Polygraph Introduction & Application - Essay Example

Only on StudentShare

Extract of sample
Polygraph Introduction & Application

Polygraph was often used to request for resignation to the dishonest job applicants in those days (Barland, 1978). Later, an important addition in law in 1988 in the US disapproved the firing of employees based on polygraph results. However, several US government agencies practice the applicability of polygraph in the detection of lie (American Polygraph Association, 1983a; 1983b; American Psychological Association, 1974; 1983). Amongst several government sectors, the police investigators of US also hold the practice of polygraph applicability. The US Supreme Court has left it to the decision of individual jurisdictions whether or not the inclusion of polygraph test should take place in the court cases. On the other hand, in European jurisdictions, the application of polygraph is considered as an unreliable and invalid means of approaching the truth.
The procedure for the application of polygraph instrument for lie detection has its beginning with a pre-test interview designed to establish a connection between the tester and the testee. The information gained by this step is called "Control Questions." We might say that just as in a good research design of an experiment a control group exists so in the practical application of polygraph the first step can be considered as the control step. ...Show more

Summary

A polygraph or lie detector is a device which is considered to hold the unique efficiency to detect lie by measuring and recording several physiological variables (blood pressure, heart rate, skin conductivity, respiration) while a series of questions are being put to the subject (Dawson, 1980)…
Author : dejuan20
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Polygraph Introduction & Application"
with a personal 20% discount.
Grab the best paper

Related Essays

Bluetooth Application Development
For instance, with the advent of GPRS (General Packet Radio Service) and CDMA(Code Division Multiple Access) and a number of other revolutionary modulation and transmission techniques it is now possible to access the internet wirelessly using either a cellular phone or a PDA/Laptop at relatively high speeds.
6 pages (1500 words) Essay
Dissertation, Introduction
The study will therefore discuss the various technologies involved in the implementation of a school Intranet and how the different models of teaching and learning process are adapted to suit an online education. The process of learning involves an ability to acquire the knowledge and subsequent transformation into skills.
4 pages (1000 words) Assignment
Electronic Voice Phenomenon
Similar to a dog whistle, EVP has a frequency that is too high for a human to hear, but for such things that are designed specifically for hearing higher frequencies - such as the audio recorder which uses magnets to record onto tape - it works. In the 1990 movie Ghost, another form of communication is used to contact the spirit world, this time the form being Mediumistic Communication.
2 pages (500 words) Movie Review
Open Source Systems Application in the Navy
Although FS is always available as OSS does not necessarily mean it is always free. This is the reason why we have to refer to F/OSS to accommodate related and interchangeable method of software development. It is a relatively new way to build and deploy large software systems, which are different in various ways from the customary principles, and procedures encouraged in software engineering (Scacchi et.
10 pages (2500 words) Essay
Web accessibility and the Internet - Cultural Issues.
With the extensive growth being experienced in the area of internet based commercial operations, the impact of the non-technical factors on the internet acceptability have become a very important area of research. The most the companies and shopping groups use online medium has a core component for their promotional exercises.
8 pages (2000 words) Essay
Internet Chat System
The system comprises two-tier application, the server and client applications. The client side of the system using TCP/IP application relies on the java.net.Socket class. The socket class is used for normal two-way socket communications and much of the work involved in establishing connection has already been packaged in this class.
18 pages (4500 words) Essay
Web Technology. Extensible Mark-up Language (XML).
Extensible Mark-up Language or XML has been helping web developers' suit their personal and business needs (W3C, 2006). XML provides new avenues of electronic communications between human and machines. It has been known as the "lowest-common-denominator" for other systems can use.
5 pages (1250 words) Assignment
Information and Communications Technology
This term has greatly affected the learning of subject=based lessons. The overall impact is that schools are integrating ICT on a wider scale through blogs, installing LAN facility and setting email account of teachers. Teachers themselves are using databases to upload marks, using expert advice through emails and designing interactive quizzes and games.
12 pages (3000 words) Essay
Distribtuted Business Application Coursework
However, security and privacy of information has been one of the biggest threats to information systems to date. Internet has been used widely as a medium for sharing information and personal data with trusted and reliable parties. But, whenever a person access internet, his/ her computer leaves its identity at each step of the route (Privacy Rights Clearing House, 2006)1.
6 pages (1500 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT