T OM A. B. S NIJDERS
E VELIEN P. H. Z EGGELINK F RANS N. S TOKMAN
Parameters in collective decision making models : estimation and sensitivity
Mathématiques et sciences humaines, tome 137 (1997), p. 81-99
<http://www.numdam.org/item?id=MSH_1997__137__81_0>
© Centre d’analyse et de mathématiques sociales de l’EHESS, 1997, tous droits réservés.
L’accès aux archives de la revue « Mathématiques et sciences humaines » (http://
msh.revues.org/) implique l’accord avec les conditions générales d’utilisation (http://www.
numdam.org/conditions). Toute utilisation commerciale ou impression systématique est consti- tutive d’une infraction pénale. Toute copie ou impression de ce fichier doit conte- nir la présente mention de copyright.
Article numérisé dans le cadre du programme Numérisation de documents anciens mathématiques
http://www.numdam.org/
PARAMETERS IN COLLECTIVE DECISION MAKING MODELS:
ESTIMATION AND
SENSITIVITY1
Tom A.B.
SNIJDERS2,
Evelien P.H.ZEGGELINK2
Frans N.STOKMAN2
RÉSUMÉ - Paramètres des modèles des processus de formation de décisions collectives
Les modèles de simulation des processus de formation de décisions collectives sont
fondés
sur des aperçusthéoriques et empiriques du processus de décision mais contiennent des
paramètres
dont les valeurs sontdéterminées ad hoc. Certains de ces paramètres, du modèle d’accès
dynamique
sont discutés et il est proposé de compléter la fonction d’utilité par un terme aléatoire dont la variance serait unparamètre
inconnu. Ces paramètres peuvent être estimés en confrontant aux données les prévisions du modèle qui peuvent être des décisions mais aussi des structures relationnelles générées comme un élément du processus de prise de décision.Etant donné la nature stochastique du modèle, l’estimation de ces paramètres peut être obtenue par
l’algorithme de Robins Monro. Cet ajustement n’est pas absolument direct. Il faut choisir les statistiques sur lesquelles se
fonde
l’estimation des paramètres. Il n’est pas certain a priori que l’équation d’estimation admetteune solution et que l’algorithme de Robins Monro converge. La méthode est illustrée par des données
concernant la restructuration financière d’une grande société.
SUMMARY - Simulation
models for
collective decision making are based on theoretical and empirical insight in the decision making process, but still contain a number of parameters of which the values aredetermined ad hoc. For the
dynamic
access model, some of such parameters are discussed, and it isproposed
toextend the utility functions with a random term of which the variance also is an unknown parameter. These parameters can be estimated by fitting model predictions to data, where the
predictions
can refer to decisionoutcomes but also to network structure generated as a part of the decision making process. Given the stochastic nature of the model, this parameter estimation can be carried out with the Robbins Monro process.
Such fitting
is not
completely straightforward:
statistics must be chosen on which to base the parameter estimation, it is not certain apriori
that there will be a solution to the estimating equation and that the Robbins Monro process will converge. The method is illustrated with data from the financial restructuring of a large company.1. INTRODUCTION
In recent years, several formal models have been
developed
for collective decisionmaking.
The
primary
aim of these models has been toyield predictions
for the decision made.Early
models were
developed by
Coleman(1972)
and Laumann & Knoke(1987). Building
on theirapproaches,
the idea was elaborated that the actors whoparticipate
in decisionmaking
processes should be
regarded
as members ofpolicy
networks. Thepolicy
network idea wasincorporated
in the TwoStage
Model(2S model,
Stokman & Van DenBos, 1992; Stokman, 1994;
the model also isexplained
inDegenne
&Forsé, 1994)
and theDynamic
Access Model1 We thank Mikko Mattila and the NETMET group for their comments on earlier versions.
2 ICS, University
of Groningen,
The Netherlands.(DA model,
Stokman &Zeggelink, 1996).
The last-mentioned model is the focus of this paper, and it isexplained
below.The evaluation of these decision
making
models has focused up to now on the correctness of thepredicted
decision outcome. The DAmodel, however, pretends
notonly
togive
areasonably trustworthy prediction
of thedecision,
but also to model the relationforming
process associated with the decision
making.
From thispoint
ofview,
it becomesimportant
toconsider the details of the
specification
of thedecision-making
models. These models can beregarded
as translations ofpolitical insights
into mathematical formulae. Diverseinsights correspond
to alternative formulae and to alternative values of the crucialparameters
in the formulae.However,
therealways
remain a number ofparameters
of which thespecification
isnot dictated
by
availablepolitical insights
andtheory.
In thepast,
values for theseparameters
have been determinedad hoc,
oftenby
trial and error. In this paper we consider thesensitivity of the
modelsfor
the valuesof
these parameters, and amethod for estimating
these values sothat certain results
of
the inodel(e.g.,
networkcharacteristics) correspond optimally
to theempirical
observations. Such an estimation method wasproposed
for the case of oneparameter
inSnijders,
Stokman &Zeggelink (1996).
Thepresent
paper elaborates the simultaneous estimation of severalparameters
fordynamic
simulation models. The estimation method wasproposed
for other network models inSnijders (1996),
and can also be used for othercomputer
simulation models. In this way, the collective decisionmaking
models obtaina second aim: to
predict
andexplain
the influence network that isgenerated by
the decisionmaking
process.The
starting point
for each decisionmaking
model is that one or morepolicy
issues aregiven,
on each of which a decision has to be taken. The 2S model can be
applied
to one or moreissues;
if several issues aretreated,
the 2S model isapplied
to theseindependently.
In thismodel,
it is assumed that each actor has agiven policy position
on eachissue,
and that heprefers
the decision to be as close aspossible
to thisposition.
The salience of the issue indicates howimportant
this issue is to him. The power of each actor isdistinguished
in threeelements: his resources, his access to other actors, and his decision or
voting
power. The decision process is modeled as a process with two stages. In the firststage (influence stage),
actors try to convince other actors and influence their
policy positions.
Whether this ispossible depends
on the access between the actors; the success of an influenceattempt depends,
a.o., on the actors’ resources and on the salience of the issue for the actors. Thisstage
can be iterated. In the secondstage,
the decision stage, the actors withvoting
power take thedecision, voting according
to thepolicy positions
obtainedduring
the firststage.
The decision takendepends
on thevoting rule;
e.g., it can be theweighted
mean of the finalpolicy positions, weights being proportional
tovoting
power.To
apply
the 2Smodel,
it is necessary to haveempirical
data on thefollowing
elements:policy positions, saliences,
andvoting
power of actors on eachissue;
the resources of theactors; and the access network. The 2S model has been tested
extensively.
Itsexplanatory
power has been
investigated by predicting
decision outcomes andcomparing
these to the realdecisions. Predictions have been made on a local level
(Berveling
&Roozendaal, 1992;
Berveling, 1994a),
on a national level(Schonewille, 1990;
Stokman & Van DenBos, 1992;
Stokman, 1994; Berveling, 1994b)
and on theEuropean
level(Van
DenBos, 1991).
When
applied
to decisionmaking
about severalissues,
the 2S model treats the issuesindependently.
It was extended to modelsfor jointly taking
decisions on severalissues,
where"give
and take" and mutual influence processesoperate
between the actors. Such models arethe
Exchange
model(Stokman
& VanOosten, 1994;
not treatedhere)
and theDynamic
Access model.
The access network is
regarded
as fixed in the 2S model. In the DAmodel,
on the otherhand,
account is taken of the fact that actors
actively shape
theirnetworks, trying
to increase theirinfluence on other actors. Stokman &
Zeggelink (1996) developed dynamic
simulationmodels in which actors can establish as well as terminate influence relations. Actors base their influence activities on the limited information and limited
foresight they
have about the consequences of their actions. Stokman &Zeggelink specified
two alternative basicmodels,
eachcorresponding
to a known view on thepolitical
process. In the ControlMaximization (CM) model,
actorssimply
try to create relations with the mostpowerful
actors in thenetwork. In the
Policy
Maximizationmodel,
actors are moresophisticated
and make arough
estimate about the effects of their
possible
relations on theexpected
decision outcomes. Thepresent
articlepresents only
thePolicy
Maximization version of theDynamic
Access model.This version
appeared
the mostpromising
in Stokman &Zeggelink (1996)
and Stokman &Berveling ( 1996).
The structure of the paper is the
following.
First a basicdescription
isgiven
of the decisionmaking
process with respect to therestructuring
of the AVEBE company; this case is used as anexample
to illustrate theproposed
methods.Subsequently
the DA model isspecified
in itsPolicy
Maximization version. In Section4,
some alternativespecifications
are mentioned.These
specifications
contain parameters of which the value is not dictatedby political insights
but should be made on
empirical grounds.
The addition of some random elements isimportant
in one of these alternativespecifications.
The Robbins Monro process can be utilized in analgorithm
forestimating
the unknownparameters;
this isexplained
in Section 5.Finally
theapplication
to the AVEBE company iselaborated,
and conclusions are drawn about theparameter
estimation method and the decisionmaking
process.2. EXAMPLE: THE AVEBE
We illustrate the
Dynamic
Access model with a smallempirical example, namely
thefinancial restructuring of
alarge
Dutch coinpany(AVEBE).
Theexplanation
of this decisionmaking problem
is taken from Stokman &Zeggelink (1996).
The issue domain consists ofeighteen
actors and three decisions. The AVEBE is acooperative
company of farmers in the northernpart
of the Netherlands thatproduces potato
derivatives. The company,already
infinancial
problems
since themid-Sixties, got
serious financialproblems
in themid-Eighties.
Its survival was of very
high importance
for the northempart
of the Netherlands. Notonly
didit
employ a large
number ofpeople,
but its financialbankruptcy
would have serious financial consequences for the farmers because of their unlimitedliability
in thecooperative
firm.Three main issues were at stake. The
company’s
owncapital
was almostcompletely
lost andhad to be restored. Moreover, its survival
required
a considerable reduction of its debt.Finally,
the company wasseriously polluting
the environment andhigh
investments had to be made toadapt
thepollution
to the morestringent
norms of the Dutchgovemment.
InJanuary 1986,
the company asked the Dutch government for an interest-free andredemption-free
loanto reduce its debt
by
Dtl 200 million.Moreover,
it asked for a financialarrangement
for environmental investments of Dfl 80 million. These matters weredelegated
to anAdvisory
Committee for Financial
Restructuring,
called(after
itschairman)
the CommitteeGoudswaard. In actual
practice,
this Committee had the ultimate power to decide on thematter. The Committee came with its advice in the Summer of 1986.
In our
model,
the Committee Goudswaard wasgiven
fullvoting
power as it was defacto
thefinal decision
making body.
The other data were obtainedby interviewing
twoexperts.
These data concem the actors with their resources and mutual accessrelations,
and thepolicy positions
and saliences of the actorsregarding
the three issues. The twoexperts generated
thesame list of actors with
only
oneexception. They agreed
to a verylarge
extent on all variablesto be used in our models. We therefore use the mean values of the two
experts
on the variables(see
Tables 1 and2).
Clear differences inreports
were obtainedonly
in the accessnetworks. As the
specific knowledge
of the twoexperts
wascomplementary (one
hadexpertise
at thenational,
the other at theregional level),
their access data were combined.This means that we assume an access relation between two actors to exist in the
empirical
network if at least one of the
experts reported
such a relation.3. SPECIFICATION OF THE DYNAMIC ACCESS MODEL
From Stokman &
Zeggelink (1996)
werepeat
the basic definitions for the DA model. Furtherbackground
motivations are to be found in the mentioned paper.Starting point
of the model is an issue domainconsisting
of a set of n actors(i, j,
k= 1,
...,n)
and a set of m issues or decisions
f g
=1,..., m).
The decision process is timedependent,
with discrete time
parameter (t
=1, 2,
...,Tj.
The final decision is taken at time T.(Time- dependence
of variablesalways
is indicatedexplicitly by
the indext.)
It is assumed that decisions are madeaccording
to agiven procedure
characterizedby
the actors’voting
powers;the
voting
power of actor i on issuef
is denoted If 0 for somef,
actor i is called apublic
actor. In most cases there areonly
few such actors. All other actors are calledprivate
actors
(although they
may bepublic
actors in othermeanings
of thisterm). Voting
powers are normalized in the sense that for eachissue f,
The
possible
decisions on each issue are assumed to beone-dimensional, i.e., they
arecharacterized
by
real numbers. The most extremepossibilities
arerepresented by
the numbers 0 and 1. Actors havepreferences regarding
the outcomes of the decisions. Thepreferred
outcome of a decision for an actor is called his
policy position,
and is a number between 0 and 1. The initialpolicy positions
of the actors,xi f ,
aresupposed
to begiven.
Actorsinfluence each other
during
the decisionmaking
process, so that theirpreferred policy positions
aretime-dependent,
denotedby xi’.
The final decisiony f
on each issue issupposed
to be the
weighted
mean of the finalpolicy positions
of the actors:This also is a number between 0 and 1.
Influence activities of the actors
spring
from theutility they
attach to the variouspossible
outcomes. On each issue
f,
actors have asingle-peaked utility function, depending
on thedistance between the
hypothetical outcome yf
and the actor’spolicy position
In order toobtain
comparability
of the utilities for differentissues,
the model also includes salience parameters sif that indicate howimportant
issuef is
to actor i. These are nottime-dependent.
Saliences for each actor are restricted
by
(The
total salience for an actor may be less than1,
because his main interests may be outside the issue domain underconsideration.)
In thisarticle,
theutility
function is assumed to beThe total
utility
over all m issues for actor i is assumed to be the sum of his utilities over all issues(cf. Baron, 1991) :
The last two formulae are not used
directly
in themodel,
butindirectly
via theexpected
utilities defined below in Section 3.1.
The actors base their influence
requests
on theexpected
outcomes of the decisions. Access relations are assumed to be established when one actor makes an accessrequest,
and thisrequest
then isaccepted by
the other actor. It is assumed that actors are aware about thecurrent
policy positions
of all actors, and at time t( 1 _ t _ n
theexpected
outcome for issuef,
in accordance with(1),
isgiven by
Actors
have differentcapabilities
to influence each other in the stage before the final vote.One element of this
capability
consists of the actor’s access to otherimportant
actors and theresources he can mobilize in these relations. The resources actor i can mobilize in the influence stage are denoted ri
(0 ri _ 1).
Resources caninclude,
e.g., information and funds.Resources often result from
long
terminvestments,
and therefore are not seen as time-dependent.
Accessrelations, however,
are timedependent
in our models.They
arepurposively changed by
the actors in the course of the decision process in order to exertinfluence. How this is done will be
explained
below. The access network is definedby
thematrix At with elements with value 1 if actor i has access
to j
attime t,
and 0otherwise. It is assumed that actor i has full access to himself
(ai) = 1).
The access networkis not
necessarily symmetric.
The access network is assumed to beissue-independent.
Inpractice
this means that the issue domain must besufficiently homogeneous.
The effect of established influence relations
depends
on the salience of the issue for theinfluencing
actor as well as on hispotential
control(or potential influence)
over the targetactor. It is assumed that the
potential
control of actor i overactor j depends
on the relativesize of i’s resources,
compared
to the resources of others who have accessto j :
It is assumed that within each time
period,
influencerequests
are madesimultaneously.
