2022
DOI: 10.1111/pere.12442
|View full text |Cite
|
Sign up to set email alerts
|

The polite abuser: Using politeness theory to examine emotional abuse

Abstract: This study examined how instigators of abuse used emotionally abusive messages to manipulate politeness to attack their partners' face. Additionally, we studied how the people experiencing abuse responded to such messages. Using thematic co‐occurrence analysis (TCA), we analyzed 20 semi‐structured interviews with those who have experienced abuse. Participants reported that instigators of abuse used all three of Austin's (1990) face attack act strategies of (a) bald‐on‐record, (b) on record with inappropriate r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 40 publications
0
5
0
Order By: Relevance
“…Additionally, individuals use off-record strategies when they communicate indirectly or hint (“If only I had a ride to the store, I could get groceries.”). Last, people most concerned about face threats opt to not engage in the FTA, saying nothing as they deem the face threat risks too high (Alvarez & Miller-Ott, 2021) choosing, for example, to pass as a drinker versus reveal their non-drinking status (Romo et al, 2015). Individuals can also use humor to prevent face threats (e.g., Miller-Ott & Linder, 2013).…”
Section: Faceworkmentioning
confidence: 99%
“…Additionally, individuals use off-record strategies when they communicate indirectly or hint (“If only I had a ride to the store, I could get groceries.”). Last, people most concerned about face threats opt to not engage in the FTA, saying nothing as they deem the face threat risks too high (Alvarez & Miller-Ott, 2021) choosing, for example, to pass as a drinker versus reveal their non-drinking status (Romo et al, 2015). Individuals can also use humor to prevent face threats (e.g., Miller-Ott & Linder, 2013).…”
Section: Faceworkmentioning
confidence: 99%
“…", (c) developing initial themes, (d) reviewing themes, and (e) refining, defining, and naming themes. For RQ 2 and RQ 3 , we conducted an additional layer of analysis where we compared the developed themes to facework (Cupach & Metts, 1994), and politeness strategies (Alvarez & Miller-Ott, 2022;Brown & Levinson, 1987). For example, during the first level of analysis we developed a theme called preemptive explanation.…”
Section: Discussionmentioning
confidence: 99%
“…First, we conducted a thematic analysis using Braun and Clarke’s (2021) reflexive thematic analysis by (a) familiarizing ourselves with the data, (b) systematically coding the data in response to our analytical questions, “what FTAs are individuals with ASD describing?” “how, if at all, are people with ASD responding to the FTAs?” and “how, if at all, are commenters responding to the FTAs?”, (c) developing initial themes, (d) reviewing themes, and (e) refining, defining, and naming themes. For RQ 2 and RQ 3 , we conducted an additional layer of analysis where we compared the developed themes to facework (Cupach & Metts, 1994), and politeness strategies (Alvarez & Miller-Ott, 2022; Brown & Levinson, 1987). For example, during the first level of analysis we developed a theme called preemptive explanation .…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations