Muted neural response to distress among securely attached people
نویسندگان
چکیده
منابع مشابه
Muted neural response to distress among securely attached people.
Neural processes that support individual differences in attachment security and affect regulation are currently unclear. Using electroencephalography, we examined whether securely attached individuals, compared with insecure individuals, would show a muted neural response to experimentally manipulated distress. Participants completed a reaction time task that elicits error commission and the er...
متن کاملNeural Response to Distress Among Securely Attached 1 Running Head: NEURAL RESPONSE TO DISTRESS AMONG SECURELY ATTACHED Muted Neural Response to Distress Among Securely Attached People
Neural processes that support individual differences in attachment security and affect regulation are currently unclear (Coan, 2010). Using EEG, we examined whether securely attached individuals, compared to insecure individuals, would show a muted neural response to experimentally manipulated distress. Participants completed a reaction time task that elicits error commission and the error-rela...
متن کاملBiobehavioral organization in securely and insecurely attached infants.
Attachment research has shown the emergence of individual differences in the security of infant-mother attachment during the first year of life as well as their importance for later social-emotional development. A biobehavioral perspective may help settle disagreements about the validity and interpretation of 12-month-old infants' different behavioral patterns of attachment assessed by Ainswort...
متن کاملPsychological Distress Among Infertile Women: Exploring Biopsychosocial Response To Infertility
Previous studies have shown that the experience of infertility is linked with psychological responses such as depression, anxiety, guilt, social isolation, and decreased self-esteem in both men and women. The prevalence of depression among infertile women ranges from 8% to 54%. Treating gynecologists and healthcare professionals seldom recognized the psychosocial distress in women undergoing fe...
متن کاملHow to Securely Replicate
We present a method for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. We also address the Issue of maintaining a causal order among client requests. We illustrate a security breach resulting from an intruder’s ability to effect a violation of causahty in th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Social Cognitive and Affective Neuroscience
سال: 2013
ISSN: 1749-5024,1749-5016
DOI: 10.1093/scan/nst099