SlideShare a Scribd company logo
1 of 18
Download to read offline
Corruption, Intimidation and Whistleblowing
Sylvain Chassang
joint w. Gerard Padró i Miquel
Motivation
Can we use reports from informed parties (monitor) to
target corrupt agents more efficiently?
Difficulty
In many environments, few competent parties able to
inform on corruption
Anonymous phone lines provide no real anonymity
Principal’s use of information becomes signal which lets
the agent discipline monitor
Take-away
Effective policy must garble the information content of the
monitor’s messages
How much and how?
The Model
Players and Actions
1. Single agent, corrupt or not, c ∈ {0, 1}
2. Single monitor, observes c, reports m = 1 (corrupt), m = 0
(not corrupt)
3. E.g. pair of cops, judge and clerk, boss and subordinate,
firm and accountant
4. Following message m, principal triggers intervention
i ∈ {0, 1} with probability σm ∈ [0, 1]; σ = (σ0, σ1) policy
dimension of interest
5. Agent retaliates at level r ≥ 0
Timing and commitment
1. Principal commits to intervention policy (σ0, σ1)
2. Agent commits to a retaliation policy r as a function of
observables (intervention + possible leaks)
The Model – Payoffs
Reduced-form consequences of intervention
uA = c × πA + i × vA(c) − kA(r)
uM = c × πM + i × vM(c, m) − r
uP = c × πP + i × vP
Assumption 1.
πA ≥ 0, vA ≤ 0
vM(c, m = c) ≥ vM(c, m = c)
πP < 0, vP < 0
Allows for malicious monitors
(benefit from intervention against honest agent)
The Model – Information
Leaks
conditional on intervention i = 1, outcome z ∼ f(z|m, c)
(i, z) observed by the agent
revelation principle does not hold
Arbitrary incomplete information
Agent doesn’t know monitor’s preferences vM, belief ΦA
Principal has incomplete information over types
(vM, πA, vA, kA, ΦA)
bounded support for payoffs
Exogenous vs Endogenous Information
Proposition 1 (basic trade-off).
(i) Assume messages exogenously informative, i.e. m(c) = c
If optimal policy = 0, then σ0 = 0 and σ1 > 0
(ii) Assume messages endogenous
∃λ > 0 st whenever σ1/σ0 ≥ λ
the agent is corrupt and commits to retaliate
the monitor sends message m = 0
Intuition
intervention has informative content
responsive intervention makes it easy for agent to
incentivize the monitor
should worry about silent corruption
Example: UK Accounting Authority
Financial Reporting Review Panel
Investigates records of public companies
Uses tips from competent informants
Likely whistleblower: auditing firm
Policy Change
1999–2004, purely reactive
2005–2010, proactive
Example: UK Accounting Authority
Example: UK Accounting Authority
Example: UK Accounting Authority
Example: UK Accounting Authority
Inference from Unverifiable Messages
monitor has type τM = vM
agent type τA = (πA, vA, kA, ΦA) (where ΦA belief over τM)
true distribution µT over types τ = (τM, τA) ∈ T
unknown to principal
Intervention and retaliation policies induce message profile
m : τM → ∆ ({0, 1})
Two Properties
Proposition 2.
Given corruption decision c, message profile m(·) constant
along ray {(σ0, σ1)|σ1 = λσ0}
Proposition 3.
(i) The set of profiles (σ0, σ1) such that a given agent is
corrupt is star-shaped around 0
(ii) Fix λ = σ1
σ0
. The mass of corrupt agents τA
cσ(τA)dµT (τA)
is decreasing in σ0
Graphically
0 1
0
1
σ0
σ1
45o
c=1
c=0
Graphically
0 1
0
1
σ0
σ1
45o
Inference – Single Policy
Proposition 4 (no inference).
Single policy experiment puts no restrictions on corruption
For any distribution of reports at a single policy σ, range of
consistent corruption rates is [0, 1].
Take policy σ and distribution µT yielding report
T
m∗
(σ, τ)dµT (τ)
We have that
TA
c∗(σ, τA)dµT (τA)
µT s.t T m∗(σ, τ)dµT (τ) = T m∗(σ, τ)dµT (τ) = [0, 1]
Inference – Two Policies
Benchmark policy (σB
0 , σB
1 ); New policy (σN
0 , σN
1 )
σO
0 < σN
0 and
σO
1
σO
0
=
σN
1
σN
0
Proposition 5 (bounds).
T
[1 − cN
(τ)]dµT (τ) ≥
T
mN
(τ)dµT (τ) −
T
mO
(τ)dµT (τ)
#honest agents at new policy ≥ drop in reported corruption
T
cO
(τ)dµT (τ) ≥
T
mN
(τ)dµT (τ) −
T
mO
(τ)dµT (τ)
#corrupt agents at old policy ≥ drop in reported corruption
Take-Away
In many environments no herd-anonymity, need to provide
anonymity through garbled response
Can be implemented through noisy surveys – related, but
quite distinct from randomized response surveys
Rule of thumb
first provide sufficient anonymity that people are willing to
complain
then scale up enforcement

More Related Content

Similar to Corruption, Intimidation and Whistleblowing

This project will investigate the SIR model and use numeric methods t.pdf
 This project will investigate the SIR model and use numeric methods t.pdf This project will investigate the SIR model and use numeric methods t.pdf
This project will investigate the SIR model and use numeric methods t.pdf
jkcs20004
 
presentation
presentationpresentation
presentation
3ashmawy
 

Similar to Corruption, Intimidation and Whistleblowing (12)

Criticism on Li's Copula Approach
Criticism on Li's Copula ApproachCriticism on Li's Copula Approach
Criticism on Li's Copula Approach
 
Inference via Bayesian Synthetic Likelihoods for a Mixed-Effects SDE Model of...
Inference via Bayesian Synthetic Likelihoods for a Mixed-Effects SDE Model of...Inference via Bayesian Synthetic Likelihoods for a Mixed-Effects SDE Model of...
Inference via Bayesian Synthetic Likelihoods for a Mixed-Effects SDE Model of...
 
Temporal network epidemiology: Subtleties and algorithms
Temporal network epidemiology: Subtleties and algorithmsTemporal network epidemiology: Subtleties and algorithms
Temporal network epidemiology: Subtleties and algorithms
 
Machine Learning for Epidemiological Models (Enrico Meloni)
Machine Learning for Epidemiological Models (Enrico Meloni)Machine Learning for Epidemiological Models (Enrico Meloni)
Machine Learning for Epidemiological Models (Enrico Meloni)
 
This project will investigate the SIR model and use numeric methods t.pdf
 This project will investigate the SIR model and use numeric methods t.pdf This project will investigate the SIR model and use numeric methods t.pdf
This project will investigate the SIR model and use numeric methods t.pdf
 
#2ECcourse.ppthjjkhkjhkjhjkjhkhhkhkhkhkj
#2ECcourse.ppthjjkhkjhkjhjkjhkhhkhkhkhkj#2ECcourse.ppthjjkhkjhkjhjkjhkhhkhkhkhkj
#2ECcourse.ppthjjkhkjhkjhjkjhkhhkhkhkhkj
 
#2ECcourse.pptgjdgjgfjgfjhkhkjkkjhkhkhkjhjkj
#2ECcourse.pptgjdgjgfjgfjhkhkjkkjhkhkhkjhjkj#2ECcourse.pptgjdgjgfjgfjhkhkjkkjhkhkhkjhjkj
#2ECcourse.pptgjdgjgfjgfjhkhkjkkjhkhkhkjhjkj
 
MAXENTROPIC APPROACH TO DECOMPOUND AGGREGATE RISK LOSSES
MAXENTROPIC APPROACH TO DECOMPOUND AGGREGATE RISK LOSSESMAXENTROPIC APPROACH TO DECOMPOUND AGGREGATE RISK LOSSES
MAXENTROPIC APPROACH TO DECOMPOUND AGGREGATE RISK LOSSES
 
Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud Detection
 
Robust Optimal Reinsurance and Investment Problem with p-Thinning Dependent a...
Robust Optimal Reinsurance and Investment Problem with p-Thinning Dependent a...Robust Optimal Reinsurance and Investment Problem with p-Thinning Dependent a...
Robust Optimal Reinsurance and Investment Problem with p-Thinning Dependent a...
 
Counterfactual Learning for Recommendation
Counterfactual Learning for RecommendationCounterfactual Learning for Recommendation
Counterfactual Learning for Recommendation
 
presentation
presentationpresentation
presentation
 

More from Stockholm Institute of Transition Economics

More from Stockholm Institute of Transition Economics (20)

IT sector development fading | Belarus Conference in Stockholm
IT sector development fading | Belarus Conference in StockholmIT sector development fading | Belarus Conference in Stockholm
IT sector development fading | Belarus Conference in Stockholm
 
Corisk Sanctions of Russia | Belarus Conference in Stockholm
Corisk Sanctions of Russia | Belarus Conference in StockholmCorisk Sanctions of Russia | Belarus Conference in Stockholm
Corisk Sanctions of Russia | Belarus Conference in Stockholm
 
Selected Economic Effects of Sanctions | Belarus Conference in Stockholm
Selected Economic Effects of Sanctions | Belarus Conference in StockholmSelected Economic Effects of Sanctions | Belarus Conference in Stockholm
Selected Economic Effects of Sanctions | Belarus Conference in Stockholm
 
Belarusian Economy 2024 | Conference in Stockholm
Belarusian Economy 2024 | Conference in StockholmBelarusian Economy 2024 | Conference in Stockholm
Belarusian Economy 2024 | Conference in Stockholm
 
Tracking sanctions compliance | SITE 2023 Development Day conference
Tracking sanctions compliance | SITE 2023 Development Day conferenceTracking sanctions compliance | SITE 2023 Development Day conference
Tracking sanctions compliance | SITE 2023 Development Day conference
 
War and Trade in Eurasia | SITE 2023 Development Day conference
War and Trade in Eurasia | SITE 2023 Development Day conferenceWar and Trade in Eurasia | SITE 2023 Development Day conference
War and Trade in Eurasia | SITE 2023 Development Day conference
 
Reducing the Russian Economic Capacity and support Ukraine
Reducing the Russian Economic Capacity and support UkraineReducing the Russian Economic Capacity and support Ukraine
Reducing the Russian Economic Capacity and support Ukraine
 
Energy sanctions - What else can be done?
Energy sanctions - What else can be done?Energy sanctions - What else can be done?
Energy sanctions - What else can be done?
 
How should policy be designed during energy-economic warfare?
How should policy be designed during energy-economic warfare?How should policy be designed during energy-economic warfare?
How should policy be designed during energy-economic warfare?
 
The impact of the war on Russia’s fossil fuel earnings
The impact of the war on Russia’s fossil fuel earningsThe impact of the war on Russia’s fossil fuel earnings
The impact of the war on Russia’s fossil fuel earnings
 
The Russia sanctions as a human rights instrument: Violations of export contr...
The Russia sanctions as a human rights instrument: Violations of export contr...The Russia sanctions as a human rights instrument: Violations of export contr...
The Russia sanctions as a human rights instrument: Violations of export contr...
 
SITE 2022 Development Day conference program
SITE 2022 Development Day conference programSITE 2022 Development Day conference program
SITE 2022 Development Day conference program
 
SITE 2022 Development Day conference | Program
SITE 2022 Development Day conference | ProgramSITE 2022 Development Day conference | Program
SITE 2022 Development Day conference | Program
 
Program | SITE 2022 Development Day conference
Program | SITE 2022 Development Day conferenceProgram | SITE 2022 Development Day conference
Program | SITE 2022 Development Day conference
 
Ce^2 Conference 2022 Programme
Ce^2 Conference 2022 ProgrammeCe^2 Conference 2022 Programme
Ce^2 Conference 2022 Programme
 
Ce2 Worksop & Conference 2022 Program
Ce2 Worksop & Conference 2022 ProgramCe2 Worksop & Conference 2022 Program
Ce2 Worksop & Conference 2022 Program
 
Ce^2 Conference 2022 Program
Ce^2 Conference 2022 ProgramCe^2 Conference 2022 Program
Ce^2 Conference 2022 Program
 
(Ce)2 Workshop program (preliminary)
(Ce)2 Workshop program (preliminary)(Ce)2 Workshop program (preliminary)
(Ce)2 Workshop program (preliminary)
 
Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...
Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...
Unemployment and Intra-Household Dynamics: the Effect of Male Job Loss on Int...
 
Football, Alcohol and Domestic Abuse
Football, Alcohol and Domestic AbuseFootball, Alcohol and Domestic Abuse
Football, Alcohol and Domestic Abuse
 

Recently uploaded

20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
Adnet Communications
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort : 9352852248 Make on-demand Arrangements Near yOU
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
dipikadinghjn ( Why You Choose Us? ) Escorts
 

Recently uploaded (20)

Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 

Corruption, Intimidation and Whistleblowing

  • 1. Corruption, Intimidation and Whistleblowing Sylvain Chassang joint w. Gerard Padró i Miquel
  • 2. Motivation Can we use reports from informed parties (monitor) to target corrupt agents more efficiently? Difficulty In many environments, few competent parties able to inform on corruption Anonymous phone lines provide no real anonymity Principal’s use of information becomes signal which lets the agent discipline monitor Take-away Effective policy must garble the information content of the monitor’s messages How much and how?
  • 3. The Model Players and Actions 1. Single agent, corrupt or not, c ∈ {0, 1} 2. Single monitor, observes c, reports m = 1 (corrupt), m = 0 (not corrupt) 3. E.g. pair of cops, judge and clerk, boss and subordinate, firm and accountant 4. Following message m, principal triggers intervention i ∈ {0, 1} with probability σm ∈ [0, 1]; σ = (σ0, σ1) policy dimension of interest 5. Agent retaliates at level r ≥ 0 Timing and commitment 1. Principal commits to intervention policy (σ0, σ1) 2. Agent commits to a retaliation policy r as a function of observables (intervention + possible leaks)
  • 4. The Model – Payoffs Reduced-form consequences of intervention uA = c × πA + i × vA(c) − kA(r) uM = c × πM + i × vM(c, m) − r uP = c × πP + i × vP Assumption 1. πA ≥ 0, vA ≤ 0 vM(c, m = c) ≥ vM(c, m = c) πP < 0, vP < 0 Allows for malicious monitors (benefit from intervention against honest agent)
  • 5. The Model – Information Leaks conditional on intervention i = 1, outcome z ∼ f(z|m, c) (i, z) observed by the agent revelation principle does not hold Arbitrary incomplete information Agent doesn’t know monitor’s preferences vM, belief ΦA Principal has incomplete information over types (vM, πA, vA, kA, ΦA) bounded support for payoffs
  • 6. Exogenous vs Endogenous Information Proposition 1 (basic trade-off). (i) Assume messages exogenously informative, i.e. m(c) = c If optimal policy = 0, then σ0 = 0 and σ1 > 0 (ii) Assume messages endogenous ∃λ > 0 st whenever σ1/σ0 ≥ λ the agent is corrupt and commits to retaliate the monitor sends message m = 0 Intuition intervention has informative content responsive intervention makes it easy for agent to incentivize the monitor should worry about silent corruption
  • 7. Example: UK Accounting Authority Financial Reporting Review Panel Investigates records of public companies Uses tips from competent informants Likely whistleblower: auditing firm Policy Change 1999–2004, purely reactive 2005–2010, proactive
  • 12. Inference from Unverifiable Messages monitor has type τM = vM agent type τA = (πA, vA, kA, ΦA) (where ΦA belief over τM) true distribution µT over types τ = (τM, τA) ∈ T unknown to principal Intervention and retaliation policies induce message profile m : τM → ∆ ({0, 1})
  • 13. Two Properties Proposition 2. Given corruption decision c, message profile m(·) constant along ray {(σ0, σ1)|σ1 = λσ0} Proposition 3. (i) The set of profiles (σ0, σ1) such that a given agent is corrupt is star-shaped around 0 (ii) Fix λ = σ1 σ0 . The mass of corrupt agents τA cσ(τA)dµT (τA) is decreasing in σ0
  • 16. Inference – Single Policy Proposition 4 (no inference). Single policy experiment puts no restrictions on corruption For any distribution of reports at a single policy σ, range of consistent corruption rates is [0, 1]. Take policy σ and distribution µT yielding report T m∗ (σ, τ)dµT (τ) We have that TA c∗(σ, τA)dµT (τA) µT s.t T m∗(σ, τ)dµT (τ) = T m∗(σ, τ)dµT (τ) = [0, 1]
  • 17. Inference – Two Policies Benchmark policy (σB 0 , σB 1 ); New policy (σN 0 , σN 1 ) σO 0 < σN 0 and σO 1 σO 0 = σN 1 σN 0 Proposition 5 (bounds). T [1 − cN (τ)]dµT (τ) ≥ T mN (τ)dµT (τ) − T mO (τ)dµT (τ) #honest agents at new policy ≥ drop in reported corruption T cO (τ)dµT (τ) ≥ T mN (τ)dµT (τ) − T mO (τ)dµT (τ) #corrupt agents at old policy ≥ drop in reported corruption
  • 18. Take-Away In many environments no herd-anonymity, need to provide anonymity through garbled response Can be implemented through noisy surveys – related, but quite distinct from randomized response surveys Rule of thumb first provide sufficient anonymity that people are willing to complain then scale up enforcement