Credit and Identity Theft Charles M. Kahn and William Roberds.

Slides:



Advertisements
Similar presentations
Industrial Economics (Econ3400) Week 4 August 14, 2008 Room 323, Bldg 3 Semester 2, 2008 Instructor: Dr Shino Takayama.
Advertisements

Optimal Contracts under Adverse Selection
Pure Competition in the Long Run
Seminar in Auctions and Mechanism Design Based on J. Hartline’s book: Approximation in Economic Design Presented by: Miki Dimenshtein & Noga Levy.
Chapter 37 Asymmetric Information In reality, it is often the case that one of the transacting party has less information than the other. Consider a market.
Competition Policy Vertical restraints – Interbrand Competition.
Equilibrium. Market Equilibrium  A market is in equilibrium when total quantity demanded by buyers equals total quantity supplied by sellers.  An equilibrium.
Federal Communications Commission NSMA Spectrum Management Conference May 20, 2008 Market Based Forces and the Radio Spectrum By Mark Bykowsky, Kenneth.
FOUNDATIONS OF MICRO- BANKING THEORY CHAPTER 2: Why do financial intermediaries exist? CHAPTER 3: The Industrial Organisation approach to Banking CHAPTER.
Discussion of Aguiar Amador, Farhi and Gopinath Coordination and Crisis in Monetary Unions.
Rational Expectations and the Aggregation of Diverse Information in Laboratory Security Markets Charles R. Plott, Shyam Sunder.
Contemporary Models of Development and Underdevelopment
Bundling Equilibrium in Combinatorial Auctions Written by: Presented by: Ron Holzman Rica Gonen Noa Kfir-Dahav Dov Monderer Moshe Tennenholtz.
Externalities.
Chapter (1) The Central Concepts of Economics
2 THE ECONOMIC PROBLEM CHAPTER.
© 2009 Prentice Hall Business Publishing Essentials of Economics Hubbard/O’Brien, 2e. Fernando & Yvonn Quijano Prepared by: Chapter 1 Economics: Foundations.
C h a p t e r o n e Economics: Foundations and Models.
Chapter 15 APPLIED COMPETITIVE ANALYSIS Copyright ©2002 by South-Western, a division of Thomson Learning. All rights reserved. MICROECONOMIC THEORY BASIC.
Chapter 11: Cost-Benefit Analysis Econ 330: Public Finance Dr
Inferences About Process Quality
Agricultural Development Theories Dr. George Norton Agricultural and Applied Economics Virginia Tech Copyright 2009 AAEC 3204.
Lecture 5 Money, credit and banking in history. Coincidence of wants With coincidence of wants barter trades match perfectly. Barter is exchange of, say,
Anonymizing Web Services Through a Club Mechanism With Economic Incentives Mamata Jenamani Leszek Lilien Bharat Bhargava Department of Computer Sciences.
© 2009 Institute of Information Management National Chiao Tung University Lecture Notes II-2 Dynamic Games of Complete Information Extensive Form Representation.
Rent Protection, Innovation and Growth Slide 1 Innovation and Rent Protection in the Theory of Schumpeterian Growth By Elias Dinopoulos Schumpeterian Growth.
Electronic Transaction Use & Risk of Identity Theft.
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
General Equilibrium Analysis A Technological Advance: The Electronic Calculator Market Adjustment to Changes in Demand Formal Proof of a General Competitive.
The Economics of Information Exchanges Matthias Pflanz, CRA International GCLC Lunch Talk, Brussels, 6 October 2008.
Copyright © 2007 Pearson Education Canada 1 Chapter 12: Audit Sampling Concepts.
© 2005 Pearson Education Canada Inc Chapter 18 Asymmetric Information, The Rules of the Game, and Externalities.
ECON 6012 Cost Benefit Analysis Memorial University of Newfoundland
C. Government Role – Market Failure IF A market is a perfectly competitive (in buyers and sellers)THEN The market maximizes efficiencyTHEREFORE The government.
FOUNDATIONS OF MICRO- BANKING THEORY CHAPTER 2: Why do financial intermediaries exist? CHAPTER 3: The Industrial Organisation approach to Banking CHAPTER.
Ch8 Banks and Money 指 導 老 師:李 永 銘 老師 學 生:李 珮 鈺 楊 仁 宏 黃 昭 容 李 淑 君 日 期:
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Auditing Responsibilities & Objectives Chapter 5 Responsibilities & Objectives Chapter 5.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Industrial Economics and Telecommunication Regulations IETR Banshri Raichana1.
Default and Fragility in the Payment System Scott Freeman Department of Economics, University of Texas at Austin Paula Hernandez-Verme Department of Economics,
Lecture 2 in Contracts Employment Contracts This lecture studies how those who create and administer organizations design the incentives and institutional.
Asymmetric Information
The Costs and Benefits of Ownership: A Theory of Vertical and Lateral Integration Sanford J. Grossman Oliver D. Hart A Paper Summary By Amit Darekar Journal.
Marketing Channel Strategy The term marketing channel was first used to describe the existence of a trade channel bridging producers and users. Early writers.
Paul Milgrom and Nancy Stokey Journal of Economic Thoery,1982.
Facoltà di Giurisprudenza -ECONOMICS- Anno accademico 2011/2012 -ECONOMICS- Anno accademico 2011/2012 Nicola Bruni.
Identity Theft The Nation’s Fastest Growing Crime.
Ten Principles of Economics. 1. Trade off -between efficiency and equity Efficiency - the property of society getting the most it can from its scarce.
Chapter 1 Introduction. Copyright ©2015 Pearson Education, Inc. All rights reserved.1-2 Preview What is international economics about? International trade.
Introduction Many organizations use decision rules to alleviate incentive problems as opposed to incentive contracts The principal typically retains some.
Microeconomics ECON 2302 Spring 2010 Marilyn Spencer, Ph.D. Professor of Economics Introduction to course & Chapter 1.
What Are Economics And Health Economics? Farid Abolhassnai M.D. بسم الله الرحمن الرحيم.
“Group consumption, free-riding, & informal reciprocity agreements”. Why do people use informal reciprocity agreements? Most analysis answers this question.
 Public Goods In Networks Ryan Dewar. What is a public good  Public goods have two distinct aspects:  Non-excludable: The cost of keeping nonpayers.
Statistical principles: the normal distribution and methods of testing Or, “Explaining the arrangement of things”
E-Commerce.
Lecture 4 on Auctions Multiunit Auctions We begin this lecture by comparing auctions with monopolies. We then discuss different pricing schemes for selling.
Institute of Economic Studies, Faculty of Social Sciences, Charles University in Prague JEM027 Monetary Economics The role of money Tomáš Holub
Milgrom and Roberts (1992): Chapter 6 Economics, Organization & Management Chapter 6: Moral Hazard and Performance Incentives Examples of Moral Hazard:
Toward An Understanding of Self-Organization of Markets Yougui Wang Department of Systems Science, School of Management, Beijing Normal University, Beijing.
Agricultural Development Theories
Chapter 13 Money and Banks.
Externalities.
Chapter 10 Externalities
Advanced Political Economics
Advanced Political Economics
Lecture 8 Asymmetric Information: Adverse Selection
The Market System Chapter 4 2/17/2019.
Problem EP 12-9 Listed below is a selection of items from the internal control questionnaire on payables in Appendix 12A, Page 694. Are invoices, receiving.
Presentation transcript:

Credit and Identity Theft Charles M. Kahn and William Roberds

Basic idea of paper Present theory of fraud, including ID theft, in credit transactions ID theft arises endogenously as a form of opportunistic behavior Outgrowth of Kahn, McAndrews, and Roberds (IER 2005)

Fraud risk vs. credit risk Payments fraud has grown with the use of electronic forms of payment (FTC report: 12% victimized) Fraud risk quite small compared to credit risk (for credit cards, 5 BP versus 400 BP) Nonetheless, fraud risk a critical concern for industry

Modeling identity Usually modeled as history of agents’ actions We must go further: problem is to link a particular history with individual making a current transaction

Modeling identity Individual’s identity will be denoted by a unique (infinite) sequence of ones and zeros. We will describe technology for distinguishing an individual from an impersonator

Modeling identity In his role as a producer an individual’s identity is unproblematic The difficulty is to link the production history with a particular attempt at consumption

The framework N agents, infinitely lived, risk neutral, with common discount factor  Each agent identified with a “location” where he can produce a unique, specialized, non-storable good at a cost s

The framework Each period one agent wakes up “hungry” for the good of a particular producer Consumption of that good by that agent provides him utility u; any other consumption in the period gives the consumer 0 utility

The framework Note: no double coincidence of wants Therefore no possibility of barter (if s > 0) Some arrangement needed for intertemporal trade

The framework The value of u is common to all agents. The value of s is distributed in the population with distribution F 0< F(u) <1 A producer’s value of s (his “type”) is unchanging over time, and is private information to the producer

The framework The hungry agent can travel to the location of his preferred supplier The hungry agent’s own location is not automatically revealed Refusal to supply a good is observable

Timing At time 0, agents learn their own costs, and have the opportunity to form club (binding commitment) Agents in club receive goods from club members, but must supply goods to other club members  denotes fraction of population in club

Enforcement Agreements can be enforced by court: assume has power to punish one individual up to an amount X (large), provided he can be identified Thus “fraud risk” but no “credit risk”

Events within a period 1.Hungry agent and supplier randomly chosen 2.Hungry agent journeys to supplier’s location 3.Hungry agent’s identity is verified 4.If verification successful, trade occurs

Baseline: costless identification Result: Provided X > u, all individuals with s < u join club (club size  F(u) ) A member’s expected utility is V(s) =  –1  (u – s) Constrained efficient (cross-subsidy not allowed)

Verification technology Examine a sample of n bits of individual’s identity at cost k per bit sampled No type I error; probability of a false match of z n Optimal sampling increases with s and falls with k, z, or 

Equilibrium Find the cutoff level of supply cost for membership such that –all members join voluntarily and are willing to supply –each chooses his preferred monitoring sample –all non-members prefer to remain outside the club (and attempt impersonation)

Credit club equilibrium Result: If X > u For small k, equilibria exist with  F(u). As k shrinks,  approaches  F(u).

Credit card technology The credit card is a manufactured “pseudo- identity”: a string of bits, verifiable at lower cost than the identity itself. The credit card club makes an initial check of identity, then issues the member a card Subsequent suppliers verify the card rather than the person.

Equilibrium Analogous definition: Agents voluntarily choose between: joining the club (being monitored initially, and supplying to all card holders after monitoring their cards) not joining (not supplying, instead attempting credit card fraud)

Types of fraud Thus either the card or the person can be imitated: “existing account” vs. “new account” fraud

Key result Equilibrium with credit cards exists under same conditions as before, and dominates equilibrium with independent verification of buyers

Benefits of card arrangement Cards allow club members to share information gleaned in initial screening More intense verification possible; more frauds are excluded Size of club expands; high cost producers induced to join club

Costs of card arrangement Shared information info on buyer IDs may be incorrect, leading to –New account fraud –Existing account fraud

Policy implications Popular notion is sometimes advanced that more sophisticated cards can “solve the problem” of ID theft— But more sophisticated cards may actually contribute to the problem by making credit card payment more prevalent, increasing incentives for fraud.

Policy implications Proposed privacy legislation may also fail to curb ID theft— By constraining ID samples, such legislation may encourage new account fraud (“impersonation” in the model)

Policy implications Key policy tradeoff Gathering & sharing more information on buyers leads to better allocation of credit, but Amassing such data necessarily entails private & social costs (loss of privacy)

Key ideas of paper Credit-based transactions systems are systems for efficiently sharing information among sellers (esp. ID of buyers) ID theft a problem because it exploits exactly this source of efficiency Transactions systems must balance costs of fraud against costs (private & social) of ID verification