scholarly journals Friendship jealousy: One tool for maintaining friendships in the face of third-party threats?

2020 ◽  
Author(s):  
Jaimie Krems ◽  
Keelah Williams ◽  
Douglas Kenrick ◽  
Athena Aktipis

Friendships can foster happiness, health, and reproductive fitness. But friendships end—even when we might not want them to. A primary reason for this is interference from third parties. Yet little work has explored how people meet the challenge of maintaining friendships in the face of real or perceived threats from third parties, as when our friends inevitably make new friends or form new romantic relationships. In contrast to earlier conceptualizations from developmental research, which viewed friendship jealousy as solely maladaptive, we propose that friendship jealousy is one overlooked tool of friendship maintenance. We derive and test—via a series of 11 studies (N = 2918) using hypothetical scenarios, recalled real-world events, and manipulation of on-line emotional experiences—whether friendship jealousy possesses the features of a tool well-designed to help us retain friends in the face of third-party threats. Consistent with our proposition, findings suggest that friendship jealousy is (1) uniquely evoked by third-party threats to friendships (but not the prospective loss of the friendship alone), (2) sensitive to the value of the threatened friendship, (3) strongly calibrated to cues that one is being replaced, even over more intuitive cues (e.g., the amount of time a friend and interloper spend together), and (4) ultimately motivates behavior aimed at countering third-party threats to friendship (“friend guarding”). Even as friendship jealousy may be negative to experience, it may include features designed for beneficial—and arguably prosocial—ends: to help maintain friendships.

2000 ◽  
Author(s):  
Christian End ◽  
Egon Kraan ◽  
Alison Cole ◽  
Jamie Klausner ◽  
Zachary Birchmeier ◽  
...  
Keyword(s):  

2018 ◽  
pp. 101
Author(s):  
Rafael Lara González

ResumenPese a su ubicuidad en la práctica contractual, las cláusulas de franquicia han recibido tratamiento incidental en la doctrina. La discusión sobre ellas se ha enfocado en los contratos de seguros de responsabilidad civil, y en la interpretación del artículo 76 de la Ley española de Contrato de Seguro. En este contexto se ha tratado de establecer si el asegurador puede o no oponer la cláusula de franquicia al tercero perjudicado. El presente trabajo analiza la cláusula de franquicia en la obligación principal del asegurador, su naturaleza jurídica, y examina su relación con los terceros perjudicados. La consideración principal a este respecto estará en si nos encontramos ante un seguro obligatorio o ante un seguro voluntario de responsabilidad civil. Palabras clave: Contrato de seguro; Cláusula de franquicia; Terceroperjudicado; Responsabilidad civil.AbstractDespite their ubiquity in contractual praxis, deductible clauses have received only incidental treatment in legal doctrine. Discussion on them has focused on civil liability insurance contracts, and the interpretation of article 76 of the Spanish Law of Insurance Contracts. In this context it has been attempted to establish whether the insurer can invoke the clause to oppose the injured third party's claim. This article examines the deductible clause included in the insurer's main obligation, its legal nature, and its relation to injured third parties. The main consideration in this regard will be whether the insurance contract is of a mandatory or voluntary nature.Keywords: Insurance contract; Deductible clause; Injured third party; Civil liability.


2020 ◽  
Author(s):  
Jaimie Krems ◽  
Keelah Williams ◽  
Laureon Allison Watson ◽  
Douglas Kenrick ◽  
Athena Aktipis

Friendships provide material benefits, bolster health, and may help solve adaptive challenges. However, a recurrent obstacle to sustaining those friendships—and thus enjoying many friendship-mediated fitness benefits—is interference from other people. Friendship jealousy may be well-designed for helping both men and women meet the recurrent, adaptive challenge of retaining friends in the face of such third-party interference. Although we thus expect several sex similarities in the general cognitive architecture of friendship jealousy (e.g., it is attuned to friend value), there are also sex differences in friendship structures and historical functions, which might influence the inputs of friendship jealousy (e.g., the value of any one friendship). If so, we should also expect some sex differences in friendship jealousy. Findings from a reanalysis of previously-published data and a new experiment, including both U.S. student and adult community participants (N = 993), provide initial support for three predicted sex differences: women (versus men) report greater friendship jealousy at the prospective loss of best friends to others, men (versus women) report greater friendship jealousy at the prospective loss of acquaintances to others, and men’s (but not women’s) friendship jealousy is enhanced in the context of intergroup contests.


Author(s):  
Marc J. Stern

Chapter 9 contains five vignettes, each based on real world cases. In each, a character is faced with a problem and uses multiple theories within the book to help him or her develop and execute a plan of action. The vignettes provide concrete examples of how to apply the theories in the book to solving environmental problems and working toward environmental sustainability in a variety of contexts, including managing visitors in a national park, developing persuasive communications, designing more collaborative public involvement processes, starting up an energy savings program within a for-profit corporation, and promoting conservation in the face of rapid development.


Author(s):  
Ly Tayseng

This chapter gives an overview of the law on contract formation and third party beneficiaries in Cambodia. Much of the discussion is tentative since the new Cambodian Civil Code only entered into force from 21 December 2011 and there is little case law and academic writing fleshing out its provisions. The Code owes much to the Japanese Civil Code of 1898 and, like the latter, does not have a requirement of consideration and seldom imposes formal requirements but there are a few statutory exceptions from the principle of freedom from form. For a binding contract, the agreement of the parties is required and the offer must be made with the intention to create a legally binding obligation and becomes effective once it reaches the offeree. The new Code explicitly provides that the parties to the contract may agree to confer a right arising under the contract upon a third party. This right accrues directly from their agreement; it is not required that the third party declare its intention to accept the right.


Author(s):  
Sheng-Lin JAN

This chapter discusses the position of third party beneficiaries in Taiwan law where the principle of privity of contract is well established. Article 269 of the Taiwan Civil Code confers a right on the third party to sue for performance as long as the parties have at least impliedly agreed. This should be distinguished from a ‘spurious contract’ for the benefit of third parties where there is no agreement to permit the third party to claim. Both the aggrieved party and the third party beneficiary can sue on the contract, but only for its own loss. The debtor can only set off on a counterclaim arising from its legal relationship with the third party. Where the third party coerces the debtor into the contract, the contract can be avoided, but where the third party induces the debtor to contract with the creditor by misrepresentation, the debtor can only avoid the contract if the creditor knows or ought to have known of the misrepresentation.


Author(s):  
Masami Okino

This chapter discusses the law on third party beneficiaries in Japan; mostly characterized by adherence to the German model that still bears an imprint on Japanese contract law. Thus, there is neither a doctrine of consideration nor any other justification for a general doctrine of privity, and contracts for the benefit of third parties are generally enforceable as a matter of course. Whether an enforceable right on the part of a third party is created is simply a matter of interpretation of the contract which is always made on a case-by-case analysis but there are a number of typical scenarios where the courts normally find the existence (or non-existence) of a contract for the benefit of a third party. In the recent debate on reform of Japanese contract law, wide-ranging suggestions were made for revision of the provisions on contracts for the benefit of third parties in the Japanese Civil Code. However, it turned out that reform in this area was confined to a very limited codification of established case law.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 345
Author(s):  
Pyung Kim ◽  
Younho Lee ◽  
Youn-Sik Hong ◽  
Taekyoung Kwon

To meet password selection criteria of a server, a user occasionally needs to provide multiple choices of password candidates to an on-line password meter, but such user-chosen candidates tend to be derived from the user’s previous passwords—the meter may have a high chance to acquire information about a user’s passwords employed for various purposes. A third party password metering service may worsen this threat. In this paper, we first explore a new on-line password meter concept that does not necessitate the exposure of user’s passwords for evaluating user-chosen password candidates in the server side. Our basic idea is straightforward; to adapt fully homomorphic encryption (FHE) schemes to build such a system but its performance achievement is greatly challenging. Optimization techniques are necessary for performance achievement in practice. We employ various performance enhancement techniques and implement the NIST (National Institute of Standards and Technology) metering method as seminal work in this field. Our experiment results demonstrate that the running time of the proposed meter is around 60 s in a conventional desktop server, expecting better performance in high-end hardware, with an FHE scheme in HElib library where parameters support at least 80-bit security. We believe the proposed method can be further explored and used for a password metering in case that password secrecy is very important—the user’s password candidates should not be exposed to the meter and also an internal mechanism of password metering should not be disclosed to users and any other third parties.


2020 ◽  
Vol 4 (Supplement_1) ◽  
pp. 532-532
Author(s):  
Rozalyn Anderson

Abstract Faculty will focus on the biology of aging as a contributor to the vulnerability in COVID-19. Faculty will present the latest concepts and insights that will advance our ability to confront this global outbreak. Our goal for this session is to connect with the concept of Geroscience and how ideas from aging biology research can be incorporated to improve outcomes and informed practice. Although the emphasis is on biology, the goal is to provide insight in a manner that is readily accessible to researchers across the aging spectrum that they might translate these ideas in the face of a very real-world challenge.


Sign in / Sign up

Export Citation Format

Share Document