Results for 'threat detection'

971 found
Order:
  1.  23
    Context learning for threat detection.Akos Szekely, Suparna Rajaram & Aprajita Mohanty - 2017 - Cognition and Emotion 31 (8):1525-1542.
    It is hypothesised that threatening stimuli are detected better due to their salience or physical properties. However, these stimuli are typically embedded in a rich context, motivating the question whether threat detection is facilitated via learning of contexts in which threat stimuli appear. To address this question, we presented threatening face targets in new or old spatial configurations consisting of schematic faces and found that detection of threatening targets was faster in old configurations. This indicates that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  46
    Mechanisms of visual threat detection in specific phobia.Mariann R. Weierich & Teresa A. Treat - 2015 - Cognition and Emotion 29 (6):992-1006.
  3.  64
    Statistical Models for Predicting Threat Detection From Human Behavior.Timothy Kelley, Mary J. Amon & Bennett I. Bertenthal - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  10
    Female advantage in threat avoidance manifests in threat reaction but not threat detection.David S. March & Lowell Gaertner - 2022 - Behavioral and Brain Sciences 45.
    Threat avoidance involves both detection of a threatening stimulus and reaction to it. We demonstrate with empirically validated stimuli that threat detection is more pronounced among males, whereas threat reactivity is more pronounced among females. Why women are less efficient detectors of threat challenges Benenson et al.'s conceptual analysis.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  63
    Trait anxiety, anxious mood, and threat detection.Angela Byrne & Michael W. Eysenck - 1995 - Cognition and Emotion 9 (6):549-562.
  6.  29
    What's so scary about needles and knives? Examining the role of experience in threat detection.Vanessa LoBue - 2010 - Cognition and Emotion 24 (1):180-187.
  7.  37
    The snake in the grass revisited: An experimental comparison of threat detection paradigms.Vanessa LoBue & Kaleigh Matthews - 2014 - Cognition and Emotion 28 (1):22-35.
  8.  38
    XRIndex: a brief screening tool for individual differences in security threat detection in x-ray images.Elena Rusconi, Francesca Ferri, Essi Viding & Timothy Mitchener-Nissen - 2015 - Frontiers in Human Neuroscience 9.
  9.  48
    Subconscious detection of threat as reflected by an enhanced response bias.Sabine Windmann & Thomas Krüger - 1998 - Consciousness and Cognition 7 (4):603-633.
    Neurobiological and cognitive models of unconscious information processing suggest that subconscious threat detection can lead to cognitive misinterpretations and false alarms, while conscious processing is assumed to be perceptually and conceptually accurate and unambiguous. Furthermore, clinical theories suggest that pathological anxiety results from a crude preattentive warning system predominating over more sophisticated and controlled modes of processing. We investigated the hypothesis that subconscious detection of threat in a cognitive task is reflected by enhanced ''false signal'' (...) rather than by selectively enhanced discrimination of threat items in 30 patients with panic disorder and 30 healthy controls. We presented a tachistoscopic word-nonword discrimination task and a subsequent recognition task and analyzed the data by means of process-dissociation procedures. In line with our expectations, subjects of both groups showed more false signal detection to threat than to neutral stimuli as indicated by an enhanced response bias, whereas indices of discriminative sensitivity did not show this effect. In addition, patients with panic disorder showed a generally enhanced response bias in comparison to healthy controls. They also seemed to have processed the stimuli less elaborately and less differentially. Results are consistent with the assumption that subconscious threat detection can lead to misrepresentations of stimulus significance and that pathological anxiety is characterized by a hyperactive preattentive alarm system that is insufficiently controlled by higher cognitive processes. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  10.  20
    Appraising the role of visual threat in speeded detection and classification tasks.Yue Yue & Philip T. Quinlan - 2015 - Frontiers in Psychology 6:131724.
    This research examines the speeded detection and, separately, classification of photographic images of animals. In the initial experiments each display contained various images of animals and, in the detection task, participants responded whether a display contained only images of birds or also included an oddball target image of a cat or dog. In the classification search task, a target was always present and participants classified this as an image of a cat or a dog. Half of the target (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  10
    Detecting and prosecuting contract cheating with evidence – a “Doping Test” approach.Pauli Alin - 2020 - International Journal for Educational Integrity 16 (1).
    Contract cheating – outsourcing student assignments for a fee – presents a growing threat to the integrity of higher education. As contract cheating is based on students purchasing assignments that are original, traditional plagiarism detection tools remain insufficient to detect contract cheating. Part of the problem is that proving contract cheating is difficult. As a result, instructors may find it hard to prosecute students. To help address the problem, this conceptual paper builds upon extant scholarship on contract cheating (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  80
    Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks.Josué Toledo-Castro, Pino Caballero-Gil, Nayra Rodríguez-Pérez, Iván Santos-González, Candelaria Hernández-Goya & Ricardo Aguasca-Colomo - 2018 - Complexity 2018:1-17.
    Huge losses and serious threats to ecosystems are common consequences of forest fires. This work describes a forest fire controller based on fuzzy logic and decision-making methods aiming at enhancing forest fire prevention, detection, and fighting systems. In the proposal, the environmental monitoring of several dynamic risk factors is performed with wireless sensor networks and analysed with the proposed fuzzy-based controller. With respect to this, meteorological variables, polluting gases and the oxygen level are measured in real time to estimate (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  17
    Detection of extremist messages in web resources in the Kazakh language.Shynar Mussiraliyeva & Milana Bolatbek - 2023 - Lodz Papers in Pragmatics 19 (2):415-425.
    Currently, the Internet information and communication network has become an integral part of human life. People use social networks such as Twitter, VKontakte, Facebook, etc., to establish global contacts, exchange opinions, gain knowledge, etc. The active participation of not only individual users, but also information organizations in the entire world space makes it necessary to develop measures that correspond to modern trends in the development of information and communication technologies to ensure national security, in particular, the organization of events related (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  39
    The evolved architecture of Hazard management: Risk detection reasoning and the motivational computation of threat magnitudes.John Tooby & Leda Cosmides - 2006 - Behavioral and Brain Sciences 29 (6):631-633.
    The architecture of the hazard management system underlying precautionary behavior makes functional sense, given the adaptive computational problems it evolved to solve. Many seeming infelicities in its outputs, such as behavior with “apparent lack of rational motivation” or disproportionality, are susceptibilities that derive from the sheer computational difficulty posed by the problem of cost-effectively deploying countermeasures to rare, harmful threats. (Published Online February 8 2007).
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  14
    Novel email spam detection method using sentiment analysis and personality recognition.Enaitz Ezpeleta, Iñaki Velez de Mendizabal, José María Gómez Hidalgo & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (1):83-94.
    Unsolicited email campaigns remain as one of the biggest threats affecting millions of users per day. During the past years several techniques to detect unsolicited emails have been developed. This work provides means to validate the hypothesis that the identification of the email messages’ intention can be approached by sentiment analysis and personality recognition techniques. These techniques will provide new features that improve current spam classification techniques. We combine personality recognition and sentiment analysis techniques to analyse email content. We enrich (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  34
    When Is a Face No Longer a Face? A Problematic Dichotomy in Visual Detection Research.Vanessa LoBue - 2016 - Emotion Review 8 (3):250-257.
    Countless studies have reported that individuals detect threatening/angry faces faster than happy/neutral faces. Two classic views have been used to explain this phenomenon—that negative valence drives the effect, or conversely, that low-level perceptual characteristics of the stimuli are responsible for their rapid detection. In the current review, I question whether dichotomous perspectives are the most parsimonious way to explain a large and inconsistent literature. Further, I argue that nondichotomous, multicomponent accounts for the detection of emotionally valenced stimuli might (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  31
    Amygdala activation during masked presentation of emotional faces predicts conscious detection of threat-related faces.Thomas Suslow, Patricia Ohrmann, Jochen Bauer, Astrid V. Rauch, Wolfram Schwindt, Volker Arolt, Walter Heindel & Harald Kugel - 2006 - Brain and Cognition 61 (3):243-248.
  18.  26
    Fighting the Fake: A Forensic Linguistic Analysis to Fake News Detection.Rui Sousa-Silva - 2022 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 35 (6):2409-2433.
    Fake news has been the focus of debate, especially since the election of Donald Trump (2016), and remains a topic of concern in democratic countries worldwide, given (a) their threat to democratic systems and (b) the difficulty in detecting them. Despite the deployment of sophisticated computational systems to identify fake news, as well as the streamlining of fact-checking methods, appropriate fake news detection mechanisms have not yet been found. In fact, technological approaches are likely to be inefficient, given (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  23
    A machine learning approach to detecting fraudulent job types.Marcel Naudé, Kolawole John Adebayo & Rohan Nanda - 2023 - AI and Society 38 (2):1013-1024.
    Job seekers find themselves increasingly duped and misled by fraudulent job advertisements, posing a threat to their privacy, security and well-being. There is a clear need for solutions that can protect innocent job seekers. Existing approaches to detecting fraudulent jobs do not scale well, function like a black-box, and lack interpretability, which is essential to guide applicants’ decision-making. Moreover, commonly used lexical features may be insufficient as the representation does not capture contextual semantics of the underlying document. Hence, this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Synthetic Media Detection, the Wheel, and the Burden of Proof.Keith Raymond Harris - 2024 - Philosophy and Technology 37 (4):1-20.
    Deepfakes and other forms of synthetic media are widely regarded as serious threats to our knowledge of the world. Various technological responses to these threats have been proposed. The reactive approach proposes to use artificial intelligence to identify synthetic media. The proactive approach proposes to use blockchain and related technologies to create immutable records of verified media content. I argue that both approaches, but especially the reactive approach, are vulnerable to a problem analogous to the ancient problem of the criterion—a (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  31
    Of guns and snakes: testing a modern threat superiority effect.Baptiste Subra, Dominique Muller, Lisa Fourgassie, Alan Chauvin & Theodore Alexopoulos - 2018 - Cognition and Emotion 32 (1):81-91.
    Previous studies suggest that ancient threats capture attention because human beings possess an inborn module shaped by evolution and dedicated to their detection. An alternative account proposes that a key feature predicting whether a stimulus will capture attention is its relevance rather than its ontology. Within this framework, the present research deals with the attentional capture by threats commonly encountered in our urban environment. In two experiments, we investigate the attentional capture by modern threats. In Experiment 1, participants responded (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  40
    Conspiracy Theories and Anxiety in Culture: Why is Threat-Related Misinformation an Evolved Product of Our Ability to Mobilize Sources in the Face of Un-represented Threat?Martin Palecek & Václav Hampel - 2024 - Philosophy of the Social Sciences 54 (2):99-132.
    This paper argues that the allure of conspiracy theories lies in their evolutionary origins, specifically in our capacity to communicate unrepresented threats. Drawing on threat-detection psychology and error management theory, it posits that these theories serve as adaptive responses to perceived threats and social coalition-building, rather than as flaws in reasoning.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  12
    Threat priming diminishes the gaze cueing effect.Manman Zhai & Jari K. Hietanen - 2024 - Cognition and Emotion 38 (7):1095-1102.
    Gaze cueing effect (GCE) refers to attention orienting towards the gazed-at location, characterised by faster responses to gazed-at than non-gazed-at stimuli. A previous study investigated the effects of affective priming on GCE and reported that threatening primes enhanced GCE. However, it remains unknown whether the threat or heightened arousal potentiated GCE. We investigated how highly arousing threatening and positive primes, compared to low arousing neutral primes modulate GCE. After a brief exposure to an affective prime (pictures of threat (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  19
    Is threat recognition special? Resistance of threat recognition to perceptual noise.Ewa Magdalena Król - forthcoming - Polish Psychological Bulletin:489-495.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  44
    The smell of death: evidence that putrescine elicits threat management mechanisms.Arnaud Wisman & Ilan Shrira - 2015 - Frontiers in Psychology 6:153623.
