This paper investigates the design of optimal procurement mechanisms in the presence of corruption. After the sponsor and the contractor sign the contract, the latter may bribe the inspector to misrepresent quality. Thus, the mechanism a¤ects whether bribery occurs. I show how to include bribery as an additional constraint in the optimal-control problem that the sponsor solves, and characterize the optimal contract. I discuss both the case of xed bribes and bribes that depend on the size of the quality misrepresentation, and also uncertainty about the size of the bribe. In all cases, the optimal contract curtails quality not only for low e¢ ciency contractors but also for the most e¢ cient contractors. Implementation is also discussed.
This version: March, 2015
Quantum theory of securities price formation in financial marketsJack Sarkissian
1) The document proposes a quantum theory of price formation in financial markets that does not assume similarities to quantum mechanics. It models price as a probability amplitude whose absolute value squared represents the probability of a given price.
2) A price operator governs security prices and its eigenfunctions represent pure price states while eigenvalues are the price spectrum. Matrix elements of the price operator fluctuate, introducing randomness.
3) The model derives an evolution equation for the probability amplitude from total probability conservation. It represents price dynamics through a matrix exponential solution of the evolution equation.
Auctions for perishable goods such as internet ad inventory need to make real-time allocation
and pricing decisions as the supply of the good arrives in an online manner, without knowing the
entire supply in advance. These allocation and pricing decisions get complicated when buyers
The document discusses key economic concepts related to supply and demand, including:
1) Relative scarcity is determined by the relationship between supply and demand and is accurately measured by price.
2) The laws of supply and demand explain how quantity and price move in relation to each other.
3) An equilibrium price exists where quantity supplied equals quantity demanded, representing efficient allocation of resources. Price controls can create shortages or surpluses and distort market incentives.
Presentation with background and case studies on corruption in the water and sanitation sector. The presentation was developed by John Butterworth as part of the work of IRC International Water and Sanitation Centre for the Water Integrity Network.
The document provides an overview of fraud and bribery issues for charities. It discusses the Bribery Act 2010 and defines what constitutes a bribe. It also summarizes two recent BDO investigations - Project Active involved CEO and FD fraud through improper payments, while Project Florence involved allegations a charity subsidiary obtained a contract through bribery. The document aims to raise awareness of fraud risks charities face and provide guidance on controls and compliance.
This document discusses whether IBM should allow bribery to increase profits. It presents perspectives on how bribery could boost short-term profits but harm long-term reputation and culture. The document also considers the ethical implications of bribery and its potential negative economic effects.
Quantum theory of securities price formation in financial marketsJack Sarkissian
1) The document proposes a quantum theory of price formation in financial markets that does not assume similarities to quantum mechanics. It models price as a probability amplitude whose absolute value squared represents the probability of a given price.
2) A price operator governs security prices and its eigenfunctions represent pure price states while eigenvalues are the price spectrum. Matrix elements of the price operator fluctuate, introducing randomness.
3) The model derives an evolution equation for the probability amplitude from total probability conservation. It represents price dynamics through a matrix exponential solution of the evolution equation.
Auctions for perishable goods such as internet ad inventory need to make real-time allocation
and pricing decisions as the supply of the good arrives in an online manner, without knowing the
entire supply in advance. These allocation and pricing decisions get complicated when buyers
The document discusses key economic concepts related to supply and demand, including:
1) Relative scarcity is determined by the relationship between supply and demand and is accurately measured by price.
2) The laws of supply and demand explain how quantity and price move in relation to each other.
3) An equilibrium price exists where quantity supplied equals quantity demanded, representing efficient allocation of resources. Price controls can create shortages or surpluses and distort market incentives.
Presentation with background and case studies on corruption in the water and sanitation sector. The presentation was developed by John Butterworth as part of the work of IRC International Water and Sanitation Centre for the Water Integrity Network.
The document provides an overview of fraud and bribery issues for charities. It discusses the Bribery Act 2010 and defines what constitutes a bribe. It also summarizes two recent BDO investigations - Project Active involved CEO and FD fraud through improper payments, while Project Florence involved allegations a charity subsidiary obtained a contract through bribery. The document aims to raise awareness of fraud risks charities face and provide guidance on controls and compliance.
This document discusses whether IBM should allow bribery to increase profits. It presents perspectives on how bribery could boost short-term profits but harm long-term reputation and culture. The document also considers the ethical implications of bribery and its potential negative economic effects.
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...Maurizio Bortoletti
It does not seem strange, well, that's about to keep talking for a long time, sometimes with great emphasis to emphasize the decisive importance for the future of the country, but has failed to any concrete results: quite simply, it's about warning because the recruitment and promotion of the most capable introduce an intolerable element of unpredictability in the system and it is an attack on the right of co-optation. Well, that system - recalling Paolo Mancini in "In Praise of the subdivision" - which is like a twin sister, but much more palatable, the proverbial "sora camilla" nobody wants, but if everyone seize, still in the dark and silence, with the exception that denounce the subdivision of others, looking good from admitting that if they purloin some even their place of power but would not have been parcelling exercise of pluralism.
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...Maurizio Bortoletti
This document contains summaries of three articles about corruption from academic journals. The first article discusses corruption in public procurement, specifically capture and extortion of public officials in choosing limited versus open bidding procedures. The second addresses how corruption patterns change with infrastructure privatization, potentially moving from taxpayers to consumers. The third examines the relationship between decentralization of government and corruption, noting mixed theoretical impacts and the need to consider how decentralization is implemented.
Procurement fraud, bribery, and corruption have moved beyond a perceived risk and become a real issue for many organizations. This paper highlights the need for organizations to put the necessary processes in place to protect against procurement fraud. It also serves as a warning that the absence of any visible instances of bribery, fraud, and corruption should be no cause for complacency as instances of successful perpetration may remain hidden for long periods of time.
This article reports results from an experiment studying how fines, leniency and rewards for whistleblowers affect cartel formation and prices. Antitrust without leniency reduces cartel formation but increases cartel prices: subjects use costly fines as punishments. Leniency improves antitrust by strengthening deterrence but stabilizes surviving cartels: subjects appear to anticipate the lower post-conviction prices after reports/leniency. With rewards, prices fall at the competitive level. Overall our results suggest a strong cartel deterrence potential for well-run leniency and reward schemes. These findings may also be relevant for similar white-collar organized crimes, like corruption and fraud.
This paper develops a novel method for detecting auctioneer corruption in first-price sealed-bid
auctions. We study the leakage of bid information by the auctioneer to a preferred bidder. We
construct a formal test for the presence of bid-leakage corruption and apply it to a novel data
set of 4.3 million procurement auctions in Russia that occurred between 2011 and 2016. With
bid leakage, the preferred bidder gathers information on other bids and waits until the end of the
auction to place a bid. Such behavior creates an abnormal correlation between winning and being
(chronologically) the last bidder. Informed by this fact, we build several measures of corruption.
We document that more than 10% of the auctions were affected by bid leakage. Our results imply
that the value of the contracts assigned through these auctions was $1.2 billion over the six-year
study period. We build a model of bidding behavior to show that corruption exerts two effects on
the expected prices of the contracts. The direct effect inflates the price of the contract. The indirect
effect reduces the expected price, since honest bidders are trying to undercut corrupt bidders. We
find both effects in the data, with the direct effect being more pronounced.
The document discusses the author's singing journey from their early childhood experiences singing in talent shows and with their sister, to participating in their first School of Rock program, and now singing on their church's worship team. A friend's encouragement to "dream on, and sing louder" has motivated the author to pursue singing and not let anyone take their voice away. The journey details the progression of the author's involvement with singing over the years from casual singing to actively participating in musical programs and performances.
1) The study examines "second-degree moral hazard" in taxi rides, where drivers may increase fares if they think passengers won't monitor costs due to reimbursement.
2) In a field experiment, researchers took 256 taxi rides in Athens and told drivers in the "moral hazard treatment" that receipts were needed for employer reimbursement.
3) They found this treatment significantly increased overcharging rates, with passengers 13% more likely to pay unjustified higher prices, indicating second-degree moral hazard impacts service markets.
This presentation by Robert Porter (Professor of Economics, Northwestern University, US) was made during a workshop on “Cartel screening in the digital era” held by the OECD in Paris on 30 January 2018. More papers and presentations on the topic can be found out at oe.cd/wcsde.
Project Executing and Monitoring and ControllingDue on Tuesday 0.docxbriancrawford30935
Project Executing and Monitoring and Controlling
Due on Tuesday 06/06/17 11:00 CST
2,500–3,500 words
Your fellow project managers provided you with their thoughts on your tool selection during your weekly working lunch meeting. You have considered them and have developed your schedule, budget, and methods for monitoring and controlling those areas. You must now complete the Project Executing and Project Monitoring and Controlling sections of the Project Management Plan.
USE ATTACHED PROJECT MGT CHARTER-TEMPLATE to reflect the following:
1. Performing quality assurance: Discuss the tools and techniques, such as quality audits, quality management tools, and process analyses, you will use to perform quality assurance for your project.
1. Managing the project team: Determine how you will manage the project team, including handling conflict and providing motivation.
1. Conducting procurements: Discuss any of the items you need to purchase for your project and the types of vendors, contractors, and suppliers you will encounter.
1. Controlling costs: Determine the methods, such as earned value management, forecasting, to-complete performance indices, project management software, and reserve analyses, you will use to ensure costs are controlled within the project.
1. Controlling risks: Discuss the methods you will use to control the risks in the project. These methods can include risk reassessment, risk audits, variance analysis, reserve analysis, meetings, and technical performance measurement.
1. Managing stakeholder engagement: Using the list of stakeholders defined in Unit 1, discuss how you will manage the engagement level of the stakeholders.
Chapter Twenty Nine
Clinical Trials Are Inherently
Exploitative
The Likelihood That They Are Is High
Jamie Carlin VVtitson
I will offer a set of conditions minimally necessary and sufficient for wrongful exploitation and argue that, while inter-
national clinical trials are not inherently wrongfully exploitative, problems with informed consent, the prevalence of
misapplied moral theories among researchers, and the weakness of human moral motivation make it likely that any
particular international clinical trial is wrongfully exploitative.
Introduction
The term exploitation is often used in politically charged
contexts to incite public outrage against some behavior
that the inciter finds offensive (e.g., Walker, 2011).
Some argue that college athletics programs exploit
their athletes, since players' compensation (college
tuition) is far outstripped by the schools' proceeds (e.g.,
Associated Press, 2007; Taylor, 2010). Similarly, some
argue that surrogate motherhood should be legally
prohibited because such a contract would inevitably be
; ¢Xploitative. The difficulty, of course, is that very few
explain what they mean by exploitation, which
'*1akes it difficult to justify such claims. And until
. :ently, moral philosophers have expended little ink
. identify precise.
2000 Word Essay How Long Introduction. Online assignment writing service.Tammy Adams
This document provides instructions for requesting an assignment writing service from HelpWriting.net in 5 steps:
1. Create an account with a password and email.
2. Complete a 10-minute order form with instructions, sources, and deadline.
3. Choose a writer based on their bid, qualifications, history, and feedback.
4. Review the completed paper and authorize payment if satisfied.
5. Request revisions to ensure satisfaction, and the company guarantees original, high-quality content or a full refund.
Fraud Investigation, Prevention and DetectionTareq Obaid
The document summarizes key findings from a study of 2,690 occupational fraud cases reported between 2016-2017. Some key findings include:
- Asset misappropriation was the most common fraud (89% of cases), but financial statement fraud caused the highest median loss ($800,000).
- Over 23% of cases involved more than one fraud type. Corruption often occurred with asset misappropriation.
- Frauds lasted an average of 16 months but duration varied by type, from 6 months for non-cash schemes to 5 years for payroll schemes.
- Tips were the leading detection method (40% of cases), and active detection methods like internal audits found frauds with lower losses.
This document analyzes whether there should be a strict liability regime for harm caused by services, specifically within the medical profession. It begins by examining two models of tort law - the model of wrongs and the model of costs. Depending on how the standard of conduct is interpreted, the model of wrongs does not necessarily support strict liability for services, while the model of costs does. It then analyzes the current strict liability regime for defective products and the justifications for it. It finds problems with the current fault-based system for medical negligence due to the high costs. The document argues that the justifications for strict products liability can also apply to services, and proposes implementing a similar strict liability regime for services that fall below reasonable expectations
This document discusses a paper by Johann Graf Lambsdorff and Mathias Nell about using asymmetric penalties and leniency programs to destabilize corrupt arrangements. The paper argues that corrupt deals are inherently risky due to the threat of opportunism like betrayal or whistleblowing. The authors develop a game theory model to determine which acts should be penalized and which could be granted leniency. They argue that strategically designing criminal sanctions in this way can amplify the risks of corruption and better deter illegal behavior.
This document discusses Islamic risk management and its focus on greater ethics and efficiency in financial markets. It argues that risk management products can be designed based on classical Islamic contract theory to meet both efficiency and ethical concerns. Section 1 introduces the role and goals of financial markets. Section 2 defines norms of efficiency and financial ethics in Islam. Sections 3-6 analyze how derivatives and other risk management tools can be structured in Islamic finance to provide risk mitigation while avoiding issues like riba (interest), gharar (excessive uncertainty), and maysir (gambling). The conclusion is that properly designed Islamic risk management solutions can enhance efficiency without compromising ethical values.
Probably no other topic creates as much apprehension between two companies as trying to
determine a fair price. The conventional procurement process pits buyers and sellers on
opposite sides of the table. Classical negotiations training uses tradeoffs and concessions as
tactics in order to get the best possible price (or preserve as much margin as possible if you
are a supplier). A win for the supplier means a loss for the buyer. The result? A zero-sum
game. A mindset where the parties fight over taking bigger slices of the pie instead of
combining talents to make a bigger pie.
Firms in developing countries often make informal payments to tax officials. These bribes raise the cost of doing business, and the price charged to consumers. To decrease these costs, we design a feedback incentive scheme for business tax inspectors that rewards them according to the anonymous evaluation submitted by inspected firms. We show theoreti- cally that feedback incentives decrease the bribe size, but make firms facing a more inelas- tic demand more attractive for inspectors. A tilted scheme that attaches higher weights to the evaluation of smaller firms limits the scope for targeting and decreases the bribe size to a lesser extent. We test both schemes in a field experiment in the Kyrgyz Republic. Our intervention reduces bribes and average business cost. As a result, the price firms charge to consumers decreases. Since fewer firms substitute bribes for taxes, tax revenues increase. Our results show that firms pass-through bribes to consumers, and that market structure shapes the relationship between firms and tax officials.
Spread, volatility and volume relation in financial markets and market maker'...Jack Sarkissian
Market makers compete for turnover in quoted securities. But does large turnover guarantee maximum profit? Before we can answer that question it is important to understand spread behavior in the first place. This work presents a quantum model, relating spread to measurable microstructural quantities. It explains why it has to be quantum and how trading is connected to price measurement. Having understood spread behavior we apply the model to maximize market maker's profit.
This document discusses three paradigms for analyzing corruption: the economic paradigm, cultural paradigm, and neo-institutional paradigm. The economic paradigm views corruption as rational choices made by individuals based on costs and rewards. The cultural paradigm examines how cultural and social norms influence moral preferences and willingness to break rules. The neo-institutional paradigm considers informal rules and networks that regulate corrupt exchanges even without legal enforcement. The author argues an analysis of corruption requires considering multiple factors and there is no single approach, as it is a complex phenomenon influenced by individual and collective choices.
How can knowledge of types of ‘legal funding’ available for dispute resolutio...Priya Saggar
How can knowledge of types of ‘legal funding’ available for dispute resolution be improved? - Jacqueline Harvey, Underwriter at AmTrust Law discusses with Modern Law Magazine
Insurance today is considered both as a form of security and investment. It gives a sense of assurance to its client- the courage to mitigate unforeseen mayhem in life. But with the influx of fraudulent activities and felony across various industries, the insurance sector stands to be no exception. One of the ways that miscreants try to get money from insurance companies is through Insurance Claims Fraud
Presented by Anastasia Luzgina during the conference "Belarus at the crossroads: The complex role of sanctions in the context of totalitarian backsliding" on April 23, 2024.
Presented by Erlend Bollman Bjørtvedt during the conference "Belarus at the crossroads: The complex role of sanctions in the context of totalitarian backsliding" on April 23, 2024.
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...Maurizio Bortoletti
It does not seem strange, well, that's about to keep talking for a long time, sometimes with great emphasis to emphasize the decisive importance for the future of the country, but has failed to any concrete results: quite simply, it's about warning because the recruitment and promotion of the most capable introduce an intolerable element of unpredictability in the system and it is an attack on the right of co-optation. Well, that system - recalling Paolo Mancini in "In Praise of the subdivision" - which is like a twin sister, but much more palatable, the proverbial "sora camilla" nobody wants, but if everyone seize, still in the dark and silence, with the exception that denounce the subdivision of others, looking good from admitting that if they purloin some even their place of power but would not have been parcelling exercise of pluralism.
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...Maurizio Bortoletti
This document contains summaries of three articles about corruption from academic journals. The first article discusses corruption in public procurement, specifically capture and extortion of public officials in choosing limited versus open bidding procedures. The second addresses how corruption patterns change with infrastructure privatization, potentially moving from taxpayers to consumers. The third examines the relationship between decentralization of government and corruption, noting mixed theoretical impacts and the need to consider how decentralization is implemented.
Procurement fraud, bribery, and corruption have moved beyond a perceived risk and become a real issue for many organizations. This paper highlights the need for organizations to put the necessary processes in place to protect against procurement fraud. It also serves as a warning that the absence of any visible instances of bribery, fraud, and corruption should be no cause for complacency as instances of successful perpetration may remain hidden for long periods of time.
This article reports results from an experiment studying how fines, leniency and rewards for whistleblowers affect cartel formation and prices. Antitrust without leniency reduces cartel formation but increases cartel prices: subjects use costly fines as punishments. Leniency improves antitrust by strengthening deterrence but stabilizes surviving cartels: subjects appear to anticipate the lower post-conviction prices after reports/leniency. With rewards, prices fall at the competitive level. Overall our results suggest a strong cartel deterrence potential for well-run leniency and reward schemes. These findings may also be relevant for similar white-collar organized crimes, like corruption and fraud.
This paper develops a novel method for detecting auctioneer corruption in first-price sealed-bid
auctions. We study the leakage of bid information by the auctioneer to a preferred bidder. We
construct a formal test for the presence of bid-leakage corruption and apply it to a novel data
set of 4.3 million procurement auctions in Russia that occurred between 2011 and 2016. With
bid leakage, the preferred bidder gathers information on other bids and waits until the end of the
auction to place a bid. Such behavior creates an abnormal correlation between winning and being
(chronologically) the last bidder. Informed by this fact, we build several measures of corruption.
We document that more than 10% of the auctions were affected by bid leakage. Our results imply
that the value of the contracts assigned through these auctions was $1.2 billion over the six-year
study period. We build a model of bidding behavior to show that corruption exerts two effects on
the expected prices of the contracts. The direct effect inflates the price of the contract. The indirect
effect reduces the expected price, since honest bidders are trying to undercut corrupt bidders. We
find both effects in the data, with the direct effect being more pronounced.
The document discusses the author's singing journey from their early childhood experiences singing in talent shows and with their sister, to participating in their first School of Rock program, and now singing on their church's worship team. A friend's encouragement to "dream on, and sing louder" has motivated the author to pursue singing and not let anyone take their voice away. The journey details the progression of the author's involvement with singing over the years from casual singing to actively participating in musical programs and performances.
1) The study examines "second-degree moral hazard" in taxi rides, where drivers may increase fares if they think passengers won't monitor costs due to reimbursement.
2) In a field experiment, researchers took 256 taxi rides in Athens and told drivers in the "moral hazard treatment" that receipts were needed for employer reimbursement.
3) They found this treatment significantly increased overcharging rates, with passengers 13% more likely to pay unjustified higher prices, indicating second-degree moral hazard impacts service markets.
This presentation by Robert Porter (Professor of Economics, Northwestern University, US) was made during a workshop on “Cartel screening in the digital era” held by the OECD in Paris on 30 January 2018. More papers and presentations on the topic can be found out at oe.cd/wcsde.
Project Executing and Monitoring and ControllingDue on Tuesday 0.docxbriancrawford30935
Project Executing and Monitoring and Controlling
Due on Tuesday 06/06/17 11:00 CST
2,500–3,500 words
Your fellow project managers provided you with their thoughts on your tool selection during your weekly working lunch meeting. You have considered them and have developed your schedule, budget, and methods for monitoring and controlling those areas. You must now complete the Project Executing and Project Monitoring and Controlling sections of the Project Management Plan.
USE ATTACHED PROJECT MGT CHARTER-TEMPLATE to reflect the following:
1. Performing quality assurance: Discuss the tools and techniques, such as quality audits, quality management tools, and process analyses, you will use to perform quality assurance for your project.
1. Managing the project team: Determine how you will manage the project team, including handling conflict and providing motivation.
1. Conducting procurements: Discuss any of the items you need to purchase for your project and the types of vendors, contractors, and suppliers you will encounter.
1. Controlling costs: Determine the methods, such as earned value management, forecasting, to-complete performance indices, project management software, and reserve analyses, you will use to ensure costs are controlled within the project.
1. Controlling risks: Discuss the methods you will use to control the risks in the project. These methods can include risk reassessment, risk audits, variance analysis, reserve analysis, meetings, and technical performance measurement.
1. Managing stakeholder engagement: Using the list of stakeholders defined in Unit 1, discuss how you will manage the engagement level of the stakeholders.
Chapter Twenty Nine
Clinical Trials Are Inherently
Exploitative
The Likelihood That They Are Is High
Jamie Carlin VVtitson
I will offer a set of conditions minimally necessary and sufficient for wrongful exploitation and argue that, while inter-
national clinical trials are not inherently wrongfully exploitative, problems with informed consent, the prevalence of
misapplied moral theories among researchers, and the weakness of human moral motivation make it likely that any
particular international clinical trial is wrongfully exploitative.
Introduction
The term exploitation is often used in politically charged
contexts to incite public outrage against some behavior
that the inciter finds offensive (e.g., Walker, 2011).
Some argue that college athletics programs exploit
their athletes, since players' compensation (college
tuition) is far outstripped by the schools' proceeds (e.g.,
Associated Press, 2007; Taylor, 2010). Similarly, some
argue that surrogate motherhood should be legally
prohibited because such a contract would inevitably be
; ¢Xploitative. The difficulty, of course, is that very few
explain what they mean by exploitation, which
'*1akes it difficult to justify such claims. And until
. :ently, moral philosophers have expended little ink
. identify precise.
2000 Word Essay How Long Introduction. Online assignment writing service.Tammy Adams
This document provides instructions for requesting an assignment writing service from HelpWriting.net in 5 steps:
1. Create an account with a password and email.
2. Complete a 10-minute order form with instructions, sources, and deadline.
3. Choose a writer based on their bid, qualifications, history, and feedback.
4. Review the completed paper and authorize payment if satisfied.
5. Request revisions to ensure satisfaction, and the company guarantees original, high-quality content or a full refund.
Fraud Investigation, Prevention and DetectionTareq Obaid
The document summarizes key findings from a study of 2,690 occupational fraud cases reported between 2016-2017. Some key findings include:
- Asset misappropriation was the most common fraud (89% of cases), but financial statement fraud caused the highest median loss ($800,000).
- Over 23% of cases involved more than one fraud type. Corruption often occurred with asset misappropriation.
- Frauds lasted an average of 16 months but duration varied by type, from 6 months for non-cash schemes to 5 years for payroll schemes.
- Tips were the leading detection method (40% of cases), and active detection methods like internal audits found frauds with lower losses.
This document analyzes whether there should be a strict liability regime for harm caused by services, specifically within the medical profession. It begins by examining two models of tort law - the model of wrongs and the model of costs. Depending on how the standard of conduct is interpreted, the model of wrongs does not necessarily support strict liability for services, while the model of costs does. It then analyzes the current strict liability regime for defective products and the justifications for it. It finds problems with the current fault-based system for medical negligence due to the high costs. The document argues that the justifications for strict products liability can also apply to services, and proposes implementing a similar strict liability regime for services that fall below reasonable expectations
This document discusses a paper by Johann Graf Lambsdorff and Mathias Nell about using asymmetric penalties and leniency programs to destabilize corrupt arrangements. The paper argues that corrupt deals are inherently risky due to the threat of opportunism like betrayal or whistleblowing. The authors develop a game theory model to determine which acts should be penalized and which could be granted leniency. They argue that strategically designing criminal sanctions in this way can amplify the risks of corruption and better deter illegal behavior.
This document discusses Islamic risk management and its focus on greater ethics and efficiency in financial markets. It argues that risk management products can be designed based on classical Islamic contract theory to meet both efficiency and ethical concerns. Section 1 introduces the role and goals of financial markets. Section 2 defines norms of efficiency and financial ethics in Islam. Sections 3-6 analyze how derivatives and other risk management tools can be structured in Islamic finance to provide risk mitigation while avoiding issues like riba (interest), gharar (excessive uncertainty), and maysir (gambling). The conclusion is that properly designed Islamic risk management solutions can enhance efficiency without compromising ethical values.
Probably no other topic creates as much apprehension between two companies as trying to
determine a fair price. The conventional procurement process pits buyers and sellers on
opposite sides of the table. Classical negotiations training uses tradeoffs and concessions as
tactics in order to get the best possible price (or preserve as much margin as possible if you
are a supplier). A win for the supplier means a loss for the buyer. The result? A zero-sum
game. A mindset where the parties fight over taking bigger slices of the pie instead of
combining talents to make a bigger pie.
Firms in developing countries often make informal payments to tax officials. These bribes raise the cost of doing business, and the price charged to consumers. To decrease these costs, we design a feedback incentive scheme for business tax inspectors that rewards them according to the anonymous evaluation submitted by inspected firms. We show theoreti- cally that feedback incentives decrease the bribe size, but make firms facing a more inelas- tic demand more attractive for inspectors. A tilted scheme that attaches higher weights to the evaluation of smaller firms limits the scope for targeting and decreases the bribe size to a lesser extent. We test both schemes in a field experiment in the Kyrgyz Republic. Our intervention reduces bribes and average business cost. As a result, the price firms charge to consumers decreases. Since fewer firms substitute bribes for taxes, tax revenues increase. Our results show that firms pass-through bribes to consumers, and that market structure shapes the relationship between firms and tax officials.
Spread, volatility and volume relation in financial markets and market maker'...Jack Sarkissian
Market makers compete for turnover in quoted securities. But does large turnover guarantee maximum profit? Before we can answer that question it is important to understand spread behavior in the first place. This work presents a quantum model, relating spread to measurable microstructural quantities. It explains why it has to be quantum and how trading is connected to price measurement. Having understood spread behavior we apply the model to maximize market maker's profit.
This document discusses three paradigms for analyzing corruption: the economic paradigm, cultural paradigm, and neo-institutional paradigm. The economic paradigm views corruption as rational choices made by individuals based on costs and rewards. The cultural paradigm examines how cultural and social norms influence moral preferences and willingness to break rules. The neo-institutional paradigm considers informal rules and networks that regulate corrupt exchanges even without legal enforcement. The author argues an analysis of corruption requires considering multiple factors and there is no single approach, as it is a complex phenomenon influenced by individual and collective choices.
How can knowledge of types of ‘legal funding’ available for dispute resolutio...Priya Saggar
How can knowledge of types of ‘legal funding’ available for dispute resolution be improved? - Jacqueline Harvey, Underwriter at AmTrust Law discusses with Modern Law Magazine
Insurance today is considered both as a form of security and investment. It gives a sense of assurance to its client- the courage to mitigate unforeseen mayhem in life. But with the influx of fraudulent activities and felony across various industries, the insurance sector stands to be no exception. One of the ways that miscreants try to get money from insurance companies is through Insurance Claims Fraud
Similar to Procurement design with corruption (20)
Presented by Anastasia Luzgina during the conference "Belarus at the crossroads: The complex role of sanctions in the context of totalitarian backsliding" on April 23, 2024.
Presented by Erlend Bollman Bjørtvedt during the conference "Belarus at the crossroads: The complex role of sanctions in the context of totalitarian backsliding" on April 23, 2024.
Presented by Dzimtry Kruk during the conference "Belarus at the crossroads: The complex role of sanctions in the context of totalitarian backsliding" on April 23, 2024.
Presented by Lev Lvovskiy during the conference "Belarus at the crossroads: The complex role of sanctions in the context of totalitarian backsliding" on April 23, 2024.
Presented by Chloé Le Coq, Professor of Economics, University of Paris-Panthéon-Assas, Economics and Law Research Center (CRED), during SITE 2023 Development Day conference.
This year’s SITE Development Day conference will focus on the Russian war on Ukraine. We will discuss the situation in Ukraine and neighbouring countries, how to finance and organize financial support within the EU and within Sweden, and how to deal with the current energy crisis.
This year’s SITE Development Day conference will focus on the Russian war on Ukraine. We will discuss the situation in Ukraine and neighbouring countries, how to finance and organize financial support within the EU and within Sweden, and how to deal with the current energy crisis.
The document provides an agenda for an event titled "#AcademicsStandWithUkraine" being held on December 6, 2022 in Stockholm, Sweden. The day-long event will feature discussions on supporting Ukraine, the EU response, and the energy crisis, with panels including representatives from Ukrainian and European universities and organizations, as well as the Swedish and European governments. Speakers will discuss fiscal policy in Ukraine, Swedish and EU support for Ukraine, and the regional impact of the war.
The (Ce)² Workshop is organised as an initiative of the FREE Network by one of its members, the Centre for Economic Analysis (CenEA, Poland) together with the Centre for Microdata Methods and Practice (CeMMAP, UK). This will be the seventh edition of the workshop which will be held in Warsaw on 27-28 June 2022.
The (Ce)2 workshop is organised as an initiative of the FREE Network by one of its members, the Centre for Economic Analysis (CenEA, Poland) together with the Centre for Microdata Methods and Practice (CeMMAP, UK). This will be the seventh edition of the workshop which will be held in Warsaw on 27-28 June 2022.
The (Ce)2 workshop is organised as an initiative of the FREE Network by one of its members, the Centre for Economic Analysis (CenEA, Poland) together with the Centre for Microdata Methods and Practice (CeMMAP, UK). This will be the seventh edition of the workshop which will be held in Warsaw on 27-28 June 2022.
The (Ce)2 workshop is organised as an initiative of the FREE Network by one of its members, the Centre for Economic Analysis (CenEA, Poland) together with the Centre for Microdata Methods and Practice (CeMMAP, UK). This will be the seventh edition of the workshop which will be held in Warsaw on 27-28 June 2022.
Fabular Frames and the Four Ratio ProblemMajid Iqbal
Digital, interactive art showing the struggle of a society in providing for its present population while also saving planetary resources for future generations. Spread across several frames, the art is actually the rendering of real and speculative data. The stereographic projections change shape in response to prompts and provocations. Visitors interact with the model through speculative statements about how to increase savings across communities, regions, ecosystems and environments. Their fabulations combined with random noise, i.e. factors beyond control, have a dramatic effect on the societal transition. Things get better. Things get worse. The aim is to give visitors a new grasp and feel of the ongoing struggles in democracies around the world.
Stunning art in the small multiples format brings out the spatiotemporal nature of societal transitions, against backdrop issues such as energy, housing, waste, farmland and forest. In each frame we see hopeful and frightful interplays between spending and saving. Problems emerge when one of the two parts of the existential anaglyph rapidly shrinks like Arctic ice, as factors cross thresholds. Ecological wealth and intergenerational equity areFour at stake. Not enough spending could mean economic stress, social unrest and political conflict. Not enough saving and there will be climate breakdown and ‘bankruptcy’. So where does speculative design start and the gambling and betting end? Behind each fabular frame is a four ratio problem. Each ratio reflects the level of sacrifice and self-restraint a society is willing to accept, against promises of prosperity and freedom. Some values seem to stabilise a frame while others cause collapse. Get the ratios right and we can have it all. Get them wrong and things get more desperate.
Madhya Pradesh, the "Heart of India," boasts a rich tapestry of culture and heritage, from ancient dynasties to modern developments. Explore its land records, historical landmarks, and vibrant traditions. From agricultural expanses to urban growth, Madhya Pradesh offers a unique blend of the ancient and modern.
Confirmation of Payee (CoP) is a vital security measure adopted by financial institutions and payment service providers. Its core purpose is to confirm that the recipient’s name matches the information provided by the sender during a banking transaction, ensuring that funds are transferred to the correct payment account.
Confirmation of Payee was built to tackle the increasing numbers of APP Fraud and in the landscape of UK banking, the spectre of APP fraud looms large. In 2022, over £1.2 billion was stolen by fraudsters through authorised and unauthorised fraud, equivalent to more than £2,300 every minute. This statistic emphasises the urgent need for robust security measures like CoP. While over £1.2 billion was stolen through fraud in 2022, there was an eight per cent reduction compared to 2021 which highlights the positive outcomes obtained from the implementation of Confirmation of Payee. The number of fraud cases across the UK also decreased by four per cent to nearly three million cases during the same period; latest statistics from UK Finance.
In essence, Confirmation of Payee plays a pivotal role in digital banking, guaranteeing the flawless execution of banking transactions. It stands as a guardian against fraud and misallocation, demonstrating the commitment of financial institutions to safeguard their clients’ assets. The next time you engage in a banking transaction, remember the invaluable role of CoP in ensuring the security of your financial interests.
For more details, you can visit https://technoxander.com.
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...Donc Test
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck maria r mitchell.docx
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck maria r mitchell.docx
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck maria r mitchell.docx
The Rise and Fall of Ponzi Schemes in America.pptxDiana Rose
Ponzi schemes, a notorious form of financial fraud, have plagued America’s investment landscape for decades. Named after Charles Ponzi, who orchestrated one of the most infamous schemes in the early 20th century, these fraudulent operations promise high returns with little or no risk, only to collapse and leave investors with significant losses. This article explores the nature of Ponzi schemes, notable cases in American history, their impact on victims, and measures to prevent falling prey to such scams.
Understanding Ponzi Schemes
A Ponzi scheme is an investment scam where returns are paid to earlier investors using the capital from newer investors, rather than from legitimate profit earned. The scheme relies on a constant influx of new investments to continue paying the promised returns. Eventually, when the flow of new money slows down or stops, the scheme collapses, leaving the majority of investors with substantial financial losses.
Historical Context: Charles Ponzi and His Legacy
Charles Ponzi is the namesake of this deceptive practice. In the 1920s, Ponzi promised investors in Boston a 50% return within 45 days or 100% return in 90 days through arbitrage of international reply coupons. Initially, he paid returns as promised, not from profits, but from the investments of new participants. When his scheme unraveled, it resulted in losses exceeding $20 million (equivalent to about $270 million today).
Notable American Ponzi Schemes
1. Bernie Madoff: Perhaps the most notorious Ponzi scheme in recent history, Bernie Madoff’s fraud involved $65 billion. Madoff, a well-respected figure in the financial industry, promised steady, high returns through a secretive investment strategy. His scheme lasted for decades before collapsing in 2008, devastating thousands of investors, including individuals, charities, and institutional clients.
2. Allen Stanford: Through his company, Stanford Financial Group, Allen Stanford orchestrated a $7 billion Ponzi scheme, luring investors with fraudulent certificates of deposit issued by his offshore bank. Stanford promised high returns and lavish lifestyle benefits to his investors, which ultimately led to a 110-year prison sentence for the financier in 2012.
3. Tom Petters: In a scheme that lasted more than a decade, Tom Petters ran a $3.65 billion Ponzi scheme, using his company, Petters Group Worldwide. He claimed to buy and sell consumer electronics, but in reality, he used new investments to pay off old debts and fund his extravagant lifestyle. Petters was convicted in 2009 and sentenced to 50 years in prison.
4. Eric Dalius and Saivian: Eric Dalius, a prominent figure behind Saivian, a cashback program promising high returns, is under scrutiny for allegedly orchestrating a Ponzi scheme. Saivian enticed investors with promises of up to 20% cash back on everyday purchases. However, investigations suggest that the returns were paid using new investments rather than legitimate profits. The collapse of Saivian l
An accounting information system (AIS) refers to tools and systems designed for the collection and display of accounting information so accountants and executives can make informed decisions.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
A toxic combination of 15 years of low growth, and four decades of high inequality, has left Britain poorer and falling behind its peers. Productivity growth is weak and public investment is low, while wages today are no higher than they were before the financial crisis. Britain needs a new economic strategy to lift itself out of stagnation.
Scotland is in many ways a microcosm of this challenge. It has become a hub for creative industries, is home to several world-class universities and a thriving community of businesses – strengths that need to be harness and leveraged. But it also has high levels of deprivation, with homelessness reaching a record high and nearly half a million people living in very deep poverty last year. Scotland won’t be truly thriving unless it finds ways to ensure that all its inhabitants benefit from growth and investment. This is the central challenge facing policy makers both in Holyrood and Westminster.
What should a new national economic strategy for Scotland include? What would the pursuit of stronger economic growth mean for local, national and UK-wide policy makers? How will economic change affect the jobs we do, the places we live and the businesses we work for? And what are the prospects for cities like Glasgow, and nations like Scotland, in rising to these challenges?
South Dakota State University degree offer diploma Transcriptynfqplhm
办理美国SDSU毕业证书制作南达科他州立大学假文凭定制Q微168899991做SDSU留信网教留服认证海牙认证改SDSU成绩单GPA做SDSU假学位证假文凭高仿毕业证GRE代考如何申请南达科他州立大学South Dakota State University degree offer diploma Transcript
OJP data from firms like Vicinity Jobs have emerged as a complement to traditional sources of labour demand data, such as the Job Vacancy and Wages Survey (JVWS). Ibrahim Abuallail, PhD Candidate, University of Ottawa, presented research relating to bias in OJPs and a proposed approach to effectively adjust OJP data to complement existing official data (such as from the JVWS) and improve the measurement of labour demand.
Optimizing Net Interest Margin (NIM) in the Financial Sector (With Examples).pdfshruti1menon2
NIM is calculated as the difference between interest income earned and interest expenses paid, divided by interest-earning assets.
Importance: NIM serves as a critical measure of a financial institution's profitability and operational efficiency. It reflects how effectively the institution is utilizing its interest-earning assets to generate income while managing interest costs.
1. Procurement design with corruption
Roberto Burguet
Institute for Economic Analysis (CSIC) and Barcelona GSE
This version: March, 2015
Abstract
This paper investigates the design of optimal procurement mechanisms in the
presence of corruption. After the sponsor and the contractor sign the contract,
the latter may bribe the inspector to misrepresent quality. Thus, the mechanism
a¤ects whether bribery occurs. I show how to include bribery as an additional
constraint in the optimal-control problem that the sponsor solves, and charac-
terize the optimal contract. I discuss both the case of …xed bribes and bribes
that depend on the size of the quality misrepresentation, and also uncertainty
about the size of the bribe. In all cases, the optimal contract curtails quality
not only for low e¢ ciency contractors but also for the most e¢ cient contractors.
Implementation is also discussed.
Keywords: bribery; quality; contract design
JEL numbers: D82, D73, H57
1 Introduction
There has been growing interest in recent years in both the economic e¤ects of corrup-
tion and also potential remedies for dealing with it. Corruption ranks high among the
di¢ culties when organizing procurement in general and public procurement in partic-
ular.1
Indeed, o¢ cials and contractors are often tempted by the gains from trading
Indranil Chakraborty is responsible for my interest in this problem. I thank him for having spent
time working with me on it. I also thank audiences in U. of Illinois, U. of North Carolina, Duke U.,
Michigan State U., U. of Cologne, XXIX JEI, EARIE 2014, CEME2014, AMES2014, IO Workshop
in Hangzhou, and Procurement Workshop in Rio de Janeiro. Finally, I acknowledge …nancial support
from the Spanish Ministry of Science and Innovation (Grant: ECO2011-29663), and the Generalitat
de Catalunya (SGR 2014-2017).
1
As an example, according to the Minister for State-Owned Enterprises, 80% of corruption and
fraud in state-owned Indonesian companies occur in public procurement. (Transparency International,
2006.)
1
2. in illegal, or at least illegitimate, mutual favors. Bribes are often exchanged for ma-
nipulation of either the rules that select the price (and/or identity of the contractor)
or the quality of the good delivered. In this paper, I study the design of optimal
procurement mechanisms for the principal (sponsor) in the face of this latter form of
manipulation.2
I begin by showing that standard tools in mechanism design may be
adapted to characterize and analyze this problem. As we discuss below, the e¤ect of
this sort of corruption is to transform an adverse selection problem into an adverse-
selection/moral-hazard problem to which standard tools may be applied.
Consider the standard procurement design problem, where the principal cares about
quality and price, and the cost of delivering quality is the contractor’s private infor-
mation. Quality cannot be directly observed, and the contract supervisor or inspector
in charge of assessing delivered quality can be "bought". In the simplest bribe model,
this can be done by paying a …xed bribe. The key, simple observation is that a (direct)
mechanism may then be de…ned as a triple of functions that speci…es not only the qual-
ity and the price for each ’type’of contractor, but also whether the contractor should
bribe or not. This is the moral hazard dimension that bribery introduces. As with
collusion-proofness (see Tirole, 1986), dealing with corruption then adds a new incen-
tive compatibility constraint to the sponsor’s choice. In this case, the constraint that
guarantees that the contractor does not have incentives to disregard the instruction
with respect to bribing.
I characterize optimal mechanisms in this scenario and show that bribing imposes
a bound on the levels and range of quality that are implementable. In response, the
principal gives up inducing any (non-trivial) quality for an interval at the low-e¢ ciency
tail of types. This is probably not surprising. What is more subtle is that bribery is
also problematic at the other end of the type domain. Indeed, due to the possibility
of bribing, the sponsor optimally curtails the quality that it contracts with the most
e¢ cient contractors. Obtaining higher quality from these types obviously requires
2
Transparency International lists this as one of the four areas of increased risk in the procurement
cycle, together with limited access to information, abuse of exceptions and the budget phase. See
Transparency International (2006).
2
3. promising them a higher price. That, in turn, makes it more attractive for low-e¢ ciency
types to bribe the inspector in order to (claim high e¢ ciency and so) contract high
quality, while delivering less of it. Therefore, the higher the quality contracted with
high-e¢ ciency types the tighter the incentive constraint for lower-e¢ ciency types.
Note that this incentive constraint is not local, but global. Indeed, bribing allows
a contractor to target the highest price while avoiding the cost of delivering the corre-
sponding highest quality. Thus, conditional on bribing, a contractor would (contract
highest quality, i.e., would) claim to be the highest e¢ ciency type.
When the cost of manipulation, i.e., the size of bribe, is …xed and common knowl-
edge, the possibility of bribery binds, but bribery does not occur when the sponsor
designs the optimal mechanism. The same would be true if there was uncertainty
about the size of the required bribe, but the uncertainty was resolved only after the
project had been completed. However, things are di¤erent if the uncertainty about the
required bribe was resolved after contracting but before the project was completed.
This is the case if, for instance, the identity (and inclination to gift exchanges) of the
contract supervisor is revealed only after the contract is signed. Completely preventing
bribery may not be in the sponsor’s interest in that case. I characterize the optimal
mechanism under this alternative model. In that mechanism, no type bribes with
probability one, but bribery may occur with positive probability for all types. Indeed,
after quality is contracted and the size of the required bribe learnt by the contractor,
the contractor will always choose whatever is cheaper: bribing or delivering. If the
necessary bribe happens to be very small, bribing will be cheaper than delivering any
non trivial quality. Thus, bribery can be seen as a modi…cation of the contractor’s
cost function. Other than that, the problem is technically very similar to the design
problem in the absence of corruption. The e¤ect of bribery is that, again, the sponsor
optimally gives up inducing the low tail of e¢ ciency types to deliver quality, and con-
tracts lower quality with all types of contractor, even the most e¢ cient one. In that
sense, the e¤ect of bribery is similar whether bribes are paid or not in equilibrium.
I also consider the case where the size of the bribe depends on the size of manipu-
lation obtained from the inspector. If the required bribe is (su¢ ciently) concave in the
3
4. size of manipulation, the conclusions are similar to the known, …xed-bribe case. Indeed,
a …xed bribe may be thought of as an extreme example of a concave bribe. Under suf-
…cient concavity, the conclusions of the model are not a¤ected: moral-hazard incentive
compatibility is binding for the lowest e¢ ciency types who may imitate the highest
e¢ ciency type (a global constraint). No bribes are paid in the optimal mechanism,
and quality is curtailed at both ends of the type distribution.
The convex case, on the contrary, is similar to the …xed but uncertain bribe case. In
particular, if the marginal cost of bribing is very low for very low levels of manipulation,
all types will …nd it attractive to ’buy’some manipulation instead of delivering all the
contracted quality. As a result, bribery for all types will also be part of the outcome of
the optimal mechanism. Under some assumptions on the convexity of the bribe, this
again is akin to a modi…cation of the contractor’s cost function.
The shape of the ’bribe’, i.e., of the cost that bribing represents for the contractor
may be determined by social traits. Indeed, di¤erent societies are characterized by
di¤erent degrees of the incidence and tolerance of corruption.3
When it is very costly
to lure an o¢ cial into illegal transactions, bribes are naturally concave in the amount
of manipulation. A moderate bribe may be ine¤ective to induce the o¢ cial to cross the
line, but once crossed it makes sense to make the e¤ort worthwhile. Contrary, when
graft is widely practiced and viewed as acceptable to some degree, bribes are better
represented as convex in the size of manipulation. Small manipulation is probably safe,
but even if the rule is to break the rule there are norms as to what does it mean to
really break rules.4
After characterizing optimal mechanisms, I study implementation, and show that
a simple menu of contracts, much in the spirit of Che (1993), does implement optimal
procurement.
3
Several theories have been proposed to explain di¤erences in the prevalence of corruption in
societies, both based on ’rational’behavior (e.g., based on reputation, cf. Tirole, 1996; or multiplicity
of equlibria, c.f., Acemoglu, 1995) and on ’social norms’. In their study of the empirical relationship
between inequality and corruption, You and Khagram (2005) argue that social norms and perceptions
is a chanel through which inequality a¤ects corruption.
4
Truex (2011) reports the results of a survey of Kathmandu residents that shows that respondents
generally agree that large-scale bribery was unacceptable, but also that petty corruption, gift giving,
and favoritism are much more acceptable.
4
5. Finally, I consider competition. That is, I allow for the presence of several, symmet-
ric contractors capable of undertaking the sponsor’s project. Typically, competition
does not a¤ect the choice of quality as a function of the contractor’s type, although it
does reduce the expected price for the sponsor conditioning on quality. This is still the
case when corruption introduces only locally binding incentive constraints. Indeed, as
we have noted, both in the uncertain and …xed bribe and in the convex bribe cases
corruption is equivalent to a modi…cation of the contractors’cost function. This is
una¤ected by the number of potential contractors, and so bribery does not a¤ect this
optimal relationship between quality and type. However, when the bribe is …xed and
known or concave, and so optimal procurement calls for avoiding bribes, things are
more subtle. Indeed, in these cases the fact that competition reduces the price that is
necessary for obtaining high quality from high e¢ ciency types implies that competi-
tion reduces the incentives for low e¢ ciency types to imitate high e¢ ciency ones. The
result is that competition relaxes the global constraint imposed by corruption. Conse-
quently, competition alleviates the quality distortion for high e¢ ciency types. That is,
competition not only reduces the price of quality for the sponsor but also allows the
sponsor to obtain higher levels of quality from the same type of contractor.
One technical contribution of this paper is to solve a problem where incentive
constraints bind not only locally. As we have noted before, in the …xed and concave
bribe cases, incentive compatibility related to moral hazard (no bribing) means that
no type should have incentives to imitate the most e¢ cient. This constraint is most
stringent for the least e¢ cient type. The strategy that I follow for characterizing the
optimal mechanism is to …x an arbitrary quality for the most e¢ cient type. Given
this arbitrary value, I then characterize the sponsor’s problem as a free-time, …xed-
endpoint control problem. The optimal mechanism is the solution to this problem
when the quality selected for the most e¢ cient type is also optimal. That is, when
the sponsor’s surplus in the solution to the optimal control problem is maximized with
respect to that quality.
Corruption has received much attention in the economic literature at least since
Rose-Ackerman (1975) pioneering paper. (See Aidt, 2003, for a survey.) On the e¤ects
5
6. of corruption on procurement, auction theorists have sought to understand how ma-
nipulation and bribe-taking a¤ect the allocation and surplus-sharing when particular
mechanisms are used to allocate contracts or goods. The literature has studied speci…c
ways (typically, bid readjusment) in which an agent acting on behalf of the principal
may, in exchange for a bribe, favor a contractor in some particular auction mechanism.
(See, among other, Lambert-Mogiliansky, and Verdier, 2005, Menezes and Monteiro,
2006, Burguet and Perry, 2007, Koc and Neilson, 2008, Arozamena and Weinschel-
baum, 2009, or Lengwiler and Wolfstetter, 2010.) The literature has also considered
the e¤ects of manipulation when quality, and not only price, is an argument in the
principal’s objective function. (See Celentani and Ganuza, 2002, and Burguet and
Che, 2004.) With the exception of Celentani and Ganuza (2002), in all these papers
the agent’s ability to manipulate is de…ned in reference to the particular mechanism
itself. Thus, the analysis of remedies is limited in scope, and for good reason: the mere
question of what is an optimal mechanism from the principal’s point of view may be
ill-de…ned in these settings. For example, assume that an agent in charge of running
a sealed-bid, …rst-price procurement auction is able to learn the bids before they are
publicly opened, and is also able to adjust downward one of the contractors’bid, if
that bid is not already the lowest. This is the model studied in most of the papers
previously mentioned. If instead, the procurement mechanism was an oral auction,
this ability would be irrelevant. Even in a second-price auction, altering one contrac-
tor’s bid would be of no value to that contractor. Perhaps in either of these other
auction formats the agent may manipulate the outcome by other means. The question
would then become what is the ’equivalent’to bid readjustment in those, or any, other
auction formats? That is, the question of what constitutes an optimal procurement
format, in the presence of corruption, takes us to a more complex problem: de…ning
what a corrupt procurement agent may do under each of the possible mechanisms the
principal may design.5
5
Note that, if the corrupt agent’s ability to bend the rules depends on the rules themselves, the
problem for the principal is not one where standard tools in mechanism design may be used. Even
the revelation principle is problematic, as equivalence of mechanisms cannot be predicated without
reference to equivalence of manipulation. That is, given the lack of a simple way of establishing
6
7. To my knowledge, this is the …rst paper that investigates the design of procure-
ment mechanisms in the presence of bribery when the mechanism a¤ects the incidence
of bribery. Note that, contrary to many of the papers cited in the previous paragraph,
I consider corruption in the execution of the contract, not in the negotiation of its
terms. This means that the design of the procurement mechanim may a¤ect the in-
cidence of corruption, but what manipulation means can be de…ned independent of
the mechanism itself. In their insightful paper, Celentani and Ganuza (2002) do study
the optimal mechanism with a corrupt agent who may (adjust bids and) misrepresent
quality assessment. However, (potential) corrupt deals pre-date the principal’s choice
of mechanism, and so the mechanism cannot a¤ect quality, if corrupt deals indeed took
place. Moreover, the authors assume that information rents are determined as in the
absence of bribery, justifying this assumption on the need for ’hiding’corrupt deals.
Under these assumptions, the sponsor knows that she will pay for quality as if no cor-
ruption existed, but will obtain that quality with a …xed, exogenous probability lower
than one. Therefore, the sponsor optimally induces lower quality from all types: the
optimal mechanisms coincides with the optimal mechanism in the absence of bribery
when quality is multiplied by a constant equal to that exogenous probability of actually
getting the contracted quality.
In the next section, I present the basic model with a …xed bribe and obtain the
optimal mechanism for this case. Section 3 introduces uncertainty concerning the size
of the bribe and characterizes the optimal mechanism for that case. In Section 4,
I let the size of the bribe be a function of the amount of manipulation, and obtain
conclusions both for the (su¢ ciently) concave and convex cases. Section 5 discusses
implementation of the optimal procurement rules, and Section 6 discusses the e¤ects
of an increase in competition. Some concluding remarks close the paper. An appendix
contains all proofs.
equivalence classes in the set of mechanisms, restricting attention to revelation games may simply be
of no use.
7
8. 2 The model
A sponsor procures a contract of …xed size and variable quality, q 2 [0; 1). Quality q
measures the sponsor’s willingness to pay for the project. That is, the payo¤ for the
sponsor when she pays P and receives a project with realized quality q is simply q P.
The sponsor’s goal is to maximize the expected value of that payo¤.
A contractor is able to undertake the project and deliver quality q at a cost C(q; ),
where 2 [ ; ] is the contractor’s type and her private information. From the sponsor’s
point of view, is the realization of some random variable with cdf F and density f in
[ ; ], and this is common knowledge. We postulate a di¤erentiable C with C ; Cq > 0,
and Cq ; Cqq > 0. This guarantees that, in the absence of bribery, monotonicity of q
with respect to is virtually all that is needed for implementation. Also, we assume
that C(0; ) = 0, for all , and that
Cq(q; ) + Cq (q; )
F( )
f( )
(1)
is increasing both in q and in . This guarantees interior (to monotonicity constraints)
solution for the optimal mechanism in the absence of bribery. (See Che, 1993.)
Zero quality should be interpreted as a standard minimum quality, and a positive
quality as quality obtained at an additional cost to the contractor. Likewise, a price of
zero corresponds to a payment that equals the (common) cost of honoring the contract
at a standard, minimum quality, q = 0.
Under observability of quality, and so without any role for the inspector, a direct
mechanism is a pair (p; q), where p : [ ; ] ! R and q : [ ; ] ! R+. p( ) represents the
payment that the contractor gets and q( ) represents the quality that the contractor
provides. Both are functions of the contractor’s type. The sponsor needs to consider
only incentive compatible, individually rational, direct mechanisms. Among them, the
optimal one is characterized by quality qNB
( ) that satis…es
1 Cq(qNB
( ); ) Cq (qNB
( ); )
F( )
f( )
= 0: (2)
as long as
qNB
( ) C(qNB
( ); ) C (qNB
( ); )
F ( )
f ( )
; (3)
8
9. and qNB
( ) = 0 otherwise. (See Che, 1993.) In order to simplify the analysis and
also concentrate on the interesting results below, we will assume that (3) holds with
equality when evaluated at and qNB
( ) = 0 so that qNB
( ) > 0, for all < .6
In this paper, we are interested in analyzing the case when quality q is not directly
observable. Instead, the sponsor requires an agent, the inspector, who assesses (or
certi…es) the quality of the completed project. The inspector can observe q without
cost.
The inspector can also accept bribes to be untruthfulwhen reporting on quality.
For now, we assume that the agent will do so in exchange for a …xed bribe B. In later
sections we will consider more general speci…cations of B.7
In any case, we should note
that the bribe B includes any (expected) payment by the contractor associated with
bribing the agent.
Under the threat of bribery, we may de…ne a direct mechanism as a triple (p; q; b),
where p and q are de…ned and interpreted as above, and b : [ ; ] ! f0; 1g. We interpret
b( ) = 1 as an instruction to bribe and b( ) = 0 as an instruction not to bribe. Also,
we should interpret q( ) as the contracted quality, not necessarily the delivered one.8
Let
( ) = b( ) (p( ) B) + (1 b( )) (p( ) C(q( ); ))
The mechanism is implementable if it satis…es incentive compatibility (IC) and
individual rationality (IR), as in any standard problem:
IR) For all 2 [ ; ], ( ) 0.
IC) For all ; z 2 [ ; ], ( ) p(z) min fC(q(z); ); Bg.
Incentive compatibility incorporates adverse selection and moral hazard constraints.
6
If (3) is negative at for q = 0, everything that follows applies with only rede…ning the domain
of types to the interval where (3) is non negative. Also, if (3) is strictly positive at and for q = 0;
then the value of c
de…ned later may be equal to, not strictly smaller than, . That "corner" solution
would not a¤ect any other insight.
7
In all cases, we do not consider the possibility of "extortion", that is, the possibility that the
inspector asks for bribes in order to report the truth, threatening to otherwise report lower quality
than what is actually delivered. Note that in this type of corrupt behavior the parties involved,
inspector and contractor, have con‡icting interest. This is contrary to the cases studied in this paper.
8
For the moment, we do not need to specify delivered quality: if b( ) = 1, then delivered quality
will be 0, and otherwise it will be q( ).
9
10. In particular, for b( ) = 0, ( ) p( ) B. That is, the contractor’s pro…ts should
be at least as large as the pro…t she could get by simply bribing. Note that incentive
compatibility implies that if b( ) = 1, then delivered quality will be 0, and so we do
not need to specify delivered quality when b( ) = 1.
The problem for the sponsor is to design the direct, implementable mechanism
(p; q; b) that maximizes her expected payo¤, E [q( )(1 b( )) p( )].
When the bribe B is known and …xed, that optimal mechanism cannot include
an instruction to bribe for any type of contractor. The contractor would still have
incentives to report truthfully her type if, instead, the mechanism asked her to deliver
0 quality and o¤ered her a price of p( ) B. The sponsor can thus get the same quality
for a lower price. Indeed,
Lemma 1 For any IC, IR direct mechanism, (p; q; b), there exists an IC, IR mecha-
nism with b( ) = 0 8 2 [ ; ], so that E [q( )(1 b( )) p( )] is higher for the latter.
Thus, in this basic setting, bribery does not occur in the optimal mechanism, so
we can restrict attention to mechanisms with b( ) = 0, but bribery does still impose
restrictions on mechanisms for IC and IR to hold.
In particular, standard necessary conditions for IC and IR (under no bribery) are
still necessary. Indeed, even without intending to bribe the inspector, the contractor
should have incentives to report her type truthfully. Three consequences follow from
these necessary conditions. First, ( ) must be monotone decreasing. In fact,
(z; ) p(z) C(q(z); )
satis…es the conditions of Theorem 2 in Milgrom and Segal (2002), so that
( ) = p( ) C(q( ); ) = ( ) +
Z
C (q(z); z)dz; (4)
and is absolutely continuous. That virtually …xes p( ) as a function of q( ). Second,
and as a result, a necessary but also su¢ cient condition for IR is ( ) 0. Third,
monotonicity can also be extended to q and p in a standard way.
10
11. Lemma 2 In any IC mechanism, p( ) and q( ) are monotone decreasing.
These features, which are shared by any feasible mechanism in the absence of cor-
ruption, have important consequences that make this problem tractable. Indeed, since
p is monotone, a bribing contractor of any type would maximize pro…ts by claiming
type . Also, since is monotone, type is the type with the strongest incentives to
bribe. Thus, the only constraint imposed by bribery that binds is
( ) p( ) B:
That is, substituting for p( ) from (4),
B C(q( ); ) +
Z
C (q(z); z)dz: (5)
The main insight in this section is contained in (5). Bribery constrains the variation
allowed to q( ). When corruption is absent, the sponsor optimally asks for higher
quality when it is less costly to obtain (when is lower). However, increases in quality
require faster increases in prices, and high di¤erences in prices cannot be sustained
when bribing is inexpensive. This puts a limit on the range of quality levels that can
be commanded.
It is a quite standard result that these conditions are not only necessary but also
su¢ cient for implementation, provided that Cq (q; ). Thus, the problem that the
sponsor solves is
max
p;q
Z
fq( ) p( )g f ( ) d ;
s.t. ( ) 0; (4); (5) and subject to q( ) being monotone decreasing.
IR binds in the solution to this problem.9
Thus, p( ) = C q( ); . The constraint
(5) may not bind. Indeed, if (5) holds for qNB
( ), then this is also the optimal mecha-
nism under bribery. However, the case of interest is when B is su¢ ciently small so that
9
Indeed, for any mechanism (q; p) so that ( ) = p( ) C q( ); = > 0, we can de…ne a
mechanism (q0
; p0
) with q0
= q and q and p0
= p for all . The new mechanism satis…es all the
above constraints and results in a higher payo¤ for the sponsor.
11
12. (5) does bind. The following proposition characterizes the optimal mechanism also for
this case
Proposition 3 If (5) holds for the optimal mechanism without bribery, qNB
( ), then
(qNB
; pNB
; b) with b( ) = 0 for all , is the optimal mechanism under bribery. Other-
wise, there exist a
and c
, with < a c
< such that at the optimal mechanism;
(i) q( ) = 0 if > c
; (ii) q( ) = qNB
( ) if 2 ( a
; c
); and (iii) q( ) = qNB
( a
) if
< a
.
Thus, when the size of the bribe is …xed and known and bribery is a relevant
constraint, the sponsor gives up the possibility of obtaining (an increase in) quality
from contractors with very high costs. This result is not surprising. Indeed, recall that
bribery imposes a limit on the range of possible quality levels that can be commanded.
If the sponsor is going to shave this range, she optimally does so for types with low
e¢ ciency. The loss from such distortion is lowest when the contractor has one of these
types. But, perhaps less obviously, quality is optimally distorted also at the top, i.e.,
when the contractor has a high e¢ ciency.
The intuition behind this result is simple. (See Figure 1.) Assume B > C(qNB
( ); ),
but also assume that (5) binds for qNB
( ).10
That is,
B < C(qNB
( ); ) +
Z
C (NB
(z); z)dz:
It is then feasible to distort only at the bottom. That is, to select c
that solves
B = C(q( ); ) +
R c
C (q(z); z)dz, and let q( ) = qNB
( ) for all c
and q( ) = 0
for all > c
. This is represented in Figure 1. The thick line represents qNB
( ) and the
thin line this q( ). Now consider the e¤ects of reducing q( ) for all types in [ ; +") to
the level q( + "). Firstly, it implies obtaining a lower quality from types in [ ; + ")
and consequently reducing the payment to those types of contractor, just as in the
absence of bribery. This e¤ect is of second order when q( ) = qNB
( ). Secondly, it
10
Of course, if B < C(qNB
( ); ) then distortion at the top is imposed by constraint (5) on any
implementable mechanism.
12
13. also implies a more relaxed no-bribing constraint, as it is now less pro…table to claim a
type when the type is in fact higher. That is, the reduction in q( ) allows raising c
.
This is a …rst-order e¤ect, as types that fall between the old and the new values of c
can now be asked to supply quality qNB
( c
) at a price C(q( c
); c
) instead of quality 0
at price 0. In other words, a reduction in q( ) allows the contractor to expect positive
levels of quality from the previously marginal type c
. This e¤ect is …rst-order, and
therefore distorting at the top is surplus improving for the sponsor.
q
θθ θ
)(θ
N B
q
∆q
∇q
qNB
Figure 1
3 Bribing in equilibrium
Perhaps the most interesting feature of the optimal mechanism discussed in the previous
section is that quality is distorted at the high end of the distribution of contractor types.
That is, bribery imposes a quality ceiling. However, the …nding that bribery is not an
equilibrium phenomenon is a consequence of assuming that B, the size of the bribe, is
…xed and common knowledge, so that the sponsor should virtually ’buy’the possibility
of bribing. Suppose, instead, that B is uncertain at the time of contracting, and is only
learnt by the contractor after the terms of the contract have been set but before quality
13
14. is delivered.11
,12
In particular, assume now that B takes values in some interval, [B; B]
according to some c.d.f. G with density g. We will make the standard assumption that
1 G(B)
g(B)
is decreasing in B.
To simplify the analysis, we may also assume that B is su¢ ciently low, say B = 0.
(At the end of this section, we will comment on the consequence of not assuming so.)
Under these conditions, an optimal mechanism is not bribe-proof in general. Indeed,
preventing all types of contractor from bribing in all probability -when B is low- may
be too expensive for the sponsor.
Thus, we should now de…ne a contract as a triple (p; q; b), where p : [ ; ] ! R and
q : [ ; ] ! R+, as before, and b : [ ; ] ! [B; B]. b( ) is now interpreted as the cut-o¤
value for B so that type is instructed to bribe if and only if B < b( ). It is su¢ cient
to consider mechanisms of this form. Indeed, if a contractor prefers not to bribe when
the size of the bribe is B, she will also prefer not to bribe when the size of the bribe is
larger than B. Contrary, if the contractor prefers to bribe when the size of the bribe
is B, then she also prefers to bribe if the size of the bribe is smaller than B. Thus, IC
will require that the instruction to bribe takes a cut-o¤ form. Also, as in the previous
section, we do not have to specify what quality is to be delivered if bribing: IC requires
that quality to be 0.
As we have mentioned, in general, bribing will take place in equilibrium, but there
is still a counterpart to Lemma 1:
Lemma 4 For any IC and IR mechanism where at least one type bribes with proba-
bility 1, there is another IC and IR mechanism where no type bribes with probability 1
and results in (weakly) higher payo¤ for the sponsor.
Thus, we may restrict attention to mechanisms with b( ) < B. Also, since B = 0,
11
This would …t a case where the agent in charge of quality assessment is hired after the contract
has been signed. Note that, if the contractor privately learnt B before signing the contract, we would
have a standard mechanism-design problem where the contractor’s "type" would be ( ; B).
12
The case where uncertainty about B is resolved after the quality is delivered is equivalent to the
…xed and known B, with only substituting EB for B. Indeed, in that case the decision whether to
bribe or not would have to be taken before providing quality. Not providing quality but claiming to do
so would require the contractor to pay the bribe B whatever its realization, whereas if the contractor
provides quality there is no point in also paying the bribe.
14
15. all types for which q( ) > 0 will bribe with positive probability.13
That is, b( ) > B
for those types. Finally, we may restrict attention to mechanisms such that ( ) = 0.
Given any other IC and IR mechanism, a reduction in p constant over would be
feasible without a change in incentives and participation.
Assuming that the size of B is uncertain at the time of contracting changes the
nature of the moral-hazard incentives for the contractor. Indeed, whatever quality the
contractor has commited to, she will prefer to bribe if, and only if, the realized value of
the bribe is less than the cost of providing that quality. Thus, if she reports her type
truthfully, IC requires
b( ) = C(q( ); ): (6)
This is a moral-hazard, incentive compatibility constraint and de…nes b( ) once q( ) is
determined. Moreover, this constraint is equivalent to a modi…cation of the contractor’s
(expected) cost function. Indeed, whatever quality q a contractor of type commits
to, her expected cost of honoring this commitment is now
(q; ) = EB min fC(q; ); Bg :
Therefore, (su¢ cient) uncertainty about the size of the bribe renders the problem
of designing an optimal mechanism for procurement a standard one with a modi…ed
cost funtion. Consequently, we can use exactly the same tools that we use in the design
problem without bribery. Let
(z; ) = p(z) (q(z); ):
This function again satis…es the conditions of Theorem 2 in Milgrom and Segal (2002),
so that, since ( ) = arg maxz (z; ), we can write
( ) = p( ) (q( ); ) = ( ) +
Z
C (q(z); z) [1 G(C(q(z); z))] dz: (7)
As in the previous section, monotonicity of q( ) and ( ) is necessary for implementa-
tion. Also, this together with (6), (7), and ( ) 0 is su¢ cient as long as q (q; ) > 0.
13
Note that, if B = 0, only zero quality could avoid bribery. Thus, unless the sponsor gives up
any hope to obtain positive quality with positive probability, indeed all types will bribe with positive
probability.
15
16. This condition requires C (q; ) [1 G(C(q; ))], and not only C (q; ), to be increasing
in q. It is satis…ed, for instance, if B is disperse, so that g is small for any value of B.
The expected surplus for the sponsor can be written as
Z
f[1 G(C(q( ); ))] [q( ) C(q( ); )] ( )g f( )d ; (8)
where, in an IC mechanism, ( ) is given in (7). We are now ready to discuss the
optimal mechanism for the sponsor.
Proposition 5 There exists d
, with < d
such that at the optimal mechanism;
(i) q( ) = 0 if > d
; and (ii) if < d
, then q( ) solves
0 =
1 G(C(q; ))
g(C(q; ))
1 Cq(q; ) C q(q; )
F ( )
f( )
(9)
Cq(q; ) q C(q; ) C (q; )
F ( )
f( )
:
The intuition behind this result is relatively straightforward when considering the
Hamiltonian of the problem that the sponsor’s choice of q solves. Suppressing the
variables in the functions for compactness, this Hamiltonian is
H = (1 G(C)) [(q C) f FC ] :
Note that in the absence of bribery, the corresponding Hamiltonian would be
HNB
= (q C) f FC :
Thus,
H = (1 G(C)) HNB
:
The interpretation is simple. Quality q( ) will be delivered with probability 1 G(C),
and then with that probability, the decision on q will have the same consequences on
contractor rents, cost, and sponsor surplus, as in the absence of bribery. This is the
phenomenon captured in Celentani and Ganuza (2002). In the present setting, this
would have no e¤ect on q, but only on the prices, p.14
However, q( ) will also a¤ect
14
In Celentani and Ganuza (2002), the e¤ect on q appears from the fact that the price is determined
by non-corrupt contractors, who are assumed to act as in the absence of corruption. Therefore, the
only way of controlling bribery rents is by a¤ecting quality.
16
17. the probability of bribery through its e¤ect on the threshold b( ) = C(q( ); ). This
represents an additional e¤ect of a small increase in q( ) of
g(C)CqHNB
< 0:
Indeed, a (small) increase in q will increase by g(C)Cq the probability that the sponsor
gets 0 quality, instead of q, in exchange for the price. Thus, for values of q that solve
@HNB
@q
= 0, the presence of this negative e¤ect of a small increase in q would imply that
@H
@q
< 0.15
Thus, the solution under bribery implies lower values of q for any .
For high enough types, , so that that qNB
( ) is positive but small, the optimal
answer is to relinquish the possibility of obtaining any quality above the minimum.
Just as in the …xed-bribe case, attempting to do so would be too expensive in terms of
rents.
Also, as in the …xed bribe case, distortions at the top are part of the optimal
mechanism. Indeed, for the most e¢ cient type, q( ) solves
1 G(C)
g(C)
[1 Cq] = Cq [q C] :
The left hand side is zero at qNB
( ), since under no bribery there is no distortion at the
top. But the right hand since is positive at that value. Thus, indeed q( ) < qNB
( ).
In summary, an uncertain bribe is equivalent to a modi…cation of the contractor’s
cost function. Local IC constraints are correspondingly modi…ed, which implies quality
distortions for all type of contractors, and bribe payment with positive probability.
We have assumed that the lower support of the distribution of B was su¢ ciently
low so as to make it too expensive for the sponsor to avoid bribery completely, even for
the most e¢ cient type.16
If B was larger, we could use the same techniques used in the
proof of Proposition 6 to obtain the optimal mechanism, but this time the constraint
would be 0
( ) = C (q( ); ) [1 G (minfC(q( ); ); Bg)]. Thus, in the solution to
that problem, we will have q( ) = qNB
( ) whenever C(qNB
( ); ) < B. Note that
15
Of course, if G(C(q( ); ) = 0 when evaluated at the q( ) that solves @HNB
@q
= 0, then bribery
does not change q( ).
16
Also, if B is su¢ ciently high, then bribery will not be binding.
17
18. as long as (2) de…nes a continuous and monotone qNB
( ), that solution q( ) is also
continuous and monotone, so indeed it de…nes the optimal mechanism.
4 Bribe models
In the previous sections, we considered extremely simple models of bribery. The in-
spector was willing to alter her assessment of quality with no bounds, and in exchange
for a …xed bribe. That model of bribery may appear too simplistic, but in this section
I will show that the main …ndings extend to a considerably more general set of models.
Let us return to the deterministic case, where the cost of manipulation is common
knowledge at the time of contracting. Suppose now that the cost of manipulation
(bribe and any other cost) is increasing with the size of that misrepresentation. That
is, a quality overstatement of size m requires a ’bribe’B(m), with B0
> 0.
Recall that B includes all costs born by the contractor as a consequence of quality
misrepresentation. That is, this includes, among other things, possible liabilities in
case of ’catastrophic failure’or bribe detection.
Before discussing this case, note that the …xed, known-bribe case in Section 2 is an
extreme case of a concave, increasing B(m). Indeed, there B(0) = 0, and B(m) = B
for all m > 0. Also, although more subtle, the …xed, unknown bribe case in Section
3 can be thought of as a convex, increasing B(m). Indeed, a contractor (with type )
who contracts delivery of quality q will buy expected manipulation G(C(q; ))q. The
ratio of expected bribe to expected manipulation,
Z C(q; )
0
Bg(B)dB
G(C(q; ))q
is increasing in q, and expected manipulation is also incresing in q.
This is indicative that the results in those sections may actually extend to the
increasing, known case we treat here, depending on the curvature of B(m). We show
now that this is, in a precise sense, true.
But, what is the meaning of the curvature of B? As argued in the Introductions,
concave B(m) occurs when, for instance, it is quite costly to engage the inspector in
18
19. illegal activities, but increasing degrees of manipulation can be obtained at decreasing
additional cost.17
On the other hand, a convex B(m) better represents realities where
’petty corruption’is a kind of accepted, or tolerated, social norm, but large misrep-
resentations may risk crossing the line. Thus, although corruption is a threat in all
societies, the curvature of B may be linked to the extent to which honesty is a standard
in the society.18
4.1 Concave B(m)
Let us …rst consider the concave case. Su¢ cient concavity, as obtained under the
assumptions below, implies that, if bribing, the contractor will still do so to claim the
most e¢ cient type. That is, she will o¤er the highest quality by claiming the lowest
type and in fact deliver quality 0. Thus, once again corruption will introduce only
one additional, global constraint similar to (5).
This is a set of su¢ cient assumptions for that to be the case:
A1) B00
(m) > Cqq(q m; ) for all m q all , and all q qNB
( ).
A2) B0
(qNB
( )) < Cq(qNB
( ); ) for all .
A3) B(qNB
( )) > C(qNB
( ); )
A3 simpli…es the analysis: if it were violated for some type , then we would have
to consider an additional constraint on the quality that could be obtained from .
Under A1, for any type of the contractor and any (relevant) contracted quality level
q, C (q m; ) + B(m) is concave and so will be minimized either without bribes, or
with bribe m = q. A2 implies that pNB
( ) B(qNB
( )) is monotone in . We discuss
later the consequences of violating A1 and A2.
Also, we will restrict attention to cases where C(qNB
( ); ) > B(qNB
( )) > C(qNB
( ); ).
If the second inequality did not hold, then it would be impossible to obtain quality
17
Transparency international (2006) notes: "Experience in industrial countries shows clearly that
-apart from facilitation payments- the majority of corrupt people (both on the private and the govern-
ment side) are not junior or subordinate sta¤, but people in the higher echelons, including many senior
managers." This form of ’grand corruption’is probably best described by a concave bribe function.
18
Obviously, the type of project may also a¤ect the ’shape’-and size- of the bribe function. For
example, the probability of catastrophic failure if quality is not as speci…ed, may be concave -large risk
for even small amounts of manipulation- or convex -lower but increasing sensitivity to manipulation.-
in manipulation, and this may result in ’bribe’functions with corresponding shapes.
19
20. qNB
( ), since even for type it would be cheaper to bribe. Thus, the ceiling on qual-
ity would be exogenously imposed. If the …rst inequality did not hold, bribery would
never be a concern. Therefore the only interesting cases are those that satisfy the two
inequalities.
In this new setting, a direct mechanism must not only specify whether to bribe or
not, but also how much to bribe. Since B( ) is invertible, this is equivalent to deter-
mining the degree of manipulation exerted by the inspector. Thus, we can represent a
mechanism as a triple (p; q; m) : [ ; ] ! R3
, where now q( ) represents the contracted
quality and m( ) the amount of quality manipulation. That is, delivered quality will
be q( ) m( ).
It is straightforward to extend Lemma 1 to this scenario.
Lemma 6 For any IC, IR direct mechanism, (p; q; m), there exists an IC, IR mecha-
nism with m( ) = 0 8 2 [ ; ], so that E [q( ) m( ) p( )] is higher for the latter.
Now, for a mechanism with m( ) = 0 for all , incentive compatibility requires that
= arg max
z
fp(z) C(q(z); )g (10)
is satis…ed. As we mentioned above, assumption A1 implies that if a type of contractor
bribes to claim a type z, then optimally she will either buy manipulation m = 0 or
m = q(z). (10) implies that the …rst choice is never preferred to truthful reporting.
Thus, we will only need to consider the case when the contractor fully bribes in order
to claim a type other than .
Just as in Section 2, (10) also implies monotonicity of q, p, and ( ). Therefore,
the type of contractor that has more incentives to bribe to claim any type so as to
obtain pro…ts p( ) B(q( )) is a contractor of ype . In particular, IC imposes
( ) p ( ) B (q ( )) ; (11)
the equivalent of (5), which can also be written:
B (q ( )) C(q( ); ) +
Z
C (q(z); z)dz:
20
21. Also, (4) still de…nes p( ) once q( ) is determined. Therefore, A2 and monotonicity
of q( ) guarantees that (11) is the only constraint that bribing imposes. Thus, to all
e¤ects, the bribe is still …xed and equal to B(q( )), once q( ) is determined. Conse-
quently,
Proposition 7 Under concavity of B(m), A1, A2, and A3, if qNB
( ) violates (11)
then there exist a
and c
, with < a c
< such that at the optimal mechanism;
(i) q( ) = 0 if > c
; (ii) q( ) = qNB
( ) if 2 ( a
; c
); and (iii) q( ) = qNB
( a
) if
< a
.
The strategy of the proof of Proposition 3 was to discuss the properties of the
solution to the sponsor’s problem for an exogenously given q( ). These properties carry
over to the concave B(m) case. The only di¤erence with Section 2 is that now q( )
a¤ects also the left hand side of the no-bribe constraint (11). Yet, A2 still guarantees
that d c
dq( )
< 0 when evaluated at q( ) = qNB
( ), and so indeed a
> .
We now discuss the role of our assumptions. First, note that concavity is all that
is needed for Lemma 6 to hold. Thus, the optimal procurement mechanism induces no
bribe in equilibrium as long as B(m) is concave. Now, if A1 is not satis…ed, then the
best deviation for some type may involve a mixture of bribing and positive quality
delivery. This, in turn, implies that (11) and (10) plus monotonicity do not guarantee
IC for all types, and further upper constraints on q may apply. The consequence would
be the need for ’ironing’on q.
Also, if A2 does not hold, then the best bribing deviation for any type of contractor
may be to claim a type m
below the type a
obtained above. The optimal mechanism
could still be constructed from down at a cost of complexity. For instance, if pNB
( )
B(qNB
( )) is not monotone, but it is single peaked, the problem for the sponsor is very
similar to the one considered in Proposition 3 in what refers to the interval of types
m
; . There will be two types a
and c
in the interior of this interval and the optimal
mechanism prescribes for types in this interval what Proposition 3 prescribes for the
whole set of types. For types below m
, the local incentive compatibility constraint that
de…nes qNB
( ) and the global incentive-compatibility constraint associated to bribery
21
22. would both have to be satis…ed. Therefore, we may construct the optimal q( ) from m
down as follows: for any and given q( ) for 0
> by setting q( ), , as the minimum
of qNB
( ) and the solution to
C(q; ) +
Z
C (q(x); x)dx = B(q):
Summarizing, as in Section 2, concavity of B implies no bribe in the optimal mech-
anism, and under su¢ cient concavity (so that A1 and A2 are satis…ed) bribery imposes
a ceiling on the quality that the sponsor obtains from the contractor.
4.2 Convex B(m)
We now turn to the convex case and assume that B(m) is convex with B0
(0) = 0.
Under this assumption, Lemma 6 no longer holds. Indeed, convexity of B together
with convexity of C implies that C(q m; ) + B(m) is convex in m, for any q and
any . That is, after contracting any level of quality, the contractor achieves cost
minimization by partly bribing and partly delivering since Cq(0; ) = B0
(0) = 0.
Given q( ), incentive compatibility requires that m( ) solves
min
m2[0;q( )]
C(q( ) m; ) + B(m):
Thus
Cq(q( ) m; ) + B0
(m) = 0; (12)
implicitly de…nes optimal m( ) as a function of quality q( ). Equivalently, if bq = q m
is actual delivered quality,
Cq(bq; ) + B0
(m) = 0: (13)
de…nes m implicitly as an increasing function of delivered quality bq, given . Let this
solution be bm(bq; ). Note that bm( ) is increasing both in and bq. Then, as in Section
3, bribery may be thought of as a modi…cation of the cost of quality for each type.
This modi…ed cost function is now
b(bq; ) = C(bq; ) + B( bm(bq; )):
22
23. A delivered quality bq will have a "cost" that is increased by the required bribe,
B( bm(bq; )) for a type . Once this cost modi…cation is made, we face a standard
problem with a standard solution. As such, monotonicity of bq( ) and ( ) is nec-
essary for implementation. It is also su¢ cient, given the corresponding de…nition of
p( ) and (13) as long as bq (q; ) > 0. A su¢ cient, but not neccesary, condition for
bq (q; ) > 0 is that B00
B0 is decreasing. Thus, the following proposition is just a corollary
of this discussion.
Proposition 8 If B(m) is convex, B00
decreasing, and Cqq > 0, then there exists d
,
with < d
such that at the optimal mechanism; (i) q( ) = 0 if > d
; and (ii) if
< d
, then q( ) solves
1 Cq(bq; ) C q(bq; )
F( )
f( )
=
@B( bm(bq; ))
@bq
+
@2
B( bm(bq; ))
@bq@
F( )
f( )
: (14)
The conditions on B00
and Cqq , guarantee that bbq(bq; ) + b bq(bq; )F( )
f( )
is increasing
in bq and , so that the solution to (14) is monotone.19
Note that the right hand side of (14) is positive, as we are assuming B00
to be
decreasing. Thus, bq( ) < qNB
( ) when interior. Types above d
are optimally asked to
deliver zero quality. Finally, for = the right hand side of (14) is still positive. That
is, even for the most e¢ cient type, realized quality is distorted downwards. Indeed,
even for that type, realized quality is more expensive to ’produce’under bribery, since
its cost is increased by the associated bribe. Thus, as in the case of random but …xed
bribes, quality distortion is optimally introduced for all types.
5 Implementation
After having characterized the optimal procurement rules, we now consider ’imple-
mentation’of these rules with standard mechanisms. Consider the case of a …xed and
known bribe, or the case where the required bribe is increasing and su¢ ciently con-
cave in the amount of manipulation. We have shown that the optimal mechanism in
19
If this is not increasing, then once again monotoinicity would be violated by the solution to the
…rst order conditions, and "ironing" would be needed.
23
24. this case coincides with the optimal mechanism under no corruption in the interior of
some interval of types. For types above this interval, quality should be zero and for
types below this interval, quality should be a constant. It is straightforward that such
rules would be implemented by any mechanism that implements the optimal rules in
the absence of corruption, with the only addition being a quality ceiling and a quality
‡oor. In the jargon of Section 2, these would be qNB
( a
) and qNB
( c
), respectively.
Thus, a menu of contracts similar to a …rst-score auction, will implement the optimal
procurement: (q; p(q)) for q 2 qNB
( c
); qNB
( a
) , where c
and a
are de…ned in the
corresponding previous sections, and for each of these quality levels, p(q) = q (q),
where
(q) = qNB
( c
) C(qNB
( c
); c
) +
qZ
qNB( c
)
Cq z; q 1
NB(z)
F(q 1
NB(z))
f(q 1
NB(z))
dz;
and where, q 1
NB represents the inverse function of qNB
. Of course, the menu should be
complemented with the contract (p; q) = (0; 0). Following the analysis in the previous
sections, this is a straightforward corollary of Proposition 4 in Che (1993).
Likewise, the optimal procurement rules when the size of the bribe is uncertain,
and so optimally bribery takes place with some probability, may also be implemented
with a menu of contracts. However, the distortion in assessment of quality (q) is
more complex in this case. Indeed, now,
(q) = q( c
) C(q( c
); c
) +
qZ
q( c
)
(z)dz;
24
25. where c
and q( ) are de…ned in Proposition 5, and20
(z) = Cq z; q 1
(z)
F(q 1
(z))
f(q 1(z))
+
Cq z; q 1
(z)
g(C (z; q 1
(z)))
1 G(C (z; q 1(z)))
z C z; q 1
(z) C z; q 1
(z)
F(q 1
(z))
f(q 1(z))
:
(Note that (q) a¤ects the price, but not the tradeo¤ between bribing and delivering
quality.) This is the menu of contracts that implements optimal procurement for the
modi…ed cost function that we discussed in Section 3. Likewise, when B is a convex
function of manipulation satisfying the properties of Section 4, optimal procurement
may be achieved by o¤ering the contractor the optimal menu of contracts under the
modi…ed cost function b, discussed in that section.
6 Competition
Consider the …xed bribe case, but now assume that there are n 2 symmetric potential
contractors. A mechanism should now determine not only price, quality, and whether
bribes should be paid, but also the identity of the contractor that is selected for the
job. Still, under our assumptions, it is optimal to treat all contractors symmetrically
and to avoid bribing. Moreover, under our assumptions, it is optimal to select the
most e¢ cient contractor. Let x( ) represent the probability that a given contractor
with e¢ ciency parameter is selected and, for simplicity and without loss of generality,
assume that payments are only made to the selected contractor. As in the case of one
contractor, (z; ) x(z) [p(z) C(q(z); )] satis…es the conditions of Theorem 2 in
20
Similarly as in the proof of Proposition 4 in Che (1993), it is easy to check that the second order
conditions are satis…ed. Indeed, observe that (z) evaluated at q( ) is equal to the derivative fo the
sponsor’s surplus with respect to q at the optimal solution in Proposition 6 minus
1 G
g
(1 Cq):
The derivative of the sponsor’s surplus with respect to q is zero for all , evaluated at the optimal
solution. Thus, the partial of (z) with respect to q 1
is positive at the optimal solution. Since q 1
is a decreasing function and the partial of (z) with respect to z is negative, we conclude that (z)
is decreasing and so the second order conditions are satis…ed.
25
26. Milgrom and Segal (2002), so that in an incentive compatible mechanism
( ) = x( ) [p( ) C(q( ); )] = ( ) +
Z
x(z)C (q(z); z)dz:
Then, (5) is replaced by21
B C(q( ); ) +
Z
x(z)C (q(z); z)dz;
where we have used x( ) = 1. Bribery is not binding when this expression is satis…ed
for qNB
( ). (Recall that qNB
( ), the optimal quality in the absence of bribery, is
independent on the number of contractors.) Thus, the presence of x(z) = [1 F(z)]n 1
in the expression above implies that bribery is a less serious constraint when n > 1.
Moreover, as x(z) is decreasing in n, the stronger the competition, i.e., the larger n,
the larger the chances that bribery is not an issue. That is, competition may eliminate
the threat of bribery.
The intuition is simple. In the absence of corruption, (pro…ts and) prices are lower
the stronger the competition, and so are the incentives to bribe in order to fetch those
prices, when bribing is a possibility.
Perhaps more interesting, even when bribery binds, so that the expression above is
violated, the constraint imposed by bribery is weaker the larger the value of n. Indeed,
as when n = 1, q( ) is distorted down to qNB
( a
) in an interval [ ; a
]. The optimal
value of a
, i .e., of q( ), balances the loss of e¢ ciency in that interval with the gain
from obtaining second-best quality from types around c
. For n = 1, these e¤ects
are captured by the second and the …rst lines, respectively, in (21) in the proof of
Proposition 3. When n > 1, these e¤ects are still represented by (21) except that the
…rst line is multiplied by x( c
) = [1 F( c
)]n 1
(and the second line is multiplied by
x( ) = 1). Thus, the larger n the lower the optimal value of a
, i .e. the smaller the
range of types at the top for which quality is distorted.
21
Incentive compatibility requires that (z; ) is maximized at z = , which implies that, if x is
monotone decreasing and q is constant, still p( )x( ) is decreasing in . Note that, in case of bribing,
a contracctor obtains an expected pro…t of p( )x( ) B, and so again when bribing the contracctor
will claim type .
26
27. Once again the intuition is simple. As we have already mentioned, the only reason
to distort quality at the top is to reduce the incentives for lower e¢ ciency types to
bribe so that positive quality may be obtained from these types. When there are n
contractors, this gain is realized from a contractor only with probability [1 F( c
)]n 1
,
that is, the probability that there is no other contractor with a more e¢ cient type. This
probability is obviously smaller the stronger the competition, and so is the return of
distortions at the top.22
Consider now the case when B is uncertain at the time of contracting. Even if n > 1,
(6) is an incentive compatibility condition. Thus, as with n = 1, bribery is formally
equivalent to a modi…cation of the cost function for contractors, where the new cost
function is again (q; ) de…ned in Section 3. This modi…ed function is independent
of n. Thus, the quality in the optimal mechanism is also independent of n, and so
competition leaves that una¤ected.
Indeed, as we discussed in Section 3, in this case the binding incentive compati-
bility constraints are all local. The tradeo¤ between bribing and delivering quality is
una¤ected by competition, although, as in the absence of bribery, competition reduces
the price that the sponsors pays for that quality.
Thus, following our discussion in Section 4, competition relaxes the global constraint
imposed by bribery, so that when it is optimal to avoid corruption this can be done at a
lower e¢ ciency cost. However, when bribery is simply part of the equilibrium outcome,
competition does not a¤ect this equilibrium phenomenom. Competition increases the
sponsor’s expected surplus, but only in as much as it increases the chances of selecting
a more e¢ cient contractor.
7 Concluding remarks
We have characterized the optimal procurement rules when the contractor may bribe
the inspector so that the latter manipulates quality assessment once the contract be-
22
The direct e¤ect of n on c
is also positive. However, the increase in n induces an increase in
q( ) which has an additional, negative e¤ect on c
. However, in expected terms, the overall e¤ect on
quality is positive.
27
28. tween contractor and sponsor has been signed. Even when it is optimal to prevent
bribery, the optimal rules distort quality downwards, not only for low-e¢ ciency types,
but also for the most e¢ cient contractors. This is the case when the bribe is of known
and of …xed size or, more generally, under su¢ cient concavity of the bribe necessary
to secure a given level of manipulation. In these cases, bribery imposes a global (as
opposed to local) incentive-compatibility constraint, which compresses the variability
of quality that may be obtained. Thus, the sponsor optimally sets quality ‡oors, but
also quality ceilings, to what absent corruption would be optimal.
When the bribe is su¢ ciently convex, or it is uncertain at the time of contracting,
totally avoiding bribery may be too costly, and so the optimal mechanism is character-
ized by some manipulation and bribe payments in equilibrium. In these cases, bribery
simply a¤ects local incentive-compatibility constraints. Still, quality is curtailed as a
means of reducing the incidence of manipulation.
We have also considered menu of contracts that implement these rules. When
bribery sets a global constraint, these are straightforward modi…cations of an optimal
menu of contracts in the absence of bribery. The design of the menu is a little more
involved when bribery sets local incentive constraints. Finally, we have discussed the
e¤ects of contractor competition. On the one hand, when bribery imposes a global
constraint, this constraint is weakened as the number of potential contractors increases.
Correspondingly, quality distortions are reduced. On the other hand, when only local
constraints matter, so that bribery is part of the optimal outcome, the number of
contractors does not a¤ect the quality contracted with each type of contractor, and so
competition does not help reduce quality distortions.
Throughout the paper, we have taken a parsimonious, reduced-form approach to
bribery. All that we have modelled of the corrupt dealings between the contractor
and the inspector was the contractor’s payment/cost for such dealings, perhaps as a
function of manipulation. This reduced form is appropriate when the contractor has all
the bargaining power when dealing with the inspector. Future research should explore
two related phenomena that are absent in the present paper.
First, the size of the bribe may be the result of more ellaborate bargaining methods
28
29. between the inspector and the contractor. In that case, the sponsor’s decision on q( )
may a¤ect the outcome of these negotiations. Under some conditions, the results in
this paper may be extended quite straighforwardly. For instance, we could extend the
results in the …xed, known bribe case of Section 2 assuming Nash-bargaining between
the inspector and the contractor. Assume that the sum of the inspector’s and contra-
tor’s expected costs of illegal dealings and misreporting is 2B. As in Section 2, the
optimal mechanism should prevent bribery. Then, as in Section 2, taking into account
IC for non-bribing behavior, if a type contractor plans to claim type 0
< and bribe,
then her payo¤s will be
C(q( 0
); 0
) +
Z
0
C (q(z); z)dz
C(q( 0
); ) + 2B
2
:
The second term is the bribe payment/cost for the contractor. Under some conditions,
e.g., if
2C (qNB
( ); ) C (qNB
( ); ) > 0
for all , then bribery still imposes only a global constraint: the lowest e¢ ciency type
who delivers a positive quality, c
, should not have incentives to claim the highest
e¢ ciency type . In other terms, (5) should be replaced with
B C(q( ); ) +
c
Z
C (q(z); z)dz
C(q( ); c
)
2
:
Other than that, the analysis in Section 2 still applies. However, in more complex
bargaining and/or bribing models, the interaction between local and global constraints
may be also more complex.
Second, once we explicitly model negotiations between contractor and inspector,
information issues may be important. The decision on q( ) may a¤ect not only the split
of surplus between inspector and contractor, but also whether their illegal transaction
takes place. Indeed, q will become a signal of in a negotiation over the bribe between
contractor and inspector. The informativeness of this signal depends, at least in part,
on the mechanism that the sponsor designs. Here, as in Baliga and Sjostrom (1998), the
29
30. sponsor (principal) bene…ts from designing a mechanism that preserves the asymmetry
of information between inspector and contractor about the type of the latter. Moreover,
as in Celik (2009), the mechanism also determines the contractor’s disagreement utility.
Both things, information asymmetry and disagreement utility, a¤ect the gains from
trading bribes for favorable reports.
8 References
Acemoglu, D. (1995), "Reward structures and the allocation of talent," European Eco-
nomic Review, Vol. 39, No. 1, pp. 17–33.
Aidt, T. (2003), "Economic analysis of corruption: a survey," The Economic Jour-
nal, Vol. 113, pp. 632–652.
Arozamena, L. and F. Weinschelbaum (2009), "The e¤ect of corruption on bidding
behavior in …rst-price auctions," European Economic Review, Vol. 53, No. 6, pp.
645–657.
Baliga, S., and T. Sjostrom (1998), "Decentralization and Collusion", Journal of
Economic Theory, Vol. 83, pp. 196–232.
Burguet, R., and Y.K. Che (2004), "Competitive Procurement with Corruption",
The RAND Journal of Economics, Vol. 35, No. 1, pp. 50–68.
Burguet, R., and M. K. Perry (2007), "Bribery and Favoritism by Auctioneers in
Sealed-Bid Auctions", The B.E. Journal of Theoretical Economics. Vol. 7, No. 1.
Che, Y.K. (1993), "Design competition through multidimensional auctions", The
RAND Journal of Economics, Vol. 24, No. 4, pp.668–680.
Celentani, M., and J. J. Ganuza (2002), "Corruption and competition in procure-
ment", European Economic Review, Vol. 46, No. 7, pp. 1273–1303.
Celik, G. (2009), "Mechanism Design with Collusive Supervision," Journal of Eco-
nomic Theory, Vol 144, pp. 69–95.
Compte, O., A. Lambert-Mogiliansky and T. Verdier (2005), "Corruption and Com-
petition in Procurement Auctions", The RAND Journal of Economics, Vol. 36, No. 1,
pp. 1–15.
30
31. Koc, S. A., and W. S. Neilson (2008), "Interim bribery in auctions", Economics
Letters, Vol. 99, No. 2, pp. 238–241.
Lengwiler, Y, and E. Wolfstetter (2010), "Auctions and corruption: An analysis of
bid rigging by a corrupt auctioneer" Journal of Economic Dynamics and Control, Vol.
34, No. 10, pp. 1872–1892.
Menezes, F. M., and P. K. Monteiro (2006), "Corruption and auctions", Journal of
Mathematical Economics, Vol. 42, No. 1, pp. 97–108.
Milgrom , P., and I. Segal (2002), "Envelope Theorems for Arbitrary Choice Sets",
Econometrica, Vol. 70, No. 2, pp. 583–601.
Myerson, R.B., and M.A. Satterthwaite (1983), "E¢ cient mechanisms for bilateral
trading", Journal of Economic Theory, Vol. 29, pp. 265–281.
Tirole, J. (1986), "Hierarchies and Bureaucracies: On the Role of Collusion in
Organizations," Journal of Law, Economics, and Organizations, Vol. 2, No. 2, pp.
181–214.
Tirole, J. (1996), "A Theory of Collective Reputations (with Applications to the
Persistence of Corruption and toFirm Quality)," The Review of Economic Studies,Vol.
63, No. 1, pp. 1-22.
Transparency International (2006) Handbook For Curbing Corruption In Public
Procurement, Edited by K. Kostyo, Transparency International.
Rose-Ackerman, S. (1975), "The Economics of Corruption," Journal of Public Eco-
nomics, Vol 4, pp. 187–203.
Truex, R. (2011), "Corruption, Attitudes, and Education: Survey Evidence from
Nepal," World Development Vol. 39, No. 7, pp. 1133–1142.
You, J. and S. Khagram (2005), "A comparative study of inequality and corrup-
tion," American Sociological Review Vol. 70, pp. 136–157.
31
32. 9 Appendix
9.1 Proof of Lemma 1
Given a IC, IR mechanism (p; q; b) (p0
; q0
; b0
) where b0
( ) = 0 8 2 [ ; ]; q0
( ) =
q( ), p0
( ) = p( ) if b( ) = 0; and q0
( ) = 0, p0
( ) = p( ) B if b( ) = 1. It
is straightforward that ( ) is the same under both mechanisms for all . Also,
p0
(z) minz fC0
(q(z); ); Bg = p(z) minz fC(q(z); ); Bg if b( ) = 0, and p0
(z)
minz fC0
(q(z); ); Bg = p(z) B p(z) minz fC(q(z); ); Bg if b( ) = 1, and so the
mechanism is incentive-compatible and individually rational. Finally, the sponsor’s
payo¤ is larger under (p0
; q0
; b0
) if the probability that b( ) = 1 is positive.
9.2 Proof of Lemma 2
IC applied to types + and , require ( ; ) ( + ; ) and ( ; + )
( + ; + ), which simpli…es to
0 C(q( + ); ) C(q( + ); + ) (C(q( ); ) C(q( ); + )) ;
so that and since Cq > 0, we conclude that q( ) is indeed monotone decreasing.
We may bound q( ) without loss of generality, and thus, both ( ) and q( ) are a.e.
di¤erentiable, and from (4) so is p. Also using (4), at any di¤erentiability point of
( ),
p0
( ) = Cq(q( ); )q0
( ) 0: (15)
At any non-di¤erentiability point, we can rule out a jump upwards from continuity of
( ) and C(q; ), and monotonicity of q( ).
9.3 Proof of Proposition 3
The proof when (5) holds for the optimal mechanism without bribery is trivial. Now,
assume that (5) is violated by the optimal mechanism without bribery, and consider
32
33. the following free-time, …xed-endpoint control problem
max
q( )2[0;q( )]
Z
fq( ) C(q( ); ) X( )g f ( ) d (16)
s:t: X0
= C (q( ); );
with initial condition X( ) = B C(q( ); ) and target point X( ) = 0, for some given
parameter q( ). Note that
X( ) = X( ) +
Z
X0
(z)dz =
Z
C (q(z); z)dz ( = ( ) ): (17)
The quality choice q in the optimal mechanism (p ; q ; b = 0) with p ( ) de…ned by
(4) is a solution to this optimal control problem for q( ) = q ( ) if it is monotone.
Also, at that solution q( ) = 0 for > . The Hamiltonian for this optimal control
problem is
H( ; X; q) = fq( ) C(q( ); ) X( )g f ( ) + ( C (q( ); ))
where is the costate variable. Necessary conditions for interior solution include:
0
= f ( ) ;
C q(q( ); ) + (1 Cq(q( ); ))f ( ) = 0:
Integrating for 0
, we obtain = F( ), and substituting in the second equation, we
obtain the same marginal condition (2) as without bribery for values of < at points
where the solution in q is interior to [0; q( )]. Given our assumptions, this solution to
(2) is monotone decreasing. Therefore, if qNB
( ) > q( ) at some , then the solution to
the control problem at that is at a corner, q( ), and when qNB
( ) < q( ) but < ,
then q coincides with qNB
. Thus, de…ning a
as
qNB
( a
) = q( ); (18)
the solution for < a
is q( ) = q( ). If X( ) = 0 binds ( < at the solution of the
control problem), and from (17) then c
, satis…es
B C(q ( ); )
a
Z
C (q ( ); z)dz
c
Z
a
C (qNB
(z); z)dz = 0: (19)
33
34. We now characterize the value q ( ) in the optimal mechanism, and so the values
of a
and c
at the optimal mechanism. The sponsor’s expected surplus in the solution
to the control problem for a given value of q( ) qNB
( ) is:
a
Z
8
<
:
q( ) C(q( ); )
a
Z
C (q( ); z)dz
c
Z
a
C (qNB
(z); z)dz
9
=
;
f ( ) d +
c
Z
a
8
<
:
qNB
( ) C(qNB
( ); )
c
Z
C (qNB
(z); z)dz
9
=
;
f ( ) d ; (20)
where a
is a function of q( ) de…ned in (18), and c
is then also a function of q( )
de…ned in (19). The derivative of (20) with respect to q( ) is
d c
dq( )
qNB
( c
) C(qNB
( c
); c
) f ( c
) C (qNB
( c
); c
)F ( c
) + (21)
a
Z
8
<
:
1 Cq(q( ); )
a
Z
C q(q( ); z)dz
9
=
;
f ( ) d :
When evaluated at q( ) = qNB
( ), and so at a
= , the second line vanishes. Also,
from (19), d c
dq( )
< 0. The curly brackets in the …rst line is positive if qNB
( c
) > 0. Note
that indeed qNB
( c
) > 0 for c
evaluated at q( ) = qNB
( ) since otherwise (5) would
hold. Therefore, q ( ) < qNB
( ). Also, changing the order of integration, the second
line in (21) is
a
Z
f[1 Cq(q( ); )] f ( ) C q(q( ); )F( )g d > 0;
where the inequality follows from the fact that q( ) < qNB
( ) for all 2 [ ; a
) and the
integrand is zero evaluated at q = qNB
( ). Thus, at the optimal mechanism
qNB
( c
) C(qNB
( c
); c
) f ( c
) C (qNB
( c
); c
)F ( c
) > 0;
and so c
< , since we are assuming that qNB
( ) = 0.
9.4 Proof of Lemma 4
As before, assume that a type b
bribes with probability 1. Then her pro…ts are
p( ) EB. That implies that any type > b
also bribes with probability 1, or else
34
35. q( ) = 0. Indeed, ( ) = ( b
), since type can always imitate type b
and obtain
the same pro…ts, p( ) EB. But if q( ) > 0 and b( ) > B, then b
would bene…t from
deviating and imitating type , since her costs are lower. Thus, assume that for all
types b
either q( ) = 0 or b( ) = B. De…ne (p0
; q0
; b0
) where (p0
( ); q0
( ); b0
( )) =
(p( ); q( ); b( )) for all < b
, but (p0
( ); q0
( ); b0
( )) = (p( ) EB; 0; B) for > b
.
Note that, conditional on truth-telling, the pro…ts of all types are unchanged. Moreover,
the pro…ts of any deviating type are still the same, and so (p0
; q0
; b0
) is IC and IR. On
the other hand the payo¤ for the sponsor is larger, weakly so if the the measure of
types > b
with b( ) = B is zero.
9.5 Proof of Proposition 5
Consider the following optimal control problem
max
q( ) 0
Z
f[1 G(C(q( ); ))] [q( ) C(q( ); )] X( )g f ( ) d
s:t: X0
= C (q( ); ) [1 G(C(q; ))] ;
with initial condition X( ) = 0. The quality q that maximizes (8) subject to (7) and
(6) is also a solution to this control problem if it satis…es IC. The Hamiltonian of the
problem is
H = f[1 G(C(q; ))] [q C(q; )] X( )g f( )
+ [ C (q; ) [1 G(C(q; ))]] ;
so that again, for interior solution,
0
= f ( ) ;
and so = F ( ) and @H
@q
= 0 can be written as
0 =
1 G(C(q; ))
g(C(q; ))
1 Cq(q; ) C q(q; )
F ( )
f( )
(22)
Cq(q; ) q C(q; ) C (q; )
F ( )
f( )
:
35
36. The right hand side is decreasing in q and , under our assumption that (1) is increasing
both in q and in , and 1 G(:)
g(:)
is decreasing. Thus, the solution q( ) is also decreasing.
Assume that there exists 0
that solves
0 = 1 Cq(0; ) C q(0; )
F ( )
f( )
+ g(0)C (0; )Cq(0; )
F ( )
f( )
:
Then, d
= 0
, and the solution is q( ) = 0 for all > d
. Otherwise, d
= . For
< d
, (22) has a solution q( ) > 0.
9.6 Proof of Lemma 6
Assume m( ) > 0 for some value , and consider a change in the mechanism so that
q0
( ) = q( ) m( ), m0
( ) = 0, and p0
( ) = p( ) B(m( )). The pro…ts of type do
not change. Also, a type 0
imitating type could achieve
p( ) min
z2[0;q( )]
fC (q( ) z; 0
) + B(z)g ;
with the original mechanism, whereas with the modi…ed mechanism she can obtain
p0
( ) min
z2[0;q0( )]
fC (q0
( ) z; 0
) + B(z)g
= p( ) B(m( )) min
z2[0;q( ) m( )]
fC (q( ) m( ) z; 0
) + B(z)g
= p( ) min
z2[0;q( ) m( )]
C (q( ) m( ) z; 0
) + B(z) + B(m( ))
= p( ) min
h2[m( );q( )]
C (q( ) h; 0
) + B(h m( )) + B(m( )):
where we have used the change of variable h = z + m( ). This expression is smaller
since B is concave and the choice set of h is smaller than the choice set of z in the
original mechanism. The pro…ts of 0
imitating any other type have not changed, and
the pro…ts of imitating any other type are not larger.
9.7 Proof of Proposition 7
The proof parallels that of Proposition 3, given q( ). Thus, we need only show that
the sponsor’s surplus is maximized for q( ) < qNB
( ). The sponsor’s objective is still
given by (20), and so its derivative at qNB
( ) is also given by (21). Then, we only need
36
37. show that d c
dq( )
< 0. Totally di¤erentiatin the equivalent now to (19),
B(q( )) C(q( ); )
a
Z
C (q( ); z)dz
c
Z
a
C (qNB
(z); z)dz = 0;
we have
d c
dq( )
=
B0
(q( )) Cq(q( ); )
a
Z
C q(q( ); z)dz
C (qNB( c
); c
)
< 0;
where the inequality follows from A2 and the fact that C q(q; ) > 0.
37