Wednesday, 24 August 2011

Probably with some additions ...

Probably with some additions, they can be applied to compare the different security systems. 1. Item - it is always the integrity of something, a certain state of homeostasis. In the case of psychological defense - is the integrity of the self and positivity of this state, in the case of immune defense is - the integrity of body systems, their proper functioning (health). 2. The protection agent (the threat itself) - something that can break down the boundaries and bring the body or the other of the integrity of the state of equilibrium. Different authors distinguish agents of protection depending on the direction in which working. For example, A. Freud suggests that "instinctive danger from which protects the" I "is always the same." At the same time it is considering various ways to incursions by which instincts may be regarded as dangerous and update job protections. So we select another parameter for comparing the safety systems - is a way to attack. 3. Method of attack (strategy presentation threats). It can essentially determine the response defensive strategy, consistency and duration of adverse effects actualizes the most appropriate in this case, psychological defenses. 4. Nature of damage - the degree of destruction, recoverability or unrecoverable original condition (reversibility of fracture), penetrating through the other layers of protection (for example, a man suffered a severe traumatic so that psychological defenses have not coped with it, people got sick, that a failure has occurred and at the somatic level). In general, we can distinguish the following types of possible harm: the complete destruction, suppression or subjugation, division, exclusion of the qualitative changes that lead to loss of self, excessively rapid changes, delayed development (Dotsenko 1996). 5. Remedies - is the response action to eliminate or mitigate threats. In the animal kingdom are 4 main types of protections: escape, attack, freezing, hiding. It is proposed to distinguish between them in pairs, comparing active and passive forms: "escape-attack" can be combined to achieved by increasing the distance to secure borders. "Hiding" - the control (control actions, the behavior of the aggressor) - correlates with the change of parameters of influence, "fading" cessation of transmission of information about itself - its opposite - "ignore" - a ban on the entry-threatening information. Thus defined six types of defensive strategies.


Tackling gaming addiction


Vladimir Kukk psychiatrist, psychologist, social activist http://www.DrKukk.com vladimirkukk2000@mail.ru dr.kukk @ inbox.ru engaged in psychological practice in problem-solving game dependency, by 1995, I have formed their own programma.Ishodya from its humble practical experience, I have come to the conclusion that first of all need to work in the following areas: 1. Adoption of the partnership, the conditions of the program, rapredelenie duties and responsibilities of psychologists and trainees. 2.Ponyatiya formation of gambling addiction and ways to solve this problem.

No comments:

Post a Comment