Injury-based protection with auditing under imperfect information
نویسنده
چکیده
We analyze optimal protection when a benevolent government must maintain nonnegative domestic profits and when the domestic import-competing firm has private information about its costs. A costly audit mechanism can deter strategic manipulation of this private information. We show that a high-penalty/lowprobability of investigation is optimal when the shadow price of the firm profit is low compared with the audit cost. A low-penalty/high-probability of investigation is optimal when there is a low investigation cost and a high shadow price of firm profit. In this latter case, the trade authority obtains truthful announcements by directly auditing the firm.
منابع مشابه
Auditing with Incomplete Logs
The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy enforcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove conformity to polic...
متن کاملProvenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and exposition of private data to unauthorized recipients have been publicly and widely advertised. For authorities and system administrators to check compliance to regulations, auditing of private data processing becomes cruc...
متن کاملImperfect Auditing, Appeals, and Limited Liability
We examine the e¤ect of an imperfect audit and a subsequent appeals process in a standard adverse selection problem when legal or institutional restrictions impose an upper bound on penalties. We show that the imperfect audit always reduces the agents information rent and enhances e¢ ciency despite the limited liability. A subsequent appeals process, which allows the agent to challenge an unfa...
متن کاملStrategic Audit Policies Without Commitment
This paper constructs and analyzes a simple model of auditing in which three principal issues are explored, namely: (i) The information contained in the report. An audit is a process of verification of a report of private information available to the reporter but not to the auditor. What information is contained in a report? Is it sufficient for the auditor to infer the private information exac...
متن کاملSecurity and Auditing Protection Method for Statistical Database
According to the statistical data security and auditing requirement, an effective Security Protection Method and a Rules-based Statistical Data Auditing (RSDA) solution are given. In this article, we introduce the classification and expression of statistical auditing rule.
متن کامل