The crucial role of financial intermediaries for facilitating trade among strangers

Abstract

How are markets possible under conditions of anonymity and lack of repeat dealing? Many scholars consider the problem of fraud as one that must be dealt with by law, but electronic commerce firms treat the problem of online fraud as a business problem, a problem of risk management. This article documents how merchants and financial intermediaries treat fraud as a cost that can be quantified and then minimized. Just as entrepreneurs earn profits by helping meet a previously unmet market demand, entrepreneurs earn profits by helping reduce what could have been considered an unsolved legal problem. Firms have profited by using predictive analytics and various if-then algorithms to help mitigate what might otherwise be an intractable problem and help vastly expand the scope of commerce.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3

Notes

  1. 1.

    Electronic commerce firm Riskified writes, “While every chargeback incurred is painfully noticeable, falsely declined orders mostly go unnoticed and unreported,” and refers to orders that do not take place as an “invisible problem” ( 2015, p. 4).

  2. 2.

    Card-not-present transactions are those where a customer does not physically hand the card to merchants. That includes mail order, telephone, internet, or recurring purchases. For a discussion of how merchants or banks must bear the cost of card-not-present fraud, see Tu 2013, p. 120.

  3. 3.

    Among the first authors to talk about how people doing business online rely on extralegal solutions to their problems is Kollock (1999), who describes people building trust online, for example through eBay. Gillette (2001) is among the first authors to talk about how intermediaries help establish trust online. DeGennaro (2006) also provides an excellent analysis of the work of credit card networks to minimize the costs of fraud. Cai and Zhu (2016) discuss how online reputation flows can be clouded by firms posting misleading reviews or masking their identity and propose that blockchain ledger technology can be used to document that a transaction did or did not take place in a way that reviewers describe. Koulu (2016) also suggests that future electronic commerce firms will be able to rely on blockchain technology to mitigate the risks of fraud. When we first started researching this topic in late 2015, blockchain and smart contract technology were being discussed as potentially important ways to reduce fraud but had not been implemented in any serious way compared to today.

  4. 4.

    To theorists writing in this tradition, markets themselves, and especially technologically advanced markets, cannot exist without government enforcing laws against fraud. Douglass North (1990, pp. 12, 35), for example, argues that “realizing the economic potential of the gains from trade in a high technology world of enormous specialization and division of labor characterized by impersonal exchange is extremely rare, because one does not necessarily have repeated dealings, nor know the other party, nor deal with a small number of other people.” North writes, “The returns on opportunism, cheating, and shirking rise in complex societies. A coercive third party is essential.” James Buchanan and North are among the more famous expositors of this perspective. See Buchanan 1975.

    Martin Boyer (2007, p. 481) theorized that when “the proportion of agents that have a low propensity to tell the truth is high,” then “resistance to fraud is futile.” In the 1990s Douglass North and Richard Epstein (1999) predicted that technologically advanced commerce could not expand without effective laws against fraud.

  5. 5.

    CyberSource (2018c) also recommends that managers create a positive database with known valuable customers put on a white list and a negative database that puts individuals or devices with past problems, such as bad addresses or names, on a gray list or blacklist. Orders from good customers need not go through the same levels of scrutiny as orders from new customers, while customers on a gray list may have their orders turned down or put through extra steps before being processed. For example, the Verified by Visa program requires a purchaser to provide an additional password to help authenticate a transaction, so a hacker with just a stolen credit card number will be thwarted.

  6. 6.

    In April 2016, Digital Asset Holdings purchased a Swiss smart-contract start-up, Elevence, and its “powerful modeling language capable of expressing any right or obligation, including cash, securities and derivatives, whereby the code defines the considerations between parties, and determines how these contractual relations can evolve over time” (Digital Asset Holdings 2016). Digital Asset Holdings explains the objective: “The primary goal of blockchains with inbuilt Smart Contracts was to create self-enforcing agreements that independently control and automate the exchange of value according to predetermined rules based on predefined inputs.”

  7. 7.

    Many economists including Luther (2018) have a stricter definition of smart contract to say that it should be only enforced by an algorithm and have no human involvement. We are not particularly devoted to the stricter or looser definition of smart contract, but the person to coin the term, Szabo (1997), describes conditions where a human could judge that a smart contract be not enforced.

  8. 8.

