Addiction is socially engineered exploitation of natural biological vulnerability
نویسندگان
چکیده
منابع مشابه
Is exercise addiction in fitness centers a socially accepted behavior?
Background Fitness exercise is popular and associated with improved health and social status. Taken to extremes, however, exercise can become an addiction. One suggested symptom of exercise addiction is "conflicts" with family and friends. However, it may be difficult to recognize excessive exercise patterns if they are accepted and encouraged by relatives. The aim of this study was to explore ...
متن کاملEngineered exploitation of microbial potential
Amir Aharoni, Department of Life Sciences and the National Institute for Biotechnology in the Negev (NIBN), Ben-Gurion University, Beer-Sheva, Israel. The size of the microbial world is beyond our imagination. In last year’s crystal ball article, Tom Curtis compared the size of the microbial world to the size of the universe pointing out that the number of microorganisms in the world is billion...
متن کاملIs biological aging accelerated in drug addiction?
Drug-addiction may trigger early onset of age-related disease, due to drug-induced multi-system toxicity and perilous lifestyle, which remains mostly undetected and untreated. We present the literature on pathophysiological processes that may hasten aging and its relevance to addiction, including: oxidative stress and cellular aging, inflammation in periphery and brain, decline in brain volume ...
متن کاملAddiction is Not a Natural Kind
I argue that addiction is not an appropriate category to support generalizations for the purposes of scientific prediction. That is, addiction is not a natural kind. I discuss the Homeostatic Property Cluster (HPC) theory of kinds, according to which members of a kind share a cluster of properties generated by a common mechanism or set of mechanisms. Leading accounts of addiction in literature ...
متن کاملThe Heavy Tails of Vulnerability Exploitation
In this paper we analyse the frequency at which vulnerabilities are exploited in the wild by relying on data collected worldwide by Symantec’s sensors. Our analysis comprises 374 exploited vulnerabilities for a total of 75.7 Million recorded attacks spanning three years (2009-2012). We find that for some software as little as 5% of exploited vulnerabilities is responsible for about 95% of the a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Behavioural Brain Research
سال: 2020
ISSN: 0166-4328
DOI: 10.1016/j.bbr.2020.112598