NetLogo User Community Models
## WHAT IS IT?
This model is an attempt at modelling the emergence of several norms from criticism uttered by agents which feel offended by theft and by begging for alms. It uses some but not all of the features described by Luis Gustavo Nardin, Giulia Andrighetto, Rosaria Conte, Mario Paolucci in their IntERS model (http://www.gloders.eu/images/Deliverables/GLODERS_D3-1.pdf) and most features described by Klaus G. Troitzsch in his EONOERS model (http://ccl.northwestern.edu/netlogo/models/community/EONOERS). This means that the agents representing the human actors follow emerging norms and calculate the salience of these norms according to the number of invocations of these emerging norms they receive from others.
## HOW IT WORKS
* Events such as theft, alms-begging, refusal of alms or theft punishment trigger messages to agents in the neighbourhood. Each of these messages contains a reference to an emerging norm (usually the norm or norms which is or are followed or violated by the action). A recipient of such a message updates those of its memory entries which refer to the specified emerging norm according to whether the action is performed by itself or by another agent and whether the message contains a punishment or a sanction. This is implemented in a series of `update-` procedures (the `update-` procedures combine the invocation and the updates).
* The calculation of an action probability consists of two steps: the individual drive to steal or to beg is determined by the relative position on the wealth rank list of all agents (the poorer the agent the higher the drive). Likewise the indivdual drive to punish theft or to give or refuse alms is also determined by this rank, but the other way round (the richer the agent the higher the drive to help or to punish). The normative drive depends on former experience with an agent's own actions and on observations made of normative behaviour of other agents' in the neighbourhood (see http://www.gloders.eu/images/Deliverables/GLODERS_D3-1.pdf, pp. 33-39).
* When an agent has to choose between different action options (including the option of doing nothing) it calculates a probability (`calculate-propensity-from` for actions controlled by only one norm, and `propensity-to` for actions controlled by two conflicting norms) for each of the action options which in turn depends on a rationally calculated "individual drive" (implemented in the procedure `calculate-my-individual-drive-to` with respect to the action named as the procedure's argument) and a "normative drive" which is calculated from the salience of the norm or norms involved in the action option. The salience of the norm, in turn, is calculated according to a complicated formula (implemented in the procedure `calculate-my-normative-drive-to`) which combines the memory of
* cases when this agent observed norm compliances and violations in its neighbourhood,
* cases when this agent received punishments or sanctions and
* cases when this agent heard about, applied or personally received invocations of the respective norm.
The **"logic of action"** mentioned above can be described as follows:
Immediately after the initialisation all persons are scheduled to decide whether they are going to steal or to beg alms at 06:00 of the first day (and to repeat this action after a uniformly distributed delay whose maximum duration can be changed with the slider `MAX-DAYS-BETWEEN-ACTIONS` --- currently there are no weekends)
## HOW TO USE IT
Change all the sliders and switches that you want to change and press `setup`.
The model will run for `max-months` simulated months (and can only be stopped with the help of `Tools`->`Halt`).
The two groups of plots show what their headlines suggest. The last column of plots at the top right corner contains histograms of action propensities, the two triangular blocks in the middle show the correlations of action propensities (above the diagonal) and of norm saliences (below the diagonal). The diagrams below these scatterplots show the wealth distribution as a histogram changing over time and as a plot of the deciles of this distribution over time, The plots in the lower right corder show how many thefts and begging acts occur over time (moving averages and totals).
The calculation of action propensities consists of two steps: the individual drive of agents to steal or to ask for alms is determined by their individual ranks on the wealth variable. The individual drive of agents to punish thieves or to give or refuse alms is also determined by this rank (the richer the greater the propensity to give and to punish theft, the smaller the propensity to refuse). The normative drive depends on former experience with an agent's own actions and on observations made of normative behaviour of other agents' in the neighbourhood (see http://www.gloders.eu/images/Deliverables/GLODERS_D3-1.pdf, pp. 33-39).
The following sliders control global variables:
* `LISTENERS` defines how many nearest neighbours of an agents are aware of its actions.
## THINGS TO NOTICE
The model keeps a database of all theft and begging events and writes files for analysis.
The model calculates the main parameters of the norm salience distributions (mean and standard deviation).
## THINGS TO DISCUSS
The formula for calculating salience could be simplified. As weighting coefficients are multiples of 0.33 one could replace them with the respective multiples of 1.0 and change the `numerator` and the `denominator` accordingly. The formula is claimed in Deliverable 3.1 to have been extracted from Cialdini, R. B., Kallgren, C. A., Reno, R. R. (1990). A focus theory of normative conduct: A theoretical refinement and reevaluation of the role of norms in human behavior. Advances in Experimental Social Psychology. 24: 201–234. But it seems that only the terms used in this formula were extracted from this source (which does not say anything about the weights).
## THINGS TO TRY
The model can be used to find out which of the input parameters guiding the behaviour of the agents have the greatest impact on the various output parameters (see the reference cited at the end of this description). A few experiments are provided in the behavior space.
## EXTENDING THE MODEL
The model could be extended by endowing the agents with even more learning capabilities. Agents could then optimise their behaviour as a reaction on punishment and sanctions.
## NETLOGO FEATURES
Nothing special. The code uses recursive functions to determine to which family an extorter belongs and to write up the hierarchy in the output window. This version makes use of the time extension (which needs to be present either in the directory where the model resides or in the `extensions` directory of the NetLogo installation; perhaps the model runs only in NetLogo 5!). The initial wealth distribution is a beta distribution (converted from NetLogo's gamma function).
## RELATED MODELS
This model uses some of the features of models of the GLODERS project:
* http://ccl.northwestern.edu/netlogo/models/community/ARDERS is a period oriented version with constant action probabilities for all agent-types
## CREDITS AND REFERENCES
The research leading to the features adopted from the GLODERS project has received funding from the European Union Seventh Framework Programme (FP7/2007--2013) under grant agreement no. 315874 ([Global dynamics of extortion racket systems, GLODERS](http://www.gloders.eu)). These results reflect only the author’s views, and the European Union is not liable for any use that may be made of the information contained therein. The author thanks his colleagues in this and earlier projects for fruitful discussions over many years.
The model owes a lot to the Nardin et al. discussion paper and to the discussions within the GLODERS project. The GLODERS project used earlier versions of this model as a proof of concept and a quick and dirty prototype of the final GLODERS simulator.
This model is described in more detail in Klaus G. Troitzsch: Can lawlike rules emerge without the intervention of legislators? (submitted to Frontiers in Evolutionary Sociology and Biosociology),
## HOW TO CITE
Cite this model with the URL http://ccl.northwestern.edu/netlogo/models/community/TheftNorm
## COPYRIGHT NOTICE
Written by Klaus G. Troitzsch 2013-2016. The model may be used and extended if the source is quoted and a note is sent to firstname.lastname@example.org.
(back to the NetLogo User Community Models)