000 | 19260cam a2203529 i 4500 | ||
---|---|---|---|
001 | 998794 | ||
008 | 180207s20152015mau b 000 0 eng | ||
010 | _a 2014004126 | ||
020 |
_a9780133571745 _q(paperback) |
||
040 |
_aDLC _beng _cDLC _erda _dDLC _dTR-IsMEF |
||
041 | 0 | _aeng | |
049 | _aTR-IsMEF | ||
050 | 0 | 0 |
_aBF636.6 _b.E74 2015 |
100 | 1 |
_aErford, Bradley T., _eauthor. |
|
245 | 1 | 0 |
_a40 techniques every counselor should know / _cBradley T. Erford. |
246 | 0 | _aForty techniques every counselor should know | |
250 | _aSecond edition. | ||
264 | 1 |
_aBoston : _bPearson, _c[2015] |
|
264 | 4 | _a©2015 | |
300 |
_axx, 267 pages ; _c23 cm |
||
336 |
_atext _2rdacontent |
||
337 |
_aunmediated _2rdamedia |
||
338 |
_avolume _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 246-261) and index. | ||
650 | 0 | _aCounseling | |
650 | 0 | _aCounseling psychology | |
900 | _aMEF Üniversitesi Kütüphane katalog kayıtları RDA standartlarına uygun olarak üretilmektedir / MEF University Library Catalogue Records are Produced Compatible by RDA Rules | ||
910 | _aÇağlayan | ||
942 |
_2lcc _cBKS _02 |
||
970 | 0 | 1 | _tContents. |
970 | 0 | 1 |
_tIntroduction, _piv. |
970 | 0 | 1 |
_tAcknowledgments, _pviii. |
970 | 0 | 1 |
_tAbout the author, _pix. |
970 | 1 | 2 |
_lSection 1 _tTechniques based on solution-focused brief counseling approaches, _p1. |
970 | 1 | 1 |
_tMulticultural implications of solution-focused brief counseling approaches, _p2. |
970 | 1 | 2 |
_lChapter 1 _tScaling, _p3. |
970 | 1 | 1 |
_tOrigins of the scaling technique, _p3. |
970 | 1 | 1 |
_tHow to implement the scaling technique, _p3. |
970 | 1 | 1 |
_tVariations of the scaling technique, _p3. |
970 | 1 | 1 |
_tExamples of the scaling technique, _p4. |
970 | 1 | 1 |
_tUsefulness and evaluation of the scaling technique, _p8. |
970 | 1 | 2 |
_lChapter 2 _tExceptions, _p10. |
970 | 1 | 1 |
_tOrigins of the exceptions technique, _p10. |
970 | 1 | 1 |
_tHow to implement the exceptions technique, _p10. |
970 | 1 | 1 |
_tVariations of the exceptions technique, _p11. |
970 | 1 | 1 |
_tExamples of the exceptions technique, _p11. |
970 | 1 | 1 |
_tUsefulness and evaluation of the exceptions technique, _p13. |
970 | 1 | 2 |
_lChapter 3 _tProblem-free talk, _p15. |
970 | 1 | 1 |
_tOrigins of the problem-free talk technique, _p15. |
970 | 1 | 1 |
_tHow to implement the problem-free talk technique, _p15. |
970 | 1 | 1 |
_tVariations of the problem-free talk technique, _p16. |
970 | 1 | 1 |
_tExamples of the problem-free talk technique, _p16. |
970 | 1 | 1 |
_tUsefulness and evaluation of the problem-free talk technique, _p17. |
970 | 1 | 2 |
_lChapter 4 _tMiracle question, _p18. |
970 | 1 | 1 |
_tOrigins of the miracle question technique, _p18. |
970 | 1 | 1 |
_tHow to implement the miracle question technique, _p18. |
970 | 1 | 1 |
_tVariations of the miracle question technique, _p19. |
970 | 1 | 1 |
_tExamples of the miracle question technique, _p19. |
970 | 1 | 1 |
_tUsefulness and evaluation of the miracle question technique, _p21. |
970 | 1 | 2 |
_lChapter 5 _tFlagging the minefield, _p22. |
970 | 1 | 1 |
_tOrigins of the flagging the minefield technique, _p22. |
970 | 1 | 1 |
_tHow to implement the flagging the minefield technique, _p22. |
970 | 1 | 1 |
_tExample of the flagging the minefield technique, _p22. |
970 | 1 | 1 |
_tUsefulness and evaluation of the flagging the minefield technique, _p25. |
970 | 1 | 2 |
_lSection 2 _tTechniques based on adlerian or psychodynamic approaches, _p27. |
970 | 1 | 1 |
_tMulticultural implications of the adlerian and psyhodynamic approaches, _p28. |
970 | 1 | 2 |
_lChapter 6 _tI-messages, _p29. |
970 | 1 | 1 |
_tOrigins of the I-messages technique, _p29. |
970 | 1 | 1 |
_tHow to implement the I-messages technique, _p29. |
970 | 1 | 1 |
_tVariations of the I-messages technique, _p30. |
970 | 1 | 1 |
_tExample of the I-messages technique, _p30. |
970 | 1 | 1 |
_tUsefulness and evaluation of the I-messages technique, _p32. |
970 | 1 | 2 |
_lChapter 7 _tActing as if, _p34. |
970 | 1 | 1 |
_tOrigins of the acting as if technique, _p34. |
970 | 1 | 1 |
_tHow to implement the acting as if technique, _p34. |
970 | 1 | 1 |
_tVariations of the acting as if technique, _p34. |
970 | 1 | 1 |
_tExample of the acting as if technique, _p35. |
970 | 1 | 1 |
_tUsefulness and evaluation of the acting as if technique, _p37. |
970 | 1 | 2 |
_lChapter 8 _tSpitting in the soup, _p38. |
970 | 1 | 1 |
_tOrigins of the spitting in the soup technique, _p38. |
970 | 1 | 1 |
_tHow to implement the spitting in the soup technique, _p38. |
970 | 1 | 1 |
_tVariations of the spitting in the soup technique, _p39. |
970 | 1 | 1 |
_tExample of the spitting in the soup technique, _p39. |
970 | 1 | 1 |
_tUsefulness and evaluation of the spitting in the soup technique, _p40. |
970 | 1 | 2 |
_lChapter 9 _tMutual storytelling, _p41. |
970 | 1 | 1 |
_tOrigins of the mutual storytelling technique, _p41. |
970 | 1 | 1 |
_tHow to implement the mutual storytelling technique, _p41. |
970 | 1 | 1 |
_tVariations of the mutual storytelling technique, _p43. |
970 | 1 | 1 |
_tExample of the mutual storytelling technique, _p44. |
970 | 1 | 1 |
_tUsefulness and evaluation of the mutual storytelling technique, _p48. |
970 | 1 | 2 |
_lChapter 10 _tParadoxical intention, _p50. |
970 | 1 | 1 |
_tOrigins of the paradoxical intention technique, _p50. |
970 | 1 | 1 |
_tHow to implement the paradoxical intention technique, _p51. |
970 | 1 | 1 |
_tVariations of the paradoxical intention technique, _p51. |
970 | 1 | 1 |
_tExample of the paradoxical intention technique, _p51. |
970 | 1 | 1 |
_tUsefulness and evaluation of the paradoxical intention technique, _p56. |
970 | 1 | 2 |
_lSection 3 _tTechniques based on gestalt and psychodrama principles, _p57. |
970 | 1 | 1 |
_tMulticultural implications of the techniques based on gestalt psychodrama principles, _p58. |
970 | 1 | 2 |
_lChapter 11 _tEmpty chair, _p59. |
970 | 1 | 1 |
_tOrigins of the empty chair technique, _p59. |
970 | 1 | 1 |
_tHow to implement theempty chair technique, _p59. |
970 | 1 | 1 |
_tVariations of the empty chair technique, _p60. |
970 | 1 | 1 |
_tExample of the empty chair technique, _p61. |
970 | 1 | 1 |
_lUsefulness and evaluation of the empty chair technique, _p63. |
970 | 1 | 2 |
_tChapter 12 _tBody movement and exaggeration, _p66. |
970 | 1 | 1 |
_tOrigins of the body movement and exaggeration technique, _p66. |
970 | 1 | 1 |
_tHow to implement the body movement and exaggeration technique, _p66. |
970 | 1 | 1 |
_tVariations of the body movement and exaggeration technique, _p66. |
970 | 1 | 1 |
_tExample of the body movement and exaggeration technique, _p66. |
970 | 1 | 1 |
_tUsefulness and evaluation of the body movement and exaggeration technique, _p67. |
970 | 1 | 2 |
_lChapter 13 _tRole reversal, _p69. |
970 | 1 | 1 |
_tOrigins of the role reversal technique, _p69. |
970 | 1 | 1 |
_tHow to implement the role reversal technique, _p69. |
970 | 1 | 1 |
_tVariations of the role reversal technique, _p69. |
970 | 1 | 1 |
_tExample of the role reversal technique, _p69. |
970 | 1 | 1 |
_tUsefulness and evaluation of the role reversal technique, _p71. |
970 | 1 | 2 |
_lSection 4 _tTechniques based on mindfulness approaches, _p73. |
970 | 1 | 1 |
_tMulticultural implications of the techniques based on mindfulness approaches, _p74. |
970 | 1 | 2 |
_lChapter 14 _tVisual/guided imagery, _p75. |
970 | 1 | 1 |
_tOrigins of the visual imagery technique, _p75. |
970 | 1 | 1 |
_tHow to implement the visual imagery technique, _p75. |
970 | 1 | 1 |
_tVariations of the visual imagery technique, _p76. |
970 | 1 | 1 |
_tExample of the visual imagery technique, _p76. |
970 | 1 | 1 |
_tUsefulness and evaluation of the visual imagery technique, _p79. |
970 | 1 | 2 |
_lChapter 15 _tDeep breathing, _p81. |
970 | 1 | 1 |
_tOrigins of the deep breathing technique, _p81. |
970 | 1 | 1 |
_tHow to implement the deep breathing technique, _p81. |
970 | 1 | 1 |
_tVariations of the deep breathing technique, _p82. |
970 | 1 | 1 |
_tExample of the deep breathing technique, _p83. |
970 | 1 | 1 |
_tUsefulness and evaluation of the deep breathing technique, _p83. |
970 | 1 | 2 |
_lChapter 16 _tProgressive muscle relaxation training (PMRT), _p85. |
970 | 1 | 1 |
_tOrigins of the PMRT technique, _p85. |
970 | 1 | 1 |
_tHow to implement the PMRT technique, _p85. |
970 | 1 | 1 |
_tVariations of the PMRT technique, _p96. |
970 | 1 | 1 |
_tExample of the PMRT technique, _p97. |
970 | 1 | 1 |
_tUsefulness and evaluation of the PMRT technique, _p88. |
970 | 1 | 2 |
_lSection 5 _tTecniques based on humanistic-phenomenological approaches, _p91. |
970 | 1 | 1 |
_tMulticultural implications of humanistic-phenomenological approaches, _p92. |
970 | 1 | 2 |
_lChapter 17 _tSelf-disclosure, _p93. |
970 | 1 | 1 |
_tOrigins of the self-disclosure technique, _p93. |
970 | 1 | 1 |
_tHow to implement the self-disclosure technique, _p93. |
970 | 1 | 1 |
_tVariations of the self-disclosure technique, _p94. |
970 | 1 | 1 |
_tExamples of the self-disclosure technique, _p94. |
970 | 1 | 1 |
_tUsefulness and evaluation of the self-disclosure technique, _p96. |
970 | 1 | 2 |
_lChapter 18 _tConfrontation, _p98. |
970 | 1 | 1 |
_tOrigins of the confrontation technique, _p98. |
970 | 1 | 1 |
_tHow to implement the confrontation technique, _p98. |
970 | 1 | 1 |
_tVariations of the confrontation technique, _p100. |
970 | 1 | 1 |
_tExample of the confrontation technique, _p100. |
970 | 1 | 1 |
_tUsefulness and evaluation of the confrontation technique, _p102. |
970 | 1 | 2 |
_lChapter 19 _tMotivational interviewing, _p103. |
970 | 1 | 1 |
_tOrigins of the motivational interviewing technique, _p103. |
970 | 1 | 1 |
_tHow to implement the motivational interviewing technique, _p104. |
970 | 1 | 1 |
_tVariations of the motivational interviewing technique, _p105. |
970 | 1 | 1 |
_tExample of the motivational interviewing technique, _p105. |
970 | 1 | 1 |
_tUsefulness and evaluation of the motivational interviewing technique, _p106. |
970 | 1 | 2 |
_lChapter 20 _tStrength bombardment, _p108. |
970 | 1 | 1 |
_tOrigins of the strength bombardment technique, _p108. |
970 | 1 | 1 |
_tHow to implement the strength bombardment technique, _p108. |
970 | 1 | 1 |
_tVariations of the strength bombardment technique, _p109. |
970 | 1 | 1 |
_tExample of the strength bombardment technique, _p110. |
970 | 1 | 1 |
_tUsefulness and evaluation of the strength bombardment technique, _p111. |
970 | 1 | 2 |
_lSection 6 _tTechniques based on cognitive-behavioral approaches, _p113. |
970 | 1 | 1 |
_tMulticultural implications of the techniques based on cognitive-behavioral approaches, _p114. |
970 | 1 | 2 |
_lChapter 21 _tSelf-talk, _p116. |
970 | 1 | 1 |
_tOrigins of the self-talk technique, _p116. |
970 | 1 | 1 |
_tHow to implement the self-talk technique, _p116. |
970 | 1 | 1 |
_tVariations of the self-talk technique, _p117. |
970 | 1 | 1 |
_tExample of the self-talk technique, _p118. |
970 | 1 | 1 |
_tUsefulness and evaluation of the self-talk technique, _p119. |
970 | 1 | 2 |
_lChapter 22 _tReframing, _p121. |
970 | 1 | 1 |
_tOrigins of the reframing technique, _p121. |
970 | 1 | 1 |
_tHow to implement the reframing technique, _p122. |
970 | 1 | 1 |
_tVariations of the reframing technique, _p122. |
970 | 1 | 1 |
_tExample of the reframing technique, _p122. |
970 | 1 | 1 |
_tUsefulness and evalutions of the reframing technique, _p126. |
970 | 1 | 2 |
_lChapter 23 _tThought stopping, _p127. |
970 | 1 | 1 |
_tOrigins of the thought stopping technique, _p127. |
970 | 1 | 1 |
_tHow to implement the thought stopping technique, _p127. |
970 | 1 | 1 |
_tVariations of the thought stopping technique, _p128. |
970 | 1 | 1 |
_tExample of the thought stopping technique, _p128. |
970 | 1 | 1 |
_tUsefulness and evaluation of the thought stopping technique, _p130. |
970 | 1 | 2 |
_lChapter 24 _tCognitive restructuring, _p132. |
970 | 1 | 1 |
_tOrigins of the cognitive restructuring technique, _p132. |
970 | 1 | 1 |
_tHow to implement the cognitive restructuring technique, _p132. |
970 | 1 | 1 |
_tVariations of the cognitive restructuring technique, _p133. |
970 | 1 | 1 |
_tExample of the cognitive restructuring technique, _p134. |
970 | 1 | 1 |
_tUsefulness and evalution of the cognitive restructuring technique, _p137. |
970 | 1 | 2 |
_lChapter 25 _tRational-emotive behavior therapy (REBT): the ABCDEF model and rational-emotive imagery, _p139. |
970 | 1 | 1 |
_tOrigins of the ABCDEF model and rational-emotive imagery technique, _p139. |
970 | 1 | 1 |
_tHow to implement the ABCDEF model and rational-emotive imagery technique, _p139. |
970 | 1 | 1 |
_tVariations of the ABCDEF model and rational-emotive imagery technique, _p142. |
970 | 1 | 1 |
_tExample of the ABCDEF model and rational-emotive imagery technique, _p142. |
970 | 1 | 1 |
_tUsefulness and evaluation of the ABCDEF model and rational-emotive imagery technique, _p146. |
970 | 1 | 2 |
_lChapter 26 _tBibliotherapy, _p148. |
970 | 1 | 1 |
_tOrigins of the bibliotherapy technique, _p148. |
970 | 1 | 1 |
_tHow to implement the bibliotherapy technique, _p148. |
970 | 1 | 1 |
_tVariations of the bibliotherapy technique, _p149. |
970 | 1 | 1 |
_tExample of the bibliotherapy technique, _p149. |
970 | 1 | 1 |
_tUsefulness and evaluation of the bibliotherapy technique, _p150. |
970 | 1 | 2 |
_lChapter 27 _tJournaling, _p153. |
970 | 1 | 1 |
_tOrigins of the journaling technique, _p153. |
970 | 1 | 1 |
_tHow to implement the journaling technique, _p154. |
970 | 1 | 1 |
_tVariations of the journaling technique, _p154. |
970 | 1 | 1 |
_tExample of the journaling technique, _p154. |
970 | 1 | 1 |
_tUsefulness and evaluation of the journaling technique, _p155. |
970 | 1 | 2 |
_lChapter 28 _tSystematic desensitization, _p156. |
970 | 1 | 1 |
_tOrigins of the systematic desensitization technique, _p156. |
970 | 1 | 1 |
_tHow to implement the systematic desensitization technique, _p156. |
970 | 1 | 1 |
_tVariaton of the systematic desensitization technique, _p158. |
970 | 1 | 1 |
_tExample of the systematic desensitization technique, _p159. |
970 | 1 | 1 |
_tUsefulness and evaluation of the systematic desensitization technique, _p165. |
970 | 1 | 2 |
_lChapter 29 _tStress inoculation training, _p167. |
970 | 1 | 1 |
_tOrigins of the stress inoculation training technique, _p167. |
970 | 1 | 1 |
_tHow to implement the stress inoculation training technique, _p167. |
970 | 1 | 1 |
_tVariation of the stress inoculation training technique, _p168. |
970 | 1 | 1 |
_tExample of the stress inoculation training technique, _p168. |
970 | 1 | 1 |
_tUsefulness and evaluation of the stress inoculation training technique, _p172. |
970 | 1 | 2 |
_lSection 7 _tTechniques based on social learning approaches, _p175. |
970 | 1 | 1 |
_tMulticultural implications of the techniques based on social learning approaches, _p175. |
970 | 1 | 2 |
_lChapter 30 _tModeling, _p177. |
970 | 1 | 1 |
_tOrigins of the modeling technique, _p177. |
970 | 1 | 1 |
_tHow to implement the modeling technique, _p178. |
970 | 1 | 1 |
_tVariations of the modeling technique, _p178. |
970 | 1 | 1 |
_tExample of the modeling technique, _p178. |
970 | 1 | 1 |
_tUsefulness and evaluation of the modeling technique, _p180. |
970 | 1 | 2 |
_lChapter 31 _tBehavioral rehearsal, _p182. |
970 | 1 | 1 |
_tOrigins of the behavioral rehearsal technique, _p182. |
970 | 1 | 1 |
_tHow to implement the behavioral rehearsal technique, _p182. |
970 | 1 | 1 |
_tVariations of the behavioral rehearsal technique, _p182. |
970 | 1 | 1 |
_tExample of the behavioral rehearsal technique, _p183. |
970 | 1 | 1 |
_tUsefulness and evaluation of the behavioral rehearsal technique, _p184. |
970 | 1 | 2 |
_lChapter 32 _tRole play, _p186. |
970 | 1 | 1 |
_tOrigins of the role play technique, _p186. |
970 | 1 | 1 |
_tHow to implement the role play technique, _p186. |
970 | 1 | 1 |
_tVariations of the role play technique, _p187. |
970 | 1 | 1 |
_tExample of the role play technique, _p188. |
970 | 1 | 1 |
_tUsefulness and evaluation of the role play technique, _p191. |
970 | 1 | 2 |
_lSection 8 _tTechniques based on behavioral approaches using positive reinforcement, _p193. |
970 | 1 | 1 |
_tA brief introduction to principles underlying behavior modification, _p193. |
970 | 1 | 1 |
_tPositive reinforcement and negative reinforcement, _p193. |
970 | 1 | 1 |
_tAssessing problem behaviors, _p195. |
970 | 1 | 1 |
_tMulticultural implications of behavioral approaches using positive reinforcement, _p196. |
970 | 1 | 2 |
_lChapter 33 _tPremack principle, _p197. |
970 | 1 | 1 |
_tOrigins of the premack principle technique, _p197. |
970 | 1 | 1 |
_tHow to implement the premack principle technique, _p197. |
970 | 1 | 1 |
_tVariations of the premack principle technique, _p198. |
970 | 1 | 1 |
_tExample of the premack principle technique, _p198. |
970 | 1 | 1 |
_tUsefulness and evaluation of the premack principle technique, _p200. |
970 | 1 | 2 |
_lChapter 34 _tBehavior chart, _p202. |
970 | 1 | 1 |
_tOrigins of the behavior chart technique, _p202. |
970 | 1 | 1 |
_tHow to implement the behavior chart technique, _p202. |
970 | 1 | 1 |
_tExamples of the behavior chart technique, _p202. |
970 | 1 | 1 |
_tUsefulness and evaluation of the behavior chart technique, _p205. |
970 | 1 | 2 |
_lChapter 35 _tToken economy, _p206. |
970 | 1 | 1 |
_tOrigins of the token economy technique, _p206. |
970 | 1 | 1 |
_tHow to implement the token economy technique, _p206. |
970 | 1 | 1 |
_tVariations of the token economy technique, _p207. |
970 | 1 | 1 |
_tExample of the token economy technique, _p208. |
970 | 1 | 1 |
_tUsefulness and evaluation of the token economy technique, _p209. |
970 | 1 | 2 |
_lChapter 36 _tBehavioral contract, _p211. |
970 | 1 | 1 |
_tOrigins of the behavioral contract technique, _p211. |
970 | 1 | 1 |
_tHow to implement the behavioral contract technique, _p211. |
970 | 1 | 1 |
_tVariations of the behavioral contract technique, _p212. |
970 | 1 | 1 |
_tExample of the behavioral contract technique, _p213. |
970 | 1 | 1 |
_tUsefulness and evalution of the behavioral contract technique, _p217. |
970 | 1 | 2 |
_lSection 9 _tTechniques based on behavioral approaches using punishment, _p219. |
970 | 1 | 1 |
_tMulticultural implications of behavioral approaches using punishment, _p220. |
970 | 1 | 2 |
_lChapter 37 _tExtinction, _p221. |
970 | 1 | 1 |
_tOrigins of the extinction technique, _p221. |
970 | 1 | 1 |
_tHow to implement the extinction technique, _p221. |
970 | 1 | 1 |
_tVariations of the extinction technique, _p222. |
970 | 1 | 1 |
_tExample of the extinction technique, _p222. |
970 | 1 | 1 |
_tUsefulness and evaluation of the extinction technique, _p225. |
970 | 1 | 2 |
_lChapter 38 _tTime out, _p226. |
970 | 1 | 1 |
_tOrigins of the time out technique, _p226. |
970 | 1 | 1 |
_tHow to implement the time out technique, _p226. |
970 | 1 | 1 |
_tVariations of the time out technique, _p227. |
970 | 1 | 1 |
_tExample of the time out technique, _p227. |
970 | 1 | 1 |
_tUsefulness and evaluation of the time out technique, _p232. |
970 | 1 | 2 |
_lChapter 39 _tResponse cost, _p234. |
970 | 1 | 1 |
_tOrigins of the response cost technique, _p234. |
970 | 1 | 1 |
_tHow to implement the response cost technique, _p234. |
970 | 1 | 1 |
_tExample of the response cost technique, _p235. |
970 | 1 | 1 |
_tUsefulness and evaluation of the response cost technique, _p240. |
970 | 1 | 2 |
_lChapter 40 _tOvercorrection, _p241. |
970 | 1 | 1 |
_tOrigins of the overcorrection technique, _p241. |
970 | 1 | 1 |
_tHow to implement the overcorrection technique, _p241. |
970 | 1 | 1 |
_tVariations of the overcorrection technique, _p242. |
970 | 1 | 1 |
_tExample of the overcorrection technique, _p242. |
970 | 1 | 1 |
_tUsefulness and evaluation of the overcorrection technique, _p243. |
970 | 0 | 1 |
_tConcluding remarks, _p245. |
970 | 0 | 1 |
_tReferences, _p246. |
970 | 0 | 1 |
_tIndex, _p262. |
999 |
_c3033 _d3033 |
||
003 | KOHA |