process affected by random shocks
Zt = z (zt-ι,ez)
We also assume that the cost parameters θt = (θt1, θ2,... θI) are random variables.
Let
F (Rt,ezt ,θt)
be the continuous cumulative joint distribution function of resources and technological characteristics
of the agents. All the marginal distributions derived from F (∙) are also continuous. We assume that
each agent i ∈ I knows her own cost parameter vector θi that is drawn according to F (∙) during
each event, before the choice-making process takes place. But the agent is unaware of the vectors
θI∖{i} = (θt1,..., θt-1,θt+1,..., θI), the cost vectors associated to all the other agents of the conflict.
This reflects the fact that the relative strength of the opponents is unknown during each event, and
in this context we treat it as a random variable. Another approach could try to endogenize the
evolution of the effort-cost factors, with investment in conflict machinery, investment in research and
development or adaptation to the conflict situations (as proposed by Weeks (2001)). Nevertheless
this could neglect factors such as luck, climate and geographic influences or an exogenous change
taking place in the conflict. Then, as a first approach we prefer to model the effort-cost coefficients
as an exogenous process and focus on the role of uncertainty on the conflict costs. And later we will
focus in investment in conflict technology, not in effort costs.
We assume rational expectations: the agents take all available information into account in forming
expectations. Formally we assume that the agents know the associated distributions for the random
variables. This is equivalent to assume that the subjective distributions taken to form expectations
are the same objective distributions from the conflict environment.
3.4 This is an incomplete information game
For clarification we summarize the information using a version of game theory axiomatization. Our
incomplete information game (ω,φ,σ) has the following components:
1. A set of private information ω = {α,θ,π, g} where αi = {αt}t∈τ aɪɪd α = {αi}i∈I, α is a
TI × 1 vec tor, θ = {θi}i∈I is a I × 1 vec tor, g = {gi}i∈I a nd π = {πi}i∈I a re I × 1 vectors.
2. A set of possible messages φ = {^i}i∈I a nd φl : ω → R+ that maps from the private
information set to the real set, that is φ = {e, x} is a 2 (TI × 1) vector.
3. A set of common information σ = {σt}t∈τ = {μ, I, T, Rt-1,zt-1}. That is, an a !location rule μ
that says how the game works, I agents, T periods, the available resource under dispute in t — 1 and
More intriguing information
1. Human Development and Regional Disparities in Iran:A Policy Model2. The name is absent
3. The name is absent
4. Multifunctionality of Agriculture: An Inquiry Into the Complementarity Between Landscape Preservation and Food Security
5. The name is absent
6. MICROWORLDS BASED ON LINEAR EQUATION SYSTEMS: A NEW APPROACH TO COMPLEX PROBLEM SOLVING AND EXPERIMENTAL RESULTS
7. DURABLE CONSUMPTION AS A STATUS GOOD: A STUDY OF NEOCLASSICAL CASES
8. Analyzing the Agricultural Trade Impacts of the Canada-Chile Free Trade Agreement
9. Higher education funding reforms in England: the distributional effects and the shifting balance of costs
10. Structural Conservation Practices in U.S. Corn Production: Evidence on Environmental Stewardship by Program Participants and Non-Participants