Advanced Search
MyIDEAS: Login to save this paper or follow this series

Coordination Failure in Repeated Games with Almost-Public Monitoring

Contents:

Author Info

  • George J Mailath
  • Stephen Morris

Abstract

Some private-monitoring games, that is, games with no public histories, can have histories that are almost public. These games are the natural result of perturbing public-monitoring games towards private monitoring. We explore the extent to which it is possible to coordinate continuation play in such games. It is always possible to coordinate continuation play by requiring behavior to have bounded recall (i.e., there is a bound L such that in any period, the last L signals are sufficient to determine behavior). We show that, in games with general almost-public private monitoring, this is essentially the only behavior that can coordinate continuation play.

(This abstract was borrowed from another version of this item.)

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://www.princeton.edu/%7Esmorris/pdfs/coordinationfailure.pdf
Our checks indicate that this address may not be valid because: 404 Not Found. If this is indeed the case, please notify (David K. Levine)
Download Restriction: no

Bibliographic Info

Paper provided by UCLA Department of Economics in its series Levine's Bibliography with number 122247000000001105.

as in new window
Length:
Date of creation: 08 Feb 2006
Date of revision:
Handle: RePEc:cla:levrem:122247000000001105

Contact details of provider:
Web page: http://www.dklevine.com/

Related research

Keywords:

Other versions of this item:

Find related papers by JEL classification:

This paper has been announced in the following NEP Reports:

References

References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
as in new window
  1. Olivier Compte, 1998. "Communication in Repeated Games with Imperfect Private Monitoring," Econometrica, Econometric Society, vol. 66(3), pages 597-626, May.
  2. Mailath, George J. & Morris, Stephen, 2002. "Repeated Games with Almost-Public Monitoring," Journal of Economic Theory, Elsevier, vol. 102(1), pages 189-228, January.
  3. Bhaskar, V. & van Damme, Eric, 2002. "Moral Hazard and Private Monitoring," Journal of Economic Theory, Elsevier, vol. 102(1), pages 16-39, January.
  4. Jeffrey C. Ely & Johannes Horner & Wojciech Olszewski, 2003. "Belief-free Equilibria in Repeated Games," Levine's Working Paper Archive 666156000000000367, David K. Levine.
  5. Fudenberg, Drew & Levine, David, 2007. "The Nash-Threats Folk Theorem with Communication and Approximate Common Knowledge in Two Player Games," Scholarly Articles 3203772, Harvard University Department of Economics.
  6. Richard McLean & Ichiro Obara & Andrew Postlewaite, 2001. "Informational Smallness and Private Monitoring in Repeated Games," PIER Working Paper Archive 05-024, Penn Institute for Economic Research, Department of Economics, University of Pennsylvania, revised 20 Jul 2005.
  7. Mailath, George J. & Samuelson, Larry, 2006. "Repeated Games and Reputations: Long-Run Relationships," OUP Catalogue, Oxford University Press, number 9780195300796, September.
  8. Johannes Hörner & Wojciech Olszewski, 2006. "The Folk Theorem for Games with Private Almost-Perfect Monitoring," Econometrica, Econometric Society, vol. 74(6), pages 1499-1544, November.
  9. Harold L. Cole & Narayana R. Kocherlakota, 2000. "Finite memory and imperfect monitoring," Working Papers 604, Federal Reserve Bank of Minneapolis.
  10. Ely, Jeffrey C. & Valimaki, Juuso, 2002. "A Robust Folk Theorem for the Prisoner's Dilemma," Journal of Economic Theory, Elsevier, vol. 102(1), pages 84-105, January.
  11. Michihiro Kandori & Hitoshi Matsushima, 1998. "Private Observation, Communication and Collusion," Econometrica, Econometric Society, vol. 66(3), pages 627-652, May.
  12. V. Bhaskar & G. J. Mailath & S. Morris, 2004. "Purification in the Infinitely-Repeated Prisoners' Dilemma," Economics Discussion Papers 576, University of Essex, Department of Economics.
  13. Piccione, Michele, 2002. "The Repeated Prisoner's Dilemma with Imperfect Private Monitoring," Journal of Economic Theory, Elsevier, vol. 102(1), pages 70-83, January.
  14. Drew Fudenberg & David K. Levine & Eric Maskin, 1994. "The Folk Theorem with Imperfect Public Information," Levine's Working Paper Archive 394, David K. Levine.
  15. Bhaskar, V., 1994. "Informational Constraints and the Overlapping Generations Model : Folk and Anti-Folk Theorems," Discussion Paper 1994-85, Tilburg University, Center for Economic Research.
  16. V. Bhaskar & Ichiro Obara, 2000. "Belief-Based Equilibria in the Repeated Prisoners' Dilemma with Private Monitoring," Econometric Society World Congress 2000 Contributed Papers 1330, Econometric Society.
  17. Richard McLean & Andrew Postlewaite, 2004. "Informational Size and Efficient Auctions," Review of Economic Studies, Oxford University Press, vol. 71(3), pages 809-827.
  18. Michihiro Kandori & Hitoshi Matsushima, 1997. "Private observation and Communication and Collusion," Levine's Working Paper Archive 1256, David K. Levine.
  19. Monderer, Dov & Samet, Dov, 1989. "Approximating common knowledge with common beliefs," Games and Economic Behavior, Elsevier, vol. 1(2), pages 170-190, June.
  20. Hitoshi Matsushima, 2003. "Repeated Games with Private Monitoring: Two Players," CIRJE F-Series CIRJE-F-242, CIRJE, Faculty of Economics, University of Tokyo.
  21. Sekiguchi, Tadashi, 1997. "Efficiency in Repeated Prisoner's Dilemma with Private Monitoring," Journal of Economic Theory, Elsevier, vol. 76(2), pages 345-361, October.
Full references (including those not matched with items on IDEAS)

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as in new window

Cited by:
This item has more than 25 citations. To prevent cluttering this page, these citations are listed on a separate page.

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:cla:levrem:122247000000001105. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (David K. Levine).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.