Next Article in Journal
Self-Enforcing Collective Counterterror Retaliation
Previous Article in Journal
Weighted Scoring Committees
Previous Article in Special Issue
Consensus towards Partially Cooperative Strategies in Self-Regulated Evolutionary Games on Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Information Sharing in Oligopoly: Sharing Groups and Core-Periphery Architectures †

1
School of Business, University of Leicester, University Rd., Leicester LE1 7RH, UK
2
Royal Holloway, University of London, London WC1E 7HU, UK
*
Author to whom correspondence should be addressed.
This paper is a revised version of the Working paper no. 16008, ISSN 1827-3580, Università Ca’ Foscari di Venezia.
Submission received: 9 July 2021 / Revised: 13 December 2021 / Accepted: 13 December 2021 / Published: 17 December 2021
(This article belongs to the Special Issue Game Theory in Social Networks)

Abstract

:
The trade-off between the costs and benefits of disclosing a firm’s private information has been the object of a vast literature. The absence of incentives to share information on a common market demand prior to competition has been advocated to interpret information sharing as evidence of collusion. Recent contributions have looked at bilateral information sharing, showing that information sharing is consistent with pairwise stability, This paper studies the networked pattern of bilateral information sharing on market demand, focusing on the role of heterogeneous information (firms’ signals have different variances). We show that while pairwise stability predicts that i.i.d. signals are always shared in groups with a symmetric internal structure (both with and without side-payment and linking costs), heterogeneous signals are shared in asymmetric core-periphery architectures, in which “core” firms have more valuable information than periphery firms.
JEL Classification:
D43; D82; D85; L13

1. Introduction

In the recent economics literature, networks have been usefully employed to describe the patterns of communication and of diffusion of information among socio-economic agents. In the “connection model”, introduced in the seminal paper by Jackson and Wolinsky [1], agents benefit from the information disclosed by their neighbours and, with decreasing intensity, by the neighbours of their neighbours and so on. This model focuses on the benefits that the receiver of information enjoys. However in many economic applications agents may incur a cost from the disclosure of their own private information. When this is the case, the incentives to exchange information finally depend on the trade-off between these costs and the advantage of receiving new pieces of information in return.
This delicate trade-off has been studied in great detail by the literature on information sharing in oligopolistic markets. In one of the seminal papers of this literature, Vives [2] has shown that Cournot duopolists have no incentive to share private information before competing in quantities, unless they produce highly differentiated products. Other seminal papers have obtained results in the same spirit for markets with more than two firms (see, among others [3,4,5,6] and, more recently, [7]) In terms of economic policy, the absence of incentives to share information prior to competition directly implies that any evidence of information sharing should be interpreted as evidence of collusion, with obvious implication for social welfare (see, for instance, Kuhn and Vives [8] assessment of the EU industry).
All these papers assume that information is disclosed by firms to a centralised agency (e.g., a trade association), which then processes the information and transmits it back to firms.1 Recently, Currarini and Feri [9] have studied information sharing when players make binding exclusive bilateral agreements. In this setting, an information structure is well represented as an undirected network, whose nodes are the players that share information, and whose links are the bilateral sharing agreements. Their analysis applies to general linear quadratic games, and allows for both strategic complements and substitutes. For the specific case of Cournot oligopoly with demand uncertainty, it shows that the conditional correlation of signals may provide Cournot firms with incentives to share information even when products are perfectly homogeneous.
In the present paper we focus on the case of oligopolistic firms with private information on a demand parameter. Oligopolistic markets provide a setting where the networked structure of information is particularly relevant, since firms’ executives can accomplish sharing agreements in informal regular meetings, telephone calls, emails and so on, regardless of firms’ membership in a trade association. As in all papers prior to [9] we assume that signals are conditionally independent, but we allow firms to have heterogeneous information, here modelled in terms of different degree of informativeness of firms’ signals. The research question is how this heterogeneity affects the way in which information is shared and exchanged, that is, the architecture of the information sharing network.
We model market competition by means of a simplified version of the oligopolistic model studied by Gal-Or [6], in which each firm privately observes a piece of a linear demand curve (we further assume that firms observe signals without noise). Before getting to know their private signal, firms can engage in voluntary bilateral arrangements, by which they agree to (truthfully) share their own private information.2
We study the architecture of “pairwise stable” networks (see [1]), that is networks in which no pair of firms would agree to make a new sharing arrangement, and in which no firm wishes to unilaterally discontinue an existing one.3 Although somewhat specific, the additive structure of information we employ allows us to study the case of unconditionally independent signals (a case ruled out under the usual assumption that firms receive a signal form the same prior distribution of a single demand parameter) for which we fully characterise the set of stable networks both for homogeneous and for heterogeneous signals.
More specifically, we find that when signals are i.i.d., information sharing is organised in fully connected components, that is “groups” of firms in which all members’ information becomes common knowledge.4 We also show that when side payments are possible between sharing firms, then only one sharing group forms, within which all information is shared. When information sharing involves an exogenous cost (time, coordination efforts, verification costs, monitoring,…), sharing groups have an incomplete, though regular, internal structure, and information does not become common knowledge within the group. In the case of heterogeneous signals we show that non regular architectures emerge. In particular, core-periphery networks are stable, in which firms with more valuable information are embedded in a densely connected core, while the other firms are located at the periphery of the network.
The paper is organised as follows: Section 2 describes the model. Section 3 contains all the results. Section 4 concludes the paper.

2. The Model

We consider a n-firms oligopolistic market with linear demand and no costs. The size of the market, given by the intercept of the demand function, is the sum of n random variables a 1 ,   a 2 ,   . . . ,   a n plus a deterministic part A:
p ( Q ) = A + a b Q ,
where Q i = 1 n q i is the aggregate produced level in the market, and where a a 1 + a 2 + . . . + a n . The random variables a 1 ,   a 2 ,   . . . ,   a n are independently normally distributed with zero mean and variances σ 11 ,   σ 22 ,   . . . . ,   σ n n .
Each firm i directly observes the random variable a i . Moreover, and before the realisation of these private“signals”, firms can share their private information by means of bilateral contracts. More precisely, any pair of firms i and j can commit to truthfully exchange their private information, in which case firm i gets to observe the realisation of the random variable a j and vice versa. The information structure generated by a set of bilateral sharing contracts can be usefully described by a non directed network.
Given a set N, a non directed network g is defined as any subset of the set of all (unordered) pairs of elements in N:
g i j : i N and j N , i j .
The elements of N are called nodes, and a pair i j g is called a “link”. We denote by N i g = j N : i j g i the neighbourhood of i in g, with cardinality n i g (this cardinality is called “degree” of i). We will denote by g i j the network obtained from g by deleting the link i j g and by g + i j the network obtained from g by adding the link i j g .
The network g is connected if for all pairs i and j in N there exists a connecting path P ( i , j ) , that is, a set i 1 , i 2 , . . . , i k such that i = i 1 , j = i k , and i p i p + 1 g for all p = 1 ,   . . . ,   k 1 .
Given the network g, the network h is a subnetwork of g if h g ; with abuse of notation we denote the set of nodes in h by N h : = { i N : { ( i , 1 ) , . . . , ( i , n ) } h } . We say that h is a component of g if it is connected and if for all i N h and j N h we have i j g . The size of a component h is denoted by n ( h ) , that is, the cardinality of the set N h . A component h is: (i) regular if n i g = n j g i , j N h , that is, all nodes in N h have the same degree, in this case we call n i g the degree of the component, (ii) completely connected if n ( h ) = n i g = i N h , that is, it is regular and its size coincides with its degree.
With some abuse of terminology, we will say that the network g is regular when all its components are regular.

2.1. The Bayesian Cournot Game for a Given Network

After the realisation of the random variables a 1 , a 2 , . . . , a n firms play the Cournot game with incomplete information Γ g , in which the information available to firm i is given by the set of signals it observes, that we denote by a i g . The ex-ante expected profits in such game will determine the incentives of firms to make information sharing arrangements (see next subsection).
A pure strategy for firm i is a function s i : R + n i g R + setting a quantity level for each possible vector of signals observed by i. Let E π i ( s 1 , s 2 , . . . , s n ) | a i g denote the expected profit of firm i in g given a i g and given that quantities are fixed according to the strategy profiles ( s 1 , s 2 , . . . , s n ) . A Bayesian Nash equilibrium of this game Γ g is a profile of strategies ( s i * ) i = 1 , . . . , n such that for all i, for all q i and for all a i g :
E π i ( s i * , s i * ) | a i g E π i ( q i , s i * ) | a i g .

2.2. The Link Formation Stage

Firms arrange sharing contracts before they actually observe their own signals, and anticipate the equilibrium outcome in the Cournot game. Incentives to share information are therefore defined in terms of ex-ante expected profits in alternative networks. We will denote by E i g the expectation of firm i taken over all possible realizations of a i g ; moreover, to keep notation simple, we denote by π i ( a i g ) the expected equilibrium profit E π i ( s i * , s i * ) | a i g of firm i in Γ g given a i g .
The notion of pairwise stable network, first introduced in [1], provides a minimal notion of stability in the link formation process, requiring that no link is added or severed from a stable network.
Definition 1.
The network g is pairwise stable iff:
E i g π i ( a i g ) E i g π i ( a i g i j ) 0 and E j g π j ( a j g ) E j g π j ( a j g i j ) 0 i j g ;
if E i g π i ( a i g + i j ) E i g π i ( a i g ) > 0 then E j g π j ( a j g + i j ) E j g π j ( a j g ) < 0 i j g .
A stronger notion of stability allows each firm to revise any subset of its links (instead of only one link), and any pair of firms to form a new one. This notion of pairwise Nash stability has been sometimes used in the literature (see [12]). We will primarily be concerned with the notion of pairwise stability, which most stresses the bilateral nature of our analysis.5

3. Results

In this section we present the main results starting with how firms use information in a given network. Then we study information sharing first in the case of homogeneous signals (with and without side payments and linking costs) and then we move to the case of heterogeneous signals that allow more complex equilibrium architectures.

3.1. Bayesian Cournot Equilibrium for a Given Network

By standard results on linear Cournot games with incomplete information (see Radner (1962)), equilibrium strategies are affine in signals, that is:
s i ( a i g ) = α i + j N i g β i j a j ,
where α i is the constant term of the equilibrium strategy of firm i, and by β i j the coefficient applied by firm i to each element a j of the vector a i g .
Proposition 1.
Equilibrium parameters are defined by the following set of equations:
β i j = 1 b h N j g i β h j 2 b , j N i g
α i = A b h i α h 2 b .
The proof this and all other results of the paper can be found in the Appendix A. We first note that the α parameters are defined by an independent set of equations, and that they do not depend on the network g. Since the expected values of all signals is zero, this implies that the expected aggregate quantity is the same in each network.
We then observe that the expression for the terms β has intuitive interpretations that highlight the role of the network in shaping equilibrium behaviour. The term β i j (measuring the reaction of firm i to the observed signal a j ) is determined by the use that firm i makes of signal a j to estimate the intercept minus a term that measures the use that other firms make of signal a j , that is, firm i reacts less to signal a j the more numerous are the firms that observe a j and base their decisions on it. Intuitively, the information provided by signal a j is more valuable the less it is observed by other firms—a clear congestion effect on which we will return in the next sections. From (5) we note that for each j, the equilibrium coefficients applied to signal a j by the firms in N j g are determined by an independent set of identical equations, so that β i j = β h j for all i and h in N j g . From (6) α i = α h for all i , h N . These considerations are summarised in the following corollary.
Corollary 1.
Equilibrium parameters are:
β i j = 1 b ( n j g 1 ) , i N a n d j N i g
α i = A b ( n + 1 ) , i N .
We finally determine expected equilibrium profits in Γ g . The following result relates the expected profits of a firm to its equilibrium quantity (see Proposition 1 in [14]).
Lemma 1.
Ex-ante expected profits of firm i in the game Γ g are given by:
E i g π i ( a i g ) = b E i g s i * ( a i g ) 2 .
Since s i * ( a i g ) 2 is a square of a linear function in a i g (i.e., Equation (4)), using the assumption of signals independence and Corollary 1, it follows that ex-ante profits are given by a constant term plus a term that is proportional to the variance of the equilibrium quantities.
Corollary 2.
Ex-ante profits are of firm i in the game Γ g are given by:
E i g π i ( a i g ) = A 2 b ( n + 1 ) 2 + j N i g σ j j b ( n j g 1 ) 2 .
Note that the summatory represents the variance of the equilibrium quantities multiplied by parameter b. Therefore the ex-ante profits of firm i are increasing with the variability of its strategy. It directly follows that the difference in ex-ante profits in two different networks is measured by the difference in the variance of equilibrium quantities.

3.2. Information Sharing When Signals Are Homogeneous

Here we assume that signals have the same variance. For this case the next proposition states necessary and sufficient conditions for a network to be pairwise stable.
Proposition 2.
A network g is pairwise stable if and only if both of the following conditions are verified.
For all i j g
1 ( n j g + 1 ) 2 1 ( n i g ) 2 1 ( n i g + 1 ) 2 ;
1 ( n i g + 1 ) 2 1 ( n j g ) 2 1 ( n j g + 1 ) 2 .
For all i j g :
1 ( 2 + n j g ) 2 > 1 ( 1 + n i g ) 2 1 ( 2 + n i g ) 2
implies 1 ( 2 + n i g ) 2 < 1 ( 1 + n j g ) 2 1 ( 2 + n j g ) 2 .
The intuition behind conditions (10)–(13) can be explained as follows. Conditions (10) and (11) require that no link in a stable network is severed. On the LHS of (10) is the loss to firm i from severing the link i j in terms of i’s equilibrium quantity’s variance; this is measured by the variability of firms i’s strategy with respect to signal a j (see Lemma 1), normalised by the number of firms that see signal a j (the larger this number, the less valuable is signal a j ). This loss in expected profits has to be larger than the gain from severing link i j (RHS); this is measured as the increase in the “value” of signal a i , which in case of severance of link i j is observed by one less firm. Condition (11) requires the same for j. Conditions (12) and (13) requires that no link is added to a stable network. On the LHS of (12) is the gain to firm i from forming the new link in terms of the variability of firm i’s strategy with respect to the newly acquired signal a j ; on the RHS is the net loss in variability due to the fact that one additional firm (firm j) observes signal a i . If the LHS exceeds the RHS for firm i, then the reverse must hold for firm j (condition (13)).
Note that the incentives to form or sever link i j only depend on the degrees of the nodes i and j, and on no other features of the network. In particular, the gain in profit due to a link with node j decreases with the degree of j. It is indeed possible to determine two thresholds in the degree of a node j: the value F ( n i ) above which a node i of degree n i would not maintain the link i j , that is, if n j > F ( n i ) condition (10) is not satisfied; the value f ( n i ) above which a node i of degree n i would not form the new link i j ; that is, if n j > f ( n i ) inequality (12) is not satisfied. These thresholds are formally defined in Lemma A1 in the Appendix A, where we show, together with other properties, that both F and f are increasing in n i , meaning that the incentives of node i to link with a given node j increase with the degree of i.
The next proposition fully characterises the set of pairwise stable networks for the case of i.i.d. signals.
Proposition 3.
Let n 3 . The set of pairwise stable networks contains: the empty network, the complete network, and all networks made of s n 3 isolated nodes and p 1 completely connected components of size n 1 3 , n 2 , . . . , n p such that n i > f ( n i 1 ) for all i = 2 , . . . , p .
The set of pairwise stable networks characterised in Proposition 3 is very large. However, Proposition 3 provides two precise qualitative predictions on how information is shared in equilibrium. First, information sharing is essentially organised in groups (the completely connected components), within which the transmission of information is equivalent to one in which firms publicly disclose their signal to all other firms in the group. This type of public disclosure characterises all previous works on the subject, and is here obtained endogenously as a result of private and bilateral arrangements. Second, information sharing groups must be of different size, to make sure that firms in different groups do not form links (in fact, from point 3.d in Lemma A1 in the Appendix A, firms with similar degree link together).
Now we study two extensions: in the first we allows for side-payments, in the second we impose an exogenous link cost.

3.2.1. Side-Payments

The above definition of pairwise stability implicitly rules out the possibility of side payments between firms which are contingent on the sharing of information. In the presence of such transfers, conditions (2) and (3) would be replaced by the following condition (see [1]):
E i g π i ( a i g ) + E j g π j ( a j g ) E i g π i ( a i g i j ) E j g π j ( a j g i j ) 0 i j g ;
E i g π i ( a i g + i j ) + E j g π j ( a j g + i j ) E i g π i ( a i g ) E j g π j ( a j g ) 0 i j g .
We obtain a more narrow prediction for the case in which firms can agree on side-payments which are contingent on information sharing. In this case, the formation of links that bridge two components is made easier by the sharing of individual gains, and at most one component of information sharing firms can be compatible with stability.
Proposition 4.
When side payments are possible, the set of pairwise stable networks contains: the empty network, the complete network, all networks g made of one completely connected component h of size n ( h ) 3 and n n ( h ) isolated nodes.
So far, all stable structures that differ from the empty network only admitted fully connected components.

3.2.2. Costly Links

Now we study the case in which the formation of a link has a fixed and exogenous cost c, representing all monetary expenditures that a firm bears in order to arrange and execute an information sharing arrangement. Interestingly, in this new setting both market conditions (the slope b of the demand function) and the variance σ of signals turn out to play a role in shaping the incentives of firms to form and sever links. The following new stability conditions are obtained by a minor modification of the proof of Proposition 2: for all i j g :
1 ( n j g + 1 ) 2 + 1 ( n i g + 1 ) 2 1 ( n i g ) 2 b 2 c σ
1 ( n i g + 1 ) 2 + 1 ( n j g + 1 ) 2 1 ( n j g ) 2 b 2 c σ .
For all i j g :
1 ( 2 + n i g ) 2 + 1 ( 2 + n j g ) 2 1 ( 1 + n i g ) 2 > b 2 c σ
implies 1 ( 2 + n j g ) 2 + 1 ( 2 + n i g ) 2 1 ( 1 + n j g ) 2 < b 2 c σ .
A more elastic demand (small b) provides higher incentives to maintain (and to form) links (this is in line with the intuition that more competitive markets, and therefore a lower strategic interdependence of firms, facilitate information sharing—see [15]). These incentives also increase with the variance σ , which has the effect of scaling up the informational gain of new connections. It will be convenient to refer to the gross cost parameter C = b 2 c σ , and refer to the single elements of C only when these provide interesting economic insights.
An interesting question is whether incomplete and stable components can emerge, and, in this case, of which size. For all c 0 , let f C ( n i ) be the value above which a node i of degree n i would not form the new link i j ; that is, if n j > f C ( n i ) condition (18) is not satisfied; and let m 1 ( C ) ( m 2 ( C ) ) be the first integer above (below) the smaller (larger) solution of 2 ( m + 1 ) 2 1 ( m ) 2 C . With this notation we can state the following proposition.
Proposition 5.
Let c > 0 , then the set of pairwise stable networks contains the empty network and all networks made of s n m 1 ( C ) isolated nodes and p 1 regular components h with n ( h ) > m 1 ( C ) . Components h with n ( h ) > m 1 ( C ) have the following characteristics: (i) if n ( h ) m 2 ( C ) are fully connected, otherwise have degree equal to m 2 ( C ) ; (ii) each pair of components h, h with n ( h ) n ( h ) < m 2 ( C ) satisfies n ( h ) > f C ( n ( h ) ) .
Proposition 5 basically sets the upper bound m 2 ( C ) on the degree of a stable completely connected component. Although one may be tempted to understand this as a consequence of the large aggregate cost paid in completely connected components of large size, this is not the case. Indeed, here the decision to sever or maintain a given link only depends on the comparison between the change in payoffs and the marginal cost c. What drives the existence of the upper bound m 2 ( C ) is, instead, the fact that the incentives to maintain a link are decreasing in the degree of the nodes, and larger components fail to be stable as a result. There is therefore an inverse relation between the density of a component (ratio between average degree and size) and its size.

3.3. Sharing Heterogeneous Signals in Core-Periphery Networks

In this section we relax the assumption that signals are identically distributed, and allow the variances of signals (i.e., the parameters a i ) to differ across firms. The stability conditions of Proposition 2 are modified to account for this new source of heterogeneity: the network g is pairwise stable if and only if:
-
for all i j g :
σ j j ( n j g + 1 ) 2 σ i i ( n i g ) 2 σ i i ( n i g + 1 ) 2
σ i i ( n i g + 1 ) 2 σ j j ( n j g ) 2 σ j j ( n j g + 1 ) 2 ,
-
for all i j g :
σ j j ( 2 + n j g ) 2 > σ i i ( 1 + n i g ) 2 σ i i ( 2 + n i g ) 2
implies σ i i ( 2 + n i g ) 2 < σ j j ( 1 + n j g ) 2 σ j j ( 2 + n j g ) 2 .
We see that, given the degrees n i g and n j g , the incentive of i to sever the link i j increases with the ratio of variances σ i i σ j j (conditions (20) and (21)) and the incentive of i to form the link i j decreases with σ i i σ j j (condition (22)). This effect can be understood in terms of the additional variability of i’s equilibrium quantity coming from the link i j . The higher the term σ j j , the higher the additional variability of i’s quantity due to the link i j , and the higher the informational “ value” of j’s signal for firm i. Similarly, the higher the term σ i i , the lower the incentive of firm i to form the link i j ; this because it is more costly to share a signal with higher variance with one additional firm. Again, a high value of σ i i reflects therefore a high informational value of i’s signal.
Note that in this setting of heterogeneous variance, a firm with high variance may not wish to maintain a link (or to form a new one) with another firm with same degree but lower variance. As a consequence, while the empty network is always a pairwise stable information structure (as was proved for the case of i.i.d. signals), the complete network may fail to be stable when firms have significant heterogeneity in variances. However, as the next proposition shows, this can only happen when the number of firms is small.
Proposition 6.
(1) The empty network is pairwise stable for all distributions of variances, even if side payments are possible; (2) There exist configurations of variances for which the complete network is not pairwise stable; (3) For every configuration of variances, there exists a finite number of firms n ¯ such that for all n n ¯ the complete network is pairwise stable.
While we refer to the Appendix A for details, the intuition of this result is clear: when the degree of two nodes increases, their difference in variances becomes less and less relevant in the stability conditions (20) and (21).
We next turn to the existence of pairwise stable networks with non completely connected components. Since signals with large variance possess higher informational value, the incentive to link to firms observing such signals may remain high even when these firms have a large degree. We can therefore envisage stable architectures in which firms with large variance have larger degree than firms with low variance. We show that a special class of incomplete architectures, usually referred to as “core-periphery networks”, can be pairwise stable for suitable distributions of variances. In more detail, core periphery networks present a dense set of interconnected nodes—the core—each linked with all nodes in the network, and sets of peripheral nodes which are internally connected and are linked with the core nodes. Formally, a core-periphery network g consists of a set g 1 , g 2 , . . . . g H of fully connected subnetworks, such that i g k and j g m implies that i j g for all k m such that k 2 , 3 , . . . , H and m 2 , 3 , . . . , H , and such that i g 1 and j g k implies i j g for all k = 1 , 2 , 3 , . . . , H . We call the subnetwork g 1 core (with size n c ), and the subnetworks g 2 , . . . . g H  peripheries. We define a symmetric core-periphery network as one in which all peripheral firms have the same size n p 1 . We also say that peripheries are consecutive in variances if they can be obtained as a consecutive partition of the set of peripheral nodes ordered with respect to variance.
Proposition 7 provides two qualitative features of pairwise stable symmetric core-periphery networks: peripheral firms are organised in groups that are consecutive in variance, and core firms have larger variance than peripheral firms.
Proposition 7.
Every symmetric pairwise stable core periphery network is such that peripheries are consecutive in variances. Moreover, for each given size n p , there exists a finite n such that if n > n then every symmetric pairwise stable core periphery network is such that min i g 1 σ i > max j g g 1 σ j .
Intuitively, core firms observe signals that are publicly observed, and have therefore lower informational value. These signals are more“desirable” the larger their variance, from which the second result in Proposition 7. An example of pairwise stable core periphery network is the following (see Figure 1).
Example 1.
Consider a network with 5 nodes: node 1 is the “core” node, while the two peripheries are 23 and 45 . Variances are σ 1 = 1 , σ 2 = σ 3 = 1 5 , σ 4 = σ 5 = 1 2 . Relevant stability conditions (20)–(23) (for links 12, 15 and 34, respectively) are satisfied:
1 36 + 1 5 1 16 1 25 ; 1 36 + 1 2 1 16 1 25 ; 1 2 + 1 5 1 25 1 5 1 36 .

4. Concluding Remarks

We have studied the incentives of oligopolistic firms to share information on a random demand intercept by means of bilateral contracts. We have assumed that sharing agreements are bilateral, and that firms can revise one sharing agreement at a time. Our results have shown that when the cost of implementing a sharing agreement are not too high and information is symmetric, then sharing occurs in groups or coalitions, within which information is universally disclosed. When costs are high, information is shared “locally” within groups, with each firm disclosing only to a subset of other group members. When information is heterogeneous, then asymmetric sharing architectures arise, where core firms (with less informative signals) share more intensely than periphery firms.
All of our analysis has made the assumption that signals are shared at the ex-ante stage, before private information is revealed to firms. An interesting alternative approach would allow firms to share information at the interim stage, and explore the rich strategic structure of an interim model of information sharing. One possible conjecture would be that in this case the complete network could emerge as the unique stable structure. In a nutshell, the mechanism would go as follows. Given that firms have an incentive to hide good signals and to reveal bad signals, one could suppose that firms adopt a threshold strategy, hiding their private information when it is good (the signal is greater than a given level) and revealing it when it is bad (below that level). Differently from the ex-ante stage, here the disclosure decision is itself informative: when a firm does not reveal, it implicitly signals to possess good information. This would trigger an update of the competitors’ priors upwards. In turns, this update would move the thresholds in the disclosure strategy upwards and, by successive iterations, the threshold would reach the maximum admissible value of the signal, with the total unraveling of information. We leave this important issue for future research.

Author Contributions

Authors have contributed in equal parts to all aspects of the conceptualization and writing of the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Proposition 2.
After the realization of the random variables a 1 , a 1 , …, a n , each firm i N faces the following problem max s i E π i ( s i , s i ) | a i g where E π i ( s i , s i ) | a i g = A + j N i g a j b E j i s j a j g | a i g b s i a i g s i a i g .
The first order condition of the firm’s problem is: s i a i g = A + j N i g a j b E j i s j a j g | a i g 2 b . Replacing
s j a j g by (4) we get s i a i g = A + j N i g a j b E j i α j + h N j g β j h a h | a i g 2 b that is affine in signals in a i g . By algebric manipulation we find the α parameters as all parts that do not depend on signals and β i j as the sum of all terms that multiply by signal a j . □
Proof of Lemma 1.
To explicitly derive the term E i g π i ( a i g ) , consider the equilibrium condition for firm i in the game Γ g :
s i * a i g = A + j N i g a j b E j i s j * a j g | a i g 2 b
which can be rewritten as:
s i * a i g = E A + j N a j b j N s j * ( a j g ) | a i g b = E P ( a , g ) a i g b ,
where P ( a , g ) is the market price given realization a in network g.
The ex-ante expected profit of firm i can therefore be expressed as the expectation of π i ( a i g ) taken over a i g (see (A2)):
E i g E P a , g E P a , g a i g b a i g = E i g E P a , g a i g 2 b = b E i g s i * a i g 2 .
Proof of Proposition 2.
From Lemma 1, ex-ante profits are given by b E i g s i * a i g 2 . Using the relation E x 2 = E x 2 + v a r ( x ) we can write:
E i g π i ( a i g ) = b E i g s i * a i g 2 = b E i g s i * a i g 2 + v a r ( s i * a i g ) .
Since from the definition of equilibrium coefficients and from the fact that all signals have zero mean, we also have that E i g s i * a i g = A b ( n + 1 ) irrespective of the graph structure. Then we can write condition (2) in definition 1 (the difference between the profits of firm i in graphs g and g = g i j , for i j g ) as the difference in the two variances of equilibrium quantities:
E i g π i ( a i g ) E i g π i ( a i g ) = b v a r ( s i * a i g ) v a r ( s i * ( a i g ) ) .
To obtain an expression for this difference, let us explicitly derive the equilibrium coefficients β i j and α i for this case. Solving conditions (7) and (8) we obtain:
β i j = 1 b n j g + 1 , i N a n d j N i g ;
α i = A b n + 1 i N .
Using (A6) and (A7), the equilibrium quantity of firm i in game Γ g is given by:
s i * a i g = A b ( n + 1 ) + k N i g a k ( n k g + 1 ) b ,
with variance:
v a r s i * a i g = k N i g σ ( n k g + 1 ) 2 b 2 .
For Γ g we obtain:
s i * ( a i g ) = A b ( n + 1 ) + k N i g a k ( n k g + 1 ) b
with variance:
v a r ( s i * ( a i g ) ) = k N i g σ ( n k g + 1 ) 2 b 2 .
The only two terms that are different in the sums of the above expressions of variances are those that concern signals j and i. Using the fact that n i g = n i g 1 we obtain that:
v a r ( s i * ( a i g ) ) v a r ( s i * ( a i g ) ) = σ b 2 1 ( n j g + 1 ) 2 + 1 ( n i g + 1 ) 2 1 ( n i g ) 2 .
The conditions for the link i j not to be severed from g are therefore (10) and (11).
We now turn to the condition for the link i j g not to be formed. Firm i has an incentive to form i j inducing the network g = g + i j if
v a r ( s i * ( a i g ) ) v a r ( s i * ( a i g ) ) > 0 .
Stability requires that if (A13) holds then:
v a r ( s i * ( a i g ) ) v a r ( s i * ( a i g ) ) < 0 .
Using again the expression for variances and the fact that n i g = n i g + 1 we obtain conditions (12) and (13). □
Lemma A1.
1. 
Let
F ( n i ) = n i 2 ( 1 + n i ) 2 1 + 2 n i 1
and suppose i j g , then player i has an incentive to sever link i j if and only if n j > F ( n i ) .
2. 
Let
f ( n i ) = n i + 1 2 ( 2 + n i ) 2 2 n i + 3 2
and suppose i j g , then player i has no incentive to form link i j if and only if n j > f ( n i ) .
3. 
Moreover the following properties hold:
(a) 
F ( n i ) and f ( n i ) are strictly increasing.
(b) 
F ( n i ) 1 = f ( n i 1 ) .
(c) 
F ( n i ) F ( n i 1 ) > 1 .
(d) 
n i f ( n i ) if and only if n i 2 and n i F ( n i ) if and only if n i 3 .
(e) 
F ( n i ) < f ( n i ) for all n i 2 .
Proof of Lemma A1.
Part 1: The condition such that player i has not incentive to sever a link i j g is given in (10). Solving it by n j we obtain n j n i 2 ( 1 + n i ) 2 1 + 2 n i 1 = F ( n i ) .
Part 2: The condition such that player i has incentive to form a link i j g is given in (12). Solving it by n j we obtain n j n i + 1 2 ( 2 + n i ) 2 2 n i + 3 2 = f ( n i ) .
Part 3: Point (a) is implied by the fact that the RHS of (A15) and (A16) are increasing in n: their derivatives are always positive for all n. To prove point (b), consider the equations defining F ( n ) and f ( m ) , respectively:
1 n 2 1 ( 1 + n ) 2 = 1 ( 1 + F ( n ) ) 2
1 ( 1 + m ) 2 1 ( 2 + m ) 2 = 1 ( 2 + f ( m ) ) 2
The LHS of (A17) and of (A18) coincide for all m = n 1 . It follows that also the RHS must coincide for such values, and this happens when f ( n 1 ) = F ( n ) 1 . Point (c): For n = 2 we obtain:
F ( n ) F ( n 1 ) = 36 5 4 3 > 1 .
We then compute the derivative d d n F ( n ) F ( n 1 ) , that it is positive for all value n > 2 . Point (d): Simple algebraic manipulation of conditions (A15) and (A16). Point (e): Directly from (b) and (c). □
Proof of Proposition 3.
Let g be pairwise stable network. (i) We first show that only regular networks can be pairwise stable. Let h be a non regular component of g. Consider now the node with maximal degree i, and let j be such that n i g > n j g and i j h (such link must exist for at least one node with maximal degree). This means that there exists some node k j such that i k h and j k h . By point (1) in Lemma A1 pairwise stability of g imposes the following requirements on the degrees of nodes i, j and k:
n k g F ( n i g ) and n i g F ( n k g ) ;
n j g F ( n i g ) and n i g F ( n j g ) .
Note now that since n i g > n j g , then n i g 1 n j g (remember that degrees are integers, then n i g 1 n j g ). This, together with (A19), implies n j g F ( n k g ) 1 . This together with point 3(b) in Lemma A1 implies n j g f ( n k g 1 ) and finally, by point 3(a) in Lemma A1, we conclude that n j g < f ( n k g ) . It means that player k has incentive to form link j k . For g to be stable, link j k should not form, therefore stability conditions require that player j has no incentive to form link j k , that is n k g > f ( n j g ) . This together with n k g n i g , imply that n i g > f ( n j g ) ; using (A20) we obtain that f ( n j g ) < F ( n j g ) , contradicting point 3(e) of Lemma A1. (ii) Now we show that the components in g must be either of size at least 3 and completely connected or isolated nodes. Consider a regular and not completely connected component h with n ( h ) 3 , then 3 n i g < n ( h ) i N h ; by point 3(d) in Lemma A1, n i g f ( n i g ) for all i N h ; by point (2) in Lemma A1, every i N h has an incentive to form a link with any other j N h / i . Now consider a regular and completely connected component h with n ( h ) 3 then n i g = n ( h ) i N h . By point 3(d) of Lemma A1, n i g F ( n i g ) , then by point (1) in Lemma A1 each i N h has not incentive to sever a link i j h . Therefore we can conclude that all components in g with size at least 3 must be completely connected. Suppose a component h with n ( h ) = 2 , then n i g = 2 i N h ; by point 3(d) of Lemma A1 F ( n i g ) < n i g i N h , then by point (1) in Lemma A1 all i N h have an incentive to sever a link i j h . Suppose an isolated player i. By point 3(d) in Lemma A1 f ( 1 ) < 1 , then by point (2) in Lemma A1, player i has not incentive to form any link. A direct implication of these results is that the complete network and the empty network are both stable. (iii) Now we show that if h , h g are completely connected components of size n ( h ) n ( h ) 3 , then f ( n ( h ) ) < n ( h ) . Note that n i g = n ( h ) i N h and n i g = n ( h ) i N h . Suppose f ( n ( h ) ) > n ( h ) then, by point 2 in Lemma A1, all i N h have an incentive to form a link with any player j N h . Therefore stability conditions require that each player j N h has not incentive to form a link with any player i N h , that is f ( n ( h ) ) < n ( h ) . It implies that f ( n ( h ) ) > n ( h ) > n ( h ) > f ( n ( h ) ) , that is f ( n ( h ) ) > f ( n ( h ) ) a contraddiction with point 3(a) in Lemma A1. This result implies that in g any pair of completely connected component of size at least 3 (say h and h , n ( h ) n ( h ) ) must satisfy f ( n ( h ) ) < n ( h ) . A direct implication of this result is that in g cannot be two components of equal size. □
Proof of Proposition 4.
Note that all unstable networks due the formation of new link studied in proof Proposition 3 remain unstable with side payments, then we can restrict to all other cases: if in the networks described in Proposition 3 new links form and if components of size 2 are stable. Let g be pairwise stable network. Consider two agents i , j N with degree, respectively, m and n and suppose i j g . Using the same steps in the proof of Proposition 2, condition () can be written as:
1 m + 2 2 1 n + 1 2 + 1 n + 2 2 + 1 n + 2 2 1 m + 1 2 + 1 m + 2 2 0
Arranging the LHS we get:
m 2 2 2 + 3 m + m 2 2 + n 2 2 2 + 3 n + n 2 2 0
By direct computation we can see that condition (A22) is not satisfied if m 2 and n 2 ; in addition, for n = 1 (A22) is satisfied for all m 1 . These results imply that: (i) in network g cannot be incomplete components; (ii) in network g cannot be separate fully connected components of size at least 3; (iii) in network g can stay isolated nodes. The proof of the results in proposition directly follows. □
Proof of Proposition 5.
Among two agents, say i and j, the incentive to form a new link i j or no to sever link i j , is larger for the agent with larger degree. Indeed the incentive for agent i to form link i j is larger that for agent j if: 1 n j + 2 2 + 1 n i + 2 2 1 ( n i + 1 ) 2 > 1 n i + 2 2 + 1 n j + 2 2 1 ( n j + 1 ) 2 , that is satisfied for n i > n j . This result allows us to consider stability conditions only for the firm with smaller degree.
With this result in hand, we first show that only regular networks can be pairwise stable. Let g be pairwise stable network and h be a non regular component of g. Consider now the node with maximal degree i, and let j be such that n i g > n j g and i j h . This means that there exists some node k j such that i k h , j k h and n i g n k g The pairwise stability of g imposes the following requirements on the degrees of nodes i, j and k:
1 n i + 1 2 + 1 n j + 1 2 1 n j 2 C
1 n i + 1 2 + 1 n z + 1 2 1 n z 2 C
and either
1 n z + 2 2 + 1 n j + 2 2 1 ( n j + 1 ) 2 < C
or
1 n j + 2 2 + 1 n z + 2 2 1 ( n z + 1 ) 2 < C
or both. Note that (A26) is not compatible with (A24): 1 n i + 1 2 1 n j + 2 2 and 1 n z + 2 2 1 ( n z + 1 ) 2 > 1 n z + 1 2 1 n z 2 n z 1 . Therefore for stability we have to check the case in which (A26) is unsatisfied and (A25) is satisfied. It is possible if and only if n z < n j , but this implies that (A25) is not compatible with (A23). Secondly we show that in a pairwise stable network a subset M N of agents could be isolated nodes. To prove it is enough to note that this is possible when c = 0 (see Proposition 3) and it is due to the negative incentive of isolated nodes to form any link. When c > 0 these incentives reduce. Third, we prove that for each C there exist integers m 1 ( C ) 4 and m 2 ( C ) 4 such that two firms with equal degree m have an incentives to maintain their link if and only if m 1 ( C ) m m 2 ( C ) . As a consequence, for all m in this range, two firms with degree m 1 have an incentive to form a link. To see this, note that the stability condition (16) can be rearranged as follows:
2 ( m + 1 ) 2 1 ( m ) 2 C .
The LHS of expression (A27), when defined on the set of integers, reaches a maximum at m = 4 , and is increasing for m 3 and decreasing for m 4 . The values m 1 ( C ) and m 2 ( C ) are the first integers above and below the smaller and larger solutions of (A27) taken with equality, respectively. Suppose a regular component h with degree m, then: (a) if n ( h ) < m 1 ( C ) then m < m 1 ( C ) ; directly follows that all firms have incentives to sever links; (b) if m 1 ( C ) n ( h ) m 2 ( C ) and (i) m < m 1 ( C ) then all firms have an incentive to sever one link; (ii)  n ( h ) > m m 1 ( C ) , then all pairs of firms have an incentive to form one link; (iii) n ( h ) = m component h is pairwise stable (and completely connected); (c) if n ( h ) m 2 ( C ) and (i) m < m 2 ( C ) , then all pairs of firms have an incentive to form one link; (ii) m > m 2 ( C ) then all firms have an incentive to sever one link; (iii) m = m 2 ( C ) component h is pairwise stable (and no completely connected).
Finally consider two completely connected components h and h such that n ( h ) = n , n ( h ) = m and m 1 ( C ) n m < m 2 ( C ) . By previous results no agent has incentive to sever one link. Then any agent in h has not incentive to form a link with any other agent in h if: 1 m + 2 2 + 1 n + 2 2 1 n + 1 2 < C ; by algebric manipulation we get m > n + 1 2 ( 2 + n ) 2 2 n + 3 + n + 1 2 ( 2 + n ) 2 C f c n
Proof of Proposition 6.
(1) Consider an empty network. A link i j will form only if both agents i and j have incentive to form it. Agent i has an incentive to form a link i j if condition (22) is satisfied, that is, σ j j 9 + σ i i 9 σ i i 4 > 0 , that implies σ j j σ i i > 5 4 ; by the same steps we find that agent j has an incentive to form this link only if σ i i σ j j > 5 4 . It is directly verifiable that both conditions are uncompatible. Now suppose that side payments are possible. In this case a new link will form if and only the change in aggregate payoff of agents i and j is positive, that is, 2 σ j j 9 + σ i i 9 σ j j 4 σ i i 4 > 0 , which is never verified for all values of σ j j and σ i i .
(2 and 3) From (20), the condition for firm i to maintain the link i j in the complete network g is:
σ i i σ j j n 2 1 + 2 n .
To prove (2) we note that for a given n can exist variances σ i i and σ j j such that (A28) is not verified. To prove (3) we note that the RHS of (A28) grows without bound with n, implying that, for given σ i i and σ j j , (A28) would be satisfied for n large enough. □
Proof of Proposition 7.
Let us first show that peripheral components are consecutive in variances. Consider components h k and h k + 1 of size n p . By the structure of a symmetric core-periphery network, the degree of each node in these components is n p + n c . Let j be the firm with highest variance in h k and let l be the firm with lowest variance in h k . For firm j not to sever the link j l we need:
σ j j n p + n c 2 σ j j + σ l l n p + n c + 1 2 .
Suppose now that there exists firm i h k + 1 such that σ i i < σ j j . We show that in this case σ i i < σ l l . In order for firm j not to form a link with firm i wee need:
σ j j m + n c + 1 2 > σ j j + σ i i m + n c + 2 2 .
Conditions (A29)–(A30) imply:
m + n c + 1 2 m + n c + 1 2 m + n c + 2 2 m + n c 2 < σ j j + σ l l σ j j + σ i i .
If σ i i σ l l we have that
m + n c + 1 2 m + n c + 1 2 m + n c + 2 2 m + n c 2 1
which is never satisfied.
Let us next show that for n large enough the core firm with lowest variance (say σ c c ) has higher variance than the peripheral firm with highest variance (say σ j j ). The condition for firm j not to sever the link j c is:
σ j j m + n c 2 σ j j m + n c + 1 2 + σ c c n + 1 2 .
After some manipulation of (A33) we obtain the following condition:
σ c c σ j j n + 1 2 m + 1 2 2 m + 3 m + n c + 1 2 .
As n grows (an keeping m fixed, which requires that the number of peripheral components and/or the size n c grows with n), the term on the LHS of condition (A34) need to grow, and eventually become larger than 1 for a finite value of n. □

Notes

1
A difference is then made whether information is transmitted to all firms independently of their disclosure strategy, or only to firms that disclosed their own private information (exclusive contracts).
2
The assumption that revelation is truthful is crucial to our results. As shown in Ziv [10], if information is not verifiable ex-post, then firms would always lie about their observed signal. However, several studies have pointed out that information on a common demand shock is based on some hard evidence and is not merely cheap talk (see, for instance, Doyle and Snyder’s [11] study on U.S. car industry). This observation is more relevant the longer is the time horizon over which sharing arrangement are repeated.
3
This notion of stability is admittedly a weak one, in that it does not allow firms to revise more than one link at a time. A stronger notion, called “pairwise Nash stability”, also requires that no firm wishes to revise any subset of its existing links.
4
This result parallels a similar findings in [9], obtained for a different statistical model.
5
An even stronger notion, defined as Strong Stability by Jackson and van den Nouweland [13], would allow any subset S of firms to revise all their link (but not to form new links with firms outside S). Since this notion seems to bring us further away from the spirit of bilateral sharing, we do not consider it in this paper.

References

  1. Jackson, M.O.; Wolinsky, A. A strategic model of social and economic networks. J. Econ. Theory 1996, 71, 44–74. [Google Scholar] [CrossRef]
  2. Vives, X. Duopoly Information Equilibrium: Cournot and Bertrand. J. Econ. Theory 1985, 34, 71–94. [Google Scholar] [CrossRef]
  3. Novshek, W.; Sonnenschein, H. Fulfilled expectations Cournot duopoly with information acquisition and release. Bell J. Econ. 1982, 13, 214–218. [Google Scholar] [CrossRef]
  4. Clarke, R. Collusion and the Incentives for Information Sharing. Bell J. Econ. 1983, 14, 383–394. [Google Scholar] [CrossRef]
  5. Li, L. Cournot oligopoly with information sharing. Rand J. Econom. 1985, 16, 521–536. [Google Scholar] [CrossRef] [Green Version]
  6. Gal-Or, E. Information Sharing in Oligopoly. Econometrica 1985, 53, 329–343. [Google Scholar] [CrossRef]
  7. Raith, M. A General Model of Information Sharing in Oligopoly. J. Econ. Theory 1996, 71, 260–288. [Google Scholar] [CrossRef] [Green Version]
  8. Kühn, K.U.; Vives, X. Information Exchanges among Firms and their Impact on Competition; Office for Official Publications for the European Community: Luxemburg, 1995. [Google Scholar]
  9. Currarini, S.; Feri, F. Information Sharing Networks in Linear Quadratic Games. Int. J. Game Theory 2015, 44, 701–732. [Google Scholar] [CrossRef]
  10. Ziv, A. Information Sharing in Oligopoly: The Truth Telling Problem. Rand J. Econ. 1993, 24, 455–465. [Google Scholar] [CrossRef]
  11. Doyle, M.P.; Snyder, C.M. Information Sharing and Competition in the Motor Vehicle Industry. J. Political Econ. 1999, 107, 1326–1364. [Google Scholar] [CrossRef] [Green Version]
  12. Bloch, F.; Jackson, M.O. Definitions of Equilibrium in Network Formation Games. Int. J. Game Theory 2006, 34, 305–318. [Google Scholar] [CrossRef]
  13. Jackson, M.O.; van den Nouweland, A. Strongly Stable Networks. Games Econ. Behav. 2005, 51, 420–444. [Google Scholar] [CrossRef] [Green Version]
  14. Kirby, A.J. Trade Associations as Information Exchange Mechanisms. Rand J. Econom. 1988, 19, 138–146. [Google Scholar] [CrossRef]
  15. Vives, X. Trade Association Disclosure Rules, Incentives to Share Information and Welfare. Rand J. Econ. 1990, 21, 409–430. [Google Scholar] [CrossRef]
Figure 1. Core-Periphery Network with five nodes.
Figure 1. Core-Periphery Network with five nodes.
Games 12 00095 g001
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Currarini, S.; Feri, F. Information Sharing in Oligopoly: Sharing Groups and Core-Periphery Architectures. Games 2021, 12, 95. https://0-doi-org.brum.beds.ac.uk/10.3390/g12040095

AMA Style

Currarini S, Feri F. Information Sharing in Oligopoly: Sharing Groups and Core-Periphery Architectures. Games. 2021; 12(4):95. https://0-doi-org.brum.beds.ac.uk/10.3390/g12040095

Chicago/Turabian Style

Currarini, Sergio, and Francesco Feri. 2021. "Information Sharing in Oligopoly: Sharing Groups and Core-Periphery Architectures" Games 12, no. 4: 95. https://0-doi-org.brum.beds.ac.uk/10.3390/g12040095

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop