Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1014
Full metadata record
DC FieldValueLanguage
dc.contributor.authorXu, Lei. ;en_US
dc.contributor.authorJiang, Chunxiao. ;en_US
dc.contributor.authorQian, Yi. ;en_US
dc.contributor.authorRen, Yong. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:25Z-
dc.date.available2020-05-17T08:24:25Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319779652 ;en_US
dc.identifier.isbn9783319779645 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1014-
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.description005.74 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9783319779645. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractWith the growing popularity of eebig dataee, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collectorees strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study usersee strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria. ;en_US
dc.description.statementofresponsibilityby Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren.en_US
dc.description.tableofcontents1 The Conflict between Big Data and Individual Privacy -- 2 Privacy-Preserving Data Collecting: A Simple Game Theoretic Approach -- 3 Contract-based Private Data Collecting -- 4 Dynamic Privacy Pricing -- 5 User Participation Game in Collaborative Filtering -- 6 Privacy-Accuracy Trade-off in Distributed Data Mining -- 7 Conclusion. ;en_US
dc.format.extentX, 181 p. 52 illus., 46 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319779652.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectData Miningen_US
dc.subjectInformation Storage and Retrievalen_US
dc.subjectManagement Information Systemsen_US
dc.subjectE-commerce. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectData Mining and Knowledge Discoveryen_US
dc.subjectInformation Storage and Retrieval. ;en_US
dc.subjectManagement of Computing and Information Systems. ;en_US
dc.subjecte-Commerce/e-business. ;en_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleData Privacy Gamesen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319779652.pdf4.1 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorXu, Lei. ;en_US
dc.contributor.authorJiang, Chunxiao. ;en_US
dc.contributor.authorQian, Yi. ;en_US
dc.contributor.authorRen, Yong. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:25Z-
dc.date.available2020-05-17T08:24:25Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319779652 ;en_US
dc.identifier.isbn9783319779645 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1014-
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.description005.74 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9783319779645. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractWith the growing popularity of eebig dataee, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collectorees strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study usersee strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria. ;en_US
dc.description.statementofresponsibilityby Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren.en_US
dc.description.tableofcontents1 The Conflict between Big Data and Individual Privacy -- 2 Privacy-Preserving Data Collecting: A Simple Game Theoretic Approach -- 3 Contract-based Private Data Collecting -- 4 Dynamic Privacy Pricing -- 5 User Participation Game in Collaborative Filtering -- 6 Privacy-Accuracy Trade-off in Distributed Data Mining -- 7 Conclusion. ;en_US
dc.format.extentX, 181 p. 52 illus., 46 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319779652.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectData Miningen_US
dc.subjectInformation Storage and Retrievalen_US
dc.subjectManagement Information Systemsen_US
dc.subjectE-commerce. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectData Mining and Knowledge Discoveryen_US
dc.subjectInformation Storage and Retrieval. ;en_US
dc.subjectManagement of Computing and Information Systems. ;en_US
dc.subjecte-Commerce/e-business. ;en_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleData Privacy Gamesen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319779652.pdf4.1 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorXu, Lei. ;en_US
dc.contributor.authorJiang, Chunxiao. ;en_US
dc.contributor.authorQian, Yi. ;en_US
dc.contributor.authorRen, Yong. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:25Z-
dc.date.available2020-05-17T08:24:25Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319779652 ;en_US
dc.identifier.isbn9783319779645 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1014-
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.description005.74 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9783319779645. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractWith the growing popularity of eebig dataee, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collectorees strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study usersee strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria. ;en_US
dc.description.statementofresponsibilityby Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren.en_US
dc.description.tableofcontents1 The Conflict between Big Data and Individual Privacy -- 2 Privacy-Preserving Data Collecting: A Simple Game Theoretic Approach -- 3 Contract-based Private Data Collecting -- 4 Dynamic Privacy Pricing -- 5 User Participation Game in Collaborative Filtering -- 6 Privacy-Accuracy Trade-off in Distributed Data Mining -- 7 Conclusion. ;en_US
dc.format.extentX, 181 p. 52 illus., 46 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.haspart9783319779652.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectData Miningen_US
dc.subjectInformation Storage and Retrievalen_US
dc.subjectManagement Information Systemsen_US
dc.subjectE-commerce. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectData Mining and Knowledge Discoveryen_US
dc.subjectInformation Storage and Retrieval. ;en_US
dc.subjectManagement of Computing and Information Systems. ;en_US
dc.subjecte-Commerce/e-business. ;en_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleData Privacy Gamesen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319779652.pdf4.1 MBAdobe PDFThumbnail
Preview File