Identity-Based Motivation and the Motivational Consequences of Difficulty

被引:0
|
作者
Oyserman, Daphna [1 ]
机构
[1] Univ Southern Calif, Dept Psychol, Los Angeles, CA 90007 USA
关键词
behavior; judgment and decision-making; difficulty-as-importance; difficulty-as-impossibility; and difficulty-as-improvement; goal attainment; identity and identity-based motivation; metacognitive inferences and difficulty mindsets; motivation and action; self-concept; future self and possible selves; EXPERIENCED DIFFICULTY; POSSIBLE SELVES; INTERVENTION;
D O I
10.1111/spc3.70028
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Difficulty is an under-appreciated but powerful motivational force. As outlined by identity-based motivation (IBM) theory, a social cognition theory of self, self-regulation, and goal pursuit, people prefer to act (action-readiness) and understand their experiences (procedural-readiness) in ways that fit who they are (identity-congruence). IBM also predicts that experienced identity congruence is context-sensitive-though experienced as stable anchors, people's identities are dynamically constructed in context. Contexts shape which identities come to mind, what these on-the-mind identities imply for action, and what people infer when thinking about a task, goal, or life feels hard. People can draw two inferences (termed difficulty-as-importance and difficulty-as-impossibility) when a task or goal feels hard to think about and a third (termed difficulty-as-improvement) when their life feels hard to think about. IBM predicts, and studies support, a bidirectional relationship among these three components (action-readiness, procedural-readiness, and dynamic construction). Situations shape the identities that are on the mind and feel relevant (dynamic construction) and the inferences people draw from difficulty (procedural readiness). On-the-mind and context-relevant identities shape inferences from difficulty. Inferences from difficulty affect identity and action-when applying a difficulty-as-importance lens, people feel more certain of attaining their self-relevant goals. They perform better and find engaging a "me" thing to do-"no pain, no gain". When applying a difficulty-as-impossibility lens, people find engaging a waste of their time and unlikely to yield self-benefits unless an easy means to goal attainment exists-"cut your losses". They focus on their virtuous character traits and prefer effortful means to attain self-relevant goals when applying a difficulty-as-improvement lens-"the high road". Difficulty can be a green light of importance signaling you to get going, a detour sign of impossibility signaling you to shift to something else, or angel wings pointing you to the effortful route.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Multipurpose identity-based signcryption - A swiss army knife for identity-based cryptography
    Boyen, X
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 383 - 399
  • [32] I'll take the high road: Paths to goal pursuit and identity-based interpretations of difficulty
    Kiper, Guelnaz
    Oyserman, Daphna
    Yan, Veronica X.
    SELF AND IDENTITY, 2024, 23 (1-2) : 1 - 22
  • [33] If 'we' can succeed, 'I' can too: Identity-based motivation and gender in the classroom
    Elmore, Kristen C.
    Oyserman, Daphna
    CONTEMPORARY EDUCATIONAL PSYCHOLOGY, 2012, 37 (03) : 176 - 185
  • [34] The College Journey and Academic Engagement: How Metaphor Use Enhances Identity-Based Motivation
    Landau, Mark J.
    Oyserman, Daphna
    Keefer, Lucas A.
    Smith, George C.
    JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 2014, 106 (05) : 679 - 698
  • [35] Identity-Based Authenticated Encryption with Identity Confidentiality
    Zhao, Yunlei
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 633 - 653
  • [36] Identity-Based Hybrid Signcryption
    Li, Fagen
    Shirase, Masaaki
    Takagi, Tsuyoshi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 534 - +
  • [37] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [38] Introduction to identity-based cryptography
    Joux, Antoine
    Cryptology and Information Security Series, 2009, 2 : 1 - 12
  • [39] Hidden identity-based signatures
    Kiayias, A.
    Zhou, H. -S.
    IET INFORMATION SECURITY, 2009, 3 (03) : 119 - 127
  • [40] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    Journal of Cryptology, 2011, 24 : 42 - 82