Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-wg55d Total loading time: 0 Render date: 2024-05-31T23:48:44.537Z Has data issue: false hasContentIssue false

9 - Inspector Leadership

Published online by Cambridge University Press:  06 November 2009

Rudolf Avenhaus
Affiliation:
University of the Federal Armed Forces, Hamburg
Morton John Canty
Affiliation:
Juelich Research Center
Get access

Summary

Principiis obsta!

The reader who has made it this far may feel that a lot of mileage has been squeezed from one simple concept, namely the zero-sum game with non-detection probability or time to detection as the payoff to the verified party. Is this model really justified, or do the many ‘optimal’ inspection strategies that have been derived in the preceding chapters have little relevance to real-world conflicts of interest, with all their ambiguity and complication?

Even under the assumption of illegal behavior, the zero-sum game seems questionable. What about false alarms, for instance? Their avoidance is clearly in both players' interest. And what about the option of legal behavior? In practice the inspectee chooses this option in the vast majority of cases. Surely that fact should influence the inspector's actions. Which inspection strategies deter violations? Can deterrence be quantified?

We approached these questions briefly in Chapter 6 in the context of attributes sampling. Here we shall face them head-on. There is a more general way of analyzing verification problems, one which takes into account such broader questions and which also fortunately legitimizes the results we have obtained in the foregoing chapters. It involves a deeper application of the formalism of non-cooperative games and the associated solution concept of equilibrium strategies. It treats the deterrence aspect in a novel way by examining a class of games in which the inspector announces his verification strategy in advance and in a credible way.

Type
Chapter
Information
Compliance Quantified
An Introduction to Data Verification
, pp. 207 - 244
Publisher: Cambridge University Press
Print publication year: 1996

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×