Neural responses to sanction threats in two-party economic exchange

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Neural responses to sanction threats in two-party economic exchange.

Sanctions are used ubiquitously to enforce obedience to social norms. However, recent field studies and laboratory experiments have demonstrated that cooperation is sometimes reduced when incentives meant to promote prosocial decisions are added to the environment. Although various explanations for this effect have been suggested, the neural foundations of the effect have not been fully explore...

متن کامل

Neural Responses to Sanction Threats

Sanctions are used ubiquitously to enforce obedience to social norms. Recent field studies and laboratory experiments have demonstrated, however, that cooperation is sometimes reduced when incentives meant to promote pro-social decisions are added to the environment. Although a variety of explanations have been suggested, the neural foundations of this effect have not been fully explored. Using...

متن کامل

U.S. Economic Sanction Threats Against China: Failing to Leverage Better Human Rights

Recent literature argues that economic sanction threats should be more successful because both sender and target have an incentive to resolve their dispute before entering into costly sanction. Testing this assertion is somewhat problematic because threats are essentially nonevents Fsanctions that were never deployed. This paper quantifies the U.S. threats to condition or revoke China’s most fa...

متن کامل

Millennial Tendencies in Responses to Apocalyptic Threats

Since Aaron Wildavsky proposed in 1987 that cultural orientations such as egalitarianism and individualism frame public perceptions of technological risks, a body of empirical research has grown to affirm the risk-framing effects of personality and culture (Dake, 1991; Gastil et al., 2005; Kahan, 2008). Most of these studies have focused on relatively mundane risks, however, such as handguns, n...

متن کامل

One-Round Protocols for Two-Party Authenticated Key Exchange

Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending their messages (i.e., assuming a bidirectional half-duplex channel). However, by taking advantage ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the National Academy of Sciences

سال: 2009

ISSN: 0027-8424,1091-6490

DOI: 10.1073/pnas.0908855106