Moral hazard with discrete soft information

Size: px
Start display at page:

Download "Moral hazard with discrete soft information"

Transcription

1 Moral hazard with discrete soft information September 2012 Abstract I study a simple model of moral hazard with soft information. The risk-averse agent takes an action and she alone observes the stochastic outcome; hence the principal faces a problem of ex post adverse selection. With limited instruments, the principal cannot solve these two problems independently. To accommodate ex post information revelation, he must distort the transfer schedule, as compared to the standard moral hazard problem. This is socially costly. These results are robust and suggest highpower contracts may have to be revisited when information is soft. Keywords: moral hazard, asymmetric information, soft information, contract, mechanism, audit. JEL Classification: D82. 1 Introduction In standard moral hazard problems the outcome of the agent s action is observable by the principal and may therefore (imperfectly) substitute itself for the non-observability of said action. Then a complete contract may be conditioned on the outcome. This is a convenient model that is used in many applications, ranging from labor contracts to corporate finance. But it does not necessarily fit many relevant situations. Actual performance may not observed at all: for example, an accounting report is not a direct observation of the state of an enterprise, but a message. 1

2 This paper studies exactly this problem: neither the action, nor the outcome are observable by the principal. He then faces a problem of ex ante moral hazard and ex post adverse selection. The information is said to be soft in that it is subject to manipulation on the part of the agent. Bar for the role of soft information, the model mirrors that of a standard moral hazard framework. A risk-neutral principal delegates production to a risk-averse agent. The agent s action a governs the distribution of a stochastic outcome, which she alone observes. That information must therefore be elicited; that is, it must satisfy some ex post incentive constraints. 1 Because the principal otherwise observes nothing, the contract must include an audit and some penalty. Applications of this model are broad-ranging. For example, after hiring the CEO, a board often asks of him (her) to report his (her) results while on the job. A defense contractor may be asked to reveal its production cost after investing in an uncertain technology. Kedia and Philippon (2006) develop and test a model of earnings management (a euphemism for fraudulent accounting), and document how pervasive the practice is. This work is closely related to Mookherjee and Png (1989, now MP), who show that with enough instruments, the twin problem of moral hazard and ex post adverse selection can be treated separately. That separability allows for ex post truthful revelation without any consequence on the incentives used to solve the ex ante moral hazard problem. Then the moral hazard problem can be solved in standard fashion, yielding standard results. That model is technically flawless but three objections may be raised. First, the real world does not accord with the results of MP; agents do mislead their principal. For example, Howie Hubler, a headstrong trader at Morgan Stanley single-handedly lost the firm $9 Bn after covering up his trades, was terminated and yet paid out past boni. Thus a model that systematically predicts truthful revelation has limited applicability. Second, the schemes suggested by MP require a reward for ex post truthful revelation; these are not observed in practice. A third objection is that the a reward that is necessary to induce information revelation may be arbitrarily large; it turns the principal into a source of money regardless 1 Throughout I will refer to incentive constraints as those addressing the adverse selection problem and moral hazard constraint as that dealing with the hidden action problem. 2

3 of the value of the productive relationship with the agent. This paper departs from MP first by letting the principal use a single transfer to address both moral hazard and ex post adverse selection; there is no bonus for not lying, so the principal must do with fewer instruments. This induces non-separability of the problems, which is the source of distortions. Second, the audit is imperfect. The technology is closer to one of sampling, which is what real audits do (such as financial audits), and has been modeled by Bushman and Kanodia (1996) or Demski and Dye (1999). This simple model delivers some important insights. First, the option to misreport induces an implicit lower bound on transfers because of the bounded penalty. 2 Transfers worse than this penalty cannot be implemented (for the agent is better-off simply lying). Second, any information revelation requires the agent s compensation to be distorted as compared to the standard moral hazard model. This is necessary to simultaneously satisfy any of the ex post incentive constraints and the moral hazard constraint. The optimal compensation schedule is flatter than in the standard model. A steep transfer scheme is usually good to induce effort, but here it also generates incentives to misreport ex post. The distortions accommodate the conflict between ex post incentives for information revelation and ex ante effort incentives. These distortions leave the agent s participation constraint slack and thus generate an ex ante rent. Then effort is more costly to the principal, and is therefore implemented for a smaller set of parameters than in the standard problem. The third insight is that steep contracts (those paying well for good performance) require an accurate audit technology. That is, it is because the principal can detect misreporting ex post that he can offer a high-power contract. This runs contrary to the standard results of the costly state verification literature (such as MP), which finds that audit and incentives are substitutes. It also departs from the standard moral hazard literature, which shows that monitoring and incentives are substitutes. Here they act like strategic complements. The work closest to this is MP, who combine a Grossman-Hart (1983) model with an 2 Bounded (small) penalties fit the Howie Hubler example. In practice courts only enforce penalties that are deemed reasonable (see Doornik, 2006). 3

4 ex post revelation mechanism. The agent s message conditions a payment to the principal and the probability of audit; that audit is perfect. Rewards (potentially unbounded) for truthful revelation are offered in equilibrium. 3 Gromb and Martimort (2007) use the same sequence of events as here, however they study the incentives of expert(s) to search and report information about others (an exogenous project), not themselves. To overcome the adverse selection problem, their incentive contract must be made state dependent although the expert(s) do(es) not exert any influence on it. A project s success is publicly observable, hence fully contractible. Levitt and Snyder (1997) develop a contracting model in which the agent receives an early (soft) signal about the likely success of the project, however the eventual outcome is fully observed by the principal, hence contractible. Here, information can only be observed, and reported, by the agent. To emphasize the point, the agent has no ex ante private information, which only emerges ex post. Green and Laffont (1986) study the principal-agent problem with partially verifiable information in the sense that the agent s message is constrained to lie in a subset M(θ) of the type space Θ, which varies with the true state in a publicly known fashion. M( )-implementable mechanisms exist and need not elicit truth-telling. I discuss this some more in Section 5. The balance of the paper is organised as follows. After introducing the model I present the problem of information revelation. Section 4 then analyses the optimal contract and Section 5 presents a discussion. I conclude in Section 6. 2 Model A principal delegates a task to an agent. At cost ψ(a) 0 the agent undertakes an action a {a, a} where ψ(a) = ψ > ψ(a) = 0. This action yields a stochastic outcome θ Θ {θ 1, θ 2, θ 3 }; there must be at least three states for information manipulation to not be trivial. I make the substantive (and later discussed) assumption that θ 3 θ 2 = θ 2 θ 1 = θ > 0. Let π i Pr(θ i a = a) and π i Pr(θ i a = a) denote the probabilities of each outcome 3 Mookherjee and Png s model yields a quirky byproduct: the agent strictly prefers being audited. 4

5 conditional on the agent s action; I suppose that π i ( a) satisfies the MLRP (i.e. π i /π i increases in θ). The agent s net utility is given by u(t, a) v(t i ) ψ(a), where v( ) is an increasing, concave function with v(0) = 0. The agent alone observes the outcome θ and reports a message m Θ to the principal, whereupon she receives the transfer t i (m). The principal can commit to the contract and his net payoff reads S(t; θ) = θ i t i. If the true state θ were observable by the principal, this construct would be a moot point and would collapse to the textbook moral hazard problem. By the MLRP, inducing effort requires t 3 t 2 t 1 with at least one strict inequality. Therefore it is immediate that absent any other instruments, the agent pools her messages to θ 3 regardless of the state (the principal entirely lacks ex post observability). A necessary element of any non-trivial contract is to restore at least some ex post observability, which I do by introducing an ex post audit. The audit technology is exogenously given in this model, costless (and therefore always run), but imperfect. With some probability p(m θ), the agent s deception is uncovered and she receives zero. Accepting that the penalty must be bounded, choosing zero is immaterial; this is discussed further in Section 5. 4 The function p( ) maps into [0, 1]; it is taken to be symmetric and such that p(0) = 0. 5 It is easy to show that p( ) must be increasing to be useful, which I therefore impose. I also let p(2x) 2p(x) (weak convexity). With this, the agent has ex post expected utility U (1 p(m θ))v(t(m)), which she seeks to maximise by choice of the message m Θ. The timing is almost standard: 1. The principal offers a contract C = t(m), Θ, p( ) consisting of a transfer, a message space and an (exogenous) audit technology; 2. The agent accepts or rejects the contract. If accepting, she also chooses an action a; 3. Action a generates an outcome θ Θ observed only by the agent; 4 With unbounded penalties truthful revelation necessarily obtains, as with unbounded rewards; that is, separability is restored. 5 This capture the idea that the audit is a sampling process, as real financial audits are. See the discussion. 5

6 4. The agent report a message m Θ; 5. Audit occurs; 6. Transfers are implemented and payoffs are realised. The solution of this problem in a subgame perfect equilibrium of the game just described. 3 Information revelation There always exists a trivial contract, in which the low action is sought from the agent. The principal needs only set t i = 0 i to implement a = a; this also elicits truth-telling ex post. I am interested in equilibria where effort is implemented. Two cases of interest arise; in the first one, truthful revelation is elicited ex post. In the second case, the principal may not seek to satisfy the ex post incentive constraint because they may be too costly. After she has taken some action a (now sunk), the agent maximises U by choice of a message m. The analysis begins with this problem. 3.1 Truthful revelation A mechanism is truthful if and only is the following constraints are satisfied:- v(t 1 ) (1 p( θ))v(t 2 ) (3.1) v(t 1 ) (1 p(2 θ))v(t 3 ) (3.2) v(t 2 ) (1 p( θ))v(t 3 ) (3.3) v(t 2 ) (1 p( θ))v(t 1 ) (3.4) v(t 3 ) (1 p(2 θ))v(t 1 ) (3.5) v(t 3 ) (1 p( θ))v(t 2 ) (3.6) These constraints do not yield the standard implementability condition, as can be verified by adding them up pairwise. For example, add (3.1) and (3.4) to find 1 (1 p( θ)), which is 6

7 trivially true and uninformative as to the shape of the transfer function. The system (3.1)- (3.6) forms the basis of the first claim. Because t 3 t 2 t 1 and p( ) 0, only (3.1)-(3.3) are relevant. Lemma 1 There exist transfers t 3 t 2 t 1 such that constraints (3.1)-(3.6) hold. Whenever the local constraints (3.1) and (3.3) are satisfied, the global constraint (3.2) is necessarily slack. Whenever the global constraint (3.2) binds at least one of the local constraints fails. This existence result remains silent as to optimality and does not imply that transfers satisfying (3.1)-(3.6) solve the principal s problem. Truthful revelation needs not be optimal, in particular because it necessarily generates an ex ante rent for the agent. Indeed, t 3 > 0 is required to induce participation with any effort but by (3.2), t 1 > 0 as well (and so t 2 > 0 too by (3.1)). However from Holmström (1979) we know that some t i must be negative for the participation constraint to bind at zero, hence the rent. 3.2 No truthful revelation Because combining ex ante effort incentives and ex post truthful revelation is costly, the principal may choose an alternative: truthful revelation may purposefully not be sought, which may make him better off. In this equilibrium, transfers are such that at least one of the ex post incentive constraints is violated, as in the arbitrary example of Figure 1. 6 Even in such a case at least some of the incentive constraints (3.1) to (3.3) must hold. If all constraints were to fail, the agent would only report θ 3, whereupon the principal would pay some transfer t 3 with probability Π = π 3 + (1 p)π 2 + (1 p) 2 π 1 (if effort is exerted) and zero with the balance of probabilities. The insurance-incentive trade-off immediately tells us this cannot be optimal; some type separation is always desirable to the principal. 7 6 The principal has committed to the contract and has no further move in the game, so information updating is a moot point. In particular, there is no renegotiation in this model. 7 This contract resembles the one-step bonus but can be improved upon. To do so, simply increase t 2 so that (3.3) binds. The total expected payment becomes ( Π π 2 1 p( θ)) ) t 3 +π 2 t 2 < Π t 3 ; but this contract delivers a higher expected utility to the agent at the same cost to the principal. That is, it gives room to 7

8 v(t i ) v(t 3 ) v(t 2 ) v(t 1 ) θ 1 θ 2 θ 3 Θ Figure 1: Arbitrary example of (3.3) failing, θ 2 pools with θ 3 (red dot). One must also note that since some incentive constraint will fail (by design), the global constraint (3.2) can no longer be ignored. However it is still true that there cannot be an equilibrium in which only (3.2) is violated, because (3.1) and (3.3) imply (3.2). Conversely, if (3.1) and (3.3) fail, it does not imply that (3.2) does. At face value there are many combinations of failing constraints to consider; fortunately the next lemma considerably reduces the set of cases to investigate. To conduct this analysis it is necessary to introduce the moral hazard problem, for it interacts with the ex post adverse selection one. To be accepted by the agent and induce effort, a contract must satisfy:- π i v i ψ (3.7) i π i v i ψ (3.8) i These two inequalities are the usual moral hazard and participation constraints. With this, Lemma 2 The principal does not offer a contract in which the agent exerts effort and any of the incentive constraints the principal to decrease t 2 and increase t 3. 8

9 1. (3.1) and (3.2); or 2. (3.1) and (3.3); or 3. (3.2) and (3.3); or 4. only (3.3); are violated. Thus the only viable case when the principal s contract is such that it does not induce the agent to truthfully reveal her information ex post requires (3.1) to be violated. Further, Lemma 3 There is no equilibrium such that the moral hazard constraint (3.7) is satisfied, the participation constraint (3.8) binds, and only the incentive constraint (3.1) is violated Lemmata 1 and 3 together imply that in any equilibrium the agent receives an ex ante rent. 4 The optimal contract Let ϕ v 1 ( ) denote the inverse function of the agent s utility, and v i = v(t i ) for some t i. The goal of the next two subsections is to compute the cost of either contract. The principal seeks to solve Problem 1 s.t. (3.1)-(3.3) and (3.7), (3.8). max v i 0 π i [θ i ϕ(v i )] i 4.1 Cost of the contract Truthful revelation Following Lemma 1, only (3.1) and (3.3) may bind in a truth-telling equilibrium. It also tells us that µ = 0 for constraints (3.1)-(3.3) to be satisfied. The next two lemmata inform us more precisely as to how these constraints conflict with the moral hazard problem. 9

10 Lemma 4 Suppose µ, λ > 0 (as in the standard moral hazard problem), then at least two of (3.1)-(3.3) must be violated. Hence there cannot be an equilibrium in which the standard solution of the moral hazard problem also accommodates the ex post information revelation problem. Further, for the constraints (3.1)-(3.3) to hold, either (3.7) fails or (3.8) must be slack. More precisely, Lemma 5 Suppose µ > 0 and (3.1), (3.3) are satisfied, then the moral hazard constraint (3.7) is violated. That is, either there is no truthful revelation ex post (by Lemma 4), or no effort can be induced without affording the agent a rent (by Lemma 5). Therefore attention can be restricted to the set of utilities v i such that the participation constraint (3.8) is slack. Taking (3.1) and (3.3) binding, the transfers must satisfy v 1 = (1 p( θ))v 2 and v 2 = (1 p( θ))v 3. Define further Π = π 3 + (1 p)π 2 + (1 p) 2 π 1. With this in hand, Proposition 1 The lowest-cost truth-telling equilibrium in which the agent is induced to exert effort entails v T 3 = ψ Π Π determined by a binding moral hazard constraint (3.7), and v T 1, v T 2 > 0 determined by (3.1) and (3.3), both binding No truthful revelation Following Lemmata 2 and 3, Problem 1 becomes Problem 2 s.t. (3.2),(3.3) and max v i 0 π i θ i {π 3 ϕ(v 3 ) + [π 2 + π 1 (1 p( θ))] ϕ(v 2 )} i π 3 v 3 + [ π 2 + π 1 (1 p( θ))] v 2 ψ (4.1) π 3 v 3 + [π 2 + π 1 (1 p( θ))] v 2 > 0 (4.2) 10

