Chapter 23 Further Reading: Handling Attacks, Deflections, and Diversions
1. Freyd, J. J. (1997). "Violations of Power, Adaptive Blindness, and Betrayal Trauma Theory." Feminism and Psychology, 7(1), 22–32.
The original publication in which Jennifer Freyd's observations about DARVO began to take formal shape. While the paper's primary focus is betrayal trauma theory — the psychological effects of abuse by trusted parties — the DARVO pattern is described and named here for the first time. Essential primary source reading for anyone who wants to understand DARVO as a clinical rather than pop-psychological concept. The paper is short, rigorous, and directly applicable to the material in section 23.5.
2. Freyd, J. J., & Birrell, P. J. (2013). Blind to Betrayal: Why We Fool Ourselves We Aren't Being Fooled. Wiley.
An accessible book-length treatment of betrayal blindness and its relationship to DARVO, institutional complicity, and the psychological mechanisms that allow people to remain unaware of manipulative dynamics. The authors write for a general audience without sacrificing rigor. Particularly useful for understanding why people who experience DARVO often cannot identify it in the moment — a phenomenon directly relevant to the "real-time recognition" material in this chapter.
3. Smith, C. P., & Freyd, J. J. (2014). "Institutional Betrayal." American Psychologist, 69(6), 575–587.
The foundational paper on how institutions — not just individuals — deploy DARVO in response to internal disclosures of wrongdoing. The paper documents DARVO operating at the organizational level through official communications, HR processes, and legal strategies. For students interested in how the pattern functions in workplace confrontations (see Case Study 23-01), this paper provides the research framework. The analysis of how institutional weight amplifies the attack step is particularly striking.
4. Harsey, S. J., & Freyd, J. J. (2020). "Deny, Attack, and Reverse Victim and Offender (DARVO): What Is the Influence on Perceived Perpetrator and Victim Credibility?" Journal of Aggression, Maltreatment & Trauma, 29(8), 897–916.
An empirical study specifically examining how DARVO affects the credibility attributed to both the accused and the accuser by outside observers. The finding that bystanders — even those who witnessed the full exchange — tend to side with the accused after the reversal step is documented here with experimental data. This is the key research behind the "bystander finding" described in Case Study 23-02, and it substantially complicates assumptions about the protective value of witnesses.
5. Gottman, J. M., & Silver, N. (1999). The Seven Principles for Making Marriage Work. Crown.
While primarily a relationship science book, the chapters on contempt, defensiveness, and stonewalling are directly relevant to Chapter 23's treatment of personal attacks and stonewalling. Gottman's empirical identification of the "Four Horsemen of the Apocalypse" (criticism, contempt, defensiveness, stonewalling) as predictors of relationship failure provides the research foundation for understanding why stonewalling is not merely unpleasant but categorically destructive. The communication strategies he recommends for repair have been adapted in this chapter's sections on attack response.
6. Stone, D., Patton, B., & Heen, S. (1999). Difficult Conversations: How to Discuss What Matters Most. Viking.
The Harvard Negotiation Project's practitioner handbook for difficult conversations remains among the most practically useful books in the field. Chapters on identity conversations and the "learning stance" are directly relevant to handling personal attacks — the authors show how personal attacks work by threatening our sense of identity, and how shifting to curiosity rather than defense changes what is possible. The book's framework of three simultaneous conversations (what happened, feelings, identity) is particularly useful for understanding why personal attacks are so effective: they target the identity layer directly.
7. Patterson, K., Grenny, J., McMillan, R., & Switzler, A. (2012). Crucial Conversations: Tools for Talking When Stakes Are High (2nd ed.). McGraw-Hill.
A widely-used training text that includes substantial material on what the authors call "silence and violence" — the two poles of ineffective response to conversational threat. Their analysis of masking (covering feelings with sarcasm or vague comments), avoiding (steering around the topic), and withdrawing (stonewalling) is complementary to this chapter's taxonomy. The authors' CRIB tool (Commit, Recognize, Invent, Brainstorm) for when conversations have become mutual attacks offers a practical de-escalation protocol.
8. Baumeister, R. F., Smart, L., & Boden, J. M. (1996). "Relation of Threatened Egotism to Violence and Aggression: The Dark Side of High Self-Esteem." Psychological Review, 103(1), 5–33.
A landmark paper examining what happens when people with high self-regard feel that regard is threatened. The authors find that the greatest risk of aggression comes not from low self-esteem but from "threatened egotism" — the experience of a favorable self-image being challenged by external feedback. This research provides a psychological foundation for understanding why personal attacks are particularly likely to produce retaliatory responses, and why the non-defensive response described in section 23.2 is so genuinely difficult to execute under pressure.
9. Tavris, C., & Aronson, E. (2007). Mistakes Were Made (But Not by Me): Why We Justify Foolish Beliefs, Bad Decisions, and Hurtful Acts. Harcourt.
An accessible examination of cognitive dissonance and self-justification, with particular relevance to understanding why people deny wrongdoing so confidently and sincerely. The authors show that most people who deny an accusation are not lying in the ordinary sense — they have rewritten their own memory to align with their self-image. This is the cognitive mechanism behind the "sincere liar" in DARVO: the person saying "that never happened" often genuinely believes it. Understanding this makes the response strategy clearer: you are not fighting a liar; you are holding your own record against a self-revised one.
10. Loftus, E. F. (1979). "The Malleability of Human Memory." American Scientist, 67(3), 312–320.
Elizabeth Loftus's foundational work on the reconstructive nature of human memory is essential context for any conversation involving disputed facts. Her experiments showed that memories are not recordings but reconstructions that can be altered by post-event information, framing, and suggestion. This research underlies both the DARVO denial mechanism and the gaslighting pattern described in section 23.5: understanding that memory is genuinely malleable in everyone — including yourself — supports the "I remember it differently" framing rather than the "you are lying" framing.
11. Ennis, E., Vrij, A., & Chance, C. (2008). "Individual Differences and Lying in Everyday Life." Journal of Social and Personal Relationships, 25(1), 105–118.
Research on deception in everyday social interactions, which provides useful context for understanding the range of intentionality behind manipulation tactics. The study found that most everyday deception is motivated by social goals (avoiding conflict, protecting feelings) rather than personal gain, and that deliberate strategic deception is less common than intuitive defensive reaction. This is directly relevant to the chapter's guidance on naming vs. not naming manipulation tactics: most attacks are defensive reactions, not strategic deployments.
12. Folger, R., & Skarlicki, D. P. (1998). "A Popcorn Metaphor for Employee Aggression." In R. W. Griffin, A. O'Leary-Kelly, & J. M. Collins (Eds.), Dysfunctional Behavior in Organizations: Violent and Deviant Behavior (Vol. 1, pp. 43–81). JAI Press.
An organizational psychology analysis of workplace aggression — verbal, social, and behavioral — that is relevant to the power-imbalanced attacks described in the Priya case study. The authors examine how frustration, perceived injustice, and power differentials combine to produce defensive-aggressive responses in organizational settings. Their "popcorn" metaphor (aggression pops under sustained heat) is useful for understanding why a supervisor like Harmon escalates through multiple attack types when his initial deflections don't end the conversation. Relevant background for Chapter 33 (Power Imbalances) as well.