Abstract
This study defines reporting conservatism as a higher verification standard for probable gains compared to losses and builds a model that endogenously generates optimal behavior resembling an asymmetric preference for gains versus losses. Our model considers the setting where one party produces a resource and another tries to expropriate it. The key factor determining the extent of the gain-loss asymmetry is the level of information asymmetry or trust between the two parties. The information asymmetry-based results of our model provide a simpler explanation for the vast empirical literature on conservatism, where the bulk of the economic relationships among the parties appear to be information-based with little direct relation to explicit debt contracts, a factor that has been the focus of theoretical arguments. We also suggest new empirical analyzes.
Similar content being viewed by others
Notes
Gigler et al. (2009, p.779) explicitly note that “we do not seek to characterize conservatism by modeling the actual measurement process ... Instead, we develop a reduced form statistical representation of conservatism.”
Kahneman (2011)’s subtler point is that it’s not just preferences that are evolutionary but also the survival games. Two firms fighting for market share may spill no blood today (at least in advanced countries), but the notions of winning/losing/gains/losses/signaling/threatening are all evolutionary in nature. And it is precisely because the human brain recognizes the evolutionary skeleton of these games that it activates the evolutionary response. Breiter et al. (2001) document how gains and losses trigger different responses in the amygdala, while Knutson et al. (2003) show that gains trigger increased neuronal activation in the mesial prefrontal cortex, while losses trigger activity in the hippocampus. In addition, Montague and Berns (2002) show that the human brain evaluates monetary and material rewards similarly, suggesting that the various asymmetries in investor attitudes toward financial gains and losses in modern stock markets appear to be emerging from an evolutionary timeframe. Chen et al. (2006)’s results lend further credence to this evolutionary survival conjecture, showing that capuchin monkeys also display various gain-loss asymmetries. Also see Williams (1966, pp.77-83).
Context-dependent preferences that do not yield traditional montonic utility functions have been extensively studied both in behavioral and mathematical economics (Chipman 1960), and this literature recognizes both the virtues and the mathematical cumbersomeness of such preferences, relative to traditional preferences that have other shortcomings but yield monotonic utility functions (Kreps 1990, Section 3.5).
In fact, there is no guarantee that preferences with such reference points can be built up into a utility function, for the existence of a utility function demands considerable mathematical regularities from the underlying preferences (Chipman 1960). Our goal however is not to build full-fledged utility functions but simply to construct endogenous preferences that we can use to compare lotteries and sure payoffs.
Note that it is essential that the joint distribution of x1, x2, y be correlated. Otherwise the conditional distribution of y given the future realization of {x1, x2} will be the marginal distribution of y itself and thus has no information content.
Our focus on the asymmetric treatment of gains versus losses is silent on the relative treatment of lotteries with smaller gains versus lotteries with larger gains, or lotteries with smaller losses versus lotteries with larger losses. If we follow Gigler et al. (2009) and exogenously posit the existence of a joint correlated distribution x1, x2, y with various statistical properties, we will have a mathematical answer for all possible ranges of x1, x2, y, but the question is if that is what the FASB’s definition of conservatism really means. In other words, the notion of conservation is not so precisely defined by the FASB or Basu (1997) so as to give an unambiguous mathematical answer for every lottery (Lambert 2010, p.294). We therefore view conservatism in the limited sense as any measurement system that imposes an asymmetrical treatment of probable gains versus probable loss. Also see footnote 4 where we argue that we build our endogenous preferences for this limited sense of conservatism.
Over time, each lottery will pay off, and the clean surplus relation means the that the lottery will be finally recorded at its liquidation value. Our bias is therefore related to the set of lotteries that have not yet paid off at any given point in time. We acknowledge that our logic may not work when the sequence of transactions is not i.i.d. More interestingly, Gigler et al. (2009, p.784) explicitly eschew the timeliness argument and state instead that Basu’s statistical regularity is amenable to more than one interpretation and use an alternative explanation to fit Basu to their model. So we are not alone in not having nailed down the timeliness argument completely.
Every loss is the counterparty expropriating money from the agent without giving anything back in return.
In additional analysis, we have also checked robustness to the ESS criterion.
Throughout the model, both in the production stage and protecting the output from the stealer stage, we assume that the probability measure and the unit of output are such that maximizing the expected value of output maximizes the probability of survival for the entity.
The assumption of decreasing marginal returns is not controversial even in biological production games; the hunter may get too tired searching for a large catch (Laundre 2014). The convex function \(C(e)\) is one way to model this phenomenon.
Note that because the stealer and the producer are assumed to be strangers, a one-period analysis will suffice, even if the game is played repeatedly among strangers in the population.
The model allows for \(\phi \) to vary by stealer. There is nothing in the model that requires \(\phi \) to be the same for all stealers.
The strength of the producer is relative to the stealer, which depends from game to game. In each game, the producer has a pure strategy over the stealer, but over many games, the observed behavior of the producer will be either to let go or to keep the output but never to share a part of it.
The use of exogenous impartial third parties to generate better outcomes has precedence in standard game theory as well; see Kreps (1990, pp.411–412). Also note that k accrues to the impartial party and is therefore not a social loss like the fight costs.
Studying how trust and reputation for impartiality are built, either through repeated games or some other mechanism, is beyond the scope of this study (Alesina and Giuliano 2015); our more modest goal is to show how such trust, when present, can alter the nature of information asymmetry and thus preferences.
When preferences fail to satisfy the necessary mathematical regularities, the utility function that emerges is a not a typical function but a complicated vector-like object (Chipman 1960).
Note that these preferences are valid for both producers and stealers. The preferencetoward a surer gamble is typically defined in a setting where the individual’s information setdoes not change as he chooses among gambles. But as Fig. 2notes, the stealer’s informationsets and beliefs evolve in the game. The stealer’s decision to fight when he is more certainthat the producer is Weak is not inconsistent with his overall preference for a surer gaingamble, should such a gamble be available. As Proposition5 notes, the stealer will fight whenthere is no certification, because his information set at that point is that the producer isWeak with a probability of one.
Our approach of linking verification standards to user preferences raises the issue of userpreference heterogeneity (Kothari et al. 2010, Section 2.3). Our interest isnot in the fact that different users’ reporting preferences are different. Instead, our focusis that these preferences switch their sign at zero. On average therefore one should see anasymmetry in reporting standards for probable gains versus probable losses.
Basu’s empirical measure of conservatism, which almost all the above studies employ in some form or the other, relies not just on earnings but also on prices. And prices depend on both investor preference and investor information sets. We acknowledge that the representative investor from an accounting perspective may not necessarily be the marginal investor in the firm’s stock who determines the price; see footnote 5 in Barberis (2013). Gigler et al. (2009, p.784) explicitly list Basu’s assumptions on the investor information sets.
See, for example, Henrich et al. (2001), who show that individuals’ experience with markets is correlated with greater fairness in experimental games.
Interestingly, accounting research has examined the association between social capital and several accounting variables (Jha and Chen 2015), but we are not aware of any similar empirical analysis of conservatism.
The ideas of trust and culture have a rich history in economic thought. In his 1751 Enquiry concerning the Principles of Morals, David Hume notes: “It is sufficient for our present purpose, if it be allowed, what surely, without the greatest absurdity, cannot be disputed, that there is some benevolence, however small, infused into our bosom; some spark of friendship for human kind; some particle of the dove, kneaded into our frame, along with the elements of the wolf and serpent.”
References
Alesina, A., & Giuliano, P. (2015). Culture and institutions. Journal of Economic Literature, 53, 898–944.
Ball, R., & Shivakumar, L. (2005). Earnings quality in uk private firms: Comparative loss recognition timeliness. Journal of Accounting and Economics, 39, 83–128.
Barberis, N. (2013). Thirty years of prospect theory in economics: A review and assessment. Journal of Economic Perspectives, 27, 173–196.
Barberis, N., & Huang, M. (2007). The loss aversion/narrow farming approach to the equity premium puzzle. In: Mehra, R., editor, Handbook of the Equity Risk Premium, Elsevier Science, pp. 199–229.
