Title: Expenditures on consumer protection and business competition

Authors: Hong Qin; Kai S. Koong; Zhaojun Yang; Jun Zhou

Addresses: Department of Computer Information Systems and Quantitative Methods, The University of Texas-Pan American, Edinburg, Texas, USA. ' Department of Computer Information Systems and Quantitative Methods, The University of Texas-Pan American, Edinburg, Texas, USA. ' Xidian University, Xi'an, Shaanxi Province, China. ' Central University of Finance and Economics, Beijing, China

Abstract: In a world that is increasingly dominated by ubiquitous, wireless and mobile communication applications, consumers and businesses need continuous protection from fraud and unfair competition. Since 2007, budgeted expenditures incurred by the Federal Trade Commission (FTC) aimed at protecting the public have been categorised into objectives which are disclosed on the web. This study examined the annual expenditures patterns of those budgeted categories and found that the monetary amount and priority rankings of the respective categories were quite predictable. In other words the two goals and their related objectives appear to have received consistent priority and levels of funding. Within the nine categories, the cost per Full-Time Equivalent (FTE) can be quite different. Overall, it can also be said that based on the amounts approved by Congress during the period studied, the FTC is funded well because the changes are significant. Therefore, consumers and businesses can likewise expect the same and probably more effective protection from future fraud that can be perpetrated using mobile devices and unfair global competitive practices.

Keywords: anti-competitive business practices; consumer protection; deception; Federal Trade Commission; fraud; mobile communications; security; business competition; unfair competition; expenditures patterns; USA; United States.

DOI: 10.1504/IJMC.2012.049756

International Journal of Mobile Communications, 2012 Vol.10 No.6, pp.559 - 577

Published online: 14 Oct 2012 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article