Refine your search
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Dalvi, Manoj
- Estimating Term Structure Changes Using Principal Component Analysis in Indian Sovereign Bond Market
Abstract Views :313 |
PDF Views:4
Authors
Affiliations
1 Clearing Corporation of India., IN
2 Long Island University, New York.
1 Clearing Corporation of India., IN
2 Long Island University, New York.
Source
International Journal of Banking, Risk and Insurance, Vol 1, No 1 (2013), Pagination: 1-5Abstract
This paper analyses the Indian sovereign yield curve shift from January 1997 to May 2012 to find out the principal factors affecting the term structure of interest rate changes. We apply Principal Component Analysis (PCA) on our data consisting of zero coupon interest rates derived from government bond trading using Nelson-Siegel functional form. This decomposition of the yield curve highlights important relationship between identified factors and metrics of the term structure shape. The empirical findings support statistical similarities between the Indian yield curve and term structure studies of major countries.Keywords
Indian Sovereign Yield Curve, Principal Component, Interest Rates, Bond, Yield Curve, Macro-economics, And Term Structure of Interest RatesReferences
- Adrian, T., & Wu, H. (2009). The Term Structure of Infl ation Expectations, Working Paper. Federal Reserve Bank of New York.
- Ang, A., Boivin, J., Dong, S., & Loo-Kung, R. (2010). Monetary Policy Shifts and the Term Structure. Review of Economic Studies, Forthcoming.
- Buraschi, A., Cieslak, A. & Trojani, F. (2010). Correlation Risk and the Term Structureof Interest Rates, Working Paper. University of Lugano.
- Campbell, J. Y., Sunderam, A., & Viceira, L. M. (2011). Infl ation Bets or Defl ation Hedges? The Changing Risk of Nominal Bonds, Working Paper. Harvard Business School.
- Chan, K. C., Karolyi, G. A., Longstaff, F. A., & Sanders, A. B. (1992). An Empirical Comparison of Alternative Models of the Short-Term Interest Rate. Journal of Finance, 47(3), pp. 1209-1227.
- Cieslak, A., & Povala, P. (2011). Understanding Bond Risk Premia, Working Paper. Northwestern University and University of Lugano.
- Cox, J. C., Ingersoll, J. E., & Ross, S. A. (1985). A Theory of the Term Structure of Interest Rates. Econometrica, 53(2), pp. 373-384.
- Dai, Q. and Singleton, K. J. (2000), Specifi cation Analysis of Affi ne Term Structure Models. The Journal of Finance, 55(5), pp. 1943–1978.
- Fleming, M. J. (1997). The Round-the-Clock Market for U.S. Treasury Securities. FRBNY Economic Policy Review.
- Fontaine, J. S., & Garcia, R. (2011). Bond Liquidity Premia. Review of Financial Studies. Forthcoming.
- Haubrich, J., Pennacchi, G., & Ritchken, P. (2011). Estimating Real and Nominal Term Structures using Treasury Yields, Infl ation, Infl ation Forecasts, and Infl ation Swap Rates, Working Paper. Federal Reserve Bank of Cleveland.
- Hautsch, N., & Ou, Y. (2008). Yield Curve Factors, Term Structure Volatility, and Bond Risk Premia, Working Paper. Humboldt University of Berlin.
- Hu, X., Pan, J., & Wang, J. (2011). Noise as Information for Illiquidity, Working Paper. MIT Sloan School of Management.
- Jones, C. M., Lamont, O., & Lumsdaine, R. L. (1998). Macroeconomic News and Bond Market Volatility. Journal of Financial Economics, 47(3), pp. 315-337.
- Kim, D. H., & Singleton, K. J. (2011). Term Structure Models and the Zero Bound: An Empirical Investigation of Japanese Yields, Working Paper. Yonsei University and Stanford University.
- Litterman, R., & Scheinkman, J. (1991). Common Factors Affecting Bond Returns. Journal of Fixed Income, Vol. 1(1), pp. 54-61.
- Morgan, J. P. (2011). The Domino Effect of a US Treasury Technical Default, US Fixed Income Strategy.
