Chapter 4 Exercises: The Psychology of Threat — What Your Brain Does in Conflict

These exercises progress from conceptual understanding to real-world application. Work through them in sequence or focus on the areas where you most want to build skill. Difficulty levels: ★ (accessible), ★★ (requires reflection and some effort), ★★★ (challenging, requires sustained engagement).


Section A: Understanding the Threat Detection System

Exercise 1 [Conceptual] ★

In your own words, explain the difference between the "low road" and the "high road" of threat processing as described by Joseph LeDoux. Why does the low road's speed advantage matter in confrontation? What is the cost of that speed?

Target length: 150–200 words.


Exercise 2 [Conceptual] ★

List five specific social situations — drawn from your own life or realistic examples — that would likely trigger the amygdala's threat response even though no physical danger is present. For each, identify which of the following overlap with the trigger: past experience, identity threat, relationship stakes, uncertainty, perceived power differential.


Exercise 3 [Applied] ★★

The next time you feel physical signs of anxiety or tension before or during a conversation (elevated heart rate, shallow breathing, muscle tension, dry mouth), pause and document the following as soon as possible afterward:

  • What were the physical sensations, and in what order did you notice them?
  • What was the trigger you can identify?
  • How did the physical experience affect what you said or did?
  • What does this suggest about your personal threat detection signatures?

Keep this as a running log for at least two weeks.


Exercise 4 [Conceptual] ★★

Explain, in terms a non-psychologist could understand, why social threats — such as being publicly corrected, or being excluded from a group — can feel as intense as physical threats. Reference the research discussed in Chapter 4 (Eisenberger, Lieberman, and/or LeDoux). What are the implications of this for how we design difficult conversations?


Exercise 5 [Scenario] ★★

Read the following scenario and answer the questions below:

Jana is a senior accountant who discovers that a junior colleague has claimed credit for her analysis in a presentation to leadership. She is informed of this by a coworker the morning of a big departmental meeting. She spends the entire meeting unable to focus, mentally composing arguments and counterarguments, watching her junior colleague speak. By the end of the meeting, she has not said anything.

a. Which elements of this scenario likely triggered Jana's threat detection system? b. Which of the 4F responses did Jana exhibit? Was more than one response present? c. What SCARF domains were threatened? d. If Jana approached this colleague an hour after the meeting, what neurological considerations should she keep in mind?


Section B: The Four Survival Responses

Exercise 6 [Conceptual] ★

Create your own comparison of the four survival responses (fight, flight, freeze, fawn) using the following format for each:

  • Response name
  • The underlying threat assumption
  • One example from a work context
  • One example from a personal/family context
  • One thing that makes this response hard to recognize in yourself

Exercise 7 [Applied] ★★

For one week, keep an informal "4F log." Each time you notice yourself in a difficult interpersonal moment, note:

  • Which response activated (even partially)?
  • What was the trigger?
  • Was this response consistent with your usual pattern, or different?
  • What did you wish you had done instead?

At the end of the week, write a 200-word summary of what you observed.


Exercise 8 [Scenario] ★★

Sam Nguyen's face flushes when his colleague Tyler deflects accountability. Sam typically responds by softening his concerns, over-explaining, and eventually dropping the issue.

a. Identify Sam's primary survival response and explain what neurological function it is serving. b. What SCARF domain(s) might be driving Sam's activation? c. Describe what a physiologically regulated Sam — one who recognized his fawn response before acting from it — might do differently in the next conversation with Tyler.


Exercise 9 [Synthesis] ★★★

The freeze response is often misidentified as "not caring" or "being checked out." Write a 300-word essay defending the following claim: Freeze is not disengagement — it is a profound form of engagement that has exceeded the nervous system's capacity for regulation. Use the neurological information from Chapter 4 to support your argument, and discuss the implications for how people should respond when a conversation partner appears to "shut down."


Exercise 10 [Applied] ★★★

Identify someone in your life who you believe exhibits a fawn response in conflict (this could be yourself). Without sharing your analysis with them, design a conversation context with that person that would minimize the most likely SCARF threats and give them a higher-safety space to express their actual position. Write out:

  • The specific conditions you would create
  • How you would open the conversation
  • What signals you would watch for that indicate whether safety is increasing or decreasing
  • What you would do if you noticed threat activation rising

Section C: The SCARF Model

Exercise 11 [Conceptual] ★

For each of the five SCARF domains, write one sentence that defines the domain and one sentence that describes how a confrontation might threaten it. Use a different context for each (e.g., one at work, one at home, one with authority figures, etc.).


