Skip to main content
Advertisement

< Back to Article

Fig 1.

Two scenarios for a rodent conflict test.

An animal is rewarded with food pellets for approaching a pellet dispenser, but there is a possibility of being punished by an electric shock. In scenario 1, the probability of threat is constant over time (red line) while the probability increases over time that the food pellet is withdrawn (green line). Expected utility, or negative expected loss, is maximal if the animal approaches the dispenser as quickly as biologically possible. In scenario 2, the threat probability is initially very high and decreases afterwards. This reflects naturally occurring temporal relations between predatory threat and reward. In this scenario, it is cost-minimising to move somewhat later (see Model and Methods for proofs, and S1 Text for the choice of parameters in these simulations).

More »

Fig 1 Expand

Fig 2.

Finding the approach latency that maximises expected utility.

First time derivatives of expected gain E(G) and negative expected loss −E(L). Under assumptions 7–8 (Model and Methods), the two curves must cross at least once, and that means there must be at least one stationary point. At least one of these stationary points is a maximiser. Crucially, the dotted line shows the impact of a small increase in L or a scaling of p(L). As one can see here, this will shift the optimal approach latency to the right, i. e. to later time points. The argument is formalised using Taylor series (see Model and Methods).

More »

Fig 2 Expand

Fig 3.

Human approach-avoidance conflict model.

A: In experiments 1, 2 and 4, a human player (green triangle) rests in a safe place on a 2×2 grid, opposite a “sleeping predator”(grey circle). On each epoch, 6 successive reward tokens appear on the remaining two grid blocks at random time points. Once they have appeared on the grid, the time until they disappear is exponentially distributed. The player can press a key (experiments 1–2) or move a joystick (experiment 4) to collect these tokens which accumulate over any given epoch. At any time during the game, the predator becomes active with constant probability, but once active it will only reveal itself if the player is currently outside the safe place. If the player is caught by the predator, it loses all tokens already collected in this epoch, and no more new tokens appear. Magnitude of potential loss therefore corresponds to the number of already collected tokens. Threat level, defined as the wake-up rate, is different for the three predators. This wake-up rate is signalled by different colours, and tailored to result in a wake-up probability of p = 0.1, p = 0.2, or p = 0.3 if the player stays outside the safe place for 100 ms. Participants played 270 epochs (experiment 2: 210 epochs), thus making up to 1620 choices. B: In experiment 3, the task statistics were the same as in experiment 1 but the graphical set up and cover story were entirely different. The player is required to move a virtual “lever”(grey bar at the bottom) to obtain tokens, which can be removed if “static interference” occurred during lever movement.

More »

Fig 3 Expand

Fig 4.

Results from experiments 1–4.

The figure shows responses to the possibility to collect the nth token after already having collected (n—1) tokens which constitutes the potential loss. L: low threat. M: medium threat. H: high threat. Action: Percentage of epochs in which the player chose to collect at least the nth token. One can see that on the first token, i. e. when there is no potential loss involved, players almost always approach. After collecting increasingly many tokens, approach choices are reduced, and they are also reduced by higher threat level, (i. e. probability of loss). Approach and return latencies: Because the players rarely approached after collecting 5 tokens, approach latency is only shown up to a potential loss of 4 tokens. As the data are unbalanced, mean approach latencies were estimated in a linear mixed effects model (see Model and Methods). Approach latencies are increased both by increasing potential loss (i. e. number of already collected tokens) and by increasing threat level (i. e. probability of loss). The reverse pattern is seen for return latencies.

More »

Fig 4 Expand

Fig 5.

Comparison of model predictions with observed approach latencies.

Upper panels: Predicted and observed approach latencies. Empty dots depict data points unused for the estimations (see Model and Methods). Lower panels: Reconstructed prior derivative (grey) and prior distribution (black). The prior derivative is scaled by the current catch rate and multiplied with current potential loss to derive the derivative of the expected loss (red curves in Fig 2). Red dots on the prior derivative depict data points used for the linear fit. Red dots on the prior depict range of predicted approach latencies.

More »

Fig 5 Expand

Table 1.

Variables and symbols used in the model.

More »

Table 1 Expand