1 Introduction
Expected Utility Theory (EUT) (Reference Von Neumann and MorgensternVon Neumann & Morgenstern, 1944) is the most widely accepted normative theory of decision-making under risk. However, as demonstrated by the Allais Paradox (Reference AllaisAllais, 1953), EUT does not accurately describe how people decide when presented choices between risky prospects. Many theories have been proposed to account for the Allais paradoxes. Two classes of models that have been the focus of recent experimental work are original and cumulative prospect theory (Reference Kahneman and TverskyKahneman & Tversky, 1979; Reference Tversky and KahnemanTversky & Kahneman, 1992) and configural weight models (Reference BirnbaumBirnbaum, 1974; Reference Birnbaum and StegnerBirnbaum & Stegner, 1979), including the Transfer of Attention Exchange (TAX) model of Reference Birnbaum and ChavezBirnbaum & Chavez (1997). This paper proposes an alternative, called the Opportunity-Threat Theory (OTT) and shows how a simplified special model of OTT (SSOT) can explain the classic fourfold pattern of risk attitude as well as key features of the “new paradoxes” (Reference BirnbaumBirnbaum, 2008) that refute the prospect models in favor of the configural weight models. In particular, the new model can account for event-splitting effect, violation of stochastic dominance and violation of restricted-branch independence.
The intuitions behind OTT are rather simple. People are influenced not only by the expected results of their actions, but also are affected by two components of risk, opportunity and threat. A model in which expectation, opportunity, and threat aggregate to form the evaluation of a risky prospect will be presented first in a simple form, to show that it can account for empirical phenomena. Comparisons with alternative approaches and ways in which the simple model might be generalized will be taken up in the discussion.
2 A Special OTT (SOT) Model of Risky Decision Making
Let M refer to a risky gamble of the form M= (x 1,p 1;x 2,p 2… x i,p i… x n,p n), which represents a lottery in which there are exactly n possible mutually exclusive and exhaustive consequences. Consequence x i occurs with probability p i and the sum of the probabilities is 1. The expected value of such a gamble, EV, is given by Equation 1:
Expected utility theory (EUT) allows that utilities (subjective values) of the consequences may be a nonlinear function of the monetary values of the consequences, u i=u(x i). The expected utility of the gamble is µ :
Under SOT, µ =EU can be viewed as a reference. With at least two unequal consequences, there will be at least one that will be preferred to µ , and at least one over which µ will be preferred. The present model adds two risk components to expected utility; the first of these components is a risk factor due to asymmetry and the second is a risk factor due to variation.
It is useful to define the average utility of the consequences in a gamble, ū computed as if each consequence is equally likely:
When there are two or more consequences, the difference between the average utility of the consequences and the expected utility of consequences is used to define the asymmetry component of the model, θ , as follows:
A negative deviation is perceived as threat (the possibility of landing below the reference). A positive deviation is perceived as opportunity (the possibility of landing above the reference).
The variation component of the model, ψ , is defined as follows:
where α is a parameter representing the weight of the θ component and σ is the standard deviation,
It has been found that people are typically risk averse for positive valued gambles and typically risk seeking for negative valued gambles; therefore, to account for this empirical finding, a multiplier of ψ , b, reflecting the sign of µ is used, as follows:
When all the u values are non-negative (µ ≥ 0), spread is perceived as threat (the possibility of landing below the reference ); b=−1. On the other hand, when all the u values are negative (µ <0), spread is perceived as opportunity (the possibility of landing above the reference ): b=+1. For mixed cases with both positive and negative outcomes, sign of µ determines the sign of b.
The overall evaluation of a gamble, V, for gambles with two or more possible consequences is a linear combination of all three components, as follows:
where coefficients α and β represent psychological weights assigned to θ and ψ respectively; and ε is an error term. For the case of n=1, V=u. The SOT model is idempotent, reducing to V=u, when all outcomes are equal. When given a choice between two gambles, the decision maker chooses the option with the higher evaluation, V, apart from error.
Equation 2.7 shows that SOT reduces to EU when α = β = 0, or when α θ + β b ψ =0. When θ = 0, V= µ + β b σ + ε , which is a special case of the TAX model when n = 2.Footnote 1
2.1 Simplified special opportunity-threat (SSOT) model
For some situations, it may be possible to use a simplified version of SOT. Consider cases where outcomes are monetary and within a relatively narrow range allowing u(x)=x. Further, assume that values of p are non-extreme allowing the approximation, ψ = σ .Footnote 2 For simplicity, it will be assumed that there are no errors. Equation 3 represents the simplified SOT (SSOT) model
For simplification, it is assumed that coefficients α and β do not change due to change in domains (positive to negative or vice versa). Examples in this paper use this SSOT model unless otherwise mentioned. It is noted that SSOT model reduces to Expected Value when α = β = 0, or when α θ + β bσ =0 .
2.2 Constraints and coefficients
Consider the case of binary gambles (x,p;0,1−p), with x>0; here, n=2 and µ =p x. From Equation (2.3), θ =x/2−px/2−1/2=(1−2p)x and from Equation (2.5), σ 2=p (x−xp)2+(1−p) (0−xp)2={ p(1−p)} x 2 . Since µ is non-negative, b= −1. Therefore,
transforming to:
Now, constraints 0<V/x<1 and 0<p<1 are applied. They set the boundary conditions such that even for the smallest probability of smallest positive value of x, V does not reduce to zero. Further, even for the smallest probability of x not obtaining, magnitude of V remains positive under certain x. Then, at p=1/2, from Equation 4.2, V/x=1/2−β /2 . Thus, 0<1/2−β /2<1 , which implies −1<β <1. Also, for p∼ 0, V/x ≈ α , thus 0<α <1.
For estimation of β , consider a mixed outcome experiment with only two possible outcomes with equal probabilities ( x 1,1/2;−x 2,1/2) and observed V=0. Given symmetric distribution, θ =0, giving, V=0= µ − β σ , or, β = µ /σ . Now, µ =1/2x 1−1/2x 2. Also, σ 2=1/2(x 1−µ )2+ 1/2 (−x 2−µ )2=1/2(x 1−1/2x 1+1/2x 2)2+ 1/2 (−x 2−1/2x 1+1/2x 2)2. That yields, σ =1/2x 1+1/2x 2. Thus, β = µ /σ = x 1−x 2/x 1+x 2. Reference Tversky and KahnemanTversky & Kahneman (1992) reported four problems of this kind that yield β =0.42, 0.34, 0.34, 0.30. An average is taken and converted to an equivalent fraction for convenience, giving β =1/3, which is in the range established above.
Now, with an estimate of β at hand, α can be estimated as follows. Assume that there exists a point where, V/x=p. Then, from Equation 4, 0= α (1−2p)−β { p(1−p)} 1/2 yielding, α =β { p(1−p)} 1/2/1−2p. Reference Tversky and KahnemanTversky & Kahneman (1992) considered p≤ 0.1 as low. Following that, p=0.1 is taken as the point of transition from low probability to moderate probability. Data from the same study shows that V/x∼ p at =0.1 . At that point, with β =1/3 , α =1/8 is obtained, which is in the range established above.
It must be recognized that α and β represent a psychological weighting process and as such are likely to vary with individual differences and experimental factors. The rest of this paper uses α =1/8 and β =1/3 as “prior” parameters for purpose of calculations to illustrate how the SSOT model functions. These rough parameters are not intended to be used for comparison of accuracy or predictive power of various models.
3 Results
It has been well argued in Birnbaum (2008) as to how the so-called “new paradoxes” refute Cumulative Prospect Theory, Rank-Dependent Utility, and Rank-and Sign-Dependent Utility Theories in favor of a class of models that includes the transfer of attention exchange (TAX) model. Here, it is examined if SSOT is also capable of explaining key drivers of these new paradoxes, viz., event-splitting, stochastic dominance and restricted branch independence. It will be shown first that SSOT can reproduce some basic behavioral observations in decision-making under risk, including the “fourfold pattern”.
3.1 Fourfold pattern
Reference Tversky and KahnemanTversky & Kahneman (1992) described a “fourfold pattern”: risk aversion for gains and risk seeking for losses of high probability; risk seeking for gains and risk aversion for losses of low probability. Table 1 shows selected results illustrating this fourfold pattern and shows how SSOT can account for them.
Consider (100,5%;0,95%). (i) The reference µ =100∗5%=5. (ii) θ =(1−2∗5%)∗100=90. It is multiplied with coefficient α =1/8. Thus, the impact α θ =1/8∗90≈ 11. This is positive and is taken as opportunity. (iii) The standard deviation, σ ={ 5%∗95%} 1/2100=22. Since the gamble is in gains domain, b=−1. Thus, bσ =−22. With coefficient β =1/3 we have β bσ =1/3(−22)≈ −7. This is negative and is taken as threat. The final value, V=5+11−7=9>5(expected value). This is in line with the reported relationship.
As p increases, θ decreases, crossing 0 when p=1/2, and turning negative after that. In the case of (100,95%;0,5%), µ =95. θ =(1−2∗95%)∗100=−90, leading to negative impact of α θ =1/8∗(−90)≈ −11 . Standard deviation and b do not change so V=95−11−7=77<95(expected value).
For (−100,5%;0,95%), µ =−5. θ =(1−2∗5%)(−100)=−90 , leading to negative impact of α θ =1/8∗(−90)≈ −11. Due to domain change, b= +1, hence, β bσ =1/3∗(+1)∗22≈ 7,. Therefore, V=−5−11+7=−9<−5(expected value).
For (−100,95%;0,5%), we have, µ =−95, θ =(1−2∗95%)(−100)=90, α θ =1/8∗90≈ 11 and b= +1, hence, β bσ =1/3∗(+1)∗22≈ 7. Therefore, V=−95+11+7=−77>−95(expected value). Thus, the model reproduces the fourfold pattern of Table 1.
Note: Data presented only to demonstrate the pattern and not to show accuracy of prediction. OTT does not preclude the coefficients from taking different values for gains and losses domain. However, it is not necessary to explain the pattern here. Observed and calculated cash equivalents are in $, in this table as well as the subsequent tables.
More generally, consider gambles of type (x,p;0,1−p). In the gains domain, spread is perceived as threat. θ , which equals (1−2p)x, is perceived as an opportunity for p ≤ 1/2. For any given x, this factor becomes stronger as p reduces. At low p, it overrides the threat factor when α (1−2p)>β { p(1−p)} 1/2. In the losses domain, spread is perceived as opportunity. θ , which equals (1−2p)(−x), is perceived as threat for p ≤ 1/2. Thus, for low p, it is threat aversion and otherwise it is opportunity seeking. In this model, decision-makers can be simultaneously opportunity seeking and threat averse.
3.2 Event-splitting effect
A simple case of event splitting: A (x,p;0,1−p) split to B (x,p−r;x,r;0,1−p). Obviously, there is no difference in µ, since, (p−r)x+rx=px . There is no difference in σ either as p(x−px)2+(1−p)(0−px)2=(p−r)(x−px)2+r(x−px)2+(1−p)(0−px)2 .Footnote 3 However, there is change in θ . θ A=x/2−px/2−1/2=(1−2p)x and θ B=2x/3−px/3−1/3=(1−1.5p)x.
Take any gamble G base (x 1,p 1;x 2,p 2… x i,p i… x n,p n) with x i>0, pick its element k , (x k,p k) and split it to generate elements (x k,p k−r) and (x k,r) for another gamble G split. Then, from Equation 2.3, θ base=n/n−1(∑x i/n− µ ) and θ split=n+1/n(∑x i/n+1+x k/n+1− µ ) . Thus, θ split−θ base= x k/n−∑x i− µ /n(n−1). Therefore, V split>V base if, x k>∑x i− µ /(n−1).
For a binary gamble (x,p;0,1−p), x>0, splitting of higher branch satisfies this condition (x>x− px/(2−1)) and leads to increase in value. Splitting of lower branch (0<x− px/(2−1)) leads to decrease in value. Because splitting in this model can either increase or decrease the value of a gamble, this model violates the property of branch-splitting independence identified and tested by Birnbaum (2007).
An example of event-splitting non-independence from Birnbaum (2008) is illustrated in Table 2. 1.1A is produced by splitting lower branch of 1.1A’ (causing small decrease in value) and 1.1B is produced by splitting higher branch of 1.1B’(causing significant increase in value). The majority prefers A to B, and a majority prefers B’ to A’.
3.3 Violation of stochastic dominance
That SSOT predicts violation of stochastic dominance is demonstrated in this section through a recipe simplified from Birnbaum (2008). Take a base gamble G 0(x,p;0,1−p), with x>0. Now, modify it to generate a stochastically dominating gamble G +(x,p;y,q;0,1−p−q) where y is a small positive quantity and q is a relatively small probability. Next, generate a stochastically dominated gamble G −(x,p−s;z,s;0,1−p) where z is a positive quantity slightly lower in value to x and s is a relatively small probability.
From Equations 2, for G 0(x,p;0,1−p):
For G +(x,p;y,q;0,1−p−q):
For G −(x,p−s;z,s;0,1−p), substituting r=p−s (replaced back in the last step):
The impact on mean is straightforward: µ +− µ =qy≈ 0 and, µ −µ −=s(x−z)≈ 0. The difference in σ is as follows: − σ 2= q(1−q)y 2−2pqxy= qy ((1−q)y−2px)≈ 0, since, qy≈ 0 and σ 2− −(2sp−s−s 2)x 2− s(1−s)z 2+2(p−s)sxz =s(−2px 2+x 2+sx 2− (1−s)z 2+2(p−s)xz)=s(x 2−z 2+sx 2+sz 2−2sxz−2px 2 +2pxz)= s(x−z)(x+z+s(x−z)−2px) ≈ 0, since, s(x−z)≈ 0.
The differences in θ , which are decisive, can be calculated:
Negative signs in both these expressions imply violation of stochastic dominance. In summary, similar to event-splitting effect, violation of stochastic dominance in cases such as the one described here is driven by θ . G 0 to G + is splitting of the lower branch leading to reduction in value; while G 0 to G − is splitting of the higher branch leading to increase in value.
For illustration, calculations for one experimental set from Birnbaum (2008) are shown in Table 3. It is reported that a majority (73%) of subjects preferred G− over G+ despite expected values being 87.3 and 87.7 respectively. SSOT values these prospects at 74.9 and 70.6, consistent with the majority preference, driven by change in θ while deltas in µ and σ are very small.
3.4 Violation of restricted branch independence
Consider two gambles with the same number of branches and the same probability distribution, S=(x 1,p 1;x 2,p 2… x i,p i… x n,p n) and R=(y 1,p 1;y 2,p 2… y i,p i… y n,p n) having a common branch such that x n=y n=z. Restricted branch independence assumes that a change in z will not change the preference relationship between S and R. Suppose S is preferred over R, then, under SSOT, V S>V R. Then, if ∂ V s/∂ z≥ ∂ V R/∂ z, V S>V R for all z. Otherwise, with increase in z, the gap in values will close and preference may get switched. A standard case is analyzed to understand how this derivative function works. For convenient tracking, label p n=r. Assume, x i≥ 0, for all i, such that µ ≥ 0 and b= −1. Also, introduce an additional constraint 0<β <1 to model a typical spread-averse agent.
Differentiating Equation 3 w.r.t. z, ∂ V/∂ z= ∂ µ /∂ z+α ∂ θ /∂ z−β ∂ σ /∂ z. Now, ∂ µ /∂ z=r , ∂ θ /∂ z=n/n−1 (1/n−r) and ∂ σ /∂ z=1/2σ ∂ σ 2/∂ z=r(z−µ )/σ . Therefore, ∂ V/∂ z=r+α n/n−1 (1/n−r)−β r(z−µ )/σ . Thus, if, ∂ V s/∂ z≥ ∂ V R/∂ z , then −β r(z−µ S)/σ S≥ −β r(z−µ R)/σ R. That is, (z−µ S)/σ S≤ (z−µ R)/σ R or z≤ µ Sσ R−µ Rσ S/σ R−σ S . This is not guaranteed and will depend on all the constituents of S and R. Assume that for z ′ this condition is not satisfied. Then, the corresponding second gamble (R ′) will be preferred over the corresponding first gamble (S ′), that is, a violation of type SR ′ will be observed. Note that this condition (z≤ µ Sσ R−µ Rσ S/σ R−σ S) is not dependent on θ , α or β . Thus, the same pattern applies to the gambles with uniform probabilities as well and also for any value of the coefficients and the only type of violation predicted by SSOT is SR ′. In summary, violation of restricted branch independence is driven by the change in σ .
As an example from Birnbaum (2008, Table 4), for Problem 13.1, R is preferred over S and (z=5)≤ (µ Sσ R−µ Rσ S/σ R−σ S=18). Thus, this preference holds as long as z≤ µ Sσ R−µ Rσ S/σ R−σ S holds. However, for Problem 13.2, (z=111)>(µ Sσ R−µ Rσ S/σ R−σ S=49), and the preference reversal is predicted.
4 Discussion
As the previous section shows, SSOT is capable of explaining several empirical phenomena explained by CPT and TAX both (fourfold pattern) or by TAX only (event-splitting effect, violations of stochastic dominance and violation of restricted branch independence).
Event-splitting effect and violations of stochastic dominance in the examples described above are related and are explained by the θ component under SSOT.
Violations of restricted branch independence are explained by the σ component.
4.1 The Opportunity-Threat Theory
Let S be a set of future states (s∈ S) of the world of which exactly one state will obtain. Assume that it is unknown to the decision-maker as to which state will obtain. Further, assume that S can be mapped to a consequence set X through some function φ (s)=(x,p) where the first term (x) denotes the objective magnitude of the consequence and the second term (p) denotes the objective probability of that consequence. These objective probabilities sum to 1. In addition, assume that the outcome set X can be mapped by the decision-maker to a mental set M through some functions u(x)=u and π (p)=π corresponding to subjective or implied utilities and subjective or implied probabilities, respectively. These subjective or implied probabilities also sum to 1. Also, assume that the decision-maker is able to map this mental set M to a decision-making single number V (called value) such that V(M)=V.
Two key assumptions underlie this (M to V) mapping process:
-
• First, the decision-maker has a referencing algorithm that generates reference with which M can be divided into two mutually exclusive and collectively exhaustive subsets M up (the upside set, containing elements considered more or equally preferred compared to reference) and M dn (the downside set, containing elements considered less preferred compared to reference).
-
• Second, that there is available a netting algorithm that maps M up and M dn into Y up, the relative upside set, containing elements of M up net of reference and into Y dn, the relative downside set, containing elements of M dn net of reference), respectively.
With these assumptions, the following definitions are stated:
-
1. Y agg=agg(Y up,Y dn), where agg is a function that measures direction and impact of aggregation of Y up and Y dn .
-
2. Y dis=dis(Y up,Y dn), where dis is a function that measures direction and impact of distance between Y up and Y dn.
-
3. opportunity=Y agg>0, Y dis>0.
-
4. threat=Y agg<0, Y dis<0.
Then, the Opportunity-Threat Theory (OTT) asserts that
and that the decision-maker will prefer or be indifferent to M 1 compared to M 2 iff V(M 1)≥ V(M 2), except by way of error.
To illustrate, assume a roll of dice that pays $1, if rolled 1, $2, if rolled 2 etc. Thus, M = (1,1/6; 2,1/6; 3,1/6; 4,1/6; 5,1/6; 6,1/6). Further, assume an obvious reference point that is the average (3.5). Outcomes higher or equal to average are mapped to M up = (4,1/6; 5,1/6; 6,1/6) and rest are mapped to M dn = (1,1/6; 2,1/6; 3,1/6). Now, assume a simple netting algorithm that is to subtract the average from each of the outcomes. Thus, the relative sets are constructed as Y up = (0.5,1/6; 1.5,1/6, 2.5,1/6) and Y dn = (−2.5,1/6, −1.5,1/6, −0.5,1/6). To complete the illustration, assume agg(.) = EV(Y dn)+EV(Y up) and dis(.) = EV(Y dn)−EV(Y up) (so that it accounts for spread aversion). Then, these numbers are respectively, Y agg = 0 (note that it was a symmetric gamble) and Y dis = −1.5. Thus, opportunity = 0 and threat = −1.5. Assuming V(.) = reference + opportunity + threat, V = 3.5 + 0 − 1.5 = 2. Thus, this gamble will be valued at $2.00 instead of expected value of $3.50.
In general, OTT applies to cases involving monetary outcomes or otherwise. It allows incorporation of different measures of opportunity and threat. It also permits different attitudes to opportunity and threat. It does not require symmetry in attitudes in gains and losses domains. In moral situations, opportunity may lie in domain of morally correct and threat may lie in domain of morally incorrect. In such cases attitudes may be modelled with binary parameters.
Several parameters that can serve as reference have been discussed in the literature, for example, status quo (Reference ThalerThaler, 1980; Reference Samuelson and ZeckhauserSamuelson & Zeckhauser, 1988), omission (Reference Baron and RitovBaron & Ritov, 1994) or aspiration (Reference van de Ven and Dieciduevan de Ven & Diecidue, 2008). OTT allows incorporation of different points of reference and even multiple points of reference. In a special case, the point of reference happens to be Expected Utility. In that case, if either the agent is neutral to both opportunity and threat or net impact of opportunity and threat cancel out, the model reduces to Expected Utility.
4.2 A structural comparison of SSOT, CPT and TAX
To structurally compare SSOT with CPT and TAX, a working model of OTT was developed. Consider, X= (x 1,p 1;x 2,p 2… x n,p n), with n denoting the number of exhaustive and mutually exclusive future states and ∑p i=1. Assume X up= (x 1,p 1;x 2,p 2… x i,p i… x k,p k) and X dn= (x k+1,p k+1;x k+2,p k+2… x j,p j… x n,p n), such that the upside set has k elements and the downside set has n−k elements. Define, V(X up)= ∑(x i− µ ), i=1 … k and V(X dn)= ∑(x j− µ ), j=k+1 … n . Further, define V(O)=V(X up)+V(X dn) analogous to θ and V(T)=| V(X up)−V(X dn)| analogous to σ (using range as a measure of spread instead of standard deviation). Then, analogous to Equation 2,
where and α′ and β′ are coefficients for respective terms.
Now, assuming non-negative domain (b=−1) and for simplicity V(X O)−V(X T)>0, expansion of all the terms in Equation 5 yields,
where w i=(α′−β′)+{ 1−(α′−β′)k−(α′+β′)(n−k)} p i and w j=(α ′+β′)+{ 1−(α′−β ′)k−(α ′+β′)(n−k)} p j.
Equation 6.2 reveals that there is an implied rank-order. However, there are only two ranks — greater than expected value and lower than expected value. Also, the weights carry a component that is not a product of p . Thus, the SSOT model is significantly different from CPT. Now, Equation 6.2 is also analogous to a two-branch gamble. Clearly, there is transfer of weight from the upper branch to the lower branch. SSOT thus has similarities with TAX. However, in this formulation, all gambles reduce to a two-branch gamble. Therefore, potentially, there could be differences from TAX that will need to be explored.
SSOT, in this paper is shown to explain certain key phenomena underlying the new paradoxes. TAX has been very extensively studied and explains a wide range of empirical findings. SSOT may or may not be able to explain all those findings. Also, TAX and SSOT treat probabilities in a fundamentally different manner (non-linear vs. linear, respectively). I thus speculate that TAX cannot be a special case of SSOT, although under limiting conditions (for example, binary gambles with equal probabilities) SSOT and special TAX appear identical.
4.3 Areas of future research and conclusion
Further, areas of future research should include exploration of nature and stability of the coefficients α and β used in SOT. In SSOT, a single value of α and a single value of β was assumed for convenience. One question is whether these coefficients should have different values in different domains (positive, negative and mixed). Moreover, SOT should be extended to a stochastic model and to probability distributions that may not be discrete. The nature and impact of error should also be explored. Another important area will be to understand how this model can be applied in ambiguous (Reference EllsbergEllsberg, 1961; Reference Camerer and WeberCamerer & Weber, 1992) situations. Implications forinvestment decisions (Reference MarkowitzMarkowitz, 1952), in particular, also remain to be explored.
In conclusion, a new theory of decision-making under risk is proposed. This Opportunity-Threat theory relies on analyzing risk into its components. A simplified special model (SSOT) of this theory is able to explain a range of empirical phenomena that are explained by TAX but not by CPT.
Appendix: Derivation of θ and ψ parameters
Special Opportunity-Threat (SOT) model introduces parameters θ and ψ , which are derived as shown in Figure 1:
Following Figure 1, characterize the linear shift (on x-axis) as an aggregation parameter, net of upside and downside, θ = µ′ − µ. Now, if µ ′ plays the role of center of gravity, (1−p i)(u i−µ′)=0. Simple expansion leads to (u i−µ′)−p i(u i−µ ′)=nū−nµ ′−µ +µ ′=0, where . That gives, µ ′=nū−µ /n−1. Thus, θ =µ ′− µ =nū−µ /n−1−µ =n(ū−µ )/(n−1). Alternatively, θ can be viewed as sum of (u i−µ ) residuals divided by the degree of freedom (n−1).
Now, only a fraction of this factor is actually incorporated in the decision-making process depending on psychological weighting. Thus, the center of gravity ends up at µ′′=µ + α θ (µ′′ is not shown in the figure). Finally, distance parameter is calculated as standard deviation of outcome values around this new point. . Now, . Thus, ψ = { σ 2+ (α θ )2} 1/2.