Skip to main content
Log in

Preference intensities and risk aversion in school choice: a laboratory experiment

  • Published:
Experimental Economics Aims and scope Submit manuscript

Abstract

We experimentally investigate in the laboratory prominent mechanisms that are employed in school choice programs to assign students to public schools and study how individual behavior is influenced by preference intensities and risk aversion. Our main results show that (a) the Gale–Shapley mechanism is more robust to changes in cardinal preferences than the Boston mechanism independently of whether individuals can submit a complete or only a restricted ranking of the schools and (b) subjects with a higher degree of risk aversion are more likely to play “safer” strategies under the Gale–Shapley but not under the Boston mechanism. Both results have important implications for enrollment planning and the possible protection risk averse agents seek.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. Abdulkadiroğlu et al. (2005a, 2005b, 2009) reported in more detail on their assistance and the key issues in the redesign for New York City and Boston, respectively.

  2. That is, the mechanism employed in Boston before it was replaced by the Gale–Shapley mechanism.

  3. The literature has also studied other mechanisms. Abdulkadiroğlu and Sönmez (2003) proposed a mechanism based on Gale’s top trading cycles algorithm as a second alternative for the Boston mechanism. However, we are not aware of school districts that employ this other alternative. More importantly, since in Boston and New York the Boston mechanism was replaced by Gale–Shapley, our study focuses on the ongoing debate on Gale–Shapley vs. Boston. For further recent developments on school choice we refer to Al Roth’s blog on market design.

  4. Miralles (2008) drew a similar conclusion based on his analytical results and simulations.

  5. On the other hand, since the market we consider in the second phase is small, the results may not scale up to very large real-life matching markets.

  6. Coarse school priorities are a common feature of many school choice environments. Then, in order to apply the assignment mechanisms, random tie-breaking rules are often used. However, the incorporation of such rules in our design would make it very hard to see whether individuals with different degrees of risk aversion behave differently because of strategic uncertainty or because of the random tie-breaking. In other words, we assume that the schools’ priority orders are strict in order to study whether the behavioral effect of risk aversion is associated with strategic uncertainty. For the very same reason, we also assume that the induced game is common knowledge even though in practice individuals are likely to have incomplete information regarding the other participants’ preferences.

  7. Loosely speaking, a subject plays a protective strategy if she protects herself from the worst eventuality to the extent possible. Consequently, a protective strategy is a maximin strategy.

  8. A rational individual may always choose lottery B, in which case the switching point is equal to 1.

  9. We “framed” the school choice problem from the point of view of teachers who are looking for jobs because this presentation provides a natural environment that is easy to understand. For example, material payoffs can be directly interpreted as salaries (see Pais and Pintér 2008).

  10. If teachers had to list only one school, the two constrained mechanisms would be identical; that is, for all profiles of submitted (degenerate) rankings, the same matching would be obtained under the Gale–Shapley and Boston algorithms.

  11. Since the payoff of the second most preferred school varies for all subjects, subjects face different kinds of opponents in different games. In one alternative design to possibly overcome this drawback the payoff for only one subject (in each group of three subjects) varies. Yet, in this alternative approach, the subjects with fixed preferences would probably believe that the third subject modifies her strategy due to the change in the preference intensities to which they respond by adapting their behavior as well, etc. The elicitation of beliefs would certainly provide important information regarding the individual motives but would, at the same time, further complicate the design. Also, if we only changed the preferences of one subject the data to be collected would triple (to a total of 654 subjects).

  12. In each treatment using the Boston algorithm, we had one student left that could not be matched with other participants. These two students took decisions without knowing that they remained unmatched. Finally, we paid them as if they were assigned a place at their most preferred school.

  13. It is well known (Dubins and Freedman 1981 and Roth 1982) that teachers have incentives to report their ordinal preferences truthfully in treatment GS u , in which case the induced matching would be stable and efficient with respect to the teachers’ true preferences. However, to put all treatments at the same level, these incentives were neither directly revealed in the instructions nor were they indirectly taught by going over several examples. Otherwise, a convincing argument in favor of truth-telling in GS u would render the comparison between GS u and the other mechanisms rather obvious. Also, explicit advice would only increase the (observed) efficiency and stability gap between GS u and BOS u , i.e., strengthen our results.

  14. Two settings in which protective strategies have been studied are two-sided matching markets (Barberà and Dutta 1995) and, more recently, paired kidney exchange (Nicolò and Rodríguez-Álvarez 2012).

