You are on page 1of 16

Journal of Personality and Social Psychology © 2011 American Psychological Association

2011, Vol. 101, No. 1, 78 –93 0022-3514/11/$12.00 DOI: 10.1037/a0022503

Attachment Insecurities and the Processing of Threat-Related Information:


Studying the Schemas Involved in Insecure People’s Coping Strategies

Tsachi Ein-Dor and Mario Mikulincer Phillip R. Shaver


Interdisciplinary Center, Herzliya, Israel University of California, Davis

In 6 studies we examined procedural, scriptlike knowledge associated with 2 different kinds of attach-
ment insecurity: anxiety and avoidance. The studies examined associations between attachment insecu-
rities, the cognitive accessibility of sentinel and rapid fight–flight schemas, and the extent to which these
schemas guide the processing of threat-related information and actual behavior during an experimentally
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

induced threatening event. Anxious attachment was associated with (a) greater accessibility of the
This document is copyrighted by the American Psychological Association or one of its allied publishers.

sentinel schema in narratives of threatening events; (b) faster, deeper, and more schema-biased process-
ing of information about components of the sentinel schema; and (c) quicker detection of a threat.
Avoidant attachment was associated with greater accessibility of the rapid fight–flight schema in
narratives of threatening events and faster, deeper, and more schema-biased processing of information
about components of the schema. We discuss implications of the findings for understanding the cognitive
aspects of insecure people’s coping strategies in threatening situations, as well as the potential benefits
of these strategies to the people who enact them and to the groups to which they belong.

Keywords: attachment, social defense theory, anxiety, avoidance, inclusive fitness

Each individual builds working models of the world and of himself in insecure working models, the mental representations formed dur-
it, with the aid of which he perceives events, forecasts the future, and ing interactions with unavailable and unresponsive attachment
constructs his plans. (Bowlby, 1973, p. 203) figures who generally fail to provide protection, support, and
security. We conceptualize these working models as schemas that
According to Bowlby’s (1973, 1980, 1982) attachment theory,
influence the ways in which insecure people cope with threats and
human beings and many nonhuman primates are born with an
dangers in adulthood.
innate psychobiological system (the attachment behavioral sys-
tem) that motivates them to seek proximity to significant others
(attachment figures) in times of need as a way of protecting Attachment Theory and Research
themselves from threats and dangers. Bowlby (1973) also argued
According to Bowlby (1982), the attachment behavioral system
that the residues of experiences with attachment figures during
emerged as an adaptation over the course of mammalian evolution
times of need are stored as mental representations, which he called
because it increased the likelihood of survival during infancy, a
internal working models, and that these representations shape
crucial period for protection and support given that humans are
expectations about others’ availability and responsiveness and
born with immature capacities for locomotion, feeding, and de-
organize action tendencies for coping with threats and danger.
fense. Because infants require a long period of care and protection,
Researchers have conceptualized and assessed the secure-base
they are born with a repertoire of behaviors that maintain proxim-
schema that gets constructed over the course of development on
ity to others who help them cope with threats and regulate distress.
the basis of interactions with security-providing attachment fig-
Although the attachment system is crucial during the early years of
ures, who reliably provide protection, support, and comfort (see
life, Bowlby (1988) assumed that it is active over the entire life
e.g., Mikulincer & Shaver, 2007b; Mikulincer, Shaver, Sapir-
span and is manifested in adults’ tendencies to seek proximity and
Lavid, & Avihou-Kanza, 2009; Waters & Waters, 2006). In the
support when threatened or distressed (Hazan & Zeifman, 1999).
studies reported here, we extend this research by focusing on
Many studies have shown that the system is indeed active during
adulthood and affects many aspects of psychological and social
functioning (see relevant chapters in Cassidy & Shaver, 2008, and
This article was published Online First February 28, 2011. the integrative book by Mikulincer & Shaver, 2007a). For instance,
Tsachi Ein-Dor and Mario Mikulincer, Interdisciplinary Center, Her- research has indicated that actual or symbolic threats cause adults
zliya, Israel; Phillip R. Shaver, Department of Psychology, University of to seek physical proximity to close others or to activate mental
California, Davis. representations of attachment figures and that activating security-
Tsachi Ein-Dor is also at the Department of Psychology, Bar-Ilan
related mental representations has a soothing, calming effect (see
University, Ramat Gan, Israel.
We would like to thank Maya Welsh, Moshe Gross, Adi Ben-Ami, and
e.g., Fraley & Shaver, 1998; Mikulincer, Birnbaum, Woddis, &
Tal Orgad for their help in running the reported studies. Nachmias, 2000; Mikulincer, Gillath, & Shaver, 2002; Mikulincer,
Correspondence concerning this article should be addressed to Tsachi Hirschberger, Nachmias, & Gillath, 2001).
Ein-Dor, The New School of Psychology, Interdisciplinary Center, P.O. Bowlby (1973) also proposed that an individual’s attachment
Box 167, Herzliya 46150, Israel. E-mail: teindor@idc.ac.il behavioral system is gradually shaped by experiences with attach-

78
ATTACHMENT INSECURITIES AND THREAT PROCESSING 79

ment figures and the memories of these experiences in the form of (1998) called a secure-base script. This script is thought to include
working models of self and others. These models eventually result something like the following if–then propositions: “If I encounter
in a fairly stable attachment “style” or orientation—a person’s an obstacle and/or become distressed, then I can approach a
characteristic pattern of relational expectations, emotions, and significant other for help, he or she is likely to be available and
behaviors (Fraley & Shaver, 2000). supportive, I will experience relief and comfort as a result of
Research— beginning with Ainsworth, Blehar, Waters, and proximity to this person, and I can then return to other activities.”
Wall (1978) and continuing through longitudinal studies of chil- Activation of this script can, by itself, mitigate distress, promote
dren and adolescents and social psychological studies of adults optimism and hope, and help generally secure people cope well
(reviewed by Mikulincer & Shaver, 2003, 2007a)— has indicated with stress (Mikulincer & Shaver, 2007b; Mikulincer et al., 2009;
that people’s attachment orientations can be measured along two Waters & Waters, 2006).
roughly orthogonal dimensions: attachment-related anxiety and Adult attachment researchers have also found that anxious peo-
avoidance (Brennan, Clark, & Shaver, 1998). A person’s position ple’s tendency to hyperactivate the attachment system is reflected
on the attachment anxiety dimension indicates the degree to which in the ways in which they appraise threats and cope with stress and
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

he or she worries that a partner will not be available and supportive distress. For example, people who score high on attachment anx-
This document is copyrighted by the American Psychological Association or one of its allied publishers.

in times of need, which heightens efforts to maintain closeness to iety tend to appraise threats as extreme and their own coping
relationship partners. A person’s position on the avoidance dimen- resources as deficient, to ruminate on disturbing thoughts, and to
sion indicates the extent to which he or she distrusts relationship report high levels of distress during and after stressful events (see
partners’ goodwill and capacity to help, which heightens efforts to e.g., Alexander, Feeney, Hohaus, & Noller, 2001; Birnbaum, Orr,
maintain a safe degree of independence and self-reliance. People Mikulincer, & Florian, 1997; Mikulincer & Florian, 1995, 1998).
who score low on these two dimensions are said to have a secure Anxiously attached people also tend to be vigilant regarding po-
attachment orientation or to be secure with respect to attachment. tential threats and dangers, to think they see signs of threat in what
Individual differences in attachment anxiety and avoidance re- other people would consider benign events, and to exaggerate the
flect both a person’s internal working models and the ways in potential for negative outcomes (see e.g., Cassidy & Kobak, 1988;
which he or she typically deals with stress and distress (Mikulincer Mikulincer et al., 2000; Shaver & Mikulincer, 2002). Research has
& Shaver, 2003, 2007a). People who score low on these dimen- also indicated that these anxious individuals react to perceived
sions possess well-developed working models of comfort- threats by seeking closer contact with others and expressing their
providing attachment figures that sustain a sense of attachment intense needs and worries (see e.g., J. A. Feeney & Noller, 1990;
security, positive self-regard, and confidence in proximity-seeking Mikulincer, Orbach, & Iavnieli, 1998).
strategies for coping with threats and regulating distress. Those According to Mikulincer and Shaver (2007a), anxious, hyper-
who score high on either attachment anxiety or avoidance possess activating coping strategies emerge from interactions with attach-
working models of unavailable, unreliable, frustrating, or rejecting ment figures who are sometimes responsive but only unreliably so,
attachment figures. These insecure people rely on what Main which subjects a person to a partial reinforcement schedule that the
(1990) and Mikulincer and Shaver (2003) called secondary attach- person interprets as encouraging energetic, noisy bids for proxim-
ment strategies, which involve either deactivating or hyperactivat- ity and support, because these tactics sometimes, but not always,
ing the attachment system as a way to cope with insecurities and succeed. People with this kind of experience do not easily give up
worries. High scores on attachment anxiety are associated with on proximity seeking.
hyperactivating strategies— energetic attempts to attain greater We hypothesize that reacting to such a partial reinforcement
proximity, support, and love combined with lack of confidence schedule also contributes to the formation and consolidation of a
that they will be provided. High scores on avoidant attachment are particular kind of schema regarding ways to cope with threats.
associated with deactivating strategies—inhibition of proximity According to Rumelhart (1980), self-schemas consist of a number
seeking while attempting to handle stress and distress oneself. of placeholders that supply default behaviors for certain kinds of
A substantial body of research has supported the claim that adult situations. Possessing this kind of schema helps a person respond
attachment orientations are implicated in coping with stress, dis- quickly to relevant situations, and if the situation provides insuf-
tress regulation, and adjustment. For example, people who score ficiently detailed information about how to respond, the default
low on both attachment anxiety and avoidance (i.e., those who are strategy can be quickly adopted. We expect the schemas of
relatively secure) hold optimistic attitudes about coping with life’s attachment-anxious adults to contain default placeholders that
hardships (see e.g., Shorey, Snyder, Yang, & Lewin, 2003), pos- cause them (a) to remain vigilant with respect to possible threats,
sess a strong sense of self-efficacy with respect to coping with especially in unfamiliar or ambiguous situations; (b) to react
stress (see e.g., Rice, Cunningham, & Young, 1997), appraise quickly and strongly to early, perhaps unclear cues of danger (e.g.,
threatening events in a relatively optimistic way (see e.g., unusual noises, shuffling feet, shouts); (c) to alert others about the
Mikulincer & Florian, 1995; Mikulincer, Florian, & Weller, 1993), imminent danger; (d) if others are not immediately supportive, to
effectively rely on support seeking as a means of coping with heighten efforts to get them to provide support; and (e) to mini-
threats (see e.g., Mikulincer & Florian, 1995, 1998), and remain mize distance from others when coping with a threat. We call this
emotionally stable when coping with stress (see Mikulincer, kind of working model, and its associated action tendencies, a
Shaver, & Pereg, 2003, for a review). sentinel schema because it sometimes alerts other people to a real
According to Mikulincer and Shaver (2007b), these appraisals danger.
and action tendencies are shaped by interactions with warm, lov- There is ample evidence that avoidant people’s tendency to
ing, and supportive attachment figures and are embodied in a deactivate their attachment system affects the ways in which they
relational if–then script, which Waters, Rodrigues, and Ridgeway appraise threats and cope with stressors. For example, they are
80 EIN-DOR, MIKULINCER, AND SHAVER

reluctant to seek help and comfort during stressful events and tend received relevant to the secure-base script and made faster and
to rely on cognitive and behavioral distancing strategies, such as more confident judgments about it. Individual differences related
diverting attention from threat-related cues and suppressing threat- to attachment were not associated with the number of neutral
related thoughts (see e.g., Birnbaum et al., 1997; Fraley & Shaver, inferences made, confidence in the neutral inferences, or the time
1997; Lussier, Sabourin, & Turgeon, 1997; Mikulincer & Florian, taken to make these interferences.
1995, 1998; Mikulincer et al., 1993; Simpson, Rholes, & Nelligan, Research has yet to provide information about the ways in
1992; Turan, Osar, Turan, Ilkova, & Damci, 2003). They tend to which relatively insecure people process information about threat-
deal with stress on their own (a strategy that Bowlby, 1973, called ening events. Mikulincer and colleagues (2009) and Waters and
compulsive self-reliance) and refrain from appraising events as Waters (2006) reported only that such people did not rely on the
threatening and from expressing distress, anxiety, or despair even secure-base script as much as did more secure people when pro-
if they are forced to experience these negative emotions (see cessing threat-related information. This raises the question of what
Mikulincer & Shaver, 2007a, for a review). schemas anxious and avoidant people do rely on when processing
According to Mikulincer and Shaver (2007a), avoidant, deacti- threat-related information.
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

vating strategies are a reaction to past experiences with unavailable We have proposed social defense theory (SDT; Ein-Dor, Mi-
This document is copyrighted by the American Psychological Association or one of its allied publishers.

or unapproving attachment figures. From these experiences a per- kulincer, Doron, & Shaver, 2010), according to which each of the
son learns to expect better outcomes if feelings of vulnerability or major attachment orientations (secure, anxious, and avoidant) is
neediness are hidden or suppressed. We believe that such a person associated with a unique schema for processing threat-related
is also likely to have constructed a schema that we call a rapid information. Each kind of schema has implications, both positive
fight–flight schema, which contains something like the following and negative, for the inclusive fitness (Hamilton, 1964a, 1964b) of
placeholders: (a) minimize the importance of threatening stimuli; members of a group that contains all three kinds of attachment
(b) when danger is clearly imminent, take quick self-protective orientations. The secure-base schema allows secure people to
action, either by escaping the situation or by taking action against remain emotionally stable in the face of threats and to calmly and
the danger; and (c) at such times, not worry about coordinating efficiently coordinate and lead group members’ problem-solving
one’s efforts with those of other people. efforts. But this schema may be counterproductive under certain
circumstances. For example, when a serious danger is arising, the
Attachment-Related Schemas Guide optimism inherent in the secure-base schema may retard secure
Information Processing people’s recognition of the gravity of the situation, thus causing
them to be slower than less secure people to notice the danger and
Our main theoretical proposition in the present article is that alert other group members to it. Moreover, secure people’s ten-
attachment orientations include schemas related to ways of coping dency to coordinate their actions with those of other people may
with threats and dangers. These schemas are expected to bias the interfere with rapid and effective self-protective behavior, because
processing of threat-related information. According to Markus mobilizing group efforts often takes longer than simply acting
(1977) and Rumelhart (1980), people who have ready access to a immediately and alone (see Proulx, 2003, concerning survivors of
particular schema are sensitive to schema-relevant stimuli and the 9/11 attacks on the World Trade Center in New York). There-
notice information and events pertinent to the schema’s domain fore, the secure-base schema may at times decrease secure peo-
(Markus & Sentis, 1982). As a result, they use their schemas to ple’s inclusive fitness, as well as the fitness of other members of
make quick judgments about the associated domain and to recall their groups, if it is not complemented by the schemas and actions
and interpret ambiguous stimuli in a biased way (see e.g., Carpen- of people with different attachment styles.
ter, 1988; Kanagawa, Cross, & Markus, 2001; Lurigio & Carroll, People who are high in attachment anxiety are likely to be
1985; Markus, 1977, 1980; Roediger & McDermott, 1995). vigilant in monitoring the environment for threats and to be vocal
We hypothesize that attachment-related schemas will affect the about detected threats and eager to have other people’s help in
processing of information concerning threatening and dangerous averting them (see e.g., Cassidy & Kobak, 1988; J. A. Feeney &
situations, resulting in schema-congruent interpretations, faster Noller, 1990). According to SDT, anxious individuals may offset
recognition of schema-relevant stimuli, and more schematic and some of the deficiencies of secure group members by reacting
deeper processing of schema-relevant information. There is al- quickly and vocally to early, and perhaps ambiguous, cues of
ready preliminary evidence supporting this line of reasoning. imminent danger, a reaction that stems from what SDT calls a
Mikulincer and colleagues (2009) presented study participants sentinel schema. Anxious individuals’ sentinel behaviors may in-
with a picture of a needy person (an injured person with a sad crease inclusive fitness even if the anxious person is mainly
facial expression in a hospital bed) and asked them to write a story concerned with gaining support from other group members rather
about what would happen next. Participants who scored relatively than helping to save them from injury or destruction.
low on measures of attachment anxiety, avoidance, or both (i.e., Avoidant individuals are accustomed to looking out for their
the secure ones) were more likely to write stories that included key own interests and taking care of themselves, even if this sometimes
elements of the secure-base script (support seeking, support pro- occurs at other people’s expense (see e.g., Collins & Read, 1990;
vision, and distress relief). Using a prompt-word outline method, B. Feeney & Collins, 2001; Van Lange, Otten, DeBruin, & Joire-
Waters and Waters (2006) also found that secure participants man, 1997; see Mikulincer & Shaver, 2007a, for a review). Thus,
produced more stories organized around the secure-base script they are more likely to rely on self-protective fight-or-flight reac-
than did those who were relatively insecure. In addition, Miku- tions in times of danger, without hesitating or needing to deliberate
lincer and colleagues (2009) found that relatively secure partici- with other group members. For example, an avoidant person may
pants generated more inferences concerning the information they enact the quickest protective maneuver (approach motivation) or
ATTACHMENT INSECURITIES AND THREAT PROCESSING 81

quickly notice the best escape route from a threatening situation sentinel schema and (b) the rapid fight–flight schema. Our main
(avoidance motivation), reactions that we propose are results of a predictions were that (a) attachment anxiety, but not avoidance,
rapid fight–flight schema. These kinds of behaviors may also would be associated with stories congruent with the sentinel
assure other group members’ safety from injury or save their lives schema and (b) avoidant, but not anxious attachment, would be
by identifying an escape route, and this may promote inclusive associated with stories congruent with the rapid fight–flight
fitness even if the avoidant person does not care deeply about the schema.
welfare of other group members. While testing these predictions, we also attempted to rule out
Recently, we (Ein-Dor, Mikulincer, & Shaver, in press) found, three alternative explanations of the results. First, previous studies
in a study of group effectiveness in dealing with an experimentally have found associations between the two attachment insecurity
induced threat, that attachment anxiety was associated with dimensions and the Big Five personality traits: openness to expe-
quicker detection of the threat and therefore with greater group rience, conscientiousness, extraversion, agreeableness, and neurot-
effectiveness. Avoidant attachment was associated with speedier icism (see e.g., Noftle & Shaver, 2006). This might mean that these
responses to the danger once it was detected and therefore with personality traits could explain differences in the ways in which
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

greater group effectiveness in remaining safe. These effects were insecure people write stories about threatening events. Second,
This document is copyrighted by the American Psychological Association or one of its allied publishers.

statistically significant even when extraversion and neuroticism, sentinel and rapid fight–flight behaviors in a social situation may
two potentially relevant broadband personality traits, were statis- differ in their social desirability, so it is important to rule out the
tically controlled. Despite these promising results, there is still no influence of social desirability biases. Third, a person’s verbal and
information about whether avoidant people process threat-related composition skills might influence the length and quality of writ-
information with a rapid fight–flight schema and whether anxious ten stories. To control for these possibilities, we asked participants
people process such information with a sentinel schema. Looking to complete a test of verbal ability as well as self-report measures
into these matters is the purpose of the studies reported here. of the Big Five personality traits and social desirability bias.

The Present Research Method


In Study 1 we provided participants with a picture of a threat- Participants. Eighty Israeli undergraduates (32 women and
ening event and tested our predictions that (a) participants who 48 men, ranging in age from 19 to 51, Mdn ⫽ 22) participated in
scored higher on attachment anxiety would write stories compat- the study in exchange for credit in psychology courses.1
ible with the sentinel schema, and (b) more avoidant participants Materials and procedure. Each participant took part in the
would write stories compatible with the rapid fight–flight schema. procedures individually in two separate sessions. In the first ses-
Study 2 examined the hypothesis that attachment anxiety would be sion, he or she completed four randomly ordered psychological
associated with faster recognition of information relevant to the measures. Attachment orientation was assessed with a Hebrew
sentinel schema and with schema-biased memories of this infor- version of the Experiences in Close Relationships (ECR) scales
mation. Study 3 examined the hypothesis that avoidance would be (Brennan et al., 1998). Participants rated the extent to which each
associated with faster recognition of information relevant to the item was descriptive of their feelings in close relationships on a
rapid fight–flight schema and with schema-biased memories of 7-point scale ranging from 1 (not at all) to 7 (very much). Eighteen
this information. Study 4 examined the hypothesis that attachment items assessed attachment anxiety (e.g., “I worry about being
anxiety would be associated with deeper processing of information abandoned”), and 18 assessed avoidance (e.g., “I prefer not to
relevant to the sentinel schema, and Study 5 examined the hypoth- show a partner how I feel deep down”). The reliability and validity
esis that avoidance would be associated with deeper processing of of these scales have been repeatedly demonstrated (beginning with
information relevant to the rapid fight–flight schema. Finally, in Brennan et al., 1998; see Mikulincer & Shaver, 2007a, for a recent
Study 6 we exposed small groups of participants to an experimen- review). In our study, Cronbach’s alphas were .90 for the anxiety
tally induced threatening situation, a room gradually filling with items and .92 for the avoidance items. Mean scores were computed
smoke due to a malfunctioning computer (see also Ein-Dor et al., for each scale, and the two scores were not significantly correlated,
in press). This allowed us to test predictions that (a) the most r(78) ⫽ .24.
attachment-anxious person in a group would be most likely to The Big Five personality traits were assessed with a Hebrew
detect the presence of smoke (in accordance with the sentinel version of the 44-item Big Five Inventory (BFI; John, Donahue, &
schema) and (b) the most avoidant person in a group would be Kentle, 1991). Participants rated the extent to which each item
most likely to take action following detection of the danger (in described their personality on a 5-point scale ranging from 1
accordance with the rapid fight–flight schema). (strongly disagree) to 5 (strongly agree). In the present study,
Cronbach’s alphas were acceptable, especially given the brevity of
the scales: extraversion (.77), neuroticism (.83), openness to ex-
Study 1
In Study 1, we examined associations between attachment anx- 1
Each study involved an independent sample of undergraduates who did
iety and avoidance scores, on one hand, and cognitive accessibility
not participate in any of the other studies. Across the studies, including
of the sentinel and rapid fight–flight schemas, on the other. Par- gender as an additional factor in the analyses did not change the findings.
ticipants completed a self-report measure of attachment anxiety Moreover, no significant or consistent gender differences were found
and avoidance, examined a picture of a small group of people in a across the studies, and none of the interactions between gender and the
threatening situation, and wrote a story about what would happen other predictor variables were significant. We therefore collapsed across
next. Judges rated participants’ stories for congruence with (a) the gender in all of the analyses reported here.
82 EIN-DOR, MIKULINCER, AND SHAVER

perience (.68), agreeableness (.70), and conscientiousness (.75). nents of the rapid fight–flight schema and low levels of passively
Trait scores were computed for each participant by averaging the accepting the situation. The second factor (accounting for 24.4%
relevant item ratings. of the variance) was defined mainly by two story elements:
Social desirability was assessed with a Hebrew version of the noticing danger before others did (.93) and warning others
Marlowe–Crowne Social Desirability Scale (Crowne & Marlowe, about the threat (.91). We call this factor Sentinel Behaviors
1964). Participants rated the extent to which each of the items was because it includes the two core components of the sentinel
self-descriptive. Cronbach’s alpha for these items was .69; higher schema. A score was computed for each factor, for each par-
scores on the scale indicate a stronger tendency to respond in a ticipant, using the Anderson–Rubin method (a procedure for
socially desirable manner. creating unit-weighted composites that maximize independence
Verbal ability was assessed with a 15-item Hebrew vocabulary among factors). The two-factor scores were not significantly
test based on the Scholastic Ability Test used by Israeli universi- correlated, r(78) ⫽ .17, p ⫽ .18.
ties (called in Israel the Psychometric Entrance Test; Beller, 1995).
These items have exhibited high reliability and validity in previous
Results and Discussion
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

studies (see e.g., Berant, 1998). Higher scores reflect greater verbal
This document is copyrighted by the American Psychological Association or one of its allied publishers.

ability.
Preliminary analyses revealed that the average length of partic-
Two weeks after the first session, the second session was con-
ipants’ stories was 149 words (SD ⫽ 82.18, Mdn ⫽ 132) and that
ducted by a different experimenter, unaware of participants’ scores
the attachment scores were not significantly associated with story
on the first-session measures. Upon arrival, participants received a
length (rs ⬍ .06). Pearson correlations also indicated that attachment
drawing of two adults and two adolescents (one of each gender)
anxiety was significantly associated with neuroticism, r(78) ⫽ .54,
walking in a forest with a large, menacing wolf-like creature
p ⬍ .001, and with low levels of agreeableness, r(78) ⫽ –.46, p ⬍
stalking them from behind (see Appendix). They were asked to
.001; conscientiousness, r(78) ⫽ –.42, p ⬍ .001; and verbal ability,
look at the picture and write a story describing what was happen-
r(78) ⫽ –.39, p ⬍ .01. Avoidant attachment was significantly asso-
ing and what they thought would happen next. They were in-
ciated with low levels of extraversion, r(78) ⫽ –.65, p ⬍ .001;
structed to reflect on the protagonists’ thoughts, feelings, and
agreeableness, r(78) ⫽ –.28, p ⬍ .05); conscientiousness, r(78) ⫽
behaviors and to describe how the episode would end. They wrote
–.30, p ⬍ .05; and openness to experience, r(78) ⫽ –.28, p ⬍ .05.
the story at a self-selected pace without a time limit. Afterward,
Social desirability was not significantly associated with either attach-
they were debriefed and thanked.
ment score.
Scoring procedure. Participants’ stories were independently
The predictions were examined in two two-step hierarchical
rated by two judges (psychology graduate students), who were
regression analyses, one predicting rapid fight–flight behaviors
unaware of participants’ scores on the first-session measures.
within a narrative and the other predicting sentinel behaviors. In
Judges received explanations of the sentinel and rapid fight–flight
the first step of these regressions, we introduced the Big Five
schemas and were trained to code each story according to eight
personality trait scores (agreeableness, conscientiousness, neurot-
specific and well-defined criteria. Two of the ratings addressed
icism, extraversion, openness to experience), social desirability,
core components of the sentinel schema: (a) noticing ambiguous
and verbal ability as predictors. In the second step, we added
signs of danger and (b) warning others about the threat. Five
attachment anxiety and avoidance as predictors to determine their
ratings addressed core components of the rapid fight–flight
unique contribution to the rapid fight–flight and sentinel scores
schema: (c) escaping the situation without helping others, (d)
beyond the contribution of personality traits, social desirability,
acting without receiving help from others, (e) reacting quickly
and verbal ability.2
without depending on other people’s actions, (f) not cooperat-
For the rapid fight–flight score, the first step of the analysis was
ing with others, and (g) not deliberating with others. An addi-
not statistically significant, F(7, 71) ⫽ 0.65, p ⫽ .71, R2 ⫽ .09.
tional rating concerned passively accepting the situation, which
However, the addition of attachment anxiety and avoidance in the
is not a core component of either the sentinel or the rapid
second step yielded a statistically significant increase in variance
fight–flight schemas but might, nevertheless, be important to
accounted for, ⌬F(2, 69) ⫽ 4.70, p ⬍ .05, ⌬R2 ⫽ .16. As can be
consider. For each participant, judges rated the extent to which
seen in Table 1, avoidant attachment, but not attachment anxiety,
each element appeared in his or her story. Ratings were made on
was significantly associated with the rapid fight–flight score: More
a 7-point scale ranging from 1 (not at all) to 7 (very much).
avoidant participants included more components of the rapid
Intraclass correlations (ICCs) indicated satisfactory interrater
fight–flight schema in their narratives. No other effects were
reliability (ICCs ⬎ .86, ps ⬍ .001). Therefore, eight scores were
significant.
computed for each participant by averaging the two judges’ scores.
For the sentinel score, the first step of the regression analysis
Using exploratory factor analysis with maximum likelihood ex-
yielded a significant result, F(7, 71) ⫽ 2.80, p ⬍ .05, R2 ⫽ .30,
traction and direct oblimin rotation, we found that two factors
with agreeableness, neuroticism, and extraversion making signif-
(with eigenvalues ⬎ 1) explained 51.7% of the explained variance.
icant and positive contributions (see Table 1). In the second step,
The first factor (accounting for 27.3% of the variance) included the
the addition of attachment anxiety and avoidance yielded a mar-
following six features: escaping the situation without helping
ginally significant change in variance accounted for, ⌬F(2, 69) ⫽
others (loading .65), acting without receiving aid from others (.90),
acting rapidly without depending on others’ actions (.84), not
cooperating with others (.65), not deliberating with others (.47), 2
None of the interactions between attachment anxiety and avoidance
and passively accepting the situation (–.37). We call this factor were statistically significant in any of the studies. We therefore say no
Rapid Fight–Flight Behaviors because it included the five compo- more about this interaction.
ATTACHMENT INSECURITIES AND THREAT PROCESSING 83

Table 1 questions, and then performed a recognition test related to her


Standardized Regression Coefficients Predicting Rapid Fight– answers. For half of the participants, the target woman’s answers
Flight and Sentinel Scores (Study 1) to threat-relevant questions were congruent with the sentinel
schema. For the remaining participants, the target woman’s an-
Step and variable Rapid fight–flight Sentinel swers were incongruent with the schema.
Step 1 In the recognition test, participants received statements that had
Neuroticism .28 .30ⴱ appeared among the target woman’s answers (old items) and
Extraversion ⫺.04 .32ⴱ statements that resembled the target woman’s answers semanti-
Openness to Experience .03 .02 cally but had not actually been uttered (new items). We predicted
Conscientiousness .03 ⫺.28
that attachment anxiety, but not avoidance, would be associated
Agreeableness .08 .37ⴱ
Social Desirability .01 .01 with faster responses and better recognition of old threat-relevant
Verbal ability ⫺.14 ⫺.13 items and with faster and more numerous false memories for new
Step 2 threat-relevant items that were congruent with the sentinel schema.
Neuroticism .20 .12
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

These associations were not expected to be significant for threat-


Extraversion .25 .25
This document is copyrighted by the American Psychological Association or one of its allied publishers.

Openness to Experience .05 .05 irrelevant items or when the target woman’s answers were incon-
Conscientiousness .13 ⫺.18 gruent with the sentinel schema.
Agreeableness .20 .42ⴱⴱ
Social desirability .01 ⫺.12 Method
Verbal ability ⫺.13 .10
Attachment anxiety .11 .50ⴱⴱ Participants. Sixty-nine Israeli undergraduates (24 men and
Avoidant attachment .49ⴱⴱ ⫺.12 45 women, ranging in age from 19 to 27, Mdn ⫽ 22) participated
ⴱ ⴱⴱ in the study in exchange for credit in psychology courses.
p ⬍ .05. p ⬍ .01.
Materials and procedure. Participants took part individually
in two separate sessions. In the first session, they completed the
ECR scales. Cronbach’s alphas were again high for both anxiety
2.60, p ⫽ .08, ⌬R2 ⫽ .08, and as can be seen in Table 1, (.85) and avoidance (.89), and the two scores were not significantly
attachment anxiety, but not avoidance, was significantly associated correlated, r(67) ⫽ .13.
with the sentinel score. Participants who scored higher on anxiety The second session was conducted 2 weeks later by a different
mentioned more components of the sentinel schema in their nar- experimenter, unaware of participants’ ECR scores. Upon arrival,
ratives. In addition, only agreeableness (which is generally asso- participants were informed by the experimenter that they would be
ciated with helping others) was significantly related to the sentinel shown a video clip of another participant answering several ques-
score after the attachment scores had been added to the set of tions and would then perform a memory test related to that per-
predictors.3 son’s answers.
Overall, the findings supported our predictions. First, partici- The video clip portrayed a young woman (a confederate) an-
pants scoring higher on attachment anxiety were more likely to swering 12 open-ended questions. Six questions dealt with neutral
generate stories that were congruent with the sentinel schema. issues (e.g., “When you go to the beach, you . . .”), and six
Second, more avoidant participants were more likely to generate questions dealt with threat-relevant issues (e.g., “You walk with
stories that were congruent with the rapid fight–flight schema. your friends and hear a loud roar behind you. Then, you . . .”). The
These associations were significant even after controlling for order of questions was semirandomized with the constraint that no
broad personality traits, social desirability bias, and verbal ability. two successive questions dealt with the same kind of issue (neutral
or threat-related).
Study 2 Participants were randomly assigned to two experimental con-
ditions. In the sentinel schema condition (n ⫽ 37), the confeder-
In Study 2, we examined the hypothesized associations between ate’s answers to the threat-relevant questions indicated that she
attachment anxiety and memory for core components of the sen- was highly sensitive to danger and likely to warn others about
tinel schema. According to Rumelhart’s (1980) theorizing and threats (e.g., “I would be very scared. I would scream with fear,
findings from previous studies, a well-developed and highly ac- turn around, and yell to warn the others”). In the control condition
cessible schema for a particular domain increases and speeds up (n ⫽ 32), the confederate’s answers to the threat-relevant questions
recognition of schema-relevant information from a previous learn- indicated that she would remain calm in threatening situations and
ing task, as well as increasing false recognition of schema-relevant would not necessarily engage in sentinel behavior (e.g., “I would
items that were not actually presented in the learning task. Both turn around and look where the roar was coming from. I am
results suggest schema-biased information processing (see e.g., usually calm in these situations. I act according to what I see”).
Lurigio & Carroll, 1985; Markus, 1977; Roediger & McDermott, The confederate’s answers to the six neutral questions were iden-
1995). We therefore expected that having a well-developed, highly tical in the two conditions.
accessible sentinel schema would cause attachment-anxious peo- Following the video clips, all participants completed a 10-min
ple to recognize more schema-relevant information while also distracter task (a paper-and-pencil word-search task) followed by a
exhibiting more false memories and speedier reaction times (RTs)
for information relevant to the sentinel schema.
Participants completed the ECR scales, watched a video clip of 3
Similar findings were obtained when regression analyses were per-
a young woman answering threat-relevant and threat-irrelevant formed on each of the eight judges’ scores separately.
84 EIN-DOR, MIKULINCER, AND SHAVER

Table 2
Standardized Regression Coefficients Predicting Memory and RTs (Study 2)

Neutral sentences Threat-related sentences


Attachment variable
and group Hits FMs Hits RTs FMs RTs Hits FMs Hits RTs FMs RTs

Neutral stimuli .06 .22 .58ⴱⴱⴱ .38ⴱⴱⴱ


Avoidance ⫺.09 .02 .19 ⫺.09 ⫺.20 .20 .00 .11
Anxiety .10 ⫺.10 .00 .17 .08 ⫺.22 ⫺.10 ⫺.16
Condition ⫺.05 ⫺.06 .19 .15 ⫺.11 ⫺.21 ⫺.05 ⫺.12
Avoidance ⫻ Condition ⫺.01 .02 .20 .23 ⫺.06 .01 ⫺.02 ⫺.08
Anxiety ⫻ Condition ⫺.07 ⫺.11 .20 .13 .28ⴱ ⫺.09 ⫺.26ⴱ ⫺.32ⴱⴱ

Note. RTs ⫽ reaction times; FMs ⫽ false memories.



p ⬍ .05. ⴱⴱ p ⬍ .01. ⴱⴱⴱ p ⬍ .001.
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.
This document is copyrighted by the American Psychological Association or one of its allied publishers.

computerized recognition task containing segments of the confed- were centered around their means. Standardized regression coef-
erate’s answers. In this task, participants were asked to decide as ficients are presented in Table 2.
quickly and accurately as possible whether each of 36 sentences In the analyses of memory and RT scores for neutral sentences,
had appeared in the video clip. there were no significant main effects or interactions. Moreover,
Eighteen of the sentences dealt with neutral issues, and 18 dealt there were no significant main effects in the analyses of memory
with threat-relevant issues. Each sentence category was further and RT scores for threat-relevant sentences. However, there were
divided into two groups: nine old sentences that had appeared in significant interactions between attachment anxiety and experi-
the original clip (e.g., “I usually go to the sea with friends”) and mental condition in the analyses of hits for threat-related sentences
nine new sentences that resembled the originals but had not ap- (␤ ⫽ .28, p ⬍ .05) and RTs for hits and false memories when
peared in the clip (e.g., “I usually go to the forest with friends”). responding to threat-related sentences (␤ ⫽ –.26, p ⬍ .05, and ␤ ⫽
All sentences were matched for length and number of words.4 –.32, p ⬍ .01, respectively).
Participants sat in front of a 19-in. SVGA screen with a 100-Hz Simple slope tests (Aiken & West, 1991) revealed that in the
refresh rate. The task was administrated by a 486 IBM (1.8-GHz) sentinel condition, attachment anxiety was associated with more
computer with DirectRT as the experimental platform. Each of the hits of threat-related sentences (␤ ⫽ .37, p ⬍ .01), faster RTs for
36 recognition trials began with an X in the center of the screen for hits when responding to sentences that were correctly recognized
500 ms, followed by a target sentence. Brightness and contrast (␤ ⫽ –.36, p ⬍ .01), and faster RTs for new sentences that were
were set somewhat low, and the target sentences were displayed in inaccurately considered to be old (␤ ⫽ –.48, p ⬍ .001; see Figure
yellow lettering on a black background in the middle of the screen. 1). In the control condition, however, attachment anxiety was not
Participants judged as quickly as possible whether each target significantly associated with accurate recognition or RTs of threat-
sentence had appeared in the clip by pressing F on the keyboard if related sentences (␤ ⫽ –.19, and ␤ ⫽ .16, respectively) or with
they thought the sentence had appeared or K if they thought it had RTs for new sentences that were inaccurately considered to be old
not. Sentences remained on the screen until the participants (␤ ⫽ .16).
pressed a key. Following the recognition task, participants were Overall, the findings were in line with predictions: Attachment
debriefed and thanked. anxiety, but not avoidance, was significantly associated with more
hits of threat-related sentences and faster recognition of schema-
Results and Discussion biased memories (speedier responses to sentences that were cor-
rectly recognized and to new sentences that were inaccurately
For each participant and each sentence category (neutral, threat), considered to be old). We did not find a significant association
we calculated the following two scores: (a) the percentage of trials between attachment anxiety and more new sentences that were
in which old sentences were accurately recognized (“hits”) and (b) inaccurately considered to be old.
the percentage of trials in which new sentences were incorrectly
believed to have appeared in the video clip (“false memories”). We Study 3
also calculated mean RTs for (a) old sentences that were correctly
recognized (RTs for hits) and (b) new sentences that were inac- In Study 3, we examined the hypothesized associations between
curately considered to be old (RTs for false memories).5 avoidant attachment and memory for components of the rapid
The data were analyzed in two-step hierarchical regression
analyses. In the first step, we entered attachment anxiety and 4
The video clips and all of the sentences used in the recognition memory
avoidance scores and experimental condition (a dummy variable tasks in Studies 2 and 3 are available upon request (in Hebrew or in English
comparing the sentinel, 1, with the control condition, –1) as translation).
predictors. For threat-related scores, we also inserted the relevant 5
Outliers (RTs lower or higher than three standard deviations from the
neutral score as a covariate to control for general memory ability mean) were excluded from the analyses of RTs in Studies 2 and 3. The
or response speed. In the second step, we added the product of average percentage of trials on which such outliers existed was low (1.8%
each attachment score and experimental condition to examine in Study 2, and 2.1% in Study 3), and the trials were randomly distributed
potential interactions. In all of these analyses, attachment scores across categories.
ATTACHMENT INSECURITIES AND THREAT PROCESSING 85

be associated with faster recognition of threat-relevant information


and more hits and false memories related to this information but
only when the target woman’s answers were congruent with the
rapid fight–flight schema. These associations were not expected to
appear for threat-irrelevant items or when the target woman’s
answers were incongruent with the rapid fight–flight schema.

Method
Participants. Fifty-seven Israeli undergraduates (19 men and
38 women, ranging in age from 19 to 30, Mdn ⫽ 22) participated
in the study in exchange for credit in psychology courses.
Materials and procedure. Participants took part individually
in two separate sessions. In the first session, they completed the
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.
This document is copyrighted by the American Psychological Association or one of its allied publishers.

ECR scales. Cronbach’s alphas were again high for both anxiety
(.87) and avoidance (.85), and the two scores were not significantly
correlated, r(55) ⫽ .20.
The second session was conducted 2 weeks later by a different
experimenter, who was unaware of participants’ ECR scores. The
instructions, procedure, video clip, and recognition task were sim-
ilar to those used in Study 2. This time, however, the video clip
was focused on the rapid fight–flight schema. Specifically, partic-
ipants were randomly assigned to two experimental conditions. In
the rapid fight–flight condition (N ⫽ 28), the woman’s answers to
the six threat-related questions indicated that she usually acts alone
and without hesitation in times of danger (e.g., “I deal with the
threat by myself. I do not trust others to do the job”). In the control
condition (N ⫽ 29), the woman’s answers to the six threat-related
questions indicated that she usually cooperates with others in times
of threat and waits to see what others are doing (e.g., “I see what
others are doing and act accordingly”). As in Study 2, the woman’s
answers to the six neutral questions were identical in the two
conditions. After watching the video, all participants completed
the 10-min distracter task used in Study 2. They then took a
36-item computerized recognition test in which they were asked to
decide whether old and new neutral and threat-related sentences
had appeared in the videotaped woman’s comments. The apparatus
and procedure were identical to those used in Study 2. At the end
of the experiment, participants were debriefed and thanked.

Results and Discussion


Figure 1. Experimental condition was found to qualify the link between For each participant and sentence category (neutral, threat), we
attachment anxiety and number of hits, reaction times (RTs) for hits, and calculated two memory scores (hits, false memories) and two RT
RTs for false memories of sentinel-related sentences. The higher the scores (RTs for hits, RTs for false memories), as described in Study
participants’ attachment anxiety, the higher their percentage of trials in
2. The data were analyzed in two-step hierarchical regression analy-
which old sentinel-related sentences were accurately recognized, the
quicker their reaction to old sentinel-related sentences that were correctly
ses, as also described in Study 2. Standardized regression coefficients
recognized, and the quicker their reaction to new sentinel-related sentences are presented in Table 3.
that were inaccurately considered to be old sentinel-related sentences. In the analyses of memory and RT scores for neutral sentences,
there were no significant main effects or interactions. Moreover,
there were no significant main effects in the analyses of memory
fight–flight schema. As in Study 2, participants completed the and RT scores for threat-relevant sentences. However, there were
ECR scales, viewed a video clip of a young woman answering significant interactions between avoidant attachment and experi-
threat-relevant and threat-irrelevant questions, and then performed mental condition in the analyses of false memories for threat-
a recognition task. For half of the participants, the target woman’s related sentences (␤ ⫽ .25, p ⬍ .05) and RTs for hits when
answers to threat-relevant questions were congruent with the rapid responding to threat-related sentences (␤ ⫽ –.25, p ⬍ .05). No
fight–flight schema. For the remaining participants, the target other interactions were significant.
woman’s answers were not congruent with this schema. We pre- Simple slope tests revealed the following pattern of effects (see
dicted that avoidant attachment, but not attachment anxiety, would Figure 2): In the rapid fight–flight condition, avoidant attachment
86 EIN-DOR, MIKULINCER, AND SHAVER

Table 3
Standardized Regression Coefficients Predicting Memory and RTs (Study 3)

Neutral sentences Threat-related sentences


Attachment variable
and group Hits FMs Hits RTs FMs RTs Hits FMs Hits RTs FMs RTs

Neutral stimuli .00 .39ⴱⴱ .75ⴱⴱⴱ .62ⴱⴱⴱ


Avoidance .10 ⫺.04 .00 ⫺.01 ⫺.07 .03 ⫺.03 .03
Anxiety ⫺.03 ⫺.09 ⫺.10 ⫺.12 .11 .07 .13 .16
Condition .18 .07 ⫺.13 ⫺.18 ⫺.24 ⫺.19 ⫺.18 .03
Avoidance ⫻ Condition .10 .03 ⫺.16 ⫺.19 ⫺.15 .25ⴱ ⫺.25ⴱ .17
Anxiety ⫻ Condition .18 ⫺.15 .19 .05 .13 ⫺.04 .01 .04

Note. RTs ⫽ reaction times; FMs ⫽ false memories.



p ⬍ .05. ⴱⴱ p ⬍ .01. ⴱⴱⴱ p ⬍ .001.
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.
This document is copyrighted by the American Psychological Association or one of its allied publishers.

was associated with more false memories of threat-related sen- Overall, the findings were in line with predictions: Avoidant
tences (␤ ⫽ .28, p ⬍ .05) and faster RTs for accurate recognition attachment, but not anxious attachment, was significantly associ-
of threat-related sentences (␤ ⫽ –.28, p ⬍ .05). In the control ated with more schema-biased memory (false memories) and faster
condition, however, avoidant attachment was associated with recognition of information that was congruent with the rapid
fewer false memories of threat-related sentences (␤ ⫽ –.22, p ⬍ fight–flight schema (hits). When the information in the video clip
.05) and slower RTs for accurate recognition of threat-related was not congruent with the rapid fight–flight schema, more
sentences (␤ ⫽ .22, p ⬍ .05). avoidant participants reacted with less schema-biased memory.
However, we did not find the expected associations between
avoidance and more hits for information that was congruent with
the rapid fight–flight schema or between avoidance and faster RTs
to new sentences that were inaccurately considered to be old.

Study 4
In Study 4, we examined the hypothesized link between attach-
ment anxiety and deep processing of information relevant to the
sentinel schema. Markus, Smith, and Moreland (1985) showed that
a well-developed schema provides a cognitive framework for
going beyond the schema-relevant information given. Specifically,
they found that having a well-developed schema for a particular
domain enables people to generate more impressions of and con-
jectures about the thoughts, feelings, intentions, and traits of a
story’s protagonist—information that was not explicitly presented
in the story. We similarly hypothesized that anxious individuals’
well-developed sentinel schema would allow them to process
information relevant to the sentinel schema more deeply. As a
result, when asked to recall a story that included the major com-
ponents of the sentinel schema, participants who scored higher on
attachment anxiety would go beyond the information given and
generate more conjectures and inferences about the thoughts, feel-
ings, and traits of story protagonists. Moreover, these conjectures
and inferences would be confined to aspects of the story that were
relevant to the sentinel schema and would not extend to schema-
irrelevant information. Less attachment-anxious people were ex-
pected to process the sentinel-schema information in a shallower
manner and therefore to recall mainly information that was explic-
itly presented in the story.
Figure 2. Experimental condition was found to qualify the link between
Once participants completed the ECR scales, they were asked to
attachment-related avoidance and number of false memories and reaction
times (RTs) for hits of sentences related to rapid fight–flight (RFF). The
read a story that included the major components of the sentinel
higher the participants’ avoidance score, the higher their percentage of schema. They then generated recollections (actual facts presented
trials in which new RFF-related sentences were inaccurately considered to in the story) and impressions (inferences, feelings, and opinions)
be old and the quicker their reaction to old RFF-related sentences that were about the story. Two independent judges placed each participant’s
correctly recognized. responses into one of the following categories: sentinel-schema
ATTACHMENT INSECURITIES AND THREAT PROCESSING 87

recollections, sentinel-schema impressions, neutral (schema- tions (information explicitly mentioned in the story) and impres-
irrelevant) recollections, and neutral impressions. Our main pre- sions (assumptions or conclusions inferred from the story but not
diction was that attachment anxiety, but not avoidance, would be explicitly presented in it). Judges had been trained to distinguish
associated with generating more sentinel-schema impressions. We recollections and impressions that were relevant to the sentinel
did not expect an association between attachment anxiety and schema from schema-irrelevant recollections and impressions.
more sentinel-schema-generated recollections, because the task Following training, each judge independently sorted each of a
was fairly straightforward and was completed immediately follow- participant’s responses into one of the following categories: (a)
ing the short story. sentinel-schema recollections (e.g., “Shay [the character’s name]
was the first to notice the danger”), (b) sentinel-schema impres-
sions (e.g., “Shay seemed to be alert. He paid attention to his
Method
surroundings”), (c) neutral recollections (e.g., “They took a family
Participants. Eighty-four Israeli undergraduates (12 men and vacation in the northern part of Israel”), and (d) neutral impres-
72 women, ranging in age from 20 to 30, Mdn ⫽ 23) participated sions (e.g., “Shay seemed to be a good athlete”). Interjudge agree-
ment was adequate (␬ ⫽ .72), and disagreements were resolved
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

in the study in exchange for credit in psychology courses.


This document is copyrighted by the American Psychological Association or one of its allied publishers.

Materials and procedure. Participants took part individually through discussion. Four scores were computed for each partici-
in a single experimental session. Upon arrival, they were told that pant by counting the number of sentinel-schema recollections,
the study dealt with memory and deductive reasoning. They then sentinel-schema impressions, neutral recollections, and neutral im-
completed the ECR scales. Once again, Cronbach’s alphas for both pressions he or she generated.
anxiety (.92) and avoidance (.86) were acceptable, and the two
scores were not significantly correlated, r(82) ⫽ –.10. All partic-
Results and Discussion
ipants also completed a bogus personality test, which served as a
distracter task, and were then asked to read a story describing a The predictions were tested with a series of multiple regression
23-year-old person (of the participant’s gender) who took a hike in analyses performed on the number of sentinel-schema recollec-
an unfamiliar forest with three friends.6 Half of the sentences in the tions and impressions and the number of neutral recollections and
story concerned neutral topics (e.g., “I saw lots of tiny flowers”), impressions. In these analyses, we entered attachment anxiety and
and the remaining sentences described behaviors central to the avoidance scores as predictors while controlling for the total
sentinel schema (e.g., “I walked quietly and listened attentively to number of responses a participant generated in the memory task. In
whatever might be happening”). All of the sentences describing this way, we controlled for general memory and inference skills. In
sentinel behaviors were derived from stories written by partici- line with predictions, the analyses revealed no significant effect of
pants in Study 1. Ten Israeli undergraduates who had not partic- either attachment anxiety or avoidance on the number of neutral
ipated in the study were asked to judge the extent to which each of recollections, neutral impressions, and sentinel-schema recollec-
the sentences was congruent with the sentinel schema. Ratings tions (␤s ⬍ .13, ps ⬎ .23). Attachment anxiety, however, signif-
were made on a scale ranging from 1 (not at all) to 7 (very much). icantly predicted the number of sentinel-schema impressions (␤ ⫽
The 10 judges rated all of the sentences as highly congruent with .23, p ⬍ .05); the higher a participant’s attachment anxiety score,
the schema (M ⫽ 6.60, SD ⫽ 0.70, Mdn ⫽ 7). the more sentinel-schema impressions he or she generated. Avoid-
The story consisted of 38 sentences, with 19 sentences contain- ance scores were not significantly related to the number of
ing information relevant to the sentinel schema and the remaining sentinel-schema impressions.
19 sentences containing schema-irrelevant information. The sen- In summary, the findings supported our predictions: Attachment
tences were organized such that no more than two from the same anxiety was associated with generating more inferences concern-
category (sentinel-schema or neutral) were presented consecu- ing the sentinel schema, but it did not explain individual differ-
tively. The story was designed to contain only behavioral descrip- ences in the number of sentinel-schema recollections or the num-
tions and to avoid explicit statements about the characters’ feel- ber of inferences made about schema-irrelevant statements. This
ings, thoughts, intentions, or traits (which could nevertheless be fits with Catrambone and Markus’s (1987) conclusion that having
inferred from the described behaviors). a rich and well-developed schema facilitates deeper information
After reading the story, participants completed a memory test processing and more extensive inferences about schema-relevant
similar to the one used by Markus and colleagues (1985, Study 2). information, but it does not affect simple recollection of actual
Stacks of blank cards were placed in front of participants and they facts or depend on global inferential skills.
were instructed as follows: “Please write on the cards anything you
can remember about the story or about the story characters. Write
only one item per card. The number of cards you use is not Study 5
restricted, but you can work on this task for no longer than five In Study 5, we examined the hypothesized link between
minutes.” No participant stopped before the end of the 5-min avoidant attachment and deep processing of information relevant
period (see Mikulincer et al., 2009, for details). Following the to the rapid fight–flight schema. We hypothesized that avoidant
memory task, participants were debriefed and thanked. participants’ well-developed rapid fight–flight schema would al-
Scoring procedure. Participants’ responses were indepen- low them to process schema-relevant information more deeply.
dently content-analyzed by two judges (psychology graduate stu-
dents) who were unaware of participants’ ECR scores. Before
analyzing a participant’s responses, judges read the story several 6
The stories used in Studies 4 and 5 are available upon request (in
times until they were able to distinguish clearly between recollec- Hebrew or in English translation).
88 EIN-DOR, MIKULINCER, AND SHAVER

Hence, when asked to recall a story that included the major impressions, neutral recollections, and neutral impressions he or
components of the rapid fight–flight schema, more avoidant people she generated.
would go beyond the information given and generate more con-
jectures and inferences about the thoughts, feelings, and traits of
the protagonists. These impressions would be confined to aspects Results and Discussion
of the story relevant to the rapid fight–flight schema and would not
Our predictions were tested in a series of multiple regression
extend to schema-irrelevant information.
analyses identical to those described in Study 4. The analyses
Once participants completed the ECR scale, they read a story
revealed no significant associations between either attachment
that included the major components of the rapid fight–flight
anxiety or avoidance and the number of neutral recollections and
schema. They then generated recollections and impressions about
neutral impressions (␤s ⬍ .17, ps ⬎ .17). However, the main effect
the story, after which two independent judges placed each of a
of avoidant attachment on the number of rapid fight–flight impres-
participant’s responses into one of four categories: rapid fight–
sions was significant (␤ ⫽ .30, p ⬍ .05); the higher a participant’s
flight recollections, rapid fight–flight impressions, neutral
avoidance score, the more rapid fight–flight impressions he or she
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

(schema-irrelevant) recollections, and neutral impressions. We ex-


generated. Although attachment anxiety was not associated with
This document is copyrighted by the American Psychological Association or one of its allied publishers.

pected avoidant attachment to be associated with generating more


the number of rapid fight–flight impressions, it significantly pre-
rapid fight–flight impressions. As in Study 4, we did not expect an
dicted the number of rapid fight–flight recollections (␤ ⫽ –.33,
association between avoidance and more schema generated recol-
p ⬍ .01), but the association was negative. That is, the higher a
lections because the task was fairly straightforward and was com-
participant’s attachment anxiety score, the fewer rapid fight–flight
pleted immediately after the short story.
recollections he or she generated. Avoidant attachment was not
significantly associated with the number of rapid fight–flight rec-
Method ollections.
In summary, as predicted, avoidant attachment was associated
Participants. Seventy-two Israeli undergraduates (24 men
with generating more inferences about the rapid fight–flight
and 48 women, ranging in age from 21 to 42, Mdn ⫽ 24) partic-
schema. It did not, however, explain individual differences in the
ipated in the study in exchange for credit in psychology courses.
number of rapid fight–flight recollections or the number of recol-
Materials and procedure. Participants took part individually
lections or inferences made about schema-irrelevant issues. In
in a single experimental session. Upon arrival, they were told that
addition, attachment anxiety seemed to impair recall of informa-
the study dealt with memory and reasoning abilities. They then
tion congruent with the rapid fight–flight schema.
completed the ECR scales. Cronbach’s alphas for both anxiety
(.89) and avoidance (.76) were acceptable, and this time the two
scores were significantly correlated, r(70) ⫽ .32, p ⬍ .01. All of Study 6
the participants completed a bogus personality test, which served
as a distracter task, and then read a 38-sentence story similar to the Studies 1 to 5 supported our premise that people who score
one used in Study 4. In Study 5, however, 19 sentences concerned high on attachment-related avoidance process threat-related in-
neutral topics (e.g., “I saw lots of tiny flowers”) and 19 sentences formation with a rapid fight–flight schema and that people who
described behaviors central to the rapid fight–flight schema (e.g., score high on attachment anxiety process such information with
“Immediately, without hesitation, I ran and climbed the nearest a sentinel schema. Study 6 was designed to explore whether
tree”). All of the sentences describing rapid fight–flight behaviors these schemas and action tendencies translate into actual be-
were derived from stories written by participants in Study 1. Ten havior. To this end, we exposed small groups of participants to
Israeli undergraduates who had not participated in the study were an experimentally created threatening situation, a room gradu-
asked to judge the extent to which each of the sentences was ally filling with smoke due to a malfunctioning computer. We
congruent with the rapid fight–flight schema. They rated all of the then examined our predictions that (a) the most anxious person
sentences as highly congruent with the schema (M ⫽ 6.20, SD ⫽ in a group would be most likely to detect the presence of smoke
0.79, Mdn ⫽ 6). After reading the story, participants completed the (in accordance with the sentinel schema) and (b) the most
memory task described in Study 4 and were debriefed and thanked. avoidant person in a group would be most likely to act quickly
Scoring procedure. Participants’ responses were indepen- following detection of the danger (in accordance with the rapid
dently content-analyzed by two new judges (psychology graduate fight–flight schema). As in Study 1, we examined associations
students) who were unaware of participants’ ECR scores and who between the two kinds of attachment insecurity and sentinel and
had received the training described in Study 4. Each judge inde- rapid fight–flight behaviors while statistically controlling for
pendently sorted each of a participant’s responses into one of the neuroticism and extraversion. We (Ein-Dor et al., in press)
following categories: (a) rapid fight–flight recollections (e.g., “The reported other analyses from this study that examined whether
wolf was scared away by a stick”), (b) rapid fight–flight impres- groups that are more diverse with respect to attachment (i.e.,
sions (e.g., “A person’s heroic action may benefit other people”), contain at least one group member scoring low on both attach-
(c) neutral recollections (e.g., “They took a family vacation in the ment anxiety and avoidance [i.e., being relatively secure], one
northern part of Israel”), and (d) neutral impressions (e.g., “Shay group member scoring high on attachment anxiety, and one
seemed to be a good athlete”). Interjudge agreement was accept- group member scoring high on avoidance) would be more
able (␬ ⫽ .70), and disagreements were resolved through discus- effective in dealing with threats than would less diverse groups
sion. Four scores were computed for each participant by counting (and this hypothesis was supported). Here we focus on the
the number of rapid fight–flight recollections, rapid fight–flight association between attachment insecurities and individuals’
ATTACHMENT INSECURITIES AND THREAT PROCESSING 89

behavior in groups. (In other words, the present findings con- (b) the identity of the group member who first took action
cern the individual level of analysis rather than the group level.) following detection of the smoke, either by exiting the room
(which was all but one case) or trying to deal with the smoking
computer, whichever came first. The judges were in perfect
Method
agreement (hence, ␬ ⫽ 1).
Participants. One hundred thirty-eight Israeli undergraduates
(89 women and 49 men aged 19 –27, Mdn ⫽ 22) participated in the Results and Discussion
study in exchange for credit in psychology courses.
Materials and procedure. The study spanned two sessions. Groups consisted of three members, so each group member had
In the first session, participants completed two randomly ordered a 33.3% chance of being the first to identify the presence of smoke
scales. Attachment orientations were assessed, as in the previous and/or being the first to act following detection of the smoke. For
studies reported here, with the ECR scales. Cronbach’s alphas each group we ranked its members by their level of attachment
were .89 for the anxiety items and .90 for the avoidance items. anxiety and avoidance (i.e., 1 for the most attachment-anxious
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

Mean scores on the two scales were somewhat correlated, person, 2 for the second most attachment-anxious person, and 3 for
r(136) ⫽ .23, p ⬍ .05.
This document is copyrighted by the American Psychological Association or one of its allied publishers.

the group member with the lowest score on attachment anxiety).


Participants also completed the neuroticism and extraversion We also ranked them by their neuroticism and extraversion levels.
subscales of a Hebrew version of the Big Five Inventory ( John et We expected that the most anxious person in a group would be
al., 1991). Cronbach’s alphas were .86 for neuroticism and .76 for most likely to detect the presence of the smoke (significantly more
extraversion. Trait scores were computed for each scale by aver- often than expected by chance, 33.3%). To this end, we ran a series
aging the appropriate item ratings. of chi-square tests for goodness of fit. The analyses revealed that
The second session was conducted 2 weeks later by a different the group member with the highest attachment anxiety score
experimenter, unaware of participants’ scores on the first-session noticed the threat first in 46.7% of the cases, ␹2(2) ⫽ 5.94, p ⬍
measures. Participants were invited to the laboratory three at a time .05. But this was not true for the most neurotic person (34.1% of
(resulting in 46 groups). Any gender combination within a group cases), ␹2(2) ⫽ 0.36, p ⫽ .84, or the most extraverted person
was allowed. Once the participants had all arrived, the experi- (42.5% of cases), ␹2(2) ⫽ 3.25, p ⫽ .20, although there was a
menter told them a cover story, according to which they were tendency for extraverts to be more vocal about the threat. We also
going to play an Internet-based game. The experimenter then took found that the most avoidant group member was unlikely (24.4%
the three participants to a large room, sat them beside a long table, of cases) to detect or mention the smoke first, ␹2(2) ⫽ 6.47, p ⬍
and asked them to complete a battery of bogus questionnaires .05. Although not explicitly predicted, the latter finding is consis-
regarding their daily habits while he prepared the control-room tent with the premise that the rapid fight–flight schema contains
computers for their experiment. He told them he would call them placeholders that tend to minimize threatening stimuli.
on an intercom when the computers were ready, and he then left We also expected that the most avoidant person in a group
the room and closed the door behind him. would be likely to act first following the detection of danger
Participants were videotaped by hidden cameras throughout the (significantly more than the 33.3% expected by chance). A series
session and could be watched from the control room. Ten feet of chi-square tests for goodness of fit failed to support this pre-
behind the participants’ table was another table on which there was diction, and in fact none of the individual-difference measures
an SVGA computer monitor displaying a generic desktop graphic. (avoidance, anxiety, neuroticism, or extroversion) was signifi-
On the floor nearby was an apparently attached PC with a stack of cantly related to taking action first, ␹2(2) ⬍ 2.62, all ps ⬎ .27. This
paper on it. The screen was controlled by a computer in the control absence of effects may have been due to the ease of escaping the
room, and the visible PC computer was actually a disguise for a situation we created. As mentioned, all but one of the groups left
nontoxic party smoke machine. Exactly 1 min after the experi- the room rather than try to put out the “fire.”
menter departed, he began sending smoke into the room through In summary, the findings supported our prediction that attach-
the bogus computer, making it seem to participants that the com- ment anxiety would be associated with quick detection of a threat,
puter had caught fire. There was a large open window in the room, but they did not support our prediction about avoidant individuals
which ensured that participants could breathe despite the smoke. being quickest to take action. That prediction should be tested in a
The experiment ended either when the participants exited the room situation that requires (or at least seems to participants to require)
or when they tried to deal with the smoking computer. Afterward, more courageous action.
they were debriefed and thanked. All said they had believed that
the computer fire was genuine. The overwhelmingly common General Discussion
response to the threat was flight (all but one of the groups left the
room) rather than attempting to deal with the smoking computer, Bowlby (1973, 1980) argued that people vary in how they deal
so we were not able to test the possibility that in some situations with threats and in the mental representations of attachment expe-
more avoidant individuals might approach (and if necessary riences that underlie such variation. Supporting his contentions,
“fight”) a threat in order to remove it. recent studies (Mikulincer et al., 2009; Waters & Waters, 2006)
Scoring procedure. Video records of the sessions were inde- have shown that reactions of relatively secure people to threaten-
pendently rated by two judges (psychology graduate students), ing situations are organized around a secure-base script. When in
who were unaware of the study hypotheses and of participants’ trouble or in need of help or support, secure individuals expect
scores on the first-session measures. Judges recorded (a) the other people to be available and responsive and to help them cope
identity of the group member who first detected the smoke and with dangers or stressors. Less secure people have less accessible
90 EIN-DOR, MIKULINCER, AND SHAVER

and less elaborated secure-base scripts and do not rely confidently ing of neutral information by reducing “noise” in the model. Still,
on such a script when processing threat-related information. the robustness of our findings implies that attachment insecurities
In the studies reported here, we explored the possibility that are less related to processing of neutral information than to pro-
insecure people possess alternative schemas for dealing with dif- cessing of threat-related information. Moreover, the effects of
ficult situations. Specifically, we hypothesized that insecure– attachment anxiety and avoidance were not explained by individ-
anxious individuals rely on what we call a sentinel schema— one ual differences in attachment-unrelated verbal and memory abili-
that encourages high sensitivity to clues of impending danger and ties, speed of recognizing attachment-irrelevant information, or
a readiness to warn others about the danger while maintaining attachment-unrelated inference skills. Moreover, the findings were
proximity to them. We also hypothesized that avoidant people’s not explained by general personality traits (e.g., neuroticism, ex-
reactions to danger would be organized around what we call a traversion) or by scores on a measure of socially desirable re-
rapid fight–flight schema, a perception–action schema that encour- sponding. Instead, they were unique to individual differences in
ages rapid self-protective responses to danger without consulting the attachment domain.
other people or seeking their help. Our findings suggest that people who are anxious with respect to
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

The results were generally supportive of these hypotheses. With attachment possess highly accessible and well-organized implicit
This document is copyrighted by the American Psychological Association or one of its allied publishers.

regard to attachment anxiety, Study 1 found this form of insecurity knowledge about a sequence of events that goes from monitoring
to be associated with ready access to core components of the and quickly reacting to potential sources of danger to alerting
sentinel schema (noticing danger before other people do, warning others about the imminent danger and maintaining proximity to
others about the danger) when writing a story about threatening them. This knowledge presumably makes it easier for anxious
events. Study 2 showed that more anxious participants remem- individuals to react to threatening situations in line with an acces-
bered (i.e., recognized) more recently encountered sentinel-schema sible sentinel schema: Be vigilant regarding possible danger, re-
information, reacted quickly to sentinel-related information, and spond quickly to signs of threats, warn others about these signs,
were prone to “recall” schema-biased false memories. In Study 4, and seek their help. This accessible knowledge structure probably
participants who scored higher on attachment anxiety were more contributes to the well-documented tendency of people who score
likely to process sentinel-schema information in a deep way and to high on attachment anxiety to become highly distressed in the face
generate more inferences and conjectures on the basis of this of threats and to cope with all kinds of difficulties by catastroph-
information. Studies 2 and 5 also revealed that more anxious izing, directing attention to threat-related information, expressing
participants had poorer and shallower recall of information that needs and vulnerabilities, and desperately seeking other people’s
was not congruent with the sentinel schema or that was, instead, proximity, support, and comfort (see Mikulincer & Shaver, 2007a,
congruent with the rapid fight–flight schema. Finally, Study 6 for a review).
revealed that the most attachment-anxious person in a group was Our findings also indicate that avoidant individuals possess
more likely than other group members to quickly detect a threat accessible and well-organized knowledge about a sequence of
(smoke from a malfunctioning computer). behaviors that includes rapid efforts to preserve themselves— by
With regard to attachment-related avoidance, Study 1 revealed either fight or flight—without deliberating or coordinating their
that more avoidant participants had readier access to core compo- responses with other people or expecting help from them. This
nents of the rapid fight–flight schema (escaping a dangerous accessible rapid fight–flight schema may underlie research find-
situation without helping others, acting rapidly without depending ings showing that avoidant people are reluctant to seek support in
on others’ actions, not deliberating or cooperating with others) times of distress, keep somewhat distant from and independent of
when thinking and writing a story about threatening events. Study other people, suppress distress-related thoughts, and emphasize
3 indicated that avoidant attachment is associated with schema- autonomy and self-efficacy (see Mikulincer & Shaver, 2007a, for
biased processing (false memories) and correct memories (hits) a review). Our one important failure to confirm a key prediction
and fast recognition of information relevant to the rapid fight– occurred when neither avoidance nor any of the individual-
flight schema. In Study 5, avoidant participants were more likely difference variables we measured were related to acting first to
to process rapid fight–flight–schema information in a deep way escape from or eliminate a threat. However, as noted earlier, we
and to generate more inferences and conjectures on the basis of continue to believe that the schema accessibility documented here
this information. Study 3 also revealed that more avoidant partic- in both open-ended narratives and information-processing tasks is
ipants exhibited fewer schematic memories of information that part of the explanation for insecure people’s emotional and behav-
was not congruent with the rapid fight–flight schema. Similarly, ioral reactions to threatening situations. The setting we created
Study 6 revealed that the most avoidant group member was less may have made flight too easy, not allowing us to observe “fight”
likely than the other members of his or her group to detect and or other problem-attacking reactions. Future studies should exam-
broadcast a laboratory threat. However, given the situation we ine our hypotheses in experimental settings that enable or encour-
created, avoidant attachment was not related to being first to age more varied responses to a threat.
escape a laboratory room following a group member’s detection of Together with findings from Mikulincer and colleagues (2009)
danger. and Waters and Waters (2006), the present findings suggest that,
These findings were limited to the processing of threat-relevant although insecure people lack an accessible and fully elaborated
information. Across all six studies, attachment insecurity scores secure-base script, they do possess rich, accessible alternative
were not associated with processing threat-irrelevant information. schemas. One implication of these alternative schemas is that they
We did not, however, control for participants’ general memory may distort or disrupt social interactions and close relationships.
ability or general motor-reaction speed, which may affect the For example, the sentinel schema may cause anxious individuals to
associations between attachment insecurity scores and the process- have an overly liberal criterion for detecting relationship problems
ATTACHMENT INSECURITIES AND THREAT PROCESSING 91

and partner transgressions and to exaggerate their negative conse- metric Entrance Test (PET). In T. Oakland & R. K. Hambleton (Eds.),
quences. The schema may also cause anxious people to misre- International Perspectives on Academic Assessment (pp. 207–218). Bos-
member troubling interactions with a relationship partner. The ton, MA: Kluwer.
rapid fight–flight schema may cause avoidant individuals to defer Berant, E. (1998). The association between attachment orientations and
talking with a partner about relational problems and to fail to mental health in a sample of mothers of infants diagnosed with congen-
ital heart disease. Unpublished doctoral dissertation, Bar-Ilan Univer-
coordinate problem-solving efforts with the partner. These kinds of
sity, Department of Psychology, Ramat Gan, Israel.
cognitive and action tendencies have been noted in previous stud- Birnbaum, G. E., Orr, I., Mikulincer, M., & Florian, V. (1997). When
ies (see e.g., Mikulincer, 1998; Shaver, Mikulincer, Lavy, & marriage breaks up: Does attachment style contribute to coping and
Cassidy, 2009; Simpson, Rholes, & Phillips, 1996; see J. A. mental health? Journal of Social and Personal Relationships, 14, 643–
Feeney, 2008, for a review), but the cognitive mediators had not 654. doi:10.1177/0265407597145004
been fully identified. Bowlby, J. (1973). Attachment and loss: Vol. 2. Separation: Anxiety and
Well-developed schemas can also influence what Markus and anger. New York: Basic Books.
Nurius (1986) called possible selves, future-oriented self- Bowlby, J. (1980). Attachment and loss: Vol. 3. Sadness and depression.
New York: Basic Books.
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.

conceptions that allow a person to outline steps and strategies for


This document is copyrighted by the American Psychological Association or one of its allied publishers.

accomplishing a certain goal and to organize goal-directed behav- Bowlby, J. (1982). Attachment and loss: Vol. 1. Attachment (2nd ed.). New
ior (see Markus & Ruvolo, 1989, for a review). These possible York: Basic Books.
Bowlby, J. (1988). A secure base: Clinical applications of attachment
selves closely resemble Bowlby’s (1973) conception of internal
theory. London: Routledge.
working models of self. An accessible schema biases memory and
Brennan, K. A., Clark, C. L., & Shaver, P. R. (1998). Self-report measure-
fantasies in the direction of the schema and favors deeper process- ment of adult romantic attachment: An integrative overview. In J. A.
ing of schema-congruent information (see also Rumelhart, 1980). Simpson & W. S. Rholes (Eds.), Attachment theory and close relation-
This creates a self-fulfilling prophecy about oneself in threatening ships (pp. 46 –76). New York: Guilford Press.
situations. The sentinel schema encourages a self-portrait empha- Carpenter, S. L. (1988). Self-relevant and goal-directed processing in the
sizing vulnerability, dependence, and emotional instability, recall and weighting of information about others. Journal of Experimen-
whereas the rapid fight–flight schema emphasizes strength, inde- tal Social Psychology, 24, 310 –332. doi:10.1016/0022-1031(88)
pendence, and emotional suppression. The schematic components 90023-6
of models of self and their influence on imagined possible selves Cassidy, J., & Kobak, R. R. (1988). Avoidance and its relationship with
deserve further research attention. other defensive processes. In J. Belsky & T. Nezworski (Eds.), Clinical
Overall, our findings supported SDT’s (Ein-Dor et al., 2010) implications of attachment (pp. 300 –323). Hillsdale, NJ: Erlbaum.
Cassidy, J., & Shaver, P. R. (Eds.). (2008). Handbook of attachment:
predictions that each of the major attachment orientations (secure,
Theory, research, and clinical applications (2nd ed.). New York: Guil-
anxious, and avoidant) is associated with a specific schema for
ford Press.
processing threat-related information that may increase the inclu- Catrambone, R., & Markus, H. (1987). The role of self-schemas in going
sive fitness of members of groups that are diverse with respect to beyond the information given. Social Cognition, 5, 349 –368.
attachment orientations. These diverse groups should detect po- Collins, N. L., & Read, S. J. (1990). Adult attachment, working models,
tential problems and threats quickly (with the help of anxious and relationship quality in dating couples. Journal of Personality and
members’ sentinel schemas); act quickly without much delibera- Social Psychology, 58, 644 – 663.
tion, negotiation, or compromise (with the help of avoidant mem- Crowne, D. P., & Marlowe, D. (1964). A new scale of social desirability
bers’ rapid fight–flight schemas); and manage complex social independent of psychopathology. Journal of Consulting Psychology, 24,
tasks (with the help of secure members’ secure-base schemas). 349 –354. doi:10.1037/h0047358
All six of our studies were conducted with Israeli undergradu- Ein-Dor, T., Mikulincer, M., Doron, G., & Shaver, P. R. (2010). The
ates, and attachment insecurities were assessed with a single self- attachment paradox: How can so many of us (the insecure ones) have no
adaptive advantages? Perspectives on Psychological Science, 5, 123–
report measure, the ECR. Future studies should include other kinds
141. doi:10.1177/1745691610362349
of samples and other kinds of attachment measures (e.g., the Adult
Ein-Dor, T., Mikulincer, M., & Shaver, P. R. (in press). Effective reaction
Attachment Interview, as explained by Hesse, 2008). Despite these to danger: Attachment insecurities predict behavioral reactions to an
limitations, the six studies described here contribute novel and, we experimentally induced threat above and beyond general personality
believe, important insights into the kinds of implicit procedural traits. Social Psychological and Personality Science.
knowledge that organize perceptions, expectations, memories, and Feeney, B. C., & Collins, N. L. (2001). Predictors of caregiving in adult
action plans of people with different attachment styles. intimate relationships: An attachment theoretical perspective. Journal of
Personality and Social Psychology, 80, 972–994.
Feeney, J. A. (2008). Adult romantic attachment and couple relationships.
References
In J. Cassidy & P. R. Shaver (Eds.), Handbook of attachment: Theory,
Aiken, L. S., & West, S. G. (1991). Multiple regression: Testing and research, and clinical applications (2nd ed., pp. 456 – 481). New York:
interpreting interactions. Newbury Park, CA: Sage. Guilford Press.
Ainsworth, M. D. S., Blehar, M. C., Waters, E., & Wall, S. (1978). Patterns Feeney, J. A., & Noller, P. (1990). Attachment style as a predictor of adult
of attachment: Assessed in the strange situation and at home. Hillsdale, romantic relationships. Journal of Personality and Social Psychology,
NJ: Erlbaum. 58, 281–291. doi:10.1037/0022-3514.58.2.281
Alexander, R., Feeney, J., Hohaus, L., & Noller, P. (2001). Attachment Fraley, R. C., & Shaver, P. R. (1997). Adult attachment and the suppres-
style and coping resources as predictors of coping strategies in the sion of unwanted thoughts. Journal of Personality and Social Psychol-
transition to parenthood. Personal Relationships, 8, 137–152. doi: ogy, 73, 1080 –1091. doi:10.1037/0022-3514.73.5.1080
10.1111/j.1475-6811.2001.tb00032.x Fraley, R. C., & Shaver, P. R. (1998). Airport separations: A naturalistic
Beller, M. (1995). Translated versions of Israel’s inter-university Psycho- study of adult attachment dynamics in separating couples. Journal of
92 EIN-DOR, MIKULINCER, AND SHAVER

Personality and Social Psychology, 75, 1198 –1212. doi:10.1037/0022- sonality and Social Psychology Bulletin, 21, 406 – 414. doi:10.1177/
3514.75.5.1198 0146167295214011
Fraley, R. C., & Shaver, P. R. (2000). Adult romantic attachment: Theo- Mikulincer, M., & Florian, V. (1998). The relationship between adult
retical developments, emerging controversies, and unanswered ques- attachment styles and emotional and cognitive reactions to stressful
tions. Review of General Psychology, 4, 132–154. doi:10.1037/1089- events. In J. A. Simpson & W. S. Rholes (Eds.), Attachment theory and
2680.4.2.132 close relationships (pp. 143–165). New York: Guilford Press.
Hamilton, W. D. (1964a). The genetical evolution of social behaviour: I. Mikulincer, M., Florian, V., & Weller, A. (1993). Attachment styles,
Journal of Theoretical Biology, 7, 1–16. coping strategies, and posttraumatic psychological distress: The impact
Hamilton, W. D. (1964b). The genetical evolution of social behaviour: II. of the Gulf War in Israel. Journal of Personality and Social Psychology,
Journal of Theoretical Biology, 7, 17–52. 64, 817– 826. doi:10.1037/0022-3514.64.5.817
Hazan, C., & Zeifman, D. (1999). Pair-bonds as attachments: Evaluating Mikulincer, M., Gillath, O., & Shaver, P. R. (2002). Activation of the
the evidence. In J. Cassidy & P. R. Shaver (Eds.), Handbook of attach- attachment system in adulthood: Threat-related primes increase the
ment: Theory, research, and clinical applications (pp. 336 –354). New accessibility of mental representations of attachment figures. Journal of
York: Guilford. Personality and Social Psychology, 83, 881– 895. doi:10.1037/0022-
Hesse, E. (2008). The Adult Attachment Interview: Protocol, method of 3514.83.4.881
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.
This document is copyrighted by the American Psychological Association or one of its allied publishers.

analysis, and empirical studies. In J. Cassidy & P. R. Shaver (Eds.), Mikulincer, M., Hirschberger, G., Nachmias, O., & Gillath, O. (2001). The
Handbook of attachment: Theory, research, and clinical applications affective component of the secure base schema: Affective priming with
(2nd ed., pp. 552–598). New York: Guilford Press. representations of attachment security. Journal of Personality and Social
John, O., Donahue, E., & Kentle, R. (1991). The “Big Five” Invento- Psychology, 81, 305–321. doi:10.1037/0022-3514.81.2.305
ry—Versions 4a and 54 (Technical Report). Berkeley, CA: Institute Mikulincer, M., Orbach, I., & Iavnieli, D. (1998). Adult attachment style
of Personality Assessment and Research, University of California, and affect regulation: Strategic variations in subjective self-other simi-
Berkeley. larity. Journal of Personality and Social Psychology, 75, 436 – 448.
Kanagawa, C., Cross, S. E., & Markus, H. R. (2001). “Who am I?” The doi:10.1037/0022-3514.75.2.436
cultural psychology of the conceptual self. Personality and Social Psy- Mikulincer, M., & Shaver, P. R. (2003). The attachment behavioral system
chology Bulletin, 27, 90 –103. doi:10.1177/0146167201271008 in adulthood: Activation, psychodynamics, and interpersonal processes.
Lurigio, A. J., & Carroll, J. S. (1985). Probation officers’ schemata of In M. P. Zanna (Ed.), Advances in experimental social psychology (pp.
offenders: Content, development, and impact on treatment decisions. 53–152). New York: Academic Press.
Journal of Personality and Social Psychology, 48, 1112–1126. doi: Mikulincer, M., & Shaver, P. R. (2007a). Attachment in adulthood: Struc-
10.1037/0022-3514.48.5.1112 ture, dynamics, and change. New York: Guilford Press.
Lussier, Y., Sabourin, S., & Turgeon, C. (1997). Coping strategies as Mikulincer, M., & Shaver, P. R. (2007b). Boosting attachment security to
moderators of the relationship between attachment and marital adjust- promote mental health, prosocial values, and inter-group tolerance.
ment. Journal of Social and Personal Relationships, 14, 777–791. doi: Psychological Inquiry, 18, 139 –156.
10.1177/0265407597146004 Mikulincer, M., Shaver, P. R., & Pereg, D. (2003). Attachment theory and
Main, M. (1990). Cross-cultural studies of attachment organization: Recent affect regulation: The dynamics, development, and cognitive conse-
studies, changing methodologies, and the concept of conditional strate- quences of attachment-related strategies. Motivation and Emotion, 27,
gies. Human Development, 33, 48 – 61. doi:10.1159/000276502 77–102. doi:10.1023/A:1024515519160
Markus, H. (1977). Self-schemata and processing information about the Mikulincer, M., Shaver, P. R., Sapir-Lavid, Y., & Avihou-Kanza, N.
self. Journal of Personality and Social Psychology, 35, 63–78. doi: (2009). What’s inside the minds of securely and insecurely attached
10.1037/0022-3514.35.2.63 people? The secure-base script and its associations with attachment-style
Markus, H. (1980). The self in thought and memory. In D. M. Wegner & dimensions. Journal of Personality and Social Psychology, 97, 615–
R. R. Vallacher (Eds.), The self in social psychology (pp. 102–130). New 633. doi:10.1037/a0015649
York: Oxford University Press. Noftle, E. E., & Shaver, P. R. (2006). Attachment dimensions and the Big
Markus, H., & Nurius, P. (1986). Possible selves. American Psychologist, Five personality traits: Associations and comparative ability to predict
41, 954 –969. doi:10.1037/0003-066X.41.9.954 relationship quality. Journal of Research in Personality, 40, 179 –208.
Markus, H., & Ruvolo, A. (1989). Possible selves: Personalized represen- doi:10.1016/j.jrp.2004.11.003
tations of goals. In L. Pervin (Ed.), Goal concepts in personality and Proulx, G. (2003). Researchers learn from World Trade Center survivors’
social psychology (pp. 211–241). Hillsdale, NJ: Erlbaum. accounts. Construction Innovation, 8(1), 1–3.
Markus, H. R., & Sentis, K. P. (1982). The self in social information Rice, K. G., Cunningham, T. J., & Young, M. B. (1997). Attachment to
processing. In J. Suls (Ed.,) Psychological perspectives on the self (Vol. parents, social competence, and emotional well-being: A comparison of
1, pp. 41–70). Hillsdale, NJ: Erlbaum. Black and White adolescents. Journal of Counseling Psychology, 44,
Markus, H., Smith, J., & Moreland, R. L. (1985). The role of the self- 89 –101. doi:10.1037/0022-0167.44.1.89
concept in the perception of others. Journal of Personality and Social Roediger, H. L., & McDermott, K. B. (1995). Creating false memories:
Psychology, 49, 1494 –1512. doi:10.1037/0022-3514.49.6.1494 Remembering words not presented in lists. Journal of Experimental
Mikulincer, M. (1998). Adult attachment style and individual differences in Psychology: Learning, Memory, and Cognition, 21, 803– 814. doi:
functional versus dysfunctional experiences of anger. Journal of Per- 10.1037/0278-7393.21.4.803
sonality and Social Psychology, 74, 513–524. doi:10.1037/0022- Rumelhart, D. E. (1980). Schemata: The building blocks of cognition. In
3514.74.2.513 R. J. Spiro, B. C. Bruce, & W. F. Brewer (Eds.), Theoretical issues in
Mikulincer, M., Birnbaum, G., Woddis, D., & Nachmias, O. (2000). Stress reading comprehension (pp. 33–58). Hillsdale, NJ: Erlbaum.
and accessibility of proximity-related thoughts: Exploring the normative Shaver, P. R., & Mikulincer, M. (2002). Attachment-related psychodynam-
and intraindividual components of attachment theory. Journal of Per- ics. Attachment and Human Development, 4, 133–161. doi:10.1080/
sonality and Social Psychology, 78, 509 –523. doi:10.1037/0022- 14616730210154171
3514.78.3.509 Shaver, P. R., Mikulincer, M., Lavy, S., & Cassidy, J. (2009). Understand-
Mikulincer, M., & Florian, V. (1995). Appraisal of and coping with a ing and altering hurt feelings: An attachment-theoretical perspective on
real-life stressful situation: The contribution of attachment styles. Per- the generation and regulation of emotions. In A. Vangelisti (Ed.), Feel-
ATTACHMENT INSECURITIES AND THREAT PROCESSING 93

ing hurt in close relationships (pp. 92–122). New York: Cambridge missing attachment and outcome in diabetes: The mediating role of
University Press. doi:10.1017/CBO9780511770548.007 coping. Journal of Social and Clinical Psychology, 22, 607– 626. doi:
Shorey, H. S., Snyder, C. R., Yang, X., & Lewin, M. R. (2003). The role 10.1521/jscp.22.6.607.22933
of hope as a mediator in recollected parenting, adult attachment, and Van Lange, P. A. M., Otten, W., De Bruin, E. M. N., & Joireman, J. A.
mental health. Journal of Social and Clinical Psychology, 22, 685–715. (1997). Development of prosocial, individualistic, and competitive ori-
doi:10.1521/jscp.22.6.685.22938 entations: Theory and preliminary evidence. Journal of Personality and
Simpson, J. A., Rholes, W. S., & Nelligan, J. S. (1992). Support seeking Social Psychology, 73, 733–746.
and support giving within couples in an anxiety-provoking situation: The Waters, H. S., Rodrigues, L. M., & Ridgeway, D. (1998). Cognitive
role of attachment styles. Journal of Personality and Social Psychology, underpinnings of narrative attachment assessment. Journal of Experi-
62, 434 – 446. doi:10.1037/0022-3514.62.3.434 mental Child Psychology, 71, 211–234. doi:10.1006/jecp.1998.2473
Simpson, J. A., Rholes, W. S., & Phillips, D. (1996). Conflict in close Waters, H. S., & Waters, E. (2006). The attachment working models
relationships: An attachment perspective. Journal of Personality and concept: Among other things, we build scriptlike representations of
Social Psychology, 71, 899 –914. doi:10.1037/0022-3514.71.5.899 secure base experiences. Attachment and Human Development, 8, 185–
Turan, B., Osar, Z., Turan, J. M., Ilkova, H., & Damci, T. (2003). Dis- 197. doi:10.1080/14616730600856016
This article is intended solely for the personal use of the individual user and is not to be disseminated broadly.
This document is copyrighted by the American Psychological Association or one of its allied publishers.

Appendix

Drawing Used in Study 1

Received April 26, 2010


Revision received July 12, 2010
Accepted July 13, 2010 䡲

You might also like