Obfuscation maximization-based decision-making

Theory, methodology and first empirical evidence

Journal Article (2021)
Author(s)

C.G. Chorus (TU Delft - Transport and Logistics)

Sander van Cranenburgh (TU Delft - Transport and Logistics)

Aemiro Melkamu Daniel (TU Delft - Transport and Logistics)

Erlend Dancke Sandorf (University of Stirling)

Anae Sobhani (Universiteit Utrecht)

T. Szep (TU Delft - Transport and Logistics)

Department
Engineering, Systems and Services
Copyright
© 2021 C.G. Chorus, S. van Cranenburgh, A.M. Daniel, Erlend Dancke Sandorf, Anae Sobhani, T. Szép
DOI related publication
https://doi.org/10.1016/j.mathsocsci.2020.10.002
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 C.G. Chorus, S. van Cranenburgh, A.M. Daniel, Erlend Dancke Sandorf, Anae Sobhani, T. Szép
Department
Engineering, Systems and Services
Volume number
109
Pages (from-to)
28-44
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Theories of decision-making are routinely based on the notion that decision-makers choose alternatives which align with their underlying preferences—and hence that their preferences can be inferred from their choices. In some situations, however, a decision-maker may wish to hide his or her preferences from an onlooker. This paper argues that such obfuscation-based choice behavior is likely to be relevant in various situations, such as political decision-making. This paper puts forward a simple and tractable discrete choice model of obfuscation-based choice behavior, by combining the well-known concepts of Bayesian inference and information entropy. After deriving the model and illustrating some key properties, the paper presents the results of an obfuscation game that was designed to explore whether decision-makers, when properly incentivized, would be able to obfuscate effectively, and which heuristics they employ to do so. Together, the analyses presented in this paper provide stepping stones towards a more profound understanding of obfuscation-based decision-making.