Skip to main content
Log in

Codes of conduct, private information and repeated games

  • Original Paper
  • Published:
International Journal of Game Theory Aims and scope Submit manuscript

Abstract

We examine self-referential games in which there is a chance of understanding an opponent’s intentions. Even when this source of information is weak, we are able to prove a folk-like theorem for repeated self-referential games with private monitoring. Our main focus is on the interaction of two sources of information about opponents’ play: direct observation of the opponent’s intentions, and indirect observation of the opponent’s play in a repeated setting.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. See, for example, Lehrer (1990), Compte (1998), Kandori and Matsushima (1998), Matsushima (2004), Ely et al. (2005), Hörner and Olszewski (2006), Fudenberg and Levine (2007), and Sugaya (2011).

  2. It is difficult to rationalize, for example, why a player who is aware that opponent has very favorable signals about his behavior, does not take advantage of this knowledge to behave badly. It is exactly this type of small gain that approximate equilibrium constructions are based on (see Fudenberg and Levine (1991), and Renou and Tomala (2013)).

  3. We allow mixed strategies, but there are only a finite number of them. In repeated games, we assume implicitly either a finite horizon, or a very small subset of strategies in an infinite horizon. For instance, finite automata with an upper bound on the number of states.

  4. We assume a common space of codes of conduct, but we can allow for heterogeneous strategy spaces. In that case several strategies might induce the same map while deferring in terms of the probability distribution of signals.

  5. Private signals could represent verbal and nonverbal communication between the agents, for example, simple cues as handshake, winks and smiles, or voluntary promises (Charness and Dufwenberg 2006).

  6. That is, private signals are conditionally independent thereby implying that the opponent j’s private signal has no information about whether player i observes \(y_{i}\) when players choose codes of conduct.

  7. Notice that any code of conduct \(r^{i}\) that specifies \(r_{i}^{i}(y_{i})=D\) for any signal \(y_{i}\), and picks any map for his opponent \(r_{j}^{i}(y_{j})=s_{j}\) for all \(y_{j},s_{j}\) would be a Nash equilibrium of G.

  8. While studying more precise signals, they continue to be noisy.

  9. Specifically, \(u_{i}(s)=(1/T)\sum _{t=1}^{T}g_{i}(a)\) where \(g_{i}\) is player i’s stage payoff and a is the stage action profile.

  10. We may include the players own action in his signal if we wish.

  11. Fudenberg and Levine (1991) show only that \(V^{*}\) contains approximate equilibria leaving open the question of when the larger socially feasible individually rational set might have this property. They construct approximate equilibria using mutual punishment, hence there is no effort to punish the player who deviates. This is necessary because they do not impose informational restrictions, of the type imposed in Fudenberg et al. (1994), sufficient to guarantee that it is possible to determine who deviated. With those restrictions it is likely that their methods would yield a stronger result. As this is a limitation of the original result, we do not pursue the issue here.

  12. Fudenberg and Levine (1991) prove the stronger result that \(\sigma _{n}\) is an \(\varepsilon _{n}\)-sequential equilibrium which means also that losses from time t deviations measured in time t average present value, and not merely time t average present value, are no bigger than \(\varepsilon _{n}\). As we do not need it, we omit the extra definitions required to state the stronger result.

  13. To highlight the role of the timing a single signal is assumed to be observed at a predetermined period, however, the interpretation is that players aggregate information during the game and then they make use of this information. It also accommodates the relevant case where players receive signals over time in a repeated game.

References

  • Bachi B, Ghosh S, Neeman Z (2014) Communication and deception in 2-player games. Working paper

  • Block JI (2013) Timing and codes of conduct. Working paper

  • Charness G, Dufwenberg M (2006) Promises and partnership. Econometrica 74(6):1579–1601

    Article  Google Scholar 

  • Compte O (1998) Communication in repeated games with imperfect private monitoring. Econometrica 66(3):597–626

    Article  Google Scholar 

  • Ely JC, Hörner J, Olszewski W (2005) Belief-free equilibria in repeated games. Econometrica 73(2):377–415

    Article  Google Scholar 

  • Frank RH (1988) Passions within reason: the strategic role of the emotions. Norton, New York

  • Fudenberg D, Levine DK (1991) An approximate folk theorem with imperfect private information. J Econ Theory 54(1):26–47

    Article  Google Scholar 

  • Fudenberg D, Levine DK (2007) The nash-threats folk theorem with communication and approximate common knowledge in two player games. J Econ Theory 132(1):461–473

    Article  Google Scholar 

  • Fudenberg D, Levine DK, Maskin E (1994) The folk theorem with imperfect public information. Econometrica 62(5):997–1039

    Article  Google Scholar 

  • Gauthier DP (1986) Morals by agreement. Oxford University Press, New York

    Google Scholar 

  • Hirshleifer J (1987) On the emotions as guarantors of threats and promises. MIT Press, Cambridge

    Google Scholar 

  • Hörner J, Olszewski W (2006) The folk theorem for games with private almost-perfect monitoring. Econometrica 74(6):1499–1544

    Article  Google Scholar 

  • Kalai AT, Kalai E, Lehrer E, Samet D (2010) A commitment folk theorem. Games Econ Behav 69(1):127–137

    Article  Google Scholar 

  • Kandori M, Matsushima H (1998) Private observation, communication and collusion. Econometrica 66(3):627–652

    Article  Google Scholar 

  • Lehrer E (1990) Nash equilibria of n-player repeated games with semi-standard information. Int J Game Theory 19(2):191–217

    Article  Google Scholar 

  • Levine DK, Pesendorfer W (2007) The evolution of cooperation through imitation. Games Econ Behav 58(2):293–315

    Article  Google Scholar 

  • Matsushima H (2004) Repeated games with private monitoring: two players. Econometrica 72(3):823–852

    Article  Google Scholar 

  • Peters M (2015) Reciprocal contracting. J Econ Theory 158, Part A (0):102–126

  • Peters M, Szentes B (2012) Definable and contractible contracts. Econometrica 80(1):363–411

    Article  Google Scholar 

  • Renou L, Tomala T (2013) Approximate implementation in markovian environments. HEC Paris Research Paper No. ECO/SCD-2013-1015

  • Sally D (1995) Conversation and cooperation in social dilemmas a meta-analysis of experiments from 1958 to 1992. Ration Soc 7(1):58–92

    Article  Google Scholar 

  • Schelling TC (1978) Altruism, meanness, and other potentially strategic behaviors. Am Econ Rev 68(2):229–230

    Google Scholar 

  • Sugaya T (2011) Folk theorem in repeated games with private monitoring. Economic Theory Center Working Paper (011-2011)

  • Szentes B (2015) Contractible contracts in common agency problems. Rev Econ Stud 82(1):391–422

    Article  Google Scholar 

  • Tennenholtz M (2004) Program equilibrium. Games Econ Behav 49(2):363–373

    Article  Google Scholar 

  • Zuckerman M, DePaulo BM, Rosenthal R (1981) Verbal and nonverbal communication of deception. Adv Exp Soc Psychol 14:1–59

    Article  Google Scholar 

Download references

Acknowledgments

We would like to thank Drew Fudenberg, Phillip Johnson, George Mailath, Wolfgang Pesendorfer, Balazs Szentes, and Satoru Takahashi for helpful comments. Juan Block acknowledges support from the Cambridge-INET Institute, and David Levine thanks the National Science Foundation (Grant SES-0851315) and the European University Institute for financial support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan I. Block.

Appendix

Appendix

We assume that in the base game all players have access to N individual randomizing devices \({\varTheta }=\{\theta ^{1},\ldots ,\theta ^{N}\}\) each of which has an independent probability \(\varepsilon _{R}\) of an outcome we call punishment, \(\theta _{p}\). Suppose that \(s^{0}\) is an \(\varepsilon _{0}\)-Nash equilibrium giving utility \(u_{i}(s^{0})\) for each i. For any \(s\in S\) and strategies \(s_{j}^{i}\) for any pair of players \(i\ne j\) suppose that \(s^{i}=(s_{j}^{i},s_{-j})\) are \(\varepsilon _{1}\)-Nash equilibria. Define \(P_{i}=u_{i}(s^{0})-u_{i}(s^{i})\). We assume that \(P_{i}\ge \underline{P}\ge 0\) and for some \(\varepsilon _{p}\ge 0\) that \(|u_{j}(s^{i})-u_{j}(s^{0})|\le \varepsilon _{p}\). Let \(\underline{u}=\min _{i,s}u_{i}(s)\) and \(\bar{u}=\max _{i,s}u_{i}(s)\) be the lowest and highest payoffs, respectively. Define \(\varepsilon =\varepsilon _{0}+(N+\bar{u}-\underline{u})(\varepsilon _{1}+\varepsilon _{p})E\), and \(K=\max \{(N+\bar{u}-\underline{u})3N^{4}(1+\bar{u}-\underline{u}),(N^{4}(\bar{u}-\underline{u})+1)(\bar{u}-\underline{u})\}\).

Theorem 3

If \((D(\underline{P}-\varepsilon _{1}))^{2}>4K\varepsilon \), then there is an \(\varepsilon _{R}\) and strict Nash equilibrium codes of conduct \(\hat{r}\in R\) such that for all players i, \(\left| u_{i}(s^{0})-U_{i}(\hat{r})\right| \le \varepsilon +D(\underline{P}-\varepsilon _{1})-\sqrt{(D(\underline{P}-\varepsilon _{1}))^{2}-4K\varepsilon }\).

Proof

There are \(\left| {\varTheta }\right| ^{\left| I\right| }=N^{2}\) independent randomization devices in operations. From \(P_{\theta }(\theta _{p}=0)=(1-\varepsilon _{R})^{N^{2}}\) and \(P_{\theta }(\theta _{p}=1)=N^{2}\varepsilon _{R}(1-\varepsilon _{R})^{N^{2}-1}\) we find \(P_{\theta }(\theta _{p}\ge 2)\le N^{4}\varepsilon _{R}^{2}\).

Take \(\hat{r}^{i}\) such that: for all players i, if \(\bar{y}_{i}\in \bar{Y}_{i}\) and \(\theta _{p}\ge 1\) play \(\hat{r}_{i}^{i}(y_{i})=s_{i}^{j}\) and \(\hat{r}_{j}^{i}(y_{j})=s_{j}^{0}\) for any \(y_{j}\in Y_{j}\) and all players \(j\ne i\), otherwise play \(\hat{r}_{i}^{i}(y_{i})=s_{i}^{0}\) for all \(y_{i}\notin \bar{Y}_{i}\) and for all \(j\ne i\) choose \(\hat{r}_{j}^{i}(y_{j})=s_{j}^{0}\) for any \(y_{j}\notin \bar{Y}_{j}\). The following mutually exclusive events can occur to player i when all players \(j\ne i\) choose \(\hat{r}^{j}\), but he chooses \(\tilde{r}^{i}\) defined below and \(\tilde{r}_{j}^{i}=\hat{r}_{j}^{i}\) for all \(j\ne i\): (1) Nobody is punished: if player i chooses \(\hat{r}^{i}\) he gets \(u_{i}(s^{0})\), while if i chooses \(\tilde{r}^{i}_i\ne s_{i}^{0}\) he gets at most \(u_{i}(s^{0})+\varepsilon _{0}\), (2) Player j is the only player punished: by following \(\hat{r}^{i}\) i gets \(u_{i}(s^{j})\), if i chooses \(\tilde{r}_{i}^{i}(\bar{y}_{i})\ne s_{i}^{j}\), he gets at most \(u_{i}(s^{j})+\varepsilon _{1}\), and (3) Two or more players are punished: if \(\hat{r}^{i}\) is followed player i he gets at worst \(\underline{u}\), if i deviates while choosing \(\tilde{r}^{i}(y_{i})=\tilde{s}_{i}\) with \(\tilde{s}_{i}\in S_{i}\) and \(\tilde{s}_{i}\ne s_{i}^{j}\ne s_{j}^{0}\) he gets at most \(\bar{u}\).

We can bound expected payoffs \(U_i(\hat{r})\le \overline{U}_i(\hat{r})=u_{i}(s^{0})+(1-(1-E)^{N})\left[ \varepsilon _{p}+N^{4}\varepsilon _{R}^{2}(\bar{u}-\underline{u})\right] \) and \(U_i(\hat{r})\ge \underline{U}_i(\hat{r})=u_{i}(s^{0})-(1-(1-E)^{N})\big [\varepsilon _{p}+N^{4}\varepsilon _{R}^{2}(\bar{u}-\underline{u})\big ]-\pi _{j}(\bar{y}_{j}|\hat{r})\varepsilon _{R}P_{i}\). Suppose player i chooses the alternative code of conduct \(\tilde{r}^{i}\), he gets \(U_i(\tilde{r}^i,\hat{r}^{-i})\le \overline{U}_i(\tilde{r}^i,\hat{r}^{-i})\) where

$$\begin{aligned} \overline{U}_i(\tilde{r}^i,\hat{r}^{-i})= & {} u_{i}(s^{0})+\varepsilon _{0}+(1-(1-E)^{N})\left[ \varepsilon _{1}+N^{4}\varepsilon _{R}^{2}(\bar{u}-\underline{u})\right] \\&-\left[ (\pi _{j} (\bar{y}_{j}|\hat{r})+D)\varepsilon _{R}-N^{4}\varepsilon _{R}^{2}\right] (P_{i}+\varepsilon _{1}). \end{aligned}$$

Consequently, the gain to choosing \(\tilde{r}^i\) is \(U_i(\tilde{r}^i,\hat{r}^{-i})-U_i(\hat{r})\) and bounded by

$$\begin{aligned}&\varepsilon _{0} +(1-(1-E)^{N})\left[ \varepsilon _{1}+\varepsilon _{p}+2N^{4}\varepsilon _{R}^{2}(\bar{u}-\underline{u})\right] +\pi _{j}(\bar{y}_{j}|\hat{r})\varepsilon _{R}P_{i}\\&\qquad -\left[ (\pi _{j}(\bar{y}_{j}|\hat{r})+D)\varepsilon _{R}-N^{4}\varepsilon _{R}^{2}\right] (P_{i}-\varepsilon _{1})\\&\quad \le \varepsilon _{0}+(N+\bar{u}-\underline{u})E\left[ \varepsilon _{1}+\varepsilon _{p}+3N^{4}\varepsilon _{R}^{2}(1+\bar{u}-\underline{u})\right] \\&\qquad -D\varepsilon _{R}(\underline{P}-\varepsilon _{1}) \le \varepsilon +K\varepsilon _{R}^{2}-D\varepsilon _{R}(\underline{P}-\varepsilon _{1}). \end{aligned}$$

Hence if \(D\varepsilon _{R}(\underline{P}-\varepsilon _{1})>\varepsilon +K\varepsilon _{R}^{2}\) then there is a strict Nash equilibrium with

$$\begin{aligned} \left| u_{i}(s^{0})-U_{i}(\hat{r})\right| \le NE\varepsilon _{p}+(N^{4}(\bar{u}-\underline{u})+1)(\bar{u}-\underline{u})\varepsilon _{R}\le \varepsilon +2K\varepsilon _{R}. \end{aligned}$$

We conclude by solving the inequality for \(\varepsilon _{R}=[D(\underline{P}-\varepsilon _{1})\pm \sqrt{(D(\underline{P}-\varepsilon _{1}))^{2}-4K\varepsilon }]/2K\), which gives two real roots since \((D(\underline{P}-\varepsilon _{1}))^{2}>4K\varepsilon \), implying the existence of an \(\varepsilon _{R}\) for which \(\hat{r}\) is a strict Nash equilibrium of the self-referential game. Plugging the lower root into the inequality for the utility difference \(\left| u_{i}(s^{0})-U_{i}(\hat{r})\right| \) gives the remainder of the result. \(\square \)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Block, J.I., Levine, D.K. Codes of conduct, private information and repeated games. Int J Game Theory 45, 971–984 (2016). https://doi.org/10.1007/s00182-015-0498-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00182-015-0498-2

Keywords

JEL Classification

Navigation