Access

You are not currently logged in.

Access your personal account or get JSTOR access through your library or other institution:

login

Log in to your personal account or through your institution.

If You Use a Screen Reader

This content is available through Read Online (Free) program, which relies on page scans. Since scans are not currently available to screen readers, please contact JSTOR User Support for access. We'll provide a PDF copy for your screen reader.

Mathematical Models, Rational Choice, and the Search for Cold War Culture

Paul Erickson
Isis
Vol. 101, No. 2 (June 2010), pp. 386-392
DOI: 10.1086/653105
Stable URL: http://www.jstor.org/stable/10.1086/653105
Page Count: 7
  • Read Online (Free)
  • Download ($14.00)
  • Subscribe ($19.50)
  • Cite this Item
Since scans are not currently available to screen readers, please contact JSTOR User Support for access. We'll provide a PDF copy for your screen reader.
Mathematical Models, Rational Choice, and the Search for Cold War Culture
Preview not available

Abstract

ABSTRACT A key feature of the social, behavioral, and biological sciences after World War II has been the widespread adoption of new mathematical techniques drawn from cybernetics, information theory, and theories of rational choice. Historians of science have typically sought to explain this adoption either by reference to military patronage, or to a characteristic Cold War culture or discursive framework strongly shaped by the concerns of national security. This essay explores several episodes in the history of game theory—a mathematical theory of rational choice—that demonstrate the limits of such explanations. Military funding was indeed critical to game theory's early development in the 1940s. However, the theory's subsequent spread across disciplines ranging from political science to evolutionary biology was the result of a diverse collection of debates about the nature of “rationality” and “choice” that marked the Cold War era. These debates are not easily reduced to the national security imperatives that have been the focus of much historiography to date.

Page Thumbnails

  • Thumbnail: Page 
1
    1
  • Thumbnail: Page 
2
    2
  • Thumbnail: Page 
3
    3
  • Thumbnail: Page 
4
    4
  • Thumbnail: Page 
5
    5
  • Thumbnail: Page 
6
    6
  • Thumbnail: Page 
7
    7