A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms and Fundamental Limits
[article]
2016
arXiv
pre-print
We study the value of data privacy in a game-theoretic model of trading private data, where a data collector purchases private data from strategic data subjects (individuals) through an incentive mechanism ...
The higher ϵ is, the less private the reported data is. We derive lower and upper bounds on the value of privacy which are asymptotically tight as the number of data subjects becomes large. ...
, and the tradeoff between reward and privacy from an individual's perspective (the value of privacy for a data subject). ...
arXiv:1603.06870v1
fatcat:qzckaeznfrej5hnp6obcxginyy
Segmentation, Incentives, and Privacy
2018
Mathematics of Operations Research
The current work proposes a model of prior-free segmentation, inspired by models of facility location, and to the best of our knowledge provides the first segmentation mechanism that addresses incentive ...
compatibility, efficient market segmentation and privacy in the absence of a common prior. ...
possible strategic manipulation of the data. ...
doi:10.1287/moor.2017.0903
fatcat:k6fhdemjxbcplcdif25qydfqwy
Privacy-friendly Identity Management in eGovernment
[chapter]
2008
The Future of Identity in the Information Society
Indeed, one should not forget that the fundamental right to privacy 6 protects the fundamental political value of a democratic constitutional state. ...
Tasks government entities carry out in the public interest undoubtedly justify to some extent limitations of the right to privacy and the foreseen exceptions of the general data protection rules. ...
doi:10.1007/978-0-387-79026-8_17
dblp:conf/ifip9-6/Huysmans07
fatcat:6pws5uwnf5fqlgvxklmqhmfv6i
Preference-Based Privacy Markets
2020
IEEE Access
data leakage by data holders downstream in the data-release supplychain, we propose a design of regulated efficient/bounded inefficient economic mechanisms for oligopoly data trading markets using a novel ...
In view of (a) the behavioral assumption that humans are 'compromising' beings and have privacy preferences, (b) privacy as a good not having strict boundaries, and (c) the practical inevitability of inappropriate ...
ACKNOWLEDGEMENT The authors would like to thank Prof. Edgar Whitley of the London School of Economics and Political Science for his insightful comments on the market methodology. ...
doi:10.1109/access.2020.3014882
fatcat:cq4zzofblre4dpkafqrgnpz4xi
The Economics of Privacy
2016
Journal of Economic Literature
We focus on the economic value and consequences of protecting and disclosing personal information, and on consumers' understanding and decisions regarding the trade-offs associated with the privacy and ...
the sharing of personal data. ...
However, numerous empirical studies have highlighted the limitations of transparency mechanisms. ...
doi:10.1257/jel.54.2.442
fatcat:3edb5nk4bvelrcufqd4usvvhnm
Approximate Privacy
2013
ACM Transactions on Algorithms
Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. ...
There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments. ...
to preserve the privacy of the individual database records (and hence protect the data subjects) but still have the result convey nontrivial information, are inapplicable to the problems that we study ...
doi:10.1145/2601067
fatcat:dp3qpezcejdl7ib2mpcozfttbm
The Economics of Privacy
2015
Social Science Research Network
of privacy decision making, and specifically, of the difficulty in defining the value of privacy). ...
(Information asymmetry in the privacy realm arises every time the data holder, who receives personal data about the data subject, knows more than the latter about the purposes and conditions of future ...
doi:10.2139/ssrn.2580411
fatcat:qle43daor5cfrkked5bfxheuki
Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances
2011
Journal of the AIS
privacy control, and his or her disposition to value privacy. ...
Her ongoing research projects deal with the impacts of novel technologies on individuals' privacy concerns, strategic management of firms' privacy and security practices, and design and empirical evaluations ...
They are also grateful to the reviewers for their constructive advice and very helpful comments on earlier versions of this manuscript. ...
doi:10.17705/1jais.00281
fatcat:3ymgera3kbfgpgcfobbanf4lbq
Incentive Design and Differential Privacy based Federated Learning: A mechanism design Perspective
2020
IEEE Access
To address the above challenge, we design a novel incentive mechanism to attract more data owners to join in the FL process with the consideration of privacy preservation. ...
To implement our proposed scheme, we adopt the concepts of mechanism design (MD) and differential privacy (DP); MD takes an objectives-first approach to designing incentives toward desired objectives, ...
Individual operator ∈ is held responsible for its covering devices in the set through the game model. Step 5: The (·) value is estimated based on the fundamental concept of the VCG mechanism. ...
doi:10.1109/access.2020.3030888
fatcat:vcqvjt77rzavrdjo34f6jx2pte
Catalyzing Privacy Law
2019
Social Science Research Network
But perhaps an even greater one is the elimination of the adequacy mechanism as an incentive. ...
CATALYSIS CONTENDERS: GDPR VERSUS CCPA Which data privacy regime is driving the wave of legislative activity related to data privacy across the U.S., and what is the mechanism of that influence? ...
APPENDIX: STATE DATA PRIVACY BILLS [Note to editors: this is the framework of the appendix, which will be filled in with fully completed information at the end of the last legislative sessions, around ...
doi:10.2139/ssrn.3433922
fatcat:ss3e3dwi2bfq3pfojoobytlaeu
Privacy and Autonomous Systems
2017
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence
Beyond privacy threats and countermeasures, we also argue how autonomous systems may be, at the same time, the key to address some of the most challenging and pressing privacy problems nowadays and in ...
We discuss the problem of privacy in autonomous systems, introducing different conceptualizations and perspectives on privacy to assess the threats that autonomous systems may pose to privacy. ...
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence ...
doi:10.24963/ijcai.2017/663
dblp:conf/ijcai/Such17
fatcat:j4ceanzosrbvljiyjl5uqta6ce
State-of-the-Art of the Economics of Cyber-Security and Privacy
2016
Social Science Research Network
The following scheme outlines in brief the relation of the two deliverables D4.1 and D4.2 to the developed Privacy and Cyber-Security Market Scheme. ...
From an outreach perspective, innovators working alongside IPACSO will be able to increase their understanding of existing methodologies, best practices, market considerations, economic incentives and ...
Before we discuss the economic value of personal data, one ought to start with the fundamental question of the incentivization of personal data disclosure. ...
doi:10.2139/ssrn.2671291
fatcat:qddqtvak5jft3gfspybuq2nzgm
Privacy as an aggregate public good
2020
Technology in society
Privacy, technology, and the government Before embarking on the quest to discover the nature of liberal privacy, a basic set of concepts must be established. ...
The article shows how liberals can justify government interference for the protection of privacy by relying on the avoidance of harm, and not on paternalism or other arguments not easily reconcilable with ...
Acknowledgements I wish to thank the anonymous reviewers who have read and commented upon earlier versions of this manuscript. ...
doi:10.1016/j.techsoc.2020.101422
fatcat:i4jeusonpvbwddilfr5beb7uii
Advocating for Action Design Research on IT Value Creation in Healthcare
2014
Journal of the AIS
Traditional ex post approaches to measuring IT value will limit the ability of healthcare IT value researchers to add value to practice now especially as government incentives in the US drive significant ...
is only now digitizing its fundamental patient data, the electronic health record. ...
Acknowledgements I would like to acknowledge the excellent insights of the anonymous reviewers, the support and assistance of the senior editor Cynthia Beath, and the helpful review and comments of my ...
doi:10.17705/1jais.00384
fatcat:v5jubicvwjahtg667dhcy6lhae
Health information privacy
1995
Cornell law review
Much of the academic and policy discourse on the health care system focuses on several fundamental goals: ensuring health coverage, equitable treatment, high quality services, and consumer choice at a ...
of any changes to the organization and finance of the health care system. ...
of privacy at all, but rather should require that the data be used only for authorized and limited purposes. ...
pmid:11660159
fatcat:zh5a4hnipvenfj6ggvf4x3ruoe
« Previous
Showing results 1 — 15 out of 14,397 results