Persistent Identity Threats: Emotional and Neurological Responses

被引:2
|
作者
Miller, Brennan J. [1 ]
Kalkhoff, Will [1 ]
Pollock, Joshua [1 ,2 ]
Pfeiffer, Matthew A. [1 ,2 ]
机构
[1] Kent State Univ, Sociol, Kent, OH 44242 USA
[2] Kent State Univ, Electrophysiol Neurosci Lab ENLoK, Kent, OH 44242 USA
关键词
coping mechanisms; emotions; identity theory; neurosociology; suppression;
D O I
10.1177/0190272518812081
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
In the past few decades, sociologists have called for the incorporation of biological ideas and methods into sociology as a means of improving our understanding of social behavior. In this vein, researchers have argued that bringing neuroscience into the study of self and identity processes will help sociologists refine and construct more accurate theories. The present study pursues this agenda by using neuroscience insights and methodology to empirically examine a poorly understood aspect of identity processes: persistent identity nonverification. We find that increasing the amount of nonverifying feedback increases emotional and neurological arousal but only to a point before leveling out. Furthermore, our findings suggest that healthy individuals may employ an immediate coping mechanism of "suppression" to deal with persistent identity threats. We discuss the implications of our findings for future research on self and identity.
引用
收藏
页码:98 / 111
页数:14
相关论文
共 50 条
  • [41] TERRORISM - FUTURE THREATS AND RESPONSES
    ALEXANDER, Y
    BAUM, P
    DANZIGER, R
    MOYNIHAN, DP
    MURPHY, JF
    COCHRAN, T
    ARNOLD, TE
    MOSS, DE
    ONEILL, MJ
    ROSEN, B
    DAVISON, WP
    HENKIN, L
    MCCORMICK, RM
    ACKERMAN, K
    TERRORISM, 1985, 7 (04): : 367 - 410
  • [42] An Exploration on Advanced Persistent Threats in Biocybersecurity and Cyberbiosecurity
    Palmer, Xavier-Lewis
    Potter, Lucas
    Karahan, Saltuk
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 532 - 535
  • [43] Persistent Memory Security Threats to Interprocess Isolation
    Ul Mustafa, Naveed
    Solihin, Yan
    IEEE MICRO, 2023, 43 (05) : 16 - 23
  • [44] Optimal Monitor Placement for Detection of Persistent Threats
    Khalil, Karim
    Qian, Zhiyun
    Yu, Paul
    Krishnamurthy, Srikanth
    Swami, Ananthram
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [45] Surviving Advanced Persistent Threats - a Framework and Analysis
    Mehresh, Ruchika
    Upadhyaya, Shambhu
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 445 - 454
  • [46] Combating Advanced Persistent Threats: Challenges and Solutions
    Wang, Yuntao
    Liu, Han
    Li, Zhendong
    Su, Zhou
    Li, Jiliang
    IEEE NETWORK, 2024, 38 (06): : 324 - 333
  • [47] EMOTIONAL IDENTITY OF MOVIES
    Canini, Luca
    Benini, Sergio
    Migliorati, Pierangelo
    Leonardi, Riccardo
    2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 1821 - 1824
  • [48] Dimensions of 'Socio' Vulnerabilities of Advanced Persistent Threats
    Nicho, Mathew
    McDermott, Christopher D.
    2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 521 - 525
  • [49] Mitigating Exploits, Rootkits and Advanced Persistent Threats
    Durham, David
    2014 IEEE HOT CHIPS 26 SYMPOSIUM (HCS), 2014,
  • [50] Hidden Markov models for advanced persistent threats
    Brogi G.
    Di Bernardino E.
    International Journal of Security and Networks, 2019, 14 (04) : 181 - 190