Neural responses to sanction threats in two-party economic exchange
نویسندگان
چکیده
منابع مشابه
Neural responses to sanction threats in two-party economic exchange.
Sanctions are used ubiquitously to enforce obedience to social norms. However, recent field studies and laboratory experiments have demonstrated that cooperation is sometimes reduced when incentives meant to promote prosocial decisions are added to the environment. Although various explanations for this effect have been suggested, the neural foundations of the effect have not been fully explore...
متن کاملNeural Responses to Sanction Threats
Sanctions are used ubiquitously to enforce obedience to social norms. Recent field studies and laboratory experiments have demonstrated, however, that cooperation is sometimes reduced when incentives meant to promote pro-social decisions are added to the environment. Although a variety of explanations have been suggested, the neural foundations of this effect have not been fully explored. Using...
متن کاملU.S. Economic Sanction Threats Against China: Failing to Leverage Better Human Rights
Recent literature argues that economic sanction threats should be more successful because both sender and target have an incentive to resolve their dispute before entering into costly sanction. Testing this assertion is somewhat problematic because threats are essentially nonevents Fsanctions that were never deployed. This paper quantifies the U.S. threats to condition or revoke China’s most fa...
متن کاملMillennial Tendencies in Responses to Apocalyptic Threats
Since Aaron Wildavsky proposed in 1987 that cultural orientations such as egalitarianism and individualism frame public perceptions of technological risks, a body of empirical research has grown to affirm the risk-framing effects of personality and culture (Dake, 1991; Gastil et al., 2005; Kahan, 2008). Most of these studies have focused on relatively mundane risks, however, such as handguns, n...
متن کاملOne-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending their messages (i.e., assuming a bidirectional half-duplex channel). However, by taking advantage ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the National Academy of Sciences
سال: 2009
ISSN: 0027-8424,1091-6490
DOI: 10.1073/pnas.0908855106