Tuesday, January 28, 2020

Jung and Freud Essay Example for Free

Jung and Freud Essay Dreams had been the subject of numerous works from famous psychology theorists Sigmund Freud and Carl G. Jung, although the two giants had divergent views. Freud, in accordance with his psychoanalytic tradition, believed that dreams and their imagery have specific psychological significance for the dreamer (Bower, 1986). As far back as 1899, in Freuds The Interpretation of Dreams, he declared that dream interpretation is the road to knowing the unconscious activities of ones mind (Price, 1986). Freud emphasized that dreams are associated with a person’s subconsciously repressed thoughts. On the other hand, Jung believes that recurring dreams suggest psychoanalytical conflict. Recent studies building upon Jungs theory noted that recurrent dreamers registered marked elevations in depression and anxiety, thereby lending proof to the theory of Jung that recurrent dreams mean psychoanalytical conflict (Bower, 1986). However, compared to Freud, Jung did not believe that dreams are attempts at repression; instead he believed that dreams are means by which the personal unconscious can be understood. Personally, I am inclined to believe the account of Jung on dreams and their interpretation. It is easier to view dreams as manifestations of inner conflict, rather than attempts at repression. Indeed, the conscious mind is inactive while people are in sleep, and it is at this time that anxiety and depression could actually rise to the surface. I believe the mind processes a lot of information, whether it is awake or not. Thus, the mind would naturally attempt to process, involuntarily, the things that are most bothersome when it has less control. Thus, dreams are better interpreted as the mind’s way of sorting things out. For example, I observed that I often dream about my family when there is tension in my home. I would dream of both happy and sad moments. These dreams I consider to be calls of my subconscious to address my family issues and resolve them. I believe these dreams recur because the conflict within my family brings me anxiety, which I bring in my sleep. References Bower, B. (1986). Recurrent Dreams: Clues to Conflict. Science News 129(13), 197. Price, S. R. F. (1986). The Future of Dreams: From Freud to Artemidorus. Past and Present 113, 3-37. Willbern, D. (1979). Freud and the Inter-Penetration of Dreams. Diacritics 9(1 The Tropology of Freud), 97-110.

Monday, January 20, 2020

Damage to the Hypothalamus Essay -- Neurology Brain Disorders Papers

â€Å"The hypothalamus is a small area near the base of the brain just ventral to the thalamus† (Kalat 90). It makes up about 1/300 total brain weight in humans, and it is about the size of an almond (www.factmonster.com). Since the hypothalamus is attached to the pituitary gland, which is considered the â€Å"master gland,† the hypothalamus is the structure which actually has master control over promoting or inhibiting hormone release, affecting many glands (Kalat 327). The main function of the hypothalamus is to regulate homeostasis, but its wide range of control affects the generation of behaviors involved in eating, drinking, temperature regulation, sexual behavior, copulation, maternal behavior, general arousal, activity level, the sleep- wake cycle, and emotional regulation of rage, aggression, embarrassment, escape from danger in â€Å"fight or flight† responses, and pleasure (www.geocities.com). When the hypothalamus is damaged, specific behavior changes occur dependent on the lesion location on the hypothalamus. The affects of such behavior changes can affect a person’s life to such a degree that a social worker is needed for emotional, informational, familial, economic, and environmental support (www.iaswresearch.org). The hypothalamus controls the pituitary, which consists of two major glands: anterior pituitary and the posterior pituitary (which can be considered an extension of the hypothalamus). The hypothalamus synthesizes the hormones oxytocin and vasopressin, which are transported to their terminals in the posterior pituitary, and then released in the blood (Kalat 327). Oxytocin controls uterine contractions, milk release, certain aspects of parental behavior, and... ...al Cancer Institute: Social work’s contribution to research on cancer prevention, detection, diagnosis, treatment and surviviorship. Washington, D.C. www.iaswresearch.org. Kalat, J.W. (2004). Biological Psychology. Canada: Wadsworth, Thomson Learning Inc. Taking Time: Support For People With Cancer and the People Who Care About Them (2001). U.S. Department of Health and Human Services. National Institutes of Health: National Cancer Institute. Taylor, S.E., Falke, R.L., Shoptaw, S.J., Steven, J., & Lichtman, R.R. (1986). Social support, support groups, and the cancer patient. Journal of Consulting and Clinical Psychology, 54(5), 608-615. www.factmonster.com/ce6/sci/A0824782.html www.geocities.com/hhugs2001/roleofhyp.htm www.heumann.org/body.of.knowledge/k1/hypothalamus.html www.naswdc.org/research/news/120903.asp www.webmd.com

Sunday, January 12, 2020

Vygotsky Learning Theory

Lev Semyonovich Vygotsky developed a learning theory for education based on one’s culture in the 1920s and 1930s. Even without a psychology background, he became fascinated by the subject. During his short life, he was influenced by the great social and political upheaval of the Marxist Revolution. After his death in 1934, his ideas were rejected by the U. S. S. R. and only resurfaced after the Cold War ended in 1991. Vygotsky’s theory has exceedingly influenced education in Russia and in other countries. Lev Vygotsky was born in Orsha, Western Russia, which is now Belarus in 1896.Vygotsky was born into a typical middle-class Jewish family and grew up in a predominantly Jewish town of Gomel, roughly four hundred miles from Moscow (Kouzlin, 1990). He studied and graduated law from the University of Moscow on a Jewish scholarship. After graduation, he prepared his first research project in the psychology field in 1925 with The Psychology of Art, which was not published un til the 1960s. Some time later, he became a psychologist working with Alexandar Luria and Alexei Leontiev (Gallagher, 1999). Lev Vygotsky’s socioculture theory begs to answer the question: What is culture and why is it important to a child’s learning.Dr. Diane Bukatko, psychology professor, says culture is â€Å"the many facets of the environment that humans have created and continue to produce. . . But even more importantly, culture includes language and the practices, values, and beliefs accumulated and communicated from one generation to the next† (Bukatko, 2004). Vygotsky’s theory places an emphasis on the learner’s culture. Vygotsky believed that the â€Å"child’s cognitive growth must be understood in the content of the culture in which he or she lives† (Bukatko, 2004).That is to say, he believed that a child is shaped by his or her own culture. Vygotsky believed that the social activity with â€Å"children, caregivers, peers, and tutors cultivate in them the particular skills and abilities their cultural group values† (Bukatko, 2004). This social activity is the backbone to his theory. Vygotsky had two main theories of cognitive development: the More Knowledgeable Other and the Zone of Proximal Development. The More Knowledgeable Other simply means that this is a person that has a higher understanding that the learner.This may be teacher to student or it can be student to student. Vygotsky’s other major theory, Zone of Proximal Development is the â€Å"span or disparity between what children are able to do without the assistance of others and what they are often able to accomplish by having someone more expect assist them at key points† (Bukatko, 2004). Vygotsky believed that the most effective instruction took place just slightly above the learner’s current ability. There was a study done in which children were asked which items of wooden furniture when into a doll house.Some children were allowed to play with their mother, the More Knowledgable Other, before they attempted it alone, while others were only allowed to do it by themselves. It was found that those who had previously worked with a More Knowledgable Other showed greatest improvement with their attempt than those who did not (McLeod, 2007). The most important of Vygotsky’s theories in regards to education is his Zone of Proximal Development. It gives the educator a scale defining what the learner is able to achieve with or without assistance and exactly at what level he or she can attain.Based on his ZPD, Vygotsky believed that play is a â€Å"vehicle for a child behaving more maturely than at other times† and in play â€Å"children can work at the top of their Zone of Proximal Development† (Vygotsky, 1978). Vygotsky’s Zone of Proximal Development shows what a child can learn with assistance. This can be a great tool in the teacher’s proverbial toolbox. His t heories also gives a great understanding in children learning from each other and from the teacher based on the More Knowledgeable Other and sociocultural understanding.Language and thought is sometimes believed to develop together. A child knows what a cat is before he can actually say the word. If the parent asks the child where the cat is, the child is able to point and correctly label the cat (assuming they have a cat as a pet, of course). This is directly in opposition to his idea that the child must know the spoken word â€Å"cat† before the child learns the concept. Vygotsky also believed that one’s culture is the defining growth characteristic in language and development. However, his theory states little on biological factors.

