Document 11082189

advertisement
HD28
MAR
fP. 1CQ7
L, SftAjvli--
ALFRED
P.
WORKING PAPER
SLOAN SCHOOL OF MANAGEMENT
''takh3\^r defenses and shareholder voting*
David Austen -Smith
University of Rochester
/^
and
Patricia C. O'Brien
Massachusetts Institute of Technolog)'
WP# 1823-86
Revised: Januar>' 1987
MASSACHUSETTS
INSTITUTE OF TECHNOLOGY
50 MEMORIAL DRIVE
CAMBRIDGE, MASSACHUSETTS 02139
^
TAKBO\^R DEFENSES AND SHAREHOLDER VOTING*
David Austen-Smith
University of Rochester
"
and
Patricia C. O'Brien
Massachusetts Institute of Technology'
WP# 1823-86
*
,
Revised: Januar>' 1987
The authors gratefully acknowledge helpful comments from
Jeff Banks, Harry DeAngelo, Linda DeAngelo Johm Parsons
and Rick Ruback, and from seminar participants at MIT,
Stanford and the University of Rochester. Remaining
errors are soley the authors' responsibility.
,
Takeover Defenses and Shareholder Voting*
David Austen-Smith
Department of Political Science
University of Rochester
Rochester NY 14627
and
Patricia C.O'Brien
Sloan School of Management
M.I.T.
Cambridge
MA 02139
October 1986
Revised: January 1987
*The authors gratefully acknowledge helpful comments from Jeff Banks, Harry DeAngelo, Linda
DeAngelo, John Parsons and Rick Ruback, and from seminar participants at MIT, Stanford and the
University of Rochester. Remaining errors are solely the authors' responsibility.
M.I.T.
LP
MAR
1 o K
Abstract
Why
firm?
do shareholders vote
for anti-takeover devices
which apparently lower the value of their
We address this question by constructing an agenda-setting model in which rational,
informed, and value-maximizing shareholders vote on requests for such devices
self-interested
management with employment
opportunities outside the firm.
made by
a
We find sufficient
conditions for the value of the firm to decline as a result of a request, although
it
is
approved by
shareholders. In our model, the apparently paradoxical voting behavior occurs because the
expected takeover premium
is
reduced more by rejection of the request than by approval.
1.
Introduction
Why
firm?
do shareholders vote for anti-takeover devices which apparently lower the
value of their
We address this question by constructing a model in which rational, fuUy informed,
and
value-maximizing shareholders vote on requests for such devices made by
a self-interested
management with employment
opportunities outside the firm.
We describe conditions under which
the value of the firm declines as a result of the request, although
it is
approved by shareholders. In
our model, the apparendy paradoxical voting behavior occurs because
premium
is
tiie
expected takeover
reduced more by rejection of the request than by approval.
A large and increasing number of amendments to corporate charters are specifically designed to
increase the cost of transferring control.
amendments
in
DeAngelo and Rice (1983)
report over
250 proposed
1974 through 1979. Linn and McConneU (1983) find generally increasing
incidence of such proposals
among
ResponsibiHty Research Center
NYSE firms over the period from
lists
1960
The Investor
to 1980.
over 200 in 1985 alone. The two major hypotheses describing
the motives for instituting anti-takeover charter
amendments
are
commonly
"management entrenchment" and "shareholder interests." ^ According
entrenchment view, incumbents are interested
in
described as
to the
management
job security and seek protection from
market, to the detriment of shareholders.
Two
entrenching antitakeover devices are:
for a majority of shareholders, the costs of
(1
)
tiie
takeover
suggested explanations for shareholder approval of
becoming
informed about the effects of defensive charter amendments exceed any
potential benefits, and
uninformed shareholders consistentiy give
v^sh
to maintain friendly relations with
their proxies to
management
management; and
to ensure the benefits
(2) large shareholders
of future business, and
large shareholders control sufficient shares to be pivotal in the vote.
Shareholder irrationality
sometimes offered as a
The stockholder
is
third alternative.
interests hypothesis recognizes a free-rider
problem
in collective action
by
shareholders (Grossman and Hart (1980), Jarrell and Bradley (1980)). Shareholders have
premia from takeover bidders, so anti-takeover devices benefit
difficulty colluding to extract larger
shareholders by enforcing a level of collusion in takeover negotiations. Since defensive charter
amendments
benefit shareholders, there
them. Hovt'ever, there
is Uttle
is
no inconsistency
in rational shareholders voting for
evidence that shareholders benefit from such amendments.
DeAngelo and Rice (1983) fmd
statistically insignificant
negative abnormal returns around the
public announcement of proposed antitakeover amendments. Linn and
positive returns around the board meeting date at
McConnell (1983) fmd
which amendments are proposed, and
insignificant negative returns around the proxy mailing date. Jarrell, Poulsen
find negative returns
classified
accompanying
the
announcement of "shark
and Davidson (1985)
repellents", viz. supermajority,
board and authorized preferred amendments.
In the context of our model, the
management entrenchment and shareholder
interests
hypotheses do not necessarily lead to different predictions about shareholder value. Anticipatory
takeover defenses raise the costs of acquiring control of the firm, thereby entrenching management,
but lead to a higher
potential
premium
managers contribute
for shareholders
if
a bid succeeds.
We presume that different
different value to a given firm, by virtue of skill or experience.
Only
managers capable of producing higher value than the incumbent can mount successful takeover
bids.
Whether shareholders gain or
quality of the
lose as a result of the incumbent's defenses
incumbent management
opportunities for
The paper
formal model
is
is
employment outside
relative to potential bidders,
and the incumbent's
the firm.
organized as follows. In section 2
developed
in section 3,
and
we
provide a brief overview of the model. The
we summarize and discuss
the results in section 4.
Section 5 concludes. All proofs are confined to Appendix A. Appendix
that illustrates
our results.
depends upon the
B
consists of an
example
2.
Overview
The main implication of the
firm's value before
and
results
in sections
when
is
that observations of a
voting on these defenses. In our model, shareholders
approve defenses face an unobserved, inferior alternative
choose approval.
3 and 4
implementation of takeover defenses are not observations of the
after the
alternatives shareholders face
developed
Two central features
if
who
they choose rejection, and so rationally
of the model drive the results.
First, the
manager
sets the
agenda on takeover defenses monopolistically, and shareholders have only veto power over the
managerial proposal. In particular, they are unable to amend the proposal or counter-propose
before the vote.^ Second, the manager's request changes the subsequent decision-making
environment.
The two
critical features,
generate the voting
monopolistic agenda- setting and the real effect of the request
conundrum discussed
power of the manager ensures
that, for a
in the Introduction.
itself,
The monopolistic agenda-setting
properly-chosen request, the shareholders can do no better
than to approve. In certain circumstances, the value of the firm following approval of a managerial
request for takeover defenses will be lower than the pre-proposal value. Nevertheless, the value
would be no
greater,
and may be lower,
value and the post-rejection value
is
if
the request
is
The wedge between pre-proposal
rejected.
induced by the real effect of the request, described below.
Previous research on the effects of the implementation of takeover defenses has compared the
pre-proposal value of
liie
firm v»iih
iio
posi-proposal or post-vote value. In our model, the
comparison for inferences about shareholder
rationality in voting
is,
instead, the value under
approval of the request versus the value under rejection.
In the next section,
we offer
a particular
model
to illustrate this central idea.
on a reduced form specification of an outside managerial labor market. This
is
Our model
rests
our characterization
of the mechanism that produces the real effect of the request for takeover defenses. Other
mechanisms may
exist with the
same general property of inducing
a change in the decision-making
environmenL
We find the outside labor market a natural way to introduce this real effect, since
it
defines the manager's opportunities in the event of a successful takeover.
Two further aspects of the model
are worth noting at the outset First, in our model,
shareholders recognize the implications of their vote: they do not
make mistakes
or have regrets
with respect to their decision. Second, in some circumstances, the value of the firm will rise as a
result of a request for takeover defenses.
However, the focus of this paper
circumstances in which the value of the firm will
fall,
is
to describe
to provide a rational choice
answer to our
opening question.
3.
Model
We are interested in managerial control of a firm with assets and financial structure fixed.
There
is
a continuum
M of different managerial types capable of running the firm, different types
contributing differently to the value of the firm.
A manager's type is the common expectation of
owners and the outside market of the value added
the
incumbent manager's type, and assume
M
types on
is
common knowledge
question. Because
we
the
whole
real line.^
The
let F(-)
also describe the distribution over
is
We additionally assume that lim.j_^oo[l-F(0]''f(t)
<
<»: this is
is
distribution F(-) of
we
that the support of
owned by
F
is
in
can,
managers of possible firm
F
The firm
m e M denote
and induces a distribution over possible values of the firm
connected, and that
Assume
function.
is
by that manager. Let
take the value of the assets and the financial structure to be fixed,
without loss of generality,
values.
M
to the firm
smooth. Let
f(-)
be the
densit>'
not a strong restriction.'^
a set of shareholders holding fully diversified portfolios. Being fully
diversified, each shareholder
is
interested only in
maximizing the expected value of the
firm. This
expected value depends both on the incumbent manager's type and on the expected premium paid to
the owners, conditional
Heuristically, the
on the firm being taken over by an
model of takeovers we have
in
mind
alternative
is
management
the following.
The
lifetime of the
firm
two periods.
is
A manager of type m controls the firm in the first period.
period. Nature draws a potential alternative
not to
make a takeover bid
for the firm.
controls the firm for the remainder of
incumbent remains
in control.^ Since
maximum value of the
in control,
Given
is
i.e.
firm in
this last
the
If a bid is
its life.
made and is
M, who
this
model of takeovers
in the
if
arc possible
in the
second period, the
all
first
is
an unsucessful bid, the
beyond the second period,
the
period expected value of the firm
sum of the incumbent manager's
let
value added, m, and the expected
discount factors be equal to one for
The expected premium depends on
shareholders.
successful bidder appearing in the second period, and the size of the
from
there
new manager
determined by the value added by the manager then
is
second period. Without loss of generality,
manager and
extracted
can choose whether or
successful, then the
no bid or
If there is
no takeover bids
period
the set
the second period manager's type.
completely determined by the
premium
manager from
In the second
the probability of a
premium which can be
that bidder.
We suppose that there is no utility value to making a bid per se, so that, given the incumbent
manager's type m, only managers of types n >
there
is
any cost
to bidding, then
no type n <
m find
it
worthwhile to make a takeover
m wUl make an offer.
Hereafter,
m. Hence, given the
distribution F, the probability that a
a successful takeover bid arrives
The
is
qualification "minimally"
above
refers to the possibility that the
used, the potential bidder's type n must exceed
firm.
is
to be implicit
manager minimally capable of making
incumbent
will contest a
We denominate takeover defenses in terms
of the increment in price, above m, necessary to acquire the firm. Thus,
m
it
[l-F(m)].^
bid by erecting takeover defenses, as described below.
Being a manager of t>'pe n >
If
we assume there is
such a cost, but, to avoid cluttering the notation, supf)ose the cost constant and take
in
bid.
if
takeover defenses are
m by at least the amount of takeover defenses.
necessary but not sufficient for making a successful bid for the
The manager
is
we view defenses
endowed with two
control variables, x and y, both takeover defenses. Since
as an increment in price, as described above, both x
e R^^, and are measured
variables: (x, y)
managerial types n >
in the
same
units as
and y are nonnegative
real
m. In the absence of any defense,
m will successfully bid for the firm: if there
is
any defense, a successful
bidder must be capable of overcoming the defenses in addition to improving on m. Therefore,
given defenses x and y, a takeover bid must be
there
at least
equal to [m+x+y] in order to win.
As
yet
nothing to distinguish the two types of defense and, indeed, from any potential bidder's
is
perspective the two sorts are indistinguishable.
They
are,
however, quite different from the
incumbent manager's perspective.
Defense x
is
anticipatory
:
can be put
it
in place
only in the
first
period, prior to any potential
bidder appearing. For convenience, direct costs of implementing x are normalized to zero.
However, the manager
among
is
obliged to ask the shareholders explicitly for a level of
the shareholders determines whether or not the manager's request
is
Majority voting
x.
granted.
Amendments
are not permitted, so the shareholders can only accept or reject the manager's proposal. There
indirect cost borne by the
request
manager
granted. This cost
is
is
in
for requesting anticipatory defense, re gardless of whether this
terms of his outside value
— the
utility
receive in the second period, conditional on being ousted from the firm.
efforts
offer
is
on
the part of
an
is
incumbent managers
an indication that the manager
is,
payoff he can expect to
Our presumption
to erect takeover defenses in the
for instance,
more
is
that
absence of an explicit
interested in personal security than the
welfare of the shareholders; and this lowers his outside market value. Let x? denote a request for a
level of anticipatory defense. If
this
defense
however
is
x = x?; and
that the
X? > 0] are
if
x?
it is
is
approved by shareholder vote, then the implemented level of
not approved then x =
above discussion implies
distinct: this is crucial to
0.
implies x = 0. Note
Evidently, x? =
that the states of the
world
[x
=
|
x? = 0] and
[x
=
our model.
The second type of takeover defense
available to the manager, y,
is
responsive
.
Responsive
|
defense
implemented only
is
to fight an explicit takeover bid in the
second period, conditional on a
bid materializing. Unlike anticipatory defenses, the manager implements responsive
defense,
without obtaining shareholder approval.^ There
are,
however, direct costs to engaging
takeover fight Let c(y) be the direct costs, measured in units of
implementing a responsive defense of y. Assume c(0) =
For technical reasons,
depend on
utility,
0, c'(y)
>
in a
borne by the incumbent in
and c"(y) >
for all y > 0.
convenient to assume lini.y_^o c'(y) = 0: none of our principal results
it is
this.°
In the heuristic discussion of the takeover process above, given defenses x and
y,
that a successful bidder
must pay
at least
Because shareholders are interested only
[m+x+y]
in
to acquire the firm.
maximizing wealth,
than [m+x+y] to persuade them to remove the incumbent.
it is
we
argued
Will any more be paid?
sufficient to
pay £ >
No acquirer wishes to pay
more
any more
than necessary to take over the firm. Therefore, in the limit, epsilon will be zero. Hence,
the
premium
incumbent secures for the shareholders
that the
dsSEile defenses x and y
-- is
manager of type n > [m+x+y]
is
- conditional on
losing a takeover battle
precisely [x+y]. Moreover, again taking x and y as fixed, only a
will
make an
offer,
and any such offer will succeed. Recalling
the distribution over managers, the probability of takeover in the second period
by
[1
is
that
F
therefore given
-F(m+x+y)].
To derive
the expected
premium, consider
surely in control of the firm in the
enterprise
is
taken as given,
it is
first
first
the incumbent's objective function. Since he
is
period and the investment and financial structure of the
necessary only to examine his second period payoff.
It is
necessary to describe this second period payoff under two employment alternatives: within the
firm, or, if a bid succeeds, outside the firm. If there
incumbent stays
in control
and receives
utility
co(x,
y
I
X?) =
W(x+y, X? m)
I
-
no takeover bid
in the
second period, the
V(m). Conditional on losing control of the firm, and
given X and y, the manager's net second p)eriod
(1)
is
c(y),
utility is:
8
where WC-)
lim.jj<)^oo
is
Assume
the manager's gross outside value given x, y and x?.
^2 = **'' ^1
losing his current position
and
<
1
W^2 - 0-
— ultimately, at
the acquirer; decreasing
anticipatory defenses in the
first
j
an ever-increasing rate
premium he
~
in
any
is
possibility that
we
W
is
(x
=
suppose V(m) > W(0,
|
We argued above that,
m).
if
approved requests.
in
on the former are
^^
To make
is
particular managerial type
n drawn by Nature
made
V, and
c,
are
Therefore, the potential acquirer
A
bidder's best offer (that
makes no
acquirer
response
Though
the
is, if
offer at
(m+x+y <
n),
is
is
problem
nontrivial,
is
indeed given.
second period. The incumbent's
knowledge, as
is his
utility
and
type m. Likewise, once Nature has
is
common knowledge.
capable of calculating the incumbent manager's credible
is
credible
if,
when n
is bid,
y.^ If this utUity-maximizing response
m+x+y
all.
>
n),
then
If the potential
-
is
the manager's
sufficient to beat the
because of the bidding cost
acquirer
is
-
the potential
capable of topping the incumbent's best
then she makes the smallest offer necessary to win control of the firm.
incumbent loses
fighting, c(y),
It
common
in the
resix)nse y to a bid n
utility-maximizing response
the
responsive, the incumbent's selection of y depends, inter alia, on the
her draw, the type n of the potential bidder in the second period
response y to any bid.
is,
x and y are fixed and known, only bids which can succeed will be
However, since defense y
W,
employment
-
made. At the beginning of the second period, the anticipatory defense x
cost schedules,
with
This does not exclude the
x?), strictly decreasing in x.
everywhere decreasing
'W2 <
efforts to secure
period; and the cross-effects of this latter
enough approved requests
0,
able to extract from
non-increasing. These assumptions imply that the manager's utility for alternate
for large
>
Thus the incumbent's outside value conditional on
increasing concave in the takeover
is
W
surely,
by definition of credibihty he prefers to bear the costs of
and the winner pays the premium [x+y]. Hence the
remains to determine the set of credible responsive defenses.
Let X? and x be given, x € {0, x?}, and define:
earlier
argument goes through.
y*(x
(2)
From
we
(1),
(3)
a(o%
(4)
d2a)/dy2 =
j^^ (o(x,
y
x?).
|
= Wi-c';
=
W
<
c"
J 1
0,
Vy.
impUcitly defines y*(x
and lim.y_^o
>
^
obtain:
Setting aco/9y
Wj
X?) = argmax.y
I
c'(y)
=
By
x?).
|
by assumption,
(4), y*(i-) is
>
y*(-|-)
unique for
all
x?,
x>
Since
0.
0.
We now defme, Vn > x+m:
v(n, X
(5)
The schedule
I
m) = V(m)
-
c(n-x-m).
v(-) describes the
maximum second period
given he fights and defeats a bidder of type
n(x
(6)
I
x?) = [inf n
[inf n
As described below, n
that,
|
I
v(n, x
(6) reveals that, for bids n
co(x,
Defme, for x? >
y*(x
V(m) = W(n-m, x?
minimum
defines the
because V(m) > W(0,
=
|-)
n.
|
|
|
x?),
other hand, any potential acquirer
see
how premia paid by
n*(x
(7)
I
where y*
is
X?) = X + y*(x
defined as in
employment outside
only
if
(2), to
it
is
|
x?),
|
and x e
x?)], if
V(m) > W(x+y*(x
x?) +
x?),
|
x? m);
|
m)], otherwise.
|
m+x
x?) >
for
bid n > n(x
|
x? ^
all x,
0.
Inspection of
x?) will be successful, and the
On
premium
>
and x e
{0, x?}:
m,
be the responsive defense that maximizes the incumbent's
x?
under the assumption that x = x? >
]),
the
utility function.
successful bidders vary, define, for x?
|
(0, x?}:
credible that the incumbent will fight and win.
who can
the firm. There are
V(m) < W(x+y*(x
x?)
incumbent manager can obtain,
bid which can succeed against the incumbent. Notice
she will pay depends on n and on the incumbent's
To
i
m) by assumption, n(x
< nCx
utility the
two
and
cases: (a) n*(x
(b)
n*(x
|
x?)
|
x?) > n(x
< n(x
|
x?).
|
x?),
Figure
which occurs
1
utility in
if
and
illustrates these
0.
[HGURE 1 ABOUT HERE]
Consider Figure
1(a)
and
first let
n € (n(x
|
x?),
n*(x
|
x?)].
The incumbent's
best response
is
to
Figure 1(a)
V, CO
V(m)
W(x,x?lm)
n(x
I
x?)-m-x
n*(x x?)-m-x
1
Figme
1(b)
V, 0)
V(m)
W(x,x?lm)
n*(x x?)-m-x
I
n(x x?)-m-x
I
10
and then to leave the firm
fight to extract (virtually) all the bidder's willingness-to-pay for the firm,
to collect his net outside value, co(x,
exceed n*(x
equal to [n*(x
x?)-m-x
I
x?)
|
-
Now let the bidder-tyjje n
x?): this is clearly credible.
to extract a
premium,
m], and then leaving the firm and obtaining his outside value,
in this case
co(x,
n*(x
|
X?).
Notice in
this last
case that bidders do not pay
may
although the firm
this event,
only two periods,
is
pay a premium of [n*(x
|
x?)
second period by virtue of the new
owners of the acquiring
in the firm until
incumbent, observing a bidder of type n > n(x
|
-
Since the
n*(-|-).
life
of
firm.
n(x x?), where the fight
|
make takeover bids.
m], however, regardless of type. This
-
n
the surplus,
one thinks of the new manager as another firm,
x?) will
|
they are willing to pay for the firm. In
consume
employment
Thus, only types n > n(x
costly.
all that
in the
If
as a gain to the
In Figure 1(b), the incumbent prefers
becomes too
to
this is reasonable.
may be viewed
then this surplus
n
attain a value
new manager is assumed
manager's type, the
the firm
|
Again the incumbent optimizes by fighting
x?).
|
n-m-x
is
Ail successful bidders
true because the
x?), recognizes defeat, but fights to
n* to maximize
his outside value.
For future reference, for
For any successful
7t(n,
x
I
bid, the
premium
x?) = min.[n
We are now in a position
from the
(9)
first
-
firm under
n,
>
0, let 7t(n,
above the value
x
|
x?) denote the
premium
m contributed by the incumbent.
m, n*(x
|
x?)
to specify the
-
m].
incumbent's expected second period payoff, viewed
period, as a function of anticipatory defenses x:
U(x
6=1
x?) and for any x
7i is:
I
x?) = F(n(x
1
x?))-V(m) + 6-[F(n*(x
+ {5-[l-F(n*(x
where
|
by the successful bidder of t>'pe
actually paid
(8)
n > n(x
all
iff
n(x
|
x?) < n*(x
management
m
is
|
x?),
X?))]
I
and 5 =
given by:
|
x?))
-
F(n(x
+ [l-5]-[l-F(n(x
otherwise.
|
The
|
x?))]-J^{o(x,
x?))]}-co(x,
first
n-m-x x?)-f(n)dn
n*(x
|
|
x?)-m-x
|
x?),
period expected value of the
11
S(x
(10)
I
X?) =
m + 5-[F(n*(x
|
x?))
+ {5[1-F(n*(x
-
F(n(x
x?))]J[n-m]-f(n)dn
+ [l-5]-[l-F(ii(x
x?))]
I
|
|
x?))]}-[n*(x
|
x?)
-
m]
with 6 defined as above.
The responsive defense y
is
chosen optimally by the management, independent of shareholder
approval and given the bidder type that appears in the second period. Anticipatory defenses x
require shareholder approval and have to be set in the
optimization problem
therefore to choose a request, x?
^
subject
if
the
to:
S(x
x?)
|
> S(0
manager asks x? =
be no less than
0,
|
period
x?).
then the constraint trivially binds. However,
its
value
the request
if
is
if it is
not granted
we have
--
in
rejected, given x? > 0.
general that S(0
|
0)
if
x? >
Because the incumbent manager's
on
^ S(0
his request, x?, in the first period
|
x?) for any x?
>
0.
words, the alternative that rational shareholders compare against the manager's request
0), their situation prior to
any request, but
is
S(0
i
then the
on the request being approved must
decision environment in the second period depends, inter alia,
even
first
0, to:
constraint says that the expected value of the firm conditional
-
The manager's
period.
max.U(x|x?)
(11)
Clearly,
is
first
x?), the result if they reject the
In other
is
n^I S(0
request This
|
is
the central idea of the model.
If the constraint
binds at
rejecting the request. Since
some x? >
0, then
managers are not
shareholders are indifferent between accepting and
indifferent, they
circumstances by slightly perturbing the request, x?, to induce
shareholders: as
Appendix
A
shows, such a perturbation
constraint binds, then the manager's request
is
is
can insure acceptance
strict
in
such
preference on the part of
always available.
approved. Alternatively,
We assume that if the
we can
adopt the
convention that in cases of shareholder indifference, shareholders always "vote with the
management". ^^
We
turn
now
to
some
results.
12
4.
Results
There are three possible conditions
beginning of the second period:
at the
requested no anticipatory defenses, (2) the manager
shareholders, and (3) the manager's request
second period response
on the
first-period
Proposition
Corollary
1:
1:
to a takeover bid
Let x = x? >
was approved. Proposition
if
than
if
is
0.
Then y*(0
|
0)
the request
is
|
^ y*(0
i
x?) > y*(x
x?) > y*(0
|
|
x?) > 0.
x?).
by shareholders, the second-period maximizing response
approved. However, from Corollary
is
premium
in a successful bid, this implies that
feature evident
from Proposition
never larger after a request, even
we show
if
1, total
is
defenses
rejected. Since total defenses determine
shareholders can expect a smaller
if
1
is
that the second-period
the request is denied, than if
Thus, the request carries no implicit threat of "scorched earth" responses
Rather, as
puts an ordering on the
they reject the manager's request and a successful bidder emerges.
An interesting
response
1
which maximizes the manager's outside value, conditional
Letx = x?>0. Then x + y*(x
premium received
premium
manager
made a request which was voted down by
(anticipatory plus responsive) are smaller if the request
the
the
outcome.
If a first-period request is rejected
strictly larger
( 1 )
below, the request
alters the
if
maximizing
no request
is
made.
shareholders deny
it.
manager's incentives to fight for a higher
a successful bidder appears.
Anticipatory and responsive defenses are substitutes in their effects on n, the
required to acquire the firm.
shareholders in the
first
minimum
bid
Generally, the higher the level of anticipatory defense approved by
period, the lower will be the manager's choice of responsive defenses.
13
Comparative
(a7))
show
statics
that this
on y*(x
response
how
In evaluating
x?), the
|
maximizing second-period response (Appendix A, (a3)
-
non-increasing in the size of the first-period request.
is
value-maximizing shareholders consider both the size of the
to vote,
premium they can expect from
a successful bid, and the probability that such a bid will emerge.
Proposition 2 describes the probability of a successful takeover bid, as a function of requested
anticipatory defenses and shareholder approval of the defenses.
Proposition 2:
ii(x
(b)
Vx =
x?)
(a)
I
is strictly
X? >
0, ii(x
Proposition 2 states that the
increases with the
1
increasing in x?, x e {0, x?};
X?)
>
11(0
I
X?) > n(0
1
0).
minimum bid which can succeed
against incumbent
amount of anticipatory defense requested. Since
bid will emerge falls as the
minimum
management
the probability that a successful
successful bid rises, part (a) of Proposition 2 implies that the
probability of takeover declines with increases in the level of requested anticipatory defenses,
whether or not these are approved. Part
(b) implies that the probability of
anticipatory defenses are requested, declines
request
state
is
from
approved. Notice that part (b)
[x
= x? x? >
|
0] to [x
=
|
is
if
there
is
a request, and
may
takeover
decline
not an immediate consequence of part
x? > 0]
is
is
largest if no
more
(a):
not incremental because of the "take
it
if
the
the change in
or leave
it"
nature of the shareholders' decision.
The value
successful bid
to shareholders
is
from anticipatory takeover defense depends on both the premium
made, which generally increases with the
probability of a successful bid,
are
unambiguously worse off
they were before the request.
if
level of anticipatory defense,
which generally decreases. Proposition 3 shows
if
a
and on the
that shareholders
they reject management's request for anticipatory defenses than
14
For x? >
Proposition 3:
The voting
0,
S(0
0) > S(0
1
|
x?).
(incentive compatibility) constraint in the
model requires
that approval
of a request
leave shareholders at least as well off as rejection. Proposition 3 states that shareholders are worse
off
if
latter
circumstance, no request,
To complete
leave
would have been
they reject the request than they
is
if
no request had been made. (Note
not available to shareholders deciding
how
to vote
on a
that this
request.)
our description of the apparent paradox that shareholders vote for defenses which
them worse
we require
off,
shareholder value
if
no request
is
a comparison of shareholder value
made: S(x x?) versus S(0
|
1
0).
the request
if
approved with
is
Proposition 4 gives a sufficient
condition for the apparent paradox to occur.
Proposition 4:
V(m) < W(y*(0
|
0),0
=> 3x? G
According to Proposition
his
maximum gross
which shareholders
m)
(0, oo):
4, if the
S(0
manager's
I
0) > S(x
utility
|
x?)
^ S(0
|
x?),
x = x?.
from employment with the firm
will approve, but
this
which leave them worse off than they were before.
maximum gross
period. Nature draws a bidder of type n
in the
outside utility
> n*(0
1
firm was larger than his
0).
is
available only
Recall that
initial
we assumed
gross outside
utility:
if,
utility:
Figure
1(a),
that
than
is,
considering his optimal choice of y at x? =
by setting x = x? =
With Proposition
4,
0.
The
in the
It is
second
the incumbent's utility
that
before defenses x or y are considered. Proposition 4 concerns the incumbent's
outside
is less
outside utility before any request for anticipatory defenses, then requests exist
important to observe that
from employment
|
is,
his utility
maximum
situation
is
gross
pictured in
0.
we have shown
the existence of requested levels of anticipatory defense
15
which
result in the voting behavior
we hoped
That
to describe.
is,
rational, fully informed,
value-maximizing shareholders will approve the defenses, but are made worse off by them. The
sufficient condition for the result
depends on the manager's
utility in
current and alternative
employment.
We have not yet demonstrated, however, that these levels of anticipatory defense
would
be requested by managers with
in fact
no inconsistency between
utilities satisfying
utilities satisfying this
the sufficient condition. There
condition and utihties generating the level of
anticipatory defense, identified in the Proposition, as a best choice. In
example of a manager with
utility satisfying the
is
Appendix B, we provide an
condition of Proposition 4,
whose optimizing
choice of anticipatory defense will be approved by shareholders, and will leave them worse off than
if
no request had been made. The example
It is
is in
no sense
pathological.
worth noting that under some circumstances, shareholders can be made better off by
implementing some anticipatory defense. By Proposition
is
that the
It is
not,
some
manager's request, x?, be
a necessary condition for
3,
strictly interior to the constraint set; i.e.
however, a sufficient condition. In our example
anticipatory defense x, but the
manager
prefers
in
S(x
|
this to
x?) > S(0
|
occur
x?).
Appendix B, shareholders would Uke
more and,
despite the constraint not binding,
the request results in a decline in shareholder wealth.
Tlie primar}' implication of our
is
model
for interpreting the empirical
that inferences about whetiier shareholders vote rationally
shareholder wealth before and after the vote.
management
as an
unambiguous drop
We
rationalin,'.
in shareholder value,
a comparison of
is
Oar model suggests
n^I as a return to the pre-proposal
skill relative to potential bidders.
^
not the conrect benchmark for
that empirical investigation of shareholder
voting and takeo\'er defenses should consider the manager's outside
and the manager's
made from
it
describe the alternative to voting with
status quo. Therefore, pre-proposal shareholder wealth
determining shareholder
cannot be
work which has preceded
employment oppormnities,
16
5.
Conclusion
We have provided a rational choice model of shareholder voting on anticipatory takeover
defenses. In our model,
it is
feasible for informed, value-maximizing shareholders to approve
measures which leave them worse off than they were before the measures were requested. What
drives this result
is
that a
manager,
in requesting
such measures, lowers his outside market value.
Consequently, the manager's optimal response to an actual takeover bid
rejected than
he had made no request Shareholders recognize
if
In the model, the manager's typ>e
and
utility
question of why any manager would be hired
which decrease the value of the firm
have
in
mind
a signalling
we
In other words, our
signalling
who
will
to shareholders.
game which precedes
perhaps the hiring stage, the manager's type
as a signal, and
schedule are
the
not
is
this in
common
is
different if the request
evaluating
how
is
to vote.
knowledge. This raises the
wish to implement anticipatory defenses
To this
extent, our
model
two periods we study. At
known with
certainty.
The
is
incomplete.
We
this earlier stage,
request x? functions
are implicitly assuming the signal fully reveals the manager's type (and utility).
model
is
predicated on the existence of a separating equilibrium to this earlier
game.
Finally,
we
offer
two remarks.
First,
it is
frequently asserted
(cf.
Easterbrook and Fischel
(1983)) that the alienability of ownership claims protects shareholders from detrimental
management entrenchment
tactics.
However, unless shareholders
takeover defenses by management, they cannot
SEC proxy
mailing requirements
proposal date.
any drop
in
Once
demand
the proposal
is
sell a
anticipate the proposal of
voting claim in response to the proposal.
that the record date for shareholder voting
announced, the constituency
is
fixed.
precede the
Our model suggests
share value should occur with the announcement of the proposal, not with the vote.
Second, our model implies that changes
takeover defenses
may
in
shareholder wealth associated with voting on
be positive or negative, depending on the manager's type and utihty
that
17
schedule. In cases where shareholders' wealth
the manager's request If there
is
is
reduced, the reduction should occur at the date of
any detectable change
at the date
positive. This follows
from Proposition 3 and the voting
shareholders' wealth
unambiguously reduced
is
shareholders' wealth under rejection
interpretation, empirical results
is
no
if
of the vote,
it
should be
constraint: the first states that
they reject a request; the second ensures that
larger than their wealth under approval.
On
this
which fmd shareholders' wealth declines following implementation
of anticipatory defenses are not evidence of shareholder
informed choice of the lesser of two declines in value.
irrationality or ignorance, but reflect
an
18
Appendix A: Proofs
Proposition
Let x = x? >
1:
Then: y*(0 0) ^ y*(0 x?) > y*(x x?) >
0.
|
0.
|
|
Proof:
(i)
follows from assuming
y*(x X?) >
I
(ii)
y*(0
)
I
> y*(0
|
Use
(iii)
0),
Wi(y*(0
c"
c'(y)
=
0.
I-)
-
Then, by
x?).
|
Wi(y*(0
|
x?
x?),
Wj
j
<
>
0.
x?
|-)
|-)
0,
W12 <
=
c'(y*(0
and x? >
0:
1
|
|
Then
WjCx +
c"
1:
I
x?),
x?
0, so that
Wj
2
|
1:
I
x?)]
|
> y*(0
Let x = x? >
|
I
0))
-
Comparative
-
|-)
V,\(y*{0 x?), x?
|
>
first
c'(y*(0
|
x?)).
order condition (3) to get:
|-)
= c'(y*(x x?))
|
0.
implies LHS(a.2) < 0: contradiction.
iff
Then:
1
W12 = 0.
Hence, x = x? >
and
[x
with
+ y*(x x?)] > y*(0
|
Wj
j
<
and
c" > 0.
|
x?).
||
Statics:
X = X? => dy*(x
|
-
c'(y*(0
|
x?)).
0.
0).
Proof: Use (3) and Proposition
(a.3)
x?),
and again use the
<
y*(0 0) = y*(0 x?)
+ y*(x
Corollary
y*(x
x?),
|
implies RHS(a.2)
>
But X = X? >
Remark
|
x?)
Suppose y*(0 x?) < y*(x
(a.2)
Wi(y*(0
|-) -
0),
I
implies the RHS(a.l) < 0: contradiction,
>
y*(0 x?) > y*(x
[x
everywhere, and lim.y_^ g
(3) to obtain:
(a.l)
But
I
>
x?)
|
Suppose y*(0 0) < y*(0
Wi(y*(0
Wj
x?)/dx? = -[Wj
i+Wj2VrWll-c"] <
0-
||
W12 =
imply:
19
(a.4)
dy*(0 x?)/dx? = -Wj2''rWn-c"] ^0. with the inequality
(a.5)
X = X?
(a.6)
dco(0, y
|
Note
1
|
x?)/dx? =
|
W
x?)/dx? =
+ W2, which a
^
<
x?)
= x + y*(x x?) + m, and y*(x x?)
|
(a.5)
1
|
(a.6)
|
|
0, then
an*(0 x?)/ax?
|
is
is
an*(x x?)/ax > (<)
(a.7)
Lemma
as c"(y*(x
|
given by
(a.4).
Let x? >
0, x
g
{0, x?}. Then: ii(x
|
If
1
x?)
is
x = x?, then an*(x
|
x?)/ax?
we obtain:
x?))
^
(<)
x?)
is
differentiable in x?;
I
1:
0.
sign.
differentiable in x?, n*(x
dy*(x|x?)/3x?. Substituting from (a.3) and collecting terms,
+
ambiguous
<
|.
|
=
priori has
Wj2
W2 < 0.
y,
differentiable in x?. If x
=
y
any
that at
Since n*(x
da)(x,
=i>
strict iff
-Wi2(x+y*(x
1
x?),
x?
|-).
and 9n(x
I
x?)/ax? > 0.
Proof:
(i)
n(x
I
X?)
is
differentiable.
from section 3
First, recall
A* =
[v(n*(x
I
X?), X
A* with
Differentiating
]•) -
that n(x
|
x?) >
y*(x
|
x?)
