Skip to main content
Log in

An information-based model for the differential treatment of gains and losses

  • Published:
Review of Accounting Studies Aims and scope Submit manuscript

Abstract

This study defines reporting conservatism as a higher verification standard for probable gains compared to losses and builds a model that endogenously generates optimal behavior resembling an asymmetric preference for gains versus losses. Our model considers the setting where one party produces a resource and another tries to expropriate it. The key factor determining the extent of the gain-loss asymmetry is the level of information asymmetry or trust between the two parties. The information asymmetry-based results of our model provide a simpler explanation for the vast empirical literature on conservatism, where the bulk of the economic relationships among the parties appear to be information-based with little direct relation to explicit debt contracts, a factor that has been the focus of theoretical arguments. We also suggest new empirical analyzes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. Gigler et al. (2009, p.779) explicitly note that “we do not seek to characterize conservatism by modeling the actual measurement process ... Instead, we develop a reduced form statistical representation of conservatism.”

  2. Kahneman (2011)’s subtler point is that it’s not just preferences that are evolutionary but also the survival games. Two firms fighting for market share may spill no blood today (at least in advanced countries), but the notions of winning/losing/gains/losses/signaling/threatening are all evolutionary in nature. And it is precisely because the human brain recognizes the evolutionary skeleton of these games that it activates the evolutionary response. Breiter et al. (2001) document how gains and losses trigger different responses in the amygdala, while Knutson et al. (2003) show that gains trigger increased neuronal activation in the mesial prefrontal cortex, while losses trigger activity in the hippocampus. In addition, Montague and Berns (2002) show that the human brain evaluates monetary and material rewards similarly, suggesting that the various asymmetries in investor attitudes toward financial gains and losses in modern stock markets appear to be emerging from an evolutionary timeframe. Chen et al. (2006)’s results lend further credence to this evolutionary survival conjecture, showing that capuchin monkeys also display various gain-loss asymmetries. Also see Williams (1966, pp.77-83).

  3. Context-dependent preferences that do not yield traditional montonic utility functions have been extensively studied both in behavioral and mathematical economics (Chipman 1960), and this literature recognizes both the virtues and the mathematical cumbersomeness of such preferences, relative to traditional preferences that have other shortcomings but yield monotonic utility functions (Kreps 1990, Section 3.5).

  4. In fact, there is no guarantee that preferences with such reference points can be built up into a utility function, for the existence of a utility function demands considerable mathematical regularities from the underlying preferences (Chipman 1960). Our goal however is not to build full-fledged utility functions but simply to construct endogenous preferences that we can use to compare lotteries and sure payoffs.

  5. Note that it is essential that the joint distribution of x1, x2, y be correlated. Otherwise the conditional distribution of y given the future realization of {x1, x2} will be the marginal distribution of y itself and thus has no information content.

  6. Our focus on the asymmetric treatment of gains versus losses is silent on the relative treatment of lotteries with smaller gains versus lotteries with larger gains, or lotteries with smaller losses versus lotteries with larger losses. If we follow Gigler et al. (2009) and exogenously posit the existence of a joint correlated distribution x1, x2, y with various statistical properties, we will have a mathematical answer for all possible ranges of x1, x2, y, but the question is if that is what the FASB’s definition of conservatism really means. In other words, the notion of conservation is not so precisely defined by the FASB or Basu (1997) so as to give an unambiguous mathematical answer for every lottery (Lambert 2010, p.294). We therefore view conservatism in the limited sense as any measurement system that imposes an asymmetrical treatment of probable gains versus probable loss. Also see footnote 4 where we argue that we build our endogenous preferences for this limited sense of conservatism.

  7. We directly use the text in http://www.iasplus.com/en-us/standards/ifrs-usgaap/contingencies#recoveries-of-contingent-losses--reimbursements- and www.iasplus.com/en-us/standards/international/ias/ias37.

  8. Over time, each lottery will pay off, and the clean surplus relation means the that the lottery will be finally recorded at its liquidation value. Our bias is therefore related to the set of lotteries that have not yet paid off at any given point in time. We acknowledge that our logic may not work when the sequence of transactions is not i.i.d. More interestingly, Gigler et al. (2009, p.784) explicitly eschew the timeliness argument and state instead that Basu’s statistical regularity is amenable to more than one interpretation and use an alternative explanation to fit Basu to their model. So we are not alone in not having nailed down the timeliness argument completely.

  9. Every loss is the counterparty expropriating money from the agent without giving anything back in return.

  10. In additional analysis, we have also checked robustness to the ESS criterion.

  11. Throughout the model, both in the production stage and protecting the output from the stealer stage, we assume that the probability measure and the unit of output are such that maximizing the expected value of output maximizes the probability of survival for the entity.

  12. The assumption of decreasing marginal returns is not controversial even in biological production games; the hunter may get too tired searching for a large catch (Laundre 2014). The convex function \(C(e)\) is one way to model this phenomenon.

  13. Note that because the stealer and the producer are assumed to be strangers, a one-period analysis will suffice, even if the game is played repeatedly among strangers in the population.

  14. The model allows for \(\phi \) to vary by stealer. There is nothing in the model that requires \(\phi \) to be the same for all stealers.

  15. The strength of the producer is relative to the stealer, which depends from game to game. In each game, the producer has a pure strategy over the stealer, but over many games, the observed behavior of the producer will be either to let go or to keep the output but never to share a part of it.

  16. The use of exogenous impartial third parties to generate better outcomes has precedence in standard game theory as well; see Kreps (1990, pp.411–412). Also note that k accrues to the impartial party and is therefore not a social loss like the fight costs.

  17. Studying how trust and reputation for impartiality are built, either through repeated games or some other mechanism, is beyond the scope of this study (Alesina and Giuliano 2015); our more modest goal is to show how such trust, when present, can alter the nature of information asymmetry and thus preferences.

  18. When preferences fail to satisfy the necessary mathematical regularities, the utility function that emerges is a not a typical function but a complicated vector-like object (Chipman 1960).

  19. The fact that our model generates the asymmetry as a consequence of two different games mirrors the biological evidence that gains and losses are evaluated in a different manner by the brain (Breiter et al. 2001; Knutson et al. 2003; Dickhaut et al. 2010).

  20. Note that these preferences are valid for both producers and stealers. The preferencetoward a surer gamble is typically defined in a setting where the individual’s information setdoes not change as he chooses among gambles. But as Fig. 2notes, the stealer’s informationsets and beliefs evolve in the game. The stealer’s decision to fight when he is more certainthat the producer is Weak is not inconsistent with his overall preference for a surer gaingamble, should such a gamble be available. As Proposition5 notes, the stealer will fight whenthere is no certification, because his information set at that point is that the producer isWeak with a probability of one.

  21. Our approach of linking verification standards to user preferences raises the issue of userpreference heterogeneity (Kothari et al. 2010, Section 2.3). Our interest isnot in the fact that different users’ reporting preferences are different. Instead, our focusis that these preferences switch their sign at zero. On average therefore one should see anasymmetry in reporting standards for probable gains versus probable losses.

  22. Basu’s empirical measure of conservatism, which almost all the above studies employ in some form or the other, relies not just on earnings but also on prices. And prices depend on both investor preference and investor information sets. We acknowledge that the representative investor from an accounting perspective may not necessarily be the marginal investor in the firm’s stock who determines the price; see footnote 5 in Barberis (2013). Gigler et al. (2009, p.784) explicitly list Basu’s assumptions on the investor information sets.

  23. See, for example, Henrich et al. (2001), who show that individuals’ experience with markets is correlated with greater fairness in experimental games.

  24. Interestingly, accounting research has examined the association between social capital and several accounting variables (Jha and Chen 2015), but we are not aware of any similar empirical analysis of conservatism.

  25. The ideas of trust and culture have a rich history in economic thought. In his 1751 Enquiry concerning the Principles of Morals, David Hume notes: “It is sufficient for our present purpose, if it be allowed, what surely, without the greatest absurdity, cannot be disputed, that there is some benevolence, however small, infused into our bosom; some spark of friendship for human kind; some particle of the dove, kneaded into our frame, along with the elements of the wolf and serpent.”

References

  • Alesina, A., & Giuliano, P. (2015). Culture and institutions. Journal of Economic Literature, 53, 898–944.

    Article  Google Scholar 

  • Ball, R., & Shivakumar, L. (2005). Earnings quality in uk private firms: Comparative loss recognition timeliness. Journal of Accounting and Economics, 39, 83–128.

    Article  Google Scholar 

  • Barberis, N. (2013). Thirty years of prospect theory in economics: A review and assessment. Journal of Economic Perspectives, 27, 173–196.

    Article  Google Scholar 

  • Barberis, N., & Huang, M. (2007). The loss aversion/narrow farming approach to the equity premium puzzle. In: Mehra, R., editor, Handbook of the Equity Risk Premium, Elsevier Science, pp. 199–229.

  • Basu, S. (1997). The conservatism principle and the asymmetric timeliness of earnings. Journal of Accounting and Economics, 24, 3–37.

    Article  Google Scholar 

  • Basu, S. (2009). Conservatism research: Historical development and future prospects. China Journal of Accounting Research, 2, 1–20.

    Article  Google Scholar 

  • Basu, S., Kirk, M., Waymire, G. (2009). Memory, transaction records, and the wealth of nations. Accounting, Organizations and Society, 34, 895–917.

    Article  Google Scholar 

  • Bloom, N., Sadun, R., Reenen, J.V. (2012). The organization of firms across countries. The Quarterly Journal of Economics, 127, 1663–1705.

    Article  Google Scholar 

  • Breiter, H., Aharon, I., Kahneman, D., Dale, A., et al. (2001). Functional imaging of neural responses to expectancy and experience of monetary gains and losses. Neuron, 30, 619–639.

    Article  Google Scholar 

  • Bushman, R., & Piotroski, J. (2006). Financial reporting incentives for conservative accounting: The influence of legal and political institutions. Journal of Accounting and Economics, 42, 107–148.

    Article  Google Scholar 

  • Caskey, J., & Hughes, J. (2012). Assessing the impact of alternative fair value measures on the efficiency of project selection and continuation. The Accounting Review, 87, 483–512.

    Article  Google Scholar 

  • Chen, M., Lakshminaryanana, V., Santos, R. (2006). How basic are behavioral biases? evidence from capuchin monkey trading behavior. Journal of Political Economy, 114, 517–537.

    Article  Google Scholar 

  • Chen, Q., Hemmer, T., Zhang, Y. (2007). On the relation between conservatism in accounting standards and incentives for earnings management. Journal of Accounting Research, 45, 541–565.

    Article  Google Scholar 

  • Chipman, J. (1960). The foundations of utility. Econometrica, 28, 193–224.

    Article  Google Scholar 

  • Cohen, L. (2017). Discussion: Do common inherited beliefs and values influence ceo pay? Journal of Accounting and Economics, forthcoming.

  • Cosmides, L., & Tooby, J. (1997). Evolutionary psychology: A primer. UCSB Psychology Department.

  • Dellavigna, S. (2009). Psychology and economics: Evidence from the field. Journal of Economic Literature, 47, 315–372.

    Article  Google Scholar 

  • Dickhaut, J., Basu, S., McCabe, K., Waymire, G. (2010). Neuroaccounting: Consilience between the biologically evolved brain and culturally evolved accounting principles. Accounting Horizons, 24, 221–255.

    Article  Google Scholar 

  • Ebert, S., & Strack, P. (2015). Until the bitter end: On prospect theory in a dynamic context. The American Economic Review, 105, 1618–1633.

    Article  Google Scholar 

  • Effron, D., & Miller, D. (2011). Reducing exposure to trust-related risks to avoid self-blame. Personality and Social Psychology Bulletin, 37, 181–192.

    Article  Google Scholar 

  • FASB. (2010). Statements of Financial Accounting Concepts No 8: Conceptual Framework for Financial Reporting. Chapter 1, The Objective of General Purpose Financial Reporting, and Chapter 3, Qualitiative Characteristics of Useful Financial Information. Financial Accounting Standards Board, Norwalk, CT.

  • Gao, P. (2013). A measurement approach to conservatism and earnings management. Journal of Accounting and Economics, 55, 251–268.

    Article  Google Scholar 

  • Gigler, F., Kanodia, C., Sapra, H., Venugopalan, R. (2009). Accounting conservatism and the efficiency of debt contracts. Journal of Accounting Research, 47, 767–797.

    Article  Google Scholar 

  • Gintis, H. (2009). Game theory evolving. Princeton: Princeton University Press.

    Google Scholar 

  • Gorman, M.L., Mills, M.G., Raath, J.P., Speakman, J.R. (1998). High hunting costs make african wild dogs vulnerable to kleptoparasitism by hyaenas. Nature, 391, 479.

    Article  Google Scholar 

  • Greif, A. (2006). The birth of impersonal exchange: The community responsibility system and impartial justice. Journal of Economic Perspectives, 20, 221–236.

    Article  Google Scholar 

  • Guay, W., & Verrecchia, R. (2006). Discussion of an economic framework for conservative accounting and bushman and piotroski. Journal of Accounting and Economics, 42, 149–165.

    Article  Google Scholar 

  • Henrich, J., & et al. (2001). In search of homo economicus: Behavioral experiments in 15 small-scale societies. American Economic Review P&P, 91, 73–78.

    Article  Google Scholar 

  • Holthausen, R. , & Watts, R. (2001). The relevance of the value-relevance literature for financial accounting standard setting. Journal of Accounting and Economics, 31, 3–75.

    Article  Google Scholar 

  • Hui, K., Klasa, S., Yeung, E. (2012). Corporate suppliers and customers and accounting conservatism. Journal of Accounting and Economics, 53, 115–135.

    Article  Google Scholar 

  • Jha, A., & Chen, Y. (2015). Audit fees and social capital. The Accounting Review, 90, 611–639.

    Article  Google Scholar 

  • Kahneman, D. (2011). Thinking, Fast and Slow. Farrar, Straus and Giroux.

  • Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision under risk. Econometrica, 47(2), 263–291.

    Article  Google Scholar 

  • Khan, M., & Watts, R. (2009). Estimation and empirical properties of a firm-year measure of conservatism. Journal of Accounting and Economics, 48, 132–150.

    Article  Google Scholar 

  • Kim, Y., Li, S., Pan, C., Zuo, L. (2013). The role of accounting conservatism in the equity market: Evidence from seasoned equity offerings. The Accounting Review, 88, 1327–1356.

    Article  Google Scholar 

  • Knutson, B., & et al. (2003). A region of mesial prefrontal cortex tracks monetarily rewarding outcomes: Characterization with rapid event-related fmri. NeuroImage, 18, 263–272.

    Article  Google Scholar 

  • Kothari, S.P., Shu, S., Wysocki, P. (2009). Do managers withhold bad news Journal of Accounting Research, 47, 241–276.

    Article  Google Scholar 

  • Kothari, S., Ramanna, K., Skinner, D. (2010). Implications for gaap from an analysis of positive research in accounting. Journal of Accounting and Economics, 50, 246–286.

    Article  Google Scholar 

  • Kreps, D. (1990). A course in microeconomic theory. Princeton: Princeton University Press.

    Google Scholar 

  • Kwon, Y., Newman, D., Suh, Y. (2001). The demand for accounting conservatism for management control. Review of Accounting Studies, 6, 29–51.

    Article  Google Scholar 

  • LaFond, R., & Roychowdhury, S. (2008). Managerial ownership and accounting conservatism. Journal of Accounting Research, 46, 101–135.

    Article  Google Scholar 

  • LaFond, R., & Watts, R. (2008). The information role of conservatism. The Accounting Review, 83, 447–478.

    Article  Google Scholar 

  • Lambert, R. (2010). Discssion of “implications for gaap from an analysis of positive research in accounting”. Journal of Accounting and Economics, 50, 287–295.

    Article  Google Scholar 

  • Laundre, J. (2014). How large predators manage the cost of hunting. Science, 6205, 33–34.

    Article  Google Scholar 

  • List, J. (2003). Does market experience eliminate market anomalies Quarterly Journal of Economics, 118, 41–71.

    Article  Google Scholar 

  • List, J. (2004). Neoclassical theory versus prospect theory: Evidence from the marketplace. Econometrica, 72, 615–625.

    Article  Google Scholar 

  • Littleton, A. (1941). A genealogy for “cost or market”. The Accounting Review, 16, 161–167.

    Google Scholar 

  • Lo, A. (2004). The adaptive markets hypothesis: Market efficiency from an evolutionary perspective. Journal of Portfolio Management, 30, 15–29.

    Article  Google Scholar 

  • Montague, R., & Berns, G. (2002). Neural economics and the biological substrates of valuation. Neuron, 36, 265–284.

    Article  Google Scholar 

  • Nowak, M., & Sigmund, K. (2005). Evolution of indirect reciprocity. Nature, 437, 1291–1298.

    Article  Google Scholar 

  • von Rohr, C., & et al. (2012). Impartial third-party interventions in captive chimpanzees: A reflection of community concern. PLoS ONE, 7, e32494.

    Article  Google Scholar 

  • Sapolsky, R. (1998). Why zebras don’t get ulcers. New York: Henry Holt & Co.

    Google Scholar 

  • Scott, D., & et al. (1926). Conservatism in inventory valuations. The Accounting Review, 1, 18–30.

    Google Scholar 

  • Shleifer, A., & Wolfenzon, D. (2002). Investor protection and equity markets. Journal of Financial Economics, 66, 3–27.

    Article  Google Scholar 

  • Shleifer, A., LaPorta, R, de Silanes, F.L. (1998). Law and finance. Journal of Political Economy, 106, 1113–1155.

    Article  Google Scholar 

  • Smith, J.M., & Price, G. (1973). The logic of animal conflict. Nature, 246, 15–18.

    Article  Google Scholar 

  • Steiner, J., & Stewart, C. (2016). Perceiving prospects properly. American Economic Review, 106, 1601–1631.

    Article  Google Scholar 

  • Trivers, R. (1971). The evolution of reciprocal altruism. The Quarterly Review of Biology, 46, 35–57.

    Article  Google Scholar 

  • Watts, R. (2003). Conservatism in accounting part i: Explanations and implications. Accounting Horizons, 17, 207–221.

    Article  Google Scholar 

  • Waymire, G. (2014). Neuroscience and ultimate causation in accounting research. The Accounting Review, 89, 2011–2019.

    Article  Google Scholar 

  • Waymire, G., & Basu, S. (2008). Accounting is an evolved economic institution. Foundations and Trends in Accounting, 2, 1–174.

    Article  Google Scholar 

  • Williams, G. (1966). Adaptation and natural selection. Princeton: Princeton University Press.

    Google Scholar 

  • Wilson, E. (2012). The social conquest of earth. New York: Liverlight Press.

    Google Scholar 

Download references

Acknowledgments

We are especially grateful to two anonymous reviewers and Stephen Penman (editor). We also thank Sudipta Basu, S.P. Kothari, John List, Robert Trivers (Rutgers), and seminar participants at Arizona State, George Mason, Maryland, Miami, Michigan State, Minnesota, UBC, UC Irvine, UCLA, USC, UT Dallas, and UVA for their comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Venky Nagar.

Appendix

Appendix

Proof

Proposition 1

Let a s (σ s ) be the stealer’s strategy as a function of his signalσ s ∈{T, W}for T = Tough and W = Weak. Let a p (𝜃) be the producer’s strategy as a function of her type 𝜃 ∈{T, W}. Let b be the vector of beliefs at each information set in the extended game. We seek to find the perfect Bayesian equilibrium\((a_{s}^{*}(\sigma _{s}),a_{p}^{*}(\theta ))\).

To solve, work backwards. Figure 2 presents the extensive form of the game. Observe that the producer has a nontrivial choice only when the stealer chooses to fight. For a producer of type 𝜃= T, she earns yμ p T by fighting and 0 by leaving, regardless of the stealer’s signal. Sincey > μ p T by assumption, ap∗(T) = F. Similarly, a Weak producer makes a choice only when the stealer chooses to fight. This producer earns 0 by leaving and− μ p W by fighting, regardless of the stealer’s signal. Thus ap∗(W) = L. This proves parts 3 and 4.

To solve for the stealer’s strategy, it is necessary to compute the stealer’s beliefs, according to Bayes’s rule. Let b i j denote the stealer’s belief that 𝜃 = i when the stealer’s signal σ s = j. Calculated by Bayes’s rule, this yields the following.

$$b_{TT}\ = \frac{\phi q_{s}}{\phi q_{s} + (1 - \phi)(1 - q_{s})} $$
$$b_{TW}\ = \frac{\phi(1 - q_{s})}{\phi(1-q_{s}) + (1 - \phi)q_{s}} $$
$$b_{WT}\ = \frac{(1 - \phi)(1 - q_{s})}{\phi q_{s} + (1 - \phi) (1 - q_{s})} $$
$$b_{WW}\ = \frac{(1 - \phi)q_{s}}{\phi(1 - q_{s}) + (1 - \phi)q_{s}}. $$

Suppose σ s = W. Given \(a_{p}^{*}(\theta )\), if the stealer fights, he earns: Δ W = b W W yb T W μ s T . He earns nothing if he leaves. Thus \(a_{s}^{*}(W)=F\) if and only if Δ W > 0, and \(a_{s}^{*}(W)=L\) otherwise.

Now suppose σ s = T. Given \(a_{p}^{*}(\theta )\), the stealer earns 0 if he leaves and if he fights he earns, in expectation,\({\Delta }_{T}=b_{WT}y-b_{TT}\mu _{s_{T}}\). Thus \(a_{s}^{*}(T)=F\) if and only if Δ T > 0, and \(a_{s}^{*}(T)=L\) otherwise. This proves parts 1 and 2.

To see uniqueness, first note that the producer’s equilibrium strategy in the actionspace of Fig. 2 is strictly dominant. Given the producer’s strategy, the conditions for Δ W > 0 and Δ T > 0 are necessary and sufficient to determine the stealer’s best response. The equilibrium is thus unique.□

Proof

Proposition 2 Note from Eq. 1 that f(y; e) is linear in e; its second derivative with respect to e is therefore zero. Because the integrand and its e derivatives are piecewise integrably bounded, Leibniz’s rule applies to this integral.

$$ \frac{\partial^{2}}{\partial e^{2}} \left[ {\int}_{\underline{y}}^{\bar{y}} B(y) f(y;e)\,dy - C(e) \right] \,=\, {\int}_{\underline{y}}^{\bar{y}} B(y) \frac{\partial^{2}}{\partial e^{2}}f(y;e)\,dy \,-\, C^{\prime\prime}(e) \,=\, - C^{\prime\prime}(e) \!<\! 0. $$
(7)

The optimization problem of the proposition with respect to e is therefore strictly concave and yields a unique solution for the optimal e. This unique solution is less than \(\bar {e}\) because \(C^{\prime }(\bar {e}) = \infty \). The presence of discontinuous drops in B(y) implies that we cannot assert that the optimal e is always greater than\(\underline {e}\). However, the possibility that the optimal e can equal\(\underline {e}\) has no impact on our analysis. Moreover, there are a wide variety of settings in which the optimal\(e > \underline {e}\). To see this, first note that \(\underline {y}, \bar {y}\) are assumed to be greater than μ p T , whereas y W , y T do not depend on μ p T but on the other free exogenous parameter μ s T . As a result, any of the following three possibilities, among others, are settings where we can show that the optimal \(e > \underline {e}\): 1)\(\underline {y} < \bar {y} < y_{W}\) (the stealer never attacks); 2) \(y_{W} < \underline {y} < \bar {y} < y_{T}\) (the stealer attacks only if he receives the Weak signal); and 3)\(\underline {y} > y_{T}\) (the stealer always attacks). In each case, B(y) is a linear function with positive slope. Calculation shows that\(\left .\frac {\partial }{\partial e}{\int }_{\underline {y}}^{\bar {y}} B(y) f(y;e)\,dy\right |_{e=\underline {e}}>0\), and \(C^{\prime }(\underline {e}) = 0\). So, \(e=\underline {e}\) cannot be the solution in any of these cases. □

Proof

Proposition 3

Suppose the producer sees the stealer and learns her own type (Tough or Weak). The expected payoff to the Tough producer after meeting the stealer, but before the fight, is as follows.

$$ B_{T}(y) = \left\{ \begin{array}{lr} y & : y \leq y_{W} \\ y - (1 - q_{s})\mu_{pT} & : y_{W} < y \leq y_{T} \\ y - \mu_{pT} & : y > y_{T}. \end{array} \right. $$
(8)

The expected payoff to the Weak producer after meeting the stealer but before the fight is as follows.

$$ B_{W}(y) = \left\{ \begin{array}{lr} y & : y \leq y_{W} \\ (1 - q_{s})y & : y_{W} < y \leq y_{T} \\ 0 & : y > y_{T}. \end{array} \right. $$
(9)

Note that because \(q_{s} > \frac {1}{2}\) and y > μ p T ,∀y : B T (y) ≥ B W (y).

Suppose the producer can offer to share a part of the output in the hope that the stealer will leave. The stealer receives the transfer, observes the size of the rest of the output, and then gets his signal about the producer’s type. He then decides whether to continue the stealing game for the rest of the output. We solve for an equilibrium in this game.

Separating equilibrium

First consider separating equilibria. Let (t W , t T ) be the equilibrium transfers offered in a separating equilibrium by the Weak and the Tough producer respectively. Let P(t) be the stealer’s probability assessment that the producer is the Tough type. By consistency of beliefs, P(t W ) = 0 and P(t T ) = 1. Thus, by submitting t W , the Weak producer gets 0 (the stealer will attack for the rest of the output for sure), whereas, by deviating to t T and pooling with the Tough producer, she will be weakly better off than zero. We will show that she earns B W (⋅), which from Eq. 9 is weakly greater than zero). This deviation is profitable, and therefore no separating equilibria exist, i.e., t W = t T .

We next determine the optimal t W = t T and show that it is unique in y. We first specify the off-equilibrium beliefs of the stealer.

Pooling equilibrium’s off-equilibrium beliefs

Given that the equilibrium t W = t T is pooling, we assume that P(t) = ϕ for any feasible t. That is, the transfer itself does not change the priors of the stealer. We will prove later that our equilibrium based on this belief structure satisfies the intuitive criterion.

We consider the Tough producer’s case first. This producer offers t T such that the following holds.

$$ t_{T} = \operatorname{arg\,max}_{0 \leq t \leq y} B_{T}(y - t). $$
(10)

This recursive formulation occurs because, by assumption, an offering of t does not change the stealer’s priors from ϕ. Therefore, for the remaining output yt, for all feasible t, the stealer acts sequentially rationally, and the Tough producer expects to get, by definition of B T (.) above, B T (yt).

If B T (y) were monotonically increasing, t T = 0. However, there are regions where it is not. Given the structure of the exogenous variables, there are two cases to consider: B T (y W ) ≤ B T (y T ) and B T (y W ) > B T (y T ). We solve for each case separately.

Case I:

B T (y W ) ≤ B T (y T )

This condition implies the following.

$$\begin{array}{@{}rcl@{}} y_W & \leq& y_T - (1-q_s) \mu_{pT}\\ \text{ or } \mu_{pT} & \leq& \frac{y_T - y_W}{1 - q_s} = \frac{\phi(2q_s-1)}{(1-\phi)(1-q_s)^2q_s}. \end{array} $$

Figure 4 plots an example B T (y). Note in this figure that \(\mu _{pT} = 4 < \frac {18-8}{1-0.6} = 25\).

Fig. 4
figure 4

The benefit function B T (y) for m = 0.75,ϕ = 0.5,q s = 0.6,μ p T = 4, and μ s T = 12,y ∈ [5,25]. The horizontal lines are the regions where the Tough producer shares to increase her payoff

The smaller local maximum of B T (y) is attained at B T (y W ), and the larger local maximum is attained at B T (y T ). We also note that:

$$B_{T}(y_{W}) = y_{W} > B_{T}(y), y \in (y_{W}, y_{W} + (1- q_{s}) \mu_{pT}). $$

So, for y W < yy W + (1 − q s )μ p T , the Tough producer will make a transfer t T = yy W and get the payoff y W . The Weak producer will mimic that transfer and also earn y W , because the stealer will not attack when remaining output is less than or equal to y W . Further note that, in this case, y W + (1 − q s )μ p T ∈ (y W , y T ], the middle continuous range of B T (y).

We also see from Eq. 8 the following.

$$B_{T}(y_{T}) = y_{T} - (1 - q_{s}) \mu_{pT} > B_{T}(y), y \in (y_{T}, y_{T} + q_{s} \mu_{pT}). $$

So, for y T < yy T + q s μ p T , the Tough producer will transfer t T = yy T and get the payoff B T (y T ). The Weak producer will mimic that transfer and earn (1 − q s )y T . Note that, because B T (y T ) ≥ B T (y W ) by assumption, the Tough producer will not transfer the larger amount yy W .

The complete specification of the equilibrium for Case I is as follows.

  1. 1.

    Set the default t T = t W = 0. Then, apply the following changes in order.

  2. 2.

    If yy W , t T = t W = 0.

  3. 3.

    If y W < yy W + (1 − q s )μ p T and y W is feasible (i.e., \(y_{W} > \underline {y}\)), then t T = t W = yy W . If y W is not feasible, then t T = t W = 0.

  4. 4.

    If y T < yy T + q s μ p T and y T is feasible (i.e., \(y_{T} > \underline {y}\)), then t T = t W = yy T . If y T is not feasible, then t T = t W = 0.

  5. 5.

    The Tough producer earns B T (yt T ), and the Weak producer earns B W (yt W ).

Case II

B T (y W ) > B T (y T )

This condition implies the following.

$$\begin{array}{@{}rcl@{}} y_W & >& y_T - (1-q_s) \mu_{pT}\\ \textit{ or } \mu_{pT} & >& \frac{y_T - y_W}{1 - q_s} = \frac{\phi(2q_s-1)}{(1-\phi)(1-q_s)^2q_s} > 0. \end{array} $$

Figure 5 plots an example B T (y) for the Case II scenario. The only change in the parameters from Fig. 4 is the reduction in the accuracy of the stealer’s signal q s from 0.6 to 0.505. The smaller local maximum of B T (y) is attained at B T (y T ), and the larger local maximum is attained at B T (y W ). If the Tough producer’s current payoff is less than these maxima, the Tough producer will move to the relevant maximum.

Fig. 5
figure 5

The benefit function B T (y) for m = 0.75,ϕ = 0.5,q s = 0.505,μ p T = 4, and μ s T = 12,y ∈ [5,25]. The horizontal line is the region where the Tough producer shares to increase her payoff

The complete specification of the equilibrium for Case II is as follows.

  1. 1.

    Set the default t T = t W = 0. Then apply the following changes in order.

  2. 2.

    If yy W , t T = t W = 0.

  3. 3.

    If y W < yy T and y W is feasible (i.e., \(y_{W} > \underline {y}\)), then t T = t W = yy W . If y W is not feasible, then t T = t W = 0.

  4. 4.

    If y T < yy W + μ p T and y W is feasible (i.e., \(y_{W} > \underline {y}\)), then t T = t W = yy W . (Note that y W + μ p T > y T − (1 − q s )μ p T + μ p T > y T .)

  5. 5.

    If y W is not feasible but y T is, then, as in Case I, if y T < yy T + q s μ p T , then t T = t W = yy T , and if y > y T + q s μ p T , then t T = t W = 0.

  6. 6.

    If y T is not feasible, then t T = t W = 0.

  7. 7.

    The Tough producer earns B T (yt T ), and the Weak producer earns B W (yt W ).

Note that, in Case II, the equilibrium t T = t W = 0 when y > y W + μ p T : the Tough producer gains more at y than at y W .

Finally, we observe several aspects of the equilibrium common to both cases.

  1. 1.

    The equilibrium t T = t W is unique in y in both Case I and Case II.

  2. 2.

    The equilibrium t T = t W is 0 if the range \([\underline {y}, \bar {y}]\) is such that B T (y) is continuous in the entire range.

  3. 3.

    As \(q_{s} \rightarrow 1, y_{W} \equiv \frac {(1-q_{s})\phi }{q_{s}(1-\phi )} \mu _{sT}\rightarrow 0\) monotonically, and \(y_{T} \equiv \frac {q_{s}\phi }{(1-q_{s})(1-\phi )} \mu _{sT} \rightarrow +\infty \) monotonically. The limiting values of y W , y T also imply that, for any given admissible values of \(\underline {y}, \bar {y}\), there exists a threshold \(\bar {q_{s}}, \frac {1}{2} < \bar {q_{s}} < 1\), above which \(y_{W} < \underline {y} < \bar {y} < y_{T}\), thus resulting in the equilibrium t T = t W = 0.

  4. 4.

    In both Case I and Case II, the regions where t T = t W > 0 are controlled by the size of μ p T . As μ p T shrinks, the chances of non-zero t T = t W shrinks. (See the horizontal regions and their boundaries in Figs. 4 and 5.)

  5. 5.

    With probability 1, a random choice of exogenous parameters will admit a range of y where t T = t W = 0. To see this, the probability that \(\underline {y} = y_{W}\) is 0. If \(\underline {y} < y_{W}\), then there exists an 𝜖 > 0 such that the optimal t T for y ∈ (y W 𝜖, y W ) is 0. A similar \((\underline {y}, \underline {y} + \epsilon )\) range can be found if \(\underline {y} > y_{W}\).

Intuitive criterion

We argue that our equilibrium satisfies the intuitive criterion. Recall that a (sequential) equilibrium fails to satisfy the intuitive criterion if, for some non-equilibrium transfer t, the following condition is met: for all possible beliefs of the stealer upon receiving the non-equilibrium t, the Weak (Tough) producer is worse off than in equilibrium, and therefore the stealer infers upon receiving t that the producer is Tough (Weak). This inference is reinforcing in that, because of this inference, the Tough (Weak) producer is better off than in equilibrium, and so the Tough (Weak) producer will deviate to the non-equilibrium t (Kreps 1990, p.436, p.818).

In our model, consider a t that makes the Tough producer worse off (compared to the equilibrium), even when the stealer does not attack. The Tough producer will not issue this t because it is strictly equilibrium dominated. A Weak producer will not issue this t either, for the stealer will put probability one that she is Weak and attack for sure. This gives her 0, and we have shown that the she is weakly better off than 0 in equilibrium.

On the other hand, suppose there is an off-equilibrium t that makes the Weak producer worse off (compared to equilibrium), even in the best-case possibility that the stealer receiving this t does not attack. That is, yt is less than what she earns in equilibrium. This implies that the stealer, upon receiving t, infers that the producer is definitely Tough. We have shown using Eqs. 8 and 9 that ∀y : B T (y) ≥ B W (y), so the Tough producer earns weakly more than the Weak producer in the pooling equilibrium. Therefore the best the Tough producer can do by deviating to t is yt (that is, when the stealer does not attack), which is less than what the Weak producer earns in equilibrium, which is less than what the Tough producer earns in equilibrium. So the Tough producer will not deviate to the off-equilibrium t.

A final point is to show that our equilibrium is sequential. Consider the sequence 0 < {𝜖 n } < 1, where both the Tough and Weak producers issue the equilibrium t with probability 1 − 𝜖 n , and issue all other t ∈ [0,y] −{t} using a uniform distribution of total probability measure 𝜖 n . This is a strictly mixed sequence of actions with strictly positive Bayes-consistent beliefs, i.e., the stealer’s posterior about the Tough type after receiving any t is still ϕ, which is strictly positive because 0 < ϕ < 1. This sequence’s limit 𝜖 n → 0 yields our equilibrium actions and beliefs, and this equilibrium, by construction, is sequentially rational. Our equilibrium satisfies the intuitive criterion.

Proof

Proposition 4 Suppose the producer is Tough, which occurs with probabilityϕ.In this state of the world, work backward from the last node in the gametree, which is the producer’s action. If the stealer fights, the producer earnsyμ p T > 0 by fighting and nothing by leaving, so the producer prefers to fight. The stealer earns− μ s T . The stealer therefore prefers to leave. Thus the producer earns all the surplus y and the stealer earns nothing.

Suppose the producer is Weak. If the stealer fights, a Weak producer will lose against the stealer and earn− μ p W by fighting and 0 by leaving. Therefore the producer will leave. Knowing this, the stealer will fight, earning the full surplus y, while the producer gets nothing. This establishes the Nash equilibrium of the extensive form game. The same logic shows it is unique and sub-game perfect.□

Proof

Proposition 5 Consider the certification game.In this game, immediately after Nature reveals 𝜃 and before any other event in Fig. 2, a third party can reveal 𝜃 to the stealer for a certification fee of k < μ p T , which the producer pays.

The stealer will not attack a known Tough producer (the stealer will lose) but will attack a known Weak producer (the producer will leave). Suppose,in addition, the stealer’s belief is that a noncertifying producer is Weak with probability 1. With this belief, the stealer will always attack a noncertifying producer. Consequently, upon not certifying, the Tough producer earns yμ p T , which is less than yk, the payoff from certifying. So the Tough producer will always certify. The Weak producerearns 0 from not certifying (the stealer will attack based on his prior beliefs), and −k upon certifying (the producer pays k and then gets attacked upon being certified as Weak). The Weak producer will therefore never certify. The stealer’s beliefs are thus consistent with the producers’ actions, and everyone’s actionis the best response given the beliefs. There are no fights in this equilibrium.□

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nagar, V., Rajan, M.V. & Ray, K. An information-based model for the differential treatment of gains and losses. Rev Account Stud 23, 622–653 (2018). https://doi.org/10.1007/s11142-018-9443-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11142-018-9443-5

Keywords

JEL Classification

Navigation