Data Privacy Games

CHF 100.75
Auf Lager
SKU
DVEILJS2SNM
Stock 1 Verfügbar
Geliefert zwischen Mi., 26.11.2025 und Do., 27.11.2025

Details

With the growing popularity of big data, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue.

In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium.

The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively.

The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.


This book investigates the privacy-utility trade-off issue by analyzing interactions among multiple stakeholders, which is different from the predominant methodology in current literature This book presents a formalized analysis of the privacy preserving strategies. Specifically, game theory and contract theory, which are widely used in the study of economics, are applied in this book to analyze users' strategies The topic of information security and privacy is extremely hot in worldwide

Klappentext

With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems.The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.


Inhalt
1 The Conflict between Big Data and Individual Privacy.- 2 Privacy-Preserving Data Collecting: A Simple Game Theoretic Approach.- 3 Contract-based Private Data Collecting.- 4 Dynamic Privacy Pricing.- 5 User Participation Game in Collaborative Filtering.- 6 Privacy-Accuracy Trade-off in Distributed Data Mining.- 7 Conclusion.

Weitere Informationen

  • Allgemeine Informationen
    • GTIN 09783030085865
    • Sprache Englisch
    • Größe H235mm x B155mm x T11mm
    • Jahr 2018
    • EAN 9783030085865
    • Format Kartonierter Einband
    • ISBN 3030085864
    • Veröffentlichung 19.12.2018
    • Titel Data Privacy Games
    • Autor Lei Xu , Chunxiao Jiang , Yi Qian , Yong Ren
    • Gewicht 300g
    • Herausgeber Springer
    • Anzahl Seiten 192
    • Lesemotiv Verstehen
    • Genre Informatik

Bewertungen

Schreiben Sie eine Bewertung
Nur registrierte Benutzer können Bewertungen schreiben. Bitte loggen Sie sich ein oder erstellen Sie ein Konto.
Made with ♥ in Switzerland | ©2025 Avento by Gametime AG
Gametime AG | Hohlstrasse 216 | 8004 Zürich | Schweiz | UID: CHE-112.967.470