首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 305 毫秒
1.
This paper considers the problem of procuring truthful responses to estimate the proportion of qualitative characteristics. In order to protect the respondent's privacy, various techniques of generating randomized response rather than direct response are available in the literature. But the theory concerning them is generally developed with no attention to the required level of privacy protection. Illustrating two randomization devices, we show how optimal randomized response designs may be achieved. The optimal designs of forced response procedure as well as BHARGAVA and SINGH [Statistica (2000) Vol. 6, pp 315–321] procedure are shown to be special cases. In addition, the equivalent designs of optimal WARNER [Journal of the American Statistical Association (1965) Vol. 60, pp. 63–69] procedure are considered as well. It is also shown that stratification with proportional allocation will be helpful for improving the estimation efficiency.  相似文献   

2.
Randomized response (say, RR) techniques on survey are used for collecting data on sensitive issues while trying to protect the respondents’ privacy. The degree of confidentiality will clearly determine whether or not respondents choose to cooperate. There have been many proposals for privacy measures with very different implications for an optimal model design. These derived measures of protection privacy involve both conditional probabilities of being perceived as belonging to sensitive group, denoted as P(A|yes) and P(A|no). In this paper, we introduce an alternative criterion to measure privacy protection and reconsider and compare some RR models in the light of the efficiency/protection privacy. This measure is known to the respondents before they agree to use the RR model. This measure is helpful for choosing an optimal RR model in practice.  相似文献   

3.
网络隐私权及法律保护   总被引:1,自引:0,他引:1  
网络时代的发展使隐私权和网络隐私权受到前所未有的严峻挑战,严重侵害了网络隐私权的发展,强化对网络隐私权的法律保护,已成为社会网络的当务之急。文章论述了隐私权及网络隐私权的含义,分析了侵害隐私权的主要表现形式,提出了网络隐私权保护的几点意见。  相似文献   

4.
We analyze how different degrees of privacy protection affect industry profits, consumer welfare, and total welfare in a model with switching costs. Firms earn higher profits under weak privacy protection compared with strong or no privacy protection. The relationship between the degree of privacy protection and equilibrium profits is not monotonic. Consumer surplus and total welfare increase with the degree of privacy protection unless firms recognize consumer‐specific switching costs. In that case, pricing conditional on switching costs has favorable implications for consumer surplus and total welfare.  相似文献   

5.
柳波 《价值工程》2014,(26):315-316
通过对珠江三角洲地2010、2011和2012年问卷调查分析显示:在粤湘籍农民工的一般工资制度不断改善,工作时间均有不同程度减少,社会保险享有比例在逐年增加,社会保障覆盖面在逐年增大,但劳动合同满意度和农民工权益保护却在在逐年降低。要想改善湘籍农民工权益保障现状,政府需要加强政府职能,从而改善湘籍农民工的劳动权益。  相似文献   

6.
文章通过构建双寡头垄断的电商企业成本差异化的Hotelling模型,探讨了隐私提供量、单位隐私投入成本对电商个性化产品的投资决策影响。研究表明,隐私提供量在一定范围内时能够促进企业更愿意投入成本对隐私保护,但当隐私提供量超过一定量后,造成总隐私保护成本过大反而阻碍了隐私保护的进行。对于率先进行隐私保护投入的企业2来说,随着单位隐私成本投入的增加,两企业的差异化逐渐明显,该电商企业将逐渐并长期占据大部分市场,若企业1不及时改变决策,将终被挤出市场。  相似文献   

7.
In this paper, a new randomized response model is proposed, which is shown to have a Cramer–Rao lower bound of variance that is lower than the Cramer–Rao lower bound of variance suggested by Singh and Sedory at equal protection or greater protection of respondents. A new measure of protection of respondents in the setup of the efficient use of two decks of cards, because of Odumade and Singh, is also suggested. The developed Cramer–Rao lower bounds of variances are compared under different situations through exact numerical illustrations. Survey data to estimate the proportion of students who have sometimes driven a vehicle after drinking alcohol and feeling over the legal limit are collected by using the proposed randomization device and then analyzed. The proposed randomized response technique is also compared with a black box technique within the same survey. A method to determine minimum sample size in randomized response sampling based on a small pilot survey is also given.  相似文献   

8.
随着社区卫生服务的不断发展,居民的隐私权逐渐引起人们的广泛关注,但这一问题并未引起广大社区卫生工作者的足够重视,在全社会法制意识日益增强和居民维权意识日益普遍的今天,居民隐私权的保护不再是一个遥远的话题。充分了解居民隐私权及其相关问题,正确认识和对待居民隐私权,既对依法维护医患双方的合法权益具有重要的现实意义,又对提高居民对社区卫生服务的满意度具有重要意义。  相似文献   

9.
Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent. Some cryptographic techniques have been used for protection in form of identity, attributes and prediction algorithms nonetheless these algorithms lack their performance and becomes are very prone to attackers when an unauthorized user reunited the system with dissimilar way for privileges to the similar data files. The essential need of this data security solved by some enhanced cryptographic techniques in DRM utilizing a secure privacy preserving data sharing with encryption techniques of Dynamic Unidirectional Proxy Re-Encryption. This technique is based on Cipher text Policy Attribute by providing the privacy, integrity and security of the data while retrieving.  相似文献   

10.
Employers today are faced with the task of managing workplace privacy, dealing with potential litigation, preserving the confidentiality of company information while protecting the rights of the employee. Since September 11, 2001, employers have faced new challenges including the implementation of new laws and the development of more sophisticated technology. As a result, workplace policies dealing with privacy must be clearly and effectively communicated to all affected workers. The objective of this survey research project was to measure the general public’s attitudes and perceptions of the communication of work place privacy policies. An emphasis was placed on the collection of real world data from multiple business and organizational environments, as opposed to data obtained in a controlled experimental setting.  相似文献   

11.
This paper considers the problem of unbiasedly estimating the population proportion when the study variable is potential sensitive in nature. In order to protect the respondent’s privacy, various techniques of generating randomized response rather than direct response are available in the literature. But the theory concerning them is developed only under the hypothesis of completely truthful reporting. Actually, the occurrence of untruthful reporting is a prospect in dealing with highly sensitive matters such as abortion or socially deviant behaviors. Illustrating Warner’s [(1965), Journal of the American Statistical Association. 60: 63–69] randomized response technique we show how unbiased estimation of the population proportion can be extended to cover a case when some respondents may lie.  相似文献   

12.
Attracting, motivating and retaining knowledge workers have become important in a knowledge‐based and tight labour market, where changing knowledge management practices and global convergence of technology has redefined the nature of work. While individualisation of employment practices and team‐based work may provide personal and organisational flexibilities, aligning HR and organisational strategies for competitive advantage has become more prominent. This exploratory study identifies the most and least effective HR strategies used by knowledge intensive firms (KIFs) in Singapore for attracting, motivating and retaining these workers. The most popular strategies were not always the most effective, and there appear to be distinctive ‘bundles’ of HR practices for managing knowledge workers. These vary according to whether ownership is foreign or local. A schema, based on statistically significant findings, for improving the effectiveness of these practices in managing knowledge workers is proposed. Cross‐cultural research is necessary to establish the extent of diffusion of these practices.  相似文献   

13.
As China enters the twenty-first year of reform, the success of its economic policies has been widely recognized. But what is also true is that economic reforms initiated in the past decades, particularly the restructuring of state-owned enterprises, have inevitably marginalized state workers - the 'masters of socialist China'. Workers in private and non-state sectors might have benefited from the economic reforms but state workers of most state-owned enterprises feel bitterly left behind. The aim of this article is to examine the perception of state workers of the causes of organizational difficulties, their worries in face of redundancy and their coping strategies. Observations made in this study are based on field interviews and questionnaire survey of 649 state workers in Beijing, Shenyang and Zhejiang from 1996 to 1999.  相似文献   

14.
This paper considers the problem of estimation for binomial proportions of sensitive attributes in the population of interest. Randomized response techniques are suggested for protecting the privacy of respondents and reducing the response bias while eliciting information on sensitive attributes. By applying the Wilson (J Am Stat Assoc 22:209–212, 1927) score approach for constructing confidence intervals, various probable point estimators and confidence interval estimators are suggested for the common structures of randomized response procedures. In addition, efficiency comparisons are carried out to study the performances of the proposed estimators for both the cases of direct response surveys and randomized response surveys. Circumstances under which each proposed estimators is better are also identified.  相似文献   

15.
姜璎芳 《价值工程》2010,29(13):253-253
近年来,互联网"人肉搜索"现象备受人们的关注。"人肉搜索"具有一定的社会舆论监督意义,但从其诞生之日起,就不可避免地与侵害个人的隐私权以及侵犯公民的其他正当权益联系在一起。因此,在保护公民合法权益的视角下,如何发挥"人肉搜索"的正面作用,约束不当言论和行为,使网络环境下的隐私权得到保护,如何对其进行法律规制等方面的约束就具有重要的理论和现实意义。  相似文献   

16.
Randomized response techniques (RRT) are well–known as tools to procure trustworthy survey data on confidential issues. A review is attempted here of mostly published accounts on RRT covering qualitative and quantitative characters. Conflicting criteria of efficient estimation and protection of privacy are discussed. Infinite hypothetical and concrete finite population set–ups are treated separately.  相似文献   

17.
A rich seam of waste scholarship already addresses the exclusion faced by informal waste workers as cities in the global South undergo spatial transformations to become ‘world class’. However, less attention has been paid to how state practices have reproduced inequalities within and across waste picker communities. Drawing upon eleven months of ethnographic research at Mumbai's Deonar dump site, this article maps the practices through which waste workers have responded to their exclusion following a massive fire in 2016. It demonstrates that social exclusion is experienced differently by different members of the community and calls for a greater focus on heterogeneity amongst waste workers. Multi-dimensional vulnerabilities manifest through these workers’ deal-making strategies, while simultaneously mirroring the conditions of marginality produced by the state. The article contributes to debates on marginality by employing the lens of erasure to show how exclusion relies on the optics of visibility and invisibility. By unpicking the hierarchical structure within one waste worker organization, the article argues that the state-led mandate for garbage-free cities in India disproportionately affects those located at the margins of marginalized groups.  相似文献   

18.
Targeted advertising can benefit consumers through lower prices for access to web sites. Yet, if consumers dislike that web sites collect their personal information, their welfare may go down. We study competition for consumers between web sites that can show targeted advertisements. We find that more targeting increases competition and reduces the web sites' profits, but yet in equilibrium web sites choose maximum targeting as they cannot credibly commit to low targeting. A privacy protection policy can be beneficial for both consumers and web sites. If consumers are heterogeneous in their concerns for privacy, a policy that allows choice between two levels of privacy will be better. Optimal privacy protection takes into account that the more intense competition on the high‐targeting market segment also benefits consumers on the less competitive segment. Consumer surplus is maximized by allowing them a choice between a high‐targeting regime and a low‐targeting regime which affords more privacy.  相似文献   

19.
The increasing prevalence of externalised work arrangements in industrialised countries has brought with it ever greater managerial complexity in the workplace. This article explores how leadership behaviour is perceived by internal and external workers within a public authority in Sweden. Questionnaire data from 505 temporary agency workers (TAWs), contractors and internal employees have been analysed. Multinomial logistic regression analyses indicate that external workers such as TAWs and contractors are more likely than internal employees to notice leadership profiles, including pronounced, task‐oriented leadership behaviour. These results hold true when controlled for demographic and socio‐economic variables and organisational tenure. A practical implication is that explicit attention should be paid to the need for leadership training in developing HRM strategies with regard to external employees.  相似文献   

20.
A great deal of attention in the literature has focused upon employers' stereotypical perceptions of Central and Eastern European workers as ‘good workers’, and the impact such views have on hiring processes in low‐skilled employment. Drawing on multiple case studies, this paper examines the good worker rhetoric through the lens of the effort bargaining process and hard HRM strategies that target marginalised workers in the labour market. In particular, the extent to which migrant workers buy into the rhetoric is explored. It is argued that migrant workers do not fully buy in to the good worker rhetoric because of issues such as high levels of education and personal aspirations and importantly, issues related to employers' strategies, bullying, discrimination, and the segmentation of migrant workers in each organisation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号