4,982 research outputs found

    Social Media In Sports: Can Professional Sports League Commissioners Punish \u27Twackle Dummies\u27?

    Get PDF
    Daniel J. Friedman writes an article discussing the rise and popularity in social media use by professional athletes. He then discusses some of the new problems that have arisen due to social media misuse and the power of the Commissioner to restrict and punish the players for misuse. The article culminates with a case study hypothetical related to content based social media misuse and whether the Commissioners of professional sports league can punish a player for the content of their social media messages

    Equilibrium Vengeance

    Get PDF
    The efficiency-enhancing role of the vengeance motive is illustrated in a simple social dilemma game in extensive form. Incorporating behavioral noise and observational noise in random interactions in large groups leads to seven continuous families of (short run) Perfect Bayesian equilibria (PBE) that involve both vengeful and non-vengeful types. A new long run evolutionary equilibrium concept, Evolutionary Perfect Bayesian Equilibrium (EPBE), shrinks the equilibrium set to two points. In one EPBE, only the non-vengeful type survives and there are no mutual gains. In the other EPBE, both types survive and reap mutual gains.reciprocity; vengeance; evolutionary perfect Bayesian equilibrium; social dilemmas

    Equilibrium Vengeance

    Get PDF
    This paper introduces two ideas, emotional state dependent utility components (ESDUCs), and evolutionary perfect Bayesian equilibrium (EPBE). Using a simple extensive form game, we illustrate the efficiency-enhancing role of a powerful ESDUC, the vengeance motive. Incorporating behavioral noise and observational noise leads to a range of (short run) Perfect Bayesian equilibria (PBE) involving both vengeful and non-vengeful types. We then derive two (long run) EPBE, one where both types survive and reap mutual gains, and a second where only the non-vengeful type survives and there are no mutual gains.negative reciprocity, perfect Bayesian equilibrium, evolutionary perfect Bayesian equilibrium, emotional state dependent utility

    Vengefulness Evolves in Small Groups

    Get PDF
    We discuss how small group interactions overcome evolutionary problems that might otherwise erode vengefulness as a preference trait. The basic viability problem is that the fitness benefits of vengeance often do not cover its personal cost. Even when a sufficiently high level of vengefulness brings increased fitness, at lower levels, vengefulness has a negative fitness gradient. This leads to the threshold problem: how can vengefulness become established in the first place? If it somehow becomes established at a high level, vengefulness creates an attractive niche for cheap imitators, those who look like highly vengeful types but do not bear the costs. This is the mimicry problem, and unchecked it could eliminate vengeful traits. We show how within-group social norms can solve these problems even when encounters with outsiders are also important.

    Financial Engineering and Rationality: Experimental Evidence Based on the Monty Hall Problem

    Get PDF
    Financial engineering often involves redefining existing financial assets to create new financial products. This paper investigates whether financial engineering can alter the environment so that irrational agents can quickly learn to be rational. The specific environment we investigate is based on the Monty Hall problem, a well-studied choice anomaly. Our results show that, by the end of the experiment, the majority of subjects understand the Monty Hall anomaly. Average valuation of the experimental asset is very close to the expected value based on the true probabilities.experiment, behavioral finance

    Risky Curves: From Unobservable Utility to Observable Opportunity Sets

    Get PDF
    Most theories of risky choice postulate that a decision maker maximizes the expectation of a Bernoulli (or utility or similar) function. We tour 60 years of empirical search and conclude that no such functions have yet been found that are useful for out-of-sample prediction. Nor do we find practical applications of Bernoulli functions in major risk-based industries such as finance, insurance and gambling. We sketch an alternative approach to modeling risky choice that focuses on potentially observable opportunities rather than on unobservable Bernoulli functions.Expected utility, Risk aversion, St. Petersburg Paradox, Decisions under uncertainty, Option theory

    Device-independent Certification of One-shot Distillable Entanglement

    Full text link
    Entanglement sources that produce many entangled states act as a main component in applications exploiting quantum physics such as quantum communication and cryptography. Realistic sources are inherently noisy, cannot run for an infinitely long time, and do not necessarily behave in an independent and identically distributed manner. An important question then arises -- how can one test, or certify, that a realistic source produces high amounts of entanglement? Crucially, a meaningful and operational solution should allow us to certify the entanglement which is available for further applications after performing the test itself (in contrast to assuming the availability of an additional source which can produce more entangled states, identical to those which were tested). To answer the above question and lower bound the amount of entanglement produced by an uncharacterised source, we present a protocol that can be run by interacting classically with uncharacterised (but not entangled to one another) measurement devices used to measure the states produced by the source. A successful run of the protocol implies that the remaining quantum state has high amounts of one-shot distillable entanglement. That is, one can distill many maximally entangled states out of the single remaining state. Importantly, our protocol can tolerate noise and, thus, certify entanglement produced by realistic sources. With the above properties, the protocol acts as the first "operational device-independent entanglement certification protocol" and allows one to test and benchmark uncharacterised entanglement sources which may be otherwise incomparable

    Issues in Evaluating Health Department Web-Based Data Query Systems: Working Papers

    Get PDF
    Compiles papers on conceptual and methodological topics to consider in evaluating state health department systems that provide aggregate data online, such as taxonomy, logic models, indicators, and design. Includes surveys and examples of evaluations

    Speculative Attacks: A Laboratory Study in Continuous Time

    Get PDF
    We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals increase the likelihood of successful speculative attacks and hasten their onset, and (b) contrary to some theory, success is enhanced by public access to information about either the net speculative position or the fundamentals. The presence of a larger speculator further enhances success, and experience with large speculators increases small speculators’ response to the public information. However, giving the large speculator increased size or better information does not significantly strengthen his impact.currency crisis, speculative attack, laboratory experiment, coordination game, pre-emption, large player
    corecore