Threat Perceptions Scale

2005 ◽  
Author(s):  
Maria Kraimer ◽  
Sandy J. Wayne ◽  
Robert C. Liden ◽  
Raymond T. Sparrowe
Keyword(s):  
2013 ◽  
Vol 44 (6) ◽  
pp. 361-372 ◽  
Author(s):  
Natascha de Hoog

The underlying process of reactions to social identity threat was examined from a defense motivation perspective. Two studies measured respondents’ social identification, after which they read threatening group information. Study 1 compared positive and negative group information, attributed to an ingroup or outgroup source. Study 2 compared negative and neutral group information to general negative information. It was expected that negative group information would induce defense motivation, which reveals itself in biased information processing and in turn affects the evaluation of the information. High identifiers should pay more attention to, have higher threat perceptions of, more defensive thoughts of, and more negative evaluations of negative group information than positive or neutral group information. Findings generally supported these predictions.


2006 ◽  
Author(s):  
Jenessa R. Shapiro ◽  
Joshua M. Ackerman ◽  
Steven L. Neuberg ◽  
Douglas T. Kenrick

2020 ◽  
Author(s):  
Michael Bollwerk ◽  
Bernd Schlipphak ◽  
Joscha Stecker ◽  
Jens Hellmann ◽  
Gerald Echterhoff ◽  
...  

Threat perceptions towards immigrants continue to gain importance in the context of growing international migration. To reduce associated intergroup conflicts, it is crucial to understand the personal and contextual determinants of perceived threat. In a large online survey study (N = 1,184), we investigated the effects of ideology (i.e., Right-Wing Authoritarianism and Social Dominance Orientation), subjective societal status (SSS) and their interaction effects in predicting symbolic and realistic threat perceptions towards Middle Eastern immigrants. Results showed that ideology (higher RWA and SDO) and lower SSS significantly predicted both symbolic and realistic threat, even after controlling for income, education, age, and gender. Furthermore, ideology and SSS interacted significantly in predicting realistic threat, with higher levels of SDO and RWA enhancing the effect of SSS. In the discussion, we focus on the implications of our findings with respect to understanding societal conflicts, discuss methodological limitations, and provide directions for future research.


Author(s):  
Myriam Dunn Cavelty

Due to heightened threat perceptions, states are currently expanding their coercive power in cyberspace. They attempt to reduce the risk of escalation in (cybered-)conflict through traditional norms building. At the same time, their strategic actions remain the biggest threat to stability. Cyber-exploitations are a major part of the problem, hindering the removal of known insecurities, thus reducing the effectiveness of any future order. At the same time, the forceful role that states aspire to play in cyber-security has led to questions of legitimacy. The security arrangements that emerged in the 1990s, focused on protection and risk management, had a high degree of legitimacy because they built on a pragmatic solution of distributed security provision. Unless a future order in cyberspace takes into account the interests of companies and consumers who shape this domain in peacetime, it will be met with considerable resistance, with high costs for all sides.


Author(s):  
David Brewster

This chapter examines Indian and Chinese perspectives of each other as major powers and their respective roles in the Indian Ocean. It focuses on the following elements: (a) China’s strategic imperatives in the Indian Ocean Region, (b) India’s views on its special role in the Indian Ocean and the legitimacy of the presence of other powers, (c) China’s strategic vulnerabilities in the Indian Ocean and India’s wish to leverage those vulnerabilities, (d) the asymmetry in Indian and Chinese threat perceptions, and (d) Chinese perspectives of the status of India in the international system and India’s claims to a special role in the Indian Ocean. The chapter concludes that even if China were to take a more transparent approach to its activities, significant differences in perceptions of threat and over status and legitimacy will produce a highly competitive dynamic between them in the maritime domain.


2021 ◽  
pp. 1-17
Author(s):  
Yerina S. Ranjit ◽  
Haejung Shin ◽  
Jennifer M. First ◽  
J. Brian Houston

2017 ◽  
Vol 70 (10) ◽  
pp. 1258-1290 ◽  
Author(s):  
Martin R Edwards ◽  
Jukka Lipponen ◽  
Tony Edwards ◽  
Marko Hakonen

Despite existing research examining snapshots of employee reactions to organizational mergers and acquisitions (M&A), there is a complete absence of work theorizing or exploring rates of change in employees’ organizational identification with the merged entity. We address this gap using two three-wave longitudinal panel samples from different M&A settings, tracking change in identification through a two-year period. Theorizing trajectories of change in identification across the organizations in both settings, we make predictions linked to expected antecedents of change in identification. Our research context (M&A-1) involves a merger of three Finish universities tracking 938 employees from each organization in three waves (nine months pre-merger to 24 months post-merger). Our second context (M&A-2) involves a multinational acquisition tracking 346 employees from both the acquired and acquiring organization in three waves (from two to 26 months post-acquisition). Using Latent Growth Modelling, we confirm predicted trajectories of change in identification. Across both samples, a linear increase (across Time 1, Time 2 and Time 3) in justice and linear decrease in threat perceptions were found to significantly predict a linear increase in identification across the post-M&A period. We discuss organizational identification development trajectories and how changes in these two antecedents account for changes in identification across M&A contexts.


Sign in / Sign up

Export Citation Format

Share Document