2011
DOI: 10.1007/978-3-642-20769-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Using Game Theory to Analyze Risk to Privacy: An Initial Insight

Abstract: Abstract. Today, with the advancement of information technology, there is a growing risk to privacy as identity information is being used widely. This paper discusses some of the key issues related to the use of game theory in privacy risk analysis. Using game theory, risk analysis can be based on preferences or values of benefit which the subjects can provide rather than subjective probability. In addition, it can also be used in settings where no actuarial data is available. This may increase the quality and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…There have been several investigations in solving privacy problems with a Stackelberg game approach, some of which exhibit a similar concept with our work in modeling a two-party interaction with a Stackelberg game [38, 39, 40, 41, 42, 43]. Liu et al proposed a game model based on the assumption that the players have uncertainty with respect to each other’s payoff function [38].…”
Section: Introductionmentioning
confidence: 72%
See 1 more Smart Citation
“…There have been several investigations in solving privacy problems with a Stackelberg game approach, some of which exhibit a similar concept with our work in modeling a two-party interaction with a Stackelberg game [38, 39, 40, 41, 42, 43]. Liu et al proposed a game model based on the assumption that the players have uncertainty with respect to each other’s payoff function [38].…”
Section: Introductionmentioning
confidence: 72%
“…Liu et al proposed a game model based on the assumption that the players have uncertainty with respect to each other’s payoff function [38]. Rajbhandari et al provided a model with a smaller strategy space [41]. Blocki et al studied economic considerations in the design of internal audit mechanisms parameter [42].…”
Section: Introductionmentioning
confidence: 99%
“…Some researchers suggested using game theory to measure the risk value of access operations. For example, Rajbhandari and Snekkenes [17] have proposed a risk analysis method that uses values of user benefits to evaluating the risk value related to the access request using game theory. However, using only the user's benefits to make access decisions are not enough to build a scalable and flexible approach for the IoT.…”
Section: Related Workmentioning
confidence: 99%
“…Some researchers suggested using game theory to measure the risk value of access operations. For example, Rajbhandari and Snekkenes [24] have proposed a risk analysis method that uses values of user benefits to estimate the risk value related to the access request using game theory. However, using only user's benefits to make access decisions are not enough to build a scalable and flexible approach for the IoT.…”
Section: Related Workmentioning
confidence: 99%
“…The payoff is the rewards of the players in the game. For each player, the payoff is affected by both their own actions and those of the other player [24]. In the game theory, the risk analysis is done by using user benefits rather than the probability.…”
Section: Game Theorymentioning
confidence: 99%