CD(x,
respect to x? at x
aA*/ax? = -W2(x+y*(x|x?), x?
Therefore,
A* can change
Suppose there
V(m) <
So by
case
a
exists an
:
By
n(x
In this case, n(x
(a.8)
and,
x?)
I
<
Consider x <
(6),
=
W(x+y*(x
(>)
(6): ii(x
21
sign at
x?)
|
|
8n(x
x?)
|
(>)
2L?
|
>
|
|-)
iff
x?) iff x
Let x = x? >
0,
and define:
and using
(3) gives:
0.
most once
x?
0.
x?)].
x?,
as x increases,
such that A* =
x?),
n*(x
|-)
=
|
x+m, Vx, x? >
0.
x < (>)
<
Then i
is
and only from negative
to positive.
unique and:
x.
(>) i-
i-
is
is
impUcitly defined by:
differentiable because
V(m) - W(ii(x x?)-m, x?
|
W
is
!•)
=
0.
differentiable. In particular,
x?)/9x? = -W2(ii(x|x?)-m, x? |-)AVi(n(xlx?)-m, x?
|-);
Vx
<
x,
20
Um-x^
(a.9)
case P
Consider x >
:
By
(6),
n(x
I
X?)
[^ndO/Bx?] = -Wjdi^Cx
X-
x?)-m, i? |-)/Wi(n*(2c
V(m)
implicidy defined by:
is
|
-
c(ii(x
|
x?)-x-m)
-
I
where Wj*(x) = Wi(n*(x|x?)-m, x?
=1,
|-), i
Wj*(x)
-
-
W.
x?) follows from differentiability of c and
dn(x x?)/9x? = [c'(iilx|x?)-x-m)
i?
co(x,
y*(x x?)
|
the second equality follows
dii(x
(ii)
case
a
-
Wi*(i)
-
W2*(2c)]/c'(n*(2Ll2L?)-i-m)
case
is
immediate from
(a.
11) complete
x?.
Il(x|x?).
this
By
(3),
Wi*(x) =
Therefore, c" >
V
y impUes,
(a.l2)
Moreover,
(a.lO).
c'(n(x
W2+W2 < W
suppose X =
9ti(0
Remark
2:
Lemma
2:
and
(a.9).
|
j.
= c'(n*(xlx?)-x-m). Since A* >
Therefore, the numerator of
and
Lemma
and x? >
x?)/9x? >
(a.7)
c'(y*(x|x?))
0, n*(x|x?)
|x?)-x-m)>Wj*(x)>0.
completes the proof of the
Now
(a. 8)
x?>2t
Consider
and
Together, (a.9) and
(3).
lO;
x = x? <2C
:
Casg P: x =
X?,
differentiable
0.
W2*(x)]/c'(ii(x|x?)-x-m),
everywhere when x =
is
x?) =
x?)/ax? >
i
The proof of
this
from another application of
x?)
|
|
In particular, using (3):
= -W2(n*(i|x?)-m, i? |-)AVj(n*(i|x?)-m, i?
the argument that n(x
|-).
Hence,
2.
lim.j^^ ^^ [an(t)/ax?] = [c'(n*(ili?)-i-m)
(a.ll)
2c?)-m,
1
x.
Differentiability of ii(x
(a.lO)
|
=
10)
is strictly
positive. Since
0.
1
Similar reasoning as before gives n(0
imply that U(x
Then:
ii(x
I
x?)
c'
>
0,
x?.
|
x?) differentiable in
follows on implicit differentiation of (6) for x? < x and for x? >
Lemma
Let x = x? >
0.
for x
(a.
|
x?) and S(x
> n(0
|
x?);
|
x?) are differentiable in x?.
x.
||
<
21
Proof:
case
a V(m) < W(x+y*(x
:
By
(a.l)
(6)
x?),
|
m, x?
-
|
V(m) < W(n*(0
x?)
|
-
m, x?
-
m, x?
I
=> W(n(x
I
x?)
=>n(x|x?) =
By
|-)
and the premise, V(m) = W(n(x x?)
=> V(m) = W(n(0 X?)
(a.2)
x?
-
m, X?
(6)
m, x?
-
|
|
x?)
m, x?
-
=* V(m) =
[co(0,
y*(0 x?)
=> W(ii(x
X?)
m, X?
-
|
definition of y*(0
Therefore,W(n(x
by
|-),
!•)
ii(0|x?).
V(m) > W(n*(0
I
possibilities:
|-)
= W(ii(0 x?)
|-)
There are then two
|-).
|
|
x?)
x?) + c(n(0
|
c(n(0
-
I-)
m, x?
x?)
|
y*(0 x?)
x?), 0(0,
-
|-)
|
|-) -
c(n(0
|
x?)
|
m) =
-
|
-
m)], by (6)
co(0,
y*(0
x?) > W(ii(0
x?)
-
|
|
x?)
x?)
m) > W(ii(0
|
x?).
|
m, x?
-
x?)
-
|-) -
m, x?
c(n(0
|-) -
|
x?)
c(n(0
|
-
m).
x?)
-
m)
=>ii(x|x?)>n(0|x?).
This proves the proposition for case (a),
gasg P:
V(m) > W(x+y*(x
=> V(m) =
By
Corollzry
1
co(x,
y*(x
and x? >
|
x?),
|
x?)
0,
x?
x?) + c(n£x
|
W(x+y*(x
Hence, V(m) > W(n*(0|x?)-m, x?
(a.l3)
V(m) =
co(0,
|-)
y*(0
|
!•)•
x?)
|
1
|
x?),
So by
x?)-x-m), by
x?
(6).
> W(y*(0
|-)
|
x?),
x?
|-).
(6),
x?) + c(ii(0
x?)
|
m).
-
Therefore,
(a.l4)
By
(o(x,
Proposition
y*(x
|
x?)
|
x?)
and Corollary
1
-
1,
co(0,
15)
11(0
Now implicitly
I
x?) > ii(x
I
X?)
differentiating
-
1
LHS(a.l4)
likewise be strictly positive. Since
(a.
y*(0 x?)
c'
>
|
x?)
= c(n(0
is strictly
and x = x? >
we obtain Vx? >
x?)-
m)
-
c(ii(x
positive; hence, the
0, this implies,
X.
(a. 13),
|
0:
|
x?)-x-m).
RHS(a.l4) must
22
ail(0
Using
I
we have Vx? >
10),
(a.
(a.
x?)/3x? = -W2(y*(01x?), X? |-)/c'(n(0|x?)-m) >
16)
[aii(x
x?)/ax?
I
0:
dnCO x?)/9x?] =
-
I
+ {[W2(y*(0|x?),
By
(a. 12),
1,
By
(a.
15)
and c" >
(a.
18)
<
Together,
When
X? =
0,
[W2(x+y*(x|x?), x?
nonnegative
Vx? >
0.
|-)/c'(ii(x|x?)-x-m)]}.
Consider the second term
in {•}.
I
t) ^ W2(x+y*(x
X?),
I
x?), t).
0,
c'(n(x
17)
(a.
-
W2 < 0, and W12 ^ 0,
> W2(y*(0
(a.l7)
is
[Wi(x+y*(x|x?), x? |-)/c'(ii(x|x?)-x-m)]}
{ 1 -
x?|-)/c'(ii(0|x?)-m)]
the first term of (a. 16) in {•}
By CoroUaiy
0.
and
I
x?)-x-m) < c'(n(0
x?)-m).
|
18) imply that the second term of
(a.
(a.
Vx? ^
0:
an(0 r)/ar]dr >
0,
both terms in {•} vanish. Therefore,
16) in {•}
is
also positive
Vx? >
0.
X?
[n(x
I
X?)
-
ii(0
I
X?)]
-
[an(r
j
|
as required (with equality iff x?
=
0).
Lemma
2
is
Remark
from
[x
I
Notice that
= x? X? >
Remark
if
3:
0] to [x
I
4: Together,
X = X? and S(x
x?~) > S(0
Lemma 3:
I
|
=
Remark
x?) = S(0
By
uQi implied by
is
Lemma
1
:
this is
because the change in
state
not incremental.
2, footnote 8
and
Lemma 2 justify
the claim
x?), then there exists a perturbation in
x?
-
made
say,
x?~
in section 3 that,
--
such that S(x~
x?~).
For any x? >
0,
Proof: Given x = 0, v(n, x
in n.
|
|
||
X? > 0]
I
-
r)/9r
W2 < 0, W(y, x?
n(0
|
|-)
I
x?) > ii(0
m) = V(m)
< W(y,
-
|-),
|
0).
c(n-m). Since
Vy >
0.
So by
c'
>
0, v(n,
(6), ii(0
|
x
|
m)
is strictly
x?) > nCO
|
0),
decreasing
Vx? >
0.
||
23
Proposition 2:
nix
(a)
x?)
|
is
strictly increasing in x?,
Vx = x? > 0, ii(x
(b)
Proof: The proposition follows firom
Proposition 3: For x? >
By Lemma
Proof:
(a.19)
By
Proposition
casg
n>
ff:
By
case p
<
F
fact that
[1-F(ii(0
|
|
11(0
is
2 and
1,
3.
I
0).
||
x?).
defmed on
a c.d.f.
a continuous variable n:
0))].
I
0),
|
x?) > 11(0
I
with the inequality
strict iff
Wj2 <
at
any y < y*(0
|
0).
X?).
I
(8):
(a.20)
If
x?))]
I
>
Lemmas
0) > S(0
|
n*(0 x?) < n*(0
1,
11(0
and the
3,
[1-F(ii(0
S(0
0,
X?)
I
x e {0, x?}; and,
7C(n,
0)
|
>
i
n*(0 X?) < n*(0
I
n €
:
(ii(0
|
0),
x?).
7t(n,
0), the inequality in (a.20) is strict
I
n(0
Vn > n*(0
|
x?).
x?)).
1
By an argument
in section 3,
only types n > n(i-) will miake takeover bids. Therefore:
(a.21)
0) > 7t(n,
X?)
7t(n,
I
I
H
0.
casgy n<ii(0|0).
By
the
(a.22)
same argument
7t(n,
Together, (10) and
Lemma
4:
|
0)
(a.
=
as case
7i(n,
19)
-
|
(3:
x?)
(a. 22)
h
0.
yield the desired result.
Let x = x?. Then: ]im.^')_^^ S(x
|
x?)
||
= m.
Proof:
By assumption,
Wj
j
> xj?, V(m) > W(x+y*(x
S(x
I
x?) =
m+
<
|
and lim.j^9_^^
x?),
[1-F(n(x
|
x?
|-).
W2
Hence, by
x?))]-[n*(x
|
= -~. Therefore, for
(10),
x?)-m].
Vx? >
xj?,
sufficiently large x?, say
x?
24
By Remark
2, S(-
1
9S(x
(a.23)
I
•)
differentiable in x?. In particular,
is
I
x?))]-an*(x
x?)/ax?
I
We prove the Lemma by first showing 8S(x
By Lemma
is strictly
case
a
:
case p
By
and the assumption
(7)
(a.24)
|
and
for all x?
x?)/ax? <
|
[1-F(ii(x
x?))]/f(n(x
|
I
x?))-aii(x
(a.7), the first
I
x?)/ax?-[n*(x
for all finite x?
V(m) > W(0,
that
>
^
|
>
I
x?)-m]}.
X2?, X2? sufficiently
m), the term in {•} on the RHS(a.23)
term on the RHS(a.23)
is
of ambiguous sign.
X2?.
X2?.
x?)/ax?] =
|
{f(ii(x
X2?.
for all x?
sup.[an*(x
I
^
-
x?)/3x? <
|
for all finite x?
x?)/ax? >
(a.3),
By
all finite x?.
dn*(t)/ax? <
an*(x
:
1
positive for
Then, aS(x
x j?,
x?)/ax? =
[1-F(ii(x
large.
Vx? >
<
x?))
For sufficienUy large x?, aS(x x?)/ax? <
1.
|
aii(x
|
x?)/ax?-[n*(x
|
x?)
-
if:
m].
r,
By
assumption, lim.j_^^
<
lini.jj9_^oo[LHS(a.24)]
(a.
10), therefore,
Vx? ^
an(x
|
<
[[l-F(t)]/f(t)]
<».
Also by assumption,
\l)/dxl >
X2?. Hence, (7) and y
>
1
=
0, the
Lemma follows
Proposition 4: V(m) < W(y*(0
=> 3x? e
Proof:
By
Corollary
V(m) < W(y*(0
I
1,
3
x"
x?"), x?"
|-)
W^ ^
Lemma
<
1
By
from
|
(10).
0),
00.
for all x?
>
|
From
x?)/ax? > 0,
Therefore, there exists a
X2?. Since lim.j_^^
||
:
S(0
|
0) > S(x
|
x?)
> S(0
|
x?), x
=
such that both V(m) < W(x"+y*(x"
= x?" >
W2 = -«>.
m)
|
(0, 00)
obtain.
aS(x x?)/ax? <
x?,
hypothesis, an*(x
imply that lim.j^'>_^^,oCRHS(a.24)] =
|
and x =
and lim.j^9^^
for sufficiently large x?.
sufficiently large value of x?, X2?, such that
[1-F(t)]
Therefore, by
<».
Then by case
(a. 1) of
Lemma
2, ii(x"
x?.
and
x?"), x?"|-),
|
|
x?")
= n(0 x?") =
|
n.
Hence:
(a.25)
By
[1-F(n(x'|x?"))] = [l-F(ii(0ix?"))] = [l-F(n)].
Corollary
1,
n*(x"
|
x?")
> n*(0
|
x?").
From
the premise of the Proposition and the choice
25
of X?", n*(0 X?") >
Using
this
(a.26)
and
Vn < iL
Vn
= {x? >
7:(n,
x?")
|
and (a.26) imply
S(x
px? e C
I
oo
I
[Vx? €
C
:
I
& S(x
=> [S(0 0) > S(x
(ii)
only types n > n will
3,
make
a takeover bid.
|
|
x?")
= 0;
x?")
=
|
>
x?")
that S(x"
X?),
7i(n,
|
X = X?}
7t(n,
1
7t
=n
-
m;
x?").
> S(0
x?")
x?")
|
x?"). Therefore,
|
0.
now two cases:
X? <
:
> S(0
X?)
7i(n,
x"
7t(n,
I
I
=
X?")], 7i(n, x"
I
> n*(0 X?"),
Let X = X?. There are
(i)
x"
n*(0
(n,
(10), (a.25)
C
an argument of section
(8):
Vn €
Given
By
n-
I
X? <
=> px?" €
C
oo
:
,
X?'
I
X?)],
S(x
<
check
this last inequality, recall
0) >
(Proposition
1),
X?)
I
m < ii(0
I
oo
= S(0
!
x?)]
by Proposition
X?) > S(0
& S(0
1
0)
|
x?)]
> S(x'
V(m) < W(y*(0
i
0)
<
oo
3;
|
I
0),
X?')],
|-)
Lemma 4
and S(0 0) > m.
|
by hypotiiesis. Hence, by
and n*(0 0) > m.
|
by
||
(6)
To
and y*(0
26
Appendix B: Example
We claim in section 4 of the text that there exist managerial utilities satisfying the sufficient
condition of Proposition 4, under which the manager would ask for, and shareholders approve, a
level of anticipatory defense, x?, such that S(0
1
0)
> S(x
|
x?). In this appendix,
we justify
our
claim with an example.
In the interests of computational simpUcity,
violated in the example:
The example
therefore
viz.
the support of F
shows
that the
main
is
some
not the whole real Une, and
satisfy all the
assumptions of the
text,
and which are
W^
is
are
zero at x = y =
F and
the outside utility
arbitrarily closely
W,
F
be uniform on the closed interval [-2,2], and assume the manager's type
is
m = 0.
Let
V(m)=1.57,
W(x+y, X? m) = 2-[x+y]1^2
.
I
c(y)
For
=
[x?2]/2
3U(x
I
x?)/3x?|j^_j^'7
incumbent's
utility
specification,
we
=
0, that is, the
function
U(x
|
I
0)
= 1.3623
U(x x?*)= 1.3766
I
aU(x
I
concave. Denote by x?* the point where
incumbent's unconstrained optimizing choice of x?. The
x?)
is
as defined in equation (9)
of the
Given
text.
obtain the following results, illustrated in Figure B.l.^^ For*'
X?* = .35
U(0
+ m,
(2/3)y(3/2).
this specification, U(-|-) is strictly
x?)/ax?|j^^x?* = 0-0
that
approximated by the
functional forms exploited in the example.
Let
0.
does not depend on these
result (Proposition 4)
assumptions. Also, there are choices of the distribution function
do
model
technical assumptions of the
•
;
this
"ger:
27
For the shareholders:
S(0 0) = 0.2592
I
S(x
X?*) = 0.2582
I
S(0 X?*) = 0.2570
I
so the condition S(0
shareholders. That
is,
request than they are
worse than
0)
1
> S(x x?*) > S(0 x?*) holds, and S(x x?*)
1
|
|
is
outcome
the
by the second inequality, shareholders are worse off if they
if
they approve
their starting value
In this example, at
S(0
x = x? =
|
it,
but by the
first inequality,
reject the
outcome S(x x?*)
|
is
0).
0:
aU(x x?)/9x?|x=x?=0 = 0-^^^ >
°'
dS(x x?)/ax?|x=x?=0 = 0024 >
0,
I
I
^<^
so both the manager and the shareholders prefer a
manager's most-preferred x
the final
for
is strictly
strictly positive
x to x =
However, the
0.
greater than the shareholders'.
[HGURE B.l ABOUT HERE]
Notice
that, for this
parameterization, the manager's unconstrained optimal choice of
anticipatory de'^-nse, x?*,
is
the manager's unconstrained
constrained
low enough
that the constraint,
|
x?)
> S(0
optimum were approximately 0.4 or above
optimum x?* would be approximately
this alternate result
S(x
.39,
by raising V(m), the incumbent's
where S(x x?) = S(0
|
utility for
we
management
-'ould introduce the
fi.
convention
Uemately, as described
Remark 4 of Appendix
that,
at the
when
|
does not bind.
If
example, then the
x?).
(We can
obtain
current employment.) In this
To ensure
indifferent, shareholders
that
x?
is
always vote with
end of section 3 (and justified more formally
A), the manager can reduce his request x? by e >
preference by the shareholders.
x?),
in this
circumstance, shareholders are indifferent between approving or rejecting.
accepted
|
to induce strict
in
Figxire B.l
U, S
U(x
X?*
I
X?)
X,
X?
28
Footnotes.
1.
DeAngelo and Rice (1983) provide
2.
This type of "take
context by
3.
it
or leave
Romer and Rosenthal
The use of the term
it"
agenda control has been extensively studied
somewhat from
impounded
only a technical convenience; a claim
we justify
For example, the uniform, normal,
the usual game-theoretic concept Here,
of the firm. In contrast
into the value
useage, managers of the same "type" can have different
4.
in a political
(1978, 1979).
"type" differs
"type" indicates a skill level, as
a thorough discussion of these hypotheses.
via the
utilities.
to conventional
Further, allowing infinite
m is
worked example of Appendix B.
gamma and exponential distributions
all satisfy this
restriction.
5.
This structure
6.
To make
7.
The
is
similar to that used in
the bidding-cost explicit,
distinction
we make between
Grossman and Hart (1980).
we would have
anticipatory
former are voted by shareholders while the
to write [l-F(m+e)]: this
adds nothing.
and responsive takeover defenses,
latter are not, is
an abstraction.
It is
that the
a useful one for our
purposes, and does not do violence to empirical reality.
8.
The
level of
role of the assumption that lim.y_^Q c'(y)
=
0, is to insure that
y will always be chosen by the manager, whatever the value of
use the calculus in our analysis. Without the assumption,
explicitiy: this
adds very
little
on the cost function being
make
9.
and does not substantively
strictly
convex
in
y
is
we have
alter
x.
some
strictly positive
Consequently,
to consider the
our main
results.
not essential for our results.
It
we can
comer case
Similarly, insisting
does, however,
the arguments cleaner.
Although the model
is
not explicitiy game-theoretic,
it
can be reformulated as an
extensive-form
game
of credibility
simply that of (subgame) perfection (Selten, 1975).
is
in
which the manager. Nature and the shareholders are players. The concept
10. In the explicit game-theoretic formulation (see fn.9), in equilibrium shareholders
29
necessarily accept a take-it-or-leave-it offer
Note
that both managerial proposals
1 1.
The
when
indifferent (see, e.g.,
and acquirers' bids are such
derivations of these results are available
Banks
& Gasmi,
offers.
from the authors upon request.
1987).
30
References
Banks,!, and GasmiJF., Endogenous agenda formation in three-person committees, Forthcoming
in Social
Choice and Welfare (1987).
DeAngelo,H. and RiceJE., Antitakeover charter amendments and stockholder wealth, J.Financial
Economics
11
(1983)329-360.
Easterbrook.F. and FischelJ)., Voting in corporate law,
J.Law and Economics 26 (1983)
395-427.
Grossman, S. and Hart,0., Takeover
bids, the free-rider problem,
and the theory of the
corporation. Bell J.Economics, Spring (1980) 42-64.
Jarrell,G.
and Bradley >!., The economic
and
state regulations
of cash tender
J.Law and Economics 23 (1980) 371-407.
offers,
Jarrell.G.,
effects of fec.ral
Poulsen,A. and Davidson,L., Shark repellents and stock prices: the effects of
antitakeover
amendments
since 1980,
mimeo, Ofilce of the Chief Economist,
SEC
(1985).
Linn,S. and McConnell,!.,
on common stock
An
empirical investigation of the impact of 'antitakeover'
prices, J.Financial
Romer.T. and Rosenthal Jl.,
Economics
amendments
11 (1983) 361-399.
Political resource allocation, controlled
agendas and the status quo,
Public Choice 33 (1978) 27-43.
Romer,T. and Rosenthal,H., Bureaucrats vs voters: on the
political
economy of resource
allocation
by direct democracy. Quarterly J.Economics 93 (1979) 563-587.
Seltenjl.,
Reexamination of the perfectness concept for equilibrium points
games. International J.Game Theory 4 (1975) 25-55.
in extensive
form
4953 045
'<
Mlt LlBRaftiEi
3
TDflD DDM
E^E
Ifll
Download