Eachactor’s
policy position
is theweighted
mean of thepositions
of thoseinfluencing
him(including
the actorhimself),
where theweights
are theproduct
of thepotential
controlcoefficients and the saliences for the
influencing
actors:Actors, issues, voting
power, initialpolicy positions, saliences,
and resources are exogenous elements in our models.Voting
powerusually
is determinedby investigation
of the formaldecision
making procedures.
The other elements areusually
obtained eitherby interviewing experts
orrepresentatives
of the actors involved in the issue domain. For this purposespecial interviewing techniques
have beendeveloped (see
Bueno deMesquita
andStokman, 1994).
Access relations among actors are
generated
asendogenous
elements in the model. In thepresent
versions of themodels,
the actors start from scratch whenrequesting
access relations.This article assumes that no access relations exist at t =
0,
but aninteresting
extension would be to consider certain institutionalized access relations asbeing given
at t = 0. Establishment and shifts of access relations and their consequences for outcomes of decisions are the main focalpoints
in the DA model.3.1. Decisions about access requests
In the influence
stage,
the actorstry
to realize a more favorable decision outcomeby getting
access to other actors and
thereby shifting, directly
andindirectly,
thepolicy positions
ofpublic
actors.Qualitatively,
the process can be sketched asfollows;
a moreprecise description
isgiven
below.The influence
stage
consists of consecutive rounds(or iterations,
or timeperiods).
Ineach
round,
some access relations may be established. Each round consists of threesteps.
In the firststep,
actors make those accessrequests
that would have thehighest utility
ifaccepted
and that are most
likely
to beaccepted.
Since access requests and access relationsrequire
timeand resources, actors are able to make
only
a limited number of access requests to otheractors. In the next
step,
actors evaluate the access requeststhey
received. If the number ofrequests
islarger
thanthey
canhandle, they accept only
some of them. We assume that actorslearn
through experience.
Successes or failures ofprevious
accessrequests
are used toadapt
their estimate of the likelihood of acceptance of new requests. The third step is that actors shift their
policy positions according
to formula(5).
Limitations are set to the number of access requests
made,
and the number of access requestsaccepted.
Stokman &Zeggelink (1996)
gave three considerations that set limits to these numbers:attempted
influence requests and established influence should be inbalance;
influence
attempted
as well asaccepted
increases with resources; andpublic
actors mustaccept more influence when their
voting
power ishigher.
To express the lasteffect,
relativevoting
power is defined asThe upper bound to the number of access
requests
made in timeperiod
t+1depends
on theresources and the number of established relations in the
previous
round. Foractor i,
the sum ofalready
establishedoutgoing
relations and the number of new accessrequests
may not behigher
thanEach actor is
required
toaccept
agiven
number of access requests, if this number ofrequests
is made:In these
formulae, [x]
denotes x rounded to the nearestinteger.
In theapplications considered, voting
power is notissue-dependent,
so therequired
number(7)
does notdepend
on the issue
f (in spite
of thef occurring
as asubscript).
Of several models for the decisions about which access
requests
aremade,
thePolicy
Maximization Model turned out in Stokman &
Zeggelink (1996)
togive
the closestcorrespondence
betweenpredicted
and observed decision outcomes. In thisspecification,
actors use their
knowledge
on others’policy positions
and theexpected
outcomey’
of thedecision. Due to limitations on the information available to actors and on their
capability
forpredicting
the effects of their influencerequests,
the accesspart
of the model is based onheuristic rules followed
by
the actors rather than on theassumption
thatthey
ca.rry out a fullblownutility
maximization. The set of access relations is reconstituted in eachround, i.e.,
access relations that exist in round t are not
automatically
renewed in round t+l.In round
t+ 1,
the access relations established in theprevious round, given by
those(ij)
forwhich
a4
=1,
have apriority
but not an absolute one. Denoteby A~
the set ofactors j
forwhich
a4
= 1. This set hasai’
elements. In the first step of roundt+1,
accessrequests
are made. If the currentout-degree ai’
isequal
to(6) (case A),
then actor i does not propose anychanges,
and makes requests to the actors inA~
Ifai’
is less than(6) (case B), requests
will be made to all actors inAt
and to some additional actors; if it is more than(6) (case C;
this is very
rare), requests
will be made to a subset ofA j.
In cases B andC,
actor i makesrequests to those actors outside
(for
caseB)
or within(case C) A!,
from accessrequests
to whom he expects thehighest utility.
Theexpected utility
isgiven by
formula(9) below,
andexplained
as follows.It is assumed that actor i evaluates the direct effect of a succesful access request from i
to j
on
j’s policy position
asy f) (x~ f - x~~.
This ispositive
ifmoving x~~
into thedirection of
xi’
would also moveyj
into the direction ofxi’ ,
andnegative
otherwise. The effect on the final decision alsodepends
onj’s
total controlcjl
and hisvoting power vjl .
These effects are combined in the factor(cjl
+Further,
theperceived utility
of theaccess request is
weighted by
the controlcil
of i overj. Together,
this leads to theperceived utility given by
There is one
exception
to thisformula, namely
for actors whosepolicy position
isequal
to theexpected
outcome on all issues. If thisexception
were notmade,
such actors would not makeany access
requests
at all. It is assumed that these actors wish to obtainsupport
for the decisionby obtaining
access to extreme actors,hoping
to moderate theirpreferences.
This isrealized
by
the modificationThe
expected utility
of an accessrequest,
is theproduct
of theperceived utility
and theperceived
likelihood of success. Actor i estimates the likelihood ofacceptance
of an access requestby actor j
at time t = 0 as follows:Note that
possible
values of this formula are0.1, 0.2,..., 1.0.
Further it is assumed that actorslearn
through experience.
If an accessrequest
of actor i toactor j
is notaccepted by actor j,
actor i will reduce in the next iteration
step by
0.1 until reaches its lower bound of 0.1. In all other cases, =p~ 1
for t > 0.As a conclusion of these
considerations,
theexpected utility
of an access request isperceived by
actor i to beThe rule for
accepting
accessrequests
issimpler.
At iterationstep t+1,
if the number of newrequests plus
the number ofincoming
relations at time t is less than the norm(7),
allincoming requests
areaccepted.
If this sum ishigher
than(7),
the actoraccepts
therequests
madeby
those whosepolicy positions
are closest to his own. The various issues are combinedby
the functionm 1
Actor i
accepts
the new accessrequests
made with thehighest
values on thisfunction,
up to the number of newrequests
that he has toaccept, (norm) - a1i .
Both in
making
and inaccepting
accessrequests
it ispossible
that there occur ties in the values(9)
and(10)
that determine which requests are made andaccepted.
If ties occur, arandom selection is made among the tied values. This
gives
a smalldegree
of randomness tothe model.
4. ALTERNATIVE MODEL SPECIFICATIONS
The DA model as
presented
in Section 3 is based onpolitical insights
andtheory,
but alsocontains elements that are based on ad hoc choices. This article considers the
following
alternative
specifications:
i. The coefficients in the bounds
(6)
and(7)
are allowed to vary.ii. A further random element is included in the models for
making
andaccepting
accessrequests.
These
specifications
introduce additionalparameters
in the model that are apriori
unknownand have to be estimated from data about the final outcome and of intermediate outcomes of the decision
making
process. The most relevant intermediate outcome is the access network that has formed at the end of the process. The unknownparameters
are denotedby 9h .
In
Snijders,
Stokman andZeggelink (1996),
extension(i)
waselaborated, allowing only
of aone-dimensional
parameter
9 . Parameters are included in(6)
and(7)
because the values of the coefficients in these bounds were determined in Stokman &Zeggelink (1996)
in a ratherarbitrary
way. Thepresent
article allows several unknownparameters,
but it is not advisableto make their number too
large.
This would lead toimprecise
parameter estimates and to arisk of
overfitting (i.e.,
offinding parameter
estimates that reflectunimportant peculiarities
inthe data rather than the structure of the decision
making process).
In view of thisrestraint,
oneparameter
is included in each of formulae(6)
and(7).
Thefollowing
bounds are considered:Of course, every actor can make and
accept
no more than n-1 access requests.Therefore,
if theright
hand sides of(11)
and(12)
are greater than orequal
to n-1, further increase of81
or82
will not lead to any realchanges
in thespecified
model.Extension
(ii)
is based on the idea that formulae(9)
and(10) capture only incompletely
thedeterminants of the access process.
Other,
unknown factors can alsoplay
a role. These other factors can berepresented
as random terms added to(9)
and(10), respectively.
This leads to amodel in the
spirit
of randolnutility inodels,
cf. Maddala(1983, chapter 3).
Of course,(9)
and(10)
are not utilities in a strict sense, butthey
doguide
actors’ behavior at intermediate steps in the decisionmaking
process and therefore may be viewed as "intermediate utilities". Thoseaccess
requests
are made which have thehighest positive
values ofup to the maximum
given by (6)
or(11).
HereV-
are random disturbances.Further,
thoseaccess requests are
accepted
which have thehighest positive
values ofup to the maximum
given by (7)
or(12).
TheW~~
also are random disturbances. If the disturbance terms haveprobability
distributions that can assumearbitrarily large values,
theeffect of
adding
the disturbance term is that any of the accessrequests
could bechosen,
but theprobability
ofchoosing
them is anincreasing
function of the value in(9)
or(10), respectively.
It will be assumed that the random termsVi)
for differenti, j,
and t, areindependent
andidentically
distributed with anexpected
value of 0. The same is assumed for the If the variance of or ofW-
islarge compared
to thevariability
of(9)
or(10),
then there are
important
elements in the access process notcaptured
in(9)
or(10), respectively.
Theprecise
form of the distribution ofVi)
andWit
will not have very greatconsequences for the
modeling
results. Onepossibility
is to assume normal distributions withmeans 0 and variances
83
forV~~
and84
for Values83
=84
= 0yield
theoriginal
model with access requests made and
accepted according
to(9)
and(10). Very high
values for83
and94
mean,respectively,
thatmaking
access requests, oraccepting them, happens
atrandom.
4.1. THE GENERATED ACCESS NETWORK
In each iteration step t from 1 to
T,
a new access network isgenerated.
There are severalpossibilities
fordefining
the total networkgenerated by
the process(the
stochastic"predicted"
network).
Onepossibility
is to take the last: aij Anotherpossibility
is to take theunion of all
step-dependent
networks:aij
= maxt This can beinterpreted
in thefollowing
way. Contacts are
being
establishedduring
eachstep
in the decisionmaking
process becauseactors
try
to influence eachother,
and a number of these accessrequests
areaccepted.
Eachtime that an access
request
issuccesfully made,
this contributes to the relation between thetwo actors involved.
However,
in order to obtaincorrespondence
with earlierapplications
ofthe DA model to the AVEBE
data,
this paper follows the firstpossibility.
The data collection may be formulated in such a way that the observed network is
necessarily symmetric, i.e., aij
= aji .This was also the case for the AVEBE data. This can be reflected in the modelby symmetrizing
thepredicted
network.Therefore,
the final matrixgenerated by
the
dynamic
process is defined here asaij = max a -TI.
It should be noted that thissymmetrization
does notplay
a role in the modeled influence process.5. PARAMETER ESTIMATION
The extension of the
Dynamic
Access modelpresented
above has four unknownparameters.
