Joanna - a Survivor’S Story of Deception and Gaslighting

Total Page:16

File Type:pdf, Size:1020Kb

Joanna - a Survivor’S Story of Deception and Gaslighting Joanna - A Survivor’s Story of Deception and Gaslighting Domestic abuse wears many faces: sexual, physical, emotional, verbal, financial. All are deadly. Emotional and verbal abuse leave no visible bruises, but they are nevertheless painful and damaging. This is one woman’s story about escaping such abuse. Names and some details have been changed for privacy and protection. Steven was a former Navy fighter pilot and handsome commercial airline pilot who had stayed in great shape as a marathon runner in Colorado. Joanna was a flight attendant for the same airline. Her stunning beauty, with long legs and brunette hair to her waist, gave her the look of a runway model. The kindness and warmth in her blue eyes matched her smile. Even though Joanna exuded femininity, she admitted to being more masculine than some men. “I’m a runner, go to the gym every day, play a lot of golf, fish, and love watching sports.” Joanna and Steven looked like the perfect couple. When the relationship became serious, Steven kept his home in Colorado and commuted to his base in Houston. Joanna, who was also based in Houston, owned a home in a suburb there. They spent winters in Texas and summers in Colorado. Joanna and Steven were a model of people who succeed with long-distance, commuting relationships. The time apart, however, allowed Steven to live a lifestyle Joanna knew nothing about. “When Steven and I first started dating,” Joanna recalled, “people told me he was a playboy and I shouldn’t get involved with him. One day, I found an anonymous note in my v-file at work. It read, ‘I heard you’re a nice person. He is not. He’s not who you think he is. He is evil.’” Joanna began shaking and went to the bathroom to throw up. She knew someone was trying to warn her but had no idea who it was. “I showed my parents the note, and my dad said, ‘It’s from some jilted former girlfriend.” Joanna went back and forth between the Steven she thought she knew and the note. She chose to ignore the note. In the more than 18 years Joanna and Steven spent together, they traveled, shared a love of golf, and enjoyed her passion for cooking his favorite dishes. “Steven and I could talk for hours about politics, sports, and history,” Joanna remembered. “He was so interesting and stimulating. I admired the fact that he knew so much.” Happy and content in the beginning of the relationship, Joanna recalled one of the couple’s many driving trips. “We barely turned the radio on because we talked to each other so much. Then, he might listen to NPR and I’d work on a crossword puzzle. It was such a peaceful time.” Deception “Steven gave me a beautiful diamond ring for Christmas with promises for a future together. Shortly after that he had retired and was spending more and more time in Colorado without me. When the airline announced our Denver base would be open for transfers, I immediately called Steven to share the good news. I told him I would put my house up for sale and transfer to Denver. He replied with a resounding no. ‘You know how you don’t like the cold and snow,’ he said in response to my initial shock.’” Before long, Steven began gaslighting Joanna, causing her to second-guess herself. “We were talking on the phone one day and he said he was on his way to Honolulu. I was completely startled and said, ‘You’re what?’”. Steven acted like Joanna was crazy for not remembering. “I already told you I’m going there to run a marathon,” he said.” “I second-guessed myself again and again, thinking, ‘I would have remembered that.’ He made me feel like I was going crazy.” Such instances became common. Joanna learned much later that Steven had gone to Honolulu with another woman. When Steven and Joanna were with other people, he was obvious about his pride in her and often presented her with gifts. “He always had to make a show,” Joanna recalled. “We would be with other couples, and I could tell he was proud of me. He bragged about how well I played golf.” Only hours later, however, Joanna would become the target of one of Steven’s screaming rages. “Sometimes his rage was so out of control that I would literally cower on the floor. He would jump into my car and leave. One time, he wrecked it.” Steven’s rages continued. “I asked him to help me hang wind chimes in the backyard. The result was a rage so loud I’m sure the neighbors could hear him screaming. When a police car appeared at the end of the driveway, Steven ran out and chatted with the police officer as though everything was hunky dory.” Joanna stood frozen in fear. Watching a woman across the street throw her boyfriend’s clothes onto the front yard, Joanna remembered, “I felt so bad for her, but I never wanted to be one of those women. I didn’t want the neighbors to know what was really going on behind closed doors with Steven and me, so I kept a low profile. I wasn’t comfortable calling the police because the neighbors would know we were having serious problems.” Wake-up call Between the gaslighting, the shows of affection, the rage and verbal abuse, the future hope, the beautiful gifts of jewelry, the cheating, and multiple apologies accompanied by wonderful behavior, the vicious cycle of abuse went on and on. It finally took a toll on Joanna’s health. In 2012, as Joanna was walking though a Houston airport, she collapsed and was rushed to the hospital. The initial diagnosis was a stroke. “I was on extreme overload from the stress,” Joanna recalled. “I had been in the hospital 24 hours when my doctor said, ‘Joanna, you might want to get rid of him.’” Joanna’s doctor subsequently called her work supervisor. That was the beginning of Joanna’s wake-up call. Steven showed no concern about Joanna’s hospital stay. In fact, he used it against her. “He tried to make me think there was something wrong with me mentally. I had no idea someone could be so psychologically cruel.” Joanna realized she had to begin taking baby steps to get out of the relationship. “I used to wonder why abused women stayed and didn’t leave immediately. I understand now.” It would take a few more years for Joanna to make a final break. Gaslighting One night, Joanna woke from a deep sleep, walked into her office area, and found Steven using her computer. She immediately saw a picture of a woman in the background on a popular dating site. Steven turned and jumped into the air with his arms outstretched in an attempt to hide the screen. He turned off the master power switch and started yelling, accusing Joanna of snooping. He expected her to forget the incident and return to bed. In a furious rage, Steven grabbed Joanna’s arm, told her never to check up on him again, and nearly shoved her off the bed. The next morning, Joanna turned on her computer and it went directly to Steven’s dating profile from the night before. He used his middle name instead of his first name. When Joanna confronted him, he cried, told her how lonely he was living in the mountains, said the other women meant nothing to him, and told her she was the love of his life. She asked him to leave and they packed his things together. He promised to leave the next morning, however, during the night he unpacked his things, put them back in the closet, then drove to Colorado. Joanna was completely unaware. When she woke up she discovered what he had done. She called his cell phone several times and he never answered. When he called later that day, he said he couldn’t understand why she was so upset. “Of course my things are in your house, Joanna, I love you. Something is wrong. You need a glass of ice water. Sit down and drink some water.” Joana stated that this was another one of his typical gaslighting techniques by making her think she’s going crazy. He wouldn’t let her end the relationship and wanted to keep her mentally off balance. Joanna discovered Steven had been on the site a couple of years. She felt devastated. “He had 19 photos of himself on there, and I had taken16 of them at places we visited together. You could tell where I was cut out of the photo. In the section where you describe what you’re looking for in a person, he described me to a T. I showed his profile to a friend who said, ‘He’s looking for you but already has you.’” Joanna felt tormented and blamed herself. “Why wasn’t I enough for him? What did I do wrong? I didn’t know how to recover. Deep down, I questioned what made me wake up out of a sound sleep and walk into the computer room at the exact moment he was on a dating site.” Joanna took her first huge step. She instructed her financial adviser to take Steven’s name off her financial accounts. Her adviser asked if she was okay. Joanna felt a strong inner resolve kick in and replied, “I’m going to be.” “I’m going to be” “I was brought up in a wonderful close-knit family,” Joanna explained.
Recommended publications
  • The Srebrenica Genocide and the Denial Narrative
    DISCUSSION PAPER The Srebrenica Genocide and the Denial Narrative H. N. Keskin DISCUSSION PAPER The Srebrenica Genocide and the Denial Narrative H. N. Keskin The Srebrenica Genocide and the Denial Narrative © TRT WORLD RESEARCH CENTRE ALL RIGHTS RESERVED WRITTEN BY H. N. Keskin PUBLISHER TRT WORLD RESEARCH CENTRE July 2021 TRT WORLD İSTANBUL AHMET ADNAN SAYGUN STREET NO:83 34347 ULUS, BEŞİKTAŞ İSTANBUL / TURKEY TRT WORLD LONDON PORTLAND HOUSE 4 GREAT PORTLAND STREET NO:4 LONDON / UNITED KINGDOM TRT WORLD WASHINGTON D.C. 1819 L STREET NW SUITE 700 20036 WASHINGTON DC www.trtworld.com researchcentre.trtworld.com The opinions expressed in this discussion paper represent the views of the author(s) and do not necessarily reflect the views of the TRT World Research Centre. 4 The Srebrenica Genocide and the Denial Narrative Introduction he Srebrenica Genocide (also attribute genocidal intent to a particular official referred to as the Srebrenica within the Main Staff may have been motivated Massacre), in which Serbian by a desire not to assign individual culpability soldiers massacred more than to persons not on trial here. This, however, does eight thousand Bosniak civilians not undermine the conclusion that Bosnian Serb Tduring the Bosnian war (1992-1995), has been forces carried out genocide against the Bosnian affirmed as the worst incident of mass murder in Muslims. (United Nations, 2004:12) Europe since World War II. Furthermore, despite the UN’s “safe area” declaration prior to the Further prosecutions were pursued against the genocide in the region, the Bosnian Serb Army of Dutch state in the Dutch Supreme Court for not Republika Srpska (VRS) under the command of preventing the deaths of Bosniak men, women and Ratko Mladić executed more than 8,000 Bosniak children that took refuge in their zone located in 2 (Bosnian Muslims) men and boys and deported Potocari.
    [Show full text]
  • Memetics of Deception: Spreading Local Meme Hoaxes During COVID-19 1St Year
    future internet Article Memetics of Deception: Spreading Local Meme Hoaxes during COVID-19 1st Year Raúl Rodríguez-Ferrándiz 1,* , Cande Sánchez-Olmos 1,* , Tatiana Hidalgo-Marí 1 and Estela Saquete-Boro 2 1 Department of Communication and Social Psychology, University of Alicante, 03690 Alicante, Spain; [email protected] 2 Department of Software and Computing Systems, University of Alicante, 03690 Alicante, Spain; [email protected] * Correspondence: [email protected] (R.R.-F.); [email protected] (C.S.-O.) Abstract: The central thesis of this paper is that memetic practices can be crucial to understanding deception at present when hoaxes have increased globally due to COVID-19. Therefore, we employ existing memetic theory to describe the qualities and characteristics of meme hoaxes in terms of the way they are replicated by altering some aspects of the original, and then shared on social media platforms in order to connect global and local issues. Criteria for selecting the sample were hoaxes retrieved from and related to the local territory in the province of Alicante (Spain) during the first year of the pandemic (n = 35). Once typology, hoax topics and their memetic qualities were identified, we analysed their characteristics according to form in terms of Shifman (2014) and, secondly, their content and stance concordances both within and outside our sample (Spain and abroad). The results show, firstly, that hoaxes are mainly disinformation and they are related to the pandemic. Secondly, despite the notion that local hoaxes are linked to local circumstances that are difficult to extrapolate, our conclusions demonstrate their extraordinary memetic and “glocal” capacity: they rapidly adapt Citation: Rodríguez-Ferrándiz, R.; other hoaxes from other places to local areas, very often supplanting reliable sources, and thereby Sánchez-Olmos, C.; Hidalgo-Marí, T.; demonstrating consistency and opportunism.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Researching Soviet/Russian Intelligence in America: Bibliography (Last Updated: October 2018)
    Know Your FSB From Your KGB: Researching Soviet/Russian Intelligence in America: Bibliography (Last updated: October 2018) 1. Federal Government Sources A. The 2016 US Presidential Election Assessing Russian Activities and Intentions in Recent US Elections. Office of the Director of National intelligence, January 6, 2017. Committee Findings on the 2017 Intelligence Community Assessment. Senate Select Committee on Intelligence, July 3, 2018. Disinformation: Panel I, Panel II. A Primer in Russian Active Measures and Influence Campaigns: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Thursday, March 30, 2017. (Y 4.IN 8/19: S.HRG.115-40/) Link: http://purl.fdlp.gov/GPO/gpo86393 FACT SHEET: Actions in Response to Russian Malicious Cyber Activity and Harassment. White House Office of the Press Secretary, December 29, 2016. Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election. Department of Justice Office of Public Affairs, July 13, 2018. Grizzly Steppe: Russian Malicious Cyber Activity. U.S. Department of Homeland Security, and Federal Bureau of Investigation, December 29, 2016. Information Warfare: Issues for Congress. Congressional Research Service, March 5, 2018. Minority Views: The Minority Members of the House Permanent Select Committee on Intelligence on March 26, 2018, Submit the Following Minority Views to the Majority-Produced "Report on Russian active Measures, March 22, 2018." House Permanent Select Committee on Intelligence, March 26, 2018. Open Hearing: Social Media Influence in the 2016 U.S. Election: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Wednesday, November 1, 2017.
