Jones, E. (1999).The phenomenology of abnormal belief. Philosophy, Psychiatry and Psychology, 6, 1-16. Young,A.W. (2000).Wondrous strange:The neuropsychology of abnormal beliefs. In M. Coltheart & M. Davis (Eds.) Pathologies of belief (pp.47-74). Oxford: Blackwell. Myin-Germeys, I., Nicolson, N.A. & Delespaul, P.A.E.G. (2001).The context of delusional experiences in the daily life of patients with schizophrenia. Psychological Medicine, 31, 489-498. Kuhn, T. (1962) The Structure of Scientific Revolutions. Bell, V., Halligan, P.W. & Ellis, H. (2003) Belief about delusions. The Psychologist, 16 (8), 418-423.
Leeser, J., & O'Donohue, W. (1999) What is a delusion? Epistemological dimensions. Journal of Abnormal Psychology , 108, 687-694.
Letters relating to 1809 appeal to have Matthew’s released from Bethlem. On the left, a letter from Parish of Camberwell, promising to pay for Matthew’s keep if he is released to their care. On the right, a letter from the then home secretary, Lord Liverpool, recommending that Matthews be detained indefinitely.
Tausk, V. (1933) On the origin of the influencing machine in schizophrenia. Psychoanalytic Quarterly , 2, 519-56.
Jay, M. (2003) The Air Loom Gang: The Strange and True Story of James Tilly Matthews and His Visionary Madness. London: Random House.
Peters ER, Joseph SA, Garety PA. (1999) Measurement of delusional ideation in the normal population: introducing the PDI (Peters et al. Delusions Inventory). Schizophr Bulletin, 25 (3), 553-76.
Jackson MH: Assessing the structure of communication on the world wide web. Journal of Computer-Mediated Communication 1997;3:Retrieved 14th January, 2004 from http://jcmc.indiana.edu/vol3/issue1/jackson.html Wellman B: Computer networks as social networks. Science 2001;293:2031-2034. Park HW: Hyperlink network analysis: A new method for the study of social structure on the web. Connections 2003;25:49-61. Park HW, Thelwall M: Hyperlink Analyses of the World Wide Web: A Review, Journal of Computer-Mediated Communication 2003;8:Retrieved 14th January 2004 from http://jcmc.indiana.edu/vol8/issue4/park.html
Goodman LA: Snowball sampling. Annals of Mathematical Statistics 1961;32:148-170.
Lusseau, D. (2003) The emergent properties of a dolphin social network. Proceedings of the Royal Society of London – Biology Letters, Supplement 2, S186-S189. Freeman SC, Freeman LC: The networkers network: A study of the impact of a new communications medium on sociometric structure. Social Science Research Reports No 46 . Irvine CA, University of California, 1979. Killworth B, Bernard H: Informant accuracy in social network data. Human Organization 1976;35:269-286. Zachary W: An information flow model for conflict and fission in small groups. Journal of Anthropological Research 1977;33:452-473.
Wasserman S, Faust K: Social network analysis: Methods and applications . Cambridge, Cambridge University Press, 1994.
Freeman LC: Centrality in Social Networks: Conceptual clarification. Social Networks 1979;1:215-239.
Frey AH: Human auditory system response to modulated electromagnetic energy. Journal of Applied Physiology 1962;17:689-692.
Fox N, Ward K, O'Rourke A. (2005) Pro-anorexia, weight-loss drugs and the internet: an &quot;anti-recovery&quot; explanatory model of anorexia. Sociol Health Illn , 27(7), 944-71. Rajagopal S. (2004) Suicide pacts and the internet. BMJ, 329 (7478), 1298-9.
‘ Mind Control’ from 1796 to the Internet: Vaughan Bell, Cara Maiden Antonio Mu ñoz, Venu Reddy [email_address] Dept of Psychology, Institute of Psychiatry Implications for the Diagnosis of Delusions
He noted that such delusional devices take the form of a diabolical machine, just outside the technical understanding of the subject.
Always operated by the subject’s enemies who set out to persecute them.
Tausk (1933) wrote a seminal paper ‘ On the Origin of the Influencing Machine in Schizophrenia ’
Modern day ‘Air Looms’ “ It feels like the people who assault me have some replica of myself, electronically connected to me. By remote control, they are able to hurt me - in various ways - by doing something to their replica (or electronic doll) of me. They also use 'voice-to-skull technology, emf, elf, microwave radiation and other similar bodily, brain-invasive & abuse technology .” taken from Internet, 2003
Jay (2003) has noted the similarity between historical accounts of ‘influencing machines’ and many which appear on the internet.