Next Article in Journal
Study of the Behavior of Cryptocurrencies in Turbulent Times Using Association Rules
Next Article in Special Issue
A Cooperative Network Packing Game with Simple Paths
Previous Article in Journal
Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
Previous Article in Special Issue
Differential Games for an Infinite 2-Systems of Differential Equations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Inspection—Corruption Game of Illegal Logging and Other Violations: Generalized Evolutionary Approach

by
Vassili N. Kolokoltsov
1,2
1
Department of Statistics, University of Warwick, Coventry CV4 7AL, UK
2
Higher School of Economics, University in Moscow, 109028 Moscow, Russia
Submission received: 2 June 2021 / Revised: 6 July 2021 / Accepted: 7 July 2021 / Published: 9 July 2021
(This article belongs to the Special Issue Mathematical Game Theory 2021)

Abstract

:
Games of inspection and corruption are well developed in the game-theoretic literature. However, there are only a few publications that approach these problems from the evolutionary point of view. In previous papers of this author, a generalization of the replicator dynamics of the evolutionary game theory was suggested for inspection modeling, namely the pressure and resistance framework, where a large pool of small players plays against a distinguished major player and evolves according to certain myopic rules. In this paper, we develop this approach further in a setting of the two-level hierarchy, where a local inspector can be corrupted and is further controlled by the higher authority (thus combining the modeling of inspection and corruption in a unifying setting). Mathematical novelty arising in this investigation involves the analysis of the generalized replicator dynamics (or kinetic equation) with switching, which occurs on the “efficient frontier of corruption”. We try to avoid parameters that are difficult to observe or measure, leading to some clear practical consequences. We prove a result that can be called the “principle of quadratic fines”: We show that if the fine for violations (both for criminal businesses and corrupted inspectors) is proportional to the level of violations, the stable rest points of the dynamics support the maximal possible level of both corruption and violation. The situation changes if a convex fine is introduced. In particular, starting from the quadratic growth of the fine function, one can effectively control the level of violations. Concrete settings that we have in mind are illegal logging, the sales of products with substandard quality, and tax evasion.

1. Introduction

Games of inspection and corruption are well developed in the game-theoretic literature; see, e.g., monographs [1,2,3,4] and reviews [5,6]. However, there are only a few publications that approach these problems from the evolutionary point of view. Paper [7] offers various insights, including some simple evolutionary models with evolutionarily stable strategies applied to the setting of corruption games. Another evolutionary approach to the games of corruption was suggested in [8], specifically for the setting of illegal logging, where, in order to fit to the classical evolutionary setting of pairwise games, it was assumed that arbitrary pairs of players can hire inspectors who can control their pairwise agreement (but can be corrupted).
In [9,10], a generalized evolutionary approach to various classes of models was developed, including the pressure and resistance framework, where a large pool of small players plays against a distinguished major player and evolves according to certain myopic rules. This approach led to the generalized replicator dynamics (RD) or, in a more physical language, kinetic equations (see details in the next Section), describing the dynamic law of large numbers for games of N players as N . The remaining points of these equations were shown to represent approximate Nash equilibria for games with a finite N (the games that we are actually interested in).
In this paper, we develop this approach further in a setting of the two-level hierarchy, where a local inspector can be corrupted and is further controlled by the higher authority (thus combining the modeling of inspection and corruption in a unifying setting). Applying the second level of control goes one step in the direction indicated by the famous question, “Who will guard the guardians?” addressed in the Nobel Prize lecture of L. Hurwicz [11].
One of the mathematical novelties arising in the present investigation involves the analysis of the generalized replicator dynamics (or kinetic equation) with switching, which occurs on the “efficient frontier of corruption”. Some general aspects of this development were initiated in [2], but there, only trivial examples of such switching were looked upon (like the generalized RD for the minority game).
In this paper, we specifically try to avoid complicated parameters that are difficult to observe or measure, in order to derive some clear practical consequences. In particular, we prove a result that can be called the “principle of quadratic fines”, which concerns the major tool of the mechanism design of the controlling authority, the fine function that specifies fines due from a detected violator depending on the level of violation. We show that if the fine for violations (both for criminal businesses and corrupted inspectors) is proportional to the level of violations (which is seemingly a common practice in many regulations), the stable rest points of the dynamics support the maximal possible level of both corruption and violation. The situation changes drastically if a convex fine is introduced. In particular, starting from the quadratic growth of the fine function, one can effectively control the level of violations. The convex fines bear analogy with progressive taxation. Furthermore, in line with the arguments of [7], our analysis suggests that it is difficult to expect the complete elimination of corruption, since full compliance with the regulations can hardly be achieved as a stable equilibrium. However, keeping the size of violations to some controlled values can be achieved well by a regulatory mechanism (without betaking to any draconian methods). Another conclusion arises from the possibility of having several distinct stable equilibria, meaning practically that with the identical regulations, the equilibrium outcomes can be quite different depending on the initial conditions (say, different social norms), and therefore copying the practices of successful peers may not necessarily lead to a success.
The major concrete setting that we have in mind represents illegal logging. An extensive discussion of the models for illegal logging can be found in [8], starting from the observation that “corruption is one of the most serious obstacles for ecosystem management and biodiversity conservation”. Illegal harvesting of forest trees has devastating consequences in many regions on Earth, from tropical rain forests of Brasil to conifer boreal forests of Russia. Legal logging is usually linked with additional investments that can sustainably provide ecosystem services, say, by new planting. Another setting, well fitted to our modeling, provides the selling of sub-standard-quality products making illegal savings on production. Examples are numerous. For instance, one can mention selling meat produced under non-hygienic condition in Europe (one can recall the scandal around the 2 Sisters Food Group in the UK in 2018) or selling substandard quality ice creams in some regions of Russia. Yet another group of examples comes from the problem of tax evasion. This is one of the most standard examples in the literature on corruption and inspection games. Here one analyzes the situations when, for a certain bribe, corrupted inspectors can accept false reports on the tax return.
The further content of the paper is as follows. In the next section, we briefly describe the generalized replicator dynamics arising in the framework of the pressure and resistance games, which we exploit here. Section 3 describes our game theoretic model introducing, in particular, the key notion of an efficient corruption frontier that effectively controls the possible spread of corruption. In Section 4, we analyze the switching kinetic equations in the case of a linear fine function, leading to our first major conclusion that linear fines are not effective: they support an infinite growth of illegal gains from violation and corruption. In Section 5, we derive our major conclusion: the principle of quadratic fines as explained above. In Section 6, some possible further developments are briefly outlined.

2. Preliminaries

We propose here a generalized evolutionary model that belongs to the general framework of pressure and resistance games developed in [10] (with preliminary results in [12] and additional details and examples in [2]). The pressure and resistance framework describes the game of many small players or agents, say N, with a principle (big player) I. It is supposed that small players are identical in the sense that each one of them has the same finite collection of strategies { 1 , , d } and they choose their strategies according to the same rule, such that the state of the group of small players is fully described by a collection ( n 1 , , n d ) of d non-negative integers with N = n 1 + + n d , where n i denotes the number of players adhering to the strategy i. We denote x i = n i / N and x = ( x 1 , , x d ) . It is assumed that the strategy of the big player I can be specified by a certain number b taking values from a subset of real numbers. One defines the game Γ N of N + 1 players by specifying certain payoffs B ( x , b , N ) to the principle I and R i ( x , b ) to each small player that adheres to the strategy i.
On the other hand, one can consider the process of myopic adjustment of the behavior of small players as a Markov chain on the set of the states ( n 1 , , n d ) , where a clock is attached to each pair of agents ( i , j ) with a ϰ / N -exponential random time (with some constant ϰ > 0 ), so that when the bell rings, the player i with a lower payoff R i ( x , b ) can change to the better strategy j with a higher payoff R j ( x , b ) with a probability proportional to R j ( x , b ) R i ( x , b ) . It is proven in [10] that, if
b * ( x , N ) = a r g max B ( x , b , N )
is well defined and b * ( x , N ) b * ( x ) , as N , and the functions R ( x , b ) , R ( x , b * ( x ) ) are Lipschitz continuous functions of their variables, then this Markov chain converges weakly, as N , to the deterministic process described by the following kinetic Equation (or generalized replicator dynamics RD):
x ˙ j = ϰ x j [ R j ( x , b * ( x ) ) R ¯ ( x , b * ( x ) ) ] = x j [ R j ( x , b * ( x ) ) i x i R i ( x , b * ( x ) ) ] .
It is also shown that, when functions R j ( x , b * ( x ) ) are just continuous (not necessarily Lipschitz, so that evolution (1) may not be well defined), the fixed points of these dynamics define approximate ϵ -Nash equilibria for the game Γ N . When functions R j ( x , b * ( x ) ) are Lipschitz, then ϵ is of order 1 / N . In [2], a generalization of this result was considered for some cases of piecewise continuous R j , where, in the points of discontinuity of R j , Equation (1) generalizes to the corresponding differential inclusions.
Of course kinetic, Equation (1) (as well as a classical RD) has a clear intuitive meaning independent of any Markov approximation. Therefore, equations of this kind are often used without explicit reference to the prelimiting Markov model, assuming (often tacitly) that they make sense only for a large population. However, we stress that we are eventually interested in the situation with a finite number of players and results from [10] provide quantitative estimates for the deviations from the law of large number limits.
It is seen that Equation (1) are generalized versions of the standard replicator dynamics (RD) of the evolutionary game theory (essentially, the latter are obtained when R ( x , b * ( x ) ) are linear functions in x). Similar equations can be obtained when considering generalized RD for games with a field; see, e.g., [13] for the latter.
Numerous examples of modeling under the pressure and resistance framework were given in [2,10] including modeling of inspection, corruption, counterterrorism, cyber-security, evolutionary coalition building, optimal allocations, and others.
For the general notions of game theory used throughout this paper, we refer to any text on the basic theory of game, see, e.g., [14,15].

3. Main Model

We assume that there is a large number M of firms or agents, which can violate the rules, or places, where a violation can occur. Violation can occur on several levels, resulting with the illegal (criminal) gain r j , j = 1 , , J , so that r 1 < r 2 < < r J . We also set r 0 = 0 , which corresponds to the strategy “refrain from violation”. We denote by V the number of violating agents, so that v = V / M is the fraction of violating agents. The state of the system can be described by the vector ( x 0 , x 1 , , x J ) , where x j is the fraction of agents adhering to the level of illegal gain r j , so that
j = 0 J x j = 1 , j = 1 J x j = v .
The average level of violation is
r ¯ = E r = j = 1 J r j x j .
Here and everywhere below, E denotes the expectation.
If detected, the illegal gain is supposed to be taken away from the agent, and the fine f ( r j ) is to be paid. A local inspector I is given some budget that allows her to detect each violation with some probability p. If an inspector is honest (strategy H), then a detected violator is fined. If an inspector is corrupted (strategy C), she just demands for herself the part α r j of the illegal gain.
Additionally, there is a central authority A, which eventually makes independent inspections in local areas. These inspections are of smaller scale. For simplicity, we assume that A makes one random check among the M firms, and hence A detects a violation with probability v = V / M . Under the condition that A detects a violation, the probability for any particular violator to be the one detected is about 1 / V = ϵ / v , where ϵ is small of order 1 / M .
Remark 1.
To get the limiting kinetic equation, we pass to the limit M . However, eventually, we are interested in the case of a finite M. Thus, with the aim of deriving from the limiting case the results for finite M, we can keep ϵ fixed of order 1 / M with a given M of interest.
If A detects an agent that violates the rules but was not detected by the local inspector I, then the agent just pays the corresponding fine, but nothing changes with I. If, however, A finds a violator that was previously detected by I and paid the bribe α r j to I in order to avoid paying the full fine f ( r j ) , then the detected agent pays the fine f ( r j ) , but I is also punished. Namely, in accordance with the most standard modeling of corruption games (see [5,6]), I loses the illegal profit α r j and pays the fine F ( α r j ) to A. Moreover, I has some standard salary w, but if detected in corruption, she gets a lower-level job with some reserve salary w 0 .
Let us now write the corresponding table of payoffs for the game of inspector I with an agent (possible violator) under two scenarios: A does not find a violation and otherwise. Note that the strategies of an agent include Refrain R from a violation and violations V j on various levels r j . Under the first condition, which occurs with probability 1 v , we have the table
Violator
I Refrain RViolate Vj
H w , 0 w , ( 1 p ) r j p f ( r j )
C w , 0 w + α p r ¯ , r j ( 1 p α )
because ( 1 p ) r j + p ( 1 α ) r j = r j ( 1 p α ) .
Under the second condition, which occurs with probability v, we have the table
Violator
I Refrain RViolate Vj
H w , 0 w , ( ϵ / v ) f ( r j ) + ( 1 ϵ / v ) [ ( 1 p ) r j p f ( r j ) ]
C w , 0 p ( w 0 E F ( α r ) ) + ( 1 p ) w , ( ϵ / v ) f ( r j ) + ( 1 ϵ / v ) r j ( 1 p α )
Here, E F ( α r ) = α j = 1 J x j r j is the expectation of the gain of an inspector arising from the corrupted behavior.
Thus, the total overall table of payoffs is
RViolate V j
H w , 0 w , ( 1 ϵ ) [ ( 1 p ) r j p f ( r j ) ] ϵ f ( r j )
C w , 0 ( 1 v ) ( w + α p r ¯ ) + v [ p ( w 0 E F ( α r ) ) + ( 1 p ) w ] , ( 1 ϵ ) r j ( 1 p α ) ϵ f ( r j )
The probability p can be modelled differently. It seems natural that the budget for local crime detection must be increased when the overall crime level increases, so that one can set
p = p 0 + β v
with some nonnegative constants p 0 and β such that p 0 + β 1 , which we adopt from now on.
Remark 2.
The result below will not be changed drastically if one assumes a simpler condition that p is a given constant, or more generally that p is an arbitrary increasing function of v.
The corruption is profitable for inspectors I if the average illegal surplus is positive. As is seen from the table, this is the case whenever
( 1 v ) ( w + α p r ¯ ) + v [ p ( w 0 E F ( α r ) ) + ( 1 p ) w ] w ,
that is, inside the corruption domain (which does not depend on p)
M c = { ( x 1 , , x J ) R + J : α r ¯ ( 1 v ) v E F ( α r ) v ( w w 0 ) } ,
which is bounded by the hyperplanes of the orthant R + J and the effective corruption frontier
Γ c = { ( x 1 , , x J ) R + J : α r ¯ ( 1 v ) v E F ( α r ) = v ( w w 0 ) } { 0 } .

4. Linear Fines

4.1. Corruption Frontier

The fine functions F ( r ) and f ( r ) represent the mechanism design of the central authority A. Let us start with the simplest linear functions
f ( r ) = f r , F ( r ) = F r
with some constants f and F.
In this case the corruption domain becomes
M c = { v 0 : α r ¯ ( 1 v v F ) v ( w w 0 ) } .
Thus, the condition of corruption simplifies to the condition
v ( 1 + F ) 1 v ( w w 0 ) α r ¯ .
and the effective corruption frontier becomes the surface (a hyperboloid)
Γ c = { ( x 1 , , x J ) R + J : α r ¯ ( 1 v v F ) v ( w w 0 ) = 0 } { 0 } ,
It is seen that for small v, the corruption is profitable, so the ideal point (no violation, no corruption) cannot be a stable equilibrium.

4.2. Partial Kinetic Equations

We shall now analyze separately the behavior of kinetic equations in two domains of interest: corruptive and non-corruptive inspector.
Recall that the state of the set M of agents is described by the vector ( x 0 , x 1 , , x J ) , specifying the fraction of agents using the strategies with violations r 0 = 0 , r 1 , , r J .
Inside the domain of corruption kinetic, Equation (1) takes the form
x ˙ j = ϰ x j ( r j r ¯ ) [ ( 1 ϵ ) ( 1 α p ) ϵ f ]
Since ϵ is negligibly small, we can write approximately 1 instead of 1 ϵ , so that the dynamics simplifies to
x ˙ j = ϰ x j ( r j r ¯ ) ( 1 α p ϵ f ) = ϰ x j ( r j r ¯ ) ( 1 α p 0 α β v ϵ f ) .
Remark 3.
Keeping 1 ϵ would just make the following formulas more lengthy, not change anything essential. Of course ϵ f is also small, but we keep it here, because ϵ f can be comparable with other small terms like α p 0 .
For the analysis, the following three cases must be considered:
( i ) 1 α p 0 ϵ f < 0 , ( i i ) 0 < 1 α p 0 ϵ f < α β , ( i i i )    1 α p 0 ϵ f > α β .
The case (i) is included here for completeness of the argument. Effectively we are interested in cases (ii), (iii). Since ϵ is of order 1 / M , to make ϵ f of order 1 (and to obtain (i)), an extremely high f should be chosen. These f will increase as M increases, and thus they cannot be chosen as the universal rule.
Remark 4.
We will not consider some (not interesting) additional details arising in the non-generic cases of equalities in cases (9).
Dynamics (8) has, as usual, the pure strategy fixed points X j (the corners of the simplex of probability measures on J + 1 points) with x j = 1 and other coordinate zeros. Additionally, in case (ii), it has the hyperplane of rest points with
v = 1 α p 0 ϵ f α β .
Around the point X j , we can choose J independent coordinates x i with i j and get
r ¯ = r j + k j x k ( r k r j ) ,
so that
x ˙ i = x i [ r i r j k j x k ( r k r j ) ] ( 1 α p 0 α β v s ϵ f ) .
If j 0 , in the linear approximation of small x i , this equation turns into the equation
x ˙ i = x i [ r i r j ] ( 1 α p 0 α β ϵ f ) .
In the case tht j = 0 , the linear approximation becomes
x ˙ i = x i r i ( 1 α p 0 ϵ f ) .
It is seen that whenever r i is neither maximum r J nor zero, this is a saddle point, so that for the search for stable rest points, these intermediate values can be always dismissed.
Lemma 1.
In case (iii), the point X J is the only stable rest point for (8). In case (ii), the points X 0 and X J are both repulsive, but the hyperplane of the rest points (10) is the global attractor for (8): starting from all points except X j , the solutions of (8) will tend to this hyperplane. In case (i), the rest point X 0 of honest behavior is the only stable point.
Proof. 
In case (iii), ( 1 α p 0 α β ϵ f ) > 0 and the r.h.s. of (11) is negative for j = J and all i (and only for this j). Hence, X J is stable. Similarly, in case (i), X 0 is the only stable rest point. In case (ii), both X 0 and X J are repulsive. Let us show that the hyperplane (10) is attracting by proving that the function
L = ( 1 α p 0 ϵ f v α β ) 2
can be taken as a Lyapunov function (that decreases along the trajectories). In fact,
d d t L = 2 ( 1 α p 0 ϵ f v α β ) α β d d t v = 2 ϰ ( 1 α p 0 ϵ f v α β ) 2 α β x 0 r ¯ = 2 ϰ x 0 r ¯ α β L ,
as required. □
Outside the corruptive domain, the kinetic Equation (1) takes the form
x ˙ j = ϰ x j ( r j r ¯ ) [ ( 1 ϵ ) ( 1 p ( 1 + f ) ) ϵ f ]
= ϰ x j ( r j r ¯ ) [ ( 1 ϵ ) ( 1 p 0 ( 1 + f ) ) ϵ f ( 1 ϵ ) β v ( 1 + f ) ] .
Again, writing approximately 1 instead of 1 ϵ , we get the dynamics
x ˙ j = ϰ x j ( r j r ¯ ) [ 1 p 0 ( 1 + f ) ϵ f β v ( 1 + f ) ] .
Similarly to the above, the dynamics distinguishes the following cases:
( i ) 1 ( 1 + f ) p 0 ϵ f < 0 , ( i i ) 0 < 1 ( 1 + f ) p 0 ϵ f < ( 1 + f ) β , ( i i i ) 1 ( 1 + f ) p 0 ϵ f > ( 1 + f ) β .
Analogously to Lemma 1, we get the following result.
Lemma 2.
In case (iii), the point X J is the only stable rest point for (13). In case (ii), the points X 0 and X J are both repulsive, but the hyperplane of the rest points
v = 1 ( 1 + f ) p 0 ϵ f ( 1 + f ) β
is the global attractor for (13) (outside the points X j ). In case (i), the rest point X 0 of honest behavior is the only stable point.

4.3. Full Switching Dynamics for J = 1

Let us now look at the full switching dynamics, which evolves according to (8) inside the corruption domain M c and according to (13) outside M c .
Remark 5.
We do not bother with the exact description of the dynamics exactly on the switching corruption frontier because it does not affect our results in any substantial way. To make a full description of the dynamics, one can either smooth it in an arbitrary small neighborhood of the frontier (and thus avoid all problems with nonsmoothness), or work in the framework of differential inclusions (as suggested in [2] in a similar setting), where the r.h.s. of a differential equation in a point of discontinuity is substituted by the convex hull of all left and right limits.
Let us first look at the simplest case of only one level of violation, that is, when J = 1 , r 1 = r and v = x 1 . In fact, the case already captures the main qualitative results that we shall point out in this paper.
In this case, the corruption domain becomes
M c = { v 0 : α r ( 1 v ( 1 + F ) ) ( w w 0 ) } R + .
It is given by the condition
v v c = 1 1 + F 1 w w 0 r α ,
so that the frontier turns to one point v = v c .
In particular, corruption is possible only if
α r > w w 0 ,
which is quite natural (the illegal gain of inspectors exceeds possible losses) and indicates already that corruption is profitable for large illegal profits.
The remaining hyperplanes of kinetic equations in corruptive and non-corruptive (honest) domains, given by Lemmas 1 and 2, turn correspondingly to the points
v r c = 1 α p 0 ϵ f α β , v r h = 1 ( 1 + f ) p 0 ϵ f ( 1 + f ) β .
We note that
v r h < v r c ϵ f < 1 .
The total switching dynamics is given by (8) and (13) in the corruptive domain M c and outside it, respectively. Its behavior is determined by the relative positions of the points v c , v r c , v r h as described by the following result.
We shall discuss in detail only the most interesting case when (ii) holds in (9) and (14). The case (i) was already dismissed as a not very relevant one. Furthermore, in case (iii), the corner point X J = X 1 takes the role of the corresponding rest points v r c or v r h .
Theorem 1.
Assume that (18) and the cases (ii) in both (9) and (14).
(i) If v r c < v c < v r h , then there are two stable rest points of the switching dynamics, namely v r c and v r h , which are attracting for the starting points in the domains 0 < v < v c and 1 > v > v c , respectively.
(ii) If v c < v r c < v r h , then there is only one stable rest point of the switching dynamics, namely v r h , which is the global attractor (for all starting points except the rest corners v = 0 and v = 1 ).
(iii) If v r h < v c , then there is only one stable rest point of the switching dynamics, namely min ( v c , v r c ) , which is the global attractor (for all starting points except the rest corners v = 0 and v = 1 ).
Proof. 
Case (i) is straightforward. In case (ii), all points starting at v < v c will move right in the direction of v r c until they reach v c . At this point, the dynamics will be switched to the non-corruptive domain and will move further toward v r h . In case (iii), for v < v c , two cases must be distinguished: v r c < v c and v c < v r c . In the first case, the points v < v c will move towards v c r according to the corruptive branch of the dynamics, and all points v > v c will first move left towards v r according to the non-corruptive branch of the dynamics until they reach v c ; then, they switch to the corruptive branch and continue moving towards v r c . If v c < v r c , then all points v < v c will move towards v c by the corruptive branch, and all points v > v c will move towards v c by the non-corruptive branch. □
The key conclusion is that the rest points do not depend essentially on the level of corruption r (the point v c converges to 1 / ( 1 + F ) , as r ). This means that the mechanism design with linear fine functions supports infinite growth r v c of losses due to violations and/or corruption.

4.4. A Numeric Example

Assume we have M = 20 agents in a local area, so that ϵ = 1 / 20 . Assume that, by the “social norms” of corruption, a corrupted inspector requires α = 1 / 4 of the illegal profit of a violator. Let the routine inspections in the area detect violations with the basic probability p 0 = 1 / 2 , which increases to p = p 0 + v / 2 , when the rate of violation v is expected. Let the difference in the salaries of an inspector and the reserve salary be w w 0 = 5000 dollars.
The mechanism design of the government consists in choosing the coefficients f and F. As is shown below, the value of f is not very essential. Namely, assume that f lies somewhere in the interval [ 1 , 10 ] . Then
v r c = 1 1 8 f 20 1 8 · 1 2 > 1 , v r h = 1 1 2 ( 1 + f ) f 20 1 2 ( 1 + f ) < 0 ,
so that, according to Theorem 1 (iii), the only stable point of the dynamics is the effective frontier of corruption
v c = 1 1 + F 1 20000 r ,
if this v c belongs to [ 0 , 1 ] . This occurs when the amount of illegal profit exceeds 20 thousand.
Therefore, the corruption becomes profitable for the inspector when r > 20,000, in which case the illegal gains, due to violations and corruption, equal r v c in equilibrium, supporting the maximal available level of violation r.
According to a result from [10] mentioned after Equation (1), the equilibrium value v c M for the actual game of M = 20 players differs from the equilibrium of the limiting evolution v c by amount of order 1 / M , that is, by 5 % , which is not very large.

4.5. Full Switching Dynamics for Arbitrary J

Let us see what modifications arise for an arbitrary J. Taking into account the condition for corruption (18), it is natural to assume that
α r j > w w 0 , j > 0 .
Remark 6.
One sees that if (20) is reversed for all j, then corruption again becomes unprofitable. If inequalities (20) hold for some j, the analysis of corruption can be performed, showing that the levels of r j that do not satisfy this condition do not essentially influence the behavior of the system.
Under (20), the corruption frontier (7) is separated from the origin and becomes the part of the hyperboloid
α j > 1 r j x j 1 ( 1 + F ) j > 1 x j j > 1 x j ( w w 0 ) = 0 ,
lying in R + J { 0 } that intersects the coordinate axes of R J in the points Y j that have zero coordinates of indices i j and the jth coordinate
y j = 1 1 + F 1 w w 0 α r j .
Notice that y 1 < y 2 < < y J .
Equation (21) can be also written as expressing r ¯ in terms v = j > 0 x j :
r ¯ = v ( w w 0 ) 1 ( 1 + F ) v .
The key property of this hyperboloid is that the function (22) is a strictly increasing function of v. This allows us to get the multidimensional version of Theorem 1. Of course, there are more cases on the various relationships between the three key surfaces: the corruption frontier Γ c and the remaining hyperplanes v r h and v r c (with some abuse of notation, we denote by the same letter, say v r h , both the corresponding value of v and the hyperplane { v : v = v r h } ).
The most straightforward cases arise when the points v r c and v r h are separated from the interval ( y 1 , y J ) . Then we get following result.
Theorem 2.
Assume (20) holds.
(i) If v r c y 1 < y J v r h , then there are two stable hyperplanes of rest points of the switching dynamics, namely v r c and v r h , which are attracting for the starting points in the corruption domains M c and in R + J M c (that is, from below and from above the efficient frontier), respectively.
(ii) If y J v r c < v r h , then there is only one stable hyperplane of rest points of the switching dynamics, namely v r h , which is the global attractor (for all starting points except the rest corners X j ).
(iii) If v r h y 1 < y J v r c , then the corruption frontier Γ c is the global attractor for the switching dynamics (for all starting points except the rest corners).
The case (iii) with J = 2 and v r h < y 1 < y 2 = v r c is illustrated in Figure 1. The corruption frontier is given by the curve (actually a part of a hyperbola) connecting the points ( 0 , y 2 ) and ( y 1 , 0 ) .
When various intersections occur, they are also treated as in Theorem 1. Let us consider just one of the cases.
Theorem 3.
Assume (20) holds, and let v r h y 1 < v r c < y J . Then the global attractor is the boundary of the set
M c { ( x 1 , x J ) : v v r c } ,
more precisely, the part of this boundary where either v = v r c or ( x 1 , , x J ) Γ c .
The case with J = 2 and v r h < y 1 < v r c < y 2 is illustrated in Figure 2. The global attractor consists of the part of a line v = v r c joining the points ( 0 , v r c ) and A and the part of the corrupted frontier joining the points A and ( y 1 , 0 ) .
The main conclusion remains the same: linear fine functions support infinite growth of illegal gains on violations and/or corruption.

5. Power-Type Fines

Let us assume now that the fine functions are of power type:
f ( r ) = f r γ , F ( r ) = F r γ ,
with some positive constants f , F , γ . We shall also reduce attention to the case γ > 1 ; that is, to the case of convex power functions.
For simplicity, we reduce the discussion to the case of one level of violation only: J = 1 , r 1 = r , and v = x 1 .
Remark 7.
As for the linear fines, the general case creates more complicated (quite curious in fact) geometry of the efficient frontier, but our major qualitative conclusion remains the same. The new feature of nonlinear fines for J > 1 is that the rest points never form continuous surfaces (like hyperplanes) and are concentrated on two strategies (with only two x i non-vanishing). In a slightly different setting, this effect was discussed in [9].
In this case, the corruption domain becomes
M c = { v 0 : α v r ( 1 v ) v 2 F α γ r γ v ( w w 0 ) } ,
so that it is determined by the inequality
v v c = 1 1 + F ( α r ) γ 1 1 w w 0 r α .
Therefore, the corruption frontier v c decreases as r grows, unlike the linear case.
The kinetic equation in the corruption domain becomes (again in our usual approximation with 1 instead of 1 ϵ )
v ˙ . = v ( 1 v ) r [ 1 p 0 α α β v ϵ f r γ 1 ]
and outside the corruptive domain, it is
v ˙ = v ( 1 v ) r [ 1 p 0 f r γ 1 ( p 0 + ϵ ) v β ( 1 + f r γ 1 ) ] .
The analogs of (9) now depend on r. We must consider the cases
( i ) 1 α p 0 ϵ f r γ 1 < 0 , ( i i ) 0 < 1 α p 0 ϵ f r γ 1 < α β , ( i i i ) 1 α p 0 ϵ f r γ 1 > α β .
for the corruption branch of the dynamics and the cases
( i ) 1 p 0 f r γ 1 ( p 0 + ϵ ) < 0 , ( i i ) 0 < 1 p 0 f r γ 1 ( p 0 + ϵ ) < β ( 1 + f r γ 1 ) , ( i i i ) 1 p 0 f r γ 1 ( p 0 + ϵ ) > β ( 1 + f r γ 1 ) .
for the non-corruption branch of the dynamics.
The corresponding analogs of Lemmas 1 and 2 are valid:
Lemma 3.
For the evolution (25) in the corrupted domain, the following holds true. In case (iii) of (27), the point X 1 is the only stable rest point. In case (ii), the points X 0 and X J are both repulsive, but the rest point
1 α p 0 ϵ f r γ 1 α β
is the global attractor. In case (i), the rest point X 0 of honest behavior is the only stable point.
Lemma 4.
For the evolution (26) outside the corrupted domain, the following holds true. In case (iii) of (28), the point X 1 is the only stable rest point. In case (ii), the points X 0 and X 1 are both repulsive, but the rest point
1 p 0 f r γ 1 ( p 0 + ϵ ) β ( 1 + f r γ 1 )
is the global attractor (outside the points X j ). In case (i), the rest point X 0 of honest behavior is the only stable point.
Turning to the full switching dynamics, we observe first of all that if
r > r c = 1 α p 0 ϵ f 1 / ( γ 1 ) ,
then the no-violation rest point v = 0 is the unique stable point for the dynamics in corruption domain, and if
r > r h = 1 p 0 ( ϵ + p 0 ) f 1 / ( γ 1 ) ,
then the no-violation rest point v = 0 is the unique stable point for the dynamics in the domain of honest inspectors. It is seen by inspection (as ought to be expected) that r c > r h . Therefore, r c is an upper bound for the costs of violation. However, this bound is not universal, because it increases with ϵ 0 .
Next, for r < r c it follows that the point
v r c = min 1 , 1 α p 0 ϵ f r γ 1 α β
is the unique stable fixed point for the dynamics (25), and for r < r h , it follows that the point
v r h = min 1 , 1 p 0 f r γ 1 ( p 0 + ϵ ) β ( 1 + f r γ 1 )
is the unique stable fixed point for the dynamics (25).
Now we are in the same setting, as in Theorem 1, though with different parameters. Hence we can directly conclude that the following result holds.
Theorem 4.
Assume that r < r c .
(i) If r > r h , then the unique stable rest point for the total switching dynamics is min ( v c , v r c ) .
(ii) If r r h , then the results of Theorem 1 hold with v r c , v r h , v c given by (31), (32), (24), respectively.
We can now derive our main conclusion. By (30) (and assuming p 0 > 0 ), the maximal illegal profit under no corruption of inspectors is universally bounded for any γ > 1 , and this bound can be effectively controlled by the choice of f and p 0 (uniformly for all ϵ ). The level of corruption cannot go beyond v c given by (24), which decreases with the growth of illegal profit r for any γ > 1 . However, the bound for the illegal profit r v c still increases as long as γ < 2 . Furthermore, we are led to the principle of quadratic fines: Starting from the power γ = 2 , the illegal profit r v c becomes universally bounded, and the bound can be effectively controlled by the choice of F.
Under all conditions of the example of Section 4.4, but in the case of a quadratic fine, we find that
v c = 1 1 + F r / 4 1 20000 r ,
so that the total loss to society from violation and corruption in the equilibrium point v c will be
r v c = 4 F + 4 / r 1 20000 r 4 F ,
which can be effectively controlled by the choice of F.

6. Further Perspectives

We present our model in the simplest case in order to illustrate the main conclusions in the most transparent way. Let us point out to possible further developments.
Firstly, we considered the parameter α (the proportion of bribes) as an exogenous parameter (kind of “social norm for corruption”). It seems natural to develop second-level kinetic equations describing the evolutionary changes to the behavior of a large pool of inspectors as playing with the authority A (and assuming that the violators adhere to their equilibrium strategies). The various strategies of inspectors can be enriched from the two considered (Honest and Corrupt) to the various levels of corruption specified by various levels of α . I expect that the evolutionary dynamics will drive α to the highest possible levels.
Secondly, more detailed description of the switching kinetic equations for arbitrary J and an arbitrary convex fine functions can be of interest. This investigation can also include the continuous case of levels r taken from some finite interval [ r m i n , r m a x ] .
Thirdly, our analysis was based on the stable points of the limiting dynamics, which eventually specify the long-term behavior of this limiting dynamics. Of interest is the long-term behavior of the corresponding prelimiting Markov chain of M players. One can conjecture that, in the large time limit, it will converge to some stationary distribution, with support around the attractors of the kinetic equations.
Fourthly, we assumed that the central authority A makes just one random check in each local area. It is natural to extend the analysis to the case when the number of local checks is any small (compared to M) number.
Fifthly, our inspectors were supposed to act with the best response to instantaneous adjustments. It is, of course, natural to assume that they act strategically, with some planning horizon in mind. This would lead to a more complicated problem of coupled kinetic equations with the optimal policy of inspectors. A general theory of such a coupling was developed in Chapter 3 of [2] and may be applied in the present setting.
The author believes that the principle of quadratic fine is sufficiently robust and will manifest itself in all of these extensions.

Funding

The article was prepared in the framework of a research grant funded by the Ministry of Science and Higher Education of the Russian Federation (grant ID: 075-15-2020-928).

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Avenhaus, R.; Krieger, T. Inspection Games over Time. Fundamental Models and Approaches; Forschungszentrum Jülich GmbH Zentralbibliothek: Jülich, Germany, 2020. [Google Scholar]
  2. Kolokoltsov, V.N.; Malafeyev, O.A. Many Agent Games in Socio-Economic Systems: Corruption, Inspection, Coalition Building, Network Growth, Security; Springer Series in Operations Research and Financial Engineering; Springer Nature: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
  3. Rose-Ackerman, S. Corruption and Government: Causes, Consequences and Reforms; Cambridge University Press: Cambridge, UK, 1999. [Google Scholar]
  4. Vasin, A.A. Noncooperative Games in Nature and Society; MAKS Press: Moscow, Russia, 2005. (In Russian) [Google Scholar]
  5. Aidt, T.S. Economic Analysis of corruption: A survey. Econ. J. 2009, 113, F632–F652. [Google Scholar] [CrossRef]
  6. Jain, A.K. Corruption: A review. J. Econ. Surv. 2001, 15, 71–121. [Google Scholar] [CrossRef]
  7. Mishra, A. Persistence of Corruption: Some Theoretical Perspectives. World Dev. 2006, 34, 349–358. [Google Scholar] [CrossRef]
  8. Lee, J.-H.; Sigmund, K.; Dieckmann, U.; Iwasa, Y. Games of corruption: How to suppress illegal logging. J. Theor. Biol. 2015, 367, 1–13. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  9. Katsikas, S.; Kolokoltsov, V.; Yang, W. Evolutionary inspection and corruption games. Games 2016, 7, 31. [Google Scholar] [CrossRef] [Green Version]
  10. Kolokoltsov, V. The evolutionary game of pressure (or interference), resistance and collaboration (2014). MOR 2017, 42, 915–944. [Google Scholar] [CrossRef] [Green Version]
  11. Hurwicz, L. However, Who Will Guard the Guardians? Nobel Prize Lecture. 2007. Available online: www.nobelprize.org (accessed on 2 January 2021).
  12. Kolokoltsov, V.N. Nonlinear Markov games on a finite state space (mean-field and binary interactions). Int. J. Stat. Probab. 2012, 1, 77–91. [Google Scholar] [CrossRef]
  13. Webb, J. Game Theory. Decisions, Interactions and Evolutions; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  14. Kolokoltsov, V.N.; Malafeyev, O.A. Understanding Game Theory, 2nd ed.; World Scientific: Singapore, 2020. [Google Scholar]
  15. Mazalov, V.V. Mathematical Game Theory and Applications; John Wiley: Hoboken, NJ, USA, 2014. [Google Scholar]
Figure 1. Corruption frontier for Theorem 2(iii).
Figure 1. Corruption frontier for Theorem 2(iii).
Mathematics 09 01619 g001
Figure 2. Global attractor for Theorem 3.
Figure 2. Global attractor for Theorem 3.
Mathematics 09 01619 g002
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kolokoltsov, V.N. Inspection—Corruption Game of Illegal Logging and Other Violations: Generalized Evolutionary Approach. Mathematics 2021, 9, 1619. https://0-doi-org.brum.beds.ac.uk/10.3390/math9141619

AMA Style

Kolokoltsov VN. Inspection—Corruption Game of Illegal Logging and Other Violations: Generalized Evolutionary Approach. Mathematics. 2021; 9(14):1619. https://0-doi-org.brum.beds.ac.uk/10.3390/math9141619

Chicago/Turabian Style

Kolokoltsov, Vassili N. 2021. "Inspection—Corruption Game of Illegal Logging and Other Violations: Generalized Evolutionary Approach" Mathematics 9, no. 14: 1619. https://0-doi-org.brum.beds.ac.uk/10.3390/math9141619

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop