共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
为了解决社会网络中二分图数据发布中的隐私保护问题,既要保护隐私信息,又要尽可能保持匿名数据发布后的可用性,使用二分图匿名的k-分组算法,设计和实现了一个二分图匿名的社会网络隐私保护系统,包括:1)上传二分图数据:为了满足不同用户的需求,用户将需要匿名的二分图数据统一保存为三个txt格式的文件,然后上传到系统;2)二分图匿名化:根据用户的隐私保护程度的需求,将二分图中的结点V和结点W进行安全分组处理,并生成匿名的二分图;3)匿名数据的输出:将匿名后的数据保存到用户选择的本地位置. 相似文献
3.
数据作为核心生产要素,对于维持数字经济有序运行具有重要作用。在以数据为基础所构建的网络空间中,虚体与实体的有机结合使得主体之间可以进行跨时间与空间范围的沟通,也有助于通过创新迭代以维持供给与需求的动态匹配。数据是一剂良性催化剂,其价值体现在对传统的经济模式与社会生活进行多方面改进,涉及技术、劳动、交易等问题。因此,数据的价值分配是一项涉及面广、复杂性高的工作。数据产权包括原始数据生产者的使用权、隐私权以及数据机构的获益权,数据贡献表现为追踪市场趋势、生产要素联动、敏捷创新常态化,数据收益可以区分为存量式收益和增量式收益两类。 相似文献
4.
经过查找《统计年鉴》和《国民经济与社会发展统计公报》,搜集了2018年陕西10个城市投入产出指标的相关数据和环境因素影响指标的原始数据(表略)。1.DEA和SE-DEA的实证分析考虑决策单元的个数大于等于投入和产出指标个数之和的2倍之后,选取的10个决策单元,3个投入指标和2个产出指标,使得测算结果具有科学性和可用性。 相似文献
5.
6.
7.
随着移动互联网的迅猛发展,个人在使用智能移动终端的同时,也将隐私数据主动或被动的传到了网络之中,这些数据一旦泄露或被利用,小则暴露个人隐私,大则危害国家安全。介绍了隐私泄露的常见途径及危害,并给出了隐私保护的对策和建议。 相似文献
8.
9.
10.
11.
Richard A. Hamilton Lisa D. Spiller 《International Journal of Nonprofit & Voluntary Sector Marketing》1999,4(3):251-264
The availability of personal information is at an all-time high. Technology has revolutionised the marketing industry, enabling marketers to achieve precise selectivity through database efforts. With this selectivity comes the responsibility of determining acceptable and unacceptable uses of personal information by businesses and nonprofits for marketing purposes. This paper explores opinions on information privacy by investigating the impact of education in the formulation of opinions on the use of personal information for marketing purposes. A single credit course in direct marketing does not change opinions regarding information privacy. But a series of credit marketing courses does reduce the level of restrictions desired on the availability and use of personal information for marketing. Thus, the direct marketing industry would be better served by promoting and demonstrating the ethical use of personal information through ethical marketing practices by all its practitioners rather than by attempting to educate the general public about the nature and uses of such information and data for marketing purposes. Copyright © 1999 Henry Stewart Publications 相似文献
12.
Giovanna Menardi 《Revue internationale de statistique》2016,84(3):413-433
In spite of the current availability of numerous methods of cluster analysis, evaluating a clustering configuration is questionable without the definition of a true population structure, representing the ideal partition that clustering methods should try to approximate. A precise statistical notion of cluster, unshared by most of the mainstream methods, is provided by the density‐based approach, which assumes that clusters are associated to some specific features of the probability distribution underlying the data. The non‐parametric formulation of this approach, known as modal clustering, draws a correspondence between the groups and the modes of the density function. An appealing implication is that the ill‐specified task of cluster detection can be regarded to as a more circumscribed problem of estimation, and the number of clusters is also conceptually well defined. In this work, modal clustering is critically reviewed from both conceptual and operational standpoints. The main directions of current research are outlined as well as some challenges and directions of further research. 相似文献
13.
《Information and Organization》2023,33(1):100455
Information privacy is increasingly important in our digitally connected world, particularly in healthcare, and privacy regulations are ramping up to promote appropriate privacy practices. As a digital platform that enables healthcare providers to exchange protected health information (PHI), a health information exchange (HIE) is governed by health information privacy regulations. The challenge for HIEs is to operate in a way that will maximize information exchange while maintaining compliance with regulations that may constrain the sharing of PHI. Regulations impose a measure of universality through compliance requirements, while being flexible to allow adaptation to the local context. However, our longitudinal case study into the privacy policies of an HIE, demonstrates that the journey of privacy ideas from their original formulation in regulations, to their ultimate enactment in an organizational setting, is accompanied by translations, such that the final implementation may vary extensively from its original form. Such variability often results in interpretations that differ from what the regulators intended. Consequently, translation guardrails are necessary to protect against problematic translations of regulatory ideas which could lead to compliance issues and loss of platform participation. Our findings offer two contributions. First, we contribute to the compliance literature by explaining how guardrails can balance the use of permission and obligation schemas which are necessary to translate regulations into effective organizational policies for the success of HIEs and other information exchange platforms. Second, we contribute to extending translation theory by explaining how pragmatic reasoning schemas function as the mechanism through which translation of regulations occurs. 相似文献
14.
Rebecca C. Steorts Timo Schmid Nikos Tzavidis 《Revue internationale de statistique》2020,88(3):580-598
Small area estimation is concerned with methodology for estimating population parameters associated with a geographic area defined by a cross-classification that may also include non-geographic dimensions. In this paper, we develop constrained estimation methods for small area problems: those requiring smoothness with respect to similarity across areas, such as geographic proximity or clustering by covariates, and benchmarking constraints, requiring weighted means of estimates to agree across levels of aggregation. We develop methods for constrained estimation decision theoretically and discuss their geometric interpretation. The constrained estimators are the solutions to tractable optimisation problems and have closed-form solutions. Mean squared errors of the constrained estimators are calculated via bootstrapping. Our approach assumes the Bayes estimator exists and is applicable to any proposed model. In addition, we give special cases of our techniques under certain distributional assumptions. We illustrate the proposed methodology using web-scraped data on Berlin rents aggregated over areas to ensure privacy. 相似文献
15.
Michael R. Baye David E. M. Sappington 《Journal of Economics & Management Strategy》2020,29(2):260-275
We examine the effects of privacy policies regarding transactions (e.g., price/quantity) data on online shopping platforms. Disclosure of transactions data induces consumer signaling behavior that affects merchant pricing decisions and the welfare of platform participants. A profit‐maximizing platform prefers the disclosure policy that maximizes total welfare. Although this policy benefits sophisticated consumers, it harms unsophisticated (myopic) consumers. Consequently, the welfare effects of alternative privacy policies, data breaches, deceptive privacy policies, and opt‐in/opt‐out requirements can differ sharply, depending on the level of consumer sophistication and on other factors such as the prevailing status quo. 相似文献
16.
Carla Gonçalves Ricardo J. Bessa Pierre Pinson 《International Journal of Forecasting》2021,37(1):322-342
Cooperation between different data owners may lead to an improvement in forecast quality—for instance, by benefiting from spatiotemporal dependencies in geographically distributed time series. Due to business competitive factors and personal data protection concerns, however, said data owners might be unwilling to share their data. Interest in collaborative privacy-preserving forecasting is thus increasing. This paper analyzes the state-of-the-art and unveils several shortcomings of existing methods in guaranteeing data privacy when employing vector autoregressive models. The methods are divided into three groups: data transformation, secure multi-party computations, and decomposition methods. The analysis shows that state-of-the-art techniques have limitations in preserving data privacy, such as (i) the necessary trade-off between privacy and forecasting accuracy, empirically evaluated through simulations and real-world experiments based on solar data; and (ii) iterative model fitting processes, which reveal data after a number of iterations. 相似文献
17.
Joseph Ficek Wei Wang Henian Chen Getachew Dagne Ellen Daley 《Revue internationale de statistique》2021,89(1):132-147
Differential privacy is a framework for data analysis that provides rigorous privacy protections for database participants. It has increasingly been accepted as the gold standard for privacy in the analytics industry, yet there are few techniques suitable for statistical inference in the health sciences. This is notably the case for regression, one of the most widely used modelling tools in clinical and epidemiological studies. This paper provides an overview of differential privacy and surveys the literature on differentially private regression, highlighting the techniques that hold the most relevance for statistical inference as practiced in clinical and epidemiological research. Research gaps and opportunities for further inquiry are identified. 相似文献
18.
Thomas W. Dillon Arthur J. Hamilton Daphyne S. Thomas Mark L. Usry 《Employee Responsibilities and Rights Journal》2008,20(2):119-139
Employers today are faced with the task of managing workplace privacy, dealing with potential litigation, preserving the confidentiality
of company information while protecting the rights of the employee. Since September 11, 2001, employers have faced new challenges
including the implementation of new laws and the development of more sophisticated technology. As a result, workplace policies
dealing with privacy must be clearly and effectively communicated to all affected workers. The objective of this survey research
project was to measure the general public’s attitudes and perceptions of the communication of work place privacy policies.
An emphasis was placed on the collection of real world data from multiple business and organizational environments, as opposed
to data obtained in a controlled experimental setting. 相似文献
19.
Bice Cavallo Gerardo Canfora Livia D’Apuzzo Massimo Squillante 《Quality and Quantity》2014,48(4):1957-1972
By means of an integration of decision theory and probabilistic models, we explore and develop methods for improving data privacy. Our work encompasses disclosure control tools in statistical databases and privacy requirements prioritization; in particular we propose a Bayesian approach for the on-line auditing in Statistical Databases and Pairwise Comparison Matrices for privacy requirements prioritization. The first approach is illustrated by means of examples in the context of statistical analysis on the census and medical data, where no salary (resp. no medical information), that could be related to a specific employee (resp. patient), must be released; the second approach is illustrated by means of examples, such as an e-voting system and an e-banking service that have to satisfy privacy requirements in addition to functional and security ones. Several fields in the social sciences, economics and engineering will benefit from the advances in this research area: e-voting, e-government, e-commerce, e-banking, e-health, cloud computing and risk management are a few examples of applications for the findings of this research. 相似文献
20.
Randomized response (say, RR) techniques on survey are used for collecting data on sensitive issues while trying to protect
the respondents’ privacy. The degree of confidentiality will clearly determine whether or not respondents choose to cooperate.
There have been many proposals for privacy measures with very different implications for an optimal model design. These derived
measures of protection privacy involve both conditional probabilities of being perceived as belonging to sensitive group,
denoted as P(A|yes) and P(A|no). In this paper, we introduce an alternative criterion to measure privacy protection and reconsider and compare some RR models
in the light of the efficiency/protection privacy. This measure is known to the respondents before they agree to use the RR
model. This measure is helpful for choosing an optimal RR model in practice. 相似文献