Moral hazard with discrete soft information
|
|
- Willis Shaw
- 5 years ago
- Views:
Transcription
1 Moral hazard with discrete soft information September 2012 Abstract I study a simple model of moral hazard with soft information. The risk-averse agent takes an action and she alone observes the stochastic outcome; hence the principal faces a problem of ex post adverse selection. With limited instruments, the principal cannot solve these two problems independently. To accommodate ex post information revelation, he must distort the transfer schedule, as compared to the standard moral hazard problem. This is socially costly. These results are robust and suggest highpower contracts may have to be revisited when information is soft. Keywords: moral hazard, asymmetric information, soft information, contract, mechanism, audit. JEL Classification: D82. 1 Introduction In standard moral hazard problems the outcome of the agent s action is observable by the principal and may therefore (imperfectly) substitute itself for the non-observability of said action. Then a complete contract may be conditioned on the outcome. This is a convenient model that is used in many applications, ranging from labor contracts to corporate finance. But it does not necessarily fit many relevant situations. Actual performance may not observed at all: for example, an accounting report is not a direct observation of the state of an enterprise, but a message. 1
2 This paper studies exactly this problem: neither the action, nor the outcome are observable by the principal. He then faces a problem of ex ante moral hazard and ex post adverse selection. The information is said to be soft in that it is subject to manipulation on the part of the agent. Bar for the role of soft information, the model mirrors that of a standard moral hazard framework. A risk-neutral principal delegates production to a risk-averse agent. The agent s action a governs the distribution of a stochastic outcome, which she alone observes. That information must therefore be elicited; that is, it must satisfy some ex post incentive constraints. 1 Because the principal otherwise observes nothing, the contract must include an audit and some penalty. Applications of this model are broad-ranging. For example, after hiring the CEO, a board often asks of him (her) to report his (her) results while on the job. A defense contractor may be asked to reveal its production cost after investing in an uncertain technology. Kedia and Philippon (2006) develop and test a model of earnings management (a euphemism for fraudulent accounting), and document how pervasive the practice is. This work is closely related to Mookherjee and Png (1989, now MP), who show that with enough instruments, the twin problem of moral hazard and ex post adverse selection can be treated separately. That separability allows for ex post truthful revelation without any consequence on the incentives used to solve the ex ante moral hazard problem. Then the moral hazard problem can be solved in standard fashion, yielding standard results. That model is technically flawless but three objections may be raised. First, the real world does not accord with the results of MP; agents do mislead their principal. For example, Howie Hubler, a headstrong trader at Morgan Stanley single-handedly lost the firm $9 Bn after covering up his trades, was terminated and yet paid out past boni. Thus a model that systematically predicts truthful revelation has limited applicability. Second, the schemes suggested by MP require a reward for ex post truthful revelation; these are not observed in practice. A third objection is that the a reward that is necessary to induce information revelation may be arbitrarily large; it turns the principal into a source of money regardless 1 Throughout I will refer to incentive constraints as those addressing the adverse selection problem and moral hazard constraint as that dealing with the hidden action problem. 2
3 of the value of the productive relationship with the agent. This paper departs from MP first by letting the principal use a single transfer to address both moral hazard and ex post adverse selection; there is no bonus for not lying, so the principal must do with fewer instruments. This induces non-separability of the problems, which is the source of distortions. Second, the audit is imperfect. The technology is closer to one of sampling, which is what real audits do (such as financial audits), and has been modeled by Bushman and Kanodia (1996) or Demski and Dye (1999). This simple model delivers some important insights. First, the option to misreport induces an implicit lower bound on transfers because of the bounded penalty. 2 Transfers worse than this penalty cannot be implemented (for the agent is better-off simply lying). Second, any information revelation requires the agent s compensation to be distorted as compared to the standard moral hazard model. This is necessary to simultaneously satisfy any of the ex post incentive constraints and the moral hazard constraint. The optimal compensation schedule is flatter than in the standard model. A steep transfer scheme is usually good to induce effort, but here it also generates incentives to misreport ex post. The distortions accommodate the conflict between ex post incentives for information revelation and ex ante effort incentives. These distortions leave the agent s participation constraint slack and thus generate an ex ante rent. Then effort is more costly to the principal, and is therefore implemented for a smaller set of parameters than in the standard problem. The third insight is that steep contracts (those paying well for good performance) require an accurate audit technology. That is, it is because the principal can detect misreporting ex post that he can offer a high-power contract. This runs contrary to the standard results of the costly state verification literature (such as MP), which finds that audit and incentives are substitutes. It also departs from the standard moral hazard literature, which shows that monitoring and incentives are substitutes. Here they act like strategic complements. The work closest to this is MP, who combine a Grossman-Hart (1983) model with an 2 Bounded (small) penalties fit the Howie Hubler example. In practice courts only enforce penalties that are deemed reasonable (see Doornik, 2006). 3
4 ex post revelation mechanism. The agent s message conditions a payment to the principal and the probability of audit; that audit is perfect. Rewards (potentially unbounded) for truthful revelation are offered in equilibrium. 3 Gromb and Martimort (2007) use the same sequence of events as here, however they study the incentives of expert(s) to search and report information about others (an exogenous project), not themselves. To overcome the adverse selection problem, their incentive contract must be made state dependent although the expert(s) do(es) not exert any influence on it. A project s success is publicly observable, hence fully contractible. Levitt and Snyder (1997) develop a contracting model in which the agent receives an early (soft) signal about the likely success of the project, however the eventual outcome is fully observed by the principal, hence contractible. Here, information can only be observed, and reported, by the agent. To emphasize the point, the agent has no ex ante private information, which only emerges ex post. Green and Laffont (1986) study the principal-agent problem with partially verifiable information in the sense that the agent s message is constrained to lie in a subset M(θ) of the type space Θ, which varies with the true state in a publicly known fashion. M( )-implementable mechanisms exist and need not elicit truth-telling. I discuss this some more in Section 5. The balance of the paper is organised as follows. After introducing the model I present the problem of information revelation. Section 4 then analyses the optimal contract and Section 5 presents a discussion. I conclude in Section 6. 2 Model A principal delegates a task to an agent. At cost ψ(a) 0 the agent undertakes an action a {a, a} where ψ(a) = ψ > ψ(a) = 0. This action yields a stochastic outcome θ Θ {θ 1, θ 2, θ 3 }; there must be at least three states for information manipulation to not be trivial. I make the substantive (and later discussed) assumption that θ 3 θ 2 = θ 2 θ 1 = θ > 0. Let π i Pr(θ i a = a) and π i Pr(θ i a = a) denote the probabilities of each outcome 3 Mookherjee and Png s model yields a quirky byproduct: the agent strictly prefers being audited. 4
