<--- Back to Details
First PageDocument Content
Human behavior / Business / Consumer behaviour / Utility / Framing / Loss aversion / Expected utility hypothesis / Risk aversion / Prospect theory / Behavioral finance / Decision theory / Knowledge
Date: 2011-01-05 14:20:02
Human behavior
Business
Consumer behaviour
Utility
Framing
Loss aversion
Expected utility hypothesis
Risk aversion
Prospect theory
Behavioral finance
Decision theory
Knowledge

NUFFIELD CENTRE FOR EXPERIMENTAL SOCIAL SCIENCES DISCUSSION PAPER SERIES[removed]

Add to Reading List

Source URL: cess-wb.nuff.ox.ac.uk

Download Document from Source Website

File Size: 546,44 KB

Share Document on Facebook

Similar Documents

Cryptocurrencies / Blockchains / Concurrent computing / Numismatics / Distributed computing / Kin / Decentralized application / Token coin / Token

ESS Token Utility and Functions There are a number of key functions that ESS will enable, with additional functionality added in as the Essentia project is developed further. This will occur on an incremental basis, with

DocID: 1xVIa - View Document

Cryptocurrencies / Numismatics / Communication / Forward-looking statement / Kin / Token coin / Economy / Distributed computing

VARcrypt.io Utility Token Sale Event www.VARcoin.io

DocID: 1xUDs - View Document

Computing / Emerging technologies / Information and communications technology / Information / Cryptography / Ambient intelligence / Internet of things / Cryptocurrencies / Blockchain / MQTT / Computer security / Enhanced privacy ID

< Project Highlights > Staking Utility

DocID: 1xUa7 - View Document

Theoretical computer science / Logic in computer science / Logic programming / Mathematics / Mathematical logic / Fluent / Situation calculus / Event calculus / Utility / Artificial neural network / Robotics / Robot

Learning Human Utility from Video Demonstrations for Deductive Planning in Robotics Nishant Shukla, Yunzhong He, Frank Chen, and Song-Chun Zhu Center for Vision, Cognition, Learning, and Autonomy University of California

DocID: 1xU6D - View Document

Cybercrime / Cyberwarfare / Computer security / Security / National security / Cyberattacks / Cyberterrorism / Internet privacy / Social networking service / Stuxnet / Risk / Strategic management

Blind in the Panopticon The decreasing marginal utility of access to information as an aspect of cyber policy The uncertain price of information There is no clear way, in the present, of deciding what information will be

DocID: 1xU62 - View Document