دانلود مقاله ISI انگلیسی شماره 60450
عنوان فارسی مقاله

گرگ بزرگ بد؟ رابطه بین سه گانه تاریک و ارزیابی فردی از آسیب پذیری

کد مقاله سال انتشار مقاله انگلیسی ترجمه فارسی تعداد کلمات
60450 2014 5 صفحه PDF سفارش دهید محاسبه نشده
خرید مقاله
پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید.
عنوان انگلیسی
The Big Bad Wolf? the relation between the Dark Triad and the interpersonal assessment of vulnerability
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Personality and Individual Differences, Volume 67, September 2014, Pages 52–56

کلمات کلیدی
سه گانه تاریک ؛ اختلالات فکری و روانی؛ آسیب پذیری؛ ارزیابی فردی
پیش نمایش مقاله
پیش نمایش مقاله گرگ بزرگ بد؟ رابطه بین سه گانه تاریک و ارزیابی فردی از آسیب پذیری

چکیده انگلیسی

Although it is recognized that “dark personalities” engage in a high level of interpersonal manipulation and exploitation, little is known about whether or how they assess a target’s potential vulnerability prior to such behavior. This study examined the relation between the Dark Triad (psychopathy, Machiavellianism, and narcissism) and strategies used in the assessment of personality and emotional states related to vulnerability in others. Participants (N = 101) were asked to form impressions of stranger “targets” (with either high or low known vulnerability features) describing themselves across thin slice video, audio, or transcript modalities. Results indicated that dark personalities engaged in a relatively superficial interpersonal analysis and exhibited a “negative other” heuristic by which they generally perceived all targets as being weak and vulnerable to victimization. This negative other heuristic led to impairments in their ability to accurately assess certain features of others. We propose that instead of being keen “readers” of others, dark personalities may rely on their own personality and physical features (e.g., charm, good looks) to draw in vulnerable victims or adopt a “quantity over quality” strategy to find victims and then use active manipulation tactics to exploit them.

خرید مقاله
پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید.