Skip to main content

OPINION article

Front. Behav. Neurosci., 27 July 2023
Sec. Individual and Social Behaviors
This article is part of the Research Topic Anger and Interpersonal Aggression, Volume II View all 4 articles

A neurocomputational variable on welfare tradeoffs explains the function and form of cyberaggression

  • 1School of Journalism and Communication, Sun Yat-sen University, Guangzhou, China
  • 2Center for Big Data and Public Communication, Sun Yat-sen University, Guangzhou, China

1. Introduction

Cyberaggression is the intentional infliction of harm through information communication technologies (e.g., the Internet) (Smith et al., 2012). It is prevalent around the globe (Barlett et al., 2021), and causes in victims serious consequences including anxiety, depression, and suicide (Martínez-Monteagudo et al., 2020). To reduce the impact of cyberaggression, a critical first step would be to understand its why and how it occurs.

Prior research has provided much insight into the function and mechanism of cyberaggression. Regarding function, Runions et al. (2017) characterized cyberaggression along the dimensions of affective valence and levels of self-control and argued that cyberaggression may be carried out for revenge or reward, in either a calculated manner or impulsively. Lapierre and Dane (2020) argued that proactive cyberaggression facilitates intrasexual competition and dominance contests. Regarding mechanism, Kowalski et al.'s (2014) meta-analysis identified 10 risk factors, including being previously victimized, moral disengagement, anger, and narcissism.

In this opinion piece, we extend this line of work by developing a computational analysis of cyberaggression. Computational theories explain an information-processing device (e.g., the brain) by specifying (1) the problem that the device is designed to solve and (2) the mechanisms that must be in place to solve the problem (Marr, 1982; Cosmides and Tooby, 1995). As we aim to show in this article, our analysis would not only be able to integrate prior findings on the function and mechanism of cyberaggression but would also explain a previously overlooked aspect of cyberaggression, namely, the tactics it commonly comprises.

2. The welfare tradeoff ratio, anger and hatred

Humans as a highly social species often act in ways that negatively affect other's welfare relative to their own (i.e., things that however indirectly increase their fitness, or success in gene replication; Aktipis et al., 2018). For example, by taking the last vacant seat on a packed bus, one deprives another person of their opportunity to rest up and accomplish something productive later. People have thus been faced with the adaptive problem of deciding on how much they are willing to trade others' welfare for their own and their own for others'. Prior research suggests that the human brain contains a neurocomputational variable called the welfare-tradeoff ratio (WTR) that facilitates this decision-making process (Delton and Robertson, 2016).

Consider a behavior that would benefit Person A by b units of fitness (bPerson A) while cost the focal individual (“you”) by c units of fitness (cyou). Person A would perform the behavior when:

bPerson A>WTRPerson A, you× cyou

In this inequality, WTRPerson A, you represents how much Person A values your welfare relative to their own, with the value of 1 indicating the person values their and your welfare equally. When WTRPerson A, you increases from 1, Person A would value your welfare relative to their own increasingly more, and when WTRPerson A, you decreases from 1, they would value your welfare less and less. For instance, a behavior would benefit Person A by 2 units of fitness and cost you by 3. Person A would not perform this behavior if they value you (with, e.g., a WTRPerson A, you = 1.5) but would if they do not value you (with, e.g., a WTRPerson A, you = 0.5). Recent research found that the mental computation of WTR bears the hallmarks of being a psychological adaptation (e.g., efficiency, economy, and precision) and is unlikely a heuristic (Delton et al., 2023).

From the perspective of evolutionary psychology, emotions are superordinate psychological adaptations that coordinate lower levels of mechanisms to solve complex adaptive problems (Sznycer et al., 2021). The computation of WTR is one such mechanism that many emotions incorporate. For example, the recalibration theory of anger (Sell et al., 2017) posits that a low perceived WTRPerson A, you informs you that Person A is not valuing you and causes you to be angry. This feeling motivates “loud” behaviors (e.g., aggressive postures, heated arguments) aiming to up-regulate WTRPerson A, you and salvage a cooperative relationship (between, e.g., two friends).

However, when WTRPerson A, you drops below zero, Person A's welfare and yours become negatively correlated (e.g., both of you desire the same job position), making Person A “toxic” to you (Sell et al., 2023). Because Person A thrives at your expense, recalibrating WTRPerson A, you is difficult if not impossible (think about Voldemort and Harry Potter). Hatred as a psychological adaptation solves this problem by (1) setting WTRyou, Person A at below zero and (2) motivating behaviors that would cost-effectively neutralize Person A's negative impact on your fitness. These behaviors include (1) predatory-style (e.g., surreptitious) aggression aiming to kill and (2) information warfare aiming to hurt one's reputation. The former tactic would help physically—whereas the latter would help socially—remove the toxic person from the hateful person's environment. Either way, the goal is to undermine the toxic person's ability to further impose costs on the hateful person.

3. A neutralization hypothesis of cyberaggression

The neutralization theory of hatred provides an integrative account of cyberaggression. First, hate speech is commonly observed on social media (Castaño-Pulgarín et al., 2021; Walther, 2022), suggesting that the emotion of hatred underlies many hurtful remarks people make on each other in cyberspace. Second, to the extent that cyberaggression is primarily hatred-based, it is directed at a toxic person and, by reducing the person's toxicity, would help increase the hateful person's fitness. That is likely why cyberaggression can be vindictive and rewarding at the same time (i.e., “revenge is sweet”) (Runions et al., 2017). Third, cyberaggression facilitates intrasexual competition and dominance contests (Lapierre and Dane, 2020) likely because both activities are examples where two persons' welfare is negatively correlated (e.g., jockeying for the same romantic partner or the only spot at the top of social hierarchy).

Fourth, prior research found that prior victimization, moral disengagement, anger, and narcissism positively predict the intent to cyberaggress (Kowalski et al., 2014). Of those predictors, being victimized before would likely make the motive of avenging chronically accessible to the victim and thus set their WTR toward others at values lower than people who have not been victimized before. Moral disengagement licenses harming others by (among other strategies) distorting consequences, displace responsibility, and dehumanizing the target. Anger positively predicts cyberaggression likely because it is closely related to hatred. Finally, more narcissistic people tend to have stronger senses of entitlement (Freis and Hansen-Brown, 2021) and are thus more likely to perceive infringements on their welfare, rendering a person who is otherwise neutral to their fitness subjectively toxic.

3.1. The form of cyberaggression

Our neutralization hypothesis of cyberaggression also explains why cyberaggression comprises the tactics that it does. By content-analyzing 29 published scales (Chun et al., 2020), we identified seven common tactics of cyberaggression (ordered by how frequently they appeared in the scales): (1) issuing insults and threats (96.6%), (2) public humiliation (e.g., posting embarrassing photos of someone; 72.4%), (3) spreading rumors (69.0%), (4) publicizing someone's dark secrets (69.0%), (5) social exclusion (58.6%), (6) impersonation (e.g., pretending to someone to post incriminating messages; 55.2%), and (7) sexual harassment (e.g., sending someone nude pictures; 44.8%). While those percentages indicate no current consensus on how to measure cyberaggression, there is perhaps a good reason to why people tend to use certain tactics more often than others when cyberaggressing.

Specifically, if cyberaggression is for decreasing someone's ability to impose costs, people should generally adopt tactics that would achieve that goal cost-effectively (Sell et al., 2023). Under this view, issuing insults has the highest percentage likely because executing this tactic entails the lowest amount of cost—one only needs to know the target's email or social media address—but can be highly effective in inflicting harm (Martínez-Monteagudo et al., 2020). In comparison, posting embarrassing photos (Tactic 2) and publicizing someone's secrets (Tactic 4) requires getting hold of something from the target, rumors (Tactic 3) may be falsified, and social exclusion (Tactic 5) needs coordination. As for Tactic 6, effective impersonation requires access to the target's online accounts, and unauthorized access is illegal. In other words, people are less likely to adopt Tactics 2 to 5 for cyberaggression likely because those tactics are increasingly costly to use and/or less and less effective to hurt the target.

3.2. The exceptional case of sexual harassment?

We condemn all forms of sexual harassment. However, if cyberaggression is for impairing a toxic person's ability to impose costs, sexual harassment (e.g., making unwanted sexual advances and requests for sexual favors) (The U.S. Equal Employment Opportunity Commission, 2023) appears the least frequently in extant scales of cyberaggression likely because it is the least suitable for that purpose. Inappropriate physical contact unlikely kills, and requests for sexual favors are often made with promises of benefit delivery (e.g., job promotion).

Sexual harassment does cause stress and fear in victims (Fitzgerald and Cortina, 2018) and may be weaponized as a means to harm. However, it does not follow that the psychological system producing sexual harassment is designed to harm. Inferring cause from outcome is a logical fallacy (Aktipis and Kurzban, 2005), just as paperweights may be used to kill but are not designed to kill. In fact, it has been argued that short-term mating motivates sexual harassment such that sexual harassment signals a perpetrator's—and probes the target's—interest in engaging in a sexual relationship (Jonason et al., 2012; Bendixen and Kennair, 2017).

Supporting this hypothesis, prior research found that unrestricted sociosexuality (e.g., “sex without love is OK”) but not hostile sexism positively and significantly predicted both men and women sexually harassing members of the opposite sex (Bendixen and Kennair, 2017; Zapata-Calvente et al., 2019). This finding provides no evidence that perpetrators hate the person they harass. Rather, it suggests that the perpetrator perceives the presence of the target as an opportunity to increase the perpetrator's reproduction. If this is the case, the perpetrator should hold a positive instead of a negative WTR toward the victim. This analysis suggests that sexual harassment may better be considered a different category of cyberaggression than the other six tactics mentioned earlier.

3.3. Predictions and ways to test them

Our analysis suggests at least three venues for future research: (1) the role of hatred vis-à-vis anger and other emotions (e.g., disgust) in the process leading to cyberaggression, (2) the role of WTR in that process, and (3) the potentially distinctive mechanisms underlying sexual harassment and other tactics of cyberaggression. Figure 1 summarizes our argument.

FIGURE 1
www.frontiersin.org

Figure 1. The schematic representation of the predictions made by the neutralization hypothesis of cyberaggression. WTRself, target = the welfare tradeoff ratio respondents themselves (i.e., potential aggressors) hold against a target; the plus sign (+) reads “positively predicts”; and the negative sign (-) reads “negatively predicts”.

As shown in Figure 1, from a prospective aggressor's perspective, detecting a toxic person would activate hatred, set a negative WTRself, target, and subsequently motivate cyberaggression. Delton and Robertson (2016) described an economic game that validly measures the mental computation of WTR. In the game, respondents would be asked to indicate with a series of binary choices whether they are willing to forgo certain monetary amounts to have another person gain or lose some money. With this method, we will be able to capture how respondents (i.e., the potential aggressors) perceive WTRtarget, self and set WTRself, target. We can then test whether hatred, anger, and/or other emotions mediate the correlation between perceived WTRtarget, self and WTRtarget, self and subsequently predict the intent to cyberaggress. As for testing our conjecture on sexual harassment being a separate category of cyberaggression, extant studies (Bendixen and Kennair, 2017; Zapata-Calvente et al., 2019) provide the basic methodological framework. The key is to incorporate the measure of WTR to test whether a positive WTRself, target and sexual desire (but not hatred) positively predict online sexual harassment.

4. Conclusion

In this article, we argued that cyberaggression is produced by a psychological system (i.e., hatred) designed by natural selection to detect and eliminate fitness threats. We do not claim that hatred is the only system that generates the intent to cyberaggress but believe that the neutralization hypothesis has the potential of providing an integrative account of the behavior in question. We are actively testing the neutralization hypothesis with the methods outlined above, and eager to share our findings with interested audiences form academia and the general public alike.

Author contributions

JZ conceived and wrote the paper.

Funding

This work was supported by Sun Yat-sen University's startup funding to JZ (17000-12230014).

Conflict of interest

The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Aktipis, A., Cronk, L., Alcock, J., Ayers, J. D., Baciu, C., Balliet, D., et al. (2018). Understanding cooperation through fitness interdependence. Nat. Hum. Behav. 2, 429–431. doi: 10.1038/s41562-018-0378-4

PubMed Abstract | CrossRef Full Text | Google Scholar

Aktipis, C. A., and Kurzban, R. O. (2005). “Is homo economicus extinct? Vernon Smith, Daniel Kahnman and the evolutionary perspective,” in Evolutionary Psychology and Economic Theory, Ed. R. Koppl (Elsevier), 135–153.

Google Scholar

Barlett, C. P., Seyfert, L. W., Simmers, M. M., Hsueh Hua Chen, V., Cavalcanti, J. G., Krahé, B., et al. (2021). Cross-cultural similarities and differences in the theoretical predictors of cyberbullying perpetration: results from a seven-country study. Aggress. Behav. 47, 111–119. doi: 10.1002/ab.21923

PubMed Abstract | CrossRef Full Text | Google Scholar

Bendixen, M., and Kennair, L. E. O. (2017). Advances in the understanding of same-sex and opposite-sex sexual harassment. Evol. Hum. Behav. 38, 583–591. doi: 10.1016/j.evolhumbehav.2017.01.001

CrossRef Full Text | Google Scholar

Castaño-Pulgarín, S. A., Suárez-Betancur, N., Vega, L. M. T., and López, H. M. H. (2021). Internet, social media and online hate speech. Systematic review. Aggress. Violent Behav. 58, 101608. doi: 10.1016/j.avb.2021.101608

PubMed Abstract | CrossRef Full Text | Google Scholar

Chun, J., Lee, J., Kim, J., and Lee, S. (2020). An international systematic review of cyberbullying measurements. Comput. Hum. Behav. 113, 106485. doi: 10.1016/j.chb.2020.106485

PubMed Abstract | CrossRef Full Text | Google Scholar

Cosmides, L., and Tooby, J. (1995). “From function to structure: the role of evolutionary biology and computational theories in cognitive neuroscience.” in: The Cognitive Neurosciences, Ed. M. S. Gazzaniga (Cambridge, MA: The MIT Press).

PubMed Abstract | Google Scholar

Delton, A. W., Jaeggi, A. V., Lim, J., Sznycer, D., Gurven, M., Robertson, T. E., et al. (2023). Cognitive foundations for helping and harming others: making welfare tradeoffs in industrialized and small-scale societies. Evol. Hum. Behav. doi: 10.1016/j.evolhumbehav.2023.01.013

CrossRef Full Text | Google Scholar

Delton, A. W., and Robertson, T. E. (2016). How the mind makes welfare tradeoffs: evolution, computation, and emotion. Curr. Opin. Psychol. 7, 12–16. doi: 10.1016/j.copsyc.2015.06.006

CrossRef Full Text | Google Scholar

Fitzgerald, L. F., and Cortina, L. M. (2018). “Sexual harassment in work organizations: a view from the 21st century.” in APA handbook of the psychology of women: Perspectives on women's private and public lives, Eds. C. B. Travis, J. W. White, W. S. Rutherford, S. L. Cook, and K. F. Wyche (Washington, DC: American Psychological Association), 215–234. doi: 10.1037/0000060-012

CrossRef Full Text | Google Scholar

Freis, S. D., and Hansen-Brown, A. A. (2021). Justifications of entitlement in grandiose and vulnerable narcissism: the roles of injustice and superiority. Pers. Individ. Differ. 168, 110345. doi: 10.1016/j.paid.2020.110345

CrossRef Full Text | Google Scholar

Jonason, P. K., Valentine, K. A., and Li, N. P. (2012). “Human mating.” in: The Encyclopedia of Human Behavior, Ed. V. S. Ramachandran (Amsterdam: Elsevier), 371–377. doi: 10.1016/B978-0-12-375000-6.00195-6

CrossRef Full Text | Google Scholar

Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., and Lattanner, M. R. (2014). Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychol. Bull. 140, 1073–1137. doi: 10.1037/a0035618

PubMed Abstract | CrossRef Full Text | Google Scholar

Lapierre, K. R., and Dane, A. V. (2020). Social advantages and disadvantages associated with cyber aggression-victimization: a latent class analysis. Comput. Hum. Behav. 113, 106497. doi: 10.1016/j.chb.2020.106497

CrossRef Full Text | Google Scholar

Marr, D. (1982). Vision: A Computational Investigation into the Human Representation and Processing of Visual Information. New York, NY: W H Freeman.

Google Scholar

Martínez-Monteagudo, M. C., Delgado, B., Díaz-Herrero, Á., and García-Fernández, J. M. (2020). Relationship between suicidal thinking, anxiety, depression and stress in university students who are victims of cyberbullying. Psychiatry Res. 286, 112856. doi: 10.1016/j.psychres.2020.112856

PubMed Abstract | CrossRef Full Text | Google Scholar

Runions, K. C., Bak, M., and Shaw, T. (2017). Disentangling functions of online aggression: the cyber-aggression typology questionnaire (CATQ). Aggress. Behav. 43, 74–84. doi: 10.1002/ab.21663

PubMed Abstract | CrossRef Full Text | Google Scholar

Sell, A., Scrivner, C., Landers, M., and Lopez, A. (2023). “The neutralization theory of hatred.” In: The Oxford handbook of evolution and the emotions, Eds. L. Al-Shawaf and T. K. Shackelford (New York, NY: Routledge).

Google Scholar

Sell, A., Sznycer, D., Al-Shawaf, L., Lim, J., Krauss, A., Feldman, A., et al. (2017). The grammar of anger: mapping the computational architecture of a recalibrational emotion. Cognition. 168, 110–128. doi: 10.1016/j.cognition.2017.06.002

PubMed Abstract | CrossRef Full Text | Google Scholar

Smith, P. K., del Barrio, C., and Tokunaga, R. S. (2012). “Definitions of bullying and cyberbullying: how useful are the terms?” in Principles of cyberbullying research, Eds S. Bauman, D. Cross, and W. J. (New York, NY: Routledge), 26–40.

Google Scholar

Sznycer, D., Sell, A., and Lieberman, D. (2021). Forms and functions of the social emotions. Curr. Dir. Psychol. Sci. 30, 292–299. doi: 10.1177/09637214211007451

CrossRef Full Text | Google Scholar

The U.S. Equal Employment Opportunity Commission (2023). Sexual harassment. Available online at: https://www.eeoc.gov/sexual-harassment (accessed June 30, 2023).

Google Scholar

Walther, J. B. (2022). Social media and online hate. Curr. Opin. Psychol. 45, 101298. doi: 10.1016/j.copsyc.2021.12.010

PubMed Abstract | CrossRef Full Text | Google Scholar

Zapata-Calvente, A. L., Moya, M., Bohner, G., and Megías, J. L. (2019). Automatic associations and conscious attitudes predict different aspects of men's intimate partner violence and sexual harassment proclivities. Sex Roles 81, 439–455. doi: 10.1007/s11199-019-1006-0

CrossRef Full Text | Google Scholar

Keywords: cyberaggression, welfare tradeoff ratio, anger, hatred, evolutionary psychology

Citation: Zhang J (2023) A neurocomputational variable on welfare tradeoffs explains the function and form of cyberaggression. Front. Behav. Neurosci. 17:1034564. doi: 10.3389/fnbeh.2023.1034564

Received: 01 September 2022; Accepted: 10 July 2023;
Published: 27 July 2023.

Edited by:

Walter Adriani, National Institute of Health (ISS), Italy

Reviewed by:

Miklyaeva Anastasia, Herzen University, Russia
Frank Schwab, Julius Maximilian University of Würzburg, Germany

Copyright © 2023 Zhang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Jinguang Zhang, zhangjg29@mail.sysu.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.