Network Games, Control, and Optimization pp 271-287 | Cite as
Public Good Provision Games on Networks with Resource Pooling
Abstract
We consider the interaction of strategic agents and their decision-making process toward the provision of a public good. In this interaction, each user exerts a certain level of effort to improve his own utility. At the same time, the agents are interdependent and the utility of each agent depends not only on his own effort but also on the other agents’ effort level. As the agents have a limited budget and can exert limited effort, question arises as to whether there is advantage to agents pooling their resources. In this study, we show that resource pooling may or may not improve the agents’ utility when they are driven by self-interest. We identify some scenarios where resource pooling does lead to social welfare improvement as compared to without resource pooling. We also propose a taxation–subsidy mechanism that can effectively incentivize the agents to exert socially optimal effort under resource pooling.
Keywords
Public good Resource pooling Social welfareReferences
- 1.Abolhassani, M., Bateni, M.H., Hajiaghayi, M., Mahini, H., Sawant, A.: Network cournot competition. In: Liu, T.Y., Qi, Q., Ye, Y. (eds.) Web and Internet Economics. pp. 15–29. Springer International Publishing, Cham (2014)Google Scholar
- 2.Acemoglu, D., Ozdaglar, A., Tahbaz-Salehi, A.: Networks, shocks, and systemic risk. Working Paper 20931, National Bureau of Economic Research (February 2015). https://doi.org/10.3386/w20931, http://www.nber.org/papers/w20931
- 3.Allouch, N.: On the private provision of public goods on networks. Journal of Economic Theory 157, 527–552 (2015)MathSciNetCrossRefGoogle Scholar
- 4.Bimpikis, K., Ehsani, S., Ilkiliç, R.: Cournot competition in networked markets. In: Proceedings of the Fifteenth ACM Conference on Economics and Computation. pp. 733–733. EC ’14, ACM, New York, NY, USA (2014). https://doi.org/10.1145/2600057.2602882, http://doi.acm.org/10.1145/2600057.2602882
- 5.Bramoullé, Y., Kranton, R.: Games played on networks (2015)Google Scholar
- 6.Bramoullé, Y., Kranton, R., D’amours, M.: Strategic interaction and networks. American Economic Review 104(3), 898–930 (2014)CrossRefGoogle Scholar
- 7.Cai, D., Bose, S., Wierman, A.: On the role of a market maker in networked cournot competition. arXiv preprint arXiv:1701.08896 (2017)
- 8.Debreu, G.: A social equilibrium existence theorem. Proceedings of the National Academy of Sciences 38(10), 886–893 (1952)MathSciNetCrossRefGoogle Scholar
- 9.Grossklags, J., Radosavac, S., Cárdenas, A.A., Chuang, J.: Nudge: Intermediaries role in interdependent network security. In: International Conference on Trust and Trustworthy Computing. pp. 323–336. Springer (2010)Google Scholar
- 10.Jackson, M.O., Zenou, Y.: Games on networks. In: Handbook of game theory with economic applications, vol. 4, pp. 95–163. Elsevier (2015)Google Scholar
- 11.Miura-Ko, R.A., Yolken, B., Mitchell, J., Bambos, N.: Security decision-making among interdependent organizations. In: 2008 21st IEEE Computer Security Foundations Symposium. pp. 66–80 (June 2008). https://doi.org/10.1109/CSF.2008.25
- 12.Naghizadeh, P., Liu, M.: Closing the price of anarchy gap in the interdependent security game. In: 2014 Information Theory and Applications Workshop (ITA). pp. 1–8 (Feb 2014). https://doi.org/10.1109/ITA.2014.6804216
- 13.Naghizadeh, P., Liu, M.: Opting out of incentive mechanisms: A study of security as a non-excludable public good. IEEE Transactions on Information Forensics and Security 11(12), 2790–2803 (2016)CrossRefGoogle Scholar
- 14.Naghizadeh, P., Liu, M.: On the uniqueness and stability of equilibria of network games. In: Communication, Control, and Computing (Allerton), 2017 55th Annual Allerton Conference on. pp. 280–286. IEEE (2017)Google Scholar
- 15.Naghizadeh, P., Liu, M.: Provision of public goods on networks: on existence, uniqueness, and centralities. IEEE Transactions on Network Science and Engineering (2017)Google Scholar
- 16.Parameswaran, M., Zhao, X., Whinston, A.B., Fang, F.: Reengineering the internet for better security. Computer 40(1) (2007)CrossRefGoogle Scholar
- 17.Sharma, S., Teneketzis, D.: A game-theoretic approach to decentralized optimal power allocation for cellular networks. Telecommunication Systems 47(1), 65–80 (Jun 2011). https://doi.org/10.1007/s11235-010-9302-6, https://doi.org/10.1007/s11235-010-9302-6