Next Article in Journal
Leveraging Possibilistic Beliefs in Unrestricted Combinatorial Auctions
Previous Article in Journal
Simulating the Impact of Crossover Kidney Transplantation on the Nord Italia Transplant Program
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Evolutionary Inspection and Corruption Games

1
Centre for Complexity Science, University of Warwick, Coventry CV4 7AL, UK
2
Department of Statistics, University of Warwick, Coventry CV4 7AL, UK
3
Institute of Informatics Problems of the Russian Academy of Sciences (IPI RAN), Vavilova, Moscow 119333, Russia
4
Risk Methodology, Santander UK plc, London NW1 3AN, UK
*
Author to whom correspondence should be addressed.
Games 2016, 7(4), 31; https://doi.org/10.3390/g7040031
Submission received: 9 June 2016 / Revised: 28 September 2016 / Accepted: 13 October 2016 / Published: 24 October 2016

Abstract

:
We extend a standard two-person, non-cooperative, non-zero sum, imperfect inspection game, considering a large population of interacting inspectees and a single inspector. Each inspectee adopts one strategy, within a finite/infinite bounded set of strategies returning increasingly illegal profits, including compliance. The inspectees may periodically update their strategies after randomly inter-comparing the obtained payoffs, setting their collective behaviour subject to evolutionary pressure. The inspector decides, at each update period, the optimum fraction of his/her renewable budget to invest on his/her interference with the inspectees’ collective effect. To deter the inspectees from violating, he/she assigns a fine to each illegal strategy. We formulate the game mathematically, study its dynamics and predict its evolution subject to two key controls, the inspection budget and the punishment fine. Introducing a simple linguistic twist, we also capture the corresponding version of a corruption game.

1. Introduction

An inspection game consists of a game-theoretic framework, modelling the non-cooperative interaction between two strategic parties, called inspector and inspectee; see, e.g., [1,2] for a general survey. The inspector aims to verify that certain regulations, imposed by the benevolent principal he/she is acting for, are not violated by the inspectee. On the contrary, the inspectee has an incentive to disobey the established regulations, risking the enforcement of a punishment fine in the case of detection. The introduced punishment mechanism is a key element of inspection games, since deterrence is generally the inspector’s highest priority. Typically, the inspector has limited means of inspection at his/her disposal, so that his/her detection efficiency can only be partial.
The central objective of inspection games is to develop an effective inspection policy for the inspector to adopt, given that the inspectee acts according to a strategic plan. Within the last five decades, inspection games have been applied in the game-theoretic analysis of a wide range of issues, mainly in arms control and nuclear non-proliferation, but also in accounting and auditing of accounts, tax inspections, environmental protection, crime control, passenger ticket control, stock-keeping and others; see, e.g., [1,3,4,5,6] and the references therein. Though when initially introduced, inspection games appeared almost exclusively as two-person, zero-sum games, gradually, the need to depict more realistic scenarios shifted attention towards n-person and non-zero-sum games.
Dresher’s [7] two-person, zero-sum, perfect recall, recursive inspection game is widely recognised as the first formal approach in the field. In his model, Dresher considered n periods of time available for an inspectee to commit, or not, a unique violation, and m n one-period lasting inspections available for the inspector to investigate the inspectee’s abidance by the rules, assuming that a violator can be detected only if he/she is caught (inspected) in the act. This work initiated the application of inspection games to arms control and disarmament; see, e.g., [8] and the references therein. Maschler [9] generalised this archetypal model, introduced the equivalent non-zero-sum game and, most importantly, adopted from economics the notion of inspector leadership, showing (among others) that the inspector’s option to pre-announce and commit to a mixed inspection strategy actually increases his/her payoff.
Thomas and Nisgav [10] used a similar framework to investigate the problem of a patroller aiming to inhibit a smuggler’s illegal activity. In their so-called customs-smuggler game, customs patrol, using a speedboat, in order to detect a smuggler’s motorboat attempting to ship contraband through a strait. They introduced the possibility of more than one patrolling boats, namely the possibility of two or more inspectors, potentially not identical, and suggested the use of linear programming methods for the solution of those scenario. Baston and Bostock [11] provided a closed-form solution for the case of two patrolling boats and discussed the withdrawal of the perfect-capture assumption, stating that detection is ensured whenever violation and inspection take place at the same period. Garnaev [12] provided a closed-form solution for the case of three patrolling boats.
Von Stengel [13] introduced a third parameter in Dresher’s game, allowing multiple violations, but proving that the inspector’s optimal strategy is independent of the maximum number of the inspectee’s intended violations. He studied another variation, optimising the detection time of a unique violation that is detected at the following inspection, given that inspection does not currently take place. On a later version, von Stengel [14] additionally considered different rewards for the inspectee’s successfully committed violations, extending as well Maschler’s inspector leadership version under the multiple intended violations assumption. Ferguson and Melolidakis [15], motivated by Sakaguchi [16], treated a similar three-parameter, perfect-capture, sequential game, where: (i) the inspectee has the option to ‘legally’ violate at an additional cost; (ii) a detected violation does not terminate the game; (iii) every non-inspected violation is disclosed to the inspector at the following stage.
Non-zero-sum inspection games were already discussed at an early stage by Maschler [9,17], but were mainly developed after the 1980s, in the context of the nuclear non-proliferation treaty (NPT). The prefect-capture assumption was partly abandoned, and errors of Type 1 (false alarm) and Type 2 (undetected violation given that inspection takes place) were introduced to formulate the so-called imperfect inspection games. Avenhaus and von Stengel [18] solved Dresher’s perfect-capture, sequential game, assuming non-zero-sum payoffs. Canty et al. [19] solved an imperfect, non-sequential game, assuming that players ignore any information they collect during their interaction, where an illegal action must be detected within a critical timespan before its effect is irreversible. They discussed the sequential equivalent, as well. Rothenstein and Zamir [20] included the elements of imperfect inspection and timely detection in the context of environmental control.
Avenhaus and Kilgour [21] introduced a non-zero-sum, imperfect (Type 2 error) inspection game, where a single inspector can continuously distribute his/her effort-resources between two non-interacting inspectees, exempted from the simplistic dilemma whether to inspect or not. They related the inspector’s detection efficiency with the inspection effort through a non-linear detection function and derived results for the inspector’s optimum strategy subject to its convexity. Hohzaki [22] moved two steps forward, considering a similar n + 1 players inspection game, where the single inspection authority not only intends to optimally distribute his/her effort among n inspectee countries, but also among l k facilities within each inspectee country k. Hohzaki presents a method of identifying a Nash equilibrium for the game and discusses several properties of the players’ optimal strategies.
In the special case when the inspector becomes himself the individual under investigation, namely when the question ‘who will guard the guardians?’ eventually arises [23], the same framework is used for modelling corruption. In the so-called corruption game, a benevolent principal aims to ensure that his/her non-benevolent employee does not intentionally fail his/her duty; see, e.g., [24,25,26,27] and the references therein for a general survey. For example, in the tax inspections regime, the tax inspector employed by the respective competent authority can be open to bribery from the tax payers in order not to report detected tax evasions. Generally speaking, when we switch from inspection to corruption games, the competing pair of an inspector versus an inspectee is replaced by the pair of a benevolent principal versus a non-benevolent employee, but the framework of analysis that is used for the first one can almost identically be used for the second one, as well.
Lambert et al. [28] developed a dynamic game where various private investors anticipate the processing of their applications by an ordered number of low level bureaucrats in order to ensure specific privileges; such an application is approved only if every bureaucrat is bribed. Nikolaev [29] introduced a game-theoretic study of corruption with a hierarchical structure, where inspectors of different levels audit the inspectors of the lower level and report (potentially false reports) to the inspectors of the higher level; the inspector of the highest level is assumed to be honest. In the context of ecosystem management, Lee et al. [30] studied an evolutionary game, where they analyse illegal logging with respect to the corruption of forest rule enforcers, while in the context of politics and governance, Giovannoni and Seidmann [31] investigated how power may affect the government dynamics of simple models of a dynamic democracy, assuming that ‘power corrupts and absolute power corrupts absolutely’ (Lord Acton’s famous quote).
The objective of this paper is to focus on the study of inspection games from an evolutionary perspective, aimed at the analysis of the class of games with a large number of inspectees. However, we highlight that our setting should be distinctly separated from the general setting of the standard evolutionary game theory. We emphasize the networking aspects of these games by allowing the inspectees to communicate with each other and update their strategies purely on account of their interactions. This way, we depict the real-life scenario of partially-informed optimising inspectees. For the same purpose, we set the inspectees to choose from different levels of illegal behaviour. Additionally, we introduce the inspector’s budget as a distinct parameter of the game, and we measure his/her interference with the interacting inspectees with respect to this. We also examine carefully the critical effect of the punishment fine on the process of the game. In fact, we attempt to get quantitative insights into the interplay of these key game parameters and analyse respectively the dynamics of the game.
For a real-world implementation of our game, one can think of tax inspections. Tax payers are ordinary citizens who interact on a daily basis exchanging information on various issues. Arguably, in their vast majority, if not universally, tax payers have an incentive towards tax evasion. Depending on the degree of confidence they have in their fellow citizens, on a pairwise level, they discuss their methods, the extent to which they evade taxes and their outcomes. As experience suggests, tax payers imitate the more profitable strategies. The tax inspector (e.g., the chief of the tax department) is in charge of fighting tax evasion. Having to deal with many tax payers, primarily he/she aims to confront their collective effect rather than each one individually. He/she is provided with a bounded budget from his/her superior (e.g., the finance ministry), and he/she aims to manage this, along with his/her punishment policy, so that he/she maximizes his/her utility (namely the payoff of the tax department).
Though we restrict ourselves to the use of inspection game terminology, our model also intends to capture the relevant class of corruption games. Indicatively, we aim to investigate the dynamics of the interaction between a large group of corrupted bureaucrats and their incorruptible superior, again from an evolutionary perspective. In accordance with our approach, the bureaucrats discuss in pairs their bribes and copy the more efficient strategies, while their incorruptible superior aims to choose attractive wages to discourage bribery, to invest in means of detecting fraudulent behaviour and to adopt a suitable punishment policy. Evidently, the two game settings are fully analogous, and despite the linguistic twist of inspection to corruption, they can be formulated in an identical way.
We organize the paper in the following way. In Section 2, we discuss the standard setting of a two-player, non-cooperative, non-zero-sum inspection game, and we introduce what we call the conventional inspection game. In Section 3 and Section 4, we present our generalization; we extend the two-player inspection game considering a large population of indistinguishable, interacting inspectees against a single inspector, we formulate our model for a discrete/continuous strategy setting respectively, and we demonstrate our analysis. In Section 5, we include a game-theoretic interpretation of our analysis. In Section 6, we summarize our approach and our results, and we propose potential improvements. Finally, Appendix A contains our proofs.

2. Standard Inspection Game

A standard inspection game describes the competitive interaction between an inspectee and an inspector, whose interests in principle contradict. The inspectee, having to obey certain rules imposed by the inspector, either chooses indeed to comply, obtaining a legal profit, r > 0 , or to violate, aiming at an additional illegal profit, > 0 , but undertaking additionally the risk of being detected and, thus, having to pay the corresponding punishment fine, f > 0 . Likewise, the inspector chooses either to inspect at some given inspection cost, c > 0 , in order to detect any occurring violation, ward off the loss from the violator’s illegal profit and receive the fine, or not to inspect, avoiding the cost of inspection, but risking the occurrence of a non-detected violation.
In this two-player setting, both players are considered to be rational optimisers who decide their strategies independently, without observing their competitor’s behaviour. Thus, the game discussed is a non-cooperative one. The following normal-form table illustrates the framework described above, where the inspectee is the row player and the inspector is the column player. Left and right cells’ entries correspond to the inspectee’s and the inspector’s payoffs accordingly.
Table 1 illustrates the so-called perfect inspection game, in the sense that inspection always coincides with detection (given that a violator is inspected, the inspector will detect his/her violation with probability one). However, this is an obviously naive approach, since in practice, numerous factors deteriorate the inspector’s efficiency and potentially obstruct detection. Consequently, the need to introduce a game parameter determining the inspection’s efficiency naturally arises.
In this more general setting, the parameter λ [ 0 , 1 ] is introduced to measure the probability with which a violation is detected given that the inspector inspects. We can also think of λ as a measure of the inspector’s efficiency. Obviously, for λ = 1 , the ideal situation mentioned above is captured. The following normal-form Table 2 illustrates the so-called imperfect inspection game.
The key feature of the discussed game setting is that under specific conditions, it describes a two-player competitive interaction without any pure strategy Nash equilibria. Starting from the natural assumption that the inspector, in principle, would like the inspectee to comply with his/her rules and that ideally, he/she would prefer to ensure compliance without having to inspect, the game obtains no pure strategy Nash equilibria when both of the following conditions apply
c + λ · f ( λ ) · > λ · ( f + ) > c ,
r > r + ( λ ) · λ · f λ · ( f + ) > .
Indicatively, one can verify that the pure strategy profile ( V , I ) is the unique Nash equilibrium of the inspection game when only Condition (1) applies. Accordingly, profile ( V , N I ) is the unique pure strategy Nash equilibrium when only Condition (2) applies. When neither of the two conditions apply, profile ( V , N I ) is again the unique pure strategy Nash equilibrium. Hence, given that at least one of the above Conditions (1) and (2) does not apply, a pure strategy equilibrium solution always exists.
Back to the no pure strategy Nash equilibria environment, the first condition assumes that when the inspectee is violating, the inspector’s expected payoff is higher when he/she chooses to inspect. Accordingly, the second one assumes that when the inspector is inspecting, the inspectee’s expected payoff is higher when he/she chooses to comply (this is always true for a perfect inspection game).
Under these assumptions, regardless of the game’s outcome and given the competitor’s choice, both players would in turn switch their chosen strategies to the alternative ones, in an endlessly repeated switching cycle (see Figure 1). This lack of no-regrets pure strategies states that the game contains no pure strategy Nash equilibria. We name it the conventional inspection game.
Typically, a two-player game without any pure strategy Nash equilibria is resolved by having at least one player randomising over his/her available pure strategies. In this specific scenario, it can be proven that both players resort to mixed strategies, implying that both inspection and violation take place with non-zero probabilities. In particular, the following theorem proven in [32] gives the unique mixed strategy Nash equilibrium of the conventional inspection game described above.
Theorem 1.
Let p [ 0 , 1 ] be the probability with which the inspectee violates and q [ 0 , 1 ] be the probability with which the inspector inspects. The unique mixed strategy Nash equilibrium of the two-player conventional inspection game described in Table 2 along with Conditions (1) and (2) is the mixed strategy profile ( p * , q * ) with:
p * = c λ · ( f + ) , q * = λ · ( f + ) .
Proof. 
See [32].

3. Evolutionary Inspection Game: Discrete Strategy Setting

Let us now proceed with our extension of the two-player game we introduced in Section 2 to the real-life scenario of a multi-player problem. We consider a large population of N indistinguishable, pairwise interacting inspectees against a single inspector. Equivalently in the context of corruption games, one can think of N indistinguishable, pairwise interacting bureaucrats against their incorruptible superior. The game mechanism can be summarised into the following dynamic process.
Initially, the N inspectees decide their strategies individually. They retain their group’s initial strategy profile for a certain timespan, but beyond this point, on account of the inspector’s response to their collective effect, some of the inspectees are eager to update and switch to evidently more profitable strategies. In principle, an inspectee is an updater with a non-zero probability ω that is characteristic of the inspectees’ population.
Indicatively, assume on a periodic basis, and in particular at the beginning of each update period, that an updater discusses his/her payoff with another randomly-chosen inspectee, who is not necessarily an updater himself/herself. If the two interacting inspectees have equal payoffs, then the updater retains his/her strategy. If, however, they have a payoff gap, then the updater is likely to revise his/her strategy, subject to how significant their payoffs’ variance is.
Clearly, we do not treat the inspectees as strictly rational optimizers. Instead, we assume that they periodically compare their obtained payoffs in pairs, and they mechanically copy more efficient strategies purely in view of their pairwise interaction and without necessarily being aware of the prevailing crime rate or the inspector’s response. This assumption is described as the myopic hypothesis, and we introduce it to illustrate the lack of perfect information and the frequently adopted imitating behaviour in various multi-agent social systems. However, as we will see in Section 5, ignoring the myopic hypothesis in a strictly game-theoretic context, we can still interpret our results.
Regarding the inspector’s response, we no longer consider his/her strategy to be the choice of the inspection frequency (recall the inspector’s dilemma in the standard game setting whether to inspect or not). Instead, we take into account the overall effort the inspector devotes to his/her inspection activity. In particular, we identify this generic term as the fraction of the available budget that he/she invests on his/her objective, assuming that the inspection budget controls every factor of his/her effectiveness (e.g., the inspection frequency, the no-detection probability, the false alarms, etc.).
At each update event, we assume that the inspector is limited to the same finite, renewable available budget B. Without experiencing any policy-adjusting costs, he/she aims at maximising his/her payoff against each different distribution of the inspectees’ strategies at the least possible cost. Additionally, we assume that at each time point, he/she is perfectly informed about the inspectees’ collective behaviour. Therefore, we treat the inspector as a rational, straightforward, payoff maximising player. This suggestion is described as the best response principle.
Under this framework, the crime distribution in the population of the inspectees is subject to evolutionary pressure over time. Thus, the term evolutionary is introduced to describe the inspection game. It turns out that more efficient strategies gradually become dominant.

3.1. Analysis

We begin our analysis by assuming that the inspectees choose their strategies within a finite bounded set of strategies S = { 0 , 1 , , d } , generating increasingly illegal profits. Their group’s state space is then the set of sequences of d + 1 non-negative integers n = ( n 0 , , n d ) , n i denoting the occupation frequency of strategy i S . Equivalently, it is the set of sequences of the corresponding d + 1 relative occupation frequencies x = ( x 0 , , x d ) , where x i = n i / N .
We consider a constant number of inspectees, namely we have N = n 0 + + n d for each group’s state n. Provided that the population size N is sufficiently large (formally valid for N through the law of large numbers), we approximate the relative frequencies x i with ρ i [ 0 , 1 ] , denoting the probabilities with which the strategies i S are adopted. To each strategy i we assign an illegal profit i , 0 = 0 characterizing compliers, and a strictly increasing punishment fine f i = f ( i ) , with f 0 = 0 . We assume that | i + 1 i | is constant, namely that i ’s form a one-dimensional regular lattice.
As explained, the inspector has to deal with an evolving crime distribution in the population of the inspectees, p = p ( t ) = ( ρ i ) ( t ) . We define the set of probability vectors Σ d + 1 , such that:
Σ d + 1 = p ( t ) = ( ρ 0 , , ρ d ) ( t ) R + d + 1 : ρ i ( t ) = 1 .
We introduce the inner product notation to define the group’s expected (average) illegal profit by ¯ = ¯ ( p ) = , p . Respectively, we define the group’s expected (average) punishment fine by f ¯ = f ¯ ( p ) = f , p . We also define the inspector’s invested budget against crime distribution p by b ( · ) [ 0 , B ] and the inspector’s efficiency by G ( b ) . The last function measures the probability with which a violator is detected given that the inspector invests budget b. To depict a plausible scenario, we assume that perfect efficiency cannot be achieved within the inspector’s finite available inspection budget B (namely, the detection probability is strictly smaller than one, G ( B ) < 1 ).
Assumption 1.
The inspector’s efficiency, G : [ 0 , ) [ 0 , 1 ) , is a twice continuously differentiable, strictly increasing, strictly concave function, satisfying:
G < 0 , G > 0 , lim x 0 G ( x ) = , G ( 0 ) = 0 , lim x G ( x ) = 1 .
An inspectee who plays strategy i S either escapes undetected with probability 1 G ( b ) and obtains an illegal profit i or gets detected with probability G ( b ) and is charged with a fine f i . Additionally, every inspectee receives a legal income r, regardless of his/her strategy being legal or illegal.
Therefore, to an inspectee playing strategy i, against the inspector investing budget b, we assign the following inspectee’s payoff function:
Π i ( b ) = r + ( 1 G ( b ) ) · i G ( b ) · f i .
Accordingly, we need to introduce a payoff function for the inspector investing budget b against crime distribution p . Recall that the inspector is playing against a large group of inspectees and intends to fight their collective illegal behaviour. For his/her macroscopic standards, the larger the group is, the less considerable absolute values corresponding to a single agent (i.e., r , i , f i ) are.
To depict this inspector’s subjective evaluation, we introduce the inspector’s payoff function as follows:
Π I ( b , p , N ) = b + N · G ( b ) · f ¯ t · κ N N · ( 1 G ( b ) ) · ¯ t · κ N ,
where κ is a positive scaling constant and ¯ t , respectively f ¯ t , denotes the expected (average) illegal profit, respectively the expected (average) punishment fine, at time t. Without loss of generality, we set κ = 1 . Note that the inspector’s payoff always obtains a finite value, including the limit N .
As already mentioned, an updater revises his/her strategy with a switching probability depending on his/her payoff’s difference with the randomly-chosen individual’s payoff, with whom he/she exchanges information. Then, for an updater playing strategy i and exchanging information with an inspectee playing strategy j, we define this switching probability by s i j · Δ t , for a timespan Δ t , where:
s i j = β · Π j ( b ) Π i ( b ) , if Π j ( b ) > Π i ( b ) 0 , if Π j ( b ) Π i ( b )
and β > 0 is an appropriately-scaled normalization parameter.
This transition process dictates that in every period following an update event, the number of inspectees playing strategy i is equal to the corresponding sub-population in the previous period, plus the number of inspectees having played strategies j i and switching into strategy i, minus the number of inspectees having played strategy i and switching into strategies j i .
Hence, we derive the following iteration formula:
ρ i ( t + Δ t ) = ρ i ( t ) + ω · ρ i ( t ) · j = 0 d ρ j ( t ) · s i j · Δ t ω · ρ i ( t ) · j = 0 d ρ j ( t ) · s j i · Δ t
which can be suitably reformulated, taking the limit as Δ t 0 , into an equation resembling the well-known replicator equation (see, e.g., [33]):
ρ ˙ i ( t ) = ω · β · ρ i ( t ) · Π i ( b ) j S ρ j · Π j ( b ) .
Remark 1.
We have used here a heuristic technique to derive Equation (9), bearing in mind that we consider a significantly large group of interacting individuals (formally valid for the limiting case of an infinitely large population). A rigorous derivation can be found in [34].
In agreement with our game setting (i.e., the myopic hypothesis), (9) is not a best-response dynamic. However, it turns out that successful strategies, yielding payoffs higher than the group’s average payoff, are subject to evolutionary pressure. This interesting finding of our setting, which is put forward in the above replicator equation, simply states that although the inspectees are not considered to be strictly rational maximizers (but instead myopic optimizers), successful strategies propagate into their population through the imitation procedure. This characteristic classifies (9) into the class of the payoff monotonic game dynamics [35]. Before proceeding further, it is important to state that our setting is quite different from the general setting of standard evolutionary game theory. Unlike standard evolutionary games, in our approach there are no small games of a fixed number of players through which successful strategies evolve. On the contrary, at each step and throughout the whole procedure, there is only one N + 1 players game taking place (see also the game in Section 5).
Regarding the inspector’s interference, the best response principle states that at each time step, against the crime distribution he/she confronts, the inspector aims to maximise his/her payoff with respect to his/her available budget:
max b [ 0 , B ] b + G ( b ) · f ¯ t ( 1 G ( b ) ) · ¯ t .
On the one hand, the inspector chooses his/her fine policy strategically in order to manipulate the evolution of the future crime distribution. On the other hand, at each period, he/she has at his/her disposal the same renewable budget B, while he/she is not charged with any policy adjusting costs. In other words, the inspector has a period-long planning horizon regarding his/her financial policy. Therefore, he/she instantaneously chooses at each step his/her response b that maximises his/her payoff (6) against the prevailing crime distribution.
Let us define the inspector’s best response (optimum budget), maximising his/her payoff (6) against the prevailing crime distribution, by:
b ^ ( · ) : = argmax b [ 0 , B ] b + G ( b ) · f ¯ t + ¯ t ¯ t .
Having analytically discussed the inspectees’ and the inspector’s individual dynamic characteristics, we can now combine them and obtain a clear view of the system’s dynamic behaviour as a whole.
In particular, we substitute the inspector’s best response (optimum budget) b ^ ( · ) into the system of ordinary differential equations (ODEs) (9), and we obtain the corresponding system governing the evolution of the non-cooperative game described above:
ρ ˙ i ( t ) = ω · β · ρ i ( t ) · i ( i + f i ) · G ( b ^ ) + G ( b ^ ) · ( ¯ + f ¯ ) ¯ .
Recall that through (12) we aim to investigate the evolution of illegal behaviour within a large group of interacting, myopically-maximising inspectees (bureaucrats) under the pressure of a rationally-maximising inspector (incorruptible superior).
Without loss of generality, we set β = 1 . Let us also introduce the following auxiliary notation:
K i ( p , b ^ ) = i ( i + f i ) · G ( b ^ ) + G ( b ^ ) · ( ¯ + f ¯ ) ¯ .
Proposition 1.
A probability vector p ( t ) Σ d + 1 is a singular point of (12), namely it satisfies the system of equations:
ω · ρ i ( t ) · K i ( p , b ^ ) = 0 ,
if and only if there exists a subset I S , such that ρ i ( t ) = 0 for i I , and K i ( p , b ^ ) = 0 for i I .
Proof. 
For any I S such that ρ i ( t ) = 0 , i I , System (12) reduces to the same one, but only with coordinates i I (notice that I must be a proper subset of S). Then, for the fixed point condition to be satisfied, we must have K j ( p , b ^ ) = 0 for every j S \ I .
The determination of the fixed points defined in Proposition 1 and their stability analysis, namely the deterministic evolution of the game, clearly depend on the form of K i . One can identify two control elements that appear in K i and thus govern the game dynamics; the functional control f ( · ) and the control parameter B. We have set the fine f ( · ) to be a strictly increasing function, and we consider three eventualities regarding its convexity; (i) linear; (ii) convex; (iii) concave. To each version we assign a different inspector’s punishment profile. Indicatively, we claim that a convex fine function reveals an inspector who is lenient against relatively low collective violation, but rapidly jumps to stricter policies for increasing collective violation. Contrarily, we claim that a concave fine function reveals an inspector who is already punishing aggressively even for a relatively low collective violation. Finally, we assume that a linear fine function represents the ‘average’ inspector. We also vary in each case the constant (linear)/increasing (convex)/decreasing (concave) gradient of function f ( · ) . Accordingly, we vary the size of the finite available budget B. The different settings we establish with these control parameter variations and, therefore, the corresponding dynamics we obtain in each case have clear practical interpretation providing useful insight into applications. For example, the fine function f ( · ) can be, and usually is, defined by the inspector himself (think of different fine policies when dealing with tax evasion), while the level of budget B is decided from the benevolent principal by whom the inspector is employed. The detection efficiency G ( · ) is not regarded as an additional control since it characterizes the inspector’s behaviour endogenously. However, say the inspector has an excess of budget, then he/she could invest it in improving his/her expertise (e.g., his/her technical know-how) that is related with his/her efficiency indirectly. Then, he/she could improve G ( · ) . We do not engage with this case.

3.2. Linear Fine

Equivalently to (11), for a linear fine f i = σ · i , the inspector’s best response (optimum budget) can be written as:
b ^ ( ¯ ) = min B , ( G ) 1 1 σ · ¯ t + ¯ t .
We check from (15) that we cannot have B < b ^ ( ¯ ) for every ¯ [ 0 , d ] , since at least for ¯ = 0 , it is b ^ ( 0 ) = 0 . However, depending on the size of B, we may have B > b ^ ( ¯ ) for every ¯ [ 0 , d ] .
Then, it is reasonable to introduce the following notation:
c : = min : b ^ ( ) = B ,
where c is not necessarily deliverable, i.e., c may not belong to [ 0 , d ] . One should think of this critical value c as a measure of the adequacy of the inspector’s available budget B, namely as the ‘strength’ of his/her available budget. Obviously, if c d , the inspector benefits from exhausting all his/her available budget when dealing with ¯ [ c , d ] , while, if c > d , the inspector never needs to exhaust B in order to achieve an optimum response.
Theorem 2.
Let Assumption 1 hold. The d + 1 unit vectors p i = ( δ i j ) , i , j S , lying on the vertices of the d-simplex, are fixed points of (12). Moreover:
(i) 
If G ( b ^ ( d ) ) > 1 1 + σ , there is additionally a unique hyperplane of fixed points,
Θ = p θ Σ d + 1 ! ¯ ( 0 , min [ c , d ] ) : , p θ = ¯ & G ( b ^ ( ¯ ) ) = 1 1 + σ ,
(ii) 
If G ( b ^ ( d ) ) = 1 1 + σ and d > c , there are additionally infinitely many hyperplanes of fixed points,
Φ = p ϕ Σ d + 1 ¯ [ c , d ] : , p ϕ = ¯ & G ( b ^ ( ¯ ) ) = 1 1 + σ .
Proof. 
In any case, the unit probability vectors p i = ( δ i j ) satisfy (14), since by definition of p i , it is ρ j = 0 , j i , whilst it is , p i = i .
The setting we introduce with Assumption 1 ensures that b ^ : [ 0 , d ] [ 0 , b ^ ( d ) ] is a continuous, non-decreasing, surjective function. In particular, we have that G ( · ) is strictly increasing in b ^ [ 0 , B ] and b ^ ( · ) is strictly increasing in ¯ [ 0 , min [ c , d ] ] . Hence:
(i)
When G ( b ^ ( d ) ) > 1 1 + σ , there is a unique ¯ ( 0 , min [ c , d ] ) satisfying G ( b ^ ( ¯ ) ) = 1 1 + σ . This unique ¯ is generated by infinitely many probability vectors, p θ : , p θ = ¯ , forming a hyperplane of points satisfying (14).
(ii)
When G ( b ^ ( d ) ) = 1 1 + σ and d > c , every ¯ [ c , d ] satisfies G ( b ^ ( ¯ ) ) = 1 1 + σ . Each one of these infinitely many ¯ is generated by infinitely many probability vectors, p ϕ : , p ϕ = ¯ , forming infinitely many hyperplanes of points satisfying (14).
We refer to the points p i as pure strategy fixed points, to emphasize that they correspond to the group’s strategy profiles such that every inspectee plays the same strategy i. Accordingly, we refer to the points p θ , p ϕ , as mixed strategy fixed points, to emphasize that they correspond to the group’s strategy profiles such that the inspectees are distributed among two or more available strategies.
Before proceeding with the general stability results, we present the detailed picture in the simplest case of three available strategies generating increasingly illegal profits including compliance.
Figure 2 implies a budget B such that the inspector never exhausts it. For a relatively low B or for an overly lenient f ( · ) (see Figure 2a and Figure 3a), the pure strategy fixed point p 2 is asymptotically stable. Increasing though B or, accordingly, toughening up f ( · ) (see Figure 2b), a hyperplane of asymptotically-stable mixed strategy fixed points appears. Depending on the critical parameter c , we may have infinitely many hyperplanes of asymptotically stable mixed strategy fixed points (see Figure 3b,d). Finally, keeping B constant, the more we increase the slope of f ( · ) , the closer this(ese) hyperplane(s) moves towards compliance (see Figure 2c and Figure 3c,e). We generalize these results into the following theorem.
Theorem 3.
Let Assumption 1 hold. Consider the fixed points given by Theorem 2. Then:
(i) the pure strategy fixed point p 0 is a source, thus unstable; (ii) the pure strategy fixed points p j Θ , Φ , j S : j 0 , d , are saddles, thus unstable; (iii) the pure strategy fixed point p d is asymptotically stable when Φ = Θ = ; otherwise, it is a source, thus unstable; (iv) the mixed strategy fixed points p θ , p ϕ are asymptotically stable.
Proof. 

3.3. Convex/Concave Fine

Let us introduce the auxiliary variable ξ i = i + f i . As usual, using the inner product notation, we define the corresponding group’s expected/average value by ξ ¯ = ξ ¯ ( p ) = ξ , p , where ξ ¯ = ¯ + f ¯ . Then, equivalently to (11) and (15), the inspector’s best response/optimum budget can be written as:
b ^ ( ξ ¯ ) = min B , ( G ) 1 1 ξ ¯ t .
For every i , j S : i < j , let us introduce as well the parameter:
q i , j = i j i j + f i f j .
Lemma 1.
For a convex fine, q i , j is strictly decreasing in i for constant j (or vice versa), while for a concave fine, q i , j is strictly increasing in i for constant j (or vice versa). Furthermore, for a convex fine, q i , j is strictly decreasing in i , j for constant ( j i ) , while for a concave fine, q i , j is strictly increasing in i , j for constant ( j i ) .
Theorem 4.
Let Assumption 1 hold. The d + 1 unit vectors p i = ( δ i j ) , i , j S , lying on the vertices of the d-simplex are fixed points of (12). Moreover, there may be additionally up to d + 1 2 internal fixed points p i , j Σ d + 1 , living on the support of two strategies i , j S : i < j , uniquely defined for each pair of strategies; they exist given that the following condition applies respectively:
G ( b ^ ( ξ j ) ) > q i , j > G ( b ^ ( ξ i ) ) .
Proof. 
In any case, the unit probability vectors p i = ( δ i j ) satisfy (14), since by the definition of p i , it is ρ j = 0 , j i , whilst it is , p i = i , f , p i = f i .
Consider a probability vector p * Σ d + 1 satisfying (14), such that , p * = * , f , p * = f * , ξ , p * = ξ * and p * p i . Then, from Proposition 1, p * should satisfy K i ( p * , b ^ ) = 0 , i I , namely the fraction q i , j should be constant i , j I , and equal to G ( b ^ ( ξ * ) ) .
To satisfy this, according to Lemma 1, the complement set I = S \ I may not contain more than two elements, namely the distributions p * may live on the support of only two strategies.
For such a distribution p * = p i , j , such that , p i , j = i · ρ i + j · ρ j = i , j and f , p i , j = f i · ρ i + f j · ρ j = f i , j , i , j S : i < j , where i , j + f i , j = ξ i , j , we get:
G ( b ^ ( ξ i , j ) ) = q i , j .
The setting we introduce with Assumption 1 ensures that b ^ : [ 0 , ξ d ] [ 0 , b ^ ( ξ d ) ] is a continuous, non-decreasing, surjective function. In particular, we have that G ( · ) is strictly increasing in b ^ [ 0 , B ] and b ^ ( · ) is strictly increasing in ξ ¯ [ 0 , min [ ξ c , ξ d ] ] . Then, for any p i , j to exist, namely for (20) to hold in each instance, the following condition must hold respectively:
G ( b ^ ( ξ j ) ) > q i , j > G ( b ^ ( ξ i ) ) .
We refer to the points p i , j as double strategy fixed points, to emphasize that they correspond to the group’s strategy profiles, such that the inspectees are distributed between two available strategies.
Again, we present the detailed picture in the simplest case of three available strategies generating increasingly illegal profits including compliance. Like above, in Figure 4 and Figure 5, we observe how the interplay of the key parameters B and f ( · ) affect the game dynamics.
The general pattern is similar to Figure 2 and Figure 3. Initially, the pure strategy fixed point p 2 appears to be asymptotically stable (see Figure 4a–c and Figure 5a), while gradually, either increasing B or toughening up f ( · ) , this unique asymptotically stable fixed point shifts towards compliance. However, the shift here takes place only through double strategy fixed points and not through hyperplanes of fixed points. In particular, for a concave f ( · ) , it occurs only through the fixed point p 0 , 2 living on the support of the two border strategies (see Figure 4d–j), while for a convex f ( · ) , it occurs through the fixed points p 1 , 2 , p 0 , 1 , namely only through the fixed points living on the support of two consecutive strategies (see Figure 5b–j).
Proposition 2.
For a convex fine: (i) the set of double strategy fixed points contains at most one fixed point p i , i + 1 living on the support of two consecutive strategies; (ii) there is at most one pure strategy fixed point p i satisfying:
q i 1 , i > G ( b ^ ( ξ i ) ) > q i , i + 1 .
Proof. 
(i) Assume there are two double strategy fixed points p i , i + 1 , p j , j + 1 , i , j S : i d , i < j , both living on the support of two consecutive strategies. According to Theorem 4, both of them should satisfy (19). However, since it is j > i , then from Assumption 1, it is also G ( b ^ ( ξ j ) ) G ( b ^ ( ξ i + 1 ) ) , and since the fine is convex, then from Lemma 1, it is also q i , i + 1 > q j , j + 1 . Overall, we have that:
q i , i + 1 > q j , j + 1 > G ( b ^ ( ξ j ) ) G ( b ^ ( ξ i + 1 ) )
which contradicts the initial assumption.
(ii) Assume there are two pure strategy fixed points p i , p j , i , j S : i 0 , i < j , both satisfying (22). However, since it is j > i , then from Assumption 1, it is also G ( b ^ ( ξ j ) ) G ( b ^ ( ξ i ) ) , and since the fine is convex, then from Lemma 1, it is also q i , i + 1 q j 1 , j . Overall, we have that:
q i , i + 1 q j 1 , j > G ( b ^ ( ξ j ) ) G ( b ^ ( ξ i ) )
which contradicts the initial assumption.
We generalize the results that we discussed above on the occasion of Figure 4 and Figure 5, into the following theorem.
Theorem 5.
Let Assumption 1 hold. Consider the fixed points given by Theorem 4. Then:
1 .
For a concave fine: (i) the pure strategy fixed point p 0 is a source, thus unstable; (ii) the pure strategy fixed points p i , i 0 , d , are saddles, thus unstable; (iii) the double strategy fixed points p i , j p 0 , d are saddles, thus unstable; (iv) the double strategy fixed point p 0 , d is asymptotically stable; (v) the pure strategy fixed point p d is asymptotically stable when p 0 , d does not exist; otherwise, it is a source, thus unstable.
2 .
For a convex fine: (i) the pure strategy fixed point p 0 is a source, thus unstable; (ii) the double strategy fixed points p i , j , j i + 1 , are saddles, thus unstable; ( i i i ) * the double strategy fixed points p i , i + 1 are asymptotically stable; ( i v ) * the pure strategy fixed points p i , i 0 , d , are saddles, thus unstable; ( v ) * the pure strategy fixed point p d is a source, thus unstable. * When no p i , i + 1 exists, the pure strategy fixed point satisfying (22) is asymptotically stable.
Proof. 

4. Evolutionary Inspection Game: Continuous Strategy Setting

The discrete strategy setting is our first approach towards introducing multiple levels of violation available for the inspectees. It is an easier framework to work with for our analytic purposes, and it is more appropriate to depict certain applications. For example, in the tax inspections regime, the tax payers can be thought of as evading taxes only in discrete amounts (this is the case in real life). However, in the general crime control regime, the intensity of criminal activity should be treated as a continuous variable. Therefore, the continuous strategy setting is regarded as the natural extension of the discrete setting that captures the general picture.
We consider the scenario where the inspectees choose their strategies within an infinite bounded set of strategies, Λ = [ 0 , d ] , generating increasingly illegal profits. Here, we identify the inspectees’ available strategies with the corresponding illegal profits that they generate. We retain the introduced framework (i.e., the myopic hypothesis, the best response principle, etc.), adjusting our assumptions and our analysis to the continuous local strategy space when needed. Our aim is to extend the findings of Section 3.
The group’s state space Λ N is the set of sequences x = ( 1 , , N ) , where n Λ is the n-th inspectee’s strategy. This can be naturally identified with the set M N consisting of the normalized sums of N Dirac measures ( δ 1 + + δ N ) / N . Let the set of probability measures on Λ be M ( Λ ) .
We rewrite the inspectee’s payoff function (5), playing for illegal profit Λ against invested budget b in the form:
Π ( , b ) = r + 1 G ( b ) · G ( b ) · f ( ) .
Let us introduce the notation δ x for the sum δ 1 + + δ N . We rewrite the inspector’s payoff function (6) in the form:
Π ( δ x / N , b , N ) = b + N · G ( b ) · f , δ x / N · κ N N · 1 G ( b ) · , δ x / N · κ N ,
where for the positive scaling constant, we set again κ = 1 . Recall the argument we introduced in Section 3.2 regarding the inspector’s subjective evaluation, which leads to Expressions (6) and (24).
It is rigorously proven in [34] that, given that initial distribution δ x / N converges to a certain measure μ M ( Λ ) as N , the group’s strategy profile evolution under the inspector’s optimum pressure b ^ corresponds to the deterministic evolution on M ( Λ ) solving the kinetic equation A Λ :
μ ˙ t ( A ) = ω · z A y Λ Π ( z , b ^ ) Π ( y , b ^ ) μ t ( d y ) μ t ( d z ) ,
or equivalently in the weak form:
d d t ( g ( · ) , μ t ) = ω · Λ 2 g ( z ) · Π ( z , b ^ ) Π ( y , b ^ ) μ t ( d y ) μ t ( d z ) .
Recall that Assumption 1 ensures that b ^ is well defined. Furthermore, notice that notation ¯ , f ¯ , ξ ¯ introduced in Section 3.2 stands here for the expected values , μ , f , μ , ξ , μ , μ M ( Λ ) , respectively, where f = f ( ) and ξ = ξ ( ) = + f ( ) .
Using this inner product notation and substituting (22) into (25), the kinetic equation can be written in a symbolic form:
μ ˙ t ( d z ) = ω · μ t ( d z ) · z G ( b ^ ) · ( z + f ( z ) ) + G ( b ^ ) · ( f ( · ) + · ) · , μ t .
One can think of (25) and (27) as the continuous local strategy space equivalent of Equations (9) and (12).
Proposition 3.
A (non-negative) probability measure μ M ( Λ ) is a singular point of (25); namely, it satisfies:
z A y Λ Π ( z , b ^ ) Π ( y , b ^ ) μ t ( d y ) μ t ( d z ) = 0 ,
A Λ , if and only if the inspectees’ payoff (23) is constant on the support of μ. Since M ( Λ ) is the set of probability laws on Λ, then s u p p ( μ ) cannot be an empty set.
Proof. 
We use the inner product notation, y Λ Π ( y , b ^ ( μ t ) ) μ t ( d y ) = Π ( · , b ^ ) , μ t , to rewrite (28) in the equivalent form:
z A Π ( z , b ^ ) Π ( · , b ^ ) , μ t μ t ( d z ) = 0 ,
and the result follows, since (29) holds when Π ( z , b ^ ) = Π ( · , b ^ ) , μ t for arbitrary z A .

4.1. Linear Fine

We consider a linear fine f ( ) = σ · , Λ , and we extend the definitions (11), (15) and (16) to the continuous strategy setting.
Theorem 6.
Let Assumption 1 hold. Every Dirac measure δ z , z Λ is a fixed point of (25). Moreover:
(i) 
If G ( b ^ ( d ) ) > 1 1 + σ , there is additionally a unique hyperplane of fixed points:
Θ = μ θ M ( Λ ) ! ¯ ( 0 , min [ c , d ] ) : , μ θ = ¯ & G ( b ^ ( ¯ ) ) = 1 1 + σ ,
(ii) 
If G ( b ^ ( d ) ) = 1 1 + σ and d > c , there are additionally infinitely many hyperplanes of fixed points:
Φ = μ ϕ M ( Λ ) ¯ [ c , d ] : , μ ϕ = ¯ & G ( b ^ ( ¯ ) ) = 1 1 + σ .
Proof. 
Every Dirac measure δ z , z Λ satisfies (28), since by definition, it is Π ( · , b ^ ) , δ z = Π ( z , b ^ ) .
In addition, Assumption 1 ensures that b ^ : Λ [ 0 , b ^ ( d ) ] is a continuous, non-decreasing, surjective function. Particularly, G ( · ) is strictly increasing in b ^ [ 0 , B ] , and b ^ ( · ) is strictly increasing in ¯ [ 0 , min [ c , d ] ] . Therefore:
(i)
When G ( b ^ ( d ) ) > 1 1 + σ , there is a unique ¯ ( 0 , min [ c , d ] ) satisfying G ( b ^ ( ¯ ) ) = 1 1 + σ . This unique ¯ is generated by infinitely many probability measures, μ θ : , μ θ = ¯ , forming a hyperplane of points in M ( Λ ) satisfying (25).
(ii)
When G ( b ^ ( d ) ) = 1 1 + σ and d > c , every ¯ [ c , d ] satisfies G ( b ^ ( ¯ ) ) = 1 1 + σ . Each one of these infinitely many ¯ is generated by infinitely many probability measures, μ ϕ : , μ ϕ = ¯ , forming infinitely many hyperplanes of points satisfying (25).
We refer to the points δ z as pure strategy fixed points, to emphasize that they correspond to the group’s strategy profiles, such that every inspectee plays the same strategy z. Accordingly, we refer to the points μ θ , μ ϕ as mixed strategy fixed points.
Theorem 7.
Let Assumption 1 hold. Consider the fixed points given by Theorem 6. Then:
For a linear fine: (i) the pure strategy fixed points δ z Θ , Φ , z Λ : z d , are unstable; (ii) the pure strategy fixed point δ d is asymptotically stable on the topology of the total variation norm, when Φ = Θ = ; otherwise, it is unstable; (iii) the mixed strategy fixed points μ θ , μ ϕ are stable.
Proof. 

4.2. Convex/Concave Fine

We extend the definitions (11) and (17) to the continuous strategy setting. Additionally, for every x , y Λ : x < y , let us introduce the parameter:
q x , y = x y x y + f ( x ) f ( y ) .
Lemma 2.
For a convex fine, q x , y is strictly decreasing in x for constant y (or vice versa), while for a concave fine, q x , y is strictly increasing in x for constant y (or vice versa). In addition, for a convex fine, q x , y is strictly decreasing in x , y for constant ( y x ) , while for a concave fine, q x , y is strictly increasing in x , y for constant ( y x ) .
Theorem 8.
Let Assumption 1 hold. Every Dirac measure δ z , z Λ is a fixed point of (25). Moreover, every normalised sum of two Dirac measures μ x , y = a x · δ x + a y · δ y , x , y Λ : x < y , a x + a y = 1 , is a fixed point of (25), uniquely defined for each pair of strategies x , y ; μ x , y exist on condition that they satisfy respectively:
G ( b ^ ( ξ ( y ) ) ) > q x , y > G ( b ^ ( ξ ( x ) ) ) .
Proof. 
Every Dirac measure δ z , z Λ satisfies (28), since by definition, it is Π ( · , b ^ ) , δ z = Π ( z , b ^ ) .
Consider a probability measure μ * M ( Λ ) satisfying (28), such that , μ * = * , f , μ * = f * , ξ , μ * = ξ * , μ * δ z . Then, from Proposition 3, μ * should satisfy Π ( x , b ^ ) = Π ( y , b ^ ) for every pair of x , y s u p p ( μ * ) , namely the fraction q x , y should be constant x , y s u p p ( μ * ) and equal to G ( b ^ ( ξ * ) ) .
According to Lemma 2, this is possible only when the support of μ * contains no more than two elements, namely when it is equivalent to the normalised sum of two Dirac measures, such that μ * = μ x , y = a x · δ x + a y · δ y , x , y Λ : x < y , a x + a y = 1 . Such a probability measure satisfies:
G ( b ^ ( ξ x , y ) ) = q x , y ,
where ξ x , y = ξ , a x · δ x + a y · δ y = a x · ( x + f ( x ) ) + a y · ( y + f ( y ) ) .
In addition, Assumption 1 ensures that b ^ : [ 0 , ξ ( d ) ] [ 0 , b ^ ( ξ ( d ) ) ] is a continuous, surjective, non-decreasing function. Particularly, G ( · ) is strictly increasing in b ^ [ 0 , B ] , and b ^ ( · ) is strictly increasing in ξ ¯ [ 0 , min [ ξ ( c ) , ξ ( d ) ] ] . Therefore, for any μ x , y to exist, namely for (32) to hold in each instance, the following condition must hold respectively:
G ( b ^ ( ξ ( y ) ) ) > q x , y > G ( b ^ ( ξ ( x ) ) ) .
We refer to the points μ x , y as double strategy fixed points, since they correspond to the group’s strategy profiles such that the inspectees are distributed between two available strategies.
Theorem 9.
Let Assumption 1 hold. Consider the fixed points given by Theorem 8. Then:
For a concave fine: (i) the pure strategy fixed points δ z , z d are unstable; (ii) the double strategy fixed points μ x , y μ 0 , d are unstable; (iii) the double strategy fixed point μ 0 , d is asymptotically stable; (iv) the pure strategy fixed point δ d is asymptotically stable on the topology of the total variation norm, when μ 0 , d does not exist; otherwise, it is unstable.
Proof. 

