Threat Talk


Book Description

'Threat Talk' exposes how US and Chinese scientists and policy-makers have understood and responded to the problem of internet addiction in their societies. Is the internet good or bad for society? American analysts like Lessig and Zittrain suggest that the internet is inherently liberating and positive for society, while Morozov and Sageman warn that the internet poses risks to citizens and societies. Using a comparative framework to illustrate how the two states differ in their assessments of the risks to citizens posed by the introduction of new technology, Mary Manjikian compellingly argues that both 'risk' and 'disease' are ideas which are understood differently at different historic periods and in different cultures. Her culturalist approach claims that the internet is neither inherently helpful, nor inherently threatening. Rather, its role and the dangers it poses may be understood differently by different societies. Is the internet good or bad for society? The answer, it appears, is 'it depends'.




Whistling Vivaldi: And Other Clues to How Stereotypes Affect Us (Issues of Our Time)


Book Description

The acclaimed social psychologist offers an insider’s look at his research and groundbreaking findings on stereotypes and identity. Claude M. Steele, who has been called “one of the few great social psychologists,” offers a vivid first-person account of the research that supports his groundbreaking conclusions on stereotypes and identity. He sheds new light on American social phenomena from racial and gender gaps in test scores to the belief in the superior athletic prowess of black men, and lays out a plan for mitigating these “stereotype threats” and reshaping American identities.




Threat of Dissent


Book Description

In this first comprehensive overview of the intersection of immigration law and the First Amendment, a lawyer and historian traces ideological exclusion and deportation in the United States from the Alien Friends Act of 1798 to the evolving policies of the Trump administration. Beginning with the Alien Friends Act of 1798, the United States passed laws in the name of national security to bar or expel foreigners based on their beliefs and associations—although these laws sometimes conflict with First Amendment protections of freedom of speech and association or contradict America’s self-image as a nation of immigrants. The government has continually used ideological exclusions and deportations of noncitizens to suppress dissent and radicalism throughout the twentieth and twenty-first centuries, from the War on Anarchy to the Cold War to the War on Terror. In Threat of Dissent—the first social, political, and legal history of ideological exclusion and deportation in the United States—Julia Rose Kraut delves into the intricacies of major court decisions and legislation without losing sight of the people involved. We follow the cases of immigrants and foreign-born visitors, including activists, scholars, and artists such as Emma Goldman, Ernest Mandel, Carlos Fuentes, Charlie Chaplin, and John Lennon. Kraut also highlights lawyers, including Clarence Darrow and Carol Weiss King, as well as organizations, like the ACLU and PEN America, who challenged the constitutionality of ideological exclusions and deportations under the First Amendment. The Supreme Court, however, frequently interpreted restrictions under immigration law and upheld the government’s authority. By reminding us of the legal vulnerability foreigners face on the basis of their beliefs, expressions, and associations, Kraut calls our attention to the ways that ideological exclusion and deportation reflect fears of subversion and serve as tools of political repression in the United States.




Risk Centric Threat Modeling


Book Description

This book introduces the Process for Attack Simulation &Threat Analysis (PASTA) threat modeling methodology. It provides anintroduction to various types of application threat modeling andintroduces a risk-centric methodology aimed at applying securitycountermeasures that are commensurate to the possible impact thatcould be sustained from defined threat models, vulnerabilities,weaknesses, and attack patterns. This book describes how to apply application threat modeling asan advanced preventive form of security. The authors discuss themethodologies, tools, and case studies of successful applicationthreat modeling techniques. Chapter 1 provides an overview ofthreat modeling, while Chapter 2 describes the objectives andbenefits of threat modeling. Chapter 3 focuses on existing threatmodeling approaches, and Chapter 4 discusses integrating threatmodeling within the different types of Software DevelopmentLifecycles (SDLCs). Threat modeling and risk management is thefocus of Chapter 5. Chapter 6 and Chapter 7 examine Processfor Attack Simulation and Threat Analysis (PASTA). Finally, Chapter8 shows how to use the PASTA risk-centric threat modeling processto analyze the risks of specific threat agents targeting webapplications. This chapter focuses specifically on the webapplication assets that include customer’s confidential dataand business critical functionality that the web applicationprovides. • Provides a detailed walkthrough of the PASTAmethodology alongside software development activities,normally conducted via a standard SDLC process • Offers precise steps to take when combating threats tobusinesses • Examines real-life data breach incidents and lessons forrisk management Risk Centric Threat Modeling: Process for Attack Simulationand Threat Analysis is a resource for software developers,architects, technical risk managers, and seasoned securityprofessionals.




Cognitive-behavioral Therapy for Deaf and Hearing Persons with Language and Learning Challenges


Book Description

The needs of deaf and hearing people with limited functioning can be a challenge for the mental health practitioner to meet. This text provides concrete guidance for adapting best practices in cognitive-behavioral therapy to deaf and hearing persons who are non- or semi-literate, and who have greatly impaired language skills or other cognitive deficits, such as mental retardation, that make it difficult for them to benefit from traditional talk- and insight-oriented psychotherapies. --




The Resolution of Conflict


Book Description

The basic question to which this book is addressed is not how to eliminate or prevent conflict but rather how to make it productive, or minimally, how to prevent it from being destructive. I shall not deal with situations of "pure" conflict in which inevitably one side loses what the other gains. My interest is in conflict where there is a mixture of cooperative and competitive interests, where a variety of outcomes is possible; mutual loss, gain for one and loss of the other, and mutual gain. Thus my query can be restated, as an investigation of the conditions under which the participants will evolve a cooperative relationship or a competitive relationship in a situation which permits either. -- from the introduction.




Placing Friendship in Context


Book Description

A unique collection bridging social psychological and social structural research to advance understanding of friendship.




Social Cognition, Motivation, and Interaction: How Do People Respond to Threats in Social Interactions?


Book Description

If we want to understand people’s responses to threats in social interactions we can distinguish between three levels of analysis: On a social level of analysis we can describe people’s interpersonal behavior, on a cognitive level we can identify corresponding information processing mechanisms, and on a neural level we can specify neural systems, which underlie these processes. In this Research Topic we want to present research connecting these three levels of analysis and propose their functional interconnection in social interaction. We propose that threats in social interactions activate basic motivational processes, which manifest in neural processes related to behavioral inhibition vs. activation in a social situation. This shapes our attention to new information, and affects our cognitions about social identities, belief systems and worldviews. These changes in social cognition in turn affect people’s behavior in social interactions and lead to corresponding reactions on behalf of the interaction partner. Thus, we assume that people’s reactions to threat in interactions can be described as sequences of broader attentional processes resulting from basic motivational tendencies leading to specific social cognitions and subsequent behavior within social interactions. We can analyze this sequence in order to contribute to a better understanding of social interactions. The three levels of analyses (social, cognitive, neural) shed light on social interactions from different angles: On the social level we can analyze how the behaviors of the interaction partners mutually affect each other and how this is accompanied by specific cognitive, emotional and motivational processes. On the cognitive level we can analyze people’s perception of a social situation leading to attentional and reasoning processes with regard to their interaction partner/s, which may be accompanied by certain emotional and motivational processes and determines the behavior towards the partner/s. Finally, we can focus on the neural mechanisms underlying cognitive, emotional, and motivational processes in social interactions.




Criminal Law Conversations


Book Description

Criminal Law Conversations provides an authoritative overview of contemporary criminal law debates in the United States. This collection of high caliber scholarly papers was assembled using an innovative and interactive method of nominations and commentary by the nation's top legal scholars. Virtually every leading scholar in the field has participated, resulting in a volume of interest to those both in and outside of the community. Criminal Law Conversations showcases the most captivating of these essays, and provides insight into the most fundamental and provocative questions of modern criminal law. * Jeffrie G. Murphy's, essay "Remorse, Apology & Mercy," was declared Recommended Reading in the Green Bag Almanac and Reader, 2010.




Handbook of Dialogical Self Theory


Book Description

In a boundary-crossing and globalizing world, the personal and social positions in self and identity become increasingly dense, heterogeneous and even conflicting. In this handbook scholars of different disciplines, nations and cultures (East and West) bring together their views and applications of dialogical self theory in such a way that deeper commonalities are brought to the surface. As a 'bridging theory', dialogical self theory reveals unexpected links between a broad variety of phenomena, such as self and identity problems in education and psychotherapy, multicultural identities, child-rearing practices, adult development, consumer behaviour, the use of the internet and the value of silence. Researchers and practitioners present different methods of investigation, both qualitative and quantitative, and also highlight applications of dialogical self theory.