Need-based transfer systems are more vulnerable to cheating when resources are hidden
نویسندگان
چکیده
Abstract Need-based transfer systems pool risk among interdependent individuals. Such arrangements are bound by two simple rules: Ask for help only when in need and, if you able, give to others who ask. But there may be a temptation individuals break these rules short-term personal profit. Here, we study one factor that enforce honesty need-based relationships: the visibility of resources. Across three experiments employing novel experimental economic game, breaking both increased resources were hidden rather than visible (Experiment 1: n = 82, online convenience sample from US; Experiment 2: n = 80, student 3: n = 42, US). Participants with (1) more likely request not actually (greediness), and (2) fulfill requests help, even they had sufficient available (stinginess). These findings highlight as potential limitation cooperative pooling systems.
منابع مشابه
Are Those with Darker Personality Traits more Willing to Corrupt When They Feel Anxious?
This unprecedented research endeavors to investigate the relationship between dark personality traits (i.e., narcissism, Machiavellianism, and psychopathy) and corruption intention through the mediation of anxiety. Based on the resource conservation theory, it is hypothesized that those higher in dark personality traits are more inclined to corrupt when they feel anxious. Having collected data...
متن کاملSupervisors Should Be More Vigilant When Their Students Are Writing an Article
در سخن سردبیری شماره مردادماه سال 1394 مجله دانشگاه، به ضرورت چاپ مقاله از پایاننامههای مقاطع مختلف تحصیلی اشاره کردیم و در همان جا، از اساتید راهنما درخواست کردیم که به جهت پرهیز از رویداد هرگونه تخلف پژوهشی توسط دانشجویان، نقش فعالتری را در این زمینه ایفاء نمایند [1]. همچنین و پیش از آن، در سخن سردبیری شماره بهمن و اسفندماه سال 1391 مجله دانشگاه، درخواست نموده بودیم که دانشجویان نقش فعال...
متن کاملGlobal Water Resources: Where are the Vulnerable?
Although human society’s success depends on water availability, little has been done to recognize its value within modern socio-political and environmental management systems. The challenge of valuing water as a commodity for production still remains due to theoretical and methodological difficulties as well as theological and philosophical objections. As a way of addressing this issue, this pa...
متن کاملAre workers more vulnerable in tradable industries?
Reduced trade barriers and lower costs of transportation and information have meant that a growing part of the economy has been exposed to international trade. In particular, this is the case in the service sector. We divide the service sector into a tradable and a non-tradable part using an approach to identify tradable industries utilizing a measure of regional concentration of production. We...
متن کاملWhen Are OSS Developers More Likely to Introduce Vulnerable Code Changes? A Case Study
We analyzed peer code review data of the Android Open Source Project (AOSP) to understand whether code changes that introduce security vulnerabilities, referred to as vulnerable code changes (VCC), occur at certain intervals. Using a systematic manual analysis process, we identified 60 VCCs. Our results suggest that AOSP developers were more likely to write VCCs prior to AOSP releases, while du...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Evolution and Human Behavior
سال: 2021
ISSN: ['1090-5138', '1879-0607']
DOI: https://doi.org/10.1016/j.evolhumbehav.2020.08.004