Wednesday, October 30, 2019

Critique and Development of Research Questions Essay

Critique and Development of Research Questions - Essay Example onsidered as a chief method of ensuring national security and the employment of Polygraph interviews as part of security clearance procedures in different branches of the American government has been widely criticized. Thus, in the background of ongoing debates on the utility of polygraph in national security, the scope and relevance of a profound research on the topic is categorical. In this research paper, the focal attempt has been to make a scrupulous investigation on ‘the utility of polygraph in national security’. The psycho-physiological detection of deception (PDD) including polygraph testing should be given more crucial attention in current researches. â€Å"In stark contrast to the scientific literature on forensic use of PDD, the use of FDD in employment and for screening, including screening for national security, is the subject of relatively little published research. Initial commentary on the use of polygraphs for national security screening focused on pro blems that all diagnostic tests experience when attempting to diagnose a rare condition.† (Granhag and Strà ¶mwall, 2004, p 118). In the background of serious debates on the question, it is of central implication to have a precise analysis of the matters and to come up with the most sagacious findings on the question. Therefore, the importance of this research paper is greater and the potential findings of this investigation on ‘the utility of polygraph in national security’ also justify the scope of the study. The utility of polygraph in national security has been a critical topic which has attained enormous focus and invited national interest in the modern American context. The paper attempts to undertake a profound investigation into the topic ‘The Utility of Polygraph in National Security’ and come up with the most sagacious findings on the questions which attract the current debates. Polygraph testing has been a serious technique of security assurance for a long time, in spite of the

No comments:

Post a Comment