blog traffic analysis
This-essay is a7807071.htm which is available at the web-site www.essayz.com. See more notes at the bottom. Previous-Essay <== This-Essay ==> Following-Essay By-Months By-Years By-Words Webs of Like-&-Un-Like ESSAYS <==> Like-&-UN-Like This-One ========================================================== %FEAR OF INVULNERABILITY 780707 When we feel insecure we yearn for invulnerability--- out of a feeling that invulnerability would provide us with security. When we meet a person who appears to us to have the invulnerability for which we yearn---we fear that person, for that person's invulnerability implies vulnerability on our part; we cannot be safe if they are invulnerable. Invulnerability undermines the possibility of mutuality, and so of intimacy. Since intimacy is essential to emotional security, invulnerability undermines the possibility of emotional security. When we feel insecure we yearn for invulnerability---and if we succeed in achieving invulnerability we thereby undermine the possibility of the emotional security which we thought we could achieve through invulnerability. When we achieve invulnerability, other persons fear us in ways that put them on the defensive, and possible on the offensive. Their defensive/offensive postures threaten our invulnerability and again we feel insecure and keep "yearning" for invulnerability. Then we may devise clever techniques for regaining our technical invulnerability---in a futile effort to technically achieve security in the absence of mutuality and intimacy. Our technical success occasions a similar technical effort on the part of our enemies---and we both end by escalating our technological efforts to achieve security without mutuality or intimacy. Our efforts to achieve technological security undermine the openness, trust, honesty, mutuality, and dialogue which are essential to meaningful security. As a result, we end up with a meaningless technological security system which leaves us emotionally insecure---and in an unstable balance of illogical terror upon which our technological security is predicated. We learn to trust each other---to fear each other's terribly logical behavior; with an unreasonable unspoken mutual understanding that we will destroy the other after we have nothing to gain from doing so. Our distrust in small things---forces us into situations where the stakes are ultimate, and we must trust each other to an extent which we cannot acknowledge. We then collusively think that our "security" is the result of our technological accomplishments, not the fruit of our dishonest trust in each other. Meaningful security is given to those who share their vulnerability in trust. (c) 2005 by Paul A. Smith in www.essayz.com Search for Integrity and Honesty (On Being Yourself, Whole and Healthy) ==========================================================
Lines beginning with a percent sign are  KEYWORDS  for use
in ESSAY-System Searches.  Their terminal digits are dates
of writing in the format @yymmdd#, where @ =  a  means 99,
@ =  b  means 20, and # = is a within-date essay-count.

Links to date-adjacent essays are near  page top & bottom.

Find the following links by clicking on CENTER when CENTER near the top or bottom of a web page of essayz.com 1. Go to HOME PAGE of essayz.com 2. Find brief-essays via keywords 3. Find brief-essay about ADDICTION 4. Search-Helps related to ABOVE-LINK 5. GoTo Action & Information Center 6. Find Regular-Essays via Year/Month 7. Find Regular-Essays via Word-Starts 8. Find Regular-Essay about LOVE

This-essay is a7807071.htm which is available at the web-site www.essayz.com. These 5 lines echo top lines. Previous-Essay <== This-Essay ==> Following-Essay By-Months By-Years By-Words Webs of Like-&-Un-Like ESSAYS <==> Like-&-UN-Like This-One