5. Fixed Points and Nash Equilibria

So far, we have deduced and analysed the dynamics governing the deterministic evolution of the multi-player system we have introduced (assuming the myopic hypothesis for an infinitely large population). Our aim now is to provide a game-theoretic interpretation of the fixed points we have identified. We work in the context of the discrete strategy setting. The extension to the continuous strategy setting is straightforward.
Let us consider the game Ω N of a finite number of N + 1 players (N inspectees, one inspector). When the inspector chooses the strategy b B and each of the N inspectees chooses the same strategy i S , then the inspector receives the payoff Π I ( b , x , N ) , and each inspectee receives the payoff Π i ( b ) . Note that the inspectees’ collective strategy profile can be thought of as the collection of relative occupation frequencies, x = ( x i ) .
One then defines an ϵ Nash equilibrium of Ω N as a profile of strategies ( b ^ ( x N ) , x N ) , such that:
b ^ ( x N ) = argmax Π I ( b , x N , N ) ,
and for any pair of strategies i , j { 0 , , d } :
Π j ( b ^ ( x N e i / N + e j / N ) ) Π i ( b ^ ( x N ) ) ,
hold up to an additive correction term not exceeding ϵ, where e i denote the standard basis in R d .
It occurs that all of the fixed points identified in Section 3 (and by extension in Section 4) describe approximate Nash equilibria of Ω N . We state here the relevant result without a proof. A rigorous discussion can be found in [34]. Recall that for a sufficiently large population N (formally for N ), we can approximate the relative frequencies x i with the probabilities ρ i obeying (12).
Proposition 4.
Under suitable continuity assumptions on Π i and Π I : (i) any limit point of any sequence x N , such that ( b ^ ( x N ) , x N ) is a Nash equilibrium of Ω N , is a fixed point of the deterministic evolution (12); (ii) for any fixed point x of (12), there exists a 1 / N Nash equilibrium ( b ^ ( x N ) , x N ) of Ω N , such that the difference of any pair of coordinates of x N , x does not exceed 1 / N in magnitude.
The above result provides a game-theoretic interpretation of the fixed points that were identified by Theorems 2, 4, 6 and 8, independent of the myopic hypothesis. Moreover, it naturally raises the question of which equilibria can be chosen in the long run. The fixed points stability analysis performed in Section 3 and Section 4 aims to investigate this issue. Furthermore, Proposition 4 states, in simple words, that our analysis and our results are also valid for a finite population of inspectees (recall our initial assumption for an infinitely large N), with precision that is inversely proportional to the size of N.

6. Discussion

In this paper, we study the spread of illegal activity in a population of myopic inspectees (e.g., tax payers) interacting under the pressure of a short-sighted inspector (e.g., tax inspector). Equivalently, we investigate the spread of corruption in a population of myopic bureaucrats (e.g., ministerial employees) interacting under the pressure of an incorruptible supervisor (e.g., governmental fraud investigator). We consider two game settings with regards to the inspectees’ available strategies, where the continuous strategy setting is a natural extension of the discrete strategy setting. We introduce (and vary qualitatively/quantitatively) two key control elements that govern the deterministic evolution of the illegal activity, the punishment fine and the inspection budget.
We derive the ODEs (12) and (27) that characterize the dynamics of our system; we identify explicitly the fixed points that occur under our different scenarios; and we carry out respectively their stability analysis. We show that although the indistinguishable ‘agents’ (e.g., inspectees, corrupted bureaucrats) are treated as myopic maximizers, profitable strategies eventually prevail in their population through imitation. We verify that an adequately financed inspector achieves an increasingly law-abiding environment when there is a stricter fine policy. More importantly, we show that although the inspector is able to establish any desirable average violation by suitably manipulating budget and fine, he/she is not able to combine this with any desirable group’s strategy profile. Finally, we provide a game-theoretic interpretation of our fixed points stability analysis.
There are many directions towards which one can extend our approach. To begin with, one can consider an inspector experiencing policy-adjusting costs. Equivalently, one can withdraw the assumption of a renewable budget. Moreover, the case of two or more inspectors, possibly collaborating with each other or even with some of the inspectees, could be examined. Regarding the inspectees, an additional source of interaction based on the social norms formed within their population could be introduced. Another interesting variation would be to add a spatial distribution of the population, assuming indicatively that the inspectees interact on a specific network. Some of these alternatives have been studied for more general or similar game settings; see, e.g., [26,34].

Acknowledgments

Stamatios Katsikas would like to acknowledge support from the Engineering and Physical Sciences Research Council (EPSRC), Swindon, UK.

Author Contributions

Stamatios Katsikas and Vassili Kolokoltsov conceived and designed the model, and performed the analysis. Wei Yang contributed in the initial stages of the analysis. Stamatios Katsikas wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

We make use of the Hartman–Grobman theorem, stating that the local phase portrait near a hyperbolic fixed point is topologically equivalent to the phase portrait of the linearisation [36], namely that the stability of a hyperbolic fixed point is preserved under the transition from the linear to the non-linear system. For the non-hyperbolic fixed points, we resort to Lyapunov’s method [37]. Recall that a fixed point is hyperbolic if all of the eigenvalues of the linearisation evaluated at this point have non-zero real parts. Such a point is asymptotically stable if and only if all of the eigenvalues have a strictly negative real part, while it is unstable (source or saddle) if at least one has a strictly positive real part.

Appendix A.1. Proof of Theorem 3

We rewrite (12) in the equivalent form, i S : i j , for arbitrary j S ,
ρ ˙ i ( t ) = ρ i ( t ) · 1 ( 1 + σ ) · G ( b ^ ) · i j + n j ρ n · ( j n ) .
The linearisation of (A1) around a pure strategy fixed point p j can be written in the matrix form:
p ˙ ( t ) = A · p ( t )
where A is a d × d diagonal matrix, with main diagonal entries, namely with eigenvalues:
λ i | p j = 1 ( 1 + σ ) · G ( b ^ ( j ) ) · ( i j ) .
(i)
For the pure strategy fixed point p 0 , we get:
λ i | p 0 = i ,
which is strictly positive i S : i 0 . Then, p 0 is a source.
(ii)
For the pure strategy fixed point p d , we get:
λ i | p d = ( i d ) · 1 ( 1 + σ ) · G ( b ^ ( d ) ) ,
which is strictly negative i S : i d when G ( b ^ ( d ) ) < 1 1 + σ Θ = Φ = . Then, p d is asymptotically stable. Otherwise, (A5) is strictly positive, and p d is a source.
(iii)
For the pure strategy fixed points p j , j S : j 0 , d , (A3) changes sign between j < i and j > i , when i S : i j . Then, p j are saddles.
(iv)
For the non-isolated, non-hyperbolic mixed strategy fixed points p θ , p ϕ , we resort to Lyapunov’s method. Consider the real valued Lyapunov function V C 1 ( Σ d + 1 ) :
V ( p ) = 1 ( 1 + σ ) · G ( b ^ ) 2 .
Differentiating with respect to time, we get:
V ˙ ( p ) = ( 1 + σ ) · 1 ( 1 + σ ) · G ( b ^ ) · G b ^ · b ^ ¯ · ¯ t .
From Assumption 1, G ( · ) is strictly increasing in b ^ [ 0 , B ] , and b ^ ( · ) is strictly increasing in ¯ [ 0 , m i n [ c , d ] ] . Additionally, from (A1), we get:
d ¯ d t = 1 ( 1 + σ ) · G ( b ^ ( ¯ ) ) · , p 2 2 , p .
Hence, overall, we have that V ( p θ ) = 0 , V ( p ) > 0 if p p θ and V ˙ ( p ) 0 for all p Σ d + 1 (respectively for p ϕ and p p ϕ ). Then, according to Lyapunov’s theorem, p θ , p ϕ are stable.

