Law in Contemporary Society

View   r4  >  r3  >  r2  >  r1
AbielGarciaSecondPaper 4 - 13 Jan 2012 - Main.IanSullivan
Line: 1 to 1
Changed:
<
<
META TOPICPARENT name="SecondPaper"
>
>
META TOPICPARENT name="SecondPaper2010"
 Abiel, I edited your paper and added my comments in blue. Let me know if you have any questions.

Two Party Playlets and Risk Profiles


AbielGarciaSecondPaper 3 - 02 May 2010 - Main.JeffreyPan
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"
Added:
>
>
Abiel, I edited your paper and added my comments in blue. Let me know if you have any questions.
 

Two Party Playlets and Risk Profiles

-- By AbielGarcia - 14 Apr 2010

Changed:
<
<
I recently received an e-mail from a family member who was imprisoned in Colombia and needed an undisclosed amount of money to get out. A week later I received an email from Anthony Pallone warning me of people phishing and trying to pull what Leff calls a "Spanish Prisoner." Leff describes the Prisoner as "a form of bunco in which two monopolies are personified and then dramatized in a play in which they are the absolutely irreplaceable complements of each other for the production of a particular bundle of wealth." In his discussion of the Spanish Prisoner, Leff asserts that the uniting factor of most swindles is that they involve casting, altercasting, and outcasting and that the only essential changes are with regards to plots of the con and dramatis personae. Yet, when changing the story of the con, what is important to change when it comes to different marks? Should the story be more credible, the potential profits less or even more, or should it be drawn out or perhaps shortened temporally? By analyzing the risk profile of "the mark," the prisoner can hopefully grasp a better understanding of how to draw the mark in.
>
>
"First, I must solicit your strictest confidence in this transaction. This is by virtue of its nature as being utterly confidential and top secret." As I scanned the first few lines of the e-mail, I realized that my junk mail filter had let another e-mail scam through. A week later I received an email from Anthony Pallone warning me of people phishing. While I appreciated the e-mail, I knew that there was no way I would have fallen for that congame. However, given our recent class discussion on Leff's Swindling & Selling, I started thinking about how one might adapt a congame to the idiosyncrasies of one's mark.

Leff describes this basic congame, commonly called the "Spanish Prisoner," as "a form of bunco in which two monopolies are personified and then dramatized in a play in which they are the absolutely irreplaceable complements of each other for the production of a particular bundle of wealth." In his discussion of the Spanish Prisoner, Leff asserts that the uniting factor of most swindles is that they involve casting, altercasting, and outcasting and that the only essential changes involve the plot and dramatis personae (characters) of the con.

Yet, one might also consider how to adapt the story of the con to fit different marks. Should the story be more credible? Should the potential profits be adjusted? Should the timeline be drawn out? By analyzing the risk profile of "the mark," the prisoner can grasp a better understanding of how to draw the mark in.

You don't have to use my introduction. However, I thought it might be entertaining to use an actual quote from the e-mail you received as a way of hooking your reader rather than just telling your reader that you received an e-mail.
 

Risk Profiles

Changed:
<
<
In a general, there are three main categories of players in risk behavior analysis. Players are either risk-averse, risk neutral, or risk-seekers. A risk-averse individual favors a more certain outcome with a lower profit than a less certain outcome with a higher profit. A risk neutral individual is indifferent as long as the expected profits are equal, whether on be riskier than the other. A risk-seeking individual will take the highest profit even if the chance of the profit succeeding is one percent. The risk profile of a con's intended target has a significant effect on what types of casting must be used for the con to be successful.
>
>
In a general, there are three main categories of players in risk behavior analysis: risk-averse, risk neutral, and risk-seeking. A risk-averse individual favors certain outcomes over risky outcomes even it means settling for a lower profit. A risk neutral individual is indifferent as long as the risk is equal to the expected profits. A risk-seeker will prefer a riskier outcome if the payout is higher. The risk profile of a con's intended target has a significant effect on what types of casting must be used for the con to be successful.
 

Leff's Con Using Risk Analysis

Changed:
<
<
Using the risk behavior and applying it at every decision that the mark makes, one can discern what each type of person needs for them to play their appropriate role. In Leff's Greek Prisoner scenario, the mark's risk profile affects how he will react to the initial request for $150 and the rest of the decisions he makes. A risk-averse individual will begin by focusing on the probability. For this person, the credibility of the prisoner at this point has to be high, if the probability of the payout is to low, then he will disregard it, even if his profit is higher than any other option. On the other hand, a risk-seeking individual will be easier to hook because his thoughts will gravitate towards the high pay out of $300,000. Thus, the prisoner must realize that if he wants to hook a risk-averse individual, he must have more credibility at the outset of the con then when trying to hook a risk-seeking individual. The same principles apply when the mark is making the final decision of whether to send the $8,000. The risk-averse individual will need more credibility to ultimately make the decision, just as Dr. Tzourous wrote the second letter asking for more credibility, while the risk-seeking individual will not require as much pushing or persuading to give the money up. Thus, within the context of the con itself, the prisoner, by understanding what kind of behavior the mark exhibits, can get away with pulling the same con with less credibility, i.e. newspapers or documents, by pulling it on a risk-seeking individual.
>
>
By applying risk behavior analysis to every decision that the mark makes, the prisoner can discern how to maximize his payout for each mark. In Leff's Greek Prisoner scenario, the mark's risk profile affects how he reacts to the initial request for $150 and the rest of the decisions he makes. A risk-averse individual would focus on the certainty of the outcome. For this type of person, the credibility of the prisoner has to be high. If the probability of the payout is too low, then the risk-averse individual would disregard it, even if his potential profit is higher than any other option. On the other hand, a risk-seeker would be easier to hook because he would be focused on the high payout of $300,000. Thus, the prisoner must realize that if he wants to hook a risk-averse individual, he needs more credibility at the outset of the con then when trying to hook a risk-seeking individual.

The same principles apply when making decisions within the context of the con. Even after initially committing, the risk-averse individual may need more evidence of credibility before he makes the decision to send the money, just as Dr. Tzourous wrote the second letter asking for further proof. Yet, the risk-seeking individual will not require as much pushing or persuading to give the money up. Thus, the prisoner, by understanding what kind of behavior the mark exhibits, can adjust the ongoing plot of the con to fit the mark.

Is one's susceptibility to a con really dependent on one's risk profile? Or is it more dependent on one's naivete? After all, isn't it possible for an individual to be extremely risk-seeking, but at the same time, recognize that a letter or e-mail is a scam? Also, you make the point that a prisoner needs to increase his credibility when pursuing a risk-averse individual. However, wouldn't a prisoner want to be as credible as possible toward all of his marks?
 

The Con as a Whole

Changed:
<
<
As the prisoner understands that the behavior characteristics of the mark affect every decision made within the con, if the mark, at the initial decision to even enter the game, has other investment opportunities, then the prisoner has to increase his credibility again from the original level. Leff concludes that the prisoner game is a bilateral monopoly game, although not a perfect one. But if the con is looked at as an investment, then the monopoly power of the prisoner is lessened, especially if the mark risk-averse. It begins to look like a monopoly on the part of the mark, who alone wields the power to continue the con. Not until the first response is made by the mark does the con become a bilateral monopoly problem. The con, in itself, is a very risky prospect for the mark, especially if he has other licit investments that are more certain. A risk-averse person would rather take 40 dollars than flip a coin to get 100, even though the expected payout of flipping the coin is higher. The prisoner must realize that he is not only trying to hook the mark within the con itself, i.e. getting the doctor to pay for additional expenses for leaving the country, but also trying to hook the mark in the greater context of investment opportunities. Again, the prisoner, by understanding the mark's risk profile, can manipulate the credibility of himself in order to make sure the initial hook brings in the mark.
>
>
If the mark, when presented with the initial option to enter the congame, has other investment opportunities, then the prisoner, again, has to increase his credibility. Leff argues that the prisoner game is a bilateral monopoly, although not a perfect one. However, if the con is looked at as an investment, then the monopoly power of the prisoner is lessened, especially if the mark is risk-averse. The con turns into a monopoly for the mark, who alone wields the power to continue the con. Not until the mark first responds does the con become a bilateral monopoly. The con, in itself, is a very risky prospect for the mark, especially if he has other licit investments that are more certain. For example, a risk-averse person would rather take $40 than flip a coin to get $100, even though the expected payout of flipping the coin is higher. The prisoner must realize that he is not only trying to hook the mark within the con itself (i.e. getting the doctor to pay the additional expenses of leaving the country), but also trying to hook the mark in the greater context of investment opportunities. By understanding the mark's risk profile, the prisoner can manipulate his own credibility in order to make sure the initial hook brings in the mark.

The con isn't a "very risky" prospect for the mark, it is a hopeless prospect that is disguising itself as a guaranteed investment. In this sense, the con may appear to be a safer bet than other licit investments (if the mark falls for the con).
 

What does this all mean?

Changed:
<
<
What this all means, especially in the context of selling, is that understanding one's risk profile is vital to ensure that the mark will continue to fall for the con. Now, cons are done on a mass basis, with generic emails flooding servers hoping for a bite from a mark that fits the role. Having generic email invites only a self-selecting pool of risk-seeking individuals and misses on many types of other individuals. The initial communication to the mark is competing as an investment opportunity with other licit or illicit opportunities. The con man needs to tailor the credibility to the risk profile to be able to avail himself to more of an audience. Once the mark responds, the imperfect bilateral monopoly game can begin with the prisoner adjusting his credibility to the amount of money requested with each communication. Using risk behavior analysis, one can understand what to change in a con to land "the big fish."
>
>
What this all means, in the context of selling, is that understanding a mark's risk profile is vital to ensure that the mark will continue to fall for the con. Today, cons are done on a mass basis, with generic e-mails flooding servers hoping for a bite from a mark that fits the role. Yet, this type of generic e-mail only hooks a self-selecting pool of risk-seeking individuals and misses on many other types of people. The initial communication to the mark is competing as an investment opportunity with other licit or illicit opportunities. The con man needs to tailor the credibility to the risk profile of each mark in order to appeal to a wider audience. Once the mark responds, the imperfect bilateral monopoly game begins with the prisoner adjusting his credibility to the amount of money requested with each communication. Using risk behavior analysis, one can understand what to change in a con to land "the big fish."
 
Added:
>
>
Why didn't you fall for the e-mail scam that was sent to you? Is it because you're risk-averse? Or is it because you're smart enough to know a scam when you see one? For most people today, these types of e-mail scams aren't really competing with licit investment opportunities like stocks and bonds. It might be interesting to explore how conmen can establish credibility by using modern day conmen as examples (e.g. Bernie Madoff).
 
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.

AbielGarciaSecondPaper 2 - 16 Apr 2010 - Main.AbielGarcia
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"
Changed:
<
<
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Paper Title

>
>

Two Party Playlets and Risk Profiles

 -- By AbielGarcia - 14 Apr 2010
Added:
>
>
I recently received an e-mail from a family member who was imprisoned in Colombia and needed an undisclosed amount of money to get out. A week later I received an email from Anthony Pallone warning me of people phishing and trying to pull what Leff calls a "Spanish Prisoner." Leff describes the Prisoner as "a form of bunco in which two monopolies are personified and then dramatized in a play in which they are the absolutely irreplaceable complements of each other for the production of a particular bundle of wealth." In his discussion of the Spanish Prisoner, Leff asserts that the uniting factor of most swindles is that they involve casting, altercasting, and outcasting and that the only essential changes are with regards to plots of the con and dramatis personae. Yet, when changing the story of the con, what is important to change when it comes to different marks? Should the story be more credible, the potential profits less or even more, or should it be drawn out or perhaps shortened temporally? By analyzing the risk profile of "the mark," the prisoner can hopefully grasp a better understanding of how to draw the mark in.
 
Changed:
<
<

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

>
>

Risk Profiles

 
Added:
>
>
In a general, there are three main categories of players in risk behavior analysis. Players are either risk-averse, risk neutral, or risk-seekers. A risk-averse individual favors a more certain outcome with a lower profit than a less certain outcome with a higher profit. A risk neutral individual is indifferent as long as the expected profits are equal, whether on be riskier than the other. A risk-seeking individual will take the highest profit even if the chance of the profit succeeding is one percent. The risk profile of a con's intended target has a significant effect on what types of casting must be used for the con to be successful.
 
Changed:
<
<

Subsub 2

>
>

Leff's Con Using Risk Analysis

 
Added:
>
>
Using the risk behavior and applying it at every decision that the mark makes, one can discern what each type of person needs for them to play their appropriate role. In Leff's Greek Prisoner scenario, the mark's risk profile affects how he will react to the initial request for $150 and the rest of the decisions he makes. A risk-averse individual will begin by focusing on the probability. For this person, the credibility of the prisoner at this point has to be high, if the probability of the payout is to low, then he will disregard it, even if his profit is higher than any other option. On the other hand, a risk-seeking individual will be easier to hook because his thoughts will gravitate towards the high pay out of $300,000. Thus, the prisoner must realize that if he wants to hook a risk-averse individual, he must have more credibility at the outset of the con then when trying to hook a risk-seeking individual. The same principles apply when the mark is making the final decision of whether to send the $8,000. The risk-averse individual will need more credibility to ultimately make the decision, just as Dr. Tzourous wrote the second letter asking for more credibility, while the risk-seeking individual will not require as much pushing or persuading to give the money up. Thus, within the context of the con itself, the prisoner, by understanding what kind of behavior the mark exhibits, can get away with pulling the same con with less credibility, i.e. newspapers or documents, by pulling it on a risk-seeking individual.
 
Added:
>
>

The Con as a Whole

 
Changed:
<
<

Section II

>
>
As the prisoner understands that the behavior characteristics of the mark affect every decision made within the con, if the mark, at the initial decision to even enter the game, has other investment opportunities, then the prisoner has to increase his credibility again from the original level. Leff concludes that the prisoner game is a bilateral monopoly game, although not a perfect one. But if the con is looked at as an investment, then the monopoly power of the prisoner is lessened, especially if the mark risk-averse. It begins to look like a monopoly on the part of the mark, who alone wields the power to continue the con. Not until the first response is made by the mark does the con become a bilateral monopoly problem. The con, in itself, is a very risky prospect for the mark, especially if he has other licit investments that are more certain. A risk-averse person would rather take 40 dollars than flip a coin to get 100, even though the expected payout of flipping the coin is higher. The prisoner must realize that he is not only trying to hook the mark within the con itself, i.e. getting the doctor to pay for additional expenses for leaving the country, but also trying to hook the mark in the greater context of investment opportunities. Again, the prisoner, by understanding the mark's risk profile, can manipulate the credibility of himself in order to make sure the initial hook brings in the mark.
 
Changed:
<
<

Subsection A

>
>

What does this all mean?

 
Changed:
<
<

Subsection B

>
>
What this all means, especially in the context of selling, is that understanding one's risk profile is vital to ensure that the mark will continue to fall for the con. Now, cons are done on a mass basis, with generic emails flooding servers hoping for a bite from a mark that fits the role. Having generic email invites only a self-selecting pool of risk-seeking individuals and misses on many types of other individuals. The initial communication to the mark is competing as an investment opportunity with other licit or illicit opportunities. The con man needs to tailor the credibility to the risk profile to be able to avail himself to more of an audience. Once the mark responds, the imperfect bilateral monopoly game can begin with the prisoner adjusting his credibility to the amount of money requested with each communication. Using risk behavior analysis, one can understand what to change in a con to land "the big fish."
 



AbielGarciaSecondPaper 1 - 14 Apr 2010 - Main.AbielGarcia
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="SecondPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Paper Title

-- By AbielGarcia - 14 Apr 2010

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" on the next line:

# * Set ALLOWTOPICVIEW = TWikiAdminGroup, AbielGarcia

Note: TWiki has strict formatting rules. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of that line. If you wish to give access to any other users simply add them to the comma separated list


Revision 4r4 - 13 Jan 2012 - 23:34:05 - IanSullivan
Revision 3r3 - 02 May 2010 - 16:27:35 - JeffreyPan
Revision 2r2 - 16 Apr 2010 - 21:56:52 - AbielGarcia
Revision 1r1 - 14 Apr 2010 - 14:39:20 - AbielGarcia
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM