Coping Strategies, Immediate and Delayed Suggestibility Among Children and Adolescents
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cyberbullies on Campus, 37 U. Tol. L. Rev. 51 (2005)
UIC School of Law UIC Law Open Access Repository UIC Law Open Access Faculty Scholarship 2005 Cyberbullies on Campus, 37 U. Tol. L. Rev. 51 (2005) Darby Dickerson John Marshall Law School Follow this and additional works at: https://repository.law.uic.edu/facpubs Part of the Education Law Commons, Legal Education Commons, and the Legal Profession Commons Recommended Citation Darby Dickerson, Cyberbullies on Campus, 37 U. Tol. L. Rev. 51 (2005) https://repository.law.uic.edu/facpubs/643 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Open Access Faculty Scholarship by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. CYBERBULLIES ON CAMPUS Darby Dickerson * I. INTRODUCTION A new challenge facing educators is how to deal with the high-tech incivility that has crept onto our campuses. Technology has changed the way students approach learning, and has spawned new forms of rudeness. Students play computer games, check e-mail, watch DVDs, and participate in chat rooms during class. They answer ringing cell phones and dare to carry on conversations mid-lesson. Dealing with these types of incivilities is difficult enough, but another, more sinister e-culprit-the cyberbully-has also arrived on law school campuses. Cyberbullies exploit technology to control and intimidate others on campus.' They use web sites, blogs, and IMs2 to malign professors and classmates.3 They craft e-mails that are offensive, boorish, and cruel. They blast professors and administrators for grades given and policies passed; and, more often than not, they mix in hateful attacks on our character, motivations, physical attributes, and intellectual abilities.4 They disrupt classes, cause tension on campus, and interfere with our educational mission. -
Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. -
Correlates of Imaginative Suggestibility and Hypnotizability in Children
University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations 1896 - February 2014 1-1-2000 Correlates of imaginative suggestibility and hypnotizability in children. Bruce C. Poulsen University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/dissertations_1 Recommended Citation Poulsen, Bruce C., "Correlates of imaginative suggestibility and hypnotizability in children." (2000). Doctoral Dissertations 1896 - February 2014. 1271. https://scholarworks.umass.edu/dissertations_1/1271 This Open Access Dissertation is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Doctoral Dissertations 1896 - February 2014 by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. CORRELATES OF IMAGINATIVE SUGGESTIBILITY AND HYPNOTIZABILITY IN CHILDREN A Dissertation Presented by BRUCE C. POULSEN Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY February 2000 Education © Copyright by Bruce Craig Poulsen 2000 All Rights Reserved CORRELATES OF IMAGINATIVE SUGGESTIBILITY AND HYPNOTIZABILITY IN CHILDREN A Dissertation Presented by BRUCE C. POULSEN B^\ty W. Jackson, Dean S^hqol of Education ACKNOWLEDGMENTS I would like to gratefully acknowledge the assistance and support of several individuals, without whom this project would not have been possible. First, I am indebted to William Matthews, Jr., Ph.D. and Irving Kirsch, Ph.D. for mitial suggestions for both the research design and statistical analysis. Karen Olness, M.D. and Steven Jay Lynn, Ph.D. both provided helpful suggestions for selecting the measurement instruments. Several individuals at Primary Children's Medical Center provided invaluable support during the data collection procedures. -
Evaluation of the Evidence for the Trauma and Fantasy Models of Dissociation
Psychological Bulletin © 2012 American Psychological Association 2012, Vol. 138, No. 3, 550–588 0033-2909/12/$12.00 DOI: 10.1037/a0027447 Evaluation of the Evidence for the Trauma and Fantasy Models of Dissociation Constance J. Dalenberg Bethany L. Brand California School of Professional Psychology at Alliant Towson University International University, San Diego David H. Gleaves and Martin J. Dorahy Richard J. Loewenstein University of Canterbury Sheppard Pratt Health System, Baltimore, Maryland, and University of Maryland School of Medicine, Baltimore Etzel Carden˜a Paul A. Frewen Lund University University of Western Ontario Eve B. Carlson David Spiegel National Center for Posttraumatic Stress Disorder, Menlo Park, Stanford University School of Medicine and Veterans Administration Palo Alto Health Care System, Palo Alto, California The relationship between a reported history of trauma and dissociative symptoms has been explained in 2 conflicting ways. Pathological dissociation has been conceptualized as a response to antecedent traumatic stress and/or severe psychological adversity. Others have proposed that dissociation makes individuals prone to fantasy, thereby engendering confabulated memories of trauma. We examine data related to a series of 8 contrasting predictions based on the trauma model and the fantasy model of dissociation. In keeping with the trauma model, the relationship between trauma and dissociation was consistent and moderate in strength, and remained significant when objective measures of trauma were used. Dissociation was temporally related to trauma and trauma treatment, and was predictive of trauma history when fantasy proneness was controlled. Dissociation was not reliably associated with suggestibility, nor was there evidence for the fantasy model prediction of greater inaccuracy of recovered memory. -
Social Engineering in Cybersecurity: a Domain Ontology and Knowledge Graph Application Examples Zuoguang Wang1,2* , Hongsong Zhu1,2* ,Peipeiliu1,2 and Limin Sun1,2
Wang et al. Cybersecurity (2021) 4:31 Cybersecurity https://doi.org/10.1186/s42400-021-00094-6 RESEARCH Open Access Social engineering in cybersecurity: a domain ontology and knowledge graph application examples Zuoguang Wang1,2* , Hongsong Zhu1,2* ,PeipeiLiu1,2 and Limin Sun1,2 Abstract Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering. This paper first develops a domain ontology of social engineering in cybersecurity and conducts ontology evaluation by its knowledge graph application. The domain ontology defines 11 concepts of core entities that significantly constitute or affect social engineering domain, together with 22 kinds of relations describing how these entities related to each other. It provides a formal and explicit knowledge schema to understand, analyze, reuse and share domain knowledge of social engineering. Furthermore, this paper builds a knowledge graph based on 15 social engineering attack incidents and scenarios. 7 knowledge graph application examples (in 6 analysis patterns) demonstrate that the ontology together with knowledge graph is useful to 1) understand and analyze social engineering attack scenario and incident, 2) find the top ranked social engineering threat elements (e.g. the most exploited human vulnerabilities and most used attack mediums), 3) find potential social engineering threats to victims, 4) find potential targets for social engineering attackers, 5) find potential attack paths from specific attacker to specific target, and 6) analyze the same origin attacks. Keywords: Social engineering attack, Cyber security, Ontology, Knowledge graph, Attack scenarios, Threat analysis, Attack path, Attack model, Taxonomy, Composition and structure Introduction (Wang et al. -
Retrieval Can Increase Or Decrease Suggestibility Depending on How Memory Is Tested: the Importance of Source Complexity Jason C.K
Psychology Publications Psychology 7-2012 Retrieval Can Increase or Decrease Suggestibility Depending on How Memory is Tested: The Importance of Source Complexity Jason C.K. Chan Iowa State University, [email protected] Miko M. Wilford Iowa State University Katharine L. Hughes Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/psychology_pubs Part of the Cognitive Psychology Commons, and the Evidence Commons The ompc lete bibliographic information for this item can be found at http://lib.dr.iastate.edu/ psychology_pubs/16. For information on how to cite this item, please visit http://lib.dr.iastate.edu/ howtocite.html. This Article is brought to you for free and open access by the Psychology at Iowa State University Digital Repository. It has been accepted for inclusion in Psychology Publications by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Retrieval Can Increase or Decrease Suggestibility Depending on How Memory is Tested: The mpI ortance of Source Complexity Abstract Taking an intervening test between learning episodes can enhance later source recollection. Paradoxically, testing can also increase people’s susceptibility to the misinformation effect – a finding termed retrieval- enhanced suggestibility (RES, Chan, Thomas, & Bulevich, 2009). We conducted three experiments to examine this apparent contradiction. Experiment 1 extended the RES effect to a new set of materials. Experiments 2 and 3 showed that testing can produce opposite effects on memory suggestibility depending on the complexity of the source test. Specifically, retrieval facilitated source discriminations when the test contained only items with unique source origins. -
Driving Distraction Away
Driving Distraction Away www.safestart.com 1 Driving DISTRACTION Away That quote, from the National Safety Council’s president and CEO Deborah Hersman, says it all. Driving is such a big risk factor that it’s the only injury Driving a car is one of the category to receive a full section (it’s 36 pages!) in the National Safety riskiest activities any of Council’s Injury Facts 2015. us undertake in spite of The frequency and potential severity of vehicle collisions places driving in the worst corner of any risk matrix. Add distraction to the mix and driving decades of vehicle design becomes the riskiest thing we do every day. improvements and traffic The standard picture of distracted driving is a teen with the steering wheel in safety advancements. one hand and a cellphone in the other. But the issue is much bigger—and you won’t solve it unless you shift your focus from driving to distraction. DISTRACTION, NOT DRIVING, IS THE KEY The dangers of distraction aren’t confined to the car. There’s almost no difference between distracted driving, distracted working, or doing anything else while distracted. Solve distraction in all its forms and you’ll make people a lot safer. EHS Today, “Motor Vehicle Deaths in 2015 Show Large Increase Year-Over-Year”, February 17, 2016. www.safestart.com 2 Why You Should Care About DISTRACTED DRIVING Everyone drives or rides in a car. And that means distracted driving affects every single business in the world. Because no matter where a crash occurs—at work or off the job—it can affect drivers, passengers and pedestrians for weeks and months Employee Crash Injury/FatalityReducedLost Morale ProductivityEquipmentCompany Damage Liability afterwards. -
