Source: Ten clinical uses of the Adult Attachment Interview (PDF Download Available)

The considerable number of AAI security subgroups3designated F forsecure–autonomous represent the range of positions a speaker can takebetween the insecure poles of dismissal and preoccupation. For example, onthe border with insecure–dismissing, some secure speakers have set aside someattachment concerns regarding a harsh background (F1a) or one that pro-vided limited opportunity (e.g., hard work, poverty) for attention to attach-Ten Clinical Uses of the AAI 9
ment (F1b), or they humorously indicate some dismissal or restriction, all thewhile showing that they value attachment (F2). The mainstream, obvi-ously “continuously secure” subtype (F3a) is distinguished from the “earnedsecure” subtype (F3b). Approaching the border with insecure–preoccupiedattachment, some secure speakers show a mild preoccupation with attachmentagainst a largely supportive background (F4a) or an unfortunate (loss) ortraumatic background (F4b). Finally, there is the secure speaker who is none-theless resentful and conflicted in some ways but accepting of continuinginvolvement with attachment (F5). All these secure subgroups share a relativelack of defensiveness, moderate to high coherence, and a clear valuing ofattachment.

Ten clinical uses of the Adult Attachment Interview (PDF Download Available). Available from: https://www.researchgate.net/publication/285731843_Ten_clinical_uses_of_the_Adult_Attachment_Interview [accessed May 23, 2017].

Author