A biological security motivation system for potential threats: are there implications for policy-making?
نویسندگان
چکیده
Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviors to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviors serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.
منابع مشابه
Millets for Food and Nutrition Security in India: Determinants and Policy Implications
Background: Food security has been a target in India since its independence; the primary aim of food security is to ensure enough staple food for the entire population. Although substantial progress was made through the adoption of green revolution (GR) technologies and implementation of the food public distribution system (PDS), desirable food and nutrition security, as defined by the food and...
متن کاملThe Study of Critical Realism Implications in Evaluation of Science, Technology and Innovation Policy Making
Objective: The purpose of this study is to identify and extract the implications of critical realism for science, technology and innovation policy-making as one of the later research traditions in social sciences. Nevertheless, its main focus, according to the different stages of the policy-making cycle and extent of its contributing factors, is on the stage of "policy evaluation". Methods: Thi...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملReducing the U.S dependency on oil and gas imports, implications for its policies in the international system
This paper aims to firstly explain the significance of the U.S oil independency and its consequences on the U.S foreign strategy in international politics. Secondly, the implications of this energy policy on the U.S foreign policy in the international system context is examined. The hypothesis to address these inquiries is postulated using neo-realism theory. Accordingly, following oil independ...
متن کاملPrioritizing the equipment for making smart buildings with passive defense approach
Background and Aim: Since buildings are constantly exposed to threats, it is necessary that they be fully prepared to confront with all threats and their damages. Therefore, using the passive defense basics and principles in designing and constructing the buildings are considered obvious and undeniable. To prevent or reduce disasters caused by flood, earthquake, and war and so on, solutions suc...
متن کامل