credit and identity theft charles m. kahn and william roberds

28
Credit and Identity Theft Charles M. Kahn and William Roberds

Upload: maribel-crago

Post on 15-Dec-2015

221 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Credit and Identity Theft Charles M. Kahn and William Roberds

Credit and Identity Theft

Charles M. Kahn

and

William Roberds

Page 2: Credit and Identity Theft Charles M. Kahn and William Roberds

Basic idea of paper

• Present theory of fraud, including ID theft, in credit transactions

• ID theft arises endogenously as a form of opportunistic behavior

• Outgrowth of Kahn, McAndrews, and Roberds (IER 2005)

Page 3: Credit and Identity Theft Charles M. Kahn and William Roberds

Fraud risk vs. credit risk

• Payments fraud has grown with the use of electronic forms of payment (FTC report: 12% victimized)

• Fraud risk quite small compared to credit risk (for credit cards, 5 BP versus 400 BP)

• Nonetheless, fraud risk a critical concern for industry

Page 4: Credit and Identity Theft Charles M. Kahn and William Roberds

Modeling identity

• Usually modeled as history of agents’ actions

• We must go further: problem is to link a particular history with individual making a current transaction

Page 5: Credit and Identity Theft Charles M. Kahn and William Roberds

Modeling identity

• Individual’s identity will be denoted by a unique (infinite) sequence of ones and zeros.

• We will describe technology for distinguishing an individual from an impersonator

Page 6: Credit and Identity Theft Charles M. Kahn and William Roberds

Modeling identity

• In his role as a producer an individual’s identity is unproblematic

• The difficulty is to link the production history with a particular attempt at consumption

Page 7: Credit and Identity Theft Charles M. Kahn and William Roberds

The framework

• N agents, infinitely lived, risk neutral, with common discount factor

• Each agent identified with a “location” where he can produce a unique, specialized, non-storable good at a cost s

Page 8: Credit and Identity Theft Charles M. Kahn and William Roberds

The framework

• Each period one agent wakes up “hungry” for the good of a particular producer

• Consumption of that good by that agent provides him utility u; any other consumption in the period gives the consumer 0 utility

Page 9: Credit and Identity Theft Charles M. Kahn and William Roberds

The framework

• Note: no double coincidence of wants

• Therefore no possibility of barter (if s > 0)

• Some arrangement needed for intertemporal trade

Page 10: Credit and Identity Theft Charles M. Kahn and William Roberds

The framework

• The value of u is common to all agents.

• The value of s is distributed in the population with distribution F

0< F(u) <1

• A producer’s value of s (his “type”) is unchanging over time, and is private information to the producer

Page 11: Credit and Identity Theft Charles M. Kahn and William Roberds

The framework

• The hungry agent can travel to the location of his preferred supplier

• The hungry agent’s own location is not automatically revealed

• Refusal to supply a good is observable

Page 12: Credit and Identity Theft Charles M. Kahn and William Roberds

Timing

• At time 0, agents learn their own costs, and have the opportunity to form club (binding commitment)

• Agents in club receive goods from club members, but must supply goods to other club members

• denotes fraction of population in club

Page 13: Credit and Identity Theft Charles M. Kahn and William Roberds

Enforcement

• Agreements can be enforced by court: assume has power to punish one individual up to an amount X (large), provided he can be identified

• Thus “fraud risk” but no “credit risk”

Page 14: Credit and Identity Theft Charles M. Kahn and William Roberds

Events within a period

1. Hungry agent and supplier randomly chosen

2. Hungry agent journeys to supplier’s location

3. Hungry agent’s identity is verified

4. If verification successful, trade occurs

Page 15: Credit and Identity Theft Charles M. Kahn and William Roberds

Baseline: costless identification

Result: Provided X > u, all individuals with s < u join club (club size F(u) )

• A member’s expected utility is

V(s) = –1 (u – s)

• Constrained efficient (cross-subsidy not allowed)

Page 16: Credit and Identity Theft Charles M. Kahn and William Roberds

Verification technology

• Examine a sample of n bits of individual’s identity at cost k per bit sampled

• No type I error; probability of a false match of zn

• Optimal sampling increases with s and falls with k, z, or

Page 17: Credit and Identity Theft Charles M. Kahn and William Roberds

Equilibrium

• Find the cutoff level of supply cost for membership such that – all members join voluntarily and are willing to

supply – each chooses his preferred monitoring sample – all non-members prefer to remain outside the

club (and attempt impersonation)

Page 18: Credit and Identity Theft Charles M. Kahn and William Roberds

Credit club equilibrium

Result: If X > u

For small k, equilibria exist with F(u).

As k shrinks, approachesF(u).

Page 19: Credit and Identity Theft Charles M. Kahn and William Roberds

Credit card technology

• The credit card is a manufactured “pseudo-identity”: a string of bits, verifiable at lower cost than the identity itself.

• The credit card club makes an initial check of identity, then issues the member a card

• Subsequent suppliers verify the card rather than the person.

Page 20: Credit and Identity Theft Charles M. Kahn and William Roberds

Equilibrium

Analogous definition: Agents voluntarily choose between:

• joining the club (being monitored initially, and supplying to all card holders after monitoring their cards)

• not joining (not supplying, instead attempting credit card fraud)

Page 21: Credit and Identity Theft Charles M. Kahn and William Roberds

Types of fraud

• Thus either the card or the person can be imitated: “existing account” vs. “new account” fraud

Page 22: Credit and Identity Theft Charles M. Kahn and William Roberds

Key result

• Equilibrium with credit cards exists under same conditions as before, and dominates equilibrium with independent verification of buyers

Page 23: Credit and Identity Theft Charles M. Kahn and William Roberds

Benefits of card arrangement

• Cards allow club members to share information gleaned in initial screening

• More intense verification possible; more frauds are excluded

• Size of club expands; high cost producers induced to join club

Page 24: Credit and Identity Theft Charles M. Kahn and William Roberds

Costs of card arrangement

• Shared information info on buyer IDs may be incorrect, leading to– New account fraud– Existing account fraud

Page 25: Credit and Identity Theft Charles M. Kahn and William Roberds

Policy implications

• Popular notion is sometimes advanced that more sophisticated cards can “solve the problem” of ID theft—

• But more sophisticated cards may actually contribute to the problem by making credit card payment more prevalent, increasing incentives for fraud.

Page 26: Credit and Identity Theft Charles M. Kahn and William Roberds

Policy implications

• Proposed privacy legislation may also fail to curb ID theft—

• By constraining ID samples, such legislation may encourage new account fraud (“impersonation” in the model)

Page 27: Credit and Identity Theft Charles M. Kahn and William Roberds

Policy implications

Key policy tradeoff

• Gathering & sharing more information on buyers leads to better allocation of credit, but

• Amassing such data necessarily entails private & social costs (loss of privacy)

Page 28: Credit and Identity Theft Charles M. Kahn and William Roberds

Key ideas of paper

• Credit-based transactions systems are systems for efficiently sharing information among sellers (esp. ID of buyers)

• ID theft a problem because it exploits exactly this source of efficiency

• Transactions systems must balance costs of fraud against costs (private & social) of ID verification