28 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013 Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning Youngmi Jin, Member, IEEE, George Kesidis, Senior Member, IEEE, and Ju Wook Jang, Member, IEEE Abstract—Recently, economic models have been proposed to study adoption dynamics of entrant and incumbent technologies motivated by the need for new network architectures to complement the current Internet. We propose new models of adoption dynamics of entrant and incumbent technologies among bounded rational users who choose a satisfying strategy rather than an optimal strategy based on aspiration-based learning. Two models of adoption dynamics are proposed according to the characteristics of aspiration level. The impacts of switching cost, the benefit from entrant and incumbent technologies, and the initial aspiration level on the adoption dynamics are investigated. Index Terms—Aspiration, bounded rationality, evolutionary game theory, technology adoption, technology diffusion dynamics. I. INTRODUCTION I N SPITE of its great success, the current Internet has generic deficiencies such as security. Recently, there have been calls for new network architectures that can complement the features lacking in the current Internet architecture. As the need for new and viable network technologies arises, the adoption dynamics of a new technology has drawn the attention of the networking research community [6], [12], [13], [20], [26]. The goal of such studies is to develop models assessing the viability of a new network technology and explain the diffusion process of the entrant. The various models for diffusion of new technologies assume that users make rational decisions with given information. In general, users may not have the perfect or complete information necessary for optimal decision making, or they may be misinformed. It is also possible that users have cognitive limitations or that users just act randomly. That is, users may not be fully rational, but bounded rational. Many existing works studying the diffusion of new technologies consider bounded rationality due to limited information, for example, the number of Manuscript received June 23, 2010; revised February 22, 2011 and January 09, 2012; accepted February 21, 2012; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor D. M. Chiu. Date of publication March 22, 2012; date of current version February 12, 2013. This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology, under Grant 2010-0006611 and National Science Foundation under CNS Grant 1152320. Y. Jin is with the Department of Electrical Engineering, KAIST, Daejon 305701, Korea (e-mail: youngmi_jin@kaist.ac.kr). G. Kesidis is with Pennsylvania State University, University Park, PA 16802 USA (e-mail:kesidis@engr.psu.edu). J. W. Jang is with the Department of Electronic Engineering, Sogang University, Seoul 121-742, Korea (e-mail: jjang@sogang.ac.kr). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TNET.2012.2189891 users adopting a technology [13], [18] or when only local information is available such as that of neighboring nodes without the information of global network structure) [11], [21], [22]. Among many aspects of bounded rationality, we are interested here in users’ decision-making behaviors, such as the choice of a satisfying strategy (an inferior strategy) instead of an optimal strategy [7], [25]. The theory of satisfying behavior says that players are more apt to satisfy rather than to optimize [5], [27]: Instead of choosing a strategy giving the highest payoff, a player sets a standard representing the payoff level she wants, called aspiration level, and searches a strategy giving her payoff higher than the aspiration level. Once she finds such a strategy, she sticks to it even though it does not give her the highest payoff. The decision-making process itself is called aspiration-based learning [7], [16]. We start with a basic game model, a coordination game, that is widely used in the analysis of technology diffusion [9], [11], [14], [21] and propose two aggregate diffusion models with bounded rational users using common aspiration level. Most economic literature studies 2 2 (two users and two strategies) game models in which each user adjusts her own standard level (aspiration) based on the payoff she has received users, where is suffiin the past. Our model considers ciently large and all users have a common aspiration level as in [25]. Two aggregate diffusion models with bounded rational users are proposed: constant aspiration level and time-varying aspiration level. With a fixed common aspiration, the diffusion dynamics of an entrant technology can be modeled as a continuous-time Markov process on finite state space. Since there is uncertainty in decision making of bounded rational users, it is important to learn from past experience. In aspiration-based learning, learning from past experience is incorporated into aspiration level through adaptation [4], [7], [16], [25]. When the common aspiration level is time-varying, users evaluate the technologies and adjust the aspiration level in the direction toward the average payoff as the technology diffusion goes on. We examine the dynamics between one incumbent and one entrant and the dynamics among one incumbent and two entrants, respectively. The main contribution of this paper is the formulation and analysis of models of aggregate diffusion dynamics of bounded rational users. Considering bounded rationality in a user’s strategy choice, we introduce a new modeling approach adopted from the economics literature into networking research. The rest of the paper is organized as follows. Section II summarizes related literature and describes how our work herein is related to the existing work. In Section III, we formu- 1063-6692/$31.00 © 2012 IEEE JIN et al.: DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS late a Markov process model using a fixed common aspiration level and analyze the user’s adoption behavior through the Markov process model. In Section IV, we formulate mean field dynamics between one entrant and one incumbent with time-varying aspiration update. The equilibrium points of the dynamics are found, and their stability properties are investigated. Section V studies the mean field diffusion dynamics when two entrants are introduced to the market with an incumbent. Section VI concludes with summary of the results of the paper. The proofs of the theorems are placed in the Appendix. II. RELATED WORK There are two streams of work relevant to our study: adoption dynamics of technologies and aspiration-based modeling in economics. Both are briefly discussed in this section. A. Adoption Dynamics of Technologies The diffusion dynamics of a new technology are an active line of research in economics and management science. This topic has recently received attention from the network research community for new network technologies for the future Internet. Chan et al. discussed in [6] why newly proposed secure BGP protocols are not adopted by ISP in spite of existing security problems of current BGP. The authors explained the nonadoption of innovative secure BGP protocols by weak adoptability, the strength of a protocol’s properties in driving the adoption process. Their methodology assessing the adoptability is based on users’ incentive-compatible choice of technologies; users choose a new protocol if the benefit of adopting it is higher than the transition cost (or switching cost). One important factor in user benefit is network externality, i.e., how many users adopt a given technology. In [1], network externality is recognized as a major factor hindering the deployment of security technologies as well as information asymmetry. The impact of network externalities is studied in various analytic models. Joseph et al. proposed a “static” economic model in which every user chooses either a new technology or an old one [13]. A user adopts the new technology or adopts a converter that enables the user to use new technology with partial benefit while still using an old technology (if the new technology gives higher benefit to the user than the old one). In [12] and [26], the authors formulate dynamic diffusion models among heterogeneous users who choose a technology giving them highest positive payoff. In their models, a user chooses no technology if none gives her positive utility. No choice of technologies and the heterogeneous user assumption result in various equilibrium points—for example, full market penetration of one technology, only one technology survival with partial penetration level, and coexistence of two technology of full adoption or partial adoption. Immorlica et al. [11] studied how the entrant can spread to most of the users, when there exist users who employ “converters” that enable simultaneous use of both technologies. They identified the payoff structure and the cost of converters for the pervasive adoption of the entrant in -regular graphs. Their results depend on the underlying network graph structure, which means neighboring nodes of an individual have more influence upon her payoff. The impact of an underlying network graph structure on technology diffusion dynamics is also studied in [9], [21], and [22]. 29 In [18] and [19], security investment is studied. Users on a network decide to deploy security protection at a positive cost. Adopting security lowers the probability of loss due to malware. One interesting result is that if the security technology provides strong protection against risk, then the incentive to invest in security reduces as many users adopt security.1 Also, if security provides weak protection, then critical mass is observed. Two stable equilibria and one unstable equilibrium are possible. This paper does not consider the impact of a network graph structure. We assume that users are fully connected and well mixed. B. Aspiration-Based Learning Bounded rational user behaviors selecting an inferior strategy instead of an optimal one have been studied to model learning, experimentation, and evolutionary processes [4], [14], [16]. This approach has been used to select an equilibrium among multiple Nash equilibria and describe explicit dynamics to reach the equilibrium through trial and error [14]. Aspiration-based learning is one particular form of such bounded rational behavior modeling [4], [7], [16], [25]. In the aspiration-based learning, each user chooses her strategy at each time-step. Each user sets a standard representing the payoff she hopes to get and compares her choice to the standard at each time-step. The standard is called aspiration. If the payoff from her current choice exceeds the standard, then she keeps the choice at the next step. Otherwise, she drops the choice and chooses another alternative with some positive probability at the next time-step. Aspiration-based learning has been studied extensively to explain the convergence to the Pareto-optimal point in prisoner’s dilemma game. In the economic literature, many assume a 2 2 game where each user adjusts her own aspiration level. Our work is motivated by [25], which studies the emergence of cooperation when two randomly chosen players among a large population repeatedly match and play a prisoner’s dilemma game with time-varying common aspiration level. We assume that all users have common aspiration level as in [25] and model the cases when the common aspiration level is constant or time-varying. III. MARKOV PROCESS MODEL WITH FIXED ASPIRATION A. Model Consider a fixed population of users and two network technologies, labeled and , representing a new entrant technology and an incumbent, respectively. We assume that all users adopt technology at the initial time, and technology has technical features that technology does not provide for the users. Once the entrant technology is introduced to the market, each user adopts either technology or technology . Let be user ’s technology choice and be the other users’ choice. , for given : If is , then , Let 1A similar phenomenon has been observed for inoculation uptake in studies of the epidemiology of infectious disease. The probability of side effects of inoculation may have greater associated risk than that of infection when a critical mass of the population is already inoculated against the disease. Therefore, inoculation uptake is disincentivized when a critical mass of the population is not infectious. 30 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013 PAYOFF MATRIX IN A 2 TABLE I 2 COORDINATION GAME: and vice versa. The payoff of user ’s choice is users’ choice under other where is a payoff in 2 2 coordination game of which payoffs are given by Table I. We assume that in the sense that new technology provides more desirable technical features for users than technology . We further assume that every user repeatedly makes a choice between and . Let be the number of users adopting , the number of users choosing at time . Each user and independently makes her decision with rate 1. We will denote the th decision time of user by . The subscript will be omitted when is obvious. Now, fix a user and consider how she makes a decision. As in the introduction section, the user does not seek the best strategy, but a strategy satisfying her. An aspiration level is the criterion to determine whether she is satisfied. If her payoff with the current choice is above or equal to the aspiration level, then she is satisfied with her decision. Hence, she does not want to change her choice at the next opportunity, even though she might get a higher payoff by switching her choice. It is not difficult to find such user behavior in everyday life. Even if a new product or technology is available, users often do not try the new one if they are satisfied by the present one they use. Let and be the strategy and aspiration level of user at time , respectively. At time , a user compares her utility at with the aspiration level . She keeps if . Otherwise, she switches her choice to the other technology . More precisely, the strategy of with probability , user at time is with prob. with prob. if if if where . In economics literature, is called inertia, and switching probability [7]. If the switching cost is high, users will not tend to switch easily. In this section, we will assume that all users have common aspiration level and that it is constant: for all and . The assumption of constant aspiration level might be strong since, in general, users reevaluate their expectation of the available technologies after using them. However, this assumption of constant aspiration level explains a widespread (but not always true) belief that a new and better technology will eventually dominate. Moreover, it reveals the difference between the modeling of bounded rational behavior and that of fully rational behavior: We will see a counterintuitive thought that higher aspiration level takes a longer time for full adoption of the entrant than lower aspiration level, which comes from bounded rationality and lack of memory. With the assumption of common constant aspiration level, becomes a continuous-time Markov process on the state space as follows. Suppose that at time . Then, there are users choosing and users gets choosing . Therefore, at time , any user choosing utility . Let . If , then a user adopting is disappointed by and tends to switch from technology to technology with probability . Hence, the system transits from state to state with transition rate . If , users adopting are satisfied by and are not willing to change their technology. Hence, the system stays in state . The transition rate from state to state is if otherwise Similarly, users choosing transition rate from state (1) have and the to state if otherwise. is (2) B. Analysis With the model in Section III-A, we examine the limiting behavior of and the average time to reach state starting from state 0. If , then : There is no transition if all users adopt technology at the initial time. Since all users are satisfied with current technology, they do not need to switch to the entrant, even though new technology is available. Network externality (sometimes called network effect) is one of the essential parameters to explain of nonadoption or a failure of wide deployment of a new and superior technology [6], [12], [13], [26]. Besides network externality and the size of installed base, our model provides an explanation to nonadoption of a new and superior technology, the degree of user disappointment (or satisfaction): If users are satisfied with the current incumbent, they do not want to try something new. Suppose that . First consider the case that for all . From (1), this happens only if , . If , then which is equivalent to for all and for all (since ). The resulting , is irreducible, and transition rate matrix, the invariant distribution such that for this case is (see [15]) for The invariant distributions are depicted in Fig. 1. JIN et al.: DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS 31 The average hitting time can be obtained by solving the system of linear equations (see [23, Theorem 3.3.3]) (4) for (5) for Fig. 1. Invariant distribution when (6) . Since for all , changing states continually occur from one state to either or without absorbing into a particular state. The birth–death dynamics are observed because neither of the two technologies satisfies the users and the users are bounded rational without memory. If users are fully rational (i.e., they choose the optimal strategy), they will choose the entrant giving them the higher utility when neither technology satisfies them, under the circumstance when they should choose one. If users have memory of their strategy and payoff history, such cyclic behavior might not be observed. Incorporation of prior experience of an individual into her decision making can be achieved through the adaptation of aspiration level [4], [7], [16]. That is, a user observes her payoff and (or) the payoff of others resulting from current decision making and sets a new standard (new adjusted aspiration level) based on her experience. Adaptation of aspiration level and diffusion dynamics with time-varying aspiration level will be studied in Section IV. Suppose that . Let Solving the system of linear equations (4)–(6), we have the following result that tells us how much time is taken for the entrant to take full adoption of it. Theorem 2: The average hitting time to state starting from state 0 is (7) and , the average hitting time to state , is given by from state , for for for where . Note that this is a unique integer such that . The transition rates are now for for for and the transition rate diagram is shown in Fig. 2. It can be easily and checked that the invariant distributions are for . Thus, we have the following result. Theorem 1: If , then . can be interpreted as follows. The aspiration That level higher than implies that there is real market demand for the entrant, and the fact means that the users do not want a new technology better than technology . Hence, technology is the one the market seeks, and ultimately all users adopt it. Our next point of interest is the average time to reach the state from state 0. The hitting time to the state starting from state for a given sample path is defined as Theorem 2 tells us that it takes an exponentially proportional and a linearly proporamount of time from state 0 to state tional amount of time from state to state . As in Theorem 2, the average hitting time to state from state 0 depends on the value of that in turn depends on the aspiration level (or , when is fixed). A question arises: How does the average hitting time vary with (or )? Fig. 3 shows that is an in. Since increases creasing function of for the case as the common aspiration level increases, high aspiration level results that it takes longer to reach to the state where all users adopt . The rationale is as follows. From (7), we can express where (3) where is the number of users adopting average hitting time is at and the Once the system reaches state , it stochastically moves toward the absorbing state without returning to state 0. However, the 32 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013 Fig. 2. Transition rate diagram for . level, taking into account the payoff of her own and (or) payoff of others in evolutionary game theory [4], [7], [14], [16]. In a lot of prior work, the aspiration level of a single user (call her ) is updated in discrete time as Fig. 3. Average hitting time with , . system moves back and forth to reach state exponential increase (note the term in , which results in ) in time. IV. MEAN FIELD MODEL A fixed aspiration level may not be a realistic a standard for decision making, as we have observed in Section III. It may be set too low or too high when users have no experience using a new technology. Therefore, it is necessary to adapt aspiration levels that take into account the learning from the past decision making as real-world experiences accumulate with time. This section studies technology diffusion dynamics with timevarying aspiration level. As the aspiration adapts with time, the degree of disappointment, expressed by the difference between the aspiration level and the received utility, also becomes time-varying. In general, users tend to switch their choice with high probability when the disappointment is big as Axelrod wrote, “… what works well for a player is more likely to be used again, whereas what turns out poorly is more likely to be discarded,” in [3]. This behavior is incorporated into the switching probability in aspiration-based learning [7], [16], [25]. We consider a switching probability “function” depending on the degree of disappointment rather than a constant switching probability: the bigger disappointed, the higher switching probability. This section investigates the adoption dynamics when the aspiration level is evolutionary but all users have the common time-varying aspiration level. With time-varying common aspiration level, the diffusion dynamics of a new technology are modeled as a dynamical system consisting of two differential equations when the population size is big. A. Time-Varying Aspiration and Switching Probability Function To incorporate prior experience of an individual into her decision making, a user sets a new standard, i.e., new aspiration (8) where and denote her payoff and aspiration level at time , respectively, and a weight function (see [7] and [16]). Note that current aspiration level depends on the past aspiration level and the past utility in (8). The aspiration level represents a payoff level that a player hopes to get based on her past history of utility up to time . In the environment considered in this paper, users observe experiences of other users and share their aspiration levels. We assume that they imitate each other’s aspiration level with the same weight on each individual. These dynamics are possible owing to our assumption that users are located on a fully connected network. “Moreover,” we assume that the average aspiration level is delivered to every user as soon as there is a change on the value of the current aspiration level, without delay. To consider the evolution of common aspiration level, we assume that is constant and every user simultaneously adapts her aspiration level at the time (in discrete time unit) with the adaptation rule (8). Then, by summing (8) over and dividing the summation by , the average of updated new aspiration level at time is where and , the total sum of payoffs, and is a constant . Based on the above reasoning, we assume that the change on the common aspiration level in a short time interval is proportional to the quantity . An update of common aspiration levels according to some population statistics was proposed in [25]. In theoretic biology [8], [24] where the emergence of cooperation among selfish genes is actively studied, average payoff, an example of population statistics, plays the role of standard for rational decision making. In this case, a common aspiration level is average payoff itself: That is, there is no adaptation procedure for aspiration. JIN et al.: DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS 33 The first term is the amount of decrease in the number of users choosing the entrant, i.e., the number of users who switch from technology to technology , and the second term is the number of users who switch from the incumbent to the entrant. Recall from Section IV-A that the change on the common aspiration level in a short time interval is proportional to where is the total sum of payoffs at time Fig. 4. h(z). Note that A switching probability function continuously differentiable such that is nondecreasing and if otherwise , which is used in [16] and [25]. with Note that for . Also, is bounded for all since and is continuous. Under high switching cost, users are reluctant to change their past decision. The upper bound of can be interpreted in this context, and switching cost is incorporated into the value of [7]. A general -shaped is depicted in Fig. 4. We assume that a user changes her technology choice with probability proportional to her degree of disappointment, i.e., (aspiration—utility). The value of represents how much a user is disappointed, where is a utility and is an aspiration of a user. In this section is an average aggregate utility and is a common aspiration level to study aggregate dynamics. is a Markov process defined on . Using Kurtz’s Theorem [17], we will see the dynamics of can be approximated as a set of deterministic differential equations when is sufficiently large. First, note that if we let , , and and assume that is sufficiently large that , then by (9) Since the change of the common aspiration level in a short time period is proportional to , the evolution of the common aspiration level can be modeled as The average payoff is Thus, the dynamics can be modeled as B. Modeling Let be the number of users who adopt the entrant and be the common aspiration level at time , when there are total users. We assume that the common aspiration level is bounded, i.e., for all . Consider how the number of users adopting changes. A user choosing the entrant gets the utility A user choosing the incumbent has the utility (10) on and . Indeed the solutions of the above differential equations are the deterministic approximation of as we will see. We assume that takes discrete values on the space such