Open Access. Powered by Scholars. Published by Universities.®

Other Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Other Psychology

The Mirror Effect, The Law Of Attraction, And "Points Of Attraction" That Can Nurture The Evolution Of Human Consciousness, Carroy U. Ferguson Jul 2009

The Mirror Effect, The Law Of Attraction, And "Points Of Attraction" That Can Nurture The Evolution Of Human Consciousness, Carroy U. Ferguson

Carroy U "Cuf" Ferguson, Ph.D.

This message has several purposes. First, I want to express my immense joy that Chip Baggett and I are serving as Co-Presidents of AHP since August 16, 2009. In my view, Chip and I are long-time friends, who have a transcendent connection and synergistic energies. My desire and intent is for our co-presidency to mirror the effect(s) of synergistic collaboration as a “point of attraction” that can assist in the evolution of human consciousness across often “perceived personal and societal boundaries” (e.g., race, culture, ethnicity, class, individual and collective belief systems, and dogma). More generally, however, this message is intended …


Archetypal Energies, The Emergence Of Obama As A Practical Idealist, And Global Transformation, Carroy U. Ferguson Feb 2009

Archetypal Energies, The Emergence Of Obama As A Practical Idealist, And Global Transformation, Carroy U. Ferguson

Carroy U "Cuf" Ferguson, Ph.D.

During this time of change, AHP and kindred spirits on the edge have important roles to play. We are the keepers and nurturers of a transformative and evolutionary Vision for Consciousness and a more humane world. At issue is what I will call the “psychic politics” for global transformation, nurtured by practical idealism and the Archetypal Energies. In other writings, I have described Archetypal Energies as Higher Vibrational Energies, operating deep within our individual and collective psyches, which have their own transcendent value, purpose, quality, and “voice”, unique to the individual. We experience them as “creative urges” to move us …


Hamas Controlled Televised News Media: Counter- Peace, Allen Gnanam Jan 2009

Hamas Controlled Televised News Media: Counter- Peace, Allen Gnanam

Allen Gnanam

The hegemonic force of Hamas censored televised news media in Gaza, can not be fully comprehended and appreciated without recognizing the role of propaganda, censorship, and the historical context of the middle east. These 3 interrelated dimensions will be analyzed using functionalism, the mass society theory, the dominant ideology framework, the critical criminology framework, and the symbolic interactionist framework. Through censorship, Hamas news media outlets were able to unilaterally inject culturally relevant propaganda, into the minds of children and citizens. The hypodermic syringe model can be applied to the state controlled news media situation in Gaza, as the people of …


Non Nation Destabilizing Eradication Of Opium Cultivation In Afghanistan: A History Backed Analysis, Allen Gnanam Jan 2009

Non Nation Destabilizing Eradication Of Opium Cultivation In Afghanistan: A History Backed Analysis, Allen Gnanam

Allen Gnanam

A successful and non nation destabilizing eradication of opium cultivation in Afghanistan, is contingent upon the mandatory countering of interconnected (a) economic obstacles, (b) sociocultural obstacles, and (c) political obstacles that are fueling and maintaining the illegal production and trade of heroin. This paper will explore and analyze the above mentioned interconnected obstacles, in order to present the complex issues that need to be addressed when it comes to dismantling the illegal opium bastion in Afghanistan. At a macro- level Foucault’s triangular model that identifies the interconnectivity between the government, the population, and the political economy (1978) will be utilized …


Cyber Terrorism, Allen Gnanam Jan 2009

Cyber Terrorism, Allen Gnanam

Allen Gnanam

This paper sets out to identify and explain the negative national security implications, negative physical & psychological implications, and the negative economic implications that society could face, as a result of a severe cyber attack against major sectors of a nations infrastructure. In addition instigating factors that lead to/ provoke cyber terrorism will be identified, in order to strategically influence counter cyber terrorism policy towards an offensive model. Along with that, this paper will present defensive/ target hardening counter- cyber terrorism policies that will enable proactive security mechanisms to be implemented.


Book Review Of: Crime In An Insecure World: By Richard Ericson, Allen Gnanam Jan 2009

Book Review Of: Crime In An Insecure World: By Richard Ericson, Allen Gnanam

Allen Gnanam

Crime in an Insecure World written by Richard Ericson, depicts western society as a neo-liberal state, that has an impulsive tendency to criminalizes all sources of harm through precautionary logic, risk assessment, surveillance measures, and counter law I and II, due to the dominant culture of impulsive criminalization that produces uncertainty. Counter Law, precautionary logical, risk assessment, and uncertainty are the 4 major concepts discussed by Ericson, and these concepts will be analyzed and interpreted during this book review.


Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam Jan 2009

Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam

Allen Gnanam

This paper is theoretically grounded on the Ban opticon framework that is characterized by the use of exceptionalism, the normalization of imperative movement, and profiling for insecurity management purposes (Bigo, 2005). This framework will be utilized in order to expose and analyze the Ban optic governmentality of the private security industry. Secondly, the overall discussion and analysis of the private security industry- Ban opticon nexus will be discussed with specific reference to the private security operations of The New Commons. Thirdly, three private security intelligence networks identified by Lippert & O’Connor (2006) namely Disciplinary Networks, Private Justice Networks, and Multilateral …