Skip navigation
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNagarajan, S.-
dc.date.accessioned2008-05-27T18:05:42Z-
dc.date.available2008-05-27T18:05:42Z-
dc.date.issued1997-03-
dc.identifier.urihttp://hdl.handle.net/2451/26677-
dc.description.abstractThis paper develops a theory of efficient design of financial securities when different parties in a corporate relationship contract under multilateral asymmetric information. A methodology for analyzing general financial contracting games is proposed. Rigorous, game-theoretic criteria such as incentive-constrained ex ante, interim, and ex post efficiency are used to evaluate the welfare properties of different security designs. The threat points of the various parties are shown to hold the key to overall contracting efficiency, and financial securities become relevant for efficiency only through the threat points. In order to motivate the issue, an application involving security design in joint-ventures is presented first. The theory of efficient security design is presented next, in the context of a large class of general financial contracting games involving investments and multilateral asymmetric information. It is shown that under weak conditions, all securities that are efficient from an ex ante and interim viewpoint involve a quasi-debt feature. Moreover, while a quasi-debt structure improves efficiency in firms with high capital intensity, it has no welfare advantage in firms with little physical capital. Importantly, the results are robust in the sense that they hold whether the agents are risk-neutral or risk-averse, under any distributional assumptions, and regardless of the exact extensive-form specification of the contracting game.en
dc.language.isoen_USen
dc.relation.ispartofseriesFIN-97-006en
dc.titleEfficient Security Design: Theory and Applicationen
dc.typeWorking Paperen
Appears in Collections:Finance Working Papers

Files in This Item:
File Description SizeFormat 
wpa97006.pdf1.56 MBAdobe PDFView/Open


Items in FDA are protected by copyright, with all rights reserved, unless otherwise indicated.