ebook img

Thirty-Five Techniques Every Counselor Should Know PDF

241 Pages·2009·1.77 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Thirty-Five Techniques Every Counselor Should Know

35 T ECHNIQUES E C S K VERY OUNSELOR HOULD NOW Bradley T. Erford Susan H. Eaves Emily M. Bryant and Katherine A.Young Merrill Upper Saddle River,New Jersey Columbus,Ohio Library ofCongress Cataloging in Publication Data 35 techniques every counselor should know / Bradley T.Erford ...[et al.]. p. cm. Includes bibliographical references and index. ISBN-13:978-0-13-170282-0 ISBN-10:0-13-170282-3 1. Counseling. 2. Counseling psychology. I. Erford,Bradley T. II. Title:Thirty-five techniques every counselor should know. BF636.6.A18 2010 158’.3—dc22 2008055854 Vice President and Executive Publisher:Jeffery W.Johnston Acquisitions Editor:Meredith D.Fossel Editorial Assistant:Nancy Holstein Cover Design:Candace Rowley Cover Image:© Gabriela Medina/SuperStock Operations Manager:Renata Butera Director ofMarketing:Quinn Perkson Marketing Manager:Amanda L.Stedke Marketing Coordinator:Brian Mounts This book was set in 10/12 Minion by GGS Higher Education Resources,A division ofPreMedia Global,Inc.It was printed and bound by RR Donnelley.The cover was printed by RR Donnelley. Copyright © 2010 by Pearson Education,Inc.,Upper Saddle River,New Jersey 07458. Pearson Prentice Hall.All rights reserved.Printed in the United States ofAmerica.This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction,storage in a retrieval system,or transmission in any form or by any means,electronic,mechanical,photocopying,recording,or likewise.For information regarding permission(s), write to:Rights and Permissions Department. Pearson®is a registered trademark ofPearson plc Merrill®is a registered trademark ofPearson Education,Inc. Pearson Education Ltd.,London Pearson Education North Asia,Ltd.,Hong Kong Pearson Education Singapore Pte.Ltd. Pearson Educación de Mexico,S.A.de C.V. Pearson Education Canada,Ltd. Pearson Education Malaysia Pte.Ltd. Pearson Education—Japan Pearson Education Upper Saddle River,New Jersey Pearson Education Australia,Limited 10 9 8 7 6 5 4 3 2 1 ISBN-13:978-0-13170282-0 ISBN-10: 0-13-170282-3 This effort is dedicated to The One: the Giver of energy, passion, and understanding; Who makes life worth living and endeavors worth pursuing and accomplishing; the Teacher of love and forgiveness. CONTENTS Introduction xi Acknowledgments xv About the Authors xvi Section 1 Techniques Based Upon Brief Counseling Approaches 1 Chapter 1 Scaling 3 Origins of the Scaling Technique 3 How to Implement the Scaling Technique 3 Variations of the Scaling Technique 4 Examples of the Scaling Technique 4 Usefulness and Evaluation of the Scaling Technique 8 Chapter 2 Exceptions 10 Origins of the Exceptions Technique 10 How to Implement the Exceptions Technique 10 Variations of the Exceptions Technique 11 Example of the Exceptions Technique 11 Usefulness and Evaluation of the Exceptions Technique 13 Chapter 3 Problem-Free Talk 14 Origins of the Problem-Free Talk Technique 14 How to Implement the Problem-Free Talk Technique 14 Variations of the Problem-Free Talk Technique 15 Example of the Problem-Free Talk Technique 15 Usefulness and Evaluation of the Problem-Free Talk Technique 16 Chapter 4 Miracle Question 17 Origins of the Miracle Question Technique 17 How to Implement the Miracle Question Technique 17 Variations of the Miracle Question Technique 18 Example of the Miracle Question Technique 18 Usefulness and Evaluation of the Miracle Question Technique 20 Chapter 5 Flagging the Minefield 21 Origins of the Flagging the Minefield Technique 21 How to Implement the Flagging the Minefield Technique 21 Example of the Flagging the Minefield Technique 21 Usefulness and Evaluation of the Flagging the Minefield Technique 24 iv Contents v Section 2 Techniques Based Upon Adlerian or Psychodynamic Approaches 25 Chapter 6 I-Messages 27 Origins of the I-Messages Technique 27 How to Implement the I-Messages Technique 28 Variations of the I-Messages Technique 28 