×

Secure implementation experiments: Do strategy-proof mechanisms really work? (English) Zbl 1154.91387

Summary: Strategy-proofness, requiring that truth-telling is a dominant strategy, is a standard concept used in social choice theory. T. Saijo, T. Sjöström and T. Yamato [Secure implementation: Strategy-proof mechanisms reconsidered. Working paper 4-03-1. Department of Economics, Pennsylvania State University] argue that this concept has serious drawbacks. In particular, many strategy-proof mechanisms have a continuum of Nash equilibria, including equilibria other than dominant strategy equilibria. For only a subset of strategy-proof mechanisms do the set of Nash equilibria and the set of dominant strategy equilibria coincide. For example, this double coincidence occurs in the Groves mechanism when preferences are single-peaked. We report experiments using two strategy-proof mechanisms. One of them has a large number of Nash equilibria, but the other has a unique Nash equilibrium. We found clear differences in the rate of dominant strategy play between the two.

MSC:

91B14 Social choice

Software:

Z-Tree

References:

[1] Attiyeh, G.; Franciosi, R.; Isaac, R. M., Experiments with the pivotal process for providing public goods, Public Choice, 102, 95-114 (2000)
[2] Aumann, R.; Brandenburger, B., Epistemic conditions for Nash equilibrium, Econometrica, 63, 1161-1180 (1995) · Zbl 0841.90125
[3] Binmore, K. G.; Gale, J.; Samuelson, L., Learning to be imperfect: The ultimatum game, Games Econ. Behav., 8, 56-90 (1995) · Zbl 0827.90146
[4] Cabrales, A.; Ponti, G., Implementation, elimination of weakly dominated strategies and evolutionary dynamics, Rev. Econ. Dynam., 3, 247-282 (2000)
[5] Cason, T.N., Saijo, T., Wakayama, T., Yamato, T., 2004. Security versus supermodularity: An experimental study. Mimeo; Cason, T.N., Saijo, T., Wakayama, T., Yamato, T., 2004. Security versus supermodularity: An experimental study. Mimeo
[6] Cassady, R., Auctions and Auctioneering (1967), Univ. of California Press: Univ. of California Press Berkeley
[7] Charness, G.; Frechette, G.; Kagel, J., How robust is laboratory gift exchange?, Exper. Econ., 7, 189-205 (2004) · Zbl 1091.91015
[8] Chen, Y., An experimental study of the serial and average cost pricing mechanisms, J. Public Econ., 87, 2305-2335 (2003)
[9] Chen, Y., Dynamic stability of Nash-efficient public goods mechanisms: Reconciling theory with experiments, (Zwick, R.; Rapoport, A., Experimental Business Research, vol. II (2005), Kluwer Academic: Kluwer Academic Dordrecht/Norwell), 185-200
[10] Chen, Y.; Gazzale, R., When does learning in games generate convergence to Nash equilibria? The role of supermodularity in an experimental setting, Amer. Econ. Rev., 94, 1505-1535 (2004)
[11] Clarke, E. H., Multipart pricing of public goods, Public Choice, 2, 19-33 (1971)
[12] Coppinger, V. M.; Smith, V. L.; Titus, J. A., Incentives and behavior in English, Dutch and sealed-bid auctions, Econ. Inquiry, 18, 1-22 (1980)
[13] Dorsey, R., Razzolini, L., 1999. An experimental evaluation of the serial cost sharing rule. Mimeo. University of Mississippi; Dorsey, R., Razzolini, L., 1999. An experimental evaluation of the serial cost sharing rule. Mimeo. University of Mississippi · Zbl 1206.91018
[14] Fischbacher, U., \(1999. z\); Fischbacher, U., \(1999. z\)
[15] Garratt, R., Walker, M., Wooders, J., 2002. Behavior in second-price auctions by highly experienced eBay buyers and sellers. Mimeo. University of Arizona; Garratt, R., Walker, M., Wooders, J., 2002. Behavior in second-price auctions by highly experienced eBay buyers and sellers. Mimeo. University of Arizona
[16] Gibbard, A., Manipulation of voting schemes, Econometrica, 41, 587-601 (1973) · Zbl 0325.90081
[17] Green, J. R.; Laffont, J.-J., Incentives in Public Decision Making (1979), North-Holland: North-Holland Amsterdam · Zbl 0417.90001
[18] Groves, T., Incentives in teams, Econometrica, 41, 617-631 (1973) · Zbl 0311.90002
[19] Harstad, R. M., Dominant strategy adoption and bidders’ experience with pricing rules, Exper. Econ., 3, 261-280 (2000)
[20] Holmström, B., Groves scheme on restricted domain, Econometrica, 47, 1137-1144 (1979) · Zbl 0411.90004
[21] Hurwicz, L., On informationally decentralized systems, (McGuire, C.; Radner, R., Decisions and Organizations (1972), North-Holland: North-Holland Amsterdam), 297-336 · Zbl 0254.90009
[22] Kagel, J. H.; Levin, D., Independent private value auctions: Bidder behavior in first-, second- and third-price auctions with varying number of bidders, Econ. J., 103, 868-879 (1993)
[23] Kagel, J. H.; Harstad, R. M.; Levin, D., Information impact and allocation rules in auctions with affiliated private values: A laboratory study, Econometrica, 55, 1275-1304 (1987)
[24] Kawagoe, T.; Mori, T., Can the pivotal mechanism induce truth-telling? An experimental study, Public Choice, 108, 331-354 (2001)
[25] Maskin, E., 1979. Incentive schemes immune to group manipulation. Mimeo; Maskin, E., 1979. Incentive schemes immune to group manipulation. Mimeo
[26] Muench, T.; Walker, M., Are Groves-Ledyard equilibria attainable?, Rev. Econ. Stud., 50, 393-396 (1983) · Zbl 0533.90015
[27] Roth, A. E.; Ockenfels, A., Last minute bidding and the rules for ending second-price auctions: Evidence from eBay and Amazon auctions on the Internet, Amer. Econ. Rev., 92, 1093-1103 (2002)
[28] Saijo, T., Sjöström, T., Yamato, T., 2003. Secure implementation: Strategy-proof mechanisms reconsidered. Working paper 4-03-1. Department of Economics, Pennsylvania State University; Saijo, T., Sjöström, T., Yamato, T., 2003. Secure implementation: Strategy-proof mechanisms reconsidered. Working paper 4-03-1. Department of Economics, Pennsylvania State University
[29] Smith, V., Method in experiment: Rhetoric and reality, Exper. Econ., 5, 91-110 (2002) · Zbl 1061.62578
[30] Vickrey, W., Counterspeculation, auctions, and competitive sealed tenders, J. Finance, 16, 8-37 (1961)
[31] Yamato, T., Double implementation in Nash and undominated Nash equilibria, J. Econ. Theory, 59, 311-323 (1993) · Zbl 0793.90003
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.