Hostname: page-component-586b7cd67f-dsjbd Total loading time: 0 Render date: 2024-11-27T11:46:53.975Z Has data issue: false hasContentIssue false

The effects of social vs. asocial threats on group cooperation and manipulation of perceived threats

Published online by Cambridge University Press:  12 October 2020

Pat Barclay*
Affiliation:
Department of Psychology, University of Guelph, 50 Stone Rd. E., Guelph, N1G 2W1, ON, Canada
Stephen Benard
Affiliation:
Department of Sociology, Indiana University, Ballantine Hall, 1020 E. Kirkland Ave, Bloomington, 47405, IN, USA
*
*Corresponding author. E-mail: [email protected]

Abstract

Individuals benefit from maintaining the well-being of their social groups and helping their groups to survive threats such as intergroup competition, harsh environments and epidemics. Correspondingly, much research shows that groups cooperate more when competing against other groups. However, ‘social’ threats (i.e. outgroups) should elicit stronger cooperation than ‘asocial’ threats (e.g. environments, diseases) because (a) social losses involve a competitor's gain and (b) a strong cooperative reaction to defend the group may deter future outgroup threats. We tested this prediction in a multiround public goods game where groups faced periodic risks of failure (i.e. loss of earnings) which could be overcome by sufficient cooperation. This threat of failure was framed as either a social threat (intergroup competition) or an asocial threat (harsh environment). We find that cooperation was higher in response to social threats than asocial threats. We also examined participants’ willingness to manipulate apparent threats to the group: participants raised the perceived threat level similarly for social and asocial threats, but high-ranking participants increased the appearance of social threats more than low-ranking participants did. These results show that people treat social threats differently than asocial threats, and support previous work on leaders’ willingness to manipulate perceived threats.

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright
Copyright © The Author(s), 2020. Published by Cambridge University Press on behalf of Evolutionary Human Sciences

Media Summary: Outgroup threats cause more cooperation than asocial threats, esp. if low risk. People manipulate both threats equally

Introduction

When an external force threatens a group (e.g. a hostile outgroup, natural disaster or epidemic), preventing or overcoming that threat is a cooperative act that benefits all group members. Group members have a stake in each other's welfare because of the benefits of group living (e.g. collective foraging and defence), such that helping the group overcome such threats is individually beneficial (Barclay & Benard, Reference Barclay and Benard2013; Kokko et al., Reference Kokko, Johnstone and Clutton-Brock2001; Roberts, Reference Roberts2005). Despite the individual benefits of helping, everyone might prefer that someone else expend effort and resources to overcome the group threat. Resolving group threats is thus a Volunteer's Dilemma wherein helping pays when it aids the group to overcome a threat, but not when the threat is absent or inevitable (e.g. Diekmann, Reference Diekmann1985, Reference Diekmann, Diekmann and Mitter1986, Reference Diekmann1993; Murnighan et al., Reference Murnighan, Kim and Metzger1993; Myatt & Wallace, Reference Myatt and Wallace2008; see Barclay & Van Vugt, Reference Barclay, Van Vugt, Schroeder and Graziano2015, for similar phenomena). Cooperation is more likely in Volunteer's Dilemmas when threats are more likely or costly, such that organisms cooperate when the threat is high and defect when it is low: such ‘threat-dependent cooperation’ has been found in theoretical models (Archetti, Reference Archetti2009), non-humans (Radford, Reference Radford2008, Reference Radford2011), and especially in humans (e.g. Barclay & Benard, Reference Barclay and Benard2013; Bornstein, Reference Bornstein2003; Brewer Reference Brewer, Ashmore, Jussim and Wilder2001; Coser Reference Coser1956; Halevy et al., Reference Halevy, Bornstein and Sagiv2008; Jordan et al., Reference Jordan, Jordan and Rand2017; Lahti & Weinstein, Reference Lahti and Weinstein2005; Milinski et al., Reference Milinski, Sommerfeld, Krambeck, Reed and Marotzke2008; Puurtinen & Mappes, Reference Puurtinen and Mappes2009; Sherif, Reference Sherif1966; Van Vugt et al., Reference Van Vugt, Hogan and Kaiser2008; Vasi & Macy, Reference Vasi and Macy2003; reviewed by Benard & Doan Reference Benard and Doan2011).

Some group members have an incentive to manipulate this tendency to cooperate in the face of group threats. If an organism can manipulate its groupmates into perceiving that the threat is higher than it actually is, then that organism receives higher cooperation from its groupmates, and correspondingly reduced within-group competition (Lahti & Weinstein, Reference Lahti and Weinstein2005; Simmel Reference Simmel1908[1955]; Willer, Reference Willer2004). Such manipulation could be accomplished by reminders of past threats (e.g. Willer, Reference Willer2004), ‘us vs. them’ language (Bekkers, Reference Bekkers1977), over-responses to ambiguous threats, appearances of constant vigilance or false alarm calls (non-humans: Munn, Reference Munn1986), or creating actual intergroup conflict (Bekkers, Reference Bekkers1977; Dogan et al., Reference Dogan, Glowacki and Rusch2017). In particular, leaders benefit from manipulating followers’ perceptions of group threats because they receive disproportionate shares of group productivity and have the most to lose from within-group status competition (Dogan et al., Reference Dogan, Glowacki and Rusch2017; Lahti & Weinstein, Reference Lahti and Weinstein2005). Critics often accuse politicians of threat manipulation, although such charges are difficult to substantiate (e.g. Cinrincione et al., Reference Cinrincione, Mathews, Perkovich and Orton2004; Tisdale & Norton-Taylor, Reference Tisdale and Norton-Taylor2010). Nonetheless, there is anecdotal evidence of threat-manipulation in gangs and other groups (e.g. Brewer Reference Brewer, Ashmore, Jussim and Wilder2001; Short & Strodtbeck, Reference Short and Strodtbeck1963) and experimental evidence showing that people – especially those possessing high rank – will initiate intergroup conflict (Dogan et al., Reference Dogan, Glowacki and Rusch2017) or pay to make group threats appear worse than they actually are (Barclay & Benard, Reference Barclay and Benard2013).

Yet what kinds of threats elicit the most cooperation – and the most manipulation? Group threats come in various forms: social threats depend on the actions of others outside the group (e.g. hostile outgroups), whereas asocial threats do not (e.g. natural disasters, predators, diseases, droughts and other ‘games against nature’). Most research does not distinguish between these types of threats (but see Jordan et al., Reference Jordan, Jordan and Rand2017). Organisms should react more strongly to social than asocial threats for at least three reasons. First, other groups are less related to oneself than average (i.e. negative relatedness; Gardner & West, Reference Gardner and West2004), which fosters spite and gives increased incentives to help related groupmates compete against them (e.g. West & Gardner, Reference West and Gardner2010; Krupp & Taylor, Reference Krupp and Taylor2015). Second, defeating an asocial threat means merely preventing a loss whereas defeating a social threat can also involve a gain (e.g. taking an outgroup's resources, land, or mates; Gavrilets, Reference Gavrilets2015; Manson & Wrangham, Reference Manson and Wrangham1991) or preventing one's competitors from gaining. Third, social threats are conspecifics who can react to one's group's actions, causing them to mount an even bigger threat in response if they are not deterred outright. A mathematical model by Gavrilets (Reference Gavrilets2015) suggests that group cooperation is more likely to arise first in response to between-group conflicts (social threats) and is then extended to ‘games against nature’ (asocial threats), rather than vice versa.

Based on the reasons above, we predict that humans possess a psychology (e.g. heuristics) that causes them to be more sensitive to social threats than to asocial threats. However, there is little evidence as to whether cooperation is higher in response to social vs. asocial threats. Furthermore, if such a deep-seated psychology exists, it should be elicited even in the absence of actual intergroup competition, just as other deep-seated desires like salivation can be elicited in the absence of actual food (e.g. by saccharine), or sexual arousal can be elicited in the absence of sexual partners (e.g. by pornography). Human behaviour is readily influenced by evolved heuristics (Todd, Reference Todd, Gigerenzer and Selten2001), including other heuristics about cooperation (e.g. Kioynari et al., Reference Kioynari, Tanida and Yamagishi2000), and the framing of a cooperative task can influence which heuristics get activated (Eriksson & Strimling, Reference Eriksson and Strimling2014; Liberman et al., Reference Liberman, Samuels and Ross2004).

As a result, we expect that humans will cooperate to a greater extent when a threat is presented as social in origin, compared with when it is presented as asocial. If people do cooperate more in response to social threats, they may also be more likely to exaggerate the apparent threat when that threat is social in nature, as doing so is more likely to elicit cooperation from group members. Thus, we test whether threat manipulation is more likely when threats are social vs. asocial. We build on past work finding that those occupying high-ranking, contestable positions are more likely to manipulate threats (Barclay & Benard, Reference Barclay and Benard2013). We evaluate whether we can replicate this finding in a different setting and sample, and also whether rank moderates the effect of social vs. asocial threats.

The goals of the current manuscript are to test whether people: (a) cooperate more when threats are presented as social vs. asocial; (b) are more responsive to increased levels of social vs. asocial threat; (c) invest more in manipulating group perceptions of social than asocial threats; and (d) are more likely to do each of the above when they possess contestable rank. We use a social vs. asocial framing of an experimental economic game: a modified public goods game with contestable rank, fluctuating threat of group failure (i.e. everyone earns zero) and opportunities to manipulate the threat level that others see. Most importantly, we manipulate the social vs. asocial nature of the threat by the framing alone: the social and asocial threats are identical in structure, incentives and complexity. As such, if participants behave differently to social vs. asocial threats, it is due to the type of threat, rather than some other feature of the situation like the presence of a threshold in social competitions (e.g. Jordan et al., Reference Jordan, Jordan and Rand2017). Laboratory games are simplified models of real-world scenarios: they necessarily lack some features of the real world, like a map that simplifies real terrain and lacks some features of the geography. Nonetheless, such games are useful insofar as they capture essential features of the real world like the conflicting incentives to benefit the group vs. benefit oneself (e.g. Hertwig & Ortmann, Reference Hertwig and Ortmann2001; Kokko Reference Kokko2007), and allow us to observe normally unobservable phenomena (e.g. threat manipulation that is typically concealed in real-life settings).

Methods

Participants

Participants were 62 males and 58 females from the University of Guelph community (mean age 22.0 ± 5.2 SD years) recruited via posters around campus. Each session included two groups of three participants each; the two groups worked independently and did not interact. As such, there were 40 groups in total, or 120 total participants with 20 rounds each equalling 2,400 total observations. All participants gave written consent before participating. No deception was used: all participants received full instructions and passed a comprehension test before participating. These methods were approved by the Research Ethics Board at the University of Guelph.

Payment

Participants received CAN$5 for showing up. Participants also earned ‘lab dollars’ (henceforth L$) which were exchangeable to Canadian dollars (CAN$) after the experiment at the pre-announced exchange rate of 3:1, based on the average of all rounds. Total earnings averaged CAN$21.56 (± 4.56 SD).

Anonymity

Participants’ decisions were made anonymously via computers using z-tree software (Fischbacher, Reference Fischbacher2007). Communication was not allowed, and partitions prevented visual contact between participants. The experimenter knew participants’ total earnings but not how those earnings were reached.

Experimental task: modified ‘public goods game’

Participants played 20 rounds of a public goods game in groups of three. Each round, participants received L$50 or L$80 each (see below), and could contribute any whole number of these to a group fund and keep the rest for themselves. The computer program summed the contributions within a group, multiplied them by 1.5, and gave all group members an equal share of the new total (contributors and non-contributors alike). Thus, each L$1 contributed resulted in each group member receiving L$0.50, including the contributor, such that contributions were personally costly but increased the group's earnings.

In order to test our hypotheses, we modified the public goods game in four ways (based on Barclay & Benard, Reference Barclay and Benard2013), which we summarize as follows. First, we included surmountable threats to group survival: each round there was some probability that the group would ‘fail’ and all members would earn zero; participants could reduce this risk by contributing to the public good. Second, we let participants manipulate the apparent severity of those group threats: each participant could pay to increase or decrease the threat level that other participants saw before making their public goods contributions. Thus, participants could exaggerate or downplay the perceived threat level, while the actual threat to the group remained the same. Third, because threat manipulation is more common among high-ranking participants (Barclay & Benard, Reference Barclay and Benard2013), we added contestable rank: each group contained one high-ranking member (L$80 endowment) and two low-ranking members (L$50 endowment), and this rank could change each round based on who kept the most money for themselves. Fourth, to test the effects of threat type, we framed the game as either a social threat (a firm being outcompeted by a rival firm) or an asocial threat (a firm going bankrupt from not having enough money to continue operations). In sum, participants engaged in a public goods game, in groups stratified into contestable high- and low-ranking positions, with a fluctuating social or asocial risk of group failure that could be exaggerated or downplayed by participants. We elaborate on each of these four additions in the three sections below. Figure 1 presents an overview of each round.

Figure 1. Flowchart of each of the 20 rounds of the study from the perspective of participants. Participants’ decisions are in bold. Threats were framed as the risk of a firm going bankrupt either due to not having enough money to continue operations (asocial threats) or from being outcompeted by other firms (social threats). Figure reused under Creative Commons Attribution (CC BY) license from Barclay and Benard (Reference Barclay and Benard2013).

External threats (and manipulation thereof)

To assess how participants respond to (and manipulate) external threats, for each round the computer randomly determined the ‘threat level’. This threat level was the probability that the group would ‘fail’ that round (0–100%, drawn uniformly). If the group failed, then all members earned zero for that round and the previous round, including their endowments and their shares of the group fund. This simulates a group succumbing to external threats, for example by failing to respond effectively to hostile outgroups (e.g. Bowles, Reference Bowles2006), natural disasters or even environmental degradation (Diamond, Reference Diamond2005). Importantly, the threat in the experiment is a continuous probability, which deliberately introduces uncertainty. The uncertain and continuous nature of these threats makes them more ecologically representative of real-life threats than the manipulations used in typical threshold-level public goods and Volunteer's Dilemmas (e.g. Jordan et al., Reference Jordan, Jordan and Rand2017).

The true threat level (i.e. the computer-generated risk of failure) was unknown to participants. Instead, they had to rely on the announced threat level, which could be manipulated by participants. All group members could pay up to L$10 to increase or decrease what threat level was announced to the group: every L$1 spent this way caused a 5% increase or decrease in the threat level that was announced (but had no effect on the true risk of group failure). For example, if the true threat level was 40%, and one participant spent L$4 on increasing the threat, then the announced threat level would be 60% (i.e. 40 + (4 × 5)%), but the actual risk of group failure would still be 40%. Thus, the sole purpose of increasing or decreasing the announced threat level is to change others’ perceptions of the risk of group failure.

After seeing the announced threat level, participants decided how much of their L$50 or L$80 endowments to contribute to the group fund. Every L$1 contributed reduced the (true) risk of group failure by 0.5%. For example, if the (true) threat level was 40% and the group members contributed a total of $20, then at the end of the round there would be a 30% chance (i.e. 40 − (20 × 0.5)%) of the group failing and everyone earning zero in that round. Thus each L$1 contribution to the group fund had two beneficial effects: increasing group earnings by $0.5 per person, and reducing the risk of group failure by 0.5%.

How does this threat level affect the incentives of the game? The threat level adds an element of a Volunteer's Dilemma to the public goods game. If the threat is high enough, then it pays to contribute to the public good to prevent group failure, although all players might prefer that someone else ‘volunteer’ to contribute. This is different from the linear public goods game that many experiments use (a.k.a. N-player Prisoner's Dilemma), where defection is the dominant strategy, but the game is still a cooperation game – all public goods fall on a spectrum between a pure Prisoner's Dilemma and a pure Volunteer's Dilemma (Archetti & Scheuring, Reference Archetti and Scheuring2011), and almost all have a mixed equilibrium of cooperation and defection. Threat-dependent cooperation (and manipulation thereof) relies on there being personal benefits from cooperating to overcome the group threat. As such, these external threats – and the Volunteer's Dilemma they create – are a crucial part of our experimental design.

Contestable rank

We introduced contestable rank to test whether high and low-ranking participants responded similarly to social and asocial threats, and to see whether they varied in their willingness to manipulate such threats. Previous work showed that high-ranking people spend more to manipulate group threats (Barclay & Benard, Reference Barclay and Benard2013), so we used contestable rank to ensure that some participants had sufficient motivation to manipulate group threats, and to recreate the dynamics in real human groups. A diverse range of human social groups – including political parties, labour unions and gangs – are stratified into hierarchies (Gould Reference Gould2003; Van Vugt et al., Reference Van Vugt, Hogan and Kaiser2008). Occupants of high-ranking positions in such groups typically have access to greater resources or power, but also face competition for their position from within the group. There are many definitions of social rank, but common to such definitions are preferential access to resources and the fact that rank is contestable at least in theory (Gould, Reference Gould2003). The present study used a relatively minimal operationalization of rank – contestable high vs. low endowments each round; previous work examines alternative operationalizations (Barclay & Benard, Reference Barclay and Benard2013).

In the present study, the high-ranking participant received L$80 as her endowment each round whereas the low-ranking participants received L$50 each round. This represents preferential access to resources. In any round that the group survived, rank was contestable based on resources: the high-ranking participant lost her position if she kept less money for herself than did the two low-ranking participants combined. After such a supplanting, each low-ranking person's chances of achieving the high rank for the next round depended on their relative amounts kept. For example, suppose that high-ranking A kept L$2 while low-ranking B and C kept $2 and $1, respectively. A would lose the high-ranking position because she kept less (L$2) than B and C combined (L$3); B would get the high rank the next round with 2/3 probability and C with 1/3 probability. We used amounts kept (i.e. not contributed or spent on manipulation) as the basis for rank because we are focusing on hierarchies resembling dominance hierarchies based on raw competitive power (e.g. Henrich & Gil-White, Reference Henrich and Gil-White2001; Reeve & Shen, Reference Reeve and Shen2006) as opposed to hierarchies based on prestige and trust (e.g. Barclay, Reference Barclay2004, Reference Barclay2013, Reference Barclay2016; Hardy & Van Vugt, Reference Hardy and Van Vugt2006; Milinski et al., Reference Milinski, Semmann and Krambeck2002; Willer, Reference Willer2009). In dominance-based hierarchies, helping one's group and competing over rank are generally mutually exclusive, to the point where many authors simply define a failure to cooperate as ‘competition’ (e.g. Kümmerli et al., Reference Kümmerli, Burton-Chellew, Ross-Gillespie and West2010; Messick & McClintock, Reference Messick and McClintock1968; Reeve & Shen, Reference Reeve and Shen2006). For a full justification of our definition of rank and its contestability, see Barclay and Benard (Reference Barclay and Benard2013).

Summary of each round

Figure 1 shows the order of events in each of the 20 rounds. First, the computer generated a true threat level, i.e. the risk of the group failing and everyone earning zero for that round and the previous one. Participants received their endowments of L$50 (low-rank) or L$80 (high-rank). They could then pay up to L$10 to increase or decrease the announced threat level, which affected what others saw as being the threat level but not the actual risk of group failure. After seeing the announced threat level, participants could contribute any whole dollar amount to the group fund. Each L$1 contributed reduced the true risk of group failure by 0.5%; also, all contributions were summed, multiplied by 1.5 by the computer, and redistributed evenly. If the group failed, everyone earned zero for that round and the previous one, and rank did not change. If the group survived, everyone received their earnings for that round (remaining endowment + share of group fund), and rank was determined by the relative amounts that participants kept. The high-ranking person lost her position if she kept less money than the two low-ranking people; if that happened, then each low-ranking person's probability of winning the high rank depended on their amounts kept relative to each other. To avoid endgame effects (and simulate many real-group life situations), participants did not know the total number of rounds.

Experimental conditions: social threats vs. asocial threats

We created social vs. asocial threats by framing the instructions differently across the two conditions. In both conditions, the instructions were framed as three business co-owners choosing to invest their salaries in a ‘company growth account’ (group fund) vs. a ‘personal development account’ (keeping money for self), while competing to be the high-earning ‘sales leader’ (high rank) instead of simply a ‘team member’ (low rank). The threat of group failure was framed as the threat of bankruptcy.

In the Asocial Threat condition (n = 60 participants = 20 groups), group failure was framed as going bankrupt (‘franchise failure’) from not having enough money ‘to continue operating effectively’ in an ‘uncertain economy’, or other wording relating to effective operations. In the Social Threat condition (n = 60 participants = 20 groups), group failure was framed ‘being out-competed’ from not having enough money ‘to compete effectively with rival businesses’ or other wording relating to outcompeting rival businesses. Thus, the Social Threats were framed much more explicitly as intergroup competition, whereas the Asocial Threats were not. These different framings were repeated multiple times in the instructions, but were still relatively small: the total words that differed between the two framings comprised less than 6% of all words in the introduction and comprehension tests (Asocial Threat, 186/3241 words; Social Threat, 152/3204 words). The Supplementary Information presents both framings, so readers can compare them.

These framings were the only difference between the Asocial Threat and Social Threat conditions; the two conditions were otherwise identical in structure and incentives. As such, any differences between experimental conditions are solely due to the differences in framing (i.e. social vs. asocial threat), as opposed to differences in incentives, complexity or understanding.

Analytical strategy

Our data have a multilevel structure in which rounds are nested within individuals, and individuals are nested within groups. The unit of analysis is the person-round; 120 individuals interacting across 20 rounds yields 2,400 total observations. To compensate for the non-independence of observations, we fit multilevel models with random intercepts for individuals and groups, using the mixed command in STATA 14.1. Our dependent variables are the percentage of endowments participants (a) contributed to the group and (b) invested in increasing or decreasing the apparent threat level. The threat manipulation measure was coded as a positive number if participants invested in increasing the threat, and a negative number if they invested in decreasing the threat. We focus on percentage of endowment contributed or invested in manipulation in the main text because this measure controls for differences in endowments across participants in high- or low-ranking positions. Our independent variables include rank (high/low), the social/asocial threat manipulation, the interaction of these two variables and controls for perceived threat level and period. Note that our primary independent variable, whether participants are assigned to the Social or Asocial Threat condition, is time-invariant, and so fixed effects models are not appropriate for these data.

To accurately measure each participant's perception of the threat, the control for the perceived threat level was adjusted to take the participant's manipulation of the threat into account. The perceived threat level for any given participant is the announced threat level minus however much they changed it by – this accounts for the fact that participants who manipulated the threat would know that some of that threat was not real, i.e. some of the announced threat was caused by them. For example, if the threat announced to the participant on that round was 50%, but the participant had increased the apparent threat by 5%, the perceived threat for that participant that round was 45%. Thus, the true threat is the probability that the group will fail and is unknown to all participants; the announced threat is what was publicly announced, i.e. the true threat plus the sum of everyone's manipulations (including the focal participant); and the perceived threat is what any focal participant would perceive after factoring out their own manipulation, i.e. the true threat plus the sum of everyone else's manipulations (i.e. excluding the focal participant).

Given that our percentage contribution measure is bounded (ranging from 0–100), one might be concerned about the violation of the assumption that the residuals should be normally distributed. However, the distribution of the residuals, as well as q–q and p–p plots, indicates no signs of violation of this assumption. Because some standardized residuals were large (approximately ± 5), we used robust standard errors, as recommended by Rabe-Hesketh and Skrondall (Reference Rabe-Hesketh and Skrondal2012). Comparisons with models without robust standard errors indicated that the presented models are more conservative for most variables (i.e. the presented models generally have larger standard errors).

All p-values are two-tailed. In addition to our primary analyses, we fit several alternative models to evaluate the robustness of our results, and to show that they do not depend on one particular modelling strategy or statistical assumptions (see below and Supporting Information). We also conducted checks for influential points, by computing Cook's distance scores for both groups and individuals and comparing them with critical values drawn from an F distribution (Aguinis et al., Reference Aguinis, Gottfredson and Joo2013). Depending on the analysis, the significant effects of social threats were either unchanged (i.e. no influential points detected), or had slightly smaller p-values compared with those presented in the base models. These results are available from the authors. The data are available on the Open Science Framework at https://osf.io/dvy2j/.

Results

Contributions to the group fund

Contributions under social vs. asocial threats

To test our hypotheses, we present a multilevel model with percentage of endowment contributed to the group fund regressed on rank, the social/asocial threat manipulation, the interaction of these two variables, and controls for perceived threat level and period (see Table 1, column 1). As predicted, participants contributed more to the group fund in the Social Threat condition than the Asocial Threat condition (b = 7.36, p = 0.029). Figure 2 presents the raw and predicted means from these models, by Social/Asocial Threat condition and rank, with standard errors corrected for clustering; we present both raw and predicted means because error bars for the raw means do not account for clustering and thus underestimate the standard errors. We also conducted a set of supplementary analyses to evaluate the scope and robustness of our findings (see Appendix and Tables S1 and S2 in the Supporting Information for more details). The effects of social threats remained significant and similar in size when employing alternative estimation techniques, including wild cluster bootstrapping (Table S1).

Figure 2. Percentage of endowment contributed to the group fund by high- and low-ranking participants with asocial threats (white bars) vs. social threats (dark bars). Panels show (a) raw means (error bars omitted because raw standard errors are biased due to clustering) and (b) predicted means with cluster-corrected standard errors (which are more conservative).

Table 1. Multilevel model for the effects (and robust standard errors) of a one unit change (i.e. b-values) in rank, social threats, perceived threat and time period on percentage of endowment spent on contribution and manipulation of perceived threats

Note: Perceived threats are not included in the manipulation analysis because participants made decisions about manipulating perceived threats before threat levels were announced.

The unit of analysis is the person-round, with person and group-level random intercepts.

p < 0.10; *p < 0.05; **p < 0.01.

Contributions at different threat levels

Participants demonstrated threat-dependent cooperation by contributing more to the group fund when the perceived threat was high: each 1% increase in the perceived threat level was associated with participants contributing an additional 0.24% of their endowment (b = 0.24, p = 0.0005). In supplementary analyses, we find a marginally significant, negative interaction between social threats and the perceived threat level, such that the difference between social and asocial threats got smaller as the threat level increased (b = −0.10, p = 0.057; Figure 3, Model 1 in Table S2). While participants consistently contribute more at higher vs. lower threat levels, at low threat levels they contribute more in response to social threats than asocial threats, but at higher threat levels they contribute similarly for social and a social threats.

Figure 3. Percentage of endowment contributed to the group fund at different perceived threat levels, for asocial threats (dotted line) and social threats (solid line). Panels show (a) raw means, (error bars omitted because raw standard errors are biased due to clustering) and (b) predicted means with cluster-corrected standard errors.

Contributions across periods and by low- and high-ranking participants

We found a negative effect of period, indicating that contributions tend to decline across rounds (b = −0.36, p = 0.002). Contributions were similar from low- and high-ranking participants: low-ranking participants did not differ from high-ranking participants in their contributions (b = 0.18, p = 0.918), and rank did not significantly interact with the type of threat (b = −0.18, p = 0.939). The supplementary analyses also show that high- and low-ranking individuals respond similarly to perceived threats (Models 2 and 3 in Table S2). There is no significant three-way rank × social threat × threat level interaction or subsidiary two-way interactions (Model 3 in Table S2), and the type of threat does not significantly moderate the effect of period (Model 4, Table S2). Across all analyses, the main effect of social threats remains positive and significant.

Additional analyses of contributions: group failure and effects thereof

Although not related to our central hypotheses, we conducted several post-hoc analyses on patterns of group failure for interested readers (tables available upon request). Group failure rates were slightly lower in the social threat condition, with a medium effect size (social condition, mean = 0.15 ± 0.07 SD; asocial condition: mean = 0.19 ± 0.09 SD; Cohen's d = 0.471). However, because this analysis is at the group level and necessarily has lower power, it was not significant with a t-test of the group-level means (t 38 = 1.489, p = 0.144) and should be treated with caution.

Did group failure affect participants’ future cooperation? To test this, we fitted models that added two variables to our main model: a lag variable indicating whether the group failed on the previous round, and the interaction between this variable and the social/asocial threat manipulation (Table S2, Model 5). Participants in the asocial threat condition tended to contribute a greater percentage of their endowment to the group when the group failed on a prior round (main effect of group failure: b = 7.17, p = 0.005); the interaction between group failure and the type of threat was not significant (b = −3.56, p = 0.304), suggesting that participants in the social threat condition responded similarly to those facing asocial threats.

Our data show that, when the group succeeded, low-ranking participants supplanted the high-ranking person somewhat less often in the social threat condition (i.e. 47% in the social threat condition and 51% in the asocial threat condition). To check whether this difference was statistically significant, we fit a multilevel logit model with random intercepts for group and individual, with whether the high-ranking person was supplanted as the dependent measure and the social/asocial threat condition as the independent measure; the effect of social threat was not significant (table available upon request).

Manipulation of group threats

Overall manipulation

Both high- and low-ranking participants chose to increase the threat level on average rather than lower it: the net manipulation (increases minus decreases) was an overall increase in threats by high-ranking participants in 20/20 rounds (binomial probability p = 0.000002) and by low-ranking participants in 19/20 rounds (binomial probability p = 0.00004).

Manipulation by low- and high-ranking participants

To examine the effects of rank and threat type, we present a multilevel model with percentage of endowment spent increasing the apparent threat regressed on rank, the social/asocial threat manipulation, the interaction of these two variables and controls for period (see Table 1, column 2). Because participants made their manipulation decisions before the threat level was announced, the threat level could not affect these decisions and is not included in the model.

Although we found no significant main effects of rank (b = −0.32, p = 0.432) or social threats (b = −0.78, p = 0.194), these findings were qualified by a marginally significant rank × social threat interaction, such that the effect of rank was greater in the social threat condition (b = 0.95, p = 0.056, Figure 4). We use linear combinations of coefficients to test the pairwise comparison of the effect of high vs. low rank in the social threats condition. With social threats, high-ranking participants spent 0.64% more of their endowments to increase the apparent threat level, compared with low-ranking participants (effect of rank in the social threat condition: b = −0.317 + 0.952 = 0.64, z = 2.18, p = 0.029). In contrast, with asocial threats, high-ranking participants spent a non-significantly different 0.31% less on increasing the threat level, compared with low-ranking participants (as shown by the main effect of rank). This finding was consistent across models using alternative estimation techniques, see Table S3 in the Supplementary Appendix.

Figure 4. Percentage of endowment spent on increasing the perceived threat level by low-ranking (white bars) and high-ranking participants (dark bars). Panels show (a) raw means (error bars omitted because raw standard errors are biased owing to clustering) and (b) predicted means with cluster-corrected standard errors (which are more conservative).

Cost-effectiveness of manipulation

As in previous work (Barclay & Benard, Reference Barclay and Benard2013), manipulation was cost-effective: the L$1.50 that high-ranking participants spent each round on manipulation (across both conditions) resulted in a 7.5% increase in apparent threats, which results in each low-ranking person contributing an additional (7.5 × 0.24) = 1.8% more of their L$50 endowment (i.e. L$0.90 each, L$1.80 total).

Additional analysis of manipulation: group failure

Although not related to our central hypotheses, the supplementary analyses show that participants in the asocial threat condition spend less to manipulate group threats when their group failed in the prior round, whereas prior group failure has no effect on participants in the social threat condition (Supplementary Table S2, Supplementary Figure S1).

Discussion

The results support our main prediction: cooperation is higher when threats are framed as competition with other groups (social threats) than as other types of threats (asocial threats). Participants were more responsive to changes in asocial threats: baseline cooperation was higher for social threats, and this difference diminished and became non-significant at the highest threat levels. Our results also replicate previous experiments showing that people tend to increase rather than decrease the appearance of group threats, especially when they possess high rank, and that they benefit from doing so (Barclay & Benard, Reference Barclay and Benard2013). The current results also show that, compared with low-ranking participants, high-ranking participants were likely to manipulate social threats rather than asocial threats, which matches the popular idea of leaders eliciting cooperation via the appearance of social threats like war or terrorism (e.g. Bekkers, Reference Bekkers1977; Cinrincione et al., Reference Cinrincione, Mathews, Perkovich and Orton2004; Lahti & Weinstein, Reference Lahti and Weinstein2005; Tisdale & Norton-Taylor Reference Tisdale and Norton-Taylor2010; Willer, Reference Willer2004) but not asocial threats like natural disasters or pandemics.

In this experiment, the social and asocial threats were identical except for the framing. Thus, our results cannot be explained as participants simply responding to incentives. This allows us to draw conclusions about the underlying psychology and how cooperative the participants were in response to between-group competition, compared with generic threats that do not involve other groups. Our results are suggestive of a psychology that readily reacts strongly to intergroup competition, and this reaction is due to the intergroup nature rather than the incentives or structural aspects of intergroup competition. Our experimental manipulation was relatively small: fewer than 6% of the words differed in the framing of the social and asocial threats. We would predict even bigger effects of threat type if they were real threats, especially if there were kin structure between the groups such that the other groups were negatively related to each actor (e.g. West & Gardner, Reference West and Gardner2010), or if one's group could garner a reputation that deterred competition from rival groups (Chagnon, Reference Chagnon1997; Johnstone & Bshary, Reference Johnstone and Bshary2004; Székely, Reference Székely2016).

Our results differ from a previous study that compared social vs. asocial threats (Jordan et al., Reference Jordan, Jordan and Rand2017). In that study, participants had to contribute enough money to surpass a given threshold to get a bonus. The threshold was determined either by intergroup competition with another group (i.e. only one group would get the bonus, ‘Competition Threshold’), by the contributions of a previous group whom the participants did not compete with (‘Social Threshold’), or without reference to another group (‘Non-Social Threshold’). Participants contributed more with a threshold than with no threshold, but the type of threshold (social or non-social) did not matter. We speculate that our results differ from their results because we include lower levels of threat, rather than the sharp (and known) threshold used by Jordan and colleagues. Participants in our experiment differentiated between social and asocial threats at low to moderate threat levels, but did not differentiate at high threat levels – dead is dead, and when the threat is very high the source may not matter. High threat levels involve near-certain failure (by definition), which may give people a sufficient incentive to cooperate regardless of the threat type – any additional gains or incentives from strong intergroup competition become superfluous compared with the incentive to avoid near-certain failure. Perhaps if Jordan and colleagues had included less threatening or less sharp thresholds, they may have also found an effect of intergroup competition (i.e. social threats) above and beyond the effects of a threshold alone.

Our results also differ slightly from our previous results. All three studies within Barclay and Benard (Reference Barclay and Benard2013) found that high-ranking participants manipulate threats more than do low-ranking participants, whereas the current study only found this for social (but not asocial) threats. We have no a priori explanation for this difference, but note that Barclay and Benard (Reference Barclay and Benard2013) used a neutral description of the game, rather than the business simulation framing employed in the present study. It is possible that the neutral framing of threats in Barclay and Benard (Reference Barclay and Benard2013) was implicitly interpreted as a threat of between-group conflict. If true, this would be another example of people over-interpreting (negative) events as being caused by agents, and is consistent with many human groups assuming that bad outcomes like disease and crop failure are caused by sorcery or witchcraft from hostile groups (e.g. Boyer, Reference Boyer2002; Chagnon, Reference Chagnon1997). Alternately, the difference might reflect differences between the USA (Barclay & Benard, Reference Barclay and Benard2013) and Canada (current study) in high-ranking people's willingness to manipulate threats.

We found that high- and low-ranking participants contributed similar percentages of their endowment. It is currently unclear how status, rank or power should relate to cooperation: some theoretical work suggests that high-ranking individuals will contribute more to public goods (Gavrilets & Fortunato, Reference Gavrilets and Fortunato2014), whereas other work suggests the opposite (Barclay, Reference Barclay2013, Reference Barclay2016; Reeve & Shen, Reference Reeve and Shen2006). Some empirical work suggests that people with high status or wealth are more cooperative (e.g. Diekmann, Reference Diekmann1993; Diekmann & Przepiorka, Reference Diekmann and Przepiorka2015; Nettle et al., Reference Nettle, Colléony and Cockerill2011), whereas other work suggests the opposite (e.g. Barclay & Benard, Reference Barclay and Benard2013; Buckley & Croson, Reference Buckley and Croson2006; Chan et al., Reference Chan, Godby, Mestelman and Muller1997, Reference Chan, Mestelman, Moir and Muller1999; Cherry et al., Reference Cherry, Kroll and Shogren2005; Guinote et al., Reference Guinote, Cotzia, Sandhu and Siwa2015; Piff et al., Reference Piff, Stancato, Côté, Mendoza-Denton and Keltner2012) or finds no effect (Rapoport & Suleiman, Reference Rapoport and Suleiman1993; see review by Kafashan et al., Reference Kafashan, Sparks, Griskevicius, Barclay, Cheng, Tracy and Anderson2014). The solution may depend on how different types of cooperation are affected by individual qualities (Barclay & Reeve, Reference Barclay and Reeve2012), or given that cooperation is risky, on how much different individuals stand to gain from cooperation and are able to buffer against the losses of unreciprocated helping (Barclay et al., Reference Barclay, Mishra and Sparks2018; Mishra et al., Reference Mishra, Barclay and Sparks2017). Future research is needed on the relationship between rank and cooperation.

Limitations and future directions

Our study only manipulated the framing of the public goods game, not the actual structure. As such, it lacked the kin structure, possibilities for gain, possibilities of a competitor getting stronger after they win and effects of deterrence that are usually present in intergroup competition. We manipulated the framing in order to examine the underlying psychology rather than how people responded to incentives, but it would be interesting to add some of this complexity back into the game. Future work could also test how the intensity of rivalry with the outgroup affects people's willingness to cooperate with the ingroup to overcome the outgroup threat.

Will our results generalize to other populations (e.g. small-scale non-industrial populations), to other social and asocial threats (e.g. different framings) or to other non-monetary currencies (e.g. investments of time, energy, risk of bodily harm and social status)? Laboratory tasks are abstract models of real-life situations, which capture some important aspects of real life (e.g. conflicting incentives to free-ride vs. protect the group vs. achieve high rank) while stripping away other aspects (e.g. face-to-face interactions, group identity, non-monetary currencies). Laboratory experiments can be helpful when real-life phenomena – such as whether leaders truly perceive an outgroup as a threat vs. a source of political advantage – are difficult or impossible to establish with certainty.

Questions of generalization are always an empirical question. In a classic paper, Mook (Reference Mook1983) argues that the goal of experiments is not to generalize a specific result but to test an underlying theory or principle: a theory predicts that some factor X will result in outcome Y, so we create an artificial model experiment with factor X to see whether we find outcome Y. If we do, it supports the theory; if not, then the theory must be revised or rejected (Mook, Reference Mook1983). So as the quote goes, ‘essentially, all models are wrong, but some models are useful’ (Box & Draper, Reference Box and Draper1987, p. 424). We argue that whenever the same incentives apply in non-laboratory situations in other societies with other currencies, then we should observe similar effects as were found in this study. The absolute levels of cooperation will undoubtedly differ (e.g. higher overall cooperation in groups with strong identity) and the effect size of social threats may differ too (e.g. stronger effect of social threats if the participants already despise the outgroup), but the general principle will hold. Ultimately though, this is an empirical question, and we look forward to future tests of how different circumstances and cultures affect threat-dependent cooperation and the effects of social vs. asocial threats.

Overall, our study shows that our participants were very sensitive to outgroup competition, more so than to an equivalently sized asocial threat. Furthermore, our results support previous work showing that humans and other animals cooperate more in the face of group threats (Radford, Reference Radford2011, reviewed by Benard & Doan, Reference Benard and Doan2011) and that high-ranking group members are correspondingly willing to manipulate others’ perceptions of those threats (Barclay & Benard, Reference Barclay and Benard2013). We look forward to future work on threat-dependent cooperation, especially mathematical models or computer simulations to identify which factors have the most impact on people's willingness to cooperate in the face of outgroups and to manipulate other's willingness to cooperate.

Supplementary material

To view supplementary material for this article, please visit https://doi.org/10.1017/ehs.2020.48

Acknowledgements

We thank Cameron Wilson for assistance running the experiments, Adam Sparks for useful discussions and two anonymous reviewers for feedback.

Author contributions

PB and SB conceived and designed the experiment, PB programmed the experiment and collected the data, SB performed statistical analyses, PB wrote first drafts of the manuscript and research grant, SB wrote second drafts.

Financial support

This material is based upon work supported by the National Science Foundation (NSF grant 0904312) in conjunction with the Minerva Initiative of the US Department of Defense. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or other sponsors.

Conflict of interest

The authors declare that they have no conflicts of interest.

Data access

The data and STATA code are available at: https://osf.io/dvy2j/

Ethics statement

This study was approved by the Research Ethics Board at the University of Guelph, under the Canadian Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans (TCPS2).

References

Aguinis, H., Gottfredson, R. K., & Joo, H. (2013). Best-practice recommendations for defining, identifying, and handling outliers. Organizational Research Methods, 16, 270301.CrossRefGoogle Scholar
Archetti, M. (2009). Cooperation as a volunteer's dilemma and the strategy of conflict in public goods games. Journal of Evolutionary Biology, 22, 21922200.CrossRefGoogle ScholarPubMed
Archetti, M., & Scheuring, I. (2011). Coexistence of cooperation and defection in public goods games. Evolution, 65, 11401148.10.1111/j.1558-5646.2010.01185.xCrossRefGoogle ScholarPubMed
Barclay, P. (2004). Trustworthiness and competitive altruism can also solve the ‘tragedy of the commons’. Evolution & Human Behavior, 25(4), 209220.10.1016/j.evolhumbehav.2004.04.002CrossRefGoogle Scholar
Barclay, P. (2013). Strategies for cooperation in biological markets, especially for humans. Evolution & Human Behavior, 34(3), 164175.CrossRefGoogle Scholar
Barclay, P. (2016). Biological markets and the effects of partner choice on cooperation and friendship. Current Opinion in Psychology, 7, 3338.10.1016/j.copsyc.2015.07.012CrossRefGoogle Scholar
Barclay, P., & Benard, S. (2013). Who cries wolf, and when: Manipulation of perceived threats to preserve rank in cooperative groups. PLOS ONE, 8(9), e73863. doi:10.1371/journal.pone.0073863.CrossRefGoogle ScholarPubMed
Barclay, P., Mishra, S., & Sparks, A. (2018). State-dependent risk-taking. Proceedings of the Royal Society of London B, 285, 20180180.Google ScholarPubMed
Barclay, P., & Reeve, H. K. (2012). The varying relationship between helping and individual quality. Behavioral Ecology, 23(4), 693698.10.1093/beheco/ars039CrossRefGoogle Scholar
Barclay, P., & Van Vugt, M. (2015). The evolutionary psychology of human prosociality: Adaptations, mistakes, and byproducts. In Schroeder, D. & Graziano, W. (Eds.), Oxford handbook of prosocial behavior (pp. 3760). Oxford University Press.Google Scholar
Bekkers, F. (1977). Threatened leadership and intergroup conflicts. Journal of Peace Research, 14, 223237.10.1177/002234337701400302CrossRefGoogle Scholar
Benard, S. & Doan, L. (2011). The conflict–cohesion hypothesis: past, present, and possible futures. Advances in Group Process, 28, 189224.10.1108/S0882-6145(2011)0000028010CrossRefGoogle Scholar
Bornstein, G. (2003). Intergroup conflict: Individual, group, and collective interests. Personality and Social Psychology Review, 7, 129145.CrossRefGoogle ScholarPubMed
Bowles, S. (2006). Group competition, reproductive leveling, and the evolution of human altruism. Science, 314, 15691572.10.1126/science.1134829CrossRefGoogle ScholarPubMed
Box, G. E., & Draper, N. R. (1987). Empirical model-building and response surfaces. Wiley.Google Scholar
Boyer, P. (2002). Religion explained: The evolutionary origins of religious thought. Basic Books.Google Scholar
Brewer, M. B. (2001). Ingroup identification and intergroup conflict: When does ingroup love become outgroup hate? In Ashmore, R. D., Jussim, L. & Wilder, D. (Eds.), Social identity, intergroup conflict, and conflict reduction (pp. 1741). Oxford University Press.Google Scholar
Buckley, E., & Croson, R. (2006). Income and wealth heterogeneity in the voluntary provision of linear public goods. Journal of Public Economics, 90, 935955.10.1016/j.jpubeco.2005.06.002CrossRefGoogle Scholar
Chagnon, N. A. (1997). Yanomamö (5th ed.). Wadsworth.Google Scholar
Chan, K. S., Godby, R., Mestelman, S., & Muller, R. A. (1997). Equity theory and the voluntary provision of public goods. Journal of Economic Behavior & Organization, 32, 349364.10.1016/S0167-2681(96)00025-XCrossRefGoogle Scholar
Chan, K. S., Mestelman, S., Moir, R., & Muller, R. A. (1999) Heterogeneity and the voluntary provision of public goods. Experimental Economics, 2, 530.CrossRefGoogle Scholar
Cherry, T. L., Kroll, S., & Shogren, J. F. (2005) The impact of endowment heterogeneity and origin on public good contributions: Evidence from the lab. Journal of Economic Behavior and Organization, 57, 357365.CrossRefGoogle Scholar
Cinrincione, J., Mathews, J. T., Perkovich, T., Orton, A. (2004). WMD in Iraq: Evidence and implications. Carnegie Endowment for International Peace.Google Scholar
Coser, L. A. (1956). The functions of social conflict. Free Press.Google Scholar
Diamond, J. (2005). Collapse: How societies choose to fail or succeed. Viking.Google Scholar
Diekmann, A. (1985). Volunteer's Dilemma. Journal of Conflict Resolution, 29, 605610.10.1177/0022002785029004003CrossRefGoogle Scholar
Diekmann, A. (1993) Cooperation in an asymmetric Volunteer's Dilemma game: Theory and experimental evidence. International Journal of Game Theory, 22, 7585.CrossRefGoogle Scholar
Diekmann, A. (1986). Volunteer’s Dilemma. A Social Trap without a Dominant Strategy and some Empirical Results. In Diekmann, A., & Mitter, P. (Eds.), Paradoxical Effects of Social Behavior: Essays in Honor of Anatol Rapoport (pp. 187197). Heidelberg: Physica-Verlag.CrossRefGoogle Scholar
Diekmann, A., & Przepiorka, W. (2015). ‘Take one for the team!’ Individual heterogeneity and the emergence of latent norms in a Volunteer's Dilemma. Social Forces, 94, 13091333.CrossRefGoogle Scholar
Dogan, G., Glowacki, L., & Rusch, H. (2017). Spoils division rules shape aggression between natural groups. Nature Human Behaviour, 2, 322326.10.1038/s41562-018-0338-zCrossRefGoogle Scholar
Eriksson, K., & Strimling, P. (2014). Spontaneous associations and label framing have similar effects in the public goods game. Judgment and Decision Making, 9(5), 360372.Google Scholar
Fischbacher, U. (2007). z-Tree: Zurich toolbox for ready-made economic experiments. Experimental Economics, 10, 171178.10.1007/s10683-006-9159-4CrossRefGoogle Scholar
Gardner, A., & West, S. A. (2004). Spite and the scale of competition. Journal of Evolutionary Biology, 17(6), 11951203. doi:10.1111/j.1420-9101.2004.00775.xCrossRefGoogle ScholarPubMed
Gavrilets, S. (2015). Collective action and the collaborative brain. Journal of the Royal Society Interface, 12, 20141067. http://dx.doi.org/10.1098/rsif.2014.1067CrossRefGoogle ScholarPubMed
Gavrilets, S., & Fortunato, L. (2014). A solution to the collective action problem in between-group conflict with within-group inequality. Nature Communications, 5, 3526. doi:10.1038/ncomms4526.CrossRefGoogle ScholarPubMed
Gould, R. V. (2003). Collision of wills: How ambiguity about social rank breeds conflict. University of Chicago Press.CrossRefGoogle Scholar
Guinote, A., Cotzia, I., Sandhu, S., & Siwa, P. (2015). Social status modulates prosocial behavior and egalitarianism in preschool children and adults. Proceedings of the National Academy of Sciences, USA, 112, 731736.CrossRefGoogle ScholarPubMed
Halevy, N., Bornstein, G., & Sagiv, L. (2008). ‘In-group love’ and ‘out-group hate’ as motives for interpersonal participation in intergroup conflict. Psychological Science, 19, 405411.10.1111/j.1467-9280.2008.02100.xCrossRefGoogle Scholar
Hardy, C., & Van Vugt, M. (2006). Giving for glory in social dilemmas: The competitive altruism hypothesis. Personality and Social Psychology Bulletin, 32, 14021413.CrossRefGoogle Scholar
Henrich, J., & Gil-White, F. J. (2001). Freely conferred deference as a mechanism for enhancing the benefits of cultural transmission. Evolution and Human Behavior, 22, 165196.10.1016/S1090-5138(00)00071-4CrossRefGoogle ScholarPubMed
Hertwig, R., & Ortmann, A. (2001). Experimental practices in economics: A methodological challenge for psychologists? Behavioral and Brain Sciences, 24, 383451.CrossRefGoogle ScholarPubMed
Johnstone, R. A., & Bshary, R. (2004). Evolution of spite through indirect reciprocity. Proceedings: Biological Sciences, 271, 19171922.Google ScholarPubMed
Jordan, M. R., Jordan, J. J., & Rand, D. G. (2017). No unique effect of intergroup competition on cooperation: Non-competitive thresholds are as effective as competitions between groups for increasing human cooperative behavior. Evolution and Human Behavior, 38, 102108.CrossRefGoogle Scholar
Kafashan, S., Sparks, A., Griskevicius, V., & Barclay, P. (2014). Prosocial behaviour and social status. In Cheng, J. T., Tracy, J. L., & Anderson, C. (Eds.), The Psychology of Social Status (pp. 139158). Springer.Google Scholar
Kioynari, T., Tanida, S., & Yamagishi, T. (2000). Social exchange and reciprocity: Confusion or a heuristic? Evolution and Human Behavior, 21, 411427.10.1016/S1090-5138(00)00055-6CrossRefGoogle Scholar
Kokko, H. (2007). Modelling for field biologists and other interesting people. Cambridge University Press.CrossRefGoogle Scholar
Kokko, H., Johnstone, R. A., & Clutton-Brock, T. H. (2001). The evolution of cooperative breeding through group augmentation. Proceedings of the Royal Society of London B, 268, 187196.10.1098/rspb.2000.1349CrossRefGoogle ScholarPubMed
Krupp, D. B., & Taylor, P. D. (2015). Social evolution in the shadow of asymmetrical relatedness. Proceedings: Biological Sciences, 282, 201501424. http://dx.doi.org/10.1098/rspb.2015.0142Google ScholarPubMed
Kümmerli, R., Burton-Chellew, M. N., Ross-Gillespie, A., & West, S. A. (2010). Resistance to extreme strategies, rather than prosocial preferences, can explain human cooperation in public goods games. Proceedings of the National Academy of Sciences of the United States of America, 107(22), 1012510130. doi:10.1073/pnas.1000829107CrossRefGoogle ScholarPubMed
Lahti, D. C., & Weinstein, B. S. (2005). The better angels of our nature: Group stability and the evolution of moral tension. Evolution and Human Behavior, 26, 4763.CrossRefGoogle Scholar
Liberman, V., Samuels, S. M., & Ross, L. (2004). The name of the game: Predictive power of reputations vs. situational labels in determining Prisoner's Dilemma game moves. Personality and Social Psychology Bulletin, 30(9), 11751185.CrossRefGoogle ScholarPubMed
Manson, J. H., & Wrangham, R. W. (1991). Intergrourp aggression in chimpanzees and humans. Current Anthropology, 32, 369390.10.1086/203974CrossRefGoogle Scholar
Messick, D. M., & McClintock, C. G. (1968). Motivational bases of choice in experimental games. Journal of Experimental Social Psychology, 4, 125.10.1016/0022-1031(68)90046-2CrossRefGoogle Scholar
Milinski, M., Semmann, D., & Krambeck, H.-J. (2002). Donors to charity gain in both indirect reciprocity and political reputation. Proceedings: Biological Sciences, 269, 881883.Google ScholarPubMed
Milinski, M., Sommerfeld, R. D., Krambeck, H.-J., Reed, F. A., & Marotzke, J. (2008). The collective-risk social dilemma and the prevention of simulated dangerous climate change. Proceedings of the National Academy of Sciences, USA, 105, 22912294.CrossRefGoogle ScholarPubMed
Mishra, S., Barclay, P., & Sparks, A. (2017). The relative state model: Integrating need-based and ability-based pathways to risk-taking. Personality and Social Psychological Review, 21(2), 176198. https://doi.org/10.1177/1088868316644094CrossRefGoogle ScholarPubMed
Mook, D. (1983). In defense of external invalidity. American Psychologist, 38, 379387.10.1037/0003-066X.38.4.379CrossRefGoogle Scholar
Munn, C. A. (1986) Birds that ‘cry wolf’. Nature, 319, 143145.CrossRefGoogle Scholar
Murnighan, J. K., Kim, J. W., & Metzger, A. R. (1993). The Volunteer Dilemma. Administrative Science Quarterly, 38, 515538.CrossRefGoogle Scholar
Myatt, D. P., & Wallace, C. (2008). An evolutionary analysis of the volunteer's dilemma. Games and Economic Behavior, 62, 6776.CrossRefGoogle Scholar
Nettle, D., Colléony, A., & Cockerill, M. (2011). Variation in cooperative behaviour within a single city. PLoS ONE, 6, e26922. doi:10.1371/journal.pone.0026922.CrossRefGoogle ScholarPubMed
Piff, P. K., Stancato, D. M., Côté, S., Mendoza-Denton, R., & Keltner, D. (2012). Higher social class predicts increased unethical behavior. Proceedings of the National Academy of Sciences, USA, 109, 40864091.10.1073/pnas.1118373109CrossRefGoogle ScholarPubMed
Puurtinen, M., & Mappes, T. (2009) Between-group competition and human cooperation. Proceedings of the Royal Society of London B, 276, 355360.Google ScholarPubMed
Rabe-Hesketh, S., & Skrondal, A. (2012). Multilevel and longitudinal modeling using Stata. College Station, TX: STATA press.Google Scholar
Radford, A. N. (2008). Duration and outcome of intergroup conflict influences intragroup affiliative behaviour. Proceedings of the Royal Society of London B, 275, 27872791.Google ScholarPubMed
Radford, A. N. (2011). Preparing for battle? Potential intergroup conflict promotes current intragroup affiliation. Biology Letters, 7, 2629.CrossRefGoogle ScholarPubMed
Rapoport, A., & Suleiman, R. (1993) Incremental contribution in step-level public goods games with asymmetric players. Organizational Behavior and Human Decision Processes, 55, 171194.CrossRefGoogle Scholar
Reeve, H. K., & Shen, S.-F. (2006). A missing model in reproductive skew theory – The bordered tug-of-war. Proceedings of the National Academy of Sciences, USA, 103(22), 84308434.10.1073/pnas.0603005103CrossRefGoogle ScholarPubMed
Roberts, G. (2005). Cooperation through interdependence. Animal Behaviour, 70, 901908.CrossRefGoogle Scholar
Sherif, M. (1966). In common predicament: Social psychology of intergroup conflict and cooperation. Houghton Mifflin.Google Scholar
Short, J. F. Jr, & Strodtbeck, F. L. (1963). The response of gang leaders to status threats: An observation on group process and delinquent behavior. American Journal of Sociology, 68, 571579.10.1086/223429CrossRefGoogle Scholar
Simmel, G. [1908](1955) Conflict. Free Press.Google Scholar
Székely, Á. (2016). Collective reputations suffer from the Tragedy of the Commons. Talk at the 3rd International Meeting on Experimental and Behavioral Social Sciences, Rome, April 2016.Google Scholar
Tisdale, S., & Norton-Taylor, R. (2010, October 7). Obama accused of exaggerating terror threat for personal gain. The Guardian. Retrieved from www.guardian.co.uk.Google Scholar
Todd, P. M. (2001). Fast and frugal heuristics for environmentally bounded minds. In Gigerenzer, G. & Selten, R. (Eds.), Bounded rationality: The adaptive toolbox (pp. 5170). MIT Press.Google Scholar
Van Vugt, M., Hogan, R., & Kaiser, R. B. (2008). Leadership, followership, and evolution: Some lessons from the past. American Psychologist, 63, 182196.10.1037/0003-066X.63.3.182CrossRefGoogle ScholarPubMed
Vasi, I. B., & Macy, M. (2003). The mobilizer's dilemma: Crisis, empowerment, and collective action. Social Forces, 81(3), 979998.10.1353/sof.2003.0047CrossRefGoogle Scholar
West, S. A., & Gardner, A. (2010). Altruism, spite, and greenbeards. Science, 327(5971), 13411344. doi:10.1126/science.1178332CrossRefGoogle ScholarPubMed
Willer, R. (2004). The effects of government-issued terror warnings on presidential approval ratings. Current Research in Social Psychology, 10(1), 112.Google Scholar
Willer, R. (2009). Groups reward individual sacrifice: The status solution to the collective action problem. American Sociological Review, 74, 2343.CrossRefGoogle Scholar
Figure 0

Figure 1. Flowchart of each of the 20 rounds of the study from the perspective of participants. Participants’ decisions are in bold. Threats were framed as the risk of a firm going bankrupt either due to not having enough money to continue operations (asocial threats) or from being outcompeted by other firms (social threats). Figure reused under Creative Commons Attribution (CC BY) license from Barclay and Benard (2013).

Figure 1

Figure 2. Percentage of endowment contributed to the group fund by high- and low-ranking participants with asocial threats (white bars) vs. social threats (dark bars). Panels show (a) raw means (error bars omitted because raw standard errors are biased due to clustering) and (b) predicted means with cluster-corrected standard errors (which are more conservative).

Figure 2

Table 1. Multilevel model for the effects (and robust standard errors) of a one unit change (i.e. b-values) in rank, social threats, perceived threat and time period on percentage of endowment spent on contribution and manipulation of perceived threats

Figure 3

Figure 3. Percentage of endowment contributed to the group fund at different perceived threat levels, for asocial threats (dotted line) and social threats (solid line). Panels show (a) raw means, (error bars omitted because raw standard errors are biased due to clustering) and (b) predicted means with cluster-corrected standard errors.

Figure 4

Figure 4. Percentage of endowment spent on increasing the perceived threat level by low-ranking (white bars) and high-ranking participants (dark bars). Panels show (a) raw means (error bars omitted because raw standard errors are biased owing to clustering) and (b) predicted means with cluster-corrected standard errors (which are more conservative).

Supplementary material: File

Barclay and Benard supplementary material

Barclay and Benard supplementary material

Download Barclay and Benard supplementary material(File)
File 123.8 KB