Credit and Identity Theft

The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model "identity" and its use in credit transactions. Various types of identity theft occur in equilibrium, including "new account fraud," "existing account fraud," and "friendly fraud." The equilibrium incidence of identity theft represents a tradeoff between a desire to avoid costly or invasive monitoring of individuals on the one hand, and the need to control transactions fraud on the other. Our results suggest that technological advances will not eliminate this tradeoff.

[1]  Richard D. Porter,et al.  Estimating the Worldwide Volume of Counterfeit U.S. Currency: Data and Extrapolation , 2003 .

[2]  R. Posner The Federal Trade Commission , 1969 .

[3]  Exclusion and Moral Hazard: The Case of Identical Demand , 1993 .

[4]  Harry J. Paarsch,et al.  Money and Dynamic Credit Arrangements with Private Information , 2000, J. Econ. Theory.

[5]  Daniel J. Solove,et al.  Identity Theft, Privacy, and the Architecture of Vulnerability , 2003 .

[6]  Will the new $100 bill decrease counterfeiting? , 1996 .

[7]  B. Taub Currency and Credit Are Equivalent Mechanisms , 1994 .

[8]  Ricardo de O. Cavalcanti,et al.  A Model of Private Bank-Note Issue , 1999 .

[9]  William Roberds,et al.  A Theory of Transactions Privacy , 2000 .

[10]  Ping He,et al.  Money and Banking in Search Equilibrium , 2005 .

[11]  N. Kocherlakota Money is memory , 1998 .

[12]  Lynn M. LoPucki Did Privacy Cause Identity Theft? , 2003 .

[13]  Warren E. Weber,et al.  or the Federal Reserve System. , 2022 .

[14]  Peter Burns,et al.  Fraud Management in the Credit Card Industry , 2002 .

[15]  H. Varian Markets for information goods , 1998 .

[16]  Luis Araujo Social Norms and Money , 2003 .

[17]  Stephen D. Williamson,et al.  Private Money and Counterfeiting , 2002 .

[18]  Shouyong Shi,et al.  A Divisible Search Model of Fiat Money , 1997 .

[19]  BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM , 2000 .

[20]  Lynn M. LoPucki,et al.  Human Identification Theory and the Identity Theft Problem , 2001 .

[21]  N. Kiyotaki,et al.  Production and consumption , 2013 .

[22]  Klaus Kultti A monetary economy with counterfeiting , 1996 .

[23]  Dean Corbae,et al.  Decentralized credit and monetary exchange without public record keeping , 2004 .

[24]  Richard Schmalensee,et al.  Paying with Plastic: The Digital Revolution in Buying and Borrowing , 1999 .

[25]  Narayana R. Kocherlakota,et al.  Incomplete Record-Keeping and Optimal Payment Arrangements , 1998 .

[26]  R. Townsend Currency and Credit in a Private Information Economy , 1989, Journal of Political Economy.

[27]  Roger Clarke,et al.  Human Identification in Information Systems , 1994 .

[28]  Ed Nosal,et al.  A Model of (the Threat of) Counterfeiting , 2007 .

[29]  William Roberds,et al.  WORKING PAPER SERIESFEDERAL RESERVE BANK of ATLANTA WORKING PAPER SERIES Money Is Privacy , 2004 .