Human Security : : Some Reflections / / W.E. Blatz.
During his lifetime, W.E. Blatz was so much occupied with the development of the University of Toronto’s Institute of Child Study that he was able to devote little time to writing. This is his first book to appear in twenty-one years, and his first complete exposition of his famous Theory of Securit...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter University of Toronto Press eBook-Package Archive 1933-1999 |
---|---|
VerfasserIn: | |
MitwirkendeR: | |
Place / Publishing House: | Toronto : : University of Toronto Press, , [2016] ©1966 |
Year of Publication: | 2016 |
Language: | English |
Series: | Heritage
|
Online Access: | |
Physical Description: | 1 online resource (148 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781442632134 |
---|---|
ctrlnum |
(DE-B1597)465779 (OCoLC)944178848 |
collection |
bib_alma |
record_format |
marc |
spelling |
Blatz, W.E., author. aut http://id.loc.gov/vocabulary/relators/aut Human Security : Some Reflections / W.E. Blatz. Toronto : University of Toronto Press, [2016] ©1966 1 online resource (148 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Heritage Frontmatter -- Foreword -- Preface -- Contents -- 1. Introduction -- 2. Consciousness -- 3. Consequences -- 4. Immature Dependent Security -- 5. Insecurity -- 6. Emancipation and Regression -- 7. Independent Security -- 8. Mature Dependent Security -- 9. Deputy Agents -- 10. Decisions -- 11. The Scope of the Security Theory -- Postscript -- Backmatter restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star During his lifetime, W.E. Blatz was so much occupied with the development of the University of Toronto’s Institute of Child Study that he was able to devote little time to writing. This is his first book to appear in twenty-one years, and his first complete exposition of his famous Theory of Security.The Theory of Security is radically different from the theories promulgated by Freudian psychologists. Whereas Freudian personality theory is based on the notion of “unconscious,” an entity that is only indirectly observable, the Theory of Security derives from the observation of the conscious state in all its manifestations. Dr. Blatz thus makes use of both empirical observations and the results of introspection, and, as might be expected, some of his conclusions run counter to those reached in much current psychological discussion. But proof of the forcible influence of the theory and its author may be found in the impressive number of books and articles already published by Dr. Blatz’s associates at the Institute of Child Study, applying the theory to the practical problems of psychological observation and therapy. It is fitting that the man whose work has generated so much fruitful research by others in this field should at last have set down in book form the fundamental principles that guided them. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) Security (Psychology). PSYCHOLOGY / Developmental / Child. bisacsh Northway, Mary L., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Williams, D. C., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Title is part of eBook package: De Gruyter University of Toronto Press eBook-Package Archive 1933-1999 9783110490947 https://doi.org/10.3138/9781442632134 https://www.degruyter.com/isbn/9781442632134 Cover https://www.degruyter.com/cover/covers/9781442632134.jpg |
language |
English |
format |
eBook |
author |
Blatz, W.E., Blatz, W.E., |
spellingShingle |
Blatz, W.E., Blatz, W.E., Human Security : Some Reflections / Heritage Frontmatter -- Foreword -- Preface -- Contents -- 1. Introduction -- 2. Consciousness -- 3. Consequences -- 4. Immature Dependent Security -- 5. Insecurity -- 6. Emancipation and Regression -- 7. Independent Security -- 8. Mature Dependent Security -- 9. Deputy Agents -- 10. Decisions -- 11. The Scope of the Security Theory -- Postscript -- Backmatter |
author_facet |
Blatz, W.E., Blatz, W.E., Northway, Mary L., Northway, Mary L., Williams, D. C., Williams, D. C., |
author_variant |
w b wb w b wb |
author_role |
VerfasserIn VerfasserIn |
author2 |
Northway, Mary L., Northway, Mary L., Williams, D. C., Williams, D. C., |
author2_variant |
m l n ml mln m l n ml mln d c w dc dcw d c w dc dcw |
author2_role |
MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR |
author_sort |
Blatz, W.E., |
title |
Human Security : Some Reflections / |
title_sub |
Some Reflections / |
title_full |
Human Security : Some Reflections / W.E. Blatz. |
title_fullStr |
Human Security : Some Reflections / W.E. Blatz. |
title_full_unstemmed |
Human Security : Some Reflections / W.E. Blatz. |
title_auth |
Human Security : Some Reflections / |
title_alt |
Frontmatter -- Foreword -- Preface -- Contents -- 1. Introduction -- 2. Consciousness -- 3. Consequences -- 4. Immature Dependent Security -- 5. Insecurity -- 6. Emancipation and Regression -- 7. Independent Security -- 8. Mature Dependent Security -- 9. Deputy Agents -- 10. Decisions -- 11. The Scope of the Security Theory -- Postscript -- Backmatter |
title_new |
Human Security : |
title_sort |
human security : some reflections / |
series |
Heritage |
series2 |
Heritage |
publisher |
University of Toronto Press, |
publishDate |
2016 |
physical |
1 online resource (148 p.) |
contents |
Frontmatter -- Foreword -- Preface -- Contents -- 1. Introduction -- 2. Consciousness -- 3. Consequences -- 4. Immature Dependent Security -- 5. Insecurity -- 6. Emancipation and Regression -- 7. Independent Security -- 8. Mature Dependent Security -- 9. Deputy Agents -- 10. Decisions -- 11. The Scope of the Security Theory -- Postscript -- Backmatter |
isbn |
9781442632134 9783110490947 |
callnumber-first |
B - Philosophy, Psychology, Religion |
callnumber-subject |
BF - Psychology |
callnumber-label |
BF575 |
callnumber-sort |
BF 3575 S35 |
url |
https://doi.org/10.3138/9781442632134 https://www.degruyter.com/isbn/9781442632134 https://www.degruyter.com/cover/covers/9781442632134.jpg |
illustrated |
Not Illustrated |
dewey-hundreds |
100 - Philosophy & psychology |
dewey-tens |
150 - Psychology |
dewey-ones |
155 - Differential & developmental psychology |
dewey-full |
155.2 |
dewey-sort |
3155.2 |
dewey-raw |
155.2 |
dewey-search |
155.2 |
doi_str_mv |
10.3138/9781442632134 |
oclc_num |
944178848 |
work_keys_str_mv |
AT blatzwe humansecuritysomereflections AT northwaymaryl humansecuritysomereflections AT williamsdc humansecuritysomereflections |
status_str |
n |
ids_txt_mv |
(DE-B1597)465779 (OCoLC)944178848 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter University of Toronto Press eBook-Package Archive 1933-1999 |
is_hierarchy_title |
Human Security : Some Reflections / |
container_title |
Title is part of eBook package: De Gruyter University of Toronto Press eBook-Package Archive 1933-1999 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1770176786287558656 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04418nam a22007695i 4500</leader><controlfield tag="001">9781442632134</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20161966onc fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002232800</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1004868183</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1011468182</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013938946</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)999360737</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781442632134</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.3138/9781442632134</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)465779</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)944178848</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">onc</subfield><subfield code="c">CA-ON</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">BF575.S35</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">PSY004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">155.2</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Blatz, W.E., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Human Security :</subfield><subfield code="b">Some Reflections /</subfield><subfield code="c">W.E. Blatz.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Toronto : </subfield><subfield code="b">University of Toronto Press, </subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©1966</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (148 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Heritage</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Foreword -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">1. Introduction -- </subfield><subfield code="t">2. Consciousness -- </subfield><subfield code="t">3. Consequences -- </subfield><subfield code="t">4. Immature Dependent Security -- </subfield><subfield code="t">5. Insecurity -- </subfield><subfield code="t">6. Emancipation and Regression -- </subfield><subfield code="t">7. Independent Security -- </subfield><subfield code="t">8. Mature Dependent Security -- </subfield><subfield code="t">9. Deputy Agents -- </subfield><subfield code="t">10. Decisions -- </subfield><subfield code="t">11. The Scope of the Security Theory -- </subfield><subfield code="t">Postscript -- </subfield><subfield code="t">Backmatter</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">During his lifetime, W.E. Blatz was so much occupied with the development of the University of Toronto’s Institute of Child Study that he was able to devote little time to writing. This is his first book to appear in twenty-one years, and his first complete exposition of his famous Theory of Security.The Theory of Security is radically different from the theories promulgated by Freudian psychologists. Whereas Freudian personality theory is based on the notion of “unconscious,” an entity that is only indirectly observable, the Theory of Security derives from the observation of the conscious state in all its manifestations. Dr. Blatz thus makes use of both empirical observations and the results of introspection, and, as might be expected, some of his conclusions run counter to those reached in much current psychological discussion. But proof of the forcible influence of the theory and its author may be found in the impressive number of books and articles already published by Dr. Blatz’s associates at the Institute of Child Study, applying the theory to the practical problems of psychological observation and therapy. It is fitting that the man whose work has generated so much fruitful research by others in this field should at last have set down in book form the fundamental principles that guided them.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security (Psychology).</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">PSYCHOLOGY / Developmental / Child.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Northway, Mary L., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, D. C., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">University of Toronto Press eBook-Package Archive 1933-1999</subfield><subfield code="z">9783110490947</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.3138/9781442632134</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781442632134</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781442632134.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-049094-7 University of Toronto Press eBook-Package Archive 1933-1999</subfield><subfield code="c">1933</subfield><subfield code="d">1999</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |