264
Views
1
CrossRef citations to date
0
Altmetric
Articles

Moving beyond the rational choice debate via social capital: The study of illegal private protection

Pages 267-281 | Published online: 01 Apr 2014
 

Abstract

In the context of the epistemological and methodological debates about rational choice (RC) sparked by Green and Shapiro and the subsequent rejoinders, Hindmoor made the theoretical claim that there is now an opportunity for RC to be enhanced and for past debates to be set aside by incorporating different theoretical perspectives into RC. This article presents an example of one context in which this can be done: the study of illegal private protection (IPP) produced by organised criminals and corrupt officials. It extends a rational theory of criminal protection to enable the simultaneous analysis of corrupt protection and augments this approach with theories of social capital (SC). Both positive and negative forms and effects of SC are considered. This approach highlights a middle ground between advocates and critics of RC, demonstrating a capacity to explain patterns in the production of IPP between organisations and across countries.

针对格林、沙皮罗与弗里德曼的否定者所发起的有关理性选择的认识论及方法论论战,辛德摩尔提出一个理论主张:现在正可以通过吸纳不同的视角而弘扬理性选择,以往的辩论可置之一旁。本文讨论了一个可行的案例:有组织犯罪分子造成的非法私人保护。作者应用理性理论于犯罪保护,对腐败保护做了分析,并用社会资本理论扩展了这一方法。作者对社会资本理论的正负短长做了分析。这样的研究强调了介于理性选择理论赞同方与反对方的中间地带,展示对于组织间及跨国非法私人保护的产生的解释能力。

Notes

1The application of RC is segmented-universalist if it applies RC in contexts where behaviour can be observed as rational in a sense that fits the theory. Such contexts are those with competitive environments and institutional structures that eliminate agents who do not act rationally, such as firms in competitive markets or political parties in competitive political systems (Ostrom Citation1998; see also Ferejohn Citation2002). Clark (Citation1996) explored the way such structures constrain choice. RC does less well at explaining, say, the behaviour of voters in political systems (Satz and Ferejohn Citation1994: 72). Applying RC to explain voter behaviour would not, therefore, adhere to segmented-universalism.

2This article's approach is also instrumentalist, in that IPPMs emerge in conditions that constrain individuals such that they behave as if they were rational. MacDonald (Citation2003) provides an introduction to instrumentalist empiricism in contrast with scientific realism.

3For more on the distinction between thick and thin rationality, see Ferejohn (Citation1991, Citation2002) and Lichbach (Citation2003).

4Hobbes acknowledged cooperation as a possible (though unlikely) solution to this dilemma (Gallarotti Citation2010: 78–93). That RC theory itself allows for agents to overcome problems of collective action is often not well understood (Dowding Citation2001).

5There are other possible solutions. Good examples of the independent formation of such institutions among merchants (rather than the exogenous imposition of institutional rules) are provided by Milgrom et al. (Citation1990) and Greif et al. (Citation1994).

6There is a subtle but important difference between running a protection racket, in which individuals are extorted to pay protection money or suffer the consequences, and between the production of genuine protection as a service through illegal means. The line between genuine protection and extortion can be blurry. The tendency for one to mutate into the other is acknowledged but not explored here. This article considers IPP to be solely genuine protection, as the factors affecting extortion differ from those affecting genuine protection.

7Gambetta (Citation1988) attributed this to historical geopolitical factors such as the divisive actions of Spanish Hapsburgs in southern Italy and the coercive pressure applied by landed lords upon peasants in the 19th century. For other accounts of the origins of the Sicilian Mafia, see also Hess (Citation1973), Servadio (Citation1976), Arlacchi (Citation1986), Nicaso and Lamothe (Citation1995) and Jamieson and Violante (Citation2000).

8State protection may even come to be seen cynically as part of a broader predatory regime. The idea of predatory state protection was outlined by Tilly (Citation1985), who compared early European states to criminal organisations, arguing that their emergence had more to do with running profitable protection rackets and controlling power than with providing genuine protection. For the reverse comparison (of gangs with states) see Grossman (Citation1995) and Skaperdas and Syropoulos (Citation1995). Problems trusting the state are related to what Ostrom (Citation1998: 6) termed second-order dilemmas and to Leeson's (2009: 27) definition of the paradox of power as ‘the need for an authority and the fact that the very introduction of such an authority generates strong incentives for him to abuse his power’. Olson's (Citation1993) comparison of autocratic and democratic states and his subsequent theory of dictatorships (Olson Citation2000) identify two key factors that are useful in determining the presence (or degree) of the paradox of power: the encompassing interest and time horizons of those in power.

9On the problems business faced and the range of services provided by gangs, see Varese (Citation2001: 102–20) and Volkov (Citation2002: 17, 53). For more on the sorry state of Russian security services in this period, see Galeotti (Citation1998), Frye and Zhuravskaya (Citation2000) and Frye (Citation2002).

10For an example of the importance of self-protection and its role in the initial formation of a group that later specialises in producing protection for others, see Zhang and Chin (Citation2008: 186–87) on the United Bamboo gang in Taiwan.

11Gambetta maintained this was distinct from being a violent entrepreneur, who pursues other business interests through the use of violence. He also rejected the argument that organised crime was concerned with managing violence per se (Blok Citation1974), asserting instead that violence is a factor of production in protection. Chu (Citation2000), Varese (Citation2001), Volkov (Citation2002) and Hill (Citation2003) have all found supporting evidence for this distinction in the contexts of China, Russia and Japan (even though the title of Volkov's Violent entrepreneurs suggests the contrary).

12Note also that officials may possess the private capacity for violence, but if they use it to provide protection then they do so as just another private individual entrepreneur of violence, distinct from their public office.

13Gong (Citation1997: 282) gives an example of the former, in which a public official offers protection in the form of facilitating tax evasion. Stewart (Citation2007: 156–7) provides an example of the latter, detailing circumstances in which officials in the Australian passport office colluded to provide a major illegal narcotics importer with the passports that facilitated their criminal enterprise.

14This is what Morselli (Citation2009: 63) refers to as the efficiency–security trade-off.

15The crudest form of trust created in this way is the guarantee of compliance through fear, but loyalty to a group may be (or become) internalised as a social norm (as discussed below) rather than due to a virtual form of mutual blackmail or hostage-taking.

16It is worth noting, however, that the structure of Italian organised crime in Sicily and elsewhere has moved beyond older, more traditional family-based networks (Paoli Citation2003).

17On the vory v zakone, see Rawlinson (Citation1997). For an analysis about how and why professional sport in Russia helped forge relations and skills which lent themselves naturally to IPP, see Varese (Citation2001: 57–59) and Volkov (Citation2002: 8–10). The role played by wrestlers in providing IPP in Bulgaria (Petrunov Citation2006; Tzetkova Citation2008) is a good example of the similar trend in other post-communist states.

18For a discussion of different kinds of networks and their relations to theories of social capital and trust, see Schuller et al. (Citation2000).

19There is a reasonably well-formed literature on the role of trust and social capital in crime, but studies of illegal private protection have been essentially (if not wholly) based on an RC approach.

20In developing these concepts, Putnam built on Granovetter's (Citation1973) work on weak and strong ties.

21Note the distinction here between the IPP the organisation produces for itself and the IPP it produces for third parties. To the extent that rival organisations pose a threat, high levels of bridging capital reduce the need for self-protection, while simultaneously allowing an organisation to better cooperate and collaborate with other groups to produce protection on a larger scale for third parties.

22Coleman's (Citation1988) pioneering work on SC was rooted in RC, and his later work (Coleman and Fararo Citation1992) considered the role of RC in substantial detail, though it has also been claimed that SC lies outside the explanatory range of RC (Goldthorpe Citation1998: 177).

23Such distinctions are useful as they allow insights from game theory and experimental economics to be used to better understand the nature of such trust. Ostrom's (Citation1998) work on rationality is one example of an overview of such studies of relations and trust between individuals in strategic interaction.

24This idea is present in Coleman's (Citation1988: 98–100) views on social capital, where he shows that networks tended to form whenever two or more people stood to gain from cooperating.

25A study of Chicago drug gangs (Levitt and Venkatesh Citation2000: 769), for example, showed that gang members were acutely aware of the social incentives to look after each other. The ‘us versus them mentality’ among Australian police officers is another example (Stewart Citation2007: 42).

26That norms can be reinforced within a group and strengthened by the joining of new like-minded members helps explain the prevalence of group-specific norms regarding reputation or saving face, or the effectiveness of methods of group censure such as sanctions. These factors play a vital role in resolving problems of collective action in general (Ostrom Citation1998). Weisfeld and Feldman (Citation1982: 570) note the role of identity in gang membership.

27Nor is it necessary for all individuals to share the same motivation. Some may use SC as an instrument, others may develop it to form an identity – in reality people quite often do both. By being robust to variation in motives, the approach here can accommodate the full spectrum of these possibilities.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 392.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.