that . However, even if is real (continuum) valued, the following results still hold. Let be the utility of a user adopting the entrant, be the utility of a user adopting the incumbent, and be total sum of the payoffs when users choose the entrant; that is at time . Note that user utility linearly increases as the number of adopters of a given technology increases. At time , a user choosing changes her technology choice with probability and a user choosing changes her technology choice with probability . Therefore, the change in in a short time interval is (9) Let process (since . Then, is a Markov is a Markov process) defined on 34 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013 the state space and . Since a user choosing changes her technology choice (to the entrant) with probability with rate Since a user choosing changes her technology choice (to the incumbent) with probability with rate Recall that the change on the common aspiration level in a short time interval is proportional to . More is positive, then the updating specifically, if probability of is proportional to . If is negative, then the updating probability is proportional to . Therefore with rate with rate By Kurtz’s theorem [17] (see also the Appendix), we have the following result. Theorem 3: For a fixed time interval and , the Markov chain converges almost surely to , which is the solution of the (deterministic) differential (10). We study the dynamics of the dynamical system defined by (10). From now on, in (10) is replaced by . Note that is a stochastic process, but is the deterministic approximation of common aspiration in the above theorem. An equilibrium is the point at which and . At an equilibrium point, the number of users who are satisfied with their chosen technology equals with the number of adopters of the technology with the aspiration level equal to the average aggregate payoff. C. Analysis Clearly, and are the equilibria of the dynamical system of (10). We call and trivial (boundary) equilibria and with a nontrivial (interior) equilibrium. Theorem 4: The equilibria of (10) are , , and . By the above theorem, the dynamical system has three equilibrium points, , , : full market penetration of the incumbent, full market penetration of the entrant, and coexistence of both technologies. When the two technologies share the market, the portion of the market share taken by the entrant is since is bigger than . Hence, the incumbent has larger share than the entrant. Note that , the aspiration level at the nontrivial equilibrium, is less than the payoff of the incumbent. Theorem 5: The equilibrium point is unstable while and are locally stable. Since is unstable, the adoption dynamics will reach either a pure win of the entrant or a pure win of the incumbent with probability 1. A similar result is also observed in [18] and [19], which studies the impact of network externality on security investment in networks. In their models, users on a Erdös–Renyi graph decide to deploy security protection at positive cost to reduce probability of loss. When the security protection is not strong, there are three deployment levels as equilibria: 0, , with , where 1 means full deployment. No deployment and deployment level are stable, but is unstable. Note that , the Pareto-optimal equilibrium, is strictly less than one, while full deployment of the new (better) technology is the Pareto-optimal point in our case. This difference comes from the unique characteristics of network externality in security. In a security deployment case, when many users invest in security, the incentive for security investment decreases, and the benefit (network externality) from security deployment is greater to the security nonadopters than the benefit to the security adopters, which results in partial security deployment. Regarding Theorem 5, a different model of bounded rational users may show different dynamics. For example, the -person coordination game model in [14] exhibits a different long-run equilibrium. In that model, at a discrete time unit , a user chooses the best response strategy with probability , according to the information at time , and chooses the other strategy with probability . It is shown that if the total population size is greater than 2, then the long-run equilibrium (the equilibrium as is the pure win of the entrant, the better technology, with probability 1 as goes to 0 (see [14, Corollary 2]). The mean field model results in a diffusion dynamics different from that of Markov process model in Section III. When , in the Markov process model, eventually all the users adopt the entrant technology X. However, in the mean field model, the asymptotic behavior does not always converge to the state of full adoption of technology , even . The initial aspiration level and switching probability, where switching probability depends on switching cost and the degree of disappointment, determine the asymptotic state . When , the Markov process model exhibits a cyclic behavior without absorbing into one state, but repeatedly moving from one state to another. The mean field model does not show such a cyclic behavior because the aspiration level is adjusted when the initial aspiration level is too high so that no technology satisfies users. In the Markov process model with fixed aspiration level, when , the hitting time to full adoption of the entrant is increasing with the fixed aspiration level. However, in the mean field model, the time needed to reach full adoption of the entrant is decreasing if the initial aspiration level is high, as we will see in Section IV-D This phenomenological difference comes from the fact that the switching probability depends on the degree of disappointment and the aspiration level is adapted according to the past users’ decision making. The proof of Theorem 5 shows that there is no closed orbit, which means that every trajectory of the dynamical system governed JIN et al.: DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS 35 by (10) converges to a limit. Note that the limit of a trajectory is not unique, but depends on the initial value of and . D. Numerical Examples We conducted numerical experiments to investigate how the values of , , and affect the adoption dynamics. In our scenario, all users adopt the incumbent technology at the initial time, , and the entrant technology is introduced with : When , clearly no one has the need to try the new technology. We used and the switching probability function if otherwise in all experiments. This function was used in [25]. Figs. 5–7 show the impact of , the payoff from the entrant, on the limiting behavior of diffusion dynamics. We used and . In Fig. 5, where , the entrant does not survive with any initial aspiration level . Recall that in the Markov process model, guarantees the elimination of the incumbent. The failure of the entrant superior to the incumbent is explained by the network externality (or the size of installed base) of the incumbent as in other work [6], [12], [13]. As increases, initial aspiration level determines the asymptotic behavior of dynamics like Fig. 6: The entrant technology dies out for , but it defeats the incumbent if . If further increases as in Fig. 7, most of the trajectories with converge to the state of the entrant’s full market penetration. We see that high enables the entrant to survive with high probability, as expected. To examine the impact of the switching cost, the upper bound of , on the adoption dynamics, we do the same experiments with the same parameters used in Figs. 5–7 except the value of . Recall that depends on switching cost and high switching cost means low value of . The numerical experiments with are presented in Figs. 8–10. In Fig. 8, the entrant with perishes in the market for all , while the entrant wipes out the incumbent for when as in Fig. 6. In Fig. 10, when , the trajectories with converge to the state of full adoption of the incumbent . Note that most of trajectories converge to the state of full adoption of the entrant if in Fig. 7. The entrant should provide higher benefit in a market with high switching cost than with low switching cost in a market. Fig. 11 shows the smallest number of iterations necessary to reach the state of full adoption of the entrant from the initial state where there is no user choosing the entrant, for various initial aspiration levels. Since the number of iterations is proportional to time in this case, Fig. 11 shows that the time to reach the state of the entrant’s dominance is decreasing in the initial aspiration level. This is different from the observation in Section III-B in which the average hitting time to the state of full dominance of the entrant is increasing (see Fig. 3). The difference mainly comes from the switching probability function (bigger disappointment, higher rate switching) and the evolving aspiration (learning from the past). From these numerical examples, we see that the entrant can take the full adoption with high probability if is high. High Fig. 5. Diffusion dynamics: Diamond: interior equilibrium. and . Circle: limit of a trajectory. Fig. 6. Diffusion dynamics: Diamond: interior equilibrium. and . Circle: limit of a trajectory. Fig. 7. Diffusion dynamics: Diamond: interior equilibrium. and . Circle: limit of a trajectory. causes bigger disappointment with the incumbent than low , and big disappointment expedites the diffusion of the entrant. V. TWO COMPETING EMERGING TECHNOLOGIES AND ONE INCUMBENT This section studies the adoption dynamics of two entrant technologies and one incumbent one among users. We denote the entrants and with and . The incumbent is denoted by with . We assume that for and . is the number of users choosing technology and at time and is sufficiently large. 36 Fig. 8. Diffusion dynamics: Diamond: interior equilibrium. Fig. 9. Diffusion dynamics: Diamond: interior equilibrium. IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013 and and . Circle: limit of a trajectory. . Circle: limit of a trajectory. Fig. 12. Diffusion dynamics with two entrants switching cost (circles are limits of trajectories). and with low Fig. 13. Diffusion dynamics with two entrants switching cost (circles are limits of trajectories). and with high Each user adopts only one technology of the three ’s. . At time , any user who adopts Hence, receives the utility for . A user choosing switches to , with switching probability if she is not satisfied with where and . The change in in a short time interval for is similarly modeled as The average payoff function is Fig. 10. Diffusion dynamics: Diamond: interior equilibrium. and . Circle: limit of a trajectory. If we assume for all and , as in Section IV, we have for Fig. 11. Hitting time (number of iterations) to reach the state . Clearly, there are three equilibrium points, , and , for the dynamical system. Figs. 12 and 13 show the adoption dynamics of an incumbent and two entrants when , . If switching cost is low as in Fig. 12, then either or the incumbent is adopted by all JIN et al.: DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS Fig. 14. dominates for (circles are limits of trajectories). 37 and increase together until . Once the superior entrant gets bigger adoption than 0.5, then the inferior entrant loses its market and technology eventually becomes the winner of the market. It is worthwhile to note the adoption dynamics around . Since trajectories for in Fig. 14 are close to , small perturbation can drastically change the limiting behavior. In our experiment, we increased to 0.51 when . Our intentional perturbation is shown in Fig. 16, showing that the inferior entrant eventually gets full adoption. What this implies is that near the point (0.5, 0.5), the inferior entrant can effectively employ free seeding (providing a technology or sample products at a low price, discounted rate, or free of charge) to encourage users to adopt it with the purpose of winning the market. As in Fig. 16, the winner of the market changes after the free seeding strategy of the inferior entrant. In this case, the two entrants will experience an intensive competition to win the market. We had same observation with high switching cost. VI. CONCLUSION Fig. 15. dominates for (circles are limits of trajectories). Fig. 16. dominates for (circles are limits of trajectories). users depending on the initial aspiration level: If the initial aspiration is high, then the superior entrant takes full adoption. If the initial aspiration is low, then the incumbent takes full adoption and the entrants perish. Note that does not survive in either case. Fig. 13 shows that if the switching cost is high, the entrants are defeated by the incumbent. Comparing the case of Fig. 13 to that of Fig. 9, we learn the impact of two entrants on the market: The competition of two entrants can hinder the adoption of both new technologies. In Fig. 9, the entrant can survive if the aspiration level is high enough . However, in Fig. 13 (when there are two entrants), no new technology defeats the incumbent even for the case with and . This shows that if switching cost is high, the inferior entrant can hinder the adoption of the superior one. Figs. 14–16 illustrate the adoption dynamics when is small. In Fig. 14, with sufficiently high initial aspiration, In this paper, we proposed models of diffusion dynamics among bounded rational users on a fully connected network graph. In particular, we used aspiration-based learning in which a user chooses a strategy that satisfies her rather than an optimizing strategy. We suggested a birth–death Markov process model and a mean field model depending on the characteristics of the assumed common aspiration. Our Markov process model, with assumed constant aspiration, explained how the incremental deployment guarantees the success of an entrant technology. In the mean field model, where common aspiration level adapts with time toward averaged payoff, the diffusion dynamics show various behaviors depending on switching cost and initial aspiration level as well as and . The model shows clearly the impact of switching cost, the payoffs of two technologies, and the initial aspiration level on the diffusion dynamics. Through numerical experiments, we showed that high switching cost prevents users from adopting the new technology, and initial high aspiration has the users more dissatisfied by the incumbent, hence encourage the users to switch to the entrant. We also numerically examined the diffusion dynamics with one incumbent and two entrants. If there is little difference between the payoffs from the two entrants, then the competition between two entrants can be intensive. If the difference in payoffs from the two entrants is notable, then either the superior entrant or the incumbent is adopted by all users. Under high switching cost, the competition between two entrants causes them to perish in the market. One interesting research direction of this work is to investigate how the underlying network graph structures affect the diffusion dynamics when aspiration-based learning is employed. Users put more weight on the payoffs resulting from the interactions with their neighbors and less or no weight on the payoff from the interactions with non-neighbors. In this case, common aspiration level may not be available since users can observe only their neighbors. 38 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013 APPENDIX Proof of Theorem 2: From (6) and Note that there are two equations for , one from (11) and the other from (12). They give in the theorem statement. , we have (11) for . Using induction, we can show that for Proof of Theorem 4: The proof consists of two parts: We will show that is an equilibrium point, and then there is no equilibrium point other than , , . Suppose that is an equilibrium point where and . Letting , we have (16) (12) By (4), we have . Hence, (12) holds for Note that . Suppose that (12) holds with . For substituting (12) into (5), we have if we let as in (12). From for . Therefore, . , Letting , we have two cases. — Case 1: . — Case 2: . Case 1: Suppose that . Note that holds if and only since is a nonnegative function. Hence, we have and by the definition of . From and (16), we have (13) can be expressed (17) From in (13) and (16), we have (18) (14) for . We will show that (15) The only possible value simultaneously satisfying (17) and (18) is . Therefore, is the equilibrium point for Case 1. Case 2: Suppose that is an equilibrium point where , and . Respectively from and , we have from , (15) holds by induction. Since for . Suppose that this holds for . Using the expression of of (13) and (14), becomes Since , we have . From and , we have or From (19) , we have or From (14), for which gives , we have (20) However, there is no satisfying (19) and (20) simultaneously. From the results of Cases 1 and 2, is a unique “interior” nontrivial equilibrium point of the dynamical system. To prove that there are only three equilibrium points, , , and , we examine the possibility of a “boundary” equilibrium point that is neither nor . If , then should be . Hence, there is no equilibrium of the form except . With the same argument, there is no equilibrium of the form except . The only possible equilibrium on the boundary takes the form . However, it is impossible since the value of for nonnegative . JIN et al.: DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS Proof of Theorem 5: To investigate the stability property at an equilibrium point, we examine the eigenvalues of the Jacobian matrix of the dynamical system governed by (10) at the equilibrium points (by Hartman–Grobman Theorem). The Jacobian matrix at is where in (10). At equilibrium point and for . The eigenvalues of are and . Therefore, is locally stable. At equilibrium point , the Jacobian matrix has eigenvalues . Hence, is locally stable. At the equilibrium point , has eigenvalues and -1. Hence, the eigenvalues of the Jacobian matrix do not determine the stability at . To show that is unstable, we first show that there is no orbit encircling using Liouville’s theorem in the theory of ordinary differential equations (see [2, p. 198]). Liouville’s Theorem: Let for be a dynamical system defined on an open set where is differentiable with respect to . Let and and denote the volume of . Then 39 Since there are two locally stable equilibrium points (0, 1) and , there should be a separatrix that demarcates the basins of attraction of (0, 1) and . The separatrix should be either a closed orbit encircling or a path that passes through an unstable equilibrium (see [10]). However, as we have seen, there is no closed orbit. Hence, the separatrix demarcating the basins of attraction should pass through some unstable equilibrium point. Since we have only one equilibrium , the separatrix should pass it, and it must be an unstable one. Kurt’z Theorem (See [17, Sec. 3]): Let be the -dimensional integer lattice. For positive integer , is a Markov chain with state space . Suppose that there exist nonnegative functions and positive constants , such that since for state Let where If , where to state is the transition rate from . . then almost surely where . Since the trace of is negative, the dynamical system defined by (10) cannot have a closed orbit that encircles the equilibrium since any closed orbit has positive volume (area). Moreover, the dynamical system does not have any closed orbit in the space, . To show that there is no closed orbit in , we need the following result: Index Theorem: Any closed orbit enclosing an open set should have a singular (equilibrium) point in (see [2, pp. 254–256]). If there is a closed orbit induced by the dynamical system, then the index or winding number of the closed orbit in should be positive and the orbit should have at least one equilibrium by the above theorem. However, there is no equilibrium except , and there is no orbit enclosing . for every . Proof of Theorem 3: Let easily checked that , . It can be 40 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013 where and . Indeed, has its maximum on since and is continuous. Note that if , which results in . Note that , , which satisfies the Lipschitz continuity condition for any and in bounded open set over . Since , the Lipschitz condition holds for any , . ACKNOWLEDGMENT The authors would like to thank the associate editor, the anonymous referees, and Prof. R. Guérin for their valuable comments. REFERENCES [1] R. J. Anderson, “Why information security is hard—An economic perspective,” in Proc. ACSAC, 2001, pp. 358–365. [2] V. I. Arnold, Ordinary Differential Equations. Cambridge, MA: MIT Press, 1973. [3] R. Axelrod, “An evolutionary approach to norms,” Amer. Polit. Sci. Rev., vol. 80, no. 4, pp. 1095–1111, 1986. [4] J. Bendor, D. Mookherjee, and B. Ray, “Aspiration-based reinforcement learning in repeated interaction games: An overview,” Int. Game Theory Rev., vol. 3, no. 2 & 3, pp. 159–174, 2001. [5] C. Camerer, Behavioral Game Theory: Experiments in Strategic Interaction. Princeton, NJ: Princeton Univ. Press, 2003. [6] H. Chan, D. Dash, A. Perrig, and H. Zhang, “Modeling adoptability of secure BGP protocol,” in Proc. ACM SIGCOMM, 2006, pp. 279–290. [7] I.-K. Cho and A. Matsui, “Learning aspiration in repeated games,” J. Econ. Theory, vol. 124, pp. 171–201, 2005. [8] M. Doebeli and C. Hauert, “Models of cooperation based on the prisoner’s dilemma and the snowdrift game,” Ecol. Lett., vol. 8, pp. 748–766, 2005. [9] G. Ellison, “Learning, local action, and coordination,” Econometrica, vol. 61, no. 5, pp. 1047–1071, Sep. 1993. [10] J. Hubbard and B. West, Differential Equations: A Dynamical System Approach, Part II: Higher Dimensional Systems, 2nd ed. New York: Springer-Verlag, 1995. [11] N. Immorlica, J. Kleinberg, M. Mahidian, and T. Wexler, “The role of compatibility in the diffusion of technologies through social networks,” in Proc. ACM EC, 2007, pp. 75–83. [12] Y. Jin, S. Sen, R. Guérin, K. Hosanagar, and Z. Zhang, “Dynamics of competition between incumbent and emerging network technologies,” in Proc. NetEcon, 2008, pp. 49–54. [13] D. Joseph, N. Shetty, J. Chuang, and I. Stoica, “Modeling the adoption of new network architectures,” in Proc. ACM CoNEXT, 2007, Article no. 5. [14] M. Kandori, G. Mailath, and R. Rob, “Learning, mutation, and long run equilibria in games,” Econometrica, vol. 61, no. 1, pp. 29–56, Jan. 1993. [15] S. Karlin and H. Taylor, A First Course in Stochastic Processes, 2nd ed. New York: Academic, 1975. [16] R. Karnadikar, D. Mookherjee, D. Ray, and F. Vega-Redondo, “Evolving aspirations and cooperation,” J. Econ. Theory, vol. 80, pp. 292–331, 1998. [17] T. G. Kurtz, “Strong approximation theorems for density dependent Markov chains,” Stochastic Process. Appl., vol. 6, pp. 223–240, 1978. [18] M. Lelarge, “Economics of malware: Epidemic risks model, network externalities and incentives,” in Proc. Allerton, 2009, pp. 1353–1360. [19] M. Lelarge and J. Bolot, “A local mean field analysis of security investments in networks,” in Proc. NetEcon, Seattle, WA, Jun. 2008, pp. 25–30. [20] M. Lelarge and J. Bolot, “Network externalities and the deployment of security features and protocols in the Internet,” in Proc. ACM SIGMETRICS, 2008, pp. 37–48. [21] A. Montanari and A. Saberi, “Convergence to equilibrium in local interaction games,” in Proc. IEEE FOCS, 2009, pp. 303–312. [22] S. Morris, “Contagion,” Rev. Econ. Studies, vol. 67, pp. 57–78, 2000. [23] J. Norris, Markov Chains. Cambridge, U.K.: Cambridge Univ. Press, 1997. [24] M. A. Nowak, A. Sasaki, C. Taylor, and D. Fudenberg, “Emergence of cooperation and evolutionary stability in finite populations,” Nature, vol. 428, pp. 646–650, 2004. [25] F. Palomino and F. Vega-Redondo, “Convergence of aspirations and (partial) cooperation in the prisoner’s dilemma,” Int. J. Game Theory, vol. 28, pp. 465–488, 1999. [26] S. Sen, Y. Jin, R. Guérin, and H. Hosanagar, “Modeling the dynamics of network technology adoption and the role of converters,” IEEE/ACM Trans. Netw., vol. 18, no. 6, pp. 1793–1805, Dec. 2010. [27] H. Simon, Models of Man, Continuity in Administrative Science, Ancestral Books in the Management of Organizations. New York: Garland, 1987. Youngmi Jin (M’05) received the B.S. and M.S. degrees in mathematics from the Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea, in 1991 and 1993, respectively, and the M.S. and Ph.D. degrees in electrical engineering from Pennsylvania State University, University Park, in 2002 and 2005, respectively. She was a Member of Technical Staff with KT, Seoul, Korea, where she did research on traffic engineering and broadband wireless access (IEEE 802.16) systems. From 2007 to 2008, she was a Postdoctoral Researcher with the University of Pennsylvania, Philadephia. She is currently with the Department of Electrical Engineering, KAIST, as a Research Professor. Her research interests include Internet economics, Internet pricing, incentive engineering, P2P networks, wireless networks, and social networks. George Kesidis (M’90–SM’93) received the Ph.D. degree in electrical engineering and computer science from the University of California, Berkeley, in 1992. He was a Professor with the Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada, from 1992 to 2000. Since 2000, he has taught with both the Computer Science and Engineering and Electrical Engineering Departments of Pennsylvania State University, University Park. His research experience includes several areas of communication networking and machine learning. Dr. Kesidis served as the Technical Program Committee Co-Chair of IEEE INFOCOM 2007 and is now serving on the Editorial Boards of the ACM Transactions on Modeling and Computer Simulation and the IEEE Communications Surveys and Tutorials. Ju Wook Jang (M’11) received the B.S. degree in electronic engineering from Seoul National University, Seoul, Korea, the M.S. degree in electrical engineering from the Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea, and the Ph.D. degree in electrical engineering from the University of Southern California (USC), Los Angeles. From 1985 to 1988 and 1993 to 1994, he was with Samsung Electronics, Suwon, Korea, where he was involved in the development of a 1.5-Mb/s video codec and a parallel computer. Since 1995, he has been with Sogang University, Seoul, Korea, where he is currently a Professor. His current research interests include WiMAX protocols, mobile networks, and next-generation networks.