scholarly journals Observation enhances third-party punishment only among people who were not hot-tempered

2014 ◽  
Vol 5 (1) ◽  
pp. 5-8 ◽  
Author(s):  
Yutaka Horita ◽  
Masanori Takezawa

The evolution of punishment toward norm-violators has been discussed for understanding a large-scale human cooperation. Recent studies showed that the presence of cues of surveillance makes people concern about their reputation and increase altruistic behavior. Recent study also suggests that explicit cues of observation affect punitive behavior. We examined whether both explicit (being observed by an experimenter) and implicit cues (drawing of stylized eyes) of observation enhance third-party punishment. The results of the experiments with Japanese participants showed that both type of cues of observation increased third-party punishment only among those who did not feel anger toward an unfair allocator. In contrast, the cues suppressed the punishment when participant felt stronger anger toward an allocator. Moderating effect of emotion is interpreted as a cultural norm of emotional expression. Our study suggests that we humans are endowed with the psychological system inducing third-party punishment in response to cues of being observed while its function may be moderated by cultural factors. 

Mathematics ◽  
2021 ◽  
Vol 9 (3) ◽  
pp. 253
Author(s):  
Yuyan Wang ◽  
Zhaoqing Yu ◽  
Liang Shen ◽  
Runjie Fan ◽  
Rongyun Tang

Considering the peculiarities of logistics in the electronic commerce (e-commerce) supply chain (ESC) and e-commerce platform’s altruistic preferences, a model including an e-commerce platform, third-party logistics service provider, and manufacturer is constructed. Based on this, three decision models are proposed and equilibrium solutions are obtained by the Stackelberg game. Then, an “altruistic preference joint fixed-cost” contract is proposed to maximize system efficiency. Finally, numerical analysis is used to validate the findings of the paper. The article not only analyzes and compares the optimal decisions under different ESC models, but also explores the intrinsic factors affecting the decisions. This paper finds that the conclusions of dual-channel supply chains or traditional supply chains do not necessarily apply to ESC, and that the effect of altruistic behavior under ESC is influenced by consumer preferences. Moreover, there is a multiparty win–win state for ESC, and this state can be achieved through the “altruistic preference joint fixed-cost” contract. Therefore, the findings of this paper contribute to the development of an e-commerce market and the cooperation of ESC members.


2017 ◽  
Vol 24 (4) ◽  
pp. 590-616 ◽  
Author(s):  
Shaomin Li ◽  
Seung Ho Park ◽  
David Duden Selover

Purpose The purpose of this paper is to develop the theoretical linkage between culture and economic growth and empirically test the relationship by measuring culture and how it affects labor productivity. Design/methodology/approach This study uses a cross-section study of developing countries and regresses economic productivity growth on a set of control variables and cultural factors. Findings It is found that three cultural factors, economic attitudes, political attitudes, and attitudes towards the family, affect economic productivity growth. Originality/value Many economists ignore culture as a factor in economic growth, either because they discount the value of culture or because they have no simple way to quantify culture, resulting in the role of culture being under-researched. The study is the first to extensively examine the role of culture in productivity growth using large-scale data sources. The authors show that culture plays an important role in productivity gains across countries, contributing to the study of the effects of culture on economic development, and that culture can be empirically measured and linked to an activity that directly affects the economic growth – labor productivity.


PLoS ONE ◽  
2020 ◽  
Vol 15 (12) ◽  
pp. e0243475
Author(s):  
David Mödinger ◽  
Jan-Hendrik Lorenz ◽  
Rens W. van der Heijden ◽  
Franz J. Hauck

The cryptocurrency system Bitcoin uses a peer-to-peer network to distribute new transactions to all participants. For risk estimation and usability aspects of Bitcoin applications, it is necessary to know the time required to disseminate a transaction within the network. Unfortunately, this time is not immediately obvious and hard to acquire. Measuring the dissemination latency requires many connections into the Bitcoin network, wasting network resources. Some third parties operate that way and publish large scale measurements. Relying on these measurements introduces a dependency and requires additional trust. This work describes how to unobtrusively acquire reliable estimates of the dissemination latencies for transactions without involving a third party. The dissemination latency is modelled with a lognormal distribution, and we estimate their parameters using a Bayesian model that can be updated dynamically. Our approach provides reliable estimates even when using only eight connections, the minimum connection number used by the default Bitcoin client. We provide an implementation of our approach as well as datasets for modelling and evaluation. Our approach, while slightly underestimating the latency distribution, is largely congruent with observed dissemination latencies.


2019 ◽  
Author(s):  
Ciaran Docherty ◽  
Anthony J Lee ◽  
Amanda Hahn ◽  
Lisa Marie DeBruine ◽  
Benedict C Jones

Researchers have suggested that more attractive women will show stronger preferences for masculine men because such women are better placed to offset the potential costs of choosing a masculine mate. However, evidence for correlations between measures of women’s own attractiveness and preferences for masculine men is mixed. Moreover, the samples used to test this hypothesis are typically relatively small. Consequently, we conducted two large-scale studies that investigated possible associations between women’s preferences for facial masculinity and their own attractiveness as assessed from third-party ratings of their facial attractiveness (Study 1, N = 454, laboratory study) and self-rated attractiveness (Study 2, N = 8972, online study). Own attractiveness was positively correlated with preferences for masculine men in Study 2 (self-rated attractiveness), but not Study 1 (third-party ratings of facial attractiveness). This pattern of results is consistent with the proposal that women’s beliefs about their own attractiveness, rather than their physical condition per se, underpins attractiveness-contingent masculinity preferences.


2020 ◽  
Vol 198 ◽  
pp. 04030
Author(s):  
Dai Yanyan ◽  
Chen Meng

With the development of new technologies such as artificial intelligence, big data, and cloud computing, the “intelligent airport” is considered to be an effective means to solve or alleviate the current industry problems such as large-scale airport business, the large number of operating entities, and the complicated operation conditions. This paper is about the collaboration between universities and enterprises based on the concept of service design. Relying on big data and cloud computing technology, this paper addresses the problems of airport service robots in inquiries, blind spots of security inspection, and full monomer smart navigation diffluence, combined with the basic technology of service robot artificial intelligence and the third-party interface to design solutions to effectively solve the problems of process.


2018 ◽  
Vol 25 (4) ◽  
pp. 1398-1411 ◽  
Author(s):  
Vishal Patel

The electronic sharing of medical imaging data is an important element of modern healthcare systems, but current infrastructure for cross-site image transfer depends on trust in third-party intermediaries. In this work, we examine the blockchain concept, which enables parties to establish consensus without relying on a central authority. We develop a framework for cross-domain image sharing that uses a blockchain as a distributed data store to establish a ledger of radiological studies and patient-defined access permissions. The blockchain framework is shown to eliminate third-party access to protected health information, satisfy many criteria of an interoperable health system, and readily generalize to domains beyond medical imaging. Relative drawbacks of the framework include the complexity of the privacy and security models and an unclear regulatory environment. Ultimately, the large-scale feasibility of such an approach remains to be demonstrated and will depend on a number of factors which we discuss in detail.


2019 ◽  
pp. 760-769
Author(s):  
Kashif Munir

There's a big change happening in the world of databases. The industry is buzzing about Database-as-a-Service (DBaaS), a cloud offering that allows companies to rent access to these managed digital data warehouses. Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Mobile Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the Mobile Cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this chapter, I propose a security model for Mobile Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.


2019 ◽  
Vol 61 (2) ◽  
pp. 113-127 ◽  
Author(s):  
Kawon Kim ◽  
Melissa A. Baker

Due to the common business practice of the “customer is always right,” many companies have a risk of dealing with illegitimate complaints. Although illegitimate complaints are a major issue in the hospitality industry, no study has yet examined the impact of illegitimate customer complaining behavior on customers who can witness the complaining and recovery process of others. To fill this gap, this research examines the effects of service recovery aimed at illegitimate customers on customers who witness the complaints’ behavioral reactions (revisit intention, tipping behavior, intention to complain) and the role of emotional expression. A 2 (Service recovery aimed at other customer; good vs. poor) × 2 (Legitimacy of complaining behavior of other customers: legitimate vs. illegitimate) × 2 (Emotional expression: aggressive vs. calm) scenario-based between-subjects factorial experiment is utilized. This research provides evidence that witnessing illegitimate complaints of other customers and the subsequent service recovery aimed at those complainers impacts the behavioral reactions of customers who witness that situation. This study broadens the service recovery literature by incorporating third-party justice theory with illegitimate customer behavior by specifically examining the unique case where the firm is not responsible for the service recovery. In addition, the findings address the benefit to service firms by understanding the impact of witnessing other customers’ service recovery treatment on observers’ subsequent behavioral intentions.


Sign in / Sign up

Export Citation Format

Share Document