Next Article in Journal
Inequality Aversion and Reciprocity in Moonlighting Games
Previous Article in Journal / Special Issue
Bayesian Social Learning with Local Interactions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Insider-Outsider Model Reexamined

by
Pascal Billand
1,
Christophe Bravard
1 and
Sudipta Sarangi
2,*
1
Gate Lyon-Saint-Etienne, University Jean Monnet, Saint-Etienne, 42023 Cedex 02, France
2
DIW Berlin and Department of Economics, Louisiana State University, Baton Rouge, LA 70803, USA
*
Author to whom correspondence should be addressed.
Games 2010, 1(4), 422-437; https://doi.org/10.3390/g1040422
Submission received: 31 August 2010 / Accepted: 15 October 2010 / Published: 20 October 2010
(This article belongs to the Special Issue Social Networks and Network Formation)

Abstract

:
In this note we introduce different levels of decay in the Goyal, Galeotti and Kamphorst (GGK) insider-outsider model of network formation. First, we deal with situations where the amount of decay is sufficiently low to avoid superfluous connections in strict Nash networks and we examine the architectures of strict Nash networks. We show that centrality and small diameter are robust features of strict Nash networks. Then, we study the Nash and efficient networks when the decay vanishes.

1. Introduction

Social networks play a vital role in the diffusion of information across society in setting as diverse as referral networks for jobs (Granovetter, 1974) and assessing quality of products ranging from cars to computers (Rogers an Kincaid, 1981). The role played by networks has led researchers to develop theories of network formation. Several models have been proposed which address different types of network situations.
Our paper deals with the two-way flow connections model introduced by Bala and Goyal (2000a). In this model a player i can access a player j directly by forming a costly link with j. Moreover, through her link with j, player i accesses other players that player j is accessing on her own. Finally the link formed by player i creates a similar flow of information to player j, and hence the name two-way flow model. A phone call is a typical example given to illustrate this type of situation.
In the basic two-way flow model of Bala and Goyal (2000a), the transmission of information between two players is independent of the distance between these players in the network, that is there is no decay. Moreover, players are homogeneous, that is each player i benefits identically from accessing other players and all the costs associated with the setting of links do not depend on the identity of the initiator and the receiver of the link. In this context, Bala and Goyal (2000a) find that the set of equilibrium networks is very small, i.e., only the empty network and the inward-pointing star (a star network where the player at the center forms all the links) can be strict Nash networks.
Now in many situations they are delays as well as lowering of quality, when information is transmitted through a series of agents, making decay a significant factor. Moreover individuals are often heterogeneous. For instance some of them may be more interesting in a particular issue and therefore better informed which makes them more valuable as contacts.
In this paper, we focus on the impact of the introduction of both decay and players heterogeneity on the architectures of networks that will be formed in equilibrium. We ask what are the predictable patterns of networks that will emerge when players have the opportunity to set links between each other, in presence of decay in the flow of resources and players heterogeneity.1
Our paper revisits the insider-outsider model introduced by GGK (2006) and refines some of their results. The authors introduce heterogeneity of players in the two-way flow model of Bala and Goyal (2000a). More precisely, they assume that players belong to different groups and costs of forming links within groups is lower than costs of forming inter-groups links. The model is called the insider-outsider model in their paper. GGK (2006) first consider the transmission of value to be independent of the length of the paths between players, that is there is no decay. Then they introduce a small amount of decay into their framework to test the robustness of their findings.2 They show that for very small amount of decay and for intermediate costs of intra-groups and inter-groups links3, the empty network and the interlinked periphery-sponsored stars network are the only strict Nash networks. Note that a interlinked periphery-sponsored stars network satisfies two conditions. First, in each group there exists a player, called the center player, such that all other players of the group, called the periphery players, form a link with the center player. Second, there exists a player belonging to one group who forms a link with the center player of the other group.
In the paper we elaborate on the insider-outsider model introduced by GGK (2006) concerning decay in two directions. First, we deal with situations where the amount of decay is sufficiently low to avoid superfluous links in strict Nash networks and we examine the architectures of strict Nash networks. We show that in this situation the set of non-empty strict Nash networks is larger than in GGK (2006). It includes three other types of architectures in addition to interlinked periphery-sponsored stars networks. It is interesting to note that all these architectures share similar structural properties, namely small diameter and high asymmetries in centrality of players, since these properties are also features of equilibrium networks in the homogeneous model of Bala and Goyal (2000a) and the insider-outsider model without decay of GGK (2006). Second, we refine the result of GGK (2006) by assuming that the decay is sufficiently close to 1. More precisely, the class of interlinked periphery-sponsored stars networks, that the authors show as the unique non-empty strict Nash network contains two types of architectures. In the first one, the inter-groups link is sponsored by the center of a star, while in the second one this link is sponsored by a periphery player. We show that if the amount of decay is very low, then the second type of architecture cannot be strict Nash networks. So only the first type of architecture can be non-empty strict Nash networks. This result is important since it shows that strict Nash networks are also efficient networks when the amount of decay is low enough.4
The rest of the paper is organized as follows. In Section 2, we present the framework of our model. Section 3 addresses the results that we obtain and Section 4 concludes.

2. Model Setup

We consider a society in which individuals are divided into pre-specified groups and costs of forming links within the groups are lower as compared to costs of forming inter-groups links. To simplify, we assume that there are only 2 groups. Let N t = { 1 t , 2 t , , n ¯ t } be the set of players belonging to group t, t { 0 , 1 } . The set of players is N = N 0 N 1 . As in GGK (2006), we assume that | N 0 | = | N 1 | = n ¯ 4 .5 In the following we will assume that players who belong to the same group are similar and players who belong to different groups are different. In this paper the fact that two players are similar will allow them to have relationships which are less costly than the relationships between two players who are different. Indeed, if two players are similar they can communicate quickly (they speak the same language), while if two players are different (they speak different languages) the communication takes time and is most costly.
Each player i N is assumed to possess some information of value to other players. She can augment her information by communicating with other people. This communication is made possible via pair-wise links. A strategy of player i t N t , t { 0 , 1 } , is a vector g i t = ( g i t , 1 t , , g i t , ( i 1 ) t , g i t , ( i + 1 ) t , , g i t , n ¯ t , g i t , 1 1 t , , g i t , n ¯ 1 t ) , where g i , j { 0 , 1 } for each player j N . We say that player i has formed a link with player j in g iff g i , j = 1 . We assume throughout the paper that the link g i , j = 1 allows both players i and j to access each other’s information. The set of strategies of player i is denoted by G i . The set G = G 1 × × G n is the set of pure strategies of all players. A strategy profile g = ( g 1 , , g n ) can be represented as a directed network. We use g + g i , j ( g g i , j ) to refer to the network obtained when the link g i , j = 1 is added (removed) from g. Given a network g G , let g i denote the network obtained when all of player i’s links are removed from g. Let g ¯ i , j = max { g i , j , g j , i } . For a network g, a chain between player k and player j, j k , is a finite sequence j 0 , j 1 , , j m of distinct players such that g ¯ j , j + 1 = 1 and j 0 = j , j m = k . The distance d ( i , j ; g ) between i and j in g is given by the number of links in the shortest chain between i and j (if there is no chain between two players i and j in g we set d ( i , j ; g ) = ). The diameter of a network g is D ( g ) = max i , j N { d ( i , j ; g ) } . Let M t ( g ) = { ( i t , j t ) N t × N t \ { i } d ( i t , j t ; g ) d ( i , j ; g ) for all ( i , j ) N t × N t } be the couples of players who belong to the group N t that are at maximal distance in g. A network g is minimal if g i , j = 0 whenever there is a chain between i and j in g g i , j . A network g is connected if D ( g ) . Moreover we say that a group of players N t , t { 0 , 1 } , is connected in g if for any two players i , j N t d ( i , j ; g ) . A network g is minimally connected if it is connected and minimal. The subnetwork g ( N t ) , t { 0 , 1 } , of g is a network which consists of the players in N t and such that g ( N t ) i , j = g i , j for all i , j N t . Finally, we say that a player i is an end player if g ¯ i , j = 1 for one player j N \ { i } , and g ¯ i , k = 0 for all players k N \ { i , j } .
We now define five networks architectures that play a role in our results. A periphery-sponsored star (PSS) is a network g in which there exists a center player, i c ( g ) , such that g j , i c ( g ) = 1 for all j N \ { i c ( g ) } , and there are no other links. A center interlinked periphery-sponsored stars (CIPSS) is a network g in which g ( N t ) is a PSS for each t { 0 , 1 } and there is a link between the two centers. A non center interlinked periphery-sponsored stars (NCIPSS) is a network in which g ( N t ) is a PSS for each t { 0 , 1 } , and a non center player of a PSS forms a link with the center player of the other PSS. It is worth noting that CIPSS and NCIPSS are not treated as distinct architectures in GGK (2006), since the authors called both these architectures interlinked periphery-sponsored stars. A mixed star (MS) is similar to a PSS except that there is a unique player called j p ( g ) i c ( g ) such that g i c ( g ) , j p ( g ) = 1 instead of g j p ( g ) , i c ( g ) = 1 . A interlinked mixed stars network (IMS) is a network in which g ( N t ) is a MS, g ( N 1 t ) is a PSS, and j p ( g ( N t ) ) forms a link with i c ( g ( N 1 t ) ) . A distance 3 interlinked periphery-sponsored stars network (D3PSS) is a network such that g ( N 1 t ) is a PSS, and there are two players in N t , say i 2 t and i 3 t , such that g ( N t \ { i 3 t } ) is a PSS, g i 3 t , i c ( g ( N 1 t ) ) = 1 and g i 2 t , i 3 t = 1 . Figure 1 below depicts these architectures. In this figure, players in group N 0 are denoted by 0 and players in group N 1 are denoted by 1. In the following, we denote the set of networks which consists of all PSS, all CIPSS, all NCIPSS, all IMS, and all D3PSS, by A .
Figure 1. Networks architectures.
Figure 1. Networks architectures.
Games 01 00422 g001
To complete the definition of a normal-form game of network formation, we specify the payoffs. Let c L ( c H ) be the costs incurred by a player i N t , t { 0 , 1 } , when she forms a link with a player j N t ( j N 1 t ). We assume that c H > c L > 0 . Let δ 0 , 1 be the value of the decay parameter. Define N i ( g ) = { j N \ { i } there is a chain between i and j in g } as the set of players who are observed by player i in the network g. The payoff obtained by player i t N t , t { 0 , 1 } , in a network g is given by:
Π i t ( g ) = j N i t ( g ) δ d ( i t , j ; g ) j N t g i t , j c L + j N 1 t g i t , j c H
Note that this payoff function is identical to the one in GGK (2006) in their insider-outsider model with decay. In this payoff function we take into account the three following assumptions: (i) the value that player i obtains from player j does not depend on the group of j, (ii) the value that player i obtains from player j depends on the distance between i and j, and (iii) the cost that player i incurs for a link with player j depends on whether i and j belong to the same group or not.
The strategy g i is said to be a best response of player i to the network g i if:
Π i ( g i + g i ) Π i ( g i + g i ) , for all g i G i
The set of all of player i’s best responses to g i is denoted by B R i ( g i ) . A network g is said to be a Nash network if g i B R i ( g i ) for each player i N . We define a strict best response and a strict Nash network by replacing ‘≥’ with ‘>’. The set of non-empty strict Nash networks is denoted by S N N .
A network g is said to be an efficient network if it maximizes the total payoffs of players, that is i = 1 n Π i ( g ) i = 1 n Π i ( g ) , for all g G .

3. Results

Let δ ̲ ( n ) be the value of the decay parameter such that a non-empty strict Nash network is minimal.6 We are interested by the second point of Proposition 4.3 of GGK (pg.365, 2006) where the authors choose c L such that c L > 1 > δ . We will show that if c L > 1 , then it is possible to obtain a more precise characterization of strict Nash networks than the one proposed by GGK. It is worth noting that if c L > δ , then each end player sponsors her link in a strict Nash network. We now present a technical remark which is useful in several proofs.
Remark 1 
(R1) If i 1 t , i 2 t , i 3 t N t , t { 0 , 1 } , g i 1 t , i 2 t = g ¯ i 2 t , i 3 t = 1 and N g ¯ i 2 t , = 2 , then g S N N .
Indeed, if player i 1 t replaces the link g i 1 t , i 2 t by the link g i 1 t , i 3 t , then i 1 t obtains a payoff greater or equal to the payoff she obtains in g.
The proposition that follows shows that a non-empty strict Nash network is minimally connected.
We first present a lemma that is used in the proposition. The proof of this lemma is put in Appendix.
Lemma 1 
Let δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 . Suppose g S N N in which there are four players i , j , i , j N , such that g i , j = g i , j = 1 . If there is a chain between i and i which goes through players j and j , then i , j N t and i , j N 1 t , t { 0 , 1 } .
Proposition 1 
Suppose δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 . A non-empty strict Nash network is minimally connected.
Proof 
Let N + t ( g ) = { i t N t j N \ { i t } g i t , j = 0 } be the set of players in N t who form no links with any player, and let N N t ( g ) = { i t N t j 1 t N 1 t , g j 1 t , i t = 1 } be the set of players in N t who received a link from a player in N 1 t . Suppose δ > δ ̲ ( n ) and g S N N . It follows that g is minimal. We now show that if c H < δ + ( n ¯ 1 ) δ 2 , then g is connected.
First we show that if player i t N t has formed a link, then all players in N t must observe her. To introduce a contradiction, assume that there exist in g two players, i t , j t N t , t { 0 , 1 } , and a player k N \ { i , j } , such that i t N j t ( g ) and g i t , k = 1 . Since i t N j t ( g ) and i t plays a strict best response, we have by linearity of the payoff function: Π j t ( g + g j t , k ) Π j t ( g ) > Π i t ( g ) Π i t ( g g i t , k ) > 0 . Hence player j t does not play a strict best response in g. Therefore, g S N N , a contradiction. It follows that either no player has formed a link in N t , t { 0 , 1 } , or there exists a chain between all players who belong to N t . Formally, for each t { 0 , 1 } , we have either N + t ( g ) = N t or N t is connected in g.
We now use this result to show that g is connected. We consider two cases.
  • Suppose N N t ( g ) = and N N 1 t ( g ) = , that is there are no links between the two groups. We will show in the following that such a situation cannot happen.
    First, since g is non-empty, we cannot have simultaneously N + t ( g ) = N t and N + 1 t ( g ) = N 1 t . Suppose that N + t ( g ) N t , for one t { 0 , 1 } . In that case, we know from the point above that N t is connected.
    Second, we show in two steps that N t constitutes a PSS. We begin to show that if ( i t , j t ) M t ( g ) , then d ( i t , j t ; g ) = 2 . To introduce a contradiction, suppose that d ( i t , j t ; g ) > 2 . In that case there exist two distinct players i 1 t , j 1 t such that g ¯ i t , i 1 t = g ¯ j t , j 1 t = 1 . We have: (i) g i t , i 1 t = g j t , j 1 t = 1 since c L > δ , (ii) there is a chain between i t and j t which goes through i 1 t and j 1 t , (iii) players i t , j t , i 1 t , and j 1 t belong to N t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1. A contradiction. Thus we can conclude that g ( N t ) constitutes a star. In this star, each end player sponsors her link with the center, since δ < c L . So g ( N t ) constitutes a PSS.
    Third, we show that N N t ( g ) . Indeed, since c H < δ + ( n ¯ 1 ) δ 2 , a player i N 1 t strictly gains by forming a link with the center of the PSS formed by the group N t . It follows that N N t ( g ) , which contradicts the assumption N N t ( g ) = .
  • Suppose N N t ( g ) or N N 1 t ( g ) in g. We assume wlog that there are players i t N t and j 1 t N 1 t such that g i t , j 1 t = 1 . Since a player in N t has formed a link, N t is connected. We now show that g is connected. To introduce a contradiction suppose g is not connected. In that case there exists a player k 1 t N 1 t such that j 1 t N k 1 t ( g ) . We have: Π k 1 t ( g + g k 1 t , j 1 t ) Π k 1 t ( g ) > Π i t ( g ) Π i t ( g g i t , j 1 t ) > 0 since c H > c L and player k 1 t obtains more resources due to the link with j 1 t than i t through her link with j 1 t . It follows that k 1 t does not play a strict best response, a contradiction. Thus we conclude that g is connected.
The previous proposition means that in a non-empty strict Nash network, each player i obtains some resources of all other players. Obviously, each player i does not obtain all the resources of other players because of the decay.
The proposition that follows deals with the diameter of non-empty strict Nash networks. We first present a lemma that is used in the proposition. This lemma shows that if there are several links between players of different groups in a strict Nash network, then there is a group, say N t , such that n ¯ 1 players in N t are not directly linked with players who belong to N 1 t .
Lemma 2 
Let δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 . Suppose i N t and j N 1 t . If g S N N and g ¯ i , j = 1 , then N t \ { i } , N 1 t g ¯ , = 0 or N 1 t \ { j } , N t g ¯ , = 0 .
The proof of the lemma is put in Appendix.
Proposition 2 
Suppose δ ( δ ̲ ( n ) , 1 ) and c H < δ + ( n ¯ 1 ) δ 2 . Let g S N N .
1. 
If g contains one inter-groups link: g i * t , j * 1 t = 1 with i * t N t and j * 1 t N 1 t , then D ( g ( N t ) ) 3 and D ( g ( N 1 t ) ) = 2 , for t { 0 , 1 } .
2. 
If g contains several inter-groups links between the two groups, then D ( g ( N ) ) = 2 .
Proof 
Suppose δ ( δ ̲ ( n ) , 1 ) and c H < δ + ( n ¯ 1 ) δ 2 . We know from Proposition 1 that a non-empty strict Nash network is minimally connected. We prove successively the two parts of the proposition.
  • Let g S N N , with only one inter-groups link. We assume that this link is formed by i * t N t with i * 1 t N 1 t , that is g i * t , i * 1 t = 1 .
    First, we show that D ( g ( N t ) ) < 4 . To introduce a contradiction, we assume that there are i t , j t N t such that D ( g ( N t ) ) 4 . There are two cases.
    (a) Let ( i 0 t , j 0 t ) M t ( g ) , with i 0 t , j 0 t N t \ { i * t } . There are players i 1 t , j 1 t N t such that g ¯ i 0 t , i 1 t = g ¯ j 0 t , j 1 t = 1 . In that case: (i) we have g i 0 t , i 1 t = g j 0 t , j 1 t = 1 since δ < c L , (ii) there exists a chain between players i 0 t and j 0 t which contains players i 1 t and j 1 t , and (iii) i 0 t , i 1 t , j 0 t , j 1 t N t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1. A contradiction.
    (b) Suppose now that if ( i t , j t ) M t ( g ) , then either i t = i * t , or j = i * t . In other words, the player i * t who has formed a link with a player in N 1 t , is always one of the two players at maximal distance in g ( N t ) . In the following we deal with ( i * t , j t ) M t ( g ) . Note first that since j t is an end player and δ < c L , j t has formed a link with a player, say j 1 t , who belongs to the chain between i * t and j t in g. There are two cases.
    (b1) Suppose player i * t has formed a link in g with a player, say i 1 t N t , who belongs to the chain between i * t and j t . In such a case we have (i) g i * t , i 1 t = g j t , j 1 t = 1 , (ii) there is a chain between players i * t and j t which contains players i 1 t and j 1 t , and (iii) i * t , i 1 t , j t , j 1 t N t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1. A contradiction.
    (b2) Suppose player i * t has formed no links in g with a player who belongs to the chain between i * t and j t . In that case, there is a player, say i 1 t N t , who has formed the link with i * t and belongs to the chain between i * t and j t .
    We show that the link g i 1 t , i * t = 1 is the only link player i 1 t has formed in g. Indeed, suppose i 1 t has formed a link with a player say i k t i * t . Suppose i k t does not belong to the chain between i 1 t and j t . We have ( k t , j t ) M t ( g ) and by point (a) we know that g is not strict Nash. Suppose now that i k t belongs to the chain between i 1 t and j t . We have (i) g i 1 t , i k t = g j t , j 1 t = 1 , (ii) there is a chain between i 1 t and j t which contains players i k t and j 1 t , and (iii) i 1 t , i k t , j 1 t , j t N t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1.
    Since the link g i 1 t , i * t = 1 is the only link that player i 1 t has formed in g, it follows that there is a player i 2 t who belongs to the chain between i * t and j t such that g i 2 t , i 1 t = 1 . However in this situation player i 2 t does not play a strict best response, by (R1). Consequently g S N N . A contradiction.
    Second we show that D ( g ( N 1 t ) ) = 2 . Using arguments similar to those for N t it is easy to see that D ( g ( N 1 t ) ) < 4 . We now show that D ( g ( N 1 t ) ) < 3 . To introduce a contradiction suppose that D ( g ( N 1 t ) ) = 3 . We divide the proof into two cases.
    (a) Suppose there are ( i 1 t , j 1 t ) M 1 t ( g ) such that i 1 t , j 1 t N 1 t \ { i * 1 t } . So there are players i 1 1 t , j 1 1 t N 1 t such that g ¯ i 1 t , i 1 1 t = g ¯ j 1 t , j 1 1 t = 1 . In that case: (i) we have g i 1 t , i 1 1 t = g j 1 t , j 1 1 t = 1 since δ < c L , (ii) there is a chain between i 1 t and j 1 t which contains players i 1 1 t and j 1 1 t , and (iii) we have i 1 t , j 1 t , i 1 1 t , j 1 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1.
    (b) Suppose now that if ( i 1 t , j 1 t ) M 1 t ( g ) , then either i = i * 1 t , or j = i * 1 t . In the following we deal with ( i * 1 t , j 1 t ) M 1 t ( g ) . Since j 1 t is an end player, she has formed a link with a player j 1 1 t N 1 t who belongs to the chain between i * t and j 1 t . In such a case we have (i) g i * t , i * 1 t = g j 1 t j 1 1 t = 1 , (ii) there exists a chain between players i * t and j 1 t which contains players i * 1 t and j 1 1 t , and (iii) i * t N t , and i * 1 t , j 1 t , j 1 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1.
    The conclusion follows.
  • We now consider a minimally connected strict Nash network g in which there are more than one inter-groups link. The arguments which allow to obtain the contradiction in this part are very similar to the arguments used in the previous part. Therefore we briefly show the way to use Lemma 1 in the proof. We know from Lemma 2 that there exists one player who belongs to one group, say i * t N t , such that i * t is involved in all the inter-groups links.
    We first deal with players in N 1 t and show that g ¯ i * t , i 1 t = 1 for all i 1 t N 1 t . Let B N 1 t be the set of players i 1 t N 1 t such that g ¯ i * t , i 1 t = 1 . By assumption we have | B | 2 . Moreover we know that we have g ¯ i t , i 1 t = 0 for all ( i t , i 1 t ) N t \ { i * t } × N t .
    To introduce a contradiction, we suppose that B N 1 t . Since g is connected there are players j 1 t , k 1 t B and a player i 1 t N 1 t such that g ¯ i 1 t , k 1 t = 1 . Let 1 t N 1 t be an end player such that k 1 t belongs to the chain between i * t and 1 t . By construction there is a player 1 1 t N 1 t such that g ¯ 1 1 t , 1 1 t = 1 . Note that we can have 1 1 t = k 1 t and 1 t = i 1 t . Moreover, since δ < c L , we have g 1 t , 1 1 t = 1 .
    Either j 1 t is an end player, and g j 1 t , i * t = 1 since δ < c L , or there exists an end player j 1 t N 1 t \ { j 1 t } such that j 1 t N j 1 t ( g g ¯ i * t , j 1 t ) . In the second case by construction and since δ < c L , we have g j 1 t , m 1 t = 1 for one player m 1 t N 1 t .
    If j 1 t is an end player, then Lemma 1 is contradicted for players i * t , j 1 t , 1 1 t , 1 t and g cannot be a strict Nash network. If j 1 t is not an end player, then Lemma 1 is contradicted for players j 1 t , m 1 t , 1 1 t , 1 t and g cannot be a strict Nash network. It follows that B = N 1 t . It is worth noting that g i 1 t , i * t = 1 for all i 1 t N 1 t since δ < c H .
    We now deal with players in N t and show that g ¯ i * t , i = 1 for all i N t . To introduce a contradiction, suppose there is an end player k t N t , k t i * t , such that g ¯ i * t , k t = 0 . Since g is connected and δ < c L there is a player j t N t \ { k t , i * t } such that g k t , j t = 1 . In that case Lemma 1 is contradicted for players k t , j t , i * t , i 1 t N 1 t , since g i 1 t , i * 1 t = 1 . Therefore g is not a strict Nash network. The result follows.
    To conclude, since g ¯ i * t , i = 1 for all i N we have D ( g ( N ) ) = 2 .
It follows from the previous proposition that the maximal diameter of strict Nash networks is equal to five. It is worth noting that small diameter also characterizes non-empty strict Nash networks in the model with no decay of GGK (2006). The proposition that follows gives an exact characterization of strict Nash networks. We first present two lemmas that are used in the proposition. The proofs of these lemmas are put in Appendix.
Lemma 3 
Suppose δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 . Suppose g is a non-empty strict Nash network and there is only one inter-groups link.
1. 
If there is t { 0 , 1 } such that D ( g ( N t ) ) = 3 , then g is a D3PSS.
2. 
If for each t { 0 , 1 } we have D ( g ( N t ) ) = 2 , then g is a CIPSS, a NCIPSS or a IMS .
Lemma 4 
Suppose δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 . Suppose g is a strict Nash network and there are several inter-groups links. Then g is a PSS.
Proposition 3 
Suppose δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 . Then, S N N A . Moreover, there exists δ ¯ such that for any δ ( δ ¯ , 1 ) , CIPSS are the only networks in S N N .
Proof 
Suppose δ > δ ̲ ( n ) , and c H < δ + ( n ¯ 1 ) δ 2 . Lemmas 3 and 4 establish that S N N A . Concerning the second part of the proposition, GGK (2006, Proposition 4.3 part (2a), pg.365) showed that for δ sufficiently close to 1, only interlinked periphery-sponsored stars networks can be candidates as strict Nash networks.
It is easy to check that in a CIPSS, g, no player has an incentive to change her strategy when δ is sufficiently close to 1. Therefore, g S N N .
We now show that if δ is sufficiently close to 1, then a NCIPSS cannot be strict Nash. Indeed, suppose a NCIPSS, g, in which players i c t N t and i c 1 t N 1 t are respectively the centers of the stars formed with players in N t and N 1 t . Let player * t N t be the player such that g * t , i c t = g * t , i c 1 t = 1 . Let i 0 t N t \ { * t , i c t } , be a periphery player. If i 0 t deletes her link with i c t and forms a link with * t , then the change in i 0 t ’s payoffs is Π i 0 t ( g g i 0 t , i c t + g i 0 t , * t ) Π i 0 t ( g ) = δ 2 ( n ¯ 4 ( 2 n ¯ 5 ) δ + ( n ¯ 1 ) δ 2 ) . Consequently, for any δ n ¯ 4 n ¯ 1 , 1 , we have Π i 0 t ( g g i 0 t , i c t + g i 0 t , * t ) Π i 0 t ( g ) > 0 , and g S N N . The result follows.
It follows from the previous proposition that in all non-empty strict Nash architectures few players play a key role in the flow of resources. More precisely, we can distinguish two types of players, end players and non-end players. If one player of the first type is deleted, then only her own resources will not be accessed by other players. This is very different for the second type of players. As an illustration suppose a population with 100 players, that contains two groups, denoted by N 0 , N 1 , of 50 players each. We know from Proposition 3 that there are only at most 4 players who are not end players in a non-empty strict Nash network. Suppose we delete one of these players, say i N t , t { 0 , 1 } . Then this will prevent players of group N 1 t the access to resources of at least 47 players of the group N t . In that sense, non end players have a significant role in the flow of resources in the network, by contrast with end players. It is worth noting that asymmetries in players centrality also characterizes non-empty strict Nash networks in the model with no decay of GGK (2006).
We now give an example of parameter values such that all networks g A are strict Nash networks.
Example 1 
Suppose n = 120 , δ = 0 . 94 , c L = 40 , c H = 45 . It can be checked that non minimal networks cannot be strict Nash. Moreover, it can be checked that all networks g A are strict Nash networks.
We now show that for the same range of costs as in Proposition 3, if the decay parameter is sufficiently close to 1, then CIPSS are efficient networks.
Proposition 4 
Suppose c H < δ + ( n ¯ 1 ) δ 2 . Then there exists δ ^ such that for any δ ( δ ^ , 1 ) , CIPSS are efficient networks.
Proof 
Let g be an efficient network. First, we show that there exists δ ^ sufficiently close to 1 such that there is at most one link between players in N t and players in N 1 t in g. Suppose that there is no decay, that is δ = 1 . In that case, we are in the situation studied by GGK (2006, p.369). Consequently, (a) each component part of an efficient network is minimal; (b) if g is non-empty and efficient, then it is either minimally connected with 1 inter-groups link and 2 ( n ¯ 1 ) intra-groups links or partially connected with each group generating a minimal connected component. Since c H < δ + ( n ¯ 1 ) δ 2 , g is connected by Proposition 1. The above observations hold when δ ^ is sufficiently close to 1. Suppose now that δ < 1 . To introduce a contradiction, suppose that there are two links between players i N t and players j N 1 t in g. If one of these links is replaced by a link between two players who belong to the same group, then the difference in total cost is c H c L , and the difference in the total gross payoff cannot exceed 4 n ¯ 2 ( δ n δ ) . Clearly for all c H > c L , there is δ ^ sufficiently close to 1 such that δ ^ δ ^ n < ( c H c L ) / ( 4 n ¯ 2 ) . Second, we show that CIPSS are efficient networks. We know that an efficient network is minimally connected and contains one link between the two groups. Let E be the set of minimally connected networks which contain one link between the two groups. E is the set of networks candidate to be efficient. All the networks in E contain the same number of links. Consequently, we do not need to take into account total cost of setting links in networks g E , but only the gross total payoff: i N j N i ( g ) δ d ( i , j ; g ) . Only the distance between the players plays a role in this function. Let D i s ( k ; g ) = { ( i , j ) N × N d ( i , j ; g ) = k } . We have:
i N j N i ( g ) δ d ( i , j ; g ) = k { 0 , , 2 n ¯ 1 } | D i s ( k ; g ) | δ k
Since each g E is minimally connected, it contains 2 n ¯ 1 links. It follows that in each g E we have | D i s ( 1 ; g ) | = 2 ( 2 n ¯ 1 ) . We know that in g E there is at most one link between players in N t and players in N 1 t . Let this link be between i * t N t and i * 1 t N 1 t . In that case, all players j t N t \ { i * t } cannot be at distance 2 of players j 1 t N 1 t \ { i * 1 t } . Consequently, for any g E , | D i s ( 2 ; g ) | 2 n ¯ × ( 2 n ¯ 1 ) 2 ( 2 n ¯ 1 ) 2 ( n ¯ 1 ) 2 = 2 n ¯ ( n ¯ 1 ) , where 2 n ¯ × ( 2 n ¯ 1 ) is the total number of couples, 2 ( 2 n ¯ 1 ) is the number of couples at distance 1, and 2 ( n ¯ 1 ) 2 is the number of other couples which cannot be at distance 2. In CIPSS networks there are 2 n ¯ ( n ¯ 1 ) couples of players who belong to D i s ( 2 ; g ) . Since all couples which do not belong to D i s ( 1 ; g ) D i s ( 2 ; g ) belong to D i s ( 3 ; g ) in a CIPSS, the result follows.
Recall that the class of interlinked periphery-sponsored stars networks that GGK (2006) find as the unique non-empty strict Nash networks, contains two types of architectures, namely CIPSS and NCIPSS. It is easy to see why NCIPSS are less efficient than CIPSS. Indeed, recall that in NCIPSS there exists a link between a periphery player, say i * t N 0 , and the center player of the star formed by the other group, say i * 1 t N 1 . Suppose that this link is replaced by a link between the two center players, i * 1 t N 1 and say i 0 N 0 . It is easy to see that the loss of the total value obtained by i * t is the same as the additional value obtained by i 0 , while the total value obtained by each player i N \ { i 0 , i * t } increases. Therefore our result shows that if δ is high enough, then non-empty strict Nash networks are also efficient networks.

4. Conclusion

Heterogeneity of players and imperfect transitivity of information flows are central features of economic and social networks. In this note we re-examine the insider-outsider model of GGK (2006) which takes these features into account, by allowing for different degrees of decay in information flows. We refine the results of GGK (2006) paper for the case decay is low and costs of intra-group and inter-group links are intermediate. We find new strict Nash architectures for higher values of decay. It is interesting to note that all these architectures have small diameter and high asymmetries with regard to centrality of players, since these properties are also features of equilibrium networks in the GGK (2006) insider-outsider model with no decay. We also refine the results of GGK (2006) insider-outsider model when δ is sufficiently close to 1. We show for this case that only one type of interlinked periphery-sponsored stars networks can be strict Nash networks. It follows from this result that equilibrium networks are also efficient networks when δ is sufficiently close to 1.
In this note, we restrict our study to situations in which there are only two groups of players. Future research may consider introducing a higher number of groups in the model to examine the robustness of our finding concerning centrality and diameters of strict Nash networks as well as the compatibility between strict Nash and efficient networks.

References

  1. Galeotti, A.; Goyal, S.; Kamphorst, J. Network Formation with Heterogeneous Players. Game. Econ. Behav. 2006, 54, 353–372. [Google Scholar] [CrossRef]
  2. Bala, V.; Goyal, S. A Noncooperative Model of Network Formation. Econometrica 2000a, 68, 1181–1230. [Google Scholar] [CrossRef]
  3. Bala, V.; Goyal, S. A Strategic Analysis of Network Reliability. Rev. Econ. Design 2000b, 68, 205–228. [Google Scholar]
  4. Granovetter, M.S. Getting a Job: A Study of Contacts and Careers; Harvard University Press: Cambridge, MA, USA, 1974. [Google Scholar]
  5. Rogers, E.; Kincaid, D.L. Communication Network: Toward a New Paradigm for Research; Free Press: New York, NY, USA, 1981. [Google Scholar]
  6. Wasserman, S.; Faust, K. Social Network Analysis: Methods and Applications; Cambridge University Press: Cambridge, UK, 1994. [Google Scholar]

Appendix

Proof of Lemma 1 
Let i 1 , j 1 , i 2 and j 2 be four different players. We define π j ( g ) = N j ( g ) δ d ( , j , g ) as the gross payoff that player j obtains in a network g. Let g be a strict Nash network. Since δ > δ ̲ ( n ) , it follows that g is minimal. We suppose that g i 1 , j 1 = g i 2 , j 2 = 1 and there is a chain between i 1 and i 2 which goes through players j 1 and j 2 . Let g = g g i 1 , j 1 g i 2 , j 2 and g = g g i 2 , j 2 + g i 2 , j 1 .
We have
π j 1 ( g + g i 1 , j 1 ) π j 1 ( g ) π j 2 ( g + g i 1 , j 1 ) π j 2 ( g )
since player i 1 is closer to player j 1 than player j 2 in g .
We set N j 1 ( g ) N j 2 ( g ) . We assume that π ( g + g , j 1 ) π ( g + g , j 2 ) and we focus on player i 2 (if this assumption is not true, then we use the same kind of arguments but we focus on player i 1 ).
We now show that i 1 , j 1 N t and i 2 , j 2 N 1 t , t { 0 , 1 } , otherwise g S N N . We have two cases.
1) Suppose j 1 and j 2 belong to the same group N t , t { 0 , 1 } . Then the cost that player i 2 incurs when she forms a link with j 1 is equal to the cost that i 2 incurs when she forms a link with j 2 . Moreover, we have
π i 2 ( g ) = π i 2 ( g ) + ( π ( g + g , j 1 ) π ( g ) ) + δ ( π j 1 ( g + g i 1 , j 1 ) π j 1 ( g ) )
and
π i 2 ( g ) = π i 2 ( g ) + ( π ( g + g , j 2 ) π ( g ) ) + δ ( π j 2 ( g + g i 1 , j 1 ) π j 2 ( g ) )
We have π i 2 ( g ) π i 2 ( g ) . It follows that player i 2 does not play a strict best response and g S N N . Therefore, j 1 and j 2 do not belong to the same group N t .
2) Suppose j 1 and j 2 do not belong to the same group. We must show that i 1 belongs to the same group as j 1 and i 2 belongs to the same group as j 2 . Let j 1 N t and j 2 N 1 t .
First, we show that i 1 and i 2 do not belong to the same group, say N t . To introduce a contradiction, suppose i 1 , i 2 N t , we have:
Π i 1 ( g ) Π i 1 ( g + g i 1 , j 2 g i 1 , j 1 ) = δ [ ( π j 1 ( g + g i 2 , j 2 ) π j 1 ( g ) ) ( π j 2 ( g + g i 2 , j 2 ) π j 2 ( g ) ) ] + ( π ( g + g , j 1 ) π ( g + g , j 2 ) ) c L + c H > 0
since player i 1 plays a best response in g. Likewise we have
Π i 2 ( g ) Π i 2 ( g ) = δ ( ( π j 2 ( g + g i 1 , j 1 ) π j 2 ( g ) ) ( π j 1 ( g + g i 1 , j 1 ) π j 1 ( g ) ) ) + ( π ( g + g , j 2 ) π ( g + g , j 1 ) ) c H + c L > 0
Since player i 2 plays a strict best response in g. By summing the two previous inequalities we obtain:
δ ( π j 1 ( g + g i 2 , j 2 ) π j 2 ( g + g i 2 , j 2 ) + π j 2 ( g + g i 1 , j 1 ) π j 1 ( g + g i 1 , j 1 ) ) > 0 ,
that is
( π j 1 ( g + g i 2 , j 2 ) π j 1 ( g ) ) + ( π j 2 ( g ) π j 2 ( g + g i 2 , j 2 ) ) + ( π j 2 ( g + g i 1 , j 1 ) π j 2 ( g ) ) + ( π j 1 ( g ) π j 1 ( g + g i 1 , j 1 ) ) > 0
which is not true since i 2 is closer to j 2 than i 1 , and i 1 is closer to j 1 than i 2 , a contradiction. Second by using the same kind of arguments, we show that it is not possible to have i 1 N 1 t and i 2 N t . The result follows.
Proof of Lemma 2 
Suppose g S N N . First, since δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 , we know by Proposition 1 that g is minimally connected. We prove the lemma by contradiction. Suppose there are four players, i t , j t N t and i 1 t , j 1 t N 1 t , t { 0 , 1 } , such that g ¯ i t , i 1 t = g ¯ j t , j 1 t = 1 . We have two possibilities which we analyze in turn.
  • The two inter-groups links are sponsored by two players who belong to the same group. Suppose wlog that g i t , i 1 t = 1 and g j t , j 1 t = 1 . Since g is minimally connected, there are four cases which we analyze in turn.
    C1. There is a chain between i t and j t which contains players i 1 t and j 1 t . We know that we have also (i) g i t , i 1 t = 1 , g j t , j 1 t = 1 . (ii) i t N t , i 1 t N 1 t . When C1 and (i) are valid, it is not possible for (ii) to be valid simultaneously by Lemma 1.
    C2. There is a chain between i 1 t and j t which does not contain i t and j 1 t . In that case, there exists a player k N such that g ¯ j 1 t , k = 1 , otherwise player j t does not play a strict best response since δ < c L . Either k is an end player, and g k , j 1 t = 1 since δ < c L , or there exists an end player k k such that k N j 1 t ( g g j t , j 1 t ) . Suppose k is an end player. We have (i) g i t , i 1 t = g k , j 1 t = 1 , (ii) there is a chain between i t and k which contains players i 1 t , j 1 t , (iii) i t N t , i 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1. Next suppose the end player is k N j 1 t ( g g j t , j 1 t ) . Then there is a player k such that g k , k = 1 (since δ < c L ). So we have (i) g i t , i 1 t = g k , k = 1 , (ii) there is a chain between i t and k which contains players i 1 t , k , (iii) i t N t , i 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1.
    C3. There is a chain between i t and j 1 t which does not contain players i 1 t and j t . This case is symmetric to C2.
    C4. There is a chain between i t and j t which does not contain players i 1 t and j 1 t . In that case, there exist players k i , k j N such that g ¯ i 1 t , k i = g ¯ j 1 t , k j = 1 , otherwise players i t and j t do not play a strict best response since δ < c L . This gives rise to two situations: either both k i and k j are end players, or at least one is not an end player. If both k i and k j are end players, we have (i) g k i , i 1 t = g k j , j 1 t = 1 , (ii) there is a chain between k i and k j which contains players i 1 t and j 1 t , (iii) i 1 t , j 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1.
    Suppose now wlog that k i is not an end player. Then there exists an end player k i N i 1 t ( g g i t , i 1 t ) . By construction and since δ < c L , we have also g k i , k i = 1 for one player k i such that k i N i 1 t ( g g i t , i 1 t ) \ { k i } . Therefore we have (i) g i t , i 1 t = g k i , k i = 1 , (ii) there is a chain between i t and k i which contains players i 1 t and k i , (iii) i t N t and i 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1.
  • The two inter-groups links are sponsored by players who belong to two distinct groups. Suppose wlog that g i t , i 1 t = 1 , g j 1 t , j t = 1 . Since g is minimally connected, as before there are four cases which we analyze in turn.
    C1’. There is a chain between i t and j t which contains players i 1 t and j 1 t . In that case, there exists a player k N such that g ¯ j t , k = 1 , otherwise player j 1 t does not play a strict best response since δ < c L . Either k is an end player, and g k , j t = 1 (since δ < c L ), or there exists an end player k k such that k N j t ( g g j 1 t , j t ) . In the second case by construction and since δ < c L , we have also g k , k = 1 for one player k such that k N j t ( g g j 1 t , j t ) . In the first case, by using Lemma 1 for players i t , i 1 t , j t , k , it is easy to check that g cannot be a strict Nash network. In the second case we obtain the same result for players i t , i 1 t , k , k .
    C2’. There is a chain between i 1 t and j t which does not contain i t and j 1 t . We have (i) g i t , i 1 t = g j 1 t , j t = 1 , (ii) there is a chain between i t and j 1 t which contains players i 1 t and j t , (iii) i t , j t N t , and i 1 t , j 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1.
    C3’. There is a chain between i t and j 1 t which does not contain i 1 t and j t . In that case, there exist players k 0 , k 1 N such that g ¯ j t , k 0 = g ¯ i 1 t , k 1 = 1 , otherwise players i t , j 1 t do not play a strict best response since δ < c L . This gives rise to two situations: (I) both k 0 and k 1 are end players, and (II) at least one is not an end player.
    (I) Both k 0 and k 1 are end players. We have g k 0 , j t = g k 1 , i 1 t = 1 , since δ < c L . We show that k 0 N t , k 1 N 1 t . Indeed we have (i) g k 0 , j t = g k 1 , i 1 t = 1 , (ii) there is a chain between k 0 and k 1 which contains players j t and i 1 t , (iii) j t N t , i 1 t N 1 t . By Lemma 1, (i), (ii) and (iii) can be simultaneously satisfied only if k 0 N t and k 1 N 1 t .
    We now focus on players i t and j 1 t to obtain a contradiction when k 0 N t , k 1 N 1 t .
    • Suppose g ¯ i t , j 1 t = 1 . Let g i t , j 1 t = 1 . We have (i) g k 0 , j t = g i t , j 1 t = 1 , (ii) there is a chain between k 0 and i t which contains players j t and j 1 t , (iii) k 0 , j t , j 1 t N t , and i 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1. Let g j 1 t , i t = 1 . By the same reasoning we obtain a contradiction.
    • Suppose g ¯ i t , j 1 t = 0 . Let i 1 , i 2 , , i s be the sequence of players in the chain between i t and j 1 t in g, with i 1 = i t and i s = j 1 t .
      (a) We first show that , if i p N t , then g i p + 1 , i p = 1 for p { 1 , . . , s 1 } . By construction we have g ¯ i p , i p + 1 = 1 . Suppose i p N t . Then we have: (i) g k 0 , j t = 1 , (ii) there is a chain between k 0 and i p which contains players j t and i p + 1 , (iii) k 0 , j t , i p N t . By Lemma 1, (i), (ii) and (iii) can not be simultaneously valid if g i p , i p + 1 = 0 . The result follows.
      (b) We now show that if i p N t , then i p + 1 N t for p { 1 , . . , s 1 } . By (a) we have g i p + 1 , i p = 1 . It follows that we have (i) g k 1 , i 1 t = g i p + 1 , i p = 1 , (ii) there is a chain between k 1 and i p + 1 in g which contains players i 1 t and i p , (iii) k 1 , i 1 t N 1 t , i p N t . By Lemma 1, (i), (ii) and (iii) can be simultaneously valid only if i p + 1 N t .
      It follows that i s N t since i t N t . A contradiction since we know that i s N 1 t .
      (II) At least one of players k 0 or k 1 is not an end player. Suppose w.l.o.g. that k 1 is not an end player. Then there exists an end player k 1 k 1 , such that k 1 N i 1 t ( g g i t , i 1 t ) . By construction and since δ < c L , we have also g k 1 , k 1 = 1 for one player k 1 such that k 1 N i 1 t ( g g i t , i 1 t ) \ { k 1 , k 1 } . Therefore we have (i) g i t , i 1 t = g k 1 , k 1 = 1 , (ii) there is a chain between i t and k 1 which contains players i 1 t and k 1 , (iii) i t N t , i 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1.
      C4’. There is a chain between i t and j t which does not contain players i 1 t and j 1 t . In that case, there exists a player k N such that g ¯ i 1 t , k = 1 , otherwise player i t does not play a strict best response since δ < c L . Either k is an end player, and g k , i 1 t = 1 since δ < c L , or there exists an end player k k such that k N i 1 t ( g g i t , i 1 t ) . Let k be an end player. We have (i) g j 1 t , j t = g k , i 1 t = 1 , (ii) there is a chain between j 1 t and k which contains players j t and i 1 t , (iii) j t N t , and j 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1. Next let the end player be k N i 1 t ( g g i t , i 1 t ) . Then there is a player k such that g k , k = 1 (since δ < c L ). We have (i) g j 1 t , j t = g k , k = 1 , (ii) there is a chain between j 1 t and k which contains players j t and k , (iii) j t N t , and j 1 t N 1 t . When (i) and (ii) are valid, it is not possible for (iii) to be valid simultaneously by Lemma 1.
Proof of Lemma 3 
Suppose δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 . Let g be a strict Nash network such that there is only one inter-groups link, say the link formed by player i * t N t with player i * 1 t N 1 t , t { 0 , 1 } . Since δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 , we know from Proposition 1 that g is minimally connected. We prove successively the two parts of the lemma.
  • We assume that D ( g ( N t ) ) = 3 . First, we characterize the architecture of g ( N t ) . Let i * t N t and i * 1 t N 1 t be such that g i * t , i * 1 t = 1 . Let d i s i * t ( k ; g ) = { j N t d ( i * t , j ; g ) = k } . We know by the proof of Proposition 2 1.(a) that if ( i t , j t ) M t ( g ) , then either i t = i * t , or j t = i * t . Likewise, we know that | d i s i * t ( 1 ; g ) | = 1 and i 1 t d i s i * t ( 1 ; g ) is involved only in two links otherwise there is ( i t , j t ) M t ( g ) , with i t i * t and j t i * t . Consequently, | d i s i * t ( 2 ; g ) | = 1 and we call i 2 t the player in d i s i * t ( 2 ; g ) . By R1, i 2 t does not form a link with i 1 t d i s i * t ( 1 ; g ) . It follows that player i 1 t d i s i * t ( 1 ; g ) forms a link with i 2 t d i s i * t ( 2 ; g ) . Finally, we have d i s i * t ( 3 ; g ) = N t \ { i * t , i 1 t , i 2 t } and since δ < c L for all players who belong to this set we have g k , i 2 t = 1 .
    Second, we characterize the architecture of g ( N 1 t ) . We show that all players k N 1 t \ { i * 1 t } has formed a link with i * 1 t . Indeed, we know by Proposition 2 that D ( g ( N 1 t ) ) = 2 , that is this subnetwork is a star. We now show that i * 1 t is the center of this star. To introduce a contradiction assume that a player k 1 t i * 1 t is the center of this star. We have Π i * t ( g g i * t , i * 1 t + g i * t , k 1 t ) = ( n 3 ) ( δ 2 δ 3 ) > 0 and player i * t has an incentive to replace her link with i * 1 t by a link with k 1 t in g. A contradiction. As each player j 1 t N 1 t \ { i * 1 t } is an end player, each player j 1 t has formed a link with i * 1 t since δ < c L . The result follows.
  • Assume that for each t { 0 , 1 } , we have D ( g ( N t ) ) = 2 . By using the same arguments as in the previous point, we can show that the subnetwork formed by players of group N 1 t is a star with i * 1 t as the center and each player k 1 t N 1 t \ { i * 1 t } forming her link with i * 1 t . Concerning the architecture of the star formed by players of group N t , we can have two cases: (i) Either i * t is the center of the star, or (ii) a player k t N t \ { i * t } is the center of the star. In case of (i), all players j N t \ { i * t } are end players and have formed a link with i * t . So g is a CIPSS. In case of (ii), all players j N t \ { k t , i * t } are end players and have formed a link with k t . Regarding the link between k and i * t , we can have either g k , i * t = 1 , or g i * t , k = 1 . If g k , i * t = 1 , then g is a NCIPSS, and if g i * t , k = 1 , then g is a IMS.
Proof of Lemma 4 
Suppose δ > δ ̲ ( n ) and c H < δ + ( n ¯ 1 ) δ 2 . Let g be a non-empty strict Nash network. We know by Proposition 2 that g is a star. In that case, each periphery player sponsors her link with the center since δ < c L . Consequently, g is a PSS.
  • 1.It is worth noting that decay is just one way of modelling deficiencies in information transmission. Another way is to introduce imperfect reliability of links (see Bala and Goyal, 2000b, for a paper dealing with this).
  • 2.Note that Bala and Goyal (2000a) also introduce decay in their basic model. However the authors still assume that players are homogeneous.
  • 3.In what follows intermediate costs of intra-groups and inter-groups links has the following interpretation: costs of intra-groups links are such that no player i can have any incentive to form a link with a player j when this link allows i to access only to resources of j; costs of inter-groups links are not so high that this always prevents players to form inter-groups links.
  • 4.It is also important from of the point of view of centrality of players in the network. Indeed, while in the first type of architectures, only the players at the center of the stars play a central role in the flow of resources between players, in the second type a third player plays a significant role, since this player allows ressources to flow between the two groups. It follows that in both cases centrality values of the players differ. Note that we refer here to the notion of betweeness centrality, presented by Faust and Wasserman (1994 chapter 5).
  • 5.The assumption n ¯ 4 allows to simplify the proof of Proposition 3.
  • 6.Note that for all costs of linking, there always exists a δ ̲ ( n ) high enough such that if δ > δ ̲ ( n ) , then no player can have an incentive to form a link with a player she already indirectly accesses in the network.

Share and Cite

MDPI and ACS Style

Billand, P.; Bravard, C.; Sarangi, S. The Insider-Outsider Model Reexamined. Games 2010, 1, 422-437. https://doi.org/10.3390/g1040422

AMA Style

Billand P, Bravard C, Sarangi S. The Insider-Outsider Model Reexamined. Games. 2010; 1(4):422-437. https://doi.org/10.3390/g1040422

Chicago/Turabian Style

Billand, Pascal, Christophe Bravard, and Sudipta Sarangi. 2010. "The Insider-Outsider Model Reexamined" Games 1, no. 4: 422-437. https://doi.org/10.3390/g1040422

Article Metrics

Back to TopTop