Abstract
Confidential contracts are signed to protect the identity of contracting parties from disclosure. However, such confidentiality is not credible if outsiders can perfectly infer the identity of the contracting parties in equilibrium. A confidential contract is credibly confidential when an inactive player uninvolved in the contract holds a non-degenerate Bayesian belief on the identity of the agent in the contractual relationship. The main research questions are whether and through what channel the preference for credible confidentiality influences incentive provision within a contract and how confidentiality concerns affect the endogenous formation of contractual relationships. With a preference for confidentiality, an agent’s participation is motivated by a confidentiality premium, which amplifies the conventional tradeoff between efficiency and risk premium. Confidentiality concerns thus distort incentives within a contractual relationship when the agent is risk-averse. Furthermore, the principal may deliberately contract with a less efficient agent with a higher equilibrium probability to reduce the confidentiality premium, leading to an inefficient match. Credible confidentiality provides an explanation for the distortion of incentive provision within a contractual relationship and an inefficient formation of contractual relationships even when the principal and the agents are rational and well-informed.
Funding source: National Science and Technology Council
Award Identifier / Grant number: MoST 108-2410-H-305-031-MY2
Acknowledgment
I appreciate all the helpful comments from the anonymous referees. Financial support from the National Science and Technology Council, Taiwan (MoST 108-2410-H-305-031-MY2) is gratefully acknowledged.
Appendix A: Proofs
The principal’s contracting problem
subject to
and
A.1: Proof of Proposition 1
Disutility of identity exposure does not depend on the content of the contract, so the contract proposed to agent i with probability p
i
,
subject to
and
For any t1i > t0i, the incentive compatibility constraint (IC
i
) can be replaced by the local incentive compatibility q′(e
i
|v
i
) ⋅ (u(t1i) − u(t0i)) − c = 0. Incentive compatibility only depends on the difference in transfer. The individual rationality constraint (IR
i
) is binding. For any pair of transfer (t0i, t1i) such that (IR
i
) is slacking, there is an alternative pair
With
◼ Risk-Neutral Agent with u(t) = t.
Binding (IR
i
) implies that
With binding individual rationality, the effort
The expected transfer is a sum of the total cost of effort and confidentiality premium, with the latter being independent of effort choice. The contract thus implements the efficient level of effort
◼ Risk-Averse Agent with u′′(t) < 0.
Denote
The first-order optimality condition has
A.2: Proof of Lemma 1, Proposition 2, and Corollary 1
Anticipating the optimal contracts proposed with probability p = (p1, p2, …, p
n
) in Proposition 1, the principal contracts with agent i with probability
subject to ∑ i p i ≤ 1. Denote λ as the Lagrange multiplier to this constraint and λ* as its equilibrium measure.
By the first-order optimality conditions,
Denote the surplus in the contractual relationship with agent i as
To see conditions under which the equilibrium has
Given s(v
h
) > s(v
l
),
In the special scenario where only the principal cares about identity exposure, η0 > 0 = η
i
for all agent i, optimality conditions in Lemma 1 implies
A.3: Example
Let
If the agents prefer being completely off the radar, i.e. α = 0, and the principal is not averse to identity exposure, i.e. η0 = 0, only case (i) in Proposition 2 applies, and the optimality conditions in Lemma 1 have
Plugging the second equation into the first, we find
If η
h
< η
l
, the optimality conditions hold only at
A.4: Risk-Neutrality with Limited Liability
Suppose that the agents are risk-neutral with limited liability in the sense that the ex-post payoff from the contract (excluding the disutility of identity exposure) must not be negative. The contract proposed to agent i with probability p
i
,
subject to
and
With η
i
= 0, the problem corresponds to the standard contracting model with limited liability. (LL0) is binding and (IR
i
) is strictly satisfied. Binding limited liability and local incentive compatibility jointly imply
With a sufficiently low disutility of identity exposure
References
Acquisti, Alessandro, and Hal Varian. 2005. “Conditioning Prices on Purchase History.” Marketing Science 24 (3): 367–81. https://doi.org/10.1287/mksc.1040.0103.Search in Google Scholar
Acquisti, Alessandro, Curtis Taylor, and Liad Wagman. 2016. “The Economics of Privacy.” Journal of Economic Literature 54 (2): 442–92. https://doi.org/10.1257/jel.54.2.442.Search in Google Scholar
Barmettler, Franziska, Ernst Fehr, and Christian Zehnder. 2012. “Big Experimenter Is Watching You! Anonymity and Prosocial Behavior in the Laboratory.” Games and Economic Behavior 75: 17–34. https://doi.org/10.1016/j.geb.2011.09.003.Search in Google Scholar
Bergemann, Dirk, and Alessandro Bonatti. 2015. “Selling Cookies.” American Economic Journal: Microeconomics 7 (3): 259–94. https://doi.org/10.1257/mic.20140155.Search in Google Scholar
Calzolari, Giacomo, and Alessandro Pavan. 2006. “On the Optimality of Privacy in Sequential Contracting.” Journal of Economic Theory 130: 168–204. https://doi.org/10.1016/j.jet.2005.04.007.Search in Google Scholar
Conitzer, Vincent, Curtis Taylor, and Liad Wagman. 2012. “Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases.” Marketing Science 31 (2): 277–92. https://doi.org/10.1287/mksc.1110.0691.Search in Google Scholar
Cox, James, and Cary Deck. 2005. “On the Nature of Reciprocal Motives.” Economic Inquiry 43 (3): 623–35. https://doi.org/10.1093/ei/cbi043.Search in Google Scholar
Daughety, Andrew, and Jennifer Reinganum. 2010. “Public Goods, Social Pressure, and the Choice between Privacy and Publicity.” American Economic Journal: Microeconomics 2 (2): 191–221. https://doi.org/10.1257/mic.2.2.191.Search in Google Scholar
de Cornière, Alexandre, and Romain de Nijs. 2016. “Online Advertising and Privacy.” The RAND Journal of Economics 47 (1): 48–72. https://doi.org/10.1111/1756-2171.12118.Search in Google Scholar
Demougin, Dominique, and Carsten Helm. 2011. “Job Matching When Employment Contracts Suffer from Moral Hazard.” European Economic Review 55: 964–79. https://doi.org/10.1016/j.euroecorev.2011.04.002.Search in Google Scholar
Dequiedt, Vianney, and David Martimort. 2015. “Vertical Contracting with Informational Opportunism.” The American Economic Review 105 (7): 2141–82. https://doi.org/10.1257/aer.20121640.Search in Google Scholar
Fudenberg, Drew, and Jean Tirole. 1998. “Upgrades, Tradeins, and Buybacks.” The RAND Journal of Economics 29 (2): 235–58. https://doi.org/10.2307/2555887.Search in Google Scholar
Gradwohl, Ronen, and Ran Smorodinsky. 2017. “Perception Games and Privacy.” Games and Economic Behavior 104: 293–308. https://doi.org/10.1016/j.geb.2017.04.006.Search in Google Scholar
Grossman, Sanford J., and Oliver D. Hart. 1983. “An Analysis of the Principal-Agent Problem.” Econometrica 51 (1): 7–45. https://doi.org/10.2307/1912246.Search in Google Scholar
Holmström, Bengt. 1979. “Moral Hazard and Observability.” The Bell Journal of Economics 10 (1): 74–91. https://doi.org/10.2307/3003320.Search in Google Scholar
Holmström, Bengt. 2017. “Pay for Performance and beyond.” The American Economic Review 107 (7): 1753–77. https://doi.org/10.1257/aer.107.7.1753.Search in Google Scholar
Kastl, Jakub, Marco Pagnozzi, and Salvatore Piccolo. 2018. “Selling Information to Competitive Firms.” The RAND Journal of Economics 49 (1): 254–82. https://doi.org/10.1111/1756-2171.12226.Search in Google Scholar
Koch, Alexander K., and Eloïc Peyrache. 2008. “Mixed up? That’s Good for Motivation.” Economic Theory 34: 107–25. https://doi.org/10.1007/s00199-007-0206-y.Search in Google Scholar
List, John, Robert Berrens, Alok Bohara, and Joe Kerkvliet. 2006. “Examining the Role of Social Isolation on Stated Preferences.” The American Economic Review 94 (3): 741–52. https://doi.org/10.1257/0002828041464614.Search in Google Scholar
Martimort, David. 1996. “Exclusive Dealing, Common Agency, and Multiprincipals Incentive Theory.” The RAND Journal of Economics 27 (1): 1–31. https://doi.org/10.2307/2555790.Search in Google Scholar
Mirrlees, James A. 1999, Completed in 1975. “The Theory of Moral Hazard and Unobservable Behaviour: Part I.” The Review of Economic Studies 66 (1): 3–21. https://doi.org/10.1111/1467-937x.00075.Search in Google Scholar
Moen, Espen, and Åsa Rosén. 2011. “Incentives in Competitive Search Equilibrium.” The Review of Economic Studies 78: 733–61.10.1093/restud/rdq011Search in Google Scholar
Piccolo, Salvatore, Emanuele Tarantino, and Giovanni Ursino. 2015. “The Value of Transparency in Multidivisional Firms.” International Journal of Industrial Organization 41: 9–18. https://doi.org/10.1016/j.ijindorg.2015.04.004.Search in Google Scholar
Starmans, Jan. 2024. “Contracting and Search with Heterogeneous Principals and Agents.” Journal of Economic Theory 217: 105761. https://doi.org/10.1016/j.jet.2023.105761.Search in Google Scholar
Taylor, Curtis. 2004. “Consumer Privacy and the Market for Customer Information.” The RAND Journal of Economics 35 (4): 631–50. https://doi.org/10.2307/1593765.Search in Google Scholar
Villas-Boas, J. Miguel. 2004. “Price Cycles in Markets with Customer Recognition.” The RAND Journal of Economics 35 (3): 486–501. https://doi.org/10.2307/1593704.Search in Google Scholar
Vorlaufer, Tobias. 2019. “Effects of Double-Anonymity on Pro- and Anti-social Behavior: Experimental Evidence from a Lab in the Field.” Journal of Behavioral and Experimental Economics 81: 216–25. https://doi.org/10.1016/j.socec.2019.07.001.Search in Google Scholar
© 2025 Walter de Gruyter GmbH, Berlin/Boston