90,806 research outputs found
When herding and contrarianism foster market efficiency: a financial trading experiment
While herding has long been suspected to play a role in financial market booms and busts, theoretical analyses have struggled to identify conclusive causes for the effect. Recent theoretical work shows that informational herding is possible in a market with efficient asset prices if information is bi-polar, and contrarianism is possible with single-polar information. We present an experimental test for the validity of this theory, contrasting with all existing experiments where rational herding was theoretically impossible and subsequently not observed. Overall we observe that subjects generally behave according to theoretical predictions, yet the fit is lower for types who have the theoretical potential to herd. While herding is often not observed when predicted by theory, herding (sometimes irrational) does occur. Irrational contrarianism in particular leads observed prices to substantially differ from the efficient benchmark. Alternative models of behavior, such as risk aversion, loss aversion or error correction, either perform quite poorly or add little to our understanding
Domino: exploring mobile collaborative software adaptation
Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach
- …