
Contents
-
-
-
-
-
-
-
-
-
-
-
-
1. Level of Analysis: Groups and Individuals 1. Level of Analysis: Groups and Individuals
-
2. Theoretical Explanations 2. Theoretical Explanations
-
3. Overview 3. Overview
-
4. Maintaining or Enhancing Group-Based Hierarchies 4. Maintaining or Enhancing Group-Based Hierarchies
-
4.1. Maintenance of Group-Based Hierarchies 4.1. Maintenance of Group-Based Hierarchies
-
4.2. Enhancement of Group-Based Hierarchies 4.2. Enhancement of Group-Based Hierarchies
-
-
5. Mitigating or Rearranging Group-Based Hierarchies 5. Mitigating or Rearranging Group-Based Hierarchies
-
5.1. Hierarchy Mitigation Enacted by Marginalized Groups 5.1. Hierarchy Mitigation Enacted by Marginalized Groups
-
5.2. Hierarchy Mitigation Enacted by Dominant Groups 5.2. Hierarchy Mitigation Enacted by Dominant Groups
-
5.3. When Do People Seek to Rearrange Group-Based Hierarchies? 5.3. When Do People Seek to Rearrange Group-Based Hierarchies?
-
-
6. Responses to Maintenance or Change of Group-Based Hierarchy 6. Responses to Maintenance or Change of Group-Based Hierarchy
-
6.1. Reactions to Hierarchy Maintenance 6.1. Reactions to Hierarchy Maintenance
-
6.2. Reactions to Hierarchy Enhancement 6.2. Reactions to Hierarchy Enhancement
-
6.3. Reactions to Hierarchy Mitigation 6.3. Reactions to Hierarchy Mitigation
-
6.4. Reactions to Hierarchy Rearrangement 6.4. Reactions to Hierarchy Rearrangement
-
-
7. Opportunities for Future Research 7. Opportunities for Future Research
-
7.1. Understudied Interactions with Group-Based Hierarchy 7.1. Understudied Interactions with Group-Based Hierarchy
-
7.2. Unpacking “Threat” 7.2. Unpacking “Threat”
-
7.3. Complex Hierarchies: Multiple Groups and Individuals 7.3. Complex Hierarchies: Multiple Groups and Individuals
-
-
8. Conclusion 8. Conclusion
-
References References
-
-
-
-
-
-
-
-
-
-
-
23 Group-Based Hierarchies of Power and Status
Get accessMaureen A. Craig, New York University
L. Taylor Phillips, New York University
-
Published:18 September 2023
Cite
Abstract
Group-based identities (e.g., gender, ethnicity, religion) shape people’s life experiences and outcomes, often forming the basis for group-based inequality and social hierarchy. This chapter provides an overview of social scientific (primarily psychological) research investigating people’s experiences of and responses to group-based hierarchy and how individuals’ identities impact these outcomes. We outline when and why people seek to influence group-based hierarchy: seeking to maintain or enhance an existing hierarchy, by protecting or improving the relative position of dominant groups, respectively. Or, people may seek to mitigate or rearrange group-based hierarchy, changing groups’ relative positions to improve the position of marginalized groups and either flattening the distance between groups or maintaining the amount of hierarchy, respectively. We discuss research on how people react if a hierarchy is perceived to be under these different states (e.g., maintained, enhanced, mitigated, rearranged) and end with open questions and opportunities for future work.
Sign in
Personal account
- Sign in with email/username & password
- Get email alerts
- Save searches
- Purchase content
- Activate your purchase/trial code
- Add your ORCID iD
Purchase
Our books are available by subscription or purchase to libraries and institutions.
Purchasing informationMonth: | Total Views: |
---|---|
September 2023 | 6 |
October 2023 | 39 |
November 2023 | 26 |
December 2023 | 41 |
January 2024 | 33 |
February 2024 | 38 |
March 2024 | 33 |
April 2024 | 30 |
May 2024 | 37 |
June 2024 | 14 |
July 2024 | 22 |
August 2024 | 15 |
September 2024 | 27 |
October 2024 | 45 |
November 2024 | 44 |
December 2024 | 34 |
January 2025 | 32 |
February 2025 | 29 |
March 2025 | 53 |
April 2025 | 43 |
May 2025 | 12 |
Get help with access
Institutional access
Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:
IP based access
Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.
Sign in through your institution
Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.
If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.
Sign in with a library card
Enter your library card number to sign in. If you cannot sign in, please contact your librarian.
Society Members
Society member access to a journal is achieved in one of the following ways:
Sign in through society site
Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:
If you do not have a society account or have forgotten your username or password, please contact your society.
Sign in using a personal account
Some societies use Oxford Academic personal accounts to provide access to their members. See below.
Personal account
A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.
Some societies use Oxford Academic personal accounts to provide access to their members.
Viewing your signed in accounts
Click the account icon in the top right to:
Signed in but can't access content
Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.
Institutional account management
For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.