http://michelle1963.livejournal.com/ ([identity profile] michelle1963.livejournal.com) wrote in [personal profile] ehowton 2012-05-31 07:21 pm (UTC)

You've explained this phenomenon to me before, but from what I've recently learned both parties are responsible for adhering to the cycle.

Agreed. The problem is that at the outset often the security source is not completely aware of the dependency. In fact, the security source may initially feel a bit like a hero for being able to soothe his or her companion. It isn't until the patterns are in place for awhile that realization starts to dawn, and then extrication from the pattern becomes difficult.

Post a comment in response:

This account has disabled anonymous posting.
If you don't have an account you can create one now.
No Subject Icon Selected
More info about formatting