Game Theory Flashcards

1
Q

What is game theory used to analyse?

A

The choice between cooperation and conflict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is game theory?

A

The study of problems of cooperation and conflict among independent decision makers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Nash Equilibrium?

A

A situation in a game where no player has an incentive to unilaterally change their strategy, assuming the other players stick to their strategies. It may not be unique but it always exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a dominant strategy equilibrium?

A

Each player’s optimal play is a constant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Draw the strategic form of an example battle of the sexes game

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What characterises a battle of the sexes game?

A

Each player’s optimal strategy depends on what they think the other will do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a pure strategy?

A

A player uses a deterministic algorithm to decide what to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a mixed strategy? When is it used?

A

Players use a randomised algorithm to decide what to do. Used when some games have no Nash equilibrium with deterministic algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Draw the strategic form of an example prisoners’ dilemma game

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What characterises a prisoners’ dilemma game?

A

The dominant strategy equilibrium is not optimal for the players. Both players will cheat rather than cooperate, with a bad outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can the not-optimal solution to a prisoners’ dilemma game be fixed?

A

Play the game repeatedly. ‘Tit-for-tat’ - cooperate at round 1, then at round n do what the other guy did at round n-1. This gets locked into (defect, defect). ie. forgive the other guy occasionally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can price fixing arise implicitly?

A

Try charging double the price of your competitor and see what they do. If they ‘defect’ by competing, play tit-for-tat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give an example of prisoners’ dilemma

A

Setting competing prices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Draw the strategic form of an example stag hunt game

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What characterises a stag hunt game?

A

People can hunt rabbits on their own, but have to work together to hunt a stag. If your buddy runs off after a rabbit, the stag will escape. Different from PD because (stag, stag) is now a Nash equilibrium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between PD and SH?

A

Different from PD because (stag, stag) is now a Nash equilibrium. PD is payoff-dominant, SH is risk-dominant.

17
Q

Draw the strategic form of an example chicken game

18
Q

What characterises a game of chicken?

A

Two players compete against each other to see who will “chicken” first. A player can force the Nash Equilibrium where they win

19
Q

Draw the strategic form of an example matching pennies game

20
Q

What characterises a matching pennies game?

A

It is a zero-sum gain. A’s loss is B’s gain

21
Q

Give an information application of matching pennies

A

Attacker vs defender in cybersecurity. Eg. network security system where attackers and defenders must continuously adapt and guess each other’s moves
Defender may not have resources to patch all possible vulnerabilities
Attacker may know which vulnerabilities are undefended

22
Q

Give an information application of prisoners’ dilemma

A

Two organisations who both want a secure communication channel. Eg. security standard agreements between competing companies
Cooperation is costly encryption, defection is saving encryption costs, determined whether communication can be compromised or is safe.
If repeated interaction, cooperation more likely to emerge

23
Q

Give an information application of battle of the sexes

A

Systems negotiating which communication protocol to use. Eg. distributed computing and network protocols where systems need to agree on standards like TCP/IP vs UDP
May have two systems with different preferences. Both systems prefer to coordinate, but hard to agree on which one

24
Q

List the different Game Theories

A
  1. Matching pennies
  2. Battle of the sexes
  3. Prisoners’ dilemma
  4. Stag hunt
  5. Chicken