Private Monitoring, Collusion and the Timing of Information
AbstractWhen the information used by a principal to monitor an agent is private, and thus non-verifiable by a third party, the principal has a credibility issue with the agent. The agent should be concerned that the principal could misrepresent the information in order to collect a monetary penalty from him. Restoring credibility may lead to an extreme waste of resources—the so-called burning of money, where the monetary penalty is given away to a third party. We show that a more realistic and efficient outcome is feasible by exploiting the timing of private information. If the private information arrives before the agent has completed his effort, non-monetary tools like rescaling the project become optimal, and no money needs to be burned. We show that rescaling is more effective than pure monetary penalties because effort has different values to different parties, while money is equally valuable to all parties. An alternative way to solve the principal’s credibility problem is to certify the private signal and make it public. When collusion between the certifier and the agent is an issue, we uncover interesting similarities between private signals and public (certified) signals vulnerable to collusive manipulation. We show that certification of private information by a third party may not always be in the interest of the principal if this certification raises the specter of collusion.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoPaper provided by CESifo Group Munich in its series CESifo Working Paper Series with number 4497.
Date of creation: 2013
Date of revision:
monitoring; unverifiable signal; certification; private communication; timing of information; collusion; non-monetary penalties; burning money;
Find related papers by JEL classification:
- D73 - Microeconomics - - Analysis of Collective Decision-Making - - - Bureaucracy; Administrative Processes in Public Organizations; Corruption
- D82 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Asymmetric and Private Information; Mechanism Design
- D86 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Economics of Contract Law
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Celik, Gorkem, 2009.
"Mechanism design with collusive supervision,"
Journal of Economic Theory,
Elsevier, vol. 144(1), pages 69-95, January.
- William Fuchs, 2005.
"Contracting with Repeated Moral Hazard and Private Evaluations,"
Game Theory and Information
- William Fuchs, 2007. "Contracting with Repeated Moral Hazard and Private Evaluations," American Economic Review, American Economic Association, vol. 97(4), pages 1432-1448, September.
- William Fuchs, 2005. "Contracting with Repeated Moral Hazard and Private Evaluations," 2005 Meeting Papers 431, Society for Economic Dynamics.
- William Fuchs, 2005. "Contracting with Repeated Moral Hazard and Private Evaluations," Discussion Papers 04-012, Stanford Institute for Economic Policy Research.
- Roland Strausz, 2006.
"Interim Information in Long-Term Contracts,"
Journal of Economics & Management Strategy,
Wiley Blackwell, vol. 15(4), pages 1041-1067, December.
- Strausz, Roland, 2005. "Interim Information in Long Term Contracts," Discussion Paper Series of SFB/TR 15 Governance and the Efficiency of Economic Systems 40, Free University of Berlin, Humboldt University of Berlin, University of Bonn, University of Mannheim, University of Munich.
- Michihiro Kandori & Hitoshi Matsushima, 1998. "Private Observation, Communication and Collusion," Econometrica, Econometric Society, vol. 66(3), pages 627-652, May.
- Kandori, Michihiro, 2002.
"Introduction to Repeated Games with Private Monitoring,"
Journal of Economic Theory,
Elsevier, vol. 102(1), pages 1-15, January.
- Michihiro Kandori, 2001. "Introduction to Repeated Games with Private Monitoring," CIRJE F-Series CIRJE-F-114, CIRJE, Faculty of Economics, University of Tokyo.
- Antoine Faure-Grimaud & Jean-Jacques Laffont & David Martimort, 2003.
"Collusion, Delegation and Supervision with Soft Information,"
Review of Economic Studies,
Wiley Blackwell, vol. 70(2), pages 253-279, 04.
- Antoine Faure-Grimaud & Jean-Jacques Laffont & David Martimort, 2003. "Collusion, Delegation and Supervision with Soft Information," Review of Economic Studies, Oxford University Press, vol. 70(2), pages 253-279.
- Faure-Grimaud, Antoine & Laffont, Jean-Jacques & Martimort, David, 2003. "Collusion, Delegation and Supervision with Soft Information," IDEI Working Papers 167, Institut d'Économie Industrielle (IDEI), Toulouse.
- Bentley MacLeod, 2001.
"Optimal Contracting with Subjective Evaluation,"
Theory workshop papers
357966000000000036, UCLA Department of Economics.
- Tirole, Jean, 1986. "Hierarchies and Bureaucracies: On the Role of Collusion in Organizations," Journal of Law, Economics and Organization, Oxford University Press, vol. 2(2), pages 181-214, Fall.
- Faure-Grimaud, Antoine & Martimort, David, 2003. " Regulatory Inertia," RAND Journal of Economics, The RAND Corporation, vol. 34(3), pages 413-37, Autumn.
- Fahad Khalil & Jacques Lawarrée & Sungho Yun, 2010. "Bribery versus extortion: allowing the lesser of two evils," RAND Journal of Economics, RAND Corporation, vol. 41(1), pages 179-198.
- David Rahman, 2012. "But Who Will Monitor the Monitor?," American Economic Review, American Economic Association, vol. 102(6), pages 2767-97, October.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Julio Saavedra).
If references are entirely missing, you can add them using this form.