SlideShare a Scribd company logo
Understanding Three Scripts of Personality
           Billy Barnett M.S. LMHC
 The drama triangle was conceptualized in the 1960’s by
  Dr. Steven Carpman.
 It is also called the Victim Triangle.
 It is a communication pattern that people use to try to
  avoid responsibility for internalizing (learning)
  responsibility for their behaviors.
 Let’s imagine our friend for a moment. Our friend is
  constantly struggling with learning lessons and
  accepting responsibility for his…or her actions.
 He seems to think that other people are the reason
  why he has problems. They are always “bailing out” on
  him.
 He tends to project “a bad feeling” that others just
  can’t quite figure out, and we usually feel like he is
  manipulating us. Many people say it’s like walking on
  eggshells around him.
Bully




Victim           Savior
 Our friend is most famous for his tendency to threaten
  others. He may curse out his friends and especially his
  family.
 He was seen recently threatening a classmate who had
  accidentally parked in “his” spot.
 He was also seen at “Burger World” exploding in anger
  at the worker who gave him pickles on his deluxe
  double cheese burger.
 In class our friend failed to turn in his midterm project
  because he was “out” for a week. He cursed at the
  instructor for being a racist, and a few other choice
  words…
 Our friend went back to “Burger World” the next week
  with a classmate. He waited for the manager to walk
  by and called out in a loud voice “they never listen to
  me when I come here.” The manager gave him a
  surprised look but didn’t confront him.
 Our friend approached his instructor after class and
  “helped him” by informing him that two of his friends
  cheated on their assignment. He said that he should
  give them failing grades to show them who’s boss.

 After yelling at the classmate for parking in his spot he
  said that he would help him out by being his partner
  in the next class project.
 The ability to accept responsibility for negative
  behavior without blaming the outside world (such as
  other people).

 The inside of the triangle.
 An attempt to transfer responsibility for behavior onto
  the outside environment (Such as other people, places
  or events).
 For the triangle our friend is experiencing frantic
  efforts to avoid real or imagined abandonment.
 It’s a self fulfilling prophecy where he tries to make
  everyone else the problem by changing his script to
  match up with his method of avoiding responsibility
  for his behavior.
 He must avoid learning a lesson because he believes
 the world will not accept him in his current condition

 He believes his ego will be diminished if he learns
 something. Maybe everyone else will expect him to
 change his behavior in the future if he learns the
 lesson this time…so he will sabotage the outside world
 and the people in it to avoid learning the lesson
 (internalizing) and as a result growing through the
 experience.

More Related Content

What's hot

How my opening sequence represents particular social groups
How my opening sequence represents particular social groupsHow my opening sequence represents particular social groups
How my opening sequence represents particular social groups
slideshowjosh1
 
Actors
Actors Actors
Lesson 2 Notes
Lesson 2 NotesLesson 2 Notes
Lesson 2 Notes
Ben Land
 
Question 2 for slideshare
Question 2 for slideshareQuestion 2 for slideshare
Question 2 for slideshare
gteasdale1985
 
Media
MediaMedia
Media
mediablogs
 
Pay it forward movie analysis
Pay it forward  movie analysisPay it forward  movie analysis
Pay it forward movie analysis
rico82
 
Types of Literary Conflict
Types of Literary ConflictTypes of Literary Conflict
Types of Literary Conflict
JerilynSaet
 

What's hot (7)

How my opening sequence represents particular social groups
How my opening sequence represents particular social groupsHow my opening sequence represents particular social groups
How my opening sequence represents particular social groups
 
Actors
Actors Actors
Actors
 
Lesson 2 Notes
Lesson 2 NotesLesson 2 Notes
Lesson 2 Notes
 
Question 2 for slideshare
Question 2 for slideshareQuestion 2 for slideshare
Question 2 for slideshare
 
Media
MediaMedia
Media
 
Pay it forward movie analysis
Pay it forward  movie analysisPay it forward  movie analysis
Pay it forward movie analysis
 
Types of Literary Conflict
Types of Literary ConflictTypes of Literary Conflict
Types of Literary Conflict
 

Similar to The triangle

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
jeseniad
 
Job
JobJob
The Roles We Play In Bullying
The Roles We Play In BullyingThe Roles We Play In Bullying
The Roles We Play In Bullying
Jennifer Astle
 
The Roles We Play In Bullying
The Roles We Play In BullyingThe Roles We Play In Bullying
The Roles We Play In Bullying
Jennifer Astle
 
EMR302 Assessment 1- Senstive Issues
EMR302 Assessment 1- Senstive Issues EMR302 Assessment 1- Senstive Issues
EMR302 Assessment 1- Senstive Issues
christinewillard1987
 
E10 march16 2011
E10 march16 2011E10 march16 2011
E10 march16 2011
mlsteacher
 
Essay Writing Hypothesis
Essay Writing HypothesisEssay Writing Hypothesis
Essay Writing Hypothesis
Laura Jones
 
PSY - 1ST
PSY - 1STPSY - 1ST
PSY - 1ST
masonsth
 
Presentationgoffman 141223055728-conversion-gate02
Presentationgoffman 141223055728-conversion-gate02Presentationgoffman 141223055728-conversion-gate02
Presentationgoffman 141223055728-conversion-gate02
FUNDACIÓN NIÑOS Y JÓVENES EMPRENDEDORES POR COLOMBIA
 
Presentation goffman
Presentation goffmanPresentation goffman
Presentation goffman
Melikarj
 
Bullying
BullyingBullying
Bullying
khadi3
 
Interpersonal FINAL
Interpersonal FINALInterpersonal FINAL
Interpersonal FINAL
SamanthaKYork
 
Psycho journal
Psycho journalPsycho journal
Psycho journal
Patricia Kong
 
Journal 01
Journal 01Journal 01
Journal 01
JoyeeLee0131
 
Mean Girls, CMS 330
Mean Girls, CMS 330Mean Girls, CMS 330
Mean Girls, CMS 330
SamanthaKYork
 

Similar to The triangle (15)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Job
JobJob
Job
 
The Roles We Play In Bullying
The Roles We Play In BullyingThe Roles We Play In Bullying
The Roles We Play In Bullying
 
The Roles We Play In Bullying
The Roles We Play In BullyingThe Roles We Play In Bullying
The Roles We Play In Bullying
 
EMR302 Assessment 1- Senstive Issues
EMR302 Assessment 1- Senstive Issues EMR302 Assessment 1- Senstive Issues
EMR302 Assessment 1- Senstive Issues
 
E10 march16 2011
E10 march16 2011E10 march16 2011
E10 march16 2011
 
Essay Writing Hypothesis
Essay Writing HypothesisEssay Writing Hypothesis
Essay Writing Hypothesis
 
PSY - 1ST
PSY - 1STPSY - 1ST
PSY - 1ST
 
Presentationgoffman 141223055728-conversion-gate02
Presentationgoffman 141223055728-conversion-gate02Presentationgoffman 141223055728-conversion-gate02
Presentationgoffman 141223055728-conversion-gate02
 
Presentation goffman
Presentation goffmanPresentation goffman
Presentation goffman
 
Bullying
BullyingBullying
Bullying
 
Interpersonal FINAL
Interpersonal FINALInterpersonal FINAL
Interpersonal FINAL
 
Psycho journal
Psycho journalPsycho journal
Psycho journal
 
Journal 01
Journal 01Journal 01
Journal 01
 
Mean Girls, CMS 330
Mean Girls, CMS 330Mean Girls, CMS 330
Mean Girls, CMS 330
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

The triangle

  • 1. Understanding Three Scripts of Personality Billy Barnett M.S. LMHC
  • 2.  The drama triangle was conceptualized in the 1960’s by Dr. Steven Carpman.  It is also called the Victim Triangle.  It is a communication pattern that people use to try to avoid responsibility for internalizing (learning) responsibility for their behaviors.
  • 3.  Let’s imagine our friend for a moment. Our friend is constantly struggling with learning lessons and accepting responsibility for his…or her actions.  He seems to think that other people are the reason why he has problems. They are always “bailing out” on him.  He tends to project “a bad feeling” that others just can’t quite figure out, and we usually feel like he is manipulating us. Many people say it’s like walking on eggshells around him.
  • 4. Bully Victim Savior
  • 5.  Our friend is most famous for his tendency to threaten others. He may curse out his friends and especially his family.  He was seen recently threatening a classmate who had accidentally parked in “his” spot.  He was also seen at “Burger World” exploding in anger at the worker who gave him pickles on his deluxe double cheese burger.
  • 6.  In class our friend failed to turn in his midterm project because he was “out” for a week. He cursed at the instructor for being a racist, and a few other choice words…  Our friend went back to “Burger World” the next week with a classmate. He waited for the manager to walk by and called out in a loud voice “they never listen to me when I come here.” The manager gave him a surprised look but didn’t confront him.
  • 7.  Our friend approached his instructor after class and “helped him” by informing him that two of his friends cheated on their assignment. He said that he should give them failing grades to show them who’s boss.  After yelling at the classmate for parking in his spot he said that he would help him out by being his partner in the next class project.
  • 8.  The ability to accept responsibility for negative behavior without blaming the outside world (such as other people).  The inside of the triangle.
  • 9.  An attempt to transfer responsibility for behavior onto the outside environment (Such as other people, places or events).  For the triangle our friend is experiencing frantic efforts to avoid real or imagined abandonment.  It’s a self fulfilling prophecy where he tries to make everyone else the problem by changing his script to match up with his method of avoiding responsibility for his behavior.
  • 10.  He must avoid learning a lesson because he believes the world will not accept him in his current condition  He believes his ego will be diminished if he learns something. Maybe everyone else will expect him to change his behavior in the future if he learns the lesson this time…so he will sabotage the outside world and the people in it to avoid learning the lesson (internalizing) and as a result growing through the experience.