There has been a striking recent shift in how political discourse seems to work, with, for example, partial information of sometimes dubious accuracy or relevance propagating very rapidly and widely on electronic networks and overriding clearer, more complete, more accurate information. In explanation of such phenomena, we address ways in which highly interconnected electronic networks may create vulnerabilities that involve tapping into special, relatively hard-wired motivational systems in the brain, particularly the security motivation system. We also discuss a mode of communication, sometimes described as “mass hypnosis,” in relation to a motivational system that manages the dominance hierarchy. Rather than just affecting people’s higher cognitions, political messages also tap into these motivation systems, generating surprising avenues for misuse.
CollinsonS.Obama suffers the slings and arrows of a restive worldCNN Politics2016September62016Available online at http://www.cnn.com/2016/09/05/politics/obama-putin-duterte-xi-erdogan-g20-reception/index.html
HindsA.L.WoodyE.Z.Van AmeringenM.SchmidtL.A.SzechtmanH.In the wake of a possible mistake: Security motivation, checking behavior, and ocdJournal of Behavior Therapy and Experimental Psychiatry201549133140
HustedN.W.Analysis techniques for exploring emergent vulnerabilities and attacks on mobile devices2013PhD thesis Indiana University, Bloomington, IN. Available online at http://www.cs.indiana.edu/~nhusted/docs/proposal.pdf
SzechtmanH.ShivjiSWoodyE.Z.KostrzewaR.M.Pathophysiology of obsessive-compulsive disorder: Insights from normal function and neurotoxic effects of drugs, infection, and brain injuryHandbook of Neurotoxicity2014New York, NYSpringer22312253
WiseS.RapoportJ.L.RapoportJ.L.Obsessive compulsive disorder – Is it a basal ganglia dysfunction?Obsessive compulsive disorder in children and adolescence1989Washington, DCAmerican Psychiatric Press327344