Have you shot anyone? How combat veterans manage privacy with family and friends

This qualitative research project employed semi-structured interviews (analyzed with qualitative coding techniques) to examine how (N = 22) male American combat veterans manage privacy. The two-fold purpose of this study was to determine how combat veterans adhere to or deviate from the principles o...

Full description

Bibliographic Details
Main Author: Wilbur Douglas S.
Format: Article
Language:English
Published: Sciendo 2018-01-01
Series:Psychology of Language and Communication
Subjects:
Online Access:https://doi.org/10.2478/plc-2018-0004
id doaj-548b63d3c0e24f308debae3c62a3bb46
record_format Article
spelling doaj-548b63d3c0e24f308debae3c62a3bb462021-09-05T14:01:04ZengSciendoPsychology of Language and Communication2083-85062018-01-01221718910.2478/plc-2018-0004plc-2018-0004Have you shot anyone? How combat veterans manage privacy with family and friendsWilbur Douglas S.0140 E. Walter Williams Hall, 65211 Columbia, USAThis qualitative research project employed semi-structured interviews (analyzed with qualitative coding techniques) to examine how (N = 22) male American combat veterans manage privacy. The two-fold purpose of this study was to determine how combat veterans adhere to or deviate from the principles of communication privacy management theory (CPM). Secondly, to provide new knowledge that can shape counseling strategies and transition programs to account for how veterans manage their privacy. Some of the significant findings are that veterans believe that merely participating in combat implicitly creates a collective boundary that all veterans must maintain to protect the group. Secondly, the veterans did not use boundary coordination or privacy rule development. Instead, they relied upon internal rules that helped them craft a disclosure that minimized risk. Veterans reported having dense privacy boundaries by default, even towards members of their own family. These dense boundaries present significant obstacles to therapists working with veterans and their families.https://doi.org/10.2478/plc-2018-0004communication privacy management theorycombat veteransrehabilitation and reintegrationmoral injurycombat trauma
collection DOAJ
language English
format Article
sources DOAJ
author Wilbur Douglas S.
spellingShingle Wilbur Douglas S.
Have you shot anyone? How combat veterans manage privacy with family and friends
Psychology of Language and Communication
communication privacy management theory
combat veterans
rehabilitation and reintegration
moral injury
combat trauma
author_facet Wilbur Douglas S.
author_sort Wilbur Douglas S.
title Have you shot anyone? How combat veterans manage privacy with family and friends
title_short Have you shot anyone? How combat veterans manage privacy with family and friends
title_full Have you shot anyone? How combat veterans manage privacy with family and friends
title_fullStr Have you shot anyone? How combat veterans manage privacy with family and friends
title_full_unstemmed Have you shot anyone? How combat veterans manage privacy with family and friends
title_sort have you shot anyone? how combat veterans manage privacy with family and friends
publisher Sciendo
series Psychology of Language and Communication
issn 2083-8506
publishDate 2018-01-01
description This qualitative research project employed semi-structured interviews (analyzed with qualitative coding techniques) to examine how (N = 22) male American combat veterans manage privacy. The two-fold purpose of this study was to determine how combat veterans adhere to or deviate from the principles of communication privacy management theory (CPM). Secondly, to provide new knowledge that can shape counseling strategies and transition programs to account for how veterans manage their privacy. Some of the significant findings are that veterans believe that merely participating in combat implicitly creates a collective boundary that all veterans must maintain to protect the group. Secondly, the veterans did not use boundary coordination or privacy rule development. Instead, they relied upon internal rules that helped them craft a disclosure that minimized risk. Veterans reported having dense privacy boundaries by default, even towards members of their own family. These dense boundaries present significant obstacles to therapists working with veterans and their families.
topic communication privacy management theory
combat veterans
rehabilitation and reintegration
moral injury
combat trauma
url https://doi.org/10.2478/plc-2018-0004
work_keys_str_mv AT wilburdouglass haveyoushotanyonehowcombatveteransmanageprivacywithfamilyandfriends
_version_ 1717810883040641024