Knowledge (XXG)

Non-credible threat

Source đź“ť

108:
firm 1 doesn’t enter, the payoff is (4,10). However, if firm 1 does enter, firm 2 has the choice to either attack or not attack. If firm 2 attacks, the payoff is (3,3) whereas if firm 2 doesn’t attack, the payoff is (6,6). Given that firm 2’s optimum payoff is firm 1 not entering, it can issue a threat that they will attack if firm 1 enters, to discourage firm 1 from entering the market. However, this is a non-credible threat. If firm 1 does decide to enter the market, the action that is in the best interest for firm 2 is to not attack as this leads to a payoff of 6 for the firm, as opposed to the payoff of 3 from attacking.
62:, who stated that: "A announces that B's behaviour will lead to a response from A. If this response is a reward, then the announcement is a commitment; if this response is a penalty, then the announcement is a threat." While a player might make a threat, it is only deemed credible if it serves the best interest of the player. In other words, the player would be willing to carry through with the action that is being threatened regardless of the choice of the other player. This is based on the assumption that the player is rational. 28: 159:"subjects are not willing to rely on others’ self-interested maximization, and self-interested maximization is not ubiquitous." A key component of the utility maximising strategy in the game was the elimination of non-credible threats, however, the study found that suboptimal payoffs were a direct result of players following through on these non-credible threats. In real world applications, non-credible threats must be considered as there is a high possibility players will not act rationally. 1613: 149:
The notion of credibility is contingent on the principle of rationality. A rational player always make decisions that maximise their own utility, however, players are not always rational. Therefore, in real world applications, the assumption that all players will be rational and act to maximise their
107:
An example of a non-credible threat is demonstrated by Shaorong Sun & Na Sun in their book Management Game Theory. The example game, the market entry game, describes a situation in which an existing firm, firm 2, has a strong hold on the market and a new firm, firm 1, is considering entering. If
158:
Nicolas Jacquemet and Adam Zylbersztejn conducted experiments based on the Beard and Beil Game to investigate whether people act to maximise their payoffs. From the study Jacquemet and Zylbersztejn found that failure to maximise utility stemmed from two observations:
94: 128:
with a payoff of (0,0) to entice player 1 to choose L with a payoff of (2,2), as this is the highest payoff for player 2. However, this is a non-credible threat as, if player 1 does decide to choose R, player 2 will choose
97:
Player 2 threatening action A if Player 1 chooses action B is a non-credible threat. This is because if Player 1 chooses action B, Player 2 will choose action B, as this results in a higher payoff than action A for Player
116:
Eric van Damme's Extensive Form Game demonstrates another example of a non-credible threat. In this game, player 1 has the choice of L or R, and if player 1 chooses R, then player 2 has the choice of
65:
A non-credible threat is made on the hope that it will be believed, and therefore the threatening undesirable action will not need to be carried out. For a threat to be credible within an
31:
Illustration that shows the difference between a SPNE and another NE. The blue equilibrium is not subgame perfect because player two makes a non-credible threat at 2(2) to be unkind (U).
227:
Heifetz, A., & Yalon-Fortus, J. (2012). Game Theory: Interactive Strategies in Economics and Management. Cambridge University Press. ProQuest Ebook Central
1654: 554: 316: 283: 201: 1453: 1270: 805: 603: 1089: 908: 349: 519: 1683: 710: 82: 1179: 720: 1049: 58:
A threat, and its counterpart – a commitment, are both defined by American economist and Nobel prize winner,
1678: 1647: 1230: 648: 623: 70: 1580: 1006: 760: 750: 685: 800: 780: 529:," Discussion Paper Series dp685, The Federmann Center for the Study of Rationality, the Hebrew University, Jerusalem. 478: 1265: 1514: 1235: 893: 735: 730: 1550: 1473: 1209: 765: 690: 547: 1640: 1565: 1298: 1184: 981: 775: 593: 1368: 1570: 1169: 1139: 795: 583: 1504: 299:
Harrington, J. E. (1989). "Noncooperative Games". In Eatwell, John; Milgate, Murray; Newman, Peter (eds.).
1595: 1575: 1555: 1174: 1079: 938: 888: 883: 815: 785: 705: 633: 526: 613: 473: 443: 1054: 1039: 27: 1673: 1388: 1373: 1260: 1255: 1159: 1144: 1109: 1074: 673: 618: 540: 1545: 1164: 1114: 951: 878: 858: 715: 598: 412:"What Drives Failure to Maximize Payoffs in the Lab? A Test of the Inequality Aversion Hypothesis" 1524: 1383: 1214: 1194: 1044: 923: 828: 755: 700: 507: 423: 389: 369: 253: 207: 78: 1612: 370:"Rational, Normative and Procedural Theories of Beliefs: Can They Explain Internal Motivations?" 274:
van Damme, Eric (1989). "Extensive Form Games". In Eatwell, J.; Milgate, M.; Newman, P. (eds.).
1509: 1478: 1433: 1328: 1199: 1154: 1129: 1059: 933: 863: 853: 745: 695: 643: 435: 431: 411: 345: 312: 279: 197: 1624: 55:
player would not actually carry out, because it would not be in his best interest to do so.
1590: 1585: 1519: 1483: 1463: 1423: 1393: 1348: 1303: 1288: 1245: 1099: 740: 677: 663: 628: 415: 381: 337: 304: 189: 74: 66: 59: 1488: 1448: 1403: 1318: 1313: 1034: 986: 873: 638: 608: 578: 456: 48: 1353: 1428: 1418: 1408: 1343: 1333: 1323: 1308: 1104: 1084: 1069: 1064: 1024: 991: 976: 971: 961: 770: 1667: 1468: 1458: 1413: 1398: 1378: 1204: 1149: 1124: 996: 966: 956: 943: 848: 790: 725: 658: 427: 393: 211: 1443: 1438: 1293: 868: 93: 1620: 1560: 1363: 1358: 1338: 1134: 1119: 928: 898: 833: 823: 653: 588: 564: 40: 385: 141:
is not in player 2’s best interest, their threat to play that is non-credible.
17: 1189: 843: 334:
How Behavioral Economics Influences Management Decision-Making: A New Paradigm
308: 193: 1094: 1014: 838: 341: 44: 73:
is reached where a threat should be fulfilled, it will be fulfilled. Those
1529: 1029: 419: 532: 1250: 1240: 918: 511: 495: 257: 241: 150:
utility is not practical, thus non-credible threats cannot be ignored.
1019: 92: 536: 77:
that rely on non-credible threats can be eliminated through
137:
which has a payoff of 0 for player 2. Given that action
1628: 410:
Jacquemet, Nicolas; Zylbersztejn, Adam (June 2014).
1538: 1497: 1279: 1223: 1005: 907: 814: 672: 571: 522:No. RAND/P-3883. RAND CORP SANTA MONICA CA, 1968. 154:Experiment using the Beard and Beil Game (1994) 1648: 548: 8: 405: 403: 235: 233: 1655: 1641: 555: 541: 533: 269: 267: 223: 221: 363: 361: 303:. Palgrave Macmillan. pp. 178–184. 278:. Palgrave Macmillan. pp. 139–144. 26: 171: 452: 441: 81:; the remaining equilibria are called 520:The theory and practice of blackmail. 179: 177: 175: 7: 1609: 1607: 112:Eric van Damme's Extensive Form Game 133:as their payoff is 1 as opposed to 111: 1627:. You can help Knowledge (XXG) by 604:First-player and second-player win 25: 124:. Player 2 can threaten choosing 1611: 711:Coalition-proof Nash equilibrium 89:Examples of Non-credible threats 527:The Robber Wants To Be Punished 184:Sun, Shaorong; Sun, Na (2018). 83:subgame perfect Nash equilibria 721:Evolutionarily stable strategy 1: 649:Simultaneous action selection 494:Schelling, Thomas C. (1956). 240:Schelling, Thomas C. (1956). 1581:List of games in game theory 761:Quantal response equilibrium 751:Perfect Bayesian equilibrium 686:Bayes correlated equilibrium 500:The American Economic Review 246:The American Economic Review 1050:Optional prisoner's dilemma 781:Self-confirming equilibrium 479:Subgame perfect equilibrium 1700: 1606: 1515:Principal variation search 1231:Aumann's agreement theorem 894:Strategy-stealing argument 806:Trembling hand equilibrium 736:Markov perfect equilibrium 731:Mertens-stable equilibrium 386:10.2753/JEI0021-3624450307 374:Journal of Economic Issues 47:to describe a threat in a 1551:Combinatorial game theory 1210:Princess and monster game 766:Quasi-perfect equilibrium 691:Bayesian Nash equilibrium 368:Khalil, Elias L. (2011). 309:10.1007/978-1-349-20181-5 194:10.1007/978-981-13-1062-1 1566:Evolutionary game theory 1299:Antoine Augustin Cournot 1185:Guess 2/3 of the average 982:Strictly determined game 776:Satisfaction equilibrium 594:Escalation of commitment 496:"An Essay on Bargaining" 242:"An Essay on Bargaining" 1684:Economic theories stubs 1571:Glossary of game theory 1170:Stackelberg competition 796:Strong Nash equilibrium 342:10.1016/C2016-0-05106-9 1596:Tragedy of the commons 1576:List of game theorists 1556:Confrontation analysis 1266:Sprague–Grundy theorem 786:Sequential equilibrium 706:Correlated equilibrium 451:Cite journal requires 186:Management Game Theory 99: 32: 1369:Jean-François Mertens 474:Dynamic inconsistency 96: 30: 1679:Microeconomics stubs 1498:Search optimizations 1374:Jennifer Tour Chayes 1261:Revelation principle 1256:Purification theorem 1195:Nash bargaining game 1160:Bertrand competition 1145:El Farol Bar problem 1110:Electronic mail game 1075:Lewis signaling game 619:Hierarchy of beliefs 420:10.2139/ssrn.1895287 332:Monahan, K. (2018). 1546:Bounded rationality 1165:Cournot competition 1115:Rock paper scissors 1090:Battle of the sexes 1080:Volunteer's dilemma 952:Perfect information 879:Dominant strategies 716:Epsilon-equilibrium 599:Extensive-form game 37:non-credible threat 1525:Paranoid algorithm 1505:Alpha–beta pruning 1384:John Maynard Smith 1215:Rendezvous problem 1055:Traveler's dilemma 1045:Gift-exchange game 1040:Prisoner's dilemma 957:Large Poisson game 924:Bargaining problem 829:Backward induction 801:Subgame perfection 756:Proper equilibrium 525:Uri Weiss, 2015. " 518:Ellsberg, Daniel. 336:. Academic Press. 100: 79:backward induction 39:is a term used in 33: 1636: 1635: 1604: 1603: 1510:Aspiration window 1479:Suzanne Scotchmer 1434:Oskar Morgenstern 1329:Donald B. Gillies 1271:Zermelo's theorem 1200:Induction puzzles 1155:Fair cake-cutting 1130:Public goods game 1060:Coordination game 934:Intransitive game 864:Forward induction 746:Pareto efficiency 726:Gibbs equilibrium 696:Berge equilibrium 644:Simultaneous game 318:978-1-349-20181-5 285:978-1-349-20181-5 203:978-981-13-1061-4 103:Market Entry Game 16:(Redirected from 1691: 1657: 1650: 1643: 1615: 1608: 1591:Topological game 1586:No-win situation 1484:Thomas Schelling 1464:Robert B. Wilson 1424:Merrill M. Flood 1394:John von Neumann 1304:Ariel Rubinstein 1289:Albert W. Tucker 1140:War of attrition 1100:Matching pennies 741:Nash equilibrium 664:Mechanism design 629:Normal-form game 584:Cooperative game 557: 550: 543: 534: 515: 461: 460: 454: 449: 447: 439: 407: 398: 397: 365: 356: 355: 329: 323: 322: 296: 290: 289: 271: 262: 261: 237: 228: 225: 216: 215: 181: 21: 1699: 1698: 1694: 1693: 1692: 1690: 1689: 1688: 1664: 1663: 1662: 1661: 1605: 1600: 1534: 1520:max^n algorithm 1493: 1489:William Vickrey 1449:Reinhard Selten 1404:Kenneth Binmore 1319:David K. Levine 1314:Daniel Kahneman 1281: 1275: 1251:Negamax theorem 1241:Minimax theorem 1219: 1180:Diner's dilemma 1035:All-pay auction 1001: 987:Stochastic game 939:Mean-field game 910: 903: 874:Markov strategy 810: 676: 668: 639:Sequential game 624:Information set 609:Game complexity 579:Congestion game 567: 561: 493: 490: 484: 470: 465: 464: 450: 440: 409: 408: 401: 367: 366: 359: 352: 331: 330: 326: 319: 298: 297: 293: 286: 273: 272: 265: 239: 238: 231: 226: 219: 204: 183: 182: 173: 168: 162: 156: 147: 114: 105: 91: 75:Nash equilibria 49:sequential game 23: 22: 18:Credible threat 15: 12: 11: 5: 1697: 1695: 1687: 1686: 1681: 1676: 1666: 1665: 1660: 1659: 1652: 1645: 1637: 1634: 1633: 1616: 1602: 1601: 1599: 1598: 1593: 1588: 1583: 1578: 1573: 1568: 1563: 1558: 1553: 1548: 1542: 1540: 1536: 1535: 1533: 1532: 1527: 1522: 1517: 1512: 1507: 1501: 1499: 1495: 1494: 1492: 1491: 1486: 1481: 1476: 1471: 1466: 1461: 1456: 1454:Robert Axelrod 1451: 1446: 1441: 1436: 1431: 1429:Olga Bondareva 1426: 1421: 1419:Melvin Dresher 1416: 1411: 1409:Leonid Hurwicz 1406: 1401: 1396: 1391: 1386: 1381: 1376: 1371: 1366: 1361: 1356: 1351: 1346: 1344:Harold W. Kuhn 1341: 1336: 1334:Drew Fudenberg 1331: 1326: 1324:David M. Kreps 1321: 1316: 1311: 1309:Claude Shannon 1306: 1301: 1296: 1291: 1285: 1283: 1277: 1276: 1274: 1273: 1268: 1263: 1258: 1253: 1248: 1246:Nash's theorem 1243: 1238: 1233: 1227: 1225: 1221: 1220: 1218: 1217: 1212: 1207: 1202: 1197: 1192: 1187: 1182: 1177: 1172: 1167: 1162: 1157: 1152: 1147: 1142: 1137: 1132: 1127: 1122: 1117: 1112: 1107: 1105:Ultimatum game 1102: 1097: 1092: 1087: 1085:Dollar auction 1082: 1077: 1072: 1070:Centipede game 1067: 1062: 1057: 1052: 1047: 1042: 1037: 1032: 1027: 1025:Infinite chess 1022: 1017: 1011: 1009: 1003: 1002: 1000: 999: 994: 992:Symmetric game 989: 984: 979: 977:Signaling game 974: 972:Screening game 969: 964: 962:Potential game 959: 954: 949: 941: 936: 931: 926: 921: 915: 913: 905: 904: 902: 901: 896: 891: 889:Mixed strategy 886: 881: 876: 871: 866: 861: 856: 851: 846: 841: 836: 831: 826: 820: 818: 812: 811: 809: 808: 803: 798: 793: 788: 783: 778: 773: 771:Risk dominance 768: 763: 758: 753: 748: 743: 738: 733: 728: 723: 718: 713: 708: 703: 698: 693: 688: 682: 680: 670: 669: 667: 666: 661: 656: 651: 646: 641: 636: 631: 626: 621: 616: 614:Graphical game 611: 606: 601: 596: 591: 586: 581: 575: 573: 569: 568: 562: 560: 559: 552: 545: 537: 531: 530: 523: 516: 506:(3): 281–306. 489: 488:External links 486: 482: 481: 476: 469: 466: 463: 462: 453:|journal= 399: 380:(3): 641–664. 357: 350: 324: 317: 291: 284: 263: 252:(3): 281–306. 229: 217: 202: 170: 169: 167: 164: 155: 152: 146: 143: 113: 110: 104: 101: 90: 87: 60:T.C. Schelling 24: 14: 13: 10: 9: 6: 4: 3: 2: 1696: 1685: 1682: 1680: 1677: 1675: 1672: 1671: 1669: 1658: 1653: 1651: 1646: 1644: 1639: 1638: 1632: 1630: 1626: 1623:article is a 1622: 1617: 1614: 1610: 1597: 1594: 1592: 1589: 1587: 1584: 1582: 1579: 1577: 1574: 1572: 1569: 1567: 1564: 1562: 1559: 1557: 1554: 1552: 1549: 1547: 1544: 1543: 1541: 1539:Miscellaneous 1537: 1531: 1528: 1526: 1523: 1521: 1518: 1516: 1513: 1511: 1508: 1506: 1503: 1502: 1500: 1496: 1490: 1487: 1485: 1482: 1480: 1477: 1475: 1474:Samuel Bowles 1472: 1470: 1469:Roger Myerson 1467: 1465: 1462: 1460: 1459:Robert Aumann 1457: 1455: 1452: 1450: 1447: 1445: 1442: 1440: 1437: 1435: 1432: 1430: 1427: 1425: 1422: 1420: 1417: 1415: 1414:Lloyd Shapley 1412: 1410: 1407: 1405: 1402: 1400: 1399:Kenneth Arrow 1397: 1395: 1392: 1390: 1387: 1385: 1382: 1380: 1379:John Harsanyi 1377: 1375: 1372: 1370: 1367: 1365: 1362: 1360: 1357: 1355: 1352: 1350: 1349:Herbert Simon 1347: 1345: 1342: 1340: 1337: 1335: 1332: 1330: 1327: 1325: 1322: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1286: 1284: 1278: 1272: 1269: 1267: 1264: 1262: 1259: 1257: 1254: 1252: 1249: 1247: 1244: 1242: 1239: 1237: 1234: 1232: 1229: 1228: 1226: 1222: 1216: 1213: 1211: 1208: 1206: 1203: 1201: 1198: 1196: 1193: 1191: 1188: 1186: 1183: 1181: 1178: 1176: 1173: 1171: 1168: 1166: 1163: 1161: 1158: 1156: 1153: 1151: 1150:Fair division 1148: 1146: 1143: 1141: 1138: 1136: 1133: 1131: 1128: 1126: 1125:Dictator game 1123: 1121: 1118: 1116: 1113: 1111: 1108: 1106: 1103: 1101: 1098: 1096: 1093: 1091: 1088: 1086: 1083: 1081: 1078: 1076: 1073: 1071: 1068: 1066: 1063: 1061: 1058: 1056: 1053: 1051: 1048: 1046: 1043: 1041: 1038: 1036: 1033: 1031: 1028: 1026: 1023: 1021: 1018: 1016: 1013: 1012: 1010: 1008: 1004: 998: 997:Zero-sum game 995: 993: 990: 988: 985: 983: 980: 978: 975: 973: 970: 968: 967:Repeated game 965: 963: 960: 958: 955: 953: 950: 948: 946: 942: 940: 937: 935: 932: 930: 927: 925: 922: 920: 917: 916: 914: 912: 906: 900: 897: 895: 892: 890: 887: 885: 884:Pure strategy 882: 880: 877: 875: 872: 870: 867: 865: 862: 860: 857: 855: 852: 850: 849:De-escalation 847: 845: 842: 840: 837: 835: 832: 830: 827: 825: 822: 821: 819: 817: 813: 807: 804: 802: 799: 797: 794: 792: 791:Shapley value 789: 787: 784: 782: 779: 777: 774: 772: 769: 767: 764: 762: 759: 757: 754: 752: 749: 747: 744: 742: 739: 737: 734: 732: 729: 727: 724: 722: 719: 717: 714: 712: 709: 707: 704: 702: 699: 697: 694: 692: 689: 687: 684: 683: 681: 679: 675: 671: 665: 662: 660: 659:Succinct game 657: 655: 652: 650: 647: 645: 642: 640: 637: 635: 632: 630: 627: 625: 622: 620: 617: 615: 612: 610: 607: 605: 602: 600: 597: 595: 592: 590: 587: 585: 582: 580: 577: 576: 574: 570: 566: 558: 553: 551: 546: 544: 539: 538: 535: 528: 524: 521: 517: 513: 509: 505: 501: 497: 492: 491: 487: 485: 480: 477: 475: 472: 471: 467: 458: 445: 437: 433: 429: 425: 421: 417: 413: 406: 404: 400: 395: 391: 387: 383: 379: 375: 371: 364: 362: 358: 353: 351:9780128135310 347: 343: 339: 335: 328: 325: 320: 314: 310: 306: 302: 295: 292: 287: 281: 277: 270: 268: 264: 259: 255: 251: 247: 243: 236: 234: 230: 224: 222: 218: 213: 209: 205: 199: 195: 191: 187: 180: 178: 176: 172: 165: 163: 160: 153: 151: 144: 142: 140: 136: 132: 127: 123: 119: 109: 102: 95: 88: 86: 84: 80: 76: 72: 69:, whenever a 68: 63: 61: 56: 54: 50: 46: 42: 38: 29: 19: 1629:expanding it 1618: 1444:Peyton Young 1439:Paul Milgrom 1354:HervĂ© Moulin 1294:Amos Tversky 1236:Folk theorem 947:-player game 944: 869:Grim trigger 503: 499: 483: 444:cite journal 377: 373: 333: 327: 300: 294: 275: 249: 245: 185: 161: 157: 148: 138: 134: 130: 125: 121: 117: 115: 106: 64: 57: 52: 36: 34: 1674:Game theory 1621:game theory 1561:Coopetition 1364:Jean Tirole 1359:John Conway 1339:Eric Maskin 1135:Blotto game 1120:Pirate game 929:Global game 899:Tit for tat 834:Bid shading 824:Appeasement 674:Equilibrium 654:Solved game 589:Determinacy 572:Definitions 565:game theory 301:Game Theory 276:Game Theory 145:Rationality 67:equilibrium 41:game theory 1668:Categories 1205:Trust game 1190:Kuhn poker 859:Escalation 854:Deterrence 844:Cheap talk 816:Strategies 634:Preference 563:Topics of 1389:John Nash 1095:Stag hunt 839:Collusion 428:219374150 394:143987777 212:169075970 45:economics 1530:Lazy SMP 1224:Theorems 1175:Deadlock 1030:Checkers 911:of games 678:concepts 468:See also 53:rational 1282:figures 1065:Chicken 919:Auction 909:Classes 512:1805498 436:1895287 258:1805498 51:that a 510:  434:  426:  392:  348:  315:  282:  256:  210:  200:  1619:This 1020:Chess 1007:Games 508:JSTOR 424:S2CID 390:S2CID 254:JSTOR 208:S2CID 166:Notes 1625:stub 701:Core 457:help 432:SSRN 346:ISBN 313:ISBN 280:ISBN 198:ISBN 71:node 43:and 1280:Key 416:doi 382:doi 338:doi 305:doi 190:doi 120:or 1670:: 1015:Go 504:46 502:. 498:. 448:: 446:}} 442:{{ 430:. 422:. 414:. 402:^ 388:. 378:45 376:. 372:. 360:^ 344:. 311:. 266:^ 250:46 248:. 244:. 232:^ 220:^ 206:. 196:. 188:. 174:^ 98:2. 85:. 35:A 1656:e 1649:t 1642:v 1631:. 945:n 556:e 549:t 542:v 514:. 459:) 455:( 438:. 418:: 396:. 384:: 354:. 340:: 321:. 307:: 288:. 260:. 214:. 192:: 139:l 135:l 131:r 126:l 122:r 118:l 20:)

Index

Credible threat

game theory
economics
sequential game
T.C. Schelling
equilibrium
node
Nash equilibria
backward induction
subgame perfect Nash equilibria




doi
10.1007/978-981-13-1062-1
ISBN
978-981-13-1061-4
S2CID
169075970




"An Essay on Bargaining"
JSTOR
1805498

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