Assessing the Merits of Coeducational and Gender-Specific Bullying Prevention Programs
University of Denver Digital Commons @ DU Electronic Theses and Dissertations Graduate Studies 3-1-2010 Addressing Relational Aggression: Assessing the Merits of Coeducational and Gender-Specific Bullying Prevention Programs Rena Dulberg University of Denver Follow this and additional works at: https://digitalcommons.du.edu/etd Part of the Curriculum and Instruction Commons Recommended Citation Dulberg, Rena, "Addressing Relational Aggression: Assessing the Merits of Coeducational and Gender- Specific Bullying Prevention Programs" (2010). Electronic Theses and Dissertations. 171. https://digitalcommons.du.edu/etd/171 This Thesis is brought to you for free and open access by the Graduate Studies at Digital Commons @ DU. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. ADDRESSING RELATIONAL AGGRESSION: ASSESSING THE MERITS OF COEDUCATIONAL AND GENDER-SPECIFIC BULLYING PREVENTION PROGRAMS _______ A Thesis Presented to The Faculty of the University of Denver University of Denver _______ In Partial Fulfillment of the Requirements for the Degree Master of Arts _______ By Rena Dulberg March 2010 Advisor: Tamra Pearson d’Estree Author: Rena Dulberg Title: ADDRESSING RELATIONAL AGGRESSION: ASSESSING THE MERITS OF COEDUCATIONAL AND GENDER-SPECIFIC BULLYING PREVENTION PROGRAMS Advisor: Tamra Pearson d’Estree Degree Date: March 2010 ABSTRACT Interviews with eight bullying prevention program directors from around the country reveal the extent to which research findings are reflected in bullying prevention programs currently in operation. Framed as a list of best practices for coeducational and gender-specific bullying prevention curricula, the purpose of the present thesis was to document the most positive contributions made by various approaches to bullying prevention programs to the overall field, and to highlight practices of programs that reflect insight into what is known about gender differences in bullying. -
Thirteen Treatments for the Sick Law... the Law Needs Changing
SMGr up Opinion Article SM Journal of Thirteen Treatments for the Sick Law... The Forensic Research Law Needs Changing... It Cares Not About and Criminology Truth Nor Justice.... Samuel A Nigro* Department of Psychiatrist, Case Western Reserve University School of Medicine, USA Article Information Received date: Feb 28, 2019 “The law does not care about truth or justice, but about legalisms”. So stated a Great Course Accepted date: Mar 14, 2019 on “The Origins of Evil” many years ago. After personal experiences with the law, I believe it must Published date: Mar 18, 2019 change from a sick business of enslaving the people to a genuine profession of human truth and justice for all. The issues I raise are: investigation, prosecution, initial charges, plea bargains, right *Corresponding author to jury and due process, law readings, judicial meetings, open records, suggestibility diseases, Samuel A Nigro, MD, Retired rulings and appeals, computer gaming, contempt and finally over criminalization. (Corrections and Psychiatrist, Department of Psychiatrist, suggestions are always rejected by government employees because they mean more work--so the reply is always to claim their system is “the best”, and offered improvements are unnecessary or Case Western Reserve University School unacceptable being from ex-criminals or other offenders who criticize the law). of Medicine, USA, Tel: Email: These thirteen treatments is to bring to fulfillment the “Critical Legal Studies Movement” which realized that the law is necessary evil of an artificial Godless arrangement of power, run by self- Distributed under Creative Commons enriching self-righteous pseudo-erudite know-it-all arrogant tyrants fascists and crooks (likely CC-BY 4.0 the largest employment group in the US), imposing a coherent chaos-preventing and resolving totalitarianism necessary because the people are coerced by custom, threats, force and punishments, because the people no longer live by the Ten Commandments and the Founders’ Principles but by the suggestibility diseases of the Fraud Press & Media. -
Open Robertson-Dissertation-Final
The Pennsylvania State University The Graduate School College of Information Sciences and Technology ONLINE AND OFFLINE BULLYING OF AUTISTIC YOUTH: ANTI-BULLYING STRATEGIES, REPORTING, AND TECHNOLOGICAL SOLUTIONS A Dissertation in Information Sciences and Technology by Scott Michael Robertson Copyright 2013 Scott Michael Robertson Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2013 The dissertation of Scott Michael Robertson was reviewed and approved* by the following: Shawn Clark Senior Instructor, Information Sciences and Technology Dissertation Advisor Chair of Committee Gerald Santoro Assistant Professor, Information Sciences and Technology Assistant Professor, Communication Arts and Sciences Mary Beth Rosson Professor, Information Sciences and Technology Associate Dean for Undergraduate Studies Deirdre O‘Sullivan Assistant Professor, Education Peter Forster Senior Lecturer, Security Risk and Analysis Assistant Dean for Online Programs and Professional Education *Signatures are on file in the Graduate School. Abstract This dissertation investigated cyber- and face-to-face bullying of autistic youth (aged 13-18). Autism represents a neurological-developmental disability that affects language and communication, socialization, sensory processing, motor coordination, and thinking around planning, self-regulation, and self-reflection. Prior studies indicate that challenges in these areas coupled with weaker social supports can put autistic people at higher risk for bullying. Examining -
Module 1: Understanding Distress Intolerance Page 1 • Psychotherapy • Research • Training Facing Your Feelings Introduction
Facing Your Feelings Facing Your Feelings Facing Your Feelings Module 1 Understanding Distress Intolerance Introduction 2 What Is Distress Intolerance? 2 The Paradox… 3 Am I Distress Intolerant? 4 Healthy Distress Tolerance 5 How Does Distress Intolerance Develop? 5 Distress Intolerant Beliefs 6 Distress Escape Methods 7 Distress Intolerance Model 8 My Distress Intolerance Model 9 The Good News… 10 Module Summary 11 About the Modules 12 The information provided in the document is for information purposes only. Please refer to the full disclaimer and copyright statements available at www.cci.health.gov.au regarding the information on this website before making use of such information. entre for C linical C I nterventions Module 1: Understanding Distress Intolerance Page 1 • Psychotherapy • Research • Training Facing Your Feelings Introduction We all experience emotions. Emotions are an important part of being human, and are essential to our survival. As humans we are designed to feel a whole range of emotions, some of which may be comfortable to us, and others may be uncomfortable. Most people dislike feeling uncomfortable. There are many different ways that humans can feel uncomfortable…we can be hot, cold, tired, in pain, hungry, unwell, and the list could go on. The type of discomfort we will be talking about in these modules is emotional discomfort, or what is often called distress. We may not like it, but experiencing uncomfortable emotions is a natural part of life. However, there is a difference between disliking unpleasant emotions, but nevertheless accepting that they are an inevitable part of life and hence riding through them, versus experiencing unpleasant emotions as unbearable and needing to get rid of them. -
Freudian Theory and the Pattern of Fascist Propaganda1
Freudian Theory and the Pattern of Fascist Propaganda1 During the past decade the nature and content of the speeches and pamphlets of American fascist agitators have been subjected to intensive research by social scientists. Some of these studies, undertaken along the lines of content analysis, have finally led to a comprehensive presentation in the book, Prophets of Deceit, by L. Löwenthal and N. Guterman.2 The over-all picture obtained is characterized by two main features. First, with the exception of some bizarre and completely negative recommendations: to put aliens into concentration camps or to expatriate Zionists, fascist propaganda material in this country is little concerned with concrete and tangible political issues. The overwhelming majority of all agitators' statements are directed ad hominem. They are obviously based on psychological calculations rather than on the intention to gain followers through the rational statement of rational aims. The term »rabble rouser,« though objectionable because of its inherent contempt of the masses as such, is adequate insofar as it expresses the atmosphere of irrational emotional aggressiveness purposely promoted by our would-be Hitlers. If it is an impudence to call people »rabble,« it is precisely the aim of the agitator to transform the very same people into »rabble,« i.e., crowds bent to violent action without any sensible political aim, and to create the atmosphere of the pogrom. The universal purpose of these agitators is to instigate methodically what, since Gustave Le Bon's famous book, is commonly known as »the psychology of the masses.« Second, the agitators' approach is truly systematical and follows a rigidly set pattern of clear-cut »devices.« This does not merely pertain to the ultimate unity of the political purpose: the abolition of democracy through mass support against the democratic principle, but even more so to the intrinsic nature of the content and presentation of propaganda itself.