Polygraph Introduction & Application

Undergraduate
Essay
Technology
Pages 8 (2008 words)
Download 0
A polygraph or lie detector is a device which is considered to hold the unique efficiency to detect lie by measuring and recording several physiological variables (blood pressure, heart rate, skin conductivity, respiration) while a series of questions are being put to the subject (Dawson, 1980)…

Introduction

Polygraph was often used to request for resignation to the dishonest job applicants in those days (Barland, 1978). Later, an important addition in law in 1988 in the US disapproved the firing of employees based on polygraph results. However, several US government agencies practice the applicability of polygraph in the detection of lie (American Polygraph Association, 1983a; 1983b; American Psychological Association, 1974; 1983). Amongst several government sectors, the police investigators of US also hold the practice of polygraph applicability. The US Supreme Court has left it to the decision of individual jurisdictions whether or not the inclusion of polygraph test should take place in the court cases. On the other hand, in European jurisdictions, the application of polygraph is considered as an unreliable and invalid means of approaching the truth.
The procedure for the application of polygraph instrument for lie detection has its beginning with a pre-test interview designed to establish a connection between the tester and the testee. The information gained by this step is called "Control Questions." We might say that just as in a good research design of an experiment a control group exists so in the practical application of polygraph the first step can be considered as the control step. ...
Download paper
Not exactly what you need?

Related papers

Polygraph Introduction & Application
Polygraph was often used to request for resignation to the dishonest job applicants in those days (Barland, 1978). Later, an important addition in law in 1988 in the US disapproved the firing of employees based on polygraph results. However, several US government agencies practice the applicability of polygraph in the detection of lie (American Polygraph Association, 1983a; 1983b; American…
Bluetooth Application Development
However, when it comes to synchronizing the PDA with the laptop or the phonebook in the cellular phone with PDA/Laptop or just exchanging information with a friend via laptop/PDA one would still need to either use cables to connect the two devices or remove them or have them specifically aligned (as in using Infrared). In either case, the process is quite cumbersome and does not happen without…
Dissertation, Introduction
Interaction is in essence the core of teaching and learning process. Therefore, when the teacher is there around us whenever we are in doubt, the process of learning becomes all the more interesting. Education is essentially about imparting information, knowledge and skills. Easy access and availability of books and other reference material makes the process of learning more flexible and helps the…
Open Source Systems Application in the Navy
al, 2006, p.1). As the popularity of open source software increases in the public sector, government are taking necessary actions to gather more information and justification to include open source in high security environments like the military. Selecting the navy as the military branch for open source application, the paper will going to identify the key stakeholders and present the issues…
Internet Chat System
It has methods that allow read and write byte streams through the socket. TCP/IP server applications rely on a networking class provided by Java, java.net.ServerSocket. This class takes most of the work out of establishing a server. ServerSocket allows you to bind a port and wait for clients to connect, setting up a complete Socket object at that time. After communications are complete with the…
Web Technology. Extensible Mark-up Language (XML).
In this coursework, XML technology will be employed with a personal web application that requires visitors of this web site to input personal details for future retrieval or access. This data can now be stored in XML schema where it can be accessed for user validation. Appropriate form will be used in the web application for the data entry for storing and login functions. …
Distribtuted Business Application Coursework
Whether one is signing up for internet service with Internet Service Provider (ISP), sending emails, browsing internet sites, or using a search engine to locate required information, the identity of the machine is being shared, and it can be misused by someone masquerading as someone else (Webliminal.com, 2007) 2. In addition, many businesses gather and store personal information of the potential…