Category Archives: News you can use

Examining Your Attachment Style

Posted on by

What Your Relationship With Your Parents in Childhood Portends

BY: CARLYLE JANSEN

Attachment theory was developed by John Bowlby in the late 1950s. He noticed that a child’s relationship with their primary caregiver, especially in terms of feelings of safety and security, affected their social, emotional and cognitive development. The theory evolved to show that the attachment we developed with our caregivers in our childhood affects how we interact with others in our relationships as adults. If we had a positive attachment in our childhood where we felt secure, cared for, and comforted in times of need, we generally have healthy attachments in our adult relationships. If we did not have a positive attachment as children, where we felt rejection or indifference by our caregivers to our pain, we might develop an anxious or avoidant style of connection with others.

Examining our own attachment style can help us better understand our behaviour patterns in relationships. We can also explore a partner’s or friend’s attachment style to better understand them, learn how to better meet their needs and/ or understand where some of the tension in our relationship arises.

Many of these relationship styles were formed and encoded at a preverbal stage and influenced by events for which we no longer have memory. Sometimes our responses only surface when we feel threatened, such as when we feel rejection, abandonment, criticism or physical danger. Sometimes our reactions can seem exaggerated given the current situation, but make sense when we consider earlier traumatic events and the patterns that they created.

Secure Attachment

People with a secure attachment (approximately 55- 60% of the population) had a good connection as children with their caregivers, feeling secure to venture out independently to explore the world and return home to a safe base.  These people tend to thus feel safe and more satisfied in their relationships as adults in general. They are less likely to take things personally and are able to problem solve and engage in conflict in a healthy way, forgiving and accepting their partner’s shortcomings. They feel connected while they and their partner explore the world independently and separately. They also rely on their partner for support when feeling distressed and trust that it will be given, as well as being supportive to their partner in the same way. There is honesty, openness and equality. When it comes to sex, those with secure attachment tend to advocate for their own needs and respond to their partner’s desires without compromising their own.

Anxious Preoccupied Attachment

People with this style likely had inconsistent intimacy and security as children from their caregivers. They tend to want a partner to complete them, sometimes rushing into a less-than-ideal relationship. They can be watchful and hyper-vigilant, analyzing their partner’s actions for signs of love or abandonment. They can be emotionally clingy, demanding or possessive, looking for security in the relationship.  Their very fear of abandonment and sense of jealousy ironically is what often drives a partner away. They might withdraw or have an emotional outburst in order to gain their partner’s attention. When it comes to sex, they tend to engage in sex in order to ease their insecurities, including pleasing their partner to gain their partner’s reassurance or love. Because they often ignore their own needs, they can become unhappy.  They may even endure an abusive relationship at least initially, interpreting their partner’s possessiveness as a sign of passion and love.

Dismissive Avoidant Attachment

People with this style learned how to suppress their desire for closeness because they did not receive it as a child. They thus tend to be emotionally distant and self-sufficient. They do not rely on a partner, protecting their independence and believing that they do not need connection. They can become hyper-vigilant, looking for signs that a partner is trying to control their autonomy or freedom. They don’t want to feel too close as a defence mechanism against the possibility of the pain of rejection. When turmoil arises in the relationship they are able to turn off their feelings and detach. Dismissive avoidant people tend to enjoy the physical aspects of sex but with detached emotional connection to a partner.

Fearful Avoidant Attachment

People who developed a fearful avoidant style of attachment are afraid of both being too close and too detached. They want to get their needs met by a partner but then get anxious about being too close and getting hurt by them. They suppress their desire for closeness out of fear. When they fear abandonment they move closer and when they fear too much emotional intimacy they feel suffocated and pull away. As a result, they tend to be unpredictable in their emotions and moods which they might have a hard time controlling.  They tend to have relationships that are filled with drama with many highs and lows.

What is my style?

There are many free online tests that will assess one’s attachment style as well as more formal (and usually more accurate) tests that can be done through a therapist or psychologist. One non-scientific way to guess our own or someone’s attachment style is by reflecting on our/ their behaviour, especially when a partner asks for more intimacy or closeness. A positive response will likely come from a securely attached person who is also able to compromise. Defensiveness or discomfort from the request are signs of dismissive avoidance. A fearful avoidant person might feel elated or claustrophobic as a result of the request, depending on the current level of intimacy. Someone with anxious preoccupied style might welcome the request but still need assurances about the relationship.

Can You Change Your Style?

We tend to maintain the type of attachment style that we learned early in life to our later relationships. We can change our style, although it requires some conscious effort, self-reflection, and maybe therapy for insight. If you do not have a secure attachment style, then learning to understand, express and value your own relationship needs is important. It is also good to enhance your self-esteem so that you can discern whether you can meet a partner’s needs without compromising your own or not. Especially for folks who are not securely attached, it is good to look for someone who does have a secure attachment. Otherwise, the dynamic between two individuals with non-secure attachments can be chaotic without a lot of self-reflection and commitment to communication.

Ultimately attachment style is just one tool for examining one’s relationship patterns. Any tool is just that: something that can be used from time to time as is useful. There are many other influences on our personalities, behaviours and relationships as well. It may be more relevant for some people and relationships than others. Have a look through the attachment style window for reflection and exploration to see if it raises any new insights for you.

 

Carlyle Jansen is the founder of Good For Her, a sexuality shop and workshop centre in Toronto. If you have questions or comments, email carlyle@goodforher.com or go online to goodforher.com

 

 

Waiting For The Black Swan | Zero Hedge

Posted on by

Sometimes an Archduke is just an arch duke…

…Given the importance of oil, however, we should not be focused on merely its price, although that’s important, but also it’s availability.  Yes, shortages will lead to price spikes, and those will crush over-indebted countries, companies and individuals alike, but shortages will, by necessity, also lead to less economic activity.  Exactly how all that plays out is entirely unknowable.  Welcome to complexity theory which states that the behaviors of complex systems cannot be predicted.  They can be observed.  What actually happens are called emergent behaviors.

If a war with Iran breaks out, and the Strait of Hormuz gets closed down for any length of time (say, more than a month) there will be a shortage of oil that will lead to a price spike.  And a physical shortage.  How all that plays out in a world groaning under the weight of too much debt is unknowable, but it won’t be favorable.  Or pretty, or desired.

What happens to complex global, integrated, just-in-time delivery systems is also unknowable.  But it won’t be pretty.  We’ll just have to watch as supply chain disruptions spread though a complex universe of derivatives, 12% zombie companies, cov-lite loans, $4-trillion of emerging market dollar-denominated debt, already astonishing fiscal deficits, underfunded pensions and all the rest.

With the new attacks on two more oil tankers in the Gulf of Oman, and the US’s immediate blaming of Iran, there’s a much higher than acceptable risk of a very damaging war breaking out that will close the Strait of Hormuz.

Conclusion

The world is sitting on an enormous pile of debts and related IOUs.  One that could easily catch fire and burn with the slightest provocation.  While the central banks can print money, create the easiest financial conditions in decades, and constantly intervene in both word and deed in every financial market (which they do), the one thing they cannot do is print up more oil.

If the Strait of Hormuz gets shut down for any length of time that’s going to be a black swan event.  It will be unforeseen, have a large impact, and afterwards people will try to explain the resulting complexities in simplistic ways.

Source: Waiting For The Black Swan | Zero Hedge

“They Had Me At Gunpoint”: Hertz Customers Keep Getting Arrested For Driving “Stolen” Cars | Zero Hedge

Posted on by

This happened to me with U-Haul. It’s a real thing. It’s a weird thing. Yep, we were driving up Sherman avenue in Hamilton and I noticed two cruisers behind me. It was a one-way street at this point that I was turning onto. I got kind of flustered as I wasn’t sure I could make the turn on a red light, so I waited. I think that’s the moment they thought they’d do me. I turned, they followed. I went past the first light and next thing I know a cruiser is beside me and one is behind me. They arrested me, cuffs and bucket seat in the cruiser for about 30 minutes when they finally let us go. I could go on…

Source: “They Had Me At Gunpoint”: Hertz Customers Keep Getting Arrested For Driving “Stolen” Cars | Zero Hedge

The Origins of the Deep State in North America. PART III.

Posted on by

Source: The Origins of the Deep State in North America. PART III.

How To Prepare For A Cyber-Attack | Zero Hedge

Posted on by

Technopedia lists the following consequences of a cyber attack:

  • Identity theft, fraud, extortion
  • Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses
  • Stolen hardware, such as laptops or mobile devices
  • Denial-of-service and distributed denial-of-service attacks
  • Breach of access
  • Password sniffing
  • System infiltration
  • Website defacement
  • Private and public Web browser exploits
  • Instant messaging abuse
  • Intellectual property (IP) theft or unauthorized access

Cyber attacks happen far more frequently than you might think. Check out this real-time map [<<–THIS IS COOL -ed] for a look at the almost constant siege.

How does a cyber attack affect you?

You may think that if you don’t spend your day working online, that an attack on our computer infrastructure isn’t that big of a deal. You may feel like it wouldn’t affect you at all.

Unfortunately, there are very few people in the country that would remain completely unaffected in the event of a major cyber attack. Our economy, our utility grids, and our transportation systems are all heavily reliant upon computers. This makes us very vulnerable to such an attack.

And by vulnerable, I mean that if it was done on a big enough scale, it could essentially paralyze the entire country.

Here are some of the systems that are reliant on computers.

In the event of a widespread cyberattack, the following could be either completely inoperable or breached. Keep in mind that a domino effect could occur that effects systems beyond the original target.

  • Gas stations (most of the pumps are now digital and connect right to your bank)
  • Banks (all of the records are online) would not be able to process electronic transactions. ATM machines would not function to allow customers access to cash.
  • Utility systems (most power stations are run by computers)
  • Water treatment facilities (these are automated too)
  • Protection of personal information, including data about your finances, medical records, physical location, and academic records – everything a person would need to steal your identity
  • Government operations, including dangerous identifying information about federal employees or members of the military
  • Transportation systems (trains, subways, and planes are heavily reliant upon computers)
  • Traffic management systems like stoplights, crosswalks, etc.
  • Air traffic control
  • Everyday trade – most businesses have a computerized cash register that communicates directly with banks. Many businesses are also reliant on scanning bar codes for inventory control and pricing. Point-of-sale systems would be down and people would not be able to pay using credit or debit cards.
  • Telecommunications systems can be affected if cell towers are disabled or if the landline system were directly attacked. As more people rely on VOIP, taking down internet service would serve a dual purpose.
  • SMART systems could be shut down or manipulated. All of those gadgets that automate climate control, use of utilities, or appliances through SMART technology are vulnerable.

Here’s a video from NATO that explains a little bit more about the dangers of cyber attacks.

Prepping to survive a cyber attack

Source: How To Prepare For A Cyber-Attack | Zero Hedge

Category: Cities, News you can use | Tags: ,