SlideShare a Scribd company logo
PERSONALITY
DEVELOPMENT
Activity 1
“You may not belief that there are six
errers in this short paragraph. Studi
the paragraph carefully. You can
reed it as many times as necessary.
Don’t give up too easily. See if you
can find all of them”
Activity 2
8, 11, 15, 5, 14, 1, 7,
6, 10, 13, 3, 12, 2
Activity 3
The leader begins by saying the name of any country, city,
river, ocean or mountain that can be found in an atlas.
The young person next to him must then say another
name that begins with the last letter of the word just
given. Each person has a definite time limit (e.g. three
seconds) and no names can be repeated. For example -
First person: London, Second Person: Niagara Falls,
ThirdPerson: Switzerland
• Latin word “persona” = mask and
“per” and “sonare” = 'to sound
through'
• How we are different to one another
• Impression he/she makes on others
Determinants
• Heredity and genetic factors
• Environmental factors
Phases
1. Physical
2. intellectual
3.Emotional
• ID
• EGO
• SUPER EGO
4.Values system
5.Social
Psychoanalytic perspective
• Alfred Adler
• Superiority-Inferiority complex
• Culture theory of personality
Behavioral perspective
• Classical conditioning
• Operant conditioning
• Social learning theory
Humanistic perspective
• Person centered theory
• Theory of self-actualization
Biological perspective
The Filipino character
5 Factor model
• Extraversion
• Neurotism
• Openness to experience
• Agreeableness
• Conscientiousness
Types of Anxiety
• Neurotic anxiety is the unconscious worry that we
will lose control of the id's urges, resulting in
punishment for inappropriate behavior.
• Reality anxiety is fear of real-world events. The
cause of this anxiety is usually easily identified. For
example, a person might fear receiving a dog bite
when they are near a menacing dog. The most
common way of reducing this anxiety is to avoid the
threatening object.
• Moral anxiety involves a fear of violating our own
moral principles.
Defense Mechanisms
• Denial is probably one of the best
known defense mechanisms, used often
to describe situations in which people
seem unable to face reality or admit an
obvious truth
• Repression is another well-known
defense mechanism. Repression acts to
keep information out
of conscious awareness.
• Displacement involves taking out our
frustrations, feelings and impulses on
people or objects that are less
threatening.
• Sublimation is a defense mechanism
that allows us to act out unacceptable
impulses by converting these behaviors
into a more acceptable form.
• Projection is a defense mechanism that
involves taking our own unacceptable
qualities or feelings and ascribing them
to other people.
• Rationalization is a defense
mechanism that involves explaining an
unacceptable behavior or feeling in a
rational or logical manner, avoiding the
true reasons for the behavior.
• Regression, suggesting that people act
out behaviors from the stage of
psychosexual development in which they
are fixated.
• Reaction formation reduces anxiety by
taking up the opposite feeling, impulse or
behavior. An example of reaction formation
would be treating someone you strongly
dislike in an excessively friendly manner in
order to hide your true feelings.
THANK YOU!
Fruelda, Michelle
Zara, Zaida Rojeen

More Related Content

Similar to Personality development

Theories of personality
Theories of personalityTheories of personality
Theories of personality
university of karachi
 
121chapter32014
121chapter32014121chapter32014
121chapter32014
RThornock
 
1-Introduction-to-Self-Understanding.pdf
1-Introduction-to-Self-Understanding.pdf1-Introduction-to-Self-Understanding.pdf
1-Introduction-to-Self-Understanding.pdf
TheoEsguerra
 
Chapter3thornock2015
Chapter3thornock2015Chapter3thornock2015
Chapter3thornock2015
RThornock
 
PSY101 Week 10 personalities
PSY101 Week 10 personalitiesPSY101 Week 10 personalities
PSY101 Week 10 personalities
Dr. Russell Rodrigo
 
Personality Characteristics Of Personality Traits
Personality Characteristics Of Personality TraitsPersonality Characteristics Of Personality Traits
Personality Characteristics Of Personality Traits
Victoria Burke
 
Practical Intelligence
Practical IntelligencePractical Intelligence
Practical Intelligence
IMH chennai
 
District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]Benjamin Drader
 
1_Intro.pptx
1_Intro.pptx1_Intro.pptx
1_Intro.pptx
KristofferRyanGidaya
 
OB Unit – 2 2022.pptx
OB Unit – 2 2022.pptxOB Unit – 2 2022.pptx
OB Unit – 2 2022.pptx
Dr. V. Karthiga Rajasekaran
 
Enneagram_FINAL.pptx
Enneagram_FINAL.pptxEnneagram_FINAL.pptx
Enneagram_FINAL.pptx
Pablexz2189
 
Chapter_15_pt__2.ppt
Chapter_15_pt__2.pptChapter_15_pt__2.ppt
Chapter_15_pt__2.ppt
syifaaqliyah1
 
Personality psychology
Personality psychologyPersonality psychology
Personality psychology
Chandni Narayan
 
Personality and Attitudes
Personality and AttitudesPersonality and Attitudes
Personality and Attitudes
ISAAC Jayant
 
Introduction to Psychology
Introduction to PsychologyIntroduction to Psychology
Introduction to Psychology
DR. RHEA SANTILLAN
 
personality.pptx
personality.pptxpersonality.pptx
personality.pptx
SHIKHIL MV
 
What I Would Use As The Icebreaker Slide
What I Would Use As The Icebreaker SlideWhat I Would Use As The Icebreaker Slide
What I Would Use As The Icebreaker Slide
Gina Buck
 
Personality
PersonalityPersonality
Personality
Alam Nuzhathalam
 

Similar to Personality development (20)

Theories of personality
Theories of personalityTheories of personality
Theories of personality
 
121chapter32014
121chapter32014121chapter32014
121chapter32014
 
Change
ChangeChange
Change
 
1-Introduction-to-Self-Understanding.pdf
1-Introduction-to-Self-Understanding.pdf1-Introduction-to-Self-Understanding.pdf
1-Introduction-to-Self-Understanding.pdf
 
Chapter3thornock2015
Chapter3thornock2015Chapter3thornock2015
Chapter3thornock2015
 
PSY101 Week 10 personalities
PSY101 Week 10 personalitiesPSY101 Week 10 personalities
PSY101 Week 10 personalities
 
Personality Characteristics Of Personality Traits
Personality Characteristics Of Personality TraitsPersonality Characteristics Of Personality Traits
Personality Characteristics Of Personality Traits
 
Practical Intelligence
Practical IntelligencePractical Intelligence
Practical Intelligence
 
District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]
 
1_Intro.pptx
1_Intro.pptx1_Intro.pptx
1_Intro.pptx
 
OB Unit – 2 2022.pptx
OB Unit – 2 2022.pptxOB Unit – 2 2022.pptx
OB Unit – 2 2022.pptx
 
Enneagram_FINAL.pptx
Enneagram_FINAL.pptxEnneagram_FINAL.pptx
Enneagram_FINAL.pptx
 
Chapter_15_pt__2.ppt
Chapter_15_pt__2.pptChapter_15_pt__2.ppt
Chapter_15_pt__2.ppt
 
Chapter 3 business psychology
Chapter 3  business psychologyChapter 3  business psychology
Chapter 3 business psychology
 
Personality psychology
Personality psychologyPersonality psychology
Personality psychology
 
Personality and Attitudes
Personality and AttitudesPersonality and Attitudes
Personality and Attitudes
 
Introduction to Psychology
Introduction to PsychologyIntroduction to Psychology
Introduction to Psychology
 
personality.pptx
personality.pptxpersonality.pptx
personality.pptx
 
What I Would Use As The Icebreaker Slide
What I Would Use As The Icebreaker SlideWhat I Would Use As The Icebreaker Slide
What I Would Use As The Icebreaker Slide
 
Personality
PersonalityPersonality
Personality
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Personality development

  • 2. Activity 1 “You may not belief that there are six errers in this short paragraph. Studi the paragraph carefully. You can reed it as many times as necessary. Don’t give up too easily. See if you can find all of them”
  • 3. Activity 2 8, 11, 15, 5, 14, 1, 7, 6, 10, 13, 3, 12, 2
  • 4. Activity 3 The leader begins by saying the name of any country, city, river, ocean or mountain that can be found in an atlas. The young person next to him must then say another name that begins with the last letter of the word just given. Each person has a definite time limit (e.g. three seconds) and no names can be repeated. For example - First person: London, Second Person: Niagara Falls, ThirdPerson: Switzerland
  • 5.
  • 6. • Latin word “persona” = mask and “per” and “sonare” = 'to sound through' • How we are different to one another • Impression he/she makes on others
  • 7. Determinants • Heredity and genetic factors • Environmental factors
  • 8. Phases 1. Physical 2. intellectual 3.Emotional • ID • EGO • SUPER EGO 4.Values system 5.Social
  • 9. Psychoanalytic perspective • Alfred Adler • Superiority-Inferiority complex • Culture theory of personality
  • 10. Behavioral perspective • Classical conditioning • Operant conditioning • Social learning theory
  • 11. Humanistic perspective • Person centered theory • Theory of self-actualization
  • 14. 5 Factor model • Extraversion • Neurotism • Openness to experience • Agreeableness • Conscientiousness
  • 15. Types of Anxiety • Neurotic anxiety is the unconscious worry that we will lose control of the id's urges, resulting in punishment for inappropriate behavior. • Reality anxiety is fear of real-world events. The cause of this anxiety is usually easily identified. For example, a person might fear receiving a dog bite when they are near a menacing dog. The most common way of reducing this anxiety is to avoid the threatening object. • Moral anxiety involves a fear of violating our own moral principles.
  • 16. Defense Mechanisms • Denial is probably one of the best known defense mechanisms, used often to describe situations in which people seem unable to face reality or admit an obvious truth • Repression is another well-known defense mechanism. Repression acts to keep information out of conscious awareness.
  • 17. • Displacement involves taking out our frustrations, feelings and impulses on people or objects that are less threatening. • Sublimation is a defense mechanism that allows us to act out unacceptable impulses by converting these behaviors into a more acceptable form.
  • 18. • Projection is a defense mechanism that involves taking our own unacceptable qualities or feelings and ascribing them to other people. • Rationalization is a defense mechanism that involves explaining an unacceptable behavior or feeling in a rational or logical manner, avoiding the true reasons for the behavior.
  • 19. • Regression, suggesting that people act out behaviors from the stage of psychosexual development in which they are fixated. • Reaction formation reduces anxiety by taking up the opposite feeling, impulse or behavior. An example of reaction formation would be treating someone you strongly dislike in an excessively friendly manner in order to hide your true feelings.