Credit and Identity Theft
The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we provide a model of â€œidentityâ€ and its use in credit transactions. In the environments we construct, various types of identity theft occur in equilibrium, including â€œnew account fraud,â€ â€œexisting account fraud,â€ and â€œfriendly fraud.â€ In the model, the equilibrium incidence of identity theft arises from a tradeoff between a desire to avoid costly or invasive monitoring of individuals on the one hand, and the need to control transactions fraud on the other. Our results suggest that technological advances will not eliminate this tradeoff. Section 2 of the paper makes use of the search-theoretic model developed in Kahn, McAndrews, and Roberds (2005). It illustrates how identity theft is a consequence of information-sharing among sellers, via instruments that amount to artificial â€œquasi-identities,â€ e.g., credit cards. While such information-sharing reduces the cost and equilibrium incidence of transactions fraud, it can also facilitate the propagation of fraud across different sellers, i.e., what is commonly known as identity theft. Nonetheless, as the costs of information sharing fall, such arrangements will generally dominate. Section 3 considers two offshoots of the basic model. In the first variation, money is introduced as a sort of card that is not tied to anyoneâ€™s identity. Under suitable conditions, the simultaneous use of money and credit can improve welfare relative to the use of credit alone. This occurs because money allows for transactions to occur where identity verification would be too costly. The second variation allows for the possibility of â€œfriendly fraudâ€ (fraudulently claiming fraud) and shows how information-sharing arrangements can be robust to this type of fraud risk. In sum, this paper illustrates how identity theft and related types of transactions fraud may be incorporated into modern theories of money and credit. Our methodology for investigating identity theft is a general one, whose application is not necessarily tied to any single approach.
To our knowledge, this item is not available for
download. To find whether it is available, there are three
1. Check below under "Related research" whether another version of this item is available online.
2. Check on the provider's web page whether it is in fact available.
3. Perform a search for a similarly titled item that would be available.
|Date of creation:||03 Dec 2006|
|Contact details of provider:|| Postal: Society for Economic Dynamics Marina Azzimonti Department of Economics Stonybrook University 10 Nicolls Road Stonybrook NY 11790 USA|
Web page: http://www.EconomicDynamics.org/
More information through EDIRC
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Charles M. Kahn & James McAndrews & William Roberds, 2005.
"Money Is Privacy,"
International Economic Review,
Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 46(2), pages 377-399, 05.
- Charles Kahn & James McAndrews & William Roberds, 2001.
"A Theory of Transactions Privacy,"
Center for Financial Institutions Working Papers
01-12, Wharton School Center for Financial Institutions, University of Pennsylvania.
- Edward J. Green & Warren E. Weber, 1996.
"Will the new $100 bill decrease counterfeiting?,"
Federal Reserve Bank of Minneapolis, issue Sum, pages 3-10.
- Charles M. Kahn & William Roberds, 2005.
"Credit and identity theft,"
FRB Atlanta Working Paper
2005-19, Federal Reserve Bank of Atlanta.
- Nosal, Ed & Wallace, Neil, 2007.
"A model of (the threat of) counterfeiting,"
Journal of Monetary Economics,
Elsevier, vol. 54(4), pages 994-1001, May.
- S. Rao Aiyagari & Stephen D. Williamson, 1998.
"Money and Dynamic Credit Arrangements with Private Information,"
Game Theory and Information
- Aiyagari, S. Rao & Williamson, Stephen D., 2000. "Money and Dynamic Credit Arrangements with Private Information," Journal of Economic Theory, Elsevier, vol. 91(2), pages 248-279, April.
- S. Rao Aiyagari & Stephen D. Williamson, 1998. "Money and dynamic credit arrangements with private information," Working Paper 9807, Federal Reserve Bank of Cleveland.
- Aiyagari, S. Rao & Williamson, Stephen, 1997. "Money and Dynamic Credit Arrangements with Private Information," Working Papers 97-19, University of Iowa, Department of Economics.
- Ricardo de O. Cavalcanti & Neil Wallace, 1999. "A model of private bank-note issue," Review of Economic Dynamics, Elsevier for the Society for Economic Dynamics, vol. 2(1), pages 104-136, January.
- Dean Corbae & Joseph Ritter, 2004. "Decentralized credit and monetary exchange without public record keeping," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 24(4), pages 933-951, November.
- Taub, Bart, 1994. "Currency and Credit Are Equivalent Mechanisms," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 35(4), pages 921-956, November.
- Kocherlakota, Narayana R., 1998.
"Money Is Memory,"
Journal of Economic Theory,
Elsevier, vol. 81(2), pages 232-251, August.
- Klaus Kultti, 1996. "A monetary economy with counterfeiting," Journal of Economics, Springer, vol. 63(2), pages 175-186, June.
- Kiyotaki, Nobuhiro & Wright, Randall, 1989. "On Money as a Medium of Exchange," Journal of Political Economy, University of Chicago Press, vol. 97(4), pages 927-954, August.
- Ping He & Lixin Huang & Randall Wright, 2005. "Money And Banking In Search Equilibrium," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 46(2), pages 637-670, 05.
- Antoine Martin & Michael Orlando & David Skeie, 2006.
"Payments network in a search model of money,"
2006 Meeting Papers
580, Society for Economic Dynamics.
- Kocherlakota, Narayana & Wallace, Neil, 1998. "Incomplete Record-Keeping and Optimal Payment Arrangements," Journal of Economic Theory, Elsevier, vol. 81(2), pages 272-289, August.
- Townsend, Robert M, 1989. "Currency and Credit in a Private Information Economy," Journal of Political Economy, University of Chicago Press, vol. 97(6), pages 1323-1344, December.
- Araujo, Luis, 2004. "Social norms and money," Journal of Monetary Economics, Elsevier, vol. 51(2), pages 241-256, March.
- Lee McIntyre, 2000. "Making money keeps getting easier," Regional Review, Federal Reserve Bank of Boston, issue Q2, pages 18-24.
- Silva, Emilson C. D. & Kahn, Charles M., 1993. "Exclusion and moral hazard : The case of identical demand," Journal of Public Economics, Elsevier, vol. 52(2), pages 217-235, September.
- Peter Burns & Anne Stanley, 2002. "Fraud management in the credit card industry," Payment Cards Center Discussion Paper 02-05, Federal Reserve Bank of Philadelphia.
- Monnet, Cyril, 2005. "Counterfeiting and inflation," Working Paper Series 0512, European Central Bank.
When requesting a correction, please mention this item's handle: RePEc:red:sed006:34. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Christian Zimmermann)
If references are entirely missing, you can add them using this form.