Next Article in Journal
A Note on Numerical Representations of Nested System of Strict Partial Orders
Next Article in Special Issue
Consensus towards Partially Cooperative Strategies in Self-Regulated Evolutionary Games on Networks
Previous Article in Journal / Special Issue
The Evolution of Networks and Local Public Good Provision: A Potential Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Horizon-K Farsightedness in Criminal Networks

by
P. Jean-Jacques Herings
1,
Ana Mauleon
2,3,* and
Vincent Vannetelbosch
3
1
Department of Economics, Maastricht University, 6200 MD Maastricht, The Netherlands
2
CEREC, UCLouvain Saint-Louis, 1000 Brussels, Belgium
3
CORE, UCLouvain, 1348 Louvain-la-Neuve, Belgium
*
Author to whom correspondence should be addressed.
Submission received: 26 April 2021 / Revised: 23 June 2021 / Accepted: 28 June 2021 / Published: 5 July 2021
(This article belongs to the Special Issue Game Theory in Social Networks)

Abstract

:
We study the criminal networks that will emerge in the long run when criminals are neither myopic nor completely farsighted but have some limited degree of farsightedness. We adopt the horizon-K farsighted set to answer this question. We find that in criminal networks with n criminals, the set consisting of the complete network is a horizon-K farsighted set whenever the degree of farsightedness of the criminals is larger than or equal to ( n 1 ) . Moreover, the complete network is the unique horizon- ( n 1 ) farsighted set. Hence, the predictions obtained in case of completely farsighted criminals still hold when criminals are much less farsighted.
JEL Classification:
A14; C70; D20

1. Introduction

There is empirical evidence suggesting that peer effects and the structure of social interactions matter strongly when explaining an individual’s own criminal or delinquent behavior. (See Patacchini and Zenou [1], among others.) A criminal’s place in the network and his know-how regarding the crime business of his partners determine his criminal opportunities and constraints, as well as his information on these opportunities and constraints. It is, therefore, crucial to understand how such criminal networks are formed and structured, and how they evolve and perform.
Different ways of characterizing which network structures are stable have been proposed in the literature, depending on whether (and how far) agents anticipate that their action may also induce others to change the network relations that they maintain. (Mauleon and Vannetelbosch [2] provide a comprehensive overview of the solution concepts for solving network formation games.) The notion of a pairwise stable network, introduced by Jackson and Wolinsky [3], assumes that agents are able to modify the network one link at a time, and can choose to change the network if the resulting network implies higher payoffs for the deviating agents. As such, pairwise stability involves fully myopic agents in the sense that they do not anticipate that others might react to their actions. At the other end of the spectrum, a number of solution concepts involve perfectly farsighted agents, i.e., agents that fully anticipate the complete sequence of reactions that results from their own actions in the network. However, this assumption of perfect farsightedness, especially when the number of agents becomes large, requires a very high level of foresight on behalf of the agents. Kirchsteiger, Mantovani, Mauleon and Vannetelbosch [4] provide experimental evidence suggesting that subjects are consistent with an intermediate rule of behavior, which can be interpreted as a form of limited farsightedness. Agents only anticipate a limited number of reactions by the other agents in response to the actions they take themselves. (Similar experimental evidence for limited farsightedness is found in van Dolder and Buskens [5]). In this paper, we study the criminal networks that agents form when criminals are neither fully myopic nor completely farsighted, but have some limited degree of farsightedness. In other words, we show how the predictions about stable criminal networks relate to the degree of farsightedness.
There is a large literature on the economics of crime. Calvo-Armengol and Zenou [6] provide a network analysis of criminal behavior. They develop a model where criminals compete with each other in criminal activities but benefit from being friends with other criminals by improving their knowledge of the crime business. Individuals decide first whether to work or to become a criminal, and then they choose the crime effort to exert provided of being a criminal. (Calvo-Armengol and Zenou [6] mostly focus on cases where the network is exogenously given. They show that multiple equilibria with different members of active criminals and levels of involvement in crime business may coexist.) Ballester, Calvo-Armengol and Zenou [7] develop a criminal network game where each delinquent decides how much delinquency effort to exert. The network is determined endogenously by allowing players to join the labor market instead of committing criminal activities. They find that the optimal enforcement policy consists of removing some key player or some key group. Such a policy is complex, since it depends both on the wage and on the network. Indeed, the removal of some players may induce further voluntary moves from other players, who now find it profitable to leave their criminal activities and join the labor market. (See also, Bezin, Verdier and Zenou [8] and Lee, Liu, Patacchini and Zenou [9]).
In this paper, we present a simplified version of the model of Calvo–Armengol and Zenou [6], which places emphasis on the formation of links and keeps the players’ level of criminal activities fixed. For simplicity, we also keep the wage in the labor market low enough, in Calvo-Armengol and Zenou’s model, that all individuals prefer to become a criminal, whatever the social network connecting the criminals. By doing so, we study the networks that will be formed when criminals have the discretion to choose their connections.
Herings, Mauleon and Vannetelbosch [10] introduce the notion of a pairwise farsightedly stable set to study the networks that will be formed by farsighted players. (Other approaches to farsightedness in network formation are suggested by the work of Chwe [11], Xue [12], Herings, Mauleon and Vannetelbosch [13], Mauleon and Vannetelbosch [14], Dutta, Ghosal and Ray [15], Page, Wooders and Kamat [16], Page and Wooders [17], Mauleon, Vannetelbosch and Vergote [18], and Ray and Vohra [19]). Herings, Mauleon and Vannetelbosch [10] analyze a simplified version of the criminal network model of Calvo-Armengol and Zenou [6], and find that, in criminal networks with three players, there may be several pairwise stable networks, but the set consisting of the complete network, where all criminals are linked to each other, is the unique, pairwise, farsightedly stable set. Moreover, they show that the complete network is a pairwise farsightedly stable set for any number of players.
Which criminal networks will emerge in the long run when criminals have a limited degree of farsightedness? We adopt the horizon-K farsighted set of Herings, Mauleon and Vannetelbosch [20] to answer this question. This paper constitutes the first application of this concept and demonstrates its tractability.
A horizon-K farsighted set of networks identifies the networks that emerge in the long run when players have a reasoning horizon equal to K . It is defined as the smallest set of networks, so that there are no deviations by the players to networks outside the set, whereas it is possible to reach at least one network in the set from any initial network. Herings, Mauleon and Vannetelbosch [20] show that a horizon-K farsighted set always exists, and provide easy-to-verify conditions that must be reached for a set of networks to be a horizon-K farsighted set. When K is equal to 1, the concept is identical to the pairwise myopically stable set introduced by Herings, Mauleon and Vannetelbosch [10]. (The myopic stable set of Demuynck, Herings, Saulle, and Seel [21] generalizes the pairwise myopically stable set to a large class of social environments, and shows how it unifies the most important concepts of non-cooperative game theory, such as Nash equilibrium, and cooperative game theory, such as the core.) In that case, it consists of the pairwise stable networks of Jackson and Wolinsky [3], as well as the closed cycles of Jackson and Watts [22]. The value of K reflects the reasoning horizon of the players, and when K tends towards infinity, we reach the limit case of the farsightedly stable set of Herings, Mauleon and Vannetelbosch [10].
Although a horizon-K farsighted set may consist of multiple networks, in our application to criminal networks, the complete network, where all criminals are connected to each other, constitutes a horizon-K farsighted set consisting of a single network whenever the reasoning horizon of a criminal is at least equal to the number of other criminals. When the reasoning horizon of the criminals is exactly equal to this number, then this is the unique horizon-K farsighted set. Such a uniqueness result is striking in the literature on networks, which has provided many examples where a large multiplicity of stable networks is obtained. For example, in both the connections and co-author model in Jackson and Wolinsky [3], there are multiple pairwise stable networks for reasonable specifications of the parameter values.
Hence, we can obtain a very sharp prediction for intermediate degrees of farsightedness (i.e., a degree of farsightedness equal to n 1 ), and show that a limited degree of farsightedness (i.e., at least n 1 ) is sufficient to recover the predictions obtained in the case of completely farsighted criminals. The robustness of the complete network, compared to the other pairwise stable networks, for intermediate degrees of farsightedness reveals the importance of knowing the degree of farsightedness of criminals in order to determine which criminal networks are likely to emerge in the long run. The adequate policy to reduce crime when facing a symmetric, highly connected network, such as the complete network, could differ from the policy which is needed to reduce crime in a different type of network. Patacchini and Zenou [1] investigate whether weak ties (friends of friends) play an important role in providing information about crime. Individuals can have strong and weak ties, and can learn about crime opportunities through these. They find that increasing the percentage of weak ties increases the crime rate in the economy. They conclude that an effective policy should be measured by both the possible crime reduction it implies and the group interaction it engenders. This result confirms that better knowledge of the degree of farsightedness of criminals is, therefore, important in determining which criminal networks are likely to emerge, and how to implement adequate delinquency-reducing policies.
Recently, Lindquist and Zenou [23] present a selective review of several key network studies and findings from the crime literature. They argue that the economic approach providing network-based policies is a valuable complement to the more traditional approach that focuses on the observed structure of the network. The economic approach allows for a comparison of the effectivity of group-based policies (e.g., changing the group norm) versus individual-based policies (e.g., targeting), and when targeting is more appropriate, it specifies who policy-makers should target in order to generate the greatest reduction in crime. Arresting key individuals may dismantle non-hierarchical crime structures, described as loose associations of independent contractors or brokers (such as some Canadian car theft associations and some criminal organizations of human smuggling from China to the United States), but identifying and arresting key groups may be necessary to dismantle strongly hierarchical crime structures (such as the Mafia, where leaders are well-connected) or gangs of well-connected criminals with a high degree of centrality (i.e., a complete network). Hence, once criminals have limited farsightedness, groups of well-connected criminals (such as the Mafia and some types of gang) would emerge. When this is the case, instead of targeting key criminals, group-based policies that make it difficult for criminals to establish mutual links should be implemented.
The paper is organized as follows. In Section 2, we introduce some notations and basic properties of criminal networks. In Section 3, we define the notion of a horizon-K farsighted set. In Section 4, we identify the horizon-K farsighted set of criminal networks. Finally, in Section 5, we conclude.

