Home Reasoning About ‘When’ Instead of ‘What’: Collusive Equilibria with Stochastic Timing in Repeated Oligopoly
Article
Licensed
Unlicensed Requires Authentication

Reasoning About ‘When’ Instead of ‘What’: Collusive Equilibria with Stochastic Timing in Repeated Oligopoly

  • Justin Grana EMAIL logo , James Bono and David Wolpert
Published/Copyright: July 23, 2019

Abstract

We analyze a continuous time game of Bertrand competition with private monitoring that includes asynchronous signals and asynchronous actions. Unlike existing models where firms observe a signal that is imperfectly correlated with demand parameters and firms’ prices, we assume firms observe demand and prices perfectly but at times governed by independent Poisson processes. The signals only reveal information at the instant they are observed and do not contain information about past actions or states of demand. This implies that any firm’s price change will go undetected for some time or may never be detected. Firms are also allowed to engage in costless but unverifiable cheap talk. The model focuses on the strategic considerations that arise when firms reason about then timing of the signals rather than the content. We show that standard Nash reversion arguments can enforce collusion and truthful communication when signals are asynchronous and signals only reveal information about the current state of the world and do not reveal information about past states or actions. Through comparative statics, we disentangle how parameters that govern the timing of events and signals interact to either facilitate or preclude collusion. Finally, we extend the model to show that firms may collude not only to avoid Nash reversion but to prevent opposing firms from believing demand has dropped and thus lowering their price.

Funding source: Army Research Office

Award Identifier / Grant number: W911NF-12-R-0012-02

Funding statement: This work was supported by the Army Research Office (Grant Number: W911NF-12-R-0012-02, Funder Id: http://doi.org/10.13039/100000183)

Award Identifier / Grant number: NNH13ZEA001N-SSAT:B.2-AFCS-1.6

Funding statement: National Aeronautics and Space Administration (Grant Number: NNH13ZEA001N-SSAT:B.2-AFCS-1.6, Funder Id: http://doi.org/10.13039/100000104)

Appendix

A Proposition 1 (formally)

For any actionable history h˜iH˜i where there has not been a public price signal that revealed a deviation, let mh˜i be the last element of the actionable history (which recall is the signal or message the player just received). Then define s as:

(3)s(h)=(ρL,)ifmh˜i=xL(ρH,)ifmh˜i=xH(ρL,xL)ifmh˜i=yL(ρH,xH)ifmh˜i=yH(pi,)ifmh˜i=(pi,pj)andpi=pj(0,)ifmh˜i=(pi,pj)andpipj
and for any actionable history h˜i where a public signal has revealed a deviation, s(h˜i)=(0,) . Then, if 1+γγ+λ1+λ2<ρHρL<2+λ1+λ2γ , there exists δ_ and set of beliefs β such that for all δ<δ_ , each player having assessment (s,β) defines a sequential equilibrium. That is, there exists a sequence Σ=(s1,β1),(s2,β2)...(s,β) such that no firm can change its action at any actionable history and improve its expected utility given its beliefs and βϵ,ϵ=1,2,... are derived using Bayes rule.

Proof.

To prove the proposition, first we establish that along the equilibrium path, profits evolve according to a continuous time Markov Chain (CTMC). Then, we present the automaton representation of strategies under s . We then illustrate the continuation values in equilibrium and the possible deviations and show that s is a Perfect Bayesian (Nash) equilibrium. Finally, we present a sequence of strategies and consistent beliefs that converge to (s,β) and show that s is sequentially rational given β .

We begin with three lemmas:

Lemma 1.

Under s , the triple (p1t,p2t,rt) is governed by a first order CTMC.

Proof.

The value of rt jumps at times governed by a Poisson process with rate γ. Under s the values of p1t,p2t change when either of the firm’s receives a signal from the market. The signal is generated according to a Poisson process with rate λ1+λ2 and the prices firms set only depends on the most recent signal and is independent of past private histories. Since changes in the state (rt,p1t,p2t) are governed by Poisson processes, the inter-event times are distributed exponentially. As a result of exponentially distributed event times and history independent state transitions, (rt,p1t,p2t) is governed by a first order CTMC.   □

Lemma 2.

For any strategy for firm i, let β be firm i’s belief of full game histories when firm j’s strategy is s . Then β is consistent if it places probability 1 on one and only one hjt at any actionable history h˜i where a public signal has not revealed a deviation.

Proof.

Since according to s , firm j shares all private information through cheap talk, firm i knows the time and content of j’s observations as well as j’s actions. Therefore, i knows hjt with probability 1 (which implies firm i know pjt for all t).   □

Lemma 3.

For any strategy for firm i, let β be firm i’s belief of full game histories when firm j plays s and no public history has revealed a deviation. Suppose at time t, firm i observes anything except a public price revelation. Then β is consistent if it places probability 1 on a specific value of rt .

Proof.

At history h˜it where ωtxL,xH , firm i either received a noiseless signal from the market or a truthful message from firm j. In either case, Bayes rule prescribes that βi assigns probability 1 to one value of rt at h˜it .   □

Lemma 2 and Lemma 3 state that at any actionable history, firm i knows firm j’s private history and the current reserve price exactly. Assuming no public signal has revealed a deviation, the strategy s and lemmas 1–3 imply that

  1. Firm i’s continuation value at any history only depends on the current value of rt and not on the entire history of rt .

  2. At any actionable history, firm i knows rt via the message it receives.

  3. Firm i knows what observation j received at any actionable history as well as firm j’s current price.

Consequently, when firm j plays s with consistent beliefs β as defined in Lemma 2 and Lemma 3, it is possible to adopt a finite automaton representation of firm i’s strategies where i’s automaton states are defined by its observation at an actionable history and whether or not a public signal has revealed a deviation.[9] The continuation values under s are expressed in equation set 4. The notation Vk(m) indicates the continuation value for firm i at automaton state defined by the observation m. Vk() represents a state in the CTMC where firms do not take an action and is only expressed for clarity.

(4)V1(m{xL,yL})=EJ10J1ρL2eδtdt+eδJ1V2Learns reserve price is ρLV2()=EJ20J2ρL2eδtdt+eδJ2γγ+λ1+λ2V1+λ1+λ2λ1+λ2+γV3Reserve Price jumps to ρHV3(m{xH,yH})=EJ30J1ρH2eδtdt+eδJ3V4Learns reserve price is ρHV4()=EJ4[0+eδJ4λ1+λ2λ1+λ2+γV1+γλ1+λ2+γV3Reserve price jumps to ρL

The operator EJi represents the expectation taken over the amount of time the system is in the state indicated by Vi . The parenthetical comments briefly describe the event that has just occurred that gives the continuation value indicated by the equation.

By applying the Laplace-Stieltjes transform, the above equations can be rewritten as[10]:

V1(m{xL,yL})=ρL2(γ+δ)+γγ+δV2V2()=ρL2(γ+λ1+λ2+δ)+γγ+λ1+λ2+δV1+λ1+λ2λ1+λ2+γ+δV3V3(m{xH,yH})=ρH2(γ+δ)+V4γ+δV4()=0+λ1+λ2λ1+λ2+γ+δV1+γλ1+λ2+γ+δV3

Holding firm j’s strategy fixed, the one-stage deviation principal says that s is optimal for firm i if there is not a one-time deviation for firm i at V1 , V3 or any other state of the CTMC reachable from V1 or V3 that increases firm i’s continuation value.[11] However, the only automaton state reachable from V1 and V3 not along the equilibrium path is the one that includes a public revelation of prices where the firms charged different prices. In this case it is (weakly) dominant for firms to set their price to 0. Therefore, the only deviations that must be evaluated are the various one-shot deviations at V1 and V3 . All possible deviations can be condensed into 1 of 5 possible continuation values, which are summarized in box 1. We now analyze all possible one-shot deviations at actionable histories in turn.

Case 1: Undercutting ρL slightly

  1. Both firms are charging ρH . Firm i receives message yL and does not tell firm j that the market price has jumped and charges ρL

  2. Firm i receives message yL and tells firm j that the market price has jumped to ρL and undercuts ρL slightly.

  3. Firm i receives message xL from firm j and undercuts ρL slightly.

  4. Firm i receives message yL and tells firm j that the market price has jumped to ρH and undercuts ρL slightly.

Case 2: Undercutting ρH slightly

  1. Firm i receives message yH and tells firm j that the market price has jumped to ρH and undercuts ρH slightly.

  2. Firm i receives message xH from firm j and undercuts ρH slightly.

  3. Both firms are charging ρH . Firm i receives message yH and undercuts ρH slightly.

Case 3: Undercutting ρH by charging ρL

  1. Firm i receives message yH and tells firm j that the market price has jumped to ρH and undercuts ρH at ρL (or slightly less than ρL ).

  2. Firm i receives message xH from firm j and undercuts ρH at ρL (or slightly less than ρL ).

Case 4: Preference to collude at ρL

  1. Firm i receives message yH and tells firm j that the market price is ρL and chargers ρL .

  2. Firm i receives message yH , knows that firm j’s price is ρL and does does not say anything and charge ρL .

Case 5: Preference to collude at ρH

  1. Firm i receives message yL and tells firm j that the market price is ρH and chargers ρH .

  2. Firm i receives message yL , knows that firm j’s price is ρH and does does not say anything and charger ρH .

Box 1: Categorization of all possible deviations by continuation value

Case 1: Undercutting ρL slightly (deviating at V1 ) The continuation values when i deviates at V1 by undercutting slightly are given by:

V1(m{xL,yL})=EJ10J1ρLeδtdt+eδJ1λ1+λ2λ1+λ2+γ+μV1+γλ1+λ2+γ+μV5+μλ1+λ2+γ+μV6V5()=EJ20J2ρLeδtdt+eδJ2λ1+λ2λ1+λ2+γ+μV3+γλ1+λ2+μ+γV1+μλ1+λ2+μ+γV6V6(m=(pi,pj),pipj)=0

Note the new action state V6 , which is the actionable state when a public price revelation indicates that i has deviated. In that case it is weakly dominant for firm i to charge 0. By again applying the Laplace-Stieltjes transform and solving the system of equations for V1 and V1 , we get the necessary condition for i not to undercut upon learning the reserve price ρL :

V1V1>0

or equivalently

(5)α=05Cαδα>0

where

C0=γμΛ2γ+μ+ΛγρH+2ρL+ρH+ρLΛ

and Λ=λ1+λ2 and Cα,α0 are given in the online supplementary materials.

Case 2: Undercutting ρH slightly (Deviation at V3 ) The continuation values when i undercuts the market slightly upon learning the reserve price is ρH are given by:

V3(m{xH,yH})=EJ30J1ρHeδtdt+eδJ3μμ+γV6+γγ+μV7V7()=EJ5[0+eδJ5λ1+λ2λ1+λ2+γ+μV1+γλ1+λ2+γ+μV3+μλ1+λ2+μ+γV6

The necessary condition for i not to deviate is then given by:

V3V3>0

or equivalently

(6)α=05Dαδα>0

where

(7)D0=γμΛ2γ+μ+ΛγρH+2ρL+ρH+ρLΛ=C0

and Dα,α0 are given in the online supplementary materials.

Case 3: Undercutting ρH by pricing at ρL (deviating at V3 ) The continuation values when i undercuts the market by charging ρL upon learning the price is ρH and tells j the price is ρH are given by:

V3(m{xH,yH})=EJ30J1ρLeδtdt+eδJ3μμ+γV6+γγ+μV8V8()=EJ50J5ρLeδt+eδJ5λ1+λ2λ1+λ2+γ+μV1+γλ1+λ2+γ+μV3+μλ1+λ2+μ+γV6

The necessary condition for i not to deviate is then given by

V3V3>0

or equivalently

(8)α=05Eαδα

where

(9)E0=γμΛ2γ+μ+ΛγρH+2ρL+ρH+ρLΛ=C0=D0>0

and Eα,α0 are given in the online supplementary materials.

Case 4: Firm i charges ρL , tells firm j that the reserve price is ρL upon learning the reserve price is ρH .) The continuation values to firm i by making a one-shot deviation in which it tells firm j that the reserve price is ρL and charges ρL although firm i knows the reserve price is ρH are given by:

(10)V3(m=yH)=EJ30J2ρL2eδtdt+eδJ2γγ+λ2V1+λ1+λ2λ1+λ2+γV3

Applying the Laplace-Stieltjes transform gives the necessary condition for i not to have an incentive to deviate, which is given by:

V3V3>0

or equivalently

(11)R>1+γγ+δ+Λ
Case 5: Firm i charges ρH , tells firm j that the reserve price is ρH upon learning the reserve price is ρL .) The continuation value for a one time deviation by firm i by telling firm j that the reserve price is ρH when it is actually ρL is given by:
(12)V1(m{xL})=EJ10+eδJ1γγ+λ1+λ2V3+λ1+λ2γ+λ1+λ2V1

Applying the Laplace-Stieltjes transform gives the necessary condition for i not to have an incentive to deviate, which is given by:

V1V1>0

or equivalently

(13)R<2+δ+λ1+λ2γ

As δ goes to 0, the left hand side of equations 5, 6 and 8 go to C0=D0=E0>0 , eq. 11 goes to γλ1Λ2γ+ΛγρH2ρL+ΛρHρL and eq. 13 goes to γλ1Λ2γΛγρH+2γ+ΛρL . Since the left hand side of eqs. 5, 6, 8, 11 and 13 are all continuous in δ, there exists a δ_ such that for all δ<δ_ the conditions in eqs. 5, 6, 8, 11 and 13 are met as long as 2γ+Λγ+Λ<ρHρL<2γ+Λγ . It is not necessary to check if firm i should deviate upon a public revelation of prices since the continuation value of such a deviation would be a convex combination of continuation values of deviating upon learning the reserve price exactly. This implies that for a low enough δ, s and β as described in Lemma 2 and Lemma 3 is a Perfect Bayesian Equilibrium (i.e. s is a best response to s and beliefs along the equilibrium path are derived through Bayes rule).

To establish that s is also a sequential equilibrium, it is necessary to show that s is sequentially rational off of the equilibrium path. Define Σ,(s1,β1),(s2,β2)... indexed by ε to be a sequence of strategy profiles and associated consistent beliefs (for both firms) such that at any actionable history:

  1. Firms play the action prescribed by s with probability 11ϵ .

  2. Firms randomize uniformly over all actions (prices and messages) with probability 1ϵ

As ϵ , sϵs and along the equilibrium path βiϵ converges to placing probability 1 on values of rt and h˜jt (since the probability of firm j doing anything other than what is prescribed by s at or befer time t goes to 0 as ϵ ). Therefore, sϵ converges to s and along the equilibrium path, βiϵ converges to β .

Lastly, it is necessary to verify that s is sequentially rational off of the equilibrium path given beliefs β . The only actionable histories for firm i off of the equilibrium path are ones that include an undetected deviation by firm i and ones that have revealed a deviation by either firm.

Consider any actionable history h˜it where i has deviated but not been detected. By Lemma 2 and Lemma 3, β places probability 1 on one value of h˜jt and rt . Therefore, firm i’s continuation value from playing s after an undetected deviation can be represented by either V1 or V3 , both of which firm i would not choose to deviate from s . Therefore s is sequentially rational at any h˜it in which firm i has deviated but not been detected.

For any actionable history h˜it that has revealed a deviation, βi specifies some distribution over past histries. However, since sϵ converges to s , upon realizing a deviation, it is sequentially rational for firm i to play 0 regardless of the belief of past histories.

Proof of Proposition 2.

The proof is exactly the same as the proof of Proposition 1 with the exception that eqs. 5, 6, 8 can be written as quadratics in µ and equations 11 and 13 can be rearranged to establish bounds on R in terms of δ.   □

Proof of Proposition 3.

After performing the variable substitution Λ=λ1+λ2 in eqs. 5, 6, 8, 11 and 13, no λ1 or λ2 terms remain. See the online supplementary material for a full definition of the terms.   □

Proof of Proposition 4.

To prove the 6 statements in Proposition 4 that establish the equilibrium characteristics, we first state a lemma:   □

Lemma 4.

Suppose R=2 so that 1+γγ+λ1+λ2<R<2+λ1+λ2γ is true for all values of the parameters. Then, the TISC equilibrium exists if firm i does not have an incentive to undercut firm j slightly upon receiving a message from firm j that the reserve price is ρH . Formally, if V3V3>0 then V3V3′′>0 and V1V1>0 .

Proof.

Assume that V3V3>0 . Then

(V1V1(V3V3)=δδ+2γμρLδ+Λδ+2γ+Λδ+μ+Λ.

This implies that V1V1 is less than V3V3 only if μ>δ+2γ . Since V1V1 is increasing in µ (see the online supplementary material for the full representation), it sufficies to show that at μ=2γ+δ , V1V1>0 . Making the appropriate substitution yields V1V1=γδ+2γρLδ+Λ4δ+2γ2+9δ+16γΛ+3Λ2>0 . To show that V3V3>0 implies that V3V3′′>0 , it can be shown that V3V3′′(V3V3)=2δδ+2γρLδ+Λδ+2γ+Λδ+μ+Λ>0 . Therefore, whenever V3V3>0 , V3V3′′>0 .   □

Lemma 4 simplifies the analysis since it says that a necessary and sufficient condition for the existence of the collusive region is that V3V3>0 since this condition implies that all other necessary conditions are met. In other words, V3V3=0 defines the collusive region. We can now prove claims 1-6 in Proposition 4 in order.

1. T is a function: Since V3V3 can be written as a quadratic in µ, applying the quadratic formula to V3V3=0 yields:

T(δ,γ,Λ)=b±b24ac2a

where

(14) a=ρLδ+Λ2δ2+2δ3γ+Λ+γ4γ+3Λb=ρLδ+Λ2δ2Λ+γ2γ+Λ4γ+3Λ+2δ2γ2+4γΛ+Λ2c=2δδ+2γρLδ+Λδ+γ+Λδ+2γ+Λ.

Since a > 0, b > 0 and c < 0, there exists exactly one positive root for all values for a fixed value of δ, γ and Λ. Therefore, T is a function since for fixed values of δ, γ and Λ, T returns only one value of µ.

2. T is a bijection in δ when holding γ and Λ fixed: We need to show that T is one-to-one and onto. To show that T is onto, we need to show that for any fixed µ, there exists a value of δ that makes V3V3=0 . Since all parameters are greater than 0, V3V3 can be written as:

(15) V3V3=ρHδ5(5γρH+3ΛρH)δ4+2ρL8γ2+μ212γΛ+μΛ3Λ2δ3+[8γ3ρL+4γ2ρLμ7Λ2ρLΛ2μ22μΛ+Λ2+γ6μ2ρL+8μρLΛ18ρLΛ2]δ2+[8γ3ρLμΛ+2μρLΛ2μ+Λ+2γ22μ2ρL+7μρLΛ6ρLΛ2+γΛ9μ2ρL+11μρLΛ4ρLΛ2]δ+γμΛ2γ+μ+Λ4γρL+3ΛρL

For a fixed µ, as δ , V3V3 and as δ0 , V3V3γμΛ2γ+μ+Λ4γρL+3ΛρL>0 . Since V3V3 is continuous, by the intermediate value theorem there is at least one value of δ such that V3V3=0 for any fixed µ. This proves T is onto. To show that T is one-to-one, we need to show that for a fixed value of µ, there are not multiple values of δ that make V3V3=0 . To show that this is the case, we remind the reader of a well-known result:

Definition 3

(Descartes Rule of Sign Changes) For any polynomial arranged in decreasing degree, the number of positive roots is upper bounded by the number of sign changes of the coefficients. Furthermore, the number of positive roots is either equal to the number of sign changes or less than the number of sign changes by an even amount.

Note that the sign of the coefficients on δ5,δ4 are unambiguously negative and the constant in equation is unambiguously positive in eq. 15. Therefore, the number of positive roots of eq. 15 is either 1 or 3. There are three roots if the signs of the coefficients of δ3,δ2 and δ1 are one of ++ , + ,++ or + (other combinations of signs yield 1 positive root). Let D3 , D2 , and D1 be the coeffecients on δ3 , δ2 and δ1 respectively. We now show that none of the three possible sign patterns are possible.

  1. Assume D3>0 then it must be that μ>Λ+32γ2+48γΛ+13Λ22 . Since D2 is increasing in µ for positive values of µ, for it to be the case that D3>0 and D2<0 it must be that at μ=Λ+32γ2+48γΛ+13Λ22 , D2<0 . Plugging in for µ in D2 gives

    D2=ρL2γ+Λ20γ2+10Λ2+γ27Λ+32γ2+48γΛ+13Λ2>0.

    Therefore, it is impossible for D3>0 and D2<0 . This proves that it is impossible for the coefficients to have signs + and ++ .

  2. Assume D2>0 , then it must be that μ>γ22γΛΛ2+13γ4+54γ3Λ+61γ2Λ2+25γΛ3+3Λ43γ+2Λ . Since D1 is increasing in µ for positive values of µ, for it to be the case that D1<0 and D2>0 , it must be that at μ=γ22γΛΛ2+13γ4+54γ3Λ+61γ2Λ2+25γΛ3+3Λ43γ+2Λ . Plugging this value in for µ in D1 gives

    (16)D1=ρL3γ+2Λ2[32γ6+180γ5Λ+4Λ6+γ4(413Λ2+16ϕ)+γ3(415Λ3+14Λϕ)+γ2(194Λ4+13Λ2ϕ)+γ(42Λ5+2Λ3ϕ)]

    where ϕ=13γ4+54γ3Λ+61γ2Λ2+25γΛ3+3Λ4 . Since all parameters are greater than 0, D1>0 and therefore it is impossible for D1<0 while D2>0 and the signs of the coefficients cannot be + or ++ .

Since for a fixed µ there is only 1 positive δ such that V3V3=0 , T is one-to-one.

3. T is strictly increasing in δ: Since T is a continuous bijection it must be strictly monotone. It is straightforward to show that T is monotone increasing in δ.

4. limδ0T=0 : Setting δ = 0 in eq. 14 and simplifying shows that limδ0T=0 .

5. limδT= : The highest order δ term under the radical in eq. 14 is δ8 and it has a positive coefficient. The highest order δ term in b is δ3 . Therefore, limδT= .

6. limδTδ=1 : The expression for Tδ is given in the online supplementary material. Taking the limit as δ gives the result.   □

Proof of Proposition 5.

See online supplementary material.   □

Proof of Proposition 6.

As in Proposition 1, the market and prices evolve according to a continuous time Markov Chain under the TISC scheme. The only actionable automaton state not reachable along the equilibrium path is one in which a public price signal has revealed a deviation. Therefore, the same argument posed in 1 about beliefs (both on-path and off-path) apply in this case. Therefore, it is only necessary to check on-path deviations. See the online supplementary material for a fully detailed treatment.   □

References

Abreu, D., P. Milgrom, and D. Pearce. 1991. “Information and Timing in Repeated Partnerships.” Econometrica 59 (6): 1713–33.10.2307/2938286Search in Google Scholar

Athey, S., and K. Bagwell. 2008. “Collusion with Persistent Cost Shocks.” Econometrica 76 (3): 493–540.10.1111/j.1468-0262.2008.00845.xSearch in Google Scholar

Awaya, Y., and V. Krishna. 2015. “On Communication and Collusion.” The American Economic Review. 106 (2) (2016): 285–315.10.1257/aer.20141469Search in Google Scholar

Ben-Porath, E., and M. Kahneman. 1996. “Communication in Repeated Games with Private Monitoring.” Journal of Economic Theory 70 (2): 281–97.10.1006/jeth.1996.0090Search in Google Scholar

Board, S., and M. Meyer-ter Vehn. 2013. “Reputation for Quality.” Econometrica 81 (6): 2381–462.10.3982/ECTA9039Search in Google Scholar

Bonatti, A., G. Cisternas, and J. Toikka. 2017. “Dynamic Oligopoly with Incomplete Information.” The Review of Economic Studies 84 (2): 503–46.10.1093/restud/rdw049Search in Google Scholar

Chan, J., and W. Zhang. 2015. “Collusion Enforcement with Private Information and Private Monitoring.” Journal of Economic Theory 157: 188–211.10.1016/j.jet.2015.01.004Search in Google Scholar

Collard-Wexler, A. 2013. “Demand Fluctuations in the Ready-Mix Concrete Industry.” Econometrica 81 (3): 1003–37.10.3982/ECTA6877Search in Google Scholar

Colombo, L., and P. Labrecciosa. 2015. “On the Markovian Efficiency of Bertrand and Cournot Equilibria.” Journal of Economic Theory 155: 332–58.10.1016/j.jet.2014.11.007Search in Google Scholar

Compte, O. 1998. “Communication in Repeated Games with Imperfect Private Monitoring.” Econometrica 66 (3): 597–626.10.2307/2998576Search in Google Scholar

Crowe, J. 2017. “Reform, Revolution and Disruption in Mental Health Care: A Consumer’s Perspective.” Public Health Research and Practice 27 (2): e2721711.10.17061/phrp2721711Search in Google Scholar

European-Commission. 2014. “Antitrust: Commission fines Producers of High Voltage Power Cables € 302 Million for Operating a Cartel.” European Commission Press Release Database.Search in Google Scholar

European-Commission. 2015. “Antitrust: Commission Fines Cargo Train Operators € 49 Million for Cartel.” European Commission Press Release Database.Search in Google Scholar

Fudenberg, D., Y. Ishii, and S. D. Kominers. 2014. “Delayed-Response Strategies in Repeated Games with Observation Lags.” Journal of Economic Theory 150: 487–514.10.1016/j.jet.2013.09.004Search in Google Scholar

Gerlach, H. 2009. “Stochastic Market Sharing, Partial Communication and Collusion.” International Journal of Industrial Organization 27 (6): 655–66.10.1016/j.ijindorg.2009.02.006Search in Google Scholar

Green, E. J., and R. H. Porter. 1984. “Noncooperative Collusion Under Imperfect Price Information.” Econometrica 52 (1): 87–100.10.2307/1911462Search in Google Scholar

Hafen, E., D. Kossmann, and A. Brand. 2014. “Health Data Cooperatives–Citizen Empowerment.” Methods of Information in Medicine 53 (02): 82–86.10.3414/ME13-02-0051Search in Google Scholar

Kandori, M., and H. Matsushima. 1998. “Private Observation, Communication and Collusion.” Econometrica 66 (3): 627–52.10.2307/2998577Search in Google Scholar

Keller, G., S. Rady, and M. Cripps. 2005. “Strategic Experimentation with Exponential Bandits.” Econometrica 73 (1): 39–68.10.1111/j.1468-0262.2005.00564.xSearch in Google Scholar

Kulkarni, V. G. 2009. Modeling and analysis of stochastic systems. London, UK: Chapman & Hall, Ltd./CRC Press.10.1201/b12749Search in Google Scholar

Lagunoff, R., and A. Matsui. 1997. “Asynchronous Choice in Repeated Coordination Games.” Econometrica 65 (6): 1467–77.10.2307/2171745Search in Google Scholar

Mackowiak, B., and M. Wiederholt. 2009. “Optimal Sticky Prices Under Rational Inattention.” American Economic Review 99 (3): 769–803.10.1257/aer.99.3.769Search in Google Scholar

Mailath, G. J., and L. Samuelson. 2006. Repeated Games and Reputations, vol. 2. Oxford: Oxford university press.10.1093/acprof:oso/9780195300796.001.0001Search in Google Scholar

Obara, I. 2009. “Folk Theorem with Communication.” Journal of Economic Theory 144 (1): 120–34.10.1016/j.jet.2007.08.005Search in Google Scholar

Rahman, D. 2014. “The Power of Communication.” The American Economic Review 104 (11): 3737–51.10.1257/aer.104.11.3737Search in Google Scholar

Ransbotham, S., and Kiron, D. 2017. “Analytics as a Source of Business Innovation.” MIT Sloan Management Review 58 (3): 1–16.Search in Google Scholar

Rosenthal, J. A., X. Lu, and P. Cram. 2013. “Availability of Consumer Prices from US Hospitals for a Common Surgical Procedure.” JAMA Internal Medicine 173 (6):427–32.10.1001/jamainternmed.2013.460Search in Google Scholar

Sannikov, Y., and A. Skrzypacz. 2010. “The Role of Information in Repeated Games with Frequent Actions.” Econometrica 78 (3): 847–82.10.3982/ECTA6420Search in Google Scholar

Stone, L. D. 1973. “Necessary and Sufficient Conditions for Optimal Control of Semi-Markov Jump Processes.” SIAM Journal on Control 11 (2): 187–201.10.1137/0311017Search in Google Scholar

Sugaya, T. 2015. “Characterizing the Limit Set of Perfect and Public Equilibrium Payoffs with Unequal Discounting.” Theoretical Economics 10 (3): 691–717.10.3982/TE1425Search in Google Scholar

Takahashi, S., and Q. Wen. 2003. “On Asynchronously Repeated Games.” Economics Letters 79 (2): 239–45.10.1016/S0165-1765(02)00325-7Search in Google Scholar

Wong, C., L. J. Faherty, J. Feingold, R. Town, and R. Werner. 2016. “Price Transparency for Children and Adolescent Healthcare in the United States: Still Opaque in 2015.” Journal of Adolescent Health 58 (2): S48.10.1016/j.jadohealth.2015.10.108Search in Google Scholar


Supplementary Material

The online version of this article offers supplementary material (DOI:https://doi.org/10.1515/bejte-2018-0038).


Published Online: 2019-07-23

© 2019 Walter de Gruyter GmbH, Berlin/Boston

Articles in the same Issue

  1. Research Articles
  2. Optimal Forestry Contract with Interdependent Costs
  3. Bi and Branching Strict Nash Networks in Two-way Flow Models: A Generalized Sufficient Condition
  4. Pay-What-You-Want in Competition
  5. Two Rationales for Insufficient Entry
  6. Students’ Social Origins and Targeted Grading
  7. Pricing, Signalling, and Sorting with Frictions
  8. On the Economic Value of Signals
  9. The Core in Bertrand Oligopoly TU-Games with Transferable Technologies
  10. Reasoning About ‘When’ Instead of ‘What’: Collusive Equilibria with Stochastic Timing in Repeated Oligopoly
  11. Timing Games with Irrational Types: Leverage-Driven Bubbles and Crash-Contingent Claims
  12. Costly Rewards and Punishments
  13. Blocking Coalitions and Fairness in Asset Markets and Asymmetric Information Economies
  14. Strategic Activism in an Uncertain World
  15. On Equilibrium Existence in a Finite-Agent, Multi-Asset Noisy Rational Expectations Economy
  16. Optimal Incentives Under Gift Exchange
  17. Public Good Indices for Games with Several Levels of Approval
  18. Vagueness of Language: Indeterminacy under Two-Dimensional State-Uncertainty
  19. Winners and Losers of Universal Health Insurance: A Macroeconomic Analysis
  20. Behavioral Theory of Repeated Prisoner’s Dilemma: Generous Tit-For-Tat Strategy
  21. Flourishing as Productive Tension: Theory and Model
  22. Notes
  23. A Note on Reference-Dependent Choice with Threshold Representation
  24. Regular Equilibria and Negative Welfare Implications in Delegation Games
  25. Unbundling Production with Decreasing Average Costs
  26. A Simple and Procedurally Fair Game Form for Nash Implementation of the No-Envy Solution
  27. Decision Making and Games with Vector Outcomes
  28. Capital Concentration and Wage Inequality
  29. Annuity Markets and Capital Accumulation
Downloaded on 21.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/bejte-2018-0038/html
Scroll to top button