Basu, S. (1997). The conservatism principle and the asymmetric timeliness of earnings. Journal of Accounting and Economics, 24, 3–37.
Basu, S. (2009). Conservatism research: Historical development and future prospects. China Journal of Accounting Research, 2, 1–20.
Basu, S., Kirk, M., Waymire, G. (2009). Memory, transaction records, and the wealth of nations. Accounting, Organizations and Society, 34, 895–917.
Bloom, N., Sadun, R., Reenen, J.V. (2012). The organization of firms across countries. The Quarterly Journal of Economics, 127, 1663–1705.
Breiter, H., Aharon, I., Kahneman, D., Dale, A., et al. (2001). Functional imaging of neural responses to expectancy and experience of monetary gains and losses. Neuron, 30, 619–639.
Bushman, R., & Piotroski, J. (2006). Financial reporting incentives for conservative accounting: The influence of legal and political institutions. Journal of Accounting and Economics, 42, 107–148.
Caskey, J., & Hughes, J. (2012). Assessing the impact of alternative fair value measures on the efficiency of project selection and continuation. The Accounting Review, 87, 483–512.
Chen, M., Lakshminaryanana, V., Santos, R. (2006). How basic are behavioral biases? evidence from capuchin monkey trading behavior. Journal of Political Economy, 114, 517–537.
Chen, Q., Hemmer, T., Zhang, Y. (2007). On the relation between conservatism in accounting standards and incentives for earnings management. Journal of Accounting Research, 45, 541–565.
Chipman, J. (1960). The foundations of utility. Econometrica, 28, 193–224.
Cohen, L. (2017). Discussion: Do common inherited beliefs and values influence ceo pay? Journal of Accounting and Economics, forthcoming.
Cosmides, L., & Tooby, J. (1997). Evolutionary psychology: A primer. UCSB Psychology Department.
Dellavigna, S. (2009). Psychology and economics: Evidence from the field. Journal of Economic Literature, 47, 315–372.
Dickhaut, J., Basu, S., McCabe, K., Waymire, G. (2010). Neuroaccounting: Consilience between the biologically evolved brain and culturally evolved accounting principles. Accounting Horizons, 24, 221–255.
Ebert, S., & Strack, P. (2015). Until the bitter end: On prospect theory in a dynamic context. The American Economic Review, 105, 1618–1633.
Effron, D., & Miller, D. (2011). Reducing exposure to trust-related risks to avoid self-blame. Personality and Social Psychology Bulletin, 37, 181–192.
FASB. (2010). Statements of Financial Accounting Concepts No 8: Conceptual Framework for Financial Reporting. Chapter 1, The Objective of General Purpose Financial Reporting, and Chapter 3, Qualitiative Characteristics of Useful Financial Information. Financial Accounting Standards Board, Norwalk, CT.
Gao, P. (2013). A measurement approach to conservatism and earnings management. Journal of Accounting and Economics, 55, 251–268.
Gigler, F., Kanodia, C., Sapra, H., Venugopalan, R. (2009). Accounting conservatism and the efficiency of debt contracts. Journal of Accounting Research, 47, 767–797.
Gintis, H. (2009). Game theory evolving. Princeton: Princeton University Press.
Gorman, M.L., Mills, M.G., Raath, J.P., Speakman, J.R. (1998). High hunting costs make african wild dogs vulnerable to kleptoparasitism by hyaenas. Nature, 391, 479.
Greif, A. (2006). The birth of impersonal exchange: The community responsibility system and impartial justice. Journal of Economic Perspectives, 20, 221–236.
Guay, W., & Verrecchia, R. (2006). Discussion of an economic framework for conservative accounting and bushman and piotroski. Journal of Accounting and Economics, 42, 149–165.
Henrich, J., & et al. (2001). In search of homo economicus: Behavioral experiments in 15 small-scale societies. American Economic Review P&P, 91, 73–78.
Holthausen, R. , & Watts, R. (2001). The relevance of the value-relevance literature for financial accounting standard setting. Journal of Accounting and Economics, 31, 3–75.
Hui, K., Klasa, S., Yeung, E. (2012). Corporate suppliers and customers and accounting conservatism. Journal of Accounting and Economics, 53, 115–135.