Saturday, January 4, 2020

Cyber Espionage In China Essay - 767 Words

While China continues to deny any involvement in breaches into U.S. government systems, U.S. investigators and lawmakers are convinced of China’s role in multiple hacking efforts. The inability to identify the actual source of the data breaches continues to frustrate politicians; but more importantly, it raises concerns about the vulnerability of these systems as well as call into question as to why these agencies were specifically targeted for cyber espionage. On July 9, 2013, Larry Wortzel, a member of the U.S.-China Economic and Security Review Commission testified before the House of Representatives, Committee on Energy and Commerce Subcommittee on Oversight and Investigation. He revealed the following assessment of China’s cyber†¦show more content†¦For example, the Department of Defense most recently reported that a Chinese owned company, DJI, which specializes in unmanned aerial vehicles (drones) has cunningly received data on critical U.S. infrastructu re such as military bases, commercial airports, highways, and bridges without consent.10 Unknowingly, and while using these systems for standard and routine business operations, U.S. military and commercial users of these systems were transmitting data back to China. Now, the DoD, Homeland Security, and other government agencies, in a reactive posture, are assessing the vulnerabilities and developing risk mitigation strategies. The extent of this potential data exploitation from commercial applications undeniably draws skepticism about the government’s ability to control and exercise safeguard even in the commercial sector. This unassailable intrusion only proves that the tools and the employment of cyber capabilities provide a clandestine vehicle to surreptitiously engage in offensive cyber operations while leaving faint fingerprints that eludes detection. China’s covert acts will continue to challenge the effectiveness of the U.S. leadership, test the strength of th e United States National Security Strategy, and the merits of Department of Defense military strategy. Another emerging threat to the progression of cyber is the technological versatility of artificial intelligence; and, currently, ChinaShow MoreRelatedEssay On Cyber Espionage In China750 Words   |  3 PagesStates and China concerning economic espionage has been viewed with both optimism and skepticism. It’s the first agreement of any substance on the issue, which is a hopeful sign. China doesn’t enjoy a reputation of carefully adhering to international agreements and there is doubt about whether the agreement will have any practical effect on China’s behavior. Since the early 2000s, cyber espionage issues have increasingly strained U.S.-China relations. All countries engage in espionage, but China is oneRead MoreCyber Espionage And Cyber Terrorism987 Words   |  4 Pagesthat 90% of companies worldwide admits on having being unprepared to protect themselves from any type of cyber-attacks. Large corporations like Target and Hope Depot has been target cyber security breach. That compromise thousands of employees and customers confidential information such as the social security number and credit cards accounts. But some small business weren’t so lucky, as cyber criminals took control of their entire network and completely destroying the whole company. Cybercrime willRead MoreEssay about Examples of War in Cyberspace2070 Words   |  9 Pageswar I and II are famous examples of how cyberspace can be used to launch missile attacks on the tangible world. Infrastructure attacks by state military and ‘cyber terrorist’ on electricity generators, waters supplies and transport systems will have a disastrous effect on the tangible world. This essay will investigate and explore various types of war fought in cyberspace. Firstly, I will be distinguishing the difference between ‘Netwar and Cyberwar’. Secondly,Read MoreImpact Of Trade Policies On Trade Patterns Between Usa And China2160 Words   |  9 Pagesbetween USA and China and the analysis of China’s manufacturing sector of IT products vis-a-vis consumption sector of the US. Abstract Introduction The following paper coherently illustrates the trade patterns of USA and China and describes the various trade policies developed over the past years that have impacted the respective economies of both countries alongside the effect of the same on the bilateral trade relations between the two. Based upon the previous statistics, US-China trade is considerablyRead MoreTrade Patterns Of Usa And China2343 Words   |  10 Pages1. Introduction The following paper coherently illustrates the trade patterns of USA and China and describes the various trade policies developed over the past years that have impacted the respective economies of both countries alongside the effect of the same on the bilateral trade relations between the two. Based upon the previous statistics, US-China trade is considerably one of the largest trading partners in today’s economies. Both countries’ trade relations entail exchange of investment, servicesRead MoreIran Nuclear Fuel Cycle Technology1914 Words   |  8 Pagesstrategy on how to deal with such threats. To cover all the vendibility of the US and propose strategies to counter all existing threats by Iran will be outside of the scope of this short paper and it may require hundreds of pages; therefore, this essay is focused on the key issues. As an adversary of the US, the Islamic Republic of Iran is a reemerging power in The  Middle East  and  North Africa  (MENA). The two biggest neighboring threat of Iran, the Taliban and Sadam’s regime has overthrown byRead MoreCybercrime Law5688 Words   |  23 PagesCyber crimes essay THE INFORMATION TECHNOLOGY ACT AMENDMENT OF 2008 Cyber law, in a general sense, has been envisaged as a term that encapsulates the legal issues related to the use of communicative, transactional, and distributive aspects of networked information devices and technologies. And the crimes against these issues are termed as cyber crime Cyber law and cyber crime Cyber crime spans not only state and national boundaries, but the international boundaries as well. At the Tenth UnitedRead MorePaper on Physical Security4674 Words   |  19 Pagesfinancial, sensitive, and classified information may be compromised and prone to possible viruses and malware, hacking, or at risk of a cyber-attack to the company’s data resulting in possible financial loss. If this scenario is the case, extensive resources most likely will be required to repair or undo the damage caused by the breach of security or virus. This essay will discuss the Service Request SR-rm-013 for Riordan Manufacturing and address security issues and concerns. In addition, this documentRead MoreFundamentals of Hrm263904 Words   |  1056 PagesISSUES: Team Performance Appraisals 250 Rate Selectively 251 Train Appraisers 251 The Performance Appraisal Meeting 251 International Performance Appraisal 253 Who Performs the Evaluation? 253 Evaluation Formats 253 DID YOU KNOW?: Performanc e Metrics in China 254 Summary 254 Demonstrating Comprehension: Questions for Review 255 Key Terms 255 256 HRM Workshop External Factors 272 Geographic Differences 272 Labor Supply 272 Competition 272 Cost of Living 272 Collective Bargaining 273 Communicating with