Handbook of Personal Security
eBook - ePub

Handbook of Personal Security

  1. 380 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

About this book

The issue of psychological security within an increasingly unstable, interconnected world has become a defining challenge of modern individual and cultural life. The terror attacks of September 11, 2001 and the global financial crisis that unfolded in 2008 have intensified a sense of global and personal insecurity. This concern with psychological insecurity is reflected in contemporary culture, politics, the business world, consumer behavior, the arts, and other areas.

Within this context, the psychological sciences have kept pace, vigorously investigating these issues. This handbook features the latest theory and research examining cognitive, emotional, and behavioral responses to security threats. It expands the conceptual focus from specific security threats to the broader range of antecedents, processes, and consequences of psychological security/insecurity.

The chapters are organized into four content areas: personal security in individual contexts, personal security in interpersonal contexts, personal security with cultural and health contexts, and interdisciplinary analyses of personal security. They represent a new and vibrant area of research unified by the common goal of understanding the factors that shape a sense of personal security. Together, these provocative chapters provide specific starting points that will shape future theory, policy, and practice on this dominant social issue of the 21st Century and, more importantly, offer opportunities to connect social and personality psychology to its scientific kin.

Trusted by 375,005 students

Access to over 1.5 million titles for a fair monthly price.

Study more efficiently using our study tools.

Information

Year
2015
Print ISBN
9781848726758
eBook ISBN
9781317498469

1
Introducing Handbook of Personal Security

Aaron L. Wichman, Patrick J. Carroll, and Robert M. Arkin
This volume brings together many different researchers, each with their own unique approaches to the topic of security. Of course, although these contributions help to illuminate its properties, personal security has historically been a difficult idea to conceptualize. One of the many problems in conceptualizing security is that we have trouble accurately assessing our own level of security in daily life.
Several well-known judgment heuristics can help to illustrate this. For instance, the availability heuristic (Tversky & Kahneman, 1973) we use is relevant to this problem. People have a tendency to judge the likelihood of an event by how easily that event comes to mind. This has some tragically humorous consequences, such as when people come to think that shark attacks are more likely than slipping to one’s death in the bathtub, but also other consequences. One example of this has to do with the continued argument about and ban on small knives when flying in the U.S., stemming from the 9/11 hijackers’ use of box-cutters. Reinforced cockpit doors have greatly reduced the probability of cockpit take-overs and reduced the chances of a repeat of 9/11; the presence or absence of pen-knives does not change this.
Nevertheless, the easy availability (and subjective ease does play a role; see, e.g. Winkielman, Schwarz, & Belli, 1998) of the image of terrorists using box-cutters to bring about disaster distracts us from the reality of reinforced cockpit doors. In the meantime, no one seems concerned that food-borne illness is killing an estimated 3,000 people per year and hospitalizing 128,000 in the U.S. alone (Centers for Disease Control, 2014). The difference is that September 11, 2001, is a contemporary day of infamy, and Uncle Bob’s stomach bug just does not seem very salient compared with that.
The topic of salience is important for the availability heuristic, and also because salient objects are judged to be more important than non-salient ones. For instance, prior work has used salience as an index of the importance of different needs in defining satisfying and distressing life experiences (Carroll, Arkin, Seidel, & Morris, 2009; Sheldon, Elliot, Kim, & Kasser, 2001). In this work, the salience of missing security was the strongest predictor of negative affect evoked by distressing experiences (Carroll et al., 2009; Sheldon et al., 2001). Moreover, social cognition research shows that the more salient a person is, the more causally important people view that person to be (e.g. Taylor & Fiske, 1975). Salience can stem from sources that are explicitly divorced from reality, as in the case when people who are asked to imagine their college football team having a good season subsequently think that winning a major football title is actually more likely for their team (Carroll, 1978). This research also showed that imagining one candidate winning an election increased that candidate’s perceived odds of winning the election.
Often, people do not need to imagine things themselves to be exposed to information that increases the salience of threat. For instance, the more news media covering terrorism that people watch, the greater the perceived risk of terrorism is (Nellis & Savage, 2012). With this example in mind and considering the previous paragraph, it is worth considering the case of the official who explains how terrorists might contaminate a city’s water supply and paints a vivid picture of how terrorists could acquire poisonous substances and transport them to the reservoir for release. The vividness (Mazzocco & Brock, 2006) of this description helps to increase its salience, and water supply risks become more accessible and are seen as more likely to occur.
Among other effects, the vividness of the description for such attacks makes it easier to mentally simulate the prospect of future attack. People then come to think that such an attack is more likely than they otherwise would (Anderson & Godfrey, 1987; Kahneman & Tversky, 1982). Mental simulations can take their cues from low frequency (but high salience) realities. Consider Richard Reid, the shoe bomber who attempted to blow up an airliner with explosives hidden in his shoe (Wikipedia, 2014). Thanks to Richard, millions of people have removed their shoes for screening at airports. Compare this concern with a failed attack with the lack of concern for the approximately 90 people per day who are killed on highways in the U.S. (33,000 per year; National Highway Traffic Safety Administration, 2013).
Of course, beyond the availability heuristic, many other judgment biases can contaminate intuitive security assessment. For instance, people are not very good at working with base rates. Instead of using base-rate information, we tend to be influenced by the representativeness of stimuli (Kahneman & Tversky, 1974). The representativeness heuristic involves making a likelihood judgment based more on the perceived similarity of a target to some category than on the true probability of a given target belonging to that category. Often, this works well: when traveling, we are more likely to ask directions of someone walking a dog than of someone walking around looking lost. Dog walkers are representative of people who know the area. Confused-looking tourists are not. However, this type of approach can make life difficult as well. Single men of Middle Eastern appearance are often investigated more stringently in airports than are other people. Even so, probabilistically, the likelihood of any of these men attempting a terrorist attack is stunningly small.
This is actually reminiscent of the classic “Linda” problem (Tversky & Kahneman, 1983). It reads like this: “Linda is 31 years old, single, outspoken, and very bright. She majored in philosophy. As a student, she was deeply concerned with issues of discrimination and social justice and also participated in anti-nuclear demonstrations.”
Which is more probable?
  1. Linda is a bank teller.
  2. Linda is a bank teller and is active in the feminist movement.
The conjunction of Middle Eastern and terrorist cannot exceed the probability of just being a terrorist. The entire population of terrorists includes those that are Middle Eastern plus those of every other origin (e.g. Irish Republican Army, Euskadi ta Askatasuna [ETA], American “Freedom Fighters” like Timothy McVeigh). Yet because we see Middle Eastern men as representative of the terrorist category, people ignore other exemplars that might fit that category in favor of a focus on these groups. This selective threat perception does no one any favors.
We see threat where we expect it. As such, we are less likely to identify threats that do not correspond to our preconceived ideas of threat. Preconceived ideas of what threats look like, and what their causes are, can alter our perceptions. Although using our theories of how the world works can be helpful, it can also be problematic. Theories can be wrong. They can lead us to see ambiguous information in theory-consistent ways (see Kunda, 1987, 1990). These naïve theories can even lead us to completely dismiss or ignore theory-inconsistent information. For instance, we might think that religious affiliation represents the only cause of terrorism (a false theory). We might pay special attention to a suspected terrorist’s religious habits (interpretation of ambiguous information in a theory-consistent matter). We might even dismiss information about a person’s known criminal associates in favor of an investigation of the person’s religious practices (dismiss theory-inconsistent information; cf. Nisbett & Ross, 1980).

Defining the Elusive Experience of Personal Security

So far, we have outlined many factors that interfere with accurate security assessment. The many difficulties that people face with accuracy remind us that it makes psychological sense to think of security not as an objective, measurable state of the environment but rather as a subjective assessment. Although many of the chapters offer definitions of security or insecurity, we would like to provide our own as well, one that captures the subjective quality of security. We define personal security as freedom from concern over loss. Personal insecurity we define as the experience of concern over loss.
This definition integrates the variety of loss concerns that people can have with the important condition of concern. We take concern to have the meaning supplied by the law of concern (Frijda, 1988). This law states that only events that are relevant to important goals, motives, or concerns will elicit emotions. Events rising to a level of concern thus may be accorded precedence over goals for which concerns are not registered. This has implications for the myriad ways in which security can affect unrelated goal pursuit. We return to this point below. Logically, it follows from this application of the law of concern that possible or actual losses that do not matter to us will not affect perceptions of security. In the following, we will refer to security-related emotions and thoughts with names such as “threat” or “safety”. These terms should be interpreted through the lens of our definition, where threat causes a state of concern with loss, and safety is marked in part by lack of concern.
To flesh out our definition, the state of security is marked by freedom from the pressures associated with loss appraisals. Each time one registers loss or threat of loss, coping processes are initiated to deal with it. Whether coping aims to change the world, or to change the self (cf. Rothbaum, Weisz, & Snyder, 1982), responses to loss concerns may overwhelm other active goals. Faced with a choice to either address goal-relevant loss concerns or continue as if concerns were not present, most people should opt to address their loss concerns. In fact, it is difficult to imagine otherwise.
The literature on goal shielding (Shah, Friedman, & Kruglanski, 2002) shows that active goals inhibit goals that do not serve the active ones. This shielding effect appears to be especially pronounced in the presence of anxiety (Shah et al., 2002). In other words, concerns with loss, and the anxiety that accompanies them, should move goals associated with the object of loss concern to positions of priority in the self-regulatory system. The priority accorded these goals will decrease the importance of other, previously high priority goals. If loss concerns become pre-eminent, people will re-orient themselves to address these concerns, at the expense of their other goals, as well as with negative consequences for executive function (Masicampo & Baumeister, 2010).
Loss concerns come in many forms, from threats to relationships to threatening doubts about competence, or terrorism. The chapters in this book show how, so long as these concerns are active, many different types of behavior may occur in the pursuit of reducing these concerns. Unfortunately, this panoply of effects linked to loss concerns can have several negative implications for mental health and adjustment. So long as concerns with loss drive behavior, people are so busy reactively bolstering themselves against loss that they may be relatively unable to implement new ways of thinking that transcend the existing, apparently negative interdependencies that make up their perceived social environment. Threat makes people cognitively rigid (Plessow, Fischer, Kirschbaum, & Goschke, 2011).
Consistent with Maslow’s hierarchy (1955), we believe that humans can actualize themselves according to the growth needs we all share only when loss concerns are reduced. Otherwise, they will have their actualization goals shielded and will suffer the negative cognitive consequences of unfulfilled security goals, as well as the possibility of actual loss. The lack of loss concern is therefore essential for human flourishing. Only in the absence of emotions stemming from possible loss appraisals can people fully devote themselves to proactive growth.

Different Kinds of Security

Security as we have defined it is a particular cognitive and emotional state. Because there are many influences on these states, it may be useful to think of two basic ways that one can experience security—that is, volitionally and incidentally.
Volitional security comprises all of the behaviors and cognitions that work to minimize our concern with loss. Examples include different kinds of insurance (e.g. for crops or homes), concrete blast barriers, water treatment plants, anti-theft devices, use of alternate test forms to reduce the chances of students copying from each other, and a note to remember one’s wedding anniversary. Some of these clearly serve the sole purpose of reducing the likelihood (e.g. concrete blast walls) or consequences (e.g. insurance) of loss. Others are more ambiguous, such as the note to remember an anniversary. A note to remember one’s wedding anniversary in order to celebrate is very different from a note to remember one’s wedding anniversary in order to avoid hurting one’s spouse’s feelings. In this latter case, forgetting the anniversary might be taken to mean dissatisfaction with the relationship. These varied ways in which we can address loss concerns are an interesting current topic of research (e.g. Scholer & Higgins, 2013), and should be noted, but it is not essential for our treatment here.
The wedding anniversary example demonstrates how important the concept of loss avoidance is. When one’s primary motivation is to prevent bad things from happening, this has far-reaching consequences, whether the avoidance motivation proximally avoids terrorists or avoids forgetting one’s anniversary. Although people may be less at risk from the losses they guard against, they will still be influenced by their avoidance motivation. Because of this, volitional security strivings may lead people who have objectively lower risk for loss to share the same mindset as people who are at objectively higher risk for loss. For example, people who are ensconced behind concrete blast barriers, powerful people who control access to database systems or other facilities, or people who openly carry weapons may all to some extent share the mindset of a refugee trying to escape civil war or of a hungry person guarding food. In spite of their differences in power, each of these people may then subjectively experience similar psychological consequences of this motivation. We return to this point below.
A second type of security, incidental security, comprises non-volitional lack of concern with loss. Incidental security refers to the state where possible loss is not even a glimmer on one’s cognitive horizon. It can be transiently activated, such as when one is immersed in gain-focused goal pursuit. It can also be a more enduring state, influenced by factors such as a secure attachment style, or absence of direct personal exposure to loss, or lack of exposure to media depicting loss.
Where volitional security is a reactive state that occurs in response to threat, incidental security can be reactive or not. In some non-reactive cases, this security is incidental to a non-threatening personal history or incidental to identified (i.e. Deci & Ryan, 2012) promotion-focused striving. In other cases, incidental security may arise from a non-volitional reaction to threat. For instance, a large body of research demonstrates that people may respond to threat outside of conscious awareness, whether by showing increased worldview defense (Arndt, Greenberg, Solomon, Pyszczynski, & Simon, 1997; Wichman, Brunner, & Weary, 2014) or by reporting increased religiosity (Wichman, 2010). These studies show that, in general, one way that people respond to threat is with zeal-type behaviors (McGregor, Prentice, & Nash, 2009; Van den Bos et al., this volume), whereby threat triggers reactive approach motivation. Reactive incidental security includes changes in post-threat behavior following exposure to attachment figures (e.g. Mikulincer & Shaver, this volume), as well as increased relationship striving in the face of threat (e.g. Hart, this volume). As we will describe, incidental security should have different c...

Table of contents

  1. Cover
  2. Title
  3. Copyright
  4. CONTENTS
  5. Contributors
  6. Preface
  7. 1. Introducing Handbook of Personal Security
  8. PART I Personal Security in Individual Contexts
  9. PART II Personal Security in Interpersonal Contexts
  10. PART III Personal Security in Cultural and Health Contexts
  11. PART IV Interdisciplinary Analyses of Personal Security
  12. Index

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.5M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1.5 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Handbook of Personal Security by Patrick J. Carroll,Robert M. Arkin,Aaron L. Wichman in PDF and/or ePUB format, as well as other popular books in Psychology & History & Theory in Psychology. We have over 1.5 million books available in our catalogue for you to explore.