioético y otras disposiciones. Diario Oficial N.º 46383 del 6 de septiembre de 2006. Congreso de la República de Colombia. https://www.funcionpublica.gov.co/eva/gestornormativo/norma.php?i=66205
Ley 906 de 2004. Por la cual se expide el Código de Procedimiento Penal. Congreso de la República de Colombia. https://www.funcionpublica.gov.co/eva/ gestornormativo/norma.php?i=14787
Li, D., & Santos, E. (2013). Deception Detection using Human Reasoning [Conferencia]. 2011 IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, EE. UU. https://doi.org/10.1109/ICSMC.2011.6083660
Manzanero, A. (2009). Análisis de contenido de memorias autobiográficas falsas. Anuario de Psicología Jurídica, 19, 61-72. https://eprints.ucm.es/id/eprint/11019/
Manzanero, A., & González, J. (2015). Modelo holístico de evaluación de la prueba testifical (HELPT). Papeles del psicólogo, 36(2), 125-138. http://www. papelesdelpsicologo.es/pdf/2568.pdf
Masip, J. (2005). ¿Se pilla antes a un mentiroso que a un cojo? Sabiduría popular frente a conocimiento científico sobre la detección no-verbal del engaño. Papeles del psicólogo, 26(92), 78-91. http://www.redalyc.org/articulo.oa?id=77809203
Masip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.x
Matsumoto, D., & Hwang, H. (2015). Differences in Word Usage by Truth Tellers and Liars in Written Statements and an Investigative Interview After a Mock Crime. Journal of Investigative Psychology and Offender Profiling, 12(2), 199-216. https:// doi.org/10.1002/jip.1423
Mayer, R. (2005). The Cambridge Handbook of Multimedia Learning (2.ª ed.). Cambridge University Press. https://www.cambridge.org/core/books/ cambridge-handbook-of-multimedia-learning/09E09224829AB8D3D327EF8A 0E9B5288
Meijer, E., Bente, G., Ben-Shakhar, G., & Schumacher, A. (2013). Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback. Frontiers in Psychology, 68(4), 1-6. https://doi.org/10.3389/fpsyg.2013.00068
Meijer, E., Verschuere, B., Gamer, M., Merckelbach, H., & Ben Shakhar, G. (2016). Deception detection with behavioral, autonomic, and neural measures: Conceptual and methodological considerations that warrant modesty. Psychophysiology, 53(5), 593-604. https://doi.org/10.1111/psyp.12609
Mora, G. (1998). Valores humanos y actitudes positivas. McGraw-Hill.
Nahari, G. (2018). The applicability of the verifiability approach to the real world. En J. P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 329-349). Elsevier Academic Press. https://doi.org/10.1016/ B978-0-12-812729-2.00014-8
Núñez, M., & Riviére, A. (1994). Engaño, intenciones y creencias en el desarrollo y evolución de una psicología natural. Estudios de Psicología, 15(52), 83-128. https://doi.org/10.1174/02109399460579006
Oberlader, V., Naefgen, C., Koppehele, J., Quinten, L., & Schmidt, A. (2016). Validity of Content-Based Techniques to Distinguish True and Fabricated Statements: A Meta-Analysis. Law and Human Behavior, 40(4), 440-457. http://dx.doi. org/10.1037/lhb0000193
Olekalns, M., & Smith, P. (2009). Mutually dependent: power, trust, affect and the use of deception in negotiation. Journal of Business Ethics, 85, 347-365. https://doi. org/10.1007/s10551-008-9774-4
Pennebaker, J. (2011). The secret life of pronouns what our words say about us. Bloomsbury Press.
Peth, J. (2014). Emotional modulation of memory encoding and retrieval in the concealed Information Test [Tesis de doctorado]. Universitätsklinikum Hamburg- Eppendorf. https://ediss.sub.uni-hamburg.de/handle/ediss/5554?mode=full
Peth, J., Sommer, T., Hebart, M., Vossel, G., Büchel, C., & Gamer, M. (2015). Memory detection using FMRI – Does the encoding context matter? Neuroimage, 113, 164-174. https://doi.org/10.1016/j.neuroimage.2015.03.051
Reynoso, C. (2016). Mentira, deshonestidad y corrupción: del hombre “común” al “altruista por obligación”. Universidad de Buenos Aires. http://www.derecho.uba. ar/academica/posgrados/2017-del-hombre-comun-al-altruista-por-obligacion. pdf
Root, P., Foster, K., & Langleben, D. (2010). Emerging Neurotechnologies for Lie- Detection: Promises and Perils. The American Journal of Bioethics, 10(10), 40-48. https://doi.org/10.1080/15265161.2010.519238
Rosenfeld, J., Ward, A., Thai, M., & Labokovsky, E. (2015). Superiority of Pictorial Versus Verbal Presentation and Initial Exposure in the P300-Based, Complex Trial Protocol for Concealed Memory Detection. Applied Psychophysiology Biofeedback, 40(2), 61-73. https://pubmed.ncbi.nlm.nih.gov/25772317/
Sai, L., Zhou, X., Ding, X., Fu, G., & Sang, B. (2014). Detecting Concealed Information Using Functional Near-Infrared Spectroscopy. Brain Topography, 27, 652-662. https://doi.org/10.1007/s10548-014-0352-z
Schwedes, C., & Wentura, D. (2012). The revealing glance: Eye gaze behavior to concealed information. Memory Cognition, 40, 642-651. https://doi.org/10.3758/ s13421-011-0173-1
Sip, K., Carmel, D., Marchant, J., Li, J., Petrovic, P., Roestorpff, A., McGregor, W. B., & Frith, C. (2013). When Pinocchio’s nose does not grow: belief regarding lie-detectability modulates production of deception. Frontiers in Human Neuroscience, 7, 1-11. https://psycnet.apa.org/record/2013-08014-001
Su, L., & Levine, M. (2016). Does “lie to me” lie to you? An evaluation of facial clues to high-stakes deception. Computer Vision and Image Understanding, 147, 52-68. https://doi.org/10.1016/j.cviu.2016.01.009
Ten Brinke, L., & Khambatta, P. (2015). Physically Scarce (vs. Enriched) Environments Decrease the Ability to Tell Lies Successfully. Journal of Experimental Psychology, 114(5), 982-992. https://doi.org/10.1037/xge0000103
Ten Brinke, L., & Porter, S. (2012). Cry Me a River: Identifying the Behavioral Consequences of Extremely High-Stakes Interpersonal Deception. Law and Human Behavior, 36(6), 469-477. https://doi.org/10.1037/h0093929
Undeutsch, U. (1989). The development of statement reality analysis. En Yuille, J. C. (Ed.), Credibility Assessment (pp. 101-119). Springer. https://doi. org/10.1007/978-94-015-7856-1_6
Urra, J. (2002). Tratado de psicología forense. Siglo XXI.
Valdez, D. (2001). Teoría de la mente y espectro autista. En D. Valdez (Coord.), Autismo: enfoques actuales para padres y profesionales de la salud y la educación. Fundec. http://espectroautista.info/tc_tmyea.html
Valverde, M., Ruiz, J., & Llor, B. (2013). Valoración de la credibilidad de testimonio: Aplicación del modelo Reality Monitoring. Revista Internacional de Psicología, 12(2), 1-30. http://www.revistapsicologia.org/index.php/revista/article/view/68
Vicianova, M. (2015). Historical techniques of lie detection. Europe Journal of Psychology, 11(3), 523-534. https://www.ncbi.nlm.nih.gov/pmc/articles/ PMC4873061/
Villar, G., Arciuli, J., & Patterson, H. (2013). Remorse in oral and handwritten false confessions. Legal and Criminological Psychology, 19(2), 255-269. https://doi. org/10.1111/lcrp.12012
Vrij, A., & Fisher, R. (2016). Which Lie Detection Tools are Ready for Use in the Criminal Justice System? Journal of Applied Research in Memory and Cognition, 5(3), 302- 307. http://www.sciencedirect.com/science/article/pii/S2211368116300420
Vrij, A., & Ganis, G. (2014). Theories in deception and lie detection. En D. C. Raskin, C. R. Honts & J. C. Kircher, Credibility assessment: Scientific research and applications (pp. 301-374). Academic Press. https://doi.org/10.1016/ B978-0-12-394433-7.00007-5
Vrij, A., & Granhag, P. (2012). Eliciting cues to deception and truth: What matters are the questions asked. Journal of Applied Research in Memory and Cognition, 1(2), 110-117. https://doi.org/10.1016/j.jarmac.2012.02.004
Vrij, A., Granhag, A., & Porter, S. (2010b). Pitfalls and Opportunities in Nonverbal and Verbal Lie Detection. Association for Psychological Science, 11(3), 89-121. https:// journals.sagepub.com/doi/pdf/10.1177/1529100610390861
Vrij, A., Granhag, A., Mann, S., & Leal, S. (2010a). Outsmarting the Liars: Toward a Cognitive Lie Detection Approach. Association for Psychological Science, 20(1), 1-5. https://doi.org/10.1177/0963721410391245
Walczyk, J., Harris, L., & Mulay, D. (2014). A social-cognitive framework for understanding serious lies: Activation-decision-construction-action theory. New Ideas in Psychology, 34, 22-36. https://www.sciencedirect.com/science/ article/pii/S0732118X14000142
Walczyk, J., Roper, K., Seemann, E., & Humphrey, A. (2003). Cognitive mechanisms underlying lying to questions: response time as a cue to deception. Cognitive Applied Psychology, 17(7), 755-774. https://onlinelibrary.wiley.com/doi/ abs/10.1002/acp.914
Wang, H., Chang, W., & Zhang, C. (2016). Functional brain network and multichannel analysis for the P300-based brain computer interface system of lying detection. Expert systems with applications, 53, 117-128. https://doi.org/10.1016/j. eswa.2016.01.024
Zarate, I. (2003). Valores, civismo familia y sociedad. Rezza.
Zuckerman, M., Depaulo, B., & Rosenthal, R. (1981). Verbal and nonverbal communication of deception. En Advances in Experimental Social Psychology (14.ª ed., pp. 1-59). Academic Press.
Zvi, L., Nachson, I., & Elaad, E. (2012). Effects of coping and cooperative instructions on guilty and informed innocents’ physiological responses to concealed information. International Journal of Psychophysiology, 84(2), 140-148. https:// doi.org/10.1016/j.ijpsycho.2012.01.022
Abe, N., Okuda, J., Suzuki, M., Sasaki, H., Matsuda, T., Mori, E., Tsukada, M., & Fuji, T. (2008). Neural Correlates of True Memory, False Memory, and Deception. Cerebral Cortex, 18(12), 2811-2819. https://doi.org/10.1093/cercor/bhn037
Andreassi, J. (2010). Psychophysiology. Human Behavior and Physiological Response (5.ª ed.). Psychology Press. https://www.taylorfrancis.com/books/9780203880340
Barrios, B. (2005). El testimonio penal. Editorial Jurídica Ancón. https:// borisbarriosgonzalez.files.wordpress.com/2011/08/el-testimonio-penal-borisbarrios- gonzalez.pdf
Ben-Shakhar, G., & Elaad, E. (2002). Effects of questions repetition and variation on the efficiency of the guilty knowledge test: A reexamination. Journal of Applied Psychology, 87(5), 972-977. https://pubmed.ncbi.nlm.nih.gov/12395821/
Ben-Shakhar, G., Gronau, N., & Elaad, E. (1999). Leakage of relevant information to innocent examinees in the GKT: An attempt to reduce false-positive outcomes by introducing target stimuli. Journal of Applied Psychology, 84(5), 651-660. https://psycnet.apa.org/record/1999-01454-001
Borza, D., Itu, R., & Danescu, R. (2018). In the Eye of the Deceiver: Analyzing Eye Movements as a Cue to Deception. Journal of Imaging, 4(120), 1-120. https://doi. org/10.3390/jimaging4100120
Bowman, H., Fileti, M., Janssen, D., Su, L., Alsufyani, A., & Wyble, B. (2013). Subliminal Salience Search Illustrated: EEG Identity and Deception Detection on the Fringe of Awareness. Plos One, 8(1), e54258. https://doi.org/10.1371/ journal.pone.0054258
Bowman, H., Filetti, M., Alsufyani, A., Janssen, D., & Su, L. (2014). Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. Plos One, 9(3), e90595. https://doi.org/10.1371/journal.pone.0090595
Bradley, M., Maclaren, V., & Carle, S. (1996). Deception and no deception in guilty knowledge and guilty actions polygraph tests. Journal of Applied Psychology, 81(2), 153-160. https://psycnet.apa.org/record/1996-00291-004
Breska, A., Zaindenberg., D., Gronau, N., & Ben-Shakhar, G. (2014). Psychophysiological Detection of Concealed Information Shared by Groups: An Empirical Study of the Searching CIT. Journal of Experimental Psychology: Applied, 20(2), 136-146. https://doi.org/10.1037/xap0000015
Camargo, A., Urrea, C., & Monguí, J. (2016). Medición de Patrones de Actividad Cerebral Registrados con el Equipo de EEG Emotiv-Epoc, como Indicador de Engaño en Estudiantes Universitarios Fundación Universitaria Los Libertadores. http://hdl.handle.net/11371/797
Carmel, D., Dayan, E., Naveh, A., Raveh, O., & Ben-Shakhar, G. (2003). Estimating the validity of the Guilty Knowledge Test from simulated experiments: The external validity of mock crime studies. Journal of Experimental Psychology Applied, 9(4), 261-269. https://pubmed.ncbi.nlm.nih.gov/14664677/
Carvajal-Builes, J., Gómez-Durán, E., & Barreto, I. (2021). Comportamiento visual y engaño: Una revisión sistematizada. Anuario de psicología, 51(2), 120-129. https://revistes.ub.edu/index.php/Anuario-psicologia/article/view/30221
Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2017). Debate sobre la detección del engaño por medio de mediciones neurofisiológicas. En C. Pavajaeu & C. Gutiérrez de Piñeres (Eds.), Neurociencias y derecho: reflexiones sobre la cognición social, el libre albedrío, la dignidad humana, la culpabilidad y la prueba novel (pp. 269-278). Universidad Externado de Colombia.
Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2018). Instrumentos, medidas, procedimientos y procedencia de los estudios producidos para la detección del engaño a través de medidas psicofisiológicas. Revista Criminalidad, 60(2), 75-88. http://www.scielo.org.co/pdf/crim/v60n2/1794-3108-crim-60-02-00075.pdf
Chen, Z., Xue, L., Yiang, C., Wang, L., Mei, W., Zhang, Q., & Zhao, H. (2015). Specific marker of feigned memory impairment: The activation of left superior frontal gyrus. Journal of Forensic and Legal Medicine, 36, 164-171. https://doi. org/10.1016/j.jflm.2015.09.008
Choi, H., Kim, S., Lee, S., & Lee, J. (2016). A Possibility of Pupil Diameter as Reliable Index for Lie Detection. International Journal of Psychophysiology, 108, 150. https://doi.org/10.1016/j.ijpsycho.2016.07.43
Cook, A., Hacker, D., Webb, A., Osher, D., & Kristjansson, S. (2012). Lyin eyes: Ocularmotor measures of reading reveal deception. Journal of Experimental Psychology, 18(3), 301-313. https://psycnet.apa.org/record/2012-10769-001
Crider, A. (2008). Personality and Electrodermal Response Lability: An interpretation. Applied Psychophysiology Biofeedback, 33, 141-148. https://doi.org/10.1007/ s10484-008-9057-y
Csaba, K. (2013). The influence of stimulation/accommodation tests for the polygraph examination economy. Forensic Science, 14(4), 1404-1410. http://bit.ly/3yN8iW1
Dietrich, A., Hu, X., & Rosenfeld, J. (2014). The Effects of Sweep Numbers Per Average and Protocol Type on the Accuracy of the P300-Based Concealed Information Test. Applied Psychophysiology Biofeedback, 39, 67-73. https://doi.org/10.1007/ s10484-014-9244-y
Ding, X., Du, X., Lei, D., Hu, C., Fu, G., & Chen, G. (2012). The Neural Correlates of Identity Faking and Concealment: An fMRI Study. Plos One, 7(11), e48639. https://doi.org/10.1371/journal.pone.0048639
Ding, X., Gao, X., Fu, G., & Lee, K. (2013). Neural correlates of spontaneous deception: A functional near- infrared spectroscopy (fNIRS) study. Neuropsychologia, 51(4), 704-712. https://doi.org/10.1016/j.neuropsychologia.2012.12.018
Ding, X., Sai, L., Fu, G., Liu, J., & Lee, K. (2014). Neural correlates of second-order verbal deception: A functional near-infrared spectroscopy (FNIRS) study. Neuroimage, 87, 505-514. https://doi.org/10.1016/j.neuroimage.2013.10.023
Dong, G., Hu, Y., Lu, Q., & Wu, H. (2010). The presentation order of cue and target matters in deception study. Behavioral and Brain Functions, 6(1), 63. https://doi. org/10.1186/1744-9081-6-63
Drou, M., & Egan, V. (2018). “I am 13. I am online. U believe me?”: Implications for undercover internet stings. Psychology, Public Policy and Law, 24(1), 80-92. https://doi.org/10.1037/law0000149
Ebrahimzadeh, E., Alavi, S., Bijar, A., & Pakkeshal, A. (2013). A novel approach for detection of deception using Smoothed Pseudo Wigner-Ville Distribution (SPWVD). Journal Biomedical Science and Engineering, 6(1), 8-18. https://doi. org/10.4236/jbise.2013.61002
Elaad, E. (2011). Effects of Incomplete Information on the Detection of Concealed Crime Details. Applied Psychophysiology Biofeedback, 36, 159-171. https://doi. org/10.1007/s10484-011-9153-2
Elaad, E., Ginton, A., & Jungman, N. (1992). Detection measures in real life criminal guilty knowledge tests. Journal of Applied Psychology, 77(5), 757-767. https:// psycnet.apa.org/record/1993-07862-001
Elaad, E., & Sommerfeld, E. (2016). Effects of Guilt, Disbelief, and Assessed Lie-Truth Telling Abilities on Physiological Responses in the Guilty Action Test. Psychology, 7(8), 1075-1091. https://doi.org/10.4236/psych.2016.78108
Ellmore, T., Mackin, B., & Ng, K. (2018). Saccades and Handedness Interact to Affect Scene Memory. PeerJ, 6, e5969. http://dx.doi.org/10.7717/peerj.5969
Farahani, E., & Moradi, M. (2013). A Concealed Information Test with Combination of ERP Recording and Autonomic Measurements. Neurophysiology, 45(3), 223- 233. https://link.springer.com/article/10.1007/s11062-013-9360-y
Farwell, L. (2012). Brain fingerprinting: A comprehensive tutorial review of detection of concealed information with event-related brain potentials. Cognitive Neurodynamics, 6, 115-154. https://doi.org/10.1007/s11571-012-9192-2
Farwell, L., & Donchin, E. (1991). The truth will out: Interrogative polygraphy (“Lie detection”) with event-related brain potentials. Psychophysiology, 28(5), 531-547. https://doi.org/10.1111/j.1469-8986.1991.tb01990.x
Farwell, L., & Smith, S. (2001). Using brain MERMER testing to detect concealed knowledge despite efforts to conceal. Journal of Forensic Sciences, 46(1), 1135- 1143. https://www.ncbi.nlm.nih.gov/pubmed/11210899
Ferro, J. (2012). Perfiles criminales interfectos. Editorial Formación Alcalá.
Ford, E. (2006). Lie detection: Historical, neuropsychiatric and legal dimensions. International Journal of Law and Psychiatry, 29(3), 159-177. http://dx.doi. org/10.1016/j.ijlp.2005.07.001
Fu, H., Qiu, W., Ma, H., & Ma, Q. (2017). Neurocognitive mechanisms underlying deceptive hazard evaluation: An event-related potential investigation. Plos One, 12(8), e0182892. https://doi.org/10.1371/journal.pone.0182892
Gamer, M., Klimecki, O., Bauermann, T., Stoeter, P., & Vossel, G. (2012). fMRIactivation patterns in the detection of concealed information rely on memoryrelated effects. Scan, 7(5), 506-515. https://doi.org/10.1093/scan/nsp005
Gamer, M., & Perstzov, Y. (2018). Detecting conceal knowledge from ocular response. En P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 169-186). Academic press.
Ganis, G., Rosenfeld, J., Meixner, J., Kievit, R., & Schendan, S. (2011). Lying in the scanner: Covert countermeasures disrupt deception detection by functional magnetic resonance imaging. Neuroimage, 55(1), 312-319. https://doi. org/10.1016/j.neuroimage.2010.11.025
Gao, J., Lu, L., Yang, Y., Yu, G., Na, L., & Rao, N. (2012). A Novel Concealed Information Test Method Based on Independent Component Analysis and Support Vector Machine. Clinical EEG and Neuroscience, 43(1), 54-63. https:// doi.org/10.1177/1550059411428715
Gao, J., Qiu, J., Zhang, W., & Yang, Y. (2014). Feature, optimize and classification of EEG signals: Application to lie detection using KPCA and ELM. Sensors and Transducers, 169(4), 235-240. https://www.sensorsportal.com/HTML/DIGEST/ april_2014/Vol_169/P_RP_0109.pdf
Gao, J., Wang, Z., Yang, Y., Zhang, W., Tao, C., Guan, J., & Rao, N. (2013). A Novel Approach for Lie Detection Based on F-Score and Extreme Learning Machine. Plos One, 8(6), e64704. https://doi.org/10.1371/journal.pone.0064704
Gao, J., Yan, X., Sun, J., & Zheng, C. (2011). Denoised P300 and machine learningbased concealed information test method. Computer Methods and Programs in Biomedicine, 104, 410-417. https://doi.org/10.1016/j.cmpb.2010.10.002
Glannon, W. (2014). The limitation and potential of neuroimaging in the criminal law. Journal of Ethics, 18(2), 153-170. https://doi.org/10.1007/s10892-014-9169-y
Gutiérrez de Piñeres, C., & Carvajal-Builes, J. (2021). Evaluación de la calidad metodológica de estudios en psicología del testimonio: psicofisiología del engaño. En L. Jiménez-Ardila & E. López-Cantero (Eds.), Psicología jurídica aplicada (pp. 97-110). Editorial Universidad Católica de Colombia. https://www. doi.org/10.14718/9789585133716.2021
Hadar, A., Makris, S., & Yarrow, K. (2012). The truth-telling motor cortex: Response competition in M1 discloses deceptive behaviour. Biological Psychology, 89(2), 495-502. https://doi.org/10.1016/j.biopsycho.2011.12.019
Haynes, J. (2008). Detecting deception from neuroimaging signals - a datadriven perspective. Trends in Cognitive Sciences, 12(4), 127-128. https://doi. org/10.1016/j.tics.2008.01.003
Honts, C. (2014). Countermeasures and credibility assessment. En D. C. Raskin, C. R. Honts, & J. C. Kircher (Eds.), Credibility Credibility assessment: Scientific research and applications (pp. 131-158). Elsevier Academic press.
Honts, C., & Reavy, R. (2015). The comparison question polygraph test: A contrast of methods and scoring. Physiology and Behavior, 143, 15-26. https://doi. org/10.1016/j.physbeh.2015.02.028
Honts, C., Rodes, R., & Raskin, R. (1985). Effects of physical countermeasures on the physiological detection of deception. Journal of Applied Psychology, 70(1), 177- 187. https://pubmed.ncbi.nlm.nih.gov/3972762/
Hu, X., Pornpattananangkul, N., & Nusslock, R. (2015). Executive control- and rewardrelated neural processes associated with the opportunity to engage in voluntary dishonest moral decision making. Cognitive Affective, Behavior Neuroscience, 15, 475-491. https://doi.org/10.3758/s13415-015-0336-9
Hu, X., Pornpattananangkul, N., & Nusslock, R. (2015). Executive control- and rewardrelated neural processes associated with the opportunity to engage in voluntary dishonest moral decision making. Cognitive Affective, Behavior Neuroscience, 15, 475-491. https://doi.org/10.3758/s13415-015-0336-9
Isaychev, S., Edrenkin, I., Chernorizov, A., & Isaychev, E. (2011). Event related potentials in deception detection. Psychology in Russia, 4, 438-447. http:// psychologyinrussia.com/volumes/index.php?article=1459
Ito, A., Abe, N., Fujii, T., Hayashi, A., Ueno, A., Mugikura, S., Takahashi, S., & Mori, E. (2012). The contribution of the dorsolateral prefrontal cortex to the preparation for deception and truth-telling. Brain Research, 1464, 43-52. https://doi. org/10.1016/j.brainres.2012.05.004
Jung, E., Kang, K., & Kim, Y. (2013). Frontoparietal activity during deceptive responses in the P300-based guilty knowledge test: An sLORETA study. Neuroimage, 78, 305-315. https://doi.org/10.1016/j.neuroimage.2013.04.027
Karton, I., Palu, A., Jõks, K., & Bachmann, T. (2014). Deception rate in a “lying game”: Different effects of excitatory repetitive transcranial magnetic stimulation of right and left dorsolateral prefrontal cortex not found with inhibitory stimulation. Neuroscience Letters, 583, 21-25. https://doi.org/10.1016/j.neulet.2014.09.020
Kim, K., Kim, J., & Lee, J. (2016). Guilt, lying, and attentional avoidance of concealed information. Social Behavior and Personality, 44(9), 1267-1276. https://doi. org/10.2224/sbp.2016.44.9.1467
Kircher, J. (2018). Ocular motor deception test. En P. Rosenfeld (Ed.), Detecting concealed information and deception (pp. 187-212). Academic press. https://doi. org/10.1016/C2016-0-03911-6
Kircher, J., & Raskin, D. (1988). Human versus computerized evaluations of polygraph data in a laboratory setting. Journal of Applied Psychology, 73(2), 291-302. https:// psycnet.apa.org/record/1988-25140-001
Kleinberg, B., & Verschuere, B. (2016). The role of motivation to avoid detection in reaction time-based concealed information detection. Journal of Applied Research in Memory and Cognition, 5(1), 43-51. https://doi.org/10.1016/j. jarmac.2015.11.004
Kosheleva, E., Spadoni, A., Strigo, I., Buchsbaum, M., & Simmons, A. (2016). Faking bad: The neural correlates of feigning memory impairment. Neuropsychology, 30(3), 377-384. https://pubmed.ncbi.nlm.nih.gov/26765340/
Kovalev, A., Luniakova, E., & Menshikova, G. (2016). Using eye movement characteristics for detecting deception. International Journal of Psychophysiology, 108, 161. https://doi.org/10.1016/j.ijpsycho.2016.07.463
Kubo, K., & Nittono, H. (2009). The Role of Intention to Conceal in the P300-based Concealed Information Test. Applied Psychophysiology Biofeedback, 34, 227-235. https://doi.org/10.1007/s10484-009-9089-y
Labkovsky, E., & Rosenfeld, J. (2012). The P300-Based, Complex Trial Protocol for Concealed Information Detection Resists Any Number of Sequential Countermeasures Against Up to Five Irrelevant Stimuli. Applied Psychophysiology Biofeedback, 37, 1-10. https://doi.org/10.1007/s10484-011-9171-0
Leal, S., & Vrij, A. (2008). Blinking During and After Lying. Journal Nonverbal Behavior, 32, 187-194. https://doi.org/10.1007/s10919-008-0051-0
Liang, C., Xu, Z., Mei, W., Wang, L., Xue, L., Lu, D., & Zhao, H. (2012). Neural correlates of feigned memory impairment are distinguishable from answering randomly and answering incorrectly: An fMRI and behavioral study. Brain and Cognition, 79(1), 70-77. https://doi.org/10.1016/j.bandc.2012.01.009
Lisofsky, N., Kazzer, P., Heekeren, H., & Prehn, K. (2014). Investigating socio-cognitive processes in deception: A quantitative meta-analysis of neuroimaging studies. Neuropsychologia, 61, 113-122. https://doi.org/10.1016/j. neuropsychologia.2014.06.001
Liu, Y., Wang, C., Jiang, H., He, H., & Chen, F. (2017). Lie construction affects information storage under high memory load conditions. Plos One, 12(7), e0181007. https://doi.org/10.1371/journal.pone.0181007
Luna, G. (2014). Reducción de ruido en señales de electroencefalograma: una aplicación para mejorar las imágenes de mapeo cerebral. Revista Electrónica de Biomedicina, 3, 18-25. https://biomed.uninet.edu/2014/n3/luna.html
Lykken, D. (1988). Detection of Guilty Knowledge: A Comment on Foreman and McCauley. Journal of Applied Psychology, 73(2), 303-304. https://psycnet.apa. org/record/1988-25141-001
Mahoney, E., Kapur, N., Osmon, D., & Hannula, D. (2017). Eye Tracking as a Tool for the Detection of Simulated Memory Impairment. Journal of Applied Research in Memory and Cognition, 7(3), 441-453. https://doi.org/10.1016/j. jarmac.2018.05.004
Marchak, F. (2013). Detecting false intent using eye blink measures. Frontiers in Psychology, 736(4), 1-9. https://doi.org/10.3389/fpsyg.2013.00736
Matsuda, I., Nittono, H., & Allen, J. (2013). Detection of concealed information by P3 and frontal EEG asymmetry. Neuroscience Letters, 537, 55-59. https://doi. org/10.1016/j.neulet.2013.01.029
Matsumoto, D., Hwang, H., Skinner, L., & Frank, M. (2011). Evaluating truthfulness and detecting. FBI Law Enforcement Bulletin, 80(6), 61-68. https://leb.fbi.gov/ articles/featured-articles/evaluating-truthfulness-and-detecting-deception
Medina, C. (2004). Epilepsia: aspectos clínicos y psicosociales. Editorial Médica Panamericana.
Meijer, E., Smulders, F., & Wolf, A. (2009). The Contribution of Mere Recognition to the P300 Effect in a Concealed Information Test. Applied Psychophysiology Biofeedback, 34, 221-226. https://doi.org/10.1007/s10484-009-9099-9
Meixner, J., Haynes, A., Winograd, M., Brown, J., & Rosenfeld, J. (2009). Assigned Versus Random, Countermeasure-Like Responses in the P300 Based Complex Trial Protocol for Detection of Deception: Task Demand Effects. Applied Psychophysiology Biofeedback, 34, 209-220. https://doi.org/10.1007/ s10484-009-9091-4
Meixner, J., Labkovsky, E., Rosenfeld, J., Winograd, M., Sokolovsky, A., Weishaar, J., & Ullmann, T. (2013). P900: A Putative Novel ERP Component that Indexes Countermeasure Use in the P300-Based Concealed Information Test. Applied Psychophysiology Biofeedback, 38, 121-132. https://doi.org/10.1007/ s10484-013-9216-7
Meixner, J., & Rosenfeld, J. (2011). A mock terrorism application of the P300- basedconcealed information test. Psychophysiology, 48(2), 149-154. https://doi. org/10.1111/j.1469-8986.2010.01050.x
Mertens, R., & Allen, J. (2008). The role of psychophysiology in forensic assessments: Deception detection, ERPs, and virtual reality mock crime scenarios. Psychophysiology, 45(2), 286-298. https://doi. org/10.1111/j.1469-8986.2007.00615.x
Pasca, V. (2011). Study regarding psychophysiological reactivity values depending on subject’s gender in polygraph testing. Social and Behavioral Sciences, 33, 821-825. https://doi.org/10.1016/j.sbspro.2012.01.236
Pavlov, Y., & Zlokazov, K. (2018). Deception detection by means of eye-tracking in the concealed information test. International Journal of Psychophysiology, 131(supl.), 169-184. https://doi.org/10.1016/j.ijpsycho.2018.07.425
Pennebaker, J. (2011). The secret life of pronouns what our words say about us. Bloomsbury Press.
Peth, J. (2014). Emotional modulation of memory encoding and retrieval in the concealed Information Test [Tesis de doctorado]. Universitätsklinikum Hamburg- Eppendorf. https://ediss.sub.uni-hamburg.de/handle/ediss/5554?mode=full
Peth, J., Sommer, T., Hebart, M., Vossel, G., Büchel, C., & Gamer, M. (2015). Memory detection using fmri -Does the encoding context matter. Neuroimage, 113, 164- 174. https://doi.org/10.1016/j.neuroimage.2015.03.051
Piliavin, I., Piliavin, J., & Rodin, J. (1975). Costs, diffusion, and the stigmatized victim. Journal of Personality and Social Psychology, 32(3), 429-438. https://psycnet.apa. org/record/1975-31714-001
Proudfoot, J. (2014). Identifying deception using novel technology-based approaches to uncover concealed information [Tesis de doctorado]. Universidad de Arizona. https://www.proquest.com/openview/60c7aeb1839900e0a57fa987acb0f034/1? pq-origsite=gscholar&cbl=18750
Proudfoot, J., Jenkins, M., Burgoon, J., & Nunamaker, J. (2015). Deception is in the Eye of the Communicator: Investigating pupil diameter variations in automated deception detection interviews [Conferencia]. 2015 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 97-102), Baltimore, EE. UU. https://doi.org/10.1109/ISI.2015.7165946
Proudfoot, J., Jenkins, M., Burgoon, J., & Nunamaker, J. (2016). More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection interactions. Journal of Management Information Systems, 33(2), 332-360. https://doi.org/10.1080/07421222.2016.1205929
Rosenfeld, J., Ozsan, I., & Ward, A. (2017). P300 amplitude at Pz and N200/N300 latency at F3 differ between participants simulating suspect versus witness roles in a mock crime. Psychophysiology, 54(4), 640-648. https://doi.org/10.1111/ psyp.12823
Rosenfeld, J., Ward, A., Thai, M., & Labokovsky, E. (2015). Superiority of Pictorial Versus Verbal Presentation and Initial Exposure in the P300-Based, Complex Trial Protocol for Concealed Memory Detection. Applied Psychophysiology Biofeedback, 40(2), 61-73. https://pubmed.ncbi.nlm.nih.gov/25772317/
Ryberg, J. (2014). When Should Neuroimaging Be Applied in the Criminal Court? On Ideal Comparison and the Shortcomings of Retributivism. Journal of Ethics, 18, 81-99. https://doi.org/10.1007/s10892-014-9166-1
Sai, L., Zhou, X., Ding, X., Fu, G., & Sang, B. (2014). Detecting Concealed Information Using Functional Near-Infrared Spectroscopy. Brain Topography, 27, 652-662. https://doi.org/10.1007/s10548-014-0352-z
Schofield, C., Johnson, A., Inhonff, A., & Coles, M. (2012). Social anxiety and difficulty disengaging threat: Evidence from eye-tracking. Cognition and Emotion, 26(2), 300-311. https://doi.org/10.1080/02699931.2011.602050
Schwedes, C., & Wentura, D. (2012). The revealing glance: Eye gaze behavior to concealed information. Memory Cognition, 40, 642-651. https://doi.org/10.3758/ s13421-011-0173-1
Sip, K., Carmel, D., Marchant, J., Li, J., Petrovic, P., Roestorpff, A., McGregor, W., & Frith, C. (2013). When Pinocchio’s nose does not grow: belief regarding lie-detectability modulates production of deception. Frontiers in Human Neuroscience, 7, 1-11. https://doi.org/10.3389/fnhum.2013.00016
Sokolovsky, A., Rothenberg, J., Labkovsky, E., Meixner, J., & Rosenfeld, P. (2011). A novel countermeasure against the reaction time index of countermeasure use in the P300-based complex trial protocol for detection of concealed information. International Journal of Psychophysiology, 81(1), 60-63. https://doi.org/10.1016/j. ijpsycho.2011.03.008
Sowdwen, S., Wright, G., Banissy, M., Catmur, C., & Bird, G. (2015). Transcranial Current Stimulation of the Temporoparietal Junction Improves Lie Detection. Current Biology, 25(18), 2447-2451. https://doi.org/10.1016/j.cub.2015.08.014
Staunton, C., & Hammond, S. (2011). An Investigation of the Guilty Knowledge Test Polygraph Examination. Journal of Criminal Psychology, 1(1), 1-14. http://dx.doi. org/10.1108/20093829201100001
Ströfer, S., J, N., Ufkes, E., & Giebels, E. (2015). Deceptive Intentions: Can Cues to Deception Be Measured before a Lie Is Even Stated? Plos One, 10(5), e0125237. https://doi.org/10.1371/journal.pone.0125237
Sun, D., Chan, C., & Lee, T. (2012). Identification and Classification of Facial Familiarity in Directed Lying: An ERP Study. Plos One, 7(2), e31250. https://doi. org/10.1371/journal.pone.0031250
Teufel, C., Alexis, D., Todd, H., Lawrence, A., Clayton, N., & Davis, G. (2009). Social Cognition Modulates the Sensory Coding of Observed Gaze Direction. Current Biology, 19(15), 1274-1277. https://doi.org/10.1016/j.cub.2009.05.069
Tomer, E., Lupu, T., Golan, L., Wagner, M., & Braw, Y. (2018). Eye tracking as a mean to detect feigned cognitive impairment in the word memory test. Applied Neuropsychology: Adult, 27(1), 1-13. https://doi.org/10.1080/23279095.2018.14 80483
Twyman, N., Lowry, P., Burgoon, J., & Nunamaker, J. (2014). Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals. Journal of Management Information Systems, 31(3), 106-137. https://doi.org/10.1080/07421222.2014.995535
Urra, J. (2002). Tratado de psicología forense. Editorial Siglo XXI.
Vartanian, O., Kwantes, P., & Mandel, D. (2012). Lying in the scanner: Localized inhibition predicts lying skill. Neuroscience Letters, 529(1), 18-22. https://doi. org/10.1016/j.neulet.2012.09.019
Vicianova, M. (2015). Historical techniques of lie detection. Europe Journal of Psychology, 11(3), 523-534. https://www.ncbi.nlm.nih.gov/pmc/articles/ PMC4873061/
Visu, G., Bus, I., & Miclea, I. (2011). Detecting concealed information from a mock crime scenario by using psychophysiological and RT-based measures. Cognition, Brain, Behavior. An Interdisciplinary Journal, 15(1), 19-37. https://psycnet.apa. org/record/2011-07359-002
Vrij, A. (2008). Detecting lies and deceit: Pitfalls and opportunities. Wiley-Interscience.
Vrij, A., Oliveira, J., Hammond, A., & Erhlichman, H. (2015). Saccadic eye movement rate as cue to deceit. Journal of Applied Research of Memory and Cognition, 4(1), 15- 19. https://www.sciencedirect.com/science/article/abs/pii/S221136811400062X
Walczyk, J., Griffith, D., Yates, R., Visconte, S., & Simoneaux, B. (2013). Eye movements and other cognitive cues to rehearsed and unrehearsed deception when interrogated about a mock crime. Applied Psychology in Criminal Justice, 9(1), 1-23. https://psycnet.apa.org/record/2013-27516-001
Wang, H., Chang, W., & Zhang, C. (2016). Functional brain network and multichannel analysis for the P300-based brain computer interface system of lying detection. Expert systems with applications, 53, 117-128. https://doi.org/10.1016/j. eswa.2016.01.024
Wang, Y., Chun, W., Siong, K., Yu, K., Wu, T., & Li, X. (2015). An Electroencephalography Network and Connectivity Analysis for Deception in Instructed Lying Tasks. Plos One, 10(2), e0116522. https://doi.org/10.1371/journal.pone.0116522
Warmelin, L., Vrij, A., Mann, S., Leal, S., Forrester, D., & Fisher, R. (2011). Thermal Imaging as a Lie Detection Tool at Airports. Law Human Behavior, 35(1), 40-48. https://doi.org/10.1007/s10979-010-9251-3
Zhao, M., Zheng, C., & Zhao, C. (2012). A New Approach for Concealed Information Identification Based on ERP Assessment. Journal of Medical Systems, 36, 2401- 2409. https://doi.org/10.1007/s10916-011-9707-0
Zvi, L., Nachson, I., & Elaad, E. (2012). Effects of coping and cooperative instructions on guilty and informed innocents’ physiological responses to concealed information. International Journal of psychophysiology, 84(2), 140-148. https:// pubmed.ncbi.nlm.nih.gov/22330977/
Ali, M., & Levine, T. (2008). The language of truthful and deceptive denials and confessions. Communication Reports, 21(2), 82-91. https://doi. org/10.1080/08934210802381862
Amado, B., Arce, R., & Fariña, F. (2015). Undeutsch hypothesis and criteria based content analysis: a meta-analytic review. The European Journal of Psychology Applied to Legal Context, 7(1), 3-12. https://doi.org/10.1016/j.ejpal.2014.11.002
Amado, B., Vilariño, M., & Novo, M. (2016). Análisis de contenido en declaraciones de agresores. Una revisión meta-analítica. En A. Pueyo, F. Fariña, M. Novo & D. Seijo (Eds.), Avances en psicología jurídica y forense (pp. 53-61). Sociedad Española de Psicología Jurídica y Forense. http://sepjf.org/wp-content/uploads/2018/12/ Vol.13.Avances_psicologa_jurdica_forense.pdf
Andreú, A. (2000). Las técnicas de análisis de contenido: una revisión actualizada. Fundación Centro Estudios Andaluces, Universidad de Granada, 10(2), 1-34. https://abacoenred.org/wp-content/uploads/2019/02/Las-técnicas-de-análisisde- contenido-una-revisión-actualizada.pdf
Arce, R., & Fariña, F. (2005). Peritación psicológica de la credibilidad del testimonio, la huella psíquica y la simulación: el sistema de evaluación global (SEG). Papeles del psicólogo, 26, 59-77. http://www.papelesdelpsicologo.es/pdf/1247.pdf
Arce, R., & Fariña, F. (2006). Psicología del testimonio y evaluación cognitiva de la veracidad de testimonios y declaraciones. En J. C. Sierra, E. M. Jiménez & G. Buela-Casal (Coords.), Psicología forense: Manual de técnicas y aplicaciones (pp. 563-601). Biblioteca Nueva. https://uforense.org/wp-content/uploads/2020/12/2006- psicologxa-del-testimonio-xarce-y-farixax-2006x-2020-12-22.pdf
Arciuli, J., Mallard, D., & Villar, G. (2010). “Um, I can tell you’re lying”: Linguistic markers of deception versus truth-telling in speech. Applied Psycholinguistics, 31(3), 397-411. https://doi.org/10.1017/S0142716410000044
Ball, L., & Elworthy, J. (2014). Fake or real? The computational detection of online deceptive text. Journal of Marketing Analytics, 2, 187-201. https://doi.org/10.1057/ jma.2014.15
Barreto, I. (2020). Análisis estadísticos de datos textuales. En P. Páramo (Ed.), La investigación en ciencias sociales: La historia del método y su filosofía (pp. 449- 466). Lemoine Editores.
Bermeosolo, J. (2012). Memoria de trabajo y memoria procedimental en las dificultades específicas del aprendizaje y del lenguaje: algunos hallazgos. Revista Chilena de Fonoaudiología, 11, 57-75. https://auroradechile.uchile.cl/index.php/RCDF/ article/view/24516/25890
Braun, M., & van Swol, L. (2016). Justifications offered, questions asked, and linguistic patterns in deceptive and truthful monetary interactions. Group Decision Negotiation, 25, 641-661. https://doi.org/10.1007/s10726-015-9455-5
Braun, M., van Swol, L., & Vang, L. (2015). His lips are moving: Pinocchio effect and other lexical indicators of political deceptions. Discourse Processes, 52(1), 1-20. https://doi.org/10.1080/0163853X.2014.942833
Biber, D. (1988). Variation Across Speech and Writing. Cambridge University Press.
Braun, M., & van Swol, L. (2016). Justifications offered, questions asked, and linguistic patterns in deceptive and truthful monetary interactions. Group Decision Negotiation, 25, 641-661. https://doi.org/10.1007/s10726-015-9455-5
Burns, M., & Muffitt, K. (2014). Automated deception detection of 911 call transcripts. Security Informatics, 3, 8. http://www.security-informatics.com/content/3/1/8
Carvajal-Builes, J. C., Barreto, I., & Gutiérrez de Piñeres, C. (2024). Deception detection based on the linguistic style of honest and dishonest stories. Journal of Forensic Practice, 26(1), 46-59. https://doi.org/10.1108/JFP-07-2023-0035
Chen, C., Churyk, N., & Clinton, D. (2013). Detect fraud before catastrophe. Strategic Finance, 94(9), 33-37. https://sfmagazine.com/wp-content/uploads/ sfarchive/2013/03/Detect-Fraud-Before-Catastrophe.pdf
Chung, C. K., & Pennebaker, J. (2014). Counting little words in big data: The psychology of communities, culture, and history. En J. P. Forgas, O. Vincze & J. László (Eds.), Social cognition and communication (pp. 25-42). Psychology Press. https://psycnet.apa.org/record/2013-28261-002
Churyk, N., Chen, C., & Clinton, D. (2008). Can we detect fraud earlier? Strategic Finance, 90(4), 51-55. https://www.proquest.com/scholarly-journals/ can-we-detect-fraud-earlier/docview/229760202/se-2
Crabb, E. (2014). “Time for some traffics problems”. Enhancing E-discovery and big data processing tools with linguistic methods for deception detection. Journal of Digital Forensics, Security and Law, 9(2), 14. https://doi.org/10.15394/ jdfsl.2014.1179
Craig, R., Mortensen, T., & Iyer, S. (2013). Exploring Top Management Language for Signals of Possible Deception: The Words of Satyam’s Chair Ramalinga Raju. Journal Bus Ethics, 113, 333-347. https://doi.org/10.1007/s10551-012-1307-5
Duran, N., Crossley, S., Hall, C., & McCarthy, P. (2009). Expanding a Catalogue of Deceptive Linguistic Features with NLP Technologies [Conferencia]. Twenty- Second International Florida Artificial Intelligence Research Society Conference. FLAIRS-22.
Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068
Drou, M., & Egan, V. (2018). “I am 13. I am online. U believe me?”: Implications for undercover internet stings. Psychology, Public Policy and Law, 24(1), 80-92. https://doi.org/10.1037/law0000149
Enos, F. (2009). Detecting Deception in Speech [Tesis de doctorado]. Universidad de Columbia. http://www1.cs.columbia.edu/~frank/enos_thesis.pdf
Feng, S. (2014). Learning the Intention embedded in the Natural Language Texts: Focused Studies on Connotation and Deception. Stony Brook University.
Foerster, A., Wirth, R., Kunde, W., & Pfister, R. (2017). The dishonest mind set in sequence. Psychological Research, 81, 878-899. https://doi.org/10.1007/ s00426-016-0780-3
Fornaciari, T., & Poesio, M. (2013). Automatic deception detection in Italian court cases. Artificial Intelligence and Law, 21, 303-340. https://doi.org/10.1007/ s10506-013-9140-4
Fuller, C., Biros, D., Burgoon, J., & Nunamaker, J. (2013). An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception. Group Decision Negotiation, 22, 117-134. https://doi.org/10.1007/s10726-012-9300-z
Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Applications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032
Fuller, C., Biros, D., & Wilson, R. (2009). Decision support for determining veracity via linguistic-based cues. Decision Support Systems, 46(3), 695-703. https://doi. org/10.1016/j.dss.2008.11.001
Fuller, C., Twitchell, D., Biros, D., & Wilson, R. (2015). Real-world deception and the impact of severity. Journal of Computer Information System, 55(2), 59-67. https:// doi.org/10.1080/08874417.2015.11645757
Goel, S., Gangolly, J., Faerman, S., & Uzuner, O. (2010). Can linguistic predictors detect fraudulent financial fillings? Journal of Emerging Technologies in Accounting, 7(1), 25-46. https://doi.org/10.2308/jeta.2010.7.1.25
Hancock, J. (2007). Digital deception: Why, when and how people lie online. En A. Joinson et al. (Eds.), Oxford Handbook of Internet Psychology (pp. 289-302). Oxford Library of Psychology. https://doi.org/10.1093/oxfordhb/9780199561803.013.0019
Hernández, A., & Calvo, H. (2017). Deceptive text detection using continuous semantic space models. Intelligent Data Analysis, 21(3), 679-695. https://doi.org/10.3233/ IDA-170882
Jennings, M. (2015). Psychophysiological Significance of Successful Deception in Comparison with Unsuccessful Deception. Widener University. https://ezborrow. reshare.indexdata.com/Record/2a2a31a1-1f21-464d-8d87-cae0e6c84822
Jupe, L., Vrij, A., Leal, S., & Nahari, G. (2018). Are you for real? Exploring language use and unexpected process questions within the detection of identity deception. Applied Cognitive Psychology, 1(13), 622-634. https://doi.org/10.1002/acp.3446
Hauch, V., Blandón, J., Masip, J., & Sporer, S. (2015). Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Personality and Social Psychology Review, 19(4), 307-342. https://doi.org/10.1177/1088868314556539
Kahn, A. (2015). New Methods for Detecting Deceptive Product Reviews [Tesis de maestría]. Universidad de Washington. https://digital.lib.washington.edu/ researchworks/handle/1773/33997
Kahneman, D. (2011). Thinking, fast and slow. Macmillan.
Kleinberg, B., Mozes, M., Arntz, A., & Verschuere, B. (2017). Using Named Entities for Computer- Automated Verbal Deception Detection. Journal of Forensic Sciences, 63(3), 714-723. https://doi.org/10.1111/1556-4029.13645
Köhnken, G., Manzanero, A., & Scott, M. (2015). Análisis de la Validez de las Declaraciones: mitos y limitaciones. Anuario de Psicología Jurídica, 25(1), 13-19. https://www.redalyc.org/pdf/3150/315040291003.pdf
Lamb, C., & Skillincorn, D. (2013). Detecting deception in interrogation settings [Conferencia]. 2013 IEEE International Conference on Intelligence and Security Informatics (pp. 160-162), Seattle, EE. UU. https://ieeexplore.ieee.org/ document/6578809
Lee, C. (2017). Multilingualism Online. Routledge. https://doi.org/10.4324/ 9781315707211
Lee, C., Welker, R., & Odom, M. (2009). Features of computer-mediated, text-based messages that support automatable, linguistic-based indicator for deception detection. Journal of Information Systems, 23(1), 5-24. https://doi.org/10.2308/ jis.2009.23.1.24
Leue, A., & Beauducel, A. (2015). Effects of injustice sensitivity and sex on the P3 amplitude during deception. Biological Psychology, 109, 29-36. https://www.ncbi. nlm.nih.gov/pubmed/25910957
Li, D. (2013). Deception Detection using Human Reasoning [Conferencia]. 2011 IEEE International Conference on Systems, Man, and Cybernetics (pp. 165-172), Anchorage, AK, EE. UU. https://ieeexplore.ieee.org/document/6083660
Ludwig, S., van Laer, T., de Ruyter, K., & Friedman, M. (2016). Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication. Journal of Management Information System, 33(2), 511-541. https://doi.org/10.1080/07421222.2016.1205927
Manzanero, A. (2009). Análisis de Contenido de Memorias Autobiográficas Falsas. Anuario de Psicología Jurídica, 19, 61-72. https://eprints.ucm.es/id/eprint/11019/
Manzanero, A., & González, J. (2015). Modelo holístico de evaluación de la prueba testifical (HELPT). Papeles del psicólogo, 36(2), 125-138. http://www. papelesdelpsicologo.es/pdf/2568.pdf
Masip, J. (2005). ¿Se pilla antes a un mentiroso que a un cojo? Sabiduría popular frente a conocimiento científico sobre la detección no-verbal del engaño. Papeles del psicólogo, 26(92), 78-91. http://www.redalyc.org/articulo.oa?id=77809203
Masip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.x
Masip, J., Garrido, E., & Herrero, C. (2002). La detección de la mentira mediante la Técnica Scan. Psicopatología Clínica, Legal y Forense, 2(2), 39-62. https://www. researchgate.net/publication/235685664
Matsumoto, D., & Hwang, H. (2015). Differences in Word Usage by Truth Tellers and Liars in Written Statements and an Investigative Interview After a Mock Crime. Journal of Investigative Psychology and Offender Profiling, 12(2), 199-216. https:// doi.org/10.1002/jip.1423
Nahari, G. (2018). The applicability of the verifiability approach to the real world. En J. P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 329-349). Elsevier Academic Press. https://doi.org/10.1016/ B978-0-12-812729-2.00014-8
Oberlader, V., Naefgen, C., Koppehele, J., Quinten, L., & Schmidt, A. (2016). Validity of Content-Based Techniques to Distinguish True and Fabricated Statements: A Meta-Analysis. Validity of Content-Based Techniques to Distinguish True and Fabricated Statements: A Meta-Analysis, 40(4), 440-457. http://dx.doi. org/10.1037/lhb0000193
Pan, X., Zhao, H., & Zhou, Y. (2015). The application of fractional Mel cepstral coefficient in deceptive speech detection. PeerJ, 3, e1194. https://doi.org/10.7717/ peerj.1194
Pennebaker, J. (2011). The secret life of pronouns what our words say about us. Bloomsbury Press.
Pennebaker, J., Mehl, M., & Niederhoffer, K. (2003). Psychological aspects of natural language use: Our world, our selves. Annual Review of Psychology, 54, 547-577. https://doi.org/10.1146/annurev.psych.54.101601.145041
Pérez-Rosas, V., & Mihalcea, R. (2014). Gender differences in deceivers writing style. En Human-Inspired Computing and Its Applications (pp. 163-174). Universidad de Michigan. https://doi.org/10.1007/978-3-319-13647-9_17
Ramírez, N., Pennebaker, J., García, F., & Suriá, R. (2007). La psicología del uso de las palabras: Un programa de computadora que analiza textos en español. Revista Mexicana de Psicología, 24(1), 85-99. https://www.redalyc.org/articulo. oa?id=243020635010
Richardson, B., Taylor, P., Snook, B., & Conchie, S. (2014). Language style and police interrogation outcomes. Law and Human Behavior, 38(4), 357-366. https://doi. org/10.1037/lhb0000077
Roche, J., & Arnold, H. (2018). The Effects of Emotion Suppression During Language Planning and Production. Journal of Speech, 61(8), 1-8. https://doi. org/10.1044/2018_JSLHR-L-17-0232
Ruiz, J., Cuevas, I., & López, I. (1998). El proceso de control de la realidad en sujetos con propensión a la alucinación. Psicothema, 10(1), 41-52. http://www.psicothema. com/pdf/141.pdf
Salvetti, F. (2012). Detecting Deception in Text: A Corpus-Driven Approach [Tesis de doctorado]. Universidad de Colorado. https://scholar.colorado.edu/concern/ file_sets/rx913q180
Sarwar, F., Sikström, S., Allwood, C., & Ker, A. (2015). Predicting correctness of eyewitness statements using the semantic evaluation method (SEM). Quality and Quantity, 49, 1735-1745. https://doi.org/10.1007/s11135-014-9997-7
Sboev, A., Moloshnikiv, I., Gudovskikh, D., Selivanov, A., Rybka, R., & Litvinova, T. (2018). Automatic gender identification of author of Russian text by machine learning and neuralnet algorithms in case of gender deception. Procedia Computer Science, 123, 417-423. https://doi.org/10.1016/j.procs.2018.01.064
Schelleman, K., & Merckelbach, H. (2010). Fantasy proneness as a confounder of verbal lie detection tools. Journal of Investigative Psychology and Offender Profiling, 7(3), 247-260. https://doi.org/10.1002/jip.121
Scott, T., & Manzanero, A. (2015). Análisis del expediente judicial: Evaluación de la validez de la prueba testifical. Papeles del psicólogo, 36(2), 139-144. https://www. redalyc.org/articulo.oa?id=77839628007
Scott, T., Manzanero, A., Muñoz, J., & Köhnken, G. (2014). Admisibilidad en contextos forenses de indicadores clínicos para la detección del abuso sexual infantil. Anuario de Psicología Jurídica, 24(1), 57-63. https://www.sciencedirect.com/ science/article/pii/S113307401400018X
Sun, C., Du, Q., & Tian, G. (2016). Exploiting Product Related Review Features for Fake Review Detection. Mathematical Problems in Engineering, 2016, 4935792. https://www.hindawi.com/journals/mpe/2016/4935792/
Stone, P., Dunphy, D., Smith, M., & Ogilvie, D. (1966). The General Inquirer: A Computer Approach to Content Analysis. American Journal of Sociology, 73(5), 634-651. https://www.journals.uchicago.edu/doi/pdfplus/10.1086/224539
Tausczik, Y., & Pennebaker, J. (2010). The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods. Journal of Language and Social Psychology, 29(1), 24-54. https://doi.org/10.1177/0261927X09351676
Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A., & Menacre, T. (2013). Detecting insider threats through language change. Law and Human Behavior, 37(4), 267-275. https://doi.org/10.1037/lhb0000032
Ten Brinke, L., & Khambatta, P. (2015). Physically Scarce (vs. Enriched) Environments Decrease the Ability to Tell Lies Successfully. Journal of Experimental Psychology, 114(5), 982-992. https://doi.org/10.1037/xge0000103
Ten Brinke, L., & Porter, S. (2012). Cry Me a River: Identifying the Behavioral Consequences of Extremely High-Stakes Interpersonal Deception. Law and Human Behavior, 36(6), 469-477. https://doi.org/10.1037/h0093929
Throckmorton, C., Mayew, W., Venkatachalam, M., & Collins, L. (2015). Financial fraud detection using vocal, linguistic and financial cues. Decisions Support Systems, 74, 78-87. https://doi.org/10.1016/j.dss.2015.04.006
Undeutsch, U. (1989). The development of statement reality analysis. En Yuille, J. C. (Ed.), Credibility Assessment (pp. 101-119). Springer. https://doi. org/10.1007/978-94-015-7856-1_6
Valverde, M., Ruiz, J., & Llor, B. (2013). Valoración de la credibilidad de testimonio: Aplicación del modelo Reality Monitoring. Revista Internacional de Psicología, 12(2), 1-30. http://www.revistapsicologia.org/index.php/revista/article/view/68
Van Swol, L., & Braun, M. (2014). Communicating Deception: Differences in Language Use, Justifications, and Questions for Lies, Omissions, and Truths. Group Decision Negotiation, 23(6), 1343-1367. http://dx.doi.org/10.1007/s10726-013-9373-3
Vásquez, B. (2007). Manual de psicología forense. Síntesis.
Villar, G., Arciuli, J., & Patterson, H. (2013). Remorse in oral and handwritten false confessions. Legal and Criminological Psychology, 19(2), 255-269. https://doi. org/10.1111/lcrp.12012
Vrij, A. (2008). Detecting lies and deceit: Pitfalls and opportunities. Wiley-Interscience.
Vrij, A., Granhag, A., Mann, S., & Leal, S. (2010). Outsmarting the Liars: Toward a Cognitive Lie Detection Approach. Association for Psychological Science, 20(1), 1-5. https://doi.org/10.1177/0963721410391245
Vrij, A., Mann, S., Fisher, R., Leal, S., Milne, R., & Bull, R. (2008). Increasing Cognitive Load to Facilitate Lie Detection: The Benefit of Recalling an Event in Reverse Order. Law and Human Behavior, 32(3), 253-265. http://www.jstor.org/ stable/25144624
Vrij, A., Mann, S., Kristen, S., & Fisher, R. (2007). Cues to deception and ability to detect lies as a function of police interview styles. Law and Human Behavior, 31(5), 499-518. https://doi.org/10.1007/s10979-006-9066-4
Zhao, N., Jiao, D., Bai, S., & Su, T. (2016). Evaluating the Validity of Simplified Chinese Version of LIWC in Detecting Psychological Expressions in Short Texts on Social Network Services. Plos One, 11(6), e0157947. https://pubmed.ncbi.nlm. nih.gov/27322382/
Zhou, L., & Zhang, D. (2007). Typing or messaging? Modality effect on deception detection in computer-mediated communication. Decision Support Systems, 44(1), 188-201. https://doi.org/10.1016/j.dss.2007.03.012
Arksey, H., & O’Malley, L. (2005). Scoping studies: Towards a methodological framework. International Journal of Social Research Methodology, 8(1), 19-32. https://doi.org/10.1080/1364557032000119616
Barrios, B. (2005). El testimonio penal. Editorial Jurídica Ancón. https:// borisbarriosgonzalez.files.wordpress.com/2011/08/el-testimonio-penal-borisbarrios- gonzalez.pdf
Carvajal-Builes, J., & Barreto, I. (2022). Detección del engaño a partir del estilo lingüístico: una revisión sistematizada. En E. López-Cantero, P. Ruiz, L. Jiménez, A. Lobo & M. Támara (Eds), Psicología jurídica: género, contexto y enfoques para la comprensión del comportamiento antijurídico (pp. 173-183). Manual Moderno.
