Elicitation of Subjective Probabilities in the Light of Signal Detection Theory
نویسندگان
چکیده
Most theories of decision-making under uncertainty are based on the idea that individuals weight events by some (transformation of) subjective probabilities. Elicitation of these subjective probabilities has thus became a major concern for evaluating and applying these models. In order to do so, one needs: (i) to be sure that such subjective probabilities actually exist in individuals’ minds and, (ii) to be able to infer these subjective probabilities from behavioral data. Cognitive sciences demonstrate that decisions in perceptive tasks are based on probabilities encoded at the neuronal level. Moreover, Signal Detection Theory (SDT) provides a theoretical model, confirmed by experimental neuronal data, that relates these probabilities to behavioral data. Here we use three different elicitation rules to measure individuals’ confidence in a perceptive task, and compare the results with the theoretical predictions based on SDT. We find that subjective probabilities elicited by a specific rule, the Matching Probabilities, fit very well the theoretical predictions. We also show that these results are consistent with those obtained for the same subjects in a non-perceptive task (a knowledge and logic quiz). This paves the way for extending our findings to non-perceptive tasks. ∗Financial support from ANR grants is acknowledged (Riskemotion ANR-08-RISKNAT-007-01; Feeling of control BLAN07-2 192879). †GREQAM, CNRS, Aix-Marseille University. [email protected]. ‡Corresponding author: [email protected]. CES University of Paris 1, Paris School of Economics. Address: 106-112 boulevard de L’Hôpital, 75647 Paris Cedex 13 France. §CES University of Paris 1, CNRS. [email protected].
منابع مشابه
Estimating the Number of Wideband Radio Sources
In this paper, a new approach for estimating the number of wideband sources is proposed which is based on RSS or ISM algorithms. Numerical results show that the MDL-based and EIT-based proposed algorithm havea much better detection performance than that in EGM and AIC cases for small differences between the incident angles of sources. In addition, for similar conditions, RSS algorithm offers hi...
متن کاملElicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملElicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملUsing Signal Detection Theory to Investigate the Impact of Mood Induction on Emotional Information Processing in High BAS/BIS Individuals
Objective: The main objective of this study was to investigate the explicit memory bias in the people with high BAS/BIS sensitivity in the different manipulated mood states. Methods: By using purposive sampling method, seventy-four participants (undergraduate students) were selected based on z-scores of 480 using the Carver and White’s BAS/BIS scale. They were distributed as: 24 wi...
متن کاملThe Object Detection Efficiency in Synthetic Aperture Radar Systems
The main purpose of this paper is to develop the method of characteristic functions for calculating the detection characteristics in the case of the object surrounded by rough surfaces. This method is to be implemented in synthetic aperture radar (SAR) systems using optimal resolution algorithms. By applying the specified technique, the expressions have been obtained for the false alarm and cor...
متن کامل