Sustaining Collusion via a Fuzzy Trigger

نویسنده

  • RACHAEL E. GOODHUE
چکیده

Probability theory is the standard economic representation of uncertainty, although it is not always an accurate one. Fuzzy logic is an alternative representation that does not require individual beliefs regarding the explicit functional form of uncertainty. This paper applies fuzzy logic to an oligopoly trigger pricing game. The fuzzy trigger pricing game reverses the standard cyclical price war prediction; collusion-sustaining price wars are most likely to occur during times of high demand. The fuzzy model also predicts that markets with relatively volatile prices are more likely to undergo collusion-sustaining price wars. The predictions are consistent with available empirical evidence.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A collusion attack on the fuzzy vault scheme

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

متن کامل

Collusion at the Extensive Margin∗

This paper is the first to examine collusion at the extensive margin (whereby firms collude by avoiding entry into each other’s markets or territories). We demonstrate that such collusion offers distinct predictions for the role of multiple markets in sustaining collusion such as the use of proportionate response enforcement mechanisms, the possibilities of oligopolistic competition with a coll...

متن کامل

Security Threats of Collusion-based Linguistic Fuzzy Trust Model for WSN

In the last few years management of trust and reputation models over distributed systems has been proposed as a novel and accurate way of dealing with some security deficiencies which are inherent to distributed environments. Many models and theories have been designed in order to effective and accurately manage trust and reputation in those environments. Nevertheless, very few of them take int...

متن کامل

On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions*

Malware collusion is a new threat against Android application security. It refers to the scenario where two or more applications interact with each other to perform malicious tasks. Most existing solutions assume the attack model of a standalone malicious application, and thus cannot detect collusion. The objective of this position paper is to point out the need for practical solutions for dete...

متن کامل

How to Eliminate Collusion in Tenders and Auctions, using Game Theory (Determination of Ceiling and Floor Prices)

Governments and firms in accordance to their duties, obliged to inevitably contracts with Individuals and legal entities, especially in auction and tender process. Since, the law of conducting tenders and auctions is lacking efficiency and has major objection, therefore, this has led to the dissemination and development of areas of corruption in these contracts (through collusion). In this pape...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998