A Theory of Transactions Privacy

نویسندگان

  • Charles M. Kahn
  • James McAndrews
  • William Roberds
چکیده

In this paper, we consider the costs and benefits of transactions privacy. In the environment we consider, privacy is the concealment of potentially useful information, but concealment also potentially bestows benefits. In some versions of the environment, the standard Coasian logic applies: given an unambiguous initial assignment of rights and sufficient flexibility in contracting, efficiency in information revelation will result. Coasian bargaining may be impeded, however, by either an inability to make certain commitments or by the presence of significant investments that must be made before the transaction occurs. In such cases, initial assignments of rights (for example, privacy laws) can have consequences for efficiency. JEL classification: D80, G28

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effects of Architectural Components on the Satisfaction Rate of Residents with Different Ages and Genders in Relation to Privacy (Case Study: a Residential Complex in Tabriz)

 The main objective of this paper is to assess the effects of architectural components on residential complex to achieve a desirable rate of privacy for the residents. Privacy is a process in which the transactions among individuals can be adjus‌ted by means of providing a suitable relationship between people and their built environment. In addition, since the transaction between the behavior o...

متن کامل

Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security

Acknowledgement I am greatly indebted to Omar El Sawy and Ann Majchrzak for their guidance and suggestion, and I would like to thank Ricky Lim and Raymond for their help with the data analysis. Abstract Consumers' trust in their online transactions is vital for the sustained progress and development of electronic commerce. Our paper proposes that in addition to known factors of trust such a ven...

متن کامل

Oblivious Transfer from the Additive White Gaussian Noise Channel

We consider the use of the additive white Gaussian noise channel to achieve information theoretically secure oblivious transfer. A protocol for this primitive that ensures the correctness and privacy for players is presented together with the signal design. We also study the information theoretic efficiency of the protocol, and some more practical issues where the parameter of the channel is un...

متن کامل

Incentive Theory of the Third Sector of Economy (Non-Profit Organization)

Abstract This article aims to provide theoretical model for analyzing challenge of asymmetric information in the third sector of economy (which is the most important challenge, preventing the growth and development of third sector), using the theoretical foundation of contract theory and incentive theory with regard to the special characteristics of third sector derived by its special structur...

متن کامل

Modelling and Experimental Testing of Asymmetric Information Problems in Lease and Hire Contracts (Based on Contract Theory)

This article aims to study lease and hiring contract in the Iranian-Islamic setting and analyze the asymmetric information problem in these contracts. For doing this, we study the characteristics of lease and hiring contracts in Iran (real world experimental characteristics that recognized in other studies), using library method, then we mathematically model different aspects of asymmetric info...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000