Social domain examples: Beginner’s Guide to Social Domain Theory – Clare Conry-Murray, Ph.D.

Опубликовано: July 31, 2023 в 10:29 am

Автор:

Категории: Miscellaneous

Beginner’s Guide to Social Domain Theory – Clare Conry-Murray, Ph.D.

Morality has to do with how people should  interact with each other.  Moral development research aims to understand how people develop from infancy into adulthood in the way they think about and interact with others.  Since morality involves issues of right and wrong, it is proscriptive or prohibitive–that is, morality is about the ways we should or should not act.   But not all issues of right and wrong are moral.  For example, a mistake in long division may be wrong but it is not usually seen as immoral.  So we also add that moral development research examines issues of right and wrong in social settings, where actions affect other people. 

What is morality to most people?

Social domain theory uses a definition of morality that comes from philosophy, but we also find that most people use the same definition. The basis of morality is in trying not to harm other people. Harm includes many facets–including issues of welfare, justice and rights.   Social Domain Theory research finds that people consider things to be moral that have to do with avoiding harm to people (welfare), being fair (justice), and respecting each other’s rights (rights).  The core of morality is avoiding harm, but that also means trying not to treat people unfairly and respecting their rights (Turiel, 1983).

A basic respect for other people means that, most of the time, we all try not to hurt each other.  We can safely walk down the street without anyone purposefully trying to crash their car into us, even if it would get them where they’re going faster.  This is because people also usually do not like to cause others pain.  People are also generally willing to be helpful (especially when it is not difficult).  For example, when a man at a subway station in London fell into the gap between the platform and the train, people didn’t expect the conductor to just let his leg get ripped off.  Instead they all worked together to push the train a few inches away from the platform so he could get out.  

Not causing serious harm to others as they go about their day may seem like a very small thing to ask of others. We start to understand morality by looking at the obvious cases where there is a lot of agreement, like “don’t run people over” because it is actually notable that people generally try not to harm others.  

In addition, people usually only see actions as moral if they are intentional.  Harming someone accidentally (and without negligence) is not usually seen as immoral.   

Are there social rules about right and wrong that are not moral?

Yes. Not all social rules relate to the concepts of rights, justice and welfare. Some social rules like “don’t use swear words” or “only girls wear dresses” were not made to avoid hurting people or out of a concern with fairness or rights. These examples are not even rules in some places.  For example, not only girls wear dresses– think of a Catholic priest who wears a long gown called vestments during mass or a man graduating from college who wears a cap and gown. The rule about “dresses” doesn’t apply to those situations, but it does apply to other situations.  Rules like these that vary depending on the setting are called conventions. Sometimes they have a purpose (e.g. to make boys and girls look distinct) and sometimes they’re just something we do out of habit or convenience (e.g. eat pasta with a fork but pizza with your hands).  Sometimes the purpose of a conventional rule is important (e.g. we all drive on the right in the United States so there’s not chaos), but conventions can be changed.  For example, some countries drive on the right and some on the left.  Either way is fine as long as everybody follows the rule. 

If you don’t follow conventional rules, there can still be consequences, but they depend on the situation.  People might look at you funny if you dress unconventionally or you could even get in trouble and be punished for using swear words in some settings.  My son who liked to watch Minecraft videos when he was young learned the phrase “what the f*ck,”  without knowing that the f-word is a bad word.   When he said it on the playground at school, he got in trouble, even though behind his back, all the adults thought it was pretty funny. The adults weren’t worried about him hurting anyone by talking that way, but they still made sure he didn’t use that phrase again because it’s against the rules. So there are consequences to conventional rule violations, but they depend on the setting– they are not intrinsic to the action they way harm is.  For example, I’m guessing my son (who is now 15) uses the f-word around his friends sometimes, and I’m pretty sure there are no negative consequences from his friends for that language.  When there are consequences to conventional rule violations, they change with the context (conventions at school differ from conventions with friends).

Are moral rules and conventional rules different?

Yes.  The consequences are different for moral and conventional rule violations.  All of the consequences to conventional violations are constructed by people, and so the people can change the consequences.   The teacher who told my son not to swear enforced the rule about no swearing at school, but some families may let their kids swear. The rules about when men can wear a dress already do differ in different situations.  

But if you run over someone with your car on purpose, most people would say it was wrong regardless of the law in that place. In fact most people would say even if the law allowed it, it would still be wrong to run someone over for no good reason. That’s because the consequence to that person is so harmful.  And that harm occurs every time someone is run over.  We call that kind of consequence intrinsic to the act.  It happens every time. It is part of the definition of the action.  Moral violations all have intrinsic consequences related to harm or unfairness or a violation of basic human rights.  

You can think of examples of other basic moral violations– pushing someone off a swing, paying one person for their work but not paying another person for the same work.   These are intrinsically harmful or unfair.

In Social Domain Theory research, we used what we call Criterion Judgments to see if people distinguish moral from conventional issues in different realms. 

What are Criterion Judgments?

Criterion judgments are based on criteria that are used to judge social rule violations.  If people notice that moral but not conventional rules are based on intrinsic consequences, then they will think about moral rules differently.  The criteria tell us where we expect to see differences between moral and conventional reasoning.  If consequences are intrinsic to the act of harming others, then they would not depend on the situation or anything local about the situation.  People judge moral violations differently than conventional rule violations in several ways, including:

  • Justifications–People use different justifications when they explain their judgments about different types of rules: Moral justifications refer to welfare, justice or rights, while conventional justifications refer to tradition or authorities.  
  • Rule Contingency— People judge changes to rules differently depending on the domain: Moral rules always have consequences to welfare, justice or rights because the consequences are intrinsic and so changing the rules does not change the consequences. Therefore, moral rules tend to be judged wrong even when the rule is changed.  Conventional rules depend on the context, and if the rule is changed, there may not be a consequence anymore, so conventional violations may not be wrong in the absence of a rule.  We call this Rule Contingency.  
    • Example: Moral: If you ask kids whether they can hit others when the teacher says hitting is OK in their classroom, kids still say hitting is not OK. Evaluations of hitting do not depend on the rule.

Conventional: When you ask if they can wear PJs to school when the teacher says it is OK in their classroom, kids say wearing PJ is now OK.  Evaluations of appropriate clothing do depend on the rule.   

  • Generalizability–People will judge rules differently depending on changes to the setting.  Moral rules still have the same consequences no matter where the violation occurs.  Therefore moral rules are considered generalizable. Conventional rules can have different consequences in different settings–they are not generalizable. 
    • Example: Moral: If you ask kids whether they can shove others in another country where everyone shoves people, kids still say shoving others  is not OK.  Evaluations of shaving do not depend on the context.

Conventional: When you ask if eating with your hands is OK in a country where that’s how they do it, kids say wearing eating with your hands is now OK. Evaluations of how to eat depend on the context.

What is similar about moral and conventional rules?

  • Both moral and conventional rules affect social relationships and they tell people how to behave.   
  • People who break both moral and conventional rules can be punished.  
  • Both moral and conventional violations can both be more or less serious.  Moral violations tend to be more serious but not always.  For example, in some places, gender norms are strictly enforced and so would be seen as a serious violation.  

What about things not covered by moral and conventional rules?

Issues that are not covered by either moral or conventional rules and are left to the person to decide for themselves are called Personal (Nucci, 2001).  These are interesting because what is personal can differ in different cultures (Conry-Murray, Kim & Turiel, 2020), and even between teenagers and their parents.  Parents tend to think issues like whether a 17 year old should get a tattoo is  conventional, while the teenerager often thinks it should be a personal decision and they should be able to decide for themselves (Smetana & Rote, 2019).

Prudential issues have to do with harm to the self.

Why do people do immoral things if we all agree that harming others is unacceptable?

Social domain theory researchers have identified several ways that people come to different conclusions about social issues.

Multifaceted issues.  Sometimes issues are complicated and include multiple different conflicting priorities–including different moral priorities that could be in conflict.  For example, with gun control there are issues related to the rights of the gun owner, and perhaps the right to protect oneself, and the rights of those who could be hurt by the gun.  People may see all of these as moral issues involving rights or welfare but some may prioritize the rights of the gun owner over the welfare of potential victims, while others could prioritize the reverse. 

Other issues may include moral and conventional issues in conflict.  For example, a parent may forbid a son from going to a sewing club (Perko, et al, 2020) because they are concerned about following gender norms (conventional), but the son may be thinking about his right to make his own choices (moral). Moral issues are not automatically judged to be the priority.  

In addition, some issues may be seen as conventional to some and personal to others– like the parent-teenager conflict over tattoos described above.

Informational assumptions. Informational assumptions are understandings about the way the world works that impacts the issue (Wainryb, 1991). Sometimes facts (or beliefs about what is true) help people weigh the importance of different issues.  For example, using the issue of gun control from above, if you believe that gun deaths are very, very uncommon, it might affect whether you are concerned about potential victims compared to if you believe gun deaths are more frequent.  

Informational assumptions also impact whether you believe harm is involved at all.  For example, if a parent spanks a child to teach them not to run into the street, and it effectively teaches the child an important lesson, most people would say the spanking was acceptable.   But if spanking doesn’t work to teach the child a lesson, then it is just abuse, and it is usually judged to be not OK if that informational assumption is believed to be true.  

Second order effects.  Sometimes culture-specific rituals have meaning that can affect others.  It can be a sign of disrespect to wear jeans and a t-shirt to a wedding, and that disrespect can cause people psychological harm. The harm is not intrinsic in the same way that being punched in the gut is, but it is still causing harm.  The harm comes about because of the meaning of the convention. 

Do researchers studying morality judge others’ virtue?

Social domain theory (and most morality researchers) do not suggest that one view of a controversial issue is better or worse than another.  Instead we try to describe how people think about issues and behave in moral or social situations.  We try to find patterns in people’s thinking and behavior that will help us describe common types of moral thinking and behavior, and perhaps even predict future thinking and behavior.   But we do not tell people what the most moral thing to do is.

Like this:

Like Loading…

Social Determinants of Health – Healthy People 2030

What are social determinants of health?

Social determinants of health (SDOH) are the conditions in the environments where people are born, live, learn, work, play, worship, and age that affect a wide range of health, functioning, and quality-of-life outcomes and risks.

SDOH can be grouped into 5 domains:

Image

Download SDOH graphic
(141.23 KB)

Healthy People 2030, U.S. Department of Health and Human Services, Office of Disease Prevention and Health Promotion. Retrieved [date graphic was accessed], from https://health.gov/healthypeople/objectives-and-data/social-determinants-health

Social determinants of health (SDOH) have a major impact on people’s health, well-being, and quality of life. Examples of SDOH include:

  • Safe housing, transportation, and neighborhoods
  • Racism, discrimination, and violence
  • Education, job opportunities, and income
  • Access to nutritious foods and physical activity opportunities
  • Polluted air and water
  • Language and literacy skills

SDOH also contribute to wide health disparities and inequities. For example, people who don’t have access to grocery stores with healthy foods are less likely to have good nutrition. That raises their risk of health conditions like heart disease, diabetes, and obesity — and even lowers life expectancy relative to people who do have access to healthy foods.

Just promoting healthy choices won’t eliminate these and other health disparities. Instead, public health organizations and their partners in sectors like education, transportation, and housing need to take action to improve the conditions in people’s environments. 

That’s why Healthy People 2030 has an increased and overarching focus on SDOH.

How Does Healthy People 2030 Address SDOH?

One of Healthy People 2030’s 5 overarching goals is specifically related to SDOH: “Create social, physical, and economic environments that promote attaining the full potential for health and well-being for all.

In line with this goal, Healthy People 2030 features many objectives related to SDOH. These objectives highlight the importance of “upstream” factors — usually unrelated to health care delivery — in improving health and reducing health disparities.

More than a dozen workgroups made up of subject matter experts with different backgrounds and areas of expertise developed these objectives. One of these groups, the Social Determinants of Health Workgroup, focuses solely on SDOH.

Explore Research Related to SDOH

Social determinants of health affect nearly everyone in one way or another. Our literature summaries provide a snapshot of the latest research related to specific SDOH.

Read SDOH literature summaries

View SDOH Infographics

Each SDOH infographic represents a single example from each of the 5 domains of the social determinants of health. You can download them, print them, and share them with your networks.

Check out SDOH infographics

Lookalike domains and protection against them

Our colleagues have already talked in sufficient detail about how cybercriminals attack companies through compromised email addresses of employees, as well as how to protect against such attacks using SPF, DKIM and DMARC technologies. But despite the obvious advantages of the described solutions, there is a method that can bypass them, and we want to talk about it.

But let’s start from afar: how relevant is email today? After all, this year we saw a sharp rise in the popularity of video conferencing software, and in the few years before that, the same growth in the popularity of instant messengers, in particular WhatsApp and Telegram. However, email is still the main means of communication on the Internet, at least in a business environment. Indirect confirmation of this is the increase in the number and quality of attacks aimed at compromising corporate mail (Business E-mail Compromise, BEC). According to the American Cybercrime Complaint Center (IC3), the financial damage from these incidents has increased sevenfold over the past five years.

Financial damage from BEC attacks, 2015–2019 (download)

The data for 2020 has not yet been processed, but given the COVID-19 pandemic and the mass transfer of employees to remote work, it can be safely assumed that the number of BEC attacks has only grown. The same is true of early studies of the threat landscape.

The use of similar domains in BEC

One of the features of BEC attacks is the emphasis not on the technical component (in the case of mail, the capabilities of cybercriminals are rather limited), but on social engineering. As a rule, technical and social methods are combined for greater efficiency.

The lion’s share of combinations of SPF, DKIM and DMARC technologies cope more or less effectively. But there is an exception – an attack using similar domains (lookalike domain). The essence of the method is simple: a cybercriminal registers a domain that looks very similar to the domain of the attacked company or its counterparty. Letters sent from it pass domain authentication without any problems (they deceive SPF), are provided with a cryptographic signature (they skip DKIM), and in general do not arouse suspicion from security systems. One problem: these are phishing emails. And if they are written plausibly enough, according to the corporate template, with an emphasis on the urgency of the issue, etc. , then the victim will most likely not notice the catch.

Here are some examples of fake domain names:

Original domain Fake domain
netflix.com netffix.com
kaspersky.com kapersky.com
uralairlines.ru uralairilnes.ru

As you can see, the fake differs from the original in just one letter, which is added (or removed) in such a way that the substitution could not be detected at a cursory glance.

To get a general idea of ​​the use of lookalike domains, we collected statistics on campaigns using lookalike fakes for the third quarter of 2020. After analyzing the data, we came to the conclusion that the pandemic has significantly changed the vector of thinking of attackers. If the financial sector was the main target before it, now the service sector has come to the fore, which includes various e-commerce services: grocery delivery, online shopping, buying air tickets, etc. In the third quarter, domains in this sector accounted for 34, 7% of the total number of campaigns.

Distribution of detected lookalike domains by category, Q3 2020 (download)

then in the third quarter – already 22.2%. This is quite expected, since the massive transition to online should have affected the overall situation.

A little bit about the lookalike approach

Unlike spam mailings, mass and long-term, attacks using lookalike domains, like any BEC attack, are designed for a specific victim (or range of victims). Consequently, emails are few and well thought out, and domains have a very short lifespan. We see that half of the fake domains are used once, and in 73% of cases the address is active within one day.

This leads to the fact that classic anti-spam solutions based on the signature approach (they saw an attack – made a rule) do not cope, and there is a need for proactive protection methods. There are two common and at the same time simple methods that are often chosen by companies concerned with protection against lookalike attacks and the like.

The first one is self-registration of domains with typos and subsequent setting of a redirect to the official domain. This reduces the chances of cybercriminals to register a plausible forgery, but, firstly, it does not completely eliminate the threat, and secondly, it does not prevent the domains of partners, contractors and other organizations with which the company is in correspondence from being forged.

The second is the compilation of lists of plausible fake names for both the company domain and partner and counterparty domains. They are loaded into an anti-spam solution in order to preventively block all correspondence coming from fakes. The main disadvantage of this method is still the same: the inability to provide for all options for fake domains, especially if the company works with many organizations. Plus, the human factor: one typo in the list for tens and hundreds of domain names will lead to a security breach, and in the worst case, to blocking letters from a legitimate domain instead of a fake one and an additional headache for business units.

In general, when our customers were no longer satisfied with standard solutions, they came to us for complex, but more effective solutions. In this regard, we have developed a method that does not require user intervention. In short, it automatically compiles a global list of legitimate addresses that, in theory, can be faked, and on its basis analyzes and blocks emails from lookalike domains. In fact, it works ahead of the curve.

Principle of operation

The method of protection against lookalike attacks consists of three main elements: calculations on the client, domain reputation checks in KSN (Kaspersky Secutiy Network) and calculations on the infrastructure. These stages, in turn, are divided into subtasks – the general principle is shown in the diagram:

In practice, everything looks like this. When a letter is received, the sender’s domain gets into KSN, where it is compared with the list of lookalike domains already known to us. If the address is found, the letter is instantly blocked (steps 1 to 3). If nothing is known about the sender’s domain, then the message is quarantined for a short period (step 4). During this time, the technology checks the address according to a given algorithm, and if it is found to be fake, it adds it to the list of lookalike domains in KSN. After the message is released from quarantine, it is re-scanned (step 9) and is blocked because by this time the list of lookalike domains has already been updated.

Let’s consider how the sender check works and how the list of lookalike domains is replenished. Information about sending mail to quarantine enters the KSN database along with additional metadata, including the sender’s domain (step 5). At the first stage of analysis, domains are checked for a wide range of characteristics, such as WHOIS data, DNS records, certificates, etc. This stage is necessary in order to immediately weed out clearly legitimate hosts that are still unknown to our system. In the future, messages from such domains will not be re-quarantined, since information about them will already be contained in KSN.

At the second stage, the system checks the similarity of suspicious hosts and addresses from our global list of legitimate domains (step 7), which includes the domains of our clients and their counterparties. It is generated automatically based on an assessment of the frequency of sending legitimate emails from the domain and the uniformity of the flow of emails among users. The extent to which the picture we received corresponds to the behavior of employees in terms of business correspondence determines the reputation of the domain (step 6). If the scam domain is very similar to a legitimate address, it is also included in the list of lookalike domains and all correspondence sent from it is blocked.

The approach we have developed is more complicated than a simple registration of similar domains to a company, and allows you to block attacks from lookalike domains in real time when they first appear. The human factor is also excluded – the global list of legitimate domains is kept up to date thanks to automatic updates.

Domain Name Generator | Get a domain for your site

Get It Now →

Clear all IconClear all Icon

I’m a paragraph. Click here to add your own text and edit me. It’s easy.

This domain is taken. Choose one of the great options below.

Get It Now →

Get It Now →

amazingdomain.org

from $17.95/year

| RECOMMENDED

Anchor 1

What is a domain and why is it important?

A domain name is the online address of a website. The right domain name helps visitors find you online, builds brand trust, and makes your website look professional. Find the right domain for your business and grow your website.

What are the benefits of a Wix domain?

One-stop solution

Wix is ​​a complete solution for creating and growing your business online. Get a free domain name and use the built-in Wix integrations. An annual premium plan subscription includes a free domain voucher for a year.

Domain Security Icon

Domain Security

Wix provides the option of private domain registration. So your data remains protected and you will not receive spam.

Supprt Icon

24/7 Support

The Wix Customer Support team is always there. The support center contains helpful articles, tutorial videos, and you can ask a question directly to our team in the chat.

EWeb Hostong Icon

Free hosting

When you create a site on Wix, you automatically get free hosting, which runs on reliable cloud servers.

Professional looking website

Choosing the right domain name is an important step in building a brand identity online.

Website development

Choose from a pre-made template, start from scratch or let Wix ADI make the website for you. Use hundreds of professional tools to create, manage and grow your business online.

Get a corporate email address

Once you have your own domain, we recommend creating a corporate email address, such as info@mystunningwebsite. com.

Google Search

Follow Wix’s personal step-by-step SEO plan to improve search engine rankings. You get fast Google indexing, a built-in toolset, and advanced SEO features to drive organic traffic.

Domain Selection

Make it easier for customers to find your site with a memorable domain. Wix makes it easy to find available options and register a site. When you subscribe to the annual premium plan, you get a voucher for a free domain for a year.

Domain name lookup

Free hosting

Web hosting is required to show the site to other Internet users. Wix offers secure, free hosting that automatically configures and connects to your site when you publish it.

More details

Create a beautiful logo

Create a beautiful logo with Wix Logo Maker. Answer a few questions and choose one of the options offered by the system. The logo can be edited, and upon purchase, you get all commercial use rights in accordance with the Wix Logo Maker Terms and Conditions.

FAQ

1.

What is a domain name?

A domain name is an online address for a website that helps people find you online. For example, in the URL https://www.wix.com/ “wix.com” is the domain name.

2.

Why buy a domain name?

A domain name is your online identity, it helps you find you online and gives a finished, professional look to your site. Any brand should have a unique and memorable domain name. Learn more about selection and registration of the domain that suits you.

3.

Where can I buy a domain name?

It is important to buy a web domain name from a certified registrar that manages Internet domains. Wix is ​​a GDPR compliant platform and Wix sites have SSL/TLS certificates to allow visitors to send information securely over HTTPS. As a certified registrar, Wix provides reliable web hosting services and the highest level of domain security and protection.