Divide and rule (from Latin dīvide et imperā), or divide and conquer, in politics and sociology is gaining and maintaining power by breaking up larger concentrations of power into pieces that individually have less power than the one implementing the strategy.
“Divide et impera” is cited as a common principle in politics by Traiano Boccalini in La bilancia politica. The use of this technique is meant to empower the sovereign to control subjects, populations, or factions of different interests, who collectively might be able to oppose his rule. Machiavelli identifies a similar application to military strategy, advising in Book VI of The Art of War (L’arte della guerra): a Captain should endeavor with every art to divide the forces of the enemy. Machiavelli advises this act be achieved either by making him suspicious of his men in whom he trusted, or by giving him cause that he has to separate his forces, and, because of this, become weaker.
The maxim divide et impera has been attributed to Philip II of Macedon. It was utilised by the Roman ruler Caesar and the French emperor Napoleon (together with the maxim divide ut regnes).
Elements of this technique involve:
creating or encouraging divisions among the subjects to prevent alliances that could challenge the sovereign
aiding and promoting those who are willing to cooperate with the sovereign
fostering distrust and enmity between local rulers
encouraging meaningless expenditures that reduce the capability for political and military spending
Display first page of the original German manuscript
Listen to the audio-version (LibriVox)
What Is Enlightenment? by Immanuel Kant (1784)
Enlightenment is man’s emergence from his self-imposed nonage. Nonage is the inability to use one’s own understanding without another’s guidance. This nonage is self-imposed if its cause lies not in lack of understanding but in indecision and lack of courage to use one’s own mind without another’s guidance. Dare to know! (Sapere aude.) “Have the courage to use your own understanding,” is therefore the motto of the enlightenment.
Laziness and cowardice are the reasons why such a large part of mankind gladly remain minors all their lives, long after nature has freed them from external guidance. They are the reasons why it is so easy for others to set themselves up as guardians. It is so comfortable to be a minor. If I have a book that thinks for me, a pastor who acts as my conscience, a physician who prescribes my diet, and so on–then I have no need to exert myself. I have no need to think, if only I can pay; others will take care of that disagreeable business for me. Those guardians who have kindly taken supervision upon themselves see to it that the overwhelming majority of mankind–among them the entire fair sex–should consider the step to maturity, not only as hard, but as extremely dangerous. First, these guardians make their domestic cattle stupid and carefully prevent the docile creatures from taking a single step without the leading-strings to which they have fastened them. Then they show them the danger that would threaten them if they should try to walk by themselves. Now this danger is really not very great; after stumbling a few times they would, at last, learn to walk. However, examples of such failures intimidate and generally discourage all further attempts.
Thus it is very difficult for the individual to work himself out of the nonage which has become almost second nature to him. He has even grown to like it, and is at first really incapable of using his own understanding because he has never been permitted to try it. Dogmas and formulas, these mechanical tools designed for reasonable use–or rather abuse–of his natural gifts, are the fetters of an everlasting nonage. The man who casts them off would make an uncertain leap over the narrowest ditch, because he is not used to such free movement. That is why there are only a few men who walk firmly, and who have emerged from nonage by cultivating their own minds.
It is more nearly possible, however, for the public to enlighten itself; indeed, if it is only given freedom, enlightenment is almost inevitable. There will always be a few independent thinkers, even among the self-appointed guardians of the multitude. Once such men have thrown off the yoke of nonage, they will spread about them the spirit of a reasonable appreciation of man’s value and of his duty to think for himself. It is especially to be noted that the public which was earlier brought under the yoke by these men afterwards forces these very guardians to remain in submission, if it is so incited by some of its guardians who are themselves incapable of any enlightenment. That shows how pernicious it is to implant prejudices: they will eventually revenge themselves upon their authors or their authors’ descendants. Therefore, a public can achieve enlightenment only slowly. A revolution may bring about the end of a personal despotism or of avaricious tyrannical oppression, but never a true reform of modes of thought. New prejudices will serve, in place of the old, as guide lines for the unthinking multitude.
This enlightenment requires nothing but freedom–and the most innocent of all that may be called “freedom”: freedom to make public use of one’s reason in all matters. Now I hear the cry from all sides: “Do not argue!” The officer says: “Do not argue–drill!” The tax collector: “Do not argue–pay!” The pastor: “Do not argue–believe!” Only one ruler in the world says: “Argue as much as you please, but obey!” We find restrictions on freedom everywhere. But which restriction is harmful to enlightenment? Which restriction is innocent, and which advances enlightenment? I reply: the public use of one’s reason must be free at all times, and this alone can bring enlightenment to mankind.
On the other hand, the private use of reason may frequently be narrowly restricted without especially hindering the progress of enlightenment. By “public use of one’s reason” I mean that use which a man, as scholar, makes of it before the reading public. I call “private use” that use which a man makes of his reason in a civic post that has been entrusted to him. In some affairs affecting the interest of the community a certain [governmental] mechanism is necessary in which some members of the community remain passive. This creates an artificial unanimity which will serve the fulfillment of public objectives, or at least keep these objectives from being destroyed. Here arguing is not permitted: one must obey. Insofar as a part of this machine considers himself at the same time a member of a universal community–a world society of citizens–(let us say that he thinks of himself as a scholar rationally addressing his public through his writings) he may indeed argue, and the affairs with which he is associated in part as a passive member will not suffer. Thus it would be very unfortunate if an officer on duty and under orders from his superiors should want to criticize the appropriateness or utility of his orders. He must obey. But as a scholar he could not rightfully be prevented from taking notice of the mistakes in the military service and from submitting his views to his public for its judgment. The citizen cannot refuse to pay the taxes levied upon him; indeed, impertinent censure of such taxes could be punished as a scandal that might cause general disobedience. Nevertheless, this man does not violate the duties of a citizen if, as a scholar, he publicly expresses his objections to the impropriety or possible injustice of such levies. A pastor, too, is bound to preach to his congregation in accord with the doctrines of the church which he serves, for he was ordained on that condition. But as a scholar he has full freedom, indeed the obligation, to communicate to his public all his carefully examined and constructive thoughts concerning errors in that doctrine and his proposals concerning improvement of religious dogma and church institutions. This is nothing that could burden his conscience. For what he teaches in pursuance of his office as representative of the church, he represents as something which he is not free to teach as he sees it. He speaks as one who is employed to speak in the name and under the orders of another. He will say: “Our church teaches this or that; these are the proofs which it employs.” Thus he will benefit his congregation as much as possible by presenting doctrines to which he may not subscribe with full conviction. He can commit himself to teach them because it is not completely impossible that they may contain hidden truth. In any event, he has found nothing in the doctrines that contradicts the heart of religion. For if he believed that such contradictions existed he would not be able to administer his office with a clear conscience. He would have to resign it. Therefore the use which a scholar makes of his reason before the congregation that employs him is only a private use, for no matter how sizable, this is only a domestic audience. In view of this he, as preacher, is not free and ought not to be free, since he is carrying out the orders of others. On the other hand, as the scholar who speaks to his own public (the world) through his writings, the minister in the public use of his reason enjoys unlimited freedom to use his own reason and to speak for himself. That the spiritual guardians of the people should themselves be treated as minors is an absurdity which would result in perpetuating absurdities.
But should a society of ministers, say a Church Council, . . . have the right to commit itself by oath to a certain unalterable doctrine, in order to secure perpetual guardianship over all its members and through them over the people? I say that this is quite impossible. Such a contract, concluded to keep all further enlightenment from humanity, is simply null and void even if it should be confirmed by the sovereign power, by parliaments, and the most solemn treaties. An epoch cannot conclude a pact that will commit succeeding ages, prevent them from increasing their significant insights, purging themselves of errors, and generally progressing in enlightenment. That would be a crime against human nature whose proper destiny lies precisely in such progress. Therefore, succeeding ages are fully entitled to repudiate such decisions as unauthorized and outrageous. The touchstone of all those decisions that may be made into law for a people lies in this question: Could a people impose such a law upon itself? Now it might be possible to introduce a certain order for a definite short period of time in expectation of better order. But, while this provisional order continues, each citizen (above all, each pastor acting as a scholar) should be left free to publish his criticisms of the faults of existing institutions. This should continue until public understanding of these matters has gone so far that, by uniting the voices of many (although not necessarily all) scholars, reform proposals could be brought before the sovereign to protect those congregations which had decided according to their best lights upon an altered religious order, without, however, hindering those who want to remain true to the old institutions. But to agree to a perpetual religious constitution which is not publicly questioned by anyone would be, as it were, to annihilate a period of time in the progress of man’s improvement. This must be absolutely forbidden.
A man may postpone his own enlightenment, but only for a limited period of time. And to give up enlightenment altogether, either for oneself or one’s descendants, is to violate and to trample upon the sacred rights of man. What a people may not decide for itself may even less be decided for it by a monarch, for his reputation as a ruler consists precisely in the way in which he unites the will of the whole people within his own. If he only sees to it that all true or supposed [religious] improvement remains in step with the civic order, he can for the rest leave his subjects alone to do what they find necessary for the salvation of their souls. Salvation is none of his business; it is his business to prevent one man from forcibly keeping another from determining and promoting his salvation to the best of his ability. Indeed, it would be prejudicial to his majesty if he meddled in these matters and supervised the writings in which his subjects seek to bring their [religious] views into the open, even when he does this from his own highest insight, because then he exposes himself to the reproach: Caesar non est supra grammaticos. 2 It is worse when he debases his sovereign power so far as to support the spiritual despotism of a few tyrants in his state over the rest of his subjects.
When we ask, Are we now living in an enlightened age? the answer is, No, but we live in an age of enlightenment. As matters now stand it is still far from true that men are already capable of using their own reason in religious matters confidently and correctly without external guidance. Still, we have some obvious indications that the field of working toward the goal [of religious truth] is now opened. What is more, the hindrances against general enlightenment or the emergence from self-imposed nonage are gradually diminishing. In this respect this is the age of the enlightenment and the century of Frederick [the Great].
A prince ought not to deem it beneath his dignity to state that he considers it his duty not to dictate anything to his subjects in religious matters, but to leave them complete freedom. If he repudiates the arrogant word “tolerant”, he is himself enlightened; he deserves to be praised by a grateful world and posterity as that man who was the first to liberate mankind from dependence, at least on the government, and let everybody use his own reason in matters of conscience. Under his reign, honorable pastors, acting as scholars and regardless of the duties of their office, can freely and openly publish their ideas to the world for inspection, although they deviate here and there from accepted doctrine. This is even more true of every person not restrained by any oath of office. This spirit of freedom is spreading beyond the boundaries [of Prussia] even where it has to struggle against the external hindrances established by a government that fails to grasp its true interest. [Frederick’s Prussia] is a shining example that freedom need not cause the least worry concerning public order or the unity of the community. When one does not deliberately attempt to keep men in barbarism, they will gradually work out of that condition by themselves.
I have emphasized the main point of the enlightenment–man’s emergence from his self-imposed nonage–primarily in religious matters, because our rulers have no interest in playing the guardian to their subjects in the arts and sciences. Above all, nonage in religion is not only the most harmful but the most dishonorable. But the disposition of a sovereign ruler who favors freedom in the arts and sciences goes even further: he knows that there is no danger in permitting his subjects to make public use of their reason and to publish their ideas concerning a better constitution, as well as candid criticism of existing basic laws. We already have a striking example [of such freedom], and no monarch can match the one whom we venerate.
But only the man who is himself enlightened, who is not afraid of shadows, and who commands at the same time a well disciplined and numerous army as guarantor of public peace–only he can say what [the sovereign of] a free state cannot dare to say: “Argue as much as you like, and about what you like, but obey!” Thus we observe here as elsewhere in human affairs, in which almost everything is paradoxical, a surprising and unexpected course of events: a large degree of civic freedom appears to be of advantage to the intellectual freedom of the people, yet at the same time it establishes insurmountable barriers. A lesser degree of civic freedom, however, creates room to let that free spirit expand to the limits of its capacity. Nature, then, has carefully cultivated the seed within the hard core–namely the urge for and the vocation of free thought. And this free thought gradually reacts back on the modes of thought of the people, and men become more and more capable of acting in freedom. At last free thought acts even on the fundamentals of government and the state finds it agreeable to treat man, who is now more than a machine, in accord with his dignity.
IMSI catchers (international mobile subscriber identity-catcher) are portable surveillance tools used for spying on thousands of phones in a targeted area, tracking their location and even intercepting calls, messages, and data. They are supposed to help identify serious criminals, but cannot operate without monitoring innocent people too. UK police have IMSI catchers, but they refuse to tell the public how and when they are used. This has privacy campaigners worried…
Further References
van den Broek, F., Verdult, R., & de Ruiter, J.. (2015). Defeating IMSI Catchers. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security – CCS ’15 (pp. 340–351). New York, New York, USA: ACM Press
“IMSI catching is a problem on all generations of mobile telecommunication networks, i.e., 2g (gsm, gprs), 3g (hdspa, edge, umts) and 4g (lte, lte+). currently, the sim card of a mobile phone has to reveal its identity over an insecure plaintext transmission, before encryption is enabled. this identifier (the imsi) can be intercepted by adversaries that mount a passive or active attack. such identity exposure attacks are commonly referred to as ‘imsi catching’. since the imsi is uniquely identifying, unautho-rized exposure can lead to various location privacy attacks. we propose a solution, which essentially replaces the im-sis with changing pseudonyms that are only identifiable by the home network of the sim’s own network provider. con-sequently, these pseudonyms are unlinkable by intermedi-ate network providers and malicious adversaries, and there-fore mitigate both passive and active attacks, which we also formally verified using proverif. our solution is compati-ble with the current specifications of the mobile standards and therefore requires no change in the infrastructure or any of the already massively deployed network equipment. the proposed method only requires limited changes to the sim and the authentication server, both of which are un-der control of the user’s network provider. therefore, any individual (virtual) provider that distributes sim cards and controls its own authentication server can deploy a more pri-vacy friendly mobile network that is resilient against imsi catching attacks.”
Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E.. (2014). IMSI-catch me if you can. In Proceedings of the 30th Annual Computer Security Applications Conference on – ACSAC ’14 (pp. 246–255). New York, New York, USA: ACM Press
“IMSI catchers are used in mobile networks to identify and eavesdrop on phones. when, the number of vendors in-creased and prices dropped, the device became available to much larger audiences. self-made devices based on open source software are available for about us$ 1,500. in this paper, we identify and describe multiple methods of detecting artifacts in the mobile network produced by such devices. we present two independent novel implementations of an imsi catcher catcher (icc) to detect this threat against everyone’s privacy. the first one employs a network of stationary (sicc) measurement units installed in a geo-graphical area and constantly scanning all frequency bands for cell announcements and fingerprinting the cell network parameters. these rooftop-mounted devices can cover large areas. the second implementation is an app for standard consumer grade mobile phones (micc), without the need to root or jailbreak them. its core principle is based upon geographical network topology correlation, facilitating the ubiquitous built-in gps receiver in today’s phones and a network cell capabilities fingerprinting technique. the latter works for the vicinity of the phone by first learning the cell landscape and than matching it against the learned data. we implemented and evaluated both solutions for digital self-defense and deployed several of the stationary units for a long term field-test. finally, we describe how to detect recently published denial of service attacks.”
Norrman, K., Näslund, M., & Dubrova, E.. (2016). Protecting IMSI and User Privacy in 5G Networks. In Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications. ACM
“In recent years, many cases of compromising users’ privacy in telecom networks have been reported. stories of ‘fake’ base stations capable of tracking users and collecting their personal data without users’ knowledge have emerged. the current way of protecting privacy does not provide any protection against an active attacker on the air-interface, claiming to be a legitimate network that has lost the temporary identity. moreover, there is also no protection against passive eavesdroppers who are present when requests for international mobile subscriber identity (imsi) are made. this paper presents a new method for protecting the imsi by means of establishing a pseudonym between the user equipment and the home network. the pseudonym is derived locally at the user equipment and the home network without affecting existing universal subscriber identity modules (usims). we analyse the solution from a technical perspective , as well as from a regulatory and operational perspective. the presented method protects the imsi from passive and active imsi-catchers as well as honest but curious serving networks. moreover, it can recover from lock-out situations where one party has lost the pseudonym.”
“Cell-site simulators, also known as imsi-catchers and stingrays, are used around the world by governments and criminals to track and eavesdrop on cell phones. despite extensive public debate surrounding their use, few hard facts about them are available. for example, the richest sources of information on u.s. government cell-site simulator usage are from anonymous leaks, public records requests, and court proceedings. this lack of concrete information and the difficulty of independently obtaining such information hampers the public discussion. to address this deficiency, we build, deploy, and evaluate seaglass , a city-wide cellsite simulator detection network. seaglass consists of sensors that measure and upload data on the cellular environment to find the signatures of portable cell-site simulators. seaglass sensors are designed to be robust, low-maintenance, and deployable in vehicles for long durations. the data they generate is used to learn a city’s network properties to find anomalies consistent with cell-site simulators. we installed seaglass sensors into 15 ridesharing vehicles across two cities, collecting two months of data in each city. using this data, we evaluate the system and show how seaglass can be used to detect signatures of portable cell-site simulators. finally, we evaluate our signature detection methods and discuss anomalies discovered in the data.”
OHanlon, P., Borgaonkar, R., & Hirschi, L.. (2017). Mobile Subscriber WiFi Privacy. In 2017 IEEE Security and Privacy Workshops (SPW) (pp. 169–178). IEEE
“—This paper investigates and analyses the insufficient protections afforded to mobile identities when using today’s operator backed wifi services. specifically we detail a range of attacks, on a set of widely deployed authentication protocols, that enable a malicious user to obtain and track a user’s international mobile subscriber identity (imsi) over wifi. these attacks are possible due to a lack of sufficient privacy protection measures, which are exacerbated by preconfigured device profiles. we provide a formal analysis of the protocols involved, examine their associated configuration profiles, and document our experiences with reporting the issues to the relevant stakeholders. we detail a range of potential countermeasures to tackle these issues to ensure that privacy is better protected in the future.”
Ekene, O. E., Ruhl, R., & Zavarsky, P.. (2016). Enhanced User Security and Privacy Protection in 4G LTE Network. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) (pp. 443–448). IEEE
“Although the evolved packet system authentication and key agreement (eps-aka) provides security and privacy enhancements in 3rd generation partnership project (3gpp), the international mobile subscriber identity (imsi) is sent in clear text in order to obtain service. various efforts to provide security mechanisms to protect this unique private identity have not resulted in methods implemented to protect the disclosure of the imsi. the exposure of the imsi brings risk to user privacy, and knowledge of it can lead to several passive and active attacks targeted at specific imsi’s and their respective users. further, the temporary mobile subscribers identity (tmsi) generated by the authentication center (auc) have been found to be prone to rainbow and brute force attacks, hence an attacker who gets hold of the tmsi can be able to perform social engineering in tracing the tmsi to the corresponding imsi of a user equipment (ue). this paper proposes a change to the eps-aka authentication process in 4g long term evolution (lte) network by including the use of public key infrastructure (pki). the change would result in the imsi never being released in the clear in an untrusted network.”
“You’re travelling, working on a new deal that’s just about to close. you’re involved in the final negotiations. you need to check a few points with colleagues back at base. you call them from a quiet place, away from eavesdroppers, from your mobile. but what about electronic eavesdroppers? these days a voice call is just another piece of data and it can be easily intercepted without you ever knowing. the apps you use on your mobile devices might claim to be secure – but is the device itself? what might it be giving away about you? the way our mobile networks function means that information can be intercepted and harvested by so-called imsi catchers. this could have a significant impact on your security and privacy. so what are these devices, what dangers do they pose and how can you protect yourself? andy lilly of armour communications provides some answers.”
Tu quoque (Latin for “you also”), or the appeal to hypocrisy, is a fallacy that intends to discredit the opponent’s argument by asserting the opponent’s failure to act consistently in accordance with its conclusion(s). That is, it is claimed that the argument is flawed by pointing out that the persona making the argument is not acting consistently with the claims of the argument.
The logically fallacious tu quoque “argument” follows the pattern:
Person A makes claim X. Person B asserts that A’s actions or past claims are inconsistent with the truth of claim X. Therefore, X is false.
An example would be
Peter: “Bill is guilty of defrauding the government out of tax dollars.” Bill: “How can you say that when you yourself have 20 outstanding parking tickets?”
It is a fallacy because the moral character or actions of the opponent are generally irrelevant to the logic of the argument. It is often used as a red herring tactic and is a special case of the ad hominem fallacy, which is a category of fallacies in which a claim or argument is rejected on the basis of facts about the person presenting or supporting the claim or argument.
Example
In the trial of Nazi criminal Klaus Barbie, the controversial lawyer Jacques Vergès tried to present what was defined as a Tu Quoque Defence—i.e., that during the Algerian War, French officers such as General Jacques Massu had committed war crimes similar to those with which Barbie was being charged, and therefore the French state had no moral right to try Barbie. This defense was rejected by the court, which convicted Barbie.
Further References
Walton, D. (1998). Ad hominem arguments. University of Alabama Press.
Power structure research is an approach to the study of power that highlights the unequal distribution of resources upon which power is based (e.g., wealth, political office, control of the mass media) and the importance of formal and informal social networks as the means by which power is concentrated and institutionalized.
Coöptation (also co-optation) has two common meanings: It may refer to the process of adding members to an elite group at the discretion of members of the body, usually to manage opposition and so maintain the stability of the group. Outsiders are ‘co-opted’ by being given a degree of power on the grounds of their élite status, specialist knowledge, or potential ability to threaten essential commitments or goals (“formal co-optation”).
In a classic 1979 article for Harvard Business Review, consultants John Kotter and Leonard Schlesinger presented co-optation as a “form of manipulation” for dealing with employees who are resistant to new management programs:
Co-opting an individual usually involves giving him or her a desirable role in the design or implementation of the change. Co-opting a group involves giving one of its leaders, or someone it respects, a key role in the design or implementation of a change. This is not a form of participation, however, because the initiators do not want the advice of the co-opted, merely his or her endorsement.
Internal coöptation, on the other hand, involves the process of internalization.
Habituation is a form of non-associative learning in which an innate (non-reinforced) response to a stimulus decreases after repeated or prolonged presentations of that stimulus. Responses that habituate include those that involve the intact organism (e.g., full-body startle response) or those that involve only components of the organism (e.g., habituation of neurotransmitter release from in vitro Aplysia sensory neurons). The response-system learns to stop responding to a stimulus which is no longer biologically relevant. For example, organisms may habituate to repeated sudden loud noises when they learn these have no consequences. Habituation usually refers to a reduction in innate behaviours, rather than behaviours acquired during conditioning (in which case the process is termed “extinction”). A progressive decline of a behavior in a habituation procedure may also reflect nonspecific effects such as fatigue, which must be ruled out when the interest is in habituation as a learning process.
Further References
Dong, S., & Clayton, D. F.. (2009). Habituation in songbirds. Neurobiology of Learning and Memory, 92(2), 183–188.
“Much of what psychologists know about infant perception and cognition is based on habituation, but the process itself is still poorly understood. here the authors offer a dynamic field model of infant visual habituation, which simulates the known features of habituation, including familiarity and novelty effects, stimulus intensity effects, and age and individual differences. the model is based on a general class of dynamic (time-based) models that integrate environmental input in varying metric dimensions to reach a single decision. here the authors provide simulated visual input of varying strengths, distances, and durations to 2 coupled and interacting fields. the 1st represents the activation that drives ‘looking,’ and the 2nd, the inhibition that leads to ‘looking away,’ or habituation. by varying the parameters of the field, the authors simulate the time course of habituation trials and show how these dynamics can lead to different depths of habituation, which then determine how the system dishabituates. the authors use the model to simulate a set of influential experiments by r. baillargeon (1986, 1987a, 1987b) using the well-known ‘drawbridge’ paradigm. the dynamic field model provides a coherent explanation without invoking infant object knowledge. the authors show that small changes in model parameters can lead to qualitatively different outcomes. because in typical infant cognition experiments, critical parameters are unknown, effects attributed to conceptual knowledge may be explained by the dynamics of habituation.”
LEUSSIS, M., & BOLIVAR, V.. (2006). Habituation in rodents: A review of behavior, neurobiology, and genetics. Neuroscience & Biobehavioral Reviews, 30(7), 1045–1064.
“Experimental studies, or at least observations of phenomena of habituation for a variety of responses in a wide range of organisms from amoebas to humans literally exploded at the end of the nine- teenth century and early twentieth century. see harris (1943) and jennings (1906). i was unable to determine who first used the term habituation in this context, but it was in widespread use early in the twentieth century. in his classic text on learning, humphrey (1933) notes that a range of terms, ‘‘acclimatization”, ‘‘accommo- dation”, ‘‘negative adaptation”, ‘‘fatigue” have been used to de- scribe the phenomenon. harris (1943) in his classic review adds the terms ‘‘extinction” and ‘‘stimulatory inactivation” to the list.”
Groves, P. M., & Thompson, R. F.. (1970). Habituation: A dual-process theory.. Psychological Review, 77(5), 419–450.
“Presented a dual-process theory of response plasticity to repeated stimulation. 2 hypothetical processes, 1 decremental (habituation) and 1 incremental (sensitization), are assumed to develop independently in the cns and interact to yield the final behavioral outcome. behavioral experiments are presented, using both the hindlimb flexion reflex of acute spinal cat and the acoustic startle response of intact rat, which are consistent with this theory. neurophysiological experiments indicate that the 2 processes have separate and distinct neuronal substrates. the dual-process theory and other current theories of response habituation are evaluated in terms of these and other recent findings. (6 p. ref.)”
Thompson, R. F., & Spencer, W. A.. (1966). Habituation: A model phenomenon for the study of neuronal substrates of behavior. Psychological Review
“The recent habituation literature is reviewed with emphasis on neuro- physiological studies. the hindlimb flexion reflex of the acute spinal cat is used as a model system for analysis of the neuronal mechanisms involved in habituation and sensitization (i.e., dishabituation). ha- bituation of this response is demonstrated to follow the same 9 parametric relations for stimulus and training variables characteristic of behavioral response habituation in the intact organism. habituation and sensitization appear to be central neural processes and probably do not involve presynaptic or postsynaptic inhibition. it is suggested that they may result from the interaction of neural processes resembling ‘polysynaptic low-frequency depression,’ and ‘facilitatory afterdis- charge.’ ‘membrane desensitization’ may play a role in long-lasting habituation.”
Rankin, C. H., Abrams, T., Barry, R. J., Bhatnagar, S., Clayton, D. F., Colombo, J., … Thompson, R. F.. (2009). Habituation revisited: An updated and revised description of the behavioral characteristics of habituation. Neurobiology of Learning and Memory, 92(2), 135–138.
Psychological Reactance is an unpleasant motivational arousal (reaction) to offers, persons, rules, or regulations that threaten or eliminate specific behavioral freedoms. Reactance occurs when a person feels that someone or something is taking away their choices or limiting the range of alternatives.
Psychological Reactance can occur when someone is heavily pressured to accept a certain view or attitude. Reactance can cause the person to adopt or strengthen a view or attitude that is contrary to what was intended, and also increases resistance to persuasion. People using reverse psychology are playing on reactance, attempting to influence someone to choose the opposite of what they request.
Further References
White, T. B., Zahay, D. L., Thorbjørnsen, H., & Shavitt, S.. (2008). Getting too personal: Reactance to highly personalized email solicitations. Marketing Letters, 19(1), 39–50.
“Research on the effects of personalized messages on consumers’ be- havioral responses has yielded mixed findings. we explore how e-mail personali- zation influences click-through intentions. our results suggest that consumers experience personalization reactance in response to highly personalized messages when the fit between the offer in the message and consumers’ personal character- istics is not explicitly justified by firms. consequently, consumers are less willing to respond favorably to the offer. results of two studies suggest that this effect primarily emerges for consumers who perceive the utility of the service to be relatively low. for those consumers with higher perceived utility, justification of personalization is less important because highly personalized messages are less likely to elicit reactance.”
Pavey, L., & Sparks, P.. (2009). Reactance, autonomy and paths to persuasion: Examining perceptions of threats to freedom and informational value. Motivation and Emotion, 33(3), 277–290.
“Autonomy, often associated with an open and reflective evaluation of experience, is sometimes confused with reactance, which indicates resistance to persuasion attempts. two studies examined a path model in which autonomy and reactance predicted motivation following the provision of anonymous or source-identified health-risk information, via the mediation of perceived threat to decision-making freedom and of perceived informational value. study 1 (n = 122) investigated alcohol consumption. the results showed that autonomy was positively related to autonomous motivation and intentions to drink responsibly. reactance negatively predicted autonomous motivation in the source-identified information condition but positively predicted autonomous motivation and intentions in the anonymous information condition. reactance negatively predicted attitudes through the mediation of perceived threat to decision-making freedom. study 2 (n = 145) tested our hypothesized model for smoking behavior and replicated several of the study 1 findings. implications for our understanding of autonomy, reactance, and responses to risk-information are discussed.”
Fogarty, J. S.. (1997). Reactance theory and patient noncompliance. Social Science & Medicine, 45(8), 1277–1288.
“With surprising frequency, and to the considerable dismay of care professionals, patients both subtly and overtly refuse to cooperate with medical treatment. despite considerable empirical and theoretical attention, and an abundance of interventions designed to combat it, noncompliance continues. its persistence is accompanied by considerable costs borne by patients and society alike. the theory of psychological reactance sheds new light on the phenomenon. reactance theory proposes that a perceived threat to an individual’s freedom generates a motivational state aimed at recapturing the affected freedom and preventing the loss of others. in a medical context, patients’ perceptions of threats to their freedom or control may induce noncompliance. this theory permits integration of many of the seemingly disparate and/or contradictory findings, and may afford professionals new opportunities for improving patient compliance.”
Beutler, L. E., Harwood, T. M., Michelson, A., Song, X., & Holman, J.. (2011). Resistance/Reactance Level. Journal of Clinical Psychology
“Psychotherapists from all professions and perspectives periodically struggle to effectively manage a patient’s resistance to change. this article provides definitions and examples of patient-treatment matching applied to patient resistance or reactance. we report the results from an original meta-analysis of 12 select studies (n = 1,102) on matching therapist directiveness to patient reactance. our findings support the hypothesis that patients exhibiting low levels of trait-like resistance respond better to directive types of treatment, while patients with high levels of resistance respond best to nondirective treatments (d = .82). limitations of the research reviewed are noted, and practice recommendations are advanced.”
Crawford, M. T., McConnell, A. R., Lewis, A. C., & Sherman, S. J.. (2002). Reactance, compliance, and anticipated regret. Journal of Experimental Social Psychology
“In this paper we review the basic assumptions formulated by jack brehm in 1966 in his theory of psychological reactance and we sample some interesting directions of research on reactance that have been carried out by social psychologists during the last 40 years. we conclude that although there has been impressive development in the reactance research, more exciting avenues of investigation lie ahead. throughout the paper we outline some of these future directions.”
Rains, S. A.. (2013). The Nature of Psychological Reactance Revisited: A Meta-Analytic Review. Human Communication Research, 39(1), 47–73.
“Psychological reactance (brehm, 1966; brehm & brehm, 1981) has been a long-standing topic of interest among scholars studying the design and effects of persuasive messages and campaigns. yet, until recently, reactance was considered to be a motivational state that could not be measured. dillard and shen (2005) argued that reactance can be conceptualized as cognition and affect and made amenable to direct measurement. this article revisits dillard and shen’s (2005) questions about the nature of psychological reactance and reports a test designed to identify the best fitting model of reactance. a meta-analytic review of reactance research was conducted (k = 20, n = 4,942) and the results were used to test path models representing competing conceptualizations of reactance. the results offer evidence that the intertwined model—in which reactance is modeled as a latent factor with anger and counterarguments serving as indicators—best fit the data.”
Clee, M. A., & Wicklund, R. A.. (2002). Consumer Behavior and Psychological Reactance. Journal of Consumer Research
“A theory about psychological freedom is reviewed in terms of its broad appl- icability to consumer behavior. promotional influence, manipulative advertisements, product unavailability, and government regulations are all cast as potentially freedom-threatening events, and a theory of psychological react- ance details the consumer’s reply to reductions in freedom.”
Dillard, J. P., & Shen, L.. (2005). On the Nature of Reactance and its Role in Persuasive Health Communication. Communication Monographs, 72(2), 144–168.
“Reactance theory might be profitably applied to understanding failures in persuasive health communication but for one drawback: the developer of the theory contends that reactance cannot be measured. rejecting this position, this paper develops four alternative conceptual perspectives on the nature of reactance (i.e., combinations of cognition and affect), then provides an empirical test of each. two parallel studies were conducted, one advocating flossing ðn ¼ 196þ; the other urging students to limit their alcohol intake ðn ¼ 200þ: in both cases, a composite index of anger and negative cognitions fully mediated the effects of threat-to-freedom and trait reactance on attitude and intention. the data showed that, in fact, reactance can be operationalized as a composite of self-report indices of anger and negative cognitions. the implications for persuasive communication, in general, are considered as well the specific findings for flossing and drinking.”
Torrance, E. P., & Brehm, J. W.. (1968). A Theory of Psychological Reactance. The American Journal of Psychology, 81(1), 133.
“THIS theory states that individuals have certain freedoms with regard to their behavior. if these behavioral freedoms are reduced or threatened with reduction, the individual will be motivationally aroused to regain them. this is psychological reactance. the theory is examined in a series of experiments with personal and impersonal threats, and also in the light of attitude change theories. (psycinfo database record (c) 2004 apa, all rights reserved)”
From a psycholinguistic vantage point, the term “ignorance” and the term “nescience” have very different semantic connotations. The term ignorance is more generally more widely colloquially utilized than the term nescience and it is often wrongly used in contexts where the word nescience would be appropriate. “Ignorance” is associated with “the act of ignoring”. Per contrast, “nescience” means “to not know” (viz., Latin prefixne = not, and the verbscire = “to know”; cf. the etymology of the word “science”/prescience).
As Mark Passio points out, the important underlying question which can be derived from this semantic distinction pertains to whether our individual and global problems are caused by “ignorance” or “nescience”? That is, “ignoring” or “not knowing”? It seems clear that it is the later. We know about the truth but we actively ignore it for the most part. Currently people have all the necessary information available (literally at their fingertips). Ignoring the facts is a decision, an irrational decision, and people can be held accountable for this decision. Nescience, on the other hand, acquits from accountability (i.e., someone cannot be held accountable when he/she for not knowing something but for ignoring something). Quasi-Freudian suppression plays a pivotal role in this scenario. Suppression is very costly in energetic terms. The energy and effort which is used for suppression lacks elsewhere (cf. prefrontal executive control is based on limited cognitive reseources). The suppression of truth through the act of active ignoring thus has negative implications on multiple levels – on the individual and the societal level, the cognitive and the political, the psychological and the physiological.