Results from three studies demonstrate that victims' justice-related satisfaction with punishment is influenced by the kind of feedback they receive from offenders after punishment. In contrast to previous studies that found a discrepancy between anticipated and experienced satisfaction from punishment (Carlsmith, Wilson, & Gilbert, 2008), participants were able to accurately predict their satisfaction when made aware of the presence or absence of offender feedback acknowledging the victim's intent to punish. Results also indicate that victims were most satisfied when offender feedback not only acknowledged the victim's intent to punish but also indicated a positive moral change in the offender's attitude toward wrongdoing. These findings indicate that punishment per se is neither satisfying nor dissatisfying but that it is crucial to take its communicative functions and its effects on the offender into account. Implications for psychological and philosophical theories on punishment motives as well as implications for justice procedures are discussed.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1177/0146167214533130 | DOI Listing |
Ann N Y Acad Sci
January 2025
School of Psychology, Shenzhen University, Shenzhen, China.
Individuals with high math anxiety (HMA) demonstrate a tendency to avoid math-related tasks, a behavior that perpetuates a detrimental cycle of limited practice, poor performance, increased anxiety, and further avoidance. This study delves into the cognitive and neural bases of math avoidance behavior in HMA through the lens of reward processing. In Experiment 1, participants reported their satisfaction level in response to the reward provided after solving an arithmetic problem.
View Article and Find Full Text PDFHealth Syst Reform
December 2024
School of International Development and Global Studies, University of Ottawa, Ottawa, Ontario, Canada.
This paper documents the results of an intervention conducted in Nigeria to test the effectiveness of a mobile phone technology, , in enabling women to self-report gender-based violence (GBV). Women experiencing GBV and other challenges related to sexual and reproductive health and rights were requested to use their mobile phones to text a code to a central server. In turn, the server relayed the messages to trained nearby health providers and civil society organization (CSO) officials who reached out to provide health care and social management services to the callers.
View Article and Find Full Text PDFFront Psychol
July 2024
Faculty of Psychology and Education Sciences, Transilvania University of Brasov, Brasov, Romania.
Introduction: Research shows that ICT is beneficial for academics and students, aiding in overcoming distance barriers, streamlining administration, and improving teaching and learning processes. However, the negative impact of technology, particularly technostress, are garnering attention. In the context of the concerns about technostress among higher education institutions (HEI), the aim of the study is to analyze the technostress creators and inhibitors for university teachers and students in different European countries.
View Article and Find Full Text PDFActa Psychol (Amst)
April 2024
Division of Research and Development, Lovely Professional University, Phagwara, India.
This paper explores theories of motivation, including instinct theory, arousal theory, incentive theory, intrinsic theory, extrinsic theory, the ARCS model, self-determination theory, expectancy-value theory, and goal-orientation theory. Each theory is described in detail, along with its key concepts, assumptions, and implications for behavior. Intrinsic theory suggests that individuals are motivated by internal factors like enjoyment and satisfaction, while extrinsic theory suggests that external factors like rewards and social pressure drive behavior.
View Article and Find Full Text PDFMath Biosci Eng
October 2023
School of Economics and Management, Nanjing Tech University, Nanjing 211816, China.
There are various regulatory mechanisms to coordinate vulnerability disclosure behaviors during crowdsourcing cybersecurity testing. However, in the case of unclear regulatory effectiveness, enterprises cannot obtain sufficient vulnerability information, third-party crowdsourcing cybersecurity testing platforms fail to provide trusted services, and the government lacks strong credibility. We have constructed a tripartite evolutionary game model to analyze the evolutionary process of the equilibrium of {legal disclosure, active operation, strict regulation}, and the paper reveals the impact of three regulatory mechanisms.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!