@Dagon perhaps I should have place the emphasis on “transfer”. The key thing is that we are able to reliably transfer ownership in exchange for renumeration and that the resource on which on goals are contingent at least needs to be excludable. If we cannot prevent arbitrary counter-parties consuming the resource in question without paying for it then we can’t have a market for it.
I don’t think the emphasis should be on transfer, but on the contingency of transfer. In order for a transaction to be part of a market, as opposed to theft or other non-market transfer, the participants must have the choice NOT to make the transfer, if the exchange is not acceptable.
There are lots of variants and levels of optionality, leading to legitimate debates about “how much is this a market, vs a coerced behavior”. But the core of markets and analyses of how they behave is that they are, on some scale and timeframe, voluntary.
If an arbitrary counter-party can consume the resource, this can be rephrased as destroying other agent’s utility and this seems to be solved with threat-resistant ROSE values.
Not sure this is a totally correct application, though, because the consumer also gains some utility.
@Dagon perhaps I should have place the emphasis on “transfer”. The key thing is that we are able to reliably transfer ownership in exchange for renumeration and that the resource on which on goals are contingent at least needs to be excludable. If we cannot prevent arbitrary counter-parties consuming the resource in question without paying for it then we can’t have a market for it.
I don’t think the emphasis should be on transfer, but on the contingency of transfer. In order for a transaction to be part of a market, as opposed to theft or other non-market transfer, the participants must have the choice NOT to make the transfer, if the exchange is not acceptable.
There are lots of variants and levels of optionality, leading to legitimate debates about “how much is this a market, vs a coerced behavior”. But the core of markets and analyses of how they behave is that they are, on some scale and timeframe, voluntary.
If an arbitrary counter-party can consume the resource, this can be rephrased as destroying other agent’s utility and this seems to be solved with threat-resistant ROSE values.
Not sure this is a totally correct application, though, because the consumer also gains some utility.