    “Smart” contracts are only as smart as they are programmed. At a simple level, a smart contract that looks for an NHL score on NBA.com will not work, and at a more complex level, an entity might have some well-programmed smart contracts but remain vulnerable to hackers. An example of a potentially innovative but poorly designed entity relying on smart contracts is an investment fund called The DAO. In June 2016, about a month after it raised the equivalent of $150 million in the cryptocurrency Ether, hackers initiated transactions to take $55 million from it. On the plus side, The DAO’s code specified a 27-day waiting period before funds could be removed, so the sponsors reversed the fraudulent transactions and decided to liquidate the fund and return all the money to its investors. The event, however, showed that the platform was not fully autonomous and independent of human control as many of its early supporters were claiming. The list of problematic smart contracts goes on. In July 2017 hackers identified imperfectly written code in a multi-signature wallet called Parity on the Ethereum platform. Hackers figured out a way to get these multi-signature contracts to reinitialize and then exploit them, and they successfully stole $31 million worth of Ether. In November 2017 a hack led to $156 million worth of Ether in the Parity platform being frozen and made inaccessible, so it is safe to say that in 2018 we are still in the Wild West stage of this new technology. See Zhao 2017.

References

  1. Black, J. (2002). Max Levchin: Online fraud-buster. Bloomberg-Businessweek, (September 30).

  2. Boettke, P. J., & Coyne, C. J. (2009). Context matters: Institutions and entrepreneurship. Foundations and Trends in Entrepreneurship, 5(3), 135–209. https://doi.org/10.1561/0300000018

    Article  Google Scholar 

  3. Boyer, M. (2007). Resistance (to fraud) is futile. The Journal of Risk and Insurance, 74, 461–492.

    Article  Google Scholar 

  4. Brooks, G., & Button, M. (2011). The police and fraud investigation and the case for a nationalized solution in the United Kingdom. Police Journal: Theory, Practice, and Principles, 84(4), 305–319.

    Article  Google Scholar 

  5. Brooks, G., Button, M., & Frimpong, K. (2009). Policing fraud in the private sector: A survey of the FTSE 100 companies in the UK. International Journal of Police Science and Management, 11(4), 493–504.

    Google Scholar 

  6. Buchanan, J. M. (1975). The limits of liberty: Between anarchy and leviathan. Chicago: University of Chicago Press.

    Google Scholar 

  7. Cai, Y., & Zhu, D. (2016). Fraud detections for online businesses: A perspective from blockchain technology. Financial Innovation, 2(1), 20.

    Article  Google Scholar 

  8. Chargebacks911. (2015a). Chargeback rate. Chargebacks911.com May 13

  9. Chargebacks911. (2015b). High risk credit card processing: pros and cons. Chargebacks911.com April 15

  10. CyberSource (2012). 2012 online fraud report: Online payment fraud trends, merchant practices and benchmarks. San Francisco: CyberSource.

  11. CyberSource (2018a). Company history. CyberSource.com

  12. CyberSource (2018b) Optimising fraud management. CyberSource.com.

  13. CyberSource (2018c) Risk factor codes. CyberSource.com.

  14. DeGennaro, R. P. (2006). Credit card processing: A look inside the black box. Economic Review, 91(1), 27–42.

    Google Scholar 

  15. Digital Asset Holdings. (2016). Introducing the digital asset modeling language: A powerful alternative to smart contracts for financial institutions. News Release, (April 20).

  16. Epstein, R. A. (1999). Hayekian socialism. Maryland Law Review, 58, 271–299.

    Google Scholar 

  17. Gillette, C. (2001). Reputation and intermediaries in electronic commerce. Louisiana Law Review, 62, 1165.

    Google Scholar 

  18. Hackett, R. (2016). Why J.P. Morgan Chase is building a blockchain on Ethereum. Fortune Magazine, October 4.

  19. Haring, B. (2017) Biggest hack in history freezes $156M in tech funds, damaging some entertainment startups. Deadline.com November 11.

  20. Hope, B., & Casey, M. (2015). A Bitcoin technology gets NASDAQ test. Wall Street Journal, May 10.

  21. Jackson, E. M. (2004). The PayPal wars: Battles with eBay, the media, the mafia, and the rest of planet earth. Torrance: World Ahead Publishing.

    Google Scholar 

  22. Kollock, P. (1999). The production of trust in online markets. Advances in Group Processes, 16(1), 99–123.

    Google Scholar 

  23. Koulu, R. (2016). Blockchains and online dispute resolution: Smart contracts as an alternative to enforcement. SCRIPTed, 13, 40–69.

    Article  Google Scholar 

  24. Kount. (2013). Cutting chargeback costs and expanding internationally is music to Spotify’s ears. Boise: Kount.

    Google Scholar 

  25. Levchin, M. (2008). Interview between max Levchin and Jessica Livingston. In J. Livingston (Ed.), Founders at work: Stories of startups’ early days (pp. 1–16). New York: Springer-Verlag.

    Google Scholar 

  26. LexisNexis Risk Solutions. (2014). 2014 true cost of fraud study. Alpharetta: Reed Elsevier.

    Google Scholar 

  27. LexisNexis Risk Solutions. (2016). 2016 true cost of fraud study. Alpharetta: Reed Elsevier.

    Google Scholar 

  28. Luther, W. (2018). Bitcoin: Economist William Luther on the popularity of cryptocurrencies, attitudes toward the blockchain, and the future of the Bitcoin market. Serious Science, June 29.

  29. Nair, M., & Sutter, D. (2018). The blockchain and increasing cooperative efficacy. Independent Review, 22, 529–550.

    Google Scholar 

  30. North, D. C. (1990). Institutions, institutional change, and economic performance. Cambridge: Cambridge University Press.

    Google Scholar 

  31. Pan, G., et al. (Eds.). (2015). Analytics and cybersecurity: The shape of things to come. Singapore: CPA Australia.

    Google Scholar 

  32. PayPal. (2016). Who we are. San Jose: PayPal.

  33. Petram, L. (2014). The world’s first stock exchange. New York: Columbia University Press.

    Google Scholar 

  34. Powell, B., & Rodet, C. (2012). Praise and profits: Cultural and institutional determinants of entrepreneurship. Journal of Private Enterprise, 27, 19–42.

    Google Scholar 

  35. Prashanth, K. (2004) PayPal.com’s business model. Hyderabad: ICFAI Center for Management Research.

  36. Raskin, M. (2017). The law and legality of smart contracts. Georgetown Law Technology Review, 1, 304–341.

    Google Scholar 

  37. Riskified. (2015). How to avoid false declines: Guide for eCommerce merchants. Tel Aviv: Riskified.

    Google Scholar 

  38. Robinson, E., & Leising, M. (2015). Blythe Masters tells banks the blockchain changes everything. October: Bloomberg Markets Magazine.

    Google Scholar 

  39. Rothbard, M. N. (1980). Introduction. In F. A. Fetter (Ed.), Capital, interest, and rent: Essays in the theory of distribution. New York: New York University Press.

    Google Scholar 

  40. Schwartz, E. (2001) Digital cash payoff: Online payment services like PayPal are catching on. MIT Enterprise Technology Review

  41. Stringham, E. P. (2003). The extralegal development of securities trading in seventeenth century Amsterdam. The Quarterly Review of Economics and Finance, 43(2), 321–344.

    Article  Google Scholar 

  42. Stringham, E. P. (2005). The capability of government in providing protection against online fraud. Journal of Law, Economics, and Policy, 1(2), 371–392.

    Google Scholar 

  43. Stringham, E. P. (2015). Private governance: Creating order in economic and social life. Oxford: Oxford University Press.

    Google Scholar 

  44. Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday, September.

  45. Tu, K. V. (2013). Regulating the new cashless world. Alabama Law Review, 65(1), 77–138.

    Google Scholar 

  46. US Census Bureau (2016). Advance monthly sales for retail and food services, 1992–2016. Washington: US Census Bureau.

  47. Zhao, L. (2017). Hackers have stolen $32 million in Ethereum in the second heist this week. Business Insider, July 20.

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to J. R. Clark.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Stringham, E.P., Clark, J.R. The crucial role of financial intermediaries for facilitating trade among strangers. Rev Austrian Econ 33, 349–361 (2020). https://doi.org/10.1007/s11138-018-0429-0

Download citation

Keywords

  • Innovation
  • Fraud prevention
  • Payment processing
  • Credit cards
  • Predictive analytics
  • Blockchain
  • Smart contracts

JEL classification

  • G28
  • L26
  • N20
  • P17