Cookies Policy
X

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.

I accept this policy

Find out more here

Unintended Consequences of Security Motivation in the Age of the Internet: Impacts on Governance and Democracy

No metrics data to plot.
The attempt to load metrics for this article has failed.
The attempt to plot a graph for these metrics has failed.
The full text of this article is not currently available.

Brill’s MyBook program is exclusively available on BrillOnline Books and Journals. Students and scholars affiliated with an institution that has purchased a Brill E-Book on the BrillOnline platform automatically have access to the MyBook option for the title(s) acquired by the Library. Brill MyBook is a print-on-demand paperback copy which is sold at a favorably uniform low price.

Access this article

+ Tax (if applicable)
Add to Favorites
You must be logged in to use this functionality

image of Journal of Cognition and Culture

There has been a striking recent shift in how political discourse seems to work, with, for example, partial information of sometimes dubious accuracy or relevance propagating very rapidly and widely on electronic networks and overriding clearer, more complete, more accurate information. In explanation of such phenomena, we address ways in which highly interconnected electronic networks may create vulnerabilities that involve tapping into special, relatively hard-wired motivational systems in the brain, particularly the security motivation system. We also discuss a mode of communication, sometimes described as “mass hypnosis,” in relation to a motivational system that manages the dominance hierarchy. Rather than just affecting people’s higher cognitions, political messages also tap into these motivation systems, generating surprising avenues for misuse.

Affiliations: 1: Department of Psychology, University of Waterloo Waterloo, on, Canada N2L 3G1 ; 2: Department of Psychiatry and Behavioural Neurosciences, McMaster University Hamilton, on, Canada L8S 4K1

10.1163/15685373-12342184
/content/journals/10.1163/15685373-12342184
dcterms_title,pub_keyword,dcterms_description,pub_author
10
5
Loading
Loading

Full text loading...

/content/journals/10.1163/15685373-12342184
Loading

Data & Media loading...

1. Alexander G.E., Delong M.R., Strick P.L."Parallel organization of functionally segregated circuits linking basal ganglia and cortex" Annual Review of Neuroscience 1986Vol 9 357 381 http://dx.doi.org/10.1146/annurev.ne.09.030186.002041
2. Blanchard D.C., Blanchard R.J."Ethoexperimental approaches to the biology of emotion" Annual Review of Psychology 1988Vol 39 43 68 http://dx.doi.org/10.1146/annurev.ps.39.020188.000355
3. Blanchard D.C., Griebel G., Pobbe R., Blanchard R.J."Risk assessment as an evolved threat detection and analysis process" Neuroscience and Biobehavioral Reviews 2011Vol 35 991 998 http://dx.doi.org/10.1016/j.neubiorev.2010.10.016
4. Boyer P., Lienard P."Why ritualized behavior? Precaution systems and action parsing in developmental, pathological and cultural rituals" Behavioral and Brain Sciences 2006Vol 29 595 613
5. Brown J.S., Laundre J.W., Gurung M."The ecology of fear: Optimal foraging, game theory, and trophic interactions" Journal of Mammalogy 1999Vol 80 385 399 http://dx.doi.org/10.2307/1383287
6. Brown R.G., Pluck G."Negative symptoms: the ‘pathology’ of motivation and goal-directed behaviour" Trends in Neurosciences 2000Vol 23 412 417 http://dx.doi.org/10.1016/S0166-2236(00)01626-X
7. Cassidy J."Hillary Clinton’s “basket of deplorables” gaffe" The New Yorker 2016 September 11 2016 Available online at
8. Cohen R."Trump and the end of truth" New York Times International Weekly 2016 July 30 14 2016
9. Collinson S."Obama suffers the slings and arrows of a restive world" CNN Politics 2016 September 6 2016 Available online at
10. Curio E."Proximate and developmental aspects of antipredator behavior" Advances in the Study of Behavior 1993Vol 22 135 238 http://dx.doi.org/10.1016/S0065-3454(08)60407-6
11. Economist"The new political divide; Drawbridges up" The Economist 2016 July 30Vol 420 5 16 18
12. Edwards I.K. Ruffles on my longjohns 1981 Surrey, BC Hancock House
13. Fodor J.A. The modularity of mind: An essay on faculty psychology 1983 Cambridge, MA MIT Press
14. Gould E., Edwards R. Ralph Edwards of Lonesome Lake 1979 Surrey, BC Hancock House
15. Hinds A.L., Woody E.Z., Drandic A., Schmidt L.A., Van Ameringen M., Coroneos M., Szechtman H."The psychology of potential threat: Properties of the security motivation system" Biological Psychology 2010Vol 85 331 337 http://dx.doi.org/10.1016/j.biopsycho.2010.08.003
16. Hinds A.L., Woody E.Z., Van Ameringen M., Schmidt L.A., Szechtman H."When too much is not enough: Obsessive-compulsive disorder as a pathology of stopping, rather than starting" PLoS ONE 2012Vol 7 e30586 http://dx.doi.org/10.1371/journal.pone.0030586
17. Hinds A.L., Woody E.Z., Van Ameringen M., Schmidt L.A., Szechtman H."In the wake of a possible mistake: Security motivation, checking behavior, and ocd" Journal of Behavior Therapy and Experimental Psychiatry 2015Vol 49 133 140 http://dx.doi.org/10.1016/j.jbtep.2015.03.016
18. Hollander E., Kwon J.H., Stein D.J., Broatch J., Rowland C.T., Himelein C.A."Obsessive-compulsive and spectrum disorders: Overview and quality of life issues" Journal of Clinical Psychiatry 1996Vol 57 Supplement 8 3 6
19. Husted N.W. Analysis techniques for exploring emergent vulnerabilities and attacks on mobile devices 2013 PhD thesis Indiana University, Bloomington, IN. Available online at
20. Jaynes J. The origin of consciousness in the breakdown of the bicameral mind 1976 Boston, MA Houghton Mifflin
21. Kavaliers M., Choleris E."Antipredator responses and defensive behavior: ecological and ethological approaches for the neurosciences" Neuroscience and Biobehavioral Reviews 2001Vol 25 577 586 http://dx.doi.org/10.1016/S0149-7634(01)00042-2
22. Krugman P."Delusions of chaos" New York Times International Weekly 2016 July 30 15 2016
23. Lima S.L., Bednekoff P.A."Temporal variation in danger drives antipredator behavior: The predation risk allocation hypothesis" American Naturalist 1999Vol 153 649 659 http://dx.doi.org/10.1086/303202
24. Marks I.M., Nesse R.M."Fear and fitness: An evolutionary analysis of anxiety disorders" Ethology and Sociobiology 1994Vol 15 247 261 http://dx.doi.org/10.1016/0162-3095(94)90002-7
25. Masterson F.A., Crawford M."The Defense Motivation System – A theory of avoidance-behavior" Behavioral and Brain Sciences 1982Vol 5 661 675 http://dx.doi.org/10.1017/S0140525X00014114
26. Norberg J. Progress: Ten reasons to look forward to the future 2016 London Oneworld
27. O’Reilly B., Dugard M. Killing Patton: The strange death of World War II’s most audacious general 2014 New York, NY Henry Holt
28. Pinker S. How the mind works 1997 New York, NY Norton
29. Polonski V."Impact of social media on the outcome of the eu referendum" Oxford Today 2016 June 28 2016 Available online at
30. Porges S.W."The polyvagal perspective" Biological Psychology 2007Vol 74 116 143 http://dx.doi.org/10.1016/j.biopsycho.2006.06.009
31. Ramo J.C. The seventh sense: Power, fortune, and survival in the age of networks 2016 New York, NY Little, Brown
32. Reed G.F. Obsessional experience and compulsive behaviour: a cognitive-structural approach 1985 Orlando, FL Academic Press
33. Szechtman H., Woody E."Obsessive-compulsive disorder as a disturbance of security motivation" Psychological Review 2004Vol 111 111 127 http://dx.doi.org/10.1037/0033-295X.111.1.111
34. Szechtman H., Woody E.Z."Obsessive-compulsive disorder as a disturbance of security motivation: Constraints on comorbidity" Neurotoxicity Research, 2006Vol 10 103 112 http://dx.doi.org/10.1007/BF03033239
35. Szechtman H., Shivji S, Woody E.Z. Kostrzewa R.M."Pathophysiology of obsessive-compulsive disorder: Insights from normal function and neurotoxic effects of drugs, infection, and brain injury" Handbook of Neurotoxicity 2014 New York, NY Springer 2231 2253
36. Tooby J., Cosmides L."The past explains the present: Emotional adaptations and the structure of ancestral environments" Ethology and Sociobiology 1990Vol 11 375 424 http://dx.doi.org/10.1016/0162-3095(90)90017-Z
37. Tooby J., Cosmides L. Barkow J.H., Cosmides L., Tooby J."Psychological foundations of culture" The Adapted mind: Evolutionary psychology and the generation of culture 1992 New York, NY Oxford University Press 19 136
38. Tooby J., Cosmides L."The evolved architecture of hazard management: Risk detection reasoning and the motivational computation of threat magnitudes" Behavioral and Brain Sciences 2006Vol 29 631 633 http://dx.doi.org/10.1017/S0140525X06009538
39. Trower P., Gilbert P., Sherling G. Leitenberg H."Social anxiety, evolution, and self-presentation: An interdisciplinary perspective" Handbook of social and evaluation anxiety 1990 New York, NY Plenum Press 11 45 http://dx.doi.org/10.1007/978-1-4899-2504-6_2
40. Turner T., McVeigh R.M. Fogswamp: Living with swans in the wilderness 1977 Surrey, BC Hancock House
41. Wingfield J.C., Manehy D.L., Breuner C.W., Jacobs J.D., Lynn S., Ramenofsky M., Richardson R.D."Ecological bases of ormone-behavior interactions: The “Emergency Life History Stage”" American Zoologist 1998Vol 38 191 206 http://dx.doi.org/10.1093/icb/38.1.191
42. Wilson E.O. Sociobiology: The new synthesis 1975 Cambridge, MA Harvard University Press
43. Wise S., Rapoport J.L. Rapoport J.L."Obsessive compulsive disorder – Is it a basal ganglia dysfunction?" Obsessive compulsive disorder in children and adolescence 1989 Washington, DC American Psychiatric Press 327 344
44. Woody E.Z., Szechtman H."Hypnotic hallucinations and yedasentience" Contemporary Hypnosis 2000Vol 17 26 31 http://dx.doi.org/10.1002/ch.189
45. Woody E., Szechtman H."Motivation, time course, and heterogeneity in obsessive-compulsive disorder: Response to Taylor, McKay, and Abramowitz" Psychological Review 2005Vol 112 658 661 2005 http://dx.doi.org/10.1037/0033-295X.112.3.658
46. Woody E., Szechtman H. Jamieson G.A."To see feelingly: Emotion, motivation, and hypnosis" Hypnosis and conscious states: The cognitive-neuroscience perspective 2007 Oxford Oxford University Press 241 255
47. Woody E.Z., Szechtman H."Adaptation to potential threat: The evolution, neurobiology, and psychopathology of the security motivation system" Neuroscience and Biobehavioral Reviews 2011Vol 35 1019 1033 http://dx.doi.org/10.1016/j.neubiorev.2010.08.003
48. Woody E.Z., Szechtman H."A biological security motivation system for potential threats: Are there implications for policy-making?" Frontiers in Human Neuroscience 2013Vol 7 556 http://dx.doi.org/10.3389/fnhum.2013.00556
http://brill.metastore.ingenta.com/content/journals/10.1163/15685373-12342184
Loading

Article metrics loading...

/content/journals/10.1163/15685373-12342184
2016-11-07
2018-09-22

Sign-in

Can't access your account?
  • Tools

  • Add to Favorites
  • Printable version
  • Email this page
  • Subscribe to ToC alert
  • Get permissions
  • Recommend to your library

    You must fill out fields marked with: *

    Librarian details
    Your details
    Why are you recommending this title?
    Select reason:
     
    Journal of Cognition and Culture — Recommend this title to your library
  • Export citations
  • Key

  • Full access
  • Open Access
  • Partial/No accessInformation