Affiliation:
1. Harvard University, Cambridge, MA, USA
2. Bar-Ilan University, Ramat-Gan, Israel
Abstract
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizing agents has received much attention lately. Privacy concerns are often modeled by altering the utility functions of agents to consider also their privacy loss [4, 14, 20, 28]. Such privacy-aware agents prefer to take a randomized strategy even in very simple games in which non-privacy-aware agents play pure strategies. In some cases, the behavior of privacy-aware agents follows the framework of Randomized Response, a well-known mechanism that preserves differential privacy.
Our work is aimed at better understanding the behavior of agents in settings where their privacy concerns are explicitly given. We consider a toy setting where agent
A
, in an attempt to discover the secret type of agent
B
, offers
B
a gift that one type of
B
agent likes and the other type dislikes. As opposed to previous works,
B
’s incentive to keep her type a secret isn’t the result of “hardwiring”
B
’s utility function to consider privacy, but rather takes the form of a payment between
B
and
A
. We investigate three different types of payment functions and analyze
B
’s behavior in each of the resulting games. As we show, under some payments,
B
’s behavior is very different than the behavior of agents with hardwired privacy concerns and might even be deterministic. Under a different payment, we show that
B
’s BNE strategy does fall into the framework of Randomized Response.
Publisher
Association for Computing Machinery (ACM)
Subject
Computational Mathematics,Marketing,Economics and Econometrics,Statistics and Probability,Computer Science (miscellaneous)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey;Engineering Applications of Artificial Intelligence;2024-07
2. Exploring Users’ Perspectives of Mobile Health Privacy and Autonomy;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2024
3. More than Privacy;ACM Computing Surveys;2022-09-30
4. Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective;Security and Communication Networks;2021-07-23