Data Trading with a Monopoly Social Network: Outcomes Are Mostly Privacy Welfare Damaging
نویسندگان
چکیده
منابع مشابه
Privacy Threat Analysis of Social Network Data
Social network data has been increasingly made publicly available and analyzed in a wide spectrum of application domains. The practice of publishing social network data has brought privacy concerns to the front. Serious concerns on privacy protection in social networks have been raised in recent years. Realization of the promise of social networks data requires addressing these concerns. This p...
متن کاملMonopoly Innovation and Welfare Effects
In this paper we study the welfare effect of a monopoly innovation. Unlike many partial equilibrium models carried out in previous studies, general equilibrium models with non-price-taking behavior are constructed and analyzed in greater detail. We discover that technical innovation carried out by a monopolist could significantly increase the social welfare. We conclude that, in general, the cr...
متن کاملPrivacy Preserving Publishing of Social Network Data Privacy and Big Data Mining
Privacy is a major concern in big data mining. Advances in development of data mining technologies bring serious risk to the security of individual’s sensitive data. An emerging research in data mining, known as privacypreserving data mining (PPDM), has been broadly studied in recent years. The basic idea of PPDM is to transform or change the data in such a way so as to not to compromise on sec...
متن کاملThe Least Privacy-Damaging Centralised Traffic Data Retention Architecture
We present a protocol that can be used by service providers to store traffic records centrally, while only making them readable to law enforcement after a proper authorisation has been issued and logged. Despite the system’s best efforts to prevent mass profiling and surveillance, we discuss how it is inherently fragile.
متن کاملPrivacy Protection on Social Network Data Using Anonymization Methodology
Privacy is amongst the major concerns when publishing or sharing social network data for social science research and also business analysis. Recently, researchers have developed privacy models just like k-anonymity in order to avoid node reidentification through structure information. However, even though these privacy models are enforced, an attacker can always have the capacity to infer one’s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Networking Letters
سال: 2020
ISSN: 2576-3156
DOI: 10.1109/lnet.2020.3031868