The threat capture hypothesis states that threatening stimuli are automatically processed with higher priority than non-threatening stimuli, irrespective of observer intentions or focus of attention. We evaluated the threat capture hypothesis with respect to the early perceptual stages of face processing. We focused on an electrophysiological marker of face processing (the lateralized N170) in response to neutral, happy, and angry facial expressions displayed in competition with a non-face stimulus (a house). We evaluated how effects of facial expression on the lateralized N170 were modulated by task demands. In the pixel task, participants were required to identify the gender of the face, which made the face task-relevant and entailed stru...
Three studies investigated whether individuals preferentially allocate attention to the spatial loca...
Threatening stimuli prevent attentional disengagement. Less clear is whether threat captures attenti...
Stimuli signaling threat are often processed especially rapidly (e.g., Fox, Russo, & Dutton, 2002).\...
The threat-capture hypothesis posits a threat-detection system that automatically directs visual att...
Recent researches have provided evidence that stimulus-driven attentional bias for threats can be mo...
Threatening, friendly, and neutral faces were presented to test the hypothesis of the facilitated pe...
Effective processing of threat-related stimuli is of significant evolutionary advantage. Given the i...
In this study, we investigated the time course of attentional bias for threat-related (angry) facial...
Attention is believed to be biased toward threatening objects or faces. Therefore, we tested whether...
It is commonly assumed that threatening expressions are perceptually prioritised, possessing the abi...
Threat-relevant stimuli such as fear faces are prioritized by the human visual system. Recent resear...
Stein T, Zwickel J, Ritter J, Kitzmantel M, Schneider WX. The effect of fearful faces on the attenti...
This study examined the impact of perceptual load on the processing of unattended threat-relevant fa...
AbstractWe measured the N2pc component as an electrophysiological indicator of attentional selection...
We measured the N2pc component as an electrophysiological indicator of attentional selection to inve...
Three studies investigated whether individuals preferentially allocate attention to the spatial loca...
Threatening stimuli prevent attentional disengagement. Less clear is whether threat captures attenti...
Stimuli signaling threat are often processed especially rapidly (e.g., Fox, Russo, & Dutton, 2002).\...
The threat-capture hypothesis posits a threat-detection system that automatically directs visual att...
Recent researches have provided evidence that stimulus-driven attentional bias for threats can be mo...
Threatening, friendly, and neutral faces were presented to test the hypothesis of the facilitated pe...
Effective processing of threat-related stimuli is of significant evolutionary advantage. Given the i...
In this study, we investigated the time course of attentional bias for threat-related (angry) facial...
Attention is believed to be biased toward threatening objects or faces. Therefore, we tested whether...
It is commonly assumed that threatening expressions are perceptually prioritised, possessing the abi...
Threat-relevant stimuli such as fear faces are prioritized by the human visual system. Recent resear...
Stein T, Zwickel J, Ritter J, Kitzmantel M, Schneider WX. The effect of fearful faces on the attenti...
This study examined the impact of perceptual load on the processing of unattended threat-relevant fa...
AbstractWe measured the N2pc component as an electrophysiological indicator of attentional selection...
We measured the N2pc component as an electrophysiological indicator of attentional selection to inve...
Three studies investigated whether individuals preferentially allocate attention to the spatial loca...
Threatening stimuli prevent attentional disengagement. Less clear is whether threat captures attenti...
Stimuli signaling threat are often processed especially rapidly (e.g., Fox, Russo, & Dutton, 2002).\...