34 research outputs found

    Evolutionary prisoner's dilemma games with optional participation

    Full text link
    Competition among cooperators, defectors, and loners is studied in an evolutionary prisoner's dilemma game with optional participation. Loners are risk averse i.e. unwilling to participate and rather rely on small but fixed earnings. This results in a rock-scissors-paper type cyclic dominance of the three strategies. The players are located either on square lattices or random regular graphs with the same connectivity. Occasionally, every player reassesses its strategy by sampling the payoffs in its neighborhood. The loner strategy efficiently prevents successful spreading of selfish, defective behavior and avoids deadlocks in states of mutual defection. On square lattices, Monte Carlo simulations reveal self-organizing patterns driven by the cyclic dominance, whereas on random regular graphs different types of oscillatory behavior are observed: the temptation to defect determines whether damped, periodic or increasing oscillations occur. These results are compared to predictions by pair approximation. Although pair approximation is incapable of distinguishing the two scenarios because of the equal connectivity, the average frequencies as well as the oscillations on random regular graphs are well reproduced.Comment: 6 pages, 7 figure

    Motion of influential players can support cooperation in Prisoner's Dilemma

    Full text link
    We study a spatial Prisoner's dilemma game with two types (A and B) of players located on a square lattice. Players following either cooperator or defector strategies play Prisoner's Dilemma games with their 24 nearest neighbors. The players are allowed to adopt one of their neighbor's strategy with a probability dependent on the payoff difference and type of the given neighbor. Players A and B have different efficiency in the transfer of their own strategy therefore the strategy adoption probability is reduced by a multiplicative factor (w < 1) from the players of type B. We report that the motion of the influential payers (type A) can improve remarkably the maintenance of cooperation even for their low densities.Comment: 7 pages, 7 figure

    Science Writing for Beginners

    Get PDF
    In this work we survey the findings in social psychology and philosophy with respect to trust. We introduce three hypotheses that remain unanswered with respect to the manner in which humans react to computers. We discuss potential design revisions in light of findings from other disciplines. Then we conclude by noting that research which empowers users in order to be their own security manager may be based on a fundamentally flawed view of human-computer interaction. We close by encouraging designers of computer security systems to examine the humans, which these systems are intended to empower, and recommend that any security system be built on the basis of understanding of human trust provided by the social sciences

    Towards a Framework for Socially Influencing Systems: Meta-analysis of Four PLS-SEM Based Studies

    No full text
    People continuously experience various types of engagement through social media, mobile interaction, location-based applications, and other technologically advanced environments. Often, integral parts of such socio-technical contexts often are information systems designed to change behaviors and attitudes of their users by leveraging powers of social influence, further defined as socially influencing systems (SIS). Drawing upon socio-psychological theories, this paper initially reviews and presents a typology of relevant social influence aspects. Following that, it analyzes four partial least squares structural equation modeling (PLS-SEM) based empirical studies to examine the interconnectedness of their social influence aspects. As a result, the analysis provides grounds for seminal steps towards the development and advancement of a framework for designing and evaluating socially influencing systems. The main findings can also deepen understanding of how to effectively harness social influence for enhanced user engagement in socio-technical environments and guide persuasive engineering of future socially influencing systems
    corecore