"Second or third party punishment? When self-interest hides behind apparent functional interventions"

Baumard, N. (University of Pennsylvania) and Liénard, P. (University of Nevada, Las Vegas)

Relying on data collected among the pastoralist Turkana of Kenya, Mathew and Boyd (PNAS, July 12, 2011) claim that, in pre-state societies, cooperation in warfare is enforced by costly third-party punishment1. Such behavior would be functional and would have been selected by cultural group selection. Functionalism has a long history in anthropology. Cultural phenomena such as gift-giving, sacrifice, or social sanctions have been explained in terms of function for the group. Recent analyses, however, have shown that such phenomena are typically outcomes of complex sums of individual behaviors. Gift-giving is actually delayed reciprocity; apparent sacrifice, cases of tolerated theft; and social sanctions, self-interested retaliations by victims and their allies. History has shown that functionalist arguments should be considered with caution. Mathew and Boyd’s functionalist claim rests on three assertions. (1) Third parties punish Turkana cowards. (2) The punishment is costly for the punisher. (3) Warfare benefits Turkana society as a whole. (1) Mathew and Boyd note that punishment is carried out by the age-set [anaket] to whom the coward belongs. They fail to specify, however, that among the Turkana (as well as in many pre-state societies2), regional groups of age-mates form the basic units of raids.3 Punishment would thus be carried out by second-parties who have a direct stake in retaliating against individuals who put their life in danger by defecting from the raid. (2) Mathew and Boyd use the payment of “fines” by offenders as evidence of third party punishment. The term ‘fines’ here may be misleading since it suggests that the payment goes to a third party. In reality, offenders offer the punishing age-set(s) animals to consume in sacrificial rituals. Thus, fines are not turned into collective assets but are immediately transformed into individual benefits for interested parties. (3) Turning to warfare, functionality appears even more problematic. First, warfare amongst Turkana has been shown to lead to an increased mortality of young children and adult males in their prime reproductive years, and decreased female fertility4. Second, individuals benefit directly from their participation in warfare through reputation building and acquisition of livestock frequently reinvested in personal networks for social capital building5. Third, as Mathew and Boyd state, individuals are usually rewarded in proportion to their contribution to the raid, a clear signature of self-interested behavior. Raiders with a share of the loot redistribute animals to kin, stock associates, or age-mates, using the opportunity to increase their own social capital. Thus, while warfare may provide overall benefits to Turkana culture (which remains to be clearly demonstrated given the costs generated by constant warfare), these benefits are probably by-products of fundamental phenomena based on individual interest.

When confronted with a group-functionalist explanation, we should ask ourselves: Is there a more parsimonious explanation based on individual behavior? In the case of warfare, Mathew and Boyd’s own report, as well as other studies of Turkana, suggest just that: individuals punish others who threaten their safety; punishments benefit punishers; and raiding is a way to achieve status and acquire resources.

We thank Jean-Baptiste André, Dan Benyshek, Dan Sperber and Polly Wiessner for their comments.

References: 1. Mathew, S. and Boyd, R. Punishment sustains large-scale cooperation in prestate warfare, Proceedings of the National Academy of Sciences, 28, 11375-80 (2011) 2. Ritter, M.L. The conditions favoring age-set organization. Journal of Anthropological Research 36, 87–104 (1980). 3. Lamphear, J. (1994) The Evolution of Ateker ‘New Model’ Armies: Jie and Turkana. In K. Fukuiand J. Markakis (eds.) Ethnicity and Conflict in the Horn of Africa. James Currey, London. 4. Gray, S. et al. Cattle raiding, cultural survival, and adaptability of East African pastoralists. Current Anthropology 44, 3–30 (2003). 5. Bollig, M. Ethnic conflicts in North-West Kenya. Zeitschrift für Ethnologie 115, 73–90 (1990).

Second or third party punishment? When self-interest ...

Relying on data collected among the pastoralist Turkana of Kenya, Mathew and ... carried out by second-parties who have a direct stake in retaliating against ...

353KB Sizes 1 Downloads 98 Views

Recommend Documents

The Neural Correlates of Third-Party Punishment
Dec 10, 2008 - set (n = 20) included actions of comparable gravity to those de- ..... or threat of injury to the subject or a close friend/family member. ...... DD. Victim Compensation. Community Service Short Jail Sentence Long Jail Sentence ...

FA Third Party Ownership Regulations
Jul 4, 2009 - Any breach of these Regulations shall be Misconduct and shall be dealt with in accordance with the Rules of The Association and shall be ...

Third Party Financing presentation.compressed.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Third Party ...

LAFDF Third-Party Fundraising.pdf
Because LAFDF is not the event host, your event's revenues and expenses cannot flow. through LAFDF's accounts. Accordingly, unless your application has ...

Third Party Code of Conduct - PwC India
Nov 19, 2013 - Parties operate, this Code sets forth the basic requirements that you must meet in ... Compliance with Laws, Regulations and Business Conduct ... advisors, lawyers, surveyors, specialist valuers, software suppliers, and/or.

LAFDF Third-Party Fundraising.pdf
Website : http://sites.google.com/site/masjidillah. Blog : masjidillah.wordpress.com. Whoops! There was a problem loading this page. Retrying... LAFDF Third-Party Fundraising.pdf. LAFDF Third-Party Fundraising.pdf. Open. Extract. Open with. Sign In.

A Third-Party Value-Added Network Service Approach ...
a growing number of network applications that require sup- port for multipoint .... of view, these waypoint machines are ordinary end systems, and not part of the IP ..... ing, waypoints also need to maintain STORM state as well as to buffer some ...

War and Peace: Third-Party Intervention in Conflict
4001, Tel: (785) 532-6332, Fax: (785) 532-6919, e-mail: [email protected]. We are grateful to the editor, Arye L. Hillman, and three anonymous referees for ...

10.2.3.2 Worksheet - Third-Party Antivirus Software.pdf
10.2.3.2 Worksheet - Third-Party Antivirus Software.pdf. 10.2.3.2 Worksheet - Third-Party Antivirus Software.pdf. Open. Extract. Open with. Sign In. Main menu.

Adding Third-Party Authentication to Open edX ... - Research at Google
Mar 18, 2015 - D.2.13 [Reusable Software]: Reusable libraries; K.6.5. [Security and .... edX user interface to account for a small number of new user actions ...

10.2.3.2 Worksheet - Third-Party Antivirus Software.pdf
... Name. Website URL. Software Features. Subscription Length. (Month/Year/Lifetime). Cost. Page 1 of 1. 10.2.3.2 Worksheet - Third-Party Antivirus Software.pdf.

A Third-Party Value-Added Network Service Approach ...
Third-party value-added service provider places servers around the network ... Backbone topology emulating the Internet based on 3 Internet. Service Providers' ...

Conflict persistence and the role of third-party ...
level of human capital a party would have in the absence of future political ... influencing the party's present value of political control. ..... Amsterdam: Elsevier.

Headline or title goes here second line
…an approach to delivering or consuming. IT-related capabilities “as-a-service” using the Internet or Intranet. On Demand. Elastic. Pay-as-you-go. Easy to ...

War and Peace: Third-Party Intervention in Conflict
4001, Tel: (785) 532-4573, Fax: (785) 532-6919, e-mail: [email protected] ... Economic Association International, San Diego, CA, on July 2, 2006. We thank ...

10.2.3.2 Worksheet - Third-Party Antivirus Software.pdf
Sign in. Loading… Page 1. Whoops! There was a problem loading more pages. 10.2.3.2 Worksheet - Third-Party Antivirus Software.pdf. 10.2.3.2 Worksheet ...