[1] Acquisti, Alessandro. (2008). Identity Management, Privacy, and Price Discrimination. IEEE Security & Privacy, 6(2).
[2] Acquisti, Alessandro. (2010). The economics of Personal Data and the Economics of Privacy, 51.
[3] Acquisti, Alessandro; Taylor, Curtis; & Wagman, Liad. (2016). The Economics of Privacy. Journal of Economic Literature, 54(2), 442-92.
[4] Acquisti, Alessandro; & Varian, Hal R. (2005). Conditioning Prices on Purchase History. Marketing Science, 24(3), 367-381.
[5] Aghababaii, Hossein. (2017). Privacy in The Islamic Criminal Law. Tehran: Islamic Research Institute for Culture and Thought. (in Persian)
[6] Akerlof, George A. (1978). The Market for “Lemons”: Quality Uncertainty and the Market Mechanism. In Uncertainty in Economics (pp. 235-251). Elsevier.
[7] Allen, Anita L. (1999). Privacy-as-Data Control: Conceptual, Practical, and Moral limits of the Paradigm. Conn. L. Rev., 32, 861.
[8] Ansari, Bagher. (2013). Privacy Law. Tehran: The Organization for Researching and Composing University Textbooks in the Humanities (Samt). (in Persian)
[9] Ansari, Bagher. (2017). Mass Communication Law. Tehran: The Organization for Researching and Composing University Textbooks in the Humanities (Samt). (in Persian)
[10] Arrow, Kenneth J. (1962). The Economic Implications of Learning by Doing. The Review of Economic Studies, 29(3), 155-173.
[11] Asadollahi, Simindokht. (2016). َAnalysis of Program Laws Legislation in Consumer Rights Protection. In Economic Law in Public Policy-Making (pp. 37-61). Tehran: Mizan. (in Persian)
[12] Badini, Hsan. (2004). The Philosophical Foundations of the Economic Attitude to Law. Journal of Faculty of Law and Political Science, 62(0), 91-135. (in Persian)
[13] Bergelson, Vera. (2003). It’s Personal but Is It Mine? Toward Property Rights in Personal Information. UC Davis Law Review, 37(379).
[14] Calo, Ryan. (2011). The Boundaries of Privacy Harm. Ind. LJ, 86, 1131.
[15] Calzolari, Giacomo; & Pavan, Alessandro. (2006). On the Optimality of Privacy in Sequential Contracting. Journal of Economic Theory, 130(1), 168-204.
[16] Camp, L Jean. (2007). Economics of Identity Theft: Avoidance, Causes and Possible Cures. Springer Science & Business Media.
[17] Camp, L Jean; & Wolfram, Catherine. (2004). Pricing Security. In Economics of Information Security (pp. 17-34). Springer.
[18] Choi, Jay Pil; Jeon, Doh-Shin; & Kim, Byung-Cheol. (2018). Privacy and Personal Data Collection with Information Externalities.
[19] Click path. (2019, March 22). In Wikipedia.
[20] Cooter, Robert; & Ulen, Thomas. (2010). Law and Economics. (Y. Dadgar & H. Akhavan, trans.). Tehran: Tarbiat Modares University Press.
[21] Deighton, John A; & Blattberg, Robert C. (1991). Interactive Marketing: Exploiting the Age of Addressability. Sloan Management Review, 33(1), 5-14.
[22] Dixon, Huw. (2001). Surfing economics.
[23] Fairfield, Joshua AT; & Engel, Christoph. (2015). Privacy as a Public Good. Duke LJ, 65, 385.
[24] Gellman, Robert. (2002). Privacy, Consumers, and Costs-How the Lack of Privacy Costs Consumers and why Business Studies of Privacy Costs Are Biased and Incomplete. Presented at the Digital Media Forum, Ford Foundation.
[25] Ghasemi Hamed, Abbas. (2012). Harm the Consumer in Competitive market. Legal Research, 15(148), 97-124. (in Persian)
[26] Goldfarb, Avi; & Tucker, Catherine E. (2011). Privacy Regulation and Online Advertising. Management Science, 57(1), 57-71.
[27] Grossman, Sanford J. (1981). The Informational Role of Warranties and Private Disclosure about Product Quality. The Journal of Law and Economics, 24(3), 461-483.
[28] Hann, Il-Horn; Hui, Kai Lung; Lee, TSY; & Png, IPL. (2003). Direct Marketing: Privacy and Competition. Presented at the Workshop on Information Systems and Economics (WISE), Seattle, Washington, USA.
[29] Hayek, F. A. (2010). The Use of Knowledge in Society. (M. Ranjbar & M. kazemi, trans.), World Economy Newspaper.
[30] Hermalin, Benjamin E; & Katz, Michael L. (2006). Privacy, Property Rights and Efficiency: The Economics of Privacy as Secrecy. Quantitative Marketing and Economics, 4(3), 209-239.
[31] Hirshleifer, Jack. (1980). Privacy: Its Origin, Function, and Future. The Journal of Legal Studies, 9(4), 649-664.
[32] Hoofnagle, C. (2007). Security Breach Notification Laws: Views from Chief Security Officers.
[33] Hoseyni, Seyedeh Fatemeh; & Safari Gerayli, Mehdi. (2018). Internet Disclosure of Financial Information and Firm Value: An Empirical Test of Signaling Theory. Journal Management System, 7, 1-9. (in Persian)
[34] Jalali, Omolbanin; & Nasrollahi, Zahra. (2019). Influence of Social Capital on the Incentive Reversal: Behavioral Economics Approach Based on Game Theory. Quarterly Journal of Economic Growth and Development Research, 9, 131-146. (in Persian)
[35] Jentzsch, N. (2007). Financial Privacy: An International Comparison of Credit Reporting Systems. Springer Berlin Heidelberg.
[36] Knight, Frank H. (1921). Risk, Uncertainty and Profit. New York: Hart, Schaffner and Marx.
[37] Krasnikov, Alexander; Jayachandran, Satish; & Kumar, V. (2009). The Impact of Customer Relationship Management Implementation on Cost and Profit Efficiencies: Evidence from the US Commercial Banking Industry. Journal of marketing, 73(6), 61-76.
[38] Liptak, Adam. (2010). When American and European Ideas of Privacy Collide. New York Times.
[39] Mahdavi, Ghadir; & Rajaei, Malihe. (2016). The Precautions Effect on the Market, 31(3), 25-44. (in Persian)
[40] Murphy, Richard S. (1995). Property rights in Personal Information: An Economic Defense of Privacy. Geo. LJ, 84, 2381.
[41] Mydland, Ørjan. (2019). Lost Economies of Scope and Potential Merger Gains in the Norwegian Electricity Industry. Empirical Economics, 1-24.
[42] N. A. Al-Sayid; & D. Aldlaeen. (2013). Database Security Threats: A Survey Study. In 2013 5th International Conference on Computer Science and Information Technology (pp. 60-64). https://doi.org/10.1109/CSIT.2013.6588759
[43] Naeemi, Seyyed Morteza; & Rasekh, Mohammad. (2012). Concept of “Economic Man” in Economic Approach to Law: An Explanation and a Critique. Encyclopedia of Economic right, 19(2), 134-168. (in Persian)
[44] Niknia, Masoumeh. (2016). Linked Data and User Interaction: The Road Ahead. Information & Communication Quarterly Book Review, 3(9), 181-192. (in Persian)
[45] Noam, Eli M. (1997a). Privacy and Self-regulation: Markets for Electronic Privacy. Privacy and Self-Regulation in the Information Age, 21-33.
[46] Noam, Eli M. (1997b). Privacy and Self-regulation: Markets for Electronic Privacy. Privacy and Self-Regulation in the Information Age, 21-33.
[47] Odlyzko, Andrew. (2003). Privacy, Economics, and Price Discrimination on the Internet (pp. 355-366). Presented at the Proceedings of the 5th international conference on Electronic commerce, ACM.
[48] Ostovar, majid. (2009). Influence of Hayek’s Idea on Political Ideologies of Right and Left. The Journal of Policy, 38(4), 77-97. (in Persian)
[49] Posner, Richard A. (1977). The Right of Privacy. Ga. L. Rev., 12, 393.
[50] Posner, Richard A. (1981). The Economics of Privacy. The American Economic Review, 71(2), 405-409.
[51] Price, Kristen. (2017). What to Do in Data Breach; A Survey into the US Government’s Recommendation to Respond to Information Flaw. (N. Moshref Javadi, tran.), Peivast Monthly Magazine, (48), 94-95.
[52] Raso, Jennifer. (2016). Accessible Information and Constitutional Democracy: Who Counts. Const. F., 25, 67.
[53] Reinartz, Werner. (2002). Customizing Prices in Online Markets. Symphonya. Emerging Issues in Management, (1), 55-65.
[54] Romanosky, Sasha; & Acquisti, Alessandro. (2009). Privacy Costs and Personal Data Protection: Economic and legal perspectives. Berkeley Tech. LJ, 24, 1061.
[55] Rubin, Paul H; & Lenard, Thomas M. (2002). Privacy and the Commercial Use of Personal Information. Springer Science & Business Media.
[56] Safaei, Seyed Hossein; & Hasani Sangani, Vahid. (2016). Competitive Analysis of Discriminative Pricing and Intellectual Property Rights, 12(2), 171-203. (in Persian)
[57] Safai, Sayyed Hossein. (2015). The Relationship of Law and Economics. Retrieved June 20, 2019, from http://www.ias.ac.ir/index.php/2016-04-19-10-01-24/327-2016-04-20-08-54-23(in Persian)
[58] Salehi, mojtaba; & Khanmohammadi, Mohammad Hamed. (2018). Evaluating Economies of Scale of Country Banks With Use of Conceptual Constraints Concepts. Financial Knowledge of Securities Analysis, 11. (in Persian)
[59] Samuelson, Pamela. (2000). Privacy as Intellectual Property? Stanford Law Review, 1125-1173.
[60] Samuelson, Pamela. (2003). The Social Costs of Incoherent Privacy Policies. Presentation at IBM Almaden Privacy Institute.
[61] Schoeman, Ferdinand David. (1992). Privacy and Social Freedom. Cambridge university press.
[62] Schwartz, Paul M. (1999). Internet Privacy and the State. Conn. L. Rev., 32, 815.
[63] Schwartz, Paul M. (2004). Property, Privacy, and Personal Data. Harvard Law Review, 2056-2128.
[64] Sharifzadeh, Mohammad Javad. (2012). Law and Economics in Islam An Introduction to Economics Analysis of Islamic Legal Institutions(With Special Focus on the History of Early Days of Islam). Tehran: Imam Sadiq University Publisher. (in Persian)
[65] Sharman, Jason C. (2009). Privacy as Roguery: Personal Financial Information in an Age of Transparency. Public Administration, 87(4), 717-731.
[66] Shokuhyan, Seyed Alireza; & Edrisian, Mojtaba (trans.). (2017). “Tort Law and Economics” The First Part: The Efficient Tort Rules. Tehran: Judiciary Press and Publishing Center. (in Persian)
[67] Spence, Michael. (1978). Job Market Signaling. In Uncertainty in Economics (pp. 281-306). Elsevier.
[68] Staten, Michael E; & Cate, Fred H. (2002). The Impact of Opt-in Privacy Rules on Retail Credit Markets: A Case Study of MBNA. Duke LJ, 52, 745.
[69] Stigler, George J. (1961). The Economics of Information. Journal of Political Economy, 69(3), 213-225.
[70] Stigler, George J. (1980). An Introduction to Privacy in Economics and Politics. The Journal of Legal Studies, 9(4), 623-644.
[71] Stone, Eugene F; & Stone, Dianna L. (1990). Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms. Research in Personnel and Human Resources Management, 8(3), 349-411.
[72] Swire, Peter P; & Litan, Robert E. (1998). None of Your business: world data flows, electronic commerce, and the European privacy directive. Brookings Inst Pr.
[73] Swire, Peter P; Litan, Robert E; & Litan, Robert E. (1998). None of Your Business: World Data Flows, Electronic Commerce, and the European Privacy Directive (Vol. 196). Brookings Institution Press Washington, DC.
[74] Taherkhani, Setare. (2011). An Introduction to Game Theory. Journal of Foreign Policy, 25(1), 219-242. (in Persian)
[75] Taylor, Curtis R. (2004). Consumer Privacy and The Market for Customer Information. RAND Journal of Economics, 631-650.
[76] Tor (anonymity network). (2019, June 17). In Wikipedia.
[77] Tsai, Janice Y; Egelman, Serge; Cranor, Lorrie; & Acquisti, Alessandro. (2011). The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research, 22(2), 254-268.
[78] Varian, Hal R. (2009). Economic Aspects of Personal Privacy. In Internet Policy and Economics (pp. 101-109). Springer.
[79] Vesali Naseh; & Parsapour. (2016). Liability Resulting from Fright (A Comparative Study of Imamieh Jurisprudence, Iran Law and Common Law). Journal OF Comparative Law Research, 20(2), 147-169. (in Persian)
[80] Warren, Samuel D; & Brandeis, Louis D. (1890). The Right to Privacy. Harvard Law Review, 193-220.
[81] Westin, Alan F. (1968). Privacy and Freedom. Washington and Lee Law Review, 25(1), 166.
[82] Zarei, Mohammad Hossein; & Shokuhyan, Seyed Alireza. (2016). The Role of Private Entities in Market Regulation; With a Critical Approach to the Planning Rule. In Economic Law in Public Policy-Making. Mizan.(in Persian)
[83] 10 Mistakes That Will Ruin Your Credit Score. (2018, June 19). Retrieved May 15, 2019, from https://smartasset.com/credit-score/10-mistakes-that-will-ruin-credit-score