Mikhail Iskakov1 and Alexey Iskakov2
1 V.A.Trapeznikov Institute of Control Sciences, Ul.Profsoyuznaya 65, Moscow 117997, Russia
E-mail: [email protected]
2 V.A.Trapeznikov Institute of Control Sciences, Ul.Profsoyuznaya 65, Moscow 117997, Russia E-mail: [email protected], [email protected]
Abstract We analyze the Bertrand-Edgeworth duopoly model using a solution concept of Equilibrium in Secure Strategies (EinSS), which provides a model of cautious behavior in non-cooperative games. It is suitable for studying games, in which threats of other players are an important factor in the decision-making. We show that in some cases when Nash-Cournot equilibrium does not exist in the price duopoly of Bertrand-Edgeworth there is an EinSS with equilibrium prices lower than the monopoly price. The corresponding difference in price can be interpreted as an additional cost to maintain security when duopolists behave cautiously and secure themselves against mutual threats of undercutting. We formulate and prove a criterion for the EinSS existence.
Keywords: Bertrand-Edgeworth Duopoly, Equilibrium in Secure Strategies, Capacity Constraints.
1. Introduction
It is well known that the model of Bertrand-Edgeworth may not posses a Nash equilibrium (see e.g. d’Aspremont and Gabszewicz (1985)). Let the receipt function pD(p) be strictly concave and reach its maximum at monopoly price pM. When D(pM) ^ S1 + S2 there is a Nash price equilibrium (p*,p*) in the Bertrand-Edgeworth duopoly model such that D(p*) = S1 + S2. When D(pM) < S1 + S2 there is no (pure strategy) Nash equilibrium in this game. There were several attempts to restore the concept of equilibrium in this model. For example d’Aspremont and Gabszewicz (1985) proposed the concept of quasi-monopoly, which restores the existence of pseudo equilibrium when one capacity is quite small compared to the other. Dasgupta and Maskin (1986) and Dixon (1984) demonstrated the existence of mixed-strategy equilibrium. However it proved not to be easy to characterize what the equilibrium actually looks like. Allen and Hellwig (1986a) were able to show that in a large market with many firms, the average price set would tend to the competitive price.
In this paper we analyze the Bertrand-Edgeworth duopoly model using a solution concept of Equilibrium in Secure Strategies (EinSS), which provides a model of cautious behavior in non-cooperative games (M.Iskakov 2005, 2008). It is suitable for studying games, in which threats of other players are an important factor in
* This work was supported by the research project No.14-01-00131-a of the Russian Foundation for Basic Research.
the decision-making (M.Iskakov and A.Iskakov 2012b). This concept proved to be effective and allowed to find equilibrium positions in some well-known economic games that fail to have Nash-Cournot equilibrium. In particular this approach has been successfully applied for the classic Hotelling’s model with the linear transport costs (Hotelling 1929). There is no price Nash-Cournot equilibrium in this game when duopolists choose locations too close to each other (d’Aspremont et al., 1979). However, there is a unique EinSS price solution for all location pairs under the assumption that duopolists secure themselves against being driven out of the market by undercutting (M.Iskakov and A.Iskakov 2012a). Equilibria in secure strategies have been also successfully characterized for the contest described by Tullock (1969, 1980) as a rent-seeking contest. It is well known that a Nash-Cournot equilibrium does not exist in a two-player contest when the contest success function parameter is greater than two. However an EinSS always exists in the Tullock contest (M.Iskakov et al., 2013). Moreover, when the success function parameter is greater than two, this equilibrium is unique up to a permutation of players, and has a lower rent dissipation than in a mixed-strategy Nash equilibrium.
Our aim is to analyze the original Bertrand-Edgeworth duopoly model with capacity constraints, which may not possess a Nash-Cournot equilibrium. We show that in some cases when Nash-Cournot equilibrium does not exist there is an EinSS with equilibrium prices lower than the monopoly price. The corresponding difference in price can be interpreted as an additional cost to maintain security when duopolists are cautious and avoid mutual threats. We formulate and prove a criterion for the EinSS existence.
The remaining paper is organized as follows. In Section 2 we remind the Bertrand-Edgeworth model. In Section 3 the solution concept that we are going to use for analyzing the price duopoly game is presented. In Section 4 the equilibria in secure strategies are characterized for the linear demand function. In Section 5 the obtained results are generalized for the strictly concave receipt functions. Finally we provide an interpretation and summarize our results in the Conclusion.
2. Bertrand-Edgeworth duopoly model
In this section we consider a model of price setting duopolists with capacity constraints originated in papers of Bertrand (1883) and Edgeworth (1925). We consider the market for some homogeneous product with a continuous strictly decreasing consumer’s demand function D(p). There are two firms in the industry i = 1, 2, each with a limited amount of productive capacity Si such that D(0) > Si + S2. As in Edgeworth’s work we assume these limits as physical capacity constraints, which are the same at all prices. Firms choose prices pi and play non-cooperatively. The firm quoting the lower price serves the entire market up to its capacity and the residual demand is met by the other firm.
All consumers are identical and choose the lower available price on a first-come-first-serve basis. Following Shubik (1959) and Beckmann (1965) we assume in our analysis that the residual demand to the firm quoting the higher price is a proportion of total demand at that price. If duopolists set the same prices firms share the market in proportion to their capacities. Formally we define the payoff functions of players
to be:
«1 (p1, p2 )
«2 (p1, p2 )
ip! min{S1,D(p1)}, p1 <p2 p1min{S1,g^D{p1)}, pi=p2 {Pl minis'!, max{0, D{p2) - S2}}, pi > p2
fp2 min{S2,D(p2)}, p2 <p1 »2min{S2, s^D(p2)}, P2=Pi [p2 min{S2, max{0, D(pi) - Si}}, p2 > pi
(1)
In the particular case of a linear demand function D(p) = 1 — p, which we consider below, the payoff functions can be written as:
«2 (p1, p2 )
fp1 min{S1,1 — p1}, p1 <p2
U1 (p1,p2) = < p1 min{S1,
Si
S1+S2
(i-pi)
(1 — p1)}, p1 = p2
pi minjSi, maxjO, 1 - p2 - S2}}, p1 > p2
ip2 min{S2,1 — p2}, p2 <p1 ip2min{S2,^2g-(l-p2)}, p2=pi p2 min{S2, maxjO, 1 - pi - Si}}, p2 > pi
(2)
The study of this case will allow us relatively easy to prove the main results in Section 4. However, these results will be generalized to arbitrary strictly concave receipt functions in Section 5.
3. Equilibrium in Secure Strategies
We now proceed to define the solution concept that we are going to use to analyze the Bertrand-Edgeworth duopoly model (1). Below we provide definitions of Equilibrium in Secure Strategies from (M.Iskakov and A.Iskakov 2012b). Consider n-person non-cooperative game in the normal form G = (i G N, s* G S*,« G R). The concept of equilibria is based on the notion of threat and on the notion of secure strategy.
Definition 1. A threat of player j to player i at strategy profile s is a pair of strategy profiles {s, (sj, s_j)} such that Uj(sj, s_j) > Uj(s) and «¿(sj, s_j) < «¿(s). The strategy profile s is said to pose a threat from player j to player i.
Definition 2. A strategy s* of player i is a secure strategy for player i at given strategies s_j of all other players if profile s poses no threats to player i. A strategy profile s is a secure profile if all strategies are secure.
In other words a threat means that it is profitable for one player to worsen the situation of another. A secure profile is one where no one gains from worsening the situation of other players.
Definition 3. A secure deviation of player i with respect to s is a strategy sj such that uj(sj,s_j) > u*(s) and Uj(sj,sj, s_j) > u*(s) for any threat {(sj,s_j), (sj, sj, s_j)} of player j = i to player i.
There are two conditions in the definition. In the first place a secure deviation increases the profit of the player. In the second place his gain at a secure deviation covers losses which could appear from retaliatory threats of other players. It is important to note that secure deviation does not necessarily mean deviation into secure profile. After the deviation the profile (sj, s_*) can pose threats to player i. However these threats can not make his or her profit less than in the initial profile s. We assume that the player with incentive to maximize his or her profit securely will look for secure deviations.
Definition 4. A secure strategy profile is an Equilibrium in Secure Strategies (EinSS) if no player has a secure deviation.
There are two conditions in the definition of EiSS. There are no threats in the profile and there are no profitable secure deviations. The second condition implicitly implies maximization over the set of secure strategies.
Any Nash-Cournot equilibrium poses no threats to players so it is a secure profile. And no player in Nash-Cournot equilibrium can improve his or her profit using whatever deviation. Both conditions of the EinSS are fulfilled. Therefore we obtain
Proposition 1. Any Nash-Cournot equilibrium is an Equilibrium in Secure Strategies.
The Nash equilibrium is the profile, in which the strategy of each player is the best response to strategies of other players. In a similar way, the strategy of each player in the EinSS turns out to be the best secure response.
Definition 5. A secure strategy s* of player i is a best secure response to strategies s_* of all other players if player i has no more profitable secure strategy at s_*. A profile s* is the Best Secure Response profile (BSR-profile) if strategies of all players are best secure responses.
The EinSS is a secure profile by definition. And it must be the best secure response for each player since otherwise there is a player who can increase the payoff by secure deviation. Therefore we get:
Proposition 2. Any Equilibrium in Secure Strategies is a BSR-profile.
This property provides a practical method for finding EinSS in three steps: (i) to analyze threats and determine conditions for secure profile, (ii) to find all BSR-profiles as a solution of the corresponding maximization problem in the set of secure profiles, and (iii) to verify the definition of EinSS for the found BSR-profiles.
4. Solution in secure prices for the linear demand function
In this Section we illustrate how to find an EinSS in the simplest case of the linear demand function D(p) = 1 — p. First of all, let us analyze the threats between players and define secure profiles in the Bertrand-Edgeworth duopoly model.
Proposition 3. The profile (p1,p2) is a secure profile in the duopoly price game of Bertrand-Edgeworth with the linear demand function D(p) = 1 — p and payoff functions (2) if and only if it lies in the set M = {(p1,p2) : 0 < p* ^ p*, i = 1, 2}, where p* = 1 — S1 — S2.
Proof. (1). Consider the case p* < p1 < p2. If 1 — p1 > S1 player 1 always threatens player 2 by slight increasing his price p1. If 1 — p1 < S1 then player 2 can decrease his price till p2 < p1. In this case, according to (2): U1(p1,p52) = p1(1 — ^i)max{0,i--P2-S2} < pi^ _pij = Ul(pup2) and u2{pi,p2) = P2 min{52,1 -p2} > 0 = U2(p1,p2), and therefore there is always a threat of player 2 to player 1. Symmetrically, if p* < p2 < p1 either player 2 threatens player 1 or vice versa. If p* < p2 = p1 there is always a bilateral threat of undercutting by slight decreasing of price.
(2). If p1 < p* < p2 player 1 always threatens player 2 by increasing his price till p* +0 < p2 which exceeds p* by an arbitrarily small amount. Indeed, in this case 1 — p1 > 1 — (p* +0) > S1 and according to (2) U1(p1,p2) = p1S1 < (p* + 0)Si = u\{p* + 0,p2). On the other hand, u2(p* + 0,p2) = p2 S2 < p2S2 and
u2(p* +0,p2) = p2( 1 -p2) (l - 1_<§l+0)^ < P2(l ~ P2) (l - => u2(p* +
0,p2) < U2(p1,p2). Symmetrically, if p2 < p* < p1 player 2 always threatens player
1.
(3). From the above it follows that all secure profiles must lie in the set M = {(p1,p2) : 0 < p* < p*, i = 1, 2}. From the other hand if p1 < p*: U1(p1,p2) = S1p1 linearly increases in p1 and does not depend on p2. Hence there are no threats for player 1. Symmetrically, if p2 ^ p* there are no threats for player 2. Therefore (p1,p2) is a secure profile in the game (2) if and only if it lies in the set M = {(p1,p2):0 <pj < p*, i = 1, 2}. □
Let us now find all Best Secure Response profiles in the set M of secure profiles.
Proposition 4. In the duopoly price game of Bertrand-Edgeworth with the linear demand function D(p) = 1 — p and payoff functions (2) there is a unique Best Secure Response profile (p* ,p*), where p* = 1 — S1 — S2.
Proof. According to Definition 5 and Proposition 3 any Best Secure Response profile must lie in the set M = {(p1,p2) : 0 < p* < p*, i = 1, 2} of secure profiles found in Proposition 3. According to (2) the payoff functions u1 = S1p1 and u2 = S2p2 increase in the set M linearly in p1 and in p2 respectively. Therefore there can be only one BSR-profile (p*,p*) in the set M (otherwise at least one player can securely slightly increase his price and get a more profitable secure strategy in M). Let us now prove that it is indeed a BSR-profile. Any decrease in price in the profile (p*,p*) is not profitable for players. On the other hand, as shown in paragraph 2 of the proof of Proposition 3 any increase in price in the profile (p*,p*) is not secure for players. Therefore no player has a more profitable secure strategy in (p*,p*) and therefore this profile by definition is a Best Secure Response profile in the game. □
According to Proposition 2 there can not be other EinSS in the Bertrand-Edgeworth duopoly game except the BSR-profile (p*,p*) found in Proposition 4. Below we formulate and prove a necessary and sufficient condition for the BSR-profile (p*,p*) to be an Equilibrium in Secure Strategies.
Proposition 5. In the game of Bertrand-Edgeworth with the linear demand function D(p) = 1 — p and payoff functions (2) there is an Equilibrium in Secure Prices (p*, p*) where p* = 1 — S1 — S2 if and only if
If the equilibrium price is not less than the monopoly price p* ;:i pM = b it is a Nash equilibrium. There are no other EinSS in the game.
0 0.2 0.4 0.6 0.B 1
Si
Fig. 1: Equilibria in secure prices in the Bertrand-Edgeworth duopoly model with D(p) =
1 — p in the space of capacity parameters (Si, S2). Dark gray area: EinSS which coincide with Nash equilibria. Light gray area: EinSS which are not Nash equilibria. White area: there are neither Nash equilibria nor EinSS.
Equilibria in secure prices in the space of capacity parameters (Si, S2) are shown in Fig.l. The profile (p*,p*) is a Nash equilibrium if S'i + S2 < ^ (dark gray area). Under the weaker conditions (3) it is an EinSS. The area of EinSS which are not Nash equilibria are shaded by light gray in Fig.1. If conditions (3) do not hold this profile is no longer an EinSS and corresponds to an unstable BSR-profile. The found solution can be compared with the price which would maximize the joint profits in the industry pM = maxjl — S'i — S2, ^}. If Nash equilibrium exists (i.e. if S'i + S2 < i) then both equilibrium prices coincide. However if EinSS exists and Nash equilibrium does not exist (i.e. if S'i+S2 > ^ and (3) holds) both EinSS prices p* = 1 — S'i — S2 are lower than the monopoly price pm = b- One can interpret the price difference S'i + S2 — ^ as an additional cost to maintain security in the situation when players take into account mutual threats of undercutting and behave cautiously.
Proof. (1) Necessity. Let us consider profile (p*,p*) and prove the conditions
(3). Suppose for example that p* < p(S2) = 1~r)s'2. Then player 1 can deviate p\ —> p. His payoff will increase since p* < p < pm = k and ui{'Pi,P2) is strictly increasing in pi if pi < pm = k according to (2). Any retaliatory threat of player
2 according to (2) can not make the payoff of player 1 less than minu1(p,p2) =
P 2
min u1(p,p2) = u1(p,p2)\P2=p-o = j3min{S1,1 — p — S2}. The payoff of player 1 in
P2<P
the initial profile does not exceed this value. Indeedp(1—p —S2) is strictly increasing at p < p = 1~2S'2 and we have u\{p*,p*) < p*{ 1 — p* — S2) < p(l — p — S2) and u1(p* ,p*) < p*S1 < j3S1. Therefore the deviation of player 1 into p(S2) is always a secure deviation according to Definition 3. Hence profile (p*,p*) is not an EinSS. Symmetrically if p* < p(Si) = 1~^1 then player 2 can make a secure deviation into p3(S1) and profile (p*,p*) is not an EinSS either. The necessity of (3) is proven.
(2) Sufficiency. Let us now assume that (3) holds (i.e. j3(S1) < p* and p(S2) <
p*). Consider an arbitrary deviation p* ^ p1 of player 1. If p1 < p* it can not be a profitable deviation for player 1. Therefore p1 > p*. Player 1 increases the payoff if and only if u\{p*,p*) =p*S1 = p* (1 -p*) < ui{pi,p*) = pi (1 ~Pi),
i.e. there must be p*(1 — p*) < p1(1 — p1). Then there is retaliatory threat of player 2 to deviate from profile (p1,p*) into profile arbitrarily close to (p1,p1 — 0). From p*S2 < p1S2 and p*(1 — p*) < p1(1 — p1) it follows that player 2 increases the payoff at this deviation. The payoff of player 1 in this profile is arbitrarily close to u1(p1,p1 — 0) = p1 min{S1,1 — p1 — S2}\p*<pi = p1(1 — p1 — S2). Since p(1 — p — S2) is strictly decreasing at p > p(S2) = 1~2S‘2 and Pi > P* ^ p(S2) = 1~2S‘2 then u1(p*,p*) = p*(1 — p* — S2) > p1(1 — p1 — S2) = u1(p1,p1 — 0). Therefore the deviation of player 1 into profile (p1,p*) is not a secure deviation. Symmetrically an arbitrary deviation of player 2 is not a secure deviation either. No player can make secure deviation in the profile (p*,p*). By definition it is an EinSS. The sufficiency of (3) is proven.
(3) Nash equilibrium condition. One can easily check that pM ^ p* (S1 +
S2 < is the maximum condition of functions u\{pi) = u\{pi,p*) and u2(p2) = u2(p* ,p2) in the points p1 = p* and p2 = p* respectively. In other words it is a condition of Nash equilibrium for the profile (p*,p*).
(4) Uniqueness of EinSS. It follows from Proposition 2 and the uniqueness of BSR-profile proven in Proposition 4. □
5. Solution in secure prices for the strictly concave receipt function
Obtained in the previous section results can be generalized to the more general case of the strictly concave receipt function pD(p). Although the proofs become slightly more involved they follow the similar logic.
Proposition 6. Let the receipt function pD(p) be strictly concave and reach its maximum at pM. Then in the game of Bertrand-Edgeworth with payoff functions (1) there is an EinSS (p*,p*) where D(p*) = S1 + S2 if and only if
iargmax{p(D(p) — S1)} ^ p*
p>0 (4)
arg max{p(D(p) — S2)} < p*
P>0
If p* ^ pm it is a Nash equilibrium. There are no other EinSS in the game.
Remark. Since the receipt function pD(p) is strictly concave then the function p(D(p) — S) at a given S is also strictly concave in p and reaches the unique maximum at p > 0. Therefore argmax{p(D(p) — S)} can be considered as a function of
P> 0
S. The proof is given in (M.Iskakov, A.Iskakov, 2012b).
The condition (4) can be easily formulated in differential form.
Proposition 7. If function pD(p) is differentiable the condition (4) is equivalent to
Proof. One can easily check that p = argmax{p(.D(p) — S')} <=> j-lpD(p)
p>0 dp V
/ reasing. Therefore p ^ p* <=>
The obtained results are generally similar to the results obtained for the linear demand function. In the EinSS all firms set equal prices such that market demand equals total supply. If the equilibrium price exceeds or equals the monopoly price this solution coincides with the well-known Nash equilibrium solution. However, in the EinSS which is not Nash equilibrium the prices are lower than the monopoly price. The corresponding difference in price can be interpreted as an additional cost to maintain security in the situation when players behave cautiously and secure themselves against mutual threats of undercutting.
6. Conclusion
In this paper we considered the Bertrand-Edgeworth duopoly model, with capacity constraints which may not possess a Nash-Cournot equilibrium. Whilst the existence of mixed-strategy equilibrium was demonstrated by Dixon (1984), it has not proven easy to characterize what the equilibrium actually looks like. It has been argued that non-pure strategies are not plausible in the context of the Bertrand-Edgeworth model. Therefore several alternative approaches have been proposed as a response to the non-existence of pure-strategy equilibrium. Allen and Hellwig (1986b) proposed a modification of the game, in which firms choose the quantity they are willing to sell up to at each price. Dastigar (1995) proposed that firms have to meet all demand at the price they set. Benassy (1989) introduced in the Bertrand-Edgeworth model the product differentiation. Dixon (1993) explored the Bertrand-Edgeworth model with ” integer pricing” when firms cannot undercut each other by an arbitrarily small amount. All these approaches in some sense or another change the setting of the original game and introduce specific ad hoc modification to the Bertrand-Edgeworth model.
As an alternative approach to analyze the Bertrand-Edgeworth duopoly model we propose in this paper the concept of Equilibrium in Secure Strategies (EinSS). We present a new intuitive formulation of EinSS concept from (M.Iskakov and A.Iskakov, 2012b). An existence condition of the EinSS in the Bertrand-Edgeworth price duopoly is formulated and proved, which allowed us to extend the set of Nash-Cournot price equilibria in the game. If the equilibrium price exceeds or equals the monopoly price this solution coincides with the Nash-Cournot equilibrium solution. However, in the EinSS, which is not Nash-Cournot equilibrium the prices are lower than the monopoly price. The corresponding difference in price can be interpreted as an additional cost to maintain security when duopolists secure themselves against the threats of being undercut.
(4’)
Hence the equivalence of (4) and (4’).
□
Although the proposed approach does not completely solve the problem of the non-existence of Nash-Cournot equilibria in the Bertrand-Edgeworth model, it nevertheless provides some advantages. In contrast to the above mentioned ad hoc equilibrium concepts developed in the context of the Bertrand-Edgeworth model, the EinSS is a general equilibrium concept that proved to be effective and allowed to find equilibrium positions in several well-known economic games that fail to have Nash-Cournot equilibrium (M.Iskakov and A.Iskakov, 2012b). On the other hand unlike equilibria in mixed strategies it offers a solution in an explicit form and can be easily interpreted in terms of cautious behavior.
Acknowlegments. We are deeply indebted to C.d’Aspremont who helped us to find an elegant and intuitively clear formulation of the EinSS concept and inspired us to apply it to the Bertrand-Edgeworth duopoly model. We are thankful to F.Aleskerov and D.Novikov for regular discussions on the subject of EinSS concept during seminars at Moscow High School of Economics and at V.A.Trapeznikov Institute of Control Sciences. This work was supported by the research project No.14-01-00131-a of the Russian Foundation for Basic Research.
References
Allen, B. and Hellwig, M. (1986a). Bertrand-Edgeworth oligopoly in large markets. Rev.
Econ. Stud., 53, 175-204.
Allen, B. and Hellwig, M. (1986b). Price-Setting Firms and the Oligopolistic Foundations of Perfect Competition. The American Economic Review, 76(2), 387-392. d’Aspremont, C., Gabszewicz, J. and Thisse, J.-F. (1979). On Hotelling’s ’Stability in Competition’. Econometrica, 47(5), 1145-1150. d’Aspremont, C. and Gabszewicz, J. (1985). Quasi-Monopolies. Economica, 52(206), 141151.
Benassy, J.-P. (1989). Market Size and Substitutability in Imperfect Competition: A Bertrand-Edgeworth-Chamberlin Model? Review of Economic Studies, 56(2), 217-234. Bertrand, J. (1883). Review of Cournot’s ’Rechercher sur la theoric mathematique de la richesse’. Journal des Savants, 499-508.
Dastidar, K. G. (1995). On the existence of pure strategy Bertrand equilibrium. Econ. Theory, 5, 19-32.
Dasgupta, P. and Maskin, E. (1986). The existence of equilibrium in discontinuous economic games, II: Applications. Rev. Econ. Stud., LIII, 27-41.
Dixon, H.D. (1984). The existence of mixed-strategy equilibria in a price-setting oligopoly with convex costs. Econ. Lett., 16, 205-212.
Dixon, H.D. (1993). Integer Pricing and Bertrand-Edgeworth Oligopoly with Strictly Convex Costs: Is It Worth More Than a Penny? Bulletin of Economic Research, 45(3), 257-268.
Edgeworth, F. M. (1925). Papers Relating to Political Economy I. Macmillan: London. Hotelling, H. (1929). Stability in Competition. Econ. J., 39(153), 41-57.
Iskakov, M. B. (2005). Equilibrium in Safe Strategies. Automation and Remote Control, 66(3), 465-478.
Iskakov, M. B. (2008). Equilibrium in Safety Strategies and equilibriums in objections and counter objections in noncooperative games. Automation and Remote Control, 69(2), 278-298.
Iskakov, M. and Iskakov, A. (2012a). Solution of the Hotelling’s game in secure strategies.
Econ. Lett., 117, 115-118.
Iskakov, M. and Iskakov, A. (2012b). Equilibrium in secure strategies. CORE Discussion Paper 2012/61, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
Iskakov, M., Iskakov, A. and Zakharov, A. (2013). Tullock Rent-Seeking Contest and its Solution in Secure Strategies. HSE Working Paper WP7/2013/01, Publishing House of the Higher School of Economics: Moscow.
Tullock, G. (1967). The welfare costs of tariffs, monopoly and theft. Western Econ. J., 5, 224-232.
Tullock, G. (1980). Efficient rent seeking. In: Toward a theory of the rent-seeking society (Buchanan, J.M., Tollison, R. D. and Tullock, G., eds.), pp.97-112, A&M University Press: College Station, TX.