Non-credible threat

(Redirected from Credible threat)

A non-credible threat is a term used in game theory and economics to describe a threat in a sequential game that a rational player would not actually carry out, because it would not be in his best interest to do so.

Illustration that shows the difference between a SPNE and another NE. The blue equilibrium is not subgame perfect because player two makes a non-credible threat at 2(2) to be unkind (U).

A threat, and its counterpart – a commitment, are both defined by American economist and Nobel prize winner, T.C. Schelling, who stated that: "A announces that B's behaviour will lead to a response from A. If this response is a reward, then the announcement is a commitment; if this response is a penalty, then the announcement is a threat."[1] While a player might make a threat, it is only deemed credible if it serves the best interest of the player.[2] In other words, the player would be willing to carry through with the action that is being threatened regardless of the choice of the other player.[3] This is based on the assumption that the player is rational.[1]

A non-credible threat is made on the hope that it will be believed, and therefore the threatening undesirable action will not need to be carried out.[4] For a threat to be credible within an equilibrium, whenever a node is reached where a threat should be fulfilled, it will be fulfilled.[3] Those Nash equilibria that rely on non-credible threats can be eliminated through backward induction; the remaining equilibria are called subgame perfect Nash equilibria.[2][5]

Examples of Non-credible threats

edit
 
Player 2 threatening action A if Player 1 chooses action B is a non-credible threat. This is because if Player 1 chooses action B, Player 2 will choose action B, as this results in a higher payoff than action A for Player 2.

Market Entry Game

edit

An example of a non-credible threat is demonstrated by Shaorong Sun & Na Sun in their book Management Game Theory. The example game, the market entry game, describes a situation in which an existing firm, firm 2, has a strong hold on the market and a new firm, firm 1, is considering entering. If firm 1 doesn’t enter, the payoff is (4,10). However, if firm 1 does enter, firm 2 has the choice to either attack or not attack. If firm 2 attacks, the payoff is (3,3) whereas if firm 2 doesn’t attack, the payoff is (6,6). Given that firm 2’s optimum payoff is firm 1 not entering, it can issue a threat that they will attack if firm 1 enters, to discourage firm 1 from entering the market. However, this is a non-credible threat. If firm 1 does decide to enter the market, the action that is in the best interest for firm 2 is to not attack as this leads to a payoff of 6 for the firm, as opposed to the payoff of 3 from attacking.[1]

Eric van Damme's Extensive Form Game

edit

Eric van Damme's Extensive Form Game demonstrates another example of a non-credible threat. In this game, player 1 has the choice of L or R, and if player 1 chooses R, then player 2 has the choice of l or r. Player 2 can threaten choosing l with a payoff of (0,0) to entice player 1 to choose L with a payoff of (2,2), as this is the highest payoff for player 2. However, this is a non-credible threat as, if player 1 does decide to choose R, player 2 will choose r as their payoff is 1 as opposed to l which has a payoff of 0 for player 2. Given that action l is not in player 2’s best interest, their threat to play that is non-credible.[4]

Rationality

edit

The notion of credibility is contingent on the principle of rationality. A rational player always make decisions that maximise their own utility, however, players are not always rational.[6] Therefore, in real world applications, the assumption that all players will be rational and act to maximise their utility is not practical, thus non-credible threats cannot be ignored.[7]

Experiment using the Beard and Beil Game (1994)

edit

Nicolas Jacquemet and Adam Zylbersztejn conducted experiments based on the Beard and Beil Game to investigate whether people act to maximise their payoffs. From the study Jacquemet and Zylbersztejn found that failure to maximise utility stemmed from two observations: "subjects are not willing to rely on others’ self-interested maximization, and self-interested maximization is not ubiquitous."[8] A key component of the utility maximising strategy in the game was the elimination of non-credible threats, however, the study found that suboptimal payoffs were a direct result of players following through on these non-credible threats.[8] In real world applications, non-credible threats must be considered as there is a high possibility players will not act rationally.[7]


Notes

edit
  1. ^ a b c Sun, Shaorong; Sun, Na (2018). Management Game Theory. doi:10.1007/978-981-13-1062-1. ISBN 978-981-13-1061-4. S2CID 169075970.
  2. ^ a b Heifetz, A., & Yalon-Fortus, J. (2012). Game Theory: Interactive Strategies in Economics and Management. Cambridge University Press. ProQuest Ebook Central
  3. ^ a b Schelling, Thomas C. (1956). "An Essay on Bargaining". The American Economic Review. 46 (3): 281–306. JSTOR 1805498.
  4. ^ a b van Damme, Eric (1989). "Extensive Form Games". In Eatwell, J.; Milgate, M.; Newman, P. (eds.). Game Theory. Palgrave Macmillan. pp. 139–144. ISBN 978-1-349-20181-5.
  5. ^ Harrington, J. E. (1989). "Noncooperative Games". In Eatwell, John; Milgate, Murray; Newman, Peter (eds.). Game Theory. Palgrave Macmillan. pp. 178–184. doi:10.1007/978-1-349-20181-5. ISBN 978-1-349-20181-5.
  6. ^ Monahan, K. (2018). How Behavioral Economics Influences Management Decision-Making: A New Paradigm. Academic Press. doi:10.1016/C2016-0-05106-9. ISBN 9780128135310.
  7. ^ a b Khalil, Elias L. (2011). "Rational, Normative and Procedural Theories of Beliefs: Can They Explain Internal Motivations?". Journal of Economic Issues. 45 (3): 641–664. doi:10.2753/JEI0021-3624450307. S2CID 143987777.
  8. ^ a b Jacquemet, Nicolas; Zylbersztejn, Adam (June 2014). "What Drives Failure to Maximize Payoffs in the Lab? A Test of the Inequality Aversion Hypothesis". doi:10.2139/ssrn.1895287. S2CID 219374150. SSRN 1895287. {{cite journal}}: Cite journal requires |journal= (help)

See also

edit


edit