The Psychology of Security, Emergency and Risk
By

Rating

Product Description
Product Details

Table of Contents

ContentsForewordAcknowledgementsIntroductionPart A: Annotated and Illustrated Glossary; Part B: Sleep and Dreams: A Hidden Resource for Testing Work Related In-conscious DistressSummary of the IntroductionChapter 1 Security, emergency and risk1.1 Security, emergency and risk: the definitions and origins of PSER; 1.2 Safety and security: definitions; 1.2.1 Safety and security in legislation; 1.2.2 Safety and security in protection measures; 1.2.3 Safety and security on the in-ternet; 1.2.4 Safety and security in standardized codes; 1.2.5 Safety and security in the field of psychology; 1.2.6 Safety and security in the field of healthcare; 1.2.7 Safety and security: two sides of the same coin?; 1.3 Personality: definitions and development; 1.4 Genetics: definition and principles; 1.4.1 Epigenetics; 1.4.2 How genetic testing is performed: from sampling to mapping; 1.4.3 The biophysics of DNA and entanglement; 1.5 Premorbid personalities: traces of the Cultural History of Health in PSER; 1.5.1 Endophenotypes in PSER; 1.6 Non-psychopathological person-alities: traces of types A, B, C and D in PSER; 1.7 Pathological personalities: evidence of clusters A, B and C in PSER; 1.7.1 Cluster A: paranoid, schizoid and schizotypal personalities; 1.7.2 Cluster B: the histrionic, antisocial, narcissistic and borderline personalities; 1.7.3 Cluster C: the avoidant, dependent and obsessive-compulsive personalities; 1.8 The different classifications of mental disorders: DSM - ICD - PDM; 1.9 Neurosis: traces of anxiety disorders and mood disorders in PSER; 1.9.1 Generalized anxiety disorder; 1.9.2 Phobias; 1.9.3 Panic attacks and panic attack disorder; 1.9.4 Obsessive-compulsive disorder; 1.9.5 Health anxiety disorder; 1.9.6 Adaptation disorder; 1.9.7 Acute stress disorder; 1.9.8 Post-traumatic stress disorder; 1.9.9 Eating disorders; 1.9.10 Dysthymic disorder; 1.10 Psychosis: traces in PSER; 1.10.1 Schizophrenic disorder; 1.10.2 Brief psychotic disorder (BRP/brief reactive psychosis); 1.10.3 Shared psychotic disorder; 1.10.4 Psychotic affective states: traces in PSER; 1.11 Concluding remarks; Summary of Chapter 1Chapter 2 Communication in PSER2.1 Communication and security; 2.2 Communication: Definition; 2.3 Brief Comments on Communication Theory and the Communication -Models; 2.4 The Mathematical Model: Communication as the Transmission of Information; 2.5 The Pragmatic Model: Communication As Behavior; 2.6 The Sociological Model: Communication as an Expression and Product of Society; 2.6.1 Internal corporate communications: hierarchical or networked; external and integrated communications; 2.6.2 Communicative competences; 2.7 The Psychological Model: Communication as a Relationship; 2.7.1 Verbal, non-verbal and para-verbal interpersonal communication; 2.7.2 'Descriptive', 'representative' and 'regulative'communication; 2.7.3 Conditions required for communicating security, with security and in security; 2.7.4 Communication problems: communication barriers; 2.7.5 Conflictual situations, distorted communication (paradoxical; disqualifying) and pathological communication (schizophrenic); 2.8 The Psychodynamic-Semiotic Approach: Communication as Signification; 2.8.1 Communication in helping relationships: sympathy, empathy and entropathy; 2.9 Concluding remarks; Summary of Chapter 2Chapter 3 The psychology of security3.1 The psychology of security; 3.2 The definition, origins and development of the emotions; 3.2.1 The evolution of the theory of emotions; 3.3 The neurofunctional pathway from emotions to feelings (the LeDoux Dual-Route Model); 3.3.1 From the brain to the mind, from consciousness to awareness; 3.4 The psychological origins and evolution of se-curity; 3.4.1 Attachment theory and the internal working models; 3.4.2 The problem of synchronization - desynchro-nization; 3.5 Operational definitions on the topic of security; 3.6 Perceived security versus real security; 3.7 The safety trade-offs; 3.8 Concluding remarks; Summary of Chapter 3Chapter 4 The psychology of emergency4.1 The psychology of emergency; 4.2 Definition of traumatic event or critical incident trauma; 4.2.1 The perfect adaptogenic ability or resilience; 4.3 Definition of stress; 4.3.1 General Adaptation Syndrome (GAS); 4.3.2 The ge-netics of GAS; 4.4 Psychological intervention in emergencies; 4.5 The psychology of emergency first responders; 4.5.1 The CISM (Critical Incident Stress Management) program: defusing and debriefing; 4.5.2 Methods for applying the CISM defusing technique; 4.5.3 The structure and timing of defusing; 4.5.4 Debriefing or CISD; 4.6 The 'problem solving' method; 4.6.1 Problem setting; 4.7 Eye Movement Desensitization and Reprocessing (EMDR); 4.7.1 The neurophysiological background of EMDR; 4.7.2 The typical timing of a post-traumatic intervention; 4.7.3 Assessment; 4.7.4 Traumatic experiences in childhood; 4.7.5 EMDR and attachment theory; 4.8 Concluding remarksSummary of Chapter 4Chapter 5 The psychology of risk5.2 The heuristic solutions: definition; 5.2.1 Heuristic solutions in a situation of risk; 5.2.2 Bias in risk situations; 5.3 Risk epidemiology and statistics; 5.4 Perception and communication of the risk; 5.5 The concept of risk: origin and definitions; 5.5.1 The individualistic approach to risk; 5.5.2 Differences in risk perception between ordinary people and professionals who are experts in the field; 5.5.3 The cultural approach to risk; 5.5.4 How to reconcile the cultural and individualistic approaches: the social representations; 5.5.5 Social conflict and Nimby syndrome; 5.6 Social psycholo-gy or situational psychology; 5.6.1 Social cognition: mental patterns, stereotypes, reconstructive memory, accessibility, priming and counterfactual thinking; 5.6.2 Social perception: the rules of exhibition; emblems; implicit personality the-ory; 5.6.3 Attribution theory: perceptual salience and the spotlight effect; defensive attributions and unrealistic opti-mism; dispositional and situational attributions; fundamental attribution error; 5.6.4 The definitions of the ego and the self, and their relationship: self-perception and introspection; Bem's self-perception theory; reverse attribution error or over justification; Schachter's theory of emotions and attribution of arousal; Festinger's theory of social comparison, presentation strategies; 5.6.5 Cognitive dissonance: postdecisional dissonance; 'Counterattitudinal advocacy'; Self-discrepancy theory; Tesser's Self-evaluation maintenance theory; the Self-affirmation theory; Swann's Self-verification theory; 5.7 Attitude and Behavior; 5.7.1 Persuasive communication: Petty and Cacioppo's elaboration likelihood model; Chaiken's heuristic-systematic model; the central and peripheral routes to persuasion; reactance theory; 5.8 Conformist behavior: informational conformity; reasons for group -cohesion; 5.9 Cumulative stress disorder, or 'burnout'; 5.10 Concluding remarksSummary of Chapter 5Chapter 6 The psychology of terrorism6.1 Youth distress: risky behavior of old and new dependencies; 6.2 Impulse control disorders; 6.3 Criminal psychol-ogy: premeditated risky activities; 6.4 The psychology of kidnapping; stockholm and lima syndrome; 6.5 The psychology of terrorism: the definition of terrorism from above and below; fundamentalism; group psychodynamics; 6.6 Terrorism from emotion to feeling: theoretical interpretations and remedies; 6.7 Particular aspects of psychological ter-rorism: the role of the mass media and bioterrorism; 6.8 The psychodynamics and genetics of suicide; 6.9 Concluding remarksSummary of Chapter 6AppendixBibliographical ReferencesNomenclatureIndex

Ask a Question About this Product More...
 
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 8% commission by selling The Psychology of Security, Emergency and Risk on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond Retail Limited.

Back to top