Third Parties and the Social Scaffolding of Forgiveness
نویسندگان
چکیده
منابع مشابه
Computational substrates of social norm enforcement by unaffected third parties
Enforcement of social norms by impartial bystanders in the human species reveals a possibly unique capacity to sense and to enforce norms from a third party perspective. Such behavior, however, cannot be accounted by current computational models based on an egocentric notion of norms. Here, using a combination of model-based fMRI and third party punishment games, we show that brain regions prev...
متن کاملContracting with Third Parties
odels of bilateral contracting, such as the canonical holdup model, typically assume that third parties are not available. Given this assumption, the equilibrium outcome is not first-best efficient if contracts can be renegotiated. To be more specific, suppose an architect and a builder must cooperate to build a building. The quality of the building will depend on three things: the quality of t...
متن کاملthe influence of social and cultural capital on efl students critical thinking skills
the major aim of this study was to investigate the relationship between social and cultural capital and efl students’ critical thinking skills. this study takes this relationship in to account to see if people with different sociocultural status are different regarding their critical thinking skills. to this end, 160 university students majoring in english language and literature, english trans...
15 صفحه اولon the relationship between cultural, social intelligences and literary translation ability of iranian translation students
با توجه سرعت روز افزون جهانی سازی نیاز به مهارتهای میان فرهنگی نیز افزایش یافته است. از سوی دیگر تعاملات اجتماعی و نیازهای فرهنگی منوط به ترجمه است. بدین ترتیب مطالعه ترجمه از دیدگاه اجتماعی ضروری به نظر می رسد. برای نیل به این هدف، در تحقیق حاضر به بررسی رابطه همبستگی بین دو هوش فرهنگی و اجتماعی با توانش ترجمه ادبی دانشجویان (سال سوم) مترجمی زبان انگلیسی پرداخته شده است. همچنین قابلیت پیش بینی...
Towards Tiny Trusted Third Parties
Many security protocols hypothesize the existence of a trusted third party (TTP) to ease handling of computation and data too sensitive for the other parties involved. Subsequent discussion usually dismisses these protocols as hypothetical or impractical, under the assumption that trusted third parties cannot exist. However, the last decade has seen the emergence of hardware-based devices that,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Religious Ethics
سال: 2013
ISSN: 0384-9694
DOI: 10.1111/jore.12026