How to stop a fight—A qualitative video analysis of how third-parties de-escalate real-life interpersonal conflicts in public.

2021 ◽  
Author(s):  
Peter Ejbye-Ernst ◽  
Marie Rosenkrantz Lindegaard ◽  
Wim Bernasco
2022 ◽  
Author(s):  
Peter Ejbye-Ernst ◽  
Marie Rosenkrantz Lindegaard ◽  
Wim Bernasco

Objective: While previous research agrees that third-parties often manage to de-escalate interpersonal conflicts when they intervene, we still know little about how they achieve this influence. The aim of the current study is to address this gap in the literature by investigating how third-parties de-escalate conflicts. Method: We conduct a two-part qualitative analysis of CCTV footage of 48 real-life conflicts from the streets of Amsterdam. The first part consists of an inductive analysis of CCTV-footage investigating the typical sequence of de-escalatory interventions. The second part consists of a deductive coding based on the findings from part 1 of the analysis. Results: We identify an ideal-typical model of de-escalation consisting of three phases: objection, separation, and placation. This model describes how third-parties adapt their intervention to the reaction of the antagonists of the conflict through a contingency principle: when the current phase of intervention fails to de-escalate the conflict, the third-party proceeds to the following phase of the model. We also identify observable intervention behaviors that are characteristic of each of the three phases. Conclusions: The findings demonstrate that there is not one way to de-escalate a conflict, but rather that third-parties are successful because they adapt their intervention to the situation at hand. The findings of this study imply that if we want to get closer to understanding when third-party interventions are effective, we need to acknowledge the complexity of these interventions and move beyond the action/inaction dichotomy.


2021 ◽  
pp. 194855062110426
Author(s):  
Marie Rosenkrantz Lindegaard ◽  
Lasse Suonperä Liebst ◽  
Richard Philpot ◽  
Mark Levine ◽  
Wim Bernasco

In real-life violence, bystanders can take an active role in de-escalating conflict and helping others. Recent meta-analytical evidence of experimental studies suggests that elevated danger levels in conflicts facilitate bystander intervention. However, this finding may lack ecological validity because ethical concerns prohibit exposing participants to potentially harmful situations. Using an ecologically valid method, based on an analysis of 80 interpersonal conflicts unobtrusively recorded by public surveillance cameras, the present study confirms that danger is positively associated with bystander intervention. In the presence of danger, bystanders were 19 times more likely to intervene than in the absence of danger. It extends this knowledge by discovering that incremental changes in the severity level of the danger (low, medium, and high), however, were not associated with bystander intervention. These findings confirm the importance of further investigating the role of danger for bystander intervention, in larger samples, and involving multiple types of real-life emergencies.


2019 ◽  
Vol 11 (6) ◽  
pp. 846-853 ◽  
Author(s):  
Eric J. Pedersen ◽  
William H. B. McAuliffe ◽  
Yashna Shah ◽  
Hiroki Tanaka ◽  
Yohsuke Ohtsubo ◽  
...  

Punishment can reform uncooperative behavior and hence could have contributed to humans’ ability to live in large-scale societies. Punishment by unaffected third parties has received extensive scientific scrutiny because third parties punish transgressors in laboratory experiments on behalf of strangers that they will never interact with again. Often overlooked in this research are interactions involving people who are not strangers, which constitute many interactions beyond the laboratory. Across three samples in two countries (United States and Japan; N = 1,294), we found that third parties’ anger at transgressors, and their intervention and punishment on behalf of victims, varied in real-life conflicts as a function of how much third parties valued the welfare of the disputants. Punishment was rare (1–2%) when third parties did not value the welfare of the victim, suggesting that previous economic game results have overestimated third parties’ willingness to punish transgressors on behalf of strangers.


2021 ◽  
pp. 088626052110235
Author(s):  
Peter Ejbye-Ernst ◽  
Marie Rosenkrantz Lindegaard ◽  
Wim Bernasco

Third parties tend to take an active role and intervene in interpersonal conflicts in public. Previous research has shown that the level of aggression of these interventions determines how they influence the conflict. No previous study has, however, systematically investigated whether the aggression of third-party interventions is influenced by the development of the conflict situation. The objective of this study is twofold. First, the study determines the extent to which the aggression level of intervening third parties changes during the course of interpersonal conflicts. Second, the study identifies and investigates the factors that affect the aggression levels displayed by intervening third parties. We systematically observed and coded CCTV footage of 46 interpersonal conflicts in public space, recorded by surveillance cameras in Amsterdam, the Netherlands. The data included 565 intervention behaviors by 125 third parties. We recorded the levels of aggression of the individuals involved in the conflict and conducted a multinomial logistic regression analysis to investigate what influenced the aggression level of the third-party interventions. We found that the aggression levels of the preceding intervention behaviors by the third parties predict aggression levels of their subsequent interventions. This shows a consistency in third-party interventions over the course of a conflict. We also found that the aggression levels of the conflict parties that are the targets of the interventions influence the aggression levels of third-party intervention. This finding demonstrates that the development of the conflict situation influences how aggressive the third parties are. Our study emphasizes the importance of taking the interactional dynamics of interpersonal conflicts into consideration when explaining third-party behavior.


2018 ◽  
Author(s):  
Eric J. Pedersen ◽  
William H.B. McAuliffe ◽  
Yohsuke Ohtsubo ◽  
Michael E. McCullough

Punishment can reform uncooperative behavior, and hence could have contributed to humans’ ability to live in large-scale societies. Punishment by unaffected third parties has received extensive scientific scrutiny because third parties punish transgressors in laboratory experiments on behalf of strangers that they will never interact with again. Often overlooked in this research are interactions involving people who are not strangers, which constitute many interactions beyond the laboratory. Across three samples in two countries (US and Japan; N = 1,294), we found that third parties’ anger at transgressors, and their intervention and punishment on behalf of victims, varied in real-life conflicts as a function of how much third parties valued the welfare of the disputants. Punishment was rare (1-2%) when third parties did not value the welfare of the victim, suggesting that previous economic game results have overestimated third parties’ willingness to punish transgressors on behalf of strangers.


2020 ◽  
Vol 2020 (2) ◽  
pp. 155-174
Author(s):  
Mert D. Pesé ◽  
Xiaoying Pu ◽  
Kang G. Shin

AbstractVehicular data-collection platforms as part of Original Equipment Manufacturers’ (OEMs’) connected telematics services are on the rise in order to provide diverse connected services to the users. They also allow the collected data to be shared with third-parties upon users’ permission. Under the current suggested permission model, we find these platforms leaking users’ location information without explicitly obtaining users’ permission. We analyze the accuracy of inferring a vehicle’s location from seemingly benign steering wheel angle (SWA) traces, and show its impact on the driver’s location privacy. By collecting and processing real-life SWA traces, we can infer the users’ exact traveled routes with up to 71% accuracy, which is much higher than the state-of-the-art.


2019 ◽  
Vol 10 (2) ◽  
pp. 315-329
Author(s):  
Charlotte DUCUING

Under the phrase “code is law” and based on its “trustless trust”, blockchain has emerged as a disrupting technology considered by some as an alternative to the law. Based on a study of real-life blockchain-based decentralised applications (Dapps), this article takes blockchain developers at their word and adopts the point of view of users: can blockchain live up to its promise and enable them to transact with each other without the need for the trust granted by the law? The article particularly highlights that users need to be able to ascertain that a self-advertised Dapp indeed qualifies as one. Blockchain technology may make it possible to do away with trust in third parties, but this is not enough. Users also need to trust that an alleged Dapp genuinely is one, and blockchain alone cannot provide this. Beyond Dapps, it is argued that blockchain needs the complementary role of the law to deliver its promises and especially to authenticate blockchain “virtues”. The EU certification mark is identified as a promising form of co-regulation for that purpose.


Author(s):  
Honggang Yang

I would like to take this opportunity to initiate a dialogue over some issues of conflict management among ourselves as third parties or helping professionals. The challenges of managing interpersonal conflicts or performing internal peacemaking are as real and relevant as the challenges of our professional undertaking in handling “outside” disputes. While recognizing there are no ready formulae to address these challenges, I invite you to join in the open-minded dialogues to examine expectations and premises often assumed among helping professionals in the fields.


Author(s):  
Ilija Babić

The succession community arises from the moment of the opening of the heritage, if there is a legacy inherited by at least two heirs. In legal theory and jurisprudence, the dominant view is that the succession community ceases by adopting a decision on inheritance. However, the form of property in matters determines the possibility of its transfer. The author defends the view that, from the opening of the inheritance to an ideal or real division of items that make up the legacy, the co-heirs acquire a common property. On the basis of the decision on inheritance (except when an ideal or real division is performed), which has a declaratory character, the co-heirs do not acquire a co-property. Therefore, they can transfer the hereditary parts to the co-heir only. After executing an ideal or real division, the co-owned part or a real-life exclusive part of the successor may be transferred to third parties.


1999 ◽  
Vol 27 (2) ◽  
pp. 204-205
Author(s):  
Megan Cleary

In recent years, the law in the area of recovered memories in child sexual abuse cases has developed rapidly. See J.K. Murray, “Repression, Memory & Suggestibility: A Call for Limitations on the Admissibility of Repressed Memory Testimony in Abuse Trials,” University of Colorado Law Review, 66 (1995): 477-522, at 479. Three cases have defined the scope of liability to third parties. The cases, decided within six months of each other, all involved lawsuits by third parties against therapists, based on treatment in which the patients recovered memories of sexual abuse. The New Hampshire Supreme Court, in Hungerford v. Jones, 722 A.2d 478 (N.H. 1998), allowed such a claim to survive, while the supreme courts in Iowa, in J.A.H. v. Wadle & Associates, 589 N.W.2d 256 (Iowa 1999), and California, in Eear v. Sills, 82 Cal. Rptr. 281 (1991), rejected lawsuits brought by nonpatients for professional liability.


Sign in / Sign up

Export Citation Format

Share Document