    The ability to detect and respond to chemosensory threat cues in the environment plays a vital role in survival across species. However, little is known about which chemical compounds can act as olfactory threat signals in humans. We hypothesized that brief exposure to putrescine, a chemical compound produced by the breakdown of fatty acids in the decaying tissue of dead bodies, can function as a chemosensory warning signal, activating threat management responses (e.g., heightened alertness, fight-or-flight responses). This (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  26
    Memory for dangers past: threat contexts produce more consistent learning than do non-threatening contexts.Akos Szekely, Suparna Rajaram & Aprajita Mohanty - 2019 - Cognition and Emotion 33 (5):1031-1040.
    ABSTRACTIn earlier work we showed that individuals learn the spatial regularities within contexts and use this knowledge to guide detection of threatening targets embedded in these contexts. While it is highly adaptive for humans to use contextual learning to detect threats, it is equally adaptive for individuals to flexibly readjust behaviour when contexts once associated with threatening stimuli begin to be associated with benign stimuli, and vice versa. Here, we presented face targets varying in salience in new or old (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  12
    Improved Perception of Aggression Under (un)Related Threat of Shock.Fábio Silva, Marta I. Garrido & Sandra C. Soares - 2024 - Cognitive Science 48 (5):e13451.
    Anxiety shifts visual attention and perceptual mechanisms, preparing oneself to detect potentially threatening information more rapidly. Despite being demonstrated for threat‐related social stimuli, such as fearful expressions, it remains unexplored if these effects encompass other social cues of danger, such as aggressive gestures/actions. To this end, we recruited a total of 65 participants and asked them to identify, as quickly and accurately as possible, potentially aggressive actions depicted by an agent. By introducing and manipulating the occurrence of electric shocks, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  12
    Bumblebees Express Consistent, but Flexible, Speed-Accuracy Tactics Under Different Levels of Predation Threat.Mu-Yun Wang, Lars Chittka & Thomas C. Ings - 2018 - Frontiers in Psychology 9:368340.
    A speed-accuracy trade-off (SAT) in behavioural decisions is known to occur in a wide range of vertebrate and invertebrate taxa. Accurate decisions often take longer for a given condition, while fast decisions can be inaccurate in some tasks. Speed-accuracy tactics are known to vary consistently among individuals, and show a degree of flexibility during colour discrimination tasks in bees. Such individual flexibility in speed-accuracy tactics is likely to be advantageous for animals exposed to fluctuating environments, such as changes in predation (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  44
    The unexpected killer: effects of stimulus threat and negative affectivity on inattentional blindness.Vanessa Beanland, Choo Hong Tan & Bruce K. Christensen - 2017 - Cognition and Emotion 32 (6):1374-1381.
    ABSTRACTInattentional blindness occurs when observers fail to detect unexpected objects or events. Despite the adaptive importance of detecting unexpected threats, relatively little research has examined how stimulus threat influences IB. The current study was designed to explore the effects of stimulus threat on IB. Past research has also demonstrated that individuals with elevated negative affectivity have an attentional bias towards threat-related stimuli; therefore, the current study also examined whether state and trait levels of negative affectivity predicted IB (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  20
    Think positive! Resolving human motion ambiguity in the presence of disease threat.Ana C. Magalhães, Fábio Silva, Inês Lameirinha, Mariana Rodrigues & Sandra C. Soares - 2024 - Cognition and Emotion 38 (1):71-89.
    Recently, approach-avoidance tendencies and visual perception biases have been increasingly studied using bistable point-light walkers (PLWs). Prior studies have found a facing-the-viewer bias when one is primed with general threat stimuli (e.g. angry faces), explained by the “error management theory”, as failing to detect a threat as approaching is riskier than the opposite. Importantly, no study has explored how disease threat – linked to the behavioural immune system – might affect this bias. This study aimed to explore (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  17
    Sex Differences in Anxiety: An Investigation of the Moderating Role of Sex in Performance Monitoring and Attentional Bias to Threat in High Trait Anxious Individuals.Natalie Strand, Lin Fang & Joshua M. Carlson - 2021 - Frontiers in Human Neuroscience 15.
    Anxiety disorders are more predominant in women than men, however there is a lack of understanding as to what neurocognitive mechanisms drive this sex difference. Recent investigation has found a potential moderating role of sex in the relationship between anxiety and the error related negativity —a component of error-monitoring that is prevalent in high anxiety individuals—such that females display a positive relationship between anxiety/worry and ERN amplitude. We strove to further explore the influence of sex on the relationship between trait (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  64
    Ethical models underpinning responses to threats to public health: A comparison of approaches to communicable disease control in europe.Sabina Gainotti, Nicola Moran, Carlo Petrini & Darren Shickle - 2008 - Bioethics 22 (9):466-476.
    Increases in international travel and migratory flows have enabled infectious diseases to emerge and spread more rapidly than ever before. Hence, it is increasingly easy for local infectious diseases to become global infectious diseases (GIDs). National governments must be able to react quickly and effectively to GIDs, whether naturally occurring or intentionally instigated by bioterrorism. According to the World Health Organisation, global partnerships are necessary to gather the most up-to-date information and to mobilize resources to tackle GIDs when necessary. Communicable (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  77
    Yan Hui's death as a threat to confucius' expression of virtue: A further look at the master's grief.Joshua Seachris - 2008 - Asian Philosophy 18 (2):105 – 122.
    A striking feature of Confucius' grief at the death of his beloved disciple Yan Hui is its profound intensity, an intensity detectable nowhere else in the <span>Analects</span>. Like his disciples, the reader of the <span>Analects</span> may be puzzled by the depth of Confucius' grief in this instance. In distinct accounts, Philip Ivanhoe and Amy Olberding bring some measure of intelligibility to the Master's grief. While partially plausible, I think their offerings on the matter fall short of being fully satisfying. Specifically, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  34. Measuring Counterintuitiveness in Supernatural Agent Dream Imagery.Andreas Nordin & Pär Bjälkebring - 2019 - Frontiers in Psychology 10:465201.
    The present article tests counterintuitiveness theory and methodology in relation to religious dream imagery using data on religious dream content. The endeavor adopts a “fractionated” or “piecemeal” approach where supernatural agent (SA) cognition is held to be a pivotal building block of purportedly religious dreaming. Such supernaturalistic conceptualizations manifests in a cognitive environment of dream simulation processes, threat detection and violation of basic conceptual categorization characterized by counterintuitiveness. By addressing SA cognitions as constituents of allegedly religious dream imagery, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  31
    Deriving Features of Religions in the Wild.Pascal Boyer - 2021 - Human Nature 32 (3):557-581.
    Religions “in the wild” are the varied set of religious activities that occurred before the emergence of organized religions with doctrines, or that persist at the margins of those organized traditions. These religious activities mostly focus on misfortune; on how to remedy specific cases of illness, accidents, failures; and on how to prevent them. I present a general model to account for the cross-cultural recurrence of these particular themes. The model is based on features of human psychology—namely, epistemic vigilance, the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  36.  19
    Case Study of Recognition Patterns in Haunted People Syndrome.James Houran & Brian Laythe - 2022 - Frontiers in Psychology 13.
    Haunted People Syndrome denotes individuals who recurrently report various “supernatural” encounters in everyday settings ostensibly due to heightened somatic-sensory sensitivities to dis-ease states, which are contextualized by paranormal beliefs and reinforced by perceptual contagion effects. This view helps to explain why these anomalous experiences often appear to be idioms of stress or trauma. We tested the validity and practical utility of the HP-S concept in an empirical study of an active and reportedly intense ghostly episode that was a clinical referral. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  3
    Revisiting “The Malicious Serpent”: Phylogenetically Threatening Stimulus Marked in the Human Brain.Luiz Biondi, Nuno Gomes, Rafael S. Maior & Sandra C. Soares - forthcoming - Emotion Review.
    Twenty years ago, Öhman and Mineka's publication “The Malicious Serpent” emphasized the selective pressure ancestral reptiles would have on early mammals’ visual system, specifically the development of a set of subcortical structures that would provide snake-like images privileged access to the amygdala. This process would occur automatically and allows for quick defensive reactions. Based on criticisms directed to the snake detection research, we created five questions that guided the discussion in this review. Evidence suggests the existence of a set (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  31
    The seahorse, the almond, and the night-mare: Elaborative encoding during sleep-paralysis hallucinations?Todd A. Girard - 2013 - Behavioral and Brain Sciences 36 (6):618-619.
    Llewellyn's proposal that rapid eye movement dreaming reflects elaborative encoding mediated by the hippocampus offers an interesting perspective for understanding hallucinations accompanying sleep paralysis. SP arises from anomalous intrusion of REM processes into waking consciousness, including threat-detection systems mediated by the amygdala. Unique aspects of SP hallucinations offer additional prospects for investigation of Llewellyn's theory of elaborative encoding.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  15
    Shoot or Don’t Shoot? Tactical Gaze Control and Visual Attention Training Improves Police Cadets’ Decision-Making Performance in Live-Fire Scenarios.Benedikt Heusler & Christine Sutter - 2022 - Frontiers in Psychology 13.
    Police officers often encounter potentially dangerous situations in which they strongly rely on their ability to identify threats quickly and react accordingly. Previous studies have shown that practical experience and targeted training significantly improve threat detection time and decision-making performance in law enforcement situations. We applied 90-min traditional firearms training as a control condition and a specifically developed intervention training to police cadets. The intervention training contained theoretical and practical training on tactical gaze control, situational awareness, and visual (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  32
    Enhanced processing of threatening stimuli: The case of face recognition.Linda Mealey - 1995 - Behavioral and Brain Sciences 18 (2):304-305.
    Because of their evolutionary importance, threat-detection mechanisms are likely to exist at a variety of levels. A recent study of face recognition suggests that novel stimuli receive enhanced processing when presented as fear-related. This suggests the existence of a complex, context-dependent threat-detection mechanism that can adaptively respond to spatiotemporally varying and unique environmental features.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  34
    Individual Choose-to-Transmit Decisions Reveal Little Preference for Transmitting Negative or High-Arousal Content.Florian van Leeuwen, Nora Parren, Helena Miton & Pascal Boyer - 2018 - Journal of Cognition and Culture 18 (1-2):124-153.
    Research on social transmission suggests that people preferentially transmit information about threats and social interactions. Such biases might be driven by the arousal that is experienced as part of the emotional response triggered by information about threats or social relationships. The current studies tested whether preferences for transmitting threat-relevant information are consistent with a functional motive to recruit social support. USA residents were recruited for six online studies. Studies 1a and 1B showed that participants more often chose to transmit (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  42.  35
    Ethical Decision-Making in Zoonotic Disease Control.Joost van Herten, Suzanne Buikstra, Bernice Bovenkerk & Elsbeth Stassen - 2020 - Journal of Agricultural and Environmental Ethics 33 (2):239-259.
    To tackle zoonotic disease threats, a One Health approach is currently commonplace and generally understood as an integrated effort of multiple disciplines to promote the health of humans, animals and the environment. To implement One Health strategies in zoonotic disease control, many countries set up early warning systems, in which human and veterinary health professionals cooperate. These systems, like the Dutch Zoonoses Structure, can be successful to detect emerging disease threats. However, these systems are not well equipped to handle moral (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  43
    Self-protection as an adaptive female strategy.Joyce F. Benenson, Christine E. Webb & Richard W. Wrangham - 2022 - Behavioral and Brain Sciences 45:e128.
    Many male traits are well explained by sexual selection theory as adaptations to mating competition and mate choice, whereas no unifying theory explains traits expressed more in females. Anne Campbell's “staying alive” theory proposed that human females produce stronger self-protective reactions than males to aggressive threats because self-protection tends to have higher fitness value for females than males. We examined whether Campbell's theory has more general applicability by considering whether human females respond with greater self-protectiveness than males to other threats (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  44.  45
    Change in gaze-based attention bias in adolescents with Social Anxiety Disorder.Susan W. White, Andrea Trubanova Wieckowski, Thomas H. Ollendick & Nicole Capriola-Hall - 2019 - Cognition and Emotion 33 (8):1736-1744.
    ABSTRACTAlthough attention bias toward threat has been associated with Social Anxiety Disorder, concerns regarding the ability of current measures to detect change in AB following treatm...
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  45.  16
    Working Memory Performance for Differentially Conditioned Stimuli.Richard T. Ward, Salahadin Lotfi, Daniel M. Stout, Sofia Mattson, Han-Joo Lee & Christine L. Larson - 2022 - Frontiers in Psychology 12.
    Previous work suggests that threat-related stimuli are stored to a greater degree in working memory compared to neutral stimuli. However, most of this research has focused on stimuli with physically salient threat attributes, failing to account for how a “neutral” stimulus that has acquired threat-related associations through differential aversive conditioning influences working memory. The current study examined how differentially conditioned safe and threat stimuli are stored in working memory relative to a novel, non-associated stimuli. Participants completed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  38
    An Italian Campaign to Promote Anti-doping Culture in High-School Students.Roberto Codella, Bill Glad, Livio Luzi & Antonio La Torre - 2019 - Frontiers in Psychology 10.
    Doping poses a threat to sport worldwide. Studies have revealed that, in addition to elite athletes, amateur and recreational sportsmen and sportswomen are making increasing use of performance-enhancing drugs. Worryingly this trend has been documented among young people. Anti-doping efforts seeking to deter elite athletes from doping through detection of the use of prohibited substances are costly and have not been completely effective either at the top-level or the amateur/recreational level. A thoughtful education program, inspired by honesty and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  25
    The circle of Willis revisited: Forebrain dehydration sensing facilitated by the anterior communicating artery.Matija Fenrich, Karlo Habjanovic, Josip Kajan & Marija Heffer - 2021 - Bioessays 43 (2):2000115.
    We hypothesize that threat of dehydration provided selection pressure for the evolutionary emergence and persistence of the anterior communicating artery (ACoA – the inter‐arterial connection that completes the Circle of Willis) in early amniotes.The ACoA is a hemodynamically insignificant artery, but, as we argue in this paper, its privileged position outside the blood‐brain barrier gives it a crucial sensing function for the osmolarity of the blood against the background of the rest of the brain, which efficiently protects itself from (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  24
    The comfort of approach: self-soothing effects of behavioral approach in response to meaning violations.Willem Sleegers & Travis Proulx - 2014 - Frontiers in Psychology 5:98445.
    People maintain systems of beliefs that provide them with a sense of belongingness, control, identity, and meaning, more generally. Recent research shows that when these beliefs are threatened a syndrome of negatively valenced arousal is evoked that motivates people to seek comfort in their ideologies or other personally valued beliefs. In this paper we will provide an overview of this process and discuss areas for future research. Beginning with the neural foundations of meaning violations, we review findings that show the (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  49. Active monitoring of airborne elements in Isparta Province (Turkey) with the epiphytic lichen Physcia aipolia (Erh. ex Humb.) Fürnr.Mustafa Yavuz & Gülşah Çobanoğlu - 2019 - Journal of Elementology 3 (24):1115-1128.
    Air pollutants pose a threat to biodiversity throughout the world. This study was conducted to evaluate atmospheric element accumulation in Isparta city, including Gölcük Nature Park, located in the Western Mediterranean Region of Turkey. It is aimed to determine the air quality and potential pollutant sources in the region through lichen biomonitoring. Specimens of the epiphytic foliose lichen Physcia aipolia (Erh. ex Humb.) Fürnr. were sampled from 14 sites in the study area and analyzed by ICP-MS with reference material (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  52
    Visual search for emotional faces in children.Allison M. Waters & Ottmar V. Lipp - 2008 - Cognition and Emotion 22 (7):1306-1326.
    The ability to rapidly detect facial expressions of anger and threat over other salient expressions has adaptive value across the lifespan. Although studies have demonstrated this threat superiority effect in adults, surprisingly little research has examined the development of this process over the childhood period. In this study, we examined the efficiency of children's facial processing in visual search tasks. In Experiment 1, children (N=49) aged 8 to 11 years were faster and more accurate in detecting angry target (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 971