11 where (4.2) is the relevant form of the participation constraint (3.8). The problem is modified to reflect the fact that θ 1 is never reported, but that θ 2 is in its place. Then we have Proposition 2 The least-cost non-truthful equilibrium in which the agent is induced to exert effort entails v NT 3 = ψ Π Π ; (1 p( θ))v 2 > v NT 1 > (1 p(2 θ))v 3 determined by a binding moral hazard constraint (4.1), and v NT 2 determined by the binding incentive constraint (3.3). Note that v 1 exists. Propositions 1 and 2 lead to an immediate, but important, Corollary. Corollary 1 The principal is indifferent between truthful revelation and not. The truth-telling contract is just as costly as the one that is not truth-telling. In this simple framework it also induces the same effort and therefore the same success probabilities π i. To see why, notice that because at least some incentive constraint(s) bind(s), the contract is linear in the states θ i. When the agent lies and Constraint (3.1) fails, she receives either 0 or a weighted average of v 2 and v 3, where v 2 is determined by the binding constraint. In this case the weight on v 2 is π 2 + (1 p( θ))π 1. Under truthful revelation, the agent never receives 0 but a weighted sum of v i. Here the weights are π 1 on v 1 and π 2 on v 2. But because v 1 = v 2 (1 p( θ)) by (3.1), the effective weight on v 2 is π 2 + (1 p( θ))π 1 as well. This is the cost of incentive compatibility: to obtain truthful revelation, the principal must offer the agent exactly the same utility as if she were lying. Combined with the assumption θ 3 θ 2 = θ 2 θ 1 it generates an expected payoff that is linear in the states θ i. This is quite a special case; Section 5 discusses this in some more details. 4.2 Properties of the contract Corollary 1 implies that attention can be restricted to a truth-telling contract, the properties of which I would like to explore. The optimality conditions of Problem 1 are useful to expose 11

12 the next claim. To do so, attach multipliers γ 1, γ 2 to constraints (3.1) and (3.3), and λ and µ to each of (3.7) and (3.8), respectively. ϕ (v 1 ) γ 1 π 1 = µ + λ π 1 π 1 (4.3) ϕ (v 2 ) γ 2 γ 1 (1 p) π 2 = µ + λ π 2 π 2 (4.4) ϕ (v 3 ) + γ 2(1 p) π 3 = µ + λ π 3 π 3 (4.5) The MLRP ensures these conditions are not vacuous; the next claim follows immediately. Proposition 3 The schedule is flatter (than under the standard moral hazard problem). v T 1 solving (4.3) is distorted upwards, while v T 3 solving (4.5) is distorted downwards. v 2 is ambiguous. This result owes to the fundamental tension between ex post incentive compatibility, best satisfied with constant transfers, and ex ante effort incentives, best addressed with a compensation conditioned on performance. The distortions tilt the schedule and are such that (3.1) and (3.3) are just binding. The contract is low(er)-powered to accommodate ex post information manipulation. This is shown in Figure 2. The next Corollary speaks to the social cost of ex post information manipulation. Corollary 2 The principal induces costly effort if and only if i π iθ i ψ Π Π Π > ψ i.e. the agent receives an ex ante rent U T = ψ Π Π Π > 0. the proof of which is obvious and therefore omitted. Consequently the high action is implemented for a narrower set of parameters than under the standard moral hazard problem, which is socially costly. The principal overinsures the agent as compared to the standard problem (e.g. Holmström, 1979). Altering any of the technology ψ or information structure π i (. a) produces the same effects as in the standard moral hazard model. Of more interest are comparative statics with respect to the audit technology. Corollary 3 1. U T p < 0 12

13 v(t i ) v(t s 3) v(t 3 ) v(t s 2) v(t 2 ) v(t 1 ) v(t s 1) θ 1 θ 2 θ 3 Θ Figure 2: Optimal transfers are distorted (black dots). 2. vt 3 p > 0 Improving the audit technology tilts back the compensation schedule toward a steeper slope: the agent s utility in the good state increases. But it also eases the incentive constraints (3.1)- (3.3). The net effect is a decrease the agent s expected rent. Proposition 3 and Corollary 3 together suggest that high-powered contracts are not appropriate when information is manipulable. Furthermore, the steepness of the contract (the power of the incentives) depends on the audit technology. More precisely, a high-powered contract requires an accurate audit technology, which may sometimes come at a cost (when auditing is costly, for example). This is because a steep contract generates incentives for ex post manipulation of information. 5 Discussion Other penalties This paper purposefully departs from optimal penalties (or rewards) because they allow for the separation of the ex ante and ex post problems (as in Mookherjee and Png (1989)). Suppose however that some other bounded penalty l < 0 could be imposed on the agent, 13

14 then the constraints (3.1)-(3.3) would read: for i = 1, 2; v i [1 p( θ)]v i+1 +p( θ)v( l) and v 1 [1 p(2 θ)]v 3 + p(2 θ)v( l). These are easier to satisfy than the current constraints, for v( l) < 0, but as long as l is not too large, the problem remains in essence the same. It can also be verified that the Maximum Punishment Principle (Baron and Besanko (1984)) holds in this model because the audit does not return false negatives. Therefore nothing is gained (there are strict losses) from conditioning the magnitude of the penalty on the offence. Cost of effort and separation That truthful revelation obtains in equilibrium owes to the assumption that θ 3 θ 2 = θ 2 θ 3 = θ. When at least one incentive constraint binds this construction necessarily implies that the contract is linear in the state. This is trivially true when Constraint (3.1) fails because then only two states may ever be reported (θ 2 or θ 3 ). Satisfying (3.1) requires a further linear equality to hold, at the same cost as the deviation. In a separate paper (Roger, 2012b) I show that truthful revelation is never possible for at least a subset of the type space (at the bottom of the space). There the ex post incentive constraints (such as (3.1)) can only bind in one state; they are otherwise slack or fail. This is because continuous spaces allow for arbitrarily small misreporting and do not impose the discrete jump from θ i to θ i+1. Therefore it may be optimal for the principal to tolerate a small deviation for some types because the cost of seeking truthful revelation exceeds that of lying. Then, unlike, in Section 4, providing the agent with effort incentives may come at different costs when she is truthful and not. In fact truthful revelation is not essential for the provision of effort incentives; rather type separation is, because pooling stifles effort (see Roger, 2012a). While misreporting increases the cost of these ex ante incentives, pooling is worse. Participation fees To avoid leaving any rent to the agent the principal could consider imposing an ex ante participation fee φ, so that µ > 0. Then a contract includes a tariff (φ, t). Because φ is sunk, 14

15 the incentive constraints (3.1)-(3.6) remain essentially the same (up to the levels of v i ). So although the rent may be extracted from the agent, the transfers t i still have to be distorted to satisfy information revelation. The same welfare losses ensue. Relation to M-implementability (Green and Laffont (1986)) These authors study the implementability of a social choice function when the agent may report a message from a set M(θ) Θ, where M( ) is exogenous and publicly known. There is scope for misreporting in that the mapping m( ) is a correspondence. Green and Laffont (1986) provide a necessary and sufficient condition called the nested range condition (NRC) for the agent to report her information truthfully. The NRC does not hold in this model, although it corresponds to a game of of unidirectional distortions with an ordered space (to use their words) example a(2) in Green and Laffont. Indeed, the NRC requires M(θ 3 ) = {θ 3 }, M(θ 2 ) = {θ 2, θ 3 }, M(θ 1 ) = {θ 1, θ 2, θ 3 }. In contrast, Constraints (3.2), (3.3) holding and (3.1) failing imply M(θ 3 ) = {θ 3 }, M(θ 2 ) = {θ 2 }, M(θ 1 ) = {θ 2 }, whence θ 3 / M(θ 1 ). This violates the definition of the NRC. Notice further that the sets M(θ i ) in this paper are endogenous, unlike in Green and Laffont (1986). 6 Conclusion When the principal to a contract fraught with moral hazard also fails to observe any of the outcomes, he faces adverse selection ex post. With limited instruments, eliciting this private information requires a distortion of the compensation structure; it induces a flatter transfer scheme. This is a low(er)-power contract than in the standard moral hazard problem. This distortion has a bearing on the ex ante effort incentives. It is socially costly in that the high action can be implemented in fewer instances than in the standard case. These results obtain because of the fundamental tension between effort provision and information revelation, which require different instruments. For practitioners these results suggest that high-power contracts are not adequate when the information they depend on can be manipulated. In 15

