• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

1-360-452-8688

Conflict Science Institute

Conflict Science Institute

The science and art of conflict for legal professionals

  • About
    • Mission – Vision – Values
    • The CSI Story
    • Contact
  • CSI Concepts
    • The Definition and Relevance of Attachment for Lawyers from a DMM Perspective
    • What is Interpersonal Neurobiology (IPNB)?
    • ICCM
      • Integration
      • Integrative Listening
    • The Conflict Model
      • Conflict Model Circumplex
      • DMM Danger list
  • Services
    • CSI training programs
  • Resources
    • CSI articles
    • CSI principles applied
    • DMM Blog
    • DMM Coffee House
    • DV Blog
Contact Us

Information processing and transformation

The DMM perspective on information processing and transformation, bias, and the defensive exclusion of information. A CSI overview paper.

August 16, 2020 by CSI

How can two people look at the same “facts” and come up with wildly different conclusions? Why are some clients unable to understand the problem as you do? Why are some people afraid of certain things and not others? One answer is, people process information with different combinations of neural systems, and assign different meaning to pieces of information, particularly in the context of predicting or managing danger.

Since most, if not all, conflict and litigation represents danger, understanding how people process information about danger is a particularly useful skill for lawyers, legal professionals, therapists and others working with interpersonal related sources of conflict and dysfunction.

Fundamentally, information processing is about the defensive exclusion of dangerous information.

When some topic, or some piece or pieces of information, present a contradiction to what someone psychologically needs, human minds frequently resolve the contradiction by distorting, eliminating, or replacing the dangerous information. The significance, for when we need to understand how someone else is looking at a situation or problem, is that we need to understand what information they are not considering. This is a complex topic and described below.

Of course, once we recognize how they are transforming information, then we need enhanced relationship and communication skills to see if we can help the other person accept a less distorted view of the dangerous information.

Overview

Cognitive psychology theorists and scientists describe information processing, usually from the perspective of cognitive brain function. They tend to focus on how information from the environment, outside the body, is processed in neural networks. Attachment theorists and scientists also describe information processing, but they include additional sources of information such as emotions and body states. They also include information emanating from relationships, parent-child, child-child, and adult-adult.

Information processing became a key concept for attachment pioneer John Bowlby and his view of attachment theory. Patricia Crittenden developed Bowlby’s ideas as she developed the Dynamic Maturational Model of Attachment and Adaptation (DMM). Information processing is a foundational element of the DMM. This article describes the DMM view, which is a useful perspective for lawyers and professionals attending to interpersonal conflict because the DMM focuses on human functioning in the context of conflict and danger.

This CSI Whitepaper will look at some key concepts useful for understanding information processing, look at the primary two or three sources of information, then describe a simple 4-step information processing model, look at how information can be transformed (distorted, excluded, etc.), briefly look at how attention and memory are relevant to information processing, and offer a few comments about how information processing developed in attachment theory and the DMM.

Six Key concepts for understanding information processing

  • Everything is a piece of information
  • Information is transformed from what it is in fact to a representation inside our own neural systems
  • There are discrete sources of information, each of which can be preferred or minimized (biased).
  • There are many neural networks in a body to process information, and many focus specifically on predicting and responding to danger-related information
  • Danger comes in many forms, and relationship danger can be quite important for humans
  • Increased danger tends to narrow, or limit access, to neural processing networks and response methods (danger can increase information processing bias)

Everything is information

We can think of everything in the world as a piece of information. A plant might be food, but before that it is information about something edible, healthy, dangerous, or poisonous. A dog, a law suit, conflict, an angry face, an expressionless face, loneliness, and rejection are all examples of things that exist in the world, but also present information which could indicate physical and/or psychological danger.

Information is necessarily transformed

To process a piece of information, we need to first convert that information into electro-chemical information inside our own neural networks. This may be an odd thought for those new to information processing. If we think about rhubarb pie or broccoli, those things don’t exist in our minds. Rather, what exists are electrical signals and neurochemicals that activate when we think about them. In the example below, the crying baby exists outside our mind, but once we start thinking about the baby, or if we leave the room and think about the baby, what we are working with is a pattern of neuron firings and bodily sensations, not the actual baby.

