Cognitive-Affective Processing System Analysis of Intra-Individual Dynamics in Collaborative Therapeutic Assessment: Translating Basic Theory and Research Into Clinical Applications

2013 ◽  
Vol 81 (6) ◽  
pp. 554-568 ◽  
Author(s):  
Yuichi Shoda ◽  
Nicole L. Wilson ◽  
Jessica Chen ◽  
Amanda K. Gilmore ◽  
Ronald E. Smith
2010 ◽  
Vol 53 (3) ◽  
pp. 563-581 ◽  
Author(s):  
Rodolfo Mendoza-Denton ◽  
Ozlem N. Ayduk ◽  
Yuichi Shoda ◽  
Walter Mischel

2021 ◽  
Author(s):  
Vivian Zayas ◽  
Randy T. Lee ◽  
Yuichi Shoda

People’s behavior is characterized by stable if…then… profiles, or if in x situation then behavior a, but if in y situation then behavior b. But how do researchers conceptualize and measure if…then… profiles? Drawing from Cognitive-Affective Processing System (CAPS) theory, we discuss recent developments in assessing if…then… profiles, and how such profiles can provide a window for elucidating key aspects of the underlying personality system. Specifically, the Highly-Repeated Within-Person (HRWP) approach assesses how a behavior varies as a function of key features in a situation, and operationalizes if…then… profiles as regression betas. We illustrate how the HRWP approach can be applied to data from often-used social cognitive tasks, wherein an individual is exposed to a large number of situations that differ on a dimension that has been experimentally-manipulated by the researcher, and their behaviors to the situations are tracked. The HRWP approach allows researchers to more precisely assess a given individual’s if…then… pattern, make stronger causal inferences about a given individual’s personality system, and empirically investigate, rather than simply assume, if there are meaningful differences between individuals in the causal processes.


2020 ◽  
Vol 19 (2) ◽  
pp. 383-411
Author(s):  
Ilya Livshitz

The analysis of well-known methods for ensuring IT-security is presented, methods for evaluating security of IT-components and Cloud services in general are considered. An attempt to analyze cloud services not from a commercial position of a popular marketing product, but from a position of system analysis is made. The previously introduced procedure for IT-components evaluation is not stable, since the end user has not a 100% guarantee of access to all IT-components, and even more so to the remote and uncontrolled Cloud service. A number of reviews point at increased efforts to create a secure network architecture and ability to continuously monitor deviations from established business goals. In contrast to the Zero Trust and Zero Trust eXtended models, according to which additional security functions are superimposed on existing IT-components, it is proposed to consider the set of IT-components as a new entity – an Information Processing System. This will allow to move to formal processes for assessing the degree of compliance with the criteria of standards for both existing and prospective IT-components while ensuring security of Cloud services. A new method for evaluation which is based on the previously developed hybrid methodology using formal procedures based on two systems of criteria - assessment of the degree of compliance of Management systems (based on ISO/IEC 27001 series) and assessment of functional safety requirements (based on IEC 61508 series and ISO/IEC 15408 series) is proposed. This method provides reproducible and objective assessments of security risks of Cloud-based IT‑components that can be presented to an independent group of evaluators for verification. The results obtained can be applied in the independent assessment, including critical information infrastructure objects.


2021 ◽  
Vol 9 (5) ◽  
pp. 01-07
Author(s):  
Wioletta Karina Ozga

Personality is a cognitive-affective processing system, which, according to the socio-cognitive theory, creates four dimensions. They are reflected in the skills, beliefs, standards and goals of the individual, which are consistent and consistent patterns of behaviour. Self-efficacy judgments and self-patterns determine the choice of goals and persistence in achieving them. On the other hand, the emotions preceding and accompanying the achievement of goals affect coping with stress and problems. The review of the clinical and therapeutic applications of this theory included stress inoculation training, REBT rational emotive therapy, Beck's cognitive depression therapy, schema therapy and modelling methods. The great advantage of this theory is the possibility of verifying its theoretical assumptions and confirming their huge amount of research. Besides, it has a practical application as many types of cognitive-behavioural therapies have been developed on its basis.


Sign in / Sign up

Export Citation Format

Share Document