U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

JUSTIFICATION FOR LABORATORY THEFT - MORAL BEHAVIOR OF THE VICTIM AND FINANCIAL NEED

NCJ Number
55288
Journal
Pacific Sociological Review Volume: 21 Issue: 4 Dated: (OCTOBER 1978) Pages: 487-499
Author(s)
W A HARRELL; M J GARRITTY
Date Published
1977
Length
13 pages
Annotation
A LABORATORY EXPERIMENT DESIGNED TO EXPLORE VICTIM CHARACTERISTICS THOUGHT TO INFLUENCE THEFT BEHAVIOR IS DOCUMENTED.
Abstract
EXPERIMENTAL SUBJECTS OBSERVED A VIDEOTAPED PENNY-A-POINT BUTTON-PRESSING COMPETITION IN WHICH THE BEHAVIOR OF ONE OF THE COMPETITORS WAS MANIPULATED IN TWO WAYS: (1) HE EITHER DID OR DID NOT DISPLAY DISHONEST BEHAVIOR BY STEALING POINTS FROM THE OTHER (UNSEEN) PLAYER, AND (2) HE TOLD THE RESEARCHER THAT HE WAS PARTICIPATING IN THE EXPERIMENT EITHER FOR MONEY OR OUT OF CURIOSITY. AFTER VIEWING THE TAPED COMPETITION, THE SUBJECT WAS PUT IN THE POSITION OF HAVING TO STEAL, EITHER FROM THE COMPETITOR WHOSE BEHAVIOR WAS MANIPULATED AND OBSERVED OR FROM THE THIRD PLAYER, IN ORDER TO WIN MONEY. AMONG THE 118 EXPERIMENTAL SUBJECTS, STEALING, BOTH FROM THE OBSERVED COMPETITOR AND FROM THE THIRD PLAYER, WAS MORE COMMON FOLLOWING EXPOSURE TO DISHONEST BEHAVIOR. SUBJECTS WERE MORE LIKELY TO STEAL FROM THE DISHONEST PLAYER THAN FROM THE INNOCENT THIRD PARTY. SUBJECTS STOLE MOST OFTEN AND IN THE GREATEST AMOUNTS FROM THE MOST DEVIANT 'VICTIM'--THE DISHONEST, NONNEEDY GAME PLAYER. SLIGHTLY MORE MONEY WAS STOLEN FROM THE HONEST-BUT-NEEDY GAME PLAYER THAN FROM THE HONEST, NONNEEDY PLAYER. EXPOSURE TO A NEEDY COMPETITOR TENDED TO PRODUCE HIGHER RATES OF THEFT FROM THE UNSEEN THIRD SUBJECT THAN DID EXPOSURE TO A NONNEEDY PLAYER. THE FINDINGS BEAR OUT THE EXPECTATION THAT THE VIDEOTAPED COMPETITOR'S THEFT BEHAVIOR WOULD INCREASE THE LIKELIHOOD OF BOTH RETALIATORY THEFT (AGAINST THE DISHONEST COMPETITOR) AND IMITATIVE THEFT (FROM THE THIRD PARTY). OTHER IMPLICATIONS OF THE FINDINGS ARE DISCUSSED, AND SUGGESTIONS FOR FUTURE RESEARCH ALONG THESE LINES ARE OFFERED. TABULAR DATA AND A LIST OF REFERENCES ARE INCLUDED. (LKM)

Downloads

No download available

Availability