Foundations of Effective Influence Operations a Framework for Enhancing Army Capabilities

Total Page:16

File Type:pdf, Size:1020Kb

Foundations of Effective Influence Operations a Framework for Enhancing Army Capabilities THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Arroyo Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Foundations of Effective Influence Operations A Framework for Enhancing Army Capabilities Eric V. Larson, Richard E. Darilek, Daniel Gibran, Brian Nichiporuk, Amy Richardson, Lowell H. Schwartz, Cathryn Quantic Thurston Prepared for the United States Army Approved for public release; distribution unlimited ARROYO CENTER The research described in this report was sponsored by the United States Army under Contract No. W74V8H-06-C-0001. Library of Congress Cataloging-in-Publication Data Foundations of effective influence operations / Eric V. Larson ... [et al.]. p. cm. Includes bibliographical references. ISBN 978-0-8330-4404-4 (pbk. : alk. paper) 1. United States. Army—Planning. 2. Influence (Psychology) 3. United States— Relations—Foreign countries. 4. United States—Foreign public opinion. 5. United States—Military policy. 6. Diplomacy. 7. Strategy. 8. Communication, International. 9. Information warfare—United States. 10. Economic assistance, American. I. Larson, Eric V. (Eric Victor), 1957– UA23.F625 2009 355.4'1—dc22 2008053723 The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. © Copyright 2009 RAND Corporation Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND Web site is prohibited. RAND documents are protected under copyright law. For information on reprint and linking permissions, please visit the RAND permissions page (http://www.rand.org/publications/permissions.html). Published 2009 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] Preface Since the end of the Cold War, there has been growing interest in improving the nation’s ability to employ various forms of “soft power”— capabilities that might allow the United States to effectively influence the attitudes and behavior of particular foreign audiences while mini- mizing or avoiding combat entirely. The present study was undertaken to assist the U.S. Army in understanding “influence operations” and to identify approaches, methodologies, models, and tools that may be useful in planning, executing, and assessing influence operations. This research was sponsored by the U.S. Army Training and Doc- trine Command’s (TRADOC’s) Futures Center. It was conducted in the RAND Arroyo Center’s Strategy, Doctrine, and Resources Pro- gram. RAND Arroyo Center, part of the RAND Corporation, is a federally funded research and development center sponsored by the United States Army. Please direct any comments or additional information to the prin- cipal investigator, Eric V. Larson, at 310.393.0411 extension 7467 or [email protected]. The Project Unique Identification Code (PUIC) for the project that produced this document is DAPRR05007. iii iv Foundations of Effective Influence Operations For more information on RAND Arroyo Center, contact the Director of Operations (telephone 310-393-0411, extension 6419; FAX 310-451-6952; email [email protected]), or visit Arroyo’s Web site at http://www.rand.org/ard/. Contents Preface ............................................................................. iii Figures .............................................................................vii Table ................................................................................ ix Summary .......................................................................... xi Acknowledgments .............................................................. xxi Abbreviations .................................................................. xxiii CHaptER ONE Introduction ....................................................................... 1 Defining Influence Operations ................................................... 2 Study Questions and Approach .................................................. 6 Organization of This Report ...................................................... 8 CHaptER TWO Influencing Individuals .........................................................11 Engineering Attitude Change ...................................................18 Influencing Individuals: Conclusions .......................................... 23 CHaptER THREE Influencing Groups and Networks ...........................................29 Behavioral Perspectives Regarding Groups ....................................29 Rational Choice Perspectives Regarding Groups ............................. 34 Influence in Social Networks ................................................... 38 Influencing Groups and Networks: Conclusions ..............................41 v vi Foundations of Effective Influence Operations CHaptER FOUR Influencing Adversary Leadership Coalitions ............................. 43 Actor-Specific Models and Strategies .......................................... 43 Agent-Based Rational Choice Models ......................................... 46 Influencing Adversary Leadership Coalitions: Conclusions..................51 CHaptER FIVE Influencing Mass Publics .......................................................53 Opinion Leadership and Media Communications ............................58 Content Analysis ................................................................59 Semantic Network Analysis ...................................................63 Assessing Mass Public Opinion .................................................65 Lessons from Case Studies .......................................................67 Influencing Mass Publics: Conclusions .........................................69 CHaptER SIX A Framework for Influence Operations ......................................71 Planning Requirements ...........................................................71 Questions About Strategic Issues .............................................71 Questions About the Target Audiences ......................................74 Some Additional Planning Considerations ....................................81 A Framework for Influence Operations: Conclusions ........................83 CHaptER SEVEN Implications for Planners ......................................................85 APPENDIX A. Case Study of Influence in Advertising and Marketing .............89 B. Case Study of Influence in Political Campaigns .................... 111 C. Case Studies of Influence in Public Diplomacy ..................... 133 D. A Review of Planning Methodologies for Influence Operations ..................................................... 155 Bibliography .................................................................... 179 Figures S.1. Elements of Influence Operations ................................xiii 1.1. Elements of Influence Operations .................................. 5 2.1. Attitude Objects in Multidimensional Space .....................21 2.2. Alternative Domains for Persuasive Appeals .................... 24 5.1. A Simple Model of Influence for Mass Publics .................. 54 6.1. Notional Probability of Accepting a Message Based on High, Medium, or Low Predisposition ........................... 80 B.1. Diagramming an Electorate ...................................... 117 B.2. Impact of Direct Mail During 1994 Texas Governor’s Race ................................................................
Recommended publications
  • The Effectiveness of Influence Activities in Information Warfare
    The Effectiveness of Influence Activities in Information Warfare Cassandra Lee Brooker A thesis submitted in fulfilment of the requirements for the degree of Master of Research School of Business May 2020 Thesis/Dissertation Sheet Surname : BROOKER Given Name/s : CASSANDRA LEE Abbreviation for degree : MRes Faculty : UNSW Canberra School : School of Business Thesis Title : The Effectiveness of Influence Activities in Information Warfare Abstract Rapid, globalised power shifts, technological advances, and increasingly interconnected, ungoverned communications networks have resulted in the rise of asymmetric grey zone threats. The lines are now blurred between political, civil, and military information environments. The rise of influence activities is the new ‘sharp power’ in information warfare (the iWar). Western democracies are already at war in the information domain and are being out-communicated by their adversaries. Building on the commentary surrounding this contemporary threat, and based on a review of the literature across three academic disciplines of: Systems Thinking, Influence, and Cognitive Theory; this study aimed to investigate solutions for improving Australia’s influence effectiveness in the iWar. This study asked how systems thinking can offer an effective approach to holistically understanding complex social systems in the iWar; as well as asking why understanding both successful influencing strategies and psychological cognitive theories is central to analysing those system behaviours. To answer the aim, a systems thinking methodology was employed to compare two contrasting case studies to determine their respective influencing effectiveness. The successful case system comprising the terrorist group ISIS was compared and contrasted with the unsuccessful case system of Hillary Clinton’s 2016 election campaign – using a single stock of influence to determine relevant reinforcing and balancing feedback.
    [Show full text]
  • Classical Conditioning Without Awareness: an Electrophysiological Investigation
    Classical conditioning without awareness: An electrophysiological investigation A Thesis Presented to The Division of Philosophy, Religion, Psychology, and Linguistics Reed College In Partial Fulfillment of the Requirements for the Degree Bachelor of Arts Jasmine Huang December 2016 Approved for the Division (Psychology) Timothy Hackenberg Michael Pitts Acknowledgements There is no way to express the amount of gratitude I feel towards every single person who has contributed to my growth as a student and as a human being, but I will try. My family, who has worked tirelessly to support me through life and years of school, I will never know how to repay that debt. My advisors, who have endlessly encouraged me and provided me with every opportunity I could have wished for. Tim who has believed in and supported me from my first year at Reed right up until the end. Enriqueta who was always willing to discuss experiments outside of class (even when I wasn’t in her class to begin with). Michael who inspired me every day with his unending enthusiasm and drive for research. The amazing psychology department staff who are always making sure that everything is running as smoothly as it can be. Joan, our silent hero who puts out the metaphorical fires every day. Greg, one the most lively presences in the animal colony, whose love for all of the critters is unparalleled. Chris, whose attention to detail and patience for dumb questions were invaluable to me during this process. Lavinia, whose realism and dark humor made for the best introduction into real labwork that I could have asked for.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Information Warfare, International Law, and the Changing Battlefield
    ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? .............................
    [Show full text]
  • Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
    Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer.
    [Show full text]
  • Comparison Between Two Methodological Paradigms of Conditioned Place Preference with Methlyphenidate
    East Tennessee State University Digital Commons @ East Tennessee State University Undergraduate Honors Theses Student Works 12-2013 Comparison between Two Methodological Paradigms of Conditioned Place Preference with Methlyphenidate. Bryce D. Watson East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/honors Part of the Psychiatry and Psychology Commons Recommended Citation Watson, Bryce D., "Comparison between Two Methodological Paradigms of Conditioned Place Preference with Methlyphenidate." (2013). Undergraduate Honors Theses. Paper 89. https://dc.etsu.edu/honors/89 This Honors Thesis - Open Access is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Undergraduate Honors Theses by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Watson 1 Comparison between Two Methodological Paradigms of Conditioned Place Preference with Methlyphenidate By Bryce Watson The Honors College Honors in Discipline Program East Tennessee State University Department of Psychology December 9, 2013 Russell Brown, Faculty Mentor David Harker, Faculty Reader Eric Sellers, Faculty Reader Watson 2 Abstract The aim of this thesis is to examine the mechanisms of Methylphenidate (MPH) on Conditioned Place Preference (CPP), a behavioral test of reward. The psychostimulant MPH is therapeutically used in the treatment of ADHD, but has been implicated in many pharmacological actions related to drug addiction and is considered to have abuse potential. Past work in our lab and others have shown substantial sex-differences in the neuropharmacological profile of MPH. Here a discussion of the relevant mechanisms of action of MPH and its relationship to neurotrophins and CPP are reviewed.
    [Show full text]
  • Coming to Grips with Life in the Disinformation Age
    Coming to Grips with Life in the Disinformation Age “The Information Age” is the term given to post-World War II contemporary society, particularly from the Sixties, onward, when we were coming to the realization that our ability to publish information of all kinds, fact and fiction, was increasing at an exponential rate so as to make librarians worry that they would soon run out of storage space. Their storage worries were temporarily allayed by the advent of the common use of microform analog photography of printed materials, and eventually further by digital technology and nanotechnology. It is noted that in this era, similar to other past eras of great growth in communications technology such as written language, the printing press, analog recording, and telecommunication, dramatic changes occurred as well in human thinking and socialness. More ready archiving negatively impacted our disposition to remember things by rote, including, in recent times, our own phone numbers. Moreover, many opportunities for routine socializing were lost, particularly those involving public speech and readings, live music and theater, live visits to neighbors and friends, etc. The recognition that there had been a significant tradeoff from which there seemed to be no turning back evoked discussion of how to come to grips with “life in the Information Age”. Perhaps we could discover new social and intellectual opportunities from our technological advances to replace the old ones lost, ways made available by new technology. Today we are facing a new challenge, also brought on largely by new technology: that of coming to grips with life in the “Disinformation Age”.
    [Show full text]
  • S:\FULLCO~1\HEARIN~1\Committee Print 2018\Henry\Jan. 9 Report
    Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. 1 115TH CONGRESS " ! S. PRT. 2d Session COMMITTEE PRINT 115–21 PUTIN’S ASYMMETRIC ASSAULT ON DEMOCRACY IN RUSSIA AND EUROPE: IMPLICATIONS FOR U.S. NATIONAL SECURITY A MINORITY STAFF REPORT PREPARED FOR THE USE OF THE COMMITTEE ON FOREIGN RELATIONS UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION JANUARY 10, 2018 Printed for the use of the Committee on Foreign Relations Available via World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PUBLISHING OFFICE 28–110 PDF WASHINGTON : 2018 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5012 Sfmt 5012 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN. 9 REPORT FOREI-42327 with DISTILLER seneagle Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. COMMITTEE ON FOREIGN RELATIONS BOB CORKER, Tennessee, Chairman JAMES E. RISCH, Idaho BENJAMIN L. CARDIN, Maryland MARCO RUBIO, Florida ROBERT MENENDEZ, New Jersey RON JOHNSON, Wisconsin JEANNE SHAHEEN, New Hampshire JEFF FLAKE, Arizona CHRISTOPHER A. COONS, Delaware CORY GARDNER, Colorado TOM UDALL, New Mexico TODD YOUNG, Indiana CHRISTOPHER MURPHY, Connecticut JOHN BARRASSO, Wyoming TIM KAINE, Virginia JOHNNY ISAKSON, Georgia EDWARD J. MARKEY, Massachusetts ROB PORTMAN, Ohio JEFF MERKLEY, Oregon RAND PAUL, Kentucky CORY A. BOOKER, New Jersey TODD WOMACK, Staff Director JESSICA LEWIS, Democratic Staff Director JOHN DUTTON, Chief Clerk (II) VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN.
    [Show full text]
  • POLITICAL SPEECH, DOUBLESPEAK, and CRITICAL-THINKING SKILLS in AMERICAN EDUCATION by Doris E. Minin-White a Capstone Project
    POLITICAL SPEECH, DOUBLESPEAK, AND CRITICAL-THINKING SKILLS IN AMERICAN EDUCATION by Doris E. Minin-White A capstone project submitted in partial fulfillment of the requirements for the degree of Masters of Arts in English as a Second Language. Hamline University Saint Paul, Minnesota December, 2017 Capstone Project Trish Harvey Content Expert: Joseph White 2 My Project In this project, I will attempt to identify and analyze common cases of doublespeak in selected samples of political discourse, delivered by the two most recent U. S. presidents: Barack Obama and Donald Trump. The sample will include the transcripts from two speeches and two debates for each of the speakers. The speeches chosen will be their inaugural addresses and their presidential nomination acceptance speeches. The debates will be the first and second debates held, as part of the presidential campaign, in which the selected speakers participated. I chose to include speeches from the presidential inaugural address because they represent, perhaps, the greatest opportunity for presidents to speak with impact to the people they represent and to their fellow lawmakers who are generally present at the inauguration. I also chose the speeches they made when accepting the presidential nominations of their respective parties, because it is their opportunity to outline what their party’s platform is, what they feel are the important issues of the day, and how they intend to pursue those issues. Finally, I chose presidential debates because political discourse in this context is more spontaneous. According to the Commission on Presidential Debates (2017), a non-partisan entity that has organized presidential debates in the United States since 1988, political debates are carefully prepared and organized.
    [Show full text]
  • Military Defines PSYOP
    Joint Publication 3-53 Doctrine for Joint Psychological Operations 5 September 2003 PREFACE 1. Scope This publication addresses military psychological operations planning and execution in support of joint, multinational, and interagency efforts across the range of military operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth doctrine to govern the joint activities and performance of the Armed Forces of the United States in joint operations and provides the doctrinal basis for US military involvement in multinational and interagency operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes doctrine for joint operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall mission. 3. Application a. Doctrine and guidance established in this publication apply to the commanders of combatant commands, subunified commands, joint task forces, and subordinate components of these commands. These principles and guidance also may apply when significant forces of one Service are attached to forces of another Service or when significant forces of one Service support forces of another Service. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise.
    [Show full text]
  • Indian False Flag Operations
    Center for Global & Strategic Studies Islamabad INDIAN FALSE FLAG OPERATIONS By Mr. Tauqir – Member Advisory Board CGSS Terminology and Genealogy The term false flag has been used symbolically and it denotes the purposeful misrepresentation of an actor’s objectives or associations. The lineage of this term is drawn from maritime affairs where ships raise a false flag to disguise themselves and hide their original identity and intent. In this milieu, the false flag was usually used by pirates to conceal themselves as civilian or merchant ships and to prevent their targets from escaping away or to stall them while preparing for a battle. In other cases, false flags of ships were raised to blame the attack on someone else. A false flag operation can be defined as follows: “A covert operation designed to deceive; the deception creates the appearance of a particular party, group, or nation being responsible for some activity, disguising the actual source of responsibility.” These operations are purposefully carried out to deceive public about the culprits and perpetrators. This phenomenon has become a normal practice in recent years as rulers often opt for this approach to justify their actions. It is also used for fabrication and fraudulently accuse or allege in order to rationalize the aggression. Similarly, it is a tool of coercion which is often used to provoke or justify a war against adversaries. In addition, false flag operations could be a single event or a series of deceptive incidents materializing a long-term strategy. A primary modern case of such operations was accusation on Iraqi President Saddam Hussain for possessing weapons of mass-destruction ‘WMD’, which were not found after NATO forces, waged a war on Iraq.
    [Show full text]
  • General Psychology
    PSY 100: General Psychology John M. Kelley, Ph.D. Professor of Psychology, Endicott College Staff Psychologist, Massachusetts General Hospital Deputy Director, Program in Placebo Studies at Harvard Medical School 1 PSY 100: General Psychology John M. Kelley, Ph.D. AC 165 [email protected] 978-232-2386 2 Psychological Questions I • What makes a song popular? • Why do we dream? Do dreams have meaning? • Is intelligence inherited or developed? • How good is eyewitness testimony? 3 Psychological Questions II Small Groups (handout) • Are men more violent than women? Why? • Are people fundamentally good or evil? • Is alcoholism a disease? Are alcoholics at fault? • What causes depression? • Why do people self-destruct with alcohol or drugs? • Is there such a thing as free will? • Do our minds exist independently of our brains? 4 Chapter 1: Introduction and Research Methods • Psychology is the scientific study of behavior and mental processes • Empirical evidence (empirical vs. theoretical methods of investigation) • Critical thinking (skepticism vs. cynicism) • Who are better drivers: Men or Women? 5 Four Goals of Psychology • Describe • Explain • Predict • Change • Example: Major Depressive Disorder 6 Four Goals of Psychology • Describe: Clearly describe and classify behavior: What is depression? How does it progress? • Explain: What causes depression? Nature vs. Nurture? Genes vs. Experience • Predict: Which individuals are likely to become depressed? How will a person’s depression progress? Who will respond to treatment? • Change: Interpersonal therapy, cognitive and behavioral therapy, medication, ECT, surgery? 7 Types of Psychologists • Clinical (therapists - psychologists vs. psychiatrists) • Counseling • School • Social and Personality • Biological and Neuroscientists • Developmental • Cognitive 8 Types of Psychologists 9 Seven Psychological Perspectives 1.
    [Show full text]