Home >> Free Essays >> All Subjects >> Psychology

Psychology Examples and Topics

Writers Choice

Perception of Pain

[Name of the Writer]

[Name of the Institution]

Perception of Pain

Reflection

According to Robert Feldman, pain has worth in people's life, regardless of the compulsion to avoid pain at any cost. According to him, pain has some purpose in building the strength and power in the person emotionally and physically. Irrespective of the fact that pain is a very undesirable sensation, people would try to eliminate this perception by taking pain killers or opioids, anesthesia and analgesia. Pain is felt differently by everyone; for instance, some people have higher incitement of sensation; therefore they think pain either in lower frequency or later than the people whose stimulus threshold is low. Weber's law states that this is the difference threshold between two stimuli which signifies that the value of k remains constant. When a person is constantly exposed to pain, it induces sensory adaptation, and the pain remains no more significant to the person himself.

The ways in which we perceive pain, determine the way we deal with the pain. There are many methods through which pain is treated or countered, i.e., pain medication, surgery, stimulation of nerve and brain, hypnosis, light therapy, relaxation techniques, cognitive restructuring and biofeedback techniques. Out of these methods, the most effective according to my view is cognitive restructuring. The sensation and perception are all in mind, if the thinking process related to pain is managed it will help in treating pain, event he chronic one.

End Notes

Feldman, Robert Stephen, and Mark Garrison. Understanding psychology. Vol. 10. New York, NY: McGraw-Hill, 1993.

Rey, Amandine E., George A. Michael, Corina Dondas, Marvin Thar, Luis Garcia-Larrea, and Stéphanie Mazza. "Pain dilates time perception." Scientific reports 7, no. 1 (2017): 15682.

Wiech, Katja. "Deconstructing the sensation of pain: the influence of cognitive processes on pain perception." Science354, no. 6312 (2016): 584-587.

Subject: Psychology

Pages: 1 Words: 300

Writers Discretion

Internet Privacy

Name

[Institutional Affiliation(s)]

Author Note

Internet Privacy

Internet privacy consists of subset of a larger set of data privacy that includes the use, collection and storage of confidential information. In the United States, privacy right of individual has always been cherished. This is due to the reason that the consequences of privacy intrusions for individuals can be disastrous. Cyber threats can come from many different sources that are related to the use of personal information for exploitation and benefits. There is a need for more regulatory safeguard measures regarding internet privacy. The internet privacy policy is mostly concern with how internet privacy is exposed over the web through data collection, tracking, cybersecurity and data sharing threat.

According to one research study, it is found that internet privacy is very important for almost 74% of the Americans and more than 86% of the Americans have taken different actions to maintain their internet privacy by adopting different procedures such as encrypting email, deleting cookies and IP address protection ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"4YR7aV3J","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The invent of tracking technologies known as cookies brought a myriad of resources and helpful tools. Although the internet has achieved great popularity among the general public, most of the people are not familiar with the level of privacy and security on the internet.

According to a survey, 82% of the people showed dissatisfaction with "user profile". This paper will analyze certain policies related to internet privacy and ethical concerns for implementing these policies. A practice which different companies use to track and record data. Whenever a person visits website, enter his debit or credit card number, fill out online forms, sign up for new accounts, post on some social media site, store document or image in cloud storage release personal information and data into cyberspace ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"SH8AnShT","properties":{"formattedCitation":"(Tesfay et al., 2018)","plainCitation":"(Tesfay et al., 2018)","noteIndex":0},"citationItems":[{"id":431,"uris":["http://zotero.org/users/local/qnvKw9vm/items/FPGY9PW2"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/FPGY9PW2"],"itemData":{"id":431,"type":"paper-conference","container-title":"Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics","ISBN":"1-4503-5634-6","page":"15-21","publisher":"ACM","title":"PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation","author":[{"family":"Tesfay","given":"Welderufael B."},{"family":"Hofmann","given":"Peter"},{"family":"Nakamura","given":"Toru"},{"family":"Kiyomoto","given":"Shinsaku"},{"family":"Serna","given":"Jetzabel"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Tesfay et al., 2018). The definition of internet privacy differs across different cultures and individuals ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.).

The internet serves as the main means of communication and it is a platform of financial transaction and exchange of critical data. With the increasing use of the internet for different purposes, a new concept of internet privacy has evolved. It deals with addressing the user information security need and also the prevention of disclosure of web user personal information without their consent. In recent years' technology made it possible to view user information that is shared on the web ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"GyuDAlEy","properties":{"formattedCitation":"(Gul et al., 2017)","plainCitation":"(Gul et al., 2017)","noteIndex":0},"citationItems":[{"id":373,"uris":["http://zotero.org/users/local/qnvKw9vm/items/CFPASKCT"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/CFPASKCT"],"itemData":{"id":373,"type":"article-journal","container-title":"IJCSNS","issue":"5","page":"159","title":"A survey on role of internet of things in education","volume":"17","author":[{"family":"Gul","given":"Shahla"},{"family":"Asif","given":"Muhammad"},{"family":"Ahmad","given":"Shahbaz"},{"family":"Yasir","given":"Muhammad"},{"family":"Majid","given":"Muhammad"},{"family":"Malik","given":"M. Sheraz Arshad"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Gul et al., 2017).

The information can be leaked for the wrong reason by invading the internet privacy ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"qGs5Ahr8","properties":{"formattedCitation":"(Heimes, 2017)","plainCitation":"(Heimes, 2017)","noteIndex":0},"citationItems":[{"id":433,"uris":["http://zotero.org/users/local/qnvKw9vm/items/DK954VGJ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/DK954VGJ"],"itemData":{"id":433,"type":"article-journal","container-title":"Maine Law Review","issue":"1","page":"95","title":"Internet privacy law, policy, and practice: state, federal, and international perspectives","volume":"54","author":[{"family":"Heimes","given":"Rita S."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Heimes, 2017). This gives rise to the concern of ethical issue regarding the protection of confidential information from unauthorized access. Internet privacy invasion can be avoided with the implementation of strict privacy laws; every act cannot be classified as illegal or legal, for example, monitoring of web user online habit to target potential customers by an advertiser is not illegal. It is ethics which draw the line between breaching user privacy and ensuring network security. In the United States, many laws cover data privacy and internet security. The internet privacy act was passed to create control over the maintenance, collection, dissemination and use of personal information by different agencies in the main branch of the United State government. The internet invention changed the privacy definition and made it important to legislate new laws concerning electronic security and communication. Sharing confidential and personal information through email and transaction means that information or data is no longer remain confidential. However, for ethical and technical reasons, providers of email service do not use information in the wrong manner.

Ethical Guidelines

There are ethical issues regarding reading and storing of emails without the consent of users. With the help of an automated system, emails are scanned by Google. They use this to detect malware and spam and also to tailored advertising ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"M7s1hitD","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The content of the email, YouTube views, Google profile and map requests are all analyzed and information is further used to create the advertisement. The indexing and scanning cannot be turned off fully thus making it a serious ethical issue in information and data privacy ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"UDLcqyyR","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). During online shopping, people share their bank account details and credit card number on the shopping portal which increase the risk of these details being used for the fraudulent and unethical purpose ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.). On social networking sites, people through status update let everyone know about their location and personal life details. One of the main ethical concern is whether third parties are allowed to read or store emails without the consent of the person or track visitors on their website or not ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"H9MZFYuo","properties":{"formattedCitation":"(Kernighan, 2017)","plainCitation":"(Kernighan, 2017)","noteIndex":0},"citationItems":[{"id":430,"uris":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"itemData":{"id":430,"type":"book","ISBN":"0-691-17654-X","publisher":"Princeton University Press","title":"Understanding the digital world: What you need to know about computers, the internet, privacy, and security","author":[{"family":"Kernighan","given":"Brian W."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kernighan, 2017). Facebook has very little ways to restrict or protect others from accessing the profile information of a user.

The government holds very important information about people. National security can be threatened if the security of this information is compromised. Therefore, there is a great need that Federal websites maintain a high level of privacy standards to protect a large amount of critical information. The degree of government access to citizen personal information raises the ethical concern in data privacy. There are many organizations which store critical information and personal details of their users ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"rGCTIJvA","properties":{"formattedCitation":"(Kernighan, 2017)","plainCitation":"(Kernighan, 2017)","noteIndex":0},"citationItems":[{"id":430,"uris":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"itemData":{"id":430,"type":"book","ISBN":"0-691-17654-X","publisher":"Princeton University Press","title":"Understanding the digital world: What you need to know about computers, the internet, privacy, and security","author":[{"family":"Kernighan","given":"Brian W."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kernighan, 2017). These include medical facilities that contain medical record, banks that contain account holder's financial records, educational institutes that have the education and personal details of students and companies that contain a record of the employee.

In the United States, most of the people are employed in handling, collection, distribution and use of information. Mason stated four ethical issues that are related to the information age: accuracy, privacy, access and property. Privacy is a main part of ethics and data accuracy. The internet privacy protection is the main principle of this current age of technology. More than half of the Americans think that their personal information is not secure than it was 5 years ago. In 2017, there was a disastrous breach at Yahoo admission that result in billions of compromised email account.

Over the years the potential for breach of internet privacy has significantly increased. There is no single law that regulates online privacy. In the United States, many laws regarding internet data security and privacy are available with the privacy act 1974 being the base for all. A patchwork of state and federal law regarding internet privacy include different laws related to internet privacy. The new technologies and internet continually raise new privacy and policy questions. There is a need to address these privacy issues on a priority basis ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"P0SLizvo","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The lawmaker’s documents state laws regarding the personal information held by providers of internet service, website privacy policies, email monitoring, online marketing and reader browsing information.

Current Laws and Policies

The California Consumer Privacy Act (2018) allows the consumers to request the disclosure of specific personal information that is collected. According to this act, the consumer can request business to delete the personal information ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"lQULFWb6","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). This law puts greater restriction on collecting and using information and data by companies. The Federal Trade Commission Act (1914) regulates deceptive and unfair commercial practices. This act is a primary federal regulator in the area of privacy and brings actions and enforcement against companies. This usually includes failing to comply with protection of personal information and privacy policies. The Electronic Communication Privacy Act (1986) protects electronic, wire and oral communications from unauthorized access disclosure and interception ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The Computer Fraud and Abuse Act makes some computer-related activities unlawful. This includes the involvement of unauthorized and illegal access of a computer to get access to certain information, transmit harmful items and obtain data or passwords by wrong ways ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.). The Children Online Privacy Protection Act requires that online service providers and some websites obtain consent before using, collecting and disclosing any data from minors under 13 years of age ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). Under this act, websites are required to collect only the necessary information, post online privacy policy and maintain and create security measures.

Two types of privacy issues raised with the use of internet. First, the aggregation and posting of personal information on the websites violate privacy sometimes. Websites contain all kind of personal information that is made available publicly often without the consent of the person such as a personal address, phone numbers, pictures and video clips. The second ethical issue includes internet user online monitoring ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The ethical issue related to internet privacy is the use of malicious software and spyware to commit cybercrime and to steal private information. In the US, most of the cybercrime has been outlawed which reflects a consensus that information stealing is wrong.

In the US, Federal laws against the internet privacy covers credit card fraud, deceptive and unfair law against cybercrimes, fraud in relation with computers, access devices and identification of information and documents. According to these laws, it is illegal to invade the person privacy to steal their information ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"94qKSg4K","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). In 2014, according to the Guardian, some of the best security investigators were under the indictment threat to expose the internet infrastructure. The United States, Computer and Abuse Act makes illegal the breaking and hacking of private system and networks ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"aJXzdThk","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). Threats to internet privacy do not only come from criminals and information can be leaked from Google and Facebook. In the last few years, it is reported that user's private information on Facebook has been shared on different websites and applications that are further use for data mining.

Challenges in Implementing Ethical Guidelines

It is very easy for hackers to hack into any system or computer as long it is connected to the internet. They can use an IP address to access the computer of the user and collect information for the wrong purpose ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"VqB8jE1k","properties":{"formattedCitation":"(Kernighan, 2017)","plainCitation":"(Kernighan, 2017)","noteIndex":0},"citationItems":[{"id":430,"uris":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"itemData":{"id":430,"type":"book","ISBN":"0-691-17654-X","publisher":"Princeton University Press","title":"Understanding the digital world: What you need to know about computers, the internet, privacy, and security","author":[{"family":"Kernighan","given":"Brian W."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kernighan, 2017). The widespread use of internet cookies also makes it easy to collect any information and exposed internet users to high risk of conflicting and fraud interest. Most of the companies and organizations use these cookies to found which service or product they can advertise to us ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"KrCoyMkj","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). In online banking, hackers can transfer money into their account which affects both customer and bank who is using online technology of banking. Although the internet has enabled people to share and find relevant information, it also exploited the freedom of privacy ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.). There are different ways in which privacy is exploited such as the use of webcams.

In the last few years, many people have become a victim of an online stalker. The ethical guidelines regarding internet privacy should recognize the personal freedom and autonomy. The ethical guidelines also provide a framework of actions regarding the handling of private information. In the view of the law, once the private information of a person has made public, it's no longer consider as private. The freedom and autonomy of a person should be regarded as confidential therefore person information must be handled with confidentiality ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"0jR2qe7Y","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). This implies control and security of the information access and the right to use it. Privacy policy regarding the internet privacy should be formulated consisting of elements such as confidentiality level, use and purpose of information, and the procedures to ensure the information accuracy based on the norms of truth, freedom and human rights ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"Zp9HuaWx","properties":{"formattedCitation":"(Kernighan, 2017)","plainCitation":"(Kernighan, 2017)","noteIndex":0},"citationItems":[{"id":430,"uris":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"itemData":{"id":430,"type":"book","ISBN":"0-691-17654-X","publisher":"Princeton University Press","title":"Understanding the digital world: What you need to know about computers, the internet, privacy, and security","author":[{"family":"Kernighan","given":"Brian W."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kernighan, 2017). Private and personal information or data that is no longer necessary must be collected and destroyed. No unnecessary personal and private information must be collected. This should not only for the logistics aims but also to prevent the unnecessary exposure and violation of person privacy. The companies must notify the user about the use of their private information.

The privacy policy should be posted on all websites. Websites that specifically directed at children under 13 years of age must post a notice that includes type of information collected from children, information dissemination plan, the intended use of data and information and involvement of third parties ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). Different companies are hired specifically to watch which websites are mostly visited by people and then use the information available on these websites for different purposes ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"X7HioGYU","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The directly observed behaviour such as the content of the profile on Facebook, search queries and browsing logs can be processed automatically to infer details of an individual's such as religious and political views, sexual orientation, personality, intelligence, substance use and race.

The concerns associated with internet privacy usually cite different privacy risks and events that can compromise privacy that can be encountered through use of the internet ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.). These range from collection of user statistics to the spread of spyware and exploitation of different kinds of bugs. Different websites protect the personal information of their users. For example, on Facebook, the privacy setting is present to all registered users. People can block some individuals from viewing their profile and limit access to their pictures and videos ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The privacy setting is also available on some other social networking sites such as Twitter and Google Plus. The Electronic Frontier Foundation has formulated different guidelines for users regarding the use of these privacy setting

Various ethical concerns need to be considered during application of these laws for the use of these websites or applications. The laws should be more complex and strict for such applications that store private information data. The Abuse Act make some computer-related activities unlawful counting the unauthorized and illegal access of a computer to get access to certain information, transmit destructive items and obtain data or passwords by wrong ways ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). Most of the websites take consent before using, accumulating and revealing any data from minors under 13 years of age. Under different acts, websites and applications are required to assemble only the essential information, post online privacy policy and preserve and generate security measures. Certain applications and websites require all of the essential details and it remains to save on clouds. The paper has significantly identified certain policies and ethical guidelines to establish privacy laws. These laws need specific privacy concerns to be maintained to protect data and information of communities.

References

ADDIN ZOTERO_BIBL {"uncited":[["http://zotero.org/users/local/qnvKw9vm/items/EUFBDNYZ"],["http://zotero.org/users/local/qnvKw9vm/items/DK954VGJ"],["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],["http://zotero.org/users/local/qnvKw9vm/items/FPGY9PW2"]],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Carlson, E., Goldberg, R. M., McHenry, G., Lewis, M., & Romzek, W. (2018). Trends in Internet Privacy and Security Perceptions and Online Activity. Available at SSRN 3142220.

Gul, S., Asif, M., Ahmad, S., Yasir, M., Majid, M., & Malik, M. S. A. (2017). A survey on the role of internet of things in education. IJCSNS, 17(5), 159.

Heimes, R. S. (2017). Internet privacy law, policy, and practice: State, federal, and international perspectives. Maine Law Review, 54(1), 95.

Kernighan, B. W. (2017). Understanding the digital world: What you need to know about computers, the internet, privacy, and security. Princeton University Press.

Tesfay, W. B., Hofmann, P., Nakamura, T., Kiyomoto, S., & Serna, J. (2018). PrivacyGuide: Towards an implementation of the EU GDPR on internet privacy policy evaluation. Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 15–21.

The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon. (n.d.). Retrieved January 5, 2020, from https://www.youtube.com/watch?v=yG4JL0ZRmi4

Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.

Subject: Psychology

Pages: 8 Words: 2400

Written Assignment #7

Title page

Information literacy

Drug abuse and depression

Article 1: Interventions for Adolescent Substance Abuse: An Overview of Systematic Reviews.

Article 2: Listening to youth: Adolescents’ reasons for substance use as a unique predictor of treatment response and outcome.

Purpose

Article 1: The research is important for determining the correlation between drug abuse and depression. It uncovers the adverse impacts of drugs on teenagers who are still in the development stage. The research also identifies that increased dependence on drugs is further linked to mental health problems that undermine students performance in academics.

Article 2: As drug abuse is common among teenage students it is crucial to uncover its repercussions including psychological problems and personality issues. Mood behaviors and aggression are common behavioral problems linked to drugs. The research stresses the need for eliminating drug use among adolescents. The research also identifies the common reasons that encourage adolescents to take drugs.

Hypothesis

Article 1:

Adolescents who experience anxiety face difficulty in quitting drugs.

Drug abuse is correlated with negative behavior and personality.

Article 2:

Adolescents addicted to drugs exhibit a high level of depression and anxiety.

Adolescents who take drugs are more likely to develop mental health problems.

Participants

Article 1: The research will target high-school students with a selected sample size of 178 participants. The control was constructed for examining the impacts of drugs. In total 109 students were taken from the initial sample for the purpose of the study. The participants selected in the experimental group must be using drugs for the last six months. This allowed the researcher to determine the impacts of drugs on teenagers CITATION Sar131 \l 1033 (Dow & Kelly, 2013).

Article 2: The study targeted participants having ages between 11 to 19 years. Treatment effects and outcomes were considered for examining the relationship between depression and anxiety CITATION Jai16 \l 1033 (Das, Salam, Arshad, Finkelstein, & Bhutta, 2016).

Findings

Article 1: The findings of the study reveals that 41 percent of students were not going to the schools due to their habits of taking drugs. The reasons expressed by the students for using drugs include for feeling good, doing better and feeling better. The prominent reason for using drugs was to get relief from depression/ anxiety CITATION Sar131 \l 1033 (Dow & Kelly, 2013).

Article 2: Interventions were adopted for encouraging adolescent’s to quit their dependence on drugs. The participants who exhibited high depression levels faced difficulties in quitting drugs. The study confirms a significant correlation between anxiety and drug abuse CITATION Jai16 \l 1033 (Das, Salam, Arshad, Finkelstein, & Bhutta, 2016). Adolescents who take drugs face psychological and behavioral issues like mood swings and aggression.

Summary

Article 1: The findings suggest that adolescents who rely on drugs need to be treated with effective interventions. Dependence on drugs is associated with negative behaviour including aggression and mood swings. Drug abuse is also linked to low academic performance.

Article 2: The common reasons that encourage adolescents to use drugs include their desires for getting rid of depression. They feel better for a short time period and use drugs for overcoming anxiety.

PSY 101 – Written Assignment # 7

Division

Society of addiction psychology

Research Topic Idea

Correlation between drug abuse and depression/anxiety.

PsycINFO Subject Terms

Search Filters Used

Relevant Authors?

Substance use disorder

Addiction

Substance abuse and addiction measures

Substance use and addiction

Reasons for using drugs

Adolescents and drugs

Age: 11-19 years

J K Das, R.A Salam, A Arshad, Y Finkelstein & Z.A Bhutta

S J Dow & J.F Kelly

Citation (for References section)

Article’s Topic?

Das, J. K., Salam, R. A., Arshad, A., Finkelstein, Y., & Bhutta, Z. A. (2016). Interventions for Adolescent Substance Abuse: An Overview of Systematic Reviews. Journal of Adolesc Health, 59 (4), 61-75.

Interventions for Adolescent Substance Abuse: An Overview of Systematic Reviews.

Dow, S. J., & Kelly, J. F. (2013). Listening to youth: Adolescents’ reasons for substance use as a unique predictor of treatment response and outcome. Psychol Addict Behav, 27 (4).

Listening to youth: Adolescents’ reasons for substance use as a unique predictor of treatment response and outcome.

Subject: Psychology

Pages: 2 Words: 600

Written Summary

[Name of the Writer]

[Name of Instructor]

[Subject]

[Date]

Written Summary

The article “The physical literacy of children with behavioral and emotional mental health disorders: A scoping review” was conducted by Kathryn Fortnuma, Bonnie Furzera, Siobhan Reida, Ben Jackson, and Catherine Elliott. It was published in the journal "ELSEVIER" in 2018. The article explains that mental health disorder is a crucial issue in youth and children. Around twenty percent of youth and children are suffering from different psychological disorders. The main focus of the study is to develop the physical literacy of children who have mental health disorders. For the purpose literature review of various researches conducted between 1985 and 2018 were analyzed. Studies that focus on the children of age between six and twelve were used to get information. The result indicates that people with mental health disorders have low physical literacy than healthy children without any mental health disorder. Therefore evidence-based practices and support are required to make children with MHDs physically literate ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"gD29R2ly","properties":{"formattedCitation":"(Fortnum et al.)","plainCitation":"(Fortnum et al.)","noteIndex":0},"citationItems":[{"id":1508,"uris":["http://zotero.org/users/local/mlRB1JqV/items/2QPHGWRX"],"uri":["http://zotero.org/users/local/mlRB1JqV/items/2QPHGWRX"],"itemData":{"id":1508,"type":"article-journal","title":"The physical literacy of children with behavioural and emotional mental health disorders: A scoping review","container-title":"Mental Health and Physical Activity","page":"95-131","volume":"15","source":"DOI.org (Crossref)","abstract":"Introduction: Mental Health Disorders (MHDs) affect 20% of children and youth. To improve long-term physiological and psychological health outcomes for children with MHDs, regular physical activity (PA) participation is essential. Physical literacy, comprising physical competence, PA-related knowledge and understanding, and perceptions of motivation and confidence, may aid understanding of the PA behaviours of children with MHDs. The purpose of this scoping review was to establish the physical literacy levels of children with MHDs.\nMethod: Scoping Review. Database searches of Medline, Scopus, Embase, PsycINFO and Sportdiscus were conducted for publications from 1985 to 2018. Broad search terms included: diagnosis; physical literacy; PA; physical competence; confidence; motivation; knowledge and understanding. All studies that examined the individual components of physical literacy of children aged 6–12 with behavioural and emotional disorders (F9097, ICD-10), or depression were included.\nResults: 26,940 articles were identified. Following title, abstract and full text review, 68 articles were included. Physical competence was addressed in 62 articles, indicating children with MHDs display poor motor proficiency but comparable body composition to children without MHDs. Twelve articles focused on daily PA behaviour, with lower PA levels evident in children with MHDs. Limited evidence indicated motivation and confidence (n = 2 articles), and knowledge and understanding (n = 1 article), are lower in children with MHDs. The majority of studies (n = 52) were conducted on children with ADHD.\nConclusion: Broadly, children with MHDs have lower physical literacy than children without MHDs so may require greater levels of support and tailored evidence based-interventions to become physically literate.","DOI":"10.1016/j.mhpa.2018.10.001","ISSN":"17552966","title-short":"The physical literacy of children with behavioural and emotional mental health disorders","journalAbbreviation":"Mental Health and Physical Activity","language":"en","author":[{"family":"Fortnum","given":"Kathryn"},{"family":"Furzer","given":"Bonnie"},{"family":"Reid","given":"Siobhan"},{"family":"Jackson","given":"Ben"},{"family":"Elliott","given":"Catherine"}],"issued":{"date-parts":[["2018",10]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Fortnum et al.).

The main purpose of the study is to understand the physical literacy of the children with MHDs to make them physical literate through effective preventions. Therefore, the broad search terms like confidence, physical competence, diagnosis, understanding, physical literacy, motivation, and knowledge were used while analyzing previous researched to develop an effective conclusion.

I have got interested in this article because this article discussed physical literacy, which effects due to psychological health issues. Mental health disorders like depression and anxiety are too common in children and youth in contemporary that affects their physical health and behavior with time. Children and youth are the future of the nation; therefore, it is important to ensure the physical and psychological health of them. There is an increase in the suicide rate among the youth. The main reason for the suicidal ideation is psychological disorders like depression and anxiety. These mental states affect the routine and activities of individuals. Therefore, I got interested to understand the knowledge about the relationship between the psychological and physical health of the youth. Besides, the preventions and recommendations were significant to cope with the issue, which is important for my learning.

The article is important for the students to get the basic knowledge about the beneficial impact of physical activities on physical and psychological health. The concept of physical literacy tells about physical competence, motivation, understanding, and confidence, which is crucial for the student both in academic and personal life. Children who face psychological issues and are unaware that it can get knowledge from the article. Depression is one of the leading causes that affect the health of people all around the world, but no one talks about it much due to unawareness. People do not understand how complex is depressive disorders. Therefore, students can acquire much information from the article about various psychological disorders and its consequences on the overall health of the individuals. In addition, readers and students can also learn about effective preventions like evidence-based activities and counseling to cope with the issue. This article is helpful for self-guidance.

This article is useful for my career path, which is physical therapy. In this field, a physical therapist encounters with numbers of patients who feel depressed, exhausted, and dishearten, which reduce their healing power. Children and especially youth, face various complexities due to the high pressure of academic performance and future goals, which ultimately affect their health. For my career, it is important to analyze the factors that affect the psychological and physical health of youth so that I can use effective prevention and methodology for enhancing their life quality. Therefore, the article is informative for my career path.

Work Cited

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Fortnum, Kathryn, et al. “The Physical Literacy of Children with Behavioural and Emotional Mental Health Disorders: A Scoping Review.” Mental Health and Physical Activity, vol. 15, Oct. 2018, pp. 95–131. DOI.org (Crossref), doi:10.1016/j.mhpa.2018.10.001.

Subject: Psychology

Pages: 2 Words: 600

Yoga In Special Education Classrooms

Yoga in Special Education classrooms

[Name of the Writer]

[Name of the Institution]

Yoga in Special Education classrooms

Introduction

There is a dramatic increase in the number of people who are diagnosed with autism spectrum disorders (ASD). It is estimated that one in 150 children are suffering from ASD and emotional and behavioral disorders (EBD). The emotional and behavior disorders in school-aged children show resistant to traditional special education approaches. Statistics from the World Health Organization show that the prevalence of these children with EBD in the United States is 12 to 13%. Disruptive behaviors are detrimental for children and young adults due to their serious personal, social, and educational implications. Breathing patterns are breathing rates linked to Anxiety Disorders. School-aged children are vulnerable to emotional and behavioral disorders along with autism spectrum disorders that can disrupt the breathing pattern and breathe rates in young adults. Yoga therapy is classified as a mind-body intervention, and it is often used as a corresponding tactic to boost the management of employees in the occupation. It is notable to mention that yoga has beneficial effects on mood, stress, anxiety, and physical and psychological well-being of a child and young adult. Here, the focus is to compare four pieces of literature to evaluate the effectiveness of yoga programs in school to combat autism spectrum disorders, emotional and behavior disorders, and anxiety disorders.

Literature Review

It is noteworthy to mention that early interventions are crucial to the anticipation of various behavioral issues in children during their educational career. Powell, Gilchrist, and Stapley comprehensively discuss the effectiveness of the features of massage, yoga, and relaxation for children. The outcomes of the specific techniques of massage, yoga, and relaxation applied to young children are critically assessed to assess its impact on different emotional and behavioral difficulties. The prospect of yoga utilized as a tool of intervention to help children in dealing with different behavioral problems. The paradigm of Self-discovery Program (SDP) was developed by the experts to assist children when it comes to different behavioral and emotional complications especially related to all the hazards of primary and senior education. The theoretical perspective of SDP explained by the researchers is a beneficial form of information to provide necessary guidance to children related to their academic careers. The approach of self-discovery is played a central role to utilize different perceptions of capabilities positively. The idea of SDP is utilized to encourage children concerning different forms of relaxation techniques. Provision of necessary training about simple exercises such as hand massage and deep breathing helps children to align themselves with the main model of SDP. It is noteworthy to mention that controlled experimental design is used by the researchers of this study to make better inferences about the positive role of massage, yoga, and other relaxation techniques for children.

The controlled phenomenon was determinant by allocating children either in the form of intervention or control group concerning the elements of age and class. This particular study was conducted in four primary schools in England. Consideration of the sample is one mandatory feature of the research work. One hundred twenty-six children with the approach of Special Educational Needs (SEN), emotional, behavioral, or learning complications are selected as the sample for this research work. Expert services of three holistic therapists were utilized to effectively and efficiently delivered the SDP. Useful features of Self-discovery program also explained by the researches that better help to determine the effectiveness of activities of massage, and relaxation for the betterment of children. All 12 sessions of this particular program associated with various necessary domains such as senses, feelings, and entire well-being of children. The results of this study better help to make inferences about the effectiveness of SDP on the physical, psychological, and emotional development of children. The feedback of children about SDP is satisfactory as prominent positive changes were observed in the children. An increasing form of self-control and concentration skills are some prominent outcomes of the practical domain of SDP. The model of SDP is directly linked with the positive changes in the behavioral facets of children.

Koeing, Buckley-Reen, and Garg emphasize the efficacy of occupational therapy by using yoga for mitigating autism spectrum disorders (ASD). They indicate a 600 percent increase in the last two decades in ASD as stated by the Centers for Disease Control and Prevention (CDC). Their research aimed to examine the effectiveness of Get Ready to Learn (DRTL) program which uses certain relaxation and breathing exercises along with yoga postures to combat the behavioral issues among children. Koeing, Buckley-Reen, and Garg proposed a hypothesis regarding the efficiency of yoga in school-aged children to reduce stress level. They used a pretest-posttest control group design to evaluate the effectiveness of Get Ready to Learn (DRTL) program on challenging behavior of children diagnosed with ASD. Four classes were recruited at start per condition for a total of 48 students suffering from ASD. They used the Aberrant Behavior Checklist (ABC)-Community for assessing the disruptive behaviors of children. The GRTL program was implemented by Koeing, Buckley-Reen, and Garg in the school for 16 weeks. They used breathing exercises, deep relaxation (yoga nidra), chanting (kirtan), and certain physical postures for approximately 15 to 20 minutes. There were no significant differences in both the control group and intervention group in terms of age, ethnicity, and VABS-II scores. They have concluded the effectiveness of yoga therapy, as children in the intervention group show relatively less irritable behavior and noncompliance. Their study also demonstrates that changes in the behavior of the intervention group with ASD can be detected with the help of a psychometrically valid instrument.

Naomi et al. performed a feasibility study to evaluate the effects of yoga in school-aged children with emotional and behavioral disorders (EBD). Children having EBD show symptoms of anxiety, depression, oppositional defiant disorder, and post-traumatic stress disorder. Naomi et al. identify the benefits of yoga training and exercise programs to enhance cardiac performance. Participants include the children of a 4th and 5th grade having age between 8 to 11. These participants are suffering from EBD including depression, hyperactivity, conduct disorder, anxiety, aggression, and attention difficulties. One hour session was given to these participants which include relaxation training, breathing techniques, yoga exercises, and postures, and imagery techniques and medications. Naomi et al. used “Behavior Assessment Scale for Children, Second Edition Teacher Rating Scale-Child” to mark the behavior of children. Average attendance for the yoga session was 90 percent. Their results indicate an improvement in the adaptive behavior of children and attendance in class. Their study concluded that regular yoga session enhanced blood circulation and reduced depressive symptoms, internalizing symptoms, and behavioral symptoms. The results suggest that implementing yoga sessions in school is feasible. As the behavior of participants was demanding due to EBD which made difficulties for a feasibility study. Naomi et al. also concluded that traditional classroom behavioral management interventions are not feasible to adjust the emotional and behavioral disorders of children. They emphasize that yoga is beneficial for small groups as it is an innovative technique to mitigate the symptoms of EBD in school-aged children. Managing large groups of students for yoga session is difficult. The results also include the remarks of teachers upon the yoga project. Significantly reduced behavioral symptoms and improved focus in class are indicated through yoga results. Naomi et al. indicated that yoga enables children with certain impairments to get an understanding of their emotional state with the help of well-rehearsed and practical techniques. It is found to enhance the self-control and concentration among children as it promotes relaxation and self-awareness.

Jensen, Stevens, and Kenny evaluate the effectiveness of yoga nidra relaxation in controlling the respiratory patterns of children with disruptive behavior. This study examined the competency of yoga nidra in controlling the breathing pattern of children who showed comorbid conditions such as learning disorders and emotional disturbance. Disruptive behavior and anxiety disorders are associated with regulation of breathing patterns and breath rates. They included seven boys in the intervention group having age 10 to 15 years. Comparison data were collected from young adults having a mean age 15.2 years without disruptive behaviors. This program included 30 minutes session of yoga nidra practice. “Compumedic’s thoracic and abdominal Respiratory Inductive Plethysmography (RIP) and ‘‘Summit IP’’ software” was used to collect and analyze data. Variations in the patterns of breathing effort are displayed by using Polyman EDF + software which allows the researchers to examine visually breathing patterns. Jensen, Stevens, and Kenny hypothesized that yoga is beneficial to minimize the anxiety level of students and it will enhance the self-esteem levels along with improved classroom behavior. Results indicated by the STAIC and STAI show a significant reduction in the depression and anxiety level of children in the intervention group. General Linear Model was used to conduct the analysis. The regularity of both breath rate and amplitude made it easy to interpret the breath data for the comparison group. Pre-yoga nidra phase indicates irregular breathing rates, unequal inhalation, and exhalation lengths, and inconsistent amplitudes. Most of the participants show different durations of exhalation and inhalation. Jensen, Stevens, and Kenny demonstrate that participants have disruptive behavior show stabilizing rate and amplitude with relatively slow breath rate. They found that yoga nidra helps in consistent breathing patterns. They have concluded that yoga nidra expose students with high levels of aggressive behavior, to a relaxation experience. The participants were able to develop enhanced sensory awareness and were able to follow the instructions of a teacher through recognition of the somatic facet of the process of breathing. Jensen, Stevens, and Kenny's results indicate the predominance of abdominal breathing. In the pre-phase of yoga nidra, many participants having disruptive behavior showed irregular and chaotic breathing. Their results indicate a positive trend towards stabilized breath rate, breathing patterns, and regulated amplitude.

Compare and Contrast

According to Naomi et al. (2012), highly variable internalizing and externalizing symptoms are shown students with emotional and behavioral disorders. These symptoms include various psychiatric disorders such as depression, anxiety, oppositional defiant disorder, post-traumatic stress disorder, and conduct disorder. Naomi et al. proposed that disruptive behavior problems are associated with emotional and behavioral disorders (EBD) and decidedly associate with poor academic performance. Like Naomi et al., Koeing, Buckley-Reen, and Garg also suggest that children with autism spectrum disorders (ASD) present a unique challenge for classroom teacher due to their inability to effectively regulate their behavior in the classroom. In accordance with the findings of Naomi et al., Koeing, Buckley-Reen, and Garg emphasize that complex cognitive processes comprise at a very high level of emotional arousal or stress. They demonstrate that maintaining a calm, alert state is necessary in order to perform well in academic career.

Yoga therapy is effective to address the various behavioral issue of school-aged children as it uses yoga postures, meditation, breathing exercises, and guided imagery to combat these issues. The holistic purpose of yoga is to integrate mind, body, and spirit to improve physical and psychological well-being. According to Jensen, Stevens, and Kenny, stress is a basic factor in behavioral problems as it causes a neurochemical switch to the posterior and subcortical region from the pre-frontal cortex of the brain which increases pulmonary function. Due to this, there is a significant increase in the blood pressure and heart rate results in decreasing the respiration rate. In accordance with Koeing, Buckley-Reen, and Garg’s research, Jensen, Stevens, and Kenny also found that the fight response in children with disruptive behavior is more frequently activated as compared to children without disruptive disorders. Atypical respiratory patterns endure where stress levels persist results in the creation of psychopathological conditions.

Koeing, Buckley-Reen, and Garg concluded the effectiveness of yoga intervention with students as it significantly decreases the behaviors such as lethargy, hyperactivity, irritability, non-compliance, and social withdrawal. They suggest that occupational therapy with evidence-based yoga program must be adopted in schools due to their liability in improving behavior among children suffering from autism spectrum disorders. In accordance with Koeing, Buckley-Reen, and Garg, the results of Naomi et al. also justify the effectiveness of yoga to reduce the negative consequences of emotional and behavioral disorders. They concluded that relaxation training, breathing techniques, yoga exercises, and postures are beneficial to improve the adaptive behavior of children. Their results demonstrate the efficacy of a yoga session to enhance blood circulation and reduce depressive symptoms. Naomi et al. found that yoga exercises are effective in promoting relaxation, self-control, self-awareness, and concentration among children. In accordance with Naomi et al. the results of Koeing, Buckley-Reen, and Garg also indicate the efficiency of yoga in school-aged children to reduce the stress level. According to the results of Koeing, Buckley-Reen, and Garg, yoga therapy decreases the irritable behavior and non-compliance in children with autism spectrum disorders. They also conclude the usefulness of relaxation exercises to enhance positive behavior. Powell, Gilchrist, and Stapley exclusively highlight the effectiveness of yoga and massage in school-aged children. They emphasize the usefulness of yoga to help children dealing with different behavioral problems. Their results indicate the effectiveness of SDP on the physical and psychological development of children.

Given the preceding procedural differences, it is hard to evaluate the reliability of the results. Jensen, Stevens, and Kenny used only 7 participants and concluded their results about the observations they had seen in them. It is notable to mention that the small size of the group is not liable to cover the overall group of school-aged children who are suffering from disruptive behaviors. Unlike Jensen, Stevens, and Kenny, the research conducted by Naomi et al. involves 160 students who give a liable result. Unlike Jensen et al., the results of Naomi et al., Koenig et al., and Powell et al. can be ambiguous as no significant results were found through parents' response that indicates the behavioral perspective.

Conclusion

In a nutshell, yoga exercises and postures are effective in reducing disruptive behavior in school-aged children who are suffering from emotional and behavioral disorders. Yoga intervention shows a significant reduction in behaviors such as hyperactivity, social withdrawal, irritability, lethargy, and noncompliance. The results from various studies indicate the need for large, randomized yoga inventions in schools to mitigate the risk of behavioral problems. Occupational therapists need to introduce yoga program in various school as it is a valuable option to improve the behavior of children. SDP program is effective to help children regulate their behavior by finding their inner sanctum of stillness. The results concluded the reliability of yoga session and exercise with children to minimize the behavioral issues.

Subject: Psychology

Pages: 8 Words: 2400

You Choose Title

[Name of the Writer]

[Name of Instructor]

[Subject]

[Date]

Science

Essay one

"Science" doubtlessly collects a wide degree of pictures: a fat investigating material, white sterile coats and upgrading purpose of intermingling, a cosmologist peering through a telescope, a naturalist in the rainforest, Einstein's conditions scribbled on a synthesis board, the dispatch of the space transport, frothing assessing utensils (Stenmrk, n,p).

Science is both an assortment of data and a strategy. In school, science may have the touch of the time show up, obviously, to be an aggregate of disengaged and static facts listed in a course book, yet that is only a dab of the story.

Science is empowering. Science is a method for finding what's known to man and how those things work today, how they worked in advance, and how they are obviously going to work later on.

Science is immense. The learning made by science is mind-blowing and strong and can be used for different upgrades.

Science is advancing. Science is constantly refining and framing our understanding into the universe, and as it does, it prompts new interest for future examination.

Science is a general human endeavor. People wherever all through the world take energy amidst the time spent science (Stenmrk, n,p).

Psychological Approaches and Science

The examination has amazing sensible power and impression of lead, regardless is has been reproached for on an essential dimension portraying conduct after the event, not envisioning what will happen early and of being unfalsifiable. Some have struggled that examination has pushed toward the status to a more obvious degree a religion than a science, regardless it isn't the standard alone in being condemned for unfalsifiable and like theories that are difficult to wreck, the probability exists that it is as a general rule right (Ducan, n.p).

It is also stated that the psychoanalytic hypothesis can be confined to testable theories and endeavored deductively. For example, it is thought that orally penniless men would slant toward progressively clear chests, a positive relationship, yet when in doubt found the turn, a negative affiliation. Regardless, Freudian speculation could be used to illuminate this finding through reaction improvement, the subject demonstrating appropriately the retrogressive of their missing inspirations! Kline has everything considered pointed out that hypothesis would have been devastated by no colossal affiliation (Ducan, n.p). Behaviourism has tight-fisted (for instance keen/cost cutting) speculations of getting, using a couple of fundamental models (fortress, direct decoration, theory, etc.) to clear up a tremendous outline of lead from language procuring to moral improvement.

Essay 2

The senses enable people to learn, to promise themselves, to recognize on the planet. Would someone have the ability to envision what it may take after to proceed with a nearness with no of the senses? The senses when in doubt work together to give people an unquestionable image of the things around them. On the off chance that one sense isn't working in perspective on difficulty or illness, by then unprecedented senses will acknowledge control or end up more ground to compensate for the missing sense.

The five senses are taste, discover, contact, smell, and hearing. The most flabbergasting senses are given underneath.

Taste

The 'taste' experience is very hiding away of different senses. Different right currently infers this as an 'organoleptic,' 'multi-detached,' or 'synesthetic' experience. For quite a while, language required sufficient descriptors to do the relationship esteem, paying little appreciation to how this musing was considered by the two driving forces and experts (Obrist et al., n.p). Right when neuropsychologists talk about synesthesia, they are typically intimating an excellent and complex neurodevelopmental condition where, for instance, somebody sees sounds or letters as tints. Those in the sustenance get some information about field have co-picked this definition to expect to a progressively important degree a general multi-isolated inclusion, where the acceptance of one sense causes an affirmation in a substitute sense (Obrist et al., n.p). Maybe 'generous trade-off' or 'multi-separated observation' are better terms.

Smell

Smell is unquestionably one of the greater players in the organoleptic experience, yet it isn't the only a solitary! We can smell things by methods for two pathways, one is through the nostrils (orthonasally), and the other is up through the throat (retronasal) (Barwich, pp. 27-33). Regardless, there is no genuine method to stop the mouth from the nose, and along these lines when we talk about 'taste,' we are really examining the synesthesia of in any occasion smell and taste. Imperatively, nonetheless, taste and smell are sent to the cerebrum through different pathways. They join in the orbitofrontal cortex (Barwich, pp. 27-33). Arranged in the front of the brain behind the eyes, this cortex is known to be the point of convergence of emotions and fundamental authority. Other than this synesthesia, we have been formed to 'taste' with the two resources through subsidiary acknowledging, which impacts most of our flavor experiences

Works Cited

Barwich, Ann-Sophie. "What is so special about smell? Olfaction as a model system in neurobiology." Postgraduate Medical Journal 92.1083 (2016): 27-33.

Obrist, Marianna, et al. "Touch, taste, & smell user interfaces: The future of multisensory HCI." Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 2016.

Pritchard, Duncan. What is this thing called knowledge?. Routledge, 2018.

Stenmark, Mikael. Scientism: Science, ethics and religion. Routledge, 2017.

Subject: Psychology

Pages: 2 Words: 600

You Choose Title

[Name of the Writer]

[Name of Instructor]

[Subject]

[Date]

The joy of Seeing and Hearing

Introduction

The ways, through which a human contact with the surroundings majorly depends on the five senses of hearing, seeing, tasting, smelling and touching. Hence these senses help in contact with the environment and the important organs involved are eyes, nose, ears, tongue, and hands. The processes are controlled by the human brain through the combination or neurons, actively transferring signals between these organs and brain. The impairment in any organ results in the inability to perform the specified task related to that sense's organ. The most important and enjoyable sense organs in my perception are eyes and ears. These two are essential for most of the life activities and functions to be performed accurately. This paper will explore the structural aspects through which the vitality of these organs will get clearer.

Discussion

Seeing

The sense of seeing or perceiving things through eyes is fundamental in all the major roles and decisions of life. It is also important to perceive the difference between the type of foods and their taste, such that yellow, red and orange fruits are considered sweet and ripened. The colors are differently seen through eyes due to retinal rods and cones in the eyes which adjust the movement according to the shape, size, color, and length of the object. Thus they are distinguished on the defined frequency and wavelength of each color (Wilson, p.453). Other than just looking at things and perceiving the image in the brain, the eyes are important for sleeping as well. The process of Rapid eye movement (REM) is related to the vivid dream stage of sleep, and the movement of eyes occurs most in this stage which helps in forming the dream (Horne, p.185). Sight is also important in searching for a partner, and a person is able to identify the attraction in fractions of a second of the opposite partner. Thus it helps in selecting the life partner and enjoys the colors of life with them

Hearing

The hearing is possible through a healthy ear, such that a human ear is able to perceive frequencies from 16 to 28,000 cycles/second (Matthew, np). It is through hearing that we can detect sound and its tone and frequency and respond to the environment according to what we heard. The speech is affected if there is a problem with hearing or a person who is unable to hear is also not able to speak. Thus it is essential for speech and communication (Prasad, p.620). The hearing loss is also related to memory loss issues, earlier deaths, and higher falling rate than the people with normal hearing (Liu, np). The isolation occurs due to hearing loss, as the people with hearing impairment are unable to communicate properly. Further taking away the joy of listening to melodious voices of birds chirping, musical instruments and singers, hence they are not able to enjoy music and soothe their moods. Therefore sounds are important in enjoying the life to its fullest, and they are perceivable through the human ear.

Conclusions

Concluding on the fact, all the senses are essential for carrying out daily tasks and enjoying life to the extremes, as without strong senses it is impossible to accomplish tasks with no difficulty. Although, the importance of all the senses is intact in their place the hearing and seeing is essential concerning all other senses. These two senses give strength and vigor to the other sense, for instance, it is important to look at the thing while touching it or tasting food. The hearing gives extra meaning to others senses, as while locating a potential threat the hearing aids with extra help by focusing on the sound of siren, footsteps or car approaching. Hence both are important in experiencing the joys and threats of life.

Works Cited

Horne, Jim. "REM Sleep: Food for Thought?." Sleeplessness. Palgrave Macmillan, Cham, 2016. 183-194.

Liu, Lijie, et al. "Noise-induced hearing loss impairs spatial learning/memory and hippocampal neurogenesis in mice." Scientific reports 6 (2016): 20374.

Matthen, Mohan. "The individuation of the senses." (2015).

Prasad, Ramjee. "Human bond communication." Wireless Personal Communications 87.3 (2016): 619-627.

Wilson, Brittany E. "Hearing the Word and Seeing the Light: Voice and Vision in Acts." Journal for the Study of the New Testament 38.4 (2016): 456-481.

Subject: Psychology

Pages: 2 Words: 600

| Abnormal Psychology |



Abnormal Psychology

[Name of the Writer]

[Name of the Institution]

Abnormal Psychology

Introduction

Almost at some stage in everyone's life, everyone encounters some mental disorders or abnormal behaviors, because everyone has a different definition of abnormal behavior. The abnormal behavior can be due to any reason, which in some conditions, makes tough for these behaviors to detect. They include depression, anxiety, Attention Deficit Hyperactivity Disorder (ADHD), Bipolar Disorder, Schizophrenia, etc. These abnormal behaviors sometimes lie in the context of the mental disorders which cannot be clearly identified. There are many methods through which they can be easily identified. This essay will highlight the basic methods and principles for the detection of those mental disorders and the difficulties clinicians face in detecting and identifying them. CITATION Col11 \l 1033 (Collins, 2011)

Discussion

Other than this, social communities influence play an important role in the identification of mental disorder. Because of the cultural influence, the identification of mental disorders can be very difficult. The consideration of the cultural values highly matters in the detection, because the abnormality in one's culture can be substantially normal in other cultures. For example, in India, it is normal for a six-year-old to marry a teenager of a minimum thirteen years and even bear a child. However, in the United States and European Unions, the applicability of the same case would be considered highly appalling and sufficiently abnormal. According to Lilienfeld (1995), the concept of identifying abnormal behaviors is fuzzy because of no limitations and boundaries in the context. There can be other additional hindrances in the identification which might be the perceiver's view on the concept of the normal behavior., societal and cultural perceptions as mentioned earlier and the situation during the moment of perception. CITATION But07 \l 1033 (Buthcer, 2007). Now, with a diverse approach that the majority of the society and different cultural aspects produce hurdles in the identification, we will specifically look at the disorders which are mostly considered by a number of cultures abnormal. Because every culture has a developed sense of normality and behavior as the child grows and develops. This essentially helps them in highlighting the social acceptance or unacceptance. The flaws in the behaviors are noticed when people from different cultures and perspectives come across at one place, and start discussing. The same example in the terms will be highlighted if we see that it is socially acceptable for a woman to have jobs, kids and their own places of living, which is not possible in a majority of areas in Asian communities like Pakistan and India communities.

With the evolvement in the technology and through other inventions and discoveries, peoples point of view is changing exponentially and expanding to new horizons and including a

diverse recognization among a population.

Conclusions

A load of problems is increasing in the lives of the generation of today, either at a young community level or an older community level. This is because as the new inventions, discoveries and methods for the benefits are kicking in, problems are coming into the lives of the communities too. This cause behavioral changes which can erupt the space between the mind to create mental problems and disorders like depression, anxiety, schizophrenia, attention deficit hyperactivity disorder, etc. There is a strong need of identification to cure them, which can subtly be used to regulate the problem and suppress it among the caused. There are multiple problems which are being faced by multiple cultures in their identification, which are known to be the main cause of the problem, peaking challenges in the identification of them. These challenges include the cultural and societal norms differentiation among the two. This means that what may seem abnormal to one cultural society can be totally pretty normal and healthy to the other one.

References

Subject: Psychology

Pages: 2 Words: 600

Free Essays About Blog
info@freeessaywriter.net

If you have any queries please write to us

Invalid Email Address!
Thank you for joining our mailing list

Please note that some of the content on our website is generated using AI and it is thoroughly reviewed and verified by our team of experienced editors. The essays and papers we provide are intended for learning purposes only and should not be submitted as original work.