  15. In Chen and Sönmez (2006), in their “random” and “designed” treatments of GS u , 56 % and 72 % of the subjects, respectively, submitted their true preferences. The numbers are 58 % and 57 % in Calsamiglia et al. (2009). Our numbers seem to be slightly lower but a real comparison is not possible due to the very different environments.

  16. Using χ 2 tests for homogeneity one verifies that for all cardinal payoff constellations, (a) the distribution of submitted rankings in treatment GS u (BOS u ) is significantly different from the one in treatment GS c (BOS c ) and (b) the distributions of submitted rankings in treatments GS u and BOS u (GS c and BOS c ) are not significantly different from each other. The second finding might create the impression that subjects perceive the Gale–Shapley matching algorithm in the same way as the Boston algorithm. Results 1 and 2 presented below, however, will reveal that this is not the case.

  17. We only considered data from subjects who behaved rationally in the first phase of the experiment, omitting those that switch from lottery B to lottery A.

  18. The slightly cumbersome calculations are available from the authors upon request.

  19. The common switching point has not been chosen arbitrarily. According to our data, the average switching point is 6.47 in GS u , 5.98 in GS c , 6.70 in BOS u , and 6.55 in treatment BOS c so that the difference in the group sizes is minimal if the seventh decision situation is taken as the dividing line.

  20. In theory, the two unconstrained mechanisms should yield stable matchings if subjects recognize that telling the truth is weakly dominant (in the case of GS u ) and do not fail to play Nash equilibria (in the case of BOS u , see Ergin and Sönmez 2006).

  21. The only two exceptions are found in the efficiency levels for the full subject pool and the low risk aversion group when school 2 has a value of 13 ECU.

  22. Note that the analysis performed in this paper may still apply to a “large” market where agents do not have complete information, but may still have a good idea of how preference distributions look like.

  23. Barberà and Dutta (1995) showed that under GS u truth-telling is the unique protective strategy for all participants on both sides of a two-sided matching market.

References

  • Abdulkadiroğlu, A., & Sönmez, T. (2003). School choice: a mechanism design approach. American Economic Review, 93(3), 729–747.

    Article  Google Scholar 

  • Abdulkadiroğlu, A., Pathak, P., & Roth, A. (2005a). The New York city high school match. American Economic Review, Papers and Proceedings, 95(2), 364–367.

    Article  Google Scholar 

  • Abdulkadiroğlu, A., Pathak, P., Roth, A., & Sönmez, T. (2005b). The Boston public schools match. American Economic Review, Papers and Proceedings, 95(2), 368–371.

    Article  Google Scholar 

  • Abdulkadiroğlu, A., Pathak, P., & Roth, A. (2009). Strategy-proofness versus efficiency in matching with indifferences: redesigning the NYC high school match. American Economic Review, 99(5), 1954–1978.

    Article  Google Scholar 

  • Abdulkadiroğlu, A., Che, Y.-K., & Yasuda, Y. (2011). Resolving conflicting preferences in school choice: the Boston mechanism reconsidered. American Economic Review, 101(1), 399–410.

    Article  Google Scholar 

  • Barberà, S., & Dutta, B. (1982). Implementability via protective equilibria. Journal of Mathematical Economics, 10(1), 49–65.

    Article  Google Scholar 

  • Barberà, S., & Dutta, B. (1995). Protective behavior in matching models. Games and Economic Behavior, 8(2), 281–296.

    Article  Google Scholar 

  • Calsamiglia, C., Haeringer, G., & Klijn, F. (2009). Constrained school choice: an experimental study. American Economic Review, 100(4), 1860–1874.

    Article  Google Scholar 

  • Chen, Y., & Sönmez, T. (2006). School choice: an experimental study. Journal of Economic Theory, 127(1), 202–231.

    Article  Google Scholar 

  • Dubins, L., & Freedman, D. (1981). Machiavelli and the Gale–Shapley algorithm. The American Mathematical Monthly, 88(7), 485–494.

    Article  Google Scholar 

  • Ergin, H., & Sönmez, T. (2006). Games of school choice under the Boston mechanism. Journal of Public Economics, 90(1–2), 215–237.

    Article  Google Scholar 

  • Featherstone, C., & Niederle, M. (2008). Ex ante efficiency in school choice mechanisms: an experimental investigation. Working paper, Stanford University.

  • Fischbacher, U. (2007). Z-tree: Zurich toolbox for ready-made economic experiments. Experimental Economics, 10(2), 171–178.

    Article  Google Scholar 

  • Gale, D., & Shapley, L. (1962). College admissions and the stability of marriage. The American Mathematical Monthly, 69(1), 9–15.

    Article  Google Scholar 

  • Greiner, B. (2004). The online recruitment system ORSEE 2.0—a guide for the organization of experiments in economics. Working Paper Series in Economics 10, University of Cologne.

  • Holt, C., & Laury, S. (2002). Risk aversion and incentive effects. American Economic Review, 92(5), 1644–1655.

    Article  Google Scholar 

  • Miralles, A. (2008). School choice: the case for the Boston mechanism. Working paper, Boston University.

  • Nicolò, A., & Rodríguez-Álvarez, C. (2012). Transplant quality and patients’ preferences in paired kidney exchange. Games and Economic Behavior, 74(1), 299–310.

    Article  Google Scholar 

  • Pais, J., & Pintér, Á. (2008). School choice and information: an experimental study on matching mechanisms. Games and Economic Behavior, 64(1), 303–328.

    Article  Google Scholar 

  • Roth, A. (1982). The economics of matching: stability and incentives. Mathematics of Operations Research, 7(4), 617–628.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joana Pais.

Additional information

We are very grateful for comments and suggestions from the Editor, two referees, Eyal Ert, Bettina Klaus, Muriel Niederle, Al Roth, and the seminar audiences in Alicante, Braga, Évora, Maastricht, and Málaga. F. Klijn gratefully acknowledges a research fellowship from Harvard Business School for academic year 2009–2010 when he was visiting HBS and the first draft of the paper was written. He also gratefully acknowledges support from Plan Nacional I+D+i (ECO2008-04784 and ECO2011-29847), Generalitat de Catalunya (SGR2009-01142), and the Consolider-Ingenio 2010 (CSD2006-00016) program. J. Pais gratefully acknowledges financial support from Fundação para a Ciência e a Tecnologia under project reference no. PTDC/EGE-ECO/113403/2009. M. Vorsatz gratefully acknowledges financial support from the Spanish Ministry of Education and Science through the project ECO2009-07530.

Electronic Supplementary Material

Below is the link to the electronic supplementary material.

Instructions (Translated from Spanish) (PDF 1.2 MB)

Appendices

Appendix A: Holt and Laury (2002)

Table 10 The Holt and Laury (2002) paired lottery choice design. For each of the ten decision situations, we also indicate the expected payoff difference between the two lotteries. Since we did not want to induce a focal point, subjects were not informed about the expected payoff difference during the experiment

Appendix B: Protective strategies

Consider the game \(G =[I,\mathbb{A},S,g,u]\), where I={1,2,…,n} is the set of players, \(\mathbb{A}\) is the set of outcomes, S=S 1×⋯×S n and S i is the set of strategies of player i, \(g:S \rightarrow \mathbb{A}\) is an outcome function, and u=(u 1,…,u n ) denotes a vector of utility functions \(u_{i}:\mathbb{A} \rightarrow \mathbb{R}\), where i=1,2,…,n. Take any number k∈ℝ, any iI, and s i S i . Let c(k,s i )={s i S i :u i (g(s i ,s i ))=k}.

Definition 1

(Barberà and Dutta 1995)

For any iI and \(s_{i},s'_{i} \in S_{i}\), s i protectively dominates \(s'_{i}\), if there exists k∈ℝ such that

  1. P1.

    \(c(r,s_{i}) \cap c(r',s'_{i})= \emptyset\) for all rk and r<r′, and

  2. P2.

    \(c(k,s_{i}) \subset c(k,s'_{i})\).

It follows from the definition that if s i protectively dominates \(s'_{i}\), then \(s'_{i}\) does not protectively dominate s i .

Definition 2

A protective strategy is a strategy that is not protectively dominated.

Let us now apply the above definition to our school choice problem. Take, for instance the mechanism BOS u and the payoff structure 20 ECU. They define a game \(G =[I,\mathbb{A},S,\mathit{BOS}_{u},u]\), where I={1,2,3} is the set of teachers; \(\mathbb{A}\) is the set of matchings; S=S 1×S 2×S 3, where S i ={(X,Y,Z),(X,Z,Y),(Y,X,Z),(Y,Z,X),(Z,X,Y),(Z,Y,X)} is the set of rankings over schools of teacher i, iI; and u=(u 1,u 2,u 3) is a vector of utility functions. To define player i’s utility function u i , note that i is indifferent between matchings that deliver the same partner, but has strict preferences over matchings that deliver different partners; four situations have to be considered: i may end up unmatched and receive a level of utility of 0, matched to the school ranked third in her preferences and receive a utility of 10, matched to the school ranked second and receive 20, and matched to the school ranked first, receiving a utility of 30.

Now let us consider teacher 1’s problem. The other teachers’ problems are similar. Note that every strategy guarantees that teacher 1 is matched, so that c(k,(×,×,×))=∅ for all k<10, implying that P2 is never satisfied for k in this range. Therefore, let us compute for each strategy of teacher 1 the set of complementary strategy profiles that match teacher 1 with school Z, with a corresponding utility of 10:

Let us start by comparing strategies (X,Y,Z) and (X,Z,Y). Since c(10,(X,Y,Z))⊂c(10,(X,Z,Y)), P2 is fulfilled for k=10. Moreover, P1 is fulfilled for r=10. Since c(r,(X,Y,Z))=∅ for all r<10, P1 is also fulfilled for r<10. It follows that strategy (X,Y,Z) protectively dominates (X,Z,Y) (and (X,Z,Y) does not protectively dominate (X,Y,Z)).

On the other hand, c(10,(Y,X,Z))⊂c(10,(Y,Z,X)) and c(r,(Y,X,Z))=∅ for all r<10 guarantee that (Y,X,Z) protectively dominates (Y,Z,X) (and (Y,Z,X) does not protectively dominate (Y,X,Z)). Furthermore, since c(10,(Z,×,×))=S 2×S 3, the strategies (Z,×,×) are protectively dominated by the other four strategies (and do not protectively dominate any of them).

Comparing c(10,(X,Y,Z)) and c(10,(Y,X,Z)), P2 is not verified for k=10. To make sure none of these strategies protectively dominates the other, we have to check what happens for higher levels of k. Computing c(20,(Y,X,Z)), it is easy to show that c(10,(X,Y,Z))∩c(20,(Y,X,Z))≠∅, so that P1 fails to hold for k>10 (with r=10 and r′=20) and (X,Y,Z) does not protectively dominate (Y,X,Z). On the other hand, (Y,X,Z) does not protectively dominate (X,Y,Z) as c(10,(Y,X,Z))∩c(30,(X,Y,Z))≠∅ and P1 fails to hold for k>10 (with r=10 and r′=30).

To ensure (X,Y,Z) is not protectively dominated, we still have to compare it with (Y,Z,X). Note that P2 is not verified for k=10. As for k>10, it can easily be shown that c(10,(Y,Z,X))∩c(30,(X,Y,Z))≠∅, so that P1 fails (with r=10 and r′=30). Similarly, (X,Z,Y) does not protectively dominate (Y,X,Z) as P2 is not verified for k=10 and c(10,(X,Z,Y))∩c(20,(Y,X,Z))≠∅, invalidating P1 for k>10 (with r=10 and r′=20).

Therefore, strategies (X,Y,Z) and (Y,X,Z) are not protectively dominated. The set of protective strategies of teacher 1 in BOS u20—in fact, in any game induced by BOS u —is {(X,Y,Z),(Y,X,Z)}.

Protective strategies can readily be calculated for the other mechanisms. In fact, following the informal description of protective strategies in Barberà and Dutta (1995, p. 289), in our school choice problem protective behavior means the following. For any distribution over the others’ strategy profiles: First, choosing a strategy that guarantees access to a school; second, among these, if possible, one that maximizes the probability of obtaining the best or the second best schools; and finally, within this set of strategies and whenever possible, picking one that maximizes the probability of being matched to the best school.

As such, since under GS u telling the truth never hurts and, for some strategy profiles of the others, leads to a better school slot, truth-telling is the unique protective strategy under this mechanism.Footnote 23 In what constrained mechanisms are concerned, protective behavior ensures in the first place that a subject is not left unassigned for any profile of complementary strategies. This implies using a strategy where the least preferred school is ranked first under BOS c —the unique protective strategy under this mechanism—and, given that acceptance is deferred in GS c , ranking the least preferred school first or second in the list under this mechanism. Moreover, given that ranking the least preferred school second increases the chances of being assigned to a better school both (X,Z,Y) and (Y,Z,X) are protective strategies for teacher 1 in GS c .

Rights and permissions

Reprints and permissions

About this article

Cite this article

Klijn, F., Pais, J. & Vorsatz, M. Preference intensities and risk aversion in school choice: a laboratory experiment. Exp Econ 16, 1–22 (2013). https://doi.org/10.1007/s10683-012-9329-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10683-012-9329-5

Keywords

JEL Classification

Navigation