blog traffic analysis
This is http://www.essayz.com/a8704262.htm Previous-Essay <== This-Essay ==> Following-Essay Click HERE on this line to find essays via Your-Key-Words. {Most frequent wordstarts of each essay will be put here.} ========================================================== %MORAL VULNERABILITY SECURITY VS CONTROL 870426 Genuine security entails the freedom to enjoy peaceful intimacy within relationships which entail mutual vulnerability. People who believe that it is important to achieve and maintain control become addicted to means which they believe will guarantee them security in the absence of mutual vulnerability, openness, and honesty. Ultimately such people believe that their security and self esteem will be grounded in defensive measures which will give them control over their own security and self esteem. They believe that only when they can be proud of how secure they have made themselves can they rest and be at peace. Yet their disease of addiction to techniques for achieving security and self esteem will not let them relax. They always feel that additional efforts and technologies must be developed to improve their security. Additional defense initiatives are always called for, because they want to be in full control of their own security viewed as invulnerability. They can not even trust their friends to be appropriately on the defensive at all times. Defensive people are often disappointed to find that the friends whom they trusted to distrust the enemy---fail to be always distrustful, become friends with the enemy, and even fall in love with the enemy. Such intimacy and mutual vulnerability can not be tolerated if one is to achieve total control of security. No member of the defense establishment may be permitted to become friendly with the enemy; for then there may be security leaks and security may leak away through friendly encounters. Security must not be allowed to leak away through security leaks. Security is a limited resource and it must be conserved. Information upon which security is based must not be allowed to leak away. Secrecy is very important as a technology for the achievement of security. Information control is essential to the achievement of total security. It would be good to achieve total information control to have total security. People who lack self esteem find it impossible to achieve security through control. They also find it impossible to believe that genuine security entails mutual vulnerability over which secure people have no control; that genuine security entails total openness and honesty rather than secrecy. (c) 2005 by Paul A. Smith in (On Being Yourself, Whole and Healthy) ==========================================================