Eszter Babarczy: Community Based Trust on the Internet

Total Page:16

File Type:pdf, Size:1020Kb

Eszter Babarczy: Community Based Trust on the Internet PTE BTK Nyelvtudományi Doktori Iskola Kommunikáció Doktori Program Babarczy Eszter: Community Based Trust on the Internet Doktori értekezés Témavezető: Horányi Özséb egyetemi tanár 2011. 1 Community-based trust on the internet Tartalom Introduction .................................................................................................................................................. 3 II. A very brief history of the internet ........................................................................................................... 9 Early Days ............................................................................................................................................... 11 Mainstream internet .............................................................................................................................. 12 The internet of social software .............................................................................................................. 15 III Early trust related problems and solutions ............................................................................................ 20 Trading .................................................................................................................................................... 20 Risks of and trust in content ....................................................................................................................... 22 UGC and its discontents: Wikipedia ....................................................................................................... 24 Mechanical peers and false perceptions: the Twitter revolution .............................................................. 29 Internet identity risks ................................................................................................................................. 44 IV. The first trust mechanisms online: lessons of Ebay and the Prisoners’ Dilemma ................................ 50 The role of communities ........................................................................................................................ 61 Geo-cities: community and the exit option ............................................................................................ 63 World-of-mouth reputations .................................................................................................................. 64 A reputation economy? .............................................................................................................................. 66 V. Online tribes: the relevance of rich membership in creating trust ........................................................ 73 Hacker ethos: a meritocracy of peers ........................................................................................................ 87 Exploiting trust online ............................................................................................................................ 94 Internet cowboys and the creation of the Internet community utopia ..................................................... 96 Founding fathers and the Facebook model .............................................................................................. 101 Core members and seniors ....................................................................................................................... 107 VI. Conclusions – the uses of game theory in explaining internet reputation mechanisms and internet communities ............................................................................................................................................. 110 References ................................................................................................................................................ 145 2 Introduction Trust has many definitions and can be applied in many settings (see Tilly, 2010; Hardin, 2002 and 2005; Sztompka 1999; Gambetta 1996). Most people trust their relatives and close friends. I trust my washing machine (not to break down). I may trust the government or any of its institutions or services. I often trust vendors, postmen, repair men, kindergarten teachers, etc, to perform the services I buy from them. I might have trust in my future, or the future of my children. Scholars trust publications that have a high impact value, and trust colleagues who publish in such publications. People trust television news although they might feel deep distrust for journalists. To put it in a more succinct form, trust can be applied to natural persons (including self), persons-in-a-role (roles), institutions and content of any kind. In English we might use different terms for these varieties of trust. Self-trust would be properly called self-confidence. Trusting your child's abilities or future can also have the linguistic form of „being confident about” them. You can say you find this or that publication reliable. You can also say you know you can always count on your family. Scholarly journals might have a good (or bad) reputation; the same applies to individual scholars, certain commercial services or firms, etc. Some journalists, community leaders or business partners can be regarded as trustworthy. In this chapter I'll stuck to the word „trust” for the simple reason that English synonyms might reflect useful nuances but in other languages – such as my mother tongue, Hungarian – these nuances are either lacking, or apply to different concepts and situations of trust. However, I will add “trustworthy” , and a concept that has no English equivalent – in Hungarian it is “bizalomgerjesztő”; meaning that something or someone looks or seems dependable, or inspires trust (more about this will be discussed in the last case study). Interestingly, it is used mostly in a negated form: someone or something does not look dependable or inspire trust. In trust-research standard survey techniques usually distinguish generalized trust; an attitude that characterizes the person (trusting or not trusting) on a scale, a personality trait that might of course reflect previous experiences, and trust or institutional trust that applies to specific situations where trust (and its degrees) reflect a relation between trustee and trusted. It is also assumed that generalized trust is an indicator of the willingness to take risks (in general), while institutional trust implies an awareness of a specific risk