Carvajal-Builes, J., Gómez-Durán, E., & Barreto, I. (2021). Comportamiento visual y engaño: Una revisión sistematizada. Anuario de psicología, 51(2), 120-129. https://revistes.ub.edu/index.php/Anuario-psicologia/article/view/30221
Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2018). Instrumentos, medidas, procedimientos y procedencia de los estudios producidos para la detección del engaño a través de medidas psicofisiológicas. Revista Criminalidad, 60(2), 75-88. http://www.scielo.org.co/pdf/crim/v60n2/1794-3108-crim-60-02-00075.pdf
Carvajal-Builes, J., Gutiérrez de Piñeres, C., & Barreto, I. (2020b). Análisis del estilo lingüístico en testigos de referencia y espectadores. En I. F. Medina-Arboleda, I. Barreto, D. R. Aguilar-Pardo, & M. C. Sandoval-Escobar (Eds.), Perspectivas y contextos de la prosocialidad y la convivencia (pp. 157-175). Universidad Católica de Colombia. https://repository.ucatolica.edu.co/handle/10983/26286
Carvajal-Builes, J., Rhenals, J., Muñóz, T., & Chaparro, S. (2020a). Psicología del testimonio: Evidencia actual de su desarrollo. En L. O. Jiménez-Ardila (Ed.), Subcampos de aplicación de la psicología jurídica (pp. 77-93). Universidad Católica de Colombia. https://repository.ucatolica.edu.co/entities/ publication/5c3fb91f-1a6d-48d4-8a9e-5ddc1144af76
Cook, A., Hacker, D., Webb, A., Osher, D., & Kristjansson, S. (2012). Lyin’ eyes: Ocularmotor measures of reading reveal deception. Journal of Experimental Psychology, 18(3), 301-313. https://pubmed.ncbi.nlm.nih.gov/22545928/
Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068
Masip, J. (2005). ¿Se pilla antes a un mentiroso que a un cojo? Sabiduría popular frente a conocimiento científico sobre la detección no-verbal del engaño. Papeles del psicólogo, 26(92), 78-91. http://www.redalyc.org/articulo.oa?id=77809203
Masip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.x
Montero, I., & León, O. (2007). A guide for naming research studies in Psychology. International Journal of Clinical and Health Psychology, 7(3), 847-862. https:// www.redalyc.org/pdf/337/33770318.pdf
Valverde, M., Ruiz, J., & Llor, B. (2013). Valoración de la credibilidad de testimonio: Aplicación del modelo Reality Monitoring. Revista Internacional de Psicología, 12(2), 1-30. http://www.revistapsicologia.org/index.php/revista/article/view/68
Ali, M., & Levine, T. (2008). The language of truthful and deceptive denials and confessions. Communication Reports, 21(2), 82-91. https://doi.org/10.1080/ 08934210802381862
American Psychiatric Association. (2013). Guía de consulta de los criterios diagnósticos del DSM 5. APA.
Amor, P., Echeburúa, E., & Corral, P. (2003). Autoinformes y entrevistas en el ámbito de la psicología clínica forense: limitaciones y nuevas perspectivas. Análisis y modificación de conducta, 29(126), 503-522. https://dialnet.unirioja.es/servlet/ articulo?codigo=761627
Arce, R., & Fariña, F. (2005). Peritación psicológica de la credibilidad del testimonio, la huella psíquica y la simulación: el sistema de evaluación global (SEG). Papeles del psicólogo, 26, 59-77. http://www.papelesdelpsicologo.es/pdf/1247.pdf
Ato, M., López, J., & Benavente, A. (2013). Un sistema de clasificación de los diseños de investigación en psicología. Anales de Psicología, 29(3), 1038-1059. http:// scielo.isciii.es/pdf/ap/v29n3/metolologia.pdf
Ball, L., & Elworthy, J. (2014). Fake or real? The computational detection of online deceptive text. Journal of Marketing Analytics, 2, 187-201. https://doi.org/10.1057/ jma.2014.15
Blandón, I., López, R., Masip, J., & Fenn, E. (2017). Cognición, emoción y mentira: implicaciones para detectar el engaño. Anuario de Psicología Jurídica, 27(1), 95- 106. https://doi.org/10.1016/j.apj.2017.02.004
Braun, M., & van Swol, L. (2016). Justifications Offered, Questions Asked, and Linguistic Patterns in Deceptive and Truthful Monetary Interactions. Group Decision Negotiation, 25, 641-661. https://doi.org/10.1007/s10726-015-9455-5
Braun, M., van Swol, L., & Vang, L. (2015). His Lips Are Moving: Pinocchio Effect and Other Lexical Indicators of Political Deceptions. Discourse Processes, 52(1), 1-20. https://doi.org/10.1080/0163853X.2014.942833
Buller, D., & Burgoon, J. (1994). Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18(2), 155-184. https://link.springer.com/article/10.1007/ BF02170076
Cárdenas, M., & Arancibia, H. (2014). Potencia estadística y cálculo del tamaño del efecto en gpower: complementos a las pruebas de significación estadística y su aplicación en psicología. Salud & Sociedad, 5(2), 210-224. https://doi. org/10.22199/s07187475.2014.0002.00006
Carvajal-Builes, J., Barreto, I., & Gutiérrez de Piñeres, C. (2024). Deception detection based on the linguistic style of honest and dishonest stories. Journal of Forensic Practice, 26(1), 46-59. https://doi.org/10.1108/JFP-07-2023-0035
Carvajal-Builes, J., Gómez-Durán, E., & Barreto, I. (2021). Comportamiento visual y engaño: Una revisión sistematizada. Anuario de psicología, 51(2), 120-129. https://revistes.ub.edu/index.php/Anuario-psicologia/article/view/30221
Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2017). Debate sobre la detección del engaño por medio de mediciones neurofisiológicas. En C. Pavajaeu & C. Gutiérrez de Piñeres (Eds.), Neurociencias y Derecho: reflexiones sobre la cognición social, el libre albedrío, la dignidad humana, la culpabilidad y la prueba novel (pp. 269- 278). Universidad Externado de Colombia.
Carvajal-Builes, J., Rhenals, J., Muñóz, T., & Chaparro, S. (2020). Psicología del testimonio: Evidencia actual de su desarrollo. En L. O. Jiménez-Ardila (Ed.), Subcampos de aplicación de la psicología jurídica (pp. 77-93). Universidad Católica de Colombia. https://repository.ucatolica.edu.co/entities/ publication/5c3fb91f-1a6d-48d4-8a9e-5ddc1144af76
Cook, A., Hacker, D., Webb, A., Osher, D., & Kristjansson, S. (2012). Lyin’ eyes: Ocularmotor measures of reading reveal deception. Journal of Experimental Psychology, 18(3), 301-313. https://pubmed.ncbi.nlm.nih.gov/22545928/
Duran, N., Crossley, S., Hall, C., & McCarthy, P. (2009). Expanding a Catalogue of Deceptive Linguistic Features with NLP Technologies. Twenty-Second International Florida Artificial Intelligence Research Society Conference. FLAIRS-22.
Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068
Elaad, E., & Reizer, A. (2015). Personality Correlates of the Self-Assessed Abilities to Tell and Detect Lies, Tell Truths, and Believe Others. Journal of Individual Differences, 36(3), 163-169. https://doi.org/10.1027/1614-0001/a000168
Enos, F. (2009). Detecting Deception in Speech [Tesis de doctorado]. Universidad de Columbia. http://www1.cs.columbia.edu/~frank/enos_thesis.pdf
Escobar, J. (2011). Riqueza de principios en bioética. Revista Colombiana de Bioética, 6(2), 128-138. http://www.redalyc.org/pdf/1892/189222558009.pdf
Fornaciari, T., & Poesio, M. (2013). Automatic deception detection in Italian court cases. Artificial Intelligence and Law, 21, 303-340. https://doi.org/10.1007/ s10506-013-9140-4
Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Aplications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032
Fuller, C., Biros, D., Burgoon, J., & Nunamaker, J. (2013). An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception. Group Decision Negotiation, 22, 117-134. https://doi.org/10.1007/s10726-012-9300-z
Gamer, M., & Ambach, W. (2014). Deception research today. Frontiers in Psychology, 5, 1-3. https://doi.org/10.3389/fpsyg.2014.00256
Gamer, M., & Perstzov, Y. (2018). Detecting conceal knowledge from ocular response. En P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 169-186). Academic press.
Gao, J., Tian, H., Yang, Y., Yu, X., Li, C., & Rao, N. (2014). A novel algorithm to enhance p300 in single trials: Application to lie detection using F-score and SVM. Plos One, 9(11), e109700. https://doi.org/10.1371/journal.pone.0109700
García, E., González, J., & Maestú, F. (2011). Neuronas espejo y teoría de la mente en la explicación de la empatía. Ansiedad y Estrés, 17(2-3), 265-279. https://hdl. handle.net/20.500.14352/42302
Goel, S., Gangolly, J., Faerman, S., & Uzuner, O. (2010). Can Linguistic predictors Detect Fraudulent Financial Fillings? Journal of Emerging Technologies in Accounting, 7(1), 25-46. https://doi.org/10.2308/jeta.2010.7.1.25
Gómez, P. (2009). Principios básicos de bioética. Revista Peruana Ginecología y Obstetricia, 55(4), 1-12. http://www.redalyc.org/pdf/3234/323428194003.pdf
Granhag, A., & Hartwig, M. (2008). A new theoretical perspective on deception detection: On the psychology of instrumental mindreading. Crime and Law, 14(3), 189-200. https://doi.org/10.1080/10683160701645181
Gutiérrez de Piñeres, C. (2019). Registro de movimientos oculares con el eye tracker mobile eye XG. Universidad Católica de Colombia. https://hdl.handle. net/10983/23575
Hancock, J., Curry, L., Goorha, S., & Woodworth, M. (2007). On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication. Journal Discourse Processes, 45(1), 1-23. https://doi. org/10.1080/01638530701739181
Hauch, V., Blandón, J., Masip, J., & Sporer, S. (2015). Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Personality and Social Psychology Review, 19(4), 307-342. https://doi.org/10.1177/1088868314556539
Hernández-Castañeda, A., & Calvo, H. (2017). Deceptive text detection using continuous semantic space models. Intelligent Data Analysis, 21(3), 679-695. https://doi.org/10.3233/IDA-170882
Jupe, L., Vrij, A., Leal, S., & Nahari, G. (2018). Are you for real? Exploring language use and unexpected process questions within the detection of identity deception. Applied Cognitive Psychology, 1(13), 622-634. https://doi.org/10.1002/acp.3446
Kovalev, A., Luniakova, E., & Menshikova, G. (2016). Using eye movement characteristics for detecting deception. International Journal of Psychophysiology, 108, 161. https://doi.org/10.1016/j.ijpsycho.2016.07.463
Lee, C., Welker, R., & Odom, M. (2009). Features of computer-mediated, text-based messages that support automatable, linguistic-based indicator for deception detection. Journal of Information Systems, 23(1), 5-24. https://doi.org/10.2308/ jis.2009.23.1.24
Ley 1090 de 2006. (2006). Por la cual se reglamenta el ejercicio de la profesión de Psicología, se dicta el Código Deontológico y Bioético y otras disposiciones. Diario Oficial N.º 46383 del 6 de septiembre de 2006. Congreso de la República de Colombia. https://www.funcionpublica.gov.co/eva/gestornormativo/norma. php?i=66205
Ley 1581 de 2012. Por la cual se dictan disposiciones generales para la protección de datos personales. Diario Oficial N.º 48587 de octubre 18 de 2012. Congreso de la República de Colombia. https://www.funcionpublica.gov.co/eva/ gestornormativo/norma.php?i=49981
Li, D. (2013). Deception Detection using Human Reasoning [Conferencia]. 2011 IEEE International Conference on Systems, Man, and Cybernetics (pp. 165-172). Anchorage, AK, EE. UU. http://di2ag.thayer.dartmouth.edu/wiki/images/f/ fd/029_3183_(print_version).pdf
Masip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.x
Matsumoto, D., & Hwang, H. (2015). Differences in Word Usage by Truth Tellers and Liars in Written Statements and an Investigative Interview After a Mock Crime. Journal of Investigative Psychology and Offender Profiling, 12(2), 199-216. https:// doi.org/10.1002/jip.1423
Mayer, R. (2005). The Cambridge Handbook of Multimedia Learning. Cambridge University press. https://doi.org/10.1017/CBO9781139547369
Millon, T., Davis, R., & Millon, C. (1997). Inventario Clínico Multiaxial MCMI-III. Manual. Tea ediciones.
Nahari, G. (2018). The applicability of the verifiability approach to the real world. En J. P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 329-349). Elsevier Academic Press. https://doi.org/10.1016/ B978-0-12-812729-2.00014-8
Nasreddine, Z. S., Phillips, N. A., Bédirian, V., Charbonneau, S., Whitehead, V., Collin, I., Cummings, J., & Chertkow, H. (2005). The Montreal Cognitive Assessment, MoCA: a brief screening tool for mild cognitive impairment. Journal of the American Geriatrics Society, 53(4), 695-9. https://doi. org/10.1111/j.1532-5415.2005.53221.x
Navarini, E., & Elmir, K. (2011). Hacia una bioética universal. Nuevas bases epistemológicas para el siglo XXI. Revista de La Asociación Médica Argentina, 124(3), 32-36. https://docs.bvsalud.org/biblioref/2024/02/382040/hacia-unabioetica- universal-nuevas-bases-epistemologicas-para-_jOg35D3.pdf
Pasca, V. (2011). Study regarding psychophysiological reactivity values depending on subject’s gender in polygraph testing. Social and Behavioral Sciences, 33, 821-825. https://doi.org/10.1016/j.sbspro.2012.01.236
Pavlov, Y., & Zlokazov, K. (2018). Deception detection by means of eye-tracking in the concealed information test. International Journal of Psychophysiology, 131(Supl.), 169-184. https://doi.org/10.1016/j.ijpsycho.2018.07.425
Pedraza, O., Salazar, A., Sierra, F., Soler, D., Castro, J., Castillo, P., Hernández, A., & Piñeros, C. (2016). Confiabilidad, validez de criterio y discriminante del Montreal Cognitive Assessment (MoCA) test, en un grupo de adultos de Bogotá. Acta Médica Colombiana, 41(4), 221-228. http://www.scielo.org.co/pdf/amc/ v41n4/v41n4a04.pdf
Pennebaker, J. (2011). The secret life of pronouns what our words say about us. Bloomsbury Press.
Pennebaker, J., Mehl, M., & Niederhoffer, K. (2003). Psychological aspects of natural language use: Our world, our selves. Annual Review of Psychology, 54, 547-577. https://doi.org/10.1146/annurev.psych.54.101601.145041
Pérez-Rosas, V., & Mihalcea, R. (2014). Gender Differences in Deceivers Writing Style. En Gelbukh, A., Espinoza, F. C., & Galicia-Haro, S. N. (Eds.), Human- Inspired Computing and Its Applications (pp. 163-174). Springer. https://doi. org/10.1007/978-3-319-13647-9_17
Peth, J. (2014). Emotional modulation of memory encoding and retrieval in the concealed Information Test [Tesis de doctorado]. Universitätsklinikum Hamburg- Eppendorf. https://ediss.sub.uni-hamburg.de/handle/ediss/5554?mode=full
Ramírez, N., Pennebaker, J., García, F., & Suriá, R. (2007). La psicología del uso de las palabras: Un programa de computadora que analiza textos en español. Revista Mexicana de Psicología, 24(1), 85-99. http://rua.ua.es/dspace/ handle/10045/25918
Richardson, B., Taylor, P., Snook, B., & Conchie, S. (2014). Language style and police interrogation outcomes. Law and Human Behavior, 38(4), 357-366. https://doi. org/10.1037/lhb0000077
Salvetti, F. (2012). Detecting Deception in Text: A Corpus-Driven Approach [Tesis de doctorado]. Universidad de Colorado. https://scholar.colorado.edu/concern/ graduate_thesis_or_dissertations/7d278t23w
Sarwar, F., Sikström, S., Allwood, C., & Ker, A. (2015). Predicting correctness of eyewitness statements using the semantic evaluation method (SEM). Quality and Quantity, 49, 1735-1745. https://doi.org/10.1007/s11135-014-9997-7
Sboev, A., Moloshnikiv, I., Gudovskikh, D., Selivanov, A., Rybka, R., & Litvinova, T. (2018). Automatic gender identification of author of Russian text by machine learning and neuralnet algorithms in case of gender deception. Procedia Computer Science, 123, 417-423. https://doi.org/10.1016/j.procs.2018.01.064
Schwedes, C., & Wentura, D. (2012). The revealing glance: Eye gaze behavior to concealed information. Memory Cognition, 40, 642-651. https://doi.org/10.3758/ s13421-011-0173-1
Sip, K., Carmel, D., Marchant, J., Li, J., Petrovic, P., Roestorpff, A., McGregor, W., & Frith, C. (2013). When Pinocchio’s nose does not grow: belief regarding lie-detectability modulates production of deception. Frontiers in Human Neuroscience, 7, 1-11. https://doi.org/10.3389/fnhum.2013.00016
Tausczik, Y., & Pennebaker, J. (2010). The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods. Journal of Language and Social Psychology, 29(1), 24-54. https://doi.org/10.1177/0261927X09351676
Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A., & Menacre, T. (2013). Detecting insider threats through language change. Law and Human Behavior, 37(4), 267-275. https://doi.org/10.1037/lhb0000032
Ten Brinke, L., & Khambatta, P. (2015). Physically Scarce (vs. Enriched) Environments Decrease the Ability to Tell Lies Successfully. Journal of Experimental Psychology, 114(5), 982-992. https://doi.org/10.1037/xge0000103
Ten Brinke, L., & Porter, S. (2012). Cry Me a River: Identifying the Behavioral Consequences of Extremely High-Stakes Interpersonal Deception. Law and Human Behavior, 36(6), 469-477. https://doi.org/10.1037/h0093929
Tomer, E., Lupu, T., Golan, L., Wagner, M., & Braw, Y. (2018). Eye tracking as a mean to detect feigned cognitive impairment in the word memory test. Applied Neuropsychology: Adult, 27(1), 49-61. https://doi.org/10.1080/23279095.2018.1 480483
Valverde, M., Ruiz, J., & Llor, B. (2013). Valoración de la credibilidad de testimonio: Aplicación del modelo Reality Monitoring. Revista Internacional de Psicología, 12(2), 1-30. https://doi.org/10.33670/18181023.v12i02.68
Van Swol, L., & Braun, M. (2014). Communicating Deception: Differences in Language Use, Justifications, and Questions for Lies, Omissions, and Truths. Group Decision Negotiation, 23(6), 1343-1367. http://dx.doi.org/10.1007/s10726-013-9373-3
Villar, G., Arciuli, J., & Patterson, H. (2013). Remorse in oral and handwritten false confessions. Legal and Criminological Psychology, 19(2), 255-269. https://doi. org/10.1111/lcrp.12012
Vrij, A., & Granhag, P. (2012). Eliciting cues to deception and truth: What matters are the questions asked. Journal of Applied Research in Memory and Cognition, 1(2), 110-117. https://doi.org/10.1016/j.jarmac.2012.02.004
Vrij, A., Oliveira, J., Hammond, A., & Erhlichman, H. (2015). Saccadic eye movement rate as cue to deceit. Journal of Applied Research of Memory and Cognition, 4(1), 15-19. https://doi.org/10.1016/j.jarmac.2014.07.005
Walczyk, J., Harris, L., & Mulay, D. (2014). A social-cognitive framework for understanding serious lies: Activation-decision-construction-action theory. New Ideas in Psychology, 34, 22-36. https://doi.org/10.1016/j. newideapsych.2014.03.001
Walczyk, J., Roper, K., Seemann, E., & Humphrey, A. (2003). Cognitive mechanisms underlying lying to questions: response time as a cue to deception. Cognitive Applied Psychology, 17(7), 755-774. https://doi.org/10.1002/acp.914
Zuckerman, M., Depaulo, B., & Rosenthal, R. (1981). Verbal and nonverbal communication of deception. En Advances in Experimental Social Psychology (14.ª ed., pp. 1-59). Academic Press.
Barrios, B. (2005). El testimonio penal. Editorial Jurídica Ancón. https:// borisbarriosgonzalez.files.wordpress.com/2011/08/el-testimonio-penal-borisbarrios- gonzalez.pdf
Bermeosolo, J. (2012). Memoria de trabajo y memoria procedimental en las dificultades específicas del aprendizaje y del lenguaje: algunos hallazgos. Revista Chilena de Fonoaudiología, 11, 57-75. https://revfono.uchile.cl/index.php/RCDF/article/ view/24516
Buller, D., & Burgoon, J. (1994). Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18(2), 155-184. https://link.springer.com/article/10.1007/ BF02170076
Buller, D., & Burgoon, J. (1994). Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18(2), 155-184. https://link.springer.com/article/10.1007/ BF02170076
Chen, Z., Xue, L., Yiang, C., Wang, L., Mei, W., Zhang, Q., & Zhao, H. (2015). Specific marker of feigned memory impairment: The activation of left superior frontal gyrus. Journal of Forensic and Legal Medicine, 36, 164-171. https://pubmed.ncbi. nlm.nih.gov/26479324/
Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068
Ellmore, T., Mackin, B., & Ng, K. (2018). Saccades and Handedness Interact to Affect Scene Memory. PeerJ, 6, e5969. https://doi.org/10.7717/peerj.5969
Fornaciari, T., & Poesio, M. (2013). Automatic deception detection in Italian court cases. Artificial Intelligence and Law, 21, 303-340. https://doi.org/10.1007/ s10506-013-9140-4
Fuller, C., Biros, D., & Wilson, R. (2009). Decision support for determining veracity via linguistic-based cues. Decision Support Systems, 46(3), 695-703. https://doi. org/10.1016/j.dss.2008.11.001
Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Applications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032
Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Applications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032
Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Applications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032
Kircher, J. (2018). Ocular motor deception test. En J. Rosenfeld (Ed.), Detecting concealed information and deception. Academic press. https://doi.org/10.1016/ C2016-0-03911-6
Kovalev, A., Luniakova, E., & Menshikova, G. (2016). Using eye movement characteristics for detecting deception. International Journal of Psychophysiology, 108, 161. https://doi.org/10.1016/j.ijpsycho.2016.07.463
Masip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.x
Nahari, G. (2018). The applicability of the verifiability approach to the real world. En J. P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 329-349). Elsevier Academic Press. https://doi.org/10.1016/ B978-0-12-812729-2.00014-8
Pérez-Rosas, V., & Mihalcea, R. (2014). Gender Differences in Deceivers Writing Style. En A. Gelbukh, F. C. Espinoza & D. N. Galicia-Haro (Eds.), Human-Inspired Computing and Its Applications (pp. 163-174). Springer. https://link.springer. com/chapter/10.1007/978-3-319-13647-9_17#citeas
Peth, J. (2014). Emotional modulation of memory encoding and retrieval in the concealed Information Test [Tesis de doctorado]. Universitätsklinikum Hamburg- Eppendorf. https://ediss.sub.uni-hamburg.de/handle/ediss/5554?mode=full
Peth, J., Sommer, T., Hebart, M., Vossel, G., Büchel, C., & Gamer, M. (2015). Memory detection using fmri -Does the encoding context matter. Neuroimage, 113, 164- 174. https://doi.org/10.1016/j.neuroimage.2015.03.051
Schofield, C., Johnson, A., Inhonff, A., & Coles, M. (2012). Social anxiety and difficulty disengaging threat: Evidence from eye-tracking. Cognition and Emotion, 26(2), 300-311. https://doi.org/10.1080/02699931.2011.602050
Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A., & Menacre, T. (2013). Detecting insider threats through language change. Law and Human Behavior, 37(4), 267-275. https://doi.org/10.1037/lhb0000032
Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A., & Menacre, T. (2013). Detecting insider threats through language change. Law and Human Behavior, 37(4), 267-275. https://doi.org/10.1037/lhb0000032
Tomer, E., Lupu, T., Golan, L., Wagner, M., & Braw, Y. (2018). Eye tracking as a mean to detect feigned cognitive impairment in the word memory test. Applied Neuropsychology: Adult, 27(1), 49-61. https://doi.org/10.1080/23279095.2018.1 480483
Vrij, A., Oliveira, J., Hammond, A., & Erhlichman, H. (2015). Saccadic eye movement rate as cue to deceit. Journal of Applied Research of Memory and Cognition, 4(1), 15-19. https://doi.org/10.1016/j.jarmac.2014.07.005
Walczyk, J., Roper, K., Seemann, E., & Humphrey, A. (2003). Cognitive mechanisms underlying lying to questions: response time as a cue to deception. Cognitive Applied Psychology, 17(7), 755-774. https://onlinelibrary.wiley.com/doi/ abs/10.1002/acp.914
dc.rights.none.fl_str_mv Derechos Reservados - Universidad Católica de Colombia, 2024
dc.rights.accessrights.none.fl_str_mv info:eu-repo/semantics/restrictedAccess
dc.rights.coar.none.fl_str_mv http://purl.org/coar/access_right/c_16ec
rights_invalid_str_mv Derechos Reservados - Universidad Católica de Colombia, 2024
http://purl.org/coar/access_right/c_16ec
eu_rights_str_mv restrictedAccess
dc.format.extent.none.fl_str_mv 196 páginas
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Editorial Universidad Católica de Colombia
dc.publisher.place.none.fl_str_mv Bogotá
publisher.none.fl_str_mv Editorial Universidad Católica de Colombia
dc.source.none.fl_str_mv https://publicacionesucatolica.publica.la/library/publication/miradas-y-palabras-que-enganan-comportamiento-visual-y-estilo-linguistico-en-testimonios-honestos-y-deshonestos
institution Universidad Católica de Colombia
bitstream.url.fl_str_mv https://repository.ucatolica.edu.co/bitstreams/fab23c2d-1940-4f53-b6a1-2343ca81c07e/download
https://repository.ucatolica.edu.co/bitstreams/c458f8a7-76ca-465a-9f08-7398b9412c9a/download
https://repository.ucatolica.edu.co/bitstreams/b9700e30-4ef7-4eae-9e3b-1483caca5b73/download
https://repository.ucatolica.edu.co/bitstreams/01a38dc7-827c-4272-8faf-7bddab1aaa3b/download
bitstream.checksum.fl_str_mv 01efaf1df90115fbdbb1d57b41fca506
73a5432e0b76442b22b026844140d683
9606243afd91d5af2e4089e96d5854db
c56379e3e486cc6297978d299cd6565c
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad Católica de Colombia - RIUCaC
repository.mail.fl_str_mv bdigital@metabiblioteca.com
_version_ 1812183332721524736
spelling Carvajal-Builes, Juan Camilovirtual::3473-1Barreto-Galeano, María Idalyvirtual::3474-12024-09-04T17:54:30Z2024-09-04T17:54:30Z2024-09En este libro se presenta, en su primera parte, un abordaje narrativo respecto al concepto del engaño y sobre cómo ha sido su estudio, caracterizado principalmente por el análisis de las respuestas psicofisiológicas y el comportamiento verbal en la detección de relatos honestos y deshonestos. Con esto, el lector contará con diversos elementos conceptuales, teóricos y metodológicos para entender lo planteado en la segunda parte de esta obra, en la cual se abordan distintos estudios empíricos con énfasis en la detección del engaño por medio del eye tracker y el análisis del estilo lingüístico, constituyendo así un procedimiento validado para la detección de engaño. Al final se muestran los resultados de distintos análisis estadísticos robustos en cuanto a las diferencias en el comportamiento visual y el estilo lingüístico en los relatos honestos y deshonestos de hombres y mujeres en un estudio simulado con testigos de un delito, y se presenta una propuesta explicativa y predictiva de la conducta de engaño, con la cual se hacen sugerencias y recomendaciones para futuras investigaciones. (Tomado de la fuente).The first part of this book offers a narrative approach to the concept of deception and its study, primarily focused on analyzing psychophysiological responses and verbal behavior in detecting honest and dishonest accounts. This section equips the reader with various conceptual, theoretical, and methodological tools necessary to grasp the content explored in the second part, where different empirical studies are discussed. These studies emphasize deception detection using eye-tracking technology and linguistic style analysis, ultimately presenting a validated procedure for identifying deception. The final section provides results from robust statistical analyses on the differences in visual behavior and linguistic style in honest and dishonest testimonies of men and women in a simulated crime witness study. An explanatory and predictive model of deceptive behavior is proposed, along with suggestions and recommendations for future research.Primera ediciónPRESENTACIÓN. INTRODUCCIÓN. PARTE 1 RECORRIDO NARRATIVO SOBRE EL ESTUDIO Y DETECCIÓN DEL ENGAÑO. PARTE 2 EVIDENCIA EMPÍRICA SOBRE EL USO DEL ANÁLISIS DEL COMPORTAMIENTO VISUAL Y EL ESTILO LINGÜÍSTICO PARA LA DISCRIMINACIÓN DE RELATOS HONESTOS Y DESHONESTOS. CONCLUSIONES. Referencias.196 páginasapplication/pdfCarvajal-Builes, J. P., & Barreto-Galeano, M. I. (2024). Miradas y palabras que engañan. Comportamiento visual y estilo lingüístico en testimonios honestos y deshonestos. Editorial Universidad Católica de Colombia. https://doi.org/10.14718/9786287554702.20249786287554696https://hdl.handle.net/10983/31422https://doi.org/10.14718/9786287554702.2024spaEditorial Universidad Católica de ColombiaBogotáColección Logos Vestigium; no. 19Alonso-Quecuty, M. (1993). Información postevento y reality monitoring: cuando el testigo “no puede ser honesto”. En Psicología forense experimental (pp. 85-98). Promolibro.Amado, B., Arce, R., & Fariña, F. (2015). Undeutsch hypothesis and Criteria Based Content Analysis: A meta-analytic review. The European Journal of Psychology Applied to Legal Context, 7(1), 3-12. http://dx.doi.org/10.1016/j.ejpal.2014.11.002American Psychiatric Association. (2013). Guía de consulta de los criterios diagnósticos del DSM 5. Arlington.Andreú, A. (2000). Las técnicas de análisis de contenido: una revisión actualizada. Fundación Centro Estudios Andaluces, Universidad de Granada, 10(2), 1-34. https://abacoenred.org/wp-content/uploads/2019/02/Las-técnicas-de-análisisde- contenido-una-revisión-actualizada.pdfArce, R., & Fariña, F. (2005). Peritación psicológica de la credibilidad del testimonio, la huella psíquica y la simulación: el sistema de evaluación global (SEG). Papeles del Psicólogo, 26, 59-77. http://www.papelesdelpsicologo.es/pdf/1247.pdfArce, R., & Fariña, F. (2006). Psicología del testimonio y evaluación cognitiva de la veracidad de testimonios y declaraciones. En J. C. Sierra, E. M. Jiménez & G. Buela- Casal (Coords.), Psicología forense: Manual de técnicas y aplicaciones (pp. 563- 601). Biblioteca Nueva. https://uforense.org/wp-content/uploads/2020/12/2006- psicologxa-del-testimonio-xarce-y-farixax-2006x-2020-12-22.pdfBen-Shakhar, B., Gamer, M., Iacono, W., Meijer, E., & Verschuere, B. (2015). Preliminary Process Theory does not validate the Comparison Question Test: A comment on Palmatier and Rovner (2015). International Journal of Psychophysiology, 95(1), 16-19. http://dx.doi.org/10.1016/j.ijpsycho.2014.08.582Bowman, H., Filetti, M., Alsufyani, A., Janssen, D., & Su, L. (2014). Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. Plos One, 9(3). https://doi.org/10.1371/journal.pone.0090595Buller, D., & Burgoon, J. (1994). Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18(2), 155-184. https://link.springer.com/article/10.1007/ BF02170076Cameron, M., Gudaitis, T., Holt, T., & Kilger, M. (2015). The psychology of deception. En Deception in the digital age (1.ª ed.) (pp. 1-50). Elsevier. https://www.elsevier. com/books/deception-in-the-digital-age/malin/978-0-12-411630-6Carvajal-Builes, J. (2017). Detección de engaño a través de medidas psicofisiológicas y carga cognitiva como alternativa explicativa. En Y. Gómez, A. Ceballos & O. Ruiz (Coords.), Congreso Desafíos de la psicología 2017, un compromiso con la salud y el bienestar (pp. 50-53). Universidad de Nariño. http://sired.udenar.edu. co/6007/1/Desafios_de_la_Psicologia2017.pdfCarvajal-Builes, J., & Gutiérrez de Piñeres, C. (2017). Debate sobre la detección del engaño por medio de mediciones neurofisiológicas. En C. Pavajaeu & C. Gutiérrez de Piñeres (Eds.), Neurociencias y derecho: reflexiones sobre la cognición social, el libre albedrío, la dignidad humana, la culpabilidad y la prueba novel (pp. 269-278). Universidad Externado de Colombia.Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2018b). Instrumentos, medidas, procedimientos y procedencia de los estudios producidos para la detección del engaño a través de medidas psicofisiológicas. Revista Criminalidad, 60(2), 75-88. http://www.scielo.org.co/pdf/crim/v60n2/1794-3108-crim-60-02-00075.pdfCarvajal-Builes, J., Barreto, I., & Gutiérrez de Piñeres, C. (2024). Deception detection based on the linguistic style of honest and dishonest stories. Journal of Forensic Practice, 26(1), 46-59. https://doi.org/10.1108/JFP-07-2023-0035Carvajal-Builes, J., Blanco, C., & López, M. (2018a). Validación de indicadores de mentira a través del lenguaje no verbal. Misión Jurídica, 11(14), 169-183. https:// dialnet.unirioja.es/servlet/articulo?codigo=6997363Carvajal-Builes, J., Gómez-Durán, E., & Barreto, I. (2021). Comportamiento visual y engaño: Una revisión sistematizada. Anuario de psicología, 51(2), 120-129. https://revistes.ub.edu/index.php/Anuario-psicologia/article/view/30221Carvajal-Builes, J., Rhenals, J., Muñoz, T., & Chaparro, S. (2020). Psicología del testimonio: evidencia actual de su desarrollo. En L. Jiménez-Ardila (Ed.), Subcampos Aplicados de la Psicología Jurídica (pp. 77-93). Editorial Universidad Católica de Colombia. https://repository.ucatolica.edu.co/entities/publication/ 5c3fb91f-1a6d-48d4-8a9e-5ddc1144af76Christ, S., Van Essen, D., Watson, J., Brubaker, L., & McDermott, K. (2009). The contributions of prefrontal cortex and executive control to deception: evidence from activation likelihood estimate meta-analyses. Cerebral Cortex, 19(7), 1557- 1566. https://www.ncbi.nlm.nih.gov/pubmed/18980948Constitución Política de Colombia. (1991). 7 de julio de 1991 (Colombia). http://www. secretariasenado.gov.co/senado/basedoc/constitucion_politica_1991.htmlCook, A., Hacker, D., Webb, A., Osher, D., & Kristjansson, S. (2012). Lyin’ eyes: Ocularmotor measures of reading reveal deception. Journal of Experimental Psychology, 18(3), 301-313. https://doi.org/10.1037/a0028307Cornack, S., Morrison, K., Paik, J., Wisner, A., & Zhu, X. (2014). Information Manipulation Theory 2: A Propositional Theory of Deceptive Discourse Production. Journal of Language and Social Psychology, 33(4), 1-30. https://doi. org/10.1177/0261927X14534656Csaba, K. (2013). The influence of stimulation/accomodation tests for the polygraph examination economy. Forensic Science, 14(4), 1404-1410. http://bit.ly/3yN8iW1Depaulo, B., Malone, B., Muhlenbruck, L., Charlton, K., & Cooper, H. (2003). Cues to deception. Psychological Bulletin, 129(1), 74-118. https://doi. org/10.1037/0033-2909.129.1.74Dietrich, A., Hu, X., & Rosenfeld, J. (2014). The Effects of Sweep Numbers Per Average and Protocol Type on the Accuracy of the P300-Based Concealed Information Test. Applied Psychophysiology Biofeedback, 39, 67-73. https://doi.org/10.1007/ s10484-014-9244-yDomjan, M. (2010). Principios de aprendizaje y conducta (6.ª ed.). C. L. Editores.Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068Ebrahimzadeh, E., Alavi, S., Bijar, A., & Pakkeshal, A. (2013). A novel approach for detection of deception using Smoothed Pseudo Wigner-Ville Distribution (SPWVD). Journal Biomedical Science and Engineering, 6(1), 8-18. https://doi. org/10.4236/jbise.2013.61002Elaad, E., & Reizer, A. (2015). Personality Correlates of the Self-Assessed Abilities to Tell and Detect Lies, Tell Truths, and Believe Others. Journal of Individual Differences, 36(3), 163-169. https://doi.org/10.1027/1614-0001/a000168Elaad, E., & Sommerfeld, E. (2016). Effects of Guilt, Disbelief, and Assessed Lie-Truth Telling Abilities on Physiological Responses in the Guilty Action Test. Psychology, 7(8), 1075-1091. https://doi.org/10.4236/psych.2016.78108Fu, H., Qiu, W., Ma, H., & Ma, Q. (2017). Neurocognitive mechanisms underlying deceptive hazard evaluation: An event-related potential investigation. Plos One, 12(8), e0182892. https://doi.org/10.1371/journal.pone.0182892Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Aplications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032Fuller, C., Biros, D., Burgoon, J., & Nunamaker, J. (2013). An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception. Group Decision Negotiation, 22, 117-134. https://doi.org/10.1007/s10726-012-9300-zGamer, M., & Ambach, W. (2014). Deception research today. Frontiers in Psychology, 5. https://doi.org/10.3389/fpsyg.2014.00256García, E. (2008). Neuropsicología y educación. De las neuronas espejo a la teoría de la mente. Revista de Psicología y Educación, 1(3), 69-90. https://hdl.handle. net/20.500.14352/50447García, E., González, J., & Maestú, F. (2011). Neuronas espejo y teoría de la mente en la explicación de la empatía. Ansiedad y Estrés, 17(2-3), 265-279. https://hdl. handle.net/20.500.14352/42302Godoy-Cervera, V., & Higueras, L. (2005). El análisis de contenido basado en criterios (CBCA) en la evaluación de la credibilidad del testimonio. Papeles del psicólogo, 26(92), 92-98. https://www.redalyc.org/articulo.oa?id=77809204Granhag, A., & Hartwig, M. (2008). A new theoretical perspective on deception detection: On the psychology of instrumental mindreading. Crime and Law, 14(3), 189-200. https://doi.org/10.1080/10683160701645181Honts, C. (2014). Countermeasures and credibility assessment. En D. C. Raskin, C. R. Honts, & J. C. Kircher (Eds.), Credibility assessment: Scientific research and applications (pp. 131-158). Elsevier Academic press. https://doi.org/10.1016/ B978-0-12-394433-7.00004-XHu, X., Chen, H., & Fu, G. (2012). A repeated lie becomes a truth? The effect of intentional control and training on deception. Frontiers in Psychology, 3, 1-6. https://doi.org/10.3389/fpsyg.2012.00488Hu, X., Evans, A., Wu, H., Lee, K., & Fu, G. (2013). An interfering dot-probe task facilitates the detection of mock crime memory in a reaction time (RT)-based concealed information test. Acta Psychologica, 142(2), 278285. https://doi. org/10.1016/j.actpsy.2012.12.006Jennings, M. (2015). Psychophysiological Significance of Successful Deception in Comparison with Unsuccessful Deception. W. University.Juárez, J., & Sala, E. (2011). Entrevistando a niños preescolares víctimas de abuso sexual y/o maltrato familiar. Centre d’Estudis Jurídics i Formació Especialitzada. https://www.fundacionenpantalla.org/attachments/article/13/entrevista %20 abuso %20sexual %20en %20prescolares.pdfJung, E., Kang, K., & Kim, Y. (2013). Frontoparietal activity during deceptive responses in the P300-based guilty knowledge test: An sLORETA study. Neuroimage, 78, 305-315. https://doi.org/10.1016/j.neuroimage.2013.04.027Jung, K., & Lee, J. (2012). Cognitive and emotional correlates of different types of deception. Social Behaviour and Personality, 40(4), 575-584. https://doi. org/10.2224/sbp.2012.40.4.575Köhnken, G. (2004). Statement validity analysis and the “detection of the truth.” En P. A. Granhag & L. Strömwall (Eds.), The detection of deception in forensic contexts (pp. 41-63). Cambridge University Press. https://psycnet.apa.org/doi/10.1017/ CBO9780511490071.003Lemos, S. (2005). Simulación, engaño y mentira. Papeles del psicólogo, 26(92), 57-58. http://www.papelesdelpsicologo.es/pdf/1246.pdfLeue, A., & Beauducel, A. (2015). Effects of injustice sensitivity and sex on the P3 amplitude during deception. Biologycal Psychology, 109, 29-36. https://www. ncbi.nlm.nih.gov/pubmed/25910957Ley 1090 de 2006. Por la cual se reglamenta el ejercicio de la profesión de Psicología, se dicta el Código Deontológico y Bioético y otras disposiciones. Diario Oficial N.º 46383 del 6 de septiembre de 2006. Congreso de la República de Colombia. https://www.funcionpublica.gov.co/eva/gestornormativo/norma.php?i=66205Ley 906 de 2004. Por la cual se expide el Código de Procedimiento Penal. Congreso de la República de Colombia. https://www.funcionpublica.gov.co/eva/ gestornormativo/norma.php?i=14787Li, D., & Santos, E. (2013). Deception Detection using Human Reasoning [Conferencia]. 2011 IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, EE. UU. https://doi.org/10.1109/ICSMC.2011.6083660Manzanero, A. (2009). Análisis de contenido de memorias autobiográficas falsas. Anuario de Psicología Jurídica, 19, 61-72. https://eprints.ucm.es/id/eprint/11019/Manzanero, A., & González, J. (2015). Modelo holístico de evaluación de la prueba testifical (HELPT). Papeles del psicólogo, 36(2), 125-138. http://www. papelesdelpsicologo.es/pdf/2568.pdfMasip, J. (2005). ¿Se pilla antes a un mentiroso que a un cojo? Sabiduría popular frente a conocimiento científico sobre la detección no-verbal del engaño. Papeles del psicólogo, 26(92), 78-91. http://www.redalyc.org/articulo.oa?id=77809203Masip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.xMatsumoto, D., & Hwang, H. (2015). Differences in Word Usage by Truth Tellers and Liars in Written Statements and an Investigative Interview After a Mock Crime. Journal of Investigative Psychology and Offender Profiling, 12(2), 199-216. https:// doi.org/10.1002/jip.1423Mayer, R. (2005). The Cambridge Handbook of Multimedia Learning (2.ª ed.). Cambridge University Press. https://www.cambridge.org/core/books/ cambridge-handbook-of-multimedia-learning/09E09224829AB8D3D327EF8A 0E9B5288Meijer, E., Bente, G., Ben-Shakhar, G., & Schumacher, A. (2013). Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback. Frontiers in Psychology, 68(4), 1-6. https://doi.org/10.3389/fpsyg.2013.00068Meijer, E., Verschuere, B., Gamer, M., Merckelbach, H., & Ben Shakhar, G. (2016). Deception detection with behavioral, autonomic, and neural measures: Conceptual and methodological considerations that warrant modesty. Psychophysiology, 53(5), 593-604. https://doi.org/10.1111/psyp.12609Mora, G. (1998). Valores humanos y actitudes positivas. McGraw-Hill.Nahari, G. (2018). The applicability of the verifiability approach to the real world. En J. P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 329-349). Elsevier Academic Press. https://doi.org/10.1016/ B978-0-12-812729-2.00014-8Núñez, M., & Riviére, A. (1994). Engaño, intenciones y creencias en el desarrollo y evolución de una psicología natural. Estudios de Psicología, 15(52), 83-128. https://doi.org/10.1174/02109399460579006Oberlader, V., Naefgen, C., Koppehele, J., Quinten, L., & Schmidt, A. (2016). Validity of Content-Based Techniques to Distinguish True and Fabricated Statements: A Meta-Analysis. Law and Human Behavior, 40(4), 440-457. http://dx.doi. org/10.1037/lhb0000193Olekalns, M., & Smith, P. (2009). Mutually dependent: power, trust, affect and the use of deception in negotiation. Journal of Business Ethics, 85, 347-365. https://doi. org/10.1007/s10551-008-9774-4Pennebaker, J. (2011). The secret life of pronouns what our words say about us. Bloomsbury Press.Peth, J. (2014). Emotional modulation of memory encoding and retrieval in the concealed Information Test [Tesis de doctorado]. Universitätsklinikum Hamburg- Eppendorf. https://ediss.sub.uni-hamburg.de/handle/ediss/5554?mode=fullPeth, J., Sommer, T., Hebart, M., Vossel, G., Büchel, C., & Gamer, M. (2015). Memory detection using FMRI – Does the encoding context matter? Neuroimage, 113, 164-174. https://doi.org/10.1016/j.neuroimage.2015.03.051Reynoso, C. (2016). Mentira, deshonestidad y corrupción: del hombre “común” al “altruista por obligación”. Universidad de Buenos Aires. http://www.derecho.uba. ar/academica/posgrados/2017-del-hombre-comun-al-altruista-por-obligacion. pdfRoot, P., Foster, K., & Langleben, D. (2010). Emerging Neurotechnologies for Lie- Detection: Promises and Perils. The American Journal of Bioethics, 10(10), 40-48. https://doi.org/10.1080/15265161.2010.519238Rosenfeld, J., Ward, A., Thai, M., & Labokovsky, E. (2015). Superiority of Pictorial Versus Verbal Presentation and Initial Exposure in the P300-Based, Complex Trial Protocol for Concealed Memory Detection. Applied Psychophysiology Biofeedback, 40(2), 61-73. https://pubmed.ncbi.nlm.nih.gov/25772317/Sai, L., Zhou, X., Ding, X., Fu, G., & Sang, B. (2014). Detecting Concealed Information Using Functional Near-Infrared Spectroscopy. Brain Topography, 27, 652-662. https://doi.org/10.1007/s10548-014-0352-zSchwedes, C., & Wentura, D. (2012). The revealing glance: Eye gaze behavior to concealed information. Memory Cognition, 40, 642-651. https://doi.org/10.3758/ s13421-011-0173-1Sip, K., Carmel, D., Marchant, J., Li, J., Petrovic, P., Roestorpff, A., McGregor, W. B., & Frith, C. (2013). When Pinocchio’s nose does not grow: belief regarding lie-detectability modulates production of deception. Frontiers in Human Neuroscience, 7, 1-11. https://psycnet.apa.org/record/2013-08014-001Su, L., & Levine, M. (2016). Does “lie to me” lie to you? An evaluation of facial clues to high-stakes deception. Computer Vision and Image Understanding, 147, 52-68. https://doi.org/10.1016/j.cviu.2016.01.009Ten Brinke, L., & Khambatta, P. (2015). Physically Scarce (vs. Enriched) Environments Decrease the Ability to Tell Lies Successfully. Journal of Experimental Psychology, 114(5), 982-992. https://doi.org/10.1037/xge0000103Ten Brinke, L., & Porter, S. (2012). Cry Me a River: Identifying the Behavioral Consequences of Extremely High-Stakes Interpersonal Deception. Law and Human Behavior, 36(6), 469-477. https://doi.org/10.1037/h0093929Undeutsch, U. (1989). The development of statement reality analysis. En Yuille, J. C. (Ed.), Credibility Assessment (pp. 101-119). Springer. https://doi. org/10.1007/978-94-015-7856-1_6Urra, J. (2002). Tratado de psicología forense. Siglo XXI.Valdez, D. (2001). Teoría de la mente y espectro autista. En D. Valdez (Coord.), Autismo: enfoques actuales para padres y profesionales de la salud y la educación. Fundec. http://espectroautista.info/tc_tmyea.htmlValverde, M., Ruiz, J., & Llor, B. (2013). Valoración de la credibilidad de testimonio: Aplicación del modelo Reality Monitoring. Revista Internacional de Psicología, 12(2), 1-30. http://www.revistapsicologia.org/index.php/revista/article/view/68Vicianova, M. (2015). Historical techniques of lie detection. Europe Journal of Psychology, 11(3), 523-534. https://www.ncbi.nlm.nih.gov/pmc/articles/ PMC4873061/Villar, G., Arciuli, J., & Patterson, H. (2013). Remorse in oral and handwritten false confessions. Legal and Criminological Psychology, 19(2), 255-269. https://doi. org/10.1111/lcrp.12012Vrij, A., & Fisher, R. (2016). Which Lie Detection Tools are Ready for Use in the Criminal Justice System? Journal of Applied Research in Memory and Cognition, 5(3), 302- 307. http://www.sciencedirect.com/science/article/pii/S2211368116300420Vrij, A., & Ganis, G. (2014). Theories in deception and lie detection. En D. C. Raskin, C. R. Honts & J. C. Kircher, Credibility assessment: Scientific research and applications (pp. 301-374). Academic Press. https://doi.org/10.1016/ B978-0-12-394433-7.00007-5Vrij, A., & Granhag, P. (2012). Eliciting cues to deception and truth: What matters are the questions asked. Journal of Applied Research in Memory and Cognition, 1(2), 110-117. https://doi.org/10.1016/j.jarmac.2012.02.004Vrij, A., Granhag, A., & Porter, S. (2010b). Pitfalls and Opportunities in Nonverbal and Verbal Lie Detection. Association for Psychological Science, 11(3), 89-121. https:// journals.sagepub.com/doi/pdf/10.1177/1529100610390861Vrij, A., Granhag, A., Mann, S., & Leal, S. (2010a). Outsmarting the Liars: Toward a Cognitive Lie Detection Approach. Association for Psychological Science, 20(1), 1-5. https://doi.org/10.1177/0963721410391245Walczyk, J., Harris, L., & Mulay, D. (2014). A social-cognitive framework for understanding serious lies: Activation-decision-construction-action theory. New Ideas in Psychology, 34, 22-36. https://www.sciencedirect.com/science/ article/pii/S0732118X14000142Walczyk, J., Roper, K., Seemann, E., & Humphrey, A. (2003). Cognitive mechanisms underlying lying to questions: response time as a cue to deception. Cognitive Applied Psychology, 17(7), 755-774. https://onlinelibrary.wiley.com/doi/ abs/10.1002/acp.914Wang, H., Chang, W., & Zhang, C. (2016). Functional brain network and multichannel analysis for the P300-based brain computer interface system of lying detection. Expert systems with applications, 53, 117-128. https://doi.org/10.1016/j. eswa.2016.01.024Zarate, I. (2003). Valores, civismo familia y sociedad. Rezza.Zuckerman, M., Depaulo, B., & Rosenthal, R. (1981). Verbal and nonverbal communication of deception. En Advances in Experimental Social Psychology (14.ª ed., pp. 1-59). Academic Press.Zvi, L., Nachson, I., & Elaad, E. (2012). Effects of coping and cooperative instructions on guilty and informed innocents’ physiological responses to concealed information. International Journal of Psychophysiology, 84(2), 140-148. https:// doi.org/10.1016/j.ijpsycho.2012.01.022Abe, N., Okuda, J., Suzuki, M., Sasaki, H., Matsuda, T., Mori, E., Tsukada, M., & Fuji, T. (2008). Neural Correlates of True Memory, False Memory, and Deception. Cerebral Cortex, 18(12), 2811-2819. https://doi.org/10.1093/cercor/bhn037Andreassi, J. (2010). Psychophysiology. Human Behavior and Physiological Response (5.ª ed.). Psychology Press. https://www.taylorfrancis.com/books/9780203880340Barrios, B. (2005). El testimonio penal. Editorial Jurídica Ancón. https:// borisbarriosgonzalez.files.wordpress.com/2011/08/el-testimonio-penal-borisbarrios- gonzalez.pdfBen-Shakhar, G., & Elaad, E. (2002). Effects of questions repetition and variation on the efficiency of the guilty knowledge test: A reexamination. Journal of Applied Psychology, 87(5), 972-977. https://pubmed.ncbi.nlm.nih.gov/12395821/Ben-Shakhar, G., Gronau, N., & Elaad, E. (1999). Leakage of relevant information to innocent examinees in the GKT: An attempt to reduce false-positive outcomes by introducing target stimuli. Journal of Applied Psychology, 84(5), 651-660. https://psycnet.apa.org/record/1999-01454-001Borza, D., Itu, R., & Danescu, R. (2018). In the Eye of the Deceiver: Analyzing Eye Movements as a Cue to Deception. Journal of Imaging, 4(120), 1-120. https://doi. org/10.3390/jimaging4100120Bowman, H., Fileti, M., Janssen, D., Su, L., Alsufyani, A., & Wyble, B. (2013). Subliminal Salience Search Illustrated: EEG Identity and Deception Detection on the Fringe of Awareness. Plos One, 8(1), e54258. https://doi.org/10.1371/ journal.pone.0054258Bowman, H., Filetti, M., Alsufyani, A., Janssen, D., & Su, L. (2014). Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. Plos One, 9(3), e90595. https://doi.org/10.1371/journal.pone.0090595Bradley, M., Maclaren, V., & Carle, S. (1996). Deception and no deception in guilty knowledge and guilty actions polygraph tests. Journal of Applied Psychology, 81(2), 153-160. https://psycnet.apa.org/record/1996-00291-004Breska, A., Zaindenberg., D., Gronau, N., & Ben-Shakhar, G. (2014). Psychophysiological Detection of Concealed Information Shared by Groups: An Empirical Study of the Searching CIT. Journal of Experimental Psychology: Applied, 20(2), 136-146. https://doi.org/10.1037/xap0000015Camargo, A., Urrea, C., & Monguí, J. (2016). Medición de Patrones de Actividad Cerebral Registrados con el Equipo de EEG Emotiv-Epoc, como Indicador de Engaño en Estudiantes Universitarios Fundación Universitaria Los Libertadores. http://hdl.handle.net/11371/797Carmel, D., Dayan, E., Naveh, A., Raveh, O., & Ben-Shakhar, G. (2003). Estimating the validity of the Guilty Knowledge Test from simulated experiments: The external validity of mock crime studies. Journal of Experimental Psychology Applied, 9(4), 261-269. https://pubmed.ncbi.nlm.nih.gov/14664677/Carvajal-Builes, J., Gómez-Durán, E., & Barreto, I. (2021). Comportamiento visual y engaño: Una revisión sistematizada. Anuario de psicología, 51(2), 120-129. https://revistes.ub.edu/index.php/Anuario-psicologia/article/view/30221Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2017). Debate sobre la detección del engaño por medio de mediciones neurofisiológicas. En C. Pavajaeu & C. Gutiérrez de Piñeres (Eds.), Neurociencias y derecho: reflexiones sobre la cognición social, el libre albedrío, la dignidad humana, la culpabilidad y la prueba novel (pp. 269-278). Universidad Externado de Colombia.Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2018). Instrumentos, medidas, procedimientos y procedencia de los estudios producidos para la detección del engaño a través de medidas psicofisiológicas. Revista Criminalidad, 60(2), 75-88. http://www.scielo.org.co/pdf/crim/v60n2/1794-3108-crim-60-02-00075.pdfChen, Z., Xue, L., Yiang, C., Wang, L., Mei, W., Zhang, Q., & Zhao, H. (2015). Specific marker of feigned memory impairment: The activation of left superior frontal gyrus. Journal of Forensic and Legal Medicine, 36, 164-171. https://doi. org/10.1016/j.jflm.2015.09.008Choi, H., Kim, S., Lee, S., & Lee, J. (2016). A Possibility of Pupil Diameter as Reliable Index for Lie Detection. International Journal of Psychophysiology, 108, 150. https://doi.org/10.1016/j.ijpsycho.2016.07.43Cook, A., Hacker, D., Webb, A., Osher, D., & Kristjansson, S. (2012). Lyin eyes: Ocularmotor measures of reading reveal deception. Journal of Experimental Psychology, 18(3), 301-313. https://psycnet.apa.org/record/2012-10769-001Crider, A. (2008). Personality and Electrodermal Response Lability: An interpretation. Applied Psychophysiology Biofeedback, 33, 141-148. https://doi.org/10.1007/ s10484-008-9057-yCsaba, K. (2013). The influence of stimulation/accommodation tests for the polygraph examination economy. Forensic Science, 14(4), 1404-1410. http://bit.ly/3yN8iW1Dietrich, A., Hu, X., & Rosenfeld, J. (2014). The Effects of Sweep Numbers Per Average and Protocol Type on the Accuracy of the P300-Based Concealed Information Test. Applied Psychophysiology Biofeedback, 39, 67-73. https://doi.org/10.1007/ s10484-014-9244-yDing, X., Du, X., Lei, D., Hu, C., Fu, G., & Chen, G. (2012). The Neural Correlates of Identity Faking and Concealment: An fMRI Study. Plos One, 7(11), e48639. https://doi.org/10.1371/journal.pone.0048639Ding, X., Gao, X., Fu, G., & Lee, K. (2013). Neural correlates of spontaneous deception: A functional near- infrared spectroscopy (fNIRS) study. Neuropsychologia, 51(4), 704-712. https://doi.org/10.1016/j.neuropsychologia.2012.12.018Ding, X., Sai, L., Fu, G., Liu, J., & Lee, K. (2014). Neural correlates of second-order verbal deception: A functional near-infrared spectroscopy (FNIRS) study. Neuroimage, 87, 505-514. https://doi.org/10.1016/j.neuroimage.2013.10.023Dong, G., Hu, Y., Lu, Q., & Wu, H. (2010). The presentation order of cue and target matters in deception study. Behavioral and Brain Functions, 6(1), 63. https://doi. org/10.1186/1744-9081-6-63Drou, M., & Egan, V. (2018). “I am 13. I am online. U believe me?”: Implications for undercover internet stings. Psychology, Public Policy and Law, 24(1), 80-92. https://doi.org/10.1037/law0000149Ebrahimzadeh, E., Alavi, S., Bijar, A., & Pakkeshal, A. (2013). A novel approach for detection of deception using Smoothed Pseudo Wigner-Ville Distribution (SPWVD). Journal Biomedical Science and Engineering, 6(1), 8-18. https://doi. org/10.4236/jbise.2013.61002Elaad, E. (2011). Effects of Incomplete Information on the Detection of Concealed Crime Details. Applied Psychophysiology Biofeedback, 36, 159-171. https://doi. org/10.1007/s10484-011-9153-2Elaad, E., Ginton, A., & Jungman, N. (1992). Detection measures in real life criminal guilty knowledge tests. Journal of Applied Psychology, 77(5), 757-767. https:// psycnet.apa.org/record/1993-07862-001Elaad, E., & Sommerfeld, E. (2016). Effects of Guilt, Disbelief, and Assessed Lie-Truth Telling Abilities on Physiological Responses in the Guilty Action Test. Psychology, 7(8), 1075-1091. https://doi.org/10.4236/psych.2016.78108Ellmore, T., Mackin, B., & Ng, K. (2018). Saccades and Handedness Interact to Affect Scene Memory. PeerJ, 6, e5969. http://dx.doi.org/10.7717/peerj.5969Farahani, E., & Moradi, M. (2013). A Concealed Information Test with Combination of ERP Recording and Autonomic Measurements. Neurophysiology, 45(3), 223- 233. https://link.springer.com/article/10.1007/s11062-013-9360-yFarwell, L. (2012). Brain fingerprinting: A comprehensive tutorial review of detection of concealed information with event-related brain potentials. Cognitive Neurodynamics, 6, 115-154. https://doi.org/10.1007/s11571-012-9192-2Farwell, L., & Donchin, E. (1991). The truth will out: Interrogative polygraphy (“Lie detection”) with event-related brain potentials. Psychophysiology, 28(5), 531-547. https://doi.org/10.1111/j.1469-8986.1991.tb01990.xFarwell, L., & Smith, S. (2001). Using brain MERMER testing to detect concealed knowledge despite efforts to conceal. Journal of Forensic Sciences, 46(1), 1135- 1143. https://www.ncbi.nlm.nih.gov/pubmed/11210899Ferro, J. (2012). Perfiles criminales interfectos. Editorial Formación Alcalá.Ford, E. (2006). Lie detection: Historical, neuropsychiatric and legal dimensions. International Journal of Law and Psychiatry, 29(3), 159-177. http://dx.doi. org/10.1016/j.ijlp.2005.07.001Fu, H., Qiu, W., Ma, H., & Ma, Q. (2017). Neurocognitive mechanisms underlying deceptive hazard evaluation: An event-related potential investigation. Plos One, 12(8), e0182892. https://doi.org/10.1371/journal.pone.0182892Gamer, M., Klimecki, O., Bauermann, T., Stoeter, P., & Vossel, G. (2012). fMRIactivation patterns in the detection of concealed information rely on memoryrelated effects. Scan, 7(5), 506-515. https://doi.org/10.1093/scan/nsp005Gamer, M., & Perstzov, Y. (2018). Detecting conceal knowledge from ocular response. En P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 169-186). Academic press.Ganis, G., Rosenfeld, J., Meixner, J., Kievit, R., & Schendan, S. (2011). Lying in the scanner: Covert countermeasures disrupt deception detection by functional magnetic resonance imaging. Neuroimage, 55(1), 312-319. https://doi. org/10.1016/j.neuroimage.2010.11.025Gao, J., Lu, L., Yang, Y., Yu, G., Na, L., & Rao, N. (2012). A Novel Concealed Information Test Method Based on Independent Component Analysis and Support Vector Machine. Clinical EEG and Neuroscience, 43(1), 54-63. https:// doi.org/10.1177/1550059411428715Gao, J., Qiu, J., Zhang, W., & Yang, Y. (2014). Feature, optimize and classification of EEG signals: Application to lie detection using KPCA and ELM. Sensors and Transducers, 169(4), 235-240. https://www.sensorsportal.com/HTML/DIGEST/ april_2014/Vol_169/P_RP_0109.pdfGao, J., Wang, Z., Yang, Y., Zhang, W., Tao, C., Guan, J., & Rao, N. (2013). A Novel Approach for Lie Detection Based on F-Score and Extreme Learning Machine. Plos One, 8(6), e64704. https://doi.org/10.1371/journal.pone.0064704Gao, J., Yan, X., Sun, J., & Zheng, C. (2011). Denoised P300 and machine learningbased concealed information test method. Computer Methods and Programs in Biomedicine, 104, 410-417. https://doi.org/10.1016/j.cmpb.2010.10.002Glannon, W. (2014). The limitation and potential of neuroimaging in the criminal law. Journal of Ethics, 18(2), 153-170. https://doi.org/10.1007/s10892-014-9169-yGutiérrez de Piñeres, C., & Carvajal-Builes, J. (2021). Evaluación de la calidad metodológica de estudios en psicología del testimonio: psicofisiología del engaño. En L. Jiménez-Ardila & E. López-Cantero (Eds.), Psicología jurídica aplicada (pp. 97-110). Editorial Universidad Católica de Colombia. https://www. doi.org/10.14718/9789585133716.2021Hadar, A., Makris, S., & Yarrow, K. (2012). The truth-telling motor cortex: Response competition in M1 discloses deceptive behaviour. Biological Psychology, 89(2), 495-502. https://doi.org/10.1016/j.biopsycho.2011.12.019Haynes, J. (2008). Detecting deception from neuroimaging signals - a datadriven perspective. Trends in Cognitive Sciences, 12(4), 127-128. https://doi. org/10.1016/j.tics.2008.01.003Honts, C. (2014). Countermeasures and credibility assessment. En D. C. Raskin, C. R. Honts, & J. C. Kircher (Eds.), Credibility Credibility assessment: Scientific research and applications (pp. 131-158). Elsevier Academic press.Honts, C., & Reavy, R. (2015). The comparison question polygraph test: A contrast of methods and scoring. Physiology and Behavior, 143, 15-26. https://doi. org/10.1016/j.physbeh.2015.02.028Honts, C., Rodes, R., & Raskin, R. (1985). Effects of physical countermeasures on the physiological detection of deception. Journal of Applied Psychology, 70(1), 177- 187. https://pubmed.ncbi.nlm.nih.gov/3972762/Hu, X., Pornpattananangkul, N., & Nusslock, R. (2015). Executive control- and rewardrelated neural processes associated with the opportunity to engage in voluntary dishonest moral decision making. Cognitive Affective, Behavior Neuroscience, 15, 475-491. https://doi.org/10.3758/s13415-015-0336-9Hu, X., Pornpattananangkul, N., & Nusslock, R. (2015). Executive control- and rewardrelated neural processes associated with the opportunity to engage in voluntary dishonest moral decision making. Cognitive Affective, Behavior Neuroscience, 15, 475-491. https://doi.org/10.3758/s13415-015-0336-9Isaychev, S., Edrenkin, I., Chernorizov, A., & Isaychev, E. (2011). Event related potentials in deception detection. Psychology in Russia, 4, 438-447. http:// psychologyinrussia.com/volumes/index.php?article=1459Ito, A., Abe, N., Fujii, T., Hayashi, A., Ueno, A., Mugikura, S., Takahashi, S., & Mori, E. (2012). The contribution of the dorsolateral prefrontal cortex to the preparation for deception and truth-telling. Brain Research, 1464, 43-52. https://doi. org/10.1016/j.brainres.2012.05.004Jung, E., Kang, K., & Kim, Y. (2013). Frontoparietal activity during deceptive responses in the P300-based guilty knowledge test: An sLORETA study. Neuroimage, 78, 305-315. https://doi.org/10.1016/j.neuroimage.2013.04.027Karton, I., Palu, A., Jõks, K., & Bachmann, T. (2014). Deception rate in a “lying game”: Different effects of excitatory repetitive transcranial magnetic stimulation of right and left dorsolateral prefrontal cortex not found with inhibitory stimulation. Neuroscience Letters, 583, 21-25. https://doi.org/10.1016/j.neulet.2014.09.020Kim, K., Kim, J., & Lee, J. (2016). Guilt, lying, and attentional avoidance of concealed information. Social Behavior and Personality, 44(9), 1267-1276. https://doi. org/10.2224/sbp.2016.44.9.1467Kircher, J. (2018). Ocular motor deception test. En P. Rosenfeld (Ed.), Detecting concealed information and deception (pp. 187-212). Academic press. https://doi. org/10.1016/C2016-0-03911-6Kircher, J., & Raskin, D. (1988). Human versus computerized evaluations of polygraph data in a laboratory setting. Journal of Applied Psychology, 73(2), 291-302. https:// psycnet.apa.org/record/1988-25140-001Kleinberg, B., & Verschuere, B. (2016). The role of motivation to avoid detection in reaction time-based concealed information detection. Journal of Applied Research in Memory and Cognition, 5(1), 43-51. https://doi.org/10.1016/j. jarmac.2015.11.004Kosheleva, E., Spadoni, A., Strigo, I., Buchsbaum, M., & Simmons, A. (2016). Faking bad: The neural correlates of feigning memory impairment. Neuropsychology, 30(3), 377-384. https://pubmed.ncbi.nlm.nih.gov/26765340/Kovalev, A., Luniakova, E., & Menshikova, G. (2016). Using eye movement characteristics for detecting deception. International Journal of Psychophysiology, 108, 161. https://doi.org/10.1016/j.ijpsycho.2016.07.463Kubo, K., & Nittono, H. (2009). The Role of Intention to Conceal in the P300-based Concealed Information Test. Applied Psychophysiology Biofeedback, 34, 227-235. https://doi.org/10.1007/s10484-009-9089-yLabkovsky, E., & Rosenfeld, J. (2012). The P300-Based, Complex Trial Protocol for Concealed Information Detection Resists Any Number of Sequential Countermeasures Against Up to Five Irrelevant Stimuli. Applied Psychophysiology Biofeedback, 37, 1-10. https://doi.org/10.1007/s10484-011-9171-0Leal, S., & Vrij, A. (2008). Blinking During and After Lying. Journal Nonverbal Behavior, 32, 187-194. https://doi.org/10.1007/s10919-008-0051-0Liang, C., Xu, Z., Mei, W., Wang, L., Xue, L., Lu, D., & Zhao, H. (2012). Neural correlates of feigned memory impairment are distinguishable from answering randomly and answering incorrectly: An fMRI and behavioral study. Brain and Cognition, 79(1), 70-77. https://doi.org/10.1016/j.bandc.2012.01.009Lisofsky, N., Kazzer, P., Heekeren, H., & Prehn, K. (2014). Investigating socio-cognitive processes in deception: A quantitative meta-analysis of neuroimaging studies. Neuropsychologia, 61, 113-122. https://doi.org/10.1016/j. neuropsychologia.2014.06.001Liu, Y., Wang, C., Jiang, H., He, H., & Chen, F. (2017). Lie construction affects information storage under high memory load conditions. Plos One, 12(7), e0181007. https://doi.org/10.1371/journal.pone.0181007Luna, G. (2014). Reducción de ruido en señales de electroencefalograma: una aplicación para mejorar las imágenes de mapeo cerebral. Revista Electrónica de Biomedicina, 3, 18-25. https://biomed.uninet.edu/2014/n3/luna.htmlLykken, D. (1988). Detection of Guilty Knowledge: A Comment on Foreman and McCauley. Journal of Applied Psychology, 73(2), 303-304. https://psycnet.apa. org/record/1988-25141-001Mahoney, E., Kapur, N., Osmon, D., & Hannula, D. (2017). Eye Tracking as a Tool for the Detection of Simulated Memory Impairment. Journal of Applied Research in Memory and Cognition, 7(3), 441-453. https://doi.org/10.1016/j. jarmac.2018.05.004Marchak, F. (2013). Detecting false intent using eye blink measures. Frontiers in Psychology, 736(4), 1-9. https://doi.org/10.3389/fpsyg.2013.00736Matsuda, I., Nittono, H., & Allen, J. (2013). Detection of concealed information by P3 and frontal EEG asymmetry. Neuroscience Letters, 537, 55-59. https://doi. org/10.1016/j.neulet.2013.01.029Matsumoto, D., Hwang, H., Skinner, L., & Frank, M. (2011). Evaluating truthfulness and detecting. FBI Law Enforcement Bulletin, 80(6), 61-68. https://leb.fbi.gov/ articles/featured-articles/evaluating-truthfulness-and-detecting-deceptionMedina, C. (2004). Epilepsia: aspectos clínicos y psicosociales. Editorial Médica Panamericana.Meijer, E., Smulders, F., & Wolf, A. (2009). The Contribution of Mere Recognition to the P300 Effect in a Concealed Information Test. Applied Psychophysiology Biofeedback, 34, 221-226. https://doi.org/10.1007/s10484-009-9099-9Meixner, J., Haynes, A., Winograd, M., Brown, J., & Rosenfeld, J. (2009). Assigned Versus Random, Countermeasure-Like Responses in the P300 Based Complex Trial Protocol for Detection of Deception: Task Demand Effects. Applied Psychophysiology Biofeedback, 34, 209-220. https://doi.org/10.1007/ s10484-009-9091-4Meixner, J., Labkovsky, E., Rosenfeld, J., Winograd, M., Sokolovsky, A., Weishaar, J., & Ullmann, T. (2013). P900: A Putative Novel ERP Component that Indexes Countermeasure Use in the P300-Based Concealed Information Test. Applied Psychophysiology Biofeedback, 38, 121-132. https://doi.org/10.1007/ s10484-013-9216-7Meixner, J., & Rosenfeld, J. (2011). A mock terrorism application of the P300- basedconcealed information test. Psychophysiology, 48(2), 149-154. https://doi. org/10.1111/j.1469-8986.2010.01050.xMertens, R., & Allen, J. (2008). The role of psychophysiology in forensic assessments: Deception detection, ERPs, and virtual reality mock crime scenarios. Psychophysiology, 45(2), 286-298. https://doi. org/10.1111/j.1469-8986.2007.00615.xPasca, V. (2011). Study regarding psychophysiological reactivity values depending on subject’s gender in polygraph testing. Social and Behavioral Sciences, 33, 821-825. https://doi.org/10.1016/j.sbspro.2012.01.236Pavlov, Y., & Zlokazov, K. (2018). Deception detection by means of eye-tracking in the concealed information test. International Journal of Psychophysiology, 131(supl.), 169-184. https://doi.org/10.1016/j.ijpsycho.2018.07.425Pennebaker, J. (2011). The secret life of pronouns what our words say about us. Bloomsbury Press.Peth, J. (2014). Emotional modulation of memory encoding and retrieval in the concealed Information Test [Tesis de doctorado]. Universitätsklinikum Hamburg- Eppendorf. https://ediss.sub.uni-hamburg.de/handle/ediss/5554?mode=fullPeth, J., Sommer, T., Hebart, M., Vossel, G., Büchel, C., & Gamer, M. (2015). Memory detection using fmri -Does the encoding context matter. Neuroimage, 113, 164- 174. https://doi.org/10.1016/j.neuroimage.2015.03.051Piliavin, I., Piliavin, J., & Rodin, J. (1975). Costs, diffusion, and the stigmatized victim. Journal of Personality and Social Psychology, 32(3), 429-438. https://psycnet.apa. org/record/1975-31714-001Proudfoot, J. (2014). Identifying deception using novel technology-based approaches to uncover concealed information [Tesis de doctorado]. Universidad de Arizona. https://www.proquest.com/openview/60c7aeb1839900e0a57fa987acb0f034/1? pq-origsite=gscholar&cbl=18750Proudfoot, J., Jenkins, M., Burgoon, J., & Nunamaker, J. (2015). Deception is in the Eye of the Communicator: Investigating pupil diameter variations in automated deception detection interviews [Conferencia]. 2015 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 97-102), Baltimore, EE. UU. https://doi.org/10.1109/ISI.2015.7165946Proudfoot, J., Jenkins, M., Burgoon, J., & Nunamaker, J. (2016). More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection interactions. Journal of Management Information Systems, 33(2), 332-360. https://doi.org/10.1080/07421222.2016.1205929Rosenfeld, J., Ozsan, I., & Ward, A. (2017). P300 amplitude at Pz and N200/N300 latency at F3 differ between participants simulating suspect versus witness roles in a mock crime. Psychophysiology, 54(4), 640-648. https://doi.org/10.1111/ psyp.12823Rosenfeld, J., Ward, A., Thai, M., & Labokovsky, E. (2015). Superiority of Pictorial Versus Verbal Presentation and Initial Exposure in the P300-Based, Complex Trial Protocol for Concealed Memory Detection. Applied Psychophysiology Biofeedback, 40(2), 61-73. https://pubmed.ncbi.nlm.nih.gov/25772317/Ryberg, J. (2014). When Should Neuroimaging Be Applied in the Criminal Court? On Ideal Comparison and the Shortcomings of Retributivism. Journal of Ethics, 18, 81-99. https://doi.org/10.1007/s10892-014-9166-1Sai, L., Zhou, X., Ding, X., Fu, G., & Sang, B. (2014). Detecting Concealed Information Using Functional Near-Infrared Spectroscopy. Brain Topography, 27, 652-662. https://doi.org/10.1007/s10548-014-0352-zSchofield, C., Johnson, A., Inhonff, A., & Coles, M. (2012). Social anxiety and difficulty disengaging threat: Evidence from eye-tracking. Cognition and Emotion, 26(2), 300-311. https://doi.org/10.1080/02699931.2011.602050Schwedes, C., & Wentura, D. (2012). The revealing glance: Eye gaze behavior to concealed information. Memory Cognition, 40, 642-651. https://doi.org/10.3758/ s13421-011-0173-1Sip, K., Carmel, D., Marchant, J., Li, J., Petrovic, P., Roestorpff, A., McGregor, W., & Frith, C. (2013). When Pinocchio’s nose does not grow: belief regarding lie-detectability modulates production of deception. Frontiers in Human Neuroscience, 7, 1-11. https://doi.org/10.3389/fnhum.2013.00016Sokolovsky, A., Rothenberg, J., Labkovsky, E., Meixner, J., & Rosenfeld, P. (2011). A novel countermeasure against the reaction time index of countermeasure use in the P300-based complex trial protocol for detection of concealed information. International Journal of Psychophysiology, 81(1), 60-63. https://doi.org/10.1016/j. ijpsycho.2011.03.008Sowdwen, S., Wright, G., Banissy, M., Catmur, C., & Bird, G. (2015). Transcranial Current Stimulation of the Temporoparietal Junction Improves Lie Detection. Current Biology, 25(18), 2447-2451. https://doi.org/10.1016/j.cub.2015.08.014Staunton, C., & Hammond, S. (2011). An Investigation of the Guilty Knowledge Test Polygraph Examination. Journal of Criminal Psychology, 1(1), 1-14. http://dx.doi. org/10.1108/20093829201100001Ströfer, S., J, N., Ufkes, E., & Giebels, E. (2015). Deceptive Intentions: Can Cues to Deception Be Measured before a Lie Is Even Stated? Plos One, 10(5), e0125237. https://doi.org/10.1371/journal.pone.0125237Sun, D., Chan, C., & Lee, T. (2012). Identification and Classification of Facial Familiarity in Directed Lying: An ERP Study. Plos One, 7(2), e31250. https://doi. org/10.1371/journal.pone.0031250Teufel, C., Alexis, D., Todd, H., Lawrence, A., Clayton, N., & Davis, G. (2009). Social Cognition Modulates the Sensory Coding of Observed Gaze Direction. Current Biology, 19(15), 1274-1277. https://doi.org/10.1016/j.cub.2009.05.069Tomer, E., Lupu, T., Golan, L., Wagner, M., & Braw, Y. (2018). Eye tracking as a mean to detect feigned cognitive impairment in the word memory test. Applied Neuropsychology: Adult, 27(1), 1-13. https://doi.org/10.1080/23279095.2018.14 80483Twyman, N., Lowry, P., Burgoon, J., & Nunamaker, J. (2014). Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals. Journal of Management Information Systems, 31(3), 106-137. https://doi.org/10.1080/07421222.2014.995535Urra, J. (2002). Tratado de psicología forense. Editorial Siglo XXI.Vartanian, O., Kwantes, P., & Mandel, D. (2012). Lying in the scanner: Localized inhibition predicts lying skill. Neuroscience Letters, 529(1), 18-22. https://doi. org/10.1016/j.neulet.2012.09.019Vicianova, M. (2015). Historical techniques of lie detection. Europe Journal of Psychology, 11(3), 523-534. https://www.ncbi.nlm.nih.gov/pmc/articles/ PMC4873061/Visu, G., Bus, I., & Miclea, I. (2011). Detecting concealed information from a mock crime scenario by using psychophysiological and RT-based measures. Cognition, Brain, Behavior. An Interdisciplinary Journal, 15(1), 19-37. https://psycnet.apa. org/record/2011-07359-002Vrij, A. (2008). Detecting lies and deceit: Pitfalls and opportunities. Wiley-Interscience.Vrij, A., Oliveira, J., Hammond, A., & Erhlichman, H. (2015). Saccadic eye movement rate as cue to deceit. Journal of Applied Research of Memory and Cognition, 4(1), 15- 19. https://www.sciencedirect.com/science/article/abs/pii/S221136811400062XWalczyk, J., Griffith, D., Yates, R., Visconte, S., & Simoneaux, B. (2013). Eye movements and other cognitive cues to rehearsed and unrehearsed deception when interrogated about a mock crime. Applied Psychology in Criminal Justice, 9(1), 1-23. https://psycnet.apa.org/record/2013-27516-001Wang, H., Chang, W., & Zhang, C. (2016). Functional brain network and multichannel analysis for the P300-based brain computer interface system of lying detection. Expert systems with applications, 53, 117-128. https://doi.org/10.1016/j. eswa.2016.01.024Wang, Y., Chun, W., Siong, K., Yu, K., Wu, T., & Li, X. (2015). An Electroencephalography Network and Connectivity Analysis for Deception in Instructed Lying Tasks. Plos One, 10(2), e0116522. https://doi.org/10.1371/journal.pone.0116522Warmelin, L., Vrij, A., Mann, S., Leal, S., Forrester, D., & Fisher, R. (2011). Thermal Imaging as a Lie Detection Tool at Airports. Law Human Behavior, 35(1), 40-48. https://doi.org/10.1007/s10979-010-9251-3Zhao, M., Zheng, C., & Zhao, C. (2012). A New Approach for Concealed Information Identification Based on ERP Assessment. Journal of Medical Systems, 36, 2401- 2409. https://doi.org/10.1007/s10916-011-9707-0Zvi, L., Nachson, I., & Elaad, E. (2012). Effects of coping and cooperative instructions on guilty and informed innocents’ physiological responses to concealed information. International Journal of psychophysiology, 84(2), 140-148. https:// pubmed.ncbi.nlm.nih.gov/22330977/Ali, M., & Levine, T. (2008). The language of truthful and deceptive denials and confessions. Communication Reports, 21(2), 82-91. https://doi. org/10.1080/08934210802381862Amado, B., Arce, R., & Fariña, F. (2015). Undeutsch hypothesis and criteria based content analysis: a meta-analytic review. The European Journal of Psychology Applied to Legal Context, 7(1), 3-12. https://doi.org/10.1016/j.ejpal.2014.11.002Amado, B., Vilariño, M., & Novo, M. (2016). Análisis de contenido en declaraciones de agresores. Una revisión meta-analítica. En A. Pueyo, F. Fariña, M. Novo & D. Seijo (Eds.), Avances en psicología jurídica y forense (pp. 53-61). Sociedad Española de Psicología Jurídica y Forense. http://sepjf.org/wp-content/uploads/2018/12/ Vol.13.Avances_psicologa_jurdica_forense.pdfAndreú, A. (2000). Las técnicas de análisis de contenido: una revisión actualizada. Fundación Centro Estudios Andaluces, Universidad de Granada, 10(2), 1-34. https://abacoenred.org/wp-content/uploads/2019/02/Las-técnicas-de-análisisde- contenido-una-revisión-actualizada.pdfArce, R., & Fariña, F. (2005). Peritación psicológica de la credibilidad del testimonio, la huella psíquica y la simulación: el sistema de evaluación global (SEG). Papeles del psicólogo, 26, 59-77. http://www.papelesdelpsicologo.es/pdf/1247.pdfArce, R., & Fariña, F. (2006). Psicología del testimonio y evaluación cognitiva de la veracidad de testimonios y declaraciones. En J. C. Sierra, E. M. Jiménez & G. Buela-Casal (Coords.), Psicología forense: Manual de técnicas y aplicaciones (pp. 563-601). Biblioteca Nueva. https://uforense.org/wp-content/uploads/2020/12/2006- psicologxa-del-testimonio-xarce-y-farixax-2006x-2020-12-22.pdfArciuli, J., Mallard, D., & Villar, G. (2010). “Um, I can tell you’re lying”: Linguistic markers of deception versus truth-telling in speech. Applied Psycholinguistics, 31(3), 397-411. https://doi.org/10.1017/S0142716410000044Ball, L., & Elworthy, J. (2014). Fake or real? The computational detection of online deceptive text. Journal of Marketing Analytics, 2, 187-201. https://doi.org/10.1057/ jma.2014.15Barreto, I. (2020). Análisis estadísticos de datos textuales. En P. Páramo (Ed.), La investigación en ciencias sociales: La historia del método y su filosofía (pp. 449- 466). Lemoine Editores.Bermeosolo, J. (2012). Memoria de trabajo y memoria procedimental en las dificultades específicas del aprendizaje y del lenguaje: algunos hallazgos. Revista Chilena de Fonoaudiología, 11, 57-75. https://auroradechile.uchile.cl/index.php/RCDF/ article/view/24516/25890Braun, M., & van Swol, L. (2016). Justifications offered, questions asked, and linguistic patterns in deceptive and truthful monetary interactions. Group Decision Negotiation, 25, 641-661. https://doi.org/10.1007/s10726-015-9455-5Braun, M., van Swol, L., & Vang, L. (2015). His lips are moving: Pinocchio effect and other lexical indicators of political deceptions. Discourse Processes, 52(1), 1-20. https://doi.org/10.1080/0163853X.2014.942833Biber, D. (1988). Variation Across Speech and Writing. Cambridge University Press.Braun, M., & van Swol, L. (2016). Justifications offered, questions asked, and linguistic patterns in deceptive and truthful monetary interactions. Group Decision Negotiation, 25, 641-661. https://doi.org/10.1007/s10726-015-9455-5Burns, M., & Muffitt, K. (2014). Automated deception detection of 911 call transcripts. Security Informatics, 3, 8. http://www.security-informatics.com/content/3/1/8Carvajal-Builes, J. C., Barreto, I., & Gutiérrez de Piñeres, C. (2024). Deception detection based on the linguistic style of honest and dishonest stories. Journal of Forensic Practice, 26(1), 46-59. https://doi.org/10.1108/JFP-07-2023-0035Chen, C., Churyk, N., & Clinton, D. (2013). Detect fraud before catastrophe. Strategic Finance, 94(9), 33-37. https://sfmagazine.com/wp-content/uploads/ sfarchive/2013/03/Detect-Fraud-Before-Catastrophe.pdfChung, C. K., & Pennebaker, J. (2014). Counting little words in big data: The psychology of communities, culture, and history. En J. P. Forgas, O. Vincze & J. László (Eds.), Social cognition and communication (pp. 25-42). Psychology Press. https://psycnet.apa.org/record/2013-28261-002Churyk, N., Chen, C., & Clinton, D. (2008). Can we detect fraud earlier? Strategic Finance, 90(4), 51-55. https://www.proquest.com/scholarly-journals/ can-we-detect-fraud-earlier/docview/229760202/se-2Crabb, E. (2014). “Time for some traffics problems”. Enhancing E-discovery and big data processing tools with linguistic methods for deception detection. Journal of Digital Forensics, Security and Law, 9(2), 14. https://doi.org/10.15394/ jdfsl.2014.1179Craig, R., Mortensen, T., & Iyer, S. (2013). Exploring Top Management Language for Signals of Possible Deception: The Words of Satyam’s Chair Ramalinga Raju. Journal Bus Ethics, 113, 333-347. https://doi.org/10.1007/s10551-012-1307-5Duran, N., Crossley, S., Hall, C., & McCarthy, P. (2009). Expanding a Catalogue of Deceptive Linguistic Features with NLP Technologies [Conferencia]. Twenty- Second International Florida Artificial Intelligence Research Society Conference. FLAIRS-22.Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068Drou, M., & Egan, V. (2018). “I am 13. I am online. U believe me?”: Implications for undercover internet stings. Psychology, Public Policy and Law, 24(1), 80-92. https://doi.org/10.1037/law0000149Enos, F. (2009). Detecting Deception in Speech [Tesis de doctorado]. Universidad de Columbia. http://www1.cs.columbia.edu/~frank/enos_thesis.pdfFeng, S. (2014). Learning the Intention embedded in the Natural Language Texts: Focused Studies on Connotation and Deception. Stony Brook University.Foerster, A., Wirth, R., Kunde, W., & Pfister, R. (2017). The dishonest mind set in sequence. Psychological Research, 81, 878-899. https://doi.org/10.1007/ s00426-016-0780-3Fornaciari, T., & Poesio, M. (2013). Automatic deception detection in Italian court cases. Artificial Intelligence and Law, 21, 303-340. https://doi.org/10.1007/ s10506-013-9140-4Fuller, C., Biros, D., Burgoon, J., & Nunamaker, J. (2013). An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception. Group Decision Negotiation, 22, 117-134. https://doi.org/10.1007/s10726-012-9300-zFuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Applications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032Fuller, C., Biros, D., & Wilson, R. (2009). Decision support for determining veracity via linguistic-based cues. Decision Support Systems, 46(3), 695-703. https://doi. org/10.1016/j.dss.2008.11.001Fuller, C., Twitchell, D., Biros, D., & Wilson, R. (2015). Real-world deception and the impact of severity. Journal of Computer Information System, 55(2), 59-67. https:// doi.org/10.1080/08874417.2015.11645757Goel, S., Gangolly, J., Faerman, S., & Uzuner, O. (2010). Can linguistic predictors detect fraudulent financial fillings? Journal of Emerging Technologies in Accounting, 7(1), 25-46. https://doi.org/10.2308/jeta.2010.7.1.25Hancock, J. (2007). Digital deception: Why, when and how people lie online. En A. Joinson et al. (Eds.), Oxford Handbook of Internet Psychology (pp. 289-302). Oxford Library of Psychology. https://doi.org/10.1093/oxfordhb/9780199561803.013.0019Hernández, A., & Calvo, H. (2017). Deceptive text detection using continuous semantic space models. Intelligent Data Analysis, 21(3), 679-695. https://doi.org/10.3233/ IDA-170882Jennings, M. (2015). Psychophysiological Significance of Successful Deception in Comparison with Unsuccessful Deception. Widener University. https://ezborrow. reshare.indexdata.com/Record/2a2a31a1-1f21-464d-8d87-cae0e6c84822Jupe, L., Vrij, A., Leal, S., & Nahari, G. (2018). Are you for real? Exploring language use and unexpected process questions within the detection of identity deception. Applied Cognitive Psychology, 1(13), 622-634. https://doi.org/10.1002/acp.3446Hauch, V., Blandón, J., Masip, J., & Sporer, S. (2015). Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Personality and Social Psychology Review, 19(4), 307-342. https://doi.org/10.1177/1088868314556539Kahn, A. (2015). New Methods for Detecting Deceptive Product Reviews [Tesis de maestría]. Universidad de Washington. https://digital.lib.washington.edu/ researchworks/handle/1773/33997Kahneman, D. (2011). Thinking, fast and slow. Macmillan.Kleinberg, B., Mozes, M., Arntz, A., & Verschuere, B. (2017). Using Named Entities for Computer- Automated Verbal Deception Detection. Journal of Forensic Sciences, 63(3), 714-723. https://doi.org/10.1111/1556-4029.13645Köhnken, G., Manzanero, A., & Scott, M. (2015). Análisis de la Validez de las Declaraciones: mitos y limitaciones. Anuario de Psicología Jurídica, 25(1), 13-19. https://www.redalyc.org/pdf/3150/315040291003.pdfLamb, C., & Skillincorn, D. (2013). Detecting deception in interrogation settings [Conferencia]. 2013 IEEE International Conference on Intelligence and Security Informatics (pp. 160-162), Seattle, EE. UU. https://ieeexplore.ieee.org/ document/6578809Lee, C. (2017). Multilingualism Online. Routledge. https://doi.org/10.4324/ 9781315707211Lee, C., Welker, R., & Odom, M. (2009). Features of computer-mediated, text-based messages that support automatable, linguistic-based indicator for deception detection. Journal of Information Systems, 23(1), 5-24. https://doi.org/10.2308/ jis.2009.23.1.24Leue, A., & Beauducel, A. (2015). Effects of injustice sensitivity and sex on the P3 amplitude during deception. Biological Psychology, 109, 29-36. https://www.ncbi. nlm.nih.gov/pubmed/25910957Li, D. (2013). Deception Detection using Human Reasoning [Conferencia]. 2011 IEEE International Conference on Systems, Man, and Cybernetics (pp. 165-172), Anchorage, AK, EE. UU. https://ieeexplore.ieee.org/document/6083660Ludwig, S., van Laer, T., de Ruyter, K., & Friedman, M. (2016). Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication. Journal of Management Information System, 33(2), 511-541. https://doi.org/10.1080/07421222.2016.1205927Manzanero, A. (2009). Análisis de Contenido de Memorias Autobiográficas Falsas. Anuario de Psicología Jurídica, 19, 61-72. https://eprints.ucm.es/id/eprint/11019/Manzanero, A., & González, J. (2015). Modelo holístico de evaluación de la prueba testifical (HELPT). Papeles del psicólogo, 36(2), 125-138. http://www. papelesdelpsicologo.es/pdf/2568.pdfMasip, J. (2005). ¿Se pilla antes a un mentiroso que a un cojo? Sabiduría popular frente a conocimiento científico sobre la detección no-verbal del engaño. Papeles del psicólogo, 26(92), 78-91. http://www.redalyc.org/articulo.oa?id=77809203Masip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.xMasip, J., Garrido, E., & Herrero, C. (2002). La detección de la mentira mediante la Técnica Scan. Psicopatología Clínica, Legal y Forense, 2(2), 39-62. https://www. researchgate.net/publication/235685664Matsumoto, D., & Hwang, H. (2015). Differences in Word Usage by Truth Tellers and Liars in Written Statements and an Investigative Interview After a Mock Crime. Journal of Investigative Psychology and Offender Profiling, 12(2), 199-216. https:// doi.org/10.1002/jip.1423Nahari, G. (2018). The applicability of the verifiability approach to the real world. En J. P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 329-349). Elsevier Academic Press. https://doi.org/10.1016/ B978-0-12-812729-2.00014-8Oberlader, V., Naefgen, C., Koppehele, J., Quinten, L., & Schmidt, A. (2016). Validity of Content-Based Techniques to Distinguish True and Fabricated Statements: A Meta-Analysis. Validity of Content-Based Techniques to Distinguish True and Fabricated Statements: A Meta-Analysis, 40(4), 440-457. http://dx.doi. org/10.1037/lhb0000193Pan, X., Zhao, H., & Zhou, Y. (2015). The application of fractional Mel cepstral coefficient in deceptive speech detection. PeerJ, 3, e1194. https://doi.org/10.7717/ peerj.1194Pennebaker, J. (2011). The secret life of pronouns what our words say about us. Bloomsbury Press.Pennebaker, J., Mehl, M., & Niederhoffer, K. (2003). Psychological aspects of natural language use: Our world, our selves. Annual Review of Psychology, 54, 547-577. https://doi.org/10.1146/annurev.psych.54.101601.145041Pérez-Rosas, V., & Mihalcea, R. (2014). Gender differences in deceivers writing style. En Human-Inspired Computing and Its Applications (pp. 163-174). Universidad de Michigan. https://doi.org/10.1007/978-3-319-13647-9_17Ramírez, N., Pennebaker, J., García, F., & Suriá, R. (2007). La psicología del uso de las palabras: Un programa de computadora que analiza textos en español. Revista Mexicana de Psicología, 24(1), 85-99. https://www.redalyc.org/articulo. oa?id=243020635010Richardson, B., Taylor, P., Snook, B., & Conchie, S. (2014). Language style and police interrogation outcomes. Law and Human Behavior, 38(4), 357-366. https://doi. org/10.1037/lhb0000077Roche, J., & Arnold, H. (2018). The Effects of Emotion Suppression During Language Planning and Production. Journal of Speech, 61(8), 1-8. https://doi. org/10.1044/2018_JSLHR-L-17-0232Ruiz, J., Cuevas, I., & López, I. (1998). El proceso de control de la realidad en sujetos con propensión a la alucinación. Psicothema, 10(1), 41-52. http://www.psicothema. com/pdf/141.pdfSalvetti, F. (2012). Detecting Deception in Text: A Corpus-Driven Approach [Tesis de doctorado]. Universidad de Colorado. https://scholar.colorado.edu/concern/ file_sets/rx913q180Sarwar, F., Sikström, S., Allwood, C., & Ker, A. (2015). Predicting correctness of eyewitness statements using the semantic evaluation method (SEM). Quality and Quantity, 49, 1735-1745. https://doi.org/10.1007/s11135-014-9997-7Sboev, A., Moloshnikiv, I., Gudovskikh, D., Selivanov, A., Rybka, R., & Litvinova, T. (2018). Automatic gender identification of author of Russian text by machine learning and neuralnet algorithms in case of gender deception. Procedia Computer Science, 123, 417-423. https://doi.org/10.1016/j.procs.2018.01.064Schelleman, K., & Merckelbach, H. (2010). Fantasy proneness as a confounder of verbal lie detection tools. Journal of Investigative Psychology and Offender Profiling, 7(3), 247-260. https://doi.org/10.1002/jip.121Scott, T., & Manzanero, A. (2015). Análisis del expediente judicial: Evaluación de la validez de la prueba testifical. Papeles del psicólogo, 36(2), 139-144. https://www. redalyc.org/articulo.oa?id=77839628007Scott, T., Manzanero, A., Muñoz, J., & Köhnken, G. (2014). Admisibilidad en contextos forenses de indicadores clínicos para la detección del abuso sexual infantil. Anuario de Psicología Jurídica, 24(1), 57-63. https://www.sciencedirect.com/ science/article/pii/S113307401400018XSun, C., Du, Q., & Tian, G. (2016). Exploiting Product Related Review Features for Fake Review Detection. Mathematical Problems in Engineering, 2016, 4935792. https://www.hindawi.com/journals/mpe/2016/4935792/Stone, P., Dunphy, D., Smith, M., & Ogilvie, D. (1966). The General Inquirer: A Computer Approach to Content Analysis. American Journal of Sociology, 73(5), 634-651. https://www.journals.uchicago.edu/doi/pdfplus/10.1086/224539Tausczik, Y., & Pennebaker, J. (2010). The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods. Journal of Language and Social Psychology, 29(1), 24-54. https://doi.org/10.1177/0261927X09351676Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A., & Menacre, T. (2013). Detecting insider threats through language change. Law and Human Behavior, 37(4), 267-275. https://doi.org/10.1037/lhb0000032Ten Brinke, L., & Khambatta, P. (2015). Physically Scarce (vs. Enriched) Environments Decrease the Ability to Tell Lies Successfully. Journal of Experimental Psychology, 114(5), 982-992. https://doi.org/10.1037/xge0000103Ten Brinke, L., & Porter, S. (2012). Cry Me a River: Identifying the Behavioral Consequences of Extremely High-Stakes Interpersonal Deception. Law and Human Behavior, 36(6), 469-477. https://doi.org/10.1037/h0093929Throckmorton, C., Mayew, W., Venkatachalam, M., & Collins, L. (2015). Financial fraud detection using vocal, linguistic and financial cues. Decisions Support Systems, 74, 78-87. https://doi.org/10.1016/j.dss.2015.04.006Undeutsch, U. (1989). The development of statement reality analysis. En Yuille, J. C. (Ed.), Credibility Assessment (pp. 101-119). Springer. https://doi. org/10.1007/978-94-015-7856-1_6Valverde, M., Ruiz, J., & Llor, B. (2013). Valoración de la credibilidad de testimonio: Aplicación del modelo Reality Monitoring. Revista Internacional de Psicología, 12(2), 1-30. http://www.revistapsicologia.org/index.php/revista/article/view/68Van Swol, L., & Braun, M. (2014). Communicating Deception: Differences in Language Use, Justifications, and Questions for Lies, Omissions, and Truths. Group Decision Negotiation, 23(6), 1343-1367. http://dx.doi.org/10.1007/s10726-013-9373-3Vásquez, B. (2007). Manual de psicología forense. Síntesis.Villar, G., Arciuli, J., & Patterson, H. (2013). Remorse in oral and handwritten false confessions. Legal and Criminological Psychology, 19(2), 255-269. https://doi. org/10.1111/lcrp.12012Vrij, A. (2008). Detecting lies and deceit: Pitfalls and opportunities. Wiley-Interscience.Vrij, A., Granhag, A., Mann, S., & Leal, S. (2010). Outsmarting the Liars: Toward a Cognitive Lie Detection Approach. Association for Psychological Science, 20(1), 1-5. https://doi.org/10.1177/0963721410391245Vrij, A., Mann, S., Fisher, R., Leal, S., Milne, R., & Bull, R. (2008). Increasing Cognitive Load to Facilitate Lie Detection: The Benefit of Recalling an Event in Reverse Order. Law and Human Behavior, 32(3), 253-265. http://www.jstor.org/ stable/25144624Vrij, A., Mann, S., Kristen, S., & Fisher, R. (2007). Cues to deception and ability to detect lies as a function of police interview styles. Law and Human Behavior, 31(5), 499-518. https://doi.org/10.1007/s10979-006-9066-4Zhao, N., Jiao, D., Bai, S., & Su, T. (2016). Evaluating the Validity of Simplified Chinese Version of LIWC in Detecting Psychological Expressions in Short Texts on Social Network Services. Plos One, 11(6), e0157947. https://pubmed.ncbi.nlm. nih.gov/27322382/Zhou, L., & Zhang, D. (2007). Typing or messaging? Modality effect on deception detection in computer-mediated communication. Decision Support Systems, 44(1), 188-201. https://doi.org/10.1016/j.dss.2007.03.012Arksey, H., & O’Malley, L. (2005). Scoping studies: Towards a methodological framework. International Journal of Social Research Methodology, 8(1), 19-32. https://doi.org/10.1080/1364557032000119616Barrios, B. (2005). El testimonio penal. Editorial Jurídica Ancón. https:// borisbarriosgonzalez.files.wordpress.com/2011/08/el-testimonio-penal-borisbarrios- gonzalez.pdfCarvajal-Builes, J., & Barreto, I. (2022). Detección del engaño a partir del estilo lingüístico: una revisión sistematizada. En E. López-Cantero, P. Ruiz, L. Jiménez, A. Lobo & M. Támara (Eds), Psicología jurídica: género, contexto y enfoques para la comprensión del comportamiento antijurídico (pp. 173-183). Manual Moderno.Carvajal-Builes, J., Gómez-Durán, E., & Barreto, I. (2021). Comportamiento visual y engaño: Una revisión sistematizada. Anuario de psicología, 51(2), 120-129. https://revistes.ub.edu/index.php/Anuario-psicologia/article/view/30221Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2018). Instrumentos, medidas, procedimientos y procedencia de los estudios producidos para la detección del engaño a través de medidas psicofisiológicas. Revista Criminalidad, 60(2), 75-88. http://www.scielo.org.co/pdf/crim/v60n2/1794-3108-crim-60-02-00075.pdfCarvajal-Builes, J., Gutiérrez de Piñeres, C., & Barreto, I. (2020b). Análisis del estilo lingüístico en testigos de referencia y espectadores. En I. F. Medina-Arboleda, I. Barreto, D. R. Aguilar-Pardo, & M. C. Sandoval-Escobar (Eds.), Perspectivas y contextos de la prosocialidad y la convivencia (pp. 157-175). Universidad Católica de Colombia. https://repository.ucatolica.edu.co/handle/10983/26286Carvajal-Builes, J., Rhenals, J., Muñóz, T., & Chaparro, S. (2020a). Psicología del testimonio: Evidencia actual de su desarrollo. En L. O. Jiménez-Ardila (Ed.), Subcampos de aplicación de la psicología jurídica (pp. 77-93). Universidad Católica de Colombia. https://repository.ucatolica.edu.co/entities/ publication/5c3fb91f-1a6d-48d4-8a9e-5ddc1144af76Cook, A., Hacker, D., Webb, A., Osher, D., & Kristjansson, S. (2012). Lyin’ eyes: Ocularmotor measures of reading reveal deception. Journal of Experimental Psychology, 18(3), 301-313. https://pubmed.ncbi.nlm.nih.gov/22545928/Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068Masip, J. (2005). ¿Se pilla antes a un mentiroso que a un cojo? Sabiduría popular frente a conocimiento científico sobre la detección no-verbal del engaño. Papeles del psicólogo, 26(92), 78-91. http://www.redalyc.org/articulo.oa?id=77809203Masip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.xMontero, I., & León, O. (2007). A guide for naming research studies in Psychology. International Journal of Clinical and Health Psychology, 7(3), 847-862. https:// www.redalyc.org/pdf/337/33770318.pdfValverde, M., Ruiz, J., & Llor, B. (2013). Valoración de la credibilidad de testimonio: Aplicación del modelo Reality Monitoring. Revista Internacional de Psicología, 12(2), 1-30. http://www.revistapsicologia.org/index.php/revista/article/view/68Ali, M., & Levine, T. (2008). The language of truthful and deceptive denials and confessions. Communication Reports, 21(2), 82-91. https://doi.org/10.1080/ 08934210802381862American Psychiatric Association. (2013). Guía de consulta de los criterios diagnósticos del DSM 5. APA.Amor, P., Echeburúa, E., & Corral, P. (2003). Autoinformes y entrevistas en el ámbito de la psicología clínica forense: limitaciones y nuevas perspectivas. Análisis y modificación de conducta, 29(126), 503-522. https://dialnet.unirioja.es/servlet/ articulo?codigo=761627Arce, R., & Fariña, F. (2005). Peritación psicológica de la credibilidad del testimonio, la huella psíquica y la simulación: el sistema de evaluación global (SEG). Papeles del psicólogo, 26, 59-77. http://www.papelesdelpsicologo.es/pdf/1247.pdfAto, M., López, J., & Benavente, A. (2013). Un sistema de clasificación de los diseños de investigación en psicología. Anales de Psicología, 29(3), 1038-1059. http:// scielo.isciii.es/pdf/ap/v29n3/metolologia.pdfBall, L., & Elworthy, J. (2014). Fake or real? The computational detection of online deceptive text. Journal of Marketing Analytics, 2, 187-201. https://doi.org/10.1057/ jma.2014.15Blandón, I., López, R., Masip, J., & Fenn, E. (2017). Cognición, emoción y mentira: implicaciones para detectar el engaño. Anuario de Psicología Jurídica, 27(1), 95- 106. https://doi.org/10.1016/j.apj.2017.02.004Braun, M., & van Swol, L. (2016). Justifications Offered, Questions Asked, and Linguistic Patterns in Deceptive and Truthful Monetary Interactions. Group Decision Negotiation, 25, 641-661. https://doi.org/10.1007/s10726-015-9455-5Braun, M., van Swol, L., & Vang, L. (2015). His Lips Are Moving: Pinocchio Effect and Other Lexical Indicators of Political Deceptions. Discourse Processes, 52(1), 1-20. https://doi.org/10.1080/0163853X.2014.942833Buller, D., & Burgoon, J. (1994). Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18(2), 155-184. https://link.springer.com/article/10.1007/ BF02170076Cárdenas, M., & Arancibia, H. (2014). Potencia estadística y cálculo del tamaño del efecto en gpower: complementos a las pruebas de significación estadística y su aplicación en psicología. Salud & Sociedad, 5(2), 210-224. https://doi. org/10.22199/s07187475.2014.0002.00006Carvajal-Builes, J., Barreto, I., & Gutiérrez de Piñeres, C. (2024). Deception detection based on the linguistic style of honest and dishonest stories. Journal of Forensic Practice, 26(1), 46-59. https://doi.org/10.1108/JFP-07-2023-0035Carvajal-Builes, J., Gómez-Durán, E., & Barreto, I. (2021). Comportamiento visual y engaño: Una revisión sistematizada. Anuario de psicología, 51(2), 120-129. https://revistes.ub.edu/index.php/Anuario-psicologia/article/view/30221Carvajal-Builes, J., & Gutiérrez de Piñeres, C. (2017). Debate sobre la detección del engaño por medio de mediciones neurofisiológicas. En C. Pavajaeu & C. Gutiérrez de Piñeres (Eds.), Neurociencias y Derecho: reflexiones sobre la cognición social, el libre albedrío, la dignidad humana, la culpabilidad y la prueba novel (pp. 269- 278). Universidad Externado de Colombia.Carvajal-Builes, J., Rhenals, J., Muñóz, T., & Chaparro, S. (2020). Psicología del testimonio: Evidencia actual de su desarrollo. En L. O. Jiménez-Ardila (Ed.), Subcampos de aplicación de la psicología jurídica (pp. 77-93). Universidad Católica de Colombia. https://repository.ucatolica.edu.co/entities/ publication/5c3fb91f-1a6d-48d4-8a9e-5ddc1144af76Cook, A., Hacker, D., Webb, A., Osher, D., & Kristjansson, S. (2012). Lyin’ eyes: Ocularmotor measures of reading reveal deception. Journal of Experimental Psychology, 18(3), 301-313. https://pubmed.ncbi.nlm.nih.gov/22545928/Duran, N., Crossley, S., Hall, C., & McCarthy, P. (2009). Expanding a Catalogue of Deceptive Linguistic Features with NLP Technologies. Twenty-Second International Florida Artificial Intelligence Research Society Conference. FLAIRS-22.Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068Elaad, E., & Reizer, A. (2015). Personality Correlates of the Self-Assessed Abilities to Tell and Detect Lies, Tell Truths, and Believe Others. Journal of Individual Differences, 36(3), 163-169. https://doi.org/10.1027/1614-0001/a000168Enos, F. (2009). Detecting Deception in Speech [Tesis de doctorado]. Universidad de Columbia. http://www1.cs.columbia.edu/~frank/enos_thesis.pdfEscobar, J. (2011). Riqueza de principios en bioética. Revista Colombiana de Bioética, 6(2), 128-138. http://www.redalyc.org/pdf/1892/189222558009.pdfFornaciari, T., & Poesio, M. (2013). Automatic deception detection in Italian court cases. Artificial Intelligence and Law, 21, 303-340. https://doi.org/10.1007/ s10506-013-9140-4Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Aplications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032Fuller, C., Biros, D., Burgoon, J., & Nunamaker, J. (2013). An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception. Group Decision Negotiation, 22, 117-134. https://doi.org/10.1007/s10726-012-9300-zGamer, M., & Ambach, W. (2014). Deception research today. Frontiers in Psychology, 5, 1-3. https://doi.org/10.3389/fpsyg.2014.00256Gamer, M., & Perstzov, Y. (2018). Detecting conceal knowledge from ocular response. En P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 169-186). Academic press.Gao, J., Tian, H., Yang, Y., Yu, X., Li, C., & Rao, N. (2014). A novel algorithm to enhance p300 in single trials: Application to lie detection using F-score and SVM. Plos One, 9(11), e109700. https://doi.org/10.1371/journal.pone.0109700García, E., González, J., & Maestú, F. (2011). Neuronas espejo y teoría de la mente en la explicación de la empatía. Ansiedad y Estrés, 17(2-3), 265-279. https://hdl. handle.net/20.500.14352/42302Goel, S., Gangolly, J., Faerman, S., & Uzuner, O. (2010). Can Linguistic predictors Detect Fraudulent Financial Fillings? Journal of Emerging Technologies in Accounting, 7(1), 25-46. https://doi.org/10.2308/jeta.2010.7.1.25Gómez, P. (2009). Principios básicos de bioética. Revista Peruana Ginecología y Obstetricia, 55(4), 1-12. http://www.redalyc.org/pdf/3234/323428194003.pdfGranhag, A., & Hartwig, M. (2008). A new theoretical perspective on deception detection: On the psychology of instrumental mindreading. Crime and Law, 14(3), 189-200. https://doi.org/10.1080/10683160701645181Gutiérrez de Piñeres, C. (2019). Registro de movimientos oculares con el eye tracker mobile eye XG. Universidad Católica de Colombia. https://hdl.handle. net/10983/23575Hancock, J., Curry, L., Goorha, S., & Woodworth, M. (2007). On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication. Journal Discourse Processes, 45(1), 1-23. https://doi. org/10.1080/01638530701739181Hauch, V., Blandón, J., Masip, J., & Sporer, S. (2015). Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Personality and Social Psychology Review, 19(4), 307-342. https://doi.org/10.1177/1088868314556539Hernández-Castañeda, A., & Calvo, H. (2017). Deceptive text detection using continuous semantic space models. Intelligent Data Analysis, 21(3), 679-695. https://doi.org/10.3233/IDA-170882Jupe, L., Vrij, A., Leal, S., & Nahari, G. (2018). Are you for real? Exploring language use and unexpected process questions within the detection of identity deception. Applied Cognitive Psychology, 1(13), 622-634. https://doi.org/10.1002/acp.3446Kovalev, A., Luniakova, E., & Menshikova, G. (2016). Using eye movement characteristics for detecting deception. International Journal of Psychophysiology, 108, 161. https://doi.org/10.1016/j.ijpsycho.2016.07.463Lee, C., Welker, R., & Odom, M. (2009). Features of computer-mediated, text-based messages that support automatable, linguistic-based indicator for deception detection. Journal of Information Systems, 23(1), 5-24. https://doi.org/10.2308/ jis.2009.23.1.24Ley 1090 de 2006. (2006). Por la cual se reglamenta el ejercicio de la profesión de Psicología, se dicta el Código Deontológico y Bioético y otras disposiciones. Diario Oficial N.º 46383 del 6 de septiembre de 2006. Congreso de la República de Colombia. https://www.funcionpublica.gov.co/eva/gestornormativo/norma. php?i=66205Ley 1581 de 2012. Por la cual se dictan disposiciones generales para la protección de datos personales. Diario Oficial N.º 48587 de octubre 18 de 2012. Congreso de la República de Colombia. https://www.funcionpublica.gov.co/eva/ gestornormativo/norma.php?i=49981Li, D. (2013). Deception Detection using Human Reasoning [Conferencia]. 2011 IEEE International Conference on Systems, Man, and Cybernetics (pp. 165-172). Anchorage, AK, EE. UU. http://di2ag.thayer.dartmouth.edu/wiki/images/f/ fd/029_3183_(print_version).pdfMasip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.xMatsumoto, D., & Hwang, H. (2015). Differences in Word Usage by Truth Tellers and Liars in Written Statements and an Investigative Interview After a Mock Crime. Journal of Investigative Psychology and Offender Profiling, 12(2), 199-216. https:// doi.org/10.1002/jip.1423Mayer, R. (2005). The Cambridge Handbook of Multimedia Learning. Cambridge University press. https://doi.org/10.1017/CBO9781139547369Millon, T., Davis, R., & Millon, C. (1997). Inventario Clínico Multiaxial MCMI-III. Manual. Tea ediciones.Nahari, G. (2018). The applicability of the verifiability approach to the real world. En J. P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 329-349). Elsevier Academic Press. https://doi.org/10.1016/ B978-0-12-812729-2.00014-8Nasreddine, Z. S., Phillips, N. A., Bédirian, V., Charbonneau, S., Whitehead, V., Collin, I., Cummings, J., & Chertkow, H. (2005). The Montreal Cognitive Assessment, MoCA: a brief screening tool for mild cognitive impairment. Journal of the American Geriatrics Society, 53(4), 695-9. https://doi. org/10.1111/j.1532-5415.2005.53221.xNavarini, E., & Elmir, K. (2011). Hacia una bioética universal. Nuevas bases epistemológicas para el siglo XXI. Revista de La Asociación Médica Argentina, 124(3), 32-36. https://docs.bvsalud.org/biblioref/2024/02/382040/hacia-unabioetica- universal-nuevas-bases-epistemologicas-para-_jOg35D3.pdfPasca, V. (2011). Study regarding psychophysiological reactivity values depending on subject’s gender in polygraph testing. Social and Behavioral Sciences, 33, 821-825. https://doi.org/10.1016/j.sbspro.2012.01.236Pavlov, Y., & Zlokazov, K. (2018). Deception detection by means of eye-tracking in the concealed information test. International Journal of Psychophysiology, 131(Supl.), 169-184. https://doi.org/10.1016/j.ijpsycho.2018.07.425Pedraza, O., Salazar, A., Sierra, F., Soler, D., Castro, J., Castillo, P., Hernández, A., & Piñeros, C. (2016). Confiabilidad, validez de criterio y discriminante del Montreal Cognitive Assessment (MoCA) test, en un grupo de adultos de Bogotá. Acta Médica Colombiana, 41(4), 221-228. http://www.scielo.org.co/pdf/amc/ v41n4/v41n4a04.pdfPennebaker, J. (2011). The secret life of pronouns what our words say about us. Bloomsbury Press.Pennebaker, J., Mehl, M., & Niederhoffer, K. (2003). Psychological aspects of natural language use: Our world, our selves. Annual Review of Psychology, 54, 547-577. https://doi.org/10.1146/annurev.psych.54.101601.145041Pérez-Rosas, V., & Mihalcea, R. (2014). Gender Differences in Deceivers Writing Style. En Gelbukh, A., Espinoza, F. C., & Galicia-Haro, S. N. (Eds.), Human- Inspired Computing and Its Applications (pp. 163-174). Springer. https://doi. org/10.1007/978-3-319-13647-9_17Peth, J. (2014). Emotional modulation of memory encoding and retrieval in the concealed Information Test [Tesis de doctorado]. Universitätsklinikum Hamburg- Eppendorf. https://ediss.sub.uni-hamburg.de/handle/ediss/5554?mode=fullRamírez, N., Pennebaker, J., García, F., & Suriá, R. (2007). La psicología del uso de las palabras: Un programa de computadora que analiza textos en español. Revista Mexicana de Psicología, 24(1), 85-99. http://rua.ua.es/dspace/ handle/10045/25918Richardson, B., Taylor, P., Snook, B., & Conchie, S. (2014). Language style and police interrogation outcomes. Law and Human Behavior, 38(4), 357-366. https://doi. org/10.1037/lhb0000077Salvetti, F. (2012). Detecting Deception in Text: A Corpus-Driven Approach [Tesis de doctorado]. Universidad de Colorado. https://scholar.colorado.edu/concern/ graduate_thesis_or_dissertations/7d278t23wSarwar, F., Sikström, S., Allwood, C., & Ker, A. (2015). Predicting correctness of eyewitness statements using the semantic evaluation method (SEM). Quality and Quantity, 49, 1735-1745. https://doi.org/10.1007/s11135-014-9997-7Sboev, A., Moloshnikiv, I., Gudovskikh, D., Selivanov, A., Rybka, R., & Litvinova, T. (2018). Automatic gender identification of author of Russian text by machine learning and neuralnet algorithms in case of gender deception. Procedia Computer Science, 123, 417-423. https://doi.org/10.1016/j.procs.2018.01.064Schwedes, C., & Wentura, D. (2012). The revealing glance: Eye gaze behavior to concealed information. Memory Cognition, 40, 642-651. https://doi.org/10.3758/ s13421-011-0173-1Sip, K., Carmel, D., Marchant, J., Li, J., Petrovic, P., Roestorpff, A., McGregor, W., & Frith, C. (2013). When Pinocchio’s nose does not grow: belief regarding lie-detectability modulates production of deception. Frontiers in Human Neuroscience, 7, 1-11. https://doi.org/10.3389/fnhum.2013.00016Tausczik, Y., & Pennebaker, J. (2010). The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods. Journal of Language and Social Psychology, 29(1), 24-54. https://doi.org/10.1177/0261927X09351676Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A., & Menacre, T. (2013). Detecting insider threats through language change. Law and Human Behavior, 37(4), 267-275. https://doi.org/10.1037/lhb0000032Ten Brinke, L., & Khambatta, P. (2015). Physically Scarce (vs. Enriched) Environments Decrease the Ability to Tell Lies Successfully. Journal of Experimental Psychology, 114(5), 982-992. https://doi.org/10.1037/xge0000103Ten Brinke, L., & Porter, S. (2012). Cry Me a River: Identifying the Behavioral Consequences of Extremely High-Stakes Interpersonal Deception. Law and Human Behavior, 36(6), 469-477. https://doi.org/10.1037/h0093929Tomer, E., Lupu, T., Golan, L., Wagner, M., & Braw, Y. (2018). Eye tracking as a mean to detect feigned cognitive impairment in the word memory test. Applied Neuropsychology: Adult, 27(1), 49-61. https://doi.org/10.1080/23279095.2018.1 480483Valverde, M., Ruiz, J., & Llor, B. (2013). Valoración de la credibilidad de testimonio: Aplicación del modelo Reality Monitoring. Revista Internacional de Psicología, 12(2), 1-30. https://doi.org/10.33670/18181023.v12i02.68Van Swol, L., & Braun, M. (2014). Communicating Deception: Differences in Language Use, Justifications, and Questions for Lies, Omissions, and Truths. Group Decision Negotiation, 23(6), 1343-1367. http://dx.doi.org/10.1007/s10726-013-9373-3Villar, G., Arciuli, J., & Patterson, H. (2013). Remorse in oral and handwritten false confessions. Legal and Criminological Psychology, 19(2), 255-269. https://doi. org/10.1111/lcrp.12012Vrij, A., & Granhag, P. (2012). Eliciting cues to deception and truth: What matters are the questions asked. Journal of Applied Research in Memory and Cognition, 1(2), 110-117. https://doi.org/10.1016/j.jarmac.2012.02.004Vrij, A., Oliveira, J., Hammond, A., & Erhlichman, H. (2015). Saccadic eye movement rate as cue to deceit. Journal of Applied Research of Memory and Cognition, 4(1), 15-19. https://doi.org/10.1016/j.jarmac.2014.07.005Walczyk, J., Harris, L., & Mulay, D. (2014). A social-cognitive framework for understanding serious lies: Activation-decision-construction-action theory. New Ideas in Psychology, 34, 22-36. https://doi.org/10.1016/j. newideapsych.2014.03.001Walczyk, J., Roper, K., Seemann, E., & Humphrey, A. (2003). Cognitive mechanisms underlying lying to questions: response time as a cue to deception. Cognitive Applied Psychology, 17(7), 755-774. https://doi.org/10.1002/acp.914Zuckerman, M., Depaulo, B., & Rosenthal, R. (1981). Verbal and nonverbal communication of deception. En Advances in Experimental Social Psychology (14.ª ed., pp. 1-59). Academic Press.Barrios, B. (2005). El testimonio penal. Editorial Jurídica Ancón. https:// borisbarriosgonzalez.files.wordpress.com/2011/08/el-testimonio-penal-borisbarrios- gonzalez.pdfBermeosolo, J. (2012). Memoria de trabajo y memoria procedimental en las dificultades específicas del aprendizaje y del lenguaje: algunos hallazgos. Revista Chilena de Fonoaudiología, 11, 57-75. https://revfono.uchile.cl/index.php/RCDF/article/ view/24516Buller, D., & Burgoon, J. (1994). Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18(2), 155-184. https://link.springer.com/article/10.1007/ BF02170076Buller, D., & Burgoon, J. (1994). Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18(2), 155-184. https://link.springer.com/article/10.1007/ BF02170076Chen, Z., Xue, L., Yiang, C., Wang, L., Mei, W., Zhang, Q., & Zhao, H. (2015). Specific marker of feigned memory impairment: The activation of left superior frontal gyrus. Journal of Forensic and Legal Medicine, 36, 164-171. https://pubmed.ncbi. nlm.nih.gov/26479324/Duran, N., Hall, C., Mccarthy, P., & Mcnamara, D. (2010). The linguistic correlates of conversational deception: Comparing natural language processing technologies. Applied Psycholinguistics, 31(3), 439-462. https://doi.org/10.1017/ S0142716410000068Ellmore, T., Mackin, B., & Ng, K. (2018). Saccades and Handedness Interact to Affect Scene Memory. PeerJ, 6, e5969. https://doi.org/10.7717/peerj.5969Fornaciari, T., & Poesio, M. (2013). Automatic deception detection in Italian court cases. Artificial Intelligence and Law, 21, 303-340. https://doi.org/10.1007/ s10506-013-9140-4Fuller, C., Biros, D., & Wilson, R. (2009). Decision support for determining veracity via linguistic-based cues. Decision Support Systems, 46(3), 695-703. https://doi. org/10.1016/j.dss.2008.11.001Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Applications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Applications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032Fuller, C., Biros, D., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Experts Systems with Applications, 38(7), 8392-8398. https://doi.org/10.1016/j.eswa.2011.01.032Kircher, J. (2018). Ocular motor deception test. En J. Rosenfeld (Ed.), Detecting concealed information and deception. Academic press. https://doi.org/10.1016/ C2016-0-03911-6Kovalev, A., Luniakova, E., & Menshikova, G. (2016). Using eye movement characteristics for detecting deception. International Journal of Psychophysiology, 108, 161. https://doi.org/10.1016/j.ijpsycho.2016.07.463Masip, J., Bethencourt, M., Lucas, G., Sánchez, M., & Herrero, C. (2012). Deception detection from written accounts. Scandinavian Journal of Psychology, 53(2), 103- 111. https://doi.org/10.1111/j.1467-9450.2011.00931.xNahari, G. (2018). The applicability of the verifiability approach to the real world. En J. P. Rosenfeld (Ed.), Detecting concealed information and deception: Recent developments (pp. 329-349). Elsevier Academic Press. https://doi.org/10.1016/ B978-0-12-812729-2.00014-8Pérez-Rosas, V., & Mihalcea, R. (2014). Gender Differences in Deceivers Writing Style. En A. Gelbukh, F. C. Espinoza & D. N. Galicia-Haro (Eds.), Human-Inspired Computing and Its Applications (pp. 163-174). Springer. https://link.springer. com/chapter/10.1007/978-3-319-13647-9_17#citeasPeth, J. (2014). Emotional modulation of memory encoding and retrieval in the concealed Information Test [Tesis de doctorado]. Universitätsklinikum Hamburg- Eppendorf. https://ediss.sub.uni-hamburg.de/handle/ediss/5554?mode=fullPeth, J., Sommer, T., Hebart, M., Vossel, G., Büchel, C., & Gamer, M. (2015). Memory detection using fmri -Does the encoding context matter. Neuroimage, 113, 164- 174. https://doi.org/10.1016/j.neuroimage.2015.03.051Schofield, C., Johnson, A., Inhonff, A., & Coles, M. (2012). Social anxiety and difficulty disengaging threat: Evidence from eye-tracking. Cognition and Emotion, 26(2), 300-311. https://doi.org/10.1080/02699931.2011.602050Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A., & Menacre, T. (2013). Detecting insider threats through language change. Law and Human Behavior, 37(4), 267-275. https://doi.org/10.1037/lhb0000032Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A., & Menacre, T. (2013). Detecting insider threats through language change. Law and Human Behavior, 37(4), 267-275. https://doi.org/10.1037/lhb0000032Tomer, E., Lupu, T., Golan, L., Wagner, M., & Braw, Y. (2018). Eye tracking as a mean to detect feigned cognitive impairment in the word memory test. Applied Neuropsychology: Adult, 27(1), 49-61. https://doi.org/10.1080/23279095.2018.1 480483Vrij, A., Oliveira, J., Hammond, A., & Erhlichman, H. (2015). Saccadic eye movement rate as cue to deceit. Journal of Applied Research of Memory and Cognition, 4(1), 15-19. https://doi.org/10.1016/j.jarmac.2014.07.005Walczyk, J., Roper, K., Seemann, E., & Humphrey, A. (2003). Cognitive mechanisms underlying lying to questions: response time as a cue to deception. Cognitive Applied Psychology, 17(7), 755-774. https://onlinelibrary.wiley.com/doi/ abs/10.1002/acp.914Derechos Reservados - Universidad Católica de Colombia, 2024info:eu-repo/semantics/restrictedAccesshttp://purl.org/coar/access_right/c_16echttps://publicacionesucatolica.publica.la/library/publication/miradas-y-palabras-que-enganan-comportamiento-visual-y-estilo-linguistico-en-testimonios-honestos-y-deshonestosComportamiento verbal-relatos personalesVerdad y mentira-aspectos psicológicosVerdad y mentira-aspectos psicológicosAnálisis lingüístico- aspectos psicológicosConducta-investigacionesPercepción visual- aspectos psicológicosInterrogatorio de testigos- estudio de casos150 - PsicologíaEngañoTestimonioTestigosCredibilidadEye trackerLIWCMiradas y palabras que engañan: comportamiento visual y estilo lingüístico en testimonios honestos y deshonestosLibrohttp://purl.org/coar/resource_type/c_2f33http://purl.org/coar/version/c_970fb48d4fbd8a85Textinfo:eu-repo/semantics/bookhttp://purl.org/redcol/resource_type/LIBinfo:eu-repo/semantics/publishedVersionPublicationhttps://ucatolica.academia.edu/JuanCamiloCarvajalBuilesvirtual::3473-1???????virtual::3474-1https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000016814virtual::3473-1https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000509507virtual::3474-1https://scholar.google.es/citations?user=e0fxjXAAAAAJ&hl=es&oi=aovirtual::3473-1https://scholar.google.com/citations?user=Zcw9I8QAAAAJn&user=Zcw9I8QAAAAJvirtual::3474-1https://orcid.org/0000-0001-8928-6604virtual::3473-1https://orcid.org/0000-0003-3677-852Xvirtual::3474-1https://www.researchgate.net/profile/Juan-Carvajal-8virtual::3473-1https://www.researchgate.net/profile/Idaly-Barretovirtual::3474-107b141a1-ba61-4cee-9958-77880224408bvirtual::3473-1f740abc7-8b94-4390-a5c4-0d7dbaeb26fcvirtual::3474-107b141a1-ba61-4cee-9958-77880224408bvirtual::3473-1f740abc7-8b94-4390-a5c4-0d7dbaeb26fcvirtual::3474-1ORIGINALRepositorio_Miradas y palabras que engañan.pdfRepositorio_Miradas y palabras que engañan.pdfapplication/pdf2118033https://repository.ucatolica.edu.co/bitstreams/fab23c2d-1940-4f53-b6a1-2343ca81c07e/download01efaf1df90115fbdbb1d57b41fca506MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-815543https://repository.ucatolica.edu.co/bitstreams/c458f8a7-76ca-465a-9f08-7398b9412c9a/download73a5432e0b76442b22b026844140d683MD52TEXTRepositorio_Miradas y palabras que engañan.pdf.txtRepositorio_Miradas y palabras que engañan.pdf.txtExtracted texttext/plain101131https://repository.ucatolica.edu.co/bitstreams/b9700e30-4ef7-4eae-9e3b-1483caca5b73/download9606243afd91d5af2e4089e96d5854dbMD53THUMBNAILRepositorio_Miradas y palabras que engañan.pdf.jpgRepositorio_Miradas y palabras que engañan.pdf.jpgGenerated Thumbnailimage/jpeg15116https://repository.ucatolica.edu.co/bitstreams/01a38dc7-827c-4272-8faf-7bddab1aaa3b/downloadc56379e3e486cc6297978d299cd6565cMD5410983/31422oai:repository.ucatolica.edu.co:10983/314222024-09-05 03:01:55.016https://repository.ucatolica.edu.coRepositorio Institucional Universidad Católica de Colombia - RIUCaCbdigital@metabiblioteca.comPHA+TEEgT0JSQSAoVEFMIFkgQ09NTyBTRSBERUZJTkUgTcOBUyBBREVMQU5URSkgU0UgT1RPUkdBIEJBSk8gTE9TIFRFUk1JTk9TIERFIEVTVEEgTElDRU5DSUEgUMOaQkxJQ0EgREUgQ1JFQVRJVkUgQ09NTU9OUyAo4oCcTFBDQ+KAnSBPIOKAnExJQ0VOQ0lB4oCdKS4gTEEgT0JSQSBFU1TDgSBQUk9URUdJREEgUE9SIERFUkVDSE9TIERFIEFVVE9SIFkvVSBPVFJBUyBMRVlFUyBBUExJQ0FCTEVTLiBRVUVEQSBQUk9ISUJJRE8gQ1VBTFFVSUVSIFVTTyBRVUUgU0UgSEFHQSBERSBMQSBPQlJBIFFVRSBOTyBDVUVOVEUgQ09OIExBIEFVVE9SSVpBQ0nDk04gUEVSVElORU5URSBERSBDT05GT1JNSURBRCBDT04gTE9TIFTDiVJNSU5PUyBERSBFU1RBIExJQ0VOQ0lBIFkgREUgTEEgTEVZIERFIERFUkVDSE8gREUgQVVUT1IuPC9wPgo8cD5NRURJQU5URSBFTCBFSkVSQ0lDSU8gREUgQ1VBTFFVSUVSQSBERSBMT1MgREVSRUNIT1MgUVVFIFNFIE9UT1JHQU4gRU4gRVNUQSBMSUNFTkNJQSwgVVNURUQgQUNFUFRBIFkgQUNVRVJEQSBRVUVEQVIgT0JMSUdBRE8gRU4gTE9TIFRFUk1JTk9TIFFVRSBTRSBTRcORQUxBTiBFTiBFTExBLiBFTCBMSUNFTkNJQU5URSBDT05DRURFIEEgVVNURUQgTE9TIERFUkVDSE9TIENPTlRFTklET1MgRU4gRVNUQSBMSUNFTkNJQSBDT05ESUNJT05BRE9TIEEgTEEgQUNFUFRBQ0nDk04gREUgU1VTIFRFUk1JTk9TIFkgQ09ORElDSU9ORVMuPC9wPgo8b2wgdHlwZT0iMSI+CiAgPGxpPgogICAgRGVmaW5pY2lvbmVzCiAgICA8b2wgdHlwZT1hPgogICAgICA8bGk+T2JyYSBDb2xlY3RpdmEgZXMgdW5hIG9icmEsIHRhbCBjb21vIHVuYSBwdWJsaWNhY2nDs24gcGVyacOzZGljYSwgdW5hIGFudG9sb2fDrWEsIG8gdW5hIGVuY2ljbG9wZWRpYSwgZW4gbGEgcXVlIGxhIG9icmEgZW4gc3UgdG90YWxpZGFkLCBzaW4gbW9kaWZpY2FjacOzbiBhbGd1bmEsIGp1bnRvIGNvbiB1biBncnVwbyBkZSBvdHJhcyBjb250cmlidWNpb25lcyBxdWUgY29uc3RpdHV5ZW4gb2JyYXMgc2VwYXJhZGFzIGUgaW5kZXBlbmRpZW50ZXMgZW4gc8OtIG1pc21hcywgc2UgaW50ZWdyYW4gZW4gdW4gdG9kbyBjb2xlY3Rpdm8uIFVuYSBPYnJhIHF1ZSBjb25zdGl0dXllIHVuYSBvYnJhIGNvbGVjdGl2YSBubyBzZSBjb25zaWRlcmFyw6EgdW5hIE9icmEgRGVyaXZhZGEgKGNvbW8gc2UgZGVmaW5lIGFiYWpvKSBwYXJhIGxvcyBwcm9ww7NzaXRvcyBkZSBlc3RhIGxpY2VuY2lhLiBhcXVlbGxhIHByb2R1Y2lkYSBwb3IgdW4gZ3J1cG8gZGUgYXV0b3JlcywgZW4gcXVlIGxhIE9icmEgc2UgZW5jdWVudHJhIHNpbiBtb2RpZmljYWNpb25lcywganVudG8gY29uIHVuYSBjaWVydGEgY2FudGlkYWQgZGUgb3RyYXMgY29udHJpYnVjaW9uZXMsIHF1ZSBjb25zdGl0dXllbiBlbiBzw60gbWlzbW9zIHRyYWJham9zIHNlcGFyYWRvcyBlIGluZGVwZW5kaWVudGVzLCBxdWUgc29uIGludGVncmFkb3MgYWwgdG9kbyBjb2xlY3Rpdm8sIHRhbGVzIGNvbW8gcHVibGljYWNpb25lcyBwZXJpw7NkaWNhcywgYW50b2xvZ8OtYXMgbyBlbmNpY2xvcGVkaWFzLjwvbGk+CiAgICAgIDxsaT5PYnJhIERlcml2YWRhIHNpZ25pZmljYSB1bmEgb2JyYSBiYXNhZGEgZW4gbGEgb2JyYSBvYmpldG8gZGUgZXN0YSBsaWNlbmNpYSBvIGVuIMOpc3RhIHkgb3RyYXMgb2JyYXMgcHJlZXhpc3RlbnRlcywgdGFsZXMgY29tbyB0cmFkdWNjaW9uZXMsIGFycmVnbG9zIG11c2ljYWxlcywgZHJhbWF0aXphY2lvbmVzLCDigJxmaWNjaW9uYWxpemFjaW9uZXPigJ0sIHZlcnNpb25lcyBwYXJhIGNpbmUsIOKAnGdyYWJhY2lvbmVzIGRlIHNvbmlkb+KAnSwgcmVwcm9kdWNjaW9uZXMgZGUgYXJ0ZSwgcmVzw7ptZW5lcywgY29uZGVuc2FjaW9uZXMsIG8gY3VhbHF1aWVyIG90cmEgZW4gbGEgcXVlIGxhIG9icmEgcHVlZGEgc2VyIHRyYW5zZm9ybWFkYSwgY2FtYmlhZGEgbyBhZGFwdGFkYSwgZXhjZXB0byBhcXVlbGxhcyBxdWUgY29uc3RpdHV5YW4gdW5hIG9icmEgY29sZWN0aXZhLCBsYXMgcXVlIG5vIHNlcsOhbiBjb25zaWRlcmFkYXMgdW5hIG9icmEgZGVyaXZhZGEgcGFyYSBlZmVjdG9zIGRlIGVzdGEgbGljZW5jaWEuIChQYXJhIGV2aXRhciBkdWRhcywgZW4gZWwgY2FzbyBkZSBxdWUgbGEgT2JyYSBzZWEgdW5hIGNvbXBvc2ljacOzbiBtdXNpY2FsIG8gdW5hIGdyYWJhY2nDs24gc29ub3JhLCBwYXJhIGxvcyBlZmVjdG9zIGRlIGVzdGEgTGljZW5jaWEgbGEgc2luY3Jvbml6YWNpw7NuIHRlbXBvcmFsIGRlIGxhIE9icmEgY29uIHVuYSBpbWFnZW4gZW4gbW92aW1pZW50byBzZSBjb25zaWRlcmFyw6EgdW5hIE9icmEgRGVyaXZhZGEgcGFyYSBsb3MgZmluZXMgZGUgZXN0YSBsaWNlbmNpYSkuPC9saT4KICAgICAgPGxpPkxpY2VuY2lhbnRlLCBlcyBlbCBpbmRpdmlkdW8gbyBsYSBlbnRpZGFkIHRpdHVsYXIgZGUgbG9zIGRlcmVjaG9zIGRlIGF1dG9yIHF1ZSBvZnJlY2UgbGEgT2JyYSBlbiBjb25mb3JtaWRhZCBjb24gbGFzIGNvbmRpY2lvbmVzIGRlIGVzdGEgTGljZW5jaWEuPC9saT4KICAgICAgPGxpPkF1dG9yIG9yaWdpbmFsLCBlcyBlbCBpbmRpdmlkdW8gcXVlIGNyZcOzIGxhIE9icmEuPC9saT4KICAgICAgPGxpPk9icmEsIGVzIGFxdWVsbGEgb2JyYSBzdXNjZXB0aWJsZSBkZSBwcm90ZWNjacOzbiBwb3IgZWwgcsOpZ2ltZW4gZGUgRGVyZWNobyBkZSBBdXRvciB5IHF1ZSBlcyBvZnJlY2lkYSBlbiBsb3MgdMOpcm1pbm9zIGRlIGVzdGEgbGljZW5jaWE8L2xpPgogICAgICA8bGk+VXN0ZWQsIGVzIGVsIGluZGl2aWR1byBvIGxhIGVudGlkYWQgcXVlIGVqZXJjaXRhIGxvcyBkZXJlY2hvcyBvdG9yZ2Fkb3MgYWwgYW1wYXJvIGRlIGVzdGEgTGljZW5jaWEgeSBxdWUgY29uIGFudGVyaW9yaWRhZCBubyBoYSB2aW9sYWRvIGxhcyBjb25kaWNpb25lcyBkZSBsYSBtaXNtYSByZXNwZWN0byBhIGxhIE9icmEsIG8gcXVlIGhheWEgb2J0ZW5pZG8gYXV0b3JpemFjacOzbiBleHByZXNhIHBvciBwYXJ0ZSBkZWwgTGljZW5jaWFudGUgcGFyYSBlamVyY2VyIGxvcyBkZXJlY2hvcyBhbCBhbXBhcm8gZGUgZXN0YSBMaWNlbmNpYSBwZXNlIGEgdW5hIHZpb2xhY2nDs24gYW50ZXJpb3IuPC9saT4KICAgIDwvb2w+CiAgPC9saT4KICA8YnIvPgogIDxsaT4KICAgIERlcmVjaG9zIGRlIFVzb3MgSG9ucmFkb3MgeSBleGNlcGNpb25lcyBMZWdhbGVzLgogICAgPHA+TmFkYSBlbiBlc3RhIExpY2VuY2lhIHBvZHLDoSBzZXIgaW50ZXJwcmV0YWRvIGNvbW8gdW5hIGRpc21pbnVjacOzbiwgbGltaXRhY2nDs24gbyByZXN0cmljY2nDs24gZGUgbG9zIGRlcmVjaG9zIGRlcml2YWRvcyBkZWwgdXNvIGhvbnJhZG8geSBvdHJhcyBsaW1pdGFjaW9uZXMgbyBleGNlcGNpb25lcyBhIGxvcyBkZXJlY2hvcyBkZWwgYXV0b3IgYmFqbyBlbCByw6lnaW1lbiBsZWdhbCB2aWdlbnRlIG8gZGVyaXZhZG8gZGUgY3VhbHF1aWVyIG90cmEgbm9ybWEgcXVlIHNlIGxlIGFwbGlxdWUuPC9wPgogIDwvbGk+CiAgPGxpPgogICAgQ29uY2VzacOzbiBkZSBsYSBMaWNlbmNpYS4KICAgIDxwPkJham8gbG9zIHTDqXJtaW5vcyB5IGNvbmRpY2lvbmVzIGRlIGVzdGEgTGljZW5jaWEsIGVsIExpY2VuY2lhbnRlIG90b3JnYSBhIFVzdGVkIHVuYSBsaWNlbmNpYSBtdW5kaWFsLCBsaWJyZSBkZSByZWdhbMOtYXMsIG5vIGV4Y2x1c2l2YSB5IHBlcnBldHVhIChkdXJhbnRlIHRvZG8gZWwgcGVyw61vZG8gZGUgdmlnZW5jaWEgZGUgbG9zIGRlcmVjaG9zIGRlIGF1dG9yKSBwYXJhIGVqZXJjZXIgZXN0b3MgZGVyZWNob3Mgc29icmUgbGEgT2JyYSB0YWwgeSBjb21vIHNlIGluZGljYSBhIGNvbnRpbnVhY2nDs246PC9wPgogICAgPG9sIHR5cGU9ImEiPgogICAgICA8bGk+UmVwcm9kdWNpciBsYSBPYnJhLCBpbmNvcnBvcmFyIGxhIE9icmEgZW4gdW5hIG8gbcOhcyBPYnJhcyBDb2xlY3RpdmFzLCB5IHJlcHJvZHVjaXIgbGEgT2JyYSBpbmNvcnBvcmFkYSBlbiBsYXMgT2JyYXMgQ29sZWN0aXZhcy48L2xpPgogICAgICA8bGk+RGlzdHJpYnVpciBjb3BpYXMgbyBmb25vZ3JhbWFzIGRlIGxhcyBPYnJhcywgZXhoaWJpcmxhcyBww7pibGljYW1lbnRlLCBlamVjdXRhcmxhcyBww7pibGljYW1lbnRlIHkvbyBwb25lcmxhcyBhIGRpc3Bvc2ljacOzbiBww7pibGljYSwgaW5jbHV5w6luZG9sYXMgY29tbyBpbmNvcnBvcmFkYXMgZW4gT2JyYXMgQ29sZWN0aXZhcywgc2Vnw7puIGNvcnJlc3BvbmRhLjwvbGk+CiAgICAgIDxsaT5EaXN0cmlidWlyIGNvcGlhcyBkZSBsYXMgT2JyYXMgRGVyaXZhZGFzIHF1ZSBzZSBnZW5lcmVuLCBleGhpYmlybGFzIHDDumJsaWNhbWVudGUsIGVqZWN1dGFybGFzIHDDumJsaWNhbWVudGUgeS9vIHBvbmVybGFzIGEgZGlzcG9zaWNpw7NuIHDDumJsaWNhLjwvbGk+CiAgICA8L29sPgogICAgPHA+TG9zIGRlcmVjaG9zIG1lbmNpb25hZG9zIGFudGVyaW9ybWVudGUgcHVlZGVuIHNlciBlamVyY2lkb3MgZW4gdG9kb3MgbG9zIG1lZGlvcyB5IGZvcm1hdG9zLCBhY3R1YWxtZW50ZSBjb25vY2lkb3MgbyBxdWUgc2UgaW52ZW50ZW4gZW4gZWwgZnV0dXJvLiBMb3MgZGVyZWNob3MgYW50ZXMgbWVuY2lvbmFkb3MgaW5jbHV5ZW4gZWwgZGVyZWNobyBhIHJlYWxpemFyIGRpY2hhcyBtb2RpZmljYWNpb25lcyBlbiBsYSBtZWRpZGEgcXVlIHNlYW4gdMOpY25pY2FtZW50ZSBuZWNlc2FyaWFzIHBhcmEgZWplcmNlciBsb3MgZGVyZWNob3MgZW4gb3RybyBtZWRpbyBvIGZvcm1hdG9zLCBwZXJvIGRlIG90cmEgbWFuZXJhIHVzdGVkIG5vIGVzdMOhIGF1dG9yaXphZG8gcGFyYSByZWFsaXphciBvYnJhcyBkZXJpdmFkYXMuIFRvZG9zIGxvcyBkZXJlY2hvcyBubyBvdG9yZ2Fkb3MgZXhwcmVzYW1lbnRlIHBvciBlbCBMaWNlbmNpYW50ZSBxdWVkYW4gcG9yIGVzdGUgbWVkaW8gcmVzZXJ2YWRvcywgaW5jbHV5ZW5kbyBwZXJvIHNpbiBsaW1pdGFyc2UgYSBhcXVlbGxvcyBxdWUgc2UgbWVuY2lvbmFuIGVuIGxhcyBzZWNjaW9uZXMgNChkKSB5IDQoZSkuPC9wPgogIDwvbGk+CiAgPGJyLz4KICA8bGk+CiAgICBSZXN0cmljY2lvbmVzLgogICAgPHA+TGEgbGljZW5jaWEgb3RvcmdhZGEgZW4gbGEgYW50ZXJpb3IgU2VjY2nDs24gMyBlc3TDoSBleHByZXNhbWVudGUgc3VqZXRhIHkgbGltaXRhZGEgcG9yIGxhcyBzaWd1aWVudGVzIHJlc3RyaWNjaW9uZXM6PC9wPgogICAgPG9sIHR5cGU9ImEiPgogICAgICA8bGk+VXN0ZWQgcHVlZGUgZGlzdHJpYnVpciwgZXhoaWJpciBww7pibGljYW1lbnRlLCBlamVjdXRhciBww7pibGljYW1lbnRlLCBvIHBvbmVyIGEgZGlzcG9zaWNpw7NuIHDDumJsaWNhIGxhIE9icmEgc8OzbG8gYmFqbyBsYXMgY29uZGljaW9uZXMgZGUgZXN0YSBMaWNlbmNpYSwgeSBVc3RlZCBkZWJlIGluY2x1aXIgdW5hIGNvcGlhIGRlIGVzdGEgbGljZW5jaWEgbyBkZWwgSWRlbnRpZmljYWRvciBVbml2ZXJzYWwgZGUgUmVjdXJzb3MgZGUgbGEgbWlzbWEgY29uIGNhZGEgY29waWEgZGUgbGEgT2JyYSBxdWUgZGlzdHJpYnV5YSwgZXhoaWJhIHDDumJsaWNhbWVudGUsIGVqZWN1dGUgcMO6YmxpY2FtZW50ZSBvIHBvbmdhIGEgZGlzcG9zaWNpw7NuIHDDumJsaWNhLiBObyBlcyBwb3NpYmxlIG9mcmVjZXIgbyBpbXBvbmVyIG5pbmd1bmEgY29uZGljacOzbiBzb2JyZSBsYSBPYnJhIHF1ZSBhbHRlcmUgbyBsaW1pdGUgbGFzIGNvbmRpY2lvbmVzIGRlIGVzdGEgTGljZW5jaWEgbyBlbCBlamVyY2ljaW8gZGUgbG9zIGRlcmVjaG9zIGRlIGxvcyBkZXN0aW5hdGFyaW9zIG90b3JnYWRvcyBlbiBlc3RlIGRvY3VtZW50by4gTm8gZXMgcG9zaWJsZSBzdWJsaWNlbmNpYXIgbGEgT2JyYS4gVXN0ZWQgZGViZSBtYW50ZW5lciBpbnRhY3RvcyB0b2RvcyBsb3MgYXZpc29zIHF1ZSBoYWdhbiByZWZlcmVuY2lhIGEgZXN0YSBMaWNlbmNpYSB5IGEgbGEgY2zDoXVzdWxhIGRlIGxpbWl0YWNpw7NuIGRlIGdhcmFudMOtYXMuIFVzdGVkIG5vIHB1ZWRlIGRpc3RyaWJ1aXIsIGV4aGliaXIgcMO6YmxpY2FtZW50ZSwgZWplY3V0YXIgcMO6YmxpY2FtZW50ZSwgbyBwb25lciBhIGRpc3Bvc2ljacOzbiBww7pibGljYSBsYSBPYnJhIGNvbiBhbGd1bmEgbWVkaWRhIHRlY25vbMOzZ2ljYSBxdWUgY29udHJvbGUgZWwgYWNjZXNvIG8gbGEgdXRpbGl6YWNpw7NuIGRlIGVsbGEgZGUgdW5hIGZvcm1hIHF1ZSBzZWEgaW5jb25zaXN0ZW50ZSBjb24gbGFzIGNvbmRpY2lvbmVzIGRlIGVzdGEgTGljZW5jaWEuIExvIGFudGVyaW9yIHNlIGFwbGljYSBhIGxhIE9icmEgaW5jb3Jwb3JhZGEgYSB1bmEgT2JyYSBDb2xlY3RpdmEsIHBlcm8gZXN0byBubyBleGlnZSBxdWUgbGEgT2JyYSBDb2xlY3RpdmEgYXBhcnRlIGRlIGxhIG9icmEgbWlzbWEgcXVlZGUgc3VqZXRhIGEgbGFzIGNvbmRpY2lvbmVzIGRlIGVzdGEgTGljZW5jaWEuIFNpIFVzdGVkIGNyZWEgdW5hIE9icmEgQ29sZWN0aXZhLCBwcmV2aW8gYXZpc28gZGUgY3VhbHF1aWVyIExpY2VuY2lhbnRlIGRlYmUsIGVuIGxhIG1lZGlkYSBkZSBsbyBwb3NpYmxlLCBlbGltaW5hciBkZSBsYSBPYnJhIENvbGVjdGl2YSBjdWFscXVpZXIgcmVmZXJlbmNpYSBhIGRpY2hvIExpY2VuY2lhbnRlIG8gYWwgQXV0b3IgT3JpZ2luYWwsIHNlZ8O6biBsbyBzb2xpY2l0YWRvIHBvciBlbCBMaWNlbmNpYW50ZSB5IGNvbmZvcm1lIGxvIGV4aWdlIGxhIGNsw6F1c3VsYSA0KGMpLjwvbGk+CiAgICAgIDxsaT5Vc3RlZCBubyBwdWVkZSBlamVyY2VyIG5pbmd1bm8gZGUgbG9zIGRlcmVjaG9zIHF1ZSBsZSBoYW4gc2lkbyBvdG9yZ2Fkb3MgZW4gbGEgU2VjY2nDs24gMyBwcmVjZWRlbnRlIGRlIG1vZG8gcXVlIGVzdMOpbiBwcmluY2lwYWxtZW50ZSBkZXN0aW5hZG9zIG8gZGlyZWN0YW1lbnRlIGRpcmlnaWRvcyBhIGNvbnNlZ3VpciB1biBwcm92ZWNobyBjb21lcmNpYWwgbyB1bmEgY29tcGVuc2FjacOzbiBtb25ldGFyaWEgcHJpdmFkYS4gRWwgaW50ZXJjYW1iaW8gZGUgbGEgT2JyYSBwb3Igb3RyYXMgb2JyYXMgcHJvdGVnaWRhcyBwb3IgZGVyZWNob3MgZGUgYXV0b3IsIHlhIHNlYSBhIHRyYXbDqXMgZGUgdW4gc2lzdGVtYSBwYXJhIGNvbXBhcnRpciBhcmNoaXZvcyBkaWdpdGFsZXMgKGRpZ2l0YWwgZmlsZS1zaGFyaW5nKSBvIGRlIGN1YWxxdWllciBvdHJhIG1hbmVyYSBubyBzZXLDoSBjb25zaWRlcmFkbyBjb21vIGVzdGFyIGRlc3RpbmFkbyBwcmluY2lwYWxtZW50ZSBvIGRpcmlnaWRvIGRpcmVjdGFtZW50ZSBhIGNvbnNlZ3VpciB1biBwcm92ZWNobyBjb21lcmNpYWwgbyB1bmEgY29tcGVuc2FjacOzbiBtb25ldGFyaWEgcHJpdmFkYSwgc2llbXByZSBxdWUgbm8gc2UgcmVhbGljZSB1biBwYWdvIG1lZGlhbnRlIHVuYSBjb21wZW5zYWNpw7NuIG1vbmV0YXJpYSBlbiByZWxhY2nDs24gY29uIGVsIGludGVyY2FtYmlvIGRlIG9icmFzIHByb3RlZ2lkYXMgcG9yIGVsIGRlcmVjaG8gZGUgYXV0b3IuPC9saT4KICAgICAgPGxpPlNpIHVzdGVkIGRpc3RyaWJ1eWUsIGV4aGliZSBww7pibGljYW1lbnRlLCBlamVjdXRhIHDDumJsaWNhbWVudGUgbyBlamVjdXRhIHDDumJsaWNhbWVudGUgZW4gZm9ybWEgZGlnaXRhbCBsYSBPYnJhIG8gY3VhbHF1aWVyIE9icmEgRGVyaXZhZGEgdSBPYnJhIENvbGVjdGl2YSwgVXN0ZWQgZGViZSBtYW50ZW5lciBpbnRhY3RhIHRvZGEgbGEgaW5mb3JtYWNpw7NuIGRlIGRlcmVjaG8gZGUgYXV0b3IgZGUgbGEgT2JyYSB5IHByb3BvcmNpb25hciwgZGUgZm9ybWEgcmF6b25hYmxlIHNlZ8O6biBlbCBtZWRpbyBvIG1hbmVyYSBxdWUgVXN0ZWQgZXN0w6kgdXRpbGl6YW5kbzogKGkpIGVsIG5vbWJyZSBkZWwgQXV0b3IgT3JpZ2luYWwgc2kgZXN0w6EgcHJvdmlzdG8gKG8gc2V1ZMOzbmltbywgc2kgZnVlcmUgYXBsaWNhYmxlKSwgeS9vIChpaSkgZWwgbm9tYnJlIGRlIGxhIHBhcnRlIG8gbGFzIHBhcnRlcyBxdWUgZWwgQXV0b3IgT3JpZ2luYWwgeS9vIGVsIExpY2VuY2lhbnRlIGh1YmllcmVuIGRlc2lnbmFkbyBwYXJhIGxhIGF0cmlidWNpw7NuICh2LmcuLCB1biBpbnN0aXR1dG8gcGF0cm9jaW5hZG9yLCBlZGl0b3JpYWwsIHB1YmxpY2FjacOzbikgZW4gbGEgaW5mb3JtYWNpw7NuIGRlIGxvcyBkZXJlY2hvcyBkZSBhdXRvciBkZWwgTGljZW5jaWFudGUsIHTDqXJtaW5vcyBkZSBzZXJ2aWNpb3MgbyBkZSBvdHJhcyBmb3JtYXMgcmF6b25hYmxlczsgZWwgdMOtdHVsbyBkZSBsYSBPYnJhIHNpIGVzdMOhIHByb3Zpc3RvOyBlbiBsYSBtZWRpZGEgZGUgbG8gcmF6b25hYmxlbWVudGUgZmFjdGlibGUgeSwgc2kgZXN0w6EgcHJvdmlzdG8sIGVsIElkZW50aWZpY2Fkb3IgVW5pZm9ybWUgZGUgUmVjdXJzb3MgKFVuaWZvcm0gUmVzb3VyY2UgSWRlbnRpZmllcikgcXVlIGVsIExpY2VuY2lhbnRlIGVzcGVjaWZpY2EgcGFyYSBzZXIgYXNvY2lhZG8gY29uIGxhIE9icmEsIHNhbHZvIHF1ZSB0YWwgVVJJIG5vIHNlIHJlZmllcmEgYSBsYSBub3RhIHNvYnJlIGxvcyBkZXJlY2hvcyBkZSBhdXRvciBvIGEgbGEgaW5mb3JtYWNpw7NuIHNvYnJlIGVsIGxpY2VuY2lhbWllbnRvIGRlIGxhIE9icmE7IHkgZW4gZWwgY2FzbyBkZSB1bmEgT2JyYSBEZXJpdmFkYSwgYXRyaWJ1aXIgZWwgY3LDqWRpdG8gaWRlbnRpZmljYW5kbyBlbCB1c28gZGUgbGEgT2JyYSBlbiBsYSBPYnJhIERlcml2YWRhICh2LmcuLCAiVHJhZHVjY2nDs24gRnJhbmNlc2EgZGUgbGEgT2JyYSBkZWwgQXV0b3IgT3JpZ2luYWwsIiBvICJHdWnDs24gQ2luZW1hdG9ncsOhZmljbyBiYXNhZG8gZW4gbGEgT2JyYSBvcmlnaW5hbCBkZWwgQXV0b3IgT3JpZ2luYWwiKS4gVGFsIGNyw6lkaXRvIHB1ZWRlIHNlciBpbXBsZW1lbnRhZG8gZGUgY3VhbHF1aWVyIGZvcm1hIHJhem9uYWJsZTsgZW4gZWwgY2Fzbywgc2luIGVtYmFyZ28sIGRlIE9icmFzIERlcml2YWRhcyB1IE9icmFzIENvbGVjdGl2YXMsIHRhbCBjcsOpZGl0byBhcGFyZWNlcsOhLCBjb21vIG3DrW5pbW8sIGRvbmRlIGFwYXJlY2UgZWwgY3LDqWRpdG8gZGUgY3VhbHF1aWVyIG90cm8gYXV0b3IgY29tcGFyYWJsZSB5IGRlIHVuYSBtYW5lcmEsIGFsIG1lbm9zLCB0YW4gZGVzdGFjYWRhIGNvbW8gZWwgY3LDqWRpdG8gZGUgb3RybyBhdXRvciBjb21wYXJhYmxlLjwvbGk+CiAgICAgIDxsaT4KICAgICAgICBQYXJhIGV2aXRhciB0b2RhIGNvbmZ1c2nDs24sIGVsIExpY2VuY2lhbnRlIGFjbGFyYSBxdWUsIGN1YW5kbyBsYSBvYnJhIGVzIHVuYSBjb21wb3NpY2nDs24gbXVzaWNhbDoKICAgICAgICA8b2wgdHlwZT0iaSI+CiAgICAgICAgICA8bGk+UmVnYWzDrWFzIHBvciBpbnRlcnByZXRhY2nDs24geSBlamVjdWNpw7NuIGJham8gbGljZW5jaWFzIGdlbmVyYWxlcy4gRWwgTGljZW5jaWFudGUgc2UgcmVzZXJ2YSBlbCBkZXJlY2hvIGV4Y2x1c2l2byBkZSBhdXRvcml6YXIgbGEgZWplY3VjacOzbiBww7pibGljYSBvIGxhIGVqZWN1Y2nDs24gcMO6YmxpY2EgZGlnaXRhbCBkZSBsYSBvYnJhIHkgZGUgcmVjb2xlY3Rhciwgc2VhIGluZGl2aWR1YWxtZW50ZSBvIGEgdHJhdsOpcyBkZSB1bmEgc29jaWVkYWQgZGUgZ2VzdGnDs24gY29sZWN0aXZhIGRlIGRlcmVjaG9zIGRlIGF1dG9yIHkgZGVyZWNob3MgY29uZXhvcyAocG9yIGVqZW1wbG8sIFNBWUNPKSwgbGFzIHJlZ2Fsw61hcyBwb3IgbGEgZWplY3VjacOzbiBww7pibGljYSBvIHBvciBsYSBlamVjdWNpw7NuIHDDumJsaWNhIGRpZ2l0YWwgZGUgbGEgb2JyYSAocG9yIGVqZW1wbG8gV2ViY2FzdCkgbGljZW5jaWFkYSBiYWpvIGxpY2VuY2lhcyBnZW5lcmFsZXMsIHNpIGxhIGludGVycHJldGFjacOzbiBvIGVqZWN1Y2nDs24gZGUgbGEgb2JyYSBlc3TDoSBwcmltb3JkaWFsbWVudGUgb3JpZW50YWRhIHBvciBvIGRpcmlnaWRhIGEgbGEgb2J0ZW5jacOzbiBkZSB1bmEgdmVudGFqYSBjb21lcmNpYWwgbyB1bmEgY29tcGVuc2FjacOzbiBtb25ldGFyaWEgcHJpdmFkYS48L2xpPgogICAgICAgICAgPGxpPlJlZ2Fsw61hcyBwb3IgRm9ub2dyYW1hcy4gRWwgTGljZW5jaWFudGUgc2UgcmVzZXJ2YSBlbCBkZXJlY2hvIGV4Y2x1c2l2byBkZSByZWNvbGVjdGFyLCBpbmRpdmlkdWFsbWVudGUgbyBhIHRyYXbDqXMgZGUgdW5hIHNvY2llZGFkIGRlIGdlc3Rpw7NuIGNvbGVjdGl2YSBkZSBkZXJlY2hvcyBkZSBhdXRvciB5IGRlcmVjaG9zIGNvbmV4b3MgKHBvciBlamVtcGxvLCBsb3MgY29uc2FncmFkb3MgcG9yIGxhIFNBWUNPKSwgdW5hIGFnZW5jaWEgZGUgZGVyZWNob3MgbXVzaWNhbGVzIG8gYWxnw7puIGFnZW50ZSBkZXNpZ25hZG8sIGxhcyByZWdhbMOtYXMgcG9yIGN1YWxxdWllciBmb25vZ3JhbWEgcXVlIFVzdGVkIGNyZWUgYSBwYXJ0aXIgZGUgbGEgb2JyYSAo4oCcdmVyc2nDs24gY292ZXLigJ0pIHkgZGlzdHJpYnV5YSwgZW4gbG9zIHTDqXJtaW5vcyBkZWwgcsOpZ2ltZW4gZGUgZGVyZWNob3MgZGUgYXV0b3IsIHNpIGxhIGNyZWFjacOzbiBvIGRpc3RyaWJ1Y2nDs24gZGUgZXNhIHZlcnNpw7NuIGNvdmVyIGVzdMOhIHByaW1vcmRpYWxtZW50ZSBkZXN0aW5hZGEgbyBkaXJpZ2lkYSBhIG9idGVuZXIgdW5hIHZlbnRhamEgY29tZXJjaWFsIG8gdW5hIGNvbXBlbnNhY2nDs24gbW9uZXRhcmlhIHByaXZhZGEuPC9saT4KICAgICAgICA8L29sPgogICAgICA8L2xpPgogICAgICA8bGk+R2VzdGnDs24gZGUgRGVyZWNob3MgZGUgQXV0b3Igc29icmUgSW50ZXJwcmV0YWNpb25lcyB5IEVqZWN1Y2lvbmVzIERpZ2l0YWxlcyAoV2ViQ2FzdGluZykuIFBhcmEgZXZpdGFyIHRvZGEgY29uZnVzacOzbiwgZWwgTGljZW5jaWFudGUgYWNsYXJhIHF1ZSwgY3VhbmRvIGxhIG9icmEgc2VhIHVuIGZvbm9ncmFtYSwgZWwgTGljZW5jaWFudGUgc2UgcmVzZXJ2YSBlbCBkZXJlY2hvIGV4Y2x1c2l2byBkZSBhdXRvcml6YXIgbGEgZWplY3VjacOzbiBww7pibGljYSBkaWdpdGFsIGRlIGxhIG9icmEgKHBvciBlamVtcGxvLCB3ZWJjYXN0KSB5IGRlIHJlY29sZWN0YXIsIGluZGl2aWR1YWxtZW50ZSBvIGEgdHJhdsOpcyBkZSB1bmEgc29jaWVkYWQgZGUgZ2VzdGnDs24gY29sZWN0aXZhIGRlIGRlcmVjaG9zIGRlIGF1dG9yIHkgZGVyZWNob3MgY29uZXhvcyAocG9yIGVqZW1wbG8sIEFDSU5QUk8pLCBsYXMgcmVnYWzDrWFzIHBvciBsYSBlamVjdWNpw7NuIHDDumJsaWNhIGRpZ2l0YWwgZGUgbGEgb2JyYSAocG9yIGVqZW1wbG8sIHdlYmNhc3QpLCBzdWpldGEgYSBsYXMgZGlzcG9zaWNpb25lcyBhcGxpY2FibGVzIGRlbCByw6lnaW1lbiBkZSBEZXJlY2hvIGRlIEF1dG9yLCBzaSBlc3RhIGVqZWN1Y2nDs24gcMO6YmxpY2EgZGlnaXRhbCBlc3TDoSBwcmltb3JkaWFsbWVudGUgZGlyaWdpZGEgYSBvYnRlbmVyIHVuYSB2ZW50YWphIGNvbWVyY2lhbCBvIHVuYSBjb21wZW5zYWNpw7NuIG1vbmV0YXJpYSBwcml2YWRhLjwvbGk+CiAgICA8L29sPgogIDwvbGk+CiAgPGJyLz4KICA8bGk+CiAgICBSZXByZXNlbnRhY2lvbmVzLCBHYXJhbnTDrWFzIHkgTGltaXRhY2lvbmVzIGRlIFJlc3BvbnNhYmlsaWRhZC4KICAgIDxwPkEgTUVOT1MgUVVFIExBUyBQQVJURVMgTE8gQUNPUkRBUkFOIERFIE9UUkEgRk9STUEgUE9SIEVTQ1JJVE8sIEVMIExJQ0VOQ0lBTlRFIE9GUkVDRSBMQSBPQlJBIChFTiBFTCBFU1RBRE8gRU4gRUwgUVVFIFNFIEVOQ1VFTlRSQSkg4oCcVEFMIENVQUzigJ0sIFNJTiBCUklOREFSIEdBUkFOVMONQVMgREUgQ0xBU0UgQUxHVU5BIFJFU1BFQ1RPIERFIExBIE9CUkEsIFlBIFNFQSBFWFBSRVNBLCBJTVBMw41DSVRBLCBMRUdBTCBPIENVQUxRVUlFUkEgT1RSQSwgSU5DTFVZRU5ETywgU0lOIExJTUlUQVJTRSBBIEVMTEFTLCBHQVJBTlTDjUFTIERFIFRJVFVMQVJJREFELCBDT01FUkNJQUJJTElEQUQsIEFEQVBUQUJJTElEQUQgTyBBREVDVUFDScOTTiBBIFBST1DDk1NJVE8gREVURVJNSU5BRE8sIEFVU0VOQ0lBIERFIElORlJBQ0NJw5NOLCBERSBBVVNFTkNJQSBERSBERUZFQ1RPUyBMQVRFTlRFUyBPIERFIE9UUk8gVElQTywgTyBMQSBQUkVTRU5DSUEgTyBBVVNFTkNJQSBERSBFUlJPUkVTLCBTRUFOIE8gTk8gREVTQ1VCUklCTEVTIChQVUVEQU4gTyBOTyBTRVIgRVNUT1MgREVTQ1VCSUVSVE9TKS4gQUxHVU5BUyBKVVJJU0RJQ0NJT05FUyBOTyBQRVJNSVRFTiBMQSBFWENMVVNJw5NOIERFIEdBUkFOVMONQVMgSU1QTMONQ0lUQVMsIEVOIENVWU8gQ0FTTyBFU1RBIEVYQ0xVU0nDk04gUFVFREUgTk8gQVBMSUNBUlNFIEEgVVNURUQuPC9wPgogIDwvbGk+CiAgPGJyLz4KICA8bGk+CiAgICBMaW1pdGFjacOzbiBkZSByZXNwb25zYWJpbGlkYWQuCiAgICA8cD5BIE1FTk9TIFFVRSBMTyBFWElKQSBFWFBSRVNBTUVOVEUgTEEgTEVZIEFQTElDQUJMRSwgRUwgTElDRU5DSUFOVEUgTk8gU0VSw4EgUkVTUE9OU0FCTEUgQU5URSBVU1RFRCBQT1IgREHDkU8gQUxHVU5PLCBTRUEgUE9SIFJFU1BPTlNBQklMSURBRCBFWFRSQUNPTlRSQUNUVUFMLCBQUkVDT05UUkFDVFVBTCBPIENPTlRSQUNUVUFMLCBPQkpFVElWQSBPIFNVQkpFVElWQSwgU0UgVFJBVEUgREUgREHDkU9TIE1PUkFMRVMgTyBQQVRSSU1PTklBTEVTLCBESVJFQ1RPUyBPIElORElSRUNUT1MsIFBSRVZJU1RPUyBPIElNUFJFVklTVE9TIFBST0RVQ0lET1MgUE9SIEVMIFVTTyBERSBFU1RBIExJQ0VOQ0lBIE8gREUgTEEgT0JSQSwgQVVOIENVQU5ETyBFTCBMSUNFTkNJQU5URSBIQVlBIFNJRE8gQURWRVJUSURPIERFIExBIFBPU0lCSUxJREFEIERFIERJQ0hPUyBEQcORT1MuIEFMR1VOQVMgTEVZRVMgTk8gUEVSTUlURU4gTEEgRVhDTFVTScOTTiBERSBDSUVSVEEgUkVTUE9OU0FCSUxJREFELCBFTiBDVVlPIENBU08gRVNUQSBFWENMVVNJw5NOIFBVRURFIE5PIEFQTElDQVJTRSBBIFVTVEVELjwvcD4KICA8L2xpPgogIDxici8+CiAgPGxpPgogICAgVMOpcm1pbm8uCiAgICA8b2wgdHlwZT0iYSI+CiAgICAgIDxsaT5Fc3RhIExpY2VuY2lhIHkgbG9zIGRlcmVjaG9zIG90b3JnYWRvcyBlbiB2aXJ0dWQgZGUgZWxsYSB0ZXJtaW5hcsOhbiBhdXRvbcOhdGljYW1lbnRlIHNpIFVzdGVkIGluZnJpbmdlIGFsZ3VuYSBjb25kaWNpw7NuIGVzdGFibGVjaWRhIGVuIGVsbGEuIFNpbiBlbWJhcmdvLCBsb3MgaW5kaXZpZHVvcyBvIGVudGlkYWRlcyBxdWUgaGFuIHJlY2liaWRvIE9icmFzIERlcml2YWRhcyBvIENvbGVjdGl2YXMgZGUgVXN0ZWQgZGUgY29uZm9ybWlkYWQgY29uIGVzdGEgTGljZW5jaWEsIG5vIHZlcsOhbiB0ZXJtaW5hZGFzIHN1cyBsaWNlbmNpYXMsIHNpZW1wcmUgcXVlIGVzdG9zIGluZGl2aWR1b3MgbyBlbnRpZGFkZXMgc2lnYW4gY3VtcGxpZW5kbyDDrW50ZWdyYW1lbnRlIGxhcyBjb25kaWNpb25lcyBkZSBlc3RhcyBsaWNlbmNpYXMuIExhcyBTZWNjaW9uZXMgMSwgMiwgNSwgNiwgNywgeSA4IHN1YnNpc3RpcsOhbiBhIGN1YWxxdWllciB0ZXJtaW5hY2nDs24gZGUgZXN0YSBMaWNlbmNpYS48L2xpPgogICAgICA8bGk+U3VqZXRhIGEgbGFzIGNvbmRpY2lvbmVzIHkgdMOpcm1pbm9zIGFudGVyaW9yZXMsIGxhIGxpY2VuY2lhIG90b3JnYWRhIGFxdcOtIGVzIHBlcnBldHVhIChkdXJhbnRlIGVsIHBlcsOtb2RvIGRlIHZpZ2VuY2lhIGRlIGxvcyBkZXJlY2hvcyBkZSBhdXRvciBkZSBsYSBvYnJhKS4gTm8gb2JzdGFudGUgbG8gYW50ZXJpb3IsIGVsIExpY2VuY2lhbnRlIHNlIHJlc2VydmEgZWwgZGVyZWNobyBhIHB1YmxpY2FyIHkvbyBlc3RyZW5hciBsYSBPYnJhIGJham8gY29uZGljaW9uZXMgZGUgbGljZW5jaWEgZGlmZXJlbnRlcyBvIGEgZGVqYXIgZGUgZGlzdHJpYnVpcmxhIGVuIGxvcyB0w6lybWlub3MgZGUgZXN0YSBMaWNlbmNpYSBlbiBjdWFscXVpZXIgbW9tZW50bzsgZW4gZWwgZW50ZW5kaWRvLCBzaW4gZW1iYXJnbywgcXVlIGVzYSBlbGVjY2nDs24gbm8gc2Vydmlyw6EgcGFyYSByZXZvY2FyIGVzdGEgbGljZW5jaWEgbyBxdWUgZGViYSBzZXIgb3RvcmdhZGEgLCBiYWpvIGxvcyB0w6lybWlub3MgZGUgZXN0YSBsaWNlbmNpYSksIHkgZXN0YSBsaWNlbmNpYSBjb250aW51YXLDoSBlbiBwbGVubyB2aWdvciB5IGVmZWN0byBhIG1lbm9zIHF1ZSBzZWEgdGVybWluYWRhIGNvbW8gc2UgZXhwcmVzYSBhdHLDoXMuIExhIExpY2VuY2lhIHJldm9jYWRhIGNvbnRpbnVhcsOhIHNpZW5kbyBwbGVuYW1lbnRlIHZpZ2VudGUgeSBlZmVjdGl2YSBzaSBubyBzZSBsZSBkYSB0w6lybWlubyBlbiBsYXMgY29uZGljaW9uZXMgaW5kaWNhZGFzIGFudGVyaW9ybWVudGUuPC9saT4KICAgIDwvb2w+CiAgPC9saT4KICA8YnIvPgogIDxsaT4KICAgIFZhcmlvcy4KICAgIDxvbCB0eXBlPSJhIj4KICAgICAgPGxpPkNhZGEgdmV6IHF1ZSBVc3RlZCBkaXN0cmlidXlhIG8gcG9uZ2EgYSBkaXNwb3NpY2nDs24gcMO6YmxpY2EgbGEgT2JyYSBvIHVuYSBPYnJhIENvbGVjdGl2YSwgZWwgTGljZW5jaWFudGUgb2ZyZWNlcsOhIGFsIGRlc3RpbmF0YXJpbyB1bmEgbGljZW5jaWEgZW4gbG9zIG1pc21vcyB0w6lybWlub3MgeSBjb25kaWNpb25lcyBxdWUgbGEgbGljZW5jaWEgb3RvcmdhZGEgYSBVc3RlZCBiYWpvIGVzdGEgTGljZW5jaWEuPC9saT4KICAgICAgPGxpPlNpIGFsZ3VuYSBkaXNwb3NpY2nDs24gZGUgZXN0YSBMaWNlbmNpYSByZXN1bHRhIGludmFsaWRhZGEgbyBubyBleGlnaWJsZSwgc2Vnw7puIGxhIGxlZ2lzbGFjacOzbiB2aWdlbnRlLCBlc3RvIG5vIGFmZWN0YXLDoSBuaSBsYSB2YWxpZGV6IG5pIGxhIGFwbGljYWJpbGlkYWQgZGVsIHJlc3RvIGRlIGNvbmRpY2lvbmVzIGRlIGVzdGEgTGljZW5jaWEgeSwgc2luIGFjY2nDs24gYWRpY2lvbmFsIHBvciBwYXJ0ZSBkZSBsb3Mgc3VqZXRvcyBkZSBlc3RlIGFjdWVyZG8sIGFxdcOpbGxhIHNlIGVudGVuZGVyw6EgcmVmb3JtYWRhIGxvIG3DrW5pbW8gbmVjZXNhcmlvIHBhcmEgaGFjZXIgcXVlIGRpY2hhIGRpc3Bvc2ljacOzbiBzZWEgdsOhbGlkYSB5IGV4aWdpYmxlLjwvbGk+CiAgICAgIDxsaT5OaW5nw7puIHTDqXJtaW5vIG8gZGlzcG9zaWNpw7NuIGRlIGVzdGEgTGljZW5jaWEgc2UgZXN0aW1hcsOhIHJlbnVuY2lhZGEgeSBuaW5ndW5hIHZpb2xhY2nDs24gZGUgZWxsYSBzZXLDoSBjb25zZW50aWRhIGEgbWVub3MgcXVlIGVzYSByZW51bmNpYSBvIGNvbnNlbnRpbWllbnRvIHNlYSBvdG9yZ2FkbyBwb3IgZXNjcml0byB5IGZpcm1hZG8gcG9yIGxhIHBhcnRlIHF1ZSByZW51bmNpZSBvIGNvbnNpZW50YS48L2xpPgogICAgICA8bGk+RXN0YSBMaWNlbmNpYSByZWZsZWphIGVsIGFjdWVyZG8gcGxlbm8gZW50cmUgbGFzIHBhcnRlcyByZXNwZWN0byBhIGxhIE9icmEgYXF1w60gbGljZW5jaWFkYS4gTm8gaGF5IGFycmVnbG9zLCBhY3VlcmRvcyBvIGRlY2xhcmFjaW9uZXMgcmVzcGVjdG8gYSBsYSBPYnJhIHF1ZSBubyBlc3TDqW4gZXNwZWNpZmljYWRvcyBlbiBlc3RlIGRvY3VtZW50by4gRWwgTGljZW5jaWFudGUgbm8gc2UgdmVyw6EgbGltaXRhZG8gcG9yIG5pbmd1bmEgZGlzcG9zaWNpw7NuIGFkaWNpb25hbCBxdWUgcHVlZGEgc3VyZ2lyIGVuIGFsZ3VuYSBjb211bmljYWNpw7NuIGVtYW5hZGEgZGUgVXN0ZWQuIEVzdGEgTGljZW5jaWEgbm8gcHVlZGUgc2VyIG1vZGlmaWNhZGEgc2luIGVsIGNvbnNlbnRpbWllbnRvIG11dHVvIHBvciBlc2NyaXRvIGRlbCBMaWNlbmNpYW50ZSB5IFVzdGVkLjwvbGk+CiAgICA8L29sPgogIDwvbGk+CiAgPGJyLz4KPC9vbD4K