Skip to main content
Log in

Network structure and performance of crony capitalism systems credible commitments without democratic institutions

  • Published:
Public Choice Aims and scope Submit manuscript

Abstract

Networks underlie notable cases of rapid development without democratic institutions, a phenomenon known as crony capitalism that has two distinctive features: (1) dispensation of selective privileges, and (2) social connections among beneficiaries. This paper advances a formal theory that explains how crony networks can induce large-scale effects that can both propagate risk of predation and incentivize private protection to withstand it. Dense networks that activate both relational mechanisms translate into aggregate outcomes wherein governments respect property rights for favored parties. From formal theory, I derive equilibrium predation conditions for a computational model that examines how variable network structures impact the number of protected privileges. A statistical analysis of computer simulations lends support for the posited relational mechanisms that scale up protection in successful cases of crony capitalism.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. Related theory highlights strategic concessions to solve the dictator’s dilemma of concentrated power and threatened survival (Wintrobe 1998). Bueno de Mesquita et al. (2001) propose a similar logic of survival that requires dispensing benefits to supporters.

  2. I conceptualize democracies and autocracies (or dictatorships) as distinct types of regimes but acknowledge that discretion alone is not sufficient to fully distinguish them. For instance, it’s possible for nominally democratic governments to have sufficient discretion to behave as autocrats (Weldon 1997).

  3. Leeson (2007) makes a similar argument based on a cost–benefit analysis, but instead of statelessness versus formal government, I am contrasting autocracy with democracy.

  4. To simplify the presentation, I henceforth use the term autocrat in a broad sense to denote a government with unchecked authority and discretion.

  5. Rents are supranormal profits beyond what would be obtained in a competitive setting.

  6. Some asset holders can obtain rents from specialized assets that cannot be easily replicated. However, this is an unlikely economic condition for asset holders in developing countries, who will instead turn to political mechanisms. Evidence exists that economic actors care primarily about their own property rights, and if given the opportunity, would prefer market power to competition (Do and Levchenko 2009).

  7. \(A_{i}\) has a reservation value \(v_{i}\) reflecting its ability to deploy assets elsewhere, which incorporates extant distinctions between captive and fugitive assets (Vahabi 2016).

  8. When indifferent, players will choose as follows: \(G\) will enforce, \(D\) will honor its commitment, and \(A_{i}\) will invest.

  9. I argue that search costs for private enforcers give public officials an advantage because the latter can be readily identified and their capacities to punish \(D\) verified more easily. Thus, I refer to elements of \(G\) as public officials, but membership extends to any elites with enforcement capacity.

  10. Networks have structural properties, such as density, which captures overall connectivity. Labeled \(d\), density is equal to the ratio of actual to possible connections. For the network at hand, 16 possible connections exist. Null protection networks have zero density. A universal protection network with 16 connections attains the maximum value of 1. Other network types will have densities between zero and 1.

  11. Except for the null and universal protection types, which have unique configurations, Figs. 2 and 3 show only representative networks for each class.

  12. The collection of sets generally will not be mutually exclusive, with the exception of the special case of \(P_{i} {\bigcap }P_{j} = \left\{ \emptyset \right\}\), \(i \ne j\), a case of isolated firms corresponding to the model in Sect. 2.3. \(P_{i}\) can also be an empty set if no public officials protect a given \(A_{i}\).

  13. Formally, \(S = { \hbox{max} }\left\{ {length\left( {A_{i} ,A_{j} } \right)} \right\}\), for all \(A_{j} \in A\), where length measures the number of steps that separate two particular nodes. When all public officials are related to at least one other member in \(G\), the maximum distance will be finite: \(S \le N - 1\). For completeness, I introduce a residual subset \(P_{i}^{\infty }\) to identify a group of isolated public officials (again, with respect to \(P_{i}\)) that are unreachable (as though the distance to them were infinite).

  14. Note that it is a simpler network structure that connects nodes of the same type, also known as a one-mode network structure or network for short.

  15. The scenario is similar to the logic that competition among autocrats can mitigate predation (Vahabi 2016). However, competition among autocrats also entails separate political domains. The term autocrat herein identifies a single political actor with uncontested authority within his own domain.

  16. The example is contrived because it assumes homogeneous firms to highlight relational mechanisms. In the real world, we ought to see more heterogeneity, resulting in a more stringent condition for aggregate outcomes: for all firms to expect reliable protection, \(G_{1}\) must be powerful enough to inflict a penalty commensurate with the most profitable firm.

  17. My theory does not analyze the optimal selection of initial attacks, which are plausible with a small number of players. However, optimizing attacks with large networks is an intractable problem that requires separate numerical analyses.

  18. To clarify, the simulations are not agent-based, wherein actors follow simple behavioral rules. Rather, I apply game theory from previous sections that provides an implicit equilibrium condition applying to any network structure. The algorithm was coded in the R statistical environment to access existing SNA libraries and other statistical features (R Core Team 2017). See electronic supplementary materials to access computer code and related documentation.

  19. Policy credibility is inversely related to successful predatory attacks.

  20. The zero-inflation part of the model is not shown here to facilitate the presentation. The predictor for that model was AA_comp on the basis of the discussion above about the impact of fragmentation in precluding predation. The corresponding coefficient was statistically significant in all models.

References

  • Acemoglu, D., & Robinson, J. A. (2019). Rents and economic development: The perspective of Why Nations Fail. Public Choice, 181, 13–28.

    Article  Google Scholar 

  • Bedford, O. (2011). Guanxi-building in the workplace: A dynamic process model of working and backdoor Guanxi. Journal of Business Ethics, 104(1), 149–158.

    Article  Google Scholar 

  • Begley, T. M., Khatri, N., & Tsang, E. W. K. (2010). Networks and cronyism: A social exchange analysis. Asia Pacific Journal of Management, 27(2), 281–297.

    Article  Google Scholar 

  • Bueno de Mesquita, B., Morrow, J. D., Siverson, R., & Smith, A. (2001). Political competition and economic growth. Journal of Democracy, 12(1), 58–72.

    Article  Google Scholar 

  • Campos, J. E. (2002). Corruption: The boom and bust of East Asia. Manila: Ateneo de Manila University Press.

    Google Scholar 

  • Campos, J. E., & Root, H. L. (1996). The key to the Asian miracle: making shared growth credible. Washington, DC: Brookings Institution.

    Google Scholar 

  • Choi, S. G., & Storr, V. H. (2019). A culture of rent seeking. Public Choice, 181, 101–126.

    Article  Google Scholar 

  • Do, Q. T., & Levchenko, A. A. (2009). Trade, inequality, and the political economy of institutions. Journal of Economic Theory, 144(4), 1489–1520.

    Article  Google Scholar 

  • El Tarouty, S. (2015). The social networks of the Mubarak family and the businessmen. In Businessmen, clientelism, and authoritarianism in Egypt. New York: Palgrave MacMillan.

  • Evans, P. B. (1989). Predatory, developmental, and other apparatuses: a comparative political economy perspective on the Third World state. Sociological Forum, 4(4), 561–587.

    Article  Google Scholar 

  • Frye, T., & Shleifer, A. (1997). The invisible hand and the grabbing hand. The American Economic Review, 87(2), 354–358.

    Google Scholar 

  • Gambetta, D. (1993). The Sicilian Mafia: The business of private protection. Cambridge: Harvard University Press.

    Google Scholar 

  • Goodman, D. S. G. (2018). The changing face of China’s local elite: Elite advantage and path dependence in business communities. Chinese Political Science Review, 3(2), 115–128.

    Article  Google Scholar 

  • Haber, S. H. (Ed.). (2002). Crony capitalism and economic growth in Latin America. Stanford: Hoover Institution Press.

    Google Scholar 

  • Haber, S. H., Razo, A., & Maurer, N. (2003). The politics of property rights: political instability, credible commitments, and economic growth in Mexico (1876–1929). Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Haggard, S. (2004). Institutions and growth in East Asia. Studies in comparative international development, 38(4), 53–81.

    Article  Google Scholar 

  • Hutchcroft, P. (1991). Oligarchs and cronies in the Philippine state. World Politics, 43(3), 414–450.

    Article  Google Scholar 

  • Jackson, M. O. (2016). What can political science learn from economics? In J. N. Victor, A. H. Montgomery, & M. Lubell (Eds.), Oxford handbook of political networks. Oxford: Oxford University Press.

    Google Scholar 

  • Kang, D. C. (2002). Crony capitalism: Corruption and development in South Korea and the Philippines. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Khan, M. H., & Jomo, K. S. (2000). Rents, rent-seeking and economic development: Theory and evidence in Asia. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Khatri, N., Tsang, E. W. K., & Begley, T. M. (2006). Cronyism: A cross-cultural analysis. Journal of International Business Studies, 37(1), 61–75.

    Article  Google Scholar 

  • Kitschelt, H., & Wilkinson, S. (2007). Patrons, clients and policies. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Krueger, A. (1974). The political economy of the rent-seeking society. American Economic Review, 64, 291–303.

    Google Scholar 

  • Krueger, A. (2002). Why crony capitalism is bad for economic growth. In S. H. Haber (Ed.), Crony capitalism and economic growth in Latin America. Stanford: Hoover Institution Press.

    Google Scholar 

  • Krugman, P. (2002). Crony capitalism, USA. New York Times Section A:2.

  • Leeson, P. T. (2007). Efficient anarchy. Public Choice, 130, 41–53.

    Article  Google Scholar 

  • Leeson, P. T., & Rogers, D. B. (2012). Organizing crime. Supreme Court Economic Review, 20(1), 89–123.

    Article  Google Scholar 

  • Loveridge, R. (2006). Developing institutions—“Crony capitalism” and national capabilities: A European perspective. Asian Business & Management, 5(1), 113–136.

    Article  Google Scholar 

  • MacIntyre, A. J. (1994). Business, government and development: Northeast and Southeast Asian comparisons. In A. J. MacIntyre (Ed.), Business and government in industrialising Asia. Ithaca: Cornell University Press.

    Google Scholar 

  • Maxfield, S., & Schneider, B. R. (1997). Business and the state in developing countries. Ithaca: Cornell University Press.

    Book  Google Scholar 

  • Munger, M. C. (2019). Tullock and the welfare costs of corruption: There is a “political Coase Theorem’’. Public Choice, 181, 83–100.

    Article  Google Scholar 

  • Murphy, K. M., Shleifer, A., & Vishny, R. W. (1993). Why is rent-seeking so costly to growth? American Economic Review, 83(2), 409–414.

    Google Scholar 

  • North, D. C., & Weingast, B. R. (1989). Constitutions and commitment: The evolution of institutions governing public choice in seventeenth-century England. Journal of Economic History, 49(4), 803–832.

    Article  Google Scholar 

  • North, D. C., Wallis, J. J., & Weingast, B. R. (2009). Violence and Social Orders. Cambridge, UK: Cambridge University Press.

    Book  Google Scholar 

  • Olson, M. (1965). The logic of collective action. New York: Schocken Books.

    Google Scholar 

  • Olson, M. (1993). Dictatorship, democracy, and development. American Political Science Review, 87(3), 567–576.

    Article  Google Scholar 

  • Olson, M. (2000). Power and prosperity: Outgrowing communist and capitalist dictatorships. New York: Basic Books.

    Google Scholar 

  • Peltzman, S. (1976). Towards a more general theory of regulation. Journal of Law and Economics, 19(2), 211–240.

    Article  Google Scholar 

  • R Core Team. (2017). R: a language and environment for statistical computing (version 3.4.0). Retrieved from http://cran.r-project.org.

  • Razo, A. (2008). Social foundations of limited dictatorship: Networks and private protection during Mexico’s early industrialization. Stanford: Stanford University Press.

    Google Scholar 

  • Razo, A. (2016). Bringing networks into comparative politics. In J. N. Victor, A. H. Montgomery, & M. Lubell (Eds.), The Oxford handbook of political networks. Oxford: Oxford University Press.

    Google Scholar 

  • Rose-Ackerman, S. (1999). Corruption and government. Cambridge: Cambridge Unversity Press.

    Book  Google Scholar 

  • Saxena, A. (2013). Transgenerational succession in business groups in India. Asia Pacific Journal of Management, 30(3), 769–789.

    Article  Google Scholar 

  • Shleifer, A., & Vishny, R. W. (1993). Corruption. The Quarterly Journal of Economics, 108(3), 599–617.

    Article  Google Scholar 

  • Stigler, G. J. (1971). The theory of economic regulation. Bell Journal of Economics and Management Science, 2, 3–21.

    Article  Google Scholar 

  • Stokes, S. C., Dunning, T., Nazareno, M., & Brusco, V. (2013). Brokers, voters, and clientelism: The puzzle of distributive politics. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Thompson, M. R. (1998). The Marcos regime in the Philippines. In H. E. Chehabi & J. J. Linz (Eds.), Sultanistic regimes. Baltimore: Johns Hopkins University Press.

    Google Scholar 

  • Tullock, G. (1967). The welfare costs of tariffs, monopolies, and theft. Western Economic Journal, 5(3), 224–332.

    Google Scholar 

  • Vahabi, M. (2016). A positive theory of the predatory state. Public Choice, 168, 153–175.

    Article  Google Scholar 

  • Vatikiotis, M. R. J. (1998). Indonesian politics under Suharto. New York: Routledge.

    Google Scholar 

  • Vaugirard, V. (2005). Crony capitalism and sovereign default. Open Economies Review, 16(1), 77–99.

    Article  Google Scholar 

  • Wade, R. H. (1990). Governing the market: economic theory and the role of government in East Asian industrialization. Princeton: Princeton University Press.

    Book  Google Scholar 

  • Wade, R. H. (2018). The developmental state: dead or alive? Development and Change, 49(2), 518–546.

    Article  Google Scholar 

  • Wasserman, S., & Faust, K. (1994). Social network analysis. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Weingast, B. R. (1997). The political foundations of democracy and the rule of law. American Political Science Review, 91(2), 245–263.

    Article  Google Scholar 

  • Weldon, J. (1997). The political sources of presidencialismo in Mexico. In S. Mainwaring & M. S. Shugart (Eds.), Presidentialism and democracy in Latin America. Cambridge: Cambridge University Press.

    Google Scholar 

  • Wintrobe, R. (1998). The political economy of dictatorship. Cambridge: Cambridge University Press.

    Book  Google Scholar 

Download references

Acknowledgements

The author thanks the Editor-in-Chief, Prof. William F. Shughart II, for editorial guidance and detailed feedback. Three anonymous reviewers provided excellent comments. I am also grateful to Lee J. Alston and other participants at an Ostrom Workshop colloquium for additional comments on an earlier draft. The usual caveats apply. Computer simulations used equipment financed with a Faculty Research Support Grant from Indiana University’s Office of the Vice Provost for Research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Armando Razo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Code Availability: https://github.com/arazoNet/cronyNets

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Razo, A. Network structure and performance of crony capitalism systems credible commitments without democratic institutions. Public Choice 189, 115–137 (2021). https://doi.org/10.1007/s11127-020-00864-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11127-020-00864-9

Keywords

JEL Classification

Navigation