LEADER 05035nam 22006615 450 001 9910299269703321 005 20200701232639.0 010 $a3-319-77965-6 024 7 $a10.1007/978-3-319-77965-2 035 $a(CKB)4100000003359567 035 $a(MiAaPQ)EBC5438768 035 $a(DE-He213)978-3-319-77965-2 035 $a(PPN)226699218 035 $a(EXLCZ)994100000003359567 100 $a20180424d2018 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Privacy Games /$fby Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (187 pages) 311 $a3-319-77964-8 327 $a1 The Conflict between Big Data and Individual Privacy -- 2 Privacy-Preserving Data Collecting: A Simple Game Theoretic Approach -- 3 Contract-based Private Data Collecting -- 4 Dynamic Privacy Pricing -- 5 User Participation Game in Collaborative Filtering -- 6 Privacy-Accuracy Trade-off in Distributed Data Mining -- 7 Conclusion. 330 $aWith the growing popularity of ?big data?, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector?s strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users? strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria. 606 $aData structures (Computer science) 606 $aData mining 606 $aInformation storage and retrieval 606 $aManagement information systems 606 $aComputer science 606 $aE-commerce 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 615 0$aData structures (Computer science). 615 0$aData mining. 615 0$aInformation storage and retrieval. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aE-commerce. 615 14$aData Structures and Information Theory. 615 24$aData Mining and Knowledge Discovery. 615 24$aInformation Storage and Retrieval. 615 24$aManagement of Computing and Information Systems. 615 24$ae-Commerce/e-business. 676 $a005.73 700 $aXu$b Lei$4aut$4http://id.loc.gov/vocabulary/relators/aut$0892329 702 $aJiang$b Chunxiao$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aQian$b Yi$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aRen$b Yong$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910299269703321 996 $aData Privacy Games$91992604 997 $aUNINA