Free Essay

Personally Refections

In: Philosophy and Psychology

Submitted By jc2684
Words 756
Pages 4
Personality Refection
Julia Carter
PSY/250
January 4, 2012
Dr. Helen Ordinde

Personality Refection When we think of personality, what are we actually thinking about? In 1811 attached twins were born, joined at the waist they were said to have gotten along very well. Although these men were joined at the waist, they could feel one another's feelings. Chang and Eng had a great deal in common, gene and environment. They eventually develop a unique personality, as do other conjoined twin (Smith 1988). Here we will define personalities. How personality features defines one. We will describe how key concept or “construct’ are used to explain personality. We will look into the writers’ personality features, and how it changes according to the situations. Here we would exam result, if any of the writers’ personality test and find out their reactions to such test. Lastly, what would their expectation of a proper test be and what would make a personality test a reliable and valid?
How would you define personality? Personality makeup the characteristic patterns of those thoughts, feelings, behaviors that make a person unique. In addition to this, personalities arise from within the individual and remain fairly consistent throughout life (Kendra Cherry). “We know that personality has eight key concepts, which together help us understand the complex nature of the individual. First, the individual is affected by unconscious aspects, forces that are not in the moment to moment awareness. Secondly, the individual is affected by so-called ego forces that provide a sense of identity or “self”. Third, a person is a biological being, with a unique genetic, physical, psychological, and temperamental nature. Fourth, people are conditioned and shaped by the experience and environment that surrounds them. Fifth, people have a cognitive dimension, thinking about and actively interpreting the world around them. Sixth, an individual is a collection of specific traits, skills, and predisposition. Seventh, human beings have a spiritual dimension to their lives, which ennobles them and promotes them to ponder the meaning of their existence. Eight , and finally, the individual’ nature is an ongoing interaction between the person and the particular environment” (Howard S Friedman and Miriam W. Schustack, 2009).
What key concepts are “constructs “are used to explain your personality?
Are your personality features consistent or do they change according to the situation? Over recent years the writer has observed their personality features. The writer personality changes according to their situation. Although upbeat, the personality change occurs to the situation there involved in. For instance, if starting a new job the writer tends to appear shy and quiet. One adjusted to their environment, and feels comfortable they tend to express an extrovert personality.
Have you ever taken a personality test before? If so, what was your reaction to the analyst? If not, what would you expect a proper test to measure? The writer has taken a couple of test Myers-Briggs Test Indicators (MBTI). The one taken last year resulted that the writer was an ESFJ (extrovert. sensing, feeling, and judging). Last week the writers’ results were ISFJ (introvert, sensing, feeling, and judging). The test results from last year the writer agrees with totally. The test results from last week were inaccurate, due to their circumstance prior to the test. The writer has been caring for her husband for the last four months, only working and school with little socialize with friends and family.
What would make a personality test reliable and valid? “Validity basically refers to research that provides evidence that a test actually measure what is supposed to measure. Reliability is more of a measure of consistent. For instance if you took a tape measure and measured the length of your desk and found it with 60 feet long, you would expect it to be 60 feet again tomorrow. But if it measured only 56 inches when you measured it and the following day question what will you have to find out what went wrong with the measurements. A reliable measurement of a death linked would also have to be yield to the same measurement. If it is not we would say that the measurement is unreliable (Saterfiel and Associates, 2003). In summary, personality makes up the character patterns of one’s thought, feeling and behaviors that make a person unique. For instance the way you walk, talk, and interaction at home or society are all features of personality that defines you.

Reference What is personality by Kendra Cherry, about.com Guide www.employment-testing.com/ reliability.htm Saterfiel & Associates, 2003

Similar Documents

Free Essay

Ifsm201 Identity Theft

...“Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors). Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. This information can be maintained in either paper, electronic or other media.” In essence anything can be used to figure out who you are. Protecting your information comes from various sources either from the place...

Words: 925 - Pages: 4

Premium Essay

Service Request Sr-Kf-013

...information you are or were interested in? Online consumer behavior is being tracked all over the world-wide-web via cookies, Flash cookies, and “Web beacons” such as Omniture. Ad networks utilize information collected via various Javascripts and/or cookies to dynamically create content for users. One such Ad network called BlueKai actually allows its users to see a visual representation of the data being collected and shared about them. The amount and variety of data contained in user cookies alone is simply staggering! Many consumers today are beginning to wonder whether or not their privacy is at risk. With that in mind, proposing a system that tracks online shopping behavior introduces quite a few risks. Legal Concerns Where PII (Personally Identifiable Information) is concerned, so is the law. When handling behavioral data of any kind, it must be stored securely. If any PII is collected, certain disclaimers, agreements, opt-out opportunities, etc. must be in place in order to refrain from attracting legal attention. Cookies must be handled delicately as well, especially if they utilized to track users on our shopping platform. When a user deletes his or her cookies, that user should become a new user on our network. Holding onto a user’s cookies against his or her wishes can be pursued in a court of law, where we will certainly lose. To give a good example, one of the largest ad networks, Specificmedia, was sued back in 2010 for “re-creating” deleted cookies. Specificmedia...

Words: 1041 - Pages: 5

Free Essay

Aaaaaaaa

...What is PHI or PII? Excerpted from the UF Privacy Office’s General Awareness Training: |Personal Identification Information = Any name or number that may be used, alone or in conjunction with any other information, to | |identify a specific individual. | |“Any person who willfully and without authorization fraudulently uses … personal identification information without first obtaining| |that individual's consent, commits… a felony.” | |Personal Information = an individual's name, in combination with any of the following unencrypted data elements: Social security | |number; Driver's license or Florida ID Card numbers; account, credit card, or debit card numbers, in combination with any code or | |password that would permit access to an individual's financial account. | |“Any person who conducts business in this state and maintains computerized data in a system that includes personal information | |shall provide notice of any breach of the security of the system to any resident of this state whose unencrypted personal | |information was, or is reasonably believed to have been, acquired by an unauthorized person.” | | ...

Words: 301 - Pages: 2

Free Essay

Protective Identity Theft Measures

...Easy Measures for Increasing Identity Theft Protection Introduction Imagine getting ready to purchase a home. Your family has outgrown the house you are currently living in, and a bigger home would be a perfect fit for your family. Since you have owned your home for many years and made your payments on time (along with your other bills), you feel applying for a home loan will be easy. With banks offering lower interest rates and trying to obtain business from customers, now is the time (you feel) to apply for a home loan. You walk into the bank and meet with the local loan officer. After explaining your financial and work situation, the loan officer provides an interest rate and term on a home loan. You find the home loan favorable and wish to proceed with the home loan. The loan officer is happy to proceed and explains that a credit report will need to be pulled. You agree to have your credit report pulled, as you feel your credit score is in good shape. The loan officer pulls your credit report and you see a look of concern come across his face. The loan officer prints your credit report and proceeds to tell you that due to your high debt, failure to make payments, and low credit score; the bank cannot offer you a loan. You now have this look of horror on your face as you do not know how you have late payments, your debt is high, and your credit score is low. You ask to see your credit report. When you review the credit report, you realize these unpaid, high-balance...

