
Contents
-
-
-
-
-
-
-
-
-
Introduction Introduction
-
Theoretical Approach: How Can We Know the Function of an Emotion? Theoretical Approach: How Can We Know the Function of an Emotion?
-
Engineering a Solution to the Existence of Toxic Individuals Engineering a Solution to the Existence of Toxic Individuals
-
Identifying Toxic Individuals Identifying Toxic Individuals
-
Minimize the Fitness Consequences Coming from the Toxic Individual Minimize the Fitness Consequences Coming from the Toxic Individual
-
-
The Neutralization Theory of Hatred The Neutralization Theory of Hatred
-
Triggers of Hatred Triggers of Hatred
-
Computational Structure of Hatred Computational Structure of Hatred
-
Behavioral Strategies of Hatred Behavioral Strategies of Hatred
-
Predatory Aggression Predatory Aggression
-
Information Warfare Information Warfare
-
Attentional Direction and Information Gathering Attentional Direction and Information Gathering
-
Avoidance Avoidance
-
Terminating Conditions for Hatred Terminating Conditions for Hatred
-
A Misperception of Association Value Is Corrected A Misperception of Association Value Is Corrected
-
The Target Recalibrates Their WTR and This Results in a Positive Association Value The Target Recalibrates Their WTR and This Results in a Positive Association Value
-
Shifting Alliance Structures Turn a Hated Enemy into an Ally Shifting Alliance Structures Turn a Hated Enemy into an Ally
-
New Avenues of Cooperation Turn an Enemy into a Potential Cooperator New Avenues of Cooperation Turn an Enemy into a Potential Cooperator
-
The Costs of Hatred Outweigh the Benefits The Costs of Hatred Outweigh the Benefits
-
-
-
Conclusion Conclusion
-
Notes Notes
-
References References
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
8 The Neutralization Theory of Hatred
Get accessAaron Sell, Departments of Criminology and Psychology, Heidelberg University
Coltan Scrivner, Department of Comparative Human Development and Institute for Mind and Biology, The University of Chicago
Mitchell Landers, Department of Psychology, The University of Chicago
Anthony C. Lopez, School of Politics, Philosophy and Public Affairs, Washington State University
-
Published:22 May 2024
Cite
Abstract
This chapter argues that, while often conceptualized as an extreme form of anger, hatred is a distinct emotion, with unique triggers, conceptual orientations, and terminating conditions. This is because hatred evolved to address its own distinct adaptive problem: the existence of individuals who were—on balance—costly to the hater. Because a well-designed system for solving this problem would have been tailored toward neutralizing those costs, the authors call this hypothesis “the neutralization theory of hatred.” This theory claims that hatred is triggered by cues that an individual’s existence causes fitness decrements for the hater. Cognitively, hatred orients the mind to view costs heaped onto the hated person as benefits to the hater—thus motivating spiteful behavior—and can be characterized as maintaining a negative intrinsic welfare trade-off parameter toward the hated person. Behaviorally, hatred can motivate either avoidance or a predatory cost-infliction strategy that is designed to weaken, incapacitate, or terminate the target.
Sign in
Personal account
- Sign in with email/username & password
- Get email alerts
- Save searches
- Purchase content
- Activate your purchase/trial code
- Add your ORCID iD
Purchase
Our books are available by subscription or purchase to libraries and institutions.
Purchasing informationMonth: | Total Views: |
---|---|
May 2024 | 23 |
June 2024 | 4 |
July 2024 | 1 |
August 2024 | 7 |
September 2024 | 5 |
October 2024 | 6 |
November 2024 | 2 |
January 2025 | 5 |
February 2025 | 2 |
March 2025 | 2 |
April 2025 | 2 |
Get help with access
Institutional access
Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:
IP based access
Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.
Sign in through your institution
Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.
If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.
Sign in with a library card
Enter your library card number to sign in. If you cannot sign in, please contact your librarian.
Society Members
Society member access to a journal is achieved in one of the following ways:
Sign in through society site
Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:
If you do not have a society account or have forgotten your username or password, please contact your society.
Sign in using a personal account
Some societies use Oxford Academic personal accounts to provide access to their members. See below.
Personal account
A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.
Some societies use Oxford Academic personal accounts to provide access to their members.
Viewing your signed in accounts
Click the account icon in the top right to:
Signed in but can't access content
Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.
Institutional account management
For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.