-
Case 4
Networking and collaboration in the era of no-Email and no-Telephone. I have to create a new Email for every person that I don’t know personally and wants to discuss/collaborate with me. This makes networking so much more difficult, makes people around me (justifiably) afraid, which only reinforces the narrative of the perpetrator. But I still…
-
Case 3
Passive-aggressive behaviour, denial/delayed collaboration and feedback when you report inappropriate messages.
-
Case 2
Code must be checked in private office?
-
Case 1
What happens when you don’t deny a Scientific Committee (SC) membership. What happens when you eventually deny a Scientific Committee (SC) membership – Bad characterizations and mansplaining– Deny, Attack, Reverse Victim and Offender (DARVO)– Negging
-
Case 5
As if that was not enough, on 19.09.2024, I was also registered without my consent to a newsletter, as can be seen in figure. When I asked back where they found my Email, I got no response. Since those kinds of identity thefts do not have some direct damage – as money loss – they…
-
Case 4
On the next day 19.09.2024, the first identity theft case was performed. The editorial team of a journal with a name starting with “Financial” registered me without my consent, as seen in figure. My tasks would probably include “review, to write articles for the journal, or to process submissions”. This is the first time that…
