Need-based transfer systems are more vulnerable to cheating when resources are hidden

نویسندگان

چکیده

Abstract Need-based transfer systems pool risk among interdependent individuals. Such arrangements are bound by two simple rules: Ask for help only when in need and, if you able, give to others who ask. But there may be a temptation individuals break these rules short-term personal profit. Here, we study one factor that enforce honesty need-based relationships: the visibility of resources. Across three experiments employing novel experimental economic game, breaking both increased resources were hidden rather than visible (Experiment 1: n = 82, online convenience sample from US; Experiment 2: n = 80, student 3: n = 42, US). Participants with (1) more likely request not actually (greediness), and (2) fulfill requests help, even they had sufficient available (stinginess). These findings highlight as potential limitation cooperative pooling systems.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Are Those with Darker Personality Traits more Willing to Corrupt When They Feel Anxious?

This unprecedented research endeavors to investigate the relationship between dark personality traits (i.e., narcissism, Machiavellianism, and psychopathy) and corruption intention through the mediation of anxiety.  Based on the resource conservation theory, it is hypothesized that those higher in dark personality traits are more inclined to corrupt when they feel anxious. Having collected data...

متن کامل

Supervisors Should Be More Vigilant When Their Students Are Writing an Article

در سخن سردبیری شماره مردادماه سال 1394 مجله دانشگاه، به ضرورت چاپ مقاله از پایان­نامه­های مقاطع مختلف تحصیلی اشاره کردیم و در همان جا، از اساتید راهنما درخواست کردیم که به جهت پرهیز از رویداد هرگونه تخلف پژوهشی توسط دانشجویان، نقش فعال­تری را در این زمینه ایفاء نمایند [1]. هم­چنین و پیش از آن، در  سخن سردبیری شماره بهمن و اسفندماه سال 1391 مجله دانشگاه، درخواست نموده بودیم که دانشجویان نقش فعال...

متن کامل

Global Water Resources: Where are the Vulnerable?

Although human society’s success depends on water availability, little has been done to recognize its value within modern socio-political and environmental management systems. The challenge of valuing water as a commodity for production still remains due to theoretical and methodological difficulties as well as theological and philosophical objections. As a way of addressing this issue, this pa...

متن کامل

Are workers more vulnerable in tradable industries?

Reduced trade barriers and lower costs of transportation and information have meant that a growing part of the economy has been exposed to international trade. In particular, this is the case in the service sector. We divide the service sector into a tradable and a non-tradable part using an approach to identify tradable industries utilizing a measure of regional concentration of production. We...

متن کامل

When Are OSS Developers More Likely to Introduce Vulnerable Code Changes? A Case Study

We analyzed peer code review data of the Android Open Source Project (AOSP) to understand whether code changes that introduce security vulnerabilities, referred to as vulnerable code changes (VCC), occur at certain intervals. Using a systematic manual analysis process, we identified 60 VCCs. Our results suggest that AOSP developers were more likely to write VCCs prior to AOSP releases, while du...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Evolution and Human Behavior

سال: 2021

ISSN: ['1090-5138', '1879-0607']

DOI: https://doi.org/10.1016/j.evolhumbehav.2020.08.004