Ashamed to be selfish
نویسندگان
چکیده
We study a decision maker (DM) who has preferences over choice problems, which are sets of payoff allocations between herself and a passive recipient. An example of such a set is the collection of possible allocations in the classic dictator game. The choice of an allocation from the set is observed by the recipient, whereas the choice of the set itself is not. Behaving selfishly under observation, in the sense of not choosing the normatively best allocation, inflicts shame on the DM. We derive a representation that identifies the DM’s private ranking of allocations, her subjective norm, and her shame. The normatively best allocation can be further characterized as the Nash solution of a bargaining game induced by the second-stage choice problem.
منابع مشابه
When Do We Feel Sorry for Others? : An Externality of Lake Use as an Example
The purpose of the study was to verify, through the use of an experimental method, the assumption that the ‘economic human’ pays more attention to the externality he/she causes as the strength of externality increases. We used a social-experiment design within an undergraduate classroom to test assumptions, using statistical method. A lakeside plant was used as an example. Our results confirmed...
متن کاملDoes a prosocial-selfish distinction help explain the biological affects? Comment on Buck (1999).
R. Buck (1999) argued that a conceptual distinction between prosocial and selfish motivation is necessary to understand the biological affects (consciously experienced feelings and desires having an innate neurochemical basis). However, at a biological level of analysis, a prosocial-selfish distinction is doubtful empirically and conceptually. For this reason, Buck's proposed typology of biolog...
متن کاملOn the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners
Eyal and Sirer’s selfish mining strategy has demonstrated that Bitcoin system is not secure even if 50% of total mining power is held by altruistic miners [2]. Since then, researchers have been investigating either to improve the efficiency of selfish mining, or how to defend against it, typically in a single selfish miner setting. Yet there is no research on a selfish mining strategies concurr...
متن کاملA Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks
IEEE 802.11 is one of the most well-established and widely used standard for wireless LAN. Its Medium Access control (MAC) layer assumes that the devices adhere to the standard’s rules and timers to assure fair access and sharing of the medium. However, wireless cards driver flexibility and configurability make it possible for selfish misbehaving nodes to take advantages over the other well-beh...
متن کاملComparison of Normal Selfish Overlay Network and Selfish Overlay Network with Deployment of Overlay Nodes Using Fuzzy Logic
Selfish overlay routing is the technique whereby the sender of the packet can specify the route that the packet should take through the network. Selfish overlay routing allow end users to select routes in an egocentic fashion to optimize their own performance without considering the system wide criteria which in turn cause performance degradation .The main concept behind the selfish overlay net...
متن کامل