Optimal Contracts with Imperfect Monitoring
|
|
- Monica Pearson
- 5 years ago
- Views:
Transcription
1 Optimal Contracts with Imperfect Monitoring Harrison Cheng University of Southern California visiting Kyoto Institute of Economic Research March, 2004 Abstract We use the duality in linear programming to solve the problem of optimal contracts with moral hazards. We show the importance of allowing the partners to throw away outputs under some contingencies. A two-step procedure is used to find the optimal contracts. The first step minimizes the loss from undistributed outputs, and in the second step, second best solution is found near a pure strategy profile. The primal solution gives us the contracts, while the dual solution identifies thepriorityinthe improvement of production technology. Introduction We study the problem of designing optimal contracts when there are moral hazard problems among the players due to unobservable actions. There is a huge literature on the design of optimal contracts under asymmetric information, encompassing many areas of study such as the mechanism design, the theory of auctions, the theory of regulation and procurements, and the incentive theory of public goods. By comparison, the problem of designing optimal contracts while providing incentives to the players are relatively underdeveloped. Part of the reason may be due to complexity with moral hazard problems. As noted in Laffont and Mortimort (2002), "As in the case of adverse selection, asymmetric information also plays a role in the design of the optimal incentive contract under moral hazard. However instead of being an exogenous uncertainty Department of Economics, University of Southern California, Los Angles, Ca , hacheng@usc.edu, fax I am indebted to many over the years for this research. Special thanks to the support from the Institute of Economic Research, Kyoto University. at Kyoto: cheng@kier.kyoto-u.ac.jp
2 for the principal, uncertainty is now endogenous". This endogeneity is asourceofthecomplexity. Most of the literature on optimal contract design take the so-called "differential" approach in which a system of differential equations is solved, and first-order conditions are derived. Ourapproachinthispa- per is the "linear inequality methods". It formulates part of the problem by solving a linear programming problem subject to a system of linear inequality constraints, as surveyed in d Aspremont and Gérard-Varet (998). The "linear inequality methods" was firstusedtohandlead- verse selection in the design of optimal public design mechanisms in d Aspremont and Gérard-Varet (979). It was also used in the design of optimal selling rules for a discriminating monopolist in Cremer and McLean (985). It has also been used to solve moral hazard problems in Legros and Matsushima (99), Fudenberg, Levine, and Maskin (994), Fudenberg and Levine (994), and Cheng (2000). We take one step further by showing how the converted dual of the linear programming problems can be a surprisingly powerful way of finding optimal contracts with moral hazards. Our analysis is performed in a model of partnership with the joint production of a single output subject to production uncertainty. However, the methods are indeed very general and can be applied to any game (or game form) with imperfect monitoring. We provide an exhaustive analysis of the solution of the optimal contracts with two players, two pure strategies, and two public signals (referred to as two-by-two-by-two games). The method can be applied to the case with many players, pure strategies and signals. A general analysis is however beyond the scope of this paper. Because of the complexity, it is necessary that the solution be studied in the important but simpler two-by-two-by-two cases. One interesting phenomenon that comes out of the analysis is that in designing the sharing rules, a general optimal rule is for the partners not to fully distribute all the produced output under all contingencies. A weaker form of the budget constraints should be used. Such a result has been well-known in the models with asymmetric information. For example, in Myerson and Satterthwaite (983), and Laffont and Maskin (979), there is an impossibility result in designing optimal mechanisms that satisfy the incentive constraints, individual rationality and the strict budget balance simultaneously. In the case of moral hazards, Holmstrom (982) also shows that without a budget breaker, we often get inefficiency in partnership games. Given these results, it is important that we allow disposal of outputs under certain contingencies This is of course a source 2
3 of inefficiency for the partners, but in general the inefficiency loss of maintaining strict budget balance under all contingencies is greater. The undistributed outputs should be thrown away (at zero cost) or given away to others in a way not affecting optimal decisions of the partners. For example, an anonymous donation of the undistributed claims to charity institutions can be a good arrangement. The better decisions supported by such incentive schemes can more than compensate the loss from the undistributed outputs for the partners. This can occur quite easily, and an example will be given. The message from the example is the best contract should allow for the possibility of partial distribution of produced outputs among the partners. Although the possibility of using such sharing rules are mentioned in Alchian and H. Demsetz (972), and Holmstrom (982), they did not pursue its implications. We show how important it is to allow such distribution rules and the role it plays in finding an optimal contract for the partners. An optimal contract is one that maximizes the expected distributed outputs(minus costs of efforts) subject to incentive constraints. When the disposal of the outputs is allowed, any strategy profile of the partners is incentive compatible. To find an optimal contract, there are two steps in the procedure. In the first step, given a strategy profile, we find an optimal sharing scheme subject to the condition that the given strategy profile is a Nash equilibrium. In the second step, the strategy profile is varied to find one that is optimal. It can be shown that an optimal contract may not exist, and the best that can be hoped in general is an asymptotically second best contract. Because of the two-step procedure, the analysis of the optimal contracts is substantially more complicated than the case for asymmetric information. In the two-by-two-by-two case, it is shown that the (asymptotically) optimal (or second best) contract is obtained through a strategy profile that is close to a pure strategy profile.weexpectthispropertytohold for an arbitrary number of players, pure strategies and output levels. If confirmed later, it offers a simple computational method for finding the (asymptotically) optimal contract among the partners by solving a finite number of linear programming problems. Thus we regard the pure strategy result to be a very important one for our analysis. Space limitations do not allow us to explore the implications of limited liability. The analysis will also be extended later beyond the 2-by-2- by-2 games of the current paper. A sequel to this paper will be devoted to these objectives. 3
4 Sectiontwostartswiththeanalysisofoptimalcontractsfortheprincipal hiring many agents. It is shown that the principal can extract all the surplus of production from the risk-neutral agents while providing the incentives, a result corresponding to the Cremer and McLean (988) result for asymmetric auction models. Second three deals with case without the principal. The agents are now the partners. A No Surplus Condition is shown to be necessary and sufficient for the incentive compatible equilibrium under strict budget constraints. Second four explains why the budget constraints need to weakened for solving the optimal contract problem. Players do not distribute all the outputs from production under all contingencies. Section 5 converts the linear programming problem of minimizing inefficiency from disposal into a dual problem, and further transforms it into an important tool of analysis. The duality result is then applied in section 6 to analyze the solution of the step one optimization problem in general form in 2-by-2-by-2 games. In section 7, numerical examples are given to illustrate the formula obtained in section 7. In section 8, the formula is used to show that optimal contracts can be computed at or near a pure strategy profile, an important step in making it possible to solve the optimal contract problem with a finite number of linear programming problems. 2 Principal-Agents Contracts Let the principal be denoted by i = 0, and the agents are denoted by i =, 2,...,n. There are only finitely many output levels y k Y, k =, 2,...,K. The principal does not directly participate in production, and delegate the task to the agents. The total output (or revenue) produced by the agents depends on their joint actions or efforts as well as the stochastic factors. There are finitely many actions (pure strategies) for each agent. Let A i be the set of all pure strategies of agent i. The actions of the agents are not observable, but the total revenue is. However, the total revenue y is an imperfect signal of the action profile a =(a,a 2,...,a n ),a i A i. The distribution of revenue on Y depends on a. Let π k (a) be the probability of revenue y k when the action profile a is chosen. The expected total revenue is denoted by E(a) = P K k= π k(a)y k. The output-contingent payment contract offered to the agent i by the principal is denoted by z ik. Thus agent i gets the expected revenue E i (a) = P K k= π k(a)z ik when the joint action is a. The pure strategies of agent i will be indexed by a j i A i. A mixed strategies α i of agent i is the strategy with probability α i (a j i ) of using the pure strategy a j i.letα =(α,α 2,...,α n ) be the mixed strategy profile. We shall let π(α) be the probability distribution on Y with probability 4
5 π k (α,α 2,...,α n ) of revenue y k. The expected total revenue will be denoted by E(α) = P K k= π k(α)y k, and the expected revenue received by agent i is denoted by E i (α) = P K k= π k(α)z ik. The utility function of agent i is given by u i (w i,a i )=w i v i (a i ), where w i is the revenue received by the agent. Let v i (α i )= P j α i(a j i )v i(a j i ) be the expected cost of effort of the mixed strategy α i. Given the strategy profile α i of other agents, each agent will maximize his or her net payoff u i (α) =E i (α i,α i ) v i (α i ) from the chosen strategy α i. Given the quasi-linear utility functions of the agents, it is natural to consider the efficient strategy profiles α which maximizes the total net benefit W (α) =E(α) P n i= v i(α i ). This is the concept of efficiency we will use for the rest of the paper. The measure of efficiency is independent of the payment contracts z ik. Let u i0 be the utility level of the best outside offer of agent i, and the participation constraint of agent i is given by u i (α) u i0. Assume that there exists a strategy profile α satisfying W (α) P i u i0. If the condition is not satisfied, then there is no reason for the principal to hire the agents. The concept of admissible strategies is first introduced in Cheng (2000) for model with a single agent. Here we extend it to the case of many agents. Let α be any mixed strategy profile of the agents. We say that the deviation α 0 i by agent i is non-detectable if π(α 0 i,α i )=π(α) We say that the strategy profile α is inadmissible if for some agent i, there exists a non-detectable deviation strategy α 0 i which has a lower cost for agent i v i (α 0 i) <v i (α i ) If α is not inadmissible, then we say that it is admissible. If α is inadmissible, then there is an agent who findsitprofitable to deviate from α. Such deviation cannot be prevented by a change of the payment (or incentive) contracts. As a result, α cannot be a Nash equilibrium for the agents with any payment contracts z ik. We have proved therefore the following result. Proposition If α is not admissible, then it cannot be an incentive compatible equilibrium for the agents through the design of the outputcontingent payment contracts. We now show that admissibility is sufficient as well as necessary for the incentive compatibility in the principal-agents contracts. 5
6 Theorem 2 The strategy profile α is admissible if and only if it is an incentive compatible individually rational equilibrium for the agents through the design of the output-contingent contracts. Proof: To find an incentive compatible payment contract, we look for the solution of the following system of linear inequalities in z ik X πk (α) π k (a j i,α i) z ik v i (α i ) v i (a j i ) for all aj i k Let the set A i be indexed by a j i. The solution exists if and only if the following is true: X µ j i πk (α) π k (a j i,α i) =0,µ j i 0 implies () k X µ j i vi (α i ) v i (a j i,α i) 0 (2) There is no loss of generality in assuming that P µ j i =. Let the mixed strategy with probability µ j i on action a j i be denoted by α 0 i, then the assumption in () says that π(α) =π(α 0 i,α i ), and the conclusion (2) is v i (α 0 i) v i (α i ).Thisisexactlythestatementthatprofitable deviations by player i are detectable. It is quite easy to satisfy the individual rationality condition. Let z ik be an incentive compatible payment contract, and choose t i such that u i (α i )+t i u i0 for all i Let zik 0 = z ik + t i. The payment t i is independent of k. It is a noncontingent payment to agent i. The introduction of t i does not change the incentive property of z ik, and at the same time makes the contract individually rational Note that an efficient strategy profile must be admissible. We have the following full surplus extraction result under moral hazards. It corresponds to the Cremer and McLean (988) full surplus extraction result for the asymmetric information models. Theorem 3 Let α be an efficient admissible strategy profile. Then the principal can find an incentive compatible contract so that α is a Nash equilibrium and u i (α) =u i0 for all i. All the surplus W (α) P i u i0 from production goes to the principal. Proof. At the end of the previous proof, just choose t i = u i0 u i (α i ). 6
7 3 Partnership Contracts Since the individual rationality condition can be easily handled in our model. We shall omit it from our discussions from now on. Consider now the case when there is no principal. The agents agree among themselves the payments contracts. In this case, we refer to the agents as partners and the payment contracts as share contracts. The partnership incentive problem is to find conditions under which there are revenue dependent share contracts s ik so that the partners have the incentive to choose the profile α with the highest possible total payoff. One form of budget constraints usually used in the literature is X s ik = y k (3) i Let α be an admissible strategy profile. Not all admissible strategy profile can be an incentive compatible equilibrium through the design of the payment contract satisfying the exact budget constraints (3). In fact, we shall give an example of a partnership game in which the efficient strategy profile is not an incentive compatible equilibrium whatever payment contracts are agreed upon by the partners. Although such examples are known in the literature, we find it useful to use one simple example for illustrating our ideas in the paper. Example 4 There are two possible outputs y =24,y 2 =2. When both partners work, the probability of high output is 2. If only one works, the 3 probability is, and if neither works, it is 0. The disutility (cost) of work 6 is 3.5 for both, and shirking has 0 cost. E(w, w) =20 7=3 E(w, s) 3.5 =E(s, w) 3.5 =0.5 E(s, s) 0=2 Hence it should be clear that (work, work) is the efficient strategy profile of the game. It is easily seen to be admissible. We want to show that this is not a Nash equilibrium for any choice of the contracts s ik satisfying (3). 7
8 Given any choice of payment contracts of the partners s ik, the payoffs to the partners are as follows When both work: ( s + 3 s 2, s 2+ 3 s 22) When only player one works: ( s s 2, 6 s s 22) When only player two works: ( 6 s s 2, s s 22) When no one works: (s 2,s 22 ) Suppose (work, work) is a Nash equilibrium, we want to derive a contradiction. The Nash equilibrium property for player one requires that s + 3 s 2 6 s s 2 which yields 2 s 2 s or s s 2 7 Similarly, the equilibrium property for player two implies that s 2 s 22 7 Summing the two requirements together, and use (3), we get (s + s 2 ) (s 2 + s 22 ) 7 or y y 2 4 which is contradictory, as y =24,y 2 =2. This shows that there is no way to design the payment contracts satisfying (3) and achieve the incentive compatible efficient outcome (work, work). There is a necessary and sufficient condition in the literature for a strategy profile α to be an incentive compatible equilibrium with the proper choice of the contracts s ik satisfying (3). In Legros and Matsushima (99, Theorem 2), the condition is that a certain measure of the likelihood of deviation is bounded above. In other words, the "degree" of the incentive to deviate is not infinite. Although this is a good condition with some intuition,it is not the condition that we find useful for our purpose. Instead, our condition is more in the spirit of the mathematical conditions in Lemma A of their paper, but with a further mathematical manipulation to obtain an economic interpretation. There are several versions of similar conditions in section 3 of d Aspremont 8
9 and Gérard-Varet (998). However, none of those in the literature is stated in the way useful for us here. Instead, I shall state the conditions through the concept of unidentifiable deviations and the "surplus" from such deviations. Our condition is that the "surplus" from unidentifiable deviations should be negative. We refer to it as the "No Surplus Condition". Such "surplus" concept is useful when we consider the problem of optimal contracts later. Consider the collection of deviations α 0 i,i=, 2...n,We say that the collection of deviations α 0 = {α 0,α 0 2,...,α 0 n} are unidentifiable deviations if π(α 0 i,α i ),i=, 2,...,nare all identical. If α 0 = {α 0,α 0 2,...,α 0 n} are unidentifiable deviations, we let E 0 = E(α 0 )=E(α 0 i,α i ) be the common expected revenue after deviations. Let the total surplus from the deviations be defined as Ã! Ã! nx nx S(α 0 )= E0 v i (α 0 i) E(α) v i (α i ) i= = E0 E(α) nx [v i (α 0 i) v i (α i )] i= We say that the No Surplus Condition is satisfied at α, if for all unidentifiable deviations α 0 = {α 0 i} n i=, wehaves(α 0 ) 0. Note that if the "pairwise identifiability" conditions in Fudenberg, Levine and Maskin (994) are satisfied, then the No Surplus Condition is also satisfied. Note also that the admissibility condition is automatically satisfied when the No Surplus Condition holds. Theorem 5 The mixed strategy profile α is an incentive compatible equilibrium through the design of the share contracts satisfying the exact budget constraints (3) if and only if it satisfies the No Surplus Condition. Proof. It is quite easy to show that the no surplus condition is a necessary condition. Let {α 0 i} n i=be unidentifiable deviations. When partner i deviates to α 0 i, the change in payoff to partner i is E(α 0 i,α i ) v i (α 0 i) (E(α) v i (α i )). Let s ik be the sharing rule satisfying the incentive conditions and (3). We have the following incentive inequalities KX [π k (α 0 i,α i ) π k (α)]s ik v i (α 0 i) v i (α i ) (4) k= Summing over i, we have nx i= KX [π k (α 0 i,α i ) π k (α)]s ik k= 9 i= nx [v i (α 0 i) v i (α i )] (5) i=
10 Since π k (α 0 i,α i ) is independent of i, we have à KX nx! nx [π k (α 0,α ) π k (α)] s ik [v i (α 0 i) v i (α i )] (6) or or k= i= KX [π k (α 0,α ) π k (α)]y k k= E 0 E(α) i= nx [v i (α 0 i) v i (α i )] (7) i= nx [v i (α 0 i) v i (α i )] (8) i= hence the no surplus condition holds at α. To prove sufficiency, we look for the solutions in s ik of the following inequalities v i (α 0 i)+ KX π k (α 0 i,α i )s ik v i (α i )+ k= KX π k (α)s ik for all α i (9) k= nx s ik = y k for all k (0) i= We can simplify the problem by looking at the pure strategy deviations only. That is, it is sufficient to consider the following incentive inequalities for all pure strategy deviations a j i K v i (a j i )+ X π k (a j i,α i)s ik v i (α i )+ k= KX π k (α)s ik for all a j i () k= nx s ik = y k for all k (2) i= The above inequalities can be rewritten as KX [π k (α) π k (a j i,α i)]s ik v i (α i ) v i (a j i ) for all aj i (3) k= nx s ik = y k for all k (4) i= Thesolutionexistsifforallµ j i 0,η k satisfying X [π k (α) π k (a j i,α i)]µ j i + η k =0for all k and i (5) j 0
11 we must have X X [v i (α i ) v i (a j i )]µj i + X i j k η k y k 0 (6) Let µ j i 0,η k satisfy (5). We want to show (6) if α satisfies the P no surplus condition. Choose a large enough constant c>0 such that j µj i /c for all i. Let α i be the mixed strategy of the partner i with probability of choosing a j i given by α i (a j i )=µj i c + α(aj i )( X j 0 µ j0 i c ) (7) We have v i (α i ) v i (α 0 i)= X j µ j i c v i(α i ) X j µ j i c v i(a j i ) (8) = X j [v i (α i ) v i (a j i )]µj i c and π k (α) π k (α 0 i,α i )= X j µ j i c π k(α) X j µ j i c π k(a j i,α i) (9) = X j [π k (α) π k (a j i,α i)] µj i c Conditions (5) and (9) then imply that π k (α) π k (α 0 i,α i )= η k for all i and k (20) c Hence the deviations α 0 i are not identifiable.. By the no surplus condition, we have X [v i (α i ) v i (α 0 i)] + X i k Using condition (8), we then get X X [v i (α i ) v i (a j i )]µj i c + X i j k η k c y k 0 η k c y k 0 which is exactly the condition (6) we want to prove. At the efficient profile α, the following result says that there is no need to consider the case when the expected output after deviation is larger than that of the efficient expected output.
12 Lemma 6 Let E 0 = E(α 0 i,α i) be the common expected output for the unidentifiable deviations α 0 i. The no surplus condition is automatically satisfied if E 0 E(α ) Proof. Let α 0 i be unidentifiable deviations. Let E 0 = E(α 0 i,α i) be the common expected output after deviations. By the efficiency property of the profile α, no unilateral deviation by any partner can increase the total net benefit, hence we have E 0 v i (α 0 i) E(α ) v i (α i ) (2) Sum (2) over i, we get nx ne 0 v i (α 0 i) ne(α ) Hencewehave nx v i (α i ) i= i= nx v i (α i ) (22) i= nx v i (α 0 i) n[e(α ) E 0 ] E(α ) E 0 (23) i= and the no surplus condition holds. An immediate corollary of the lemma is Corollary 7 Let α be an efficient strategy profile. Then α is an incentive compatible equilibrium through the design of the share contracts satisfying the exact budget constraints (3) if and only if it satisfies the No Surplus Condition for all unidentifiable deviations with E 0 <E(α ). We can use the no surplus condition to argue that it is more difficult to construct efficient incentives in large partnerships than in small ones. Let there be two partners with A = A 2. Assume that the two partners are symmetric in the sense that π(a,a 2 )=π(a 2,a ) for all a,a 2. Let a =(a,a 2),a = a 2 be a symmetric efficient action profile. Assume that there are only two revenue levels y =0or T. Let p be the probability of the high output T at a. When a partner exerts less effort a 0 i <a i, let p(a 0 i) be the probability of the high output at (a 0 i,a i). The efficiency condition at a requires that (p p(a 0 i))t v i (a i ) v i (a 0 i). The no surplus condition, hence the existence of efficient incentives, requires that (p p(a 0 i))t 2(v i (a i ) v i (a 0 i)). If there are n such symmetric partners, then the no surplus condition requires that (p p(a 0 i))t n(v i (a i ) v i (a 0 i)) or (p p(a 0 i)) T n v i(a i ) v i (a 0 i) (24) 2
13 Assume that the per capita revenue T involved is more or less fixed as n n gets larger. With the larger number of partners, the individual impact on the success probabilities is likely to be smaller. Thecostishowever fixed. Hence the condition becomes more stringent as n becomes larger. With a larger number of partners, it then becomes clear that the no surplus condition is often violated, and there is no efficient incentives for such partnerships. 4 Weaker Budget Constraints From example 4, we know that in general the best we can hope for is to find the second best equilibrium, one that is best possible in the presence of moral hazards and imperfect monitoring. For the example 4, we want to show that (shirk, shirk) is a second best equilibrium when the share contracts are required to satisfy the exact constraints (3). Thepurestrategyprofiles (work, shirk), (shirk, work) are less efficient than (shirk, shirk), hence any outcome α which is more efficient must have some completely mixed strategy α i. We will show that both players in fact have to use a completely mixed strategy. Suppose one of the player, say player two, uses a pure strategy in equilibrium, and player one s strategy α is completely mixed. If player two s strategy is work, then the equilibrium condition for player one implies that s + 3 s 2 = 6 s s 2 which is equivalent to s s 2 =7 By (3), we must have s 2 s 22 =5 (25) But we can show that with this contract, work is not optimal for player two. Let (p, p) be the mixed strategy of player one with probability p of working. If player two chooses w, the payoff is [ 2 3 p + 6 ( p)]s 2 +[ 2 3 p 6 ( p)]s =( p)s 2 +( p)s while if he chooses s, the payoff is 6 ps 2 +( 6 p)s 22 3
14 If w were optimal for player two, we must have ( p)s 2 +( p)s ps 2 +( 6 p)s 22 which translates into ( p)(s 2 s 22 ) 3.5 and from (25), we have p 3.5 However this is a contradiction. The highest value for p is, hence the left-hand side is bounded above by < 3.5. Hence we have 6 3 shown that w is not optimal for player two, and it must be the case that player two s strategy is shirk. In this case, the equilibrium is only as efficient as (shirk, shirk). Hencewehaveshownthatboth playersmust use completely mixed strategies to be more efficient than (work, work). We now show that it is impossible to have a completely mixed Nash equilibrium. If there is a completely mixed Nash equilibrium under the payment contract s ik, then (shirk, shirk) is no longer a dominant strategy for either player. For player one, this means that either or Hence, either we have or we have s + 3 s 2 > 6 s s s s 2 >s 2 s s 2 > 7 s s 2 > 27 In either case, we have s s 2 > 7. Using the same argument for player two, we also conclude that s 2 s 22 > 7. Taken together, we must have y + y 2 > 4 and again we get a contradiction. Hence there exists no completely mixed Nash equilibrium under any payment contract s ik. We have proved that (shirk, shirk) is a second best equilibrium through the use of share contracts satisfying the exact constraints (3). The second best contracts we just established is subject to questioning. It is in fact possible to do better than the solution (shirk, shirk) if 4
15 the partners are willing to distribute less than the full amount of outputs and throw the undistributed outputs away when the performance is bad. If the outputs can be disposed freely, then any admissible strategy can be incentive compatible (see Theorem 8). For instance, in example 4, consider the strategy pair (work, work). We have shown that it is not incentive compatible when the budget constraints are satisfied exactly. Now consider the case when the outputs can be disposed freely, so that the following weaker version of the budget constraints are imposed X s ik y k (26) i We can show that (work, work) is now incentive compatible with the weaker budget constraints. Let s = s 2 =2,s 2 = s 22 =5 When the output is 2, only 0 units are distributed to the players, and 2 units are disposed off. With such contracts in place, (work, work) is now a Nash equilibrium, as and s + 3 s 2 = 6 = 6 s s s 2+ 3 s 22 = 6 = 6 s s 22 Note that even though the efficient strategy (work, work) is now incentive compatible, it does not mean that contract is efficient. The total amount of 2 units of output is wasted when the outcome is bad. This loss of efficiency can be computed as 3 2=2 3 By including this measure of inefficiency into our consideration, the efficiency measure of the contract is given by the expected total output minus the sum of the expected costs and the expected waste from disposal. Therefore in such an equilibrium, the efficiency measure is given by =2 3 We have shown earlier that we cannot do better than (shirk, shirk) with the efficiency measure 2, if we insist on the strict budget constraints. Allowing for the weaker budget constraints (thus throwing away resources 5
16 occasionally) actually makes sense. The contract arrangement is better than the equilibrium (shirk, shirk). We have the following general result when the weaker budget constraints are used. Theorem 8 If α is admissible, then it is incentive compatible with the weaker budget constraints (26). Furthermore, admissibility is equivalent to incentive compatibility with the weaker budget constraints (26) Proof. Let z ik be the incentive compatible payment contracts obtained in Theorem 5. Let x k = P i z ik. We can choose t 0 large enough so that x k t y k for all k and let s ik = z ik t, we have X s ik = t + X z ik = t + x k y k i i and (26) is satisfied, while all the incentive properties are unchanged. Borrowing the terminology from the implementation literature, we can α implementable, or we can refer to it also as sustainable. The problem of finding optimal contracts can be broken down into steps. The firststepistotakeanadmissibleα as given, and find the optimal incentive compatible s ik to implement α. It is equivalent to minimizing thelossfromdisposal.letl(α) be the the minimum cost of implementing α. This step is a linear programming problem. The second step is to find α to maximize m(α) =W (α) l(α). The function W (α) is wellunderstood. To find l(α), we need to convert the linear programming problem into its dual, and through further transformation, obtain a formula to compute m(α) =W (α) l(α). This is the duality result to be developed in the next section. 5 Duality Given an incentive compatible (or sustainable) α, we want to choose payment contracts so that the incentive constraints are satisfied, and at the same time the expected loss from disposal is minimized. Minimizing the expected loss from disposal is the same as maximizing the expected total payoff of the players from the distributed outputs minus costs. 6
17 Before we can find the optimal α for the second best solution, we will first determine the best payment contract for any given admissible strategy profile α. Let m(α) be the efficiency measure of this best contract. In this section, we determine m(α) for each admissible α. This is needed later to find the overall second best contract. We shall extend the concept of deviation strategies α 0 i to include any vectors p j i = α0 i(a j i ) negative or positive with the only condition P j pj i =. For such possibly infeasible deviation strategies π(α 0 i,α i ),v i (α 0 i) can be mathematically defined. This is done for easy mathematical expressions. It is possible to express our results without using such extended deviation strategies. However, the mathematical expressions will not be as elegant as the one given here. The simpler expressions facilitate computations when the result is applied to the analysis of economic games. Let denote the simplex of the probability distributions over the outcome space Y. We have the following result. Theorem 9 Let α be a completely mixed admissible strategy profile, and α 0 i an extended deviation strategy of player i. Then we have m(α) =minηy X i v i (α 0 i) subject to π(α 0 i,α i )=η for all i and η Proof. The function m(α) is the value of the following maximization problem max X v i (α i )+ X X π k (α)s ik i i k subject to X s ik y k for all k (27) i v i (α i )+ X k π k (α)s ik v i (a i )+ X k π k (a i,α i )s ik for all i and a i Denote the generic element of the set A i by a j i. The maximization problem can be written as max X v i (α i )+ X X π k (α)s ik (28) i i 7 k
18 subject to X s ik y k for all k (29) i X πk (a j i,α i) π k (α) s ik v i (a j i ) v i(α i ) for all a j i A i k We shall refer to this as the primary problem. Because of the admissibility of α, the system of constraints has a solution. The objective function is bounded above by E(α) P i v i(α i ), hence there exists a maximum for the objective function. Let e kk 0 =0when k 6= k 0, and e kk =for all k. To convert to the dual, use the following "switch box" for player i the coefficient π k 0(α) of s ik 0 in the objective function dual var. the coefficient of s ik 0 in the constraints right hand side µ j i π k 0(a j i,α i) π k 0(α) v i (a j i ) v i(α i ) η k e kk 0 y k Hence the dual problem is the minimization problem min X v i (α i )+ X η k y k + X X µ j i [v i(a j i ) v i(α i )] (30) i k i j subject to µ j i 0,η k 0 for all i, j, k and X µ j i [π k(a j i,α i) π k (α)] + η k = π k (α) for all i, k (3) j Summing (3) over k, we have X η k = (32) k We have the following minimization problem equivalent to the dual problem min X v i (α i )+ X η k y k + X X µ j i [v i(a j i ) v i(α i )] (33) i k i j 8
19 subject to µ j i 0,η k 0 for all i, j, k, P k η k =, and X µ j i [π k(a j i,α i) π k (α)] + η k = π k (α) for all i, k (34) j We now make use of the dual variables µ j i,η k to construct the strategy variables of the players. Define the extended deviation strategy α 0 i with α 0 i(a j i )=α i(a j i ) µj i +(X j µ j i )α i(a j i ) then we have π(α 0 i,α i ) π(α) = X j µ j i [π(α) π(aj i,α i)] and v i (α 0 i) v i (α i )= X j µ j i [v i(α i ) v i (a j i )] Hence the expression in (33) can be written as X i v i (α i )+ X k η k y k + X i [v i (α i ) v i (α 0 i)] = X k η k y k X i v i (α 0 i) (35) and the constraint (34) can be written as π(α) π(α 0 i,α i )+η = π(α) for all i or π(α 0 i,α i )=η for all i (36) Hence the value of the objective function (33) at µ j i,η k is the value of (35) at a collection of deviation strategies satisfying (36), and hence is larger than the minimum value of the following optimization problem min ηy X i v i (α 0 i) (37) subject to π(α 0 i,α i )=η for all i (38) where η is the vector with the components η k, and is the probability simplex of the outcome space. Conversely, given any collection of extended deviations strategies α 0 i, and η satisfying the constraint (38), define α 00 i = α i + ε(α i α 0 i)=(+ε)α i εα 0 i (39) 9
20 Since α i (a j i ) > 0 for all i, j, we must have pj i = α 00 i (a j i ) > 0 when ε is chosen to be small enough. We have π(α 00 i,α i ) π(α) =ε[π(α) π(α 0 i,α i )] or ε [π(α00 i,α i ) π(α)] = π(α) π(α 0 i,α i ) (40) Similarly, we have We now define µ j i = pj i ε X j ε [v i(α 00 i ) v i (α i )] = v i (α i ) v i (α 0 i) and η k the k-th component of η, then we have µ j i [v i(a j i ) v i(α i )] = ε [v i(α 00 i ) v i (α i )] = v i (α i ) v i (α 0 i) or v i (α 0 i)= v i (α i )+ X µ j i [v i(a j i ) v i(α i )] j Hence the objective function in (37) can be written as ηy X i v i (α 0 i)=ηy + X Ã v i (α i )+ X! µ j i [v i(a j i ) v i(α i )] (4) i j = X v i (α i )+ X η k y k + X X µ j i [v i(a j i ) v i(α)] i k i j which is the same as in (33). The constraint equation in (38) can be written as and from (40), it becomes π(α) π(α 0 i,α i )=π(α) η with η ε [π(α00 i,α i ) π(α)] = π(α) η with η By the definition of µ j i,η k, it is transformed further into X µ j i [π(aj i,α i) π(α)] = π(α) η with η j 20
21 or X µ j i [π k(a j i,α i) π k (α)] + η k = π k (α) for all i, k and η j whichisthesameonein(34). Therefore, we know that given any collection of extended deviation strategies α 0 i and η satisfying the constraint (38), the value of the objective function (37) is one of the value of the objective function in (33) at µ j i,η k we just defined. This means that the minimum value of the objectivefunction(37)isaslargeastheminimumvalueoftheobjective function (33). We have just shown that the two minimization problems areequivalentandhavethesameminimumvalue. Theproofisnow complete. For boundary strategy profiles, we have the following result. Theorem 0 Let α be an admissible strategy profile and α 0 i an extended deviation strategy for player i. We have m(α) =minηy X i v i (α 0 i) subject to α 0 i(a j i ) whenever α i(a j i )= (42) α 0 i(a j i ) 0 whenever α i(a j i )=0 (43) π(α 0 i,α i )=η for all i and η (44) If there exist no non-trivial collection of extended deviation strategies α 0 i satisfying all the constraints in (42) (44), then we must have m(α) = E(α) P i v i(α i ). ProofoftheTheorem: The proof is a refinement of the arguments used in Theorem 9. In the arguments for Theorem 9, given µ j i,η k,wedefine the extended deviation strategies as follows α 0 i(a j i )=α i(a j i ) µj i +(X j µ j i )α i(a j i ) Follow the same arguments as in the proof of Theorem 9, we get a collection of deviation strategies satisfying the constraints (44). If α i (a j i )=, we have α 0 i(a j i )=α i(a j i ) µj i + X µ j i α i(a j i )= j 2
22 If α i (a j i )=0, we have α 0 i(a j i )=α i(a j i ) µj i α i(a j i )=0 Therefore constraints (42) and (43) are satisfied in this choice of deviation strategies. Follow the same step as in the proof of Theorem 9, and we obtain a collection of extended deviation strategies satisfying all the required constraints. In the construction in the other direction, we are given a collection of deviation strategies α 0 i satisfying (42) (44). We defined the following deviation strategies in (39) α 00 i =(+ε)α i εα 0 i and used the property of completely mixed strategy profile α to insure that p j i = α00 i (a j i ) 0 andthenusep j i to define the non-negative µj i. From the constraints, we know that when α i (a j i )=, we have α0 i(a j i ) α i(a j i ). Hence we have α 00 i (a j i )=α i(a j i ) ε[α i(a j i ) α i(a j i )] α i(a j i ) and when ε>0issmall enough, we also have α 00 i (a j i ) > 0. When α i(a j i )= 0, we have the constraint property α 0 i(a j i ) 0. Hence we have α 00 i (a j i )= εα0 i(a j i ) 0 andagainwecaninsurethatp j i = α00 i (a j i ) 0 from the constraint properties without using the completely mixed property. Hence our arguments used in the proof of the Theorem 9 also insure that µ j i 0,η k 0. This completes the proof that m(α) can be written as stated in the theorem. If there exists no collection of non-trivial extended deviation strategies satisfying all the constraints in the theorem, then the minimum occurs at the trivial one α 0 i = α i, and we must have m(α) =ηy P i v i(α i ). End of Proof. We now give an example of the application of the theorems to determine the efficiency measure m(α). The same method will be used in the next section to derive a general formula for m(α) in the 2-by-2-by-2 games. Knowing the behavior of m(α) is essential for finding the optimal contracts. 22
23 Example We shall use the same partnership in example 4. Let α =(work, work). HenceweneedtoapplyTheorem0. Theextended deviation strategy α 0 should be of the form (x, x) with x. To get the minimum possible value for the expression in that theorem, x should satisfy the following equation µ 0 µ 2 (x, x) 3 6 = 0 6 or 2 3 x + ( x) = 6 and we get x = 5. The two extended deviations strategies 3 α0 =( 5, 2)= 3 3 α 0 2 are not identifiable, and satisfy all the constraints in Theorem 0. We have m(α) =y v (α 0 ) v 2 (α 0 2)= =2 3 We have constructed the payment contracts earlier with the same total payoff for the players. Hence the payment contract we constructed is an optimal one for the partners, conditional on the implementation of α = (work, work). To know whether it is an optimal (second best) contract, we need to know how m(α) varies with α. 6 Two-by-Two-by-Two games Let y >y 2 be the two possible signals. Let a,a 2 ; b,b 2 be the two pure strategies of player one and two respectively. Let π ij be the probability of signal y occurring when the chosen strategy profile is (a i,b j ).Letthe costs of choosing a i,b j by players, 2 be c i = v i (a i ),d j = v j (b j ). In our analysis, by changing the label if necessary, we can assume and we can also assume c >c 2,d >d 2 (45) (π,π 2 ) 6= (π 2,π 22 ), (π,π 2 ) 6= (π 2,π 22 ) (46) to avoid the trivial cases. It is useful to think of a,b as higher efforts (or consuming more resources in adopting the strategies), therefore higher costs for the respective players. Let α =(p,p 2 ) be the player one strategy with probabilities p,p 2 of using the pure strategies a,a 2 respectively. Similarly let α 2 =(q,q 2 ) 23
24 be the player two strategy. We will use the simplified notation (p,q ) for the strategy profile ((p, p ), (q, q )) when the context is clear. At the strategy profile α =(α,α 2 ), the change of probability of y occurring due to player one s "unitary" deviation in the direction of more effort is denoted by r and is given by µ µ π π r =(, ) 2 q =(π π 2 π 22 q π 2 )q +(π 2 π 22 )q 2 2 Hencewehave r = π 2 π 22 +(π + π 22 π 2 π 2 )q (47) Similarly, when player two deviates in the same "unitary" direction (, ), the change of probability of y is given by µ µ π π r 2 =(p,p 2 ) 2 =(π π 2 π 22 π 2 )p +(π 2 π 22 )p 2 hence r 2 = π 2 π 22 +(π + π 22 π 2 π 2 )p (48) When r 6=0,r 2 6=0, let T = y y 2 c c 2 r d d 2 r 2 To compute m(α), we need to (i) adopt individual directions of deviations (more or less effort in the strategy space) so that ±r, ±r 2 have the same signs: (ii) adjust individual intensity of deviations (probability of deviations in the strategy space) so that ±k r, ±k 2 r 2 have the same magnitude; (iii) choose common direction of deviations in the probability of outcomes so that T becomes negative; (iv) choose common scale of deviations in the probability space of outcomes so that these probabilities do not become negative. In the first two steps, we obtain unidentifiable deviations. In the last two steps, we compute the total surplus from such deviations. In thelaststep,althoughtherequirementseemstobeintuitive,whenitis translated into the probability space of strategies, it may require intensity of deviations leading to negative probabilities. This is the reason we extend the notions of deviation strategies (just for the computation in Theorems 9 and 0). A clear distinction between the three spaces: α in the strategy space, π in the outcome space, and T in the utility space is essential for the understanding of the following analysis. It should be noted that in general r i,t are functions of the strategy profile and will be denoted by r i (α),t(α) when such dependence needs 24
25 to be spelled out. Let Π = π + π 22 π 2 π 2. When Π =0,r = π 2 π 22,r 2 = π 2 π 22,T are constants. In this case, the analysis becomes easier. When Π 6= 0, there will be more complications. First we shall assume that Π =0, and take α to be an admissible completely mixed strategy profile. Notethatwemusthaver 6= 0, otherwisewehaveπ 2 π 22 =0. Since Π = π + π 22 π 2 π 2 =0, we must have π π 2 =0as well, violating the assumption in (46). Similarly, we must have r 2 6=0as well. The computations will depend on the sign of T. If T 0, the value of m(α) will computed at η =(, 0); if T 0, it will be computed at η =(0, ). Theorem 2 Assume that Π =0and T = y y 2 c c 2 π 2 π 22 d d 2 π 2 π For a completely mixed admissible strategy profile α =(p,q ), we have m(α)=y c 2 d 2 (c c 2 )( π 22 π 2 π 22 π 2 π 22 π 2 π 22 q ) (d d 2 )( π 22 π 2 π 22 π 2 π 22 π 2 π 22 p ) Proof: Let k = π (α),k 2 = π (α) r r 2 Define the extended deviation strategies as follows (49) α 0 = α + k (sgn(r ), sgn(r )) = (p + sgn(r )k, p sgn(r )k ) α 0 2 = α 2 + k 2 (sgn(r 2 ), sgn(r 2 )) = (q + sgn(r 2 )k 2, q sgn(r 2 )k 2 ) We have π (α 0,α 2 )=π (α)+sgn(r )k r = π (α)+ π (α) = hence we have π(α 0,α 2 )=(, 0) (50) and similarly π(α,α 0 2)=(, 0) Thus α 0,α 0 2 are unidentifiable deviations. The total surplus from these deviations is 25
26 ( π(α))(y y 2 ) sgn(r )k (c c 2 ) sgn(r )k 2 (d d 2 ) µ =( π(α)) y y 2 c c 2 sgn(r ) r d d 2 sgn(r 2 ) r 2 µ =( π(α)) y y 2 c c 2 d d 2 =( π(α))t 0 r r 2 and therefore we have m(α) =y c 2 d 2 (c c 2 )(p +sgn(r )k ) (d d 2 )(q +sgn(r 2 )k 2 ) (5) We want to compute m(α). First we relate π (α) to r, µ µ π π π (α)=(p, p ) 2 q π 2 π 22 q 2 =(0, ) µ µ π π 2 q + p π 2 π 22 q (, ) 2 µ µ π π 2 q π 2 π 22 q 2 Hencewehave π (α) =π 2 q + π 22 q 2 + p r (52) From the definition for k, we have k = π (α) r = π 2q π 22 q 2 r sgn(r )p and hence sgn(r )p + k = π 2q π 22 q 2 r Multiply by sgn(r ), we have p + sgn(r )k = π 2q π 22 q 2 r We can substitute q for q 2, and we have or p + sgn(r )k = π 22 (π 2 π 22 )q r (53) p + sgn(r )k = π 22 π 2 π 22 π 2 π 22 π 2 π 22 q (54) 26
27 Similarly, for player two we have or q + sgn(r 2 )k 2 = π 2p π 22 p 2 r 2 = π 22 (π 2 π 22 )p r 2 (55) q + sgn(r 2 )k 2 = π 22 π 2 π 22 π 2 π 22 π 2 π 22 p (56) Substituting (54) and (56) into (5), we have End of Proof. m(α)=y c 2 d 2 (c c 2 )( π 22 π 2 π 22 π 2 π 22 π 2 π 22 q ) (d d 2 )( π 22 π 2 π 22 π 2 π 22 π 2 π 22 p ) Now we want to consider the case when T = y y 2 c c 2 0. We have the following result. d d 2 π 2 π 22 π 2 π 22 Theorem 3 Assume that Π =0and T = y y 2 c c 2 π 2 π 22 d d 2 π 2 π For a completely mixed admissible strategy profile α =(p,q ), we have m(α)=y 2 c 2 d 2 + (c c 2 )π 22 π 2 π 22 + (c c 2 )(π 2 π 22 ) π 2 π 22 q + (d d 2 )π 22 π 2 π 22 + (d d 2 )(π 2 π 22 ) π 2 π 22 p Proofofthetheorem: Let k = π (α),k 2 = π (α) r r 2 Define the extended deviation strategies as follows (57) α 0 = α k (sgn(r ), sgn(r )) = (p sgn(r )k, p + sgn(r )k ) α 0 2 = α 2 k 2 (sgn(r 2 ), sgn(r 2 )) = (q sgn(r 2 )k 2, q + sgn(r 2 )k 2 ) We have π (α 0,α 2 )=π (α) sgn(r )k r = π (α) π (α) =0 hence we have π(α 0,α 2 )=(0, ) (58) 27
28 and similarly π(α,α 0 2)=(0, ) Thus α 0,α 0 2 are unidentifiable deviations. these deviations is The total surplus from π (α)(y y 2 )+sgn(r )k (c c 2 )+sgn(r )k 2 (d d 2 ) µ = π (α) y y 2 c c 2 sgn(r ) r d d 2 sgn(r 2 ) r 2 µ = π (α) y y 2 c c 2 d d 2 = π(α)t 0 r r 2 and therefore we have m(α) =y 2 c 2 d 2 (c c 2 )(p sgn(r )k ) (d d 2 )(q sgn(r 2 )k 2 ) (59) From the definition for k, and (52), we have k = π (α) r = π 2q + π 22 q 2 r + sgn(r )p and hence sgn(r )p + k = π 2q + π 22 q 2 r Multiply by sgn(r ), we have p sgn(r )k = π 2q π 22 q 2 r We can substitute q for q 2, and we have or p sgn(r )k = π 22 (π 2 π 22 )q r p sgn(r )k = π 22 π 2 π 22 π 2 π 22 π 2 π 22 q (60) Similarly, for player two we have q sgn(r 2 )k 2 = π 2p π 22 p 2 r 2 = π 22 (π 2 π 22 )p r 2 28
29 or q sgn(r 2 )k 2 = π 22 π 2 π 22 π 2 π 22 π 2 π 22 p (6) Substituting (60) and (6) into (59), we have or π 22 m(α)=y 2 c 2 d 2 (c c 2 )( π 2 π 22 q ) π 2 π 22 π 2 π 22 π 22 (d d 2 )( π 2 π 22 p ) π 2 π 22 π 2 π 22 m(α)=y 2 c 2 d 2 + (c c 2 )π 22 π 2 π 22 + (c c 2 )(π 2 π 22 ) π 2 π 22 q End of Proof. + (d d 2 )π 22 π 2 π 22 + (d d 2 )(π 2 π 22 ) π 2 π 22 p Now, we consider the more complex case when Π 6= 0. If α is admissible, and r =0, then player one is indifferent between the two strategies a,a 2. The unidentifiable deviations must satisfy π(α 0,α 2 ) π(α) =π(α,α 0 2) π(α) =0 By the admissibility condition, we must have v i (α 0 i) v i (α i ) 0 for i =, 2 and hence m(α) =W (α) in this case. Similarly, if r 2 =0, we also have m(α) =W (α). We will now assume that r 6=0,r 2 6=0. Theorem 4 Suppose Π 6= 0,r 6=0,r 2 6=0. For an admissible completely mixed strategy profile α =(p,q ) with T = y y 2 c c 2 r d d 2 r 2 0, we have m(α)=y c 2 d 2 (c c 2 )(π 22 π 2 ) (d d 2 )(π 22 π 2 ) π + π 22 π 2 π 2 π + π 22 π 2 π 2 (c c 2 )( + π 2π 2 π π 22 π +π 22 π 2 π 2 ) π 2 π 22 +(π + π 22 π 2 π 2 )q (d d 2 )( + π 2π 2 π π 22 π +π 22 π 2 π 2 ) π 2 π 22 +(π + π 22 π 2 π 2 )p 29
30 Proof: If T 0, from (53), we have p + sgn(r )k = π 22 (π 2 π 22 )q r π 22 (π 2 π 22 )q = π 2 π 22 +(π + π 22 π 2 π 2 )q Reduce the numerator into a constant term, making use of the equation, π 22 + (π 22 π 2 )(π 22 π 2 ) π + π 22 π 2 π 2 = we get the following expression for p + sgn(r )k π 2 π 2 π π 22 π + π 22 π 2 π 2 (62) π 22 π 2 + π 2π 2 π π 22 π + +π 22 π 2 π 2 (63) π + π 22 π 2 π 2 π 2 π 22 +(π + π 22 π 2 π 2 )q Similarly, q + sgn(r 2 )k 2 is given by π 22 π 2 + π 2π 2 π π 22 π + +π 22 π 2 π 2 (64) π + π 22 π 2 π 2 π 2 π 22 +(π + π 22 π 2 π 2 )p Substitute (63) and (64) into (5), we have m(α)=y c 2 d 2 (c c 2 )(π 22 π 2 ) (d d 2 )(π 22 π 2 ) π + π 22 π 2 π 2 π + π 22 π 2 π 2 (c c 2 )( + π 2π 2 π π 22 π +π 22 π 2 π 2 ) π 2 π 22 +(π + π 22 π 2 π 2 )q (d d 2 )( + π 2π 2 π π 22 π +π 22 π 2 π 2 ) π 2 π 22 +(π + π 22 π 2 π 2 )p End of Proof. Similarly, for Π 6= 0,T 0, we have the following result. 30
31 Theorem 5 Suppose Π 6= 0,r 6=0,r 2 6=0. For an admissible completely mixed strategy profile α =(p,q ) with T = y y 2 c c 2 r d d 2 r 2 0, we have m(α)=y c 2 d 2 (c c 2 )(π 22 π 2 ) (d d 2 )(π 22 π 2 ) π + π 22 π 2 π 2 π + π 22 π 2 π 2 (c c 2 ) π 2π 2 π π 22 π +π 22 π 2 π 2 π 2 π 22 +(π + π 22 π 2 π 2 )q (d d 2 ) π 2π 2 π π 22 π +π 22 π 2 π 2 ) π 2 π 22 +(π + π 22 π 2 π 2 )p To find sup α m(α), it is important that we consider boundary strategy profiles. We will see that it occurs often at pure strategy profiles. The above arguments can also be applied to "boundary" strategy profiles aswell,aslongastheunidentifiable deviations α 0,α 0 2 with a negative surplus also satisfy the boundary conditions in Theorem 0. This means that there is a feasible direction of unidentifiable deviations with a positive surplus at the strategy profile. In particular, if r < 0,T 0, deviations in the direction of deviation (, ) is feasible and yields positive total surplus when p i > 0,q i > 0. Henceforthestrategyprofile with p =, 0 <q <, Theorem 2 applies only if r > 0,T 0; in other cases the total surplus from unidentifiable and feasible deviations is always 0, hence we must have m(α) =W (α). Similarly, for the strategy profile with 0 <p <,q =, Theorem 2 applies only if r 2 > 0,T 0; in other cases we must have m(α) =W (α). For the strategy profile with p = 0, 0 < q <, Theorem 2 applies only if r < 0,T 0; in other cases, we must have m(α) =W (α). For the strategy profile with 0 <p <,q =0, Theorem 2 applies only if r 2 < 0,T 0. For the profile p ==q, Theorem 2 applies only if r > 0,r 2 > 0,T 0; in other cases we must have m(α) = W (α). For the strategy profile p =,q = 0, Theorem 2 applies only if r > 0,r 2 < 0,T 0; in other cases we must have m(α) = W (α). For the strategy profile p =0,q =, Theorem 2 applies only if r < 0,r 2 > 0,T 0; in other caseswemusthavem(α) =W (α). For the strategy profile p =0=q, Theorem 2 applies only if r < 0,r 2 < 0,T 0; in other cases we must have m(α) =W (α). Thus we have the following result for all strategy profiles. Theorem 6 Assume that Π =0and T = y y 2 c c 2 π 2 π 22 d d 2 π 2 π For any mixed admissible strategy profile α =(p,q ), we have the same formula given in Theorem 2 if and only if all of the following four 3
Mechanism Design: Basic Concepts
Advanced Microeconomic Theory: Economics 521b Spring 2011 Juuso Välimäki Mechanism Design: Basic Concepts The setup is similar to that of a Bayesian game. The ingredients are: 1. Set of players, i {1,
More informationApproximate Implementability with Ex Post Budget Balance
Approximate Implementability with Ex Post Budget Balance Ichiro Obara and David Rahman April 10, 2006 Abstract This paper characterizes public and private monitoring technologies with respect to which
More informationMoral hazard in teams
Division of the Humanities and Social Sciences Moral hazard in teams KC Border November 2004 These notes are based on the first part of Moral hazard in teams by Bengt Holmström [1], and fills in the gaps
More informationMicroeconomic Theory (501b) Problem Set 10. Auctions and Moral Hazard Suggested Solution: Tibor Heumann
Dirk Bergemann Department of Economics Yale University Microeconomic Theory (50b) Problem Set 0. Auctions and Moral Hazard Suggested Solution: Tibor Heumann 4/5/4 This problem set is due on Tuesday, 4//4..
More informationEC476 Contracts and Organizations, Part III: Lecture 2
EC476 Contracts and Organizations, Part III: Lecture 2 Leonardo Felli 32L.G.06 19 January 2015 Moral Hazard: Consider the contractual relationship between two agents (a principal and an agent) The principal
More informationInformed Principal in Private-Value Environments
Informed Principal in Private-Value Environments Tymofiy Mylovanov Thomas Tröger University of Bonn June 21, 2008 1/28 Motivation 2/28 Motivation In most applications of mechanism design, the proposer
More informationRoy Radner and incentive theory
Rev. Econ. Design 6, 311 324 (2001) c Springer-Verlag 2001 Roy Radner and incentive theory Eric S. Maskin Institute for Advanced Study and Princeton University, Princeton, NJ 08540, USA (e-mail: maskin@ias.edu)
More informationGame Theory and Economics of Contracts Lecture 5 Static Single-agent Moral Hazard Model
Game Theory and Economics of Contracts Lecture 5 Static Single-agent Moral Hazard Model Yu (Larry) Chen School of Economics, Nanjing University Fall 2015 Principal-Agent Relationship Principal-agent relationship
More informationCombinatorial Agency of Threshold Functions
Combinatorial Agency of Threshold Functions Shaili Jain 1 and David C. Parkes 2 1 Yale University, New Haven, CT shaili.jain@yale.edu 2 Harvard University, Cambridge, MA parkes@eecs.harvard.edu Abstract.
More informationMechanism Design: Bayesian Incentive Compatibility
May 30, 2013 Setup X : finite set of public alternatives X = {x 1,..., x K } Θ i : the set of possible types for player i, F i is the marginal distribution of θ i. We assume types are independently distributed.
More informationMechanism Design with Ambiguous Transfers
Mechanism Design with Ambiguous Transfers Huiyi Guo Texas A&M University December 31, 2018 1 / 27 Motivation In practice, some mechanism designers introduce uncertain rules to the mechanisms, e.g., Priceline
More informationAssortative Matching in Two-sided Continuum Economies
Assortative Matching in Two-sided Continuum Economies Patrick Legros and Andrew Newman February 2006 (revised March 2007) Abstract We consider two-sided markets with a continuum of agents and a finite
More informationIntroduction. 1 University of Pennsylvania, Wharton Finance Department, Steinberg Hall-Dietrich Hall, 3620
May 16, 2006 Philip Bond 1 Are cheap talk and hard evidence both needed in the courtroom? Abstract: In a recent paper, Bull and Watson (2004) present a formal model of verifiability in which cheap messages
More informationMoral Hazard and Equilibrium Matchings in a Market for Partnerships
Moral Hazard and Equilibrium Matchings in a Market for Partnerships Ayça Kaya University of Iowa Galina Vereshchagina Arizona State University Abstract This paper embeds a repeated partnership game with
More informationModule 8: Multi-Agent Models of Moral Hazard
Module 8: Multi-Agent Models of Moral Hazard Information Economics (Ec 515) George Georgiadis Types of models: 1. No relation among agents. an many agents make contracting easier? 2. Agents shocks are
More informationOptimal Shirking in Teams
Optimal Shirking in Teams Hajime Kobayashi Osaka Prefecture University Katsunori Ohta Wakayama University November 18, 2009 Tadashi Sekiguchi Kyoto University Abstract We study a model of repeated team
More informationDecision, Risk and Operations Working Papers Series
Decision, Risk and Operations Working Papers Series The cost of moral hazard and limited liability in the principal-agent problem F. Balmaceda, S. R. Balseiro, J. R. Correa, N. E. Stier-Moses July 2010;
More informationA note on the take-it-or-leave-it bargaining procedure with double moral hazard and risk neutrality
A note on the take-it-or-leave-it bargaining procedure with double moral hazard and risk neutrality A. Citanna HEC - Paris; and GSB - Columbia University, NY September 29, 2003 In this note we study a
More informationContracts in informed-principal problems with moral hazard
Contracts in informed-principal problems with moral hazard Nicholas C Bedard January 20, 2016 Abstract In many cases, an employer has private information about the potential productivity of a worker, who
More informationEquilibrium Refinements
Equilibrium Refinements Mihai Manea MIT Sequential Equilibrium In many games information is imperfect and the only subgame is the original game... subgame perfect equilibrium = Nash equilibrium Play starting
More informationMoral Hazard in Teams
Moral Hazard in Teams Ram Singh Department of Economics September 23, 2009 Ram Singh (Delhi School of Economics) Moral Hazard September 23, 2009 1 / 30 Outline 1 Moral Hazard in Teams: Model 2 Unobservable
More informationOrganization, Careers and Incentives
Organization, Careers and Incentives Chapter 4 Robert Gary-Bobo March 2018 1 / 31 Introduction Introduction A firm is a pyramid of opportunities (Alfred P. Sloan). Promotions can be used to create incentives.
More informationDefinitions and Proofs
Giving Advice vs. Making Decisions: Transparency, Information, and Delegation Online Appendix A Definitions and Proofs A. The Informational Environment The set of states of nature is denoted by = [, ],
More informationOn the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation
MPRA Munich Personal RePEc Archive On the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation Ismail Saglam Ipek University 4 May 2016 Online at https://mpra.ub.uni-muenchen.de/71090/
More informationNotes on Mechanism Designy
Notes on Mechanism Designy ECON 20B - Game Theory Guillermo Ordoñez UCLA February 0, 2006 Mechanism Design. Informal discussion. Mechanisms are particular types of games of incomplete (or asymmetric) information
More informationIntroduction to Mechanism Design
Introduction to Mechanism Design Xianwen Shi University of Toronto Minischool on Variational Problems in Economics September 2014 Introduction to Mechanism Design September 2014 1 / 75 Mechanism Design
More informationBayesian incentive compatible beliefs
Bayesian incentive compatible beliefs Claude d Aspremont CORE, Université catholique de Louvain Louis-André Gérard-Varet Université Louis Pasteur, Strasbourg I and G.R.E.Q.E. - Era CNRS983, Universités
More informationBalanced Bayesian mechanisms
Balanced Bayesian mechanisms Claude d Aspremont 1 Jacques Crémer 2 Louis-André Gérard-Varet 3 9 June, 2003 1 CORE, Louvain University (Address for manuscript correspondence: CORE, 34 voie du Roman Pays,
More informationIndividually Rational, Balanced-Budget Bayesian Mechanisms and the Informed Principal Problem.
Individually Rational, Balanced-Budget Bayesian Mechanisms and the Informed Principal Problem. Grigory Kosenok and Sergei Severinov First Version: June 3, 2002 Second Version: July 15, 2003 This Version:
More informationDeceptive Advertising with Rational Buyers
Deceptive Advertising with Rational Buyers September 6, 016 ONLINE APPENDIX In this Appendix we present in full additional results and extensions which are only mentioned in the paper. In the exposition
More informationA technical appendix for multihoming and compatibility
A technical appendix for multihoming and compatibility Toker Doganoglu and Julian Wright July 19, 2005 We would like to thank two anonymous referees and our editor, Simon Anderson, for their very helpful
More information1 Moral Hazard: Multiple Agents 1.1 Moral Hazard in a Team
1 Moral Hazard: Multiple Agents 1.1 Moral Hazard in a Team Multiple agents (firm?) Partnership: Q jointly affected Individual q i s. (tournaments) Common shocks, cooperations, collusion, monitor- ing.
More informationEntropic Selection of Nash Equilibrium
Entropic Selection of Nash Equilibrium Zeynel Harun Alioğulları Mehmet Barlo February, 2012 Abstract This study argues that Nash equilibria with less variations in players best responses are more appealing.
More informationThis is designed for one 75-minute lecture using Games and Information. October 3, 2006
This is designed for one 75-minute lecture using Games and Information. October 3, 2006 1 7 Moral Hazard: Hidden Actions PRINCIPAL-AGENT MODELS The principal (or uninformed player) is the player who has
More informationRedistribution Mechanisms for Assignment of Heterogeneous Objects
Redistribution Mechanisms for Assignment of Heterogeneous Objects Sujit Gujar Dept of Computer Science and Automation Indian Institute of Science Bangalore, India sujit@csa.iisc.ernet.in Y Narahari Dept
More informationAn Efficient Solution to the Informed Principal Problem
An Efficient Solution to the Informed Principal Problem Sergei Severinov First version: May 2004, This Version: December 2006 Abstract In this paper I study mechanism design by an informed principal. I
More informationNTU IO (I) : Auction Theory and Mechanism Design II Groves Mechanism and AGV Mechansim. u i (x, t i, θ i ) = V i (x, θ i ) + t i,
Meng-Yu Liang NTU O : Auction Theory and Mechanism Design Groves Mechanism and AGV Mechansim + 1 players. Types are drawn from independent distribution P i on [θ i, θ i ] with strictly positive and differentiable
More informationMoral Hazard: Part 1. April 9, 2018
Moral Hazard: Part 1 April 9, 2018 Introduction In a standard moral hazard problem, the agent A is characterized by only one type. As with adverse selection, the principal P wants to engage in an economic
More informationGame Theory, Information, Incentives
Game Theory, Information, Incentives Ronald Wendner Department of Economics Graz University, Austria Course # 320.501: Analytical Methods (part 6) The Moral Hazard Problem Moral hazard as a problem of
More informationControlling versus enabling Online appendix
Controlling versus enabling Online appendix Andrei Hagiu and Julian Wright September, 017 Section 1 shows the sense in which Proposition 1 and in Section 4 of the main paper hold in a much more general
More informationUncertainty and Robustness of Surplus Extraction
arxiv:1811.01320v1 [econ.th] 4 Nov 2018 Uncertainty and Robustness of Surplus Extraction Giuseppe Lopomo Duke University Luca Rigotti University of Pittsburgh Chris Shannon UC Berkeley this version: October
More informationLecture Slides - Part 4
Lecture Slides - Part 4 Bengt Holmstrom MIT February 2, 2016. Bengt Holmstrom (MIT) Lecture Slides - Part 4 February 2, 2016. 1 / 65 Mechanism Design n agents i = 1,..., n agent i has type θ i Θ i which
More informationOnline Appendix for Dynamic Procurement under Uncertainty: Optimal Design and Implications for Incomplete Contracts
Online Appendix for Dynamic Procurement under Uncertainty: Optimal Design and Implications for Incomplete Contracts By Malin Arve and David Martimort I. Concavity and Implementability Conditions In this
More informationCopyright (C) 2013 David K. Levine This document is an open textbook; you can redistribute it and/or modify it under the terms of the Creative
Copyright (C) 2013 David K. Levine This document is an open textbook; you can redistribute it and/or modify it under the terms of the Creative Commons attribution license http://creativecommons.org/licenses/by/2.0/
More informationIntroduction: Asymmetric Information and the Coase Theorem
BGPE Intensive Course: Contracts and Asymmetric Information Introduction: Asymmetric Information and the Coase Theorem Anke Kessler Anke Kessler p. 1/?? Introduction standard neoclassical economic theory
More informationMechanism Design with Ambiguous Transfers
Mechanism Design with Ambiguous Transfers Huiyi Guo Department of Economics, University of Iowa huiyi-guo@uiowa.edu First draft: November 4, 2016 Current draft: September 15, 2017 Abstract This paper introduces
More informationIncentives and the Existence of Pareto-Optimal Revelation Mechanisms
Incentives and the Existence of Pareto-Optimal Revelation Mechanisms Claude d Aspremont CORE, Université catholique de Louvain, Louvain-la-Neuve, Belgium Jacques Crémer Virginia Polytechnic Institute and
More informationMicroeconomics II Lecture 4: Incomplete Information Karl Wärneryd Stockholm School of Economics November 2016
Microeconomics II Lecture 4: Incomplete Information Karl Wärneryd Stockholm School of Economics November 2016 1 Modelling incomplete information So far, we have studied games in which information was complete,
More informationBelief-free Equilibria in Repeated Games
Belief-free Equilibria in Repeated Games Jeffrey C. Ely Johannes Hörner Wojciech Olszewski November 6, 003 bstract We introduce a class of strategies which generalizes examples constructed in two-player
More informationEfficiency and strategy-proofness in object assignment problems with multi-demand preferences
Efficiency and strategy-proofness in object assignment problems with multi-demand preferences Tomoya Kazumura and Shigehiro Serizawa February 23, 2016 Abstract We consider the problem of allocating sets
More informationFull Surplus Extraction and Costless Information Revelation in Dynamic Environments. Shunya NODA (University of Tokyo)
Full Surplus Extraction and Costless Information Revelation in Dynamic Environments Shunya NODA (University of Tokyo) Outline 1. Introduction. Two-Period Example 3. Three-Period Example 4. Model 5. Main
More informationLecture December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about
0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 7 02 December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about Two-Player zero-sum games (min-max theorem) Mixed
More informationOn revealed preferences in oligopoly games
University of Manchester, UK November 25, 2010 Introduction Suppose we make a finite set of observations T = {1,..., m}, m 1, of a perfectly homogeneous-good oligopoly market. There is a finite number
More informationMoral Hazard: Hidden Action
Moral Hazard: Hidden Action Part of these Notes were taken (almost literally) from Rasmusen, 2007 UIB Course 2013-14 (UIB) MH-Hidden Actions Course 2013-14 1 / 29 A Principal-agent Model. The Production
More informationSome Notes on Adverse Selection
Some Notes on Adverse Selection John Morgan Haas School of Business and Department of Economics University of California, Berkeley Overview This set of lecture notes covers a general model of adverse selection
More informationA Theory of Financing Constraints and Firm Dynamics by Clementi and Hopenhayn - Quarterly Journal of Economics (2006)
A Theory of Financing Constraints and Firm Dynamics by Clementi and Hopenhayn - Quarterly Journal of Economics (2006) A Presentation for Corporate Finance 1 Graduate School of Economics December, 2009
More information6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Potential Games
6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Asu Ozdaglar MIT March 2, 2010 1 Introduction Outline Review of Supermodular Games Reading: Fudenberg and Tirole, Section 12.3.
More informationCowles Foundation for Research in Economics at Yale University
Cowles Foundation for Research in Economics at Yale University Cowles Foundation Discussion Paper No. 1846 EFFICIENT AUCTIONS AND INTERDEPENDENT TYPES Dirk Bergemann, Stephen Morris, and Satoru Takahashi
More informationGame Theory. Monika Köppl-Turyna. Winter 2017/2018. Institute for Analytical Economics Vienna University of Economics and Business
Monika Köppl-Turyna Institute for Analytical Economics Vienna University of Economics and Business Winter 2017/2018 Static Games of Incomplete Information Introduction So far we assumed that payoff functions
More informationNotes on Blackwell s Comparison of Experiments Tilman Börgers, June 29, 2009
Notes on Blackwell s Comparison of Experiments Tilman Börgers, June 29, 2009 These notes are based on Chapter 12 of David Blackwell and M. A.Girshick, Theory of Games and Statistical Decisions, John Wiley
More informationReciprocity in the Principal Multiple Agent Model
WORKING PAPER NO. 314 Reciprocity in the Principal Multiple Agent Model Giuseppe De Marco and Giovanni Immordino May 2012 University of Naples Federico II University of Salerno Bocconi University, Milan
More informationII. Analysis of Linear Programming Solutions
Optimization Methods Draft of August 26, 2005 II. Analysis of Linear Programming Solutions Robert Fourer Department of Industrial Engineering and Management Sciences Northwestern University Evanston, Illinois
More informationTitle: The Castle on the Hill. Author: David K. Levine. Department of Economics UCLA. Los Angeles, CA phone/fax
Title: The Castle on the Hill Author: David K. Levine Department of Economics UCLA Los Angeles, CA 90095 phone/fax 310-825-3810 email dlevine@ucla.edu Proposed Running Head: Castle on the Hill Forthcoming:
More informationTeoria das organizações e contratos
Teoria das organizações e contratos Chapter 6: Adverse Selection with two types Mestrado Profissional em Economia 3 o trimestre 2015 EESP (FGV) Teoria das organizações e contratos 3 o trimestre 2015 1
More informationBayes Correlated Equilibrium and Comparing Information Structures
Bayes Correlated Equilibrium and Comparing Information Structures Dirk Bergemann and Stephen Morris Spring 2013: 521 B Introduction game theoretic predictions are very sensitive to "information structure"
More informationA finite population ESS and a long run equilibrium in an n players coordination game
Mathematical Social Sciences 39 (000) 95 06 www.elsevier.nl/ locate/ econbase A finite population ESS and a long run equilibrium in an n players coordination game Yasuhito Tanaka* Faculty of Law, Chuo
More informationRobert Gary-Bobo. NOTES ON MECHANISM DESIGN Implementation of Choice Rules
Robert Gary-Bobo NOTES ON MECHANISM DESIGN Implementation of Choice Rules ENSAE 218-219, revised in November 217 Some Implementation Theory We consider, as usual, a population of agents i = 1,..., n. Each
More informationSelecting Efficient Correlated Equilibria Through Distributed Learning. Jason R. Marden
1 Selecting Efficient Correlated Equilibria Through Distributed Learning Jason R. Marden Abstract A learning rule is completely uncoupled if each player s behavior is conditioned only on his own realized
More informationBAYESIAN AND DOMINANT STRATEGY IMPLEMENTATION IN THE INDEPENDENT PRIVATE VALUES MODEL. 1. Introduction
BAYESIAN AND DOMINANT STRATEGY IMPLEMENTATION IN THE INDEPENDENT PRIVATE VALUES MODEL ALEJANDRO M. MANELLI AND DANIEL R. VINCENT Abstract. We prove in the standard independent private-values model that
More informationLecture 10: Mechanism Design
Computational Game Theory Spring Semester, 2009/10 Lecture 10: Mechanism Design Lecturer: Yishay Mansour Scribe: Vera Vsevolozhsky, Nadav Wexler 10.1 Mechanisms with money 10.1.1 Introduction As we have
More informationEconomics 201B Economic Theory (Spring 2017) Bargaining. Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7).
Economics 201B Economic Theory (Spring 2017) Bargaining Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7). The axiomatic approach (OR 15) Nash s (1950) work is the starting point
More information6.254 : Game Theory with Engineering Applications Lecture 7: Supermodular Games
6.254 : Game Theory with Engineering Applications Lecture 7: Asu Ozdaglar MIT February 25, 2010 1 Introduction Outline Uniqueness of a Pure Nash Equilibrium for Continuous Games Reading: Rosen J.B., Existence
More informationInformation Acquisition in Interdependent Value Auctions
Information Acquisition in Interdependent Value Auctions Dirk Bergemann Xianwen Shi Juuso Välimäki July 16, 2008 Abstract We consider an auction environment with interdependent values. Each bidder can
More informationSupplementary appendix to the paper Hierarchical cheap talk Not for publication
Supplementary appendix to the paper Hierarchical cheap talk Not for publication Attila Ambrus, Eduardo M. Azevedo, and Yuichiro Kamada December 3, 011 1 Monotonicity of the set of pure-strategy equilibria
More information1. The General Linear-Quadratic Framework
ECO 317 Economics of Uncertainty Fall Term 2009 Slides to accompany 21. Incentives for Effort - Multi-Dimensional Cases 1. The General Linear-Quadratic Framework Notation: x = (x j ), n-vector of agent
More informationThe ambiguous impact of contracts on competition in the electricity market Yves Smeers
The ambiguous impact of contracts on competition in the electricity market Yves Smeers joint work with Frederic Murphy Climate Policy and Long Term Decisions-Investment and R&D, Bocconi University, Milan,
More informationUNIVERSITY OF OSLO DEPARTMENT OF ECONOMICS
UNIVERSITY OF OSLO DEPARTMENT OF ECONOMICS Home exam: ECON 5200 / ECON 9200 Exam period: 5.12.2011, at 09:00 9.12.2011, at 12:30 (unless other individual deadline granted) Grades are given: 3.01.2012.
More informationRecap Social Choice Functions Fun Game Mechanism Design. Mechanism Design. Lecture 13. Mechanism Design Lecture 13, Slide 1
Mechanism Design Lecture 13 Mechanism Design Lecture 13, Slide 1 Lecture Overview 1 Recap 2 Social Choice Functions 3 Fun Game 4 Mechanism Design Mechanism Design Lecture 13, Slide 2 Notation N is the
More informationEpsilon Ex Post Implementation
Epsilon Ex Post Implementation Mehmet Barlo Nuh Aygun Dalkiran February 10, 2014 Abstract We provide necessary and sufficient conditions for epsilon ex post implementation. Our analysis extends Bergemann
More informationWelfare Undominated Groves Mechanisms
Welfare Undominated Groves Mechanisms Krzysztof Apt 1,2, Vincent Conitzer 3, Mingyu Guo 3, and Evangelos Markakis 1 1 Centre for Math and Computer Science (CWI, Amsterdam, The Netherlands {apt, vangelis}@cwi.nl
More informationOn the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E.
Tilburg University On the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E. Publication date: 1997 Link to publication General rights Copyright and
More informationAre Obstinacy and Threat of Leaving the Bargaining Table Wise Tactics in Negotiations?
Are Obstinacy and Threat of Leaving the Bargaining Table Wise Tactics in Negotiations? Selçuk Özyurt Sabancı University Very early draft. Please do not circulate or cite. Abstract Tactics that bargainers
More informationOnline Appendices for Large Matching Markets: Risk, Unraveling, and Conflation
Online Appendices for Large Matching Markets: Risk, Unraveling, and Conflation Aaron L. Bodoh-Creed - Cornell University A Online Appendix: Strategic Convergence In section 4 we described the matching
More informationIdentification and Estimation of Bidders Risk Aversion in. First-Price Auctions
Identification and Estimation of Bidders Risk Aversion in First-Price Auctions Isabelle Perrigne Pennsylvania State University Department of Economics University Park, PA 16802 Phone: (814) 863-2157, Fax:
More informationThe Relation Between Implementability and the Core
The Relation Between Implementability and the Core Eiichi Miyagawa Department of Economics, Columbia University 420 West 118th Street, New York, NY 10027, U.S.A. em437@columbia.edu June 11, 2002 Abstract
More informationConsistency and Monotonicity in One-Sided Assignment Problems
Consistency and Monotonicity in One-Sided Assignment Problems Bettina Klaus Alexandru Nichifor Working Paper 09-146 Copyright 2009 by Bettina Klaus and Alexandru Nichifor Working papers are in draft form.
More informationLectures 6, 7 and part of 8
Lectures 6, 7 and part of 8 Uriel Feige April 26, May 3, May 10, 2015 1 Linear programming duality 1.1 The diet problem revisited Recall the diet problem from Lecture 1. There are n foods, m nutrients,
More informationOnline Appendix for. Breakthroughs, Deadlines, and Self-Reported Progress: Contracting for Multistage Projects. American Economic Review, forthcoming
Online Appendix for Breakthroughs, Deadlines, and Self-Reported Progress: Contracting for Multistage Projects American Economic Review, forthcoming by Brett Green and Curtis R. Taylor Overview This supplemental
More informationStrongly Consistent Self-Confirming Equilibrium
Strongly Consistent Self-Confirming Equilibrium YUICHIRO KAMADA 1 Department of Economics, Harvard University, Cambridge, MA 02138 Abstract Fudenberg and Levine (1993a) introduce the notion of self-confirming
More informationWorst-case mechanism design with undominated strategies
Worst-case mechanism design with undominated strategies Takuro Yamashita April 26, 2009 Abstract We consider a way to evaluate mechanisms without assuming mutual knowledge of rationality among the agents.
More informationGraph Theoretic Characterization of Revenue Equivalence
Graph Theoretic Characterization of University of Twente joint work with Birgit Heydenreich Rudolf Müller Rakesh Vohra Optimization and Capitalism Kantorovich [... ] problems of which I shall speak, relating
More informationGame Theory Correlated equilibrium 1
Game Theory Correlated equilibrium 1 Christoph Schottmüller University of Copenhagen 1 License: CC Attribution ShareAlike 4.0 1 / 17 Correlated equilibrium I Example (correlated equilibrium 1) L R U 5,1
More informationEndogenous Games and Mechanisms: Side Payments Among Players
Review of Economic Studies (2005) 72, 543 566 0034-6527/05/00220543$02.00 c 2005 The Review of Economic Studies Limited Endogenous Games and Mechanisms: Side Payments Among Players MATTHEW O. JACKSON and
More informationOn the Impossibility of Black-Box Truthfulness Without Priors
On the Impossibility of Black-Box Truthfulness Without Priors Nicole Immorlica Brendan Lucier Abstract We consider the problem of converting an arbitrary approximation algorithm for a singleparameter social
More informationKnightian uncertainty and moral hazard
Journal of Economic Theory 146 (2011) 1148 1172 www.elsevier.com/locate/jet Knightian uncertainty and moral hazard Giuseppe Lopomo a, Luca Rigotti b,, Chris Shannon c a Fuqua School of Business, Duke University,
More informationMonotonic ɛ-equilibria in strongly symmetric games
Monotonic ɛ-equilibria in strongly symmetric games Shiran Rachmilevitch April 22, 2016 Abstract ɛ-equilibrium allows for worse actions to be played with higher probability than better actions. I introduce
More informationOn the Maximal Domain Theorem
On the Maximal Domain Theorem Yi-You Yang April 28, 2016 Abstract The maximal domain theorem by Gul and Stacchetti (J. Econ. Theory 87 (1999), 95-124) shows that for markets with indivisible objects and
More informationInformation transmission in coalitional voting games
Journal of Economic Theory 134 (2007) 117 137 www.elsevier.com/locate/jet Information transmission in coalitional voting games Roberto Serrano a,, Rajiv Vohra b a Department of Economics, Brown University,
More informationBELIEFS & EVOLUTIONARY GAME THEORY
1 / 32 BELIEFS & EVOLUTIONARY GAME THEORY Heinrich H. Nax hnax@ethz.ch & Bary S. R. Pradelski bpradelski@ethz.ch May 15, 217: Lecture 1 2 / 32 Plan Normal form games Equilibrium invariance Equilibrium
More informationMulti-object auctions (and matching with money)
(and matching with money) Introduction Many auctions have to assign multiple heterogenous objects among a group of heterogenous buyers Examples: Electricity auctions (HS C 18:00), auctions of government
More information