BASEMENT

advertisement
BASEMENT
^Ife
«^
HDZa
ALFRED
P.
WORKING PAPER
SLOAN SCHOOL OF MANAGEMENT
TAKEOVER DEFENSES AND SHAREHOLDER VOTING*
David Austen -Smith
University of Rochester
and
Patricia C. O'Brien
Massachusetts Institute o£ Technology
WP# 1823-86
September 195
MASSACHUSETTS
TECHNOLOGY
50 MEMORIAL DRIVE
CAMBRIDGE, MASSACHUSETTS 02139
INSTITUTE OF
TAKEOVER DEFENSES AND SHAREHOLDER VOTING*
David Austen -Smith
University of Rochester
and
Patricia C. O'Brien
Massachusetts Institute of Technology
WP# 1823-86
*
September 19i
The authors gratefully acknowledge helpful conversations
with Jeff Banks and Rick Ruback. Remaining errors are
solely the authors' responsibility.
Takeover Defenses and Shareholder Voting*
David Austen-Smith
Department of Political Science
University of Rochester
Rochester NY 14627
and
Patricia C.O'Brien
Sloan School of Management
M.I.T.
Cambridge
MA 02139
September 1986
*The authors gratefully acknowledge helpful conversations with
Remaining errors are solely the authors' responsibility.
Jeff
Banks and Rick Ruback.
Abstract
Why do shareholders vote for anti-takeover devices which apparendy lower the value of dieir
firm?
We address this question by constructing an agenda-setting model in which rational,
informed, and value-maximizing shareholders vote on requests for such devices
self-interested
management with employment opportunities
outside the firm.
made by
a
We find sufficient
conditions for the value of the firm to decline as a result of a request, although
it is
approved by
shareholders. In our model, the apparendy paradoxical voting behavior occurs because the
expected takeover premium
is
reduced more by rejection of the request than by approval.
1.
Introduction
Why do shareholders vote for anti-takeover devices which apparendy lower the value of their
firm?
We address this question by constructing a model in which rational, informed, and
value-maximizing shareholders vote on requests for such devices made by a self-interested
management with employment opportunities
outside the firm.
We describe conditions under which
the value of the firm declines as a result of the request, although
it is
approved by shareholders. In
our model, the apparendy paradoxical voting behavior occurs because the expected takeover
premium is reduced more by rejection of the request than by
approval.
A large and increasing number of amendments to corporate charters are specifically designed to
increase the cost of transferring control.
amendments
in
DeAngelo and Rice (1983)
report over
250 proposed
1974 through 1979. Linn and McConnell (1983) find generally increasing
incidence of such proposals
among NYSE
firms over the period from 1960 to 1980.
Responsibility Research Center Usts over 200 in 1985 alone.
the motives for instituting anti-takeover charter
amendments
The
Investor
The two major hypotheses describing
are
commonly described as
"management entrenchment" and "shareholder interests."^ According
to the
management
entrenchment view, incumbents are interested in job security and seek protection from the takeover
market, to the detriment of shareholders.
Two suggested explanations for shareholder approval of
entrenching antitakeover devices are: (1) for a majority of shareholders, the costs of becoming
informed about the effects of defensive charter amendments exceed any potential benefits, and
uninformed shareholders consistenUy give
their proxies to
wish to maintain friendly relations with management
management; and
(2) large shareholders
to ensure the benefits of future business,
and
large shareholders control sufficient shares to be pivotal in the vote. Shareholder irrationality is
sometimes offered as a
third alternative.
The stockholder interests hypodiesis recognizes a free-rider problem in
collective action
by
shareholders (Grossman and
Han
(1980), Jarrell and Bradley (1980)). Shareholders have
difficulty colluding to extract larger
premia from takeover bidders, so antitakeover devices benefit
shareholders by enforcing a level of collusion in takeover negotiations. Since defensive charter
amendments
benefit shareholders, there
them. However, there
no inconsistency
in rational shareholders voting for
evidence that shareholders benefit from such amendments.
is Uttle
DeAngelo and Rice (1983)
is
find statistically insignificant negative abnormal returns around the
public announcement of proposed antitakeover amendments. Linn and McConnell (1983) find
positive returns around the board meeting date at
insignificant negative returns around the
find negative returns
classified
which amendments are proposed, and
proxy mailing
date. Jairell,
accompanying the announcement of "shark
Poulsen and Davidson (1985)
repellents", viz. supermajority,
board and authorized preferred amendments.
In the context of our model, the
management entrenchment and shareholder interests
hypotheses do not necessarily lead to different predictions about shareholder value. Anticipatory
takeover defenses raise the costs of acquiring control of the firm, thereby entrenching management,
but lead to a higher
potential
premium for shareholders
managers contribute
if
a bid succeeds.
We presume that different
different value-added to a given firm,
Only managers capable of producing higher value-added than
the
by virtue of skill or experience.
incumbent can mount successful
takeover bids. Whether shareholders gain or lose as a result of the incumbent's defenses depends
upon the quality of the incumbent management relative
opportunities for
employment outside
The paper is organized
3.
and the incumbent's
the firm.
as follows. In section 2
discuss the results in section
to potential bidders,
we develop
the model, and
we summarize and
Section 4 concludes. All proofs are confined to Appendix A.
Appendix B consists of an example
that illustrates
our results.
2.
Model
We are interested in managerial control of a given firm with fixed assets and financial structure.
There
is
M of different managerial types capable of running the firm, different types
a continuum
A manager's type is the common expectation of
contributing differendy to the value of the firm.
owners and the outside market of the value added
the incumbent manager's type, and
types on
M
is
common knowledge
question. Because
we
Assume
function.
M
is
the
whole real
that
line.^
The
m e M denote
distribution F(-) of
and induces a distribution over possible values of the firm
let F(-) also
that the support of
F
The firm is owned by
in
we can,
describe the distribution over managers of possible firm
is
connected, and that
F
is
We additionally assume that lim.^_^^[l-F(t)]/f(t) < <»:
diversified,
manager. Let
take the value of the assets and the financial structure to be fixed,
without loss of generality,
values.
assume
by
to the firm
smooth. Let
this is
f(-)
be the density
not a strong restriction.-^
a set of shareholders holding fully diversified portfolios. Being fully
each shareholder
is
interested only in
maximizing the expected value of the
firm. This
expected value depends both on the incumbent manager's type and on the expected premium paid
the owners, conditional
Heuristically, the
firm
is
two
periods.
on the firm being taken over by some
model of takeovers we have
in
mind
is
alternative
draws a potential alternative manager fi-om the
set
management
the following.
A manager of type m currendy controls the firm.
to
The
lifetime of the
In the second period, nature
M, who can choose whether or not to make
a
takeover bid for the firm. Since there are no takeover bids possible beyond the second period, the
maximum value of the firm in this last period is
control,
i.e.
the second period manager's type.
given by the value added by the manager then in
We suppose that there is no utility value to making
a bid per se, so that, given the incumbent manager's type m, only managers of types n
worthwhile to make any takeover
find
it
will
make an
offer.
Hereafter,
bid. If there is
we assume
>
m could
any cost to bidding, then no type n <
m
there is such a cost, but, to avoid cluttering the notation
unnecessarily, suppose the cost constant and take
it
to
be implicit in the value of m. Hence, given
the distribution F, the probability that a
is
[l-F(m)]
nothing).
(if
The
we make
manager minimally capable of making a takeover bid
the bidding-cost explicit,
we would have
to write [l-F(m+e)]: this adds
qualification "minimally" here refers to the possibility that the incimibent will contest
m
any bid by erecting takeover defenses: being a manager of type n >
for
making a successful bid
for the firm. If a bid is
controls the firm for the remainder of
incumbent remains
Given
this
its life.
model of takeovers,
If there is
first t^je
surely in control of the firm in the first period
enterprise is taken as given,
view such defenses
successful, then the
no bid or if there
m, and the expected premium
derive this expected premium, consider
is
is
necessary but not sufficient
new manager
an unsucessful bid, the
is
the first period expected value of the firm
loss of generality, let discount factors be equal to
The manager
made and
is
in control.**
the inciunbent manager's value added,
is
arrives
it is
in the
one for the manager and
is
simply the
sum of
second period. Without
all
To
shareholders.
incumbent manager's objective function. Since he
and the investment and
financial structure of the
necessary only to examine his second period payoff.
both takeover defenses.
We
as effectively increasing the cost of making a successful takeover bid.
It is
endowed with two control
variables, x
and
y,
natural, then, to describe both types of defense as nonnegative real variables: (x, y)
absence of any defense, managerial types n >
€ R^^.
In the
m will successfully bid for the firm: if there is any
defense, a successful bidder must be capable of overcoming the defenses in addition to improving
on m. Therefore, given defenses x and
to win.
As yet
takeover bid must be at least equal to [m+x+y] in order
there is nothing to distinguish the
potential bidder's perspective the
different
y, a
two
two types of defense and, indeed, from any
sorts are indistinguishable.
They
are,
however, quite
from the incumbent manager's perspective.
Defense x
is
anticipatorv
:
it
can be put in place onlv in the
first
period, prior to any potential
bidder appearing. There are no direct costs to implementing x. However, the manager
to ask the shareholders explicitiy for a level of x. Majority voting
among
is
obliged
the shareholders
determines whether or not the manager's request
granted Amendments are not permitted, and so
is
the shareholders can only accept or reject the manager's proposal.^ In addition, there
cost
is
home by
the
manager
granted This cost
is in
indication that the
the shareholders;
terms of his outside value
on being ousted from
this
for instance,
is
however
X?
> 0]
x = x?; and
that the
the utility payoff he can expect to receive in
the firm.
if
more
Our presumption
in the
is that efforts
absence of an explicit offer
is
on
an
interested in personal security than the welfare of
lowers his outside market value. Let x? denote a request for a level of
anticipatory defense. If x? is approved
defense
-
managers to erect takeover defenses
manager is,
and
an indirect
for requesting anticipatory defense, irrespective of whether this request
the second period, conditional
the part of incumbent
is
it
is
by shareholder vote, then the implemented level of this
not approved then x
above discussion implies
=
0. Evidently,
that the states of the
x?
=
implies x =
world [x =
I
Note
0.
x? = 0] and [x =
I
are distinct: this is crucial to our model.
The second type of takeover defense
implemented oiJy to
available to the manager, y,
responsive
it is
:
second period conditional on such a bid
fight an explicit takeover bid in the
materializing. Unlike anticipatory defenses, the
is
manager is
free to
implement any
level of
responsive defense without the necessity of obtaining shareholder approval. There are, though,
direct costs to
engaging
in a takeover fight. Let c(y)
be the direct costs, measured in units of utility,
bome by the incumbent management in implementing
c'(y)
0:
>
and c"(y) >
a responsive defense of y:
for all y. For technical reasons,
none of our principal
results
depend on
this."'
it
is
convenient to assume lim.y_^Q
any successful bidder
in the
second period must pay
at least
any more be paid? Because shareholders are interested only
pay e >
more than [m+x+y]
to
in
[m+x+y]
c'(y)
=
x and
y,
we
argued
to acquire the firm. Will
maximizing wealth,
persuade them to remove the incumbent
pay any more than necessary to take over the
0,
'
In the heuristic discussion of the takeover process above, given defenses
that
assume c(0) =
firm. Therefore, in the limit,
it is
sufficient to
No acquirer wishes to
epsUon
will
be zero.
Hence, the premium over and above his managerial type, m, that the incumbent secures for the
~ conditional
shareholders
~
is
on losing a takeover
[m+x+y]
make offers, and any such
will
the second period
is
control of the firm,
therefore given by [1
co(x,
(1)
where W(-)
J J
<
-
incumbent obtains, conditional on losing
utility the
I
I
-
c(y),
0-
from the
able to extract
is
acquirer, decreasing
~
utility
in the
V(m). To make the problem
We argued above that,
is
presumed common knowledge,
nontrivial,
we
I
m) >
n.
If this
is
—
latter
in
any
on the
0.
suppose V(m) > W(0,
y, if there is
takeover attempt.
a bid then
is
it
I
is
m).
will be successful.
At the
indeed given. However, since
The incumbent's
as is his type. Likewise,
of the potential bidder in the second period
of type n
premium he
second period, the manager stays in control and receives a
given x and
who makes the
W2 < 0,
the incumbent's outside
responsive, the manager's selection of y will depend, inter alia,
managerial type n
0,
and the cross-effects of this
beginning of the second period, the anticipatory defense x
defense y
>
ultimately, at an ever-increasing rate
former are non-increasing. Assume also that W(0,
no takeover bid
Thus
Wj
increasing concave in the takeover
efforts to secure anticipatory defenses in the first period;
If there is
and x?. Assume
^^ ^^so assume that lim.jj9_^<„ W2 = -«».
value conditional on losing his current position,
was
probability of takeover in
given by:
y X?) = W(x+y, x? m)
W ^2 -
The
>
F(m+x+y)].
the manager's gross outside value given x, y
is
and
is
fixed, only managerial types of n
offer will be successful.
Given x and y, the net second period
W
and y as
precisely [x+y]. Moreover, again taking x
second period despite defenses x and y
battie in the
on
the particular
utiUty and cost schedules are
once nature has made her draw, the type
common knowledge.
Therefore, any potential bidder
capable of calculating the incumbent manager's optimal credible response y to a bid by
response
is sufficient to
presumption of credibility
~
beat n's best offer, then
n will
make no offer at
all.
~
If
n
because of the bidding cost and the
is
capable of topping the incumbent's
make
best response, then n will
the smallest offer necessary to
win control of the
finn.
And even
though the incumbent loses surely, by definition of credibility he will bear the costs of fighting,
and the winner
c(y),
will
remains to determine the
pay the premium [x+y]. Hence the
From
Wj
we
y
I
x?).
obtain:
=
Wi
aco/ay
(4)
a2o)/ay2
dw/dy =
>
It
and define:
(d(x,
r^
I
(3)
Setting
{0, x?},
y*(x X?) = argmax.y g
(1),
argument goes through.
of credible responsive defenses.
set
Let X? and x be given, x €
(2)
earlier
=
- c';
Wi 1
-
<
c"
Vy.
0,
implicidy defines y*(x
and lim.y_^Q
c'(y)
=
I
By
x?).
by assumption,
(4), y*(-IO is
y*(-l-)
>
unique for
all x?,
x>
0.
Since
0.
We now define, Vn > x+m:
v(n,
(5)
The schedule
X m) = V(m)
I
-
v(-) describes the
c(n-x-m).
maximum
second period
utility
the incumbent
given he fights and defeats any bidder of type n (again, no managerial type
offer). Define, for
n(x
(6)
I
x?)
X? >
=
and x €
[inf.n
[inf.n
GSTotice that,
Then
bid.
I
< n(x
I
v(n, x
!•)
=
co(x,
it is
I
(7)
how premiums paid to
n*(x
I
X?)
There are two cases:
= x + y*(x
(a)
n*(x
I
I
I
x?)], if
>
V(m) > W(x+y*(x
will
make an
I
x?), x?
m);
I
m)], otherwise.
I
n(x
I
x?) will
x?)
m+x
>
manager m
make a
for all x, x?
will fight
> 0).
and defeat the
successful offer for the firm,
differ.
successful bidders vary, define, for x?
x?)
x?)
x?)
credible that the incumbent
the other hand, any bidder of type n
see
I
I
m) by assumption, n(x
although the premiums they have to pay will
To
y*(x
V(m) = W(n-m, x?
x?),
< x+m
obtain,
{0, x?}:
because V(m) > W(0,
for all types n
On
I
n'
manager can
>
and x €
{0, x?):
+ m.
> n(x
I
x?) and (b) n*(x
I
x?)
< n(x
I
x?): case (a) occurs if
and
only
V(m) < W(x+y*(x
if
I
x?
x?),
Figure
I-).
under the assumption
illustrates these
1
that
x = x? >
0.
[HGURE 1 ABOUT HERE]
Consider Figure 1(a) and
incumbent manager first
let
n e (n(x x?), n*(x
I
n to extract
to fight
I
x?)].
the bidder-type exceed n*(x
premium,
in this case (virtually) equal to [n*(x
his outside value, co(x, n*(x
Notice in
this event,
assumed
although the
to
consume
may
I
I
n-m-x
co(x,
I
and
Now
x?): this is clearly credible.
incumbent will optimize by fighting to extract a
x?)
-
m], and then leaving the firm and obtaining
I
do not pay
all that
they are willing to pay for the firm. In
maximum value of the firm is n in
the surplus, n
-
[n*(-l-)
m]. Since the
-
new manager is
the second period, the
life
of the firm
is
only two periods,
one thinks of the new manager as representing some other firm, then
this
be viewed as a windfall gain to the owners of the acquiring firm.
In Figure 1(b), the situation
bidders pay a
will
a best response for the
x?)-m-x x?).
this last case that bidders
this is reasonable. If
surplus
x?): then again the
I
it is
(virtually) all n's willingness-to-pay for the firm,
then to leave the firm to collect his net outside value,
let
Then
is
premium of [n*(x
I
analogous to the second case described for
x?)
-
1(a).
All successful
m], irrespective of their type, and only types n
> n(x
I
x?)
make takeover bids.
For future reference, for
actually paid
over
m
(8)
all
n > n(x x?) and for any x
I
by the successful bidder of type
n.
Then
> 0,
let 7c(n,
x x?) denote the premium
I
for any successfiil bid, the
premium paid
is:
7t(n,
X
I
X?)
= min.[n
-
m, n*(x x?)
I
-
m].
We are now in a position to specify the incumbent manager's second period expected payoff
schedule as a function of anticipatory defenses,
(9)
U(x
I
X?)
x:
= F(n(x x?))-V(m) + 5-[F(n*(x
I
+
{5-[l-F(n*(x
I
X?))]
+
I
x?))
-
F(n(x
[l-5]-[l-F(n(x
I
I
x?))]-J co(x,
x?))]}-co(x,
n-m-x x?)-f(n)dn
n*(x
I
I
x?)-m-x x?)
I
Figure 1(a)
V, 0)
V(m)
W(x,x?lm)
n(x
I
x?)-m-x
n*(x x?)-m-x
I
Figure 1(b)
V, CO
V(ra)
W(x,x?lm)
n*(x
I
x?)-m-x
n(x
1
x?)-m-x
°
where 5 =
n(x
1 iff
I
< n*(x
x?)
of the firm under management
I
x?) and 5
=
otherwise. Similarly, the
period expected value
first
m is given by:
or
S(x X?) =
(10)
I
m + 5-[F(n*(x
+
and 5
x?))
I
{5-[l-F(n*(x
I
-
F(n(x
X?))]
+
x?))]-J [n-m]-f(n)dn
I
[l-6]-[l-F(n(x
I
x?))]}-[n*(x
I
x?)
-
m]
defined as before.
is
The responsive defense y is chosen optimally by
the
management, independent of shareholder
approval and given the bidder type that appears in the second period. Anticipatory defenses require
shareholder approval and have to be set in the
period optimization problem
(11)
is
first
period. Let x
therefore to choose a request, x?
=
>
Then
x?.
the manager's first
0, to:
max.U(xlx?)
subject to: S(x
Clearly, if the
I
x?)
> S(0
manager asks x? =
I
x?).
constraint says that the expected value of the firm conditional
be no less than
its
value
if
However,
0, then the constraint trivially binds.
the request
is
rejected, given x?
>
if
this is
granted
~ we have
in general that
S(0
Because the incumbent manager's
0.
I
then the
on the request being approved must
decision problem in the second period depends, inter alia, on his request, x?, in the
whether or not
x? >
0)
* S(0
I
first
x?) for any x?
>
period
0.
~
In other
words, the relevant alternative that rational shareholders have to compare against the manager's
request
is
not the situation prior to any request, S(0
reject the request,
S(0 x?). This
If the constraint
I
binds at
rejecting the request Since
is
I
0),
but the situation that would result
Appendix
some x? > 0, then shareholders
managers are not so
are indifferent
indifferent, they
between accepting and
can insure acceptance in such
strict
preference on the part of
A shows, such a perturbation is always available.
the constraint binds, then the
they
the central idea of the model.
circumstances by slighdy perturbing the request, x?, to induce
shareholders: as
if
management request
is
approved. Alternatively,
So we assume
we can
that if
adopt the
convention that in cases of shareholder indifference, shareholders always "vote with the
10
management
.
We turn now to some results.
3.
Results
There arc thrce possible conditions
beginning of the second period: (1) the manager
at the
requested no anticipatory defenses, (2) the manager
shareholders, and (3) the manager's request
second period response
on the
first-period
Proposition
Corollary
If
1:
1:
Let x
was approved. Proposition
= x? >
0.
Then y*(0
1
0)
if
is
I
> y*(0
x?)
is
I
> y*(x
I
x?)
>
is
x?).
maximizing response
never larger after a request, even
premium
we show
if
1, total
is
defenses
rejected. Since total defenses determine
successful bidder emerges.
if the
1 is
that the second-period
request
is
denied, than
Thus, the request carries no implicit threat of "scorched earth" responses
Rather, as
0.
a successful bid, this implies that shareholders can expect a smaller
An interesting feature evident from Proposition
is
puts an ordering on the
1
approved. However, from Corollary
premium if they reject the manager's request and a
response
x?)
rejected by shareholders, the second-period
the request
premium received in
I
> y*(0
(anticipatory plus responsive) are smaller if the request
the
was voted down by
which maximizes the manager's outside value, conditional
Letx = x?>0. Then x + y*(x
than
a request which
outcome.
a first-period request
strictly larger
to a takeover bid
made
if
if
maximizing
no request is made.
shareholders deny it
below, the request alters the manager's incentives to fight for a higher
a successful bidder appears.
Anticipatory and responsive defenses are substitutes in their effects on the
minimum bid
11
Generally, the higher the level of anticipatory defense approved by
required to acquire the firm.
shareholders in the
Comparative
first
statics
period, the lower will be the manager's choice of responsive defenses.
on the maximizing second-period response (Appendix A,
that this response is non-increasing in the size of the first-period request
the first-period request, except
its
two arguments and
separability,
it
when
the manager's gross outside utility
the first-period request
follows fixjm Corollary
is
denied.
-
(a7))
stricdy decreasing in
additively separable in
and therefore the premium from a
successful bid, will be at least as large if requested anticipatory defenses are approved as
anticipatory defenses
show
In the special case of additive
that total defenses,
1
is
It is
(a3)
if
no
were requested.
Value-maximizing shareholders consider both the
size of the
premium they can expect from
successful bid, and the probability that such a bid will emerge, in evaluating
how
a
to vote.
Proposition 2 describes the probability of a successful takeover bid, as a function of requested
anticipatory defenses and shareholder approval of the defenses.
Proposition 2:
(a)
n(x
(b)
Vx =
I
X?)
X?
is strictly
increasing in X?, X e {0, x?};
>
X?)
0,
n(x
Proposition 2 states that the
increases with the
bid will emerge
I
> n(0
I
x?)
> n(0
0).
minimum bid which can succeed against incumbent management
amount of anticipatory defense
falls as the
I
requested. Since the probability that a successful
minimum successful bid rises, part
(a)
of Proposition 2 implies that the
probability of takeover declines with increases in the level of requested anticipatory defenses,
whether or not these are approved. Part
(b) implies that the probability
anticipatory defenses are requested, declines
request
is
approved. Notice that part (b)
is
if
there is a request,
of takeover
is
largest if
and may decline more
not an immediate consequence of part
(a):
no
if the
the
change
in
12
state
from
[x
= x? x? >
I
0] to [x
=
I
x? > 0]
is
not incremental because of the "take
it
or leave
it"
nature of the shareholders' decision.
The value
successful bid
to shareholders
is
from anticipatory takeover defense dep)ends on both the premium if a
made, which generally increases with the
level of anticipatory defense,
probability of a successful bid, which generally decreases. Proposition 3
are
unambiguously worse off if they
reject
shows
and on the
that shareholders
management's request for anticipatory defenses than
they were before the request
Forx?>0,
Proposition 3:
The voting
S(
I
0)
> S(0
I
x?).
(incentive compatibility) constraint in the
model requires
that approval of a request
leave shareholders at least as well off as rejection. Proposition 3 states that shareholders are worse
off if they reject the request than they
latter
circumstance, no request,
To complete our description
leave
them worse
shareholder value
off,
if
is
would have been
if
no request had been made. (Note
not available to shareholders deciding
how
to vote
on a
that this
request.)
of the apparent paradox that shareholders vote for defenses which
we require
a comparison of shareholder value if the request
no request is made. Proposition 4 gives a
is
approved with
sufficient condition for the apparent
paradox to occur.
Proposition 4:
V(m) < W(y*(0
1
0),0
=> 3x? €
According to Proposition
his
maximum
I
m)
(0, oo):
4, if the
S(0
manager's
I
0)
> S(x
utility
I
x?)
> S(0
I
x?),
x = x?.
from employment with the firm
is less
than
gross outside utility before any request for anticipatory defenses, then requests exist
which shareholders
will approve, but
which leave them worse off than they were before. Recall
13
that
we assumed the manager's utility from employment in the fiim was
outside
utility.
The
sufficient condition in Proposition
response to a sufficiently high bid
is to fight
larger than his initial gross
4 describes a manager whose optimal
for a higher
premium, and then
to leave for
higher-valued outside opportunities.
With Proposition
which
4,
we have shown
result in the voting behavior
the existence of requested levels of anticipatory defense
we hoped
to describe.
That
is,
rational, informed,
value-maximizing shareholders will approve the defenses, but are made worse off by them. The
sufficient condition for the result
depends on the manager's
utility in
current and alternative
employment.
We have not yet demonstrated, however, that these levels of anticipatory defense
would
be requested by managers with
in fact
no inconsistency between
utilities satisfying the sufficient
utilities satisfying this
condition and
utilities
anticipatory defense, identified in the Proposition, as a best choice. In
example of a manager with
utility satisfying the
anticipatory defense will be approved
request had been made.
It is
The example
is
in
Appendix B, we provide an
will leave
whose
best choice of
them worse off than
no
if
no sense pathological.
worth noting that under some circumstances, shareholders can be made better off by
implementing some anticipatory defense.
is that
generating the level of
condition of Propostion 4,
by shareholders, and
condition. There is
By
Proposition 3, a necessary condition for this to occur
the manager's request, x?, be strictiy interior to the constraint set;
i.e.
S(x
I
x?)
This amounts to the manager's imconstrained best level of anticipatory defense being
> S(0
I
x?).
strictiy less
than shareholders' most-preferred level."
The primary
is that
implication of our
model
for interpreting the empirical
inferences about whether shareholders vote rationally cannot be
shareholder wealth before and after the vote.
management
as an
unambiguous drop
work which has preceded
made from
a comparison of
We describe the alternative to voting with
in shareholder value, not as a return to the pre-proposal
status quo. Therefore, pre-proposal shareholder wealth
is
it
not the correct benchmark for
14
determining shareholder rationality. Our model suggests that empirical investigation of shareholder
voting and takeover defenses should consider the manager's outside employment opportunities,
and the manager's
4.
skill relative to potential bidders.
Conclusion
We have provided a rational choice model of shareholder voting on anticipatory takeover
defenses. In our model,
it
is feasible for
informed, value-maximizing shareholders to approve
measures which leave them worse off than they were before the measures were requested. What
drives this result
is that
a manager, in requesting such measures, lowers his outside market value.
Consequentiy, the manager's optimal response to an actual takeover bid
rejected than if he
had made no request Shareholders recognize
In the model, the manager's type and utility schedule are
question of why any manager would be hired
which decrease the value of the firm
have
in
mind a
signalling
as a signal, and
we
In other words, our
signalling
different if the request
common knowledge.
game which precedes
is
the
not
To this extent,
two periods we
known with
our model
study.
certainty.
At
is
is
how to vote.
this in evaluating
This raises the
who will wish to implement anticipatory
to shareholders.
perhaps the hiring stage, the manager's type
is
defenses
incomplete.
We
this earlier stage,
The request x?
functions
are implicitly assuming the signal fully reveals the manager's type (and utility).
model
is
predicated on the existence of a separating equilibrium to this earlier
game.
Finally,
we
offer
two remarks.
First,
it is
frequentiy asserted
(cf.
Easterbrook and Fischel
(1983)) that the alienability of ownership claims protects shareholders from detrimental
management entrenchment
tactics.
However, unless shareholders
anticipate the proposal of
takeover defenses by management, they cannot alienate their voting claim in response to the
proposal.
SEC proxy
mailing requirements
demand that
precede the proposal date. Once the proposal
is
the record date for shareholder voting
announced, the constituency
is fixed.
Our model
15
suggests that any drop in share value should occur with the announcement of the proposal, not with
the vote.
Second, our model implies that changes in shareholder wealth associated with voting on
takeover defenses
may
be positive or negative, depending on the manager's type and
schedule. In cases where shareholders' wealth
the manager's request If there
is
is
reduced, the reduction should occur at the date of
any detectable change
at the date
positive. This follows
from Proposition 3 and the voting
shareholders' wealth
unambiguously reduced
is
shareholders' wealth under rejection
interpretation, empirical results
is
utility
if
of the vote,
it
should be
constraint: the first states that
they reject a request; the second ensures that
no larger than
their wealth
under approval.
On
this
which find shareholders' wealth declines following implementation
of anticipatory defenses are not evidence of shareholder irrationality or ignorance.
16
Appendix A: Proofs
Proposition
Proof:
1:
As remarked
and lim.y^^
=
c'(y)
Wi(y*(0
(a.1)
= x? >
Let x
0.
But c" >
first
I-) -
0),
I
To check y*(0 10)^
Wi(y*(0
!•) -
0),
1
I
I
1
I
Wj
>
everywhere,
y*(0 x?), use (3) to obtain:
I
x?
x?),
=
I-)
c'(y*(0
I
c'(y*(0
-
0))
I
x?)).
Then:
x?).
I
I
0.
from assuming
in section 2, the last inequality follows
Suppose y*(0 0) < y*(0
Wi(y*(0
Then: y*(0 0) > y*(0 x?) > y*(x x?) >
0.
Wi(y*(0
<
implies the RHS(a.l)
I
x?), x?
I-)
>
by
0,
W^ ^
<
0,
W12 <
To check y*(0
0: contradiction.
I
and x? >
x?)
> y*(x
I
0.
x?), again use the
order condition (3) to get:
Wi(x +
(a.2)
y*(x x?), x?
I
Suppose y*(0 x?) < y*(x
I
implies LHS(a.2)
Remark
[x
1:
Then
1
1:
I
I
X?)]
Wi(y*(0
> y*(0
Let x = x? >
I
iff
>
c"
0: contradiction.
y*(0 0) = y*(0 x?)
+ y*(x
Corollary
<
x?).
I
I-) -
I
x?),
x?
1-1
=
c'(y*(x
implies RHS(a.2)
0.
x?))
-
c'(y*(0
But x = x? >
I
x?)).
0, so that
II
W12 = 0.
Hence, x = x? >
and
W12 =
imply:
0).
0.
Then
Proof: Use (3) and Proposition
1
[x
+ y*(x
with
Wj j
I
<
x?)]
0.
> y*(0
1
x?).
II
Before proceeding to establish the remaining Propositions,
following comparative
>
I
it is
convenient to report the
statics.
(a.3)
X = X? => dy*(x x?)/dx? =
(a.4)
dy*(0 x?)/dx? = -Wi2/[Wi
(a.5)
x = X? =>
I
I
dco(x, y
I
x?)/dx?
-[Wn+^U^/TWl r^"! < ^^
^-c"]
<
0,
with the inequality
= W^ + W2, which
strict iff
W12 < 0.
a priori has ambiguous sign.
Wj ^ <
17
Note
that at
y*(x x?)
is
I
given by
any
y,
I
(a.5)
I
I
<
W2 < 0.
=
x?)/cix?
I
(a.6)
(a.4).
If
is
0,
Proof: Let X = X? >
0.
as c"(y*(x
x€
{0, x?}.
I
Then, n(x
dA*/d\l = -W2(x+y*(xlx?), x?
A* can change
and we have, V(m) <
X?)
iff
V(m)
-
X
<
sign at
(>)
I-)
=
x?)
I
+ m. And
0, then
since
an*(0 x?)/9x?
I
is
dy*(xlx?)/ax?. Substituting from (a.3) and
(>) x.
=
x?)
is
(<)
x?)
is
differentiable in x?;
>
x),
I-)
=
=
-Wi2(x+y*(x
[v(n*(x
I
and using the
x?),
x
x?),
I
I-) -
x?
I-).
and an(x x?)/ax? >
I
o)(x,
y*(x
I
x?)
I
0.
x?)].
first-order condition (3) gives,
0.
x?), x?
I
Consider x <
I
I
>
most once as x
W(x+y*(x
W(n(x x?)-m, x?
In this case, n(x
= x + y*(x
x?))
t
By
x.
increases,
= x? such
negative to positive. Suppose there exists an x
I
+
1
Consider the difference. A*
Differentiating this with respect to x? (at x?
n*(x
x?)
we obtain:
Let x? >
Therefore,
I
differentiable in x?. If x
I
I
1:
x?)
I
x = x?, then an*(x x?)/ax? =
an*(x x?)/0x > (<)
(a.7)
By definition, n*(x
I.
differentiable in x?, n*(x
collecting terms,
Lemma
y
dco(0,
(a.6)
iff
I-)
(6),
that
x < (>)
n(x
I
x?)
and
x.
is
this
change can only be from
A* = 0. Then
So by
this
value
is
definition (6), n(x
I
unique
x?)
<
(>)
implicitly defined by,
0.
differentiable because
W
is differentiable.
In particular,
(a.8)
an(xlx?)/9x? = -W2(n(xlx?)-m, x?l-)AVi(n(xlx?)-m,x?IO;
(a.9)
lim.x_^ x- [5n(-l-)/3x?]
Vx <
x,
and,
Now consider x > x. By
V(m)
-
c(n(x
(6),
x?)-x-m)
I
-
Again, differentiability of n(x
(3),
we have
(a.lO)
that
an(x
Vx >
I
n(x
I
(0(x,
I
= -W2(n*(x x?)-m, x?
1
x?)
I
x?)-m, x?
I-)-
implicidy defined by,
is
y*(x
l-)/Wi(n*(x
I
x?)
x?) follows
I
x?)
from
=
0.
differentiability
of c and
W.
In particular, using
x,
x?)/8x? = [c'(n(xlx?)-x-m)
-
Wi*(x)
-
W2*(x)]/c'(n(xlx?)-x-m),
18
where Wi*(x) = Wj(n*(xlx?)-ra, x?
lim.x_^ x+ [3ll(-IO/3x?]
(a.l 1)
=1,
I-), i
=
Hence,
2.
[c'(n*(xlx?)-x-m)
Wi*(x)
-
= -W2(n*(xlx?)-m, x?
from another application of
the second equality following
-
W2*(x)]/c'(n*(xlx?)-x-m)
l-)AVi(n*(xlx?)-m, x?
Together, (a.9) and
(3).
argument for n(x x?) being differentiable everywhere when x = x?
the
n(x
and
I
I
X?)
> x+m, Vx, x? >
Let x
(a.9).
Since
A* >
this
x,
and consider
<
0, n*(xlx?)
>
x?)/ax?
(a.lO).
By
for
x = x? < x
all
Wi*(x) =
(3),
>
n(xlx?). Therefore, c"
Wj+W2 < Wj.
all y,
11) complete
from section
immediate from
is
=
c'(y*(xlx?))
2,
(a. 8)
c'(n*(xlx?)-x-m).
implies,
Therefore, the numerator of (a.lO)
Lemma for x = x?. Now
completes the proof of the
reasoning as before gives n(0
I
Lemma
2:
(a.7)
and
Lemma 2:
Let x
= x? >
Proof: (a)
V(m) < W(x+y*(x
cases.
suppose x =
imply that U(x
1
I
I
positive. Since
and x? >
>
x?)/3x?
0.
c'
>
0,
Similar
follows on implicit
II
Then, n(x
0.
is strictly
x?) differentiable in x?, and 3n(0
two
differentiation of (6) for the
Remark
I
(recall that
(a.
c'(n(xlx?)-x-m)>Wi*(x)>0.
(a.l2)
Moreover,
>
That an(x
0).
I-);
I
x?), x?
x?)
I-)
I
x?) and S(x
> n(0
I
x?) are differentiable in x?.
I
x?);
=> V(m) = W(n(x x?)
I
-
m, x?
I-)
by
(6).
There are two
possibilities:
(a.l)
V(m) < W(n*(0
=> W(n(x X?)
I
=> n(x
(a.2)
I
X?)
-
1
m, X?
= n(0
I
By definition
-
I
I
m, x?
!•)
x?)
m, X?
of y*(0
-
=> V(m) = W(n(0 x?)
!•)
I
= W(n(0
I
x?)
-
m, x?
-
m, x?
I-),
by
(6)
!•)
x?).
I
V(m) > W(n*(0
=> W(n(x X?)
x?)
x?).
-
m, x?
!•) -
I-)
c(n(0
I
=> V(m) =
x?)
-
m) =
[q)(0,
co(0,
y*(0 x?)
y*(0
I
I
x?)
I
I
x?)
x?).
+ c(n(0
I
x?)
-
m)], by (6)
.
19
y*(0 X?)
a)(0,
I
I
> W(n(0
X?)
I
x?)
-
m, x?
x?)
-
m) > W(n(0
c(n(0
I-) -
I
x?)
-
m).
Therefore,
W(n(x
I
X?)
m, x?
-
c(n(0
-
I-)
I
I
x?)
-
m, x?
I-) -
c(n(0
I
x?)
-
m)
=>n(xlx?)>n(Olx?).
This proves the proposition for case (a).
(P)
V(m) ^ W(x+y*(x
By CoroUary
and x? >
1
W(n*(Olx?)-ni, X?
(a.13)
V(m) =
(0(0,
=> V(m) =
!•)
W(x+y*(x
0,
So by
I-).
x?
x?),
I
I
x?), x?
y*(x x?)
co(x,
I
> W(y*(0
I-)
I
I
x?),
+ c(n(x x?)-x-m), by
x?)
x?
I
(6).
Hence, V(m) >
!•).
(6),
y*(0
I
x?)
I
x?)
+ c(n(0 x?)
I
m).
-
Therefore,
(a.
By
14)
y*(x
co(x,
Proposition
x?)
I
I
x?)
and Corollary
1
-
1,
15)
n(0
X?)
I
> n(x
I
X?)
-
I
LHS(a.l4)
likewise be strictiy positive. Since
(a.
y*(0 x?)
co(0,
c'
>
x?)
I
=
is strictiy
and x = x? >
c(n(0
I
x?)-
m)
-
c(n(x
positive; hence, the
I
x?)-x-m).
RHS(a.l4) must
0, this implies,
X.
Now implicitiy differentiating (a. 13), we obtain Vx? > 0:
an(0 x?)/ax? = -W2(y*(0lx?), x?
I
Using
(a.
10),
(a.l6)
we have Vx? >
[an(x
+
By
(a. 12),
this
term
-
9n(0
I
x?)/ax?]
=
{
1,
-
8)
[W2(x+y*(xlx?), x? l-)/c'(n(xlx?)-x-m)]}.
W2 < 0, and W12 ^ 0,
> W2(y*(0
<
Vx? >0,
positive for y in the neighborhood of zero
I
x?),
•!•)
> W2(x+y*(x
I
By(a.l5)andc">0,
(a. 1
0.
[Wi(x+y*(xlx?), x? l-)/c'(n(xlx?)-x-m)]}
1 -
{[W2(y*(0lx?), x?l-)/c'(n(0lx?)-m)]
is strictiy
17)
x?)/ax?
>
0:
the first term of (a. 16) in {•) isnonnegative
By CoroUary
(a.
I
l-)/c'(n(Olx?)-m)
c'(n(x
I
x?)-x-m) < c'(n(0
I
x?)-m).
x?),
•!•).
.
and, because
lim.y^Q
=
c'(y)
Consider the second term
in
{
•
}
0,
20
Together,
(a.
and
17)
and, as with the
= 0, both terms
[n(x
I
x?)
-
term of
first
in
{
•
n(0
I
18) imply that the second term of
(a.
16), stricdy positive for
(a.
Vx? ^
vanish. Therefore,
}
=
x?)]
J[8n(r
r)/dr
I
-
dniO
1
(a.
y
16) in
in the
{•) is
Vx? >
also nonnegative
neighborhood of zero.
When
x?
0:
r)/ar]dr
> 0,
o
as required (with equality iff x?
Remark
3; Notice that
from [x=x? X? >
I
Remark
0] to
I
S(0
I
II
Lemma 2 is not implied by Lemma
[x=0 X? >
I
1: this is
because the change
in state
0] is not incremental.
the claim
made
2
in section
x?), then there exists a perturbation in x? -- say, x?
—
that, if
such that S(x~
x
I
= x?
x?~) >
x?~).
Lemma 3;
For any x? >
Proof: Given x
in n.
I
0).
Remark 2 and Lemma 2 justify
4: Together,
and S(x x?) = S(0
=
=
0, v(n, x
By W2 < 0, W(y,
x?
Combining Lemmas
Proposition 2:
(a)
n(x
(b)
Proposition 3:
Proof:
being
n(0
0,
< W(y,
I-)
2 and
x?)
3,
Vx = X? > 0,
3,
made given x? >
n(0
I
x?)
I
0).
1
c(n-m). Since
all
y>
0.
c'
>
0, v(n,
So, by (6), n(0
x m)
I
I
x?)
is strictiy
> n(0
1
0),
decreasing
Vx? >
0.
II
we have proved:
n(x
0)
-
I-),
increasing in x?, x e {0, x?}; and,
is strictiy
Forx?>0, S(0
By Lemma
> n(0
m) = V(m)
I
1,
I
x?)
I
I
> S(0
> n(0
I
is strictiy less
> n(0
X?)
0).
I
x?)
> n(0
1
0).
x?).
I
Hence
than
tiie
probability of a successful takeover bid
when x? =
0:
21
(a.
By
[1-F(n(0
19)
Proposition
1,
n*(0
Therefore, by (8),
(a.20)
And if n*(0
x?)
I
n(0
>
0)
I
< n*(0
I
in section 2, only types n
(a.21)
7t(n,
Vn < n(0
Likewise,
(a.22)
7i(n,
By
Proof:
say X?
>
S(x
By Remark
(a.23)
n(-l-)
:t(n,
I
7i(n,
(a. 19) -
assumption,
X?)
make takeover bids.
x?)
=
I
I
x?)
Wj^ <
is
•)
=
1
I
I
x?)
By
x?).
e (n(0
I
an argument
n(0
0),
I
x?)),
x?), x?
I
x?))]-[n*(x
I
II
= m.
W2 = -«>.
and lim.j^9_^^
I
x?))]-an*(x
I
and the assumption
positive for
an*(-l-)/ax?
By
all finite x?.
<
I
I-).
Therefore, for sufficientiy large x?,
Hence, by
(10),
Vx? >
x?*,
x?)-m].
>
for all x?
I
x?)/ax?
[1-F(n(x
I
-
Vx? >
{f(n(x
<
x?)/3x?
(a.7), the first
x?'.
for
x?',
I
x?))
x?))-an(x
all finite
I
<
By
(7)
and
aU
I
x?)
(a.3),
-
x?',
{
•
is
finite
if:
< an(x x?)/ax?-[n*(x
I
x? > x?" >
for
I
x?)/ax?
x?)/ax?-[n*(x
m), the term in
Then, aS(x x?)/ax? <
I
I
term on the RHS(a.23)
for all x? sufficientiy large.
x?))]/f(n(x
I
V(m) > W(0,
that
Therefore, for sufficientiy large x?, aS(,x
(a.24)
Vn
I
I
suppose an*(x x?)/ax? >
1.
0).
aS(x x?)/ax? =
By Lemma
Suppose
I
0.
We prove the Lemma by showing 38 (x
is strictiy
Therefore,
differentiable in x?. In particular,
[1-F(n(x
large.
any y < y*(0
0.
(a.22) yieldthe desired result
m + [1-F(n(x
2, S(-
at
Vn > n*(0
is strict
will
we have V(m) > W(x+y*(x
=
Wj2 <
x?).
Let x = x?. Then, lim.x9_^^ S(x
X?',
I
I
then the inequality in (a.20)
0),
strict iff
x?),
I
7t(n,
>
with the inequality
0),
I
0))].
1
0),
I
010) =
Together, (10) and
Lemma 4:
>
0)
I
[1-F(n(0
< n*(0
x?)
I
Vn >
;t(n,
<
x?))]
I
m].
}
x?)-m]}.
I
x?" sufficientiy
on the RHS(a.23)
of ambiguous sign.
x? >
x?*.
sup.[an*(x
I
Now
x?)/ax?]
=
22
By
assumption, lim.j_^oo [[l-F(t)]/f(0] <
lim.^9_^^[LHS(a.24)] <
(a. 10),
therefore, 3n(x
Vx? >
X?'.
Hence,
y>
(7),
>
x?)/8x?
1
Wj j
Again by assumption,
oo.
< W(y*(0
0),
1
=> 3x? €
By Remark
Proof:
W(y*(0
=
n.
I
X?*), X?*
Hence
I-)
(0, 00)
[1-F(n(x*
I
x?*))]
X?*) > n*(0
I
I
=
x?*)
= x?*)
I
botii
hypothesis, 3n*(x
^
x?"
-
x?'
such that 3S(x
(10).
II
the
is
I
^ S(0
x?)
I
x?),
x=
1
V(m) < W(x*+y*(x*
Then by case
.
[1-F(n(0
>
--
S(0 0) > S(x
:
such that
obtain (x*
By
W2 = -°°:
I
x?)/9x?
I
(a.26)
Given
by
(n,
Vn >
n*(0
(a. 1)
=
x?*))]
=
{x? >
X?.
S(x
I
I
X?*), 7t(n, x*
(i)
Px?
e
C
(ii)
[Vx? €
C
X?)
X? <
:
:
> S(0
I
I
x*
I
2,
I-),
n(x*
I
and V(m) <
x?*)
x?*) >
X = X?}
I
I
x?*)
the request x?* is accepted:
follows from Corollary
=
:c(n,
Jt(n,
7i(n,
x?*)
9t
= n(0
[1-F(n)].
x?*)
x?*) =
I
that S(x*
X?),
for
1,
and the second
I
I
x?*)
I
x?*)
= 0, Vn <
= n-m
By
n.
only types
2,
(8),
•,
x?*).
> S(0
I
x?*). Therefore,
0.
now two cases:
There are
Lemma 4 and
7t(n,
I
I
x*
bid: hence, 7t(n,
n*(0 x?*)],
0,
x?.
x?*), x?*
I
of Lemma
same whether or not
n: the first inequality
and (a.26) imply
(10), (a.25)
C=
Let X
Vn e
>
<
x?)/9x?
from the premise of the Proposition and the choice of x?*. By an argument of section
n > n will make any takeover
from
m)
1
the likelihood of takeover
(a.25)
Also, n*(x*
3x?* >
2,
and lim.x9_^^
Lemma follows from
allx?>x?". Since lim.^^^[l-F(t)]=0, the
and x = x?,
1
imply that lim.x7_^[RHS(a.24)] = «.
x?, togetiier
Therefore, there exists a sufficientiy large value of x?
Proposition 4; V(m)
<
for sufficienUy large x?.
1
and x =
0,
Lemma
Therefore, by
'^^
X?
<
00
00
&
,
S(x
S(x
S(0 0) > m.
I
I
I
X?)
X?)
= S(0
> S(0
To check
hypothesis. Hence, by (6) and y*(0
1
0)
I
I
x?)]
x?)]
=> [S(0 0) > S(x
1
=> [3x?'e
C
:
x?'
this last inequality, recall
>
(Proposition
1),
x?)],
I
by Proposition
& S(0
< 00
1
0)
V(m) < W(y*(0
m < n(0
I
0)
<
«>
>
1
S(x'
I
3;
x?')],
I-)
0),
by
and n*(0 0) > m.
I
II
23
Appendix B: Example
We claim in section 3 of the text that Proposition 4 allows us to infer the existence of
managerial
utilities
under which the manager would ask
anticipatory defense, x?, such that S(0
1
0)
> S(x
I
for,
and shareholders approve, a
x?). In this appendix,
level of
we justify our claim with
an example.
In the interests of computational simplicity, two assumptions of the
example:
viz.
the support of
F
is
model
not the whole real line, and lim.y^Q c'(y)
are violated in the
^ 0.
We argued that
both of these assumptions are technical conveniences, and the example here supports our case.
Also, there are choices of the distribution function
assumptions of the
and which are
text,
F and
arbitrarily closely
the cost function c(y) that
do
satisfy all the
approximated by the functional forms
exploited in the example.
F be uniform on
Let
the manager's type is
V(m) =
the closed interval [p, q].
m = [p+q]/2 = 0; and
.
I
=
1^9
=
[x+y]'^'^
As we demonstrate
is 1.
Without
Therefore,
[x?2]/2
-
1;
and assume
L>
4.
Assume
let,
+ m,
whence,
y*(xlx?)= l-x,Vxe
=
X?
p,
y.
Then, 3co/3y
(b.l)
-
3/2,
W(x+y, X? m) = 2-[x+y]l/2
c(y)
We write L = q
Vx e
later,
0,
[0,1]
Vx>l.
the manager's unconstrained (and constrained) utility-maximizing value of
loss of generality, then,
[0, 1],
(b.2)
n*(xlx?) =
(b.3)
an*(x x?)/ax? =
I
l,
0.
we assume x e
[0, 1].
2i«
When
< W(x+y*(xlx?
V(-)
n(x
!•),
Hence, given V(-) < W(x+y*(x
=
+
n(x
(b.5)
an(x x?)/ax? =
X?)
[3
x?), x?
I
+
[3
I
Suppose X? = X =
I
co(0,n*(OIO)IO) =
(b.7)
n(0 0) = 9/16 and 9n(0
(b.8)
co(0,
2-l =
I
0)
We also have, d(x)(\, y
I
0)
I
=
-
[x+y]-^/^
n*(0 0)-m 0)/dxl =
(b.lO)
a(o(0,n(OIO)-mlO)/9x?=4/3.
at
x? = x =
=
W(n(x x?)-m, x?
-
I
I-)
=
0.
so, V(-)
= 3/2 < W(y*(0
I
0),
I-)
=
2.
Hence,
I
0,
(9/16)
aco(0,
I
and
1
0)/ax?
(b.9)
Hence,
V(-)
l,
= 2^(9/16)
x?)/ax?
I
(cf. (6)),
!•),
Then, y*(0 0) =
0.
I
given by
(x?)2].x?/4.
(b.6)
n(0
is
(x?)2]2/i6,
(b.4)
I
x?)
I
.
=
x?.
15/16.
So, at x?
=x=
0:
1,
0:
(b. 1 1 )
Jaco/ax?-f (n)dn
(b.l2)
lco-f(n)dn
=
[ 1
-
4/3]/L
=
-
1/3L,
and,
From
(9),
(b.i3)
Here, CO*
=
taking
=
[1
-
15/16]/L = 1/1 6L.
5=1:
[au/ax?]ix=x? = f(n)-an/ax?-V(-)
co(x,
n*-m
x?) and
I
+
[F(n*)-F(n)]-[laco/ax?-f(n)dn
+
[f(n*)-an*/ax?
+
[l-F(n*)]-aco*/ax?
a = co(x, n-m
I
-
Given 5=1, dU/dxl >
Hence,
co*-an*/ax?
-
io-an/ax?]
f(n)-an/ax?]-jco-f(n)dn
-
f(n*)-an*/ax?-(0*.
x?). Substituting
[au/ax7]lx=x?=0 = -[(l-p)/L-(9/16-p)/L]/3L +
=
+
from
(b.l)
-
(b.l2) gives,
[1 - (l-p)/L]
7/48L]/L.
[q
- 1 -
at
x = x? =
iff
[q
- 1 -
7/48L] >
0.
By
construction,
L = 2q >
0.
25
[aU/ax?]lx=x?=0 >
q2-q-7/96>0
*=>
<» q>1.07.
Therefore, because
L>
But when x? = x =
0, V(-)
Similarly,
(b.l4)
from
4 by assumption, the manager's
< W(y*(0
(10), taking
[9S/ax?]lx=x?
=
0),
I
I-):
hence
utility is
increasing in x at zero
+
Consider x? = x =
=
(b.l5)
V(-)
(b.l6)
n*(l
(b.l7)
and
(b.l8)
[V(-)
Given
(b.l 5),
au(i
1
from
-
f(n)-9n/ax?]-J[n-m]-f(n)dn
=
1)
n(l
l)/ax?
I
-
co(l,
[aU(l
1
Then from
=
1)
I
y*(l
= n(0
from
1,
I
I
1)
l)/ax?]l5^i
I
\n-m\-dn/dx?]
f(n*)-an*/9x?-[n*-m].
= x? =
(b.l2) at x
-
-
-
0, gives:
0.
some
= W(l+y*(l
3/2
I
i)/ax?
1.
prefer
[l-F(n*)]-an*/8x?
(b.l)
lx=x?=0 = [7/16L]2 >
So shareholders too would
anticipatory takeover defense, relative to having none.
y*(l
(b.l),
1), 1
1)
1
I
1)
=
0.
Hence,
!•),
=
1,
from
(b.2)
and
(b.4),
(b.5),
= c(y*(l
1)]
= [au(l
=
f(n)-an/ax?-[v(-)
=
[l-F(n)]-aco*/ax?,
-
I
1))
=
0.
l)/ax?]l5^Q. Hence,
1
from
(9),
w*] + [i-F(n)]-aco*/ax?
by
(b.l 8).
Substituting for ao)*/ax? gives,
au(i ii)/ax? =
o.
Furthermore, by (b.l7), (b.l 8), and
d2u(l
I
l)/ax?2
=
F uniform,
[l-F(n)]-a2(o*/ax?2
= -3-[q-l]/2L <
Therefore, x
= x? =
1 is
1.
5=1.
+ [F(n*)-F(n)]-[F(n*)-F(n)+[n*-m]-an*/8x?
[as/ax?]
5=
5=1:
[f(n*)-an*/ax?
Substituting where appropriate
if
-
f(n).aco*/ax?
0.
an unconstrained
maximum for the manager
(indeed,
it is
a global
26
maximum).
Proceeding similarly,
aS(l
I
=
l)/ax?
we
obtain ftxjm (10),
[l-F(n)]-an*/ax?
f(n)-an/ax?-[n*-m].
-
Substituting,
aS(l ll)/ax? = -l/L <
0.
Therefore, the shareholders' most prefeired value for x
To check that
the manager's unconstrained optimum, x
and substitute from above to
S(l
I
1)
is strictly
=
[1
=
[q-l]/2q
=
less than the manager's.
1, is
in the constraint set,
we
use (10)
find:
(l-p)/L]
-
= S(0I1).
Therefore, x?
=
surely will be.
1
will be
By
Proposition 3, S(0
S(0 0) = [(l-p)/L
I
=
approved by the shareholders
-
(9/16
-
II
0)
p)/L]-[l
[7/32q]2 + [q-l]/2q
>S(1I1).
I
-
> S(l
I
if it is
requested by the manager
1): in particular,
9/16]/L +
[1
-
(l-p)A.]
~
as
it
27
Footnotes.
1.
DeAngelo and Rice (1983) provide
2.
The use of the term
"type" differs
a thorough discussion of these hypotheses.
somewhat from the usual game-theoretic concept:
"type" indicates a skill level, so that managers of the
Further, allowing infinite
same "type" can have
here,
different utilities.
m is only a technical convenience; a claim we justify via the worked
example of Appendix B.
3.
For example, the uniform, normal,
gamma
and exponential distributions
all satisfy this
restriction.
similar to that used in
4.
This structure
5.
This type of "take
context by
6.
The
level of
is
it
or leave
Romer and Rosenthal
it"
Grossman and Hart (1980).
agenda control has been extensively studied
(1978, 1979).
role of the assumption that lim.y_^Q c'(y)
=
0, is to insure that
explicitiy: this
adds very
assertion is vindicated
for every y
7.
>
strictly positive
Notice
littie
and does not substantively
by the example
in
Appendix B,
in
we have
alter
to consider the
our main
which
results.
comer case
Again,
this
— for computational ease — c'(y) =
0.
that,
because lim.y_^Q
the neighborhood of y
8.
some
y will always be chosen by the manager, whatever the value of x. Consequentiy, we can
use the calculus in our analysis. Without the assumption,
1
in a political
=
c'(y)
=
by assumption, we must have c"(y) >
at least in
0.
Although the model
is
not game-theoretic, the notion of shareholders evaluating the
proposal against what would occur
if
they reject the manager's request
is
closely related to the
game-theoretic idea of (subgame) perfecmess (Selten, 1975).
9.
In the
example of Appendix B, shareholders
However, the manager wants
still
more.
in fact
want some positive
level of defense, x.
28
References
DeAngelo.H. and Rice,E., Antitakeover charter amendments and stockholder wealth, J.Financial
Economics
11 (1983) 329-360.
Easterbrook.F. and Fischel,D., Voting in corporate law,
J.Law and Economics 26 (1983)
395-427.
Grossman,S. and Han,0., Takeover bids, the free-rider problem, and the theory of the
corporation, Bell J.Economics, Spring (1980) 42-64.
Jarrell,G.
and Bradley,M., The economic
offers,
Jarrell,G.,
effects of federal
and
state regulations
of cash tender
J.Law and Economics 23 (1980) 371-407.
Poulsen,A. and Davidson,L., Shark repellents and stock prices: the effects of
antitakeover
amendments
since 1980,
mimeo. Office of the Chief Economist,
SEC
(1985).
Linn,S. and McConnell,!.,
on
common
An empirical
investigation of the impact of 'antitakeover'
stock prices, J.Financial
Romer,T. and Rosenthal,H.,
Economics
amendments
11 (1983) 361-399.
Political resource allocation, controlled
agendas and the status quo.
Public Choice 33 (1978) 27-43.
Romer,T. and Rosenthal,H., Bureaucrats vs
by
direct
Selten,R.,
voters:
on
the political
economy of resource
allocation
democracy. Quarterly J.Economics 93 (1979) 563-587.
Reexamination of the perfectoess concept for equilibrium points
games, International J.Game Theory 4 (1975) 25-55.
in extensive
form
991
I
039
'V,\|
Date Due
Lib-26-67
3
TOaO DQ4 OTM 632
Download