108:
firm 1 doesn’t enter, the payoff is (4,10). However, if firm 1 does enter, firm 2 has the choice to either attack or not attack. If firm 2 attacks, the payoff is (3,3) whereas if firm 2 doesn’t attack, the payoff is (6,6). Given that firm 2’s optimum payoff is firm 1 not entering, it can issue a threat that they will attack if firm 1 enters, to discourage firm 1 from entering the market. However, this is a non-credible threat. If firm 1 does decide to enter the market, the action that is in the best interest for firm 2 is to not attack as this leads to a payoff of 6 for the firm, as opposed to the payoff of 3 from attacking.
62:, who stated that: "A announces that B's behaviour will lead to a response from A. If this response is a reward, then the announcement is a commitment; if this response is a penalty, then the announcement is a threat." While a player might make a threat, it is only deemed credible if it serves the best interest of the player. In other words, the player would be willing to carry through with the action that is being threatened regardless of the choice of the other player. This is based on the assumption that the player is rational.
28:
159:"subjects are not willing to rely on others’ self-interested maximization, and self-interested maximization is not ubiquitous." A key component of the utility maximising strategy in the game was the elimination of non-credible threats, however, the study found that suboptimal payoffs were a direct result of players following through on these non-credible threats. In real world applications, non-credible threats must be considered as there is a high possibility players will not act rationally.
1613:
149:
The notion of credibility is contingent on the principle of rationality. A rational player always make decisions that maximise their own utility, however, players are not always rational. Therefore, in real world applications, the assumption that all players will be rational and act to maximise their
107:
An example of a non-credible threat is demonstrated by
Shaorong Sun & Na Sun in their book Management Game Theory. The example game, the market entry game, describes a situation in which an existing firm, firm 2, has a strong hold on the market and a new firm, firm 1, is considering entering. If
158:
Nicolas
Jacquemet and Adam Zylbersztejn conducted experiments based on the Beard and Beil Game to investigate whether people act to maximise their payoffs. From the study Jacquemet and Zylbersztejn found that failure to maximise utility stemmed from two observations:
94:
128:
with a payoff of (0,0) to entice player 1 to choose L with a payoff of (2,2), as this is the highest payoff for player 2. However, this is a non-credible threat as, if player 1 does decide to choose R, player 2 will choose
97:
Player 2 threatening action A if Player 1 chooses action B is a non-credible threat. This is because if Player 1 chooses action B, Player 2 will choose action B, as this results in a higher payoff than action A for Player
116:
Eric van Damme's
Extensive Form Game demonstrates another example of a non-credible threat. In this game, player 1 has the choice of L or R, and if player 1 chooses R, then player 2 has the choice of
65:
A non-credible threat is made on the hope that it will be believed, and therefore the threatening undesirable action will not need to be carried out. For a threat to be credible within an
31:
Illustration that shows the difference between a SPNE and another NE. The blue equilibrium is not subgame perfect because player two makes a non-credible threat at 2(2) to be unkind (U).
227:
Heifetz, A., & Yalon-Fortus, J. (2012). Game Theory: Interactive
Strategies in Economics and Management. Cambridge University Press. ProQuest Ebook Central
1654:
554:
316:
283:
201:
1453:
1270:
805:
603:
1089:
908:
349:
519:
1683:
710:
82:
1179:
720:
1049:
58:
A threat, and its counterpart – a commitment, are both defined by
American economist and Nobel prize winner,
1678:
1647:
1230:
648:
623:
70:
1580:
1006:
760:
750:
685:
800:
780:
529:," Discussion Paper Series dp685, The Federmann Center for the Study of Rationality, the Hebrew University, Jerusalem.
478:
1265:
1514:
1235:
893:
735:
730:
1550:
1473:
1209:
765:
690:
547:
1640:
1565:
1298:
1184:
981:
775:
593:
1368:
1570:
1169:
1139:
795:
583:
1504:
299:
Harrington, J. E. (1989). "Noncooperative Games". In
Eatwell, John; Milgate, Murray; Newman, Peter (eds.).
1595:
1575:
1555:
1174:
1079:
938:
888:
883:
815:
785:
705:
633:
526:
613:
473:
443:
1054:
1039:
27:
1673:
1388:
1373:
1260:
1255:
1159:
1144:
1109:
1074:
673:
618:
540:
1545:
1164:
1114:
951:
878:
858:
715:
598:
412:"What Drives Failure to Maximize Payoffs in the Lab? A Test of the Inequality Aversion Hypothesis"
1524:
1383:
1214:
1194:
1044:
923:
828:
755:
700:
507:
423:
389:
369:
253:
207:
78:
1612:
370:"Rational, Normative and Procedural Theories of Beliefs: Can They Explain Internal Motivations?"
274:
van Damme, Eric (1989). "Extensive Form Games". In
Eatwell, J.; Milgate, M.; Newman, P. (eds.).
1509:
1478:
1433:
1328:
1199:
1154:
1129:
1059:
933:
863:
853:
745:
695:
643:
435:
431:
411:
345:
312:
279:
197:
1624:
55:
player would not actually carry out, because it would not be in his best interest to do so.
1590:
1585:
1519:
1483:
1463:
1423:
1393:
1348:
1303:
1288:
1245:
1099:
740:
677:
663:
628:
415:
381:
337:
304:
189:
74:
66:
59:
1488:
1448:
1403:
1318:
1313:
1034:
986:
873:
638:
608:
578:
456:
48:
1353:
1428:
1418:
1408:
1343:
1333:
1323:
1308:
1104:
1084:
1069:
1064:
1024:
991:
976:
971:
961:
770:
1667:
1468:
1458:
1413:
1398:
1378:
1204:
1149:
1124:
996:
966:
956:
943:
848:
790:
725:
658:
427:
393:
211:
1443:
1438:
1293:
868:
93:
1620:
1560:
1363:
1358:
1338:
1134:
1119:
928:
898:
833:
823:
653:
588:
564:
40:
385:
141:
is not in player 2’s best interest, their threat to play that is non-credible.
17:
1189:
843:
334:
How
Behavioral Economics Influences Management Decision-Making: A New Paradigm
308:
193:
1094:
1014:
838:
341:
44:
73:
is reached where a threat should be fulfilled, it will be fulfilled. Those
1529:
1029:
419:
532:
1250:
1240:
918:
511:
495:
257:
241:
150:
utility is not practical, thus non-credible threats cannot be ignored.
1019:
92:
536:
77:
that rely on non-credible threats can be eliminated through
137:
which has a payoff of 0 for player 2. Given that action
1628:
410:
Jacquemet, Nicolas; Zylbersztejn, Adam (June 2014).
1538:
1497:
1279:
1223:
1005:
907:
814:
672:
571:
522:No. RAND/P-3883. RAND CORP SANTA MONICA CA, 1968.
154:Experiment using the Beard and Beil Game (1994)
1648:
548:
8:
405:
403:
235:
233:
1655:
1641:
555:
541:
533:
269:
267:
223:
221:
363:
361:
303:. Palgrave Macmillan. pp. 178–184.
278:. Palgrave Macmillan. pp. 139–144.
26:
171:
452:
441:
81:; the remaining equilibria are called
520:The theory and practice of blackmail.
179:
177:
175:
7:
1609:
1607:
112:Eric van Damme's Extensive Form Game
133:as their payoff is 1 as opposed to
111:
1627:. You can help Knowledge (XXG) by
604:First-player and second-player win
25:
124:. Player 2 can threaten choosing
1611:
711:Coalition-proof Nash equilibrium
89:Examples of Non-credible threats
527:The Robber Wants To Be Punished
184:Sun, Shaorong; Sun, Na (2018).
83:subgame perfect Nash equilibria
721:Evolutionarily stable strategy
1:
649:Simultaneous action selection
494:Schelling, Thomas C. (1956).
240:Schelling, Thomas C. (1956).
1581:List of games in game theory
761:Quantal response equilibrium
751:Perfect Bayesian equilibrium
686:Bayes correlated equilibrium
500:The American Economic Review
246:The American Economic Review
1050:Optional prisoner's dilemma
781:Self-confirming equilibrium
479:Subgame perfect equilibrium
1700:
1606:
1515:Principal variation search
1231:Aumann's agreement theorem
894:Strategy-stealing argument
806:Trembling hand equilibrium
736:Markov perfect equilibrium
731:Mertens-stable equilibrium
386:10.2753/JEI0021-3624450307
374:Journal of Economic Issues
47:to describe a threat in a
1551:Combinatorial game theory
1210:Princess and monster game
766:Quasi-perfect equilibrium
691:Bayesian Nash equilibrium
368:Khalil, Elias L. (2011).
309:10.1007/978-1-349-20181-5
194:10.1007/978-981-13-1062-1
1566:Evolutionary game theory
1299:Antoine Augustin Cournot
1185:Guess 2/3 of the average
982:Strictly determined game
776:Satisfaction equilibrium
594:Escalation of commitment
496:"An Essay on Bargaining"
242:"An Essay on Bargaining"
1684:Economic theories stubs
1571:Glossary of game theory
1170:Stackelberg competition
796:Strong Nash equilibrium
342:10.1016/C2016-0-05106-9
1596:Tragedy of the commons
1576:List of game theorists
1556:Confrontation analysis
1266:Sprague–Grundy theorem
786:Sequential equilibrium
706:Correlated equilibrium
451:Cite journal requires
186:Management Game Theory
99:
32:
1369:Jean-François Mertens
474:Dynamic inconsistency
96:
30:
1679:Microeconomics stubs
1498:Search optimizations
1374:Jennifer Tour Chayes
1261:Revelation principle
1256:Purification theorem
1195:Nash bargaining game
1160:Bertrand competition
1145:El Farol Bar problem
1110:Electronic mail game
1075:Lewis signaling game
619:Hierarchy of beliefs
420:10.2139/ssrn.1895287
332:Monahan, K. (2018).
1546:Bounded rationality
1165:Cournot competition
1115:Rock paper scissors
1090:Battle of the sexes
1080:Volunteer's dilemma
952:Perfect information
879:Dominant strategies
716:Epsilon-equilibrium
599:Extensive-form game
37:non-credible threat
1525:Paranoid algorithm
1505:Alpha–beta pruning
1384:John Maynard Smith
1215:Rendezvous problem
1055:Traveler's dilemma
1045:Gift-exchange game
1040:Prisoner's dilemma
957:Large Poisson game
924:Bargaining problem
829:Backward induction
801:Subgame perfection
756:Proper equilibrium
525:Uri Weiss, 2015. "
518:Ellsberg, Daniel.
336:. Academic Press.
100:
79:backward induction
39:is a term used in
33:
1636:
1635:
1604:
1603:
1510:Aspiration window
1479:Suzanne Scotchmer
1434:Oskar Morgenstern
1329:Donald B. Gillies
1271:Zermelo's theorem
1200:Induction puzzles
1155:Fair cake-cutting
1130:Public goods game
1060:Coordination game
934:Intransitive game
864:Forward induction
746:Pareto efficiency
726:Gibbs equilibrium
696:Berge equilibrium
644:Simultaneous game
318:978-1-349-20181-5
285:978-1-349-20181-5
203:978-981-13-1061-4
103:Market Entry Game
16:(Redirected from
1691:
1657:
1650:
1643:
1615:
1608:
1591:Topological game
1586:No-win situation
1484:Thomas Schelling
1464:Robert B. Wilson
1424:Merrill M. Flood
1394:John von Neumann
1304:Ariel Rubinstein
1289:Albert W. Tucker
1140:War of attrition
1100:Matching pennies
741:Nash equilibrium
664:Mechanism design
629:Normal-form game
584:Cooperative game
557:
550:
543:
534:
515:
461:
460:
454:
449:
447:
439:
407:
398:
397:
365:
356:
355:
329:
323:
322:
296:
290:
289:
271:
262:
261:
237:
228:
225:
216:
215:
181:
21:
1699:
1698:
1694:
1693:
1692:
1690:
1689:
1688:
1664:
1663:
1662:
1661:
1605:
1600:
1534:
1520:max^n algorithm
1493:
1489:William Vickrey
1449:Reinhard Selten
1404:Kenneth Binmore
1319:David K. Levine
1314:Daniel Kahneman
1281:
1275:
1251:Negamax theorem
1241:Minimax theorem
1219:
1180:Diner's dilemma
1035:All-pay auction
1001:
987:Stochastic game
939:Mean-field game
910:
903:
874:Markov strategy
810:
676:
668:
639:Sequential game
624:Information set
609:Game complexity
579:Congestion game
567:
561:
493:
490:
484:
470:
465:
464:
450:
440:
409:
408:
401:
367:
366:
359:
352:
331:
330:
326:
319:
298:
297:
293:
286:
273:
272:
265:
239:
238:
231:
226:
219:
204:
183:
182:
173:
168:
162:
156:
147:
114:
105:
91:
75:Nash equilibria
49:sequential game
23:
22:
18:Credible threat
15:
12:
11:
5:
1697:
1695:
1687:
1686:
1681:
1676:
1666:
1665:
1660:
1659:
1652:
1645:
1637:
1634:
1633:
1616:
1602:
1601:
1599:
1598:
1593:
1588:
1583:
1578:
1573:
1568:
1563:
1558:
1553:
1548:
1542:
1540:
1536:
1535:
1533:
1532:
1527:
1522:
1517:
1512:
1507:
1501:
1499:
1495:
1494:
1492:
1491:
1486:
1481:
1476:
1471:
1466:
1461:
1456:
1454:Robert Axelrod
1451:
1446:
1441:
1436:
1431:
1429:Olga Bondareva
1426:
1421:
1419:Melvin Dresher
1416:
1411:
1409:Leonid Hurwicz
1406:
1401:
1396:
1391:
1386:
1381:
1376:
1371:
1366:
1361:
1356:
1351:
1346:
1344:Harold W. Kuhn
1341:
1336:
1334:Drew Fudenberg
1331:
1326:
1324:David M. Kreps
1321:
1316:
1311:
1309:Claude Shannon
1306:
1301:
1296:
1291:
1285:
1283:
1277:
1276:
1274:
1273:
1268:
1263:
1258:
1253:
1248:
1246:Nash's theorem
1243:
1238:
1233:
1227:
1225:
1221:
1220:
1218:
1217:
1212:
1207:
1202:
1197:
1192:
1187:
1182:
1177:
1172:
1167:
1162:
1157:
1152:
1147:
1142:
1137:
1132:
1127:
1122:
1117:
1112:
1107:
1105:Ultimatum game
1102:
1097:
1092:
1087:
1085:Dollar auction
1082:
1077:
1072:
1070:Centipede game
1067:
1062:
1057:
1052:
1047:
1042:
1037:
1032:
1027:
1025:Infinite chess
1022:
1017:
1011:
1009:
1003:
1002:
1000:
999:
994:
992:Symmetric game
989:
984:
979:
977:Signaling game
974:
972:Screening game
969:
964:
962:Potential game
959:
954:
949:
941:
936:
931:
926:
921:
915:
913:
905:
904:
902:
901:
896:
891:
889:Mixed strategy
886:
881:
876:
871:
866:
861:
856:
851:
846:
841:
836:
831:
826:
820:
818:
812:
811:
809:
808:
803:
798:
793:
788:
783:
778:
773:
771:Risk dominance
768:
763:
758:
753:
748:
743:
738:
733:
728:
723:
718:
713:
708:
703:
698:
693:
688:
682:
680:
670:
669:
667:
666:
661:
656:
651:
646:
641:
636:
631:
626:
621:
616:
614:Graphical game
611:
606:
601:
596:
591:
586:
581:
575:
573:
569:
568:
562:
560:
559:
552:
545:
537:
531:
530:
523:
516:
506:(3): 281–306.
489:
488:External links
486:
482:
481:
476:
469:
466:
463:
462:
453:|journal=
399:
380:(3): 641–664.
357:
350:
324:
317:
291:
284:
263:
252:(3): 281–306.
229:
217:
202:
170:
169:
167:
164:
155:
152:
146:
143:
113:
110:
104:
101:
90:
87:
60:T.C. Schelling
24:
14:
13:
10:
9:
6:
4:
3:
2:
1696:
1685:
1682:
1680:
1677:
1675:
1672:
1671:
1669:
1658:
1653:
1651:
1646:
1644:
1639:
1638:
1632:
1630:
1626:
1623:article is a
1622:
1617:
1614:
1610:
1597:
1594:
1592:
1589:
1587:
1584:
1582:
1579:
1577:
1574:
1572:
1569:
1567:
1564:
1562:
1559:
1557:
1554:
1552:
1549:
1547:
1544:
1543:
1541:
1539:Miscellaneous
1537:
1531:
1528:
1526:
1523:
1521:
1518:
1516:
1513:
1511:
1508:
1506:
1503:
1502:
1500:
1496:
1490:
1487:
1485:
1482:
1480:
1477:
1475:
1474:Samuel Bowles
1472:
1470:
1469:Roger Myerson
1467:
1465:
1462:
1460:
1459:Robert Aumann
1457:
1455:
1452:
1450:
1447:
1445:
1442:
1440:
1437:
1435:
1432:
1430:
1427:
1425:
1422:
1420:
1417:
1415:
1414:Lloyd Shapley
1412:
1410:
1407:
1405:
1402:
1400:
1399:Kenneth Arrow
1397:
1395:
1392:
1390:
1387:
1385:
1382:
1380:
1379:John Harsanyi
1377:
1375:
1372:
1370:
1367:
1365:
1362:
1360:
1357:
1355:
1352:
1350:
1349:Herbert Simon
1347:
1345:
1342:
1340:
1337:
1335:
1332:
1330:
1327:
1325:
1322:
1320:
1317:
1315:
1312:
1310:
1307:
1305:
1302:
1300:
1297:
1295:
1292:
1290:
1287:
1286:
1284:
1278:
1272:
1269:
1267:
1264:
1262:
1259:
1257:
1254:
1252:
1249:
1247:
1244:
1242:
1239:
1237:
1234:
1232:
1229:
1228:
1226:
1222:
1216:
1213:
1211:
1208:
1206:
1203:
1201:
1198:
1196:
1193:
1191:
1188:
1186:
1183:
1181:
1178:
1176:
1173:
1171:
1168:
1166:
1163:
1161:
1158:
1156:
1153:
1151:
1150:Fair division
1148:
1146:
1143:
1141:
1138:
1136:
1133:
1131:
1128:
1126:
1125:Dictator game
1123:
1121:
1118:
1116:
1113:
1111:
1108:
1106:
1103:
1101:
1098:
1096:
1093:
1091:
1088:
1086:
1083:
1081:
1078:
1076:
1073:
1071:
1068:
1066:
1063:
1061:
1058:
1056:
1053:
1051:
1048:
1046:
1043:
1041:
1038:
1036:
1033:
1031:
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1012:
1010:
1008:
1004:
998:
997:Zero-sum game
995:
993:
990:
988:
985:
983:
980:
978:
975:
973:
970:
968:
967:Repeated game
965:
963:
960:
958:
955:
953:
950:
948:
946:
942:
940:
937:
935:
932:
930:
927:
925:
922:
920:
917:
916:
914:
912:
906:
900:
897:
895:
892:
890:
887:
885:
884:Pure strategy
882:
880:
877:
875:
872:
870:
867:
865:
862:
860:
857:
855:
852:
850:
849:De-escalation
847:
845:
842:
840:
837:
835:
832:
830:
827:
825:
822:
821:
819:
817:
813:
807:
804:
802:
799:
797:
794:
792:
791:Shapley value
789:
787:
784:
782:
779:
777:
774:
772:
769:
767:
764:
762:
759:
757:
754:
752:
749:
747:
744:
742:
739:
737:
734:
732:
729:
727:
724:
722:
719:
717:
714:
712:
709:
707:
704:
702:
699:
697:
694:
692:
689:
687:
684:
683:
681:
679:
675:
671:
665:
662:
660:
659:Succinct game
657:
655:
652:
650:
647:
645:
642:
640:
637:
635:
632:
630:
627:
625:
622:
620:
617:
615:
612:
610:
607:
605:
602:
600:
597:
595:
592:
590:
587:
585:
582:
580:
577:
576:
574:
570:
566:
558:
553:
551:
546:
544:
539:
538:
535:
528:
524:
521:
517:
513:
509:
505:
501:
497:
492:
491:
487:
485:
480:
477:
475:
472:
471:
467:
458:
445:
437:
433:
429:
425:
421:
417:
413:
406:
404:
400:
395:
391:
387:
383:
379:
375:
371:
364:
362:
358:
353:
351:9780128135310
347:
343:
339:
335:
328:
325:
320:
314:
310:
306:
302:
295:
292:
287:
281:
277:
270:
268:
264:
259:
255:
251:
247:
243:
236:
234:
230:
224:
222:
218:
213:
209:
205:
199:
195:
191:
187:
180:
178:
176:
172:
165:
163:
160:
153:
151:
144:
142:
140:
136:
132:
127:
123:
119:
109:
102:
95:
88:
86:
84:
80:
76:
72:
69:, whenever a
68:
63:
61:
56:
54:
50:
46:
42:
38:
29:
19:
1629:expanding it
1618:
1444:Peyton Young
1439:Paul Milgrom
1354:Hervé Moulin
1294:Amos Tversky
1236:Folk theorem
947:-player game
944:
869:Grim trigger
503:
499:
483:
444:cite journal
377:
373:
333:
327:
300:
294:
275:
249:
245:
185:
161:
157:
148:
138:
134:
130:
125:
121:
117:
115:
106:
64:
57:
52:
36:
34:
1674:Game theory
1621:game theory
1561:Coopetition
1364:Jean Tirole
1359:John Conway
1339:Eric Maskin
1135:Blotto game
1120:Pirate game
929:Global game
899:Tit for tat
834:Bid shading
824:Appeasement
674:Equilibrium
654:Solved game
589:Determinacy
572:Definitions
565:game theory
301:Game Theory
276:Game Theory
145:Rationality
67:equilibrium
41:game theory
1668:Categories
1205:Trust game
1190:Kuhn poker
859:Escalation
854:Deterrence
844:Cheap talk
816:Strategies
634:Preference
563:Topics of
1389:John Nash
1095:Stag hunt
839:Collusion
428:219374150
394:143987777
212:169075970
45:economics
1530:Lazy SMP
1224:Theorems
1175:Deadlock
1030:Checkers
911:of games
678:concepts
468:See also
53:rational
1282:figures
1065:Chicken
919:Auction
909:Classes
512:1805498
436:1895287
258:1805498
51:that a
510:
434:
426:
392:
348:
315:
282:
256:
210:
200:
1619:This
1020:Chess
1007:Games
508:JSTOR
424:S2CID
390:S2CID
254:JSTOR
208:S2CID
166:Notes
1625:stub
701:Core
457:help
432:SSRN
346:ISBN
313:ISBN
280:ISBN
198:ISBN
71:node
43:and
1280:Key
416:doi
382:doi
338:doi
305:doi
190:doi
120:or
1670::
1015:Go
504:46
502:.
498:.
448::
446:}}
442:{{
430:.
422:.
414:.
402:^
388:.
378:45
376:.
372:.
360:^
344:.
311:.
266:^
250:46
248:.
244:.
232:^
220:^
206:.
196:.
188:.
174:^
98:2.
85:.
35:A
1656:e
1649:t
1642:v
1631:.
945:n
556:e
549:t
542:v
514:.
459:)
455:(
438:.
418::
396:.
384::
354:.
340::
321:.
307::
288:.
260:.
214:.
192::
139:l
135:l
131:r
126:l
122:r
118:l
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.