Free Essay

Personally Refections

In:

Submitted By jc2684
Words 756
Pages 4
Personality Refection
Julia Carter
PSY/250
January 4, 2012
Dr. Helen Ordinde

Personality Refection When we think of personality, what are we actually thinking about? In 1811 attached twins were born, joined at the waist they were said to have gotten along very well. Although these men were joined at the waist, they could feel one another's feelings. Chang and Eng had a great deal in common, gene and environment. They eventually develop a unique personality, as do other conjoined twin (Smith 1988). Here we will define personalities. How personality features defines one. We will describe how key concept or “construct’ are used to explain personality. We will look into the writers’ personality features, and how it changes according to the situations. Here we would exam result, if any of the writers’ personality test and find out their reactions to such test. Lastly, what would their expectation of a proper test be and what would make a personality test a reliable and valid?
How would you define personality? Personality makeup the characteristic patterns of those thoughts, feelings, behaviors that make a person unique. In addition to this, personalities arise from within the individual and remain fairly consistent throughout life (Kendra Cherry). “We know that personality has eight key concepts, which together help us understand the complex nature of the individual. First, the individual is affected by unconscious aspects, forces that are not in the moment to moment awareness. Secondly, the individual is affected by so-called ego forces that provide a sense of identity or “self”. Third, a person is a biological being, with a unique genetic, physical, psychological, and temperamental nature. Fourth, people are conditioned and shaped by the experience and environment that surrounds them. Fifth, people have a cognitive dimension, thinking about and actively interpreting the world around them. Sixth, an individual is a collection of specific traits, skills, and predisposition. Seventh, human beings have a spiritual dimension to their lives, which ennobles them and promotes them to ponder the meaning of their existence. Eight , and finally, the individual’ nature is an ongoing interaction between the person and the particular environment” (Howard S Friedman and Miriam W. Schustack, 2009).
What key concepts are “constructs “are used to explain your personality?
Are your personality features consistent or do they change according to the situation? Over recent years the writer has observed their personality features. The writer personality changes according to their situation. Although upbeat, the personality change occurs to the situation there involved in. For instance, if starting a new job the writer tends to appear shy and quiet. One adjusted to their environment, and feels comfortable they tend to express an extrovert personality.
Have you ever taken a personality test before? If so, what was your reaction to the analyst? If not, what would you expect a proper test to measure? The writer has taken a couple of test Myers-Briggs Test Indicators (MBTI). The one taken last year resulted that the writer was an ESFJ (extrovert. sensing, feeling, and judging). Last week the writers’ results were ISFJ (introvert, sensing, feeling, and judging). The test results from last year the writer agrees with totally. The test results from last week were inaccurate, due to their circumstance prior to the test. The writer has been caring for her husband for the last four months, only working and school with little socialize with friends and family.
What would make a personality test reliable and valid? “Validity basically refers to research that provides evidence that a test actually measure what is supposed to measure. Reliability is more of a measure of consistent. For instance if you took a tape measure and measured the length of your desk and found it with 60 feet long, you would expect it to be 60 feet again tomorrow. But if it measured only 56 inches when you measured it and the following day question what will you have to find out what went wrong with the measurements. A reliable measurement of a death linked would also have to be yield to the same measurement. If it is not we would say that the measurement is unreliable (Saterfiel and Associates, 2003). In summary, personality makes up the character patterns of one’s thought, feeling and behaviors that make a person unique. For instance the way you walk, talk, and interaction at home or society are all features of personality that defines you.

Reference What is personality by Kendra Cherry, about.com Guide www.employment-testing.com/ reliability.htm Saterfiel & Associates, 2003

Similar Documents

Free Essay

Ifsm201 Identity Theft

...“Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors). Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. This information can be maintained in either paper, electronic or other media.” In essence anything can be used to figure out who you are. Protecting your information comes from various sources either from the place...

Words: 925 - Pages: 4

Premium Essay

Service Request Sr-Kf-013

...information you are or were interested in? Online consumer behavior is being tracked all over the world-wide-web via cookies, Flash cookies, and “Web beacons” such as Omniture. Ad networks utilize information collected via various Javascripts and/or cookies to dynamically create content for users. One such Ad network called BlueKai actually allows its users to see a visual representation of the data being collected and shared about them. The amount and variety of data contained in user cookies alone is simply staggering! Many consumers today are beginning to wonder whether or not their privacy is at risk. With that in mind, proposing a system that tracks online shopping behavior introduces quite a few risks. Legal Concerns Where PII (Personally Identifiable Information) is concerned, so is the law. When handling behavioral data of any kind, it must be stored securely. If any PII is collected, certain disclaimers, agreements, opt-out opportunities, etc. must be in place in order to refrain from attracting legal attention. Cookies must be handled delicately as well, especially if they utilized to track users on our shopping platform. When a user deletes his or her cookies, that user should become a new user on our network. Holding onto a user’s cookies against his or her wishes can be pursued in a court of law, where we will certainly lose. To give a good example, one of the largest ad networks, Specificmedia, was sued back in 2010 for “re-creating” deleted cookies. Specificmedia...

Words: 1041 - Pages: 5

Free Essay

Aaaaaaaa

...What is PHI or PII? Excerpted from the UF Privacy Office’s General Awareness Training: |Personal Identification Information = Any name or number that may be used, alone or in conjunction with any other information, to | |identify a specific individual. | |“Any person who willfully and without authorization fraudulently uses … personal identification information without first obtaining| |that individual's consent, commits… a felony.” | |Personal Information = an individual's name, in combination with any of the following unencrypted data elements: Social security | |number; Driver's license or Florida ID Card numbers; account, credit card, or debit card numbers, in combination with any code or | |password that would permit access to an individual's financial account. | |“Any person who conducts business in this state and maintains computerized data in a system that includes personal information | |shall provide notice of any breach of the security of the system to any resident of this state whose unencrypted personal | |information was, or is reasonably believed to have been, acquired by an unauthorized person.” | | ...

Words: 301 - Pages: 2

Free Essay

Protective Identity Theft Measures

...Easy Measures for Increasing Identity Theft Protection Introduction Imagine getting ready to purchase a home. Your family has outgrown the house you are currently living in, and a bigger home would be a perfect fit for your family. Since you have owned your home for many years and made your payments on time (along with your other bills), you feel applying for a home loan will be easy. With banks offering lower interest rates and trying to obtain business from customers, now is the time (you feel) to apply for a home loan. You walk into the bank and meet with the local loan officer. After explaining your financial and work situation, the loan officer provides an interest rate and term on a home loan. You find the home loan favorable and wish to proceed with the home loan. The loan officer is happy to proceed and explains that a credit report will need to be pulled. You agree to have your credit report pulled, as you feel your credit score is in good shape. The loan officer pulls your credit report and you see a look of concern come across his face. The loan officer prints your credit report and proceeds to tell you that due to your high debt, failure to make payments, and low credit score; the bank cannot offer you a loan. You now have this look of horror on your face as you do not know how you have late payments, your debt is high, and your credit score is low. You ask to see your credit report. When you review the credit report, you realize these unpaid, high-balance...

