Have you shot anyone? How combat veterans manage privacy with family and friends
This qualitative research project employed semi-structured interviews (analyzed with qualitative coding techniques) to examine how (N = 22) male American combat veterans manage privacy. The two-fold purpose of this study was to determine how combat veterans adhere to or deviate from the principles o...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2018-01-01
|
Series: | Psychology of Language and Communication |
Subjects: | |
Online Access: | https://doi.org/10.2478/plc-2018-0004 |
id |
doaj-548b63d3c0e24f308debae3c62a3bb46 |
---|---|
record_format |
Article |
spelling |
doaj-548b63d3c0e24f308debae3c62a3bb462021-09-05T14:01:04ZengSciendoPsychology of Language and Communication2083-85062018-01-01221718910.2478/plc-2018-0004plc-2018-0004Have you shot anyone? How combat veterans manage privacy with family and friendsWilbur Douglas S.0140 E. Walter Williams Hall, 65211 Columbia, USAThis qualitative research project employed semi-structured interviews (analyzed with qualitative coding techniques) to examine how (N = 22) male American combat veterans manage privacy. The two-fold purpose of this study was to determine how combat veterans adhere to or deviate from the principles of communication privacy management theory (CPM). Secondly, to provide new knowledge that can shape counseling strategies and transition programs to account for how veterans manage their privacy. Some of the significant findings are that veterans believe that merely participating in combat implicitly creates a collective boundary that all veterans must maintain to protect the group. Secondly, the veterans did not use boundary coordination or privacy rule development. Instead, they relied upon internal rules that helped them craft a disclosure that minimized risk. Veterans reported having dense privacy boundaries by default, even towards members of their own family. These dense boundaries present significant obstacles to therapists working with veterans and their families.https://doi.org/10.2478/plc-2018-0004communication privacy management theorycombat veteransrehabilitation and reintegrationmoral injurycombat trauma |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Wilbur Douglas S. |
spellingShingle |
Wilbur Douglas S. Have you shot anyone? How combat veterans manage privacy with family and friends Psychology of Language and Communication communication privacy management theory combat veterans rehabilitation and reintegration moral injury combat trauma |
author_facet |
Wilbur Douglas S. |
author_sort |
Wilbur Douglas S. |
title |
Have you shot anyone? How combat veterans manage privacy with family and friends |
title_short |
Have you shot anyone? How combat veterans manage privacy with family and friends |
title_full |
Have you shot anyone? How combat veterans manage privacy with family and friends |
title_fullStr |
Have you shot anyone? How combat veterans manage privacy with family and friends |
title_full_unstemmed |
Have you shot anyone? How combat veterans manage privacy with family and friends |
title_sort |
have you shot anyone? how combat veterans manage privacy with family and friends |
publisher |
Sciendo |
series |
Psychology of Language and Communication |
issn |
2083-8506 |
publishDate |
2018-01-01 |
description |
This qualitative research project employed semi-structured interviews (analyzed with qualitative coding techniques) to examine how (N = 22) male American combat veterans manage privacy. The two-fold purpose of this study was to determine how combat veterans adhere to or deviate from the principles of communication privacy management theory (CPM). Secondly, to provide new knowledge that can shape counseling strategies and transition programs to account for how veterans manage their privacy. Some of the significant findings are that veterans believe that merely participating in combat implicitly creates a collective boundary that all veterans must maintain to protect the group. Secondly, the veterans did not use boundary coordination or privacy rule development. Instead, they relied upon internal rules that helped them craft a disclosure that minimized risk. Veterans reported having dense privacy boundaries by default, even towards members of their own family. These dense boundaries present significant obstacles to therapists working with veterans and their families. |
topic |
communication privacy management theory combat veterans rehabilitation and reintegration moral injury combat trauma |
url |
https://doi.org/10.2478/plc-2018-0004 |
work_keys_str_mv |
AT wilburdouglass haveyoushotanyonehowcombatveteransmanageprivacywithfamilyandfriends |
_version_ |
1717810883040641024 |