Example of the I-Messages Technique 28 Usefulness and Evaluation of the I-Messages Technique 30 Chapter 7 Acting As If 32 Origins of the Acting As If Technique 32 How to Implement the Acting As If Technique 32 Variations of the Acting As If Technique 33 Example of the Acting As If Technique 33 Usefulness and Evaluation of the Acting As If Technique 35 Chapter 8 Spitting in the Soup 36 Origins of the Spitting in the Soup Technique 36 How to Implement the Spitting in the Soup Technique 36 Variations of the Spitting in the Soup Technique 37 Example of the Spitting in the Soup Technique 37 Usefulness and Evaluation of the Spitting in the Soup Technique 38 Chapter 9 The Mutual Storytelling 40 Origins of the Mutual Storytelling Technique 40 How to Implement the Mutual Storytelling Technique 41 Variations of the Mutual Storytelling Technique 42 Example of the Mutual Storytelling Technique 43 Usefulness and Evaluation of the Mutual Storytelling Technique 47 Chapter 10 Paradoxical Intention 49 Origins of the Paradoxical Intention Technique 49 How to Implement the Paradoxical Intention Technique 50 Variations of the Paradoxical Intention Technique 50 Example of the Paradoxical Intention Technique 51 Usefulness and Evaluation of the Paradoxical Intention Technique 53 Section 3 Techniques Based Upon Gestalt Principles 55 Chapter 11 Empty Chair 57 Origins of the Empty Chair Technique 57 How to Implement the Empty Chair Technique 58 vi Contents Variations of the Empty Chair Technique 58 Example of the Empty Chair Technique 59 Usefulness and Evaluation of the Empty Chair Technique 61 Chapter 12 Body Movement and Exaggeration 63 Origins of the Body Movement and Exaggeration Technique 63 How to Implement the Body Movement and Exaggeration Technique 63 Variations of the Body Movement and Exaggeration Technique 63 Example of the Body Movement and Exaggeration Technique 64 Usefulness and Evaluation of the Body Movement and Exaggeration Technique 65 Chapter 13 Role Reversal 66 Origins of the Role Reversal Technique 66 How to Implement the Role Reversal Technique 66 Variations of the Role Reversal Technique 66 Example of the Role Reversal Technique 66 Usefulness and Evaluation of the Role Reversal Technique 68 Section 4 Techniques Based Upon Social Learning Approaches 69 Chapter 14 Modeling 71 Origins of the Modeling Technique 71 How to Implement the Modeling Technique 72 Variations of the Modeling Technique 72 Example of the Modeling Technique 73 Usefulness and Evaluation of the Modeling Technique 73 Chapter 15 Behavioral Rehearsal 75 Origins of the Behavioral Rehearsal Technique 75 How to Implement the Behavioral Rehearsal Technique 75 Variations of the Behavioral Rehearsal Technique 76 Example of the Behavioral Rehearsal Technique 76 Usefulness and Evaluation of the Behavioral Rehearsal Technique 77 Chapter 16 Role Play 78 Origins of the Role Play Technique 78 How to Implement the Role Play Technique 78 Variations of the Role Play Technique 79 Example of the Role Play Technique 80 Usefulness and Evaluation of the Role Play Technique 83 Contents vii Section 5 Techniques Based Upon Cognitive Approaches 85 Chapter 17 Self-Talk 87 Origins of the Self-Talk Technique 87 How to Implement the Self-Talk Technique 88 Variations of the Self-Talk Technique 89 Example of the Self-Talk Technique 89 Usefulness and Evaluation of the Self-Talk Technique 91 Chapter 18 Visual/Guided Imagery 92 Origins of the Visual Imagery Technique 92 How to Implement the Visual Imagery Technique 92 Variations of the Visual Imagery Technique 93 Examples of the Visual Imagery Technique 93 Usefulness and Evaluation of the Visual Imagery Technique 96 Chapter 19 Reframing 98 Origins of the Reframing Technique 98 How to Implement the Reframing Technique 99 Variations of the Reframing Technique 99 Example of the Reframing Technique 99 Usefulness and Evaluation of the Reframing Technique 103 Chapter 20 Thought Stopping 104 Origins of the Thought Stopping Technique 104 How to Implement the Thought Stopping Technique 104 Variations of the Thought Stopping Technique 105 Example of the Thought Stopping Technique 105 Usefulness and Evaluation of the Thought Stopping Technique 107 Chapter 21 Cognitive Restructuring 109 Origins of the Cognitive Restructuring Technique 109 How to Implement the Cognitive Restructuring Technique 109 Variations of the Cognitive Restructuring Technique 110 Example of the Cognitive Restructuring Technique 111 Usefulness and Evaluation of the Cognitive Restructuring Technique 114 Section 6 Techniques Based Upon Behavioral Approaches Using Positive Reinforcement 115 Chapter 22 Premack Principle 119 Origins of the Premack Principle Technique 119 How to Implement the Premack Principle Technique 120 viii Contents Variations of the Premack Principle Technique 120 Example of the Premack Principle Technique 120 Usefulness and Evaluation of the Premack Principle Technique 122 Chapter 23 Behavior Chart 123 Origins of the Behavior Chart Technique 123 How to Implement the Behavior Chart Technique 123 Examples of the Behavior Chart Technique 123 Usefulness and Evaluation of the Behavior Chart Technique 125 Chapter 24 Token Economy 127 Origins of the Token Economy Technique 127 How to Implement the Token Economy Technique 127 Variations of the Token Economy Technique 128 Example of the Token Economy Technique 129 Usefulness and Evaluation of the Token Economy Technique 130 Chapter 25 Behavioral Contract 132 Origins of the Behavioral Contract Technique 132 How to Implement the Behavioral Contract Technique 132 Variations of the Behavioral Contract Technique 134 Example of the Behavioral Contract Technique 134 Usefulness and Evaluation of the Behavioral Contract Technique 137 Section 7 Techniques Based Upon Behavioral Approaches Using Punishment 139 Chapter 26 Extinction 141 Origins of the Extinction Technique 141 How to Implement the Extinction Technique 141 Variations of the Extinction Technique 142 Example of the Extinction Technique 142 Usefulness and Evaluation of the Extinction Technique 146 Chapter 27 Time Out 147 Origins of the Time Out Technique 147 How to Implement the Time Out Technique 147 Variations of the Time Out Technique 148 Example of the Time Out Technique 148 Usefulness and Evaluation of the Time Out Technique 153 Chapter 28 Response Cost 155 Origins of the Response Cost Technique 155 How to Implement the Response Cost Technique 155 Contents ix Example of the Response Cost Technique 156 Usefulness and Evaluation of the Response Cost Technique 161 Chapter 29 Overcorrection 162 Origins of the Overcorrection Technique 162 How to Implement the Overcorrection Technique 162 Variations of the Overcorrection Technique 163 Example of the Overcorrection Technique 163 Usefulness and Evaluation of the Overcorrection Technique 164 Section 8 Techniques Based Upon Cognitive-Behavioral Approaches 167 Chapter 30 Rational-Emotive Behavior Therapy (REBT) 169 Origins of the REBT Technique 169 How to Implement the REBT Technique 169 Variations of the REBT Technique 172 Example of the REBT Technique 172 Usefulness and Evaluation of the REBT Technique 177 Chapter 31 Bibliotherapy 178 Origins of the Bibliotherapy Technique 178 How to Implement the Bibliotherapy Technique 178 Variations of the Bibliotherapy Technique 179 Example of the Bibliotherapy Technique 179 Usefulness and Evaluation of the Bibliotherapy Technique 180 Chapter 32 Deep Breathing 182 Origins of the Deep Breathing Technique 182 How to Implement the Deep Breathing Technique 182 Variations of the Deep Breathing Technique 183 Example of the Deep Breathing Technique 184 Usefulness and Evaluation of the Deep Breathing Technique 184 Chapter 33 Progressive Muscle Relaxation Training (PMRT) 186 Origins of the PMRT Technique 186 How to Implement the PMRT Technique 186 Variations of the PMRT Technique 188 Example of the PMRT Technique 188 Usefulness and Evaluation of the PMRT Technique 190 Chapter 34 Systematic Desensitization 191 Origins of the Systematic Desensitization Technique 191 How to Implement the Systematic Desensitization Technique 191

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.