Results from three studies demonstrate that victims' justice-related satisfaction with punishment is influenced by the kind of feedback they receive from offenders after punishment. In contrast to previous studies that found a discrepancy between anticipated and experienced satisfaction from punishment (Carlsmith, Wilson, & Gilbert, 2008), participants were able to accurately predict their satisfaction when made aware of the presence or absence of offender feedback acknowledging the victim's intent to punish. Results also indicate that victims were most satisfied when offender feedback not only acknowledged the victim's intent to punish but also indicated a positive moral change in the offender's attitude toward wrongdoing. These findings indicate that punishment per se is neither satisfying nor dissatisfying but that it is crucial to take its communicative functions and its effects on the offender into account. Implications for psychological and philosophical theories on punishment motives as well as implications for justice procedures are discussed.

Download full-text PDF

Source
http://dx.doi.org/10.1177/0146167214533130DOI Listing

Publication Analysis

Top Keywords

punishment satisfying
8
satisfaction punishment
8
offender feedback
8
victim's intent
8
intent punish
8
punishment
5
message punishment
4
satisfying transgressor
4
transgressor responds
4
responds communicative
4

Similar Publications

Individuals with high math anxiety (HMA) demonstrate a tendency to avoid math-related tasks, a behavior that perpetuates a detrimental cycle of limited practice, poor performance, increased anxiety, and further avoidance. This study delves into the cognitive and neural bases of math avoidance behavior in HMA through the lens of reward processing. In Experiment 1, participants reported their satisfaction level in response to the reward provided after solving an arithmetic problem.

View Article and Find Full Text PDF

This paper documents the results of an intervention conducted in Nigeria to test the effectiveness of a mobile phone technology, , in enabling women to self-report gender-based violence (GBV). Women experiencing GBV and other challenges related to sexual and reproductive health and rights were requested to use their mobile phones to text a code to a central server. In turn, the server relayed the messages to trained nearby health providers and civil society organization (CSO) officials who reached out to provide health care and social management services to the callers.

View Article and Find Full Text PDF

Introduction: Research shows that ICT is beneficial for academics and students, aiding in overcoming distance barriers, streamlining administration, and improving teaching and learning processes. However, the negative impact of technology, particularly technostress, are garnering attention. In the context of the concerns about technostress among higher education institutions (HEI), the aim of the study is to analyze the technostress creators and inhibitors for university teachers and students in different European countries.

View Article and Find Full Text PDF

This paper explores theories of motivation, including instinct theory, arousal theory, incentive theory, intrinsic theory, extrinsic theory, the ARCS model, self-determination theory, expectancy-value theory, and goal-orientation theory. Each theory is described in detail, along with its key concepts, assumptions, and implications for behavior. Intrinsic theory suggests that individuals are motivated by internal factors like enjoyment and satisfaction, while extrinsic theory suggests that external factors like rewards and social pressure drive behavior.

View Article and Find Full Text PDF

There are various regulatory mechanisms to coordinate vulnerability disclosure behaviors during crowdsourcing cybersecurity testing. However, in the case of unclear regulatory effectiveness, enterprises cannot obtain sufficient vulnerability information, third-party crowdsourcing cybersecurity testing platforms fail to provide trusted services, and the government lacks strong credibility. We have constructed a tripartite evolutionary game model to analyze the evolutionary process of the equilibrium of {legal disclosure, active operation, strict regulation}, and the paper reveals the impact of three regulatory mechanisms.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!