Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, vulnerability and compliance tools, but at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security professional cry.
The one thing you can depend upon in an enterprise is that many of your users, even with training, will still make the wrong choices. They will violate BYOD restrictions, click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc. But what if this isn't because users hate us or are too stupid?
What if all our ignored policies and procedures regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
Humans are wired to be emotional beings. These emotions influence most of our decisions, both good and bad. In failing to understand how this is at the root of user non-compliance, no matter how much money we spend on expensive hardware and software, we will fail to achieve the goal of good organizational security. With a goal of understanding human behavior, the session will combine concepts from applied neuroscience with physical and interactive exercises based upon the principles of mindfulness and martial arts.
A New Model: Advancing Organizational Security Through PeacebuildingMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, and vulnerability and compliance tools, and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry.
The one thing you can depend upon in an enterprise is that many of your users, even with training, will still make the wrong choices. They will violate BYOD restrictions, click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc. But what if this isn't because users hate us or are too stupid? What if all our ignored policies and procedures regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
Humans are wired to be emotional beings. Emotions influence most of our decisions, good and bad. In failing to understand how this is at the root of user non-compliance, no matter how much money we spend on expensive hardware and software, we will fail to achieve the goal of good organizational security.
Decision fatigue and ego depletion can negatively impact rational decision-making. IT systems like neural networks, expert systems, and fuzzy logic have the potential to help address issues like irrational behavior, deception, and dishonesty by emulating human learning, analyzing complex situations, and detecting lies. While technology offers opportunities, small acts of cheating that many people engage in can still significantly damage society. Maintaining willpower requires strategies like minimizing decisions, taking breaks, and using rewards to resist temptations.
Guest lecture within the field of consumer behaviour prepared for the University of Antwerp (applied economics). I explore theories from (social) psychology to demonstrate our essential social nature. In the second part, these lessons are applied for a better new product development and communication.
This document provides an overview of social psychology. It begins by defining social psychology as the scientific study of how people's thoughts, feelings, and behaviors are influenced by real or imagined presence of others. It discusses key concepts such as social influence, construal, fundamental attribution error, self-esteem, and social cognition. Experimental research methods are emphasized. Comparisons are made between social psychology and other fields like personality psychology and sociology. Applications of social psychology to understanding and solving social problems are also mentioned.
The document provides biographical information about Sarah Jenkins, including her education background and work experience in food service. It also contains a case study she wrote analyzing the murder trial of the Menendez brothers, who were accused of killing their parents. The case study examines factors such as the brothers' criminal history and spending habits that contradicted their claim of self-defense.
Advertising can shape attitudes and behaviors by targeting specific demographics. For example, advertisers successfully targeted female smokers starting in the early 20th century. As a result, the percentage of female smokers increased and nearly caught up to male smokers by 2004. The document discusses the nature and origins of attitudes, including their cognitive, affective, and behavioral components. Attitudes can form from genetics, direct experiences, classical and operant conditioning, and observations of one's own behavior. The document also examines how attitudes change through persuasion, including the central and peripheral routes to persuasion and the role of emotion.
Elliot Aronson is an American psychologist born in 1932 who is known for his research on cognitive dissonance, the Jigsaw Classroom technique, and gain-loss theory of attraction. Over his career, he has taught at several top universities, written influential books, and received many awards, making significant contributions to the field of psychology.
This document provides an overview of social perception and how we form impressions of other people based on their observable behavior. It discusses how we rely on social perception to understand people based on what they say, do, and their facial expressions, gestures and tone of voice. It also explains some of the challenges in forming accurate impressions, as we can only observe behavior and not truly know people's inner thoughts and motivations. The document outlines several concepts from social psychology research related to social perception, including nonverbal communication, facial expressions, culture, implicit personality theories, attribution theory, and biases like the correspondence bias.
A New Model: Advancing Organizational Security Through PeacebuildingMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, and vulnerability and compliance tools, and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry.
The one thing you can depend upon in an enterprise is that many of your users, even with training, will still make the wrong choices. They will violate BYOD restrictions, click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc. But what if this isn't because users hate us or are too stupid? What if all our ignored policies and procedures regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
Humans are wired to be emotional beings. Emotions influence most of our decisions, good and bad. In failing to understand how this is at the root of user non-compliance, no matter how much money we spend on expensive hardware and software, we will fail to achieve the goal of good organizational security.
Decision fatigue and ego depletion can negatively impact rational decision-making. IT systems like neural networks, expert systems, and fuzzy logic have the potential to help address issues like irrational behavior, deception, and dishonesty by emulating human learning, analyzing complex situations, and detecting lies. While technology offers opportunities, small acts of cheating that many people engage in can still significantly damage society. Maintaining willpower requires strategies like minimizing decisions, taking breaks, and using rewards to resist temptations.
Guest lecture within the field of consumer behaviour prepared for the University of Antwerp (applied economics). I explore theories from (social) psychology to demonstrate our essential social nature. In the second part, these lessons are applied for a better new product development and communication.
This document provides an overview of social psychology. It begins by defining social psychology as the scientific study of how people's thoughts, feelings, and behaviors are influenced by real or imagined presence of others. It discusses key concepts such as social influence, construal, fundamental attribution error, self-esteem, and social cognition. Experimental research methods are emphasized. Comparisons are made between social psychology and other fields like personality psychology and sociology. Applications of social psychology to understanding and solving social problems are also mentioned.
The document provides biographical information about Sarah Jenkins, including her education background and work experience in food service. It also contains a case study she wrote analyzing the murder trial of the Menendez brothers, who were accused of killing their parents. The case study examines factors such as the brothers' criminal history and spending habits that contradicted their claim of self-defense.
Advertising can shape attitudes and behaviors by targeting specific demographics. For example, advertisers successfully targeted female smokers starting in the early 20th century. As a result, the percentage of female smokers increased and nearly caught up to male smokers by 2004. The document discusses the nature and origins of attitudes, including their cognitive, affective, and behavioral components. Attitudes can form from genetics, direct experiences, classical and operant conditioning, and observations of one's own behavior. The document also examines how attitudes change through persuasion, including the central and peripheral routes to persuasion and the role of emotion.
Elliot Aronson is an American psychologist born in 1932 who is known for his research on cognitive dissonance, the Jigsaw Classroom technique, and gain-loss theory of attraction. Over his career, he has taught at several top universities, written influential books, and received many awards, making significant contributions to the field of psychology.
This document provides an overview of social perception and how we form impressions of other people based on their observable behavior. It discusses how we rely on social perception to understand people based on what they say, do, and their facial expressions, gestures and tone of voice. It also explains some of the challenges in forming accurate impressions, as we can only observe behavior and not truly know people's inner thoughts and motivations. The document outlines several concepts from social psychology research related to social perception, including nonverbal communication, facial expressions, culture, implicit personality theories, attribution theory, and biases like the correspondence bias.
Humans Aren’t Computers: Effective Leadership Strategies for ITMichele Chubirka
IT leaders are expected to break down silos between different technology teams, get end users to understand and embrace policies, and forge productive relationships with their counterparts on the business side of the organization. This is harder than it sounds, because while people can behave rationally, they can also be governed by emotions such as frustration and fear of change. They can be driven by ego, a bad attitude, or simple ignorance. They can cause conflict that can disrupt professional relationships, drag down a team or even poison an entire department. Unfortunately for technical-minded leaders, there's no Python script to program company-wide collaboration and harmony and get everyone to sing Kumbaya. We have to learn how to build healthy relationships with employees, drive engagement, and understand how to resolve conflicts using practical, effective strategies.
BYOD is IT's Kobayashi Maru: a seemingly no-win situation. Users and executives want unlimited choice on devices and access, while IT has to protect corporate data and find some way to support a grab-bag of hardware and operating systems. Can IT really balance these competing demands, or are we being set up to fail?
BYOD seems like it IT's Kobayashi Maru: the ultimate no-win scenario. Users and executives want unlimited choice with devices and access, while IT has to protect corporate data and find some way to support a grab-bag of hardware and operating systems. Can IT really balance these competing demands, or are we being set up to fail? In fact, you can do BYOD right, but it requires some groundwork. In this workshop we'll cover the motivation behind BYOD, because it's important to understand why it becomes such a divisive issue in organizations.
Humans Aren’t Computers: Effective Management Strategies for IT LeadersMichele Chubirka
IT leaders are expected to break down silos between different technology teams, get end users to understand and embrace policies, and forge productive relationships with their counterparts on the business side of the organization. This is harder than it sounds, because while people can behave rationally, they can also be governed by emotions such as frustration and fear of change. They can be driven by ego, a bad attitude, or simple ignorance. They can cause conflict that can disrupt professional relationships, drag down a team or even poison an entire department. Unfortunately for technical-minded leaders, there’s no Python script to program company-wide collaboration and harmony and get everyone to sing Kumbaya. We have to learn how to build healthy relationships with employees, drive engagement, and understand how to resolve conflicts using practical, effective strategies.
RSA Security Conference 2013: Thin Slicing a Black SwanMichele Chubirka
As infosec professionals we are swimming in prodigious amounts of data, but it isn’t making us better at our jobs, it seems to make us worse. In Verizon’s 2012 Data Breach Investigations Report, it was found that across organizations, an external party discovers 92% of breaches. We continue to desperately grasp at that straw of, “more data,” but what if this is simply information gluttony? Incident response's bloated model drives it closer to a form of security archeology rather than its promise of real-time relevance.
Managed to Extinction? A 40th Anniversary Legal Forum assessing the 1971 Wild...Jan_Liverance
New York University (NYU) Environmental Law Journal (ELJ), NYU Environmental Studies Program and the NYU-SCPS M.A. Program in Graphic Communications Management and Technology jointly hosted MANAGED TO EXTINCTION? - A 40th Anniversary Legal Forum assessing the 1971Wild Free-Roaming Horses & Burros Act (WFRH&BA). Moderated by Dale Jamieson, Professor of Law and Director of the NYU Environmental Studies Program, this panel discussion took place at 6 p.m. on Wednesday evening, November 16th, 2011 at NYU School of Law, Vanderbilt Hall, 40 Washington Square South.
The document provides an overview of a LinkedIn training session focused on maximizing the professional networking platform. It covers topics like personal branding, growing one's network, connecting with others, using tags, and managing time on LinkedIn. The training aims to help users stand out, drive more business, build new connections and pipelines, and use LinkedIn most effectively for recruitment, branding and business development.
¬Are the MPAA’s classification of NC-17 films justified and what a film can d...South Sefton College
The document discusses the MPAA film rating system in the United States and how an NC-17 rating can negatively impact a film's commercial success. It analyzes three films - Requiem for a Dream, Crash, and Blue Valentine - that received NC-17 ratings and the different strategies their studios used in response. Requiem for a Dream was released unrated, Crash accepted its NC-17 rating, and Blue Valentine appealed its rating and had it changed to an R. All three films struggled commercially due to the stigma of an NC-17 or unrated classification.
In the film A Clockwork Orange, the main character Alex elicits both allegiance and detachment from viewers. Some key scenes that encourage viewers to align with Alex include when he commits violent acts set to classical music, which provokes both recognition and discomfort. Viewers may feel allegiance to Alex due to identifying with his youth and rebellious spirit, though his extreme violence can also create a-central imagining and detachment from his character.
The document provides guidance for students completing a small-scale research project and presentation as part of an FM3 film studies course. It outlines the key requirements, including: [1] Completing a research project focused on one film and referencing at least two other related films; [2] Creating an annotated catalogue of 10-15 research sources; [3] Writing a 1,500 word presentation script in a format suited for presenting, rather than an essay. The document provides advice on choosing an appropriate focus film and area of investigation, conducting research, compiling the catalogue, and constructing the presentation script.
The document provides instructions for a producer's job, including overseeing the filming of a television program. It discusses using possessive adjectives and pronouns correctly, lists vocabulary words that may be used in filming, and provides examples of short conversational exchanges and grammar exercises for a script. Homework involves writing sentences from the perspective of a cameraman describing a film shoot to someone over the phone.
My media product uses and develops conventions of real music magazines. It follows conventions like using a bold masthead with few syllables, a color scheme of black, red, and yellow, big bold fonts for headings, short punchy cover lines, a mixture of posed and live photography depicting aggression, and informal specialized writing. It challenges some conventions like having extra info above the masthead, smaller fonts for articles, and making some cover lines bolder to make the main one stand out more. Overall, it sticks closely to conventions to be recognizable while challenging some to fit its genre.
The document discusses shocking scenes in films and how directors create shock through both content and form. It provides examples of shocking scenes from films like Un Chien Andalou, Reservoir Dogs, and Paths of Glory. Shock can come from violence, sex, or ideas/politics. The document encourages analyzing how specific scenes elicit sudden or prolonged shock through editing, close-ups, music, etc. Students are asked to examine how shock is created in chosen scenes and consider how audiences may respond differently based on context.
Study 11: Exploring priorities through a visual timelinecurlybecca
The document describes a mobile application that allows team members to revisit initial goals and priorities over time. It features a timeline that shows different versions of a visual layout tagged with priorities. Selecting tags highlights areas on the layout and shows how priorities have shifted. The slider lets users compare highlighted areas and priorities across different versions to see how goals have changed during later stages.
The document appears to be a magazine layout template with the following elements:
1) Standard magazine sections like covers, contents pages, articles with pictures and text, and advertisements.
2) Consistent design elements across pages like mastheads, page numbers, and balanced placement of images and text.
3) Sample articles about an upcoming music tour along with competition promotions and opportunities for readers to subscribe or claim freebies.
Effective Marketing in a Digital World - Jeff Schneider WordCamp Edmonton 2011WordCamp Edmonton 2011
Jeff Schneider discusses how traditional marketing is no longer effective due to changes in consumer behavior and technology. He advocates for inbound marketing using content creation, search engine optimization, and social media. Effective content should address customers' frequently asked questions and help establish the business as a trusted authority. The content should be distributed through the company website, blog, social media, and email marketing.
Who would be the audience for your media productJoshcartermedia
The document discusses the target audience for a music magazine aimed at 16-25 year olds interested in rock and metal genres. The magazine appeals more to males through images of successful males in the genre. It targets working and middle class readers with disposable income interested in concerts, albums, and competitions. The characters in the magazine wear band merchandise to seem relatable. The typical reader is described as a 22 year old male who plays guitar, is in a band, and enjoys learning about new albums and bands through the magazine.
Alfredo Gómez Cerdá es un escritor español que descubrió su pasión por el teatro en la escuela secundaria. Estudió filología hispánica y comenzó a escribir obras de teatro, pero no fue hasta ganar un premio literario a los 31 años que se dedicó de lleno a la literatura infantil y juvenil. Desde entonces ha ganado numerosos premios por sus obras que tratan temas importantes como el acoso escolar y las relaciones interpersonales. Su inspiración proviene de mirar hacia adentro y
Security Is Like An Onion, That's Why It Makes You CryMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, vulnerability and compliance tools and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry. The one thing you can depend upon in an enterprise is that many of our users, even with training, will still make the wrong choices. They still click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc'. But what if this isn't because users hate us or are too stupid? What if all our complaints about not being heard and our instructions regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
A New Model: Advancing Organizational Security Through Peacebuilding-1st draftMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, and vulnerability and compliance tools, and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry.
The one thing you can depend upon in an enterprise is that many of your users, even with training, will still make the wrong choices. They will violate BYOD restrictions, click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc. But what if this isn't because users hate us or are too stupid? What if all our ignored policies and procedures regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
Humans are wired to be emotional beings. Emotions influence most of our decisions, good and bad. In failing to understand how this is at the root of user non-compliance, no matter how much money we spend on expensive hardware and software, we will fail to achieve the goal of good organizational security.
Humans Aren’t Computers: Effective Leadership Strategies for ITMichele Chubirka
IT leaders are expected to break down silos between different technology teams, get end users to understand and embrace policies, and forge productive relationships with their counterparts on the business side of the organization. This is harder than it sounds, because while people can behave rationally, they can also be governed by emotions such as frustration and fear of change. They can be driven by ego, a bad attitude, or simple ignorance. They can cause conflict that can disrupt professional relationships, drag down a team or even poison an entire department. Unfortunately for technical-minded leaders, there's no Python script to program company-wide collaboration and harmony and get everyone to sing Kumbaya. We have to learn how to build healthy relationships with employees, drive engagement, and understand how to resolve conflicts using practical, effective strategies.
BYOD is IT's Kobayashi Maru: a seemingly no-win situation. Users and executives want unlimited choice on devices and access, while IT has to protect corporate data and find some way to support a grab-bag of hardware and operating systems. Can IT really balance these competing demands, or are we being set up to fail?
BYOD seems like it IT's Kobayashi Maru: the ultimate no-win scenario. Users and executives want unlimited choice with devices and access, while IT has to protect corporate data and find some way to support a grab-bag of hardware and operating systems. Can IT really balance these competing demands, or are we being set up to fail? In fact, you can do BYOD right, but it requires some groundwork. In this workshop we'll cover the motivation behind BYOD, because it's important to understand why it becomes such a divisive issue in organizations.
Humans Aren’t Computers: Effective Management Strategies for IT LeadersMichele Chubirka
IT leaders are expected to break down silos between different technology teams, get end users to understand and embrace policies, and forge productive relationships with their counterparts on the business side of the organization. This is harder than it sounds, because while people can behave rationally, they can also be governed by emotions such as frustration and fear of change. They can be driven by ego, a bad attitude, or simple ignorance. They can cause conflict that can disrupt professional relationships, drag down a team or even poison an entire department. Unfortunately for technical-minded leaders, there’s no Python script to program company-wide collaboration and harmony and get everyone to sing Kumbaya. We have to learn how to build healthy relationships with employees, drive engagement, and understand how to resolve conflicts using practical, effective strategies.
RSA Security Conference 2013: Thin Slicing a Black SwanMichele Chubirka
As infosec professionals we are swimming in prodigious amounts of data, but it isn’t making us better at our jobs, it seems to make us worse. In Verizon’s 2012 Data Breach Investigations Report, it was found that across organizations, an external party discovers 92% of breaches. We continue to desperately grasp at that straw of, “more data,” but what if this is simply information gluttony? Incident response's bloated model drives it closer to a form of security archeology rather than its promise of real-time relevance.
Managed to Extinction? A 40th Anniversary Legal Forum assessing the 1971 Wild...Jan_Liverance
New York University (NYU) Environmental Law Journal (ELJ), NYU Environmental Studies Program and the NYU-SCPS M.A. Program in Graphic Communications Management and Technology jointly hosted MANAGED TO EXTINCTION? - A 40th Anniversary Legal Forum assessing the 1971Wild Free-Roaming Horses & Burros Act (WFRH&BA). Moderated by Dale Jamieson, Professor of Law and Director of the NYU Environmental Studies Program, this panel discussion took place at 6 p.m. on Wednesday evening, November 16th, 2011 at NYU School of Law, Vanderbilt Hall, 40 Washington Square South.
The document provides an overview of a LinkedIn training session focused on maximizing the professional networking platform. It covers topics like personal branding, growing one's network, connecting with others, using tags, and managing time on LinkedIn. The training aims to help users stand out, drive more business, build new connections and pipelines, and use LinkedIn most effectively for recruitment, branding and business development.
¬Are the MPAA’s classification of NC-17 films justified and what a film can d...South Sefton College
The document discusses the MPAA film rating system in the United States and how an NC-17 rating can negatively impact a film's commercial success. It analyzes three films - Requiem for a Dream, Crash, and Blue Valentine - that received NC-17 ratings and the different strategies their studios used in response. Requiem for a Dream was released unrated, Crash accepted its NC-17 rating, and Blue Valentine appealed its rating and had it changed to an R. All three films struggled commercially due to the stigma of an NC-17 or unrated classification.
In the film A Clockwork Orange, the main character Alex elicits both allegiance and detachment from viewers. Some key scenes that encourage viewers to align with Alex include when he commits violent acts set to classical music, which provokes both recognition and discomfort. Viewers may feel allegiance to Alex due to identifying with his youth and rebellious spirit, though his extreme violence can also create a-central imagining and detachment from his character.
The document provides guidance for students completing a small-scale research project and presentation as part of an FM3 film studies course. It outlines the key requirements, including: [1] Completing a research project focused on one film and referencing at least two other related films; [2] Creating an annotated catalogue of 10-15 research sources; [3] Writing a 1,500 word presentation script in a format suited for presenting, rather than an essay. The document provides advice on choosing an appropriate focus film and area of investigation, conducting research, compiling the catalogue, and constructing the presentation script.
The document provides instructions for a producer's job, including overseeing the filming of a television program. It discusses using possessive adjectives and pronouns correctly, lists vocabulary words that may be used in filming, and provides examples of short conversational exchanges and grammar exercises for a script. Homework involves writing sentences from the perspective of a cameraman describing a film shoot to someone over the phone.
My media product uses and develops conventions of real music magazines. It follows conventions like using a bold masthead with few syllables, a color scheme of black, red, and yellow, big bold fonts for headings, short punchy cover lines, a mixture of posed and live photography depicting aggression, and informal specialized writing. It challenges some conventions like having extra info above the masthead, smaller fonts for articles, and making some cover lines bolder to make the main one stand out more. Overall, it sticks closely to conventions to be recognizable while challenging some to fit its genre.
The document discusses shocking scenes in films and how directors create shock through both content and form. It provides examples of shocking scenes from films like Un Chien Andalou, Reservoir Dogs, and Paths of Glory. Shock can come from violence, sex, or ideas/politics. The document encourages analyzing how specific scenes elicit sudden or prolonged shock through editing, close-ups, music, etc. Students are asked to examine how shock is created in chosen scenes and consider how audiences may respond differently based on context.
Study 11: Exploring priorities through a visual timelinecurlybecca
The document describes a mobile application that allows team members to revisit initial goals and priorities over time. It features a timeline that shows different versions of a visual layout tagged with priorities. Selecting tags highlights areas on the layout and shows how priorities have shifted. The slider lets users compare highlighted areas and priorities across different versions to see how goals have changed during later stages.
The document appears to be a magazine layout template with the following elements:
1) Standard magazine sections like covers, contents pages, articles with pictures and text, and advertisements.
2) Consistent design elements across pages like mastheads, page numbers, and balanced placement of images and text.
3) Sample articles about an upcoming music tour along with competition promotions and opportunities for readers to subscribe or claim freebies.
Effective Marketing in a Digital World - Jeff Schneider WordCamp Edmonton 2011WordCamp Edmonton 2011
Jeff Schneider discusses how traditional marketing is no longer effective due to changes in consumer behavior and technology. He advocates for inbound marketing using content creation, search engine optimization, and social media. Effective content should address customers' frequently asked questions and help establish the business as a trusted authority. The content should be distributed through the company website, blog, social media, and email marketing.
Who would be the audience for your media productJoshcartermedia
The document discusses the target audience for a music magazine aimed at 16-25 year olds interested in rock and metal genres. The magazine appeals more to males through images of successful males in the genre. It targets working and middle class readers with disposable income interested in concerts, albums, and competitions. The characters in the magazine wear band merchandise to seem relatable. The typical reader is described as a 22 year old male who plays guitar, is in a band, and enjoys learning about new albums and bands through the magazine.
Alfredo Gómez Cerdá es un escritor español que descubrió su pasión por el teatro en la escuela secundaria. Estudió filología hispánica y comenzó a escribir obras de teatro, pero no fue hasta ganar un premio literario a los 31 años que se dedicó de lleno a la literatura infantil y juvenil. Desde entonces ha ganado numerosos premios por sus obras que tratan temas importantes como el acoso escolar y las relaciones interpersonales. Su inspiración proviene de mirar hacia adentro y
Security Is Like An Onion, That's Why It Makes You CryMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, vulnerability and compliance tools and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry. The one thing you can depend upon in an enterprise is that many of our users, even with training, will still make the wrong choices. They still click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc'. But what if this isn't because users hate us or are too stupid? What if all our complaints about not being heard and our instructions regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
A New Model: Advancing Organizational Security Through Peacebuilding-1st draftMichele Chubirka
Why is the security industry so full of fail? We spend millions of dollars on firewalls, IPS, IDS, DLP, professional penetration tests and assessments, and vulnerability and compliance tools, and at the end of the day, the weakest link is the user and his or her inability to make the right choices. It's enough to make a security engineer cry.
The one thing you can depend upon in an enterprise is that many of your users, even with training, will still make the wrong choices. They will violate BYOD restrictions, click on links they shouldn't, respond to phishing scams, open documents without thinking, post too much information on Twitter and Facebook, use their pet's name as passwords, etc. But what if this isn't because users hate us or are too stupid? What if all our ignored policies and procedures regarding the best security practices have more to do with our failure to understand modern neuroscience and the human mind's resistance to change?
Humans are wired to be emotional beings. Emotions influence most of our decisions, good and bad. In failing to understand how this is at the root of user non-compliance, no matter how much money we spend on expensive hardware and software, we will fail to achieve the goal of good organizational security.
This document discusses mental health and different perspectives on mental illness. It defines mental health as emotional and psychological well-being that allows one to cope with life demands. Mental illness is caused by chemical imbalances in the brain that can sometimes be treated with therapy or medication. The document outlines the stigma around mental illness and different views on topics like the insanity defense in criminal trials. It explores the trial of Billy Milligan, who successfully pleaded insanity due to having multiple personalities. Overall, the document presents information on mental health and examines various perspectives on mental illness.
1. All of the following are common changes that occur in a.docxcorbing9ttj
1.
All of the following are common changes that occur in adulthood
except
midlife transitions.
divorce.
menopause.
D.
life reviews.
2.
Sabrina, Ali, and Jasmine are discussing the differences between central route processing and peripheral route processing. Jasmine believes that peripheral route processing is what results when a person thoughtfully considers the issues and arguments involved in a persuasive argument. Ali says central route processing is when a person is persuaded by factors irrelevant or extraneous to the issue. Sabrina insists they've both got the definitions mixed up. Who is correct?
Sabrina
Jasmine
Ali and Jasmine
Sabrina and Ali
3.
Prozac, Celexa, Zoloft, Paxil, and Lexapro are common drugs used to treat
depression.
psychosis.
obsessive compulsive disorder.
anxiety.
4.
Behavioral therapy would employ all of the following treatment techniques
except
aversive conditioning.
exposure treatment.
meditation.
systematic desensitization.
5.
What would be the best type of schedule to enforce a slow, steady response?
Fixed-ratio
Variable-ratio
Fixed-interval
Variable-interval
6.
The startle reflex occurs when
a baby's cheek is rubbed and he/she seeks to nurse.
a baby's toes fan out when his/her foot is stroked.
a baby flings out his/her arms and legs at a sudden noise.
a baby cries when he/she hears a stranger's voice.
7.
Bandura's Bobo Doll experiment demonstrated
obedience.
social identity.
ethnocentricity.
observational learning.
8.
According to Maslow, we pass through a hierarchy, and the _______ stage is where people meet their highest potential.
safety
esteem
love and belonging
self-actualization
9.
All of the following are valid methods of coping with stress
except
for
changing your goals.
learned helplessness.
eustress.
blue lining.
10.
According to the textbook, the worst parents are those who are
authoritarian.
authoritative.
permissive.
uninvolved.
11.
How often is the following statement
true?
To successfully conduct experimental research, it's important to have signed informed consents from participants.
The statement is always true.
The statement is true occasionally.
The statement is true most of the time.
The statement is false.
12.
Insomnia affects approximately _______ percent of people and nearly _______ million people suffer from sleep apnea.
20; 30
30; 10
10; 20
30; 20
13.
What are the purposes of dreams, according to Freud?
Neither
Both
Dreams for survival
Unconscious wish fulfillment
14.
According to the
DSM-IV-TR
and your text, several different mental disorders are currently recognized. Which symptoms and subcategories are correctly aligned?
Dissociative disorders: multiple personality disorder, dissociative amnesia, and dissociative fugue
Mood disorders: disorganized, paranoid, catatonic, and undifferentiated
Somatoform disorders: generalized anxiety, panic, obsessive compulsive disorder, and PTSD
Schizophrenia: hypochondriasis and conversion disorder
15.
.
Human Intelligence Source Analysis
- Human Intelligence relies on personal connections with sources of information. Close relationships allow access to insights not available through other forms of intelligence, such as decision-making processes and moral obligations.
- Developed contacts can bypass security through means like access badges or ID cards.
- While powerful, Human Intelligence is also susceptible to counterintelligence operations and deception due to the close personal involvement between agents and sources.
Florida Mediator Helps You to Understand Your Client's Brain UWWM
What wacky, weird and mostly wonderful things are happening inside your client's brain during mediation? Longtime mediator Michelle Jernigan helps litigators to make sense of it all so they can better support and guide their clients.
Psychology 102: Social processes, society & cultureJames Neill
This lecture provides an overview of several social psychology topics, particularly: what is social psychology, social influence (including conformity, obedience, and resistance), group decision-making, aggression, pro-social behaviour, altruism, conflict, and peace psychology
Social Intelligence (SI) is the ability to successfully build relationships and navigate social environments.
Our society puts a huge emphasis on book smarts and IQ, but our relationships effect a much bigger part of our lives.
Social smarts are far more important than your book smarts.
Building strong social relationships is worth the effort:
Strong relationships improve our immune system and help combat disease.
Loneliness and weak relationships are one of the major sources of stress, health problems and depression.
Our relationships affect every area of our lives–from colleagues to spouses to friends to kids.
The document discusses the importance of critical thinking and developing good critical thinking skills. It provides several benefits of critical thinking such as improved attention, ability to identify key points, skills in analysis, and an educated mind. It also discusses some obstacles to critical thinking like emotions, narrow-mindedness, and distrust. It provides tips for critical thinking, such as knowing your goals, dealing with biases, considering options and consequences, doing research, and not overcomplicating issues. The document encourages reflecting on one's own thinking and identifying problems and ways to improve thinking across different domains of life.
This document discusses how neuroscience research shows that the brain is a social organ and is highly sensitive to threats to our status, certainty, autonomy, relatedness, and fairness (SCARF model). When these needs are threatened, it triggers the brain's threat response centers in a similar way as experiencing physical pain or lack of food/water. However, positive social interactions and fulfilling these needs can trigger the brain's reward response and promote engagement. The document argues that understanding this research has important implications for leadership, such as being aware of how certain actions may threaten subordinates and influence their behavior, and focusing on cultivating an environment that meets peoples' social needs.
This document summarizes several influential social psychology experiments:
1) The "halo effect" demonstrates that positive global evaluations of a person, like being likable, can influence judgments of their specific traits, like being intelligent.
2) Studies of cognitive dissonance show that people interpret information in ways that support their own views and rationalize immoral behaviors.
3) The Stanford prison experiment found that participants took on roles assigned to them as guards or prisoners, conforming to expected behaviors even when abusive.
4) Milgram's obedience experiments surprisingly showed that ordinary people will inflict harm on others when ordered by an authority figure, demonstrating the power of conformity.
Social psychology is the scientific study of how people think about, influence, and relate to one another. It focuses on individuals and uses experimentation, compared to sociology which focuses more on groups. Some key questions social psychology asks include how much of our social world is in our heads, whether people would be cruel if ordered, and when people are motivated to help versus help themselves. Social psychology's big ideas can be boiled down to a few central themes, including that we construct our own social reality, our social intuitions are often powerful but sometimes perilous, and attitudes shape and are shaped by our behavior.
The Homunculus Problem: Why You Will Lose the Battle of BYODMichele Chubirka
BYOD, it's the new enterprise Boogie Man, striking fear into the heart of security professionals everywhere. We think this is a simple issue of policy, but if a recent study is correct and 20-somethings will risk their jobs to use their own devices, it's clear there's more going on. One explanation for the attachment to our smartphones and tablets can be found in neuroscience.
Studies show that texting, Twitter and Facebook usage activate the same addictive patterns in the brain as heroin and cigarettes. With advances in neuroengineering and brain computer interfaces, it sounds as if we're arguing with the inevitable, ultimate BYOD. Science continues to make advancements toward using technology to overcome the limitations of paralysis or to repair the damaged areas of the brain. Many of these devices will be wireless and in our enterprises. Parag Khanna and Ayesha Khanna in a recent TED book said we've entered a Hybrid Age, "...a new sociotechnical era that is unfolding as technologies merge with each other and humans merge with technology..." The BYOD cat is out of the bag, the barbarians are at the gates. Therefore, the answer to BYOD cannot be, “No,” but a qualified “Yes, and....”
It was a combined effort with my classmates Shareefa Abdul-Ali and Md Khan. We answer the question: Does moral action depend on reasoning? We used as our main sources the Antonio Damasio and Sigmund Freud ideas to answer this questions. In addition, we gave our personal opinion on the matter
After three decades of research, three major psychological theories of crime have emerged: psychodynamic theory, behavioral theory and cognitive theory. Learning these criminology theories and how to put them into practice is a component of an online Bachelor of Science in Criminal Justice degree program.
Similar to A New Model: Advancing Organizational Security Through Peacebuilding (16)
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
A New Model: Advancing Organizational Security Through Peacebuilding
1. A New Model: Advancing Organizational
Security Through Peacebuilding
2. Who Are We?
Michele Chubirka, aka "Mrs. Y.,” host and official nerd stalker of
the information security podcast, Healthy Paranoia.
www.healthyparanoia.net
chubirka@postmodernsecurity.com
@MrsYisWhy
Joe Weston, workshop facilitator, consultant, and author of the
book Mastering Respectful Confrontation. Also founder of the
Heartwalker Peace Project.
heartwalker@joeweston.com
http://www.respectfulconfrontation.com/
6. Language of Violence and Fear
Taxonomy of information security is borrowed from the
language of war.
How does this impact the user community?
How does this affect our lives?
Does it make us better at security?
7. 18% of users will visit a link in a phishing email (Verizon
2014 Data Breach Investigations Report).
86% of organizations have at least one high-risk
application (Check Point Security Report 2014).
37% of Americans are not concerned about computer
viruses and spam. 27 % were “somewhat concerned.” The
numbers are similar for online banking and shopping.
(Unisys Security Index)
2013 was the “Year of the Breach” with compromises at
Target, Neiman Marcus, Michaels, New York Times, and
the Washington Post. The human was the attack vector.
9. Maybe Users Aren’t Stupid
We spend millions of dollars on security products.
The weakest link is the user.
Even with training, users make the wrong choices.
What if the problem isn’t about the user, but us?
10. FUD Doesn’t Work
What does?
Leadership
Engagement
A “why” message.
Build and develop relationship for user
buy-in.
22. Key Areas to Balance for
Successful Leadership
Productivity
Relationship
Self Care
23. “Human beings have discretionary energy, and
they would give it to you if you treat them with
dignity and respect.”
-Paul O’Neill, former Treasury Secretary of US
under George W. Bush
24. When one moves into their vulnerability,
their true power is revealed.
30. "The human brain hasn't had a hardware upgrade in about
100,000 years."
Daniel Goleman, Author of Emotional Intelligence
31. Neuroscience 101
Limbic System: The interior of the cortex, includes the hippocampus and
amygdala. Supports emotion and long-term memory.
Prefrontal Cortex: Region responsible for planning, decision making and
moderating behavior.
Think of the limbic system to the prefrontal cortex as a horse is to a rider.
32. Demonstration: A Brain In the
Palm of Your Hand
Hold up your hand and make a fist.
This is a good representation of the brain and
spinal column.
The brain stem, limbic system and neocortex.
* These two slides are oversimplifications of a very complex
system.
33. The Threat Response: Step 1
Cortex receives input from the thalamus, a component of
the limbic system responsible for sensory information and
pain perception.
34. The Threat Response: Step 2
Limbic system and prefrontal cortex (the executive or
evaluator of the brain) take in data simultaneously.
35. The Threat Response: Step 3
Amygdala, responsible for emotional response and
memory, acts as an alarm activating the fight/flight
hormonal response if threat is perceived.
36. The Threat Response: 4
Sympathetic nervous system sets up organs and muscles
for fight/flight response, inhibiting digestion and the
hypothalamus prompts the release of stress hormones.
37. Emotional Contagion
Limbic system is an “open loop,” influenced by other
people’s emotions, aka mirror neurons.
Mirror neurons activate when an animal performs an
action or when an animal observes the same action of
another animal.
Basis of empathy.
Also called emotional contagion.
38. The Power of Mirror Neurons
Researcher Marie Dasborough observed two groups:
One group was given negative feedback accompanied
by positive emotional signs, nods and smiles.
Another was provided positive feedback that was
delivered using negative emotional cues, frowns and
narrowed eyes.
39. Entrainment
Those receiving positive feedback with negative
emotional signs felt worse than those receiving
negative feedback given with positive emotional cues.
Your emotions and actions are mirrored
by those around you.
40. Negativity
The brain has a negativity bias because the limbic
system is quicker than the prefrontal cortex when
evaluating threat.
Traumatic experiences are “stickier” than
positive, happy experiences, i.e. harder to un-map.
It takes five to twenty seconds for positive experiences
to register in the brain.
41. No Escape From Threat
Negativity is useful for a species to evolve.
Most are in a permanent state of cortisol overload due
to the constant stressors of modern life.
Stress hormones stay in the body for hours.
Decreases intellectual capacity, memory and lowers
impulse control.
Stress makes you stupid.
42. Amygdala Hijack
Intense and immediate emotional reaction, followed by the
understanding that it was inappropriate.
I thought that stick on the ground was a snake!
I don’t like you or I’m bored, so I won’t cooperate or listen to
what you have to say.
That guy who cut me off in traffic was trying to kill me!
Why were you so insulting to me in that email yesterday?
(studies show there’s a negativity bias in email.)
Other examples?
43. Thin Slicing: Warren Harding
Syndrome
Human beings make quick decisions based on intuition.
“Love at first sight” or a “gut reaction.”
Called “Thin Slicing” or “Fast Thinking.”
Example is “Warren Harding Syndrome.”
A mediocre presidential candidate, Americans voted for
him , because he was tall, good looking and charming.
45. Thin Slicing: Bedside Manner
The likelihood of a doctor being sued doesn’t correlate
with the number of errors made.
Psychologists can predict which doctors will be sued.
They analyze the amount of time spent with patients
and if the tone of their voices sounded “concerned.”
46. There’s No Mr. Spock
Neurologist, Dr. Antonio Damasio, had a patient who
had been a successful corporate lawyer.
A tumor was discovered in his prefrontal lobes.
When removed, the circuit between this area and
amygdala was severed.
47. Somatic Marker
No damage to his cognitive abilities, but his life fell
apart.
He couldn’t make decisions when presented with
simple choices.
He no longer had any feelings regarding options, no
preferences.
Basis for the Somatic Marker Hypothesis, a theory that
emotions assist with decision-making.
48. It is a gross
misconception that
reason can be
completely separated
from emotion.
Bounded Emotionality
50. Big Brains Are Social
Anthropologist Robin Dunbar found that a species’
brain size is linked to the size of its social group.
We have big brains in order to socialize.
51. We’re Wired for Empathy
In brain’s non-active moments, it reverts to a
configuration called the “default network.”
According to researcher, Matthew Lieberman, this
resembles the social thinking brain, which is empathetic.
52. Is Efficiency Overrated?
Study conducted by Gillian M. Sandstrom and
Elizabeth W. Dunn of the University of British Columbia.
People who “smiled, made eye contact, and talked with
the cashier” at a coffee shop reported better moods
than those who avoided interaction.
Small interactions with others can create a feeling of
connection according to researchers.
60. You’re the Threat
The WAY we present information is just as important as
the WHAT.
In the first few minutes we interact with someone, we’re
being assessed for threat.
61. “How To Break a Terrorist”
Interrogator, Matthew Alexander discovered that building
rapport with prisoners in Iraq was the most effective
interrogation method, not torture.
62. “The quickest way to get most (but not all) captives talking
is to be nice to them.”
Mark Bowden, author of Black Hawk Down
63. Effective Social Heuristics
Rule of thumb, experience-based problem solving
Tit for Tat:
1. Be kind first, keep a memory of size one, and imitate your
partner’s last behavior.
2. Only the last behavior is remembered and imitated.
3. Political scientist Robert Axelrod found this to be the most
frequently winning strategy.
Don’t Break Ranks
64. FBI’s Tips for Building Relationship
1. Understand the other’s priorities and goals.
2. Place their needs ahead of yours.
3. Listen without formulating your reply. Let the other person talk.
4. Ask for thoughts and opinions.
5. Suspend your ego, avoiding judgment and criticism.
Robin Dreeke oversees the FBI’s Counterintelligence Behavioral Analysis Program and author
of "It’s Not All About Me."
66. Methods of Engagement
• Interaction based on Emotional Intelligence: self-
awareness, self-regulation, empathy, and motivation.
• Social engineers and con artists use the same skills to
create emotional and social affinity with a target.
• Conflict resolution methods.
67. “We have to face the fact that either all of us
are going to die together or we are going to
learn to live together, and if we are to live
together we have to talk.”
- Eleanor Roosevelt
76. Goals
Learn about empowered, collaborative
engagement.
Reframe views on confrontation, assertiveness,
and true power.
Achieve greater self-confidence, personal
freedom, fulfillment, and peaceful interactions
with others.
78. Respectful Confrontation
The practice of developing the respectful self
The practice of respectful engagement
The practice of respectful offense
The practice of respectful defense
87. “Courage is what it takes to stand up
and speak. Courage is what it takes to
sit down and listen.”
- Winston Churchill
88. 1 : FIGHT, BATTLE, WAR 2 a : competitive or opposing
action of incompatibles : antagonistic state or action (as of
divergent ideas, interests, or persons) b : mental struggle
resulting from incompatible or opposing needs, drives,
wishes, or external or internal demands; see DISCORD
Conflict
89. Confront
con·front 1 : to face especially in challenge : OPPOSE 2
a : to cause to meet : bring face-to-face <confront a reader
with statistics> b : to meet face-to-face : ENCOUNTER
92. “If you fear making anyone mad, then
you ultimately probe for the lowest
common denominator of human
achievement.”
- Former President, Jimmy Carter
97. Aggressive
1 a: tending toward or exhibiting aggression <aggressive
behavior> b: marked by combative readiness <an
aggressive fighter>
2 a: marked by obtrusive energy b: marked by driving
forceful energy or initiative : enterprising <an aggressive
salesman>
3: strong or emphatic in effect or intent <aggressive colors>
<aggressive flavors>
4: growing, developing, or spreading rapidly <aggressive
bone tumors>
98. Assertive
1 : disposed to or characterized by bold or confident
assertion <an assertive leader>
2 : having a strong or distinctive flavor or aroma
<assertive wines>
101. Respectful Offense:
Giving Feedback
1. Prepare (come with facts, times, dates).
2. Make contact. Be sure it is a good time and place.
3. Introduce the topic. Let the other know why you are having this conversation
4. Share what you have NOTICED about the behavior in question. Give
examples.
