Study Document
… in the DSM-5 manual. The 4Ds will be analyzed as they relate to phobia and the models of abnormality will be discussed. Treatment, history, culture, and prognosis will form the later part of the paper.
Description
According to Sutherland, Middleton, Ornstein, Lawson, and Vickers (2016) a phobia ……
References
Campos, D., Mira, A., Bretón-López, J., Castilla, D., Botella, C., Baños, R. M., & Quero, S. (2018). The acceptability of an internet-based exposure treatment for flying phobia with and without therapist guidance: patients’ expectations, satisfaction, treatment preferences, and usability. Neuropsychiatric disease and treatment, 14, 879.
Carleton, R. N., Thibodeau, M. A., Weeks, J. W., Teale Sapach, M. J. N., McEvoy, P. M., Horswill, S. C., & Heimberg, R. G. (2014). Comparing short forms of the Social Interaction Anxiety Scale and the Social Phobia Scale. Psychological assessment, 26(4), 1116-1126. doi:10.1037/a0037063
Erceg-Hurn, D. M., & McEvoy, P. M. (2018). Bigger is better: Full-length versions of the Social Interaction Anxiety Scale and Social Phobia Scale outperform short forms at assessing treatment outcome. Psychological assessment, 30(11), 1512-1526. doi:10.1037/pas0000601
Goetter, E. M., Frumkin, M. R., Palitz, S. A., Swee, M. B., Baker, A. W., Bui, E., & Simon, N. M. (2018). Barriers to mental health treatment among individuals with social anxiety disorder and generalized anxiety disorder. Psychological Services, No Pagination Specified-No Pagination Specified. doi:10.1037/ser0000254
Halldorsdottir, T., & Ollendick, T. H. (2016). Long-term outcomes of brief, intensive CBT for specific phobias: The negative impact of ADHD symptoms. Journal of Consulting and Clinical Psychology, 84(5), 465-471. doi:10.1037/ccp0000088
Hirsch, J. A. (2018). Integrating Hypnosis with Other Therapies for Treating Specific Phobias: A Case Series. American Journal of Clinical Hypnosis, 60(4), 367-377.
Leitenberg, H., Agras, W. S., Barlow, D. H., & Oliveau, D. C. (1969). Contribution of selective positive reinforcement and therapeutic instructions to systematic desensitization therapy. Journal of Abnormal Psychology, 74(1), 113-118. doi:10.1037/h0027063
Probst, T., Berger, T., Meyer, B., Späth, C., Schröder, J., Hohagen, F., . . . Klein, J. P. (2019). Social phobia moderates the outcome in the EVIDENT study: A randomized controlled trial on an Internet-based psychological intervention for mild to moderate depressive symptoms [Press release]
Study Document
… interpersonal communication is going to end. If anything, the availability of digital and mobile technology has made it easier than ever before in history to maintain strong interpersonal communications with significant others in long-distance relationships. In fact, as Maquire and Kinney (2010) show, many people today would ……
References
Etcheverry, P. E., & Le, B. (2005). Thinking about commitment: Accessibility of commitment and prediction of relationship persistence, accommodation, and willingness to sacrifice. Personal Relationships, 12(1), 103-123.
Farrell, J. E., Hook, J. N., Ramos, M., Davis, D. E., Van Tongeren, D. R., & Ruiz, J. M. (2015). Humility and relationship outcomes in couples: The mediating role of commitment. Couple and Family Psychology: Research and Practice, 4(1), 14.
Johnson, A. J. (2001). Examining the maintenance of friendships: Are there differences
between geographically close and long?distance friends?. Communication Quarterly, 49(4), 424-435.
Johnson, A. J., Haigh, M. M., Becker, J. A., Craig, E. A., & Wigley, S. (2008). College students’ use of relational management strategies in email in long-distance and geographically close relationships. Journal of Computer-mediated communication, 13(2), 381-404.
Keller, M. (2013). Social media and interpersonal communication. Social Work Today, 13(3), 10.
Maguire, K. C., & Kinney, T. A. (2010). When distance is problematic: Communication, coping, and relational satisfaction in female college students' long-distance dating relationships. Journal of Applied Communication Research, 38(1), 27-46.
Study Document
...History Abstract
This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning……
References
Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.
Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.
Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.
Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.
Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/
Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.
Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.
Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.
Study Document
...History Analysis of The Epic of Gilgamesh
Introduction
The Epic of Gilgamesh is one of the few great literatures that survived the ruin of ancient civilizations, more particularly the ancient Mesopotamia. It is a poem that tells the story of two great heroes, friendship, adventure, and the gods. Comprised of twelves tablets, each depicting a section of the overall tale, the Epic of Gilgamesh exists in various versions—with the Akkadian and Old Babylonian versions being the most prominent. This essay considers various parts of the Epic and seeks to examine/illustrate a few details about the heroes “Gilgamesh and Enkidu”, their relationship, the actions of the gods, and the overall significance of this Epic—as regarding its depiction of the ancient Mesopotamian civilization.
Gilgamesh and Enkidu
Gilgamesh was the first character, of the two, to be introduced. In the introduction, Gilgamesh was described as one who had exceptional qualities that transcends that of……
Works Cited
Abusch, T. \\\\\\\\\\\\"The Development and Meaning of the Epic of Gilgamesh: An Interpretive Essay.\\\\\\\\\\\\" Journal of the American Oriental Society, vol. 121, 2001, pp. 614-622, doi:10.2307/606502. Retrieved from: https://sci-hub.tw/https://doi.org/10.2307%2F606502
Al-Rawi. F. N. H., and A. R. George. \\\\\\\\\\\\"Back to The Cedar Forest: The Beginning and End of Tablet V of The Standard Babylonian Epic of Gilgameš.\\\\\\\\\\\\" Journal of Cuneiform Studies, vol. 66, 2014, pp. 69-90, doi:10.5615/jcunestud.66.2014.0069. Retrieved from: https://sci-hub.tw/https://doi.org/10.5615%2Fjcunestud.66.2014.0069
Christman, J. \\\\\\\\\\\\"The Gilgamesh Complex: The Quest for Death Transcendence and the Killing of Animals.\\\\\\\\\\\\" Society & Animals, vol. 16, 2008, pp. 297-315, doi:10.1163/156853008x357649. Retrieved from: sci-hub.tw/10.1163/156853008X357649
Dickson, Keith. “Looking at the Other in ‘Gilgamesh.’” Journal of the American Oriental Society, vol. 127, no. 2, 2007, pp. 171–182. JSTOR, www.jstor.org/stable/20297248.
George, Andrew R. \\\\\\\\\\\\"The Mayfly on the River: Individual and collective destiny in the Epic of Gilgamesh.\\\\\\\\\\\\" KASKAL: Rivista di storia, ambienti e culture del Vicino Oriente Antico, vol. 9, 2012, pp. 227-242. Retrieved from: https://eprints.soas.ac.uk/15817/1/Kaskal_9%20227-242%20George.pdf
Khan, Anika. “Gilgamesh and medicine’s quest to conquer death.” Hektoen international: A Journal of Medical Humanities, vol. 11, no.4, June 2019, Highlighted in Frontispiece pp. 1-3.
Kline, J. \\\\\\\\\\\\"The Oldest Story, the Oldest Fear, the Oldest Fool: The Religious Dimension ofThe Epic of Gilgamesh.\\\\\\\\\\\\" Jung Journal, vol. 10, no.2, 2016, 24 – 36, doi:10.1080/19342039.2016.1157411. Retrieved from: https://sci-hub.tw/https://doi.org/10.1080/19342039.2016.1157411
Study Document
...History Section 1
The commodity selected for this research paper is coffee. This commodity was chosen owing to the reason that it is one of the most common and most consumed beverages across the globe. In fact, the practice of consuming coffee goes to as far back as the 15th century (Einstein, 2019). As indicated by Ponte (2002), more than 2.25 billion cups of coffee are consumed on an everyday basis. 54 percent if adults in America consume coffee with an average intake of at least three cups of coffee every day. In totality, it is approximated that the United States spends just about $40 billion on coffee annually. One of the key issues surrounding the consumption of coffee is the health benefits or risks that the commodity poses. The effects of coffee on the health of human beings are controversial. For the most part, there is a lot that has……
References
Bhupathiraju, S. N., Pan, A., Manson, J. E., Willett, W. C., van Dam, R. M., & Hu, F. B. (2014). Changes in coffee intake and subsequent risk of type 2 diabetes: three large cohorts of US men and women. Diabetologia, 57(7), 1346-1354.
Cadden, I. S. H., Partovi, N., & Yoshida, E. M. (2007). Possible beneficial effects of coffee on liver disease and function. Alimentary pharmacology & therapeutics, 26(1), 1-8.
D’Costa, K. (2011). The Culture of Coffee Drinkers. Scientific American.
Einstein, E. (2019). The Health Benefits of Coffee: How does drinking coffee help your body and your brain? Scientific American.
Lucas, M., Mirzaei, F., Pan, A., Okereke, O. I., Willett, W. C., O’Reilly, É. J., ... & Ascherio, A. (2011). Coffee, caffeine, and risk of depression among women. Archives of internal medicine, 171(17), 1571-1578.
Ponte, S. (2002). The latte revolution? Regulation, markets and consumption in the global coffee chain. World development, 30(7), 1099-1122.
Rudeen, K. (2018). The History of Coffee and its Concurrent Marketing Strategies. Scholars Archive.
Samoggia, A., & Riedel, B. (2019). Consumers’ Perceptions of Coffee Health Benefits and Motives for Coffee Consumption and Purchasing. Nutrients, 11(3), 653.
Study Document
… that. From the Mississippi Black Code of 1865 to King’s Letter from Birmingham Jail in 1963, one can see the shape of American history with respect to its race relations.
The historical significance of the Mississippi Black Code of 1865 is that it helped to institutionalize the ……
Works Cited
King, Jr., Martin Luther. “Letter from Birmingham Jail.” 1963.
The Mississippi Black Code of 1865.
Study Document
… turned against themselves, focused on their own external differences, and preventing them from uniting and standing up to the powers that be. As history has shown, whenever leaders stand up to end racism or to attack the elitism that perpetuates the system of racism in the U.S, ……
Works Cited
Adorno, Theodor and M. Horkheimer. The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.
Aldrige, Derick. “From Civil Rights to Hip Hop: Toward a Nexus of Ideas.” http://www.thehiphopproject.org/site/pdfs/hhp_civilRights.pdf
Blair, Elizabeth. “The Strange Story of the Man behind Strange Fruit.” NPR. http://www.npr.org/2012/09/05/158933012/the-strange-story-of-the-man-behind-strange-fruit
Cashmore, Ellis. The Black culture industry. Routledge, 2006.
Collins, Patricia Hill. "New commodities, new consumers: Selling blackness in a global marketplace." Ethnicities 6.3 (2006): 297-317.
Davis, Angela. The Meaning of Freedom. San Francisco, CA: City Light Books, 2012.
Guy, Talmadge C. "Gangsta rap and adult education." New directions for adult and continuing education 2004.101 (2004): 43-57.
Heaggans, Raphael C. "When the oppressed becomes the oppressor: Willie Lynch and the politics of race and racism in hip-hop music." West Virginia University Philological Papers 50 (2003): 77-81.
Study Document
...History Intercultural Situations: Describing a Person from a Different Culture
My friend Pio is an information technology consultant who was born and raised in India. He spent ten years in a Catholic seminary in India before leaving and getting a job in IT. He had always been good at math, and after leaving the seminary he enrolled in IT courses. After completing his courses, he was recruited by American headhunters who were in Chennai, where he lived, looking for Indian IT workers. The headhunters asked him if he would come to work for a major banking firm in America. Pio’s father insisted that he take the job and Pio complied with his father’s wishes. His father’s reasoning was that Pio would earn good money in America and would be able to provide financial support for his family back home in Chennai, especially since his father could not depend upon Pio’s brothers……
Study Document
… on the marketplace, one can see what the effect has been: currently the stock market is in the longest bull run in equities history (Chen, 2019). During that time, P/E ratios have soared far higher than their historic norms. Many zombie corporations in the Fortune 500 are ……
References
Augustine. (n.d.). Commentaries on Sermon on the Mount. http://www.newadvent.org/fathers/16011.htm
Chen, J. (2019). Market Milestones as the Bull Market Turns 10. Retrieved from https://www.investopedia.com/market-milestones-as-the-bull-market-turns-10-4588903
Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html
Henrich, S. (2019). Unholy alliance. Retrieved from https://northmantrader.com/2019/11/30/unholy-alliance/
Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.
Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from https://fortune.com/2019/08/20/stock-buybacks-debt-financed/
Mullen, C. (2019). People want to buy \\\\\\'local\\\\\\' food, but they\\\\\\'re not sure what it means. Retrieved from https://www.bizjournals.com/bizwomen/news/latest-news/2019/05/people-want-to-buy-local-food-but-theyre-not-sure.html?page=all
Putka, G. (2019). Insiders are selling. Retrieved from https://www.washingtonpost.com/business/economy/company-insiders-are-selling-stock-during-buyback-programs-and-making-additional-profits-when-stock-prices-jump-and-its-legal/2019/11/06/fc592f58-e493-11e9-a331-2df12d56a80b_story.html
Study Document
...History Introduction
Western scholars came up with the term mysticism to describe a special religious phenomenological concept. The term is general utilized today based on a very broad assumption that things found in every religion e.g. the rituals, the practices, the goals, and the experiences are also found in other religions and outside the domain of religion (Keller, 1978; Katz, 1978). The concept of mysticism has fascinated generations. It is a concept that has gathered a lot of attention especially in the modern day world with the increasing influence of eastern religions and the New Age Movement. It has blurred the lines between general mystical experiences and experiences with the true Living God. Nowadays, some experiences of consciousness are regarded as authentic spiritual experiences (Florovsky, 1972). This research proposal is thus an investigation of biblical mysticism and major biblical mysteries found in the Christian bible and how the mysteries found in the……
References
Addington, J. E. (1969). The Hidden Mystery of the Bible. DeVorss & Company.
Ahn, E., & Kang, H. (2018). Introduction to systematic review and meta-analysis. Korean journal of anesthesiology, 71(2), 103.
Beale, G. K., & Gladd, B. L. (2014). Hidden but now revealed: A Biblical theology of mystery. InterVarsity Press.
Catholic Church. (1997). Catechism of the Catholic Church: Revised in accordance with the official Latin text. Promulgated by Pope John Paul II (2nd edition). Washington, D.C.: United States Catholic Conference.
Cook, D. J., Mulrow, C. D., & Haynes, R. B. (1997). Systematic reviews: synthesis of best evidence for clinical decisions. Annals of internal medicine, 126(5), 376-380.
Florovsky, G. (1972). Bible, church, tradition: an Eastern Orthodox view (Vol. 1). Nordland Publishing Company.
Jeffrey, G. R. (2013). Unveiling Mysteries of the Bible. WaterBrook.
Katz, S.T. (1978). Language, Epistemology, and Mysticism. New York, Oxford University Press.
We have over 150,000+ study documents to help you.
Sign Up for FREE