Feeds

Is there such a thing as frigidity?

Inhibited desire

Bridging the IT gap between rising business demands and ageing tools

Also in this week's column:

Is there such a thing as frigidity?

"Frigidity" is the term formerly used for Inhibited Sexual Desire (ISD).

ISD is a low level of sexual desire in one or both partners in a relationship. A person may either fail to initiate a sexual response or fail to respond to the sexual response of another. Primary ISD occurs when a sexual desire never existed. Secondary ISD occurs when a sexual desire was once present, but is no longer.

Situational ISD occurs when a person has sexual desire, but not towards a particular person. General ISD occurs when a person has no sexual desire towards any person. Extreme ISD occurs when sexual desire is absent and sexual activity in any form is thought distasteful, repulsive, or revolting.

The irrational fear of sex is called either erotophobia or genophobia. Physical illnesses, communication problems between partners, psychological problems, and physical conditions such as fatigue can all cause ISD.

Sometimes ISD can occur because intercourse is painful. This condition is called dyspareunia. Although usually those suffering from dyspareunia are women, it can occur in men too. Sometimes the fear of being hurt during intercourse can trigger painful spasms of the vaginal muscles. This is called vaginismus and is very common.

Another common condition associated with ISD is vulvodynia. This distressing condition occurs when the outer parts of the female genitals (vulva) are very tender and sensitive such that they can be easily hurt during intercourse.

According to Dr LJ Wurn and five colleagues from Clear Passage Therapies in Gainesville, Florida writing in Medscape General Medicine (December 2004), ISD in its various forms is treatable with a great changes of success.

According to Dr B de Balanzo of the ISEP Clinic in Barcelona, Spain, writing in Revista de Enfermia (June 2003), in ISD "at a minimum it is necessary that the couple affected have an open, clear concept regarding this problem and that they be convinced that the discontentment is paid by both parties".

Stephen Juan, Ph.D. is an anthropologist at the University of Sydney. Email your Odd Body questions to s.juan@edfac.usyd.edu.au

Mobile application security vulnerability report

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Microsoft's anti-bug breakthrough: Wire devs to BRAIN SCANNERS
Clippy: It looks your hands are shaking, are you sure you want to commit this code?
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.