{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:42Z","timestamp":1750306902636,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2013,1]]},"abstract":"<jats:p>\n            Which risk should one choose when facing alternatives with different levels of risk? We discuss here adaptive processes in such risk choice behavior by generalizing the study of Roos et al. [2010]. We deal with an\n            <jats:italic>n<\/jats:italic>\n            -choice game in which every player sequentially chooses\n            <jats:italic>n<\/jats:italic>\n            times of lotteries of which there are two types: a safe lottery and a risky lottery. We analyze this model in more detail by elaborating the game. Based on the results of mathematical analysis, replicator dynamics analysis, and numerical simulations, we derived some salient features of risk choice behavior. We show that all the risk strategies can be divided into two groups: persistence and nonpersistence. We also proved that the dynamics with perturbation in which a mutation is installed is globally asymptotically stable to a unique equilibrium point for any initial population. The numerical simulations clarify that the number of persistent strategies seldom increases regardless of the increase in\n            <jats:italic>n<\/jats:italic>\n            , and suggest that a rarity of dominant choice strategies is widely observed in many social contexts. These facts not only go hand-in-hand with some well-known insights from prospect theory, but may also provide some theoretical hypotheses for various fields such as behavioral economics, ecology, sociology, and consumer behavioral theory.\n          <\/jats:p>","DOI":"10.1145\/2414425.2414442","type":"journal-article","created":{"date-parts":[[2013,2,5]],"date-time":"2013-02-05T13:19:41Z","timestamp":1360070381000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Mathematical description and analysis of adaptive risk choice behavior"],"prefix":"10.1145","volume":"4","author":[{"given":"Isamu","family":"Okada","sequence":"first","affiliation":[{"name":"Soka University, Japan"}]},{"given":"Hitoshi","family":"Yamamoto","sequence":"additional","affiliation":[{"name":"Rissho University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2013,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Arnold V. 1973. Ordinary Differential Equations. MIT Press Cambridge MA.  Arnold V. 1973. Ordinary Differential Equations. MIT Press Cambridge MA."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1079\/PNS2002181"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2660(09)68004-4"},{"key":"e_1_2_1_4_1","first-page":"73","article-title":"Solutions of games by differential equations","volume":"24","author":"Brown G.","year":"1950","journal-title":"Ann. Math. Stud."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1162\/qjec.2009.124.2.809"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Charness G. and Gneezy U. 2007. Strong evidence for gender differences in experimental investment. SSRN Working paper series September 18.  Charness G. and Gneezy U. 2007. Strong evidence for gender differences in experimental investment. SSRN Working paper series September 18.","DOI":"10.2139\/ssrn.648735"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1143\/JPSJ.71.429"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.1999.2537"},{"key":"e_1_2_1_9_1","first-page":"683","article-title":"Aspiration level, probability of success and failure, and expected utility","volume":"49","author":"Diecidue E.","year":"2008","journal-title":"In. Econ. Rev."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2006.10.012"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/1913778"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001910000049"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Hofbauer J. and Sigmund K. 1998. Evolutionary Games and Population Dynamics. Cambridge University Press.  Hofbauer J. and Sigmund K. 1998. Evolutionary Games and Population Dynamics. Cambridge University Press.","DOI":"10.1017\/CBO9781139173179"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0273-0979-03-00988-1"},{"key":"e_1_2_1_15_1","article-title":"Learning in cournot oligopoly - an experiment","volume":"109","author":"Huck S.","year":"1999","journal-title":"The Econ. J., Conf. Papers"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Kahneman D. and Tversky A. 2000. Choices Values and Frame. Cambridge University Press.  Kahneman D. and Tversky A. 2000. Choices Values and Frame. Cambridge University Press.","DOI":"10.1017\/CBO9780511803475"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2681(86)90022-3"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.30.5.961"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1006\/jmps.1999.1259"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-937X.00233"},{"key":"e_1_2_1_22_1","unstructured":"Oyarzun C. and Sarin R. 2011. Learning and risk aversion. J. Econ. Theory (to appear).  Oyarzun C. and Sarin R. 2011. Learning and risk aversion. J. Econ. Theory (to appear)."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11166-005-5831-x"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0262.00158"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1038\/35106555"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0048"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858948.1858954"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219525910002682"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500768"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1060.0254"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-5193(83)90445-9"},{"key":"e_1_2_1_32_1","first-page":"253","article-title":"Level of aspiration and decision making. Psycho","volume":"64","author":"Siegel S.","year":"1957","journal-title":"Rev."},{"key":"e_1_2_1_33_1","first-page":"116","article-title":"Conflict and attitudes toward risk","volume":"81","author":"Skaperdas S.","year":"1991","journal-title":"Amer. Econ. Rev."},{"key":"e_1_2_1_34_1","first-page":"720","article-title":"Cooperation, conflict and power in the absence of property rights","volume":"82","author":"Skaperdas S.","year":"1992","journal-title":"Amer. Econ. Rev."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1038\/246015a0"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48935-1_16"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0011656"},{"key":"e_1_2_1_38_1","unstructured":"von Neumann J. and Morgenstern O. 1944. Theories of Games and Economic Behavior. Princeton University Press.  von Neumann J. and Morgenstern O. 1944. Theories of Games and Economic Behavior. Princeton University Press."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1996.0013"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1375\/twin.12.1.103"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2414425.2414442","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2414425.2414442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:15Z","timestamp":1750234755000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2414425.2414442"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["10.1145\/2414425.2414442"],"URL":"https:\/\/doi.org\/10.1145\/2414425.2414442","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"type":"print","value":"2157-6904"},{"type":"electronic","value":"2157-6912"}],"subject":[],"published":{"date-parts":[[2013,1]]},"assertion":[{"value":"2011-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}