Words: 3176 - Pages: 13

Free Essay

Information Technology Act Paper

...Information Technology Act Lizette Ortiz-Ortiz BIS/220 November 13, 2012 Professor Aníbal López-Torres Information Technology Act * Electronic Funds Transfer Act of 1978 * The Electronic Funds Transfer (EFT) Act was signed by Jimmy Carter on 1978. The purpose of the creation of this act was to protect peoples and institutions money on electronic transactions. This act is part of the Credit Card Consumers Act and the ETF was not considered this act was created. “The EFT Act contains important provisions concerting entry of consumers into the EFT system, delineation of rights of parties involved in EFT use, and establishment of liability for unlawful EFT use” (Fox, 1980, p. 212). The definition for EFT in the act is “a transfer of funds is initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer’s account. EFTs include, but are not limited to point-of-sale (POS) transfers; automated teller machine (ATM) transfers; direct deposits or withdrawals of funds; transfers initiated by telephone; and transfers resulting from debit card transactions, whether or not initiated through an electronic terminal” (Electronic Funds Transfer Act of 1978, Section 205.3(b)). By having EFT defined, clearly can demonstrate...

Words: 1012 - Pages: 5

Premium Essay

Bring Your Own Device

...Bring Your Own Devices Bring your own device (BYOD) is a key topic in today's professional organizations. There are several benefits for organizations that allow BYOD that reflect productivity within the workforce as well as employee/employer work experience. With these benefits also come substantial risks involved with allowing such devices within the confines of buildings. These risks might include information security concerns, operational security concerns, and overall networking security. These concerns arise throughout all organizations, especially government organizations and major corporate retailers in light of recent cyber-attacks. BYOD is a major security topic in today's social market. Benefits offered to organizations that allow BYOD can span many different areas in the workplace. Productivity can be enhanced by allowing employees to transport work to their home device in order to complete a time-sensitive task after close of business or while traveling. BYOD might also allow the employer to save on equipment costs such as an intricate telephony network by allowing employees to use personal cellular phones for business contacts. Personal storage devices might also allow the employer to save on network storage devices for certain departments within the organization. Employee work experience may also be enhanced by allowing employees to have a personal communication device that is included in many emergency contacts information such as child care, hospitals, and doctors'...

Words: 787 - Pages: 4

Free Essay

Protection Against Identity Theft

...Protection Against Identity Theft Identity theft is a crime that can easily ruin one’s life and cause extreme suffering and loss. Criminals have been using other people’s identity since the beginning of time to commit crimes, achieve financial gain, and for many other illegal purposes. Since the rise in the popularity of the Internet, identity theft has also been on the rise. “Approximately 15 million United States residents have their identities used fraudulently each year with financial losses totaling upwards of $50 billion.” (Douglas, 2012) By securing someone else’s personally identifiable information (PII), a criminal with enough knowledge about the Internet could illegally gain access to medical records, bank accounts, and many other aspects of the unknowing victim’s life. This is why protecting one’s personally identifiable information is paramount in avoiding identity theft. There are many methods criminals can use to acquire PII but there are many ways one can protect their information as well. It is easier to protect PII by practicing several simple habits rather than forfeiting time, effort, and potentially large sums of money after one’s identity has been compromised. The United States Department of Justice suggests several easy tips to help avoid becoming a victim of identity theft. Individuals should be stingy about releasing their PII to anyone they do not know or trust. (Identity Theft And Identity Fraud, 2014) It is common to receive phone calls...

Words: 1008 - Pages: 5

Premium Essay

Outsourcing Risk

...Outsourcing Risks of Information Technology 07 January 2013 CMGT 442 Pro's and Con's of Outsourcing Information Technology The cost of maintaining an informational technology department rises tremendously each year. The replacement of parts, the increase of service agreement, personnel raises, and new mandates from local and federal governments. By outsourcing some internal functions you immediately save money by managing services. Though there are a wealth of benefits to be gained through outsourcing only the services that you require there are inherent risks that accompany that given choice. If exploited any one risk can ruin all the benefits of outsourcing your internal company functions. We will explore any and all risks that may be inherented with outsourcing rolls such as data storage, payroll, human resources, sales order taking, and finally desktop and network support. The first important action before committing to outsourcing your data storage is to address a series of questions that are contained in a Records Management Risk Assessment checklist. These questions will remove assumptions and provide a better detailed course of action on how your data should be stored, what data will be stored, and address if any local or compliance laws may be in question. Company Compliance risks: 1. Can my data be stored outside my jurisdiction? 2. Is Audit Management sufficient enough in this instance...

Words: 1136 - Pages: 5

Free Essay

Identtity Theft

...Gary Fugitt NT 1110 Computer Structure and logic Unit 1 Assignment 1 Integrated circuit technology August 16, 2013 Identity theft happens. It's an unfortunate fact of modern life. But there are certain steps you can take to help keep your personal information from falling into the wrong hands. Every day, you do things to protect what's most important to you. And you know what? You do them almost automatically. Routine things like looking both ways before you cross, brushing your teeth, and buckling your seat belt. Another routine to get into is keeping tabs on your identity and personal information. Here are five easy ways you can do it. Read your credit card and bank statements carefully and often. Know your payment due dates. If a bill doesn't show up when you expect it, look into it. Read the statements from your health insurance plan. Make sure the claims paid match the care you got. Shred any documents with personal and financial information. Review each of your three credit reports at least once a year. It's easy, and it's free. And before you know it, protecting your personal information can be as routine as locking your doors at night. There are several steps you need to do if you think you are a victim of identity theft. You must contact your credit card companies and bank letting them know you suspect identity theft. Contact one of the three credit reporting companies and they will have to contact the other two. The ways identity...

Words: 385 - Pages: 2

Free Essay

Security

...Protect Your Information Personally identifiable information or PII defined by Department of Commerce as “Information which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc. (OMB Memorandum M-07-16, Note 1). The definition of PII is very broad and makes no distinction between “sensitive” and “non-sensitive” PII. Terms not specifically defined within this Memorandum (e.g., sensitive) should be considered to reflect the definition found in a commonly accepted dictionary. (OMB Memorandum M-07-16, Note 7). Examples include direct references such as name, address, social security number, and e-mail address. It also includes any information that could be used to reference other data elements that are used for identification, such as gender, race, and date of birth.” This has been around for a very long time, it can cover many topics for example employee monitoring, information privacy, (the biggest) identity theft, etc. Every single topic mentioned go hand and hand in a general converstion of PII. I wonder from time to time where does my information go, who hands it in, are they responsible, how can I trust that anonymous person? These questions can go on forever and ever but, I can worry less about my information now...

Words: 978 - Pages: 4

Free Essay

Privacy

...Why We Collect Your Personal Information We collect personal data to administer the Railroad Retirement Act and Railroad Unemployment Insurance Act. We do not use the information for any other internal secondary purpose. You don't have to give us personal information to visit our website. If you do give us your personal information, we treat it very carefully. We collect personal information about You (e.g., name, e-mail address, Social Security number or other unique identifier) only if you specifically and knowingly give it to us. You should note, however, that when you send us an email, you automatically furnish us with your e-mail address even if you don't furnish any additional personal information. How We Will Use Your Personal Information We do not sell the information we collect at this site, or any information we collect. The personal information you give us at this site will be used only in connection with the administration of the Railroad Retirement Act and the Railroad Unemployment Insurance Act. If you use our web site to apply for benefits, the information that you give us on the application will be used in the same way as if you had furnished the information in person to our field office representatives or had completed an application and mailed it in to us. In both cases the uses of the information is subject to the provisions of the Privacy Act. The retention period will be the same. If, however, you send us an email, for example as to how we can improve...

Words: 448 - Pages: 2

Free Essay

Kudler

...KUDLER FINE FOODS KUDLER FINE FOODS Introduction Kudler Fine Foods is a known food store with top quality products from the finest baked goods, meats, produce and packaged foods. It’s located in the San Diego metropolitan area with currently three chain stores and in the pursuit of expanding in a much wider market. It is a top of the line food market with well knowledgeable and experienced employees, which contribute the best customer service for a pleasant experience. Frequent Shopper Program When a business chooses to expand and grow as much as possible, it doesn’t just come down to new locations, it starts in the sales and marketing department to take a step in inquiring new ways and systems to get the revenue increase. Revenue increases with much new clients, and continuing business with past or current clients. The sales and marketing team have developed a new system to keep those numbers rolling, and allow for the expansion of the business with its new frequent shopper program. The frequent shopper program is designed to maintain current relationship, and develop new clients. This program offers clients a point system that will allow the client to build its points by the frequent business they receive from Kudler Fine Foods. The clients that are currently great loyal clients whom constantly return for the business will now have more reason to keep looking forward to returning for that point. The program will also allow catching new clients attention...

Words: 917 - Pages: 4

Free Essay

Kiko

...Informative Speech On Identity Theft A. Today is the big day. You have been saving for several months for a down payment to purchase your new car. You go to the dealership, pick out the car and fill out all the required paperwork. You start daydreaming about driving off the lot when the finance manager comes in and says the one word you were not expecting, DENIED. You have no idea what is going on because you know you have perfect credit. After some time consuming effort, you realize you are a victim of identity theft. B. The purpose of my speech is to inform the audience about identity theft. C. Identity theft can happen to anyone in this room. Your roommate, friend or a total stranger can gain access to your personal information. If you ever plan on taking out a student loan, purchasing a car or home, you should listen carefully to this speech. D. I was almost a victim of identity theft. Several years ago someone stole my checkbook. The person who found it started writing checks from my account to purchase a few very expensive items at my expense. I had no idea this was happening until I went to the ATM to withdraw some money. I called my bank and found out that my account was $2000.00 overdrawn. Fortunately, I reported it the police in a timely manner and they were able to apprehend the person before more damage could be done. The police told me about identity theft and how lucky I was. After the incident I started doing research on identity...

Words: 1387 - Pages: 6

Free Essay

When Faced with Growth

...Understanding The Concept of Protecting Personal Information (PPI) IFSM 201 6381 Concepts and Applications of Information Technology (2158) University of Maryland University College Understanding The Concept of Protecting Personal Information (PPI). Personally Identifiable Information or PII is information that can be used to distinctively identify, contact, or locate an individual. PPI is sensitive information that is associated with a person. These information should be accessed only on a strict need-to-know basis and handled and stored with great care. Personally identifiable information is information that can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc., alone, or when combined with secondary personal or secondary identifying information that is linked or linkable to a specific individual, such as date and place of birth, mother's maiden name, etc. Most companies keep sensitive personal information in their hard copy files such as names, addresses, gender, social security numbers, credit card, or other account data that uniquely identifies customers or employees (Heller, 2001, p. 1). This information is often necessary to complete customers’ orders, meet payroll, or perform other important business functions. However, if sensitive information gets into the wrong people, there is every tendency that it can lead...

Words: 942 - Pages: 4

Free Essay

Ethics

...Is company should be held liable for identity theft due to the integrity of ethical responsibility Alejandrina Cleary BIS/221 May 18, 2015 Joseph Mills Is company should be held liable for identity theft due to the integrity of ethical responsibility Even though I believe that companies can protect their consumer, like Facebook can have a system in place for people information. So that people personal information is not a threat. The ethical in technology can be a gray area due to information can be targeted from anywhere. Because the risk of identity theft in the payment system. And Thru wireless connection your identity can be stolen, and cybercrime is higher now than before. Level One Heading The ethical in technology can be a gray area due to information can be targeted from anywhere. Like companies that are dealing in cash transactions are was a main target for identity theft on a large scale, especially now a days. So because they now this they should be more responsible when dealing with their consumer information. They need to create a security system that is able to protect them. For example when apple I-cloud got hack and people personal information and also private photograph and expose to the world. So apple had an ethical responsibilities to protect people information. Thru wireless connection your identity can be stolen, and cybercrime is higher now than before. Also with the help from the electronic market selling people personal...

Words: 529 - Pages: 3