Blog

A Garlic Testament: Seasons on a Small New Mexico Farm

A Garlic Testament: Seasons on a Small New Mexico Farm Paperback – April 1, 1998

by Stanley Crawford (Author)

From his New Mexico mountain home, award-winning author Stanley Crawford writes about growing garlic and selling it.

“To dream a garden and then to plant it is an act of independence and even defiance to the greater world.”–Stan Crawford

ABOUT THE CONTRIBUTORS

Stanley Crawford lives in Dixon, New Mexico.

ACCLAIM

“Rich with respect for human toil. . . . detailing the healing and annealing aspect of the repetitive tasks that bring his crop to market in clearsighted, eloquent prose.”
— New York Times Book Review

“Crawford tells us what’s right with American agriculture by telling us what’s right in the life of one farmer who’s found his place in the sun.”
— The Washington Post

“Superb, quiet. . . . a plainspoken wisdom.”
— The New Yorker

Healing Without Hurting: Treating ADHD, Apraxia, and Autism Spectrum Disorders Naturally

by Jennifer Giustra-Kozek (Author)

Jennifer Giustra-Kozek is a therapist who practices in Connecticut, and is also the mother of a son with Autism Spectrum disorders. After treating Evan bio-medically, along with other healing practices, Jennifer witnessed the kind of improvements that every parent of a similarly diagnosed child dreams of: Evan no longer grunts and screams, throws toys, hits others, or has mood swings. He no longer throws himself into fits of uncontrollable rage, listens to his teachers & responds appropriately. He copes better with changes in routine & makes eye contact more often. He no longer enters into a trance-like state …and the list goes on.

Healing without Hurting includes a full menu of natural treatment options, including: A real world
success story and simple recipes/healthy alternatives.

Readers will learn how to:
Identify common labels of behaviors
Recognize the early warning signs that an autoimmune disorder is brewing
Identify the different medications; potential benefits and side-effects
Find the right doctors and practitioners
Identify food sensitivities and other autoimmune assaults
and much more…..

Running on Ritalin: A Physician Reflects on Children, Society, and Performance in a Pill

by
Lawrence H. Diller (Author)

In a book as provocative and newsworthy as Listening to Prozac and Driven to Distraction, a physician speaks out on America’s epidemic level of diagnoses for attention deficit disorder, and on the drug that has become almost a symbol of our times: Ritalin.  

In 1997 alone, nearly five million people in the United States were prescribed Ritalin–most of them young children diagnosed with attention deficit disorder.  Use of this drug, which is a stimulant related to amphetamine, has increased by 700 percent since 1990.  And this phenomenon appears to be uniquely American: 90 percent of the world’s Ritalin is used here.  Is this a cause for alarm–or simply the case of an effective treatment meeting a newly discovered need? Important medical advance–or drug of abuse, as some critics claim?

Lawrence Diller has written the definitive book about this crucial debate–evenhanded, wide-ranging, and intimate in its knowledge of families, schools, and the pressures of our speeded-up society.  As a pediatrician and family therapist, he has evaluated hundreds of children, adolescents, and adults for ADD, and he offers crucial information and treatment options for anyone struggling with this problem.  

Running on Ritalin also throws a spotlight on some of our most fundamental values and goals.  What does Ritalin say about the old conundrums of nature vs.  nurture, free will vs.  responsibility? Is ADD a disability that entitles us to special treatment? If our best is not good enough, can we find motivation and success in a pill? Is there still a place for childhood in the performance-driven America of the late nineties?

WOULD IT BE POSSIBLE FOR HUMAN’S MIND TO BE HACKED WITHIN THE CYBER ERA, IT’S NOT ANY MORE A QUESTION

WOULD IT BE POSSIBLE FOR HUMAN’S MIND TO BE HACKED WITHIN THE CYBER ERA, IT’S NOT ANY MORE A QUESTION

FADI ABU ZUHRI

INTRODUCTION

According to the Guradian (Sample, 2017) “New human rights that would protect people from having their thoughts and other brain information stolen, abused or hacked have been proposed by researchers.”, which really destroy the question of this article. However, this article will not focus on the aim of hacking the human brain, nor the existing technology has been developed for hospitals to diagnose or treat medical conditions as to control Parkinson’s symptoms and other conditions. Also, this article is not about brainwave monitoring devices that allow people to play video games with their minds, or any other tools that claim to boost mental performance (Dredge, 2015), still it’s good to know such techniques and tools do exist.

According to (Rafael Yuste, 2017), Scientists are warning that AI could hack your brain. And control your thoughts, decisions and emotions. The scientists use an example of a paralyzed man. Participating in a clinical trial of a brain-computer interface. If the patient disagrees with the medical team. The AI connected to his brain could read his thoughts. And interpret them as a command to harm the researchers. Despite no direct command being given by the patient. The scientists say it is crucial to consider the possible consequences now. Including a person’s right to a private mental life. Investment in the neurotechnology industry has reached $100 million a year. The scientist are calling for new ethical rules. To ensure that AI does not exploit and manipulate people. four ethical priorities for neurotechnologies and AI. lay out recommendations relating to four areas of concern within neurotechnology and IA: privacy and consent; agency and identity; augmentation; and bias

Do you think AI is a threat… Or an opportunity?

Sorry if you are disappointed.

The article tries to covering and through some light over addiction to pleasure and using hidden desire of human mind, if not creating fake desires for the brain to run behind and ask for more and more, and more. As creating a field of rising human’s brain, to be used whenever is needed and by whoever having the power to do so, almost as the Matrix showing a field of raising human’s buddies (Wachowski & Wachowski, 1999). As highlighted within a lot of science-fiction movies, alteration of human’s memories or even transfer it to other human as showed within the Altered Carbon TV Series (Kalogridis, 2018). Maybe it is just another game, or just to move a level up, but when it is reality, there are a lot of ingredients for a teenager to be the most wanted criminal (which still could be questioned by sample questions (ABU ZUHRI, 10 QUESTIONS TO KNOW IF YOUR CHILD TODAY MIGHT BE THE MOST WANTED CRIMINAL TOMORROW, 2018)) or just waiting to be a person with the name in all TV channels and media. And the beneficial is always the man in power, not the human who did the action, but it’s the man who had up-used and misused other human brain. And always there is illusion of religion, money, men, women, children, and list go on, for action to be considered.

Still, this paper does not discuss the motivation behind human’s mind hacking, it is just to throw a light over some of the side effects of video games motivating killing, series make easier killing a human being as a norm, videos of superhero killing bad people without referring to a low, outside the law, violence music, video and music with hidden messages using psychological steganography, and nothing more important than brain to be not protected by lowering the brain protection by chemical treatment which helps manipulate the symptoms of early age of anxiety and depression, claiming helping with symptoms. Also, raising human’s mind over plastic foods (which should not be eaten by human), and the vital when a child’s brain is being affected with chemicals, either from the food eaten directly and/or by the parents’ habit of eating.

And yes, this is not technical psychological paper,

VIDEO GAMES

Unfortunately, this is not the 80s era, it’s the cyber era, however, huge part of existing treatments look a like the 80s era. It’s the era which human could create multiple virtual persona, and one of them could worth 500 Million Euro, one of them engage in gaming according to Fadi (ABU ZUHRI, HOW ONE OF YOUR VIRTUAL PERSONA COULD WORTH 500 M EURO, 2017). Online gaming has become a popular activity for children, teenagers, young and old adults according to (ABU ZURHI, 2017). For instance, an online game where a player interact with a certain monster, defeating and killing the monster, the player is rewarded depending on the monster’s response. Even an avatar of Super Hero kill the criminals and safe the innocent, without referring to court or system. Killing become the norms just to progress to another level within the game. However as much as you play, and long, actions transferred from Conscious to Collective Unconscious and become the reality or the option number one, unfortunately, human’s brain might reached the level to considered killing in reality would be option number one too, especially if some else had label the one to be killed as criminal by another group without the court and without judgmental system.

MUSIC

According to Lindsay (Dodgson, 2018), hip-hop and rock could make the cheese taste better. Also, as per Masaru (Emoto, 2000) thoughts, words, music have huge effect over water, when the water is frozen its crystals will be beautiful or ugly depending on whatever used were good or bad. And no different, effects of music on the human body as claimed by (Sharma, 2017) might improves memory, attention, physical coordination and mental development. The classical music stimulates the regeneration of brain cells. Certain music improves the mood, intelligence, motivation and concentration. It also improves the quality of life and aids in physical, emotional, cognitive, and social needs.

However, according to (Schleiffarth, 2017) Music can affect your mood. The easiest way to understand why music has such a powerful effect on the mind is to monitor brain activity while someone is listening to music. Most people have different music preferences, but interestingly enough, taste in music isn’t the most important factor—an emotional connection is. And according (ASSAGIOLI, n.d.) The harmful effects of music on body and mind are due to various factors. The most important of these is the kind or quality of the music. But there are others of a secondary character which can be influential and at times even decisive. These are: the amount of the music; the combination and succession of different kinds of music; the psychophysiological constitution of each listener; the particular emotional state in which he or she is at the time.

Not to mention, subliminal messages and backwards talks could be used within the music industries. Music therefore helps to do away with negative subliminal messages and works by aiming on one’s subconscious mind. According (Kolenda, 2019) subliminal messages in music do exist, one famous example of subliminal messages in music can be found in Judas Priest. In 1990, the band was accused of putting backward messages of “do it” in a song. And those messages allegedly caused the suicide of two male teenagers. The judge found no evidence, and the band was cleared of the charges.

Nevertheless, can subliminal messages influence your thoughts and behavior? Yes, they can. However, subliminal messages can’t make you do something you wouldn’t want to do, if you have the good immunity.

Music still could be used to help improve memory and emotional healing, and overcome stress and pain (Williams, 2019). And according (Kennaway, 2011) The link between the hypnotic power of music and the nerves was underlined in the neurologist Jean-Martin Charcot’s experiments with hypnosis at the Salpêtrière in Paris later in the nineteenth century. He used gongs and tuning forks on patients to provoke cataleptic fits, one of his stages of hysterical hypnosis.

The question could Music be used for hypnosis without the human consent?

SERIES AND EPISODES

Advertisers aren’t the only people getting criticized. Movie editors from Disney have been criticized for putting subliminal messages in movies. Here are a few examples. Walt Disney’s “Aladdin” Subliminal Message? (AZDigitalTransfers, 2011), Little Mermaid Erection (Buckley, 2006) and Lion King Subliminal Message (Ashton, 2013).

Still, a lot of The studies of violence in mass media analyzes the degree of correlation between themes of violence in media sources (particularly violence in video games, television and films) with real-world aggression and violence over time. Many social scientists support the correlation (Anderson, et al., 2003), and a lot of other researchers do not agree with such correlation.

However, would it be part of norms, if human get to used to something over, and over again and again. Therefore, aggression and violence become the reality and the motivation to live. Well, human fight the injustices system outside the justice system, by killing other human become acceptable, as The Punisher (Lightfoot, 2017-2019). Might for a lot of other human the answer will be NO, however for a lot of the other fan of such TV Series, Yes would be the easy answer. Well targeting other murderers be acceptable, as Dexter (Manos, 2006-2013), still outside the justice system.

EATING PLASTIC

Something as harmless as feeding your child dairy, gluten, soda and sugar could have long-term damage to their emotional development. According to Dr. Bob, the drugless doctor, states that children having diet with high levels of trans fat (partially hydrogenated fat) are at a higher risk of developing depression and ADHD (Attention Deficiency and Hyperactivity Disorder) (Dr.Bob, 2016). Not to mention that Genetically Modified Organism (GMO) is strictly out of the diet, just as plastic is not to be eaten by Humans (ABU ZUHRI, COULD HUMANS BE MORE INTELLIGENT?, 2018) (ABU ZUHRI, INTELLIGENT COMMUNICATION WITHIN THE BODY AND HOW TO BE SMARTER, 2018).

As a parent you need to be aware of your children’s behaviour and how well they handle emotions. In case of extreme behaviours it is wise to consult a professional psychologist.

ANTI-DEPRESSION MEDICATION

According to Batelaan, Van Balkom, & Stein (Batelaan, 2012), the management of anxiety disorders and depression should be handled and controlled with the help of a therapist. It is very important that individuals with anxiety and depression get a good evaluation in order to eliminate bipolar disorder. Bipolar disorder is a state wherein emotions can move between very low and very high levels of obsession and despair and is being treated very differently from the anxiety disorder with depression.

All people feel sad sometimes. Sadness is a normal emotion which can make life more exciting. Nearly at all times sadness is accompanied by loss. People are frequently sad when they say farewell to a loved one. The suffering is even deeper when an intimate relationship ends or when a dear friend is dead. However, sadness helps people to enjoy happiness. When one’s mood finally changes from sadness to joy, such changes will be more enjoyably and appreciated (Tay & Kuykendall, 2016).

For a teenager, depression might be a sample reaction of bullying physically in school or virtually within the social media. According to the Sun (Cope, 2019) the broken generation with child suicide rates soaring, not due to the love of dying, just to run out of their emotions.

According to Rachel (Kelly, 2019) the argument is not to ignore medication in treating depression, but to be aware of the side effects and relying on pills over a long period. As the doctors must not rush patients into stopping the anti-depression medication, due to the side effects from withdrawal might be worst than staying on the drugs. It’s vital for the doctors not to rush patients nor accept the request of patients for anti-depression medication to be the first option.

We get sick when we subject ourselves to unhealthy thoughts (the proverbial rotten tomatoes). Mental health is where problems start. Mental health can be improved by smiling, mindful meditation of how thoughts play in our mind and breathing deeply (Ea, 2018). It would be valuable for students to learn when and how to accept whatever is between their hands and overcome depression, anxiety and panic attacks.

CONCLUSION

I could not find better ingredients for a teenager mind to be up-used, and as brains in field just waiting to be collected and manipulated with the man in power. Addiction could be cured with professional help, and with breaking the repetitive and routine actions. Union to each other and be part of your family, have huge role of overcoming the worst.

According to (Beacham, 2017), three tips to help kids protect themselves from ‘Brain Hacking’, Self-Control (delay gratification), the differentiation between the needs and wants, and how to control searching the internet and be familiar with giant internet companies ads business.

And according to (Rafael Yuste, 2017), individual identity (our bodily and mental integrity) and agency (our ability to choose our actions) must be protected as basic human rights. Scientific or technological decisions are based on a narrow set of systemic, structural or social concepts and norms, the resulting technology can privilege certain groups and harm others. History indicates that profit hunting will often trump social responsibility in the corporate world. And even if, at an individual level, most technologists set out to benefit humanity, they can come up against complex ethical dilemmas for which they aren’t prepared. We think that mindsets could be altered and the producers of devices better equipped by embedding an ethical code of conduct into industry and academia. Medical students are taught about patient confidentiality, non-harm and their duties of beneficence and justice, and are required to take the Hippocratic Oath to adhere to the highest standards of the profession.

Each human having a different journey, and some of us, might have a ‘dark passenger’, a vulnerability (which should not be up-used by someone else) as disappointment, shame, depression, anxiety, grief and loss, should not be a reason for our valiance nor an excuse. Managing them was not a subject taught in school (ABU ZUHRI, SEVEN ELEMENTS IF TAUGHT IN SCHOOL YESTERDAY, MAY HAVE RESULTED IN MORE INTELLIGENCE TODAY, 2018).

Asking for professional help might be the best option not only to you, but for a lot of people souls could be saved. Killing any other human in real life should not be an option, as it’s not another video games for leveling up. Killing another human could not be an option due to the existing role of music in our brains. Killing should not be an option, as we are not living in movie and we are not the superhero outside the justice system. And killing should not be an option, in case we lost someone we care about, just because accepting our emotions were not that easy. We do need to remind ourselves, saving one human being for dying, as valuable as we saving all the human, and killing one human being, is as considered killing everyone else in this life. It cannot be stressed enough the fact that each individual needs to map his or her own personal journey towards holistic health. There is no single solution that could fit us all.

REFERENCES

ABU ZUHRI, F. (2017). HOW ONE OF YOUR VIRTUAL PERSONA COULD WORTH 500 M EURO. Retrieved from ZAHF.ME: https://www.zahf.me/how-one-of-your-virtual-persona-could-worth-500000000-00-euro/

ABU ZUHRI, F. (2018). 10 QUESTIONS TO KNOW IF YOUR CHILD TODAY MIGHT BE THE MOST WANTED CRIMINAL TOMORROW. Retrieved from ZAHF.ME: https://www.zahf.me/10-questions-to-know-if-your-child-today-might-be-the-most-wanted-criminal-tomorrow/

ABU ZUHRI, F. (2018). COULD HUMANS BE MORE INTELLIGENT? Retrieved from ZAHF.ME: https://www.zahf.me/could-humans-be-more-intelligent/

ABU ZUHRI, F. (2018). INTELLIGENT COMMUNICATION WITHIN THE BODY AND HOW TO BE SMARTER. Retrieved from ZAHF.ME: https://www.zahf.me/intelligent-communication-within-the-body-and-how-to-be-smarter/

ABU ZUHRI, F. (2018). SEVEN ELEMENTS IF TAUGHT IN SCHOOL YESTERDAY, MAY HAVE RESULTED IN MORE INTELLIGENCE TODAY. Retrieved from ZAHF.ME: https://www.zahf.me/seven-elements-if-taught-in-school-yesterday-may-have-resulted-in-more-intelligence-today/

ABU ZURHI, F. (2017). HOW YOU STILL EXIST HERE, WHEN YOU ARE ALREADY THERE. Retrieved from ZAHF.ME: https://www.zahf.me/how-you-still-exist-here-when-you-are-already-there/

Anderson, C. A., Berkowitz, L., Donnerstein, E., Huesmann, L. R., Johnson, J. D., Linz, D., . . . Wartella, E. (2003). The influence of media violence on youth. Psychological Science in the Public Interest, 4 (3): 81–110.

Ashton, S. (2013). Lion King Subliminal Message. Retrieved from https://youtu.be/edtwq4P8jUM

ASSAGIOLI, R. (n.d.). The Harmful Effects of Music on Body and Mind. Retrieved from The Unbounded Spirit: https://theunboundedspirit.com/the-harmful-effects-of-music-on-body-and-mind/

AZDigitalTransfers. (2011). Walt Disney’s “Aladdin” Subliminal Message? Retrieved from https://youtu.be/1QYYOuQGEp0

Batelaan, N. M. (2012). Evidence-based pharmacotherapy of panic disorder: an update. International Journal of Neuropsychopharmacology, 15 (3), 403–415.

Beacham, S. (2017, AUG). Tips to Help Kids Protect Themselves from ‘Brain Hacking’. Retrieved from Susan Beacham: http://susanbeacham.com/tips-help-kids-protect-from-brain-hacking/

Buckley, M. (2006). Little Mermaid Erection. Retrieved from https://youtu.be/InFLnzeQjWw

Cope, E. (2019). THE BROKEN GENERATION With child suicide rates soaring, we find out what’s pushing our kids to the brink. Retrieved from The Sun: https://www.thesun.co.uk/fabulous/8676175/fabulous-investigates-rise-child-suicide/

Dodgson, L. (2018). A cheesemaker is Switzerland is playing hip-hop and rock to his Emmental to make it taste better. Insider.

Dr.Bob. (2016). Mental Health. Retrieved from The Drugless Doctor: https://druglessdoctor.com/health-topics/mental-health/

Dredge, S. (2015, JUN). BBC reveals mind control experiment – for choosing what to watch next. Retrieved from Guardian News & Media Limited: https://www.theguardian.com/media/2015/jun/18/bbc-mind-control-experiment-iplayer

Ea, P. (2018, March 18). We need to talk about mental health. Retrieved from youtube.com: https://youtu.be/6YbWRqsnHdo

Emoto, M. (2000). Messages from Water, Vol. 1. Hado Kyoiku Sha Co., Ltd.

Kalogridis, L. (Director). (2018). Altered Carbon [Motion Picture].

Kelly, R. (2019). It was frightening to struggle with antidepressants, but now I know there is another way. Retrieved from NewStatesman: https://www.newstatesman.com/politics/health/2019/03/it-was-frightening-struggle-antidepressants-now-i-know-there-another-way

Kennaway, J. (2011). Musical Hypnosis: Sound and Selfhood from Mesmerism to Brainwashing. Retrieved from OXFORD ACADEMIC: https://academic.oup.com/shm/article/25/2/271/1739124

Kolenda, N. (2019). Subliminal Messages: Do They Really Work? Retrieved from Nick Kolenda: https://www.nickkolenda.com/subliminal-messages/

Lightfoot, S. (Director). (2017-2019). The Punisher [Motion Picture].

Manos, J. (Director). (2006-2013). Dexter [Motion Picture].

PATEL, J. K. (2018, FEB). After Sandy Hook, More Than 400 People Have Been Shot in Over 200 School Shootings. Retrieved from The New York Times Company: https://www.nytimes.com/interactive/2018/02/15/us/school-shootings-sandy-hook-parkland.html

Rafael Yuste, S. G. (2017). Four ethical priorities for neurotechnologies and AI. Nature 551, 159–163.

Sample, I. (2017, APR). New human rights to protect against ‘mind hacking’ and brain data theft proposed. Retrieved from Guardian News & Media Limited: https://www.theguardian.com/science/2017/apr/26/new-human-rights-to-protect-against-mind-hacking-and-brain-data-theft-proposed

Schleiffarth, T. (2017). What Happens to Your Brain When You Listen to Music. Retrieved from selecthealth: https://selecthealth.org/news-and-articles/2017/02/what-happens-to-your-brain-when-you-listen-to-music

Sharma, S. (2017). The Effect of Music on Human Health and Brain Growth. Retrieved from Owlcation: https://owlcation.com/social-sciences/The-Effect-of-Music-on-Human-Health-and-Brain-Growth

Tay, L., & Kuykendall, L. (2016). Why self-reports of happiness and sadness may not necessarily contradict bipolarity. a psychometric review and proposal. Emotion Review, 9 (2), 146-154.

Wachowski, L., & Wachowski, L. (Directors). (1999). The Matrix [Motion Picture]. Retrieved from https://www.imdb.com/title/tt0133093/

Williams, M. (2019). Health Benefits of Music Therapy. Retrieved from CPR Certified: https://www.cprcertified.com/health-benefits-of-music-therapy

THE ILLUSION OF THE CYBER INTELLIGENCE ERA

The book is the result of my two academic interests. On a professional level I have too often found that there is a lot of misleading information being dished out on the reasons behind some of the most high profile cyber attacks. Both the media and the so called security experts end up in a blame game without factual evidence or a clear understanding of what lies behind the obvious. My research focuses on proposing a model for Cyber Criminal Psychology & Profiling that incorporates multiple intelligence, Interviewing Techniques, Cyber Criminal Psychology, Cyber forensics and Offender Profiling. The traditional model of offender profiling does not incorporate the human side of the profiler nor the offender. A better profile of a Cyber-Criminal will help in speeding up the investigation process and ensuring better identification of the Cyber-Criminal.

On a personal level, especially after going through a traumatic cancer struggle, I have found that people around me are missing vital things in life. Some out of ignorance and some out of misinterpretation of facts.

The book is a collection of 31 articles, which took almost three years of constant effort. The book is split into five chapters, each representing a unique theme, each with multiple articles of interest. Chapter 1 focuses on Cyber Forensics, Chapter 2 on Profiling, Chapter 3 on Interview Techniques, Chapter 4 on Forensics Psychology and Chapter 5 on Multiple Intelligences. Although the chapters are in a certain order, each article can be read on its own in any order.

The one thing I learnt in preparing the articles is how valuable knowledge of the self and surroundings are in figuring out better solutions for oneself and in the workplace. I hope you enjoy reading these articles as much as I enjoyed writing them. I also hope you find them useful.

Negotiating the Impossible: How to Break Deadlocks and Resolve Ugly Conflicts (without Money or Muscle)

Some negotiations are easy. Others are more difficult. And then there are situations that seem completely hopeless. Conflict is escalating, people are getting aggressive, and no one is willing to back down. And to top it off, you have little power or other resources to work with. Harvard professor and negotiation adviser Deepak Malhotra shows how to defuse even the most potentially explosive situations and to find success when things seem impossible.

Malhotra identifies three broad approaches for breaking deadlocks and resolving conflicts, and draws out scores of actionable lessons using behind-the-scenes stories of fascinating real-life negotiations, including drafting of the US Constitution, resolving the Cuban Missile Crisis, ending bitter disputes in the NFL and NHL, and beating the odds in complex business situations. But he also shows how these same principles and tactics can be applied in everyday life, whether you are making corporate deals, negotiating job offers, resolving business disputes, tackling obstacles in personal relationships, or even negotiating with children.

As Malhotra reminds us, regardless of the context or which issues are on the table, negotiation is always, fundamentally, about human interaction. No matter how high the stakes or how protracted the dispute, the object of negotiation is to engage with other human beings in a way that leads to better understandings and agreements. The principles and strategies in this book will help you do this more effectively in every situation.

Dr. Bob’s Drugless Guide to Balancing Female Hormones

Ladies, there are a few essentials in life. Chanel No. 5, a black dress, Sean Connery, and this book. You have hormones; Dr. Bob knows how to bring clarity to what you experience. A must read for you, your girlfriends, and your family.

Book Takeaways:
– Restore hormonal function without medication
– How to prevent osteoporosis
– Ignite your desire for sexual intimacy
– Reverse heavy menstrual issues

THE NEGATIVE IMPACTS OF CREDIT CARD WITHIN CYBER ERA

THE NEGATIVE IMPACTS OF CREDIT CARD WITHIN CYBER ERA

FADI ABU ZUHRI

INTRODUCTION

A credit card is a payment card containing virtual money that is handed out to users to allow them to make payments to the merchant based on the creditor’s promise to the user to pay the deposit and other agreed commissions. The card organizer (frequently the bank, or a other financial institution) makes a negotiable account and provides a credit card to the cardholder, where the cardholder may request loans to make payments to the merchant or as a cash advance (Yilmazkuday & Yazgan, 2011). In addition, credit cards combine payment services with credit extension. The complex pricing in the credit card industry limits customers’ ability to make comparisons between different credit providers in order to ensure the competitiveness of the sector and maximize the benefits of the credit industry. As a result, various legislators have controlled the fees of the credit card.

IS CREDIT CARD REALLY A GOOD IDEA – PROS & CONS OF A CASHLESS ECONOMY

Credit fuels consumption and therefore functions as an extra demand for production. Credit is the ultimate answer to implementing the statement “I want it now”. But credit creates an illusion of an exaggerated financial potential. Lie (2017) argues that most people who are used to using credit cards often fail to see that their red accounts have reached the monthly salary level, or went even beyond. Furthermore, some are not sufficiently enough aware of the cost attached to the loan / credit taken, in the form of the most recent interest rates applicable. Today people like going cashless when buying almost anything with a credit card, such us: a simple TV, cell phone, car, even an apartment or a country house. Without a doubt, credit is a very practical and profitable discovery made by the humanity, however it comes with a number of negative impacts as well.

Hodson, Dwyer, and Neilson (2014) point out that a credit card is different from a payment card and the amount used must be fully repaid each month, otherwise significant cumulative interest rates will be triggered. On the other hand, credit cards allow consumers to obtain a permanent debt balance, with interest payments. A credit card is unlike a debit card that can be used as virtual money by the cardholder. Themba and Tumedi (2012) point out that the credit card is not like the debit card, as a credit card is typically a third party that pays the merchant and is compensated by the customer, while the charge card issues the buyer’s payment up to a later date in a cashless society. Nevertheless, credit cards have some negative impacts.

In fact, reaching the credit limit is a bad idea. Certain countries apply a credit scoring which determines your credit limit. The percentage of credit a person uses in relation to the available individual income must not exceed a certain percentage of their credit score. Paying the monthly credit card bills promptly could allow the user to build a better score faster, but there are disadvantages. In accordance with the terms, it may be wise to pay using a credit card in a smart city that promotes a cashless economy. However, credit card companies entice users to spend more by giving them loyalty points that can be redeemed for benefits. Such marketing strategy determines users to look for more ways to spend and earn points (McHugh & Ranyard, 2012).

According to Lie (2017), various bills are not equal and one has to assess each of them to decide which one is best for paying with a credit card. There are pros and cons of paying bills with credit cards. Anyone who wants to pay bills with a credit card must have discipline and must not spend the money that he or she normally pays the bills with. The user has to pay the credit card bill with cash or from a debit card, not from other credit cards. Lie (2017) also points out that it is very important to keep the credit card balance under 30 percent of the limit. The high use of credit cards can negatively affect the credit position of the user and even damage their credit worthiness. If the users pay bills they cannot afford using credit cards, it can result in paying a lot of interest when using virtual money.

In both cases, it should be noted that going cashless frequently in a smart city confirms that the purchase price of goods is much greater than the actual price of the product. It is referred to as “I want it now”, and it also includes excessive payment for the goods. The only thing that needs to be done is to compare the amount with the rate of rising debt. Everybody knows that credit encourages consumption and, therefore, production. However, every borrower of a loan must offer certain guarantees for the loan commitments (Hodson, Dwyer, & Neilson, 2014). Over indebtedness leads to a need to an increase in the income of debtors and, therefore, to a chronic excess of the rate of consumption, depending on the contractual guarantees. Think for a moment that everything a person uses is purchased on credit. All the things one uses and buys, such as the TV, the restaurant bills, the furniture bought on credit are adding up to a point where the user’s monthly salary cannot keep up with prompt payments.

Many people do not have any savings because almost all of their salaries are used to pay off the loans they use. These loans are called subprime and if these people were to lose their jobs, the following day in front of their houses there will be a long queue of creditors looking for guarantees on payment obligations that the debtors got themselves into. Therefore, most people are anxious to get decently well paying jobs with enough wages to meet or exceed their monthly payment obligations. McHugh and Ranyard (2012) indicate that if the customers do not pay the credit in due time, their accounts are “fined”. In the worst case scenario, their property may end up under the hammer. If the same situation continues, when one cannot pay the loan, it happens on a global scale, that the property will be auctioned off, however no one can buy it at the auction because the neighbours of their neighbours will find themselves in the same situation, as it was the case in the 2008 financial crisis, or Detroit housing market.

Time passes very fast. If we were to consider some time back, the purchase of an item on credit took on a “state” role. Yilmazkuday & Yazgan (2011) argue that today, purchasing on credit is a common and routine activity that has nothing to do with stringent government approvals. Many people do it, often times without thinking about the results. It is not a secret that if people do not have enough money to pay the total purchase price, for example for a washing machine, a car, or a new apartment, they will take it on credit or loan. From a rational and practical point of view, credit is a direct alternative to loan stacking.

Meltzer (2013) argues that people can be better without a credit card because they can learn to have self-control. At best, the reluctance to have self-control when people have money can deprive them of their financial security. In the worst case, an impulsive attitude towards purchases can also negatively affect other forms of their lives. Yes, the restriction can be both difficult and annoying, but there are other valuable rewards of these people being able to afford their homes.

An often-overlooked benefit of credit cards is the payment protection feature. It’s called ‘chargeback’ and it means that if you don’t receive the goods you bought, you may be able to get your money back. Some card companies also refund the charge if the customer is not happy with the product or service (Money Team, 2018).

CONCLUSION

To sum up, people need to be smart with their credit cards. Here are a few tips: don’t charge food purchases, create a budget, read the fine print, don’t buy what you cannot afford and simply leave your credit card at home (Khaleej Times, 2018).

While offering the charm of easy and quick money, credit cards have fuelled a cashless economy and destroyed financial prudence. If you want it, you can get – seems to be the motto for the younger generation that doesn’t seem to know the difference between what is an asset and what is a liability. Once caught in the web trap of paying off interest on the principal amount, people could very well be tempted to criminal behaviour to pay off their debt. Could we be stoking a new generation that is financial less secure and therefore more inclined to beg, borrow or steal, in order to buy their next object of desire?

Some say that paying with hard cash gives the product a higher psychological value than that which is bought with a single swipe of a credit card where you don’t have to pay anything until the next bill is generated. Are we not promoting irresponsible consumerism and individual bankruptcy, with all the implications involved, in the name of going cashless or priceless?

REFERENCES

  1. Hodson, R., Dwyer, R., & Neilson, L. (2014). Credit Card Blues: The Middle Class and the Hidden Costs of Easy Credit. Retrieved 2018, from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4707673

  2. Khaleej Times. (2018, August 25). Be smart with your credit card.

  3. Lie, C. (2017). The “Negative” Credit Card Effect: Credit Cards as Spending-Limiting stimuli in New Zealand. The Psychological Record , 60 (3), 399–411.

  4. McHugh, S., & Ranyard, R. (2012). Credit repayment decisions: The role of longterm consequence information, economic and psychological factors. Review of Behavioral Finance , 4 (2), 98-112.

  5. Meltzer, H., Bebbington, P., Brugha, T., Farrell, M., & Jenkins, R. (2013). The relationship between personal debt and specific common mental disorders. European Journal of Public Health , 23 (1), 108–113.

  6. Money Team. (2018, July 1). Visa, Mastercard & Amex Chargeback. Retrieved 2018 from https://www.moneysavingexpert.com/shopping/visa-mastercard-chargeback/

  7. Themba, G., & Tumedi, C. B. (2012). Credit Card Ownership and Usage Behaviour in Botswana. International Journal of Business Administration , 3 (6).

  8. Yilmazkuday, H., & Yazgan, M. E. (2011). Effects of credit and debit cards on the currency demand. Applied Economics , 2115-2123.

THE IMPORTANCE OF PROJECTIVE PSYCHOLOGICAL TESTING WITHIN FORENSIC PSYCHOLOGY TO DECODE CRIMINAL BEHAVIOUR

THE IMPORTANCE OF PROJECTIVE PSYCHOLOGICAL TESTING WITHIN FORENSIC PSYCHOLOGY TO DECODE CRIMINAL BEHAVIOUR

FADI ABU ZUHRI

INTRODUCTION

Using Projective Tests have become quite common in Forensic Psychology. This paper reflects upon the role of Projective Tests within Forensics Psychology as a tool to decode criminal behaviour.

FORENSIC PSYCHOLOGY

Forensic Psychology is the branch of science that provides a clear meeting point between law and human behaviour (Ioannou, Canter, Youngs, & Synnott, 2015). It entails measuring critical legal practices, especially the one pertaining to professional witness and testimony within the context of the investigation. The most significant and interesting issue within Forensic Psychology is the ability of witness to provide a clear and error-free testimony in the courtroom concerning the incidence, information that can be verified to be legally correct. In order to have a non-doubtful testimony, the Forensic Psychologist must possess a deeper know-how about rules and regulations regarding the legal system and be able to comprehend them inside out. In other words, they must comprehend the entire judicial system.

A trained Forensic Psychologist is confident in providing quality testimony that avoids confusion in the courtrooms. Costanzo (2013) points out that Forensic Psychologists are specialists in human behaviour. Neuropsychologists, specialists in the structure and function of the brain as they relate to specific psychological processes and behaviours, are required by courtrooms to discuss issues relating to the brain and human behaviour. They may further be used to discern whether an individual is proficient in the trial.

Neal (2016) indicates that most of the queries asked by Forensic Psychologists are connected to the legal system and the answers are in a language that can be understood by everyone in the court. It is always advisable for any Forensic Psychologist to ensure that he or she is able to translate the information from a psychological perspective to a courtroom perspective. This will ensure that the case gets the treatment it deserves.

According to Costanzo (2013), Forensic Psychologists are resourceful personnel who uphold dignity in their practices. They are called upon to train other people in the various fields of the profession. They work with police departments to ensure criminal issues are dealt with in a manner that is legally clear. Interestingly, they help in the judicial selection of personnel in the United States of America.

In addition, Forensic Psychologists aid in enacting laws. They are trained to ensure they can fully handle behaviours of the victims of crisis and suicidal practices. They also offer counselling to affected families (Ioannou, Canter, Youngs, & Synnott, 2015).

PROJECTIVE PSYCHOLOGICAL TESTS

A Projective Test is a personality test aimed at letting individuals respond to unclear stimuli, internal conflicts and presumably examining in-depth emotions displayed by the individual (Bornstein, 2007). It is in contrary to a self-report test or an objective test that is linked to a structured method as responses are evaluated about presumed common standards, for instance, an exam with multiple choices. Similarly, they are restricted to the exam details. The answers to the predicted test are detailed for a reason as opposed to the basis of presumptions on the meaning, for instance, in the objective analysis. Projective Tests originate from psychoanalysis, which states that people have unconscious motivations as well as attitudes that are beyond their conscious awareness.

The Austrian neurologist, Sigmund Freud, is known as the founder of psychoanalysis, which is based on a dialogue between a patient and a psychoanalyst. Freud was also well known for his analysis on psychosexual development of an individual (Patel, 2013). Freudian psychology emphasized the importance of understanding unconscious information as a predictor of our everyday behaviour. He came up with the concept projecting one’s own unconscious onto a person or object (AllPsych, 2018).

According to Miller (2015), the essential theoretical basis in Projective Test relates to given questions raised; the responses will be consciously stipulated as well as socially tested. The answers are not linked to the unconsciousness of the respondent or the implicit motivations or views. The respondent’s in-depth motives are not necessarily recognized as conscious by the respondent, or he/ she may be unable to express themselves verbally or in an appropriate structure as guided by the interviewer. Advocates of the Projective Test emphasize that the uncertainty of provocations given in the test enables subjects to give out their hidden thoughts that fail to be captured by other tests. From the 1980s to the 1990s, research conducted has shown that implicit motivation is reflected in the increased use of tools linked to the research.

Rorschach Inkblot is a widely known Projective Test established in 1921 to aid diagnosis of schizophrenia (Hatano, Yamada, Nakagawa, Nanri, Kawase, & Kenji, 2014). The subjects’ perceptions of inkblots are recorded and analysed using psychological interpretation or even algorithms. The reactions are then evaluated in many ways by considering not only the information given but also the duration it took before a response is made. Other variables considered are – how the given response compares to other people’s perceptions for similar drawing, and lastly, the aspect of the picture and how it was focused. Experts are consulted to conduct Projective Test like Rorschach Test in coming up with consistent and valid outcomes.

Thematic Apperception Test (TAT) is identified as a critical Projective Test in which a person evaluates unclear events of others, and he or she is interviewed to narrate some aspects of the scene, for instance, what caused the scene, what are the feelings of the people and what are the possible outcomes. The above process assesses the subject’s descriptions while discovering their motivations, conflicts, as well as outlooks. Researchers may employ scoring systems aimed to establish a reliable methodology of expressed thoughts in addition to behaviours.

The Szondi test is a nonverbal projective personality test developed by Léopold Szondi. Szondi lists eight human drive needs that are linked to action. A Szondi test involves showing facial photographs to a person, the photographs are displayed in six groups of eight each. The subject is asked to select the most appealing and most repulsive photos in each group. The selection provides an indication of the satisfied and unsatisfied needs of the subject’s personality (Zaffaroni & Oliveir, 2013).

To sum up, Projective Test relates to the respondent’s perceptions, answers, motivations and unconsciousness attitudes (Cariola, 2014).

CRIMINAL BEHAVIOUR ASSESSMENT

According to Sloane (1992), behavioural analysis is the science that relates to the way a person or animal conducts oneself, to his surroundings and to others. Sulzer-Azaroff & Mayer (1991) defined it as an organized study of variables influencing the behavioural patterns of the organisms. Behaviour Analyst Certification Board (2017) on the other hand, said that behavioural analysis is a scientific study focusing on the principles of learning and behaviour.

The study aims to provide understanding, give explanation, classification and prediction on the behaviour. This science of behavioural analysis is not similar to other areas of psychological studies or fields that attempts to dissect behaviour (Sloane, 1992). The science of behavioural analysis is commonly used in detecting mental aptitude, undertaking behavioural assessments, determining appropriate treatment plans for mental patients, training practitioners and as well as in crime investigations (Behavior Analyst Certification Board, 2017).

In the study of behavioural analysis, there were two primary and distinct fields of study that came into existence and these are the experimental analysis of behaviour and applied behaviour analysis. The experimental analysis of behavioural analysis is the scientific foundation of the discipline in which various empirical studies, research, literatures and data on behavioural analysis had been accumulated over the years in the furtherance of the understanding of this science. It is where the applied behavioural analysis came about. (Behavior Analyst Certification Board, 2017)

Applied behavioural analysis is a methodical approach that aims to influence the established vital social behaviour by identifying relevant and similar environmental variables thereby producing a significant behavioural change as a result of the usage of such findings (Behavior Analyst Certification Board, 2017). The latter aspect of behavioural analysis comes into play when it is conducted in a real-world setting with raw and unadulterated subject study rather that conducting it in laboratories (Baer, Wolf, & Risley, 1968).

EMOTIONAL INTELLIGENCE (EQ) IN CRIMINAL BEHAVIOUR ASSESSMENT

Emotional Intelligence (EQ) as a concept was first introduced by Salovey and Mayer (1990) as a kind of social intelligence, distinct from general intelligence. It refers to the capacity to track one’s personal emotions and that of others, distinguish between them and make use of this information as a reference for one’s behaviour, actions or views. EQ was soon extended to include an individual’s capacity to accurately perceive, assess and express emotions; the capacity to understand and appreciate emotions; and the capacity to regulate these emotions in order to spur emotional, as well as intellectual, development (Mayer & Salovey, 1997). From this, one can see that the concept had evolved through time to encompass many emotional facets, as well as their relationship with other forms of human intelligence. Given this extensive definition, there is no question that EQ can play a pivotal role in the behaviour, perceptions and dispositions of individuals within organisations and as professionals and employees. There are many measures to assess a person’s EQ reflecting the differences among academics and experts on how EQ is treated and analysed. Among these tests are Emotional Quotient Inventory or the Swinburne University Emotional Intelligence Test and the Mayer-Salovey- Caruso Emotional Intelligence Test (Harms & Crede, 2010).

The novelty of the idea behind EQ made it an interesting subject of inquiry in the field of management and organisational studies. Due to the far reaching coverage and implications of EQ for organisations across industries and nature of work, many scholars and researchers had attempted to study EQ in an attempt to better understand its dynamics and how it can be harnessed by organisations to their advantage. Goleman (1998) popularised the concept of EQ initially espoused by Salovey and Mayer (1990). He came to define the concept as the ability to recognise one’s feelings and that of others to motivate one’s self and to manage these emotions personally and in the course of one’s interaction with others. He formulated a theory on EQ that is directly tied to performance since he believes that EQ has direct bearing in work and organisational effectiveness, in particular in forecasting performance in different activities from sales to top leadership (Goleman, 1998).

Bar-On (1997) defined EQ as an umbrella concept comprising non-cognitive abilities and competencies which aid one in overcoming environmental pressures and demands. He advanced a model of non-cognitive intelligences made up of five broad areas from the personality domain, including intra-personal and inter-personal capacities, ability to adapt, stress management and general mood, such as happiness and optimism. On the part of companies, this illustrates relevance of managing and tapping the EQ of their personnel. Because these domains have a bearing on the outlook of employees and how they will respond to the demands of work, as well as changes within organisations, interest in EQ heightened.

While there are people who have a higher innate emotional quotient than others, EQ skills can be learned and honed through steady commitment, dedication and practice. For this to happen, one must have a sustained drive to learn, obtain relevant feedback and continuously buttress their EQ abilities (Serrat, 2009). Indeed, EQ is becoming a new benchmark or yardstick by which employees and prospective candidates for new posts are assessed. People are not just rated for their intelligence, training, work experience, and industry expertise, but also for their ability to handle and manage their emotions within themselves and in the course of their interaction with their co-workers (Serrat, 2009).

While studies on the implications of EQ in various sectors, such as health, education and clinical psychology, had been made, EQ’s applications on the workplace generated the greatest amount of inquiry (Jordan, Ashkanasy, & Ascough, 2007). This can be attributed to the desire on the part of organisations to search for new ways to enhance performance, as well as the growing desire of managers to be able to forecast or assess the behaviour of their subordinates in the actual work setting (Jordan, et al, 2007). The promising benefits and advantages offered by EQ, therefore, attracted the attention of many companies and organisations.

It would be in the great interest of organisations to tap into their employees’ EQ and marshal this tremendous force to advance their company’s well being. Improved sales, enhanced recruitment and retention of highly qualified and competent staff and more effective leadership are among the promises of EQ (Serrat, 2009). Therefore, possessing a great degree of EQ proves to be a great advantage. Weisinger (1998) pointed out that people with high EQ levels are said to enjoy more success in their chosen careers. In turn, this idea of self-fulfilment, happiness and contentment with one’s work is a great motivating factor for employees to excel in their work. Jordan et al (2002) noted that such people also experience less job insecurity compared to those with lower EQ levels. This job insecurity would then act as a de-motivator, contributing to the subpar performance of affected personnel. Jordan et al (2002) also found out that an employee’s commitment to an organisation is moderated by his or her emotional intelligence; hence those with high EQ are more likely to have high affective commitment even at times of extreme work pressure or stress. EQ was also revealed to be positively connected with altruism, job commitment and satisfaction and affective organisational commitment (Carmeli, 2003). Carmeli (2003) also maintained that EQ can improve contextual performance and reduce distress allowing employees to think and act in a more emotionally intelligent manner. Wong and Law (2002) supported the claim of a positive linkage between EQ and organisational commitment and added that EQ can mitigate turnover intention of subordinates. EQ aids in organisational effectiveness not only through enhanced work commitment, but also through boosting morale, teamwork and improved health (Cherniss, 2001). Thus, it makes sense to say that people with high EQ constitute a pool of worthy and much coveted labour force.

Aside from reinforcing commitment to the profession and the company, EQ also had an effect on inter-personal relationships. It was said that people with greater EQ are more likely to develop harmonious relations with their peers in the workplace (Maslow, 1943). This is because such individuals can recognise, understand and manage their emotions and that of others, enabling them to interact with their colleagues well (Mayer & Salovey, 1997). According to Lopes et al (2005), EQ was positively related to interpersonal sensitivity and pro-social inclinations. The connection between EQ and positive peer nomination, as well as identification of reciprocal friendships, was also established was also established by this study. From this, it can be said that there is a strong case for a linkage between EQ and interpersonal skills and relationship management.

In addition, Slaski and Cartwright (2002) also argued that higher EQ enable individuals to easily adjust to stress, because of their better coping mechanisms (Bar-On, Brown, Kirkcaldy, & Thome, 2000). EQ training was also found to contribute in more positive perceptions of work life quality and reduced distress, aside from increasing morale (Slaski & Cartwright, 2003). This is very important as the demands of work may really exact a toll on employees. Getting people with greater resilience and tolerance to such pressures and demands, as well as having a clear perspective on what is expected of them, is definitely a key strategy in cornering the right human assets for the organisation. Finally, Van Rooy and Viswesvaran (2004), in a meta-analysis study, revealed a positive association between EQ and performance in the workplace, as well as in the school. In terms of team performance, high EQ teams were found to perform at a high level even without training, while teams with low EQ have to undergo specific trainings to attain the same performance level of their high EQ counterparts (Jordan & Troth, 2002). Such an edge can be attributed to the emotional element present in team decision making putting teams with high EQ in a clear advantage (Jordan & Troth, 2004). In another study, it was stated that EQ constitutes a crucial element in customer interaction, especially among service-oriented employees, thus EQ also has bearing on enhancing customer satisfaction experience (Rozell, Pettijohn, & Parker, 2002). Given this, there is no question that the attention EQ is getting from organisations scholars is valid and very much warranted.

Studies also show that people with higher EQ have good conflict resolution competencies. This can partly stem from the assertion that all conflicts are emotional in nature since they involve views of threats or risks to individual or organisational objectives (Jordan & Troth, 2004). Weisinger (1998) pointed out that conflict management and improving relations within organisations require adept emotional management strengths. This makes it imperative for companies to train their managers on EQ so that they will be more equipped in handling tensions or differences among their employees in the workplace. Higher EQ confers on employees a greater capacity to deal with pesky superiors at work through better conflict resolution capabilities (Lubit, 2004). This makes it sensible to develop the EQ not only of managers, but also of employees so that they can better deal with differences they may have with their bosses and so that such conflicts may not stand in the way of them fulfilling their designated duties and responsibilities. When faced by conflict, people with greater EQ are more inclined to adopt collaborative solutions and select not to avoid the issue as collaboration attests to their capacity to appreciate and control their emotions (Jordan & Troth, 2002). In his EQ model, Goleman (2001) included conflict management as one critical competency. This underpins the connection between EQ and conflict resolution. Similarly, in terms of negotiations, people with higher EQ were also found to lay down better positive affective tone from the onset paving the way for integrative resolutions (Foo, Anger Elfenbein, Tan, & Aik, 2004).

While there is much literature on the definition and underpinnings of EQ, as well as its benefits and advantages when applied in the workplace, there are not many studies available on EQ’s impact on Cybercriminal investigation. However, the fact that most of the studies have the general office setup as context may lend credence to the applicability of these researches in Cybercriminal investigation. Besides, the investigation task is packed with demands and pressures and is also emotionally laden given its sensitivity and intricacies, the number of stakeholders involved and the importance of forensic investigation.

Crime scene investigation is a gruelling task that entails a lot of considerations. As such, investigators are exposed to a lot of pressure, intimidation, opposition in their daily lives in the office. This highlights the importance of having a tough EQ on the part of those involved in this delicate job. Competency is not enough as it is essential for investigators to work with people and enjoy the respect of others. The environments where investigators operate are full of emotions from helpful to uncooperative clients to colleagues who may send out negative or positive emotional responses. Emotions are known to affect judgment (Chung, Cohen, & Monroe, 2012). Because investigators perform a very crucial task of identifying and analysing evidence, efforts must be extended to ensure that their work is not compromised, as this would have serious legal, business and regulatory repercussions.

OFFENDER PROFILING IN CYBERCRIMES

Psychological profiling is mostly used in solving murder cases (Reyes & Wiles, 2007). However, according to Lickiewicz (2011), psychological profiling is also applicable to Cybercrimes. He added that profiling, although not meant to specifically identity the perpetrator, can help narrow down the search area, improve the law enforcement’s future investigation, create better approach or measures in detection and provide familiarity of the perpetrator based on his modus operandi (Lickiewicz, 2011). Gierowski & Najda (2010) pointed out that being able to experience and gather knowledge about such illegal activities would help interpret and analyse the evidence collected. From this, analysis of evidence will enable the authorities in profiling the offender. The analysis of evidence and the modus operandi is an inference on the psychological mind frame, motivation and behaviour of the perpetrator (Grance, Chevalier, & Kent, 2005).

According to Rogers (2006), the offenders of cybercrimes depend on the internet’s capability to cover their identities, thus their actions highly hinge on Anonymity. However, there is no causal connection with their anonymity in the conduct of crimes, modus operandi, motivation or the traces they leave in the scene of the crime (Rogers, 2006). McQuade (2009) added that offenders have their own way of breaking in and committing cybercrime through their own techniques or using applications or software. But because cybercrimes are frequently committed in sequence, there is a high likelihood of identifying the profile of the offender (Arkin, 2001).

Erbschloe (2001) asserted that there is a need to establish profiles of offenders of cybercrimes especially those that are considered to be terrorist attacks in the internet world because these individuals are becoming a serious threat to the security and privacy in the internet. Casey (1999) distinguished the types of investigation in cybercrime cases into two scenarios. One scenario is where the identity of the offender is unknown. The second scenario is where both the crime and offender is identifiable such as the case of child pornography, where the mere possession of such files is considered a crime (Casey, 1999).

According to Rogers (2001), the creation of a profile must first have data analysis in order to synthesize the possible persons to be identified as main suspects. Schell and Martin (2006) posited that the person investigating must be able to define the scale of ability of the offender, his skills and his motive in doing such crime. It is important that in making a profile, it must contain data indicating the possible sites where the offender can be found such as discussion groups, social media or Internet Relay Chat channels. In addition to this, there must be a careful analysis of the victim’s behaviour displayed in the internet and correlate his actions to his attack on the victim. One should also thoroughly analyse a victim’s actions on the Internet and find the reason for the attack on the victim. This way, a more detailed and specific profile is made in order that the offender’s future offense can be predicted and a trap can be set up (Schell & Martin, 2006). Pleskonjić et al (2006) also added that in building up a profile, it would be of immense value to estimate the age of the offender because it will be able to assert his motives, cultural behaviour and goals. Cultural behaviour is a vital element that can be influencing his/ her behaviour and with that, through psycholinguistic methods, his/ her future attacks can be predicted.

Casey (1999) emphasized the importance of profiling the offender and identifying his/ her behaviour and motivations. Doing so could give possible signs and clues of the place where the offender might be. Shaw (2006) suggested that in doing such profiling, there must be a group of experts specializing in security, laws and information technology. Shaw (2006) did not state the need for the participation of psychologists but he stressed that law enforcement agencies must not be involved in the profiling for such profile to be useful.

CONCLUSION

Despite all the developments in Forensic Psychology, it is still a fairly new area of psychology. The application of psychology in criminal proceedings involves various risks. Forensic Psychologists are therefore required to consider effective tools in identifying known and hidden behavioural characteristics. This has led to the move towards various Projective Psychological Tests described in this paper. Forensic and legal psychology is incomplete without delving into the unknown space of unconscious behaviour.

While forensic departments in certain countries have started using Projective Psychological Tests, there is an inherent risk of subjective interpretations. This is one reason why it has not gained worldwide acceptance. With so little of the unknown human drivers for action known, it is argued that additional information revealed through Projective Tests could prove valuable in certain cases. Forensic Psychology could, therefore, embrace Projective Tests as part of behavioural assessment.

The status of forensic psychology can be increased by quality research and realizing that there are areas in which the contribution of forensic psychologists is questionable (Louw, 2001). There is a huge gap in terms of competence building and knowledge transfer related to the application of Projective Testing in different scenarios. Perhaps relevant authorities could consider training programs and sharing lessons learnt from various investigations.

REFERENCES

  1. AllPsych. (2018). The Basis for Projective Techniques. Retrieved 2018 from https://allpsych.com/personalitysynopsis/projective/
  2. Arkin, O. (2001). Tracing hackers: A concept for tracing and profiling malicious computer attackers. Computer Fraud & Security , 8-11.
  3. Baer, D., Wolf, M., & Risley, R. (1968). Some current dimensions of applied behavior analysis. Journal of Applied Behavior Analysis , 91-97.
  4. Bar-On, R., Brown, J. M., Kirkcaldy, B. D., & Thome, E. P. (2000). Emotional expression and implications for occupational stress; an application of the emotional quotient inventory (EQ-i). Personality and Individual Differences , 28, 1107-18.
  5. Behavior Analyst Certification Board. (2017). About Behavioral Analysis. Retrieved February 6, 2017 from Behavior Analyst Certification Board: http://bacb.com/about-behavior-analysis/
  6. Bornstein, R. F. (2007). Might the Rorschach Be a Projective Test After All? Social Projection of an Undesired Trait Alters Rorschach Oral Dependency Scores. Journal of Personality Assessment , 88 (3), 354-367.
  7. Cariola, L. A. (2014). Assessing the alternate-form reliability of interview-based and web-based Rorschach responses measuring body boundary imagery and regressive imagery. Rorschachiana , 35, 42-65.
  8. Carmeli, A. (2003). The relationship between emotional intelligence and work attitudes, behavior and outcomes: An examination among senior managers. Journal of Managerial Psychology , 18, 788-813.
  9. Casey, E. (1999). Cyberpatterns: Criminal Behaviour on the Internet. In B. Turvey, Criminal Profiling. An Introduction to Behavioral Evidence Analysis. San Diego: Academic Press.
  10. Cherniss, C. (2001). Emotional intelligence and organizational effectiveness. In C. Cherniss, & D. Goleman, The Emotionally Intelligent Workplace (pp. 27–44). San Fransisco: Jossey Bass.
  11. Chung, J., Cohen, J., & Monroe, G. S. (2012). The Influence of Ethical Conflict and Emotion on Auditors’ Inventory Judgments. Retrieved 2016 from http://ancaar.fec.anu.edu.au/news/documents/ChungCohenMonroe.pdf
  12. Costanzo, M. A. (2013). Using forensic psychology to teach basic psychological processes: eyewitness memory and lie detection. Teaching of Psychology , 40 (2).
  13. Erbschloe, M. (2001). Information warfare. How to survive cyberattacks. New York: McGraw Hill.
  14. Foo, M. D., Anger Elfenbein, H., Tan, H. H., & Aik, V. C. (2004). Emotional intelligence and negotiation: the tension between creating and claiming value. International Journal of Conflict Management , 15, 411–436.
  15. Gierowski, J. K., & Najda, M. (2010). Podstawowa problematyka psychologiczna w procesie karnym. In J. K. Gierowski, & T. Jaśkiewicz-Obydzińska, Psychologia w postępowaniu karnym. Warszawa: Lexis Nexis.
  16. Goleman, D. (1998). What makes a leader? Harvard Business Review , 76, 93-102.
  17. Grance, T., Chevalier, S., & Kent, K. (2005). Guide to computer and network data analysis: applying forensic techniques to incident response. Gaithersburg: computer Security Division.
  18. Harms, P. D., & Crede, M. (2010). Emotional Intelligence and Transformational and Transactional Leadership: A Meta-Analysis. Journal of Leadership & Organizational Studies , 17 (1), 5–17.
  19. Hatano, Y., Yamada, M., Nakagawa, K., Nanri, H., Kawase, M., & Kenji, F. (2014). Using drawing tests to explore the multidimensional psychological aspects of children with cancer. Japanese Journal of Clinical Oncology , 44 (10), 1009–1012.
  20. Ioannou, m., Canter, D., Youngs, D., & Synnott, J. (2015). Offenders’ crime narratives across different types of crimes. Journal of Forensic Psychology Practice , 15 (5), 383-400.
  21. Jordan, P. J., & Troth, A. C. (2002). Emotional intelligence and conflict resolution: Implications for human resource development. Advances in Developing Human Resources , 4, 62-79.
  22. Jordan, P. J., & Troth, A. C. (2004). Managing Emotions During Team Problem Solving: EI and Conflict Resolution. Human Performance , 17, 195-218.
  23. Jordan, P. J., Ashkanasy, N. M., & Ascough, K. (2007). Emotional Intelligence in Organizational Behavior and Industrial-Organizational Psychology. In G. Matthews, M. Zeidner, & R. D. Roberts, The science of emotional intelligence (pp. 356-375). New York: Oxford University Press.
  24. Lickiewicz, J. (2011). Cybercrim Psychology – Proposal of an Offender Psychological Profile. Problems of Forensic Sciences , 239-252.
  25. Lopes, P. N., Salovey, P., Cote, S., & Beers, M. (2005). Emotion regulation abilities and the quality of social interaction. Emotion , 5 (1), 113-118.
  26. Louw, D. (2001). Forensic Psychology. International Encyclopedia of the Social & Behavioral Sciences , 5745-5750.
  27. Lubit, R. H. (2004). Coping with toxic managers, subordinates, and other impossible people. Upper Saddle River, NJ: FT Prentice Hall.
  28. Maslow, A. H. (1943). A theory of human motivation. Psychological Review , 50, 370–396.
  29. Mayer, J. D., & Salovey, P. (1997). What is emotional intelligence? In P. Salovey, & D. Sluyter, Emotional Development and Emotional Intelligence: Educational Implications for Educators (pp. 3-31). New York: Basic Books.
  30. McQuade, S. C. (2009). Encyclopedia of Cybercrime. London: Greenwood Press.
  31. Miller, J. (2015). Dredging and projecting the depths of personality: The Thematic Apperception Test and the narratives of the unconscious. Of Means and Ends: Mind and Brain Science in the Twentieth Century , 28 (1), 9-30.
  32. Neal, T. M. (2016). Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them? Retrieved 2018 from https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0154434
  33. Patel, A. P. (2013). Person of Issue: Sigmund Freud (1856-1939). The International Journal of Indian Psychology , 1 (1).
  34. Pleskonjić, D., Milutinović, V., & Maček, N. (2006). Psychological profile of network intruder. Conference IPSI, (pp. 23-26). Amalfi, Italy.
  35. Reyes, A., & Wiles, J. (2007). Best damn cybercrime and digital forensic book. Burlington: Syngress Publishing.
  36. Rogers, M. (2001). A social learning theory and moral disengagement analysis of criminal computer behaviour: an exploratory study. Manitoba: University of Manitoba.
  37. Rogers, M. (2006). The development of a meaningful hacker taxonomy: A two dimensional approach. Digital Investigations , 97–102.
  38. Rozell, E. J., Pettijohn, C. E., & Parker, R. S. (2002). An empirical evaluation of emotional intelligence: The impact on management development. The Journal of Management Development , 21, 272-289.
  39. Schell, B., & Martin, C. (2006). Webster’s New World Hacker Dictionary, . Indianapolis: Wiley Publishing Inc.
  40. Serrat, O. (2009, June). Understanding and Developing Emotional Intelligence. Retrieved 2016 from Asian Development Bank Knowledge Solutions: http://www.researchnest.com/all_reports/13089062351understanding-developing-emotional-intelligence.pdf
  41. Shaw, E. (2006). The role of behavioral research and profiling in malicious cyber insider investigation. Digital Investigation , 20-31.
  42. Slaski, M., & Cartwright, S. (2003). Emotional intelligence training and its implications for stress, health and performance. Stress and Health , 19, 233-239.
  43. Sloane, H. (1992). What is Behaviour Analysis? From Behavior Science of the Rockies: http://www.bsotr.com/pdf/What%20Is%20Behavior%20Analysis.pdf
  44. Trygg, L., Dåderman, A. M., Wiklund, N., Meurling, A. W., Lindgren, M., Lidberg, L., et al. (2001). Using projective tests in forensic psychiatry may lead to wrong conclusions. Only empirically tested tests should be used. Lakartidningen , 98 (26-27), 3118-23.
  45. Van Rooy, D., & Viswesvaran, C. (2004). Emotional intelligence: A meta-analytic investigation of predictive validity and nomological net. Journal of Vocational Behavior , 65, 71-95.
  46. Weisinger, H. (1998). Emotional Intelligence at Work. San Francisco, CA: Jossey-Bass.
  47. Zaffaroni, E. R., & Oliveir, E. (2013). Criminology and Criminal Policy Movements. UK: University Press of America.

RED AND BLUE TEAM FUNCTIONALITY – DOES OUTSOURCING DIGITAL FORENSICS MAKE SENSE?

RED AND BLUE TEAM FUNCTIONALITY – DOES OUTSOURCING DIGITAL FORENSICS MAKE SENSE?

FADI ABU ZUHRI

INTRODUCTION

Red teams are external units that evaluate the effectiveness of a security program. It is achieved by simulating the behavior and methods of possible attackers in the most convincing manner. Blue teams are integrated security groups that protect the organization from real attackers and the Red Teams. Since many security teams are not constantly attacked, most Blue Teams should be separated from established standard security groups (Miessler, 2016).

Red Team and Blue Team exercises were named after similar military experiences. The concept is that a group of security experts (the Red Team) is attacking an object, and the other group (the Blue Team) is protecting them. Initially, the exercises were ran by the army for military training. They have also been utilized to assess the physical security of high value assets, such as nuclear facilities.

According to Hargreaves and Chamberlain (2018), Red Teams have been hired to replicate the behavior and methods of the attackers in the most realistic possible way. For instance, this group may attempt to enter a commercial building by acting as a distribution controller in order to configure the device to facilitate public access. On the other hand, the Blue Team is responsible for defending against these attacks, and functions as the internal security team. The Red Team is generally security goal oriented and tries to secretly verify the company’s own defense. The team involves well-trained and technically competent security experts, whose goal is to ascertain and take advantage of security vulnerabilities in the system (CybeRisk, 2018).

Miessler (2016) argues that, excluding complex threats in the real world, the exercise will be very realistic. Red Team is not limited to IT tools and advanced technology to penetrate systems and buildings. It can include writing a personal malware and developing new methods, just as spiteful hackers do. Everything is allowed including social engineering and psychological manipulation to achieve their goals. If they need to mask their entry by posing as the courier to connect the USB device to a computer, so be it. The Blue Team is usually the company’s Director of Security at the Security Operation Center (SOC). SOC is made up of very qualified analysts who protect and improve the security of the organization 24×7.

Drinkwater and Zurkus (2017) point out that the Blue Team must determine, defend and weaken the Red Team. The attack simulation is intended to improve their capabilities by organizing them for dangerous attacks in the real world. Blue Team will identify and defuse the most demanding attacks and carefully monitor contemporary and evolving threats to the active protection of the company.

SHOULD DIGITAL FORENSICS BE OUTSOURCED WITHIN GOVERNMENTS AND/ OR FEDERAL INSTITUTIONS

Digital Forensics operates as part of the Blue Team, since it works as part of the SOC or the Computer Security Incident Response Team (CSIRT). Generally, not everything is included, but it has the background of the Security Operations Center. Digital Forensics requires tools to check deleted files in hard disks, memory, browser caches and Windows registry (Paganini, 2016).

There are two sides to the argument; one says outsource all you can for whatever resources and competences needed. The other says do not outsource critical functions which compromise your most valuable assets.

ARGUMENTS FOR OUTSOURCING

Evans (2016) points out that computer forensic reviews are generally performed inadequately in many medium and large institutions. Even though the current trend includes computer forensics as an integral discipline of an extensive information security program, there are several institutions with limited capability for computer forensics.

Devlin (2018) argues that if the institution has conflicting legal requirements or cannot provide a permanent source of support for this resource, it is reasonable to transfer it to a third party. Outsourcing solutions must be based on the required IT skills and, of course, on cost analysis. The organization must also determine the scope and possibility of the possible outsourcing contract, as well as the internal resources needed to attain the required capacity level.

Devlin (2018) indicates that there are four main reasons for this inconvenience: computer forensic examinations and their assistance activities are very costly, complex and technically complex with possible legal consequences; new tools and methods with constant updates are usually required to adapt to new technologies and threat models; it may be hard to validate the establishment and maintenance of a legal laboratory that will continue the process of collecting all the notches and is based on the burden of proof; and the protection of this capacity requires the development and formation of a large number of people.

The lack of specialists, such as digital forensic investigators, is a real problem. The analysis of any digital data is annoying and time-consuming, even with the aid of a specialized software. Digital forensics requires the analysis of multiple digital devices and the numbers can run into tens and hundreds, but there are not sufficient investigators to perform the necessary analysis. Digital forensic experts also have to deal with situations where they are limited in the number of hours that can be spent watching each hard drive. For each machine, it may take several days for proper legal work, requiring compliance to various standards and regulations, when dealing with a continuous flow of data entering the lab. Thus, their research work suffers (CYFOR, 2018).

ARGUMENTS AGAINST OUTSOURCING

There would be a number of instances that an organization would be compelled to seek the services of forensic experts in-house (Digital Discovery, 2011). While there are advantages of seeking the services of forensic experts in-house, there maybe valid reasons that could limit federal institutions and government organizations from seeking these services. These situations include circumstances such as when the organizations are involved in legal law suits, where the organizations deals with classified materials, and even circumstances where the organizations experience frequent intrusions (Obbayi, 2018). Chain of custody can be compromised where the transfer of digital evidence is not documented, something that is more likely when digital forensics is outsourced. According to Devlin (2018), the one key advantage of seeking forensic experts in-house is the fact that it will go a long way in saving money. But saving cost is not a good enough reason to outsource your most critical functions.

Federal and government bodies have massive amounts of sensitive data that needs to be kept secret at any cost (Comtact, 2017). Devlin (2018) point out that choosing an in-house cyber security expert to secure critical data is a natural option. Many times it is difficult to ensure that the outsourced party is really as good as they claim to be. Furthermore, forensic experts in-house could play a continuance role in assisting to detect and investigate cases of fraud, asset misappropriation, abusing and misusing the system, and other forms of non-compliance.

CONCLUSION

The Red Team is under the organization’s radar, while it targets its objectives without any limitation of time or resource. The Blue Team, on the other hand, needs to operate within organizational boundaries while being ever ready to defend against any attack. While they may be saving the organization against numerous attacks, one incident of security breach is enough to tarnish their image.

In the world cup, the game is not about how many balls the goalkeeper has defended, and no-one will remember this; it is about how many balls the goalkeeper missed, and this is what everyone will remember.

On another note, people will always remember the doctor whose negligence cost someone’s life, but conveniently forget the thousand lives the doctor saved in his or her lifetime. This just highlights the tremendous pressure the Blue Team works under, every day of the year and especially the role that forensic experts in-house could play.

The courts place immense value to the integrity of digital evidence. Therefore, one cannot understate the importance of documenting the collection, examination, storage and transfer of digital evidence by competent people. Organizations need to assess the risk of outsourcing digital forensics aligned with these requirements.

The oft-quoted reason for outsourcing digital forensics is the lack of internal expertise, or to simply save money. Imagine if the hospital you visit does not have its own doctors, and shares all your medical information with an external consultant who prescribes your treatment. Would you go to such a hospital to save a few hundred dollars?

REFERENCES

  1. Comtact. (2017). Pros and cons of outsourcing your Cyber Security – In-house, MSSP, or Virtual SOC? Retrieved July 13, 2018, from http://www.comtact.co.uk/blog/pros-and-cons-of-outsourcing-your-cyber-security-in-house-mssp-or-virtual-soc

  2. CybeRisk. (2018). The Red, Blue and Purple team and what’s between them. Retrieved from: . Retrieved July 13, 2018, from https://www.cyberisk.biz/red-blue-purple-team/

  3. CYFOR. (2018). Police should be outsourcing to digital evidence specialists. Retrieved July 12, 2018, from https://cyfor.co.uk/police-should-be-outsourcing-to-digital-evidence-specialists/

  4. Devlin, H. (2018). Police outsource digital forensic work to unaccredited labs. Retrieved July 15, 2018, from https://www.theguardian.com/uk-news/2018/feb/12/police-outsource-digital-forensic-work-to-unaccredited-labs

  5. Digital Discovery. (2011). Why Out-Source Computer Forensics? Retrieved July 13, 2018, from http://www.digitaldiscoveryesi.com/Blog/Why%20Out-Source%20Computer%20Forensics?/

  6. Drinkwater, D., & Zurkus, K. (2017). (2017). Red team versus blue team: How to run an effective simulation. Retrieved July 13, 2018, from https://www.csoonline.com/article/2122440/disaster-recovery/emergency-preparedness-red-team-versus-blue-team-how-to-run-an-effective-simulation.html

  7. Evans, B. (2016, January 29). Should you outsource computer forensic? Retrieved July 14, 2018, from https://www.healthdatamanagement.com/opinion/should-you-outsource-your-computer-forensic-investigations

  8. Hargreaves, A., & Chamberlain, J. (2018). The roles of Red, Blue and Purple teams. Retrieved July 12, 2018, from https://www.itlab.com/blog/understanding-the-roles-of-red-blue-and-purple-security-teams

  9. Miessler, D. (2016). The Difference between Red, Blue, and Purple Teams. Retrieved from:. Retrieved July 14, 2018, from https://danielmiessler.com/study/red-blue-purple-teams/

  10. Obbayi, L. (2018). Computer Forensics: Chain of Custody. Retrieved July 13, 2018, from InfoSec Institute: https://resources.infosecinstitute.com/category/computerforensics/introduction/areas-of-study/legal-and-ethical-principles/chain-of-custody-in-computer-forensics/

  11. Paganini, P. (2016). Cyber security: Red team, Blue team and Purple team. Retrieved July 13, 2018, from https://securityaffairs.co/wordpress/49624/hacking/cyber-red-team-blue-team.html

  12. Stackpole, B. (2016). Why (and when) outsourcing security makes sense. Retrieved July 13, 2018, from https://www.cio.com/article/3120650/security/why-and-when-outsourcing-security-makes-sense.html

 

Translate »