A Note on Partner Heterogeneity and Strict Nash Networks

Abstract

This note extends the studies on the impacts of partner heterogeneity in two-way flow Strict Nash network of (Billand et al., 2011) by allowing for the existence of small information decay. I show that the incorporation of small information decay does not change the results of this aforementioned paper: every Strict Nash network is a minimally connected Bi or branching network. Since the studies on the roles of partner heterogeneity by this aforementioned paper are limited to the assumption that link formation is unilateral, I also propose another extension that studies the roles of partner heterogeneity in a more general model of network formation proposed by (Olaizola and Valenciano, 2015), which allows link formation to be both unilateral and bilateral. I show that the inclusion of partner heterogeneity breaks away a major result in this aforementioned paper: Nash network no longer consists of at most one nontrivial strongly full subnetwork.

Share and Cite:

Charoensook, B. (2022) A Note on Partner Heterogeneity and Strict Nash Networks. Theoretical Economics Letters, 12, 1207-1220. doi: 10.4236/tel.2022.124064.

1. Introduction

Social networks influence social and economic activities because they diffuse information related to these activities. Examples include employment through referral networks for jobs (Granovetter, 2018) and purchasing decision through interpersonal network where product information is exchanged (Katz et al., 2017). This has motivated the literature of network formation, which predicts the patterns of networks that are formed given that agents create links with one another in order to share information and other resources. A large branch of this network formation model is the two-way flow model of noncooperative network formation pioneered by (Bala and Goyal, 2000). As mentioned in (Galeotti et al., 2006), this model can be interpreted in the context of telephone calls, where a link sender unilaterally pays for the link establishment cost in order to acquire nonrival information (e.g., information related to price and quality of consumer products) owned by another agent called link receiver. Once the link is established the agent who receives the link can also acquire the information of the agent who initiates the phone call, hence the term “two-way flow”. This model is the basis that allows several researchers to study how factors such as agent heterogeneity and information decay impact the decisions of agents to form link with one another as well as the resulted shapes of equilibrium networks. For example, Billand et al. (2011) assume partner heterogeneity. That is, link formation cost and value of information are determined by the identity of link receiver1. This form of heterogeneity has become a small branch of literature of its own, encompassing analyses pertaining to equilibrium characterization (Billand et al., 2011), existence of the equilibrium networks (Billand et al., 2012) as well as efficiency (Unlu, 2018).

In this note, I advance this branch of literature in the studies of partner heterogeneity in two-way flow model of network formation by proposing an extended model that allows for existence of small information decay as in (De Jaegher and Kamphorst, 2015). My contributions are twofold. First, it helps understand how the coexistence of partner heterogeneity and information decay impact the shapes of equilibrium networks. Typically, in the literature these two factors are studied in isolation of one another as it helps understand how the equilibrium networks are impacted by each of these factors. This raises the question of how the coexistence of both factors would impact the equilibrium networks. To my knowledge this note is the first work that seeks to answer this question by providing a detailed equilibrium characterization. Quite surprisingly, the addition of small decay assumption to the partner heterogeneity model of (Billand et al., 2011) does not change the external shapes of the equilibrium networks. However, the identities of agents located in the networks may change. In Example 1, I show that an agent who attracts other agents to form links with does not need to be an agent that incurs the lowest link formation cost as in (Billand et al., 2011). Rather, the agent who is chosen as a partner for link formation is the agent that provides an optimal tradeoff between the link formation cost borne by the link sender and the relatively low degree to which information decays, which varies according to the locations of agent in the network.

Another contribution of this note is seen in Example 2 in Discussion section, which extends the present unilateral model with partner heterogeneity by allowing for link formation to be established either unilaterally or bilaterally. My intention here is to study the roles of partner heterogeneity in a more general setting. Inspired by an innovative work of (Olaizola and Valenciano, 2015), a link that is formed unilaterally (weak link) suffers from a small decay while a link that is formed bilaterally suffers no decay (strong link). Thus, my Example 2 becomes an extension of (Olaizola and Valenciano, 2015) by incorporating partner heterogeneity. I show that an important property of Nash network in the model of (Olaizola and Valenciano, 2015), which is such that every Nash network that is minimally connected has at most one non-empty full subgraph consisting of strong links, is violated once partner heterogeneity replaces agent homogeneity. Indeed, to my knowledge this note is the first work that explores the roles of agent heterogeneity in such a general model of network formation2.

This note proceeds as follows. First, I introduce the models and the definitions of Strict Nash networks and Nash networks in the next section. In the Main Result section, I provide a characterization of Strict Nash networks. Subsequently Discussion section shows an example related to (Olaizola and Valenciano, 2015) mentioned above. The last section concludes.

