Skip to main content

Emile Weaver and the Dangers of Denial


   
Emile Weaver and the Dangers of Denial
by kirstensalyer2015

A former college student was recently sentenced to life in prison without parole for killing her newborn daughter and disposing her in a trash bag in April. In her defense, Emile Weaver said she was in denial about the pregnancy and thought the child was already dead when she put her in the bag.

Some people might look at the 21-year-old who committed this heinous act and see a person with an extreme sense of entitlement or a psychopath with a disregard for life—a convicted murderer. They might say that she’s the epitome of irresponsibility.

I'll leave specific judgment to her courtroom. But it is worth exploring the possibility of the role of denial in instances like this.

Research shows there’s extensive debate regarding the reliability of people’s memories: how do we know that what people remember is real? And perhaps no aspect of cognitive development and functioning has been as rift with contention as the “forgetting” of traumatic events.

Numerous variables influence the accuracy of our memories: things like age, mood, situational context, sleep and intoxication, to name a few. In general, we’re less accurate in our remembering an event when we’re 5 than when we’re 12 than when we’re 20. But there's also a lot that we don't know.

For example, studies have shown that the accuracy of our memory—both what we encode and what we are able to retrieve from storage—can be colored by stress and the presence of psychiatric disorder. Yet research on the extent to which immediate perceived threat affects memory is much more mixed.

Freud proposed that unwanted experiences could be banished from our consciousness through a process called repression. Research has shown that we can suppress unwanted memories: if every time we encounter some reminder of the event, we reject and push it from awareness, its recall becomes harder and harder. In a review of the behavioral and neuro-imaging literature, Michael Anderson and Simon Hanslmayr document how repression actually occurs in the brain: through functional magnetic resonance imaging researchers actually identified the neural mechanisms of motivated forgetting.

In other words, we know people can suppress thoughts and memories. But determining how often and under what circumstances may take additional research to find out.

All humans engage, consciously or unconsciously, in minimizing or denying some aspects of their lives. For example, we may not fully recognize or acknowledge our spouse’s drinking or admit to ourselves that our kid isn’t the star athlete or student we’d hoped. This kind of coping strategy can be quite healthy and self-protective, allowing us to maintain some wishful thinking, compartmentalize stress and carry on in the face of problems of daily living.

Such massive and sustained breaks from reality, such as the one suggested in Weaver’s case, are more uncommon. But there is a possibility that they occur: by keeping certain knowledge out of conscious awareness, people can deny its existence.

These are the questions we should be asking: How can we help those we love deal with overwhelming events in their lives? And how can we reconcile the demands and/or limitations of our psyche with those of the weight of reality?

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…