On the Threat of Counterfeiting

نویسندگان

  • Yiting Li
  • Guillaume Rocheteau
چکیده

We study counterfeiting of currency in a search-theoretic model of monetary exchange. In contrast to Nosal and Wallace (2007), we establish that counterfeiting does not pose a threat to the existence of a monetary equilibrium; i.e., a monetary equilibrium exists irrespective of the cost of producing counterfeits, or the ease with which genuine money can be authenticated. However, the possibility to counterfeit …at money can a¤ect its value, velocity, output and welfare, even if no counterfeiting occurs in equilibrium. We provide two extensions of the model under which the threat of counterfeiting can materialize: counterfeits can circulate across periods, and sellers set terms of trades in some matches. Policies that make the currency more costly to counterfeit or easier to recognize raise the value of money and society’s welfare, but the latter policy does not always decrease counterfeiting. J.E.L. Classi…cation: D82, D83, E40

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Model of ( the Threat of ) Counterfeiting

A simple matching-model of money with the potential for counterfeiting is constructed. In contrast to the existing literature, counterfeiting, if it occurred, would be accompanied by two distortions: costly production of counterfeits and harmful effects on trade. However, application of the Cho-Kreps refinement is shown to imply that there is no equilibrium with counterfeiting. If the cost of p...

متن کامل

Counterfeiting substitute media - of - exchange : a threat to monetary systems

One justification for cash-in-advance equilibria is the assumption that the counterfeiting of money is impossible, while the counterfeiting of higher-return substitute media-ofexchange is costless. It is shown that this justification is not robust to replacing costless by costly and placing the analysis within a signaling-game framework in which the intuitive criterion is invoked. In particular...

متن کامل

An Exploratory Analysis of Counterfeiting Strategies: Towards Counterfeit-Resilient Supply Chains

Purpose: To identify strategies employed by product counterfeiters in their exploitation of legitimate supply chains; to develop a theoretical understanding of counterfeiting and its impact on competitive resources; and, to propose counter-measures for increasing the resilience of supply chains to the counterfeiting threat. Design/methodology/approach: An inductive, qualitative analysis of seco...

متن کامل

A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs

Counterfeiting is a very serious threat to supply chain management systems. RFID systems are widely used to automate and speed up the process of remotely identifying products, however these systems are vulnerable to counterfeiting. In this paper, we propose a hierarchical anti-counterfeiting mechanism which uses a layered approach to identify dishonest middle parties involved in both counterfei...

متن کامل

Designing lanthanide-doped nanocrystals with both up- and down-conversion luminescence for anti-counterfeiting.

The widespread forgery in all kinds of paper documents and certificates has become a real threat to society. Traditional fluorescent anti-counterfeiting materials generally exhibit unicolor display and suffer greatly from substitution, thus leading to a poor anti-counterfeiting effect. In this work, unseen but significant enhanced blue down-conversion emission from oleic acid-stabilized lanthan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008