Home Business & Economics The Economics of Scams
Article
Licensed
Unlicensed Requires Authentication

The Economics of Scams

  • Stan Miles and Derek Pyne ORCID logo EMAIL logo
Published/Copyright: February 4, 2017
Become an author with De Gruyter Brill

Abstract

This paper offers one of the first economic analyses of scams. Its major finding is that, unlike other crimes, imperfect enforcement may increase victimization by deterring only low-ability scammers whose failed attempts would otherwise alert potential victims before encounters with high-ability scammers. High-ability scammers may actually benefit from partial enforcement, which reduces their competition. These results may be reinforced when failed attempts are punished.

JEL Classification: K42

Acknowledgments

This paper benefited from the comments of Cliff Henson, Georgia Martin, Katarina Mayer, Murat Mungan, Lijun Zhang, two anonymous referees and participants at the 48th Canadian Economic Association Conference.

Appendix

Proof of Lemma 1, part (b):

  1. With the substitutions R=nL+nHR=nL+nH and x=1aTx=1aT, eq. [2] can be rewritten as oA=TaR(1xR)oA=TaR(1xR). Thus

[17]oAR=Ta{1R[(xR)ln(x)]+(1xR)(1R2)}=Ta{xR[1Rln(x)]1R2}

Since TaR2>0TaR2>0, it suffices to show that xR[1Rln(x)]1<0xR[1Rln(x)]1<0.

Define the function g(u)=u(1lnu)1g(u)=u(1lnu)1 on the set of all real numbers u such that 0<u10<u1. Then g(u)=u(1/u)+(1lnu)(1)=1+1lnu=lnug(u)=u(1/u)+(1lnu)(1)=1+1lnu=lnu for all u in the domain of g. Note that g(u)>0g(u)>0 for all u in the open interval (0, 1), which implies that g is strictly increasing on that interval. Also, g(1)=0g(1)=0. Since g is continuous on the half-open interval (0, 1], this implies that g(u)<0g(u)<0 for all u in the open interval (0, 1).

Setting u to xRxR and using the fact that Rlnx=ln(xR)Rlnx=ln(xR), we obtain xR[1Rln(x)]1<0xR[1Rln(x)]1<0.

References

Andreoni, J. 1991. “Reasonable doubt and the optimal magnitude of fines: Should the penalty fit the crime?” 22 Rand journal ofeconomics 385–395.10.2307/2601054Search in Google Scholar

Andreozzi, L. 2004. “Rewarding policemen increases crime: Another surprising result from the inspection game,” 12 Public choice 69–82.10.1007/s11127-004-6166-xSearch in Google Scholar

Becker, G.S. 1968. “Crime and punishment: An economic approach,” 76 (2) Journal of political economy 169–217.10.1007/978-1-349-62853-7_2Search in Google Scholar

Buchanan, J.M. 1973. “A defense of organized crime?” in S. Rottenberg, ed. The economics of crime and punishment. Washington, DC: American Enterprise Institute, 119–132.Search in Google Scholar

Daniel, K. and J.R. Lott. 1995. “Should criminal penalties include third-party avoidance costs?” 6 The journal of legal studies 523–534.10.1086/467967Search in Google Scholar

Deevy, M., S. Lucich and M. Beals, 2012. Scams, schemes, and swindles: A review of consumer financial fraud research. Stanford Financial Fraud Research Center Working Paper.Search in Google Scholar

Deutsch, J., S. Hakim and U. Spiegel. 1990. “The effects of criminal experience on the incidence of crime,” 49 (1) American journal of economics andsociology 1–5.10.1111/j.1536-7150.1990.tb02252.xSearch in Google Scholar

Feess, E. and A. Wohlschlegel. 2009. “Why higher punishment May reduce deterrence,” 104 Economics letters 69–71.10.1016/j.econlet.2009.04.003Search in Google Scholar

Friedman, M. 1998. “Coping with consumer fraud: The need for a paradigm shift,” 32 (1) Journal of consumeraffairs 1–12.10.1111/j.1745-6606.1998.tb00397.xSearch in Google Scholar

Friehe, T. 2013. “Tempting righteous citizens? counterintuitive effects of increasing sanctions in the realm of organized crime,” 44 The journal of socio-economics 37–40.10.1016/j.socec.2013.02.016Search in Google Scholar

Garoupa, N. and M. Jellal. 2004. “Dynamic law enforcement with learning,” 20 (1) Journal of law, economics, andorganization 192–206.Search in Google Scholar

Guha, B. 2012. “Pirates and fishermen: Is less patrolling always bad?” 81 (1) Journal of economic behavior and organization 29–38.10.1016/j.jebo.2011.09.012Search in Google Scholar

Herley, C. 2012. Why Do Nigerian Scammers Say They Are From Nigeria? Paper presented at the 11th Annual Workshop on the Economics of Information Security.Search in Google Scholar

Hogan, S. and L. Meriluoto. 2011. “On the probability of winning a lottery with a random number of competitors,” 18 Applied economics letters 1765–1768.10.1080/13504851.2011.562158Search in Google Scholar

Langenderfer, J. and T.A. Shimp. 2001. “Consumer vulnerability to scams, swindles, and fraud: A new theory of visceral influences on persuasion,” 18 (7) Psychology and marketing 763–783.10.1002/mar.1029Search in Google Scholar

Langton, L. M. Berzofsky, C. Krebs, and H. Smiley-McDonald, (eds.). 2012. National crime victimization survey: Victimizations not reported to the police, 2006–2010. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.Search in Google Scholar

Lee, J. and H. Soberon-Ferrer. 1997. “Consumer vulnerability to fraud: Influencing factors,” 31 (1) The journal of consumeraffairs 70–89.10.1111/j.1745-6606.1997.tb00827.xSearch in Google Scholar

Leff, G. “Common tourist scams and how to avoid them.” View from the Wing (blog). January 6, 2013. http://boardingarea.com/viewfromthewing/2013/01/06/common-tourist-scams-and-how-to-avoid-them/.Search in Google Scholar

Lott, J.R. 1996. “The level of optimal fines to prevent fraud when reputations exist and penalty clauses are unenforceable,” 17 (4) Managerial and decision economics 363–380.10.1002/(SICI)1099-1468(199607)17:4<363::AID-MDE768>3.0.CO;2-3Search in Google Scholar

Meares, T.L., N. Katyal and D.M. Kahan. 2004. “Updating the study of punishment,” 56 Stanford law review 1171–1210.Search in Google Scholar

Merriam-Webster. 2014. Scam. Merriam-Webster.com. http://www.merriam-webster.com/dictionary/scam. (accessed January 3, 2014).Search in Google Scholar

Miles, S. and D. Pyne. 2015. “Deterring repeat offenders with escalating penalty schedules: A bayesian approach,” 16 (3) Economics ofgovernance 229–250.10.1007/s10101-015-0160-2Search in Google Scholar

Mungan, M.C. 2010. “Repeat offenders: If they learn, we punish them more severely,” 30 (2)International review of law and economics 173–177.10.1016/j.irle.2009.11.002Search in Google Scholar

Mungan, M.C. 2015a. “Wrongful convictions and the punishment of attempts,” 42 (1)International review of law and economics 79–87.10.1016/j.irle.2015.01.001Search in Google Scholar

Mungan, M.C. 2015b. “Abandoned criminal attempts: An economic analysis,” 67 (1)Alabama law review 1–43.Search in Google Scholar

New Brunswick Securities Commission. 2010. March is Fraud Prevention Month. News Release, last modified March 1, 2010, http://www.gnb.ca/cnb/news/sc/2010e0294sc.htm.Search in Google Scholar

Office of Fair Trading. 2006. Research on impact ofmass marketed scams. London: Office of Fair Trading.Search in Google Scholar

Pearce, P.L. 2011. “Tourist scams: Exploring the dimensions of an international tourism phenomenon,” 4 (2) European journal of tourism research 147–156.10.54055/ejtr.v4i2.71Search in Google Scholar

Pyne, D. 2012. “Deterrence: Increased enforcement versus harsher penalties,” 117 (3) Economics letters 561–562.10.1016/j.econlet.2012.07.029Search in Google Scholar

Radicati, S. and T. Buckley. 2012 Email Market, 2012–2016. Technical report, The Radicati Group, Inc. http://www.radicati.com/wp/wp-content/uploads/2012/10/Email-Market-2012-2016-Executive-Summary.pdfSearch in Google Scholar

Rothchild, J. 1998. “Making the market work: Enhancing consumer sovereignty through the telemarketing sales rule and the distance selling directive,” 21 (3) Journal of consumerpolicy 279–313.10.1023/A:1006910700138Search in Google Scholar

Royal Canadian Mounted Police. 2010. International Day of Action Against Mass Marketing Fraud, last modified June 1, 2010, http://www.rcmp-grc.gc.ca/scams-fraudes/day-jour-eng.htm.Search in Google Scholar

Stone-Gross, B., R. Abman, R.A. Kemmerer, C. Kruegel, D.G. Steigerwald and G. Vigna. 2013. “The underground economy of fake antivirus software,” in B. Schneier, (ed.). Economics of information security and privacy III. New York: Springer, 55–78.Search in Google Scholar

Symantec. 2013. Appendix. In Vol 18 of Symantec Internet Security Threat Report. 71–72. Mountain View: Symantec Enterprise Security, http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_appendices_v18_2012_221284438.en-us.pdf (accessed June 18, 2015).Search in Google Scholar

Titus, R.M., F. Heinzelmann and J.M. Boyle. 1995. “Victimization of persons by fraud,” 41 (1)Crime anddelinquency 54–72.10.1177/0011128795041001004Search in Google Scholar

U.S. Congress. Senate. Special Committee on Aging. Old Scams–New Victims: Breaking the Cycle of Victimization: Hearing before the Special Committee on Aging. 109th Cong., 1st sess., 27 July 2005.Search in Google Scholar

Vohs, K.D., R.F. Baumeister and J. Chin. 2007. “Feeling duped: Emotional, motivational, and cognitive aspects of being exploited by others,” 11 (2) Review of general psychology 127–141.10.1037/1089-2680.11.2.127Search in Google Scholar

Weber, P.C., M.T. Schaper, S. Teo and L. Geneste. 2011. Small business scams: A preliminary overview and investigation. Proceedings of 56th ICSB World Conference, Jun 15 2011, pp. 1–20. Stockholm, Sweden: International Council for Small Business.Search in Google Scholar

Wilkie, W.L., C.F. Mela and G.T. Gundlach. 1998. “Does “bait and switch” really benefit consumers?” 17 (3) Marketing science 273–282.10.1287/mksc.17.3.273Search in Google Scholar

Published Online: 2017-2-4
Published in Print: 2017-3-1

©2017 by De Gruyter

Downloaded on 31.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/rle-2015-0035/html
Scroll to top button