2 resultados para Pro-social behaviour
em Universidade Federal do Rio Grande do Norte(UFRN)
Resumo:
Pro-social behaviors are seen regularly throughout our daily lives, as we often witness people giving alms, helping a neighbor move, donating blood, or taking care of a friend's children, among others. From an evolutionary perspective, such behaviors occur because they have a high adaptive value to our species, precisely due to our high degree of dependence on group living for survival. Probably, for this same reason, since children have shown a preference for prosocial behaviors over antisocial behaviors, this preference becomes more visible as we grow. However, children with symptoms of conduct disorder show a pattern of aggressive, impulsive and more selfish behaviors than children without such symptoms. Furthermore, these children also experience environments in which antisocial behaviors are more frequent and intense compared to the general population. Priming experiments are one way of measuring the influence of simple environmental cues on our behavior. For example, driving faster when listening to music, religious people help more on religious elements, like the bible, and children are more cooperative after playing games of an educational nature. Thus, the objectives of the current study were to: evaluate whether there is any difference in generosity, through sharing behavior, among children with and without symptoms of conduct disorder; analyze the influence of prosocial priming on sharing behavior on children with and without symptoms of conduct disorder; and finally, analyze from an evolutionary perspective, the reasons given by children with and without symptoms of conduct disorder for sharing or not sharing with their best friend in a classroom environment. To address this question, the teachers of these children were asked to respond to an inventory that was designed to signal the presence or absence of symptoms of conduct disorder. Children identified as having or not having symptoms of conduct disorder could then undergo an experimental (with priming) or control (no priming) condition. Under the experimental condition, the children were asked to watch two short videos showing scenes of helping and sharing among peers, to perform a distraction activity, and finally to chose two of four different materials presented by the researcher and decide how much of these two materials they would like to share with their best friend in the classroom. Then the children were asked about their reasons for sharing or not sharing. Children subjected to the control condition performed the same activities as in the xi experimental condition, but did not watch the video first. The results showed a notable difference in the effect of priming in accordance with the child's stage of development; a difference in the amount of material donated to a best friend by children with and without symptoms of conduct disorder, and a change in this observed difference with the influence of pro-social priming; and finally, a convergence in the thinking of children regarding their reasons for sharing with evolutionary theory. The results of this study also indicate the importance of individual factors, developmental stage, environmental and evolutionary conditions in the pro-social behavior of children with and without symptoms of conduct disorder.
Resumo:
The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.