Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Data Privacy Games
~
Xu, Lei.
Data Privacy Games
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Data Privacy Games/ by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren.
Author:
Xu, Lei.
other author:
Jiang, Chunxiao.
Description:
X, 181 p. 52 illus., 46 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data structures (Computer science). -
Online resource:
https://doi.org/10.1007/978-3-319-77965-2
ISBN:
9783319779652
Data Privacy Games
Xu, Lei.
Data Privacy Games
[electronic resource] /by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren. - 1st ed. 2018. - X, 181 p. 52 illus., 46 illus. in color.online resource.
1 The Conflict between Big Data and Individual Privacy -- 2 Privacy-Preserving Data Collecting: A Simple Game Theoretic Approach -- 3 Contract-based Private Data Collecting -- 4 Dynamic Privacy Pricing -- 5 User Participation Game in Collaborative Filtering -- 6 Privacy-Accuracy Trade-off in Distributed Data Mining -- 7 Conclusion.
With the growing popularity of “big data”, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector’s strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users’ strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.
ISBN: 9783319779652
Standard No.: 10.1007/978-3-319-77965-2doiSubjects--Topical Terms:
680370
Data structures (Computer science).
LC Class. No.: QA76.9.D35
Dewey Class. No.: 005.73
Data Privacy Games
LDR
:03739nam a22004215i 4500
001
992671
003
DE-He213
005
20200701232639.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783319779652
$9
978-3-319-77965-2
024
7
$a
10.1007/978-3-319-77965-2
$2
doi
035
$a
978-3-319-77965-2
050
4
$a
QA76.9.D35
050
4
$a
Q350-390
072
7
$a
UMB
$2
bicssc
072
7
$a
COM031000
$2
bisacsh
072
7
$a
UMB
$2
thema
072
7
$a
GPF
$2
thema
082
0 4
$a
005.73
$2
23
100
1
$a
Xu, Lei.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1203519
245
1 0
$a
Data Privacy Games
$h
[electronic resource] /
$c
by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
X, 181 p. 52 illus., 46 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
1 The Conflict between Big Data and Individual Privacy -- 2 Privacy-Preserving Data Collecting: A Simple Game Theoretic Approach -- 3 Contract-based Private Data Collecting -- 4 Dynamic Privacy Pricing -- 5 User Participation Game in Collaborative Filtering -- 6 Privacy-Accuracy Trade-off in Distributed Data Mining -- 7 Conclusion.
520
$a
With the growing popularity of “big data”, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector’s strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users’ strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Data mining.
$3
528622
650
0
$a
Information storage and retrieval.
$3
1069252
650
0
$a
Management information systems.
$3
561123
650
0
$a
Computer science.
$3
573171
650
0
$a
E-commerce.
$2
gtt
$3
654932
650
1 4
$a
Data Structures and Information Theory.
$3
1211601
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
677765
650
2 4
$a
Information Storage and Retrieval.
$3
593926
650
2 4
$a
Management of Computing and Information Systems.
$3
593928
650
2 4
$a
e-Commerce/e-business.
$3
768697
700
1
$a
Jiang, Chunxiao.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1226039
700
1
$a
Qian, Yi.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1024919
700
1
$a
Ren, Yong.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1284339
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319779645
776
0 8
$i
Printed edition:
$z
9783319779669
776
0 8
$i
Printed edition:
$z
9783030085865
856
4 0
$u
https://doi.org/10.1007/978-3-319-77965-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login