- Maitland, A. J. (2002). Interpolating the South African Yield Curve using Principal-Component Analysis: A Descriptive Approach. South African Actuarial Journal, 2, pp. 129-45.
- Mishkin, F. (2006). The Economics of Money, Banking and Financial Markets. Addison-Wesley.
- Nath, G. C., Gaurav, Y., & Wagle, A. (2006). Estimating a Reliable Benchmark Sovereign Yield Curve in an Emerging Bond Market (CCIL).
- Nelson, C. R. & Siegel, A. F. (1987). Parsimonious Modeling of Yield Curves. Journal of Business, 60(4), pp. 473-489.
- Phoa, W. (1997). Can You Derive Market Volatility Forecast from the Observed Yield Curve Convexity Bias? Journal of Fixed Income, 7(1), pp. 43-53.
- Price, K. V., Storn, R. M., & Lampinen, J. A. (2005). Differential Evolution: A Practical Approach to Global Optimization. Berlin: Springer.
- Competition and Consumer Privacy in the Cyberspace Market
Abstract Views :81 |
PDF Views:26
Authors
Affiliations
1 Fisher Broyles LLP, 445 Park Avenue, Ninth floor, New York -10022, US
2 Long Island University, CW Post Campus, 720 Northern Blvd, Greenvale, New York - 11548, US
1 Fisher Broyles LLP, 445 Park Avenue, Ninth floor, New York -10022, US
2 Long Island University, CW Post Campus, 720 Northern Blvd, Greenvale, New York - 11548, US
Source
Journal of Intellectual Property Rights, Vol 23, No 2-3 (2018), Pagination: 70-85Abstract
This paper will examine legal and marketing implications of certain Internet technological developments impacting competition and consumer protection in cyberspace. The paper will explore to what extent antitrust and consumer protection laws are adequate to deal with the challenges to a competitive marketplace and consumer privacy posed by the development of cyberspace technologies and markets, for example, Internet search engines, social networks and wearable devices. The paper concludes that legal tools for protecting a competitive cyberspace marketplace are fairly robust, while the legal tools to protect consumers from being tracked and profiled by marketers and from the potential intrusions of individual privacy made possible by even more advanced Internet connected sensor and related data-based technologies are still a work in progress. At the same time, the extent of further government regulation in this area must be carefully balanced so as not to unduly restrict data dependent innovation.Keywords
Consumer Privacy, Cyber Security, Economics, Exclusivity, Social Media Networking, Google, Facebook, Apple, Internet Usage,header Should Be Klie EU Commission, Public Policymakers, Digital Marketing, Consumer Privacy Protection, Competition Commission of India, U.S. Antitrust Law, United States Federal Trade Commission.References
- Rao P M & Klein J A, Strategies for high-tech firms: Marketing, economic, and legal issues, ME Sharpe, 2013, 138.
- Demographic (Population) numbers in the site are based on data from the United Nations - Population Division. Internet usage information comes from data published by Nielsen Online, by ITU, the International Telecommunications Union, by GfK, by local ICT Regulators and other reliable sources, http://www.internetworldstats.com/stats.htm.
- Smith I G (Ed.), The Internet of Things 2012 New Horizons (3rd ed.), 2012, http://www.internet-of-thingsresearch.eu/pdf/IERC_Cluster_Book_2012_WEB.pdf.
- Pretz K, The Next Evolution of the Internet, January 2013, http://theinstitute.ieee.org/technology-focus/technology-topic/the-next-evolution-of-the-internet.
- Blum P & Goff B, 'Internet Of Things' 101: Legal Concerns Law360, 14 April 2014.
- https://www.credit-suisse.com/ch/en/news-and-expertise/news/economy/sectors-and-companies.article.html/article/pwp/newsandexpertise/2013/07/en/the-future-of-wearable-technology.html.
- http://www.lawtechnologynews.com/id=1202652930046/The-Internet-of-Things-A-Legal-and-Professional-Minefield?slreturn=20140910144102.
- Rose A, The Internet of Things has arrived — And so have massive security issues, WIRED, 9 January 2013, http://www.wired.com/2013/01/securing-the-internet-ofthings/.
- Think about a residential thermostat that can be adjusted via a smartphone and authenticated web service, or that may self-adjust based on its awareness of the homeowner’s location (e.g., switching on the heating/cooling as it detects the owner nearing home), Rose A, The Internet of Things has arrived — And so have massive security issues, WIRED, 9 January 2013, http://www.wired.com/2013/01/securingtheinternet-of-things/.
- Think about drug dispensers that can issue medication in response to sensing conditions in the human body through a set of apps, sensors, and other monitoring/feedback tools. Rose A, The Internet of Things has arrived — And so have massive security issues, WIRED, 9 January 2013, http://www.wired.com/2013/01/securing-the-internet-of-things/.
- The Apple Watch is a current example of IoT, in the form of a wearable device. Wearables, like the Apple Watch, can track information about a person (via skin contact), the location (GPS), the activity, and an individuals’ vital signs.
- Fewer than 10,000 households can generate 150 million discrete points of data a day FTC, Internet of Things Workshop, 2013, 89.
- For example, health or life insurance companies can use data from fitness trackers for health or life insurance rates.
- A connected device can be used by manufactures (or hackers) to eavesdrop on the television show being watched; or the temperature at which the thermostat is set.
- Jeffrey Rohlfs, A theory of inter-dependent demand for a communications service, Bell Journal of Economics, 5 (1974) 16; and Bandwagon effects in high-technology industries, The MIT Press, Cambridge: MA, 2003.
- Windows is valuable because most other software is made for Windows, which increases sales of Windows; which, in turn, increases the apps that are developed for Windows.
- Matsushita v Zenith Ratio Corp. 475 U.S. 574 (1986).
- Sherman Act, 15 U.S. Code § 2.
- United States v Grinnell Corp., 384 U. S. 563, 570-571 (1966). The offense of monopoly under § 2 of the Sherman Act has two elements: (1) the possession of monopoly power in the relevant market and (2) the willful acquisition or maintenance of that power as distinguished from growth or development as a consequence of a superior product, business acumen, or historic accident.
- Galindo, Blanca Rodriguez 2007, Prohibition of the Abuse of a Dominant Position (The International Symposium on Anti Monopoly Enforcement); Communication from the Commission-Guidance on the Commission's Enforcement Priorities in Applying Article 82 of the EC Treaty to Abusive Exclusionary Conduct by Dominant Undertakings, 2009 O.J. (C 45) 7, 8.
- http://www.cci.gov.in/sites/default/files/03201127.pdf, 39.
- ‘Tying’ usually refers to situations where customers that purchase one product (the tying product) are required also to purchase another product from the producer (the tied product). ‘Bundling’ usually refers to the way products are offered and priced by the firm. In the case of pure bundling the products are only sold jointly in fixed proportions.” Galindo, Blanca Rodriguez 2007, Prohibition of the Abuse of a Dominant Position (The International Symposium on Anti Monopoly Enforcement); Communication from the Commission-Guidance on the Commission's Enforcement Priorities in Applying Article 82 of the EC Treaty to Abusive Exclusionary Conduct by Dominant Undertakings, 2009 O.J. (C 45) 7, 8.
- On the other hand, however, despite this advantage MYSpace succumbed to competition from Facebook. The Yahoo search platforms of the 1990’s were outmatched by the search algorithms of Google of the 2000’s.
- http://europa.eu/rapid/press-release_MEMO-17-1785_en.htm.
- Google is dominant in each national market for general internet search throughout the European Economic Area (EEA), that is, in all 31 EEA countries. Google was dominant in each country since 2008, except in the Czech Republic where the Decision found Google to have been dominant since 2011. Since 2008 Google's search engine held very high market shares in all EEA countries, exceeding 90% in most. http://www.statista.com/statistics/267161/market-share-ofsearchengines-in-the-united-states/
- Waller S W, Antitrust and social networking, NCL Review, 90 (2012) 1771, https://pdfs.semanticscholar.org/406e/667efbd38ff30227dbc1a5bf9f23ea12ad6a.pdf.
- The antitrust leveraging doctrine is relevant to potential manipulation of Google’s dominant market power in general search to favor its own ads. Rule of Reason analysis would determine the extent of the problem in particular circumstances, but we should not underestimate customer inertia in moving from relatively easy-to-use and well branded Google general search to less content-rich, less wellknown specialized search engines.
- http://europa.eu/rapid/press-release_SPEECH-12372_en.htm?locale=en.
- http://europa.eu/rapid/press-release_IP-14-116_en.htm.
- http://europa.eu/rapid/press-release_IP-15-4780_en.htm.
- http://ec.europa.eu/competition/antitrust/cases/dec_docs/397 40/39740_14009_3.pdf.
- http://europa.eu/rapid/press-release_IP-17-1784_en.htm.
- http://www.comscore.com/Insights/Market-Rankings/comScore -Releases-April-2014-US-Search-Engine-Rankings.
- https://www.comscore.com/Insights/Rankings/comScoreReleases-February-2016-US-Desktop-Search-EngineRankings
- According to the FTC closing statement on the Google case. “As is well known, when a user types a word or words into a Google search box, Google, guided by proprietary algorithms, searches its index of the Internet and assembles a ranked listing of relevant websites, known as “organic” search results. These organic results – together with advertising, links to Google products, and other information judged to be relevant to the user’s query – are returned to the user as the Google search results page. Google is a “horizontal,” or general purpose, search engine because it seeks to cover the Internet as completely as possible, delivering a comprehensive list of results to any query. General purpose search engines are distinct from “vertical” search engines, which focus on narrowly defined categories of content such as shopping or travel. Although vertical search engines are not wholesale substitutes for general purpose search engines, they present consumers with an alternative to Google for specific categories of searches. Some vertical websites alleged that Google unfairly promoted its own vertical properties through changes in its search results page, such as the introduction of the “Universal Search” box, which prominently displayed Google vertical search results in response to certain types of queries, including shopping and local. Prominent display of Google’s proprietary content had the collateral effect of pushing the “ten blue links” of organic search results that Google had traditionally displayed farther down the search results page. Complainants also charged that Google manipulated its search algorithms in order to demote vertical websites that competed against Google’s own vertical properties.” https://www.ftc.gov/system/files/documents/public_statements/295971/130103Googlesearchstmtofcomm.pdf.
- http://www.ftc.gov/news-events/press-releases/2013/01/Google-agrees-change-its-business-practices-resolve-ftc.
- Geoffrey A M & William R, Harvard Journal of Law & Technology Occasional Paper Series — July 2013.
- http://cuts-international.org/pdf/Second_Preliminary_ Information_report_by-CUTS.pdf.
- http://www.cci.gov.in/sites/default/files/07302012_0.pdf.
- http://www.cci.gov.in/sites/default/files/07302012_0.pdf, Page 3.
- http://www.livemint.com/Companies/5D4c8f9kKB41IyL99R fm4H/Why-did-CCI-write-Google-a-bad-report-card.html (The original report of the Director General could not be found on the website of the CCI).
- The commission itself will then take its own independent view of the reports filed by the Director General. It can overrule these findings.
- Section 4 of the Competition Act of 2002:
- Abuse of dominant position.—
- (1) No enterprise shall abuse its dominant position.
- (2) There shall be an abuse of dominant position under subsection (1), if an enterprise,—
- (a) directly or indirectly, imposes unfair or discriminatory—
- (i) condition in purchase or sale of goods or services; or
- (ii) price in purchase or sale (including predatory price) of goods or service; or Explanation—For the purposes of this clause, the unfair or discriminatory condition in purchase or sale of goods or services referred to in sub-clause (i) and unfair or discriminatory price in purchase or sale of goods (including predatory price) or service referred to in sub clause (ii) shall not include such discriminatory conditions or prices which may be adopted to meet the competition; or
- (b) limits or restricts—
- (i) production of goods or provision of services or market therefor; or
- (ii) technical or scientific development relating to goods or services to the prejudice of consumers; or
- (c) indulges in practice or practices resulting in denial of market access; or
- (d) makes conclusion of contracts subject to acceptance by other parties of supplementary obligations which, by their nature or according to commercial usage, have no connection with the subject of such contracts; or
- (e) uses its dominant position in one relevant market to enter into, or protect, other relevant market.
- Explanation —For the purposes of this section, the expression—
- (a) “dominant position” means a position of strength, enjoyed by an enterprise, in the relevant market, in India, which enables it to—
- (i) operate independently of competitive forces prevailing in the relevant market; or
- (ii) affect its competitors or consumers or the relevant market in its favour;
- (b) “predatory price” means the sale of goods or provision of services, at a price which is below the cost, as may be determined by regulations, of production of the goods or provision of services, with a view to reduce competition or eliminate the competitors.
- Section 27b of the Competition Act of India, 2002: “impose such penalty, as it may deem fit which shall be not more than ten percent. of the average of the turnover for the last three preceding financial years, upon each of such person or enterprises which are parties to such agreements or abuse”
- Section 28 of the Competition Act of India, 2002.
- http://www.cci.gov.in/sites/default/files/07%20%26%20%20 30%20of%202012.pdf.
- Boyd D & Ellison N, Social network sites: Definition, history and scholarship, Journal of Computer Mediated Communication, http://onlinelibrary.wiley.com/doi/10.1111/j.1083-6101.2007.00393.x/full.
- http://techcrunch.com/2011/06/28/sean-parker-on-whymyspacelost-to-Facebook/.
- Active users are those which have logged in to Facebook during the last 30 days. http://www.statista.com/statistics/264810/number-of-monthly-active-Facebook-users-worldwide/.
- http://www.prnewswire.com/news-releases/Facebookreportsthird-quarter-2013-results-229923821.html
- Facebook measures "monthly active users" as users that have logged in during the past 30 days. The site defines a mobile MAU as a user who accessed Facebook via a mobile app or via mobile-optimized versions of the website such as m.Facebook.com, whether on a mobile phone or tablet such as the iPad, during the period of measurement. http://www.statista.com/statistics/277958/number-of-mobileactiveFacebook-users-worldwide/.
- https://www.emarketer.com/Article/Google-FacebookIncrease-Their-Grip-on-Digital-Ad-Market/1015417.
- http://files.shareholder.com/downloads/AMDA-NJ5DZ/ 3517992167x0x770575/481ba943-c7b2-4336-9d70-6453934517db/FB_News_2014_7_23_Financial_Releases.pdf.
- http://www.statista.com/statistics/193538/market-share-ofnetus-digital-ad-revenues-of-Facebook/
- Network effects block only frontal competition, but not lateral competition. Lateral competition means that in order to be successful, a company should not go head-to-head with the leaders in the industry, but rather find niches alongside them.
- “If the costs of adapting are negligible, and there are no other entry barriers, the market will be perfectly competitive”, Michael L Katz & Carl Shapiro, Network externalities, competition, and compatibility, American Economic Review, 75 (1985) 424, 426-27.
- Grassley C, Prepared Statement by Senator Chuck Grassley of Iowa Chairman, Senate Judiciary Committee Joint hearing of the Senate Judiciary Committee and Senate Commerce Committee Facebook, Social Media Privacy, and the Use and Abuse of Data, 10 April 2018, https://www.judiciary.senate.gov/imo/media/doc/04-10-18%20Grassley%20Statement.pdf.
- Jamie D, Carole C & Alice G, Watchdog to launch inquiry into misuse of data in politics, The Guardian, 4 March 2017, http://davelevy.info/Downloads/watchdogdatapolitics_thegua rdian_20170304.pdf.
- Frank P, Beyond innovation and competition: The need for qualified transparency in internet intermediaries, North Western University Law Review, (2010) 104,105, 153.
- Facebook’s terms state “You will not collect users’ content or information, or otherwise access Facebook, using auto-mated means (such as harvesting bots, robots, spiders, or scrapers) without our permission.” https://www.Facebook.com/terms.
