Foundations of Costly Signaling: Individuals Who Benefit More from Trustworthiness in Daily Life Find Third-Party Punishment Less Costly

2017 ◽  
Author(s):  
Jillian J. Jordan ◽  
David G. Rand
Author(s):  
Nikki Jones ◽  
Geoffrey Raymond

This article draws on one citizen’s efforts to document daily life in his neighborhood. The authors describe the potential benefits of third-party video—videos that people who are not social scientists have recorded and preserved—to social science research. Excerpts from a collection of police-citizen interactions illustrate key points likely to confront researchers who use third-party video. The authors address two important questions: How might the presence of a video camera affect the unfolding of interactions that are recorded in third-party videos? and How might the perspective of the videographer influence the production and preservation of these records and, in turn, what influence might this standpoint have on our analysis of the data? The authors argue that, given the ubiquity of handheld video recording devices, social scientists should develop systematic approaches to using video created by others as both a cultural record and as data.


2020 ◽  
Author(s):  
Terence Daniel Dores Cruz ◽  
Isabel Thielmann ◽  
Simon Columbus ◽  
Catherine Molho ◽  
Junhui Wu ◽  
...  

Gossip—a sender communicating to a receiver about an absent third party—is hypothesized to impact reputation formation, partner selection, and cooperation. Lab experiments have found that people gossip about others’ cooperativeness and that they use gossip to condition their cooperation. Here, we move beyond the lab and test several predictions from theories of indirect reciprocity and reputation-based partner selection about the content of gossip in daily life and how people use it to update the reputation of others in their social network. In a Dutch community sample (N = 309), we sampled daily events in which people either sent or received gossip about a target over 10 days (k = 5,154). Gossip senders frequently shared information about a target’s cooperativeness and did so in ways that minimize potential retaliation from targets. Receivers overwhelmingly believed gossip to be true and updated their evaluation of targets based on gossip. In turn, a positive shift in a target’s evaluation led to higher intentions to help them in future interactions, along with lower intentions to avoid them in the future. Thus, gossip is used in daily life to efficiently impact and update reputations in a way that enables partner selection and indirect reciprocity.


Author(s):  
Jan-Willem van Prooijen

Third-party punishment occurs among insect species, cleaner fish, and non-human primates. This suggests that organisms do not need a sophisticated sense of morality to be punitive. Why, then, did humans evolve a moral punishment instinct? The main proposition of this chapter is that people evolved a sense of morality as a consequence of their punishment instincts. In ancestral groups of hunter-gatherers, punishment had genetic consequences, as it frequently meant death, exclusion, or unattractively low social standing. Punishment therefore has put social selection pressures on our ancestors to evolve intrinsic motivations to pursue the interests of the group. Furthermore, whereas punishment is frequently portrayed as costly, the chapter illuminates that punishers also reap important benefits: punishment can be a form of costly signaling, emphasizing punishers’ power, making them attractive mates.


2021 ◽  
pp. 2150040
Author(s):  
Xiang-Lin Gou ◽  
Run-Hua Shi ◽  
Ze Shi ◽  
Kun-Chang Li

E-payment plays an important role in modern daily life, so the security problem of E-payment has been widely concerned by researchers. In a recent paper [Int. J. Theor. Phys. 57, 2657 (2018)], the authors presented a trusted third-party E-payment protocol based on quantum blind signature without entanglement. In this paper, we show that there is a serious security flaw in their E-payment protocol. That is, the partial keys will be disclosed by performing a simple attack strategy. Furthermore, we propose an improved E-payment protocol and analyze its security.


Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 246
Author(s):  
Salim Ullah ◽  
Muhammad Sohail Khan ◽  
Choonhwa Lee ◽  
Muhammad Hanif

Recently, smartphone usage has increased tremendously, and smartphones are being used as a requirement of daily life, equally by all age groups. Smartphone operating systems such as Android and iOS have made it possible for anyone with development skills to create apps for smartphones. This has enabled smartphone users to download and install applications from stores such as Google Play, App Store, and several other third-party sites. During installation, these applications request resource access permissions from users. The resources include hardware and software like contact, memory, location, managing phone calls, device state, messages, camera, etc. As per Google’s permission policy, it is the responsibility of the user to allow or deny any permissions requested by an app. This leads to serious privacy violation issues when an app gets illegal permission granted by a user (e.g., an app might request for granted map permission and there is no need for map permission in the app, and someone can thereby access your location by this app). This study investigates the behavior of the user when it comes to safeguarding their privacy while installing apps from Google Play. In this research, first, seven different applications with irrelevant permission requests were developed and uploaded to two different Play Store accounts. The apps were live for more than 12 months and data were collected through Play Store analytics as well as the apps’ policy page. The preliminary data analysis shows that only 20% of users showed concern regarding their privacy and security either through interaction with the development team through email exchange or through commenting on the platform and other means accordingly.


Public Platform is designed as an online website for researchers to collect reliable data for the study. NVD plays a significant role in analyzing The result of analysis in association influence metrics CVSS, type of CWE and applicability reports weakness CPE. The vulnerability testing is not performed by NVD while third-party security researchers and vulnerability controllers give information that has been assigned these attributes. ML plays a significant part in our daily life for the classification of huge data and is giving fruitful results. Because of that result, major steps have been made against criminal activities or unauthorized use of electronic data and protect the data from attackers. The major goal of this research is to categorize CVE Based Vulnerability Software throughout the last two years, 2019-2020.The findings of this study were used to ML for the categorization of CVE and compared and will open door for the fresh researchers and professionals.


Author(s):  
Terence D. Dores Cruz ◽  
Isabel Thielmann ◽  
Simon Columbus ◽  
Catherine Molho ◽  
Junhui Wu ◽  
...  

Gossip—a sender communicating to a receiver about an absent third party—is hypothesized to impact reputation formation, partner selection, and cooperation. Laboratory experiments have found that people gossip about others' cooperativeness and that they use gossip to condition their cooperation. Here, we move beyond the laboratory and test several predictions from theories of indirect reciprocity and reputation-based partner selection about the content of everyday gossip and how people use it to update the reputation of others in their social network. In a Dutch community sample ( N = 309), we sampled daily events in which people either sent or received gossip about a target over 10 days ( n gossip = 5284). Gossip senders frequently shared information about targets’ cooperativeness and did so in ways that minimize potential retaliation from targets. Receivers overwhelmingly believed gossip to be true and updated their evaluation of targets based on gossip. In turn, a positive shift in the evaluation of a target was associated with higher intentions to help them in future interactions, and with lower intentions to avoid them in the future. Thus, gossip is used in daily life to impact and update reputations in a way that enables partner selection and indirect reciprocity. This article is part of the theme issue ‘The language of cooperation: reputation and honest signalling’.


2020 ◽  
Vol 43 ◽  
Author(s):  
Michael Tomasello

Abstract My response to the commentaries focuses on four issues: (1) the diversity both within and between cultures of the many different faces of obligation; (2) the possible evolutionary roots of the sense of obligation, including possible sources that I did not consider; (3) the possible ontogenetic roots of the sense of obligation, including especially children's understanding of groups from a third-party perspective (rather than through participation, as in my account); and (4) the relation between philosophical accounts of normative phenomena in general – which are pitched as not totally empirical – and empirical accounts such as my own. I have tried to distinguish comments that argue for extensions of the theory from those that represent genuine disagreement.


Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


2009 ◽  
Vol 19 (2) ◽  
pp. 72-78
Author(s):  
Rebecca L. Nelson Crowell ◽  
Julie Hanenburg ◽  
Amy Gilbertson

Abstract Audiologists have a responsibility to counsel patients with auditory concerns on methods to manage the inherent challenges associated with hearing loss at every point in the process: evaluation, hearing aid fitting, and follow-up visits. Adolescents with hearing loss struggle with the typical developmental challenges along with communicative challenges that can erode one's self-esteem and self-worth. The feeling of “not being connected” to peers can result in feelings of isolation and depression. This article advocates the use of a Narrative Therapy approach to counseling adolescents with hearing loss. Adolescents with hearing loss often have problem-saturated narratives regarding various components of their daily life, friendships, amplification, academics, etc. Audiologists can work with adolescents with hearing loss to deconstruct the problem-saturated narratives and rebuild the narratives into a more empowering message. As the adolescent retells their positive narrative, they are likely to experience increased self-esteem and self-worth.


Sign in / Sign up

Export Citation Format

Share Document