One-shot exchange networks and the shadow of the future

From the Prisoner's Dilemma and other games, it is well known that strategy selection in one-shot games can be very different from that in iterated games. Because exchange structures were studied only as iterated games, whether one-shot structures differ was not known. Nor have exchange theories previously considered whether events in structures would be different if studied as one-shot games. This paper offers new theory to predict one-shot exchange structures and one-shot experiments to test that theory. As predicted, the experiments found that processes and outcomes of one-shot exchange structures are quite different from those of iterated exchange structures. For example, certain relations that are strategically used as threats in iterated exchange structures occur very rarely in one-shot structures. It follows that power differences in one-shot structures regress from those observed for repeated structures.

[1]  H. Raiffa 21. Arbitration Schemes for Generalized Two-person Games , 1953 .

[2]  David Willer,et al.  Exclusion and Power: a Test of Four Theories of Power in Exchange Networks , 1993 .

[3]  James S. Coleman,et al.  Rational Choice Theory: Advocacy and Critique , 1992 .

[4]  David Willer,et al.  Power, Embedded Games, and Coalition Formation , 2006 .

[5]  Noah E. Friedkin,et al.  Unequally Valued Exchange Relations , 1998 .

[6]  H. Håkansson,et al.  Industrial marketing: An organizational problem? , 1975 .

[7]  Elisa Jayne Bienenstock,et al.  Game-Theory Models for Exchange Networks: Experimental Results , 1993 .

[8]  A. van de Rijt,et al.  Sequential Power-Dependence Theory , 2008 .

[9]  M. Shubik Game theory in the social sciences: Concepts and solutions , 1982 .

[10]  J. Bendor,et al.  Effective Choice in the Prisoner ' s Dilemma , 2007 .

[11]  Barry Markovsky,et al.  Network Exchange Theory: Recent Developments and New Directions , 2000 .

[12]  O. Williamson The Economics of Organization: The Transaction Cost Approach , 1981, American Journal of Sociology.

[13]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[14]  Peter Burke,et al.  An identity model for network exchange , 1997 .

[15]  David Willer,et al.  Please Scroll down for Article the Journal of Mathematical Sociology Testing Ten Theories , 2022 .

[16]  E. Sutherland,et al.  The Professional Thief , 1988 .

[17]  Elisa Jayne Bienenstock,et al.  The core as a solution to exclusionary networks , 1992 .

[18]  Noah E. Friedkin,et al.  The incidence of exchange networks , 1995 .

[19]  E. Kalai,et al.  OTHER SOLUTIONS TO NASH'S BARGAINING PROBLEM , 1975 .

[20]  W. Hamilton,et al.  The Evolution of Cooperation , 1984 .

[21]  R. Axelrod More Effective Choice in the Prisoner's Dilemma , 1980 .

[22]  David Willer Network Exchange Theory , 1999 .

[23]  K. Cook,et al.  Social Exchange Theory , 1989, Theoretical Sociology.

[24]  David Willer Analysis and composition as theoretic procedures , 1984 .

[25]  B. Anderson,et al.  Sociological theories in progress , 1966 .

[26]  T. Yamagishi,et al.  Trust and commitment in the United States and Japan , 1994 .

[27]  Håkan Håkansson,et al.  Influence tactics in buyer — seller processes , 1976 .