Document Type : Scientific research

Authors

University of Tehran

Abstract

Introduction
The theory of Economic Analysis of law, sometimes interpreted as the theory of Law and Economics, is one of the important theories about the relationship between Law and Economic that first exposed to discuss in the United States and then in other countries in the second half of the 20th century. According to this theory, increasing economic efficiency and maximizing wealth are the basis for evaluation and the aim of the law. One of the issues increasingly has attracted economists and lawyers' attention in the information economy is privacy. Although there are different definitions of privacy, all of them are related to the boundaries between the self and the others or in fact between private and public. In this article in order to determine the optimal level of government intervention and to present a definitive economic assessment of whether more or less, privacy protection is required, we compare the aggregate values of privacy protection and disclosure of personal data (lack of privacy protection) and the economic implications of them by analyzing diverse streams of theoretical on the economics of privacy as well as privacy tradeoffs for data holder, data subjects, and third parties.
 
Methodology
The method for collecting information is a library method. We studied statutes, regulations, cases as well as articles and books about this topic. In this comparative study, the method of thinking is the descriptive-analytical method.
 
Results & Discussion
Chicago School's scholars believe privacy protection as the source of economic inefficiencies. The reasons for these inefficiencies also has expressed as follows: hiding information from other economic agents, increased transaction costs, hiding negative features, the difficulty of transaction risk analysis and fraud encouragement. It is also said that free information sharing leads to reduced market distortion, increased social welfare, and consumer interests from positive externalities of the second market. Finally, privacy protection depends on the valuation of the parties interested in certain data not on the regulatory protection of personal information. In criticizing this theory we can say that the assumptions of rational behavior (considering the current technologies) can't take into account the complexity of consumer's decision making. First of all, the consumer sometimes cannot predict the future effects of the current information sharing (for example, the negative externality of secondary market, price discrimination, utilization of data for unsolicited marketing and the other negative consumer externality that is not internalized by the firms). Second, at the time of choosing the short term benefits and the long term costs of information disclosure, the consumers do not act properly. Privacy also has a positive effect on welfare and efficient balance in source allocation. Moreover, in rejecting the theory of efficiency in the free flow of information we can say that such a system would be inefficient in the long term. Because information about an individual is never complete or accurate. If an individual has no control over the dissemination of her personal information, does not know what facts may determine a counterparty’s decision, and he can't correct errors in her record, that may lead to economically inefficient behavior by all parties to a transaction. Finally, people may not acquire privacy protection under standard market conditions due to poverty, transaction costs and other impedimenta.
Disclosed personal information (the lack of privacy protection) has economic benefits and costs for three groups of people: data holders, data subjects and third parties. disclosed personal information can bring about economic benefits for data holders (for instance, efficiency gains, price discrimination, increased revenues through consumer tracking, improved services or its redesigning with respect to consumer behavior); data subjects (for instance, discounts, personalization, sales of personal information with prophetization approach, targeted offers, reducing junk and telemarketing and increasing the reliability of gathered data, price discrimination, the advantages of secondary markets) and third parties(for instance, improve  the experiences of third parties). At the same time, such disclosures can be costly for data holder (for instance, costs associated with data collection when consumers deem gathering method too intrusive or the costs associated with the use or misuse of collected data, such as privacy violations, the cost of informing consumers of a breach, termination of relationships with a company and reducing certain transactions because of fears of future privacy costs as well as costs associated with the act of collecting data such as the investments necessary to build Customer Relationship Management systems); data subject (for instance, the psychological costs including unpleasant feelings of being observed, Being afraid of invasion, the embarrassment due to disclosing data; identity theft; price discrimination; changing the balance of power between the data subject and the data holder; time costs including time spent deleting junk mail and even criminal charges) and third parties (for instance, disclosure of third parties' information and their privacy violations).
Similarly, protected personal information (privacy protection) has benefits and costs for data holders and data subjects that are often in inverse ratio to the benefits and costs of disclosed data. Privacy protection can lead to economic benefits for data holders (for instance, limiting responsibilities, gaining competitive advantage by attracting consumers who value for privacy) and data subjects (for instance, reducing the expected costs of future identity theft, the benefits arising from the seller's lack of awareness of some personal information). Also, privacy protection may include costs for data holders (for instance, opportunity costs such as the loss of opportunities for increased efficiency as well as the costs associated with the act of protecting data such as investments necessary for data encryption) and data subject (for instance, cognitive costs associated with getting informed from breach and response to a breach disclosure, opportunity costs for not using data in useful individual and social aims, as well costs associated with the act of protecting data including costs of using privacy enhancing technologies)

Conclusion & Suggestions
Considering the analysis presented, it was concluded that the meaning and scope of privacy, its associated trade-offs and consumer's valuations of personal data are very diverse. Furthermore, the benefits and costs arising from the protection of privacy and personal data sharing would be different depending on different circumstances, conditions and assumptions. Finally, economic theory also shows that as much as the interruption of data flows can decrease aggregate welfare, the protection of privacy can increase it. So, it would be difficult to compare the aggregate values of privacy protection and personal data and to present a final and definitive economic assessment of whether more or less, privacy protection is required. Therefore, it seems that solving the privacy problem means to find a balance between privacy and information sharing that is for the benefits of data subjects and society. Evaluating privacy from an economic perspective can help us to find this balance. Additional research is needed to find a way of creating such a balance in this area.
 

Keywords

[1] Acquisti, Alessandro. (2008). Identity Management, Privacy, and Price Discrimination. IEEE Security & Privacy, 6(2).
[2] Acquisti, Alessandro. (2010). The economics of Personal Data and the Economics of Privacy, 51.
[3] Acquisti, Alessandro; Taylor, Curtis; & Wagman, Liad. (2016). The Economics of Privacy. Journal of Economic Literature, 54(2), 442-92.
[4] Acquisti, Alessandro; & Varian, Hal R. (2005). Conditioning Prices on Purchase History. Marketing Science, 24(3), 367-381.
[5] Aghababaii, Hossein. (2017). Privacy in The Islamic Criminal Law. Tehran: Islamic Research Institute for Culture and Thought. (in Persian)
[6] Akerlof, George A. (1978). The Market for “Lemons”: Quality Uncertainty and the Market Mechanism. In Uncertainty in Economics (pp. 235-251). Elsevier.
[7] Allen, Anita L. (1999). Privacy-as-Data Control: Conceptual, Practical, and Moral limits of the Paradigm. Conn. L. Rev., 32, 861.
[8] Ansari, Bagher. (2013). Privacy Law. Tehran: The Organization for Researching and Composing University Textbooks in the Humanities (Samt). (in Persian)
[9] Ansari, Bagher. (2017). Mass Communication Law. Tehran: The Organization for Researching and Composing University Textbooks in the Humanities (Samt). (in Persian)
[10] Arrow, Kenneth J. (1962). The Economic Implications of Learning by Doing. The Review of Economic Studies, 29(3), 155-173.
[11] Asadollahi, Simindokht. (2016). َAnalysis of Program Laws Legislation in Consumer Rights Protection. In Economic Law in Public Policy-Making (pp. 37-61). Tehran: Mizan. (in Persian)
[12] Badini, Hsan. (2004). The Philosophical Foundations of the Economic Attitude to Law. Journal of Faculty of Law and Political Science, 62(0), 91-135. (in Persian)
[13] Bergelson, Vera. (2003). It’s Personal but Is It Mine? Toward Property Rights in Personal Information. UC Davis Law Review, 37(379).
[14] Calo, Ryan. (2011). The Boundaries of Privacy Harm. Ind. LJ, 86, 1131.
[15] Calzolari, Giacomo; & Pavan, Alessandro. (2006). On the Optimality of Privacy in Sequential Contracting. Journal of Economic Theory, 130(1), 168-204.
[16] Camp, L Jean. (2007). Economics of Identity Theft: Avoidance, Causes and Possible Cures. Springer Science & Business Media.
[17] Camp, L Jean; & Wolfram, Catherine. (2004). Pricing Security. In Economics of Information Security (pp. 17-34). Springer.
[18] Choi, Jay Pil; Jeon, Doh-Shin; & Kim, Byung-Cheol. (2018). Privacy and Personal Data Collection with Information Externalities.
[19] Click path. (2019, March 22). In Wikipedia.
[20] Cooter, Robert; & Ulen, Thomas. (2010). Law and Economics. (Y. Dadgar & H. Akhavan, trans.). Tehran: Tarbiat Modares University Press.
[21] Deighton, John A; & Blattberg, Robert C. (1991). Interactive Marketing: Exploiting the Age of Addressability. Sloan Management Review, 33(1), 5-14.
[22] Dixon, Huw. (2001). Surfing economics.
[23] Fairfield, Joshua AT; & Engel, Christoph. (2015). Privacy as a Public Good. Duke LJ, 65, 385.
[24] Gellman, Robert. (2002). Privacy, Consumers, and Costs-How the Lack of Privacy Costs Consumers and why Business Studies of Privacy Costs Are Biased and Incomplete. Presented at the Digital Media Forum, Ford Foundation.
[25] Ghasemi Hamed, Abbas. (2012). Harm the Consumer in Competitive market. Legal Research, 15(148), 97-124. (in Persian)
[26] Goldfarb, Avi; & Tucker, Catherine E. (2011). Privacy Regulation and Online Advertising. Management Science, 57(1), 57-71.
[27] Grossman, Sanford J. (1981). The Informational Role of Warranties and Private Disclosure about Product Quality. The Journal of Law and Economics, 24(3), 461-483.
[28] Hann, Il-Horn; Hui, Kai Lung; Lee, TSY; & Png, IPL. (2003). Direct Marketing: Privacy and Competition. Presented at the Workshop on Information Systems and Economics (WISE), Seattle, Washington, USA.
[29] Hayek, F. A. (2010). The Use of Knowledge in Society. (M. Ranjbar & M. kazemi, trans.), World Economy Newspaper.
[30] Hermalin, Benjamin E; & Katz, Michael L. (2006). Privacy, Property Rights and Efficiency: The Economics of Privacy as Secrecy. Quantitative Marketing and Economics, 4(3), 209-239.
[31] Hirshleifer, Jack. (1980). Privacy: Its Origin, Function, and Future. The Journal of Legal Studies, 9(4), 649-664.
[32] Hoofnagle, C. (2007). Security Breach Notification Laws: Views from Chief Security Officers.
[33] Hoseyni, Seyedeh Fatemeh; & Safari Gerayli, Mehdi. (2018). Internet Disclosure of Financial Information and Firm Value: An Empirical Test of Signaling Theory. Journal Management System, 7, 1-9. (in Persian)
[34] Jalali, Omolbanin; & Nasrollahi, Zahra. (2019). Influence of Social Capital on the Incentive Reversal: Behavioral Economics Approach Based on Game Theory. Quarterly Journal of Economic Growth and Development Research, 9, 131-146. (in Persian)
[35] Jentzsch, N. (2007). Financial Privacy: An International Comparison of Credit Reporting Systems. Springer Berlin Heidelberg.
[36] Knight, Frank H. (1921). Risk, Uncertainty and Profit. New York: Hart, Schaffner and Marx.
[37] Krasnikov, Alexander; Jayachandran, Satish; & Kumar, V. (2009). The Impact of Customer Relationship Management Implementation on Cost and Profit Efficiencies: Evidence from the US Commercial Banking Industry. Journal of marketing, 73(6), 61-76.
[38] Liptak, Adam. (2010). When American and European Ideas of Privacy Collide. New York Times.
[39] Mahdavi, Ghadir; & Rajaei, Malihe. (2016). The Precautions Effect on the Market, 31(3), 25-44. (in Persian)
[40] Murphy, Richard S. (1995). Property rights in Personal Information: An Economic Defense of Privacy. Geo. LJ, 84, 2381.
[41] Mydland, Ørjan. (2019). Lost Economies of Scope and Potential Merger Gains in the Norwegian Electricity Industry. Empirical Economics, 1-24.
[42] N. A. Al-Sayid; & D. Aldlaeen. (2013). Database Security Threats: A Survey Study. In 2013 5th International Conference on Computer Science and Information Technology (pp. 60-64). https://doi.org/10.1109/CSIT.2013.6588759
[43] Naeemi, Seyyed Morteza; & Rasekh, Mohammad. (2012). Concept of “Economic Man” in Economic Approach to Law: An Explanation and a Critique. Encyclopedia of Economic right, 19(2), 134-168. (in Persian)
[44] Niknia, Masoumeh. (2016). Linked Data and User Interaction: The Road Ahead. Information & Communication Quarterly Book Review, 3(9), 181-192. (in Persian)
[45] Noam, Eli M. (1997a). Privacy and Self-regulation: Markets for Electronic Privacy. Privacy and Self-Regulation in the Information Age, 21-33.
[46] Noam, Eli M. (1997b). Privacy and Self-regulation: Markets for Electronic Privacy. Privacy and Self-Regulation in the Information Age, 21-33.
[47] Odlyzko, Andrew. (2003). Privacy, Economics, and Price Discrimination on the Internet (pp. 355-366). Presented at the Proceedings of the 5th international conference on Electronic commerce, ACM.
[48] Ostovar, majid. (2009). Influence of Hayek’s Idea on Political Ideologies of Right and Left. The Journal of Policy, 38(4), 77-97. (in Persian)
[49] Posner, Richard A. (1977). The Right of Privacy. Ga. L. Rev., 12, 393.
[50] Posner, Richard A. (1981). The Economics of Privacy. The American Economic Review, 71(2), 405-409.
[51] Price, Kristen. (2017). What to Do in Data Breach; A Survey into the US Government’s Recommendation to Respond to Information Flaw. (N. Moshref Javadi, tran.), Peivast Monthly Magazine, (48), 94-95.
[52] Raso, Jennifer. (2016). Accessible Information and Constitutional Democracy: Who Counts. Const. F., 25, 67.
[53] Reinartz, Werner. (2002). Customizing Prices in Online Markets. Symphonya. Emerging Issues in Management, (1), 55-65.
[54] Romanosky, Sasha; & Acquisti, Alessandro. (2009). Privacy Costs and Personal Data Protection: Economic and legal perspectives. Berkeley Tech. LJ, 24, 1061.
[55] Rubin, Paul H; & Lenard, Thomas M. (2002). Privacy and the Commercial Use of Personal Information. Springer Science & Business Media.
[56] Safaei, Seyed Hossein; & Hasani Sangani, Vahid. (2016). Competitive Analysis of Discriminative Pricing and Intellectual Property Rights, 12(2), 171-203. (in Persian)
[57] Safai, Sayyed Hossein. (2015). The Relationship of Law and Economics. Retrieved June 20, 2019, from http://www.ias.ac.ir/index.php/2016-04-19-10-01-24/327-2016-04-20-08-54-23(in Persian)
[58] Salehi, mojtaba; & Khanmohammadi, Mohammad Hamed. (2018). Evaluating Economies of Scale of Country Banks With Use of Conceptual Constraints Concepts. Financial Knowledge of Securities Analysis, 11. (in Persian)
[59] Samuelson, Pamela. (2000). Privacy as Intellectual Property? Stanford Law Review, 1125-1173.
[60] Samuelson, Pamela. (2003). The Social Costs of Incoherent Privacy Policies. Presentation at IBM Almaden Privacy Institute.
[61] Schoeman, Ferdinand David. (1992). Privacy and Social Freedom. Cambridge university press.
[62] Schwartz, Paul M. (1999). Internet Privacy and the State. Conn. L. Rev., 32, 815.
[63] Schwartz, Paul M. (2004). Property, Privacy, and Personal Data. Harvard Law Review, 2056-2128.
[64] Sharifzadeh, Mohammad Javad. (2012). Law and Economics in Islam An Introduction to Economics Analysis of Islamic Legal Institutions(With Special Focus on the History of Early Days of Islam). Tehran: Imam Sadiq University Publisher. (in Persian)
[65] Sharman, Jason C. (2009). Privacy as Roguery: Personal Financial Information in an Age of Transparency. Public Administration, 87(4), 717-731.
[66] Shokuhyan, Seyed Alireza; & Edrisian, Mojtaba (trans.). (2017). “Tort Law and Economics” The First Part: The Efficient Tort Rules. Tehran: Judiciary Press and Publishing Center. (in Persian)
[67] Spence, Michael. (1978). Job Market Signaling. In Uncertainty in Economics (pp. 281-306). Elsevier.
[68] Staten, Michael E; & Cate, Fred H. (2002). The Impact of Opt-in Privacy Rules on Retail Credit Markets: A Case Study of MBNA. Duke LJ, 52, 745.
[69] Stigler, George J. (1961). The Economics of Information. Journal of Political Economy, 69(3), 213-225.
[70] Stigler, George J. (1980). An Introduction to Privacy in Economics and Politics. The Journal of Legal Studies, 9(4), 623-644.
[71] Stone, Eugene F; & Stone, Dianna L. (1990). Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms. Research in Personnel and Human Resources Management, 8(3), 349-411.
[72] Swire, Peter P; & Litan, Robert E. (1998). None of Your business: world data flows, electronic commerce, and the European privacy directive. Brookings Inst Pr.
[73] Swire, Peter P; Litan, Robert E; & Litan, Robert E. (1998). None of Your Business: World Data Flows, Electronic Commerce, and the European Privacy Directive (Vol. 196). Brookings Institution Press Washington, DC.
[74] Taherkhani, Setare. (2011). An Introduction to Game Theory. Journal of Foreign Policy, 25(1), 219-242. (in Persian)
[75] Taylor, Curtis R. (2004). Consumer Privacy and The Market for Customer Information. RAND Journal of Economics, 631-650.
[76] Tor (anonymity network). (2019, June 17). In Wikipedia.
[77] Tsai, Janice Y; Egelman, Serge; Cranor, Lorrie; & Acquisti, Alessandro. (2011). The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research, 22(2), 254-268.
[78] Varian, Hal R. (2009). Economic Aspects of Personal Privacy. In Internet Policy and Economics (pp. 101-109). Springer.
[79] Vesali Naseh; & Parsapour. (2016). Liability Resulting from Fright (A Comparative Study of Imamieh Jurisprudence, Iran Law and Common Law). Journal OF Comparative Law Research, 20(2), 147-169. (in Persian)
[80] Warren, Samuel D; & Brandeis, Louis D. (1890). The Right to Privacy. Harvard Law Review, 193-220.
[81] Westin, Alan F. (1968). Privacy and Freedom. Washington and Lee Law Review, 25(1), 166.
[82] Zarei, Mohammad Hossein; & Shokuhyan, Seyed Alireza. (2016). The Role of Private Entities in Market Regulation; With a Critical Approach to the Planning Rule. In Economic Law in Public Policy-Making. Mizan.(in Persian)
[83] 10 Mistakes That Will Ruin Your Credit Score. (2018, June 19). Retrieved May 15, 2019, from https://smartasset.com/credit-score/10-mistakes-that-will-ruin-credit-score
CAPTCHA Image