Frameworks Status: Proposed synthesis, built on established research The explanatory hub behind TEG-Blue.
If the Four-Mode Gradient is the measurement layer, then these 12 frameworks are the explanatory layer that clarifies:
Why patterns emergeHow they escalateWhy they look paradoxicalHow repair becomes possible againFull system view: System Overview →
The framework arc F1–F3 (Formation): How the nervous system orients, how identity crystallizes, how cognition maintains coherenceF4–F6 (Scaling): How individual patterns become social rules, worth hierarchies, and perception biasesF7 (Turning Point): How protection escalates through control into dominationF8–F10 (Healing): Self-reconnection, neurodivergent pathways, and intergenerational repairF11–F12 (Integration): Paradox resolution and the complete theoretical synthesisF1 – Emotions as a Biological Information System (The Emotional Gradient) Formation
Foundation of Emotional Experience
How the nervous system continuously orients between safety and threat, determining perception, capacity, and behavior.
Show details ▼
F2 – Identity as an Adaptive Cognitive System (The Ego-Persona Construct) Formation
Attachment-Calibrated Identity Formation
How identity crystallizes around a default mode when environments require adaptation, creating the Real Self / Role Mask structure.
Show details ▼
F3 – Adult Cognition and False Coherence (Our Three Inner Layers) Formation
Dissonance and Contradiction Management
How cognition maintains identity coherence under nervous system pressure, producing rationalization and motivated reasoning.
Show details ▼
F4 – Threat-Based Rule Internalization (The Invisible Models) Scaling
Rule Adherence and Defensive Coordination
How unspoken social rules form and govern emotional and relational life at the nervous system level.
Show details ▼
F5 – Threat-Driven External Validation (The Filter of Worth) Scaling
Status, Power, and Worth Hierarchies
How threat-organized systems convert safety signals into worth hierarchies that determine what feels safe, lovable, or allowed.
Show details ▼
F6 – State-Dependent Perception (The Bias Architecture) Scaling
Threat-Based Meaning and Perception
How perception becomes state-dependent, producing perceptual defaults that feel like truth but function as regulation.
Show details ▼
F7 – Defense-to-Domination Escalation (The Anatomy of Tyranny) Turning Point
Escalation Markers and Intervention Windows
How protection escalates through control into domination — the crossroads where defense becomes strategy.
Show details ▼
F8 – Self-Reconnection and Role Mask Loosening (Our True Self) Healing
From Survival Identity to Truth Tolerance
How sustained safety allows the Role Mask to loosen, enabling gradual return to the Real Self.
Show details ▼
F9 – Inborn Rhythm and Masking Cost (Neurodivergent Processing) Healing
Social Calibration Pressure and Variation
How neurodivergent nervous systems process the emotional gradient differently, and the costs of forced masking.
Show details ▼
F10 – Intergenerational Transmission and Repair (Rebuilding Generational Bridges) Healing
Family-Scale Safety and Lineage Repair
How emotional patterns pass across generations, and the conditions that enable interruption and repair.
Show details ▼
F11 – Emotional Logic Behind Paradoxes (Paradox Integration) Integration
Non-Binary Sense-Making
How contradictions emerge predictably when emotional survival structures meet healing — and resolve when state logic is included.
Show details ▼
F12 – Two Information Systems (State-Dependent Coherence) Integration
How Two Parallel Systems Generate All Behavior
Human behavior is organized by the interaction of two parallel information systems: the Cognitive-Logical System (language, reasoning, planning — conscious, slow) and the Emotional-Somatic System (safety/threat detection, relational cues — unconscious, fast). State precedes capacity.
Show details ▼
Help us validate this mapping We are explicitly inviting critique.
Ways to contribute: Identify errors in attribution or conceptual links Suggest missing foundational theories that should be represented Propose falsifiable predictions for any framework Recommend measures that could test specific claims Run or advise on replication designs How credit works: Contributors are acknowledged on the site. Significant contributions can receive per-section attribution. Research outputs follow clear authorship norms, agreed in advance.
Contact: research@teg-blue.org