Professional Documents
Culture Documents
Editors
Charalambos D. Aliprantis
Purdue University
Department of Economics
West Lafayette, IN 47907-1310
USA
Nicholas C. Yannelis
Department of Economics
University of Illinois
Champaign, IL 61820
USA
Donald G. Saari
Geometry of Voting
Jean-Pierre Aubin
Dynamic Economic Theory
Jean-Fran~ois Laslier
Tournament Solutions and Majority Voting
Ahmet Alkan
Charalambos D. Aliprantis
Nicholas C. Yannelis
Editors
Current Trends
in Economics
Theory and Applications
With 21 Figures
and 55 Tables
i Springer
Prof. Ahmet Alkan
Bogazici University
Department of Management
Bebek 80815
Istanbul
Turkey
Page
Foreword ............................................................. v
Elettra Agliardi
1 Introduction
In this paper we consider games in which the set of feasible joint decisions is
a lattice and exploit order and monotonicity properties of the games using
lattice-theoretical methods to analyze the existence and order structure of
equilibria. The class of games in which lattice-theoretical methods are most
powerful are supermodular games. They have been first introduced by Top-
kis (1979) and further analyzed in a number of works including Lippman,
Mamer and McCardle (1987), Vives (1990), Milgrom and Roberts (1990,
1991, 1994a, 1994b), Milgrom and Shannon (1994), DeGraba (1995). Super-
modular games are characterized by the fact that each player's strategy set
is partially ordered, the marginal returns to increasing one's strategy rise
with increases in the competitors' strategies and, in the case of multidimen-
sional strategies, the marginal returns to anyone component of the player's
strategy rise with increases in the other components. Broadly speaking,
these games exhibit "strategic complementarities" which yield monotone
increasing best replies; as a result, many of most important economic ap-
plications of noncooperative game theory are encompassed by this class
of games (see, for example, Bulow, Geanakoplos and Klemperer (1985),
Cooper and John (1988), Dybvig and Spatt (1983), Farrell and Saloner
(1985), Katz and Shapiro (1986), Agliardi and Bebbington (1994,1997)).
In this paper we propose a generalization of the concept of supermodular
games and introduce the concept of pseudo-supermodular games. In Section
2
f (x, t) V f (x' , t) 2:: f (x, t) 2:: f (x A x', t) => f (x V x', t) 2:: f (x, t) A f (x' , t).
5
f(x V x', t) ~ f(x, t) 1\ f(x', t) => f(x V x', t') ~ f(x', t'),
f (x V x', t) ::; f (x, t) 1\ f (x', t) = > f (x, t) ::; f (x, t) V f (x' , t) ::; f (x 1\ x' , t),
Consider now the case Zi not 2: J!..i = B(gJ for some i, and let x E [~, iJ.
In this case we can show that Zi V y. strictly dominates Zi against every
x E [~, iJ. Indeed, suppose it is not true, that is, !i(ZiVJ!..i' X-i) ::; fi(Zi, X-i).
-~
Then by the (SC) and (A) properties we can write fi(Zi V J!..i' ~-i) ::; !i(Zi,
~-i)/\ !i(J!..i' ~-i) and by pseudo-supermodularity !i(J!..i,Li) ::; fi(Zi'~_i)V
fi(J!..i' ~-i) ::; !i(Zi /\ J!..i'~-i)· But this yields a contradiction because by the
definition of -Yi and by Zi /\ -~ y. < -1.
y. (since Zi not 2: -1.
y.), we should have
fi(Y., ~-i) > fi(Zi /\ -~ Y·, ~-i)' Therefore !i(Zi Vy., x-d > fi(Zi, X-i) and
Z tJ. U([~, iD. It follows that [B(~), B(i)J = [inf U(~, iD, sup U([~, i])].
-~ -~
Proposition 4 states that all strategies which survive strict pure iterated
admissibility lie in an interval (.2:, x) whose maximum and minimum points
are the largest and smallest Nash equilibria. Obviously, if the game has a
unique pure Nash equilibrium it follows that it is dominance solvable.
(1) wix,
-(j)
= gix, ( W) WiXi'
(j) , 1
J = , .. " mi
In particular, for games that have only one strategy profile which survive
strict pure iterated admissibility, every process consistent with the above
dynamics converges to such unique strategy profile, which is Nash.
Proof. The proof consists of two steps.
STEP 1. The first step amounts at showing that if Xi E Li does not sur-
vive pure strict iterated admissibility, then its population share converges
to zero along any interior initial solution path to (1). Such a proof is a
straightforward generalization of Samuelson and Zhang (1992) for the case
of multipopulations.
We recall here that a strategy Xi E Li survives pure strict iterated ad-
missibility if there exist sequences of the form Li = XiO, Xil, ... , Xit, with
Xik ~ Li and where Xik+l is the set of player i's pure strategies that are
not strictly dominated by any pure strategies in Li given that the other
players j choose strategies from Xjk ~ Lj, j = 1, .'" i - 1, i + 1, .. " n, for
k = 1, .. " T - 1, and with Xi E Xit = Xit+l. Let Sio ~ Li be the set of
player i's strategies which do not survive pure strict iterated admissibility
and are not eliminated in the limit by the selection process.
Now, suppose that the statement above - that is, the population share
associated with a strategy which does not survive pure strict iterated ad-
missibility, converges to zero along any interior initial solution path to (1)
- is false; then U Sio =1= 0,
i
For all Y E USio let k(y) be such that y E Xik(y) \ X ik (y)+1 if Y E Sio
i
and let Yo be the minimizer of key) on USio and put k = k(yo). Let
i
Yo E Sio. Then there exists Yl E Li such that h(yo, X-i) < h(Yb X-i)
for all X-i E TI Xjk. Since k minimizes key), we have limt-+co W-i(t) = 0
#i
for all X-i tf- TI Xjk, Then, as t - t 00, fi(Yo, W_i(t)) - h(Yl, W-i(t)) goes
#i
to limt-+co,x_iE IT X jk [h(yo, X-i) - h(Yb X_i)]W_i(t), which is negative.
j#i
By the definition of regular and monotonic selection dynamics, there exists
8 < 0 such that
STEP 2. The second step is to show that the set of strategies that survive
strict pure iterated admissibility is bounded above and below by the largest
10
and smallest Nash equilibrium strategy profiles. Such a step follows from
Proposition 4. Finally, also the last assertion of Proposition 5 follows from
Proposition 4. •
Proposition 5 is a further contribution within the research area examin-
ing the links between equilibrium concepts and the outcomes of dynamic
evolutionary processes.
References
Agliardi, E. and M. Bebbington (1994), Self-reinforcing Mechanisms and
Interactive Behaviour, Economics Letters, 46, 281-287
Agliardi, E. and M. Bebbington (1997), Self-reinforcing Mechanisms and
Market Information, European Journal of Operational Research, 96, 444-
454
Birkhoff, G. (1948), Lattice Theory, American Mathematical Society, New
York
Bomze, I. (1986), Non-Cooperative Two-Person Games in Biology: a Clas-
sification, International Journal of Game Theory, 15, 31-57
Bulow, J., J. Geanakoplos and P. Klemperer (1985), Multimarket
Oligopoly: Strategic Substitutes and Complements, Journal of Political
Economy, 93, 488-511
Cooper, R. and A. John (1988), Coordinating Coordination Failures in
Keynesian Models, Quarterly Journal of Economics, 103, 441-463
DeGraba, P. (1995), Characterizing Solutions of Supermodular Games; In-
tuitive Comparative Statics, and Unique Equilibria, Economic Theory,
5, 181-188
Dybvig, P. and C. Spatt (1983), Adoption Externalities as Public Goods,
Journal of Public Economics, 20, 231-247
Farrell, J. and G. Saloner (1985), Standardization, Compatibility and In-
novation, Rand Journal of Economics, 16, 70-83
Katz, M. and C. Shapiro (1986), Technology Adoption in the Presence of
Network Externalities, Journal of Political Economy, 94, 822-841
Lippman, S., J. Mamer and K. McCardle (1987), Comparative Statics in
Non-Cooperative Games via Transfinitely Repeated Play, Journal of Eco-
nomic Theory, 41, 288-303
Milgrom, P. and J. Roberts (1990), Rationalizability, Learning and Equi-
librium in Games with Strategic Complementarities, Econometrica, 58,
1255-1277
Milgrom, P. and J. Roberts (1991), Adaptive and Sophisticated Learning
in Normal Form Games, Games and Economic Behaviour, 3, 82-100
Milgrom, P. and J. Roberts (1994a), Comparing Equilibria, The American
Economic Review, 84,441-459
Milgrom, P. and J. Roberts (1994b), The Economics of Modern Manufac-
turing: Technology, Strategy and Organization, The American Economic
11
Abstract. 26 known and new social choice rules are studied via computa-
tional experiments to reveal to which extent these rules are manipulable. 4
indices of manipulability are considered.
1 Introduction
Theoretical investigation of manipulation problem shows that in a very
wide framework any rule transforming agents' preferences into social choice
is either manipulable or dictatorial [5,11]. To which extent social choice cor-
respondences are manipulable were studied in [6,13]. More concretely, in [6]
the degree of manipulability of choice procedures was introduced. A degree
of manipulability was measured as the ratio of manipulable profiles, i.e.,
profiles, in which at least one agent can manipulate, to the total number of
profiles. Unlike [6], in [13] already several measures of manipulation were
studied. The present work continues [6,13]. We investigate a degree and an
efficiency of manipulation of 26 known and new social choice procedures,
'Yapl Kredi Bank (Turkey) providcc\ t.wo personal cOlllput.ers for carrying out. t.llC
(:omput,at.ions. Our (:olleagues Profs. C. Akc;ay, E. Alper, Y. ArM" S. (hmucur, A.
Garkoglu, M. Eder from Bogazic;i Universit.y (Ist.anbul, Turkey) gave us access t.o t.heir
pers(lllal (:omput.ers for t.his work. Prof. G. Alpay kiudly gave his perlllission t.o use t.hc
(:Oluput.er lahorat.ory (10 PCs) present.ed t.o Boga,r,ic;i Universit.y hy Int.erhallk. Prof. H.
Erse! support.ed t.his work from t.he very heginlling. Mrs. B. Bl\rekc;i gave us valuahle
t.edlllieal assiAt,ance.
The work of F. Aleskerov was part.ially support.ed hy Russian FOllndat.ion of Basic
Research (grant. 95-<ll00057A), NATO Research Program (1995-1996), and t.he grant. of
European COlllmunit.y (INTAS Project 'Measurement. and Aggregat.ion of Preferences').
We express ollr t.hanks t.o all t.hese eolleagues and organi,r,ations.
14
including those which were studied in [13J. Articles [6,13J and the present
paper also have another common feature. Since the problem of theoreti-
cal investigation of the degree of manipulability of social choice rules has
not been solved yet, in the present work, like in [6,13J, the analysis has
been done by computer computations. The computations have been car-
ried out in two ways. With small number of agents n and alternatives m
the computations were exhaustive, Le., included complete examination of
manipulability of all profiles. In those cases when such examination re-
quired a great amount of time (for some rules already with 5 agents and 4
alternatives), statistical method has been applied.
The structure of the paper is as follows. In Section 2 measures of ma-
nipulability are described. In Section 3 the social choice rules under study
are given. In Section 4 the computation scheme is given. In Section 5 the
results are discussed and concluding remarks are given.
2 The framework
The following problem is considered. A finite set A of alternatives is given
which consists of m alternatives (m > 2). Agents from finite set N
{I, ... , n}, (n > 1), have preferences over alternatives from the set A.
These preferences are assumed to be linear orders, that is
- irreflexive (\Ix xPx),
- transitive (\lx,y,z xPy&ypz::::} xpz), and
- connected (\Ix, y, x f y either xPy or ypx) binary relations.
An ordered n-tuple of individual binary relations is called a profile. A
social decision is considered to be a subset of the set A. The set of all linear
orders on A is denoted as C. Then the social choice rule under the question
is defined as F: cn --t A.
The effect of manipulability can be described as follows. Let
be a profile in which all agents but i-th reveal their true preferences. Let
---7 ---7
C( P), C( P -i) denote (single valued) social choice with respect to profile
--t ---7 ---7--t
P and profile P -i, respectively. Then C( P -i)PiC( P), which is the out-
come when i-th agent deviates from her true preference, is more preferable
for her than in the case when she expresses her sincere opinion. We study
the effect ofmanipulability as in [6,13J under the condition that social choice
always consists of only one alternative. Hence the following common way
of how to switch from a multiple choice (which is defined by the rule under
15
--+
the given P) to a single valued choice is accepted: in the case of multiple
choice the outcome has been chosen with respect to the alphabetical order
--+
of chosen alternatives. For instance, if the choice is C(P) = {X2,X3,X5},
then final social choice is defined to be X2.
3 Indices of manipulability
The number of alternatives being m, the total number of possible linear
orders is obviously equal to m!, and total number of profiles with n agents
is equal to (m!)n. In [6J, to measure a degree of manipulability of social
choice rules, the following index was introduced (we call it Kelly's index
and denote as K):
do
K = (m!)n'
in the sincere ordering of the i-th agent at j-th place from the top, and let
j < k. Then 0 = j - k shows how the i-th agent is better off. Let us sum
up 0 for all advantageous orderings /'i,i (defined above), and let us divide
the obtained value to /'i,i. Denote this index through Zi, which shows an
average "benefit" of the agent i gained via manipulation /'i,i orderings from
(rn! - 1). Summing up this index over all agents and over all profiles, we
obtain the index under study
The indices K,11,12,I3,J have been calculated for each of the rules in-
troduced in the next section.
D(x) = {y E A I yPx}.
Lower contour set of x in the relation P is the set L{ x) such that
L{x) = {z E A I xPz}.
Let us describe now the social choice rules. The rules under study can
be divided into several groups.
a) Scoring rules;
b) Rules using majority relation;
c) Rules using value function;
d) Rules using tournament matrix;
e) q-Paretian rules.
PI P2 P3 P4 P5
a b d b a
d a ace
b c bad
c d c d b
for i-th voter; if q = 1, then a is either first best or second best option, etc.
The integer q can be called as degree of procedure.
Now we can define Approval Voting Procedure with degree q
--+ --+--+
a E C(P) {:} [Vx EA n+(a, P ,q) 2 n+(x, P ,q)],
--+
where n-(a, P) = card{i E N I Vy E A YPia}.
Consider the previous example.
--+ --+ --+ --+
In this example n-(a, P) = O,n-(b, P) = l,n-(c, P) = n-(d, P) = 2.
--+
Therefore C( P) = {a}.
6. Borda's Rule.
--+
Put to each x E A into correspondence a number ri(x, P) which is equal
--+
to the cardinality of the lower contour set of x in Pi E P, i.e.,
19
The sum of those numbers over all i E N is called Borda's count for
alternative x,
n
r(a, P) = LT\(a,Pi).
i=l
7. Black's Procedure.
If Condorcet winner exists, it is to be chosen. Otherwise, Borda's Rule
is applied.
8. Inverse Borda's Procedure.
For each alternative Borda's count is calculated. Then the alternative a
with minimum count is omitted. Borda's counts are re-calculated for profile
-+
P / X, X = A \ {a}, and the procedure is repeated until choice is found.
9. Nanson's Procedure.
For each alternative Borda's count is calculated. Then the average count
is calculated, r = (I: r(a, P)) /IAI ,
aEA
and alternatives c E A are omitted
-+ -+
for which r(c, P) < r. Then the set X = {a EA: r(a, P) 2 r} is consid-
-+
ered, and the procedure is applied to the profile P / X. Such procedure is
repeated until choice is not empty.
10. Coombs' Procedure.
The alternative which is the worst for maximwn nwnber of agents is
omitted. Then profile is contracted to the set X, and the procedure is
repeated until choice is not empty.
Le., x belongs to Q iff (if there exists an alternative y E A\Q which dom-
inates x via majority relation J.L, then there exists an alternative Z E Q,
which dominates y, Le., ZJ.LY.)
A set Q ~ A is called the minimal weakly stable set if none of its proper
subsets is a weakly stable set.
--+
Then social choice C( P) = Q.
This rule is an ordinal counterpart of Maschler's bargaining set [7].
14. Fishburn's Rule.
Construct upper contour set D(x) of relation J.L and binary relation, as
follows:
x,y {:=> D(x) C D(y).
Then undominated alternatives on , are chosen2 , i.e.,
C(A) = un f(?;
IEIiEI
{i},O),
i.e., the alternative which is in between top alternatives for each voter in at
least one simple majority coalition is chosen. If there is no such alternative,
then the choice is considered over simple majority coalitions with q=l, q=2,
etc., until the choice is not empty. Again, if more than one alternative is
chosen, the final choice is defined by alphabetical rule of tie-breaking.
25. Strong q-Paretian Plurality Rule.
This rule is a counterpart of the rule 24 with the following addition. If
several options are chosen, then for each alternative is counted how many
coalitions choose this alternative. Then the alternative with maximal value
of this index is chosen. The rule is studied in [12].
26. Strongest q-Paretian Simple Majority Rule.
Social choice is defined as
C(A) = n
IEI
J(P;l,q),
5 Computation scheme
With small values of parameters m and n the exhaustive study of ma-
nipulability of the rules has been made. This was done via analysis of all
proffies and checking all possible orderings for all agents. For each voter
(m! - 1) number of orderings are checked. The complexity is evaluated
as (m! - 1) . n . (m!)n . S, where S is a complexity of choice algorithm.
With m=5 and n=5 the approximate lower bound of complexity is 10 15
which makes that exhaustive study practically impossible3 • Hence we use
---t
the statistical scheme [13]. If we introduce a random variable 1/( P) which
---t ---t
shows whether the proffie P is manipulable in Kelly's sense, then 1/( P)
has binomial distribution with maximal variance
1
(j2 = N. p. (1 - p) = N· ("2)2 = 0.25· N,
where N = (m!)n is the number of proffies. Binomial distribution is ap-
proximated by normal distribution and 95% confidence interval is given
as
( 1.96· (j
jL- m 1.96· (j)
,jL+ m .
Choosing 0.02 confidence interval we obtain the evaluation of the number
of profiles
N = [2. 1.96 . 0.25] 2 ~ 240000
0.002 .
This number has been used for all indices.
6 Results of experiments
The complete tables with the results of the computational experiments can
be obtained via Internet, http://www.econ.boun.edu.tr/papers. Below we
provide only main observations. The indices K,h,I2,h, and J have been
evaluated for all combinations of values m = 3,4, 5, and n = 2 - 10. The
indices K, h, h, h have been evaluated for the case m = 5 and n = 51 as
well.
If one compares the rules in each group 4a-4e and chooses the rule which
has minimal value of the corresponding index on each pair (m, n) with
m = 3,5 and n = 3,5,7,9, i.e., with odd number of alternatives and agents,
then the following Table 1 can be obtained. In the cells of Table 1 the
numbers of rules are given.
It is immediately seen that the difference between rules is obtained on the
rules from the first group, namely, on the scoring rules. Hare's rule is less
3For some rules we made such an exhaustive study. For example, for Coombs's rule
the calculations for the case m = n = 5 took 2 months of work of PC-133.
24
Choice Rules K 11 12 13
Scoring Rules 4 7 2, with q=2 2, with q=2
by Majority Relation 14-17 14-17 14-17 14-17
by Value Function 18-20 18-20 18-20 18-20
by Tournament Matrix 22,23 22,23 22,23 22,23
q-Paretian Rules 26 26 26 26
TABLE 1.
4For the case m = 5 and n = 51 the total number of profiles is approximately equal
to 10 100 , among which we check only 240,000 profiles. So, we do not discuss the results
obtained in this case.
25
opens several problems. The first one, naturally, is how to obtain theoretical
estimations of the indices introduced above which are not restricted by
small values of m and n. Obtaining such estimations will provide the basis
of using different social choice rules in different practical situations.
The next question is 'Can we construct other indices to find different
properties of rules under study which deal with degree and efficiency of their
manipulation?'. Finally, in the study above we choose the alphabetical rule
of tie-breaking. However, it might be more realistic to make the analogous
study considering non single-valued choice, and using generalized concept
of manipulability (see, e.g., [10]).
References
1. Aleskerov, F. "Procedures of Multicriterial Choice." Preprints of the
IFAC/IFORS Conference on Control Science and Technology for Devel-
opment, Beijing, China, 1985.
2. Aleskerov, F. "Relational-Functional Voting Operators." California In-
stitute of Technology, Social Science Working Paper, n. 818, 1992.
3. Banks, J. "Sophisticated Voting Outcomes and Agenda Control." Social
Choice and We(fare, v.1, 1985.
4. Brams, S. and P.Fishburn (1983) Approval Voting. Boston, Basil Black-
well.
5. Gibbard, A. "Manipulation of Voting Schemes: A General Result."
Econometrica, v.41, 1973.
6. Kelly, J. "Almost All Social Choice Rules are Highly Manipulable, but
Few aren't." Social Choice and We~fare, v.10, 1993.
7. Maschler, M. "The Bargaining Set, Kernel, and Nucleoulus." in Hand-
book of Game Theory, (eds. R.J. Aumann and S. Hart), v.1, 1992.
8. Moulin, H. Axioms of Cooperative Decision Making. Cambridge, Cam-
bridge University Press, 1987.
9. Nurmi, H. Comparing Voting Systems. D. Reidel Publishing Comp., Dor-
drecht, 1987.
10. Pattanaik, P. Voting and Collective Choice. Cambridge, Cambridge Uni-
versity Press, 1976.
11. Satterthwaite, M.A. "Strategy-proofness and Arrow's Conditions: Ex-
istence and Correspondence Theorems for Voting Procedures and Social
Welfare Functions." Journal of Economic Theory, v.lO, 1975.
12. Sertel, M. and E.Kalaycioglu, "Tlirkiye i~in bir Se~im Y6ntemi
Tasanmma Dogru." TOSIAD, Istanbul, 1995 (in Thrkish).
13. Smith, D. "Manipulability Measures of Common Social Choice Func-
tions." Social Choice and We~fare, (forthcoming)
14. Volsky, V. and Z. Lezina, "Voting in Small Groups." Moscow. Nauka,
1991 (in Russian).
26
Figure 1.
07K~__________________________~
0:6 ".,.".,.,. ,." . ."".,. .,. . . ,.,. . .,. ,)(.. ,. ,. ,. ..." "" '.x"
0,5
--+--1 Plurality Rule
.,. ·0 ··· · 2 Approval Voting q=2
0,4 - . -. - - 4 Hare's Rule
·.. ·· .... H ..·····• 6 Borda's Rule
0,3 . __. ___ . _._--- - ----.- - -' -- - - -.-----
----.---- 7 Black's Rule
0,2 ---+-14 Fishburn's Rule
0,1
n
O+-------~----~------~----~
3 5 7 9 51
FIGURE 1.
0,045
0,04
0,035 --+--1 Plurality Rule
. ... 0 ·· .. 2 Approval Voting q=2
0,03
---B _. 4 Hare's Rule
0,025
·....... ·H·..·.. •· 6 Borda's Rule
0 ,02 ----.---·7 Black's Rule
0,015 ---+-14 Fishburn's Rule
0,01
0,005
n
0
3 5 7 9 51
FIGURE 2.
27
Figure 3.
0,45 ~12,---_ _ _ _ _ _ _ _ _ _ _ _-,
0,4 ............
0,35 ....• -.,.".,)(,.-.., '"
...•." .•..,.,..)(.,.,..,.•. , ..,.,.......
---+--1 Plurality Rule
0,3 .... 0 ···· 2 Approval Voting q=2
FIGURE 3.
Figure 4.
0,5 !;'IJ'---_ _ _ _ _ _ _ _ _ _ _---,
0,45
0,4
0,35
.,_ ,-
... .............., . . ..•................• ---+--1 Plurality Rule
.. ·· 0 .... 2 Approval Voting q=2
0,3
.. .• . . 4 Hare's Rule
o,25 ....- -
.........)(........ 6 Borda's Rule
0,2 ~......................~;,..;.;.,;d~~_: ----a---- 7 BI ac k's Rul e
0,15 ~ 14 Flshburn's Rule
0,1
0,05
n
o+-----~-----+----~----~
3 5 7 9 51
FIGURE 4.
On the properties of stable many-to-many
matchings under responsive preferences
Ahmet Alkan
1 Introduction
Job matching when workers may contract with several firms and student
enrollment in courses are two examples of many-to-many matching situa-
tions that arise.
We show in this paper that the set of stable outcomes in a many-to-
many matching market has all the structural properties known for one-to-
one matching, when preferences are responsive (Roth) [6], that is to say,
when preferences over subsets of agents are consistent with complete strict
preference orders on the individual agents. We then give examples to show
that some of the other impressive properties that hold on the one-to-one
domain no longer hold for "polygamous" agents, namely those who are to
be matched with more than one agent from the opposite side, even when
preferences are responsive.
Roth and Sotomayor [7] had shown for many-to-one matchings under
responsive preferences that the sets of mates a polygamous agent may get
under alternative stable matchings are always such a selection of sets that
he has a complete strict preference order on them. They then showed that
the set of stable matchings, as in one-to-one matching, is a complete and
distributive lattice with respect to the partial orders induced by the com-
mon preferences of all agents on the same side of the market, with the
duality property that what is better for agents on one side of the market
coincides with what is worse for those on the other side. In particular, there
exists a best stable matching for agents on (any) one side of the market
which happens at the same time to be the worst stable matching for agents
30
I
IJ.L-l(w) = I{m E lvI I wE J.L(m)} I ~ kw for every wE W,
and w E J.L( m) only if w is acceptable for m. We let J.L stand for the inverse
matching J.L- l as well, and alternatively write mw E J.L whenever w E J.L(m)
for any pair mw E j\l[ x W.
Let M = (.lld, l-V, k, >-) be a matching market. For any agent, say, man
m and for any subset 8 of women, let xm(8) stand for the km'th most
preferable woman of m in 8 when 181 ~ km and let xm(8) stand for the
non-agent 0 when 181 < km. In case J.L is a matching, we write xm(J.L) for
Xm (J.L( m)). Our first definition is standard.
Definition 1 A matching J.L is said to be
(i) blocked by a pair mw if mw 1 J.L but w >-m xm(J.L) and m >-w xw{J.L),
(ii) stable if it is not blocked by any pair mw . •
We now introduce the main definition of the paper.
Definition 2 Let J.Ll' J.L2 be any two matchings.
Define the male supremum J.L = J.Ll V M J.L2 by letting J.L(m) = 'Hm(8) for
every m, where 8 = J.Ll (m) U J.L2 (m), and the set 'Hm (8) consists of the
highest km women in 8 in the order >-m of m when 181 ~ km and is equal
to 8 itself when 181 < km.
Define the male infimum J.L = J.Ll 1\ AI J.L2 by letting J.L( m) = /-Ll (m) n
.e
J.L2(m)) U m(8) for every m, where 8 = /-Ll (m) U J.L2(m)"'-(J.Ll (m) n /-L2(m)) ,
and the set .em (8) consists of the lowest Im = km - I/-Ll (m) n /-L2 (m) I women
in 8 in the order >-m of m when 181 ~ Im and is equal to 8 itself when
181 < lm. (Define female supremum and infimum analogously.) •
32
Notation In any context where two women w, w' need not be distinct, we
shall sometimes use the symbol tm for the preferences of a man m. Thus
w tm w' and w i- w' implies w )-m w'.
Proof. Let 1£1, 1£2 be any two stable matchings and consider (say) the male
supremum 1£ = 1£1 VM 1£2'
To see that 1£ is a matching, assume the contrary that IJ.t(w)1 > kw for
some woman w. Then the set
Note first that mw ~ JL1 U 1£2 for otherwise by our assumption mw would
belong to the supremum 1£. Now wlog say x w(J.t2) tw x w(J.t1)· Since J.t(w) ~
1£1 (w) U 1£2 (w), trivially Xw (1£) t Xw (1£1) so by assumption m )- w Xw (1£1)'
Since mw (~ 1£1) does not block 1£1, then x m (J.t1) )-m w, and therefore by
assumption again Xm (J.t1) )-m xm(J.t). On the other hand, x m (J.t1) )-m w
also gives 11£1 (m) 1= km which implies Xm (1£) tm Xm (1£1)' Contradiction. •
Call an agent, say man m, exposed in a matching 1£ if IJ.t(m)1 < km. The
Proposition below which is of interest itself is frequently used in the proofs
to come.
Proof. (ii) follows from (i). To prove (i), suppose to the contrary that
J.t' (m') -:F J.t( m') for two stable matchings J.t, J.t' and a man m' who is exposed
in J.t. It is straightforward to see that then there exists a woman w who has
at least one less mate in J.t than she has in the supremum Ji = J.t VM J.t'.
(See that IJi(m) 1 ~ 1J.t(m) 1 for all m and IJi(m') 1 > 1J.t(m') 1 in particular.
Using the equality Em 1Ji(m) 1 = Ew IJi(w) 1 which holds by definition for
any matching Ji, then Ew IJi(w)1 = Em IJi(m)1 > Em 1J.t(m) 1 = Ew 1J.t(w) 1
and so indeed IJi(w) 1 > 1J.t(w) 1for some woman w.)
Now take any m E Ji(w)~(w) and note m ~w 0 =xw(J.t). On the other
hand, w E Ji(m)"-J.t(m) which by definition of the supremum implies w ~m
xm(J.t). Thus mw blocks J.t. Contradiction. •
Proposition 3 The male supremum and the female infimum of any two
stable matchings are identical.
Proof. Consider any two stable matchings J.t1, J.t2 and let!!:.. = J.t1 /\w J.t2, Ji =
J.t1 V M J.t2·
We first show that Ji ~ J.t. Take any mw E Ji, i.e., w E Ji(m). We will
show that m E J.t(w). If wE J.t1(m) n J.t2(m) then already by definition of
the infimum mw
E !!:... So wlog say
So, if contrary to what we want to show, m does not belong to J.t(w), then
I
neither does any man in J.t1(w)"-J.t2(w), but then I!!:..(w) < 1J.t2(w) 1 ~ kw,
which implies w is exposed (because, for w unexposed, 1J.t1(W) 1= 1J.t2(w) 1=
kw hence by definition of the infimum 1J.t(w) 1= kw.) By Proposition 2(i),
then, J.t1 (w) = J.t2 (w) contradicting m 1.-J.t1 (w). Therefore m does belong
to J.t( w) and so Ji ~ J.t.
I
Now suppose Ji ~-!!:... Then IJi(w) 1 < I!!:..(w) ~ kw for some woman w
who (thus) is exposed. By Proposition 2(i) again, J.t1(W) = J.t2(W) and so
!!:..(w) = Ji(w). Contradiction. Thus Ji =!!:... •
Proposition 4 Given any two stable matchings J.t1, J.t2 and any agent (say)
m, let 8 i = J.ti(m)"-(J.t1 (m) n J.t2(m)), i = 1,2. Then either m prefers any
woman in 8 1 to every woman in 82 or m prefers any woman in 82 to every
woman in 8 1.
Proof. Take any two stable matchings J.t1, J.t2 and any man m such that
J.t1(m) -:F J.t2(m) (otherwise, by Proposition 2(i), there is nothing to prove).
34
Proof. Suppose JLI' JL2 are both stable and the pair mw both prefer JLI to
JL2' Then mw does not belong to JL2 "'-JLI for otherwise, by Propositions 4
and 3, mw E JLI I\w JL2 = JLI VM JL2 contradicting the assumptionthat m
prefers JLl to JL2' On the other hand, neither does mw belong to JLI "'-JL2 for
otherwise, by Proposition 4, mw would block JL2' •
35
Now, to bring our results together, note that, if we define the supremum
of any two matchings as that matching where each agent is assigned his
more preferred set of mates between the two matchings, then by Proposi-
tion 4 and Corollary 5 the supremum so-defined coincides with the supre-
mum given in Definition 2 and so, by Proposition 3, is stable itself. The
same hold upon replacing supremum with infimum and more with less
in the previous sentence. The following Corollary then speaks for either
definition of supremum and infimum and is easily checked to follow from
Propositions 1,3,4 and Corollary 5. (Definition: The lattice is distributive
if J.Ll VM (J.L2 AM J.L3) = (J.Ll VM J.L2) AM (J.Ll VM J.L2)·)
w w' w"
m 1,1 2,1 3,1
m' 2,2 1,2 3,2
Then there exists a unique stable matching J.L where m gets w and m'
gets w' w". (Check by the Deferred Acceptance Procedure that J.L is both
the male optimal and the female optimal stable matching.)
Suppose w who ranks m first and m' second now is to rank m' first and
m second, while all other preferences remain the same, as stated below:
36
w w' w"
m 1,2 2,1 3,1
m' 2,1 1,2 3,2
In the unique stable matching that exists now, m gets w' and m' gets
ww". Note that m', who prefers w' to w, is worse off.
Remark Example 1 shows in particular that the mono tonicity property
which the optimal stable matching is known to have (Gale and Sotomayor
[4]), namely that if an individual is placed higher than before in the pref-
erence order of an opposite-side agent then that individual is never worse
off at the stable matching which is optimal for his side, does not hold for
polygamous agents. •
Our next example shows that the stable set fails in being "monotonic"
with respect to quota expansions.
w w'
m 1,1 2,1
m' 2,2 1,2
See simply that m' gets his most preferred woman w when all quotas
equal 1, but that he gets no one when the quota of m (alone) increases to
2.
A similar loss may occur even when all quotas increase simultaneously
as in the case of the following market:
w w' w"
m 1,3 2,3 3,3
m' 2,1 1,1 3,2
m" 2,2 3,2 1,1
Check that, in the unique stable matching when all quotas equal 1, m
gets his most preferred woman w, while in the unique stable matching when
all quotas equal 2, m loses wand gets w' w".
w w' w"
m 1,2 2,1 3,1
m' 2,1 1,2 3,2
Check that the matching J.L where m gets w' w" and m' gets w is the only
stable matching. Observe that
(i) the pair mw' blocks the alternate matching J.L' where m gets ww" and
m' gets w', and that
(ii) both m, m' and (the blocking woman) w' prefer J.L' to J.L (as each
thereby replaces his/her second choice with his/her first choice).
We thus reach the following two conclusions:
Fact 1. An optimal stable matching may be strongly inefficient for the
agents for whom it is optimal. This cannot happen for single-quota agents
as stated in the so-called Weak Pareto Optimality Theorem (Roth and
Sotomayor [8]).
Fact 2. There may exist a blocking pair of agents who are each strictly
worse off in every stable matching. That this cannot happen in one-to-one
matching is given by the so-called Strong Stability Theorem in Demange,
Gale and Sotomayor [2].
Observe further that, if m (alone) were to reverse his preferences between
w' and w", as stated below, then m gets ww" and is better off (as is m'
who gets w') at the new male optimal stable matching:
w w' w"
m 1,2 3,1 2,1
m' 2,1 1,2 3,2
We thus obtain
Fact 3 The optimal stable matching mechanism is manipulable by those
agents for which it is optimal. That this cannot happen for single-quota
agents is established by the Strategyproofness Theorem (Dubins and Freed-
man [3], Roth [6]).
Remark All the conclusions reached in Example 3 have already been noted
by Roth [6]. We have chosen to state it here primarily for the sake of
completeness and secondarily for the reason that it is simpler than the
example in [6] which involves 3 agents on one side and 4 on the other (see,
e.g., Theorem 5.10 in Roth and Sotomayor [8]) . •
Appendix
We give here a statement of the Deferred Accepted Procedure which is just
the natural extension ofthe Gale-Shapley Procedure ([5]) to many-to-many
38
References
[1] Blair, C.: The lattice structure of the set of stable matchings with mul-
tiple partners. Mathematics of Operations Research 13, 619-28 (1988)
[2] Demange, G., Gale, D., Sotomayor, M.: A further note on the stable
matching problem. Discrete Applied Mathematics 16, 217-22 (1987)
[3] Dubins, L.E., Freedman, D.A.: Machiavelli and the Gale-Shapley algo-
rithm. American Mathematical Monthly 88, 485-94 (1981)
[4] Gale, D., Sotomayor, M.: Some remarks on the stable matching prob-
lem. Discrete Applied Mathematics 11, 223-32 (1985)
[5] Gale, D., Shapley, L.: College admissions and the stability of marriage.
American Mathematical Monthly 69, 9-15 (1962)
[6] Roth, A.E., The college admissions problem is not equivalent to the
marriage problem. Journal of Economic Theory 36, 277-88 (1985)
39
[7] Roth, A.E., Sotomayor, M.: The college admissions problem revisited.
Econometrica 57, 559-70 (1989)
[8] Roth, A.E., Sotomayor, M.: Two-sided Matching. Cambridge: Cam-
bridge University Press (1990)
Cost uncertainty, taxation, and irreversible
investment *
1 Introduction
The literature on investment distinguishes between the actual and the de-
sired (or optimal) capital stock, where the latter is determined by factors
such as output and input prices, technology and interest rates, among oth-
ers. A prevalent explanation of the gradual adjustment of the capital stock
"The first draft of this paper was written while Fanny and Michel Demers were visiting
scholars at the CEPREMAP. Accordingly, they would like to thank their colleagues at
the CEPREMAP for their hospitality, and are grateful to Jean-Pascal B(massy, Pierre-
Yves Renin, Pierre Malgrange, and seminar participants for helpful comment.s.
42
2 The model
We consider a monopolistically competitive risk neutral firm. Each period,
it makes variable input and investment decisions. At time t it produces
output Vi using capital Kt (which is predetermined at t), and variable
inputs Lt. The firm's production function F (Kt, Lt) is twice continuously
differentiable, increasing, concave, and satisfies the Inada conditions.
44
(1)
where e < -1 is the price elasticity of demand, and at is a known parameter
representing the state of demand. Denote by Wt the nonstochastic variable
input price vector.
The optimal choice of variable factors involves static optimization un-
der certainty. We can define the short-run profit function at time t,
n (Kt, at, wd, as
= max{ptF (Kt, Lt) - Wt . Lt}
Lt>O
= a-;1/e F (Kt, L* (Kt, at, Wt))(!+e)/e (2)
-Wt· L* (Kt, at, Wt)
where L* (Kt, at, Wt) denotes the optimal choice of variable factors. The
short-run profit function n (Kt, at, wt} is continuous in Kt, at, and Wt,
increasing in Kt and at, decreasing in Wt, and strictly concave in Kt. We
assume that n (Kt, at, Wt) is bounded for finite Kt, at, and Wt. The firm's
after-tax cash flow at time t, Rt , is defined as
T
Rt = (1 - Tt) n (Kt, at, Wt) + Tt L Dx,t-xptx1t-x - (1 - 'Yt) P: It, (3)
x=1
and
(5)
We will assume that n
= fi + Ukt where pk is an unknown parameter
representing the permanent component of n,
and Ukt is a random variable
lOur theoretical results do not depend on this assumption. We only use this specifi-
cation of the demand function in order to perform our quantitative analysis.
45
(6)
We assume that investment is irreversible;
(7)
(9)
where g denotes the law of motion of the information state and updating
according to Bayes' law. Note that g does not have a time subscript since
2 Alternatively, the tax credit could be stochastic and p~ could be known for all t; in
this case, 'it = 'Y+u1't, where u1't is a random variable drawn from a known distribution
pI
for all t. Thus, = (l-'Y-zt)p~ would be the permanent component of the tax-adjusted
price of capital, and UIt = -U1'tP~ would be the transitory component.
46
subject to (6), (7), (9), Kl and q;l given, where J3 = (1 + r)-l, 0 < J3 < 1 is
the discount factor and 8( MIq; l) is the predictive density of the sequence
of observations h~ defined as h~ == {h2' h3, ... , h t }. Thus, the firm chooses
a sequence of strategies for future investment plans {It} ~l which specify
future investment as a function of the state of information q;t and the
capital stock Kt to maximize the expected present value of future net cash
flows conditional on the state of information, subject to the irreversibility
constraint and the laws of motion for the capital stock and the state of
information, K 1 , q;l given. Using dynamic programming, we can express
the problem recursively as
i
It
=0 if 1;>0
:s; 0 if I; = O.
(12)
We can use the envelope theorem to find the partial derivative of the val-
uation function V (Kt+1 , q;t+l(ht+1)) with respect to Kt+1 for t = 0,1,2, ...
as
47
pk E P, ht EH, (15)
and ",(ht,ht} does not depend on the unknown parameter pk. We will say
-00
that ht+l is m~re informative in the sense of Blackwell than hnl if at le~t
one element, hi, is more informative than hi, i = t + 1, t + 2, ... and if hj
is as informative as hj for all j =I=- i.
We examine the impact of varying the informativeness of the non-price
::::?O
signals bt+l' while keeping the riskiness faced by the firm constant. In
Section 7, we will consider the impact on the firm's investment of varying
-koo
the informativeness of the price signal Pt+! while also changing the riskiness
faced by the firm. The following lemma and theorem will permit us to obtain
the main results of this section.
ht+1 are anticipated. Ifh t+1 is more informative than hn1 in the sense of
Blackwell, then I; > h.
Proposition 4 indicates that the anticipation of ''more informative" sig-
nals in the future reduces the optimal (current) investment of the risk
neutral firm. Hence, a firm which anticipates to learn the permanent com-
ponent will only gradually adjust its capital stock to the steady-state.
be shown that tP (-, h') is continuous in s for all h' E H and that tP (s, .)
is measurable with respect to B(H) for all s E 8. As a result, we have
4We simplify the notation and let the variables without time subscript (or time
superscript) such as K and W denote the current period's values and primes denote next
period's values.
5Define X(wt,B) == f B 8(ht+llw t )dht+l. The stochastic kernel Q(st,B) induces
the same measure on CH, B CH)) given St as X (wt, B) given wt. That is, Q (St, B) ==
X(wt,B).
51
Theorem 7 The sequence U=~==-Ol T*if-l* In} converges weakly to the in-
variant probability measure f-l*. The converyence is uniform.
The last two theorems guarantee the existence of a unique steady state
and the convergence of the firm's initial information state and capital stock.
Thus, in the long run once learning is complete, and the true state pk is
known with certainty, the firm's capital stock reaches the desired level.
5 Increases in risk
In this section, we assume that pk is known, and we examine the impact
of greater risk on irreversible investment. We drop the assumption that :u:
takes values in a compact set and instead we assume that it takes values in
R+. Let G(P:H I P:) denote the (objective) distribution of P:+l conditional
on P:.We will be interested in examining the effect of distribution func-
tions which are stochastically larger in the sense of first-order stochastic
dominance (FSD)6 and riskier than G in the sense of a mean-preserving
spread (MPS) 7 •
-k
Definition 1 Pt+l with distribution function G(P:H I P:) is stochastically
~
n
adjustment cost, thereby reducing current investment. We now turn to the
general case where may be correlated through time.
Then VK is increasing in P: .
The second condition in Lemma 10 can be interpreted to mean that the
future resembles the present. The higher the current value of pf, the higher
is the probability of observing a high value of the purchase price of capital
goods next period.
The prooffollows from Lemma 10. Proposition 11 shows that ifthe future
resembles the present when prices are serially correlated, then a FSD shift in
G(P:+l I P:) which lowers the probability of low values of P:+l and indicates
the prospect of facing higher purchase prices for investment goods in the
future will lower the marginal endogenous cost and induce the firm to raise
current investment.
The second and third conditions of Lemma 12 reveal that while larger
values of pf induce stochastically dominating shifts in the conditional dis-
tribution of ~+1' they do so at a nonincreasing rate. 8 For example, if
pf+1 = ppf + Uf+l' where 0 < p::; 1, which includes the first-order autore-
gressive process and the random walk, then the second and third conditions
are satisfied.
Proposition 13 Suppose that assumptions of Lemma 12 hold. An MPS
in ~+1 increases the marginal endogenous cost of adjustment and reduces
current investment.
The proof follows from Lemma 12.
Proposition 14 Suppose that the assumptions of Lemma 12 are satisfied
by the steady-state conditional distribution of~+l. An MPS in ~+1 implies
that the lower and upper bounds of the ergodic set of capital stocks fall,
leading to a lower capital stock in the steady-state.
Proposition 14 indicates that firms facing a more variable (in the sense of
MPS) distribution of the tax-adjusted price of investment goods will have
a lower capital stock in the steady-state.
6 Simulation procedure
In this section, we provide a quantitative characterization of the model with
irreversible investment and learning. This is achieved by numerically solving
for the optimal investment policy function under a variety of assumptions
about the stochastic environment facing firms. Section 6.1 describes the
numerical solution procedure while Section 6.2 describes how the parameter
values are determined.
Table 1
Parameter Values
EO 'TJ (3 6 T Z W
Table 2
over the period 1960-1985 while Roeger's (1995) estimates imply an average
markup of 1.6054 using U.S. 2-digit manufacturing industries for the period
1953-1984. We use a simple average of Morrison's and Roeger's estimates,
and set the value of c equal to c = -3.607.
The value of the elasticity of output with respect to capital 'fJ is also
determined using the implications of the firm's profit maximization problem
under imperfect competition. According to this problem, 'fJ can be measured
by the share of capital in total factor costs, CK, which, in turn, equals
CK = {MRKP/<iJ)SK, where SK is the revenue share of capital, <iJ is the
degree of returns to scale and MRKP is the markup. Under constant returns
to scale, <iJ = 1. The direct measurement of the revenue share of capital SK
depends on the definition of the capital stock and of national income, with
estimates ranging from 0.25 to 0.43 (see Cooley, 1995, Chapters 1 and 6).
Since capital in our model corresponds more closely to a narrower definition
of capital such as the sum of producers' durable equipment and structures,
we set S K = 0.25 to obtain the value of 'fJ used in our study.
The values of the corporate income tax rate Tt, the depreciation rate
8, the present value of depreciation allowances Zt, and the investment tax
credit It are derived from Jorgenson and Sullivan (1981) and Jorgenson and
Yun (1991). In the simulations, we assume that Tt, Zt, and It are constant.
56
7 Simulation results
This section derives the numerical results obtained by simulating the model
under alternative assumptions. The first two subsections consider the ver-
sion of the model without learning and show the effects of increases in risk
with i.i.d. and serially correlated shocks. Section 7.3 allows for learning
about the permanent component of the price of capital.
11 The present value of depreciation allowances and the effective investment tax credit
rate are calculated using unpublished data that were kindly provided to us by Dale
Jorgenson.
57
12 To obtain sufficient numerical variation in the capital grid, we scaled up all variables
by setting the scale parameter A = 4. The resulting value of the steady-state capital
stock is 0.3915. When calculating the maximum sustainable capital stock, the choice of
the lowest price of capital is somewhat arbitrary; if pi is evaluated at pk - lOuk, then
K maz = 1.062. We defined the capital grid on the interval [0.0554,1.1577].
58
over the D draws. We generate D = 150 draws from the normal distribution
with mean pk and variance O'~ to form the simulated average.
One characteristic of the model's solution is that investment is decreasing
in the quantity of capital as well as in the price of investment. At the
lowest price of investment, the firm only stops investing when its capital
stock exceeds the deterministic steady-state capital stock by 66%. At higher
values of p{, the irreversibility constraint becomes binding at smaller values
of the capital stock. For example, at the highest price of capital, the firm
stops investing in new capital when its capital stock is less than one-third of
the deterministic steady-state capital stock. Furthermore, the average level
of investment, conditional on investing, is also monotonically decreasing in
the price of capital.
As a way of describing the model's overall behavior, Table 3 reports the
number of times the irreversibility constraint is binding for the (K, p) pairs
in the entire state space and the average level of investment, conditional on
investment occurring. When the variance of the price of capital is equal to
the sample variance of n, that is, O'k = 0.0033, the irreversibility constraint
binds 189 times out of a total of 500 states, or 37.8% of the time, and the
average level of investment when investment is positive is 0.3919.
We can conduct a mean-preserving increase in risk for this specification
by increasing the variance of the transitory shock to the price of capital.
In part (l-ii) of Table 3, we report the consequences for investment be-
havior when O'~ is doubled. As Proposition 9 predicts, the incidence of the
binding irreversibility constraint increases and the average level of invest-
ment falls. It is interesting to note that while there is only a 2% increase
in the incidence of the binding irreversibility constraint, the average level
of investment falls by more than 10%.
Table 3
Number Incidence Average Level
of States of It =0 of Investment
Independently and Identically Distributed Shocks
(I-i) a% = 0.0033 500 189 0.3919
(l-ii) a% = 0.0066 500 193 0.3521
Autoregressive Shocks
(2-i) a% = 0.0033 500 181 0.1934
(2-ii)a% = 0.0066 500 189 0.1793
7.3 Learning
As in Section 7.1, we assume that the price of capital n is lognormally
distributed so that log(n) = pk + Ukt follows a normal distribution with
mean pk and variance O'~. In this specification, the firm does not know with
certainty which value pk takes on. However, it has a prior probability dis-
tribution about the true state pk denoted by wo, where WO = [-,p~, ... ,-,p~j,
where -,p?r, is the prior probability that pk = p~, m = 1, ... , n. We assume
that the unknown permanent component of the logarithm of the price of
capital equals the mean of the logarithm of the actual price of capital and
values that are ±0.2 away from it. Thus, the set of possible values for pk is
defined as P == {p~, p~, pn = {-0.1546,0.0454,0.2454}. In the simulations,
we initially consider the case with O'~ = 0.0033.
The solution of the learning model is complicated by the fact that firms
form their expectation of the future by using the predictive density for
-k
PtH == 10g(nH)' conditional on the value of their information vector at
time t, which shows the posterior probabilities of the possible values of pk.
Using the notation of Section 2, this can be expressed as
n
e~H I wt) =
m=l
L f(f/;+l I p~, O'~)-,p;".
Thus, to simulate E[V(Kt+l' wt+dlwtj, we need to use draws from the
60
-le
predictive density of Pt+I. However, the predictive density is a mixture of
normals and is not normal. To do the simulations, we draw a total of D
normal random variables with mean zero and unit variance. We know that
-le
a fraction 1/1'!n of the draws on Pt+1 must come from the normal distribution
with mean p~ and variance O"~ for m = 1,2,3. Thus, for each value of 1/1'!n
at date t, we generate Dm = D . 1/1'!n draws on the future price of capital
for m = 1,2,3 and evaluate the price of investment for each of these draws
as P~.i = p~.i(1 - 'Y - z), i = 1, ... , Dm. Given knowledge of the value
function from the n'th iteration denoted by E [V n (Kt +2 , q,t+2)1q,t+I] , we
can calculate the maximum of the period t + 1 return for each value of P~.i
as
Table 4
Number Incidence A verage Level
Specification of States of It = 0 of Investment
(i) Uniform Prior 500 351 0.123
(ii) Informative Prior 500 324 0.198
(iii) Overestimation 500 327 0.0825
(iv) Underestimation 500 387 0.0789
(v) Increase in Risk 500 434 0.0209
13Fanny Demers (1985) shows how lack of confidence, underestimation and overesti-
mation of productivity and monetary shocks lead to cyclical effects.
14The prior distribution in the former case places the probablities 'I/l~ = 0.1, 'I/lg = 0.1
and "!jI~ = 0.8 for the three possible values of pk while in the latter case, the prior
distribution is 'I/l~ = 0.8, "!jig = 0.1 and 'I/l~ = 0.1.
62
subjective mean than the one which overestimates the true state. It is
therefore FSD dominated. Denote by lunder the optimal investment level
given underestimation. Since VK is increasing in pk, we have from the first-
order condition E[VKloverestimation] > E[VKlunderestimation] = pk(l_
, - z), where we evaluate VK at the same level of capital stock, namely,
(1 - 8)Kt + lunder, but under different distributions. By concavity of V,
lover > lunder where lover is the optimal investment given overestimation.
When the firm underestimates the future cost of investment and thus
expects a lower future cost than the true value, it believes that there is
no particular advantage of investing now. In this case the irreversibility of
investment takes primacy in the firm's evaluation, and it decides to invest
less today. On the other hand, when the firm overestimates the future cost
of investment, it sees an opportunity in investing now since it will be more
costly to invest at a later date. This effect partly mitigates irreversibility
considerations, and the "unduly pessimistic" firm invests more than the
"unduly optimistic" firm.
A final experiment that we perform is to change the riskiness of the price
of capital while the firm is still learning. For this purpose, we consider a
uniform prior distribution over possible values of pk and assume that the
variance of the underlying signal is double the value that it has in part
(i) of Table 4. As the results in part (v) of Table 4 show, an increase in
risk when the firm is uncertain about the permanent component pk has
a greater impact than an increase in risk that takes place in the absence
of such uncertainty and learning. When the variance of the observed price
of capital increases, firms find it more difficult to make inferences about
the unknown permanent component of capital, and refrain from investment
when irreversibility is present. This is the so-called information effect of an
increase in the variance of the price of capital, and the above results show
that it has a substantial negative impact on investment.
8 Conclusions
In this paper, we examined the impact of learning about the unknown costs
of investment on the risk neutral monopolistic firm's irreversible investment
decision. The costs of investing may be imperfectly known due to uncer-
tainty about the investment tax credits or about the price of investment
goods. We showed that the prospect of obtaining better future information
and of learning increases the endogenous cost of adjustment and depresses
current investment. Second, once learning is complete and the firm knows
the permanent component, we investigated the impact of greater cost risk-
iness. We showed that, in contrast to the exogenous cost-of-adjustment
model, a mean-preserving increase in the riskiness of the cost of investing
raises the endogenous marginal adjustment cost, thereby reducing invest-
ment and lowering the steady-state capital stock. Hence, in terms of the
well-known Knightian distinction, we established a negative relationship
63
Appendix
Proof of Lemma 1. The proof is by backward induction and uses the fact
that V can be viewed as the limit of a sequence of value functions corre-
sponding to finite horizon problems. Consider a sequence of value functions
{VN(K, w)} defined by VO == 0, and V N = T [V N- 1 (K, w)], where a su-
perscript on V, K, I denotes the number of time periods left until the end
of the horizon. Observe that Vi == (l-r)II(Kl) where Kl = (1-8)K2+I2.
Therefore, 11 == O. Also,
V2 = max{{l- r)II(K2) - pk2I2 + ,BE[Vl(Kt, w1 )]}.
12
wl' = /l-Wi + (1 - /l-)W i , 0 :::; /l- :::; 1. Then, assuming that vt, ... ,vll-
1 are
In other words, given the state 8 at time t, the stochastic kernel Q induces
the same measure in B, as the measure induced by the transition probability
Pin M. Notice that Q(8,·) is a probability measure. Taking inverse images
under <I> preserves all the necessary set theoretic operations. Therefore,
P(8,·) is a probability measure on (8,S). Second, one needs to show that
for all M E 8, PC M) is measurable with respect to S. This follows since
QC M) is measurable with respect to S. Thus, P is a transition probability
on (8,S).
[K#, W#] and recall that Q(s, B) = X(W, B) == iE 8(h' I W)dh'. Then,
(ii) T is quasi-compact:
Proof of Lemma 8. The proof is by backward induction and uses the fact
that V can be viewed as the limit of a sequence of value functions corre-
sponding to finite horizon problems. Consider a sequence of value functions
{VN(K,pk)} defined by V O== 0, and V N = T [VN-l(K,pk)] , where a su-
perscript on V, K, [ or on pk denotes the number of time periods left
until the end of the horizon. Observe that VI == (1 - T)II(Kl), where
Kl = (1 - 8)K2 + [2. Therefore, J1 == O. Also,
V2 = max{(1 _ T)II(K2) _ pk2 [2 + ,6E[Vl(Kl ,pkl)]}.
12
where the first inequality follows by Lemma 8 and the second by the Kuhn-
Tucker condition for It. Since V is concave in K H1 , h :::; It.
Proof of Lemma 10. As in the proof of Lemma 8, we consider a se-
quence of value functions {VN(K,pk)} defined by VD == 0, and V N =
T [VN-l(K,pk)] , where VI == (1- T)II(K1) where K1 = (1- 8)K2 + 12.
Therefore, 11 == O. Also,
and
dI 2 1
where dpk2 ,6(1 - T)IIKK'
and
where
dI3 1-,BlimE_o~Jvk[dG(pk2Ipk3+€)-dG(pk2Ipk3)]. 3
dpk3 = ,BE[VkK I pk3] if I > 0
::k: = 0 if 3= O.
1
Vi p k3 = (1 - 8) {1 -
,B lim! J vk ((1 - 8) K3 + I 3,pk2) [dG(pk2 I pk3 + €) - dG(pk2 I pk3)] +
J
e-O €
Vi p k3 = (1 - 8) x
,B lirn!
e-O €
J vk (1 - 8) K 3,p2k) [dG(pk2 I pk3 + €) - dG(pk2 I pk3)] ~0
Since E[Vk ((1- 8)K2,pk1) Ipk2] == (1 - r)IIK ((1- 8)K2), the second
term is not a function of pk2. Thus, VI is piecewise linear and concave
in pk2. Now, given that K2 = (1 - 8)K3 + 13,
(1 - 8) {3lim lim hI
€--+Oh--+O 10
Jvi ((1 - 8) K 3,p2k) {[dG(pk2 I pk3 + h + f)
_dG(pk2 I pk3 + f)] - [dG(pk2 I pk3 + f) _ dG(pk2 I pk3)]}.
Since vi is increasing in pk2, we know that the first and second terms in
brackets are both positive since by assumption G(pk2 I pk3 + f) dominates
G (Pk2 I pk3) by FSD and G (pk2 I pk3 + 10 + h) dominates G (Pk2 I pk3 + f) by
FSD. Therefore, Tt- p k3 p k3 :S 0 if [G(pk2 I pk3 + h + f) - G(pk2 I pk3 + f)] :S
[G(pk2 I pk3 + f) - G(pk2 I pk3)], that is, if successive increases in the
observed value of pk3 induce FSD shifts in the conditional distribution of
next period's pk, but they do so at a decreasing (or constant) rate.
Since vi is the minimum of concave functions, it is concave in pk3. As-
sume that VR-' ... ,V:-1 are increasing and concave in pk. Proceeding anal-
ogously, we can show that the sequence of value functions {V:- (K,pk)}
converge uniformly to the limit function V(K,pk), that the value function
V is differentiable almost everywhere in K, and that the sequence {V:-}
converges uniformly to the limit function VK given by equation (13). Since
VK is a limit of concave functions, it is concave in pk.
Proof of Proposition 13. Proceed analogously as in the proof of Propo-
sition 9 and apply Lemma 12.
References
Abel, A. (1979). Investment and the Value of Capital. (New York: Garland
Publishing).
Abel, A. (1982). "Dynamic Effects of Permanent and Temporary Tax Poli-
cies in a q Model of Investment," Journal of Monetary Economics, 9,
353-73.
Abel, A. (1983). "Optimal Investment under Uncertainty," American Eco-
nomic Review, 73, 228-33.
70
50011, U.S.A.
2 Yale University, Department of Economics, Cowles Foundation 30, Hillhouse
Ave., New Haven, CT 06511, U.S.A.
Abstract. The market portfolio (world portfolio) is in one sense a least im-
portant portfolio to provide to investors; there is always a better portfolio
for social planners to make available to them. In a J-agent one-period sto-
chastic endowment economy, where preferences are quadratic, the market
portfolio is never spanned by the optimal markets a social planner would
create. With identical preferences, the market portfolio is orthogonal to all
J - 1 portfolios which achieve a first best solution. These conclusions rely
on the assumption that the social planner has perfect information about
agents' utilities. We also show that as the contract designer's information
about agents' utilities becomes more imperfect, the optimal contracts ap-
proach contracts that weight individual endowments in proportion to el-
ements of eigenvectors of the variance matrix of endowments. If there is
a substantial market component to endowments then a social planner, for
reasons of robustness and simplicity, may conclude that creating a contract
to allow trading the market portfolio would be a significant innovation.
To gauge the empirical relevance of the world portfolio, we estimate the
optimal contracts, using Maddison [1995] data on per capita income, for
Canada, France, Germany, Italy, UK and the USA. We find that when the
contract designer has no information about utilities, the first two contracts
nearly span the world portfolio.
·We thank Peter Bosaerts, Subir Bose, John Geanakoplos, Chiaki Ham, Jesus San-
tos, Paul Willen, Eric van Wincoop, participants at the Universit.y of Chicago Finance
Workshop, t.he Economic Theory Conference in Turkey (1997), Summer Econometrics
Societ.y Meet.ings in Pasadena (1997) and participant.s at. the NBER. conference on As-
set. Pricing (1997) for helpful comment.s. The authors are responsible for any remaining
errors.
74
1 Introduction
The "market portfolio," the portfolio of all endowments in the world, has
great significance in the capital asset pricing model (CAPM) in finance. The
Sharpe-Lintner CAPM characterization of optimal risk sharing implies that
in equilibrium no one will be subject to a random shock that is not shared
by everyone else. 1 Thus, the CAPM gives us the "mutual fund theorem,"
which asserts that only one risky portfolio need be available to individual
investors, the mutual fund that holds the market portfolio. In this paper we
seek further clarification of the significance of the market portfolio beyond
the bounds of the restrictive assumptions of the CAPM.
The original version of the CAPM was designed to describe how agents
should invest in existing financial assets. Thus each agent has some stock of
wealth and she must choose how much of her wealth to invest in each asset.
There is some zero cost intermediary that allows the agents to purchase the
assets. One of the key insights of the CAPM is that each agent needs only
the market portfolio (the portfolio of all the financial assets in the world)
and the risk free bond to be available to them to trade in so that they
obtain their optimal allocation of risk. It is in this sense that the market
portfolio is so important in the CAPM.
In our analysis, we will drop the (highly unrealistic) assumption of the
CAP M that all risks are tradable; we include in our model non-financial
endowments such as labor income. Thus in general no one will be able to
hold the market portfolio (the portfolio of all the endowments of the world)
unless unprecedented new institutional arrangements are made to permit
it to be traded. 2 We instead develop a CAPM-type model in which each
individual has a random endowment that is initially not marketable, and
we will consider adding one, two, or more contracts that make it possible to
buy or sell portfolios of claims on the endowments. We assume that these
contracts are to be traded in markets open to everyone, and a market price
will be generated such that total excess demand by all agents is zero. Thus,
by creating these contracts, we are creating new markets for portfolios of
endowments, making a risk tradable that had not been so before.
We confine our attention to designing N contracts, where N is small, in
order to prescribe in simple terms the most important risk management
actions that should be taken by groups of people and to ask if the "market
portfolio" (the world portfolio) is the most important contract, or is even in
the span of the most important contracts. Most people take no more than
simple prescriptions from existing models. Practitioners usually do not use
people if it were created first, or if it were created second or third, only that
there would always be something better to do instead. This result may be
regarded as, in a sense, the very antithesis of the mutual fund theorem.
