Skip to main content

偏执型人格障碍

http://gengwg.blogspot.com/(1)偏执型人格障碍:ic personality),诡辩型人格(querulant personality)。这类人表现固执,敏感多疑,过分警觉,心胸狭隘,好嫉妒;自我评价过高,体验到自己过分重要,倾向推诿客观,拒绝接受批评,对挫折和失败过分敏感。如受到置疑则出现争论,诡辩,甚至冲动攻击和好斗;常有某些超价观念和不安全感,不愉快,缺乏幽默感;这类人经常处于戒备和紧张状态之中,寻找怀疑偏见的根据,对他人的中性或善意的动作,歪曲而采取敌意和藐视,对事态的前后关系缺乏正确评价;容易发生病理性嫉妒。易发生偏执狂或偏执型精神分裂症。归纳如下:
①敏感多疑,患者往往把别人无意的甚至可能是友好的行为表现,误解为怀有敌意或轻蔑,或者没有足够根据即猜疑别人伤害自己。
②有一种将周围事件解释为具有某种“阴谋”的不符合事实的先占观念。
③极端地自信、自负,自尊心很强。
④固执己见,常常认为只有自己是最正确的,听不得不同意见,不相信反面证据。
⑤记恨,对拒绝、侮辱、伤害不能宽容,久久耿耿于怀,并将挫折和失败的原因归咎于别人。
⑥个性很强,主观性强,工作能力强,好与人争辩,并固执地追求个人的利益或权利,不相信别人,很难以事实或说理来改变他们的认识或想法。
⑦易于产生病理嫉妒信念,过分怀疑配偶或恋人对己不忠,但不是妄想。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...