Defensive Communication
According to Zastrow and Hessenauer (2019), our perceptions determine how we interpret the messages we receive during communication. There are
several factors that can affect our perception, including defense mechanisms, which are socio-psychological factors that can influence what we perceive
and, in many cases, derail effective communication.
Before you write your initial discussion post, you should first review Chapter 5, Sections 2 and 3 in the textbook and review the defense mechanisms video.
For this forum, consider the following examples of defensiveness. Pick two of these examples and identify the defense mechanism at work, explain your
reasoning, then use Gibb's analysis of defensive communication to explain how the defensiveness might be overcome.
A spouse refuses to speak to their partner because the partner was late for dinner and did not call.
A student tells their professor that it is the professor's "fault" that they are on academic probation, which will "ruin their life."
A parent tells her teen not to binge drink and the teen yells, "Who are you to judge me? You did the same thing when you were my age!"
An employer tells a recent college graduate that they know more because they went to the "school of hard knocks," and "you think you're better than the rest
of us—well, I've got news for you—you're not! I've forgotten more than you will ever know about this business!"…
Show more
pace Transition Theory concludes seven key postulates, (1) person, with repressed criminal behaviour (in the physical space) have a propensity to commit a crime in cyberspace which they would not commit in physical space, due to their status and position. Due to Rosica being an ex-cop restricted him committing a behaviour in physical space, as he had to maintain his status and position of being an ex-cop. (2) Identity flexibility, dissociative anonymity and the lack of deterrence factor in the cyberspace provides offenders with the choice to commit cybercrime. Rosica had the accessibility to create a fake online identity in which he did (Katy Jones), this was the identity flexibility factor. This meant that his real identity was hidden/anonymous (dissociative anonymity). And he also knew there is no certainty of punishment, especially with an unknown identity (lack of deterrence). (3) Criminal behaviour of offenders in cyberspace is likely to be imported into physical space, vice versa. Information was not given about Roscia’s physical stalking but he was charged five years for this being one of the reasons. (4) Intermittent ventures of offenders into the cyberspace and the dynamic spatiotemporal nature of cyberspace provide the chance to escape. Roscia knows that in cyberspace there is no continuous risk in getting caught, as the changing of space and time can contribute to the offenders’ escape. (5) (a) strangers are likely to unite together in cyberspace to commit a crime in the physical space and (b) associates of physical space are likely to unite to commit a crime in cyberspace. This claim does not apply to this case study, as Roscia was the only offender involved. (6) Persons from closed society are more likely to commit crimes in cyberspace than persons from open society. The fact that Roscia was an ex-cop meaning that he could have continued living in a closed society as being so used to it from his job; this theory can relate to the reasoning behind his offence. (7) The conflict of Norms and Values of Physical Space with the Norms and Values of cyberspace may lead to cybercrimes. The last key point is an overall statement of most online crimes.
There are five key postulates in ‘liquid modernity’ which are based on interactions online, four of which relate to this current study.
(1) A lack of morality, in this case, Rosica’s stalking behaviour is morally wrong.
(2) To promote instantaneous gratification, in order for Rosica to continue the harassment of his ex-girlfriend and several others suggest that he was receiving some pleasure from it, hence why his repetitive behaviour continued.