Optimal Contracts with Random Auditing

Transcription

Optimal Contracts with Random Auditing
Optimal Contracts with Random Auditing
Andrei Barbos
Department of Economics, University of South Florida, Tampa, FL.
April 16, 2015
Abstract
In this paper we study an optimal contract problem under moral hazard in a principal-agent
framework where contracts are implemented through random auditing. This monitoring instrument reveals the precise action taken by the agent with some nondegenerate probability r,
and otherwise reveals no information. We characterize optimal contracts with random perfect
monitoring under several information structures that allow for moral hazard and adverse selection. We evaluate the e¤ect of the intensity of monitoring, as measured by r, on the value of
the optimal contract. We show that more intense monitoring always increases the value of a
contract when the principal can commit to make payments even if the an evaluation reveals that
the agent took an action not allowed by the terms of the contract. When such commitment is
infeasible and in equilibrium the agent shirks under some realizations of his type, the value of a
contract may decrease in r.
JEL Classi…cation: D82, D86
Keywords: Optimal Contracts, Random Auditing, Commitment.
E-mail : andreibarbos@gmail.com; Address: 4202 East Fowler Ave, CMC 206, Tampa, FL 33620-5500; Phone:
813-974-6514; Fax : 813-974-6510; Website: https://sites.google.com/site/andreibarbos/
1
Introduction
Previous literature that examined optimal contract problems under moral hazard considered situations where the principal observes some public signal that is imperfectly correlated with the agent’s
action (usually the e¤ort exerted). This signal is observed with probability 1 and is employed in the
contract design to provide incentives to the agent. In this paper we examine an alternative and,
to the best of our knowledge, novel scenario, where contracts are implemented through random
perfect monitoring. This monitoring instrument reveals the precise action taken by the agent with
some nondegenerate probability r, and otherwise reveals neither the agent’s action nor any signal
correlated with it, such as a measure of output.
Numerous real-world contracting environments can be captured by this speci…cation of monitoring technology. In many situations, it is costly or infeasible for the employer of a large workforce
to assess the contribution of each worker to the aggregate output or to its quality. Instead, the
employer can provide incentives with a monitoring scheme that evaluates the output of randomly
selected workers.1 Another typical example is that of an institution providing a service whose
quality is determined by its agents’actions. In many such situations, the service provider may not
have the capability to obtain feedback from all customers, but only from a sample of them.
The contribution of this paper is twofold. First, we characterize optimal contracts with random
auditing under several standard information structures that allow for moral hazard and adverse
selection. Second, we examine how the intensity of monitoring, as measured by the probability r,
impacts the value of an optimal contract. We show that a higher value of r increases the value of a
contract if the principal can credibly commit to not void the contract when the agent fails an audit
(we say that the agent fails an audit if the audit reveals that he exerted an action not allowed by
the terms of the contract; otherwise, the agent passes the audit). We show then that a higher value
1
For some real-world examples of speci…c …rms employing this type of monitoring, see Rahman (2012).
2
of r may decrease the value of a contract if the principal cannot make this commitment and the
contract induces shirking under some realizations of a state variable.
We investigate this optimal contracting problem in an agency framework built on several modeling choices. First, the cost incurred by the agent from performing his action (the e¤ort level)
depends on a state of nature which only the agent observes. Thus, the model combines features
of moral hazard, determined by the hidden action of the agent, with adverse selection, determined
by the private information the agent possesses about his cost type. Second, the contract is signed
at an ex-ante stage, before the agent learns his type. Contracts with random auditing can also
be characterized with a more typical interim contracting assumption; the ex-ante speci…cation we
adopt allows examining the impact of the principal’s ability to partially insure the agent against
unfavorable draws of his type that induce shirking, through a commitment to not void the contract
when this shirking is detected. Third, in our baseline speci…cation of the model, we assume that
the principal lacks the ability to make such a commitment. Finally, we assume away pre-play
communication and examine separately the optimal contract when communication is feasible.
We characterize the optimal contract in this setting and compare it with two benchmarks, the
…rst-best contract under full information, and the contract under pure moral hazard with no adverse
selection. Under full information, monitoring plays no role and the contract speci…es a constant
wage that perfectly insures the agent. If the agent is risk neutral over monetary transfers (more
precisely, if his utility function, which is everywhere assumed separable in monetary transfers and
cost of e¤ort, is quasilinear in the transfers), then the …rst-best contract can be implemented under
asymmetric information across all model speci…cations. This implies that with a risk neutral agent,
the intensity of monitoring has no impact on the value of the optimal contract. On the other hand,
if the agent is risk averse and there is moral hazard, the principal needs to solve the usual trade-o¤
between incentives and risk. Contracts under moral hazard specify a constant wage to be paid to
the agent when no audit is performed, which we refer to as a salary, and type-or-action-contingent
3
wages for situations when an audit is performed. When the agent’s cost type is also observable
ex-post with an audit, the action-and-type-contingent wage promised if the agent passes the audit
is higher than the salary for some types - these types receive a reward when they pass an audit
- while for the remaining types, it equals their salary. Thus, conditional on exerting e¤ort, the
agent prefers being audited.2 When the type is not observable ex-post, the action-contingent wage
is higher than the salary for some actions allowed by the terms of the contract, but lower than it
for certain allowed but low levels of e¤ort. Incentive provision with a one-dimensional allocation
space in the presence of moral hazard and adverse selection may thus require that the agent be
sometimes penalized relative to his salary even if he passes an audit.
A second objective of the paper is to examine how the intensity of monitoring impacts the value
of a contract and the role played in this context by a credible commitment of the principal to make
payments even when the agent fails an audit. While this type of commitment should be valuable,
i.e., it should result in a weakly higher value of the contract, it is less clear a priori how it a¤ects
the relationship between the intensity of monitoring and the value of the contract.
For all information structures that we consider, if it is optimal to induce the agent to exert e¤ort
under all potential cost types, implying that an audit is never failed, a higher value of r increases
the value of the contract. On the other hand, when an optimal contract induces shirking for some
types, more frequent monitoring can reduce the value of this contract if the principal cannot make
that commitment. This occurs when r is high and thus the agent is likely to be detected when
shirking, requiring the principal to pay a large risk premium ex-ante. If the principal can commit,
he avails of this tool to reduce the dispersion in the set of possible ex-post wages faced by the
agent and thus to lower the risk premium that needs to be paid. In this case, the increased power
of incentive determined by the higher probability of monitoring renders again the value of the
contract be everywhere increasing in r. In many employment situations, the cost of performing
2
Mookherjee and Png (1989) consider a model that exhibits the same preference of the agent for being audited.
4
observationally identical tasks by a worker may depend on circumstances which are not observed
by the employer or cannot be contracted upon.3 It is well known that in such cases, insuring the
risk-averse workers against high-cost realizations may improve the value of the employment contract
if the employer is approximately risk neutral.4 This article suggests that when such insurance is
not feasible, and thus an employee cannot respond to high-cost realizations by adjusting the e¤ort
level exerted or shirking, a high frequency of monitoring may be suboptimal.
As an extension, we also examine optimal contracts with random auditing when pre-play communication is feasible. In such situations, the principal can require the agent to declare his private
information after he learns it, but before it is determined whether an audit is performed or not. This
information can be employed to adjust the wage paid when an audit is not performed. Unlike the
case where communication is not feasible, the agent is never penalized when an audit is performed
provided that he passes it. Instead, when an audit is passed, some agent types receive a reward,
while other types, for which the salary is su¢ cient to provide incentives to exert e¤ort, receive only
their salary. Similarly to the case of pure moral hazard, the additional dimension on which the
contract terms can be speci…ed when communication is feasible allows providing incentives while
limiting the audit risk that the agent is subjected to.
Our paper contributes to the literature on optimal contracts by considering a novel type of
monitoring technology. The random nature of this technology relates it closest to the stream of
literature that studies the design of optimal contracts with costly state veri…cation. The seminal
paper in this literature is Townsend (1979) who examined deterministic state veri…cation in an
optimal insurance contract problem. Baiman and Demski (1980) allowed for a potentially random
acquisition of an additional informative signal of the agent’s action conditional on any particular
3
For instance, the activity of a …rm may require workers to perform tasks which are observationally identical to an
outside party, but which may incur di¤erent costs on the worker depending on the speci…cs of the particular situation
in which that task is performed. In other cases, the task may be identical across di¤erent situations, but the worker’s
ability may vary thus inducing a variance in the cost of performing that task across di¤erent workers. Finally, in
other cases, the cost of performing a particular task at a given time may depend on the physical or mental state of
the worker at that time or on his personal opportunity cost of the time required for ful…lling that task.
4
See Knight (1921) or Kihlstrom and La¤ont (1979).
5
observed outcome. Border and Sobel (1987) and Mookherjee and Png (1989) considered situations
where the state veri…cation is interpreted as an audit of a disclosure made by the agent regarding an
outcome (his income) which is determined in a stochastic manner by an unobservable action chosen
by the agent. The latter article shows that optimal monitoring requires random veri…cation and,
similarly to a …nding from our paper under certain information structures, that the agent should
not be penalized when an audit reveals that he reported thruthfully. Strausz (2005) studied the
strategic e¤ect of the timing of veri…cation in an agency model, distinguishing between veri…cation
performed during and after the agent takes his action.5 Our paper di¤ers from this literature in
that we consider that the audit reveals the action taken by the agent rather than the state.
The framework is introduced in section 2. In section 3 we characterize the optimal contracts with
random auditing, including the two benchmarks corresponding to the cases of complete information
and of pure moral hazard, respectively. This section is also where we examine the impact that the
intensity of monitoring has on the value of a contract and the role of commitment in this context.
In section 4, we study optimal contracts with communication. Section 5 concludes.
2
The Framework
There are two players, a principal (P) and an agent (A). P owns a …rm and o¤ers A a contract to
work for this …rm in exchange for monetary compensation. A can accept or reject the contract. If
A accepts it and exerts e¤ort e in service of the …rm during the period of the contract, he produces
an output whose value is y(e), where y 0 ( ) > 0 and y 00 ( )
0. This output is entirely appropriated
by P. P is risk neutral, and thus his payo¤ when A exerts e¤ort e and is paid a wage w is y (e)
A’s preferences are separable in wages and e¤ort, and are represented by a utility u(w)
w.
c(s; e).
The function u : R ! R captures A’s preferences over net monetary transfers; we assume u0 ( ) > 0
5
More recent contributions to this literature are Ben-Porath, Dekel, and Lipman (2014) and Mylovanov and
Zapechelnyuk (2014) who study optimal allocation problems with state veri…cation when no transfers are allowed.
6
and u00 ( )
0, and normalize u(0) = 0. The cost for A of exerting e¤ort e is c(s; e), where (i ) s
is a random variable that takes values in [s; s]
R, with a continuous density function f ( ) > 0,
and (ii ) c ( ; ) is a function with c (s; 0) = 0, ce > 0, cee > 0, cs > 0 and ces > 0, for all s 2 [s; s]
and e
0. In the following, as standard in the literature, we frequently refer to s as A’s type. A
does not know his type at the time when he is presented with the contract, but upon accepting the
contract, he observes it before choosing the e¤ort level. The utility of A’s outside option is u. The
functions y ( ), u ( ) and c ( ; ) are assumed to be twice continuously di¤erentiable. We also assume
that the set of feasible e¤ort levels is compact or otherwise that y( ) is bounded on R+ .
P does not directly observe the e¤ort e exerted by A or the output y(e).6 Instead, he owns
a monitoring instrument which allows observing e with probability r 2 (0; 1). With probability
1
r, P does not observe either e or any signal correlated with e. We consider the value of r to be
exogenous and public information.7 Monitoring is random and A does not know at the time when
he chooses the e¤ort level whether or not P will observe it. At the end of the contract period, it
is public information whether or not P performed the audit, and the e¤ort level e when an audit
was performed. Given a set of allowed e¤ort levels by a contract, if P acquires evidence through
an audit that A’s e¤ort level is not in this set, i.e., if A fails an audit, then P can void the contract
and no transfers are made. Unless speci…ed otherwise, we assume that P cannot credibly promise
ex-ante not to void the contract in such circumstances.
P can o¤er contracts with wage schedules that are de…ned contingent on all observables.8 More
precisely, P can o¤er a contract of the form
E; wn ; fw(e)ge2E , where (i ) E
R+ is a set of
allowed e¤ort levels, (ii ) wn is the wage paid to A if no audit is performed, and (iii ) w(e) is the
wage paid if an audit is performed and it reveals that A exerted e¤ort level e 2 E. One can think of
6
In line with the motivating examples from Introduction, we assume that P employs a large number of agents, and
that while he may observe an aggregate output, this carries virtually no information of an individual’s contribution.
7
The value of r can be easily endogenized by assuming a cost of monitoring for the principal that depends on r.
Since we do evaluate later the marginal increase in the value of a contract determined by an increase in r, the optimal
value of r would then be determined by setting this equal to the corresponding marginal cost of increasing r.
8
Two assumptions are made here. First, when an audit is performed, P obtains publicly veri…able evidence of A’s
e¤ort. Second, P can credibly promise di¤erent wages depending on whether or not an audit is performed.
7
wn as a salary, or base wage, o¤ered to the worker as long as he is not caught shirking, and of the
di¤erence w(e)
wn as a wage adjustment implemented when an audit is performed and A passes
it. As we show later, under certain information structures, this wage adjustment is nonnegative,
i.e, it constitutes a reward, but under others, it may be negative for low e¤ort levels.9
We complete the presentation of the framework with several observations. First, we note that
the contract de…ned above is designed on contingencies determined strictly by ex-post observable
outcomes. This implicitly assumes away pre-play communication. However, in principle, P could
also o¤er a contract of the type fe (s) ; w (s) ; wn (s)gs2[s;s] , which requires an explicit disclosure of
s after A learns it, but before he is informed whether or not an audit is performed. P would then
employ this message to adjust the wage paid when there is no audit and thus no observable action.
While situations with pre-play communication do frequently emerge in real world, in many other
employment situations, random monitoring is used precisely so as to reduce the administrative
burden. In this case, requiring all workers to disclose their private information, or equivalently to
select a contract out of a menu, may be administratively demanding and infeasible. We therefore
focus the analysis on contracts without communication, and characterize separately in section 4,
as an extension, the optimal contract when communication is feasible.10
Second, we assumed for simplicity that the lower bound is zero on the set of e¤ort levels that
A may exert and yet not be detected to be shirking in the absence of an audit. This modeling
speci…cation can be modi…ed at the cost of adding some slight complications to have a positive
lower bound on this set, and thus to allow capturing more realistic situations where workers cannot
"shirk in plain view".
Finally, we assumed that P can perfectly measure A’s e¤ort with an audit. This can be relaxed
to assume that an audit only reveals a signal correlated with the e¤ort, as in standard moral hazard
9
While not explicitly modeled here, one can think of this game as a stage play of a repeated game and of the wages
de…ned in the contract as promised continuation values to the agent under various contingencies. We are currently
working on a dynamic version of this model where these speci…cations are explicitly modelled.
10
See, for instance, Melumad and Reichelstein (1989) for a discussion on the value of communication in agencies.
8
problems. Thus, our model is a particular case of a generic principal-agent model where P observes
a signal informative of A’s action only with a nondegenerate probability.
3
Analysis
As benchmarks, we derive …rst the optimal contracts under two alternative scenarios to the richer
model introduced above. First, we elicit the e¢ cient outcome in this framework by examining the
case of full information, i.e., with no adverse selection or moral hazard, where both A’s type s
and action e are contractible upon. Second, we consider the case of pure moral hazard, i.e., with
no adverse selection, where A’s type is observable ex-post when an audit is performed and thus
also contractible upon. In both models we maintain our assumption of an ex-ante participation
constraint for A.11 To simplify the exposition, when studying both benchmarks we focus on the
case where it is pro…table for P to induce all types of A to exert e¤ort. We then consider the
general case where this assumption is dropped when studying the full-‡edged model with moral
hazard and adverse selection.
3.1
The Full-Information Benchmark
When P observes ex-post both A’s type and the e¤ort he exerted, monitoring plays no role. P thus
o¤ers a contract fe0 (s); w0 (s)gs2[s;s] , where (i ) e0 (s) is the e¤ort required from type s, and (ii ) w0 (s)
is the wage promised to type s in exchange.12 The only constraint that P faces is A’s participation
11
Since random auditing plays a role only under moral hazard, we forgo discussing the less interesting benchmark
with adverse selection but no moral hazard.
12
It is implicitly assumed here and in the rest of the paper that such a contract is binding for A after he learns his
type s, and thus we do not need to account for A’s participation constraint at an interim stage.
9
constraint, so the optimal contract under full information is the solution to the problem
max
fe(s) 0;w(s) 0gs2[s;s]
s.t.
Z
s
Z
[u (w(s))
s
[y (e(s))
w(s)] f (s)ds
(1)
s
c(s; e(s))] f (s)ds
u
(2)
s
The next proposition, whose proof is straightforward and thus omitted, elicits the conditions
de…ning the corresponding optimal contract when A is risk averse.13
Proposition 1 Assume u00 (w) < 0 for all w. Also, assume that it is optimal for P to induce all
types of A to exert e¤ ort. The optimal contract under full information is determined by w0 (s) = w0
for all s 2 [s; s] and some w0 2 R+ , (2) satis…ed with equality, and
1
ce (s; e0 (s))
u0 (w0 )
= y 0 (e0 (s))
(3)
Since providing A with incentives to exert e¤ort or reveal information is unnecessary, P insures
A and o¤ers a constant wage across all states. The condition in (3) equates the marginal cost and
marginal bene…t for P of implementing e¤ort. An additional amount of e¤ort
s’s cost by ce (s; e(s)) e; to compensate it, P has to increase A’s wage by
e increases type
1
u0 (w) ce (s; e(s))
e. Since
the return for P from A’s additional e¤ort is y 0 (e(s)) e, P sets e0 (s) so as to satisfy (3).
Note that since e0 (s) varies across types (it decreases in s), the utility delivered ex-post to each
type, u(w0 )
c(s; e0 (s)), varies as well (the e¤ect of s on this utility is ambiguous), implying that
some types of A enjoy ex-post more than their reservation utility u, while others less.
Finally, it is straightforward to see that when A is risk neutral, the optimal e¤ort pro…le is deterRs
mined by ce (s; e0 (s)) = y 0 (e0 (s)), and that any wage pro…le fw0 (s)gs2[s;s] satisfying s w0 (s)f (s)ds =
13
By the boundedness of y( ) and the continuity of the relevant functions, an optimal contract exists. Moreover, it
is unique up to a set of zero measure.
10
u+
3.2
Rs
s
c(s; e0 (s))f (s)ds and w0 (s)
0 for all s 2 [s; s] is optimal.
The Pure Moral Hazard Benchmark
When an audit reveals both the e¤ort level exerted by A and his type s,14 P o¤ers a contract
n
o
w1n ; fe1 (s); w1 (s)gs2[s;s] where for each type s, (i ) w1n is the salary, paid if no audit is performed,
(ii ) e1 (s) is the e¤ort required, and (iii ) w1 (s) is the wage paid if an audit reveals that A exerted at
least e¤ort e1 (s). Since ce > 0, type s of A exerts either e¤ort e1 (s) or no e¤ort. To implement e1 (s),
the contract must thus satisfy the incentive compatibility condition ru(w1 (s)) + (1
c (s; e1 (s))
(1
r) u(w1n )
r) u(w1n ), for any s 2 [s; s]. The optimal contract then solves the problem
max
wn 0;fe(s) 0;w(s) 0gs2[s;s]
s.t. ru(w(s))
Z
Z
s
[y (e(s))
rw(s)] f (s)ds
r) wn
(4)
s
c(s; e(s))
0 for all s 2 [s; s]
s
[ru (w(s))
(1
c (s; e (s))] f (s)ds + (1
r) u (wn )
(5)
u
(6)
s
The next proposition, whose proof is in appendix A1, elicits the conditions that determine the
optimal contract when A is risk averse, and the e¤ect of r on the value of this contract.15 To focus
the exposition, we assumed here that the constraint w1n
0 does not bind and then consider the
generic case when this constraint may bind for the model with moral hazard and adverse selection.
Proposition 2 Assume that u00 (w) < 0, for all w. Also, assume that it is optimal for P to induce
all types of A to exert e¤ ort. The optimal contract under pure moral hazard is determined by (5),
14
An alternative speci…cation of a model with pure moral hazard is one where the type s is observable ex-post
even without an audit, i.e., with probability 1. In line with the discussion from section 2, we focus in this paper on
modeling situations where it is infeasible for P to acquire on a regular basis information about all employees, be that
their e¤ort level or their cost type. We therefore chose the modeling speci…cation as de…ned above.
15
Given proposition 2, the optimal contract can be computed in principle as follows. First, (8) and a binding (5)
determine the pairs (w1 (s); e1 (s)) for any s in the set on which w1 (s) > w1n ; clearly, this set depends on w1n . On the
other hand, (8) determines e1 (s) for s with w1 (s) = w1n also as a function of w1n . Substituting these into the binding
constraint from (6) determines w1n , and then the rest of the contract.
11
(6) satis…ed with equality, and for all s 2 [s; s],
w1 (s)
w1n
0, and = 0 whenever ru(w1 (s))
c(s; e1 (s)) > 0
1
ce (s; e1 (s)) = y 0 (e1 (s))
u0 (w1 (s))
(7)
(8)
The value of the optimal contract is increasing in r.
The participation constraint in (6) is satis…ed with equality; otherwise P can reduce the salary
w1n without a¤ecting (5). (8) equates again, for each type s, the marginal bene…t and marginal
cost for P of implementing additional e¤ort. To understand (7), note that since A is risk averse,
P aims to minimize the wage risk imposed on A, subject to providing the right incentives. If,
contrary to (7), w1 (s) < w1n , then
1
u0 (w1 (s))
<
1
u0 (w1n )
and thus the cost for P of delivering additional
utility to A is lower when done by means of increasing w1 (s) than by that of w1n ; therefore, P can
increase w1 (s) and decrease w1n so that A’s participation constraint in (6) continues to be satis…ed
but with a lower expected wage paid. On the other hand, when w1 (s) is set higher than w1n , the
corresponding risk is imposed on A so as to create incentives to exert e¤ort; this is again done with
a minimum variance in wages, and therefore the incentive constraint in (5) binds, as stated by (7).
As proposition 2 suggests, the optimal contract under pure moral hazard essentially speci…es a
salary w1n to be paid to all types s as long as A is not caught shirking, and a reward w1 (s)
w1n > 0
o¤ered to some types when they pass an audit. As we show in appendix A1, the e¤ort pro…le e1 (s) is
decreasing, the wage pro…le is generically non-monotonic, while the revenue generated by di¤erent
types, y (e1 (s))
rw1 (s)
(1
r) w1n , is decreasing in s. In terms of ex-post experienced utility,
types s with w1 (s) > w1n enjoy less than their reservation utility, while some of the remaining types
enjoy more.16
16
To see this, note that the expected utility delivered to type s, i.e., ru (w1 (s)) + (1 r) u (w1n ) c (s; e1 (s)) equals
(1 r) u (w1n ) for s with w1 (s) > w1n and (5) binding, and is higher than (1 r) u (w1n ) for the rest. Since on average
the utility experienced by A is u, it must be that (1 r) u (w1n ) < u.
12
The following proposition considers the case when A is risk neutral. The result follows imn
o
n
mediately from the fact that there exists a wage pro…le w1 ; fw1 (s)gs2[s;s] that implements the
full-information e¤ort pro…le fe0 (s)gs2[s;s] , while delivering A the same ex-ante expected wage as
under full information.17 Therefore, if A is risk neutral, P can attain the same payo¤ as under full
information. This payo¤ is independent of the intensity of monitoring.
Proposition 3 Assume that u(w) = w, for all w. Then e1 (s) = e0 (s), for all s 2 [s; s]. Moreover,
the value of the optimal contract equals that under full information.
3.3
The Model with Moral Hazard and Adverse Selection
It is straightforward to see that whenever it is optimal for P to induce some particular type to exert
e¤ort, it must be optimal to also do so for all lower cost types. We consider therefore contracts
where P induces types s 2 [s; sb] to exert e¤ort, with the threshold sb 2 [s; s] optimally chosen by
P. To simplify the exposition, we implicitly assume in most of the ensuing analysis a set of model
parameters such that in the corresponding optimal contract, the salary wn is nonnegative. We
then present in proposition 15 the conditions de…ning the optimal contract when we allow for the
nonegativity constraint on wn to potentially bind.18
By the Revelation Principle, one can think of P’s problem as that of selectn
o
ing an optimal contract sb 2 [s; s]; wn ; fe (s); w (s)gs2[s;bs] that extracts A’s private information
Principal’s Problem
from types in the set [s; sb], induces each type s 2 [s; sb] to exert e¤ort e (s), and the types in (b
s; s]
17
For instance, the wage schedule de…ned by w1 (s) = r1 c(s; e0 (s)) for all s, and w1n = 1 u r satis…es (5) and (6),
Rs
Rs
and thus implements fe0 (s)gs2[s;s] . Moreover, s [rw1 (s) + (1 r) w1n ] f (s)ds = u + s [c(s; e0 (s))] f (s)ds. Thus A’s
expected wage equals that under full information implying that this contract is optimal since its value attains the
theoretical upper bound, the value under full information.
18
Note here that (11) from P’s problem ensures that in any incentive compatible contract, w(s) > 0 for all s 2 [s; sb].
13
to shirk. The optimal contract is thus the solution to the problem
max
sb2[s;s];wn
0;fe(s) 0;w(s) 0gs2[s;b
s]
Z
s
sb
[y (e(s))
s.t. s 2 arg max [ru (w(e
s))
se2[s;b
s]
ru (w(s))
c (s; e (s))
max [ru (w(e
s))
Z
s
se2[s;b
s]
sb
[ru (w(s))
rw(s)] f (s)ds
r) wn
(1
c (s; e (e
s))] , for all s 2 [s; sb]
0, for all s 2 [s; sb]
c (s; e (e
s))]
0, for all s 2 (b
s; s]
c (s; e (s))] f (s)ds + (1
r) u (wn )
(9)
(10)
(11)
(12)
u.
(13)
where (10) is the incentive compatibility condition that induces types in [s; sb] to truthfully reveal
themselves, while (12) induces types in (b
s; s] to shirk rather than exert an e¤ort level speci…ed for
one of the types in [s; sb]. While (10) is a somewhat standard incentive compatibility condition under
adverse selection, the speci…c forms of (11) and (12) di¤er from other types of incentive compatibility
constraints under moral hazard from the literature and are determined by the particular type of
monitoring technology (random perfect monitoring) that we examine here.
The following lemma implies that we can replace (11) and (12) with the weaker condition from
(14) in the above problem.
Lemma 4 Any contract that satis…es (10), will satisfy (11) and (12) if and only if
ru (w(b
s))
c (b
s; e (b
s))
0, and = 0 whenever sb < s.
(14)
Proof. Consider …rst the case when sb < s. We assume throughout that (10) is satis…ed and start by
showing that then (14) implies (11) and (12). Note …rst that ru (w(s))
c (s; e (b
s))
ru (w(b
s))
the second by s
c (s; e (s))
ru (w(b
s))
c (b
s; e (b
s)) for all s 2 [s; sb], where the …rst inequality is implied by (10) and
sb. Therefore, (14) implies (11). Next, since whenever s
14
sb, we have ru (w(e
s))
c (s; e (e
s))
ru (w(e
s))
s))
max ru (w(e
s]
se2[s;b
s))
c (b
s; e (e
s)) for any se 2 [s; sb], it follows that max ru (w(e
c (b
s; e (e
s)) = ru (w(b
s))
c (s; e (e
s))
s]
se2[s;b
c (b
s; e (b
s)), where the equality follows from (10). Thus,
(14) implies (12). For the converse, note that (11) immediately implies ru (w(b
s))
Assuming by contradiction that ru (w(b
s))
c (b
s; e (b
s))
0.
c (b
s; e (b
s)) > 0, by the continuity of c ( ) in s, there
exists " > 0 such that for all s 2 (b
s; sb + "), we have ru (w(b
s))
c (s; e (b
s)) > 0, which contradicts
(12). When sb = s, then (12) is automatically satis…ed, while from the above argument, it is clear
that (11) is satis…ed if and only if ru (w(b
s))
c (b
s; e (b
s))
0.
To solve for the optimal contract, we employ the standard First-Order Approach. Lemma 5
validates this approach in the current framework by showing the equivalence between the incentive
compatibility of a contract with respect to truthful type revelation, on the one hand, and the …rst
order condition of A’s problem in (10), plus the monotonicity of the e¤ort pro…le e(s), on the other.
Its proof, which builds on a standard strategy in the literature, is presented in appendix A2.
Lemma 5 A contract induces truthful type revelation for all s 2 [s; sb] if and only if
e0 (s)
0 a.e. s 2 [s; sb]
ru0 (w(s)) w0 (s) = ce (s; e(s))e0 (s) a.e. s 2 [s; sb]
(15)
(16)
To keep the exposition in the main text simple we will ignore the monotonicity constraint in
(15) and solve the relaxed problem, as de…ned by (9), (13), (14) and (16). We present the analysis
of the optimal contract problem for the case when the monotonicity constraint from (15) binds in
appendix A6. Note also at this point that (15) and (16) imply that in any incentive compatible
contract w0 (s)
0 (and also that w0 (s) < 0 whenever e0 (s) < 0).
Finally, given our assumption that wn
0 does not bind, the participation constraint in (13)
must bind at optimum since otherwise wn can be reduced to increase the value of the contract. We
consider therefore in the following that (13) is satis…ed with equality.
15
Optimal Control Approach We consider …rst the case where A is risk averse. To solve P’s
problem we employ methods from optimal control theory. We …rst recast the problem in terms
of induced utilities un
u (wn ) and u(s)
u (w (s)), for s 2 [s; sb]; these utilities will replace
the respective contingent wages as P’s choice variables. By denoting the inverse utility function
h
u
1,
de…ned on the range of the function u, we have that wn = h(un ) and w (s) = h (u (s)).19
s)
Under these transformations, (10) becomes s 2 arg max [ru (e
c (s; e (e
s))], and so, under the First
s]
se2[s;b
Order Approach, the incentive compatibility condition in (16) is ru0 (s) = ce (s; e (s)) e0 (s). Given
this, the control variable in the optimal control problem is x(s)
e0 (s), while the state variables
are e(s) and u(s). In addition, to account for the participation condition in (13), we introduce a
new state variable
v (s)
Z
s
[ru ( )
c ( ; e ( ))] f ( )d
(17)
s
and rewrite the binding constraint in (13) as the transversality condition v (b
s) = un
u (1
r) un .
The other transversality condition on v is v (s) = 0. There are no transversality conditions on the
two remaining state variables, e and u.
We solve for the optimal contract in two steps. First, for any …xed value of un , we solve an
optimal control problem where the decision variables are sb and fx(s)gs2[s;bs] . In the second step, we
maximize the resulting optimal value function with respect to un , as a standard static optimization
19
This transformation requires the additional assumption that for every e¤ort level there exists a wage such that
the participation constraint of the agent is satis…ed (see Bolton and Dewatripont (2005) pp. 154.)
16
problem. The optimal control problem in the …rst step is
max
sb2[s;s];fx(s)gs2[s;b
s]
Z
s
sb
[y (e(s))
rh (u(s))] f (s)ds
s.t. e0 (s) = x(s)
(19)
1
u0 (s) = ce (s; e (s)) x (s)
r
(20)
v 0 (s) = [ru (s)
(21)
c (s; e (s))] f (s)
v (s) = 0; v (b
s) = un
ru (b
s)
(18)
c (b
s; e (b
s))
0 and = 0 if sb < s
(22)
(23)
Current existence theorems for solutions of optimal control problems do not yield the complete
set of properties of the solution to the above problem required in the ensuing analysis. We therefore
make assumption 7 presented below in the following. Part (i ) of the assumption can alternatively be
derived as an implication of some su¢ cient boundness conditions on cee and ces .20 Part (ii ) ensures
that the solution for the optimal cuto¤ sb is determined by the standard in the literature (equality)
condition from (33). Part (iii ) ensures that un is determined optimally by a standard …rst-order
condition and that the Dynamic Envelope Theorem has the standard form. The superscript sb elicits
the fact that the respective trajectory is the solution corresponding to a given cuto¤ sb.
(1)
De…nition 6 We say a function is Cp if it is continuous and piecewise continuously di¤ erentiable.
Assumption 7 (Existence and Smoothness) (i) For any …xed sb, there exists a solution to
20
The two Filipov-Cesari type existence theorems that could potentially be applied to a situation where the Hamiltonian is linear in the control variable and the control has an unbounded support are presented in section 11.C on
page 392 in Cesari (1983). Theorem 11.4.vii does not apply as stated since none of the growth conditions are satis…ed.
However, these growth conditions are employed in the proof of the theorem to conclude that the value function of the
corresponding optimization problem is bounded. In our case, for any …xed value of sb, the boundedness follows from
that fact that the value is lower than that of the relaxed problem where conditions (19), (20) and (23) are dropped
and r = 1, i.e., by the value of the contract under full information, which is …nite. The theorem can then be applied
under the additional assumptions that cee and ces are bounded, which are used to infer the required properties on
what the theorem in Cesari (1983) denotes by A0 (t; x) and B(t; x).
17
(18)-(23) with the corresponding state variables esb(s); usb(s)
(1)
s2[s;b
s]
being Cp
functions of s. (ii)
(1)
The functions sb ! esb(s) and sb ! usb(s) are Cp for all s 2 [s; s]. (iii) The optimal value of problem
(18)-(23) is continuously di¤ erentiable as a function of un and of r.
The Hamiltonian associated with the problem (18)-(23) is
H (e; u; v; x;
1;
2;
3 ; s)
[y (e)
rh (u)] f (s) +
1x +
2
1
ce (s; e) x +
r
3 [ru
c (s; e)] f (s) (24)
Since this Hamiltonian is linear in the control variable x, while the domain of x is unbounded,21 a
solution to this problem necessarily involves a so-called singular control, i.e., it must satisfy
(1)
for all s.22 By the Pontryagin’s Maximum Principle,23 there exist Cp
3 (s),
functions
1 (s),
@H
@x
=0
2 (s)
and
and a scalar , such that the following conditions are necessarily satis…ed at the optimum
21
Recall that we are solving the relaxed problem where we drop the monotonicity condition in (15) and thus the
domain is R. If instead we incorporate that condition, the solution may involve a so-called bang-singular-bang control,
= 0 when x(s) < 0, and @H
> 0 when x(s) = 0. See appendix A5 for the details.
with @H
@x
@x
22
See, for instance, page 247 in Bryson and Ho (1975) for a discussion of singular controls on unbounded domains.
In regards to that discussion, note that since in our problem there are no initial or terminal conditions on the state
variables e and u, which are those a¤ected by the control x, the optimal control will not require Dirac function
impulses at s or s meant to generate jumps to the singular solution.
23
See Theorem 4.2 on page 81 in Caputo (2005) for a more standard version of this result, or Theorem 1 on page
178 in Seierstad and Sydsaeter (1987) for a version that accounts for the state constraint at sb in (23).
18
solution of problem (18)-(23).24
@H
@x
=
1 (s)
+
1
ce (s; e (s)) = 0
r
1
y 0 (e) f (s)
2 (s) cee (s; e (s)) x (s) +
r
2 (s)
@H
=
@e
@H
= rh0 (u (s))f (s)
@u
@H
=0
@v
@
0; 1 (b
s) =
[ru (b
s)
@e (b
s)
@
0; 2 (b
s) =
[ru (b
s)
@u (b
s)
0
1 (s)
=
0
2 (s)
=
0
3 (s)
=
1 (s)
=
2 (s)
=
3 (s)
2 R;
s)
3 (b
0, with
(25)
3 (s) ce (s; e (s)) f (s)
3 (s) rf (s)
(26)
(27)
(28)
c (b
s; e (b
s))] =
ce (b
s; e (b
s))
(29)
(30)
c (b
s; e (b
s))] = r
2R
(31)
= 0 and sb = s if ru (b
s)
c (b
s; e (b
s)) > 0
(32)
In addition, since sb is a choice variable, we have the condition
H (e (b
s) ; u (b
s) ; v (b
s) ; x (b
s) ;
s) ;
1 (b
s) ;
2 (b
s) ; sb)
3 (b
0, and = 0 if sb < s
(33)
which is the standard necessary condition for free end-time optimal control problems.25 Condition
(25) equates the marginal cost,
1 (s),
and marginal bene…t,
1
2 (s) r ce (s; e (s)),
for P of decreasing
the level of e¤ort required from type s.26
There also exists a second-order necessary condition, which in the case of a singular control
takes the form of the so-called generalized Legendre-Clebsch condition.27 As we show in appendix
A4, in our problem, this condition is satis…ed if, for instance, cees
24
0 along the trajectory of the
Note that (29) is redundant given (25) and (30), which is why it is not used when deriving the optimal contract.
See, for instance, Theorem 10.2 on page 266 in Caputo (2005). The interpretation of (33) follows from the fact
that the value of the Hamiltonian at s captures the total value to P (or virtual surplus) generated by type s.
26
See page 89 Caputo (2005) for an interpretation of the costate variables in dynamic optimization problems. Note
that in our case, 1 (s) < 0, as that costate variable captures the bene…t of decreasing the state variable e(s), rather
than increasing it, since e0 (s) < 0. On the other hand, 2 (s) > 0, as it captures the bene…t of decreasing u(s).
27
Also refered to as the Kelley condition; see, for instance, page 246 in Bryson and Ho (1975).
25
19
solution to (25)-(33).28 This additional assumption on c ( ; ) is only su¢ cient, not necessary for
the generalized Legendre-Clebsch condition to be satis…ed.
Lemma 8 states the su¢ ciency of conditions in (25)-(33) for the problem (18)-(23), and the
uniqueness of the corresponding solution.
o
n
Lemma 8 (Su¢ ciency and Uniqueness) If sb ; fe (s); u (s); v (s); x (s)gs2[s;bs] satis…es (25)(33) with costate variables f
Proof of lemma 8.
1
(s);
2
(s);
3
(s)gs2[s;bs] , then it is the unique solution to (18)-(23).
We employ the Arrow Su¢ ciency Theorem (see, Theorem 3.4 on page 60
in Caputo (2005)) assuming …rst that sb is not a choice variable, but …xed. In our case, the
o
n
maximized Hamiltonian evaluated at the costate functions f 1 (s); 2 (s); 3 (s)gs2[s;bs] equals
[y (e)
rh (u)] f (s) +
3
(s) [ru
c (s; e)] f (s) by (25). Since, as we show later,
3
(s) > 0, this
maximized Hamiltonian is concave in (e; u; v) and strictly concave in (e; u) by the assumptions
imposed on y ( ) and c ( ; ) in section 2. The Arrow Su¢ ciency Theorem implies that the necessary
conditions are su¢ cient and the uniqueness of the state variables in the solution.29 The theorem
does not state the uniqueness of the control, but since x (s) = e0 (s), the uniqueness of the control
follows immediately as well. To account for the fact that sb is in fact a choice variable, one can then
employ a result from Seierstad (1984) to conclude the claim of the lemma. Since the corresponding
details are slightly more technical, they are deferred to appendix A6.
To complete the derivation of the necessary conditions for the problem in (9)-(13), we denote
by V(un ) the value function of the optimal control problem in (18)-(23), as a function of un . The
28
This condition implies that the marginal cost of e¤ort ce ( ) increases faster in e¤ort for higher s. It is immediately
satis…ed if, for instance, c(s; e) = c1 (s) c2 (e), with c1 increasing and c2 increasing and convex.
29
The Arrow Su¢ ciency Theorem, as stated in Caputo (2005), requires strict concavity of the maximized Hamiltonian in (e; u; v) for the uniqueness of the solution. However, by following its proof, it is evident that if the maximized
Hamiltonian is strictly concave in (e; u) and constant in v, as in our case, then fe (s); u (s)gs2[s;bs] must be unique.
The uniqueness of the remaining state variable fv (s)gs2[s;bs] follows then from its de…nition in (17).
20
necessary …rst order condition for the choice variable un is then
d
[V(un )
dun
Properties of the Optimal Contract
through un , i.e.,
and thus
3 (s)
dV(un )
dun
dV(un )
dun
= (1
= h0 (un ) =
=
r)
1
u0 (wn )
@V @un
@un @un .
s).
3 (b
(1
r)h(un )] = 0
(34)
Note …rst that un a¤ects the value of the contract only
By the Dynamic Envelope Theorem30 we have
Since (28) implies that
3(
@V
@un
=
s),
3 (b
) is constant, it follows from (34) that
> 0, for all s 2 [s; sb]. Employing this result and (25) into the de…nition
of the Hamiltonian H , we combine (33) with the requirement that sb = s if ru (b
s)
c (b
s; e (b
s)) > 0
from (32) to conclude the following result.
Lemma 9 An optimal contract must satisfy
y (e (b
s))
rw (b
s)
1
u0 (wn )
[ru (w (b
s))
c (b
s; e (b
s))] , and = 0 if sb < s
(35)
Intuitively, there are two e¤ects of P implementing positive e¤ort for a type s. First, it generates
an additional marginal revenue to P, y (e (s)) rw (s)). Second, it delivers an additional net utility
to A from an ex-ante point of view, ru (w (s)))
c (s; e (s)), and allows reducing the salary wn .
While the …rst e¤ect can be negative in an optimal contract, condition (35) requires that the sum
of these two e¤ects at sb be always non-negative. On the other hand, when sb < s, since the utility
ru (w (b
s))
c (b
s; e (b
s)) must be zero by (14) for incentive compatibility reasons, the marginal
revenue generated by type sb must be zero as well (otherwise sb would be increased).
The following lemma, whose proof is in appendix A3, identi…es a relationship between wn and
the wage pro…le fw (s)gs2[s;bs] in an optimal contract, representing the counterpart of (7) here. The
R sb
1
lemma follows from (32) and the fact proved in appendix that = s u0 (w1 (s)) f (s)ds u0 (w
n) .
30
See, for instance, Theorem 9.1 on page 232 in Caputo (2005).
21
Lemma 10 An optimal contract must satisfy
Z
s
sb
1
f (s)ds
u0 (w (s))
When ru (w(b
s))
1
u0 (wn )
0, and = 0 if ru (w(b
s))
c (b
s; e (b
s)) > 0
(36)
c (b
s; e (b
s)) > 0 (which by (14) can occur only when sb = s), at optimum, P can
equalize the marginal utility delivered to A through an increase of wn by a small amount with the
expected increase in utility that could be delivered to A by increasing each value w (s), for s 2 [s; sb],
R sb
1
s)) c (b
s; e (b
s)) = 0
by the same amount. Therefore s u0 (w1 (s)) f (s)ds u0 (w
n ) = 0. When ru (w(b
(which generically occurs when sb < s), P may not be able to perfectly equalize these inverse
marginal utilities. More precisely, he may not be able to set the wage pro…le fw (s)gs2[s;bs] low
enough without inducing A to shirk for at least some types in [s; sb]. To preempt shirking, P
keeps the wages w (s) high enough and lowers wn below the level that would equalize the inverse
R sb
1
marginal utilities; therefore s u0 (w1 (s)) f (s)ds u0 (w
n ) , as elicited by (36), with the inequality being
generically strict.
An implication of lemma 10 is that unlike the case from section 3.2, where the audit also revealed
A’s type, in the case with adverse selection studied here, the wage w (s) may be lower than the
salary wn for some types, i.e., A may be penalized when evaluated even if he exerted the level of
e¤ort required for his type. This is necessary as if P were to increase w (s) whenever w (s) < wn
(and simultaneously reduce wn to keep A’s participation constraint binding), aiming to reduce the
risk to A, in order to preserve the incentives for truthful type revelation, he would also need to
increase the remaining contingent wages, including those higher than wn . On net, this may subject
A to more risk, thus rendering an increase of w (s) suboptimal.
Lemma 11, whose proof is in appendix A4, determines the e¤ort level e (s) for each type s as
n
o
a function of the wage pro…le wn ; fw (s)gs2[s;bs] . Remark 12 is also proved in appendix A4.
22
Lemma 11 An optimal contract must satisfy for all s 2 [s; sb]
ce (s; e (s))
f (s) + ces (s; e (s))
u0 (w (s))
Remark 12 We have
Z
s
sh
1
u0 (w
Z
s
1
( ))
s
u0 (wn )
1
u0 (w ( ))
i
1
f ( )d = y 0 (e (s))f (s)
u0 (wn )
(37)
f ( )d > 0 for all s 2 (s; sb).
While the moral hazard in the model induces a departure from the e¢ cient outcome by requiring
a wage pro…le that subjects A to risk, the adverse selection induces ine¢ ciency in the choice of
n
o
the e¤ort level. For the given wage pro…le wn ; fw (s)gs2[s;bs] , the e¤ort level e (s) elicited by
equation (37) maximizes type s’s "virtual surplus" for contracting situations with random auditing,
i
Rsh
1
1
31 Unlike the case of pure moral
y(e)f (s) u0c(s;e)
f
(s)
c
(s;
e)
0
0
n
s
s u (w ( ))
(w (s))
u (w ) f ( )d .
hazard studied in section 3.2, P cannot implement the e¤ort that maximizes the "social surplus"
y(e)
c(s;e)
u0 (w (s)) .
If he did, some of the types in [s; s), for which their own marginal cost of e¤ort
is lower than that of type s, would choose it in place of their prescribed e¤ort levels. Instead,
P implements the lower 32 level of e¤ort e (s) which solves (37) and essentially in a discrete-type
version of the model would make the type just below s indi¤erent between his prescribed e¤ort level
and e (s) while all other types in [s; s) strictly prefer their prescribed e¤ort levels. The magnitude
Z sh
i
1
1
of this downward distortion is a¤ected by the positive factor
0
0
n
u (w ( ))
u (w ) f ( )d . This
s
distorting factor, which for any s is a measure of the cumulative utility gains delivered by the wage
adjustments awarded to types in [s; s) when passing an audit, and thus of the information rent that
type s is paid, is increasing in s on [s; ), where
solves w ( ) = wn , i.e., as long as types receive a
reward when they are audited, and is decreasing on ( ; sb]. The maximum distortion is applied by
this factor to the type
whose wage when passing an audit equals the salary wn .
31
Unlike many other agency models, where both players’utilities are quasilinear in transfers and thus these transfers
vanish from the expression of the virtual surplus, what we refer to here slightly improperly as the virtual surplus also
depends on wages. The same observation is valid for the expression which we refer to as the social surplus later on.
32
This follows from ces > 0, cee > 0, y 00 < 0 and the result of remark 12.
23
Note that at s, (37) becomes
ce (s;e (s))
u0 (w (s))
= y 0 (e (s)), implying the familiar no distortion at the
top property; when setting the optimal e¤ort and wage for type s, P does not need to account
for potential deviations from lower-cost types and can implement the e¢ cient e¤ort level for s.
Moreover, when sb = s and ru (w(s))
ce (s;e (s))
u0 (w (s))
c (s; e (s)) > 0, employing (36) into (37) it follows that
= y 0 (e (s)). In this case, and unlike most other contracting situations studied in the
literature,33 the optimal contract with random perfect monitoring also exhibits no distortion at the
bottom. Note that for types on ( ; sb], the distorting factor is decreasing in s, as over this range of
types, the wage when passing an audit is lower than the salary. When sb = s, at s the distorting
factor is zero.
Proposition 13 collects our …ndings and presents the necessary and su¢ cient conditions that
elicit the optimal contract in this model when A is risk averse.34
Proposition 13 Assume that u00 (w) < 0, for all w. The solution for the optimal contract under
moral hazard and adverse selection is given by (13) satis…ed with equality, (14), (16), and (35)-(37).
It deserves mentioning here that the constraint ru (w(b
s))
c (b
s; e (b
s))
0 from (14) does not
necessarily bind in an optimal contract when sb = s. This may occur if, for instance, (i ) u is
n
o
su¢ ciently high, requiring a high wage pro…le wn ; fw (s)gs2[s;bs] , (ii ) the marginal output y 0 is
low for high levels of e¤ort implying that P optimally chooses to implement low levels of e¤ort,
and (iii ) the marginal cost of e¤ort ce is low for low levels of e¤ort, implying that a wage pro…le
33
An exception are some models with multidimensional screening; see, for instance, Rochet and Stole (2002).
Given proposition 13, the optimal contract can be computed in principle as follows. When sb < s, then ru (w (b
s))
c (b
s; e (b
s)) = 0 by (35), and n
thus (36) is satis…ed
o with inequality. Then (37) determines implicitly e (s) for each
34
s 2 [s; sb], as a function of
wn ; fw (s)gs2[s;bs] . This also gives e0 (s) as a function of the same wage pro…le.
Then, fw (s)gs2[s;bs] is the solution of the di¤erential equation de…ned by (16), with initial conditions given by (13),
ru (w (b
s)) c (b
s; e (b
s)) = 0 and y (e (b
s)) rw (b
s) (we need three conditions because there are also the two unknowns
wn and sb). When ru (w (b
s)) c (b
s; e (b
s)) > 0, then sb = s, while from the fact that (36) is satis…ed with equality,
wn is determined as a function of fw (s)gs2[s;bs] . fe (s)gs2[s;bs] and fw (s)gs2[s;bs] are derived then as above. While
this shows that the optimal contract can in principle be computed with the conditions identi…ed in proposition 13,
a practical numerical implementation would involve constructing a system of di¤erential equations in e(s) and 2 (s)
and their derivatives, with the two equations obtained from the second derivative of the equality in (25) with respect
@H
d2
to s (see the computation of ds
in appendix A4) and (27), and two initial conditions on 2 (s) given by (30).
2
@x
24
chosen so as satisfy A’s participation constraint and to minimize his wage risk35 is su¢ cient to
also incentivize A to exert e¤ort. Essentially, when P needs A for a job that requires low and
inexpensive e¤ort, he o¤ers a contract that satis…es A’s participation constraint with a smooth
wage pro…le across all contingencies, which also provides A with su¢ cient incentives to exert e¤ort.
The following corollary states the intuitive fact that the revenue generated by di¤erent types of
agents is decreasing in the value of the type. Its proof is in appendix A6.
Corollary 14 The revenue generated by type s, y (e (s))
rw (s)
(1
r) wn , is decreasing in s.
The next proposition considers the general case where the constraint wn
Proposition 15 Consider the case where the constraint wn
0 may bind.36
0 may bind. The solution for the
optimal contract under moral hazard and adverse selection is then given by (13), (14), (16), (35)(37) with
3
replacing
3
1
u0 (wn ) ,
and the following additional conditions
0, and = 0 if
Z
s
1
3
u0 (wn )
Proof. By (28),
wn
3 (s)
sb
[ru (w (s))
c (s; e (s))] f (s)ds > u and wn = 0
(38)
0, and = 0 if wn > 0
(39)
is again a constant, which we denote by
3.
When we allow for the constraint
0 to potentially bind, the participation constraint in (13) may not necessarily bind in the
un , and therefore in (31),
optimal contract. Thus, in (22), we have v (b
s)
0, and
3
3
=0
whenever v (b
s) > un . Since v (b
s) > un can optimally occur in a solution only when the constraint
un
0 binds, this immediately implies (38). Next, (34) becomes
35
d
dun
[V(un )
(1
r)h(un )]
0
This implies that the utility u is delivered to A not only through a high value of wn , but also through high values
for the wages fw (s)gs2[s;bs] so to reduce the discrepancy between the wages with an audit and the salary wn .
36
Proposition 15 suggests two additional
potential cases when determining the optimal contract besides that conR sb
sidered in proposition 13. First, if s [ru (w (s)) c (s; e (s))] f (s)ds = u and wn = 0, then 3 is undetermined, but
R sb
wn = 0 provides the additional condition for computing the contract. Second, if s [ru (w (s)) c (s; e (s))] f (s)ds >
u and wn = 0, then (13) is no longer satis…ed with equality, but 3 = 0 and wn = 0 provide the additional conditions.
25
and = 0 whenever un > 0. Since, as argued earlier,
dV(un )
dun
= (1
r)
3,
this implies (39). Following
the analyis from the appendix leading to (35), (36) and (37), one concludes that these conditions
continue to be necessary for the optimal contract, only that
3
substitutes
1
u0 (wn )
everywhere.
We close the section with proposition 16, whose proof is in appendix A7, which states that if A
is risk neutral over monetary transfers, then the full-information payo¤ is attainable by P whenever
A’s reservation utility u is su¢ ciently high. We restrict attention again to the simpler case where
in a full-information setting, it is optimal for P to implement positive e¤ort for all types.
Proposition 16 Assume that u(w) = w, for all w, and that e0 (s) > 0, for all s 2 [s; s]. Then,
there exists U > 0 such that for all u
U , we have e (s) = e0 (s), for all s 2 [s; s], and the value of
the optimal contract under moral hazard and adverse selection equals that under full information.
Essentially, with a risk neutral agent, P can set a wage pro…le that provides A with incentives
to both reveal his type and exert e¤ort without a need to compensate him for the induced wage
risk. An immediate consequence of this result is that the value of the optimal contract is again
constant in the intensity of monitoring if A is risk neutral. The requirement that u be su¢ ciently
high ensures that salary wn is nonnegative in this contract. With limited liability of the agent, as
we argue in appendix A7, if u is low and thus the constraint wn
0 binds, P chooses to implement
a lower or equal e¤ort pro…le than the e¢ cient one.
The E¤ect of r on The Value of the Optimal Contract Denote by V (r) the value of the
(1)
optimal contract as a function of the probability of monitoring r. By assumption 7, V (r) is Cp .
The following lemma, whose proof is in appendix A8, elicits the e¤ect of r on this value.
Lemma 17 For all r 2 (0; 1), we have
0
V (r) =
Z
s
sb
u(w (s))
u0 (w (s))
w (s) f (s)ds
26
u(wn )
u0 (wn )
wn
(40)
To understand this result, note …rst that since sb and the e¤ort pro…le fe (s)gs2[s;bs] are chosen
optimally, when r increases slightly, the value of the contract is impacted only through the change
in the expected payment to A. There are two e¤ects of an increase in r on this expected payment.
First, a higher r increases the likelihood of monitoring; this e¤ect is captured in (40) by the term
R sb
n
s w (s)f (s)ds + w . Second, the increase in r induces an adjustment in wages, as it relaxes A’s
incentive constraints allowing P to reduce the wage risk by lowering w (s); to compensate for this
and continue satisfying A’s participation constraint, P must increase wn . These wage adjustments
are captured by the remaining terms in (40).37
The next proposition, whose proof is in appendix A9, states that when it is optimal for P to
implement positive e¤ort for all types, the value of the contract is increasing in r.
Proposition 18 Assume that u00 (w) < 0 for all w. For any r 2 (0; 1), if sb = s, then V 0 (r) > 0.
When r increases, P is less reliant on the power of incentives and o¤ers a smoother wage pro…le
that exposes A to less risk, thus reducing the risk premium P needs to pay and increasing the value
of the contract.
As a side note here, it deserves mentioning that while we proved the result of proposition 18
under the underlying speci…cation of an ex-ante participation constraint of the agent, it can also be
shown that it holds when the agent evaluates the contract only after he learns his type, and thus
the optimal contract problem has a more standard interim participation constraint for each type.
The next proposition, which is one of the main results of the paper, states that if the optimal
contract does not induce e¤ort for all types, then the value of the contract may be decreasing in
37
Since sb and fe (s)gs2[s;bs] do not change, ru(w(s)) stays constant as r increases slightly. In particular, if r
increases by some small percentage ", u(w(s)) must
h decrease by the
i same percentage ", for each s 2 [s; sb]. Therefore,
w(s) decreases by an amount
w(s) satisfying
d
dw(s)
ln u(w(s))
w(s) = ", i.e.,
w(s) =
n
u(w(s))
".
u0 (w(s))
To continue
u(wn )
".
u0 (wn )
The
satisfying A’s binding participation constraint, it follows by the same logic that w must increase by
net impact of these wage adjustments constitutes the second e¤ect of the change in r on V (r), as elicited by (40).
27
the probability of monitoring. Its proof constructs a numerical example, under speci…c functional
forms of the fundamentals of the model, with the property that V 0 (r) < 0 for high values of r.
Proposition 19 There exist f ( ), y( ), u ( ), c( ) and u, such that sb < s and the value of the
corresponding optimal contract is decreasing in r for all high enough r.
The numerical example employed in proposition 19 builds on the simple case of a discrete type
space fsa ; sc g. With no restrictions on the continuous type density function f ( ), one can approximate su¢ ciently well the discrete distribution from this numerical example with a continuous one
for which the corresponding optimal contract maintains the key property stated in proposition 19.
Since for any set of remaining parameters of the model, there exist values of sc high enough such
that it is optimal for P to induce e¤ort only from the lower cost type sa , we considered directly
that sc takes such a high value without setting a particular value for it.38 In an environment with
this particular type distribution, P o¤ers a contract fwn ; wa ; ea g where (i ) wn is the salary paid
to A when no audit is performed, and (ii ) wa is the wage paid to A when an audit reveals that
he exerted at least e¤ort ea . The contract is designed so as to be accepted by A ex-ante and to
induce A to exert e¤ort ea when his type is sa and no e¤ort otherwise. The remaining details of
the formal analysis and numerical implementation are presented in appendix A10.
Figure 1 presents in solid lines key variables from the corresponding optimal contract as functions of the probability r, for the values of r that allow for a positive value of the optimal contract.
1
38
with s 2 fsa ; sc g and
The functional forms that we employed are y(e) = e, u(w) = w and c(s; e) = s 1 e
a
a
a
a
p
Prfs = s g. The corresponding parameters are set at = 1:6, = 1:2, s = 0:2, p = 0:85 and u = 1. For the
functional forms selected, there are multiple sets of parameters with the property that V 0 (r) < 0 for high enough r.
28
a. V alue of Contract
b. E ffort Lev el
1.6
8
1.4
7
1.2
1
6
0.8
0.6
5
0.4
4
0.2
3
0
0.2
0.4
0.6
0.8
0.2
c. W ages
12
w
0.4
0.6
0.8
d. E xpected rev enue and expected wage
7
a
10
6
Expected rev enue
↓
8
5
6
↑
2
Expected wage
4
4
w
n
w
0.2
0.4
0.6
3
c
0.8
0.2
0.4
0.6
0.8
Figure 1: Optimal Contracts as Functions of the Probability of Auditing r
When r is small, the contract speci…es a low e¤ort level ea , and in return promises a high wage wa
if A passes an audit. Intuitively, the low probability of auditing makes it hard to provide incentives
since A knows that even when exerting e¤ort, he is unlikely to be rewarded, as in the absence of an
audit, this e¤ort is not observed. Therefore, P …nds it optimal to only induce a low level of e¤ort.
Moreover, if r is very small, (r
0:1) P cannot ensure himself a non-negative expected payo¤ if he
were to implement positive e¤ort and has to shut down. As r increases, monitoring becomes a more
e¤ective monitoring instrument which allows implementing a higher e¤ort with a lower wage wa ;
A is compensated for the higher e¤ort with an increase in the salary wn . The expected revenue,
pa y (ea ), the expected wage paid, rpa wa + (1
r) wn , and the di¤erence between the two, i.e., the
value of the contract, all increase over this range.
The increase in r also impacts the risk premium paid to A through two channels. First, it
decreases it by lowering the dispersion in the set of possible wages, fwa ; wn ; 0g up to the value of r
29
at which wa and wn become equal. Above that value, the wages wa and wn are equal and constant,
and this …rst channel shuts down. Second, the increase in r alters the probabilities with which
these wages are paid. When r is small, most of the utility is delivered to A through the salary wn ,
while the probabilities of A being paid either wa or 0 are small. As r increases, the probability that
A is paid the wage wa increases, but so does the probability that A is caught shirking and paid
nothing. This second e¤ect tends to increase the wage variance and therefore the risk premium P
needs to pay. For su¢ ciently high values of r, the consequent increase in risk premium determines
a decrease in the value of the contract and can even bring this value to zero.39
Next, we argue that when P can credibly commit not to void the contract, but to make payments
even when A fails an audit, then the optimal value of the contract is again everywhere increasing
in r. The following proposition states this result. Its proof, which is presented in appendix A11,
considers the standard case adopted in the paper of a continuous type density function.
Proposition 20 Assume that u00 (w) < 0 for all w and that P can credibly commit to make a
payment even when A fails an audit. The value of the corresponding optimal contract is increasing
in r for any r 2 (0; 1).
If P can commit to make payments even when A is caught shirking, he can reduce the dispersion in the set of possible wages faced by A to essentially partially insure him against high-cost
realizations. This allows P to lower the risk premium he needs to pay. Moreover, and perhaps more
surprisingly, the increased power of incentive determined by the higher probability of monitoring
renders the value of the contract be again everywhere increasing in r.
The optimal contract corresponding to the numerical example employed in proposition 19 is
presented in Figure 1 in broken lines. The wage wc is promised to be paid to A when an audit is
39
Note the monotonicity of V (r) changes around the value of r where wn starts increasing at a faster rate. Since
the salary wn is the channel through which this risk premium is paid, this suggests that the risk premium starts
increasing signi…cantly, and therefore, that it is indeed the factor driving the decrease of V (r).
30
performed and it reveals that A exerted less e¤ort than ea , i.e., essentially this is the wage paid
when A’s type is sc . As expected, the value of the contract with commitment is at least as high as
that without commitment for all values r. When r is low, the two values are equal; in particular, P
implements the same contract as without commitment by setting wc to zero and thus not availing
himself of the possibility of commitment. For the high values, commitment becomes valuable and P
promises a wage wc > 0 to reduce the risk premium paid. It also deserves emphasizing at this point
that the optimal wage wc in this numerical example is nonnegative. This ensures that the driving
force inducing a higher value of the contract is the ability of P to make a credible commitment
to make a net payment towards A when the latter fails an audit, and not an ability to extract
payments from A in such situations.
4
Extension: The Optimal Contract with Communication
In this section we analyze the optimal contracts with random auditing when pre-play communication
is feasible. As discussed in section 2, in this situation, P can design a contract that requires A
to declare his type after he learns it, and then de…ne the wage paid to A when an audit is not
performed as a function of this type.40 To focus the exposition, we restrict again attention to
the case when it is optimal to implement positive e¤ort for all types and when the nonnegativity
constraints on wages do not bind. Finally, we consider the case where A is strictly risk averse. P’s
40
An alternative standard interpretation of the "communication" between A and P is that A chooses a contract
fw; wn g out of a menu of contracts o¤ered by P after he learns his type.
31
problem in this case is to select a contract
max
fe(s) 0;w(s) 0;wn (s) 0gs2[s;s]
Z
n
n (s); e (s); w (s)
w+
+
+
s
[y (e(s))
rw(s)
ru (w(s))
Z
s
[ru (w(s)) + (1
that solves the problem
r) wn (s)] f (s)ds
(41)
c (s; e (e
s))]
(42)
s
r) u (wn (e
s))
s)) + (1
s.t. s 2 arg max [ru (w(e
se2[s;s]
(1
s2[s;s]
o
c (s; e (s))
0, for all s 2 [s; s]
r) u (wn (s))
c (s; e (s))] f (s)ds
(43)
u.
(44)
s
.
Following the First Order Approach, we replace (42) with the corresponding …rst order condition
ru0 (w(s)) w0 (s) + (1
r) u0 (wn (s)) wn0 (s) = ce (s; e(s))e0 (s) a.e. s
(45)
and assume that e0+ (s) < 0 in the optimal contract. On the other hand, a counterpart of the lemma
4 from the case without communication does not hold here, and thus we cannot relax (43).
We solve the resulting problem using the same optimal control methods employed in section
3.3. By denoting un (s)
u(wn (s)), the …rst order condition for A’s truthful revelation problem
from (45) becomes ru0 (s) + (1
r) un0 (s) = ce (s; e(s))e0 (s) a.e. s. In addition to the variables from
problem (18)-(23), we introduce a new state variable un (s) and a new control k(s)
32
un0 (s). The
optimal control problem is then
max
fx(s);k(s)gs2[s;s]
Z
[y (e(s))
rh (u(s))
(1
r)h(un (s))] f (s)ds
(46)
s
s.t. e0 (s) = x(s)
(47)
un0 (s) = k(s)
(48)
1
u0 (s) =
r
1
k (s) + ce (s; e(s))x(s)
r
r
(49)
r)un (s)
(50)
v 0 (s) = [ru (s) + (1
v (s) = 0; v (s)
ru (s)
s
c (s; e (s))
c (s; e (s))] f (s)
u
(51)
0, for all s 2 [s; s]
(52)
This is an optimal control problem with pure state constraints determined by the speci…c form of
(52).41 The necessary conditions delivered by Pontryagin’s Maximum Principle for such problems
are presented in Theorem 4.1 in Hartl, Sethi and Vickson (1995), with the formal proof of the
theorem for our case where we have no constraints with both state and control variables, so condition
2.3 from the text of their problem does not exist, presented in the references cited therein.
Thus, to solve the control problem, we construct the Lagrangian
L+ (e; u; un ; v; x; k;
1;
+
1x
where
1;
2;
3;
4
and
2;
+
3;
2
4;
; s)
1
r
[y (e)
rh (u)
1
k + ce (s; e) x +
r
r
(1
r) h (un )] f (s) + [ru
3 [ru
+ (1
r) un
c (s; e)] f (s)
c (s; e)] f (s) +
4k
are functions de…ned on [s; s]. Then, by Theorem 4.1 in Hartl, Sethi
and Vickson (1995), there exist almost everywhere di¤erentiable functions
41
1;
2;
3;
42
4,
and an
See Chapter 6 in Caputo (2005) for a comprehensive discussion of the problems with state and control constraints,
and Chapter 5 in Seierstad and Sydsaeter (1987) for a more detailed discussion of problems with pure state constraints.
42
The theorem does not state that the costate variables 1 ; 2 ; 3 ; 4 are continuous, but it states that at all
points where the constraint (52) binds, the functions 1 and 2 may have discontinuities given by the following jump
@
@
conditions 1 (s ) = 1 (s+ ) + (s) @e(s)
[ru (s) c (s; e (s))] and 2 (s ) = 2 (s+ ) + (s) @u(s)
[ru (s) c (s; e (s))] for
some positive function (s). Since the same type of result applies to the functions 3 and 4 , but the constraint
33
almost everywhere continuous function
such that the following conditions are satis…ed almost
everywhere.43
@L+
@x
@L+
@k
0
1 (s)
=
1 (s)
1
=
2 (s)
1
ce (s; e (s)) = 0
r
+
4 (s)
(53)
(54)
=0
(55)
y 0 (e) f (s) + (s) ce (s; e (s)) f (s)
2 (s)
1
cee (s; e (s)) x (s) +
r
(s)
3 (s) ce (s; e (s)) f (56)
@L+
= rh0 (u (s))f (s) r (s)f (s) r 3 (s) f (s)
@u
@L+
=0
@v
@L+
= (1 r) h0 (un (s)) f (s)
r) f (s)
3 (s) (1
@un
0
2 (s)
=
0
3 (s)
=
0
4 (s)
=
1 (s)
= 0;
(s)
r
2 (s)
r
@L+
=
@e
=
=
+
1 (s)
= 0;
1 (s)
= 0;
1 (s)
0, with (s) = 0 if ru (s)
= 0;
3 (s)
2 R;
3 (s)
(57)
(58)
(59)
2 R;
4 (s)
= 0;
4 (s)
=0
(60)
c (s; e (s)) > 0, for any s 2 [s; s]
(61)
There exists also a variant of the generalized Legendre-Clebsch necessary condition for problems
with multiple controls and state constraints, which we show in appendix A12 that it is satis…ed if,
for instance, we assume again that cees
0 along the trajectory of the solution to (53)-(61).
Lemma 21 states the su¢ ciency of conditions in (53)-(61) for the problem in (46)-(52) and the
uniqueness of the corresponding solution.44
Lemma 21 (Su¢ ciency and Uniqueness) If e+ (s); u+ (s); un+ (s); v+ (s); x+ (s); k+ (s)
isfy the conditions in (53)-(61) with costate variables f
1+ (s);
2+ (s);
3+ (s);
s2[s;s]
4+ (s)gs2[s;s] ,
sat-
then it
in (52) is independent of the corresponding state variables v(s) and un (s), it follows that 3 and 4 are continuous
everywhere. Given (54), it follows then that 2 is also continuous everywhere, and then (53) implies the same for
1 . We conclude thus that for this problem, as in the case of the necessary conditions from section 3.3, the costate
variables are continuous everywhere.
43
Given (53) and (54), some conditions in (60) are redundant and so are not used in deriving the optimal contract.
44
The proof of this lemma is simpli…ed by the underlying assumption that it is optimal that all types exert positive
e¤ort. If that assumption was relaxed, the result to apply for proving su¢ ciency in an optimal control problem with
pure state constraints and a free end time is Theorem 7 on page 377 in Seierstad and Sydsaeter (1987).
34
is the unique solution to (46)-(52).
Proof of lemma 21.
The lemma follows from the Arrow Su¢ ciency Theorem for optimal control
problems with mixed constraints (see Theorem 6.4 on page 166 in Caputo (2005)).45 By employing
the conditions in (53) and (54), the maximized Hamiltonian evaluated at the corresponding costate
variables equals [y (e)
rh (u)
(1
r) h (un )] f (s) +
3+ (s) [ru
+ (1
r) un
c (s; e)] f (s). From
the assumed properties of y ( ) and c ( ; ) and the fact that for any solution to (53)-(61), we have
3+ (s)
0 (we prove this in appendix A12), the maximized Hamiltonian is concave in (e; u; un ; v)
and strictly concave in (e; u; un ). This implies the claims of the lemma 21.46
Proposition 22, proved in appendix A12, is the main result of this section eliciting the conditions
that determine the optimal contract with communication when A is strictly risk averse, and the
e¤ect of r on the value of this contract.47 Remark 23 is proved in the same appendix.
Proposition 22 Assume that u00 (w) < 0, for all w. Also, assume that it is optimal to induce all
types of A to exert e¤ ort. The solution for the optimal contract with communication under moral
hazard and adverse selection is given by (44) satis…ed with equality, (43), (45), and for any s 2 [s; s]
w+ (s)
n
w+
(s)
0, and = 0 whenever ru (w+ (s)) c (s; e+ (s)) > 0
(62)
Z s
Z s
ce (s; e+ (s))
1
f (t)
f
(s)
+
c
(s;
e
(s))
dt f ( )d = y 0 (e+ (s))f (s) (63)
es
+
0 (w n ( ))
0 (w n (t))
u0 (w+ (s))
u
u
s
s
+
+
The value of the optimal contract is increasing in r for any r 2 (0; 1).
45
Note that while our problem has pure state constraints, Theorem 6.4 in Caputo (2005), which deals with optimal
problems with mixed constraints (where the control also appears in the constraint), applies to it since the rank
constraint quali…cation is not required for that theorem. This rank quali…cation is not satis…ed in problems with
pure state constraints and thus we could not apply Theorem 6.1 from Caputo (2005) to conclude that (53)-(61) are
necessary conditions for a solution to (46)-(52).
46
As in the case of lemma 8, the text of Arrow’s Su¢ ciency Theorem from Caputo (2005) requires the maximized
Hamiltonian be strictly concave in all state variables, and does not claim the uniqueness of the control variables, but
the same argument employed in the proof of lemma 8 completes the proof in this case.
47
n
(63) determines e+ (s) as a function of fw+ (s); w+
(s)gs2[s;s] . Then (45) and (62), subject to the constraint in (43)
n
and with the binding constraint in (44) as initial condition, constitute a system that determine w+ (s) and w+
(s).
35
Remark 23 We have
Z
s
s
1
n ( ))
u0 (w+
Z
s
s
f (t)
n (t)) dt
u0 (w+
f ( )d > 0 for all s 2 (s; s).
As in the model with pure moral hazard studied in section 3.2, the optimal contract sets
w+ (s)
n (s). To see why, note that otherwise, w n (s) could be reduced by an amount and w (s)
w+
+
+
0 (s) with the property that ru (w (s)) + (1
increased to a value w+
+
(1
n (s) +
r) u w+
n (s) = ru w 0 (s) +
r) u w+
+
; this adjustment would not violate any of constraints in problem (41)-(44),
but would reduce the amount of risk that A is subjected to and the risk premium that needs to be
paid. Thus, unlike the case with no pre-play communication, where P needs to use the wage scheme
fw (s)gs2[s;bs] both to induce the agent to reveal his type and to exert e¤ort, if communication
is feasible, P can make use of the ‡exibility o¤ered by his ability to adjust the wage scheme
n (s)
w+
s2[s;s]
to tailor the contract so as to not penalize the agent when an audit is performed
and the agent passes it. Moreover, as (62) states, the wages with and without an audit for a given
type s are equal whenever the corresponding level is su¢ cient to provide incentives for that type
to exert e¤ort, i.e., when ru (w+ (s))
c (s; e+ (s)) > 0. On the other hand, (63) imposes the usual
equality between the marginal cost and bene…t of requiring additional e¤ort from type s, with the
second term in the left hand side being the (strictly positive, by remark 23) distorting factor that
sets type s’s induced e¤ort below its e¢ cient level. Finally, under our underlying assumption that
all types are induced to exert positive e¤ort, the value of the contract is strictly increasing in r
whenever w+ (s)
5
n (s) > 0 for s in a set of positive measure, and is constant otherwise.
w+
Conclusion
In this paper we studied optimal contracts with random auditing de…ned as a monitoring instrument where the agent’s action is observed with some non-degenerate probability, but otherwise
the principal has no informative signal of this action. We characterized and compared the optimal
contracts under several standard information structures that combine moral hazard and adverse
36
selection. We showed that a higher precision of the monitoring instrument, as measured by the
probability of auditing, always increases the value of an optimal contract when all agent types are
optimally induced to exert e¤ort or when the principal can commit to make payments towards
the agent even when the latter fails an audit, but may decrease the value of a contract otherwise.
Finally, we characterized the optimal contracts for situations where pre-play communication is possible and thus the principal can adjust the wage paid to the agent when an audit is not performed
as a function of the signal transmitted by the agent. As an avenue for future research, we are
also currently working on a repeated version of this model where a failed audit voids the dynamic
contract and leads to a loss for the agent of the promised value of future payments.
Appendix
Appendix A1. Proof of Proposition 2
First, note that in any optimal contract, the participation constraint in (6) must bind since otherwise
w1n can be decreased without violating any of the constraints. We construct the Lagrangian
L1 =
Z
s
+
s
[y (e(s))
Z
rw(s)
(1
n
r) w ] f (s)ds +
Z
s
(s) [ru(w(s))
s
s
[ru (w(s)) + (1
r) u (wn )
s
37
c (s; e (s))] f (s)ds
u
c(s; e(s))] ds
The necessary …rst order conditions are then
@L1
@e(s)
@L1
@w(s)
@L1
@wn
@L1
(s)
@ (s)
(s)
From (65), we have
= y 0 (e(s)) f (s)
(s) ce (s; e(s))
=
rf (s) + (s) ru0 (w(s)) + ru0 (w(s))f (s) = 0
=
(1
=
(s) [ru(w(s))
r) + (1
0; ru(w(s))
(s) + f (s) =
f (s)
u0 (w(s)) .
Substituting this into (67), and noting that
w1n = 0 whenever ru(w(s))
1
u0 (w)
w1n
(65)
(66)
(67)
c(s; e(s))] = 0
0;
0
(68)
Substituting this into (64), implies (8) from the
i
h
1
1
1
= u0 (w
(s) = u0 (w(s))
n ) , and thus
0
n
u (w ) f (s).
1
u0 (w(s))
1
u0 (wn )
= 0 () w(s)
c(s; e(s)) > 0. Finally,
is increasing in w imply w1 (s)
(s)
wn = 0, it follows that
0 from (68) and the fact that
0 as stated by (7).
Denote now by V1 (r) the value of the optimal contract; we will show that V10 (r)
the Envelope Theorem, and then substituting
V10 (r)
(64)
r) u0 (wn ) = 0
c(s; e(s))
text of the proposition. From (66), we have
w1 (s)
ce (s; e (s)) f (s) = 0
and
0. Employing
(s) computed above, we have
Z s
@L1
=
=
f[ w(s) + wn ] f (s) + (s) u(w(s)) + [u (w(s)) u (wn )] f (s)g ds
@r
s
Z s
1
1
1
=
[ w(s) + wn ] + 0
u(w(s)) + 0 n [u (w(s)) u (wn )] f (s)ds
0
n
u (w(s)) u (w )
u (w )
s
Z s
n
u(w(s))
u (w )
=
w(s)
wn f (s)ds
0
u (w(s))
u0 (wn )
s
Since w(s)
wn for all s, V10 (r)
0 follows from the fact that
d
dw
h
u(w)
u0 (w)
i
w =
u(w)u00 (w)
(u0 (w))2
> 0.
Next, we show that the e¤ort pro…le e1 (s) is decreasing, and argue that the wage pro…le w1 (s)
is not necessarily monotonic. Consider any interval in [s; s] on which w1 (s) = w1n ,48 and note
48
By the continuity of the objective function and constraints in P’s problem, it follows that the sets of s on which
w1 (s) > w1n and w1 (s) = w1n , respectively, are unions of intervals.
38
ces (s;e1 (s))
cee (s;e1 (s)) y 00 (e1 (s))u0 (w1n ) ,
that from (8) it follows by the Implicit Function Theorem that e01 (s) =
which is negative since ces > 0, cee > 0, y 00
0 and u0 > 0. On the other hand, on an in-
terval in [s; s] on which w1 (s) > w1n , we have from (7) that w1 (s) = u
y 0 (e1 (s)) u0 (u
stituting this in (8), we obtain ce (s; e1 (s))
that e01 (s) =
u
1
r c (s; e1 (s))
. Sub-
) = 0. It follows then
, where we substituted w1 (s) for
. Again, the properties of the functions c, y and u imply that e01 (s) < 0. Finally,
ce (s; e1 (s)) = 0 it follows that whenever w1 (s) > w1n , we have
rewriting (8) as u0 (w1 (s))y 0 (e1 (s))
w10 (s) =
1
r c (s; e1 (s))
u00 (w (s))
ces (s;e1 (s)) y 0 (e1 (s)) u0 (w 1(s)) r1 cs (s;e1 (s))
1
u00 (w (s))
cee (s;e1 (s)) y 00 (e1 (s))u0 (w1 (s)) y 0 (e1 (s)) u0 (w 1(s)) r1 ce (s;e1 (s))
1
1
r c (s; e1 (s))
1
1
1
u0 (w1 (s))y 00 (e1 (s))e01 (s) ces (s;e1 (s)) cee (s;e1 (s))e01 (s)
.
u00 (w1 (s))y 0 (e1 (s))
Since ces (s; e1 (s)) > 0, the numerator is
generically unsigned, and thus w1 (s) is not necessarily monotonic. Moreover, the set of values of s
for which w1 (s) = w1n may be a union of disjoint intervals.
We close by arguing that the surplus generated by the di¤erent agent types, y (e(s))
r) wn , is decreasing in s. Consider …rst any interval in [s; s] on which w1 (s) > w1n , and thus,
(1
from (5), ru(w1 (s)) c(s; e1 (s)) = 0, implying w1 (s) = u
d
ds
rw(s)
[y (e1 (s))
u0 (u
rw1 (s)] =
cs (s;e1 (s))
,
1 1 c(s;e (s))
(r
))
1
d
ds
y (e1 (s))
ru
1
1
1
r c (s; e1 (s))
1
r c (s; e1 (s))
. On this interval, we have
= y 0 (e1 (s))
u0 (u
ce (s;e1 (s))
1 1 c(s;e (s))
(r
))
1
e01 (s)
which is negative since (8) implies that the …rst term is zero. On the other hand,
on intervals in [s; s] on which w1 (s) = w1n , we have
e01 (s) < 0, we conclude that
d
ds
[y (e1 (s))
d
ds
[y (e1 (s))
rw1 (s)] = y 0 (e1 (s)) e01 (s). Since
rw1 (s)] < 0 for all s.
Appendix A2. Proof of Lemma 5
We argue …rst that any incentive compatible contract must satisfy (15) and (16). Consider A’s
n
o
original problem of choosing an e¤ort level under a contract wn ; fw(e)ge 0 when his type is s,
max [ru (w(e))
e(s) 0
c (s; e)] and note that for any wage pro…le w(e), A’s objective function in (10) is
submodular in (e; s) because
@2
@e@s
[ru (w(e))
c (s; e)] =
ces (s; e) < 0. By Topkis’Monotonicity
Theorem, it follows then that the maximizer e (s) is a.e. decreasing in s. Thus, in order for a
o
n
contract wn ; fe(s); w(s)gs2[s;s] to be incentive compatible, e(s) must be a.e. decreasing in s
39
(this also implies that e(s) is a.e. di¤erentiable). The necessity of (16) follows from the …rst order
condition in A’s problem in (10).
Next, we show that a contract satisfying (15) and (16) is incentive compatible. Let
ru (w(e
s))
c (s; e (e
s)); we will argue that
to complete the proof. We have
@
@e
s
(e
s; s)
@
@e
s
(e
s; se) = 0. Thus,
@
@e
s
(e
s; s) for all se; s 2 [s; s], which will be enough
(s; s)
(e
s; s) = ru0 (w(e
s)) w0 (e
s)
(e
s; se) if and only if
e0 ( ) < 0 by (15), it follows that
@
@e
s
@
@e
s
ce (s; e (e
s)) e0 (e
s)
@
@e
s
(e
s; s)
(e
s; s)
ce (s; e (e
s)) e0 (e
s), and so note that
ce (e
s; e (e
s)) e0 (e
s). Since ces ( ) > 0 and
(e
s; se) if and only if se
(e
s; s) is increasing (decreasing) in se for se
s (e
s
s. But by (16), we have
s), implying immediately
that it is indeed maximized when se equals s.
Appendix A3. Proof of Lemma 10
Since
2 (s)
= 0 by (30), integrating equation (27) we have
2 (s) = r
Z
s
h0 (u ( ))f ( )
) f ( ) d , for all s 2 [s; sb]
3(
s
Employing
s)
2 (b
= r, as required by (30), and
=
Z
s
sb
3 (s)
h0 (u (s))
= h0 (un ), we conclude that
h0 (un ) f (s)ds
The claim of lemma 10 follows by substituting for
h0 (u(s)) = u
1 0 (u(w(s)))
=
1
u0 (u
1 (u(w(s))))
=
1
u0 (w(s)) ,
40
(69)
(70)
from (70) into (32) after observing that
and similarly that h0 (un ) =
1
u0 (wn ) .
Appendix A4.
Proof of Lemma 11.
Di¤erentiating
1 (s)
+
1
2 (s) r ce (s; e (s))
= 0 from (25) with respect to s,
we get
0
1 (s)
Plugging in
0
2 (s)
+
0
1 (s)
and
1
ce (s; e (s)) +
r
0
2 (s)
=
1
ces (s; e (s)) +
r
2 (s)
1
cee (s; e (s)) e0 (s) = 0
r
(71)
from (26) and (27), we obtain that
y 0 (e (s))f (s)
+ rh0 (u (s))f (s)
2 (s)
2 (s)
1
cee (s; e (s)) x (s) +
r
+
1
1
ces (s; e (s)) + 2 (s) cee (s; e (s)) e0 (s) =
r
r
1
y 0 (e (s))f (s) + h0 (u (s))ce (s; e (s)) f (s) + 2 (s) ces (s; e (s)) = 0
(72)
r
3 (s) rf (s)
1
ce (s; e (s)) +
r
3 (s) ce (s; e (s)) f (s)
2 (s)
2 (s)
where we used the fact that x (s) = e0 (s). Now, since (69) and 3 (s) = h0 (un ), imply
Rs 0
h0 (un )] f ( )d , it follows that the optimal contract must satisfy
s [h (u( ))
0
h (u(s))ce (s; e (s)) f (s) +
Z
s
h0 (u( ))
h0 (un ) f ( )d
r
=
ces (s; e (s)) = y 0 (e (s))f (s)
s
which can then be immediately rewritten as in (37). This completes the proof of lemma 11.
Proof of Remark 12. We will show that
for
2 (s)
2 (s)
0 for all s 2 [s; sb]. Given the expression computed
above, this will immediately imply the claim of the corollary. Now, to prove that
for all s 2 (s; sb), since
2 (s)
= 0 and
s)
2 (b
= r
0, it would be enough to show that
2
2 (s)
>0
is strictly
increasing on some interval [s; s0 ] and strictly decreasing on [s0 ; sb]. To this aim, note …rst that
d
ds
[h0 (u(s))] = h00 (u(s))u0 (s) < 0 because u(s) is decreasing while h is strictly convex as the inverse
of a concave and increasing function.49 Therefore, h0 (u(s)) is strictly decreasing in s. Since it is
also continuous in s it follows that there exists some s0 2 [s; sb] such that h0 (u(s))
49
Di¤erentiating twice each side of the equality u(h(v)) = v, we obtain h00 (v) =
41
h0 (un ) > 0 for
2
u00 (h(v)) [h0 (v)] =u0 (h(v)) > 0.
h0 (un ) < 0 for all s 2 (s0 ; sb]. Since
all s 2 [s; s0 ) and h0 (u(s))
follows that
0
2 (s)
= [h0 (u(s))
h0 (un )] f (s) it
is increasing on [s; s0 ] and decreasing on [s0 ; sb], as desired.
2 (s)
Veri…cation of the generalized Legendre-Clebsch condition. This condition requires that
( 1)n
@ d2n
@x ds2n
where 2n is the …rst higher-order derivative of
@H
@x
@H
@x
0
(73)
with respect to s in which the control x appears
(it has been proved that n 2 N+ ). We already showed above that
h0 (u (s))ce (s; e (s)) f (s) +
d2
ds2
@H
@x
1
2 (s) r ces (s; e (s)),
y 00 (e (s))x(s)f (s)
=
d
ds
@H
@x
=
y 0 (e (s))f (s) +
so di¤erentiating one more time, we have
1
y 0 (e (s))f 0 (s) + h00 (u (s)) ce (s; e (s)) x (s) ce (s; e (s)) f (s)+
r
+ h0 (u (s))ces (s; e (s)) f (s) + h0 (u (s))cee (s; e (s)) x(s)f (s) + h0 (u (s))ce (s; e (s)) f 0 (s)+
+ rh0 (u (s))f (s)
3 (s) rf (s)
1
ces (s; e (s)) +
r
2 (s)
1
cess (s; e (s)) +
r
2 (s)
1
cees (s; e (s)) x(s)
r
where employing (19), (20) and (27), we substituted x(s) for e0 (s), 1r ce (s; e (s)) x (s) for u0 (s) and
rh0 (u (s))f (s)
3 (s) rf (s)
for
0
2 (s).
Clearly, n = 1 and thus the condition in (73) requires that
1
y 00 (e (s))f (s) + h00 (u (s)) [ce (s; e (s))]2 f (s) + h0 (u (s))cee (s; e (s)) f (s) +
r
2 (s)
1
cees (s; e (s))
r
0
(74)
along the solution to (25)-(33). Since y 00 (e) < 0, h00 (u) > 0, h0 (u) > 0, cee (s; e) > 0 and
a su¢ cient condition for (74) to be satis…ed is that cees (s; e (s))
0,
0 along this solution. However,
this additional condition on the cost function c( ; ) is not necessary.
42
2 (s)
Appendix A5. The Optimal Contract when the Monotonicity Constraint Binds
To simplify exposition, we assume that it is optimal for P to induce positive e¤ort levels for all
o
n
types, i.e, that the optimal value of sb is s. Denote by fe (s); w (s)gs2[s;s] ; wn the optimal
contract when incorporating the monotonicity constraint in (15) into P’s maximization problem,
and assume that there exist intervals in [s; s] for which this constraint binds and thus e ( ) is
constant. To account formally for this additional constraint, we construct a new Hamiltonian as
H (e; u; v; x;
1;
2;
3;
4 ; s)
H (e; u; v; x;
1;
2;
3 ; s)
+
4(
x)
(75)
where H ( ) is as de…ned in (24). In addition to the necessary conditions identi…ed in (26)-(94),
(1)
which must still be satis…ed, Pontryagin’s Maximum Principle50 implies that there exists a Cp
function
4 (s)
such that (25) is replaced with
@H
=
@x
1 (s)
+
1
ce (s; e (s))
r
2 (s)
4 (s)
=0
(76)
= 0 if x(s) < 0
(77)
while the corresponding complementary slack conditions are
x(s)
Moreover,
4 (s)
0;
4 (s)
0, with
4 (s)
is continuous whenever x(s) is continuous (in this situation, since we do not have
a bang-bang solution, the optimal control is continuous everywhere). To understand (76) and (77),
note by inspecting the relaxed problem in (18)-(23), that since H ( ) is linear, we have x(s) = 0 in
the optimal solution whenever
@H
@x
(s) > 0. The newly de…ned function
captures precisely the nonnegative gradient
@H
@x
4 (s)
=
@H
@x
(s)
@H
@x
(s)
(s). In other words, to deal with the additional
monotonicity constraint in (15), rather than de…ning H and then imposing (76) and (77), we could
50
See Theorem 6.1 in Caputo (2005) on page 152 for the version with constraints on the control employed here.
43
@H
@x
have instead added a complementary slack condition
and x(s)
(s) x(s) = 0, together with
@H
@x
(s)
0
0 to the set of conditions (25)-(94). The key additional information that Pontryagin’s
Maximum Principle applied to the non-relaxed problem delivers, and which we do employ below,
is that
@H
@x
(s) is continuous when x(s) is continuous.
The only impact that these changes have on our previous analysis is on the argument and
result of proposition 11. In particular, since
@H
@x
4 (s)
is not di¤erentiable, we cannot di¤erentiate
= 0 with respect to s at all s 2 [s; s], as we did in the proof of that proposition. Consider
thus an interval [s0 ; s00 ]
[s; s] on which e (s) is constant, and thus e (s) = e (s0 ) = e (s00 ) for all
s 2 [s0 ; s00 ], which by (16) also implies that w (s) = w (s0 ) = w (s00 ) for all s 2 [s0 ; s00 ]. Note then
that we can replicate the argument from the proof of proposition 11 for all s such that x (s) < 0
in the optimal contract. Thus we can determine the e¤ort and wage at every s with x (s) < 0 by
employing the same conditions identi…ed in the case when the monotonicity constraint does not
bind; the fact that w (s) is constant on [s0 ; s00 ] and continuous everywhere implies that values for
w (s) can be imputed for all s 2 [s; s] in (36), (37) and (13) since these values equal w (s0 ) which
has been determined (also, values for e (s) can be imputed in (13)). However, the resulting wage
and e¤ort schedules will be functions of interval endpoints s0 and s00 .
To determine these values, note that since
0, which from (76) implies then that
Thus, it must be that
Z
s00
s0
Noting that
4
d
ds
4(
) is continuous, it must be that
0
0
0
0 1
1 (s ) + 2 (s ) r ce (s ; e (s ))
1 (s)
+
2 (s)
=
0
4 (s )
=
00
4 (s )
=
00
00 1
00
00
1 (s ) + 2 (s ) r ce (s ; e (s )).
1
ce (s; e (s)) ds = 0
r
(78)
does not appear in the expressions implied by Pontryagin’s Maximum Principle for
44
either
d
ds
0
1 (s)
or
1 (s)
+
=
0
2 (s),
2 (s)
by the same argument as in the proof of proposition 11, we have that
1
ce (s; e (s)) =
r
ce (s; e (s))
f (s) + ces (s; e (s))
u0 (w (s))
Z
s
1
u0 (w
s
1
( ))
u0 (wn )
y 0 (e (s))f (s)
f ( )d
It follows then from (78) that we must have
Z
s00
s0
ce (s; e (s))
f (s) + ces (s; e (s))
u0 (w (s))
Z
s
s
1
u0 (w
1
( ))
f ( )d
u0 (wn )
y 0 (e (s))f (s) ds = 0
(79)
Equation (79) together with e (s0 ) = e (s00 ) constitute a system of two equations in two unknowns
that allows determining the values for s0 and s00 . This system may have several solutions, corresponding to a case where there are multiple intervals on which e (s) is constant. It is also worth
noticing here that w (s0 ) = w (s00 ) and e (s0 ) = e (s00 ) would not constitute an alternative system
of equations to determine s0 and s00 . Given (16), these two conditions always hold simultaneously
by construction when eliciting the wage and e¤ort schedules as functions of s0 and s00 . Moreover,
the condition in (79) is necessary to be satis…ed by s0 and s00 and thus needs to be imposed.
Appendix A6.
Proof of Corollary 14. We have
d
[y (e (s))
ds
rw (s)] =
d
[y (e (s))
ds
= y 0 (e (s)) e0 (s)
rh(u (s))]
rh0 (u (s))u0 (s) = e0 (s) y 0 (e (s))
ce (s; e (s))
u0 (w (s))
(s))
where we employed (20) for the last equality. Note that from (37), we have y 0 (e (s)) cue0(s;e
(w (s)) =
Z sh
i
ces (s;e (s))
1
1
f (s)
u0 (w ( ))
u0 (wn ) f ( )d . Since the integral was shown to be strictly positive on
s
(s; sb) in remark 12, while e0 (s) < 0, it follows, as required, that
45
d
ds
[y (e (s))
rw (s)] < 0.
Proof of Lemma 8.
We present here the details left out of the proof presented in the main text.
To show the su¢ ciency of the necessary conditions, we appeal to the main theorem in Seierstad
(1984). To apply it, we need to show several facts. (i ) The functions sb ! e (b
s), sb ! u (b
s) and
sb ! v (b
s), obtained by solving the necessary conditions in (25)-(32) for each …xed value of sb, must
(1)
be Cp . The …rst two requirements are part of assumption 7, while the last follows from them by
the de…nition of the state variable v. (ii ) The costate variables should uniquely satisfy (25)-(28) for
given trajectories of the state variables, but then the ensuing Note 1 states that this requirement,
which is not necessarily obviously satis…ed here, can be dropped from the text of the theorem.
(iii ) The function (b
s)
H (e (b
s) ; u (b
s) ; v (b
s) ; x (b
s) ;
(b
s) ;
1
the property that there exists some sb0 2 [s; s] such that (b
s)
2
(b
s) ;
3
(b
s) ; sb) should have
0 for sb < sb0 and (b
s)
sb > sb0 . In our case, given the de…nition of H and (25), we have (b
s) = [y (e(b
s))
s)
3 [ru(b
0 for
rh (u(b
s))] f (b
s) +
c (b
s; e(b
s))] f (b
s). Note that
d
(b
s)
db
s f (b
s)
=
=
d
[y (e (b
s))
db
s
d
[y (e (b
s))
db
s
ru0 (b
s)
rh(u (b
s))] +
3
rh(u (b
s))]
s; e(b
s))
3 cs (b
cs (b
s; e(b
s))
ce (b
s; e(b
s)) e0 (b
s)
<0
where for the second equality we used (19)-(20) to cancel out the two terms, while for the inequality
we used the result obtained in the proof of corollary 14, and the facts
the monotonicity of
(b
s)
f (b
s) ,
there exists sb0 2 [s; s] such that
(b
s)
f (b
s)
3
> 0 and cs > 0. Thus, by
0 for sb < sb0 and
(b
s)
f (b
s)
0. Since
f (b
s) > 0 for all sb, the third condition of the theorem in Seierstad (1984) is immediately satis…ed. (iv )
The last requirement of the theorem in Seierstad (1984) is that the control variable has a bounded
support, which is clearly not satis…ed here. However, this assumption is essentially employed
R sb
to conclude that the following supremum is …nite
sup
rh (u(s))] f (s)ds
s [y (e(s))
where S
ru (b
s)
{fe(s); u(s); v(s)gs2[s;bs] :
u0 (s)
=
fe(s);u(s);v(s)gs2[s;b
s] 2S
1
0
0
r ce (s; e (s)) e (s), v (s)
= [ru (s)
c (s; e (s))] f (s),
s) = vb} for all vb in a neighbourhood of un . Since by
c (b
s; e (b
s)) = 0, v(s) = 0, and v(b
assumption 7, this supremum is …nite when vb = un , it is clearly …nite also in a neighbourhood of
46
that value by the smoothness of all functions involved. This completes the proof of lemma 8.
Appendix A7. Proof of Proposition 16
We show that there exists a wage pro…le that can implement the full-information e¤ort pro…le
fe0 (s)gs2[s;s] , i.e., that can satisfy all the incentive constraints in P’s optimal contract problem
under moral hazard and adverse selection. Moreover, when u is high enough, this contract delivers
to A the same ex-ante expected wage as in the case with full information, implying that the
corresponding contract is optimal since its value attains the upper bound, i.e., the value of the
optimal contract under full information.
Rs
Thus, let w (s) be de…ned by rw (s) c (s; e0 (s)) = 0, let w (s) = w (s) s ce ( ; e0 ( ))e00 ( )d
i
h
Rs
for s 2 [s; s), and let wn = 1 1 r u
[rw
(s)
c(s;
e
(s))]
f
(s)ds
. This wage pro…le satis…es (11)
0
s
and (13). Moreover, it also satis…es (16), which combined with e00 (s) < 0 implies that it satis…es
Rs
Rs
(10). On the other hand, s [rw (s) + (1 r) wn ] f (s)ds = u + s c(s; e0 (s))f (s)ds, which equals
the value of A’s expected wage under full information.
Note now that w (s) > 0 for all s 2 [s; s] (since w (s) = 1r c (s; e0 (s)) > 0, ce > 0 and e00 ( ) < 0),
Rs
but generically one cannot guarantee that wn 0. However, the term s [rw (s) c(s; e0 (s))] f (s)ds
from the de…nition of wn , which is strictly positive by (11), is also independent of u. To see
the latter, recall from section 3.1 that when A is risk neutral, the full-information e¤ort pro…le
fe0 (s)gs2[s;s] is de…ned by ce (s; e0 (s)) = y 0 (e0 (s)), which is independent of u, while the wage pro…le
fw (s)gs2[s;s] is de…ned above as a function of fe0 (s)gs2[s;s] . Thus, wn
0 if and only if u is high
enough. When wn , as de…ned above, is negative, by corollary 15, the optimal e¤ort level is given
by ce (s; e (s)) f (s) + ces (s; e (s)) (1
3 ) F (s)
= y 0 (e (s))f (s). Since by (39), we have
3
1, it
follows that this e¤ort level is lower or equal to e0 (s), which satis…es ce (s; e0 (s)) = y 0 (e0 (s)). This
completes the proof of proposition 16.
47
Appendix A8. Proof of Lemma 17
By the Dynamic Envelope Theorem it follows that
V 0 (r) =
Z
s
sb
@
H (e(s); u(s); v(s); x(s); s) f (s)ds
@r
@ n
u
@r
@
[ru(s)
@r
o
s 0
2 (s) 2 c (e(s))x(s) + 3 (s) u(s)f (s) ds
r
s)
3 (b
=
=
Z
Z
s
s
sb
sb n
h(u(s))f (s)
@
f(1
@r
h(u(s)) + h0 (un )u(s) f (s)
r) h(un )g +
2 (s)
2 (s)
r
3 (s)
Z
Z
+
sb
s
sb
[h0 (un )
s
u (s)
s
Z
s
h0 (un )
+ h(un ) + u(s)
h0 (un )un + u(s)
h0 (u( ))] f ( )d , while by (20),
h(u(s)) + h0 (un )u(s) f (s)ds + h(un )
0
n
= h0 (un ).
Rs
=
we have 1r ce (s; e(s)) x(s) = u0 (s), it follows that
V 0 (r) =
s) u
3 (b
1
ce (s; e(s))x(s) ds + h(un )
r2
where for the last equality we used the fact that
Now, since as elicited in appendix A4,
c(s; e(s))]
h0 (u( )) f ( )d
h0 (un )un
ds + u(s)
(80)
s
Integrating by parts the second integral in (80), we have
Z
s
=
sb
u0 (s)
u(s)
Z
Z
s
h0 (un )
h0 (u( )) f ( )d
s
s
0
n
h (u )
0
h (u( )) f ( )d
s
Z
=
s
because u(b
s)
R sb
s
sb
s
u(s) h0 (un )
[h0 (un )
sb
h0 (u(s)) f (s)ds
h0 (u( ))] f ( )d =
ds
Z
s
sb
u(s) h0 (un )
h0 (u(s)) f (s)ds
u(s)
u(b
s) since the integral equals
48
by (70).
Substituting this result into (80), we obtain that
0
V (r) =
Z
s
=
Z
s
sb
h(u(s)) + h0 (un )u(s) f (s)ds + h(un )
Z
s
sb
u(s) h0 (un )
sb
h0 (u(s)) f (s)ds
h0 (un )un + u(s)
u(s)
h(u(s)) + u(s)h0 (u(s)) f (s)ds + h(un )
h0 (un )un
which by using the facts that u(s) = u(w(s)), un = u(wn ), h0 (u(s)) =
1
u0 (w(s))
and h0 (un ) =
1
u0 (wn )
imply the result of lemma 17.
Appendix A9. Proof of Proposition 18
Denote by z n
1
u0 (wn )
1
u0 (w (s))
and z(s)
zn =
and note that (36) with sb = s implies
Z
s
z (s) f (s)ds
(81)
s
1
On the other hand, solving z = u0 (w)
for w to get w = (u0 ) 1
h
i
zu (u0 ) 1 z1
(u0 ) 1 z1 . Thus, (40) for sb = s becomes
V 0 (r) =
Z
s
z (s) u
u0
1
z (s)
1
s
znu
1
u0
1
zn
1
z
, it follows that we have
u0
1
1
z (s)
1
u0
f (s)ds
1
zn
Denoting by
'(z)
u0
zu
1
z
1
u0
1
1
z
and using (81) for the second equality, we have that
0
V (r) =
Z
s
s
'(z (s))f (s)ds
n
' (z ) =
Z
s
'(z (s))f (s)ds
s
'
Z
s
49
s
z (s) f (s)ds
u(w)
u0 (w)
w=
Rs
Rs
Rs
We will show next that (i ) ' s z (s) f (s)ds ' s z (s) f (s)ds
0, and (ii ) s '(z (s))f (s)ds
Rs
' s z (s) f (s)ds > 0, which would be enough to conclude that V 0 (r) > 0. To show (i ), since
0, it is su¢ cient to prove that ' is increasing. To show (ii ), we employ Jensen’s Inequality, for
which we need to prove that ' is strictly convex.
We have
'0 (z) = u
u0
1
= u
u0
1
1
z
+ zu0
1
z
1
u0
u00 (u0 )
1
z
h
where we used the fact that u0 (u0 )
1
1
z
1
h
i
1
z.
=
1
1
z
1
z2
i
1
h
u00 (u0 )
Since u (w)
0, for w
1
z2
1
1
h
3
z u00 (u0 )
1
1
z
i
1
z2
0, it follows that
'0 (z) > 0, as required for (i ). On the other hand,
'00 (z) = u0
u0
1
1
z
h
1
u00 (u0 )
1
1
z
i
=
1
1
z
i
Thus, '00 (z) > 0 when u is strictly concave. Therefore, (ii ) is also satis…ed. This completes the
proof of proposition 18.
Appendix A10. Proof of Proposition 19
Since ce > 0, if A accepts the contract fwn ; wa ; ea g, then after learning his type, he exerts either
e¤ort ea or 0. By making the standard transformations un
u(wn ), ua
u(wa ) and employing
the inverse utility function h ( ) de…ned earlier, P’s problem is to choose e; ua ; un so as to maximize
pa y (e) rpa h (ua ) (1
r) h (un ) subject to rua c(sa ; e)
0 and pa [rua
c(sa ; e)]+(1
r) un = u,
where we employed the fact that the participation constraint bind at optimum. The Lagrangian
for this problem is L(e; ua ; un ;
1;
2)
fpa y (e)
rpa h (ua )
50
(1
r) h (un )g +
1 [ru
a
c(sa ; e)] +
2 fp
a [rua
c(sa ; e)] + (1
r) un
@L
@ua
@L
@un
@L
e
@e
@L
1
@ 1
ug. The necessary …rst order equality conditions are
=
rpa h0 (ua ) +
=
(1
r)h0 (un ) +
= e pa y 0 (e)
=
1 [ru
a
2 rp
2 (1
a
=0
(82)
r) = 0
(83)
a
1 ce (s ; e)
c(sa ; e)] + (1
while the necessary inequality conditions are
2
+
2p
a
ce (s; e) = 0
(84)
c(sa ; e)] = 0
@L
= pa [rua
@ 2
that (83) implies
1r
@L
@e
(85)
r) un
0; rua
= h0 (un ), and then that (82) implies
u=0
c(sa ; e)
1
(86)
0;
= pa [h0 (ua )
0 and
1
2
> 0. Note
h0 (un )].51
We consider the following functional forms for the fundamentals of the model: y(e) = e, u(w) =
w
1
pa
with
> 1 (thus, implying h(u) = u ), and c(s; e) = s 1 e
with
> 1, where s 2 fsa ; sc g and
Prfs = sa g. With these functional forms, we set the model parameters as follows
= 1:6,
= 1:2, sa = 0:2, pa = 0:85 and u = 1. The values for r are chosen in the interval [0:11; 0:99] where
the value of the resulting optimal contract is positive if P implements positive e¤ort.
To solve for the optimal contract for a particular set of parameters ( ; ; sa ; ps ; u; r), we substituted for
1
and
2,
as derived above from (82)-(83), into (84)-(86) and obtained a system of
3 non-linear equations in 3 unknowns (ua ; un ; ea ) amenable to be solved numerically. We veri…ed
that the solution to this system corresponds to positive values for ua , ea ,
rua
c(sa ; e)
0 and pa y (e)
rpa h (ua )
(1
1
and
2,
and that
r) h (un ) > 0, i.e., that P has a weakly positive
expected payo¤ from the resulting contract. Since (i ) P’s expected payo¤ is strictly positive at the
unique critical point of the Lagrangian that we obtained, (ii ) the set of P’s feasible expected payo¤s
is bounded from above by the …nite expected payo¤ from the …rst-best case of full information,
(iii ) P’s expected payo¤ is continuous as a function of the contract variables, we conclude that the
51
It can be shown that V 0 (r) = pa [h0 (ua ) ua
h (ua )]
[h0 (un ) un
51
h (un )], which cannot be signed generically.
critical point corresponds to a global maximum.
Appendix A11. Proof of Proposition 20
If P can credibly promise to make a payment, w3c , when an audit is performed and it reveals that
n
o
A exerted no e¤ort, P’s problem is to select a contract sb 2 [s; s]; w3n ; w3c ; fe3 (s); w3 (s)gs2[s;bs] to
solve the problem
max
sb;wn ;wc ;fe(s);w(s)gs2[s;b
s]
Z
s
sb
[y (e(s))
rw(s)] f (s)ds
s.t. s 2 arg max [ru (w(e
s))
r [u (w(s))
wc ]
max [r [u (w(e
s))
Z
s
sb
se2[s;b
s]
[ru (w(s))
se2[s;b
s]
c (s; e (s))
wc ]
r [1
F (b
s)] wc
c (s; e (e
s))]
(89)
0, for all s 2 (b
s; s]
r) u (wn ) + r [1
(87)
(88)
0, for all s 2 [s; sb]
c (s; e (e
s))]
c (s; e (s))] f (s)ds + (1
r) wn
(1
(90)
F (b
s)] u (wc )
u.
(91)
Making the same transformations as in the solution for the optimal contract without commitment,
and denoting by uc
u (wc ), the optimal control problem for this case is the same as the one de…ned
by (18)-(23), only that un is replaced in (22) by unc (b
s)
is replaced by r [u (b
s)
uc ]
c (b
s; e (b
s))
u
(1
r)un
r [1
F (b
s)] uc , and (23)
0 and = 0 if sb < s. The Hamiltonian H3 associated with
this problem takes the same form as H de…ned in (24). The corresponding necessary conditions
elicited by the Pontryagin’s Maximum Principle are the same as those in (25)-(32), only that (32)
is replaced by
0, with
= 0 and sb = s if r [u (b
s)
uc ]
c (b
s; e (b
s)) > 0
(92)
Next, condition (33) is replaced by
H3 (e (b
s) ; u (b
s) ; v (b
s) ; x (b
s) ;
s) ;
1 (b
s) ;
2 (b
s) ; sb)
3 (b
52
3 ru
c
f (b
s)
0, and = 0 if sb < s
(93)
Finally, denoting by V3 (un ; uc ) the optimal value function of this optimal control problem, as a function of the variables un and uc , the following …rst order conditions
0 and
d
duc
[V3 (un ; uc )
r [1
d
dun
[V3 (un ; uc )
(1
r)h(un )] =
F (b
s)] h(uc )] = 0 are necessary. The …rst of these two conditions im-
plies by the same argument as in section 3.3 that
hand, the second condition implies
[1
3 (s)
nc
s) @u
3 (b
@uc
r
F (b
s)] h0 (uc ) = [1
= h0 (un ), for all s 2 [s; sb]. On the other
F (b
s)] h0 (uc ) = 0, i.e.,
r [1
F (b
s)] h0 (un )
(94)
By the same argument as in the proof of Lemma 10, it follows that (70) must hold in this
situation as well. Substituting in (70) the value of
from (94), we conclude that the following
condition, which is the counterpart of (36), must be satis…ed by the optimal contract
Z
s
sb
F (b
s)] h0 (uc )
h0 (u (s))f (s)ds + [1
h0 (un ) = 0
(95)
Denoting by V3 (r) the value of the optimal contract as a function of r, by the Dynamic Envelope
Theorem and employing the fact
V30 (r)
=
Z
s
sb
3 (s)
= h0 (un ), we have that
@
H3 (e(s); u(s); v(s); x(s); s) f (s)ds
@r
s)
3 (b
@ nc
u
@r
@
@
f(1 r) h(un ) + r [1 F (b
s)] h (uc )g +
fr [u(b
s) uc ] c(b
s; e(b
s))g
@r
@r
Z sb n
o
s 0
0 n
=
h(u(s))f (s)
2 (s) 2 c (e(s))x(s) + h (u )u(s)f (s) ds
r
s
=
Z
h0 (un ) fun
s
sb
F (b
s)] h (uc ) + [u(b
s) uc ]
Z sb
Z s
0 n
0
h(u(s)) + h (u )u(s) f (s)ds +
u (s)
h0 (un ) h0 (u( )) f ( )d
+h(un )
[1
F (b
s)] uc g + h(un )
[1
s
[1
F (b
s)] h (uc )
where for the last equality, we substituted
h0 (un ) fun
2 (s)
r
=
53
Rs
s
ds
s
[1
[h0 (un )
F (b
s)] uc g + [u(b
s)
uc ]
h0 (u( ))] f ( )d and 1r ce (s; e(s)) x(s) =
u0 (s). Integrating by parts, as in the proof of lemma 17, we have that
Z
s
sb
0
u (s)
Z
s
0
n
0
h (u )
h (u( )) f ( )d
Z
ds =
s
s
sb
u(s) h0 (un )
h0 (u(s)) f (s)ds
Z
h0 (u(s)) f (s)ds
+u(b
s)
s
Since by (95), we have
V30 (r)
=
Z
s
sb
R sb
s
[h0 (un )
Z
h(u(s)) + h (u )u(s) f (s)ds
s
n
s) [1
+h(u ) + u(b
Z sb
=
h0 (u(s))u(s)
0
c
sb
u(s) h0 (un )
h (un )
0
F (b
s)] h (u )
h(u(s)) f (s) ds + u(b
s) [1
h0 (un )
F (b
s)] [h0 (uc )
h0 (u( ))] f ( )d = [1
n
0
sb
h0 (un )], it follows that
h0 (u(s)) f (s)ds
h0 (un ) fun
F (b
s)] h (uc )
[1
F (b
s)] uc g + [u(b
s)
[1
F (b
s)] h0 (uc )
h0 (un )
uc ]
F (b
s)] h (uc )
[1
s
+h(un ) h0 (un ) fun [1 F (b
s)] uc g + [1 F (b
s)] h0 (un )
Z sb
=
h0 (u(s))u(s) h(u(s)) f (s) ds + [1 F (b
s)] h0 (uc )uc
h0 (uc ) [u(b
s)
uc ]
h (uc ) + h(un )
n
h0 (un )u(96)
s
where for the second equality, we substituted the value of
derived from (94). Given then the
results in (95) and (96), by the same argument as in the proof of proposition 18, it follows that
V30 (r) > 0. This completes the proof of proposition 20.
Appendix A12. Proof of Proposition 22
Di¤erentiating the equality in (54) with respect to s, we have
(57) and (59), it follows that (s) = h0 (u (s))
equals a nonnegative constant
0
2 (s)
= rh0 (un (s))f (s)
r
3
1 r 0
2 (s)
r
+
0
4 (s)
= 0. Employing
h0 (un (s)). Next, (58) and (60) imply that
3 (s)
for all s. Employing these results into (57), we conclude that
3 f (s).
Integrating this equality between s and any arbitrary s 2 [s; s],
Rs
and accounting for 2 (s) = 0 from (60), we have then 2 (s) = r s [h0 (un (t))
3 ] f (t)dt. Applying
Rs 0 n
this result at s, where 2 (s) = 0, it follows that 3 (s) = 3
s h (u (t))f (t)dt for all s 2 [s; s].
Moreover, since h0 > 0 it follows that
3
> 0 and thus that (44) is satis…ed with equality at
54
optimum. Collecting these …ndings into (61), we obtain condition (62) from the text of proposition
22 once we account for the fact that h is strictly convex and thus h0 is strictly increasing.
Di¤erentiating now the equality in (53) with respect to s, as in (71), and then employing (55)
and (57) to substitute for
0
1 (s)
0
2 (s),
and
y 0 (e) f (s) + (s) ce (s; e (s)) f (s)
+ rh0 (u (s))f (s)
2 (s)
1
cee (s; e (s)) x (s) +
r
3 (s) rf (s)
Substituting into (97) the expression for
0
h (u(s))ce (s; e (s)) f (s) +
Z
s
0
n
2 (s)
h (u ( ))
s
1
ce (s; e (s)) +
r
3 (s) ce (s; e (s)) f (s)
2 (s)
derived above, we obtain
Z
s
h0 (un (t))f (t)dt f ( )d
ces (s; e (s)) = y 0 (e)f (s)
s
which can be rewritten as in (63) in the text of proposition 22. Note also here that since
r [h0 (un (s))
+
1
1
ces (s; e (s)) + 2 (s) cee (s; e (s)) e0 (s) =
r
r
1
y 0 (e)f (s) + h0 (u (s))f (s)ce (s; e (s)) + 2 (s) ces (s; e (s)) = 0
(97)
r
(s)rf (s)
=
we have
3 ] f (s),
2 (s)
= 0,
2 (s)
= 0, and
the proof of remark 12, we can conclude that
d
ds
2 (s)
0
2 (s)
=
[h0 (un (s))] < 0, by the same argument as in
> 0 for all s 2 [s; s] to prove remark 23.
To evaluate the e¤ect of r on the optimal value of the contract with communication, which we
denote here by V+ (r), employing the Dynamic Envelope Theorem, we have
V+0 (r)
Z s
@
L+ (e(s); u(s); un (s); v(s); x(s); k(s); 1 (s); 2 (s); 3 (s); 4 (s); (s); s) ds
=
@r s
)
Z s(
n
[ h(u(s)) + h(un (s)) + (s)u(s) + 3 (s) u(s)
3 (s) u (s)] f (s)+
=
ds
+ 2 (s) r12 [k(s) ce (s; e(s))x(s)]
s
#
Z s ("
h(u(s)) + h(un (s)) + u(s) [h0 (u (s)) h0 (un (s))]
1
n0
=
f (s) +
2 (s) u (s)
n
r
+
[u(s)
u
(s)]
s
3
where for the third equality we used (49) to substitute for k(s)
k(s) = un0 (s) as well as the result derived above for (s).
55
u0 (s)
ce (s; e(s))x(s) and then the fact
)
ds
Integrating by parts the second term in the expression for V+0 (r) derived above, we have
Z
s
s
=
1
r
n0
2 (s) u (s)
n
[u (s)
u(s)]
u0 (s) ds =
Z
Z
s
un0 (s)
u0 (s)
s
s
0
n
h (u (t))
Z
s
h0 (un (t))
3
f (t)dtds
s
Z
s
3
f (t)dt
s
s
[un (s)
u(s)] h0 (un (s))
f (s)ds
3
s
s
Z
=
s
[un (s)
u(s)] h0 (un (s))
3
f (s)ds
s
where for the last equality we used the fact that
3
=
term in the previous expression equals zero.
Rs
s
h0 (un (t))f (t)dt to conclude that the …rst
Substituting this result into the expression for V+0 (r) we obtain
V+0 (r) =
=
Z
s
s
Z
s
"
h(u(s)) + h(un (s)) + u(s) [h0 (u (s))
+
3 [u(s)
u(s)h0 (u (s))
un (s)]
[un (s)
h0 (un (s))]
u(s)] [h0 (un (s))
3]
#
f (s)ds
h(u(s))
un (s)h0 (un (s)) + h(un (s)) f (s)ds
uh0 (u)
h(u) we have
s
Now, note that for the function
(u)
0 (u)
= h00 (u), which is strictly
positive, as argued above. Therefore, using the fact that u(s) un (s), we conclude that V+0 (r) =
Rs
(un (s))] f (s)ds 0. This completes the proof of proposition 22.
s [ (u(s))
The generalized Legendre-Clebsch condition for this problem is a combination of the corresponding condition for problems with multiple controls (see Theorem 6.2 in Krener (1977)) and the
condition for problems with state constraints (see conditions (84) or (85) Seywald and Cli¤ (1993)).
Thus, on intervals in [s; s] on which the constraint in (52) does not bind, the condition stated in
Krener (1977) applied to our problem requires that the following matrix52
0
@
@
@x
@
@k
h
d
2
h ds2
d
ds2
@L+
@x
@L+
@x
i
i
@
@x
@
@k
h
d2
2
ds
h 2
d
ds2
@L+
@k
@L+
@k
i 1
i A
(98)
52
We use here the fact that we have a pure state constraint and thus the …rst order derivatives with respect to the
control variables of the Lagrangian L+ and Hamiltonian H+ L+
[ru c(s; e)] are identical.
56
be symmetric and negative semide…nite when evaluated at the candidate solution, where we accounted for the fact that x and k appear in the second order derivatives with respect to s of
and
@H+
@k .
@H+
@x
On the other hand, on intervals in [s; s] where the constraint in (52) binds, applying
the result from Seywald and Cli¤ (1993) and other standard results from multivariate constrained
optimization (for instance, Theorem 19.7 on page 461 in Simon and Blume (1994)), it follows that
it is necessary that the following determinant be nonnegative at the candidate solution53
0
@ d
@x ds
@ d
@k ds
[ru
c(s; e)]
[ru
c(s; e)]
We have already showed that
d
ds
@L+
@x
@ d
[ru
@x ds h
d
@
@x h ds2
@
d2
@k ds2
=
c(s; e)]
i
@L+
@x
@L+
@x
i
@ d
[ru
@k ds h
d2
@
@x h ds2
@
d2
@k ds2
r) h0 (u(s))f (s) + (1
r) (s)f (s) + (1
@L+
@k
@L+
@k
(99)
i
y 0 (e)f (s)+h0 (u (s))f (s)ce (s; e (s))+
in (97). On the other hand, employing (57) and (59), we have
(1
c(s; e)]
i
d
ds
@L+
@k
=
1
2 (s) r ces (s; e (s))
1 r 0
2 (s)
r
+
0
4 (s)
=
r) h0 (un (s))f (s). Then, suppressing arguments of the
various functions when there is no risk of confusion, we have
d2
ds2
@L+
@x
1
cees x + K1
r
r
1
1
1 r
k + ce x f ce + h0 (u)cee x + 2 cees x + K2
r
r
r
=
y 00 xf + h00 (u)u0 f ce + h0 (u)cee x +
=
y 00 xf + h00 (u)
0 1
2 c
+
2
where for the second equality, we used (49) and (57). K1 and K2 are terms that do not depend on
either x or k. On the other hand, (K3 and K4 again do not depend on the controls) we have
d2
ds2
53
@L+
@k
=
(1
r) h00 (u)u0 f + (1
=
(1
r) h00 (u)
1
r
r) h00 (un )un0 f + K3
1
k + ce x f + (1
r
r
r) h00 (un )kf + K4
The function g from the result in Seywald and Cli¤ (1993) (de…ned in equation (37)) is here
57
d
ds
[ru (s)
c(s; e)].
where for the second equality, we used (49) and (48). It follows then that
@ d2
@x ds2
@ d2
@k ds2
@L+
@x
@L+
@x
@ d2
@k ds2
@L+
@k
Finally, we have
d
ds
[ru
=
r)2
(1
=
c] = ru0
@ d
[ru
@x ds
1
y 00 f + h00 (u) (ce )2 f + h0 (u)f cee +
r
2
@ d
@L+
1 r 00
=
h (u)f ce
2
@x ds
@k
r
=
r
cs
c(s; e)] = 0 and
(1
r) k
@ d
[ru
@k ds
1
cees
r
r) h00 (un )f
h00 (u)f + (1
ce x =
2
cs using (49). Therefore,
c(s; e)] =
(1
r)
2
@L+
@ d
< 0, whereas the determinant
Now, assuming again that cees 0, it follows that @x
@x
ds2
h
i
ih
2
of the matrix in (98) is y 00 f + h00 (u) 1r (ce )2 f + h0 (u)f cee + 2 1r cees (1 rr) h00 (u)f + (1 r) h00 (un )f
2
1 r 00
r h (u)f ce
> 0. Therefore, the matrix in (98) is indeed negative semide…nite. On the other
h
i
hand, the determinant in (99) equals (1 r)2 y 00 f + h00 (u) 1r (ce )2 f + h0 (u)f cee + 2 1r cees > 0.
We conclude thus that the generalized Legendre-Clebsch condition is indeed satis…ed.
References
[1] Baiman, S. and J.S. Demski, 1980. "Economically Optimal Performance Evaluation and Control Systems," Journal of Accounting Research, 18, 184-220.
[2] Ben-Porath, E., E. Dekel, and B. Lipman, 2014. "Optimal Allocation with Costly Veri…cation,"
American Economic Review, 104, 3779-3813.
[3] Bolton, P. and M. Dewatripont, 2005. Contract Theory. MIT Press, Cambridge, MA.
[4] Border, K.C. and J. Sobel, 1987. "Samurai Accountant: A Theory of Auditing and Plunder,"
Review of Economic Studies, 54, 525-540.
58
[5] Bryson, A.E. and Y.C. Ho, 1975. Applied optimal control. Hemisphere Publishing Corp, Washington, D. C..
[6] Caputo, M. R., 2005. Foundations of Dynamic Economic Analysis. Cambridge University
Press, Cambridge, UK.
[7] Cesari, L., 1983. Optimization - Theory and Applications. Springer, New York, NY.
[8] Hartl, R. F., S. P. Sethi and R. G. Vickson, 1995. "A Survey of the Maximum Principles for
Optimal Control Problems with State Constraints," SIAM Review, 37, 181-218.
[9] Kihlstrom, R. and J. La¤ont, 1979. "A General Equilibrium Entrepreneurial Theory of Firm
Formation Based on Risk Aversion," Journal of Political Economy, 87, 719-748.
[10] Knight, F., 1921. Risk, Uncertainty and Pro…t. Houghton Mi- in, Boston, MA.
[11] Krener, A.J., 1977. "The High Order Maximal Principle and Its Applications to Singular
Extremals," SIAM Journal of Control and Optimization, 15, 256-293.
[12] Melumad, N. H. and S. Reichelstein, 1989. "Value of Communication in Agencies," Journal of
Economic Theory, 47, 334-368.
[13] Mookherjee, D. and I. Png, 1989. "Optimal Auditing, Insurance and Redistribution," Quarterly
Journal of Economics, 104, 399-415.
[14] Mylovanov, T and A. Zapechelnyuk, 2014. "Mechanism Design with Ex-Post Veri…cation and
Limited Punishments," working paper.
[15] Rahman, D., 2012. "But Who Will Monitor the Monitor?," American Economic Review, 102,
2767-2797.
[16] Rochet, J-C. and L. Stole, 2002. "Nonlinear Pricing with Random Participation," Review of
Economic Studies, 69, 277-311.
59
[17] Seierstad, A., 1984. "Su¢ cient Conditions in Free Final Time Optimal Control Problems. A
comment.," Journal of Economic Theory, 32, 367-370.
[18] Seierstad, A. and K. Sydsaeter, 1987. Optimal Control Theory with Economic Applications.
North-Holland, Amsterdam, Netherlands.
[19] Seywald, H. and E.M. Cli¤, 1993. "The Generalized Legendre-Clebsch Condition on
state/control constrained arcs," AIAA Guidance, Navigation and Control Conference, Monterey, CA., AIAA Paper 93-3746.
[20] Simon C.P. and L. Blume, 1994. Mathematics for Economists. Norton, New York, NY.
[21] Strausz, R., 2006. "Timing of Veri…cation Procedures: Monitoring versus Auditing," Journal
of Economic Behavior & Organization, 59, 89-107.
[22] Townsend, R., 1979. "Optimal Contracts and Competitive Markets with Costly State Veri…cation," Journal of Economic Theory, 21, 265-293.
60