Victim Compensation Policy and White Collar Crime

Total Page:16

File Type:pdf, Size:1020Kb

Victim Compensation Policy and White Collar Crime RESEARCH ARTICLE VICTIM COMPENSATION AND WHITE-COLLAR CRIME Victim Compensation Policy and White- Collar Crime Public Preferences in a National Willingness-to-Pay Survey Miranda A. Galvin University of Maryland—College Park Thomas A. Loughran Pennsylvania State University Sally S. Simpson University of Maryland—College Park Mark A. Cohen Vanderbilt University Research Summary We use survey data from a nationally representative sample to explore public sup- port for taxpayer-funded victim compensation programs for financial fraud, consumer fraud, identity theft, and burglary. We use contingent valuation (willingness-to-pay) methodology to infer preferences for compensation programs and explore predictors of those preferences. Overall, our findings reveal that the public strongly supports the implementation of victim compensation programs. Our results also indicate, however, that this support may be driven in part by perceptions of benefiting from this program directly in the future. Additionally, a small but notable minority of respondents exhibit preferences for programs without compensation. This project was supported by Award 2013-IJ-CX-0058, granted by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect those of the Department of Justice. All code and analyses conducted as part of this article are available by request. Direct correspondence to Miranda A. Galvin, Department of Criminology and Criminal Justice, University of Maryland, 2220 LeFrak Hall, College Park, MD 20742 (e-mail: [email protected]). DOI:10.1111/1745-9133.12379 C 2018 American Society of Criminology 553 Criminology & Public Policy Volume 17 Issue 3 Research Article Victim Compensation and White-Collar Crime Policy Implications Our findings suggest that the general public is supportive of restitutive compensation programs, not only as paid for by offenders but also as paid for by the government. We suggest that policy makers may seek to extend victim compensation funds to white-collar crimes, which may otherwise be more financially damaging than traditional crimes. Keywords victim compensation, public preferences, willingness to pay, white-collar crime, fraud stimates of the cost of crime to victims range into hundreds of billions of dollars. Yet, crime victims seldom receive full compensation for the monetary harms they E endure, such as property loss or damage, lost wages, medical, or mental health care costs. Indeed, restitution is not mandatory in all jurisdictions, and even when it is, judges often reduce the amount based on the offender’s ability to pay. 1 Beginning in the 1960s, various government-sponsored victim compensation funds were established to augment restitution (Kauffman and Samuels, 2014). Given the limited fnancial means of many offenders (Rabuy and Kopf, 2015), and the limited victim compensation program funding that relies mainly on offender fnes and penalties, relying upon restitution and/or victim compensation programs is unlikely to provide adequate funding to ensure victims are restored to their previctimization fnancial state. For example, victim compensation programs provide an estimated $500 million annually to 200,000 victims, which is only a small fraction of the millions of Americans who are victimized by crimes in the United States (see the National Association of Crime Victim Compensation Board website: nacvcb.org/index.asp). Anderson (2012) estimated that crime victims lose $14.7 billion annually in wages alone. The most recent victimization survey (Truman and Morgan, 2016: Table 6) estimated that only 9% of violent crime victims receive any form of assistance from victim assistance programs (including assistance in obtaining restitution and/or victim compensation). To increase victim compensation funding would likely require additional revenue sources beyond the current stream of penalties and fnes.2 Not only are crime victims underserved by victim compensation programs, but also these programs are limited in the scope of crimes included. Programs seldom cover victims of burglary, theft, and fraud, and compensation is generally unavailable for victims who were not physically injured (Kauffman and Samuels, 2014). Yet the costs of consumer fraud are 1. Cohen (2005) cited data indicating that restitution is ordered in only approximately 15% of felony convictions, and even when ordered, only half of the amounts ordered are collected. 2. Although currently approximately $600 million annually is diverted from direct victim compensation from the Crime Victims Fund to other forms of victim assistance-related grants, even this level of funding would not come close to satisfying the potential need. See Statement of Congressman Bob Goodlatte, House Judiciary Committee Oversight Hearings, June 8, 2017 (judiciary.house.gov/press-release/goodlatte-statement-hearing-department-justices-grant-programs/). 554 Criminology & Public Policy Galvin et al. high. For example, Cohen (2016) estimated the out-of-pocket costs to victims of identity theft (aside from the cost to banks and other organizations who bear the largest direct costs) total $13 to $32 billion, whereas the cost of consumer fraud is estimated to range between $4 and $12 billion. These costs far outweigh the funds currently available for victim compensation programs. In a recent study of victim compensation programs, Evans (2014: 17) recommended that state programs “address victims of other types of prevalent crime, including fnancial fraud.” Some scholars have argued that the scope of property crimes would create a compensation program so large, and (presumably) easy to take advantage of, that “where it is the taxpayer who funds the arrangements, [compensation programs for nonviolent crime] are fnancially and thus politically prohibitive” (Miers, 2014: 156). This assumption, however, may not be an accurate representation of public support for victim compensation programs for nonviolent crimes. In fact, there is scant empirical research on the degree of public support for victim compensation programs in general, despite the existence of some compensation programs for more than three decades (Cohen, 2005; Miers, 2014). Furthermore, we are unaware of any evidence on whether taxpayer-funded programs have public support. In studying how the public tends to view victim compensation for crimes, scholars have been primarily concerned with public acceptance for restitution, or the fnancial payment to victims by offenders, as a punishment alternative. Researchers have generally found broad public support for fnancial over carceral sanctions, both in the United States (e.g., Bae, 1991, 2000; Doble, 1987; Doble and Klein, 1989; Knowles, 1987; Umbreit, 1994) and internationally (e.g., Boer and Sessar, 1989; Doob and Roberts, 1988; Galaway, 1994a, 1994b). A general gap in this literature concerns how the public views victim compensation provided through government programs, rather than as part of an offender’s sentence, as a policy option. In this study, we provide evidence on whether the public supports taxpayer- funded victim compensation programs, and we test hypotheses that individuals should tend to be more supportive of a crime reduction policy that includes allotments for victim compensation by relying on assumptions of altruism and social preferences for fairness. A large body of research comprises evidence for altruism (seemingly non–utility-maximizing behavior that results in a beneft to another person). Yet, observed behavior nominally labeled as “altruism” may also stem from rational, self-benefting considerations, or, what are generally recognized as social preferences (Charness and Rabin, 2002). It may be that public support for compensation programs is not driven by social preferences for fairness or a general willingness to beneft others, but instead could stem from perceptions that these policies will directly beneft them based on past experience or expectations for the future. These motivations are at odds, but they underscore a question at the core of many victim compensation programs—are these programs funded out of empathy and desire to insulate the victim from extended harm (e.g., Ministry of Justice, 2012: para. 149)? Or are victim compensation programs a form of public insurance against our “statistically determinable risk of victimization” (Miers, 2014: 155). Volume 17 Issue 3 555 Research Article Victim Compensation and White-Collar Crime We attempt to unpack these conficting motivations for supporting publicly funded victim compensation by using data from a nationally representative survey eliciting indi- viduals’ willingness to pay to reduce several types of white-collar crimes (fnancial fraud, consumer fraud, identity theft) in which multiple program options are offered and com- pared to evaluate general levels of support for publicly managed victim compensation programs. Furthermore, we consider whether preferences for victim compensation vary by certain attributes, including type of crime, situation of victim, individual victimization, and perceived risk of personal victimization. We also consider the degree to which, above and beyond these individual characteristics, public support is sensitive to the way in which information about victimization and policy packages are framed. White-collar crime provides a unique framework for an initial study of this problem. Although there
Recommended publications
  • Strange Victory: a Critical Appraisal of Operation Enduring Freedom and the Afghanistan War
    30 JANUARY 2002 RESEARCH MONOGRAPH #6 Strange Victory: A critical appraisal of Operation Enduring Freedom and the Afghanistan war Carl Conetta PROJECT ON DEFENSE ALTERNATIVES COMMONWEALTH INSTITUTE, CAMBRIDGE, MASSACHUSETTS Contents Introduction 3 1. What has Operation Enduring Freedom accomplished? 4 1.1 The fruits of victory 4 1.1.1 Secondary goals 5 1.2 The costs of the war 6 1.2.1 The humanitarian cost of the war 7 1.2.2 Stability costs 7 2. Avoidable costs: the road not taken 9 3. War in search of a strategy 10 3.1 The Taliban become the target 10 3.2 Initial war strategy: split the Taliban 12 3.2.1 Romancing the Taliban 13 3.2.2 Pakistan: between the devil and the red, white, and blue 14 3.3 The first phase of the air campaign: a lever without a fulcrum 15 3.3.1 Strategic bombardment: alienating hearts and minds 15 3.4 A shift in strategy -- unleashing the dogs of war 17 4. A theater redefined 18 4.1 Reshuffling Afghanistan 19 4.2 Regional winners and losers 20 4.3 The structure of post-war Afghan instability 21 4.3.1 The Bonn agreement: nation-building or “cut and paste”? 22 4.3.2 Peacekeepers for Afghanistan: too little, too late 24 4.4 A new game: US and Afghan interests diverge 25 4.4.1 A failure to adjust 26 5. The tunnel at the end of the light 28 5.1 The path charted by Enduring Freedom 28 5.2 The triumph of expediency 29 5.3 The ascendancy of Defense 29 5.4 Realism redux 31 5.5 Bread and bombs 32 5.6 The fog of peace 34 Appendix 1.
    [Show full text]
  • The Truth of the Capture of Adolf Eichmann (Pdf)
    6/28/2020 The Truth of the Capture of Adolf Eichmann » Mosaic THE TRUTH OF THE CAPTURE OF ADOLF EICHMANN https://mosaicmagazine.com/essay/history-ideas/2020/06/the-truth-of-the-capture-of-adolf-eichmann/ Sixty years ago, the infamous Nazi official was abducted in Argentina and brought to Israel. What really happened, what did Hollywood make up, and why? June 1, 2020 | Martin Kramer About the author: Martin Kramer teaches Middle Eastern history and served as founding president at Shalem College in Jerusalem, and is the Koret distinguished fellow at the Washington Institute for Near East Policy. Listen to this essay: Adolf Eichmann’s Argentinian ID, under the alias Ricardo Klement, found on him the night of his abduction. Yad Vashem. THE MOSAIC MONTHLY ESSAY • EPISODE 2 June: The Truth of the Capture of Adolf Eichmann 1x 00:00|60:58 Sixty years ago last month, on the evening of May 23, 1960, the Israeli prime minister David Ben-Gurion made a brief but dramatic announcement to a hastily-summoned session of the Knesset in Jerusalem: A short time ago, Israeli security services found one of the greatest of the Nazi war criminals, Adolf Eichmann, who was responsible, together with the Nazi leaders, for what they called “the final solution” of the Jewish question, that is, the extermination of six million of the Jews of Europe. Eichmann is already under arrest in Israel and will shortly be placed on trial in Israel under the terms of the law for the trial of Nazis and their collaborators. In the cabinet meeting immediately preceding this announcement, Ben-Gurion’s ministers had expressed their astonishment and curiosity.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Robert Ludlum © the BOURNE ULTIMATUM
    Robert Ludlum © THE BOURNE ULTIMATUM 1 Robert Ludlum © THE BOURNE ULTIMATUM ROBERT LUDLUM THE UNSURPASSED MASTER OF THE SUPERTHRILLER AND ON SALE IN BANTAM HARDCOVER IN MAY 1993 THE SCORPIO ILLUSION 2 Robert Ludlum © THE BOURNE ULTIMATUM THE TRANSFORMATION The station wagon raced south down a backcountry road through the hills of New Hampshire toward the Massachusetts border, the driver a long-framed man, his sharp-featured face intense, his clear light-blue eyes furious. “We knew it would happen,” said Marie St. Jacques Webb. “It was merely a question of time.” “It’s crazy!” David whispered so as not to’ wake the children. “Everything’s buried, maximum archive security and all the rest of that crap! How did anyone find Alex and Mo?” “We don’t know, but Alex will start looking. There ’s no one better than Alex, you said that yourself—” “He’s marked now—he’s a dead man,” interrupted Webb grimly. “They’ll kill him and come after me ... after us, which is why you and the kids are heading south. The Caribbean.” “I’ll send them, darling. Not me.” “There’s nothing to discuss.” Webb breathed deeply, steadily, imposing a strange control. “I’ve been there before,” he said quietly. Marie looked at her husband, his suddenly passive face outlined in the dim wash of the dashboard lights. What she saw frightened her far more than the specter of the Jackal. She was not looking at David Webb the soft-spoken scholar. She was staring at a man they both thought had disappeared from their lives forever.
    [Show full text]
  • Cultural Capture and the Financial Crisis
    Preventing Regulatory Capture Special Interest Influence and How to Limit It Edited by DANIEL CARPENTER Harvard University DAVID A. MOSS Harvard University Cambridge University Press Not for sale or distribution. 32 Avenue of the Americas, New York, NY 10013-2473, USA Cambridge University Press is part of the University of Cambridge. It furthers the University’s mission by disseminating knowledge in the pursuit of education, learning, and research at the highest international levels of excellence. www.cambridge.org Information on this title: www.cambridge.org/9781107646704 C The Tobin Project 2014 This publication is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University Press. First published 2014 Printed in the United States of America A catalog record for this publication is available from the British Library. Library of Congress Cataloging in Publication Data Preventing regulatory capture : special interest influence and how to limit it / [edited by] Daniel Carpenter, Harvard University, David A. Moss, Harvard University. pages cm Includes index. ISBN 978-1-107-03608-6 (hardback) – ISBN 978-1-107-64670-4 (pbk.) 1. Deregulation – United States. 2. Trade regulation – United States. 3. Interest groups – United States. I. Carpenter, Daniel P., 1967– II. Moss, David A., 1964– HD3616.U63P74 2013 338.973–dc23 2013008596 ISBN 978-1-107-03608-6 Hardback ISBN 978-1-107-64670-4 Paperback Cambridge University Press has no responsibility for the persistence or accuracy of URLs for external or third-party Internet Web sites referred to in this publication and does not guarantee that any content on such Web sites is, or will remain, accurate or appropriate.
    [Show full text]
  • From Dictator Game to Ultimatum Game and Back Again: the Judicial
    Articles and Essays FROM DICTATOR GAME TO ULTIMATUM GAME... AND BACK AGAIN: THE JUDICIAL IMPASSE AMENDMENTS Ellen Dannint In 1935, Congress decided to replace the "dictator game" that had long been used to set working conditions with an "ultimatum game" by enacting the National Labor Relations Act (NLRA). A dictator game is a two-player economic game in which player one proposes a division of resources and player two has no choice but to accept the offer. Economic theory predicts that in such a case, player one will offer nothing to player two. This is indeed the most common offer.' Before the NLRA was enacted, the law allowed the employer (player one), to offer terms of employment and essentially required the employee (player two), to accept the offer dictated by the employer. The NLRA was enacted to replace this game with an "ultimatum game" by changing the balance of power between employers and employees and creating a system of wage setting that would better support the institutions of a democracy.2 In an ultimatum game, player one t Professor of Law, Wayne State University Law School. B.A., University of Michigan; J.D., University of Michigan. The author wishes to thank the following: Theodore St. Antoine, Richard Lempert, Gregory Saltzman, Gangaram Singh, participants in the University of Michigan Learning Theory Workshop, my colleagues at Wayne State University, and the University of Michigan labor law students class for their questions and thoughts that challenged ideas about the core issues discussed here. 1. Alvin E. Roth, Bargaining Experiments, in THE HANDBOOK OF EXPERIMENTAL ECONOMICS 253, 270 (John H.
    [Show full text]
  • Polk Delivers Ultimatum to Mexico More TODAY's Trouble in Ira„ "'Withdraw South of Nueces' American Soil Invaded! (AM PUS Morse Telegraph in Operation
    ,rs A JOKE, SON WEATHER »,«'/> Student APRIL MichiganPublicationSlate College Vol. 34, 334 I ss===--— MICHIGAN, MONDAY. APRIT , ___ "r"'u i, liHB^ No. 109 polk Delivers Ultimatum To Mexico More TODAY'S Trouble In Ira„ "'Withdraw South of Nueces' American Soil Invaded! (AM PUS Morse Telegraph In Operation . K Lou# Distance WASHINGTIN, M. C., Most remarkable incident to Women to Set xPrl!1816 («iHay««i Kcure al Hie local beanerles took j ) IVt'sitlcnl Polk ioelsty -lace !aft ,,isht when Cuthbert Chance t Btheror. junior, from Nome (ilrlivernl an iilliioaliiiii tin haiu'f his hat around the lo lh«» Mexican corner in the third house from govern* Life Time iiK'nt ,|-.e right of the left turn, enter¬ declaring all Irr* al I Cii'nntl news Auto's tireecy Spool. He set hits conie rilorv north <»f ili« Rio Short i of the last meeting of Order Grande \nit>riran - foil. judiciary administrative, _ B • > fust boot, and no sooner boartl of AWS anil tlitit is General I hud he set then a waiter roared ay leer has be- that .III women on campus will tv. asked , I;nn what he wanted, ordered to the bord- have 4 a.m. permissionpermission nn Tucs- ! ;..,i they tiad it anl staggered day nights and men will have to vr. df tt was back in 2.26:3, hot and keep strict hours, according to well-muttered, and Ccuss, that The record for enroll¬ Squirrlcy llammtlick. president. lucky swashbuckling roger, was ment just established at Reporter Crinoline Corny dash out was with his hands and face MSC — ed right over to interview Miss 7.!)!18 plus ( a fig¬ bed within nfteen gkq 123456 Mammilick since she beard this ure which takes into ac¬ t23mtwyplu with about 2034555 rumor while Harry Bivens, 18.
    [Show full text]
  • Table IV:3 – Example of Engagement and Agreement Conversation
    Adapted from “Field Guide to Consulting and Organizational Development” – to obtain the entire book, select “Publications” at http://www.authenticityconsulting.com Table IV:3 – Example of Engagement and Agreement Conversation The Transitioning Business (TB) had scheduled interviews with various consultants as a result of an ultimatum from the We Have Had It Investors. The ultimatum was that TB gets outside help or Investors no longer would invest in TB. One of the consultants that TB phoned was an organizational development consultant, OD Bob. In that phone call, CEO Ed explained that TB needed a consultant for a variety of services, including strategic planning, business planning and overall financial analysis. Ed added that whatever it took to get more money right away was the most important need. OD Bob agreed to attend an interview and mentioned that he would send information about himself to TB beforehand. OD Bob’s information was about his experience and credentials, his mission and values as a consultant, his priority on a collaborative approach, and his focus on systems and learning in organizations. He also asked that materials about TB be sent to him before the interview. Ed, OD Bob and members of the Board’s Search Committee attended the interview. Ed began the interview by welcoming OD Bob to TB. Ed explained that TB had some current challenges that needed a consultant. He said that mostly TB needed cash right now, so that would be the most important priority. He added that a local investor, the We Have Had It Investors, had made major investments in TB in the past.
    [Show full text]
  • The Spectral Voice and 9/11
    SILENCIO: THE SPECTRAL VOICE AND 9/11 Lloyd Isaac Vayo A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2010 Committee: Ellen Berry, Advisor Eileen C. Cherry Chandler Graduate Faculty Representative Cynthia Baron Don McQuarie © 2010 Lloyd Isaac Vayo All Rights Reserved iii ABSTRACT Ellen Berry, Advisor “Silencio: The Spectral Voice and 9/11” intervenes in predominantly visual discourses of 9/11 to assert the essential nature of sound, particularly the recorded voices of the hijackers, to narratives of the event. The dissertation traces a personal journey through a selection of objects in an effort to seek a truth of the event. This truth challenges accepted narrativity, in which the U.S. is an innocent victim and the hijackers are pure evil, with extra-accepted narrativity, where the additional import of the hijacker’s voices expand and complicate existing accounts. In the first section, a trajectory is drawn from the visual to the aural, from the whole to the fragmentary, and from the professional to the amateur. The section starts with films focused on United Airlines Flight 93, The Flight That Fought Back, Flight 93, and United 93, continuing to a broader documentary about 9/11 and its context, National Geographic: Inside 9/11, and concluding with a look at two YouTube shorts portraying carjackings, “The Long Afternoon” and “Demon Ride.” Though the films and the documentary attempt to reattach the acousmatic hijacker voice to a visual referent as a means of stabilizing its meaning, that voice is not so easily fixed, and instead gains force with each iteration, exceeding the event and coming from the past to inhabit everyday scenarios like the carjackings.
    [Show full text]
  • Industrial Relations Act Code of Good Practice
    SWD INDUSTRIAL RELATIONS ACT CODE OF GOOD PRACTICE: TERMINATION OF EMPLOYMENT 1. INTRODUCTION 1.1. This code is published in terms of Section 109 of the Industrial Relations Act. 1.2. This Code of Good Practice deals with some of the key aspects of termination of employment. It aims to summarise some of the provisions of the law and provide guidelines on applying the law. 1.3. This Code intends to assist- 3.1.1 employees and their staff associations and trade unions; 3.1.2. employers and their employer organizations; and 3.1.3. Conciliators, arbitrators and judges. 1. This Code has been drafted in accordance with the Employment Act and Industrial Relations Act and proposed 2002 amendments to those Acts. The Code will have to be checked once the proposed amendments are finalised, to ensure that the Code correctly reflects the law. 1 SWD 1.4. The guidelines in this Code may be departed from if there is good reason to do so. Anyone who departs from them must prove the reasons for doing so. The following kinds of reasons may justify a departure from the provisions of the Code. Note that this list is not exhaustive. 1.4.1. the size of the employer may justify a departure. For example, an employer with a small number of employees may not be required to comply with all the procedural requirements of this code, but that employer must, nevertheless, give an employee a fair opportunity to respond to any allegations before taking a decision affecting that employee’s rights.
    [Show full text]
  • Crimes Committed by Terrorist Groups: Theory, Research and Prevention
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Crimes Committed by Terrorist Groups: Theory, Research and Prevention Author(s): Mark S. Hamm Document No.: 211203 Date Received: September 2005 Award Number: 2003-DT-CX-0002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Crimes Committed by Terrorist Groups: Theory, Research, and Prevention Award #2003 DT CX 0002 Mark S. Hamm Criminology Department Indiana State University Terre Haute, IN 47809 Final Final Report Submitted: June 1, 2005 This project was supported by Grant No. 2003-DT-CX-0002 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Abstract .............................................................. iv Executive Summary....................................................
    [Show full text]
  • Cornell Article
    NICOLAS CORNELL Competition Wrongs abstract. In both philosophical and legal circles, it is typically assumed that wrongs depend upon having one’s rights violated. But within any market-based economy, market participants may be wronged by the conduct of other actors in the marketplace. Due to my illicit business tactics, you may lose profits, customers, employees, reputation, access to capital, or any number of other sources of value. This Article argues that such competition wrongs are an example of wrongs that arise without an underlying right, contrary to the typical philosophical and legal assumption. The Article thus draws upon various forms of business law to illustrate what is a conceptual point: that we can and do wrong one another in ways that do not involve violating our private entitlements but rather violating only public norms. author. Assistant Professor, University of Michigan Law School. This Article has benefitted from comments and suggestions from many others. Specifically, I would like to thank Mitch Ber- man, Dan Crane, Ryan Doerfler, Chris Essert, Rich Friedman, John Goldberg, Don Herzog, Wa- heed Hussain, Julian Jonker, Greg Keating, Greg Klass, George Letsas, Gabe Mendlow, Sanjukta Paul, Tony Reeves, Arthur Ripstein, Amy Sepinwall, Henry Smith, Sabine Tsuruda, David Wad- dilove, and Gary Watson. I am also grateful to audiences at Binghamton, Bowdoin, Harvard, IN- SEED, Michigan, Oxford, Penn, and Virginia, as well as the Bechtel Workshop in Moral and Po- litical Philosophy, the Legal Philosophy Workshop, and the North American Workshop on Private Law Theory. 2030 competition wrongs article contents introduction 2032 i. the standing claim 2037 A.
    [Show full text]