5. Express how it affects you (feelings, state of being, unmet needs)
6. Identify desired need. Be open to listen to the need of the other.
7. Mention the desired behavior and collaborate on solutions.
8. Sum up. Make clear goals, agreements for the future, and how to follow up.
9. End the confrontation.
102. Important Feedback Points
You are addressing someone’s BEHAVIOR, not them
as a person.
You MUST share how their behavior affects you,
otherwise you are not giving feedback, you are
criticizing.
Name, behavior, effect, need, desired behavior,
followup
103. “With realization of one’s potential, and self-confidence in
one’s ability, one can build a better world.”
- His Holiness the Dalai Lama
104. “Water is fluid, soft, and yielding. But water will wear away
rock, which is rigid and cannot yield.... what is soft is
strong.”
- Lao Tzu
106. Key Takeaways
Bad trumps good in the human brain.
You can’t turn your emotions off, they’re critical for
decisions.
We’re all responsible for the quality of the emotional
landscape.
Stress makes you stupid, by shutting down blood flow
to the pre-frontal lobes.
If you set off a stress response in someone, you
minimize the chance of having a rational dialogue.
Confrontation isn’t always negative. Resistance to
change can be valuable feedback.
107. Cyber Peace
Peaceful doesn’t mean passive.
Peace isn’t the absence of war or conflict.
Violence isn’t always physical. There are subtle ways to
commit harm.
Stop blaming the victims and work in partnership with
our users to empower each other in our mutual goal
of security.
108. Where Can You Find Us?
Michele Chubirka, spending quality time in kernel mode.
http://www.healthyparanoia.net
Twitter @MrsYisWhy
Google+ MrsYisWhy
networksecurityprincess@gmail.com
Joe Weston, writing and teaching workshops.
http://www.respectfulconfrontation.com/
109. References
Chubirka, Michele. "Is Cyber Security a Form of Violence." Web log post. Packetpushers. Packetpushers, 31 Jan. 2012. Web.
Esfahani Smith, Emily. "Social Connection Makes a Better Brain." The Atlantic 29 Oct. 2013: n. pag. Print.
Goleman, Daniel, and Richard Boyatzis. "Social Intelligence and the Biology of Leadership." Harvard Business Review Sept. 2008: 74-81.
Print.
Goleman, Daniel. Working with Emotional Intelligence. New York: Bantam, 1998. Print.
Hanson, Rick, and Richard Mendius. Buddha's Brain: The Practical Neuroscience of Happiness, Love & Wisdom. Oakland, CA: New
Harbinger Publications, 2009. Print.
Kryder, Suzanne. The Mind to Lead. N.p.: NeuroLeap, 2011. Print.
Luders, Eileen, Florian Kurth, Emeran A. Mayer, Arthur W. Toga, Katherine L. Narr, and Christian Gaser. "The Unique Brain Anatomy of
Meditation Practitioners: Alterations in Cortical Gyrification." Frontiers in Human Neuroscience 6.34 (2012): 1-9. Print.
O'Connell, Andrew. "HBR Blog Network / The Daily Stat." Harvard Business Review. Harvard Business Review, 30 Oct. 2013. Web. 02 Nov.
2013.
Pink, Daniel H. Drive: The Surprising Truth about What Motivates Us. New York, NY: Riverhead, 2009. Print.
Pink, Daniel. "Why Bosses Need to Show Their Soft Side." The Telegraph 17 July 2011: n. pag. Print.
Rosenberg, Marshall B. Nonviolent Communication: A Language of Life. Encinitas, CA: PuddleDancer, 2003. Print.
Siegel, Daniel J. The Mindful Brain: Reflection and Attunement in the Cultivation of Well-being. New York: W.W. Norton, 2007. Print.
Weston, Joe. Mastering Respectful Confrontation: A Guide to Personal Freedom and Empowered, Collaborative Engagement. Emeryville,
CA: Heartwalker, 2011. Print.
Zehr, Howard. The Little Book of Restorative Justice. Intercourse, PA: Good, 2002. Print.
Editor's Notes
I’d like you to rewrite this in your language.
Pen exercise
Questions to ask that will engage audience:How many of you wanted to be in management?How many of you have an engineering or science degree?What does leadership mean to you?
Grounding exercise
Productivity Self carerelationship
None of this is opinion. It’s all grounded in the tenets of biology. If you look at a cross-section of the human brain, what you see is that it is actually laid out in three major components that correlate perfectly with The Golden Circle. Our newest brain, our Hom-sapien brain, our neo-cortex, corresponds with the What level. The neo-cortex is responsible for all of our rational and analytical thought and language. The middle two sections make up our limbic brain. Our limbic brain is responsible for all of our feelings, like trust and loyalty. It’s also responsible for all human behavior, all decision-making, and it has no capacity for language. In other words, when we communicate from the outside-in, though people can understand vast amounts of complicated information like features, benefits, facts and figures, it just doesn’t drive behavior. When we can communicate from the inside-out, we’re talking directly to the part of the brain that controls behavior and decision-making, and then people rationalize their decisions with the neo-cortex. The neo-cortex, the thinking part of the brain, is always trying to understand and make sense of the world. This is the reason we think we’re rational beings when we’re really not. If we were, we would never buy a product or service simply because of how it makes us feel. We would never be loyal, we’d always just choose the best deal. We’d never care about trust, we’d only evaluate the numbers. But we don’t do that. We do choose one product, service or company over another because we feel we can trust them more. We do buy things that we think are worth extra money even though all the facts and figures may indicate there is no significant difference. This is the reason we can say that people don’t buy What you do, they buy Why you do it and What you do simply serves as the tangible proof of what you believe. For the Golden Circle to work properly, you must have clarity of Why, discipline of How and consistency of What you do. For others to know Why you do what you do, you must be clear first. You must hold yourself and your people accountable to your values and guiding principles. And everything you say and everything you do must be consistent. We live in the tangible world. They only way people will know what we believe is if we say and do what we believe. Again – people don’t buy What you do, they buy Why you do it.
*This is a decade-old method social scientists use to measure perspective-taking – the ability to put yourself in someone else’s shoes.
break
What’s on the side of an LA police car? Protect and serve.