MainScienceSocial SciencesCommunication › Conversational Terrorism

Conversational Terrorism

Edit Page
Report
Scan day: 09 February 2014 UTC
-141
Virus safety - good
Description: A list, with examples, of ways that people can commit verbal violence during ordinary conversations.
Conversational Terrorism: How NOT to Talk! All of the techniques listed in this document have actually been witnessed, told to us by someone else, or dreamed up. They are described in first person for clarity of motive.
Size: 219 chars

Contact Information

Email:
Phone&Fax:
Address:
Extended:

WEBSITE Info

Page title:Conversational Terrorism: How NOT to Talk!
Keywords:Debate, Analysis, Conversation, Techniques, Manipulative, Dialog, Manners, Debate, Rules, Logic, Persuasion, Ploys, Charm, School Teaching, Education, Resources, Speech, Tactics, Cheap Shots, Ad Homonym, Fallacies, Distorted, Journalism, Cheating, Politics, Jokes, Mind, Manipulation, Teachers, Resources, Interviewing, Politicians, Political, Techniques, Spin, Control, Humor, Funny, Fun, Jokes, Curmudgeon, Argumentation, Ideas, Verbal, Terror, Etiquette, Manners, Explanation, Answers, Questions, Advice, Tips, Articles, Examples, Mediation, Peace, Negotiate, Negotiation, Marriage, Counseling, Expose, Talk, Talking, Speaking, Communication Breakdown, Human, Communication, Society, Culture, Pointless, Illogical, Polemic, Quarrel, Contention, Acrimony, Discussion, CatalinaDog
Description:An expose of conversational terrorism cheap shot tactics to notice and avoid. HOW NOT TO TALK! Read 'em and laugh - or weep if you must.
IP-address:97.74.215.141

WHOIS Info

NS
Name Server: NS3.SECURESERVER.NET
Name Server: NS4.SECURESERVER.NET
WHOIS
Status: clientTransferProhibited
Date
Creation Date: 04-dec-1997
Expiration Date: 03-dec-2015