blog traffic analysis
This-essay is a8501013.htm which is available at the web-site www.essayz.com. See more notes at the bottom. Previous-Essay <== This-Essay ==> Following-Essay By-Months By-Years By-Words Webs of Like-&-Un-Like ESSAYS <==> Like-&-UN-Like This-One ========================================================== %TRAGIC ARMS RACE 850101 When we feel threatened and vulnerable we seek to defend ourselves by taking advantage of the vulnerability of our enemy. We attack or threaten our perceived enemy at the point of their vulnerability, even if our perceptions do not correspond to any objective reality of threat of attack by another whom we have perceived to be an enemy. Our perceptions of insecurity can cause us to act as enemy towards others by taking advantage of their points of vulnerability. Our perceptions of insecurity lead us to make them insecure and defensive, seeking to maximize their points of vulnerability. We fear rejection, estrangement, alienation, separation, ridicule, being made to be alone. We fear that our tentative moves towards intimacy will be rebuffed, rejected, making us to be alone. We want intimacy and closeness, but fear that our advances will not be perceived as being mature and friendly. They may be experienced by another as a threat and they may take advantage of our having made ourselves to be vulnerable by making a friendly advance. They may fear being close and intimate. They may fear the vulnerability of intimacy and mistake our friendly advances as threats to their security. Thus they may seek to achieve security by avoiding the vulnerability of being intimate. Too often we forget that we are genuinely secure only when we can safely and without fear be vulnerable. We seek security through techniques which minimize vulnerability, when in reality we can not have genuine security in the absence of vulnerability. To enjoy security we need to make it safe for others to be vulnerable, and to reduce their fear of being vulnerable. The arms races of mankind are run in ignorance of the true nature of security and how it may be enjoyed. The arms races are technical efforts to achieve that which can not be achieved by technical efforts of any kind. In fact the efforts are tragically counter-productive, destroying that which they seek to achieve. (c) 2005 by Paul A. Smith in www.essayz.com Search for Integrity and Honesty (On Being Yourself, Whole and Healthy) ==========================================================
Lines beginning with a percent sign are  KEYWORDS  for use
in ESSAY-System Searches.  Their terminal digits are dates
of writing in the format @yymmdd#, where @ =  a  means 99,
@ =  b  means 20, and # = is a within-date essay-count.

Links to date-adjacent essays are near  page top & bottom.

Find the following links by clicking on CENTER when CENTER near the top or bottom of a web page of essayz.com 1. Go to HOME PAGE of essayz.com 2. Find brief-essays via keywords 3. Find brief-essay about ADDICTION 4. Search-Helps related to ABOVE-LINK 5. GoTo Action & Information Center 6. Find Regular-Essays via Year/Month 7. Find Regular-Essays via Word-Starts 8. Find Regular-Essay about LOVE

This-essay is a8501013.htm which is available at the web-site www.essayz.com. These 5 lines echo top lines. Previous-Essay <== This-Essay ==> Following-Essay By-Months By-Years By-Words Webs of Like-&-Un-Like ESSAYS <==> Like-&-UN-Like This-One