SlideShare une entreprise Scribd logo
1  sur  17
 
Defining Cyber-Sex ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Birds do it, bees do it, and now people with computers do it .” - Gloria G. Brame
The Danger Zone ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ The most exciting attractions are between two opposites that never meet.” -Andy Warhol
Signs of Betrayal from the Virtual World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Nobody in his right mind would call me a nymphomania. I only have cyber-sex with witty men.” - Unknown
When Cyber-Sexual Impulses Go Haywire:   ~An very important side note~ ,[object Object],[object Object],[object Object],[object Object]
Emotional Reactions from Being Cyber-Cheated on ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Repercussions on Family and Friends ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What to Do Now? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some Family Interventions Tips (Young, 2001) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Cyber Deal Breaker's: Deciding “To Go”, most likely, forever [ NOTE: These are Anna’s Hypotheses!] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Deciding “To Stay” and Go Through Therapy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
On the path to long-term change… (Young, 2001) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relapsing and The Recovery Zone (Carnes et al., 2001) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
If time allows… an interesting video from a MFT who specializes in Internet Cyber Affairs  Salvaging Your Relationship - Dr. Sheri Meyers
An Explanation of How Cyber-Affairs Can Be Dealt with in Family and/or Couples Therapy  ,[object Object]
Any questions?  :)
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

En vedette

En vedette (19)

Health promotion and social media final dec
Health promotion and social media final   decHealth promotion and social media final   dec
Health promotion and social media final dec
 
Health promotion
Health promotionHealth promotion
Health promotion
 
House dust mite allergy
House dust mite allergyHouse dust mite allergy
House dust mite allergy
 
Allergies hayfever
Allergies hayfeverAllergies hayfever
Allergies hayfever
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Wound healing
Wound healingWound healing
Wound healing
 
Health Education
Health EducationHealth Education
Health Education
 
Wound care
Wound careWound care
Wound care
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Soft tissue injuries
Soft tissue injuriesSoft tissue injuries
Soft tissue injuries
 
Anxiety Disorders
Anxiety DisordersAnxiety Disorders
Anxiety Disorders
 
Muscle Injury , Inflammation & repair
Muscle Injury , Inflammation & repair Muscle Injury , Inflammation & repair
Muscle Injury , Inflammation & repair
 
Is Internet Addiction Real? - Facts & Stats
Is Internet Addiction Real? - Facts & StatsIs Internet Addiction Real? - Facts & Stats
Is Internet Addiction Real? - Facts & Stats
 
Effects of drug abuse and addiction
Effects of drug abuse and addictionEffects of drug abuse and addiction
Effects of drug abuse and addiction
 
Fractures
FracturesFractures
Fractures
 
Wound care lectures
Wound care lecturesWound care lectures
Wound care lectures
 
Presentation on Panic Disorder
Presentation on Panic Disorder Presentation on Panic Disorder
Presentation on Panic Disorder
 
Muscular System: The Cardiac Muscle (Heart)
Muscular System: The Cardiac Muscle (Heart)Muscular System: The Cardiac Muscle (Heart)
Muscular System: The Cardiac Muscle (Heart)
 
Health education lecture 1
Health education lecture 1Health education lecture 1
Health education lecture 1
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Cyber Affairs

  • 1.  
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. If time allows… an interesting video from a MFT who specializes in Internet Cyber Affairs Salvaging Your Relationship - Dr. Sheri Meyers
  • 15.
  • 17.

Notes de l'éditeur

  1. Physiological Needs These are biological needs. They consist of needs for oxygen, food, water, and a relatively constant body temperature. They are the strongest needs because if a person were deprived of all needs, the physiological ones would come first in the person's search for satisfaction. Safety Needs When all physiological needs are satisfied and are no longer controlling thoughts and behaviors, the needs for security can become active. Adults have little awareness of their security needs except in times of emergency or periods of disorganization in the social structure (such as widespread rioting). Children often display the signs of insecurity and the need to be safe. Needs of Love, Affection and Belongingness When the needs for safety and for physiological well-being are satisfied, the next class of needs for love, affection and belongingness can emerge. Maslow states that people seek to overcome feelings of loneliness and alienation. This involves both giving and receiving love, affection and the sense of belonging. Needs for Esteem When the first three classes of needs are satisfied, the needs for esteem can become dominant. These involve needs for both self-esteem and for the esteem a person gets from others. Humans have a need for a stable, firmly based, high level of self-respect, and respect from others. When these needs are satisfied, the person feels self-confident and valuable as a person in the world. When these needs are frustrated, the person feels inferior, weak, helpless and worthless. Needs for Self-Actualization When all of the foregoing needs are satisfied, then and only then are the needs for self-actualization activated. Maslow describes self-actualization as a person's need to be and do that which the person was "born to do." "A musician must make music, an artist must paint, and a poet must write." These needs make themselves felt in signs of restlessness. The person feels on edge, tense, lacking something, in short, restless. If a person is hungry, unsafe, not loved or accepted, or lacking self-esteem, it is very easy to know what the person is restless about. It is not always clear what a person wants when there is a need for self-actualization.