Skip to main content

ASU Electronic Theses and Dissertations


This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.




In an affordance management approach, stereotypes, prejudices, and discrimination are conceptualized as tools to manage the potential opportunities and threats afforded by others in highly interdependent social living. This approach suggests a distinction between two “kinds” of stereotypes. “Base” stereotypes are relatively factual, stable beliefs about the capacities and inclinations of groups and their members, whereas “affordance stereotypes” are beliefs about potential threats and opportunities posed by groups and their members. Two experiments test the hypothesized implications of this distinction: (1) People may hold identical base stereotypes about a target group but hold very different affordance stereotypes. (2) Affordance stereotypes, …

Contributors
Pick, Cari Marie, Neuberg, Steven L, Kenrick, Douglas T, et al.
Created Date
2018

Friendships make us happy, keep us healthy, and can even facilitate our reproductive fitness. But most friendships are not forever—even when we want them to be. How do people maintain valued friendships? I propose that “friendship jealousy” arises when people perceive others as posing threats to valued friendships, and that this response can function to prevent friendship loss and friend defection. In preliminary experiments, I tested predictions derived from this functional view. As predicted, I found, first, that friendship jealousy is calibrated to friend value. Second, friendship jealousy predicts intentions to “friend guard” (i.e., engage in behavior to protect the …

Contributors
Krems, Jaimie Arona, Kenrick, Douglas T, Neuberg, Steven L, et al.
Created Date
2018

Psychological theories often reduce descriptions of people’s emotional experiences to a small number of underlying dimensions that capture most of the variation in their responses. These underlying dimensions are typically uncovered by comparing the self-reported emotions of many individuals at one specific time point, to infer a single underlying structure of emotion for all people. However, theoretical work suggests that underlying dimensions uncovered in this way may not hold when modeling how people change over time. Individuals may differ not just in their typical score on a given dimension of emotion, but in what dimensions best characterize their patterns of …

Contributors
Danvers, Alexander, Shiota, Michelle N, Kenrick, Douglas T, et al.
Created Date
2017

Why do social perceivers use race to infer a target's propensity for criminal behavior and likelihood of re-offense? Life history theory proposes that the harshness and unpredictability of one's environment shapes individuals' behavior, with harsh and unpredictable ("desperate") ecologies inducing "fast" life history strategies (characterized by present-focused behaviors), and resource-sufficient and stable ("hopeful") ecologies inducing "slow" life history strategies (characterized by future-focused behaviors). Social perceivers have an implicit understanding of the ways in which ecology shapes behavior, and use cues to ecology to infer a target's likely life history strategy. Additionally, because race is confounded with ecology in the United …

Contributors
Williams, Keelah Elizabeth Grace, Neuberg, Steven L, Saks, Michael J, et al.
Created Date
2017

Attachment relationships serve a variety of important functions for infants and adults. Despite the importance of attachment relationships in adults, the mechanisms that underlie the formation or maintenance of these kinds of relationships outside of romantic relationships remains chronically understudied. The current research investigated whether the mechanism of synchrony, which is associated with attachment formation in the parent-infant literature, may still be tied to attachment in adults. To measure this association, these studies showed participants videos to prime synchrony, and then measured activation of attachment concepts in a word completion task. The results of Experiment 1 showed that attachment style …

Contributors
Yee, Claire Ida, Shiota, Michelle L, Neuberg, Steven L, et al.
Created Date
2015

Life History Theory suggests that, in order to maximize reproductive fitness, individuals make trade-offs between allocating resources to mating and parenting. These trade-offs are influenced by an individual's sex, life history strategy, and environment. Here, I explored the usefulness of a Life History Theory framework for understanding endorsement of child support laws. This study experimentally manipulated sex ratio, and gathered information about participants' endorsement of child support, sexual restrictedness, and mate value. As predicted, women endorsed child support more than men, whereas men favored greater restriction of child support in the form of required paternity testing. However, in general, results …

Contributors
Williams, Keelah Elizabeth Grace, Neuberg, Steven L, Saks, Michael, et al.
Created Date
2013

An emerging body of literature suggests that humans likely have multiple threat avoidance systems that enable us to detect and avoid threats in our environment, such as disease threats and physical safety threats. These systems are presumed to be domain-specific, each handling one class of potential threats, and previous research generally supports this assumption. Previous research has not, however, directly tested the domain-specificity of disease avoidance and self-protection by showing that activating one threat management system does not lead to responses consistent only with a different threat management system. Here, the domain- specificity of the disease avoidance and self-protection systems …

Contributors
Anderson, Uriah Steven, Kenrick, Douglas T, Shiota, Michelle N, et al.
Created Date
2011