Reply to Lynn: The Trojan Horse is Alive and Well

نویسنده

  • Richard P. Kluft
چکیده

In his brief communication, Lynn represents himself as providing additional “caveats regarding the potential risk of pseudomemories and the dangers of reifying metaphors offered to clients in the process of clinical hypnosis,” correcting an oversight in a previous communication on the hidden observer (Lynn, Mare, Kall, Segal, & Sivec, 1994). He indicates that phenomena that he designates as metaphors, such as hidden observers, inner advisors, and ego states, etc., are “in no way true personality fragments or independent identities with distinct past histories.” Instead, they are “merely metaphors for the fact that different experiences and perspectives...can be accessed when situational demands are conducive to examining one’s life in fresh ways.” He wants to be sure that patients are unlikely to perceive these phenomena as more than metaphors before any intervention using such phenomena as metaphors is undertaken. He believes that such metaphors should never be used in the context of age regression for memory recovery and that age regression should not be used in the exploration of memory. By implication, many venerable hypnotic techniques should be eliminated from our armamentarium, or their use should be reduced drastically and/or surrounded with special caveats and additional exercises in the obtaining of informed consent.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ELT: A Trojan Horse in Disguise?

Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

Transfer Reactions and Trojan Horse Method

It is pointed out that the Trojan-Horse method is a suitable tool to investigate subthreshold resonances. TRANSFER REACTIONS AND TROJAN HORSE METHOD A similarity between cross sections for two-body and closely related three-body reactions under certain kinematical conditions [1] led to the introduction of the Trojan-Horse method [2, 3, 4]. In this indirect approach a two-body reaction

متن کامل

SOC IC Trojan Thwarting by Identification of Trojan

IC Trojan horse is a serious technical problem faced by SOC developers. Most of the SOC developers use third party IP components for their design purpose. So comparing with a Trojan-less counterpart is impossible. Villasenor and Kim proposed bus architecture to detect Trojan activity where, when the circuit realizes the presence of a Trojan, it informs the CPU by an interrupt. In this paper, we...

متن کامل

UDC 621.395:004.491.23, DOI:10.2298/CSIS090330027F Trojan horses in mobile devices

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003