community

advertisement
How Can a Psychiatric Case
Ruin Your e-Business
A Synergy of Business and Medicine
Authors:
Milan Simic, frejzer@yahoo.com
Sonja Mrvaljevic, dzerejna@yahoo.com
Veljko Milutinovic, vm@etf.bg.ac.yu
1
Problem ...

What are the damages that a psycho case
can create to your e-business on the Internet?
• Absence from the work
• Lower productivity at the work
• Physical damages to the work
Page Number 2/87
Do you really think
that they can make no real harm?
Computer Security Institute (Poll of 2001):
 25% (of respondents) detected system penetration
from the outside.

27% detected denial of service attacks.

79% detected employee abuse of Internet access privileges
(e.g., downloading pornography or pirated software or
inappropriate use of e-mail).

85% detected computer viruses.

273 organizations (that were able to quantify their losses)
reported the total loss of $265,589,940.
Page Number 3/87
… A Solution




Prevent
Defend
Help these people
If you can not win
against them,
join them!
Page Number 4/87
If Still Skeptic, Read This:
The art of war teaches us to rely not on the likelihood of the
enemy’s not coming, but on our own readiness to receive
him; not on the chance of his not attacking, but rather on
the fact that we have made our position unassaible
Sun Zi, VI B.C.
Page Number 5/87
The Internet
• Internet traffic doubling every three or four months
• By 2004, the Internet use will grow to over 700M users
• The growth chart is of S-type
Page Number 6/87
Year 2000
Age
Male 52,7%
Female 47,3%
Education
H.S.graduated
Some collage
Bachelor’s degree
Post-graduated
18,8%
20,9%
25,1%
16,9%
0-17
18-24
25-34
35-44
45-54
55-65
65+
19,1%
11,3%
19,1%
23,0%
17,2%
6,7%
3,7%
Page Number 7/87
Online Disinhibition Effects
loosen up
You don’t know me
You can’t see me
Delayed reactions
feel
uninhibited
It’s all in my head
Interaction effect
express themselves
more openly
Page Number 8/87
*From Stanford University
Page Number 9/87
*From Stanford University
Page Number 10/87
*From Stanford University
Page Number 11/87
*From Stanford University
Page Number 12/87
Psychology



A scientific approach
to understanding
mind and behaviors
Investigate questions about
why we think and behave
the way we do
Develop a distinctive set
of valuable skills
– Observation,
– Critical analysis,
– Oral and written
communication.
Page Number 13/87
Mental Health and Mental Illness


Mental health is a state
of successful performance of
mental function,
fulfilling relationships
with other people,
and the ability to adapt,
to change,
and to cope with adversity.
Mental illness health
conditions that are
characterized by alterations in
thinking, mood, or behavior
(or some combination thereof)
Page Number 14/87
Measure of Damage
Measure of damage
employees
with psycho
problems
time
stealer
hackers
stupid but
hard working
clueless
newbies
behavior
Page Number 15/87
Clueless Newbies
Possible Interventions:
• user entering the environment
for the first time may be confused
about even the most basic aspects
of the site
• the most common problem is blocking
• the users of Internet speak different
language -Tower of Babylon problem
• clueless newbies usually don’t require
disciplinary action,
but rather a little help
• provide some kind of assistant
or help system
for your e-business
Page Number 16/87
How Should Behave
the Personal Assistant on Your Site?
Personalized
Take
Homes
Free
Association
Humble
Persona
Personal
assistant
Universal
Truisms
U.Positive
Regard
Reflection
Page Number 17/87
Personalized (1)
Make sure the program learns
the client's name and
addresses. A simple little
thing, but very important.
When spoken to by name,
the client will feel more
"known" and personally
connected to the
computerized shrink. In fact,
the more information the
computer recalls about the
person (age, occupation,
marital status, the names of
significant others, presenting
complaints, etc), the better.
Page Number 18/87
Humble Person (2)
The program's persona admits its
mistakes, doesn't take itself too
seriously, is humble, and can even
joke about its shortcomings. The
program freely acknowledges
that it is not human. . Maybe it
even wishes it could be human,
since humans are "wonderful
creations." Everyone loves a
wannabe-human machine like Star
Trek's Data.
Page Number 19/87
Unconditional Positive Regards (3)
The program always values
and respects the basic
human worth of the client, no
matter what the client says or
does. While certain behaviors
or traits of the person may be
unbeneficial, the person as a
whole is always GOOD!
Page Number 20/87
Reflection (4)
It should be able to read
between the lines. For
example, it should be able to
remember everything the
client has said about "my job"
and reflect those statements
back to the client. All the
program has to do is
remember, collate, and reflect
back
Page Number 21/87
Universal Truisms (5)
Having a much better
memory than any human,
the program can have a large
database of universal "truths"
about life - aphorisms,
sayings, stories. The trick is
having the program know
WHEN to intelligently present
a truism to a client.
Specific patterns in what the
client says must trigger the
presentation of the
appropriate truism.
Page Number 22/87
Supporting Technology


Software agents
Client side programming
•
•
•
•

JavaScript
DHTML
CSS
Java Applets
Server side programming
• JSP
• ASP
• PHP
Page Number 23/87
Employees with Psychiatric Problems
• This kind of persons are not easy
to recognize, because they usually
behave normal.
• 15,4% of all ill employees suffer from
some kind of mental illness
• They usually ask hard or unusual
questions
• They can make a huge damage
to the company
• The roots of their behavior stems from
the childhood, and it’s usually some
kind of trauma
Possible Interventions:
•There are two types of solutions:
technical and social.
•Technical issues:
-CCTV
-spy software
-hardware for movement control
•Social issues:
-observation
Page Number 24/87
Destruction of Company for Dummies
yes
Can you steel
your college’s
password ?
Free donuts
in the coffee
room!
no
yes
Can you make your
college go out without
switching off
computer?
no
yes Can you steel your
chief’s laptop?
no
yes
Can you send
a virus to your
company?
no
Get the hammer in your hands
and brake everything
Page Number 25/87
Time Stealer
• Time stealers have more of free time
than they need, and they spend it on
the Internet by asking unnecessary
questions.
• That’s the way they feel wanted and
noticed
• They have an antisocial character
• They ask for attention
Possible Interventions
• Try sending of POLITE e-mail
message
• Try to ignore them
• Mute them using technology
Page Number 26/87
Physical vs. Cyberspace Relationships (1)
text
Physical
Cyber
Relationships Relationships
yes
yes
hearing
yes
yes
seeing
yes
yes
touching
yes
no
smelling
and tasting
yes
no
Page Number 27/87
Physical vs. Cyberspace Relationships (2)



Advantages of Cyber Relationships
• the time-stretching
• distance-shortening
Advantages of Physical Relationships
• touch
• smell
• taste
• the complex integration of all the five senses
The best solution is to develop our relationships in-person
and in cyberspace, taking advantage of each realm
Page Number 28/87
E-mail Communication




E-mail communication creates a psychological space
in which pairs of people interact
It is the most important, most common,
and the most powerful method for communicating
Other ways progress to e-mail
as a way to deepen the communication
Asynchronous interaction and interactive time
can be shortened or stretched, as needed.
Page Number 29/87
The Life Cycle of a Mailing List
Every list seems
to go trough the same cycle:
• Initial enthusiasm
• Evangelism
• Growth
• Community
• Discomfort with
diversity
• Smug complacency
and stagnation
Page Number 30/87
Hacker
Possible Intervention
• Someone who illegitimately brakes into
the system in order to access restricted
privileges or databases
• Antisocial and abusive
• Psychoanalytic theory would predict
an underlying Oedipal striving
to challenge and prove oneself better
than the father
• What motivates the hacker?
•A sense of accomplishment,
mastery, and power
from doing what others can’t
• impressing other users
•The server can be programmed
to disconnect hackers
•You can make database
with IP address and names of hackers
You can share this information
with other site owners
•Pay attention on password defending
•The intervention may need to be done
as quick as possible
Page Number 31/87
The Top 10 Tips For Hackers

BIND weaknesses

Vulnerable CGI

RPC

RDS security hole

Sendmail buffer overflow

Sadmind and mountd

File, information sharing

User IDs

IMAP and POP buffer overflow

Default SNMP community strings
Page Number 32/87
Denial-of-Services Deconstruction
broadcaster
host
broadcaster
Client
host
broadcaster
These
machines
This
is the
machine
The
machines
(3-4)
running
thea hacker
code
from
which
host
are
under
thegenerates
attacker's
that
directly
coordinates
attacks
direct
the denial
of control.
service attack.
target
broadcaster
broadcaster
Page Number 33/87
Card Stealing-Hacker Attack!

In January 2000, CD Universe's server was hacked by an intruder
named Maxus, who tried to extort $100,000 after copying more than
300,000 customer credit card files. The hacker then posted 25,000 of
the files on the Internet (a site that has since been shut down) after the
company refused to pay blackmail. The case is under investigation.

In December 2000, a hacker stole 55,000 credit card numbers from
Creditcards.com, a company that serves small and midsize merchants.
The hacker published the information on the Internet after an
unsuccessful extortion attempt. At press time, the FBI was still
investigating the case.
Page Number 34/87
Credit Card Stealing - How They Do It?

Make Your Own Credit Card Online, anyone can download credit card
account generators.

Skimming Retail and restaurant employees typically use skimmers,
pocket-size battery-operated devices that cost $300 to $500, to steal
customers' credit card information.

Site Cloning (or Spoofing) With this tactic, the fraudsters clone an
entire site or just the pages from which you place your order.

False Merchant Sites These are usually porn sites set up solely for the
purpose of capturing personal data.

Triangulation A fraudulent merchant offers an item like a video camera
at a deeply discounted price.
Page Number 35/87
The 5 Top Ways To Protect Your E-Business

Ask for a card verification value, or CVV—the three-digit number above the
signature panel on the back of a credit card.

Ask customers only for information that is crucial to complete the transaction—
but always verify their billing addresses. And never store payment information in
a readable form on your own servers. Once the purchase is completed, delete
payment information or transfer it to an offline system.

Use transaction-risk scoring software to trace historical shopping patterns and
raise red flags for unusual shopping behavior. Some good bets are systems
from ClearCommerce, CrediView, CyberSource, Digital Courier
Technologies, HNC Software, and Mindwave Software.

Contact organizations like the Better Business Bureau Online, TRUSTe,
and WebTrust to make sure your site meets their security requirements.

Limit employee access to sensitive data and payment systems.
Page Number 36/87
Top 5 Ways To Protect Yourself

Make sure the site's security is bulletproof.

Use a separate credit card with a low limit exclusively for online
shopping.

Clean out your wallet.

Order a copy of your credit report to check for fraudulent activity.

If you fall victim to identity theft—or even if you're just paranoid—slap a
fraud alert on your file.
Page Number 37/87
Our Tribe
Developing of the
on-line community
Page Number 38/87
Online Groups and Communities

Groups ranging in size from a few people
to thousands and millions within a "community"

Issues to think about:
– leadership
– communication patterns
– group boundaries
– cohesion
– alliances
– sub groupings
Page Number 39/87
Making Cyber Community Work


Psychology
• Virtual community can confuse a new user
Technology
• Server administration
• Server side programming
• Web design
Page Number 40/87
Nine Design Principles for Community-Building
Amy Jo Kim









Define the PURPOSE of the community
Create distinct, member-extensible GATHERING PLACES
Create MEMBER PROFILES that evolve over time
Promote effective LEADERSHIP
Define a clear-yet-flexible CODE OF CONDUCT
Organize and promote CYCLIC EVENTS
Provide a RANGE OF ROLES that couple power w responsibility
Facilitate member-created SUB-GROUPS
Integrate the online environment with the REAL WORLD
Page Number 41/87
Purpose (1)

Audience
Who are the potential members?
What are their needs?
Are there sub-groups?

Mission
Is there a mission statement?
Are there "external" and "internal"
versions?

Visual Design
Does the design reinforce
the purpose?
Does it have a "brand personality"?

Back Story
Does the community have a back story?
How does it get communicated
among members?
Page Number 42/87
Gathering place (2)





Places
What are the gathering places?
Map
Is there an index/map that shows
an overview of the different social
spaces?
Building
Can members earn the ability to
customize and create their
environment?
Features
Can members earn access to more
powerful communications
features?
Gallery/Rankings Ladder
Are there places for members to
showcase their relevant talents?
Page Number 43/87
Member profiles (3)



Barriers to Entry
Are the benefits & requirements of
membership communicated up front?
How much info is collected when
becoming a member?
Can non-members get a flavor of the
environment?
Representation
Can members create & edit their own
profiles? Are members encouraged or
reminded to update their profiles?
History
Is there an explicit history of each
member’s participation within the
environment? Does the system update
the profile automatically with info about
the member's participation in the site?
Page Number 44/87
Leadership (4)

Hosting Program
Is there an official hosting/mentoring
program? Does it have levels?
Is it based on recruiting volunteers?
 UberHost
Is there an experienced person to guide
and manage and train new hosts?
Are they empowered to resolve
difficult situations?
 Hosting Manual
Is there a hosting manual?
Is enough flexibility built
into the rules to accommodate
different styles of hosting?
 Tech Support
Is it clear to members how to get
technical support, and what to expect?
Page Number 45/87
Code of conduct (5)


Constitution
Is there an explicit statement of
member rights and
responsibilities?
Amendments
Is there a process for evolving
and mutating this document?
Page Number 46/87
Cyclic Events (6)




Celebrations
Are there any regular
daily/weekly/monthly/seasonal/y
early events to celebrate?
Newsletter
Is there a newsletter to alert
members to upcoming events?
Surveys
Are there surveys (or other
means) that "reflect" the scale
and opinions of the community
back to itself?
Contests
Are there any contests that
reinforce the community's
purpose?
Page Number 47/87
Range of Roles (7)






Visitors
New Member
Regulars
Docents
Leaders
Owners
For each of these roles, answer the
following questions:
•Power
What powers does someone within this
role have within the environment?
•Access
What features and content do they have
access to?
•Actions
What actions can someone take within
this role?
•Representation
Is the person explicitly "tagged" with their
role?
•Status
How can members attain status within
their role?
Page Number 48/87
Sub-groups (8)



Publicity
Are members encouraged to
create subgroups?
Are the groups publicized within
the community?
Infrastructure
Do members have access to
features that can help set up and
run a subgroup?
Events
Can members set up, run, and
promote their own events and
contests?
Page Number 49/87
Integration with Real World (9)



Shared Events
Does the community promote
and celebrate holidays and
events that reinforce community
identity?
Personal Events
Are there ways to acknowledge
and celebrate important personal
events in members lives?
Meeting IRL
Are RL meetings facilitated and
encouraged? (when appropriate)
Page Number 50/87
On-line Education and Therapy
51
Real World Psychotherapy


Psychotherapy helps individuals
explore and resolve more
enduring and deeply felt sources
of conflict and dissatisfaction in
their lives, so that they will gain
confidence and inner wholeness
“Building an alliance of trust with
the therapist leads to a
reshaping of significant
emotional experiences, and
builds confidence and wholeness
in new and enduring
relationships. It provides the
presence of ‘personhood,’ not
just technique.”
Gary Hellman
Page Number 52/87
History
Page Number 53/87
Recipe for Good Therapist
Knowledge
Academic degree
Skill
Ability to listen deeply
Without judging
Training
Supervised Clinical
Residency
Character
Wisdom,empathy
Certification
Professional License
or Registration
Relationship with
you
Page Number 54/87
Communication Canals














real world meetings
video conferencing
phone sessions
one-on-one text chat
multimedia chat
one-on-one e-mail
message board group therapy
e-mail group therapy
chat group therapy
online support groups
online self-help tools
informational web sites
personal web sites, online journals
audio recordings and films
Page Number 55/87
Benefits of Online Therapy


The major benefit of online therapy is the opportunity
to reach people who are unable to visit psychotherapists
due to geographical, physical, or lifestyle limitations
Because of online disinhibition effect, computer-mediated
therapy also may be an important initial step in the
establishment of an in-person treatment.
Page Number 56/87
Problems of Online Therapy



The legal and political dilemmas of online clinical work
• If a therapist in Serbia is working with a client from Chile
in a chat room located on a server in France, where is
the therapy taking place?
Training and credentials
• Online therapist must have good knowledge in
communication and technology
Is it ethical to attempt psychotherapy in cyberspace?
• Valuable information - like physical appearance, body
language, and tone of voice - are missing
• The therapist also may not be able to verify the identity of
the client
Page Number 57/87
Some solutions



For gathering information about client:
• Video conferences
• Multimedia chat
• Sending audio and video recording through the Internet
For checking of therapist’s professional license:
• Distributed database of therapists
• Online validation through that database
For identity checking:
• Secure networks
• Using encryption
• User verification software
Page Number 58/87
How virtual therapy can earn
or save your money?



Why patient should pay for virtual therapy?
• The assistance of a professional can help you identify
your needs, enabling you to deal with them faster and
more reliably through specialized treatment techniques
• Paying systems provide some kind of checking and
security
If you are patient:
• Saving your time
• It’s chipper then real world therapy
If you are therapist:
• Saving in maintains
• Saving in space
• Saving in security costs
Page Number 59/87
Computer as a Therapist


Can computers do
psychotherapy all on their
own, with little or no
assistance from a human?
Will computers take
psychotherapy off
psychotherapist hands
completely?
Page Number 60/87
Advantages





Computers carry out certain tasks efficiently, precisely,
reliably, and fast.
With the necessary peripheral equipment, they are capable
of detecting changes in voice, body language,
heart rate, skin conductance and blood pressure.
Some people may feel MORE comfortable talking with a
computer.
Once developed and installed, a computer program will
probably work for the less than the average
psychotherapist.
Computer is more accessibly. If a computer program is
placed on the internet, anyone anywhere in the world can
set up an appointment at any time.
Page Number 61/87
Barriers




There are some things almost impossible for a machine to
do, like noticing sarcasm in someone's voice.
Computers can be programmed to look like they have
feelings, but how intuition can be simulate?
Computers are very limited in their ability to adapt to
changing or new psychotherapeutic situations.
Cost for developing of a very sophisticated computerized
therapist can be too large.
Page Number 62/87
What a Computer Can Do?




They can do very well at structured intake interviews,
administering and scoring quantitative psychological tests,
memorizing results, and calculating diagnostic protocols
Using multimedia stimuli, Q&A interaction with the client,
and perhaps even a biofeedback interface, the computer
could guide the client, step by step, through almost any
conceivable relaxation program.
Computers can help clients develop new skills for
managing their cognitions, emotions, and interpersonal
behaviors
Using a Q&A format, a fairly simple computer program
could guide a person through a series of writing
experiences adapted specifically for him or her
Page Number 63/87
Study Case
Find-a-Therapist.com
64
Introduction (1)


Find a Therapist, Inc. is Web based provider of services for
mental health professionals and their clients
http://www.find-a-therapist.com/
This is a big international network of Therapists,
Psychologists, Psychiatrists, Social Workers, Marriage and
Family Therapists, Counselors
Page Number 65/87
Introduction (2)

This site have a part for consumers and a part for therapists
Page Number 66/87
For Consumer




Offers therapist profiles to allow you to choose the
therapist you feel is right to address your concerns.
Offers the convenience of consulting a therapist at the time
and place most convenient for you
Private online chat, phone or email sessions are available
At least,traditional "face to face" counseling may be
choice of consumer
Page Number 67/87
For Therapist



Offers opportunity to become part of the team
Offers opportunity to register himself or herself
to the database of therapists
Offer the convenient, cost effective,continuing
education courses for mental health professionals.
Page Number 68/87
Study Case
Eliza
69
Introduction of Eliza (1)



In the 1960s, researchers at MIT pioneered the development
of an interactive psychotherapy program.
Weizenbaum (1976) tried to write a programme to
understand natural language.
This early and unsuccessful attempt to simulate language
and therapy resulted in Eliza
Page Number 70/87
Introduction to Eliza (2)



In response to the user's questions and statements, Eliza
applies basic counseling techniques such as reflection,
focusing, clarification, and open-ended inquiry.
There are various versions of Eliza, some more
sophisticated than others and every year there is a
competition to find the best.
Some of them can be found on web address:
http://www.planetary.net/robots/eliza.html
Page Number 71/87
Eliza in Action
Page Number 72/87
Eliza done wrong again!


Eliza often made mistakes
That’s why the MIT researchers didn't intend it as serious
psychotherapy, but rather as an experiment in artificial
intelligence.
Page Number 73/87
Study Case
Native Mind:
Self-help System
74
Introduction to Native Mind



Native Mind Self-Help Systems began in 1996 as the
Internet's first interactive self-help program
http://selfhelpsystem.com/
This site provides four systems (A, B, C, D) for self-help.
You have opportunity to write what troubles you and to
review the feelings that you've associated with this issue
Or to see what other people write down
Page Number 75/87
Passing Through the System (1)
Page Number 76/87
Passing through System (2)
Page Number 77/87
Passing through System (3)
Page Number 78/87
Passing through System (4)
Page Number 79/87
Study Case
Virtual Realty
And
Psychotherapy
80
Virtual Reality




A Virtual Environment (VE) can be defined as interactive,
virtual image display enhanced by special processing and
by non-visual display modalities, such as auditory , to
convince users that they are immersed in a synthetic
space.
VR is an application that lets users navigate and interact
with a three-dimensional, computer-generated environment
in real time.
According to different authors the essence of VR is the
inclusive relationship between the participant and the
virtual environment
VR provides a new methodology for interacting with
information.
Page Number 81/87
Needed Equipment
Computer
Special
helmet
Special
glove
Page Number 82/87
Exposure Therapy



Exposure therapy involves exposing the subject to anxiety
producing stimuli while allowing the anxiety to attenuate.
These stimuli are generated through a variety of modalities
including imaginal (subject generates stimulus via
imagination) and in vivo (subject is exposed to real
situations).
For example, if the patient is afraid of heights, therapy
sessions might begin by looking through a third floor
window with the therapist present.
Page Number 83/87
Problems with Exposure Therapy
Exposure therapy is:
• expensive
• logistically difficult to arrange
• presents significant problems
of patient confidentiality and
potential embarrassment.
Page Number 84/87
Virtual Reality Exposure



A team of therapists and computer scientists led by
Drs. Hodges and Rothbaum conducted the first controlled
study of virtual reality exposure therapy in the treatment of
a psychological disorder
Virtual Reality Exposure Therapy is be very effective in
reducing acrophobic subjects anxiety and avoidance of
heights, and in improving attitudes toward heights.
Current work by Hodges and Rothbaum includes designing
a virtual reality airplane and conducting preliminary studies
on the use of virtual reality exposure in the treatment of fear
of flying
Page Number 85/87
Example
This is a VR simulation used for the patient afraid of height:
Page Number 86/87
Advantages of VRE
Virtual Reality Exposure is:

Patient acceptance

Effective therapy
• Virtual environments have the added advantage of giving
the therapist greater control over multiple stimulus
parameters as well as the ability to isolate the particular
parameters that are most essential in generating the
phobic response

Cost effective
• Many stimuli for exposure are difficult to arrange or
control. The ability to conduct exposures of virtual
airplanes for flying phobic without leaving the therapists
office would make better treatment available to more
sufferers at a lower cost.
Page Number 87/87
Download