Startseite Wirtschaftswissenschaften The Economics of Scams
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

The Economics of Scams

  • Stan Miles und Derek Pyne ORCID logo EMAIL logo
Veröffentlicht/Copyright: 4. Februar 2017
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

This paper offers one of the first economic analyses of scams. Its major finding is that, unlike other crimes, imperfect enforcement may increase victimization by deterring only low-ability scammers whose failed attempts would otherwise alert potential victims before encounters with high-ability scammers. High-ability scammers may actually benefit from partial enforcement, which reduces their competition. These results may be reinforced when failed attempts are punished.

JEL Classification: K42

Acknowledgments

This paper benefited from the comments of Cliff Henson, Georgia Martin, Katarina Mayer, Murat Mungan, Lijun Zhang, two anonymous referees and participants at the 48th Canadian Economic Association Conference.

Appendix

Proof of Lemma 1, part (b):

  1. With the substitutions R=nL+nHR=nL+nH and x=1aTx=1aT, eq. [2] can be rewritten as oA=TaR(1xR)oA=TaR(1xR). Thus

[17]oAR=Ta{1R[(xR)ln(x)]+(1xR)(1R2)}=Ta{xR[1Rln(x)]1R2}

Since TaR2>0TaR2>0, it suffices to show that xR[1Rln(x)]1<0xR[1Rln(x)]1<0.

Define the function g(u)=u(1lnu)1g(u)=u(1lnu)1 on the set of all real numbers u such that 0<u10<u1. Then g(u)=u(1/u)+(1lnu)(1)=1+1lnu=lnug(u)=u(1/u)+(1lnu)(1)=1+1lnu=lnu for all u in the domain of g. Note that g(u)>0g(u)>0 for all u in the open interval (0, 1), which implies that g is strictly increasing on that interval. Also, g(1)=0g(1)=0. Since g is continuous on the half-open interval (0, 1], this implies that g(u)<0g(u)<0 for all u in the open interval (0, 1).

Setting u to xRxR and using the fact that Rlnx=ln(xR)Rlnx=ln(xR), we obtain xR[1Rln(x)]1<0xR[1Rln(x)]1<0.

References

Andreoni, J. 1991. “Reasonable doubt and the optimal magnitude of fines: Should the penalty fit the crime?” 22 Rand journal ofeconomics 385–395.10.2307/2601054Suche in Google Scholar

Andreozzi, L. 2004. “Rewarding policemen increases crime: Another surprising result from the inspection game,” 12 Public choice 69–82.10.1007/s11127-004-6166-xSuche in Google Scholar

Becker, G.S. 1968. “Crime and punishment: An economic approach,” 76 (2) Journal of political economy 169–217.10.1007/978-1-349-62853-7_2Suche in Google Scholar

Buchanan, J.M. 1973. “A defense of organized crime?” in S. Rottenberg, ed. The economics of crime and punishment. Washington, DC: American Enterprise Institute, 119–132.Suche in Google Scholar

Daniel, K. and J.R. Lott. 1995. “Should criminal penalties include third-party avoidance costs?” 6 The journal of legal studies 523–534.10.1086/467967Suche in Google Scholar

Deevy, M., S. Lucich and M. Beals, 2012. Scams, schemes, and swindles: A review of consumer financial fraud research. Stanford Financial Fraud Research Center Working Paper.Suche in Google Scholar

Deutsch, J., S. Hakim and U. Spiegel. 1990. “The effects of criminal experience on the incidence of crime,” 49 (1) American journal of economics andsociology 1–5.10.1111/j.1536-7150.1990.tb02252.xSuche in Google Scholar

Feess, E. and A. Wohlschlegel. 2009. “Why higher punishment May reduce deterrence,” 104 Economics letters 69–71.10.1016/j.econlet.2009.04.003Suche in Google Scholar

Friedman, M. 1998. “Coping with consumer fraud: The need for a paradigm shift,” 32 (1) Journal of consumeraffairs 1–12.10.1111/j.1745-6606.1998.tb00397.xSuche in Google Scholar

Friehe, T. 2013. “Tempting righteous citizens? counterintuitive effects of increasing sanctions in the realm of organized crime,” 44 The journal of socio-economics 37–40.10.1016/j.socec.2013.02.016Suche in Google Scholar

Garoupa, N. and M. Jellal. 2004. “Dynamic law enforcement with learning,” 20 (1) Journal of law, economics, andorganization 192–206.Suche in Google Scholar

Guha, B. 2012. “Pirates and fishermen: Is less patrolling always bad?” 81 (1) Journal of economic behavior and organization 29–38.10.1016/j.jebo.2011.09.012Suche in Google Scholar

Herley, C. 2012. Why Do Nigerian Scammers Say They Are From Nigeria? Paper presented at the 11th Annual Workshop on the Economics of Information Security.Suche in Google Scholar

Hogan, S. and L. Meriluoto. 2011. “On the probability of winning a lottery with a random number of competitors,” 18 Applied economics letters 1765–1768.10.1080/13504851.2011.562158Suche in Google Scholar

Langenderfer, J. and T.A. Shimp. 2001. “Consumer vulnerability to scams, swindles, and fraud: A new theory of visceral influences on persuasion,” 18 (7) Psychology and marketing 763–783.10.1002/mar.1029Suche in Google Scholar

Langton, L. M. Berzofsky, C. Krebs, and H. Smiley-McDonald, (eds.). 2012. National crime victimization survey: Victimizations not reported to the police, 2006–2010. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.Suche in Google Scholar

Lee, J. and H. Soberon-Ferrer. 1997. “Consumer vulnerability to fraud: Influencing factors,” 31 (1) The journal of consumeraffairs 70–89.10.1111/j.1745-6606.1997.tb00827.xSuche in Google Scholar

Leff, G. “Common tourist scams and how to avoid them.” View from the Wing (blog). January 6, 2013. http://boardingarea.com/viewfromthewing/2013/01/06/common-tourist-scams-and-how-to-avoid-them/.Suche in Google Scholar

Lott, J.R. 1996. “The level of optimal fines to prevent fraud when reputations exist and penalty clauses are unenforceable,” 17 (4) Managerial and decision economics 363–380.10.1002/(SICI)1099-1468(199607)17:4<363::AID-MDE768>3.0.CO;2-3Suche in Google Scholar

Meares, T.L., N. Katyal and D.M. Kahan. 2004. “Updating the study of punishment,” 56 Stanford law review 1171–1210.Suche in Google Scholar

Merriam-Webster. 2014. Scam. Merriam-Webster.com. http://www.merriam-webster.com/dictionary/scam. (accessed January 3, 2014).Suche in Google Scholar

Miles, S. and D. Pyne. 2015. “Deterring repeat offenders with escalating penalty schedules: A bayesian approach,” 16 (3) Economics ofgovernance 229–250.10.1007/s10101-015-0160-2Suche in Google Scholar

Mungan, M.C. 2010. “Repeat offenders: If they learn, we punish them more severely,” 30 (2)International review of law and economics 173–177.10.1016/j.irle.2009.11.002Suche in Google Scholar

Mungan, M.C. 2015a. “Wrongful convictions and the punishment of attempts,” 42 (1)International review of law and economics 79–87.10.1016/j.irle.2015.01.001Suche in Google Scholar

Mungan, M.C. 2015b. “Abandoned criminal attempts: An economic analysis,” 67 (1)Alabama law review 1–43.Suche in Google Scholar

New Brunswick Securities Commission. 2010. March is Fraud Prevention Month. News Release, last modified March 1, 2010, http://www.gnb.ca/cnb/news/sc/2010e0294sc.htm.Suche in Google Scholar

Office of Fair Trading. 2006. Research on impact ofmass marketed scams. London: Office of Fair Trading.Suche in Google Scholar

Pearce, P.L. 2011. “Tourist scams: Exploring the dimensions of an international tourism phenomenon,” 4 (2) European journal of tourism research 147–156.10.54055/ejtr.v4i2.71Suche in Google Scholar

Pyne, D. 2012. “Deterrence: Increased enforcement versus harsher penalties,” 117 (3) Economics letters 561–562.10.1016/j.econlet.2012.07.029Suche in Google Scholar

Radicati, S. and T. Buckley. 2012 Email Market, 2012–2016. Technical report, The Radicati Group, Inc. http://www.radicati.com/wp/wp-content/uploads/2012/10/Email-Market-2012-2016-Executive-Summary.pdfSuche in Google Scholar

Rothchild, J. 1998. “Making the market work: Enhancing consumer sovereignty through the telemarketing sales rule and the distance selling directive,” 21 (3) Journal of consumerpolicy 279–313.10.1023/A:1006910700138Suche in Google Scholar

Royal Canadian Mounted Police. 2010. International Day of Action Against Mass Marketing Fraud, last modified June 1, 2010, http://www.rcmp-grc.gc.ca/scams-fraudes/day-jour-eng.htm.Suche in Google Scholar

Stone-Gross, B., R. Abman, R.A. Kemmerer, C. Kruegel, D.G. Steigerwald and G. Vigna. 2013. “The underground economy of fake antivirus software,” in B. Schneier, (ed.). Economics of information security and privacy III. New York: Springer, 55–78.Suche in Google Scholar

Symantec. 2013. Appendix. In Vol 18 of Symantec Internet Security Threat Report. 71–72. Mountain View: Symantec Enterprise Security, http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_appendices_v18_2012_221284438.en-us.pdf (accessed June 18, 2015).Suche in Google Scholar

Titus, R.M., F. Heinzelmann and J.M. Boyle. 1995. “Victimization of persons by fraud,” 41 (1)Crime anddelinquency 54–72.10.1177/0011128795041001004Suche in Google Scholar

U.S. Congress. Senate. Special Committee on Aging. Old Scams–New Victims: Breaking the Cycle of Victimization: Hearing before the Special Committee on Aging. 109th Cong., 1st sess., 27 July 2005.Suche in Google Scholar

Vohs, K.D., R.F. Baumeister and J. Chin. 2007. “Feeling duped: Emotional, motivational, and cognitive aspects of being exploited by others,” 11 (2) Review of general psychology 127–141.10.1037/1089-2680.11.2.127Suche in Google Scholar

Weber, P.C., M.T. Schaper, S. Teo and L. Geneste. 2011. Small business scams: A preliminary overview and investigation. Proceedings of 56th ICSB World Conference, Jun 15 2011, pp. 1–20. Stockholm, Sweden: International Council for Small Business.Suche in Google Scholar

Wilkie, W.L., C.F. Mela and G.T. Gundlach. 1998. “Does “bait and switch” really benefit consumers?” 17 (3) Marketing science 273–282.10.1287/mksc.17.3.273Suche in Google Scholar

Published Online: 2017-2-4
Published in Print: 2017-3-1

©2017 by De Gruyter

Heruntergeladen am 2.1.2026 von https://www.degruyterbrill.com/document/doi/10.1515/rle-2015-0035/html
Button zum nach oben scrollen