111 research outputs found

    A Game-Theoretic Study on Non-Monetary Incentives in Data Analytics Projects with Privacy Implications

    Full text link
    The amount of personal information contributed by individuals to digital repositories such as social network sites has grown substantially. The existence of this data offers unprecedented opportunities for data analytics research in various domains of societal importance including medicine and public policy. The results of these analyses can be considered a public good which benefits data contributors as well as individuals who are not making their data available. At the same time, the release of personal information carries perceived and actual privacy risks to the contributors. Our research addresses this problem area. In our work, we study a game-theoretic model in which individuals take control over participation in data analytics projects in two ways: 1) individuals can contribute data at a self-chosen level of precision, and 2) individuals can decide whether they want to contribute at all (or not). From the analyst's perspective, we investigate to which degree the research analyst has flexibility to set requirements for data precision, so that individuals are still willing to contribute to the project, and the quality of the estimation improves. We study this tradeoff scenario for populations of homogeneous and heterogeneous individuals, and determine Nash equilibria that reflect the optimal level of participation and precision of contributions. We further prove that the analyst can substantially increase the accuracy of the analysis by imposing a lower bound on the precision of the data that users can reveal

    AN ONLINE EXPERIMENT ON CONSUMERS\u27 SUSCEPTIBILITY TO FALL FOR POST-TRANSACTION MARKETING SCAMS

    Get PDF
    Post-transaction marketing offers are often designed to trick consumers into purchasing products they would not want. To increase the frequncy of transactions, retailers use strategies such as subscribing consumers by default to offers, camouflaging post-transaction offers as part of primary transactions, and being unclear about the terms of the offer. Further, sharing agreements for personal consumer data and payment credentials between first and third-party retailers violate consumers´ expectations about privacy and business conduct. Some of these tactics have been mitigated in the United States with the Restore Online Shoppers´ Confidence Act (ROSCA). In this paper, we report the results from an online post-transaction marketing experiment. We involve over 500 consumers in a purchasing episode (i.e., a functional mock-up music store) followed by a post-transaction marketing offer with low valu to consumers. In the experiment, we systematically vary important design characteristics on the offer page, and collect additional data through a post-experimental qustionnaire. We investigate which factors are most predictive of acceptance of the low-valu post-transaction offer. We find that ROSCA´s interventions are a step in the right direction and should be considered by European regulators, but do not go far enough

    IntRepair: Informed Repairing of Integer Overflows

    Full text link
    Integer overflows have threatened software applications for decades. Thus, in this paper, we propose a novel technique to provide automatic repairs of integer overflows in C source code. Our technique, based on static symbolic execution, fuses detection, repair generation and validation. This technique is implemented in a prototype named IntRepair. We applied IntRepair to 2,052C programs (approx. 1 million lines of code) contained in SAMATE's Juliet test suite and 50 synthesized programs that range up to 20KLOC. Our experimental results show that IntRepair is able to effectively detect integer overflows and successfully repair them, while only increasing the source code (LOC) and binary (Kb) size by around 1%, respectively. Further, we present the results of a user study with 30 participants which shows that IntRepair repairs are more than 10x efficient as compared to manually generated code repairsComment: Accepted for publication at the IEEE TSE journal. arXiv admin note: text overlap with arXiv:1710.0372
    corecore