Study Document
… their phobia, an individual will experience intense distress and this can prevent them from functioning normally. Sometimes a phobia can lead to panic attacks. It is estimated that in the United States about 17 million people have phobias. A phobia is more serious than a simple fear ……
References
Campos, D., Mira, A., Bretón-López, J., Castilla, D., Botella, C., Baños, R. M., & Quero, S. (2018). The acceptability of an internet-based exposure treatment for flying phobia with and without therapist guidance: patients’ expectations, satisfaction, treatment preferences, and usability. Neuropsychiatric disease and treatment, 14, 879.
Carleton, R. N., Thibodeau, M. A., Weeks, J. W., Teale Sapach, M. J. N., McEvoy, P. M., Horswill, S. C., & Heimberg, R. G. (2014). Comparing short forms of the Social Interaction Anxiety Scale and the Social Phobia Scale. Psychological assessment, 26(4), 1116-1126. doi:10.1037/a0037063
Erceg-Hurn, D. M., & McEvoy, P. M. (2018). Bigger is better: Full-length versions of the Social Interaction Anxiety Scale and Social Phobia Scale outperform short forms at assessing treatment outcome. Psychological assessment, 30(11), 1512-1526. doi:10.1037/pas0000601
Goetter, E. M., Frumkin, M. R., Palitz, S. A., Swee, M. B., Baker, A. W., Bui, E., & Simon, N. M. (2018). Barriers to mental health treatment among individuals with social anxiety disorder and generalized anxiety disorder. Psychological Services, No Pagination Specified-No Pagination Specified. doi:10.1037/ser0000254
Halldorsdottir, T., & Ollendick, T. H. (2016). Long-term outcomes of brief, intensive CBT for specific phobias: The negative impact of ADHD symptoms. Journal of Consulting and Clinical Psychology, 84(5), 465-471. doi:10.1037/ccp0000088
Hirsch, J. A. (2018). Integrating Hypnosis with Other Therapies for Treating Specific Phobias: A Case Series. American Journal of Clinical Hypnosis, 60(4), 367-377.
Leitenberg, H., Agras, W. S., Barlow, D. H., & Oliveau, D. C. (1969). Contribution of selective positive reinforcement and therapeutic instructions to systematic desensitization therapy. Journal of Abnormal Psychology, 74(1), 113-118. doi:10.1037/h0027063
Probst, T., Berger, T., Meyer, B., Späth, C., Schröder, J., Hohagen, F., . . . Klein, J. P. (2019). Social phobia moderates the outcome in the EVIDENT study: A randomized controlled trial on an Internet-based psychological intervention for mild to moderate depressive symptoms [Press release]
Study Document
… from uniting and standing up to the powers that be. As history has shown, whenever leaders stand up to end racism or to attack the elitism that perpetuates the system of racism in the U.S, those leaders are assassinated: from John Brown to Martin Luther King, Jr. ……
Works Cited
Adorno, Theodor and M. Horkheimer. The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.
Aldrige, Derick. “From Civil Rights to Hip Hop: Toward a Nexus of Ideas.” http://www.thehiphopproject.org/site/pdfs/hhp_civilRights.pdf
Blair, Elizabeth. “The Strange Story of the Man behind Strange Fruit.” NPR. http://www.npr.org/2012/09/05/158933012/the-strange-story-of-the-man-behind-strange-fruit
Cashmore, Ellis. The Black culture industry. Routledge, 2006.
Collins, Patricia Hill. "New commodities, new consumers: Selling blackness in a global marketplace." Ethnicities 6.3 (2006): 297-317.
Davis, Angela. The Meaning of Freedom. San Francisco, CA: City Light Books, 2012.
Guy, Talmadge C. "Gangsta rap and adult education." New directions for adult and continuing education 2004.101 (2004): 43-57.
Heaggans, Raphael C. "When the oppressed becomes the oppressor: Willie Lynch and the politics of race and racism in hip-hop music." West Virginia University Philological Papers 50 (2003): 77-81.
Study Document
… its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is … seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A … cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage, acceptability, proposition, state behavior, cyberattack, relationship, intelligence gathering, national security.
Introduction
Cyberspace has become an important element ins the operations of any given country because of today’s information … espionage refers to the practice……
Bibliography
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).
Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).
Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017. https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf
National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018. https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf
Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014. https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/
Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).
Study Document
… 1988 by beating him and stabbing him. There is Jose Tevenal who shot and killed a cab driver. There is James Costello who attacked and killed Mrs. Paciulo. There is Herby Caillot who killed a family. There is Malik Aziz who shot a man in the back. ……
Study Document
...Attack General Strain Theory
Summary
General strain theory (GST) offers a unique explanation of delinquency and crime, which is in direct contrast to control and learning theories. The differentiation is through the type of social relationship that leads to delinquency, and the motivation for delinquency. By analyzing GST, we can determine the effect or how criminal behavior is developed. GST looks at how a negative relationship will affect and individual and their possibility of developing towards crime. A negative relationship can be defined as any relationship of other people that is not consistent with the individual's beliefs of how they should be treated. In this paper, we have analyzed two articles all focusing on GST. However, the two articles differ in the negative stimuli being researched. Cullen, Unnever, Hartman, Turner, and Agnew (2008) is analyzing the impact of bullying while Watts and McNulty (2013) is analyzing the impact of childhood abuse.……
References
Agnew, R. (2002). Experienced, vicarious, and anticipated strain: An exploratory study on physical victimization and delinquency. Justice Quarterly, 19(4), 603-632.
Agnew, R. (2007). Pressured into crime: An overview of general strain theory. Los Angeles,CA: Roxbury.
Cullen, F. T., Unnever, J. D., Hartman, J. L., Turner, M. G., & Agnew, R. (2008). Gender, bullying victimization, and juvenile delinquency: A test of general strain theory. Victims and Offenders, 3(4), 346-364.
Warner, B. D., & Fowler, S. K. (2003). Strain and violence: Testing a general strain theory model of community violence. Journal of Criminal Justice, 31(6), 511-521.
Watts, S. J., & McNulty, T. L. (2013). Childhood abuse and criminal behavior: Testing a general strain theory model. Journal of interpersonal violence, 28(15), 3023-3040.
Study Document
...Attack Personality theories and PTSD
Alternative Theoretical Positions and Applications
The idea of personality is broadly accepted as being fundamental in psychology, but its dynamics as well as the ways that it may be identified and assessed are questions in which psychologists have been in substantial disagreement. Millon had been focused on perpetually creating a systematic program to describe standard as well as abnormal personality functioning and also to determine various kinds of personality types and conditions according to deductive thinking. This varies with the rising inductive technique that identified proportions of personality functioning and realignment according to factor evaluation of the personality lexicon qualities. The present system consists of 13 personality designs or kinds according to groups generally observed in a number of communities to varying degrees. The primary personality designs established by Millon had been all variants from the Passive, Active along with Pleasure-Pain proportions. Over his years of……
References
Pincus, A. L., & Krueger, R. F. (2015). Theodore Millon\\'s contributions to conceptualizing personality disorders. Journal of personality assessment, 97(6), 537-540.
Millon, T., Millon, C. M., Meagher, S. E., Grossman, S. D., & Ramnath, R. (2004). Personality disorders in modern life. John Wiley & Sons.
Rossi, G., & Derksen, J. (2015). International adaptations of the Millon Clinical Multiaxial Inventory: Construct validity and clinical applications. Journal of personality assessment, 97(6), 572-590.
O’Connor, B. P., & Dyce, J. A. (1998). A test of models of personality disorder configuration. Journal of Abnormal Psychology, 107(1), 3.
Lecic-Tosevski, D., Gavrilovic, J., Knezevic, G., & Priebe, S. (2003). Personality factors and posttraumatic stress: Associations in civilians one year after air attacks. Journal of Personality Disorders, 17, 537–549.
Strack, S., & Millon, T. (2007). Contributions to the dimensional assessment of personality disorders using Millon\\'s model and the Millon Clinical Multiaxial Inventory (MCMI–III). Journal of Personality Assessment, 89(1), 56-69.
Bajraktarov, S., Gudeva-Nikovska, D., Manuševa, N., & Arsova, S. (2017). Personality Characteristics as Predictive Factors for the Occurrence of Depressive Disorder. Open Access Macedonian Journal of Medical Sciences, 5(1), 48–53. https://doi.org/10.3889/oamjms.2017.022
Framingham, J. (2018). Millon Clinical Multiaxial Inventory (MCMI-III). Psych Central.
