Demands and Offers in Ultimatum Games

Total Page:16

File Type:pdf, Size:1020Kb

Demands and Offers in Ultimatum Games University of Mississippi eGrove Electronic Theses and Dissertations Graduate School 2018 Demands And Offers In Ultimatum Games Jeremiah Wills University of Mississippi Follow this and additional works at: https://egrove.olemiss.edu/etd Part of the Economics Commons Recommended Citation Wills, Jeremiah, "Demands And Offers In Ultimatum Games" (2018). Electronic Theses and Dissertations. 957. https://egrove.olemiss.edu/etd/957 This Dissertation is brought to you for free and open access by the Graduate School at eGrove. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of eGrove. For more information, please contact [email protected]. DEMANDS AND OFFERS IN ULTIMATUM GAMES. A Dissertation presented for the Doctor of Philosophy Degree The University of Mississippi by Jeremiah Wills May 2018 Copyright © 2018 by Jeremiah Wills All rights reserved ABSTRACT Pecorino and Van Boening (2010) introduce the Embedded Ultimatum game. The authors embed an ultimatum game into a stylized legal bargaining framework and cross analyze the offer and dispute behavior in this game with the same behavior in a baseline simple ultimatum game. The current study seeks to test the replicability of a computerized version of these games. Additionally, variations of the two games are introduced here to test the effects of specific manipulation of the framing of the simple ultimatum game, as well as to test the effects of specific manipulation of the offer structure in both the simple and embedded ultimatum games. Overall it is found that the computerized embedded game replicates the hand-run game from Pecorino and Van Boening (2010). Similar to the previous study, mean and median offers of surplus in the embedded game are significantly lower than they are in the simple game. Furthermore, small changes in the framing and offer structure result in significant changes in observed offer and dispute behavior. DEDICATION To my parents for their constant and unwavering support during the writing of this dissertation, and in life in general. To Professor John Pomery for his amazing work ethic as a teacher and changing the way I view economics and the world around me. iii ACKNOWLEDGMENTS This study is funded by the Mississippi Economics Research Lab at the University of Mississippi. I am forever indebted to my committee chair, Professor Mark Van Boening, for his continued support and guidance during the writing of this dissertation and over the years. I would also like to thank the remaining members of my committee: John Gardner, Tom Garrett, and Jack Williams, for time, patience, guidance, and acceptance of being on my committee. Additionally, I would like to thank Professor John Conlon for his tough love as a teacher and for our conversations in and outside the classroom. iv TABLE OF CONTENTS ABSTRACT ................................................................................................................................... ii DEDICATION.............................................................................................................................. iii ACKNOWLEDGMENTS ........................................................................................................... iv CH. 1 RESEARCH OBJECTIVE ............................................................................................... 1 1.1 Introduction ......................................................................................................................... 1 1.2 Research Objectives ............................................................................................................ 9 CH. 2 LITERATURE REVIEW ............................................................................................... 13 2.1 Ultimatum Game ............................................................................................................... 13 2.2 Legal Bargaining ............................................................................................................... 20 2.3 Theory ................................................................................................................................ 21 CH. 3 DESIGN ............................................................................................................................ 24 3.1 Design Overview................................................................................................................ 24 3.2 The Demand and Offer Games. ....................................................................................... 26 3.3 The Embedded Demand and Embedded Offer games .................................................. 28 3.4 Attitudes Toward Risk and Other-Regarding Preferences .......................................... 31 3.4 Predictions ......................................................................................................................... 37 CH. 4 DATA AND RESULTS ................................................................................................... 39 4.1 Data Overview ................................................................................................................... 39 4.2 The Demand and Offer Games ........................................................................................ 41 4.3 The Embedded Demand and Offer Games .................................................................... 46 4.4 Simple and Embedded Ultimatum Games. .................................................................... 54 4.5 Settlement Levels (High vs. Low) .................................................................................... 60 4.6 Measured attitudes toward risk and other-regarding behavior ................................... 68 Ch. 5 DISUSSION ....................................................................................................................... 75 BIBLIOGRAPHY ..............................................................................................................81 APPENDIX ........................................................................................................................86 VITA ................................................................................................................................111 v LIST OF TABLES Table 1. Primary Research Hypotheses ........................................................................................ 10 Table 2. Experimental Design...................................................................................................... 25 Table 3. The Simple Demand and Offer Games .......................................................................... 26 Table 4. The Embedded Demand and Embedded Offer Games .................................................. 29 Table 5. Binary Lotter Choices for Part 1 in the Embedded Game Sessions .............................. 34 Table 6. Rational Risk-Neutral Predictions ................................................................................. 37 Table 7. Equal - Split Predictions ................................................................................................ 38 Table 8. Research Questions and Tested Effects ......................................................................... 40 Table 9. Variables Used in Random Effects Regression Models ................................................ 41 Table 10. Summary Statistics for Surplus Offers in the Simple Games ...................................... 44 Table 11. Test of Differences in Surplus Offers in the Simple Games ........................................ 45 Table 12. Summary Statistics for Surplus Offers in the Embedded Games ................................ 50 Table 13. Test of differences in Surplus Offers in the Embedded Games ................................... 51 Table 14. Summary Statistics for Surplus Offers in all Four Ultimatum Games ........................ 56 Table 15. Test for Differences in Surplus Offers in the Demand and Embedded Demand Games ............................................................................................................................................... 57 Table 16. Test for Differences in Surplus Offers in the Offer and Embedded Offer Games ...... 58 Table 17. Summary Statistics of Surplus Offers in the Embedded Games by A-Type ............... 62 Table 18. Test for Differences in Surplus Offers by A-Types in the Embedded Demand Game 63 Table 19. Summary Statistics for Surplus Offers in the Embedded Offer Game by A type ....... 65 Table 20. Test for Differences in Surplus Offers to A-Types in the Embedded Offer Game ..... 66 Table 21. Summary Statistics for Surplus Offers in Parts 2 and 3 of the Embedded Game Sessions ................................................................................................................................. 70 Table 22. Explaining Offers in the Embedded Games ................................................................ 73 Table 25. Explaining Dispute Rates in the Embedded Games .................................................... 74 vi LIST OF FIGURES Figure 1. Surplus Offers in the Simple Games ............................................................................ 43 Figure 2. Dispute Rates in the Simple Games ............................................................................. 46 Figure 3. Surplus Offers in the Embedded Games (All Offers) .................................................. 48 Figure 4. Surplus Offers in the Embedded Games (Offers 0 to 150)
Recommended publications
  • Strange Victory: a Critical Appraisal of Operation Enduring Freedom and the Afghanistan War
    30 JANUARY 2002 RESEARCH MONOGRAPH #6 Strange Victory: A critical appraisal of Operation Enduring Freedom and the Afghanistan war Carl Conetta PROJECT ON DEFENSE ALTERNATIVES COMMONWEALTH INSTITUTE, CAMBRIDGE, MASSACHUSETTS Contents Introduction 3 1. What has Operation Enduring Freedom accomplished? 4 1.1 The fruits of victory 4 1.1.1 Secondary goals 5 1.2 The costs of the war 6 1.2.1 The humanitarian cost of the war 7 1.2.2 Stability costs 7 2. Avoidable costs: the road not taken 9 3. War in search of a strategy 10 3.1 The Taliban become the target 10 3.2 Initial war strategy: split the Taliban 12 3.2.1 Romancing the Taliban 13 3.2.2 Pakistan: between the devil and the red, white, and blue 14 3.3 The first phase of the air campaign: a lever without a fulcrum 15 3.3.1 Strategic bombardment: alienating hearts and minds 15 3.4 A shift in strategy -- unleashing the dogs of war 17 4. A theater redefined 18 4.1 Reshuffling Afghanistan 19 4.2 Regional winners and losers 20 4.3 The structure of post-war Afghan instability 21 4.3.1 The Bonn agreement: nation-building or “cut and paste”? 22 4.3.2 Peacekeepers for Afghanistan: too little, too late 24 4.4 A new game: US and Afghan interests diverge 25 4.4.1 A failure to adjust 26 5. The tunnel at the end of the light 28 5.1 The path charted by Enduring Freedom 28 5.2 The triumph of expediency 29 5.3 The ascendancy of Defense 29 5.4 Realism redux 31 5.5 Bread and bombs 32 5.6 The fog of peace 34 Appendix 1.
    [Show full text]
  • The Truth of the Capture of Adolf Eichmann (Pdf)
    6/28/2020 The Truth of the Capture of Adolf Eichmann » Mosaic THE TRUTH OF THE CAPTURE OF ADOLF EICHMANN https://mosaicmagazine.com/essay/history-ideas/2020/06/the-truth-of-the-capture-of-adolf-eichmann/ Sixty years ago, the infamous Nazi official was abducted in Argentina and brought to Israel. What really happened, what did Hollywood make up, and why? June 1, 2020 | Martin Kramer About the author: Martin Kramer teaches Middle Eastern history and served as founding president at Shalem College in Jerusalem, and is the Koret distinguished fellow at the Washington Institute for Near East Policy. Listen to this essay: Adolf Eichmann’s Argentinian ID, under the alias Ricardo Klement, found on him the night of his abduction. Yad Vashem. THE MOSAIC MONTHLY ESSAY • EPISODE 2 June: The Truth of the Capture of Adolf Eichmann 1x 00:00|60:58 Sixty years ago last month, on the evening of May 23, 1960, the Israeli prime minister David Ben-Gurion made a brief but dramatic announcement to a hastily-summoned session of the Knesset in Jerusalem: A short time ago, Israeli security services found one of the greatest of the Nazi war criminals, Adolf Eichmann, who was responsible, together with the Nazi leaders, for what they called “the final solution” of the Jewish question, that is, the extermination of six million of the Jews of Europe. Eichmann is already under arrest in Israel and will shortly be placed on trial in Israel under the terms of the law for the trial of Nazis and their collaborators. In the cabinet meeting immediately preceding this announcement, Ben-Gurion’s ministers had expressed their astonishment and curiosity.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Robert Ludlum © the BOURNE ULTIMATUM
    Robert Ludlum © THE BOURNE ULTIMATUM 1 Robert Ludlum © THE BOURNE ULTIMATUM ROBERT LUDLUM THE UNSURPASSED MASTER OF THE SUPERTHRILLER AND ON SALE IN BANTAM HARDCOVER IN MAY 1993 THE SCORPIO ILLUSION 2 Robert Ludlum © THE BOURNE ULTIMATUM THE TRANSFORMATION The station wagon raced south down a backcountry road through the hills of New Hampshire toward the Massachusetts border, the driver a long-framed man, his sharp-featured face intense, his clear light-blue eyes furious. “We knew it would happen,” said Marie St. Jacques Webb. “It was merely a question of time.” “It’s crazy!” David whispered so as not to’ wake the children. “Everything’s buried, maximum archive security and all the rest of that crap! How did anyone find Alex and Mo?” “We don’t know, but Alex will start looking. There ’s no one better than Alex, you said that yourself—” “He’s marked now—he’s a dead man,” interrupted Webb grimly. “They’ll kill him and come after me ... after us, which is why you and the kids are heading south. The Caribbean.” “I’ll send them, darling. Not me.” “There’s nothing to discuss.” Webb breathed deeply, steadily, imposing a strange control. “I’ve been there before,” he said quietly. Marie looked at her husband, his suddenly passive face outlined in the dim wash of the dashboard lights. What she saw frightened her far more than the specter of the Jackal. She was not looking at David Webb the soft-spoken scholar. She was staring at a man they both thought had disappeared from their lives forever.
    [Show full text]
  • Cultural Capture and the Financial Crisis
    Preventing Regulatory Capture Special Interest Influence and How to Limit It Edited by DANIEL CARPENTER Harvard University DAVID A. MOSS Harvard University Cambridge University Press Not for sale or distribution. 32 Avenue of the Americas, New York, NY 10013-2473, USA Cambridge University Press is part of the University of Cambridge. It furthers the University’s mission by disseminating knowledge in the pursuit of education, learning, and research at the highest international levels of excellence. www.cambridge.org Information on this title: www.cambridge.org/9781107646704 C The Tobin Project 2014 This publication is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University Press. First published 2014 Printed in the United States of America A catalog record for this publication is available from the British Library. Library of Congress Cataloging in Publication Data Preventing regulatory capture : special interest influence and how to limit it / [edited by] Daniel Carpenter, Harvard University, David A. Moss, Harvard University. pages cm Includes index. ISBN 978-1-107-03608-6 (hardback) – ISBN 978-1-107-64670-4 (pbk.) 1. Deregulation – United States. 2. Trade regulation – United States. 3. Interest groups – United States. I. Carpenter, Daniel P., 1967– II. Moss, David A., 1964– HD3616.U63P74 2013 338.973–dc23 2013008596 ISBN 978-1-107-03608-6 Hardback ISBN 978-1-107-64670-4 Paperback Cambridge University Press has no responsibility for the persistence or accuracy of URLs for external or third-party Internet Web sites referred to in this publication and does not guarantee that any content on such Web sites is, or will remain, accurate or appropriate.
    [Show full text]
  • From Dictator Game to Ultimatum Game and Back Again: the Judicial
    Articles and Essays FROM DICTATOR GAME TO ULTIMATUM GAME... AND BACK AGAIN: THE JUDICIAL IMPASSE AMENDMENTS Ellen Dannint In 1935, Congress decided to replace the "dictator game" that had long been used to set working conditions with an "ultimatum game" by enacting the National Labor Relations Act (NLRA). A dictator game is a two-player economic game in which player one proposes a division of resources and player two has no choice but to accept the offer. Economic theory predicts that in such a case, player one will offer nothing to player two. This is indeed the most common offer.' Before the NLRA was enacted, the law allowed the employer (player one), to offer terms of employment and essentially required the employee (player two), to accept the offer dictated by the employer. The NLRA was enacted to replace this game with an "ultimatum game" by changing the balance of power between employers and employees and creating a system of wage setting that would better support the institutions of a democracy.2 In an ultimatum game, player one t Professor of Law, Wayne State University Law School. B.A., University of Michigan; J.D., University of Michigan. The author wishes to thank the following: Theodore St. Antoine, Richard Lempert, Gregory Saltzman, Gangaram Singh, participants in the University of Michigan Learning Theory Workshop, my colleagues at Wayne State University, and the University of Michigan labor law students class for their questions and thoughts that challenged ideas about the core issues discussed here. 1. Alvin E. Roth, Bargaining Experiments, in THE HANDBOOK OF EXPERIMENTAL ECONOMICS 253, 270 (John H.
    [Show full text]
  • Polk Delivers Ultimatum to Mexico More TODAY's Trouble in Ira„ "'Withdraw South of Nueces' American Soil Invaded! (AM PUS Morse Telegraph in Operation
    ,rs A JOKE, SON WEATHER »,«'/> Student APRIL MichiganPublicationSlate College Vol. 34, 334 I ss===--— MICHIGAN, MONDAY. APRIT , ___ "r"'u i, liHB^ No. 109 polk Delivers Ultimatum To Mexico More TODAY'S Trouble In Ira„ "'Withdraw South of Nueces' American Soil Invaded! (AM PUS Morse Telegraph In Operation . K Lou# Distance WASHINGTIN, M. C., Most remarkable incident to Women to Set xPrl!1816 («iHay««i Kcure al Hie local beanerles took j ) IVt'sitlcnl Polk ioelsty -lace !aft ,,isht when Cuthbert Chance t Btheror. junior, from Nome (ilrlivernl an iilliioaliiiii tin haiu'f his hat around the lo lh«» Mexican corner in the third house from govern* Life Time iiK'nt ,|-.e right of the left turn, enter¬ declaring all Irr* al I Cii'nntl news Auto's tireecy Spool. He set hits conie rilorv north <»f ili« Rio Short i of the last meeting of Order Grande \nit>riran - foil. judiciary administrative, _ B • > fust boot, and no sooner boartl of AWS anil tlitit is General I hud he set then a waiter roared ay leer has be- that .III women on campus will tv. asked , I;nn what he wanted, ordered to the bord- have 4 a.m. permissionpermission nn Tucs- ! ;..,i they tiad it anl staggered day nights and men will have to vr. df tt was back in 2.26:3, hot and keep strict hours, according to well-muttered, and Ccuss, that The record for enroll¬ Squirrlcy llammtlick. president. lucky swashbuckling roger, was ment just established at Reporter Crinoline Corny dash out was with his hands and face MSC — ed right over to interview Miss 7.!)!18 plus ( a fig¬ bed within nfteen gkq 123456 Mammilick since she beard this ure which takes into ac¬ t23mtwyplu with about 2034555 rumor while Harry Bivens, 18.
    [Show full text]
  • Table IV:3 – Example of Engagement and Agreement Conversation
    Adapted from “Field Guide to Consulting and Organizational Development” – to obtain the entire book, select “Publications” at http://www.authenticityconsulting.com Table IV:3 – Example of Engagement and Agreement Conversation The Transitioning Business (TB) had scheduled interviews with various consultants as a result of an ultimatum from the We Have Had It Investors. The ultimatum was that TB gets outside help or Investors no longer would invest in TB. One of the consultants that TB phoned was an organizational development consultant, OD Bob. In that phone call, CEO Ed explained that TB needed a consultant for a variety of services, including strategic planning, business planning and overall financial analysis. Ed added that whatever it took to get more money right away was the most important need. OD Bob agreed to attend an interview and mentioned that he would send information about himself to TB beforehand. OD Bob’s information was about his experience and credentials, his mission and values as a consultant, his priority on a collaborative approach, and his focus on systems and learning in organizations. He also asked that materials about TB be sent to him before the interview. Ed, OD Bob and members of the Board’s Search Committee attended the interview. Ed began the interview by welcoming OD Bob to TB. Ed explained that TB had some current challenges that needed a consultant. He said that mostly TB needed cash right now, so that would be the most important priority. He added that a local investor, the We Have Had It Investors, had made major investments in TB in the past.
    [Show full text]
  • The Spectral Voice and 9/11
    SILENCIO: THE SPECTRAL VOICE AND 9/11 Lloyd Isaac Vayo A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2010 Committee: Ellen Berry, Advisor Eileen C. Cherry Chandler Graduate Faculty Representative Cynthia Baron Don McQuarie © 2010 Lloyd Isaac Vayo All Rights Reserved iii ABSTRACT Ellen Berry, Advisor “Silencio: The Spectral Voice and 9/11” intervenes in predominantly visual discourses of 9/11 to assert the essential nature of sound, particularly the recorded voices of the hijackers, to narratives of the event. The dissertation traces a personal journey through a selection of objects in an effort to seek a truth of the event. This truth challenges accepted narrativity, in which the U.S. is an innocent victim and the hijackers are pure evil, with extra-accepted narrativity, where the additional import of the hijacker’s voices expand and complicate existing accounts. In the first section, a trajectory is drawn from the visual to the aural, from the whole to the fragmentary, and from the professional to the amateur. The section starts with films focused on United Airlines Flight 93, The Flight That Fought Back, Flight 93, and United 93, continuing to a broader documentary about 9/11 and its context, National Geographic: Inside 9/11, and concluding with a look at two YouTube shorts portraying carjackings, “The Long Afternoon” and “Demon Ride.” Though the films and the documentary attempt to reattach the acousmatic hijacker voice to a visual referent as a means of stabilizing its meaning, that voice is not so easily fixed, and instead gains force with each iteration, exceeding the event and coming from the past to inhabit everyday scenarios like the carjackings.
    [Show full text]
  • Industrial Relations Act Code of Good Practice
    SWD INDUSTRIAL RELATIONS ACT CODE OF GOOD PRACTICE: TERMINATION OF EMPLOYMENT 1. INTRODUCTION 1.1. This code is published in terms of Section 109 of the Industrial Relations Act. 1.2. This Code of Good Practice deals with some of the key aspects of termination of employment. It aims to summarise some of the provisions of the law and provide guidelines on applying the law. 1.3. This Code intends to assist- 3.1.1 employees and their staff associations and trade unions; 3.1.2. employers and their employer organizations; and 3.1.3. Conciliators, arbitrators and judges. 1. This Code has been drafted in accordance with the Employment Act and Industrial Relations Act and proposed 2002 amendments to those Acts. The Code will have to be checked once the proposed amendments are finalised, to ensure that the Code correctly reflects the law. 1 SWD 1.4. The guidelines in this Code may be departed from if there is good reason to do so. Anyone who departs from them must prove the reasons for doing so. The following kinds of reasons may justify a departure from the provisions of the Code. Note that this list is not exhaustive. 1.4.1. the size of the employer may justify a departure. For example, an employer with a small number of employees may not be required to comply with all the procedural requirements of this code, but that employer must, nevertheless, give an employee a fair opportunity to respond to any allegations before taking a decision affecting that employee’s rights.
    [Show full text]
  • Crimes Committed by Terrorist Groups: Theory, Research and Prevention
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Crimes Committed by Terrorist Groups: Theory, Research and Prevention Author(s): Mark S. Hamm Document No.: 211203 Date Received: September 2005 Award Number: 2003-DT-CX-0002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Crimes Committed by Terrorist Groups: Theory, Research, and Prevention Award #2003 DT CX 0002 Mark S. Hamm Criminology Department Indiana State University Terre Haute, IN 47809 Final Final Report Submitted: June 1, 2005 This project was supported by Grant No. 2003-DT-CX-0002 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Abstract .............................................................. iv Executive Summary....................................................
    [Show full text]
  • Cornell Article
    NICOLAS CORNELL Competition Wrongs abstract. In both philosophical and legal circles, it is typically assumed that wrongs depend upon having one’s rights violated. But within any market-based economy, market participants may be wronged by the conduct of other actors in the marketplace. Due to my illicit business tactics, you may lose profits, customers, employees, reputation, access to capital, or any number of other sources of value. This Article argues that such competition wrongs are an example of wrongs that arise without an underlying right, contrary to the typical philosophical and legal assumption. The Article thus draws upon various forms of business law to illustrate what is a conceptual point: that we can and do wrong one another in ways that do not involve violating our private entitlements but rather violating only public norms. author. Assistant Professor, University of Michigan Law School. This Article has benefitted from comments and suggestions from many others. Specifically, I would like to thank Mitch Ber- man, Dan Crane, Ryan Doerfler, Chris Essert, Rich Friedman, John Goldberg, Don Herzog, Wa- heed Hussain, Julian Jonker, Greg Keating, Greg Klass, George Letsas, Gabe Mendlow, Sanjukta Paul, Tony Reeves, Arthur Ripstein, Amy Sepinwall, Henry Smith, Sabine Tsuruda, David Wad- dilove, and Gary Watson. I am also grateful to audiences at Binghamton, Bowdoin, Harvard, IN- SEED, Michigan, Oxford, Penn, and Virginia, as well as the Bechtel Workshop in Moral and Po- litical Philosophy, the Legal Philosophy Workshop, and the North American Workshop on Private Law Theory. 2030 competition wrongs article contents introduction 2032 i. the standing claim 2037 A.
    [Show full text]