with reference to the specific 3 relationship or action between the person and the institution, role or other person that she/he has some affair with. On the internet, an example of high generalized trust (or interpersonal trust) could be the attitude of a teenager on an IRC channel, chatting with “nicks” or online personae and giving away information concerning herself. The other form of trust implies some form of transaction where an internet user wishes to use a service or buy something from a stranger and takes precautions against being cheated or any other harm that might hit him. Early internet trust research focused on transactional trust (including artificial agents). Paul Resnick proved that there was a price premium for high reputation sellers on Ebay – meaning that people are more willing to buy, even at a higher price, from people who have a “good trust history”. I use this term to indicate the similarity of Ebay reputation and credit histories that most US banks keep, or, for new clients, ask for to establish the creditworthiness of an individual. In this sense, granting credit or granting trust in a given transaction are very similar, despite the difference of the setting and the mechanics of establishing a “history”. If we go further (both in time and in generalization), we can link early word-of-mouth referrals in long- distance commerce, Chinese guanxi, the Zagat dining guidebook and social networks – in a way, these are all techniques, or can be used as techniques, to establish “histories” that are relevant to judging the trustworthiness of a person, a service or an institution. A word of caution is needed here. Ebay reputation mechanisms, word-of-mouth in commerce and – to some extent – guanxi are solutions to what game theorists call “the prisoners' dilemma”. Zagat and Facebook are not PD-related. Not all “trailing” solutions to trust can be analysed in terms of strategic interactions – on the contrary. In the next chapter I'll try to argue that although eBay is seen as a pure form of iterated n-person PD, this is an oversimplification. If we wish to understand where trust is needed, how trust works and what specific risks and techniques dealing with these risks arise on the internet, we have to go beyond game theoretical models. When I submitted my dissertation proposal – in 2002 – I did not foresee how long it would take for me to finish writing. What was all excitement in 2002 became commonplace by 2010. On the other hand, since 2002 several new services have been created that both pose and/or solve new problems of trust and reputation. During the weeks I typed up my dissertation, at least three new services were launched – and these are only the services I that came to my attention while also writing a dissertation that took up most of my resources that I usually dedicate to monitor online developments. 4 In this paper I develop three hypotheses and put forward arguments to support them. If I use some empirical research, this is usually second-hand or ad-hoc research that I conducted on the internet. The arguments I develop here are theoretical
Recommended publications
  • Generation Based Analysis Model for Non-Cooperative Games
    Generation Based Analysis Model for Non-Cooperative Games Soham Banerjee Department of Computer Engineering International Institute of Information Technology Pune, India Email: [email protected] Abstract—In most real-world games, participating agents are to its optimal solution which forms a good base for comparison all perfectly rational and choose the most optimal set of actions for the model’s performance. possible; but that is not always the case while dealing with complex games. This paper proposes a model for analysing II. PROPOSED MODEL the possible set of moves and their outcome; where not all participating agents are perfectly rational. The model proposed is The proposed model works within the framework of pre- used on three games, Prisoners’ Dilemma, Platonia Dilemma and determined assumptions; but may be altered or expanded to Guess 2 of the Average. All the three games have fundamental 3 other games as well. differences in their action space and outcome payoffs, making them good examples for analysis with the proposed model. • All agents have infinite memory - this means that an agent Index Terms—game theory, analysis model, deterministic remembers all previous iterations of the game along with games, superrationality, prisoners’ dilemma, platonia dilemma the observation as well as the result. • All the games have a well-defined pure strategy Nash Equilibrium. I. INTRODUCTION • The number of participating agents is always known. • All the games are non co-operative - this indicates that the While selecting appropriate actions to perform in a game, agents will only form an alliance if it is self-enforcing. a common assumption made is that, all other participating agents (co-operative or not) will make the most optimal move Each participating agent is said to posses a Generation of possible.
    [Show full text]
  • Villager's Dilemma
    Villager's dilemma Beihang He Advertisement 0702,Department of Arts and Communication, Zhejiang University City College No.51 Huzhou Street Hangzhou Zhejiang, 310015 Tel: 13906539819 E-mail: [email protected] 1 Abstract:With deeper study of the Game Theory, some conditions of Prisoner’s Dilemma is no longer suitable of games in real life. So we try to develop a new model-Villager’s Dilemma which has more realistic conditions to stimulate the process of game. It is emphasize that Prisoner’s Dilemma is an exception which is lack of universality and the importance of rules in the game. And it puts forward that to let the rule maker take part in the game and specifies game players can stop the game as they like. This essay describes the basic model, the villager’s dilemma (VD) and put some extended use of it, and points out the importance of rules and the effect it has on the result of the game. It briefly describes the disadvantage of Prisoner’s Dilemma and advantage Villager’s Dilemma has. It summarizes the premise and scope of application of Villager’s Dilemma, and provides theory foundation for making rules for game and forecast of the future of the game. 2 1. Basic Model In the basic model, the villager’s dilemma (VD) is presented as follows: Three villagers who have the same physical strength and a robber who has two and a half times physical strength as three villagers are living in the same village. In other words, three villagers has to act together to defeat the robber who is stronger than anyone of them.
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • Internet... the Final Frontier. Eine Ethnographie. Schlußbericht Des Projekts 'Interaktionsraum Internet. Netzkultur Und Ne
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Research Papers in Economics econstor www.econstor.eu Der Open-Access-Publikationsserver der ZBW – Leibniz-Informationszentrum Wirtschaft The Open Access Publication Server of the ZBW – Leibniz Information Centre for Economics Helmers, Sabine; Hoffmann, Ute; Hofmann, Jeanette Working Paper Internet... the final frontier: Eine Ethnographie. Schlußbericht des Projekts Interaktionsraum Internet. Netzkultur und Netzwerkorganisation Schriftenreihe der Abteilung Organisation und Technikgenese des Forschungsschwerpunktes Technik-Arbeit-Umwelt am Wissenschaftszentrum Berlin für Sozialforschung, No. FS II 98-112 Provided in cooperation with: Wissenschaftszentrum Berlin für Sozialforschung (WZB) Suggested citation: Helmers, Sabine; Hoffmann, Ute; Hofmann, Jeanette (1998) : Internet... the final frontier: Eine Ethnographie. Schlußbericht des Projekts Interaktionsraum Internet. Netzkultur und Netzwerkorganisation, Schriftenreihe der Abteilung Organisation und Technikgenese des Forschungsschwerpunktes Technik-Arbeit- Umwelt am Wissenschaftszentrum Berlin für Sozialforschung, No. FS II 98-112, http:// hdl.handle.net/10419/49813 Nutzungsbedingungen: Terms of use: Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, The ZBW grants you, the user, the non-exclusive right to use räumlich unbeschränkte und zeitlich auf die Dauer des Schutzrechts the selected work free of charge, territorially unrestricted and beschränkte einfache Recht ein, das ausgewählte Werk im Rahmen within the time limit of the term of the property rights according der unter to the terms specified at → http://www.econstor.eu/dspace/Nutzungsbedingungen → http://www.econstor.eu/dspace/Nutzungsbedingungen nachzulesenden vollständigen Nutzungsbedingungen zu By the first use of the selected work the user agrees and vervielfältigen, mit denen die Nutzerin/der Nutzer sich durch die declares to comply with these terms of use.
    [Show full text]
  • Arxiv:1802.06888V1 [Cs.AI] 5 Jan 2018 Superrational Types
    Superrational types Fernando A. Tohm´e 1,2 and Ignacio D. Viglizzo2,3 1Departmento de Econom´ıa, Universidad Nacional del Sur (UNS), Bah´ıa Blanca, Argentina 2Instituto de Matem´atica de Bah´ıa Blanca (INMABB), Universidad Nacional del Sur-CONICET, Bah´ıa Blanca, Argentina 3Departmento de Matem´atica, Universidad Nacional del Sur (UNS), Bah´ıa Blanca, Argentina July 2, 2018 Abstract We present a formal analysis of Douglas Hofstadter’s concept of superrationality. We start by defining superrationally justifiable ac- tions, and study them in symmetric games. We then model the beliefs of the players, in a way that leads them to different choices than the usual assumption of rationality by restricting the range of conceivable choices. These beliefs are captured in the formal notion of type drawn from epistemic game theory. The theory of coalgebras is used to frame type spaces and to account for the existence of some of them. We find conditions that guarantee superrational outcomes. arXiv:1802.06888v1 [cs.AI] 5 Jan 2018 1 Introduction Game Theory has, traditionally assumed that agents make decisions accord- ing to the criterion of full rationality [7]. In contrast to the case of bounded rationality ([24], [21]), agents choose the best actions to achieve their goals without limitations to their ability to do so. The research on behavioral fac- tors in decision-making, initiated by Kahneman and Tversky ([13]) lead to a dearth of results under weaker rationality assumptions. On the other hand, 1 the interest in overcoming “undesirable” results such as inefficient equilibria in social dilemmas lead to alternative concepts, diverging from the rationality assumption [12], [19].
    [Show full text]
  • Jargon File, Version 4.0.0, 24 Jul 1996
    JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well.
