An Economic Response to Unsolicited Communication Appendices

نویسنده

  • Marshall W. van Alstyne
چکیده

There exist two ways to increase participant information: the sender can know r, and the recipient can know s. Given the sequence of communication, we first analyze informed senders, then add informed recipients. In the latter, private values become common knowledge. In both models, increasing information increases efficiency relative to a perfect filter. Note that perfect correlation of sender and receiver values (assuming invertibility) is a subset of the common knowledge case. As before, the recipient need not know sender value ex ante but she can infer it ex post . This follows from the fact that knowing either private value and knowing the correlation function is sufficient to compute the other value. In the analysis that follows, we make one additional assumption, that the recipient can credibly commit ex ante to a policy. Since information is known, commitment can be enforced via external reputation systems or a trusted third party. It does not matter how it is enforced as long as the recipient has the proper incentives to execute the policy to which she committed. As in (Rasmusen, 2001) precommitment and reputations improve welfare. We also relax our assumptions on the distribution of communications values. The following mechanisms work regardless of the magnitude of value, the density function

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Spam and Attention Bond Mechanism FAQ

• A one page description that gives an overview of the economics and reasoning behind the design • An Overview of the ABM Protocol which is a step-by-step walk-though of an how it works • An academic treatment entitled An Economic Answer to Unsolicited Communication, which provides a rigorous formal analysis (subscription to the ACM may be required). An earlier version, entitled Information Asy...

متن کامل

Session 1B Security I ISPs: Who Else Can You Trust in the Internet?

The Internet today is the main communication infrastructure for private communication and business. A protection against unsolicited traffic such as DDoS attacks is therefore in the interest of all – but, at the same time, security has to be balanced with privacy issues. This paper proposes a collaborative effort against unsolicited traffic where ISPs and end users collaborate. Users define whi...

متن کامل

ISPs: Who Else Can You Trust in the Internet?

The Internet today is the main communication infrastructure for private communication and business. A protection against unsolicited traffic such as DDoS attacks is therefore in the interest of all – but, at the same time, security has to be balanced with privacy issues. This paper proposes a collaborative effort against unsolicited traffic where ISPs and end users collaborate. Users define whi...

متن کامل

Identification of Most Frequently Occurring Lexis in Body-enhancement Medicinal Unsolicited Bulk e-mails

e-mail has become an important means of electronic communication but the viability of its usage is marred by Unsolicited Bulk e-mail (UBE) messages. UBE consists of many types like pornographic, virus infected and 'cry-for-help' messages as well as fake and fraudulent offers for jobs, winnings and medicines. UBE poses technical and socio-economic challenges to usage of e-mails. To meet this cha...

متن کامل

Shall We Stop All Unsolicited Email Messages?

Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messages are useless to recipients, and dropping all unsolicited messages is not optimal for either the recipient or the sender. Increasing the sender’s cost (with stamps, puzzles or tarpits) has been another approach aimed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006