2. Criminal Networks

Let N = { 1 , , n } be the finite set of criminals. Throughout the paper, we assume that n 3 . A criminal network g is simply a list of which pairs of criminals are linked to each other, and i j g indicates that i and j are linked under g. The complete network of the set of criminals S N is denoted by g S and is equal to the set of all subsets of S of size 2. (Throughout the paper, we use the notation ⊆ for weak inclusion and for strict inclusion. Finally, the notation # is used for the cardinality of a set.) It follows that the empty network is denoted by g . Let g S = { i j g i , j S } be the network found by deleting all links from g, except those between players in S. The set of all possible networks or graphs on N is denoted by G , and consists of all subsets of g N . The cardinality of G is denoted by n = 2 n ( n 1 ) / 2 .
The network obtained by adding a link i j to network g is denoted by g + i j , and the network that results from deleting link i j from network g by g i j . Let N ( g ) = { i N j N , such that i j g } is the set of criminals who have at least one link in the network g. A path in a network g G between criminals i and j of length K 1 is a finite sequence of criminals i 0 , , i K with i 0 = i and i K = j , such that for any k { 0 , , K 1 } , i k i k + 1 g , and such that each criminal in the sequence i 0 , , i K is distinct. A network g is connected if, for each pair of criminals i and j in N ( g ) , such that i j there is a path between i and j in g. A non-empty network h g is a component of g if h is connected and for any i N ( h ) and j N ( g ) , i j g implies i j h . The set of components of g is denoted by C ( g ) . By knowing the components of a network, we can partition the criminals into maximal groups within which criminals are connected. Let P ( g ) denote the partition of N into components and singletons induced by the network g. That is, the set S of players belongs to P ( g ) if, and only if, either there is network h in C ( g ) , such that S = N ( h ) , or there exists i N ( g ) , such that S = { i } .
Next, we present a simplified version of the Calvo-Armengol and Zenou model [6]. Given some criminal networks g, the elements of P ( g ) are called criminal groups. Each criminal group S has a positive probability π S ( g ) of winning the loot B > 0 . It is assumed that the bigger the criminal group, the higher its probability of obtaining the loot. This assumption captures the idea that delinquents learn from other criminals belonging to the same group regarding how to commit crime in a more efficient way, by sharing know-how on the technology of crime. We assume that the probability of winning the loot is given by π S ( g ) = # S / n .
The network architecture determines how the loot is shared among the criminals in the group. Consider some criminal i N and let S P ( g ) be the criminal group i which belongs to. Let d i ( g ) denote the degree of criminal i in g; i.e., the number of links criminal i has in g. We define c i ( g ) = max j S d j ( g ) as the maximum degree in this criminal group. A criminal i who is part of a group S P ( g ) expects a share α i ( g ) of the loot given by
α i ( g ) = 1 # { j S d j ( g ) = c j ( g ) } , if d i ( g ) = c i ( g ) , 0 , otherwise .
That is, within each criminal group, the criminal that has the highest number of links gets the loot. If two or more criminals have the highest number of links, then they share the loot equally among them.
Criminal i has a probability q i ( g ) of being caught. It is assumed that the higher the number of links a criminal has, the lower his individual probability of being caught. We assume that the probability of being caught is simply given by
q i ( g ) = n 1 d i ( g ) n .
In case a criminal is caught, a fraction ϕ of his personal gains from crime are seized. We require ϕ < n / ( n 1 ) to guarantee that expected payoffs are positive for a criminal with the highest degree in his group.
The total payoffs of criminal i belonging to criminal group S P ( g ) are, therefore, equal to
Y i ( g ) = π S ( g ) α i ( g ) ( 1 q i ( g ) ϕ ) B = # S n 1 1 # { j S d j ( g ) = c i ( g ) } ( 1 n 1 d i ( g ) n ϕ ) B , if d i ( g ) = c i ( g ) , 0 , otherwise .

3. Horizon- K Farsighted Set

To determine the criminal networks that emerge in the long run when criminals are neither fully myopic nor completely farsighted, but have some limited degree of farsightedness, we use the horizon-K farsighted set as introduced by Herings, Mauleon and Vannetelbosch [20]. In this section, we provide a formal definition of this concept in Definition 3, state a useful result to determine whether a set of networks is a horizon-K farsighted set and establish the uniqueness of a horizon-K farsighted set in Theorem 1.
A farsighted improving path of length K 1 from a network g to a network g is a finite sequence of networks g 0 , , g K with g 0 = g and g K = g such that for any k { 1 , , K 1 } either (i) g k + 1 = g k i j for some i j , such that Y i ( g K ) > Y i ( g k ) or Y j ( g K ) > Y j ( g k ) , or (ii) g k + 1 = g k + i j for some i j , such that Y i ( g K ) > Y i ( g k ) and Y j ( g K ) Y j ( g k ) . If there exists a farsighted improving path of length K from g to g , then we write g K g . For a given network g and some K 1 , let f K ( g ) be the set of networks that can be reached from g by a farsighted improving path of length K K . That is, f K ( g ) = { g G K K such that g K g } . Let f ( g ) = { g G K N such that g K g } denote the set of networks that can be reached from g by some farsighted improving path. Lemma 1 in Herings, Mauleon and Vannetelbosch [20] shows that, for every K 1 , for every g G , it holds that f K ( g ) f K + 1 ( g ) , and that for K n 1 , for every g G , it holds that f K ( g ) = f K + 1 ( g ) = f ( g ) .
An important concept in the analysis of networks is the one of pairwise stability, as was introduced in Jackson and Wolinsky [3]. A network g G is pairwise stable if (i) for every i j g , Y i ( g ) Y i ( g i j ) and Y j ( g ) Y j ( g i j ) , and (ii) for every i j g , if Y i ( g ) < Y i ( g + i j ) , then Y j ( g ) > Y j ( g + i j ) . We say that a network g is adjacent to g if g = g + i j or g = g i j for some i j . A network g defeatsg if either g = g i j and Y i ( g ) > Y i ( g ) or Y j ( g ) > Y j ( g ) , or if g = g + i j with ( Y i ( g ) , Y j ( g ) ) > ( Y i ( g ) , Y j ( g ) ) . (We use the notation ( Y i ( g ) , Y j ( g ) ) > ( Y i ( g ) , Y j ( g ) ) for Y i ( g ) Y i ( g ) and Y j ( g ) Y j ( g ) with at least one inequality holding strictly, ( Y i ( g ) , Y j ( g ) ) ( Y i ( g ) , Y j ( g ) ) for Y i ( g ) Y i ( g ) and Y j ( g ) Y j ( g ) , and ( Y i ( g ) , Y j ( g ) ) ( Y i ( g ) , Y j ( g ) ) for Y i ( g ) > Y i ( g ) and Y j ( g ) > Y j ( g ) .) A network is pairwise stable if, and only if, it is not defeated by another network. It is also easy to see that g f 1 ( g ) if and only if g defeats g. We can, therefore, define the pairwise stable networks  P 1 as those g G , for which f 1 ( g ) = . For K 1 , let P K = { g G f K ( g ) = } denote the set of horizon-Kpairwise stable networks. (Jackson [24] defines a network as farsightedly pairwise stable if there is no farsighted improving path emanating from it. This concept reverts to P and refines the set of pairwise stable networks.) Clearly, if K > K , then P K P K . For values of K above 1, the use of P K as a solution concept suffers from a number of drawbacks. Not only are these sets often empty, at a more fundamental level, they are problematic as a solution concept as they allow for deviations to networks that are not stable themselves, and do not ultimately result in a stable network.
A refinement of pairwise stability is obtained when we require the network g to defeat every other adjacent network, so g f 1 ( g ) for every network g adjacent to g. We call such a network g pairwise dominant. For K 1 , a network g G is horizon-Kpairwise dominant if, for every g adjacent to g, it holds that g f K ( g ) . The set of horizon-Kpairwise dominant networks is denoted by D K .
The set f K 2 ( g ) = f K ( f K ( g ) ) = { g G g f K ( g ) such that g f K ( g ) } consists of those networks that can be reached by a composition of two farsighted improving paths of length, at most K from g. We extend this definition and, for m N , we define f K m ( g ) as those networks that can be reached from g by means of m compositions of farsighted improving paths of a length of, at most, K. Let f K denote the set of networks that can be reached from g by means of any number of compositions of farsighted improving paths of length at most K. Lemma 2 in Herings, Mauleon and Vannetelbosch [20] shows that, for every K 1 , and for every g G , it holds that f K ( g ) f K + 1 ( g ) , and that for K n 1 , for every g G , it holds that f K ( g ) = f K + 1 ( g ) = f ( g ) .
Jackson and Watts [22] have defined the notion of a closed cycle. A set of networks C is a cycle if, for any g C and g C { g } , there is a sequence of improving paths of length 1, connecting g to g , i.e., g f 1 ( g ) . A cycle C is a maximal cycle if it is not a proper subset of a cycle. A cycle C is a closed cycle if f 1 ( C ) = C , so there is no sequence of improving paths of length 1 starting at some network in C and leading to a network that is not in C. A closed cycle is necessarily a maximal cycle. For every pairwise stable network g P 1 , the set { g } is a closed cycle. The set of networks belonging to a closed cycle is non-empty.
The notion of a horizon-K farsighted set is based on two main requirements: horizon-K deterrence of external deviations and horizon-K external stability.
A set of networks G satisfies the horizon-K deterrence of external deviations if all possible deviations from any network g G to a network outside G are deterred by a threat of ending worse-off or equally well-off. (We use the notational convention that f 1 ( g ) = for every g G .)
Definition 1.
For K 1 , a set of networks G G satisfies horizon-K deterrence of external deviations if for every g G ,
(a) 
i j g such that g + i j G ,
g [ f K 2 ( g + i j ) G ] [ f K 1 ( g + i j ) f K 2 ( g + i j ) ] such that
( Y i ( g ) , Y j ( g ) ) = ( Y i ( g ) , Y j ( g ) ) or Y i ( g ) < Y i ( g ) or Y j ( g ) < Y j ( g ) ,
(b) 
i j g such that g i j G ,
g , g [ f K 2 ( g i j ) G ] [ f K 1 ( g i j ) f K 2 ( g i j ) ] such that
Y i ( g ) Y i ( g ) and Y j ( g ) Y j ( g ) .
Condition (a) in Definition 1 captures the addition of a link i j to a network g G , which leads to a network g + i j outside of G, is deterred by the threat of ending in g . Here, g is such that either there is a farsighted improving path of length smaller than or equal to K 2 , from g + i j to g , and g belongs to G, or there is a farsighted improving path of length equal to K 1 from g + i j to g , and there is no farsighted improving path from g + i j to g of smaller length. Condition (b) is a similar requirement, but for the case where a link is severed. (Since the degree of farsightedness of players is equal to K , Herings, Mauleon and Vannetelbosch [20] distinguish farsighted improving paths of length less than or equal to K 2 after a deviation from g to g + i j , and farsighted improving paths of length equal to K 1 . In the former case, the reasoning capacity of the players is not yet reached, and the threat of ending in g is only credible if it belongs to the set G. In the latter case, the only way to reach g from g requires K steps of reasoning or even more; one step in the deviation to g + i j and at least K 1 additional steps in any farsighted improving path from g + i j to g . Since this exhausts the reasoning capacity of the players, the threat of ending in g is credible, irrespective of whether it belongs to G or not.)
A set of networks G satisfies horizon-K external stability if, from any network outside of G, there is a sequence of farsighted improving paths of lengths smaller than or equal to K, leading to some network in G .
Definition 2.
For K 1 , a set of networks G G satisfies horizon-K external stability if, for every g G G , f K ( g ) G .
This requirement implies that if we allow players with a degree of farsightedness equal to K to successively create or delete links, they will ultimately reach the set G irrespective of the initial network.
Definition 3.
For K 1 , a set of networks G K G is a horizon-K farsighted set if it is a minimal set satisfying horizon-K deterrence of external deviations and horizon-K external stability.
Herings, Mauleon, and Vannetelbosch [20] prove that a horizon-K farsighted set of networks exists. For K = 1 , Theorem 3 of Herings, Mauleon, and Vannetelbosch [20] show that there is a unique horizon-1 farsighted set consisting of all networks that belong to a closed cycle. This result does not carry over to higher levels of K.
As shown by Herings, Mauleon, and Vannetelbosch [20], the collection of horizon-K farsighted sets is independent of K when K n + 1 . Moreover, for every pairwise farsightedly stable set G defined by Herings, Mauleon and Vannetelbosch [10], there is a set G G such that G is a level- ( n + 1 ) farsighted set. (Herings, Mauleon and Vannetelbosch [10] define a pairwise farsightedly stable set as a set G of networks satisfying horizon- deterrence of external deviations and minimality, but with horizon- external stability replaced by the requirement that, for every g G G , f ( g ) G .)
The following theorem of Herings, Mauleon and Vannetelbosch [20] will be used in the next section to identify the horizon-K farsighted set of criminal networks.
Theorem 1
(Herings, Mauleon and Vannetelbosch [20]). Consider some K 2 . If g D J for some J < K and for every g G { g } , it holds that g f K ( g ) , then { g } is a horizon-K farsighted set. If, moreover, g P K , then { g } is the unique horizon-K farsighted set.
Theorem 1 requires that g D J for some J < K , so we have to show that g f J ( g ) for all g adjacent to g. The higher J, the weaker this requirement, so we could replace the requirement g D J for some J < K by g D K 1 . To show that g f K ( g ) for all g g , we have to find a sequence of farsighted improving paths of K at most, which connect g to g. Very often, the analysis of farsighted improving paths of small lengths is already sufficient. The higher K, the easier it is to satisfy the conditions of Theorem 1 and to find a singleton horizon-K farsighted set. it ic necessary, to show that g P K requires that f K ( g ) = . This requirement is more difficult to satisfy for increasing values of K.

4. Horizon-K Farsighted Set of Criminal Networks

Throughout this section, we assume n 3 . Figure 1 presents the pay-offs for three-player criminal networks with B = 9 and ϕ = 1 in expression (1). Table 1 shows the farsighted improving paths for the different possible values of K. It can be verified that the farsighted improving paths for the three-player case do not depend on the specific choices for B and ϕ .
For the three-player case, we compute the closed cycles and use Theorem 3 in Herings, Mauleon and Vannetelbosch [20] to conclude that G 1 = P 1 = { g 1 , g 2 , g 3 , g 7 } is the horizon-1 farsighted set, so G 1 consists of all pairwise stable networks. There are many networks that are stable when players are myopic.
For K 2 , we apply Theorem 1 to show that G K = { g 7 } is the unique horizon-K farsighted set. It holds that g 7 D 1 and g 7 f 2 ( g ) for every g g 7 , so { g 7 } is a horizon-K farsighted set. Since g 7 P K , it follows from Theorem 1 that { g 7 } is the unique horizon-K farsighted set. If criminals behave myopically, they may not go beyond forming a single link in the three player case. However, with a degree of farsightedness of at least 2, the complete criminal network emerges as the unique prediction.
The remainder of this section is devoted to the analysis of criminal networks with a general number n of players. As in the three-criminal case, there are many networks that are pairwise stable in the n-person case. The complete network is easily verified as pairwise stable. The generalization of the networks g 1 , g 2 , and g 3 for the three-criminal case to the n-criminal case would be any network consisting of complete components, where no two components have the same degree. However, any network with a single component where all players have a degree at least equal to two, and one player has a degree that is at least two times higher than the degree of any other player, is pairwise stable.
We will next argue that { g N } is a horizon-K farsighted set whenever K n 1 .
We first show that the complete network is pairwise dominant.
Lemma 1.
For criminal networks, it holds that g N D 1 .
Proof. 
Consider the network g N i j for some i j . It holds that
d i ( g N i j ) = d j ( g N i j ) < c i ( g N i j ) = c j ( g N i j ) ,
so
Y i ( g N i j ) = Y j ( g N i j ) = 0 < Y i ( g N ) = Y j ( g N ) ,
and g N f 1 ( g N i j ) . We have shown that g N D 1 . □
We show next that the complete network can be reached from any starting network by repeated application of, at most, n 1 degrees of farsightedness.
Lemma 2.
For criminal networks it holds for every g G { g N } that g N f n 1 ( g ) .
Proof. 
Step 1. If g has a component which is not complete, then there is g f n 1 ( g ) , such that g g .
Let S P ( g ) be a criminal group, such that some internal links are missing, g S g S .
If, for every i S , it holds that d i ( g ) = c i ( g ) , so all players in S have the same degree, then any two unlinked players i and j in S create a link to form the network g + i j and improve their payoffs, since the increase in their degree increases the share in the loot and lowers the probability of being caught for both players, α i ( g + i j ) > α i ( g ) , α j ( g + i j ) > α j ( g ) , q i ( g + i j ) < q i ( g ) , and q j ( g + i j ) < q j ( g ) , so Y i ( g + i j ) > Y i ( g ) and Y j ( g + i j ) > Y j ( g ) . We have that g 1 g + i j , so clearly g + i j f n 1 ( g ) .
If the players in S do not all have the same degree, let i S be a player with d i ( g ) = c i ( g ) . If c i ( g ) < # S 1 , then Player i links with any Player j, such that i j g to form the network g + i j . It holds that Y i ( g + i j ) > Y i ( g ) > 0 , since α i ( g + i j ) α i ( g ) and q i ( g + i j ) < q i ( g ) , whereas Y j ( g + i j ) Y j ( g ) . We have that g 1 g + i j , so clearly g + i j f n 1 ( g ) .
If the players in S do not all have the same degree and there is a player in S with degree # S 1 , then let i S be a player with d i ( g ) < # S 1 . Player i consecutively links to all players j S , such that i j g , thereby forming a network g , where he has degree # S 1 . The payoffs of Player i are, in every step, equal to Y i ( g ) = 0 until the final step, where his payoffs increase to Y i ( g ) > 0 . Every player j that i links to has a degree below # S 1 and, therefore, payoffs equal to 0 Y j ( g ) . We have that g f # S 2 ( g ) f n 1 ( g ) by Lemma 1 in Herings, Mauleon and Vannetelbosch [20].
Step 2. If all components of g are complete and g g N , then there is g f n 1 ( g ) , such that g g .
The assumptions of Step 2 imply that g consists of at least two criminal groups. Let S 1 and S 2 be two criminal groups in P ( g ) .
If # S 1 = # S 2 , then form a link between a Player i S 1 and a Player j S 2 . Since q i ( g ) > q i ( g + i j ) , we have that
Y i ( g ) = 1 n ( 1 q i ( g ) ϕ ) B < # S 1 n ( 1 q i ( g + i j ) ϕ ) B = Y i ( g + i j ) .
By the same calculation, it follows that Y j ( g ) < Y j ( g + i j ) , so g 1 g + i j , and, therefore, g + i j f n 1 ( g ) .
Otherwise, it holds, without loss of generality, that # S 1 < # S 2 . Select some player i S 1 and a set J consisting of # S 2 + 1 # S 1 players in S 2 , who are consecutively linked to Player i to form network g . The resulting finite sequence of networks is denoted g 0 , , g K with g 0 = g and g K = g . Notice that K n 1 . We next show that, for every k { 0 , , K 1 } , ( Y i ( g k ) , Y j k ( g k ) ) < ( Y i ( g K ) , Y j k ( g K ) ) , where j k J is such that g k + 1 = g k + i j k , thereby proving that ( g 0 , , g K ) is a farsighted improving path and completing the proof of Step 2.
For every player j J , we have
d j ( g K ) = d i ( g K ) = c i ( g K ) ,
and for all other players, the degree is strictly less than c i ( g K ) , so
Y j ( g K ) = Y i ( g K ) = # S 1 + # S 2 n 1 # S 2 + 2 # S 1 ( 1 q i ( g K ) ϕ ) B .
For k = 0 , we have
Y i ( g 0 ) = 1 n ( 1 q i ( g ) ϕ ) B < Y i ( g K ) , Y j 0 ( g 0 ) = 1 n ( 1 q j 0 ( g ) ϕ ) B < Y j 0 ( g K ) ,
where we use q i ( g 0 ) > q i ( g K ) and q j 0 ( g 0 ) > q j 0 ( g K ) to obtain the strict inequalities.
For k = 1 , , K 1 , it holds that Player i is connected to Player j 0 , so d i ( g k ) < d j 0 ( g k ) = c i ( g k ) , so α i ( g k ) = 0 and 0 = Y i ( g k ) < Y i ( g K ) . Similarly, it holds that Player j k is connected to Player j 0 , so d j k ( g k ) < d j 0 ( g k ) = c j k ( g k ) , so α j k ( g k ) = 0 and 0 = Y j k ( g k ) < Y j k ( g K ) .
Step 3. For every g G { g N } , it holds that g N f n 1 ( g ) .
By combining the results of Step 1 and Step 2, we have that for every g G { g N } , there is g f n 1 ( g ) with strictly more links than g. Since the complete network g N has n ( n 1 ) / 2 links, we find that g N f n 1 n ( n 1 ) / 2 ( g ) f n 1 ( g ) . □
Using Theorem 1, we now prove that the complete network { g N } is a horizon-K farsighted set for every K n 1 . (Herings, Mauleon and Vannetelbosch [10] show that, in the example of criminal networks with n players, the complete network { g N } is a pairwise farsightedly stable set.) Notice that the level of farsightedness needed to sustain the complete network { g N } is quite small when compared to the number of potential networks and the maximum length of paths. (Once the network connecting delinquents is endogenous, Calvo-Armengol and Zenou [6] find that all complete networks, where all players in the pool of criminals are linked to each other, are pairwise stable. Notice that the size of the pool of criminals depends on the wage on the labor market.)
Theorem 2.
For criminal networks, it holds that { g N } is a horizon-K farsighted set for every K n 1 .
Proof. 
By Lemma 1 we have that g N D 1 . By Lemma 2 we have that for every g G { g N } it holds that g N f n 1 ( g ) f K ( g ) , where the inclusion follows from Lemma 2 in Herings, Mauleon and Vannetelbosch [20]. We are now in a position to apply Theorem 1 and conclude that { g N } is a horizon-K farsighted set. □
How about the uniqueness of { g N } as a horizon-K farsighted set? It is tempting to use the approach of Theorem 1 and show such a result by proving that g N P K . However, consider the case with six players and let g = g N 16 26 35 45 . For any value of B and ϕ , (We maintain the assumption that ϕ < n / ( n 1 ) . ) we claim that g f 12 ( g N ) , so g N P 12 . Since the network g is connected, d 1 ( g ) = d 2 ( g ) = d 3 ( g ) = d 4 ( g ) = 4 , and d 5 ( g ) = d 6 ( g ) = 3 , it holds for any i { 1 , 2 , 3 , 4 } that Y i ( g ) = ( 1 / 4 ϕ / 24 ) B > B / 6 = Y i ( g N ) and for any j { 5 , 6 } that Y j ( g ) = 0 < B / 6 = Y j ( g N ) . The construction of the farsighted improving path is, however, more subtle than simply deleting links 16, 26, 35, and 45 in some order. Indeed, after the deletion of three such links, there are exactly two players with the maximum degree and they would obtain strictly lower payoffs by cutting their link, and would be unwilling to do so. Avoiding this problem requires more farsightedness and involves all players in { 1 , 2 , 3 , 4 } , first cutting two of their mutual links, before severing the links with players 5 and 6, and finally restoring their mutual links. One explicit farsighted improving path results from g N 12 23 34 41 16 26 35 45 + 12 + 23 + 34 + 41 and takes 12 steps. We have denoted the player with an incentive to cut a link first, so 16 , for instance, means that Player 1 cuts his link with Player 6, whereas 61 would mean that Player 6 cuts his link with Player 1. It can be verified that each step in this farsighted improving path is feasible.
We conclude this section by showing that if criminals are not too farsighted, then g N P K , so { g N } is the unique horizon-K farsighted set. More precisely, we will now consider K = n 1 . We show first that any network in f n 1 ( g N ) has a single component involving all players.
Lemma 3.
For criminal networks it holds for every g f n 1 ( g N ) that P ( g ) = { N } .
Proof. 
Consider the criminal group S of Player 1 in g . We show that it contains all players. Suppose it contains only s n 1 players. Then, starting from g N , those s players have to cut all their links with all other players in N S . This involves at least s ( n s ) steps. For a fixed n, the concavity of s ( n s ) in s implies that s ( n s ) is minimized at s = 1 or s = n 1 . Substitution of these values of s shows the minimum to be equal to n 1 at both s = 1 and s = n 1 . When the s players cut all their links with all other players in N S , all the players in N are strictly worse off, since the probability of being caught has strictly increased and the probability of winning the loot has decreased, contradicting g f n 1 ( g N ) . □
We show next that the complete network g N is horizon- ( n 1 ) pairwise stable.
Lemma 4.
For criminal networks, it holds that g N P n 1 .
Proof. 
Suppose g is an element of f n 1 ( g N ) . Let g 0 , , g K with g 0 = g N and g K = g be a farsighted improving path of length K n 1 . By Lemma 3 it holds that c i ( g ) is independent from i, so we denote it by c. Let M N be such that i M if and only if d i ( g ) = c and denote the cardinality of M by m. It cannot be that m = n , since then all players have lower payoffs in g than in g N because the probability of being caught is higher in g than in g N . Since by Lemma 3 g is connected, it follows that Y j ( g ) = 0 for all j N M . A player j N M will, therefore, not sever a link at any network in the farsighted improving path g 0 , , g K . It follows that
i M ( n 1 d i ( g ) ) j N M ( n 1 d j ( g ) ) .
Since d i ( g ) > d j ( g ) whenever i M and j N M , we have that m > n / 2 .
Since at least one link i j with i M and j N is missing in g , it follows that the maximum degree in g satisfies c n 2 .
The number K is equal to the number of times a link i j is severed with i M and j N M plus the number of times a link i j is cut with i , j M plus the number of link additions. We next argue that lower bounds for these three numbers are given by 2 ( n m ) , 2 m n 1 , and 1, respectively.
Since all players in N M experienced the severance of at least two links, and any such link is cut by a player in M, a lower bound for the first number is 2 ( n m ) .
For k = 0 , , K , let L ( g k ) = { i N d i ( g k ) = n 1 } be the set of players with degree n 1 and let ( g k ) = # L ( g k ) be its cardinality. Clearly, it holds that ( g N ) = n and ( g ) = 0 . Let k be the lowest value of k such that ( g k ) m for all k k . Since ( g k ) ( g k + 1 ) 2 , we find that ( g k ) = m or ( g k ) = m 1 . The sum of the cardinality ( g k ) of L ( g k ) and the cardinality m of M is, therefore, at least 2 m 1 . Since there are only n players, it follows that # ( L ( g k ) M ) , the cardinality of the set of players in L ( g k ) that belong to M, is at least 2 m n 1 .
For all k k , for all i L ( g k ) , it holds that Y i ( g k ) > Y i ( g ) , since the loot has to be shared with fewer or the same number of criminals, and the probability of being caught is strictly lower when comparing g k to g . Such a player i will, therefore, never choose to sever a link himself, so whenever a link involving player i L ( g k ) is severed when going from g k to g k + 1 , it must be by a player in M L ( g k ) . It follows that ( g k ) ( g k + 1 ) 1 . Since # ( L ( g k ) M ) 2 m n 1 , we find that going from g k to g involves the deletion of at least 2 m n 1 links i j with i , j M .
We next argue that the move from g K 1 to g K involves a link addition. Supposing not, then there is i j with i M , such that g K = g K 1 i j and Y i ( g K ) > Y i ( g K 1 ) . Since d i ( g K 1 ) = c i ( g K 1 ) > c i ( g K ) = d i ( g K ) , it follows that at g K , i has to share the loot with more criminals and has a higher probability of being caught than at g K 1 , so Y i ( g K ) < Y i ( g K 1 ) , leading to a contradiction. Consequently, the move from g K 1 to g K involves a link addition.
We have proven that K 2 ( n m ) + 2 m n 1 + 1 = n , which contradicts our original supposition that K n 1 . Consequently, it holds that f n 1 ( g N ) = . □
Using Theorem 1 we now prove that the complete network { g N } is the unique horizon- ( n 1 ) farsighted set.
Theorem 3.
For criminal networks, it holds that { g N } is the unique horizon- ( n 1 ) farsighted set.
Proof. 
By Lemma 1 we have that g N D 1 . By Lemma 2 we have that for every g G { g N } it holds that g N f n 1 ( g ) . By Lemma 4 it holds that g N P n 1 . We are now in a position to apply Theorem 1 and conclude that { g N } is the unique horizon- ( n 1 ) farsighted set. □
We have found that in criminal networks with n criminals, the set consisting of the complete network is a horizon-K farsighted set whenever the degree of farsightedness of the criminals is larger thanor equal to ( n 1 ) . Moreover, the complete network is the unique horizon- ( n 1 ) farsighted set. Hence, we obtain a very sharp prediction for intermediate degrees of farsightedness (i.e., a degree of farsightedness equal to n 1 ), and show that a limited degree of farsightedness (i.e., at least n 1 ) is sufficient to recover the predictions obtained in case of completely farsighted criminals. It therefore seems important to acquire knowledge about the degree of farsightedness of criminals, to determine which criminal networks are likely to emerge in the long run.
A better knowledge of the structural properties of criminal networks will help in understanding the impact of peer influence on delinquent behavior and addressing adequate and novel delinquency-reducing policies. A first line of reasoning would be that crime could be reduced by increasing the value of the parameter ϕ , the fraction of the personal gains of a criminal that are seized when the criminal is caught. On the other hand, higher values of ϕ make it more costly to be caught and, as a response, criminals will establish networks where they have higher degrees and are therefore less likely to be convicted. Our analysis points towards the complete network as emerging in the long run, irrespective of the value of ϕ . The value of ϕ is, therefore, completely ineffective as a policy instrument.

5. Conclusions

We study the criminal networks that will emerge in the long run when criminals are neither fully myopic nor completely farsighted, but have some limited degree of farsightedness. We adopt the horizon-K farsighted set of Herings, Mauleon and Vannetelbosch [20] to show how the predictions regarding stable criminal networks relate to the degree of farsightedness. A horizon-K farsighted set always exists. We find that in criminal networks with n criminals, the set consisting of the complete network is a horizon-K farsighted set whenever the degree of farsightedness of the criminals is larger than or equal to ( n 1 ) . Moreover, the complete network is the unique horizon- ( n 1 ) farsighted set. Hence, a limited degree of farsightedness is sufficient to recover the predictions obtained in the case of completely farsighted criminals.

Author Contributions

Conceptualization, P.J.-J.H., A.M. and V.V.; methodology, P.J.-J.H., A.M. and V.V.; software, P.J.-J.H., A.M. and V.V.; validation, P.J.-J.H., A.M. and V.V.; formal analysis, P.J.-J.H., A.M. and V.V.; investigation, P.J.-J.H., A.M. and V.V.; resources, P.J.-J.H., A.M. and V.V.; data curation, P.J.-J.H., A.M. and V.V.; writing—original draft preparation, P.J.-J.H., A.M. and V.V.; writing—review and editing, P.J.-J.H., A.M. and V.V.; visualization, P.J.-J.H., A.M. and V.V.; supervision, P.J.-J.H., A.M. and V.V.; project administration, P.J.-J.H., A.M. and V.V.; funding acquisition, A.M. and V.V. All authors have read and agreed to the published version of the manuscript.

Funding

Financial support from the MSCA ITN Expectations and Social Influence Dynamics in Economics (ExSIDE) Grant No721846 (1 September 2017–30 June 2021), from the Belgian French speaking community ARC project 15/20-072 of Saint-Louis University—Brussels, and from the Fonds de la Recherche Scientifique - FNRS research grant T.0143.18 is gratefully acknowledged.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The study does not report any data.

Acknowledgments

Ana Mauleon and Vincent Vannetelbosch are, respectively, Research Director and Senior Research Associate of the National Fund for Scientific Research (FNRS).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Patacchini, E.; Zenou, Y. The strength of weak ties in crime. Eur. Econ. Rev. 2008, 52, 209–236. [Google Scholar] [CrossRef]
  2. Mauleon, A.; Vannetelbosch, V. Network formation games. In The Oxford Handbook of The Economics of Networks; Bramoullé, Y., Galeotti, A., Rogers, B.W., Eds.; Oxford University Press: Oxford, UK, 2016. [Google Scholar]
  3. Jackson, M.O.; Wolinsky, A. A strategic model of social and economic networks. J. Econ. Theory 1996, 71, 44–74. [Google Scholar] [CrossRef]
  4. Kirchsteiger, G.; Mantovani, M.; Mauleon, A.; Vannetelbosch, V. Limited farsightedness in network formation. J. Econ. Behav. Org. 2016, 128, 97–120. [Google Scholar] [CrossRef] [Green Version]
  5. Van Dolder, D.; Buskens, V. Individual choices in dynamic networks: An experiment on social preferences. PLoS ONE 2014, 9, e92276. [Google Scholar] [CrossRef] [Green Version]
  6. Calvo-Armengol, A.; Zenou, Y. Social networks and crime decisions: The role of social structure in facilitating delinquent behavior. Int. Econ. Rev. 2004, 45, 939–958. [Google Scholar] [CrossRef]
  7. Ballester, C.; Calvo-Armengol, A.; Zenou, Y. Delinquent networks. J. Eur. Econ. Assoc. 2010, 8, 34–61. [Google Scholar] [CrossRef]
  8. Bezin, E.; Verdier, T.; Zenou, Y. Crime, broken families and punishment. Am. Econ. J. Microecon. 2021. forthcoming. [Google Scholar] [CrossRef]
  9. Lee, L.-F.; Liu, X.; Patacchini, E.; Zenou, Y. Who is the key player? A network analysis of juvenile delinquency. J. Bus. Econ. Stat. 2021. forthcoming. [Google Scholar] [CrossRef]
  10. Herings, P.J.J.; Mauleon, A.; Vannetelbosch, V. Farsightedly stable networks. Games Econ. Behav. 2009, 67, 526–541. [Google Scholar] [CrossRef] [Green Version]
  11. Chwe, M.S. Farsighted coalitional stability. J. Econ. Theory 1994, 63, 299–325. [Google Scholar] [CrossRef]
  12. Xue, L. Coalitional stability under perfect foresight. Econ. Theory 1998, 11, 603–627. [Google Scholar] [CrossRef]
  13. Herings, P.J.J.; Mauleon, A.; Vannetelbosch, V. Rationalizability for social environments. Games Econ. Behav. 2004, 49, 135–156. [Google Scholar] [CrossRef] [Green Version]
  14. Mauleon, A.; Vannetelbosch, V. Farsightedness and cautiousness in coalition formation games with positive spillovers. Theory Decis. 2004, 56, 291–324. [Google Scholar] [CrossRef] [Green Version]
  15. Dutta, B.; Ghosal, S.; Ray, D. Farsighted network formation. J. Econ. Theory 2005, 122, 143–164. [Google Scholar] [CrossRef] [Green Version]
  16. Page, F.H., Jr.; Wooders, M.; Kamat, S. Networks and farsighted stability. J. Econ. Theory 2005, 120, 257–269. [Google Scholar] [CrossRef] [Green Version]
  17. Page, F.H., Jr.; Wooders, M. Strategic basins of attraction, the path dominance core, and network formation games. Games Econ. Behav. 2009, 66, 462–487. [Google Scholar] [CrossRef] [Green Version]
  18. Mauleon, A.; Vannetelbosch, V.; Vergote, W. von Neumann–Morgernstern farsightedly stable sets in two-sided matching. Theor. Econ. 2011, 6, 499–521. [Google Scholar] [CrossRef] [Green Version]
  19. Ray, D.; Vohra, R. The farsighted stable set. Econometrica 2015, 83, 977–1011. [Google Scholar] [CrossRef]
  20. Herings, P.J.J.; Mauleon, A.; Vannetelbosch, V. Stability of networks under horizon-K farsightedness. Econ. Theory 2019, 68, 177–201. [Google Scholar] [CrossRef] [Green Version]
  21. Demuynck, T.; Herings, P.J.J.; Saulle, R.D.; Seel, C. The myopic stable set for social environments. Econometrica 2019, 87, 111–138. [Google Scholar] [CrossRef]
  22. Jackson, M.O.; Watts, A. The evolution of social and economic networks. J. Econ. Theory 2002, 106, 265–295. [Google Scholar] [CrossRef] [Green Version]
  23. Lindquist, M.J.; Zenou, Y. Crime and networks: Ten policy lessons. Oxf. Rev. Econ. Policy 2019, 35, 746–771. [Google Scholar] [CrossRef]
  24. Jackson, M.O. Social and Economic Networks; Princeton University Press: Princeton, NJ, USA, 2008. [Google Scholar]
Figure 1. The 3-player criminal networks.
Figure 1. The 3-player criminal networks.
Games 12 00056 g001
Table 1. The elements of f K ( g ) { g } for 3-player criminal networks with B = 9 and ϕ = 1 .
Table 1. The elements of f K ( g ) { g } for 3-player criminal networks with B = 9 and ϕ = 1 .
g f 1 ( g ) f 2 ( g ) f K ( g ) , K 3
g 0 g 1 , g 2 , g 3 g 1 , g 2 , g 3 g 1 , g 2 , g 3 , g 7
g 1 , g 2 , g 3 g 7 g 7
g 4 g 1 , g 2 , g 7 g 1 , g 2 , g 7 g 1 , g 2 , g 3 , g 7
g 5 g 1 , g 3 , g 7 g 1 , g 3 , g 7 g 1 , g 2 , g 3 , g 7
g 6 g 2 , g 3 , g 7 g 2 , g 3 , g 7 g 1 , g 2 , g 3 , g 7
g 7
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Herings, P.J.-J.; Mauleon, A.; Vannetelbosch, V. Horizon-K Farsightedness in Criminal Networks. Games 2021, 12, 56. https://0-doi-org.brum.beds.ac.uk/10.3390/g12030056

AMA Style

Herings PJ-J, Mauleon A, Vannetelbosch V. Horizon-K Farsightedness in Criminal Networks. Games. 2021; 12(3):56. https://0-doi-org.brum.beds.ac.uk/10.3390/g12030056

Chicago/Turabian Style

Herings, P. Jean-Jacques, Ana Mauleon, and Vincent Vannetelbosch. 2021. "Horizon-K Farsightedness in Criminal Networks" Games 12, no. 3: 56. https://0-doi-org.brum.beds.ac.uk/10.3390/g12030056

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop