Show simple item record

SI 680 - Contracting and Signaling, Winter 2008

dc.contributor.authorMacKie-Mason, Jeffrey K.en_US
dc.date.accessioned2010-02-05T15:25:54Z
dc.date.available2010-02-05T15:25:54Z
dc.date.issued2008-01en_US
dc.identifier.citationMacKie-Mason, J. K. (2008, October 28). Contracting and Signaling. Retrieved from Open.Michigan - Educational Resources Web site: https://open.umich.edu/education/si/si680-winter2008. <http://hdl.handle.net/2027.42/64965>en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/64965
dc.descriptionCourse prepares you to advise clients or your own organization on the design of contracts and screening policies when one of the parties has an information advantage over the other. For example, students study the design of patent licenses (the licensor knows more about the market), the design of social systems to reduce spam (the spam sender knows more about the content before the recipient decides whether to read), and the design of performance contracts for professional services (e.g., consultants, contract programmers, etc., when the contractor knows more than the employer about her level of effort). This course follows SI 646.en_US
dc.format.extent3113 bytes
dc.format.extent5645 bytes
dc.format.extent1048064 bytes
dc.format.extent2693632 bytes
dc.format.extent1365567 bytes
dc.format.extent779264 bytes
dc.format.extent371146 bytes
dc.format.extent1831537 bytes
dc.format.extent629988 bytes
dc.format.extent144663 bytes
dc.format.extent966656 bytes
dc.format.extent4796416 bytes
dc.format.extent641211 bytes
dc.format.extent160256 bytes
dc.format.extent254074 bytes
dc.format.extent168213 bytes
dc.format.extent149727 bytes
dc.format.extent373546 bytes
dc.format.extent135421 bytes
dc.format.extent140421 bytes
dc.format.extent139468 bytes
dc.format.extent352254 bytes
dc.format.extent222591 bytes
dc.format.extent278475 bytes
dc.format.extent292613 bytes
dc.format.extent886891 bytes
dc.format.extent245413 bytes
dc.format.extent199715 bytes
dc.format.extent145408 bytes
dc.format.extent169624 bytes
dc.format.extent16758685 bytes
dc.format.mimetypetext/plain
dc.format.mimetypeapplication/rdf+xml
dc.format.mimetypeapplication/vnd.ms-powerpoint
dc.format.mimetypeapplication/vnd.ms-powerpoint
dc.format.mimetypeapplication/octet-stream
dc.format.mimetypeapplication/vnd.ms-powerpoint
dc.format.mimetypeapplication/octet-stream
dc.format.mimetypeapplication/octet-stream
dc.format.mimetypeapplication/octet-stream
dc.format.mimetypeapplication/octet-stream
dc.format.mimetypeapplication/vnd.ms-powerpoint
dc.format.mimetypeapplication/vnd.ms-powerpoint
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/msword
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/msword
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/zip
dc.publisherOpen.Michiganen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.subjectIntellectual Property, Contract Design, Incentive Centered Design, Contracting, Signaling, Screening Policies, Incentive Centered Design Methodologyen_US
dc.titleSI 680 - Contracting and Signaling, Winter 2008en_US
dc.typeLearning Objecten_US
dc.contributor.affiliationumSchool of Informationen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/5/MacKie-Mason-SI680-W08-Lecture3-Incentive%20Pay.ppt
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/6/MacKie-Mason-SI680-W08-Lecture1-IntroToContracts.ppt
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/7/MacKie-Mason-SI680-W08-Lecture1-IntroToContracts.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/8/MacKie-Mason-SI680-W08-Lecture5-hidden-characteristics-examples.ppt
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/9/MacKie-Mason-SI680-W08-Lecture5-hidden-characteristics-examples.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/10/MacKie-Mason-SI680-W08-Lecture2-HiddenActionI.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/11/MacKie-Mason-SI680-W08-Lecture6-gnaling.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/12/MacKie-Mason-SI680-W08-Lecture3-Incentive%20Pay.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/13/MacKie-Mason-SI680-W08-Lecture6-gnaling.ppt
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/14/MacKie-Mason-SI680-W08-Lecture2-HiddenActionI.ppt
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/15/MacKie-Mason-SI680-W08-Syllabus.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/16/MacKie-Mason-SI680-W08-Syllabus.doc
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/17/MacKie-Mason-SI680-w08-class5-case-key-RIM.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/18/MacKie-Mason-SI680-w08-class6-case-asgnment-Digg.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/19/MacKie-Mason-SI680-w08-class1-case-asgnment-when-is-info-strategic.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/20/MacKie-Mason-SI680-w08-class4-LectureNotes-tech-licenng-case.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/21/MacKie-Mason-SI680-w08-class5-case-asgnment-RIM.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/22/MacKie-Mason-SI680-w08-class4-case-asgnment-tech%20transfer.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/23/MacKie-Mason-SI680-w08-class2-case-asgnment-vermeer.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/24/MacKie-Mason-SI680-w08-class4-LectureNotes-hidden%20characteristics%20base%20model.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/25/MacKie-Mason-SI680-w08-class2-LectureNotes-symmetricInformation.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/26/MacKie-Mason-SI680-w08-class4-LectureNotes-lemons%20model%20example.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/27/MacKie-Mason-SI680-w08-class3-LectureNotes-asymmetric%20contracting%20model.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/28/MacKie-Mason-SI680-w08-class3-LectureNotes-hidden-action-numerical-example.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/29/MacKie-Mason-SI680-w08-class6-LectureNotes-hidden-characteristics-gnaling.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/30/MacKie-Mason-SI680-w08-class5-LectureNotes-hidden-characteristics-veroning.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/31/MacKie-Mason-SI680-W08-Schedule.doc
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/32/MacKie-Mason-SI680-W08-Schedule.pdf
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/64965/33/si680-winter2008.zip
dc.owningcollnameOpen Educational Resources


Files in this item

Show simple item record

http://creativecommons.org/licenses/by-nc-sa/3.0/
Except where otherwise noted, this item's license is described as http://creativecommons.org/licenses/by-nc-sa/3.0/

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.