    [Show full text]
  • Never Again: International Intervention in Bosnia and Herzegovina1
    Never again: 1 International intervention in Bosnia and Herzegovina July 2017 David Harland2 1 This study is one of a series commissioned as part of an ongoing UK Government Stabilisation Unit project relating to elite bargains and political deals. The project is exploring how national and international interventions have and have not been effective in fostering and sustaining political deals and elite bargains; and whether or not these political deals and elite bargains have helped reduce violence, increased local, regional and national stability and contributed to the strengthening of the relevant political settlement. This is a 'working paper' and the views contained within do not necessarily represent those of HMG. 2 Dr David Harland is Executive Director of the Centre for Humanitarian Dialogue. He served as a witness for the Prosecution at the International Criminal Tribunal for the Former Yugoslavia in the cases of The Prosecutor versus Slobodan Milošević, The Prosecutor versus Radovan Karadžić, The Prosecutor versus Ratko Mladić, and others. Executive summary The war in Bosnia and Herzegovina was the most violent of the conflicts which accompanied the break- up of Yugoslavia, and this paper explores international engagement with that war, including the process that led to the signing of the Dayton Peace Agreement. Sarajevo and Srebrenica remain iconic symbols of international failure to prevent and end violent conflict, even in a small country in Europe. They are seen as monuments to the "humiliation" of Europe and the UN and the
    [Show full text]
  • Handbook of Research on Deception, Fake News, and Misinformation Online
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Strathclyde Institutional Repository Handbook of Research on Deception, Fake News, and Misinformation Online Innocent E. Chiluwa Covenant University, Nigeria Sergei A. Samoilenko George Mason University, USA A volume in the Advances in Media, Entertainment, and the Arts (AMEA) Book Series Published in the United States of America by IGI Global Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA, USA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2019 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Names: Chiluwa, Innocent, editor. | Samoilenko, Sergei A., 1976- editor. Title: Handbook of research on deception, fake news, and misinformation online / Innocent E. Chiluwa and Sergei A. Samoilenko, editors. Description: Hershey, PA : Information Science Reference, 2019. | Includes bibliographical references and index. Identifiers: LCCN 2018055436| ISBN 9781522585350 (hardcover) | ISBN 9781522585374 (ebook) | ISBN 9781522585367 (softcover) Subjects: LCSH: Fake news. | Deception. | Misinformation. | Social media. Classification: LCC PN4784.F27 H365 2019 | DDC 302.23/1--dc23 LC record available at https://lccn.loc.gov/2018055436 This book is published in the IGI Global book series Advances in Media, Entertainment, and the Arts (AMEA) (ISSN: 2475-6814; eISSN: 2475-6830) British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library.
    [Show full text]
  • Threat Report the State of Influence Operations 2017-2020
    May 2021 Threat Report The State of Influence Operations 2017-2020 The State of Influence Operations 2017-2020 2 TABLE OF CONTENTS Executive Summary 3 Introduction 9 Section 1: Defining IO 11 Section 2: The State of IO, 2017- 2020 15 Threat actors 15 Trends in IO 19 Section 3: Targeting the US Ahead of the 2020 Election 28 Section 4: Countering IO 34 Combination of automation and investigations 34 Product innovation and adversarial design 36 Partnerships with industry, government and civil society 38 Building deterrence 39 Section 5: Conclusion 41 Appendix: List of CIB Disruptions, 2017-May 2021 44 Authors 45 The State of Influence Operations 2017-2020 3 Executive Summary Over the past four years, industry, government and civil society have worked to build our collective response to influence operations (“IO”), which we define as “c oordinated efforts to manipulate or corrupt public debate for a strategic goal.” The security teams at Facebook have developed policies, automated detection tools, and enforcement frameworks to tackle deceptive actors — both foreign and domestic. Working with our industry peers, we’ve made progress against IO by making it less effective and by disrupting more campaigns early, before they could build an audience. These efforts have pressed threat actors to shift their tactics. They have — often without success — moved away from the major platforms and increased their operational security to stay under the radar. Historically, influence operations have manifested in different forms: from covert campaigns that rely on fake identities to overt, state-controlled media efforts that use authentic and influential voices to promote messages that may or may not be false.
    [Show full text]
  • The What and Why of Self-Deception
    Available online at www.sciencedirect.com ScienceDirect The what and why of self-deception 1 2 Zoe¨ Chance and Michael I Norton Scholars from many disciplines have investigated self- that these generalizations ignore many nuanced distinc- deception, but defining self-deception and establishing its tions). In the first definition — sometimes called ‘defla- possible benefits have been a matter of heated debate — a tionary’ [2] — self-deception is simply a motivated false debate impoverished by a relative lack of empirical research. belief [e.g. 5,6], and is indistinguishable from positive Drawing on recent research, we first classify three distinct illusions. In this view, self-deception can arise from, for definitions of self-deception, ranging from a view that self- example, selective attention, biased information search, or deception is synonymous with positive illusions to a more forgetting. In the second definition, self-deception is a stringent view that self-deception requires the presence of motivated false belief that persists in spite of disconfirming simultaneous conflicting beliefs. We then review recent evidence [e.g. 7,8]. In this view, not all positive illusions are research on the possible benefits of self-deception, identifying self-deceptive, and biased information search does not three adaptive functions: deceiving others, social status, and qualify as self-deception since disconfirming evidence is psychological benefits. We suggest potential directions for not encountered and ignored; however, self-deception can future research. still arise via selective attention or knowledge avoidance Addresses [9,10], where disconfirming evidence is present — but 1 Yale University, United States ignored or discounted. 2 Harvard University, United States In the final definition [e.g.
    [Show full text]
  • The Emotion Deception Model: a Review of Deception in Negotiation and the Role of Emotion in Deception Joseph P
    Negotiation and Conflict Management Research The Emotion Deception Model: A Review of Deception in Negotiation and the Role of Emotion in Deception Joseph P. Gaspar1 and Maurice E. Schweitzer2 1 Rutgers Business School, Rutgers University, Newark and New Brunswick, NJ, U.S.A. 2 Wharton School, University of Pennsylvania, Philadelphia, PA, U.S.A. Keywords Abstract deception, emotion, ethics, negotiation, trust. Deception is pervasive in negotiations. Negotiations are characterized by information asymmetries, and negotiators often have both opportunities Correspondence and incentives to mislead their counterparts. Effective negotiators need to Joseph P. Gaspar, Department contend with the risk of being deceived, effectively respond when they of Management and Global identify deception, and manage the temptation to use deception them- Business, Rutgers Business selves. In our review of deception research, we integrate emotion School, Rutgers University, 1 Washington Park, Newark, NJ research. Emotions are both an antecedent and a consequence of decep- 07102, U.S.A.; e-mail: tion, and we introduce the emotion deception model (EDM) to represent [email protected]. these relationships. Our model broadens our understanding of deception in negotiations and accounts for the important role of emotions in the deception decision process. On November 16, 1963, Steven Slotkin was born in New York’s Beth-El Hospital. As a result of medical negligence, Steve’s brain was damaged prior to delivery. He was diagnosed with cerebral palsy and was paralyzed, requiring constant care for the duration of his life. The Slotkins filed a malpractice lawsuit (Slotkin v. Beth-El Hospital, 1971) against the hospital and negotiated a settlement.
    [Show full text]
  • January 11, 2021 NCRI Assessment of the Capitol Riots Violent Actors and Ideologies Behind the Events
    NCRI Assessment of the Capitol Riots Violent Actors and Ideologies Behind the Events of January 6, 2021. Former Congressman Denver Riggleman Strategist, The Network Contagion Research Institute Alex Goldenberg Lead Intelligence Analyst, The Network Contagion Research Institute Joel Finkelstein Director, The Network Contagion Research Institute Senior Research Fellow, Miller Center for Community Protection and Resilience, Rutgers University John Farmer Former New Jersey State Attorney General and Senior Counsel, 9/11 Commission Director, Miller Center for Community Protection and Resilience, Rutgers University Brian Harrell Strategic Advisor, The Network Contagion Research Institute Former Assistant Secretary for Infrastructure Protection at DHS Danica Finkelstein Intelligence Analyst, The Network Contagion Research Institute Lea Marchl Intelligence Analyst, The Network Contagion Research Institute The Network Contagion Research Institute (NCRI) is a neutral and independent third party whose mission it is to track, expose, and combat misinformation, deception, manipulation, and hate across social media channels. On January 6th, President Trump’s “Save America” rally was attended by a majority of peaceful protestors. However, a sizable crowd left the speech delivered by the President and overwhelmed law enforcement officials in order to break into the U.S. Capitol building during the certification of the electoral vote. While a majority of attendees remained peaceful, many participated in the violent storming and looting of the U.S. Capitol building. These events saw law enforcement evacuate lawmakers, Capitol offices burglarized and left 5 dead and many wounded. The cause(s) of these events are several-fold according to NCRI’s analytical assessment: Bottom Line Up Front: ​ ● Virtually all violent vanguard elements appeared to come from predominantly far-right, fringe groups.
    [Show full text]
  • Online Deception in Social Media Michail Tsikerdekis University of Kentucky, [email protected]
    University of Kentucky UKnowledge Information Science Faculty Publications Information Science 9-2014 Online Deception in Social Media Michail Tsikerdekis University of Kentucky, [email protected] Sherali Zeadally University of Kentucky, [email protected] Right click to open a feedback form in a new tab to let us know how this document benefits oy u. Follow this and additional works at: https://uknowledge.uky.edu/slis_facpub Part of the Library and Information Science Commons Repository Citation Tsikerdekis, Michail and Zeadally, Sherali, "Online Deception in Social Media" (2014). Information Science Faculty Publications. 12. https://uknowledge.uky.edu/slis_facpub/12 This Article is brought to you for free and open access by the Information Science at UKnowledge. It has been accepted for inclusion in Information Science Faculty Publications by an authorized administrator of UKnowledge. For more information, please contact [email protected]. Online Deception in Social Media Notes/Citation Information Published in Communications of the ACM, v. 57, no. 9, p. 72-80. © ACM, 2014. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Communications of the ACM, Vol. 57, No. 9, (September 2014) http://doi.acm.org/10.1145/2629612 Digital Object Identifier (DOI) http://dx.doi.org/10.1145/2629612 This article is available at UKnowledge: https://uknowledge.uky.edu/slis_facpub/12 Online Deception in Social Media Abstract The explosive growth of social media applications has revolutionized the way we interact with one another. However, the emergence and use of this online environment has also created new opportunities for deception.
    [Show full text]
  • Teacher's Guide
    EXTENSION 4.5 DIAGRAM TEACHER’S GUIDE STATE OF DECEPTION 1. MESSAGE 2. CONTEXT Draw arrows to the visual elements What are the hopes, fears, and that communicate the message. grievances present in society at this Think about how line, color, time? Think about the political, graphics, depictions of people, words, social, and economic climate. and symbols are used. POLITICAL: In 1932, Germany was a Visual cues: fledgling democracy facing a severe economic crisis. Faith in government LINE: The line is sketchy and makes eroded due to dysfunction. The nation the people appear worn and haggard. was demoralized by the loss of World War I. COLOR: The muddy colors evoke a somber mood. The shadows on the ECONOMIC: With the stock market peoples’ faces emphasize their despair. crash of 1929 and the world economic crisis that accompanied it, German PEOPLE: The masses of people banks closed and unemployment include men, women, and children. skyrocketed. Germans were frustrated Broad swaths of society are and afraid for the future. represented. They march toward Hitler and gaze directly at the viewer, Given that context, why might this appealing for their vote. message have had power? WORDS: “Hitler” is the most Public fears over economic woes and prominent word on the poster. It is political uncertainty made the Nazis’ bright white and boldly written solutions to the nation’s problems “Our Last Hope: Hitler.” Artist: Hans appealing. The Nazis downplayed more What is the message? Schweitzer, 1932. USHMM Collection extreme aspects of their agenda. Masses of people are behind Hitler. You can change things by voting for him.
    [Show full text]