IEEE Computational Intelligence Magazine - May 2021 - 65

Torgler [33] found strong empirical evidence supporting mutual influence
between taxpayers. The investigations by
Blaufus et al. [34] and Calvet and Alm
[35] show other perspectives of horizontal factors, such as tax privacy, empathy, and sympathy.
Fedeli and Forte [36] studied the
bargaining problem between agents to
decide the level of (under) reporting of
sales and purchases along the different
steps of the supply chain, combining
sales and income tax. Each pair of agents
has to decide the amount of trade
between themselves and the optimal
level of (under) reporting. They concluded that the best policy to control
fraud is to increase the inspection
-probability rather than to increase penalties against fraudulent activities. On the
other hand, by acting against one agent,
the tax agency may eliminate the incentives for misreporting along the entire
chain, thus reducing the enforcement
costs for increasing the inspection probability for all agents. Abraham et al. [37]
offered another example of modeling
based on a non-cooperative game-theoretic model and demonstrated that social
norms are more important for explaining behavior in tax fraud than in situations where agents act independently.
Evolutionary game theory is commonly supported by ABM, a CI simulation paradigm. These CI models start
with the conviction that, especially in
the field of sales taxes, fraud always
involves more than one agent. Boadway
et al. [38] presented the payoffs of a
group of potential evaders in the form of
a prisoner's dilemma game. With collaboration, they could increase their revenues; but if one of the agents decides not
to collaborate, the rest can be negatively
affected. Following the results of their
model, we can say that a fundamental
determinant of tax fraud that requires
collaboration between two agents is the
capacity of each agent to collaborate in
the evasion activity. In the above model,
the collaboration capacity depends on
the agent's tolerance of dishonesty.
There are several advantages of using
ABM in the analysis of tax fraud. The
ABM approach enables the inclusion of

There are several advantages of using ABM in the
analysis of tax fraud. The ABM approach enables the
inclusion of agents with very different response patterns,
which allows for a dynamic bottom-up structure ... On
the other hand, the agents included in an agent-based
model do not maintain static positions and reactions.
agents with very different response patterns, which allows for a dynamic bottomup structure that may converge in a global
equilibrium that houses an intricate set of
individual realities. On the other hand, the
agents included in an agent-based model
do not maintain static positions and reactions, but can evolve throughout the simulation, learning from their own situation
and those of the other agents.This interaction between agents (i.e., social network)
is, therefore, one of the fundamental components of this type of models.
ABM examples in the study of tax
fraud can be found in the work of
Bloomquist [39], which described this
methodology as relatively recent and highlighted the apparent lack of -acceptance by
the mainstream social scientists. Hokamp
et al. [40] also discussed recent advances
in the modeling of tax fraud analysis.
The different attitudes of agents may
manifest themselves in individual perceptions of both the risk of apprehension and the audit probability [41], as in
the model presented by Korobow and
Axtell [42]. In relation to tax compliance, their model suggested that the
outcome depends on how strongly
agents are influenced by their neighbor's
results. If agents do not significantly
value the potential gains of evaders, it is
possible to achieve general compliance
even if the model realistically incorporates low enforcement measures. Another example with a similar pattern was
provided by Hashimzade et al. [43].
Combining behavioral economics and
social networks, their model reflects
how the connection between agents can
form a subjective audit probability,
which clearly exceeds the objective levels that stem from real levels of fiscal
auditing activities. The compliance decisions are modeled to include benefits for

the agents for following the social
norms of honesty. In a similar fashion,
Hashimzade et al. [44] described their
starting point in terms of attitudes,
beliefs and network effects based on two
features of empirical analysis on tax
fraud. First, there seems to be strong evidence to indicate that individual compliance attitude is clearly affected by
social norms. Second, agents do not
normally have access to the real audit
probability. Therefore, they end up generating their own subjective probability
of being subject to inspection and being
identified as an evader. A similar basis
was used by Hashimzade and Myles [45]
in their effort to incorporate predictive
analysis and behavioral economics in
modeling the tax compliance decision.
Previous efforts, such as those in the
field of experimental analysis, are very relevant and should continue to be so.
Bloomquist [46] presented a good example of how the results of experimental
economics can be exploited in the development of ABM. New efforts such as
those coming from the field of econophysics should be closely observed in order to
identify possible c- omplementarities [47]. It
has already been mentioned that network
tools are an essential part of ABM; therefore, delving into how the network structure influences the results of these models
is an important avenue of study. The first
step in this direction came from Andrei
et al. [48], who explored the impact of
different network structures on the levels
of tax evasion in an agent-based model.
Reality is complex and models seeking to describe it must be able to reflect
this complexity. Calibrating the models
to real data is not an easy task when
dealing with ABM and tax fraud. However, linking the main elements of an
agent-based model to real data or

MAY 2021 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE

65



IEEE Computational Intelligence Magazine - May 2021

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - May 2021

Contents
IEEE Computational Intelligence Magazine - May 2021 - Cover1
IEEE Computational Intelligence Magazine - May 2021 - Cover2
IEEE Computational Intelligence Magazine - May 2021 - Contents
IEEE Computational Intelligence Magazine - May 2021 - 2
IEEE Computational Intelligence Magazine - May 2021 - 3
IEEE Computational Intelligence Magazine - May 2021 - 4
IEEE Computational Intelligence Magazine - May 2021 - 5
IEEE Computational Intelligence Magazine - May 2021 - 6
IEEE Computational Intelligence Magazine - May 2021 - 7
IEEE Computational Intelligence Magazine - May 2021 - 8
IEEE Computational Intelligence Magazine - May 2021 - 9
IEEE Computational Intelligence Magazine - May 2021 - 10
IEEE Computational Intelligence Magazine - May 2021 - 11
IEEE Computational Intelligence Magazine - May 2021 - 12
IEEE Computational Intelligence Magazine - May 2021 - 13
IEEE Computational Intelligence Magazine - May 2021 - 14
IEEE Computational Intelligence Magazine - May 2021 - 15
IEEE Computational Intelligence Magazine - May 2021 - 16
IEEE Computational Intelligence Magazine - May 2021 - 17
IEEE Computational Intelligence Magazine - May 2021 - 18
IEEE Computational Intelligence Magazine - May 2021 - 19
IEEE Computational Intelligence Magazine - May 2021 - 20
IEEE Computational Intelligence Magazine - May 2021 - 21
IEEE Computational Intelligence Magazine - May 2021 - 22
IEEE Computational Intelligence Magazine - May 2021 - 23
IEEE Computational Intelligence Magazine - May 2021 - 24
IEEE Computational Intelligence Magazine - May 2021 - 25
IEEE Computational Intelligence Magazine - May 2021 - 26
IEEE Computational Intelligence Magazine - May 2021 - 27
IEEE Computational Intelligence Magazine - May 2021 - 28
IEEE Computational Intelligence Magazine - May 2021 - 29
IEEE Computational Intelligence Magazine - May 2021 - 30
IEEE Computational Intelligence Magazine - May 2021 - 31
IEEE Computational Intelligence Magazine - May 2021 - 32
IEEE Computational Intelligence Magazine - May 2021 - 33
IEEE Computational Intelligence Magazine - May 2021 - 34
IEEE Computational Intelligence Magazine - May 2021 - 35
IEEE Computational Intelligence Magazine - May 2021 - 36
IEEE Computational Intelligence Magazine - May 2021 - 37
IEEE Computational Intelligence Magazine - May 2021 - 38
IEEE Computational Intelligence Magazine - May 2021 - 39
IEEE Computational Intelligence Magazine - May 2021 - 40
IEEE Computational Intelligence Magazine - May 2021 - 41
IEEE Computational Intelligence Magazine - May 2021 - 42
IEEE Computational Intelligence Magazine - May 2021 - 43
IEEE Computational Intelligence Magazine - May 2021 - 44
IEEE Computational Intelligence Magazine - May 2021 - 45
IEEE Computational Intelligence Magazine - May 2021 - 46
IEEE Computational Intelligence Magazine - May 2021 - 47
IEEE Computational Intelligence Magazine - May 2021 - 48
IEEE Computational Intelligence Magazine - May 2021 - 49
IEEE Computational Intelligence Magazine - May 2021 - 50
IEEE Computational Intelligence Magazine - May 2021 - 51
IEEE Computational Intelligence Magazine - May 2021 - 52
IEEE Computational Intelligence Magazine - May 2021 - 53
IEEE Computational Intelligence Magazine - May 2021 - 54
IEEE Computational Intelligence Magazine - May 2021 - 55
IEEE Computational Intelligence Magazine - May 2021 - 56
IEEE Computational Intelligence Magazine - May 2021 - 57
IEEE Computational Intelligence Magazine - May 2021 - 58
IEEE Computational Intelligence Magazine - May 2021 - 59
IEEE Computational Intelligence Magazine - May 2021 - 60
IEEE Computational Intelligence Magazine - May 2021 - 61
IEEE Computational Intelligence Magazine - May 2021 - 62
IEEE Computational Intelligence Magazine - May 2021 - 63
IEEE Computational Intelligence Magazine - May 2021 - 64
IEEE Computational Intelligence Magazine - May 2021 - 65
IEEE Computational Intelligence Magazine - May 2021 - 66
IEEE Computational Intelligence Magazine - May 2021 - 67
IEEE Computational Intelligence Magazine - May 2021 - 68
IEEE Computational Intelligence Magazine - May 2021 - 69
IEEE Computational Intelligence Magazine - May 2021 - 70
IEEE Computational Intelligence Magazine - May 2021 - 71
IEEE Computational Intelligence Magazine - May 2021 - 72
IEEE Computational Intelligence Magazine - May 2021 - 73
IEEE Computational Intelligence Magazine - May 2021 - 74
IEEE Computational Intelligence Magazine - May 2021 - 75
IEEE Computational Intelligence Magazine - May 2021 - 76
IEEE Computational Intelligence Magazine - May 2021 - 77
IEEE Computational Intelligence Magazine - May 2021 - 78
IEEE Computational Intelligence Magazine - May 2021 - 79
IEEE Computational Intelligence Magazine - May 2021 - 80
IEEE Computational Intelligence Magazine - May 2021 - 81
IEEE Computational Intelligence Magazine - May 2021 - 82
IEEE Computational Intelligence Magazine - May 2021 - 83
IEEE Computational Intelligence Magazine - May 2021 - 84
IEEE Computational Intelligence Magazine - May 2021 - 85
IEEE Computational Intelligence Magazine - May 2021 - 86
IEEE Computational Intelligence Magazine - May 2021 - 87
IEEE Computational Intelligence Magazine - May 2021 - 88
IEEE Computational Intelligence Magazine - May 2021 - 89
IEEE Computational Intelligence Magazine - May 2021 - 90
IEEE Computational Intelligence Magazine - May 2021 - 91
IEEE Computational Intelligence Magazine - May 2021 - 92
IEEE Computational Intelligence Magazine - May 2021 - 93
IEEE Computational Intelligence Magazine - May 2021 - 94
IEEE Computational Intelligence Magazine - May 2021 - 95
IEEE Computational Intelligence Magazine - May 2021 - 96
IEEE Computational Intelligence Magazine - May 2021 - 97
IEEE Computational Intelligence Magazine - May 2021 - 98
IEEE Computational Intelligence Magazine - May 2021 - 99
IEEE Computational Intelligence Magazine - May 2021 - 100
IEEE Computational Intelligence Magazine - May 2021 - Cover3
IEEE Computational Intelligence Magazine - May 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com