We use cookies to provide essential features and services. By using our website you agree to our use of cookies .

×

Warehouse Stock Clearance Sale

Grab a bargain today!


The Psychology of Security, Emergency and Risk
By

Rating

Product Description
Product Details

Table of Contents

ContentsForewordAcknowledgementsIntroductionPart A: Annotated and Illustrated Glossary; Part B: Sleep and Dreams: A Hidden Resource for Testing Work Related In-conscious DistressSummary of the IntroductionChapter 1 Security, emergency and risk1.1 Security, emergency and risk: the definitions and origins of PSER; 1.2 Safety and security: definitions; 1.2.1 Safety and security in legislation; 1.2.2 Safety and security in protection measures; 1.2.3 Safety and security on the in-ternet; 1.2.4 Safety and security in standardized codes; 1.2.5 Safety and security in the field of psychology; 1.2.6 Safety and security in the field of healthcare; 1.2.7 Safety and security: two sides of the same coin?; 1.3 Personality: definitions and development; 1.4 Genetics: definition and principles; 1.4.1 Epigenetics; 1.4.2 How genetic testing is performed: from sampling to mapping; 1.4.3 The biophysics of DNA and entanglement; 1.5 Premorbid personalities: traces of the Cultural History of Health in PSER; 1.5.1 Endophenotypes in PSER; 1.6 Non-psychopathological person-alities: traces of types A, B, C and D in PSER; 1.7 Pathological personalities: evidence of clusters A, B and C in PSER; 1.7.1 Cluster A: paranoid, schizoid and schizotypal personalities; 1.7.2 Cluster B: the histrionic, antisocial, narcissistic and borderline personalities; 1.7.3 Cluster C: the avoidant, dependent and obsessive-compulsive personalities; 1.8 The different classifications of mental disorders: DSM - ICD - PDM; 1.9 Neurosis: traces of anxiety disorders and mood disorders in PSER; 1.9.1 Generalized anxiety disorder; 1.9.2 Phobias; 1.9.3 Panic attacks and panic attack disorder; 1.9.4 Obsessive-compulsive disorder; 1.9.5 Health anxiety disorder; 1.9.6 Adaptation disorder; 1.9.7 Acute stress disorder; 1.9.8 Post-traumatic stress disorder; 1.9.9 Eating disorders; 1.9.10 Dysthymic disorder; 1.10 Psychosis: traces in PSER; 1.10.1 Schizophrenic disorder; 1.10.2 Brief psychotic disorder (BRP/brief reactive psychosis); 1.10.3 Shared psychotic disorder; 1.10.4 Psychotic affective states: traces in PSER; 1.11 Concluding remarks; Summary of Chapter 1Chapter 2 Communication in PSER2.1 Communication and security; 2.2 Communication: Definition; 2.3 Brief Comments on Communication Theory and the Communication -Models; 2.4 The Mathematical Model: Communication as the Transmission of Information; 2.5 The Pragmatic Model: Communication As Behavior; 2.6 The Sociological Model: Communication as an Expression and Product of Society; 2.6.1 Internal corporate communications: hierarchical or networked; external and integrated communications; 2.6.2 Communicative competences; 2.7 The Psychological Model: Communication as a Relationship; 2.7.1 Verbal, non-verbal and para-verbal interpersonal communication; 2.7.2 'Descriptive', 'representative' and 'regulative'communication; 2.7.3 Conditions required for communicating security, with security and in security; 2.7.4 Communication problems: communication barriers; 2.7.5 Conflictual situations, distorted communication (paradoxical; disqualifying) and pathological communication (schizophrenic); 2.8 The Psychodynamic-Semiotic Approach: Communication as Signification; 2.8.1 Communication in helping relationships: sympathy, empathy and entropathy; 2.9 Concluding remarks; Summary of Chapter 2Chapter 3 The psychology of security3.1 The psychology of security; 3.2 The definition, origins and development of the emotions; 3.2.1 The evolution of the theory of emotions; 3.3 The neurofunctional pathway from emotions to feelings (the LeDoux Dual-Route Model); 3.3.1 From the brain to the mind, from consciousness to awareness; 3.4 The psychological origins and evolution of se-curity; 3.4.1 Attachment theory and the internal working models; 3.4.2 The problem of synchronization - desynchro-nization; 3.5 Operational definitions on the topic of security; 3.6 Perceived security versus real security; 3.7 The safety trade-offs; 3.8 Concluding remarks; Summary of Chapter 3Chapter 4 The psychology of emergency4.1 The psychology of emergency; 4.2 Definition of traumatic event or critical incident trauma; 4.2.1 The perfect adaptogenic ability or resilience; 4.3 Definition of stress; 4.3.1 General Adaptation Syndrome (GAS); 4.3.2 The ge-netics of GAS; 4.4 Psychological intervention in emergencies; 4.5 The psychology of emergency first responders; 4.5.1 The CISM (Critical Incident Stress Management) program: defusing and debriefing; 4.5.2 Methods for applying the CISM defusing technique; 4.5.3 The structure and timing of defusing; 4.5.4 Debriefing or CISD; 4.6 The 'problem solving' method; 4.6.1 Problem setting; 4.7 Eye Movement Desensitization and Reprocessing (EMDR); 4.7.1 The neurophysiological background of EMDR; 4.7.2 The typical timing of a post-traumatic intervention; 4.7.3 Assessment; 4.7.4 Traumatic experiences in childhood; 4.7.5 EMDR and attachment theory; 4.8 Concluding remarksSummary of Chapter 4Chapter 5 The psychology of risk5.2 The heuristic solutions: definition; 5.2.1 Heuristic solutions in a situation of risk; 5.2.2 Bias in risk situations; 5.3 Risk epidemiology and statistics; 5.4 Perception and communication of the risk; 5.5 The concept of risk: origin and definitions; 5.5.1 The individualistic approach to risk; 5.5.2 Differences in risk perception between ordinary people and professionals who are experts in the field; 5.5.3 The cultural approach to risk; 5.5.4 How to reconcile the cultural and individualistic approaches: the social representations; 5.5.5 Social conflict and Nimby syndrome; 5.6 Social psycholo-gy or situational psychology; 5.6.1 Social cognition: mental patterns, stereotypes, reconstructive memory, accessibility, priming and counterfactual thinking; 5.6.2 Social perception: the rules of exhibition; emblems; implicit personality the-ory; 5.6.3 Attribution theory: perceptual salience and the spotlight effect; defensive attributions and unrealistic opti-mism; dispositional and situational attributions; fundamental attribution error; 5.6.4 The definitions of the ego and the self, and their relationship: self-perception and introspection; Bem's self-perception theory; reverse attribution error or over justification; Schachter's theory of emotions and attribution of arousal; Festinger's theory of social comparison, presentation strategies; 5.6.5 Cognitive dissonance: postdecisional dissonance; 'Counterattitudinal advocacy'; Self-discrepancy theory; Tesser's Self-evaluation maintenance theory; the Self-affirmation theory; Swann's Self-verification theory; 5.7 Attitude and Behavior; 5.7.1 Persuasive communication: Petty and Cacioppo's elaboration likelihood model; Chaiken's heuristic-systematic model; the central and peripheral routes to persuasion; reactance theory; 5.8 Conformist behavior: informational conformity; reasons for group -cohesion; 5.9 Cumulative stress disorder, or 'burnout'; 5.10 Concluding remarksSummary of Chapter 5Chapter 6 The psychology of terrorism6.1 Youth distress: risky behavior of old and new dependencies; 6.2 Impulse control disorders; 6.3 Criminal psychol-ogy: premeditated risky activities; 6.4 The psychology of kidnapping; stockholm and lima syndrome; 6.5 The psychology of terrorism: the definition of terrorism from above and below; fundamentalism; group psychodynamics; 6.6 Terrorism from emotion to feeling: theoretical interpretations and remedies; 6.7 Particular aspects of psychological ter-rorism: the role of the mass media and bioterrorism; 6.8 The psychodynamics and genetics of suicide; 6.9 Concluding remarksSummary of Chapter 6AppendixBibliographical ReferencesNomenclatureIndex

Ask a Question About this Product More...
 
Item ships from and is sold by Fishpond World Ltd.

Back to top