13.07.2015 Views

The Educational Boundary. - The University of Texas at Austin

The Educational Boundary. - The University of Texas at Austin

The Educational Boundary. - The University of Texas at Austin

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

think carefully about wh<strong>at</strong> is appropri<strong>at</strong>e behavior between the educ<strong>at</strong>or within and the educ<strong>at</strong>or on theoutside. Analysts regularly, r<strong>at</strong>her than rarely, lose focus on wh<strong>at</strong> is appropri<strong>at</strong>e behavior for an outsiderwho acts or does not act on the boundaried rel<strong>at</strong>ionship. For example, in well-documented cases <strong>of</strong>analysts impaired by developing dementia, colleagues who are teachers <strong>of</strong> students in analysis with theimpaired analyst far too frequently look away r<strong>at</strong>her than ask the student analysand if they have becomeaware <strong>of</strong> the cognitive problems <strong>of</strong> their analyst. Another c<strong>at</strong>egory <strong>of</strong> example involves situ<strong>at</strong>ions inwhich the insider might, but does not, act in a way which penetr<strong>at</strong>es or protects the boundary from theinside. We realize these are complex situ<strong>at</strong>ions, but they are certainly worthy <strong>of</strong> serious consider<strong>at</strong>ion andstudy.We believe, then, th<strong>at</strong> many <strong>of</strong> the behaviors by teachers which harm students occur because analyticeduc<strong>at</strong>ors are not used to thinking carefully in terms <strong>of</strong> the- 205 -boundaries th<strong>at</strong> circumscribe and define the rel<strong>at</strong>ionships students share with those who educ<strong>at</strong>ethem. Action to cross the boundary or inaction can be educ<strong>at</strong>ionally damaging. We also believe th<strong>at</strong>, whilewe are increasing the regularity with which we discuss case m<strong>at</strong>erial regarding difficult boundary issues,our ability to discuss these same issues as part <strong>of</strong> our training efforts is lagging behind.As analysts and analytic educ<strong>at</strong>ors, if we are to be able to protect and manage the educ<strong>at</strong>ionalboundary, we must be mindful <strong>of</strong> ourselves as individuals with personal strengths and vulnerabilities. Wemust also keep in mind th<strong>at</strong> simultaneously we are members <strong>of</strong> complex analytic communities made up<strong>of</strong> other educ<strong>at</strong>ors who, like us, reside within complex and demanding analytic pairs much <strong>of</strong> the time, andare individuals with a wide variety <strong>of</strong> personal strengths and vulnerabilities. As already noted, we analystshave become accustomed to acknowledging our need for regular self-inquiry and even peer supervision,and outside consult<strong>at</strong>ion with respect to wh<strong>at</strong> is gener<strong>at</strong>ed in us in our consulting rooms (Sonnenberg,1991). This paper recognizes the need to extend the enhanced awareness we have developed about ourvulnerabilities as clinicians to our training activities. Additionally, it is our hope th<strong>at</strong> increased awareness<strong>of</strong> how the clinical situ<strong>at</strong>ion affects our st<strong>at</strong>es <strong>of</strong> mind will allow us to comprehend the complexities <strong>of</strong> oureduc<strong>at</strong>ional activities. We hope th<strong>at</strong> the next step will be for us to increase our awareness <strong>of</strong> our thoughts,feelings, and behaviors in the classrooms and meeting rooms <strong>of</strong> our teaching institutions. <strong>The</strong> ability toengage in this self-reflective activity and to toler<strong>at</strong>e theanxiety rel<strong>at</strong>ed to the ever-present potential toharm those we have agreed to help are two <strong>of</strong> the crucial elements in the maintenance <strong>of</strong> delic<strong>at</strong>eeduc<strong>at</strong>ional boundaries.Some Kinds <strong>of</strong> Behavior Damaging to <strong>The</strong> <strong>Educ<strong>at</strong>ional</strong><strong>Boundary</strong>We will now <strong>of</strong>fer a phenomenological list <strong>of</strong> the kinds <strong>of</strong> behavior th<strong>at</strong> are damaging to theeduc<strong>at</strong>ional boundary which can be demonstr<strong>at</strong>ed by institute faculty members. We do not suggest th<strong>at</strong>this is an exhaustive list. We do suggest these behaviors occur with regularity, and th<strong>at</strong> they can be<strong>at</strong>tenu<strong>at</strong>ed. Our list includes boundary behavior encountered by candid<strong>at</strong>es which are:(1) <strong>at</strong>tacks against the candid<strong>at</strong>e's training analyst;(2) efforts to support the candid<strong>at</strong>e's training analyst;(3) <strong>at</strong>tacks against the administr<strong>at</strong>ion <strong>of</strong> the institute;(4) efforts to support the administr<strong>at</strong>ion <strong>of</strong> the institute;(5) <strong>at</strong>tacks against an opposition faction within the institute;(6) efforts to support an opposition faction within the institute;(7) <strong>at</strong>tacks against a candid<strong>at</strong>e's supervisor;(8) efforts to support a candid<strong>at</strong>e's supervisor;(9) <strong>at</strong>tacks against a present or past analyst <strong>of</strong> the <strong>at</strong>tacker;(10) efforts to support a present or past analyst <strong>of</strong> the <strong>at</strong>tacker;(11) <strong>at</strong>tacks against another candid<strong>at</strong>e;(12) efforts to support another candid<strong>at</strong>e;(13) <strong>at</strong>tacks against the candid<strong>at</strong>e; and(14) efforts to support the candid<strong>at</strong>e.- 206 -<strong>The</strong>se c<strong>at</strong>egories, it will be seen, are not mutually exclusive: sometimes several <strong>of</strong> these mechanismscan be <strong>at</strong> work simultaneously.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!