5 conditional on the agent s action; I suppose that π i ( a) satisfies the MLRP (i.e. π i /π i increases in θ). The agent s net utility is given by u(t, a) v(t i ) ψ(a), where v( ) is an increasing, concave function with v(0) = 0. The agent alone observes the outcome θ and reports a message m Θ to the principal, whereupon she receives the transfer t i (m). The principal can commit to the contract and his net payoff reads S(t; θ) = θ i t i. If the true state θ were observable by the principal, this construct would be a moot point and would collapse to the textbook moral hazard problem. By the MLRP, inducing effort requires t 3 t 2 t 1 with at least one strict inequality. Therefore it is immediate that absent any other instruments, the agent pools her messages to θ 3 regardless of the state (the principal entirely lacks ex post observability). A necessary element of any non-trivial contract is to restore at least some ex post observability, which I do by introducing an ex post audit. The audit technology is exogenously given in this model, costless (and therefore always run), but imperfect. With some probability p(m θ), the agent s deception is uncovered and she receives zero. Accepting that the penalty must be bounded, choosing zero is immaterial; this is discussed further in Section 5. 4 The function p( ) maps into [0, 1]; it is taken to be symmetric and such that p(0) = 0. 5 It is easy to show that p( ) must be increasing to be useful, which I therefore impose. I also let p(2x) 2p(x) (weak convexity). With this, the agent has ex post expected utility U (1 p(m θ))v(t(m)), which she seeks to maximise by choice of the message m Θ. The timing is almost standard: 1. The principal offers a contract C = t(m), Θ, p( ) consisting of a transfer, a message space and an (exogenous) audit technology; 2. The agent accepts or rejects the contract. If accepting, she also chooses an action a; 3. Action a generates an outcome θ Θ observed only by the agent; 4 With unbounded penalties truthful revelation necessarily obtains, as with unbounded rewards; that is, separability is restored. 5 This capture the idea that the audit is a sampling process, as real financial audits are. See the discussion. 5
6 4. The agent report a message m Θ; 5. Audit occurs; 6. Transfers are implemented and payoffs are realised. The solution of this problem in a subgame perfect equilibrium of the game just described. 3 Information revelation There always exists a trivial contract, in which the low action is sought from the agent. The principal needs only set t i = 0 i to implement a = a; this also elicits truth-telling ex post. I am interested in equilibria where effort is implemented. Two cases of interest arise; in the first one, truthful revelation is elicited ex post. In the second case, the principal may not seek to satisfy the ex post incentive constraint because they may be too costly. After she has taken some action a (now sunk), the agent maximises U by choice of a message m. The analysis begins with this problem. 3.1 Truthful revelation A mechanism is truthful if and only is the following constraints are satisfied:- v(t 1 ) (1 p( θ))v(t 2 ) (3.1) v(t 1 ) (1 p(2 θ))v(t 3 ) (3.2) v(t 2 ) (1 p( θ))v(t 3 ) (3.3) v(t 2 ) (1 p( θ))v(t 1 ) (3.4) v(t 3 ) (1 p(2 θ))v(t 1 ) (3.5) v(t 3 ) (1 p( θ))v(t 2 ) (3.6) These constraints do not yield the standard implementability condition, as can be verified by adding them up pairwise. For example, add (3.1) and (3.4) to find 1 (1 p( θ)), which is 6
7 trivially true and uninformative as to the shape of the transfer function. The system (3.1)- (3.6) forms the basis of the first claim. Because t 3 t 2 t 1 and p( ) 0, only (3.1)-(3.3) are relevant. Lemma 1 There exist transfers t 3 t 2 t 1 such that constraints (3.1)-(3.6) hold. Whenever the local constraints (3.1) and (3.3) are satisfied, the global constraint (3.2) is necessarily slack. Whenever the global constraint (3.2) binds at least one of the local constraints fails. This existence result remains silent as to optimality and does not imply that transfers satisfying (3.1)-(3.6) solve the principal s problem. Truthful revelation needs not be optimal, in particular because it necessarily generates an ex ante rent for the agent. Indeed, t 3 > 0 is required to induce participation with any effort but by (3.2), t 1 > 0 as well (and so t 2 > 0 too by (3.1)). However from Holmström (1979) we know that some t i must be negative for the participation constraint to bind at zero, hence the rent. 3.2 No truthful revelation Because combining ex ante effort incentives and ex post truthful revelation is costly, the principal may choose an alternative: truthful revelation may purposefully not be sought, which may make him better off. In this equilibrium, transfers are such that at least one of the ex post incentive constraints is violated, as in the arbitrary example of Figure 1. 6 Even in such a case at least some of the incentive constraints (3.1) to (3.3) must hold. If all constraints were to fail, the agent would only report θ 3, whereupon the principal would pay some transfer t 3 with probability Π = π 3 + (1 p)π 2 + (1 p) 2 π 1 (if effort is exerted) and zero with the balance of probabilities. The insurance-incentive trade-off immediately tells us this cannot be optimal; some type separation is always desirable to the principal. 7 6 The principal has committed to the contract and has no further move in the game, so information updating is a moot point. In particular, there is no renegotiation in this model. 7 This contract resembles the one-step bonus but can be improved upon. To do so, simply increase t 2 so that (3.3) binds. The total expected payment becomes ( Π π 2 1 p( θ)) ) t 3 +π 2 t 2 < Π t 3 ; but this contract delivers a higher expected utility to the agent at the same cost to the principal. That is, it gives room to 7
8 v(t i ) v(t 3 ) v(t 2 ) v(t 1 ) θ 1 θ 2 θ 3 Θ Figure 1: Arbitrary example of (3.3) failing, θ 2 pools with θ 3 (red dot). One must also note that since some incentive constraint will fail (by design), the global constraint (3.2) can no longer be ignored. However it is still true that there cannot be an equilibrium in which only (3.2) is violated, because (3.1) and (3.3) imply (3.2). Conversely, if (3.1) and (3.3) fail, it does not imply that (3.2) does. At face value there are many combinations of failing constraints to consider; fortunately the next lemma considerably reduces the set of cases to investigate. To conduct this analysis it is necessary to introduce the moral hazard problem, for it interacts with the ex post adverse selection one. To be accepted by the agent and induce effort, a contract must satisfy:- π i v i ψ (3.7) i π i v i ψ (3.8) i These two inequalities are the usual moral hazard and participation constraints. With this, Lemma 2 The principal does not offer a contract in which the agent exerts effort and any of the incentive constraints the principal to decrease t 2 and increase t 3. 8
9 1. (3.1) and (3.2); or 2. (3.1) and (3.3); or 3. (3.2) and (3.3); or 4. only (3.3); are violated. Thus the only viable case when the principal s contract is such that it does not induce the agent to truthfully reveal her information ex post requires (3.1) to be violated. Further, Lemma 3 There is no equilibrium such that the moral hazard constraint (3.7) is satisfied, the participation constraint (3.8) binds, and only the incentive constraint (3.1) is violated Lemmata 1 and 3 together imply that in any equilibrium the agent receives an ex ante rent. 4 The optimal contract Let ϕ v 1 ( ) denote the inverse function of the agent s utility, and v i = v(t i ) for some t i. The goal of the next two subsections is to compute the cost of either contract. The principal seeks to solve Problem 1 s.t. (3.1)-(3.3) and (3.7), (3.8). max v i 0 π i [θ i ϕ(v i )] i 4.1 Cost of the contract Truthful revelation Following Lemma 1, only (3.1) and (3.3) may bind in a truth-telling equilibrium. It also tells us that µ = 0 for constraints (3.1)-(3.3) to be satisfied. The next two lemmata inform us more precisely as to how these constraints conflict with the moral hazard problem. 9
10 Lemma 4 Suppose µ, λ > 0 (as in the standard moral hazard problem), then at least two of (3.1)-(3.3) must be violated. Hence there cannot be an equilibrium in which the standard solution of the moral hazard problem also accommodates the ex post information revelation problem. Further, for the constraints (3.1)-(3.3) to hold, either (3.7) fails or (3.8) must be slack. More precisely, Lemma 5 Suppose µ > 0 and (3.1), (3.3) are satisfied, then the moral hazard constraint (3.7) is violated. That is, either there is no truthful revelation ex post (by Lemma 4), or no effort can be induced without affording the agent a rent (by Lemma 5). Therefore attention can be restricted to the set of utilities v i such that the participation constraint (3.8) is slack. Taking (3.1) and (3.3) binding, the transfers must satisfy v 1 = (1 p( θ))v 2 and v 2 = (1 p( θ))v 3. Define further Π = π 3 + (1 p)π 2 + (1 p) 2 π 1. With this in hand, Proposition 1 The lowest-cost truth-telling equilibrium in which the agent is induced to exert effort entails v T 3 = ψ Π Π determined by a binding moral hazard constraint (3.7), and v T 1, v T 2 > 0 determined by (3.1) and (3.3), both binding No truthful revelation Following Lemmata 2 and 3, Problem 1 becomes Problem 2 s.t. (3.2),(3.3) and max v i 0 π i θ i {π 3 ϕ(v 3 ) + [π 2 + π 1 (1 p( θ))] ϕ(v 2 )} i π 3 v 3 + [ π 2 + π 1 (1 p( θ))] v 2 ψ (4.1) π 3 v 3 + [π 2 + π 1 (1 p( θ))] v 2 > 0 (4.2) 10
11 where (4.2) is the relevant form of the participation constraint (3.8). The problem is modified to reflect the fact that θ 1 is never reported, but that θ 2 is in its place. Then we have Proposition 2 The least-cost non-truthful equilibrium in which the agent is induced to exert effort entails v NT 3 = ψ Π Π ; (1 p( θ))v 2 > v NT 1 > (1 p(2 θ))v 3 determined by a binding moral hazard constraint (4.1), and v NT 2 determined by the binding incentive constraint (3.3). Note that v 1 exists. Propositions 1 and 2 lead to an immediate, but important, Corollary. Corollary 1 The principal is indifferent between truthful revelation and not. The truth-telling contract is just as costly as the one that is not truth-telling. In this simple framework it also induces the same effort and therefore the same success probabilities π i. To see why, notice that because at least some incentive constraint(s) bind(s), the contract is linear in the states θ i. When the agent lies and Constraint (3.1) fails, she receives either 0 or a weighted average of v 2 and v 3, where v 2 is determined by the binding constraint. In this case the weight on v 2 is π 2 + (1 p( θ))π 1. Under truthful revelation, the agent never receives 0 but a weighted sum of v i. Here the weights are π 1 on v 1 and π 2 on v 2. But because v 1 = v 2 (1 p( θ)) by (3.1), the effective weight on v 2 is π 2 + (1 p( θ))π 1 as well. This is the cost of incentive compatibility: to obtain truthful revelation, the principal must offer the agent exactly the same utility as if she were lying. Combined with the assumption θ 3 θ 2 = θ 2 θ 1 it generates an expected payoff that is linear in the states θ i. This is quite a special case; Section 5 discusses this in some more details. 4.2 Properties of the contract Corollary 1 implies that attention can be restricted to a truth-telling contract, the properties of which I would like to explore. The optimality conditions of Problem 1 are useful to expose 11
12 the next claim. To do so, attach multipliers γ 1, γ 2 to constraints (3.1) and (3.3), and λ and µ to each of (3.7) and (3.8), respectively. ϕ (v 1 ) γ 1 π 1 = µ + λ π 1 π 1 (4.3) ϕ (v 2 ) γ 2 γ 1 (1 p) π 2 = µ + λ π 2 π 2 (4.4) ϕ (v 3 ) + γ 2(1 p) π 3 = µ + λ π 3 π 3 (4.5) The MLRP ensures these conditions are not vacuous; the next claim follows immediately. Proposition 3 The schedule is flatter (than under the standard moral hazard problem). v T 1 solving (4.3) is distorted upwards, while v T 3 solving (4.5) is distorted downwards. v 2 is ambiguous. This result owes to the fundamental tension between ex post incentive compatibility, best satisfied with constant transfers, and ex ante effort incentives, best addressed with a compensation conditioned on performance. The distortions tilt the schedule and are such that (3.1) and (3.3) are just binding. The contract is low(er)-powered to accommodate ex post information manipulation. This is shown in Figure 2. The next Corollary speaks to the social cost of ex post information manipulation. Corollary 2 The principal induces costly effort if and only if i π iθ i ψ Π Π Π > ψ i.e. the agent receives an ex ante rent U T = ψ Π Π Π > 0. the proof of which is obvious and therefore omitted. Consequently the high action is implemented for a narrower set of parameters than under the standard moral hazard problem, which is socially costly. The principal overinsures the agent as compared to the standard problem (e.g. Holmström, 1979). Altering any of the technology ψ or information structure π i (. a) produces the same effects as in the standard moral hazard model. Of more interest are comparative statics with respect to the audit technology. Corollary 3 1. U T p < 0 12
13 v(t i ) v(t s 3) v(t 3 ) v(t s 2) v(t 2 ) v(t 1 ) v(t s 1) θ 1 θ 2 θ 3 Θ Figure 2: Optimal transfers are distorted (black dots). 2. vt 3 p > 0 Improving the audit technology tilts back the compensation schedule toward a steeper slope: the agent s utility in the good state increases. But it also eases the incentive constraints (3.1)- (3.3). The net effect is a decrease the agent s expected rent. Proposition 3 and Corollary 3 together suggest that high-powered contracts are not appropriate when information is manipulable. Furthermore, the steepness of the contract (the power of the incentives) depends on the audit technology. More precisely, a high-powered contract requires an accurate audit technology, which may sometimes come at a cost (when auditing is costly, for example). This is because a steep contract generates incentives for ex post manipulation of information. 5 Discussion Other penalties This paper purposefully departs from optimal penalties (or rewards) because they allow for the separation of the ex ante and ex post problems (as in Mookherjee and Png (1989)). Suppose however that some other bounded penalty l < 0 could be imposed on the agent, 13
14 then the constraints (3.1)-(3.3) would read: for i = 1, 2; v i [1 p( θ)]v i+1 +p( θ)v( l) and v 1 [1 p(2 θ)]v 3 + p(2 θ)v( l). These are easier to satisfy than the current constraints, for v( l) < 0, but as long as l is not too large, the problem remains in essence the same. It can also be verified that the Maximum Punishment Principle (Baron and Besanko (1984)) holds in this model because the audit does not return false negatives. Therefore nothing is gained (there are strict losses) from conditioning the magnitude of the penalty on the offence. Cost of effort and separation That truthful revelation obtains in equilibrium owes to the assumption that θ 3 θ 2 = θ 2 θ 3 = θ. When at least one incentive constraint binds this construction necessarily implies that the contract is linear in the state. This is trivially true when Constraint (3.1) fails because then only two states may ever be reported (θ 2 or θ 3 ). Satisfying (3.1) requires a further linear equality to hold, at the same cost as the deviation. In a separate paper (Roger, 2012b) I show that truthful revelation is never possible for at least a subset of the type space (at the bottom of the space). There the ex post incentive constraints (such as (3.1)) can only bind in one state; they are otherwise slack or fail. This is because continuous spaces allow for arbitrarily small misreporting and do not impose the discrete jump from θ i to θ i+1. Therefore it may be optimal for the principal to tolerate a small deviation for some types because the cost of seeking truthful revelation exceeds that of lying. Then, unlike, in Section 4, providing the agent with effort incentives may come at different costs when she is truthful and not. In fact truthful revelation is not essential for the provision of effort incentives; rather type separation is, because pooling stifles effort (see Roger, 2012a). While misreporting increases the cost of these ex ante incentives, pooling is worse. Participation fees To avoid leaving any rent to the agent the principal could consider imposing an ex ante participation fee φ, so that µ > 0. Then a contract includes a tariff (φ, t). Because φ is sunk, 14
15 the incentive constraints (3.1)-(3.6) remain essentially the same (up to the levels of v i ). So although the rent may be extracted from the agent, the transfers t i still have to be distorted to satisfy information revelation. The same welfare losses ensue. Relation to M-implementability (Green and Laffont (1986)) These authors study the implementability of a social choice function when the agent may report a message from a set M(θ) Θ, where M( ) is exogenous and publicly known. There is scope for misreporting in that the mapping m( ) is a correspondence. Green and Laffont (1986) provide a necessary and sufficient condition called the nested range condition (NRC) for the agent to report her information truthfully. The NRC does not hold in this model, although it corresponds to a game of of unidirectional distortions with an ordered space (to use their words) example a(2) in Green and Laffont. Indeed, the NRC requires M(θ 3 ) = {θ 3 }, M(θ 2 ) = {θ 2, θ 3 }, M(θ 1 ) = {θ 1, θ 2, θ 3 }. In contrast, Constraints (3.2), (3.3) holding and (3.1) failing imply M(θ 3 ) = {θ 3 }, M(θ 2 ) = {θ 2 }, M(θ 1 ) = {θ 2 }, whence θ 3 / M(θ 1 ). This violates the definition of the NRC. Notice further that the sets M(θ i ) in this paper are endogenous, unlike in Green and Laffont (1986). 6 Conclusion When the principal to a contract fraught with moral hazard also fails to observe any of the outcomes, he faces adverse selection ex post. With limited instruments, eliciting this private information requires a distortion of the compensation structure; it induces a flatter transfer scheme. This is a low(er)-power contract than in the standard moral hazard problem. This distortion has a bearing on the ex ante effort incentives. It is socially costly in that the high action can be implemented in fewer instances than in the standard case. These results obtain because of the fundamental tension between effort provision and information revelation, which require different instruments. For practitioners these results suggest that high-power contracts are not adequate when the information they depend on can be manipulated. In 15
16 this model, inducing any information revelation ex post also generates an ex ante rent to the agent. Truthful revelation obtains in the equilibrium of this game, as it does in the Mookherjee and Png (1989), however for very different reason and with different consequences. It can only be obtained with a distortion of the transfers, and therefore of the effort decision. In a more general model, truthful revelation may not obtain. This more general model should allow for at least two important modifications: (i) richer and more flexible messages for the agent (i.e. relaxing θ = θ 2 θ 1 = θ 3 θ 2 ) and (ii) afford the principal to choose his audit technology. This problem is explored in a series of companion papers (Roger, 2012a, 2012b), which show that as long as instruments are limited, the insights of this paper remain. The option to misreport ex post induces ex ante distortions that are socially costly, and when information is manipulable ex post, a high-power contract must be accompanied with an accurate audit. 7 Appendix: Proofs Proof of Lemma 1: Suppose (3.1) and (3.3) are satisfied (either strictly or with some slack), then v(t 1 ) (1 p( θ)) 2 v(t 3 ). Since (1 p( θ)) 2 > 1 p(2 θ), Condition (3.2) is necessarily slack. To show existence, take (3.1) and (3.3) binding. Then we have v(t 3 ) > (1 p)v(t 3 ) = v(t 2 ) > (1 p) 2 v(t 3 ) = v 1. For the last statement, take (3.2) binding. Then v(t 1 ) = (1 p(2 θ))v(t 3 ) (1 p( θ))v(t 2 ) by (3.1) (or (1 p( θ))v(t 1 ) by (3.3)). Either way it follows that 1 p(2 θ))v(t 3 ) (1 p( θ)) 2 v(t 3 ) for both (3.1) and (3.3) to hold. This contradicts (1 p( θ)) 2 > 1 p(2 θ). Proof of Lemma 2: 1. In the first case the agent reports θ 3 when observing θ 1. So Problem 1 becomes Problem 3 max v i 0 π i θ i {π 2 ϕ(v 2 ) + [π 3 + π 1 (1 p(2 θ))] ϕ(v 3 )} i 16
17 s.t. (3.3) and π 2 (v 2 v 3 ) π 1 (1 p(2 θ))v 3 ψ (7.1) π 2 v 2 + [π 3 + π 1 (1 p(2 θ))] v 3 ψ (7.2) where π 1 < 0 necessarily by the MLRP and π 2 may be either positive or negative. 2. Similarly, in the second case v 1 again never materialises because the agent reports θ 2 if observing θ 1 and θ 3 if observing θ 2 (and θ 3 if observing θ 3 ). The moral hazard constraint (7.1) becomes π 1 (v 2 v 3 ) p( θ)( π 2 v 3 + π 1 v 2 ) ψ. (7.3) 3. In this instance (Case 3), v 2 is never reported: the agent always prefers θ 3 instead of reporting θ 2. Then the moral hazard constraint reads π 1 (v 1 v 3 ) π 2 p( )v 3 ψ. (7.4) 4. In case 4 both (3.2) and (3.3) fail; the moral hazard constraint rewrites v 3 [ π 1 p(2 θ) + π 2 p( θ)] ψ (7.5) 5. In Case 5 only constraint (3.1) fails; then the moral hazard constraint becomes π 3 v 3 + v 2 ( π 2 + π 1 (1 p( θ))) ψ. (7.6) Which of these instance arises in equilibrium is endogenous; it depends on the contract chosen by the principal, that is, on the cost of implementing effort. Those costs are characterised by the constraints (7.1)-(7.4), which can be used to rank them. Pairwise comparisons of these constraints show that Case 1 features the lowest cost, so that it represents the only contract that may be offered by the principal. Indeed, simple inspection of the inequality π 1 (v 1 v 3 ) π 2 p( )v 3 π 1 (v 2 v 3 ) p( θ)( π 2 v 3 + π 1 v 2 ) shows that it holds. Similarly, inspection of the first and last equations shows that Case 1 17
18 is more expensive than Case 4. Next re-arrange π 2 (v 2 v 3 ) π 1 (1 p(2 θ))v 3 (< ) π 1 (v 2 v 3 ) p( θ)( π 2 v 3 + π 1 v 2 ) into π 2 (v 2 (1 p( θ))v 3 ) (<) π 1 (v 3 v 2 (1 p( θ))) + π 1 v 3 p(2 θ). Notice that π 1 (v 1 v 2 (1 p( θ))) < 0 because incentive constraint (3.1) fails (by assumption), the RHS can be bounded below by π 1 (v 1 (1 p(2 θ))v 3 ), which is positive because constraint (3.2) also fails (by assumption). Hence Case 2 is more expensive than Case 1, and therefore will never be offered either. Last, comparing (7.5) to 7.1 and re-arranging yields π 1 v 3 (1 p(2 θ)) < π 1 v 2 (1 p( θ)) by simple inspection of the incentive constraints (3.1) and (3.2), for π 1 < 0. Transitivity completes the proof. Proof of Lemma 3: Suppose (3.1) fails but (3.2) and (3.3) hold. θ 1 is never reported to the principal and the relevant moral hazard constraint is given by (7.6). Take the corresponding participation constraint π 3 v 3 + v 2 (π 2 + π 1 (1 p( θ))) binding at 0 then (7.6) is necessarily violated. Proof of Lemma 4: µ, λ > 0 i π iv i = ψ = i π iv i i π iv i = 0. Since v 3 v 2 v 1 by MLRP and i π iv i = ψ > 0, we must have v 3 > 0 > v 1. Therefore (3.2) cannot hold. Further, since v 2 v 1, (3.1) must also be violated regardless of whether v 2 0 or v 2 < 0. Clearly in the later case (3.3) also fails to hold. Proof of Lemma 5: µ > 0 i π iv i = ψ and when (3.7) holds, i π iv i ψ+ i π iv i. But but by (3.1)-(3.3) and MLRP, i π iv i > 0. Then (3.7) implies π i v i ψ + π i v i i i ψ ψ + i i π i v i π i v i > 0 which is an obvious contradiction. So (3.7) must be violated. 18
19 Proof of Proposition 1: Take the moral hazard constraint (3.7) and the ex post incentive constraints (3.1) and (3.3) binding to obtain v 3 (as in the text). To show this must be the lowest-cost contract, observe that v 3 must also solve Since ϕ ( ) is increasing, if γ 2 = 0 then v 3 > ϕ (v 3 ) = λ π 3 π 3 γ 2(1 p) π 3 (7.7) ψ and v Π Π 2 > (1 p)v 3 > (1 p) ψ Π Π is slack). It then follows that v 1 (1 p)v 2 > (1 p) 2 v 3 > (1 p) 2 can be constructed for the case γ 1 = 0 by using (4.4) instead. ψ Π Π (for (3.3). A similar argument Proof of Proposition 2: From Constraint (3.3) binding v NT 2 = (1 p)v NT 3. When (3.1) fails but (3.2) holds, the agent reports θ 2 in state θ 1 and receives v 2 with probability 1 p. Combining these two statements gives v NT 3 and v 2 as in the text. Proof of Corollary 1: In either case the cost of the contract is given by a binding moral hazard constraint (3.7) (or (4.1). Then Πv 3 = ψ, so that ( ) ψ C T = Π ϕ Π ( ) ψ C NT = Π ϕ Π Proof of Proposition 3: In the standard problem (4.3)-(4.5) read ϕ (v 1 ) = µ + λ π 1 π 1 (7.8) ϕ (v 2 ) = µ + λ π 2 π 2 (7.9) ϕ (v 3 ) = µ + λ π 3 π 3 (7.10) Increase v i i by some arbitrarily small amount ε > 0, so that µ = 0 as well but the cost of the contract comes within ε of the optimum (for ϕ is continuous and its derivative is bounded). Sum (4.3)-(4.5) to find E Θ [ϕ (v i )] + (γ 1 + γ 2 )p = 0 19
20 for µ = 0, so that at least one of γ 1, γ 2 is strictly positive. From the Proof of Proposition 1 we know that both are. Then compare each of (7.8)-(7.10) to (4.3)-(4.5), recalling that ϕ( ) is increasing convex. References [1] Baron D. and David Besanko Regulation, Asymmetric Information, and Auditing. The RAND Journal of Economics, Vol. 15, No. 4, pp [2] Bushman, R. and Chandra Kanodia (1996) A Note on Strategic Sampling in Agencies. Management Science, Vol.42, pp [3] Demski, J. and Ronald Dye (1999) Risk, Returns and Moral Hazard Journal of Accounting Research, Vol. 37, No. 1, pp [4] Green, J. and Jean-Jacques Laffont (1986) Partially verifiable information and mechanism design. The Review of Economic Studies, Vol. LIII, pp [5] D. Gromb and David Martimort (2007), Collusion and the organization of delegated expertise Journal of Economic Theory, Vol. 137 (1), pp [6] Grossman, S. and Oliver Hart (1983), An Analysis of the Principal-Agent Problem Econometrica, vol. 51(1), pages [7] Holmström, B. (1979) Moral hazard and observability. The Bell Journal of Economics, Vol. 10, pp [8] Holmström, B. and Paul Milgrom (1987) Aggregation and Linearity in the Provision of Intertemporal incentives. Econometrica, Vol. 55, pp [9] Kanodia, C. (1985) Stochastic Monitoring and Moral Hazard. Journal of Accounting Research, Vol.23, pp
21 [10] Kedia, S. and Thomas Philippon (2006) The economics of fraudulent accounting, NYU working paper [11] Levitt, S. and Christopher Snyder (1997 ) Is no News Bad News? Information Transmission and the Role of Early Warning in the Principal-Agent Model. Rand Journal of Economics, Vol. 28 (4), pp [12] Mookherjee D. and Ivan Png (1989) Optimal Auditing, Insurance, and Redistribution. The Quarterly Journal of Economics, vol. 104(2), pp [13] Roger, G. (2012a) Moral Hazard under Soft Information. mimeo, The University of NSW [14] Roger, G. (2012b) Optimal Contract under Moral Hazard and Soft Information. mimeo, The University of NSW 21
EC476 Contracts and Organizations, Part III: Lecture 2
EC476 Contracts and Organizations, Part III: Lecture 2 Leonardo Felli 32L.G.06 19 January 2015 Moral Hazard: Consider the contractual relationship between two agents (a principal and an agent) The principal
More informationDeceptive Advertising with Rational Buyers
Deceptive Advertising with Rational Buyers September 6, 016 ONLINE APPENDIX In this Appendix we present in full additional results and extensions which are only mentioned in the paper. In the exposition
More informationEx ante moral hazard and ex post adverse selection with soft information
Ex ante moral hazard and ex post adverse selection with soft information Guillaume Roger The University of New South Wales PRELIMINARY AND INCOMPLETE January 2010 Abstract We reverse the standard sequence
More information1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts)
1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts) We extend our setup by allowing more than two types of agent. The agent s type is now β {β 1, β 2,..., β N }, where
More informationMicroeconomic Theory (501b) Problem Set 10. Auctions and Moral Hazard Suggested Solution: Tibor Heumann
Dirk Bergemann Department of Economics Yale University Microeconomic Theory (50b) Problem Set 0. Auctions and Moral Hazard Suggested Solution: Tibor Heumann 4/5/4 This problem set is due on Tuesday, 4//4..
More informationIntroduction. 1 University of Pennsylvania, Wharton Finance Department, Steinberg Hall-Dietrich Hall, 3620
May 16, 2006 Philip Bond 1 Are cheap talk and hard evidence both needed in the courtroom? Abstract: In a recent paper, Bull and Watson (2004) present a formal model of verifiability in which cheap messages
More informationEx ante moral hazard and ex post adverse selection with soft information
Ex ante moral hazard and ex post adverse selection with soft information Guillaume Roger The University of New South Wales PRELIMINARY AND INCOMPLETE January 15, 2010 Abstract We reverse the standard sequence
More informationMoral hazard with soft information
Moral hazard with soft information Guillaume Roger The University of New South Wales June 20, 2012 Abstract This paper studies moral hazard where he agent alone observes the stochastic outcome of her action,
More informationContracts in informed-principal problems with moral hazard
Contracts in informed-principal problems with moral hazard Nicholas C Bedard January 20, 2016 Abstract In many cases, an employer has private information about the potential productivity of a worker, who
More informationDefinitions and Proofs
Giving Advice vs. Making Decisions: Transparency, Information, and Delegation Online Appendix A Definitions and Proofs A. The Informational Environment The set of states of nature is denoted by = [, ],
More informationMoral Hazard: Part 1. April 9, 2018
Moral Hazard: Part 1 April 9, 2018 Introduction In a standard moral hazard problem, the agent A is characterized by only one type. As with adverse selection, the principal P wants to engage in an economic
More informationArm s Length Relationships without Moral Hazard
09- Research Group: Industrial Organization November 6, 2009 Arm s Length Relationships without Moral Hazard JACQUES CRÉMER Arm s length relationships without moral hazard Jacques Crémer Toulouse School
More informationContinuity in Mechanism Design without Transfers 1
Continuity in Mechanism Design without Transfers 1 David Martimort and Aggey Semenov 3 This Version: March 16, 006 Abstract: We adopt a mechanism design approach to model communication between a principal
More informationOnline Appendix for Dynamic Procurement under Uncertainty: Optimal Design and Implications for Incomplete Contracts
Online Appendix for Dynamic Procurement under Uncertainty: Optimal Design and Implications for Incomplete Contracts By Malin Arve and David Martimort I. Concavity and Implementability Conditions In this
More informationOptimal contract under adverse selection in a moral hazard model with a risk averse agent
Optimal contract under adverse selection in a moral hazard model with a risk averse agent Lionel Thomas CRESE Université de Franche-Comté, IUT Besanon Vesoul, 30 avenue de l Observatoire, BP1559, 25009
More informationRelying on Information Acquired by a Principal
Relying on Information Acquired by a Principal Aaron Finkle 2004 Abstract This paper analyzes situations in which a principal is able to privately gather information about a task after contracting with
More informationMechanism Design: Basic Concepts
Advanced Microeconomic Theory: Economics 521b Spring 2011 Juuso Välimäki Mechanism Design: Basic Concepts The setup is similar to that of a Bayesian game. The ingredients are: 1. Set of players, i {1,
More informationHidden information. Principal s payoff: π (e) w,
Hidden information Section 14.C. in MWG We still consider a setting with information asymmetries between the principal and agent. However, the effort is now perfectly observable. What is unobservable?
More informationCostly Expertise. Dino Gerardi and Leeat Yariv yz. Current Version: December, 2007
Costly Expertise Dino Gerardi and Leeat Yariv yz Current Version: December, 007 In many environments expertise is costly. Costs can manifest themselves in numerous ways, ranging from the time that is required
More informationOn the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation
MPRA Munich Personal RePEc Archive On the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation Ismail Saglam Ipek University 4 May 2016 Online at https://mpra.ub.uni-muenchen.de/71090/
More informationCombinatorial Agency of Threshold Functions
Combinatorial Agency of Threshold Functions Shaili Jain 1 and David C. Parkes 2 1 Yale University, New Haven, CT shaili.jain@yale.edu 2 Harvard University, Cambridge, MA parkes@eecs.harvard.edu Abstract.
More informationMinimum Wages and Excessive E ort Supply
Minimum Wages and Excessive E ort Supply Matthias Kräkel y Anja Schöttner z Abstract It is well-known that, in static models, minimum wages generate positive worker rents and, consequently, ine ciently
More informationA New Class of Non Existence Examples for the Moral Hazard Problem
A New Class of Non Existence Examples for the Moral Hazard Problem Sofia Moroni and Jeroen Swinkels April, 23 Abstract We provide a class of counter-examples to existence in a simple moral hazard problem
More informationGame Theory and Economics of Contracts Lecture 5 Static Single-agent Moral Hazard Model
Game Theory and Economics of Contracts Lecture 5 Static Single-agent Moral Hazard Model Yu (Larry) Chen School of Economics, Nanjing University Fall 2015 Principal-Agent Relationship Principal-agent relationship
More informationOptimal Incentive Contract with Costly and Flexible Monitoring
Optimal Incentive Contract with Costly and Flexible Monitoring Anqi Li 1 Ming Yang 2 1 Department of Economics, Washington University in St. Louis 2 Fuqua School of Business, Duke University May 2016 Motivation
More informationGovernment 2005: Formal Political Theory I
Government 2005: Formal Political Theory I Lecture 11 Instructor: Tommaso Nannicini Teaching Fellow: Jeremy Bowles Harvard University November 9, 2017 Overview * Today s lecture Dynamic games of incomplete
More informationSome Notes on Adverse Selection
Some Notes on Adverse Selection John Morgan Haas School of Business and Department of Economics University of California, Berkeley Overview This set of lecture notes covers a general model of adverse selection
More informationSupervision, Collusion, and Optimal Contract Design with Costly Information Acquisition
Supervision, Collusion, and Optimal Contract Design with Costly Information Acquisition XiaoGang Che Guanxi Yi PRELIMINARY and INCOMPLETE November 2014 Abstract In this paper, we study the impacts of costly
More informationCollusion, Delegation and Supervision with Soft Information
Collusion, Delegation and Supervision with Soft Information Antoine Faure-Grimaud Jean-Jacques Laffont and David Martimort Revised: February 4, 2003 Abstract This paper shows that supervision with soft
More informationBayesian Persuasion Online Appendix
Bayesian Persuasion Online Appendix Emir Kamenica and Matthew Gentzkow University of Chicago June 2010 1 Persuasion mechanisms In this paper we study a particular game where Sender chooses a signal π whose
More informationThis is designed for one 75-minute lecture using Games and Information. October 3, 2006
This is designed for one 75-minute lecture using Games and Information. October 3, 2006 1 7 Moral Hazard: Hidden Actions PRINCIPAL-AGENT MODELS The principal (or uninformed player) is the player who has
More informationMartin Gregor IES, Charles University. Abstract
On the strategic non-complementarity of complements Martin Gregor IES, Charles University Abstract This paper examines the equilibrium provision of a public good if the private monetary contributions of
More informationWhen to Ask for an Update: Timing in Strategic Communication
When to Ask for an Update: Timing in Strategic Communication Work in Progress Ying Chen Johns Hopkins University Atara Oliver Rice University March 19, 2018 Main idea In many communication situations,
More informationOrganizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan
Organizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan David Atkin, Azam Chaudhry, Shamyla Chaudry Amit K. Khandelwal and Eric Verhoogen Sept. 016 Appendix B: Theory
More informationGraduate Microeconomics II Lecture 5: Cheap Talk. Patrick Legros
Graduate Microeconomics II Lecture 5: Cheap Talk Patrick Legros 1 / 35 Outline Cheap talk 2 / 35 Outline Cheap talk Crawford-Sobel Welfare 3 / 35 Outline Cheap talk Crawford-Sobel Welfare Partially Verifiable
More informationMoral Hazard: Hidden Action
Moral Hazard: Hidden Action Part of these Notes were taken (almost literally) from Rasmusen, 2007 UIB Course 2013-14 (UIB) MH-Hidden Actions Course 2013-14 1 / 29 A Principal-agent Model. The Production
More informationEx Post Cheap Talk : Value of Information and Value of Signals
Ex Post Cheap Talk : Value of Information and Value of Signals Liping Tang Carnegie Mellon University, Pittsburgh PA 15213, USA Abstract. Crawford and Sobel s Cheap Talk model [1] describes an information
More informationDEPARTMENT OF ECONOMICS YALE UNIVERSITY P.O. Box New Haven, CT
DEPARTMENT OF ECONOMICS YALE UNIVERSITY P.O. Box 208268 New Haven, CT 06520-8268 http://www.econ.yale.edu/ Economics Department Working Paper No. 25 Cowles Foundation Discussion Paper No. 1619 Information
More informationMoral Hazard: Part 2. April 16, 2018
Moral Hazard: Part 2 April 16, 2018 The basic model: A is risk neutral We now turn to the problem of moral hazard (asymmetric information), where A is risk neutral. When A is risk neutral, u (t) is linear.
More informationTeoria das organizações e contratos
Teoria das organizações e contratos Chapter 6: Adverse Selection with two types Mestrado Profissional em Economia 3 o trimestre 2015 EESP (FGV) Teoria das organizações e contratos 3 o trimestre 2015 1
More informationWhen to Ask for an Update: Timing in Strategic Communication. National University of Singapore June 5, 2018
When to Ask for an Update: Timing in Strategic Communication Ying Chen Johns Hopkins University Atara Oliver Rice University National University of Singapore June 5, 2018 Main idea In many communication
More informationThe Impact of Organizer Market Structure on Participant Entry Behavior in a Multi-Tournament Environment
The Impact of Organizer Market Structure on Participant Entry Behavior in a Multi-Tournament Environment Timothy Mathews and Soiliou Daw Namoro Abstract. A model of two tournaments, each with a field of
More informationAppendix of Homophily in Peer Groups The Costly Information Case
Appendix of Homophily in Peer Groups The Costly Information Case Mariagiovanna Baccara Leeat Yariv August 19, 2012 1 Introduction In this Appendix we study the information sharing application analyzed
More informationNotes on Mechanism Designy
Notes on Mechanism Designy ECON 20B - Game Theory Guillermo Ordoñez UCLA February 0, 2006 Mechanism Design. Informal discussion. Mechanisms are particular types of games of incomplete (or asymmetric) information
More informationDynamic Common Agency
Dynamic Common Agency Dirk Bergemann Juuso Välimäki January 2001 Abstract A general model of dynamic common agency with symmetric information is considered. The set of truthful Markov perfect equilibrium
More informationGeneral idea. Firms can use competition between agents for. We mainly focus on incentives. 1 incentive and. 2 selection purposes 3 / 101
3 Tournaments 3.1 Motivation General idea Firms can use competition between agents for 1 incentive and 2 selection purposes We mainly focus on incentives 3 / 101 Main characteristics Agents fulll similar
More informationIntrinsic and Extrinsic Motivation
Intrinsic and Extrinsic Motivation Roland Bénabou Jean Tirole. Review of Economic Studies 2003 Bénabou and Tirole Intrinsic and Extrinsic Motivation 1 / 30 Motivation Should a child be rewarded for passing
More informationStatic Information Design
Static Information Design Dirk Bergemann and Stephen Morris Frontiers of Economic Theory & Computer Science, Becker-Friedman Institute, August 2016 Mechanism Design and Information Design Basic Mechanism
More informationOnline Appendix for Sourcing from Suppliers with Financial Constraints and Performance Risk
Online Appendix for Sourcing from Suppliers with Financial Constraints and Performance Ris Christopher S. Tang S. Alex Yang Jing Wu Appendix A: Proofs Proof of Lemma 1. In a centralized chain, the system
More informationA Theory of Financing Constraints and Firm Dynamics by Clementi and Hopenhayn - Quarterly Journal of Economics (2006)
A Theory of Financing Constraints and Firm Dynamics by Clementi and Hopenhayn - Quarterly Journal of Economics (2006) A Presentation for Corporate Finance 1 Graduate School of Economics December, 2009
More informationSome Notes on Moral Hazard
Some Notes on Moral Hazard John Morgan University of California at Berkeley Preliminaries Up until this point, we have been concerned mainly with the problem of private information on the part of the agent,
More informationStrongly rational expectations equilibria with endogenous acquisition of information
Strongly rational expectations equilibria with endogenous acquisition of information Gabriel Desgranges Maik Heinemann 9 February 004 This paper analyzes conditions for existence of a strongly rational
More informationThe Optimal Contract under Adverse Selection in a Moral-Hazard Model with a Risk-Averse Agent
Article The Optimal Contract under Adverse Selection in a Moral-Hazard Model with a Risk-Averse Agent François Maréchal and Lionel Thomas * CRESE EA3190, University Bourgogne Franche-Comté, F-25000 Besançon,
More informationMicroeconomics II Lecture 4: Incomplete Information Karl Wärneryd Stockholm School of Economics November 2016
Microeconomics II Lecture 4: Incomplete Information Karl Wärneryd Stockholm School of Economics November 2016 1 Modelling incomplete information So far, we have studied games in which information was complete,
More informationAn Example of Conflicts of Interest as Pandering Disincentives
An Example of Conflicts of Interest as Pandering Disincentives Saori Chiba and Kaiwen Leong Current draft: January 205 Abstract Consider an uninformed decision maker (DM) who communicates with a partially
More informationRegulation Under Asymmetric Information
Regulation Under Asymmetric Information Lecture 5: Course 608 Sugata Bag Delhi School of Economics February 2013 Sugata Bag (DSE) Regulation Under Asymmetric Information 08/02 1 / 50 Basic Concepts The
More informationCoordination and Cheap Talk in a Battle of the Sexes with Private Information
Department of Economics Coordination and Cheap Talk in a Battle of the Sexes with Private Information Department of Economics Discussion Paper 3-0 Chirantan Ganguly Indrajit Ray Coordination and Cheap
More informationInvestor s Increased Shareholding due to Entrepreneur Manager Collusion
Investor s Increased Shareholding due to Entrepreneur Manager Collusion Özgün Atasoy Sabancı University Mehmet Barlo Sabancı University August, 2007 Abstract This study presents an investor/entrepreneur
More informationOrganization, Careers and Incentives
Organization, Careers and Incentives Chapter 4 Robert Gary-Bobo March 2018 1 / 31 Introduction Introduction A firm is a pyramid of opportunities (Alfred P. Sloan). Promotions can be used to create incentives.
More information5. Relational Contracts and Career Concerns
5. Relational Contracts and Career Concerns Klaus M. Schmidt LMU Munich Contract Theory, Summer 2010 Klaus M. Schmidt (LMU Munich) 5. Relational Contracts and Career Concerns Contract Theory, Summer 2010
More informationThe Value of Symmetric Information in an Agency Model with Moral Hazard: The Ex Post Contracting Case
Faculty of Business and Law SCHOOL OF ACCOUNTING, ECONOMICS AND FINANCE School Working Paper - Economic Series 2006 SWP 2006/24 The Value of Symmetric Information in an Agency Model with Moral Hazard:
More informationNASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA
NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA MARIA GOLTSMAN Abstract. This note shows that, in separable environments, any monotonic social choice function
More informationModels of Wage Dynamics
Models of Wage Dynamics Toshihiko Mukoyama Department of Economics Concordia University and CIREQ mukoyama@alcor.concordia.ca December 13, 2005 1 Introduction This paper introduces four different models
More informationDecision, Risk and Operations Working Papers Series
Decision, Risk and Operations Working Papers Series The cost of moral hazard and limited liability in the principal-agent problem F. Balmaceda, S. R. Balseiro, J. R. Correa, N. E. Stier-Moses July 2010;
More informationDo Shareholders Vote Strategically? Voting Behavior, Proposal Screening, and Majority Rules. Supplement
Do Shareholders Vote Strategically? Voting Behavior, Proposal Screening, and Majority Rules Supplement Ernst Maug Kristian Rydqvist September 2008 1 Additional Results on the Theory of Strategic Voting
More informationPersuasion Under Costly Lying
Persuasion Under Costly Lying Teck Yong Tan Columbia University 1 / 43 Introduction Consider situations where agent designs learning environment (i.e. what additional information to generate) to persuade
More information"A Theory of Financing Constraints and Firm Dynamics"
1/21 "A Theory of Financing Constraints and Firm Dynamics" G.L. Clementi and H.A. Hopenhayn (QJE, 2006) Cesar E. Tamayo Econ612- Economics - Rutgers April 30, 2012 2/21 Program I Summary I Physical environment
More informationThe Design of Ambiguous Mechanisms
The Design of Ambiguous Mechanisms Alfredo Di Tillio Bocconi University Nenad Kos Bocconi University Matthias Messner Bocconi University and CESifo January 9, 2012 First version: April 2011 Abstract This
More informationWhat happens when there are many agents? Threre are two problems:
Moral Hazard in Teams What happens when there are many agents? Threre are two problems: i) If many agents produce a joint output x, how does one assign the output? There is a free rider problem here as
More informationIntroduction: Asymmetric Information and the Coase Theorem
BGPE Intensive Course: Contracts and Asymmetric Information Introduction: Asymmetric Information and the Coase Theorem Anke Kessler Anke Kessler p. 1/?? Introduction standard neoclassical economic theory
More informationInformed Principal in Private-Value Environments
Informed Principal in Private-Value Environments Tymofiy Mylovanov Thomas Tröger University of Bonn June 21, 2008 1/28 Motivation 2/28 Motivation In most applications of mechanism design, the proposer
More informationWe set up the basic model of two-sided, one-to-one matching
Econ 805 Advanced Micro Theory I Dan Quint Fall 2009 Lecture 18 To recap Tuesday: We set up the basic model of two-sided, one-to-one matching Two finite populations, call them Men and Women, who want to
More informationImpatience vs. Incentives
Impatience vs. Incentives Marcus Opp John Zhu University of California, Berkeley (Haas) & University of Pennsylvania, Wharton January 2015 Opp, Zhu (UC, Wharton) Impatience vs. Incentives January 2015
More informationA Rothschild-Stiglitz approach to Bayesian persuasion
A Rothschild-Stiglitz approach to Bayesian persuasion Matthew Gentzkow and Emir Kamenica Stanford University and University of Chicago December 2015 Abstract Rothschild and Stiglitz (1970) represent random
More informationThe Revenue Equivalence Theorem 1
John Nachbar Washington University May 2, 2017 The Revenue Equivalence Theorem 1 1 Introduction. The Revenue Equivalence Theorem gives conditions under which some very different auctions generate the same
More informationOn the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E.
Tilburg University On the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E. Publication date: 1997 Link to publication General rights Copyright and
More informationA Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations
A Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations Swaprava Nath a, Onno Zoeter b a Indian Institute of Science, Bangalore b Xerox Research Centre Europe, Meylan, France Abstract
More informationControlling versus enabling Online appendix
Controlling versus enabling Online appendix Andrei Hagiu and Julian Wright September, 017 Section 1 shows the sense in which Proposition 1 and in Section 4 of the main paper hold in a much more general
More informationPatience and Ultimatum in Bargaining
Patience and Ultimatum in Bargaining Björn Segendorff Department of Economics Stockholm School of Economics PO Box 6501 SE-113 83STOCKHOLM SWEDEN SSE/EFI Working Paper Series in Economics and Finance No
More information1. The General Linear-Quadratic Framework
ECO 37 Economics of Uncertainty Fall Term 009 Notes for lectures Incentives for Effort - Multi-Dimensional Cases Here we consider moral hazard problems in the principal-agent framewor, restricting the
More informationThe Design of a University System
The Design of a University System Gianni De Fraja University of Leicester, Università di Roma Tor Vergata and CEPR Paola Valbonesi Università di Padova Public Economics UK 27 May 2011 Abstract This paper
More informationInformation Acquisition in Interdependent Value Auctions
Information Acquisition in Interdependent Value Auctions Dirk Bergemann Xianwen Shi Juuso Välimäki July 16, 2008 Abstract We consider an auction environment with interdependent values. Each bidder can
More informationx ax 1 2 bx2 a bx =0 x = a b. Hence, a consumer s willingness-to-pay as a function of liters on sale, 1 2 a 2 2b, if l> a. (1)
Answers to Exam Economics 201b First Half 1. (a) Observe, first, that no consumer ever wishes to consume more than 3/2 liters (i.e., 1.5 liters). To see this, observe that, even if the beverage were free,
More informationMechanism Su cient Statistic. in the Risk-Neutral Agency Problem
Mechanism Su cient Statistic in the Risk-Neutral Agency Problem Dominique Demougin and Claude Fluet Otto-von-Guericke University, Magdeburg and Université du Québec à Montréal Final version, February 1998
More informationAdverse Selection in Competitive Search Equilibrium
Adverse Selection in Competitive Search Equilibrium Veronica Guerrieri University of Chicago Randall Wright University of Pennsylvania February 2, 2009 Robert Shimer University of Chicago Abstract We extend
More informationVolume 29, Issue 3. Strategic delegation and market competitiveness
Volume 29, Issue Strategic delegation and market competitiveness Caterina Colombo Università di Ferrara Alessandra Chirco Università del Salento Marcella Scrimitore Università del Salento Abstract Within
More informationIntroduction Persuasion Attribute Puffery Results Conclusion. Persuasive Puffery. Archishman Chakraborty and Rick Harbaugh
Persuasive Puffery Archishman Chakraborty and Rick Harbaugh 2012 Marketing Science Meetings Puffery Sellers tend to exaggerate World s best hotdogs! That suit looks perfect on you! Our service can t be
More informationOnline Appendix to Strategy-proof tie-breaking in matching with priorities
Online Appendix to Strategy-proof tie-breaking in matching with priorities Lars Ehlers Alexander Westkamp December 12, 2017 Section 1 contains the omitted proofs of Lemma 5, Lemma 6 and Lemma 7 Subsection
More informationDesign Patent Damages under Sequential Innovation
Design Patent Damages under Sequential Innovation Yongmin Chen and David Sappington University of Colorado and University of Florida February 2016 1 / 32 1. Introduction Patent policy: patent protection
More informationCommunication with Self-Interested Experts Part II: Models of Cheap Talk
Communication with Self-Interested Experts Part II: Models of Cheap Talk Margaret Meyer Nuffield College, Oxford 2013 Cheap Talk Models 1 / 27 Setting: Decision-maker (P) receives advice from an advisor
More informationA Principal-Agent Model of Sequential Testing
A Principal-Agent Model of Sequential Testing Dino Gerardi y Lucas Maestri z December 2008 Abstract This paper analyzes the optimal provision of incentives in a sequential testing context. In every period
More informationCredible Ratings. Ettore Damiano, Li, Hao University of Toronto. Wing Suen The University of Hong Kong. March 7, 2008
Credible Ratings Ettore Damiano, Li, Hao University of Toronto Wing Suen The University of Hong Kong March 7, 2008 Abstract: This paper considers a model of a rating agency with multiple clients, in which
More informationRobust Predictions in Games with Incomplete Information
Robust Predictions in Games with Incomplete Information joint with Stephen Morris (Princeton University) November 2010 Payoff Environment in games with incomplete information, the agents are uncertain
More informationEpsilon Ex Post Implementation
Epsilon Ex Post Implementation Mehmet Barlo Nuh Aygun Dalkiran February 10, 2014 Abstract We provide necessary and sufficient conditions for epsilon ex post implementation. Our analysis extends Bergemann
More informationCPS 173 Mechanism design. Vincent Conitzer
CPS 173 Mechanism design Vincent Conitzer conitzer@cs.duke.edu edu Mechanism design: setting The center has a set of outcomes O that she can choose from Allocations of tasks/resources, joint plans, Each
More informationData Abundance and Asset Price Informativeness. On-Line Appendix
Data Abundance and Asset Price Informativeness On-Line Appendix Jérôme Dugast Thierry Foucault August 30, 07 This note is the on-line appendix for Data Abundance and Asset Price Informativeness. It contains
More informationG5212: Game Theory. Mark Dean. Spring 2017
G5212: Game Theory Mark Dean Spring 2017 Adverse Selection We are now going to go back to the Adverse Selection framework Mechanism Design with 1 agent Though that agent may be of many types Note that
More informationArea I: Contract Theory Question (Econ 206)
Theory Field Exam Winter 2011 Instructions You must complete two of the three areas (the areas being (I) contract theory, (II) game theory, and (III) psychology & economics). Be sure to indicate clearly
More informationIndescribable Contingencies versus Unawareness and Incomplete Contracting
Indescribable Contingencies versus Unawareness and Incomplete Contracting Wenjun Ma Burkhard C. Schipper Job Market Paper November 4, 204 Abstract Maskin and Tirole (999) postulated that even though agents
More informationGame Theory, Information, Incentives
Game Theory, Information, Incentives Ronald Wendner Department of Economics Graz University, Austria Course # 320.501: Analytical Methods (part 6) The Moral Hazard Problem Moral hazard as a problem of
More information