Jha, A., & Chen, Y. (2015). Audit fees and social capital. The Accounting Review, 90, 611–639.
Kahneman, D. (2011). Thinking, Fast and Slow. Farrar, Straus and Giroux.
Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision under risk. Econometrica, 47(2), 263–291.
Khan, M., & Watts, R. (2009). Estimation and empirical properties of a firm-year measure of conservatism. Journal of Accounting and Economics, 48, 132–150.
Kim, Y., Li, S., Pan, C., Zuo, L. (2013). The role of accounting conservatism in the equity market: Evidence from seasoned equity offerings. The Accounting Review, 88, 1327–1356.
Knutson, B., & et al. (2003). A region of mesial prefrontal cortex tracks monetarily rewarding outcomes: Characterization with rapid event-related fmri. NeuroImage, 18, 263–272.
Kothari, S.P., Shu, S., Wysocki, P. (2009). Do managers withhold bad news Journal of Accounting Research, 47, 241–276.
Kothari, S., Ramanna, K., Skinner, D. (2010). Implications for gaap from an analysis of positive research in accounting. Journal of Accounting and Economics, 50, 246–286.
Kreps, D. (1990). A course in microeconomic theory. Princeton: Princeton University Press.
Kwon, Y., Newman, D., Suh, Y. (2001). The demand for accounting conservatism for management control. Review of Accounting Studies, 6, 29–51.
LaFond, R., & Roychowdhury, S. (2008). Managerial ownership and accounting conservatism. Journal of Accounting Research, 46, 101–135.
LaFond, R., & Watts, R. (2008). The information role of conservatism. The Accounting Review, 83, 447–478.
Lambert, R. (2010). Discssion of “implications for gaap from an analysis of positive research in accounting”. Journal of Accounting and Economics, 50, 287–295.
Laundre, J. (2014). How large predators manage the cost of hunting. Science, 6205, 33–34.
List, J. (2003). Does market experience eliminate market anomalies Quarterly Journal of Economics, 118, 41–71.
List, J. (2004). Neoclassical theory versus prospect theory: Evidence from the marketplace. Econometrica, 72, 615–625.
Littleton, A. (1941). A genealogy for “cost or market”. The Accounting Review, 16, 161–167.
Lo, A. (2004). The adaptive markets hypothesis: Market efficiency from an evolutionary perspective. Journal of Portfolio Management, 30, 15–29.
Montague, R., & Berns, G. (2002). Neural economics and the biological substrates of valuation. Neuron, 36, 265–284.
Nowak, M., & Sigmund, K. (2005). Evolution of indirect reciprocity. Nature, 437, 1291–1298.
von Rohr, C., & et al. (2012). Impartial third-party interventions in captive chimpanzees: A reflection of community concern. PLoS ONE, 7, e32494.
Sapolsky, R. (1998). Why zebras don’t get ulcers. New York: Henry Holt & Co.
Scott, D., & et al. (1926). Conservatism in inventory valuations. The Accounting Review, 1, 18–30.
Shleifer, A., & Wolfenzon, D. (2002). Investor protection and equity markets. Journal of Financial Economics, 66, 3–27.
Shleifer, A., LaPorta, R, de Silanes, F.L. (1998). Law and finance. Journal of Political Economy, 106, 1113–1155.
Smith, J.M., & Price, G. (1973). The logic of animal conflict. Nature, 246, 15–18.
Steiner, J., & Stewart, C. (2016). Perceiving prospects properly. American Economic Review, 106, 1601–1631.
Trivers, R. (1971). The evolution of reciprocal altruism. The Quarterly Review of Biology, 46, 35–57.
Watts, R. (2003). Conservatism in accounting part i: Explanations and implications. Accounting Horizons, 17, 207–221.
Waymire, G. (2014). Neuroscience and ultimate causation in accounting research. The Accounting Review, 89, 2011–2019.
Waymire, G., & Basu, S. (2008). Accounting is an evolved economic institution. Foundations and Trends in Accounting, 2, 1–174.
Williams, G. (1966). Adaptation and natural selection. Princeton: Princeton University Press.
Wilson, E. (2012). The social conquest of earth. New York: Liverlight Press.
Acknowledgments
We are especially grateful to two anonymous reviewers and Stephen Penman (editor). We also thank Sudipta Basu, S.P. Kothari, John List, Robert Trivers (Rutgers), and seminar participants at Arizona State, George Mason, Maryland, Miami, Michigan State, Minnesota, UBC, UC Irvine, UCLA, USC, UT Dallas, and UVA for their comments.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Proof
Proposition 1
Let a s (σ s ) be the stealer’s strategy as a function of his signalσ s ∈{T, W}for T = Tough and W = Weak. Let a p (𝜃) be the producer’s strategy as a function of her type 𝜃 ∈{T, W}. Let b be the vector of beliefs at each information set in the extended game. We seek to find the perfect Bayesian equilibrium\((a_{s}^{*}(\sigma _{s}),a_{p}^{*}(\theta ))\).
To solve, work backwards. Figure 2 presents the extensive form of the game. Observe that the producer has a nontrivial choice only when the stealer chooses to fight. For a producer of type 𝜃= T, she earns y − μ p T by fighting and 0 by leaving, regardless of the stealer’s signal. Sincey > μ p T by assumption, ap∗(T) = F. Similarly, a Weak producer makes a choice only when the stealer chooses to fight. This producer earns 0 by leaving and− μ p W by fighting, regardless of the stealer’s signal. Thus ap∗(W) = L. This proves parts 3 and 4.
To solve for the stealer’s strategy, it is necessary to compute the stealer’s beliefs, according to Bayes’s rule. Let b i j denote the stealer’s belief that 𝜃 = i when the stealer’s signal σ s = j. Calculated by Bayes’s rule, this yields the following.
Suppose σ s = W. Given \(a_{p}^{*}(\theta )\), if the stealer fights, he earns: Δ W = b W W y − b T W μ s T . He earns nothing if he leaves. Thus \(a_{s}^{*}(W)=F\) if and only if Δ W > 0, and \(a_{s}^{*}(W)=L\) otherwise.
Now suppose σ s = T. Given \(a_{p}^{*}(\theta )\), the stealer earns 0 if he leaves and if he fights he earns, in expectation,\({\Delta }_{T}=b_{WT}y-b_{TT}\mu _{s_{T}}\). Thus \(a_{s}^{*}(T)=F\) if and only if Δ T > 0, and \(a_{s}^{*}(T)=L\) otherwise. This proves parts 1 and 2.
To see uniqueness, first note that the producer’s equilibrium strategy in the actionspace of Fig. 2 is strictly dominant. Given the producer’s strategy, the conditions for Δ W > 0 and Δ T > 0 are necessary and sufficient to determine the stealer’s best response. The equilibrium is thus unique.□
Proof
Proposition 2 Note from Eq. 1 that f(y; e) is linear in e; its second derivative with respect to e is therefore zero. Because the integrand and its e derivatives are piecewise integrably bounded, Leibniz’s rule applies to this integral.
The optimization problem of the proposition with respect to e is therefore strictly concave and yields a unique solution for the optimal e. This unique solution is less than \(\bar {e}\) because \(C^{\prime }(\bar {e}) = \infty \). The presence of discontinuous drops in B(y) implies that we cannot assert that the optimal e is always greater than\(\underline {e}\). However, the possibility that the optimal e can equal\(\underline {e}\) has no impact on our analysis. Moreover, there are a wide variety of settings in which the optimal\(e > \underline {e}\). To see this, first note that \(\underline {y}, \bar {y}\) are assumed to be greater than μ p T , whereas y W , y T do not depend on μ p T but on the other free exogenous parameter μ s T . As a result, any of the following three possibilities, among others, are settings where we can show that the optimal \(e > \underline {e}\): 1)\(\underline {y} < \bar {y} < y_{W}\) (the stealer never attacks); 2) \(y_{W} < \underline {y} < \bar {y} < y_{T}\) (the stealer attacks only if he receives the Weak signal); and 3)\(\underline {y} > y_{T}\) (the stealer always attacks). In each case, B(y) is a linear function with positive slope. Calculation shows that\(\left .\frac {\partial }{\partial e}{\int }_{\underline {y}}^{\bar {y}} B(y) f(y;e)\,dy\right |_{e=\underline {e}}>0\), and \(C^{\prime }(\underline {e}) = 0\). So, \(e=\underline {e}\) cannot be the solution in any of these cases. □
Proof
Proposition 3
Suppose the producer sees the stealer and learns her own type (Tough or Weak). The expected payoff to the Tough producer after meeting the stealer, but before the fight, is as follows.
The expected payoff to the Weak producer after meeting the stealer but before the fight is as follows.
□
Note that because \(q_{s} > \frac {1}{2}\) and y > μ p T ,∀y : B T (y) ≥ B W (y).
Suppose the producer can offer to share a part of the output in the hope that the stealer will leave. The stealer receives the transfer, observes the size of the rest of the output, and then gets his signal about the producer’s type. He then decides whether to continue the stealing game for the rest of the output. We solve for an equilibrium in this game.
Separating equilibrium
First consider separating equilibria. Let (t W , t T ) be the equilibrium transfers offered in a separating equilibrium by the Weak and the Tough producer respectively. Let P(t) be the stealer’s probability assessment that the producer is the Tough type. By consistency of beliefs, P(t W ) = 0 and P(t T ) = 1. Thus, by submitting t W , the Weak producer gets 0 (the stealer will attack for the rest of the output for sure), whereas, by deviating to t T and pooling with the Tough producer, she will be weakly better off than zero. We will show that she earns B W (⋅), which from Eq. 9 is weakly greater than zero). This deviation is profitable, and therefore no separating equilibria exist, i.e., t W = t T .
We next determine the optimal t W = t T and show that it is unique in y. We first specify the off-equilibrium beliefs of the stealer.
Pooling equilibrium’s off-equilibrium beliefs
Given that the equilibrium t W = t T is pooling, we assume that P(t) = ϕ for any feasible t. That is, the transfer itself does not change the priors of the stealer. We will prove later that our equilibrium based on this belief structure satisfies the intuitive criterion.
We consider the Tough producer’s case first. This producer offers t T such that the following holds.
This recursive formulation occurs because, by assumption, an offering of t does not change the stealer’s priors from ϕ. Therefore, for the remaining output y − t, for all feasible t, the stealer acts sequentially rationally, and the Tough producer expects to get, by definition of B T (.) above, B T (y − t).
If B T (y) were monotonically increasing, t T = 0. However, there are regions where it is not. Given the structure of the exogenous variables, there are two cases to consider: B T (y W ) ≤ B T (y T ) and B T (y W ) > B T (y T ). We solve for each case separately.
Case I:
B T (y W ) ≤ B T (y T )
This condition implies the following.
Figure 4 plots an example B T (y). Note in this figure that \(\mu _{pT} = 4 < \frac {18-8}{1-0.6} = 25\).
The smaller local maximum of B T (y) is attained at B T (y W ), and the larger local maximum is attained at B T (y T ). We also note that:
So, for y W < y ≤ y W + (1 − q s )μ p T , the Tough producer will make a transfer t T = y − y W and get the payoff y W . The Weak producer will mimic that transfer and also earn y W , because the stealer will not attack when remaining output is less than or equal to y W . Further note that, in this case, y W + (1 − q s )μ p T ∈ (y W , y T ], the middle continuous range of B T (y).
We also see from Eq. 8 the following.
So, for y T < y ≤ y T + q s μ p T , the Tough producer will transfer t T = y − y T and get the payoff B T (y T ). The Weak producer will mimic that transfer and earn (1 − q s )y T . Note that, because B T (y T ) ≥ B T (y W ) by assumption, the Tough producer will not transfer the larger amount y − y W .
The complete specification of the equilibrium for Case I is as follows.
-
1.
Set the default t T = t W = 0. Then, apply the following changes in order.
-
2.
If y ≤ y W , t T = t W = 0.
-
3.
If y W < y ≤ y W + (1 − q s )μ p T and y W is feasible (i.e., \(y_{W} > \underline {y}\)), then t T = t W = y − y W . If y W is not feasible, then t T = t W = 0.
-
4.
If y T < y ≤ y T + q s μ p T and y T is feasible (i.e., \(y_{T} > \underline {y}\)), then t T = t W = y − y T . If y T is not feasible, then t T = t W = 0.
-
5.
The Tough producer earns B T (y − t T ), and the Weak producer earns B W (y − t W ).
Case II
B T (y W ) > B T (y T )
This condition implies the following.
Figure 5 plots an example B T (y) for the Case II scenario. The only change in the parameters from Fig. 4 is the reduction in the accuracy of the stealer’s signal q s from 0.6 to 0.505. The smaller local maximum of B T (y) is attained at B T (y T ), and the larger local maximum is attained at B T (y W ). If the Tough producer’s current payoff is less than these maxima, the Tough producer will move to the relevant maximum.
The complete specification of the equilibrium for Case II is as follows.
-
1.
Set the default t T = t W = 0. Then apply the following changes in order.
-
2.
If y ≤ y W , t T = t W = 0.
-
3.
If y W < y ≤ y T and y W is feasible (i.e., \(y_{W} > \underline {y}\)), then t T = t W = y − y W . If y W is not feasible, then t T = t W = 0.
-
4.
If y T < y ≤ y W + μ p T and y W is feasible (i.e., \(y_{W} > \underline {y}\)), then t T = t W = y − y W . (Note that y W + μ p T > y T − (1 − q s )μ p T + μ p T > y T .)
-
5.
If y W is not feasible but y T is, then, as in Case I, if y T < y ≤ y T + q s μ p T , then t T = t W = y − y T , and if y > y T + q s μ p T , then t T = t W = 0.
-
6.
If y T is not feasible, then t T = t W = 0.
-
7.
The Tough producer earns B T (y − t T ), and the Weak producer earns B W (y − t W ).
Note that, in Case II, the equilibrium t T = t W = 0 when y > y W + μ p T : the Tough producer gains more at y than at y W .
Finally, we observe several aspects of the equilibrium common to both cases.
-
1.
The equilibrium t T = t W is unique in y in both Case I and Case II.
-
2.
The equilibrium t T = t W is 0 if the range \([\underline {y}, \bar {y}]\) is such that B T (y) is continuous in the entire range.
-
3.
As \(q_{s} \rightarrow 1, y_{W} \equiv \frac {(1-q_{s})\phi }{q_{s}(1-\phi )} \mu _{sT}\rightarrow 0\) monotonically, and \(y_{T} \equiv \frac {q_{s}\phi }{(1-q_{s})(1-\phi )} \mu _{sT} \rightarrow +\infty \) monotonically. The limiting values of y W , y T also imply that, for any given admissible values of \(\underline {y}, \bar {y}\), there exists a threshold \(\bar {q_{s}}, \frac {1}{2} < \bar {q_{s}} < 1\), above which \(y_{W} < \underline {y} < \bar {y} < y_{T}\), thus resulting in the equilibrium t T = t W = 0.
-
4.
In both Case I and Case II, the regions where t T = t W > 0 are controlled by the size of μ p T . As μ p T shrinks, the chances of non-zero t T = t W shrinks. (See the horizontal regions and their boundaries in Figs. 4 and 5.)
-
5.
With probability 1, a random choice of exogenous parameters will admit a range of y where t T = t W = 0. To see this, the probability that \(\underline {y} = y_{W}\) is 0. If \(\underline {y} < y_{W}\), then there exists an 𝜖 > 0 such that the optimal t T for y ∈ (y W − 𝜖, y W ) is 0. A similar \((\underline {y}, \underline {y} + \epsilon )\) range can be found if \(\underline {y} > y_{W}\).
Intuitive criterion
We argue that our equilibrium satisfies the intuitive criterion. Recall that a (sequential) equilibrium fails to satisfy the intuitive criterion if, for some non-equilibrium transfer t, the following condition is met: for all possible beliefs of the stealer upon receiving the non-equilibrium t, the Weak (Tough) producer is worse off than in equilibrium, and therefore the stealer infers upon receiving t that the producer is Tough (Weak). This inference is reinforcing in that, because of this inference, the Tough (Weak) producer is better off than in equilibrium, and so the Tough (Weak) producer will deviate to the non-equilibrium t (Kreps 1990, p.436, p.818).
In our model, consider a t that makes the Tough producer worse off (compared to the equilibrium), even when the stealer does not attack. The Tough producer will not issue this t because it is strictly equilibrium dominated. A Weak producer will not issue this t either, for the stealer will put probability one that she is Weak and attack for sure. This gives her 0, and we have shown that the she is weakly better off than 0 in equilibrium.
On the other hand, suppose there is an off-equilibrium t that makes the Weak producer worse off (compared to equilibrium), even in the best-case possibility that the stealer receiving this t does not attack. That is, y − t is less than what she earns in equilibrium. This implies that the stealer, upon receiving t, infers that the producer is definitely Tough. We have shown using Eqs. 8 and 9 that ∀y : B T (y) ≥ B W (y), so the Tough producer earns weakly more than the Weak producer in the pooling equilibrium. Therefore the best the Tough producer can do by deviating to t is y − t (that is, when the stealer does not attack), which is less than what the Weak producer earns in equilibrium, which is less than what the Tough producer earns in equilibrium. So the Tough producer will not deviate to the off-equilibrium t.
A final point is to show that our equilibrium is sequential. Consider the sequence 0 < {𝜖 n } < 1, where both the Tough and Weak producers issue the equilibrium t∗ with probability 1 − 𝜖 n , and issue all other t ∈ [0,y] −{t∗} using a uniform distribution of total probability measure 𝜖 n . This is a strictly mixed sequence of actions with strictly positive Bayes-consistent beliefs, i.e., the stealer’s posterior about the Tough type after receiving any t is still ϕ, which is strictly positive because 0 < ϕ < 1. This sequence’s limit 𝜖 n → 0 yields our equilibrium actions and beliefs, and this equilibrium, by construction, is sequentially rational. Our equilibrium satisfies the intuitive criterion.
Proof
Proposition 4 Suppose the producer is Tough, which occurs with probabilityϕ.In this state of the world, work backward from the last node in the gametree, which is the producer’s action. If the stealer fights, the producer earnsy − μ p T > 0 by fighting and nothing by leaving, so the producer prefers to fight. The stealer earns− μ s T . The stealer therefore prefers to leave. Thus the producer earns all the surplus y and the stealer earns nothing.
Suppose the producer is Weak. If the stealer fights, a Weak producer will lose against the stealer and earn− μ p W by fighting and 0 by leaving. Therefore the producer will leave. Knowing this, the stealer will fight, earning the full surplus y, while the producer gets nothing. This establishes the Nash equilibrium of the extensive form game. The same logic shows it is unique and sub-game perfect.□
Proof
Proposition 5 Consider the certification game.In this game, immediately after Nature reveals 𝜃 and before any other event in Fig. 2, a third party can reveal 𝜃 to the stealer for a certification fee of k < μ p T , which the producer pays.
The stealer will not attack a known Tough producer (the stealer will lose) but will attack a known Weak producer (the producer will leave). Suppose,in addition, the stealer’s belief is that a noncertifying producer is Weak with probability 1. With this belief, the stealer will always attack a noncertifying producer. Consequently, upon not certifying, the Tough producer earns y − μ p T , which is less than y − k, the payoff from certifying. So the Tough producer will always certify. The Weak producerearns 0 from not certifying (the stealer will attack based on his prior beliefs), and −k upon certifying (the producer pays k and then gets attacked upon being certified as Weak). The Weak producer will therefore never certify. The stealer’s beliefs are thus consistent with the producers’ actions, and everyone’s actionis the best response given the beliefs. There are no fights in this equilibrium.□
Rights and permissions
About this article
Cite this article
Nagar, V., Rajan, M.V. & Ray, K. An information-based model for the differential treatment of gains and losses. Rev Account Stud 23, 622–653 (2018). https://doi.org/10.1007/s11142-018-9443-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11142-018-9443-5