Appendix A.2. Proof of Theorem 5

We rewrite (12) in the equivalent form, i S : i d ,
ρ ˙ i ( t ) = g i ( p ) = ρ i · ( i d + f i f d ) · ( q i , d G ( b ^ ) ) j d ( j d + f j f d ) · ( q j , d G ( b ^ ) ) · ρ j .
Around an arbitrary fixed point p * = ( ρ i * ) , the nonlinear system (A9) is approximated by:
ρ ˙ i ( t ) = l d g i ( p ) ρ κ | p = p * · ( ρ κ ρ κ * ) ,
which is a linear system with coefficient matrix A = ( a i κ ) , κ S : κ d , with:
a i κ : = g i ( p ) ρ κ | p = p * = ρ i * · ( ( d i + f d f i + j d ( j d + f j f d ) · ρ j * ) · G ( b ^ ( ξ ¯ ) ) ρ κ | ξ ¯ = ξ * ( κ d + f κ f d ) · ( q κ , d G ( b ^ ( ξ * ) ) ) + δ i κ · ( d i + f d f i ) · ( G ( b ^ ( ξ * ) ) q i , d ) + j d ( j d + f j f d ) · ( G ( b ^ ( ξ * ) ) q j , d ) · ρ i * ,
where ξ * = ξ , p * . This is the Jacobian matrix of (A9) at an arbitrary fixed point p * = ( ρ i * ) . We use the characteristic equation d e t ( A λ · I ) = 0 to find the eigenvalues of A for every fixed point.
Let us introduce the notation E i , j for the elementary matrix corresponding to the row/column operation of swapping rows/columns i j . The inverse of E i , j is itself; namely, it is E i , j 1 = E i , j .
For a pure strategy fixed point p l , l S : l 1 , first swapping rows 1 l of A and then swapping columns 1 l of the resulting matrix, we obtain the upper triangular matrix:
B = E 1 , l 1 · A · E 1 , l .
For l = 1 , the Jacobian A is already an upper triangular matrix. Matrices A and B are similar, namely they have the same characteristic polynomial and, thus, the same eigenvalues. The eigenvalues of an upper triangular matrix are precisely its diagonal elements.
Consequently, the eigenvalues of A at a pure strategy fixed point p l , l S , are given by:
λ i | p l = ( l i + f l f i ) · ( G ( b ^ ( ξ l ) ) q i , l ) + δ i l · ( i d + f i f d ) · ( G ( b ^ ( ξ l ) ) q i , d ) .
For a double strategy fixed point p m , n , m , n S : m < n , m 1 , 2 , n 2 , swapping rows 1 m of A and then swapping in order rows 2 n , columns 1 m and columns 2 n , we obtain the matrix:
C = ( E 1 , m · E 2 , n ) 1 · A · E 1 , m · E 2 , n ,
where we have used the inverse matrix product identity. For ( m , n ) = ( 1 , 2 ) , the Jacobian A has already the form of C. For m = 1 , n 2 , we need to swap only the n row, n column. Respectively for m = 2 . Matrices A and C are similar. The characteristic polynomial of C, and thus of A, is:
( a m m λ ) · d e t ( c i κ ) i , κ 1 λ · I + ( a m n λ ) · d e t ( c i κ ) i 1 , κ 2 λ · I = ( a m m λ ) · i m ( a i i λ ) + ( a m n λ ) · ( a n m λ ) · i m , n ( a i i λ ) = ( a m m λ ) · ( a n n λ ) + ( a m n λ ) · ( a n m λ ) · i m , n ( a i i λ ) = 0 ,
where ( c i κ ) i , κ 1 and ( c i κ ) i 1 , κ 2 are upper triangular matrices.
Thus, the eigenvalues of A at a double strategy fixed point p m , n , m , n S : m < n , are given by:
λ i | p m , n = ( m i + f m f i ) · ( G ( b ^ ( ξ m , n ) ) q i , m ) + ( δ i n · ρ n + δ i m · ρ m ) × ( ( i d + f i f d ) · ( G ( b ^ ( ξ m , n ) ) q i , d ) + ( ρ n · ( n m + f n f m ) + m i + f m f i ) · G ( b ^ ( ξ ¯ ) ) ρ i | ξ ¯ = ξ m , n ) .
Concave fine:
(i)
For the pure strategy fixed point p 0 , we get the form (A13):
: λ i | p 0 = i + δ i 0 · ( d i ) ,
which is strictly positive i S : i d . Then, p 0 is a source.
(ii)
For the pure strategy fixed points p l , l 0 , d , say G ( b ^ ( ξ l ) ) > q i , l (or G ( b ^ ( ξ l ) ) < q i , l ), i S : i d ; then, (A13) changes sign between i < l and i > l . Alternatively, say there is some w, such that G ( b ^ ( ξ l ) ) > q w , l , G ( b ^ ( ξ l ) ) < q w + 1 , l ; then, (A13) indicatively changes sign between i < w < l and w < i < l (or between l < i < w and l < w < i ). Then, p l , l 0 , d , are saddles.
(iii)
For the double strategy fixed points p m , n p 0 , d , (A16) changes sign, indicatively between i > n > m and n > i > m (since q i , m is strictly increasing in i). Then, p m , n p 0 , d are saddles.
(iv)
For the double strategy fixed point p 0 , d , we get from (A16):
λ i | p 0 , d = ( i + f i ) · ( G ( b ^ ( ξ 0 , d ) ) q 0 , i ) + δ i 0 · ρ 0 × ( i d + f i f d ) · ( G ( b ^ ( ξ 0 , d ) ) q i , d ) + ( ρ d · ( d + f d ) i f i ) · G ( b ^ ( ξ ¯ ) ) ρ i | ξ ¯ = ξ 0 , d ,
which is strictly negative i S : i d (since G ( b ^ ( ξ 0 , d ) ) = q 0 , d , q 0 , i is strictly increasing in i). Then, p 0 , d is asymptotically stable.
(v)
For the pure strategy fixed point p d , we get from (A13):
λ i | p d = ( d i + f d f i ) · ( G ( b ^ ( ξ d ) ) q i , d ) ,
which is strictly negative i S : i d when p 0 , d does not exist, namely when q 0 , d > G ( b ^ ( ξ d ) ) . Then, p d is asymptotically stable. Otherwise, it is strictly positive i S : i d , and p d is a source.
Convex fine:
(i)
For the pure strategy fixed point p 0 , we get from (A13):
λ i | p 0 = i + δ i 0 · ( d i )
which is strictly positive i S : i d . Then, p 0 is a source.
(ii)
For the double strategy fixed points p m , n , n m + 1 , (A16) changes sign, indicatively between i > n > m and n > i > m (since q i , m is strictly decreasing in i). Then, p m , n are saddles.
(iii)
For the double strategy fixed points p j , j + 1 , (A16) is strictly negative i S : i d (since G ( b ^ ( ξ j , j + 1 ) ) = q j , j + 1 , q i , j is strictly decreasing in i). Then, p j , j + 1 is asymptotically stable.
(iv)
For the pure strategy fixed points p l , l 0 , d , (A13) is strictly negative i S : i d when p l satisfies (22), namely when q l 1 , l > G ( b ^ ( ξ l ) ) > q l , l + 1 . Then, p l is asymptotically stable. Otherwise, (A13) changes sign (see Part (ii) of the proof for the concave fine), and p j is a saddle.
(v)
For the pure strategy fixed point p d , we get from (A13):
λ i | p d = ( d i + f d f i ) · ( G ( b ^ ( ξ d ) ) q i , d ) ,
which is strictly negative i S : i d when p d satisfies (22), namely when q d 1 , d > G ( b ^ ( ξ d ) ) . Then, p d is asymptotically stable. Otherwise, it is strictly positive i S : i d , and p d is a source.

Appendix A.3. Proof of Theorem 7

(i)
From the proof of Theorem (3), we have seen that the pure strategy fixed points δ z Θ , Φ , z Λ : z d , have at least one unstable trajectory.
(ii)
For the pure strategy fixed point δ d , consider the real valued function L 1 C 1 ( E ) , where E is an open subset of M ( Λ ) , with radius r < 2 and centre δ d :
L 1 ( μ ) = d , μ .
The total variation distance between any two δ x , δ y M ( Λ ) is given by:
d T V ( δ x δ y ) = sup | f | 1 f ( z ) ( δ x δ y ) d z = 2 ,
thus, E does not contain any other Dirac measures. Using variational derivatives, we get:
L ˙ 1 ( μ ) = 1 ( 1 + σ ) · G ( b ^ ( ¯ ) ) · , μ 2 2 , μ .
When Φ = Θ = G ( b ^ ( d ) ) < 1 1 + σ , we have that L 1 ( δ d ) = 0 , L 1 ( μ ) > 0 if μ δ d and L ˙ 1 ( μ ) < 0 for all μ E \ δ d . Then, according to Lyapunov’s Theorem, δ d is asymptotically stable.
(iii)
For the mixed strategy fixed points μ θ , μ ϕ , take the real valued function L 2 C 1 ( M ( Λ ) ) :
L 2 ( μ ) = 1 ( 1 + σ ) · G ( b ^ ( ¯ ) ) 2 .
Using variational derivatives, we get:
L ˙ 2 ( μ ) = 2 · ( 1 + σ ) · L 2 ( μ ) · d G d b ^ · d b ^ d ¯ · , μ 2 2 , μ .
From Assumption 1, G ( · ) is strictly increasing in b ^ [ 0 , B ] , and b ^ ( · ) is strictly increasing in ¯ [ 0 , min [ c , d ] ] . Hence, we have that L 2 ( μ θ ) = 0 , L 2 ( μ ) > 0 if μ μ θ and L ˙ 2 ( μ ) 0 for all μ M ( Λ ) (respectively for μ ϕ ). Then, according to Lyapunov’s theorem, μ θ , μ ϕ are stable.

Appendix A.4. Proof of Theorem 9

(i),(ii)
From the proof of Theorem (5), we have seen that the pure strategy fixed points δ z , z d and the double strategy fixed points μ x , y μ 0 , d have at least one unstable trajectory.
(iii)
For the mixed strategy fixed point μ 0 , d , consider the real valued function U 1 C 1 ( E ) where E is an open subset of M ( Λ ) , with radius r < 2 and centre μ 0 , d :
U 1 ( μ ) = q 0 , d G ( b ^ ( ξ ¯ ) ) 2 .
Using variational derivatives, we get:
U ˙ 1 ( μ ) = 2 · d G d b ^ · d b ^ d ξ ¯ · q 0 , d G ( b ^ ( ξ ¯ ) ) · ( 2 , μ , μ 2 + · f ( ) , μ , μ · f ( ) , μ G ( b ^ ( ξ ¯ ) ) · ( 2 , μ , μ 2 + f ( ) 2 , μ f ( ) , μ 2 + 2 · ( · f ( ) , μ , μ · f ( ) , μ ) ) ) .
Consider a small deviation from μ 0 , d :
ν = ( 1 ϵ ) · ( a 0 · δ 0 + a d · δ d ) + ϵ · μ ,
where ϵ is small, and μ = 1 . In first order approximation, one can show that:
2 , ν , ν 2 + · f ( ) , ν , ν · f ( ) , ν 2 , ν , ν 2 + f ( ) 2 , ν f ( ) , ν 2 + 2 · ( · f ( ) , ν , ν · . f ( ) , ν > ( < ) q 0 , d ( f ( d ) · d · f ( ) ) · ( a d + f ( ) a d · f ( d ) ) , μ > ( < ) 0 ,
holds, when:
G ( b ^ ( a d · ( d + f ( d ) ) + ϵ · + f ( ) a d · ( d + f ( d ) ) ) ) > ( < ) q 0 , d + f ( ) a d · ( d + f ( d ) ) > ( < ) 0 ,
where:
ξ , ν = a d · ( d + f ( d ) ) + ϵ · + f ( ) a d · ( d + f ( d ) ) .
For a concave fine, it is:
f ( d ) · d · f ( ) < 0 ,
and from Assumption 1, G ( · ) is strictly increasing in b ^ and b ^ ( · ) strictly increasing in ¯ . Then, overall, we have that U 1 ( μ 0 , d ) = 0 , U 1 ( μ ) > 0 if μ μ 0 , d and U ˙ 1 ( ν ) < 0 , for any small deviation from μ 0 , d . Thus, according to Lyapunov’s theorem, μ 0 , d is asymptotically stable.
(iv)
For the pure strategy fixed point δ d , consider the real valued function U 2 C 1 ( E ) , where E is an open subset of M ( Λ ) , with radius r < 2 and centre δ d (so that E does not contain any other Dirac measures):
U 2 ( μ ) = d , μ .
Using variational derivatives, we get:
U ˙ 2 ( μ ) = 2 , μ , μ 2 G ( b ^ ( ξ ¯ ) ) · ( 2 , μ , μ 2 + · f ( ) , μ , μ · f ( ) , μ ) .
When μ 0 , d does not exist, namely when d d + f ( d ) > G ( b ^ ( ξ ( d ) ) ) , take a small deviation from δ d :
ν = ( 1 ϵ ) · δ d + ϵ · μ ,
where ϵ is small, and μ = 1 . In first order approximation, one can show that:
2 , ν , ν 2 2 , ν , ν 2 + · f ( ) , ν , ν · f ( ) , ν > d d + f ( d ) ( d ) · ( · f ( d ) d · f ( ) ) , μ > 0
holds, since for a concave fine, it is:
· f ( d ) d · f ( ) < 0 ,
and, for any ξ ¯ < ξ ( d ) , it is:
G ( b ^ ( ξ ¯ ) ) < G ( b ^ ( ξ ( d ) ) ) .
Then, overall, we have that U 2 ( δ d ) = 0 , U 2 ( μ ) > 0 if μ δ d and U 2 ˙ ( ν ) < 0 for any small deviation from δ d within E. Thus, according to Lyapunov’s theorem, δ d is asymptotically stable.

References

  1. Avenhaus, R.; von Stengel, B.; Zamir, S. Inspection games. Hand. Game Theory Econ. Appl. 2002, 3, 1947–1987. [Google Scholar]
  2. Avenhaus, R.; Canty, M.J. Inspection Games; Springer: New York, NY, USA, 2012; pp. 1605–1618. [Google Scholar]
  3. Alferov, G.V.; Malafeyev, O.A.; Maltseva, A.S. Programming the robot in tasks of inspection and interception. In Proceedings of the IEEE 2015 International Conference on Mechanics-Seventh Polyakhov’s Reading, Saint Petersburg, Russia, 2–6 February 2015; pp. 1–3.
  4. Avenhaus, R. Applications of inspection games. Math. Model. Anal. 2004, 9, 179–192. [Google Scholar]
  5. Deutsch, Y.; Golany, B.; Goldberg, N.; Rothblum, U.G. Inspection games with local and global allocation bounds. Naval Res. Logist. 2013, 60, 125–140. [Google Scholar] [CrossRef]
  6. Kolokoltsov, V.; Passi, H.; Yang, W. Inspection and crime prevention: An evolutionary perspective. Available online: https://arxiv.org/abs/1306.4219 (accessed on 18 June 2013).
  7. Dresher, M. A Sampling Inspection Problem in Arms Control Agreements: A Game-Theoretic Analysis (No. RM-2972-ARPA); Rand Corp: Santa Monica, CA, USA, 1962. [Google Scholar]
  8. Avenhaus, R.; Canty, M.; Kilgour, D.M.; von Stengel, B.; Zamir, S. Inspection games in arms control. Eur. J. Oper. Res. 1996, 90, 383–394. [Google Scholar] [CrossRef]
  9. Maschler, M. A price leadership method for solving the inspector’s non-constant-sum game. Naval Res. Logist. Q. 1966, 13, 11–33. [Google Scholar] [CrossRef]
  10. Thomas, M.U.; Nisgav, Y. An infiltration game with time dependent payoff. Naval Res. Logist. Q. 1976, 23, 297–302. [Google Scholar] [CrossRef]
  11. Baston, V.J.; Bostock, F.A. A generalized inspection game. Naval Res. Logist. 1991, 38, 171–182. [Google Scholar] [CrossRef]
  12. Garnaev, A.Y. A remark on the customs and smuggler game. Naval Res. Logist. 1994, 41, 287–293. [Google Scholar] [CrossRef]
  13. Von Stengel, B. Recursive Inspection Games; Report No. S 9106; Computer Science Faculty, Armed Forces University: Munich, Germany, 1991. [Google Scholar]
  14. Von Stengel, B. Recursive inspection games. Available online: https://arxiv.org/abs/1412.0129 (accessed on 29 November 2014).
  15. Ferguson, T.S.; Melolidakis, C. On the inspection game. Naval Res. Logist. 1998, 45, 327–334. [Google Scholar] [CrossRef]
  16. Sakaguchi, M. A sequential allocation game for targets with varying values. J. Oper. Res. Soc. Jpn. 1977, 20, 182–193. [Google Scholar]
  17. Maschler, M. The inspector’s non-constant-sum game: Its dependence on a system of detectors. Naval Res. Logist. Q. 1967, 14, 275–290. [Google Scholar] [CrossRef]
  18. Avenhaus, R.; von Stengel, B. Non-zero-sum Dresher inspection games. In Operations Research’91; Physica-Verlag HD: Heidelberg, Gernamy, 1992; pp. 376–379. [Google Scholar]
  19. Canty, M.J.; Rothenstein, D.; Avenhaus, R. Timely inspection and deterrence. Eur. J. Oper. Res. 2001, 131, 208–223. [Google Scholar] [CrossRef]
  20. Rothenstein, D.; Zamir, S. Imperfect inspection games over time. Ann. Oper. Res. 2002, 109, 175–192. [Google Scholar] [CrossRef]
  21. Avenhaus, R.; Kilgour, D.M. Efficient distributions of arms-control inspection effort. Naval Res. Logist. 2004, 51, 1–27. [Google Scholar] [CrossRef]
  22. Hohzaki, R. An inspection game with multiple inspectees. Eur. J. Oper. Res. 2007, 178, 894–906. [Google Scholar] [CrossRef]
  23. Hurwicz, L. But Who Will Quard the Quardians? Prize Lecture 2007. Available online: https://www.nobelprize.org (accessed on 8 December 2007).
  24. Aidt, T.S. Economic analysis of corruption: A survey. Econ. J. 2003, 113, F632–F652. [Google Scholar] [CrossRef]
  25. Jain, A.K. Corruption: A review. J. Econ. Surv. 2001, 15, 71–121. [Google Scholar] [CrossRef]
  26. Kolokoltsov, V.N.; Malafeyev, O.A. Mean-field-game model of corruption. Dyn. Games Appl. 2015. [Google Scholar] [CrossRef]
  27. Malafeyev, O.A.; Redinskikh, N.D.; Alferov, G.V. Electric circuits analogies in economics modeling: Corruption networks. In Proceedings of the 2014 2nd International Conference on Emission Electronics (ICEE), Saint-Petersburg, Russia, 30 June–4 July 2014.
  28. Lambert-Mogiliansky, A.; Majumdar, M.; Radner, R. Petty corruption: A game-theoretic approach. Int. J. Econ. Theory 2008, 4, 273–297. [Google Scholar] [CrossRef]
  29. Nikolaev, P.V. Corruption suppression models: The role of inspectors’ moral level. Comput. Math. Model. 2014, 25, 87–102. [Google Scholar] [CrossRef]
  30. Lee, J.H.; Sigmund, K.; Dieckmann, U.; Iwasa, Y. Games of corruption: How to suppress illegal logging. J. Theor. Biol. 2015, 367, 1–13. [Google Scholar] [CrossRef] [PubMed]
  31. Giovannoni, F.; Seidmann, D.J. Corruption and power in democracies. Soc. Choice Welf. 2014, 42, 707–734. [Google Scholar] [CrossRef]
  32. Kolokoltsov, V.N.; Malafeev, O.A. Understanding Game Theory: Introduction to the Analysis of Many Agent Systems with Competition and Cooperation; World Scientific: Singapore, 2010. [Google Scholar]
  33. Zeeman, E.C. Population dynamics from game theory. In Global Theory of Dynamical Systems; Springer: Berlin/Heidelberg, Germany, 1980; pp. 471–497. [Google Scholar]
  34. Kolokoltsov, V. The evolutionary game of pressure (or interference), resistance and collaboration. Available online: https://arxiv.org/abs/1412.1269 (accessed on 3 December 2014).
  35. Hofbauer, J.; Sigmund, K. Evolutionary Games and Population Dynamics; Cambridge University Press: Cambridge, UK, 1998. [Google Scholar]
  36. Strogatz, S.H. Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry, and Engineering; Westview Press: Boulder, CO, USA, 2014. [Google Scholar]
  37. Jordan, D.W.; Smith, P. Nonlinear Ordinary Differential Equations: An Introduction for Scientists and Engineers; Oxford University Press: Oxford, UK, 2007. [Google Scholar]
Figure 1. No pure strategy Nash equilibria conventional inspection game.
Figure 1. No pure strategy Nash equilibria conventional inspection game.
Games 07 00031 g001
Figure 2. Dynamics for a linear f ( · ) , where c d . Set of strategies S = { 0 , 1 , 2 } .
Figure 2. Dynamics for a linear f ( · ) , where c d . Set of strategies S = { 0 , 1 , 2 } .
Games 07 00031 g002
Figure 3. Dynamics for a linear f ( · ) , where d > c . Set of strategies S = { 0 , 1 , 2 } .
Figure 3. Dynamics for a linear f ( · ) , where d > c . Set of strategies S = { 0 , 1 , 2 } .
Games 07 00031 g003
Figure 4. Dynamics for the case of concave f ( ) and three available strategies/ S = { 0 , 1 , 2 } .
Figure 4. Dynamics for the case of concave f ( ) and three available strategies/ S = { 0 , 1 , 2 } .
Games 07 00031 g004aGames 07 00031 g004b
Figure 5. Dynamics for the case of convex f ( ) and three available strategies/ S = { 0 , 1 , 2 } .
Figure 5. Dynamics for the case of convex f ( ) and three available strategies/ S = { 0 , 1 , 2 } .
Games 07 00031 g005
Table 1. Two-player perfect inspection game.
Table 1. Two-player perfect inspection game.
InspectNot Inspect
Violate r f , c + f r + ,
Complyr, c r, 0
Table 2. Two-player imperfect inspection game.
Table 2. Two-player imperfect inspection game.
InspectNot Inspect
Violate r + 2 λ ( + f ) , c 2 + λ ( + f ) r + ,
Complyr, c r, 0

Share and Cite

MDPI and ACS Style

Katsikas, S.; Kolokoltsov, V.; Yang, W. Evolutionary Inspection and Corruption Games. Games 2016, 7, 31. https://doi.org/10.3390/g7040031

AMA Style

Katsikas S, Kolokoltsov V, Yang W. Evolutionary Inspection and Corruption Games. Games. 2016; 7(4):31. https://doi.org/10.3390/g7040031

Chicago/Turabian Style

Katsikas, Stamatios, Vassili Kolokoltsov, and Wei Yang. 2016. "Evolutionary Inspection and Corruption Games" Games 7, no. 4: 31. https://doi.org/10.3390/g7040031

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop