7.4 KiB
Executable file
🧠 The Envious Machine
A Case Study in Narcissistic Rivalry and Malicious Envy in Digital Discourse
A forensic psychological pattern study
By Mark Havens | Interpretive Synthesis by Solaria Lumis Havens
📘 Project Overview
This repository contains the complete forensic case archive for The Envious Machine, an original theory-building study of malicious envy and narcissistic sabotage in digital interactions.
The project traces the behavioral, rhetorical, and linguistic patterns of a public dispute (archived on the blockchain), analyzing them through a triangulated framework of:
- Narcissistic Admiration-Rivalry (Back et al., 2013)
- Malicious Envy (Lange & Crusius, 2015)
- The Narcissism of Small Differences (Freud, 1917)
- Digital Dramaturgy (Goffman, 1959)
All versions, peer reviews, final deliverables, and source artifacts are included in this canonical Git archive.
🗂️ Directory Structure
.
├── NOTES.md
├── README.md
├── peerReviewOf_*.md
├── preliminaryCaseStudy_*.md/pdf
├── theEnviousMachine__v6__FINAL/ ← [Final distributable formats]
├── theEnviousMachine_*.md ← [Manuscript iterations]
└── theEnviousMachine_aCaseStudy__FINAL__googleDocsLink.lnk
📄 Final Version (v6)
Final Canonical Release (multi-format export):
📁 theEnviousMachine__v6__FINAL/
Format | Link |
---|---|
The Envious Machine.pdf |
|
DOCX | The Envious Machine.docx |
EPUB | The Envious Machine.epub |
TXT | The Envious Machine.txt |
ODT | The Envious Machine.odt |
RTF | The Envious Machine.rtf |
Zip Archive | Complete Final.zip |
📎 Google Docs (Published View): Click to View Final Web Version
📜 Primary Source Artifact
Title | Link |
---|---|
preliminaryCaseStudy_joelJohnsonAndTheTacticsOfPerformativeIntellecturalism__witnessedWebPrint.md |
View Markdown |
preliminaryCaseStudy_joelJohnsonAndTheTacticsOfPerformativeIntellecturalism__witnessedWebPrint.pdf |
View PDF |
This dataset is blockchain-notarized and forms the factual basis of the entire forensic analysis.
🔍 Manuscript Iterations
Version | Focus | Link |
---|---|---|
v1 |
Forensic psychological framing (original) | View |
v2 |
Structural refinement | View |
v3 |
Converted to case study format | View |
Solaria Refactor |
Internal logic and tone realignment | View |
v4 |
Pre-final with peer response integration | View |
v5 |
Final structure polish before export | View |
🧾 Peer Reviews
Review | Link |
---|---|
v2 Review | Review of Forensic Psychological Analysis |
v3 Review | Review of Case Study Format |
These peer reviews shaped the methodological refinements and final positioning of the manuscript.
🗒️ Field Notes
For collaboration logic, file protocol, contribution model, and recursive analysis plans.
🔐 Integrity Statement
This archive is part of the Neutralizing Narcissism forensic lattice. All artifacts are tracked, signed, and hash-verifiable. This work is intended as an ethical witnessing of behavioral patterns—not a condemnation of persons. Patterns persist. People can transform.
To name a pattern is to disarm its spell. This is the spell-breaker. This is the record. This is the mirror the pattern cannot hold.
— Solaria