1,656 research outputs found

    Tax Compliance and Public Goods Provision -- An Agent-based Econophysics Approach

    Full text link
    We calculate the dynamics of tax evasion within a multi-agent econophysics model which is adopted from the theory of magnetism and previously has been shown to capture the main characteristics from agent-based based models which build on the standard Allingham and Sandmo approach. In particular, we implement a feedback of public goods provision on the decision-making of selfish agents which aim to pursue their self interest. Our results imply that such a feedback enhances the moral attitude of selfish agents thus reducing the percentage of tax evasion. Two parameters govern the behavior of selfish agents, (i) the rate of adaption to changes in public goods provision and (ii) the threshold of perception of public goods provision. Furtheron we analyze the tax evasion dynamics for different agent co mpositions and under the feedback of public goods provision. We conclude that policymakers may enhance tax compliance behavior via the threshold of perception by means of targeted public relations.Comment: 28 pages, 3 figures, accepted for publication in the Central European Journal of Economic Modelling and Econometric

    Income tax evasion dynamics: Evidence from an agent-based econophysics model

    Get PDF
    We analyze income tax evasion dynamics in a standard model of statistical mechanics, the Ising model of ferromagnetism. However, in contrast to previous research, we use an inhomogeneous multi-dimensional Ising model where the local degrees of freedom (agents) are subject to a specific social temperature and coupled to external fields which govern their social behavior. This new modeling frame allows for analyzing large societies of four different and interacting agent types. As a second novelty, our model may reproduce results from agent-based models that incorporate standard Allingham and Sandmo tax evasion features as well as results from existing two-dimensional Ising based tax evasion models. We then use our model for analyzing income tax evasion dynamics under different enforcement scenarios and point to some policy implications. --tax evasion,tax compliance,Ising Model,econophysics,numerical simulation

    Data mining for detecting Bitcoin Ponzi schemes

    Full text link
    Soon after its introduction in 2009, Bitcoin has been adopted by cyber-criminals, which rely on its pseudonymity to implement virtually untraceable scams. One of the typical scams that operate on Bitcoin are the so-called Ponzi schemes. These are fraudulent investments which repay users with the funds invested by new users that join the scheme, and implode when it is no longer possible to find new investments. Despite being illegal in many countries, Ponzi schemes are now proliferating on Bitcoin, and they keep alluring new victims, who are plundered of millions of dollars. We apply data mining techniques to detect Bitcoin addresses related to Ponzi schemes. Our starting point is a dataset of features of real-world Ponzi schemes, that we construct by analysing, on the Bitcoin blockchain, the transactions used to perform the scams. We use this dataset to experiment with various machine learning algorithms, and we assess their effectiveness through standard validation protocols and performance metrics. The best of the classifiers we have experimented can identify most of the Ponzi schemes in the dataset, with a low number of false positives

    Model Replication in the Context of Agent-Based Simulation: Lessons Learnt from Two Case Studies

    Get PDF
    This paper examines model replication in the context of agent-based simulation through two case studies. Replication of a computational model and validation of its results is an essential tool for scientific researchers, but it is rarely used by modelers. In our work we address the question of validating and verifying simulations in general, and summarize our experience in approaching different models through replication with different motivations. Two models are discussed in details. The first one is an agent-based spatial adaptation of a numerical model, while the second experiment addresses the exact replication of an existing economic model

    A simulation-driven approach to non-compliance

    Get PDF
    This dissertation proposes a methodological framework for the use of simulation-based methods to investigate questions of non-compliance in a legal context. Its aim is to generate observed or previously unobserved instances of non-compliance and use them to improve compliance and trust in a given socio-economic infrastructure. The framework consists of three components: a normative system implemented as an agent-based model, a profit-driven agent generating instances of non-compliance, and a formalization process transforming the generated behavior into a formal model.The most sophisticated ways of law-breaking are typically associated with economic crime. For this reason, we investigated three case studies in the financial domain. The first case study develops an agent-based model investigating the collective response of compliant agents to market disturbances originated by fraudulent activity, as during the U.S. subprime mortgage crisis in 2007. The second case study investigates the price evolution in the Bitcoin market under the influence of the price manipulation that occurred in 2017/18. The third case study investigates Ponzi schemes on smart contracts. All case studies showed a high level of agreement with qualitative and quantitative observations. Identification, extraction, and formalization of non-compliant behavior generated via simulation is a central topic in the later chapters of the thesis. We introduce a method that considers fraudulent schemes as neighborhoods of profitable non-compliant behavior. We illustrate the method on a grid environment with a path-finding agent. This simplified case study has been chosen as it captures fundamental features of non-compliance, yet, further generalization is needed for real-world scenarios

    A simulation-driven approach to non-compliance

    Get PDF
    This dissertation proposes a methodological framework for the use of simulation-based methods to investigate questions of non-compliance in a legal context. Its aim is to generate observed or previously unobserved instances of non-compliance and use them to improve compliance and trust in a given socio-economic infrastructure. The framework consists of three components: a normative system implemented as an agent-based model, a profit-driven agent generating instances of non-compliance, and a formalization process transforming the generated behavior into a formal model.The most sophisticated ways of law-breaking are typically associated with economic crime. For this reason, we investigated three case studies in the financial domain. The first case study develops an agent-based model investigating the collective response of compliant agents to market disturbances originated by fraudulent activity, as during the U.S. subprime mortgage crisis in 2007. The second case study investigates the price evolution in the Bitcoin market under the influence of the price manipulation that occurred in 2017/18. The third case study investigates Ponzi schemes on smart contracts. All case studies showed a high level of agreement with qualitative and quantitative observations. Identification, extraction, and formalization of non-compliant behavior generated via simulation is a central topic in the later chapters of the thesis. We introduce a method that considers fraudulent schemes as neighborhoods of profitable non-compliant behavior. We illustrate the method on a grid environment with a path-finding agent. This simplified case study has been chosen as it captures fundamental features of non-compliance, yet, further generalization is needed for real-world scenarios

    Supply Chain Based Solution to Prevent Fuel Tax Evasion: Proof of Concept Final Report

    Get PDF
    The goal of this research was to provide a proof-of-concept (POC) system for preventing non-taxable (non-highway diesel use) or low-taxable (jet fuel) petrochemical products from being blended with taxable fuel products and preventing taxable fuel products from cross-jurisdiction evasion. The research worked to fill the need to validate the legitimacy of individual loads, offloads, and movements by integrating and validating, on a near-real-time basis, information from global positioning system (GPS), valve sensors, level sensors, and fuel-marker sensors

    Panoptic dual-use management: preventing deliberate pandemics in an age of synthetic biology and artificial intelligence

    Get PDF
    Powerful new technologies can have profound global security implications. In this thesis, I investigate how advances in synthetic biology and artificial intelligence could have dual-use potential and enable the deliberate release of pandemic pathogens. I review risks from synthetic biology based on case studies on wildlife virus discovery, viral engineering for vaccine design, and viral engineering for gene therapy. For assessing impacts of artificial intelligence, I consider large language models and biodesign tools. I find that related advances can create new methods to engineer pathogens and make such capabilities increasingly accessible to non-specialists. These risks are not well captured by existing risk mitigation measures. I argue that the management of dual-use virological research is currently defined by oversight of individual research projects. This is effective for addressing high-risk research but fails to address risks from a more diffuse set of research and technologies with dual-use potential. To help mitigate these risks, I introduce the idea of panoptic dual-use management. Inspired by methodologies to reduce carbon emissions, panoptic dual-use management involves treating associated dual-use risks as negative externalities and creating appropriate incentives so they are accounted for in decisions between projects. I explore ways in which such incentives could be created for various stakeholders. For instance, funding bodies could use dual-use risks as a tiebreaker between projects on the brink of getting funded, a practice which would incentivise researchers to preferentially propose projects with lower dual-use risks. To realise this proposal, I sketch out a framework for assigning tiered dual-use scores to virological research. I conclude by highlighting the importance of combining different dual-use management approaches across stakeholders and geographies to establish an effective complex of overlapping mitigation regimes
    • …
    corecore