Research Platform

Open science for emotional technology research

FRAMEWORK F5

Worth Hierarchies Regulate

How Rules Become Sorting Systems

How threat-stabilized rule systems (F4) produce worth hierarchies — through the nervous system's orientation toward whatever signals safety — and how those hierarchies formalize into self-reinforcing sorting systems that distribute credibility, resources, and protection based on signal access rather than intrinsic worth. The second framework in the collective arc (F4–F7).

Core Propositions

FOUNDATIONAL CLAIM
  • Worth-seeking is often a nervous system regulation strategy, not a character flaw — the compass orienting toward whatever reduces threat in environments where worth determines protection
  • Safety proxies — economic, social, and cultural capital — function as nervous system stabilizers because they genuinely reduce threat in systems where these markers predict who gets protected
  • The Filter of Worth is a systemic mechanism by which signal access is mistaken for human value and signal deprivation is internalized as personal inadequacy
  • A five-step worth loop operates at both individual and institutional scales: threat increases dependency sensitivity, validation becomes regulatory, power becomes the highest safety proxy, proxies formalize into sorting rules, and the filter internalizes as self-worth
  • Chronic invisibility — the repeated experience of being unheard, dismissed, and excluded — produces a structurally stuck compass, not a cognitive distortion
  • Outcome gaps between insiders and outsiders are structural artifacts of proxy access, not evidence of intrinsic worth — maintained by double false coherence operating in both directions

Overview — The Second Collective Framework

F4 explains how individual nervous system patterns scale into collective rule systems — through emotional distortion, external regulation, and false coherence operating at the group level. Rules regulate. They provide predictability, belonging protection, and conformity.

But rule systems do not just organize behavior. They organize value. When rule adherence becomes the social definition of safety, the system begins to sort people. Those who comply — who perform the right roles, follow the right rules, display the right markers — receive more belonging, protection, and credibility. Those who do not — or cannot — receive less. Over time, the sorting formalizes. It stops looking like rules and starts looking like reality.

The regulation thread: F1 defines Biological Restoration as the return mechanism. F2 shows what happens when the return is never learned. F3 shows what cognition does in its place. F4 shows what happens when enough people running those mechanisms are in proximity: collective rule systems. F5 shows what those rule systems sort — belonging, protection, and credibility — distributed based on proximity to safety signals.

F5 is the second framework in the collective arc (F4–F7). Each describes a progressively larger-scale substitute for the regulation that was never built:

FrameworkWhat RegulatesThe Regulation Thread
F4 — Rules RegulateCollective rulesIndividual substitutes aggregate into collective rule systems. Predictability + conformity.
F5 — Worth HierarchiesWorth sortingRules begin to sort people by value. Status + credibility.
F6 — BiasGroup boundariesGroup protection through othering.
F7 — DominationPower overridePower through control and elimination.

Worth-seeking is not a character flaw. It is often a nervous system regulation strategy — the next substitute in the thread. When rules (F4) are not enough to regulate, position within the hierarchy provides an additional layer of stability. Naming the mechanism does not remove responsibility. It explains why status becomes regulating, so we can keep accountability while targeting the real drivers.

How This Framework Emerged

F5 emerged from recognizing that multiple frameworks — sociology, economics, social psychology, neuroscience, attachment theory, critical theory — all describe the same phenomenon: how systems distribute resources and protection based on hierarchical sorting. Sociology (Bourdieu, Weber, Goffman) describes capital forms, status, stigma, and social reproduction. Social psychology (Sidanius & Pratto, Jost & Banaji) describes social dominance and system justification. Behavioral economics (Spence) describes signaling theory. Network science (Bonacich, Barabási) describes eigenvector centrality and preferential attachment. Neuroscience (Porges, McEwen, Sapolsky) describes how power and status function as nervous system stabilizers. Attachment theory (Bowlby) describes how early validation deprivation creates validation-seeking. Critical theory (Crenshaw, Collins, Sen) describes intersectionality and structural exclusion. Health psychology (Wilkinson & Pickett, Krieger, Geronimus) describes inequality and health outcomes.

The synthesis: organizing these into a model showing that hierarchy and worth-sorting are nervous system regulation mechanisms at the systemic level, not moral or ideological systems. When relational safety is unreliable, systems substitute position-based safety — producing sorting that appears meritocratic but measures signal access.

Power as Safety — Why Worth-Seeking Is Regulation

When love, protection, or belonging were conditional early in life (F2), the nervous system learns a specific equation: being valued often equals being safer. Being powerless often equals being exposed. In many systems, position does not just increase access — it increases immunity: mistakes are forgiven faster, boundaries are negotiated differently, and consequences are softer.

In adulthood, this logic scales. Power becomes compelling — not because humans are shallow, but because power reduces vulnerability by increasing control over access, consequences, and protection. The person pursuing status, validation, or position is not displaying a character flaw. They are running the same regulation logic the nervous system has been running since childhood: find what reduces threat and move toward it.

This is the direct extension of F3's external regulation. When internal emotional processing is structurally unavailable, external markers substitute. Worth signals — approval, status, influence, credibility — become the regulation source. The person does not experience this as seeking regulation. It feels like ambition, drive, pride, or wanting to contribute. The distinction is not having goals — it is whether the nervous system experiences position as required for safety. False coherence (F3) makes the regulation strategy invisible to the person running it.

The regulation thread at this scale: when the biological return (F1) was never learned, and cognitive replacement (F3) is running, and rules have been absorbed as truth (F4) — worth hierarchies provide an additional layer of stability. Position within the hierarchy becomes a regulation source: knowing where you stand reduces uncertainty, and reducing uncertainty reduces threat.

Worth sorting expresses differently across the four modes. In Connection, worth is recognized as inherent — all people have it. In chronic Protection, worth is something to defend — position feels fragile. In chronic Control, worth is managed — curated, displayed, strategically deployed. In chronic Domination, worth hierarchy is enforced as entitlement — some people simply matter more.

Research Traditions

Bowlby (1969, 1988) — conditional attachment creates seeking for alternative safety sources. Adler (1927) — power-seeking as compensation for experienced powerlessness. Keltner, Gruenfeld, & Anderson — power and approach/inhibition theory. Control theory — control reduces anxiety. Systems theory — local patterns scale to systemic patterns.

TEG-Blue Contribution

The explicit connection between conditional safety (F2), stuck compass positions (F1), and adult worth-seeking as regulation strategy. While both phenomena are known separately — conditional attachment produces validation-seeking, power compensates for powerlessness — F5's specific contribution is tracing the pathway through the regulation thread: early conditional safety → compass calibrates to worth signals → adult worth-seeking functions as nervous system regulation → worth-seeking scales into institutional sorting.

The reframe changes what worth-seeking is. It is not ambition, vanity, materialism, or personality. It is the nervous system doing what it was taught to do: orienting toward whatever reduces threat. In environments where worth determines protection, worth-seeking is adaptive. The problem is not the person. The problem is the environment that made worth the price of safety.

Safety Proxies and the Three Capitals

A safety proxy is a marker that signals reduced threat and increased protection within an environment. Safety proxies are compelling because they predict how protection will be allocated when conflict or scarcity arrives. Common proxies include status, proximity to decision-makers, resource access, institutional endorsement, network connections, and cultural fluency.

They are compelling not because people are superficial, but because they genuinely reduce nervous system threat — in systems where these markers predict who gets protected and who gets exposed.

Bourdieu's Three Capitals Through a Nervous System Lens

CapitalSociological FunctionNervous System Function
EconomicFinancial resources, property, incomeIndependence and protection signals — "I can leave if I need to; I can absorb setbacks"
SocialNetworks, relationships, alliancesAlliance and insulation signals — "I have people who will protect me; I am connected to power"
CulturalEducation, accent, manners, knowledgePredictability and familiarity signals — "I know how this works; I belong in this space"

Each capital expresses differently across the gradient. In Connection, capitals are shared — resources, relationships, and knowledge serve the group. In chronic Protection, capitals are hoarded — losing them feels like losing safety. In chronic Control, capitals are deployed strategically — displayed to maintain position and manage perception. In chronic Domination, capitals are enforced — used to establish hierarchy and punish those who lack them.

Eigenvector Centrality — The Limits of Proximity Metrics

Eigenvector centrality — the network science concept that a node's importance depends on the importance of its connections — applies directly to social capital. Social capital is not just who you know. It is who your connections know. Proximity to power multiplies safety signals.

But the metric is incomplete in human systems because it cannot weight for emotional intelligence, manipulation, or harm. It measures proximity, not integrity. A person in chronic Control whose network reads as high-value may be running external regulation through management — and network centrality cannot distinguish between genuine connection and strategic positioning.

Research Traditions

Bourdieu (1986) — three forms of capital. Weber — status and class. Spence (1973) — signaling theory in job markets. Bonacich — eigenvector centrality. Barabási — scale-free networks, preferential attachment. Sen (1999) — capability approach. Porges (2011) — neuroception of safety. McEwen — allostatic load.

TEG-Blue Contribution

The unified terminology "safety proxies" — making explicit that economic, social, and cultural capital all function as nervous system stabilizers in threat-based systems. The sociological literature describes what capitals are. The neuroscience literature describes how threat works. F5 bridges them: capitals are compelling because they reduce nervous system threat, not because people are status-seeking by nature.

The nervous system translation of Bourdieu's three capitals — economic as independence signals, social as alliance signals, cultural as predictability signals — is the specific bridge between sociology and neuroscience. The gradient expression of each capital (shared in Connection through enforced in Domination) connects to the Inner Compass model. The eigenvector centrality critique — showing why proximity-to-power metrics are incomplete in human systems — is a distinctive application of network science to worth-sorting.

The Filter of Worth — How Signal Access Becomes Human Value

This is the central mechanism of F5. The Filter of Worth is the process by which external safety signals are mistaken for human value, and repeated signal deprivation is internalized as personal inadequacy.

This is not a belief system. It is not an ideology someone chooses. It is a repeated pattern of who is heard, believed, resourced, and protected — and who is not — that becomes felt as reality when stabilized. The filter operates below conscious awareness: who gets taken seriously in a meeting, whose pain gets responded to, whose version of events gets believed, whose potential gets recognized, whose mistakes get forgiven.

The Filter of Worth: signal access mistaken for human value. Signal deprivation internalized as inadequacy.

The filter consistently disadvantages people whose bodies, histories, or communication styles do not match the narrow set of signals the system recognizes as "credible." This often includes women, people of color, LGBTQIA+ communities, neurodivergent people, disabled people, survivors of abuse, poor and working-class people, immigrants and refugees — and anyone who disrupts the system's self-image.

Double False Coherence

The connection to F3's false coherence is direct. The person inside the filter — the person with access to safety proxies — generates false coherence around their position: "I earned this." "I got here on merit." "The system is fair — I'm proof." The person outside the filter generates different false coherence: "Something is wrong with me." "I'm not good enough." "If I just worked harder..." Both are false coherence serving regulation — the narrative that reduces threat and preserves identity stability. Neither reflects the structural reality of signal access.

Both "I earned this" and "something is wrong with me" can be false coherence — regulation strategies that absorb position as identity, rather than recognizing the structural filter.

The connection to F4's rule systems is structural. The filter formalizes through rules that appear meritocratic but measure signal access: hiring criteria that measure cultural capital, promotion systems that reward social capital, funding structures that require economic capital. Performance rules (F4) teach that worth must be earned. The Filter of Worth shows what "earning" actually measures: not ability, but proximity to the markers the system already recognizes.

Diagnostic

If two people produce similar quality work but receive consistently different levels of belief, forgiveness, or funding — you are seeing the Filter of Worth in action.

Research Traditions

Bourdieu & Passeron (1977) — social reproduction. Jost & Banaji — system justification theory. Crenshaw — intersectionality. Collins — matrix of domination. Silver, Sen — social exclusion. Attribution theory, labeling theory — internalization of disadvantage. Goffman — stigma.

TEG-Blue Contribution

The term "Filter of Worth" as a named systemic mechanism — making visible what is usually invisible. The term does four things: it names the entire system (not just individual beliefs about merit), it makes explicit that this is a filter (not a truth measurement), it shows it operates on worth (not competence), and it specifies the outcome: signal deprivation internalized as inadequacy.

The double false coherence framing — showing that both insider narratives ("I earned this") and outsider narratives ("something is wrong with me") are false coherence serving regulation — connects structural inequality to F3's individual mechanism. The filter is not maintained by bad people or bad policies alone. It is maintained by the cognitive regulatory system operating in everyone: false coherence absorbs the narrative that fits the person's position and presents it as truth.

The Five-Step Worth Loop

The mechanism by which threat produces worth sorting and worth sorting stabilizes itself:

  1. Threat increases dependency sensitivity. When the nervous system is under sustained threat (individual or structural), it becomes hypervigilant to ranking and exclusion signals. Where do I stand? Am I safe here? Who has more? Who has less?
  2. Validation becomes a stabilizer. Approval can reduce threat because it predicts inclusion and protection. When safety is unreliable, validation-seeking becomes a regulation strategy — not vanity, but orientation toward whatever reduces threat.
  3. Power becomes the highest safety proxy. Control over access, consequences, and protection provides the most reliable threat reduction. Economic, social, and cultural capital all converge on this: power — the capacity to determine outcomes — is the ultimate safety proxy because it reduces dependency on others' goodwill.
  4. Proxies become sorting rules. Safety proxies formalize into criteria, metrics, and standards — hiring requirements, promotion tracks, funding criteria, credibility markers. The informal signals of who-is-safe become the formal rules of who-gets-in. This is F4's rule internalization operating at the worth level.
  5. The filter becomes internalized as self-worth. Inside the filter = success, competence, merit. Outside the filter = failure, inadequacy, insufficient effort. Both positions are absorbed through false coherence (F3) as truth about the self rather than as the structural outcome of signal access.
The loop is self-reinforcing. Step 5 outcomes appear to justify original sorting. The people inside the filter have more resources, more visibility, more opportunities — and their success is cited as evidence that the sorting was correct. The structural artifact is mistaken for intrinsic difference.

This is the same architecture as F4 at a higher layer: threat → narrowing → formalization → internalization → self-reinforcement. The scale-invariant parallel to F4's seven-step mechanism demonstrates architectural consistency: the same mechanism operates at the level of rule systems (F4) and at the level of worth systems (F5).

Research Traditions

Gilbert, Price — social rank theory; rejection sensitivity (Downey, Feldman). Coan, Sbarra — social baseline theory; contingent self-worth (Crocker, Wolfe). Keltner — power and approach/inhibition; Merton (1968) — Matthew effect. DiMaggio, Powell — institutional isomorphism; Collins — credentialism. Jost — system justification; David — internalized oppression.

TEG-Blue Contribution

Articulating the five steps as a unified mechanism operating at both individual and institutional scales simultaneously. While each step is documented in existing literature, no existing framework traces the complete loop from threat-driven dependency sensitivity through validation-seeking through power-as-proxy through formal sorting through internalized worth — and shows how Step 5 closes the loop by generating the evidence that appears to justify Step 1.

The scale-invariant parallel to F4's seven-step mechanism demonstrates the architectural consistency: the same mechanism — threat → interpretation → formalization → internalization → self-reinforcement — operates at the level of rule systems (F4) and at the level of worth systems (F5). This is the regulation thread continuing: each scale adds a layer of substitute regulation, and each layer uses the same underlying logic.

Chronic Invisibility — Structural Compass Lock

The Filter of Worth does not just distribute resources unevenly. It produces measurable physiological effects. Chronic invisibility — the repeated experience of being unheard, dismissed, passed over, disbelieved, and excluded — functions as chronic social threat. The cost is not only the event itself — it is the anticipation: the nervous system learns to expect dismissal, so threat activation begins before the next interaction.

This is the same mechanism F1 describes at the individual level, now operating structurally. The compass orients toward protection — not because the person is choosing a defensive posture, but because the environment is holding their compass there. Repeated non-response, dismissal, and exclusion are danger signals. The nervous system does what it was designed to do: it activates Protection mode (F1) and stays there.

Physiological Consequences

DomainManifestation
Nervous systemChronic hypervigilance, shutdown
CognitiveSelf-doubt, imposter experience
BehavioralUnderstating needs, overworking to prove worth
RelationalAnticipatory rejection
PhysicalChronic tension, fatigue, accelerated biological aging
The person is not "choosing" chronic Protection. The filter is producing ongoing signals that keep their compass oriented toward defense. This is a stuck compass (F1) — but the sticking force is structural, not only developmental.

These consequences connect to allostatic load (McEwen) — the cumulative physiological cost of repeated stress adaptation — and to the weathering hypothesis (Geronimus) — the accelerated biological aging produced by sustained structural stress.

Clinical Implication

When a person presents with chronic self-doubt, imposter experience, hypervigilance, or somatic stress patterns, the assessment must include structural invisibility as a contributing factor. These presentations may be accurate adaptations to filtering environments — not cognitive distortions to be corrected. Individual support can still reduce load and expand choices — but without structural change, the nervous system may be asked to "relax" in conditions that keep proving threat.

Research Traditions

Porges (2011) — chronic social threat activates defensive states. McEwen, Seeman — allostatic load, cumulative stress cost. Gilbert — social defeat, subordination stress. Wilkinson & Pickett — inequality and health outcomes. Krieger — discrimination and health. Geronimus — weathering hypothesis.

TEG-Blue Contribution

Framing chronic invisibility as producing a structurally stuck compass — connecting structural inequality directly to the Inner Compass model. The person is not running a distorted perception (which would be a cognitive problem). They are running an accurate perception that is holding their compass in a chronic mode (which is a structural problem). Existing frameworks describe allostatic load, weathering, and health disparities. F5 adds the specific mechanism: structural filtering → chronic social threat → compass stuck in Protection → the presentations that clinicians see.

This changes the intervention target. If the compass is stuck because the filter is holding it there, then individual therapy alone cannot unstick it — because the filter is still operating. The structural condition must be part of the assessment. This is consistent with F1's principle: assess the conditions, not just the person.

Self-Reinforcing Advantage — Why Gaps Are Structural Artifacts

Once the Filter of Worth stabilizes, it produces compounding effects in both directions:

PositionWhat Compounds
Inside the filterMore validation, more resources, more visibility, more opportunities, more benefit of the doubt, more credibility, more forgiveness when failing. Each advantage compounds the next — producing a credibility surplus.
Outside the filterCompounding barriers, less visibility, more skepticism, fewer opportunities, less benefit of the doubt, less credibility, harsher consequences for the same failures. Each barrier compounds the next.
Outcome gaps are structural artifacts of proxy access, not evidence of intrinsic worth. The person inside the filter who has more publications, more funding, more awards did not necessarily produce better work. They had more access to the signals the system recognizes.

This connects to the Matthew effect — "to those who have, more will be given" — and adds the nervous system layer: position does not only accumulate resources; it accumulates regulatory stability, making the hierarchy feel deserved from the inside.

Double false coherence maintains the filter. The insider's narrative — "I earned this through merit" — is false coherence serving regulation. It stabilizes the identity and reduces the threat of examining one's position. The outsider's narrative — "something is wrong with me" — is also false coherence serving regulation. Both narratives are regulation strategies. Neither reflects the structural reality of how the filter operates.

The filter is maintained not by conspiracy but by the cognitive regulatory system (F3) operating in every person the filter touches. The collective false coherence around merit is the F4 rule system operating at the worth level: "merit" becomes a rule that the cognitive system absorbs as truth, and the filter's outcomes become the evidence that the rule is correct.

Research Traditions

Merton (1968) — Matthew effect in science. DiPrete & Eirich — cumulative advantage/disadvantage. Salganik, Watts — success-breeds-success dynamics. Jost — system justification. Bourdieu — social reproduction.

TEG-Blue Contribution

The explicit claim that observed gaps are structural artifacts of proxy access, not evidence of intrinsic differences — connected to the double false coherence mechanism. While cumulative advantage is well-documented, F5 adds the regulatory mechanism: false coherence operates in both directions simultaneously, making the filter invisible to insiders ("I earned this") and self-blaming for outsiders ("something is wrong with me").

This connects the structural observation (inequality compounds) to the individual mechanism (false coherence absorbs position as identity) — showing that structural inequality is maintained partly through the same cognitive regulation process that F3 established at the individual level.

What F5 Establishes

F5 shows how threat-stabilized rule systems (F4) produce worth hierarchies — through the nervous system's orientation toward whatever signals safety — and how those hierarchies formalize into self-reinforcing sorting systems that distribute credibility, resources, and protection based on signal access rather than intrinsic worth.

Core Concepts

ConceptWhat It Means
Power as safetyWorth-seeking is nervous system regulation — the compass orienting toward whatever reduces threat. Not a character flaw. An adaptation to conditional safety.
Safety proxies and three capitalsEconomic, social, and cultural capital function as nervous system stabilizers. Compelling because they genuinely reduce threat in systems where these markers predict protection.
The Filter of WorthSignal access mistaken for human value. Signal deprivation internalized as inadequacy. Not a belief system — a repeated pattern of who gets heard, believed, resourced, protected.
Five-step worth loopThreat → validation-seeking → power-as-proxy → formal sorting → internalized worth. Self-reinforcing. Scale-invariant parallel to F4's seven-step mechanism.
Chronic invisibilityStructural filtering produces chronic social threat → compass stuck in Protection. Not individual cognitive distortion — accurate adaptation to filtering environment. Clinical assessment must include structural conditions.
Self-reinforcing advantageOutcome gaps are structural artifacts of proxy access. Double false coherence: insider's "I earned this" and outsider's "something is wrong with me" are both regulation strategies.

Key Formulations

  • "Worth-seeking is often a regulation strategy, not a character flaw"
  • "The compass reads worth signals as safety signals — because in these environments, they are"
  • "The Filter of Worth: signal access mistaken for human value; signal deprivation internalized as inadequacy"
  • "Both 'I earned this' and 'something is wrong with me' can be false coherence"
  • "Outcome gaps are often proxy-access artifacts, not evidence of intrinsic differences"
  • "Merit is a rule the cognitive system absorbs as truth — and the filter's outcomes become the evidence"
  • "Do not pathologize accurate adaptations to filtering environments"
  • "Assess structural threat as part of nervous system load"
  • "Restore safety first — including structurally — then expect flexibility"

Research Foundations

TraditionKey ContributionResearchers
SociologyCapital theory, habitus, social reproduction, stigmaBourdieu, 1986; Weber; Goffman
Social PsychologySocial dominance, system justificationSidanius & Pratto; Jost & Banaji
Behavioral EconomicsSignaling theorySpence, 1973
Network ScienceEigenvector centrality, scale-free networksBonacich; Barabási
NeuroscienceNeuroception, allostatic load, stress and hierarchyPorges, 2011; McEwen; Sapolsky
Attachment TheoryConditional attachment, validation-seekingBowlby, 1969; Adler, 1927
Critical TheoryIntersectionality, structural exclusion, capability approachCrenshaw; Collins; Sen, 1999
Health PsychologyInequality and health, weathering, discriminationWilkinson & Pickett; Krieger; Geronimus
Cumulative AdvantageMatthew effect, success-breeds-successMerton, 1968; DiPrete & Eirich
Social Rank TheorySubordination stress, rejection sensitivityGilbert; Downey & Feldman

Bridge to F6: When Sorting Becomes Perception

F5 explains how rule systems produce worth hierarchies — and how those hierarchies formalize into self-reinforcing filters that distribute resources, credibility, and protection based on signal access rather than intrinsic worth.

But there is a further step. When worth sorting becomes stable and internalized, it stops being experienced as a system. It becomes perception. Bias is what happens when a long-running filter becomes pre-attentive perception: credibility and competence feel inherent before evaluation begins. The person who has been repeatedly validated and resourced looks competent. The person who has been repeatedly dismissed and underfunded looks like they lack something. The sorting disappears from view because it aligns with what feels like direct perception.

F5 is what rules sort. F6 is how sorting becomes invisible.

F6 explains how this happens: how perception becomes protection, why bias resists correction even in intelligent, well-intentioned people, and what conditions allow perceptual flexibility to return.

Where to Go Next

If you want to...Go here
Read the bias framework (F6)Bias Regulates \u2192
Read the first collective framework (F4)Rules Regulate \u2192
Read the foundational framework (F1)Emotions as Biological Information \u2192
Read the calibration framework (F2)Awareness Teaches Awareness \u2192
Read the cognitive maintenance framework (F3)Adult Cognition & False Coherence \u2192
See the four modes as a measurement systemFour-Mode Gradient \u2192
Explore all 12 frameworks12 Frameworks \u2192
Review the source theoriesScientific Foundations \u2192
Look up key termsGlossary \u2192
See published researchPublications \u2192
Experience the toolsEmotional Tools (teg-blue.com) \u2192

TEG-Blue Research Consortium \u00b7 Open Science \u00b7 CC BY-NC-SA 4.0