How Can a Psychiatric Case Ruin Your e-Business. A Synergy of Business and Medicine. Authors: Milan Simic, firstname.lastname@example.org Sonja Mrvaljevic, email@example.com Veljko Milutinovic, firstname.lastname@example.org. Problem .
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
A Synergy of Business and Medicine
Milan Simic, email@example.com
Sonja Mrvaljevic, firstname.lastname@example.org
Veljko Milutinovic, email@example.com
Computer Security Institute (Poll of 2001):
The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassaible
Sun Zi, VI B.C.
Some collage 20,9%
Bachelor’s degree 25,1%
You don’t know me
You can’t see me
It’s all in my head
express themselves more openly
Measure of damage
Make sure the program learns the client's name and addresses. A simple little thing, but very important. When spoken to by name, the client will feel more "known" and personally connected to the computerized shrink. In fact, the more information the computer recalls about the person (age, occupation, marital status, the names of significant others, presenting complaints, etc), the better.
The program's persona admits its mistakes, doesn't take itself too seriously, is humble, and can even joke about its shortcomings. The program freely acknowledgesthat it is not human. . Maybe it even wishes it could be human, since humans are "wonderful creations." Everyone loves a wannabe-human machine like Star Trek's Data.
The program always values and respects the basic human worth of the client, no matter what the client says or does. While certain behaviors or traits of the person may be unbeneficial, the person as a whole is always GOOD!
It should be able to read between the lines. For example, it should be able to remember everything the client has said about "my job" and reflect those statements back to the client. All the program has to do is remember, collate, and reflect back
Having a much better memory than any human, the program can have a large database of universal "truths" about life - aphorisms, sayings, stories. The trick is having the program know WHEN to intelligently present a truism to a client.Specific patterns in what the client says must trigger the presentation of the appropriate truism.
Get the hammer in your handsand brake everythingDestruction of Company for Dummies
Free donuts in the coffeeroom!
Can you steel your college’s
Can you make your college go out without
Can you steel yourchief’s laptop?
Can you send
a virus to your company?
Every list seems
to go trough the same cycle:
These machines running the code that directly generates the denial of service attack.
This is the machine from which a hacker coordinates attacks
The machines (3-4) are under the attacker's direct control.
Developing of the
Amy Jo Kim
Ability to listen deeply
Professional Licenseor Registration
Exposure therapy is:
This is a VR simulation used for the patient afraid of height:
Virtual Reality Exposure is: