Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Communications of the ACM
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Customer-centric marketing with Internet coupons
Decision Support Systems
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Decision Support Systems
A scalable decision tree system and its application in pattern recognition and intrusion detection
Decision Support Systems
Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data
Information Systems Research
Preprocessing unbalanced data using support vector machine
Decision Support Systems
Secure electronic markets for private information
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Class-Restricted Clustering and Microperturbation for Data Privacy
Management Science
Hi-index | 0.00 |
Organizations today regularly share their customer data with their partners to gain competitive advantages. They are also often requested or even required by a third party to provide customer data that are deemed sensitive. In these circumstances, organizations are obligated to protect the privacy of the individuals involved while still benefiting from sharing data or meeting the requirement for releasing data. In this study, we analyze the tradeoff between privacy and data utility from the perspective of the data owner. We develop an incentive-compatible mechanism for the data owner to price and disseminate private data. With this mechanism, a data user is motivated to reveal his true purpose of data usage and acquire the data that suits to that purpose. Existing economic studies of information privacy primarily consider the interplay between the data owner and the individuals, focusing on problems that occur in the collection of private data. This study, however, examines the privacy issue facing a data owner organization in the distribution of private data to a third party data user when the real purpose of data usage is unclear and the released data could be misused.