Hostname: page-component-78c5997874-xbtfd Total loading time: 0 Render date: 2024-11-14T03:29:16.219Z Has data issue: false hasContentIssue false

The opportunity-threat theory of decision-making under risk

Published online by Cambridge University Press:  01 January 2023

Mohan Pandey*
Affiliation:
Bristol-Myers Squibb, E3140, Route 206 & Province Line Road, Princeton, NJ 08543, USA
*
Rights & Permissions [Opens in a new window]

Abstract

A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several “new paradoxes” that refuted cumulative prospect theory in favor of configural weight models. The discussion notes similarities and differences of this model to the configural weight TAX model, which can also account for the new paradoxes.

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
The authors license this article under the terms of the Creative Commons Attribution 3.0 License.
Copyright
Copyright © The Authors [2018] This is an Open Access article, distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.

1 Introduction

Expected Utility Theory (EUT) (Reference Von Neumann and MorgensternVon Neumann & Morgenstern, 1944) is the most widely accepted normative theory of decision-making under risk. However, as demonstrated by the Allais Paradox (Reference AllaisAllais, 1953), EUT does not accurately describe how people decide when presented choices between risky prospects. Many theories have been proposed to account for the Allais paradoxes. Two classes of models that have been the focus of recent experimental work are original and cumulative prospect theory (Reference Kahneman and TverskyKahneman & Tversky, 1979; Reference Tversky and KahnemanTversky & Kahneman, 1992) and configural weight models (Reference BirnbaumBirnbaum, 1974; Reference Birnbaum and StegnerBirnbaum & Stegner, 1979), including the Transfer of Attention Exchange (TAX) model of Reference Birnbaum and ChavezBirnbaum & Chavez (1997). This paper proposes an alternative, called the Opportunity-Threat Theory (OTT) and shows how a simplified special model of OTT (SSOT) can explain the classic fourfold pattern of risk attitude as well as key features of the “new paradoxes” (Reference BirnbaumBirnbaum, 2008) that refute the prospect models in favor of the configural weight models. In particular, the new model can account for event-splitting effect, violation of stochastic dominance and violation of restricted-branch independence.

The intuitions behind OTT are rather simple. People are influenced not only by the expected results of their actions, but also are affected by two components of risk, opportunity and threat. A model in which expectation, opportunity, and threat aggregate to form the evaluation of a risky prospect will be presented first in a simple form, to show that it can account for empirical phenomena. Comparisons with alternative approaches and ways in which the simple model might be generalized will be taken up in the discussion.

2 A Special OTT (SOT) Model of Risky Decision Making

Let M refer to a risky gamble of the form M= (x 1,p 1;x 2,p 2x i,p ix n,p n), which represents a lottery in which there are exactly n possible mutually exclusive and exhaustive consequences. Consequence x i occurs with probability p i and the sum of the probabilities is 1. The expected value of such a gamble, EV, is given by Equation 1:

(1)

Expected utility theory (EUT) allows that utilities (subjective values) of the consequences may be a nonlinear function of the monetary values of the consequences, u i=u(x i). The expected utility of the gamble is µ :

(2.1)

Under SOT, µ =EU can be viewed as a reference. With at least two unequal consequences, there will be at least one that will be preferred to µ , and at least one over which µ will be preferred. The present model adds two risk components to expected utility; the first of these components is a risk factor due to asymmetry and the second is a risk factor due to variation.

It is useful to define the average utility of the consequences in a gamble, ū  computed as if each consequence is equally likely:

(2.2)

When there are two or more consequences, the difference between the average utility of the consequences and the expected utility of consequences is used to define the asymmetry component of the model, θ , as follows:

(2.3)

A negative deviation is perceived as threat (the possibility of landing below the reference). A positive deviation is perceived as opportunity (the possibility of landing above the reference).

The variation component of the model, ψ , is defined as follows:

(2.4)

where α is a parameter representing the weight of the θ component and σ is the standard deviation,

(2.5)

It has been found that people are typically risk averse for positive valued gambles and typically risk seeking for negative valued gambles; therefore, to account for this empirical finding, a multiplier of ψ , b, reflecting the sign of µ is used, as follows:

(2.6)

When all the u values are non-negative (µ ≥ 0), spread is perceived as threat (the possibility of landing below the reference ); b=−1. On the other hand, when all the u values are negative (µ <0), spread is perceived as opportunity (the possibility of landing above the reference ): b=+1. For mixed cases with both positive and negative outcomes, sign of µ determines the sign of b.

The overall evaluation of a gamble, V, for gambles with two or more possible consequences is a linear combination of all three components, as follows:

(2.7)

where coefficients α and β represent psychological weights assigned to θ and ψ respectively; and ε is an error term. For the case of n=1, V=u. The SOT model is idempotent, reducing to V=u, when all outcomes are equal. When given a choice between two gambles, the decision maker chooses the option with the higher evaluation, V, apart from error.

Equation 2.7 shows that SOT reduces to EU when α = β = 0, or when α θ + β b ψ =0. When θ = 0, V= µ + β b σ + ε , which is a special case of the TAX model when n = 2.Footnote 1

2.1 Simplified special opportunity-threat (SSOT) model

For some situations, it may be possible to use a simplified version of SOT. Consider cases where outcomes are monetary and within a relatively narrow range allowing u(x)=x. Further, assume that values of p are non-extreme allowing the approximation, ψ = σ .Footnote 2 For simplicity, it will be assumed that there are no errors. Equation 3 represents the simplified SOT (SSOT) model

(3)

For simplification, it is assumed that coefficients α and β do not change due to change in domains (positive to negative or vice versa). Examples in this paper use this SSOT model unless otherwise mentioned. It is noted that SSOT model reduces to Expected Value when α = β = 0, or when α θ + β bσ =0 .

2.2 Constraints and coefficients

Consider the case of binary gambles (x,p;0,1−p), with x>0; here, n=2 and µ =p x. From Equation (2.3), θ =x/2−px/2−1/2=(1−2p)x and from Equation (2.5), σ 2=p (xxp)2+(1−p) (0−xp)2={ p(1−p)} x 2 . Since µ is non-negative, b= −1. Therefore,

(4.1)

transforming to:

(4.2)

Now, constraints 0<V/x<1 and 0<p<1 are applied. They set the boundary conditions such that even for the smallest probability of smallest positive value of x, V does not reduce to zero. Further, even for the smallest probability of x not obtaining, magnitude of V remains positive under certain x. Then, at p=1/2, from Equation 4.2, V/x=1/2−β /2 . Thus, 0<1/2−β /2<1 , which implies −1<β <1. Also, for p∼ 0, V/x ≈ α , thus 0<α <1.

For estimation of β , consider a mixed outcome experiment with only two possible outcomes with equal probabilities ( x 1,1/2;−x 2,1/2) and observed V=0. Given symmetric distribution, θ =0, giving, V=0= µ − β σ , or, β = µ /σ . Now, µ =1/2x 1−1/2x 2. Also, σ 2=1/2(x 1−µ )2+ 1/2 (−x 2−µ )2=1/2(x 1−1/2x 1+1/2x 2)2+ 1/2 (−x 2−1/2x 1+1/2x 2)2. That yields, σ =1/2x 1+1/2x 2. Thus, β = µ /σ = x 1x 2/x 1+x 2. Reference Tversky and KahnemanTversky & Kahneman (1992) reported four problems of this kind that yield β =0.42, 0.34, 0.34, 0.30. An average is taken and converted to an equivalent fraction for convenience, giving β =1/3, which is in the range established above.

Now, with an estimate of β at hand, α can be estimated as follows. Assume that there exists a point where, V/x=p. Then, from Equation 4, 0= α (1−2p)−β { p(1−p)} 1/2 yielding, α =β { p(1−p)} 1/2/1−2p. Reference Tversky and KahnemanTversky & Kahneman (1992) considered p≤ 0.1 as low. Following that, p=0.1 is taken as the point of transition from low probability to moderate probability. Data from the same study shows that V/xp at =0.1 . At that point, with β =1/3 , α =1/8 is obtained, which is in the range established above.

It must be recognized that α and β represent a psychological weighting process and as such are likely to vary with individual differences and experimental factors. The rest of this paper uses α =1/8 and β =1/3 as “prior” parameters for purpose of calculations to illustrate how the SSOT model functions. These rough parameters are not intended to be used for comparison of accuracy or predictive power of various models.

3 Results

It has been well argued in Birnbaum (2008) as to how the so-called “new paradoxes” refute Cumulative Prospect Theory, Rank-Dependent Utility, and Rank-and Sign-Dependent Utility Theories in favor of a class of models that includes the transfer of attention exchange (TAX) model. Here, it is examined if SSOT is also capable of explaining key drivers of these new paradoxes, viz., event-splitting, stochastic dominance and restricted branch independence. It will be shown first that SSOT can reproduce some basic behavioral observations in decision-making under risk, including the “fourfold pattern”.

3.1 Fourfold pattern

Reference Tversky and KahnemanTversky & Kahneman (1992) described a “fourfold pattern”: risk aversion for gains and risk seeking for losses of high probability; risk seeking for gains and risk aversion for losses of low probability. Table 1 shows selected results illustrating this fourfold pattern and shows how SSOT can account for them.

Consider (100,5%;0,95%). (i) The reference µ =100∗5%=5. (ii) θ =(1−2∗5%)∗100=90. It is multiplied with coefficient α =1/8. Thus, the impact α θ =1/8∗90≈ 11. This is positive and is taken as opportunity. (iii) The standard deviation, σ ={ 5%∗95%} 1/2100=22. Since the gamble is in gains domain, b=−1. Thus, bσ =−22. With coefficient β =1/3 we have β bσ =1/3(−22)≈ −7. This is negative and is taken as threat. The final value, V=5+11−7=9>5(expected value). This is in line with the reported relationship.

As p increases, θ decreases, crossing 0 when p=1/2, and turning negative after that. In the case of (100,95%;0,5%), µ =95. θ =(1−2∗95%)∗100=−90, leading to negative impact of α θ =1/8∗(−90)≈ −11 . Standard deviation and b do not change so V=95−11−7=77<95(expected value).

For (−100,5%;0,95%), µ =−5. θ =(1−2∗5%)(−100)=−90 , leading to negative impact of α θ =1/8∗(−90)≈ −11. Due to domain change, b= +1, hence, β bσ =1/3∗(+1)∗22≈ 7,. Therefore, V=−5−11+7=−9<−5(expected value).

For (−100,95%;0,5%), we have, µ =−95, θ =(1−2∗95%)(−100)=90, α θ =1/8∗90≈ 11 and b= +1, hence, β bσ =1/3∗(+1)∗22≈ 7. Therefore, V=−95+11+7=−77>−95(expected value). Thus, the model reproduces the fourfold pattern of Table 1.

Table 1: Fourfold pattern shown with experimental dataset for gambles of type (x,p;0,1−p) from Reference Tversky and KahnemanTversky & Kahneman (1992). SSOT, CPT and TAX, all three are able to explain the fourfold pattern. However, SSOT analyzes risk into opportunity and threat components

Note: Data presented only to demonstrate the pattern and not to show accuracy of prediction. OTT does not preclude the coefficients from taking different values for gains and losses domain. However, it is not necessary to explain the pattern here. Observed and calculated cash equivalents are in $, in this table as well as the subsequent tables.

More generally, consider gambles of type (x,p;0,1−p). In the gains domain, spread is perceived as threat. θ , which equals (1−2p)x, is perceived as an opportunity for p ≤ 1/2. For any given x, this factor becomes stronger as p reduces. At low p, it overrides the threat factor when α (1−2p)>β { p(1−p)} 1/2. In the losses domain, spread is perceived as opportunity. θ , which equals (1−2p)(−x), is perceived as threat for p ≤ 1/2. Thus, for low p, it is threat aversion and otherwise it is opportunity seeking. In this model, decision-makers can be simultaneously opportunity seeking and threat averse.

3.2 Event-splitting effect

A simple case of event splitting: A (x,p;0,1−p) split to B (x,pr;x,r;0,1−p). Obviously, there is no difference in µ, since, (pr)x+rx=px . There is no difference in σ either as p(xpx)2+(1−p)(0−px)2=(pr)(xpx)2+r(xpx)2+(1−p)(0−px)2 .Footnote 3 However, there is change in θ . θ A=x/2−px/2−1/2=(1−2p)x and θ B=2x/3−px/3−1/3=(1−1.5p)x.

Take any gamble G base (x 1,p 1;x 2,p 2x i,p ix n,p n) with x i>0, pick its element k , (x k,p k) and split it to generate elements (x k,p kr) and (x k,r) for another gamble G split. Then, from Equation 2.3, θ base=n/n−1(∑x i/n− µ ) and θ split=n+1/n(∑x i/n+1+x k/n+1− µ ) . Thus, θ split−θ base= x k/n−∑x i− µ /n(n−1). Therefore, V split>V base if, x k>∑x i− µ /(n−1).

For a binary gamble (x,p;0,1−p), x>0, splitting of higher branch satisfies this condition (x>xpx/(2−1)) and leads to increase in value. Splitting of lower branch (0<xpx/(2−1)) leads to decrease in value. Because splitting in this model can either increase or decrease the value of a gamble, this model violates the property of branch-splitting independence identified and tested by Birnbaum (2007).

An example of event-splitting non-independence from Birnbaum (2008) is illustrated in Table 2. 1.1A is produced by splitting lower branch of 1.1A’ (causing small decrease in value) and 1.1B is produced by splitting higher branch of 1.1B’(causing significant increase in value). The majority prefers A to B, and a majority prefers B’ to A’.

Table 2: Event-splitting problems 1.1 (row 1) and 1.2 (row 2) from Birnbaum (2008). Prior CPT does not, but prior SSOT and prior TAX predict preference reversal due to event-splitting of gambles in 1.2

3.3 Violation of stochastic dominance

That SSOT predicts violation of stochastic dominance is demonstrated in this section through a recipe simplified from Birnbaum (2008). Take a base gamble G 0(x,p;0,1−p), with x>0. Now, modify it to generate a stochastically dominating gamble G +(x,p;y,q;0,1−pq) where y is a small positive quantity and q is a relatively small probability. Next, generate a stochastically dominated gamble G (x,ps;z,s;0,1−p) where z is a positive quantity slightly lower in value to x and s is a relatively small probability.

From Equations 2, for G 0(x,p;0,1−p):

For G +(x,p;y,q;0,1−pq):

For G (x,ps;z,s;0,1−p), substituting r=ps (replaced back in the last step):

The impact on mean is straightforward: µ +− µ =qy≈ 0 and, µ −µ =s(xz)≈ 0. The difference in σ is as follows: − σ 2= q(1−q)y 2−2pqxy= qy ((1−q)y−2px)≈ 0, since, qy≈ 0 and σ 2−(2spss 2)x 2s(1−s)z 2+2(ps)sxz =s(−2px 2+x 2+sx 2− (1−s)z 2+2(ps)xz)=s(x 2z 2+sx 2+sz 2−2sxz−2px 2 +2pxz)= s(xz)(x+z+s(xz)−2px) ≈ 0, since, s(xz)≈ 0.

The differences in θ , which are decisive, can be calculated:

Negative signs in both these expressions imply violation of stochastic dominance. In summary, similar to event-splitting effect, violation of stochastic dominance in cases such as the one described here is driven by θ . G 0 to G + is splitting of the lower branch leading to reduction in value; while G 0 to G is splitting of the higher branch leading to increase in value.

For illustration, calculations for one experimental set from Birnbaum (2008) are shown in Table 3. It is reported that a majority (73%) of subjects preferred G over G+ despite expected values being 87.3 and 87.7 respectively. SSOT values these prospects at 74.9 and 70.6, consistent with the majority preference, driven by change in θ while deltas in µ and σ are very small.

Table 3: Violation of stochastic dominance in Birnbaum (2008) problem 3.1.Values α (θ +− θ )≈ −α (1−p)x/2=−0.6 and α (θ −θ )≈ −α px/2=−5.4 predict slight reduction in value moving from G 0 to G + and relatively higher increase in value moving from G 0 to G . Prior CPT is not, but prior SSOT and prior TAX are consistent with the observed data

3.4 Violation of restricted branch independence

Consider two gambles with the same number of branches and the same probability distribution, S=(x 1,p 1;x 2,p 2x i,p ix n,p n) and R=(y 1,p 1;y 2,p 2y i,p iy n,p n) having a common branch such that x n=y n=z. Restricted branch independence assumes that a change in z will not change the preference relationship between S and R. Suppose S is preferred over R, then, under SSOT, V S>V R. Then, if ∂ V s/∂ z≥ ∂ V R/∂ z, V S>V R for all z. Otherwise, with increase in z, the gap in values will close and preference may get switched. A standard case is analyzed to understand how this derivative function works. For convenient tracking, label p n=r. Assume, x i≥ 0, for all i, such that µ ≥ 0 and b= −1. Also, introduce an additional constraint 0<β <1 to model a typical spread-averse agent.

Differentiating Equation 3 w.r.t. z, ∂ V/∂ z= ∂ µ /∂ z+α ∂ θ /∂ z−β ∂ σ /∂ z. Now, ∂ µ /∂ z=r , ∂ θ /∂ z=n/n−1 (1/nr) and ∂ σ /∂ z=1/2σ ∂ σ 2/∂ z=r(z−µ )/σ . Therefore, ∂ V/∂ z=rn/n−1 (1/nr)−β r(z−µ )/σ . Thus, if, ∂ V s/∂ z≥ ∂ V R/∂ z , then −β r(z−µ S)/σ S≥ −β r(z−µ R)/σ R. That is, (z−µ S)/σ S≤ (z−µ R)/σ R or z≤ µ Sσ R−µ Rσ SR−σ S . This is not guaranteed and will depend on all the constituents of S and R. Assume that for z this condition is not satisfied. Then, the corresponding second gamble (R ) will be preferred over the corresponding first gamble (S ), that is, a violation of type SR will be observed. Note that this condition (z≤ µ Sσ R−µ Rσ SR−σ S) is not dependent on θ , α or β . Thus, the same pattern applies to the gambles with uniform probabilities as well and also for any value of the coefficients and the only type of violation predicted by SSOT is SR . In summary, violation of restricted branch independence is driven by the change in σ .

As an example from Birnbaum (2008, Table 4), for Problem 13.1, R is preferred over S and (z=5)≤ (µ Sσ R−µ Rσ SR−σ S=18). Thus, this preference holds as long as z≤ µ Sσ R−µ Rσ SR−σ S holds. However, for Problem 13.2, (z=111)>(µ Sσ R−µ Rσ SR−σ S=49), and the preference reversal is predicted.

Table 4: Violation of restricted branch independence in Birnbaum (2008) problems 13.1 (row 1) and 13.2 (row 2). While, R is preferred over S in 13.1, the preference switches in 13.2. Prior CPT is not, but prior SSOT and prior TAX are consistent with the observed data

4 Discussion

As the previous section shows, SSOT is capable of explaining several empirical phenomena explained by CPT and TAX both (fourfold pattern) or by TAX only (event-splitting effect, violations of stochastic dominance and violation of restricted branch independence).

Event-splitting effect and violations of stochastic dominance in the examples described above are related and are explained by the θ component under SSOT.

Violations of restricted branch independence are explained by the σ component.

4.1 The Opportunity-Threat Theory

Let S be a set of future states (sS) of the world of which exactly one state will obtain. Assume that it is unknown to the decision-maker as to which state will obtain. Further, assume that S can be mapped to a consequence set X through some function φ (s)=(x,p) where the first term (x) denotes the objective magnitude of the consequence and the second term (p) denotes the objective probability of that consequence. These objective probabilities sum to 1. In addition, assume that the outcome set X can be mapped by the decision-maker to a mental set M through some functions u(x)=u and π (p)=π corresponding to subjective or implied utilities and subjective or implied probabilities, respectively. These subjective or implied probabilities also sum to 1. Also, assume that the decision-maker is able to map this mental set M to a decision-making single number V (called value) such that V(M)=V.

Two key assumptions underlie this (M to V) mapping process:

  • First, the decision-maker has a referencing algorithm that generates reference with which M can be divided into two mutually exclusive and collectively exhaustive subsets M up (the upside set, containing elements considered more or equally preferred compared to reference) and M dn (the downside set, containing elements considered less preferred compared to reference).

  • Second, that there is available a netting algorithm that maps M up and M dn into Y up, the relative upside set, containing elements of M up net of reference and into Y dn, the relative downside set, containing elements of M dn net of reference), respectively.

With these assumptions, the following definitions are stated:

  1. 1. Y agg=agg(Y up,Y dn), where agg is a function that measures direction and impact of aggregation of Y up and Y dn .

  2. 2. Y dis=dis(Y up,Y dn), where dis is a function that measures direction and impact of distance between Y up and Y dn.

  3. 3. opportunity=Y agg>0, Y dis>0.

  4. 4. threat=Y agg<0, Y dis<0.

Then, the Opportunity-Threat Theory (OTT) asserts that

(5)

and that the decision-maker will prefer or be indifferent to M 1 compared to M 2 iff V(M 1)≥ V(M 2), except by way of error.

To illustrate, assume a roll of dice that pays $1, if rolled 1, $2, if rolled 2 etc. Thus, M = (1,1/6; 2,1/6; 3,1/6; 4,1/6; 5,1/6; 6,1/6). Further, assume an obvious reference point that is the average (3.5). Outcomes higher or equal to average are mapped to M up = (4,1/6; 5,1/6; 6,1/6) and rest are mapped to M dn = (1,1/6; 2,1/6; 3,1/6). Now, assume a simple netting algorithm that is to subtract the average from each of the outcomes. Thus, the relative sets are constructed as Y up = (0.5,1/6; 1.5,1/6, 2.5,1/6) and Y dn = (−2.5,1/6, −1.5,1/6, −0.5,1/6). To complete the illustration, assume agg(.) = EV(Y dn)+EV(Y up) and dis(.) = EV(Y dn)−EV(Y up) (so that it accounts for spread aversion). Then, these numbers are respectively, Y agg = 0 (note that it was a symmetric gamble) and Y dis = −1.5. Thus, opportunity = 0 and threat = −1.5. Assuming V(.) = reference + opportunity + threat, V = 3.5 + 0 − 1.5 = 2. Thus, this gamble will be valued at $2.00 instead of expected value of $3.50.

In general, OTT applies to cases involving monetary outcomes or otherwise. It allows incorporation of different measures of opportunity and threat. It also permits different attitudes to opportunity and threat. It does not require symmetry in attitudes in gains and losses domains. In moral situations, opportunity may lie in domain of morally correct and threat may lie in domain of morally incorrect. In such cases attitudes may be modelled with binary parameters.

Several parameters that can serve as reference have been discussed in the literature, for example, status quo (Reference ThalerThaler, 1980; Reference Samuelson and ZeckhauserSamuelson & Zeckhauser, 1988), omission (Reference Baron and RitovBaron & Ritov, 1994) or aspiration (Reference van de Ven and Dieciduevan de Ven & Diecidue, 2008). OTT allows incorporation of different points of reference and even multiple points of reference. In a special case, the point of reference happens to be Expected Utility. In that case, if either the agent is neutral to both opportunity and threat or net impact of opportunity and threat cancel out, the model reduces to Expected Utility.

4.2 A structural comparison of SSOT, CPT and TAX

To structurally compare SSOT with CPT and TAX, a working model of OTT was developed. Consider, X= (x 1,p 1;x 2,p 2x n,p n), with n denoting the number of exhaustive and mutually exclusive future states and ∑p i=1. Assume X up= (x 1,p 1;x 2,p 2x i,p ix k,p k) and X dn= (x k+1,p k+1;x k+2,p k+2x j,p jx n,p n), such that the upside set has k elements and the downside set has nk elements. Define, V(X up)= ∑(x i− µ ), i=1 … k and V(X dn)= ∑(x j− µ ), j=k+1 … n . Further, define V(O)=V(X up)+V(X dn) analogous to θ and V(T)=| V(X up)−V(X dn)| analogous to σ (using range as a measure of spread instead of standard deviation). Then, analogous to Equation 2,

(6.1)

where and α and β are coefficients for respective terms.

Now, assuming non-negative domain (b=−1) and for simplicity V(X O)−V(X T)>0, expansion of all the terms in Equation 5 yields,

(6.2)

where w i=(α−β)+{ 1−(α−β)k−(α)(nk)} p i and w j=(α )+{ 1−(α−β )k−(α )(nk)} p j.

Equation 6.2 reveals that there is an implied rank-order. However, there are only two ranks — greater than expected value and lower than expected value. Also, the weights carry a component that is not a product of p . Thus, the SSOT model is significantly different from CPT. Now, Equation 6.2 is also analogous to a two-branch gamble. Clearly, there is transfer of weight from the upper branch to the lower branch. SSOT thus has similarities with TAX. However, in this formulation, all gambles reduce to a two-branch gamble. Therefore, potentially, there could be differences from TAX that will need to be explored.

SSOT, in this paper is shown to explain certain key phenomena underlying the new paradoxes. TAX has been very extensively studied and explains a wide range of empirical findings. SSOT may or may not be able to explain all those findings. Also, TAX and SSOT treat probabilities in a fundamentally different manner (non-linear vs. linear, respectively). I thus speculate that TAX cannot be a special case of SSOT, although under limiting conditions (for example, binary gambles with equal probabilities) SSOT and special TAX appear identical.

4.3 Areas of future research and conclusion

Further, areas of future research should include exploration of nature and stability of the coefficients α and β used in SOT. In SSOT, a single value of α and a single value of β was assumed for convenience. One question is whether these coefficients should have different values in different domains (positive, negative and mixed). Moreover, SOT should be extended to a stochastic model and to probability distributions that may not be discrete. The nature and impact of error should also be explored. Another important area will be to understand how this model can be applied in ambiguous (Reference EllsbergEllsberg, 1961; Reference Camerer and WeberCamerer & Weber, 1992) situations. Implications forinvestment decisions (Reference MarkowitzMarkowitz, 1952), in particular, also remain to be explored.

In conclusion, a new theory of decision-making under risk is proposed. This Opportunity-Threat theory relies on analyzing risk into its components. A simplified special model (SSOT) of this theory is able to explain a range of empirical phenomena that are explained by TAX but not by CPT.

Appendix: Derivation of θ and ψ parameters

Special Opportunity-Threat (SOT) model introduces parameters θ and ψ , which are derived as shown in Figure 1:

Figure 1: Consider a simple binary gamble with utility, probability pairs (u 1, p 1;u 2, p 2), where u 2>u 1>0 and p 1+p 2=1. Panel a shows the expected value µ that is analogous to the center of gravity balancing the weights of the shaded areas. Imagine that the decision-maker wants to find a value equivalent µ that is certain (p=1). This then becomes the decision-enabling center of gravity (µ ,1) shown in panel b.

Following Figure 1, characterize the linear shift (on x-axis) as an aggregation parameter, net of upside and downside, θ = µ − µ. Now, if µ plays the role of center of gravity, (1−p i)(u i−µ)=0. Simple expansion leads to (u i−µ)−p i(u i−µ )=nū−nµ −µ +µ =0, where . That gives, µ =nū−µ /n−1. Thus, θ =µ − µ =nū−µ /n−1−µ =n(ū−µ )/(n−1). Alternatively, θ can be viewed as sum of (u i−µ ) residuals divided by the degree of freedom (n−1).

Now, only a fraction of this factor is actually incorporated in the decision-making process depending on psychological weighting. Thus, the center of gravity ends up at µ′′=µ + α θ (µ′′ is not shown in the figure). Finally, distance parameter is calculated as standard deviation of outcome values around this new point. . Now, . Thus, ψ = { σ 2+ (α θ )2} 1/2.

Footnotes

I thank Bruce Car for reviewing an earlier version of this paper. I greatly benefitted from extensive feedback on subsequent versions from Konstantinos Katsikopoulis and Jonathan Baron. I am indebted to Michael Birnbaum for his significant guidance that strongly influenced this work. Support from Bristol-Myers Squibb is gratefully acknowledged. Most of the work was conducted during my tenure at the Biocon BMS R&D Center in Bangalore, India.

1 The Appendix shows the derivation of θ and ψ.

2 For simple binary gambles (x,p;0,1−p), with x>0 and typical α =1/8, (α θ /σ )2=(1−2p)2/64p(1−p) has its minimum value at p=1/2, where it equals 0. The expression (α θ /σ )2 increases in value as p moves towards 0 or 1. Even at p=0.05 (or, 0.95), (α θ /σ )2=0.26, only.

3 It is important to note that none of traditional measures of higher moments will change either, since for a moment of order m, p(xpx)m+(1−p)(0−px)m=(pr)(xpx)m+r(xpx)m+(1−p)(0−px)m. Thus, no moments-only model (for example, mean-variance or mean-variance-skewness models) will be able to explain change in value due to event-splitting.

References

Allais, M. (1953). L’extension des théories de l’équilibre économique général et du rendement social au cas du risque. Econometrica, Journal of the Econometric Society, 269-290.CrossRefGoogle Scholar
Baron, J., & Ritov, I. (1994). Reference points and omission bias. Organizational Behavior and Human Decision Processes, 59, 475-498.CrossRefGoogle Scholar
Birnbaum, M. H. (1974). The nonadditivity of personality impressions. Journal of Experimental Psychology Monograph, 102, 543-561.CrossRefGoogle ScholarPubMed
Birnbaum, M. H. (2007). Tests of branch splitting and branch-splitting independence in Allais paradoxes with positive and mixed consequences. Organizational Behavior and Human Decision Processes, 102, 154-173.CrossRefGoogle Scholar
Birnbaum, M. H. (2008). New paradoxes of risky decision making. Psychological Review, 115(2), 463-501.CrossRefGoogle ScholarPubMed
Birnbaum, M. H., & Chavez, A. (1997). Tests of theories of decision making: Violations of branch independence and distribution independence. Organizational Behavior and Human Decision Processes, 71(2), 161-194.CrossRefGoogle Scholar
Birnbaum, M. H., & Stegner, S. E. (1979). Source credibility in social judgment: Bias, expertise, and the judge’s point of view. Journal of Personality and Social Psychology, 37(1), 48-74.CrossRefGoogle Scholar
Camerer, C., & Weber, M. (1992). Recent developments in modeling preferences: Uncertainty and ambiguity. Journal of Risk and Uncertainty, 5, 325-370.CrossRefGoogle Scholar
Ellsberg, D. (1961). Risk, ambiguity, and the Savage axioms. The Quarterly Journal of Economics, 643-669.CrossRefGoogle Scholar
Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision under risk. Econometrica, 47, 263-291.CrossRefGoogle Scholar
Markowitz, H. (1952). Portfolio selection. The Journal of Finance, 7(1), 77-91.Google Scholar
Samuelson, W., & Zeckhauser, R. (1988). Status quo bias in decision making. Journal of Risk and Uncertainty, 1(1), 7-59.CrossRefGoogle Scholar
Thaler, R. (1980). Toward a positive theory of consumer choice. Journal of Economic Behavior & Organization, 1(1), 39-60.CrossRefGoogle Scholar
Tversky, A., & Kahneman, D. (1992). Advances in prospect theory: Cumulative representation of uncertainty. Journal of Risk and Uncertainty, 5(4), 297-323.CrossRefGoogle Scholar
van de Ven, J., & Diecidue, E. (2008). Aspiration level, probability of success and failure, and expected utility. International Economic Review, 49, 683-700.Google Scholar
Von Neumann, J., & Morgenstern, O. (1944). Game theory and economic behavior. Princeton, Princeton University.Google Scholar
Figure 0

Table 1: Fourfold pattern shown with experimental dataset for gambles of type (x,p;0,1−p) from Tversky & Kahneman (1992). SSOT, CPT and TAX, all three are able to explain the fourfold pattern. However, SSOT analyzes risk into opportunity and threat components

Figure 1

Table 2: Event-splitting problems 1.1 (row 1) and 1.2 (row 2) from Birnbaum (2008). Prior CPT does not, but prior SSOT and prior TAX predict preference reversal due to event-splitting of gambles in 1.2

Figure 2

Table 3: Violation of stochastic dominance in Birnbaum (2008) problem 3.1.Values α (θ +− θ )≈ −α (1−p)x/2=−0.6 and α (θ −θ )≈ −α px/2=−5.4 predict slight reduction in value moving from G0 to G+ and relatively higher increase in value moving from G0 to G. Prior CPT is not, but prior SSOT and prior TAX are consistent with the observed data

Figure 3

Table 4: Violation of restricted branch independence in Birnbaum (2008) problems 13.1 (row 1) and 13.2 (row 2). While, R is preferred over S in 13.1, the preference switches in 13.2. Prior CPT is not, but prior SSOT and prior TAX are consistent with the observed data

Figure 4

Figure 1: Consider a simple binary gamble with utility, probability pairs (u1, p1;u2, p2), where u2>u1>0 and p1+p2=1. Panel a shows the expected value µ that is analogous to the center of gravity balancing the weights of the shaded areas. Imagine that the decision-maker wants to find a value equivalent µ that is certain (p=1). This then becomes the decision-enabling center of gravity (µ ,1) shown in panel b.

Supplementary material: File

Pandey supplementary material

Pandey supplementary material
Download Pandey supplementary material(File)
File 148.3 KB