Provision of Public Goods on Networks: On Existence, Uniqueness, and Centralities

We consider the provision of public goods on networks of strategic agents. We study different effort outcomes of these network games, namely, the Nash equilibria, Pareto efficient effort profiles, and semi-cooperative equilibria (resulting from interactions among coalitions of agents). We identify necessary and sufficient conditions on the structure of the network for the uniqueness of the Nash equilibrium by using a connection between these outcomes and linear complementarity problems. We show that our finding unifies, and extends, existing results in the literature. We also identify conditions for the existence of Nash equilibria for two subclasses of games at the two extremes of our model, namely games of strategic complements and games of strategic substitutes. We provide a graph-theoretical interpretation of agents’ efforts at the Nash equilibrium, as well as the Pareto efficient outcomes and semi-cooperative equilibria, by linking an agent's decision to her centrality in the interaction network. Using this connection, we separate the effects of incoming and outgoing edges on agents’ efforts and uncover an alternating effect over walks of different length in the network.

[1]  M. Feldman,et al.  Knowledge spillovers and the geography of innovation , 2004 .

[2]  P. Bonacich Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.

[3]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.

[4]  G. Dantzig,et al.  COMPLEMENTARY PIVOT THEORY OF MATHEMATICAL PROGRAMMING , 1968 .

[5]  Katta G. Murty,et al.  On the number of solutions to the complementarity problem and spanning properties of complementary cones , 1972 .

[6]  Hal R. Varian,et al.  System Reliability and Free Riding , 2004, Economics of Information Security.

[7]  Mohammad Taghi Hajiaghayi,et al.  Network Cournot Competition , 2014, WINE.

[8]  Kostas Bimpikis,et al.  Cournot competition in networked markets , 2014, EC.

[9]  Antoni Calvó-Armengol,et al.  Centre De Referència En Economia Analítica Barcelona Economics Working Paper Series Working Paper Nº 178 Who's Who in Networks. Wanted: the Key Player Who's Who in Networks. Wanted: the Key Player Barcelona Economics Wp Nº 178 , 2022 .

[10]  Yann Bramoullé,et al.  Games Played on Networks , 2015 .

[11]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[12]  M. Jackson,et al.  Games on Networks , 2014 .

[13]  Chandler Davis THEORY OF POSITIVE LINEAR DEPENDENCE. , 1954 .

[14]  Coralio Ballester,et al.  Interactions with hidden complementarities , 2010 .

[15]  Parinaz Naghizadeh Ardabili,et al.  Exit equilibrium: Towards understanding voluntary participation in security games , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[16]  Antoni Calvó-Armengol,et al.  Delinquent Networks , 2009, SSRN Electronic Journal.

[17]  Richard W. Cottle,et al.  Linear Complementarity Problem , 2009, Encyclopedia of Optimization.

[18]  Francis Bloch,et al.  Pricing in social networks , 2013, Games Econ. Behav..

[19]  Nizar Allouch,et al.  On the Private Provision of Public Goods on Networks , 2012, J. Econ. Theory.

[20]  J. Goodman Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games , 1965 .

[21]  Asuman E. Ozdaglar,et al.  Optimal Pricing in Networks with Externalities , 2011, Oper. Res..

[22]  R. Kranton,et al.  Strategic Interaction and Networks , 2010 .

[23]  Leo Katz,et al.  A new status index derived from sociometric analysis , 1953 .

[24]  A. Mas-Colell,et al.  Microeconomic Theory , 1995 .

[25]  David C. Parkes,et al.  The Importance of Network Topology in Local Contribution Games , 2007, WINE.

[26]  Robert J. Plemmons,et al.  Nonnegative Matrices in the Mathematical Sciences , 1979, Classics in Applied Mathematics.

[27]  Alireza Tahbaz-Salehi,et al.  Networks, Shocks, and Systemic Risk , 2015 .

[28]  Katta G. Murty,et al.  Linear complementarity, linear and nonlinear programming , 1988 .

[29]  J. Pang Hidden Z-matrices with positive principal minors☆ , 1979 .

[30]  Adam Wierman,et al.  The role of a market maker in networked cournot competition , 2014, 53rd IEEE Conference on Decision and Control.

[31]  Nicholas Bambos,et al.  Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[32]  M. Rosenzweig,et al.  Microeconomics of Technology Adoption. , 2010, Annual review of economics.

[33]  Parinaz Naghizadeh Ardabili,et al.  Provision of non-excludable public goods on networks: From equilibrium to centrality measures , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[34]  Yann Bramoullé,et al.  Public goods in networks , 2007, J. Econ. Theory.

[35]  Jean C. Walrand,et al.  How Bad Are Selfish Investments in Network Security? , 2011, IEEE/ACM Transactions on Networking.

[36]  Phillip Bonacich,et al.  Eigenvector-like measures of centrality for asymmetric relations , 2001, Soc. Networks.

[37]  N. Christakis,et al.  Dynamic spread of happiness in a large social network: longitudinal analysis over 20 years in the Framingham Heart Study , 2008, BMJ : British Medical Journal.

[38]  Matthew Elliott,et al.  A Network Approach to Public Goods , 2017, Journal of Political Economy.