{"id":"https://openalex.org/W4405464881","doi":"https://doi.org/10.1145/3670865.3673453","title":"Revisiting the First-Order-Approach to Principal-Agent Problems","display_name":"Revisiting the First-Order-Approach to Principal-Agent Problems","publication_year":2024,"publication_date":"2024-07-08","ids":{"openalex":"https://openalex.org/W4405464881","doi":"https://doi.org/10.1145/3670865.3673453"},"language":"en","primary_location":{"id":"doi:10.1145/3670865.3673453","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3670865.3673453","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th ACM Conference on Economics and Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069353486","display_name":"Hang Jiang","orcid":"https://orcid.org/0009-0001-0565-4471"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Hang Jiang","raw_affiliation_strings":["Department of Information Systems and Analytics/School of Computing, National University of Singapore, Singapore, Singapore"],"raw_orcid":"https://orcid.org/0009-0001-0565-4471","affiliations":[{"raw_affiliation_string":"Department of Information Systems and Analytics/School of Computing, National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056666517","display_name":"Chen Jin","orcid":"https://orcid.org/0000-0001-9940-0757"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chen Jin","raw_affiliation_strings":["Department of Information Systems and Analytics/School of Computing, National University of Singapore, Singapore, Singapore"],"raw_orcid":"https://orcid.org/0000-0001-9940-0757","affiliations":[{"raw_affiliation_string":"Department of Information Systems and Analytics/School of Computing, National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091637951","display_name":"Luyi Yang","orcid":"https://orcid.org/0000-0002-5370-6926"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Luyi Yang","raw_affiliation_strings":["Haas School of Business, The University of California, Berkeley, Berkeley, California, USA"],"raw_orcid":"https://orcid.org/0000-0002-5370-6926","affiliations":[{"raw_affiliation_string":"Haas School of Business, The University of California, Berkeley, Berkeley, California, USA","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069353486"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.4693,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.71671519,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"313","last_page":"314"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11182","display_name":"Auction Theory and Applications","score":0.8478000164031982,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11182","display_name":"Auction Theory and Applications","score":0.8478000164031982,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5925028920173645},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.5654400587081909},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5344592332839966},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16694670915603638},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10998466610908508}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5925028920173645},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.5654400587081909},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5344592332839966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16694670915603638},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10998466610908508},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3670865.3673453","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3670865.3673453","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th ACM Conference on Economics and Computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1956599529","https://openalex.org/W3124071598"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"This":[0],"paper":[1],"revisits":[2],"a":[3,34,59,84],"long-standing":[4],"question":[5],"of":[6,9,28,53,68,86],"the":[7,10,21,29,37,65,69,73],"validity":[8],"First-Order":[11],"Approach":[12],"(FOA)":[13],"for":[14],"Principal-Agent":[15],"problems":[16],"with":[17,58],"moral":[18],"hazard":[19],"in":[20,83,88],"agent's":[22,70],"hidden":[23],"effort.":[24],"The":[25,44],"canonical":[26],"formulation":[27],"problem":[30],"[Holmstr\u00f6m,":[31],"1979]":[32],"presents":[33],"technical":[35],"challenge:":[36],"agent":[38],"faces":[39],"infinitely":[40],"many":[41],"incentive":[42,61],"constraints.":[43],"standard":[45],"approach":[46],"has":[47],"been":[48],"to":[49,76],"relax":[50],"this":[51,80],"set":[52],"constraints":[54],"by":[55],"replacing":[56],"them":[57],"local":[60],"constraint":[62],"that":[63],"requires":[64],"first-order":[66],"derivative":[67],"utility":[71],"at":[72],"chosen":[74],"action":[75],"be":[77],"zero.":[78],"However,":[79],"relaxation":[81],"results":[82],"loss":[85],"optimality":[87],"general.":[89]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
