How Paradoxical Is the “Paradox of Side Payments”? Notes from a Network Interconnection Perspective

Author(s):  
Peter Reichl ◽  
Patrick Zwickl ◽  
Christian Löw ◽  
Patrick Maillé
2007 ◽  
Vol 97 (3) ◽  
pp. 871-889 ◽  
Author(s):  
Bård Harstad

For two districts or countries that try to internalize externalities, I analyze a bargaining game under private information. I derive conditions for when it is efficient with uniform policies across regions—with and without side payments—and when it is efficient to prohibit side payments in the negotiations. While policy differentiation and side payments allow the policy to better reflect local conditions, they create conflicts between the regions and, thus, delay. The results also describe when political centralization outperforms decentralized cooperation, and they provide a theoretical foundation for the controversial “uniformity assumption” traditionally used by the fiscal federalism literature. (JEL C78, D72, D82, H77)


2004 ◽  
Vol 06 (04) ◽  
pp. 525-554
Author(s):  
GREGORY K. DOW

This paper replaces the standard view of the firm as a nexus of contracts with a repeated game framework where input contributions and side payments are self-enforced. General production technologies and flexible transfers among team members are allowed. When an incentive constraint binds, input demand and output supply are influenced by the discount factor, the probability of exogenous team dissolution, and the aggregate value of outside options. When this incentive constraint does not bind, the firm maximizes profit in the usual way. I discuss examples involving the Cobb-Douglas technology, firms with a single residual claimant, and partnerships.


1971 ◽  
Vol 1 (1) ◽  
pp. 95-109 ◽  
Author(s):  
G. Owen
Keyword(s):  

2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


Sign in / Sign up

Export Citation Format

Share Document