Data Privacy Games

Data Privacy Games
Author :
Publisher : Springer
Total Pages : 187
Release :
ISBN-10 : 9783319779652
ISBN-13 : 3319779656
Rating : 4/5 (656 Downloads)

Book Synopsis Data Privacy Games by : Lei Xu

Download or read book Data Privacy Games written by Lei Xu and published by Springer. This book was released on 2018-04-24 with total page 187 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the growing popularity of “big data”, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector’s strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users’ strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.


Data Privacy Games Related Books

Data Privacy Games
Language: en
Pages: 187
Authors: Lei Xu
Categories: Computers
Type: BOOK - Published: 2018-04-24 - Publisher: Springer

DOWNLOAD EBOOK

With the growing popularity of “big data”, the potential value of personal data has attracted more and more attention. Applications built on personal data c
Game Analytics
Language: en
Pages: 792
Authors: Magy Seif El-Nasr
Categories: Computers
Type: BOOK - Published: 2013-03-30 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Developing a successful game in today’s market is a challenging endeavor. Thousands of titles are published yearly, all competing for players’ time and atte
Mastering the Game:
Language: en
Pages: 378
Authors: World Intellectual Property Organization
Categories: Law
Type: BOOK - Published: - Publisher: WIPO

DOWNLOAD EBOOK

“Mastering the Game” provides professionals in the videogames industry with practical insights and guidance on legal and business issues related to the use
Game Data Science
Language: en
Pages: 320
Authors: Magy Seif El-Nasr
Categories: Computers
Type: BOOK - Published: 2021-09-30 - Publisher: Oxford University Press

DOWNLOAD EBOOK

Game data science, defined as the practice of deriving insights from game data, has created a revolution in the multibillion-dollar games industry - informing a
Financial Cryptography and Data Security
Language: en
Pages: 572
Authors: Rainer Böhme
Categories: Computers
Type: BOOK - Published: 2015-07-15 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2