Coye Cheshire & Andrew Fiore June 13, 2015 // Computer-Mediated Communication Trust and Trustworthiness Part II.

Slides:



Advertisements
Similar presentations
Neural Correlates of Trust and Adaptation in a Dynamic Neuroeconomic Task Project Presentation Adam P.R. Smith, Esther Kessler, Chiara Fiorentini, Fiona.
Advertisements

When a Good Reputation isn’t Good Enough Jonathan Traupman Robert Wilensky U.C. Berkeley.
Infinitely Repeated Games
Cristina Bicchieri University of Pennsylvania (work done in collaboration with Azi Lev-On and Alex Chavez)
 Lab #1  Intro to Experiments and Experimental Design 2.
1 Game Theory. By the end of this section, you should be able to…. ► In a simultaneous game played only once, find and define:  the Nash equilibrium.
Randy Whitehead. What is a Game?  We all know how to play games. Whether they involve cards, sports equipment, boards, dice, or a multitude of other.
EKONOMSKA ANALIZA PRAVA. Game Theory Outline of the lecture: I. What is game theory? II. Elements of a game III. Normal (matrix) and Extensive (tree)
Coye Cheshire & Andrew Fiore March 21, 2012 // Computer-Mediated Communication Collective Action and CMC: Game Theory Approaches and Applications.
Time Horizons in Interdependent Security David J. Hardisty, Howard Kunreuther, David H. Krantz, & Poonam Arora Columbia University & University of Pennsylvania.
Cooperation in Anonymous Dynamic Social Networks Brendan Lucier University of Toronto Brian Rogers Northwestern University Nicole Immorlica Northwestern.
On Quantum Walks and Iterated Quantum Games G. Abal, R. Donangelo, H. Fort Universidad de la República, Montevideo, Uruguay UFRJ, RJ, Brazil.
Prisoner’s Dilemma. The scenario In the Prisoner’s Dilemma, you and Lucifer are picked up by the police and interrogated in separate cells without the.
GAME THEORY.
Pemberton’s Dilemma.
The Demand for Public Goods Frederick University 2014.
Cooperation Reciprocators, Cheaters, and Everyone Else.
May 21, 2015 // Computer-Mediated Communication Trust and Trustworthiness In Computer-Mediated Communication.
Coye Cheshire & Andrew Fiore June 3, 2015 // Computer-Mediated Communication Reputation (Part II)
Coye Cheshire & Andrew Fiore June 10, 2015 // Computer-Mediated Communication Trust and Trustworthiness.
Coye Cheshire & Andrew Fiore June 11, 2015 // Computer-Mediated Communication Introductions, terminology, & taxonomy.
Coye Cheshire & Andrew Fiore June 12, 2015 // Computer-Mediated Communication Social Presentation and Perception.
Coye Cheshire & Andrew Fiore June 19, 2015 // Computer-Mediated Communication Iterated Prisoner’s Dilemma.
Computer-Mediated Communication — Cheshire & Fiore
Coye Cheshire & Andrew Fiore June 21, 2015 // Computer-Mediated Communication Media richness.
Coye Cheshire & Andrew Fiore June 21, 2015 // Computer-Mediated Communication Reputation (Part I)
Coye Cheshire & Andrew Fiore June 21, 2015 // Computer-Mediated Communication Introductions, terminology, & taxonomy.
Coye Cheshire & Andrew Fiore June 22, 2015 // Computer-Mediated Communication Intimate relationships.
Coye Cheshire & Andrew Fiore June 24, 2015 // Computer-Mediated Communication Collective Action and Public Goods II.
Coye Cheshire & Andrew Fiore June 26, 2015 // Computer-Mediated Communication Online Communities II.
Coye Cheshire & Andrew Fiore June 26, 2015 // Computer-Mediated Communication CMC & Society.
Coye Cheshire & Andrew Fiore June 28, 2015 // Computer-Mediated Communication Game Theory, Games, and CMC.
Coye Cheshire & Andrew Fiore June 28, 2015 // Computer-Mediated Communication Defining and Justifying Problems.
Coye Cheshire & Andrew Fiore June 28, 2015 // Computer-Mediated Communication Games!
Coye Cheshire & Andrew Fiore June 28, 2015 // Computer-Mediated Communication Social Presentation.
Coye Cheshire & Andrew Fiore June 30, 2015 // Computer-Mediated Communication Qualitative analysis of CMC.
Coye Cheshire & Andrew Fiore June 30, 2015 // Computer-Mediated Communication Media Richness.
Coye Cheshire & Andrew Fiore July 16, 2015 // Computer-Mediated Communication Information Pools.
Coye Cheshire & Andrew Fiore July 16, 2015 // Computer-Mediated Communication Intimate relationships.
1 University of Auckland Winter Week Lectures Third Lecture 4 July 2007 Associate Professor Ananish Chaudhuri Department of Economics University of Auckland.
Agenda, Day 2  Questions about syllabus? About myths?  Prisoner’s dilemma  Prisoner’s dilemma vs negotiation  Play a single round  Play multiple rounds.
Game Outcome The goal of a game is to produce a measurable outcome.
Reputational advantages and disadvantages of punishment toward norm-violators Yutaka Horita Toshio Yamagishi Hokkaido University 13th international conference.
Reputation and Trust. Uncertainty and Risk 3 What are the Solutions to Uncertainty in the Social Environment?  Proxy’s and ‘inferred trustworthiness’
SES SECONDARY 3. 2 PERSPECTIVES: 1. CLASSICAL ECONOMISTS Stigler: “when self-interest and ethical values with wide verbal allegiances are in conflict,
Why do governments intervene in private markets? Why do governments regulate? Imagine no property rights, criminal law, tort law, contract law Imagine.
Finite Iterated Prisoner’s Dilemma Revisited: Belief Change and End Game Effect Jiawei Li (Michael) & Graham Kendall University of Nottingham.
Announcements For Tuesday, Oct. 21 st : Problem Set 6 For Tuesday, Oct. 21 st : Problem Set 6 For Thursday, Oct. 23 rd : Dating Survey (link to be sent.
What games do economists play? To see more of our products visit our website at Tom Allen, Head of Economics, Eton College.
Conflict within Groups. Outline Conflict Competition and Conflict Class Activity Mixed Motive Situations Social Dilemmas Class Activity Threats and.
1 University of Auckland Winter Week Lectures Second Lecture 3 July 2007 Associate Professor Ananish Chaudhuri Department of Economics University of Auckland.
1 x 2 Game 1: One Player Game If you select a number sentence, give the answer. If you select an answer give the number sentence that has that answer.
Game Theory by James Crissey Luis Mendez James Reid.
UUCF Summer RE 2011 Brain Glitches Session 4: Prisoner’s Dilemma.
1 Social Dilemmas. 2 The Anatomy of Cooperation How does cooperation develop and how is it sustained in an environment where individuals are rewarded.
EXPERIMENTS Lecture 5. Administrative STATA Course Mailing List Info:   No subject  In body.
Intermediate Microeconomics Game Theory. So far we have only studied situations that were not “strategic”. The optimal behavior of any given individual.
Coye Cheshire & Andrew Fiore March 6, 2016 // Computer-Mediated Communication Trust and Trustworthiness Part II.
1 Selfishness in P2P Networks. U C B E R K E L E Y C O M P U T E R S C I E N C E 2 Introduction to Game Theory Prisoner Dilemma Two members A, B of a.
June 10, 2016 // Computer-Mediated Communication Trust, Trustworthiness and Reputation In Computer-Mediated Communication.
PRISONER’S DILEMMA THE MATHEMATICS OF BETRAYAL (AND DATING AND VARIOUS OTHER THINGS) Math Club 9/26/2011.
tit-for-tat algorithm
Computer-Mediated Communication
Computer-Mediated Communication
Computer-Mediated Communication
Computer-Mediated Communication
Computer-Mediated Communication
Computer-Mediated Communication
Experiments II: Validity and Design Considerations
Game Theory: A study of interdependence and the strategy of games
Presentation transcript:

Coye Cheshire & Andrew Fiore June 13, 2015 // Computer-Mediated Communication Trust and Trustworthiness Part II

6/13/2015Computer-Mediated Communication — Cheshire & Fiore1 Quick Recap of Sources of Uncertainty in Exchange/Interaction Quality of ‘goods’ or ‘services’ Structural uncertainty of an exchange Uncertainty about finding an exchange partner ?

6/13/2015Computer-Mediated Communication — Cheshire & Fiore2 No noble thing can be done without risks. “ ” — Michel Eyquem de Montaigne

6/13/2015Computer-Mediated Communication — Cheshire & Fiore3 Risk What is at stake in a given situation/interaction? - The risk may be defined by the situation (i.e., it cannot vary) - The risk may be vary across exchange situations with the same partners (in many cases the participants can change the relative risks)

6/13/2015Computer-Mediated Communication — Cheshire & Fiore4 Understanding trust through ‘games’

6/13/2015Computer-Mediated Communication — Cheshire & Fiore5 Rules for the CMC trust game…  Two players  Each player gets 3 items from the experimenter on each round.  Players simultaneously decide whether to ‘entrust’ 1 to 3 of their items to the other player.  Players decide whether to return the items to their partner or not.  If player returns the items, the experimenter DOUBLES the amount returned to the partner.  The player can just keep the entrusted items; then nothing is returned to the partner.

6/13/2015Computer-Mediated Communication — Cheshire & Fiore6 Debriefing… What were the risks? What were the sources of uncertainty? What are the opportunity cost(s) in this game? Does the game play any differently when there are repeated interactions with the same partner, compared to when there are new, random partners?

6/13/2015Computer-Mediated Communication — Cheshire & Fiore7 Prisoner’s Dilemma Keeps silentBetrays Keeps silent 6 mo. each A: 10 years B: freedom Betrays A: freedom B: 10 years 5 years each A B Two suspects are captured, A and B. What sentences do they receive?

6/13/2015Computer-Mediated Communication — Cheshire & Fiore8 Prisoner’s Dilemma CooperateDefect Cooperate Defect A B What if we consider the same problem with “benefit units” instead of prison years?

6/13/2015Computer-Mediated Communication — Cheshire & Fiore9 Trust-Building Processes in US and Japan

6/13/2015Computer-Mediated Communication — Cheshire & Fiore10 Trust-Building Processes in US and Japan