- The Case of Facebook and Cambridge Analytica
- a. Cambridge Analytica a data firm hired by the Trump 2016 Presidential Campaign gained access to private information of 50 million Facebook users. These included details on user identities; friend networks and user “likes”. Facebook’s position was that what Cambridge Analytica did was not a “data breach”, because of the consent given by its users when a Facebook account is opened. But Cambridge Analytica acknowledged that it had acquired the data through a third party violating Facebook’s rules prohibiting third parties of copying and transferring data.
- Engels B, Data portability among online platforms, Internet Policy Review, 5 (2) (June 2016), https://policyreview.info/articles/analysis/data-portabilityamongonline-platforms.
- For the EU policy on data portability “Guidelines on the right to data portability” 16/EN WP 242 rev.01; Adopted on 13 December 2016; last revised and adopted on 5 April 2017.
- Pawade A S, Warad N S, Supriya R K , Swapnil S S & Sagar S H, Impact of WhatsApp on Facebook, International Journal of Engineering Sciences & Research, May 2014 http://www.ijesrt.com.
- Altaweel I, Good N & Hoofnagle C J, Web privacy census, Technology Science, (2015) 121, 502, Online.
- Third-party tracking refers to tracking done by websites that a user never navigates to explicitly. Many Internet users are vaguely aware that their information may be collected online.
- Libert T, Exposing the hidden web: An analysis of third-party HTTP requests on 1 million websites, International Journal of Communication, October, 2015, SSRN: https://ssrn.com/abstract=2685330.
- Rao P M & Klein J A, Strategies for high-tech firms: Marketing, economic, and legal issues, ME Sharpe, 2013, 189.
- Altman M, Wood A, O’Brien D R & Gasser U, Practical approaches to big data privacy over time, International Data Privacy Law, 12 March 2018, doi:10.1093/idpl/ipx027.
- http://www.etsi.org/images/files/ECDirectives/2009_136.pdf.
- Borgesius Z, Frederik, Kruikemeier, Sanne, Boerman, Sophie, Helberger & Natali, Tracking walls, take-it-or-leaveit choices, the GDPR, and the ePrivacy Regulation, European Data Protection Law Review, 3 (3) (2018) 353368, SSRN: https://ssrn.com/abstract=3141290.
- http://ec.europa.eu/justice/news/consulting_public/0006/contributions/organisations/beuc_en.pdf.
- https://www.datenschutz-hamburg.de/fileadmin/user_upload/documents/PressRelease_2014-09-30_Google_Administrative-Order.pdf.
- https://www.law360.com/articles/501442?scroll=1.
- https://www.law360.com/articles/822967/Google-meetsitalys-demands-on-data-use-practices.
- http://ec.europa.eu/justice/dataprotection/files/factsheets/factsheet_data_protection_en.pdf.
- https://edps.europa.eu/sites/edp/files/publication/16-1020_pims_opinion_en.pdf.
- https://ec.europa.eu/info/law/law-topic/data-protection_en.
- http://www.dataguidance.com/dataguidance_privacy_this_w eek.asp?id=2670.
- http://www.zdnet.com/companies-brace-for-brazil-localdatastorage-requirements-7000027092/.
- http://www.consumerreports.org/cro/news/2014/05/mostconsumersoppose-internet-ad-tracking/index.htm.
- Federal Trade Commission, 2012.
- Rao P M & Klein J A, Strategies for high-tech firms: Marketing, economic, and legal issues, ME Sharpe, 2013, 138.
- Evans D, The internet of things how the next evolution of the internet is changing everything, Cisco Internet Business Solutions Group (IBSG), April 2011.
- https://www.ftc.gov/system/files/documents/reports/federaltradecommission-staff-report-november-2013-workshopentitledinternet-things-privacy/150127iotrpt.pdf.
- https://www.brookings.edu/blog/techtank/2018/05/23/thegeneraldata-protection-regulation-sets-privacy-by-default/.
- Richards N M & Jonathan K, Three paradoxes of big data, Stanford Law Review, Online, 41 (2013) 66, SSRN: https://ssrn.com/abstract=2325537.
- http://www.afcea.org/committees/cyber/documents/Interneto fThingsFINAL.pdf.
- https://www.engerati.com/article/onzo-and-kantar-use-smartmetersevaluate-consumer-patterns.
- https://www.law360.com/articles/526266; https://blogs.cisco.com/cle/safeguarding-privacy-in-theinternetof-things.
- Peppet S, Regulating the internet of things: First steps toward managing discrimination, privacy, security, and consent, Texas Law Review, (2014).
- Thierer A D, The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation, Richmond Journal of Law and Technology, 21 (2015) 6.
- Ward M, Connected tech sparks privacy fears, http://www.bbc.com/news/technology-25662006 (8 January 2014).
- Federal Trade Commission, 2013, 368.
- http://winternet.org/2013/09/05/anonymity-privacy-andsecurityonline/.
- Goldfarb A & Tucker C, Privacy and innovation, National Bureau of Economic Research, (No. w17124) (2011).
- Goldfarb A & Tucker C, Privacy and innovation, National Bureau of Economic Research, (No. w17124) (2011) Fig. 3, page 22.
- The Affordable Care Act of 2010; digitized health care records.
- Zetzsche Dirk A, Buckley R P, Arner D W, Barberis & Janos Nathan, From FinTech to TechFin: The regulatory challenges of data-driven finance, New York University Journal of Law and Business, SSRN: https://ssrn.com/abstrac=2959925 or http://dx.doi.org/10.2139/ssrn.2959925.
- Allen Anita L, Protecting one's own privacy in a big data economy, Harvard Law Review Forum, 130 (2016) 71, SSRN: https://ssrn.com/abstract=2894545.
- Credence Services: Role of Liability System in India
Abstract Views :265 |
PDF Views:0
Authors
Affiliations
1 Department of Economic Sciences, Indian Institute of Technology Kanpur, Kanpur 208016, Uttar Pradesh, IN
2 Long Island University, CW Post Campus, Brookville, New York, 11548, US
1 Department of Economic Sciences, Indian Institute of Technology Kanpur, Kanpur 208016, Uttar Pradesh, IN
2 Long Island University, CW Post Campus, Brookville, New York, 11548, US
Source
Artha Vijnana: Journal of The Gokhale Institute of Politics and Economics, Vol 62, No 1 (2020), Pagination: 62-74Abstract
Consumer sovereignty is a myth in the healthcare services because of high information costs and bounded rationality. Moreover, producer sovereignty oriented surgeries and absence of social security system enhance patients’ vulnerability in India. Thus, the aggrieved patients approach consumer courts against deficiency in the services of physicians. Our study shows that these courts had received 57.61 per cent of the patients’ grievances that were related to surgery. The grievances reveal that the erroneous surgeries inflict harm on patients. As a result, patients’ incur healthcare costs and sufferings due to permanent disability, apart from premature deaths. Courts were able to decide only nine per cent, 23 per cent and 30 per cent of the total disposed of cases in favour of consumers at the National Commission, the State Commission of Andhra Pradesh and the District Forum of Nellore, Andhra Pradesh, respectively. This is due to causational link problem. Our analysis further posits that the law’s delay and costs on vexatious claims raise concerns about efficiency of the courts. The insight obtained is to alter physician behaviour by establishing an appropriate incentive structure to practise patient oriented health care.References
- Arlen, J. (2013), Economic Analysis of Medical Malpractice Liability and its Reform, In: Research Handbook on the Economic Analysis of Torts, Cheltenham, U.K. and Northampton, M.A., USA: Edward Elgar Press, pp. 33-68.
- Brennan, T., et. al. (1996), Relation between Negligent Adverse Events and the Outcomes of Medical Malpractice Litigation, New England Journal of Medicine, 335(26): 1063-1067.
- Cohen, T.H. and A.H. Kristen (2007), Medical Malpractice Insurance Claims in Seven States, 2000– 2004, Bureau of Justice Statistics Special Report, NCJ 216339, pp. 1-12.
- Currie, J., and W.B. MacLeod (2008), First Do No Harm? Tort Reform and Birth Outcomes, Quarterly Journal of Economics, 123(2): 795-830.
- Danzon, P.M. (1983), LillardL, Settlement out of Court: The Disposition of Medical Malpractice Claims, Journal of Legal Studies, 12(2): 345–377.
- ---------- (1991), Liability for Medical Malpractice, Journal of Economic Perspectives, 5(3): 51-69.
- Farber, H.S. and M.J. White (1991), Medical Malpractice: An Empirical Examination of the Litigation Process, RAND Journal of Economics, 22(2): 199–217.
- Friedman, D. (1982), What is Fair Compensation for Death or Injury? International Review of Law and Economics, 2(1): 81-93.
- G’Sell-Macrez, F. (2011), Medical Malpractice and Compensation in France: Part I: The French rules of medical liability since the patients’ Rights Law of March 4, 2002, Chicago-Kent Law Review, 86(3): 1093-1123.
- Jingwei, H.A. and J. Qian (2016), Explaining Medical Disputes in Chinese Public Hospitals: The Doctor–Patient Relationship and Its Implications for Health Policy Reforms, Health Economics, Policy and Law, 11(4): 359-378.
- Kaplow, L. (1992), Rules versus Standards: An Economic Analysis, Duke Law Journal, 42(3): 557- 629.
- Kessler, D.P. (1996), Institutional Causes of Delay in the Settlement of Legal Disputes, Journal of Law, Economics, & Organisation, 12(2): 432- 460.
- ---------- (2011), Evaluating the Medical Malpractice System and Options for Reform, Journal of Economic Perspectives, 25(2): 93–110.
- Kessler, D.P. and M. McClellan (1998), The Effects of Malpractice Pressure and Liability Reforms on Physicians' Perceptions of Medical Care, Law and Contemporary Problems, 60(1): 81-106.
- Kim, B. (2007), The Impact of Malpractice Risk on the Use of Obstetrics Procedures, Journal of Legal Studies, 36(S2): 79-119.
- Kolstad, C., et. al. (1990), Ex Post Liability for Harm vs. Ex Ante Safety Regulation: Substitutes or Complements, American Economic Review, 80(4): 888-911.
- Li, H., et. al. (2014), Claims, Liabilities, Injuries and Compensation Payments of Medical Malpractice Litigation Cases in China from 1998 to 2011, BMC Health Services Research, 14(390): 1–9.
- Ministry of Civil Supplies, Consumer Affairs and Public Distribution (2013), Government of India, New Delhi, up to date 6.11.2013, http://ncdrc.nic.in/Statistics.html
- Murali Prasad Panta, Business, Consumer and Government: Economic and Legal Perspectives (India and Germany), Mittal Publications, New Delhi, 2001.
- Nelson, P. (1970), Information and the Consumer Behaviour, Journal of Political Economy, 78(2): 11- 329.
- Shavell, S. (1980), An Analysis of Causation and the Scope of Liability in the Law of Torts, Journal of Legal Studies, 9(3): 463-516.
- ---------- (1984), A Model of the Optimal Use of Liability and Safety Regulation, Rand Journal of Economics, 15(2): 271- 280.
- ---------- (1984), Liability for Harm versus Regulation of Safety, Journal of Legal Studies, 13(2): 357- 374.
- ---------- (1986), The Judgement Proof Problem, International Review of Law and Economics, 6(1): 45- 58.
- ---------- (1995), The Appeals Process as a Means of Error Correction, Journal of Legal Studies, 24(2): 380- 426.
- Shurtz, I. (2014), Malpractice Law, Physician’s Financial Incentives, and Medical Treatment: How Do They Interact?, Journal of Law and Economics, 57(1): 1-29.
- Vandersteegen, T., et. al. (2017), The Determinants of Defensive Medicine Practices in Belgium, Health Economics, Policy and Law, 12(3): 363-386.
- Wittman, D. (1977), Prior Regulation vs. Post Liability: The Choice Between Input and Output Monitoring, Journal of Legal Studies, 6(1): 193- 211.
- Wright, W.R. (1985), Causation in Tort Law, California Law Review, 73(6): 1735-1828.