Upload
lyhanh
View
217
Download
3
Embed Size (px)
Citation preview
Global Games in Macroeconomics
Pau Roldan
⇤
This version: November 17, 2014
Abstract
A large variety of macroeconomic phenomena, including debt crises, speculative attacks, bank
runs, investment crashes and socio-political instability, can be thought to be the outcome of strate-
gic complementarities in payo↵s and actions that foster coordination among economic agents. In
such interpretation, multiple equilibria may emerge. Multiplicity has ambiguous implications from
a positive perspective, and an important strand of the macroeconomic literature has focused on
providing theoretical refinements that can help overcome this issue. In the last two decades, a
stylized and tractable game-theoretic approach building on the global games literature first formu-
lated by Carlsson and van Damme (1993) has been proposed and explored in depth. This paper
reviews the theory of global games, with emphasis on its implications for equilibrium selection, as
well as a few of its recent and most relevant applications to macroeconomics.
⇤New York University, Department of Economics. 19 W 4th Street, O�ce 620. Contact: [email protected].
Contents
1 Introduction 3
2 Theory summary 5
2.1 An introductory example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Symmetric binary-action global games . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.1 Global games with uniform prior and private values . . . . . . . . . . . . . . . . 8
2.2.2 Global games with generic prior and common values . . . . . . . . . . . . . . . . 10
3 Applications of global games in macroeconomics 11
3.1 Morris and Shin (1998): The baseline game . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.2 The role of market-clearing prices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.2.1 Angeletos and Werning (2006): Trade in financial markets . . . . . . . . . . . . . 16
3.2.2 Hellwig, Mukherji and Tsyvinski (2006): The role of interest rates . . . . . . . . 20
3.3 The role of equilibrium outcomes as signaling devices . . . . . . . . . . . . . . . . . . . . 28
3.3.1 Angeletos, Hellwig and Pavan (2006): Policy as a signal for the investors . . . . . 28
3.3.2 Goldstein, Ozdenoren and Yuan (2011): Attacks as a signal for the policy-maker 31
3.4 Dynamic models of global games . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.4.1 Morris and Shin (1999): A repeated static global game . . . . . . . . . . . . . . . 35
3.4.2 Angeletos, Hellwig and Pavan (2007): Endogenous dynamics and timing of attacks 37
3.4.3 Steiner (2008): Coordination cycles through the role of participation . . . . . . . 43
4 Discussion 49
4.1 A dynamic partial-equilibrium model of coordination-driven growth . . . . . . . . . . . 50
4.2 A dynamic general-equilibrium model of coordination-driven growth . . . . . . . . . . . 53
5 Concluding remarks 58
2
1 Introduction
An economy is a large macro-structure that is populated by a variety of agents who interact, form
expectations over uncertain future payo↵s and take optimal decisions with respect to their information
sets. There exist many situations in which such interactions may give rise to strategic coordination
motives because individual payo↵s depend not only on an underlying economic fundamental that
shapes the aggregate state of the economy and that the agents might perceive in di↵erent ways, but
also on the actions that other players undertake. In these cases, agents must form beliefs about
what other agents believe, and di↵erent coordination schemes can be sustained and be self-fulfilling in
equilibrium. For example, with the prospect of a devaluation, a great mass of speculators may attack
on a currency if the fundamentals are (or are perceived to be) weak, which in turn would drive the
policy-maker to devaluate for a su�ciently strong attack, thereby confirming the ex-ante expectations
of the individual agents. Importantly, this may occur even when each individual agent is atomistic
and acknowledges that her action alone is insu�cient for such an attack to yield aggregate success.
However, the coordination-driven correlation in actions may push the final outcome to correspond
exactly to the overall prior market expectation.
From this point of view, many macroeconomic phenomena, ranging from debt and currency crises
to investment crashes and political instability, can be understood as the outcome of self-fulfilling
expectations, higher-order beliefs and information processing in an environment of strategic uncertainty
(i.e, uncertainty about the behavior of other agents) and payo↵ complementarities (i.e, actions that
individually deliver a higher payo↵ when also chosen by others). It is therefore natural to model
such scenarios as games in which players interact in coordination and their payo↵s depend on their
own actions, the actions of others and the economic fundamentals. If such fundamentals are common
knowledge, di↵erent agents may tacitly coordinate into choosing the same actions in equilibrium.
There exists a vast body of work in the macroeconomic field in which coordination motives are
responsible for the existence of multiple equilibrium outcomes. In currency and balance-of-payment
crises, this view has historically been split into two major currents. First generation models, starting
with Krugman (1979) and Flood and Garber (1984) and refined by Broner (2008) and others, view
crises as arising from inconsistent policies and the central bank’s inability or unwillingness to sustain
the costs of high interest rates. Second generation models, starting with Obstfeld (1986), view crises
as a coordinated run on the central bank’s reserves of foreign currency. In this latter view, multiple
outcomes can be sustained in equilibrium both because informational di↵erences between investors give
rise to coordination and because asset markets may clear at di↵erent interest rates that are consistent
with an uncovered interest rate parity condition. Chari and Kehoe (2003) show that the investors’
ability to infer other agent’s private information from their actions can account for the unpredictability
3
of crises and for herd-like capital flows. Other models in which debt crises are modeled as coordination
games featuring multiple equilibria are Calvo (1988), Obstfeld (1996) and Cole and Kehoe (2000), to
name a few relevant examples.
Other interpretations include bank runs, asset price crashes, fluctuations in search activity and
episodes of revolution and socio-political distress. For bank runs, Diamond and Dybvig (1983) show
that even stable banks may be vulnerable to self-fulfilling panics if there is a systemic mismatch of
long-maturity assets and short-maturity liabilities. In the spirit of the global games selection mecha-
nism described below, Goldstein and Pauzner (2005) resolve this equilibrium indeterminacy by adding
idiosyncratic noise into an otherwise identical economy, which allows the analysis to provide unam-
biguous statements regarding the probability of runs and the welfare of banks. Within the literature on
asset market crashes, Barlevy and Veronesi (2003) show that uninformed stock market investors who
panic may cause asset prices to plummet and precipitate financial crises because they react too strongly
against fundamentally-driven declining prices. This interpretation again emphasizes the informational
friction as being at the core of the main amplification force behind the large impact of seemingly small
shocks. For applications to search, Diamond (1982) showed that multiplicity of equilibria can arise
from a matching problem with trading frictions in which recessions, as henceforth viewed by Keyne-
sians, are associated with “coordination failures”. Based on this result, Steiner (2008) provides a brief
but enlightening example of fluctuations in search activity within the framework that we will analyze
in section 3.4.3. Finally, for socio-political crises, Edmond (2013), inspired by Atkeson’s (2000) com-
ments on Morris and Shin (1998), presents a model of revolution against a political regime in which
the information manipulation by autocratic authorities may ensure their survival.
Although diverse in style, the models briefly surveyed above all share the idea that information
heterogeneities may themselves be at the core of financial crises. While this view is appealing, two
rather technical concerns immediately arise from it. First, since coordination requires rationality
in the choice of one’s actions as a best response to those of others, it also demands the individual
forecast of others’ actions and, in turn, of others’ forecasts about such actions. Since others’ beliefs
become individual states, one may need to condition on the entire infinite hierarchy of higher-order
beliefs in order to fully describe the equilibrium set of the economy. This dimensionality problem can
become intractable if not adequately dealt with1. Second, when economic fundamentals are common
knowledge, coordination may give rise to multiplicity. This is an issue for drawing both determinate
economic predictions and unambiguous policy implications.
Global games o↵er a tractable and stylized solution to both these concerns. A global game is
said to be a game of incomplete information within an environment of strategic uncertainty in which
1This is a well-understood problem that goes back to the classic rational expectations revolution literature in macroe-conomics, including Muth (1961), Lucas (1975), Townsend (1983), and Sargent (1991), among others.
4
players receive private signals on unknown economic fundamentals. By introducing private noise, the
coordination motive is dampened: if the quality of the private signal is su�ciently high (as measured
by the precision of its noise), agents will place enough weight on information others do not share and
multiplicity will not to arise in equilibrium. If they expect other agents to behave in a similar fashion,
this behavior can aggregate up enough for the model to select a unique outcome. In the words of
Chamley (2003), “the problem of multiple equilibria disappears because a contagion process from the
agents with extreme beliefs leads all other agents either to action or to inaction”. In short, private
information eliminates the multiplicity e↵ects of common knowledge if the former is su�ciently precise:
uniqueness obtains as a perturbation away from perfect information. Moreover, under regularity
conditions on payo↵s, the model can be solved by iterated deletion of dominated strategies and reduced
into an analysis by threshold strategies, which enable the agents to make use of a more tractable belief
inference without loss of generality and reduces the dimensionality of the problem immensely as higher-
order expectations drop out of the relevant state of the economy. These insights were first shown by
Carlsson and van Damme (1993) and later on applied in macroeconomics, most notably by Morris and
Shin (1998).
In this paper, I present the basic theory of global coordination games and review a few applica-
tions in macroeconomics. To fix ideas, Section 2 o↵ers an introduction to simple global games, as
presented by Carlsson and van Damme (1993) and further developed by Morris and Shin (2003). This
section presents key technical results that rely on the payo↵ structure of the game and are key for
the equilibrium selection mechanisms provided later on to be e↵ective. In Section 3, I present several
recent applications of the literature to common macroeconomic problems. I start with Morris and Shin
(1998), who first introduced a uniqueness result in a model of currency crises. The remainder of the
section is devoted to studying di↵erent extensions of the baseline model in relevant dimensions under
which the uniqueness result breaks down. The intuition is simple: introducing public information,
either exogenously or endogenously through information aggregation in market prices, signaling in
public policy or periodical revelation of information in dynamic settings, provides a common source of
knowledge that allows agents to coordinate in their actions. In this strand of literature, I will review
a few of what I consider to be the most insightful papers. Section 4 includes a discussion and outlines
a potential line of further research on the topic. Section 5 concludes.
2 Theory summary
This section reviews the general theory behind the global game approach to economic problems that
exhibit complementarities in actions, payo↵s and, possibly, information. In the general framework,
the fundamentals of the economy are assumed to be summarized by a single state variable ✓ 2 R
5
which enters the payo↵ function of the decision maker. If this state is common knowledge, agents can
exploit their shared information and coordinate in equilibrium to give rise to a multiplicity of outcomes.
However, we additionally suppose that each agent observes a di↵erent signal that is private information
to that agent. Assuming that the noise technology is common knowledge, but the fundamental state
✓ is not, agents must form beliefs about the fundamentals, about other players’ beliefs about the
fundamentals, about other players’ beliefs about such beliefs, and so on. We next analyze how this
can be made tractable.
2.1 An introductory example
Take the following example from Carlsson and van Damme (1993). There are two players, indexed
i = 1, 2, unilaterally choosing an action a
i
2 {0, 1} in a one-shot simultaneous game. For example,
consider ai
= 1 to be investment, and a
i
= 0 no investment. Their payo↵s are summarized in Table 1.
The fundamental ✓ 2 R is drawn by nature before the game starts.
a2 = 1 a2 = 0
a1 = 1 ✓,✓ ✓ � 1,0a1 = 0 0,✓ � 1 0,0
Table 1: Payo↵ matrix for the investment game example.
Suppose first that ✓ is common knowledge among the players. The game can be solved in three
cases. If ✓ > 1, then each player has a dominant strategy to invest and (1, 1) is the unique Nash
equilibrium in pure strategies. If ✓ < 0, each player has a dominant strategy not to invest and (0, 0)
is the unique Nash equilibrium in pure strategies. Finally, for any ✓ 2 (0, 1), both agents investing
and both not investing can be sustained as pure Nash equilibria. Overall, the game exhibits multiple
equilibria.
Now, assume that ✓ is not common knowledge and there is incomplete information. Nature draws
✓ from a uniform over the real line. This can be thought of being a so-called di↵use (or uninformative)
common prior belief about ✓. Additionally, each agent i receives a signal xi
that is private information,
with
x
i
= ✓ + "
i
where "i
⇠ N (0, 1/�) and � � 0 is the so-called precision of the private signal. Endowed with this
information, agent i’s posterior belief about ✓ is
6
✓|xi
⇠ N (xi
, 1/�)
Note that, since the information technology is common knowledge, this agent believes his opponent’s
signal to be distributed according to x�i
|xi
⇠ N (0, 2/�).
A strategy for player i is a map x
i
7! {0, 1} which we call s. The solution can in principle involve
the infinite inference of beliefs between the two agents. However, a much simpler solution procedure
based on iterative deletion of dominated strategies turns out to be of use here. We will shortly analyze
conditions under which such solutions can be applied in more general settings.
Conjecture that the solution is in so-called threshold (or monotone) strategies. This is, suppose
that there exists a cut-o↵ point x⇤ 2 R such that we can write the optimal strategy by
s(xi
) = 1[xi
>x
⇤]
for either i, where 1[·] is an indicator function. This means that the agent will choose not to invest
if his signal realization conveys information about the fundamental having a bad enough realization,
given what the other player’s beliefs are and what her beliefs about the beliefs are, as represented by
a realization of the signal that is below the threshold value. This strategy is thus a switching strategy
around x
⇤, and is monotone in the sense that there is only one such switching point2.
Under this strategy, the posterior probability assigned by i to her opponent choosing to invest is
P[x�i
> x
⇤] = 1� � r
�
2(x⇤ � x)
!
where �(·) henceforth denotes the c.d.f. of the standard normal distribution. For example, if the
player has observed a signal that is equal to the cutting point of the opponent, she will always assign
probability 1/2 to her opponent choosing to invest.
The conjecture will be confirmed if we can find the value x⇤ that can sustain the proposed strategy
profile as an equilibrium outcome. To do this, we will follow an iterated deletion of strictly dominated
strategies procedure. Morris and Shin (2003) provide the following insight: let b(x⇤) be the unique
value of x solving the equation
x� � r
�
2(x⇤ � x)
!= 0
This means that if the player’s opponent is following a switching strategy with cuto↵ x
⇤, the player’s
best response is to follow a switching strategy with cuto↵ b(x⇤). It can be argued by induction that if
2The agent is indi↵erent at the switching point, so we should rigorously call this an essentially unique solution.Because this is common in all the models that we will study here, we will henceforth ignore this nomenclature.
7
a strategy s survives n 2 N rounds of iterated deletion of strictly dominated strategies, then we can
write
s
i
(xi
) =
8><
>:
1 if xi
> b
n�1(1)
0 if xi
< b
n�1(0)
If the player knew that the opponent would choose action a�i
= 0 if she had observed a signal less
than b
n�1(1), then her own best response would always be to choose action a
i
= 0 if her signal was
less than b(bn�1(1)) ⌘ b
n(1). Moreover, b(·) can be shown to be increasing and to have a unique fixed
point at 1/2, so
limn!+1
b
n(0) =1
2= lim
n!+1b
n(1)
and therefore the equilibrium is in monotone threshold strategies with x
⇤ = 12 .
2.2 Symmetric binary-action global games
The previous example illustrated two key results. First, in simultaneous one-shot two-by-two global
games in which the prior is di↵use, introducing idiosyncratic noise in the information structure reduces
the set of equilibria to a singleton. Second, the analytical convenience of solving for switching strategies
with no loss of generality allows the agents to form beliefs that are based on a single layer of rationality,
as opposed to an infinite hierarchy. Morris and Shin (2003) show that this insight extends to similar
games with more players (for instance a continuum of them), non-binary choices and asymmetric
payo↵s. Moreover, when the common prior is not di↵use and there is meaningful public information
that partially restores common knowledge, uniqueness can still arise under parametric conditions on
the relative signal precisions.
In the present paper I will only review models that make use of symmetric-payo↵ binary games and
a continuum of players3. Therefore, for later reference, the remainder of this section provides general
results for such type of games.
2.2.1 Global games with uniform prior and private values
We first consider the case of a uniform common prior on the state and each player’s signal being a
su�cient statistic for how much they care about the state (private information).
3Having a continuum of players allows us to invoke the law of large numbers in order to approximate aggregate choicesas expected outcomes. It also means that each agent is atomistic, and thus cannot unilaterally influence the aggregateoutcome and, therefore, the action of others (see Corsetti et al. (2004) for a study on large players). Moreover, in allour examples, individual actions will not be observable by others, except for the aggregate action. This means thato↵-equilibrium beliefs will not have to be specified.
8
There is a continuum of players of unit mass. Each chooses an action a 2 {0, 1} and has utility
u : {0, 1}⇥ [0, 1]⇥R ! R, where u(a,A, x) is the payo↵ of the individual when taking action a, when
A is the proportion of individuals that take action a = 1 and when the private signal is x. Define
marginal utility ⇡ : [0, 1]⇥ R ! R by
⇡(A, x) ⌘ u(1, A, x)� u(0, A, x)
Before the game starts, a state ✓ 2 R is drawn from an improper uniform density on the real line,
and individual i’s private signal is
x
i
= ✓ +"
ip�
where � > 0 denotes precision and "i
has a continuous density f(·) with support R. It can be shown
that an individual with signal xi
puts (posterior) densityp�f(
p�(x
i
� ✓)) on state the realization of
a particular state ✓.