Words: 3176 - Pages: 13

Free Essay

Information Technology Act Paper

...Information Technology Act Lizette Ortiz-Ortiz BIS/220 November 13, 2012 Professor Aníbal López-Torres Information Technology Act * Electronic Funds Transfer Act of 1978 * The Electronic Funds Transfer (EFT) Act was signed by Jimmy Carter on 1978. The purpose of the creation of this act was to protect peoples and institutions money on electronic transactions. This act is part of the Credit Card Consumers Act and the ETF was not considered this act was created. “The EFT Act contains important provisions concerting entry of consumers into the EFT system, delineation of rights of parties involved in EFT use, and establishment of liability for unlawful EFT use” (Fox, 1980, p. 212). The definition for EFT in the act is “a transfer of funds is initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer’s account. EFTs include, but are not limited to point-of-sale (POS) transfers; automated teller machine (ATM) transfers; direct deposits or withdrawals of funds; transfers initiated by telephone; and transfers resulting from debit card transactions, whether or not initiated through an electronic terminal” (Electronic Funds Transfer Act of 1978, Section 205.3(b)). By having EFT defined, clearly can demonstrate...

Words: 1012 - Pages: 5

Premium Essay

Bring Your Own Device

...Bring Your Own Devices Bring your own device (BYOD) is a key topic in today's professional organizations. There are several benefits for organizations that allow BYOD that reflect productivity within the workforce as well as employee/employer work experience. With these benefits also come substantial risks involved with allowing such devices within the confines of buildings. These risks might include information security concerns, operational security concerns, and overall networking security. These concerns arise throughout all organizations, especially government organizations and major corporate retailers in light of recent cyber-attacks. BYOD is a major security topic in today's social market. Benefits offered to organizations that allow BYOD can span many different areas in the workplace. Productivity can be enhanced by allowing employees to transport work to their home device in order to complete a time-sensitive task after close of business or while traveling. BYOD might also allow the employer to save on equipment costs such as an intricate telephony network by allowing employees to use personal cellular phones for business contacts. Personal storage devices might also allow the employer to save on network storage devices for certain departments within the organization. Employee work experience may also be enhanced by allowing employees to have a personal communication device that is included in many emergency contacts information such as child care, hospitals, and doctors'...

Words: 787 - Pages: 4

Free Essay

Protection Against Identity Theft

...Protection Against Identity Theft Identity theft is a crime that can easily ruin one’s life and cause extreme suffering and loss. Criminals have been using other people’s identity since the beginning of time to commit crimes, achieve financial gain, and for many other illegal purposes. Since the rise in the popularity of the Internet, identity theft has also been on the rise. “Approximately 15 million United States residents have their identities used fraudulently each year with financial losses totaling upwards of $50 billion.” (Douglas, 2012) By securing someone else’s personally identifiable information (PII), a criminal with enough knowledge about the Internet could illegally gain access to medical records, bank accounts, and many other aspects of the unknowing victim’s life. This is why protecting one’s personally identifiable information is paramount in avoiding identity theft. There are many methods criminals can use to acquire PII but there are many ways one can protect their information as well. It is easier to protect PII by practicing several simple habits rather than forfeiting time, effort, and potentially large sums of money after one’s identity has been compromised. The United States Department of Justice suggests several easy tips to help avoid becoming a victim of identity theft. Individuals should be stingy about releasing their PII to anyone they do not know or trust. (Identity Theft And Identity Fraud, 2014) It is common to receive phone calls...

Words: 1008 - Pages: 5

Free Essay

Personal Identifiable Information

...PII And Ethics Research Paper Jadrrih PII is an abbreviation that stands for Personal Identifiable Information as used in information security. This is information that can be used to identify, contact or locate a single person. Ethics are the standards set in place in order to distinguish right from wrong. As important as PII is in the modern information technology, it has its advantage, disadvantage and ethical issues. PII comes in handy in modern technology. The most commonly used information to identify individuals are ID and drivers numbers, social security numbers, vehicles registration number, date of birth, biometrics, facial recognition to name a few. If PII did not exist, it would be incredibly hard to narrow down and individual since many people share names. There are some advantages that tie in with PII when it comes to the purpose of distinguishing individual identity. Big corporations find PII important identifying their employees. For example most companies have employee ID which is unique from one employee to another. Government officials need to use PII to search and identify and distinguish individuals in their large data base. For example, all legal US residences have a social security number that identifies an individual. In forensic, PII is important to help track down and identify criminals. This identity can be obtained through facial recognition and finger prints resulting in a selective revelation of one’s identity...

Words: 765 - Pages: 4

Free Essay

Confidentiality in the Classroom

...confidential information is a 3-fold process – protecting the student’s records, protecting personally identifiable information from the student’s record and allowing parent’s access to their child’s information. There are federal and state laws that govern confidentiality and how schools can and cannot utilize that information as outlined under the Family Educational Rights and Privacy Act (FERPA). FERPA, a federal law, applies to educational agencies or institutions that receive federal funds and protects the privacy of student educational records and assures parents the right to access those records. FERPA also allows authorized educational personnel the right to access and review student records without prior parental consent and in situations where conduct “poses a significant risk to the safety or well-being of a student, other students, or other members of the school community” allows the district to release information from a discipline record without consent to employees who have a legitimate educational interest in a student’s behavior. In Confidentiality issues: parental rights each state’s board of education outlines how they will handle sensitive and confidential information regarding students, student’s personal information and student’s educational materials. Such information such as directory information, closed school board meetings when disclosing personally identifiable information regarding students under the age of 18, test security and state test...

Words: 1254 - Pages: 6

Free Essay

Child Internet Protection

...Children Protection Acts Claudette Irizarry BIS/220 December 3, 2012 Paula Billups Children Protection Acts Children in the twenty-first century are on the internet more than they are watching television. Information technology has had to advance itself to adjust with the new ethical issues that came along with child internet surfers. Privacy and protection acts protect children that use the internet. Two of these acts are the Children’s Internet Protection Act and the Children’s Online Privacy Protection Act. According to "Informationshield.com" (1998), The Children’s Online Privacy Protection Act (COPPA) “prohibits unfair or deceptive acts or practices in connection with the collection, use, or disclosure of personally identifiable information from and about children on the Internet.”(para. 1) COPPA is in place to ensure children are being protected because children are learning more and more about technology and using it on a day-to-day basis. They are using it in the classroom at school, at home, and on their cellular devices. There are predators that collect information from websites geared towards children thirteen and under and these individuals try to gain a child’s trust and friendship in order to harm them. These types of ethical issues made the Children’s Online Privacy Protection Act necessary. COPPA requires a parent to give consent for a child’s personal information to be collected or put to use for any reason. The companies that have websites...

Words: 513 - Pages: 3

Free Essay

Information Systems

...Chapter 7 FORBES.COM PRIVACY STATEMENT Revised and posted as of: July 17, 2013 Forbes.com is committed to safeguarding your privacy online. Please read the following statement to understand how your personal information will be treated as you make full use of the Forbes.com website and services. The Forbes.com website is owned and operated by Forbes.com LLC. Forbes has been awarded TRUSTe's Privacy Seal signifying that this privacy policy and practices have been reviewed by TRUSTe for compliance with TRUSTe's program requirements including transparency, accountability and choice regarding the collection and use of your personal information. TRUSTe's mission, as an independent third party, is to accelerate online trust among consumers and organizations globally through its leading privacy trustmark and innovative trust solutions. If you have questions or complaints regarding our privacy policy or practices, please contact us by email at privacy@forbes.com. If you are not satisfied with our response you can contact TRUSTe here. Forbes complies with the U.S. - E.U. Safe Harbor Framework and the U.S. - Swiss Safe Harbor Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal data from European Union member countries and Switzerland. Forbes has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement. To learn more about the...

Words: 4264 - Pages: 18

Free Essay

Security Threats

...Security Threats Vulnerability can be defined as “a security exposure that results from a product weakness that the product developer did not intend to introduce and should fix once it is discovered” (Microsoft TechNet, 2014). There are possibility that the two databases could have vulnerabilities such as a weakness in the technology, configuration or security policies. The vulnerabilities can lead to potential risks in the personnel records systems. Security risks can be described as actions that could cause loss or damage to computer hardware, software, data or information. Potential security risks to milPDS and Remedy are computer viruses, unauthorized access of systems, personal information theft, personally identifiable information (PII) being compromised or violated, and system failure. These vulnerabilities and security risks can result in serious issue to the center. As a center that has a main purpose of managing personal records, any compromise, whether it is information stolen or a database system losing information can be disastrous for many different reasons. After threats and vulnerabilities have been identified, an assessment should be processed to figure out how the threat and vulnerability affected the system(s). This will assist in determining what measures are needed to ensure the vulnerability is handled. There are policies, Air Force Instructions and procedures in place if threats and vulnerabilities have been detected. The Commander will...

Words: 474 - Pages: 2

Premium Essay

Social Media Policy

...Social Media Policy Social Media pertains to user-created audio, video, text or multimedia works that are shared in an electronic environment, such as Facebook, Twitter, email, personal blogs or instant messages. In as such, the policy of our company is that employees may use Social Media for their personal use while off the clock and in compliance with our company’s terms related to Social Media. Please note that conduct that is illegal or in direct violation of the company’s policy on Social Media will still be deemed a violation of policy or illegal if it occurs online. Employees are entitled to express their opinions and ideas, but have a responsibility not to violate the company’s policies or negatively reflect on the organization. When communicating online employees should never speak on behalf of the company or about the company without prior authorization from management or marketing, or hold a position that has been approved to speak on behalf of the company. The company reserves the right to restrict and monitor employee’s use of social media. The employee should remember to: Be respectful; Be authentic and always state your name; Be careful and protect your personal information; Be responsible and act with integrity. The employee should never disclose confidential information. The employee should never disclose patient information. The employee should never disclose personnel information. The employee should never disclose legal information. The employee should...

Words: 312 - Pages: 2

Premium Essay

Kudler Foods

...2010). Kudlers’ has in the past faced challenges of keeping product inventories. While increasing customer satisfaction, the Frequent Shopper Program will as well help fix the retail store’s inventory challenges. It will help track the consumer’s shopping trends, information which will then be used to update inventories thus help the Kudler’s in stocking more of the items that their customers want leading to customer satisfaction. Despite the benefits that come with the Frequent Shopper Program, the project has potential legal, ethical, and information security concerns. These must be addressed beforehand to ensure the success of the program. Legal Issues For Kudler’s Frequent Shopper System to succeed, it will need to maintain personally identifiable information (PII) database. The Frequent Shopper Cards should be registered with customer details. That is, the name, address, and telephone number and email address....

Words: 890 - Pages: 4

Premium Essay

Reading Report on Disturbing Behaviors

...Reading Report on Disturbing Behavior Presented to Professor P. Gillen For YOUT 301-D01 LUO By Dana Peebles L25945367 July 11, 2015   Introduction Throughout the years, disturbing behavior amongst teenagers and young adolescents has become increasingly intense. Despite the fact that many of these youth are looking for ways to express themselves and cope with the aspects of everyday life, they still strive for godly influences and role models within their lives. As Christians, and people of faith, it is our job to not only pray with these individuals, but to also guide them towards the Scriptures and give them examples as well as options when it comes to dealing with the consequences of these disturbing behaviors. In this reading report, it is my desire to share with you a brief summary of Lee Vukich and Steve Vandegriff’s book and their thoughts regarding this topic. In addition, I will give a personal response as to how this book and its entire contents caused me to reflect upon my life as a teen, and how I will respond to the youth of today because of it. With that being said, I pray that you enjoy this excerpt as much as I have delighted in the revelation that God has given me in the process. Summary In reading the book Disturbing Behavior: 53 Alarming Trends of Teens and How to Spot Them, Vukich and Vandegriff stress the importance of what it means to be informed and offer numerous suggestions as to how youth leaders, parents, and other...

Words: 1141 - Pages: 5