Skip to main content

Bounded Rationality

  • Chapter
  • First Online:
Cyber-Security in Critical Infrastructures

Abstract

This chapter revisits the concept of a utility function, first introduced in Chap. 3, from an axiomatic viewpoint. We review the fundamental principles of decision making as axioms that induce the existence of (continuous) utility functions. Since empirical research of decision situations in real life has shown considerable deviations between mathematical rationality and human behavior, we continue with a series of possible explanations by relaxing or dropping individual axioms from the set of fundamental principles, to explain the difference between human behavior and the utility maximization paradigm. This establishes valuable lessons for the construction of games, say if payoff models are constructed from subjective data (interviews, expert estimates, or similar), but also highlights the need to consider individual risk perception and attitude though the utility function design in a game theoretic model.

No rational argument will have a rational effect on a man who does not want to adopt a rational attitude.

K. Popper

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    “[…] only some models are useful”; a quote that in different formulations is mostly attributed to the statistician George Box.

References

  1. Allais M (1953) Le comportement de l’homme rationnel devant le risque: critique des postulats et axiomes de l’ecole americaine. Econometrica 21(4):503. https://doi.org/10.2307/1907921

    Article  MathSciNet  MATH  Google Scholar 

  2. Bell DE (1982) Regret in decision making under uncertainty. Oper Res 30(5):961–981. https://doi.org/10.1287/opre.30.5.961

    Article  MATH  Google Scholar 

  3. Busby J, Duckett D (2012) Social risk amplification as an attribution: the case of zoonotic disease outbreaks. J Risk Res 15(9):1049–1074. https://doi.org/10.1080/13669877.2012.670130

    Article  Google Scholar 

  4. Busby JS, Onggo B, Liu Y (2016) Agent-based computational modelling of social risk responses. Eur J Oper Res 251(3):1029–1042 https://doi.org/10.1016/j.ejor.2015.12.034

    Article  MATH  Google Scholar 

  5. Camerer CF (2011) Behavioral game theory: experiments in strategic interaction. The roundtable series in behavioral economics. Princeton University Press, s.l. http://gbv.eblib.com/patron/FullRecord.aspx?p=765287

  6. Colman AM (2009) A dictionary of psychology, 3rd edn. Oxford paperback reference. Oxford University Press, Oxford

    Google Scholar 

  7. Diecidue E, Wakker PP (2001) On the intuition of rank-dependent utility. J Risk Uncertain 23(3):281–298. https://doi.org/10.1023/A:1011877808366

    Article  MATH  Google Scholar 

  8. Fishburn PC (1982) Nontransitive measurable utility.s J Math Psychol 26(1):31–67. https://doi.org/10.1016/0022-2496(82)90034-7

    Article  MathSciNet  MATH  Google Scholar 

  9. Gigerenzer G, Selten R (eds) (2002) Bounded rationality: the adaptive toolbox, 1st mit press pbk. edn. MIT Press, Cambridge, MA

    Google Scholar 

  10. Gonzalez R, Wu G (1999) On the shape of the probability weighting function. Cogn Psychol 38(1):129–166. https://doi.org/10.1006/cogp.1998.0710

    Article  Google Scholar 

  11. Humphrey SJ (1995) Regret aversion or event-splitting effects? more evidence under risk and uncertainty. J Risk Uncertain 11(3):263–274. https://doi.org/10.1007/BF01207789

    Article  Google Scholar 

  12. Iyengar SS, Lepper MR (2000) When choice is demotivating: can one desire too much of a good thing? J Pers Soc Psychol 79(6):995–1006. https://doi.org/10.1037//0022-3514.79.6.995

    Article  Google Scholar 

  13. Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263. https://doi.org/10.2307/1914185

    Article  MathSciNet  MATH  Google Scholar 

  14. Loomes G, Sugden R (1982) Regret theory: an alternative theory of rational choice under uncertainty. Econ J 92(368):805. https://doi.org/10.2307/2232669

    Article  Google Scholar 

  15. Prelec D (1998) The probability weighting function. Econometrica 66(3):497. https://doi.org/10.2307/2998573

    Article  MathSciNet  MATH  Google Scholar 

  16. Quiggin J (1982) A theory of anticipated utility. J Econ Behav Organ 3(4):323–343. https://doi.org/10.1016/0167-2681(82)90008-7

    Article  Google Scholar 

  17. Robert CP (2001) The Bayesian choice. Springer, New York

    Google Scholar 

  18. Rubinstein A (2002) Modeling bounded rationality, vol 3. Print edn. Zeuthen lecture book series. MIT Press, Cambridge, MA

    Google Scholar 

  19. Sanjab A, Saad W, Başar T (2017) Prospect theory for enhanced cyber-physical security of drone delivery systems: a network interdiction game. In: 2017 IEEE international conference on communications (ICC), pp 1–6. https://doi.org/10.1109/ICC.2017.7996862

  20. Simon HA (1997) Models of bounded rationality. MIT Press, Cambridge, MA

    Book  Google Scholar 

  21. Starmer C (2000) Developments in non-expected utility theory: the hunt for a descriptive theory of choice under risk. J Econ Lit 38(2):332–382. http://www.jstor.org/stable/2565292

    Article  Google Scholar 

  22. Starmer C, Sugden R (1993) Testing for juxtaposition and event-splitting effects. J Risk Uncertain 6(3):235–254. https://doi.org/10.1007/BF01072613

    Article  Google Scholar 

  23. Tversky A, Kahneman D (1985) The framing of decisions and the psychology of choice. In: Covello VT, Mumpower JL, Stallen PJM, Uppuluri VRR (eds) Environmental impact assessment, technology assessment, and risk analysis, NATO ASI series, series G. Springer, Berlin/Heidelberg, pp 107–129 . https://doi.org/10.1007/978-3-642-70634-9_6

    Chapter  Google Scholar 

  24. Tversky A, Kahneman D (1989) Rational choice and the framing of decisions. In: Karpak B, Zionts S (eds) Multiple criteria decision making and risk analysis using microcomputers, NATO ASI series, series F. Springer, Berlin/Heidelberg, pp 81–126. https://doi.org/10.1007/978-3-642-74919-3_4

    Chapter  Google Scholar 

  25. Tversky A, Kahneman D (1992) Advances in prospect theory: cumulative representation of uncertainty. J Risk Uncertain 5(4):297–323. https://doi.org/10.1007/BF00122574

    Article  MATH  Google Scholar 

  26. Wang Q, Karlström A, Sundberg M (2014) Scheduling choices under rank dependent utility maximization. Proc Soc Behav Sci 111:301–310. https://doi.org/10.1016/j.sbspro.2014.01.063

    Article  Google Scholar 

  27. Yaari ME (1987) The dual theory of choice under risk. Econometrica 55(1):95. https://doi.org/10.2307/1911158

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rass, S., Schauer, S., König, S., Zhu, Q. (2020). Bounded Rationality. In: Cyber-Security in Critical Infrastructures. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-46908-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-46908-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-46907-8

  • Online ISBN: 978-3-030-46908-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics