Identity-Based Motivation and the Motivational Consequences of Difficulty

被引:0
|
作者
Oyserman, Daphna [1 ]
机构
[1] Univ Southern Calif, Dept Psychol, Los Angeles, CA 90007 USA
关键词
behavior; judgment and decision-making; difficulty-as-importance; difficulty-as-impossibility; and difficulty-as-improvement; goal attainment; identity and identity-based motivation; metacognitive inferences and difficulty mindsets; motivation and action; self-concept; future self and possible selves; EXPERIENCED DIFFICULTY; POSSIBLE SELVES; INTERVENTION;
D O I
10.1111/spc3.70028
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Difficulty is an under-appreciated but powerful motivational force. As outlined by identity-based motivation (IBM) theory, a social cognition theory of self, self-regulation, and goal pursuit, people prefer to act (action-readiness) and understand their experiences (procedural-readiness) in ways that fit who they are (identity-congruence). IBM also predicts that experienced identity congruence is context-sensitive-though experienced as stable anchors, people's identities are dynamically constructed in context. Contexts shape which identities come to mind, what these on-the-mind identities imply for action, and what people infer when thinking about a task, goal, or life feels hard. People can draw two inferences (termed difficulty-as-importance and difficulty-as-impossibility) when a task or goal feels hard to think about and a third (termed difficulty-as-improvement) when their life feels hard to think about. IBM predicts, and studies support, a bidirectional relationship among these three components (action-readiness, procedural-readiness, and dynamic construction). Situations shape the identities that are on the mind and feel relevant (dynamic construction) and the inferences people draw from difficulty (procedural readiness). On-the-mind and context-relevant identities shape inferences from difficulty. Inferences from difficulty affect identity and action-when applying a difficulty-as-importance lens, people feel more certain of attaining their self-relevant goals. They perform better and find engaging a "me" thing to do-"no pain, no gain". When applying a difficulty-as-impossibility lens, people find engaging a waste of their time and unlikely to yield self-benefits unless an easy means to goal attainment exists-"cut your losses". They focus on their virtuous character traits and prefer effortful means to attain self-relevant goals when applying a difficulty-as-improvement lens-"the high road". Difficulty can be a green light of importance signaling you to get going, a detour sign of impossibility signaling you to shift to something else, or angel wings pointing you to the effortful route.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Idealizing Identity-Based Encryption
    Hofheinz, Dennis
    Matt, Christian
    Maurer, Ueli
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 495 - 520
  • [42] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [43] Identity-based encryption and beyond
    Martin, Luther
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 62 - 64
  • [44] Hidden identity-based signatures
    Kiayias, Aggelos
    Zhou, Hong-Sheng
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 134 - 147
  • [45] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [46] Identity-based aggregate signatures
    Gentry, Craig
    Ramzan, Zulfikar
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 257 - 273
  • [47] Process Identity-Based Firewalling
    Mantu, Radu
    Chiroiu, Mihai
    Raiciu, Costin
    COMPUTER SECURITY-ESORICS 2024, PT II, 2024, 14983 : 202 - 221
  • [48] Towards an identity-based branding
    Burmann, Christoph
    Hegner, Sabrina
    Riley, Nicola
    MARKETING THEORY, 2009, 9 (01) : 113 - 118
  • [49] Identity-based authenticated encryption with identity confidentiality
    Shen, Shiyu
    Wang, Hongbing
    Zhao, Yunlei
    THEORETICAL COMPUTER SCIENCE, 2022, 901 : 1 - 18
  • [50] Behavioral and psychological consequences of social identity-based aggressive victimization in high school youth
    Utley, Jessica Weiss
    Sinclair, H. Colleen
    Nelson, Sierra
    Ellithorpe, Chelsea
    Stubbs-Richardson, Megan
    SELF AND IDENTITY, 2022, 21 (01) : 61 - 85