SI 680 - Contracting and Signaling

Motivation depiction of someone leading another with a carrot

Image courtesy of finsec under a Creative Commons license:BY.

Term:
Winter 2008
Published:
December 22, 2008
Revised:
June 5, 2015

This course is no longer taught at the U-M School of Information. These materials are from an older iteration of the course.

Course prepares you to advise clients or your own organization on the design of contracts and screening policies when one of the parties has an information advantage over the other. For example, students study the design of patent licenses (the licensor knows more about the market), the design of social systems to reduce spam (the spam sender knows more about the content before the recipient decides whether to read), and the design of performance contracts for professional services (e.g., consultants, contract programmers, etc., when the contractor knows more than the employer about her level of effort). This course follows SI 646.

Prerequisite(s): SI 562 & SI 563 or equivalent course in intermediate microeconomics

Instructor: Jeffrey K. MacKie-Mason

dScribe: Kathleen Ludewig

Course Level: Graduate

Course Structure: 3 hour class once a week for 7 weeks

Syllabus

1. COURSE DESCRIPTION

This course is a half-semester module, Incentive-Centered Design: Contracting and Signaling. My goal is to prepare you to advise clients or your own organization on the design of contracts and screening policies when one of the parties has an information advantage over the other. For example, we will study the design of intellectual property licenses (the licensor knows more about the market), and the design of social systems to reduce spam (the spam sender knows more about the content before the recipient decides whether to read).

My teaching objectives are:

  • To provide you with a grounding in the incentive-centered design method­ology.
  • To enable you to derive, manipulate and understand a core set of design principles from the contracting and signaling literature.
  • To enable you to intuitively and quantitatively apply the design principles to the design of real world agreements and information systems.
  • To provide a conceptual framework for thinking about incentive problems facing managers and entrepreneurs.

2. ADMINISTRATION

The weekly schedule is available in CTools under ”Schedule” (and also in a single PDF document in Resources > Admin).

Email: I typically receive over 200 spam, virus and other junk messages a day. If you are sending course related e-mail, you’ll get a response within one business day if you put ”680” somewhere in the subject line. There’s no guarantee of response time otherwise.

Office hours: There is little substitute for a face-to-face conversation about something you find interesting, or confusing. I hold my scheduled office hours in West Hall to make it easier for you to see me.

Course blog discussion items: I will occasionally start discussions in the course blog, available from the CTools menu on the left [1]. Participation in CTools discussion is a STRONGLY ENCOURAGED component of class participation. I value quality over quantity, but as a guideline I will consider one posting per week as ”median” (B+/A-) participation. I will check on discussions at least once a week.

Items in the blog can include continuations of class discussions, interesting examples from the world, or issues about class management, homework questions etc. if you have something urgent concerning class administration, contact me directly. If there is something important for all of you to know I will broadcast it through the class email list.

Phone: I rarely answer the phone (I like to control my interruptions so I can get work done), and I often forget to check voice mail for a few days at a time. Email is a much more reliable way to reach me.

[1] For those of you who weren’t in SI 646, we are going to continue using the blog from that class. Feel free to read and add to old discussions; don’t be confused by the somewhat different subject matter that is already there.

3. COURSE REQUIREMENTS

3.1. Summary and Dates. The requirements for all students are:

  1. Read assignments marked “Mandatory”.
  2. Prepare for case studies before class.
  3. Turn in a one-two page case memo responsive to the case assignment I post, at the start of each week’s class (except the first).
  4. Attend class and participate in discussion.
  5. Two homework assignments (26 March, 18 April).
  6. Submit a written self-evaluation of your participation and performance in this class (21 April).

Your grade will depend 20% on class preparation and participation, 40% on the homework assignments and 40% on the weekly case memos.

3.2. Elaboration. You must come to class prepared for discussion. Some weeks the reading is quite lengthy; other weeks less so. Do not wait until the night before to start. Participation will count towards your grade, and if necessary I will cold-call on you to answer questions and participate in discussion, so you must be prepared. In addition, participation in discussions of class material (and related ideas or applications) in the blog will count towards class participation, in part to offer an alternative to those who have greater difficulty speaking out in a group discussion. ”Median” (from a grading perspective) blog participation is one thoughtful post or comment per week.

Blog participation is not a complete substitute for classroom participation: speaking in a group setting is an important skill to learn. If you find it very difficult to formulate thoughts quickly, I suggest that you prepare comments on some issue in the case or readings before class: there will surely be a time when it will be appropriate to raise that topic. When multiple hands are raised I make an effort to call on those who participate less, so as long as you get your hand up now and then, you will get a chance to speak.

There will be two homework assignments, distributed via CTools. I will either ask you to solve specific problems, or to respond to short questions. For each assignment, I will post my suggested answers after one week. Late assignments will be graded down one letter grade if submitted within one week; you will receive no credit if later than that.

The case memos are a tool to enhance your preparation for each week’s discussion. (Remember what cognitive psychology teaches us about elaboration and depth of processing?) I will not be grading these on writing style, though they need to be coherent for me to review. Bullet points or complete sentences are fine. I will post a case assignment document with each week’s readings that will specify the questions you are to address in your preparation and case memo. Grading will be based on completeness and thoughtfulness of your preparation, not on whether the answers are “correct” (in many instances there will not be a single correct answer).

I prefer that you submit assignments via CTools, but hardcopy is fine too. You may submit the assignments to my mailbox, via CTools, or to my office.

At the end of the semester you must submit a written self-evaluation of your par­ticipation and performance in this class.

4. USEFUL RESOURCES

Here are some useful collections of information if you want to learn more about incentive‐centered design and its applications.

5. POLICY ON ORIGINAL WORK

5.1. Collaboration. I strongly encourage collaboration while working on homework problems, and while discussing and interpreting the reading assignments. Active learning is much more effective than passive. Collaboration will be especially valuable in summarizing the reading materials and picking out the key concepts, and in brainstorming about solution methods for addressing problems. You must, however, write your homework submission on your own, in your own words, before turning it in. MANDATORY: On written submissions, include at the beginning or the end an acknowledgment listing the names of any other students you worked with in preparing for the assignment.

5.2. Plagiarism. All written submissions must be your own, original writing. You may incorporate selected excerpts from publications by other authors, but they must be clearly marked as quotations (using indented block quotation or quotation marks) and must be attributed. If you build on the ideas of prior authors, you must cite their work. You may obtain copy editing assistance, and you may discuss your ideas with others, but all substantive writing and ideas must be your own or be explicitly attributed to another (including other students). See the Rack‐ham Graduate Student Handbook for the definition of plagiarism, and associated consequences.

6. MUTUAL RESPECT

I will listen respectfully to your ideas, and will respond to any complaints or concerns you raise, with the nature of the response tailored to the nature of the concern.

I will be prepared for class, and will strive to guide you towards learning a large amount of challenging but powerfully useful material.

I will use clear criteria for my grading to the extent possible, and will answer questions you have about how grades were assigned. If you want me to review grading on an assignment, I will do that, but to be fair to all students I will review and re‐grade the entire assignment, not just the question or specific issue to which you draw attention. (If you haven’t learned about how selection biases work yet, now would be a good time to ask me – it’s a very important concept with applications throughout life.)

I expect you to be prepared for class. I expect you to arrive on time (mostly out of respect for your fellow students). I expect you to participate in the discussions I am leading, and not to hold side discussions during class.

I expect you to respect the dignity of your fellow students.

7. Accommodations for students with disabilities

The University Faculty Senate (SACUA) in 2006 endorsed the following language for inclusion on course syllabi: If you think you need an accommodation for a disability, please let me know at your earliest convenience. Some aspects of this course, the assignments, the in‐class activities, and the way we teach may be modified to facilitate your participation and progress. As soon as you make me aware of your needs, we can work with the Office of Services for Students with Disabilities (SSD) to help us determine appropriate accommodations. SSD (http://www.umich.edu/~sswd/) typically recommends accommodations through a Verified Individualized Services and Accommodations (VISA) form. I will treat any information you provide as private and confidential.

Learning Objectives

  • To provide you with a grounding in the incentive-centered design methodology
  • To enable you to derive, manipulate and understand a core set of design principles from the contracting and signaling literature
  • To enable you to intuitively and quantitatively apply the design principles to the design of real world agreements and information systems
  • To provide a conceptual framework for thinking about incentive problems facing managers and entrepreneurs

Schedule

7 March, Week 1: Introduction to Contracting and Signaling

Objective: Why does it matter for a transaction or agreement that the two (or more) parties have different information? What are the fundamental issues for structuring transactions or designing agreements when there is asymmetric information?

14 March, Week 2: Hidden Action I

Objective: What is a "hidden action" problem? What constraints does hidden action impose on agreements between self-interested individuals and organizations? What general design principles do we know for contracts in this situation?

21 March, Week 3: Hidden Action II: Principles for Incentive Design

Objective: Most professional jobs involve elements of hidden action. What design principles are there for compensation schemes that ameliorate this problem?

26 March: Assignment 1 Due, 12 noon

 

28 March, Week 4: Hidden Information I

Objective: Sometimes one party to a transaction or agreement cannot directly observe, or at least not verify to a third party, quality or knowledge or other relevant information about the other party to the agreement. What implications does “hidden information” have for the terms and conditions of agreements (e.g., professional service or consulting contracts)? How should licensees structure licenses to obtain technology when they know less about the quality of the technology and how to use it than does the licensor?

4 April, Week 5: Hidden Information II: Application

Objective: We will apply the analysis of hidden information problems to three useful applications: versioning information goods (e.g., student, home and professional versions of software); auction design; and software licensing.

11 April, Week 6: Signaling and Screening

Objective: Sometimes a party to an agreement or transaction would like to make known his or her hidden information (e.g., if she very high quality), but there are no direct ways to verify that information. How might a high quality type signal her quality? How might an email recipient set up a screen that induces senders to reveal whether they are sending spam?

18 April: Assignment 2 Due 12 noon

Reading List

The following book is available at the campus bookstores: Ines Macho-Stadler and J. David Perez-Castrillo, An Introduction to Economics of Information: Incentives and Contracts, 2nd ed. (Oxford University Press, 2001)

Abbreviations:

MS-PC: Macho-Stadler and Perez-Castrillo
CT: CTools
UR: University Reserves (electronically available from “Library Reserves” tool in CTools)
JSTOR: http://www.jstor.org (if you are off the campus network, use the UM library proxy server).

7 March, Week 1: Introduction to Contracting and Signaling

Objective: Why does it matter for a transaction or agreement that the two (or more) parties have different information? What are the fundamental issues for structuring transactions or designing agreements when there is asymmetric information?

Mandatory Read:

  1. Pratt, John W. and Richard J. Zeckhauser, "Principals and Agents: An Overview", in Principals and Agents: The Structure of Business, J. W. Pratt and R. J. Zeckhauser, eds. (Harvard Business School Press, 1985), pp. 1-24 (UR)
  2. MS-PC ch. 1-2
  3. JMM, “Brief introduction to constrained optimization” (CT)

Mandatory Case: When is information strategically critical?

    Karlgaard, Rich (2005), “Winning – It’s all about Information”, Forbes.com, 24 October 2005. (CT)
14 March, Week 2: Hidden Action I

Objective: What is a "hidden action" problem? What constraints does hidden action impose on agreements between self-interested individuals and organizations? What general design principles do we know for contracts in this situation?

Mandatory Read:

  1. Milgrom, Paul and John Roberts, Economics, Organization & Management (Prentice-Hall, 1992), ch. 5, pp. 127-149 (UR)
  2. MS-PC ch. 3, pp. 37-46, 49-57

Supplementary Read:

  1. Milgrom, Paul and John Roberts, Economics, Organization & Management (Prentice-Hall, 1992), ch. 6 Appendix, pp. 200-203 (UR)
  2. MS-PC, ch. 3 (remainder)

Mandatory Case: Start-ups

1. Ferguson, Charles H. (1999). High St@kes, No Prisoners: A Winner's Tale of Greed and Glory in the Internet Wars. (Crown Business). Ch. 3 (Introduction optional)

21 March, Week 3: Hidden Action II: Principles for Incentive Design

Objective: Most professional jobs involve elements of hidden action. What design principles are there for compensation schemes that ameliorate this problem?

Mandatory Read:

  1. Eisenhardt, K. (1989). “Agency Theory: An Assessment and Review”. Academy of Management Review, 14(1), 57-74. (CT)
  2. Milgrom, Paul and John Roberts, Economics, Organization & Management (Prentice-Hall, 1992), ch. 7, pp. 214-236
  3. MS-PC ch. 3, pp. 66-68

Supplementary Read:

1. Jensen, M. and K. Murphy (1990). "Performance Pay and Top-Management Incentives", Journal of Political Economy, 98:225-64. (JSTOR) (CT)

Mandatory Case: Billable hours

  1. Lerer, L. (2008), “The Scourge of the Billable Hour”, Slate (2 January). Available from: http://www.slate.com/id/2180420/. (CT)
  2. Turow, S. (2007), “The Billable Hour Must Die”, ABA Journal (August). Available from: http://www.abajournal.com/magazine/the_billable_hour_must_die/. (CT)

26 March: Assignment 1 Due, 12 noon

28 March, Week 4: Hidden Information I

Objective: Sometimes one party to a transaction or agreement cannot directly observe, or at least not verify to a third party, quality or knowledge or other relevant information about the other party to the agreement. What implications does “hidden information” have for the terms and conditions of agreements (e.g., professional service or consulting contracts)? How should licensees structure licenses to obtain technology when they know less about the quality of the technology and how to use it than does the licensor?

Mandatory Read:

1. MS-PC pp. 103-116

Supplementary Read:

1. Mussa, M. and S. Rosen (1978). "Monopoly and Product Quality", Journal of Economic Theory

18: 301-17. (CT)

2. MS-PC pp. 157-60

Mandatory Case: Patent Licensing / Tech Transfer

  1. MS-PC pp. 149-153
  2. The New York Times (2006), “Microsoft Offers to Assist Rivals”, 23 March 2006 (CT)
4 April, Week 5: Hidden Information II: Application

Objective: We will apply the analysis of hidden information problems to three useful applications: versioning information goods (e.g., student, home and professional versions of software); auction design; and software licensing.

Mandatory Read:

  1. Shapiro, C. and H. Varian (1998). Information Rules (Harvard Business School Press), ch. 3 (UR)
  2. Varian, Hal R. (2001). "Versioning information goods", in B. Kahin and H. Varian, Internet Publishing and Beyond: The Economics of Digital Information and Intellectual Property (MIT Press: Cambridge, Mass.), pp. 190-202. (CT)
  3. MS-PC pp. 168-172

Supplementary Read:

1. Krishna, Vijay (2002). Auction Theory (Academic Press: San Diego), ch. 2 (pp. 13-28).

Mandatory Case: Research in Motion Inc.

1. Alex Frankel, "The Willing Partner", Technology Review, July 2005, pp. 36-38. (CT)

11 April, Week 6: Signaling and Screening

Objective: Sometimes a party to an agreement or transaction would like to make known his or her hidden information (e.g., if she very high quality), but there are no direct ways to verify that information. How might a high quality type signal her quality? How might an email recipient set up a screen that induces senders to reveal whether they are sending spam?

Mandatory Read:

1. MS-PC pp. 185-198, 209-210

Supplementary Read:

  1. John G. Riley (2001), "Silver Signals: Twenty-Five Years of Screening and Signaling", Journal of Economic Literature, XXXIX:2 (June): 432-478. (CT)
  2. Chiao, B. and J. MacKie-Mason (2006), “Using Uncensored Communication Channels to Divert Spam Traffic”, TPRC Conference. (CT)
  3. Goodman, J., Cormack, G. V., and Heckerman, D. 2007. “Spam and the ongoing battle for the inbox.” Commun. ACM 50, 2 (Feb. 2007), 24-33. DOI= http://doi.acm.org/10.1145/1216016.1216017 (CT)
  4. Loder, Thede, Marshall Van Alstyne, and Rick Wash (2006). "An Economic Solution to Unsolicited Communications", Advances in Economic Analysis and Policy. (CT)

Mandatory Case: Manipulating Digg.com

  1. Hung, Anthony Richard (2006), “A Brief History of the Digg Controversy”, Deep Jive Interests, http://www.deepjiveinterests.com/2006/08/25/a-brief-history-of-digg-cont.... Accessed 5 April 2008.
  2. Silicon Valley Sleuth (2006), “Could Digg be used for Sun stock manipulation?”, Silicon Valley Sleuth,

http://www.siliconvalleysleuth.com/2006/03/digg_is_used_fo.html. Accessed 5 April 2008.

  1. Gray, Michael (2006), “Digg, Sun, and Google the Tale of Market Manipulation,” threadwatch.org, http://www.threadwatch.org/node/5921. Accessed 5 April 2008.
  2. Newitz, Annalee (2007), “I bought votes on Digg”, Wired, http://www.wired.com/techbiz/people/news/2007/03/72832.
  3. MacKie-Mason, Jeffrey K. (2007). “Tom Sawyer Production on the Internet: Getting the Good Stuff In, Keeping the Bad Stuff Out,” manuscript, esp. Section 5 (pp. 19-27).

18 April: Assignment 2 Due 12 noon

About the Creators

Jeffrey K. MacKie-Mason portrait

Jeffrey K. MacKie-Mason is dean of the School of Information and Arthur W. Burks Collegiate Professor of Information and Computer Science at the University of Michigan, a professor in the School of Information, a professor in the School of Public Policy, and a professor in the Department of Economics.

MacKie-Mason was also the founding director of the Program for Research on the Information Economy at U-M. He also founded and is the past director of the Socio-Technical Infrastructure for Electronic Transactions (STIET) doctoral fellowship program.

MacKie-Mason is well known for his pioneering work on the economics of the Internet. He also works on the economics of other information technologies and of competition in high-technology markets. His recent work focuses on the economics of information content and usage, including projects on spam reduction, peer-to-peer resource sharing, and incentives to increase information security. He was the research director for the first large-scale field experiment on electronic commerce for electronic access to scholarly journals (PEAK).

  • Ph.D. Economics, MIT, 1986
  • Master of Public Policy, University of Michigan, 1982
  • A.B. Environmental Policy, Summa Cum Laude, Dartmouth College, 1980
Motivation depiction of someone leading another with a carrot

Image courtesy of finsec under a Creative Commons license:BY.

Term:
Winter 2008
Published:
December 22, 2008
Revised:
June 5, 2015

Syllabus

Document Title Creator Downloads License

Syllabus

Jeffrey K. MacKie-Mason

Case Studies

Document Title Creator Downloads License

Week 01 Case Study: When is Information Strategically Critical? (Assignment)

Jeffrey K. MacKie-Mason

Week 02 Case Study: Venture Capital Contracting (Assignment)

Jeffrey K. MacKie-Mason

Week 04 Case Study: Tech Transfer Licensing (Assignment)

Jeffrey K. MacKie-Mason

Week 04 Case Study: Tech Transfer Licensing (Notes)

Jeffrey K. MacKie-Mason

Week 05 Case Study: RIM Software Licensing (Assignment)

Jeffrey K. MacKie-Mason

Week 05 Case Study: RIM Software Licensing (Key)

Jeffrey K. MacKie-Mason

Week 06 Case Study: Screening Pollution at Digg.com (Assignment)

Jeffrey K. MacKie-Mason

Handouts

Document Title Creator Downloads License

Reading List

Jeffrey K. MacKie-Mason

Week 02 Lecture Notes: Base (Symmetric Information) Model for Contract Theory (ICD)

Jeffrey K. MacKie-Mason

Week 03 Lecture Notes: Hidden Action Contract: Example

Jeffrey K. MacKie-Mason

Week 03 Lecture Notes: Hiden Action I: Contracting Model with Asymmetric Information

Jeffrey K. MacKie-Mason

Week 04 Lecture Notes: Hidden Characteristics I: Base Model

Jeffrey K. MacKie-Mason

Week 04 Lecture Notes: Hidden Characteristics I: Lemons Market Example

Jeffrey K. MacKie-Mason

Week 05 Lecture Notes: Hidden Characteristics II: Versioning

Jeffrey K. MacKie-Mason

Week 06 Lecture Notes: Hidden Characteristics III: Signaling

Jeffrey K. MacKie-Mason

Lectures

Document Title Creator Downloads License

Week 01: Introduction to Incentive Centered Design (ICD)

Jeffrey K. MacKie-Mason

Week 02: Hidden Action I

Jeffrey K. MacKie-Mason

Week 03: Incentive Pay

Jeffrey K. MacKie-Mason

Week 05: Hidden Characteristics: Applications

Jeffrey K. MacKie-Mason

Week 06: Signaling

Jeffrey K. MacKie-Mason
Motivation depiction of someone leading another with a carrot

Image courtesy of finsec under a Creative Commons license:BY.

Term:
Winter 2008
Published:
December 22, 2008
Revised:
June 5, 2015

Week 01: Introduction to Contracting and Signaling

Document Title Creator Downloads License

Week 01 Case Study: When is Information Strategically Critical? (Assignment)

Jeffrey K. MacKie-Mason

Week 01: Introduction to Incentive Centered Design (ICD)

Jeffrey K. MacKie-Mason

Week 02: Hidden Action I

Document Title Creator Downloads License

Week 02 Case Study: Venture Capital Contracting (Assignment)

Jeffrey K. MacKie-Mason

Week 02 Lecture Notes: Base (Symmetric Information) Model for Contract Theory (ICD)

Jeffrey K. MacKie-Mason

Week 02: Hidden Action I

Jeffrey K. MacKie-Mason

Week 03: Hidden Action II: Principles for Incentive Design

Document Title Creator Downloads License

Week 03 Lecture Notes: Hidden Action Contract: Example

Jeffrey K. MacKie-Mason

Week 03 Lecture Notes: Hiden Action I: Contracting Model with Asymmetric Information

Jeffrey K. MacKie-Mason

Week 03: Incentive Pay

Jeffrey K. MacKie-Mason

Week 04: Hidden Information I

Document Title Creator Downloads License

Week 04 Case Study: Tech Transfer Licensing (Assignment)

Jeffrey K. MacKie-Mason

Week 04 Case Study: Tech Transfer Licensing (Notes)

Jeffrey K. MacKie-Mason

Week 04 Lecture Notes: Hidden Characteristics I: Base Model

Jeffrey K. MacKie-Mason

Week 04 Lecture Notes: Hidden Characteristics I: Lemons Market Example

Jeffrey K. MacKie-Mason

Week 05: Hidden Information II: Application

Document Title Creator Downloads License

Week 05 Case Study: RIM Software Licensing (Assignment)

Jeffrey K. MacKie-Mason

Week 05 Case Study: RIM Software Licensing (Key)

Jeffrey K. MacKie-Mason

Week 05 Lecture Notes: Hidden Characteristics II: Versioning

Jeffrey K. MacKie-Mason

Week 05: Hidden Characteristics: Applications

Jeffrey K. MacKie-Mason

Week 06: Signaling and Screening

Document Title Creator Downloads License

Week 06 Case Study: Screening Pollution at Digg.com (Assignment)

Jeffrey K. MacKie-Mason

Week 06 Lecture Notes: Hidden Characteristics III: Signaling

Jeffrey K. MacKie-Mason

Week 06: Signaling

Jeffrey K. MacKie-Mason