Advanced Search
MyIDEAS: Login

Coordination Failure in Repeated Games with Almost-Public Monitoring

Contents:

Author Info

  • George J. Mailath
  • Stephen Morris

Abstract

Some private-monitoring games, that is, games with no public histories, can have histories that are almost public. These games are the natural result of perturbing public monitoring games towards private monitoring. We explore the extent to which it is possible to coordinate continuation play in such games. It is always possible to coordinate continuation play by requiring behavior to have bounded recall (i.e., there is a bound L such that in any period, the last L signals are sufficient to determine behavior). We show that, in games with general almost-public private monitoring, this is essentially the only behavior that can coordinate continuation play.

(This abstract was borrowed from another version of this item.)

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://www.ssc.upenn.edu/%7Egmailath/wpapers/coord-failure.pdf
Our checks indicate that this address may not be valid because: 404 Not Found. If this is indeed the case, please notify (David K. Levine)
Download Restriction: no

Bibliographic Info

Paper provided by UCLA Department of Economics in its series Levine's Bibliography with number 122247000000000340.

as in new window
Length:
Date of creation: 05 Apr 2005
Date of revision:
Handle: RePEc:cla:levrem:122247000000000340

Contact details of provider:
Web page: http://www.dklevine.com/

Related research

Keywords:

Other versions of this item:

Find related papers by JEL classification:

This paper has been announced in the following NEP Reports:

References

References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
as in new window
  1. Bhaskar, V. & Damme, E.E.C. van, 2002. "Moral hazard and private monitoring," Open Access publications from Tilburg University urn:nbn:nl:ui:12-88790, Tilburg University.
  2. V. Bhaskar & George J. Mailath & Stephen Morris, 2004. "Purification in the Infinitely-Repeated Prisoners’ Dilemma," PIER Working Paper Archive 04-004, Penn Institute for Economic Research, Department of Economics, University of Pennsylvania.
  3. RICHARD McLEAN & ANDREW POSTLEWAITE, 2004. "Informational Size and Efficient Auctions," Review of Economic Studies, Wiley Blackwell, vol. 71, pages 809-827, 07.
  4. Fudenberg, Drew & Levine, David, 2007. "The Nash-Threats Folk Theorem with Communication and Approximate Common Knowledge in Two Player Games," Scholarly Articles 3203772, Harvard University Department of Economics.
  5. V. Bhaskar & Ichiro Obara, . "Belief-Based Equilibria in the Repeated Prisoners' Dilemma with Private Monitoring," Penn CARESS Working Papers d93eb6f40c65728f9e1a7b114, Penn Economics Department.
  6. Sekiguchi, Tadashi, 1997. "Efficiency in Repeated Prisoner's Dilemma with Private Monitoring," Journal of Economic Theory, Elsevier, vol. 76(2), pages 345-361, October.
  7. Hitoshi Matsushima, 2003. "Repeated Games with Private Monitoring: Two Players," CIRJE F-Series CIRJE-F-242, CIRJE, Faculty of Economics, University of Tokyo.
  8. Harold L. Cole & Narayana R. Kocherlakota, 2000. "Finite memory and imperfect monitoring," Working Papers 604, Federal Reserve Bank of Minneapolis.
  9. Piccione, Michele, 2002. "The Repeated Prisoner's Dilemma with Imperfect Private Monitoring," Journal of Economic Theory, Elsevier, vol. 102(1), pages 70-83, January.
  10. Drew Fudenberg & David K. Levine & Eric Maskin, 1994. "The Folk Theorem with Imperfect Public Information," Levine's Working Paper Archive 394, David K. Levine.
  11. Bhaskar, V, 1998. "Informational Constraints and the Overlapping Generations Model: Folk and Anti-Folk Theorems," Review of Economic Studies, Wiley Blackwell, vol. 65(1), pages 135-49, January.
  12. George Mailath & Stephen Morris, . ""Repeated Games with Almost-Public Monitoring''," CARESS Working Papres 99-09, University of Pennsylvania Center for Analytic Research and Economics in the Social Sciences.
  13. Jeffrey C. Ely & Johannes Horner & Wojciech Olszewski, 2003. "Belief-free Equilibria in Repeated Games," Levine's Working Paper Archive 666156000000000367, David K. Levine.
  14. Michihiro Kandori & Hitoshi Matsushima, 1997. "Private observation and Communication and Collusion," Levine's Working Paper Archive 1256, David K. Levine.
  15. Rich McLean & Ichiro Obara & Andrew Postlewaite, 2005. "Informational Smallness and Private Monitoring in Repeated Games," Levine's Bibliography 784828000000000261, UCLA Department of Economics.
  16. Monderer, Dov & Samet, Dov, 1989. "Approximating common knowledge with common beliefs," Games and Economic Behavior, Elsevier, vol. 1(2), pages 170-190, June.
  17. Jeffrey Ely, 2000. "A Robust Folk Theorem for the Prisoners' Dilemma," Econometric Society World Congress 2000 Contributed Papers 0210, Econometric Society.
  18. Johannes Hörner & Wojciech Olszewski, 2006. "The Folk Theorem for Games with Private Almost-Perfect Monitoring," Econometrica, Econometric Society, vol. 74(6), pages 1499-1544, November.
  19. Michihiro Kandori & Hitoshi Matsushima, 1998. "Private Observation, Communication and Collusion," Econometrica, Econometric Society, vol. 66(3), pages 627-652, May.
  20. Olivier Compte, 1998. "Communication in Repeated Games with Imperfect Private Monitoring," Econometrica, Econometric Society, vol. 66(3), pages 597-626, May.
  21. Mailath, George J. & Samuelson, Larry, 2006. "Repeated Games and Reputations: Long-Run Relationships," OUP Catalogue, Oxford University Press, number 9780195300796.
Full references (including those not matched with items on IDEAS)

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as in new window

Cited by:
This item has more than 25 citations. To prevent cluttering this page, these citations are listed on a separate page.

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:cla:levrem:122247000000000340. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (David K. Levine).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.