Identity-Based Motivation: Implications for Intervention

被引:296
|
作者
Oyserman, Daphna [1 ]
Destin, Mesmin [1 ]
机构
[1] Univ Michigan, Inst Social Res, Ann Arbor, MI 48109 USA
来源
COUNSELING PSYCHOLOGIST | 2010年 / 38卷 / 07期
关键词
possible selves; school; adolescence; African American; Hispanic; achievement; health; depression; prevention; social identity; self-regulation; SCALE CRIS SCORES; POSSIBLE SELVES; COUNSELING PSYCHOLOGISTS; CAREER-DEVELOPMENT; SCHOOL OUTCOMES; SELF-CONCEPT; SOCIAL SELF; EXPECTATIONS; STEREOTYPES; COGNITION;
D O I
10.1177/0011000010374775
中图分类号
B849 [应用心理学];
学科分类号
040203 ;
摘要
Children want to succeed academically and attend college but their actual attainment often lags behind; some groups (e.g., boys, low-income children) are particularly likely to experience this gap. Social structural factors matter, influencing this gap in part by affecting children's perceptions of what is possible for them and people like them in the future. Interventions that focus on this macro-micro interface can boost children's attainment. We articulate the processes underlying these effects using an integrative culturally sensitive framework entitled identity-based motivation (IBM). The IBM model assumes that identities are dynamically constructed in context. People interpret situations and difficulties in ways that are congruent with currently active identities and prefer identity-congruent to identity-incongruent actions. When action feels identity congruent, experienced difficulty highlights that the behavior is important and meaningful. When action feels identity incongruent, the same difficulty suggests that the behavior is pointless and "not for people like me."
引用
收藏
页码:1001 / 1043
页数:43
相关论文
共 50 条
  • [41] Identity-based encryption and beyond
    Martin, Luther
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 62 - 64
  • [42] Hidden identity-based signatures
    Kiayias, Aggelos
    Zhou, Hong-Sheng
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 134 - 147
  • [43] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [44] Identity-based aggregate signatures
    Gentry, Craig
    Ramzan, Zulfikar
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 257 - 273
  • [45] Process Identity-Based Firewalling
    Mantu, Radu
    Chiroiu, Mihai
    Raiciu, Costin
    COMPUTER SECURITY-ESORICS 2024, PT II, 2024, 14983 : 202 - 221
  • [46] Towards an identity-based branding
    Burmann, Christoph
    Hegner, Sabrina
    Riley, Nicola
    MARKETING THEORY, 2009, 9 (01) : 113 - 118
  • [47] Identity-based authenticated encryption with identity confidentiality
    Shen, Shiyu
    Wang, Hongbing
    Zhao, Yunlei
    THEORETICAL COMPUTER SCIENCE, 2022, 901 : 1 - 18
  • [48] On the Anonymity of Identity-Based Encryption
    Luo, Song
    Hu, Ning
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [49] Identity-based threshold decryption
    Baek, J
    Zheng, YL
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 262 - 276
  • [50] Reflections on Identity-Based Research
    Nieto, Juliana Cano
    CULTURE HEALTH & SEXUALITY, 2011, 13 : S73 - S74