Abstract
The study of institutions and economic history was much influenced by Ronald Coase and Douglass North, in particular with Douglas North’s notion of government as an endogenous outcome of institution competition. Although Max Weber articulated a concept of government as a monopoly of violence in 1919, much subsequent modeling work on governments was built around the banditry notion of governments of Mancur Olson (1993, “Democracy, Dictatorship and Development.” The American Political Science Review 87(3) (September): 567–576). Examples are Usher (1989, “The Dynastic Cycle and the Stationary State.” American Economic Review 79: 1031–1044), Moselle and Polak (2001, “A Model of a Predatory State.” Journal of Law, Economics & Organization 17(N1)), and the like. A good summary is found in Dixit (2004, Lawlessness and Economics: Alternative Modes of Governance. Princeton, NJ: Princeton University Press). We called this collectively a Weberian/Olsonian view of governments. Building on the notion that a State is a monopoly of violence, these models are in line with the banditry idea of Olson, which, among many country historical studies, he used the Chinese example that governments are essentially stationary/roving bandits. Taking Olson’s ideas as a lead, this paper uses the counter-example of Feng Yu-hsiang (馮玉祥 1882–1948) (Feng), a Chinese “warlord”, to present an alternative analytical framework in terms of a supply-demand model for the emergence of governments. The level of generalization for a framework of such societal order is necessarily heuristic, and can be compared to such economic simplification of social reality by Hayek, Schumpeter and North. However, it should help constellate facts that can be gathered to evaluate refutable hypotheses that are of interest to political theorists and historians. The model formulated for this paper is not intended to justify violence, which the authors deplore, but is recognized as merely a statement about realpolitik.
Acknowledgement
The authors thank Anton Lowenberg, Kazanori Araki, and Stephen N.G. Davies for their comments on discussion notes. They thank Wong Sik-Pui for a phone interview; Dr. Shen Shijia, Director of the East Asia Library at the University of Washington, for finding the time to sit down and talk on the subject matter; and historian Lao Chien-Sun for enlightening the first author during a April 2007 study trip to retrace the route taken by Feng Yu-Hsiang from Tung Kwan (Tongguan) to Cheng Chau (Zhengchau). They also wish to thank K.W. Chau, Director of the Ronald Coase Centre for Property Rights Research and Ning Wang the Editor of Men and Economy for making invaluable comments on the final version notably the Weberian historical root of the concept of the state as a monopoly of violence. Finally, the authors thank Mr. Mark Hansley Chua for his technical assistance. For citations in Chinese in this paper, old romanised forms of Chinese place names are used (with their modern spelling in brackets) to make cross referencing to historical documents easier.
References
Acemoglu, Daron, Robinson, James A., and Santos, Rafael J. 2013. “The Monopoly of Violence: Evidence from Colombia.” Journal of the European Economic Association 11(s1): 5–44.10.3386/w15578Suche in Google Scholar
Anonymous. 2006. Guo Min Ge Ming Yun Dong De Xing Qi. http://www.tingniu.com/viewthread.php?tid=32060.Suche in Google Scholar
Aoki, Masahiko. 2001. Toward a Comparative Institutional Analysis. Cambridge: MIT Press.10.7551/mitpress/6867.001.0001Suche in Google Scholar
Barzel, Yoram. 1991. “Property Rights and the Evolution of the State.” Discussion paper 127, Depart. Econ., University of Hong Kong.10.1007/978-3-662-05121-4_9Suche in Google Scholar
Barzel, Yoram. 1992. “Confiscation by the Ruler: The Rise and Fall of Jewish Lending in the Middle Ages.” Journal of Law and Economics 35(April): 1–13.10.1086/467242Suche in Google Scholar
Barzel, Yoram. 2002. A Theory of the State: Economic Rights, Legal Rights, and the Scope of the State. Cambridge, UK: Cambridge University Press.10.1017/CBO9780511606182Suche in Google Scholar
Barzel, Yoram and Kiser, Edgar. 1991. “The Origins of Democracy in England.” Rationality and Society 3(October): 396–422.10.1177/1043463191003004002Suche in Google Scholar
Barzel, Yoram. 1994, “The capture of wealth by Monopolists and the protection of property Rights.” Intemational Review of Law and Economics, 14: 393–409.10.1016/0144-8188(94)90023-XSuche in Google Scholar
Buchanan, James M. 1975. The Limits of Liberty: Between Anarchy and Leviathan. Chicago: University of Chicago Press.Suche in Google Scholar
Chang, Y.F. 1997. Modern Chinese History, Vol. 1, Ch.4. Taipei: Tung Wah Books.Suche in Google Scholar
Chang, Shiu-Fung. 2007. Feng Yu-hsing in Henan. http://www.0379fq.com/Shownews.asp?ID=7661.Suche in Google Scholar
Coase, R.H. 1960. “The Problem of Social Cost.” Journal of Law and Economics 3: 1–44.10.1086/466560Suche in Google Scholar
Demsetz, Harold. 1968. “Why Regulate Utilities.” Journal of Law and Economics 11: 55.10.1007/978-1-349-15486-9_10Suche in Google Scholar
Dixit, Avinash K. 2004. Lawlessness and Economics: Alternative Modes of Governance. Princeton, NJ: Princeton University Press.Suche in Google Scholar
Fairbank, John K. 1986. The Great Chinese Revolution: 1800–1985. New York: Harper& Row.Suche in Google Scholar
Feng, Yu-Hsing. 2002. Fengyuxiangzizhuan (The Autobiography of General Feng Yu-hsing). Beijing: People’s Liberation Army’s Literature Press.Suche in Google Scholar
Feng, Yu-Hsing. 2006. The Autobiography of Feng Yu-hsing. Beijing: World Knowledge Press.Suche in Google Scholar
Fleck, Robert K and Hanssen, Andrew F. 2006. “The Origins of Democracy: A Model with Application to Ancient Greece.” Journal of Law and Economics. 49(April): 115–146.10.1086/501088Suche in Google Scholar
Hirshleifer, Jack. 1995. “Anarchy and Its Breakdown.” Journal of Political Economy 103(February): 26–52.10.1017/CBO9780511619984.002Suche in Google Scholar
Hirshleifer, Jack. 2001. The Dark Side of the Force: Economic Foundations of Conflict Theory. Cambridge: Cambridge University Press.Suche in Google Scholar
Lai, Lawrence W.C. 1987. “Democracy and Protection of Property Rights.” Unpublished M.Soc. Sc. (Econ) Thesis, Department of Economics, University of Hong Kong.Suche in Google Scholar
Li, Zhao Yang. 2004 “The Evolution of Feng Yu-Hsiang’s Political Thought After the Victory of Anti-Japan War” (Chinese) “Lun Kang Zhan Sheng Li Hou Feng Ping Yu Xiang Zheng ZhiSi Xiang De Yan Bian.” He Nan shi fan da xue xue bao (zh xue she hui ke xue ban). Journal of Hubei Administration Institute 31(4): 35–39.Suche in Google Scholar
Liao, Dicha Chong. 1990. Feng Yu-Hsiang’s Northern Expedition via Xiang County. (Chinese book).Suche in Google Scholar
Lim M.T. 1994. (Translated) Research on Warlords in Modern China. Taipei: Golden Grain Press (Chinese publication).Suche in Google Scholar
Lowenberg, Anton D. and Yu, Ben T. 1990. “Constitution Environment and the Contractual State: The Cases of South Africa and Hong Kong.” Journal of Comparative Economics. 14(March): 51–69.10.1016/0147-5967(90)90085-NSuche in Google Scholar
Lowenberg, Anton D. and Yu, Ben T. 1992a. “Efficient Constitution Formation and Maintenance: The Role of ‘Exit’.” Constitutional Political Economy 3(Winter): 51–72.10.1007/BF02393232Suche in Google Scholar
Lowenberg, Anton D. and Yu, Ben T. 1992b. “The Role of Intellectual in Economic Development: A Constitutional Perspective.” World Development 20(9) (September): 1261–1277.10.1016/0305-750X(92)90077-9Suche in Google Scholar
Moselle, Boaz and Polak, B. April 2001. “A Model of a Predatory State.” Journal of Law, Economics & Organization 17(N1).10.1093/jleo/17.1.1Suche in Google Scholar
McNulty, Paul J. 1968. “Economic Theory and the Meaning of Competition.” Quarterly Journal of Economics 82: 639–56.10.2307/1879604Suche in Google Scholar
Olson, Mancur. 1993. “Democracy, Dictatorship and Development.” The American Political Science Review 87(3) (September): 567–576.10.1093/0198294905.003.0005Suche in Google Scholar
North, Douglass. 1981. Structure and Change in Economic History. London: W. W. Norton & Company.Suche in Google Scholar
North, Douglass C. 1990. Institutions, Institutional Change, and Economic Performance. Cambridge: Cambridge University Press.10.1017/CBO9780511808678Suche in Google Scholar
North, Douglass C. and Thomas, Robert P. 1973. The Rise of the Western World. Cambridge: Cambridge University Press.10.1017/CBO9780511819438Suche in Google Scholar
North, Douglass C. and Weingast, Barry R. 1989. “Constitutions and Commitments: The Evolution of Institutions Governing Public Choice in Seventeenth Century England.” Journal of Economic History 49(December): 803–832.10.2307/j.ctv1ddcz33.7Suche in Google Scholar
Pao, Lee and Ng. 1956–1959. The Birth of Republic of China. Chinese Contemporary History Collection of Essays, Vol. 1, Number 8. Taipei: Jiang Jone Publisher.Suche in Google Scholar
Sheridan, James E. 1966. Chinese Warlord: The Career of Feng Yu-Hsiang. Stanford: Stanford University Press.Suche in Google Scholar
Su, Hang. 2004. “Da ge ming shi qi feng yu xiang zheng zhi qing xiang,” in Hubei xing zheng xue yuan xue bao. Wuhan: Hubei xing zheng xue yuan xue bao bian ji bu. Vol. 13 No.1.Suche in Google Scholar
Tiebout, Charles A. 1956. “A Pure Theory of Local Expenditures.” Journal of Political Economy 64(October): 416–424.10.1086/257839Suche in Google Scholar
Usher, Dan 1989. “The Dynastic Cycle and the Stationary State.” American Economic Review 79: 1031–1044.Suche in Google Scholar
Weber, Max. 1919. “Politics as a Vocation”, Politik als Beruf, 2nd lecture given to the “Free Students Union” on Bavaria on 28 January 1919.Suche in Google Scholar
Whittman, Donald. 2000. “The Wealth and Size of Nations.” Journal of Conflict Resolution 44(December): 868–884.10.1177/0022002700044006010Suche in Google Scholar
Wong, Sik-Pui. 2006. Sacrificial Love – Portraits of CIM Missionaries. USA: CCM Publishers.Suche in Google Scholar
Yu, Ben T. 1981. “Potential Competition and Contracting in Innovations.” Journal of Law and Economics 24(October): 215–238.10.1086/466982Suche in Google Scholar
Yu, Ben T. 1984. “A Contractual Remedy to Premature Innovation: The Vertical Integration of Brand-name Specific Research.” Economic Inquiry (October): 660–667.10.1111/j.1465-7295.1984.tb00713.xSuche in Google Scholar
Appendix
The Demand and Supply of the Protection Market
The model will start from specifying a demand for protection, which is the willingness to pay for protection. A subject’s sense of security determines his/her willingness to pay, but we assume here that there is a mindset of peace and quiet that are inert that can be expressed in terms of willingness to pay. A subject seeks various forms of protection, as simple as a lock and a shelter to hide, and as complicated as bodyguards and national defense, all aiming to give the subject a sense of security. Unlike sporting events, where the strategy of conflict produces innate consumption value for spectators, buyers of protection care less about the weapon technologies used except for the purpose of winning. They only care about the end result – to defeat the enemy for security and peace of mind, which can be affected positively or negatively by having a larger number of individuals covered under the same protection scheme.
We further postulated that the characteristics of this security function to be the following. The effect of military inputs on security is intrinsically different from the effect of the number of protected individuals on security. For military inputs, if the resources devoted to conflict (including attack and defense) are the same for every protector, a sense of security for everyone is very low, as the outcome of a conflict is nothing more than the flip of a coin. The more asymmetric is the weapons technology used by the warriors, the higher the outcome of security will be, as war would be more unlikely when an outcome is known in advance. On the other hand, the effects on security of a number of individuals under protection could be neutral in that when the number increases, it will cost the attacker more to attack, just as it will cost the defender more to protect. The difference in resource expenditure on violence could remain the same even when the number of individuals being protected increases, and thus, the level of security remains the same even when the number of individuals being protected increases.
The above characterization of security demand in relationship to violence (military inputs) leads to the following model specification: A society consists of N number of individuals wanting protection that are indexed by i and Z number of violence executing groups (i. e., protectors indexed by j). (N, Z) defines a domain under analysis, which could be interpreted as a family, a street block, a city, a country, a region, or the world. Resources devoted to violence by j is denoted by mj, while the mean violence resource devoted by Z–1 protectors is denoted by m.
[33] The security provided by protector, j, is Sj(mj-
The willingness of individual, i, to pay for protection by j is denoted by WTPij.
The inclusion of a local public good, Kj, as a function of an innovation factor, αj, and an idiosyncratic factor of individual, i, towards protector j, eij, showed that one’s willingness to pay can also be affected by a large number of variables that protector j may control. This factor can be overwhelming, and largely contribute to a sense of inert sense of security a subject, i, has for a protector j. The technology of protection is captured by security function, S, which is an outcome of military inputs of j relative to the military inputs expended by the average inputs of other executors of violence.
Turning now to the cost side of technology of protection, the framework we use will separate the cost structure of protection into two components: a fixed cost component that does not vary and a variable cost component that does vary with respect to the number of individuals under protection. Letting the number of individuals protected by j be denoted by xj, we can write the cost function of protection as TCj:
Note that the variable cost, V, of servicing protection depends on things other than the technology of attacking and defending. The latter are to be indexed by γj only in the fixed cost component, F. Innovations in local public goods affect the variable cost component only and are indexed separately as αj. Examples of the fixed cost of protection are military expenditures, national defense, and the cost of maintaining an army. Examples of the variable cost of protection with respect to the number of people protected are the cost of administering the protection, tax administration, fiscal financing, and expenditures for local police and politicians.
From anarchy to organized violence – a perfectly competitive market of protection
Many individuals learn to protect themselves. As the art of self-protection is acquired, a few individuals offer their protection services to others in exchange for other goods and services that generate utility. The incentive to trade is no different from that depicted by an Edgeworth-Bowley box, in which individuals with different levels of tolerance for violence will engage in mutually beneficial exchanges. We shall call this the 1st degree of organized violence, which is contingent only upon differences in preferences. The trading of violence can result in some specializations in violence, allowing the mechanics of violence to be practised more efficiently, and thus leading to organized violence.
The 1st degree of organized violence has an enforcement issue at the most fundamental level that is as difficult to resolve as the end period problem in game theory. [34] Yet, in contracts for protection (violence), a higher degree of organized violence need not resolve the end period problem in order to reach equilibrium. A specialist of violence may not be able to expropriate all his clients at the same time. What is more likely is that specialists will expropriate bit by bit rather than renege on all their clients at the same time. Although for cultural and whatever reasons, some primitive isolated society may want to uniformly expropriate the welfare benefits of all the clients who cannot make choices, the market for protection is contingent upon the assumption that individuals (and their assets) have some degree of mobility and choice. Without this assumption, the market for protection is a moot issue. In other words, a market for protection hypothetically assumes individuals can seek other competitive producers of violence, which would result when surviving victims vote with their feet. If buyers of protection can choose alternative suppliers of protection, this would impose a constraint on expropriation and equilibrium within a market of protection can exist.
Give the above setup of the problem, anarchy can evolve into a primitive form (1st order) of organized violence, which would then evolve into a spot market (perfect competitive market) for protection, which can then be considered the 2nd order of organized violence. Notice that the spot market structure implies nothing about the roving or stationary ability of the protectors. All it requires is that the customer is willing to pay, there are competitive suppliers willing to protect, and implicit contracts can be honoured.
Theoretically, the above notions can be conceptualized as conditions for which suppliers of protection offer it to individuals who want it in a competitive market. Without including the element of innovation, the model is similar to the demand-supply model in any market except for one thing: competing suppliers of protection can raise each other’s costs of protection by engaging in violent conflict. In this spot market of protection, entry will raise, rather than reduce, costs. The essential features of the equilibrium include:
Rising marginal costs of protection;
free entry in supplying protection; and
violent interactions among suppliers of protection.
We wish to first illustrate this spot market model as a benchmark for further consideration of (and including) the element of innovation. The benchmark case is similar to a standard demand and supply model found in economics textbooks:
Demand conditions
Arranging WTPij in descending order according to i constitutes a market demand for protection, D (see Figure 1 in the text). Among other things that can affect the demand curve is the security function, S.
Although there are additional angles on the demand for protection that can be further elaborated on, the main point in the display of the formulation here is to show that this demand is not that much different from other demand curves used in economics for demand analysis in that it has an income effect, and the possibility of substitution when competing products are made available in the market.
An individual maximizes consumer surplus by choosing the best protector, j, which can offer the highest security with the lowest protection fee.
For individual i, he chooses the maximum over all j from bids from all j by maximizing a net protection benefit, πi where
Pj represents the protection fee (tax) charged by the protector, j.
Supply conditions
We assumed that each protector has two objective functions: 1) to maximize the probability of winning and 2) to maximize their profits of protection subject to competition. [35]
For the first objective, protector j
When one specialist (group) expends resources to prepare for violence, the cost of the other specialists (groups) will also increase. Resources expended by a specialist of violence, mj, are assumed to be an increasing function of the expenditures of its competing groups of violence specialists. If the reaction function has a slope of less than one, Nash equilibrium exists with Sj*(m*,γj). A strategic choice of γj can disrupt this equilibrium, but the formulation will not be explicitly modelled in this paper.
The second objective function a protector faces is the profit function of Pj charging protection fees to his clients, net of costs.
Thus, for Protector j, the objective function is to maximize
where xj* is the number of individuals protector j can recruit to be under his protection umbrella. xj*can be interpreted as the demand as seen by the protector, j, which is also a function of Pj,, Kj, and the equivalent offered provided by other protectors.
More precisely,
where di takes on the binary value of zero and 1 depending on if individual, i, signs up for protection with j.
Total number of people in the population, N, under protection is N*= Sum of xj*
Market equilibrium
The competitive process so described seems quite complex. However, the assumptions described in Equations (1) to (6) implicitly assert a sequential method of competition in the model in that combat between protectors is to be separated from (and preceding in a conceptual sense) competition in attracting tax revenues. A protector will engage in an arms race for a winning prize of NOT tax revenues per se, but more security for whomever and whatever a country is protecting. The cost of that violence competition will then be included as a fixed cost in the market of protection. Furthermore, the assumption of the separation of fixed and variable cost components of protection means that competition in the arms race would not affect the variable costs of providing other public goods, resulting in a market equilibrium that is not much different from other competitive market adjustments. Namely, protectors compete by offering better security with lower protection fees and local public goods to attract potential clients, which is similar to that envisioned in the Tiebout Hypothesis, at least in the case of perfect symmetry in which αj and γj are assumed to be constant and identical for every protector. [36] The equilibrium can be graphically represented by Figure 1 in the text.
Inclusion of innovation: formation of a centralized government
A society can transform a perfectly competitive market of protection, which is characterised by the rising cost of protection, into an alternate market structure of protection. To do so, societal interactions would have to go beyond the first and second degrees of organized violence. Higher degrees require protectors (and therefore their clients under protection) to give up their means of executing violence – a process of centralizing military resources under a centralized government. One can speculate the process through which this can occur, but the precise trajectory cannot be easily formulated. For one thing, oligopoly theory in this direction has not been well-developed, and many real world examples are still undergoing trials. Moreover, a centralized government has not been viewed as similar to the problem of democracy in the literature. Therefore, centralized democracy has not been the focus of attention. [37] Yet, in modern Chinese political thought, a centralized democracy is a very important philosophy even in today’s pro-market PRC government politics.
The framework here is not saying that a centralized democracy will necessarily be the evolutionary outcome of a market structure of protection. Indeed, the current situation for modern China is still a duopoly, but the framework here describes the possibility of a tendency for the market structure to move towards this equilibrium, while admitting that other market structures, including the dynastic equilibrium examined by Usher, could also be theoretical outcomes. The choice variables that will enable a centralized democracy to be the market structure outcome include a current committed price protection scheme, a future spot market price protection scheme, technological shift parameters of αj and γj (and their associated costs), and a game theoretical choice of military competition in the manner described by eq. [4] versus a cooperative solution of getting out of a prisoner’s dilemma.
Granted that the decision variables of the choice problem are much broader and much more complicated than what is needed in a perfectly competitive (atomistic) model, they should not prevent us from conceptualizing the nature of the choice problem in this dynamic setting. Although to introduce them runs the risk of underspecifying a model, omitting them can turn a model into one that addresses an empty issue, at least in the case of Modern China.
We can use additional mathematical symbols to represent each of the parameters listed above and organize a set of modified equations that describes this broader dynamic choice problem corresponding to Equations (1) to (5). However, this process would not provide additional analytical insights in that we cannot predict, at this stage of our analysis, under what situation will one type of evolution trajectory necessarily dominate another. We are thus compelled to discuss the outcome conceptually. Basically, the evolutionary process could come about through choices made by the individual actions of both the suppliers and demanders of the market of protection.
On the supply side: a protector offers a prior contract for a committed price, which will reduce the demand for protective services to his competitors, with the future spot market (uncommitted) size shrinking. His competitor, upon seeing a possible shrinking future market, will compare a spot pricing tactic with the strategy of following suit to also offer a committed price, which is very much like a Bertrand competition. The twist here is that the average and variable costs of protection are also lowered (or anticipated to lower). The incentive of offering lower committed prices to customers would be much higher if the costs are expected to go down by an amount larger than the price cut. On the other hand, if a protector continues to operate in a spot market context only, he will be alienated (or marginalized) when individuals under his protection switch to an alternative protector perceived to have a lower cost through αj and a higher military means of protection, γj
On the demand side: an individual shopping for protection will compare offered committed prices, the level of security, and the amount of public goods offered by j (and the expected spot price if uncommitted) and choose whether or not he wants to commit to a prior contract, and if so, from whom. The larger the spot price one has to pay for identical security and public goods, the larger is one’s incentive to accept a lowered committed price. In order to choose a particular protector, an individual will pick the one who presents the highest chance of reducing the average and marginal costs of protection (i. e., delivering what he promises to deliver).
It may be useful to think of this evolution as a contract for innovation and an institutional choice problem. [38] In other words, the evolution can be achieved through a contract between protected individuals and a protector who promises to improve his/her protection ability so that the marginal cost of protection becomes a decreasing cost function in return for the taxes paid by the protected individuals. This contract can be considered a social contract and a form of “quid pro quo taxation”. [39]
We noted that an important precondition of a centralized democracy is a decreasing marginal cost of protection. Without that, a protector cannot handle a large population under protection, just as a mom-and-pop street corner restaurant will not be able to handle a large patronage. αj is important not only for shifting the variable cost components of protection, but for making them decline (i. e., recruiting additional individuals under the same system of protection lowers the marginal cost of protection).
A decreasing cost of protection, however, is only one precondition for a centralized democracy. If “consumers” of protection have not made prior arrangements with a centralized government, and if the latter evolves purely from the supply side as weapons and/or administrative technology improve, the protector can turn into a single despot who charges a monopoly price for the protection of MR=MC. Conceptually, a government with a declining average cost of protection may emerge dictatorially by might or under a democratic social contract, in which buyers of protection are directly (or indirectly) involved in government policies. Figure 2 in the text compares the various equilibria in this technological cost-decreasing environment.
Note in the diagram in the text that a dictator would charge a monopoly rent (AR–AC)No by equating MC with MR. How this monopoly rent is divided determines the outcome of the ideal of centralized democracy vs. a despot. S/he may be a benevolent or enlightened dictator if part of this rent is redistributed to his/her subjects, but a despot or tyrant if s/he grabs all the rent for him/herself. Olson “did not” consider this problem, which went from Point O to Point M in the diagram. Point M denotes a democratic government that aims to charge at the average cost (i. e., adopt a uniform head tax with balanced budget in the long run) and earn normal returns with AR=AC. This is one notion of democracy that is consistent with the notion of constitutional economics.
The mechanism by which equilibrium, M, emerges over equilibrium, O, is tricky and not easily engineered. The history of the world suggests that it does not always happen, although there is a great efficiency gain for a society as a whole to choose M over O, even if it is achieved for only a short period of time. The condition of M as a stable equilibrium is a theoretical possibility, but it can also act as an ideal that many governments in the world try to achieve. The choice problem entails the involvement of individuals: a person can do nothing and wait to be forced to pay a monopoly protection fee of Po, or commit to the offer of a lower price of protection, Pm, of an emerging central government.
This appendix basically outlines all political institutional equilibria within a framework of market of protection without predicting which will necessarily be the outcome. The framework does imply that transaction costs aside, and from pure economic efficiency perspective, equilibrium M is clearly the long run solution. Unfortunately, Feng Yu-Hsiang has not been successful in reaching that equilibrium. Although he managed γj (technology in affecting fixed costs) well, he had little to offer in αj (principles affecting the variable costs). Perhaps that was what contributed to his political failure. Nevertheless, his existence served being a transitional step, in a very important process on how other “protectors” in China have tried to reach the equilibrium of a centralized democracy.
© 2017 Walter de Gruyter GmbH, Berlin/Boston
Artikel in diesem Heft
- Wisdom of the Past
- The Federal Communications Commission and the Broadcasting Industry
- Original Articles
- The Demand and Supply of Protection:A Reinterpretation of the Emergence of a Weberian/Olsonian State through the Lens of Modern China
- Ritual and property: Theorizing a Chinese case
- Market for Ideas
- The attractions of socialism : An interview with Deirdre McCloskey, by Grégoire Canlorbe
- Original Article
- Globalization and Inclusive Human Development in Africa
Artikel in diesem Heft
- Wisdom of the Past
- The Federal Communications Commission and the Broadcasting Industry
- Original Articles
- The Demand and Supply of Protection:A Reinterpretation of the Emergence of a Weberian/Olsonian State through the Lens of Modern China
- Ritual and property: Theorizing a Chinese case
- Market for Ideas
- The attractions of socialism : An interview with Deirdre McCloskey, by Grégoire Canlorbe
- Original Article
- Globalization and Inclusive Human Development in Africa