-
Contextual Confidence and Generative AI
Authors:
Shrey Jain,
Zoë Hitzig,
Pamela Mishkin
Abstract:
Generative AI models perturb the foundations of effective human communication. They present new challenges to contextual confidence, disrupting participants' ability to identify the authentic context of communication and their ability to protect communication from reuse and recombination outside its intended context. In this paper, we describe strategies--tools, technologies and policies--that aim…
▽ More
Generative AI models perturb the foundations of effective human communication. They present new challenges to contextual confidence, disrupting participants' ability to identify the authentic context of communication and their ability to protect communication from reuse and recombination outside its intended context. In this paper, we describe strategies--tools, technologies and policies--that aim to stabilize communication in the face of these challenges. The strategies we discuss fall into two broad categories. Containment strategies aim to reassert context in environments where it is currently threatened--a reaction to the context-free expectations and norms established by the internet. Mobilization strategies, by contrast, view the rise of generative AI as an opportunity to proactively set new and higher expectations around privacy and authenticity in mediated communication.
△ Less
Submitted 24 January, 2024; v1 submitted 2 November, 2023;
originally announced November 2023.
-
Opaque Contracts
Authors:
Andreas Haupt,
Zoe Hitzig
Abstract:
Firms have access to abundant data on market participants. They use these data to target contracts to agents with specific characteristics, and describe these contracts in opaque terms. In response to such practices, recent proposed regulations aim to increase transparency, especially in digital markets. In order to understand when opacity arises in contracting and the potential effects of propose…
▽ More
Firms have access to abundant data on market participants. They use these data to target contracts to agents with specific characteristics, and describe these contracts in opaque terms. In response to such practices, recent proposed regulations aim to increase transparency, especially in digital markets. In order to understand when opacity arises in contracting and the potential effects of proposed regulations, we study a moral hazard model in which a risk-neutral principal faces a continuum of weakly risk-averse agents. The agents differ in an observable characteristic that affects the payoff of the principal. In a described contract, the principal sorts the agents into groups, and to each group communicates a distribution of output-contingent payments. Within each group, the realized distribution of payments must be consistent with the communicated contract. A described contract is transparent if the principal communicates the realized contract to the agent ex-ante, and otherwise it is opaque. We provide a geometric characterization of the principal's optimal described contract as well as conditions under which the optimal described mechanism is transparent and opaque. We apply our results to the design and description of driver payment schemes on ride-hailing platforms.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
Optimal Defaults, Limited Enforcement and the Regulation of Contracts
Authors:
Zoë Hitzig,
Benjamin Niswonger
Abstract:
We study how governments promote social welfare through the design of contracting environments. We model the regulation of contracting as default delegation: the government chooses a delegation set of contract terms it is willing to enforce, and influences the default terms that serve as outside options in parties' negotiations. Our analysis shows that limiting the delegation set principally mitig…
▽ More
We study how governments promote social welfare through the design of contracting environments. We model the regulation of contracting as default delegation: the government chooses a delegation set of contract terms it is willing to enforce, and influences the default terms that serve as outside options in parties' negotiations. Our analysis shows that limiting the delegation set principally mitigates externalities, while default terms primarily achieve distributional objectives. Applying our model to the regulation of labor contracts, we derive comparative statics on the optimal default delegation policy. As equity concerns or externalities increase, in-kind support for workers increases (e.g. through benefits requirements and public health insurance). Meanwhile, when worker bargaining power decreases away from parity, support for workers increases in cash (e.g. through cash transfers and minimum wage laws).
△ Less
Submitted 14 May, 2022; v1 submitted 2 March, 2022;
originally announced March 2022.
-
Contextually Private Mechanisms
Authors:
Andreas Haupt,
Zoë Hitzig
Abstract:
We introduce a framework for comparing the privacy of different mechanisms. A mechanism designer employs a dynamic protocol to elicit agents' private information. Protocols produce a set of contextual privacy violations -- information learned about agents that may be superfluous given the context. A protocol is maximally contextually private if there is no protocol that produces a subset of the vi…
▽ More
We introduce a framework for comparing the privacy of different mechanisms. A mechanism designer employs a dynamic protocol to elicit agents' private information. Protocols produce a set of contextual privacy violations -- information learned about agents that may be superfluous given the context. A protocol is maximally contextually private if there is no protocol that produces a subset of the violations it produces, while still implementing the choice rule. We show that selecting a maximally contextually private protocol involves a deliberate decision about whose privacy is most important to protect, and these protocols delay questions to those they aim to protect. Taking the second-price auction rule as an instructive example, we derive two novel designs that are maximally contextually private: the ascending-join and overdescending-join protocols.
△ Less
Submitted 27 April, 2024; v1 submitted 20 December, 2021;
originally announced December 2021.
-
A Flexible Design for Funding Public Goods
Authors:
Vitalik Buterin,
Zoe Hitzig,
E. Glen Weyl
Abstract:
We propose a design for philanthropic or publicly-funded seeding to allow (near) optimal provision of a decentralized, self-organizing ecosystem of public goods. The concept extends ideas from Quadratic Voting to a funding mechanism for endogenous community formation. Individuals make public goods contributions to projects of value to them. The amount received by the project is (proportional to) t…
▽ More
We propose a design for philanthropic or publicly-funded seeding to allow (near) optimal provision of a decentralized, self-organizing ecosystem of public goods. The concept extends ideas from Quadratic Voting to a funding mechanism for endogenous community formation. Individuals make public goods contributions to projects of value to them. The amount received by the project is (proportional to) the square of the sum of the square roots of contributions received. Under the "standard model" this yields first best public goods provision. Variations can limit the cost, help protect against collusion and aid coordination. We discuss applications to campaign finance, open source software ecosystems, news media finance and urban public projects. More broadly, we offer a resolution to the classic liberal-communitarian debate in political philosophy by providing neutral and non-authoritarian rules that nonetheless support collective organization.
△ Less
Submitted 16 August, 2020; v1 submitted 17 September, 2018;
originally announced September 2018.