65,715 research outputs found

    Sensory imagery in craving: From cognitive psychology to new treatments for addiction

    Get PDF
    Sensory imagery is a powerful tool for inducing craving because it is a key component of the cognitive system that underpins human motivation. The role of sensory imagery in motivation is explained by Elaborated Intrusion (EI) theory. Imagery plays an important role in motivation because it conveys the emotional qualities of the desired event, mimicking anticipated pleasure or relief, and continual elaboration of the imagery ensures that the target stays in mind. We argue that craving is a conscious state, intervening between unconscious triggers and consumption, and summarise evidence that interfering with sensory imagery can weaken cravings. We argue that treatments for addiction can be enhanced by the application of EI theory to maintain motivation, and assist in the management of craving in high-risk situations

    Interactive design activism

    Get PDF

    Utilising semantic technologies for decision support in dementia care

    Get PDF
    The main objective of this work is to discuss our experience in utilising semantic technologies for building decision support in Dementia care systems that are based on the non-intrusive on the non-intrusive monitoring of the patient’s behaviour. Our approach adopts context-aware modelling of the patient’s condition to facilitate the analysis of the patient’s behaviour within the inhabited environment (movement and room occupancy patterns, use of equipment, etc.) with reference to the semantic knowledge about the patient’s condition (history of present of illness, dependable behaviour patterns, etc.). The reported work especially focuses on the critical role of the semantic reasoning engine in inferring medical advice, and by means of practical experimentation and critical analysis suggests important findings related to the methodology of deploying the appropriate semantic rules systems, and the dynamics of the efficient utilisation of complex event processing technology in order to the meet the requirements of decision support for remote healthcare systems

    Context Aware Adaptable Applications - A global approach

    Get PDF
    Actual applications (mostly component based) requirements cannot be expressed without a ubiquitous and mobile part for end-users as well as for M2M applications (Machine to Machine). Such an evolution implies context management in order to evaluate the consequences of the mobility and corresponding mechanisms to adapt or to be adapted to the new environment. Applications are then qualified as context aware applications. This first part of this paper presents an overview of context and its management by application adaptation. This part starts by a definition and proposes a model for the context. It also presents various techniques to adapt applications to the context: from self-adaptation to supervised approached. The second part is an overview of architectures for adaptable applications. It focuses on platforms based solutions and shows information flows between application, platform and context. Finally it makes a synthesis proposition with a platform for adaptable context-aware applications called Kalimucho. Then we present implementations tools for software components and a dataflow models in order to implement the Kalimucho platform

    Working Report #3: Use of Legal Measures and Formal Authority (Service Provider Perspectives)

    Get PDF
    The focus of this report is, across service delivery models, how front-line protection workers viewed their formal authority role and the extent to which they relied on legal measures in order to achieve protection goals. The analysis is guided by several overarching questions including (1) how does each model view the use of legal measures and formal authority? (2) How does each model impact service providers’ actual use of legal measures? (3) What value do workers place on the authority figure role? And (4) how effective is the use of formal authority in reaching child protection goals? Type of program model and setting can impact the use of legal measures in a number of ways including fundamental beliefs about the effectiveness of cooperative vs. legal measures, supervisory guidance, the presence or absence of legal apparatus, and the access, time and 4 support to seek creative alternatives to legal measures. Across all community based and school based models there seemed to be an expressed desire to avoid legal and authoritative measures and authoritarian approaches. Agency based sites did not have the same homogeneity and in some sites there was strong support for use of legal and authoritative measures. There also appeared to be a stronger identification with the authoritarian role in the discourse of workers. One cannot conclusively say that authoritative and legal approaches are more prevalent in one type of model than in another but one can surmise from the data that community based and school based programs are strongly in favour of alternatives to these measures

    Solving the Mystery of Intrusive Flashbacks in Posttraumatic Stress Disorder (Comment on Brewin 2014)

    Get PDF
    "This article may not exactly replicate the final version published in the APA journal. It is not the copy of record."In the light of current controversy about the nature of intrusions in posttraumatic stress disorder (PTSD), the review by Brewin (2014) is timely and important. It will undoubtedly stimulate further research and guide researchers' quests for understanding the nature of flashbacks in PTSD. In this commentary, I briefly summarize and discuss key points made by Brewin and elaborate on some of the reasons behind the controversy. For example, the terms involuntary autobiographical memories, intrusive memories, and flashbacks are often used interchangeably. I propose a taxonomy revealing the key differences across these forms of memory. If flashbacks are characteristic of patients with PTSD only, it is essential that more research targeting this population is conducted with a variety of methods. Finally, some new avenues for research to study intrusive memories and flashbacks in PTSD, using a diary method and modified trauma film paradigm, are described.Peer reviewedSubmitted Versio

    The Elaborated Intrusion Theory of Desire: A 10-year retrospective and implications for addiction treatments

    Get PDF
    Ten years after the publication of Elaborated Intrusion (EI) Theory, there is now substantial research into its key predictions. The distinction between intrusive thoughts, which are driven by automatic processes, and their elaboration, involving controlled processing, is well established. Desires for both addictive substances and other desired targets are typically marked by imagery, especially when they are intense. Attention training strategies such as body scanning reduce intrusive thoughts, while concurrent tasks that introduce competing sensory information interfere with elaboration, especially if they compete for the same limited-capacity working memory resources. EI Theory has spawned new assessment instruments that are performing strongly and offer the ability to more clearly delineate craving from correlated processes. It has also inspired new approaches to treatment. In particular, training people to use vivid sensory imagery for functional goals holds promise as an intervention for substance misuse, since it is likely to both sustain motivation and moderate craving

    Protecting Information Privacy

    Get PDF
    This report for the Equality and Human Rights Commission (the Commission) examines the threats to information privacy that have emerged in recent years, focusing on the activities of the state. It argues that current privacy laws and regulation do not adequately uphold human rights, and that fundamental reform is required. It identifies two principal areas of concern: the state’s handling of personal data, and the use of surveillance by public bodies. The central finding of this report is that the existing approach to the protection of information privacy in the UK is fundamentally flawed, and that there is a pressing need for widespread legislative reform in order to ensure that the rights contained in Article 8 are respected. The report argues for the establishment of a number of key ‘privacy principles’ that can be used to guide future legal reforms and the development of sector-specific regulation. The right to privacy is at risk of being eroded by the growing demand for information by government and the private sector. Unless we start to reform the law and build a regulatory system capable of protecting information privacy, we may soon find that it is a thing of the past

    Imaginary relish and exquisite torture: The elaborated intrusion theory of desire

    Get PDF
    The authors argue that human desire involves conscious cognition that has strong affective connotation and is potentially involved in the determination of appetitive behavior rather than being epiphenomenal to it. Intrusive thoughts about appetitive targets are triggered automatically by external or physiological cues and by cognitive associates. When intrusions elicit significant pleasure or relief, cognitive elaboration usually ensues. Elaboration competes with concurrent cognitive tasks through retrieval of target-related information and its retention in working memory. Sensory images are especially important products of intrusion and elaboration because they simulate the sensory and emotional qualities of target acquisition. Desire images are momentarily rewarding but amplify awareness of somatic and emotional deficits. Effects of desires on behavior are moderated by competing incentives, target availability, and skills. The theory provides a coherent account of existing data and suggests new directions for research and treatment
    corecore