Neither will we ever want to create markets for individual endowments or
for portfolios weighting all endowments with the same sign. Optimal con-
tracts will always involve portfolios of risky endowments with both positive
and negative quantities and their weighted sum is zero. The optimal con-
tracts are thus always essentially swaps, i.e., one side trades the negatives
for the positives. This result may be regarded as in a sense the apotheosis
of swaps.
The results that there is no need for a market for the market portfolio
and that only swaps will be created rest on the assumption that the con-
tract designer who is creating the new markets knows everything about
utilities. We show one representation of lack of knowledge on the part of
the market designer that brings the market portfolio back to some potential
significance, Theorem 7 below. If lack of knowledge is high and if there is a
strong market component to endowments, then something approximating
the market portfolio may well be of first importance. Creating the market
portfolio makes possible more robust definitions of subsequent markets.
Theorem 1 below is part of a framework developed in Athanasoulis [1995]
and Shiller and Athanasoulis [1995]; it was developed independently by De-
mange and Laroque [1995b]. A related analysis is found in Duffie and Jack-
son [1989] and Willen [1997]. See Geanakoplos [1990] for an introduction to
General Equilibrium with incomplete markets. Cass, Chichilnisky and Wu
[1996] show how the number of assets needed to obtain a complete markets
solution can be greatly reduced by constructing a set of mutual insurance
contracts and a smaller set of Arrow securities when compared to an Arrow-
Debreu world. This is related to our results as we only need assets far less
than the number of states of the world to obtain a first best solution. We
however consider which assets are best to construct if we do not complete
assets markets. Demange and Laroque show [1995a] that in an economy
with general utilities (not necessarily quadratic), when all residual risk is
hedged, the only important assets remaining to construct in the economy
are non-linear assets, such as options, whose realizations depend exclusively
on the realization of the market portfolio. Our results are complementary
to this Demange and Laroque result rather than being a competing result.
Our analysis here starts from no markets at all, and studies a sequence
of markets to allow linear spanning of the original endowments; Demange
and Laroque [1995a] are considering moving yet beyond the linear span-
ning, and it is in the subsequent nonlinear markets alone that the market
portfolio has (under their assumptions) such importance.
In the empirical section, we estimate the optimal contracts in three differ-
ent cases; when the contract designer is perfectly informed about utilities,
when she has less than perfect information and when she has no informa-
tion. Our estimation is conducted for Canada, France, Germany, Italy, UK
77
and the USA using the Maddison [1995] data on per capita income, 1880-
1992.4 Analyzing the first two contracts, we find the first contract is a swap
of risk between the US and the European Union, while the second contract
is a swap of risk within the European Union. This is true for the cases
where the contract designer has perfect information and a little less than
perfect information. However, we find that when the contract designer has
no information about utilities, then the world portfolio is nearly spanned
by the first two optimal contracts. The first contract is a contract for US
risk and the second contract is a contract for European Union risk. Thus
there is an empirical justification, as well as theoretical, for constructing
and marketing the world portfolio.
The paper is organized as follows. We first layout the assumptions of the
general equilibrium model and then solve the agent's problem for a given
set of available contracts. The resulting expressions for equilibrium prices
and quantities will be used in all subsequent parts of this paper. We then
go through several variations on the maximization problem faced by the
contract designer, differing in assumptions about pre-existing markets and
about the information available to the designer. An empirical investigation
ensues to answer whether the world portfolio is an important portfolio. We
then conclude with some practical advice for contract designers.
2 The model
There are J agents in this economy indexed by j = 1, ... , J, each repre-
senting an individual except in Section 11, where each agent represents a
large number of individuals. All random variables are defined on a complete
probability space (n, F, P), where n is the set of states of the world and
wEn is the state of the world. F is a a-algebra of subsets of n known as
events and P : F ---t[0,1] satisfying P(0)=0 and p(n)=l is a probability
measure on (n, F) held commonly by all agents in the economy.
There is a single good in the economy which is consumed. Each agent j
has an endowment Xj E L2(n, F, P) where L2 (n, F, P) is the set of random
variables which are square integrable, i.e., have finite mean and variance.
We will denote the demeaned stochastic endowment as Xj = Xj - E(xj).
Define x to be the 1 x J vector of random endowments in the economy and
similarly let x be the 1 x J vector of demeaned stochastic endowments.
Then E(x'x) = L: is the J x J covariance matrix of the endowments in the
economy. Define E(x'xj) = L:j and E(xjxj) = L: jj .
The N S J contracts indexed by n = 1, ... , N designed in this paper
are futures contracts. Let In E L2(n, F, P) be the risky transfer made in
the nth futures contract resulting in In(w) units of consumption contingent
4 These are the set of G-7 couutries for which all the observations are available, 1880-
1992.
78
3 Agents
Each representative agent has a utility function Uj : L2(0" F, P} ---> R. We
make the simplifying assumption that each agent has mean-variance utility
as follows:
(1)
where Cj is the consumption of agent j, the same as the endowment plus
proceeds from hedging. Each agent j takes the risky transfers contracts I
which is a vector L2(0, F, P) process and the futures prices P E RN as
given and solves for her optimal futures positions, qj, as
qj = argmaxqjE'R.N {UjlCj = Xj + q/(f - P)}. (2)
We can rewrite this in a simpler form as
with her endowment since it provides less hedging services. To help the
exposition of this paper it is convenient to form the N x J matrix Q whose
lh column is qj and rewrite (4) as
= -pt'r- 1 - Cov(j,x) = -pt'r- 1 - A'1:,
Q (5)
where r is the J x J diagonal matrix with the lh diagonal element equal
to 'Yj and t the J x 1 unit vector.
4 Equilibrium
The equilibrium condition in this economy is simply that the futures con-
tracts are in zero net supply. We can represent equilibrium in this economy
as
(6)
From equilibrium condition (6) we can derive the equilibrium pricing equa-
tion
P = -A'1:t (t'r-1tr1 . (7)
Definition The market portfolio is defined by its dividend
fm =xm, (8)
where m is a scaled unit vector
t
m=== . (9)
(t'1:t) .5
If we multiply and divide the right hand side of (7) by (t'1:t)·5 then the
price of a contract n depends on A~1:t(t'1:I)-·5 === A~1:m, the covariance of
contract n with the market. Thus we can derive the CAPM pricing equation
from equation (7). If the covariance of a contract with the market is zero,
as for example with a risk free asset, then the price of this asset is PI = O.
The price of the market portfolio is Pm = - (::i?~(. It follows that
cov(jn, fm)
Pn - PI = (f) (Pm - PI) ,
var m
(10)
which is the familiar CAPM pricing equation and Co:a~fj::)') is the famil-
iar beta of the CAPM model. Similar results are obtained by Magill and
Quinzii [1996], Duffie and Jackson [1989], Oh [1996] and Mayers[1972].5
Substituting (7) into (5) we also obtain
Q = -A'1:M (11)
r. F!'Olll cquation (7) it. tUl'llS out thl\t. Pt = 0 and t.lmH Pn is just the risk premium
from the CAPM pricing cCjuation.
80
5 Contract design
The contract designer's problem is to maximize welfare, total utility, in the
economy given she is constrained to choose N ~ J contracts. The contract
designer will choose the J x N matrix A to maximize the sum of utilities
in the economy. From (3) we know that each agent's utility is given by
If we sum over all J agents, drop E(xj), and put this in matrix form we
obtain
tr ( -Q' Pi' - ~r ("E + Q'Q + 2Q' A'"E)) , (13)
where tr denotes the trace. If we substitute (11) and (7) into (13) we obtain
where the term ~r"E has no effect on the contract designer's decision. Thus,
using tr(AB) = tr(BA), the contract designer's problem simplifies to
MrM'"E. (16)
We are requiring in this problem that the diagonal of the matrix A'~A is
equal to to The first order conditions can be written as
Vn = 1,···,N (18)
and
A~~An = 1 Vn = 1,··· ,N. (19)
If we define A to be the N x N diagonal matrix with the nth diagonal
element to be An we can combine the first order conditions to obtain
(20)
and
diag(A'~A) = L. (21)
Thus taking the inverse of ~ through equation (20) gives us the result. Fi-
nally if one premultiplies equation (20) by A', one obtains A'~Mr M'~A =
A. The trace of the left hand side of this is the objective function the plan-
ner is trying to maximize. Since this equals A, it is diagonal and as such
the planner will choose the N eigenvectors corresponding to the N largest
eigenvalues. 6 0
Note that if we take a Cholesky decomposition of the variance matrix ~,
~ = C'C, and premultiply through equation (20) by C,-1, then CMr M'C'
is positive semidefinite and symmetric with eigenvectors CA. The eigenval-
ues of a positive semidefinite symmetric matrix are all real and nonnegative,
and these are the same as the eigenvalues of Mr M'~. Since the rank of M
is J - 1, there are only J - 1 nonzero eigenvalues, and hence only J - 1
contracts are of any value. Thus, there is no point in creating all J possible
contracts, at most J - 1 are needed and A need have no more than J - 1
columns. If there is a fixed cost to creating markets, then N, the number
of markets created, can be chosen optimally. We create all markets whose
eigenvalues (divided by two) are greater than this cost.
One will notice in the above problem that we did not constrain the off
diagonal elements of A'~A to be zero. Notice however that A is diagonal
and since C' Mr M' C is positive semidefinite and symmetric with eigenvec-
tors CA, it follows that A'~MrM'~A is diagonal. Since A'~MrM'~A =
A'~AA it must be that A'~A is diagonal. Thus the contraint that the off
diagonal elements are zero is satisfied in the unconstrained problem. This
was shown by Darroch [1965] and by Okamoto and Kanazawa [1968].
Lemma 1 In the case where agents have the same risk aversion, 'Y j' the
market portfolio is orthogonal to all optimal contracts.
Proof. By Theorem 2, g is orthogonal to all optimal contracts and g =m
here. 0
This lemma is particularly important since symmetry of risk aversions is
likely to be assumed when designing new contracts.
For any J, the result that gA = 0 means that no linear combinat.ion
of the N optimal contracts can be constructed with all positive elements.
Only "swaps" between endowments can be constructed by portfolios of the
optimal contracts. No matter how many markets we choose to create (re-
gardless of N), it will be impossible to renormalize these markets, define
different markets as linear combinations of them, so that. any market is
not a swap. All possible portfolios constructed from the optimal portfolios
represent exchanges of endowments for ot.her endowments. Since the mar-
ket portfolio holds positive quantities of all endowments, it is an example
of a market that cannot be constructed from the optimal contracts con-
structed from the above method. Consider the case where all agents have
the same risk aversion, Lemma 1, so that r is proportional to the identity
matrix. It then follows from this theorem and lemma that in all possible
portfolios constructed from the optimal contracts defined by A, the sum of
the portfolio weights in terms of endowments are zero and the portfolios
are orthogonal to the market portfolio. Furthermore, if N = J - 1, then
the resulting equilibrium is Pareto optimal. See Magill and Quinzii [1996]
P.181 for pareto optimality of the CAP M equilibrium. This follows here
since the case with N = J - 1 contracts results in the CAPM equilibrium,
i.e., CAPM allocation of risk.
To understand these results better let us consider a two-agent exam-
ple. A two-agent example ignores some of the complexity that the optimal
market solution method is supposed t.o handle, but it will make some ba-
sic concepts more transparent. We can then illust.rate the solution to the
contract designer's problem on a simple two-dimensional graph, Figures 1
and 2, with the first element of AI, aI, on the horizontal axis and the sec-
ond element of Ab a2, on the vertical axis. On t.hese figures the constraint
A~ ~AI = 1 is that t.he Al vector must end somewhere on the ellipse shown.
The ellipse shown illustrates a case of positive correlation between the two
83
a2
FIGURE 1. Illustration of Optimal portfolio weights when both agents have same
risk aversion, iwc is an iso-welfare curve, nc is the normalization constraint.
endowments, where both endowments have the same variance and a corre-
lation coefficient of one half. On each figure, iso-welfare curves are parallel
straight lines (one pair of which is shown); the further from the origin the
higher the welfare.
The optimal vector Al must be orthogonal to g, which means that the
vector is in the upper left quadrant (or lower right), and is not the in the
same quadrant as the market portfolio vector m. In Figure 1, the case is
shown where all the "I's are one, and so 9 equals the market portfolio vector.
Each agent will use the optimal contract to swap half of her endowment
risk for half of the other's, and both agents will end up holding a share of
the world. In this case, the optimal contract is orthogonal to the market
portfolio, and the market portfolio contract would be utterly useless to
the agents if it were created instead of the optimal contract. The optimal
contract is found on the graph by finding the highest iso-welfare curve, iwc,
that satisfies the constraint, tangent to the ellipse. Clearly in this symmetric
situation there is no value to being able to trade the market portfolio for
these agents, as they would both like to take the same position.
In Figure 2, the case is shown where "11 equals 3 and "12 equals 1. Now,
the 9 vector no longer coincides with the market portfolio vector, m, and
the optimal Al vector results in an unequal swap. In the swap, the more
risk averse agent gives up three times as much of the risky component of
her endowment to the other agent, and pays a price to the other agent
for doing so. After the swap, the more risk averse agent is bearing only
one quarter of world endowment risk, the less risk averse agent is bearing
three quarters. This is the Pareto optimal outcome: there are no more risk
sharing opportunities, and each agent is bearing world endowment risk in
84
a2
a1
accordance with own risk preferences. Note that in this case had we instead
created the market portfolio first, it would have been of some use though
it would touch an iso-welfare curve that is closer to the origin. In both
figures, the isoquants for the objective function in (15) are parallel straight
lines with just such a slope that the tangency between them and the ellipse
A~ I;A 1 - 1 = 0 occurs at a point defining a vector perpendicular to g.
Theorem 3 The contract that satisfies (22) is the market portfolio, i.e.,
Al =m.
85
(23)
and
A~I:AI = 1. (24)
Solving these we obtain the result. 0
Thus as in the CAPM, the only insurance which costs anything is to insure
oneself against the market.
It may seem puzzling that the market is completely unimportant to con-
struct by a social welfare criterion and yet has the highest absolute value of
price. But note that the expression to be maximized by the social welfare
criterion (15) is the trace of A'I:Mf MI:A, and
8 Pre-existing markets
The above theorems take no account of pre-existing markets, markets for
some endowments or linear combinations of endowments that already ex-
ist before the contract designer begins to define new markets (contracts).
Suppose that we modify problem (15) to represent that there is a single
pre-existing contract, where the coefficients of the endowments in the lin-
ear combination that defines this pre-existing contract are given by the
J x 1 vector AI, the first column of A, which, without loss of generality,
we normalize so that A~ I:AI = 1. (It is trivial to extend our results to
more than one pre-existing contract.) The contract designer will then de-
sign N* = N - 1 markets, choose A* = [Ai A 2··· AN>], the remaining
columns of A, (A = [AI: A*]) subject to the normalization rule A'I:A = I.
Then A * is defined by
of the world's, by shorting the first market and going long the second. In
this example Al and A* together also span the market portfolio.
The result that pre-existing markets may cause the contract designer
optimally to create contracts that allow spanning of the market portfolio
does not mean that the market portfolio is in any real sense important.
In the above example, the agents use the two markets to construct a swap
between the first agent's endowment and world endowment, not to take a
position in world endowment. Had the contract designer, in constructing
the contract represented by A *, ignored orthogonality with the pre-existing
market and just created the contract defined as the solution to (15), thereby
directly creating the swap between the first agent's endowment and the rest-
of-the-world endowment, then almost all the welfare improvement available
to hedgers would be available just by using the second market. One may
suppose that if the welfare gain available through the pre-existing market
is small enough then it might well disappear after the second market is
created.
Proof. If the first contract is the market then it must be the case that
the rest of the contracts A~., n* = 1,···, N* are constructed such that
A~.~Al = Ji;~: = O. If this is the case, then A~.~t = 0 and from
equation (7), the result follows. 0
Theorem 5 When Al = m the A* matrix that solves (26) has the property
that Q* = - A *'~M has columns corresponding to the N* eigenvectors with
highest eigenvalues of
(32)
Proof. Using equation (25) and Lemma 2, the problem the social planner
88
solves is
<I>'~<I> is the variance matrix of residuals when the endowments are re-
gressed on the world endowment. If r = I J , i.e., if everyone has the same
risk aversion, then the optimal markets are defined in terms of eigenvectors
of this simple variance matrix. Moreover, since Q*' = - ~A *, the posi-
tion that agent j holds of the nth contract is just the regression coefficient
corresponding to the nth contract when the endowment of that agent is re-
gressed on the vector of contract payoffs xA *. These results, coupled with
the above-noted zero prices for all contracts other than the market con-
tract, make this equilibrium a simple one to understand. Once the market
portfolio is traded, the problem agents face for orthogonal contracts is a
variance minimization problem.
A'L:Mr M'L:A as
A'L:MrM'L:A == A'L:rL:A - A'L:u'L:A (L'r- 1L)-1. (35)
One obtains equation (35) by substituting in for M.
Theorem 6 The A matrix that solves (34) has columns corresponding to
the N eigenvectors with highest eigenvalues of
(36)
L: - cu'L:, (37)
E(L'r- 1L)-1
where c = Eh)
With (37) we can easily take account of specific distributional assump-
tions about r. We need only derive the expected value and expected value
of the harmonic mean of the elements of r, to define the scalar c.
The limiting case of this problem, when the variance of '"'( increases to
infinity, is particularly interesting. This is the case where the contract de-
signer's information is becoming more diffuse.
Theorem 7 If '"'( j' j = 1, ... , J are iid lognormal variates, then as the vari-
ance, (T2, of In( '"'( j) goes to infinity, the A matrix that solves (34) approaches
a matrix whose columns are N eigenvectors of L: with the corresponding
highest eigenvalues.
Proof. Define the geometric mean of risk aversion parameters to be G =
(TIf=l'"'(j)-1 and the harmonic mean as H = (,2:.f=1'"'(j1)-1. Under
the lognormal assumption ~t~? = e::/I-'~ a;. 2: C
= exp ( _(T2 J2J?») ).
Therefore lima2->oo ~t~] = O. Since H ~ G everywhere, (see for example
Hardy et. al. [1964]' p. 26) then lima2->oo ~l~l = lima2->oo c = O. Thus,
the limit of the matrix (37) as (T2 goes to infinity is L:. Since the solution of
problem (34) is a continuous function of the elements of the matrix (37),
and since the limit of a continuous function is the function of the limit, the
theorem follows. 0
90
If one is going to construct some contract given she knows nothing about
the utilities in the economy, what should the contract be? One wants to
somehow maximize the probability that their contract will have the highest
welfare improvement in the economy. As such the contract designer should
construct the contract that markets the largest component of risk in the
economy. This is exactly the result of Theorem 7. Given we know nothing
about risk aversion, we have the best chance of welfare improvement in
the economy by allowing agents to hedge the most risk possible. The first
principal component of I; is unrestricted by our theory. It could have all
positive elements and could approximate the market portfolio.
If the first principal component of I; is approximately the market port-
folio and its eigenvalue is large, then people have a substantial covariance
with the market. Among those agents with similar market exposures, those
who are more risk averse can sell a share of the market portfolio to less risk
averse agents, thereby reducing their risk. We do not need to know who is
more risk averse in setting up markets to make this possible.
Let us return to the two-agent examples that were plotted in Figures 1
and 2. If we do not know which agent is the more risk averse, then this
maximization problem facing the contract designer is not as simple as it
appeared from that figure. We do not know the position of the vector g,
that is whether Figure 1, Figure 2 or some other figure is relevant. Thus
the position of the optimal Al vector cannot be determined.
We plot instead in Figures 3 and 4 the expected iso-welfare-curve to
the maximization problem (34). These are not parallel straight lines but
ellipses. If we have only a little uncertainty about risk aversion, see for ex-
ample Figure 3 where c=.49, the expected iso-welfare curves are elongated
and near the origin resemble the parallel straight lines of Figure 1. But if
our uncertainty about risk aversion is large, see Figure 4 where c=O, the
expected iso-welfare curves are elongated in the perpendicular direction. In
the extreme case, where the uncertainty about agents' risk aversion makes
it very probable that one is much more risk averse than the other, then,
not knowing which is the more risk averse, the best contract we can design
in this example is simply a market for the market portfolio.
With very little uncertainty in these terms about the "('s, the optimal Al
for our two-agent example with i.i.d. "('s will still be a vector perpendicular
to the market portfolio, a vector with a slope of minus one. Note that
Figure 3, where c=0.49, resembles Figure 1 in the vicinity of the origin.
Figure 1 corresponds to c=O.5. However, even a small amount of uncertainty
means that there will still be a reason to create a second market, and A2 will
be the market portfolio vector, in the first quadrant, with slope of plus one.
As the uncertainty about the "('s increases, the eigenvalue corresponding to
Al shrinks relative to the eigenvalue corresponding to A 2 , and at some point
becomes the lower; at this point we must switch the order of the columns
of A, and the market portfolio becomes the best portfolio to create. What
has happened finally is that uncertainty about the "('s has become so great
91
a2
FIGURE 3. Illustration of Optimal portfolio weights when risk aversions are iid
and c=.49. eiwc is an expected iso-welfare curve and nc is the normalization
constraint.
that we can no longer predict what kinds of swaps will be useful to agents.
The market portfolio may still be useful if either agent is more risk averse
than the other; that agent can sell part of the market component of her
endowment to the other.
Note that this conclusion using the lognormal assumption might be gen-
eralized to other distributions but it is not true of all distributions of Ij > 0
with finite means. The important point of the theorem is that the contract
designer's information about agents' utilities becomes more diffuse. If for
some reason, as the variance approaches infinity, the contract designer's
information becomes less diffuse, then the contract designer can better
construct contracts since she has more information which results in more
welfare improvement.
Consider, for example, a case where Ij can only take on two values, Ijl
and Ij2' Ijl is fixed, the mean t is fixed and we vary Ij2' The probability
we observe Ijl or Ij2 are prl and PT2 respectively. Thus we have
(38)
and
(39)
We increase the variance of Ij by moving the higher value Ij2 towards
infinity. As we do this we reduce the probability pr2 that risk aversion for
person j equals Ij2' It is easy to show that in the limit, as the variance is
increased to infinity, i.e., as 'Yj2 ~ 00, the expected value of the harmonic
mean of J values approaches Ijl' In the limit, the probability approaches
92
a2
a1
------~----~~--_P~-----
one that all J values are the same so that the probability approaches one
that the expected value equals the harmonic mean of the J values. This
example shows that as all peoples risk aversion approaches "tj1 in the limit
and thus as the variance goes to infinity, the contract designer becomes
more informed.
Proof. To prove this we use the multiplication rule for Kronecker products,
(Ai !XI B i )(A2 IX! B2) = (AiA2) IX! (B i B 2). Note that c = 7<, where c ==
E(L/~~~)L)-l . We have H == :E-cu':E = ~®(KK')- ~ ((U')IX!(KK'))(~IX!KK') =
~ !XI (KK') - 7< (( U'~) !XI (KK') (KK')) = ~ IX! (KK') - c( ii'~ IX! (KK')) =
H!XI(KK'), where H == ~-C(u')~. Now, from above we know that HA = AA.
H(A!XI K) = (H IX! (KK'))(AIX! K) = (HA) IX! (KK'K) = KH A IX! K. We can also
show that (AA) !XI K = (A IX! K)A. Hence H(A IX! K) = (A IX! K)(KA). Thus,
the same set of eigenvectors that solve (34) solve (40), with eigenvalues
multiplied by K. D
Thus, the bigger problem of designing optimal markets for all N K people
collapses to the simpler problem discussed in the preceding section. Note
that since H is the same rank as H, there are no more nonzero eigenvalues,
the presence of K individuals per "agent" does not introduce the need for
any more than J markets.
Using (35) and noting from the contraints that A*'~~ = 0, we may rewrite
the contract designer's problem as
7 There arc an infinit.e numher of A's which will solve (40) of which A ® It is onc. All
re~mlt ill t.he Hamc equilihrium.
94
Theorem 9 The A* matrix that solves (42) has the property that Q* =
- A *'~ has columns corresponding to the N* eigenvectors with highest
eigenvalues of
<I>'DI>E(f). (43)
Proof. Proceed as with Theorem 5.0
This theorem shows that given the expectations of f, uncertainty about
the ),'s does not affect the optimal markets when the market portfolio is
a pre-existing market. We know that the amount of uncertainty, Theorem
6, or diversity, Theorem 8, of the ),'s affects the optimal contracts if the
market portfolio is not pre-existing. As such one reason to construct the
market portfolio first is that the remaining markets' definitions are robust
to misspecification of the uncertainty or diversity of )"s.
13 Empirical application
13.1 Estimation method
The method for estimating our contracts comes from Shiller and Athana-
soulis [1995] NBER paper no.5095 and the theory presented above. We
assume that each representative agent j has the utility function
T
" Utj (44)
Uj = L...t (1 )t'
t=l +p
We define felicity Utj as a function of mean and variance
'" One can obtain this hy taking a second order Taylor expansion of a constant relative
risk aversion utility function and making some simplifying assumpt.ions.
95
where POP is the JxJ diagonal matrix with the population of the lh
country in the lh diagonal position. This problem is derived by the contract
designer maximizing the sum of the utilities of the agents in the world. The
A matrix is the J x N matrix whose nth column weights the demeaned per
capita incomes of the countries in the analysis. The intertemporal part of
this problem is taken into account in the covariance matrix and is described
in the Estimation section. The basic first order condition to choose the A
matrix is
E [~MPOprM'~A] = ~AA, (47)
where M == I - POP u'r-1 (t' PO pr- 1t) -1 and ~ is the covariance matrix
of per capita incomes. We may rewrite the first order condition as
r includes the coefficients of relative risk aversion for each country on the
diagonal. It is assumed that the ~ matrix, the covariance matrix of per
capita incomes, is known with certainty.
13.2 Estimation
We estimate the ~ matrix as per Shiller and Athanasoulis [1995] where we
let ~ = L~~1 ~tht where h = ((1+p)(1+g)1'+1 )-t.9 Thus we are estimating
a 20 year covariance matrix under the assumptions that all the coefficients
of relative risk aversion are the same. We also make the assumption that the
rate of discount is known. We let the rate of time preference, p = .02, and
the rate of relative risk aversion, , = 3. We assume that the average yearly
growth rate of the six countries is g = .02 and for sensitivity analysis we let
g = 0 to make sure the contracts are robust to different rates of discount
and growth.
Our data source on per capita incomes comes from Maddison [1995],
1870-1992, for Canada, Germany, France, Italy, UK and USA. The data
are constructed in real terms, in international Geary-Khamis dollars, so
that international comparisons can be accurately made. In particular it
takes into account the differences in prices of non-traded goods to measure
real income differentials.
We assume that, is lognormally distributed with E(r) = 3 and Var(r) =
0,1 and 00. To obtain E [(t'r- 1pOPt)-1] when the Var(r) = 1, we solved
numerically by drawing, from a lognormal 100,000 times and calculating
the expectation. Thus we produce six tables for estimates of the A matrix:.
Three for g = .02 and the variance of, evaluated at 0, 1 and 00 and three
for g = 0 and the variance of , evaluated at 0, 1 and 00.
9This comes directly from the utility function (44) and substituting in (45).
96
13.3 Discussion
The results are shown in the tables section at the end of the paper. First
we see that the US has the largest per capita income in the set of coun-
tries we use (in international Geary-Khamis dollars), Table 1 column l.
Furthermore we can see from the populations of the countries that the US
dominates the others, Table 1 column 2. Thus if we were to construct the
market portfolio, and we will discuss the case when 9 = .02, column three
of Table 1, the weight would be very high for the US, and almost equal
weighting for the European Union and a small weighting for Canada. From
the variance matrix, Table 2, we notice that the UK has the smallest vari-
ance of per capita income. While France, Germany and Italy have larger
variances than the US, the size of the US (population) causes the variance
of the US to dominate. We also see (from the correlation matrix, Table 3)
that the US correlates negatively (almost zero) with both Italy and France
as well as having a small (almost zero) correlation with Germany so there
should be large risk sharing opportunities there. Canada also has similar
correlations with these three European countries but its high correlation
with the United States means that it will be a small part of this risk sharing
arrangement. While France has a low correlation with the UK, the fact that
the UK's per capita income variance is low and the pOPulations of the two
countries are similar implies there will probably not be a great risk sharing
opportunity there. In short the UK from the point of view of pooling risk
is irrelevant.
The three Tables representing the A matrix are very revealing. We discuss
the results for 9 = .02, Tables 6, 7, and 8, though we find the results are
robust (i.e., the optimal contracts do not change significantly when 9 = 0).
We discuss the first two contracts for the first two Tables, 6 and 7, and
discuss the first three when the uncertainty about agents risk aversions
is infinite, Table 8. When the contract designer has no uncertainty about
the risk aversions the first contract is a swap of risk between the U.S. on
one side and France, Germany and Italy on the other side. This we can
see once again from the correlation matrix that the US has almost zero
correlation with these countries and much of this risk can be pooled. The
second contract is a swap of risk between France and Germany. France's
correlation with Germany is .37 which is higher than her correlation with
the UK which is .04. However one must remember that the UK's overall
variance of per capita income is very small, insignificant from a pooling
standpoint. As such France is much better off pooling risk with Germany
even though her correlation with Germany is higher.
When the contract designer has some uncertainty about the coefficients
of risk aversion, Table 7, the variance of the ,),'s is 1, the results of the first
two contracts are almost identical to the case where the contract designer
has no uncertainty. The first contract is a swap between the US on one side
and France, Germany and Italy on the other. The second swap is between
97
France and Germany. What is happening here is that though there is some
uncertainty about the coefficients of risk aversion, the pooling opportuni-
ties within these groups outweighs the possibility of making some error in
judgement about the risk aversions of agents. Thus making a small error
in judgement about agent's risk aversion is not very costly here since the
pooling opportunities are so large.
Finally the contracts when the contract designer has no information
about agent's coefficients of risk aversion are quite different, Table 8. The
first contract is a contract for US risk. Given no information, the contract
designer decides on a contract which will potentially affect the most people
in the world. US population dominates the set of countries in our study.
The second contract is one for France, Germany and Italy. One will notice
that if one subtracts contract two from contract one, one gets the swap of
the US for France, Germany and Italy. Thus the lack of knowledge on the
contract designer's part causes her to split up the first contract in the com-
plete information case into two contracts in the incomplete information.
Since this is the largest risk sharing opportunity in the world, it allows
agent's in the world to swap this risk as well as allow for the possibility
that the designer is making an error in judgement. It is also true that if one
were to add contracts one and two together, one would approximately get
the market portfolio. The third contract is similar to the second contract
in the complete information case, a swap between France and Germany.
Thus we see that as we move from the complete information case to the
complete lack of information case, the first contract is decomposed into
the first two, then the other contracts (generally) are ordered the same.
Furthermore the market portfolio may be spanned within the first few con-
tracts, and appears to be in this case. These results also seem to be robust
as changing the discount rate (growth rate to 9 = 0) does not signifi-
cantly alter the qualitative results. One will also notice that since the first
two contracts in the complete lack of information case summed together is
approximately the market portfolio, all other contracts are approximately
insurance contracts. That is the cost to purchase those other contracts (the
premium) must be approximately zero.
defined in the contracts could even have non-negative quantities of all en-
dowments. The question is, how restrictive are the assumptions in (15)?
Of course, we are not in a situation where there are no pre-existing mar-
kets, and so one might conclude that the alternative maximization problem
that accounts for these, (26), is the more relevant. We are, however, some-
what inclined against this view. We should not automatically assume that
we are constrained by pre-existing markets. History shows that pre-existing
derivative markets actually do sometimes wither away when another deriv-
ative market appears that serves hedgers better. lO
A more important issue is uncertainty about preferences which leads us
to problem (34), or if there are K individuals per agent, problem (40).
These lead to the same solution and so our maximization problem (34)
may be the most relevant. As a matter of historical fact, market designers
have found it very difficult to predict in advance of creating a new market
who will want to take positions in the new market. Our representation of
uncertainty about preference parameters can be regarded as a metaphor
for our difficulty in predicting investor behavior.
Thus, taking account of this uncertainty as in (34) would be of great
practical importance for contract designers. If contract designers assumed
enormous uncertainty about preferences, so that the limiting case described
in Theorem 7 applies, then, if there is a substantial market component in
the economy, one might think that something approximating the market
portfolio would be the most important market.
There are reasons to suspect that endowment (income) shocks have a sub-
stantial world component; technology shocks proliferate around the world
and economies are linked through trade. We find this to be empirically
true here. If we do not know E accurately but believe there is a strong
world component to endowments, we may want to impose on our estimate
of E a prior that this component is important. This might lead a contract
designer to construct the market portfolio. It may be noted that a pos-
sible outcome of estimating E, using (34) and specifying moderate prior
uncertainty about risk parameters would be a conclusion that something
approximating the market portfolio is not the most important new market
to create, but still one of the more important markets.
Actual markets we create should be easy to describe and understand to
ensure their success. Despite fundamental uncertainty about future vari-
ances and risk aversions, we think it is safe to advise that a market for
the market portfolio should be constructed. Even though it may not be
precisely on the list of most important markets with estimated E, it al-
lows for more robust contract definition and enhances the simplicity and
understandability of equilibrium.
10 An example of this is the demise of the GNMA CDR futures resulting from the
formation of the Treasury-Bond futures, see Johnston and McConnell [1989J.
99
Table 1
1992 Per Capita Income (in 1990 Geary-Khamis Dollars and)
Population (in OOO's) and Market Portfolio Weights (x10- s )
Table 2
20 year Covariance Matrix of P. C. Incomes (x105 ), 9 = .02
Country Canada France Germany Italy UK USA
Canada 949
France -121 1927
Germany 278 842 2732
Italy 182 1178 1238 1542
UK 257 23 428 248 222
USA 855 -498 246 -170 212 1234
100
Table 3
20 year Correlation Matrix of P. C. Incomes, 9 = .02
Country Canada France Germany Italy UK USA
Canada 1.00
France -0.09 1.00
Germany 0.17 0.37 1.00
Italy 0.15 0.68 0.60 1.00
UK 0.56 0.04 0.55 0.42 1.00
USA 0.79 -0.32 0.13 -0.12 0.40 1.00
Table 4
20 year Covariance Matrix of P. C. Incomes (x105 ), 9 = 0
Country Canada France Germany Italy UK USA
Canada 2487
France -184 5458
Germany 717 2843 7719
Italy 622 3700 3878 4722
UK 689 202 1229 752 594
USA 2144 -1145 540 -343 584 2931
Table 5
20 year Correlation Matrix of P. C. Incomes, 9 = 0
Table 6
A matrix with Varh') = 0, 'Y = 3, g = .02 and p = .02.
Numbers are x 10- 5
Country 1 2 3 4 5
Canada 0.30 -0.57 1.93 0.83 -19.40
France -2.17 -4.26 -8.31 1.00 -0.74
Germany -1.81 6.78 -3.20 0.63 -2.65
Italy -1.79 -1.16 9.29 -9.56 4.41
UK -0.22 -0.64 5.50 15.57 6.43
USA 5.69 -0.16 -5.20 -8.47 11.96
Table 7
A matrix with Var('Y) = 1, E'Y = 3, g = .02 and p = .02.
Numbers are x 10- 5
Country 1 2 3 4 5 6
Canada 0.31 0.45 -0.77 1.97 1.70 -11.07
France -2.15 3.77 7.74 -4.02 2.06 4.70
Germany -1.78 -6.67 1.41 -3.12 1.56 -4.18
Italy -1.77 0.84 -3.42 11.80 -6.76 -2.25
UK -0.22 0.70 -8.00 -3.97 4.93 31.11
USA 5.75 -0.56 8.17 2.96 -12.33 6.15
102
Table 8
A matrix with Var(-y) = 00, ET' = 3, 9 = .02 and p = .02.
Numbers are xW- 5
Country 1 2 3 4 5 6
Canada 0.61 0.24 1.06 -2.17 13.06 -15.45
France -0.99 1.99 6.01 7.75 2.73 3.56
Germany 0.33 3.67 -5.83 3.55 0.61 -4.32
Italy -0.42 2.28 2.65 -10.87 -8.54 -1.34
UK 0.31 0.55 -0.51 -3.51 14.08 29.34
USA 7.92 0.79 4.28 3.31 -11.99 7.89
Table 9
A matrix with Var(-y) = 0, ET' = 3, 9 = 0 and p = .02.
Numbers are xW- 5
Country 1 2 3 4 5
Canada 0.21 0.34 1.26 0.46 12.19
France -1.28 2.74 -5.31 0.04 0.71
Germany -1.20 -4.16 -1.96 0.04 1.78
Italy -1.10 0.86 6.42 -4.63 -3.18
UK -0.06 0.35 2.51 9.94 -3.67
USA 3.42 -0.13 -2.92 -5.86 -7.82
103
Table 10
A matrix with Var('Y) = 1, E'Y = 3, 9 = 0 and p = .02.
Numbers are x 10- 5
Country 1 2 3 4 5 6
Canada 0.21 0.26 -0.16 1.37 10.52 7.25
France -1.27 2.47 -3.09 -4.60 1.42 -2.57
Germany -1.19 -4.07 0.11 -2.07 0.96 2.84
Italy -1.10 0.66 -0.99 7.33 -4.32 0.98
UK -0.06 0.04 5.42 0.25 3.56 -19.33
USA 3.43 -0.64 -5.70 -0.88 -8.01 -4.03
Table 11
A matrix with VarC'Y) = 00, El' = 3, 9 = 0 and p = .02.
Numbers are xlO- 5
Country 1 2 3 4 5 6
Canada 0.35 0.27 0.66 -1.31 7.98 9.96
France -0.97 0.93 3.48 5.19 1.71 -1.82
Germany -0.44 2.01 -3.77 2.02 0.24 2.95
Italy -0.66 1.22 1.72 -6.75 -5.05 0.20
UK 0.11 0.37 -0.31 -1.93 9.27 -18.05
USA 4.69 2.12 2.46 2.40 -7.78 -5.21
104
References
Athanasoulis, Stefano, 1995, "Essays in the Analysis of Assets Markets,
Derivatives Design, International Risk Sharing and Macroeconomic Pol-
icy" Ph.D. Dissertation, Yale University.
Cass, David, Graciela Chichilnisky and Ho-Mou Wu, 1996, "Individual Risk
and Mutual Insurance", Econometrica, 64, 333-342.
Darroch, J.N., 1965, "An Optimal Property of Principal Components",
Annals of Mathematical Statistics, 36, 1579-1582.
Demange, Gabrielle, and Guy Laroque, 1995(a), "Efficiency and Options
on the Market Index," document N. 95-17, DELTA (Joint Research Unit
CNRS-EHESS-ENS) Paris.
Demange, Gabrielle, and Guy Laroque, 1995(b), "Optimality of Incom-
pelete Markets," Journal of Economic Theory, 65, 218-232.
Duffie, Darrell, and Matthew O. Jackson, 1989, "Optimal Innovation of
FUtures Contracts," Review of Financial Studies, 2, 275-296.
Duffie, Darrell, and Rohit Rahi, 1995, "Financial Market Innovation and
Security Design: An Introduction," Journal of Economic Theory, 65, 1-
42.
Geanakoplos, John, 1990 "An Introduction to General Equilibrium with
Incomplete Markets," Journal of Mathematical Economics, 19, 1-38.
Hardy, G. H., J. E. Littlewood, and G. Polya, 1964, Inequalities, Cambridge,
Cambridge University Press.
Huang, Chi-FU and Robert H. Litzenberger, 1988, Foundations for Finan-
cial Economics, New York, North-Holland.
Johnston, Elizabeth Tashjian and John J. McConnell, 1989, "Requiem for a
Market: An Analysis of the Rise and Fall of a Financial FUtures Market,"
Review of Financial Studies, 2, 1-23.
Lintner, J., 1965, "The Valuation of Risky Assets and the Selection of
Risky Investments in Stock Portfolios and Capital Budgets," Review of
Economics and Statistics, 47, 13-37.
Magill, Michael and Martine Quinzii, 1996, Theory of Incomplete Markets,
MIT Press, Cambridge, Massachusetts.
Maddison, Angus, 1995, Monitoring the World Economy 1820-1992,
OECD, Paris.
Mayers, David, 1972 "Non-MarkeTable Assets and Capital Market Equilib-
rium under Uncertainty," in Michael Jensen, editor, Studies in the Theory
of Capital Markets, Praeger, New York, 223-248.
Oh, Gyutaeg, 1996 "Some Results in the CAPM with Nontraded Endow-
ments," Management Science, 42(2), 286-93.
Okamoto Masashi and Mitsuyo Kanazawa, 1968, "Minimization of Eigen-
values of a Matrix and Optimality of Principal Components," The Annals
of Mathematical Statistics, 39, 859-863.
Sharpe, W.F., 1964, "Capital Asset Prices: A Theory of Market Equilibrium
Under Conditions of Risk," The Journal of Finance, 19,425-442.
105
Shiller, Robert J., 1993, Macro Markets: Creating Institutions for Managing
Society's Largest Economic Risks, Oxford University Press.
Shiller, Robert, and Stefano Athanasoulis, 1995, "World Income Compo-
nents," NBER Working Paper.
Willen, Paul, 1997, From Wall Street to Main Street: The Consequences of
Financial Innovation on International Trade and Individual Risk-bearing,
unpublished Dissertation, Yale University.
Does money matter? A deterministic model
with cash-in-advance constraints in factor
markets*
·The second author gratefully acknowledges the hospitality of t.he Economics Depart-
ments of the University of Michigan and Princeton University, the grant awarded by the
Scientific and Technical Research Council of Turkey (TUBITAK) in scope of the NATO
Science Fellowship Programme, supports from Bilkent University and from the Cent er
for Economic Design of Bogazi~i University. A previous versiun has been presented at
the Ill. International Conference on Economic Theory and Applications, Antalya, .June
1997, and at Bilkent and Bogazi!;i Universities. We are in particular grateful to Selahat-
tin imrohoroglu, Ivan Pastine, SUbidey Togan and especially an anonymous referee for
their useful comments.
108
1 Introduction
Classical results such as Pareto efficiency of competitive equilibrium, sweep-
ing out of pure profits in case of constant returns production technologies,
and real wage of a worker being equated to its marginal product have all
been derived under the assumption that the market structure is complete.
Such a structure would prevail if either the commodity markets (Debreu,
1959, Chapter 7), or the security markets are complete (Arrow, 1964). Un-
der either institutional arrangement there is no role to be played by fiat
money. Even if the government were to create such outside money, its mar-
ket value would be zero.
One way of introducing valued fiat money in a model would be to im-
pose the requirement that at least for some goods no purchase is possible
without a specific piece of paper, and that the time horizon is infinite.
The use of such cash-in-advance constraints in macroeconomic models was
proposed by Clower (1967) and was popularized especially with the pa-
pers by Lucas (1980, 1984, 1990) and Lucas and Stokey (1983, 1987). In
these papers, cash-in-advance constraints are imposed on the consumers'
purchases of a subset of commodities or assets. However the firm, an ar-
tificial entity which has a constant returns production function, does not
face any cash constraint. So the interpretation would be that they sell their
to-be-produced goods in return for cash to consumers and pay the wage
and rental bills (partially) with this money. In that case, the classical result
of zero pure profits with marginal products being equal to factor returns
follows. An exception is a paper by Fuerst (1992) where cash-in-advance
constraints are imposed on all transactions. Fuerst (1992), following Lucas
(1990), considers a stochastic model with representative gigantic families,
members of which share the same objective of maximizing family welfare.
A firm is a part of the family and has access to money markets to borrow
their cash needs for the puchase of labor services. As a result, a deviation
of real wages from marginal product of labor takes place.
In contrast, we study a much simpler deterministic model but with two
different types of agents who do not cooperate. We too observe a deviation
of the equilibrium real wage from the marginal product of labor. This ob-
servation points to the importance of sequencing of transactions and the
corresponding nature of the cash-in-advance constraints. We assume that
first the factor markets and then the commodity markets open. In such
an environment, producers face a cash-in-advance constraint in their factor
payments. Money needed by producers here could be interpreted as working
capital. After the factor payments are made, the commodity markets open
and the factor income can be spent here, again under a cash-in-advance
constraint. This minor change in the sequencing of transactions is shown
to have an important effect on the equilibrium prices. For typical parame-
ter values, real rental rate for the single factor that is subject to a cash
constraint turns out to be strictly below its marginal product. This gap is
109
2 The model
We consider an economy in which there are two commodities at each time
t, labor Lt and a nonstorable consumption good (apple) qt. There are
two types of agents indexed by i = 1,2. Neither one values leisure,1 and
their preferences over the lifetime consumption are the same and given by
'L-:of3 t U(Cit), where f3 E (0,1) is the common discount factor, Cit is the
consumption of agent i at time t and U(.) is the common utility function for
both agents showing the instantaneous satisfaction derived from consuming
apples at each time. We assume that U is twice continuously differentiable,
U' (.) > 0 and U" (.) < O.
Agent 1 has a labor endowment L and a constant returns technology
f1(L) = L to convert lab or into apples with marginal product of labor
equal to one. Agent 2 has no labor endowment, but a better technology
fz(L) = "(L which is also constant returns to scale with marginal product
oflabor greater than one b > 1). Other than these production possibilities,
there are no endowment of apples.
We assume that real wage contracts that promise delivery of apples af-
ter the harvest are not enforceable. Therefore the economy operates with
money under cash-in-advance constraints in both labor and apple markets.
Money is perfectly storable and Mi,t denotes the money holding of agent
i at time t. We assume that initially all currency in the economy, M, is
owned by agent 2, that is, M 1 ,o = 0 and M2,O = M.2
The total currency in the economy that we denote by M t is assumed to
1 Since leisure does not enter the utility function, the factor of production in the model
could, perhaps, be better interpreted as, for example, water (for irrigation) or even bees
(for pollination). We thank an anonymous referee for suggesting these interpretations.
2 Stokey and Lucas with Prescott (1989, Exercise 5.17) indicate that even if initial
money stock were not zero, after a finite number of periods, our agent 1 would choose to
rull it down to zero. This would be the case whenever the gross real return from savings
is low compared to the gross rate of time preference 1/(3.
110
Lj3tU(CI,t)
00
(PI) max
t=O
subject to, for all t
_ - s d
ct,t-(L-Lt)+qt,
L: ~ L,
MI,t+! = MI,t + Wt L: - Ptqt,
MI,t, CI,t,qt, L: ~ 0, and
MI,o =0 is given.
Agent 2
Lj3tU(C2,t)
00
(P2) max
t=O
subject to, for all t
= 'Y L dt - qt,s
C2,t
wtLf ~ M2,t + ()Mt ,
M2,t+1 = M2,t + ()Mt - wtLf + ptqf,
3This assumption makes full sense only when there is a large number of agents in the
economy, and when the government follows a lump-sum distribution policy, rather than
a proportional one.
111
3 Results
In both (PI) and (P2), we first eliminate the equality constraints by substi-
tuting for Cl ,t, qt and C2,t, qt, respectively. Now, based on the observation
that only contemporaneous values of Lt appear in the instantaneous util-
ity function at all times, it is straightforward to obtain labor demand and
supply as a function of real wage as shown in Figure 1.
If at any time t the real wage wt/Pt is less than ,,(, agent 2 will spend
all of his money on purchasing labor so that the cash-in-advance (CIA)
constraint will be binding. If wt/Pt = ,,(, labor demanded by agent 2 will
be between zero and (M2,t + OMt}/pt. If wt/Pt > ,,(, labor demanded will
be zero.
112
Lt,L't
o Pt ,,(Pt Wt
FIGURE 1. Labor supply and demand functions for a given Pt and M2,t.
For agent 1, the comparison of real wage is with his own marginal product,
which is 1. If at any time t the real wage wt/Pt is higher than 1, he will
supply L, if equal to 1 he will be indifferent between 0 and L and if less
than 1 he will supply zero labor. The labor supply function can then be
written as
~
if wt/Pt > 1,
Li(w';p,) { : [0,11 if wt/Pt = 1, (2)
otherwise.
Lt = L: = Mt+dWt, (5)
qf = qt = Mt+1/Pt, (6)
M1,t = 0, M2,t = Mt == (1 + B)t M. (7)
Proof. We observe that if any two of the money, lab or and apple markets
clear, then the third one will also clear. This follows from the third equality
constraints in both (PI) and (P2). Therefore, we can eliminate qt and ql
in the problems (PI) and (P2), respectively. Similarly, eliminating C1,t and
C2,t in (PI) and (P2), respectively, as well and rewriting the inequality
constraints accordingly, we obtain
L + (Wt -
Pt
1) Lt + Pt"
~(M1 t - M1 t+1) 2: 0,
S
L: ::; L,
M1,t+1 ::; Ml,t + Wt L:,
M 1 ,t, L: 2: 0, and
M 1,0 = 0.
(P2')
At a stationary equilibrium, C2,t+1 = C2,t for all t. Since U'(.) > 0 and
f3pt!Pt+1 = f3/(1 + 0) < 1 in SMCE (by the assumption f3 < 1 + 0),
it follows that (8) cannot hold in SMCE, contradicting that wt!Pt = ,
supports SMCE.
Now suppose Wt/Pt E [1, ,). The CIA constraint in the labor market will
be binding for agent 2, so we can substitute Lt = (M2,t + 0M t )/ Wt into the
objective function of (P2') to obtain
max ~
L.)3 t U(M2
,'t + OMt + -(M2,t
1 + OMt - M2,t+l) ) .
t=O Wt Pt
At a stationary equilibrium, C2,Hl = C2,t must hold for all t. Since U'(.) > 0,
it then follows that wt+dpt = f3, in SMCE. Using WHl = (1 + O)Wt, we
obtain wt!Pt = f3,/(1 + 0). Note that wt!Pt <, in SMCE, since f3 < 1 + 0
by assumption.
If f3, > 1 + 0 then wt!Pt > 1 and Ll = Lt = L, implying that
Wt = (M2,t + OMt)/L = Mt+dL for all t. It then follows that Pt =
(1 + O)wt!(f3,) = M H 2/(f3,L) for all t, and qt = qt = (M2,t + OMt)/pt =
f3,L/(1 + 0) for all t.
If f3, = 1 + 0 then Lt E [0, L]. SO, for any wage sequence Wt = (1 + O)tw
with w E [(1 + O)M/L, oo) the labor market will be in equilibrium with
Lt = Ll = Mt+dWt = (1 + O)M/w for all t. The apple price will be
Pt = (1 + O)tw and the goods market will be in equilibrium with qt = qt =
MHdwt = (1 + O)M/w for all t.
115
= 0,
using the fact that in SMCE Lt+l = Lt ~ L for all t and the assumption
that f3 < 1 + B.
The Euler equation (9) together with the transversality condition above
verifies that agent 2 is maximized at the described equilibrium. One can
easily check that the inequality constraints in both (PI) and (P2) are also
satisfied, which completes the proof. 0
The most striking feature of this result is that in the whole class of SMCE
proposed by (3) - (7) the real wage rate f3-y/(1 + B) is below the marginal
product of lab or -y in the superior plant. So, both agent 1 (the owner of
the inferior technology, and de facto the worker) and agent 2 (the owner
of the superior technology, and de facto the enterpreneur) are better off in
the monetary equilibria relative to an autarky. This result, however, rests
upon the assumption that the contracts on apples are not enforceable. In
an economy where commodity contracts are enforceable, the entrepreneur
would be left with zero profits, since competition under the absence of
finance constraints would equalize the real wage rate with the marginal
(and in this case also the average) product of labor.
Another observation is that the apple price in the equilibrium is decreas-
ing in the marginal product of labor -y and in the subjective discount rate
f3 and increasing in the inflation rate. That is, in societies that are more
patient or more productive, workers buy the apple at a lower price and
consume more of it. Similarly, inflation is observed to affect the workers
welfare adversely by reducing equilibrium real wages. If inflation is too
high or if there is too much discounting or insufficient productivity, then
the monetary equilibrium may break-down.
A final observation is about the neutrality of the initial level of money
stock. In situations where f3-y/(1 + 0) > 1, so that wt/Pt > 1, money
is trivially seen to be neutral. However, in the case of wt/Pt = 1, labor
supply becomes infinitely elastic, and hence the nature of the stationary
monetary competitive equilibria allows for situations where money is not
neutral as well as situations where it is. That is, when the nominal wages
Wt are exogeneously determined in the interval of [M2,t+1/L, 00), satisfying
Wt+1/Wt = (1 + 0), an increase in the initial money stock, M, in the econ-
omy gives rise to an equal amount of increase in lab or transacted and hence
quantity of apples produced, which can be seen from equations (5) and (6).
116
But, since the simple economic environment that we consider in this paper
does not identify an equilibrium selection mechanism for nominal wage de-
termination when wt!Pt = 1, one may equally be justified in claiming that
nominal wages and prices move together with money holdings, leaving the
real side of the economy unaffected. So, we have a situation of indetermi-
nacy, which certainly involves an extreme yet an interesting possibility for
non-neutrality of money in the context of a model with maximizing agents,
perfect foresight and market clearing.
4 Conclusions
In this paper, we examined a very simple model in which cash-in-advance
requirements for production affect the functional distribution of income.
We introduced some heterogeneity by allowing for two types of representa-
tive agents, a worker type and an entrepreneur type. In order to attain the
stationarity of equilibrium, we distributed all the initial fiat money to the
entrepreneurs. As a consequence, these agents are observed to become em-
ployers in equilibrium and to enjoy higher profits than what would prevail
in an Arrow-Debreu economy.
When there is money growth in the form of lump-sum transfers to the
enterpreneurs, the equilibrium real wage is observed to be adversely affected
by the resulting inflation rate. Similarly, the real wage is adversely and
favorably affected by the subjective discount factor and the productivity
of labor respectively. If these three factors tend to draw the equilibrium
below the reservation real wage of the workers, the monetary equilibrium
breaks down and an inefficient situation of autarky may prevail. Such a
case would be observed, for example, under very high inflation rates.
When there is deflation through lump-sum taxation of the entrepreneurs,
however, the real wages become higher. And in fact under the optimal
money supply rule, the Arrow-Debreu equilibrium is restored. This rule,
which consists of equating the rate of monetary contraction with the sub-
jective discount rate (i.e. () = (3 - 1), was suggested by Friedman (1969)
and was later studied in the context of cash-in-advance economies where
good markets open first, but leisure enters the utility function (see, for ex-
ample, the survey by Woodford, 1990). Here we show that this rule is also
applicable in economies where factor markets open first.
We also observe an indeterminacy of equilibria under very specific para-
meter values. This corresponds to the case where real wage is as low as the
reservation wage of workers, so that the labor supply is infinitely elastic.
This allows for situations where unexpected jumps in the nominal money
supply may not be neutral, and may favorably affect total output.
The results of the paper are sensitive to the sequencing of markets. If
we were to distribute all of the initial money to workers, and to let the
goods market open first, the Arrow-Debreu allocations would be obtained.
However, we would like to argue that the "factor markets first" scenario is
117
more realistic, since sales of goods before production takes place (via for-
ward commodity contracts) are observed very rarely in real life economies.
References
Arrow, K.: The role of securities in the optimal allocation of risk-bearing.
Review of Economic Studies 31, 91-96 (1964)
Ba§~l, E.: Markets as institutions. Unpublished Ph.D. dissertation, Bilkent
University, Department of Economics (1995)
Clower, R.W.: A reconsideration of the microfoundations of monetary the-
ory. Western Economic Journal 6, 1-8 (1967)
Debreu, G.: Theory of value. New York: WHey (1959)
Friedman, M.: The optimum quantity of money and other essays. Chicago:
Aldine (1969)
Fuerst, T.S.: Liquidity, loanable funds and real activity. Journal of Mone-
tary Economics 29, 3-24 (1992)
Lucas, R.E., Jr.: Equilibrium in a pure currency economy. Economic Inquiry
18, 203-20 (1980)
Lucas, R.E., Jr.: Money in a theory of finance. Carnegie-Rochester Confer-
ence Series on Public Policy 21, 9-46 (1984)
Lucas, R.E., Jr.: Liquidity and interest rates. Journal of Economic Theory
50, 237-64 (1990)
Lucas, R.E., Jr. and Stokey, N.L.: Optimal fiscal and monetary policy in
an economy without capital. Journal of Monetary Economics 12, 55-93
(1983)
Lucas, R.E., Jr. and Stokey, N.L.: Money and interest in a cash-in-advance
economy. Econometrica 55, 491-513 (1987)
Stokey, N.L. and Lucas, R.E., Jr. with E.C Prescott: Recursive methods in
economic dynamics. Cambridge: Harvard University Press (1989)
Woodford, M.: The optimum quantity of money. In: Friedman, B.M., Hahn
F.H. (eds.) Handbook of monetary economics. Amsterdam, New York:
North-Holland (1990)
Welcoming the middlemen: restricting
competition in auctions by excluding the
consumers
1 Introduction
Bidders typically consist of two types: Consumers who wish to purchase the
item for their own consumption, and middlemen (who we will also refer to
as 'intermediaries') who want to purchase the item in order to resell it to one
of the consumers. In this paper we show that it may be in the interest of the
120
1 In t.his model we consider t.he case of a single it.em being sold. This allows us t.o
ahstract. completely from the effect of transactions cost.s and possible complementarity
of values.
2 In t.his paper wc concentrate on the special case where there is a single part.icipat.ing
consumer. This makes dearer the adverse effect on the auctioneer's expect.ed revenues
when int.ermediaries have t.o compete wit.h t.he final consumers.
121
first auction. A bidder who expects to value the object most highly wins
it in the first auction. When uncertainty about private values is resolved,
he may find it profitable to sell the object to one of the other bidders [see
Haile (1997)].
A third possibility of gains from trade occurs if bidder asymmetry results
in an inefficient allocation in the first price auction. The winner may find
it profitable to resell the item to one of the losing bidders [see Gupta and
Lebrun (1997)].
In all of the above models all participants are potentially final consumers:
they directly value the object that is put up for sale. Another strand of
the literature considers participants of two types: the first type consists of
participants in the first auction and are competing for the object with the
intention of re-selling them. The second type consists of the final consumers
who compete among themselves to purchase the items from the re-sellers.
Bikhchandani and Huang (1989), for instance, analyze a common value
auction where an exogenous number of bidders compete in a multiple object
auction to acquire items that will then be resold to consumers. In that
paper, the policy question is which auction format to use to award the
objects to the resellers rather than to exclude or not to exclude the final
consumers from the auction.
This paper adopts the exogenous partition of the players into re-sellers
and final consumers. Unlike the model in Bikhchandani and Huang (1989),
ours is a private values model where some of the final consumers can be
present in the first auction. Furthermore, the policy question we analyze
is whether or not the seller should allow the participation of the final con-
sumers. To the best of our knowledge, the only other paper (excluding
related work by these authors described in the conclusion) where the prof-
itability of such an exclusion is explored is an example in Haile (1996). In
that example, where the bidder types are "almost common knowledge" , it is
shown that the seller can profitably exclude one of the buyers from the auc-
tion. In this example, the competing buyers know each other's type with
probability that becomes arbitrarily close to 1 and all competing buyers
have some intrinsic value for the auctioned off object.
The rest of the paper is organized as follows: In Section 2, we describe
the model and the results. The last section concludes with a brief discussion
of possible extensions and future research.
2 The model
2.1 Modeling framework
An auctioneer has one unit of an indivisible item for sale. We assume the
auctioneer's valuation to be zero; this normalization allows us to use profit
maximization and revenue maximization interchangeably.
There are N potential consumers of the item, where N is an integer
122
strictly greater than 2.3 Each consumer i values the item at a monetary
value of Vi, where Vi is a random draw from the distribution F(v). F(v)
has continuous and non-zero density f (v) over the compact interval [Q, v] .
The valuation Vi of each consumer i is consumer i's private information.
In addition, there are M intermediaries. We assume that M is an integer
weakly greater than 2. The intermediaries are not interested in consuming
the item themselves but are willing to buy the item if they can then resell
it to some consumer, in hope of making a profit.
As we have mentioned above, a crucial assumption of the model is the
auctioneer's inability to access the entire market of consumers. More specif-
ically, we assume that if the auctioneer allows unrestricted participation in
the auction that he organizes, then all of the M intermediaries and a single,
randomly chosen consumer show up for participation. This fact is assumed
to be common knowledge. On the other hand, if an intermediary arranges
an auction, he can get all the N consumers to participate. However, to
do so, the intermediary has to spend a marketing cost equal to c dollars.
Notice that the marketing cost is incurred only after the intermediary is in
possession of the item and is going to organize an auction. We assume that
the marketing cost is the same for all intermediaries, in other words, the
marketing cost Cj for all intermediaries j is equal to c. Instead of organizing
the "unrestricted auction" described above, the auctioneer can organize a
"restricted auction". In a restricted auction, only the intermediaries are
allowed to participate and the consumer is excluded.
Both restricted and unrestricted auctions are assumed to be oral English
auctions without any reserve. Furthermore, we assume that, in the event
one of the middlemen wins the auction, he will also sell the item via an
oral English auction without reserve. That is, both the auctioneer and
the middlemen have the same selling "technology". They only differ in
their marketing "technology". We will frequently refer to the middlemen's
auction as the "second" auction.
We first analyze the auctioneer's restricted auction.
3We cOlIlment, throughout the paper, on how the results are affected in the special
case of N = 2.
123
Hence, the bidding strategy of the middleman j is to bid until the price
in the auction reaches P, where P is given by
Since all the intermediaries have the same information about the resale
value of the item and since they all have the same marketing cost, the
expected revenue of the auctioneer, ERR, is given by
Proof. Suppose the participating consumer has lost in the first auction.
Since he is the only participating consumer, the winner must be an in-
termediary. Then, the current consumer can bid for the same item in the
auction organized by the winning intermediary. Since this auction is also
assumed to be an English auction without reserve, the price the consumer
will pay in the event that he wins will be equal to the highest valuation of
the remaining N - 1 consumers. His expected surplus from participating
in that second auction, ES(v), is given by
dr(v)
dv
1- LV [N - 1J F(y)N-2 fey) dy
4Note that we here use the assumption that all audions are without any reserve
price. The part.icipating consumer would not be willing to reveal his true valuation if
there was a reserve price in the middlemen's auction, since the information revealed
in the firHt auction could be uHed by the middlemen to Het the ff',serve price in their
auction. Furthermore, a reserve in the auctioneer's auction would not, ill general, allow
the inference of v since there would be a pooling of types at the reserve.
125
have valuation more than v. In this case the participating consumer loses
in the second auction, but is the one who determines the price. The third
term is the contribution to revenue when two or more of the N - 1 buyers
have valuations greater than v.
To ease our exposition, we define the function w(v; c) as follows:
w(v; c) == R(v) - r(v) - c.
This is the expected profit of an intermediary upon winning the object
when the participating consumer has valuation v and the intermediary pays
a price equal to r(v). Define v* to be the value of v, such that w(v*; c) = O.
The importance of v* is that it determines the price r( v*) at which the
intermediaries drop out of the auction, making the participating consumer
the winner.
Lemma 2 '11 (v; c) is a decreasing continuous function of v. Furthermore,
~f '11(11.; c) > 0 and c > 0, then there exists a unique v* E (11., v) such that
w(v*;c) =0
Proof. Observe that r(v) can be rewritten as
+ LV y [N - 1] F(y)N-2 f(y) dy
v [1 - F(v)N-l] + LV y [N - 1] F(y)N-2 f(y) dy.
l V
[N - 1] [N - 2] y F(y)N-3 [1- F(y)] fey) dy -
v [1- F(v)N-l] - C.
dW(vjc)
= [N - 1] [N - 2] v F(v)N-3 f(v) + [N - 1] F(v)N-2 -
dv
[N - If v F(v)N-2 f(v) - [N - 1] F(v)N-l -
[N - 1] [N - 2] v F(v)N-3 f(v) +
[N - 1] [N - 2] v F(v)N-2 f(v) -
1 + F(v)N-l + [N - 1] v F(v)N-2 f(v),
dw(vj c)
= [N - 1] F(v)N-2 - [N - 1]2 v F(v)N-2 f(v)
dv
- [N - 1] F(v)N-l + [N - 1] [N - 2] v F(v)N-2 f(v)
- 1 + F(v)N-l + [N -1] v F(v)N-2 f(v).
As shown below, the 2nd, 4th, and 6th terms cancel out.
dW(vj c)
= [N - I]F(v)N-2 - [N - I]F(v)N-l - 1 + F(v)N-l
dv
[N - I]F(v)N-2[1 - F(v)]- [1 - F(v)N-l]
= [N -1]F(v)N-2[1 - F(v)]
-[1 - F(v)][1 + F(v) + ... + F(v)N-2]
[1- F(v)] [ {(N -1)F(v)N-2}
When v < v,F(v) < 1, and, therefore, we have dq,J~;c) < O. This is
because since F(v) < 1, F(v)K < F(v) for all positive integers K greater
than or equal to 2, which means 1+F(v)+ ... +F(v)N-2 > (N -1)F(v)N-2.
Finally, since W(v; c) is a decreasing function of v, v* is unique. •
The following proposition states the crucial result that it is not in the
interest of the intermediaries to always try to outbid the consumer.
Proof. Suppose first that WelL; c) > O. Consider the case in which the price
in the auction has reached the value r( v*) and that the consumer is still
bidding. If the intermediaries continue bidding but drop out later when the
price reaches a higher value, they get a payoff of zero, which they will get
even if they drop out at the current price of r(v*). If the consumer drops
r v
out at a price = reV) where > v*, then the intermediary who wins pays
r.
a price which is no less than But by paying a price in the auction which
is at least r, the intermediary's expected profit is equal to R(V) - c r-
which is strictly less than zero. In other words, by bidding beyond a price
r(v*) to win the item, the intermediary's expected profit turns out to be
negative. Since by dropping out at a price r(v*), the intermediary gets
payoff of zero, the intermediaries should not continue bidding beyond a
price equal to r(v*). Consider next the case in which the consumer drops
out at a price rev) < r(v*). The intermediaries will then bid the price
up to R(v) - c < r(v*) where the inequality follows from the fact that
R(v) is monotonic in v and R(v*) - c - r(v*) = 0 by definition. A similar
reasoning shows that dropping out at a price strictly less than r( v*) is
weakly dominated by dropping out at a price equal to r(v*).
The second part of the proposition follows from the monotonicity of the
function W(v;c). If W(lL;C) < 0, then the winning intermediary's expected
profit is always negative. 5 Therefore, the winning intermediary will lose
money no matter what the valuation of the participating consumer is. It is
better, then, for the intermediaries not to participate in the auction at all
and get a payoff of zero. •
Define CUR to be the value of the marketing cost for which W(:!Z.; Cu R) = O.
Observing that r(1!.) = 1!., the critical value of the marketing cost at which
the intermediaries are indifferent between participating and not participat-
ing in the unrestricted auction is equal to
Corollary 4 The critical value of the marketing cost at which the inter-
mediaries will not participate in the unrestricted auction is lower than the
critical value of the marketing cost at which they will not participate in the
restricted auction.
Remark 2 Consider a shift in the distribution of F(v) such that the val-
uations of all consumers increase by A. Then, CUR remains unaffected. In
contrast, CR increases by A.
The above Corollary indicates that when the marketing cost is equal to
zero the middlemen always win the unrestricted auction.
ERuR = Lv'
[R{v) - c] f{v) dv + r{v*) [1 - F{v*)]
The first term is the contribution to the revenue when the intermediaries
win, i.e., when the consumer turns out to have valuation less than v*.
The second term is the revenue when the intermediaries drop out and the
participating consumer wins and pays a price equal to r{v*).
We are now ready to state the main result of this paper.
Proposition 6 For any level of the marketing cost, c, ERR ~ ERuR with
strict inequality holding when c E (O, CR).
129
Proof. Consider first the case when c 2: CR. It then follows from the
definition of CR and Corollary 4: that the expected revenue of both formats
is equal to zero. We next turn to the case when CUR < c < CR. For this
range of the marketing cost the intermediaries will not participate in the
unrestricted auction, but will participate in the restricted auction and bid
a positive price. It immediately follows that ERR> ERu R. Finally, let us
consider the case when c ~ CUR. Recall that for all c E [0, CUR], v* E [Q, vl.
The expected revenue from the unrestricted auction is
Define
A(v) = v[N - 1][1 - F(v)lF(v)N-2.
Then,
+ LV A(v)f(v)dv.
Therefore,
LV[R(v) - clJ(v)dv = ERR. (**)
References
Bikhchandani, Shushil and Chi-fu Huang (1989). "Auctions with Resale
Markets: An Exploratory Model of Treasure Bill Markets," Review of
Financial Studies, 3, 311-339.
Bose, Subir, and George Deltas (1998a). "Auctions with Probabilistically
Participating Resellers and Final Consumers," University of Illinois at
Urbana-Champaign, CCBA Office of Research Working Paper No. 98-
0108.
Bose, Subir, and George Deltas (1998b). "A Sealed-bid Auction with Con-
sumers and Middlemen," manuscript.
Gupta, Madhurima and Bernard Lebrun (1997). "A Simple Model of First-
Price Auction with Resale," manuscript, Universite Laval.
Haile, Philip A. (1996). "Auctions with Resale," manuscript, University of
Wisconsin-Madison.
Haile, Philip A. (1997). "Auctions with Private Uncertainty and Resale
Opportunities," manuscript, University of Wisconsin-Madison.
Vincent, Daniel R. (1990). "Dynamic Auctions," Review of Economic Stud-
ies, 57, 49-61.
6Vinccllt (1990) provides an example of this when the seller has private information
about the value of the item that he sells.
Acyclicity of fuzzy preferences
1 Introduction
In economics the theory of fuzzy sets has found applications in the areas of
consumer behavior and revealed preference (Panda and Pattanaik (1986),
Basu (1984)), measurement of inequality (Basu (1987)), and in the the-
ory of social choice (Barrett, Pattanaik and Salles (1992)), Dutta (1987),
Dasgupta and Deb (1994)). To make such applications possible, there is
an emerging ancillary literature devoted to developing fuzzy counterparts
to well known precise concepts of the type used in the type of rational
optimizing exercises that arise in economics. Two well known exact (non-
fuzzy) concepts, that of transitivity of a preference relation (representing
the objective of a rational agent) and that of a choice function (the kind
of rule that a rational agent should adopt for choosing in the presence of
fuzzy preferences), have been extended to the theory of choice with fuzzy
preferences and the analysis of their fuzzy counterparts have received con-
siderable attention in the literature (Barrett, Pattanaik and Salles (1990),
Dutta, Panda and Pattanaik (1986), Dasgupta and Deb (1991, 1996)).
Transitivity and choice are related concepts in that, for finite sets (and
in the presence of continuity conditions on preferences for infinite compact
134
2 Preliminaries
Let X a nonempty subset of a metric space be the set of alternatives. Let
n be the set of all nonempty compact subsets of X. A fuzzy binary weak
preference relation (FWPR) is a real valued function R : X2 -+ [0,1].
For all x, y EX, the relation between x and y is exact or nonfuzzy iff
{R(x,y),R(y,x)} ~ {0,1}. lithe relation between some x,y E X is exact
we will denote this by xRy if R(x, y) = 1 and not xRy if R(x, y) = O. The
asymmetric component of an exact weak preference relation over any pair
will be denoted by P.
In the standard (exact) theory of choice there are two approaches to
choice: the R-greatest approach under which for any A E n: C(A, R) = {x :
for all YEA, xRy} is picked and the maximal approach under which for
any A E n: M(A,R) = {x : for all YEA, not yRx}.3 We have argued
elsewhere (Dasgupta and Deb (1991), (1996)) in favor of the two following
rules for making exact choices in the presence of fuzzy preferences. The first
rule is based on the maximal approach (Definition (1.3) and the second on
the R-greatest approach (Definition (2.2)). We have shown (Dasgupta and
1 It is well known that, if preferences and budget sets are compact and convex, acyclic-
ity is not needed for the existence of maximal elements.
2By "standard" we mean the usual "cardinal" fuzzy set theory. In a different frame-
work, for ordinally fuzzy striet preference relations, an acycJicity condition has been
proposed by Barrett, Pattanaik and Salles (1990). It has been used in the context. of
sodal choke (rather than in the context of rational choice theory) to show the existence
of a vetoer.
3 While for exact connected preferences these two sets coincide, adopting these two ap-
proaches in the context of fuzzy preferences may give different results even if preferences
are "connected" (Dasgupta and Deb (1991)).
135
Deb (1991)) that these rules represent intuitively appealing ways of making
"fuzzy maximal" and "fuzzy R-greatest" sets exact:
(1.1) For all x,y E X and () E (0,1]' xPOy iJJ(R(x,y) - R(y,x)) 2: ().
(1.2) For all x,y E X and () = 0, xPOy iJJ R(x,y) - R(y,x) > 0.
(1.3) F?! all x E X and all A E n, x E Mo(A,R) iJJ for all yEA, not
yPox.
(2.2) For all x E X and all A E n, x E CoCA, R) iJJ for all yEA, xRoy.
4Jt is easy to show that in general XP9Y implies xRoy and that, for () > .5, XP9Y
implies XP9Y' The converse of these results is, in general, not true.
136
Imposing the above condition, which is also equivalent to the usual con-
dition "for all x, yE X, either xRy or yRx" when preferences are exact, will
allow us to focus on the role played by acyclicity in ensuring the existence
of a nonempty R-greatest set.
3 Fuzzy acyclicity
While a number of alternative definitions of transitivity have been proposed
and analyzed in the literature (see Dasgupta and Deb (1996)), the most
extensively used is the notion of "maxmin" transitivity. The FW P R, R, is
maxmin transitive iff for all x, y, z EX, R(x, z) 2: min{R(x, y), R(y, z) }.5
If R is exact, it is well known (Sen (1970)) that transitivity is not neces-
sary for the nonemptiness of the R-greatest or maximal sets. The weaker
condition "acyclicity" suffices. A finite sequence Xl, X2, ... , Xk E A such
that XlPX2PX3, ... PXkPXl is a cycle of length k in P. For preference rela-
tions R, the P-acyclicity of R is the absence of cycles of length k in P for all
finite positive integers k. Alternatively, letting P* be the transitive closure6
of P, P-acyclicity of R may be defined as: for all x, y E X, xP*y implies
not yP*x. For exact relations R, this condition is necessary and sufficient
for the nonemptiness of M(A, R) for all finite A E n. Moreover, for con-
nected exact preference relations R, since M(A, R) = C(A, R), P-acyclicity
is necessary and sufficient for C(A, R) =I 0 for all finite A E n.
In extending the notion of P-acyclicity of R to fuzzy preference relations
R we will use an intuition underlying acyclicity in the exact case. In this
(exact) case the condition tells us that if there exists a chain of "strict dom-
inance" connecting Xl to Xk (i.e., XlPX2PX3,." PXk) then either R(Xl, Xk)
is "large" enough
The two following definitions of fuzzy acyclicity try to capture this intuition.
50bserve that if R is restricted to being exact this reduces to the usual definition of
transitivity for exact binary relations.
6 This is the smallest transitive relation having P as a sub relation and is given by: for
all X,y E X, xp·y iff there exists a positive integer k and Xl,X2 .... ,Xk E X such that
X1PX2PX3.··.PXk·
137
or for all Xl> X2, ... ,Xk EA: XIPOX2POX3, ... POXk implies R(Xk' Xl) <
max{R(xl> X2), R(X2' X3), ... , R(Xk-l> Xk)}.
We will say that R is fo-acyclic iff R _is Pe(k)-acyclic for all positive
integers k and that it is P -acyclic if it is Po -acyclic for () = 0.
Remark. Notice that if the "either" part of the condition is satisfied for
some k-tuple, the "or" part may be satisfied over some other k or m-tuple
of alternatives. Let X = {XI,X2,X3,X4} and R(x, x) = 1 for all X E X.
Also, let R(xl> X2) = R(X2' X3) = R(XI' X3) = R(X3, xt} = R(X4' Xl) =
°
R(X3, X4) = R(X4' X3) = .8 and R(X2' Xl) = R(X3, X2) = R(XI' X4) =
R(x~ X4) = R(X4' X2) = .6. One can check that for () = the relation sati-
fies Pe-acyclicity without satisfying either the "either" part or the "or" part
of the above condition everywhere. The "either" part is satisfied nontrivially
over the ordered triple (Xl> X2, X3), the ordered quadruple (X4' Xl, X2, X3)
and the "or" part over the ordered triple (X4,XI,X2). Elsewhere, the con-
dition is trivially satisfied because the hypothesis does not hold.
The reader can easily verify that both the definitions of acyclicity given
above are weaker than maxmin transitivity.
By the choice of j*, for all positive integers m < j*, Xm = Ym. Since
Xj_ "# Yj- and {XI,X2, ... ,xd = {YI,Y2, ... ,yd, for all positive integers
m < j*, Xm = Ym and P-acyclicity imply Xj- E {Yj-+1,Yj-+2, ... ,yd. This
implies Yj- P*Xj-. Arguing similarly, we have Xj- P*Yj-. This contradicts the
P acyclicity of R . •
[(R(xI, Xk) > min{R(x2, Xl)' R(X3, X2), ... , R(Xk, Xk-l)} (1)
and for all j E {I, 2, .. , k - I}
R(xj+I, Xj) > min{ {R(X2, xd, R(X3, X2), ... , R(Xk, Xk-l), R(xI, Xk)}
-{R(xj+1, Xj)}}]
or
[(R(Xk, Xl) < max{R(XI, X2), R(X2, X3), ... , R(Xk-l, Xk)})
and for all j E {1,2, .. ,k-1},
R(Xj,xj+d < max{ {R(XI, X2), R(X2, X3), ... , R(Xk-l, Xk), R(Xk, Xl)}
-{R(Xj, Xj+l)} }].
We will argue that if the first of these possibilities (i.e., (1)) is true, then
we would get a contradiction. The other case is similar and its proof is
omitted.
Let 1t = [{(X2, Xl)' (X3,X2), ... , (Xk-I, Xk-2), (Xk, Xk-d} U{(XI, Xk)}].
There are two possible subcases:
(a) minR(x, y) for (x, y) E 1t is given by R(XI, Xk).
(b) minR(x,y) for (x,y) E 1t is given by R(Xj+I,Xj) for some j E
{1,2, ... ,k-1}.
(a) contradicts the first part and (b) the second part of (1).
To complete the proof we need to show that if M9(A, R) "# 0 for all
finite A E n then R is P9-acyclic. If P9-acyclicity is violated, then there
exists an A E n, IAI_= kl.- Xl, X2, ..,..:, Xk E A, XIP9X2P9X3, ... , P9Xk and
YI, Y2,·· ., Yk EA, yIP9Y2 P9Y3, ... , P9Yk such that
and
139
wh~e the last inequality follows from (2). If 0 = 0, then by the definition
of Po, the second inequality in the above set of inequalities is strict and
hence we would get !!-(Xk, Xl) > R(:.!, Xk) implying Xk POXI' If 0 > 0, then
by the definition of Po, we have Xk POXI' Thus in either case, since we have
XIPOX2POX3, ... POXk and Xk POXI, our assumption that Mo(A, R) "# 0 for
all finite A E n is violated for A = {Xl, X2,.··, xd . •
To extend our existence results to infinite sets we will assume that R is
smooth in the following sense:
Assumption 1 The set W(x):= {y: R(x,y) > R(y,x)} is open in X for
all X EX.
°
Observe that (a) M01(A,R) ~ M0 2 (A,R) for all ()2 ~ ()l and (b) for
02-connected R, Mo] (A, R) ~ CO 2 (A, R) for ()l = and for all ()2 E (0,1]8.
Thus, using Theorem 4, we get the following result.
(i) Mo(A, R) =J. 0 for all compact A E n and all 8 E (0,1] iff R is P-
acyclic.
(ii) Co(A, R) =J. 0 for all compact A E n and all 8 E (0,1] iff R is
P-acyclic and R is 8-connected.
References
Barrett, C.R., Pattanaik P.K. and M.Salles (1990), "On choosing rationally
when preferences are fuzzy". Fuzzy Sets and Systems 34: 197-212.
Barrett, C.R., Pattanaik P.K. and M.Salles (1992), "Rationality and aggre-
gation of preferences in an ordinally fuzzy framework". Fuzzy Sets and
Systems 49: 9-13.
Basu, K. (1984), "Fuzzy revealed preference theory". Journal of Economic
Theory 32: 212-227.
Basu, K. (1987), "Axioms for a fuzzy measure of inequality". Social Choice
and Welfare 32: 275-288.
Bergstrom, T. (1975), "Maximal elements of acyclic relations on compact
sets". Journal of Economic Theory 10: 403-404.
Dasgupta, M. and R. Deb (1991), "Fuzzy choice functions". Social Choice
and Welfare 8: 171-182.
Dasgupta, M. and R. Deb (1994), "F-decomposable social aggregation rule
and acyclic choice". Journal of Mathematical Economics 23: 33-44.
Dasgupta, M. and R. Deb (1996), "Transitivity and fuzzy preferences".
Social Choice and Welfare 13: 305-318.
Dutta, B.(1987) "Fuzzy preference and social choice". Mathematical Social
Sciences 13: 215-229.
Dutta, B., S. Panda and P.K. Pattanaik (1986) "Exact choice and fuzzy
preferences". Mathematical Social Sciences 11: 53-68.
Mukherjee, A. (1977), "The existence of choice functions". Econometrica
45: 889-894.
Panda, S.C. and P.K. Pattanaik (1988) "Demand theorem when preferences
are fuzzy". Indian Journal of American Studies 18: 139-142.
Sen, A.K. (1970), Collective Choice and Social Welfare, Oliver and Boyd,
London.
On the connection between correlated
equilibria and sunspot equilibria*
Julio Davila
1 Introduction
The concepts of correlated equilibrium [Aumann (1974, 1987)J and sun-
spot equilibrium [Shell (1977), Cass-Shell (1983)J have been put in relation
with each other very often in the economics literature since actually both
cope with the role of extrinsic uncertainty on the outcomes of simultaneous
optimizing behavior. As pointed out in Forges-Peck (1995), the difficulty for
the assessment of the precise link between them comes from their original
development in different frameworks: on the one hand a game-theoretic one
for the correlated equilibrium concept and on the other hand a competitive
• I t.hank Eric Maskin, Piero Gott.ardi, .Tames Bergill, Karl Shell and .Tallies Peck
for t.heir remarks and discussions on t.his subject., awl Andnm Mas-CoIell for useful
comlllent.s. This wsearch was st.art.ed while visit.iug Harvard Universit.y as Post.-doctoral
Fellow awl has since t.hen benefit.ed from remarks from at.t.endant.s at. several conferences
mul seminars. FUlHling from t.he Spanish M illist.ry of Educat.ion and Science from t.he
research projects PB92-0120-C02-091, PB96-1160-C02-02 and a post.-doctoral fellowship
is grat.dully acknowledged.
142
one for the sunspot equilibrium idea. Comparisons between them have been
made by means of translating one of the two equilibrium concepts into
the world of the other, either considering a game-theoretic avatar of the
sunspot equilibrium in market games a la Shapley-Shubik (1977) [see Peck-
Shell (1991), Forges-Peck (1995)J or considering a competitive version of the
correlated equilibrium idea [see Maskin-Tirole (1987)J.
In Maskin-Tirole (1987) it was conjectured that the concepts of a (finite-
states markovian stationary) sunspot equilibrium in a simple overlapping
generations economy and a competitive version of a correlated equilibrium
in the economy with asymmetric information they study may well be closely
connected. Specifically, under some conditions, a sunspot equilibrium of
the former economy could be seen as a correlated equilibrium of the corre-
sponding latter economy and vice versa. The goal of this paper is to make
precise what the conditions are under which this is so and, accordingly, to
assess the degree of equivalence between the two concepts in the particular
frameworks of overlapping generations economies and the one considered
in Maskin-Tirole (1987).
The investigation of this issue closest to the one developed in this pa-
per is Forges-Peck (1995). In that paper the authors study the connection
between the two equilibrium concepts by means of a market game a la
Shapley-Shubik which mimics the overlapping generations economy. They
get an equivalence result under the assumption of a continuum of players at
each stage and a general sunspot process which may not be markovian. As
for markovian sunspot equilibria, the scope of the equivalence shortens but
is still shown to hold for sunspots fluctuating between two values. Interest-
ingly enough, the case of sunspots taking just two values is the only one in
which the lack of robustness of the equivalence of markovian sunspot equi-
libria to correlated equilibria shown in Section 3 does not hold for reasons
which will be apparent in the proofs.
The main statements of this paper are in Propositions 1 and 2, in Sections
3 and 4, respectively. Their message can be summarized as follows: arbitrar-
ily close to any overlapping generations economy, there is another economy
for which the set of markovian stationary sunspot equilibria, equivalent to
some correlated equilibrium of a Maskin-Tirole economy is negligible, and
conversely. Auxiliary lemmas are collected in the Appendix.
mu
M= ( (1)
m21
(3)
5 Here, as well as in what follows, ratios trivially equal to 1 are made explicit for the
symmetry of the equations to become more apparent.
6Equat.ions 2.1-2.2 result from the utility maximization first order conditions and the
feasibility of the equilibrium allocation condition.
145
of its existence 7)
71"21 m
(DIUl(l~, + ~D2Ul(l~,ln)+
2 (4.2)
7I"22(DIUI(l~,l~) + #D2Ul(l~,l~))
2
=0
7I"11(DIU2(l~,tD + ~D2u2(l~,lD)+
1 (5.1)
7I"21(DIU2(l~,l~) + #D2u2(l~,l~))
1
=0
7Equations (4) result from the utility maximization first order conditions of the agent
"observing the rows" of IT taking into account the feasibility of the equilibrium allocation
condition. Similarly for equations (5) and the agent "observing the columns". Notice that
the denominators have been dropped with no harm in the computation of conditional
probabilities.
146
exactly meant by the "equivalence" between the equilibria of two such dif-
ferent economies? If we are given a sunspot equilibrium of a u-OG economy,
which is the (u 1 , u 2 )-MT economy one of whose correlated equilibria is the
"equivalent one"? If we interpret an overlapping generations economy as
a sequence of agents which only trade with those two who are contiguous
to them, the representative agent cares only about the rate at which he
gives away, say, right-handed good in exchange for the left-handed good,
and he does not bother at all whether the hand which receives his right-
handed good belongs to a distinct agent than the hand which gives him
left-handed good, as it is indeed the case in an OG economy, or to the
same agent. The same is true for any of the two agents of the Maskin-
Tirole economy, they just care about the terms of trade. This allows to
identify, as it was implicitly done in Maskin-Tirole (1987), any u-OG econ-
omy with the corresponding (u, u)-MT economy, i.e. the one where both u 1
and u 2 are equal to u. Therefore, by "a correlated equilibrium equivalent
to a given sunspot equilibrium" of a u-OG economy will be meant one of
the (u,u)-MT economy such that its allocation of resources is related to
the allocation of the sunspot equilibrium as follows: l1 = h and l~ = l2, for
all i = 1,2, i.e., such that the correlated equilibrium treats symmetrically
both agents. We will speak of two such equilibria as "giving the same allo-
cation of resources" , although we should keep in mind that, as a matter of
fact, the two economies, and hence their allocations of resources, are quite
distinct.
An answer to the question above is given by the next proposition.
Before making this claim precise, let us define a regular k-SSE (l, M) E
~~+ x (0, 1)k2-k of a u-OG economy to be a k-SSE such that the perfect
foresight steady state is not in its support. Notice that with the assumptions
made on u this implies that for all i = 1, ... , k, DIU(li' li) + D2U(li' li) f 0,
otherwise li would be the steady state labor supply. Proposition 1 above is
but the interpretation of the following fact 9 •
Proposition 1 (restated) For any u in a dense subset of the set of func-
tions in U for which the u-OG economy has 3-SSE, the set of 3-SSE equiva-
8There is a good reason for not. to try to simplify stating t.he seemingly equivalent
statement t.hat typically such set is negligible. The reason is that the usual sense given
to "typically" would mean in this case "for any economy in a dense and open subset of
the space of economies". Density is what is proved in Proposition 1, and not openness.
9 St.at.ed specifically for k-SSE with k = 3. As for k > 3 see the concluding remarks.
147
lent to some 3-CE of the corresponding (u, u)-MT economy is null measure
in the set of all 3-SSE in a neighborhood of any regular 3-SSE.
The limitation of scope in the restatement of Proposition 1 to neigh-
borhoods of regular 3-SSE is not very constraining, since most 3-SSE are
regular in the sense that, while the set of regular 3-SSE is locally a 6-
dimensional manifold, that of non-regular 3-SSE is locally contained in a
finite union of 5-dimensional manifolds (see Lemma 7).
Proof. Let u be of the class U and (l, M) be a regular 3-SSE of u-OG. Then
the set of 3-SSE is locally a manifold of dimension 6 in a neighborhood of
(l, M) (see Lemma 3). For this 3-SSE to be equivalent to a 3-CE (l, l, Il)
of (u, u)-MT, its correlation matrix Il should generate, either by rows or
by columns, the Markov matrix M and satisfy the equilibrium conditions
for a 3-CE not already implied by those of the 3-SSE. That is to say, there
should exist 7rij E (0,1), for all i,j = 1,2,3 such that
3
L 7rij =1 (6)
i,j=1
(7)
3
L 7rjdij(l) = 0, Vi = 1,2,3, (8)
j=1
where fij is defined on Rt+ and such that
Should there be such a Il, the previous system in 7rij would have to be
linearly dependent, which can be proved to be equivalent to the singularity
of the matrix A = (mjdij(l)). But letting B = (mij/ij(l)) (notice the dif-
ferent order in the indices of the probabilities of transition in the entries of
A and B), the equilibrium equations of the 3-SSE guarantee the singularity
of this matrix 10, which implies that the singularity of A is equivalent to
the fulfillment of
(10)
or
(11)
But equations (10) and (11) are both transversal at (I, M) to the equations
defining the 3-SSE for any u in a dense subset of the functions in U for
which u-OG has 3-SSE (see Lemmas 4 and 5). Therefore, the subset of
3-SSE equivalent to a 3-CE is contained in the union of two manifolds of
dimension 5 embedded in the manifold of dimension 6 constituted by the
3-SSE in a neighborhood of (I, M). The null measure of 3-SSE equivalent
to a 3-CE follows immediately. •
11 Stated specifically for k-CE with k = 2. As for k > 2, see the concluding remarks.
149
for which the (u l , u 2 )-MT economy has 2-CE, the set of symmetric 2-CE
is null measure in the set of all 2-CE.
Proof. Let ut, u 2 be of the class U and let (l, l, II) be a symmetric 2-CE
of (ut,u 2 )-MT. Then the set of 2-CE is locally a manifold of dimension 3
in a neighborhood of (l, l, II) which is moreover, for any (u l , u 2 ) in a dense
subset of U 2 , transversal at (l, l, II) to the linearly independent equations
if = q, for i = 1,2, satisfied by symmetric 2-CE (see Lemma 6). Thus
the set of symmetric 2-CE of (ut, u 2 )-MT is a manifold of dimension 1
embedded in the manifold of dimension 3 of 2-CE in a neighborhood of
(l, l, II). The null measure follows immediately. •
As a final remark, notice that if both utility functions of (u l ,u2 )-MT
are the same, then the two k-SSE associated to any symmetric k-CE are
equilibria of the same overlapping generations economy. Nevertheless, these
two sunspot equilibria need not be the same: although they necessarily have
the same allocation, their Markov matrices may be distinct. In general,
these two Markov matrices coincide if and only if the joint distribution is
symmetric and, only in this case, both sunspot equilibria are the same.
5 Conclusion
This paper states the conditions under which sunspot equilibria of a sim-
ple overlapping generations economy and correlated equilibria of a related
economy with asymmetric information about some extrinsic uncertainty as
in Maskin-Tirole (1987) can be considered to be equivalent in the sense that
any sunspot equilibrium of the first economy can be naturally interpreted
as a correlated equilibrium of the second one and vice versa. Specifically, it
turns out that the translation of sunspot equilibria (3-SSE) to correlated
equilibria (3-CE) is not robust whenever possible (and vice versa for 2-CE
and 2-SSE) in these particular frameworks.
It is worth to be mentioned that the propositions have been stated for
the minimum integer k ~ 0 which makes each of them hold. Actually,
Proposition 1 does not hold for 2-SSE since in that case the singularity of
matrix A is guaranteed by that of matrix B, which is not the case for k = 3
nor is it very likely for any k > 3, although this remains a conjecture (an
obvious pattern for matrix B in the general case becomes easily apparent
and makes this conjecture quite sensible, since for it not to be true some
conditions on the values of the second order partial derivatives of u at the
equilibrium allocation would have to be fulfilled, which needs not be the
case). The same remark applies to the extension of Proposition 2 to any
k-CE.
Propositions 1 and 2 may help to complete the understanding that the
previous literature provided us about the links between both equilibrium
concepts.
150
Appendix
Lemma 3 Let U be any function in U such that 12
3
83 = {(x,M) E lR!+ \~3 x (0,1)61 Vi E {1,2,3}'Lmijfij(x) = O}:I 0
j=l
(12)
(hj being such that hj(x) = D 1u(Xi,Xj)+;:D2u(Xi,Xj) and ~3 being the
diagonal of R3 ) and let (a, N) E 8 3 be such that Vi E {1, 2, 3}, hi(a) :10.
Then 83 is locally a manifold of dimension 6 in a neighborhood of (a, N).
L:J=l m1jf1j(X) )
F(x, M) = ( L:~=1 m2jf2j(x)
L:j=l m3jhj(x)
and let (a, N) E F- 1(0) = 8 3 . The Jacobian of F at (a, N), DF(a, N), is13
0 0
f21(a) - f22(a) f23(a) - f22(a)
0 0
0 0
0
hl(a) - h3(a)
0
h2(a) - h3(a)
)
12To prove the existence of such functions and their characterization is actually
the mathematical toil of the literature on k-SSE in OG economies (see Chiappori-
Guesnerie(1989) and Grandmont(1986) among others).
13 A 3 x 3 Markov matrix M is thought of as (ml2. ml3. m2l. m23. m3l. m32) E (0.1)6.
151
2:;=1 m1jf1j(X)
2:;=1 m2j!2j(X)
G(X, M) = (15)
2:;=1 m3j!3j(X)
f12(X)!23(X)!31(X) - ft3(X)!21(X)!32(X)
and let (a, N) E G- 1 (O) = 8 3 be such that fii(X) =1= 0, for all i E {I, 2, 3}.
Then DG(a, N) has as its three first rows DF(a, N) computed in the proof
of Lemma 3 and as fourth row a 9-tuple whose three first entries are ex-
pressions in terms of the second order partial derivatives of u at the points
(ai,aj), i,j = 1,2,3, and the six last entries are zero. Now fii(a) =1= 0, for
all i E {I, 2, 3}, guarantees that the six last entries of the three first rows
of DG(a, N) are full rank and therefore should the forth row be a linear
combination of the others, it would necessarily be the trivial one with zero
scalars. Thus the three first entries of the forth row would have to be zero
too, which requires the second order partial derivatives of u at the points
(ai, aj) to satisfy three equations. But arbitrarily close to u there is another
C 2 real-valued function u in U' with the same gradients as u at the points
(ai,aj) (guaranteeing thus that (a,N) E a-1(O) for the corresponding j)
but not satisfying the conditions on second order partial derivatives neces-
sary to prevent full rank of Da(a, N) and, thus, such that a- 1 (O) = 83 is
locally a manifold of dimension 5 in a neighborhood of (a, N) .•
Lemma 5 Let U" be the subset of those functions in U such that
(Jij being as in Lemma 3). The set of functions u E U" such that sg is
locally a manifold of dimension 5 in a neighborhood of any (a, N) E sg
satisfying fii(x) =1= 0, for all i E {1,2,3}, is dense in U".
Proof. Let u E U", let H: lRt+ \ ~3 x (0,1)6 ---t lR4 be such that
2:;=1 mljiIj(x)
H(x,M) =
2:;=1 m2jhj(x) (17)
2:;=1 m3jhj(x)
and let (a, N) E H-l(O) = sg be such that fii(x) =1= 0, for all i E {I, 2, 3}.
Then DH(a, N) has as its three first rows DF(a, N) computed in the proof
of Lemma 3 and as fourth row a 9-tuple whose three first entries are zeros
and the six last entries are
(Jijh bemgsuchthatfij(x
. h)
=D1u h (h
Xi,Xjh' ) +?;:"D2U
x. h (h hi
Xi,Xj), whereh I =
E
2 if h = 1 and vice versa). The set of (ut, u 2) W such that
is dense in W.
Proof. Let (u l , U 2 ) E W, let <p : lR~+ \ /).2 X lR~+ \ /).2 X (0,1)4 --t lR5 be
such that
2:i,j Pij - 1
2:~=l Plj!1j(X)
<p(xl,x 2,P) = 2:~=lP2jfij(x) (20)
2:~=l pjdlj(x)
2:~=l Pj2!?j(X)
and let (a l ,a2,IJ) E <p-l(O) = C2. Then D<p(a l ,a2,IJ) is
0 0
7f'llDdll (a) + 7f'l2 D l !12 (a) 0
0 7f'2lDdil (a) + 7f'22Ddi2(a)
7f'l1 D2!tl(a) 7f'2lD2!f2(a)
7f'l2 D2!?l(a) 7f' 22 D2!i2 (a )
0 0
7f'l1D2!ll (a) 7f'l2D2!f2(a)
7f'2lD2!il(a) 7f'22D2!i2(a) ... (21)
7f'u D d'A(a) + 7f'21Ddf2(a) 0
0 7f'l2Ddil (a) + 7f'22Ddi2(a)
1 1 1 1
ffl(a) !l2(a) 0 0
0 0 fil (a) fi2(a)
!tl(a) 0 !t2(a) 0
0 fil (a) 0 !?2(a)
Should the lower left 4 x 4 submatrix in terms of the second order partial
derivatives of u l and u 2 not be regular, there exist (ul, u2 ) in Warbitrar-
ily close to (ul, u 2 ) in the product topology with the same gradients at
points (ai\aj), i,j,m,n = 1,2 (so that (a l ,a2,IJ) E cl>-l(O) = (;2 for the
corresponding j's) which make this submatrix regular and such that the
154
coordinates of (1,0, -1,0) and (0,1,0, -1) with respect to its rows are not
in the (non trivial 15) null space of the lower right 4 x 4 submatrix 16. This
has two consequences:
(1) First, D<1>(a 1 ,a2 ,IT) is full rank (for it not to be so, looking at the
first four columns we would conclude that the first row would have
to be the trivial linear combination with zero scalars of the others,
which clearly cannot be considering the last four columns). Hence,
<1>-1(0) = 62 is locally a manifold of dimension 3 in a neighborhood
of (a 1 ,a2 ,IT).
-1 o 0000). (22)
o -1 0 0 0 0
Then, for any i E {1, 2, 3}, the set of functions u E U* such that 83 and
Di have a transversal intersection whenever nonempty is dense in U* .
Proof: Let u be in U* such that, for some i = 1,2,3, 83 n Di -::f- 0, and let
Then (a,N) E Wi1(0) and the fourth row of DWi(a,N) is such that all its
entries other than the i-th are zero. Should the i-th one, in terms of the
second order partial derivatives of u at (ai, ai), be zero too, then arbitrarily
close to u there is uin U* with the same gradient at the points (ai, aj) (and
thus ~a, N) E ~i1(0) for the corresponding i), such that the forth row
of DWi(a, N) is non-null and hence this Jacobian is necessarily full rank
(otherwise, if the fourth row of D~i(a, N) were linearly dependent of the
others, necessarily for all h = 1,2,3, ih1 (a) = ih2(a) = ih3(a), which from
(a, N) E ~i1(0) implies ihh(a) = 0, i.e. - g~~ :::::
= 1 for all h = 1,2,3.
But the strict quasi-concavity and monotonicity of u guarantees that there
is a unique (a, a) satisfying this condition. Thus, necessarily, ah = a and
hence a would not be off-diagonal.) The conclusion follows immediately.
References
Aumann, R.J., Subjectivity and correlation in randomized strategies, Jour-
nal of Mathematical Economics, 1974, Vol. 1, 67-96.
Aumann, R.J., Correlated equilibrium as an expression of Bayesian ratio-
nality, Econometrica, 1987, Vol. 55, 1-18.
Azariadis, C. and R. Guesnerie, Sunspots and cycles, Review of Economic
Studies, 1986, Vol. 53, 725-736.
Cass, D. and K. Shell, Do sunspots matter?, Journal of Political Economy,
1983, Vol. 91, 193-227.
Chiappori, P.-A. and R. Guesnerie, On stationary sunspot equilibria of
order k, in Economic Complexity: Chaos, Sunspots, Bubbles and Nonlin-
earity, W. Barnett, J. Geweke and K. Shell (Eds.), 1989.
Forges, F., Sunspot equilibrium as a game theoretical solution concept, in
Proceedings of the Sixth International Symposium in Economic Theory
and Econometrics, Barnett, W. (Ed.), 1991.
Forges, F. and J. Peck, Correlated equilibrium and sunspot equilibrium,
Economic Theory, 1995, Vol. 5, 33-50.
Grandmont, J.-M., Stabilizing competitive business cycles, Journal of Eco-
nomic Theory, 1986, Vol. 40, 57-76.
Maskin, E. and J. Tirole, Correlated equilibria and sunspots, Journal of
Economic Theory, 1987, Vol. 43, 364-373.
156
Fran<;oise Forges
1 Introduction
The simplest model of trade involves one seller and one buyer, who both
privately know their own value for a single object initially owned by the for-
mer agent. The sealed-bid double auction mechanism has been extensively
used to solve this simple collective choice problem (see, e.g., [2], [11], [14],
[15] and [21]). More general trading mechanisms have also been proposed
(see, e.g., [4], Section 3, [5], [8], [9], [15] and [19]). In particular, Matthews
and Postlewaite ([15]) have investigated whether the double auction bid-
ding game was rich enough to reach as many solutions as general trading
rules. They have proved that the outcomes of a large class of trading mech-
anisms could be achieved as Nash equilibria of the double auction game
preceded by (interim) preplay communication. The mechanisms that can
*1 wish t.o thank S. Matthews for helpful remarks on an earlier version of this paper
(namely, [5]). Several articles by T. Gresik and my own work with E. Minelli motivated
the present version, which benefited from the comments of R. Gary-Bobo and Y. Tau-
man. I also grat.efully acknowledge the financial support of TMR network contract ERB
FMRX eT 96 0055, which enabled me to present this paper in Alicante and Tel-Aviv.
158
1 Notice that most papers concentrate on private values (with some exceptions, like
[10], and to some extent, [17]).
159
2 As far as interim properties are concerned, one can dispense with random mecha-
nisms. If one cares about the agents' well-being after the effect of the mechanism, it is
natural to consider the very final stage in which all lotteries have been performed. The
description of such a stage requires random mechanisms. With this formulation, we shall
in fact be interested in posterior individual rationality (every agent gains fwm partic-
ipating in the game given the information revealed by the mechanism) rather than ex
post individual rationality (every agent gains from participating in the game given the
full description of the state of nature). A similar distinction was introduced in [6]. In the
case of private values, the two forms of individual rationality are essentially equivalent.
3Implementation is understood here in a wide sense, and in any case refers to weak
implementation. We shall come back to this below.
160
2 Basic model
We shall consider trade between a seller (agent n + 1), who owns a
single indivisible object, and n potential buyers (agents 1,2, ... , n). Let
I = {I, 2, ... , n+1}. We denote as Ti the set oftypes of agent i (i E 1). Ti will
typically be a finite set or a compact real interval. Let us set T = I1iEI Ti
and let F be a joint distribution on T. If the sets T i , i E I, are finite,
we assume that F is such that every ti E Ti has positive probability. In
the compact real case, we assume that F has a positive density over the
underlying intervals.
Given a vector of types t = (ti)iEI, Vi(t) denotes the value of the object
to agent i at the state of nature t. We assume that Vi(t) E [0, m] where m
is some positive real number. Values are private if
In this case, the value of the object to a given agent only depends on his
161
own type.
In the next Sections, the above quantities will constitute the basic ingre-
dients of several Bayesian games, which will model possible trading scenar-
ios.
7r = °
sibly keeps) the object, a sale price 7r E [0, m] (with the convention that
if w = n + 1) and a vector of transfers 4 c = (cih::;i::;n E ]Rn. The
following definition is motivated by the interpretation that a mechanism
selects (w, 7r, c) as a function of types reported by the agents.
Definition 1 A random (resp., deterministic) mechanism /1 is a transition
probability (resp., a mapping) from T to I x [0, m] x]Rn.
4 As usual, Ci can model a fee to be paid by buyer i to the seller, or a subsidy paid
by the seller to agent i.
162
are formulated at the interim stage of the above Bayesian game5 , i.e., at
stage 2. I.e. means that no agent can gain by lying unilaterally about his
type (i.e., that telling the truth is a Nash equilibrium of the above game).
INT.I.R. means that at stage 2, all agents expect nonnegative expected
utility from participating in the game. Since both properties relate to stage
2, they can be formulated in terms of conditional expectations (given ti for
agent i). Hence, as far as these properties are concerned, one can restrict
on particular deterministic mechanisms without loss of generality. More
precisely, let us consider the conditional distribution that is induced by F
and J.L on T-i x I x [0, mJ x ~n when agent i's type is ti and agent i's report
is Si (possibly different from ti). According to (1), the conditional expected
payoff of agent i (i = 1, ... , n), with respect to this distribution, given ti,
Si, and the other agents' types Li is6
Vi (ti' Li) EJ.L [I ['Ill = iJlsi, LiJ
-EJ.L [ir1 ['Ill = iJ + cilsi, LiJ.
where EJ.L denotes the expectation with respect to J.L. From (2), one can
proceed similarly for agent n + 1. Let us denote as Ui(J.Llti) the expected
utility of agent i (i E 1), given his type ti, at the truthful equilibrium,
namely
(3)
Definition 2 A mechanism J.L is 1. C. if, and only if
Ui(J.Llti) 2: E [Vi (ti' L i , 'Ill, ir, c) Iti' Si] Vi E I, Vti, Si E Ti.
J.L is 1NT.1.R. if, and only if,
5 The interpretation is that from the interim stage on, the agents fully delegate their
decision power to a planner.
6When confusion call arise, we write random variables as w, fr, etc.
163
(7)
Example 1 Let n = 1 (one buyer, one seller), Tl = {5, 7}, T2 = {I, 3}, F
be uniform, Vi(ti) = ti and consider the mechanism
(the object is always sold, at price 2 (resp., 6) if the reported values are
(5,1) or (7,3) (resp., (5,3) or (7,1)).
164
7More precisely, in the model considered in [15], VETO-I.C. of the original random
mechanism implies VETO-I.C. of the expected mechanism (p, x), which in turn is equiv-
alent to I.C.* combined with ex post I.R. (to be formally defined below).
x Observe that a posteriori I.R. differs from ex post .,.eg1Y~t, which appears for instance
165
In the case of private values, by recalling (1) and (2), a posteriori I.R.
takes the following form:
n
[1f-Vn+1(tn+1)]I[w#n+1]+L~ > 0 a.s.
i=l
for every ti E Ti (i E I). These inequalities imply the standard ex post I.R.
property considered in the literature (see, e.g., [8], [9], [10] and [15]), which
is expressed in terms of the mechanism (p, x) (see (4),(5».
Proposition 1 Let {£ be a VETO-I.e. mechanism. Then {£ is I.e. and a
posteriori I.R. {and thus, INT.I.R.}.
Proof: It is obvious that VETO-I.C. implies I.C. To check that VETO-
I.C. implies a posteriori I.R., recall (3), take Si = ti in (8) and use that, for
every random variable X,
It is not difficult to construct examples which show that I.C. and a pos-
•
teriori I.R. do not imply VETO-I.C. (see, e.g., [15], example 1).
Observe that an a posteriori I.R. mechanism cannot select (positive)
entry fees to be paid by unsuccessful potential buyers, while any transfer
between the successful buyer and the seller can be included in the sale price.
Hence, the only possible transfers that can be selected by an a posteriori
I.R. mechanism must correspond to participation subsidies offered by the
seller to unsuccessful potential buyers (provided that such transfers are
profitable to the seller). In particular, if there is only one buyer and one
seller, no transfer can occur. Given this state of affairs, we shall from now
on focus on mechanisms which only select a winner and a price (i.e., such
that c = 0 with probability one).
Definition 5 M; denotes the set of all interim payofJs that can be achieved
through a VETO-I.e. mechanism without transfers.
Remark: In the light of the previous analysis, one is tempted to search for
an (ex ante or interim) efficient mechanism among the VETO-I.C. ones. In
the case of bilateral trade with private values, Gresik (see [8], [9] and [11])
identifies conditions which guarantee that the restriction to ex post I.R.
mechanisms entails no loss of efficiency.
in some interpretations of the winner's curse in common value auctions (sce [16] and
[26]). The standard approach, which entails that each bidder anticipates the information
revealed by a winning bid, is typically a posteriori I.R. (given the winner and the price),
but is not necessarily immune to ex post regret (given the realized value of the random
variable of interest).
166
The interpretation is that all traders make bids, while the seller also
chooses the trader k who gets the object (possibly himself). If the seller
decides not to keep the object, trade can only occur if the winning buyer
(k) makes a higher bid than the seller.
In the case of a single buyer (n = 1), the contracting game GO reduces
to the extensively studied sealed-bid double auction (see, e.g., [2], [11], [14],
[15] and [21]). Obviously, with several buyers, many other generalizations
are conceivable (see, e.g., [24] and [25]). In particular, the framework is
one in which the seller could organize a standard auction (see [26]). How-
ever, such procedures require some transmission of information between the
agents, for instance, to determine the highest bid. Here, we distinguish the
communication phase from the final contract. The main justification for
proceeding in this way is that once communication is allowed, it can take
a variety of forms, which are difficult to control. We thus want to analyze
the effects of all conceivable scenarios of communication.
As suggested in the previous comments, the contracting game must be
interpreted as the "reduced form" of the last step of a negotiation process,
so that the simultaneous proposals of the seller and the buyers are only ap-
parent. For instance, if 8 = 0, the game is essentially equivalent (in strategic
form) to the following one: the seller selects a buyer (k) and proposes him
a price (b n +1 ); buyer k accepts or refuses the proposal. In the first case,
he pays bn +1 and gets the object. Otherwise, the seller keeps the object 9 •
This new game exactly models the final stage of a negotiation process. It
is sensible if it is preceded by a phase of communication between the seller
and the buyers. This preliminary phase enables the seller to fix the price
bn +1 as a function of messages from the buyers. For instance, as noted
(4) The agents make simultaneous bids and the seller also chooses a win-
ner, as in G 6 • The payoffs are as in G 6 •
As shown in [3], [4] and [18] (chapter 6), by a general revelation principle,
C( G 6 ) contains all equilibrium payoffs that can be achieved through any
conceivable scheme of (preplay and interim) communication in G 6 ; this
result still holds if one restricts to "truthful and obedient" communication
equilibria, which are associated to communication devices such that Mi =
T i , i E I, and Si = [0, m], i = 1, ... , n, Sn+l = [0, m] xl (namely, the agents
are asked to report their types and get a recommendation on how to bid
in G 6 ).
Let us illustrate that communication equilibria of G 6 may fail to be ex
post individually rational.
168
(3) For every signal (w, 71'") E I x [0, m] selected by v, the strategic choices
of the players at stage 4 of Gti(d) induce w as winner and 71'" as price
(given (w,71'"), the seller chooses k = k(w,71'") = w, and ifw i= n + 1,
the bids bw = bw (w,71'") and bn +1 = bn +1(w,71'") satisfy bw (w,71'") 2:
bn +1 (w, 71'") and pti (k( w, 71'"), b( w, 71'")) = 71'").
SF( Gti ) denotes the set of all interim payofJs from self-fulfilling equilibria
in G ti .
ReIllarks:
(1) The previous proposition holds for every 8 E [0,1] and shows in par-
ticular that the set SF(GO) is independent of 8. The same will be
true for the results in Section 5.
(2) We have considered public mechanisms, which send the signal (w, 71")
to all players. It would seem more natural that only the seller and
the winning buyer (w) get this information. Proposition 2 holds in
this case, provided that the same definition of mechanism is used
for VETO-LC. and self-fulfilling equilibria. However, if values are
not private, the mechanism conveys information on the value of the
object. Hence, any change in the signals will modify the VETO-LC.
condition (namely, (8)). On the other hand, as argued in [12] and [13],
public mechanisms may be preferred to private ones, for instance,
because their messages are verifiable.
(3) The proposition and the example above show that, in general, solu-
tions in M; correspond to a strict subset of C(GO). From this, one
170
5 Private values
From now on, we assume that every agent knows the value of the object to
himself, namely that the value functions satisfy Vi(t) = Vi(t i ) for every i E I
and ti E Ti. [15] contains a result which is similar to the next proposition
in the case n = 1.
In order to show that f..L is VETO-I.C., consider buyer i and assume his
type is ti. If he reports Si, possibly different from ti, the communication
device makes his recommendations given (Si, Ld. Let bi be the bid which
is recommended to agent i. The communication equilibrium conditions for
this agent can be written as
for every ti and Si in T i , where f3i ranges over all possible bidding strate-
gies of buyer i (in the game with communication). By choosing f3 i =
min {bi , Vi(ti)}, player i guarantees
Uf(ti, k, f3i' bn +1) ~ max { 0, uf (ti' k, bi , bn +1 ) } . (13)
It is easily checked that (11), (12) and (13) imply VETO-I.C. One can
obviously proceed in a similar way for the seller . •
Propositions 2 and 3, together with the fact that SF(G Ii ) ~ C(G Ii ), yield
the following corollary:
Corollary 4 If values are private, C( G Ii ) = SF( G Ii ) = M;.
From Definition 7, communication equilibria in GIi are achieved with the
help of a communication device, which may select signals in a complex
way. In practice, one expects that communication will have the form of a
simple conversation between the traders, without the help of any media-
tor. The next proposition states that if values are private, a large class of
communication equilibria of G6 can be achieved through a simple scheme
of unmediated communication. A siInilar result was obtained in [15] in the
case n = 1 (see the remark below).
Proposition 5 If values are private, every payoff in M; which can be
achieved by means of a mechanism with finite support is a fully revealing
Nash equilibrium payoff of the following unmediated communication bidding
game G~:
(3) The agents make simultaneous bids and the seller also chooses a win-
ner, as in G 6 . The payoffs are as in G Ii •
172
Remarks:
(1) Private values are crucial in the previous proof; this assumption guar-
antees that once the winner and the price are settled, knowledge of
the types is not useful. Similar results are available in the general
case, but they require a much more intricate proof (see, e.g., [1], [4],
[22] and [23]).
173
References
[1] Baniny, 1., 1992, Fair distribution protocols or how the players replace
fortune, Mathematics of Operations Research 17, 327-340.
[2J Chatterjee, K. and W. Samuelson, 1983, Bargaining under incomplete
information, Operations Research 31, 835-851.
174
Heidelberg, Germany.
2 Department of Economics, Virginia Polytechnic Institute and State
University, Blacksburg, VA 24061-0316, U.S.A.
1 Issues
The concept of general equilibrium among multi-member households in-
corporates the fact that the allocation of resources among consumers and
the ensuing welfare properties are affected by the specifics of a pre-existing
partition of the population into households. Conversely, the formation of
households can - partly or fully - be driven by economic considerations,
by the anticipated effects of the emerging household structure on the alloca-
tion of economic resources. See Becker (1978, 1993) for the most prominent
voice on endogenous household formation. When we consider households in
the sequel, we depart from traditional economic theory which has, with few
exceptions, treated households as if they were single consumers. We allow
for households with several, typically heterogeneous, members; households
that make (efficient) collective consumption decisions where different house-
holds may use different collective decision mechanisms; yet households that
operate within a competitive market environment. This departure from the
traditional market model permits us to investigate the interplay of dual
178
• consumption set Xi = ~~
With free disposal of resources, the feasibility requirement could and should
be relaxed. We call an allocation (x; P) E X x 'P weakly feasible, if
(2)
Xh\i E Xh\i = IT Xj
jEh\i
describes the consumption of household members j other than i. Now we
are ready to formulate externalities.
(LAN) Local Anonymity: Ui( (Xi, Xh\i); h) Ui( (Xi, Xh\i); h) for i E
I,h E Hi'
3.1 Definition
In an equilibrium among households, a household chooses an efficient con-
sumption schedule for its members, subject to the household budget con-
straint. Throughout this and the following subsection, we take a household
structure PEP as given. First, we consider a household h E P and a price
system p E lRe. For
denote
186
3.2 Existence
We maintain the assumption of a given household structure P. It turns out
that a proof of existence of a P-equilibrium is similar to proving existence
of a competitive equilibrium among individuals. In both cases, one uses a
routine argument after demonstrating suitable properties of market excess
demand.
187
In our first approach to the existence problem, we follow the path out-
lined by Ellickson (1993) and many others who, in the succession of Debreu
(1952), rely on Kakutani's Fixed Point Theorem.
For the time being, suppose that household endowments are strictly pos-
itive: Wh »0 for each h E P. Choose k > 0 such that the social endowment
Wp belongs to the cube I( = [0, k]l. Set K = [0, 2kJf. Suppose further that
for all h E P, i E h, "the utility function Ui (Xh; h) is continuous and con-
cave in xh."Next consider a household hE P which maximizes, for each
p E ~ == {p E R~ : L,j Pj = I}, its aggregate welfare Wh given as
Wh(Xh) = I: Ui(Xh; h)
iEh
is convex-valued, u.h.c., and satisfies the strong form ofWalras Law. Hence
by Th. 6.37 of Ellickson (1993), there exists a pair (p*, z*) E ~x [-k, 2lIlk]l
s.t.
(a) z* E cp(p*) and
(b) z* :S 0 and zj = 0 whenever p* »0.
This result yields the following
Proposition 1 Suppose BE and
(i) Wh »0 for all h E P;
(ii) Ui(Xh; h) continuous and concave in Xh for all h E P, i E h.
Then there exists a P-equilibrium with free disposal (p; x). If, moreover,
there is at least one household whose members have strictly monotonic pref-
erences and enjoy non-negative externalities, then exact market clearing
prevails at the equilibrium (p; x).
Proof. Take (p*, z*) E ~ X [-k,2IIlk]l with (a) and (b) whose existence
has already been established. z* E cp(p*) means
188
the continuity condition. Replace then Zh(p) by the artificial excess de-
mand Zh (p) = Zh (p) + ~p. Then the aggregate excess demand of the
economy has the desired properties.
4 Core allocations
We have reserved the symbol h for non-empty subsets of I interpreted as
"households". When we use instead the symbols C (or sometimes S) for a
non-empty subset of I, we want to indicate that we want to consider C as a
"coalition". The sub-population C is called a coalition, if it constitutes a
sub-economy. Feasible allocations for a coalition or sub-economy are defined
in analogy to feasible allocations for the full economy based on the entire
population I. Within a sub-economy -like in the full economy-
(a) households form;
(b) the available resources are allocated.
(1) Individuals.
(2) Households.
(3) Coalitions.
Only individuals, households, and the entire population enter the descrip-
tion of a feasible allocation of commodities and consumers. Therefore,
households enjoy an operational status. In contrast, coalitions have a
hypothetical status. Given an allocation of resources and people, one
runs through a multitude of thought experiments where in each case the
allocation is tested against a feasible alternative for some coalition. If the
allocation passes all conceivable tests, it is distinguished as a core alloca-
tion. Since we are dealing with the allocation of commodities and people,
it is crucial what a coalition can and cannot do. As already indicated, a
feasible alternative for a coalition has two components:
(a) an allocation of its members into households, i.e., a household sub-
structure for the coalition;
(b) an allocation of its available resources (which may depend on the chosen
household structure) among its members.
Requirement (a), that a coalition has to come up with a household struc-
ture of its own, is non-traditional, but quite natural. It is a mild consistency
condition. Coalitions are subject to similar social constraints as society at
large. Consequently, if the household structure is variable, a coalition is
also flexible in the choice of its household structure. On the other hand, if
the population has to live with a fixed household structure, every coalition
is bound to conform with this household structure, too. Requirement (b)
is standard. The coalition has to rely on its own resources and further, to
be taken serious, it should have a practicable plan on how to use these
resources.
Next, we are going to express the feasibility conditions for a coalition in
a formal way. For a coalition C, let Qc denote the collection of partitions
of C into non-empty subsets. An element Q E Qc represents a household
structure for coalition C. The resources available to coalition C with
household structure Q E Qc equal
Ye =wQ.
G(C):= U h.
hEG
G(C) is the coalition consisting of all the constituents of all the households
in C. The fixed household structure P implies that C is the only possible
household structure for coalition G(C).
Definition 1 x E X belongs to the P-core or household core w.r.t. P
or constrained core w.r.t. P, denoted C(P), if
(i) x E X and
(ii) there is l!Q C E Q(P) and Y E X with:
(a) Ui(y; P) ~ Ui(x; P) for all i E G(C).
(b) Ui(y; P) > Ui(X; P) for some i E G(C).
(e) LiEC(G) Yi = Wo = LhWWh'
Notice that the P-core just defined is of the "strong core" variety. The
corresponding "weak core" is in general larger.
Our model is related to the club literature which for the most part pre-
sumes also a partition of the population into groups. Clubs and households
alike allow for intra-group externalities. The framework developed in this
193
paper differs from club theory in two respects. First, club theory empha-
sizes individual choices to participate in clubs whereas we focus on collective
decisions within groups. Second, clubs exist primarily, if not only, for the
provision of a local public good, also named "club good" or "public pro-
ject". In serving this purpose, the club incurs a resource cost which it tries
to recoup through the collection of (possibly personalized) admission fees.
However, the original claims to economic resources rest with the individuals
and the purchase of goods for private consumption is left to each member
who is subject to an individual budget constraint. In contrast, a household
forms an economic entity involved in the provision of local public goods
as well as the procurement of private consumption goods for its members.
It may be the household - rather than its members personally - who
is entitled to (endowed with) resources. And it is only the household, not
each member, who is subject to a budget constraint.
However, for the full core concept the different aspects of clubs and house-
holds are irrelevant. A feasible alternative for a coalition is an allocation
of its members into households or clubs and an allocation of its available
resources among its members. Hence, a feasible alternative for a coalition
has the same requirements for clubs and households. Thus, a full core allo-
cation in the framework of households is a full core allocation in the club
framework and vice versa if the same intra-group externalities are present.
Gilles and Scotch mer (1997) have shown that the core may be empty when
preferences are non-convex. In the next section, we provide an example that
the full core can be empty, even if preferences are convex.
Specifically, we assume
u® = rand v® = r - ~r2
9
=r - .!..r2 for r > 0,
a -
194
(i) v(w)=I>O.
(ii) u(O) = v(O) = O.
(iii) u'(Y) > v'(z) for all y ~ 0 and z > O.
(iv) u" ~ 0 and v" ~ O.
u(3W-f(U)) +v(3w+f(U)) < u(2 - y2(U)) +v(y2(U))
(v)
for all U E [1,5/3].
(vi) u(3w-g 3(U)) +v(3w+g3(U)) < u(l) +v(l) for all U E (5/3,3).
Proof.
a.) The condition (i) implies that {x = (1,1,1); P = {{I}, {2}, {3}} is
195
v(l) which, by (vi), exceeds Ui. Therefore, the coalition {I, 2} can improve
upon the original allocation.
c.) Up to permutations, we are left with the case where individuals 1 and
2 are together in one household and individual 3 stays alone. We commence
with the special case where 1 and 2 achieve the same utility level, i.e., U1 =
U2 = u(l) + v(w). By (i), the latter exceeds the autonomous utility level
U3 = u(l). Therefore, by a slight deviation from equal distribution (within
the household {I, 3}) in favor of 1, the coalition {1,3} can improve upon
the given allocation. If the original utility levels of 1 and 2 are different,
then without restriction U1 < U2 and already equal distribution within
household {I, 3} yields an improvement for that coalition.
d.) So far, we have shown that (i)-(vi) imply emptiness of the weak core,
indeed. It remains to show (i)-(vi). (i)-(iv) are obvious. For U E [1,5/3]'
the inequality in (v) amounts to
On the other hand, u( 1) +v (1) = 194 . Direct comparison shows 1i (J3 -1) <
194 . Hence (vi) . •
:L>"s=l,
SEl3;
n V(S) ~ V(I).
SEB
Xi =L >'s . yf.
SEB i
L >'sws ~
SEB
WI
Example 3. The two foregoing examples represent polar cases in the sense
that in the first example a segmentation into single--person households con-
stitutes a core outcome and in the second example formation of the biggest
household constitutes a core outcome. But less extreme possibilities exist.
Let us return to the counter-example of the previous sub-section. In that
example, we could observe cycles of household formation. But if the num-
ber of consumers in that example is changed from 3 to 4, then the strong
core is no longer empty. 0
199
5 Conclusion
Excess demands resulting from efficient collective decisions by multi-
member households tend to be structurally similar to the preference max-
imizing excess demands of individual consumers. This fact enables us to
show the existence of competitive equilibria among multi-member house-
holds. Equilibrium existence combined with a core inclusion result yields
non-emptiness of constrained cores. In contrast, the full core can be empty
under standard assumptions. The reasons for this are two-fold. First, any
coalition qualifies as a potential household. Secondly, intra-household ex-
ternalities are present. This points to two sets of restrictions guaranteeing
a non-empty full core. First, one can impose restrictions on the size and
structure of households. Examples of this kind can be found in Roth and
Sotomayor (1990) who show that the core in two-sided matching models
is non-empty and equals the set of stable matchings. Secondly, one can
impose restrictions on the nature of externalities. Our examples 1 and 2
are polar cases of certain types of externalities which yield non-empty full
cores.
References
Becker, G.S: "A Theory of Marriage", Chapter 11 in G.S. Becker: The
Economic Approacb to Human Behavior. The University of Chicago
Press: Chicago. Paperback edition, 1978; pp. 205-250.
1 Introduction
Market economies can be regarded as collections of economic agents that
take individual decisions over their private feasible sets. Like budget sets
in the Walrasian model, these sets depend on prices and income from prof-
its. But there are also influenced by conditioning variables that may be
determined outside the market mechanism. Examples of these conditioning
variables are the prevailing social rules (e.g., laws, and in particular the
assignment of property rights), the provision of public goods by the pub-
lic sector (roads, health care, unemployment benefits), the regulation of
economic activities (the presence of quotas, the regulation of quality stan-
dards or labour conditions), the working of a tax system, etc. We can refer
to the collection of these conditioning variables as the public environment.
It is worth stressing that the concept of public environment allows many
different problems to be treated within one common setting. The cost of
'Thanks are due to Luis Corch6n, Ignacio Ortuno and Joaquim Silvestre for helpful
comments on an earlier version of this work. We wish also to acknowledge the financial
support provided by the DGICYT under project PB92-0342.
202
this generality is that little structure can be imposed on the set of public
environments. The chief question is the analysis of efficient allocations in
such a framework.
Mas-Colell's (1980) contribution to the pure theory of public goods pro-
poses the notion of valuation equilibria to address this problem. He con-
siders an economy involving a single private good (to be interpreted as a
Hicksian composite commodity), and the choice of a single public project
from a space where no linear structure is imposed. This equilibrium no-
tion may be regarded as an application to this abstract framework of the
Lindahlian approach to the provision of public goods. A valuation equi-
librium corresponds to a unanimously agreed choice of public project, the
role of the public sector being to design a mechanism that induces such
an efficient agreement. In a valuation equilibrium every consumer prefers
her consumption plan, consisting of some amount of the private good and a
public project, to any other which is affordable given the valuation function
(to be interpreted as tax system). Taking the private good as the numeraire,
Mas-Colell shows that valuation equilibria satisfy the standard properties
of competitive equilibria.
Later, Mas-Colell & Silvestre (1989) introduced the concept of cost-
share equilibrium which extends the work of Kaneko (1977) and Mas-Colell
(1980), to allow many public goods. Even though in some cases this model
allows for many private goods, the authors point out that ''the extension
that seems to us very difficult is to allow for produced intermediate goods."
(cf. p. 255) [see also Diamantaras & Wilkie (1994)].
Allowing several private goods offers a choice of how to extend the notion
of valuation equilibrium. One possibility is to assume that agents evaluate
alternative actions taking the equilibrium prices as given. The alternative is
to assume that they compute the new prices that would emerge in different
environments. In the first case, agents compare alternatives disregarding
the effect on prices that results from a change in the environment (as in
the standard competitive or Lindahl equilibrium model). In the second
case, they are highly sophisticated and able to calculate the set of condi-
tional equilibria associated with an alternative public environment (and to
coordinate on which one if there are several).
Diamantaras & Gilles (1996) and Hammond & Villar (1998) extend Mas-
Colell's work by taking the second avenue. They present slightly different
models with an abstract set of public projects and several private com-
modities that may be both inputs and outputs. Their notion of valuation
equilibria requires agents to maximize their payoff functions taking into
account the changes in the prices of private commodities resulting from
changes in the public environment. They show that these equilibria satisfy
the two fundamental welfare theorems.
The purpose of this paper is to discuss the efficiency and decentraliz-
ability of valuation equilibria in the case when prices of private commodi-
ties are treated as fixed. Besides completing the analysis, the interest of
203
2 The model
Consider an economy with f private commodities. The vector W E Ri rep-
resents the aggregate initial endowments of private goods. There is an ab-
stract set Z whose members are vectors of those variables defining the public
environment. Each agent's feasible set and payoff function may be affected
by the values taken by these vectors z E Z. No particular structure will
be postulated on the set Z. We assume that there is some kind of public
agency or public sector that can determine these variables and/or affect
consumers' budget sets and firms' profit functions via taxes and subsidies.
204
Even though the tax system itself can be thought of as part of the public
environment, we find it more convenient to treat these variables separately.
For the sake of generality, agents' feasible sets will be defined as subsets of
]Ri X Z (where]Ri stands for the commodity space and Z for the public en-
vironment space), even though they may actually be independent of many
of the variables in Z. A point P E ]R~ is a price vector relative to private
commodities.
There are n firms in the economy. Let Yj C ]Ri X Z be the jth firm's
production set, and denote by Yj(z) the jth firm's conditional production
set when the environment variables take the value z E Z. That is,
Yj(z):= {Yj E]Ri I (Yj,z) E Yj}.
For each firm j = 1,2, ... , n, the mapping aj : ]R~ X Z -+]R is assumed to
represent the net subsidy this firm receives (or, if negative, pays as taxes),
as a function of prevailing prices and the value of the environment variables.
Thus for each given (p, z) in ]R~ x Z, the jth firm's conditional profits are
given by 7fj(p,z) = sup{PYj +aj(p,z) I Yj E Yj(z)}. In equilibrium this
supremum should be attained. This implies that, for each given (p, z) in
]R~ X Z, the jth firm selects a production plan Yj(p,z) that maximizes
(conditional) profits.
There are m consumers. The ith consumer is characterized by the col-
lection [Xi,Ui,Wi,(Oij)], where Xi C]Ri X Z, Ui : Xi -+]R, Wi E]Ri denote
the consumption set, utility function and initial endowments, respectively,
and Oij stands for the ith consumer's share in the jth firm's profits. By
definition, 0 ::; Oij ::; 1, and Ej=10ij = 1, for all i,j. For a given point
Z E Z the ith consumer's conditional consumption set is given by:
JR, and such that for every pair (p,z) E JR~ x Z one has Ej=1 Uj(p,z) +
E:1 Ti(p,Z) :$ O.
Definition 2 A tax system T is balanced if for any pair (p,z) E JR~ x Z
one has Ej=1 Uj(p, z) + E:1 Ti(P, z) = O.
(ii) For all j = 1,2, ... ,n, p*yj +Uj(P*',z*) ~ P*Yj +Uj(P*,z) for all
(Yj,z) E Yj.
(,•••;,;,;) "m
L...ti=1 Xi* - "m
L...ti=1 Wi = "n *
L...tj=1 Yj·
1 It can be easily shown that the results in section 3 remain valid if we consider
that consumers are more sophisticated, and can also compute the effect on their budget
constraint of changes in firm's profits.
206
can picture the situation as agents choosing the environment and the public
sector choosing the incentive scheme.
When utility maximization is relaxed to expenditure minimization one
gets the standard notion of compensated equilibrium, which will be used in
order to discuss the second welfare theorem.
Definition 4 A compensated valuation equilibrium is defined like a
valuation equilibrium except that condition (i) is replaced by
(i1 For every i =1,2, ... ,m, pOx; ::; P"Wi + 2:.";=10ij7rj(p",z") +
Ti(p" ,z*) and P*Xi ~ P"Wi + 2:.";=1 Oij7rj(P* ,z*) + Ti(P* ,z) whenever
(Xi,Z) E Xi withui(xi,Z) ~ Ui(X;,Z*).
3 Main results
The first main result says that a valuation equilibrium is Pareto optimal,
provided the tax system is balanced. The second establishes that any Pareto
efficient allocation can be decentralized as a valuation equilibrium. Finally,
it will be shown that a valuation equilibrium is in the core, provided that
inter-coalitional transfers are excluded.
Theorem 1 Let [p*, (xi), (yj), z*, T*] be a valuation equilibrium, and sup-
pose that consumers are locally non-satiated. 1fT" is a balanced tax system
the resulting allocation is Pareto optimal.
Proof. Let [P*, (xi), (yj), z", T"] be a valuation equilibrium, and suppose
that [(Xi), (Yj),z] together satisfy Xi E Xi(z) and Ui(Xi,Z) ~ Ui(xi,Z") for
all i, with strict inequality for at least one agent, and Yj E 1-j(z). Then
local non-satiation and the definition of valuation equilibrium imply that
m n m
Lp*xi > pOw + L [p*y; + O"j(P*,z*)] + LTi(P*'z)
i=1 j=1 i=1
and also that 2:.";=1 p*YJ + 2:.";=1 O"j(P*, Z*) ~ 2:.";=1 p"Yj + 2:.";=1 O"j(p" ,z).
These inequalities imply that
m n n m
But T" is balanced by assumption, so [2:.";=1 O"j(P*, z)+ 2:.::1 Ti(P", z)] = O.
Hence 2:.::1P"Xi > P*W+2:.";=1P*Yj, which implies that [(Xi),(Yj),z]
cannot be a feasible allocation satisfying 2:.::1 Xi::; W+ 2:.";=1 Yj. It follows
that no feasible allocation can be Pareto superior. •
Observe that an allocation may fail to be optimal if we drop balancedness.
Indeed it is easy to produce a tax system that induces a waste of resources
in equilibrium and an even greater waste out of equilibrium (e.g., the tax
system rewards a firm which destroys part of the initial endowments).
207
2The scalars eij correspond here to a distribution of profits determined by the sepa-
ration argument.
209
for all i E S. Summing over S and making use of the non-transfer condition
one gets
n n
> ~)P*Wi+ I:Oijp*Yj+ I : OijO'j(P*, z*) + Ti(P*,Z')]
iES j=1 j=1
n n
> 2:[P*Wi + 2: OijP*yj + 2: OijO'j(p', z') + Ti(P*, z')]
iES j=1 j=1
n
2:[P*Wi + 2: 0ijp*yj].
iES j=1
From (i) above it follows that both weak inequalities are equalities. Hence
[1] also holds with equality for all i E S. Because Q* is a valuation equi-
librium, ui(xi, z*) 2: Ui(X~, z') for all i E S. So S cannot be a blocking
coalition. Hence, the resulting allocation is in the core. •
4 Some examples
This section presents some specific models that can be interpreted as par-
ticular cases of the setting in sections 2 and 3. This illustrates how our
model is flexible enough to encompass several different situations. Interest-
ingly enough the existence of equilibrium is also guaranteed in all of these
particular cases.
In order to facilitate the discussion, let us denote by ro
the (degenerate)
balanced tax system given by O'j(p, z) = Ti(p, z) = 0, for all i,j, every
(p, z) in ~~ x Z. Consider the following assumption:
Assumption 3 For all z E Z one has
3See Corch6n (1994) for an analysis of the dual case in which prices are taken as the
public environment, and qualities take the role of balancing the markets.
212
of the model) is a valuation equilibrium Q* = [p*, (xi), (Yj), s*, q*, T*]
Wl·th L."i=l ~m Wi + ~n
~m xi* -_ L."i=l L."j=l Yj* - c (*
P ,s *) and - L."i=l
~m Ti (*
P ,z*)_ -
p*c(p*, s*).
Assumption 5 Capital goods are pure inputs, so they do not enter con-
sumers' preferences or feasible sets, and also a ?: a' implies B(a') C B(a) ..
References
Arrow, K.J. & Debreu, G. (1954), Existence of Equilibrium for a Compet-
itive Economy, Econometrica, 22 : 265-290.
Bergstrom, T.C. (1970), A "Scandinavian Consensus" Solution for Effi-
cient Income Distribution among Nonmalevolent Consumers, Journal of
Economic Theory, 2 : 383-398.
CorcMn, L. (1994), Fixed Prices and QUality Signals, Mathematical Social
Sciences, 27 : 49-58.
Debreu, G. (1952), A Social Equilibrium Existence Theorem, Proceedings
of the National Academy of Sciences, 38 : 886-893.
Diamantaras, D. & Gilles. R.P. (1996), The Pure Theory of Public Goods:
Efficiency, Decentralization and the Core, International Economic Re-
view, 37 : 851-860.
Diamantaras, D. & Wilkie, S. (1994), A Generalization of Kaneko's Ratio
Equilibrium to Economies with Private and Public Goods, Journal of
Economic Theory, 62 : 499-512.
Dreze, J.H. & Hagen, K. (1978), Choice of Product Quality: Equilibrium
and Efficiency, Econometrica, 46 : 493-513.
Gines, M. (1996), Core Selections in Economies with Increasing Returns
and Public Goods, mimeo, University of Alicante.
Hammond, P. & Villar, A. (1998), Efficiency with Nonconvexities: Extend-
ing the "Scandinavian Consensus" Approaches, The Scandinavian Jour-
nal of Economics, vol. 100, forthcoming.
214
1 Introduction
Consider an allocation problem in which a group of agents has to perform
a common task that requires a given number of hours labour time, that
are paid at a given rate. Agents' supply of labour results from maximizing
their utility functions, that depends on income and leisure. Under standard
assumptions, each individual has an ideal amount of work to be performed,
called her peak, and having to work more or less decreases her utility. The
problem under consideration is that of devising a procedure to allocate
the task among the agents, in the understanding that when the aggregate
supply of labour differs from the amount of labour time required, agents
must be rationed.
This is an example of a family of problems consisting of the allocation of a
fixed amount of a divisible good among a group of agents whose preferences
are single-peaked [see Sprumont (1991), Ching (1994), Thomson (1994 a,b),
(1995), de Frutos and Mass6 (1995), Barbera, Jackson and Neme (1997),
Otten et al (1996), Dagan (1996), Herrero & Villar (1998a,b)]. The uni-
form rule is the best known procedure to solve these problems. This rule
recommends sharing the duties equally, as long as this is compatible with
'Thanks are due to William Thomson for his comments and suggestions. Finan-
cial support from the Direcci6n General de Investigaci6n Cientifica y Tecnica, under
project PB97-0120, and from the European Comission, FMRX-CT96-0055 are grate-
fully acknowledged.
216
2 The model
We follow Thomson (1995). Let N be an infinite population of potential
agents. For an agent i E N, let ~ be a preference relation over ~+, and
let ~ the associated strict preference. The preference relation is single-
peaked if there exists a number, p( Ri) E ~+, such that for all x, x' E ~+,
[(x' < x ~ p(Ri)) or (p(Ri) ~ x < x')] ===> x Pi x'.
Let § denote the family of single-peaked preference relations over ~+. The
preferences of all agents in N are drawn from §. Let N be the class of all
(non-empty) finite subsets of N. Given N EN, let §N denote the Cartesian
product of 1Nl copies of §, indexed by the members of N. Similarly, ~~
stands for the Cartesian product of 1Nl copies of ~+.
Given N EN, let R = (~)iEN E §N represent a profile of preferences for
N, and T E ~+ the total amount of time required to perform some task. A
problem is a pair e = (R, T). Let lEN be the family of all problems for N,
and let lE = UN lEN. A feasible allocation for e = (R, T) E lEN is a point
x E ~~ such that LXi = T. Let X (e) be the set of feasible allocations of
e.
A rule is a mapping F : lE ~ U~N, such that for all e = (R, T) E lE N ,
F(e) is a feasible allocation for e. The intended interpretation of F(e) is
that it is a desirable way of distributing T.
min{p(Ri) , A} if T ~ LP(~),
Ui (e) = {
max{p(Ri), A} otherwise.
where A is chosen so that U(e) E X(e).
Equal-distance rule D : For all N E N, all e = (R, T) E lE N, and all
i EN,
Di(e) = max{O, p(~) + A},
218
The equal-distance rule selects that point in the feasible set that is closest
(according to the Euclidean distance) to the vector of preferred contribu-
tions (p(Ri))N. Note that if LP(~) :::; T, >. > 0, and otherwise>. < O. The
equal-distance rule makes the amounts of time as equal as possible from
their peaks, subject to the condition that all are assigned a nonnegative
share of the required effort.
Even rule E: For all N EN, all e = (R,T) E EN, and all i E N,
The even rule coincides with the uniform rule when T :::; LP(Ri) and
with the equal-distance rule otherwise. Hence it allows differences in the
rationing experienced by the agents when the required effort is smaller
than the overall supply, whereas it divides the undesired aggregate effort
equally.
3 Properties
Next, we consider several properties a rule may fulfill. The first property
is a way of formulating the idea of impartiality.
Equal treatment of equals: For all N EN, all e = (R, T) E EN, and all
= R j , then Fi(e) = Fj(e).
i,j E N, if Ri
Consistency: For all N E N, all e = (R, T) E JE,N, all Q c N, and for all
i E Q, we have: Fi(e) = Fi(e~).
Ar-truncation: For all N E N, all T E lR+, and all R, R' E §N, if for all
i E N, Ri and R~ coincide on [ar{e),+oo), then, F{R,T) = F{R',T).
4 Characterization
Consider the following lemmata:
Proof. Given e = (R, T) E EN, let S(e) = {i EN: P{Ri) < ar(e)}.
Suppose that ar(e) > 0 (otherwise the result is obviously true). Thus,
LP{~) > T.
Let e' = (R',T) E EN, where for all i E N\S(e), R: = ~; for all
i E S(e), p(RD = O. Then, for all i E N, and for all x, Y E [ar(e), +00),
we have xRiy ~ xR~y. By efficiency, for all i E S(e), Fi(e') = 0, and by
ar-truncation, for all i E S{e), Fi{e) = o.•
Lemma 4 If a rule satisfies efficiency, equal treatment of equals, consis-
tency, agenda-independence, and ar-truncation. then for all N EN, all
(R,T) E EN, and alli,j EN, ifp{Ri) =p{Rj), then Fi{R,T) = Fj{R,T).
Proof. Let us prove the result by way of contradiction. Then, there exist
N E N, e = (R, T) E EN, and i,j E N, with P{Ri) = p{Rj) = p such
that Fi(R, T) =f Fj (R, T). First, note that T < LP(~). Without loss of
generality, assume that a = Fi(R, T) < Fj(R, T) = b, and let Tl = a + b.
Let e~,j} = (R, T 1 ) E E{i,j}. By consistency, Fi(e~,j}) = a < b =
Fj(e~,j}).
Let R~ = (Ja(~) and Rj = (Jb(Rj). Then, p(Ri) = p-a > p-b = p(Rj).
Let 8 > 0 such that p - a - 8> p - b. Let (R,Tl + 8), (R,T1 ), (R',8) E
E{i,j}. By agenda-independence, F(R, Tl + 8) = F(R, T 1 ) + F(R', 8). Let
e' = (R',8) E E{i,j}, and note that p(Rj) = p - b < ar(e'). By Lemma
3, Fj(e') = 0, and thus Fi(e') = 8. Consequently, for all 8 < b - a, and
all (R, Tl + 8) E E{i,j}, Fi(R, Tl + 8) = a + 8 and Fj (R, Tl + 8) = b. By
Lemma 2, and for 8 = b - a, Fj(R,2b) = b. Thus, for all 0 < € ~ b - a,
Fj(R, 2b - €) = b.
221
Theorem 5 The equal distance rule is the only rule satisfying efficiency,
equal treatment of equals, consistency, agenda-independence, and ar-trun-
cation.
'
Consequently, for all i E Sk(e), Fi(e) = ~ + 8:+-8;:~1 for all i E Sk-l(e),
Fi(e) = BkT+S;:~l and otherwise, Fi(e) = 0, and thus, F(e) = D(e).
We can follow this procedure until all tasks smaller than or equal to
LP(Ri) are covered . •
( )= { t
Fj R,T
if j E H(e),
o otherwise.
(3) Consistency: Select a particular agent i E N. Let F be the following
rule: If i E N, 1Nl = 3, maxN p(Rt) > p(~) > minN p(Rt), LP(Rt} > T,
and T ~ p(~) - minNP(Rt ), then Fi(R,T) = T, and for all t E N\{i},
Ft(R,T) = O. F(e) = D(e) in any other case.
(4) Agenda-Independence: For all N EN, all e = (R, T), and all j EN, let
F be the rule
Uj (R, T) if T > LP(~),
Fj(RN,T) = {
Dj (R,T) ifT:SLP(~).
(5) ar-truncation: The even rule.
Remark 1 In dealing with the relationship between the equal-distance rule
and the even rule, see Herrero and Villar (1998a, Theorem 1), where
the even rule is characterized as the only rule satisfying efficiency, equal
treatment of equals, agenda-independence, and truncation. An alternative
characterization of the equal-distance rule appears in Herrero and Villar
(1998b).
References
Barbera, S., Jackson, M. and Neme, A. (1997), Strategy Proof Allotment
Rules, Games and Economics Behavior 18 : 1-21.
Ching, S. (1994), An Alternative Characterization of the Uniform Rule,
Social Choice and Welfare, 11 : 131-136.
Dagan, N. (1996), A Note on Thomson's Characterizations of the Uniform
Rule, Journal of Economic Theory, 69 : 255-261.
223
de Frutos, M.A. and Mass6, J. (1995), More on the Uniform Rule: Equality
and Consistency, mimeo, Universitat Autonoma de Barcelona.
Herrero, C. and Villar, A. (1998a), Agenda Independence in Allocation
Problems with Single-Peaked Preferences, Social Choice and Welfare,
forthcoming.
Herrero, C. and Villar, A. (1998b), An Alternative Characterization of the
Equal-Distance Rule in Allocation Problems with Single-Peaked Prefer-
ences, mimeo, Universidad de Alicante.
Otten, G.J., Peters, H. and Volij, O. (1996), Two Characterizations of
the Uniform Rule for Division Problems with Single-Peaked Preferences,
Economic Theory, 7 : 291-306.
Sprumont, Y. (1991), The Division Problem with Single-Peaked Prefer-
ences: A Characterization of the Uniform Allocation Rule, Econometrica,
59 : 509-519.
Thomson, W. (1994a), Consistent Solutions to the Problem of Fair Division
when Preferences are Single-Peaked, Journal of Economic Theory, 63 :
219-245.
Thomson, W. (1994b), Resource-Monotonic Solutions to the Problem of
Fair Division when Preferences are Single-Peaked, Social Choice and Wel-
fare, 11 : 205-223.
Thomson, W. (1995), Population Monotonic Solutions to the Problem of
Fair Division when Preferences are Single-Peaked, Economic Theory, 5 :
229-246.
The existence of the satisfactory point *
Adam Idzik
1 Introduction
Woodall (1980) proved the existence of the satisfactory point and then ap-
plied this result (Theorem 4) to show the existence of the fair division of
a cake. Also Kulpa (1994) proved the existence of a stable-like point and
applied his theorem (Lemma 1) to show the existence of rational divisions
of bounded Lebesgue measurable sets in Euclidean spaces. Some general-
izations of Woodall's results and Kulpa's results were presented by Idzik
(1995) and Ichiishi and Idzik (1996).
In this paper we apply some ideas of Ky Fan (1972, Theorem 3) derived
from his fundamental theorem on coincidence (Theorems 2.0 - 2.2) and
extend aforementioned theorems of Woodall and Kulpa to arbitrary conti-
nous functions and present very short proofs of them (original Woodall's
proof is four pages long!).
Next we apply our theorems to show the existence of the core payoff in the
matching game studied by Alkan and Gale (1990) for arbitrary continuous
functions (not only decreasing). We also derive, as a corollary, Bapat's
permutation-based generalization (1989) of Brouwer's fixed point theorem.
'The research reported in this paper is supported by the KBN Grant No. 2 P03A
017 11.
226
the set K will be fixed throughout this section. A point v E aft' f). N is
uniquely expressed as an affine combination of the vertices of f). N, V =
Lj EN bj ej, bj E R, Lj EN bj = 1. The support of v is the set of j for which
bj =I- 0, and is denoted by supp v.
Theorem 2.0 (Ichiishi and Idzik (1996, Corollary 2.2A» Let X
be a nonempty compact convex subset of RN. Let f : X -+ p(RN) and
9 : X -+ P(X) be upper semicontinuous functions such that both f(x) and
g(x) are nonempty compact convex sets for each x E X. Let f transform
every face F of X in such a way that for each x E F, f(x) n aft' F =I- 0
(which would be the case, e.g., if f transforms every face F of X into
aft' F). Then f and g have a coincidence. In particular, X C f(X), and f
227
n
iEN
C;Ci) #0 and Usupp 7r(i) = N.
iEN
n
iEN
C;Ci) #0 and Usupp 7r(i) = N.
iEN
For the case K C fj" N, the type of closed covers considered in Theorem
2.2 was studied by Alexandrov and Pasynkov (1957) and by Scarf (1967).
Woodall (1980) proved the following
Theorem 2.3 (Woodall (1980, Theorem 4» Let fij : fj"N ---+ lR+ be
continuous functions such that fij(fj"N\{j}) = {O} for i,j EN. Then there
is a point x E fj"N (which we shall call a satisfactory point) and a bijection
7r : N ---+ N such that
(2.4) fi7rCi)(x) ~ fij(x) for i,j E N.
Observe that a more general theorem is true:
Theorem 2.5 Let fij : fj"N ---+ lR be continuous functions such that
fij(fj"N\{j}) = {O} for i,j EN and
(2.6) maXjEN fij(x) > 0 for x E 8/).N and i E N.
fij X +;;:
- (X) =fij () Xj (
X="
L...JXjejEl1 N ,mEN,jEN)
jEN
and apply a limit procedure with m -+ 00).
First, let us consider the case tij(X) > 0 for x E l1N and i,j E N. For
the sets
we apply Theorem 2.1 and we are done. We get the general case by taking
- ()
ti" x = ...;.::.........,;--
tij(X)+€ for any € > 0, x E!l.N and (i,j EN),
3 1 +n€
and applying the limit procedure with € --+ O. 0
Theorem 2.14 Let gi : !l.N --+ Rand fij : !l.N --+ R be continuous func-
tions such that fij(!l.N\{j}) = {O} for i,j EN and
(2.15) gi(X) ~ 0 for x E 8!l.N and gi(X) ~ L,jEN fij(X)
for X E!l.N (i EN).
Then for any continuous functions ti : !l.N --+ !l.N;ti = {tij}jEN,i E N,
there is a point x E !l.N and a permutation 11" : N --+ N such that
(2.16) gi(X)t i7r (i)(X) ~ fi7r(i)(X) for i E N.
Proof. Without loss of generality we may assume that gi(X) >0 for x E
8!l.N (we can always consider
Also we assume that one of the following cases holds for each i,j E N:
(3.1) fij(O) = 0 and fij(X) > 0 for 0 < x ~ 1,
(3.2) fij(l) = 0 and fij(X) > 0 for 0 ~ x< 1,
(3.3) fij(O) = C> 0 and hj{x) < C for 0 < x ~ 1,
(3.4) fij(l) = C> 0 and fij(X) < C for 0 ~ x < 1.
The cases (3.2) - (3.4) reduce to the case (3.1) by taking x = 1 - x and
lij(x) = C - fij(X), respectively. The matching 1r is a partition of the set
MUN into pairs (i, j), i E M, j E N and can be considered as a permutation
1r of the set N. A feasible payoff is a pair of vectors x = {xihEM, Y =
{Yj}jEN (x,y E RN) such that
N
A core payoff of the matching game is a vector x = {XdiEN satisfying
(3.7). Observe that our definition of the core payoff differs from that of
Alkan and Gale (1990).
Theorem 3.8 There is a core payoff.
Proof. Define lij : ~ N ---4 R+ by
-
fij(X) = hj(xj) fen' X = L.J
~
Xjej E ~ N (i,j EN)
jEN
References
Alexandrov, P. and B. Pasynkov, 1957, Elementary proof of the essentiality
of the identical mapping of a simplex (in Russian), Uspekhi Matematicesk-
ikh Nauk 12, 175-179.
Alkan, A. and D. Gale, 1990, The core of the matching game, Games and
Economic Behavior 2, 203-212.
Bapat, R.B., 1989, A constructive proof of a permutation-based general-
ization of Sperner's lemma, Mathematical Programming 44, 113-120.
Fan, Ky, 1972, A Minimax inequality and applications, in: O. Shisha, ed.,
Inequalities Ill, Proceedings of the Third Symposium on Inequalities held
at the University of California, Los Angeles, September 1-9, 1969 (Aca-
demic Press, New York) 103-113.
Gale, D., 1984, Equilibrium in a discrete exchange economy with money,
International Journal of Game Theory 13, 61-64.
Idzik, A., 1995, Optimal divisions of the unit interval, Game Theory and
Applications, International Conference in Honor of Robert J. Aumann
on his 65th Birthday, Jerusalem.
Ichiishi, T. and A. Idzik, 1990, Theorems on closed coverings of a simplex
and their applications to cooperative game theory, Journal of Mathemat-
ical Analysis and Applications 146, 259-270.
Ichiishi, T. and A. Idzik, 1991, Closed covers of compact convex polyhedra,
International Journal of Game Theory 20, 161-169.
Ichiishi, T. and A. Idzik, 1996, Equitable allocation of divisible goods and
market allocation of indivisible goods, ICS PAS Reports, Warsaw.
Kulpa, W., 1994, Sandwich type theorems, Acta Universitatis Carolinae -
Mathematica et Physica 35, 45-50.
Quinzii, M., 1984, Core and competitive equilibria with indivisibilities, In-
ternational Journal of Game Theory 13, 41-60.
Scarf, H., 1967, The approximation of fixed-points of a continuous map-
pings, SIAM Journal of Applied Mathematics 15, 1328-1342.
Shapley, L. S., 1973, On balanced games without side payments, in: T.
C. Hu and S. M. Robinson, eds., Mathematical Programming, (Academic
Press, New York) 261-290.
Shapley, L. S. and H. Scarf, 1974, On cores and indivisibility, Journal of
Mathematical Economics 1, 23-37.
Thomson, W., 1995, The replacement principle in economies with indivis-
ible goods, Rochester Center for Economic Research Working Paper No.
403.
Woodall, D.R., 1980, Dividing a cake fairly, Journal of Mathematical Analy-
sis and Applications 78, 233-247.
Optimal entry and the marginal contribution
of a player
K unio Kawamata
1 Introduction
The optimal 1 number of firms in an industry could be either one, two, or
many, depending on the market structure. The main purpose of this paper
is to introduce the concept of "the marginal contribution of a player( a firm
in the sequel)" and use it to derive conditions for optimal entry in various
industrial situations. We consider an economy with a finite number of goods
but with a continuum of potential firms. The "marginal contribution of a
firm" is defined roughly as (the limit, as the measure of the firm approaches
zero, of) the difference between the maximal welfare that the economy can
attain with the firm and without it. It turns out that, when there are
fixed costs, not all firms should produce positive outputs even if they have
the same production technology. Under perfect competition, the marginal
contribution of a firm coincides with the profit of the firm, and so the
optimal condition for entry is that the marginal firms should receive zero
profit.
Our concept of the "marginal contribution of a firm" is closely related to
the idea which welfare economists, e.g., Kahn (1935) and Hicks (1939), had
in mind in discussing optimal industrial structure or the ''total condition-
s" for optimality. The game theoretic concept of Shapley value (see, e.g.,
Shapley (1953), Aumann and Shapley (1971)) is also related to the present
concept. But whereas the Shapley value is the "expected payoff" of the
game when all agents are arranged in random order, in our definition, firms
are ordered according to their productivity where productivity is defined
in a natural way. Using this concept we derive conditions for optimal en-
try which were obtained verbally or in a partial equilibrium framework by
Kahn (1935), Hicks (1939) and obtained in a general equilibrium framework
by Negishi (1962, 1972).2 See also Makowski (1980) and Ostroy (1980) for
related discussions.
Our analysis stands in contrast with previous studies in that the set of
agents are contained in a non-atomic measure space. The same approach
is also useful in analyzing the problems of the monopolistic competition
market, as we will show in Section 4. We establish a version of excess entry
theorem which conveys a message similar to the one Suzumura and Kiyono
(1987) established for the oligopolistic market. This approach, which follows
the procedure of Aumann (1964, 1975), has the advantage that the marginal
contribution of a firm can unambiguously be expressed in terms of the prices
and the allocation of the economy, and the convexity assumptions on prefer
ences and technologies can be relaxed to a certain extent.
2 A preliminary example
In order to clarify the nature of the problem and motivate the analysis in
the following sections, we first present a simple example and derive opti-
mal conditions for entry in this case. In this section all firms are treated
discretely, and the analysis is informal for reasons that will be explained
below.
Suppose that the welfare of an economy can be expressed by the utility
function
u = x·(a -I) (1)
of a representative consumer, where x is the amount of the consumption
good available to him, 1 is the amount of labor he supplies and a is a
positive number representing the maximal amount of labor that he can
2Negishi's theorems state that (i) if it is known that positive profit is impossible for
the new firm under prices ruling before entry, entry should not be made and that (ii)
if the new firm is running without a loss after entry, then the firm should have entered
after all (see Negishi (1972)). The last statement needs a careful interpretation if the
incumbent firms are not the most desirable from the welfare viewpoint.
235
Hence, in view of (1), (3) and (4), we have the following optimal production
allocation:
X;(J) = Vlj - bj (j E J) (6)
l;(J) = (a- Lbi)/3n+bi (j E J), (7)
and the corresponding optimal utility
(8)
where the summations are over J , and n is the number of firms producing
positive outputs, i.e., the cardinality of J. (The above results show that J
must be chosen so that a - L bj > 0.)
In the next step we allow J to vary, and choose x; (J) and l; (J) so as to
maximize u*(J) . To simplify the analysis we shall suppose that the firms
are arranged so that
(9)
236
This implies that the production function of the j-th firm is uniformly
above that of the k-th firm for k > j. Thus, if the k-th firm is producing
positive outputs at the social optimum, then so should the j-th firm, for any
j < k. Hence in order to choose the optimal set of firms, J, it is enough
to determine the optimal number, n, of firms that will produce positive
output.
In the characteristic function form game (u", J) with the characteristic
function u" and the player set J, the marginalworthof aplayer j to coalition
S (S C J) is defined by
duO /dn
(10)
Qu*/8l'
Since, by (5), aUl;' s are equal in this case, in view of (1), (3), (4) and (7),
we obtain
(13)
and
Ou"
QX = 2(a - nb)/3. (14)
Now if the price vector (-u;jui, 1) is used to evaluate the profit 7r of the
firm, we have, from (6), (7), (13), and (14)
7r = u; * -l·*
--x·
ui J J
a-4nb
= 3n
(16)
Comparing (15) with (16) we may conclude that the marginal contribution
of the firm is the profit of the firm.
The present analysis, which dealt with the case of a finite number of
firms, is somewhat informal because the marginal contribution was not
defined accurately. In the following sections, we shall rigorously establish
similar results in more general settings without restricting ourselves to the
special production functions and the utility function of this model.
Remarks
(a) In the special case where bj = b > 0 for all j, (12) shows that the
optimal number of the firms in the industry is given by aj 4b, if it is an
integer. This implies that not all firms should stay in the industry even if
they have the same technology.
(b) If, moreover, bj = 0 for all j, then u* [n] is an increasing function of
n, and there is no optimal number of firms for the economy.
(c) That the marginal worth is an increasing function with respect to
the coalition size is a characteristic feature of the convex game which has
been studied by Shapley (1971), Ichiishi (1981) and Topkis (1987), among
others. Remark(a) shows that the present model contains an example of a
non-convex game.
(d) As a model of entry in a free market, the discrete model must rely
seriously on the assumption that entry occurs in the order of superiority
in technology as expressed in (9). It is easy to construct an example in
which (i) a finite number of firms are making positive profits and that (ii)
a technologically superior firm incurs a loss should it enter the market.
To see this, slightly increase the parameter bi of an incumbent firm in the
model of Remark (a).
3This usually means the economic environment with convex preferences and convex
production technologies and with no externalities. However the term "classical" is used
here in a somewhat broader sense than usual. Firms may require a fixed amount of
inputs when they produce a positive amount of outputs although no inputs are required
when no outputs are produced. Hence the average cost curve is decreasing when output
levels are small.
239
where Xi (t) is the density of production of good i and li (t) (of which bi (t) >
o is a fixed amount) is the density of labor input for firm t in industry i. This
means that given li(t)dt oflabour the firm can produce fi(li(t)-bi(t), t)dt of
the product if li(t) > bi(t). (See, e.g., Aumann (1975) or Aumann-Shapley
(1971) for a related way of representing agents.) We make
Assumption A.2 For each t, fi(" t) is increasing, strictly concave,4 and
twice continuously differentiable. For each X, fi(x,,) is continuous except
possibly at a finite number of points, (i = 1,2).
The present model can be generalized to the case of any finite number of
goods. Model B allows the existence of intermediate goods. Let us denote
by 7i E 7i the set of firms actually producing positive outputs in industry
i(i = 1, 2). To simplify the analysis we make
Assumption A.a 7i is a disjoint union of a finite number of intervals
= 1, ... , ik)in Ti .
Tik (k
We may suppose (as was explained in Section 2) that all firms in Ti
are actually producing positive outputs. In the sequel we shall often write,
e.g., ITf instead of IT
fdt. The demands for goods are satisfied if
Xi ~ f (i = 1,2)
iT; Xi(t) (19)
and
(20)
Since u(·) is increasing, when finding the optimum, we may replace the
inequalities in (19) and (20) by equalities. And if we extend the definitions
of li(t) and Xi(t) , by setting them equal to zero outside Ti , we may replace
the domain of integration, 7i, by T = Tt U T2. Thus for each of Tt and T2,
we formulate the problem (PT) as
(PT) Maximize
4We will argue below that this assumption is not practically important as is the case
in the discrete economy.
240
subject to
(22)
The existence of the maximum and some other related properties will
be discussed in Section 5 in a more general framework, in which we will
assume that Xi(t) and li(t) are Borel measurable functions. For the present
we assume that the maximum exists and impose the following conditions
on admissible functions.
du
da
(24)
Noticing that au/axi and au/Ol are independent of t, we have from (23),
and (24),
(25)
241
This means that the marginal contribution of firm a (the left hand side) is
equal to the profit of the firm in terms of the efficiency price vector,
auau
p= (--/-,1) (26)
aXi 8l
(the right hand side).
Model B
Let n be the number of goods in the economy and, for each i E N =
n
{1, 2, ... , n}, let be a bounded interval on the real line R. We consider
Ti to be the set of all potential firms in industry i. We assume that Ti
and T j are disjoint for i i j. If good i is not the product of any firm, we
take'!l to be empty. For all i,j E N with i i j, and each t E Ti let yj(t)
be the density of good j used (of which bj(t) is a fixed amount) in the
production of good i by firm t, and let Yi(t) be the density of its output.
For simplicity we assume that there are no joint outputs and we write the
firms' production functions as
whereili(t) = (yi(t), ... ,yLl(t),yt+1(t), ... ,y~(t)) and similarly for bi(t). We
make the following assumptions on the production technology.
Assumption B.l For each t, ft, t) is increasing and twice continuously
differentiable, and for each yi, fi(yi, .) is continuous except perhaps at a
finite number of points.
Assumptions must also be made on the asymptotic behavior of fi(., t),
in order to guarantee the existence of a maximum of the problem to be
formulated below. This point will be discussed in the Appendix so, for the
moment, we will not worry about the problem of existence. Let Ti C Ti
denote the set of firms producing positive outputs in industry i(i E N) and
impose
Assumption B.2 The same as Assumption A.3 in model A.
Let Ci (i = 1,2, ... , n - 1) denote the aggregate net demand for good i .
That demand will be satisfied if
Extending the definitions of yJ (t), Yi(t) and b;' (t), by defining them to be
equal to zero outside n, we may replace n in \28) by T = UTi' Now, for a
given (n) (i EN), we formulate the problem (PT) as
242
(PT) Maximize
(29)
subject to
where we set Ji(t) = ji(f/(t) - bi(t),t) . These are the familiar marginal
conditions for optimality. We next let (Ti) (i E N) vary and consider the
effects of the change on the optimal solutions of (PT). To simplify the
analysis we impose
Assumption B.4 The same as (A.5) in Model A.
With this assumption, we need only consider changes in the right end
points of the sub-intervals ns.
Differentiating (30) with respect to a ~ight end point a = tks, we have
(noticing that the optimal solutions of yf ,Yi and Pi are functions of a)
m (a ) = PkYk ()
a - '"'
L..JPiYik()
#k
a + h'"' ('"'
T iEN #i vYJ
~.~ ay]
L..JPi L..J aji(t) aa - '"'
L..J ay{)
j~i
aa dt.
(33)
243
(34)
We will assume that f is concave in the region l(t) > b(t) We make As-
sumption (A.l) and Assumption (A.2) of Section 3 applied for the single
industry case.
The profit of the industry is expressed as
where p is the price of the product in terms of the wage rate. We denote
the (inverse) demand function of the consumer as
subject to
x = h x(t)dt
First we solve the problem considering that x and T are fixed. We set
the Lagrangean of the problem as
where
f(t) = f(l(t) - b(t), t)
245
and
f3 = length of T.
From this we obtain the following Euler condition for optimality:
(P _ >/Jf(t) =1 (43)
8l
for all t. This implies that the marginal products of labor are equal for all
firms within the industry.
Next we vary x and a = ts (a right end point of a sub-interval). Assuming
that the solutions, still denoted l(·),x(·) etc., are unique and differentiable
with respect to x and a, we have
and,
>.x
Pf(a) l(a) - >.(a)f(a) + If
We note that>. > 0 since P' > O. Hence, noticing that P' is independent
of t and using (41), we have
= (50)
with respect to T where l(t) is the solutions of the problem stated above.
Consider a change in a = ts, one of the right end points of the sub-
intervals in (A.5). Differentiating (50) along the optimal solution, with
respect to a, we have
dU
da
U'(x)f(a) + £ f'(t)! dt
+l(a) + J Ol
oa dt (51)
(2P'(x) + xP"(x)).-
ox
oa
247
f"(t) . dl(t)
= {J'(t))2 da
(55)
where
(56)
Remarks
(a) Notice that if we denote the demand elasticity of the good (the recip-
rocal of the left side of (47)) bye, we have
1
S=--. (57)
e-1
Hence (54) is in accordance with the formula of Kahn ((1962) p.29), which
was obtained in a partial equilibrium framework. Notice that although he
did not assume the joint profit maximization, he did assume that the mark
up ratio is constant for all firms in the industry. As to the simplifying
assumption on which this result depends see McKenzie (1951).
(b) As an alternative interpretation of the present model, assume that
the industry is monopolized by a firm which has a continuum of potential
factories, T. Then the maximization of the profit of the monopolist can be
analyzed in exactly the same way as in the present model.
In the last interpretation, in view of (52), we have the following result:
Theorem 4a In the monopolistic market, if the firm operates its factories
until the last of them earn zero profit, the contribution is positive. Hence,
entry is excessive.
This corresponds to the content of the excess entry theorem in Suzu-
mura and Kiyono (1987), which was established for the homogeneous good
Cournot-type oligopoly model. Weizsacker(1980) analyses a heterogeneous
duopoly model with a quadratic utility function.
248
subject to
°
possible to satisfy net demand Ci + di , (i = 1,2, ... , n - 1) for some di >
(Le., (59) has solutions fji(t) 2: when each Ci is replaced by Ci + di )
°
The assumption on the sign of cis is made mainly for simplicity of ex-
position. It is very easy to cover the case where some of them are negative
(the case of primary factors of production).
In order to rule out the possibility that the production of a good will be
carried out by a negligibly small set of firms, we need a certain uniformity
assumption on the production technology. To simplify the argument we
assume that, given the set of active firms in an industry and the net final
demand for the good, there are lower bounds such that if the members of
a non-negligible set of firms are using inputs beyond any of the bounds,
then there exists a more efficient way of allocating resources within each
industry. More precisely, we make
Assumption D.3 (inefficiency of overconcentration) For each (i =
1,2, ... , n - 1) there exists ai E 1R+.- 1 (which may depend on Ci and T i )
such that if not fji(t) ~ ai for almost all t in some non-null set Si C Ti ,
there exists yet) E 1R+.- 1 such that yet) ~ ai for all Ti ,
250
and
(Q) maximize
subject to
irgi(x(t),t)dt ~ ki (i=1,2, ... ,n-1)
(60)
251
(Q) Maximize
subject to
t/i(x(t),t)dt ~1 (i = 1,2, ... ,n)
subject to
We set
and
h(c5) = inf(Po), (64)
namely, the infimum of problem Po.
252
We also set
n-1
L(x, t, 8*) = gn(x, t) + L: 8; gi (x, t), (65)
;=1
where we define x by (60) and gi(X, t) (i E N) by
References
Arrow, K.J. and F.H. Hahn (1971): General Competitive Analysis, San
Francisco: Holden-Day.
Aumann, R.J. (1964): "Markets with a Continuum of Traders," Economet-
rica, 32, 39-50.
Aumann, R.J. (1975): "Values of Markets with a Continuum of Traders,"
Econometrica, 43, 611-647.
Aumann, R.J. and M. Perles (1965): "A Variational Problem Arising in
Economics," Journal of l'vfathematical Analysis and Applications, 11,488-
503.
Aumann, R.J. and 1. Shapley (1971): Values of Non-Atomic Games,
Princeton, NJ: Princeton University Press.
Berliocchi, H. and J.M. Lasry (1973): "Integrandes normales et measures
parametrees en calcul des variations," Bulletin de la Societe Mathema-
tique de Prance, 101, 129-184.
Bishop, R. (1967): "Monopolistic Competition and Welfare Economics", in
R.E. Kuenne (ed.), Monopolistic Competition Theory: Studies ,in Impact,
251-263.
Chamberlin, E.H. (1933): The Theory of Monopolostic Competition, Cam-
bridge, MA: Harvard University Press
Debreu, G. (1959): Theory of Value New York: John Wiley and Sons.
Ekeland, 1. and R. Temam (1976): Convex Analysis and Variational Prob-
lems, Amsterdam: North-Holland.
Gelfand, 1.M. and S.V. Fomin (1963): Calculus of Variations, Englewood
Cliffs, NJ: Prentice-Hall.
Hicks, J.R. (1939): "Foundation of Welfare Economics", Economic Journal,
49, 696-71l.
Hildenbrand, W. (1974): Core and Equilibria of A Large Economy, Prince-
ton, NJ: Princeton University Press.
Ichiishi, T. (1981): "Super-modularity: Applications to Convex Games and
to the Greedy Algorithm for LP", Journal of Economic Theory, 25, 283-
286.
254
Kahn, R.F. (1935): "Some Notes on Ideal Output", Economic Journal, 45,
1-35.
Makowski, L. (1980): "Perfect Competition, the Profit Criterion, and the
Organization of Economic Activity", Journal of Economic Theory, 22,
222-242.
Meade, J.E. (1937): Economic Analysis and Policy, Oxford University
Press.
McKenzie, L.W. (1951): "Ideal Putput and the Interdependence of Firms",
Economic Journal, 61, 785-803.
Negishi, T. (1962): "Entry and Optimal Number of Firms", Metroeconom-
ica, Vol. 14, 86-96.
Negishi, T. (1972): General Equilibrium Theory and International Trade,
Amsterdam: North-Holland.
Ostroy, J.M. (1980): "The No-Surplus Condition as a Characterization of
Perfectly Competitive Equilibrium", Journal of Economic Theory, 22,
183-207.
Samuelson, P.A.(1947): Foundations of Economic Analysis, Cambridge,
MA: Harvard University Press.
Shapley, L.S. (1953): "A Value for n-Person Games," in Contribution to the
Theory of Games Vol.II, ed. by H.W. Kuhn and A.W. Tucker, Princeton,
NJ: Princeton University Press.
Shapley, L.S. (1971): "Cores of Convex Games", International Journal of
Game Theory. 1, 11-26.
Suzumura, K. and K. Kiyono (1987): "Entry Barriers and Economic Wel-
fare", Review of Economic Studies, 54, 157-167.
Topkis, D.M. (1987): "Activity Optimization Games with Complementar-
ity", European Journal of Operations Research, 28, 358-368.
van Weizsacker, C.C. (1980). "A Welfare Analysis of Barriers to Entry",
Bell Journal of Economics, 12, 399-420.
On an Edgeworth characterization of rational
expectations equilibria in atomless asset
market economies'
Leonidas C. Koutsougeras
1 Introduction
The equivalence of the core with the set of competitive equilibria in purely
competitive economies provides a basic test of the price taking hypothesis
that underlies the definition of a competitive equilibrium. If such a result
failed to be true, then the Walrasian equilibrium would lose much of its
appeal as an analytical tool. Over the years there has been an extensive
literature on this subject that has provided a variety of results under alter-
native sets of assumptions. 1 In the context of asset markets, the price taking
hypothesis seems to be a fragile one. In such a framework, it is not clear
that deviations from price taking behavior provide negligible or no bene-
fit at all. For example, the Geanakoplos-Polemarchakis [4] sub-optimality
result suggests that if coalitions have a perception of their effect on spot
prices then they can (generically) find redistributions of assets so that the
effect on spot prices is to their advantage. We feel that in a sequential
framework, such as the asset market model, the price taking hypothesis
calls for some careful consideration, which would illuminate some subtle
'On different occasions I have benefited from discussions with R. Anderson, B. Gro-
dal, H. Hailer, M. Kaneko, J-F. Mertens, H. Polemarchakis, A. Rustichini and L. Zhou. I
would like to thank all of the above individuals for their insightful comments. Certainly,
I am responsible for any remaining errors.
lSee Anderson [lJ for a classification of alternative sets of assumptions and the asso-
ciated results.
256
Besides its convenience in modeling a time consistent core notion, the use
of the f-core in the asset markets framework is appealing for conceptual
reasons as well. In that framework, spot prices and trades depend on the
distribution of activities in asset markets. Since coalitions of positive mea-
sure can affect the distribution of assets across the economy, they simply
cannot be negligible in the determination of future prices and trades. In
view of this fact, the only hope to justify price taking would be that the
effects of large coalitions on future prices and trades are not advantageous
to all their members. But this hope fails in most cases (generically), as
the constrained sub-optimality of rational expectations equilibria suggests.
Hence, we are left with the case of finite coalitions as the only alternative
to rationalize the price taking hypothesis.
Apart from its implications regarding the price taking hypothesis, our
equivalence result sheds light on the number of asset and spot markets
needed in an economy, so that coalitions can enforce any allocation in the
core of a contingent commodities economy. As one might suspect if there
were enough assets to enforce all possible future contingent deliveries then
individuals could arrange future deliveries at the beginning of time, in
such a way so that no coalition could block. In this case we would have
core allocations that correspond to a complete contingent market economy.
But how many assets are needed to achieve this? Clearly, if the span of
(real) assets with enforceable returns is at least equal to the number of
contingent commodities it would be possible to enforce any current and
future deliveries that cannot be blocked. But is this the minimal number
of assets required for this? The equivalence result that we provide here
answers this question.
We organize our approach as follows. In section two we develop the model
and the notation that we will use. In section three we introduce expectations
and we define the core of an economy with asset markets. Our main result
follows in section four and some concluding remarks in section five.
2 The model
In order to simplify the notation and the arguments, the results are devel-
oped in the context of a simple two period economy with assets which is
described as follows.
Let (A, A, JL) be a measure space where A is a Borel subset of a complete
separable metric space, denoting the set of agents. Uncertainty is described
by a finite set of states n. There are N commodity types available in each
=
state, so there are in totall N· n contingent commodities in the economy.
The consumption set of each agent is identified with ~l. Each individual
is characterized by a preference relation t,c ~l X ~l and a random initial
endowment ea E ~l. We impose the following assumptions on preferences:
2In order to avoid confusion I will use Greek characters to denote asset holdings.
3Note that functions that differ on sets of measure zero are not identified.
259
3 The core
We start building our core notion for an asset market economy by for-
malizing expectations of future trades as follows. Let .c(A,Rm) denote the
quotient space of L(A,Rm), modulo sets of measure zero, i.e., the set of
equivalence classes of functions where two functions that differ on sets of
measure zero are identified. Spot trade expectations are given by a mapping
(1)
where for each 0 E .c(A, Rm), t(. )(0) is measurable on A.
The above specification has two important implications: First, that the
spot markets operate in an anonymous way, i.e., agents with the same
characteristics are assigned the same net trade. Second, that individual
actions in asset markets may have private but not social consequences in
spot markets, i.e, the net trade assignments in spot markets depend only
on the distribution of activities in asset markets. Both of those heuristic
assumptions draw from the hypothesis of a continuum of agents.
For a given asset distribution 0 E L(A,Rm), if an individual contemplates
holding a portfolio 4J E Rm then the final commodity allocation that this
agent expects is given by ea + D", + t~ (0). Notice that there is an external
effect on the expected consumption of each individual, which is due to the
dependency of (expected) spot trades on the asset distribution.
Given our specification of expectations we may view the way individuals
evaluate alternative portfolios as follows. A given 0 E L(A, Rm), induces a
preference relation ton Rm X Rm in a natural way
(2)
This induced preference relation inherits, for each 0 E L(A,Rm), the
following properties that will be useful to us in the sequel:
• t is strictly monotone, i.e., 4J ~ 't/J and 4J =I 't/J => 4J >- 't/J, 'V 4J, 't/J E
Rm.
• t is C2 and strictly convex.
260
• t is measurable on A.
(ii) tI SeA and <P E RmISI, so that L <Pa ::; 0 and <Pa >- Oa
aES
V aE S.
(i) fAt(a)::;O
(ii) V wEn, tI TeA, and s E RNITI, s.t. LaET Sa ::; 0 and
ea + D(ja + [t;:;-w, Sal >- ea + D(ja + ta V a E T.
where [t;:;-w, Sal denotes the net trade ta with the component ta(w) re-
placed by Sa'
Remark 2 There are conditions that guarantee the non emptiness of
CJW) and of Cj(O).
We are now ready to define the core for our original economy as follows.
4The careful reader will realize that this is the definition of the I-core applied to the
augmented economy eJ(t e ).
5 As before, this is the definition of the I-core applied to the augmented economy
ej(O).
261
4 Equivalence
In this section we provide an argument in favor of the price taking hypoth-
esis in the model presented above, by proving that core allocations in the
sense of Definition 3 can be decentralized by a system of asset and spot
prices, as rational expectations equilibria.
Theorem 1 Let (B, t) E L(A, Rm) x L(A, RI) be an allocation in the m-
tional expectations core of the economy £. Then there exists a price system
(q,p) E Rm x R~ that supports (0, t) as a mtional expectations equilibrium.
Proof.
Consider the augmented economies £~W) and £j(O).
Step I. Since the induced preferences t on portfolios satisfy Properties 3.1
-3.4, Theorem 1 in [5] (pp.123) applies. In this way we can obtain q E Rm
such that
cp t O(a) => q. cp? 0 a.e.
From the feasibility of B, we have that q. Ba ~ 0 ae. Suppose now that
cp >- Ba and q. cp = o. Then by choosing .x < 1 sufficiently close to 1, so that
.xcp >- Ba, we obtain q . .xcp < q. cp = 0 which is a contradiction. Therefore,
we conclude that
cp >- Oa => q. cp > o. (3)
Step H. In each state WEn we have an Aumann type economy (except
that the consumption sets are not bounded below). The same theorem as
above applies, so we can obtain a price vector p(W) E R~ in each state
wEn so that
Step Ill. Suppose that there is a pair (cl>, s) E ~m X ~l such that for some
a E A we have that ea + Dc/> + s >- ea + Do .. + ta' By our assumptions on
preferences there is a unique hyperplane 7r E ~l through ea + Do .. + ta, so
that 7r' [ea + Dc/> + s] > 7r' [ea + Do .. +taJ, i.e., 7r' [Dc/> - Do .. + s - tal > O.
Therefore, it must be either 7r' [Dc/> - Do..] > 0 or 7r' [s - tal > o.
- If 7r' [Dc/> -- Do..] > 0 we can choose A > 0 sufficiently small, so that by
the uniqueness of 7r we obtain that ea + Do .. + ADc/>-o .. + ta >- ea + Do .. + ta'
Since the pair ((), t) is a rational expectations core allocation, we have that
It follows then that (}a+A(cI>-(}a) >- (}a. Therefore, by (3) we conclude that
q. [(}a + A(cI> - (}a)] > 0, which implies that q. cl> > 0
-Ifontheotherhand7r·(s-ta ) > Oitmustbe7r(w)·(s(w)-ta(w)) > 0
for at least one wEn. Thus, 7r' [t;;-W, ta(W)+A(S(W)-ta(w)] > 7r·t a for each
A > O.It followsthenthat7r·(e a +Do .. +[t;;-W,ta (w)+A(s(w)-t a (w))]) > 7r'
(ea +Do .. +ta)' Using the uniqueness of 7r we have that for A sufficiently close
to zero it must be ea + Do .. + [t;;-W, ta(w) +A(S(W) -ta(w))] >- ea + Do .. +ta'
It follows from (4) that p(w)· [ta(w) + A(S(W) - ta(w))] > 0 which implies
that p(w) . s(w) > O.
Therefore, we conclude that for each a E A,
ea + Dc/> + s >- ea + Do .. + ta ~
5 Concluding remarks
In this paper we have proved an equivalence result that supports the price
taking hypothesis in GEl economies with a large number of agents. As
it is always the case, the equivalence of competitive equilibria with the
core reflects the premises of the core notion employed in the argument.
In developing our core notion we employed three premises: First, we in-
voked the usual rational expectations hypothesis, namely that individuals
can accurately predict future activities by observing current activities. This
hypothesis is natural since we wish to capture a rational expectations envi-
ronment. Second, we postulated that individuals do not believe that their
current activities can affect future (expected) trades. We do not regard this
hypothesis as unreasonable because in the context of an atomless economy
it follows from the previous hypothesis: future (expected) equilibrium ac-
tivities should depend on the distribution of current activities. Third, we
had to resort to the hypothesis that only 'small' coalitions can form at
any date. It should be emphasized that without this hypothesis the first
one does not make sense simply because there is no way to define rational
expectations. It is for this reason that we appealed to the f -core, a con-
struct which is based on the idea of 'small' coalitions, in order to develop
a time consistent core notion. As a consequence, our support of the price
taking hypothesis in GEl economies is conditional on whether or not large
coalitions are possible to form.
Apart from the problems in defining a time consistent core notion, the
size of blocking coalitions is crucial in the GEl context for yet another rea-
son. The effect of coalitions of positive measure on spot trades (or spot mar-
ket clearing prices) cannot be negligible. Furthermore, the sub-optimality
results in the GEl literature suggest that the grand coalition can affect
spot prices in a way that, generically, effects on future prices are to their
advantage. Therefore, if large coalitions (i.e., coalitions of positive mea-
sure) are indeed possible to form then we do not see how the price taking
hypothesis can be justified in this model. In conclusion, unless there is a
convincing reason to believe that only small coalitions can form, the price
taking hypothesis in GEl economies remains, to us, a delicate one.
Given that core equivalence is a necessary test of the price taking behav-
7Notice that this argument hinges on the equivalence result! In economies with a finite
number of agents, core allocations are not competitive in general. Thus, the argument is
invalid. In finite economies we are not aware of what is the minimum number of assets
needed for this equivalence to hold.
264
References
[1] Anderson, R (1991). "The Core in Perfectly Competitive Economies",
in Handbook of Game Theory, Vol.1, RJ. Aumann & S. Hart (eds) ,
Elsevier Science Publishers B.V., 1992.
[2] Debreu, G. & H. Scarf (1963). "A Limit Theorem on the Core of an
Economy", International Economic Review, 4, 236-246.
[3] Gale, D. (1978). "The Core of a Monetary Economy without Trust",
Journal of Economic Theory, 19, 456-49l.
[4] Geanakoplos, J. & H.M. Polemarchakis (1986). "Existence, Regularity
and Constrained Sub-optimality of Competitive Allocations when Mar-
kets are Incomplete", in Uncertainty, Information and Communication,
Essays in Honour of Kenneth Arrow, W.P. Heller, RM. Ross & D.A.
Starrett, eds., 3, Cambridge University Press, Cambridge.
[5] Hammond, P., M. Kaneko & M.H. Wooders (1989). "Continuum
Economies with Finite Coalitions: Core, Equilibria and Widespread Ex-
ternalities", Journal of Economic Theory, 44, 113-134.
[6] Honkapohja, S. (1977). "Money and the Core of a Sequence Economy
with Transactions Costs", European Economic Review, 10, 241-25l.
[7] Koutsougeras, L.C. (1995). "A Two Stage Core with Applications to
Asset Markets and Differential Information" Economies, Core Discus-
sion Paper No 9525.
[8] Koutsougeras, L.C & W.J. Shafer (1993). "The Rational Expectations
Core", manuscript University of Illinois.
[9] Magill, M. & W.J. Shafer (1991). "Incomplete Markets", in Handbook
of Mathematical Economics, W. Hildenbrand and H. Sonnenschein eds.,
IV, Elsevier Science Publishers B.V.
[10] Magill, M. & W.J. Shafer (1991). "Generically Complete Real Asset
Structures", Journal of Mathematical Economics, 19, 167-194.
[11] Mas-Collel, A. (1985). "The Theory of General Economic Equilibrium.
A Differentiable Approach", Cambridge University Press.
[12] Radner, R (1972). "Existence of Equilibrium Plans, Prices and Price
Expectations in a Sequence of Markets", Econometrica, 40,289-303.
[13] Repullo, R (1988). "The Core of an Economy with Transaction Costs" ,
Review of Economic Studies, LV, 447-458.
A characterization of the equal income
market equilibrium choice correspondence
based on average envy freeness'
Sombed Lahiri
1 Introduction
In problems of fair division of a given bundle of resources, amongst a finite
number of agents, individual rationality from equal division plays a signif-
icant role. In a society, where all resources are socially owned, one cannot
argue in terms of equal ownership of the social endowment. One normally
takes the position that each agent has the right to veto any allocation,
which leaves him/her worse than equal division. Based on this premise,
individual rationality from equal division has been proposed as a minimal
requirement of distributive justice.
In Thomson (1982), we find an equity criterion called average envy-
freeness, which in the context of economies with convex preferences, implies
individual rationality from equal division. Average envy-freeness says that
no agent finds the average consumption of the other agents, superior to
his/her own consumption. This concept has been developed in the Foley
(1967) tradition of an envy-free allocation: no agent should find his/her
consumption inferior to the consumption of any other agent. We show in
*1 would like to thank Prof. Ahmet Alkan, for suggesting improvements, which have
made this paper more readable. The revision of this paper was undertaken while I was
visiting the Economic Research Unit, Indian Statistical Institute, Calcutta. I would like
to thank Satya Chakravarty and Diganta Mukherjee for suggestions and Rajyashree
Khushu-Lahiri for logistic suport, which made the revision possible.
266
this paper (the not too difficult result) that average envy-freeness does not
automatically imply individual rationality from equal division.
A solution concept which recurs with seeming regularity in the literature
of fair division is the equal income market equilibrium solution concept.
In a variable population framework Thomson (1988) provides an axiomatic
characterization, using the axiom of consistency. Consistency basically says
that the departure of some agents with their allocated consumption, should
not affect the consumption of the remaining agents, provided they operate
the same distribution mechanism as before. Lahiri (1997a, 1997b) uses this
same axiom to characterize the equal income market equilibrium choice
correspondence in convex and non-convex environments. Our main result
reported in this paper is similar to a Lahiri (1997b) result, although it
may not extend to the non-convex economies considered there. It is thus a
modest generalization of the Thomson (1988) result. We use consistency,
replication invariance, efficiency and average envy-freeness to show that if
a solution satisfies these properties, it must consist of equal income market
equilibrium allocations. Subsequently we drop consistency and arrive at
yet another characterization of subsolutions of equal income market equi-
librium choice correspondence using the strict envy-freeness property due
to Zhou (1992).
2 The model
Let lR denote the real line, lR+ the set of non-negative reals, and lR++ the
set of strictly positive reals. Let N denote the set of all strictly positive
integers. Given cp =I- Z c lR and Q any non-empty finite set, let ZQ denote
the set of all functions from Q to Z.
Let P be the collection of all non-empty finite sets Q, where to avoid
Russell's paradox, we assume that the statements "Q belongs to Q" and
"Q does not belong to Q" have no meaning. Given Q E P and kEN, let
Qk be the set Q X {1, ... , k}. Clearly Qk E P.
Let there be L 2: 2, (L E N) infinitely divisible goods in the economy.
The commodity space is lRL and the consumption set of any conceivable
agent (consumer) is lR~. Any Q( E P), is an agent set.
An economy E is a pair < (Ui)iEQ' w > satisfying the following proper-
ties:
(1) Q E P, is the agent set.
(2) w E lR~+, is the aggregate social endowment.
(3) Vi E Q, U i : lR~ ~ lR is a continuous and weakly increasing (Le.,
Xi, yi E lR~, Xi > > yi implies U i (Xi) > U i (yi)) utility function,
which is continuously differentiable in lR~+.
(4) Vi E Q, Xi, yi E lR~, Xi E lR~+ and Ui(Xi)
. L
= Ui(yi) implies
yt E lR++.
267
Given E E ~ and (Xi)iEQ E A(E) (where Q is the agent set for E) and
kEN, let (y(i,j))(i,j)EQI be defined as y(i,j) = XiV(i,j) E Qk.
Given E E ~, a feasible allocation or)iEQ is said to be a price equilib-
rium if there exists p E R~\ {O} such that Vi E Q, Xi solves
Proposition 1 Given E E ~
Let V c ~ be given.
A choice correspondence on V is a non-empty valued correspondence
F: V ~ UQEP(Rt)Q such that VE E V, F(E) c A(E).
F(E), E' =< (Ui)iEM' LiEM Xi >E V implies (Xi)iEM E F(E')j repli-
cation invariant if "lE =< (Ui)iEQ,W >E V, Vk E N, (Xi)iEQ E F(E)
implies (y(i,j»)(i,j)EQk E F(Ek) provided Ek E Vj average envy-free if
"lE =< (Ui)iEQ,W >E V, Vi E Q,S = Q\{i} and (Xi)iEQ E F(E), we
have Ui(Xi) 2:: Ui (fsr LjES Xj) j and strictly envy-free if this holds for
all non-empty Se Q/{i}.
Example. Let L =
2,Q = {1,2}, U1(XI,Xl) = xIXi, U2 (Xr,Xi)
= XrXi(Xr + Xi), for all (XLXi),(Xr,xi) E 1R!. Here Xj is amount
of commodity j consumed by agent i. Let W = (6 - y'5, 0J- 3 + 3-\75)'
(XL Xi) = (3 - y'5, 3-\75), (Xr, Xi) = (3, 0J-3). Neither agent envies
the other. Yet the allocation violates individual rationality from equal di-
vision (for both the agents). Note that, for two agent economies, every free
allocations and average every free allocations coincide.
.
s.t. p.X·:S 1, x·. E 1R+.
L
In view of the above we can define G(E) to be the set of equal income
market equilibrium allocations for E E ~. G is called the equal income
market equilibrium choice correspondence. Further given
269
implies
Xi E R~+ Vi E Q.
The following proposition is easily verified:
. -=i . L
s.t. p.X~:S p.X , X~ E R+.
Without loss of generality, we may assume p.w = IQI. We would be done
if we could show p.T :s
fmVi E Q. Assume p.Y > fm for some i E Q.
. . -j -j-=i
Thus there eXIsts J E Q such that p.X < fm. Thus p.X < p.X . By the
smoothness assumption on preferences, there exists X E (0, 1) sufficiently
small so that Uj(X j + A(Y - Xi)) > Uj(X j ) VA E (0, X). Choose kEN
such that l!k < Xand consider Ek+1.
Let y(n,m) = r V( n, m) E Qk+l. By Replication Invariance
Proof. The proof proceeds exactly as in the proof of Theorem 1, upto the
construction of S'. Then we skip the construction of E' and the reference
to consistency. From there on the analysis is once again the same as before,
except that the result now contradicts strict envy-freeness ((j, k + 1) envies
S'). •
We are thus able to characterize subcorrespondences of the equal income
market equilibrium correspondence in a variable population framework,
without appealing to consistency.
References
D. Foley [1967]: "Resource Allocation in the Public Sector," Yale Economic
Essays.
S. Lahiri [1997a]: "Axiomatic Characterization Of Market Equilibrium So-
lutions In Problems Of Fair Division," Mimeo.
S. Lahiri [1997b]: "Axiomatic Characterization Of The Equal Income Mar-
ket Equilibrium Choice Correspondence In Non-Convex Economics,"
Mimeo.
W. Thomson [1982]: "An Informationally Efficient Equity Criterion," Jour-
nal of Public Economics 18, 243-263.
W. Thomson [1988]: "A Study Of Choice Correspondences In Economies
With A Variable Number Of Agents," Journal of Economic Theory, Vol.
46, Pages 237-254.
W. Thomson [1994]: "Consistent Extensions," Mathematical Social Sci-
ences, Vol, 28, pages 35-49.
L. Zhou [1992]: "Strictly Fair Allocations in Large Exchange Economies,"
Journal of Economic Theory, 57, 158-175.
Non-keynesian effects of fiscal contractions:
theory and applications for Germany'
Bernd Lucke
1 Introduction
A number of European countries have abandoned the road of Keynesian
economic policies in the 1980s, basically on the grounds of disillusion about
the effects of deficit spending policies in the 1970s. Giavazzi and Pagano
(1990) illustrate the turnaround in public spending programs for major
OECD countries. They point out that the effects of fiscal contractions vary
substantially in cross-country samples, with Denmark (1983-1984) and Ire-
land (1987-1989) the front-runners on the non-keynesian side, i.e., expe-
riencing positive private consumption growth along with cuts in public
'Paper presented at the Society for the Advancement of Economic Theory, "Economic
Theory and Applications", Antalya, Turkey, 1997, and at the European Meeting of
the Econometrics Society, Toulouse, France, 1997. I thank Prof. JUrgen Wolters, an
anonymous referee, and seminar participants for helpful comments on earlier versions.
All remaining errors are mine.
272
spending, and Ireland (!) (1981-1984) and Spain (1986-1989) the leading
examples of keynesian effects, where public spending and private consump-
tion are positively correlated.
As a possible explanation Giavazzi and Pagano refer to a "German view"
of government stabilization policies as articulated by Hellwig und Neumann
(1987), who state that
"the direct impact of slower public expenditure growth is clearly nega-
tive... The indirect effect on aggregate demand of the initial reduction in
expenditure growth occurs through an improvement in expectations if the
measures taken are understood to be part of a credible medium-run progmm
of consolidation, designed to permanently reduce the share of government
in GDP... !and thus] taxation in the future. "
According to this view, benign effects of fiscal consolidation rely on the
perceived persistence of public spending cuts. If government spending is
expected to be permanently lower, then permanent income rises and the
thereby induced rise in private consumption may outweigh the depressing
effects of elementary keynesian multiplier mechanics. If, however, govern-
ment spending cuts are not long-run credible, then the latter effects domi-
nate and hence keynesian results emerge. Giavazzi and Pagano (1990, 1996)
argue that the credibility of fiscal contractions may rise with the severity
of the measures taken, i.e., large spending cuts are more likely to result in
increased private consumption than small.
Giavazzi and Pagano do not analyze the issue in a structural model; their
approach is entirely confined to reduced forms. In an on first sight unre-
lated line of research, real business cycle (RBC) analysts, however, have
established results that might prove helpful in explaining non-keynesian
phenomena of the said type. For a major focus of RBC theory has recently
been on models with equilibrium indeterminacy, see, e.g., Benhabib and
Farmer (1994) and Farmer and Guo (1994). In such models convergence
paths to the steady state are not unique, such that expectations, good
or bad, can be self-fulfilling. Moreover, a number of authors, e.g., Farmer
and Guo (1995) have presented econometric results that suggest an impor-
tant role for self-fulfilling expectations in macroeconomic fluctuations. The
central question to be addressed in this paper is hence whether the unsys-
tematic pattern of responses to fiscal consolidation efforts (and in particular
the non-keynesian experience found in German data) may be attributable
to multiple equilibrium paths.
For instance, assume that people increase their consumption because
they believe that a certain government policy will raise their permanent
incomes, while in fact the government policy does not have real effects at
all. In a standard RBC-model people will quickly realize that income does
not respond to the government policy and thus consumption plans will
be revised downwards. In an RBC-model with equilibrium indeterminacy,
however, the initial rise in consumption will cause an increase in income
which rectifies the initial beliefs, i.e., expectations are self-fulfilling. An
273
2 The model
Suppose an economy is composed of many identical agents who maximize
expected utility under a number of constraints to be described below. Util-
ity depends positively on consumption etand negatively on hours worked
Lt. The capital stock Kt is predetermined so that the objective is to solve
275
(2)
(3)
The log of the tax rate In Tt is assumed to be a random walk without drift
and with starting value In T at some distant point in the past 5
4Littmann divides total government expenses into government absorption (our at)
and transfers. Absorption consists of government production and government consump-
tion, where the latter is very narrowly defined and basically comprises expenditures for
representational purposes. While, admittedly, one might argue that not all government
absorption is used to provide public infrastructure, one might, on the other hand, point
out that even transfers are benefitial for private production. The German social security
system, for instance, is often credited for the relative absence of strikes and distributive
quarrels in the German society. Thus, under a wide definition of public infrastructure,
government infrastructure investment might even be larger than government absorption.
5Clearly, a tax rate cannot grow without bounds. The 1(1) assumption can still be a
reasonable approximation in finite samples.
276
(5)
(6)
where In Zt := In(l - Xt) is a random walk without drift and with starting
value zero at some distant point in the past. The law of motion for the
capital stock, finally, is given by
(8)
where Zt := 1 - Xt.
Solving (1) with respect to (4), (7), and (8) yields the following Euler-
equations:
CtL}+tP = 0: (Zt - Tt) ytX;(1+tP) (9)
To solve the model I use the technique proposed by King, Plosser and
Rebelo (1988). Specifying the growth process as
we can compute the steady state of the deterministic version of the economy
(obtained by setting the variances of all disturbances equal to zero). It is
a straightforward exercise to show that in the steady state hours Lt grow
277
,·-,x._ a(1+v)/(a-1»
.
Note that unless 1/ = 0, log hours are integrated of order one and coin-
tegrate with other model variables in a way to be derived below.
I derive a non-growing economy by dividing each variable by its growth
component. Denoting the growth-corrected variables by small letters we
have
Lt lit
it:= Xv' Yt:= a(l+v)/(a-1» ,
t Xt
etc. Substituting (5) into (9) and writing this in terms of the transformed
variables W(3 get
(l-q,)P+W) ~ 1 (l-dll(l+w) (l-n:)(l+'lIJ)
Ct=o:A t a (Zt- Tt)1't '" Yt a kt a • (12)
Et [ct+ll = Et [ ~~t
, exp €t+l
} ((1 - 8) + (Zt+l - Tt+d (1 - 0:) kYt +1 )]
HI
,
(13)
y=
[-0
C = (1 - ~h + o:~ b - (1 - 8)) (1 _ T) Y
"'( - ~(1- 8)
(1 - 0:) ,B
k = ,_ ~ (1 _ 8) (1 - T) y.
for T = cp. Thus, if Tt < cp, a tax increase will have a positive systematic ef-
fect on consumption, since the marginal benefit of increasing infrastructure
outweighs the marginal tax burden, i.e., the marginal loss of private capital
productivity. However, if Tt > cp, shrinking government expenditures (and
taxes) will tend to increase private consumption.
To solve equations (12) - (14) analytically, I compute a log-linear Taylor
approximation of the system about its steady state. I use hatted variables
to denote percent deviations from steady-state-Ievels of the non-growing
economy, i.e.,
Yt := InYt -lny, Ct:= lnct -lnc,
etc. The log-linear analogues of (12),(13) and (14) are then given by
+ (1 _ (1 - cp );1 + 'Ij;)) Yt
(l-a)(I+'Ij;)kA (l-cp)(I+'Ij;)AA
+ a
t + a
t (15)
(16)
(17)
Here UHI is a zero mean error term which combines EHI and the Euler
equation error incurred by replacing expected values by their realizations.
Solving (14) for Yt and substituting into (15) and (16) yields a system
of two first order difference equations in the endogenous variables Ct and
kt as well as the forcing variables Zt and Tt. The homogenous part of this
system is of the general form
( all
o
a12) (
a22 kHI
~+I
) = (bll 0) ( ~t
~I b22 kt
) .
(18)
~ ~ 1 ~ T,y,
Ct-Yt=--zt+--.Lt+ (1 -'f/
.,.) l~t (19)
I-T I-T
But exact measures of the percent deviations are difficult to obtain, since
the random walk growth component is not observable. Proxy variables can
be derived, however, by applying a Hodrick-Prescott (HP) filter to the
logarithms of the level variables and interpreting the deviations from the
Hodrick-Prescott trends as percentage deviations. While estimation of (18)
and (19) with HP-filtered variables is not fully efficient in view of the fact
that the long run information is filtered out, this approach readily provides
a preliminary impression of the magnitudes of the key parameters and
complements the estimation methods implemented below.
I estimate the linearized production function (18) by two-stage nonlin-
ear least squares, assuming the technology shock to be AR(I). The Euler
equation (19) is estimated by GMM in order to exploit the orthogonality
restrictions imposed by the model. In both cases lagged values of depen-
dent and independent variables serve as instruments. For the production
function we obtain 1> = 0.15 (standard error 0.05), and et = 0.78(0.20). For
the Euler equation I fix T = 0.25 which is the long run average share of
government absorption in the sample and estimate 7jJ = -1.10 (0.28). All
these values are significant and of reasonable magnitude. If we identified the
point estimates with the true parameter values, the estimates would imply
that there is no scope for sunspot fluctuations (7jJ < -1) but an excessive
tax burden (T > 1» which would give rise to systematic non-keynesian
effects of fiscal contractions due to unbalanced marginal productivities of
infrastructure services and private capital.
'Y -,B (1 - 8)
ClO + -'----'---'----'- (20)
'Y
, - (1- 8) Gt
C20 + ,
In K t (21)
, - ,6 (1 - 8) [ 1 T ]
+ (1 - a),6, 1 _ T In (yt - N Xt} - 1 _ T In G t - In Gt
Here ClO and C20 are constants and Vt is the Euler equation error. Since the
left hand side of the first equation is stationary, so must be the right hand
side, and therefore we see that lnKt cointegrates with In(yt - NXt ) and
In Gt . Using this fact we learn from equation (21) that In Gt cointegrates
with In Kt and that the cointegrating vector is (1, -1).
Proceeding similarly with equation (15) and collecting the constant terms
in C30 results in
1 T
In Gt - 1 _ T In (yt - N X t ) + 1 _ T In Gt (22)
_ 1 + -1/; [
=:C30+- K t +c;f>lnGt +a(l+v)InXt ] ,
(l-a)Inyt
a
v
+ ( ) [Inyt-(l-a)InKt -c;f>InGtl+uAt
a 1 +v '
+C3G In Gt + UA,t,
which implies that for v :f. 0, In Lt is cointegrated with In yt, In Kt, and
In G t , while for v = 0 In Lt is stationary.
In a system consisting of the six variables In Kt, In Gt , In yt, In(yt-NXt},
In G t , and In Lt and driven by the three independent stochastic trends In X t ,
In Zt, and In Tt we have thus found three independent cointegrating vectors.
283
These form a basis of the cointegration space and are, for convenience,
summarized in Table 1.
Table 1
Coefficients of Cointegrating Vectors
In the empirical analysis, the first step taken is a check of the long-
run implications of the model, i.e., at its cointegration properties. I
will use Johansen's (1988, 1995) general maximum-likelihood-method
to test for multiple cointegration in the system of the six variables
lnKt , In Ct , lnyt,ln(yt - NXt),lnG t , and InL t .
The specification allows for a linear trend in the data by allowing for a
constant in first differences and in the cointegrating relationships. An addi-
tionallinear trend in the cointegrating relationships is not permitted, as the
model supposes that all trend components have been correctly specified8 .
Table 2 gives the results of the Johansen-Tests for the six-dimensional
system, estimated with two lags in first differences. In this and all simi-
lar tables, r denotes the dimension of the cointegration space under HO.
Residuals are approximately white noise with this lag specification, since
the Q-statistic is not significant at the 5%-level. The implied P-value 9% is
rather low, however, indicating that some evidence of autocorrelation may
still exist. The consequences of a longer lag-Iength will be explored below.
8The Johansen-tests have been carried out with Eviews, version 2.0. The program
readily provides Q-statistics for individual residual series, but does not provide proce-
dures to test for residual whiteness in a system perspective. I have therefore tested for
autocorrelation in the six-dimensional error process by using the multivariate version of
the Ljung-Box-Q-test as described, e.g., by Lutkepohl (1991). The procedure was writ-
ten by myself in GAUSS, version 3.2, and uses the correct number of freedoms taking
into account the cointegration restriction on the VAR. The lag-length tested for is four
years (16 quarters).
284
Table 2
Johansen-Test for Cointegration: 2 Lags
(in differences) we obtain, cf. Table 3, evidence for only one cointegrating
vector. Moreover, the point estimates cannot be considered close to those in
Table 2. While the Q-statistic indicates some progress as to the whiteness
of the residuals, it remains unclear, whether the system with two lags is
underparameterized (and coefficient estimates are biased) or whether the
system with three lags is overparameterized (and coefficient estimates are
inefficient). General experience, however, often casts doubt on the reliability
of inference in high-dimensional VARs, so that in the next step I will reduce
the dimension of the VAR by exploiting the zero restrictions given in Table
1.
Table 3
Johansen-Test for Cointegration: 3 Lags
I first check the bivariate system of consumption and the capital stock
for cointegration. It turns out that it is difficult to find an appropriate lag
length specification since, apparently, capital adjustment is rather slow.
Thus, in the absence of other conditioning variables, a lag length of nine
quarters seems necessary to obtain reasonable results. Table 4 shows that
in such a specification, consumption and capital are cointegrated at the
1% level and the estimated coefficient for consumption deviates from the
theoretically expected value of -1 by about one standard deviation. These
results basically confirm the first cointegrating vector in Table 1.
286
Table 4
Johansen-Test for Cointegration: 9 Lags
Table 5
Johansen-Test for Cointegration: 3 Lags
Table 6
Johansen-Test for Cointegration: 3 Lags
structural parameters Q and cfJ. Taking into account that 1/ is merely a trend
parameter for hours which is easily estimated to be around -0.2 from mean
growth rates, the coefficients of In Kt and In Lt independently imply values
of Q = 0.64 and Q = 0.55. The first of these is quite a reasonable value for
the labor share in total income, while the second is probably a little low.
The difference is not dramatic, however. Both values are lower than the
earlier estimate of 0.78, but the difference is statistically insignificant on
the basis of the standard error obtained in the estimate with HP-filtered
data. The coefficient of In Gt should equal cfJ and should thus give us an
idea of the degree of externality in aggregate production. While a positive
estimate was to be expected from the model, a value of almost 0.6 deems
too high. Quite possibly, this coefficient is subject to some estimation bias
as there may still be some autocorrelation in the residuals, cf. the P-value
of the Q-statistic which is only barely above 5%.
Thus it seems that the long run implications of the model are roughly
fulfilled in the data as far as the cointegration properties are concerned.
However, coefficient estimates are somewhat unsatisfactory. In order to de-
rive more reliable estimates of the structural parameters, I will resort to an
error-correction approach. The equation to be estimated is equation (23),
in which both of these parameters appear. Unfortunately, identification is
not trivial, since there is a nonlinearity in the parameters. Again using the
estimate of T = 0.25, however, we can rewrite equation (23) in a form that
makes it easy to retrieve cfJ and 'Ij; from the regression coefficients
1/
+ Q (1 + 1/) [In Yt - (1 - Q) In Kt - cfJlnGtl
Table 7
Instrumental Variables Results: Dependent Variable is In Lt
These results coincide quite nicely with the earlier estimates obtained
using HP-filtered data. In both cases the estimates of'l/J and cjJ suggest that
there is no scope for sunspot fluctuations in Germany (since 'l/J is smaller
than -1) and that tax rates may be too high since the point estimates of
cjJ are smaller than the average share of government absorption. However,
these conclusions are still somewhat shaky, since the inferred values of 'l/J
and cjJ are rather close to -1 and 0.25, respectively.
5 Sensitivity analysis
To check the robustness of the results suggested by the point estimates in
the preceding sections, I will compute the maximum eigenvalue of the ma-
trix D for varying configurations of parameters. Matrix D depends on the
six structural parameters a, (3, ,,(, 8, cjJ, and 'l/J. A discount factor (3 = 0.997
implies a real interest rate of roughly 3% and should thus be realistic,
the parameter does not allow for much variation. The parameter "( is de-
termined by the mean growth rates of the main economic aggregates and
does not permit much variation either; with 2% real GDP-growth "( must
equal 1.005. The rate of depreciation, finally, was implicitly determined by
constructing quarterly capital stock data; it equals 0.005 or 2% per year.
Therefore, there is not much scope for variation in these parameters and
hence the stability properties of the model economy essentially depend on
a,cjJ, and 'l/J.
Table 8 displays the maximum eigenvalue (in absolute terms) of D for a
rather comprehensive selection of parameter values, where (3, ,,(, and 8 have
been "calibrated" in the way described above: In the first row of Table 8
I give the maximum eigenvalue of D for the estimated values of a, cjJ, and
'l/J, this eigenvalue is necessarily larger than one since 'l/J is smaller than -1.
Successively increasing 'l/J still results in eigenvalues larger than one, until
'l/J is as high as -0.55. Thus, given the other values are correct, sunspot
290
Table 8
Maximum Eigenvalue of D (/3 = 0.997, 'Y = 1.005,8 = 0.005)
In the second and third panel of Table 8 I assume that the our estimate
of 1/; is subject to a strong negative bias and that the true value of 1/; is -0.7.
Varying a, we see that only in the case of a labor share of less than 50%
would the economy display sunspot fluctuations. Such a low value of a is
certainly not realistic. Similarly, setting a = 0.67 again, we would need a
value for cP larger than 0.32 to push both eigenvalues below one. But such
291
a large value of cp is unlikely to hold in reality, as this would imply that the
aggregate production function is homogenous of degree 1~cf> ~ 1.5 or more!
Thus, given our regression results and the above stability analysis, it
seems rather unlikely that the non-keynesian phenomena observed in the
1980s are to be attributed to sunspot fluctuations. Rather, the coefficient
estimates suggest an easy and straightforward systematic explanation for
the effects of reduced government absorption: Note that the estimated value
for cp is 0.22 which is lower than any of the observed values for Tt in the sam-
ple. This suggests that a government policy aiming at a perman reduction
of government absorption, i.e., an attempt to lower the steady-state value
T, increases the steady state value of consumption. (Recall that steady-
state consumption is maximized for T = cp). In this view, the increase in
consumption is due to a government policy that makes resources with low
marginal infrastructure productivity available for private use.
6 Conclusions
At several occasions, the 1980's witnessed non-keynesian effects of fiscal
contractions. Most notably, cuts in government spending in Ireland, Den-
mark and Germany are known to have coincided with increases in private
consumption spending. Self-fulfilling expectations about the effects of stabi-
lization policies may explain these and a diversity of opposing experiences.
This paper formulates a real business cycle model with equilibrium inde-
terminacy, which allows for sunspot fluctuations as well as for systematic
consumption effects of government policy in either direction. Cointegration
tests and Euler equation estimates suggest that the model is approximately
in accord with German data. Parameter estimates imply that the non-
keynesian experiences are not due to self-fulfilling expectations but to a
balancing of the productivity effects of government-provided infrastructure
services and of private capital.
References
Benhabib, J., and Farmer, R.E.A. (1994), Indeterminacy and Increasing
Returns, Journal of Economic Theory 63, 19-4l.
Bertola, G., and Drazen, A. (1993), Trigger Points and Budget Cuts: Ex-
plaining the Effects of Fiscal Austerity, American Economic Review 83,
11-26.
Christiano, L.J., and Eichenbaum, M. (1992), Current Real Business Cycle
Theories and Aggregate Labor-Market Fluctuations, American Economic
Review 82, 430-450.
Correia, 1., Neves, J.C., and Rebelo, S. (1995), Business Cycles in a Small
Open Economy,European Economic Review 39, 1089-1113.
Farmer, R.E.A., and Guo, J.-T. (1994), Real Business Cycles and the An-
imal Spirits Hypothesis, Journal of Economic Theory 63, S. 42-72.
292
90089, U.S.A
2 Department of Economics, University of California, Davis, CA 35616, U.S.A
1 Introduction
Economists have long been ambivalent on the merits of the stock market.
On the one hand, the capital asset pricing model (CAPM), which is the
basis for the modern theory of finance, emphasizes the merit of the stock
market for diversifying the idiosyncratic risks and sharing the aggregate
risks of productive activity. On the other hand, the traditional view of the
classical economists, revived in modern times by Berle and Means (1932),
*The first. version of t.his paper was present.ed at. the Conference in Honor of Her-
bert. Scarf, Sept.ember 29-30, 1995, Yale Universit.y. We are grateful to Kenneth Arrow,
John Geanakoplos, Peter Hammond, Jean-Jacques Laffont, Peter DeMarzo and Robert
Townsend for helpful discussions, and to participants in seminars at Northwestern Uni-
versity, the Universities of Minnesota and Pennsylvania, the SEDC Conference, ITAM,
Mexico City, the SITE Workshop, Stanford University, the Summer Meeting of the
Econometric Society, California Institute of Technology, and the Economic Theory Con-
ference at Antalya, Turkey, for useful comments.
294
Jensen and Meckling (1976) and the ensuing agency-cost literature, empha-
sized the negative effect on incentives of the separation of ownership and
control implied by the corporate form of ownership. This paper provides
a framework for reconciling these two perspectives and shows the circum-
stances under which the stock market can provide an optimal trade-off
between the beneficial effects of risk sharing and the distortive effects on
incentives.
To study the efficiency properties of the stock market it is natural to
use the framework of general equilibrium. We adopt the simplest model
which permits the simultaneous analysis of production, risk-sharing and
financing decisions-namely the two-period general equilibrium model of
Diamond (1967). In the spirit of Knight (1921) we model the firm as an
entity arising from the organizational ability, foresight and initiative of an
entrepreneur. The activity of a firm consists in combining entrepreneurial
effort and physical input (the value of capital and non-manageriallabor)
at an initial date: this gives rise to a random profit stream at the next
date. In addition to entrepreneurs there is another class of agents which
we call investors: they have initial wealth at date 0 but no productive
opportunities. In the spirit of the principal-agent literature, we assume
that the effort of entrepreneurs is not observable and that the risks to
which firms are exposed are sufficiently complex to make the writing and
enforcement of contracts contingent on states unfeasible (states of nature
are unverifiable). Under these assumptions, markets for channeling capital
from investors to firms and for sharing risks must either be non-contingent
or based on the realized outputs of firms. In this paper we concentrate on
the simplest (linear) contracts: default-free debt and equity. Entrepreneurs
can thus obtain funds for financing their capital investment by drawing
on their own initial wealth, by selling shares of their firms or by issuing
debt; they can diversify their risks by buying shares of other firms. Since
arrangements for financing typically have to be made before production
can take place, we assume that the trades on the debt and equity markets
are made before the entrepreneurs choose the level of effort to invest in
their firms.
Under these circumstances trade on the financial markets will influence
the effort that entrepreneurs invest in their firms. If an entrepreneur fi-
nances his venture by selling most of the shares of his firm, he will not have
much incentive to invest effort in his firm, since most of the payoff from
his effort goes directly to outside shareholders. On the other hand if the
financing is done principally by debt, then typically a high level of effort
will be required to ensure that the firm does not go bankrupt. The effect
on incentives is not however the only consequence of the choice of capital
structure: for the choice of debt and equity also determines the way the
productive risks of the economy are shared. To take an extreme example, if
equity were not traded at all, and if all financing were made by debt, then
no share of the productive risks would be carried by investors - the full
295
burden would fall on the entrepreneurs, who would have undiversified and
leveraged profit streams.
The trade-off between incentives and risk sharing· is the problem that
is studied in the principal-agent literature: the difference is that in the
setting that we consider there is no principal who directly designs a contract
to induce agents (entrepreneurs) to behave in an optimal way. Whatever
incentive schemes there are must somehow be created by the markets. It is
thus natural to ask whether the stock and bond markets can create incentive
schemes which lead to a socially optimal balance between incentives and
risk sharing.
The moral hazard problem posed by the nonobservability of entrepre-
neurial effort only arises when equity is sold, for then the benefit of an
entrepreneur's effort is shared between the entrepreneur and the outside
shareholders, while the cost is born solely by the entrepreneur. If a price
system is to provide appropriate incentives, then it must discourage entre-
preneurs from selling too much equity of their firms. Intuitively this will
only happen if entrepreneurs are aware that the market will ''punish'' them
by a low price for their firms' shares, if they attempt to sell too much of
their equity.
In Section 2 we propose a concept of equilibrium in which markets play
such a disciplining role. It is based on two ideas: first, it assumes that in-
vestors are well informed - they can observe all the financial decisions
of entrepreneurs - and use this information to deduce the effort that en-
trepreneurs will exert. Second, it assumes that entrepreneurs are aware of
this fact: this is formalized by the concept of price perceptions. To decide
whether an investment-financing plan is optimal, an entrepreneur needs to
evaluate what would happen if he were to change this plan: his price per-
ceptions describe how he perceives that the price of his equity would react
to any such change of plan. The price perceptions are assumed to be ratio-
nal (Le., entrepreneurs think that investors will correctly deduce from their
investment-financing decision what their effort and the associated output
of their firm will be) and competitive (an entrepreneur cannot affect the
span of the financial markets and thus the risk premium that investors re-
quire to invest in the risky income stream that he sells). Putting these ideas
together leads to the concept of a stock market equilibrium with rational,
competitive price perceptions (an RCPP equilibrium).
This concept of equilibrium describes markets functioning at their best:
does it suffice to induce a socially optimal outcome? First best optimality
is clearly too demanding a criterion to use in this setting: what is needed is
a extension of the concept of constrained efficiency introduced by Diamond
(1967) which respects both the limited available set of financial securities
and the incentive constraints imposed by the nonobservability of effort. The
associated constrained social optimum problem is in fact equivalent to a
principal-agent problem. In Section 3 we show that an RCPP equilibrium
is constrained efficient: markets can thus be thought of as designing an
296
ISee Book Ill, Chapt.er II of the Wealth of Nations for a criticism of the metayer
system, the share system used in Continental Europe, by which the farmer and the
landowner each obt.ained one half (metarius) of t.he output of t.he farm. See Book V,
Part III for a vehement criticism of joint stock companies.
2 See Book Il, Chapters VI-VIII of Principles of Political Economy for a more bal-
anced assessment of t.he metayer system and Book I, Chapter IX for a discussion of joint
st.ock companies.
3See Book VI, Chapter X and Book IV, Chapter XII of Principles of Economics.
297
principal.
The idea that financial decisions of agents transmit information about
characteristics or actions of agents that are not directly observable or know-
able by the market, has been extensively explored in the finance literature.
Concepts of equilibrium based on this idea and the idea of rational expec-
tations have been used in many partial equilibrium models: for adverse se-
lection in the signaling models of Ross (1977), and Leland and Pyle (1977),
and the subsequent literature [see Harris and Raviv (1992) for a survey];
for problems of moral hazard by Jensen and Meckling (1976), Grossman
and Hart (1982), and Brander and Spencer (1989). This paper differs from
these latter contributions in that it makes explicit in a general equilibrium
setting with moral hazard how the market can resolve (or at least mitigate)
the incentive problems created by asymmetry of information; it also pro-
vides a framework in which the risk-sharing function of financial markets
and their disciplining role in attenuating the agency costs of firms can be
studied simultaneously. This permits the agency costs and benefits of eq-
uity and debt to be balanced against the risk-sharing benefits and costs of
these securities.
A simpler concept of rational expectations is present in all the literature
on general equilibrium with incomplete markets (GEl) which began with
the papers of Arrow (1953) and Diamond (1967), and subsequently gave rise
to an extensive literature [for a survey of results in this area see Magill and
Shafer (1991)]. We have chosen the simplest version of the GEl model with
production, namely Diamond's model, to study how the agency theory of
the firm can be incorporated into a general equilibrium analysis. It is well-
known that a stock market equilibrium in Diamond's model is constrained
efficient but that such a result can not in general be expected to hold in
more complex GEl models. Since the problem of constrained inefficiency
arising in an incomplete markets model with many goods or many periods,
or in a production economy without partial spanning, is not directly related
to the problems posed by incentives, we have chosen to take as a benchmark
the simplest model of a production economy in which financial markets lead
to constrained efficiency in the absence of incentive effects.
An alternative approach to incorporating asymmetric information into
general equilibrium, which is tantamount to extending Arrow-Debreu the-
ory directly to a world with moral hazard and adverse selection, has been
proposed by Prescott and Townsend (1984a, 1984b). The contracts they
consider are lotteries on an abstract consumption space. For the moment
it is not clear to us how the two approaches are related: the contracts they
study seem very different from the standard debt and equity contracts
which are the focus of our analysis.
More recently a number of papers have studied how moral hazard within
the firm affects the pricing of its equity contract [Kahn (1990), Kocher-
lakota (1995), Shorish and Spear (1996)]: these are representative agent
models modified to incorporate the effect of unobservable effort on produc-
298
u~(xh) ~ 00 if xh ~ 0,
4
\7ui. = (8Ui 8u
~, ... , ~
i ) s is the boundary of the
denotes the gradient of ui. and 1JR+
non-negative orthant of 'R s.
299
(1)
5 This is ill essence a non linear version of activity analysis, the vector 'l}i constituting
the "activity" (income stream) of firm i (see Tjalling Koopmans (1951)).
300
equity, firms can also issue debt. To simplify the analysis the penalty for
bankruptcy is assumed to be infinite: there is thus a single instrument
traded on the bond market, which is the "default-free" bond.
To make clear how the timing of agents decisions takes place, date 0 is
divided into two subperiods 01, 02. In subperiod 01 entrepreneurs use the
financial markets to obtain the capital required to set up their firms and
to diversify their risks: in the second subperiod 02, after the investment
and financing decisions have been made, firms become "operative" and
entrepreneurs decide on the appropriate effort to invest in the running
of their firms. At date 1 "nature" chooses a state of the world (shock):
production takes place and profit is realized.
In subperiod 0 1 entrepreneur i decides on the amount of capital zi to
invest in his firm, on the amount to borrow bi (if bi > 0, lend if bi < 0),
on the share (1 - O~) of his firm to sell and on the shares 01 of other
firms k -# i to buy: let (i = (01. ... , O~) denote the agent's portfolio of
equity contracts. Since we study the case in which financial markets are
still relatively simple (debt and equity only), we assume that there are no
short sales6 so that (i E n~. Let qo denote the price of the bond and let
Q = (Ql,"" Qf) denote the vector of prices of the firms' shares: thus Qi
is the price offull ownership of firm i, and if agent i is not an entrepreneur
i.e., if Fi(zi, ei ) = 0, then Qi = O. The accountability of agent i requires
that the following budget equations be satisfied
6 This is not essential. If short sales were allowed, to carry out the anlysis we would
need to add the assumption that the income streams 1]i, for 1]i =I 0, are linearly
independent.
301
at date 1, his debt payment -bi , and the dividends he will receive from
the different firms in the economy. What the investor cannot observe when
buying his shares in firm i is the effort entrepreneur i will invest in his
firm: this decision will be made by the entrepreneur in subperiod 02, and
the best the investor can do is to form an expectation about what ei will
be.
Assumption MCMP(a) ensures that the problem (E) has a unique solu-
tion, while MCPM(b) ensures that each entrepreneur's technology is suf-
ficiently productive relative to his cost of effort to make it worthwhile
to put his firm into operation: if the entrepreneur were to operate at
(zi, ei ) = (0,0), there would be a way of slightly increasing capital (zi = t)
and effort (e i = ei(t)) so that the increase in marginal utility arising from
the increase in output exceeds the marginal increase in the cost of effort.
Proof. (i) The first-order condition for the problem (E) is given by
i/( i) S 8 i
C e > o~" u~ (mi
gj:;.( i i) - t L...J 8xt
+ O~fi(zi
t",
ei)'ni) 'T}i
'/S
(8)
ae' z, e s=1 S
P
with equality if ei > 0. Since fi(zi, ,) is increasing, and aau x.
) is decreasing
Set k = ug(xb/2), K = \7u1(xl + fi(1, ei (l))l1i) , l1i. Then, since *Er >
0,*!r °
> 0, e'i1 > and ub and ul are concave
to investors is the risk profile ".,i that they can use for taking or diversifying
risks, and we assume that entrepreneur i takes it s price as given. The no-
tion of competition does not however explain how an entrepreneur should
perceive that the "market" will evaluate the personalized part fi(zi, ei ),
namely the "amount" of".,i that we will supply when ei is not observable.
To answer this part, the concept of rational expectations is more appro-
priate than the concept of competition. We are thus led to the following
concept of equilibrium.
(9)
e
Thus to check if his financial decision (zi, fji, i ) at equili~rium is optimal,
entrepreneur i forms expectations about what the price Qi would be if he
were to make an alternative financial decision (zi, bi , Oi). To form these
expectations he takes the price ili of one unit of his income stream ".,i as
given8 , and calculates that the market price of his firm will be tiili' if the
market anticipates his profit will be ti".,i. To evaluate mi in (10) he takes
as given the effort ek that other entrepreneurs (k i= i) make given their
financial choices (e k = e'" (mk, fjk, eZ)). This is the competitive part of his
calculation.
To evaluate what the market anticipates his "output" t i will be, he draws
on his knowledge of investor rationality: he anticipates that the market will
deduce from (mi, zi, o~) what his optimal effort will be, and thus anticipates
that t i will be equal to fi(zi, ?(mi, zi, o~)). This is the rational expectations
part of his calculation.
An RCPP equilibrium describes a situation where entrepreneurial effort
is not observable, but where all participants on the market use all available
information to deduce the likely values of the hidden (moral hazard) vari-
ables - and all agents know this: in short, there is common knowledge of
8Note that the "competitive" price qi can be deduced from the observable market
prices Qi, only if the firm of entrepreneur i is active. For if li(zi, ei ) > 0 then (ii) in
Definition 1 and (9) imply t.hat qi = Qi/li(zi,~). However if li(zi,e i ) = 0, then (ii)
and (9) imply Qi = 0, so t.hat. qi is indeterminate. In this lat.ter case, the concept. of
equilibrium does not. guarantee that the price qi used by ent.repreneur i to reach t.he
decision (Zi, ei ) = 0 is "reasonable", since it. does not. correspond to an objective market
signal. Assumption MCMP(b) avoids the conceptual difficulties t.hat. arise in these cases.
306
rationality.
3 Constrained efficiency
A well-known result of Diamond (1967) asserts that in a model similar to
the one considered in this paper, but in which there are no incentive effects,
the stock market leads to efficient investment and risk sharing, the efficiency
being relative to the existing structure of securities - in short, he proved
that a stock market equilibrium is constrained efficient. When the firms'
profit functions fi(zi, e i ) are independent of e i , so that the effort variables
are omitted, the model we are studying reduces to Diamond's model of the
stock market. Does the constrained efficiency result carry over to the more
general version of the model in which entrepreneurs' incentives are explic-
itly taken into account? Since the stock market cannot achieve risk sharing
without distorting incentives, the question arises whether this trade-off is
achieved in an optimal way at an equilibrium. In their attempt to diversify
their risks, do outside shareholders acquire excessively large holdings in the
firms, leading to undue distortion of the entrepreneurs' incentives to invest
effort in their firms? Or, on the contrary, are the entrepreneurs unduly re-
luctant to sacrifice ownership shares in their profit streams, thus robbing
other agents of potential opportunities for risk sharing? To answer these
questions we need to generalize the concept of constrained efficiency intro-
duced by Diamond to the context of this model. This means introducing a
concept of constrained feasible allocations, which respects the limited trad-
ing opportunities achievable by a system of bond and equity markets, and
in addition respects the incentive constraints imposed by the nonobserv-
ability of effort. Applying the Pareto ranking criterion to this constrained
feasible set leads to the concept of a constrained Pareto optimum.
Lxh
i=l
Lwh-L i
i=l i=l
(11)
Lb
i=l
i 0 (12)
L
i=l
Ol 1, k = 1, ... ,1 (13)
Proof. If the equilibrium ((x, e, z, b, 6), (iio, Q); Q) is not CPO, then there
is a constrained feasible allocation (:z:, e, z, b, 8) satisfying (11)-(15) such
that u i (:z:i , ei ) ~ Ui(Xi, ei ), i = 1, ... ,I with strict inequality for at least one
i. By Proposition 1, Assumption MCMP(b) implies that in an equilibrium
all entrepreneurs invest a positive amount of capital and effort in the sector
in which they are productive: as a result all income streams 17 i , with 17i -I 0,
are traded in an equilibrium. Thus the date 1 consumption stream
9In order to express the fact that the planner replaces "markets", he must not have
to worry about prices or respecting agents' budget constraints and thus has to be able
to choose the date 0 consumption xb
of agents directly, subject only to the aggregate
feasibility constraint (11).
308
by
~fk(zk, ek) = f)~fk(zk, ek).
Given the outside income mi derived from debt and other firms' securities,
by constrained optimality, his choice of effort ei = ?(mi, zi, f)~) would then
have been optimal. Since (zi, ei ) is preferred or indifferent for all agents
and strictly preferred by at least one agent, the date 0 consumption must
be at least as expensive, and strictly more for some agent: thus
(19)
The standard framework for studying the optimal trade-off between risk
sharing and incentives is the setting of a principal-agent problem. It is thus
of some interest to note that the planner's problem of finding a CPO can
be expressed as a generalized principal-agent problem. A principal (the
planner), who can be thought of as owning all the resources, looks for a
way of rewarding agents in the economy through the choice of consumption,
investment and portfolio variables, so as to maximize a weighted sum of the
agents' utilities under constraints which limit the risk-sharing possibilities
at date 1 (constraints (14)), the incentive constraints (15), and subject to
a reservation level of utility for himself equal to zero. This latter constraint
can be expressed as the fact that the principal appropriates no resources of
the economy for himself, and is thus equivalent to the resource availability
constraints (11)-(13). If the principal wanted to decentralize the solution
to his social welfare problem by providing agents with incentive contracts,
then he would have to solve the following contract design problem: find
functions <pi : R+ x R x R~ - - R such that a Nash equilibrium of the
game with strategies (zi, bi , 8 i , ei ) for the agents (i = 1, ... ,1) and payoffs
309
Lbi 0, (21)
i=l
ei = ?(-bil+LJ.£i11k,i,B~). (24)
k#i
A constrained Pareto optimal allocation is a solution of the problem
I
max L vi (u~(x~) + ui(xi) - ci(ei )) ,
i=l
subject to the constraints (20)-(24), where Vi is the relative weight attached
to the utility of agent i. To express the cost of each constraint in units of
date 0 consumption, we divide all the multipliers by the multiplier >'0 in-
duced by the date 0 constraint (20). This gives a set of normalized multipli-
ers (1, qo, (qi, 7ri, €i)I=l) associated respectively with each ofthe constraints
(20)-(24), where 7ri = (7rt, ... ,7r~). The first-order conditions with respect
to the variables (xi, ei , zi, bi , 14, Bn of an entrepreneur i are
8ui1 /8x i8
= 7r~, s = 1, ... ,S; (25)
u il0
Cil
u 0il
= (1 - B~) qi + B~ 1ri . 11i) ~~: _ €i; (26)
The first-order conditions with respect to the variables (xi, J.£i) of an in-
vestor are (25) and
qo = 1ri. 1 (28 /)
qk~1ri'11k (=ifJ.£i>O), k=/=i. (29')
311
lOIn the text we take the most intuitive case where ae' /a()~ > 0 i.e., increased own-
ership leads to increased effort. It can happen, when bi is sufficiently large, that income
effects make this term negative (see Section 4).
312
marginal cost, which here coincides with the private cost Ci , /u~, since en-
trepreneur i is the only one to bear the cost of his effort. Since effort is
chosen optimally by entrepreneur i, by the "envelope theorem", or more
precisely by the FOC (31), the welfare effect on the entrepreneur of a mar-
ginal change in his effort is zero. Substituting (31) into (26') gives
How the FOC for CPO are Achieved at Equilibrium. Since a stock
market equilibrium is constrained Pareto optimal, entrepreneurs must -
just like the planner in a CPO problem - be induced to take into account
the external effect of their effort on the welfare of others, namely the terms
in €i in equations (26)-(30). In the standard model of competitive equilib-
rium, where prices are assumed to be independent of the quantities chosen,
the price system cannot cope efficiently with externalities. However, in an
RCPP equilibrium, there is a "non-competitive" part, namely the rational-
anticipations component of the perception function Q: while entrepreneurs
take the prices (qi){ of the factors ",i as given, they recognize that the price
that the market will pay for their shares depends on investors' expectations
of the effort that they will make. Since investors can deduce from the en-
trepreneurs' financial decisions what their effort will be, financial decisions
end up playing the role of signals: in the process of choosing their "signals",
entrepreneurs are led to internalize the externality.
The way in which the price perceptions force entrepreneurs to internal-
ize the externality, can be clearly understood by matching the FOC at an
equilibrium with the FOC for a CPO allocation. Consider the maximum
llNote that their benefit is evaluated using qi, and not 1r i 7Ji for j # i, and thus
incorporates the incentive cost of giving them a marginal increment in the income stream
7Ji.
313
-i -i 8Qi
qo 1r . 1 + (1 - ()i) 8bi ; (36)
Substituting (39) - (42) into (33) - (38), and setting qi = iJi, f.i = (1 -
o!) iJi ~ for i = 1, ... , I, gives the FOe (25)-(31) for a constrained Pareto
optimal allocation.
In letting himself be guided by the price perceptions Qi ( Z i , bi , (}i), an
entrepreneur understands, for example, that if he doubles the share (1- ()n
314
of his firm that he sells, this will not double the income he receives: for
shareholders know that when his ownership share falls, the effort that the
entrepreneur ,!ill invest in his firm will fall, and this is reflected in the
smaller price Qi that shareholders will pay for the shares. He also knows
that if he uses the proceeds of the sale for personal consumption or to buy
shares in other firms, he will get less than if he uses the proceeds to finance
capital expenditure for the firm.
There is an interesting connection between Proposition 2 and the condi-
tions for constrained (second best) optimality in an insurance market with
moral hazard (Hellwig (1983), Henriet-Rochet (1991), Lisboa (1996)). In
the insurance models, nonlinear prices are needed to obtain constrained op-
timality, and in such models the insurance companies are the natural inter-
mediaries for implementing such "second-best optimal" nonlinear pricing.
In the stock market, price perceptions induce nonlinear prices: thus rational
behavior and anticipation on the part of agents can act as an alternative
mechanism for achieving constrained efficiency to having intermediaries
that charge explicit nonlinear prices. 12
Thus the utility functions for date 1 consumption are expected discounted
utility, with vi taken from the LRT (linear risk tolerance) family.1 3 All
12In practice the underwriters who undertake to float an issue of shares on behalf of a
firm help to make clear to the company how the market is going to evaluate their issue of
shares, From the perspective of our model, in addition to matching supply and demand,
their role is to help "entrepreneurs" to form rational, competitive price perceptions.
13For an expected utility function E(v(x)), the risk tolerance is defined by T(x) =
-v'(x)/v"(x). The function v is in the LRT family ifT(x) = A+Bx. A is the intercept
and B is the coefficient of marginal risk tolerance. Here Al = A2 = 0, Aa = -100 and
Bi = 2 for all agents.
315
agents have the same coefficient of marginal risk tolemnce (equal to 2) and
agent 3, with a negative intercept, is less risk tolerant than the others. The
entrepreneurs' production possibilities are given by
Thus activity 1 with mean E(.,,1) = 15 and standard deviation 0"(.,,1) = 5.7
is less productive, but less risky, than activity 2, for which E( .,,2) = 18 and
0"(.,,2) = 8.6. The two activities are positively correlated with correlation
coefficient cor(.,,\ .,,2) = 0.76. The economy has a fixed date 0 wealth:
w6 + w5 + w8 = 400. We consider two distributions of initial wealth between
entrepreneurs and investors given by
To show how the incentive effects change the predictions of the model
with respect to risk sharing, security prices, and the use of debt versus
equity, when compared with the standard CAPM-like model of finance,
we compute two types of equilibria. First, the RCPP stock market equilib-
rium (Tables 1 and 3); second, the risk sharing equilibrium of the associated
finance economy in which firms have the same physical investment and out-
put (Zi, yi) as in the RCPP equilibrium, but where the production plans
are taken as fixed and independent of the consumption-portfolio choices of
the agents. The consumption-portfolio choices and security prices of this
latter equilibrium are those that would be predicted by an outside observer
knowing the agents' risk-impatience characteristics and the firms' produc-
tion plans, but who is not aware of the feedback between the entrepreneurs'
financial decisions and their choices of effort. Since we have chosen utility
functions in the LRT family and since there are well-known properties for
the equilibria of a finance economy with such preferences, we call this latter
type of equilibrium an LRT equilibrium (Tables 2 and 4).
l1For a summary of the properties of LRT economies, see for example Magill and
Quill7:ii (1996, Section 17).
316
and because increasing debt has the same effect, the incentive effects induce
entrepreneurs to retain a higher proportion of their firm than in an LRT
equilibrium: as a result, entrepreneurs typically make more use of debt to
finance their capital investment in an RCPP equilibrum than in an LRT
equilibirum.
The qualitative difference in capital structure in the two types of equilib-
ria translates into a qualitative difference in the prices of the securities or
equivalently their rates of return (as shown in the last row of Tables 1-4).
If r denotes the rate of interest and if ri - r is the risk premium on the
equity of firm i, where
1 E(yi)
1 +r =-,
qo
1 + ri = Q:-' i = 1,2.
and yi = (y1, ... ,y~) is the date 1 profit stream of firm i, then the rate of
interest is higher and the risk premia on securities are lower in an RCPP
equilibrium than in an LRT equilibrium. Entrepreneurs, by restricting the
supply of their firms' shares that they offer for sale, drive up the prices of
equity contracts, thus lowering their risk premia15. The entrepreneurs who
need outside funds to finance their capital investment resort to increased
borrowing, thereby increasing the rate of interest.
The difference between the incentive effects of equity and debt can be
seen by comparing the RCPP equilibria in Tables 1 and 3. The reduced
initial wealth of entrepreneurs in the latter equilibrium forces them to draw
more extensively on outside sources of funds, their capital investment in
the two equilibria being essentially unchanged: were they to raise funds
exclusively by selling shares in their firms, the negative effect on incentives
would lead to a fall in output and to a fall in the price of their shares.
To avoid this decrease in the price of their equity, entrepreneurs increase
their reliance on debt: incurring debt counterbalances the effect of selling
equity, since increasing debt has a positive effect on incentives 16 , leading
to a higher output and higher equity prices. In the equilibrium of Table 3
the effect of increasing debt dominates the effect of selling equity, so that
effort and output increase (by about 15%).
15 This result seems to make the "equity premium puzzle" even more of a puzzle.
However the observed high return on equity comes from capital gains rather than a high
dividend yield, and capital gains are not present in our two-period mode\. A multi period
model would be needed to determine whether the incentive-based restriction of the
supply of equity could be a factor contributing to large capital gains
16 A one unit increase in debt leads to a one unit decrease in consumption in each state
at date 1 and hence to an increase in the marginal utility of consumption in each state.
This increased marginal benefit (payoff) of effort implies that more debt leads to more
effort (see footnote 17). Thus, in this model, the market interprets an increase in debt
as a "favorable signal" .
Table 1: RCPP Stock Market Equilibrium
Wo = (80,80,240)
Xo Xl X2 X3 E(zI) O'(Zl) e z b fh (%) fh (%)
agent 1 64 107 68 28 68 32 0.98 43 17 87 0
agent 2 83 201 29 64 98 74 1.24 85 57 0 80
agent 3 126 158 108 111 126 23 0 0 -74 13 20
aggregate a
273 466 205 203 292 124 7.8 4.7 7.3
returns b (%) L-- ~--
---
.. aggregate consumption at each date in each state which for date 1 is equal to aggregate output
b the last row of the "b" column gives the interest rate r (percent); the last row of the 8; column
Wo = (20,20,360)
Xo Xl X2 Xa E(zt} O'(Zl) e z b (h (%) (J2 (%)
agent 1 32 82 44 6 44 31 1.16 46 37 71 0
agent 2 51 169 9 41 73 69 1.41 86 72 0 67
agent 3 186 274 180 181 212 44 0 0 -109 29 33
aggregate a
269 525 233 228 329 139 18.5 4.9 7.2
returnsb (%)
a,b same definition as in Table 1
I_n ]u~o ·1 Xl X2
1 1 Xa 11 E(zt} I O'(zl)Lb J (Jl (%) 1 (J2 (%) 1
agent 1 33 71 28 27 42 21 7 15 15
agent 2 51 112 43 42 66 33 12 24 24
agent 3 185 342 162 159 221 85 -19 61 61
aggregate a
269 525 233 228 329 139 15.8 8.7 12.5
returnsb (%)
a,b same definition as in Table 1
319
ship and debt jointly influence effort is shown in Figure 1. Entrepreneur 2's
capital investment and his ownership share of firm 1 have been set at the
equilibrium values in Table 1 (z2 = 85, ei
= 0) so that his optimal effort
can be expressed as a function of his ownership share B~ and his debt b2
171t is easy t.o see, by differentiating the first-order condition defining the optimal
effort function ei that the property ae i labi > 0 holds generally when ui is an expected
utility
18This behaviour of ae i la(}~ holds for LRT utility functions with a zero intercept and a
320
The negative slope of the optimal effort function for small values of the
equity share is akin to the income effect dominating the substitution effect
in a standard microeconomic choice problem (interpreting effort as labor
and e~ as a wage, since the reward for effort is proportional to e~fi (zi , ei )).
The equation determining entrepreneur i's optimal effort is
Increasing the agents' ownership share e~ has two effects: the direct (substi-
tution) effect is to increase the marginal benefit from an additional unit of
effort; the indirect (income) effect is to increase date 1 consumption xl and
thus to decrease oui/ox! (assuming additive separability), thus decreasing
the marginal benefit of effort. When ;.cl is small (small e~ and large bi ), the
marginal utility of consumption decreases fast and the negative indirect ef-
fect dominates, leading to the apparently paradoxical result that a reduced
ownership share leads to increased effort. When ;.cl is large (large e~ and
small or negative bi ) marginal utility changes very little with an additional
unit of consumption, and the direct positive effect dominates: hence the
intuitive result that increased ownership leads to increased effort.
When b2 > 0, the effort curves are asymptotic to the vertical axis, im-
plying that effort must increase enormously when e~ --+ 0: this is the
°
no-bankruptcy effect. Since in this model the cost of bankruptcy is infinite,
to be sure that the inequality _bi + e!fi(zi, ei )'1]! ~ is satisfied for all
states, the smaller e~, the greater the effort agent i must expend to stay out
of bankruptey. While shareholders of firm i would be happy to see entre-
preneur i incurring a large debt and owning only a small share of his firm,
the entrepreneur in ehoosing his financial variables (z i , bi , e~) will normally
stay out of this region!
Note that for Z2 fixed and e~ = 0, the pereeption function Q2 is a function
of (b 2 , e~)
coefficient of marginal risk tolerance greater than one (vi(x~) = (x~)Ct with 0 < a < 1).
321
5 Conclusion
With the exception of the well-known papers of Prescott and Townsend
(1984a,b), general equilibrium theory and the economics of asymmetric
information are two branches of economic theory which have remained sur-
prisingly separate. With some exaggeration general equilibrium studies cir-
cumstances under which markets "work", while the theory of asymmetric
information reveals the circumstances which make markets "fail". Prescott
and Townsend argue that in principle markets can resolve problems posed
by asymmetry of information: however, to establish this result, they pos-
tulate the existence of an extensive array of markets for contracts (which
rather like Arrow-Debreu contracts) are difficult to identify in the real
world.
The approach of this paper is somewhat different: it seeks to formalize
in a general equilibrium setting why the markets that we actually observe
for debt and equity may perform rather well even in the presence of moral
hazard. The main requirement, in addition to perfect competition, is that
participants on these markets be rational, and that this rationality be com-
mon knowledge. This is formalized in the concept of rational, competitive
price perceptions: it is the anticipatory aspect of perceptions which pro-
vides the disciplinary forces that induce agents to act in the appropriate
way.
References
Arrow, K.J., "Le Role des Valeurs Boursieres pour la Repartition la
Meilleure des Risques", in Econometrie, Colloques Internationaux du
Centre National de la Recherche Scientifique, 1953, 40, pp. 41-47; Eng-
lish version: "The Role of Securities in the Optimal Allocation of Risk
Bearing", Review of Economic Studies, 1964, 31, pp. 91-96.
Arrow, K.J. and F.H. Hahn, General Competitive Analysis, San Francisco:
Holden Day, 1971.
Berle, A.A. and G.c. Means, The Modern Corporation and Private Prop-
erty, New York: Harcourt, Brace and World, 1932.
Brander, J.A. and B.J. Spencer, "Moral Hazard and Limited Liability: Im-
plications for the Theory of the Firm", International Economic Review,
1989, 30, pp. 833-849.
Cheung, S.N.S., "Transaction Costs, Risk Aversion, and the Choice of Con-
tractual Arrangements", The Journal of Law and Economics, 1969, 12,
pp. 23-42.
Diamond, P.A., "The Role of a Stock Market in a General Equilibrium
Model with Technological Uncertainty", American Economic Review,
1967, 57, pp. 759-773.
Grossman, S. and O. Hart, "Corporate Financial Structure and Manage-
rial Incentives", in: J. McCall, ed., The Economics of Information and
322
1 Introduction
The causes and social benefits of mergers and acquisitions (M&As) have
been a subject of heated discussions. Concerns have been raised about their
effect on competition and industrial concentration, and about their financial
impact on the firms involved. Empirical evidence shows that M&As activity
leads to large income redistributions that target shareholders tend to reap
gains, and that M&As often result in a "synergy trap" that involves the
destruction of firm value'!
Matsusaka [1993J.
327
M&As have lower profits than in the status quo in which all firms are in-
dependent (but higher payoffs than the endogenous disagreement payoff of
competing as an independent firm against a conglomerate).
There is a parameter area with a single conglomerate, even if the costs
of conglomeration are low and potential synergies are strong (Figure (5)).
This paradoxical case arises when the demand elasticity is low enough (or
the research cost parameter is high enough). The reason is that the output
increase that would occur due to the coexistence of two conglomerates
would lead to a price reduction (or an increase in research costs) that is large
enough to preclude the two-conglomerate equilibrium in this parameter
range.
The model is consistent with key features about cross-product M&As.
The model generates parallel takeovers exploiting synergies and arising
as a reaction to rivals' M&As. This result relates to the vast evidence
on takeover waves encompassing contemporaneous cross-industry M&As,
particularly the combination mergers of the late sixties and the eighties
takeover wave (Golbe and White [1988]). In the nineties wave, numerous
M&As constituted strategic investments positioning firms in new markets,
exploiting synergies, and reducing output costs in the face of competitive
pressures. Healy, Palepu and Ruback [1992] report that research expendi-
tures tend to be maintained after the M&A, an implication of our strategic
research model for strong synergies.
Next section describes the stage game and models technology synergies.
Sections 3, 4 and 5 solve the two stage research and output game, the
bargaining problem, and the congeneric integration problem. Section 6 en-
dogenizes the structure of conglomeration and examines synergy traps, and
Section 7 offers conclusions.
where we are adding up the demand and cost functions in both product
lines.
Figure (2) illustrates the profile of intra-group transfers of technology in
the three possible equilibrium structures. Figure (2a) represents the case
of independent firms, which, by definition, cannot benefit from synergies.
Figure (2b) depicts the synergy network that arises when there are two
conglomerates. Each group-member has access to a portion (3 of the tech-
nology developed by the member producing another product. Figure (2c)
presents intra-group transfers of technology when a single group competes
with independent firms.
The previous setup can be illustrated by considering a merger between
a tax consulting company and an accounting consulting company. These
companies have no overlap between their product lines, and their demand
functions are independent, but there are potential synergies between them.
Linear versions of the conglomerate operating cost functions are given
by
where we impose the restrictions that levels of output and production costs
must be non-negative. Firms are assumed to have the same operating cost
parameter (A = A*). The synergy coefficient {3 E [0,1] represents cost-
reducing intra-group transfers of technology, and 'Y is the own-research
cost parameter. There is also a fixed cost of conglomeration CM&A. This
cost factor represents the costs of coordinating two firms, and transferring
and adapting technology among group firms.
The variable cost reduction (or process innovation) achieved by research
can be decomposed into a direct and an indirect effect. The first one refers
to the direct cost reduction effect of firms' own research investment, x,
and the second one to the cost-reduction gain {3x due to the R&D activ-
ities of the other group's member. The indirect effect reflects intra-group
transfer of technology among the firms forming the conglomerate, and is
the feature that justifies an M&A motivated by the search for production
cost-reduction. Expressions (Xl + (3xi) and (xi + (3Xl) in equation (2) rep-
resent the sum of the unit cost reduction achieved by own and intra-group
research efforts for firms 1 and 1* of group 1 (the same applies for group
2).
3 Research-output choices
We proceed to solve the research-production problem and determine the
profit functions under the three possible conglomeration structures: two
conglomerates, one conglomerate coexisting with independent firms, and
four independent firms.
If {3 E [0,1]' and a> A, groups will engage in research when 9lry - 2 (1 + (3)2
> 0. The greater the difference a- A between market size and operating cost
parameters, and the larger the intra-group transfer of technology parameter
{3 E [0,1], the greater the equilibrium research investment.
Substituting for x and x* into the solution for output as a function
of research, qi (x, x*) and qi (x* , x), yields the unique firms' equilibrium
outputs
.= ~= 3(a-Ah i=12 (5)
q. q. 9lry - 2 (1 + (3)2 ' ,.
331
negotiation process that takes place in the first stage of the congeneric
integration game. Given the model's symmetry, the identities of buying
and selling firms are undetermined.
M&As transactions can take place through either negotiations or auc-
tions. Bulow and Klemperer [1996] show that auctions are optimal in a
wide range of cases. For instance, auctions maximize the return of a "bad"
manager that is selling a firm but does not accurately know its potential
value. On the other hand, bargaining is appropriate when synergies are
specific to merging firms, they possess greater information about the merg-
er's value than other firms, or the costs of searching and negotiating with
alternative buyers make auctions expensive.
(12)
where the equilibrium price, FK (-) E {~(o:, a, A, {3, ,,(, b, CM&A), F~(o:,
a, A, {3, ,,(, b, CM&An, is strictly positive and depends on 0: E [0,1], which
represents seller's bargaining power.
In order to solve the bargaining problem and determine the takeover fee,
we need to compute the surpluses of the buyer and seller. The bidder's
surplus, SRK, is defined as the conglomerate's operating profits, minus the
sum of the fixed costs of conglomeration, the takeover fee paid, and the
opportunity cost of buying. The seller's surplus, STK , is the takeover fee
received, FK, minus the opportunity cost of selling the firm. The opportu-
nity cost consist of the profits obtained if the conglomerate is not formed.
Because there are two duopolists in each market, the bargaining problem
between any two firms depends on conjectures formed about the strategies
that other firms follow.
One possible conjecture made by two firms bargaining over the takeover
fee is that other firms have formed a conglomerate. In that case, bidder's
benefits from a conglomerate correspond to the operating profits nO (com-
puted in equation (7)) net of the conglomeration costs (fixed costs CM&A
334
plus takeover fee Ff). The opportunity cost of buying is given by the op-
erating profits the bidder would obtain by remaining independent when
there is a conglomerate in the other market, 7r P , given by (11). Under such
conjecture, the bidder surplus is
(13)
_CM&A - Ff P
-7r (a,A,{3,"(,b).
~ -7r P (a,A,(3",b)
(lIO (a,A, (3, " b) - CM&A) - (~+ 7r P (a, A, (3", b))
FK a,a,A,(3",b,CM&A)
-0 ( (17)
F~ (-) = a (lIP (a, A, (3, " b) - CM&A) + (1 - 2a) 7r I (a, A, " b), (18)
FK = -P
where -P FK ( a,a,A,(3",b,CM&A) > 0, II P ( a,A,(3",b)IS. gIven.
by
(10), and 7r I (a, A, " b) by (9). The total surplus with a single conglomerate
is STK + SRK = lI P - CM&A - 27r I •
336
Coalition
DO NOT
CD~liti~ CONGLOMERATE CONGLOMERATE
FULL PARTIAL
CONGLOMERATE
CONGLOMERATION CONGLOMERATION
PARTIAL INDEPENDENT
DO NOT
CONGLOMERATE CONGLOMERATION RRMS
(19)
337
partial conglomeration;
partial conglomeration;
independent firms,
where the pairs (V TK , V RK ) and (v T K' , V RK') denote the payoffs of the po-
tential seller and buyer of coalitions K and Kt. Expressions ne, n P, 7r P
and 7r1 are given by (7), (11), (10), and (9), respectively. Notice that sub-
tracting the opportunity costs from the Nash equilibrium payoffs yields
agents' surpluses.
ne (a, A, {3, ,,(, b) ~ ~ + CM&A + 7rP (a, A, {3, ,,(, b), where
(20)
F~ = a (ne (a, A, {3, ,,(, b) - CM&A) + (1 - 2a)7rP (a, A, {3, "(, b).
338
-=:C
F K ;: =: 1['
P( a,A,/3,,),,b). (21)
Substituting Ilk,
1['P, and n c into (20) and (21), and simplifying terms,
we get the following full conglomeration condition:
nC (a, A, /3, ,)" b) - CM&A ;: =: 21['P (a, A, /3, ,)" b). (22)
where (23)
F~ = a (np (a, A, /3, ,)" b) - CM&A) + (1 - 2a)1['1 (a, A, ,)" b).
(2') The price F~ obtained by the target should not be less than its
opportunity cost 1['1
-P 1
F K ;::=:1[' (a,A,,),,b). (24)
(3') The rivals remain independent. The relevant conditions are any of
(3'a) the second potential raider does not find it profitable to conglom-
erate
1['
)
P (a,A,/3,,),,b;::=:n C ( a,A,/3,,),,b ) -C M&A-C
-FK; (25)
(3'b) the firms that were conjectured to remain independent have to find
the sale to a potential raider unprofitable,
(30)
The full M&As equilibrium condition (22), the single conglomerate equi-
librium conditions (27) and (28), and the independent firms condition (30)
do not depend on the value of sellers' bargaining power a E [0,1]. There-
fore, the decision to merge is not affected by the distribution of bargaining
power. However, sellers' bargaining power affects the allocation of the sur-
pluses.
11
INDEPENDENT FIRMS
1 8
6.2 Simulations
The results of the simulations performed are summarized in Figures (4)
and (5). From the equations characterizing boundaries II and CC (defined
in the appendix), our simulations show that changes in the parameters are
mostly limited to shifting the curves' position up or down, keeping the
general shapes of the boundary between the two-conglomerate and single-
conglomerate equilibria illustrated in the Figures.
One typical pattern of conglomeration is depicted in Figure (4) (con-
structed for a=lO, A=7, b=l, "y = 2); the appendix contains the equations
for each boundary. Independent firms constitute the unique equilibrium
structure in the area above the curve I 1. In this area, conglomeration costs
are "too large" relative to intra-firm synergies and do not justify total M&A
costs.
Partial conglomeration arises in equilibrium when the intra-firm synergy
parameter is in the range between curves labelled II and CC. M&A costs
341
clA&A
INDEPENDENT ARMS
FULL CONGLOIAERAllON
0.84 {J
are "too large" to permit two firms to merge, but not for a firm to con-
glomerate while the other firms remain as independent firms. The duopoly
structure is maintained after the M&A, but independent firms competing
with a conglomerate always lose in comparison with the status quo (com-
pare equations (9) and (11)).
Full. conglomeration equilibria arise when the gains obtained from imple-
menting group R&D are large relative to the M&A fixed costs associated
with implementing the synergies (the area below curve CC). In this area,
the profits 'lfP of an independent firm competing with a conglomerate are
lower than the net profits obtained under conglomeration. Therefore, par-
allel M&As take place in both markets.
Figure (5) depicts the case of a low demand elasticity (high b) or a
high research cost parameter ,. It is constructed for a=lO, A=7, b=, = 2
(compare with Figure (4)). The figure illustrates the possibility that there
is a single conglomerate even if the costs of conglomeration are low and
potential synergies high (Figure 5). This paradoxical case arises when the
demand elasticity is low enough (or the research parameter high enough).
In that case, the market can only sustain one conglomerate. The reason is
that the output increase due to the coexistence of two conglomerates would
lead to a price reduction (or research cost increase) that is large enough to
preclude the two-conglomerate equilibrium.
results in lower profits than what firms could obtain in their status-quo as
independent firms. Because status quo profits do not depend on synergies
or M&A costs, comparisons between pre- and post-conglomerate gains do
not depend on the initial point on the ({3, CM&A) plane. The analysis of
gains is equally valid when conglomeration results from deregulation (with
no change in {3 or CM&A), a large enough increase of {3, or an appropriate
reduction of CM&A.
A synergy trap can allude to losses by the raider (raider's synergy trap),
by the target (target's synergy trap), both of them (joint synergy trap), as
well as to losses for the conglomerate as a whole (that is, the aggregate of
sellers and buyers lose, although not necessarily all of them). In this model,
integration losses (called the synergy paradox) result from the prisoners'
dilemma problem involved in the formation of two rival conglomerates.
The synergy trap phenomenon is not due to entrepreneurs' mistakes or
myopic behavior, and is not the result of managers acting under imperfect
information, as frequently stressed (see Sirower [1997]). Even though there
are synergy traps, firms engage in M&As in equilibrium because if they did
not integrate with another firm, they would be even worse off.
Algebraically, raider-firm synergy traps are defined by
(34)
The threshold level of sellers's bargaining power, athreshold,T, that delimits
the target's synergy trap region is obtained by substituting the takeover
343
fee given by (17), and operating profits (7), (11) and (9), into condition
(34). Solving for the target's threshold, we obtain that a seller synergy
trap occurs when
7r I - 7r P
a < athreshold,T = (35)
- lI c - (CM&A + 27r P ) ,
where athreshold,T <1 if lI C _CM&A_7r P ;:::: 7rI so that lI C _C M &A_27r P ;::::
7r I -7r P .
The model is able to generate a synergy trap when there are simulta-
neous M&As (but not when there is a single conglomerate). When both
inequalities (31) and (34) hold simultaneously, we have joint synergy traps,
that is, both targets and raiders lose. For instance, by directly calculat-
ing firms' profits with a=lO, A=7, b= "( = 2 (as in Figure (5)), f3 = 0.5
and CM&A = 0.3, it can be checked that conglomerates' profits are less
than independent firms' profits. Strategic firm interaction can generate a
synergy trap when there are two conglomerates in equilibrium because the
combination of synergistic gains and strategic firm interaction encourages
technological competition that lowers firm profits by increasing research
costs and inducing a large enough price reduction. This situation entails an
equilibrium synergy trap in which firms engaging in parallel M&As have
lower profits than in the status quo in which all firms are independent (but
higher payoffs than the endogenous disagreement payoff of competing as
an independent firm against a conglomerate).
7 Conclusions
We have presented a model of M&As leading to the formation of multiprod-
uct firms motivated by technology synergies. The model endogenizes the
industrial conglomeration structure, and examines the effects of competi-
tion between conglomerates, and competition between a conglomerate and
independent firms. There is an equilibrium synergy trap in which the prof-
its of all the firms engaging in simultaneous (i.e., parallel) M&As are lower
than in the status quo (as independent firms). Conglomeration arises de-
spite of losses, because the endogenous disagreement payoffs of the bargain-
ing problem are the profits from remaining independent while competing in
disadvantage against a rival conglomerate (rather than with independent
firms).
The analysis suggests extensions to incorporate asymmetric information,
match the dynamics of M&As waves, and consider research that creates new
products or inputs. We could thus generate alternating processes of merger
waves, demergers, and divestitures, depending on the nature of techno-
logical change (Markides [1995]). For instance, if the costs of integrating
research among new products is initially very high, incentives for mergers
could take some time to develop. Also, the extent of synergies and the evo-
lution of technology implementation costs can be endogenized and related
344
to human capital and the quality of available inputs. On the financial side,
one can consider the role of auctions, poison pills, taxes, and other mecha-
nisms and restrictions influencing the gains' allocation between sellers and
buyers, and introduce a realistic financial structure comprising shares and
debt.
Mergers and acquisitions representing technology enhancing processes
can have a significant impact on industrial concentration, firms' competi-
tive position and the vitality of industries. In the nineties, the restructuring
wave affecting computers, telecommunications, pharmaceuticals and other
technology-based industries, altered market conditions at a global scale.
The examination of the microeconomic foundations of such phenomena
might provide useful insights about the "real" basis of macroeconomic be-
havior and financial markets.
Appendix
The boundaries of the areas in Figures (4) and (5) can be derived as follows.
The equilibrium condition that characterizes a two-conglomerate structure
is given by condition (22). Substituting the firm's operating profits defined
in expressions (7) and (11) into (22), we obtain that the parameter con-
dition for an equilibrium two-conglomerate structure (the area below the
curve CC in Figures (4) and (5)) is
[9lYy - 2 (1 + ,8)2f
[9b! - 4 (1 + ,6)2]
2 (a - A)2, (3b! - 2)2 -=-_____
_________ ~ _ CM&A
>
[27b2,2 - 12b! (,62 + 2,6 + 2) + 4 (2 + ,6)2] 2
Curve I I is defined by
References
Agrawal, Anup, Jeffrey F. Jafee and Gershon N. Mandelker (1992), "The
Post-merger Performance of Acquiring Firms: A Reexamination of an
Anomaly." Journal of Finance 47, pp 1605-1621.
Bradley, Michael (1980), "Interfirm Tender Offers and the Market for Cor-
porate Control." Journal of Business 53, pp 345-376.
Bradley, Michael, Anand Desai and E. Han Kim (1988), "Synergistic Gains
from Corporate Acquisitions and their Division between the Stockholders
of Target and Acquiring Firms." Journal of Financial Economics 21, pp
3-40.
Bulow, Jeremy and Paul Klemperer (1996), "Auctions versus Negotia-
tions." American Economic Review 86(1), pp 180-193.
Collis, David J. and Tomo Noda (1993), Sharp Corporation: Corporate
Strategy. Boston: Harvard Business School Publishing.
D'Aspremont, Claude and Alexis Jacquemin (1988), "Cooperative and
Non-Cooperative R&D in Duopoly with Spillovers." American Economic
Review, 78(5), pp 1133-1137.
Dodd, Peter, and Richard S. Ruback (1977), "Tender Offers and Stock-
holder Returns: An Empirical Analysis." Journal of Financial Economics
5, pp 351-373.
Franks, Julian, Robert Harris and Sheridan Titman (1991), "The Post-
merger Share-price Performance of Acquiring Firms." Journal of Finan-
cial Economics 29, pp 81-96.
Golbe, Devra L. and Lawrence J. White (1988), "A Time-series Analysis
of Mergers and Acquisitions in the U.S. Economy," in Alan J. Auerbach
Corporate Takeovers: Causes and Consequences. Chicago: University of
Chicago Press. pp 265-307.
346
Healy, Paul M., Krishna G. Palepu, and Richard S. Ruback (1992), "Does
Corporate Performance Improve After Mergers?" Journal of Financial
Economics 31, pp 135-175.
Hoel, Michael (1986), "Perfect Equilibria in Sequential Bargaining Games
with Nonlinear Utility Functions." Scandinavian Journal of Economics
88(2), pp 383-400.
Jensen, Michael C. and Richard S. Ruback (1983), "The Market for Corpo-
rate Control: The Scientific Evidence." Journal of Financial Economics
11, pp 5-50.
Markides, Constantinos C.(1995), Diversification, Refocusing, and Eco-
nomic Performance. Cambridge, Mass., and London, England: MIT
Press.
Matsusaka, John G. (1993), "Takeover Motives during the Conglomerate
Merger Wave." Rand Journal of Economics 24(3), pp 357-378.
Morck, Randall, Andrei Shleifer and Robert W. Vishny (1990), "Do Man-
agerial Objectives Drive Bad Acquisitions?" Journal of Finance 45, pp
31-48.
Ravenscraft, David J. and Frederic M. Scherer (1987), Mergers, Sell-Offs
and Economic Efficiency. Washington, D.C .. Brookings Institution. .
Sirower, Mark L. (1997), The Synergy Trap: How Companies Lose the Ac-
quisition Game. New York. The Free Press.
Steurs, Geert (1995), "Inter-industry R&D Spillovers: What Difference Do
They Make?" International Journal of Industrial Organization 13, pp.
249-276.
Protectionism versus non-protectionism
under cost uncertainty in Cournot and
Stackelberg markets*
1 Introduction
There has been a considerable amount of research on strategic trade in the
last decade. In their seminal paper, Brander and Spencer (1985) demon-
strate that export subsidies can be welfare improving when export mar-
kets are imperfectly competitive. In most studies following Brander and
Spencer optimal strategic trade policies are shown to be sensitive to the
type of market competition, product nature and number of firms. Most re-
cently, Long and Souberyran (1997) and Bandyopadhyay (1997) show that
cost heterogeneity and demand elasticities are important determinants of
strategic trade policies. Introducing incomplete information to a Brander
and Spencer type model, Cooper and Rlezman (1989) show that optimal
policy choices depend on the amount of the noise in the demand intercept.
In particular, when the amount of noise is small, direct quantity control is
found to be optimal. However, when the amount of noise is large, export
*1 am grateful to David Collie, Bjorn Jorgensen, Semih Koray, Peter Neary, Murat
Sertel, Hakan Drbay, !;,ule Ozler and the participants of the 1996 Economic Theory
Fest in Istanbul, 1996 European Meeting of Econometric Society in Istanbul, and the
Ill. International Meeting of the Society for the Advancement. of Economic Theory in
Antalya, for helpful comments and fruitful discussions.
348
subsidies are optimal for countries with a small number of firms and export
taxes are optimal for the countries with a large number of firms. Following
Cooper and Riezman (1989), Arvan (1991) considers a tax-subsidy game
between governments under demand uncertainty. In Cooper and Riezman's
model, governments choose the policy type at the first stage and the policy
level in the second stage. In Arvan's model, choices can be made before
or after observing the demand intercept. Hence, the outcome is gener-
ally asymmetric (except the case where industry concentration is identi-
cal between the countries). One government acts first, like a Stackelberg
leader, and makes its choice before observing the demand intercept. The
other government acts as a follower choosing its policy after making the
observation. Shivakumar (1993) considers both subsidies and quotas in a
model similar to Arvan's. He shows that quotas are preferable for both
countries in a duopolistic international market. The timing of the policy
depends on the noise in the intercept. Hwang and Schulman (1993) intro-
duce non-intervention, as a distinct policy choice, into Cooper-Riezman's
model. They show that although non-intervention does not arise as a Nash
equilibrium, including it as an explicit policy option changes (some of) the
results of Cooper and Riezman. Qui (1995) investigates the effects of non-
linearity of policies by endogenizing the firms' choices of strategic variables
(quantities or prices) under market uncertainty.
Most of the studies in strategic trade policy literature deal with de-
mand uncertainty. However, only very few studies consider cost uncertainty.
Maggi (1992) and Qui (1994) are among these few studies. Maggi (1992)
considers non-linear policies and shows that when governments do not know
the costs of their domestic firms, the strategic trade policy game results in
a higher output and lower profits in comparison to a complete informa-
tion game. Qui (1994) considers screening and signalling problems in the
policy game. He shows that the government chooses an information reveal-
ing menu policy under the Cournot competition, but an information con-
cealing uniform policy under the Bertrand competition. In a recent study,
Brainard and Martimort (1997) also investigate the screening effect when
governments propose menus of linear contracts to the firms depending on
their cost declarations.
This paper also focuses on cost uncertainty. Our model differs from the
above models in several dimensions. First, we introduce home consumption
by letting two countries trade between themselves. Second, the governments
have full information about domestic firms' costs but have incomplete in-
formation on foreign firms' costs. In contrast, in both Maggi (1992) and
Qui (1994), governments have incomplete information on domestic firms'
costs, and foreign firms' costs are either common knowledge or not im-
portant for countries' trade policy choices. We argue that, in reality, it is
relatively easier to obtain information about domestic firms compared to
foreign firms. In our model, it is publicly known that homogeneous prod-
ucts can be produced with either low constant marginal cost technology
349
2 The Model
In this paper, we assume that there is one firm located in each of two
countries. Firms produce a homogeneous good and sell it in the domestic
350
and foreign markets. The constant marginal costs can be either high or
low. Formally, firm i's marginal cost is represented by Ci which is a random
variable that can take values Cl and Ch where Cl < Ch. We assume that
Ci and Cj are independent and identically distributed and that each has a
probability distribution represented by the vector IL = (ILL, ILh) where ILL and
ILh are the respective probabilities of Ci = Cl and Ci = Ch. For simplicity,
fixed costs and transportation costs are assumed to be zero. Country i's
publicly known inverse demand function for the homogeneous good is
(1)
3 Protectionist Policies
In this section, we consider an environment where countries are not en-
gaged in a free trade agreement to prevent intervention. We assume that
each country has two policy choices: taxing imports and subsidizing ex-
ports. 3 Furthermore, each government knows only the marginal cost of the
domestic firm. At the first stage governments select the policy types and
at the second stage they choose its level. In between these two stages, the
costs of the foreign firms are revealed. Then, at the third stage firms make
their production decisions. Figure 1 represents the timing of these events.
Note that firms decide under full information. Thus, the profit of firm i
1 The tilde is dropped to represent the realized value of the random variables.
2We will only consider the region where et/ (3 :'S 2 throughout the paper, because when
et/(3 > 2, an inefficient firm can not survive in the simple Cournot market. (Note that
subsidies or the leadership advantages may relax this condition)
3 Of course, governments could use both policies together. However, we keep the model
as simple as possible ill order to see the effects of the cost uncertainty on each policy
choice more clearly. Obviously, the next step should include a wider range of policies
including mixed policy choices.
351
can be written as
2B· - B· - sj +
. = _'_--::..J-::--_ ti
__
x~
, 3 (3)
(6)
where
i-i(B. B.) _ t i (2B j -Bi +2si _2ti)
t Xj J' , - 3
is the import tax revenue and
is the export subsidy loss. Governments choose one of the two policies si
and t i and compute the welfare W (B i, Bj) setting the other policy variable
to zero. The Nash equilibrium policy levels are described in the following
three equations: 4
The 92timal policy levels are obtained by maximizing social welfare func-
tion W i (Bi' Bj), at the above Stackelberg equilibrium. The optimal tax lev-
els presented below are respectively for the following three scenarios: (i)
both countries impose export subsidies, (ii) both countries impose import
taxes, and (iii) country i imposes export subsidy and country j imposes
import tax.
( ~ -;:;j) = (3Bi - 2B j 3B j - 2Bi)
8,8 3' 3 '
( -,i -j) = (7B j - 2Bi 7Bi - 2B j )
t ,t 19' 19 '
( ~ +:i) = (18Bi -16B j 21Bi -lOBj )
8 ,t 39' 39 .
Some of the results of the Cournot case are robust when the domestic
firms are Stackelberg leaders. Countries continue to give higher subsidies
to the more efficient domestic firms independent of the policy choice of the
foreign government (import tax or export subsidy). When both countries
impose import taxes, however, the result is slightly different. Specifically,
the efficiency level of domestic firm plays a role in determining the level
of import tax. The higher the domestic firm's efficiency the lower is the
import tax level. In Tables 5 through 8 (located at the end of the paper)
we present the social welfare levels of the trade policy game at the above
optimal policy levels.
4 Non-protectionist policies
In this section, we consider an environment where governments can not pro-
tect their firms due to a free trade agreement. They can only impose excise
taxes (or subsidies) without distinguishing the country of origin. In this
environment, the policy choice and level choice stages of the policy game
shrink to one stage. The decisions about the amount of the excise taxes
to be imposed are made before the cost information of the foreign firms is
revealed. The intuition behind this assumption is that before engaging in
a free trade agreement, countries need to know all of the industrial policies
imposed in the partner country. Therefore, countries have to declare their
policy levels before signing the agreement. Under these circumstances, the
social welfare function of the country i at the Cournot market and Stack-
5 A type contingent strategy is defined as a mapping from the type space to the
strategy space.
6This result resembles Neary (1994)'s result, where governments give higher subsidies
to the lower cost firms.
7Net welfare gains are profit gains of the domestic firms plus the tax revenue minus
the consumer surplus losses.
355
(13)
(14)
respectively, in the Cournot and the Stackelberg markets. Maximizing
Eqns. (13) and (14) with respect to vi of country i and country j, under
each different market structure, we obtain the following dominant strategy
equilibrium excise taxes for the countries with efficient and inefficient firms
for Cournot and Stackelberg markets, respectively:
It is easy to see from (15) and (16) that if the domestic firm is efficient
the government chooses to subsidize both domestic and foreign firms in-
stead of taxing them. However, if the domestic firm is inefficient taxing
both firms is always a better policy choice with one exception. This excep-
tion is the case where the domestic firm is a Stackelberg leader and the
cost disadvantage or the probability of facing an efficient foreign firm is
sufficiently low. The intuition behind this result is as follows. Subsidizing
both firms creates welfare gains by increasing consumer surplus due to the
increase in output, and by increasing domestic firm's profit. Obviously, the
total subsidy given to the foreign firm is a loss. When the domestic firm
is efficient, the foreign firm's expected market share is low and thus, the
subsidy loss is not as high as the gains. On the other hand, taxing both
firms creates a gain through the tax revenue, but the effects of taxes on
consumer surplus and the domestic firm's profit are both negative. Since
356
these negative effects of taxation are pronounced for the countries with effi-
cient firms, subsidization is a better policy choice. When the domestic firm
is inefficient, the foreign firm has a larger market share, and therefore, tax
revenues obtained from the foreign firm becomes higher. However, in the
case of subsidization, the loss through the subsidy given to the foreign firm
is much more pronounced. As a result, taxation turns out to be a superior
policy to subsidization. The reason that subsidization can still be a better
policy in the Stackelberg market is because of the domestic firm's lead-
ership advantage. This advantage is bigger when the cost disadvantage of
the domestic firm is not substantial or the probability of facing an efficient
foreign firm is not high (i.e., a - (3 or J..L1 is sufficiently low). In sum, when
the domestic firm is efficient, subsidizing firms is a superior policy choice
to imposing taxes. However, when the domestic firm is inefficient, imposing
excise taxes becomes a better policy choice under most circumstances.
an efficient foreign firm, and ~ is higher than the threshold values for the
relevant markets.
Most of the previous strategic trade studies do not consider non-interven-
tion in their models other than the zero equilibrium subsidy/tax rate. Dif-
fering from the others, Hwang and Schulman (1993) treat non-intervention
as a distinct policy choice and show that bilateral non-intervention never
arises as a Nash equilibrium outcome of the policy game. However, under
some equilibrium conditions, one country subsidizes exports while the other
does not protect its firms. Contrary to their findings, our results indicate
that free trade is preferred to intervention in most cases. The difference in
results is not surprising if one considers that our model includes domes-
tic consumption and non-intervention, as a result of a bilateral free trade
agreement. Furthermore, in our free market environment, governments are
able to impose a tax or a subsidy in their domestic markets without dis-
tinguishing the country of origin of the firms.
6 Concluding remarks
Strategic trade literature is criticized for being extremely dependent on
the assumptions of the models. For instance, the number of firms and the
market structure are very effective determinants of policy choices. This
dependency on assumptions prevents the results from being of use for pol-
icy makers. Obviously, it is not easy to get information about the market
structure or even about the number of firms, especially if the policy makers
need to know the exact number of foreign firms. Some economists suggest
that it is very likely that a wrong policy will be chosen due to lack of in-
formation. This paper shows that, in fact, being engaged in a free trade
agreement might be the best thing to do for the governments unless the
domestic firms are very inefficient.
As with most of the models in economics, our model has its own limita-
tions. Restricting ourselves to the two type case is one limitation. However,
our intuition suggests that extending the model from the two type case to
a case with continuum of types should not affect the general results. On
the other hand, if we stick to the two type case but increase the number
of firms in each country, the only likely effect will be on the threshold for
intervention. Preferring intervention for a country might require an addi-
tional restriction on the number of firms besides the restriction on the ratio
of efficiencies. The robustness of our results to changing the market struc-
ture from quantity competition to price competition is not clear. Previous
studies show that market structure is important in choosing the optimal
trade policy. For this reason, it might be worthwhile to extend the model
to Bertrand competition to check the sensitivity of our results. Increasing
the policy options of our governments is another possible extension for a
further research agenda.
359
Appendix
Equilibrium analysis of the trade policy game
-==i .. ...-......
We denote W {p~, p3 j ()i,()j), W~{P~, p3 j ()i,()j) as the ex post stage welfare
levels of Country i, in Cournot and Stackelberg m~kets respectively. pi
and pj represent the policies chosen by Country i and Country j and ()i
and ()j are the efficiencies of the domestic and foreign firms.{Note that
these expost stage welfare levels are given in Table 1 through Table 8).
The following conditions are necessary and sufficient for (TT, TT) to be
a Bayesian Nash Equilibrium (BNE) of the policy game in the Cournot
market and Stackelberg market.
=i i=i =i =i
J1.1 W (T, Tj a, a) + J1.h W (T, Tj a, (3) ~ J1.1 W (8, Tj a, a) + J1.h W (8, Tj a, (3)
(17)
W i (T, Tj f3, a)
J1.1 = + J1.h=1.
W (T, Tj f3, (3) ~ J1.1 = 1.)
W (8, Tj f3, a + J1.h =1.
W {8, Tj f3, f3 )
(18)
J1.1 Wi{T, Tj a, a) + J1.1 Wi{T, Tj a, (3) ~ J1.1 Wi{8, Tj a, a) + J1.h Wi{8, Tj a, (3)
(19)
Conditions (17) and (19) are for the country with an efficient firm in
the Cournot and Stackelberg markets respectively. After substituting the
relevant welfare levels from Table 1 through Table 8, these conditions can
be reduced to
(28)
Free trade is better for country i with an inefficient firm in the Cournot
market if
=-=i -=-=i =-=i
W n(6) > 111 W (T, T; (3, ex) + I1h W (T, T; (3, (3).
This condition reduces to
r2( -9111 + 1811f) - r(66111 + 3611~) + 1811~ + 75111 + 14 0
324 > .
Let us denote the left hand side of the above condition as f(r). The roots
of f(r) = 0 are
If ILL < ~ then f(r) is a concave function of r, and k1(ILI) < 0 and k 2(ILI) >
1. Thus, f(r) > 0, iff r < k2(ILI)' If ILL > ~ then f(r) becomes a convex
function of r , k2(ILI) < k 1(111) and k1(ILI) > 2. Therefore, again f(r) > 0,
iff r < k 2(ILI)'
Free trade is better for the country i with an inefficient firm in the Stack-
elberg market if
which reduces to
g(r) is always a convex function of r. If ILL > 91~;90~2136:5 ~ 0.11, k1(ILI) >
k2(ILI)' Thus, g(r) > 0 iff r < k2(ILI) or r > k1(ILI)' Since k1(ILI) > 2 ,
the constraint r > kl (ILL) is not binding. If ILL < 0.11, then 2 < kl (ILL) <
k 2(ILI), thus, g(r) > 0 always holds. Therefore, we can say that g(r) > 0 if
r < k2(ILI) or ILL < 0.11 . •
362
Strategies Payoffs
(8,8) (15a 2
32 '
15( 2 )
32
(8,T) (101a 2
294 '
449( 2 )
882
(T,8) (449a 2
882 '
101( 2 )
294
Strategies Payoffs
(35a 2 -36a§+16§2 16a 2 -36a§+35§2)
(8,8) 32 , 32
(195a 2-170a§+76§2 422a 2 -878a§+905§2)
(8,T) 294 ' 882
(113a 2-102a§+54§2 54a 2 -102a§+113§2)
(T,8) 162 ' 162
(905a 2 -878a§+422§2 76a 2 -170a§+195§2:)
(T,T) 882 ' 294
Strategies Payoffs
(16a 2-36a§+35§2 35a 2 -36a§+16§2)
(8,8) 32 , 32
( 76a 2-170af3+ 195f32 905a 2 -878af3+422f32 )
(8,T) 294 , 882
( 54a 2 -102a§+ 113132 113a 2 -102a§+54§2 )
(T,8) 162 , 162
Strategies Payoffs
(8,8) ( 15f32 15f32)
32 ' 32
Strategies Payoff
(S,S) ( 1220<2 -1560<IH69{32 690<2 -1560<{3+ 122{32 )
72 , 72
Strategies Payoff
(S,S) (690<2_1560<{3+122{32 1220<2_1560<{3+69(32)
72 , 72
Strategies Payoff
(S,S) ( 35{32 35(32)
72 ' 72
References
Arvan, L., "Flexibility versus Commitment in Strategic Trade Policy Un-
der Uncertainty: A Model of Endogenous Policy Leadership," Journal of
International Economics, 1991, 31,341-355.
Bandyopadhyay, Subhayu, "Demand Elasticities, Asymmetry and Strategic
Trade Policy," Journal of International Economics, 1997, 42, 167-177.
Brainard, S. Lael and David :Martimort, "Strategic Trade Policy with In-
completely Informed Policymakers," Journal of International Economics,
1997, 42, 33--{)5.
Brander, J. A. and B. J. Spencer, "Export Subsidies and International
Market Share Rivalry," Journal of International Economics, 1985, 18,
83-100.
Cooper, R. and R. Riezman, "lincertainty and Choice of Trade Policy in
Oligopolistic Industries," Review of Economic Studies, 1989, 56, 129-140.
Eaton, J. and G. Grossman, "Optimal Trade and Industrial Policy Under
Oligopoly," Quarterly Journal of Economics, 1986, 101, 383-406.
Hwang, H.S. and C.T. Schulman, "Strategic Non-intervention and the
Choice of Trade Policy for International Oligopoly," Journal of Inter-
national Economics, 1993, 34, 73-93.
Long, Ngo Van and Antoine Soubeyran, "Cost Heterogeneity, Industry
Concentration and Strategic Trade Policies," Journal of International
Economics, 1997, 43, 207-220.
Maggi, G., "Strategic Trade Policy under Asymmetric Information," 1992.
Stanford University mimeo.
Neary, P. J., "Cost Asymmetries in International Subsidy Games: Should
Governments Help Winners or Losers?," Journal of International Eco-
nomics, 1994, 37, 197-218.
Qiu, Larry D., "Optimal Strategic Trade Policy Under Asymmetric Infor-
mation," Journal of International Economics, 1994, 36, 333-354.
Qiu, Larry D., "Strategic Trade Policy under Uncertainty," Review of In-
ternational Economics, 1995, 3 (1), 75-85.
Shivakumar, R., "Strategic Trade Policy: Choosing Between Export Sub-
sidies and Export Quotas Under Uncertainty," Journal of International
Economics, 1993, 35, 169-183.
The canonical extensive form of a game form:
symmetries
1 Introduction
This paper is the first part of an investigation which is devoted to the
study of the relationship between a game in strategic form and its possible
representations by extensive games. (A representation of a strategic game
G is an extensive game r whose normal form is G.) We should emphasize
that our starting point is a game in strategic form. The transition from the
extensive form to the strategic form as defined by von Neuman and Morgen-
stern (1944) has already been investigated extensively (see Kohlberg and
Mertens (1986) for a recent treatment of this topic). The transition in the
opposite direction is considered "trivial" and conceptually straightforward.
It is the purpose of our work to show that this is not true: The choice of a
method of representation of strategic games by extensive games which re-
spects symmetries of strategic games leads to difficult conceptual problems
368
C 8 C S
(See, e.g., Myerson (1991, p.98) for a verbal description of the game.)
Here C is going to a concert and S is going to a soccer game. Player 1 is the
wife and player 2 is the husband. There are two potential focal equilibria
in this game: (C,C) and (S,S) (see the beautiful discussion in Myerson
(1991, Section 3.5)). Now, according to the present standard convention of
game theory one can represent G by an extensive game in the following two
different ways (see Figure 1).
The foregoing convention which leads to multiple representations has the
following two problematic aspects:
(1) The transition to the extensive form might influence focality. Consider
the extensive game r 1. It is common knowledge in this game that
player 1 moves first. Therefore she has the option to choose C before
player two makes his choice. Thus, it seems to us that in r 1 the pair
(C, C) of strategies is more likely to be played than (8,8). Our feeling
is supported by the experimental work of Rapoport (1994). Clearly,
in r2 the pair (8, S) may be the dominant focal equilibrium rather
than (C, C).
(2) The transition to the extensive form may destroy symmetry. The
game G is "symmetric" in the following sense: It has an automor-
phism, which permutes players 1 and 2 (for a definition of automor-
phism, i.e., an isomorphism of G to itself, see Harsanyi and Selten
(1988, Section 3.4)). This automorphism is given explicitly in our
369
(2) Given a "square" n-person strategic game form, that is a game form
with the property that all the players have the same number of strate-
gies, it is not clear how to find for it a minimal and faithful represen-
tation. (Observe that a square game form allows for complete sym-
metry between the players.) When the number of players is greater
than two, then there is no obvious solution to problem of representing
square game forms. Indeed, we started with the simplest ("atomic")
representations of square game forms and built "symmetrizations" of
such "atoms" in order to obtain faithful (Le., symmetry-preserving)
representations.
We now review the contents of the paper. Game trees and their isomor-
phisms are presented in Section 1. Isomorphisms respect all partitions as
well as the partial ordering of the tree. Section 2 introduces strategic and
extensive preforms. A strategic preform specifies only the set of players
and the strategy sets. Extensive preforms, similarly, specify only the set of
players and the game tree. The definitions of strategic and extensive games
and game forms are also reviewed in Section 2.
Isomorphisms of strategic and extensive preforms, game forms, and
games are introduced in Section 3. Our definition of isomorphisms of ex-
tensive games seems to be new. An automorphism of a game G is called
motion. A symmetry of G is a permutation of the players that is applied
by some motion. After defining formally the symmetry group of a game we
present some results on existence of symmetry groups.
371
2 Prerequisites
The structure of strategic games and game forms will be discussed in Sec-
tion 2. As for extensive games and forms some prerequisites are necessary
which we will deal with presently. Most readers familiar with the topic
could just browse or entirely skip this section.
We start out with a pair (E, -<) where E is a finite set (the nodes) and
-< is a binary relation on E such that (E, -<) is a tree. The root of the tree
is denoted by xo, the generic element is ~ and the set of endpoints is BE.
A play is a sequence
Q E Q, Q ~ Po =} Q = {O for some ~ E E.
We will refer to the structure (E, -<, P, Q, C,p) as a game tree. In addi-
tion we shall omit Q or p, if P = Q or Po = 0, respectively. That is, we
simplify the notation accordingly, if players have but one decision or there
are no chance moves.
Now we continue by defining various operations to be performed on game
trees. To this end let (E, -<) and (E', -<') be trees and consider a bijective
mapping 4> : E ---- E'.
We shall say that a bijective mapping 4> respects (-<, -<') if
(3)
holds true.
Similarly, if P and pI are partitions of subsets B of E and B' of E',
respectively, then we shall say that a bijective mapping 4> respects (P, PI)
if, for all pI E pI it follows that 4>-l(p l ) E P and also 4>-1 (B') = B hold
true.
Thus, if we want to consider game trees, it is clear in which way a map-
ping respects the player partition and the information structure. To respect
the decision structure is a property defined in a straightforward way.
373
Definition 2.1 A game tree (E, -<, P, Q, C,p) is isomorphic to a game tree
(E' , -<' ,P', Q', c' ,p') if there is a bijective mapping c/J : E ~ E' (an
isomorphism between the game trees) which satisfies the following proper-
ties:
(3) For Q E Q the mapping c/J respects (C(Q), C'(Q')), where Q' E Q' is
the unique information set which satisfies c/J( Q) = Q'.
Note that (2) makes sense in view of (1), the bijectivity of c/J, and the
underlying tree structure.
Thus, the strategic preform determines just the players and the domain
of the payoff functions to be completed later.
Analogously, the extensive preform is described by an environment as
follows:
where N is as in Definition 3.1 and the next six data have been described in
Section 1. Moreover, [ : P - {Po} --t N is a bijective mapping; [ assings
the nodes of PEP - {Po} to [(P) E N, naturally we use [-1 (i) = Pi to
refer to these nodes.
such that
(7)
where Ui is player i's utility function or payoff function.
such that
(9)
375
a C 00
Remark 3.5 Of course there is a close relation, between games and game
forms. Formally, if g and'Y are (strategic and extensive) game forms and
U: A ---+ /RN
7r : N ~ N, 'Pi : Si ~ S~(i) (i E N)
such that
holds true.
Now turn to extensive preforms. Here, we want to rename not only the
players but also the nodes of the graph. Clearly, the decision structure as
well as the information structure should be preserved. But, in addition,
as we have made it clear in Section 2, the "order of play" should not be
disturbed. Thus we come up with the following:
377
Thus, we write
Definition 4.3 Let 9 = (e; A, h) and g' = (e ' ; A', hi) be strategic game
forms. An isomorphism of 9 and g' is a triple (-rr, <p; p) such that (-rr, <p) is
an isomorphism between e and e' while p : A - t A' is a bijection satisfying
BE BE'
'TJ 1 1 'TJ'
A ~ A'
Finally let us turn to games. Of course the procedure is now familiar, all
we have to do is to explain the kind of action a permutation (renaming) of
the players formally performs on n-tuples of utility functions, i.e., on u or
v, respectively.
Clearly, if (Jr, cp) is an isomorphism between the strategic preforms e and
e', and u and u' are tuples of utilities defined on Sand S', respectively,
then the utility of i's image 7r( i) E N should be given by
(16)
thus indicating that we rename players and strategies simultaneously.
This defines the action of the pair (Jr, cp) on tuples of utility functions via
(18)
Analogously, within the extensive set-up, if we have an isomorphism
err, r/J) of preforms E and E' , cf. Definition 4.2, and if v : aE
- t JRN is
a utility N-tuple defined on the endpoints of (E,-<), the action of (7r,r/J),
i.e.,
(19)
is given by
(20)
Thus we have
Definition 4.5 (1) Let G = (e; u) and G' = (e'; u') be strategic games.
An isomorphism between G and G' is a pair (7r, cp) such that (7r, cp) is
an isomorphism between e and e' (see Definition 4.1 and (14)) and
u~(i)(cp11"(s)) = Ui(S) (i E N, sE S). That is, we have
(7r, cp)G = (7r, cp)(e; u) = ((7r, cp)e; (7r, cp)u) = (e', u') (21)
(2) Let r = (E,V) and r' = (E', v') be extensive games. An isomorphism
between rand r' is a pair (7r, r/J) such that (7r, r/J) is an isomorphism
between E and E' (see Definition 4.2) and v~(i)(r/J(~)) = Vi(~) (~ E
aE, i EN). That is, we write
(7r, r/J)r = (7r, r/J)(E; v) = ((7r, r/J)E, (7r, r/J)v) = (E', v') (22)
(7r,cp)G=G
holds true. However, this approach will not work appropriately. Keep in
mind that we want to speak about symmetries with respect to players, for
good reasons a rearrangement of the order of the of strategies is irrelevant.
The reader is referred to the introduction for a discussion of this viewpoint.
380
Example 4.6 (1) The "Battle of the Sexes" represented by the following
pair of matrices
(23)
allows for two "symmetries '. Consider the automorphism (7r, 'P) given
by 7r = id, 'Pi = id (i = 1,2) as well as the one given by 7r : 1 ~
2 ~ 1 and 'Pi(Si) = 3 - Si (Si E Si = {1, 2}).
(2) If G is indicated by
(24)
then we feel that there are absolutely no symmetries with respect to the
players. Nevertheless, there are nontrivial automorphisms of G, e.g.,
7r = id combined with 'Pi : Si ~ Si, i.e., 'Pi : {1, 2, 3} ~ {1, 2, 3} ,'PI:
1 ~ 2 ~ 3 ~ 1 and 'P2 = id, i.e., if player 1 renames his strategies
it does not change the game but this exhibits no "symmetry" of the
game.
Thus, automorphisms cannot be "symmetries" and "symmetries" should
disregard the pure rearrangement of strategies which does not involve inter-
changing players. Or more to the point, if we rename players and strategies,
the "symmetry" involved should only reflect the "essential" similarities of
players.
Definition 4.7 A motion of a strategic game G is an automorphism (7r, 'P)
of G. A motion (7r, 'P) is impersonal if 7r is the identity (and 'Pi : Si ~
Si(i EN)).
Remark 4.8 It is not hard to see that motions enjoy the structure of a
group. Indeed, if (7r, 'P) and (0", 1/J) are motions of a strategic game G, then
define 1/J ® 'P via
(25)
such that
('P ® 1/J)i : Si ~ SU(7r(i» = Suo7r(i) (i E I). (26)
The product of (7r, 'P) and (0", 1/J) is then
Then CP'T : ST --t S1T(T) and CPN\T : SN\T --t S1T(N\T) are bijections and for
each i ET,s EST, and t E SN\T
holds true.
Hence, for a E ~(ST) and r E ~(SN\T) we obtain
L a(s)r(t)ui(S, t) =
L L L a(s)r(t)ui(S, t) = L ui(a, r)
iET SEST tESN\T iET
L Ui(cpT(a) , CPN\T(r)).
iE1T(T)
Therefore it follows that
max
<7E~(ST)
mm
TE~(SN\T)
L Ui(cpT(a), CPN\T(r)) =
iE1T(T)
max
aE~(S"'(T)
min
TE~(S"'(N\T)
L Ui(o-, f) = v(1l'(T))
iE1T(T)
holds true in view of the fact that CPT and CPN\T are bijections. •
383
r 1 r
(~~) (~n
t
small
b
(30)
1 r r
(:~) (;~)
t
BIG
b
The symmetries of the Battle of the Sexes are to some extend revived
within this example; player 2 may play his role in the "small" version of a
modified Battle of the Sexes as well as player 1 in the "BIG" version.
More precisely, there is a (personal) motion (7r, 'P) given by 7r : 1-t
1 , 2 -t 3 -t 2 , 'PI : BIG -t small -t BIG; 'P2: t -t r , b -t 1 ; 'P3 :
r -t t , 1 -t b, which leaves G untouched. This motion involves player l's
exchange of strategies. It can be seen that the only further motion is (id, id)
(one cannot exchange player 1 with any of the others and exchanging the
others, while player 1 remains fixed requires the above 'P)'
Thus, the quotient group is {id, 7r} or, loosely speaking, "players 2 and
3 are symmetric". Thus, motions have to be incorporated in the definition
of symmetries but, as the next example shows, this is not a sufficiently
comprehensive definition depending on the context.
On the other hand consider the following example where a strategic game
G for 2 players is indicated by
384
1 2 1 2
1 1
2 2
then (1r, cp) EM. (Here and in the sequel we use n =1 NI.)
385
Proof. By (32) and (33) for each (i,s) E B there exists (T,p) E M such
that (T(i), pT(S)) = (1I"(i) , <p7r(s)).
Hence,
U7r(i) (<p7r(s)) = UT(i)(pT(S)) = Ui(S),
that is, (11", <p) is a motion of G. •
We now prove the converse result. Let e = (N,8) be a strategic preform.
A transformation of e is an (n + 1)-tuple (11", <p) of bijections, 11" : N --+
N, <Pi : 8 i --t 87r( i) (i E N), that is, it is an automorphism of e. Denote by
Aut( e) the group of all transformations. For H C Aut( e) we define'" H by
32 (with M replaced by H). Similarly, H is covering if each (11", <p) E Aut(e)
that satisfies
(1I"(i) , <p7r(s))"'H(i, s), for all (i, s) E B, (34)
is a member of H.
Theorem 4.18 If a subgroup H C Aut(e) is covering, then there ex-
ists a vector u H of payoff functions for e, u H : 8 --t RN, such that
M(N,8;u H) = H.
Proof. Let It, ... , h be the equivalence classes of "'H. Choose real numbers
Cl < ... < Ck and define u H : 8 --t RN by Ui(S) = Cl if (i,s) Eh
Example 4.19 Let N = {I, ... , n}, and 8 1 = ... = 8 n = {I, ... , l} where
2 S l S n - 2. Denote by An the group of even permutations of N. Then
We shall prove that H* is covering. Indeed, let (7r,(ipl, ... ,ipn)) satisfy
(7r,ip7r(s))""'"'H.(i,s) for all (i,s) E B. Consider a pair (i,sm) where i E N
and Sm = (m, ... , m). By assumption
(7r(i), ip7r(sm)) = (7r(i) , (ip7r-1(1) (m), ... , ip7r-1(n) (m)) ""'"'H. (i, sm)
for all i EN. Therefore ip7r-1(i)(m) = m for all i E Nand 1 ~ m ~ l.
Thus ipl = ... = ipn = id. Now choose (i, s) = (n, (1,2, .... , n - 1, n - 1)).
By our assumption there is fr E H such that
References
van Damme, E. (1987). Stability and Perfection of Nash Equilibria.
Springer-Verlag, Berlin.
Harsanyi, J.C. and Selten, R. (1988). A General Theory of Equilibrium
Selection in Games. MIT Press, Cambridge, Mass.
Kohlberg, E. and Mertens, J.-F. (1986). "On the Strategic Stability of
Equilibria". Econometrica 54, 1003-1037.
McKinsey, J. (1952). Introduction to the Theory of Games. McGraw-Hill,
New York.
Myerson, R.B. (1991). Game Theory. Harvard University Press, Cambridge,
Mass.
von Neumann, J. and Morgenstern, O. (1944). Theory of Games and Eco-
nomic Behavior. Princeton University Press, Princeton.
387
1 Introduction
Bargaining does not take place in a vacuum, but rather in a changing
environment. The opportunities available to players if they decide to quit
bargaining change, and the options' known or uncertain characteristics also
may vary over time. In this paper we provide insight on how bargaining
develops in changing environments by analyzing a bargaining game where
both players enjoy outside options of uncertain value that arise and cease
to be available over time.
We will first argue that the relevant attribute of an outside option is
the time by which its value is revealed rather than the time up to which
it is available. Second, we will show that a random outside option is po-
tentially worth much more - and never less - than its straight expected
·We have benefited from the comments and suggestions of two anonymous referees on
an earlier version of this work. Support to Ponsati through research grants PB-96-1192
from nGCYT and SGR-96-75 from CIRIT and to Sakovics through HCM program of
the EC contract CHRX-CT94-0489 "Games and Markets" and from nGCYT through
grant PB93-0679 is gratefully acknowledged.
390
value. Third, we will prove that, rather than being caused by threats, de-
lays might be caused by the bargainers' waiting for their outside option
to become available and/or to reveal its value. Finally, we will point out
that the prospect of several future outside opportunities is not necessary
better than the prospect of a single one, since as additional outside options
appear the strategic advantage of the original ones may decrease.
Here we propose a sample of four stylized bargaining stories consistent
with the distinctive elements of our model, i) that the value of outside
opportunities is uncertain, ii) that both players enjoy the possibility of
these opportunities, and iii) that strategic capabilities depend crucially on
the dates the options appear and mature and on the dates uncertainties
are removed.
2) Sports: Soccer Star A bargains over his contract with team B while
he is also waiting to hear an offer from another team next week. Medical
reports on another player are also due next week. Depending on these
medical reports, the alternative player will or will not be fit to play as
a perfect substitute of A. Agreements must take place before the season
starts in two weeks.
3) Home-ownership: Buyer B and seller S are negotiating over the sale
of S's home. There is another house that B likes but its owner is away on
a trip until next week. S has an appointment with another potential buyer
also next week.
4) Exclusive vs. standard designs: Two firms, F and f, bargain over a con-
tract that could make f the provider of an exclusively designed component
in F's production. There is a competitive market for standard components
where F and f can buy and sell respectively. Both firms can adapt their pro-
duction to standard or exclusively designed components, but not to both.
Both firms have complete information on the costs and benefits of the ex-
clusive design alternative. In contrast, there is uncertainty on how well the
standard design adapts to F's needs, and there is uncertainty on f's costs
to produce the 'standard' component. The technical departments at both
firms are carrying out research to remove this uncertainty and their reports
are due on day D.
With uncertainty about the sizes of the outside options, as in all our
bargaining stories, the most relevant question is: When does the uncertainty
resolve? A moment of reflection suffices to see that if it is never resolved
391
then -in the absence of risk aversion 1_ the uncertain options would be
strategically equivalent to fixed options with a value equal to the expected
value of the former ones. Therefore, a crucial element of our model is the
revelation date, a parameter which gives the time period at the beginning of
which the uncertainty is resolved, via a random draw according to the prior
distribution. In addition, we introduce two more dates that are significant
in an option's life: the first date it is available and the last period in which it
can be taken, its maturity date. Moreover, in a bargaining situation which
is symmetric - in the sense that both parties can make proposals - we find
it more realistic that both players be offered outside opportunities. Moving
from one-sided to two-sided outside options has dramatic effects2 and the
combination of uncertainty and two-sided options yields results that are in
sharp contrast with the earlier results of Shaked and Sutton (1984) (where
the "outside option principle" 3 was formulated) and Shaked (1994)4, where
one-sided, certain outside options are added to a Rubinstein game.
The maturity date makes our model practically finite, since the subgame
following it is the original Rubinstein game, which has a unique subgame-
perfect equilibrium. This makes possible the use of backward induction to
resolve the game, yielding a unique solution despite the two-sided options
environment. We show that, apart from this important conceptual effect
- as long as it is posterior to the revelation date - the magnitude of the
maturity date is irrelevant.
The outside options affect the nature of equilibrium in several ways.
Players can take their outside options before their values are revealed if
their distributions are sufficiently attractive, for the outside option's value
is not discounted after it is selected. Further the players may wait to learn
their outside option before negotiating. Finally, even a mid level outside
option value may lead to an extreme division of surplus. Once it is credible
for the proposer to accept her outside option after the current period, then
the responding player accepts any offer equal to her reservation value or
1 Although the effect risk attitudes on the play of the game is certainly of interest, in
this paper we assume risk neutrality, and concentrate on the strategic relevance of an
"ill-specified" threat without considering the risks involved.
2In Ponsati and Sakovics (1998a) we make this point in a model without uncertainty.
3 This principle says that unless the solution without the possibility of opting out
gives a lower payoff to one of the players than her outside option, the outside options
do not affect the outcome of the negotiation. Note that as Sutton (1986) and Dalmazzo
(1992) show, the OOP does not hold in such a neat way if the model is augmented by
an exogeous risk of breakdown or a shrinking cake. However, it is generically true that
the outside options cannot be identified with the disagreement point.
4He shows that if it is the proposer who can threaten to take his outside option,
the strategic consequences are markedly different because if the outside option exceeds
his continuation value in case he does not leave the game he can appropriate the entire
surplus, by making a take-it-or-leave-it offer. Thus, there exist a range of outside options
(strictly between zero and one) for which there exist multiple equilibria.
392
better.
The main insight of our model is that an uncertain outside option has
many of the properties of a stock option. The strategic value of the outside
option is a function of the right-tail of its cumulative distribution. The
distinction between outside options and stock options is that an outside
option is never exercised (if the values of the outside options leave room for
surplus), so that the exact value of the outside option is not important so
long as it is above a threshold to make its acceptance a credible threat. The
potential for exercising an option at a later date if its value is sufficiently
large increases the payoff for a given player in any agreement.
As an extension, we examine the case when a player can choose among
several outside options. Our main findings here are that whether an option
has an effect on the outcome depends exclusively on the upper end of the
support of its distribution and that the presence of an alternative option
decreases the strategic value of a given outside opportunity.
A complementary, more general, motivation for our work is the obser-
vation that in the real world many "games" are played at the same time
(possibly involving the same player in multiple games) and therefore the
evolution of game A has direct effects on a player's preferences (and there-
fore her strategy) in game B. In our Soccer tale, A may expect a negotiation
with the alternative team to start after hearing a first offer. In our home-
ownership tale, the owner of the alternative house and B (or S and the
potential buyer that will visit her next week) may e._ter a negotiation. In
both cases these negotiations will influence and be influenced by the events
in our main story. Of course, the straightforward way to deal with such situ-
ations would be to model the set of interacting games as a unique game thus
internalizing all the externalities. However, we believe that understanding
simple, two-person games can provide important insight that will help in
understanding of the more complicated games. 5 Therefore, our approach
is to concentrate on bilateral bargaining while taking into account at least
the most important cross-effects. 6 In this paper, these boil down to the
consideration of random outside options.
Finally, a few words on related literature. Models of strategic bargaining
with symmetric but imperfect information are very scarce. Vislie (1988)
5We do not wish to play down the importance of the research carried out on decen-
tralized markets (see Osborne and Rubinstein (1990) for a survey of the pre-llilleties
literature; see also Hendon and Tranaes (1991), Moldovanu (1993) and Hendon et al.
(1994)). However, the primary concern of this literature is to see whether these markets
implement Walrasian equilibria and if not how efficient they are, while they treat the
fine details of the externalities in a fleeting manner.
6 One of the obvious effects of this genre is the consequence of bounded rationality:
players with limited memory, computing power, etc. will have to "ration" their resources
among the games they are simultaneously playing. Without discounting the importance
and interest of this type of considerations, in this paper we would like to concentrate on
another aspect. of t.he externalities.
393
if 1 proposes at TT,
otherwise.
ii) If TT < Tm,
if 1 proposes at TT,
otherwise.
Proof. It follows from Lemma 2 below. •
Note that when the maturity date coincides with the revelation of the
realization of the option,10 if there is an arbitrarily small positive proba-
bility that the option realizes a value above that period's Rubinstein share
(or, if TT is odd, an even lower value) then, irrespective of the rest of the
distribution of her option, Player l's continuation value will exceed what
she would obtain in the Rubinstein game starting in period TT. Therefore,
a random outside option is potentially worth much more - and never less
- than its straight expected value; hence it is to be evaluated at its "cer-
tainty equivalent": the option's strategic (or conditional) expected value.
8 Note that this definition refers to the gross effect of the option, taking into account
the continuation value that would result in its absence.
9Note that when only one player has an option Al + A2 == l.
IOIf the revelation date preceeds the maturity date the situation is less clear cut, but
it is qualitatively similar.
395
Aj=1!8F(1~8'1!8)+ ff
Xj>-rt&,xi>fFo,Xl +x2::S1
xjdF(x)
A j =1!8 F (1:8'1!8)+ II
Xj,xi>fFo,Xl +X2::S 1
xjdF(x)
Proof. If the sum of the realizations of the options, al + a2, exceeds one,
then at least one player will prefer taking her option right away to any
other feasible equilibrium payoff, and thus the result obviously holds true.
Otherwise, we have two cases to consider, Tm even and Tm odd. If is even,
the option matures at a date when Player 2 makes the offer. Now, observe
that, since after this date the game reverts to a standard Rubinstein game,
in the last period of the options' life Player 1's unique subgame-perfect
equilibrium payoff is al if a2 2: l~/j' and max{ aI, l!/j} otherwise. Similarly,
if is odd, Player l's unique subgame-perfect equilibrium offer (which is
always accepted) is 1 - a2 if al 2: l~/j and min{l - a2'1!/j} otherwise.
To see this, note that if a player can threaten to opt out in case her offer
llWe adopt the convention that the first argument of F(.,.) is Player i's option.
396
is not accepted, she can claim the whole surplus - less the other players'
option value -, whenever such a threat is credible. 12 Moreover, note that the
continuation value of the proposer at Tm in case she stays is her Rubinstein
share in the next period, which has a present value of 1~{j for her. Thus
opting out is credible if and only if her outside option is larger than this
value. If taking the option by the proposer is not credible then, by the
Outside Option Principle, that threat simply has no effect and either the
responder earns the value of his option or the Rubinstein outcome prevails.
This completes the proof of i).
If Tr < Tm, using the Shaked-Sutton backward induction argument, we
can derive the players' continuation values at Tr. We have two cases to
consider, depending on whether the realized options are above or below
the threshold value for credibility for the proposer's option, 1~{j.
If neither option is credible, then, by the Outside Option Principle, they
do not affect the negotiation, since 1~{j ~ 1!{j. Therefore, the players'
continuation values at T r are simply their appropriate (depending on who
makes the offer at Tr) Rubinstein shares.
If at least one player's option exceeds 1~{j' then in all periods between
(and including) Trand T m - 1, the unique subgame payoff for Player i is
1 - aj if she is the proposer and ai otherwise. To see this, first note that,
if the claim is true a period then it is also true for the previous period,
since the options will always be credible for the proposer (he expects aj in
the next period, which has a discounted value of 8aj ~ aj). As we saw in
the first paragraph of this proof, if the proposer's option is credible, the
unique subgame equilibrium is the one posited above. Thus, all we have
left to prove is that for period T m - 1 the result holds also. To see this,
let j be the proposer in that period. This implies that in period T m i's
continuation values are ai or max{ai' 1!{j}' whenj's option is credible and
when it is not, respectively. Then i's option is credible in period Tm - 1,
since 8ai ~ ai, and since 1~{j ~ ai, whenever j's option is not credible, by
assumption. •
Lemma 2 is an interesting result on its own right, since in its proof the
unique subgame perfect equilibrium of a complete information alternating-
offer game with a finite lived outside option for each player is characterized.
Note that the maturity date is only relevant insofar as it is equal or not
to the revelation date, independently of the identity of the last proposer
before the option expires. Moreover, when the revelation date is different
from the maturity date, the only difference is that the responder needs a
lower realization of her option to influence the outcome. Otherwise, the
maturity date is irrelevant. In fact, the exact date of maturity need not
be known to the players to obtain our results, which can be extended for
any (common knowledge) distribution over maturity dates that has a finite
support.
Observe also that, even though we allow for opting out in every period,
we still obtain a unique equilibrium, unlike Shaked (1987/1994). There, one
player has an option, and that player's choice to exercise the option can be
credible in some but not all periods. Here, since both players have outside
options, if the option is a credible choice by one player in a given period,
then it is also a credible choice by the other player in the previous period
(since he will be offered only the option next period, the option today is
a better payoff and thus taking it is a credible threat). Thus if an option
is to be credible in the future, then both options are also credible at all
earlier stages of the game. This, in principle, does not rule out multiplicity:
in Ponsati and Sakovics (1998a) both players can opt out in every period,
their options are credible and still there is multiplicity. The difference,
however, is that our present model is not stationary (it is effectively finite
horizon) and therefore the continuation values are fixed (that is, unique)
in period TT, which, by backward induction, yields a unique outcome in all
previous periods too.
13Note that if at some point in time the discounted sum of the players' strategic values
exceeds 1 then at least one of them will always prefer waiting until period T r to agreeing
at any value.
398
1 2
1 A
I
+-m-
8T - t l_cS T - t 1- A II 8 T - t -'1+6
cS_cS T - t
A 8T-t+cS-cST-t 1- A II 8 T - t -'1+6
l_cS T - t
2 I -m-
Table 1
Let us now interpret A as the strategic value of an option in period T.
Observe that the option is effective (that is, it modifies the partition that
would result in its absence) if and only if A is larger than its owner's Ru-
binstein share in period T, independent of the size of T (c.f. the remark
following Lemma 1). This observation should be interpreted as a generaliza-
tion (and strengthening) of the Outside Option Principle. 14 The important
fact here is that even though the option is to be discounted in case it is
taken, it is its undiscounted value what matters when it is used as a threat.
In a parallel way, the value of the outside option at the beginning of the
bargaining game is significantly more than simply its discounted strategic
value. Whenever the option is effective, its (strategic) value at time zero
is the sum of two terms: its discounted strategic value and an increasing
(!) proportion (1 - 8T ) of the Rubinstein share. 15 By the proof of Lemma
2 it is quite clear why is it A what matters instead of the straight ex-
pected value of the option. The other term is a direct consequence of the
Rubinstein formulation.
How does the strategic advantage derived from having the option trade
off against the "first mover advantage"? The direct comparison of the
four different situations with different bargaining power (1 or 2 makes the
first/last offer) is not feasible because the different delays that necessarily
arise between the first offer and the revelation date. Instead, we propose
the comparison of two hypothetical situations, where both the strategic
value and the revelation date, T-t, are assumed to stay constant while we
change the identity of the first proposer. In this case, the difference between
being a first or a second mover is ~:;:~, just as in the game without outside
options.
Let us now return to the characterization of the equilibria of our game
with stochastic outside options. The equilibrium behavior from period T r
on we have already settled. To fully characterize the equilibrium we use
backwards induction, simply observing that the equilibrium moves in pre-
vious periods are more restricted depending on which is the unique16 sub-
14Rubio (1994) has shown a similar result, for a time-varying outside option with ex
ante known value.
15Note, however, that the equilibrium share still has a decreasing trend in T.
16We assume that when players are indifferent between two actions they choose the
one that ends the game earlier.
399
Proposition 3 The game with an outside option for each player has a
unique SPE. It can be computed by backwards induction as follows:
Let us now interpret what the proposition tells us (this will also provide
a sketch of the proof). First of all, it formalizes the intuition that if an
outside option has high option value (that is, its prior distribution has large
variance) then the players may find it in their interest to delay agreement
until their information about their outside opportunities improves. If the
revelation date is "too far" in the future then the players will prefer to
end the game immediately. If neither player prefers her option to it they
will agree at the corresponding BISV (b). Note that if in some period
t < TTboth players prefer agreeing at the BISV of one of them to waiting,
400
then they do so in all previous periods as well. 1 7 If at least one does then
they either both take the options (c) or they agree at the value which gives
the responder exactly as much as he would have obtained (in expectation)
opting out (d). Now, if the options become available sufficiently before
their revelation date then it may be the case that in periods previous to
ones where they would agree, they take their options (since the options do
not get discounted). Finally, if in a period before Ta they both take their
options then in (sufficiently) earlier periods agreement will be the unique
equilibrium, since the discounted sum of the expected values of the options
decreases below one.
Having described the nature of the bargaining process when the nego-
tiators have a single outside option, we now turn our attention to the case
where the same player may choose among several outside opportunities.
4 Multiple options
In this section we analyze the case when Player 1 (the first proposer) has
several options available to her if she leaves the bargaining game. Specif-
ically, assume that there are N options, and option i matures at Tk and
its value is distributed according to Fk. Without loss of generality, we as-
sume that Tl ::; T2 ::; ... ::; T N. In order to be able to concentrate on the
issues arising from the multiplicity of options, in this section we assume
that Player 2 has no outside option and that Tk = Tk = Tt:" for all k.
Let us start by a generalization of the concept of backward inducted
strategic value for the multi-option setting.
Lemma 4 The backward inducted strategic values of the options are inter-
related according to the following system of equations;18
if Tk is even
if Tk is odd
17 Simply observe that all four elements in Table I satisfy the relationship that de-
creasing t by one gives a value that is strictly greater than multiplying that element by
o.
18Note that BN(N) is the strategic value of the option maturing last.
401
Bk + 1) ot(k) + 1 6,*(k)
(k if T.k is odd
Bdk+1)= { +1 1+6' :J
B (k + 1) ot(k) + 6_6'·(k) if T.k is even
k+1 1+6 ' :J
where t(k) = n+1 - Tk and t * (k) = t(k) if t(k) is odd and t(k) +1
otherwise.
Proof. The first equation follows from the same argument as the proof
of Lemma 1 (2). The second equation is a straightforward application of
Table 1..
Now we are ready to state the main result of this section:
Proposition 5 The unique outcome of the multi-option game, which is
supportable by a subgame-perfect equilibrium, is immediate agreement, with
Player 1 obtaining B l (1)OT1 -1 + 11 !;·
(where T* = T1 ifT1 is even and
T 1-1 otherwise), unless Tl = 1, in which case she obtains the whole surplus
if B1 (2) :S al (the realized value of the first option) and Bl (2) otherwise.
Proof. Note that B l (1) can be considered as the strategic value of a single
outside option whose value realizes at time T l . The rest follows from Table
1. The results for T1 = 1 follow from the same argument as the proof of
Lemma 1 (2) . •
An immediate observation to make is that the upper end of the support
of an option's distribution function is a sufficient statistic for the entire
distribution. 19 The following corollary is then straightforward:
Corollary 6 If and only if the upper end of the support of all the options
maturing in odd (even) periods is no greater than 1~6 (1!6)
the outside
options have no influence on the bargaining outcome.
As a consequence, the availability of several options over time gives rise to
a Coasian result: whenever one of the later options is effective, in periods
where she is the proposer Player 1's bargaining power is reduced with
respect to the case where she only has option 1, just as a monopolist seller
of a durable good drives down the price competing against herself. This
reduction takes the form that some outside options that on their own would
give a strategic value of one, will cease to be effective because of the later
option's presence.
To illustrate how the potential effectiveness of earlier options is affected
by a later option being effective, we present the following example:
Example 1 Assume that the last option that is locally effective (that is,
it has a strategic value that is different from the Rubinstein continuation),
19By the first equation in Lemma 1 it follows that this is so for "local" effectiveness.
But "global" effectiveness is just the local one checked sequentially.
402
5 Final remarks
In many bargaining situations outside options are uncertain and they arise
and cease over time. Proposals that may seem attractive (unattractive) at
the start of the game may cease to be so as the uncertainty disappears
or as time approaches the maturity date of the outside opportunities. We
have analyzed the effects of this kind of uncertainty in the outcome of a
negotiation.
The crucial influence of the outside opportunities available to the play-
ers on the outcome of a bargaining game has long been recognized (Nash
(1950)). However, once the confusion among the definitions of "status quo
point," "disagreement point" and "threat point" was first pointed out and
then satisfactorily settled (Sutton (1986), Binmore, Shaked and Sutton
403
(1989)), outside options have seemingly exited from the research agenda.
The implicit argument behind this neglect was that, since we know exactly
their effects, why should we unnecessarily complicate our models with those
extra details?
We have argued here and in related work (see Ponsatf and Sakovics
(1998a,1998b)) that there are still interesting questions that can be ad-
dressed and new insight to be gained in the context of bargaining games
a la Rubinstein-Stahl with outside options. In this paper we have claimed
that considering uncertainty about the outside options is a natural exten-
sion to the literature that deserves attention. Moreover, since allowing both
players to take an outside option has important effects (compared to models
with only one-sided outside options), the combination of these two elements
yields novel insights on the role of outside opportunities in bargaining.
There are a number of ways in which our models could be extended.
The most obvious generalization would be to add asymmetric information,
players could learn privately the value of their options, about the proba-
bilities, about the revelation date etc. Another interesting scenario is when
the revelation of information is not instantaneous but the players learn over
time about the prospects of their outside opportunities. In these cases, we
would also have the additional consideration of how much a player's actions
(offers) reveal about what she knows at the time.
References
Avery, C., and Zemsky, P. (1994a) "Option Values and Bargaining Delays,"
Games and Economic Behavior 7, 139-153.
Avery, C., and Zemsky, P. (1994b) "Money Burning and Multiple Equilibria
in Bargaining," Games and Economic Behavior 7, 154-168.
Binmore, K., Shaked, A. and Sutton, J., (1989) "An Outside Option Ex-
periment," Quarterly Journal of Economics 104, 753-770.
Dalmazzo, A. (1992) "Outside Options in a Bargaining Model with Decay
in the Size of the Cake," Economics Letters, December, 417-42l.
Hendon, E., Sloth, B. and Tranaes, T., (1994) "Decentralized Trade with
Bargaining and Voluntary Matching," Economic Design 1, 55-78.
Hendon, E. and Tranaes, T., (1991) "Sequential Bargaining in a Market
with One Seller and Two Different Buyers," Games and Economic Be-
havior 3, 453-466.
Merlo, A. and Wilson, C., (1995) "A Stochastic Model of Sequential Bar-
gaining with Complete Information," Econometrica 63, 371-399.
Moldovanu, B. (1993) "Price Indeterminacy and Bargaining in a Market
with Indivisibilities," Journal of Mathematical Economics 22, 581-597.
Nash, J., (1950) "The Bargaining Problem," Econometrica 18, 155-162.
Osborne, M., and Rubinstein, A. (1990) Bargaining and Markets, Academic
Press, San Diego.
Ponsatf, C., and Sakovics, J. (1998a) "Rubinstein Bargaining with Two-
404
1 Introduction
The assignment model of Shapley and Shubik (1972) has been extended to
the following version with a continuum of buyers and sellers by Gretsky,
Ostroy and Zame (1992) called the nonatomic assignment model:
Consider the set X I of buyers and the set X 2 of sellers each having a dis-
tinct house to sell, and associate two probability spaces (Xi, Ai, Pi), i = 1,2
with the buyers and sellers respectively, where Pi represent the popula-
tion distributions. If buyer Xl and seller X2 were to transfer ownership
of the house X2, then the monetary value of this transfer between the
pair (Xl, X2) can be represented by a measurable function h(Xb X2) on
"The work is supported by the V.S. - Germany Cooperative Science Program, NSF
grant. INT-9513375 and DAAD grant 315/PRD/fo-ab.
406
Assuming Xl and X2 to be the closed unit interval [0,1] and the objective
function h to be upper semicontinuous, Gretsky et al. (1992) show that
They also present a game theoretic version via the core and a mar-
ket economy version via Walrasian equilibrium and establish the effective
equivalence of the solution concepts of the three versions.
In this paper, we treat the nonatomic assignment model under very gen-
eral conditions on the economic agents and cost functions; we also discuss
some variants of the problem. We first show that the assignment problem
based on "inequality" constraints as considered by Gretsky et al. (1992)
is equivalent to a corresponding transportation problem under "equality"
constraints. Based on a general duality theorem for transportation prob-
lems, this leads to a broad solution which encompasses the case of compact
metric spaces with upper semicontinuous cost functions considered by Gret-
sky et al. (1992). This level of generality allows considering various function
spaces as models for the market; for example, consider the situation where
risks of stocks or goods represented by the development of the price over
a time period (rather than the price at a fixed time point) are sold to a
group of buyers such as insurance companies by the associated owners.
Next, we introduce the nonatomic assignment model with additional con-
straints on the economic agents in the form of finite measures which bound
407
the population distributions of the buyers and sellers; this arises in markets
where certain minimal level activities are imposed by regulatory conditions.
By a modification of the finitely additive approach to duality theorems as
developed in Riischendorf (1981), we establish a general duality theorem
for this case along with some useful consequences.
and
/1(Xl x A2) =: /1 0 7l"2(A 2) = P2(A 2) for all A2 E A2.
Let M = M(Pl , P2) = {/1 on Al ® A2 : /1 0 7l"i = Pi, i = 1, 2}. For a
given measurable function h on (Xl x X2, Al ® A2)' the marginal problem
is concerned with the solution of
(1)
Our first aim in this section is to show that this nonatomic assignment
problem of Gretsky et al. (1992) can be reduced to a corresponding marginal
problem (1) described in the preceding paragraph. To this end, define Xl =
Xl U {8} and let
_h- {h on Xl x X2
a on {8} x X 2 .
f.L = 'jIIX t XX 2 E M:S(71,72) and JX 1 XX2 h d:ji = JXI XX2 h df.L. Conversely,
if f.L E M~ (Tb T2), then extend f.L /' 'jI by 'jI(C) = f.L(Cn(X1 x X 2)); again,
it can be checked that 'jI E M:S (71, 72) with Jh d:ji = J h df.L. Thus
S:l
<
XA 2 (h) (3)
and so in the Gretsky et al. (1992) model we can take 71,72 to be proba-
bilities (by replacing them with 71,72, h if needed).
<
Next, if f.L E M- (71, 72) then letting H = {h 2: O} and f.LH = f.LIH ,we
get
j h df.L:::; j h df.LH = j h+ df.LH
where h+ = max(h,O) and f.LH 01fi :::; 7i,i = 1,2; so f.LH E M:S(71,72)
as well. Hence in (2) (respectively (3)), one can restrict attention just
< <
to those f.L E M- (71, 72) (respectively'jI E M- (71, 72)) with the prop-
erty f.L({h < O}) = 0 (respectively'jI({h < O}) = 0). For each f.L E
M:S (71, 72), J h+ df.L = J h+ df.LH = J h df.LH :::; S:S(h) and J h df.L :::;
J h+ df.LH :::; s:S (h+) whereby
(4)
Hence in (2) we can further assume that h 2: O.
To reduce the problem finally to (1), we denote the probabilities 7i by
Pi, i = 1,2. Given E > 0, let f.L€ E M:S(P1,P2) be such that Jh+df.L€ >
s:S (h+) - E. Since f.L€ E M:S (Pb P2), we have Qi = f.L€ 01fi :::; Pi. We
now choose a 1/ E M(P1 - Ql, P2 - Q2) and take f.Lo = f.L€ + 1/. Then
f.Lo E M(P1, P2) and
> j h+ df.L€
> s:S (h+) - E.
Hence
S(h+) 2: s:S (h+).
The other inequality being trivial, we get
(5)
409
(6)
Theorem 1 Let (Xi, Ai, Pi), i = 1,2, be arbitrary probability spaces where
at least one of PI, P2 is perfect. Then [§': (h) = S(h+) = I(h+)] for h E
(Al®A2)m.
Comments (i) For h E (AI ® A2)m with J(h) < 00 there exist solutions
to the dual problem
(ii) When Xi are topological spaces with Pi as tight measures then for
upper semicontinuous functions h there exists a maximal measure Jlh E
M(Pl , P2) such that
410
A2) If (Xi, A) are Hausdorff spaces and Ti, i = 1,2 are tight (Radon)
measures then for all bounded upper semicontinuous functions
h [SA,'T(h) = h,'T(h).]
A3) If h is bounded then there exist fi E .c1 (Pi) such that [h,'T(h) =
J
L~=l (J f i+dTi - f i- dAi).]
Outline of the Proof The proof follows the approach in Ruschendorf
(1981,1991). In the first step, the set of measures in MA,'T are replaced
by finitely additive measures. Application of the Hahn-Banach theorem
and the Riesz representation theorem establish duality in the finitely addi-
tive setting. Based on the integration theory for finitely additive measures
411
one obtains from this the duality theorem in (AI) for the class U. Since
perfectness of one of the marginals implies a-additivity of such finitely
additive measures on the algebra of measurable rectangles in the product
space (see Ramachandran (1979), chapter 3), in the topological case the
tightness property of Ti allows us to obtain duality for bounded continuous
functions. Then one can establish compactness of the class of dual admis-
sible functions as in Ruschendorf (1981). This implies (A3) and, based on
this compactness, we obtain that the dual functional is a-continuous up-
wards (see Kellerer (1984), Prop. (1.28)). This implies that duality can be
extended to the upper semicontinuous functions.
Remarks Similar to the above model with M)..,'T specifying upper and
lower bounds on the population measures, we can also consider markets
with external regulations on the matching of buyers and sellers. Consider
(Xi, Ai, Ti), i = 1,2, representing the buyers and sellers where the popula-
tion measures Ti are assumed to be normalized. Let Cc Xl X X 2 denote
the set of admissible interactions among the economic agents imposed on
the market by regulations or technical conditions and let
1(g) = inf{ ~
•
J gi dTi : gi E .c1 (Ti)' gl EB g2 2: g},
References
Gretsky, N.E., Ostroy, J.M., and Zame, W.R.: The nonatomic assignment
model. Economic Theory, 2, 103-127 (1992).
Kellerer, H.G.: Duality theorems for marginal problems. Z. Wahrschein-
lichkeitstheor. Verw. Geb. 67, 399-432 (1984).
412
1 Introduction
When we designed an experiment of sequential decision making to em-
pirically investigate whether subjects satisfy the axiom of independence
of irrelevant alternatives, we became increasingly suspicious of the useful-
ness of distinguishing between static and dynamic decision models. For a
long time, psychologists have stressed that a si,ngle decision is the result
of perceptual, emotional and cognitive processes, which all contribute to a
dynamic process in which the decision maker seeks and evaluates informa-
"This paper was init.iat.ed when t.he first. aut.hor spent. three weeks at t.he Center of
Economic Research at Tilburg University. He wants t.o express his indebtedness to the
hospit.alit.y of the Cent ER. Financial support of the Landeszent.ralbank fUr Hamburg,
Mecklcnhurg--Vorpommern und Schleswig-Holstein and the European Community under
Contract CHRX-CT94-0647 is gratefully acknowledged. For useful comments we are
indebted to Eric van Damme and to Professors Albers and Brockhoff.
414
tion sequentiallyl. This insight led us soon to the question which decision
rules are observed by subjects, or, to put it more precisely, which decision
rules are not at variance with subjects' decisions. Fortunately, our exper-
iment equipped us generously with data, which allowed us to embark on
this research. In particular, we investigate the existence of an editing phase
in which dominated alternatives are eliminated. Furthermore, we test sev-
eral multiattribute decision rules for their explanatory power of consistency
with subjects' choices.
Section 2 develops the theoretical underpinning of our paper. It starts by
explaining the dynamics of decision making through decision makers' effort
to minimize cognitive effort. Then we proceed to review the most impor-
tant multiattribute decision rules. Section 2.3 examines whether decision
processes are multi-phased.
Section 3 gives a detailed description of our experiment, and Section
4 contains the results of our study. Section 4 parallels Section 2 in its
structure to facilitate the comparison of more theoretical considerations
with the empirical evidence of our experiment. Section 5 concludes.
1 Cf., e.g., Montgomery and Svenson (1976), 283; Svenson (1979), 86.
2For an interesting theory of the cost of thinking cf. Shugan (1980). The cost of
optimization was analysed by Conlisk (1988). Von Winterfeldt and Edwards (1982) and
Harrison (1994) have blamed experimental economists for insufficient rewards used in
their experiments, which were not attractive enough to compensate subjects for their
decision cost. They argue that insufficient rewards could have been the cause for much
observed falsification of correct theories. For a fully-fledged model of decision costs and
subjects' performance in experiments cf. Smith and Walker (1993).
3Montgomery and Svenson (1976), 288f.; Svenson (1979), 107; Shugan (1980), 100;
Russo and Dosher (1983).
415
multi-staged processes l l .
These considerations describe nothing more than a general pattern of se-
quential decision making. Subjects may, however, follow different decision
rules. Some subjects may be more attracted by particular decision rules,
others may be more attracted by others. In this study, we investigate first
whether decision processes are multi-phased where a rough screening ap-
plies at the outset of a decision problem, and second which decision rules
are capable of explaining the actual decisions of palpable groups of subjects.
In the rest of this section, we will first consider a menu of rules for mul-
tiattribute decision making. Then we shall investigate whether individual
decision processes indeed consist of several phases which can be clearly
discerned.
llCf., e.g., Simon (1955); MacCrimmon (1968b); Mintzberg, Raisinghani and TMoret
(1976); Montgomery and Svenson (1976); Nisbett and Wilson (1977); Wright and Bar-
bour (1977); Kahneman and Tversky (1979), 274ff.; Svenson (1979); Tversky and Sat-
tah (1979), 542f.; Shugan (1980); Montgomery (1983), 350ff.; Russo and Dosher (1983);
Dawes (1988), chapter 4; Tversky, Sattah and Slovic (1988), 372.
12Cf., e.g., Coombs and Kao (1955); Coombs (1964); Dawes (1964); Montgomery and
Svenson (1976), 285ff.; Fishburn (1978); Svenson (1979), 89ff.; Shugan (1980), 100.
417
13Dawes (1964), 105. Cf. also Einhorn (1970), 223; Einhorn (1971), 14f.; Montgomery
and Svenson (1976), 285; Payne (1976),367; Wright and Barbour (1977), 94f.; Svenson
(1979), 89.
418
14Cf. Dawes (1964), 105; Einhorn (1970), 223; Montgomery and Svenson (1976), 285;
Svenson (1979), 89.
15Tversky (1969).
16Tversky (1972a,b).
17Luce (1959; 1977).
18Tversky and Sattah (1979).
19 Tversky, Sattah, and Slovic (1988).
20Restle (1961); Shepard (1964a,b).
21Tversky (1972a,b).
419
all cars whose price exceeds this limit are excluded. The process continues
until all cars but one are excluded. 22 " Adhering to the (then dominating)
conception of choice as a stochastic phenomenon23 , Tversky conceived of
evaluation functions of the various aspects (or attributes) of choice alter-
natives and modelled the choice probabilities of the various alternatives as
increasing functions of the values of the relevant aspects. As the values of
the various aspects are, however, not known a priori, Tversky chose an ex-
perimental design presenting the same stimuli repeatedly to his subjects.24
This provided him with choice frequencies of the decision alternatives which
he could use for the estimation of the values of the aspectS. 25
Because of considerable data requirements of the elimination-by-aspects
rule, Tversky and Sattah later developed a hierarchical elimination process
which is more parsimonious with respect to data than the former one26 .
This elimination-by-tree rule or hierarchical elimination rule is applicable
whenever the decision problem is presentable in the form of a decision
tree in which the decision maker eliminates various subsets of alternatives
sequentially according to some hierarchical structure. The choice behaviour
is assumed to be context dependent, i.e., driven by the preferences among
the various attributes. The main significance of this model seems to be its
greater parsimony with respect to data requirements. Its basic message is
not different from the elimination-by-aspects rule.
The prominence hypothesis suggested by Tversky, Sattah and Slovic27
is some kind of truncated lexicographic rule. It draws on Slovic's more-
important-dimension hypothesis 28 . Carrying out four experiments, he ob-
served "that people resolve choices between equally valued, multiattribute
alternatives by selecting the alternative that is superior on the more im-
portant attribute or dimension. 29 "
Slovic's early work later induced the development of the prominence hy-
pothesis. It says essentially that the more prominent attribute will weigh
more heavily in choice. This suggests that, in a way, the prominence hypoth-
esis endeavours to materially establish the preference order of attributes
which would eventually define a lexicographic rule. It seems, however, that
the formulation of the prominence hypothesis has not progressed far beyond
the two-attribute world30 .
When discussing their results, Tversky, Sattah, and Slovic stress the ne-
cessity of further investigations into the prominence hypothesis: "Although
the prominence effect was observed in a variety of settings using both in-
trapersonal and interpersonal comparisons, its boundaries are left to be
explored. How does it extend to options that vary on a large number of
attributes? ... With three or more attributes ... additional considerations
may come into play. For example, people may select the option that is su-
perior on most attributes ... In this case, the prominence hypothesis does
not always result in a lexicographic bias.,,31
The majority rule mimics the old wisdom that more arguments in favour
of an alternative are better than less arguments. It assumes that subjects
just count attributes in favour of the respective alternatives and opt for that
one which has more attributes on its side. This decision rule may violate
transitivity and is thus not immune to preference cycles. This means that
there may well exist A' ~ A such that E(A') = 0.
11) With interattribute level comparability
(6) M aximin rule:
The asterisks at min and max indicate that the minimization or max-
imization occurs with respect to preferences among attributes, because
attributes may have different dimensions which cannot be directly com-
pared. Alternatively, we can use (partial) utilities defined on the various
attributes. Notice that the maximin rule is an extension of the conjunc-
tive rule and the maximax rule is an extension of the disjunctive rule if
interattribute level comparability holds33 .
IIl) With cardinal interattribute comparability
(8) Linear multiattribute utility rule:
K K
L Wk vk(aik) > L Wk vk(ajk) => ai >- aj;
k=l k=l
K
E(A) = {ai E A I ai E argmax{L Wk vk(ajk)}},
J k=l
where the Wk'S denote the weights of the attributes and the Vk(') 's denote
the conditional value functions of the attributes. The linear multiattribute
utility rule plays a prominent role in models of multiattribute decision
making34 • It has given rise to other developments such as the use of the
Minkowski metric and the generalized mean.
(9) Multiplicative utility rule:
K K
Il[l + AWk vk(aik)] > Il[l + AWk vk(ajk)] => ai >- aj;
k=l k=l
K
E(A) = {ai E A I ai E argm~x{II[l +AWk vk(ajk)]}},
J k=l
33Shugan (1980), 100, neglects this requirement. There is also confusion about this
condition in Dawes' (1964) article.
34Cf., e.g., Yntema and Torgerson (1961); for a good survey up to the seventies cf.
Slovic and Lichtenstein (1971), in particular 677ff. For later surveys cf. Weber and
Borcherding (1993) and Borcherding, Schmeer, and Weber (1995). For the rigorous es-
tablishment of the linear multiattribute utility rule cf. Farquhar (1977) and Dyer and
Sarin (1979).
422
3 The experiment
3.1 Stimulus material
The stimulus was an evaluation sheet of the data of 25 applicants for the
position of a chief secretary to be hired. The subjects were told that they
should imagine themselves to be successful entrepreneurs and, since they
were short of time, they entrusted the screening of the applicants for this
position to a professional recruitment agency.
dominated alternatives are detected and. eliminated prior to the evaluation of prospects."
Notice that cumulative prospect theory avoids this problem; cf. Tversky and Kahneman
(1992).
39 Kahneman and Tversky (1979), 275. Notice that the rejection of dominated alterna-
tives has been stated by MacCrimmon (1968a), 15-17, as his third postulate of rational
choice. In this empirical investigations, MacCrimmon reports some violation of this pos-
tulate, but adds that, in the interview after the experiment, all subjects repealed their
violations of MacCrimmon's third postulate, attributing the violations to "carelessness
in their reading or thinking about the problem".
40 Cf. the references in footnote 11.
41Montgomery (1983) has ventured to model decision processes in which decision
makers apply first transformations of the alternatives' attributes in order to render the
dominance rule applicable even in such cases in which there was no dominance in the
primary data.
42Parquhar and Pratkanis (1993), 1223.
424
43There is evidence that there is some effect of attribute ranges on attributes' weights
in multiattribute decision making; cf. von Nitzsch and Weber (1993). However, we see no
possibility to control for these effects. We could hardly do more than keeping attribute
ranges constant for the two parts of the experiment.
425
ternatives. For example, a14 is dominated by a13 and a1; a15 and a20 are
dominated by 10 alternatives each; etc. The dominance structure is shown
in Table 2 (at the end).
This structure of choice alternatives as exhibited in the basic evaluation
sheet is, of course, too revealing in this form to be presented to the sub-
jects. Therefore, we employed a randomization of the lines of Table 1 and
presented an evaluation sheet with randomly permutated lines to our sub-
jects. (Notice that the chosen randomization was the same for all subjects.)
As we wanted to eliminate biases from data presentation44 , we chose the
matrix form of data presentation, as this mode had proved to engender the
least distortions45 •
For the second part of the experiment, we told subjects that, after several
years, the chief secretary has been transferred to support the establishment
of a new branch of the firm, and a new secretary was to be hired. As the
recruitment agency had performed well, it is again entrusted with the eval-
uation of the applicants. For the second part, we used essentially the same
set of alternatives. In order to camouflage this fact, we employed a different
randomization of the lines, and re-arranged the columns, using AM as the
first attribute, IQ as the second, EXP /PROF as the third, L as the fourth,
COMP as the fifth, and ST as the sixth. We explained the re-arrangement
of columns by telling the subjects that the recruitment agency had changed
its evaluation reports so as to enlist the features which concern an appli-
cant's personality in the first places, and the more technical properties
only thereafter. Moreover, one or two of the previous alternatives (to be
explained in the next section) were deleted, so that a subject was presented
an evaluation sheet containing 23 or 24 of the original 25 alternatives of
the first part of the experiment, arranged, however, in a different order.
44Cf., e.g., Montgomery and Svenson (1976), 287; Bettman and Kakkar (1977), 234;
Svenson (1979), 99; Payne (1982), 391; Russo and Dosher (1983), 677; Johnson and
Meyer (1984), 531ff. and 538.
45Cf. the third experiment of Bettman and Kakkar (1977), as well as Russo (1977).
426
the first and the second part of the experiment. Then the subjects were
asked to order the six attributes according to their importance. They could
state indifference as well as strict preference. We then asked the subjects
for the short lists of their most preferred candidates. They could nominate
up to ten candidates. Then we asked the subjects to state which candidate
they wanted to hire. After the respective response, the subjects were told
that the chosen candidate had just recently withdrawn her or his applica-
tion. The subjects should kindly make another choice. After having done
that, the subjects were informed that this very candidate had meanwhile
accepted another offer and was, therefore, no longer available. They were
told that the recruitment agency had assured that all of the remaining can-
didates were still available. The subjects should kindly accept the agency's
apologies and make one more choice. This concluded the first part of the
experiment. It provided us with data on subjects' short lists and with data
on three actual decisions made for each subject.
We then prepared a second evaluation sheet as described above. The first
best alternative of the first choice was the one to be deleted. As we expected
a distinct preference for alternative a13, we deleted also this alternative, if
a13 happened to be the first or second best alternative in the first part of
the experiment. If the alternative a13 emerged as first best, then the second
best alternative, too, was eliminated. Then the subjects were invited to
indicate the short lists of their most preferred candidates (up to ten) and
the candidates to be hired with first and second priorities.
As the second part of the experiment started only some two weeks later46,
and, as the second evaluation sheet was sufficiently camouflaged, we ex-
pected our subjects to feel as if they had to deal with a separate choice
problem. The second part of the experiment provided us again with data on
subjects' short lists and with data on two decisions made for each subject.
3.3 Procedure
The subjects were 45 students of the University of Kiel, mostly students of
Economics, in their third or fourth year.
The subjects were introduced to the experiment on December 15 and
16, 1994, respectively, and received the first evaluation sheet. At the same
time, they entered their names into a time-table, which allowed them 15
minutes at the computer. The first part of the experiment took place in
the time period between December 19 and December 22, 1994, which left
them more than a weekend to thoroughly analyze the choice problem before
answering our questions. We then processed the second evaluation sheet,
which started from a common re-arrangement of columns and another
46We chose this short spell to exclude major changes of preferences, which would have
invalidated the results gained from our experiment.
427
47This common basic structure of the evaluation sheets of the second part of the
experiment was used to keep possible framing effects to their minimum.
48C£., e.g., Harrison's (1994) recent paper.
49Cf. Smith (1982), 931 and 934.
428
press the wrong key by accident; they could be in a hurry to finish the ex-
periment; they could be motivated by something other than maximizing the
welfare from the experiment per se. 50 " There have been several attempts
to measure subjects' natural error rates 51 • They suggest a natural error
rate of 15-25%, Camerer's 31.6% and Battalio, Kagel and Jiranyakul's less
than 5% being, as it seems, outlyers. As to the error rate of our data we feel
that Table 6 below would provide some good clues. If we take the failure
to choose undominated alternatives in the ultimate decisions as our nat-
ural error rate, this gives us i~ = 26,67%. If we take the failure to choose
alternatives which have been nominated as members of the short lists, we
get a natural error rate of Is
= 15,56%. These two figures delineate pretty
well the interval of commonly recognized error rates.
4 Results
4.1 Testing the editing phase and the elimination of dominated
alternatives
Kahneman and Tversky (1979) and many other authors 52 have claimed
that decision makers approach a decision problem in two phases. In the
first, the so-called editing or screening phase, they simplify the decision
problem, and in the second phase, the evaluation phase proper, they finally
select the choice to be made. One of the more prominent features of the
editing or screening phase is the elimination of all dominated alternatives.
We shall, therefore, test whether the short lists did not exceed the set
of undominated alternatives and whether dominated alternatives were in
fact eliminated by our subjects in a preliminary phase of solving the posed
decision problem. In the first part of our experiment, there are exactly seven
undominated alternatives (Le., the odd-numbered alternatives from al to
a13), six 1-dominated alternatives (Le., the even-numbered alternatives
from a2 to a12), and twelve k-dominated alternatives with k 2:: 2 (Le.,
the alternatives with numbers from a14 to a25). In the second part of the
experiment, there are at least six undominated alternatives, at least four 1-
dominated alternatives, and at least eleven k-dominated alternatives with
k 2:: 2.
We have two groups of data to test the hypothesis of the elimination
of dominated alternatives, viz. the subjects' short lists and their choices
made.
We consider first the subjects' short lists. The results are displayed in
Table 3 for the first part of the experiment, and in Table 4 for the second.
(Both tables are at the end.) In the columns of these tables we list the
number of alternatives in the respective short lists, in the rows the number
of dominated alternatives in the short lists (irrespective of the degree of
domination). Of course, there cannot be more dominated alternatives than
the respective numbers of alternatives in the short lists, which means that
there are only blanks in Tables 3 and 4 below their main diagonals.
Tables 3 and 4 seem to document little evidence of the hypotheses of the
existence of an editing phase and of the elimination of dominated alter-
natives in the editing phase. If all subjects would have complied with the
conditions of the editing phase53 , then we should observe in Tables 3 and
4 nonzero entries only in the first seven (six for Table 4) columns of line
1, which would then, of course, be replicated in the sum line. This means
that the hypotheses of the existence of an editing phase and the elimina-
tion of dominated alternatives are for the first part of the experiment only
consistent for 15.56% CZs) and for the second part only for 4.44% (425) of
all subjects.
We can also have a look at the percentages of subjects whose short lists
do not exceed the number of undominated alternatives. This gives us rates
of 64.44% (~~) for the first part and 55.56% (~~) for the second part of the
experiment. However, this does not explain the occurrence of dominated
alternatives even within this restricted set of short lists. We can perhaps
interpret it as subjects' inability to correctly identify any undominated
alternative.
On average, we observe close to 2 dominated alternatives in the average
short list in part one, and close to 2.5 dominated alternatives in the average
short list of part two of the experiment. No wonder that applying a Mann-
Whitney U-test 54 to test the null hypothesis of the marginal distribution
(1,0,0, ... ,0) against the actual distributions of the right margins of Tables
3 and 4 rejects the null hypothesis at the 1% significance level.
This provokes, of course, the question of the intensity of rejecting the
editing hypothesis. Table 5 informs us about this.
Table 5 shows us that the intensity of the rejection of the hypothesis of
the existence of an editing phase and the elimination of dominated alterna-
tives is modest. 68.44% [61.59% in part two] of all alternatives in the short
lists are undominated alternatives and more than 94% of all alternatives in
the short lists are made up of undominated or 1-dominated alternatives.
These percentages may as well be interpreted as conditional probabilities
that a choice alternative is undominated given that it is a member of a
short list. The conditional probabilities are 0.6844 for the first and 0.6159
53 Remember that this means that the short lists should not exceed the set of undomi-
nated alternatives and all undominated alternatives should be eliminated from the short
lists.
54Cf., e.g., Mood, Graybill, and Boes (1974), 522ff.
430
for the second part of the experiment. The respective pure chance proba-
bilities that an alternative happens to be undominated is 0.28 (;,,) for the
first part of the experiment and 0.26 (263) for the bulk of the second part
of the experiment. These figures lie well below the conditional probabili-
ties, which demonstrates that undominated alternatives loom larger in the
subjects' considerations than dominated alternatives.
The figures shown in Table 5 could indicate that, although subjects aim
at eliminating dominated alternatives from their short lists, their discrimi-
nation between dominated and undominated alternatives is somewhat im-
perfect, which could then explain that 1-dominated alternatives count for
about one fourth to one third of all alternatives in the short lists 55 . Jux-
taposing undominated alternatives in the short lists to k-dominated alter-
natives (k 2 1) gives us 31.56% misperformances for the first part of the
experiment. Although this figure is rather high, it is surprisingly close to
Camerer's 31.6% error rate56 . If we allow for an error rate of 25%, this
means that more than 90% of our subjects would truly comply with the
editing hypothesis, but were prevented by their natural error rate from
accomplishing this goal.
Concerning the second part of the experiment, our subjects' performance
deteriorated. Now 38.41% of k-dominated alternatives were in the short
lists. Allowing an error rate of 25%, this gives still a moderate inconsistency
with the editing hypothesis of 13.41%.
Let us now look at the choices made and at the same time check whether
the first, second (and third) best alternatives were contained in the short
lists. The data is displayed in Table 6.
It shows that some 85% of all choices, taking all five choices in a line,
are contained in the short lists. Considering 45 X 5 = 225 actual choice
acts, the hit rate increases to some 97% of choices being in the short lists.
55 Notice that subjects' performance deteriorates in the second part of the experiment.
5 6 Camerer (1989), 81.
431
57Notice that our calculations considered, of course, the changing patterns of undom-
inated alternatives as previously chosen alternatives become unavailable.
58This influence of chosen alternatives which become irrelevant is studied in another
paper. An alternative hypothesis of an editing phase is the compatibility test of image
theory. The test of compatibility is rather tedious and requires sophisticated numerical
methods. Therefore, we investigate it in a separate paper [cf. Seidl and Traub (1998)].
59Cf. Einhorn (1970; 1971). We shall see below (Section 4.2.6) that the maximax rule,
which is closely related to the disjunctive rule, performs equally poor.
60This was the way Wright and Barbour (1977) modelled the screening phase of their
experiment.
61 Dawes (1964), 105ff.
432
choice alternatives (and thus model the subject's editing phase) as well as
to determine his ultimate choice if he intends to employ the conjunctive
rule right to the end of his decision process.
Let us illustrate the latter case for 25 choice alternatives and 6 attributes.
If the subject rates all attributes equally and wants to select exactly one in
25 alternatives according to a conjuctive rule, then he will determine the
cutoff scores of the attributes endogenously from the formula
The cutoff scores are then gained from the acceptance of the best ipCi)
(i = 22,23,24,25) values of the respective attribute values.
Suppose now that the subject has a strict order of the attributes, say
d l )- d 2 )- d3 )- d4 )- ds )- d 6 • Everything else remaining the same, we can
model this as
p2I =
25
2:..
=> P = 25-* = 0.858.
This gives for the various attributes:
PI = p6 0.399;
P2 pS 0.465;
P3 = p4 0.542;
P4 p3 0.631;
Ps p2 0.736;
P6 = pI 0.858.
62If necessary, we indicate the number of alternatives, to which the cutoff probability
refers, in br ackets.
433
The cutoff score for the first attribute begins after the best 39.9% attribute
values and ends for the sixth attribute close after the best 85.8% attribute
values. This reflects that the subject is more demanding with respect to
more important attributes requiring higher cutoff scores. Suppose the cho-
sen alternative becomes invalid. Then, for the next step of the decision,
this procedure has to be repeated for 24 choice alternatives, etc.
H the subject wants to whittle down his choice set to 10 alternatives
(forming then his short list resulting from the editing phase) by means of
a conjunctive rule, then he derives his cutoff scores from the formula
6 10
p = 25 ::;. p = 0.858,
7 conformed for both choices in part two with the conjunctive rule. This
gives conditional probabilities63 of 0.8 and 0.47 respectively. This shows
again that a group of subjects look as if they acted in conformity with the
conjunctive rule.
Table 8 (at the end)informs on the hit rates at different decision or-
ders. We see that the hit rates are markedly higher whenever the decision
problem is analyzed from scratch (first and fourth decisions) and is thus
unadulterated from the frustrating experience of past choices which had
become invalid.
(120,90,95,10,10,10) .
(118,88,92,9,9,9) .
63The condition being that the subject conformed at least twice with the conjunctive
rule in the first part of the experiment.
64Cf. Tversky (1972a), 295, to see that this is a valid interpretation of the elimination-
by-aspects hypothesis. Many other scholars, too, have found empirical evidence that the
addition of dominated alternatives increases the attractiveness of the now dominating
alternatives. Cf., e.g., Huber, Payne, and Puto (1982); Huber and Puto (1983); Tyszka
(1983); Ratneshwar, Shocker, and Steward (1987); Wedell (1991).
435
Proceeding further in this way, we arrive after some other sham vectors at
the sham vector
(104,73,72,5,4,4) ,
which is dominated by alternative ag. Applying this algorithm further gives
us for the top five items the preference order
This shows again results which are far above the realizations which would
evolve from pure chance.
436
derived from
6
where 7ri is accorded the value 1 if alternative i was a member of the short
list, and 0 otherwise. The f3k's represent the weights of the standardized
attribute values
A aik-minj{ajk}
aik := maxj
{ } - mInj
ajk . { ajk } '
priority structure of the majority rule in Table 11 (at the end), which
corresponds to Table 2 for the dominance structure.
From Table 11, we immediately see that, neglecting ties, three alter-
natives form the unrivalled winners in the order al3 )- ag )- aw, which
compares favourably with our test of the elimination-by-aspects rule. Fur-
thermore, we see that the majority rule is plagued by so many intransitiv-
ities, that any subject would simply be lost without having the powerful
instrument of an adjacency matrix at hand.
Therefore, we confined ourselves to testing our subjects' internal inconsis-
tencies of their actual choices. Suppose, for instance, that a subject's pref-
erences for alternatives, as revealed by his actual choices, are al )- a2 )- a3
for the first part of the experiment. Denoting weak priority under a major-
ity rule (preference or indifference) by R and strict priority by P, we should
expect alRa2Ra3 if the majority rule is indeed followed. Comparing these
two orders, the first one being given, we could find up to three priority
violations for part one of the experiment. For instance,
means exactly one priority violation. Table 12 lists the priority violations
observed in our experiment.
Table 12
Priority Violations of the Majority Rule
Priority violations
0 1 2 3
Part I 22 22 1 0
Part II 32 13 - -
68Notice, however, that the coefficient f3 in our probit estimate is significant only at
the 7% level.
439
given X priority violations in the first part of the experiment, where <P
denotes the standard normal distribution function. Table 14 shows that
the probability of a priority violation in part two is an increasing function
of the number of priority violations in part one of the experiment.
Table 13
Probit Estimates for the Majority Rule
Label a f3
Coeff. -0.9622 0.6946
Std.Error 0.3084 0.3825
t-Stat. -3.1199 1.8159
Level of Sign. 0.0018 0.0694
Table 14
Cond. Probabilities of Priority Violations in Part Two
x 0 1 2 3
CI>(a + f3X) 0.1685 0.3936 0.6664 (0.8686)
This obviously suggests that we have two rather stable cohorts among
our subjects. One cohort seems to make consistent use of the majority rule,
whereas the other cohort does not seem to pay particular attention to it.
This conjecture is confirmed by Table 15 which shows the violations of the
majority rule.
0 1 4 8.9 0.1818 - -
1 0 14 31.1 - 0.6364 -
1 1 8 17.8 - 0.3636 -
2 1 1 2.2 - - 1.0
Table 15 corresponds pretty well to the results of Table 14. The condi-
tional probabilities of a violation of the majority rule in part two, given
440
no violation in part one, are 0.1685 (Table 14), and 0.1818 (Table 15). For
one violation in part one the respective probabilities are 0.3936 (Table 14),
and 0.3636 (Table 15). For two violations in part one we have 0.6664 from
Table 14, and 1.0 from Table 15. Moreover, Table 15 shows us that 30% of
our subjects exhibit a behaviour which is fully consistent with the majority
rule.
The (}:ik'S are the values of the attributes of the various choice alternatives,
normalized on the unit interval. The exponents f3 k were derived from the
subjects' attribute rankings in the following way. For indifference between
all attributes we used f3k = i 'if k = 1,2, ... ,6. For strict preference or-
derings, we used 261 as an exponent for the highest ranked attribute, i1
as an exponent for the second highest ranked attribute, etc., ending with
2\ for the last ranked attribute. If we have, for instance, one attribute at
71 Meyer and Johnson (1995), GI83f., report a poor performance of the linear multi-
att.ribute ut.ility rule.
72Cf., e.g., Manrai (1995), 5.
442
the highest rank, three attributes second ranked, and two attributes at the
third rank, we applied the exponents 131 for the highest ranked attribute,
121 for each of the three second ranked attributes, and A for each of the
two third ranked attributes. These examples should suffice to clarify the
rule of construction of the exponents.
Table 16 informs on the compliance of subjects' responses with the max-
imin rule. It reports the structure of hits at all five decisions (denoted by
D1 to D 5 ) made. 1 denotes a hit according to the maximin rule, 0 a failure
to comply with the maximin rule. All hit combinations which did not actu-
ally occur were deleted. D1 to D3 concern the first part of the experiment,
D4 and D5 the second.
Table 16 shows that, while 20% of our subject acted in conformity with
the maximin rule in the first part of the experiment, not a single subject
acted for both choices in the second part of the experiment in conformity
with the maximin rule. Thus, it seems that the conformity of agents' choices
with the maximin rule decreases as the experiment continues.
How can subjects' compliance with the maximin rule be evaluated when
we allow for some error, e.g., missing the maximin rule by just one alter-
native. Table 17 informs about this.
Table 17 shows that, allowing for an error of missing the best alternative
according to the maximin rule but by one alternative, we have a hit rate
(except the 5th choice) of more than 64%. Thus, although the maximin
rule is not followed for all of a subject's choices, our data show that this
rule generally enjoys great attention among our subjects.
In contrast, things are not very encouraging for the maximax rule. The
maximax rule involves the choice of the parameter c, where c > 1. Our
calculations show us that the choice alternatives endorsed by the maximax
rule are extremely sensitive to the value of c. For c = 1.05, only 9 subjects
are in conformity with the maximax rule for the first choice of part one of
the experiment. This figure rises to 15 for c = 1.1, and to 26 for c = 1.2. The
hit rate increases sharply with rising c, which reflects that greater values
of c reduce the differences between the choice alternatives by assigning the
same maximum value to more alternatives. Therefore, we conclude that the
maximax rule is not a good explanation of individual behaviour and we do
not bother the reader with numerical results of our tests of this rule.
5 Conclusion
We utilized a choice experiment presented in the context of recruiting a
secretary to investigate whether decision processes are multi-phased and
which decision rules are consistent with subjects' choice behaviour. In the
most elementary form, mulit-phased decision processes should manifest
at least in the form of an editing phase, in which dominated alternatives
are eliminated from further consideration, and a decision phase proper.
Furthermore, we tested whether individual choice behaviour is consistent
443
1 120 70 75 6 8 6
2 118 65 73 5 7 5
3 95 90 67 8 7 8
4 94 88 66 8 7 7
5 97 68 95 8 6 8
6 96 66 92 7 5 8
7 101 72 59 10 8 6
8 100 69 57 9 7 5
9 104 75 72 8 10 7
10 103 73 69 8 9 7
11 108 81 62 6 7 10
12 107 79 60 6 7 9
13 109 85 82 8 8 8
14 105 62 70 5 7 6
15 91 59 62 5 7 5
16 88 81 55 8 7 5
17 79 66 64 7 6 6
18 92 57 80 6 5 7
19 88 63 50 7 4 5
20 96 60 55 6 6 4
21 99 48 52 5 6 5
22 100 71 65 7 7 7
23 102 66 48 6 6 7
24 96 75 51 5 4 8
25 104 62 46 6 7 5
Table 2: The Dominance Structure of the Choice Alternatives
2 4 5 678 10 11 12 13 14 15 16 17 18 19 20 21 222324251E
6
2 2
3
4 4
5 5
2
7 4
3
9 9
10 7
11 7
12 5
13 12
14 2
15 o
16
17 o
18 o
19 o
20 o
21 o
22 5
23 o
24 o
25 o
E o o o o o o o 2 10 3 7 3 11 10 11 3 5 3 5
1 means that alternative i (line) dominates alternative j (column). The line sums indicate the number of alternatives which are
dominated by the alternative of the respective line. The column sums indicate the number of alternatives which dominate the
alternative of the respective column (k-dominance).
~
446
0 0 1 3 2 0 0 1 -~
7
1 0 0 4 3 3 2 0 0 12
2 0 1 0 4 0 1 1 2 -~
9
3 - - 0 0 0 0 3 2 1 4 1()
4 () () () 1 2 0 3 6
5 ~-
- _. () 0 () () () 1 1
6 - - -
0 () 0 () () ()
7 () 0 () 0 0
8 - () 0 0 0
9 0 () ()
1() - - -- - - () ()
SUlll () 1 8 5 7 2 6 5 3 8 45
() () () 1 () 1 () -* -
2
1 0 () 1 3 4 () 1 -* 9
2 0 2 4 4 3 1 1 1* 16
3 - () 0 0 1 1 2 2 -* 6
4 () 0 1 1 1 2 5 10
5 - - - () 0 () () 1 1 2
6 - - -
0 () () () () ()
7 -
0 () () 0 ()
8 ~- - () () () ()
9 - - () 0 0
1() - ~- - - () 0
SUlll () () 4 7 9 5 4 4 6 6 45
* N ou-blank possibility for one subject ouly
447
# Dl D2 D3 D4 Ds Frequency %
of hit.s
0 0 0 0 0 0 5 11.11 11.11
1 0 0 0 0 8 17.78
0 1 0 0 0 4 8.89
1 0 0 0 1 0 1 2.22
0 0 0 0 1 1 2.22 31.11
1 0 1 0 0 1 2.22
1 0 0 1 0 3 6.67
1 0 0 0 1 2 4.44
2 0 1 1 0 0 1 2.22
0 0 1 1 0 2 4.44
0 0 1 0 1 2 4.44 24.43
1 1 0 1 0 2 4.44
1 0 1 1 0 1 2.22
3 1 0 1 0 1 1 2.22
1 0 0 1 1 2 4.44 13.32
1 1 1 1 0 2 4.44
4 1 1 0 1 1 2 4.44
1 0 1 1 1 1 2.22 1l.l0
5 1 1 1 1 1 4 8.89 8.89
2 3 4 5 6 7 8 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
0 0 0 0 0 1 0
2 0 0 0 0 0 0
3 0 0 0 1 0
4 0 0 0 0
5 0 0 0 0
6 0 0 0 0
7 0 1 0 0
8 0 0
0 1 0
10 0 0
11 0 0
12 0 0 0
13 0
14 0 0 1
15 0 0 0
16 0 0 0 0 0
17 0 0 0
18 0 0 0 0 0
19 0 0
20 0 0 0 1
21 0
22 0 0
23 0 0 0 0
24 0 0 0
25 0 0
449
References
Battalio, RC., Kagel, J.H., and Jiranyakul, K (1990) "Testing Betwen
Alternative Models of Choice Under Uncertainty: Some Initial Results",
Journal of Risk and Uncertainty 3, 25-50.
Becker, G.M., DeGroot, M.H., and Marschak, J. (1963a) "Stochastic Mod-
els of Choice Behavior", Behavioral Science 8,41-55.
Becker, G.M., DeGroot, M.H., and Marschak, J. (1963b) "An Experimental
Study of Some Stochastic Models for Wagers" , Behavioral Science 8, 199-
202.
Bern, D.J. (1972) "Self-Perception Theory", in: L. Berkowitz (ed.), Ad-
vances in Experimental Social Psychology, Academic Press: New York,
1-62.
Bettman, J.R, and Kakkar, P. (1977) "Effects of Information Presenta-
tion Format on Consumer Information Acquisition Strategies", Journal
of Consumer Research 3,233-240.
Block, H.D., and Marschak, J. (1960) "Random Orderings and Stochastic
Theories of Response", in: I. Olkin et al. (eds.), Contributions to Prob-
ability and Statistics: Essays in Honor of Harold Hotelling., Stanford
University Press: Stanford, 97-132.
Borcherding, K, Schmeer, S., and Weber, M. (1995) "Biases in Multiat-
tribute Weight Elicitation", in: J.-P. Caverni, M. Bar-Hillel, H. Barron,
and H. Jungermann (eds.), Contributions to Decision Research, North-
Holland: Amsterdam, 3-28.
Camerer, C.F. (1989) "An Experimental Test of Seven Generalized Utility
Theories", Journal of Risk and Uncertainty 2, 61-104.
Chipman, J.S. (1960) "Stochastic Choice and Subjective Probability", in:
D. Willner (ed.), Decisions, Values and Groups, Pergamon Press: Oxford-
London-New York, 70-95.
Conlisk, J. (1988) "Optimization Cost", Journal of Economic Behavior and
Organization 9, 213-228.
Coombs, C.H. (1964) A Theory of Data, Wiley: New York.
Coombs, C.H., and Kao, RC. (1955) "Nonmetric Factor Analysis", Re-
search Bulletin No. 38, Engineering Research Institute, University of
Michigan: Ann Arbor.
Dawes, RM. (1964) "Social Selection Based on Multidimensional Criteria",
Journal of Abnormal and Social Psychology 68, 104-109.
Dawes, RM. (1988) Rational Choice in an Uncertain World, Harcourt
Brace Jovanovich: San Diego.
Debreu, G. (1960) "Review of RD. Luce, Individual Choice Behavior: A
Theoretical Analysis", American Economic Review 50, 186-188.
Dyer, J.S., and Sarin, RK (1979) "Measurable Multiattribute Value Func-
tions", Operations Research 27, 810-822.
Einhorn, H.J. (1970) "The Use of Nonlinear, Noncompensatory Models in
Decision Making", Psychological Bulletin 73, 221-230.
451
533.
Restle, F. (1961) Psychology of Judgment and Choice, John Wiley & Sons:
New York.
Russo, J.E. (1977) "The Value of Unit Price Information", Journal of Mar-
keting Research 14, 193-20l.
Russo, J.E., and Dosher, B.A. (1983) "Strategies for Multiattribute Binary
Choice", Journal of Experimental Psychology: Learning, Memory, and
Cognition 9, 676-696.
Seidl, C., and Traub, S. (1998) "A New Test of Image Theory", Organiza-
tional Behavior and Human Decision Processes, (forthcoming).
Shepard, R.N. (1964a) "Attention and the Metric Structure of the Stimulus
Space", Journal of Mathematical Psychology 1,54-87.
Shepard, R.N. (1964b) "On the Subjectively Optimum Selection Among
Multiattribute Alternatives", in: M.W. Shelly and G.L. Bryan (eds.),
Human Judgments and Optimality, John Wiley & Sons: New York.
Shugan, S.M. (1980) "The Cost of Thinking", Journal of Consumer Re-
search 7, 99-111.
Simon, H.A. (1955) "A Behavioral Model of Rational Choice", The Quar-
terly Journal of Economics 69, 99-118.
Slovic, P. (1975) "Choice Between Equally Valued Alternatives", Journal of
Experimental Psychology: Human Perception and Performance 1, 280-
287.
Slovic, P., and Lichtenstein, S. (1968) "The Importance of Variance Pref-
erences in Gambling Decisions" , Journal of Experimental Psychology 78,
646-654.
Slovic, P., and MacPhillamy, D. (1974) "Dimensional Commensurability
and Cue Utilization in Comparative Judgment" , Organizational Behavior
and Human Performance 11,172-194.
Smith, E.R., and Miller, F.S. (1978) "Limits on Perception of Cognitive
Processes: A Reply to Nisbet & Wilson" , Psychological Review 85, 355-
362.
Smith, V.L. (1982) "Microeconomic Systems as an Experimental Science",
The American Economic Review 72, 923-955.
Smith, V.L., and Walker, J.M. (1993) "Monetary Rewards and Decision
Cost in Experimental Economics", Economic Inquiry 31, 245-26l.
Starmer, C., and Sugden, R. (1989) "Probability and Juxtaposition Effects:
An Experimental Investigation of the Common Ratio Effext", Journal of
Risk and Uncertainty 2, 159-178.
Svenson, O. (1979) "Process Descriptions of Decision Making", Organiza-
tional Behavior and Human Performance 23, 86-112.
Tversky, A. (1969) "Intransitivity of Preferences", Psychological Review
76,31-48.
Tversky, A. (1972a) "Elimination by Aspects: A Theory of Choice", Psy-
chological Review 79, 281-299.
Tversky, A. (1972b) "Choice by Elimination", Journal of Mathematical
454
Psychology 9,341-367.
Tversky, A., and Sattah, S. (1979) "Preference Trees", Psychological Re-
view 86,542-573.
Tversky, A., Sattah, S., and Slovic, P. (1988) "Contingent Weighting in
Judgment and Choice", Psychological Review 95, 371-384.
Tyszka, T. (1983) "Contextual Multiattribute Decision Rules", in: L.
Sj5berg, T. Tyszka, and J.A. Wise (eds.), Human Decision Making, Bok-
f5rlaget Doxa: Lund, 243-256.
Von Nitzsch, R., and Weber, M. (1993) "The Effect of Attribute Ranges on
Weights in Multiattribute Utility Measurements", Management Science
39, 937-943.
Von Winterfeldt, D., and Edwards, W. (1982) "Costs and Payoffs in Per-
ceptual Research", Psychological Bulletin 91, 609-:-622.
Von Winterfeldt, D., and Edwards, W. (1986) Decision Analysis and Be-
havioral Research, Cambridge University Press: Cambridge.
Weber, M., and Borcherding, K. (1993) "Behavioral Influences on Weight
Judgments in Multiattribute Decision Making" , European Journal of Op-
erational Research 67, 1-12.
Wedell, D.H. (1991) "Distinguishing Among Models of Contextually In-
duced Preference Reversals" , Journal of Experimental Psychology: Learn-
ing, Memory, and Cognition 17, 767-778.
White, P. (1980) "Limitations on Verbal Reports of Internal Events: A
Refutation of Nisbett & Wilson and of Bern", Psychological Review 87,
105-112.
Wright, P., and Barbour, F. (1977) "Phased Decision Strategies: Sequels
to an Initial Screening", TIMS Studies in the Management Sciences 6,
91-109.
Yntema, D.B., and Torgerson, W.S. (1961) "Man-Computer Cooperation
in Decisions Requiring Common Sense" , IRE Transactions of the Profes-
sional Group on Human Factors in Electronics, HFE 2,20-26.
Collusion and distribution of profits under
differential information*
11794-4384, U.S.A
2 Department of Economics, University of Illinois at Urbana-Champaign, 330
Commerce West Building, 1206 South Sixth Street,Champaign, 1L 61820, U.S.A
1 Introduction
We study the collusion of firms with differential information. A game with
differential information consists of a finite number of firms, where each firm
is characterized by its strategy set, its payoff function, its private informa-
tion (which is a partition of an exogeneously given probability measure
space) and a prior. When firms collude, they choose an output level that
maximizes joint expected profits. The information firms can use in the col-
lusive agreement varies. Firms may pool their information, may use their
private information, or they may choose to use their common knowledge
information. Each type of information sharing yields different profits and
most importantly creates different incentives to the individual firms for
1 A collusive agreement is coalitional incent.ive compatible when there does not exist
a coalition of firms that can misreport the true state of nature and benefit its members.
For a precise definit.ion see definit.ion 7.1.
457
2.2 Definitions
If X and Y are sets, the graph of the set-valued function (or correspon-
dence), <jJ : X - t 2Y is denoted by
lim r
n-->oo ln
/lfn(w) - f(w)/ldJ.L(w) = O.
In this case we define for each E E F the integral to be
It is a standard result that normed by the functional /I. /lp above, Lp(J.L, X)
becomes a Banach space [see Diestel-Uhl (1977), p.50j.
ii) 1ri: Q(W) --. IR is the random profit function2 of firm i, (where Q(w) =
Ql(W) x ... X Qn(w));
ill) Fi is a sub iT-algebra of F, which denotes the private information of
firm i;
iv) J.L is a probability measure on n denoting the common prior.
Let LQi denote the set of all Bochner integrable and Fi-measurable se-
lections from the production set Qi of firm i, i.e.,
Let LQ = LQl X ... x LQn. Given a Cournot game, a production plan for
firm i is an' element qi E LQ;.
The ex-ante expected profit function 3 of firm i, ITi : LQ -+ IR is defined
as 4
ITi(qi, q-i) = 1 wEn
1ri(qi(W), q-i(w))dJ.L(W).
2 If pew) : Q(w) ..... R is the inverse demand function and C i : Qi(W) ..... R is the cost
function of firm i, then 1T;(q(W) = p(q(W»qi(W) - Ci(q;(W». We could have allowed
the payoff function 1T to depend also on the state of nature w. The results of the paper
remainualid.
3The entire analysis would go through if instead of the ex-ante profit function we
used the interim one. That is, the conditional (interim) expected profit function of firm
i Ili(',' ) : LQi x Q-i(W) ..... R is defined as
where
ki(w'IEi(W» = {o qi(W')
---
f';'EEi(W) q;(w)dJ.«w)
ifw ' E E;(w)
J
is the prior of agent i, (where ki is a Hadon-Nikodym derivative such that ki(W)dp(w) =
1 and Ei(W) denot.es the event in firm i ' s partition which contains the realized state of
nature).
4For simplicity we assume that the profit function does not. depend on n. As we
mentioned above all t.he results of the paper remain valid.
460
Let L~i denote the set of all Bochner integrable and Vi=l Fi- measurable
selections from the production set Qi of firm i, i.e.,
5That is the smallest IT-algebra containing all of the sub IT-algebras Fi, i = 1, ... , n.
6That is the largest IT-algebra contained in all of the sub IT-algebras Fi, i = 1, ... , n.
462
Proof: Obvious. 0
However, as the following proposition indicates, we cannot compare the
industry profits derived under the common knowledge rule with those de-
rived from the Cournot-Nash game. The reason is that when firms collude
using the common information, essentially they throwaway some valuable
information, which means lower profit. On the other hand, the joint maxi-
mization alone, gives them higher profits. In this general setting we cannot
tell which effect outweighs the other.
Proposition 6.3: The industry profits derived from the collusion under
the common knowledge information rule and the ones derived from the
Cournot-Nash game are not comparable.
Proof: Consider a Cournot game with two firms {1,2}, three states of
nature, i.e., n = {a, b, c} and one homogeneous output q. Each state occurs
with the same probability. Each firm's private information is given by the
following partition of the state space,
q~ ifw=a
C2(w, Q2(W)) = { .4Q~ if w = b
.8Q~ if w = c.
Notice that firm 1 has trivial information, while firm 2 has complete infor-
mation. The following production plan is a Cournot-Nash equilibrium,
The expected industry profits from the Cournot-Nash game are 174.747.
Now assume that firms collude using the common knowledge information
rule. This now implies that production must be constant across all states.
The production plan is
if wE Ei(a) n E_i(a)
otherwise.
It follows that
8 Ei(b), is the event in firms' information partition that contains the realized state b.
9 qS and qI\S are vectors of outputs for firms in coalition S and I \ S respectively.
466
if W = a,b
ifw = c
.25 if w = a, c
C2(W) ={
1 if w = b.
8 Distribution of profits
So far, we showed that when firms collude (under the pooled and the private
information rules), industry profits are higher than the profits obtained
by the Cournot-Nash game. Moreover, profits may be higher when firms
collude under the common knowledge information rule. The question that
remains to be answered is how are these extra profits being distributed
among the firms in a way that captures the contribution of each firm to
the total profits.
The Shapley value of the game r (Shapley 1953) is a rule that assigns
to each firm i a "payoff", Shi, given by the formula,ll
The Shapley value has the property that L:iEI Shi(V) = V(I), i.e., the
Shapley value is Pareto efficient. Moreover, it is individually rational, i.e.,
Shi 2 V({i}),Vi.
We now define for each Cournot game with differential information, C,
and for each set of weights, {Ai : i = 1, ... , n}, the associated game with
side payments (I, VI) (we also refer to this as a "transferable profits" (TP)
game) as follows:
where Shi(VI) is the Shapley value of firm i derived from the game (I, VI),
defined in (8.1).
The above definition says that the expected profits of each firm multiplied
by its weight .Ai must be equal to its Shapley value derived from the (TP)
game (1, VI).
An immediate consequence of Definition 8.1.2 is that the private value
production plan is individually rational (profits for firm i are greater than
of equal from the ones derived from the Cournot-Nash game). This follows
immediately from the fact that the game (I, VI) is superadditive for all
weights. In addition, it is Pareto efficient. 12
We are now ready to state the first existence result of this section.
TheoreIn 8.1.1: LetC = {(Qi,1l"i,Fi ,/L): i = 1, ... ,n} be a Cournot game
as defined in Section 3, satisfying assumptions (A.l}-(A.2).
Then, a private value production plan exists in C.
Proof: This result can be proved along the lines of Krasa and Yannelis
(1996), Theorem 1. 0
ReInark: One can easily show that a pooled information (where the in-
formation that is being used is the pooled information) value production
plan 13 exists as well.
subject to
i) for each i, qi is Ai=l Frmeasurable.
The common knowledge value production plan can now be defined as in
definition (8.1.2), except that we replace (8.1) by (8.2) and also replace VP
by Vc.
Thus, in contrast to the private value production plan, we now require the
production plan within a coalition to be based on the common knowledge
information. Notice that the common knowledge value production plan is
coalitional incentive compatible. However, we cannot prove a general exis-
tence theorem. In fact, if, for example, one firm has "trivial" information
and the other has "full" information, the common knowledge information
implies that the trivial information must be used and therefore the super-
additivity condition of the function Vf(· ) may be violated, i.e., there can
exist coalitions S, T with S n T = 0 and Vf(S) + Vf(T) > Vf(S U T).14 In
the proof of proposition 6.3, we present an example with two firms where
the Cournot-Nash equilibrium yields higher profits than collusion under
common knowledge information, which destroys the superadditivity condi-
tion. This causes problems with the existence of a common knowledge value
production plan. Therefore, we cannot prove a general existence theorem
of a common knowledge value production plan.
9 Examples
Below we give examples with two firms, with differential information, that
collude using the common knowledge information rule and the distribution
of profits is determined by a common knowledge value production plan.
These examples illustrate how the common knowledge production plan is
determined and also show that firms with superior information, while keep-
ing the other characteristics of the firms (Le., marginal cost) fixed, have
higher Shapley value and higher share of the industry profits. The profits
from collusion are higher than the Cournot-Nash profits and the Shapley
value of each firm captures its contribution to the total industry profits. It
is important to note here that in these examples the value allocation is in
the core and therefore the cartel can be viewed as stable, in the sense that
no coalition of firms can deviate from the cartel agreement and become
strictly better off.
Example 9.1
Consider two firms {I, 2} that produce a homogeneous product. The
state space is n = {a, b} where each state occurs with probability and !
the private information of each firm is: :F1 = {{ a}, {b} } and :F2 = {{a, b} }.
We denote by q1 (w), q2 (w) the production in state w of firm 1 and firm 2
respectively. The inverse demand that firms face is: p = (5 - ,B(W)(q1(W) +
q2 (w) ) ). The marginal cost is zero for both firms. The slope ,B takes on the
following values:
.8 ifw =a
,B(w) ={
1.2 if w = b
A Cournot-Nash equilibrium is
.8 if w = a
C2(W) = { ,
1.2 if w = b
I ifw=a
{
CI(W) = 1 ifw=b.
A Cournot-Nash equilibrium is
1 1
Sh 2 = 2[2.66667 - 1.18519] + 2[1.19185] = 1.33667.
Then, a value production will be a solution to the following problem:
472
10 Concluding remarks
Remark 1: Alternatively, one could have used the notion of the a-core
which is defined as follows: We say that q E LQ is an a-core of the game C
if
it is not true that there exist S c I and (Yi)iES E IIiEsLQi such that
for any zI\S E IIi'isLQilIIi(yS,zI\S) > IIi(q) for all i E S.
References
Balder, E.J., and N.C. Yannelis (1993): "On the Continuity of the Expected
Utility," Economic Theory," 3, 625-643.
Crampton, P.C., and T.R. Palfrey (1990): "Cartel Enforcement with Un-
certainty About Costs," International Economic Review, 31, 17-47.
Diestel, J., and J. Uhl (1977): "Vector Measures, Mathematical Surveys,"
American Mathematical Society, 15. Providence.
Dondimoni, M.P, N.S. Economides, and H.M. Polemarchakis (1986): "Sta-
ble Cartels," International Economic Review, 27,317-327.
Emmons, D. and A.J. Scafuri (1985): "Value Allocations-An Exposition,"
in C.D. Aliprantis et al., eds., Advances in Equilibrium Theory. Springer,
Berlin, Heidelberg, New York.
473
Krasa, S., and N.C. Yannelis (1994): "The Value Allocation of an Economy
with Differential Information," Econometrica, 62, 881-900.
Krasa, S., and N.C. Yannelis (1996): "Existence and Properties of a Value
Allocation for an Economy with Differential Information," Journal of
Mathematical Economics, 25, 165-179.
Laffont, J.J., and D. Martimort (1997): "Collusion under Asymmetric In-
formation," Econometrica, 65, 875-91l.
Roberts, K. (1983): "Self-Agreed Cartel Rules," working paper, IMSSS,
Stanford University.
Rotemberg, J.J., and G. Saloner (1990): "Collusive Price Leadership," The
Journal of Industrial Economics, XXXIX, 93-11l.
Shapley, L.A. (1953): "A Value of n-person Games," in H.W. Kuhn and
A.W. Thcker, eds., Contributions to the Theory of Games, Vol. H. Prince-
ton University Press, Princeton, NJ, 307-317.
Yannelis, N.C., (1991): "The Core of an Economy with Differential Infor-
mation," Economic Theory, 1, 183-198.
Yannelis, N.C. and A. Rustichini (1991): "Equilibrium Points of Non-
Cooperative Random and Bayesian Games," in Positive Operators, Riesz
Spaces, and Economics, C.D. Aliprantis, K.C. Border and W.A.J. Lux-
emburg, eds., Springer-Verlag.
Zhao, J., (1998): "A Necessary and Sufficient Condition for the Convexity
in Oligopoly Games," Mathematical Social Sciences, forthcoming.
Predicting proposal configurations in
cooperative games and exchange economies
Plnton Stefanescu
1 Introduction
During the last three decades, many authors have proposed different ex-
tensions of classical solution-concepts of cooperative games, in order to
cover situations when such solutions don't exist or when they seem to be
inadequate.
The competitive solutions have been introduced by McKelvey, Ordeshook
and Winer (1978) as any stable configuration of proposals. By a proposal
the authors mean an offer that a coalition can make, which in turn is for-
mally defined as a pair consisting of a coalition and a feasible utility-vector
which is effective with respect to it. Unlike in earlier solution-concepts, the
coalitions in a competitive solution are not necessarily mutually disjoint.
The un~form competitive solutions are basically modified versions of the
above concept. They appear first in Stefanescu (1993). In an extensive
comparative study of competitive and uniform competitive solutions of TU
games (Stefanescu, 1994), it is shown that, although the two concepts differ,
any competitive solution for non-trivial games is a uniform competitive
solution too. However, in the general framework of NTU games, significant
existence results of competitive solutions are missing. The main advantage
of the new concept of uniform competitive solution is that one can prove
476
Monotonicity says that utilities which are effective for a coalition are
478
still available for all members of this coalition when they commit to form
a larger coalition.
The most general situation described by the pair (N, V) is of the non-
transferable utility (NTU) game. A transferable utility (TU) game may also
be represented as above. Traditionally, a TU game is defined by its real-
valued characteristic function v : 2N ---t ]R, where v( C) is the maximum
total payoff that the members of C can make independent of the actions
of players outside of C. A commonly used representation of a TU game in
the coalitional function form is then (N, V), where
Intuitively, a proposal is an offer that a coalition can make for its mem-
bers. The associated payoff is effective for the coalition but must be extend-
able up to a feasible payoff, that is, actually be achievable by the entire set
of players.
Remark 1 If the game is monotonic then the meaning of this notion ba-
sically reduces to that of C-effectiveness.
For the next definitions we will consider a finite collection of proposals,
K = {(xC,C)IC E Cl, where C S;;; 2N \{0} covers N, i.e., UCECC = N.
Definition 3 K is a uniform competitive solution (u.c.s.) if it satisfies the
following two conditions:
The basic ideas in the above definitions are to ensure that any (weakly)
u.c.s. is a stable proposal-configuration.
479
This stability has two components: internal stability and external stabil-
ity. Internal stability requires by (2) that each player has identical prefer-
ences for the offers coming from different coalitions when he is a potential
member of them. Therefore, there are no objections from inside.
External stability, expressed in the two variants by (3) and (correspond-
ing to the weaker version of the Pareto principle) by (4), says that no out-
side coalition can threaten the existing configuration, because there does
not exist a coalition which can make its members better off.
As it immediately follows from the definitions that any solution is
coalitionally-rational.
Proposition 1 If K ={(xC,C)IC E C} is a u.c.s. (w.u.c.s.), then xC is a
Pare to optimum (weakly Pareto optimum) ofV(C) nprcV(N), for every
CEC.
Remark 2 For monotonic games, coalitional mtionality says that every
coalition involved in a solution offers its members an optimal effective pay-
off·
The usual meaning of individual rationality is that each player should
receive at least the best utility he can obtain himself. In the present frame-
work, we define the individually-rational payoff level of the player i E N
by
Vi = {SUPV({i})npriV(N), ifV({i})-/=0
-00, if V({i}) = 0.
Now, let us associate to each u.c.s. (w.u.c.s.) a utility vector w with the
components
Wi = xfwhenever i E C E C.
By (2), W is well-defined. Call it the ideal payoff vector associated with
K. Obviously, the i-th component of w is exactly the utility promised to
player i by all coalitions of C where he is a potential member.
Proposition 2 If w is the ideal payoff vector associated with the u. C.s.
(w.u.c.s.) K, thenwi 2: Vi, for all i E N.
In summary, each u.c.s. (w.u.c.s.) is individually-rational because it pre-
dicts to each player a utility not less than the one he can guarantee for
himself, and coalitionally-rational because each coalition directly involved
can offer its members an optimal effective payoff.
In the remainder of this section, we exemplify the previous definitions.
The games in all three examples have empty core but admit a u.c.s. or
w.u.c.s.
Example 1 Consider the three person TU game with the chamcteris-
tic function v where v({i}) = 1,i = 1,2,3; v({1,2}) = v({1,3}) = 4;
v({2,3}) = 3; v({1,2,3}) = 5.2.
480
Define V by (1).
The proposal-configuration
K ={((1.5, 1.5), {I, 2}), ((1.5, 1.5), {I, 3}), ((1.5, 1.5), {2, 3})}
is a w.u.c.s. and its associated ideal payoff vector is w = (1.5,1.5,1.5). One
can easily verify that the game does not admit any u.c.s ..
Example 3 n = 4. The coalitional junction V is given by
u.c.s. (w.u.c.s.) with respect to the ordering "~" on the set of proposal-
configurations.
A first existence result concerning w.u.c.s. shows that this solution-
concept is actually an extension of the core concept.
Proposition 4 If the core C(N, V) is nonempty, then for every w E
C(N, V) the proposal-configuration J( = {(w,N)} is a w.u.c.s.
Proof. Immediately follows from the previous proposition. •
Remark 3 A converse implication for games satisfying (A.4) also holds.
In this case, if J( ={w,C} is any w.u.c.s. such that NE C(w), then w E
C(N, V). (Therefore, the core is not empty.)
Now, the main existence result for w.u.c.s. follows.
Theorem 5 Any cooperative game (N, V, W) satisfying (A.l}-(A.4) ad-
mits a w.u.c.s, provided that W -=I 0.
The proof is based on the following construction, similar to the "reduced
game technique" (see Peleg, 1986).
Pick a coalition T E W, minimal with respect to "~" (i.e., there is no
SEW such that SeT ). Let z be a Pareto-optimum of VeT) (Le.,
x E VeT), x ~ z imply x = z). Clearly, if T is a singleton set, say T = {k},
then z = Vk = max V( {k}) = max V( {k}) n PTk V(N) (by (A.l), (A.2) and
(AA». If I TI ~ 2, then for any y ::; VeT) the set {x E V(T)lx ~ y} is a
nonvoid compact in jRT (by (A.l) and (A.2) and admits a Pareto-optimum.
Obviously this one is a Pareto-optimum of VeT). Note also that by (A.4)
z E PTTV(N).
Set M = N \ T and define the reduced game (M, VM, WM) by
VM(C) = UP~T{X E jRcl(x,zp) E V(CU PH
for all 0 -=I C ~ M.
The next two lemmas will be proved under the assumptions of the the-
orem.
Lemma 6 WM = 2M \ {0} and VM satisfies all conditions (A.l}-(A.4).
Proof. To prove the first assertion, it is sufficient to observe that CuT E W
(from monotonicity ofW) and z E VeT) ~ PTTV(CUT), and so VM(C) -=I 0
for every C ~ M, C -=I 0.
Show now that VM verifies (A.l) to (AA):
(A.l) is obviously satisfied, since each term of the union representing
VM(C) is the section of a closed set.
To check (A.2), pick a vector y E jRc, for some C ~ M. Then
and each set in the last union is the projection of a bounded set.
Since the comprehensiveness of VM is obvious, let us verify (A.4). Assume
that C c D ~ M. Then, for every P ~ T, V(C U P) ~ prcupV(D U P)
and, consequently, prcV(C U P) ~ prcV(D UP). Hence,
Lemma 7 Assume that the reduced game has a w.u.c.s. and let w be its
associatedidealpay-ofJ. Then the pair (u,C(u)), whereu = (w,z) represents
a w.u.c.s. of the game (N, V, W).
Proof. Since (w,C(w)) is a w.u.c.s. of the reduced game, one has
UCEC(w)C = M. Moreover, for each C E C(w), Wc E VM(C), so that
there exists P ~ T such that (wc, zp) E V(C U P) and thus CUP E C(u).
Since T E C(u) it follows that UC'EC(u)C' = M U T = N.
Now, to prove the lemma, it suffices to verify (7) of Proposition 3.
Let (x, S) be a proposal of the game (N, V, W). Clearly, S = T, or,
S n M "# 0. Suppose that x » us. Obviously, S = T is impossible, since
UT = z and z is Pareto-optimum of V(T). Then we must have S = CUP,
with 0 "# C ~ M and P ~ T. By (A.3), (xc, zp) E V(S) and hence,
Xc E VM(C). But Xc »uc = Wc, contradicting the definition of w . •
Now we will prove the theorem in two steps.
1. Consider first the case when W =2 N \ {0}. The existence of a w.u.c.s.
will be proved by induction on n = 1Nl. For n = 1, V({l}) is a non-
empty closed upper-bounded subset of lR so that, {(Wl' {I})}, where Wl =
maxV({l}), is a w.u.c.s. Assume the existence of w.u.c.s. for any game
with at most n -1 players, and consider the n-person game (N, V, W). Set
M = N \ {n} and form the reduced game. Since WM = 2M \ {0}, it follows
by induction that the reduced game has a w.u.c.s. Hence, by Lemma 6, the
game (N, V, W) has a w.u.c.s.
2. The general case when W "#0. Apply Lemma 6 to the reduced game
properly defined. The reduced game has a w.u.c.s (by the first step of the
proof), so the original game also has a w.u.c.s ..•
By similar arguments, the existence of a u.c.s. can also be proved if the
following condition is fulfilled:
(A.5) For any c > 0, S ~ N, x E V(S) and i E S, there exists y E V(S)
such that Yi = Xi - c, and Yj > Xj for all j E S \ {i}
Basically, this axiom states that, within the set of effective payoffs of a
given coalition, it is always possible to improve the utility of other players
if one player accepts to diminish his own utility.
The game in Example 1 doesn't satisfy (A.5) and doesn't admit a u.c.s.
Therefore, in the next existence theorem this condition cannot be removed.
484
Proof. In fact, we can prove that for a game satisfying (A.5), any w.u.c.s.
is a u.c.s ..
Let K be a w.u.c.s. represented in the compact form by (w,C) and a
proposal (x,8) such that x > Ws. Pick an i E 8 such that Xi > Wi and put
£ = Xi - Wi. By (A.5) there exists a proposal (y,8) such that Yi = Xi - ~
and Yj > Wj for allj E 8\ {i}. But this means Y ~ ws, which is impossible.
Thus K is a u.C.S ..•
One can easily verify that for every "1' c;;. "1 with {N} E "1', the games
(N, V) and (N, V-y') have the same uniform competitive solutions. Particu-
larly, if 'Yb is the family of all balanced collections, then the game (N, V-Yb)
is balanced. If (N, V) satisfies all assumptions of the existence theorems,
then (N, V'Yb) has nonempty core. Let U E C(N, V'Yb ). Then there exists
C E 'Yb such that Uc E V(C) for all C E C. By the monotonicity of (N, V),
for each C E C there exists u C E V(N) such that ug = Uc. Clearly, K
= {(u C , C) ICE C } is a u.c.s. of (N, V-Yb)' thus it is a u.c.s. of (N, V) with
a balanced configuration of coalitions.
485
where N = {1,2, ... ,n} is the set of agents, (i is the i-th agent's initial
endowment, and Ui is real valued function representing his preferences over
the commodity space.
One considers the finite-dimensional case, with m commodities, and iden-
tifies the set of all consumption plans of each agent with the positive orthant
JR+ of the commodity space. Then Ui : JR+ - JR, and if ui(a) > ui(b) we
will say that the agent i strictly prefers the consumption plan a to b. Each
agent has a non-zero non-negative endowment (i.e., (i > 0, for all i E N)
and the total endowment ( = EiEN (i is assumed to be strictly positive
« »0.)
Any redistribution of the total endowment to agents is called an alloca-
tion. Formally, an allocation is an n-tuple a = (aI, a2, ... , an) of consump-
tion plans, ai E JR+, i E N. Therefore, the set of all allocations is defined
as A = {x = (aI, a2, ... , an) I ai E JR+, i E N, EiEN ai = O.
For any set C of agents (coalition), denote by A(C) the set of all alloca-
tions where the members of C share their own endowment, i.e.,
N = {(aC,C)IC E C}
and
V(C) = {x E ~CI Xi:::; ui(ai) for some a E A(C) and for all i E C} (12)
or
V(C) = {x E ~~I Xi:::; ui(ai) for some a E A(C) and for all i E C}. (13)
follows from (9) let us verify (3). To the contrary, assume that (y, S) is a
proposal of the game (N, V) which verifies (i) and (ii) of (3). Then there
exists b E A(S) such that ui(bi ) ~ Yi for all i E S. Hence, band S satisfy
(i) and (ii) of (10), contradicting the definition of N.
Conversely, assume that lC is a u.c.s of the associated game of E. To
each proposal (xC, C) E lC corresponds an allocation aC E A(C) such that
xf ~ ui(af) for all i E C. One has xf = ui(af) for all i E C, because xC
is Pareto-optimum of V (C) n prcV (N). Choose one a C for each xC and
form N = {(aC,C)IC E Cl. Obviously, N satisfies (9). Show that it also
satisfies (10). If it is not that the case, then there are Sand bE A(S) which
verify (i) and (ii) of (10) with respect to N. But then, the proposal (y, S),
where Yi = ui(bi ), i E S, verifies (3) with respect to lC, a contradiction. •
The next existence results use this proposition and the results of the
previous section.
Proof. It suffices to show that the associated NTU game (12) satisfies the
assumptions of Theorem 8. By Proposition 12 it satisfies (A.4) , and the
comprehensiveness trivially follows from the definition. For each i E N,
the continuous function Ui is bounded on the compact [0, (j. Hence, V
has nonempty upper bounded values and, therefore, condition (A.2) is also
satisfied. To verify (A.I), assume that the sequence (xt) C V(C) converges
in ]Rc to some x. Then there exists a sequence (at) in A(C), with the
property that x~ ~ ui(aD for every i E C and for all t. Since A(C) is a
compact, there exists a subsequence of (at) that converges to an allocation
a E A(C). The continuity of Ui implies that Xi ~ ui(ai) for every i E C.
Hence, x E V (C), which proves the closedness of V (C) . •
Proof. One applies Theorem 11 to the associated games (13). For that,
one should prove that axiom (A.5') is also satisfied.
Without loss of generality, assume that Ui(O) = 0 for all i E N. Pick a
coalition C with 101 ~ 2 and an x E V(C). Then there exists a E A(C)
such that Xi ~ ui(ai) for all i E C. The non trivial case is when x> O. Then
ui(ai) > 0 for at least one i E C (by the monotonicity of Ui ). Pick then c
such that 0 < c ~ Xi. By the continuity of Ui one has that Xi - c = Ui(Aai)
for some A E (0,1). Take the allocation b, where bi = Aai, bj = aj + Ib[~l'
if j E C\{i} and bj = (j if j E N\C. Obviously, b E A(C) and the
489
monotonicity of utilities implies that uj(bj ) > uj(aj) for all j E C,j f:. i.
Then, Y verifies (A.5 / ), where Yi = Xi - € and Yj = uj(bj ) for j E C\{i} .•
References
Bennett, E. (1983) "The Aspirations Approach to Predicting Coalition For-
mation and Payoff Distribution in Sidepayments Games". International
Journal of Game Theory, 12: 1-28
Bennett, E. and Zame, W.R. (1988) "Bargaining in Cooperative Games".
International Journal of Game Theory, 17: 279-300
McKelvey, R.D, Ordeshook, P.C and Winer, M.D (1978) "The Competitive
Solution for N-Person Games Without Transferable Utility, With an Ap-
plication to Committee Games". The American Political Science Review,
72: 599-615
Peleg, B.(1986) "A Proof that the Core of Ordinal Convex Game is a von
Neumann-Morgenstern Solution". Mathematical Social Sciences, 11: 83-
87
Stefanescu, A. (1993) Competitive Solutions and Uniform Competitive So-
lutions for Cooperative Games". Social Science Working Paper 868, Cal-
ifornia Institute of Technology, Pasadena
Stefanescu, A. (1994) "Solutions for Transferable Utility Cooperative
Games". R.A.I.R.O. Rech.Oper. 28: 369-387.
International financial equilibrium with risk
sharing and private information*
Bart Taub
Abstract. There are two economies. Within each economy individuals un-
dergo idiosyncratic and common shocks to their endowments. The idiosyn-
cratic shocks are independent across individuals and as such can be pooled,
providing perfect mutual insurance. The common shocks are not internally
insurable. The two countries can trade risk in the common shocks however,
and standard ideas about trade in goods apply: there is a price of foreign
risk in terms of domestic risk, and beneficial trade occurs at this price. The
standard idea that small countries benefit from trade goes through in the
risk domain as well.
The mutual benefits of trade in risk can collapse if information about
the idiosyncratic endowment processes is private. In that instance an
information-eliciting contract can provide insurance of the idiosyncratic en-
dowment processes even under autarky. However, if the two countries open
to trade in the common risk processes the domestic information contracts
are affected; the degree of insurance can be reduced because of spillover
from the effects of the international risk sharing. The desire to insure both
idiosyncratic and common shocks can conflict to the point that one country
prefers autarky. In contrast to the standard result, the benefits of trade can
shrink and become negative as country size shrinks. These findings would
be somewhat academic were it not for the fact that within the model,
the information-eliciting contract generates a dynamic allocation identical
to that of an asset equilibrium. Thus, a theoretical foundation exists for
countries rationally restricting trade in assets.
*Earlier versions of this paper were presented at the 1997 meetings of the Society for
the Advancement of Economic Theory, the 1997 Summer Meetings of the Econometric
Society, Arizona State University, and the Federal Reserve Bank of Atlanta. I thank
Ayhan Khose, Dan Bernhardt, Hector Chade, Marco Espinosa, Alejandro Manelli and
a referee for helpful comments.
492
1 Introduction
That international trade is beneficial is a cornerstone of economics. The
idea rests on standard competitive and general equilibrium: if there is con-
vexity and competition, there is gain from exchange. The idea dictates
that countries remain as open as possible to international trade, with any
deviation from full openness viewed as pathological. It is typically contem-
plated in the context of static equilibrium with multiple goods; in dynamic
settings it goes through if goods indexed by time are treated as different
goods. It is this latter setting that will be examined here. As is standard
in macroeconomic theorizing, a composite static good will be assumed,
collapsing all exchange to intertemporal exchange. The standard theorem
dictates that countries should trade intertemporally; the exchange will take
the visible form of assets exchanged for goods, and subsequent repayment
of the goods. By this logic countries should be borrowing and lending in
the international market, and enjoying benefits from doing so.
Such borrowing and lending, aside from smoothing the mundane frictions
of goods exchanges, exists essentially to smooth fluctuations of production
and consumption. To the extent that such smoothing is successful, bor-
rowing and lending can be viewed as insurance against those fluctuations.
Unsurprisingly, an international trade equilibrium in such insurance has
the standard efficiency property: regardless of country size, internal char-
acteristics, or volatility of endowment, trade is beneficial.
But this result depends on one assumption: that information about out-
comes is publicly observable. If that assumption is dropped and information
is private, the possibility develops that opening to international trade is
damaging. Because of this, countries can rationally restrict trade in assets,
making them appear inefficiently closed. The reason the standard result is
overturned is that if information is private, institutions constructed to ap-
propriately elicit private information can be radically affected by opening
to trade, thence forcing small countries to bear excessive risk.
I investigate this idea in a model that is similar to the two-country model
of Lucas [20], embellished with idiosyncratic shocks to individual endow-
ments within each country; it is the information about those shocks that is
private. International trade in the absence of private information would not
affect the treatment of those local shocks; it only affects risks that cannot
be diversified autarkically. But under private information, the properties
of international exchange are strongly affected by the need to elicit local
idiosyncratic information. In welfare terms, this effect can be thought of as
amplification of the direct effects of exchange.
One could argue for the relative insignificance of private information in
real settings. It is a tenet of this paper that private information is in fact
significant because money and bonds, which are ubiquitous in real settings,
reflect its presence. This idea is developed in [32], [31], and [30], and I will
refer to it as asset equivalence here. When settings are contemplated in
493
2 LQ contract mechanics
The linear-quadratic technique lends itself to a "building-block" approach.
Stochastic processes and their realized histories can be contemplated and
manipulated as objects. Contracts can be represented as functions and their
interactions with the individuals and elements of the economy can be rep-
resented by multiplication operations. Information flows are captured by
simple internal properties of the contracts which have direct analogues in
ordinary matrix algebra.
The elementary building blocks of a simple scarce-information model,
then how they fit together, will now be set out to illustrate these points.
Begin by supposing that there is a single individual acting autarkically.
The individual has a quadratic, additively time separable objective
2: {jt(Ct -
00
-Eo c)2,
t=o
where Ct is consumption and {j the discount factor. There is a bliss point at
c. Some standard technical assumptions are that the endowment process,
at = A(L)et, is covariance-stationary, with Gaussian, iid, mean-zero inno-
vations et, and with serial correlation described by a function of the lag
operator A(L), and with appropriate restrictions on the form of A.
One can view the individual as trying to hit a stochastically moving
target, A(L)et. In an amalgamation of many such individuals, there is a
potential to offset the target via mutual insurance. If the endowment re-
alizations are common to all individuals, no insurance is possible. But if
each individual's innovations et are independent of all others, those with
high positive at can trade with individuals with negative at. If there were
an insurance contract, and if it operated to perfectly offset residual endow-
ment realizations, the stochastic component of consumption in each period
would be A(L)et - h(L)A(L)et = 0, where h is some contractually deter-
mined function that operates on each individual's endowment process. All
risk would be eliminated.
If information about each individual's endowment process is private, such
insurance depends on successfully inducing individuals to truthfully reveal
their endowment realizations to the contract. This revelation is accom-
plished via incentive constraints. There are two kinds of incentive constraint
that need to be considered in the infinite horizon, linear-quadratic setting.
The first can be thought of as an adjustment cost constraint-it has the
natural interpretation of the cost of sending signals. I treated this explic-
itly in [32], but as I showed in [31], this constraint can be put into the
backround by noticing that its main effect is to ensure that the policies of
individuals are well-behaved.
The second incentive constraint is central to the analysis. The histories
of individuals' signals of their states are in essence infinite-dimensional vec-
tors. The contract weights these vectors in a way that unravels the vector,
495
The bi-processes are similar and independent of the ai processes, but the
innovations are common across individuals
COV[Ui,t+i (X), Ui,t+k(X) I(... , bi,t-l (X), bit (X))J = {~~ ~ ~ ~ , j, k > O.
and for distinct individuals x and y,
cov[Ui,t+i (x), Ui,t+k(Y) I(... , bi,t-l (x), bit (x)), (... , bi,t-l (y), bit(y))J = a~.
Because the effects of interest in this paper have to do with serial correla-
tion, the variances will be normalized:
a e2 -_ a2 -1 .
u -
I make the assumption that the law of large numbers holds, in the sense
that the realized average idiosyncratic innovation and idiosyncratic com-
ponent of endowment is zero, replicating the mean of the distribution, in
both economies [17, lOJ. The idiosyncratic part of endowment is therefore
insurable in the sense that pooling it yields zero consumption.
The two countries can differ in size (or have different innovation vari-
ances, but I am suppressing this as redundant); I normalize them so that
country 1 has size 8 and country 2 has size 1- 8. In the risk sharing analysis
below, these relative sizes will translate into variances.
Each individual x has a discounted, infinite horizon, additively time-
separable, quadratic objective:
00
- L,6t Ct (x)2.
t=O
E, [~fl'c1l = E, [~fl'(C(L)e,)2l
~f,6tc;~~ 1 C(z)C(,6z-1) dz
t=O 27rZ lIzl=l z
The equivalence in (i) is driven by the fact that the expectation of the
complicated object (C(L)et}2 is radically simplified because
o k-::j:.·
E[et-ket-iJ ={1 k =~ .
498
This treatment underscores the fact that the discounted utility and profit
objectives are simply norms of the infinite-dimensional vectors that char-
acterize the functions A(L), B(L), and so on. Therefore the following ad-
ditional equality holds:
Second, with full information, the idiosyncratic risk can be perfectly di-
versified since the endowments are mutually independent. Under full infor-
mation and no risk sharing across countries, but with internal risk sharing
that exploits this mutual independence, the idiosyncratic risk is perfectly
shared across individuals, but no insurance of the domestic aggregate risk
is possible. Welfare is then simply
3 Here is the first instance showing how the linear-quadratic formulation allows the
additive separability of payoffs generated by idiosyncratic and aggregate stochastic en-
dowment processes. For a more general treatment of the separability of aggregate and
idiosyncratic components of endowment processes, see [4J and [5J.
499
4 Tesar [36] used this type of portfolio scheme in a time-domain formulation. The
portfolio weights, Ai, are static. The evolution of endowment is continuous, in essence
changing the wealth of each country; it is an attribute of this linear-quadratic formulation
that this changing wealth would not change the portfolio weights. As an example of how
this property works explicitly, see [29], appendix B.
500
Thus, the price of insuring risk is reduced by decreasing country size and
by decreasing domestic risk relative to foreign risk.
1
(5.4)
l+p
Also,
(5.5)
--P-IIB 2
l+p l I1 ,
(5.7)
This shows that welfare is a generalization of the variance ratio of the sort
that appears in signal extraction problems. Observe that it is beneficial to
be a small country, or to be a low-variance country; this will be reversed
under private information.
The world portfolio. It is straightforward to see that in the full-
information llicardian equilibrium residents of both countries hold the same
501
5If information about each individual's endowment process is private, such insurance
depends on successfully inducing individuals to truthfully reveal their endowment real-
izations to the contract. This revelation is accomplished via incentive constraints. One
approach would be for all individuals to announce the state of their endowment processes
each period. Individuals with endowments higher than the bliss point-the mirror image
of the current aggregate endowment-would average their endowments with individuals
below the bliss point. Truthful reports and some risk sharing could occur; indeed many
individuals could at.tain t.he bliss point.. However in that. instance there would always
be individuals wit.h a residual demand for insurance, and it. would be feasible to share
the risk int.ert.emporally at the cost of reducing t.he intraperiod exchanges. Intertem-
poral exchange requires that signals sent by individuals about t.heir states be tracked
intertemporally--indeed, such histories of signals offer richer possibilities for efficient
exchange-and this is t.he framework that is used here.
60ne can set. up such a contract. more formally as a constrained optimizat.ion problem
in the frequency domain, as demonst.rated in the appendix of [28]. The solution still rests
on finding the appropriate zeroes in filters, the method used here.
502
For the purpose of this paper, I will focus on the examples in which the
component processes are AR(l):
- L:.Bt(Ylt - h1(L)st)2,
t=O
SAl = h}l[(hi)-lhiAl]+
SB I = h}l[(hi)-lhiBl]+.
These can be solved explicitly in special cases.
An AR(l) example. Under autarky, the insurance filter will prevent
insurance of the common aggregate component, bt . Let the processes be
503
As demonstrated in [31], the autarkic filter will therefore take on the non-
invertible form hl(z) = bl (l - b1l z), with the invertible factorization
hl{z) = (1 - blz). The utility value is then
(6.1)
This must be compared to the utility under open international asset flows.
Let h(z) = <p(I- <p-lZ), and h(z) = (1- <pz), 0 < 4i < 1. This can now
be used to calculate the signal. Under trade, the objective is
SB l = h-l[(h*)-lh* Bll+·
Equilibrium resource conditions. Recalling that the relative sizes of the
domestic and foreign economies are 8 and 1 - 8 respectively, consump-
tion in the two countries must match the combined weighted endowment
processes, but the foreign risk sharing must be weighted by country size.
The equilibrium condition is then
h h* 1 - 8 h h* h h*
8[(Bl - X[ h* Bll+) + -8-X[ h* B2l+l + (1 - 8)[(B2 - X[ h* B2l+)
8 h h*
+-1J;.".[-:::-Bll+l
- uh h*
= 8Bl + (1- 8)B2'
and observe that it will automatically be satisfied. Thus, if the domestic
country is small, the term 16"8 ~[f.B2l+ will generate a large variance,
representing the excessive risk sharing undertaken by the small country.
An AR(J) example. Now assume that all endowment processes in both
countries are AR(I) as in the autarky analysis. From Corollary AA, the
autarkic value of insurance is
( <P-al)2 1
l-al<P l-a~+
( <p - b l)2 1
1 - bl<P 1 - b~
minus the risk sharing cost in the third term, and where <p is defined as
above. The third term in utility can be calculated more directly as follows:
505
q; - b2 1 112 ( q; - ~ ) 2 1
= - 11 1- b2q; 1- b2z = - 1- b2q; 1 - ~ ,
which has the same form as the insured terms. This can now be used to
calculate the welfare gain for country 1 relative to no contract: continuing
with the AR(l) example, it is
( 1q;-- alalq; )211 Al 112 + ( 1q;-- bb1q; )211 Bl112 _ (1-/)2 ( q; - b2 )21IB2112,
8 1- b2q;
1
(7.1)
with a symmetric value for country 2. The result should be compared with
the welfare value in (6.1): there is a potential change in the first term, the
value of the insured idiosyncratic component of endowment, since q; need
not equal b1 . The attempt to share risk internationally thus spills over
into the domestic risk-sharing arrangement! There is now insurance of the
formerly uninsurable aggregate process bIt as reflected in the second term,
but there is an additional burden of risk from sharing the foreign country's
aggregate process as reflected in the third term.
An essential feature of this expression and its symmetric foreign coun-
terpart is that for some parameters it may be impossible to simultaneously
improve the welfare of both countries by opening to trade! This is because
the third term, the additional utility burden of sharing the foreign risk, in-
creases without limit as the relative size of the domestic country, 8, shrinks:
a small country can be forced by the international contract to bear too
much of the foreign risk. 7 Thus, exactly contrary to standard trade theory,
small countries might rationally wish to avoid trade. This is not a standard
rent-seeking explanation for the distortion of trade; all the individuals in
a small country could agree that trade is undesirable. This conclusion is
special for certain parametric values and can be reversed for others, but
even in those cases it can be shown that trade is diminished and distorted,
if not closed off. 8
The contract thus fails to adjust a price of risk in response to country size,
unlike the full-information case. The reason is that the contract, in order to
be incentive compatible, must use the intertemporaZ pattern of signals from
individuals about their states. This forces the insurance of idiosyncratic and
aggregate shocks to be coupled under trade. The contract cannot rely on
individuals to report the relative weight of their endowment processes in
7 One might reasonably ask how individuals are forced to bear foreign risk in reality.
With asset equivalence including equivalence to currency equilibria, the interpretation is
that countries sharing a common currency automatically share risk through fluctuations
in the price level.
BBoyd and Smith (6), using an embellished version of the Diamond [8] overlapping
generations model, also find that standard predictions of trade models can be thrown
off by informational asymmetries. Their result, that investment can flow perversely from
poor to rich countries, similarly hinges on the interaction between domestic differential
information and international exchange.
506
9 As discussed in that paper, this extracts the maximum amount of usable information
about endowments.
507
The second and third terms have the same form, so they can be combined
If 8 = 1/2, so that the countries are equally sized, the third term, which
is the gain from insurance of the aggregate processes, becomes zero. But
if 8 -# 1/2, then the gain from the third term must be negative for the
smaller country, as it is bearing excess risk. The only way to shut down
this negative gain is to set cjJ = b, eliminating all gain from international
risk sharing. Because gains potentially exist in the first term, arising from
improvements in the trade contract's treatment of idiosyncratic processes,
the smaller country might still preferred a limited degree of trade.
Welfare. Is there an efficient value of cjJ? It would exist ifthe payoff in (8.1)
were simultaneously maximized for some value of cjJ. The first derivative of
(8.1) with respect to cjJ is the expression
2 cjJ - a 28 - 1 cjJ - b
(8.2)
(1 - acjJ)3 + 2---;52 (1 - bcjJ)3·
As long as the country is large (8 > 1/2), the second derivative of this
expression is positive; therefore there is no internal stationary point. The
optimal cjJ is then a corner solution at cjJ = 1 or cjJ = -1. The interpretation
is that it is optimal to have as much persistence as possible in the contract.
A highly persistent consumption contract can develop even with just two
individuals as long as their innovations are independent.
However, for the small country (8 < 1/2), it might not be optimal to
bear this much risk; it will prefer an interior contract with less persistence.
There is thus an asymmetry in the stability properties of the contract. But
it is not the case that both countries will prefer an interior solution.lO Even
for a small country, some risk sharing can be valuable; the marginal value
lOIf there are multiple countries the impetus is toward the persistent contract, because
the risk sharing cost shrinks. Proof: Let there be N identical countries with independent
aggregate processes. The excess risk shared is ~ x ~. This shrinks with N. Thus each
small country sees the cluster of other countries as "small" because the risk is divided
evenly.
508
9 Welfare comparisons
The formulas for welfare when there is international risk sharing under full
information (5.7) and under private information (8.1) can now be com-
pared. Restating them,
(5.7)
(8.1)
One difference is obvious: under full information, there is perfect risk shar-
ing of the idiosyncratic shocks, which is not the case under private informa-
tion. (This leads to amplification of the aggregate effects.) The difference
in the aggregate shock terms is harder to state. But it is easier to see the
potentially large difference by considering the extreme case of equally sized
countries; in that case the term (28 - 1)/8 vanishes, leaving the uninsured
residualllBll12; the private information risk-sharing contract then provides
no insurance at all for the aggregate component, in contrast to the full
information case.
Suppose now that 8 < 1/2. Then the small country won't want to maxi-
mize f/; because 28 - 1 < 0 and there is a risk sharing burden, so that the
welfare gain for the smaller country is negative. Nevertheless it is possible
that the beneficial effects on the idiosyncratic insurance component of wel-
fare is such that this effect is small relative to the benefits and the efficient,
509
high-4> contract will be chosen. But as 8 shrinks, the risk sharing burden
eventually becomes too high and the high-4> contract will be refused; the
benefits of trade under private information shrink as country size shrinks,
a reversal of the full information case. In the real world, this refusal will
look like deliberate isolation and abstinence from international trade, but
it is instead an avoidance of risk. This isolation would not occur under full
information, recalling from the analysis of that case above that the price
of risk would appropriately adjust in that instance. Thus, the presence of
private information, even if it is only about idiosyncratic processes, can
seriously impinge on standard notions of efficient behavior. But given the
apparent necessity of private information in realistic models of assets, this
seems unavoidable.
10 Discussion
All these private information results do depend on trade mattering in the
sense of differences in endowment processes; if the aggregate endowment
processes are not independent, there would be no gains from trade possible
in the private information setting. Note also that it is the privacy of the
idiosyncratic at process, not the aggregate bt process, that constrains the
wide characteristics of the private information contract, even though that
risk is not shared internationally. Thus "local conditions" restrict aggregate
interactions.
Despite the negative normative implications of the model, it is attractive
as a positive model. Countries, especially small ones, do in fact close them-
selves off from each other. An empirical expression of this closure would be
unexpectedly weak inter-country correlation of consumption, precisely as
observed by Backus, Kehoe and Kydland [3J. More recently, Athanasoulis
and van Wincoop [1] present an empirical case that there are substantial
unrealized gains from international risk sharing. More than that, countries
aggressively wall off their currencies and their credit systems from inter-
national interaction. Because of the asset equivalence of the model, this
behavior is rationalized as a positive matter.
It is well known that risk can alter the standard implications of standard
models of international trade. Recent cases in point include Hoff [15J, who
finds that uncertainty can reverse the Heckscher-Ohlin model's implication
that trade in goods alone equalizes factor prices. Tesar [35] shows that
nontraded goods diverts domestic portfolio holdings, damping international
risk sharing. Feeney and Jones [9] also study integration of state-contingent
claims as risk-sharing into a real model with traded and nontraded goods.
They show that the type and magnitude of risk aversion can cause less
rather than more smoothing of consumption across states when trade is
opened but there are nontradeable goods. A rough interpretation of the
results here is that private endowment processes are nontradeables and so
dampen exchange in the spirit of these prior models.
510
Cole and Obstfeld [7] model international risk sharing and show that it
might have few gains once goods arbitrage occurs. As in Lucas's model,
there is a representative agent in each country: as Imrohoroglu [16] demon-
strates, omitting effects from risk-sharing arising from the heterogeneity of
individuals can significantly distort welfare calculations; the spillover effect
in the scarce-information model of trade developed here suggests that this
point is relevant here.
That private information interferes with international exchange has been
noticed by Obstfeld and Rogoff [22, pp. 401-407] in a two-period model.
Aside from the fact that the model here entails repetition, Obstfeld and
Rogoff model aggregates as being private, an assumption they themselves
question because of the two-period restriction [22, p.402, footnote 54],
whereas here it is the privacy of information at the individual level that
drives the results.
11 Conclusion
The standard idea of comparative advantage extends to the abstract do-
main of risk, even in dynamic situations. With the addition of private in-
formation, the idea can break down. This would be an intellectual curiosity
were it not for the fact that assets-money and bonds-seem inescapably to
be generated by private information. Such asset structures abound in real
economies, suggesting that private information permeates them. While the
breakdown of the idea of comparative advantage is lamentable, the seeds of
a theory that explains the empirical incompleteness of trade in risk emerge
from the model. Moreover, the theory suggests the reason why markets
tend to involve hierarchical agglomerations of traders and economies: there
are critical masses of traders whose endowment processes possess enough
statistical independence to generate diversification gains that outweigh the
losses incurred from spillover effects on domestic idiosyncratic insurance.
Appendix A
Lemma A.I: Suppose f is such that f f* = 1. Then
Proof.
= IIAI12 - ~
2~z
ffA*[f*A] dz
+ z
- ~
2~z
ff*[f*A]* (A -
+
J[f*A]+) dz
Z
511
= IIAI12 - 2~i f f A*[/* Al+ d: - 2~i f [/* Al~(f* A - [/* Al+) d:.
where the last step follows from the hypothesis about f. The factor in the
last integrand, (f* A - [/* Al+), has only strictly negative powers of z; the
other factor, [f* Al+, has only nonpositive powers. The integrand therefore
has only strictly negative powers of z and the integral is zero. _
Observe that f == hh- 1 satisfies the hypothesis. The insurance compo-
nent of the idiosyncratic part of utility is therefore
< hh- 1A *, [h*(h*)-l Al+ > .
and the higher this quantity, the better is the value of insurance. This
quantity can be calculated for each element of the objective. Another lemma
is useful at this point.
Lemma A.2: Let A(z) = (1- az)-t, B(z) = (1- bzt1. Then
< f*A, [g*Bl+ >= f(a)g(b)(A, B) =< f,A >< g,B >< A,B >.
Proof. Immediate. _
Corollary A.4: Let A( z) = (1 - az) -1. Then the value of insurance is
Proof. Result (ii) follows from algebra and result (i). Result (i) follows
from direct evaluation of the annihilate. _
512
Appendix B
Observable types in a private-information setting. The purpose of this ap-
pendix is to explore the idea of full-information exchange of aggregate
processes while retaining the private-information structure of the idiosyn-
cratic processes. This can be interpreted as individuals' national types being
observable, even if their endowment processes remain private. The aggre-
gate process from each country is then observable and it is feasible for an
individual to trade aggregate endowment in the full information sense, and
yet still need to use the filter to signal and insure idiosyncratic endowment.
As was shown in the full-information case, both countries will hold port-
folios resulting in a common endowment process, and the insurance filter
will therefore be based on that common process.
The common consumption process is defined by the factorization of
therefore no loss from bearing excess foreign aggregate risk. But spillover
effects on domestic idiosyncratic insurance are still possible and have the
potential to dominate the portfolio gains; it is this possibility that will now
be explored.
The analytical burden shifts to (i) solving for the world consumption
process, (ii) writing down the consequent world h-filter, and (iii) calculating
the idiosyncratic welfare component in each country. Since the world filter
is more restrictive, we know that the idiosyncratic welfare component will
fall; we can compare it with the gain in the aggregate component. (Note
also that since the world aggregate consumption process in the standard
analytical example has both AR components, the filter will also suppress
reporting of each domestic aggregate endowment process taken separately.)
We can use Corollary AA to check the effect on the insurance gain under
the more complicated world filter. The world filter is
into the formula of Corollary AA. This yields the idiosyncratic insurance
gain of
2 ( b2 - a ) 2 ( b1 - a ) 2 1
a I-b 2a I-b 1a l-a 2 .
The no-trade insurance gain, in which the domestic insurance filter is 1 -
bI 1 z yields a gain of
( bl - a)2 1
"f = 1 - b1a 1 - a2 ·
2(b2 -a)2
a 1 _ b2 a "f.
The gain from shedding risk on the aggregate process in llicardian fash-
ion can be obtained from the difference between no-trade utility of the
aggregate and expression (5.7)
Using AR(l) processes this can be calculated and added to the (poten-
tially negative) gain for the idiosyncratic insurance term. The net gain from
the idiosyncratic and llicardian components is
We can immediately and easily examine the case in which all insurance is
lost by opening to trade, namely if ~ = a. In that instance opening to trade
adds a zero a to the insurance filter, eliminating idiosyncratic insurance.
Setting b2 = a, the gain is then positive if
which can be negative if b2 = a; this is most easily seen if a ;:::::: 1 and b1 ;:::::: O.
In this instance it is the spillover effect that dominates the (negative) gains:
while insurance of the aggregate process is improved by opening to trade,
515
References
[1] Athanasoulis. Stefano, and Eric van Wincoop (1996), "Growth Uncer-
tainty and Risksharing," working paper, Iowa State University.
[2] Atkeson, Andrew and Robert E. Lucas Jr., (1992), "On Efficient Dis-
tribution with Private Information," Review of Economic Studies 59,
427-453.
[3] Backus, David, Patrick Kehoe, and Finn Kydland (1992), "International
Real Business Cycles," Journal of Political Economy 100, 745-75.
[4] Bergin, James, and Dan Bernhardt (1992), "Anonymous Sequential
Games with Aggregate Uncertainty," Journal of Mathematical Eco-
nomics 2, 543-562.
[5] Bergin, James, and Dan Bernhardt (1995), "Anonymous Sequential
Games: Existence and Characterization of Equilibria," Economic Theory
2, 543-562.
[6] Boyd, John, and Bruce Smith (1995), "Capital Market Imperfections,
International Credit Markets, and Nonconvergence," working paper, Fed-
eral Reserve Bank of Minneapolis.
[7] Cole, Harold, and Maurice Obstfeld (1991), "Commodity 1fade and
International Risk Sharing," Journal of Monetary Economics 28,3-24.
516
[1OJ Feldman, Mark, and Christian Gilles (1985), "An Expository Note on
Individual Risk without Aggregate Uncertainty," Journal of Economic
Theory 35, 26-32.
[12J Green, Edward and Soo Nam Oh (1991), "Contracts, Constraints and
Consumption," Review of Economic Studies 58, 883-899.
[27] Spear, Stephen, and Sanjay Srivastava (1987), "On Repeated Moral
Hazard with Discounting," The Review of Economic Studies 54, 599-617.
[34] Taub, B. (1986), "The Tradeoff between Social Insurance and Aggre-
gate Fluctuations," Information Economics and Policy 2(4), 259-276.
[36] Tesar, Linda (1995), "Evaluating the Gains from International Risk-
sharing," Carnegie-Rochester Conference Series on Public Policy 42, 95-
143.
[37] Thomas, Jonathan and Tim Worrall (1990), "Income Fluctuation and
Asymmetric Information: An Example of a Repeated Principal-Agent
Problem," Journal of Economic Theory 51, 367-390.
[38] Wang, Cheng (1995), "Dynamic Insurance with Private Information
and Balanced Budgets," The Review of Economic Studies 62, 577-95.
[39] Whiteman, Charles (1985), "Spectral Utility, Wiener-Hopf Tech-
niques, and Rational Expectations," Journal of Economic Dynamics and
Control 9, 225-240.
Remark on extended price equilibria
Rabee Tourky
1 Introduction
The usual approach to the theory of value with infinitely many commodi-
ties is that suggested by Debreu [9] and Hurwicz [13] in which the linear
function concept is a formalization of price system (see also Radner [26]).
Generally, however, economies with infinitely many commodities fail to
pass the standard existence test if we require that price systems be of the
Debreu-Hurwicz type (see [15, 27, 32]).
The conventional solution to non-existence in the Debreu-Hurwicz
framework is to assume that preferences satisfy a cone condition, which
Mas-Colell [20] called uniform properness (see also [1, 3, 21, 27, 30]). De-
spite the attractiveness of these results and related generalizations, the
inability to prove existence under the standard finite dimensional assump-
tions seems to suggest an inherent inadequacy in the Debreu-Hurwicz
framework.
520
(2) Vi, Wi is a point in Ki and is called the ith consumer's initial endow-
ment;
(3) Vi, Pi is a mapping from Ki into 2Ki, and is called the ith consumer's
strict preference map.
Let W = Z::1 Wi, this point is called the total endowment. A point in
n:1 Ki is called an allocation. A price system is a j.L-measurable function,
g, such that g(s) ~ 0 j.L-a.e. The v.alue of a commodity bundle, f, relative
to a price system, g, is Isg(s)f(s)j.L(ds).
Definition 2 An equilibrium is a pair {g, Ud}, where 9 is a price system
and Ud is an allocation, such that
Theorem 1 Let (Lp, (Lt), (Wi), (Pi)) be an economy such that 1 ~ P < 00.
Assume that
(5) Vi, Vf E Lt, Pi- 1U) = {g: f E Pi(g)} is u(Lp, L~) open in Lt;
(6) Vi, Vf E Lt, PiU) is not empty.
(*) Vi, Vf E Lt, PiU) is convex and there exists h E PiU) and E > 0
such that h(s) ~ EW(S) jL-a.e., and a:h+(l-a:)f E PiU) fora: E (0,1].
(3) Vi, Vf E Lt, the sets PiU) and {f} U PiU) are convex;
A corollary of Theorem 1 can be obtained for the space ca(S, <;S), which
consists of all scalar valued set functions that are defined and are count ably
additive on <;S. The norm IIAII is the total variation of A. We extend, in the
obvious manner, Definition 1 to economies in ca(S, <;s).
(3) Vi, VA E ca+, the sets PiCA) and {A} U PiCA) are convex;
(5) Vi, V)" E ca+, Pi- l ()..) = p': ).. E Pi ()..)} is norm open in ca+ and the
complement of Pi- l ()..), relative to ca+, is convex;
Definition 3 Let (Lp, (Lt), (Pi), (Wi)), 1 :::; p :::; 00, be an economy. An
extended price system is a function, 7r, from;e into [0, +00], which sat-
isfies 7r(w) < +00, and V(f,g) E ::;e x::;e,7r(f + g) = 7r(f) + 7r(g).
An extended equilibrium is a pair {7r, {Id} such that (a) 7r is an extended
price system, (b) {li} is an attainable allocation, (c) Vi, Vh E Pi(!i) n;e
we have 7r(h) > 7r(Wi), and (d) Vi, 7r(fi) :::; 7r(Wi).
4 Proofs
Most of the work is done in the proof of Theorem 1. Before proving the
theorems we need the following lemma.
Lemma 5 Under the hypotheses of Theorems 1 and 2 there is a positive
linear functional, T, on Aw and an allocation, {Ii}, such that
Proof: The proof of the lemma follows easily from the methods in the
literature concerning such spaces (e.g., [6, 16, 32]). We prove it here for
completeness.
First note that At has W as an interior point in the topology p defined
above. Denote by A~ the topological dual of (Aw, p). The set
J1.(G n ) < +00 for each n and U~=lGn = B. Define the sequence, {En},
by En = Dn n Gn . Each En is an element of ~. Also, it is clear that
U~=lEn = B, that En C En+1, and that J1.(En) < +00 for all n. For each
n let XRn be the characteristic function of En. It is not difficult to see that
XEn E Aw for all n.
Let Loo(En) denote the set of all J1.-€ssentially bounded functions in
Lp(B,~, J1.) vanishing outside En. Since Loo(E) = U~lr[-XEn' XEJ, then
Loo(En) C Aw.
Let ~(En) be the restriction of ~ to En and J1. En be the restriction of
J1. to ~(En). Loo(En) is equivalent to Loo(En, ~(En), J1. EJ and the latter
space can be regarded as a subspace of Lp(B,~, J1.).
The restriction of T to each Loo (En' ~(En)' J1. En) is positive and thus con-
tinuous in the J1.-essential supremum norm topology of that space. For each
n define a set function An;::: 0 on ~(En) by An(F) = T(X F) for F E ~(En)'
This set function is in ba(En,~(En),f.LEJ, and T(J) = fEn f(S)An(ds) for
f E Loo(En).
Clearly, An = An+1 on elements of ~(En). For each n decompose An into
its unique purely finitely additive and count ably additive parts. That is,
An = A~ + A~ where the notation is the obvious one. From uniqueness we
get A~ = A~+l on elements of ~(En)'
For each n let gn be the Radon-Nikodym derivative of A~. Each gn is
a unique element of L1 (En' ~(En), f.LEJ and thus can be regarded as an
element of L1 (En), the space of all functions in L1 (B, ~,f.L) that vanish
outside En. Since each gn is unique then we must have gn(s) = gn+1(s) for
J1.-almost every sEEn. Thus, the limit g( s) = limn gn (s) exists f.L-a.e. Also,
g( s) = gn (s) for f.L-almost all sEEn. From the countable additivity of f.L we
see that g is J1.-measurable. We will show that {g, {Id} is an equilibrium.
We have the following statements
Thus,
Proof of 3: Observe that ca( S, CS, w) is equivalent to Ll (S, CS, w), by the
Radon-Nikodym isomorphism. We need to show that the image of the econ-
omy under this isomorphism satisfies the conditions in Theorem 1. The
consumption set is the positive cone of L 1 . The image of w is Xs ' and the
image of each Wi is strictly positive w-a.e. Also, the continuity of prefer-
ences is immediate. Thus, there exists an equilibrium for the economy in
Ll with a price system that is a positive measurable function.
The value of a bundle x E Lt under 9 is fsg(s)x(s)w(ds). Let x be the
image of some A E ca(S, CS,w)+ then fsg(S)A(ds) = fsg(s)x(s)w(ds). D
References
[1] C. D. Aliprantis, "On the Mas-Colell-Richard equilibrium theorem", J.
Econ. Theory 74 (1997), no. 2,414-424.
[2] C. D. Aliprantis, D. J. Brown, and O. Burkinshaw, "Edgeworth equi-
libria", Econometrica 55 (1987), 1109-1137.
[23J B. Peleg, "Efficiency prices for optimal consumption plans: I1", Israel
Journal of Mathematics 9 (1971), 222-234.
[24] B. Peleg and M. E. Yaari, "Efficiency prices in infinite-dimensional
spaces", Int. Econ. Rev. 11 (1970), 369-377.
[25] B. Peleg and M. E. Yaari, "Markets with a countably many commodi-
ties", Int. Econ. Rev. 11 (1970), 369-377.
[26] R. Radner, "Efficiency prices for infinite horizon production pro-
grammes", Rev. Econ. Stud. 34 (1967), 51--66.
Program Committee
Organization
Ahmet Alkan
Mehmet Barlo
Kemal Badur, Ipek Ozkal, Sinan Sarp<;a, Pinar TUtu§
Sponsors
Sessions
Monday
Opening Assembly
Welcoming by A. Alkan, C.D. Aliprantis, N.C. Yannelis
General Equilibrium I
Chair: Nicholas Yannelis, University of illinois, Urbana-Champaign
Clubs
Chair: Birgit Grodal, University of Copenhagen
Dynamic Oligopoly
Chair: Suzanne Scotchmer, University of California, Berkeley
Mathematical Methods I
Chair: Semih Koray, Bilkent University, Ankara
Mathematical Methods 11
Chair: Tatsuro Ichiishi, Ohio State University, Columbus
Thesday
Cooperative Games I
Chair: Herve Moulin, Duke University, Durham
Cooperative Games 11
Chair: Carmen Herrero, University of Alicante
Wednesday
General Equilibrium and Information I
Chair: Robert Anderson, University of California, Berkeley
• Equilibrium and Optimality in Incomplete Market Model with Default
and Credit History, Subir Bose (Iowa State University)
• Do Liquidity Constraints Matter for Ricardian Equivalence'?, Marcos
de Barros Lisboa (Stanford University)
• International Financial Equilibrium with Risk Sharing and Private
Information, Bart Taub (University of Illinois, Champaign)
General Equilibrium and Information 11
Chair: Martine Quinzii, University of California, Davis
• Endogenous Probabilities and the Information Revealed By Prices,
Tom Krebs (University of illinois, Urbana-Champaign)
• Information at a Competitive Equilibrium, Enrico Minelli (University
of Brescia), H. Polemarchakis
• Financial Innovations with Endogenous Risk, Jesus Santos (Univer-
sity of Chicago)
Dynamic Processes and Finance
Chair: Jan Werner, University of Minnesota
• Bifurcation Routes to Complex Dynamics in Evolutive Models in Eco-
nomics and Finance, William Brock (University of Wisconsin, Madi-
son)
• Risk and Return in a Dynamic General Equilibrium Model, Levent
Akdeniz (Bilkent University, Ankara), D. Dechert
• An Evolutionary Approach To Financial Innovation, Thorsten Hens
(University of Bielefeld), M.O. Bettzuege
Stock Markets
Chair: Michael Magill, University of Southern California
• Portfolio Insurance and Incomplete Derivative Markets, Charalambos
D. Aliprantis (Indiana University & Purdue University, Indianapolis),
D. Brown and J. Werner
• The Significance of the Market Portfolio, Stefano Athanasoulis (Iowa
State University), R. Shiller
• Incentives and Risk Sharing in a Stock Market Equilibrium, Martine
Quinzii (University of California, Davis), M. Magill
539
Oligopoly I
Chair: Egbert Dierker, University of Vienna
Sequential Games I
Chair: Joachim Rosenmuller, University of Bielefeld
• Backward Induction is not Robust: The Parity Problem and the Un-
certainty Problem, Steven J. Brams (New York University), D.M.
Kilgour
Interacting Agents
Chair: Shlomo Weber, Southern Methodist University
Learning
Chair: Yaw Nyarko, New York University
Dynamic Processes
Chair: Davis Dechert, Wisconsin University, Madison
Topics in Macroeconomics I
Chair: Valerie Bencivenga, University of Texas, Austin
Fiscal Policy 11
Chair: Pamela Labadie, George Washington University
Topics in Macroeconomics 11
Chair: Hasan Ersel, BogaziC;i University, Istanbul and Yapi Kredi Bank
Saturday
General Equilibrium IV
Chair: Erdem Ba§c;i, Bilkent University, Ankara