1) I Call My OCD “Olivia”
We have been thinking about treatment for OCD in the context of free will and determinism in Year 2 this week. This piece from the BBC looks at cognitive approaches to both explaining and treating OCD. There is a section on ERP: Exposure And Response Prevention therapy. This uses some of the principles of systematic desensitisation.
2) Prison In Iceland
We will be looking at different sorts of observation in both Year 1 and Year 2 later in the year. Here is an extreme example of participant observation: spending a week as an inmate in an Icelandic jail.
3) Attachment Style
This article about attachment style appeared this week. Although it has been on our course for many years, it is an idea which does not get much coverage more broadly. We have used attachment style as an example in the free will and determinism debate. It is interesting here to look at the words used to describe the influence of attachment: “root cause”, “affect”, “programming”.
4) Public Health
We used a health campaign in Newcastle as an induction task in Year 1. This article looks at how successful such health campaigns are in promoting social change. This article explains the extent of deprivation in the north east.
5) Screen Time And Sleep
This article looks at some recent research which suggests that the effect of screen time on sleep in children and adolescents is modest. It is an example of research where small scale studies have yielded false positives. It is also an example of research where a focus on screen time has hidden the effect of other variables.
6) Theory Of Mind
Here is a piece of research which shows that even if they develop the ability to function normally, children diagnosed with autism continue to lack a Theory Of Mind. This suggests that a lack of Theory Of Mind is fundamental to the experience of autism.
Here is an interview with Robert Plomin on BBC HARDTalk. It is a fine interview, leaving some difficult questions unanswered. Plomin is keen on the idea that people should have genetic testing in order to find out what vulnerabilities they may have. This article from Kevin Mitchell does a superb job of explaining what the problems might be.