14,397 Hits in 7.5 sec

The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms and Fundamental Limits [article]

Weina Wang, Lei Ying, Junshan Zhang
2016 arXiv   pre-print
We study the value of data privacy in a game-theoretic model of trading private data, where a data collector purchases private data from strategic data subjects (individuals) through an incentive mechanism  ...  The higher ϵ is, the less private the reported data is. We derive lower and upper bounds on the value of privacy which are asymptotically tight as the number of data subjects becomes large.  ...  , and the tradeoff between reward and privacy from an individual's perspective (the value of privacy for a data subject).  ... 
arXiv:1603.06870v1 fatcat:qzckaeznfrej5hnp6obcxginyy

Segmentation, Incentives, and Privacy

Kobbi Nissim, Rann Smorodinsky, Moshe Tennenholtz
2018 Mathematics of Operations Research  
The current work proposes a model of prior-free segmentation, inspired by models of facility location, and to the best of our knowledge provides the first segmentation mechanism that addresses incentive  ...  compatibility, efficient market segmentation and privacy in the absence of a common prior.  ...  possible strategic manipulation of the data.  ... 
doi:10.1287/moor.2017.0903 fatcat:k6fhdemjxbcplcdif25qydfqwy

Privacy-friendly Identity Management in eGovernment [chapter]

Xavier Huysmans
2008 The Future of Identity in the Information Society  
Indeed, one should not forget that the fundamental right to privacy 6 protects the fundamental political value of a democratic constitutional state.  ...  Tasks government entities carry out in the public interest undoubtedly justify to some extent limitations of the right to privacy and the foreseen exceptions of the general data protection rules.  ... 
doi:10.1007/978-0-387-79026-8_17 dblp:conf/ifip9-6/Huysmans07 fatcat:6pws5uwnf5fqlgvxklmqhmfv6i

Preference-Based Privacy Markets

Ranjan Pal, Jon Crowcroft, Yixuan Wang, Yong Li, Swades De, Sasu Tarkoma, Mingyan Liu, Bodhibrata Nag, Abhishek Kumar, Pan Hui
2020 IEEE Access  
data leakage by data holders downstream in the data-release supplychain, we propose a design of regulated efficient/bounded inefficient economic mechanisms for oligopoly data trading markets using a novel  ...  In view of (a) the behavioral assumption that humans are 'compromising' beings and have privacy preferences, (b) privacy as a good not having strict boundaries, and (c) the practical inevitability of inappropriate  ...  ACKNOWLEDGEMENT The authors would like to thank Prof. Edgar Whitley of the London School of Economics and Political Science for his insightful comments on the market methodology.  ... 
doi:10.1109/access.2020.3014882 fatcat:cq4zzofblre4dpkafqrgnpz4xi

The Economics of Privacy

Alessandro Acquisti, Curtis Taylor, Liad Wagman
2016 Journal of Economic Literature  
We focus on the economic value and consequences of protecting and disclosing personal information, and on consumers' understanding and decisions regarding the trade-offs associated with the privacy and  ...  the sharing of personal data.  ...  However, numerous empirical studies have highlighted the limitations of transparency mechanisms.  ... 
doi:10.1257/jel.54.2.442 fatcat:3edb5nk4bvelrcufqd4usvvhnm

Approximate Privacy

Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira
2013 ACM Transactions on Algorithms  
Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce.  ...  There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments.  ...  to preserve the privacy of the individual database records (and hence protect the data subjects) but still have the result convey nontrivial information, are inapplicable to the problems that we study  ... 
doi:10.1145/2601067 fatcat:dp3qpezcejdl7ib2mpcozfttbm

The Economics of Privacy

Alessandro Acquisti, Curtis R. Taylor, Liad Wagman
2015 Social Science Research Network  
of privacy decision making, and specifically, of the difficulty in defining the value of privacy).  ...  (Information asymmetry in the privacy realm arises every time the data holder, who receives personal data about the data subject, knows more than the latter about the purposes and conditions of future  ... 
doi:10.2139/ssrn.2580411 fatcat:qle43daor5cfrkked5bfxheuki

Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances

Heng Xu, Tamara Dinev, Jeff Smith, Paul Hart
2011 Journal of the AIS  
privacy control, and his or her disposition to value privacy.  ...  Her ongoing research projects deal with the impacts of novel technologies on individuals' privacy concerns, strategic management of firms' privacy and security practices, and design and empirical evaluations  ...  They are also grateful to the reviewers for their constructive advice and very helpful comments on earlier versions of this manuscript.  ... 
doi:10.17705/1jais.00281 fatcat:3ymgera3kbfgpgcfobbanf4lbq

Incentive Design and Differential Privacy based Federated Learning: A mechanism design Perspective

Sungwook Kim
2020 IEEE Access  
To address the above challenge, we design a novel incentive mechanism to attract more data owners to join in the FL process with the consideration of privacy preservation.  ...  To implement our proposed scheme, we adopt the concepts of mechanism design (MD) and differential privacy (DP); MD takes an objectives-first approach to designing incentives toward desired objectives,  ...  Individual operator ∈ is held responsible for its covering devices in the set through the game model. Step 5: The (·) value is estimated based on the fundamental concept of the VCG mechanism.  ... 
doi:10.1109/access.2020.3030888 fatcat:vcqvjt77rzavrdjo34f6jx2pte

Catalyzing Privacy Law

Anupam Chander, Margot E. Kaminski, William McGeveran
2019 Social Science Research Network  
But perhaps an even greater one is the elimination of the adequacy mechanism as an incentive.  ...  CATALYSIS CONTENDERS: GDPR VERSUS CCPA Which data privacy regime is driving the wave of legislative activity related to data privacy across the U.S., and what is the mechanism of that influence?  ...  APPENDIX: STATE DATA PRIVACY BILLS [Note to editors: this is the framework of the appendix, which will be filled in with fully completed information at the end of the last legislative sessions, around  ... 
doi:10.2139/ssrn.3433922 fatcat:ss3e3dwi2bfq3pfojoobytlaeu

Privacy and Autonomous Systems

Jose M. Such
2017 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  
Beyond privacy threats and countermeasures, we also argue how autonomous systems may be, at the same time, the key to address some of the most challenging and pressing privacy problems nowadays and in  ...  We discuss the problem of privacy in autonomous systems, introducing different conceptualizations and perspectives on privacy to assess the threats that autonomous systems may pose to privacy.  ...  Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  ... 
doi:10.24963/ijcai.2017/663 dblp:conf/ijcai/Such17 fatcat:j4ceanzosrbvljiyjl5uqta6ce

State-of-the-Art of the Economics of Cyber-Security and Privacy

Nicola Jentzsch
2016 Social Science Research Network  
The following scheme outlines in brief the relation of the two deliverables D4.1 and D4.2 to the developed Privacy and Cyber-Security Market Scheme.  ...  From an outreach perspective, innovators working alongside IPACSO will be able to increase their understanding of existing methodologies, best practices, market considerations, economic incentives and  ...  Before we discuss the economic value of personal data, one ought to start with the fundamental question of the incentivization of personal data disclosure.  ... 
doi:10.2139/ssrn.2671291 fatcat:qddqtvak5jft3gfspybuq2nzgm

Privacy as an aggregate public good

Henrik Skaug Sætra
2020 Technology in society  
Privacy, technology, and the government Before embarking on the quest to discover the nature of liberal privacy, a basic set of concepts must be established.  ...  The article shows how liberals can justify government interference for the protection of privacy by relying on the avoidance of harm, and not on paternalism or other arguments not easily reconcilable with  ...  Acknowledgements I wish to thank the anonymous reviewers who have read and commented upon earlier versions of this manuscript.  ... 
doi:10.1016/j.techsoc.2020.101422 fatcat:i4jeusonpvbwddilfr5beb7uii

Advocating for Action Design Research on IT Value Creation in Healthcare

Susan Sherer
2014 Journal of the AIS  
Traditional ex post approaches to measuring IT value will limit the ability of healthcare IT value researchers to add value to practice now especially as government incentives in the US drive significant  ...  is only now digitizing its fundamental patient data, the electronic health record.  ...  Acknowledgements I would like to acknowledge the excellent insights of the anonymous reviewers, the support and assistance of the senior editor Cynthia Beath, and the helpful review and comments of my  ... 
doi:10.17705/1jais.00384 fatcat:v5jubicvwjahtg667dhcy6lhae

Health information privacy

Lawrence O Gostin
1995 Cornell law review  
Much of the academic and policy discourse on the health care system focuses on several fundamental goals: ensuring health coverage, equitable treatment, high quality services, and consumer choice at a  ...  of any changes to the organization and finance of the health care system.  ...  of privacy at all, but rather should require that the data be used only for authorized and limited purposes.  ... 
pmid:11660159 fatcat:zh5a4hnipvenfj6ggvf4x3ruoe
« Previous Showing results 1 — 15 out of 14,397 results