scholarly journals An experimental comparison of rebate and matching in charitable giving: The case of Japan

Author(s):  
Shusaku Sasaki ◽  
Hirofumi Kurokawa ◽  
Fumio Ohtake

AbstractThis study uses a Japanese nationwide sample and experimentally compares rebate and matching, both of which are schemes intended to lower the price of monetary donation. Standard economic theory predicts that the two schemes will have the same effect on individuals’ donation behavior when their donation price is equivalent. However, we conduct an incentivized economic experiment through the Internet on 2300 Japanese residents, and find that matching, which lowers the donation price by adding a contribution from a third-party, increases individuals’ donation expenditures compared to rebate, which lowers it through a refund from a third-party. The experimental result shows that the donation expenditure in a 50% rebate treatment drops by approximately 126 Japanese yen compared to the control, while in a 1:1 matching treatment with essentially the same price of donation as the 50% rebate, the expenditure conversely rises by approximately 56 Japanese yen. This tendency is consistent with the results of previous experimental studies comparing the two schemes. We further empirically confirm that the superiority of 1:1 matching over 50% rebate is not conclusively influenced by the participants’ confusion or misunderstanding, or budget constraint lines’ difference between the two schemes. Although the Japanese government has previously enriched rebate’s content, the level of monetary donations by the Japanese people is still low on an international scale. Based on this study’s findings, we discuss the possibility that implementing matching into the society effectively encourages their donation behavior.

2017 ◽  
Vol 44 (6) ◽  
pp. 1257-1273 ◽  
Author(s):  
Bonnie Simpson ◽  
Katherine White ◽  
Juliano Laran

Abstract This research examines the effectiveness of public recognition in encouraging charitable giving, demonstrating that public recognition can sometimes decrease donations. While previous work has largely shown that making donations visible to others can motivate donors, the present research shows that the effectiveness of public recognition depends on whether potential donors are under an independent (i.e., separate from others) or interdependent (i.e., connected with others) self-construal. Across seven experimental studies, an independent self-construal decreases donation intentions and amounts when the donor will receive public recognition compared to when the donation will remain private. This effect is driven by the activation of an agentic motive, wherein independents are motivated to make decisions that are guided by their own goals and self-interests, rather than being influenced by the opinions and expectations of others. This research contributes to the understanding of the nuanced roles of both public recognition and self-construal in predicting donation behavior.


2018 ◽  
Author(s):  
Alexander Genevsky ◽  
Brian Knutson ◽  
Carolyn Yoon

AbstractFundraising organizations face difficult decisions regarding how to construct solicitations for donations. While these aid requests often include multiple salient features, their interactive effect on donation behavior and the psychological mechanisms that underlie their combined influence remain unclear. In six studies utilizing online and laboratory samples, as well as hypothetical and real incentives, we examine whether and how request framing moderates the impact of positive and negative images on charitable giving. Across all studies and in a single-paper meta-analysis, the influence of affective images on giving was moderated by the valence of request framing, such that affectively matched features most effectively elicited donations. Further, donors’ experienced positive affect could account for this matching effect – even in cases of matched negative features. These findings suggest that organizations can increase the effectiveness of aid requests by focusing on the affective match of request features. This work integrates previously discrepant findings on the impact of affect on donations and holds both conceptual implications for how affect can influence giving and practical implications for organizations seeking to design optimally effective requests for aid.


2021 ◽  
Author(s):  
Huiqing Huang ◽  
Yuzhuo Zhang ◽  
Jieyu Lv ◽  
Tong Jiang ◽  
Xi Zhang ◽  
...  

Abstract. Although offering gifts to encourage prosocial behaviors is a popular daily strategy, its underlying mechanism remains unknown. This study investigated the effect of thank-you gifts on charitable giving in laypeople’s beliefs ( N = 1,293). Study 1 showed that laypeople believe thank-you gifts increase charitable giving. Study 2 found that laypeople believe thank-you gifts increase both charitable giving and positive emotions of donors. Study 3 further showed that laypeople’s anticipation of donors’ emotional gain might play a mediating role in the effect of thank-you gifts on charitable giving. Study S1 found that participants’ donated amounts in the benefit-to-others thank-you gifts condition exceeded other conditions on actual donation behavior. These findings emphasize the emotional value of the gift in laypeople’s beliefs.


2020 ◽  
Vol 49 (5) ◽  
pp. 951-968
Author(s):  
Etienne Denis ◽  
Claude Pecheux ◽  
Luk Warlop

Commonly regarded as an important driver of donation behavior, public recognition also can reduce donations. With three studies, this research manipulates whether donors receive public, private, imposed, or optional forms of recognition; the results show that the influence of recognition on the decision to donate is moderated by donors’ need for social approval. Whereas public recognition improves charitable giving among people with higher need for approval, imposing recognition reduces donations among people with lower need, suggesting a potential crowding-out effect on prior motives (Study 1). This penalty for public recognition disappears when the public recognition is optional (Study 2). When public recognition is saliently imposed (not requested), donation likelihood increases, suggesting that donors’ potential concerns about observers’ suspicion of their true motives is reduced (Study 3). This research highlights conditions in which public recognition encourages charitable giving and paves the way for further research on social dimensions of generosity.


2020 ◽  
Vol 17 (1) ◽  
pp. 43-58 ◽  
Author(s):  
Kimberly McCarthy ◽  
Jone L. Pearce ◽  
John Morton ◽  
Sarah Lyon

Purpose The emerging literature on computer-mediated communication at the study lacks depth in terms of elucidating the consequences of the effects of incivility on employees. This study aims to compare face-to-face incivility with incivility encountered via e-mail on both task performance and performance evaluation. Design/methodology/approach In two experimental studies, the authors test whether exposure to incivility via e-mail reduces individual task performance beyond that of face-to-face incivility and weather exposure to that incivility results in lower performance evaluations for third-parties. Findings The authors show that being exposed to cyber incivility does decrease performance on a subsequent task. The authors also find that exposure to rudeness, both face-to-face and via e-mail, is contagious and results in lower performance evaluation scores for an uninvolved third party. Originality/value This research comprises an empirically grounded study of incivility in the context of e-mail at study, highlights distinctions between it and face-to-face rudeness and reveals the potential risks that cyber incivility poses for employees.


2011 ◽  
Vol 3 (4) ◽  
pp. 77-106 ◽  
Author(s):  
Lucas C Coffman

This paper shows moral decision making is not well predicted by the overall fairness of an act but rather by the fairness of the consequences that follow directly. In laboratory experiments, third-party punishment for keeping money from a poorer player decreases when an intermediary actor is included in the transaction. This is true for completely passive intermediaries, even though intermediation decreases the payout of the poorest player and hurts equity, and because intermediation distances the transgressor from the outcome. A separate study shows rewards of charitable giving decrease when the saliency of an intermediary is increased. (JEL A13, D63, D64)


2017 ◽  
Vol 26 (07) ◽  
pp. 1750119 ◽  
Author(s):  
Chunguang Ma ◽  
Lei Zhang ◽  
Songtao Yang ◽  
Xiaodong Zheng

The prosperity of location-based services (LBSs) makes more and more people pay close attention to personal privacy. In order to preserve users privacy, several schemes utilized a trusted third party (TTP) to obfuscate users, but these schemes were suspected as the TTP may become the single point of failure or service performance bottleneck. To alleviate the suspicion, schemes with collaborative users to achieve [Formula: see text]-anonymity were proposed. In these schemes, users equipped with short-range communication devices could communicate with adjacent users to establish an anonymous group. With this group, the user can obfuscate and hide herself behind at least [Formula: see text] other users. However, these schemes are usually more efficient in snapshot services than continuous ones. To cope with the inadequacy, with the help of caching in mobile devices, we propose a query information blocks random exchange and results caching scheme (short for CaQBE). In this scheme, a particular user is hidden behind collaborative users in snapshot service, and then the caches further preserve the privacy in continuous service. In case of the active adversary launching the query correlation attack and the passive adversary launching the impersonation attack, a random collaborative user selection and a random block exchange algorithm are also utilized. Then based on the feature of entropy, a metric to measure the privacy of the user against attacks from the active and passive adversaries is proposed. Finally, security analysis and experimental comparison with other similar schemes further verify the optimal of our scheme in effectiveness of preservation and efficiency of performance.


Author(s):  
Stephen Guillot ◽  
Wing F. Ng ◽  
Hans D. Hamm ◽  
Ulrich E. Stang ◽  
Kevin T. Lowe

Analysis and testing were conducted to optimize an axial diffuser–collector gas turbine exhaust. Two subsonic wind tunnel facilities were designed and built to support this program. A 1/12th scale test rig enabled rapid and efficient evaluation of multiple geometries. This test facility was designed to run continuously at an inlet Mach number of 0.41 and an inlet hydraulic diameter-based Reynolds number of 3.4 × 105. A 1/4th geometric scale test rig was designed and built to validate the data in the 1/12th scale rig. This blow-down rig facilitated testing at a nominally equivalent inlet Mach number, while the Reynolds number was matched to realistic engine conditions via back pressure. Multihole pneumatic pressure probes, particle image velocimetry (PIV), and surface oil flow visualization were deployed in conjunction with computational tools to explore physics-based alterations to the exhaust geometry. The design modifications resulted in a substantial increase in the overall pressure recovery coefficient of +0.07 (experimental result) above the baseline geometry. The optimized performance, first measured at 1/12th scale and obtained using computational fluid dynamics (CFD) was validated at the full scale Reynolds number.


Cloud storage is one of the major application in the cloud, which can provide the on-demand outsourcing data service for both organizations as well as individuals. The Data Integrity (DI) check in the cloud is applied by the user to ensure the integrity of data. The Third Party Auditing (TPA) technique is later introduced to check the cloud DI. Many research has been carried out in the public auditing to minimize the computation cost of the integrity check. The most existing method involves in lack of security and low computation overhead. In this research, the Modified Dynamic Hash Table with threshold Rivest, Shamir, and Adelman Algorithm (RSA) algorithm (MDHT-RSA) is proposed to improve the security and reduce the computation cost. The threshold RSA cryptography system increase the security by generating the secret key to the user and reduce the computation cost. The Modified Dynamic Hash Table (MDHT) is used to record the data information for dynamic auditing, which is located in the TPA. The MDHT is differed from the Dynamic hash table, that the MDHT doesn’t contain the tag block whereas the dynamic hash table has the tag block. The MDHT-RSA is analyzed with the computation cost and compared with existing method. The experimental result proved that the MDHT-RSA method has low computation cost than state-of-art method in public auditing. The verification cost of the MDHT-RSA is 1.3 s while a state-of-art method DHT-PA has the 1.35 s for the 200 blocks of data.


Electric discharge machining (EDM) is a non conventional machining method to fabricate very tough and hard materials. Although EDM has played a vital role in machining industry but with advancement of technology, alternative advanced methods of machining have been evolved such as near dry EDM (ND-EDM) and powder mixed near dry EDM (PMND-EDM). These technologies have been proven more efficient than traditional EDM in terms of machining performance characteristics such as higher material removal rate (MRR), better surface finish (Ra) and low tool wear rate (TWR) with high tolerance quality products. In this study an approach has been made to draw experimental comparison between ND-EDM and PMND-EDM in terms of MRR, SR and TWR. The experimental result and analysis revealed that PMND-EDM was better machining method than ND-EDM as in the former technique, the M RR increased by 45.04 % while SR and TWR reduced by 45.33 % and 60.60% respectively


Sign in / Sign up

Export Citation Format

Share Document