Skip to main content

Advertisement

Log in

Third-party manipulation of conflict: an experiment

  • Original Paper
  • Published:
Experimental Economics Aims and scope Submit manuscript

An Erratum to this article was published on 11 April 2017

This article has been updated

Abstract

We design a laboratory experiment in which an interested third party endowed with private information sends a public message to two conflicting players, who then make their choices. We find that third-party communication is not strategic. Nevertheless, a hawkish message by a third party makes hawkish behavior more likely while a dovish message makes it less likely. Moreover, how subjects respond to the message is largely unaffected by the third party’s incentives. We argue that our results are consistent with a focal point interpretation in the spirit of Schelling.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Change history

  • 11 April 2017

    An erratum to this article has been published.

Notes

  1. Ethnic conflict between the Tutsi and the Hutu continues to this day and played a major role in contributing to the Rwandan genocide (Mamdani 2014).

  2. In a discussion of British colonial policy in India, Stewart (1951) quotes Brigadier John Coke as follows: “Our endeavor should be to uphold in full force the (fortunate for us) separation which exists between different religions and races, and not to endeavor to amalgamate them. Divide et empera should be the principle of the Indian Government.”

  3. President Obama, in a 2010 address to the Parliament of India, has said: “I am mindful that I might not be standing before you today, as President of the United States, had it not been for Gandhi and the message he shared with America and the world.” President Jimmy Carter called Martin Luther King, Jr. “the conscience of his generation.”

  4. In our theoretical analysis of the effect of social preferences, we focus on a special case of the model in Levine (1998) and Charness and Rabin (2002). In the text, we refer to Charness and Rabin (2002)-style social preferences as “social preferences” for short.

  5. We find other evidence against third party social preferences. Exploiting the observation that communication is uninformative, we derive equilibrium predictions about the effect of social preferences in both of our treatments. All else equal, social preferences toward the third party should lead to more hawkish behavior in the presence of a provocateur and less hawkish behavior in the presence of a peacemaker, compared to the baseline conflict game. While the presence of a peacemaker made hawkish behavior less likely, the presence of the provocateur had no effect on the likelihood of conflict. Moreover, even in the presence of social preferences, uninformative communication is disregarded in equilibrium. This is not what we observe in the data.

  6. “[...] a third player with a payoff structure of his own who is given an influential role through his control over communication.” Schelling (1980, p. 144)

  7. The control in McAdams and Nadler (2005) is a symmetric Hawk-Dove game with complete information which has two pure strategy Nash equilibria: (HawkDove) and (DoveHawk). Their treatments are: (1) spinning a wheel which selects (HawkDove) or (DoveHawk) with 50–50 chance in front of the subjects; (2) using an additional subject, called the leader, who opens an envelope containing a recommendation to either play (HawkDove) or (DoveHawk); (3) same as (2) but with the leader publicly chosen as the highest scorer in a test.

  8. In the experiment, the software approximated costs up to 3 decimal digits.

  9. Does a country possess weapons of mass destruction? How much political will does a country have to engage in a conflict?

  10. Baliga and Sjöström (2012) show that it is without loss of generality to assume that the third party’s message space contains only two messages, one of which makes Player 2 more likely to be hawkish.

  11. The public nature of communication is crucial. If the provocateur communicated privately with each player, communication would necessarily be uninformative. To see this, first note that the provocateur would always send to Player 2 the message that maximizes the probability that Player 2 will choose the dovish action, which is commonly known to be the provocateur’s most preferred action by that player. As a result, private communication with Player 2 will be uninformative. Consequently, Player 1 will also ignore the provocateur’s message.

  12. Recall that a babbling equilibrium always exists in cheap talk games.

  13. Intuitively, when \(c_1\) is very high or very low, Player 1 has a strictly dominant strategy, and the provocateur cannot influence Player 1’s behavior. He will therefore send the message that is more likely to induce Player 2 to choose the dovish action. When \(c_1\) is in some intermediate range, the provocateur can potentially affect Player 1’s behavior. Note that he would only want to affect this behavior in the direction of being more hawkish. In this intermediate range, the provocateur will thus use his public announcement to induce Player 1 to be hawkish by provoking Player 2. As actions are strategic complements, an increase in the probability that Player 2 is hawkish will indeed lead Player 1 to best respond with a more hawkish stance.

  14. While we do not analyze behavior in the “two player after provocateur” and “two player after peacemaker” conditions, we collected this data to guarantee both consistency in the description of the experiment to the different subjects and also comparable earnings. In particular, participants in the sessions where the two player condition came first were told that the experiment will have a second half.

  15. Specifically, the instructions stated: “We will provide you with instructions for the second part at the end of the first part of the experiment.”

  16. The quiz tested the subjects’ understanding of the experiment with eight questions for the two player baseline and ten questions for the provocateur and peacemaker treatments. The quiz was administered only at the beginning of the first part of each session. For the second part of each session, subjects were given the new instructions with additional time to read them but no additional quiz. All the instructions for the experiment can be found in the Online Appendix.

  17. \(n=1\) without a third party and \(n=2\) when a third party is present. This formulation makes the natural assumption that players care for their opponents’ payoffs equally.

  18. As explained in detail in Sect. 4.1, we find that provocateurs do not communicate strategically.

  19. Average earnings amounted to approximately 14 US dollars per subject at the time of the experiment. The minimum wage in Mexico is small, about 70 pesos per day. For a better reference point, consider that a 15km Uber ride from the house of one of the authors to the airport cost around 80 pesos at the time of the experiment.

  20. Recall from the previous section that both uninformative equilibrium with social preferences and informative equilibrium without social preferences predict that the introduction of a provocateur increases the incidence of hawkish behavior.

  21. In every instance the results of a Fisher’s exact test are reported in the text, the results are robust to estimating a logit regression with session clustered errors. I.e., none of our results rely on assuming that the observations are independent at the subject-decision level.

  22. This is true regardless of whether we use independent, clustered, or boostrapped standard errors. We also get non-significant coefficients if we pool the first and second half of the data.

  23. I.e., we get qualitatively and quantitatively similar results if we use a logit model with subject-level random effects or bootstrapped standard errors.

  24. Role switching, which occurs in our experiment, has been shown to decrease social preferences in trust games (see, e.g., Burks et al. 2003). However, it cannot explain why behavior in each of the experimental conditions is consistent with social preferences of Player 1 and Player 2 toward each other.

  25. Controlling for costs, we find that the latter P-value becomes statistically significant (\(P<0.01\)); the other statistical comparisons across Player 1 and Player 2 remain qualitatively similar to those reported in the preceding paragraph. We also find that Result 3 holds separately for Player 1 and Player 2. That is, if we look at the effect of the dovish message sender’s identity separately for Player 1 and Player 2, we find no significant effects (\(P>0.1\) in both cases). We discuss other robustness checks in Sect. 4.3 below.

  26. Recall from Sect. 3 that the peacemaker’s message has no effect on behavior in equilibrium.

  27. Charness (2000) employs a complete information version of the stag hunt game and finds that when one of the players sends a message before the actions are chosen, senders tend to send the dovish message most of the time and, conditional on receiving the dovish message, choose the dovish action with very high probability.

  28. A player is a coordination type when his cost is between 10 and 85, in which case the hawkish action is a best response to a hawkish action and similarly for the dovish action.

  29. The probability that a player is a coordination type is \(\approx\)0.789\(\left( =\frac{85-10}{95}\right)\) in all treatments of our experiment.

  30. Similarly, a strategy that does not depend on Player 3’s observed costs might have appeared less biased than a strategy that does.

  31. To the extent we observe treatment effects, these effects are insignificant.

  32. Following experience with the two player game, subjects in the role of Player 1 and Player 2 did worse than predicted in the presence of the provocateur (\(P<0.1\)) and better than predicted in the presence of the peacemaker (\(P<0.01\)).

  33. Recall that subjects were less hawkish than predicted in every treatment of the experiment.

References

  • Baliga, S., & Sjöström, T. (2012). The strategy of manipulating conflict. The American Economic Review, 102(6), 2897–2922.

    Article  Google Scholar 

  • Bland, J., & Nikiforakis, N. (2015). Coordination with third-party externalities. European Economic Review, 80, 1–15.

    Article  Google Scholar 

  • Blume, A., DeJong, D. V., Kim, Y. G., & Sprinkle, G. B. (2001). Evolution of communication with partial common interest. Games and Economic Behavior, 37, 79–120.

    Article  Google Scholar 

  • Brandts, J., & MacLeod, W. B. (1995). Equilibrium selection in experimental games with recommended play. Games and Economic Behavior, 11(1), 36–63.

    Article  Google Scholar 

  • Burks, S. V., Carpenter, J. P., & Verhoogen, E. (2003). Playing both roles in the trust game. Journal of Economic Behavior & Organization, 51(2), 195–216.

    Article  Google Scholar 

  • Cason, T. N., & Sharma, T. (2007). Recommended play and correlated equilibria: An experimental study. Economic Theory, 33(1), 11–27.

    Article  Google Scholar 

  • Charness, G. (2000). Self-serving cheap talk: A test of Aumann’s conjecture. Games and Economic Behavior, 33, 177–194.

    Article  Google Scholar 

  • Charness, G., & Rabin, M. (2002). Understanding social preferences with simple tests. Quarterly Journal of Economics, 177, 817–869.

    Article  Google Scholar 

  • Cooper, D., & Kagel, J. H. (2003). Lessons learned: Generalizing learning across games. The American Economic Review, 93(2), 202–207.

    Article  Google Scholar 

  • Fehr, E., & Schmidt, K. M. (1999). A theory of fairness, competition, and cooperation. Quarterly Journal of Economics, 114, 817–868.

    Article  Google Scholar 

  • Fischbacher, U. (2007). z-Tree: Zurich toolbox for ready-made economic experiments. Experimental Economics, 10, 171–178.

    Article  Google Scholar 

  • Galbiati, R., & Vertova, P. (2008). Obligations and cooperative behaviour in public good games. Games and Economic Behavior, 64(1), 146–170.

    Article  Google Scholar 

  • Levine, D. K. (1998). Modeling altruism and spitefulness in experiments. Review of Economic Dynamics, 1(3), 593–622.

    Article  Google Scholar 

  • Mamdani, M. (2014). When victims become killers: Colonialism, nativism, and the genocide in Rwanda. Princeton, NJ: Princeton University Press.

    Google Scholar 

  • McAdams, R. H., & Nadler, J. (2005). Testing the focal point theory of legal compliance: The effect of third-party expression in an experimental hawk/dove game. Journal of Empirical Legal Studies, 2(1), 87–123.

    Article  Google Scholar 

  • Rankin, F. W., Van Huyck, J. B., & Battalio, R. C. (2000). Strategic similarity and emergent conventions: Evidence from similar stag hunt games. Games and Economic Behavior, 32(2), 315–337.

    Article  Google Scholar 

  • Rick, S., & Weber, R. A. (2010). Meaningful learning and transfer of learning in games played repeatedly without feedback. Games and Economic Behavior, 68, 716–730.

    Article  Google Scholar 

  • Schelling, T. C. (1980). The strategy of conflict. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Stewart, N. (1951). Divide and rule: British policy in indian history. Science and Society, 15(1), 49–57.

    Google Scholar 

  • Van Huyck, J. B., Gillette, A. B., & Battalio, R. C. (1992). Credible assignments in coordination games. Games and Economic Behavior, 4(4), 606–626.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Piotr Evdokimov.

Additional information

The original version of this article was revised.

Piotr Evdokimov acknowledges the financial support of the Asociación Mexicana de Cultura A.C. Both authors thank the seminar participants at ITAM, Andrei Gomberg, Ryan Oprea, the editor, and two anonymous referees for useful comments.

An erratum to this article is available at https://doi.org/10.1007/s10683-017-9525-4.

Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (pdf 3108 KB)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Evdokimov, P., Garfagnini, U. Third-party manipulation of conflict: an experiment. Exp Econ 21, 27–49 (2018). https://doi.org/10.1007/s10683-017-9523-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10683-017-9523-6

Keywords

JEL Classification

Navigation