Narcissistic rage revisited.
Citations Over TimeTop 10% of 2014 papers
Abstract
Narcissists are thought to exhibit "narcissistic rage," an explosive mix of anger and hostility arising from threats to narcissists' fractured sense of self. Building on clinical views of narcissism, we present empirical evidence on the nature and sources of narcissistic rage. Findings from 4 studies reveal narcissistic vulnerability (but not grandiosity) as a powerful driver of rage, hostility, and aggressive behavior, fueled by suspiciousness, dejection, and angry rumination. Consistent with theorizing about narcissistic rage, Study 1 showed that vulnerable (but not grandiose) narcissism predicted more anger internalization and externalization, as well as poorer anger control. Study 2 revealed vulnerable narcissism as a stronger indicator of shame and aggressiveness, especially hostility and anger. Study 3 identified distrust of others and angry rumination as key factors accounting for vulnerable narcissists' reactive and displaced aggression. Study 4 provided behavioral evidence that vulnerable (but not grandiose) narcissism amplifies reactive and displaced aggression in the face of provocation. Taken together, the findings not only establish narcissistic vulnerability as a key source of narcissistic rage but also reveal an important pathway to narcissistic aggression that does not involve competitiveness or exploitativeness. In addition, the results support clinical views of narcissistic aggression and implicate deficient self-esteem as an important driver of aggressive behavior.
Related Papers
- → On the Meaning and Measure of Narcissism(2009)380 cited
- → Is the Narcissistic Personality Inventory Still Relevant? A Test of Independent Grandiosity and Entitlement Scales in the Assessment of Narcissism(2011)126 cited
- → Facets of grandiose narcissism predict involvement in health-risk behaviors(2014)67 cited
- → Narcissism, Mania and Analysts' Envy(2011)3 cited
- → Using Homogenous Scales to Understand Narcissism: Grandiosity, Entitlement, and Exploitativeness(2018)2 cited