Home > Identification > Attachment Insecurities and the Processing of Threat-Related Information: Studying the Schemas Involved in Insecure People’s Coping Strategies

Attachment Insecurities and the Processing of Threat-Related Information: Studying the Schemas Involved in Insecure People’s Coping Strategies

Attachment Insecurities and the Processing of Threat-Related Information: Studying the Schemas Involved in Insecure People’s Coping Strategies

Source: Journal of Personality and Social Psychology, Volume 101, Issue 1, July 2011, Pages 78-93
Tsachi, Ein-Dor , Mario, Mikulincer , Phillip R., Shaver

In 6 studies we examined procedural, scriptlike knowledge associated with 2 different kinds of attachment insecurity: anxiety and avoidance. The studies examined associations between attachment insecurities, the cognitive accessibility of sentinel and rapid fight–flightschemas, and the extent to which these schemas guide the processing of threat-related information and actual behavior during an experimentally induced threatening event. Anxious attachment was associated with (a) greater accessibility of the sentinel schema in narratives of threatening events; (b) faster, deeper, and more schema-biased processing of information about components of the sentinel schema; and (c) quicker detection of a threat. Avoidant attachment was associated with greater accessibility of the rapid fight–flight schema in narratives of threatening events and faster, deeper, and more schema-biased processing of information about components of the schema. We discuss implications of the findings for understanding the cognitive aspects of insecure people’s coping strategies in threatening situations, as well as the potential benefits of these strategies to the people who enact them and to the groups to which they belong.

 

Author Keywords: attachment; social defense theory; anxiety; avoidance; inclusive fitness

Tsachi Ein-Dor is also at the Department of Psychology, Bar-Ilan University, Ramat Gan, Israel.We would like to thank Maya Welsh, Moshe Gross, Adi Ben-Ami, and Tal Orgad for their help in running the reported studies.
Advertisements
Categories: Identification
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: