This volume presents a manual for a new method of studying implicit attitudes, the Test of Implicit Associations in Relationship Attitudes (TIARA). The main goal of this volume is to demonstrate how to study the implicit attitudes that people have toward others in their close relationships: friend, romantic partner, family member, etc. Since the inception of the concept and measures of implicit cognition, researchers have developed a number of indirect measures to assess implicit attitudes. These similar yet different methods aim to account for different variables for reliable and valid operational definitions of implicit attitudes. Given the progress made in the field of implicit measures, there is great potential for further development and extension of these types of assessments. Many of these methods (especially the Implicit Attitude Test) are only limited to assessing attitudes within the comparison of two bipolar concepts. Therefore, TIARA was developed to be a manual for a new method of studying implicit attitudes in relationships. As described in this volume, TIARA shows that if a person strongly believes that certain feelings can be attributed to a target relationship figure, the reaction time is shorter since they are the most confident in their answer. Beginning with a grounded explanation of the theory behind TIARA, the volume then proceeds to explain its methods and procedures, and how to code, score, and interpret the results of TIARA. Next, the volume reports on six psychometric studies, which provide substantial evidence that TIARA is a valid and reliable measure to study implicit attitudes in relationship research. The volume concludes by exploring practical applications of TIARA as well as its future directions and current limitations. The detailed description of the TIARA method provides a practical and handy tutorial for using the method in research and practice for social and personality psychologists, as well as practitioners.
The chapters in this edited volume present multi-disciplinary case studies of prehistoric archaeological sites located on now-submerged portions of the continental shelf. Each chapter represents an extension of the known prehistoric record beyond the modern shoreline. Case studies represent central themes of landscape change, climate change and societal development, using new technologies for mapping, monitoring and managing these sites.
This authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) - also known as Biometric Anti-Spoofing. Building on the success of the previous, pioneering edition, this thoroughly updated second edition has been considerably expanded to provide even greater coverage of PAD methods, spanning biometrics systems based on face, fingerprint, iris, voice, vein, and signature recognition. New material is also included on major PAD competitions, important databases for research, and on the impact of recent international legislation. Valuable insights are supplied by a selection of leading experts in the field, complete with results from reproducible research, supported by source code and further information available at an associated website.Topics and features: reviews the latest developments in PAD for fingerprint biometrics, covering optical coherence tomography (OCT) technology, and issues of interoperability; examines methods for PAD in iris recognition systems, and the application of stimulated pupillary light reflex for this purpose; discusses advancements in PAD methods for face recognition-based biometrics, such as research on 3D facial masks and remote photoplethysmography (rPPG); presents a survey of PAD for automatic speaker recognition (ASV), including the use of convolutional neural networks (CNNs), and an overview of relevant databases; describes the results yielded by key competitions on fingerprint liveness detection, iris liveness detection, and software-based face anti-spoofing; provides analyses of PAD in fingervein recognition, online handwritten signature verification, and in biometric technologies on mobile devicesincludes coverage of international standards, the E.U. PSDII and GDPR directives, and on different perspectives on presentation attack evaluation.This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics.