Abstract
This chapter revisits the concept of a utility function, first introduced in Chap. 3, from an axiomatic viewpoint. We review the fundamental principles of decision making as axioms that induce the existence of (continuous) utility functions. Since empirical research of decision situations in real life has shown considerable deviations between mathematical rationality and human behavior, we continue with a series of possible explanations by relaxing or dropping individual axioms from the set of fundamental principles, to explain the difference between human behavior and the utility maximization paradigm. This establishes valuable lessons for the construction of games, say if payoff models are constructed from subjective data (interviews, expert estimates, or similar), but also highlights the need to consider individual risk perception and attitude though the utility function design in a game theoretic model.
No rational argument will have a rational effect on a man who does not want to adopt a rational attitude.
K. Popper
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
“[…] only some models are useful”; a quote that in different formulations is mostly attributed to the statistician George Box.
References
Allais M (1953) Le comportement de l’homme rationnel devant le risque: critique des postulats et axiomes de l’ecole americaine. Econometrica 21(4):503. https://doi.org/10.2307/1907921
Bell DE (1982) Regret in decision making under uncertainty. Oper Res 30(5):961–981. https://doi.org/10.1287/opre.30.5.961
Busby J, Duckett D (2012) Social risk amplification as an attribution: the case of zoonotic disease outbreaks. J Risk Res 15(9):1049–1074. https://doi.org/10.1080/13669877.2012.670130
Busby JS, Onggo B, Liu Y (2016) Agent-based computational modelling of social risk responses. Eur J Oper Res 251(3):1029–1042 https://doi.org/10.1016/j.ejor.2015.12.034
Camerer CF (2011) Behavioral game theory: experiments in strategic interaction. The roundtable series in behavioral economics. Princeton University Press, s.l. http://gbv.eblib.com/patron/FullRecord.aspx?p=765287
Colman AM (2009) A dictionary of psychology, 3rd edn. Oxford paperback reference. Oxford University Press, Oxford
Diecidue E, Wakker PP (2001) On the intuition of rank-dependent utility. J Risk Uncertain 23(3):281–298. https://doi.org/10.1023/A:1011877808366
Fishburn PC (1982) Nontransitive measurable utility.s J Math Psychol 26(1):31–67. https://doi.org/10.1016/0022-2496(82)90034-7
Gigerenzer G, Selten R (eds) (2002) Bounded rationality: the adaptive toolbox, 1st mit press pbk. edn. MIT Press, Cambridge, MA
Gonzalez R, Wu G (1999) On the shape of the probability weighting function. Cogn Psychol 38(1):129–166. https://doi.org/10.1006/cogp.1998.0710
Humphrey SJ (1995) Regret aversion or event-splitting effects? more evidence under risk and uncertainty. J Risk Uncertain 11(3):263–274. https://doi.org/10.1007/BF01207789
Iyengar SS, Lepper MR (2000) When choice is demotivating: can one desire too much of a good thing? J Pers Soc Psychol 79(6):995–1006. https://doi.org/10.1037//0022-3514.79.6.995
Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263. https://doi.org/10.2307/1914185
Loomes G, Sugden R (1982) Regret theory: an alternative theory of rational choice under uncertainty. Econ J 92(368):805. https://doi.org/10.2307/2232669
Prelec D (1998) The probability weighting function. Econometrica 66(3):497. https://doi.org/10.2307/2998573
Quiggin J (1982) A theory of anticipated utility. J Econ Behav Organ 3(4):323–343. https://doi.org/10.1016/0167-2681(82)90008-7
Robert CP (2001) The Bayesian choice. Springer, New York
Rubinstein A (2002) Modeling bounded rationality, vol 3. Print edn. Zeuthen lecture book series. MIT Press, Cambridge, MA
Sanjab A, Saad W, Başar T (2017) Prospect theory for enhanced cyber-physical security of drone delivery systems: a network interdiction game. In: 2017 IEEE international conference on communications (ICC), pp 1–6. https://doi.org/10.1109/ICC.2017.7996862
Simon HA (1997) Models of bounded rationality. MIT Press, Cambridge, MA
Starmer C (2000) Developments in non-expected utility theory: the hunt for a descriptive theory of choice under risk. J Econ Lit 38(2):332–382. http://www.jstor.org/stable/2565292
Starmer C, Sugden R (1993) Testing for juxtaposition and event-splitting effects. J Risk Uncertain 6(3):235–254. https://doi.org/10.1007/BF01072613
Tversky A, Kahneman D (1985) The framing of decisions and the psychology of choice. In: Covello VT, Mumpower JL, Stallen PJM, Uppuluri VRR (eds) Environmental impact assessment, technology assessment, and risk analysis, NATO ASI series, series G. Springer, Berlin/Heidelberg, pp 107–129 . https://doi.org/10.1007/978-3-642-70634-9_6
Tversky A, Kahneman D (1989) Rational choice and the framing of decisions. In: Karpak B, Zionts S (eds) Multiple criteria decision making and risk analysis using microcomputers, NATO ASI series, series F. Springer, Berlin/Heidelberg, pp 81–126. https://doi.org/10.1007/978-3-642-74919-3_4
Tversky A, Kahneman D (1992) Advances in prospect theory: cumulative representation of uncertainty. J Risk Uncertain 5(4):297–323. https://doi.org/10.1007/BF00122574
Wang Q, Karlström A, Sundberg M (2014) Scheduling choices under rank dependent utility maximization. Proc Soc Behav Sci 111:301–310. https://doi.org/10.1016/j.sbspro.2014.01.063
Yaari ME (1987) The dual theory of choice under risk. Econometrica 55(1):95. https://doi.org/10.2307/1911158
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rass, S., Schauer, S., König, S., Zhu, Q. (2020). Bounded Rationality. In: Cyber-Security in Critical Infrastructures. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-46908-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-46908-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-46907-8
Online ISBN: 978-3-030-46908-5
eBook Packages: Computer ScienceComputer Science (R0)