28,751 research outputs found

    Using Metrics Suites to Improve the Measurement of Privacy in Graphs

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Social graphs are widely used in research (e.g., epidemiology) and business (e.g., recommender systems). However, sharing these graphs poses privacy risks because they contain sensitive information about individuals. Graph anonymization techniques aim to protect individual users in a graph, while graph de-anonymization aims to re-identify users. The effectiveness of anonymization and de-anonymization algorithms is usually evaluated with privacy metrics. However, it is unclear how strong existing privacy metrics are when they are used in graph privacy. In this paper, we study 26 privacy metrics for graph anonymization and de-anonymization and evaluate their strength in terms of three criteria: monotonicity indicates whether the metric indicates lower privacy for stronger adversaries; for within-scenario comparisons, evenness indicates whether metric values are spread evenly; and for between-scenario comparisons, shared value range indicates whether metrics use a consistent value range across scenarios. Our extensive experiments indicate that no single metric fulfills all three criteria perfectly. We therefore use methods from multi-criteria decision analysis to aggregate multiple metrics in a metrics suite, and we show that these metrics suites improve monotonicity compared to the best individual metric. This important result enables more monotonic, and thus more accurate, evaluations of new graph anonymization and de-anonymization algorithms

    One-step Estimation of Networked Population Size: Respondent-Driven Capture-Recapture with Anonymity

    Get PDF
    Population size estimates for hidden and hard-to-reach populations are particularly important when members are known to suffer from disproportion health issues or to pose health risks to the larger ambient population in which they are embedded. Efforts to derive size estimates are often frustrated by a range of factors that preclude conventional survey strategies, including social stigma associated with group membership or members' involvement in illegal activities. This paper extends prior research on the problem of network population size estimation, building on established survey/sampling methodologies commonly used with hard-to-reach groups. Three novel one-step, network-based population size estimators are presented, to be used in the context of uniform random sampling, respondent-driven sampling, and when networks exhibit significant clustering effects. Provably sufficient conditions for the consistency of these estimators (in large configuration networks) are given. Simulation experiments across a wide range of synthetic network topologies validate the performance of the estimators, which are seen to perform well on a real-world location-based social networking data set with significant clustering. Finally, the proposed schemes are extended to allow them to be used in settings where participant anonymity is required. Systematic experiments show favorable tradeoffs between anonymity guarantees and estimator performance. Taken together, we demonstrate that reasonable population estimates can be derived from anonymous respondent driven samples of 250-750 individuals, within ambient populations of 5,000-40,000. The method thus represents a novel and cost-effective means for health planners and those agencies concerned with health and disease surveillance to estimate the size of hidden populations. Limitations and future work are discussed in the concluding section

    A Theory of Attribution

    Get PDF
    Attribution of economic joint effects is achieved with a random order model of their relative importance. Random order consistency and elementary axioms uniquely identify linear and proportional marginal attribution. These are the Shapley (1953) and proportional (Feldman (1999, 2002) and Ortmann (2000)) values of the dual of the implied cooperative game. Random order consistency does not use a reduced game. Restricted potentials facilitate identification of proportional value derivatives and coalition formation results. Attributions of econometric model performance, using data from Fair (1978), show stability across models. Proportional marginal attribution (PMA) is found to correctly identify factor relative importance and to have a role in model construction. A portfolio attribution example illuminates basic issues regarding utility attribution and demonstrates investment applications. PMA is also shown to mitigate concerns (e.g., Thomas (1977)) regarding strategic behavior induced by linear cost attribution.Coalition formation; consistency; cost allocation; joint effects; proportional value; random order model; relative importance; restricted potential; Shapley value and variance decomposition

    Evaluating Marketing Channel Options for Small-Scale Fruit and Vegetable Producers: Case Study Evidence from Central New York

    Get PDF
    An investigation of the relative costs and benefits of marketing channels used by typical small-scale diversified vegetable crop producers is conducted. Using case study evidence from four small farms in Central New York, this study compares the performance of wholesale and direct marketing channels, including how the factors of risk, owner and paid labor, price, lifestyle preferences, and sales volume interact to impact optimal market channel selection. Given the highly perishable nature of the crops grown, along with the risks and potential sales volume of particular channels, a combination of different marketing channels is needed to maximize overall firm performance. Accordingly, a ranking system is developed to summarize the major firm-specific factors across channels and to prioritize those channels with the greatest opportunity for success based on individual firm preferences.Marketing channel, small-scale, fruit and vegetable producers, case study, Agribusiness, Crop Production/Industries, Financial Economics,

    Determinants of the intention to use performance-enhancing substances among Portuguese gym users

    Get PDF
    The present study examined the determinants of the intentions to use prohibited performance- enhancing substances (PES) and the hypothesis of gender and PES use influencing Theory of Planned Behavior (TPB) variables. A TPB approach was used. A convenience sample of Portuguese gym users (n = 453) completed an anonymous web-based survey. Variance-based structural equation modeling, multigroup analysis strategy, latent mean analysis approach and one-way ANOVA analysis were used. The findings showed that, at structural level, results support the TPB framework in terms of characterizing and predicting intentions to PES use in the gym users sample, and that subjective norms were the strongest predictor of PES use intentions. Female and male differed in intentions to use PES, subjective norms and beliefs. However, the predictive model in study remains invariable in both groups. Concerning PES use, results showed the existence of a significant difference, regarding all the TPB´s constructs of the PES users and nonusers’ groups, and that the predictive capacity of each predictor was different for each group. Psychological strategies should be based on subjective norms, alongside beliefs and attitudes towards PES use, since these variables influence the intention to use PES in that particular population

    Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk

    Full text link
    It is well recognised that data mining and statistical analysis pose a serious treat to privacy. This is true for financial, medical, criminal and marketing research. Numerous techniques have been proposed to protect privacy, including restriction and data modification. Recently proposed privacy models such as differential privacy and k-anonymity received a lot of attention and for the latter there are now several improvements of the original scheme, each removing some security shortcomings of the previous one. However, the challenge lies in evaluating and comparing privacy provided by various techniques. In this paper we propose a novel entropy based security measure that can be applied to any generalisation, restriction or data modification technique. We use our measure to empirically evaluate and compare a few popular methods, namely query restriction, sampling and noise addition.Comment: 20 pages, 4 figure
    corecore