Click Here For Conversational Terrorism: How NOT to Talk!
Conversational Terrorism: How NOT to Talk!: "All of the techniques listed in this document have actually been witnessed, told to us by someone else, or dreamed up. They are described in first person for clarity of motive.
The intent of detailing and naming these insidious tactics is so that the reader may AVOID USING THEM, to quickly recognize if someone else is using them, and for fun. There is much humor in the way people (consciously or unconsciously) conversationally cheat.
It is hoped that exposing these tactics will help muzzle the growing abuse in our conversational landscape. Give copies to both perpetrators and victims (only NOT for profit use)."
The intent of detailing and naming these insidious tactics is so that the reader may AVOID USING THEM, to quickly recognize if someone else is using them, and for fun. There is much humor in the way people (consciously or unconsciously) conversationally cheat.
It is hoped that exposing these tactics will help muzzle the growing abuse in our conversational landscape. Give copies to both perpetrators and victims (only NOT for profit use)."
0 Comments:
Post a Comment
<< Home