Are decisions under risk malleable?

نویسندگان

  • C Fong
  • K McCabe
چکیده

Human decision making under risk and uncertainty may depend on individual involvement in the outcome-generating process. Expected utility theory is silent on this issue. Prospect theory in its current form offers little, if any, prediction of how or why involvement in a process should matter, although it may offer ex post interpretations of empirical findings. Well-known findings in psychology demonstrate that when subjects exercise more involvement or choice in lottery procedures, they value their lottery tickets more highly. This often is interpreted as an "illusion of control," meaning that when subjects are more involved in a lottery, they may believe they are more likely to win, perhaps because they perceive that they have more control over the outcome. Our experimental design eliminates several possible alternative explanations for the results of previous studies in an experiment that varies the degree and type of involvement in lottery procedures. We find that in treatments with more involvement subjects on average place less rather than more value on their lottery tickets. One possible explanation for this is that involvement interacts with loss aversion by causing subjects to weigh losses more heavily than they would otherwise. One implication of our study is that involvement, either independently or in interaction with myopic loss aversion, may help explain the extreme risk aversion of bond investors.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Modified Benders Decomposition Algorithm for Supply Chain Network Design under Risk Consideration

In today’s competitive business environment, the design and management of supply chainnetwork is one of the most important challenges that managers encounter. The supply chain network shouldbe designed for satisfying of customer demands as well as minizing the total system costs. This paper presentsa multi-period multi-stage supply chain network design problem under demand uncertainty. The prob...

متن کامل

A new security proof for FMNV continuous non-malleable encoding scheme

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

متن کامل

A game Theoretic Approach to Pricing, Advertising and Collection Decisions adjustment in a closed-loop supply chain

This paper considers advertising, collection and pricing decisions simultaneously for a closed-loop supplychain(CLSC) with one manufacturer(he) and two retailers(she). A multiplicatively separable new demand function is proposed which influenced by pricing and advertising. In this paper, three well-known scenarios in the game theory including the Nash, Stackelberg and Cooperative games are expl...

متن کامل

Incorporating location, routing, and inventory decisions in a bi-objective supply chain design problem with risk-pooling

This paper considers a single-sourcing network design problem for a three-level supply chain. For the first time, a novel mathematical model is presented considering risk-pooling, the inventory existence at distribution centers (DCs) under demand uncertainty, the existence of several alternatives to transport the product between facilities, and routing of vehicles from distribution centers to c...

متن کامل

Multi-granulation fuzzy probabilistic rough sets and their corresponding three-way decisions over two universes

This article introduces a general framework of multi-granulation fuzzy probabilistic roughsets (MG-FPRSs) models in multi-granulation fuzzy probabilistic approximation space over twouniverses. Four types of MG-FPRSs are established, by the four different conditional probabilitiesof fuzzy event. For different constraints on parameters, we obtain four kinds of each type MG-FPRSs...

متن کامل

Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials

A signature scheme is malleable if, on input a message m and a signature σ, it is possible toefficiently compute a signature σ′ on a related message m′ = T (m), for a transformation T thatis allowable with respect to this signature scheme. Previous work considered various useful flavorsof allowable transformations, such as quoting and sanitizing messages. In this paper, we explore a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Proceedings of the National Academy of Sciences of the United States of America

دوره 96 19  شماره 

صفحات  -

تاریخ انتشار 1999