We assume that the following properties hold:
• A1. Action monotonicity: ⇡(A, ✓) is nondecreasing in A.
• A2. State monotonicity: ⇡(A, ✓) is nondecreasing in ✓.
• A3. Strict Laplacian state monotonicity: There exists a unique ✓⇤ that solves
Z 1
0⇡(A, ✓
⇤)dA = 0 (1)
• A4. Limit dominance: There exist ✓ 2 R and ✓ 2 R such that (i) ⇡(A, x) < 0 for all A 2 [0, 1]
and x ✓; and (ii) ⇡(A, x) > 0 for all A 2 [0, 1] and x � ✓.
• A5. Continuity: The functionR 10 g(A)⇡(A, x)dA is continuous with respect to signal x and
density g(·).
Assumption A1, which states that each player’s utility function is supermodular in the action profile,
implies that there exist strategic complementarities in the game: the individual receives more payo↵
by choosing a = 1 when a larger size of the population is choosing a = 1 as well. Assumption A2 states
that each player’s utility function is supermodular in her own action and the state, too. Assumption A3
is a single-crossing property ensuring that there is at most one crossing in the optimal policy function
for a player with Laplacian beliefs4. Assumption A4 implies that action 0 (1) is a dominant strategy
for su�ciently low (high) signals. Finally, assumption A5 imposes a weak continuity condition.
4According to the definition provided by Morris and Shin (2003), an agent has so-called Laplacian beliefs if she appliesa uniform prior to unknown events from the “principle of insu�cient reason”. That is, each agent hypothesizes that
9
Refer to the game described above and endowed with assumptions A1 to A5 by G
⇤(�). Define
a strategy for a player in the incomplete information game G
⇤(�) as a function s : R ! {0, 1},
where s(x) 2 {0, 1} is the action chosen if a player observes signal x5. Then, we obtain the following
generalization of the result obtained in Section 2.1:
Proposition 1 Let ✓⇤ be defined as in equation (1). Then, the unique perfect Bayesian Nash equilib-
rium (PBE) strategy that survives iterated deletion of strictly dominated strategies in G
⇤(�) is
s(x) =
8><
>:
0 for x ✓
⇤
1 for x � ✓
⇤
Proof: In Morris and Shin (2003), page 66. ⌅
This result shows that one can focus on symmetric monotone PBE in this framework without any
loss of generality. In particular, assumptions A1 and A2 can be shown to be su�cient for equilibria
to be monotonic with respect to agent types (the latter here symbolized by the switching threshold).
Within this class of monotone equilibria, A3 then ensures symmetry and uniqueness. Although there
are ways of relaxing these assumptions (see Morris and Shin (2003), section 2.2.3), assumptions A1,
A2 and A3 are key for the uniqueness results in most static binary global games set-ups.
2.2.2 Global games with generic prior and common values
As it turns out, the insights behind Proposition 1 extend to games with an even more generic
structure. Suppose now that ✓ is instead drawn from a continuously di↵erentiable strictly positive
density p(·) on the real line. Moreover, a player’s utility depends on the realized state ✓, not his
signal x on ✓. Thus, u(a,A, ✓) is the payo↵ if the player chooses action a 2 {0, 1}, a proportion
A 2 [0, 1] of individuals choose action a = 1 and the realized state is ✓. Let, as before, ⇡(A, ✓) ⌘
u(1, A, ✓)� u(0, A, ✓).
We need the following additional assumptions:
• A4*. Uniform limit dominance: There exists ✓ 2 R, ✓ 2 R, and " 2 R++, such that (i)
⇡(A, x) �" for all A 2 [0, 1] and x ✓; and (ii) ⇡(A, x) > " for all A 2 [0, 1] and x � ✓.
• A6. Integrability: The functionR +1�1 zf(z)dz is well-defined.
the proportion of other players who will opt for each action is a uniform random variable over the unit interval. As aconsequence, agents choose an action that is a best response to a uniform belief over the proportion of her opponentschoosing each action. The agents in all the global games that I will present here are, in this sense, Laplacian players.
5Note all i subscripts have been dropped, for each individual can now be indexed by the signal she receives.
10
Assumption A4*, which will replace A4, says that the payo↵ gain to choosing action 0 (1) is
uniformly positive for su�ciently low (high) values of ✓. Assumption A6 ensures that a well-defined
distribution of the noise exists.
Let G(�) denote the incomplete information game with properties A1, A2, A3, A4*, A5 and A6.
The following extension of Proposition 1 holds:
Proposition 2 Let ✓⇤ be defined as in equation (1). For any � > 0, there exists � > 0 such that for
all � �, if strategy s survives iterated deletion of strictly dominated strategies in the game G(�),
then
s(x) =
8><
>:
0 for x ✓
⇤ � �
1 for x � ✓
⇤ + �
Proof: In Morris and Shin (2003), page 68. ⌅
This result therefore says that the uniform prior, private-values game G
⇤(�) is the limit of the
general prior, common-values game G(�) as � becomes arbitrarily large. That is, the posterior beliefs
when private noise is insignificant are almost the same as under a uniform prior.
3 Applications of global games in macroeconomics
The previous section has presented a few critical results for generic games of incomplete information.
This section puts those results into use and provides a review of the literature of global games in
macroeconomics. Many di↵erent interpretations can be provided of the global games approach. In
currency crises, Morris and Shin (1998, 1999), Chamley (2003), Corsetti, Dasgupta, Morris and Shin
(2004), Hellwig, Mukherji and Tsyvinski (2006), Angeletos, Hellwig and Pavan (2006), and Goldstein,
Ozdenoren and Yuan (2011) are some key references. Rochet and Vives (2004) and Corsetti, Guimaraes
and Roubini (2006) in debt crises and Goldstein and Pauzner (2005) in bank runs are other classical
applications. Morris and Shin (2004) apply the insights of Morris and Shin (1998) to a model of debt
pricing. Alternative possible interpretations include liquidity crises, investment crashes, adoption of
new technologies and socio-political unrest.
I start with a brief description of Morris and Shin (1998), a seminal paper showing equilibrium
uniqueness results similar to the ones discussed above within a global game of regime change. I provide
a slightly simplified version of the paper in a way that the model can, but need not, be interpreted
as a second-generation model of currency crises. Moreover, the notation is adapted in a way to
11
accommodate almost all the models that will follow, and to which the basic Morris and Shin game will
serve as a baseline.
3.1 Morris and Shin (1998): The baseline game
Consider a single-shot game in an economy populated by a measure-one continuum of agents,
i 2 [0, 1], and a policy-maker (or central bank). Each agent chooses an action a
i
2 {0, 1} which we
interpret as attacking a status quo (a = 1) or not attacking it (a = 0). There is an opportunity cost
c 2 (0, 1) of attacking. The status quo is abandoned (and therefore the attack is successful) if enough
agents individually choose to attack it relative to the level fundamental, ✓ 2 R, which represents
the strength of the status quo. In particular, there is regime change if, and only if, A > ✓, where
A ⌘R 10 a
j
dj is size of the attack. The regime outcome can thus be expressed as
R(✓) ⌘ 1[A>✓]
and the ex-post individual payo↵ can compactly be given by
U(ai
, A, ✓) = a
i
(R(✓)� c)
This payo↵ says that no attacking individually earns a payo↵ of zero. Attacking earns a payo↵ of
1� c > 0 if the status quo is abandoned, and �c < 0 otherwise.
This framework is general enough to be interpreted in di↵erent ways. In Morris and Shin’s original
description, the status quo is a fixed exchange rate regime, and action a = 1 is interpreted as attacking
the peg by exchanging domestic for foreign currency in the central bank. The fundamental ✓ can be
viewed to proxy for the policy-maker’s cost of defending the fixed regime, whereas A stands for the
amount of reserves of foreign currency that are withdrawn by the population of investors6.
Just as in our first simple example, if the fundamental ✓ were common knowledge, the model would
exhibit multiple equilibria. Again, the solution is almost trivial for ✓ < 0 (where nobody attacking is a
pure Nash equilibrium) and ✓ > 1 (where all attacking is a pure Nash equilibrium). Otherwise, there
is a nonempty set [✓, ✓] ✓ [0, 1] such that all attack if ✓ ✓ and nobody attacks if ✓ � ✓. If ✓ 2 (✓, ✓),
both attack and no attack can be sustained in equilibrium.
Suppose, however, that the fundamental ✓ is not common knowledge among the players. We assume
6More particularly, in their paper, there is a currency pegged to an exchange rate e⇤ which, if the policy-makerdecides to abandon, will float to a rate ⇣(✓) e⇤, where ⇣(·) is an increasing and continuous function. A continuumof speculators with unit measure decides whether or not to short-sell the currency, and the transaction cost of suchan operation is c. The policy-maker defends the currency if the measure of speculators attacking is lower than somelevel k(✓), where k(·) is continuous and increasing. The instantaneous payo↵ of attacking is zero, while attacking earnsa payo↵ of e⇤ � ⇣(✓) � c if k(✓) < A
t
, and �c otherwise. In the set-up we have described, therefore, we have simplyassumed that k(✓) = ✓ and e⇤ � ⇣(✓) = 1, 8✓ 2 R, in order for the model to allow a much more general interpretation.None of the key results depend on these simplifications.
12
that ✓ is observed with noise through the following information structure. At the beginning of time,
nature draws
✓ ⇠ N (z, 1/↵)
or, equivalently, ✓ = z + " with " ⇠ N (0, 1/↵) and (z,↵) common knowledge, and each agent i
receives a private signal
x
i
= ✓ + ⇠
i
where ⇠i
⇠ N (0, 1/�). Once again, we can then index each individual by the signal this individual
receives. Define again the marginal payo↵ as
⇡(A, ✓) ⌘ U(1, A, ✓)� U(0, A, ✓)
Note that assumptions A1, A2 and A3 hold, and therefore the equilibrium analysis from Section 2
can be used. In particular, we can solve for the monotone Bayesian Nash equilibrium by looking for
threshold policies without loss of generality. An informal argument is as follows: note that the c.d.f.
of the agent’s posterior about ✓ is decreasing in x, meaning that an agent believes a high signal to
convey information about a strong fundamental. Moreover, for x < x, where x solves P[✓ 0|x] = c,
attacking is strictly dominant, whereas for x > x, where x solves P[✓ � 1|x] = 1 � c, not attacking
is strictly dominant. Using the monotonicity of beliefs, there must exist a switching point x⇤ 2 [x, x]
below which an individual would choose to attack, and above which the individual would refrain from
doing so.
Therefore, conjecture once more that there is a level x⇤ 2 R such that we can write the optimal
individual strategy as s(x) = 1[x>x
⇤]. Under this conjecture, the aggregate size of the attack is
A(✓) = P[x x
⇤|✓] = �⇣p
�(x⇤ � ✓)⌘
and thus the status quo is abandoned if and only if ✓ ✓
⇤, where ✓⇤ solves ✓⇤ = A(✓⇤), that is
✓
⇤ = �⇣p
�(x⇤ � ✓
⇤)⌘
(2)
On the other hand, x⇤ is the signal that makes the marginal investor indi↵erent between attacking
and not attacking, or P[✓ ✓
⇤|x⇤] = c, that is
1� �✓p
� + ↵
✓�x
⇤ + ↵z
� + ↵
� ✓
⇤◆◆
= c (3)
13
Equations (2) and (3) jointly determine the solution for thresholds (✓⇤, x⇤), confirm the conjecture
and characterize the equilibrium.
Since the common prior is not di↵use, agents can coordinate on the information they share (whose
precision is given by ↵), and multiple equilibria may arise if the quality of private knowledge is not
high enough. Conversely, a su�ciently precise private signal ensures uniqueness. The next result
summarizes this result:
Proposition 3 The equilibrium is unique if and only if private noise is small relative to public noise,
so that
� � ↵
2
2⇡(4)
and is in monotone strategies.
Proof: In Angeletos, Hellwig and Pavan (2007), page 744. ⌅
In other words, provided that the parametric condition (4) holds, Proposition 3 tells us that unique-
ness holds as perturbation away from common knowledge. Note that a tiny amount of noise with respect
to the perfect information benchmark (the limit of which is � = +1) is su�cient to break multiplic-
ity insofar as condition (4) continues to hold. This is because private information anchors individual
behavior and limits the ability to forecast one another’s actions, and thus non-fundamental volatility
vanishes when there is no private noise. Figure 1 illustrates this result by showing an experiment in
which increasing � enough can place the economy in the uniqueness region.
Figure 1: Morris and Shin (1998) uniqueness result.
Notation: �x
⌘ 1/p� and �
z
⌘ 1/p↵.
14
What is more, for given ↵, when the noise in private information is small, then ✓
⇤ converges to
✓1 ⌘ 1 � c, and whenever ✓ is in the neighborhood of ✓1, a small variation in ✓ can trigger a large
and discrete variation in the size of the attack and in the regime outcome:
Proposition 4 For given ↵, as � ! +1, the equilibrium size of the attack is described by:
A(✓) �!
8><
>:
1 if ✓ < ✓1
0 otherwise
Proof: In Angeletos and Werning (2006), page 1732. ⌅
Proposition 4 states that there is a large and discontinuous nonfundamental volatility embedded in
the type of crises that a global game can generate: when agents are perfectly privately informed, they
are able to globally coordinate on the regime outcome, and a low enough fundamental may trigger an
economy-wide attack and a subsequently large devaluation.
The simple version of the model just outlined has the advantage of providing clear and testable
predictions. Rather than merely o↵ering a mechanism with which to select an equilibrium outcome,
in the same spirit as a sunspot variable would do, the global game changes the information structure
of the players and, by introducing information that cannot be shared between investors, eliminates all
strategic motives that may give rise to multiple coordinated outcomes.
Although unambiguous in its prediction, the model’s main results are however not robust to altering
the information structure. Indeed, introducing additional motives for coordination can show how
unstable uniqueness becomes.
A first straightforward way is to introduce exogenous public signals that are precise enough relative
to the private signal. This has been studied, for example, by Hellwig (2002) and Hellwig and Veldkamp
(2008), among others. Both these papers show that in settings in which there are complementarities
in actions, the agents’ optimal choices of information acquisition exhibit complementarities as well.
A second well-explored mechanism through which equilibrium uniqueness may break down is the
introduction of public information through endogenous equilibrium outcomes. The remainder of this
section explores this second channel. First, I will review the role of information aggregation provided
by equilibrium prices, be it asset prices (Angeletos and Werning (2006)) or interest rates (Hellwig,
Mukherji and Tsyvinski (2006)). Second, I will move on to studying public information revealed by
government policies, which act as signaling devices that may a↵ect the outcomes of the Morris and Shin
game in critical ways. The papers I will describe in this strand of literature are Angeletos, Hellwig and
Pavan (2006) and Goldstein, Ozdenoren and Yuan (2011). Finally, I will focus on public information
15
introduced endogenously through the periodical revelation embedded within past outcomes and the
role of coordination cycles within dynamic global games settings. In this literature, I will review three
papers: Morris and Shin (1999), Angeletos, Hellwig and Pavan (2007) and Steiner (2008).
3.2 The role of market-clearing prices
If a Morris and Shin (1998) game is augmented to introduce equilibrium prices that must clear the
markets, the observation of such prices prior to the coordination game may allow the agents to make
inference about the state of the economy. If this information is shared by everyone, coordination may
be reinforced, actions may feedback back and forth between market activities and speculative episodes,
and multiplicity may once again arise. Indeed, if market activities depend on the information that
is privately owned by agents, there may exist interesting interactions between public knowledge and
private precision. Angeletos and Werning (2006) provide one such example when there is the possibility
of trade.
3.2.1 Angeletos and Werning (2006): Trade in financial markets
Consider the Morris and Shin game of Section 3.1 and suppose it is augmented in the following
way. Prior to the speculative attack stage, now a second stage within the game, there exists a first
stage in which each agent i 2 [0, 1] can trade over a risky asset with dividend f(✓) at a price p. Agent i
must choose the amount k of her wealth w to allocate to the risky asset in order to maximize a CARA
objective:
v(w) = �e
��w
where � > 0 is the coe�cient of risk aversion and w is total individual wealth, given by
w = w0 � pk + f(✓)k
where w0 � 0 is an initial level of wealth. In order to prevent prices from being perfectly revealing,
the asset supply is stochastic7 and given by
K
s(") ="p�
where " ⇠ N (0, 1) is the supply noise and � > 0 is a commonly observed precision. Once trade has
ended, prices are observed and individuals play a Morris and Shin (1998) game in the second stage.
7Otherwise, the Grossman and Stiglitz (1980) paradox would emerge: if all information were reflected in the price(that is, if markets were informationally e�cient), no trader would have the incentive to spend resources in order togather information and trade on it, which would contradict that all information can be included in the price.
16
This stage is identical to the model described in Section 3.1, and therefore all details are suppressed
here.
The following describes an equilibrium of this economy:
Definition 1 An equilibrium is a price function P (✓, "), individual strategies for investment and at-
tacking, k(x, p) and a(x, p), and their corresponding aggregates, K(✓, p) and A(✓, p), such that:
k(x, p) 2 argmaxk2R
E[v(w0 + (f(✓)� p)k)|x, p]
K(✓, p) = E[k(x, p)|✓, p]
K(✓, P (✓, ")) = K
s(")
a(x, p) 2 arg maxa2{0,1}
E[U(a,A(✓, p), ✓)|x, p]
A(✓, p) = E[a(x, p)|✓, p]
This definition says that the first-stage optimal portfolio of the individual maximizes ex-ante ex-
pected utility given the budget constraint, where the expectation is taken with respect to the indi-
vidual’s information set (first equation); the aggregate demand of the asset at any price is the sum
of all the individual demands (second equation); asset prices P (✓, ") clear the asset market given the
asset supply (third equation); the second-stage choice a 2 {0, 1} of whether or not to attack maximizes
expected utility of attacking (fourth equation); and the aggregate size of the attack is the sum of all
the attacks (fifth equation). As before, we define the equilibrium regime outcome as
R(✓, ") ⌘ 1[A(✓,P (✓,"))>✓]
For simplicity, suppose that dividends are given by f(✓) = ✓. Solving for the equilibrium, we can
guess a linear price function that is not perfectly revealing. By Bayes’ rule, the price is a normally
distributed public signal with precision �p
, and the posterior fundamental is
✓|x, p ⇠ N✓�x+ �
p
p
� + �
p
,
1
� + �
p
◆
Since agents have CARA utility, their individual asset demand is the ratio of the mean excess
posterior return on volatility of posterior return (a Sharpe ratio):
k(x, p) =�(x� p)
�
Clearing the asset market, the equilibrium price can be found to be:
17
P (✓, ") = ✓ � "p�
p
where
�
p
⌘ �
2�
�
2
In sum, the price is a signal that the agents use in the second stage during the speculative attack
game. Note that this signal is endogenous and public, as it emerges from equilibrium trade. Impor-
tantly, public information now improves with private information, as �p
is an increasing function in �.
Intuitively, when agents are better privately informed about the fundamental, they are better informed
about the dividend that the asset will pay out, which makes trade become less risky and prices to be
more informative. This is because when private signals are more precise, asset demands are more sen-
sitive and equilibrium prices react more to fundamental than to non-fundamental variables, conveying
more precise information.
Crucially, whereas in the Morris and Shin (1998) game of Section 3.1 one could increase the precision
of private information and enter the uniqueness region with a fixed quality of public information (recall
Figure 1), this is no longer possible as better private information entails now better public information.
Furthermore, if private precision increases at a fast enough rate, the economy might never leave the
multiplicity region, which may therefore survive even as a negligible perturbation away from perfect
information. This last case is illustrated by Figure 2.
Figure 2: Angeletos and Werning (2006) multiplicity result.
Notation: �x
⌘ 1/p�, �
z
⌘ 1/p↵ and �
p
⌘ 1/p
�p
.
The next proposition provides the formal statement: in contrast to Proposition 3, uniqueness holds
for a su�ciently small private information precision, conditional on public information precision being
18
small too.
Proposition 5 There are multiple equilibria if either � or � (or both) are large enough. In particular,
if the following parametric condition holds:
��
p� > �
2p2⇡
Proof: In Angeletos and Werning (2006), page 1732. ⌅
Therefore, multiplicity is ensured when better private information improves public information
at a rate that is fast enough. In particular, for the argument to of through, the endogenous public
noise must fall at a rate faster than does the square root of the exogenous public noise. In this case,
uniqueness can no longer be viewed as a small perturbation away from perfect information, and crises
may arise as episodes of non-fundamental volatility (e.g., sunspots that select the equilibrium outcome)
in which informative variables are being closely monitored8.
A second result refers to the perfect information limit of this economy:
Proposition 6 As either source of noise vanishes (� ! +1 for given �, or � ! +1 for given �),
there exists a passive equilibrium in which R(✓, ") ! 0 for any ✓ 2 (✓, ✓), as well as an aggressive
equilibrium in which R(✓, ") ! 1, for any ✓ 2 (✓, ✓).
Proof: In Angeletos and Werning (2006), page 1732. ⌅
Therefore, in contrast to the statement of Proposition 4, it is no longer true that there is a
unique discontinuity in the regime outcome in the perfect information limit, as both extreme common-
knowledge outcomes can be recovered as either source of noise vanishes: the regime can be either
abandoned or maintained regardless of the fundamental ✓. In this sense, non-fundamental volatility
is non-vanishing even when either source of noise is negligibly small, and multiplicity emerges in the
limit. This result is in sharp contrast to the Morris and Shin benchmark of Section 3.1, and turns
out to be robust to making the dividend endogenous (a function of the aggregate state A) and to
introducing the possibility for agents to observe the actions of each other (see sections III and IV in
Angeletos and Werning (2006) for details).
In sum, Angeletos and Werning (2006) show that the uniqueness result highlighted in Section
3.1 is fragile to adapting the information structure to a market game that, if played prior to the
coordination stage, delivers outcomes that foster otherwise absent coordination within the strategic
8Yet another interpretation comes from using the definition of �p
and restating the parametric condition as�
pp�
>p2⇡.
Thus, multiplicity requires the precision of the price signal to be high enough.
19
uncertainty framework. This channel emphasizes the feedback e↵ects that private information exhibits
in relation to the public information that is inferred from first-stage equilibrium outcomes, and is
shown to be robust enough to survive in the perfect information limit. However, as we show next,
multiplicity need not stem from information complementarities. We next examine an example in which
multiplicity will emerge from market outcomes directly as opposed to indirectly through the e↵ect of
such outcomes on the information set of the agents.
3.2.2 Hellwig, Mukherji and Tsyvinski (2006): The role of interest rates
In the speculative attack interpretation of both Morris and Shin (1998) and Angeletos and Werning
(2006), a successful attack is viewed as a coordinated run on the central bank’s foreign reserves when
interest rates are exogenously determined and the policy-maker’s decision is mechanically driven by
the strength with which the status quo (a peg) can be maintained. Within a similar game in which
investors are heterogeneous in their information endowment, Hellwig, Mukherji and Tsyvinski (2006)
emphasize the role of market-clearing interest rates and explore the multiplicity channel that is origi-
nated in deeper market interactions than those studied by Morris and Shin. By focusing on the role of
equilibrium prices, not only they are capable of examining the feedback interactions between endoge-
nous public information and exogenous private information, as in Angeletos and Werning, but also they
can disentangle these e↵ects from those that are purely due to the market-clearing conditions in the
domestic bond market, and which manifest themselves in the form of non-monotonic demand schedules
and, therefore, multiple market-clearing prices even in the absence of informational incompleteness9.
Consider the following economy. There is a mass-one continuum of agents i 2 [0, 1] called traders.
Each trader is endowed with one unit of domestic currency and must choose only one of two possible
actions: buy the domestic bond, which returns a safe market-determined interest rate r > 0, or
exchange the endowment for foreign currency in the central bank (CB), which earns a net return of
one in case of devaluation, and nothing if the CB decides to maintain the peg. The investment returns
are summarized in Table 2.
Devaluation No devaluation
Currency 1 0Domestic bond r r
Table 2: Net returns of the investment game.
9To be fair, this channel was also briefly explored in Section III of Angeletos and Werning (2006), though it lessdepth.
20
The CB acts as in the standard Morris and Shin game in the sense that it mechanically compares
the costs of devaluations against the strength of the status quo. Whereas this cost was in our original
example equal to the size of the attack A (interpreted as the loss of foreign reserves, or total amount
of foreign currency withdrawn by traders), here it may potentially also depend on interest rates, r.
Denoting the cost of maintaining the status quo by C(r, A), the CB will choose to devaluate if and
only if
✓ C(r, A)
where C(·) is increasing in both arguments. In this way, the model will be able to analyze scenarios
in which devaluations are triggered by high interest rates, as in Obstfeld (1996), as well as cases in
which devaluations are the result of unsustainable reserve losses after coordinated runs on CB deposits,
as in Morris and Shin (1998) and second generation models of currency crises in the spirit of Obstfeld
(1986).
The game unfolds in three stages. In the first stage, nature draws the fundamental from a uniform
with support in the real line (an improper common prior), such that a priori any realization of ✓ 2 R
is deemed equally likely. In addition, each trader i receives an unbiased private signal:
x
i
= ✓ + ⇠
i
where ⇠i
⇠ N (0, 1/�). In the second stage, the domestic bond market and the CB open, and
traders submit contingent bid schedules
a(xi
, r) 2 [0, 1]
d(xi
, r) = 1� a(xi
, r)
on foreign currency holding and domestic bond holdings, respectively. The supply of bonds is
exogenously given by10
S(s, r) = �(s� ���1(r))
where �(·) is the c.d.f. of a standard normal, � � 0 controls the price elasticity of the bond supply
(with � = 0 meaning that the supply is inelastic), and s is a supply shock
10The functional form of S(s, r) is inessential but tractable. What is essential is that S1(·) > 0 and S2(·) � 0.
21
s ⇠ N (0, 1/�)
that prevents prices form revealing information. Finally, in the third stage, the CB decides whether
or not to maintain the peg after observing ✓, r and A, and a devaluation occurs if and only if ✓
C(r, A).
The following defines an equilibrium of the economy:
Definition 2 A symmetric Perfect Bayesian Equilibrium consists of a bidding strategy a(x, r), an in-
terest rate function R(✓, s), a reserve loss function A(✓, s) and beliefs p(x, r) on the posterior probability
of a devaluation, such that:
1. For any x, r, ✓ and s, a(x, r), A(✓, r), and R(✓, s) satisfy
a(x, r)
8>>>><
>>>>:
= 1 if p(x, r) > r
2 [0, 1] if p(x, r) = r
= 0 if p(x, r) < r
(5)
A(✓, r) =
Za(x, r)
p��(
p�(x� ✓))dx (6)
1�A(✓, R(✓, s)) = S(s,R(✓, s)) (7)
2. For all r such that {(✓, s) : r = R(✓, s)} 6= ;, p(xi
, r) satisfies Bayes’ law.
The equilibrium states, in line (5), that for any pair (x, r), the trader’s optimal bidding strategy is to
compare the expected return on domestic bonds, given by the safe net return r, to the expected return
on foreign currency, given by the subjective probability that an attack succeeds, p(x, r). Line (6) says
that the total loss of reserves from the CB must be equal to the aggregate amount of foreign currency
that is withdrawn by traders for any state ✓ and interest rate r. Line (7) states that an equilibrium
interest rate function R(✓, s) must clear the domestic bond market for any state pair (✓, s). This
naturally creates a correspondence R(✓, s), defined by r 2 R(✓, s) if and only if 1� A(✓, r) = S(s, r),
interpreted as the set of market-clearing rates for given state (✓, s). Finally, a consistency condition
is imposed: for all market-clearing interest rates, posterior beliefs about the likelihood of devaluation
must be consistent from a Bayes’ rule perspective.
Let us conjecture that the equilibrium can be constructed in monotone threshold strategies. These
are characterized by cut-o↵ rules x
⇤(r) and ✓⇤(r) for r 2 (0, 1) such that a devaluation occurs if and
only if ✓ ✓
⇤(r), and traders demand foreign currency whenever their signal satisfies x x
⇤(r), and
otherwise invest in the domestic bond. The latter implies that we can write
22
p(x, r) = P[✓ ✓
⇤(r)|x, r]
The marginal, or indi↵erent, trader is defined as the trader that receives a signal x that makes him
indi↵erent between both forms of investments, and therefore is such that x = x
⇤(r). From condition
(5), then we get
p(x⇤(r), r) = r
Since p(x⇤(r), r) is here the expected gain from exchanging currency as deemed ex-post by the in-
di↵erent trader, the last equation can be interpreted as an uncovered interest parity condition. Reserve
losses are given by A(✓, r) = �(p�(x⇤(r)� ✓)), and therefore ✓⇤(r) solves
✓
⇤(r) = C(r, A(✓⇤(r), r)) (8)
Finally, imposing bond market clearing, we need r 2 R(✓, s), which under the functional form
assumption for S(s, r) can be shown to be written as
x
⇤(r)� �p�
��1(r) = ✓ � sp�
(9)
For a given threshold x
⇤(r), an interest rate R(✓, s) = r clears the bond market if and only if the
above equation is satisfied for all (✓, s) pairs. Noting that the left-hand side is constant in ✓ and s, the
variable z ⌘ ✓ � s/
p� o↵ers a su�cient statistic for the interest rate to clear the market, and we can
compactly re-express the set R(✓, s) of market-clearing rates with the alternative correspondence
R(z) ⌘⇢r 2 [0, 1] : z = x
⇤(r)� �p�
��1(r)
�
Traders use their own private signal x as well as z to form the posterior
✓|x, z ⇠ N✓x+ �z
1 + �
,
1
�(1 + �)
◆
and if R(z) 6= ;, then Bayes’ law dictates that
p(x, r) = �
✓p�(1 + �)
✓✓
⇤(r)� x+ �x
⇤(r)
1 + �
+��p
�(1 + �)��1(r)
◆◆(10)
To confirm the conjecture, therefore, any monotone strategy equilibrium is characterized by a pair
{✓⇤(r), x⇤(r)} that solves (8) and (9), a posterior belief p(x, r) given by (10), and an interest rate
function R(z) such that R(z) 2 R(z) for every realization of z.
23
The key result is that even though there exists a unique solution {✓⇤(r), x⇤(r)} for the thresholds
that is continuous in r, there exist z realizations for which R(z) is a multi-valued correspondence.
In short, the equilibrium may exhibit multiple market-clearing rates. Intuitively, this is because the
interest rate a↵ects optimal bidding strategies not only directly through a payo↵ e↵ect, for it is the
interest rate what the investor safely obtains in net gains from investing in the bond, but also indirectly
through a devaluation e↵ect, for the interest rate a↵ects the posterior likelihood that a run on CB
reserves can be successful.
In particular, combining market clearing and the marginal trader condition, it can be shown that
r 2 R(z) for any z if
r = �
✓p�(1 + �)
✓✓
⇤(r)� z � �
��1(r)p�(1 + �)
◆◆(11)
There exist three basic components in this equation which identify at least three potential e↵ects
of interest rates in equilibrium.
• First, there is a direct payo↵ e↵ect, as seen in the left-hand side of the last equation: all else
equal, a higher interest rate makes the bond pay more, thereby making it more attractive than
the foreign currency investment.
• Second, r enters in the right-hand side through ✓⇤(r), a devaluation e↵ect : higher r a↵ects the
posterior probability of a devaluation through its e↵ects on the costs of abandoning the currency
for the CB, and therefore its direction will depend on C(r, A).
• Finally, there is a third e↵ect entering in the last term of the right-hand side which operates
through market clearing : if bond supply is not perfectly inelastic (� > 0), a higher interest rate
means a lower supply of bonds and more traders investing in dollars. By market clearing, this
must translate into the indi↵erent investor expecting a higher ✓ and thus becoming less optimistic
about the likelihood of a devaluation (a higher x⇤(r)), which renders the bond more attractive.
While the first and third e↵ects are unambiguously positive (higher r increases the incentives for
holding the bond), it will be the direction of the second e↵ect what will determine if multiple rates
can clear the market. In particular, for such a case to arise, we need the second e↵ect to be strongly
negative, that is, for a higher r to increase the probability of a devaluation through the policy-maker’s
threshold level ✓⇤(r). Clearly, only if ✓⇤(r) is locally increasing and steep enough in r the devaluation
e↵ect can be strong enough. In turn, this critically depends on how the policy-maker reacts to changes
in r and, therefore, on the functional form of the cost function C(r, A).
Proposition 7 If the devaluation threshold ✓⇤(r) is continuously di↵erentiable and such that
24
@✓
⇤(r)
@r
>
� +p1 + �p
�(1 + �)
✓1
�(��1(r))
◆
then there exist multiple market-clearing interest rate functions (that is, R(z) is a multi-valued
correspondence).
Proof: In Hellwig, Mukherji and Tsyvinski (2006), page 1777. ⌅
Two examples will clearly illustrate the point. To make sure that the critical e↵ect described above
is in action, in both the examples we assume that the supply of bonds is not perfectly inelastic (� > 0).
Moreover, suppose for now that there is common knowledge about ✓.
Example 1: Devaluation triggered by high interest rates First, suppose as in Obstfeld (1996)
that the only reason why the CB could choose to devaluate is because of high interest rates. Then,
C(r, A) = r
and devaluation occurs if and only if ✓ r. Furthermore, suppose for now that ✓ is common
knowledge. Figure 3 depicts the domestic bond market supply and demand schedules for this case.
Figure 3: Domestic bond market supply and demand schedules
when devaluation is triggered by high interest rates.
The fact that demand is backward-bending delivers multiple equilibrium interest rates in spite of
information being perfect. First, for any r 2 (0, ✓), the CB does not devaluate, all investors prefer
25
the bond and A(✓, r) = 0. For any r 2 (✓, 1), the opposite is true: an attack is successful because
interest rates are too high, and no investor chooses to hold the bond for its sure payo↵ is lower than
the expected net gain from exchanging currency. For r 2 {0, ✓, 1}, investors are indi↵erent between
the bond and attacking the currency, and demand is perfectly elastic11. Therefore, since the payo↵
of holding a bond continuously increases as the interest rate increases, but the payo↵ of attacking
the currency increases discretely only when r passes through the threshold ✓, the devaluation e↵ects
locally dominates the payo↵ e↵ect, and multiple equilibria emerge. In particular, R(z) = {0, ✓, 1}.
Importantly, note that multiplicity arises from the specific features of the market environment,
irrespective of the information structure. As it turns out, the same insights carry out to the case with
private information, and multiplicity arises when private signals are su�ciently precise:
Proposition 8 Suppose that C(r, A) = r. Then, in any monotone strategy equilibrium,
• For all r such that {z : r = R(z)} is nonempty, ✓⇤(r) and x
⇤(r) are uniquely characterized by
✓
⇤(r) = r
x
⇤(r) = r +�� �
p1 + �p
(�)(1 + �)��1(r)
• r 2 R(z) if and only if equation (11) holds.
• There are multiple equilibria wheneverp�(1 + �)/(
p1 + � + �) >
p2⇡.
Proof: In Hellwig, Mukherji and Tsyvinski (2006), page 1779. ⌅
Example 2: Devaluation triggered by reserve losses A similar phenomenon occurs when, as
in most second generation models of currency crises, the CB devaluates only if the size of the attack is
too large and the loss of reserves is too severe, regardless of the prevailing interest rates. In this case,
C(r, A) = A
and devaluation occurs if and only if ✓ A. As before, start with the assumption that ✓ is common
knowledge. Figure 4 depicts the market for domestic bonds for this scenario.
11For r = 0, even though an attack on the currency will not pay o↵ for it will be unsuccessful, holding the bond hasa zero net return. For r = 1, attacking will cause a sure devaluation and net gains of one, but this is exactly what theinvestor can obtain by investing in the bond and earning the interest rate out of it for sure. For r = ✓, the central bankwill devaluate with probability ✓, in turn equal to the expected payo↵ of attacking the currency. In all cases, the certainpayo↵ of holding the bond is equal to the expected payo↵ of exchanging the endowment in the CB, and demand is flat.
26
Figure 4: Domestic bond market supply and demand schedules
when devaluation is triggered by large reserve losses.
Once again, a non-monotonic demand schedule is responsible for multiple interest rates clearing the
bond market. Here, for any r 2 [0, 1], both attacking the currency and not holding the bond (so that
A = 1) and conversely (A = 0), can be sustained in a self-fulfilling equilibrium. If traders expect no
devaluation, they will all hold the bond, the CB will su↵er no attack and no devaluation will indeed be
the equilibrium outcome that was ex-ante expected by traders. A similar logic works for the opposite
case: if a devaluation is expected, all traders attack the currency and carry out a large withdrawal of
reserves, thereby forcing the CB to devaluate, as expected. If r = 0, traders remain indi↵erent between
the domestic bonds and the currency as long as ✓ > A(✓, r), and thus any demand of bonds that is
above 1� ✓ can be sustained in equilibrium. If r = 1, the opposite is true, and any demand lower than
1� ✓ can be part of an equilibrium. Provided that the supply of bonds is not perfectly inelastic, there
are again three market-clearing rates in spite of there not being incomplete information in the market.
Although omitted here, similar conditions to those of Proposition 8 can be given for the case in which
C(r, A) = A and ✓ is observed with idiosyncratic noise.
In this paper, therefore, multiplicity arises from the di↵erent roles that interest rates play in the
determination of equilibrium outcomes, as there may be multiple market-clearing interest rates that are
consistent with an uncovered interest parity condition. The emphasis is not on only on the information-
aggregation role played by prices, but also on the payo↵ e↵ects that are taken into account by investors
even in the absence of information imperfections. This is an important step toward market-based global
games that should motivate further research.
27
3.3 The role of equilibrium outcomes as signaling devices
Section 3.2 has outlined examples of global games in which the existence of a Walrasian market
provides meaningful information about economic fundamentals that help break down the uniqueness
results from Section 3.1. In this subsection we analyze a di↵erent source of endogenous public infor-
mation: the signaling role of ex-ante public policies and of equilibrium outcomes.
3.3.1 Angeletos, Hellwig and Pavan (2006): Policy as a signal for the investors
Up until this point, we have assumed the decision of the policy-maker to be straightforward: the
status quo is abandoned if the cost of the attack (be it in terms of size or interest rates) is too large
compared to the gains from maintaining the regime, given by the fundamental ✓. It is reasonable to
believe that governments design more sophisticated policies when faced with an economy-wide attack.
In the application to currency crises, a central bank can try to prevent an attack by undertaking
costly ex-ante policies such as borrowing reserves from abroad, placing taxes on capital outflows and
so forth. However, if made public before the game is played, such costly policies may in turn signal a
high probability of regime fragility, reduce investor’s strategic uncertainty and generate informational
feedbacks between public and private policies that may a↵ect equilibrium outcomes in critical ways
and, in some cases, force the very policies that were designed to defend the peg to become unwarranted.
To gain intuition, consider the following extension of our baseline game from Section 3.1. The
population of traders, their objectives and choice sets are identical to those seen above. The only
modification is on the policy-maker’s (PM) side. For simplicity, consider that nature draws ✓ from a
uniform distribution on the real line, and suppose that prior to the Morris and Shin game the PM
learns ✓ and chooses a policy, here the opportunity cost c 2 [c, c] ⇢ (0, 1) that the investors must bear
in the second stage for attacking the status quo. The payo↵ of the PM is
U
PM
(R, ✓, c, A) = (1�R)(✓ �A)� (c)
where as usual R denotes the regime outcome (with R = 1 meaning that the status quo is aban-
doned), A 2 [0, 1] is the size of the attack and (·) is a policy cost function, with
0(·) > 0 and
(c) = 0. Since choosing c = c entails no cost, so we will call this outcome an “inactive policy”. Any
choice c > c entails an “active policy”.
Once the PM has chosen its policy, c becomes common knowledge and the Morris and Shin game
starts: each agent i receives a signal xi
= ✓ + ⇠
i
with ⇠i
⇠ N (0, 1/�) and must choose a
i
2 {0, 1} to
maximize U
i
= a
i
(R� c).
Finally, the PM will observe the size of the attack A, and the regime outcome R will be realized.
In particular, the status quo will be abandoned if and only if UPM
(1, ·) � U
PM
(0, ·), which once again
28
means that
R(✓) = 1[A>✓]
and allows us to write the PM’s ex-post objective as
U
PM
(✓, c, A) = max{0, ✓ �A}� (c)
The following describes an equilibrium of this economy:
Definition 3 A symmetric Perfect Bayesian Nash equilibrium consists of a strategy for the PM, c :
R ! [c, c], a (symmetric) strategy for the agents, a : R⇥ [c, c] ! {0, 1}, and a c.d.f., µ : R⇥R⇥ [c, c] !
[0, 1], such that
c(✓) 2 arg maxc2[c,c]
U
PM
(✓, c, A(✓, c))
a(x, c) 2 arg maxa2{0,1}
a
Z +1
�11[A(✓,c)>✓]dµ(✓|x, c)� c
�
where µ(✓|x, c) is obtained from c(·) using Bayes’ rule and
A(✓, c) ⌘Z +1
�1a(x, c)
p��(
p�(x� ✓))dx
R(✓) ⌘ 1[A(✓,c(✓))>✓]
are, respectively, the equilibrium size of the attack and regime outcome, for any ✓ 2 R and c 2 [c, c].
A first point to note is that the Morris and Shin game of Section 3.1 is a particular case of the
Angeletos, Hellwig and Pavan (2006) economy in which c = c. That is, our baseline economy can
be viewed as one in which policy is not costly, uninformative and, therefore, ine↵ective. Suppose in
contrast that c < c, which means that there is a meaningful scope for informationally-relevant policy.
Then, the following result is reached:
Proposition 9 Suppose c < c. There are multiple equilibria:
1. There is an equilibrium in which c(✓) = c for all ✓, a(x, c) = 1[x<x
⇤(c)], and R(✓) = 1[✓<✓
⇤(c)],
where
x
⇤(c) = ✓
⇤(c) +��1(✓⇤(c))p
�
(12)
✓
⇤(c) = �⇣p
�(x⇤(c)� ✓
⇤(c))⌘= 1� c
29
2. For any c
⇤ 2 (c, c], there is an equilibrium in which a(x, c) = 1[x<x or (x,c)<(x̃,c⇤)], R(✓) = 1[✓<✓̃]
and
c(✓) =
8><
>:
c
⇤ if ✓ 2 [✓̃, ˜̃✓]
c otherwise
where x̃, ✓̃ and˜̃✓ are given by
✓̃ = (c⇤)
˜̃✓ = ✓̃ +
1p�
��1
✓1� c
1� c
✓̃
◆� ��1(✓̃)
�
x̃ = ˜̃✓ +
��1(✓̃)p�
Proof: In Angeletos, Hellwig and Pavan (2006), page 470. ⌅
Proposition 9 identifies two classes of equilibria. In the first class, the policy remains inactive: the
PM avoids the costs of policy by setting c(✓) = c for any ✓ and the same equilibrium outcome as in
the baseline game of Section 3.1 surfaces. In the second class of equilibria, however, the PM actively
uses the policy at a direct cost (c(✓)) > 0. When doing so, the policy choices convey information
to the agents about the economic fundamentals and there is feedback e↵ects that have been ex-ante
taken into account by both sides of the economy.
• The PM’s side: On the one hand, the PM understands from (12) that, relative to a benchmark
in which the policy remains idle (here, c = c), a higher c means that there is a smaller range of
values of ✓ for which the status quo must be abandoned. A myopic PM would use this fact to try
to reduce the size of the attack. A sophisticated PM like the one assumed by our definition of a
PBE, however, acknowledges the informational contents of such a policy. In particular, the said
policy would render e↵ective only for certain intermediate values of ✓. Indeed, if ✓ is too low (in
particular, ✓ < ✓̃), the direct cost (c) of information for deviating from the inactive benchmark
toward some c > c would exceed the indirect payo↵ gains from maintaining the status quo and
preventing an attack from being successful. If ✓ is too high (in particular, ✓ > ˜̃✓), the size of the
attack would otherwise (that is, if the policy were to remain unused) be too small to justify the
direct cost (c) of intervention. Therefore, only for intermediate values of ✓ can an active policy
survive. Formally, for any c
⇤ 2 (c, c], there is an equilibrium in which c(✓) = c
⇤ for any ✓ 2 [✓̃, ˜̃✓].
• The investors’ side: From the investors’ point of view, if they agree on a policy a(x, c) that
is insensitive to c, the PM’s policy would remain inactive. However, if they coordinate on a
30
strategy that is decreasing in c (less aggressive attacks when the cost of attacking is higher) and
✓ 2 [✓̃, ˜̃✓], then the PM can ex-ante decrease the size of the attack by raising c, as described in
the first bullet point, and less investors will indeed attack in equilibrium.
Multiplicity here is originated from the feedback e↵ects between the expectations of the PM re-
garding how sensitive the investor’s policy is to the policy, and reactions of investors to the information
embedded in those same policies. There is scope for multiplicity if agents are able to coordinate on
di↵erent interpretations of, and di↵erent reactions to, particular sets of policy choices, and if those in
turn induce di↵erent incentives to which the PM reacts optimally when choosing those policies.
3.3.2 Goldstein, Ozdenoren and Yuan (2011): Attacks as a signal for the policy-maker
In Angeletos, Hellwig and Pavan (2006), investors’ choices are a↵ected by ex-ante policy from the
policy-maker, which acts as a signal that may help reduce the size of speculative attacks in equilibrium.
It is reasonable to believe that the interaction can also go in the opposite direction, namely that
aggregate trading of speculators may reveal information to the central bank and a↵ect its policy
decision. Goldstein, Ozdenoren and Yuan (2011) study this aspect of the informational interaction
between market activities and policy decisions by allowing the central bank to learn from the very same
market complementarities that its policies generate. The fact that the central bank can learn from
market outcomes in order to perform inference about fundamentals, however, feeds right back into the
same market outcomes that may arise, for it facilitates further coordination between investors in the
same spirit as the ex-ante costly policy signaled the state of the economy in the approach followed by
Angeletos, Hellwig and Pavan. However, unlike in that paper, here the policy-maker is oblivious to
the realization of the fundamental when undertaking its policy, and observing a large attack on the
part of the investors may prove to be useful information about the underlying state of the economy.
The following is a concise description of the model. As usual, a continuum of speculators coexist
with a single policy-maker (PM). With a single exception noted below, the investors’ side is identical
to what we described in Section 3.1: they take a zero-one action, at a cost of c 2 (0, 1) for the active
action, upon the observation of unbiased signals about ✓. The PM decides whether or not to maintain
the status quo, and the economic fundamental ✓ stands for the value of maintaining it. The PM does
not observe the realization of ✓ when making a policy choice. We characterize the decision of the PM
as a variable � 2 {0, 1}, and its payo↵ as
U
PM
= �✓
Note that, unlike in all the settings discussed above, the PM is now not directly a↵ected by the size
of the attack. However, the investors’ decisions matter because they may provide information about ✓
31
to the PM.
The timing is as follows. First, both the PM and the speculators receive information about ✓. The
common prior is di↵use over the real line. The PM receives a private signal:
x
PM
= ✓ +⇠
PMp�
PM
where ⇠PM
⇠ N (0, 1). Each speculator i 2 [0, 1] receives two signals. One signal is as in the
benchmark model:
x
i
= ✓ +⇠
ip�
with ⇠i
⇠ N (0, 1). A second signal is also private but includes a noise component that is commonly
shared by all speculators:
x
pi
= ✓ +⇠
pp↵
+⌘
ip⌧
where ⇠p
⇠ N (0, 1) is the common noise component and ⌘i
⇠ N (0, 1) is the private noise component.
The terms �, �PM
, ↵ and ⌧ all denote precisions. The precision of xpi
is ⌧ 0 = ↵⌧/(↵ + ⌧). All error
terms are orthogonal to one another. The commonly shared component in the second signal implies
that this signal is correlated across speculators12. Once the agents independently gather these sources
of information, speculators simultaneously decide whether or not to attack the status quo. Finally,
after observing the size of the attack, the PM decides whether or not to abandon the regime. The
payo↵s and information structure are common knowledge, but the true realization of ✓ is not observed
at any point of the game.
Each individual speculator is not identified by a pair of signals, and as usual we drop i subscripts.
The following defines the equilibrium.
Definition 4 A symmetric Perfect Bayesian Nash equilibrium consists of a strategy for the PM,
�(A, xPM
), a symmetric strategy for the speculators, a(x, xp
), a size of the aggregate attack A(✓, ⇠p
),
and posterior probability measures ⌫(✓|A, x
PM
) for the PM and µ(✓|x, xp
) for the speculators, such
that
• Decisions are optimal given the information sets:
12One way of motivating this, as viewed by the authors, is to think of the information generating process as beingsubject to common random shocks such as market-wide rumors.
32
�(A, xPM
) 2 arg max�2{0,1}
Z +1
�1�✓d⌫(✓|A, x
PM
)
a(x, xp
) 2 arg maxa2{0,1}
a
Z +1
�1
Z +1
�11[�(A(✓,⇠
p
),✓+⇠
PM
/
p�
PM
)=0]dµ(✓|x, xp
)�(⇠PM
)d⇠PM
� c
�
A(✓, ⇠p
) = ��1
✓Z +1
�1
✓Z +1
�1a(✓ + ⇠/
p�, ✓ + ⇠
p
/
p↵+ ⌘/
p⌧)�(⌘)d⌘
◆�(⇠)d⇠
◆
• Beliefs are consistent in the sense that ⌫(✓|A, x
PM
) is obtained using Bayes’ law for any A and
x
PM
, and µ(✓|x, xp
) is also obtained using Bayes’ law for any x and x
p
.
The following proposition states that the PBE is in threshold strategies: there exist cuto↵s levels
denoted {x⇤(xp
), A⇤(xPM
)} such that a speculator attacks the status quo if x x
⇤(xp
) and the PM
in turn abandons the regime if A � A
⇤(xPM
). Moreover, these thresholds are uniquely defined.
Proposition 10 There is a unique linear threshold equilibrium in which the speculators’ optimal strat-
egy is a(x, xp
) = 1[xx
⇤(xp
)] and the PM’s optimal strategy is �(A, x
PM
) = 1[AA
⇤(xPM
)], where
x
⇤(xp
) = x
⇤(0)� kx
p
A
⇤(xPM
) =1q
1�
+ k
2
⌧
x
⇤(0) + (1 + k)�
PM
�
T
x
PM
�
k is the unique real root to the cubic equation
✓⌧k
2 � �
↵
(⌧ + ↵)k3◆�
PM
+ ↵(1 + k)2(⌧ � �k) = 0
and
�
T
⌘ ↵
✓1 +
1
k
◆2
is the precision of the attack as a signal of the fundamental.
Proof: In Goldstein, Ozdenoren and Yuan (2011), page 270. ⌅
Note that the investors’ signal is decreasing in the correlated signal xp
, which o↵ers a source of
public information. When x
p
indicates a sound fundamental, speculators attack only if their own
private and independent signal, x, o↵ers particularly pessimistic information about ✓. The weight
that the speculators put on the correlated signal is k � 0 and it spills over to the PM’s decision, who
33
anticipates the investors’ attacking rule. Indeed, the PM infers the underlying state of the economy
from observing attacks, and �T
, which represents the precision the attack as a signal of the fundamental,
is decreasing in k: when investors put more weight on the source of information that is shared by others,
an attack becomes less informative for the PM.
However, investors anticipate the information transmission e↵ects that their attacks carry over to
PM’s policies. In particular, since they internalize that the likelihood of a successful attack is increasing
in the precision of the PM’s attack-signal, which is in turn decreasing in the weight k they place on
the commonly shared piece of information, investors end up putting “too much” weight on x
p
, that
is, a higher weight than that which would be used in an economy in which the PM could not infer
information about ✓ from the size of the attack13. Intuitively, when a single speculator places more
weight on x
p
, other speculators follow because not only this signal provides more information about
the true ✓, but also because it a↵ects the likelihood of a large-scale attack being successful through
the signaling power of the size of the attack.
In this sense, the central conclusion is reminiscent of the Morris and Shin (2002) result regarding
the detrimental value of public information, with the only di↵erence that whereas in that set-up
informational complementarities emerged from payo↵ complementarities (in particular, a Keynesian
beauty-contest type of game), in the present framework such complementarities arise endogenously
through the feedback e↵ects of policy and the fact that both sides of the economy learn from one
another. Overall, the very informational complementarities that are responsible for the investors
choosing to overweight the commonly shared signal are the ones that generate large attacks that are
not justified by bad fundamentals14.
3.4 Dynamic models of global games
Section 3.2 has shown that the celebrated uniqueness result from Carlsson and van Damme (1993)
and Morris and Shin (1998) is extremely fragile to the information structure of the game. We have
outlined two examples, prices as information aggregators and equilibrium actions as signaling devices,
under which uniqueness may vanish because the possibility of exploiting additional endogenous strate-
gic complementarities fosters coordination back to multiplicity. This section proposes a third route:
while all the models analyzed above are static, one can generate public information by allowing agents
to make use of past outcomes and learn from their own actions in dynamic games of regime change.
There has been a substantial amount of work in dynamic coordination games over the past few years.
Frankel and Pauzner (2000), Burdzy, Frankel and Pauzner (2001) and related papers study coordination
13This is the statement of Proposition 2 in their paper, proved in page 273.14A number of interesting policy implications, including e↵ectiveness and transparency, can be drawn from this result
alone, but I will left these out for the sake of exposition. The interested reader is referred to sections 5 and 6 of theoriginal paper.
34
games in which players are randomly matched into two-player, two-action dynamic games where the
fundamental evolves according to a random process and players can revise their actions according
to a Poison arrival process. In Levin (2000), at each point in time payo↵s may depend on actions
chosen by past players, by future players, and on fundamentals, where the payo↵ parameter evolves
according to a random walk and is announced publicly15. Matsui (1999) and Oyama (2004) assume
complementarities between actions of successive generations in respective OLG models of coordination.
In an approach loosely related to the global games view, the herding and social learning literature (e.g.,
Banerjee (1992) and Bikhchandani, Hirschleifer and Welch (1992)) assumes that players sequentially
make discrete choices and partially learn the information of players who choose before them.
Strictly within the dynamic global games literature, Chamley (1999, 2003) considers dynamic
global games with recurrent incomplete information, Chassang (2010) studies the e↵ects of the fear of
misscoordination on the sustainability of cooperation in a dynamic game with exit and Giannitsarou
and Toxvaerd (2012) outline a recursive formulation of general dynamic global games and characterize
Markov equilibria. Dasgupta (2007) provides a model of private social learning in which the dynamics
are augmented by endowing the agents with the option to delay their decisions at a cost, and analyzes
the welfare implications of a broad class of games.
I have chosen to review three papers that I consider relevant and build up naturally on one another.
I will start with Morris and Shin (1999), an arguably straightforward dynamic extension of Morris and
Shin (1998) in which the fundamental is revealed at the end of every period. I will then move on
to Angeletos, Hellwig and Pavan (2007), who give a characterization of a similar game in which the
underlying fundamental is fixed and learned only in the limit of time. Finally, I will review Steiner
(2008), who proposes a recursive formulation of a dynamic game in which agents can influence their
own participation in future rounds. All three papers have in common that the threshold equilibrium
properties discussed above extend naturally to the dynamic setting, and in some cases the uniqueness
result from the stage game is preserved in the multi-stage set-up. Because past outcomes may become
public information, which restores common knowledge, multiplicity may resurrect and will be once
again a recurrent theme. However, because in some instances players never learn the true realization
of the state, the size and number of future possible attacks remains ambiguous and, in some cases,
entirely unpredictable.
3.4.1 Morris and Shin (1999): A repeated static global game
To set firm ground from which to start building dynamics, let us begin with a repeated-game
version of Morris and Shin (1998): a stage game played over and over with periodical disclosure of the
fundamental of the economy.
15In related work, Levin (2001) studies a similar set-up with overlapping generations of players.
35
Time is continuous and t = �, 2�, 3�, . . . denotes each instant, where � > 0 is negligibly small.
The fundamental of the economy at instant t, called ✓t
, evolves according to a Brownian motion, so
that
d✓
t
= z
p�dt
where z ⇠ N (0, 1). On each period t, the benchmark game of Section 3.2 is played: each speculator
i 2 [0, 1] receives a signal xit
= ✓
t
+ ⌘
i
, with ⌘i
⇠ N (0,�/�), and chooses an action a
it
2 {0, 1}. The
PM, who observes ✓t
noiselessly, will abandon the status quo if and only if A
t
� ✓
t
, where A
t
is
the aggregate size of the attack. The true value of the fundamental at instant t becomes common
knowledge at the end of the period, when all actions have been realized. Therefore, the information
set of the PM at the beginning of period t is {✓t
}, and the information set of the speculators at the
beginning of period t is {✓t��, x
t
i
}, where x
t
i
⌘ {xi,�, xi,2�, . . . , xit
} is the history of signals16. The
definition of equilibrium is a straightforward extension of Morris and Shin (1998), and therefore is
omitted here.
The characterization of the main equilibrium dynamics is given by the following proposition:
Proposition 11 For a su�ciently high �, there exists a stochastic process ht
⌘ h(✓t
) with the property
h
t
� h
t�� if ✓t�� ✓
t�2�
such that the equilibrium regime outcome is given by R(✓t
) = 1[✓t
h
t
].
Proof: In Morris and Shin (1999). ⌅
This proposition shows that the onset of an successful attack can be succinctly characterized by
the fundamentals “tripping over” a hurdle process that moves in the opposite direction as the first-
lagged underlying state. This implies that the prospect of a currency attack increases more than
proportionately to a decrease in the fundamentals. Intuitively, the evolution of beliefs which trigger
the change of sentiment and, in turn, precipitate the attack can be again represented by a (time-varying)
threshold policy: when � is large, private information has a higher quality and speculators put more
weight on the last fundamental they observed (call it ✓��) and more on their contemporaneous signal,
x
t
. If fundamentals are thought to deteriorate, the indi↵erent speculator believes other speculators to
be more likely to unilaterally attack, and therefore a coordinated attack to be more likely to succeed.
16Clearly, since ✓t
is commonly observed at the end of each period t, all signals that the trader has received up to thatpoint become uninformative, and are therefore discarded in the individual inference problem.
36
Indeed, the hurdle process then increases and the PM is more likely to abandon the status quo in
equilibrium, as expected ex-ante by the speculators.
3.4.2 Angeletos, Hellwig and Pavan (2007): Endogenous dynamics and timing of attacks
An extreme simplification of the approach just laid out is that ✓t
is revealed to the private agents
at the end of each period, permitting them to discard past signals and, loosely speaking, turning the
problem into an infinitely repeated static game rather than a game with dynamic inter-temporal inter-
actions. Angeletos, Hellwig and Pavan (2007) show that dropping the periodical disclosure assumption
is crucial for obtaining a much richer understanding of the equilibrium dynamics. Indeed, in this case,
since past signal realizations are informative about the fundamental (as long as the latter is somewhat
persistent or, in their example, just constant), there is scope for learning over time. Moreover, the
game continues for as long as the status quo is in place, which in turns o↵ers an additional source of
public information from which agents can learn and form future action profiles.
In this model, time is discrete and runs to infinity. Once again, consider a Morris and Shin (1998)
game played repeatedly period after period. A fundamental ✓ 2 R is drawn by nature at the beginning
of time from ✓ ⇠ N (z, 1/↵). The PM observes this fundamental, but the population of traders does
not. Instead, each trader i 2 [0, 1] receives a signal
x̃
it
= ✓ + ⇠
it
each period t, where ⇠it
⇠ N (0, 1/⌘t
). The PM abandons the status quo at time t if At
> ✓, so
R
t
= 1[At
>✓] is the period-t regime outcome. The game ends once and for all when the status quo is
first abandoned. Speculator i’s payo↵ from the entire game is
⇧i
=+1X
t=1
�
t�1(1�R
t
)⇡it
where � 2 (0, 1) is a time discount factor and ⇡it
is an instantaneous payo↵ function, given by
⇡
it
= a
it
(Rt+1 � c)
where c 2 (0, 1) is the opportunity cost of attacking and a
it
2 {0, 1} is the action chosen in period
t. Note that this specification is a natural dynamic extension of the static payo↵s defined in Section
3.1.
Conditional on the status quo being at place at the beginning of period t, let a
t
: Rt ! [0, 1] be
the strategy for period t, at
⌘ {a⌧
}t⌧=1 be the strategy profile up to period t (with a
1 ⌘ {a⌧
}+1⌧=1),
p
t
(✓; at
) be the probability that the status quo is abandoned in period t when all agents follow strategy
37
a
t
and t
(✓|x̃t; at�1) be the c.d.f. of posterior beliefs in period t, where x̃
t ⌘ {x̃⌧
}t⌧=1. The following
describes an equilibrium:
Definition 5 A strategy a
1 is part of a symmetric monotone Perfect Bayesian Nash equilibrium if
a
t
(xt) is non increasing in x
t and independent of past actions, and is such that
a1(x̃1) 2 arg maxa2[0,1]
a
Z +1
�1p1(✓; a1)d 1(✓|x̃1)� c
�
for all x̃1 2 R and, at any t � 2,
a
t
(x̃t) 2 arg maxa2[0,1]
a
Z +1
�1p
t
(✓; at
)d t
(✓|x̃t; at�1)� c
�
for all x̃t 2 Rt.
Since traders never observe the fundamental ✓ perfectly, they must keep track of their entire history
of signals. This is duly reflected in the definition of equilibrium above. However, it turns out that a
convenient recursive representation can be used in this case. To see this, define
�
t
⌘tX
⌧=1
⌘
⌧
to be the cumulative private precision. It is not di�cult to see that if �t
� ↵
2
2⇡ , the stage game
will have a unique solution17. Moreover, assume that limt!+1 �
t
= +1, meaning that the perfect
information benchmark takes place only in the limit of time, but that ✓ is uncertain for the investors
in any finite time. To formulate the problem recursively, define
x
t
=�
t�1xt�1 + ⌘
t
x̃
t
�
t
and �
t
= �
t�1 + ⌘
t
for any t � 2, with �1 = ⌘1 and x1 = x̃1. Then, posterior beliefs ✓|x̃t can be conveniently written
in terms of current-period variables as follows:
✓|x̃t ⇠ N✓�
t
x
t
+ ↵z
�
t
+ ↵
,
1
�
t
+ ↵
◆
Namely, we have found x
t
to be a single su�cient statistic for the whole history of signals x̃t with
respect to ✓ and R
t+1. All private information being summarized in a single-dimensional object reduces
the dimensionality of the problem immensely, and it is due to the Bayesian-step Gaussian updating
and the additive structure of signals.
17This is a direct extension of Proposition 3 in Section 3.1.
38
The following proposition shows that an equilibrium may still be represented by (time-varying)
thresholds of attack and devaluation:
Proposition 12 Any monotone equilibrium is characterized by a sequence {x⇤t
, ✓
⇤t
}+1t=1 with x
⇤t
2 R [
{�1}, ✓⇤t
2 (0, 1) and ✓⇤t
� ✓
⇤t�1, such that:
1. At any t, an agent attacks if and only if xt
< x
⇤t
, and otherwise the agent refrains from attacking.
2. The status quo is in place in period t if and only if ✓ > ✓
⇤t�1. Otherwise, the game ends.
Proof: In Angeletos, Hellwig and Pavan (2007), page 722. ⌅
As in the static version of the game, each period ✓⇤t
and x
⇤t
⌘ X(✓⇤t
,�
t
) solve ✓⇤t
= A
t
(✓⇤t
) = P[xt
x
⇤t
|✓⇤t
], that is,
✓
⇤t
= ��p
�
t
(x⇤t
� ✓
t
)�
and the indi↵erent condition for the marginal trader:
P[✓ ✓
⇤t
|x⇤t
, ✓ > ✓
⇤t�1] = c
Clearly, since by construction of the game the agents can choose an action only if the status quo
has never been abandoned in past periods, {✓⇤t
} is a non-decreasing sequence in time: the status quo
cannot be in place in a certain period without it also being in place in the previous period. The
evolution of x⇤t
will critically determine, however, the size of the attacks in equilibrium. Interestingly,
{x⇤t
} need not be monotonic, and therefore periods in which some agents might attack (x⇤t
> �1)
may alternate with periods in which nobody attacks (x⇤t
= �1).
To understand more deeply the dynamics of attack, the authors propose the following alternative
specification by shifting the focus of the study to the conditions of the marginal indi↵erent trader,
i.e. the agent with signal xt
= X(✓⇤t
,�
t
). Let U(✓⇤t
, ✓
⇤t�1,�t,↵, z), sometimes U
MG
t
for brevity, be
the net payo↵ from attacking in period t for this agent. To construct this function, first define
u : R⇥ [0, 1]⇥ R⇥ R2+ ⇥ R ! [�c, 1� c] and X : [0, 1]⇥ R+ ! R by
u(x, ✓⇤, ✓⇤�1,�,↵, z) ⌘
8><
>:
1� �(p�+↵( �x+↵z
�+↵
�✓
⇤))�(
p�+↵( �x+↵z
�+↵
�✓
⇤�1))
if ✓⇤ > ✓
⇤�1
�c if ✓⇤ ✓
⇤�1
X(✓⇤,�) ⌘ ✓
⇤ +��1(✓⇤)p
�
39
respectively, and so the marginal trader’s utility function U : [0, 1]⇥ R⇥ R2+ ⇥ R ! [�c, 1� c] is
U(✓⇤, ✓⇤�1,�,↵, z) ⌘
8>>>><
>>>>:
limx!�1 u(x, ✓⇤, ✓⇤�1,�,↵, z) if ✓⇤ = 0
u(X(✓⇤,�), ✓⇤, ✓⇤�1,�,↵, z) if ✓⇤ 2 (0, 1)
limx!+1 u(x, ✓⇤, ✓⇤�1,�,↵, z) if ✓⇤ = 1
Here, u(x, ✓⇤, ✓⇤�1,�,↵, z) is the net payo↵ from attacking in period t if the agent receives signal x,
when it is known that the status quo is still in place (✓ > ✓
⇤�1) and that the regime will change if and
only if ✓ ✓
⇤; X(✓⇤,�t
) is the threshold x
⇤ such that, if agents attack in period t if and only if xt
x
⇤,
then A
t
(✓) � ✓ if and only if ✓ ✓
⇤; U(✓⇤, ✓⇤�1,�t↵, z) is again the net payo↵ from attacking for the
marginal agent with signal x⇤ = X(✓⇤,�t
) when it is known that ✓ > ✓
⇤�1. Clearly, since X(✓⇤,�) is
the solution to ✓⇤ = A(✓⇤) (that is, to ✓⇤ = �(p�(x⇤ � ✓
⇤)) for x⇤ being the individual attack cuto↵
level), then (✓⇤t�1, ✓
⇤t
) belongs to the equilibrium path if and only if
U(✓⇤t
, ✓
⇤t�1,�t,↵, z) = 0
This representation allows us to draw several important results, which I summarize in the next
three central propositions. The first one, Proposition 13, presents existence of the threshold paths and
o↵ers a recursive algorithm to find them.
Proposition 13 The strategy a
1 is a monotone equilibrium if and only if there exists a sequence of
thresholds {x⇤t
, ✓
⇤t
}+1t=1 such that
1. For all t, at
(x̃t) = 1 if xt
< x
⇤t
and a
t
(x̃t) = 0 if xt
> x
⇤t
.
2. For t = 1, ✓⇤1 solves U(✓⇤1 ,�1,�1,↵, z) = 0 and x
⇤1 = X(✓⇤1 ,�1).
3. For any t � 2, either ✓⇤t
= ✓
⇤t�1 > 0 and x
⇤t
= �1, or ✓⇤t
> ✓
⇤t�1 > 0 is a solution to
U(✓⇤t
, ✓
⇤t�1,�t,↵, z) = 0 and x
⇤t
= X(✓⇤t
,�
t
).
A monotone equilibrium always exists.
Proof: In Angeletos, Hellwig and Pavan (2007), page 745. ⌅
What this proposition states is that learning takes the form of a truncation in the support of
beliefs about ✓. Upon the observation that the regime has survived past attacks, the agents acquire
the knowledge that ✓ is above a threshold ✓⇤t�1. Moreover, the results provides a recursive algorithm
to compute equilibria. Note that U(✓⇤1 ,�1,�1,↵, z) = 0 admits a solution, and there is at least one
monotone equilibrium in this economy. One way of constructing all other equilibria is to initialize the
40
algorithm at this first-period solution, ✓⇤1 , and move forward in time. At t = 2, if U(✓2, ✓⇤1 ,�2,↵, z) = 0
admits no solution for ✓2, we set ✓⇤2 = ✓
⇤1 , and if a solution ✓⇤2 exists, then ✓2 2 {✓⇤1 , ✓⇤2}. Moving forward,
one can construct potentially all the equilibrium paths {✓⇤t
}+1t=1 , together with the corresponding
thresholds {x⇤t
}+1t=1 .
Proposition 14 states more formally that there may be multiplicity of equilibria in this environment:
Proposition 14 The following are features of the equilibrium set, for any t 2 Z+:
1. U(✓⇤t
, ✓
⇤t�1,�t,↵, z) is continuous in all its arguments, non-monotonic in ✓
⇤t
when ✓
⇤t�1 2 (0, 1),
and strictly decreasing in ✓⇤t�1 and z for ✓⇤
t�1 < ✓
⇤t
.
2. Let ✓̂t
be the unique solution to U(✓̂t
,�1,�
t
↵, z) = 0. A solution to U
t
(✓⇤t
, ✓
⇤t�1,�t,↵, z) = 0
exists only if ✓⇤t�1 < ✓̂
t
, and is bounded from above by ✓̂t
.
3. If ✓⇤t�1 > 1� c, a solution to U
t
(✓⇤t
, ✓
⇤t�1,�t,↵, z) = 0 does not exist for �
t
su�ciently high.
4. If ✓⇤t�1 < 1� c, a solution to U
t
(✓⇤t
, ✓
⇤t�1,�t,↵, z) = 0 necessarily exists for �
t
su�ciently high.
5. If ✓⇤t�1 is the highest solution to U
t�1(✓⇤t�1, ✓
⇤t�2,�t�1,↵, z) = 0, there exists a � > �
t�1 such
that Ut
(✓⇤t
, ✓
⇤t�1,�t ↵, z) = 0 admits no solution for any ⌧ � t such that �
⌧
< �.
An implication of points 1 and 2 of this proposition is that UMG is flat at �c for ✓⇤t
< ✓
⇤t�1, then
increases with ✓⇤t
, and eventually decreases with ✓⇤t
by converging again to �c as ✓⇤t
goes up. Every
intersection of the function with the horizontal axis corresponds to a solution. The non-monotonicity
therefore leaves open the possibility for multiplicity of equilibria. Parts 3, 4, and 5 highlight that
agents must have accumulated precise enough private information up to a given period for further
attacks to be possible after that period. Only under such a parameter condition future attacks may
emerge in equilibrium. If this does not hold for any period, a first-period attack is the only equilibrium
of the economy.
Intuitively, on the one hand, the knowledge that the regime has survived past attacks (inferred
from the observation that the game has not ended) operates as a deterrent motive for agents to attack,
and even more so if they expect other agents not to attack, either. Whether or not future attacks can
take place also then depends in critical ways on the mean common prior, z.
• If the common prior z is low, this motive is reinforced, for the perceived probability of regime
change is low and the net payo↵ from attacking for the marginal agent is low. In that case, a
unique equilibrium of the entire game exists in which an attack occurs only in the first period.
• In contrast, if the accumulated private information is precise enough, a su�ciently high z can
o↵set said deterrent motive: a positive prior belief about the fundamental raises optimism over
41
and above adverse incentives stemming from the knowledge that past attacks failed to succeed,
and make the economy prone to further attacks.
Figure 5 illustrates a particular example in which this second case holds. The figure depicts the
utility of the marginal agent for period 1 (dashed line), period 2 (dotted line) and period 3 (solid line).
Note that the dashed line crosses the horizontal axis once, meaning that there is always an attack
in the first period. The parametrization is such that no attacks are possible in period 2, due to a
combination of a low �2 relative to z: agents have not yet acquired enough private information about
the fundamental, and z is not high enough to convince them that an attack is worthwhile even if the
first-period one failed to succeed. In period 3, however, the private signal is precise enough to make
a second attack possible. Moreover, by Proposition 14, a third attack is possible at some future date.
In terms of the evolution of thresholds ✓⇤t
, three possible sequences can be constructed by means of
the algorithm outlined in Proposition 13: either ✓⇤t
= ✓
⇤1 , 8t � 2; or ✓⇤2 = ✓
⇤1 and ✓⇤
t
= ✓
03, 8t � 3; or
✓
⇤2 = ✓
⇤1 and ✓⇤
t
= ✓
003 , 8t � 3.
Figure 5: An example of equilibria with multiple attacks. The dashed line is the payo↵
for the marginal agent in period 1, the dotted line is his payo↵ in period 2,
and the solid line is the payo↵ in period 3. Notation: ✓1 ⌘ 1� c.
The next proposition formalizes these intuitions regarding the mean prior.
Proposition 15 There exist thresholds z z z such that
1. If z < z, there is a unique monotone equilibrium and it is such that an attack occurs only in
period one.
2. If z 2 (z, z), there are at most finitely many monotone equilibria and 9t < +1 such that, in any
of these equilibria, no attack occurs after period t.
42
3. If z > z, there are infinitely many equilibria and if, in addition, z > z, for any (t,N) 2 Z2+ there
is an equilibrium in which N attacks occur after period t.
Finally, z = z = z when c 1/2, whereas z z < z when c > 1/2.
Proof: In Angeletos, Hellwig and Pavan (2007), page 728. ⌅
At least two important corollaries can be drawn from this result. First, if ✓ > 1 � c and z > z,
the status quo survives in any equilibrium. However, for any t > t and some t 2 Z+, an attack (or
any number of them, for that matter) can occur yet does not necessarily take place. An important
consequence of this is that neither the timing nor the number of attacks can be predicted.
Furthermore, after the most aggressive attack for a given period takes place, the game enters a phase
of tranquility, during which no attack is possible, and the length of which is decreasing in the speed
of arrival of private information. Hence, in equilibrium, there may exist cycles of repeated succession
of phases of tranquility, during which no attack occurs, and phases of distress, which conclude after a
strong though failed attack on the status quo. This theme will reappear in section 3.4.3.
I conclude this exposition with two final remarks. First, note that coordination cycles emerge
purely from the interaction between coordination and information, and not from any change in the
underlying fundamental. This dimension was completely ignored by Morris and Shin (1999), who
could not disentangle fundamental e↵ects from informational e↵ects. Second, observe that the source
of the dynamics is extremely sensitive to the cumulative private precision �
t
, for a small change in
this parameter from one period to another can trigger the switch from tranquility to distress. This
discontinuity in outcomes with respect to changes in information is reminiscent of nonfundamental
volatility as a source of regime instability, as for instance in Angeletos and Werning (2006) (recall our
discussion of Proposition 4).
3.4.3 Steiner (2008): Coordination cycles through the role of participation
Angeletos, Hellwig and Pavan (2007) is a stylized example of how global games settings can generate
cycles of coordination that can lead to di↵erent patterns of equilibria even in the absence of exogenous
fluctuations of economic fundamentals. In that example, the link between periods is encoded in
the ability of players to transform the knowledge that the regime has survived in past rounds into
knowledge about the soundness of the fundamental. This endogenous and inter-temporal transmission
of information explains why agents may consider worthwhile to postpone their attack decisions. But
because di↵erent agents can agree on di↵erent interpretations and di↵erent reactions to the same
equilibrium outcomes, coordination cycles of uncertain length and strength emerge eventually as new
private information arrives exogenously.
43
Steiner (2008) refines this idea18. In his example, the dynamic link between periods is that each
player influences, with the choice of her current action, not only her instantaneous payo↵ but also her
own future participation in the game. The risky action (attack) is risky not only because it pays o↵ if
and only if su�ciently many agents undertake it, but also because it can otherwise lead to bankruptcy
and prevent the agent to participate in future projects. Individual and multilateral fear of bankruptcy
introduce additional strategic risk into the problem: future coordination undermines current coordi-
nation by making attacks more risky in the present round, which incorporates an additional feedback
e↵ect between adjacent periods that can lead to chaotic cycles and no steady-state convergence.
Here is a description of the model, once again adapted to the nomenclature introduced above. Time
is discrete and finite19, t = 1, . . . , T . The fundamental is now a stochastic i.i.d. process ✓t
with twice
continuously di↵erentiable c.d.f. �(·) on the real line. The realization ✓t
is revealed at the end of every
period t, but unknown through period t. Once more, each agent i receives an unbiased private signal
x
it
= ✓
t
+⇠
ip�
where the idiosyncratic errors ⇠i
are independent across players and rounds and drawn from a
continuous p.d.f. f(·) with support in the real line20. The focus will be on the perfect information
limit, where � ! +1.
Each agent in the continuum has to choose an action a
it
2 {0, 1}. Agent i’s payo↵ of the whole
game is
⇧i
=TX
t=1
�
t�1⇡
it
where � 2 (0, 1) is a factor of time discount and, in a slight abuse of notation, ⇡it
is an instantaneous
payo↵ function given by
⇡
it
⌘ a
it
⌧
it
⇡(✓t
, A
t
)
where A
t
is the measure of players choosing to attack, the marginal payo↵ ⇡(✓t
, A
t
) satisfies prop-
erties A1, A2, A3, A4, A5 and A6 listed in section 2.2.1 above21, and, as a novelty, ⌧it
� 0 is the degree
of agent i’s involvement into the game. Note that, unlike in Angeletos, Hellwig and Pavan (2007), the
18See also related work by Mathevet and Steiner (2013).19As we will see later on, finiteness is not essential except for the equilibrium uniqueness result. See Section 3.3 of
Steiner (2008) for a more detailed discussion.20We can think of the case ✓
t
⇠ iid N (z, 1/↵), as in Section 3.4.2, though the exposition is general enough toaccommodate any twice continuously di↵erentiable c.d.f. on the real line, �(·). Similarly, the idiosyncratic errors may,but need not, be normally distributed.
21Note that the specification ⇡(✓t
, At
) = 1[At
>✓
t
] � c for c 2 (0, 1), which we have used in all the models above, is aparticular example of one such function. Later on we will specialize this framework to the Morris and Shin game thatwe have repeatedly analyzed in this paper.
44
game does not end after a successful attack, and therefore regime switches constitute a dimension the
agents can learn from.
When taking ⌧it
as a fixed parameter, Propositions 1 in section 2.2.1 above state that each one of
the T static games of which the model is composed is a global game with a unique equilibrium that
can be solved by threshold strategies: for each t = 1, 2, . . . , there exists a ✓⇤t
such that the optimal
individual strategy at stage t is a(xit
) = 1[xit
�✓
⇤t
].
The dynamic link between the di↵erent stage games is that the involvement is endogenous. In
particular, ⌧it
is defined recursively by
⌧
i,t+1 = ⌧
it
b(ait
, ✓
t
, A
t
)
with b(ait
, ✓
t
, A
t
) � 0, and ⌧i1 = 1 is a normalization. If b
it
= 0, so that ⌧i,t+1 = 0, then the player
is not involved in the play of stage t + 1. From the perspective of period t, the function b(ait
, ✓
t
, A
t
)
can thus be interpreted as a continuation probability, and ⌧i,t+1 as expected participation next period.
Note that b(·) need not be bounded above by one, a case in which the player’s participation would
wear out over time. In contrast, high involvement benefits players because it allows them to take
advantage of accessing potentially higher payo↵s by waiting (i.e, choosing a = 1) while having the
zero-payo↵ outside option still available every period. Thus, withholding embeds a double reward: a
direct payo↵ e↵ect in the case of successful attack, and an augmented payo↵ e↵ect stemming from the
benefit of not having participated in rounds in which attacks were not successful.
To complete the description of the environment, we need a few more technical assumptions. Where
we define ⇢(✓t
, A
t
) ⌘ b(1, ✓t
, A
t
) � b(0, ✓t
, A
t
), we assume that ⇢(✓t
, A
t
) is weakly increasing in both
✓
t
and A
t
, andR 10 g(A)⇢(✓
t
, A)dA is continuous with respect to ✓t
, for any t 2 [T ], and densities g(·).
Moreover, we assume that the function
⇡̃(✓t
, A
t
) ⌘ ⇡(✓t
, A
t
) + �⇢(✓t
, A
t
)Vt+1
satisfies the uniform limit dominance condition (condition A4 in section 2.2.1) for any number
V
t+1 > 0. Finally, in order to keep the measure of players constant, it is assumed that the measure of
players who disappear from play at each period t (that is, the set {i : ⌧it
= 0} ✓ [0, 1]) is replaced by
an equal measure of entrants.
Let us formalize notation and derive the solution. We denote by V
t
the value of the game conditional
on participation at stage t. Under this notation, ⇡̃(✓t
, A
t
) ⌘ ⇡(✓t
, A
t
) + �⇢(✓t
, A
t
)Vt+1 is interpreted
as the period payo↵ di↵erential between attacking and refraining22. The information set of each agent
is Iit
⌘ {xt
i
, ✓
t
, a
t
i
} as of stage t 2 [T ], where superscripts denote histories. We call a pure strategy a
22Of course, ⇡̃(✓T
, AT
) = ⇡(✓T
, AT
) as the game ends after period T , that is, VT+1 = 0.
45
sequence s = (s1, . . . , sT ) of functions that assign to each pair of information sets (Ii1, . . . , IiT ) a path
of actions (s1(Ii1), . . . , sT (IiT )).
The solution method is by backward induction. At stage T , we know by Proposition 2 in section
2.2.1 above that the unique equilibrium of the stage game can be characterized by a threshold ✓⇤T
such
that s
⇤T
(x) = 1[x�✓
⇤T
]. As seen before, the threshold ✓⇤T
is such that s
⇤T
(·) is the best response to the
belief that a measure A
T
of participating players is distributed uniformly on the unit interval. That
is, ✓⇤T
is as defined by equation (1) in condition A3 (strict Laplacian state monotonicity), i.e. it is the
unique solution of
Z 1
0⇡(✓⇤
T
, A)dA = 0
Hence, all players attack (i.e, aiT
= 1, 8i 2 [0, 1]) if and only if ✓T
� ✓
⇤T
, in which case A
T
= 1
and the period expected payo↵ is ⇡(✓T
, 1) + �b(1, ✓T
, 1)VT+1. Else, if ✓
T
< ✓
⇤T
, all players wait (i.e,
a
iT
= 0, 8i 2 [0, 1]), so A
T
= 0 and all players receive �b(0, ✓T
, 0)VT+1. Therefore, the expected profit
in the last round for individual i is ⌧iT
V
T
, where
V
T
=
Z✓
⇤T
�1�b(0, ✓, 0)V
T+1d�(✓) +
Z +1
✓
⇤T
�⇡(✓, 1) + �b(1, ✓, 1)V
T+1
�d�(✓)
Since V
T+1 ⌘ 0 as the game ends after round T , then V
T
=R +1✓
⇤T
⇡(✓, 1)d�(✓). At stage T � 1,
players anticipate the continuation payo↵ V
T
they get from waiting in addition to the direct payo↵
of immediate participation. Waiting (i.e, ai,T�1 = 0 because ✓
T�1 < ✓
⇤T�1) gives them a payo↵ of
�b(0, ✓T�1, 0)VT
, whereas attacking (i.e, a
i,T�1 = 1 because ✓T�1 � ✓
⇤T�1) gives them a payo↵ of
⇡(✓T�1, 1) + �b(1, ✓
T�1, 1)VT
, so the value of playing in period T � 1 is
V
T�1 =
Z✓
⇤T�1
�1�b(0, ✓, 0)V
T
d�(✓) +
Z +1
✓
⇤T�1
�⇡(✓, 1) + �b(1, ✓, 1)V
T
�d�(✓)
where V
T
=R +1✓
⇤T
⇡(✓, 1)d�(✓) and ✓⇤T�1 is given by the indi↵erence condition
Z 1
0⇡̃(✓⇤
T
, A)dA = 0
Following backward, we can continue finding threshold for earlier rounds and o↵er the following
recursive characterization:
Proposition 16 There is a unique symmetric monotone Perfect Bayesian Nash equilibrium described
by the following optimal strategy: s
t
(xit
) = 0 for all xit
< ✓
⇤t
and s
t
(xit
) = 1 for all xit
� ✓
⇤t
, where
✓
⇤t
= #(Vt+1) is the unique solution to
46
Z 1
0
�⇡(✓⇤
t
, A) + �⇢(✓⇤t
, A)Vt+1
�dA = 0
and the value V
t
is defined recursively by V
t
= G(Vt+1), where
G(Vt+1) ⌘
Z#(V
t+1)
�1�b(0, ✓, 0)V
t+1d�(✓) +
Z +1
#(Vt+1)
�⇡(✓, 1) + �b(1, ✓, 1)V
t+1
�d�(✓)
with the boundary condition V
T+1 = 0.
Proof: Follows from the text above and from the main results of Morris and Shin (2003) outlined in
section 2 above. ⌅
Note that, in all equilibria, the regime outcome is extreme in the sense that, as already illustrated
by Proposition 2 in section 2.2.1 and here by Proposition 16, At
2 {0, 1}. This is reflected by the fact
that the individuals’ final decision at stage t depends on a signal-independent threshold ✓⇤t
as opposed
to a common threshold, say x
⇤t
, that triggers attack only for certain realizations of the private signal.
In this sense, this model can speak nothing about partial attacks (those in which some people attack
and some others do not), as all attacks render success. Consequently, coordination cycles will emerge
solely from participation in the game (the, so to speak, extensive margin) and not from coordination
on the intensity of the aggregate attack (the intensive margin).
Since thresholds depend on the continuation values of the game, the equilibrium is fully described
by the law of motion of such value functions, given by the map G(·). The system converges to a
stable steady state if G(·) has a unique and stable fixed point V = G(V ). For many setups, however,
G(·) has a unique, unstable fixed point, in which case the system may exhibit chaotic dynamics.
Equilibrium uniqueness, however, holds for any finite T , and if the system has an unstable steady
state, the thresholds fluctuate permanently even for large, but finite, T . The existence of fluctuations
is preserved when letting T go to infinity, though uniqueness may be lost as the boundary condition
V
T+1 = 0 is absent.
To derive results that we can compare with, for instance, Angeletos, Hellwig and Pavan (2007), let
us specialize the environment to our familiar example23. Suppose
⇡(✓t
, A
t
) ⌘ 1[At
>✓
t
] � c
for some c 2 (0, 1). Moreover, assume that an unsuccessful attack results into bankruptcy with
probability p 2 [0, 1]. The continuation probabilities b(ait
, ✓
t
, A
t
) are then as in Table 3.
23Steiner (2008) and Mathevet and Steiner (2013) provide other enlightening examples, including debt crises in emerg-ing economies, fluctuations in search intensity and the e↵ects of taxes on investment reversal decisions.
47
A
t
> ✓
t
A
t
✓
t
Attack 0 1� p
Wait 0 1
Table 3: Continuation probabilities b(ait
, ✓t
, At
).
Note that the standard game is a special case with p = 1. If p < 1, some cycles may emerge
due to coordination in the extensive margin. In particular, we obtain the following specialization of
Proposition 16:
Proposition 17 Proposition 16 applies with thresholds ✓⇤t
= #(Vt+1) defined by
#(Vt+1) =
1� c
1 + �pV
t+1
The evolution of expected future payo↵s is given by V
t
= G(Vt+1), where
G(Vt+1) ⌘ (1� c)⇥ �(#(V
t+1)) + �V
t+1 ⇥ [1� �(#(Vt+1))]
Proof: Follows directly from specializing the formulas in Proposition 16 to ⇡(✓t
, A
t
) ⌘ 1[At
>✓
t
] � c
and to the continuation probabilities given in Table 3. ⌅
An illustration of this economy is given by Figure 6, which shows, for a particular simulation, the
evolution of thresholds below which the speculators attack. Periods with high thresholds correspond
to periods in which attacks are more likely because the agents correctly infer that others will attack
even if the fundamentals are quite sound. The endogenous fluctuations of beliefs create cycles of
coordination which manifest themselves in infrequent though successful large-scale attacks in which all
agents choose to attack and no agent chooses to wait.
The equilibrium dynamics are reminiscent of Angeletos, Hellwig and Pavan (2007) in the sense that
there exist periods of tranquility in which no attacks are observed. However, in the Steiner (2008)
economy, agents will not disagree in their actions: either all agents attack or none does, so that all
attacks are successful. This means that the phases of distress are short-lived and carry little information
inter-temporally, as the fundamental is revealed at the end of every period (like in Morris and Shin
(1999)). However, both Angeletos, Hellwig and Pavan (2007) and Steiner (2008) have in common
that dynamics emerge endogenously from self-fulfilling learning and coordination upon past actions.
Moreover, cycles are purely behavioral in the sense that they may flow independently of the realizations
48
Figure 6: Evolution of thresholds ✓?t
below which the speculators attack
the status quo. A successful attack occurs in the period denoted
by the symbol ⌅ for a particular realization of the fundamental.
of the economic fundamentals. This result helps bridging the theoretical gap between the insights from
the static global games literature, in which economic outcomes change only if fundamentals change, and
the inherently dynamic self-fulfilling properties of the classic macroeconomic models of coordination
listed in the introduction, such as Cole and Kehoe (2000), Obstfeld (1986, 1995) and Diamond and
Dybvig (1983).
4 Discussion
The main results derived in section 3.4 should persuade us that the dynamic global games approach
is well suited for studying how informational frictions can propagate into real fluctuations of the
business cycle. Above we have presented a few examples in which the evolution of beliefs helps
accounting for the evolution of equilibrium outcomes over and above the fundamentally-driven forces
of the economy. According to this view, an economy can grow irrespectively of the structural processes
that drive their directly payo↵-relevant outcomes, for agents can find it optimal to coordinate in actions
that may have a real aggregate impact provided that there is a su�ciently optimistic and widespread
prospect that such actions will deliver the ex-ante expected e↵ects when taken collectively.
In this framework, coordination failures may arise: agents may fail to choose those actions that
would be in their collective interest if they believe that others will fail to choose them as well. This
problem is recurrent in the literature on coordination problems in macroeconomics (see Diamond
(1982) for a seminal example), and it may operate as an amplification or multiplier mechanism in the
49
business cycle: when agents perceive economic fundamentals to be weak and believe other agents to
possess similar beliefs about the fundamentals and about the beliefs of others, they may coordinate
in those actions that pay o↵ only in those events that are most correlated with economic distress,
for instance a regime change. A coordinated attack on the status quo in turn debilitates the real
economy even further, thereby making it prone to stronger future attacks, amplifying the cycle and
turning recessions into more persistent, or even frequent, phenomena. If fundamentals themselves
have a certain degree of persistence, beliefs will adapt slowly and recessions may be long-lasting due
to repeated coordination on pessimistic outcomes. In this way, business cycles are self-reinforcing in
the sense that when aggregate activity is perceived to be low, agents take precautionary actions that
further depress the level of activity.
Arguably, this view of behavioral-driven fluctuations is suggestive of the theory of so-called sen-
timents that has been recently proposed by Angeletos and La’O (2013). This paper shows in an
otherwise standard unique-equilibrium, rational-expectations Walrasian economy that, when limiting
the communication protocols that are embedded within a neoclassical economy by allowing trading to
be random and decentralized, the business cycle may be driven by a certain type of extrinsic shocks,
akin to sunspots, that shift expectations of economic activity without shifting the underlying pref-
erences and technologies. Communication may further help propagate shocks in a similar way that
market sentiments, animal spirits and rumors do in contagion-based models and alter the amplitude
of the cycles in a mechanism similar to the one described in the last paragraph. Yet another theory in
which information-driven mechanisms can produce aggregate fluctuations even in the absence of large
shocks is the literature on so-called uncertainty shocks, initiated by Bloom (2009), on how exogenous
shocks to the volatility of productivity shocks can a↵ect aggregate economic activity. Fajgelbaum,
Schaal and Taschereau-Dumouchel (2014) propose an example of an economy in which uncertainty is
endogenous, as it is associated with the variance of firms’ beliefs about their own investment. In that
economy, times of low activity produce high uncertainty, which are in turn linked with slow learning
and low investment incentives, further depressing the economy and, in some scenarios, tying it to
uncertainty traps that lengthen the duration of recessions.
I the next section I propose a global-games-based approach that I would like to study further.
Please note that what I present is, for now, only a first example of such an economy.
4.1 A dynamic partial-equilibrium model of coordination-driven growth
Environment and payo↵s Time is discrete and infinite, indexed by t = 1, 2, . . . There is a measure-
one continuum of agents indexed by i 2 [0, 1]. Each agent is endowed with 1 unit of the single good in
each period (whose price is normalized to one).
50
Each period, each individual must choose how to allocate this unit of good between two mutually
exclusive investment opportunities. First, the agent can attack the status quo, which pays one-for-one
if the status quo is abandoned. This investment is risky because its return depends on the realization
of an economic fundamental, ✓t
2 R, and on the action of others. Else, the agent can invest into a
project that returns g 2 (0, 1), which is fixed and exogenous and accumulates wealth, denoted k
t
. The
payo↵s are described in Table 4.
A
t
� ✓
t
A
t
< ✓
t
Attack 1 0Project g g
Table 4: Net returns for investing attacking the status quo
and investing into the project, with g 2 (0, 1).
The status quo is abandoned if and only if ✓t
A
t
, where A
t
is the size of the attack given by
A
t
=R 10 a
jt
dj. The regime outcome is Rt+1 ⌘ 1[✓
t
A
t
], with R
t+1 = 1 meaning that there is a regime
switch from periods t to t+ 1, and next-period wealth is
k
t+1 = (1�A
t
)g
We label wealth as k (for capital) because, in the general equilibrium version of the model, the safe
investment will be associated to a productive opportunity run by entrepreneurs, while speculation will
not produce direct wealth accumulation or growth.
Timing and information Within each period t, there are three stages. In the first stage, nature
chooses a new realization ✓t
2 R of the fundamental. It is common knowledge that the fundamental
follows an AR(1) process
✓
t
= ⇢
✓
✓
t�1 + "
✓
t
where ⇢✓
2 (0, 1), "✓t
⇠ N (0, (1 � ⇢
2✓
)/↵) and the initial fundamental is known to be drawn from
✓0 ⇠ N (z, (1� ⇢
2✓
)/↵). The realization of ✓t
is unknown to the agents, who receive a private signal
x
it
= ✓
t
+ u
t
+ ⇠
it
where ⇠it
⇠ N (0, 1/�) is an idiosyncratic component and u
t
⇠ N (0, 1/�) is a common component.
In the second stage, markets open and individuals privately choose whether to attack, by choosing
51
a(Iit
) 2 {0, 1}, or refrain and invest, k(Iit
) = 1� a(Iit
), where Iit
denotes agent i’s information set at
date t. In the third stage, At
is revealed publicly (although ✓t
remains unknown) and the status quo
is abandoned if and only if ✓t
A
t
. Note that the fact that A
t
is revealed at the end of the period
means that all within-period heterogeneity is wiped out and only the component yt
⌘ ✓
t
+ u
t
.
We suppose that no agent can observe the individual action of others (so that o↵-equilibrium
beliefs are not relevant). At period t, the information set of any agent i 2 [0, 1] is therefore Iit
=
{xt
i
, a
t�1i
, k
t�1i
;At�1}, where superscripts denote histories. Since all relevant information is made
public at the end of the period (in particular, agents do not use their private signals to update because
these become uninformative after the revelation of At
), the period-t individual posterior beliefs can be
summarized by common beliefs :
✓
t
|Iit
⇠ N�µ
t
, �
�1t
�
for all i 2 [0, 1]. This means that all relevant information can be summarized by the single state
vector (µt
, �
t
) at the beginning of period t+ 1.
Therefore, the law of motion for common beliefs is
µ
t+1 = ⇢
✓
�
t
µ
t
+ �y
t
�
t
+ �
�
t+1 =
✓⇢
2✓
�
t
+ �
+1� ⇢
2✓
↵
◆�1
for all t = 1, 2, . . . , with µ0 = ⇢
✓
z and �0 = ↵/(1�⇢2✓
) as the initial state vector. Note that posterior
mean and precision are common across agents (no need to keep track of the belief distribution) and
su�cient statistics for beliefs.
Equilibrium Adopting the convention that agents attack in case of indi↵erence, the optimal bidding
strategy at period t is
a(µt
, �
t
) =
8><
>:
1 if p(µt
, �
t
) � g
0 if p(µt
, �
t
) < g
where p(µt
, �
t
) is the posterior belief of a regime switch (thus also the expected payo↵ for attacking),
and the optimal investment strategy is k(µt
, �
t
) = 1� a(µt
, �
t
).
Conjecture that the model can be solved by monotone strategies. Then, there exist cuto↵ points
✓
⇤t
⌘ ✓
⇤(µt
, �
t
) and x
⇤t
⌘ x
⇤(µt
, �
t
) such that the status quo is abandoned if and only if ✓t
✓
⇤t
, and
an agent attacks if and only if her private signal satisfies xt
x
⇤t
, and otherwise invests in the project.
52
Since ✓t
|µt
, �
t
⇠ N (µt
, �
�1t
), the latter implies that we can write the posterior belief of a regime switch
as
p(µt
, �
t
) = P[✓t
✓
⇤t
|µt
, �
t
] = �⇣p
�
t
�✓
⇤t
� µ
t
�⌘
Since x
t
= ✓
t
+ u
t
+ ⇠
t
, then x
t
|✓t
⇠ N (✓t
,�
�1 + �
�1), and therefore the size of the attack is given
by
A(✓t
) = P[xt
x
⇤t
|✓t
] = �
s��
� + �
(x⇤t
� ✓
t
)
!
and �(✓t
) ⌘ 1�A(✓t
) is the fraction of agents who invest into the project at time t. The threshold
level ✓⇤t
that determines a regime switch solves ✓⇤t
= A(✓⇤t
), that is
✓
⇤t
= �
s��
� + �
(x⇤t
� ✓
⇤t
)
!(13)
Finally, the indi↵erence condition for the marginal trader says that p(µt
, �
t
) = g, or
�⇣p
�
t
�✓
⇤t
� µ
t
�⌘= g (14)
and the thresholds (x⇤t
, ✓
⇤t
) are defined as the unique joint solution to (13) and (14), given the state
(µt
, �
t
).
Figure 7 is an example of a simulated economy. The calibration is g = 0.5, ↵ = 1, � = 5, � = 20,
⇢
✓
= 0.98 and z = 0.5, for T = 100 periods. Note that, over time, At
converges toward zero and thus
k
t
does toward g. Intuitively, as time goes by, agents learn about ✓t
and coordinate into the safe and
“productive” investment. However, in the transit to this steady state, failures in coordination may
occur which may lead to sustained episodes of repeated attacks and extended economic cycles.
4.2 A dynamic general-equilibrium model of coordination-driven growth
The last subsection has proposed a preliminary example to show through simulation a simple mech-
anism that hints that episodes of sustained coordination can survive over and above fundamentally-
driven cycles of wealth. Admittedly, this point has been made with an extremely stylized partial-
equilibrium dynamic model of regime change. In this subsection I outline a general-equilibrium coun-
terpart of the same economy and present a definition for its equilibrium.
Demographics and production Time is discrete, runs forever and is indexed by t = 1, 2, . . . . There
is a measure-one continuum of infinitely-lived agents, indexed by i 2 [0, 1], and a single consumption
53
20 40 60 80 100−1.5
−1
−0.5
0
0.5
1Thresholds
Time
Evo
lutio
n o
f th
resh
old
s
θt∗ x
t∗
20 40 60 80 100−0.2
0
0.2
0.4
0.6
0.8
Time
θt a
nd
Xt
Fundamentals and public signals
θt
yt
0 20 40 60 80 100
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Time
At a
nd k
t
Investment levels
At
kt
20 40 60 80 1000
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Time
µt a
nd θ
t
Posterior mean and actual fundamental
µt
θt
Figure 7: Simulation of the partial-equilibrium economy.
Calibration: g = 0.5, ↵ = 1, � = 5, � = 20, ⇢✓
= 0.98 and z = 0.5, for T = 100 periods.
54
good (with unit price) produced with a constant-returns-to-scale production function Y
t
= F (Kt
, L
t
),
where Kt
2 R+ is the capital stock of the economy and L
t
2 [0, 1] is hours of labor, with K0 given and
nonnegative. Labor is supplied inelastically, or L
t
= 1, so that we can write production in intensive
form as Y
t
/L
t
= f(kt
), where f(kt
) ⌘ F (kt
, 1) and k
t
⌘ K
t
/L
t
. We assume that f
0(·) > 0 > f
00(·),
and the standard Inada conditions hold. Factor markets are competitive.
Investment opportunities In order to consume, each individual must allocate his wealth (i.e, wage
plus the returns on past investments) into either one of two investment technologies.
1. First, an individual can become a speculator. Turning into a speculator means choosing an
action a
it
2 {0, 1} within a Morris and Shin game, that is, investing into a project that pays o↵
one-for-one only if a su�ciently large fraction of agents undertake it. This is risky in the sense
that it pays o↵ depending on the action chosen by others, and pays more in expected terms the
more people undertake it (a payo↵ complementarity). This does not accumulate wealth for the
economy: the wage is stored at zero net return for next period.
2. Else, the individual can become an entrepreneur. Turning into an entrepreneur means investing
into a project that will turn into capital next period. This is a safe investment in the sense
that its outcome does not depend directly on the action of other entrepreneurs. The investment
technology is described by a function g(.), in the sense that investing w units of the good returns
g(w) units of capital, where g
0(·) > 0 > g
00(·). This capital is then rented out to the firm at a
rental rate of Rk.
As usual, the status quo is dropped in period t if ✓t
A
t
, and we let ⇡t+1 ⌘ 1[✓
t
A
t
] be the regime
outcome, with ⇡t+1 = 1 meaning that there is a regime switch from period t to t+1. Table 5 describes
the payo↵s.
A
t
� ✓
t
A
t
< ✓
t
Speculator 1 0Entrepreneur R
k
g(w) R
k
g(w)
Table 5: Net returns for investing attacking the status quo
and investing w into the capital-accumulation technology.
The law of motion of per-capita capital is
k
t+1 = �
t
g(wt
) + (1� �
k
)kt
(15)
55
where �k
2 [0, 1] is the depreciation rate of capital and �t
2 [0, 1] is the equilibrium mass of agents
who invest into capital (that is, the measure of speculators in the economy).
Equation (15) describes the growth pattern of the economy, and for now it is enough to note
that fluctuations in aggregate activity stem from two di↵erent sources: exogenously through capital
depreciation, and endogenously through changes in �t
(the extensive margin of investment).
Timing and information Timing and information are identical to the partial-equilibrium version
of the model. At each period t, it is common knowledge that the fundamental evolves according to an
auto-regressive process
✓
t
= ⇢
✓
✓
t�1 + "
✓
t
where ⇢✓
2 (0, 1), "✓t
⇠ N (0, (1 � ⇢
2✓
)/↵) and the initial fundamental level is known to be drawn
from ✓0 ⇠ N (z, (1 � ⇢
2✓
)/↵). The realization ✓t
is unknown throughout period t and at any point in
the future.
Within each period, there are three stages. In the first stage, nature draws ✓t
and each consumer
i observes an unbiased private signal xit
on it, given by:
x
it
= ✓
t
+ u
t
+ ⇠
it
where ⇠it
⇠ N (0, 1/�) and u
t
⇠ N (0, 1/�). In the second stage, all markets open, individuals
choose whether to become speculators or entrepreneurs, and each type of agent submits demands for
non-capital and capital investments, respectively, all of which are placed privately24. In the third
stage, At
is revealed publicly (so that y
t
⌘ ✓
t
+ u
t
serves as a public signal for the agents) and the
status quo is abandoned if At
� ✓
t
. Payments for both investment technologies are realized only at
the beginning of the next period.
Once again, posterior beliefs are common by the end of the period, such that ✓t
|xt
⇠ N (µt
, �
�1t
),
where posterior mean and precision evolve according to:
µ
t+1 ⌘ ⇢
✓
�
t
µ
t
+ �y
t
�
t
+ �
�
t+1 ⌘✓
⇢
2✓
�
t
+ �
+1� ⇢
2✓
↵
◆�1
for all t = 1, 2, . . . , with µ0 = ⇢
✓
z and �0 = ↵/(1� ⇢
2✓
). .
24Once more, the fact that individual actions are not observable by others allows us to ignore the role of o↵-equilibriumbeliefs.
56
Definition of a recursive equilibrium Each period t, an agent i with wage w
it
� 0 must decide
whether to become a speculator or an entrepreneur.
Let V
S(µ, �, k) be the value of becoming a speculator and V
E(µ, �, k) the value of becoming an
entrepreneur for an agent that starts a period with a belief system (µ, �) and the prevailing capital
stock is k. In each period, given beliefs about the fundamental, an agent can either invest in capital
or choose whether or not to attack the status quo.
The following defines a recursive equilibrium:
Definition 6 A symmetric monotone recursive PBE are value functions V (µ, �, k), V E(µ, �, k) and
V
S(µ, �, k) for the agent, the entrepreneur and the speculator, respectively; policy rules z(µ, �, k) � 0
and a(µ, �, k) 2 {0, 1}; factor prices R
k(k) and w(k) of capital and labor; measures A(k) 2 [0, 1] and
�(k) 2 [0, 1] of speculators and entrepreneurs; a perceived probability of regime switch P (✓; k) 2 [0, 1];
and a cdf (✓|µ, �, k) 2 [0, 1], such that, for any state (µ, �, k),
1. Consumers’ optimality: Given prices R
k(k) and w(k), the value function satisfies
V (µ, �, k) = max
⇢V
S(µ, �, k), V E(µ, �, k)
�
where
V
S(µ, �, k) = maxa
02{0,1}a
0✓Z +1
�1P (✓; k)d (✓|µ, �, k)
◆+ ⇢E
µ
0,�
0
V (µ0
, �
0, k
0)
����µ, �, k�
and
V
E(µ, �, k) = maxz
02�(k)R
k(k)g(z0) + ⇢Eµ
0,�
0⇥V (µ0
, �
0, k
0)��µ, �, k
⇤
�(k) ⌘�z
0 : 0 z
0 w(k) +R
k(k)g(z(µ, �, k)) + 1[A(✓,k)>✓]a(µ, �, k)
where ⇢ 2 (0, 1) is the time discount factor, and the Bellman equations have solutions at the
policy functions, namely a
0 = a(µ, �, k) and z
0 = z(µ, �, k).
2. Belief consistency: (✓|µ, �, k) is obtained by Bayes’ rule. In particular, ✓0|µ, � ⇠ N (µ, ��1),
with
µ
0 = ⇢
✓
�µ+ �y
� + �
�
0 =
✓⇢
2✓
� + �
+1� ⇢
2✓
↵
◆�1
The perceived probability of a regime switch is given by P (✓; k) = 1[A(✓,k)�✓], for each ✓ 2 R.
57
3. Equilibrium measures: The equilibrium measure of speculators is A(k) = ✓
?(k), where ✓?(k)
is the solution to the joint system for (x?(k), ✓?(k)):
✓
?(k) = �
s��
� + �
(x?(k)� ✓
?(k))
!
R
k(k)g(w(k)) = � (p�(✓?(k)� �))
The equilibrium measure of entrepreneurs is �(k) = 1�A(k).
4. Market clearing conditions: Competitive factor markets clear, so that w(k) = f(k)� kf
0(k)
and R
k(k) = f
0(k). Next-period capital is given by k
0 = �(k)g(w(k)) + (1� �
k
)k.
Note that, conditional on choosing to become a speculator, not attacking is never optimal, for a
weakly greater payo↵ could have been obtained by investing in capital as the continuation value is the
same in both cases. Therefore, all speculators attack the status quo. This is already imposed in the
definitions above, as A(✓, k) stands both for the aggregate size of the attack and the measure of agents
that become speculators.
Figure 8 is an example of a simulated economy. The calibration is f(kt
) = k
!
t
with ! = 0.3,
g(wt
) = w
#
t
with # = 0.3, ↵ = 3, � = 500, � = 50, �k
= 0.16, ⇢✓
= 0.99, k0 = 0.6 and z = R
k
0g(w0),
for T = 200 periods. Note that, over time, At
converges toward zero and thus k
t
does toward g.
Once again, in periods in which the fundamental is perceived to be low, there is coordination into
speculation, which lengthens the crisis in the real sector through a slower accumulation of capital.
My attention is now focused on the two models just outlined, which need to be made more tractable
and a little less stylized. This is very much work in progress.
5 Concluding remarks
This paper has surveyed theory and applications of the global games literature in macroeconomic
problems. The main justification for the use of this theory is in problems of coordination, in which
the commonality of certain payo↵-relevant information may lead to multiplicity of equilibria. We have
analyzed how the global games approach can select one such equilibrium within a particular class of
monotone strategy Bayesian-Nash equilibria. The main insights are not robust to the introduction of
public information, but it is still possible to derive uniqueness results for a large class of models that
allow us to draw determinate policy implications.
58
50 100 150 200
0.35
0.4
0.45
0.5
0.55
0.6
0.65
0.7Factor prices
Time
Fact
or
price
s
wt
Rtk
50 100 150 2000
0.1
0.2
0.3
0.4
0.5
Time
θt,
y t and
µt
Fundamentals, public signals and beliefs
θt
yt
µt
50 100 150 200
0
0.2
0.4
0.6
0.8
1
Time
At,
χt
Equilibrium measures
At
χt
50 100 150 2000.65
0.7
0.75
0.8
0.85
0.9
0.95
1
Time
f(k t)
and k
t
Investment and production
f(kt) k
t
Figure 8: Simulation of the general-equilibrium economy. Calibration: f(kt
) = k!
t
with ! = 0.3, g(wt
) = w#
t
with # = 0.3, ↵ = 3, � = 500, � = 50, �k
= 0.16, ⇢✓
= 0.99, k0 = 0.6 and z = Rk
0g(w0), for T = 200 periods.
59
References
[1] Angeletos, G.-M., and J. La’O (2013): “Sentiments,” Econometrica, 81(2), 739 – 779.
[2] Angeletos, G.-M., C. Hellwig, and A. Pavan (2006): “Signaling in a Global Game: Coordi-
nation and Policy Traps,” Journal of Political Economy, 114(3), 452 – 484.
[3] Angeletos, G.-M., C. Hellwig, and A. Pavan (2007): “Dynamic Global Games of Regime
Change: Learning, Multiplicity, and the Timing of Attacks,” Econometrica, 75(3), 711 – 756.
[4] Angeletos, G.-M., and I. Werning (2006): “Crises and Prices: Information Aggregation,
Multiplicity, and Volatility,” American Economic Review, 96(5), 1720 – 1736.
[5] Atkeson, A (2000): “Rethinking Multiple Equilibria in Macroeconomic Modeling: Comment,”
NBER Macroeconomics Annual, 15, 162 – 171.
[6] Banerjee, A.V. (1992): “A Simple Model of Herd Behavior,” The Quarterly Journal of Eco-
nomics, 107 (3), 797 – 817.
[7] Barlevy, G., and P. Veronesi (2003): “Rational Panics and Stock Market Crashes,” Journal
of Economic Theory, 110, 234 – 263.
[8] Bikhchandani, S., Hirshleifer, D., and I. Welch (1992): “A Theory of Fads, Fashion,
Custom, and Cultural Change as Informational Cascades,” Journal of Political Economy, 100 (5),
992 – 1026.
[9] Bloom, N. (2008): “The Impact of Uncertainty Shocks,” Econometrica, 77, 623 – 685.
[10] Broner, F. (2008): “Discrete Devaluations and Multiple Equilibria in a First Generation Model
of Currency Crises,” Journal of Monetary Economics, 55, 592 – 605.
[11] Burdzy, K., D.M. Frankel and A. Pauzner (2001): “Fast Equilibrium Selection by Rational
Players Living in a Changing World,” Econometrica, 69(1), 163 – 189.
[12] Calvo, G. A. (1988): “Servicing the Public Debt: The Role of Expectations,” American Eco-
nomic Review, 78, 647 – 661.
[13] Carlsson, H., and E. van Damme (1993): “Global Games and Equilibrium Selection,” Econo-
metrica, 61(5), 989 – 1018.
[14] Chamley, C. (1999): “Coordinating Regime Switches,” Quarterly Journal of Economics, 114,
869 – 905.
60
[15] Chamley, C. (2003): “Dynamic Speculative Attacks,” American Economic Review, 93, 603 –
621.
[16] Chari, V.V., and P. Kehoe (2003): “Hot Money,” Journal of Political Economy, 111(6), 1262
– 1292.
[17] Chassang, S. (2010): “Fear of Misscoordination and the Robustness of Cooperation in Dynamic
Global Games with Exit,” Econometrica, 78(3), 973 – 1006.
[18] Cole, H.L., and T. Kehoe (2000): “Self-Fulfilling Debt Crises,” The Review of Economic
Studies, 67(1), 91 – 116.
[19] Corsetti, G., A. Dasgupta, S. Morris, and H.S. Shin (2004): “Does One Soros Make
a Di↵erence? A Theory of Currency Crises with Large and Small Traders,” Review of Economic
Theory, 71, 87 – 113.
[20] Corsetti, G., B. Guimaraes, and N. Roubini (2006): “International Lending of Last Resort
and Moral Hazard: A Model of IMF’s Catalytic Finance,” Journal of Monetary Economics, 53 (3),
441 – 471.
[21] Dasgupta, A. (2007): “Coordination and Delay in Global Games,” Journal of Economic Theory,
134 (1), 195 – 225.
[22] Diamond, P. (1982): “Aggregate Demand Management in Search Equilibrium,” Journal of Po-
litical Economy, 90, 881 – 894.
[23] Edmond, C. (2013): “Information Manipulation, Coordination and Regime Change,” Review of
Economic Studies, 80 (4), 1422 – 1458.
[24] Diamond, D., and P. Dybvig (1983): “Bank Runs, Deposit Insurance, and Liquidity,” Journal
of Political Economy, 91, 401 – 419.
[25] Fajgelbaum, P., E. Schaal, and M. Taschereau-Dumouchel (2014): “Uncertainty Traps,”
National Bureau of Economic Research, working paper no. 19973.
[26] Frankel, D.M., and A. Pauzner (2000): “Resolving Indeterminacy in Dynamic Settings: The
Role of Shocks,” Quarterly Journal of Economics, 115(1), 285 – 304.
[27] Flood, R., and P. Garber (1984): “Collapsing Exchange-rate Regimes: Some Linear Exam-
ples,” Journal of International Economics, 17, 1 – 13.
[28] Ginnitsarou, G., and F. Toxvaerd (2012): “Recursive Global Games,” University of Cam-
bridge and CEPR, working paper.
61
[29] Goldstein, I., and A. Pauzner (2005): “Demand-Deposit Contract and the Probability of
Bank Runs,” The Journal of Finance, 60(3), 1293 – 1326.
[30] Goldstein, I., E. Ozdenoren, and K. Yuan (2011): “Learning and Complementarities in
Speculative Attacks,” Review of Economic Studies, 78, 263 – 292.
[31] Grossman, S.J., and J. Stiglitz (1980): “On the Impossibility of Informationally E�cient
Markets,” American Economic Review, 70(3), 393 – 408.
[32] Hellwig, C. (2002): “Public Information, Private Information, and the Multiplicity of Equilibria
in Coordination Games,” Journal of Economic Theory, 107, 191 – 222.
[33] Hellwig, C., and L. Veldkamp (2008): “Knowing What Others Know: Coordination Motives
in Information Acquisition,” The Review of Economic Studies, 76, 223 – 251.
[34] Hellwig, C., A. Mukherji, and A. Tsyvinski (2006): “Self-Fulfilling Currency Crises: The
Role of Interest Rates,” American Economic Review, 96(5), 1769 – 1787.
[35] Krugman, P. (1979): “A Model of Balance-of-Payments Crises,” Journal of Money, Credit, and
Banking, 11(3), 311 – 325.
[36] Levin, J. (2000): “Collective Reputation,” Stanford University, working paper.
[37] Levin, J. (2001): “A Note on Global Games with Overlapping Generations,” Stanford University,
working paper.
[38] Lucas, R. E. (1975): “An Equilibrium Model of the Business Cycle,” Journal of Political Econ-
omy, 83, 1113 – 1144.
[39] Mathevet, L., and J. Steiner (2013): “Tractable Dynamic Global Games and Applications,”
Journal of Economic Theory, 148, 2583 – 2619.
[40] Matsui, A. (1999): “Multiple Investors and Currency Crises,” University of Tokyo, working
paper.
[41] Morris, S., and H.S. Shin (1998): “Unique Equilibrium in a Model of Self-Fulfilling Currency
Attacks,” American Economic Review, 88(3), 587 – 597.
[42] Morris, S., and H.S. Shin (1999): “A Theory of the Onset of Currency Attacks,” Asian
Financial Crisis: Causes, Contagion and Consequences, ed. P.-R. Agenor, D. Vines and A. Weber,
230 – 261. Cambridge: Cambridge University Press.
62
[43] Morris, S., and H.S. Shin (2002): “Social Value of Public Information,” American Economic
Review, 92(5), 1521 – 1534.
[44] Morris, S., and H.S. Shin (2003): “Global Games: Theory and Applications,” Advances in
Economics and Econometrics: Theory and Applications, Eighth World Congress, ed. Mathias De-
watripont, Lars P. Hansen, and Stephen J. Turnovsky, 56 – 114. Cambridge: Cambridge University
Press.
[45] Morris, S., and H.S. Shin (2004): “Coordination Risk and the Price of Debt,” European
Economic Review, 48(1), 133 – 153.
[46] Muth, J. F. (1961): “Rational Expectations and the Theory of Price Movements,” Econometrica,
29, 315 – 335.
[47] Obstfeld, M. (1986): “Rational and Self-Fulfilling Balance-of-Payments Crises,” American Eco-
nomic Review, 76(1), 72 – 81.
[48] Obstfeld, M. (1996): “Models of Currency Crises with Self-Fulfilling Features,” European Eco-
nomic Review, 40(3–5), 1037 – 1047.
[49] Oyama, D. (2004): “Booms and Slumps in a Game of Sequential Investment with the Changing
Fundamentals,” Japanese Economic Review, 55, 311 – 320.
[50] Rochet, J.-C., and X. Vives (2004): “Coordination Failures and the Lender of Last Resort:
Was Bagehot Right after All?,” Journal of European Economic Association, 6, 1116 – 1147.
[51] Sargent, T. J. (1991): “Equilibrium with Signal Extraction from Endogenous Variables,” Jour-
nal of Economic Dynamics and Control, 15, 245 – 273.
[52] Steiner, J. (2008): “Coordination cycles,” Games and Economic Behavior, 63(1), 308 – 327.
[53] Townsend, R.M. (1983): “Forecasting the Forecast of Others,” Journal of Political Economy,
91(4), 546 – 588.
63