Tracking the decoy: maximizing the decoy effect through sequential experimentation

Abstract

The decoy effect is one of the best known human biases violating rational choice theory. According to a large body of literature, people may be persuaded to switch from one offer to another by the presence of a third option (the decoy) that, rationally, should have no influence on the decision-making process. For example, when asked to choose between a laptop with a good battery but a poor memory and a laptop with a poor battery but a good memory, customers may be induced to shift their preference if the offer is accompanied by a third laptop that has a battery as good as the latter but even worse memory—an effect that has clear applications in marketing practice. Surprisingly, renowned decoy studies have resisted replication, inducing scholars to challenge the scientific validity of the phenomenon and question its practical relevance. Using a treatment allocation scheme that takes inspiration from the lock-in amplification schemes used in experimental physics, we were able to explore the entire range of decoy attribute values and demonstrate that some of the reproducibility issues reported in the literature result from a suboptimal initial conditions. Furthermore, we demonstrate that our approach is able to sequentially identify the features of the decoy that maximize choice reversal. We thus reinstate the scientific validity and practical relevance of the decoy effect and demonstrate the use of lock-in amplification to optimize treatments.

Author information

Correspondence to Maurits C Kaptein.

Rights and permissions

This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Further reading