Preview

Russian Journal of Economics and Law

Расширенный поиск

Загрязнение информационной среды

https://doi.org/10.21202/2782-2923.2022.1.136-175

EDN: UUYIGL

Аннотация

Цель: разработка и обоснование теории информационного загрязнения, которая позволяет понять и оценить вред, который несет в себе экономика больших данных.

Методы: диалектический подход к познанию социальных явлений, позволяющий проанализировать их в историческом развитии и функционировании в контексте совокупности объективных и субъективных факторов, который определил выбор следующих методов исследования: формально-логический и социологический.

Результаты: в статье разрабатывается теория информационного загрязнения, позволяющая понять вред, который несет в себе экономика данных, и то, как следует регулировать этот вред. Автор показывает, что общественное вмешательство должно быть направлено на внешний ущерб от сбора и неправомерного использования персональных данных. В статье оспаривается преобладающая точка зрения о том, что ущерб от утечки цифровых данных является исключительно частным. Эта точка зрения привела к тому, что законодатели сосредоточиваются лишь на защите приватности. Автор, напротив, утверждает, что в основном игнорируется центральная проблема цифровой экономики: как информация, предоставляемая гражданами, влияет на других людей, как она подрывает и уменьшает общественное благо и общественные интересы.

Научная новизна: новизна концепции информационного загрязнения заключается в том, что предлагает новый взгляд на проблему низкой эффективности существующих правовых инструментов – законов о нарушении гражданских норм, контрактов и норм раскрытия информации; эти инструменты отражают историческую бесперспективность, аналогичную попыткам снизить ущерб от промышленных загрязнений. Кроме того, теория информационного загрязнения открывает широкие возможности для создания новых правовых средств – «законов об охране окружающей среды в области защиты информации», которые будут направлены на регулирование указанных внешних эффектов. В статье показано, как инструменты контроля промышленных загрязнений: ограничения за производство, углеродный налог, ответственность за выбросы – могут быть адаптированы для регулирования информационного загрязнения.

Практическая значимость: основные положения и выводы статьи могут быть использованы в научной, педагогической и правоприменительной деятельности при рассмотрении вопросов, связанных с теорией информационного загрязнения.

Об авторе

О. Бен-Шахар
Чикагский университет, школа права
Соединённые Штаты Америки

Омри Бен-Шахар

г. Чикаго



Список литературы

1. Economist. (2017, May 6). Data Is Giving Rise To A New Economy. Economist. https://www.economist.com/news/briefing/21721634-how-it-shaping-up-data-giving-rise-new-economy

2. DeVries, Will Thomas. (2003). Protecting Privacy in the Digital Age. Berkeley Tech. L. J., 18, 283–311.

3. Isenberg, Howard. (1995). The Second Industrial Revolution: The Impact of the Information Explosion. Ind. Eng., 27, 14.

4. Granville, Kevin (2018, March 19). Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens. The New York Times. https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html

5. Schwartz, Paul M., Karl-Nikolaus Peifer. (2017). Transatlantic Data Privacy Law. Geo. L. J., 106, 115–179.

6. Westin, Alan. (1967). Privacy and Freedom. New York, NY, Atheneum Press.

7. Reiman, Jeffrey H. (1982). Privacy, Intimacy, and Personhood. In F.D. Schoeman, ed., Philosophical Dimensions of Privacy: An Anthology (pp. 300–316). Cambridge, UK: Cambridge University Press.

8. Schwartz, Paul M. (1999). Privacy and Democracy in Cyberspace. Vand. L. Rev., 52, 1609–1702.

9. Cohen, Julie E. (2000). Examined Lives: Informational Privacy and the Subject as Object. Stan. L. Rev., 52, 1373–1437.

10. Nehf, James P. (2003). Recognizing the Societal Value in Information Privacy. Wash. L. Rev., 78, 1–92.

11. Ashenmacher, George. (2016). Indignity: Redefining the Harm Caused by Data Breaches. Wake Forest L. Rev., 51, 1–56.

12. Solove, Daniel J. (2002). Conceptualizing Privacy. Cal. L. Rev., 90, 1087–1155.

13. Sunstein, Cass R. (2017). #Republic: Divided Democracy in the Age of Social Media. Princeton, NJ, Princeton University Press.

14. Sunstein, Cass R. (2018, January 22). Is Social Media Good or Bad for Democracy. Facebook Newsroom. https://newsroom.fb.com/news/2018/01/sunstein-democracy/

15. Wittes, Benjamin, Jodie C. Liu. (2015, May). The Privacy Paradox: The Privacy Benefits of Privacy Threats. Center for Technology Innovation at Brookings. https://www.brookings.edu/wp-content/uploads/2016/06/Wittes-and-Liu_Privacy-paradox_v10.pdf

16. Hermstrüwer, Yoan. (2017). Contracting Around Privacy: The (Behavioral) Law and Economics of Consent and Big Data. J. Intell. Prop. Info. Tech. & Elec. Com. L., 8, 9–26.

17. Athey, Susan et al. (2018). The Digital Privacy Paradox: Small Money, Small Costs, Small Talk. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2916489

18. Froomkin, A. Michael. (2015). Regulating Mass Surveillance as Privacy Pollution: Learning from Environmental Impact Statements. U. Ill. L. Rev., 1713–1790.

19. Acquisti, Alessando, Brandimarte, Laura, Loewenstein, George. (2015). Privacy and Human Behavior in the Age of Information. Science, 347, 509–514.

20. Dewees, Donald N. (1992). The Role of Tort Law in Controlling Environmental Pollution. Can. Public Pol’y, 18, 425–442.

21. Hirsch, Dennis D. (2006). Protecting the Inner Environment: What Privacy Regulation Can Learn from Environmental Law. Ga. L. Rev., 41, 1–63.

22. Hirsch, Dennis D. (2014). The Glass House Effect: Big Data, the New Oil, and the Power of Analogy. Me. L. Rev., 66, 373–395.

23. Hirsch, Dennis D., Jonathan H. King. (2016). Big Data Sustainability: An Environmental Management Systems Analogy. Wash. & Lee L. Rev., 72, 406–419.

24. Kaiser, Brittany. (2018, April 9). Facebook Should Pay Its 2bn Users for Their Personal Data. Financial Times. https://www.ft.com/content/7a99cb46-3b0f-11e8-bcc8-cebcb81f1f90

25. Posner, Eric, Glen Weyl. (2018). Radical Markets. Princeton, NJ, Princeton University Press.

26. Abraham, Kenneth S. (2008). The Liability Century: Insurance and Tort Law from the Progressive Era to 9/11. Cambridge, MA, Harvard University Press.

27. Thomsen, Simon. (2015, July 21). Extramarital Affair Website Ashley Madison Has Been Hacked and Attackers Are Threatening to Leak Data Online. Business Insider. https://www.businessinsider.com/cheating-affair-websiteashley-madisonhacked-user-data-leaked-2015-7

28. Keats Citron, Danielle. (2019). Sexual Privacy. Yale L. J., 128, 1870–1961.

29. Silverman, Jacob. (2016, June 14). Just How ‘Smart’ Do You Want Your Blender to Be? The New York Times. https://www.nytimes.com/2016/06/19/magazine/just-how-smart-do-you-want-your-blender-to-be.html

30. Steinberg, Joseph. (2014, January 27) These Devices May Be Spying On You (Even In Your Own Home). Forbes. https://www.forbes.com/sites/josephsteinberg/2014/01/27/these-devices-may-be-spying-on-you-even-in-yourown-home/#7eb0e320b859

31. Morey, Timothy et al. (2015, May). Customer Data: Designing for Transparency and Trust. Harvard Business Review, 1–11. https://hbr.org/2015/05/customer-data-designing-for-transparency-and-trust

32. Pollack, Wendy, Mike Sullivan. (2018, April 20). The Information Subscribers Most Likely to Pay for Google Among Tech Services. The Information. https://www.theinformation.com/articles/the-information-subscribers-most-likely-to-pay-for-googleamong-tech-services

33. Dell Technologies. (2014). EMC Privacy Index. Dell. https://www.emc.com/campaign/privacy-index/global.htm

34. IBM. (2018, April 16). New Survey Finds Deep Consumer Anxiety over Data Privacy and Security. IBM News Room. https://newsroom.ibm.com/2018-04-15-New-Survey-Finds-Deep-Consumer-Anxiety-over-Data-Privacyand-Security

35. Acquisti, Alessandro, Leslie K. John, George Loewenstein. (2013). What Is Privacy Worth? J. Legal Stud., 42, 249–273.

36. Strahilevitz, Lior J., Matthew B. Kugler. (2016). Is Privacy Policy Language Irrelevant to Consumers? J. Legal Stud., 45, 69–95.

37. Matthews, Alex, Catherine Tucker. (2017). Government Surveillance and Internet Search Behavior. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2412564

38. Perez-Pena, Richard, Matthew Rosenberg. (2018, January 29). Strava Fitness App Can Reveal Military Sites, Analysts Say. The New York Times. https://www.nytimes.com/2018/01/29/world/middleeast/strava-heat-map.html

39. Brown, Daniel. (2018, January 29). Here are Some of the Biggest Reveals from a Fitnesstracker Data Map That May Have Compromised Top-secret US Military Bases around the World. Business Insider. https://www.businessinsider.com.au/stravaheatmap-most-revealing-images-2018-1

40. Cohen, Bret et al. (2017). Data Localization Laws and Their Impact on Privacy, Data Security and the Global Economy. Antitrust, 32, 107–114

41. Yanqing, Hong. (2017, June 20). The Cross-Border Data Flows Security Assessment: An important part of protecting China’s basic strategic resources. Yale Law School Paul Tsai China Center. Working Paper. https://law.yale.edu/system/files/area/center/china/document/dataflowssecurity_final.pdf

42. Miller, Amalia R., Catherine Tucker. (2017). Frontiers of Health Policy: Digital Data and Personalized Medicine. Innovation Policy and the Economy, 17, 49–75.

43. Lambrecht, Anja, Catherine Tucker. (2018). Algorithmic Bias? An Empirical Study into Apparent Gender-Based Discrimination in the Display of STEM Career Ads. https://www.ssrn.com/abstract=2852260

44. Datta, Amit et al. (2015). Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination. PoPETs, 92–112.

45. Sweeney, Latanya. (2013). Discrimination in Online Ad Delivery. ACMQueue, 11, 1–10.

46. Datta, Amit et al. (2018). Discrimination in Online Advertising a Multidisciplinary Inquiry. Proc. Mach. Learn. Res., 81, 1–15.

47. Benkler, Yochai, Robert Faris, Hal Roberts. (2018). Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics. Oxford, Oxford University Press.

48. May, Ashley. (2018, April 27). Took an Ancestry DNA Test? You Might Be a ‘Genetic Informant’ Unleashing Secrets about Your Relatives. USA Today. https://www.usatoday.com/story/tech/nation-now/2018/04/27/ancestry-genealogy-dna-test-privacygolden-state-killer/557263002/

49. Lamotte, Sandee. (2017, December 27). After 60 Years of Friendship, They Learned They’re Biological Brothers. CNN. https://www-m.cnn.com/2017/12/27/health/friends-brothers-dna-discovery-hawaii-trnd/index.html?r=https%3A%2F%2Fwww.google.com%2F

50. Crossland, Kiley. (2018, January 5). The Hidden Risks of At-home DNA Testing. World. https://world.wng.org/content/the_hidden_risks_of_at_home_dna_testing

51. Constine, Josh. (2015, April 28). Facebook Is Shutting Down Its API for Giving Your Friends’ Data to Apps. TechCrunch. https://techcrunch.com/2015/04/28/facebook-api-shut-down/

52. Lewis, Paul. (2018, March 20). ‘Utterly Horrifying’: ex-Facebook Insider Says Covert Data Harvesting Was Routine. The Guardian. https://www.theguardian.com/news/2018/mar/20/facebook-data-cambridge-analyticasandy-parakilas

53. Ben-Shahar, Omri, Anu Bradford. (2012). Efficient Enforcement in International Law. Chi. J. Int’l L., 12, 376–431.

54. Ben-Shahar, Omri, Kyle Logue. (2012). Outsourcing Regulation: How Insurance Reduces Moral Hazard. Mich. L. Rev., 111, 197–248.

55. Insurance Information Institute. (1999). HO3, Section I.E.6. Insurance Information Institute. https://www.iii.org/sites/default/files/docs/pdf/HO3_sample.pdf

56. Liberty Mutual Insurance. (2019). Identity Fraud Expense Coverage. Liberty Mutual Insurance. https://www.libertymutual.com/identity-theft-insurance

57. McAfee. (2017). Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection. McAfee Report. https://www.mcafee.com/us/resources/reports/rp-data-exfiltration.pdf

58. Center for Strategic and International Studies. (2014, June 5). Net Losses: Estimating the Global Cost of Cybercrime: Economic Impact of Cybercrime II. Intel Security. https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/attachments/140609_rp_economic_impact_cybercrime_report.pdf

59. Norton Security. (2012, September 5). 2012 Norton Cybercrime Report. Symantec. https://www.symantec.com/about/newsroom/press-releases/2012/symantec_0905_02

60. Kramer, Ann. (2019, July 24). Ransomware, Data Breaches Expose Gaps in Cyber Insurance Market. Bloomberg Law.

61. Bar-Gill, Oren, Omri Ben-Shahar, Florencia Marotta-Wurgler. (2017). Searching for the Common Law: The Quantitative Approach of the Restatement of Consumer Contracts. U. Chi. L. Rev., 84, 7–35.

62. Bode, Karl. (2016, March 17). AT&T Charges Steep Premium for Privacy, Calls it a ‘Discount’. DSL Reports. https://www.dslreports.com/shownews/ATT-Charges-Steep-Premium-for-Privacy-Calls-it-a-Discount-136511

63. Google. (2019). Google Privacy Checkup. Google. https://myaccount.google.com/privacycheckup

64. Nesheim, Malden C. et al. eds. (2015). A Framework for Assessing Effects of the Food System. Washington, DC: National Academic Press. https://www.ncbi.nlm.nih.gov/books/NBK305182/

65. Kohn, Jeff, Kelsey Kruger. (2016, November 17). Understand Pollution, Environmental Impacts from Food in 6 Charts. GreenBiz. https://www.greenbiz.com/article/understand-pollution-environmental-impactsfood-6-charts

66. Marotta-Wurgler, Florencia. (2016). Self-Regulation and Competition in Privacy Policies. J. Legal Stud., 45, S13–S39.

67. Froomkin, A. Michael. (2000). The Death of Privacy? Stan. L. Rev., 52, 1461–1543.

68. PrivacyGrade.org. (2014). Search Results for “facebook.” Carnegie Mellon University. http://privacygrade.org/apps/search?utf8=%E2%9C%93&q=facebook

69. Johnson, Dominic, Simon Levin. (2009). The Tragedy of Cognition: Psychological Biases and Environmental Inaction. Curr. Sci., 97, 1593–1603.

70. Adjerid, Idris et al. (2016). A Query-Theory Perspective of Privacy Decision Making. J. Legal Stud., 45, S97–S121.

71. Jensen, Carlos, Colin Potts. (2004). Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices. In Proceedings of the 2004 Conference on Human Factors in Computing Systems (pp. 471–478). Vienna, Austria, ACM Press.

72. Pan, Yue, George M. Zinkhan. (2006). Exploring the Impact of Online Privacy Disclosures on Consumer Trust. J. Retailing, 82, 331–338.

73. Ben-Shahar, Omri, Carl Schneider. (2014). More than You Wanted to Know: The Failure of Mandated Disclosure. Princeton, NJ, Princeton University Press.

74. McDonald, Alecia M., Lorrie Faith Cranor. (2008). The Cost of Reading Privacy Policies. I/S: J.L. & Pol’y for Info. Soc’y, 4, 540–565.

75. Radin, Margaret Jane. (2013). Boilerplate: The Fine Print, Vanishing Rights, and the Rule of Law. Princeton, NJ: Princeton University Press.

76. Willis, Lauren E. (2013). When Nudges Fail: Slippery Defaults. U. of Chi. L. Rev., 80, 1155–1229.

77. Ben-Shahar, Omri, Lior J. Strahilevitz. (2016). Contracting over Privacy. J. Legal Stud., 45, S1–S11.

78. Rosenberg, David. (1984). The Causal Connection in Mass Exposure Cases: A “Public Law” Vision of the Tort System. Harv. L. Rev., 97, 849–949.

79. Dewees, Donald N. et al. (1996). Exploring the Domain of Accident Law: Taking the Facts Seriously. Oxford, UK, Oxford University Press.

80. Esty, Daniel C. (2004). Environmental Protection in the Information Age. NYU L. Rev., 79, 115–211.

81. Koo, Jimmy H. (2017, December 12). Equifax Negligent in Data Breach, Community Banks Allege. Class Action Litigation Report, Bloomberg BNA. https://news.bloomberglaw.com/class-action/equifax-negligent-in-databreach-communitybanks-allege

82. Keats Citron, Danielle. (2007). Reservoirs of Danger: The Evolution of Public and Private Law at the Dawn of the Information Age. S. Cal L. Rev., 80, 241–297.

83. Viscusi, Kip. (2000). Foreword. In Richard L. Stroup and Roger E. Meineres, eds., Cutting Green Tape: Toxic Pollutants, Environmental Regulation, and the Law, ix. Piscataway & New Brunswick, NJ, Transaction Publishers.

84. Schroeder, Christopher H. (2002). Lost in the Translation: What Environmental Regulation Does That Tort Cannot Duplicate. Washburn L. J., 41, 583–606.

85. Lin, Albert C. (2005). Beyond Tort: Compensating Victims of Environmental Toxic Injury. S. Cal. L. Rev., 78, 1439–1528.

86. Shavell, Steven. (1987). Economic Analysis of Accident Law. Cambridge, MA, Harvard University Press.

87. Harrell, Erika, Lynn Langton. (2017). Victims of Identity Theft 2014. U.S Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. https://www.bjs.gov/content/pub/pdf/vit14.pdf

88. Brennan, Troyen A. (1988). Causal Chains and Statistical Links: The Role of Scientific Uncertainty in Hazardous-Substance Litigation. Cornell L. Rev., 73 , 469–533.

89. Solove, Daniel J., Danielle Keats Citron. (2018). Risk and Anxiety: A Theory of Data Breach Harms. Tex. L. Rev., 96, 737–786.

90. Silverman, David L. (2017). Developments in Data Security Breach Liability. Bus. L., 73, 215.

91. Gelpe, Marcia R., A. Dan Tarlock. (1974). The Uses of Scientific Information in Environmental Decisionmaking. S. Cal. L. Rev., 48, 371–427.

92. American Law Institute. (1991). Enterprise Responsibility for Personal Injury (pp. 319–321). Philadelphia, PA, American Law Institute.

93. Ben-Shahar, Omri, Ariel Porat. (2018). The Restoration Remedy in Private Law. Colum. L. Rev., 118, 1901–1952.

94. Solove, Daniel J., Paul Schwartz. (2017). Information Privacy Law (6th ed.). Philadelphia, PA, Wolters & Kluwer.

95. American Law Institute. (2010). Principles of the Law of Aggregate Litigation. Philadelphia, PA, American Law Institute.

96. Barnett, Kerry. (1987). Equitable Trusts: An Effective Remedy in Consumer Class Actions. Yale L. J., 96, 1591–1614.

97. Abraham, Kenneth S. (2002). The Relation Between Civil Liability and Environmental Regulation: An Analytical Overview. Washburn L. J., 41, 379–398.

98. Butler, Henry N., Jonathan R. Macey. (1996). Externalities and the Matching Principle: The Case for Reallocating Environmental Regulatory Authority. Yale L. & Pol’y Rev., 14, 23–66.

99. Lin, Albert C. (2012). Public Trust and Public Nuisance: Common Law Peas in a Pod. U.C.D. L. Rev., 45, 1075.

100. Sharkey, Catherine. (2003). Punitive Damages as Societal Damages. Yale L. J., 113 , 347–453.

101. Swanson, Elizabeth J., Elaine L. Hughes. (1990). The Price of Pollution: Environmental Litigation in Canada. Edmonton, Environmental Law Center.

102. Bradshaw, Karen. (2016). Settling for Natural Resource Damages. Harv. Env. L. Rev., 40, 211–253.

103. American Law Institute. (2019). Principles of the Law, Data Privacy: §§ 3–4. American Law Institute.

104. Ben-Shahar, Omri, Adam Chilton. (2016). Simplification of Privacy Disclosures: An Experimental Test. J. Legal Stud., 45, 42–67.

105. Barnhill, Allison Rosser. (1989). The Unraveling of California’s Proposition 65. Wake Forest L. Rev., 24, 367–408.

106. Barsa, Michael. (1997). California’s Proposition 65 and the Limits of Information Economics. Stan. L. Rev., 49, 1223–1247.

107. Bui, Linda T. (2005). Public Disclosure of Private Information as a Tool for Regulating Environmental Emissions: Firm-Level Responses by Petroleum Refineries to the Toxics Release Inventory. Center for Economic Studies, U.S. Census Bureau, Working Papers, 05–13.

108. Bae, Hyunhoe et al. (2010). Information Disclosure Policy: Do State Data Processing Efforts Help More than the Information Disclosure Itself? J. Pol’y Anal. Mgmt., 29, 163–182.

109. Federal Trade Commission. (2012, March). Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers. Federal Trade Commission. https://www.ftc.gov/sites/default/files/documents/reports/federaltrade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf

110. National Telecommunications and Information Administration. (2013). Short Form Notice Code of Conduct to Promote Transparency in Mobile App Practices. https://www.ntia.doc.gov/les/ntia/publications/july_25_code_draft.pdf

111. White House. (2012, February). Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy. White House. https://obamawhitehouse.archives.gov/sites/default/files/privacy-final.pdf

112. Robinson, Matt. (2018, April 25). Yahoo to Pay First SEC Penalty over Its Response to Massive Hack. Bloomberg BNA. https://news.bloomberglaw.com/tech-and-telecom-law/yahoo-to-pay-first-sec-penalty-over-its-response-to-massive-hack

113. John D. Graham, Jonathan Baert Weiner eds. (1997). Risk versus Risk: Tradeoffs in Protecting Health and the Environment. Cambridge, MA, Harvard University Press.

114. Schwartz, Paul M. (2013). The EU-US Privacy Collision. Harv. L. Rev., 126, 1966.

115. Revesz, Richard L., Michael A. Livermore. (2011). Rataking Rationality: How Cost-Benefit Analysis Can Better Protect the Environment and Our Health. Oxford, UK: Oxford University Press.

116. Jun, S-P, H.S Yoo, S. Choi. (2018). Ten Years of Research Change Using Google Trends: From the Perspective of Big Data Utilizations and Applications. Technol. Forecast. Soc. Change, 130, 69–87.

117. Ginsberg, Jeremy et al. (2009). Detecting Influenza Epidemics Using Search Engine Query Data. Nature, 457, 1012–1014.

118. Calo, Ryan. (2013). Consumer Subject Review Boards: A Thought Experiment. Stan. L. Rev., 66, 97–102.

119. Schneider, Carl E. (1998). The Practice of Autonomy: Patients, Doctors, and Medical Decisions. Oxford, UK, Oxford University Press.

120. Congressional Budget Office. (2001, June). Evaluation of Cap-and-Trade Programs for Reducing U.S. Carbon Emissions. Congressional Budget Office. https://www.cbo.gov/publication/13107

121. Stavins, Robert N. (2003). Experience with Market-Based Environmental Policy Instruments. In Karl-Göran Mäler and Jeffrey Vincent, eds., Handbook of Environmental Economics (pp. 355–435). Amsterdam, Netherlands, Elsevier Science.

122. Burtraw, Dallas, Sarah Jo Szambelan. (2009). U.S. Emissions Trading Markets for SO2 and NOx. Resources for the Future, Discussion Paper, 09–40.

123. Metcalf, Gilbert E., David Weisbach. (2009). The Design of a Carbon Tax. Harv. Envtl. L. Rev., 33, 499–556.

124. Mossoff, Adam. (2004). Spam–Oy, What a Nuisance! Berkeley Tech. L. J., 19, 625–666.

125. Zhang, Lily. (2005). The CAN-SPAM Act: An Insufficient Response to the Growing Spam Problem. Berkeley Tech. L. J., 20, 301–332.

126. Walmart. (2017, November). Walmart Privacy Policy. Walmart.com. https://corporate.walmart.com/privacy-security/walmart-privacy-policy

127. Environmental Protection Agency. (2017). The Social Cost of Carbon: Estimating the Benefits of Reducing Greenhouse Gas Emissions. Environmental Protection Agency. https://19january2017snapshot.epa.gov/climatechange/social-cost-carbon_.html.

128. Johnston, Jason Scott. (2016). The Social Cost of Carbon. Regulation, 39, 36–44.

129. Office of the New York State Attorney General. (2014, July 7). Information Exposed: Historical Examination of Data Breaches in New York State. New York State Attorney General. https://www.ag.ny.gov/pdfs/data_breach_report071414.pdf.

130. Department of Justice. (2015, September). Victims of Identity Theft, 2014, NCJ 248991. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. https://www.bjs.gov/content/pub/pdf/vit14.pdf

131. Ponemon Institute. (2017, June). Cost of Data Breach Study: Global Overview. Ponemon Institute. https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03130WWEN&

132. Juniper Research. (2017, March). Cybercrime Will Cost Businesses over $2 Trillion by 2019. Juniper Research: Press Releases. https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion

133. Identity Theft Research Center. (2017). 2017 Annual Data Breach Year-End Review. Identity Theft Research Center. https://www.idtheftcenter.org/images/breach/2017Breaches/2017AnnualDataBreachYearEndReview.pdf

134. Agelidis, Yasmine. (2016). Protecting the Good, the Bad, and the Ugly: Exposure Data Breaches and Suggestions for Coping with Them. Berkeley Tech. L. J., 31, 1057–1078.

135. Cheng, Long, Fang Liu, Danfeng (Daphne) Yao. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. WIREs: Data Mining and Knowledge Discovery, 7, 1–14.

136. Schwartz, Paul M., Edward J. Janger. (2006). Notification of Data Security Breaches. Mich. L. Rev., 105, 913–984.

137. Froomkin, A. Michael. (2009). Government Data Breaches. Berkeley Tech. L. J., 24, 1019–1059.

138. Romanovsky, Sasha et al. (2011). Do Data Breach Disclosure Laws Reduce Identity Theft? J. Pol’y Anal. & Management, 30, 256–286.

139. Ponemon Institute. (2014, April). The Aftermath of a Data Breach: Consumer Settlement. Ponemon Institute. https://www.ponemon.org/local/upload/file/Consumer%20Study%20on%20Aftermath%20of%20a%20Breach%20FINAL%202.pdf.

140. Kiernan, John. (2015, January 20). Fraud Liability Study: Which Cards Protect You Best? Wallethub. https://wallethub.com/edu/fraud-liabilitystudy/25726/

141. Pierce, Justin C. (2016). Shifting Data Breach Liability: A Congressional Approach. Wm. & Mary L Rev., 57, 975–1017.

142. LexisNexis. (2013, September). LexisNexis True Cost of Fraud Study: Merchants Struggle Against an Onslaught of High-Cost Identity Fraud and Online Fraud. LexisNexis. https://www.lexisnexis.com/risk/downloads/assets/true-cost-fraud-2013.pdf)

143. Harrell, Erika, Lynn Langton. (2013). Victims of Identity Theft 2012. U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. https://www.bjs.gov/content/pub/pdf/vit12.pdf

144. Pascual, Al et al. (2018, February 6). Identity Fraud: Fraud Enters a New Era of Complexity. Javelin Strategy. https://www.javelinstrategy.com/coverage-area/2018-identity-fraud-fraud-enters-new-era-complexity

145. Abraham, Kenneth S. (1986). Distributing Risk: Insurance, Legal Theory, and Public Policy. New Haven, Yale University Press.

146. Shavell, Steven. (1979). On Moral Hazard and Insurance. Q. J. Econ., 93, 541–562.

147. Shavell, Steven. (2000). On the Social Function and Regulation of Liability Insurance. Geneva Papers on Risk & Ins., 25, 166–179.

148. Talesh, Shauhin A. (2017). Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as “Compliance Managers” for Business. Law and Social Inquiry, 43, 417–440.

149. Kunzman, Steven A. (1985). The Insurer as Surrogate Regulator of the Hazardous Waste Industry: Solution or Perversion? Forum, 20, 469–488.

150. Richardson, Benjamin J. (2002). Mandating Environmental Liability Insurance. Duke Envtl. L. & Pol’y F., 12, 293–330.

151. Experian. (2017). Delivering Value in the Digital Age: Exploring UK Attitudes Towards Data. Experian. https://engage.experian.co.uk/delivering-value-in-the-digital-age/

152. Federal Trade Commission. (2013). Lost or Stolen Credit, ATM, and Debit Cards. Federal Trade Commission, Consumer Information. https://www.consumer.ftc.gov/articles/0213-lost-or-stolen-credit-atm-and-debit-cards#Limit

153. Rogers, Anna. (2015, October 21). Breast Implants: The Ticking Time Bomb in Millions of Women’s Bodies. Collective Evolution. https://www.collective-evolution.com/2015/10/21/breast-implants-the-ticking-time-bombin-millions-of-womens-bodies/

154. Turow, Joseph. (2008). The Federal Trade Commission and Consumer Privacy in the Coming Decade. J. L. &Pol’y for Info. Soc., 3, 723–749.

155. Weiss, N. Eric, Rena S. Miller. (2014). The Target and Other Financial Breaches: Frequently Asked Questions. Cong. Research Serv., R43496. https://fas.org/sgp/crs/misc/R43496.pdf

156. Wikipedia. (2019). Environmental Certification. Wikipedia. https://en.wikipedia.org/wiki/Environmental_certification

157. Zetter, Kim. (2009, March 9). Do Breach Notification Laws Work? Wired. https://www.wired.com/2009/03/experts-debate/

158. Ben-Shahar O. Data Pollution, Journal of Legal Analysis, 2019, Vol. 11, pp. 104–159.


Рецензия

Для цитирования:


Бен-Шахар О. Загрязнение информационной среды. Russian Journal of Economics and Law. 2022;16(1):136-175. https://doi.org/10.21202/2782-2923.2022.1.136-175. EDN: UUYIGL

For citation:


Ben-shahar O. Data Pollution. Russian Journal of Economics and Law. 2022;16(1):136-175. (In Russ.) https://doi.org/10.21202/2782-2923.2022.1.136-175. EDN: UUYIGL

Просмотров: 434


Creative Commons License
Контент доступен под лицензией Creative Commons Attribution-NonCommercial 4.0 International.


ISSN 2782-2923 (Print)