Market sharing agreements and collusive networks¤ Paul Belle‡ammey Francis Blochz March 18, 2003 Abstract We analyze the formation of reciprocal market sharing agreements by which …rms commit not to enter each other’s territory in oligopolistic markets and procurement auctions. The set of market sharing agreements de…nes a collusive network. We provide a complete characterization of stable collusive networks when …rms and markets are symmetric. Stable networks are formed of complete alliances, of di¤erent sizes, larger than a minimal threshold. Typically, stable networks display fewer agreements than the optimal network for the industry and more agreements than the socially optimal network. When …rms or markets are asymmetric, stable networks may involve incomplete alliances and be underconnected with respect to the social optimum. JEL Classi…cation Numbers: D43, D44 Keywords: market sharing, collusion, economic networks, oligopoly, auctions. ¤ We are grateful to Olivier Compte, Sanjev Goyal, Philippe Jehiel, Mike Riordan and Pierre Regibeau for helpful discussions on the paper. We have greatly bene…tted from the comments of two anonymous referees. We also thank seminar participants at Barcelona, Brown, Columbia, Essex, NYU, Penn, University College London, Warwick and the Vth SCAET (Ischia, 2001) for their comments. y CORE and IAG, Université catholique de Louvain, Belgium, belle‡amme@core.ucl.ac.be. z GREQAM and Ecole Superieure de Mecanique de Marseille (France), bloch@ehess.cnrsmrs.fr 1 1 Introduction Reciprocal market sharing agreements, whereby …rms refrain from entering each other’s territory, have long been held under suspicion by antitrust authorities. In one of the earliest cases litigated under the Sherman Act, the Addyston Pipes Case of 1899, the Supreme Court struck down a group of iron pipe producers which rigged prices on certain markets, and reserved some cities as exclusive domains of one of the seller. (Scherer and Ross, 1990, pp. 318-319.) In recent years, the globalization of markets and the deregulation of industries which used to be regulated on a territorial basis (airlines, local telecommunication services and utilities) have increased the scope for explicit or implicit market sharing agreements. The European Commission has been particularly aware of the potential risk of market sharing, as …rms which used to enjoy monopoly power in some territories seem reluctant to compete on the global European market. In a landmark case against Solvay and ICI, in 1990, the European Commission has established that the two companies had operated a market sharing agreement for many years by con…ning their soda-ash activities to their traditional home markets, namely continental western Europe for Solvay and the United Kingdom for ICI. It was also found that over many years, all the soda-ash producers in Europe accepted and acted upon the ‘home market’ principle, under which each producer limited its sales to the country or countries in which it had established production facilities.1 In the United States, the Telecommunications Act of 1996 was speci…cally designed to encourage regional operators to enter each other’s market. Five years later, it appears that both industries are still dominated by a handful of dominant companies, each with highly clustered regional monopolies.2 1 2 See O¢cial Journal L 152 , 15/06/1991, pp. 1-15. The major providers of cable and local phone service seem to have chosen to merge rather than compete. For example, thanks to a series of mergers, the Regional Bell Operating Companies have shrunk to seven companies in 1996 into just four today. The last of these mergers (between SBC and Ameritech) was subjected to a list of conditions requiring the merged company to open its in-region local markets to competition and to enter local markets outside its 13-state region. The conditions that the Federal Communications Commission imposed made clear how dissatis…ed the agency was with the progress of local competition 2 Antitrust authorities have also reacted to this trend, issuing new guidelines that emphasize market sharing agreements as an alternative form of collusion. For example, in its 1999 merger guidelines, the Irish Competition Authority states that: “As an alternative to a price-…xing cartel, …rms [...] may divide up the country between them and agree not to sell in each other’s designated area. [...] At its simplest, a market-sharing cartel may be no more than an agreement among …rms not to approach each other’s customers or not to sell to those in a particular area. This may involve secretly allocating speci…c territories to one another or agreeing on lists of which customers are to be allocated to which …rm.” (Irish Competition Authority, 1999). In spite of this increasing concern from antitrust authorities, market sharing agreements have not yet been studied in the theoretical literature. In this paper, our objective is to propose a model of market sharing in order to study the stability and welfare implications of market sharing agreements. We consider a uni…ed model, which encompasses di¤erent market settings including oligopolies and auctions. We suppose that each …rm is initially present on one market (its home market) and can enter all foreign markets. We model market sharing agreements as reciprocal agreements not to enter each other’s territory.3 The set of bilateral agreements gives rise to a collusive network among …rms and we draw on recent advances in the literature on strategic network formation (Bala and Goyal (2000), Goyal (1993) and Jackson and Wolinsky (1996)) to characterize stable and e¢cient networks of market sharing agreements. Our …rst contribution is to identify a general condition on pro…t functions, which guarantees that stable networks exist and can be characterized in a simple way. This condition – the log-convexity of pro…ts in the number of competitors on the markets – is satis…ed in most usual models of Cournot oligopoly and under the Telecommunications Act of 1996 (Wilmer, Cutler & Pickering, 1999). 3 In this paper, our focus is on the stability of market sharing agreements, and we assume that these agreements are enforceable. The issue of enforceability of market sharing agreements is an important one, which cannot be answered in traditional models of repeated oligopoly interaction. We leave it for further study. 3 in private value auctions. This condition is stronger than convexity. It states that the rate at which pro…ts decline with the entry of a new competitor is decreasing in the number of active …rms on the market. Our second contribution is to provide a complete characterization of the stable networks in a symmetric model where …rms and markets are identical. We show that in a stable network, …rms form complete components, of di¤erent sizes, and we give an explicit formula for the minimal size of a component. This formula can be applied to compute stable collusive networks in di¤erent oligopoly and auction models. This characterization stems from two general observations on the …rms’ incentives to form market sharing agreements. First, we note that because pro…ts are log-convex, a …rm’s incentive to form an additional agreement is increasing in the number of agreements it has already formed. This “convexity” e¤ect explains why …rms form market sharing agreements with all other …rms in an alliance. It also explains why alliances must reach a minimal size to be stable. Second, we observe that …rms have an incentive to free-ride on the formation of market sharing agreements by other …rms. Free-riding explains why alliances of di¤erent sizes may form, as …rms in smaller groups free-ride on the alliances formed in larger groups and have no incentive to form agreements with …rms in larger alliances. It is instructive to contrast these results with the results which would be obtained if …rms formed multilateral cartel agreements. Because stable networks are formed of complete components, the additional richness of the network structure (enabling …rms to enter di¤erent agreements with di¤erent …rms) is not exploited in our analysis. However, it is important to note that the completeness of network components is an endogenous result of our analysis – as opposed to an exogenous assumption in the traditional cartel literature. Furthermore, our analysis indicates that it may be easier to sustain collusion through bilateral agreements than through multilateral agreements, because a …rm’s incentive to delete a link in the network is weaker than its incentive to leave the cartel and delete all its links at once. Our third contribution is to study the e¢ciency of stable collusive networks. In our model, the e¢cient network from the industry point of view is the complete network, where all markets are local monopolies, while the socially e¢cient 4 network is the empty network, where all …rms participate on all markets. Not surprisingly, because of the …rm’s free-riding incentives, stable collusive networks are under-connected with respect to the e¢cient network from the …rms’ point of view, but over-connected with respect to the socially e¢cient network. This last result indicates that antitrust authorities should strike down market sharing agreements in order to improve social welfare. Our last contribution is to extend the model to asymmetric …rms and markets. While we are unable to obtain a complete characterization of stable networks in that case, we discuss several examples. The …rst example supposes that markets are of di¤erent sizes, and shows that a stable network exists where the …rm on a smaller market forms links to …rms on larger markets, but …rms on larger markets compete with one another. The second example assumes that …rms face an entry cost on foreign markets, and the …nal example considers transportation costs to foreign markets. In both these examples, private incentives to enter may be excessive, and the formation of market sharing agreements may improve welfare by discouraging entry on foreign markets. We now discuss the relationship of our paper with the existing literature. Starting with Stigler (1950)’s seminal contribution, the stability of price-…xing cartels has been extensively studied in the literature. (See Selten (1973) and d’Aspremont et al. (1983) in the case of Cournot oligopolies, Deneckere and Davidson (1985) for a Bertrand model with di¤erentiated commodities and Nocke (1999) for a recent contribution discussing the earlier literature.) In auctions, the study of the stability of bidding rings is much more complex, as it requires the analysis of auctions with asymmetric bidders. Mailath and Zemsky (1991) study stability of bidding rings in the simpler context of secondprice auctions, and Mac Afee and Mac Millan (1992) provide an example in the case of …rst-price auctions.4 The stability of collusive networks bears a close resemblance to the stability of bidding rings and price-…xing cartels. The “convexity e¤ect” in the formation of links is reminiscent of a similar e¤ect found in some models of cartel stability.5 Moreover, as …rms bene…t from the 4 In general …rst-price auctions, Pesendorfer (2000) presents partial characterization results on the equilibrium of an auction with a bidding ring and independent bidders. However, the issue of stability of the bidding ring is not addressed in the model. 5 Mailath and Zemsky (1991) for instance show that in a second price auction, the game in 5 formation of collusive agreements by other …rms, free-riding incentives threaten in the same way the stability of price-…xing cartels, bidding rings and collusive networks. As in the case of cartels and bidding rings, our characterization of stable collusive networks results from the balance between free-riding incentives and the bene…ts of collusion. Recent papers by Goyal and Joshi (2000a) and (2000b), Goyal and Moraga (2001) and Konishi and Furusawa (2002) also apply the theory of economic networks to models of oligopoly. Goyal and Joshi (2000a) and Goyal and Moraga (2001) study the formation of bilateral agreements by which …rms bene…t from synergies and lower their production costs. Goyal and Joshi (2000b) and Furusawa and Konishi (2002) analyze the formation of bilateral trade agreements in an international oligopolistic market. Trade agreements can be interpreted as the converse of maket sharing agreements – trade agreements open up foreign markets by abolishing tari¤s while market sharing agreements lead to the closure of foreign markets. The analyses in Goyal and Joshi (2000b) and Furusawa and Konishi (2002) are not directly comparable to ours, as the objective functions – and hence the values of the network– are di¤erent in the two models. In trade agreement models, a country’s objective function is the sum of consumer and producer surplus and tari¤s, whereas the objective function in our model is simply the …rm’s pro…t. The rest of the paper is organized as follows. In the next section, we describe the general model of market sharing and introduce some basic de…nitions. In Section 3, we fully characterize the stable collusive networks in the symmetric model with identical …rms and markets. In Section 4, we extend our analysis to asymmetric markets and …rms. Section 5 discusses e¢ciency of stable collusive networks, both from the industry and the social point of view. In the last section, we conclude and discuss the limitations of our model. 2 The Model We consider N …rms indexed by i = 1; 2; ::N. We associate to each …rm a market. In the oligopolistic context, the market of …rm i is interpreted as its characteristic function form generated by the formation of bidding rings is convex. 6 home market, and in the context of procurement auctions as a market to which bidder i has priviledged access. For any market i, we denote by ni the number of active …rms on the market. We consider a reduced form pro…t function on each market, which could arise either from oligopolistic interaction or from bidding competition, and which only depends on the number of active …rms on the market. We let ¼ji (ni ) denote the pro…t of …rm j on market i. We suppose that every …rm has an incentive to enter all foreign markets. The only barrier to entry stems from reciprocal market sharing agreements, whereby each …rm refrains from entering on the other …rm’s market. These pairwise agreements are captured by binary variables, gij 2 f0; 1g. If gij = 1; …rms i and j are linked by a market sharing agreement and are not active on each other’s market, and if gij = 0, …rm i is present on market j and …rm j on market i. Total pro…ts of …rm i are given by the sum of the pro…ts …rm i collects on its home market and on all foreign markets for which it has not formed agreements: ¦i = ¼ii (ni ) + X ¼ij (nj ): (1) j;gij =0 2.1 Properties of Pro…t Functions We impose three properties on the pro…t functions. Property 1 Individual pro…ts are decreasing in the number of …rms active on the market, ¼ij (nj ) · ¼ij (nj ¡ 1): Property 2 Individual pro…ts are convex in the number of …rms active on the market, ¼ij (nj ¡ 1) ¡ ¼ij (nj ) ¸ ¼ij (nj ) ¡ ¼ ij (nj + 1): Property 3 Individual pro…ts are log-convex in the number of …rms active on h i h i the market, ¼ij (nj ¡ 1) ¡ ¼ij (nj ) =¼ij (nj ) ¸ ¼ij (nj ) ¡ ¼ij (nj + 1) =¼ij (nj + 1): Property 1 is a very intuitive condition, which guarantees that an increase in the number of competitors reduces the pro…t of each …rm. Property 2 states that this decline in pro…t (measured as a positive number) is a decreasing function of the number of competitors. In other words, as the total number of active …rms on a market increases, adding a new competitor leads to a smaller reduction in 7 pro…t. Property 3 is a stronger condition than Property 2: it indicates that the rate of decline of pro…ts is decreasing in the number of …rms. The percentage of pro…t lost after the addition of a new competitor gets smaller as the number of active …rms on a market increases. The three properties give a precise description of the e¤ects of entry on individual pro…ts: …rms su¤er from the entry of new competitors but competition becomes less harmful, both in absolute and in relative terms, as the number of …rms increases. Figure 1 depicts a pro…t function satisfying the three properties and outlines the di¤erence between convexity and log-convexity.6 π(n) 45° π(1) π(2) π(3) π(1)/π(2) π(n) π(1) π(2) π(3) 1 2 3 n π(2)/π(3) Figure 1: Log-convex pro…t function How restrictive are these three properties? We show below that Property 1 is satis…ed in most familiar models of oligopolies and symmetric auctions. We 6 It is apparent on the right panel of Figure 1 that pro…ts are decreasing and convex in the number of …rms (clearly, ¼ (1) ¡ ¼ (2) > ¼ (2) ¡ ¼ (3) > 0). On the left panel, which maps the function ¼ (n) against itself, we are able to measure the ratio between successive values of the function; as ¼ (1) =¼ (2) > ¼ (2) =¼ (3), we observe that pro…ts are log-convex in the number of …rms. 8 also provide su¢cient conditions on oligopoly models under which the convexity properties are satis…ed, and show that pro…ts are always log-convex in private value procurement auctions. 2.1.1 Cournot Oligopoly with Homogeneous Products Consider a symmetric Cournot oligopoly with homogeneous products. Letting P qi denote the quantity produced by …rm i (i = 1; 2; :::; n) and Q = qi market demand, the Cournot oligopoly is de…ned by an inverse market demand P (Q) and individual cost functions c(qi ): Each …rm’s pro…t on the market is given by ¼i = qi P (Q) ¡ c(qi ): We de…ne the elasticity of the slope of the inverse demand function, E(Q); as E(Q) = QP 00 (Q) : P 0 (Q) Proposition 2.1 In a symmetric Cournot oligopoly with homogeneous products, (i) if costs are increasing and convex and E(Q) > ¡1, individual pro…ts are decreasing in the number of active …rms on the market; (ii) if costs are lin- ear, E(Q) > ¡1 and E 0 (Q) ¸ 0, individual pro…ts are log-convex in the number of active …rms on the market. Proof. See Appendix 7.1. The …rst statement of the proposition is a classical comparative statics result on Cournot oligopolies (termed “quasi-competitiveness” in Amir and Lambson, 2000). Vives (1999, pp. 105-107) gives early references to this result. Statement (ii), providing su¢cient conditions for the log-convexity of individual pro…ts, is a new result. While the conditions are clearly very restrictive, they are satis…ed by speci…c families of inverse demand functions, as shown in Section 3.2. 2.1.2 Auctions Consider now a set of …rms, i = 1; 2; :::; N; participating in procurement auctions. For each auction, …rm i draws a cost parameter ci distributed according to the common distribution function F (ci ) with continuous density f (ci ) over the support [0; C]: Furthermore, suppose that the function J(c) = c + (F (c)=f (c)) 9 is increasing in c for any c 2 [0; C]: For the sake of simplicity, we assume that the buyer sets a reservation price at C, and we consider any auction setting which allocates the contract to the lowest bidder. By the revenue-equivalence theorem (see, e.g., Riley and Samuelson, 1981, Proposition 1, p. 383), the ex ante expected payo¤ of every …rm is independent of the auction rule, and is equal to ¼(n) = 1 (E(c2n ) ¡ E(c1n )); n where cin denotes the i-th order statistic among n draws from the common distribution F . By a simple application of the theory of order statistics (see Mac Afee and Mac Millan, 1988, Lemma 1, p. 103), E(c2n ) = E(J(c1n )): Hence, µ ¶ Z C F (c1n ) 1 = (1 ¡ F (c))n¡1 F (c)dc: ¼(n) = E n f(c1n ) 0 Proposition 2.2 In a private value procurement auction, ex ante individual pro…ts are strictly decreasing and strictly log-convex in the number of active …rms on the market. Proof. See Appendix 7.2. The comparative statics e¤ect of an increase in the number of bidders on individual pro…ts is well-known in auction theory (see Mac Afee and Mac Millan (1987, p. 711) and the references therein). The log-convexity of individual profits in the number of bidders is an original result, providing a strong structural condition on the e¤ect of entry on individual pro…ts. 2.2 Incentives to Form Agreements As a preliminary step, we consider …rms’ incentives to form reciprocal market sharing agreements. Using expression (1), we compute …rm i’s incentive to form an agreement with …rm j as 2 X ¢¦i = 4¼ ii (ni ¡ 1) + k6=j;gik =0 3 2 ¼ik (nk )5 ¡ 4¼ii (ni ) + ¼ij (nj ) + £ ¤ = ¼ii (ni ¡ 1) ¡ ¼ii (ni ) ¡ ¼ij (nj ) ´ Fji (ni ; nj ) : 10 X k6=j;gik =0 3 ¼ik (nk )5 (2) A market sharing agreement between …rms i and j leaves all markets k 6= i; j una¤ected. Hence, …rm i’s incentive to form an agreement with …rm j only depends on the characteristics of markets i and j. Two con‡icting e¤ects are at work: by reducing competition on its home market, …rm i increases its pro…t by ¼ii (ni ¡1)¡¼ii (ni ) ; by losing access to foreign market j, it decreases its pro…t by ¼ij (nj ): The balance between these two e¤ects, noted Fji (ni ; nj ), depends on the number of active …rms on the two markets, ni and nj : As the pro…t function ¼ii is convex, Fji is a decreasing function of ni ; as the pro…t function ¼ij is decreasing, Fji is an increasing function of nj . We conclude that …rm i’s incentive to form an agreement with …rm j is increasing in the number of agreements …rm i has already formed and decreasing in the number of agreements formed by …rm j: The formation of a bilateral agreement requires the approval of both …rms. Hence, an agreement between …rms i and j can only emerge if both incentives are positive: Fji (ni ; nj ) ¸ 0; Fij (nj ; ni ) ¸ 0: These inequalities imply ¼ii (ni ¡ 1) > ¼ij (nj ) and ¼jj (nj ¡ 1) > ¼ji (ni ): (3) When …rms and markets are symmetric (¼ii = ¼ij = ¼jj = ¼ji = ¼), inequalities (3) yield a striking conclusion. If ¼(ni ¡ 1) > ¼(nj ) and ¼(nj ¡ 1) > ¼(ni ), as ¼ is monotonically decreasing, we must have ni = nj : Hence, in a symmetric model, a market sharing agreement can only be concluded among two …rms with the same number of competitors on their home markets! This result is easily understood. If one market had a smaller number of competitors, the …rm on the other market would have no incentive to form an agreement, as the pro…t it makes on the foreign market would already be larger than the pro…t it makes on its home market. If …rms i and j are symmetric ( ¼ii = ¼ji = ¼i and ¼ij = ¼jj = ¼j ) and one market is more pro…table than the other (for example, ¼i (n) > ¼j (n) for all n), inequalities (3) also result in a surprising conclusion. If ¼i (ni ¡ 1) > ¼j (nj ) and ¼j (nj ¡ 1) > ¼ i (ni ); as ¼i and ¼j are monotonically decreasing, the second inequality can only be satis…ed if nj · ni : This result is easily interpreted. A 11 …rm on a less pro…table market only has an incentive to enter into an agreement with a …rm on a more pro…table market if the pro…t it makes on the foreign market is smaller than the pro…t it makes on the home market. Hence, the number of competitors must be larger on the more pro…table market. 2.3 Stable Collusive Networks We now consider the entire set of market sharing agreements among …rms. Market sharing agreements can be interpreted as bilateral links, giving rise to an undirected network g on the set of …rms.7 To study this network, we need to introduce some notations and terminology from graph theory. De…nition 2.1 (i) A network is complete if all …rms are linked (gij = 1 8 i; j; i 6= j) and empty if no …rms are linked (gij = 0 8 i; j): (ii) A …rm i is isolated if gij = 0 8 j 6= i: (iii) A network g is connected if there exists a path linking any two …rms in g. (iv) A component g0 of g is a maximally connected subset of g. We let m(g 0 ) denote the size of a component g 0 , i.e., the number of …rms belonging to g 0 . A component is complete if all …rms inside the component are linked. We borrow our …rst concept of stability from Jackson and Wolinsky (1996)’s general study of strategic networks. Formally, let g ¡ gij (respectively g + gij ) denote the network obtained from g by deleting (adding) the link between …rms i and j. De…nition 2.2 (Jackson and Wolinsky, 1996) A network g is (pairwise) stable if and only if (i) 8i; j 2 N s.t. gij = 1; ¦i (g) ¸ ¦i (g ¡ gij ) and ¦j (g) ¸ ¦j (g ¡ gij ); and (ii) 8i; j 2 N s.t. gij = 0; if ¦i (g + gij ) > ¦i (g) then ¦j (g + gij ) < ¦j (g): Jackson and Wolinsky (1996) do not speci…cally model the process of network formation but propose instead a test of stability in order to eliminate unstable networks. Condition (i) states that whenever an agreement is formed, both parties prefer to keep the agreement in place. Condition (ii) states that there does not exist a pair of unlinked …rms which both have an incentive to 7 We require therefore gij = gji . 12 form an agreement. In our model, the two conditions for pairwise stability rewrite as: (i) 8i; j s.t. gij (ii) 8i; j s.t. gij 8 < F i (n + 1; n + 1) ¸ 0 i j j = 1; j : F (nj + 1; ni + 1) ¸ 0; i 8 < if F i (n ; n ) > 0 i j j = 0; : then F j (nj ; ni ) < 0: (4) (5) i The stability notion of Jackson and Wolinsky (1996) is a local criterion, which considers pairwise links in isolation. It cannot be implemented as an equilibrium of a well-de…ned game of network formation because …rms can only create or sever links one by one. Furthermore, as …rms’ deviations are severely constrained, this concept results in a very weak stability criterion. In order to obtain a stronger stability concept, we allow …rms to form and delete an arbitrary number of links. The concept we propose retains the intuition of Jackson and Wolinsky (1996) while resting on a simple noncooperative model of network formation. We consider the simultaneous linking game introduced by Myerson (1991). Each …rm i chooses the set si of …rms with which it wants to form a link. A link gij is formed if and only if i 2 sj and j 2 si . We let g(s1 ; :::; sn ) denote the graph formed when every …rm i chooses si : The linking game typically admits a large number of Nash equilibria, re‡ecting coordination failures between agents who would bene…t from forming a link but do not form it. In order to eliminate this coordination failure, we adopt a simple re…nement. We say that an equilibrium is (pairwise) strong if it is immune to deviations by coalitions of two …rms. De…nition 2.3 A strategy pro…le fs¤1 ; :::; s¤n g is a pairwise strong Nash equilibrium of the linking game if and only if it is a Nash equilibrium of the game and there does not exist a pair of …rms i; j and strategies si and sj such that ¦i (g(si ; sj ; s¤¡i;j )) ¸ ¦i (g(s¤i ; s¤j ; s¤¡i;j )) and ¦j (g(si ; sj ; s¤¡i;j )) ¸ ¦j (g(s¤i ; s¤j ; s¤¡i;j )) with a strict inequality for one of the two …rms. A network g is strongly (pairwise) stable if and only if there exists a pairwise strong Nash equilibrium of the linking game, fs¤1 ; :::; s¤n g, such that g = g(s¤1 ; :::; s¤n ): Lemma 2.1 Any strongly pairwise stable network is pairwise stable. 13 Proof. The proof is immediate. Suppose that network g is not stable. If gij = 1 and ¦i (g) < ¦i (g ¡ gij ) for some i; j, …rm i would bene…t from a unilateral deviation, choosing si = s¤i nfjg: If gij = 0 , ¦i (g + gij ) > ¦i (g) and ¦j (g + gij ) ¸ ¦j (g), then g is not immune to a joint deviation by the two …rms, si = s¤i [ fjg; sj = s¤j [ fig: 3 Symmetric Firms and Markets In order to characterize stable collusive networks, we focus on the simplest model of competition where …rms and markets are symmetric: ¼ ji (ni ) = ¼(ni ) 8i; j: In this context, it is intuitive to require that monopoly pro…ts exceed total duopoly pro…ts. We thus assume Property 4 ¼ (1) ¸ 2¼ (2) : We …rst derive a general characterization of stable and strongly stable networks. We then apply our results to speci…c examples of oligopoly and procurement auctions. 3.1 General Model As we noted in the previous section, when two …rms have an incentive to form a market sharing agreement, they must have the same number of competitors on their home market. Hence, in a stable network, for any pair of linked …rms i and j, ni = nj . Furthermore, if ni = nj = n, F (n + 1; n + 1) ¸ 0 implies that ¼ (n) ¸ 2¼ (n + 1). By log-convexity of pro…ts, ¼ (n) =¼ (n + 1) is a decreasing function of n. Hence, if F (n + 1; n + 1) ¸ 0, then F (n0 + 1; n0 + 1) ¸ 0 for all n0 < n. It follows that, for any pair of linked …rms, the incentive to form additional agreements is increasing in the number of agreements already formed. We conclude that, in a stable collusive network, if a set of …rms is linked through market sharing agreements, they must all form bilateral agreements among themselves. In other words, components in a stable collusive network have to be complete. 14 Because ¼ (1) ¸ 2¼ (2) and pro…ts are log-convex, there exists a maximal value n¤ for which ¼ (n¤ ) =¼ (n¤ + 1) ¸ 2. We associate to that number n¤ of active …rms on the market the number m¤ of market sharing agreements generating a market of size n¤ : m¤ = N ¡n¤ . Clearly, …rms only have an incentive to form an agreement if they have already formed at least m¤ agreements. Hence, there exits a lower bound on the size of complete components in a stable network. Components in a stable network have to be of size greater than or equal to m¤ + 1. Finally, if di¤erent components exist in a stable network, they must involve di¤erent numbers of …rms. If two components had the same size, by log-convexity of pro…ts, they would have an incentive to merge. Di¤erent components in a stable network must be of di¤erent sizes. The preceding remarks provide necessary conditions on stable collusive networks. The next proposition shows that these conditions are also su¢cient. Proposition 3.1 Let m¤ be the minimal integer such that ¼(N ¡ m¤ )=¼(N ¡ m¤ + 1) ¸ 2. A network g is stable if and only if it can be decomposed into a set of isolated …rms and distinct complete components g1 ; g2 ; :::; gL such that m(gl ) 6= m(gl0 ) 8l 6= l0 ; m(gl ) ¸ m¤ + 1 8l. Furthermore, if m¤ = 1, there is at most one isolated …rm. Proof. We only consider the su¢ciency part. Suppose that the network g can be decomposed into isolated …rms and complete components of di¤erent sizes, with m(gl ) ¸ m¤ + 1 8l. Clearly, as long as m¤ > 1, isolated players have no incentive to create new links. We now consider a link between two players i and j belonging to two components gl and gl0 with m(gl ) < m(gl0 ). Player i, belonging to the smallest component, refuses to form a new link. Finally, as m(gl ) ¸ m¤ + 1 8l, no player inside a component has an incentive to cut a link, and the network is thus stable. If m¤ = 1, any two isolated …rms have an incentive to form a link. Hence, there can be at most one isolated …rm in a stable network. Proposition 3.1 provides a full characterization of the pairwise stable networks when …rms and markets are symmetric. In this simple context, the complete network is always stable. Full collusion can always be sustained through 15 bilateral market sharing agreements. However, note that if m¤ > 1, the empty network is also stable. Hence, while existence of a pairwise stable collusive network is always guaranteed, uniqueness will typically not be obtained. In fact, our characterization puts no restrictions on the number of isolated …rms, free-riding on the formation of agreements by other …rms. Our characterization shows that stable collusive networks exhibit three properties: (i) in a collusive network, all alliances must reach a minimal size; (ii) alliances must involve complete sets of bilateral agreements; and (iii) di¤erent alliances must have di¤erent sizes. We now turn to the analysis of strongly pairwise stable networks. The main di¤erence between stability and strong stability stems from the …rms’ ability to delete multiple links in the linking game underlying strongly stable networks. In our setting, it turns out that a …rm prefers to renege on all its agreements than on a single one. To see this, let h (k) denote a …rm’s incentive to delete k links in a complete component of size m + 1: h (k) = ¼ (N ¡ m + k) + k¼ (N ¡ m + 1) ¡ ¼ (N ¡ m) : We compute h (k + 1) ¡ h (k) = ¼ (N ¡ m + 1) ¡ ¼ (N ¡ m + k) + ¼ (N ¡ m + k + 1) > 0 8k ¸ 1. In a complete component, all …rms obtain the same pro…t. Hence, when deleting one additional link, a …rm gains access to a foreign market which is at least as pro…table as its home market. So, if a …rm initially has an incentive to renege on one agreement, it necessarily has an incentive to renege on all agreements. This implies that the criterion of strong stability typically selects a strict subset of stable collusive networks. Proposition 3.2 A network g is strongly stable if and only if it can be decomposed into a set of isolated …rms and distinct complete components g1 ; g2 ; :::; gL such that (i) ¼(N ¡ m(gl ) + 1) ¸ ¼(N) + (m(gl ) ¡ 1)¼(N ¡ m(gl ) + 2) for all l, and (ii) m(gl ) 6= m(gl0 ) for all l 6= l0 . Furthermore, if m¤ = 1, the network contains at most one isolated …rm. 16 Proof. See Appendix 7.3. The condition on component sizes in strongly stable networks is stronger than the condition for stable networks. In fact, suppose that m satis…es ¼ (N ¡ m + 1) ¸ ¼ (N) + (m ¡ 1) ¼ (N ¡ m + 2) : For m > 2, this implies that ¼ (N ¡ m + 1) > 2¼ (N ¡ m + 2) so that m ¸ m¤ + 1. Because ¼(N ¡ m) ¡ m¼(N ¡ m + 1) is not a monotonic function of m, the condition restricting component sizes in strongly stable networks does not determine an upper bound nor a lower bound on the sizes of components. However, our examples below suggest that components in a strongly stable network cannot be too large. The incentive to free-ride and delete all links at once seems to be higher in larger alliances. Note that if m¤ > 1, the empty network is always strongly stable, which guarantees existence. However, as shown in Example 3.2, a strongly stable network may fail to exist when m¤ = 1. 3.2 Examples Example 3.1 Cournot oligopoly with iso-elastic inverse demand function Let inverse demand be given by P (Q) = 1 ¡ Q® for ® > 0: (If ® = 1, demand is linear; if 0 < ® < 1, demand is convex, and if ® > 1, demand is concave.) Observe that E(Q) = ®¡1: As ® > 0; E(Q)+1 > 0 and furthermore, E 0 (Q) ¸ 0. The su¢cient conditions of Proposition 2.1 are thus satis…ed. Straightforward computations show that ¼(n) = ®n 1¡® ® (n + ®)¡ 1+® ® : In Appendix 7.4, we show that ¼ (n) =¼ (n + 1) ¸ 2 if and only if n = 1, so the only stable networks are the empty and complete networks for a Cournot oligopoly with isoelastic demand. The complete network is strongly stable if and only if ¼(1) ¸ ¼(N) + (N ¡ 1)¼(2): We show in Appendix 7.4 that the latter inequality can never be satis…ed. We conclude that the complete network is never strongly stable, and hence the only strongly stable network is the empty network. 17 In a Cournot market with iso-elastic inverse demand, incentives to share markets only emerge when the number of competitors goes from two to one. Hence, apart from the empty network, the only sustainable collusive network is the complete network where every …rm is a monopolist on its home market. This fully collusive network does not survive free-riding from individual …rms deleting all their links at once. Example 3.2 Cournot oligopoly with exponential inverse demand function Let inverse demand be given by P (Q) = e¡Q . Here, E(Q) = ¡Q, and the su¢cient conditions of Proposition 2.1 are not satis…ed. We can still show directly that the equilibrium pro…t functions are decreasing and log-convex in n. Each …rm’s pro…t function is given by ¼(q) = qe¡Q , which is strictly quasiconcave in q, and attains a maximum at q ¤ = 1: We compute the equilibrium pro…t as ¼(n) = e¡n . Clearly, ¼(n) is a decreasing function of n and log ¼(n) = ¡n is a convex function. Now note that ¼(n)=¼(n + 1) = e > 2; 8n: Hence, any two …rms have an incentive to form a link, and the set of stable networks is very large: any network with complete components of di¤erent sizes and at most one isolated …rm is pairwise stable. Consider now the condition characterizing strongly stable networks: ¼(N ¡ m + 1) ¡ ¼(N) ¡ (m ¡ 1)¼(N ¡ m + 2) ¸ 0: De…ne f (N; m) = e¡N+m¡1 ¡ e¡N ¡ (m ¡ 1)e¡N+m¡2 = e¡N (em¡1 ¡ 1 ¡ (m ¡ 1)em¡2 ): It is easy to check that f(N; m) ¸ 0 if and only if m = 2 or m = 3. We conclude that in strongly stable networks, the sizes of components is either equal to 2 or to 3: The following table characterizes strongly stable networks for N = 2; 3; 4; 5 and 6: For N ¸ 7; no network is strongly stable. 18 Number of …rms Component sizes 2 f2g 3 f3g; f2; 1g 4 f3; 1g 5 f3; 2g 6 f3; 2; 1g In a Cournot market with exponential inverse demand, the rate of decline of pro…ts is very high. Any pair of …rms has an incentive to form an agreement, resulting in an abundance of stable con…gurations. If …rms can renege on all their agreements at once, large alliances become unstable. In a strongly stable collusive network, alliances cannot contain more than three members. This implies that there does not exist a strongly stable network for N ¸ 7. Example 3.3 Procurement auction with uniform distribution Let F (c) = c for all c 2 [0; 1]: We obtain: ¼(n) = 1= [n(n + 1)]. It is easy to see that ¼(2)=¼(3) = 2. Hence, there are three stable network architectures: the complete network, the empty network and a network with one component of size N ¡1 and one isolated bidder. Straightforward computations show that the complete network is strongly stable if and only if N · 3 and that the network with one component of size N ¡ 1 is never strongly stable. Hence, for N > 3, the only strongly stable network is the empty network. In a procurement auction with a uniform distribution, market sharing agreements become pro…table when the number of competitors is reduced from three to two. This implies that apart from the empty network, there are two stable con…gurations: full collusion and a network with one free-rider and N ¡ 1 colluding …rms. For N > 3, these alliances become subject to free-riding of …rms deleting all their links at once. Example 3.4 Procurement auction with exponential distribution Let F (c) = 1 ¡ e¡c for c 2 [0; +1): We obtain ¼(n) = 1 for n > 1 and ¼(1) = +1: n(n ¡ 1) 19 By analogy with the previous example, we see that ¼(3)=¼(4) = 2. Hence, there are four stable network architectures: the complete network, the empty network and networks with components of sizes N ¡ 1 or N ¡ 2. Notice that the complete network is strongly stable, the network with a component of size N ¡ 1 is strongly stable if and only if N · 4 and the network with a component of size N ¡ 2 is never strongly stable. Procurement auctions have a similar structure with an exponential and a uniform distribution. In the exponential case, market sharing agreements become pro…table when the number of competitors is reduced from four to three. This gives rise to a larger number of stable con…gurations, adding one where N ¡ 2 …rms collude, facing two free-riders. Furthermore, when the distribution is exponential, the fully collusive network is immune to deviations by individual bidders reneging on all their agreements at once. 4 Asymmetric Markets and Firms In this section, we depart from the assumption that …rms and markets are symmetric. By extending the analysis beyond the simple symmetric case, we are able to cover more realistic situations but lose the ability to provide a full characterization of stable collusive networks. Instead, we discuss a collection of examples pertaining to situations where (i) …rms are symmetric and markets are not, and (ii) markets are symmetric and incumbent …rms enjoy an advantage. 4.1 Asymmetric Markets Suppose that markets can be ranked according to pro…tability. We have already observed in that setting that, whenever two …rms on asymmetric markets are linked, the …rm with the less pro…table market enters into more agreements than the other. This suggest that incomplete components may form in a stable collusive network, as illustrated in the following example. Example 4.1 Asymmetric markets and Cournot competition. Consider Cournot competition with homogeneous products on three di¤erent markets. Let inverse demand on market i be given by the exponential function 20 Pi (Q) = Ai e¡Q and assume A1 = 1 < A2 < A3 . The three markets can thus be ranked according to pro…tability as ¼ 1 (n) = e¡n < ¼2 (n) = A2 e¡n < ¼3 (n) = A3 e¡n for all n. To emphasize the e¤ects of asymmetric markets, let us …rst recall the results for the symmetric case described in Example 3.2. When the three markets are symmetric, a stable network always exists, and the two stable con…gurations are the complete network and the network with two linked …rms and one isolated …rm. With asymmetric …rms, not only might the latter con…gurations not be stable, but also other con…gurations might be stable; moreover, a stable network might also fail to exist. 1. The complete network is stable only if markets are ‘not too asymmetric’. The precise condition is A3 · e ¡ 1, which ensures that …rm 1 does not want to renege on its agreement with …rm 3. Note that strong stability calls for even less asymmetry: the complete network is strongly stable ¡ ¢ provided that A3 · e2 ¡ 1 =e ¡ A2 < e ¡ 1. The three networks with two linked …rms and one isolated …rm are stable for di¤erent combinations of the parameters. For instance, the network with a single agreement between the …rms on the larger markets (…rms 2 and 3) is stable if and only if A3 · A2 (e ¡ 1). 2. The empty network is stable when markets are ‘su¢ciently asymmetric’. More precisely, one needs (i) A2 > e ¡ 1, and (ii) A3 > A2 (e ¡ 1). These conditions ensure that there is relatively enough pro…t to be made on foreign markets, so that a …rm on a small market does not wish to form an agreement with a …rm on a larger market. 3. An incomplete collusive network might be stable. In particular, if (i) A2 ¸ e= (e ¡ 1) and (ii) A2 (e ¡ 1) < A3 · e (e ¡ 1), the following network is stable: the …rm on the smallest market (…rm 1) forms an agreement with each of the other two …rms, while those two do not form a reciprocal agreement. This network is strongly stable if, in addition, A2 +A3 · e2 ¡1. 4. A stable network might fail to exist. It can be checked that if (i) A2 < e¡1, (ii) A3 > e (e ¡ 1), and (iii) A3 < A2 e (e ¡ 1), then no network is stable. 21 4.2 Incumbency Advantage Firms involved in market sharing agreements often justify market sharing by the presence of large entry costs into foreign markets. In order to analyze the validity of this argument, we consider two models where incumbents bene…t from an advantage in their home market. In the …rst model, …rms face an entry cost in foreign markets. In the second model, …rms incur a unit transportation cost when selling in a foreign market. Entry Costs. Let K denote the entry cost in foreign markets. Suppose K < ¼(N), so that entry costs are not high enough to generate entry barriers. Firm i’s pro…ts on home and foreign markets are given by ¼ii (n) = ¼ (n) and ¼ij (n) = ¼ (n) ¡ K. Hence, …rm i’s incentive to form an agreement with …rm j is equal to Fji (ni ; nj ) = [¼(ni ¡ 1) ¡ ¼(ni )] ¡ ¼(nj ) + K: We …rst note that the presence of entry costs makes market sharing agreements more attractive to …rms. We thus expect that agreements are easier to sustain when …rms bene…t from an incumbency advantage on their home market, and that stable collusive networks exhibit a denser set of links. Second, it is easy to see that if both …rms i and j have an incentive to form an agreement (Fji (ni ; nj ) ¸ 0; Fij (nj ; ni ) ¸ 0), they must have the same number of competi- tors on their home markets: ni = nj : (The presence of a symmetric cost of entry does not modify our earlier observation in the symmetric case.) Finally, we note that even if the gross pro…t function ¼(n) is log-convex, there is no guarantee that net pro…ts on foreign markets be log-convex. The following example illustrates this point, and shows that, when entry costs on foreign markets are high and log-convexity fails, stable collusive networks may have a very di¤erent structure than in the symmetric case. Example 4.2 Linear Cournot model with entry costs Consider a Cournot oligopoly with zero marginal cost and a linear inverse demand P = 10 ¡ Q. In this example, pro…ts on foreign markets are given by ¼(n) ¡ K = 100 ¡ K: (n + 1)2 22 A direct computation shows that @ 2 log[¼(n) ¡ K] @n2 ³ ´ 200 100 ¡ 3K (n + 1)2 =³ : ´2 100 ¡ K (n + 1)2 (n + 1)2 Hence, the pro…t function on foreign markets is not necessarily log-convex, and we cannot characterize stable collusive networks generally. Instead, the following table lists stable and strongly stable collusive networks for di¤erent values of K and N = 6: Fixed cost Stable networks Strongly stable networks K=0 f6g; f1; 1; 1; 1; 1; 1g f1; 1; 1; 1; 1; 1g K = 0:5 f6g; f1; 1; 1; 1; 1; 1g f1; 1; 1; 1; 1; 1g K=1 f6g; f1; 1; 1; 1; 1; 1g K = 1:5 f6g; f5; 1g; f2; 2; 2g f1; 1; 1; 1; 1; 1g K=2 f6g; f5; 1g; f4; 2g; f3; 2; 1g f3; 2; 1g f2; 2; 2g This table re‡ects the fact that market sharing agreements are easier to sustain when the entry cost increases. For low values of the entry cost, stable networks are either complete or empty, and the only strongly stable network is the empty network, as in the baseline model with no entry cost. By contrast, for high values of the entry cost (K = 2), any market sharing agreement is pro…table, and stable networks can be formed with any combination of components of di¤erent sizes. In that case, the strong stability criterion imposes an upper bound on the sizes of components, and only one network survives this criterion. Interestingly, there exists an intermediate case, K = 1:5, where, in a stable collusive network, …rms may form di¤erent components of the same size. This is due to the failure of log-convexity and stands in sharp contrast to the baseline model with no entry cost. Transportation costs. We assume now that …rms incur a unit transportation cost, denoted t > 0, when selling on a foreign market. Example 4.3 Linear Cournot model with transportation costs Consider a homogeneous Cournot market with inverse demand given by P (Q) = 1 ¡ Q, and assume t < 1=2 so that there is no exogenous barrier to entry: The 23 pro…t levels for domestic and foreign …rms are respectively µ ¶ µ ¶ 1 + (n ¡ 1) t 2 1 ¡ 2t 2 ¼d (n) = and ¼f (n) = : n+1 n+1 There exists no general method to compute pairwise stable collusive networks in this example. (In particular, two …rms may be linked but have di¤erent numbers of competitors on their home markets.) We note that, as in the case of …xed entry costs, collusion is easier to sustain when …rms face transportation costs in foreign markets. In our example, this is re‡ected by the following two facts. ² The complete network is always stable. Stability of the complete network requires ¼d (1) ¸ ¼d (2) + ¼f (2) () (1=36) (10t + 1) (1 ¡ 2t) ¸ 0, which is satis…ed since, by assumption, t < 1=2. ² The empty network is stable if and only if transportation costs are low enough: ¼d (N ¡ 1) < ¼d (N) + ¼f (N) () t < N 2 ¡2N¡1 2(2N 2 ¡N¡1) < 1=2: Moreover, in the presence of transportation costs, the sets of stable and strongly stable collusive networks are likely to enlarge. This is illustrated in the simple case with four …rms. In the absence of transportation costs, the situation is as described in Example 3.1: the empty and complete networks are the only stable networks, and the only strongly stable network is the empty network. Simple computations establish two major di¤erences due to positive transportations costs. ² The network with a complete component of three …rms and one isolated …rm is stable if and only if (i) ¼d (2) ¸ ¼d (3) + ¼f (3) () t ¸ 1=14 ' 0:07, and (ii) ¼d (4) + ¼f (2) > ¼d (3) () t < 319=998 ' 0:32; this network is strongly stable if, in addition, ¼d (2) ¸ ¼d (4) + 2¼f (3) () t ¸ 97=674 ' 0:14. ² The complete network is stable for all t and is strongly stable if and only if ¼d (1) ¸ ¼d (4) + 3¼f (2) () t ¸ 37=254 ' 0:15. 24 5 Industry Pro…ts and Social Welfare In this section, we discuss e¢ciency of stable networks. We focus on the symmetric model, and later extend our analysis to the two cases where …rms enjoy an incumbency advantage on their home market. De…ne total industry pro…ts on market i as T (ni ) = ni ¼(ni ) and social surplus as W (ni ). We assume Property 5 Total industry pro…ts are decreasing in the number of …rms active on the market, T (ni ) · T (ni ¡ 1): Property 6 Social surplus is increasing in the number of active …rms on the market, W (ni ) ¸ W (ni ¡ 1): We recall that these two properties are satis…ed in Cournot oligopolies with homogeneous products and symmetric procurement auctions. Proposition 5.1 In a Cournot oligopoly with homogeneous products, if costs are linear and E(Q) > ¡1, total industry pro…ts are decreasing in the number of active …rms on the market and social surplus is increasing in the number of active …rms on the market. In a symmetric procurement auction, total pro…ts are strictly decreasing in the number of active bidders and the expected social surplus is increasing in the number of active bidders. Proof. These results are well-known. References can be found in Vives (1999, pp. 107-109) for Cournot oligopoly models and in Mac Afee and Mac Millan (1987, p. 711) for symmetric auctions. Total industry pro…ts are thus maximized in the complete network, where all …rms are monopolies on their home market. Conversely, social surplus is maximized in the empty network, where all …rms are present on all foreign markets. As stable collusive networks always lie between these two extreme con…gurations, we observe that stable collusive networks are under-connected from the point of view of the industry and over-connected from the point of view of the society.8 8 In many examples, both the complete network (maximizing industry pro…ts) and the empty network (maximizing social surplus) are stable. Our point is that any stable collusive network is either under-connected from the point of view of the industry, or over-connected from the point of view of society, or maybe both. 25 Interestingly, this observation does not hold when …rms enjoy an incumbency advantage on their home market. In the presence of entry costs, it is well known that private incentives to enter may be higher than social incentives, resulting in excessive entry on the market. In Example 4.2, the optimal number of …rms on each market is equal to 6 for K = 0; 5 for K = 0; 5 and K = 1 and 4 for K = 1:5 and K = 2: Hence, in stable (or even strongly stable) collusive networks, the number of …rms on each market may be too large. A similar conclusion holds in the presence of transportation costs: in Example 4.3 with four …rms, the optimal number of …rms on each market is equal to 4 for 0 · t · 9=58, to 3 for 9=58 · t · 7=38, to 2 for 7=38 · t · 5=22, and to 1 for 5=22 · t < 1=2. This suggests that, when …rms enjoy a signi…cant incumbency advantage (through high entry or transportation costs), competition authorities should actually favor the formation of market sharing agreements as a way to discourage entry on foreign markets. 6 Conclusion This paper analyzes the formation of market sharing agreements among …rms in oligopolistic markets and procurement auctions. The set of agreements de…nes a collusive network, and the paper provides a complete characterization of stable collusive networks when …rms and markets are symmetric. Stable networks are formed of complete alliances, of di¤erent sizes, larger than a minimal threshold. Typically, stable networks display fewer agreements than the optimal network for the industry and more agreements than the socially optimal network. When …rms or markets are asymmetric, incomplete alliances can form in stable networks, and stable networks may be under-connected with respect to the social optimum. Our analysis sheds light on the recent wave of market sharing agreements in a number of industries. We …nd that, in order to be stable, alliances must reach a minimum size, and that an alliance grouping all …rms in the industry (as in the chemical industry) is more likely to be stable. When di¤erent alliances form (as in the airline industry), the market sharing agreements must be complete – all …rms in the alliance are linked by bilateral agreements – and di¤erent 26 alliances must have di¤erent sizes, with …rms in smaller alliances free-riding on the formation of agreements by other …rms. Our study also shows unambiguously that, in a symmetric setting, the formation of market sharing alliances is harmful and should be corrected by an adequate antitrust policy. On the other hand, when …rms face entry or transportation costs in foreign markets, the formation of market sharing agreements may be bene…cial, as it helps to correct excessive entry of …rms into foreign markets. While we believe that our analysis provides a useful application of recent developments in the theory of economic networks to a concrete problem in industrial organization, we are aware of two important shortcomings of our study. First, in order to keep the problem tractable, we assume a very simple form of market sharing, where …rms commit not to enter each other’s territory. In reality, market sharing agreements may take much more complex forms, with groups of …rms allocating a …xed set of markets among themselves. This form of market sharing seems to be prevalent in procurement auctions, as exempli…ed by Pesendorfer(2001)’s recent study of Texas school milk contracts. While we believe that our basic intuition on the trade-o¤ between reduction in the number of competitors and access to markets will carry over to more general models of market allocation, a complete analysis of market sharing agreements in more complex settings remains to be done. Second, and most importantly, we suppose that market sharing agreements are enforceable, without explicitly modelling a dynamic framework of interaction. The analysis of the enforceability of market sharing agreements seems to us to be a particularly promising area of research. By forming market sharing agreements, …rms can choose the number of markets on which they will compete, and hence endogenously determine the level of multimarket contact. Hence, as in Bernheim and Whinston (1990), the study of enforceability of market sharing agreements relies on the interplay between collusion and multimarket contact. We plan to tackle this issue in future research. 27 7 Appendix 7.1 Proof of Proposition 2.1 As the other result is well-known, we concentrate on the proof of statement (ii). Di¤erentiating individual pro…ts with respect to qi , we obtain the …rst-order condition: P 0 (Q)qi + P (Q) ¡ c0 (qi ) = 0: As all …rms are identical, we write qi = qj = q 8i; j, so that P 0 (Q)q + P (Q) ¡ c0 (q) = 0: (6) Treating n as a continuous variable and assuming linear costs, we obtain, by an implicit di¤erentiation of Equation (6): q QP 00 (Q) + nP 0 (Q) @q =¡ ; @n n QP 00 (Q) + (n + 1) P 0 (Q) (7) yielding (n ¡ 1) @q q QP 00 (Q) + 2nP 0 (Q) +q = : @n n QP 00 (Q) + (n + 1) P 0 (Q) (8) Rearranging, (n ¡ 1) @q Q (2n + E(Q) +q = 2 @n n (1 + E(Q) + n) Hence, Q2 P 0 (Q)(2n + E(Q)) d¼(n) = : dn n3 (1 + E(Q) + n) Di¤erentiating this expression again with respect to n, we get: d2 ¼(n) A(n) = 6 ; 2 dn n (1 + E(Q) + n)2 where · ¸ dQ dQ dQ2 P 0 (Q) 2 0 0 A(n) = [n (1 + E(Q) + n)] Q P (Q)(2 + E (Q) ) + (2n + E(Q)) dn dn dQ · µ ¶¸ dQ ¡[(2n + E(Q))Q2 P 0 (Q)] 3n2 (1 + E(Q) + n) + n3 1 + E 0 (Q) : dn 3 2 0 As costs are linear, c(q) = c0 (q)q. Hence ¼(n) = q(P (Q)¡c0 (q)) = ¡ Q n2 P (Q). We thus have: d2 ¼(n) ¼(n) ¡ dn2 µ d¼(n) dn ¶2 = ¡Q2 P 0 (Q)[A(n) + n2 (2n + E(Q))2 Q2 P 0 (Q)] : n8 (1 + E(Q) + n)2 (9) 28 Using Equation (9), in order to show that ¼(n) is log-convex, it su¢ces to establish A(n) + n2 (2n + E(Q))2 Q2 P 0 (Q) ¸ 0: Now, dQ dQ2 P 0 (Q) Q2 P 0 (Q)(2 + E(Q)) = : dn dQ n(1 + E(Q) + n) Hence, A(n) = Q2 P 0 (Q)[2n3 (1 + E(Q) + n) + n2 (2n + E(Q))(2 + E(Q)) ¡3n2 (1 + E(Q) + n)(2n + E(Q)) ¡ n3 (2n + E(Q))] dQ 3 [n (1 + E(Q) + n) ¡ n3 (2n + E(Q))] +Q2 P 0 (Q)E 0 (Q) dn = Q2 P 0 (Q)[¡n2 (6n2 + 6nE(Q) + 2E(Q)2 + E(Q)] dQ 3 ¡Q2 P 0 (Q)E 0 (Q) n (n ¡ 1): dn Rearranging, dQ A(n) + n2 (2n + E(Q))2 Q2 P 0 (Q) = ¡Q2 P 0 (Q)n2 [E 0 (Q) n(n ¡ 1) dn ¡ ¢ + E(Q)2 + (2n + 1) E(Q) + 2n2 ]: By assumption, E 0 (Q) ¸ 0. Furthermore, E(Q)2 + (2n + 1) E(Q) + 2n2 > 0 8n ¸ 2 and 8E(Q): Hence, as P 0 (Q) < 0 we obtain A(n) + n2 (2n + E(Q))2 Q2 P 0 (Q) > 0; showing that the pro…t function ¼(n) is log-convex. 7.2 Proof of Proposition 2.2 We concentrate again on the log-convexity of pro…ts, as the other statement of the proposition can be obtained using well-known arguments. A direct computation shows that 0 ¼ (n) = Z C 0 log(1 ¡ F (c))(1 ¡ F (c))n¡1 F (c)dc < 0: To show that pro…ts are log-convex, compute Z C 00 ¼ (n) = (log(1 ¡ F (c))2 (1 ¡ F (c))n¡1 F (c)dc: 0 De…ne p(c) = (1 ¡ F (c))n¡1 F (c) and g(c) = ¡ log(1 ¡ F (c)): The function p is …nite and strictly positive over (0; C) and the function g is …nite and 29 nonnegative over the same set. Hence, we may de…ne, as in Hardy, Littlewood and Polya (1952, p.134), the weighted integral mean of the function g as Mr (g; p) = µR p(c)gr (c)dc R p(c)dc ¶ 1r : By a generalization of Schwartz’s inequality (Theorem 192, p. 143 in Hardy, Littlewood and Polya, 1952), if r < s, then Mr (g; p) < Ms (g; p): Applying this result to the special case r = 1; s = 2, we obtain: µZ ¶2 Z Z p(c)g(c) dc < p(c)dc p(c)g(c)2 dc: Replacing p and g with their expressions: µZ < Z 0 C 0 C log(1 ¡ F (c))(1 ¡ F (c)) n¡1 (1 ¡ F (c)) F (c)dc Z 0 C n¡1 F (c)dc ¶2 (log(1 ¡ F (c))2 (1 ¡ F (c))n¡1 F (c)dc: Hence, ¼0 (n)2 < ¼(n)¼00 (n); showing that individual pro…ts are strictly logconvex in n: 7.3 Proof of Proposition 3.2 Consider a pairwise strong Nash equilibrium s¤ . By Lemma 2.1, g(s¤ ) is a stable network, and can be decomposed into complete components of sizes greater than m¤ . Suppose, by contradiction, that some component gl does not satisfy the condition: ¼(N ¡ m(gl ) + 1) ¸ ¼(N) + (m(gl ) ¡ 1)¼(N ¡ m(gl ) + 2): Then we claim that s¤ cannot be a Nash equilibrium, as any …rm i in gl has a pro…table deviation by choosing s0i = ;: Conversely, suppose that the graph g can be decomposed into a set I of isolated …rms and disjoint complete components g1 ; g2 ; :::; gL such that m(gl ) 6= m(gl0 ) 8l 6= l0 ; and ¼(N ¡ m(gl ) + 1) ¸ ¼(N) + (m(gl ) ¡ 1)¼(N ¡ m(gl ) + 2) 8l. Consider the following strategies for the …rms: If …rm i belongs to a component gl , it announces s¤i = fjjj 2 gl ; j 6= ig: If i is isolated, it announces s¤i = ;. We show that these strategies form a pairwise strong Nash equilibrium. Clearly, no …rm i has an incentive to create a link to a …rm j in another component, as i2 = s¤j . Furthermore, as m(gl ) 6= m(gl0 ) 8l 6= l0 , no pair of …rms has an incentive to create an additional link. Now consider a …rm’s incentive to destroy some 30 links. As ¼(N ¡ m(gl ) + 1) ¸ ¼(N) + (m(gl ) ¡ 1)¼(N ¡ m(gl ) + 2); the …rm cannot bene…t from destroying all its links. By the argument we give in the text, this implies that it cannot bene…t from deleting any subset of links. 7.4 Iso-elastic Inverse Demand Function We claim that in a Cournot model with iso-elastic demand: ¼(1) ¼(2) >2> : ¼(2) ¼(3) The left inequality is immediately obtained as T (1) > T (2). The right inequality is equivalent to log 2 + log ¼(3) ¡ log ¼(2) > 0; which can be rewritten as ¶ µ 3+® > 0: f(®) ´ (2® ¡ 1) log 2 + (1 ¡ ®) log 3 ¡ (1 + ®) log 2+® Immediate computations show that f 00 (®) > 0 and f 0 (0) = 3 log 2 ¡ 2 log 3 + 1=6 > 0. Hence f(®) is a strictly increasing function and, as f(0) = 0, we conclude that f (®) > 0 for all ® 2 (0; +1). Hence, the only stable networks are the empty and complete networks for a Cournot oligopoly with isoelastic demand. Turning now to strongly stable networks, de…ne g(N) = ¼(N)+(N ¡1)¼(2). The second derivative is given by g00 (N) = ¼00 (N). As ¼ is log-convex, it is necessarily convex, so g 00 (N) > 0: Furthermore, evaluating g0 (N) at the lower bound N = 2, we obtain g0 (2) = ¼0 (2) + ¼(2) = ®(1 + ®)2 1¡2® ® (2 + ®)¡ 1+2® ® > 0: Hence g(N) is a strictly increasing function, and, if the complete network is strongly stable for some N ¸ 3; ¼(1) ¸ ¼(3) + 2¼(2): Furthermore, as ¼(3) > ¼(2)=2, we obtain: ¼(1) > (5=2) ¼(2). We …nally show that the latter inequality is never satis…ed. Rewriting it, we obtain: h(®) = ® log 5 + (1 ¡ 2®) log 2 ¡ (1 + ®) log µ 2+® 1+® ¶ < 0: It is easy to see that h00 (®) > 0 and h0 (0) = log 5¡ 3 log 2 + 0:5 > 0: Hence, h(®) is an increasing function and, as h(0) = 0, the inequality cannot be satis…ed for any value of ®. We conclude that the complete network is never strongly stable, and hence the only strongly stable network is the empty network. 31 References [1] Amir, R., Lambson, V.E. (2000). On the E¤ects of Entry in Cournot Markets. Review of Economic Studies 67, 235-254. [2] d’Aspremont C., Jacquemin, A., Gabszewicz, J.J., Weymark, J. (1983). On the Stability of Collusive Price Leadership. Canadian Journal of Economics 16, 17-25. [3] Bala, V., Goyal, S. (2000).A Noncooperative Model of Network Formation, Econometrica 68, 1181-1231. [4] Bernheim, D., M. Whinston (1990). Multimarket Contact and Collusive Behavior, Rand Journal of Economics 21, 1-26. [5] Deneckere, R., Davidson, R. (1985). Incentives to Form Coalitions with Bertrand Competition. Rand Journal of Economics 16, 473-486. [6] Furusawa, T. and Konishi, H. (2002). Free Trade Networks. Mimeo, Department of economics, Boston College. [7] Goyal, S. (1993) Sustainable Communications Networks. Tinbergen Institute Discussion Paper TI 93-250. [8] Goyal, S., Joshi, S. (2000a) Networks of Collaboration in Oligopoly. Working Paper. Erasmus University Rotterdam. [9] Goyal, S., Joshi, S. (2000b). Bilateralism and Free trade. Working paper. Erasmus University Rotterdam. [10] Goyal, S., Moraga, J. L. (2001). R&D Networks. Rand Journal of Economics 32(4), 686-707. [11] Hardy, G.H., Littlewood, J.E., Pólya, G. (1952). Inequalities. Cambridge: Cambridge University Press. [12] Irish Competition Authority (1999). Cartel Watch. Competition Authority Guidelines on Cartels: Detection and Remedies. Available at www.irlgov.ie/compauth/CARTEL.htm 32 [13] Jackson, M.O., Wolinsky, A. (1996). A Strategic Model of Social and Economic Networks. Journal of Economic Theory 71, 44–74. [14] Mailath, G., Zemsky, P. (1991). Collusion in Second Price Auctions with Heterogeneous Bidders. Games and Economic Behavior 3, 467-486. [15] McAfee, P.R., McMillan, J. (1987). Auctions and Bidding. Journal of Economic Literature 25, 699-738. [16] McAfee, P.R., McMillan, J. (1988). Search Mechanisms. Journal of Economic Theory 44, 99-123. [17] McAfee, P.R., McMillan, J. (1992). Bidding Rings. American Economic Review 82, 579-599. [18] Myerson, R.B. (1991). Game Theory: Analysis of Con‡ict. Cambride, MA: Harvard University Press. [19] Nocke, V. (1999).Cartel Stability under Capacity Constraints: The Traditional View Restored STICERD Discussion Paper EI/23, London School of Economics. [20] Pesendorfer, M. (2000). A Study of Collusion in First-Price Auctions. Review of Economic Studies 67, 381-411. [21] Riley, J., Samuelson, W. (1981). Optimal Auctions. American Economic Review. 71, 381-392. [22] Selten, R. (1973). A Simple Model of Imperfect Competition when 4 are Few and 6 are Many. International Journal of Industrial Organization 2, 141-201. [23] Stigler, G. (1950). Monopoly and Oligopoly by Merger. American Economic Review 40, 23-34. [24] Vives, X. (1999). Oligopoly Pricing. Cambridge, MA: MIT Press. [25] Wilmer, Cutler & Pickering (1999). Common Carrier Bureau tentatively agrees on conditions for SBC-Ameritech merger. Telecommunications Law Updates (July). 33