It is critical to understand that information can be transformed in many ways, and can easily be transformed in less than accurate ways. The representation of the baby in your mind may or not be accurate, and may or may not be useful for the baby. The seven ways information can be transformation are detailed below. One simple example for now is the meaning a person gives to why the baby is crying: is the baby hungry, wet, fussy, some other reason, or for no understandable reason? Are any of those meanings accurate without more information?

Sources of information

Again, this may seem like an odd thought, but humans have surprisingly limited sources of information for their information processing, in terms of what information will help to predict danger. Attachment science has, so far, identified three primary sources of information that are particularly important for predicting danger.

Two primary sources are described with one word as cognitive and affective. Another sources is somatic, or body-based information (described below).

Cognitive information

Cognitive information is represented in an expected sequence of events occurring over a time period. “If I eat broccoli, it will be good for my body.” “If my baby is crying, it must hungry (or tired, wet, or fussy)”. “If my partner files for divorce, I could lose my family and financial security and existing relationships with my children.” Cognitive information relates to the temporal order of events which lead to predictable outcomes, particularly dangerous or safe outcomes. Cognitive information is based on past experiences and can relate primarily to information from outside the body.

Affective information

Affective information comes from sensory information, such as emotion and feeling states inside the body. Some types of sensory information have innate meaning (darkness, emptiness, sudden loud noises, certain tastes) and others are acquired by association with dangerous or safe experiences. Intense, unexpected, and rapid perceptual changes can particularly activate affective states which represent danger, such as gunshots, car accidents, angry outbursts, and interpersonal rejection. Mild, rhythmic, and predictable changes can represent safety.

Some neural networks focus on danger survival

Humans have dozens of discrete neural systems. Some are designed to support activities like movement, math, food gathering, play, reproduction, and creating. Because the world is a dangerous place, we have many systems specifically focused on maximizing survival. Sometimes neural systems work in parallel for complex thinking. Sometimes they function quite singularly, such as when we respond to danger with the fight-flight-freeze response system.

A moment of electrical energy firing in a human brain. Green represents neural energy moving in circuits front to back, red moving left to right, and blue top to bottom. http://www.humanconnectomeproject.org/

When conflict is actual or potential, danger-processing systems become important and can dominate neural activity. If your spouse tells you they want a divorce, neural networks which support playing sports or music, or digesting food, are not useful in that moment. (They might be useful later to calm your nervous system or nourish your body.)

Dangers are many, and can be relational

Danger for humans comes in many forms. Because humans are extremely social animals, awareness of and protection from relationship danger is critical. Survival may be dependent on maintaining relationships. Infanticide may involve a failed parent-child relationship. Banishment from the tribe, particularly in ancient times, was not conducive to a happy life, longevity, or reproductive opportunities.

Additionally, dangers can be perceived quite differently depending on which source of information is being primarily relied on while processing danger information. “Doing the wrong thing” can be a great danger in the context of cognitive processing, because what follows next is well understood. For affective processing, what follows next is quite unknown and unpredictable so it is less important. It’s more important that the feeling in the moment is satisfied.

CSI’s DMM Danger List identifies some dangers identified by attachment science which are subjectively perceived as important from a cognitive and affective perspective. Cognitive and affective-based dangers tend to be quite opposite.

It’s legal to harm children: attachment healing in custody and domestic violence cases is a CSI article which offers a case example of how a professional can utilize danger, information, and memory system usage to expand a client’s ability to protect their children.

Self-protective strategies narrow in the face of intense danger

The narrowing of self-protective strategies is the last of the six key concept listed here for understanding information processing. Humans have a wide range of strategies, or things they do, to get through difficult situations. However, for most people, as the threat or risk of danger is perceived as becoming greater, the range of self-protective strategies they will tend to utilize decreases. This may be in part because danger often requires fast information processing, and people may rely on their primary processing systems, cognitive or affective-oriented, for quick solutions. Using limited systems may also feel safer, and be a like a default process the mind came to rely on in early childhood.

Attachment science measures, particularly DMM-based assessments, have proven exceptional at teasing out cognitive and affective patterns of information processing. In the context of litigation and intense relationship threat, these patterns of information processing can often be anticipated and predictable.

Six key concepts reviewed

So far, this article has outlined six key concepts to understand about processing information, especially in the context of danger.

  1. Everything is information
  2. Information is necessarily transformed
  3. There are two primary sources of information
    1. Cognitive information (temporally sequenced)
    2. Affective (emotional intensity)
  4. Some neural networks focus on danger prediction and response
  5. Danger comes in many forms, including relationship dangers
  6. Self-protective strategies narrow in the face of intense danger

Four-step information processing model

Here is a simple, four step way to think about information processing. When presented with information and problem, threat or actual danger, people:

  1. Perceive the information, or not;
  2. Interpret the information in some way, or not;
  3. Select response of some sort, or not; and
  4. Implement behavior of some sort, or not.

Information will generally be processed in order, although sometimes the processing may be fast or slow and the response may be somewhat automatic.

Simple example: a crying baby

  • Perceive. Will the parent notice their baby is crying? Is the parent too distracted? Is the parent depressed, or triggered by their own childhood experience, such that their subconscious neural systems are blocking the information from coming into their conscious awareness?
  • Interpret. If the information, a crying baby, enters the parent’s awareness, the parent must interpret what the crying might mean. This requires access to memories to judge the current information with past experiences. Is the baby a little hungry, quite hungry, wet, cold, sick or fussy? Will the parent decide the baby is crying outside of the parent’s feeding time schedule, or get annoyed because the baby is interfering with the parent’s needs?
  • Select response. If the parent interprets the crying as indicating the child is, for example, hungry, the parent will consider options. The parent may decide food should be promptly provided, even if it interferes with what they are doing. The parent might decide the baby needs to learn to wait, or needs to learn not to interrupt what the parent is doing. The parent might consider feeding the child a few grapes, or provide a full meal even if outside the normal routine.
  • Implement. Whatever response the parent may consider, the parent may or may not implement the response options. They might immediately or promptly provide food, or offer some form of soothing or distraction until food can be provided. On the other hand, the parent might get distracted, or look at the child and say and shake their head “No, not now”, or might react emotionally and quickly, without reflecting, and swat the child.

The outcome of the information processing, or the action or inaction the parent ends up taking, might be for the child nurturing and protective, or neglectful, harmful, or maltreating.

Ignoring the child’s need in this case can lead to an attachment harm. Teaching the child their needs are not important and that their pleas for help will elicit no help from their parent can cause the child to learn to dismiss their own feelings and needs. Why try if it will do no good? When parents respond inconsistently, the child can learn that they should just keep crying and even cry louder until the parent does what the child wants. Why stop if their immediate needs will eventually be met?

Transformation of information

As described above, information taken into our neural systems necessarily requires that we transform the actual thing into neural activities and memories. As we convert what we perceive or experience into neural information, we can transform it in at least seven different ways, with increasing amounts of transformation:

  • Truly (accurate and predictive)
  • Erroneously (true and accurate, but not predictive)
  • Distorted
  • Omitted
  • Falsified
  • Denied
  • Delusionally

Seven types of information transformation

1 True transformations allow for the most accurate predictions about the meaning of the information. In the crying baby example, true transformation allows an accurate understanding of the baby’s needs, and increases the likelihood the information processing system will lead to an appropriate response by the parent.

2 Erroneous transformations minimally alter the information and might lead the information process to a non-productive outcome, such as providing too much food when the parent is trying to teach an eating routine, or providing a binky (suck-toy) when the baby is actually hungry.

3 Distorted information emphasizes a portion of the information and de-emphasizes another portion. “She’s hungry, but she is strong and can wait” indicates the parent correctly perceived the crying, but the interpretation over-emphasizes the fact the baby won’t die of starvation in the next hour.

4 Omitted information discards some or all of the information from further processing. Sometimes the positive and negative quality of the information is split and the important part is omitted. “Oh look, he’s so cute when he cries like that, he loves me!” omits the fact the baby is hungry by dismissing the negative part of the baby’s experience and emphasizing the positive part from the parent’s perspective.

5 Falsified information changes the accurate information to other information. “The baby is hungry”, when in fact the baby is wet and the diaper hasn’t been changed in a long time. Another example combining blame and falsification: “Now look what you did, you upset the baby again with your loud talking!”

6 Denied information usually involves actively avoiding information the person fears might be true. For example, if the parent is doing something they consider important, or perhaps doing something to protect themselves from danger, or embarrassed and defensive because they have failed to tend to their baby, they might deny their child is crying or hungry. “I just fed her, there must not be a real problem.”

7 Delusional information is information which has been created and is not true. This kind of transformation is surprisingly common, even for healthy and functional processors. (Delusional information is not on the same field as something like “delusional schizophrenic.”) An example here might be “I just ate pizza, the baby won’t want my milk right now.”

In each of the four steps of information processing described above, information can be transformed in any way. Because there are so many possible combinations, the outcome in any given parent-child interaction (using the example above) can vary considerably all day long.

Attention and memory

As noted briefly above, information processing necessarily involves attention and memory. It is hard to perceive what we have not given attention to, or at least allowed into our awareness.

Interpreting current information requires access to memory systems. Information, especially about danger, is generally best understood in terms of our past experiences with danger.

Humans have at least seven different memory systems, all of which process different qualities of information. Most people learn in childhood to rely on certain memory systems more than others because they tend to uniquely support different information sources. This preference tends to carry into adulthood. Two memory systems are:

Semantic memory

Semantic memory handles the overall meaning of a past experience, but does not include details of the experience.

Imaged memory

Imaged memory stores an image of how we felt during a past experience, usually with some or a lot of detail, such as fear from an angry voice, a smell, or a type of touch, but not other details about the experience. Imaged memory may not include a semantic meaning, just a strong sensation.

Semantic memory tends to support or underlie cognitive information processing because it captures the predictable outcome regardless of personal feelings and needs. “The last time I got angry, I got punished. I don’t remember why I got angry, but I remember the consequence. If I get angry now, then it will be even longer before I get food.” Imaged memory, sometimes called perceptual memory, tends to support affective information processing, because it captures the intensity of the feeling which is related to the outcome of satisfying the feeling. “I smell breakfast cooking, I must be hungry.”

Semantic examplesImaged examples
“If I’m reasonable with them, they should be reasonable me.”

“I need a restraining order. I can’t give you an example why, I just do.”

“You’re the expert, I trust your decision.”

“Musn’t cry.”
“He was a terrible husband. He never even bought me a steak dinner!”

“Every time I smell that cologne, I feel like I’m going to get hit.”

“My partner is the best. Give you the shirt off the back, you know?”

“The milk of human kindness.”

Attachment, and other sciences, rely heavily on which memory systems people tend to rely on when examining their discourse patterns to determine a person’s preference for processing information cognitively or affectively. When people tend to prefer or utilize specific groups of memory systems more than other groups of systems, it can have a dramatic impact on their information processing biases.

Of course, memory is a complex topic of it own. Some kinds of semantic conclusions support affective processing, and some kinds of imaged memory support cognitive processing. Memory systems are mentioned here because they are an important part of information processing, and the DMM and CSI’s Conflict Model. Understanding memory system privilege and bias provides deep insight into why people behave and think in ways that are sometimes hard for others to understand.

The development of patterns of information processing: Bowlby and Crittenden

John Bowlby, one of the primary developers of attachment theory, wrote that information processing was largely conducted below the level of consciousness. In Attachment and Loss, Volume 3, chapter 4 (1980), Bowlby said that all pyschoanalytic defense mechanisms are a function of defensive exclusion of information (P. 64), and that common defenses which mitigate the pain of loss (of attachment figures, whether parents or adult partners) include repression, splitting, denial, dissociation, projection, displacement, identification, and reaction formation (P. 139).

“My thesis is that the traditionally termed defensive processes can all be understood as examples of the defensive exclusion of unwelcome information.”

John Bowlby, Attachment and Loss, (1980) page 140.

Dr. Patricia Crittenden began her career studying attachment theory from where Bowlby left off, with a focus on processing information and danger. In the article cited below she described the four stage structure of information processing discussed above.

While the article below is older, it nicely introduces and summarizes the concept of information processing as a practical application. The article helps set the foundation for understanding Crittenden’s ideas on attachment and her development of the Dynamic Maturational Model of Attachment and Adaptation (DMM).

Crittenden, P. M. (1993), An information-processing perspective on the behavior of neglectful parents, 20 Crim. Just. & Behavior 27. Available on ResearchGate here.

Somatic, or body processed, information

Somatic information is considered another type of information. It is given a lot of thought and attention not only by the mental health fields, but also by medical doctors and occupational and physical therapists. Kasia Koslowska, a medical doctor in Australia, has put a good bit of work into understanding how body states can be ways of knowing and communicating to others about danger.

While somatic information could be seen as a subcategory of affective information, Dr. Koslowska and others distinguish the two. Body discomfort, increased arousal, high muscle tone and pain are some examples of somatic representations of danger. This perspective on processing information about subjectively perceived danger has led Dr. Koslowska, and many others, to a deeper insight into body-states normally described with terms such as autism and ADHD. See for example Attachment and Family Therapy, Crittenden, Dallos, Landini, & Kozlowska (2014), Open University Press, McGraw-Hill Education.

The vagus nerve system, described by Stephen Porges’ Polyvagal Theory, describes one powerful somatic information processing system that works at a level mostly below awareness, and faster than the brain’s higher cognitive functions can work. Porges describes how the vagus nerve system functions as a sixth sense which perceives, processes, and transmits information from the body to the brain. The gut brain, which has 100 million neurons lining the intestines, is one such body-brain system.

The intensity of information and danger processed by the vagus nerve system can be light or quite strong. The fight-flight-freeze system is a part of the vagus nerve system, and when activated demonstrates an example of an intense and automatic danger response which can dominate information processing. In the 4-part information processing model above, it is probably common for people to perceive danger with their sixth sense of “body information” which then bypasses the 4-step model described above and directs a specific outcome.

Information processing summary

Why do people see things differently? For many people, the answer is distortion, omission, denial, or some other transformative process.

“The client should see things the way I do, and if they just had all the information I have, they would see it the way I do. I just need to keep trying to give them the facts I know.”

If only it were that simple.

Learning how information processing works teaches us that listening, acceptance, patience, compassion, understanding, and an ability to tolerate the unknown are essential skills for helping and teaching professionals. If we want to help our clients make their own decisions optimally, relative to their information processing abilities, we can do better by understanding how they are processing information. CSI’s Conflict Model incorporates DMM concepts, including information processing, specifically to help clients optimize their decision making.

If we understand what information they might be over-preferencing, what information they are not considering, then we have the hope of helping them include additional information into their decision making processes.

Mark Baumann, J.D.

Director, Conflict Science Institute

Mark Baumann is the founder and director of The Conflict Science Institute and has developed several of CSI’s integrative models for high conflict professionals, including the Conflict Model. Mark has served as a family law litigator, counselor, mediator, educator, and professional speaker since 1988, and as an ad-hoc board member of the International Association for the Study of Attachment (IASA). In addition to teaching CSI concepts worldwide, Mark continues to develop CSI techniques through the practice of family law, with a focus on attachment, trauma, and domestic violence.  (His complete C.V. can be found here)

    Category iconConflict pyschology,  CSI Articles,  CSI Concepts,  Danger,  DMM,  DMM Coffee House

    Primary Sidebar

    DMM Learning resources

    DMM Coffee House

    DMM Group Talk listserv

    DMM Blog

    DMM Community at Mighty Networks

    DMM Learning resources

    Techniques for managing Functional Somatic Symptoms in children and adolescents

    Book Review: Functional Somatic Systems and the DMM

    More DMM Blog posts

    CSI Circumplex

    Introducing DMM Coffee House

    DMM Coffee House

    DMM Coffee House #44: Non-violent discipline techniques part II

    DMM Coffee House #43: Non-violent discipline options from Peace Discipline

    DMM Coffee House #42: Milder forms of DMM Self-protective strategies in higher DMM patterns

    More Coffee House information

    Manage clients. Manage conflict.

    Reduce stress. Enjoy your practice.


    Learn the art of conflict science.



    1-360-452-8688

    Contact Us

    Footer

    DMM resources

    DMM Coffee House

    DMM Learning resources

    DMM Coffee House: DMM for beginners

    DMM Group Talk listserv

    DMM publications list 2019

    DMM Coffee House

    DMM Coffee House #44: Non-violent discipline techniques part II

    DMM Coffee House #43: Non-violent discipline options from Peace Discipline

    DMM Coffee House #42: Milder forms of DMM Self-protective strategies in higher DMM patterns

    DMM Coffee House #41: Somatic systems review

    DMM Coffee House #40: A conversation with Kasia Kozlowska on Functional Somatic Symptoms from a DMM perspective

    More DMM Coffee House session info

    • Facebook
    • Twitter
    • YouTube

    Copyright Mark Baumann, 2019