Electronic Commerce Research and Applications
An economic model of optimal fraud control and the aftermarket for security services in online marketplaces
Introduction
Creating markets is a mainstay of dotcom business models (Kambil and Heck 2002). While the extensive listings of tradable goods and powerful search technologies make online markets liquid,1 the electronic media connecting trading participants and sharing quality information remains lean. With direct trades between unknown customers over great distances, online transactions are vulnerable to many types of fraudulent conduct.2 The main reason that the online marketplace easily attracts fraud originates from a unique characteristic of Internet transactions. Under considerable information asymmetry – the uncertainty of trader identity and the uncertainty of merchandise quality – online trade allows sellers or buers to easily engage in opportunistic behavior (Klein and Leffler 1981).
One way to directly resolve fraudulent actions in anonymous markets is lowering the uncertainty of identity through disclosure of private information, which makes individuals identifiable (Culnan and Armstrong 1999). The anonymity of the Internet is a double-edged sword, however. Honest traders may prefer this characteristic for the protection of their privacy, while opportunistic people take advantage of it to commit fraud. If the practices of an online business raise privacy concerns resulting in a perception that customers must reveal too much personal information or that the information may be used unfairly, customers unwilling to disclose additional personal information may spread bad word-of-mouth (Culnan and Armstrong 1999). The result may be that businesses will have difficulty attracting new customers, which can negatively impact the bottom line.
Online marketplaces need to do a very tricky balancing act, mitigating the opportunity costs of electronic transactions that result from anonymity while protecting the privacy of the majority of their customers. This issue presents possible conflict between strict security control and infringement of consumer privacy, as discussed by prior studies (Culnan and Armstrong 1999, Rowland 2000). However, we go further by identifying the business value of security services (e.g., escrow services) for online marketplaces and explore the possibility that market risk is intentionally under-controlled and strategically utilized according to the revenue structure.
We pay attention to the fact that security services that insure traders against transaction risk may not only be good ex post measures against the risk of online fraud but also a very sizable revenue source for online marketplaces. For example, eBay integrated both trading and escrow services when it took over PayPal in July 2002 and eBay’s recent good business performance is largely attributed to PayPal (Cullen 2007).3 Note that imposition of excessively austere privacy controls not only incites online users’ privacy concerns but also gives them less incentive to adopt security services due to reduced market risk (Antony et al. 2006, Zhang et al. 2007). However, loosely controlled market risk brings about more opportunity for online fraud. Therefore, when an online marketplace provides in-house security services along with basic transaction services, its decision on the preventative privacy controls is complicated by the issues of privacy concern and the promotion of security services.
We are primarily concerned with how the integration of transaction and security services distorts online market decisions on privacy controls from social optimality. In other words, this study examines the conditions under which the provision of security services should be integrated with an online marketplace or independently managed by third parties. Given that online commerce is claiming a rapidly growing share of worldwide business, and customers have concerns about security and privacy, we believe that this is a very pressing research question.
Section snippets
The economics of preventative fraud control and ex post security measures
For the control of crime, we find two alternatives from the criminal sociology literature (Gopal and Sanders 1997) – preventative measures and deterrent controls. The former increases the ex ante cost of crime by dissuading potential offenders from crimes in the first place, while the latter dissuades criminal intent with the ex post threat of legal sanctions, which are costly. Thus, the socially optimal choice of controls will be those that minimize the social loss from crime – the sum of
Model
We assume that there are two types of traders in the online marketplace. Both types include sellers and buyers. Some of them are opportunistic and the others are honest. We normalize the total user base to 1 and let the portion of opportunistic traders be β (0 ⩽ β ⩽ 1). Again, please refer to Table A1, which includes all of the modeling notation for this paper.
There are three kinds of strategies for online traders: normal transactions, fraudulent transactions, or no transaction, which are denoted
Results and implications
In this section, we investigate the optimal level of preventative privacy control for integrated (IOM) and unintegrated online marketplaces (UOM). We investigate the socially optimal market structure by comparing the welfare outcomes. We denote the optimal privacy control in each case as , and αw∗. Superscripts m and w indicates whether the privacy control is for the optimality of an onlinemarketplace or for the optimality of social welfare. Subscript i denotes the online marketplace,
Conclusion
The characteristics of online transactions – anonymity, low transaction cost, and the difficulties in detection – stimulate online fraud. In order to cope with the risk of anonymity in online transactions, markets can adopt privacy controls that require a certain level of identity disclosure. However, a complicated issue is created by combining online traders’ privacy concerns and the business value of security services. Hence, online marketplaces need to achieve a balancing act in handling
Acknowledgements
This research was supported by a special research grant from Seoul Women’s University (2010). The authors thank the anonymous reviewers, Charles Wood and Rob Kauffman, who are the associate editor and the editor-in-chief of this journal, for providing a lot of helpful comments.
References (30)
- et al.
Determinants of escrow service adoption in consumer-to-consumer online auction market: an experimental study
Decision Support Systems
(2006) - et al.
Rational cooperation in the finitely repeated prisoners’ dilemma
Journal of Economic Theory
(1982) - et al.
Warranties, extended warranties and product quality
International Journal of Industrial Organization
(1998) - et al.
Monopoly and product quality
Journal of Economic Theory
(1978) - Acquisti, A. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM...
The market for lemons: quality uncertainty and the market mechanism
Quarterly Journal of Economics
(1970)Crime and punishment: an economic approach
Journal of Political Economy
(1968)- et al.
Frictionless commerce? a comparison of internet and conventional retailers
Management Science
(2000) - et al.
Fighting internet auction fraud: an assessment and proposal
IEEE Computer Society
(2004) - et al.
Software piracy: a strategic analysis of protection
Management Science
(1991)
Product warranties and double moral hazard
RAND Journal of Economics
Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation
Organization Science
Warranties, durability and maintenance: two-sided moral hazard in a continuous-time model
Review of Economic Studies
Cited by (5)
Business analytics in E-commerce: a literature review
2021, Journal of Industrial Integration and ManagementModel of the internet escrow’s legal regulation as a factor of efficiency of its use in e-commerce
2020, Advances in Intelligent Systems and ComputingBased big data analysis of fraud detection for online transaction orders
2015, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICSTAn examination of trust assurances adopted by top internet retailers: unveiling some critical determinants
2014, Electronic Commerce Research