Human Security : : Some Reflections / / W.E. Blatz.

During his lifetime, W.E. Blatz was so much occupied with the development of the University of Toronto’s Institute of Child Study that he was able to devote little time to writing. This is his first book to appear in twenty-one years, and his first complete exposition of his famous Theory of Securit...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter University of Toronto Press eBook-Package Archive 1933-1999
VerfasserIn:
MitwirkendeR:
Place / Publishing House:Toronto : : University of Toronto Press, , [2016]
©1966
Year of Publication:2016
Language:English
Series:Heritage
Online Access:
Physical Description:1 online resource (148 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781442632134
ctrlnum (DE-B1597)465779
(OCoLC)944178848
collection bib_alma
record_format marc
spelling Blatz, W.E., author. aut http://id.loc.gov/vocabulary/relators/aut
Human Security : Some Reflections / W.E. Blatz.
Toronto : University of Toronto Press, [2016]
©1966
1 online resource (148 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Heritage
Frontmatter -- Foreword -- Preface -- Contents -- 1. Introduction -- 2. Consciousness -- 3. Consequences -- 4. Immature Dependent Security -- 5. Insecurity -- 6. Emancipation and Regression -- 7. Independent Security -- 8. Mature Dependent Security -- 9. Deputy Agents -- 10. Decisions -- 11. The Scope of the Security Theory -- Postscript -- Backmatter
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
During his lifetime, W.E. Blatz was so much occupied with the development of the University of Toronto’s Institute of Child Study that he was able to devote little time to writing. This is his first book to appear in twenty-one years, and his first complete exposition of his famous Theory of Security.The Theory of Security is radically different from the theories promulgated by Freudian psychologists. Whereas Freudian personality theory is based on the notion of “unconscious,” an entity that is only indirectly observable, the Theory of Security derives from the observation of the conscious state in all its manifestations. Dr. Blatz thus makes use of both empirical observations and the results of introspection, and, as might be expected, some of his conclusions run counter to those reached in much current psychological discussion. But proof of the forcible influence of the theory and its author may be found in the impressive number of books and articles already published by Dr. Blatz’s associates at the Institute of Child Study, applying the theory to the practical problems of psychological observation and therapy. It is fitting that the man whose work has generated so much fruitful research by others in this field should at last have set down in book form the fundamental principles that guided them.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)
Security (Psychology).
PSYCHOLOGY / Developmental / Child. bisacsh
Northway, Mary L., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Williams, D. C., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Title is part of eBook package: De Gruyter University of Toronto Press eBook-Package Archive 1933-1999 9783110490947
https://doi.org/10.3138/9781442632134
https://www.degruyter.com/isbn/9781442632134
Cover https://www.degruyter.com/cover/covers/9781442632134.jpg
language English
format eBook
author Blatz, W.E.,
Blatz, W.E.,
spellingShingle Blatz, W.E.,
Blatz, W.E.,
Human Security : Some Reflections /
Heritage
Frontmatter --
Foreword --
Preface --
Contents --
1. Introduction --
2. Consciousness --
3. Consequences --
4. Immature Dependent Security --
5. Insecurity --
6. Emancipation and Regression --
7. Independent Security --
8. Mature Dependent Security --
9. Deputy Agents --
10. Decisions --
11. The Scope of the Security Theory --
Postscript --
Backmatter
author_facet Blatz, W.E.,
Blatz, W.E.,
Northway, Mary L.,
Northway, Mary L.,
Williams, D. C.,
Williams, D. C.,
author_variant w b wb
w b wb
author_role VerfasserIn
VerfasserIn
author2 Northway, Mary L.,
Northway, Mary L.,
Williams, D. C.,
Williams, D. C.,
author2_variant m l n ml mln
m l n ml mln
d c w dc dcw
d c w dc dcw
author2_role MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
author_sort Blatz, W.E.,
title Human Security : Some Reflections /
title_sub Some Reflections /
title_full Human Security : Some Reflections / W.E. Blatz.
title_fullStr Human Security : Some Reflections / W.E. Blatz.
title_full_unstemmed Human Security : Some Reflections / W.E. Blatz.
title_auth Human Security : Some Reflections /
title_alt Frontmatter --
Foreword --
Preface --
Contents --
1. Introduction --
2. Consciousness --
3. Consequences --
4. Immature Dependent Security --
5. Insecurity --
6. Emancipation and Regression --
7. Independent Security --
8. Mature Dependent Security --
9. Deputy Agents --
10. Decisions --
11. The Scope of the Security Theory --
Postscript --
Backmatter
title_new Human Security :
title_sort human security : some reflections /
series Heritage
series2 Heritage
publisher University of Toronto Press,
publishDate 2016
physical 1 online resource (148 p.)
contents Frontmatter --
Foreword --
Preface --
Contents --
1. Introduction --
2. Consciousness --
3. Consequences --
4. Immature Dependent Security --
5. Insecurity --
6. Emancipation and Regression --
7. Independent Security --
8. Mature Dependent Security --
9. Deputy Agents --
10. Decisions --
11. The Scope of the Security Theory --
Postscript --
Backmatter
isbn 9781442632134
9783110490947
callnumber-first B - Philosophy, Psychology, Religion
callnumber-subject BF - Psychology
callnumber-label BF575
callnumber-sort BF 3575 S35
url https://doi.org/10.3138/9781442632134
https://www.degruyter.com/isbn/9781442632134
https://www.degruyter.com/cover/covers/9781442632134.jpg
illustrated Not Illustrated
dewey-hundreds 100 - Philosophy & psychology
dewey-tens 150 - Psychology
dewey-ones 155 - Differential & developmental psychology
dewey-full 155.2
dewey-sort 3155.2
dewey-raw 155.2
dewey-search 155.2
doi_str_mv 10.3138/9781442632134
oclc_num 944178848
work_keys_str_mv AT blatzwe humansecuritysomereflections
AT northwaymaryl humansecuritysomereflections
AT williamsdc humansecuritysomereflections
status_str n
ids_txt_mv (DE-B1597)465779
(OCoLC)944178848
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter University of Toronto Press eBook-Package Archive 1933-1999
is_hierarchy_title Human Security : Some Reflections /
container_title Title is part of eBook package: De Gruyter University of Toronto Press eBook-Package Archive 1933-1999
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1770176786287558656
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04418nam a22007695i 4500</leader><controlfield tag="001">9781442632134</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20161966onc fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002232800</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1004868183</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1011468182</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013938946</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)999360737</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781442632134</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.3138/9781442632134</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)465779</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)944178848</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">onc</subfield><subfield code="c">CA-ON</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">BF575.S35</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">PSY004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">155.2</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Blatz, W.E., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Human Security :</subfield><subfield code="b">Some Reflections /</subfield><subfield code="c">W.E. Blatz.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Toronto : </subfield><subfield code="b">University of Toronto Press, </subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©1966</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (148 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Heritage</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Foreword -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">1. Introduction -- </subfield><subfield code="t">2. Consciousness -- </subfield><subfield code="t">3. Consequences -- </subfield><subfield code="t">4. Immature Dependent Security -- </subfield><subfield code="t">5. Insecurity -- </subfield><subfield code="t">6. Emancipation and Regression -- </subfield><subfield code="t">7. Independent Security -- </subfield><subfield code="t">8. Mature Dependent Security -- </subfield><subfield code="t">9. Deputy Agents -- </subfield><subfield code="t">10. Decisions -- </subfield><subfield code="t">11. The Scope of the Security Theory -- </subfield><subfield code="t">Postscript -- </subfield><subfield code="t">Backmatter</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">During his lifetime, W.E. Blatz was so much occupied with the development of the University of Toronto’s Institute of Child Study that he was able to devote little time to writing. This is his first book to appear in twenty-one years, and his first complete exposition of his famous Theory of Security.The Theory of Security is radically different from the theories promulgated by Freudian psychologists. Whereas Freudian personality theory is based on the notion of “unconscious,” an entity that is only indirectly observable, the Theory of Security derives from the observation of the conscious state in all its manifestations. Dr. Blatz thus makes use of both empirical observations and the results of introspection, and, as might be expected, some of his conclusions run counter to those reached in much current psychological discussion. But proof of the forcible influence of the theory and its author may be found in the impressive number of books and articles already published by Dr. Blatz’s associates at the Institute of Child Study, applying the theory to the practical problems of psychological observation and therapy. It is fitting that the man whose work has generated so much fruitful research by others in this field should at last have set down in book form the fundamental principles that guided them.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security (Psychology).</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">PSYCHOLOGY / Developmental / Child.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Northway, Mary L., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, D. C., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">University of Toronto Press eBook-Package Archive 1933-1999</subfield><subfield code="z">9783110490947</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.3138/9781442632134</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781442632134</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781442632134.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-049094-7 University of Toronto Press eBook-Package Archive 1933-1999</subfield><subfield code="c">1933</subfield><subfield code="d">1999</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>