Next Article in Journal
Evolution of Groupwise Cooperation: Generosity, Paradoxical Behavior, and Non-Linear Payoff Functions
Next Article in Special Issue
The Signaling Value of Punishing Norm-Breakers and Rewarding Norm-Followers
Previous Article in Journal
Endogenously Emerging Gender Pay Gap in an Experimental Teamwork Setting
Previous Article in Special Issue
Prescriptive Norms and Social Comparisons
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

This Is How We Do It: How Social Norms and Social Identity Shape Decision Making under Uncertainty

Department of Law and Economics, LUMSA University, 00193 Rome, Italy
Games 2018, 9(4), 99; https://doi.org/10.3390/g9040099
Submission received: 31 August 2018 / Revised: 23 November 2018 / Accepted: 24 November 2018 / Published: 9 December 2018
(This article belongs to the Special Issue Social Norms and Games)

Abstract

:
The current study aims to investigate how the presence of social norms defines belief formation on future changes in social identity (i.e., diachronic identity), and how those beliefs affect individual decisions under uncertainty. The paper proposes a theoretical model in which individuals have preferences over their own attributes and over specific information structures. The individual preferences are motivated by the presence of social norms. The norms, while establishing the socially acceptable attributes of an individual identity, also drive individuals’ preferences for information acquisition or avoidance. The model incorporates social norms as empirical expectations and provides a prior dependent theory that allows for prior-dependent information attitudes. Firstly, the model implies that decisions are mitigated by socially grounded behavioral and cognitive biases; and secondly, that it can create an incentive to avoid information, even when the latter is useful, free, and independent of strategic considerations. These biases bring out individual trade-offs between the accuracy of decision making and self-image motivated by social conformity. The two behavioral motivations are represented through a game of an intra-personal model of choice under uncertainty in which self-deception and memory manipulation mechanisms are used to overcome the individuals’ internal trade-off.
JEL Classification:
Z13; J16; D81

1. Introduction

The standard assumption in economics is that decision makers (DMs) are endowed with perfect reflection. They are likely to embark on a process of conscious mental revision of their available alternatives in order to characterize each choice and evaluate their consequences. To sustain the perfect reflection assumption, the theory of decision making first postulates that individual preferences are exogenous, and secondly, that information is always (weakly) valuable even when it is bad news. Yet, the robustness of the assumption of perfect reflection depends on both the complexity of the decision problem and on the individual’s subjective beliefs about the value of information. Complex decision problems are those in which payoff-relevant variables are defined endogenously and are entangled as part of the choice. By the same account, standard economics assumes that the value of information is instrumental to make better decisions. However, a growing body of theoretical and experimental literature suggests that information also has an affective value that may directly enter the agent’s utility function—a phenomenon known as “belief-based utility”. This can create an incentive to avoid information, even when it is useful, free, and independent of strategic considerations. In such cases, the assumption of perfect reflection becomes difficult to justify. The difficulty stems from the relaxation of one or more conditions of exogeneity, rationality, and self-knowledge.
To cast light on the process of relaxing the assumption of perfect reflection, let us start with a simple scenario and complicate it little by little. In many situations, real life is complex because choices are accompanied by aspirations, motivations, emotions, dispositions, and beliefs that alter the characteristics of the alternatives as well as the nature of the decision problem. Imagine choosing between investing in education to get career A or B. In a simple framework, the DM chooses A over B only if the pleasure or the profit received from A is greater than that received from B. It follows that she will choose to invest in A when both the possibilities are available. In this scenario, she has a precise definition of the objects of her choice: career A over B. Suppose, now, that the availabilities of the alternatives are uncertain, as the outcomes (and the preferences over them) are endogenous—that is, explained through mental states such as motivations and beliefs. Specifically, we assume that the individual has incomplete information about the outcomes of the alternatives and decides to undertake a conscious mental revision about which is the best, also inferring which one is the most socially acceptable. The object of her choice is therefore changed. It is no longer presented to her eyes on the basis of only the intrinsic value of the alternatives, but also on the value that society attributes to the alternatives. The nature of the decision problem is now changed since the DM’s motivational structure is changed because it is informed by the heuristic “the most socially acceptable”. Heuristics represent a shortcut that the DM chooses in order to solve the uncertainty.
For the DM, her decision problem is no longer between the outcomes of each career path, but between career paths together with their degree of social acceptance. Specifically, the career path finds its value in the social recognition as an ideal career for a specific type of DM that belongs to a given community. The “socially acceptable” mental states (i.e., beliefs and motivations) are originated by the presence of norms, which ultimately define the mental representation that the DM has of herself and her identity. Consequently, the DM has to internalize the consequences of both actions and motivations. A DM with imperfect reflection will not anticipate that her conformist motivation might play a role, whereas a perfectly reflective DM will know how to handle the endogeneity. Hence, given the objections to the assumption of bounded rationality, it seems reasonable to ask ourselves the question: where do a DM’s mental states come from? Consider again the “heuristics” example. It has two features that are worthy of further analysis: the mental states and the sampling of the information.
According to Elster [1,2], mental states, as beliefs and motivations, define behavior. Beliefs and motivations1 help the DM to navigate in life, to justify the undertaken action and to experience emotions. If we want to order the states in a causal relation, motivations are causal determinants of the states and, then, of the belief formation. A complete analysis of the mental states should look at both costs and constraints of the motivated mental states. The costs of mental states are the false or inaccurate beliefs that even though they are pleasant they can induce suboptimal choices or emotional drawback. In turn, constraints2 are the information processing that can be biased and affected by overconfidence or optimism, or can be constrained by priors or social norms. While the earlier attempts of bounded rationality theory were based on the costs [4,5], recent theory has focused on the investigation of the constraints. When motivated mental states enter the framework, the traditional exogeneity assumption no longer holds, nor the other assumptions of accurate knowledge of the preferences and of fixed inter-temporal preferences. The “heuristic” example supports an analysis of both costs and constraints. The choice of career A over B could be explained by a motivated mental state that favors a conformist behavior. This motivated belief drives the DM to strategically sample only the information that is considered important for the conformist extent and to disregard the information that does not match it. That is, the DM organizes the information structure to favor the priors that career A is better. Hence the norms, while establishing the socially acceptable attributes of an individual identity, also drive individuals’ preferences for information acquisition or avoidance.
On the last account, the example can be taken to a higher level of sophistication that specifies a further particular mechanism. The social norms that suggest the DM’s choice of A over B, reinforce their grip on the DM by arousing feeling linked to the anticipation of the future identity, which could mean either savoring future success or dreading future failures. In this way, “being a professional A”3 will not only be good because it is socially accepted, but because A is highly considered, the anticipation of the future identity A has an impact on immediate well-being [6]. This particular way of framing the effect of beliefs about future events and identity over current feelings is called anticipatory utility [6,7] (henceforth AU). In the framework of AU, beliefs enter the utility function directly via emotional predisposition, highlighting the importance of information gathering and avoidance. This result is more interesting in light of Simon’s perspective4 on the role of information. In fact, in the general case of self-conflicting goals, or intra-personal conflict motives, as in Brocas and Carillo [9] or Bénabou and Tirole [10,11], an individual may choose to avoid information even when it is freely available. Moreover, even if being informed will improve the DM’s current decision, the information could be completely or partially shared with her future incarnations, affecting her future optimal choice and thus creating an intra-personal conflict. Ignorance would be a rational and strategic behavior.
With the elements of sampling information and AU, this paper models how social norms and identity are linked from an intertemporal perspective that is different from Akerlof and Kranton’s [12,13]. The work presents a dual-self model [14] within a monotonic decision problem [15]. The main structure posits the decision problem as a game between a short- and a long-run self. The two selves may incur inconsistent decisions in time. Because of this, they might want to manipulate the information structure they possess.
This work is closely related to and borrows from Kószegi [16] and Bénabou and Tirole [10,11]. As in the model, in Kószegi ignorance is costly in terms of inefficient actions and the DM is information-averse. Bénabou and Tirole face the two topics in different papers. In Bénabou and Tirole [10], imperfect recall is the tool through which the DM can keep a high self-esteem, however the scenario with a second stage of the action strategy is not considered and the cases of analysis consider only the situation in which a low signal is subjected to a recall strategy. In [11], the authors show that a DM with an anticipatory utility function and with preferences for the future outcome can be led to make inefficient decisions. The current paper merges the three works, obtaining the result that ignorance is costly in terms of inefficient actions whenever the DM is information-averse. However, the inefficiencies can be offset by the gains in the DM’s self-image (or self-esteem). The aversion for the information is analyzed in both cases of receiving good or bad signals, because both matter for the consequence of inefficient actions and self-esteem maintenance. Their existence is determined by the presence of social norms that inform the DM not only in terms of the socially accepted identity but also in how to respond to information conflicting with it. The existing literature on ignorance as a strategic action to maintain self-serving biases focuses mostly on the asymmetric recall of good signal [10,11,16,17,18,19,20,21]. Recalling a good signal is always appealing when the outcome of that signal dominates any other outcomes. For example, signaling a high IQ or scoring a high point in a student laboratory experiment is always better than signaling the opposite [18], because the identity of “being a good student” is the dominant in such environment, hence any feedback contrasting that ideal identity would be forgotten. Another example could be the one of showing a high moral stand in a society in which morality is an important feature [11]. A final example is served by [11], in which recalling a good signal could be used as a strategy to maintain personal motivation for people who lack self-control in seeing their plans through. In these and other contexts, the asymmetric recall of good signal is justified by the fact that being good is the most socially acceptable identity. Yet, there are social situations in which identity and social norms identify being both good and bad as socially acceptable. Let us consider, for example, the case of the student groups “nerds”, “jocks”, “leading crowd”, and “burnouts” in Akerlof and Kranton’s [13], and their effects on matching the image and the behavior of an ideal group member. In contrast to existing work, this study first emphasizes the important role of social norms as underlying reasons for motivated beliefs (i.e., the demand side of self-deception), and second the necessity to generalize the selective recall strategy (i.e., the supply side of self-deception). This model tries to generalize the asymmetric recall strategy by proposing a thicker strategic input to the second result of Kószegi [16] in which he introduces the possibility of partial information acquisition. Even with the generalization of the recall strategy, the model shows the existence of the trade-off [10,22] between affective benefits from the biased self-image based on social conformity to a specific social norm on the one hand, and the incentive for accuracy of decision making on the other hand.
The rest of this paper is organized as follow. In Section 2 a literature review accommodating all the above phenomena is presented. To follow, Section 3 and Section 4 introduce and solve the model, respectively. Section 5 provides comments and discussions. Finally, Section 6 offers conclusions. An Appendix section for complementary results and graphs follows.

2. Literature Review

This paper contributes to the literature in identity economics. Following Akerlof and Kranton [12,13], although we move slightly away from their core assumptions in three directions, we consider the social categories as variables that enter in the decision maker’s utility function.

2.1. On Diachronic Identity

The diachronic identity [23] refers to changes in the content and consequences of the identity over time, as opposed to the synchronic identity, which refers to the relative salience of different aspects of an individual at one point in time that depends on the presence of relevant cues. Let us consider an example of the synchronic identity in gender studies. The category of being a woman has different sub-categories, such as being a mother, a professional, a spouse, etc. At a specific point in time, being a mother and a professional can be in conflict and one of the sub-categories could be more salient than the other for that specific point in time where the DM finds herself.
Diachronic identity theory mostly focuses on how the DM tracks continuity of her identities over time and on how the aim of reaching this perceived continuity affects her choices and information set. For example, in gender issues, the ideal of being a good woman will be valued both when the DM is a student and for the following years. As a consequence, the decisions that she makes now will impact not only the single current dimension, but future ones, as well. Thus, understanding how people make judgments about the continuity of their identity can give us different reasons to comprehend why people do not act as often as they should and might suggest a new way to help people to act in accordance with their long-term interests. The way this mechanism is presented in the model occurs by using a particular functional form called an AU function [7,24,25,26], which takes into account utility over beliefs and outcomes with particular inter-temporal implications.

2.2. On Social Norms

The matching mechanism between behavior and ideal identity is retained from Akerlof’s analytical framework. Henceforth, the matching mechanism is not determined by fixed preferences5, but is the outcome of a deliberative process. In fact, the matching mechanism in this paper is not a generic endorsement of the prescriptions imposed by the ideal categories to which individuals decide to belong. Rather, it is a prescription originated by social norms. The origin lies in the existence of descriptive norms [31]. Descriptive norm regulates the mechanism of interaction between the constraints through the work that empirical expectations produce on the definition of “similar” and “attainable”. In the model, an individual draws her aspirations from the lives, achievements, or ideals of those who exist in her cognitive window. The definition of norms as empirical expectations helps us to understand the complex problem of social identity and educational investment, for three reasons.
First, the presence of descriptive norms that define a given identity as ideal reduces the incentive to experiment and search for information on the alternatives to the ideal identity. In other words, if the descriptive norm and the social context make specific traits of identity salient, then the preferences of individuals can be shaped by cues leading to an observation of inconsistent choice and behavior6, even in the absence of any explicit awareness of how such cues trigger and arrange the goal pursued. In this case, the individual will be trapped in self-fulfilling expectations situations.
Second, descriptive norms are helpful in playing the role of heuristics during a decision-making process, and they characterize it under uncertainty as a prior dependent process. Namely, people dealing with investment decision problems, as with any decision under uncertainty, appeal to empirical expectations to handle the imperfect information [32,33] typical of this kind of problem. When information about the future outcomes of an action is difficult to gather or is imperfect, the norms are the best and less-expensive way to extract that information. However, this information can be biased or untrue.
Third, another consequence of the presence of the norms on the information process is whether individuals treat information differently when it comes from a social context. That is to say, individuals might suffer from confirmation bias7, conservative bias8, or persuasion bias9. Namely, they are constrained in their ability to process information, making some cues more accessible than others in affecting their preferences. For example, let us again consider the phenomenon of “acting white”. This phenomenon allows the subject of a stereotype to notice stereotype-consistent information more likely that of other stereotypes. She would probably construct a sequence of information that gives validity to her beliefs, while discarding or forgetting those signals that do not. Accordingly, the observed choice may be consistent with several combinations of expectations and preferences. Once again, these combinations are the result of the social cognitive process10 to which everyone is subjected.

2.3. On Cognitive Dissonance

On the latter account, the appeal to the use of descriptive norms as a heuristic is motivated by the attempt to resolve what Festinger [41] calls cognitive dissonance. Dissonance arises when individuals are confronted with information that is inconsistent with their already-existing beliefs, ideas, or values. Hence, it produces the “unpleasant experience of being caught between two contradictory forces” (Iyengar [42], p. 97): information conflicting with beliefs. The resolution process of the conflict occurs in a self-deceiving way [43]. Self-deception is the temptation of people in believing something that they want to be true. That is to say, individuals have false beliefs not because of a lack of information. Rather, the self-deceiver is at some level aware of information that would lead her to form the correct belief, but some motivational bias leads her to hold the opposite. In this model, empirical expectations and the desire to respect them represent the motivational bias.
Traditionally, self-deception has been modeled on interpersonal deception, yet the current paper uses an intra-personal approach. However, the traditional model of self-deception raises two paradoxes. One concerns the self-deceiver’s state of mind, the so-called static paradox. How can a person simultaneously hold contradictory beliefs? The other concerns the process or dynamics of self-deception—the so-called dynamic or strategic paradox. How can a person intend to deceive herself without rendering her intentions ineffective [43]?
The answer to these questions and the strategies to solve the dissonance depend on the type of dissonance faced by the DM. According to [44], the dissonance is called nomothetic when it is generated by the presence of cultural and social customs, whereas it is called idiographic when it is related to individual-specific cognitions. The distinction matters when it comes to identifying the strategies that can be followed to minimize the discomfort caused by the dissonance. In principle, the choice is between three options: avoiding the dissonance by not performing the action leading to it; reducing the dissonance by changing the environment (i.e., by removing (some of) the circumstances that induce dissonance); or solving the dissonance by changing one’s own opinions about the circumstances that cause it (i.e., by changing one’s subjective evaluation of these circumstances—the sour grape evaluation).
When the DM faces idiographic dissonance, the latter two strategies are implemented. Several strategies have been largely found for sustaining a particular self-assessment belief: for example, selective recall of information [45]; dismissing the importance of skills not possessed and emphasizing the value of traits one does possess. In the economic literature, the approach to cognitive dissonance ([4,5,46]) studies the change of the DM’s beliefs ex-post to the actions taken. The DM tries to make a coherent mirroring between the result of the action (or the recollection of the result) and the initial beliefs.
In the case of nomothetic dissonance (i.e., the one discussed in this paper), the best strategy is the first. Because of the strategic paradox, the modification of one’s beliefs is not useful in solving the cognitive dissonance. Instead, it is necessary to intervene either in the information set—through misconception, refutation, or rejection—or through seeking support from the “relevant others” who share the same beliefs [47]. Then, the DM will strategically select the information received in order to reflect the initial beliefs. In the literature, these self-deception actions are modeled in three different ways. The first is to adjust the Bayesian model of belief formation [48]. The second is to solve an intra-personal signaling model, in which the DM is represented as a series of temporal incarnations which manipulate the beliefs from one period of time to another ([10,11,17,20,24,25,49]). The third approach uses a self-signaling model, adding psychological structure ([14,21,50,51]). The current work implements the third approach, enriched with a monotone information structure.

3. The Model

Consider a decision problem in which an intra-personal game is played by a sequence of temporal incarnations of the DM: a myopic short-run self and a long-run self. Both incarnations have preferences over their identity θ Θ , where Θ is a non-empty, compact subset of . The identity is validated according to the group’s expectations in terms of membership to one of the two social groups in which the society is divided in this current model. Each social group has its own distribution of type H or L. The DM’s utility is a function of economic outcomes and anticipatory emotions towards the outcomes, either positive or negative. The total utility is built over three periods of time, according to which at the beginning of period t the DM is endowed with an initial endowment, or amount of human capital, S t . At this stage the DM receives a signal, σ t Σ = { H , L } , that is informative about her identity traits, θ . The probability of observing an H signal is p ( 0 , 1 ) . The signal is informative in the sense that it can either broaden or restrict the set of opportunities available to the DM if it does not clash with the expectations of the group. The evaluation of available opportunities is grounded on the existence of two kinds of expectation that support the presence of social norms associated to the social group to which DM belongs or aspires to take part of.
Definition 1.
Empirical expectations state what the DM “expects the other in her position will do” in a particular situation. Normative expectations define what “they think other people believe ought to be done”(Bicchieri [31]).
The presence of the two kinds of expectation transform the DM’s decision into a monotone decision problem, whereby the posterior beliefs induced by the signal can be ordered so that specific actions are chosen in response to their corresponding signal realizations sustained by the norms. This is because:
Definition 2.
A social norm is a code of conduct shared by society and enforced through internal sanctions like guilt, shame, and loss of self-esteem.
The presence of strong norms dictating a certain type of behavior is a possible source of cognitive dissonance for the individual whenever the realization of the signal does not accord with that norm. Accordingly, the DM who has internalized the norm needs to solve the dissonance caused by the signal, σ . Since it is a nomothetic dissonance in our case, the best option is normally to avoid the source of the dissonance—that is, to choose the interpretation and recall strategy of the signal, σ ^ , with probability λ σ [ 0 , 1 ] . At t + 1 , the DM updates her beliefs about her identity, θ * , according to Bayes’ rule and chooses to invest in education, e { 1 , 0 } , and experiences emotional utility from the outcome of the investment choice, θ ^ ( e ) . In period t + 1 , the DM faces a choice regarding the investment that is individually deemed socially worthy: investing (or not) at time t + 1 has an impact on the identity that the DM wants to signal at t + 2 and produces at t + 1 an emotional reaction related to signaling the new identity at t + 2 . The action is the main variable that allows the DM to pursue her plan over the future identity. The plan will have as return both the material outcome and the self-esteem outcome. The latter comes from the DM’s perception of enacting her plan. The plan can go in two directions: maintaining the status quo of her neighborhood, with probability 1 x i ; or changing the status and undertaking a new path with probability x i . The individual has the theoretical possibility of choosing to not replicate the identity trait of her reference group and to go for her own identity according to her aspiration level and autonomy. The outcome of the action has material payoff only on the last period, t + 2 , and it is the final amount of human capital gained after the investment choice, θ i S t + 2 . The timing is pictured in Figure A1, in Appendix A.
An important assumption of the model is that it is a non-cooperative game between the long-run self and the short-run incarnation, namely, the individual cannot commit ex ante to her future decisions. Instead, the long-run self chooses a self-control action causing a current cost that influences the utility function of the myopic self, producing externalities on her future welfare. The magnitude of externality depends on the individual’s identity trait, whose value is subject to imperfect information.
Timet. The expected value of the identity is conditional on each possible realization of such signals, and it is given by:
θ i = θ H with probability p , θ L with probability ( 1 p ) ,
with θ H > θ L and θ ¯ p θ H + ( 1 p ) θ L .
Assupmtion 1.
The DM has a prior distribution f ( θ ) on Θ, and she observes a signal σ with likelihoods l ( σ | θ ) . If l ( σ | θ ) satisfies the Monotone Likelihood Ratio Property (MLRP), then the posterior belief f ( θ | σ ) follows the MLRP. Hence, the high signal first-order stochastically dominates (FOSD) the low signal:
F ( θ i | σ t = H ) F ( θ i | σ t = L ) for all θ Θ .
Thus, the stochastic order of the information structure tells us that for any values of the identity parameter ( θ i ), higher values of the signal make the higher parameter value relatively more likely. In the absence of empirical expectations and social norms, better information allows for a more accurate match between beliefs and actions. If beliefs are formed through the group’s expectations, then their match with the actions could be driven by a further specification of the signal structure: there are going to be some signal realizations that are more preferred than others. For example, a group with a majority of L type (namely, with a biased prior that shows that L types are more frequent in that group) could tend to welcome more other L types rather than H types, and in terms of the stochastic orderings, the information structure considered more informative will be the one that on average will produce with higher probability an L signal than any other informative structure. Then, in cases where the signal realization does not respect the ordering, the DM decides how to recall the signal.
P r ( θ i | σ t = σ t 1 ) P r ( θ i | σ t σ t 1 ) for all θ Θ
Accordingly and following Bénabou and Tirole [10,21] and Rabin [5], I admit that the individual can decide how to record the signal at time t. Whether to interpret it realistically σ ^ = σ or to rationalize it σ t ^ σ t with σ t ^ Ω ^ = { H , L , } . Rationalization means that the long-run self at time t may either communicate the signal truthfully to the short-run self at stage t + 1 , or suppress it. The DM’s decision at time t is to make a recall strategy that is the probability, λ σ [ 0 , 1 ] , of truthfully transmitting to self- t + 1 the signal, i { H , L } :
λ σ = P r [ σ t ^ = i | σ t = i ] .
The DM will observe the signal if the gain of making an informed decision will exceed the cost of memory manipulation. λ σ will be chosen according to how reliable or informative the signal is—namely, if it is pivotal in the decision.
The recall strategy has its own justification based on the DM’s preferences over θ . If the signal confirms her prior on her initial identity trait ( θ ), she will not discard the original signal ( λ σ = 1 ), and then she will make the investment choice correlated with her characteristics. The incentive is also justified by the fact that the DM will make another evaluation that will trigger her choice. She may envisage what the consequences of sending specific signals are, whether it comes from a recollection or an action, to her circle.
Examples. A girl in a social circle of non-educated women who decides to continue her education will signal a message diverging from the circle identity. The heir of a wealthy family that decides not to pursue the family profession may find some hurdle in gaining the acceptance of her peers. A woman facing a tradeoff between work and family, when all the people around her seem to have chosen one of the two spheres, will hinder her choice of labour supply.
Hence, at time t the long-run self chooses the strategy to recall the signal. Endogenizing the imperfect recall allows the DM to reduce the externalities from one self to another. Following Festinger [41], reducing dissonance is not costless, whether it is implemented via attitude change or via memory manipulation. It requires re-valuing past behavior or information and breaking cognitive habits. Because the DM has preferences over her identity, and because she may want to solve the cognitive dissonance, she has the incentive to manipulate her recollection (or ex-post denial11) by exerting an effort. Let us consider the example of the little girl. Let us imagine that the girl has received a signal H that goes against the empirical expectations displayed in her circle that want all the girls to be uneducated (i.e., all the girls signal to be L). Now, she has to decide how to recall the signal, considering the trade-off between following the old path of no investment in education or to continue her education, signaling a message diverging from the circle identity. It seems necessary to stress the fact that recall strategies in an awareness-management context do not lead the individual to fool herself. Yet, she is aware that what she may have forgotten are not random events but rather the result of an incentivized inference. The memory effort is associated to a cost12 function, M σ ( λ σ ) , that will impose further restriction to the choice and the agency of the individual13.
Assupmtion 2.
The cost is strictly increasing, convex, twice-continuously differentiable, and if λ σ = 0 , then M σ ( 0 ) = 0 and M σ ( 0 ) > 0 .
Timet+ 1. The short-run self updates her beliefs and chooses the action e (i.e., investing in education) from a finite set A, given the signal recalled. The DM is rational and then before updating she evaluates the precision of the signal received by her previous incarnation. She considers the possibility that the long-run self at time t may have manipulated the true signal. Accordingly, she needs to estimate the probability that the signal is accurate. If λ σ expresses the probability that Self-t has truly transmitted the signal, λ σ * represents Self-t + 1’s belief concerning Self-t’s communication strategy. Yet, the accuracy of the signal is given by:
r * ( λ ) P r [ σ = H | σ ^ = ; λ σ ] = p ( 1 λ H ) p ( 1 λ H ) + ( 1 p ) ( 1 λ L ) [ p , 1 ] ,
implying that if Self-t + 1 receives σ ^ = , by using Bayes’ rule, she will assign the probability ( 1 p ) ( 1 λ L ) that σ = L was observed and the probability p ( 1 λ H ) that σ = H occurred. The incentive constraints for Self-t + 1 do not change at this stage. However, the degree of self-assessment needs to take the accuracy of the recall into account. Hence, the DM’s revised beliefs are:
θ i * = θ ( r * ) r * θ H + ( 1 r * ) θ L .
After the updating, the DM will choose the investment actions taking into account both the future material outcome (i.e., in the example of the girl, the future material outcome is an increase of her human capital level) and the anticipatory emotion of the outcome (i.e., feeling good/bad with that increase of human capital) realized that depends on the action taken (i.e., investing one more year in education).
The individual will implement the action strategy e ( θ i ) : Θ A , where A is a non-empty, compact, and convex set in . The investment in education will impact the DM’s human capital. Let us assume that each individual at time (t) is endowed with an initial level of human capital, S t > 0 . S t > 0 is the initial endowment, and is interpreted in such way as to permit complementarities between the family’s human capital and the quality of community the family lives in. In this way, according to the initial level we give a representation of initial stratification that may determine the future one. In this scenario, the population is divided in two groups according to income and social status: H-types belong to the portion of the population characterized by high income, good social connections, and communities; while L-types represent the complement portion of the population. Human capital accumulates according to the following equation:
S t + 1 = S t + e t r ,
where S t is the DM’s human capital at time t, e t is the educational investment faced at time t, and r > 0 is the interest rate of that investment. The educational investment will determine the future group affiliation of the DM. The sense of affiliation is the motivation for the action. The DM’s probability to invest is of the form:
x i ( p ) = P r e = 1 | θ i ,
and it represents the conditional probability law of the action e for each possible value of θ . Since the decision of investment takes the persistence of identity into account, we need to express how the future identity enters the DM’s decision problem. The anticipatory emotion at time t aroused by the thought of the future identity is derived rationally by calculating the posterior identity the DM gains by means of the investment choice. The posterior identity evaluated to the investment decision is θ ^ = θ ^ ( e ) θ H ; θ L , where:
θ ^ = θ ( 0 ) = q ^ θ H + ( 1 q ^ ) θ L if e = 0 , θ ( 1 ) = p ^ θ H + ( 1 p ^ ) θ L if e = 1 .
After the action, the DM experiences a shift in beliefs by assuming that she is sophisticated, in foreseeing this shift, by applying the Bayesian calculation:
p ^ = P r ( θ H | e = 1 ) = P r ( e = 1 | θ H * ) P r ( θ H * ) P r ( e = 1 )
and
q ^ = P r ( θ H | e = 0 ) = P r ( e = 0 | θ H * ) P r ( θ H * ) P r ( e = 1 ) ,
where the prior beliefs at time t + 1 are represented by P r ( θ H * ) = r * , the probability of being H-type given the recall. Moreover, recalling the probability of investing given the type, x i ( p ) = P r ( e = 1 | θ i ) , then P r ( e = 1 , 0 ) is defined as
P r ( e = 1 ) = P r ( e = 1 | θ H * ) P r ( θ H * ) + P r ( e = 1 | θ L * ) P r ( θ L * )
and
P r ( e = 0 ) = P r ( e = 0 | θ H * ) P r ( θ H * ) + P r ( e = 0 | θ L * ) P r ( θ L * ) .
Then, the posterior probabilities in the two scenarios will be:
p ^ = r * x H r * x H + ( 1 r * ) x L
and
q ^ = r * ( 1 x H ) r * ( 1 x H ) + ( 1 r * ) ( 1 x L ) .
Table A1 in Appendix A shows the probabilities of the two signals and the posterior beliefs.
Preferences. The model extends for three periods, from t to t + 2 .
In the last period, the DM will receive the outcomes of the action taken at time t + 1 .
U t + 2 i = θ i S t + 2
The DM’s preferences at time t + 1 are represented by the anticipatory utility function: namely, at time t + 1 the DM gets an instantaneous utility of her current identity and a utility from the anticipation of time t + 2 identity outcomes. Consistent with Carrillo et al. [3], the instantaneous utility is represented by the cost function related to the action that will produce externalities in the future stages. Hence, the instantaneous utilities at time t and t + 1 are represented by the current effort the DM has to exercise in order to perform the action after, c ( e ) . The DM has perfect foresight, namely, she is sophisticated in the sense that she applies Bayesian operators to foresee her dynamic inconsistency.
The utility at time t + 1 is represented by U ( θ , θ ^ , S t ) : A × Θ , and its expression is the following:
U t + 1 i ( θ , θ ^ , S t ) = c ( e ) + V ( θ , θ ^ , S t | σ ) = c ( e ) + s E t + 1 i [ U t + 2 i ] + δ E t + 1 i [ U t + 2 i ] .
The anticipation at time t + 1 of the utility at time t + 2 is expressed by V ( θ , θ ^ , S t | σ ) , the value function in which both the future outcome of the investment, δ θ , and the aspiration level, θ ^ = θ ( e ) (i.e., the DM’s expected identity given the investment decision), are represented:
V ( θ , θ ^ , S t | σ ) ( s θ ^ + δ θ ) S t + 1 .
In the value function δ is a traditional time discount factor ( 0 < δ < 1 ), and s is the anticipatory factor. Hence, ( δ θ ) S t + 1 is represented by the schooling return times the identity trait. The trait identity is represented in such a way that it takes into account the anticipatory utility at time t t + 1 , s θ ^ and the discounted utility from identity at time t t + 2 , ( δ θ ) S t + 1 .
The psychological insight of s is what Lowenstein [6] calls savoring of the agent’s belief about the contribution of S t + 1 to her future welfare and identity. s represents the feeling of pleasure, if s > 0 , or of fear, if s < 0 , derived by the anticipation of the contribution of the final identity. However, in this context, the feeling experienced is socially grounded in the sense that it depends upon the evaluation of the neighbors. In different but related words, this attitude can be explained by the individual’s compliance with the norm that her social background proposes to her. The agent indulges in pleasant beliefs (conversely, avoiding the disagreeable ones) about the signal she sends to her peers when considering whether to invest or not. This sentiment in the model is anticipated at time 0 and measured by s. The anticipation of future blame or praise related to the decision taken represents a further constraint to consider during the decision making. In period t + 2 , the agent obtains the return θ i S t + 2 from investing in S t + 1 . At time t + 1 , she derives feelings (pleasure or pain) from anticipating the prospect future identity, s θ ^ S t + 1 .
Assupmtion 3.
The value function is continuous and supermodular: it is strictly increasing and continuous in the aspiration level θ ^ , and continuous for every θ , but it also has increasing differences for all pairs of aspiration level, and education choice ( V ( · ) satisfies Milgrom–Shannon’s single-crossing condition). Besides, the value function satisfies the following assumption: V θ ^ > 0 , if r > 0 , V θ S t + 1 > 0 and V θ θ ^ = 0 .
The requirements enlighten three aspects: the first is a condition of good expected behavior with respect to the decision of investment; the second requirement points out the beneficial effect of the investment on the utility. Finally, the third requirement shows that the action has informational content feeding conformist behavior to a norm. On this account a clarification is due. According to Caplin and Leahy [7], anticipatory emotions affect the behavior when the total utility function is strictly concave. In this way, the DM is averse to variation to future anticipatory emotion. However, according to Bernheim and Thomadsen [53], the assumption of non-linearity can be relaxed in the case of imperfect recall.
One important property of this set-up is that, as [7] pointed out, anticipatory emotions can affect behavior when U t is non-linear, determining the DM’s preference for information. Whenever the utility function is concave, the DM is information-averse to variation in future anticipatory emotion—she suffers from anxiety. Consequently, the individual prefers to take an ignorant action rather than receiving information prior to making the decision unless this allows her to select an action that sufficiently improves her outcome. This is true when the information is perfectly recalled. However, as [53] showed, the non-linearity assumption can be relaxed when memory of the signal is imperfect and the anticipatory emotions still matter, because the imperfect recall breaks down the law of iterated expectations.
Moreover, considering the fact that aspiration level and education choice are complementary, and that θ ( · ) is a function of the unknown identity, θ , and of the signal and its recall, if the value function respects specific conditions, according to [15] we can investigate the comparative statics of the educational investment with respect to the original signal.
Assupmtion 4.
If V ( · ) is single-crossing in e and θ holds, then V ( · , θ ( 1 ) ) V ( · , θ ( 0 ) ) is non-decreasing in θ i if θ ( 1 ) > θ ( 0 ) and if 2 V ( · ) e θ i > 0 . Additionally, since by Assumption 1 we know that f ( θ i , σ i ) satisfies the monotone likelihood ratio property, then the expected value function is single crossing in e and σ and therefore the optimal choice, e * ( · ) , is weakly increasing in σ.
Regarding the cost function at time t + 1 , the DM needs to decide whether to invest in the old path at no cost or in the new path at a cost C i . Let us again consider the example of the girl. In the first case, the girl pursues the old track of being un-educated (i.e., e = 0 , the one her peers and family expect from her), while in the second case she faces the cost of deviation from the marked path by investing (i.e., e = 1 ) one more year in school. The cost function of the investment in education (i.e., c ( e ) ) is assumed to be smooth, increasing, convex, and known at time 0. The cost c ( e ) is given by c ( e ) = e C i , where C i { C H ; C L } .
I assume that investing in the new path supports both the participation constraint and the sorting condition, considering that C H < C L .
Finally, the total utility at time t takes into consideration the memory manipulation costs and the discounted values of the future utility. Here, the DM’s trade-off between accuracy of decision making and self-image takes place:
U t i ( θ , θ ^ , λ σ , S t ) = M σ ( λ σ ) + δ E t i [ U t + 1 i ] + δ 2 E t i [ U t + 2 i ] .
Figure A2 in Appendix A represents the decision tree of the entire model.

4. The DM’s Problem

The properties of the Perfect Bayesian Equilibria (PBE) can be studied in two parts by applying backward induction. First, we compute the optimal Investment of the short-run self at time t + 1 taking the recall strategy as given. Second, we obtain the Memory Manipulation decision of the long-run self at time t, taking the optimal investment strategy into account. The existence of a PBE is established in the online appendix.
Choice of e. By the end of t + 1 , the DM updates her beliefs and chooses the action given the recall of the signal. She does this by maximizing anticipatory utility given the beliefs set she owns at that time. The optimal action is
e * = arg max e { 0 , 1 } E x U t + 1 ( θ , θ ^ , λ σ , S t + 1 ) = E x E r * ( λ σ ) U t + 1 ( θ , θ ^ , λ σ , S t + 1 ) c ( e ) .
Choice of λ σ . At the end of period t, the DM chooses how to recall the signal received at the beginning of the stage. This occurs whenever the benefits of memory manipulation both in terms of self-esteem and efficient future actions overcome the cost of the manipulation.
λ σ * arg max λ σ λ σ E r * ( λ σ ) U t ( θ , θ ( σ ^ ) , λ σ , S t ) | σ ^ = σ + ( 1 λ σ ) E r * ( λ σ ) U t ( θ , θ ( σ ^ ) , λ σ , S t ) | σ ^ = M σ ( λ σ )
Then, the decision made by the agent with endogenous imperfect recall is modeled as the PBE of the multi-self game. It is constituted of a strategy profile that comprises an interpretation strategy ( σ ^ * ) and an action strategy ( e * ), and of a posterior belief.
Definition 3.
A PBE of the game is the set of strategy profiles ( σ ^ * , e * ) , where σ ^ * is given by the pair ( λ σ * ; r * ) [ 0 , 1 ] × [ p , 1 ] and e * { 0 ; 1 } , and the posterior beliefs F ( θ | σ ^ ) such that
1.
λ σ * arg max λ σ λ σ E r * ( λ σ ) U ( θ , θ ( σ ^ ) , λ σ , S t ) | σ ^ = σ + ( 1 λ σ ) E r * ( λ σ ) U ( θ , θ ( σ ^ ) , λ σ , S t ) | σ ^ = M σ ( λ σ ) ;
2.
e * arg max e E x E r * ( λ σ ) U ( θ , θ ( e ) , λ σ , S t ) | σ ^ ;
3.
F ( θ | σ ^ ) is obtained by the Bayes’ rule if P r ( σ ^ | λ σ * ) > 0 , σ ^ { L , H , } .
Condition 1 states that Self-t chooses the amount of memory manipulation that maximizes the agent’s expected payoff conditional on each outcome σ { H , L } . Condition 2 states that the short-run Self- t + 1 takes an ex-post action e with positive probability if and only if this action maximizes her utility given the beliefs she holds about the manipulation employed by Self-t. She might consider the fact that she might have forgotten about previous status. At this point, the imperfect recall is not strategic. Hence, the short-run self does not have to take in consideration the possibility that her previous self might have suppressed the signal. Condition 3 is a consistency condition, requiring that the beliefs of Self- t + 1 satisfy Bayes’ rule given the strategy of Self-t. This condition is stronger than Bayesian consistency because it requires beliefs to be consistent even for certain events that may not occur on the equilibrium path (namely, events associated with ex-ante actions that are not played in equilibrium). This condition ensures that the PBE satisfies subgame perfection, which would not be the case if one only restricted beliefs on the equilibrium path to be consistent with Bayes’ rule.

4.1. Self-t + 1 Investment Game

Given λ σ , at t + 1 the individual will choose the action that maximizes her future plan14. For the DM, the incentive criterion (IC) to invest at time t + 1 in the new path, e = 1 , requires that the gains of investment, measured in terms of utility differentials, are greater than the cost of facing the investment
I C i ( 1 ) = V θ , θ ( 1 ) , S t + 2 V θ , θ ( 0 ) , S t + 1 C i 0 = δ θ * r + s [ θ ( 1 ) ( S t + 1 + r ) θ ( 0 ) S t + 1 ] C i .
The criterion to invest at time t + 1 in the old path, e = 0 :
I C i ( 0 ) = V θ , θ ( 1 ) , S t + 2 V θ , θ ( 0 ) , S t + 1 C i 0 = δ θ * r + s [ θ ( 1 ) ( S t + 1 + r ) θ ( 0 ) S t + 1 ] C i .
That is to say, whenever the utility differentials are not so large for the DM to confront the cost of investing in a new path, then it is more efficient to remain in her status quo.
Given the parameters, the individual will maximize her total plan under the set of strategies and beliefs expressed above. If at any stage of the game the strategies are sequentially rational, namely, optimal given the beliefs, and the belief system is consistent given the equilibrium strategies, and considering that Θ and A and U ( · ) respect the requirements for the existence of a fixed point according to Kakutani’s theorem, then:
Proposition 1.
There exists a unique monotonic undominated equilibrium, characterized by thresholds p ˜ and p ¯ with 0 < p ˜ p ¯ 1 and investment probabilities x H ( p ) and x L ( p ) such that:
x H ( p ) = 0 if p > p ¯ , 1 if p < p ¯ ,
x L ( p ) = 0 if p [ p ¯ ; 1 ] , 1 if p [ p ˜ ; p ¯ ] , n o n d e c r e a s i n g if p [ 0 ; p ˜ ] .
Proof. 
See Appendix B. ☐
Because of Assumptions 3 and 4, x i * is weakly increasing in θ , and then respectively in p, imposing that a higher type cannot choose a lower investment choice.
x L ( 1 x H ) = 0 ,
hence, whenever x L > 0 then x H = 1 .
Moreover, monotone comparative statics imply that r * is a cutpoint decision rule. There is a parameter value r * , and respectively p such that the DM chooses the separating equilibria for some value moving from r * , and she can instead have multiple equilibria at the cutpoint.
The equilibrium is evaluated for 0 < p ¯ < 1 , for decreasing values of C i . Moreover, the results above show that the probability of receiving a specific signal has a monotonic hump-shaped effect on the overall probability investment whose trend will increase in p on the interval [ 0 ; p ˜ ) 15, then it will equal to 1 on [ p ˜ ; p ¯ ) , and after that it will fall to 0.
Characterization of Equilibria. Let us discuss the incentive criteria (15) and (16) in order to characterize the equilibria.
  • Pooling toward null investment.
    Both agents will choose the strategy of non-investment in the new path. From the assumption on V ( · ) and the incentive criteria specific for each type, the H types are those who might have some strategic interest in not investing in a different path, since for them the decision to invest could be less costly than for the L type. Assume that it means that
    δ θ * + s [ θ H S t + 2 θ ¯ S t + 1 ] < C H .
    In this equilibrium, we consider only the incentive constraint of an H-type, since for L-type it will be always costly to invest. We obtain the incentive constraint by knowing that if p is high enough (i.e., the self-image is behind the threshold p ¯ ), H-type can afford not to invest. Then, x H = x L = 0 and the posterior beliefs are θ ( 0 ) = θ ¯ and θ ( 1 ) = θ H since q ^ = 1 2 and p ^ = ε [ 0 ; 1 ] . Then, type H can afford not to invest if p > p ¯ , but when the latter relation does not hold, then H will take some action to distinguish herself from L. In this equilibrium, H-type will not invest in education for several other motivations. The fact that in this scenario p > p ¯ means that the agent is surrounded by people following the old path and it would be too costly for her to take action to prove being the eccentric one. If she deviates from the norm, this deviation will be self-justified, as the malleability of the beliefs will increase. In turn,
  • Separating for θ H :
    δ θ * + s [ θ H S t + 2 θ L S t + 1 ] > C H ;
  • Separating for θ L :
    δ θ * + s [ θ H S t + 2 θ L S t + 1 ] < C L .
    In this equilibrium, we consider both the incentive constraints of an H-type and an L-type. We get the incentive constraint by knowing that if there is the possibility of separating the types, then x H = 1 and x L = 0 and the posterior beliefs are θ ( 0 ) = θ L and θ ( 1 ) = θ H since q ^ = 0 and p ^ = p . Then, θ ( 1 ) > θ ( 0 ) type H will invest and L will not since 0 < p < p ˜ and the C L 0 is so high that it is not worthwhile for L to invest. In this scenario, incentive constraints bind for the two types with I C L 0 and I C H 0 .
  • Semi-separating (hybrid) by randomising for θ L :
    δ θ * + s [ θ ( 1 ) S t + 2 θ L S t + 1 ] = C L .
    This scenario occurs when the cost of investment for L-type is small enough to imitate the H-type. However, the imitation is always constrained by the prior, and the credibility of signaling to be H-type depends on p and x L : the lower the former, the more credible the strategy. Then, we have x H = 1 and 0 < x L < 1 , and the posterior probabilities are p ^ = p ¯ while 0 < q ^ < p ^ ( 1 ) , with the posterior beliefs represented by θ ( 0 ) = θ L and θ ¯ < θ ( 1 ) < θ H . Accordingly, type H will not invest and L will only depend on how credible the posterior probabilities are, I C L = 0 .
  • Pooling towards total investment:
    δ θ * + s [ θ ¯ S t + 2 θ L S t + 1 ] > C L .
    In the case of both types investing in further education, the incentive constraint that we need to consider is the one of the L-type, since by definition H-type will always have incentive to invest. In this scenario, we have that the probability to invest is x H = x L = 1 and then, recalling (8), the posterior beliefs are θ ( 0 ) = θ L and θ ( 1 ) = θ ¯ since q ^ = ε [ 0 ; 1 ] and p ^ = 1 2 . Then, θ ( 1 ) > θ ( 0 ) type H will invest and L will only if her I C L 0 binds and in that case p ˜ p p ¯ . The incentive holds since it is worthy to pursue for costs facing even a small gain in self-image: as the cost increases, so does the threshold p ˜ .
Comparative Analysis. The probability to invest (x) is determined by both the internal (p, λ σ , s) and external ( S t , r, C i ) constraints. Moreover, both individuals invest more when x H and x L (weakly) increase. In all cases, type H will go either for a separating, a full investment, or hybrid equilibrium, while type L will invest only in hybrid or full situation. Then, to show for what values of the main parameters the probability to invest increases, we need to study how the incentive constraint varies with respect to a variation of parameters. From
I C i = δ θ * r + s [ θ ( 1 ) ( S t + 1 + e r ) θ ( 0 ) S t ] C i ,
if individuals invest in education, then e = 1 . We have:
I C i S t + 1 = s ( θ ( 1 ) θ ( 0 ) ) > 0 .
S t + 1 is a measure of initial affiliation. Its level and quality are higher for the H type, driving her to show more incentive in eliciting identity-affirming investment. The positive impact of the stock on the willingness to invest is a consequence of the so-called escalating commitment, expressed by the requirement on V θ S t + 1 : individuals have a higher demand for optimistic beliefs when they have more at stake (in this case, when they have higher identity-specific capital S t already invested). From here it is worth making another consideration:
2 I C i S t + 1 s = ( θ ( 1 ) θ ( 0 ) ) .
The higher the initial investment, the more positive the emotion attached to future identity and the higher the incentive to invest.
I C i r = δ θ * + s θ ( 1 ) > 0
An increase in the evaluation of the interest rate means an enlargement of the perception and awareness of the opportunity available. The interest rate of education is important information for the decision mechanism, and its lack depends on how connected the society is vertically and horizontally. Whenever the society is highly stratified, this piece of information is lost.
I C i s = [ ( θ ( 1 ) S t + 1 θ ( 0 ) S t ) ] > 0
The more pleasant the sentiment related to the future identity conveyed by the investment possibility, the higher the incentive to invest. The positive feelings depend on how much the DM feels her current self connected with her future self, so that she can engage in forward-looking choices.
Finally, the impact of the cost on the probability of investment is inversely related regarding the type: for H-type, a decrease of the initial cost increases p ¯ (it gets closer to 1), decreasing her willingness to invest. For L type, a decrease of cost means a decrease of p ˜ (it gets closer to 0) reducing the mixing region, then it increases her willingness to invest ( x L ).

4.2. Self-t Memory Manipulation Game

Once the signal has been received, how will the DM interpret the new information in order to safeguard her beliefs? Here, the Self-t implements the recall strategy by using memory manipulation (or ex-post denial) to safeguard her beliefs. She has incentives to process the H and L signals asymmetrically. In order to do so, let us define what the expected utilities are given the signals and recollections16.
When the signal is recall and interpreted realistically, the expected utilities given either the signal and the recollection are the same, then:
U i ( θ ; θ ( σ i ^ ) , σ i ) = E U ( θ ; θ ( σ i ^ ) ; S t ; σ i ) | σ ^ .
If the DM instead decides to rationalize the signal (i.e., if she recollects σ ^ = ), the expected utilities will be:
U ( θ ; θ ( ) , σ i ) = E r * U ( θ ; θ ( ^ ) ; S t ; σ i ) | σ ^ = r ( λ σ * ) × U H ( θ ( ) ) + [ 1 r ( λ σ * ) ] × U L ( θ ( ) ) ,
as illustrated in Figure A217. The rationalization of the signal represents an incentive for the DM, who has preferences over her identity. Since the manipulation of her beliefs is defined according to Bayes’ rule, the DM will eventually make correct inferences and learn her identity. However, the updating process is slower than what would normally be implied by Bayes’ rule. This situation is described as conservatism bias, according to which all new information is insufficiently weighted in the updating process.
Memory Manipulation. Individuals maximize utility not only through behavior but by adopting a view of reality that is consistent with their well-being. These views have direct effects on behavior. The adoption passes by the imperfect recall of information and manipulation of the beliefs. The main consequence is that the long-run self will recall the information received in such a way as to manipulate the information set18 that the short-run self will inherit. Hence, after observing a signal σ = { H ; L } , the long-run self chooses λ σ to maximize the following function:
λ σ U i ( θ ; θ ( σ i ^ ) , σ i ) + ( 1 λ σ ) U ( θ ; θ ( ) , σ i ) M σ ( λ σ ) .
By adding Equation (26), we get
U i ( θ ; θ ( ) , σ i ) + λ σ [ U i ( θ ; θ ( σ i ^ ) , σ i ) U i ( θ ; θ ( ) , σ i ) ] + ( 1 λ σ ) r ( λ σ * ) [ U j ( θ ; θ ( ) , σ i ) U i ( θ ; θ ( ) , σ i ) ] M σ ( λ σ ) .
Definition 4.
Δ D M = U i ( θ ; θ ( σ i ^ ) , σ i ) U i ( θ ; θ ( ) , σ i ) represents the decision-making factor.
Given the recall strategy, will the DM make a suboptimal decision?
Definition 5.
Δ U = U j ( θ ; θ ( ) , σ i ) U i ( θ ; θ ( ) , σ i ) represents the self-image differential in utility, considering j i .
Given the recall strategy, how much utility does the DM gain through a more favorable inference of her identity? Let us consider the two cases.
The expected utility of Self-t conditional on receiving a signal σ = L is:
U L ( θ ; θ ( ) , L ) + λ σ [ U L ( θ ; θ ( L ) , L ) U L ( θ ; θ ( ) , L ] + ( 1 λ σ ) r ( λ σ * ) [ U H ( θ ; θ ( ) , L ) U L ( θ ; θ ( ) , L ) ] M σ ( λ σ ) .
Because of the assumption on revealed preferences U L ( θ ; θ ( L ) , L ) < U L ( θ ; θ ( ) , L ) , hence the decision-making factor is negative for the L type. That is to say, forgetting L’s signal might lead to a suboptimal choice of the future action. However, the self-esteem will boost, because of the stochastic ordering of the signal, U H ( θ ; θ ( ) , L ) > U L ( θ ; θ ( ) , L ) .
Upon receiving a signal σ = H , and after a few manipulations, the expected utility will be:
U H ( θ ; θ ( ) , H ) + ( 1 r ( λ σ * ) ) U L ( θ ; θ ( ) , H ) + λ σ [ U H ( θ ; θ ( H ) , H ) U i ( θ ; θ ( ) , H ] + ( λ σ ) r ( λ σ * ) [ U H ( θ ; θ ( ) , H ) U L ( θ ; θ ( ) , H ) ] M σ ( λ σ ) .
In this case, forgetting the H signal has a negative effect on both decision-making and self-esteem. Because of both the revealed preferences and the stochastic ordering, receiving H signal is a situation in which memory manipulation should not be implemented.
Memory Manipulation in Hedonic Case. If we consider the decision of recalling the signal as in pure hedonic value19, then the DM will choose to consider only the self-image differential. The recall strategy will be dependent on it, on the cost function of memory, and on the content of the initial signal. In Appendix C it is possible to find the full characterization of the equilibria coming from the manipulation when both types of agent choose the amount of information to recall. Let us consider case-by-case. When σ t = L Self-t maximizes the following:
λ L U L ( θ ; θ ( σ i ^ ) , σ i ) + ( 1 λ L ) U M L ( λ L ) = U L + r ( λ L * ) ( 1 λ L ) Δ U M L ( λ L ) ,
thus, Self-t will choose the amount of manipulation, then λ σ , so as to maximize the previous formula. Then, for L-type we may observe that
max λ L λ L U L + r ( λ L * ) ( 1 λ L ) U H + [ 1 r ( λ L * ) ] ( 1 λ L ) U L M L ( λ L ) ,
then by Kuhn–Tucker Theorem,
U L λ L : r ( λ L * ) Δ U M L ( λ L ) = 0 .
The recollection strategy would be different for H and L types.
Let us start by studying the L type. Her inference about the accuracy20 of the signal, with some manipulation, is
r ( λ L * ) = p p + ( 1 p ) ( 1 λ L * ) ,
whose values depend on whether λ L * = 0 , then r * = p , or λ L * = 1 , then r * = 1 . Hence, r ( λ L * ) [ p , 1 ] . By applying Kuhn–Tucker’s theorem, the FOC (30) becomes:
M L ( λ L ) = p p + ( 1 p ) ( 1 λ L * ) Δ U .
By the implicit function theorem, λ L * exists.
Proposition 2.
The PBEs for belief manipulation are defined by
λ L * = 0 i f   Δ U M L ( 0 ) p , 1 i f   Δ U M L ( 1 ) .
The amount of belief manipulation will be:
  • Increasing in Δ U ;
  • Decreasing in M ( λ ) ;
  • Increasing in p.
Proof. 
See Appendix B. ☐
Analogously, the expected utility of Self-t after observing an H signal is:
λ H U H ( θ ; θ ( σ i ^ ) , σ i ) + ( 1 λ H ) U M H ( λ H ) = λ H U H + r ( λ H * ) ( 1 λ H ) U H + ( 1 r ( λ H * ) ) ( 1 λ H ) U L M H ( λ H )
max λ H λ H U H + r ( λ H * ) ( 1 λ ) U H + [ 1 r ( λ H * ) ] ( 1 λ H ) U L M H ( λ H )
and
U H λ H : [ 1 r ( λ H * ) ] Δ U M H ( λ H ) = 0 .
Type H’s inference about the accuracy21 of the signal, with some manipulation is
r ( λ H * ) = p ( 1 λ H * ) p ( 1 λ L * ) + ( 1 p ) ,
whose values depend on whether λ H * = 0 , then r * = p , or λ H * = 1 , then r * = 0 . Hence, r ( λ H * ) [ 0 , p ] . By applying Kuhn–Tucker’s theorem, the FOC (35) becomes:
1 p ( 1 λ H * ) p ( 1 λ L * ) + ( 1 p ) Δ U = M H ( λ ) .
By the implicit function theorem λ H * exists.
Proposition 3.
The PBEs for belief manipulation follow:
λ H * = 0 if Δ U M H ( 0 ) ( 1 p ) , 1 if Δ U M H ( 1 ) .
The amount of belief manipulation will be:
  • Increasing in Δ U ;
  • Decreasing in M ( λ ) ;
  • Increasing in ( 1 p ) .
In both cases, for any increase of λ σ both sides of (31) and (36) are increasing in the belief strategy, then there may be multiple interior equilibria.

5. Discussion

Like in the investment decision, the possibility of different equilibria depends on the probability of investing that, in turn, rely on the decision of how to recollect the signal, λ σ , in accordance with the prevailing empirical expectations on the identity types l ( σ | θ ) . Moreover, the incentives to engage in manipulation are higher as the self-image payoff gain, Δ U , increases. The assumption of the manipulation cost function allows us to have equilibria with both manipulation and no manipulation according to the magnitude of Δ U . In a pure strategy with accurate recall, the initial division of the population will be reflected in the following periods, then no undermining of the self-esteem in terms of peer recognition.
In a pure strategy with suppression of the signal, the updated beliefs at time t + 1 converge to the average level of θ ¯ , showing that DM has either overconfident or underconfident beliefs in absolute terms. Moreover, if we consider the initial proportion of H-type and L-type individuals in the population, then the sense of overconfidence or underconfidence will be held in relative terms: for example, in a population where p < 1 2 = ( p ¯ ) , the median identity will be the one of θ L . The norm is to be L-type. Accordingly, if we assume that the entire population is motivated to endorse the socially accepted type, then we may have L-type DM exercising λ σ = 1 , and H-type choosing λ σ = 0 , reinforcing the identity with trait L. Let us see how it works. As already stated at the beginning of the model, in the population a proportion 1 p of DMs are identified by θ L having received the signal σ t = L . The proportion of θ H having received σ t = H is p. The average identity is given by θ ¯ = p θ H + ( 1 p ) θ L , which can be written as a function of the proportion of H-type individuals: θ ( p ) . Now let us assume that the the median identity is given by θ L . What would be the distribution of the self-evaluation? Let us assume that σ t = L is a signal reducing the self-image of the DM and that everyone will use the choose the same probability of recalling the signal, λ σ * ( 0 , 1 ) , and accordingly they will impute the reliability of the memory by r * . Now, the self-assessment considering the accuracy of the recall will be θ ( r * ) , no longer θ ¯ . Then, the fraction of agents who will manipulate the recall is represented by ( 1 p ) ( 1 λ σ * ) and they are those who overestimate their identity by θ ( λ σ * ) θ L = r * ( θ H θ L ) . To those individuals, we have to add the fraction of people who did receive a good signal, and they are p: the latter and the former will enlarge the proportion of people considering beyond the average, ( 1 λ σ * ) ( 1 p ) . While the fraction of those underestimating their ability by θ L θ ( λ σ * ) = ( 1 r * ) ( θ H θ L ) is represented by the minority p, who will see confirmed their self-assessment as an agent below-average. Moreover, the less the manipulation cost, the higher the number of H-types repressing the good signal. Another perspective from which to look at the problem can be expressed in terms of the homogeneity of the social context in which the DM lives. Whenever p = 1 2 , the social system enforces the highest level of entropy and diversity and then the individual should not incur any dissonance problem. That is, in a society in which you have an equal chance of moving in one direction or another, then the self-esteem problem related to the quest of belonging can be downsized. Instead, whenever the context is highly homogeneous, then the choices of either the action and of the signal rationalization are driven by the sense of belonging to a precise social group.
Yet, the manipulation costs can be very high leaving individuals in self-trap situations caused by their beliefs. Then, as already proved, the initial proportion of identity has an effect on both recalling and action strategy. One question that arises is the following: if every strategy can be brought back primitively to p, would the DM be able to identify a signal as informative for her identity and aspirations and then make a decision accordingly? Additionally, why is this question so important? It is important because the initial beliefs work as a mental insurance tool affecting the propensity towards a new piece of information. Indeed, the cognitive neighborhood, or the the information about p through the experience of a “similar” other, matters. It also matters what fraction of information on p the DM draws from whom.

5.1. Characterizing Beliefs Updating Heuristics

The work on how the DM’s information processing can be restrained is very extensive. In the studies of belief updating (Tversky and Kahneman [54]; Cameron [55]; Eil and Rao [56]; Mobius et al. [57]), agents are provided with signals about the same quantity over which belief revisions are being analyzed. For example, in Eil and Rao [56], Mobius et al. [57], and Grossman and Owens [58], respondents revise their beliefs about either their own intelligence or beauty, and receive feedback about the same underlying entity for which beliefs are being reported. In Nguyen [59] and Zafar [37,38], information on future earnings has been provided to students in other contexts, and it has been shown to have an impact on actual schooling choices but not without a certain delay in updating. Recalling a good signal is appealing every time the outcome of that signal dominates any other outcomes. For example, signaling a high IQ or scoring a high point in a student laboratory experiment is always better than signaling the opposite [18,19], because the identity of “being a good student” is the dominant in such environment, hence any feedback contrasting that ideal identity would be forgotten.
In these and other contexts, the asymmetric recall of good signal is justified by the fact that being good is the most socially acceptable identity. Yet, there are social situations in which identity and social norms establish that being both good and bad are socially acceptable, in which the history of what is socially accepted matters in the way the DM will choose how to recollect information and on how fast she will update her beliefs. So far, the “bad norm” and the “persistence in time” of the norm have not been investigated throughly in the empirical literature of motivated beliefs. This model tries to approach the time variable showing how the presence of social norms can impose preferences over information structures that, in turn, make the DM execute a rational decision process in imperfectly recalling the signal received, regardless of its good or bad sign. Yet, empirical analysis is required.
Moreover, this literature classifies agents’ updating according to the heuristic used, which ranges from conservative to representative, taking distance from a Bayesian updating depending on the weight assigned to the recent information or on the adjustment mechanism.
The conservative heuristic is the one that better applies to the context of the model. Individuals are subjected to conservatism bias if they fail to sufficiently adjust their beliefs in light of new information. In other words, they update in the right direction but less than a Bayesian updater. In this regard, people suffering from conservatism bias are those sensitive to new information, and they prefer to infer their identity from their recollection rather than from the actual signal. If we consider θ ^ σ ^ as the expected value of θ given the information structure based on the recalled signal σ ^ , while θ σ is the expected value of the identity parameter given the information structure produced by the observed signal σ (i.e., the Bayesian estimate of θ given the original signal), then θ ^ σ ^ dominates θ σ in the sense of second-order stochastic dominance.
Let us consider G ( θ σ ) as the cumulative distribution of the expected value of θ conditional on the actual signal σ .
Proposition 4.
Whenever the DM is uncertainty-averse and her decision-making is justified by the presence of social norms, and whenever she is exposed to two information structures (one of which is in conflict with the information released by the norm), she will order the two structures according to the Second order Stochastic Dominance (SOSD). Namely, she will choose the information structure that is less-variable with respect to the social norm. In our model, θ ^ σ ^ is less variable than θ σ . Additionally, the updating process of the information produced by σ, used by the DM, is conservative in the sense that it is less than what Bayes’ rule implies.
Proof. 
See Appendix B. ☐

5.2. Welfare Analysis of Awareness

In order to further assess the analysis, the perspective to consider is an ex ante one that will try to answer the following question: if the DM could choose whether to engage in a manipulation strategy before receiving the initial signal, what would she do? Ex ante it would be optimal to commit not to engage in a rationalization strategy because the expected cost related to the strategy would outweigh the expected gain. Moreover, the DM would be willing to observe the signal if the expected costs of making an uninformative decision are greater than the premium of engagement. Otherwise, she would prefer to gain a lower expected payoff but also avoid the self-deception costs. If this did not happen, then the DM would follow one of the four methods22 that in psychology are used as resolution of the dissonance: the selective exposure to information (i.e., the tendency people have to avoid information that would create cognitive dissonance because it is incompatible with their current beliefs).

6. Conclusions

This paper proposes a diachronic approach to the study of identity. It identifies empirical expectations and monotone information structure to be the tools through which people form the conception of their identity. The social norms are the determinant of the genesis of the identity conception. The model shows that because of the presence of the norms people decide to conform or react against them by manipulating the information structure in a self-serving way. In doing so, it addresses both the demand and supply sides of motivated cognition. The manipulation is also justified to reach inter-temporal goals. That is to say, this work shows how people make choices between identity-relevant options and how they deliberately shape and manage not only their current identity but also their future one coherently with a specific informational structure.
The findings highlight that the relation between norms and identity is not as simple as commonly used in the literature of bounded rationality and synchronic identity theory. The presence of norms not only defines the action strategies that it are expected to be taken, but it also shapes the mental structure that people use to read the reality. The latter findings are important in light of the debate about the micro-level consequences that social norms such as gender or group norms have on macro-level inefficiencies such as decreasing female labour participation and the persistence of gender and social and economic inequalities. Interventions aiming to reduce the material cost of the action (e.g., reducing economic barriers, quota interventions, scholarships, etc.) might not be as effective as expected if also the individual cognitive costs are not also addressed. However, no internal costs nor distorted beliefs will be reduced if social norms are not considered and studied extensively.

Funding

This work was supported by the John Templeton Foundation (grant No. 39500, Personal Freedom. Measure, Policy and Political Implication).

Conflicts of Interest

The author declares no conflict of interest. The founding sponsor had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Appendix A. Figures and Tables

Figure A1. Timing.
Figure A1. Timing.
Games 09 00099 g0a1
Figure A2. Decision maker’s (DM’s) decision tree.
Figure A2. Decision maker’s (DM’s) decision tree.
Games 09 00099 g0a2
Table A1. Posterior beliefs.
Table A1. Posterior beliefs.
σ = i prob( σ )prob( σ ^ = i | σ = i )prob( σ = H | σ ^ = )prob( θ i | e = 1 )
Hp λ r * p ^
L 1 p λ 1 r * p ^

Appendix B. Results

Proof. 
Proposition 1 For Kakutani’s fixed point theory to hold, the requirements are that A is a non-empty, compact, and convex set and e * is a set-valued function on A. Since e * : θ A is a best-response correspondence on the action set for each possible player, then e * exists as a fixed point, hence as PBE.
  • Separating.
    In this scenario, p ^ = 1 and q ^ = 0 . By expressing x i as a function of the priors p and of the recall strategy r * , I have to solve the following system:
    1 = a r * a p + b ( 1 r * ) 0 = ( 1 a ) r * ( 1 a ) r * + ( 1 b ( 1 r * ) ,
    where a = x H , b = x L , and r * = λ σ * .
    b ( 1 r * ) = 0 , ( 1 a ) r * = 0 ,
    r * < 1 and b = 0 , r * > 0 and a = 1 ,
    from which I obtain the relationship between recall probability and the priors.
    p < 1 and b = 0 , λ L = 1 , p > 0 and a = 1 , λ H = 1 ,
    yet from the results above I envisage there will be a “critical” level of p that will make x i switch from one decision to another.
  • Pooling: universal investment.
    In this case a = b = 1 and p ^ = 1 2 , hence θ ^ ( 1 ) = θ ¯ . I have to discuss the value of q ^ because Bayes’ rule does not work and I need to arbitrarily assign beliefs regarding the off-equilibrium path behavior that supports a pooling equilibrium. Moreover, I also need to study for which value of p the universal investment is supported by the two players.
    1 2 = a r * a r * + b ( 1 r * ) , q ^ = ε [ 0 , 1 ] ,
    a r * + a ( 1 r * ) = 2 a r * , q ^ = ε [ 0 , 1 ] ,
    since a = b = 1 , I can substitute one with the other,
    r * = 1 2 and a > 0 , λ L = λ H , q ^ = ε [ 0 , 1 ] ,
    from which it occurs that whenever λ H = λ L p = 1 2 = p ¯ . Hence, x H = 1 will occur only for certain values of the prior, 0 p p ¯ .
  • Pooling: null investment.
    In this case a = b = 0 and q ^ = 1 2 , hence θ ^ ( 0 ) = θ ¯ . I have to discuss the value of p ^ because Bayes’ rule does not work and I need to arbitrarily assign beliefs regarding the off-equilibrium path behavior that supports a pooling equilibrium. Moreover, I also need to study for which value of p the universal investment is supported by the two players.
    p ^ = ε [ 0 , 1 ] , 1 2 = ( 1 a ) r * ( 1 a ) r * + ( 1 b ) ( 1 r * ) ,
    p ^ = ε [ 0 , 1 ] , ( 1 a ) r * + ( 1 a ) ( 1 r * ) = 2 ( 1 a ) r * ,
    since 1 a = 1 b = 1 ,
    p ^ = ε [ 0 , 1 ] , r * = 1 2 and a < 1 . λ L = λ H
    Hence, p = 1 2 is the critical level for the DM H to switch from the strategy to invest to the one of not investing. She invests any time p [ 0 , 1 2 ) , and she restrains herself to invest in the new path whenever p [ 1 2 , 1 ] . Instead, the L DM has another threshold to consider when she is choosing an investment strategy. The second threshold is reached when the DM decides to randomize between the pure strategies.
  • Randomization: for L-type.
    In the randomization case where the updating process is imperfect, and it consists of the H-type playing the pure strategy of investing ( a = 1 ) and the L-type applying a mixed strategy between the possible two actions ( b [ 0 ; 1 ] ), both investing and non-investing strategies are played with positive probability along the equilibrium path. Moreover, since q ^ = 0 , then θ ^ ( 0 ) = θ L and θ ¯ θ ^ ( 1 ) θ H . Because of the consistency requirement with respect to p ^ , b and p need to support each other. Hence,
    p ^ = a r * a r * + b ( 1 r * ) , q ^ = 0 .
    Since a = 1 , then I will solve only the first equation by b [ 0 ; 1 ] . I already discussed the case in which b takes on one of the two extremes, which will conduct either to the separating equilibrium or to the full investment. Let us take b = 0.5 . Then,
    r * ( 1 p ^ ) = 1 2 ( 1 r * ) p ^
    and
    r * = p ^ 2 p ^ ,
    where p ^ 1 . Again, if p ^ = 0 , then r * = 0 and the system falls in the full investment equilibrium. If p ^ = 1 , r * = 1 the system reproduces a separating one. For intermediate values of p ^ = 1 2 , a further threshold for the prior, r * = 1 3 , is reached.
Remark A1.
Assumption 2. The condition satisfies two requirements. The first is related to ensuring that both manipulating and non-manipulating strategies will occur. The first is the Kuhn–Tucker constraint qualification necessary for the uniqueness of the equilibrium. A further specification of the cost function that may drive the DM towards an equilibrium rather than another would be the following:
  • M σ ( λ σ ) = ϵ ( 1 λ σ ) for which λ σ = 0 ;
  • M σ ( λ σ ) = ϵ ( λ σ ) for which λ σ = 1 .
The constrained qualification holds in both cases, but conceptually the difference between one or another is justified by the emphasis that the social context gives to one of the two strategies.
Proof. 
Proposition 2 The proof for the existence of the PBE proceeds in three steps following the direct approach:
  • For Kakutani’s fixed point theory to hold, the requirements are:
    • For the interpretation strategy: Ω has to be a non-empty, compact, and convex set and σ * must be a set-valued function on Ω . Since σ * : Ω ^ L ; H is a best-response correspondence on the interpretation set for each possible player, then λ σ * exists as a fixed point, hence as PBE.
    • For the action strategy: A has to be a non-empty, compact, and convex set and e * has to be a set-valued function on A. Since e * : Ω ^ A is a best-response correspondence on the action set for each possible player, then e * exists as a fixed point, hence as PBE.
  • Kuhn–Tucker’s constraint qualification condition holds since all the cost functions are linear, then automatically satisfied.
  • By the implicit function theorem:
    X ( r * ; λ σ ) λ σ U i + ( 1 λ σ ) U M σ ( λ σ ) = U L + r ( λ σ * ) ( 1 λ σ ) Δ U M σ ( λ σ ) .
Recall that X ( r * ; λ σ ) is continuous and differentiable in r * , and that because of the implicit function theorem, λ σ * exists. Thus, since the right properties for the existence hold, then λ σ * is a PBE.
The existence of the PBE in the proposition follows the previous proposition. However, the uniqueness of the equilibria follows by applying the contradiction approach. For
M L ( λ L * ) = r ( λ L * ) Δ U
there exists a unique PBE if
M L ( 0 ) p < Δ U < M L ( 1 ) .
To prove it, let us assume that there exist two interior equilibria:
  • λ L = 0 and λ L ( 0 , 1 ) , according to which:
    • λ L = 0 Δ U M L ( 0 ) p ;
    • λ L ( 0 , 1 ) Δ U > 1 + ( 1 p ) ( 1 λ L ) p M L ( 0 ) .
    Then
    1 + ( 1 p ) ( 1 λ L ) p M L ( 0 ) < Δ U M L ( 0 ) p
    would happen only if
    1 + ( 1 p ) ( 1 λ L ) p < 1 p ;
    namely, only if
    λ L > 0 .
    Hence, the assumption of having two interior equilibria is false.
  • λ L = 1 and λ L < 1 . Then,
    • λ L = 1 Δ U M L ( 1 ) ;
    • λ L ( 0 , 1 ) Δ U > 1 + ( 1 p ) ( 1 λ L ) p M L ( 1 ) .
Yet,
1 + ( 1 p ) ( 1 λ L ) p M L ( 1 ) < Δ U M L ( 1 )
would happen only if
1 + ( 1 p ) ( 1 λ L ) p 1 ;
Namely, only if
λ L 1 ,
which is a contradiction.
Proof of Claims 1–3
By the implicit function theorem:
G ( p * ; λ * ) λ U i + ( 1 λ ) U M ( λ ) = U L + r ( λ * ) ( 1 λ ) Δ U M ( λ ) ,
hitherto G ( p * ; λ * ) = G ( · ) , we can calculate
  • Claim 1
    λ ( Δ U * ) Δ U G ( · ) Δ U G ( · ) λ = r ( · ) ( 1 λ * ) Δ U ( 1 λ * ) r ( · ) λ Δ U r ( · ) + M ( λ ) > 0 ;
  • Claim 2
    λ * ( M ( λ * ) ) M ( λ ) G ( · ) M ( λ ) G ( · ) λ = 1 Δ U ( 1 λ * ) r ( · ) λ Δ U r ( · ) + M ( λ ) < 0 ;
  • Claim 3
    λ ( p * ) p G ( · ) p G ( · ) λ = Δ U r * ( · ) p Δ U ( 1 λ * ) r ( · ) λ Δ U r ( · ) + M ( λ ) ,
    since:
    r * ( · ) p = 1 λ * p + ( 1 p ) ( 1 λ * ) 2 ,
    r * ( · ) λ = p ( 1 p ) p + ( 1 p ) ( 1 λ * ) 2 .
    Then,
    λ ( p * ) p = Δ U 1 λ * p + ( 1 p ) ( 1 λ * ) 2 Δ U ( 1 λ * ) p ( 1 p ) p + ( 1 p ) ( 1 λ * ) 2 Δ U r ( · ) + M ( λ ) 0 .
    Now we have to discuss how the values of λ ( p * ) ) p as λ * changes. Now, if:
    λ * = 0 λ ( p * ) p > 0 depending on p;
    λ * = 1 λ ( p * ) p = 0 .
Proof. 
Proposition 3 holds by following the same steps of the previous one. ☐
Proof. 
Proposition 4: because of Assumption 1, we know that the signal structure follows the First Order Stochastic Dominance (FOSD). Then, θ ^ σ ^ second order stochastically dominates (SOSD) θ σ if and only if, for any given concave function, g : Θ . Then:
g ( θ ^ σ ^ ) d F ( θ ^ σ ^ ) g ( θ σ ) d G ( θ σ ) ,
where
g ( θ ^ σ ^ ) d F ( θ ^ σ ^ ) = p λ H g ( θ H ) + ( 1 p ) λ L g ( θ L ) + p ( 1 λ H ) + ( 1 p ) ( 1 λ L ) g ( θ )
and
g ( θ σ ) d G ( θ σ ) = p g ( θ H ) + ( 1 p ) g ( θ L ) .
Substituting the two equations into the stochastic dominance inequality, we get:
p ( 1 λ H ) + ( 1 p ) ( 1 λ L ) g ( θ ) p ( 1 λ H ) g ( θ H ) + ( 1 p ) ( 1 λ L ) f ( θ L ) .
Substituting the value of θ and simplifying for α , we have:
g ( α θ H + ( 1 α ) θ L ) α g ( θ H ) + ( 1 α ) g ( θ L ) ,
which is true because of the functional form of g ( ) ˙ . ☐

Appendix C. Extended Proofs

In this section I discuss how many PBEs exist for manipulation λ i * [ 0 ; λ i ^ ] with 0 λ i ^ < 1 . Remembering that r ( λ H , λ L ) is defined in terms of both types’ λ i , and that the cost function is such that M ( 0 ) > 0 , there exist multiple equilibria.
  • Pooling Manipulation.
    In this case λ H * = λ L * = 0 and r ( 0 ; 0 ) = p iff
    r ( 0 ; 0 ) Δ U M L ( 0 )
    and
    ( 1 r ( 0 ; 0 ) ) Δ U M H ( 0 ) .
    Every time the two conditions are satisfied there is a PBE with the maximal manipulation or minimal dissonance. Every time the DM steps away from them, she will trade it with a higher dissonance. The conditions fix a lower bound for the existence of a PBE. To have a more compact representation of the boundary, let us define
    λ ˜ = m i n M L ( 0 ) ( r ( 0 ; 0 ) ) ; M H ( 0 ) 1 r ( 0 ; 0 ) .
    Then, whenever Δ U λ ˜ , there exists a PBE with λ H * = λ L * = 0 .
    However, pooling manipulation can occur at different rates of λ i every time Δ U λ ˇ , where
    λ ˇ : m a x λ L * ; λ H * > 0 .
    There are three possible cases of PBE for different r λ H * ; λ L * :
    • λ H * = λ L * = λ i ^ . That is, when r λ H ^ ; λ L ^ . Let us consider λ i ^ = 0.5 . In this case,
      Δ U = M L ( 0.5 ) 1 ( r ( 0.5 ; 0.5 ) ) = M H ( 0.5 ) 1 ( 1 r ( 0.5 ; 0.5 ) ) ,
      hence there exists a PBE.
    • r 0 ; λ L ^ . In this scenario there exists a PBE such that if λ L ^ = 0.5 ,
      M L ( 0.5 ) 1 ( r ( 0 ; 0.5 ) ) = Δ U M H ( 0 ) 1 ( 1 r ( 0 ; 0.5 ) ) .
    • r λ H ^ ; 0 . If λ H ^ = 0.5 , then a PBE will exist whenever
      M U ( 0.5 ) 1 ( 1 r ( 0.5 ; 0 ) ) = Δ U M L ( 0 ) 1 ( r ( 0.5 ; 0 ) ) .
  • Pooling Non-Manipulation.
    This will occur whenever Δ U > λ ˇ .
  • Mixed Manipulation
    In this scenario the DM will be mixed between the two pure strategies. This occurs if λ ^ Δ U λ ˇ . Let us discuss how many of the possible combinations can be considered PBE given the assumption on the cost function M ( 0 ) > 0 .
    • Whenever H-type manipulates completely and L-types recall properly, the incentives of the two types should be Δ U > M H ( 1 ) for ( 1 r 1 ; 0 = 1 ) and consequently 0 = M L ( 0 ) for ( r 1 ; 0 = 0 ) . However, the last incentive does not hold because of the requirement of the cost function. Then, this combination cannot be considered an equilibrium.
    • In the opposite case, it occurs that 0 M H ( 0 ) for ( 1 r 0 ; 1 = 0 ) and consequently Δ U > M L ( 1 ) for ( r 0 ; 1 = 1 ) . The first condition is with respect to the assumption imposed on the cost function, hence there is going to be a PBE for such a combination of strategies.
    • If H-type partially rationalizes the signal while L-type chooses to recall the signal, then ( r 0.5 ; 1 = 1 ) and consequently the incentive conditions will be 0 = M H ( 0.5 ) and Δ U > M L ( 1 ) . Both conditions support the cost function assumption, thus a PBE will exist.
    • When the types swap their strategies, the opposite occurs with respect to the previous combination. In such a case, it results that 0 = M L ( 0.5 ) for ( r 1 ; 0.5 = 0 ) and Δ U > M H ( 1 ) for ( 1 r 1 ; 0.5 = 1 ) . Hence, since neither of the conditions fails to respect the assumption on the cost function, a PBE will also exist in this case.

References

  1. Elster, J. Alchemies of the Mind; Cambridge University Press: Cambridge, UK, 1999. [Google Scholar]
  2. Elster, J. Ulysses Unbound: Studies in Rationality, Precommitment, and Constraints; Cambridge University Press: Cambridge, UK, 2000. [Google Scholar]
  3. Carrillo, J.D.; Mariotti, T. Strategic ignorance as a self-disciplining device. Rev. Econ. Stud. 2000, 67, 529–544. [Google Scholar] [CrossRef]
  4. Akerlof, G.A.; Dickens, W.T. The economic consequences of cognitive dissonance. Am. Econ. Rev. 1982, 72, 307–319. [Google Scholar]
  5. Rabin, M. Cognitive dissonance and social change. J. Econ. Behav. Organ. 1994, 23, 177–194. [Google Scholar] [CrossRef] [Green Version]
  6. Loewenstein, G. Anticipation and the valuation of delayed consumption. Econ. J. 1987, 97, 666–684. [Google Scholar] [CrossRef]
  7. Caplin, A.; Leahy, J. Psychological expected utility theory and anticipatory feelings. Q. J. Econ. 2001, 116, 55–79. [Google Scholar] [CrossRef]
  8. Simon, H.A. Models of Bounded Rationality: Empirically Grounded Economic Reason; MIT Press: Cambridge, MA, USA, 1982; Volume 3. [Google Scholar]
  9. Brocas, I.; Carrillo, J.D. The value of information when preferences are dynamically inconsistent. Eur. Econ. Rev. 2000, 44, 1104–1115. [Google Scholar] [CrossRef]
  10. Bénabou, R.; Tirole, J. Self-confidence and personal motivation. Q. J. Econ. 2002, 117, 871–915. [Google Scholar] [CrossRef]
  11. Bénabou, R.; Tirole, J. Identity, morals, and taboos: Beliefs as assets. Q. J. Econ. 2011, 126, 805–855. [Google Scholar] [CrossRef] [PubMed]
  12. Akerlof, G.A.; Kranton, R.E. Economics and identity. Q. J. Econ. 2000, 115, 715–753. [Google Scholar] [CrossRef]
  13. Akerlof, G.A.; Kranton, R.E. Identity and schooling: Some lessons for the economics of education. J. Econ. Lit. 2002, 40, 1167–1201. [Google Scholar] [CrossRef]
  14. Fudenberg, D.; Levine, D.K. A dual-self model of impulse control. Am. Econ. Rev. 2006, 96, 1449–1476. [Google Scholar] [CrossRef] [PubMed]
  15. Athey, S. Monotone comparative statics under uncertainty. Q. J. Econ. 2002, 117, 187–223. [Google Scholar] [CrossRef]
  16. Kőszegi, B. Health anxiety and patient behavior. J. Health Econ. 2003, 22, 1073–1084. [Google Scholar] [CrossRef] [PubMed]
  17. Chew, S.H.; Huang, W.; Zhao, X. Motivated False Memory. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2127795 (accessed on 7 December 2018).
  18. Zimmermann, F. The Dynamics of Motivated Beliefs. Working Paper. In Proceedings of the CREED Seminars Amsterdam, Amsterdam, The Netherlands, 1 November 2018. [Google Scholar]
  19. Schwardmann, P.; van der Weele, J. Deception and Self-Deception. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2734736 (accessed on 7 December 2018).
  20. Hong, F.; Huang, W.; Zhao, X. Sunk Cost as a Self-Management Device. Manag. Sci. 2018, 104–111. [Google Scholar] [CrossRef]
  21. Bénabou, R.; Tirole, J. Willpower and personal rules. J. Political Econ. 2004, 112, 848–886. [Google Scholar] [CrossRef]
  22. Brunnermeier, M.K.; Parker, J.A. Optimal expectations. Am. Econ. Rev. 2005, 95, 1092–1118. [Google Scholar] [CrossRef]
  23. Bartels, D.M.; Rips, L.J. Psychological connectedness and intertemporal choice. J. Exp. Psychol. Gen. 2010, 139, 49. [Google Scholar] [CrossRef]
  24. Köszegi, B. Ego utility, overconfidence, and task choice. J. Eur. Econ. Assoc. 2006, 4, 673–707. [Google Scholar] [CrossRef]
  25. Kőszegi, B. Emotional agency. Q. J. Econ. 2006, 121, 121–155. [Google Scholar] [CrossRef]
  26. Kőszegi, B. Utility from anticipation and personal equilibrium. Econ. Theory 2010, 44, 415–444. [Google Scholar] [CrossRef]
  27. Fang, H.; Loury, G.C. “Dysfunctional Identities” Can Be Rational. Am. Econ. Rev. 2005, 95, 104–111. [Google Scholar] [CrossRef]
  28. Munshi, K.; Rosenzweig, M. Traditional institutions meet the modern world: Caste, gender, and schooling choice in a globalizing economy. Am. Econ. Rev. 2006, 96, 1225–1252. [Google Scholar] [CrossRef]
  29. Hoff, K.; Pandey, P. Discrimination, social identity, and durable inequalities. Am. Econ. Rev. 2006, 96, 206–211. [Google Scholar] [CrossRef]
  30. Hoff, K.; Pandey, P. Making up people? The effect of identity on performance in a modernizing society. J. Dev. Econ. 2014, 106, 118–131. [Google Scholar] [CrossRef]
  31. Bicchieri, C. The Grammar of Society: The Nature and Dynamics of Social Norms; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  32. Foster, A.D.; Rosenzweig, M.R. Technical change and human-capital returns and investments: Evidence from the green revolution. Am. Econ. Rev. 1996, 86, 931–953. [Google Scholar]
  33. Bils, M.; Klenow, P.J. Does schooling cause growth? Am. Econ. Rev. 2000, 90, 1160–1183. [Google Scholar] [CrossRef]
  34. Evans, J.S.B. Bias in Human Reasoning: Causes and Consequences; Lawrence Erlbaum Associates, Inc.: Mahwah, NJ, USA, 1989. [Google Scholar]
  35. Hoff, K.; Stiglitz, J.E. Equilibrium Fictions: A Cognitive Approach to Societal Rigidity. Am. Econ. Rev. 2010, 100, 141–146. [Google Scholar] [CrossRef]
  36. Edwards, W. Conservatism in human information processing. Form. Represent. Hum. Judgm. 1968, 17, 51. [Google Scholar]
  37. Zafar, B. How do college students form expectations? J. Labor Econ. 2011, 29, 301–348. [Google Scholar] [CrossRef]
  38. Zafar, B. Can subjective expectations data be used in choice models? Evidence on cognitive biases. J. Appl. Econ. 2011, 26, 520–544. [Google Scholar] [CrossRef]
  39. DeMarzo, P.M.; Vayanos, D.; Zwiebel, J. Persuasion Bias, Social Influence, and Unidimensional Opinions. Q. J. Econ. 2003, 118, 909–968. [Google Scholar] [CrossRef] [Green Version]
  40. Conte, R.; Paolucci, M. Intelligent social learning. J. Artif. Soc. Soc. Simul. 2001, 4, U61–U82. [Google Scholar]
  41. Festinger, L. A Theory of Cognitive Dissonance; Stanford University Press: Palo Alto, CA, USA, 1962; Volume 2. [Google Scholar]
  42. Iyengar, S. The Art of Choosing; Twelve: New York, NY, USA, 2010. [Google Scholar]
  43. Mele, A.R. Self-Deception Unmasked; Cambridge University Press: Cambridge, UK, 2001. [Google Scholar]
  44. Stone, J.; Cooper, J. A self-standards model of cognitive dissonance. J. Exp. Soc. Psychol. 2001, 37, 228–243. [Google Scholar] [CrossRef]
  45. Sanitioso, R.; Kunda, Z.; Fong, G.T. Motivated recruitment of autobiographical memories. J. Personal. Soc. Psychol. 1990, 59, 229. [Google Scholar] [CrossRef]
  46. Oxoby, R.J. Cognitive dissonance, status and growth of the underclass. Econ. J. 2004, 114, 727–749. [Google Scholar] [CrossRef]
  47. Cialdini, R.B. Influence: The Psychology of Persuasions; HarperCollins Publisher: New York, NY, USA, 2007. [Google Scholar]
  48. Benoît, J.-P.; Dubra, J. Apparent overconfidence. Econometrica 2011, 79, 1591–1625. [Google Scholar]
  49. Dessí, R. Collective memory, cultural transmission, and investments. Am. Econ. Rev. 2008, 98, 534–560. [Google Scholar] [CrossRef]
  50. Bodner, R.; Prelec, D. Self-signaling and diagnostic utility in everyday decision making. Psychol. Econ. Decis. 2003, 1, 105–26. [Google Scholar]
  51. Brocas, I.; Carrillo, J.D. The brain as a hierarchical organization. Am. Econ. Rev. 2008, 98, 1312–1346. [Google Scholar] [CrossRef]
  52. Bénabou, R.; Tirole, J. Intrinsic and extrinsic motivation. Rev. Econ. Stud. 2003, 70, 489–520. [Google Scholar] [CrossRef]
  53. Bernheim, B.D.; Thomadsen, R. Memory and anticipation. Econ. J. 2005, 115, 271–304. [Google Scholar] [CrossRef]
  54. Tversky, A.; Kahneman, D. Judgment under uncertainty: Heuristics and biases. Science 1974, 185, 1124–1131. [Google Scholar] [CrossRef] [PubMed]
  55. Cameron, T.A. Updating subjective risks in the presence of conflicting information: an application to climate change. J. Risk Uncertain. 2005, 30, 63–97. [Google Scholar] [CrossRef]
  56. Eil, D.; Rao, J.M. The good news-bad news effect: Asymmetric processing of objective information about yourself. Am. Econ. J. Microecon. 2011, 3, 114–138. [Google Scholar] [CrossRef]
  57. Mobius, M.M.; Niederle, M.; Niehaus, P.; Rosenblat, T.S. Managing Self-Confidence: Theory and Experimental Evidence; Technical Report; National Bureau of Economic Research: Cambridge, MA, USA, 2011. [Google Scholar]
  58. Grossman, Z.; Owens, D. An unlucky feeling: Overconfidence and noisy feedback. J. Econ. Behav. Organ. 2012, 84, 510–524. [Google Scholar] [CrossRef] [Green Version]
  59. Nguyen, T. Information, role models and perceived returns to education: Experimental evidence from Madagascar. Unpublished work. 2010; Volume 6. [Google Scholar]
1
Carrillo and Mariotti [3] also consider desire as a mental state.
2
According to Elster there are three constraints: consistency, plausibility, and imperfection.
3
If career path A indicates choosing law school, the belief about the future that the DM holds is “being a lawyer”.
4
According to Simon [8], the capacity of the human mind to formulate and solve complex problems is small if compared to the dimension of the problems humans are called to solve. In his theory, time dimension, knowledge, and the availability of alternatives are given important roles in the decision-making process. A non-reflective DM is simply acting upon bounded rationality mechanisms, which means that her decision process is a search process guided by aspiration levels.
5
In accordance also with [27,28,29,30].
6
Many students have documented that when a social identity is made salient, choice and performance in a domain that is stereotyped is altered towards the direction predicted by the stereotyped (e.g., the “acting white” phenomenon).
7
According to Evans [34], confirmation bias occurs because decision makers seek and interpret information in ways that support their original beliefs. Coherently, Ref. [35] address the presence of the biases in situations in which the salience of identity traits is socially imposed.
8
As Edwards [36] acknowledges, conservatism leads individuals to update their beliefs according to Bayes’ rule, but in a smaller magnitude. Refs. [37,38] propose an empirical application of the bias to the educational choice.
9
According to Demarzo [39] persuasion bias can be viewed as a simple, bounded rational heuristic according to which individuals update, as Bayesian, except that they do not accurately account for which information they receive is new and which is repetition. This notion correspond with social psychology theories of political opinion formation.
10
A social cognitive process [40] is a process (a sequence of operations, such as reasoning, decision making, etc.) upon social mental representation (e.g., social beliefs and goals).
11
Ex-post denial is a synonym for the recall decision. It is called ex-post denial because it is a recall strategy that aims to manipulate the memory (i.e., denial) of the signal after the latter has been received (ex-post).
12
The range of costs considered here goes from time to real resources.
13
Following Bénabou and Tirole [52].
14
e has to be considered as θ ^ .
15
This is also called the mixing region and its slope depends on the magnitude of the initial cost L types have to face.
16
I will compress Equation (12) for reasons of clarity and to put in evidence the role of the signal and the recollection.
17
Where U i ( θ ( ) is U i ( θ ; θ ( ) , σ i ) for i L , H , for reducing the space.
18
In Bernheim and Thomadsen [53], the manipulation will result in the breakdown of the law of iterated expectations.
19
The node in which Self-t is positioned (i.e., the initial node) is a singleton information set.
20
The accuracy should be
r ( λ L * ) = p ( 1 λ H * ) p ( 1 λ H * ) + ( 1 p ) ( 1 λ L * )
.
21
The accuracy should be
r ( λ H * ) = p ( 1 λ H * ) p ( 1 λ H * ) + ( 1 p ) ( 1 λ H * )
.
22
These are selective exposure to information; minimal justification; hypocrisy induction; and postdecision dissonance.

Share and Cite

MDPI and ACS Style

Lipari, F. This Is How We Do It: How Social Norms and Social Identity Shape Decision Making under Uncertainty. Games 2018, 9, 99. https://doi.org/10.3390/g9040099

AMA Style

Lipari F. This Is How We Do It: How Social Norms and Social Identity Shape Decision Making under Uncertainty. Games. 2018; 9(4):99. https://doi.org/10.3390/g9040099

Chicago/Turabian Style

Lipari, Francesca. 2018. "This Is How We Do It: How Social Norms and Social Identity Shape Decision Making under Uncertainty" Games 9, no. 4: 99. https://doi.org/10.3390/g9040099

APA Style

Lipari, F. (2018). This Is How We Do It: How Social Norms and Social Identity Shape Decision Making under Uncertainty. Games, 9(4), 99. https://doi.org/10.3390/g9040099

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop