SI 680 - Contracting and Signaling, Winter 2008
dc.contributor.author | MacKie-Mason, Jeffrey K. | en_US |
dc.date.accessioned | 2010-02-05T15:25:54Z | |
dc.date.available | 2010-02-05T15:25:54Z | |
dc.date.issued | 2008-01 | en_US |
dc.identifier.citation | MacKie-Mason, J. K. (2008, October 28). Contracting and Signaling. Retrieved from Open.Michigan - Educational Resources Web site: https://open.umich.edu/education/si/si680-winter2008. <http://hdl.handle.net/2027.42/64965> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/64965 | |
dc.description | Course prepares you to advise clients or your own organization on the design of contracts and screening policies when one of the parties has an information advantage over the other. For example, students study the design of patent licenses (the licensor knows more about the market), the design of social systems to reduce spam (the spam sender knows more about the content before the recipient decides whether to read), and the design of performance contracts for professional services (e.g., consultants, contract programmers, etc., when the contractor knows more than the employer about her level of effort). This course follows SI 646. | en_US |
dc.format.extent | 3113 bytes | |
dc.format.extent | 5645 bytes | |
dc.format.extent | 1048064 bytes | |
dc.format.extent | 2693632 bytes | |
dc.format.extent | 1365567 bytes | |
dc.format.extent | 779264 bytes | |
dc.format.extent | 371146 bytes | |
dc.format.extent | 1831537 bytes | |
dc.format.extent | 629988 bytes | |
dc.format.extent | 144663 bytes | |
dc.format.extent | 966656 bytes | |
dc.format.extent | 4796416 bytes | |
dc.format.extent | 641211 bytes | |
dc.format.extent | 160256 bytes | |
dc.format.extent | 254074 bytes | |
dc.format.extent | 168213 bytes | |
dc.format.extent | 149727 bytes | |
dc.format.extent | 373546 bytes | |
dc.format.extent | 135421 bytes | |
dc.format.extent | 140421 bytes | |
dc.format.extent | 139468 bytes | |
dc.format.extent | 352254 bytes | |
dc.format.extent | 222591 bytes | |
dc.format.extent | 278475 bytes | |
dc.format.extent | 292613 bytes | |
dc.format.extent | 886891 bytes | |
dc.format.extent | 245413 bytes | |
dc.format.extent | 199715 bytes | |
dc.format.extent | 145408 bytes | |
dc.format.extent | 169624 bytes | |
dc.format.extent | 16758685 bytes | |
dc.format.mimetype | text/plain | |
dc.format.mimetype | application/rdf+xml | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/octet-stream | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/octet-stream | |
dc.format.mimetype | application/octet-stream | |
dc.format.mimetype | application/octet-stream | |
dc.format.mimetype | application/octet-stream | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/msword | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/msword | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/zip | |
dc.publisher | Open.Michigan | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.subject | Intellectual Property, Contract Design, Incentive Centered Design, Contracting, Signaling, Screening Policies, Incentive Centered Design Methodology | en_US |
dc.title | SI 680 - Contracting and Signaling, Winter 2008 | en_US |
dc.type | Learning Object | en_US |
dc.contributor.affiliationum | School of Information | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/5/MacKie-Mason-SI680-W08-Lecture3-Incentive%20Pay.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/6/MacKie-Mason-SI680-W08-Lecture1-IntroToContracts.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/7/MacKie-Mason-SI680-W08-Lecture1-IntroToContracts.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/8/MacKie-Mason-SI680-W08-Lecture5-hidden-characteristics-examples.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/9/MacKie-Mason-SI680-W08-Lecture5-hidden-characteristics-examples.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/10/MacKie-Mason-SI680-W08-Lecture2-HiddenActionI.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/11/MacKie-Mason-SI680-W08-Lecture6-gnaling.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/12/MacKie-Mason-SI680-W08-Lecture3-Incentive%20Pay.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/13/MacKie-Mason-SI680-W08-Lecture6-gnaling.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/14/MacKie-Mason-SI680-W08-Lecture2-HiddenActionI.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/15/MacKie-Mason-SI680-W08-Syllabus.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/16/MacKie-Mason-SI680-W08-Syllabus.doc | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/17/MacKie-Mason-SI680-w08-class5-case-key-RIM.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/18/MacKie-Mason-SI680-w08-class6-case-asgnment-Digg.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/19/MacKie-Mason-SI680-w08-class1-case-asgnment-when-is-info-strategic.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/20/MacKie-Mason-SI680-w08-class4-LectureNotes-tech-licenng-case.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/21/MacKie-Mason-SI680-w08-class5-case-asgnment-RIM.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/22/MacKie-Mason-SI680-w08-class4-case-asgnment-tech%20transfer.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/23/MacKie-Mason-SI680-w08-class2-case-asgnment-vermeer.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/24/MacKie-Mason-SI680-w08-class4-LectureNotes-hidden%20characteristics%20base%20model.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/25/MacKie-Mason-SI680-w08-class2-LectureNotes-symmetricInformation.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/26/MacKie-Mason-SI680-w08-class4-LectureNotes-lemons%20model%20example.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/27/MacKie-Mason-SI680-w08-class3-LectureNotes-asymmetric%20contracting%20model.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/28/MacKie-Mason-SI680-w08-class3-LectureNotes-hidden-action-numerical-example.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/29/MacKie-Mason-SI680-w08-class6-LectureNotes-hidden-characteristics-gnaling.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/30/MacKie-Mason-SI680-w08-class5-LectureNotes-hidden-characteristics-veroning.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/31/MacKie-Mason-SI680-W08-Schedule.doc | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/32/MacKie-Mason-SI680-W08-Schedule.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/64965/33/si680-winter2008.zip | |
dc.owningcollname | Open Educational Resources |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.