نوع مقاله : علمی پژوهشی

نویسندگان

1 ُتهران

2 دانشگاه تهران

چکیده

فنّاوری، تأثیرات اخلاقی و اجتماعی دارد که موجب بحث‌ها و نگرانی‌های زیادی شده است. یکی از مسائل خاص فنّاوری، حریم خصوصی است. باوجود تعاریف متفاوت از حریم خصوصی، تمامی آن‌ها، به مرزهای بین خود و دیگران یا درواقع مرزهای بین خصوصی و عمومی مربوط هستند. در این مقاله، به‌منظور تعیین حدود بهینه مداخله دولت و ارزیابی اقتصادی قطعی از اینکه آیا حمایت قانونی کمتر یا بیشتری از حریم خصوصی موردنیاز است، به‌ مقایسه ارزش کلی حفاظت از حریم خصوصی و افشای داده شخصی(عدم حفاظت از حریم خصوصی) و پیامدهای اقتصادی آن‌ها از طریق تجزیه‌وتحلیل جریان‌های متنوع نظری در مورد اقتصاد حریم خصوصی و همچنین بده بستان‌های حریم خصوصی برای دارندگان داده، موضوعات داده و اشخاص ثالث، پرداخته‌ایم. با توجه به تجزیه‌وتحلیل‌هایی که ارائه گردید، این نتیجه حاصل شد که معنا و گستره حریم خصوصی، بده بستان‌های مربوط به آن و ارزش‌گذاری‌های مصرف‌کنندگان از داده شخصی، بسیار متنوع است. بعلاوه، منافع و هزینه‌های حفاظت از حریم خصوصی و به اشتراک‌گذاری داده شخصی نیز در موقعیت‌ها، شرایط و فروض مختلف متفاوت می‌شود. درنهایت تئوری اقتصاد نیز نشان می‌دهد که در اوضاع‌واحوال مختلف، به همان اندازه که توقف جریانات داده می‌تواند رفاه کل را کاهش دهد، حفاظت از حریم خصوصی می‌تواند آن را افزایش دهد؛ لذا مقایسه ارزش کلی حفاظت از حریم خصوصی و داده شخصی و برآورد اقتصادی نهایی و قطعی در مورد اینکه نیاز به حفاظت بیشتر یا کمتری از حریم خصوصی است، دشوار است. بنابراین به نظر می‌رسد حل مسئله حریم خصوصی، به معنای یافتن تعادلی میان حریم خصوصی و به اشتراک‌گذاری اطلاعات در جهت منافع موضوعات داده و جامعه خواهد بود. ارزیابی حریم خصوصی از دیدگاه اقتصادی می‌تواند در یافتن این تعادل به ما کمک کند. روش ایجاد چنین تعادلی به تحقیق دیگری در این زمینه نیاز دارد.
 

کلیدواژه‌ها

[1] Acquisti, Alessandro. (2008). Identity Management, Privacy, and Price Discrimination. IEEE Security & Privacy, 6(2).
[2] Acquisti, Alessandro. (2010). The economics of Personal Data and the Economics of Privacy, 51.
[3] Acquisti, Alessandro; Taylor, Curtis; & Wagman, Liad. (2016). The Economics of Privacy. Journal of Economic Literature, 54(2), 442-92.
[4] Acquisti, Alessandro; & Varian, Hal R. (2005). Conditioning Prices on Purchase History. Marketing Science, 24(3), 367-381.
[5] Aghababaii, Hossein. (2017). Privacy in The Islamic Criminal Law. Tehran: Islamic Research Institute for Culture and Thought. (in Persian)
[6] Akerlof, George A. (1978). The Market for “Lemons”: Quality Uncertainty and the Market Mechanism. In Uncertainty in Economics (pp. 235-251). Elsevier.
[7] Allen, Anita L. (1999). Privacy-as-Data Control: Conceptual, Practical, and Moral limits of the Paradigm. Conn. L. Rev., 32, 861.
[8] Ansari, Bagher. (2013). Privacy Law. Tehran: The Organization for Researching and Composing University Textbooks in the Humanities (Samt). (in Persian)
[9] Ansari, Bagher. (2017). Mass Communication Law. Tehran: The Organization for Researching and Composing University Textbooks in the Humanities (Samt). (in Persian)
[10] Arrow, Kenneth J. (1962). The Economic Implications of Learning by Doing. The Review of Economic Studies, 29(3), 155-173.
[11] Asadollahi, Simindokht. (2016). َAnalysis of Program Laws Legislation in Consumer Rights Protection. In Economic Law in Public Policy-Making (pp. 37-61). Tehran: Mizan. (in Persian)
[12] Badini, Hsan. (2004). The Philosophical Foundations of the Economic Attitude to Law. Journal of Faculty of Law and Political Science, 62(0), 91-135. (in Persian)
[13] Bergelson, Vera. (2003). It’s Personal but Is It Mine? Toward Property Rights in Personal Information. UC Davis Law Review, 37(379).
[14] Calo, Ryan. (2011). The Boundaries of Privacy Harm. Ind. LJ, 86, 1131.
[15] Calzolari, Giacomo; & Pavan, Alessandro. (2006). On the Optimality of Privacy in Sequential Contracting. Journal of Economic Theory, 130(1), 168-204.
[16] Camp, L Jean. (2007). Economics of Identity Theft: Avoidance, Causes and Possible Cures. Springer Science & Business Media.
[17] Camp, L Jean; & Wolfram, Catherine. (2004). Pricing Security. In Economics of Information Security (pp. 17-34). Springer.
[18] Choi, Jay Pil; Jeon, Doh-Shin; & Kim, Byung-Cheol. (2018). Privacy and Personal Data Collection with Information Externalities.
[19] Click path. (2019, March 22). In Wikipedia.
[20] Cooter, Robert; & Ulen, Thomas. (2010). Law and Economics. (Y. Dadgar & H. Akhavan, trans.). Tehran: Tarbiat Modares University Press.
[21] Deighton, John A; & Blattberg, Robert C. (1991). Interactive Marketing: Exploiting the Age of Addressability. Sloan Management Review, 33(1), 5-14.
[22] Dixon, Huw. (2001). Surfing economics.
[23] Fairfield, Joshua AT; & Engel, Christoph. (2015). Privacy as a Public Good. Duke LJ, 65, 385.
[24] Gellman, Robert. (2002). Privacy, Consumers, and Costs-How the Lack of Privacy Costs Consumers and why Business Studies of Privacy Costs Are Biased and Incomplete. Presented at the Digital Media Forum, Ford Foundation.
[25] Ghasemi Hamed, Abbas. (2012). Harm the Consumer in Competitive market. Legal Research, 15(148), 97-124. (in Persian)
[26] Goldfarb, Avi; & Tucker, Catherine E. (2011). Privacy Regulation and Online Advertising. Management Science, 57(1), 57-71.
[27] Grossman, Sanford J. (1981). The Informational Role of Warranties and Private Disclosure about Product Quality. The Journal of Law and Economics, 24(3), 461-483.
[28] Hann, Il-Horn; Hui, Kai Lung; Lee, TSY; & Png, IPL. (2003). Direct Marketing: Privacy and Competition. Presented at the Workshop on Information Systems and Economics (WISE), Seattle, Washington, USA.
[29] Hayek, F. A. (2010). The Use of Knowledge in Society. (M. Ranjbar & M. kazemi, trans.), World Economy Newspaper.
[30] Hermalin, Benjamin E; & Katz, Michael L. (2006). Privacy, Property Rights and Efficiency: The Economics of Privacy as Secrecy. Quantitative Marketing and Economics, 4(3), 209-239.
[31] Hirshleifer, Jack. (1980). Privacy: Its Origin, Function, and Future. The Journal of Legal Studies, 9(4), 649-664.
[32] Hoofnagle, C. (2007). Security Breach Notification Laws: Views from Chief Security Officers.
[33] Hoseyni, Seyedeh Fatemeh; & Safari Gerayli, Mehdi. (2018). Internet Disclosure of Financial Information and Firm Value: An Empirical Test of Signaling Theory. Journal Management System, 7, 1-9. (in Persian)
[34] Jalali, Omolbanin; & Nasrollahi, Zahra. (2019). Influence of Social Capital on the Incentive Reversal: Behavioral Economics Approach Based on Game Theory. Quarterly Journal of Economic Growth and Development Research, 9, 131-146. (in Persian)
[35] Jentzsch, N. (2007). Financial Privacy: An International Comparison of Credit Reporting Systems. Springer Berlin Heidelberg.
[36] Knight, Frank H. (1921). Risk, Uncertainty and Profit. New York: Hart, Schaffner and Marx.
[37] Krasnikov, Alexander; Jayachandran, Satish; & Kumar, V. (2009). The Impact of Customer Relationship Management Implementation on Cost and Profit Efficiencies: Evidence from the US Commercial Banking Industry. Journal of marketing, 73(6), 61-76.
[38] Liptak, Adam. (2010). When American and European Ideas of Privacy Collide. New York Times.
[39] Mahdavi, Ghadir; & Rajaei, Malihe. (2016). The Precautions Effect on the Market, 31(3), 25-44. (in Persian)
[40] Murphy, Richard S. (1995). Property rights in Personal Information: An Economic Defense of Privacy. Geo. LJ, 84, 2381.
[41] Mydland, Ørjan. (2019). Lost Economies of Scope and Potential Merger Gains in the Norwegian Electricity Industry. Empirical Economics, 1-24.
[42] N. A. Al-Sayid; & D. Aldlaeen. (2013). Database Security Threats: A Survey Study. In 2013 5th International Conference on Computer Science and Information Technology (pp. 60-64). https://doi.org/10.1109/CSIT.2013.6588759
[43] Naeemi, Seyyed Morteza; & Rasekh, Mohammad. (2012). Concept of “Economic Man” in Economic Approach to Law: An Explanation and a Critique. Encyclopedia of Economic right, 19(2), 134-168. (in Persian)
[44] Niknia, Masoumeh. (2016). Linked Data and User Interaction: The Road Ahead. Information & Communication Quarterly Book Review, 3(9), 181-192. (in Persian)
[45] Noam, Eli M. (1997a). Privacy and Self-regulation: Markets for Electronic Privacy. Privacy and Self-Regulation in the Information Age, 21-33.
[46] Noam, Eli M. (1997b). Privacy and Self-regulation: Markets for Electronic Privacy. Privacy and Self-Regulation in the Information Age, 21-33.
[47] Odlyzko, Andrew. (2003). Privacy, Economics, and Price Discrimination on the Internet (pp. 355-366). Presented at the Proceedings of the 5th international conference on Electronic commerce, ACM.
[48] Ostovar, majid. (2009). Influence of Hayek’s Idea on Political Ideologies of Right and Left. The Journal of Policy, 38(4), 77-97. (in Persian)
[49] Posner, Richard A. (1977). The Right of Privacy. Ga. L. Rev., 12, 393.
[50] Posner, Richard A. (1981). The Economics of Privacy. The American Economic Review, 71(2), 405-409.
[51] Price, Kristen. (2017). What to Do in Data Breach; A Survey into the US Government’s Recommendation to Respond to Information Flaw. (N. Moshref Javadi, tran.), Peivast Monthly Magazine, (48), 94-95.
[52] Raso, Jennifer. (2016). Accessible Information and Constitutional Democracy: Who Counts. Const. F., 25, 67.
[53] Reinartz, Werner. (2002). Customizing Prices in Online Markets. Symphonya. Emerging Issues in Management, (1), 55-65.
[54] Romanosky, Sasha; & Acquisti, Alessandro. (2009). Privacy Costs and Personal Data Protection: Economic and legal perspectives. Berkeley Tech. LJ, 24, 1061.
[55] Rubin, Paul H; & Lenard, Thomas M. (2002). Privacy and the Commercial Use of Personal Information. Springer Science & Business Media.
[56] Safaei, Seyed Hossein; & Hasani Sangani, Vahid. (2016). Competitive Analysis of Discriminative Pricing and Intellectual Property Rights, 12(2), 171-203. (in Persian)
[57] Safai, Sayyed Hossein. (2015). The Relationship of Law and Economics. Retrieved June 20, 2019, from http://www.ias.ac.ir/index.php/2016-04-19-10-01-24/327-2016-04-20-08-54-23(in Persian)
[58] Salehi, mojtaba; & Khanmohammadi, Mohammad Hamed. (2018). Evaluating Economies of Scale of Country Banks With Use of Conceptual Constraints Concepts. Financial Knowledge of Securities Analysis, 11. (in Persian)
[59] Samuelson, Pamela. (2000). Privacy as Intellectual Property? Stanford Law Review, 1125-1173.
[60] Samuelson, Pamela. (2003). The Social Costs of Incoherent Privacy Policies. Presentation at IBM Almaden Privacy Institute.
[61] Schoeman, Ferdinand David. (1992). Privacy and Social Freedom. Cambridge university press.
[62] Schwartz, Paul M. (1999). Internet Privacy and the State. Conn. L. Rev., 32, 815.
[63] Schwartz, Paul M. (2004). Property, Privacy, and Personal Data. Harvard Law Review, 2056-2128.
[64] Sharifzadeh, Mohammad Javad. (2012). Law and Economics in Islam An Introduction to Economics Analysis of Islamic Legal Institutions(With Special Focus on the History of Early Days of Islam). Tehran: Imam Sadiq University Publisher. (in Persian)
[65] Sharman, Jason C. (2009). Privacy as Roguery: Personal Financial Information in an Age of Transparency. Public Administration, 87(4), 717-731.
[66] Shokuhyan, Seyed Alireza; & Edrisian, Mojtaba (trans.). (2017). “Tort Law and Economics” The First Part: The Efficient Tort Rules. Tehran: Judiciary Press and Publishing Center. (in Persian)
[67] Spence, Michael. (1978). Job Market Signaling. In Uncertainty in Economics (pp. 281-306). Elsevier.
[68] Staten, Michael E; & Cate, Fred H. (2002). The Impact of Opt-in Privacy Rules on Retail Credit Markets: A Case Study of MBNA. Duke LJ, 52, 745.
[69] Stigler, George J. (1961). The Economics of Information. Journal of Political Economy, 69(3), 213-225.
[70] Stigler, George J. (1980). An Introduction to Privacy in Economics and Politics. The Journal of Legal Studies, 9(4), 623-644.
[71] Stone, Eugene F; & Stone, Dianna L. (1990). Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms. Research in Personnel and Human Resources Management, 8(3), 349-411.
[72] Swire, Peter P; & Litan, Robert E. (1998). None of Your business: world data flows, electronic commerce, and the European privacy directive. Brookings Inst Pr.
[73] Swire, Peter P; Litan, Robert E; & Litan, Robert E. (1998). None of Your Business: World Data Flows, Electronic Commerce, and the European Privacy Directive (Vol. 196). Brookings Institution Press Washington, DC.
[74] Taherkhani, Setare. (2011). An Introduction to Game Theory. Journal of Foreign Policy, 25(1), 219-242. (in Persian)
[75] Taylor, Curtis R. (2004). Consumer Privacy and The Market for Customer Information. RAND Journal of Economics, 631-650.
[76] Tor (anonymity network). (2019, June 17). In Wikipedia.
[77] Tsai, Janice Y; Egelman, Serge; Cranor, Lorrie; & Acquisti, Alessandro. (2011). The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research, 22(2), 254-268.
[78] Varian, Hal R. (2009). Economic Aspects of Personal Privacy. In Internet Policy and Economics (pp. 101-109). Springer.
[79] Vesali Naseh; & Parsapour. (2016). Liability Resulting from Fright (A Comparative Study of Imamieh Jurisprudence, Iran Law and Common Law). Journal OF Comparative Law Research, 20(2), 147-169. (in Persian)
[80] Warren, Samuel D; & Brandeis, Louis D. (1890). The Right to Privacy. Harvard Law Review, 193-220.
[81] Westin, Alan F. (1968). Privacy and Freedom. Washington and Lee Law Review, 25(1), 166.
[82] Zarei, Mohammad Hossein; & Shokuhyan, Seyed Alireza. (2016). The Role of Private Entities in Market Regulation; With a Critical Approach to the Planning Rule. In Economic Law in Public Policy-Making. Mizan.(in Persian)
[83] 10 Mistakes That Will Ruin Your Credit Score. (2018, June 19). Retrieved May 15, 2019, from https://smartasset.com/credit-score/10-mistakes-that-will-ruin-credit-score
CAPTCHA Image