16 this model, inducing any information revelation ex post also generates an ex ante rent to the agent. Truthful revelation obtains in the equilibrium of this game, as it does in the Mookherjee and Png (1989), however for very different reason and with different consequences. It can only be obtained with a distortion of the transfers, and therefore of the effort decision. In a more general model, truthful revelation may not obtain. This more general model should allow for at least two important modifications: (i) richer and more flexible messages for the agent (i.e. relaxing θ = θ 2 θ 1 = θ 3 θ 2 ) and (ii) afford the principal to choose his audit technology. This problem is explored in a series of companion papers (Roger, 2012a, 2012b), which show that as long as instruments are limited, the insights of this paper remain. The option to misreport ex post induces ex ante distortions that are socially costly, and when information is manipulable ex post, a high-power contract must be accompanied with an accurate audit. 7 Appendix: Proofs Proof of Lemma 1: Suppose (3.1) and (3.3) are satisfied (either strictly or with some slack), then v(t 1 ) (1 p( θ)) 2 v(t 3 ). Since (1 p( θ)) 2 > 1 p(2 θ), Condition (3.2) is necessarily slack. To show existence, take (3.1) and (3.3) binding. Then we have v(t 3 ) > (1 p)v(t 3 ) = v(t 2 ) > (1 p) 2 v(t 3 ) = v 1. For the last statement, take (3.2) binding. Then v(t 1 ) = (1 p(2 θ))v(t 3 ) (1 p( θ))v(t 2 ) by (3.1) (or (1 p( θ))v(t 1 ) by (3.3)). Either way it follows that 1 p(2 θ))v(t 3 ) (1 p( θ)) 2 v(t 3 ) for both (3.1) and (3.3) to hold. This contradicts (1 p( θ)) 2 > 1 p(2 θ). Proof of Lemma 2: 1. In the first case the agent reports θ 3 when observing θ 1. So Problem 1 becomes Problem 3 max v i 0 π i θ i {π 2 ϕ(v 2 ) + [π 3 + π 1 (1 p(2 θ))] ϕ(v 3 )} i 16

17 s.t. (3.3) and π 2 (v 2 v 3 ) π 1 (1 p(2 θ))v 3 ψ (7.1) π 2 v 2 + [π 3 + π 1 (1 p(2 θ))] v 3 ψ (7.2) where π 1 < 0 necessarily by the MLRP and π 2 may be either positive or negative. 2. Similarly, in the second case v 1 again never materialises because the agent reports θ 2 if observing θ 1 and θ 3 if observing θ 2 (and θ 3 if observing θ 3 ). The moral hazard constraint (7.1) becomes π 1 (v 2 v 3 ) p( θ)( π 2 v 3 + π 1 v 2 ) ψ. (7.3) 3. In this instance (Case 3), v 2 is never reported: the agent always prefers θ 3 instead of reporting θ 2. Then the moral hazard constraint reads π 1 (v 1 v 3 ) π 2 p( )v 3 ψ. (7.4) 4. In case 4 both (3.2) and (3.3) fail; the moral hazard constraint rewrites v 3 [ π 1 p(2 θ) + π 2 p( θ)] ψ (7.5) 5. In Case 5 only constraint (3.1) fails; then the moral hazard constraint becomes π 3 v 3 + v 2 ( π 2 + π 1 (1 p( θ))) ψ. (7.6) Which of these instance arises in equilibrium is endogenous; it depends on the contract chosen by the principal, that is, on the cost of implementing effort. Those costs are characterised by the constraints (7.1)-(7.4), which can be used to rank them. Pairwise comparisons of these constraints show that Case 1 features the lowest cost, so that it represents the only contract that may be offered by the principal. Indeed, simple inspection of the inequality π 1 (v 1 v 3 ) π 2 p( )v 3 π 1 (v 2 v 3 ) p( θ)( π 2 v 3 + π 1 v 2 ) shows that it holds. Similarly, inspection of the first and last equations shows that Case 1 17

18 is more expensive than Case 4. Next re-arrange π 2 (v 2 v 3 ) π 1 (1 p(2 θ))v 3 (< ) π 1 (v 2 v 3 ) p( θ)( π 2 v 3 + π 1 v 2 ) into π 2 (v 2 (1 p( θ))v 3 ) (<) π 1 (v 3 v 2 (1 p( θ))) + π 1 v 3 p(2 θ). Notice that π 1 (v 1 v 2 (1 p( θ))) < 0 because incentive constraint (3.1) fails (by assumption), the RHS can be bounded below by π 1 (v 1 (1 p(2 θ))v 3 ), which is positive because constraint (3.2) also fails (by assumption). Hence Case 2 is more expensive than Case 1, and therefore will never be offered either. Last, comparing (7.5) to 7.1 and re-arranging yields π 1 v 3 (1 p(2 θ)) < π 1 v 2 (1 p( θ)) by simple inspection of the incentive constraints (3.1) and (3.2), for π 1 < 0. Transitivity completes the proof. Proof of Lemma 3: Suppose (3.1) fails but (3.2) and (3.3) hold. θ 1 is never reported to the principal and the relevant moral hazard constraint is given by (7.6). Take the corresponding participation constraint π 3 v 3 + v 2 (π 2 + π 1 (1 p( θ))) binding at 0 then (7.6) is necessarily violated. Proof of Lemma 4: µ, λ > 0 i π iv i = ψ = i π iv i i π iv i = 0. Since v 3 v 2 v 1 by MLRP and i π iv i = ψ > 0, we must have v 3 > 0 > v 1. Therefore (3.2) cannot hold. Further, since v 2 v 1, (3.1) must also be violated regardless of whether v 2 0 or v 2 < 0. Clearly in the later case (3.3) also fails to hold. Proof of Lemma 5: µ > 0 i π iv i = ψ and when (3.7) holds, i π iv i ψ+ i π iv i. But but by (3.1)-(3.3) and MLRP, i π iv i > 0. Then (3.7) implies π i v i ψ + π i v i i i ψ ψ + i i π i v i π i v i > 0 which is an obvious contradiction. So (3.7) must be violated. 18

19 Proof of Proposition 1: Take the moral hazard constraint (3.7) and the ex post incentive constraints (3.1) and (3.3) binding to obtain v 3 (as in the text). To show this must be the lowest-cost contract, observe that v 3 must also solve Since ϕ ( ) is increasing, if γ 2 = 0 then v 3 > ϕ (v 3 ) = λ π 3 π 3 γ 2(1 p) π 3 (7.7) ψ and v Π Π 2 > (1 p)v 3 > (1 p) ψ Π Π is slack). It then follows that v 1 (1 p)v 2 > (1 p) 2 v 3 > (1 p) 2 can be constructed for the case γ 1 = 0 by using (4.4) instead. ψ Π Π (for (3.3). A similar argument Proof of Proposition 2: From Constraint (3.3) binding v NT 2 = (1 p)v NT 3. When (3.1) fails but (3.2) holds, the agent reports θ 2 in state θ 1 and receives v 2 with probability 1 p. Combining these two statements gives v NT 3 and v 2 as in the text. Proof of Corollary 1: In either case the cost of the contract is given by a binding moral hazard constraint (3.7) (or (4.1). Then Πv 3 = ψ, so that ( ) ψ C T = Π ϕ Π ( ) ψ C NT = Π ϕ Π Proof of Proposition 3: In the standard problem (4.3)-(4.5) read ϕ (v 1 ) = µ + λ π 1 π 1 (7.8) ϕ (v 2 ) = µ + λ π 2 π 2 (7.9) ϕ (v 3 ) = µ + λ π 3 π 3 (7.10) Increase v i i by some arbitrarily small amount ε > 0, so that µ = 0 as well but the cost of the contract comes within ε of the optimum (for ϕ is continuous and its derivative is bounded). Sum (4.3)-(4.5) to find E Θ [ϕ (v i )] + (γ 1 + γ 2 )p = 0 19

20 for µ = 0, so that at least one of γ 1, γ 2 is strictly positive. From the Proof of Proposition 1 we know that both are. Then compare each of (7.8)-(7.10) to (4.3)-(4.5), recalling that ϕ( ) is increasing convex. References [1] Baron D. and David Besanko Regulation, Asymmetric Information, and Auditing. The RAND Journal of Economics, Vol. 15, No. 4, pp [2] Bushman, R. and Chandra Kanodia (1996) A Note on Strategic Sampling in Agencies. Management Science, Vol.42, pp [3] Demski, J. and Ronald Dye (1999) Risk, Returns and Moral Hazard Journal of Accounting Research, Vol. 37, No. 1, pp [4] Green, J. and Jean-Jacques Laffont (1986) Partially verifiable information and mechanism design. The Review of Economic Studies, Vol. LIII, pp [5] D. Gromb and David Martimort (2007), Collusion and the organization of delegated expertise Journal of Economic Theory, Vol. 137 (1), pp [6] Grossman, S. and Oliver Hart (1983), An Analysis of the Principal-Agent Problem Econometrica, vol. 51(1), pages [7] Holmström, B. (1979) Moral hazard and observability. The Bell Journal of Economics, Vol. 10, pp [8] Holmström, B. and Paul Milgrom (1987) Aggregation and Linearity in the Provision of Intertemporal incentives. Econometrica, Vol. 55, pp [9] Kanodia, C. (1985) Stochastic Monitoring and Moral Hazard. Journal of Accounting Research, Vol.23, pp

21 [10] Kedia, S. and Thomas Philippon (2006) The economics of fraudulent accounting, NYU working paper [11] Levitt, S. and Christopher Snyder (1997 ) Is no News Bad News? Information Transmission and the Role of Early Warning in the Principal-Agent Model. Rand Journal of Economics, Vol. 28 (4), pp [12] Mookherjee D. and Ivan Png (1989) Optimal Auditing, Insurance, and Redistribution. The Quarterly Journal of Economics, vol. 104(2), pp [13] Roger, G. (2012a) Moral Hazard under Soft Information. mimeo, The University of NSW [14] Roger, G. (2012b) Optimal Contract under Moral Hazard and Soft Information. mimeo, The University of NSW 21

EC476 Contracts and Organizations, Part III: Lecture 2

EC476 Contracts and Organizations, Part III: Lecture 2 EC476 Contracts and Organizations, Part III: Lecture 2 Leonardo Felli 32L.G.06 19 January 2015 Moral Hazard: Consider the contractual relationship between two agents (a principal and an agent) The principal

More information

Deceptive Advertising with Rational Buyers

Deceptive Advertising with Rational Buyers Deceptive Advertising with Rational Buyers September 6, 016 ONLINE APPENDIX In this Appendix we present in full additional results and extensions which are only mentioned in the paper. In the exposition

More information

Ex ante moral hazard and ex post adverse selection with soft information

Ex ante moral hazard and ex post adverse selection with soft information Ex ante moral hazard and ex post adverse selection with soft information Guillaume Roger The University of New South Wales PRELIMINARY AND INCOMPLETE January 2010 Abstract We reverse the standard sequence

More information

1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts)

1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts) 1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts) We extend our setup by allowing more than two types of agent. The agent s type is now β {β 1, β 2,..., β N }, where

More information

Microeconomic Theory (501b) Problem Set 10. Auctions and Moral Hazard Suggested Solution: Tibor Heumann

Microeconomic Theory (501b) Problem Set 10. Auctions and Moral Hazard Suggested Solution: Tibor Heumann Dirk Bergemann Department of Economics Yale University Microeconomic Theory (50b) Problem Set 0. Auctions and Moral Hazard Suggested Solution: Tibor Heumann 4/5/4 This problem set is due on Tuesday, 4//4..

More information

Introduction. 1 University of Pennsylvania, Wharton Finance Department, Steinberg Hall-Dietrich Hall, 3620

Introduction. 1 University of Pennsylvania, Wharton Finance Department, Steinberg Hall-Dietrich Hall, 3620 May 16, 2006 Philip Bond 1 Are cheap talk and hard evidence both needed in the courtroom? Abstract: In a recent paper, Bull and Watson (2004) present a formal model of verifiability in which cheap messages

More information

Ex ante moral hazard and ex post adverse selection with soft information

Ex ante moral hazard and ex post adverse selection with soft information Ex ante moral hazard and ex post adverse selection with soft information Guillaume Roger The University of New South Wales PRELIMINARY AND INCOMPLETE January 15, 2010 Abstract We reverse the standard sequence

More information

Moral hazard with soft information

Moral hazard with soft information Moral hazard with soft information Guillaume Roger The University of New South Wales June 20, 2012 Abstract This paper studies moral hazard where he agent alone observes the stochastic outcome of her action,

More information

Contracts in informed-principal problems with moral hazard

Contracts in informed-principal problems with moral hazard Contracts in informed-principal problems with moral hazard Nicholas C Bedard January 20, 2016 Abstract In many cases, an employer has private information about the potential productivity of a worker, who

More information

Definitions and Proofs

Definitions and Proofs Giving Advice vs. Making Decisions: Transparency, Information, and Delegation Online Appendix A Definitions and Proofs A. The Informational Environment The set of states of nature is denoted by = [, ],

More information

Moral Hazard: Part 1. April 9, 2018

Moral Hazard: Part 1. April 9, 2018 Moral Hazard: Part 1 April 9, 2018 Introduction In a standard moral hazard problem, the agent A is characterized by only one type. As with adverse selection, the principal P wants to engage in an economic

More information

Arm s Length Relationships without Moral Hazard

Arm s Length Relationships without Moral Hazard 09- Research Group: Industrial Organization November 6, 2009 Arm s Length Relationships without Moral Hazard JACQUES CRÉMER Arm s length relationships without moral hazard Jacques Crémer Toulouse School

More information

Continuity in Mechanism Design without Transfers 1

Continuity in Mechanism Design without Transfers 1 Continuity in Mechanism Design without Transfers 1 David Martimort and Aggey Semenov 3 This Version: March 16, 006 Abstract: We adopt a mechanism design approach to model communication between a principal

More information

Online Appendix for Dynamic Procurement under Uncertainty: Optimal Design and Implications for Incomplete Contracts

Online Appendix for Dynamic Procurement under Uncertainty: Optimal Design and Implications for Incomplete Contracts Online Appendix for Dynamic Procurement under Uncertainty: Optimal Design and Implications for Incomplete Contracts By Malin Arve and David Martimort I. Concavity and Implementability Conditions In this

More information

Optimal contract under adverse selection in a moral hazard model with a risk averse agent

Optimal contract under adverse selection in a moral hazard model with a risk averse agent Optimal contract under adverse selection in a moral hazard model with a risk averse agent Lionel Thomas CRESE Université de Franche-Comté, IUT Besanon Vesoul, 30 avenue de l Observatoire, BP1559, 25009

More information

Relying on Information Acquired by a Principal

Relying on Information Acquired by a Principal Relying on Information Acquired by a Principal Aaron Finkle 2004 Abstract This paper analyzes situations in which a principal is able to privately gather information about a task after contracting with

More information

Mechanism Design: Basic Concepts

Mechanism Design: Basic Concepts Advanced Microeconomic Theory: Economics 521b Spring 2011 Juuso Välimäki Mechanism Design: Basic Concepts The setup is similar to that of a Bayesian game. The ingredients are: 1. Set of players, i {1,

More information

Hidden information. Principal s payoff: π (e) w,

Hidden information. Principal s payoff: π (e) w, Hidden information Section 14.C. in MWG We still consider a setting with information asymmetries between the principal and agent. However, the effort is now perfectly observable. What is unobservable?

More information

Costly Expertise. Dino Gerardi and Leeat Yariv yz. Current Version: December, 2007

Costly Expertise. Dino Gerardi and Leeat Yariv yz. Current Version: December, 2007 Costly Expertise Dino Gerardi and Leeat Yariv yz Current Version: December, 007 In many environments expertise is costly. Costs can manifest themselves in numerous ways, ranging from the time that is required

More information

On the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation

On the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation MPRA Munich Personal RePEc Archive On the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation Ismail Saglam Ipek University 4 May 2016 Online at https://mpra.ub.uni-muenchen.de/71090/

More information

Combinatorial Agency of Threshold Functions

Combinatorial Agency of Threshold Functions Combinatorial Agency of Threshold Functions Shaili Jain 1 and David C. Parkes 2 1 Yale University, New Haven, CT shaili.jain@yale.edu 2 Harvard University, Cambridge, MA parkes@eecs.harvard.edu Abstract.

More information

Minimum Wages and Excessive E ort Supply

Minimum Wages and Excessive E ort Supply Minimum Wages and Excessive E ort Supply Matthias Kräkel y Anja Schöttner z Abstract It is well-known that, in static models, minimum wages generate positive worker rents and, consequently, ine ciently

More information

A New Class of Non Existence Examples for the Moral Hazard Problem

A New Class of Non Existence Examples for the Moral Hazard Problem A New Class of Non Existence Examples for the Moral Hazard Problem Sofia Moroni and Jeroen Swinkels April, 23 Abstract We provide a class of counter-examples to existence in a simple moral hazard problem

More information

Game Theory and Economics of Contracts Lecture 5 Static Single-agent Moral Hazard Model

Game Theory and Economics of Contracts Lecture 5 Static Single-agent Moral Hazard Model Game Theory and Economics of Contracts Lecture 5 Static Single-agent Moral Hazard Model Yu (Larry) Chen School of Economics, Nanjing University Fall 2015 Principal-Agent Relationship Principal-agent relationship

More information

Optimal Incentive Contract with Costly and Flexible Monitoring

Optimal Incentive Contract with Costly and Flexible Monitoring Optimal Incentive Contract with Costly and Flexible Monitoring Anqi Li 1 Ming Yang 2 1 Department of Economics, Washington University in St. Louis 2 Fuqua School of Business, Duke University May 2016 Motivation

More information

Government 2005: Formal Political Theory I

Government 2005: Formal Political Theory I Government 2005: Formal Political Theory I Lecture 11 Instructor: Tommaso Nannicini Teaching Fellow: Jeremy Bowles Harvard University November 9, 2017 Overview * Today s lecture Dynamic games of incomplete

More information

Some Notes on Adverse Selection

Some Notes on Adverse Selection Some Notes on Adverse Selection John Morgan Haas School of Business and Department of Economics University of California, Berkeley Overview This set of lecture notes covers a general model of adverse selection

More information

Supervision, Collusion, and Optimal Contract Design with Costly Information Acquisition

Supervision, Collusion, and Optimal Contract Design with Costly Information Acquisition Supervision, Collusion, and Optimal Contract Design with Costly Information Acquisition XiaoGang Che Guanxi Yi PRELIMINARY and INCOMPLETE November 2014 Abstract In this paper, we study the impacts of costly

More information

Collusion, Delegation and Supervision with Soft Information

Collusion, Delegation and Supervision with Soft Information Collusion, Delegation and Supervision with Soft Information Antoine Faure-Grimaud Jean-Jacques Laffont and David Martimort Revised: February 4, 2003 Abstract This paper shows that supervision with soft

More information

Bayesian Persuasion Online Appendix

Bayesian Persuasion Online Appendix Bayesian Persuasion Online Appendix Emir Kamenica and Matthew Gentzkow University of Chicago June 2010 1 Persuasion mechanisms In this paper we study a particular game where Sender chooses a signal π whose

More information

This is designed for one 75-minute lecture using Games and Information. October 3, 2006

This is designed for one 75-minute lecture using Games and Information. October 3, 2006 This is designed for one 75-minute lecture using Games and Information. October 3, 2006 1 7 Moral Hazard: Hidden Actions PRINCIPAL-AGENT MODELS The principal (or uninformed player) is the player who has

More information

Martin Gregor IES, Charles University. Abstract

Martin Gregor IES, Charles University. Abstract On the strategic non-complementarity of complements Martin Gregor IES, Charles University Abstract This paper examines the equilibrium provision of a public good if the private monetary contributions of

More information

When to Ask for an Update: Timing in Strategic Communication

When to Ask for an Update: Timing in Strategic Communication When to Ask for an Update: Timing in Strategic Communication Work in Progress Ying Chen Johns Hopkins University Atara Oliver Rice University March 19, 2018 Main idea In many communication situations,

More information

Organizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan

Organizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan Organizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan David Atkin, Azam Chaudhry, Shamyla Chaudry Amit K. Khandelwal and Eric Verhoogen Sept. 016 Appendix B: Theory

More information

Graduate Microeconomics II Lecture 5: Cheap Talk. Patrick Legros

Graduate Microeconomics II Lecture 5: Cheap Talk. Patrick Legros Graduate Microeconomics II Lecture 5: Cheap Talk Patrick Legros 1 / 35 Outline Cheap talk 2 / 35 Outline Cheap talk Crawford-Sobel Welfare 3 / 35 Outline Cheap talk Crawford-Sobel Welfare Partially Verifiable

More information

Moral Hazard: Hidden Action

Moral Hazard: Hidden Action Moral Hazard: Hidden Action Part of these Notes were taken (almost literally) from Rasmusen, 2007 UIB Course 2013-14 (UIB) MH-Hidden Actions Course 2013-14 1 / 29 A Principal-agent Model. The Production

More information

Ex Post Cheap Talk : Value of Information and Value of Signals

Ex Post Cheap Talk : Value of Information and Value of Signals Ex Post Cheap Talk : Value of Information and Value of Signals Liping Tang Carnegie Mellon University, Pittsburgh PA 15213, USA Abstract. Crawford and Sobel s Cheap Talk model [1] describes an information

More information

DEPARTMENT OF ECONOMICS YALE UNIVERSITY P.O. Box New Haven, CT

DEPARTMENT OF ECONOMICS YALE UNIVERSITY P.O. Box New Haven, CT DEPARTMENT OF ECONOMICS YALE UNIVERSITY P.O. Box 208268 New Haven, CT 06520-8268 http://www.econ.yale.edu/ Economics Department Working Paper No. 25 Cowles Foundation Discussion Paper No. 1619 Information

More information

Moral Hazard: Part 2. April 16, 2018

Moral Hazard: Part 2. April 16, 2018 Moral Hazard: Part 2 April 16, 2018 The basic model: A is risk neutral We now turn to the problem of moral hazard (asymmetric information), where A is risk neutral. When A is risk neutral, u (t) is linear.

More information

Teoria das organizações e contratos

Teoria das organizações e contratos Teoria das organizações e contratos Chapter 6: Adverse Selection with two types Mestrado Profissional em Economia 3 o trimestre 2015 EESP (FGV) Teoria das organizações e contratos 3 o trimestre 2015 1

More information

When to Ask for an Update: Timing in Strategic Communication. National University of Singapore June 5, 2018

When to Ask for an Update: Timing in Strategic Communication. National University of Singapore June 5, 2018 When to Ask for an Update: Timing in Strategic Communication Ying Chen Johns Hopkins University Atara Oliver Rice University National University of Singapore June 5, 2018 Main idea In many communication

More information

The Impact of Organizer Market Structure on Participant Entry Behavior in a Multi-Tournament Environment

The Impact of Organizer Market Structure on Participant Entry Behavior in a Multi-Tournament Environment The Impact of Organizer Market Structure on Participant Entry Behavior in a Multi-Tournament Environment Timothy Mathews and Soiliou Daw Namoro Abstract. A model of two tournaments, each with a field of

More information

Appendix of Homophily in Peer Groups The Costly Information Case

Appendix of Homophily in Peer Groups The Costly Information Case Appendix of Homophily in Peer Groups The Costly Information Case Mariagiovanna Baccara Leeat Yariv August 19, 2012 1 Introduction In this Appendix we study the information sharing application analyzed

More information

Notes on Mechanism Designy

Notes on Mechanism Designy Notes on Mechanism Designy ECON 20B - Game Theory Guillermo Ordoñez UCLA February 0, 2006 Mechanism Design. Informal discussion. Mechanisms are particular types of games of incomplete (or asymmetric) information

More information

Dynamic Common Agency

Dynamic Common Agency Dynamic Common Agency Dirk Bergemann Juuso Välimäki January 2001 Abstract A general model of dynamic common agency with symmetric information is considered. The set of truthful Markov perfect equilibrium

More information

General idea. Firms can use competition between agents for. We mainly focus on incentives. 1 incentive and. 2 selection purposes 3 / 101

General idea. Firms can use competition between agents for. We mainly focus on incentives. 1 incentive and. 2 selection purposes 3 / 101 3 Tournaments 3.1 Motivation General idea Firms can use competition between agents for 1 incentive and 2 selection purposes We mainly focus on incentives 3 / 101 Main characteristics Agents fulll similar

More information

Intrinsic and Extrinsic Motivation

Intrinsic and Extrinsic Motivation Intrinsic and Extrinsic Motivation Roland Bénabou Jean Tirole. Review of Economic Studies 2003 Bénabou and Tirole Intrinsic and Extrinsic Motivation 1 / 30 Motivation Should a child be rewarded for passing

More information

Static Information Design

Static Information Design Static Information Design Dirk Bergemann and Stephen Morris Frontiers of Economic Theory & Computer Science, Becker-Friedman Institute, August 2016 Mechanism Design and Information Design Basic Mechanism

More information

Online Appendix for Sourcing from Suppliers with Financial Constraints and Performance Risk

Online Appendix for Sourcing from Suppliers with Financial Constraints and Performance Risk Online Appendix for Sourcing from Suppliers with Financial Constraints and Performance Ris Christopher S. Tang S. Alex Yang Jing Wu Appendix A: Proofs Proof of Lemma 1. In a centralized chain, the system

More information

A Theory of Financing Constraints and Firm Dynamics by Clementi and Hopenhayn - Quarterly Journal of Economics (2006)

A Theory of Financing Constraints and Firm Dynamics by Clementi and Hopenhayn - Quarterly Journal of Economics (2006) A Theory of Financing Constraints and Firm Dynamics by Clementi and Hopenhayn - Quarterly Journal of Economics (2006) A Presentation for Corporate Finance 1 Graduate School of Economics December, 2009

More information

Some Notes on Moral Hazard

Some Notes on Moral Hazard Some Notes on Moral Hazard John Morgan University of California at Berkeley Preliminaries Up until this point, we have been concerned mainly with the problem of private information on the part of the agent,

More information

Strongly rational expectations equilibria with endogenous acquisition of information

Strongly rational expectations equilibria with endogenous acquisition of information Strongly rational expectations equilibria with endogenous acquisition of information Gabriel Desgranges Maik Heinemann 9 February 004 This paper analyzes conditions for existence of a strongly rational

More information

The Optimal Contract under Adverse Selection in a Moral-Hazard Model with a Risk-Averse Agent

The Optimal Contract under Adverse Selection in a Moral-Hazard Model with a Risk-Averse Agent Article The Optimal Contract under Adverse Selection in a Moral-Hazard Model with a Risk-Averse Agent François Maréchal and Lionel Thomas * CRESE EA3190, University Bourgogne Franche-Comté, F-25000 Besançon,

More information

Microeconomics II Lecture 4: Incomplete Information Karl Wärneryd Stockholm School of Economics November 2016

Microeconomics II Lecture 4: Incomplete Information Karl Wärneryd Stockholm School of Economics November 2016 Microeconomics II Lecture 4: Incomplete Information Karl Wärneryd Stockholm School of Economics November 2016 1 Modelling incomplete information So far, we have studied games in which information was complete,

More information

An Example of Conflicts of Interest as Pandering Disincentives

An Example of Conflicts of Interest as Pandering Disincentives An Example of Conflicts of Interest as Pandering Disincentives Saori Chiba and Kaiwen Leong Current draft: January 205 Abstract Consider an uninformed decision maker (DM) who communicates with a partially

More information

Regulation Under Asymmetric Information

Regulation Under Asymmetric Information Regulation Under Asymmetric Information Lecture 5: Course 608 Sugata Bag Delhi School of Economics February 2013 Sugata Bag (DSE) Regulation Under Asymmetric Information 08/02 1 / 50 Basic Concepts The

More information

Coordination and Cheap Talk in a Battle of the Sexes with Private Information

Coordination and Cheap Talk in a Battle of the Sexes with Private Information Department of Economics Coordination and Cheap Talk in a Battle of the Sexes with Private Information Department of Economics Discussion Paper 3-0 Chirantan Ganguly Indrajit Ray Coordination and Cheap

More information

Investor s Increased Shareholding due to Entrepreneur Manager Collusion

Investor s Increased Shareholding due to Entrepreneur Manager Collusion Investor s Increased Shareholding due to Entrepreneur Manager Collusion Özgün Atasoy Sabancı University Mehmet Barlo Sabancı University August, 2007 Abstract This study presents an investor/entrepreneur

More information

Organization, Careers and Incentives

Organization, Careers and Incentives Organization, Careers and Incentives Chapter 4 Robert Gary-Bobo March 2018 1 / 31 Introduction Introduction A firm is a pyramid of opportunities (Alfred P. Sloan). Promotions can be used to create incentives.

More information

5. Relational Contracts and Career Concerns

5. Relational Contracts and Career Concerns 5. Relational Contracts and Career Concerns Klaus M. Schmidt LMU Munich Contract Theory, Summer 2010 Klaus M. Schmidt (LMU Munich) 5. Relational Contracts and Career Concerns Contract Theory, Summer 2010

More information

The Value of Symmetric Information in an Agency Model with Moral Hazard: The Ex Post Contracting Case

The Value of Symmetric Information in an Agency Model with Moral Hazard: The Ex Post Contracting Case Faculty of Business and Law SCHOOL OF ACCOUNTING, ECONOMICS AND FINANCE School Working Paper - Economic Series 2006 SWP 2006/24 The Value of Symmetric Information in an Agency Model with Moral Hazard:

More information

NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA

NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA MARIA GOLTSMAN Abstract. This note shows that, in separable environments, any monotonic social choice function

More information

Models of Wage Dynamics

Models of Wage Dynamics Models of Wage Dynamics Toshihiko Mukoyama Department of Economics Concordia University and CIREQ mukoyama@alcor.concordia.ca December 13, 2005 1 Introduction This paper introduces four different models

More information

Decision, Risk and Operations Working Papers Series

Decision, Risk and Operations Working Papers Series Decision, Risk and Operations Working Papers Series The cost of moral hazard and limited liability in the principal-agent problem F. Balmaceda, S. R. Balseiro, J. R. Correa, N. E. Stier-Moses July 2010;

More information

Do Shareholders Vote Strategically? Voting Behavior, Proposal Screening, and Majority Rules. Supplement

Do Shareholders Vote Strategically? Voting Behavior, Proposal Screening, and Majority Rules. Supplement Do Shareholders Vote Strategically? Voting Behavior, Proposal Screening, and Majority Rules Supplement Ernst Maug Kristian Rydqvist September 2008 1 Additional Results on the Theory of Strategic Voting

More information

Persuasion Under Costly Lying

Persuasion Under Costly Lying Persuasion Under Costly Lying Teck Yong Tan Columbia University 1 / 43 Introduction Consider situations where agent designs learning environment (i.e. what additional information to generate) to persuade

More information

"A Theory of Financing Constraints and Firm Dynamics"

A Theory of Financing Constraints and Firm Dynamics 1/21 "A Theory of Financing Constraints and Firm Dynamics" G.L. Clementi and H.A. Hopenhayn (QJE, 2006) Cesar E. Tamayo Econ612- Economics - Rutgers April 30, 2012 2/21 Program I Summary I Physical environment

More information

The Design of Ambiguous Mechanisms

The Design of Ambiguous Mechanisms The Design of Ambiguous Mechanisms Alfredo Di Tillio Bocconi University Nenad Kos Bocconi University Matthias Messner Bocconi University and CESifo January 9, 2012 First version: April 2011 Abstract This

More information

What happens when there are many agents? Threre are two problems:

What happens when there are many agents? Threre are two problems: Moral Hazard in Teams What happens when there are many agents? Threre are two problems: i) If many agents produce a joint output x, how does one assign the output? There is a free rider problem here as

More information

Introduction: Asymmetric Information and the Coase Theorem

Introduction: Asymmetric Information and the Coase Theorem BGPE Intensive Course: Contracts and Asymmetric Information Introduction: Asymmetric Information and the Coase Theorem Anke Kessler Anke Kessler p. 1/?? Introduction standard neoclassical economic theory

More information

Informed Principal in Private-Value Environments

Informed Principal in Private-Value Environments Informed Principal in Private-Value Environments Tymofiy Mylovanov Thomas Tröger University of Bonn June 21, 2008 1/28 Motivation 2/28 Motivation In most applications of mechanism design, the proposer

More information

We set up the basic model of two-sided, one-to-one matching

We set up the basic model of two-sided, one-to-one matching Econ 805 Advanced Micro Theory I Dan Quint Fall 2009 Lecture 18 To recap Tuesday: We set up the basic model of two-sided, one-to-one matching Two finite populations, call them Men and Women, who want to

More information

Impatience vs. Incentives

Impatience vs. Incentives Impatience vs. Incentives Marcus Opp John Zhu University of California, Berkeley (Haas) & University of Pennsylvania, Wharton January 2015 Opp, Zhu (UC, Wharton) Impatience vs. Incentives January 2015

More information

A Rothschild-Stiglitz approach to Bayesian persuasion

A Rothschild-Stiglitz approach to Bayesian persuasion A Rothschild-Stiglitz approach to Bayesian persuasion Matthew Gentzkow and Emir Kamenica Stanford University and University of Chicago December 2015 Abstract Rothschild and Stiglitz (1970) represent random

More information

The Revenue Equivalence Theorem 1

The Revenue Equivalence Theorem 1 John Nachbar Washington University May 2, 2017 The Revenue Equivalence Theorem 1 1 Introduction. The Revenue Equivalence Theorem gives conditions under which some very different auctions generate the same

More information

On the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E.

On the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E. Tilburg University On the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E. Publication date: 1997 Link to publication General rights Copyright and

More information

A Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations

A Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations A Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations Swaprava Nath a, Onno Zoeter b a Indian Institute of Science, Bangalore b Xerox Research Centre Europe, Meylan, France Abstract

More information

Controlling versus enabling Online appendix

Controlling versus enabling Online appendix Controlling versus enabling Online appendix Andrei Hagiu and Julian Wright September, 017 Section 1 shows the sense in which Proposition 1 and in Section 4 of the main paper hold in a much more general

More information

Patience and Ultimatum in Bargaining

Patience and Ultimatum in Bargaining Patience and Ultimatum in Bargaining Björn Segendorff Department of Economics Stockholm School of Economics PO Box 6501 SE-113 83STOCKHOLM SWEDEN SSE/EFI Working Paper Series in Economics and Finance No

More information

1. The General Linear-Quadratic Framework

1. The General Linear-Quadratic Framework ECO 37 Economics of Uncertainty Fall Term 009 Notes for lectures Incentives for Effort - Multi-Dimensional Cases Here we consider moral hazard problems in the principal-agent framewor, restricting the

More information

The Design of a University System

The Design of a University System The Design of a University System Gianni De Fraja University of Leicester, Università di Roma Tor Vergata and CEPR Paola Valbonesi Università di Padova Public Economics UK 27 May 2011 Abstract This paper

More information

Information Acquisition in Interdependent Value Auctions

Information Acquisition in Interdependent Value Auctions Information Acquisition in Interdependent Value Auctions Dirk Bergemann Xianwen Shi Juuso Välimäki July 16, 2008 Abstract We consider an auction environment with interdependent values. Each bidder can

More information

x ax 1 2 bx2 a bx =0 x = a b. Hence, a consumer s willingness-to-pay as a function of liters on sale, 1 2 a 2 2b, if l> a. (1)

x ax 1 2 bx2 a bx =0 x = a b. Hence, a consumer s willingness-to-pay as a function of liters on sale, 1 2 a 2 2b, if l> a. (1) Answers to Exam Economics 201b First Half 1. (a) Observe, first, that no consumer ever wishes to consume more than 3/2 liters (i.e., 1.5 liters). To see this, observe that, even if the beverage were free,

More information

Mechanism Su cient Statistic. in the Risk-Neutral Agency Problem

Mechanism Su cient Statistic. in the Risk-Neutral Agency Problem Mechanism Su cient Statistic in the Risk-Neutral Agency Problem Dominique Demougin and Claude Fluet Otto-von-Guericke University, Magdeburg and Université du Québec à Montréal Final version, February 1998

More information

Adverse Selection in Competitive Search Equilibrium

Adverse Selection in Competitive Search Equilibrium Adverse Selection in Competitive Search Equilibrium Veronica Guerrieri University of Chicago Randall Wright University of Pennsylvania February 2, 2009 Robert Shimer University of Chicago Abstract We extend

More information

Volume 29, Issue 3. Strategic delegation and market competitiveness

Volume 29, Issue 3. Strategic delegation and market competitiveness Volume 29, Issue Strategic delegation and market competitiveness Caterina Colombo Università di Ferrara Alessandra Chirco Università del Salento Marcella Scrimitore Università del Salento Abstract Within

More information

Introduction Persuasion Attribute Puffery Results Conclusion. Persuasive Puffery. Archishman Chakraborty and Rick Harbaugh

Introduction Persuasion Attribute Puffery Results Conclusion. Persuasive Puffery. Archishman Chakraborty and Rick Harbaugh Persuasive Puffery Archishman Chakraborty and Rick Harbaugh 2012 Marketing Science Meetings Puffery Sellers tend to exaggerate World s best hotdogs! That suit looks perfect on you! Our service can t be

More information

Online Appendix to Strategy-proof tie-breaking in matching with priorities

Online Appendix to Strategy-proof tie-breaking in matching with priorities Online Appendix to Strategy-proof tie-breaking in matching with priorities Lars Ehlers Alexander Westkamp December 12, 2017 Section 1 contains the omitted proofs of Lemma 5, Lemma 6 and Lemma 7 Subsection

More information

Design Patent Damages under Sequential Innovation

Design Patent Damages under Sequential Innovation Design Patent Damages under Sequential Innovation Yongmin Chen and David Sappington University of Colorado and University of Florida February 2016 1 / 32 1. Introduction Patent policy: patent protection

More information

Communication with Self-Interested Experts Part II: Models of Cheap Talk

Communication with Self-Interested Experts Part II: Models of Cheap Talk Communication with Self-Interested Experts Part II: Models of Cheap Talk Margaret Meyer Nuffield College, Oxford 2013 Cheap Talk Models 1 / 27 Setting: Decision-maker (P) receives advice from an advisor

More information

A Principal-Agent Model of Sequential Testing

A Principal-Agent Model of Sequential Testing A Principal-Agent Model of Sequential Testing Dino Gerardi y Lucas Maestri z December 2008 Abstract This paper analyzes the optimal provision of incentives in a sequential testing context. In every period

More information

Credible Ratings. Ettore Damiano, Li, Hao University of Toronto. Wing Suen The University of Hong Kong. March 7, 2008

Credible Ratings. Ettore Damiano, Li, Hao University of Toronto. Wing Suen The University of Hong Kong. March 7, 2008 Credible Ratings Ettore Damiano, Li, Hao University of Toronto Wing Suen The University of Hong Kong March 7, 2008 Abstract: This paper considers a model of a rating agency with multiple clients, in which

More information

Robust Predictions in Games with Incomplete Information

Robust Predictions in Games with Incomplete Information Robust Predictions in Games with Incomplete Information joint with Stephen Morris (Princeton University) November 2010 Payoff Environment in games with incomplete information, the agents are uncertain

More information

Epsilon Ex Post Implementation

Epsilon Ex Post Implementation Epsilon Ex Post Implementation Mehmet Barlo Nuh Aygun Dalkiran February 10, 2014 Abstract We provide necessary and sufficient conditions for epsilon ex post implementation. Our analysis extends Bergemann

More information

CPS 173 Mechanism design. Vincent Conitzer

CPS 173 Mechanism design. Vincent Conitzer CPS 173 Mechanism design Vincent Conitzer conitzer@cs.duke.edu edu Mechanism design: setting The center has a set of outcomes O that she can choose from Allocations of tasks/resources, joint plans, Each

More information

Data Abundance and Asset Price Informativeness. On-Line Appendix

Data Abundance and Asset Price Informativeness. On-Line Appendix Data Abundance and Asset Price Informativeness On-Line Appendix Jérôme Dugast Thierry Foucault August 30, 07 This note is the on-line appendix for Data Abundance and Asset Price Informativeness. It contains

More information

G5212: Game Theory. Mark Dean. Spring 2017

G5212: Game Theory. Mark Dean. Spring 2017 G5212: Game Theory Mark Dean Spring 2017 Adverse Selection We are now going to go back to the Adverse Selection framework Mechanism Design with 1 agent Though that agent may be of many types Note that

More information

Area I: Contract Theory Question (Econ 206)

Area I: Contract Theory Question (Econ 206) Theory Field Exam Winter 2011 Instructions You must complete two of the three areas (the areas being (I) contract theory, (II) game theory, and (III) psychology & economics). Be sure to indicate clearly

More information

Indescribable Contingencies versus Unawareness and Incomplete Contracting

Indescribable Contingencies versus Unawareness and Incomplete Contracting Indescribable Contingencies versus Unawareness and Incomplete Contracting Wenjun Ma Burkhard C. Schipper Job Market Paper November 4, 204 Abstract Maskin and Tirole (999) postulated that even though agents

More information

Game Theory, Information, Incentives

Game Theory, Information, Incentives Game Theory, Information, Incentives Ronald Wendner Department of Economics Graz University, Austria Course # 320.501: Analytical Methods (part 6) The Moral Hazard Problem Moral hazard as a problem of

More information