Interdependent Privacy: Let Me Share Your Data

نویسندگان

  • Gergely Biczók
  • Pern Hui Chia
چکیده

Users share massive amounts of personal information and opinion with each other and different service providers every day. In such an interconnected setting, the privacy of individual users is bound to be affected by the decisions of others, giving rise to the phenomenon which we term as interdependent privacy. In this paper we define online privacy interdependence, show its existence through a study of Facebook application permissions, and model its impact through an Interdependent Privacy Game (IPG). We show that the arising negative externalities can steer the system into equilibria which are inefficient for both users and platform vendor. We also discuss how the underlying incentive misalignment, the absence of risk signals and low user awareness contribute to unfavorable outcomes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Study of Veil Abandonment and Privacy Abandonment in Iranian Clothing and Buildings before and after The Pahlavi Dynasty

The issue of non-observance of privacy in contemporary Iranian clothes and buildings is one of the most important cultural issues in the country due to its lack of proportion to the Islamic culture of Iran, it has brought various cultural and social consequences in contemporary Iranian society; in particular, there are some verses in the holly Qur'an referring to the issue of veiling for women,...

متن کامل

When Others Impinge upon Your Privacy: Interdependent Risks and Protection in a Connected World

Privacy is defined as the right to control, edit, manage, and delete information about oneself and decide when, how, and to what extent this information is communicated to others. Therefore, every person should ideally be empowered to manage and protect his own data, individually and independently of others. This assumption, however, barely holds in practice, because people are by nature biolog...

متن کامل

A Cyber Model for Privacy by Design (PbD)

Does privacy protection matter in the internet of things (IoT) including consumer electronics (CE)? So what is privacy, how is it valued and where does it sit in your organization today? Chances are if you don’t have a chief privacy officer or data protection officer, your company is lacking in protecting critical data, let alone all the laws and statutory regulations dealing with privacy (e.g....

متن کامل

Share your Model instead of your Data: Privacy Preserving Mimic Learning for Ranking

Deep neural networks have become a primary tool for solving problems in many €elds. Œey are also used for addressing information retrieval problems and show strong performance in several tasks. Training these models requires large, representative datasets and for most IR tasks, such data contains sensitive information from users. Privacy and con€dentiality concerns prevent many data owners from...

متن کامل

Can You Have Your Cake and Eat It Too? Sharing Healthcare Data Without Compromising Privacy and Confidentiality

One major concern with electronic healthcare data relates to preserving the privacy and confidentiality of such data. The recent Health Insurance Portability and Accountability Act (HIPAA) of 1996 has established national standards for the protection of health information. The National Institutes of Health also requires healthcare researchers to share data regarding their subjects, but without ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013