Study Document
...Attack Historical Context of the Film To Kill a Mockingbird
To Kill a Mockingbird
To Kill a Mockingbird starring Gregory Peck is a 1962 film adaptation of the 1960 novel by Harper Lee of the same name. The film was produced during a decade in which the Civil Rights Movement was reaching its zenith. Blacks had been protesting throughout the South, and Martin Luther King, Jr., would be arrested in Birmingham in 1963. There he would write his famous Letter from Birmingham Jail, justifying his actions at the front of the civil disobedience. Soon thereafter would be the march to Washington and then the Selma to Montgomery march. In short, race and desegregation was on everyone’s mind. The film gives special attention to the issue of race, even though it is set in the 1930s. The activities abuzz in the 1960s were surely reflected in the film’s story. For instance, the……
Works Cited
Executive Order 10925. Thecre. https://www.thecre.com/fedlaw/legal6/eo10925.htm
Study Document
...Attack Contact in Canadian Literature: The Use of Gothic Elements in the Negotiation of Cultural Differences between Settlers and Indigenous Nations
Introduction
Common elements of gothic literature include mystery, fear, omens, curses, preternatural settings, gloomy atmospheres with a hint of being haunted, some dimension of the supernatural, romance, an arch-villain, nightmare situations, anti-heroes and ladies in distress (Mulvey-Roberts; Smith). Popular examples on both sides of the Atlantic include works by the Bronte sisters, works by Poe, and Shelley’s Frankenstein. The gothic was a popular genre form in the 19th century. It was romantic, vibrant, dark, brooding, frightening, exciting, and visceral. It resonated with readers because after a century of Enlightenment (hyper-emphasis on reason and naturalism), the romantic era had ushered in something desperately needed: feeling. Thus, authors of the 19th century, like Duncan Campbell Scott and Pauline Johnson, found elements of the gothic genre to be a useful way to explore……
Works Cited
Gray, Charlotte, and Clara Thomas. "Flint and feather: the life and times of E Pauline Johnson, Tekahionwake." Canadian Woman Studies 23.1 (2003): 183.
Johnson, E. Pauline. “Pagan in St. Paul’s Cathedral.” http://fullonlinebook.com/essays/a-pagan-in-st-paul-s-cathedral/jhfy.html
Mulvey-Roberts, Marie, ed. The Handbook to Gothic literature. NYU Press, 1998.
Salem-Wiseman, Lisa. ""Verily, the White Man's Ways Were the Best": Duncan Campbell Scott, Native Culture, and Assimilation." Studies in Canadian Literature/Études en littérature canadienne (1996): 121-144.
Scott, D. C. “The Onondaga Madonna.”
Smith, Andrew. Gothic Literature. Edinburgh University Press, 2007.
Study Document
… be making less, they would also have no job security, and no safety in terms of their physical health if they should be attacked while on the job (North, 2019). Or, as the pandemic of recent months has shown, if the economy were to suddenly close down, ……
References
Bhuiyan, J. (2018). Uber’s sleek new product? Your safety. Retrieved from https://www.vox.com/2018/9/6/17824294/uber-safety-product-feature s
Bond, S. (2019). Uber Received Nearly 6,000 U.S. Sexual Assault Claims In Past 2 Years. Retrieved from https://www.npr.org/2019/12/05/785037245/uber-received-nearly-6-000-u-s-sexual-assault-claims-in-past-2-year s
Kaltner, J. (2018). Employment status of uber and lyft drivers: Unsettlingly settled. Hastings Women's LJ, 29, 29.
Malos, S., Lester, G. V., & Virick, M. (2018). Uber drivers and employment status in the gig economy: Should corporate social responsibility tip the scales?. Employee Responsibilities and Rights Journal, 30(4), 239-251.
North, A. (2019). It’s not just passengers being assaulted in Ubers. Drivers are at risk, too. Retrieved from https://www.vox.com/2019/12/7/20998646/uber-safety-report-sexual-assault-lyft-case s
Rapier, G. (2019). Uber scored a major victory when the US government ruled drivers aren't employees, but not everyone is happy. Retrieved from https://www.businessinsider.com/uber-drivers-disappointed-ruling-not-employees-2019-5
Reingold, J. (2013). Southwest’s Herb Kelleher: Still crazy after all these years. Retrieved from http://fortune.com/2013/01/14/southwests-herb-kelleher-still-crazy-after-all-these-years/
Rogers, B. (2016). Employment rights in the platform economy: Getting back to basics. Harv. L. & Pol'y Rev., 10, 479.
Study Document
… unacceptable regardless of whether one is harmed in the process. Monica Lewinsky shows how public shame can become a tool of personal harm, attack and stigmatization. Even though public shame was used as a means to discourage her behavior, it contributed to deep personal harm and humiliation ……
References
Reeves, R.V. (2013, March 15). Shame Is Not a Four-Letter Word. The New York Times. Retrieved June 11, 2020, from https://www.nytimes.com/2013/03/16/opinion/a-case-for-shaming-teenage-pregnancy.html
The Virginian-Pilot. (2010, June 23). Public Shame is the Best Remedy. Retrieved June 11, 2020, from https://www.pilotonline.com/opinion/article_c3f14da5-c8fd-5eee-9c90-52884a8f5971.html
We have over 150,000+ study documents to help you.
Sign Up for FREE