Exercise 12 [Applied] ★★

Think of a specific difficult conversation you have had in the past six months — one that did not go well. Using the SCARF model, conduct a post-mortem analysis:

  • Which domains were threatened for you?
  • Which domains were likely threatened for the other person?
  • Were there any domains you could have proactively protected — in either yourself or the other person — that might have changed the outcome?

Write 250–350 words.


Exercise 13 [Scenario] ★★

Marcus has been asked to deliver a group presentation in his pre-law seminar arguing a position he strongly disagrees with. His professor will critique the argument publicly, regardless of quality, as part of the exercise. Marcus knows this, and he still feels dread.

a. Map the SCARF domains that are likely activated for Marcus before and during this exercise. b. Rank them by likely intensity for Marcus, given what you know of his character and responses from Chapter 1. c. What could Marcus's professor do differently to minimize SCARF threats without sacrificing the educational rigor of the exercise?


Exercise 14 [Applied] ★★

Before your next difficult conversation, conduct a SCARF pre-analysis:

  • Which of my own SCARF domains am I most worried about in this conversation?
  • Which of the other person's SCARF domains am I most likely to threaten, even unintentionally?
  • What specific changes to how I frame, open, or structure this conversation could minimize those threats?

Write up your pre-analysis. After the conversation, write a brief post-analysis: which threats materialized? Which were successfully minimized?


Exercise 15 [Synthesis] ★★★

David Rock's SCARF model has been widely adopted in organizational settings but has also been critiqued for oversimplifying complex social dynamics and for lacking the methodological rigor of peer-reviewed psychological frameworks.

Write a 400-word balanced evaluation of the SCARF model that: - Identifies its genuine strengths as a practical framework - Identifies at least two legitimate limitations or critiques - Concludes with your own assessment of when and how practitioners should use it


Section D: Emotional Hijacking and Recovery

Exercise 16 [Conceptual] ★

Describe the six phases of an amygdala hijack as outlined in Chapter 4. Then explain why the "20-minute rule" matters and what the practical implications are for how you handle a conversation that has escalated.


Exercise 17 [Applied] ★★

Identify your top three personal hijack signatures — the specific, observable indicators (in your body, your language, or your behavior) that tell you that you have been emotionally hijacked. For each signature:

  • Describe it concretely (what does it look like from the outside?)
  • Note when it typically appears (what kinds of triggers precede it?)
  • Identify a single, specific intervention that could interrupt the pattern once you notice the signature

Exercise 18 [Scenario] ★★★

Consider the following scenario:

During a family dinner, Jade's mother Rosa brings up Jade's decision to pay her own tuition rather than contribute to household expenses. Rosa's tone is initially questioning, then becomes accusatory. Jade begins to freeze — her words disappear, she stares at the table, and she eventually produces a quietly apologetic "I'm sorry, you're right" that she does not mean. The conversation ends, but nothing is resolved. Three days later, Jade's mother makes the same accusation again.

a. Describe what happened neurologically during the dinner conversation. b. Jade wants to have this conversation again — this time with a different outcome. What does she need to do in the 20-minute window before the conversation begins? c. What could Jade say at the moment she notices herself beginning to freeze that would buy her the time she needs without ending the conversation entirely? d. What would the "after" version of this conversation look like if Jade entered it in a regulated state?


Exercise 19 [Applied] ★★

Develop a personal "nervous system reset protocol" — a specific set of actions you will take when you recognize that you have been hijacked before a necessary conversation. The protocol should include:

  • At least two physiological regulation techniques (drawn from your own experience or the research discussed in Chapter 4)
  • A way to honestly assess whether you are regulated enough to continue
  • A phrase or script for requesting time if you need it
  • A plan for re-engaging with the conversation within a defined timeframe

Write out the protocol in enough detail that you could actually follow it.


Section E: Neuroscience of Trust and Safety

Exercise 20 [Conceptual] ★

In your own words, explain Amy Edmondson's concept of psychological safety. What does it mean neurologically? How does it relate to the concept of threat state described earlier in Chapter 4? Why did Edmondson's hospital research produce counterintuitive findings about error reporting?


Exercise 21 [Applied] ★★

Conduct an informal psychological safety audit of one of your regular relationships (a work team, a family, a friendship). Rate the following on a scale of 1–5 (1 = not at all, 5 = consistently):

  • I can voice a concern without fearing it will damage the relationship.
  • Mistakes are discussed openly rather than hidden.
  • Different opinions are genuinely welcomed.
  • People ask for help when they need it.
  • There is consistent follow-through on commitments.
  • I feel like a valued person, not just a functional role, in this context.

Score yourself (1–30 total). What does the score suggest? Identify one specific action you could take in the next week to raise the safety level by even one point.


Exercise 22 [Scenario] ★★

Dr. Priya Okafor has a junior resident, Dr. Amir, who has not reported a near-miss medication error. She suspects he feared her reaction. She wants to have a conversation that both addresses the specific incident and rebuilds the reporting culture on her unit.

a. Using the SCARF model, identify which domains might be threatened for Dr. Amir in this conversation. b. How should Priya open this conversation to minimize those threats? c. What would Priya need to do over time — beyond this single conversation — to build the psychological safety required for consistent error reporting?


Exercise 23 [Synthesis] ★★★

Paul Zak's research on oxytocin and trust, while influential in popular science, has faced significant replication challenges and methodological critiques. At the same time, the broader finding — that trust has a neurochemical basis and that social signals can influence neurochemical states — has meaningful support in the literature.

Write a 300-word reflection on the following: What does it mean for our understanding of difficult conversations if trust is, at least in part, a physiological state rather than merely a cognitive decision? Discuss both the hopeful and the sobering implications of this view.


Section F: Integration and Synthesis

Exercise 24 [Synthesis] ★★★

Design an "ideal confrontation environment" for a specific difficult conversation you need to have in the next month. Using all five frameworks from Chapter 4 (threat detection system, 4F responses, SCARF model, hijack/recovery, neuroscience of trust), address:

  • How you will prepare yourself physiologically
  • Which SCARF domains you need to protect for both parties
  • How you will open the conversation to minimize threat activation
  • What your contingency plan is if hijacking occurs
  • What you will do after the conversation to reinforce safety and trust

Write this as a practical plan, not an essay — specific, actionable, and grounded in the neuroscience.


Exercise 25 [Applied] ★★★

Over the next month, choose one recurring difficult conversation in your life (a relationship, a workplace dynamic, a family pattern) and conduct what researchers call a "behavioral experiment": implement at least three of the strategies from Chapter 4, document what you observe, and write a reflective report of 400–500 words that addresses:

  • What you changed and why
  • What you observed in yourself and the other person
  • What neurological principles you believe were operating
  • What you would do differently in the next iteration
  • What this experiment taught you about your own threat response patterns

Exercise 26 [Conceptual] ★★

In Chapter 3, we mapped conflict styles (competing, avoiding, accommodating, collaborating, compromising) onto interpersonal behavior patterns. Now, using Chapter 4's framework, explain the neurological underpinnings of each conflict style. Which threat response corresponds to which style? Are there conflict styles that involve multiple threat responses? Which style requires the most prefrontal cortex engagement, and why?


Exercise 27 [Scenario] ★★

A management consultant has been brought in to improve communication in a team where several members have stopped speaking to each other. She spends two weeks observing and concludes that the team has essentially no psychological safety. She recommends mandatory conflict resolution training.

Write a critique of this approach from a neuroscience perspective. What does Chapter 4 tell you about why skills training alone is unlikely to solve this problem? What would you recommend instead, or in addition? (200–250 words)


Exercise 28 [Applied] ★★

Write a letter to your past self — to a version of you who was about to enter a difficult confrontation that went badly. Using the framework of Chapter 4, explain:

  • What was probably happening neurologically in your body in the hours leading up to the conversation
  • Which SCARF domains were most likely threatened
  • What specific preparation might have changed the outcome
  • What you know now that you wish you had known then

The letter should be 300–400 words and written in a tone that is kind and honest — not self-critical.


Exercise 29 [Synthesis] ★★★

The introduction to Chapter 4 argues that the threat response is "not a character flaw" but a biological system doing its job. Some critics of this framing argue that overemphasizing neuroscience in conflict studies can inadvertently reduce moral accountability — "my amygdala made me do it" — and undermine the genuine moral responsibility people have for their behavior in conflict.

Write a 350-word response to this critique. Do you believe neuroscientific explanations of conflict behavior are compatible with moral accountability? How do you think about the relationship between understanding why you behave as you do and being responsible for how you behave?


Exercise 30 [Applied] ★★★

Create a one-page visual reference card (described in text, not requiring graphic design) that summarizes the most important neurological concepts from Chapter 4 in a format you could actually use before a difficult conversation. Include:

  • A brief reminder of how the threat system works
  • Your personal 4F pattern
  • Your SCARF sensitivity profile (high-sensitivity domains)
  • Your hijack signatures and your preferred intervention
  • Your three most important trust-building practices

This card should be personalized — not a summary of the chapter, but a self-knowledge artifact that reflects your specific patterns and needs.


End of Chapter 4 Exercises