923 resultados para Private information


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were introduced. They achieve optimal communication complexity and better online processing complexity. Unfortunately, all secure coprocessor-based PIR protocols require heavy periodical preprocessing. In this paper, we propose a new protocol, which is free from the periodical preprocessing while offering the optimal communication complexity and almost optimal online processing complexity. The proposed protocol is proven to be secure.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pre-fight displays typically provide honest, but sometimes dishonest, information about resource holding potential and may be influenced by assessment of resource value and hence motivation to acquire the resource. These assessments of potential costs and benefits are also predicted to influence escalated fight behaviour. This is examined in shell exchange contests of hermit crabs in which we establish an information asymmetry about a particularly poor quality shell. The poor shell was created by gluing sand to the interior whereas control shells lacked sand and the low value of the poor shell could not be accurately assessed by the opponent. Crabs in the poor shell showed changes in the use of pre-fight displays, apparently to increase the chances of swapping shells. When the fights escalated, crabs in poor shells fought harder if they took the role of attacker but gave up quickly if in the defender role. These tactics appear to be adaptive but do not result in a major shift in the roles taken or outcome. We thus link resource assessment with pre-fight displays, the roles taken, tactics used during escalation and the outcome of these contests.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We investigate the source of information advantage in inter-dealer FX trading using data on trades and counterparty identities. In liquid dollar exchange rates, information is concentrated among dealers that trade most frequently and specialize their activity in a particular rate. In cross-rates, traders that engage in triangular arbitrage are best informed. Better-informed traders are also located on larger trading floors. In cross-rates, the ability to forecast flows explains all of the advantage of the triangular arbitrageurs. In liquid dollar rates, specialist traders can forecast both order flow and the component of exchange rate changes that is uncorrelated with flow.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present and experimentally test a theoretical model of majority threshold determination as a function of voters’ risk preferences. The experimental results confirm the theoretical prediction of a positive correlation between the voter's risk aversion and the corresponding preferred majority threshold. Furthermore, the experimental results show that a voter's preferred majority threshold negatively relates to the voter's confidence about how others will vote. Moreover, in a treatment in which individuals receive a private signal about others’ voting behaviour, the confidence-related motivation of behaviour loses ground to the signal's strength.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this article is to analyze the incentives of manufacturers to deal exclusively with retailers in bilaterally duopolistic industries with brand differentiation by manufacturers. In contrast with the previous literature, exclusive contracts are shown to generate higher profits for manufacturers and retailers selling highly differentiated products, who thus have an incentive to insist on exclusive contracting. However, if the products are close substitutes no exclusivity will emerge in equilibrium. Furthermore, we show that exclusive contracts decrease both consumer and social welfare.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

While technologies for genetic sequencing have increased the promise of personalized medicine, they simultaneously pose threats to personal privacy. The public’s desire to protect itself from unauthorized access to information may limit the uses of this valuable resource. To date, there is limited understanding about the public’s attitudes toward the regulation and sharing of such information. We sought to understand the drivers of individuals’ decisions to disclose genetic information to a third party in a setting where disclosure potentially creates both private and social benefits, but also carries the risk of potential misuse of private information. We conducted two separate but related studies. First, we administered surveys to college students and parents, to determine individual attitudes toward and inter-generational influences on the disclosure decision. Second, we conducted a game-theory based experiment that assessed how participants’ decisions to disclose genetic information are influenced by societal and health factors. Key survey findings indicate that concerns about genetic information privacy negatively impact the likelihood of disclosure while the perceived benefits of disclosure and trust in the institution receiving the information have a positive influence. The experiment results also show that the risk of discrimination negatively affects the likelihood of disclosure, while the positive impact that disclosure has on the probability of finding a cure and the presence of a monetary incentive to disclose, increase the likelihood. We also study the determinants of individuals’ decision to be informed of findings about their health, and how information about health status is used for financial decisions.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Privacy issues have hindered the evolution of e-health since its emergence. Patients demand better solutions for the protection of private information. Health professionals demand open access to patient health records. Existing e-health systems find it difficult to fulfill these competing requirements. In this paper, we present an information accountability framework (IAF) for e-health systems. The IAF is intended to address privacy issues and their competing concerns related to e-health. Capabilities of the IAF adhere to information accountability principles and e-health requirements. Policy representation and policy reasoning are key capabilities introduced in the IAF. We investigate how these capabilities are feasible using Semantic Web technologies. We discuss with the use of a case scenario, how we can represent the different types of policies in the IAF using the Open Digital Rights Language (ODRL).

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The information that the economic agents have and regard relevant to their decision making is often assumed to be exogenous in economics. It is assumed that the agents either poses or can observe the payoff relevant information without having to exert any effort to acquire it. In this thesis we relax the assumption of ex-ante fixed information structure and study what happens to the equilibrium behavior when the agents must also decide what information to acquire and when to acquire it. This thesis addresses this question in the two essays on herding and two essays on auction theory. In the first two essays, that are joint work with Klaus Kultti, we study herding models where it is costly to acquire information on the actions that the preceding agents have taken. In our model the agents have to decide both the action that they take and additionally the information that they want to acquire by observing their predecessors. We characterize the equilibrium behavior when the decision to observe preceding agents' actions is endogenous and show how the equilibrium outcome may differ from the standard model, where all preceding agents actions are assumed to be observable. In the latter part of this thesis we study two dynamic auctions: the English and the Dutch auction. We consider a situation where bidder(s) are uninformed about their valuations for the object that is put up for sale and they may acquire this information for a small cost at any point during the auction. We study the case of independent private valuations. In the third essay of the thesis we characterize the equilibrium behavior in an English auction when there are informed and uninformed bidders. We show that the informed bidder may jump bid and signal to the uninformed that he has a high valuation, thus deterring the uninformed from acquiring information and staying in the auction. The uninformed optimally acquires information once the price has passed a particular threshold and the informed has not signalled that his valuation is high. In addition, we provide an example of an information structure where the informed bidder initially waits and then makes multiple jumps. In the fourth essay of this thesis we study the Dutch auction. We consider two cases where all bidders are all initially uninformed. In the first case the information acquisition cost is the same across all bidders and in the second also the cost of information acquisition is independently distributed and private information to the bidders. We characterize a mixed strategy equilibrium in the first and a pure strategy equilibrium in the second case. In addition we provide a conjecture of an equilibrium in an asymmetric situation where there is one informed and one uninformed bidder. We compare the revenues that the first price auction and the Dutch auction generate and we find that under some circumstances the Dutch auction outperforms the first price sealed bid auction. The usual first price sealed bid auction and the Dutch auction are strategically equivalent. However, this equivalence breaks down in case information is acquired during the auction.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper examines the occurrence and fragility of information cascades in two laboratory experiments. One group of low informed participants sequentially guess which of two states has been randomly chosen. In a matched pairs design, another group of high informed participants make similar guesses after having observed the guesses of the low informed participants. In the second experiment, participants' beliefs about the chosen state are elicited. In equilibrium, low informed players who observe an established pattern of identical guesses herd without regard to their private information whereas high informed players always guess according to their private information. Equilibrium behavior implies that information cascades emerge in the group of low informed participants, the belief based solely on cascade guesses is stationary, and information cascades are systematically broken by high informed participants endowed with private information contradicting the cascade guesses. Experimental results show that the behavior of low informed participants is qualitatively in line with the equilibrium prediction. Information cascades often emerge in our experiments. The tendency of low informed participants to engage in cascade behavior increases with the number of identical guesses. Our main finding is that information cascades are not fragile. The behavior of high informed participants differs markedly from the equilibrium prediction. Only one-third of laboratory cascades are broken by high informed participants endowed with private information contradicting the cascade guesses. The relative frequency of cascade breaks is 15% for the situations where five or more identical guesses are observed. Participants' elicited beliefs are strongly consistent with their own behavior and show that, unlike in equilibrium, the more cascade guesses participants observe the more they believe in the state favored by those guesses.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper examines simple parimutuel betting games under asymmetric information, with particular attention to differences between markets in which bets are submitted simultaneously versus sequentially. In the simultaneous parimutuel betting market, all (symmetric and asymmetric) Bayesian-Nash equilibria are generically characterized as a function of the number of bettors and the quality of their private information. There always exists a separating equilibrium, in which all bettors follow their private signals. This equilibrium is unique if the number of bettors is sufficiently large. In the sequential framework, earlier bets have information externalities, because they may reveal private information of bettors. They also have payoff externalities, because they affect the betting odds. One effect of these externalities is that the separating equilibrium disappears if the number of betting periods is sufficiently large. (C) 2006 Elsevier B.V. All rights reserved.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Le développement accéléré des technologies de communication, de saisie et de traitement de l’information durant les dernières années décennies ouvre la voie à de nouveaux moyens de contrôle social. Selon l’auteur Gary Marx ceux-ci sont de nature non coercitive et permettent à des acteurs privés ou publics d’obtenir des informations personnelles sur des individus sans que ceux-ci y consentent ou mêmes sans qu’ils en soient conscients. Ces moyens de contrôle social se fondent sur certaines valeurs sociales qui sont susceptibles de modifier le comportement des individus comme le patriotisme, la notion de bon citoyen ou le volontarisme. Tout comme les moyens coercitifs, elles amènent les individus à adopter certains comportements et à divulguer des informations précises. Toutefois, ces moyens se fondent soit sur le consentement des individus, consentement qui est souvent factice et imposée, soit l’absence de connaissance du processus de contrôle par les individus. Ainsi, l’auteur illustre comment des organisations privées et publiques obtiennent des informations privilégiées sur la population sans que celle-ci en soit réellement consciente. Les partisans de tels moyens soulignent leur importance pour la sécurité et le bien publique. Le discours qui justifie leur utilisation soutient qu’ils constituent des limites nécessaires et acceptables aux droits individuels. L’emploi de telles méthodes est justifié par le concept de l’intérêt public tout en minimisant leur impact sur les droits des individus. Ainsi, ces méthodes sont plus facilement acceptées et moins susceptibles d’être contestées. Toutefois, l’auteur souligne l’importance de reconnaître qu’une méthode de contrôle empiète toujours sur les droits des individus. Ces moyens de contrôle sont progressivement intégrés à la culture et aux modes de comportement. En conséquence, ils sont plus facilement justifiables et certains groupes en font même la promotion. Cette réalité rend encore plus difficile leur encadrement afin de protéger les droits individuels. L’auteur conclut en soulignant l’important décalage moral derrière l’emploi de ces méthodes non-coercitives de contrôle social et soutient que seul le consentement éclairé des individus peut justifier leur utilisation. À ce sujet, il fait certaines propositions afin d’encadrer et de rendre plus transparente l’utilisation de ces moyens de contrôle social.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Cette thèse est une collection de trois articles en économie de l'information. Le premier chapitre sert d'introduction et les Chapitres 2 à 4 constituent le coeur de l'ouvrage. Le Chapitre 2 porte sur l’acquisition d’information sur l’Internet par le biais d'avis de consommateurs. En particulier, je détermine si les avis laissés par les acheteurs peuvent tout de même transmettre de l’information à d’autres consommateurs, lorsqu’il est connu que les vendeurs peuvent publier de faux avis à propos de leurs produits. Afin de comprendre si cette manipulation des avis est problématique, je démontre que la plateforme sur laquelle les avis sont publiés (e.g. TripAdvisor, Yelp) est un tiers important à considérer, autant que les vendeurs tentant de falsifier les avis. En effet, le design adopté par la plateforme a un effet indirect sur le niveau de manipulation des vendeurs. En particulier, je démontre que la plateforme, en cachant une partie du contenu qu'elle détient sur les avis, peut parfois améliorer la qualité de l'information obtenue par les consommateurs. Finalement, le design qui est choisi par la plateforme peut être lié à la façon dont elle génère ses revenus. Je montre qu'une plateforme générant des revenus par le biais de commissions sur les ventes peut être plus tolérante à la manipulation qu'une plateforme qui génère des revenus par le biais de publicité. Le Chapitre 3 est écrit en collaboration avec Marc Santugini. Dans ce chapitre, nous étudions les effets de la discrimination par les prix au troisième degré en présence de consommateurs non informés qui apprennent sur la qualité d'un produit par le biais de son prix. Dans un environnement stochastique avec deux segments de marché, nous démontrons que la discrimination par les prix peut nuire à la firme et être bénéfique pour les consommateurs. D'un côté, la discrimination par les prix diminue l'incertitude à laquelle font face les consommateurs, c.-à-d., la variance des croyances postérieures est plus faible avec discrimination qu'avec un prix uniforme. En effet, le fait d'observer deux prix (avec discrimination) procure plus d'information aux consommateurs, et ce, même si individuellement chacun de ces prix est moins informatif que le prix uniforme. De l'autre côté, il n'est pas toujours optimal pour la firme de faire de la discrimination par les prix puisque la présence de consommateurs non informés lui donne une incitation à s'engager dans du signaling. Si l'avantage procuré par la flexibilité de fixer deux prix différents est contrebalancé par le coût du signaling avec deux prix différents, alors il est optimal pour la firme de fixer un prix uniforme sur le marché. Finalement, le Chapitre 4 est écrit en collaboration avec Sidartha Gordon. Dans ce chapitre, nous étudions une classe de jeux où les joueurs sont contraints dans le nombre de sources d'information qu'ils peuvent choisir pour apprendre sur un paramètre du jeu, mais où ils ont une certaine liberté quant au degré de dépendance de leurs signaux, avant de prendre une action. En introduisant un nouvel ordre de dépendance entre signaux, nous démontrons qu'un joueur préfère de l'information qui est la plus dépendante possible de l'information obtenue par les joueurs pour qui les actions sont soit, compléments stratégiques et isotoniques, soit substituts stratégiques et anti-toniques, avec la sienne. De même, un joueur préfère de l'information qui est la moins dépendante possible de l'information obtenue par les joueurs pour qui les actions sont soit, substituts stratégiques et isotoniques, soit compléments stratégiques et anti-toniques, avec la sienne. Nous établissons également des conditions suffisantes pour qu'une structure d'information donnée, information publique ou privée par exemple, soit possible à l'équilibre.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

We analyze the optimal provision of information in a procurement auction with horizontally differentiated goods. The buyer has private information about her preferred location on the product space and has access to a costless communication device. A seller who pays the entry cost may submit a bid comprising a location and a minimum price. We characterize the optimal information structure and show that the buyer prefers to attract only two bids. Further, additional sellers are inefficient since they reduce total and consumer surplus, gross of entry costs. We show that the buyer will not find it optimal to send public information to all sellers. On the other hand, she may profit from setting a minimum price and that a severe hold-up problem arises if she lacks commitment to set up the rules of the auction ex-ante.