2015 IEEE 28th Computer Security Foundations Symposium 2015
DOI: 10.1109/csf.2015.14
|View full text |Cite
|
Sign up to set email alerts
|

A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications

Abstract: The amount of personal information contributed by individuals to digital repositories such as social network sites has grown substantially. perspective, we investigate to which degree the research analyst has flexibility to set requirements for data precision, so that individuals are still willing to contribute to the project, and the quality of the estimation improves.We study this tradeoff scenario for populations of homogeneous and heterogeneous individuals, and determine Nash equilibria that reflect the op… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(26 citation statements)
references
References 53 publications
0
26
0
Order By: Relevance
“…The first set of papers study privacy that is obtained by perturbing sensitive data. Chessa et al [2015] model the interaction between a set of users who contribute data in order to identify mechanisms by which the learning agent can improve the quality of its estimation. The users have two strategic variables: whether to contribute at all, and the level of precision to use if they do contribute.…”
Section: Perturbationmentioning
confidence: 99%
See 1 more Smart Citation
“…The first set of papers study privacy that is obtained by perturbing sensitive data. Chessa et al [2015] model the interaction between a set of users who contribute data in order to identify mechanisms by which the learning agent can improve the quality of its estimation. The users have two strategic variables: whether to contribute at all, and the level of precision to use if they do contribute.…”
Section: Perturbationmentioning
confidence: 99%
“…They find that an analyst can shift the equilibrium of the game towards more accurate estimation by imposing a minimum level of precision in the strategy space of the users. The paper studies computation of the average of a data set as a foundation for more complex statistics [Chessa et al 2015]. Shokri [2015] also addresses the issue of data privacy for users who send private information to an untrusted source.…”
Section: Perturbationmentioning
confidence: 99%
“…In our problem, an individual needs to decide whether to participate in the data collection. In the studies in [21], [22], [27], [28], however, an individual decides on the variance of noise to be added to his reported data (as he will always participate). Moreover, regarding the individuals' decision modeling, none of the previous studies (e.g., [15]- [28]) explored the behavioral economics modeling of individuals.…”
Section: Literature Reviewmentioning
confidence: 99%
“…p pos ) − g( n pos ) in(21). Then the approximated optimal solution˜ * pos under the case of a positive reference point is the root of f pos ( ) = 0 in the feasible set { : g( n pos ) − g(…”
mentioning
confidence: 99%
“…Another indicator of how habits, mores, and cultural constraints influence payoffs is to examine cases in which producers can choose their level of contribution. An existing game-theoretic model [10] suggests that the more trustworthy and precise the data generated by producers, the more likely an equilibrium will develop between producers and consumers. When participants in a user-generated content (UGC) community can choose their degree of contribution, they tend to be highly motivated in their subsequent participation [11].…”
Section: Prior Work and Backgroundmentioning
confidence: 99%