Hostname: page-component-7b9c58cd5d-v2ckm Total loading time: 0 Render date: 2025-03-15T08:47:36.752Z Has data issue: false hasContentIssue false

Risky procurement with an insider bidder

Published online by Cambridge University Press:  14 March 2025

Jan Boone
Affiliation:
Department of Economics, University of Tilburg, P.O. Box 90153, 5000 LE Tilburg, The Netherlands
Roy Chen
Affiliation:
Department of Economics, University of Michigan, 238 Lorch Hall, 611 Tappan Street, Ann Arbor, MI 48109-1220, USA
Jacob K. Goeree*
Affiliation:
Division of the Humanities and Social Sciences, California Institute of Technology, Mail code 228-77, Pasadena, CA 91125, USA
Angelo Polydoro
Affiliation:
Department of Economics, University of Rochester, Harkness Hall, Rochester, NY 14627, USA

Abstract

Procurement auctions carry substantial risk when the value of the project is highly uncertain and known only to insiders. This paper reports the results from a series of experiments comparing the performance of three auction formats in such complex and risky settings. In the experiment, every bidder knows the private value for the project but only a single insider bidder knows the common-value part. In addition to the standard second-price and English auctions we test the “qualifying auction,” a two-stage format commonly used in the sale of complex and risky assets. The qualifying auction has a fully “revealing” equilibrium that implements the revenue-maximizing outcome but it also has an uninformative “babbling” equilibrium in which bidders place arbitrarily high bids in the first stage. In the experiments, the latter equilibrium has more drawing power, which causes the qualifying auction to perform worse than the English auction and only slightly better than a sealed-bid second-price auction. Compared to the two other formats, the English auction is roughly 40% more efficient, yields 50% more revenues, avoids windfall profits for the insider, while protecting uninformed bidders from losses.

Type
Research Article
Copyright
Copyright © Economic Science Association 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Footnotes

Electronic supplementary material The online version of this article (http://dx.doi.org/10.1007/s10683-009-9221-0) contains supplementary material, which is available to authorized users.

References

Boone, J., & Goeree, J. K. (2009). Optimal privatization using qualifying auctions. Economic Journal, 119, 277297.CrossRefGoogle Scholar
Bulow, J., & Klemperer, P. (2002). Prices and the winner's curse. RAND Journal of Economics, 33(1), 121.CrossRefGoogle Scholar
Fischbacher, U. (2007). z-tree: Zurich toolbox for ready-made economic experiments. Experimental Economics, 10(2), 171178.CrossRefGoogle Scholar
Hernando-Veciana, A. (2004). Successful uninformed bidding. Games and Economic Behavior, 48, 2953.CrossRefGoogle Scholar
Hernando-Veciana, A., & Tröge, M. (2004). The insider's curse, (Working paper). University of Alicante.Google Scholar
Kagel, J. H. (1995). Auctions: a survey of experimental research. In Kagel, J. H. & Roth, A. E. (Eds.), Handbook of experimental economics Princeton: Princeton University Press.CrossRefGoogle Scholar
Kagel, J. H., & Levin, D. (2002). Common value auctions and the winner's curse. Princeton: Princeton University Press.CrossRefGoogle Scholar
Kagel, J. H., Pevnitskaya, S., & Ye, L. (2008, forthcoming). Indicative bidding: an experimental analysis. Games and Economic Behavior.CrossRefGoogle Scholar
Murray, I. (2004). Tunnel vision that led to mindless English optimism. Marketing Week, May 13, pp. 82.Google Scholar
Economist, The (2004). Business: under water; the channel tunnel. February 14.Google Scholar
Welch, Frémont (1998). The case-by-case approach to privatization: techniques and examples. World Bank.CrossRefGoogle Scholar
Ye, L. (2007). Indicative bidding and a theory of two-stage auctions. Games and Economic Behavior, 58(1), 181207.CrossRefGoogle Scholar
Supplementary material: File

Boone et al. supplementary material

Boone et al. supplementary material 1
Download Boone et al. supplementary material(File)
File 160.3 KB
Supplementary material: File

Boone et al. supplementary material

Boone et al. supplementary material 2
Download Boone et al. supplementary material(File)
File 178.7 KB
Supplementary material: File

Boone et al. supplementary material

Boone et al. supplementary material 3
Download Boone et al. supplementary material(File)
File 173.6 KB
Supplementary material: File

Boone et al. supplementary material

Boone et al. supplementary material 4
Download Boone et al. supplementary material(File)
File 152.6 KB