Polygraph Introduction & Application - Essay Example

Only on StudentShare

Extract of sample
Polygraph Introduction & Application

Polygraph was often used to request for resignation to the dishonest job applicants in those days (Barland, 1978). Later, an important addition in law in 1988 in the US disapproved the firing of employees based on polygraph results. However, several US government agencies practice the applicability of polygraph in the detection of lie (American Polygraph Association, 1983a; 1983b; American Psychological Association, 1974; 1983). Amongst several government sectors, the police investigators of US also hold the practice of polygraph applicability. The US Supreme Court has left it to the decision of individual jurisdictions whether or not the inclusion of polygraph test should take place in the court cases. On the other hand, in European jurisdictions, the application of polygraph is considered as an unreliable and invalid means of approaching the truth.
The procedure for the application of polygraph instrument for lie detection has its beginning with a pre-test interview designed to establish a connection between the tester and the testee. The information gained by this step is called "Control Questions." We might say that just as in a good research design of an experiment a control group exists so in the practical application of polygraph the first step can be considered as the control step. ...
Download paper

Summary

A polygraph or lie detector is a device which is considered to hold the unique efficiency to detect lie by measuring and recording several physiological variables (blood pressure, heart rate, skin conductivity, respiration) while a series of questions are being put to the subject (Dawson, 1980)…
Author : dejuan20

Related Essays

Bluetooth Application Development
However, when it comes to synchronizing the PDA with the laptop or the phonebook in the cellular phone with PDA/Laptop or just exchanging information with a friend via laptop/PDA one would still need to either use cables to connect the two devices or remove them or have them specifically aligned (as in using Infrared). In either case, the process is quite cumbersome and does not happen without effort. This last bit of the network, which involves ones personal appliance, is referred to as the Personal Area Network (PAN).
...
6 pages (1506 words) Essay
Dissertation, Introduction
This paper illustrates that in today’s era of Information Technology the world is increasingly becoming networked, technical, and closer to each other. Over the years IT has led to revolutionizing the way business is conducted, education is imparted, we communicate, we socialize, illness is cured etc. IT has made its mark in almost all spheres of life; therefore preparing the children for a better tomorrow becomes all the more crucial. The Internet and its smaller version the intranet have proved to be particularly revolutionary. This type of networking enables access to vast quantities of...
4 pages (1004 words) Assignment
Open Source Systems Application in the Navy
al, 2006, p.1). As the popularity of open source software increases in the public sector, government are taking necessary actions to gather more information and justification to include open source in high security environments like the military. Selecting the navy as the military branch for open source application, the paper will going to identify the key stakeholders and present the issues involve in the development and implementation in this particular environment.
...
10 pages (2510 words) Essay
Internet Chat System
It has methods that allow read and write byte streams through the socket. TCP/IP server applications rely on a networking class provided by Java, java.net.ServerSocket. This class takes most of the work out of establishing a server. ServerSocket allows you to bind a port and wait for clients to connect, setting up a complete Socket object at that time. After communications are complete with the client, the server must close the streams and then close the Socket instance.
...
18 pages (4518 words) Essay
Web Technology. Extensible Mark-up Language (XML).
In this coursework, XML technology will be employed with a personal web application that requires visitors of this web site to input personal details for future retrieval or access. This data can now be stored in XML schema where it can be accessed for user validation. Appropriate form will be used in the web application for the data entry for storing and login functions.
...
5 pages (1255 words) Assignment
Distribtuted Business Application Coursework
Whether one is signing up for internet service with Internet Service Provider (ISP), sending emails, browsing internet sites, or using a search engine to locate required information, the identity of the machine is being shared, and it can be misused by someone masquerading as someone else (Webliminal.com, 2007) 2. In addition, many businesses gather and store personal information of the potential new and existing customers in their systems which give rise to privacy and information security issues. When anyone attempts to make a payment online using credit cards and other instruments, the...
6 pages (1506 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!