65,715 research outputs found
Sensory imagery in craving: From cognitive psychology to new treatments for addiction
Sensory imagery is a powerful tool for inducing craving because it is a key component of the cognitive system that underpins human motivation. The role of sensory imagery in motivation is explained by Elaborated Intrusion (EI) theory. Imagery plays an important role in motivation because it conveys the emotional qualities of the desired event, mimicking anticipated pleasure or relief, and continual elaboration of the imagery ensures that the target stays in mind. We argue that craving is a conscious state, intervening between unconscious triggers and consumption, and summarise evidence that interfering with sensory imagery can weaken cravings. We argue that treatments for addiction can be enhanced by the application of EI theory to maintain motivation, and assist in the management of craving in high-risk situations
Utilising semantic technologies for decision support in dementia care
The main objective of this work is to discuss our experience in utilising semantic technologies for building decision support in Dementia care systems that are based on the non-intrusive on the non-intrusive monitoring of the patient’s behaviour. Our approach adopts context-aware modelling of the patient’s condition to facilitate the analysis of the patient’s behaviour within the inhabited environment (movement and room occupancy patterns, use of equipment, etc.) with reference to the semantic knowledge about the patient’s condition (history of present of illness, dependable behaviour patterns, etc.). The reported work especially focuses on the critical role of the semantic reasoning engine in inferring medical advice, and by means of practical experimentation and critical analysis suggests important findings related to the methodology of deploying the appropriate semantic rules systems, and the dynamics of the efficient utilisation of complex event processing technology in order to the meet the requirements of decision support for remote healthcare systems
Context Aware Adaptable Applications - A global approach
Actual applications (mostly component based) requirements cannot be expressed without a ubiquitous and mobile part for end-users as well as for M2M applications (Machine to Machine). Such an evolution implies context management in order to evaluate the consequences of the mobility and corresponding mechanisms to adapt or to be adapted to the new environment. Applications are then qualified as context aware applications. This first part of this paper presents an overview of context and its management by application adaptation. This part starts by a definition and proposes a model for the context. It also presents various techniques to adapt applications to the context: from self-adaptation to supervised approached. The second part is an overview of architectures for adaptable applications. It focuses on platforms based solutions and shows information flows between application, platform and context. Finally it makes a synthesis proposition with a platform for adaptable context-aware applications called Kalimucho. Then we present implementations tools for software components and a dataflow models in order to implement the Kalimucho platform
Working Report #3: Use of Legal Measures and Formal Authority (Service Provider Perspectives)
The focus of this report is, across service delivery models, how front-line protection workers viewed their formal authority role and the extent to which they relied on legal measures in order to achieve protection goals. The analysis is guided by several overarching questions including (1) how does each model view the use of legal measures and formal authority? (2) How does each model impact service providers’ actual use of legal measures? (3) What value do workers place on the authority figure role? And (4) how effective is the use of formal authority in reaching child protection goals?
Type of program model and setting can impact the use of legal measures in a number of ways including fundamental beliefs about the effectiveness of cooperative vs. legal measures, supervisory guidance, the presence or absence of legal apparatus, and the access, time and 4 support to seek creative alternatives to legal measures. Across all community based and school based models there seemed to be an expressed desire to avoid legal and authoritative measures and authoritarian approaches. Agency based sites did not have the same homogeneity and in some sites there was strong support for use of legal and authoritative measures. There also appeared to be a stronger identification with the authoritarian role in the discourse of workers. One cannot conclusively say that authoritative and legal approaches are more prevalent in one type of model than in another but one can surmise from the data that community based and school based programs are strongly in favour of alternatives to these measures
Recommended from our members
iSEA: IoT-based smartphone energy assistant for prompting energy-aware behaviors in commercial buildings
Providing personalized energy-use information to individual occupants enables the adoption of energy-aware behaviors in commercial buildings. However, the implementation of individualized feedback still remains challenging due to the difficulties in collecting personalized data, tracking personal behaviors, and delivering personalized tailored information to individual occupants. Nowadays, the Internet of Things (IoT) technologies are used in a variety of applications including real-time monitoring, control, and decision-making due to the flexibility of these technologies for fusing different data streams. In this paper, we propose a novel IoT-based smartphone energy assistant (iSEA) framework which prompts energy-aware behaviors in commercial buildings. iSEA tracks individual occupants through tracking their smartphones, uses a deep learning approach to identify their energy usage, and delivers personalized tailored feedback to impact their usage. iSEA particularly uses an energy-use efficiency index (EEI) to understand behaviors and categorize them into efficient and inefficient behaviors. The iSEA architecture includes four layers: physical, cloud, service, and communication. The results of implementing iSEA in a commercial building with ten occupants over a twelve-week duration demonstrate the validity of this approach in enhancing individualized energy-use behaviors. An average of 34% energy savings was measured by tracking occupants’ EEI by the end of the experimental period. In addition, the results demonstrate that commercial building occupants often ignore controlling over lighting systems at their departure events that leads to wasting energy during non-working hours. By utilizing the existing IoT devices in commercial buildings, iSEA significantly contributes to support research efforts into sensing and enhancing energy-aware behaviors at minimal costs
Solving the Mystery of Intrusive Flashbacks in Posttraumatic Stress Disorder (Comment on Brewin 2014)
"This article may not exactly replicate the final version published in the APA journal. It is not the copy of record."In the light of current controversy about the nature of intrusions in posttraumatic stress disorder (PTSD), the review by Brewin (2014) is timely and important. It will undoubtedly stimulate further research and guide researchers' quests for understanding the nature of flashbacks in PTSD. In this commentary, I briefly summarize and discuss key points made by Brewin and elaborate on some of the reasons behind the controversy. For example, the terms involuntary autobiographical memories, intrusive memories, and flashbacks are often used interchangeably. I propose a taxonomy revealing the key differences across these forms of memory. If flashbacks are characteristic of patients with PTSD only, it is essential that more research targeting this population is conducted with a variety of methods. Finally, some new avenues for research to study intrusive memories and flashbacks in PTSD, using a diary method and modified trauma film paradigm, are described.Peer reviewedSubmitted Versio
The Elaborated Intrusion Theory of Desire: A 10-year retrospective and implications for addiction treatments
Ten years after the publication of Elaborated Intrusion (EI) Theory, there is now substantial research into its key predictions. The distinction between intrusive thoughts, which are driven by automatic processes, and their elaboration, involving controlled processing, is well established. Desires for both addictive substances and other desired targets are typically marked by imagery, especially when they are intense. Attention training strategies such as body scanning reduce intrusive thoughts, while concurrent tasks that introduce competing sensory information interfere with elaboration, especially if they compete for the same limited-capacity working memory resources. EI Theory has spawned new assessment instruments that are performing strongly and offer the ability to more clearly delineate craving from correlated processes. It has also inspired new approaches to treatment. In particular, training people to use vivid sensory imagery for functional goals holds promise as an intervention for substance misuse, since it is likely to both sustain motivation and moderate craving
Protecting Information Privacy
This report for the Equality and Human Rights Commission (the Commission) examines the threats to information privacy that have emerged in recent years, focusing on the activities of the state. It argues that current privacy laws and regulation do not adequately uphold human rights, and that fundamental reform is required. It identifies two principal areas of concern: the state’s handling of personal data, and the use of surveillance by public bodies. The central finding of this report is that the existing approach to the protection of information privacy in the UK is fundamentally flawed, and that there is a pressing need for widespread legislative reform in order to ensure that the rights contained in Article 8 are respected. The report argues for the establishment of a number of key ‘privacy principles’ that can be used to guide future legal reforms and the development of sector-specific regulation. The right to privacy is at risk of being eroded by the growing demand for information by government and the private sector. Unless we start to reform the law and build a regulatory system capable of protecting information privacy, we may soon find that it is a thing of the past
Imaginary relish and exquisite torture: The elaborated intrusion theory of desire
The authors argue that human desire involves conscious cognition that has
strong affective connotation and is potentially involved in the determination
of appetitive behavior rather than being epiphenomenal to it. Intrusive
thoughts about appetitive targets are triggered automatically by external or
physiological cues and by cognitive associates. When intrusions elicit
significant pleasure or relief, cognitive elaboration usually ensues.
Elaboration competes with concurrent cognitive tasks through retrieval of
target-related information and its retention in working memory. Sensory
images are especially important products of intrusion and elaboration because
they simulate the sensory and emotional qualities of target acquisition. Desire
images are momentarily rewarding but amplify awareness of somatic and
emotional deficits. Effects of desires on behavior are moderated by competing
incentives, target availability, and skills. The theory provides a coherent
account of existing data and suggests new directions for research and
treatment
- …