    [Show full text]
  • How Much Is Convenient to Defect? a Method to Estimate the Cooperation
    How much is convenient to defect ? A method to estimate the cooperation probability in Prisoner’s Dilemma and other games Cesco Reale ∗ 1st version: 28.8.2010, last update: 19.1.2014 Sommario In many cases the Nash equilibria are not predictive of the ex- perimental players’ behaviour. For some games of Game Theory it is proposed here a method to estimate the probabilities with which the different options will be actually chosen by balanced players, i.e. players that are neither too competitive, nor too cooperative. This will allow to measure the intrinsec cooperativeness degree of a game, only in function of its payoffs. The method is shaped on the Priso- ner’s Dilemma, then generalized for asymmetric tables, N players and N options. It is adapted to other conditions like Chicken Game, Battle of the Sexes, Stag Hunt and Translators (a new name proposed for a particular condition). Then the method is applied to other games like Diner’s Dilemma, Public Goods Game, Traveler’s Dilemma and War of Attrition. These games are so analyzed in a probabilistic way that is consistent to what we could expect intuitively, overcoming some arXiv:1404.2306v1 [math.OC] 17 Feb 2014 known paradoxes of the Game Theory. En multaj kazoj la Nash ekvilibroj ne anta˘udiras la eksperimentan konduton de la ludantoj. Por iuj ludoj de Ludteorio estas proponata ˆci-tie metodo por taksi la probablojn la˘ukiuj la malsamaj opcioj estos fakte elektataj far ekvilibraj ludantoj, t.e. ludantoj kiuj estas nek tro konkuremaj, nek tro kunlaboremaj. Tio permesos anka˘umezuri ∗Italian Festival of Mathematical Games.
    [Show full text]
  • Similarity As an Extension of Symmetry and Its Application to Superrationality
    Similarity as an Extension of Symmetry and its Application to Superrationality 1 Carlos Maximiliano Senci http://orcid.org/0000-0001-9131-3843 1IIESS-Conicet and Departamento de Humanidades-UNS Bahía Blanca, Buenos Aires Argentina [email protected] 2 Fernando Abel Tohmé https://orcid.org/0000-0003-2988-4519 2IMABB-Conicet and Dept. of Economics-UNS Bahía Blanca , Buenos Aires Argentina [email protected] Article Info CDD: 501 Received:05.11.2020; Revised: 01.02.2021; Accepted: 05.03.2021 https://doi.org/10.1590/0100-6045.2021.V44N2.CF Keywords: Game theory Symmetry Similarity Superrationality Abstract: In this paper we present a concept of similarity in games, on which to ground alternative solution concepts, some of which differ from the classical notions in the field. Manuscrito – Rev. Int. Fil. Campinas, v. 44, n. 2, pp. 128-156, Apr.-Jun. 2021. Similarity as an Extension of Symmetry and its... 129 In order to do this we impose a constraint on players’ be- liefs that amounts to a variant of the well-known symmetry principle in classical bargaining theory. We show how this similarity relation helps to identify different Nash equilibria in games, and how these “similar Nash equilibria” can be extended to non-symmetric games. While the notion is nor- mative, it is nonetheless inspired by phenomena in which similarities between players lead to outcomes detected in behavioral studies. We study the strategic properties of the concept of similarity and discuss its relationships with Hofstadter’ notion of superrationality. 1 Introduction As we know, Game Theory studies situations of inter- action between intentional agents.
    [Show full text]
  • 108 Perspectives on Bounded Rationality By: Robert Aumann The
    108 Perspectives on Bounded Rationality by: Robert Aumann The Hebrew University of Jerusalem Research supported by the National Science Foundation under grant IRI- 8814953. Previous versions of this work were presented as the Nancy L. Schwartz Memorial Lecture at Northwestern University in 1986, and at a workshop on Bounded Rationality at the Institute for Mathematical Studies in the Social Sciences (Economics), Stanford University, July, 1989. Contents 0. Introduction 1. Evolution 2. Perturbations and Rationality 3. Automata, Computers, Turing Machines 4. Relaxation of Rationality Postulates 5. An Open Problem 1. Introduction Economists have for long expressed dissatisfaction with the complex models of strict rationality that are so pervasive in economic theory. There are several ob- jections to such models. First~ casual empiricism or even just simple introspection lead to the conclusion that even in quite simple decision problems, most economic agents are not in fact maximizers, in the sense that they do not scan the choice set and consciously pick a maximal element from it. Second, such maximizations are often quite difficult, and even if they wanted to, most people (including economist- s and even computer scientists) would be unable to carry them out in practice. Third, polls and laboratory experiments indicate that people often fail to conform to some of the basic assumptions of rational decision theory. Fourth, laboratory experiments indicate that the conclusions of rational analysis (as distinguished from the assumptions) sometimes fail to conform to "reality." And finally, the conclusions of rational analysis sometimes seem unreasonable even on the basis of simple introspection. From my point of view, the last two of the above objections are more corn- Perspectives on Bounded Rationality 109 pelling than the first three.
    [Show full text]
  • Handling Information Overload on Usenet
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NORA - Norwegian Open Research Archives UNIVERSITY OF OSLO Department of Informatics Handling Information Overload on Usenet Advanced Caching Methods for News Jan Ingvoldstad Cand Scient Thesis 4th August 2001 Abstract Usenet is the name of a world wide network of servers for group communica- tion between people. From 1979 and onwards, it has seen a near exponential growth in the amount of data transported, which has been a strain on band- width and storage. There has been a wide range of academic research with focus on the WWW, but Usenet has been neglected. Instead, Usenet’s evolu- tion has been dominated by practical solutions. This thesis describes the history of Usenet in a growth perspective, and introduces methods for collection and analysis of statistical data for testing the usefulness of various caching strategies. A set of different caching strategies are proposed and examined in light of bandwidth and storage demands as well as user perceived performance. I have shown that advanced caching methods for news offers relief for reading servers’ storage and bandwidth capacity by exploiting usage patterns for fetching or prefetching articles the users may want to read, but it will not solve the problem of near exponential growth nor the problems of Usenet’s backbone peers. Preface When I first started my studies at the University in Oslo in the autumn of 1991, I thought I was going to be a mathematician, and followed my first class in university level mathematics with vigor.
    [Show full text]
  • Demystifying Paradoxes from Physics to Ethics Gary L
    Drescher_jkt.qxd 4/6/06 9:18 AM Page 1 PHILOSOPHY/COGNITIVE SCIENCE Drescher Gary L. Drescher good and real good and real Demystifying Paradoxes from Physics to Ethics Gary L. Drescher “A breathtakingly original assault on all the Big Issues! When philosophers get stuck in ruts, it often takes a brilliant out- Demystifying Paradoxes from Physics to Ethics sider to jolt them onto new ground, and Gary Drescher, coming to philosophy from AI, offers a startling feast of new In Good and Real, Gary Drescher examines a series of provocative ideas. I’m sure some of them are right, but I can’t tell which! Can you?” and real good paradoxes about consciousness, choice, ethics, quantum mechanics, —Daniel Dennett, author of Brainchildren, Sweet Dreams, and Breaking the Spell and other topics, in an effort to reconcile a purely mechanical view “Gary Drescher thinks that attempts to solve the deep problems that have stumped philosophers since time immemorial— of the universe with key aspects of our subjective impressions of or have caused them to resort to silly answers—have been thwarted largely by a set of relatively simple yet significant our own existence. misunderstandings in logic and physics. He is right about that, and his careful debunkings and explanations are clear and Many scientists suspect that the universe can ultimately be compelling. He also believes that by avoiding those errors, he has found solutions to the weightiest of those problems— described by a simple (perhaps even deterministic) formalism; in particular, the true nature of right and wrong and the true nature of subjective sensation and consciousness.
    [Show full text]
  • A Comparison of Decision Algorithms on Newcomblike Problems
    MIRI MACHINE INTELLIGENCE RESEARCH INSTITUTE A Comparison of Decision Algorithms on Newcomblike Problems Alex Altair MIRI Research Fellow Abstract When formulated using Bayesian networks, two standard decision algorithms (Eviden- tial Decision Theory and Causal Decision Theory) can be shown to fail systematically when faced with aspects of the prisoner’s dilemma and so-called “Newcomblike” prob- lems. We describe a new form of decision algorithm, called Timeless Decision Theory, which consistently wins on these problems. Altair, Alex. 2013. A Comparison of Decision Algorithms on Newcomblike Problems. Machine Intelligence Research Institute, Berkeley, CA. Alex Altair 1. Three Decision Algorithms Decision theory typically analyzes two main decision algorithms known as Evidential Decision Theory (EDT) and Causal Decision Theory (CDT).1 When formalized using Bayesian networks, CDT and EDT can both be shown to return the wrong results on certain types of decision problems known as Newcomblike problems (named after the original “Newcomb’s problem”). Systematically achieving the correct results when faced with these problems is essential for decision-theoretic qualities like dynamic consistency and the ability to model the self.2 Much work is dedicated to finding algorithms that maximize expected utility on these problems (for example, Wedgwood [2011]). In this paper we will consider such an alternative algorithm proposed by Yudkowsky (2010), called Timeless Decision Theory (TDT), which was inspired by Douglas Hofstadter’s notion of “superrationality” (Hofstadter 1985). All decision algorithms described in this paper can be formalized to use Bayesian networks (after Pearl [2009]) introduced in section 2. Using these, we demonstrate the undesirable results returned by EDT on a version of the so-called medical Newcomb’s problem (section 3) and by CDT on the prisoner’s dilemma (section 4).
    [Show full text]