Bobo Hypothesis

990 Words2 Pages

In the article, “Bonobos Protect and Console Friends and Kin” shows how Bonobos can assist each other and why they tend to show reciprocal help of one another, especially when two or more Bonobos work together to face a problem when solving tasks. The study explores the main possible functions of how bonobos help each other and solve conflicts with some of the Authors’ techniques — which correspond to four hypotheses along with predictions that can be derived from them. The four hypotheses are The Self-Protection Hypothesis, Victim-Protection Hypothesis, Relationship-Repair Hypothesis or Substitute for Reconciliation Hypothesis, and Relationship-Repair Hypothesis and are very essential to the methods used to the conducted study done to determine …show more content…

The data was gathered on various locations such as Apenheul Primate Park, Apeldoorn, and The Netherlands. The bonobos were housed in an enclosure with both an indoor and outdoor facility and were given the privilege to move freely from the indoor to the outdoor enclosure after the first feeding session. Water was available and environmental enrichments were provided in the form of fresh branches, rice, and nuts scattered on the grass to encourage foraging activity, and renewal of the equipment in the indoor facility, which shows the bonobos didn’t have to go through any difficult testing. The researchers tested for three relationship quality categories: Non-kin weak; Non-kin strong; and Kin.
The author and their research team investigated what factors can affect the causation of both spontaneous kinship third party affiliation (engaged and started by the bystander) and solicited third party affiliation (started by the victim). The author considered certain factors related Bonobos features (such as: sex, rank, age) of victim and bystander to achieve unbiased data, their relationship quality (affiliation for kinship), and the effect that a third-party affiliation could have on the Bonobo victim (such as protection against attacks and other harmful

Open Document