2. The Model

Since this note is an extension of (Billand et al., 2011), most notations will follow this aforementioned paper.

Individual’s strategy: N = { 1 , , n } is the set of all agents. Let i , j N , i j . g i , j = 1 if i forms a link with j or accesses j and g i , j = 0 otherwise. A collection of such decision of i is a strategy of i, which is g i = { g i , j : j N , j i } . Since link formation is unilateral, a strategy profile g = { g i : i N } is, equivalently, a network.

Structure of information: Let g ¯ i , j = 1 if g i , j = 1 or g j , i = 1 or both, and g ¯ i , j = 0 otherwise. We say that an undirected link between i and j exists if g ¯ i , j = 1 . Of course, g ¯ = { g ¯ i , j : i , j N , i j } is called an undirected network.

Value of Information and link formation cost: V i j represents the value of information that i receives from j if information is transmitted perfectly. A value structure is V = { V i j } i j N × N . If V i j = V j for every i N then V is said to satisfy partner heterogeneity (in information value). Similarly, c i j is cost that i bears if he forms a link with j and C = { c i j } i j N × N , i j is the cost structure. If V i j = V j for every i N C is said to satisfy partner heterogeneity (in link formation cost). Throughout this paper, we assume that V and C satisfy partner heterogeneity.

Information transmission and decay: A chain between k and j P ¯ i , j —is defined as a sequence of agents j 0 , j 1 , , j m such that j 0 = j , j m = k and g ¯ j l , j l + 1 = 1 for l = 0 , , m 1 . A path from k to j P i , j —is defined likewise except that g j l , j l + 1 = 1 instead of g ¯ j l , j l + 1 = 1 . If a chain between i and j exists, we sat that i observes j and vice versa. In g, let N i ( g ) be the set of agents that i observes including i himself3. In the paper of (Billand et al., 2011) information transmission is perfect so that if there is a chain between i and j then i receives V i j and j receives V j i . This note extends this aforementioned paper by assuming that information transmission is not perfect. This imperfect transmission is represented by the decay factor σ ( 0,1 ] . Consider two ij-chains, P ¯ 1 i , j and P ¯ 2 i , j . P ¯ 1 i , j is said to be shorter than P ¯ 2 i , j if | P ¯ 1 i , j ( g ) | < | P ¯ 2 i , j ( g ) | . The distance between i and j, d ( i , j ; g ) , is defined as the amount of links in the shortest ij-chain. Similar to (De Jaegher and Kamphorst, 2015) an ex-post information value that i receives from j is σ d ( i , j ; g ) V i j .

Small Decay Assumption: Since an ex-post information value that i receives from j is σ d ( i , j ; g ) V i j , by reducing the distance σ d ( i , j ; g ) an agent i can improve the benefits that he receives from j. To reduce the distance, i can do so by forming a link with an agent that would create a new ij-chain that is shorter than the preexisting ones. However, if information decay is sufficiently low, i.e., σ is sufficiently close to 1, then such an incentive disappears since the benefits from so doing cannot cover the cost c borned by i. This assumption is assumed throughout the paper of (De Jaegher and Kamphorst, 2015) and will be used throughout this note.

Network properties: A network g is a subnetwork of g if g g . Let N ( g ) denotes the set of all agents in g . Let g i j be defined as g with the modification that g i j = 0 and g i ¯ j be defined as g with the modification that g i j = g j i = 0 . A network is minimal if there is at most one chain between any pair of agents. A network is connected if there is at least one chain between any pair of agents. A component of a network is a maximal connected subnetwork. A component is empty if it contains only one agent. In a network g, the information that i receives is I i ( g ) = j N ( g ) \ { i } σ d ( i , j ; g ) V i , j . Suppose that g is minimally connected. Given that g i j = 1 let A i j ( g ) be a subnetwork consisting of links of all agents that i is able to obtain information by accessing j. Let j , k N ( A i j ) , j is said to be better-informed than k if I j ( A i j ) I k ( A i j ) . j is best-informed in A i j if I j ( A i j ) I k ( A i j ) for every k N ( A i j ) 4.

B i and Branching Networks: Let R i ( g ) be the set of all agents that access i and O i ( g ) be the set of all agents that i accesses. The following definitions of B i and Branching Networks are borrowed from (Billand et al., 2011). Consider X N . Let Q X = X { j | there exists a path from j t o j for ever y j X } . If X is a set that is minimal with respect to the property that Q X = N , then X is said to be a contrabasis of N. A contrabasis is an i-point contrabasis if there exists i N such that every j X , j i , accesses i. If i is a point contrabasis of g and | R i | 2 but | R j | < 2 for all j i and j N , g is said to be a B i network. Observe that if a minimally connected B i , then i is a unique multi-link recipient and any link that does not involve i points away from i. A network g is a branching network if there exists a unique agent i such that | R i | = 0 and | R j | 1 for all j i .

The payoffs (as in (Billand et al., 2011)): Let π : 2 be such that π ( x , y ) is strictly increasing in x and strictly decreasing in y. The payoff of player i is given by:

π i ( g ) = π ( j N i ( g ) \ { i } V j , j N i ( g ) \ { i } ) g i , j c i , j (1)

Note that this payoff assumes that information transmission is perfect since the decay factor σ is not included. A special case of this payoff is the so-called linear payoff, which is:

π i L ( g ) = j N i ( g ) \ { i } V j j N i ( g ) \ { i } g i , j c i , j (2)

The payoffs assuming small decay (as in this current note): As an extension of (Billand et al., 2011) that incorporates small decay, the payoff in Equation (1) above becomes:

π i ( g ) = π ( I i ( g ) , j N i ( g ) \ { i } ) (3)

And the payoff in Equation (2) becomes:

π i L ( g ) = I i ( g ) j N i ( g ) \ { i } g i , j c i , j (4)

where (recall that) I i ( g ) = j N i ( g ) \ { i } σ d ( i , j ; g ) V j .

Nash network and strict Nash network: Let g i be a strategy profile of all agents except i so that g i g i = g . If π i ( g i g i ) π i ( g i g i ) for every g i that is a strategy of i then g i is a best response of i. If g i is a best response of i for every i N then g is a Nash network. If every agent’ best response is unique then g is called a Strict Nash network.

3. Main Results

My first proposition corresponds to the first part of (Billand et al., 2011). The only exception is that the proposition below allows for the existence of small decay. All proofs are relegated to the Appendix.

Proposition 1. Suppose that the payoff satisfies Equation (3), small decay is assumed, and value structure and cost structure satisfy partner heterogeneity, SNN is a minimally connected B i or branching network.

By allowing for the presence of small decay, Proposition 2 below extends the second part of Proposition 1 of (Billand et al., 2011): any minimally connected B i or branching network can be supported as SNN.

Proposition 2. Given the linear payoff (Equation (4)), any minimally connected B i or branching network can be supported as SNN by some σ , V and C , where V and C satisfy partner heterogeneity.

A remark is worthmentiong here. While Proposition 1 and 2 above show that the inclusion of small decay does not change the external shape of SNN, identities of agents that receive link in SNN may change. Intuitively, without small decay, an agent j who receives a link from another agent i is the agent that induces the lowest link formation cost in A i j ( g ) . However, once small decay exists such is not necessarily the case. Indeed, even if j induces the highest link formation cost the fact that he possesses a higher amount of information than other agents can make him attractive as a link receiver. Example 1 below illustrates this point (Figure 1).

Example 1. Consider the minimally connected branching network rooted at i below. This network is SNN assuming that the payoff is linear (see Equation (4)), C = { c i = 1 , c j 1 = 1.0197 , c j 2 = c j 3 = c j 4 = 1 } , V = { V i = V j 1 = V j 2 = V j 3 = V j 4 = 1 } . Observe that c j 1 > c j k for k = 2 , 3 , 4 . Hence, accessing j 1 is not a best response of i if no decay is assumed as in (Billand et al., 2011). However, the presence of small decay σ = 0.99 causes i to be better off accessing j 1 rather than j 2 , j 3 or j 4 . Specifically, for σ = 0.99 in A i j 1 we have I j 1 ( A i j 1 ) = 3.97 , I j 2 ( A i j 1 ) = I j 3 ( A i j 1 ) = I j 4 = 3.9502 . That is, j 1 is best-informed in A i j 1 . Let c j 1 = 1.0197 , c j 2 = c j 3 = c j 4 = 1 . Note that while j 1 is relatively more costly to form a link with than j 2 , j 3 , j 4 , the fact that he is best informed compensate for this relatively higher cost. Specifically, I j 1 ( A i j 1 ) I j 1 ( A i j k ) = 0.0198 > c j 1 c j k = 0.0197 for k = 2 , 3 , 4 .

4. Discussion: On the Role of Partner Heterogeneity in a Mixed Model of Network Formation

The purpose of this section is to study the role of partner heterogeneity in a model of network formation that is more general than what is “typically” studied in the literature. Specifically, the roles of agent heterogeneity are studied by assuming either that link formation is unilateral—requiring no mutual consent as in (Bala and Goyal, 2000)—or link formation is bilateral—requiring a mutual consent as (Jackson and Wolinsky, 1996). Note that the subbranch of literature in partner heterogeneity including (Billand et al., 2011), (Billand et al., 2012), (Unlu, 2018) as well as this current note also falls in to the first branch of literature that assumes unilateral link formation. Thus far, there has been no literature that studies the role of agent heterogeneity in a more general setting that encompasses both forms of link formation.

This section intends to break this mold by making use of a mixed model of network formation pioneered by (Olaizola and Valenciano, 2015). This mixed

Figure 1. Example 1.

model assumes that a link incurs no information decay if it is formed bilaterally (both agents pay for the link formation cost, called strong link) and a link incurs a portion of information decay equal to 1 α if it is unilaterally formed (only the link sender pays for the link formation cost, called weak link). My Proposition 3 below extends this mixed model by allowing for the presence of partner heterogeneity in V and C . It shows that a prominent property of Nash network in this mixed model, which is such that every non-empty Nash network5 has at most one connected full subnetwork consisting of strong links or strongly full subnetwork as defined below, disappears once partner heterogeneity is assumed6.

Before I proceed to Proposition 3 the following notations, borrowed with some modification from (Olaizola and Valenciano, 2015), are introduced. A link between i and j is weak if g i j = 1 but g j i = 0 or vice versa. A link between i and j is strong if g i j = 1 and g j i = 1 . We write i j g ( i j ¯ g ) to denote the existence of a weak (strong) link between i and j. Note that i j g also indicates that the link is sponsored by i. We further write i j ˜ g if i j g or i j ¯ g . Let i j ˜ g then A ˜ j i ( g ) is defined as the subnetwork consisting of all agents whose information is sent to i via the link i j ˜ g . I ( A ˜ j i ( g ) ) = l N ( A ˜ j i ( g ) ) α d ( i , l ; g ) V l is the information that i receives from the link i j ˜ .

Let C N . A subnetwork g | c g is said to be a subnetwork induced by C or a full subnetwork if: 1) N ( g | c ) = C and 2) a link exists in g | c if and only if it exists in g. g | c is a weakly full subnetwork of g if for any two nodes i , j C ( i j ) there is a chain between j and i in g, and no subset of N strictly containing C meets this condition. The definition of a strongly full subnetwork is defined likewise, except that every chain between j and i has to consist of strong links.

In terms of information flow, every link that is weak incurs (geometric) information decay equal to 1 α . Every link that is strong incurs no information decay. Thus if V j is the information of j and a chain between i and j consists of k weak links, then i receives α k V j . A shortest chain between i and j is the chain that has smallest amount of weak links compared to other path between i and j. Naturally a distance between i and j is defined as amount of links of the shortest chain between i and j.

A payoff of an agent i in g is:

U i ( g ) = j N i ( g ) \ { i } α d ( i , j ; g ) V j c μ i d ( g )

where μ i d ( g ) = | O i ( g ) | .

Proposition 3. Let i j ˜ , i k ˜ , j l ˜ g and i j ˜ = i j , i k ˜ = i k ¯ , j l ˜ = j l ¯ . If g is Nash then:

( 1 α ) I ( A ˜ k i ) c i ( 1 α ) I ( A ˜ j i ) (5)

and

( 1 α ) I ( A ˜ i k ) c k (6)

Moreover, there exist V and C satisfying partner heterogeneity such that g is Nash and the above two inequalities are satisfied.

Corollary 1. If V and C assume agent homogeneity, then inequalities 5 and 6 cannot be simultaneously satisfied. Consequently, a Nash network contains at most one strongly full subnetwork. On the contrary, if partner heterogeneity in V and C are assumed, there exists a Nash network that consists of more than one strongly connected full subnetwork, which in turn implies that 5 and 6 are satisfied.

The proof for this proposition and its corollary are trivial and hence omitted. Example 2 below, though, illustrates the intuition (Figure 2).

Example 2. Consider the below network, which is a line whose sequence of agents—from left to right—is i k , i i , i j , i l Note that this line has two non-empty strongly full subnetworks, namely i k i i ˜ and i j i l ˜ . We claim that this network is SNN for the following support: V = { V k = 1.01 , V i = 1.02 , V j = 1.03 , V l = 1.04 } , C = { c k = 0.01 , c i = 0.0204 , c j = 0.03 , c l = 0.0104 } , and α = 0.99 .

It is straightforward (yet tedious) to prove that this network is SNN by checking that the above support causes each agent’s existing strategy to give a strictly higher payoff than his every other strategies. To partially verify that this network is SNN, let us verify that 5 and 6 in Proposition X are satisfied. To do so, first observe that c i i has to be sufficiently low that i k is better off accessing i i . Otherwise, the link i i i k ¯ become a weak link. This leads to:

( 1 α ) I ( A ˜ k i ) c i (7)

Iff:

( 1 α ) ( V 2 + α ( V 3 + V 4 ) ) > c 2 (8)

On the contrary, for this network to be Nash c i is required to be sufficiently high. Otherwise, j is better of accessing i, which in turn causes the link between j and i to be strong instead of weak. This leads to:

c i ( 1 α ) I ( A ˜ j i ) (9)

Figure 2. Example 2: a bold link is a strong link. A dotted link is a weak link such that the arrow points towards the link receiver.

Iff:

c i > ( 1 α ) ( V 1 + V 2 ) (10)

Putting inequalities 8 and 10 together we have:

( 1 α ) ( V 2 + α ( V 3 + V 4 ) ) > c i > ( 1 α ) ( V 1 + V 2 ) (11)

Observe that inequality 11 above corresponds to inequality 5 in Proposition 3.

Next, consider c k . For this network to be Nash c k has to also be sufficiently low. Otherwise, i is better off not accessing k, which in turn causes the link between i and k be weak rather than strong. This leads to:

( 1 α ) I ( A ˜ i k ) c k (12)

Iff:

( 1 α ) V 1 c k (13)

Observe that inequality 13 above corresponds to inequality 6 in Proposition 3.

Let us partially check our { V j , c j } satisfy inequalities 11 and 13. For inequality 11:

0.030693 > 0.0204 > 0.0203 (14)

For inequality 13:

0.0101 > 0.01 (15)

However, if the above support { V j , c j } , which is such that the value structure and cost structure satisfy partner heterogeneity, is replaced by value and cost homogeneity as in (Olaizola and Valenciano, 2015) then this network cannot be SNN. To do so we assume V 1 = V 2 = V 3 = V 4 = 1 and c 1 = c 2 = c 3 = c 4 = c , inequality 11 becomes:

( 1 α ) ( 1 + 2 α ) > c > ( 1 α ) 2 (16)

and inequality 13 becomes:

1 α > c (17)

which is impossible since such c cannot exist. What is the intuition? Lemma 1 of (Olaizola and Valenciano, 2015) states that as 1 α > c then we know that even if a link provides an entry to just one agent, then it is still worth making that link strong since c is sufficiently low. Then due to homogeneity assumption we know that if this fact holds true for a link then it holds true for every link in the network, regardless of how the network appears. Of course, this line of reasoning ceases to hold once we assume partner heterogeneity, as partner heterogeneity allows the value of information and link formation cost to vary from one agent to another.

Having shown the above example, this subsection finishes with the following remark.

Remark 1. Partner heterogeneity can cause a Nash network in the general model of network formation proposed by (Olaizola and Valenciano, 2015) to have more than one non-empty strongly full subnetwork.

5. Conclusion

In this paper, I study the roles of Partner Heterogeneity in Strict Nash network by extending the work of (Billand et al., 2011). I extend this work in two ways. First, I incorporate the assumption that a small amount of information decay exists. Interestingly, the inclusion of small decay does not change the results of (Billand et al., 2011): Strict Nash network is either a minimally connected B i or branching network (See Proposition 1 and 2 in this note). A difference, though, is that an agent who is attractive as a link receiver is no longer an agent who induces the lowest link formation cost. Rather, it is an agent who provides a better tradeoff in terms of relatively low link formation cost and relatively high quantity of information. This fact is illustrated in Example 1 in this note.

Second, I study the roles of partner heterogeneity in a more general model of network formation pioneered by (Olaizola and Valenciano, 2015). This model is a “mixed” model of network formation in the sense that link formation is allowed to be both unilateral and bilateral, rather than only unilateral as assumed in (Billand et al., 2011) upon which this note is based. I show that the inclusion of partner heterogeneity in this mixed model of network formation breaks away a primary feature of SNN in this model: SNN no longer has at most non-trivial strongly full subnetwork (See the definition of strongly full subnetwork in Discussion section).

As mentioned, to the knowledge of the author this note is the first attempt in the literature to study the role of agent heterogeneity in a model of network formation that is more general than what is typically studied in the literature, which is to assume that link formation is either unilateral or bilateral. Consequently, it motivates several research questions. These are, for examples, questions on the impacts of agent heterogeneity on the characterization of equilibrium networks and efficient networks, as well as existence of tension between the two with these general frameworks of (Olaizola and Valenciano, 2015) and (Olaizola and Valenciano, 2018). These unanswered questions become further research to be explored.

Appendix

Proof of Propositions

Proof of Proposition 1. The minimality is a result of small decay assumption. For connectedness, we prove by contradiction. I divide into two cases: (i) a component, among multiple components, can be singleton and (ii) a component, among multiple components, can never be a singleton. For (i) the proof follows Lemma 5 of (De Jaegher and Kamphorst, 2015). For (ii), in an SNN g let g c 1 and g c 2 be two non-empty components and let i accesses i in g c 1 and j accesses j in g c 2 . Observe the fact that i chooses his unique best response means that the strategy to accessing i to obtain information from agents g c 1 at the cost of c i is superior to the strategy of removing the link with i and accessing j to obtain information from g c 2 at the cost of c j . That is, accessing i to receive information from g c 1 i i while paying c i gives i a higher payoff than removing the link i i and accessing j to receive information from g c 2 j j while paying c j . Similarly, observe that j’s strategy in g is to access j , which also means that j receives information from g c 2 j j while paying c j . It follows that j is better off following i’s strategy: removing his link with j and accessing i instead.

Next, we turn to prove that a unique non-empty component of SNN is either a minimal B i or branching. The proof here makes use of Lemma 3 and Proposition 1 of (Charoensook, 2019). To do so the following notations from (Charoensook, 2019) are introduced. In a minimally connected network g, a removal of a link g ¯ i j = 1 divides g into two components—one containing i and the other one containing j. These two are denoted by D i ( g i j ¯ ) and D i ( g i j ¯ ) and called anti-viewpoint of i and viewpoint of i respectively. D i ( g i j ¯ ) i x D j ( g i j ¯ ) then denotes a network such that D i ( g i j ¯ ) is jointed with D j ( g i j ¯ ) by suppposing that i accesses x N ( D j ( g i j ¯ ) ) . Next, consider two agents x and y. i is said to prefer x to y or x i y if: (i) there exists j N i ( g ¯ ) such that x , y N ( D j ( g i ¯ j ) ) and (ii) π i ( D i ( g i j ¯ ) i x D j ( g i j ¯ ) ) π i ( D i ( g i j ¯ ) i y D j ( g i j ¯ ) ) . Moreover, if the inequality above is strict, i is said to strictly prefer x to y or x i y . Next, a minimal network satisfies the Partially Consistent Partner Preference (henceforth, PCPP) if, for every k-agent chain whose sequence of agents is enumerated as i 1 , i 2 , , i k 1 , i k with k 4 in this network, either of the following two properties with respect to partner preference holds true: (i) i 2 i 1 i n 1 then i 2 i n i n 1 or (ii) i n 1 i n i 2 then i n 1 i 1 i 2 . Moreover, a two-way flow model is said to satisfy this PCPP condition if every minimal network satisfies the PCPP condition. Using these notations, by Lemma 3 and Proposition 1 of (Charoensook, 2019) it suffices to prove that there exists no k-agent chain i , i , , j , j such that i i j but j j i where k 3 , which we do so onwards (FigureA1).

Without loss of generality consider the network g 1 . In this network consider the chain i 1 , i 2 , i 3 , i 4 . We will show that if i 2 i 1 i 3 then i 2 i 4 i 3 . To do so first note that in g 1 D i 1 ( g 1 i 1 i 2 ¯ ) is a singleton (a component with preceisely one agent), which is agent i 1 . To ease the notational cumbersomeness we denote D i ( g 1 i j ¯ ) by [ i 1 ] 7.

Step 1: First, note that i 2 i 1 i 3 in g 1 if and only if:

π ( I i 1 ( [ i 1 ] i 1 i 2 g 2 ) , c 2 ) π ( I i 1 ( [ i 1 ] i 1 i 3 g 2 ) , c 3 ) (18)

See FigureA2 for an illustration of networks [ i 1 ] i 1 i 2 g 2 and [ i 1 ] i 1 i 3 g 2 . The above inequality leads to:

π ( I i 1 ( [ i 1 ] i 1 i 2 g 2 ) K 1 , c 2 ) π ( I i 1 ( [ i 1 ] i 1 i 3 g 2 ) K 2 , c 3 )

for any 0 < K 1 K 2 < I i 1 ( [ i 1 ] i 1 i 2 g 2 ) , I i ( [ i 1 ] i 1 i 3 g 2 ) , Now if we set K 1 = σ 3 and K 2 = σ 2 we get:

π ( I i 1 ( [ i 1 ] i 1 i 2 g 2 ) σ 3 , c 2 ) π ( I i 1 ( [ i 1 ] i 1 i 3 g 2 ) σ 2 , c 3 )

Observe that σ 3 is the information benefit that i 1 receives from i 4 in I i 1 ( [ i 1 ] i 1 i 2 g 2 ) . Similarly, σ 2 is the information benefit that i 1 receives from i 4 in I i 1 ( [ i 1 ] i 1 i 2 g 3 ) . Thus, the above inequality assumes as if the link i 3 i 4 ¯ is removed from the networks [ i 1 ] i 1 i 2 g 2 and [ i 1 ] i 1 i 2 g 3 . This observation and the fact that g 3 = g 2 i 3 i 4 ¯ allows us to restate the above inequality as:

π ( I i 1 ( ( [ i 1 ] i 1 i 2 g 3 ) , c 2 ) ) π ( I i ( ( [ i 1 ] i 1 i 3 g 3 ) , c 3 ) ) (19)

See FigureA3 for an illustration of networks [ i 1 ] i 1 i 2 g 3 and [ i 1 ] i 1 i 3 g 3 . We further restate the above inequality as:

Figure A1. Networks with six agents.

Figure A2. Two networks as in Equation (18).

Figure A3. Two networks as in Equation (19).

π ( I i 1 + σ I i 2 ( g 3 ) , c 2 ) π ( I i 1 + σ I i 3 ( g 3 ) , c 3 )

iff:

π ( I i 2 ( g 3 ) , c 2 ) π ( I i 3 ( g 3 ) , c 3 )

so that

π ( I i 2 ( g 3 ) + L 1 , c 2 ) π ( I i 3 ( g 3 ) + L 2 , c 3 )

for any L 1 L 2 . Now set L 1 = σ 1 = σ d i 1 i 2 and L 2 = σ 2 = σ d i 1 i 3 we have:

π ( I i 2 ( g 3 ) + σ d i 1 i 2 , c 2 ) π ( I i 3 ( g 3 ) + σ d i 1 i 3 , c 3 )

Since g 4 = g 3 + i 2 i 1 ¯ we know that the above inequality can be restated as:

π ( I i 2 ( g 4 ) , c 2 ) π ( I i 3 ( g 4 ) , c 3 )

so that

π ( σ I i 2 ( g 4 ) + X , c 2 ) π ( σ I i 3 ( g 4 ) + X , c 3 )

Now set X = I i 4 ( D i 4 ( g 1 i 3 i 4 ¯ ) ) the above inequality can be restated as:

π ( σ I i 2 ( g 4 ) + I i 4 ( D i 4 ( g 1 i 3 i 4 ¯ ) ) , c 2 ) π ( σ I i 3 ( g 4 ) + I i 4 ( D i 4 ( g 1 i 3 i 4 ¯ ) ) , c 3 )

Finally, note that g 4 is nothing else but the viewpoint of i 4 via i 3 or D i 3 ( g 1 i 3 i 4 ¯ ) . Note further that σ I i 2 ( g 4 ) on the left-hand side of the inequality above is what i 4 receives if he establishes a link with i 2 in g 4 = D i 3 ( g 1 i 3 i 4 ¯ ) , and σ I i 3 ( g 4 ) on the right-hand side of the inequality above is what i 4 receives if he establishes a link with i 3 in g 4 = D i 3 ( g 1 i 3 i 4 ¯ ) .

Hence, we can restate the above inequality as:

π ( I i 4 ( D i 4 ( g 1 i 3 i 4 ¯ ) i 4 i 2 D i 3 ( g 1 i 3 i 4 ¯ ) ) , c 2 ) π ( I i 4 ( D i 4 ( g 1 i 3 i 4 ¯ ) i 4 i 3 D i 3 ( g 1 i 3 i 4 ¯ ) ) , c 3 )

Iff:

i 2 i 4 i 3 .

Hence, we conclude that i 2 i 1 i 3 i 2 i 4 i 3 in g 1 . This completes our proof. □

Proof of Proposition 2. First, we consider any SNN that is supported by V and C that satisfies partner heterogeneity for σ = 1 . Note that for any x , y N and x , y in the same viewpoint of i it holds true that I x = I y for σ = 1 and lim σ 1 I y I x = 0 . Note further that for σ < 1 in this minimally connected network it holds true that x is preferred to y as a partner if and only if c y c x I y I x where c y c x and I y I x 8. Since c y c x lim σ 1 I y I x = 0 and I is continuous in σ , we conclude that there exists σ _ such that c y c x I y I x —equivalently x is preferred to y—for every σ ( σ _ ,1 ] . □

NOTES

1In the context of telephone call, an interpretation is that some agents possess information whose value is higher than that of others. In terms of call establishment cost, Billand et al. (2012) mentions that “If j is a busy person, then it is difficult to access her. It follows that the time that i spends (the cost that i incurs) to obtain an answer from j will depend on j’s characteristics.”

2Note that there are some discrepancies in terms of notations that I use here and those of (Olaizola and Valenciano, 2015). Specifically the term “component” in (Olaizola and Valenciano, 2015) is equivalent to the term “strongly full subgraph” in this note. “Nash profile” in (Olaizola and Valenciano, 2015) is identical to “Nash network” in this note. I justify and elaborate on these notational discrepancies in Discussion section of this note.

3Following the literature, we assume that i has an entry to his own information.

4These notations are follow (De Jaegher and Kamphorst, 2015).

5Note that (Olaizola and Valenciano, 2015) uses the term Nash profile rather than Nash network as used in this current note, although they have the same meaning—network such that every agent chooses his best response in pure strategy.

6Note that that term “connected full subnetwork consisting of strong links” and “strongly full subnetwork” here have the same meaning as “strong component” in (Olaizola and Valenciano, 2015). The reason for not adopting the same terminology as (Olaizola and Valenciano, 2015) is that (Olaizola and Valenciano, 2015)’s definition of component is different from what is used in this note as well as (Billand et al., 2011) and (Bala and Goyal, 2000). Indeed, the definition of component in (Olaizola and Valenciano, 2015) is precisely the definition of a full subnetwork in this note.

7This proof can easily be generalized for any minimal network and any chain with more than three agents. I leave this to my readers.

8That is, it may be cheaper to form a link with x than with y but connecting to y gives a higher informational quantity relative to connecting to x. However, if the former outweights the latter then x is preferred to y.

Conflicts of Interest

The author declares no conflicts of interest regarding the publication of this paper.

References

[1] Bala, V., & Goyal, S. (2000). A Noncooperative Model of Network Formation. Econometrica, 68, 1181-1229.
https://doi.org/10.1111/1468-0262.00155
[2] Billand, P., Bravard, C., & Sarangi, S. (2011). Strict Nash Networks and Partner Heterogeneity. International Journal of Game Theory, 40, 515-525.
https://doi.org/10.1007/s00182-010-0252-8
[3] Billand, P., Bravard, C., & Sarangi, S. (2012). Existence of Nash Networks and Partner Heterogeneity. Mathematical Social Sciences, 64, 152-158.
https://doi.org/10.1016/j.mathsocsci.2012.01.001
[4] Charoensook, B. (2019). Bi and Branching Strict Nash Networks in Two-Way Flow Models: A Generalized Sufficient Condition. The BE Journal of Theoretical Economics, 20, Article ID: 20180117.
https://doi.org/10.1515/bejte-2018-0117
[5] De Jaegher, K., & Kamphorst, J. (2015). Minimal Two-Way Flow Networks with Small Decay. Journal of Economic Behavior & Organization, 109, 217-239.
https://doi.org/10.1016/j.jebo.2014.10.010
[6] Galeotti, A., Goyal, S., & Kamphorst, J. (2006). Network Formation with Heterogeneous Players. Game and Economic Behavior, 54, 353-372.
https://doi.org/10.1016/j.geb.2005.02.003
[7] Granovetter, M. (2018). Getting a Job: A Study of Contacts and Careers. University of Chicago Press.
[8] Jackson, M. O., & Wolinsky, A. (1996). A Strategic Model of Social and Economic Networks. Journal of Economic Theory, 71, 44-74.
https://doi.org/10.1006/jeth.1996.0108
[9] Katz, E., Lazarsfeld, P. F., & Roper, E. (2017). Personal Influence: The Part Played by People in the Flow of Mass Communications. Routledge.
https://doi.org/10.4324/9781315126234
[10] Olaizola, N., & Valenciano, F. (2015). Unilateral vs. Bilateral Link-Formation: A Transition without Decay. Mathematical Social Sciences, 74, 13-28.
https://doi.org/10.1016/j.mathsocsci.2014.12.002
[11] Olaizola, N., & Valenciano, F. (2018). A Unifying Model of Strategic Network Formation. International Journal of Game Theory, 47, 1033-1063.
https://doi.org/10.1007/s00182-017-0592-8
[12] Unlu, E. (2018). Efficient Networks in Models with Player and Partner Heterogeneity. The Manchester School, 86, 100-118.
https://doi.org/10.1111/manc.12196

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.