The
original specification
of the DA modelcorresponds
to91= 82
+0.5, 83 = 94
= 0. Theseparameters
can be estimated from availabledata;
if the data is not informativeenough,
someof the parameters could be
given
fixed values while the others are estimated. In this article wetreat moment estimation, based on a set of selected statistics. The idea is that if k
parameters
are to be estimated the researcher selects k statistics observed for the decision process. These
can be outcomes on one or more issues as well as characteristics of the access network that has been formed
during
the decisionmaking
process. If several decisionmaking
processes have been observed that are so similar that it may be assumed thatthey
aregovemed by
thesame
parameters (note
that this is indeed assumedby
theoriginal
DAmodel),
then thestatistics can be
averaged
over the various decisionmaking
processes. Theparameters
are estimated so that a
good
fit betweenprediction
and observations is obtained withrespect
to these statistics. More
specifically,
indicate the statisticsby 21
toZk,
with observed values z, to zk . The distribution of the vector Z =(ZI,
...,Zk ) depends
on the parameter8 =
( 8ï ,
...,8k) .
The choice of the vector of statistics Z will be discussed below.One of the basic methods for
constructing
statistical estimators is the method of moments(see,
e.g., Bowman &Shenton, 1985).
The moment estimate for 8 is the value of 8 that solves theequation
.1%
This estimated value is denoted 8 . Under the
assumption
that thespecified
modelcorrectly
describes the decision
making
process, anapproximate expression
for the covariance matrix of 0 can be derivedusing
the delta method(see,
e.g.,Bishop, Fienberg
&Holland, 1973,
section14.6) together
with theimplicit
function theorem. The result iswhere
5.1. Robbins-Monro process
The
problem
with this moment estimator is thatEgZ
cannot be calculated in astraightforward
way, becauseZh
is the stochastic result of a simulation model.However,
the Robbins-Monro method(1951) (for
an introduction see, e.g.,Duflo, 1990
orRuppert, 1991),
or variants of
it,
can be used tocompute approximations
to the moment estimates inarbitrary precision.
This wasproposed
for otherdynamic
network modelsby Snijders (1996).
Toexplain
the Robbins-Monromethod,
first consider the case where no stochastic element is involved. If our simulation model were a deterministic one, we could writeZ(8)
for the value of Z for a
given
parameter value9 ,
and we would have to solve theequation Z(8)
= z. This could be doneby
the well-knownNewton-Raphson method, starting
at asuitable
starting
value 9 ~l~ and with iterationstep
where
D(8)
=3Z(0)/30
In the Robbins-Monromethod,
the exact valueZ(8 ~N~)
isreplaced by
a random variableZNf 8 (N))
which has the distribution of Z forparameter
value 8 = 8(N).
The randomness is dealt withby
a factor 1 /N in the iteration step. The iterationstep
is defined asThe matrix
DN
is a suitable matrix. Theoptimal
choice isDN
=D(6 ~N~).
It is discussed below howDN
can be chosen inpractice.
As a
good approximation
for the momentestimate,
one can use 9 ~~~ for a value of N when convergence may be assumed. Because of the random nature of the Robbins-Monro process,a more efficient
approximation
is the average of8(m)
to8(N), supposing
that the iteration process has been"circling
around" the true value from at least the M’thstep onwards,
for asufficiently large
value of N - M.5.2. Selection of statistics
For the
efficiency
of the moment estimator andgood
convergenceproperties
of the Robbins- Monro process it isimportant
that statisticsZh (h = 1,..., k)
be chosen that carry information about theparameters 9h (h
=1,..., k).
With an incorrect choice of thestatistics,
it ispossible
that the moment
equation (15)
does not even have a solution. Sufficient statistics as defined in mathematical statistics areimpossible
to find in this model. Evenproving,
e.g., thatEeZh
isan
increasing
function of one of theparameters 6k ,
when the otherparameters
have fixedvalues,
will often be next toimpossible.
The selection of statistics must be made in a heuristicmanner.
In this article we do not use the decision outcomes for
estimating,
butonly
the structure of thegenerated
access network. Twoglobal
network characteristics stand out as candidates: thedensity,
’1 n