Red Flags by Patrick PhD Wendy L

Red Flags by Patrick PhD Wendy L

Author:Patrick PhD, Wendy L. [Inconnu(e)]
Language: eng
Format: epub
Publisher: St. Martin's Publishing Group
Published: 2015-05-05T01:00:00+00:00


Synthetic Similarity as Targeted Appeal

One of the ways in which bad people make themselves look good is through false similarity. This occurs in many different situations.

Sexual predators take extensive steps to make themselves similar to victims they want to attract. They familiarize themselves with the hottest Internet sites, video games, and television programs that appeal to youth, in order to help them identify with victims.30 Using age-appropriate terminology, they often speak a child’s “language” better than the child’s own parents.31 Through establishing similarity, offenders create peer-like relationships with their victims where they are viewed more as a friend than as an adult figure.32

Intelligent, educated offenders often start by seeking out adults with whom they share areas of similarity, and establishing relationships with them first before pursuing sexual activity with their children.33

Psychopaths bond through similarity as well. However, unlike real bonding, which takes time to develop, psychopaths can bond with you within a few hours on an airplane.34 How? Through cultivating a simulated persona—a mask specifically designed to make them appear similar.35

This is effective because in a world of diversity, it is refreshing to meet someone who shares our beliefs, worldviews, and life experiences.36 We feel understood, accepted, and safe.37 This can even lead us to disclose private information, believing the person will keep our secrets.38

Psychopaths also use false similarity in weaving elaborate personal stories to perpetrate “affinity” fraud—inducing people to make false business deals through expressing shared personal values and beliefs.39

The attraction to similar others is even exploited within the prison system, where inmates use similarity to manipulate correctional staff in order to seek privileges and favors.40 Their techniques include identifying with staff through ethnic, demographic, or other circumstances.41



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.