Results 1 -
6 of
6
Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments
, 2002
"... Ubiquitous computing environments make the economic analysis of privacy more difficult as they exacerbate information asymmetries and uncertainties. This paper discusses why the actual marketization of privacy is more difficult than its technical protection in these environments. It then ..."
Abstract
-
Cited by 19 (4 self)
- Add to MetaCart
Ubiquitous computing environments make the economic analysis of privacy more difficult as they exacerbate information asymmetries and uncertainties. This paper discusses why the actual marketization of privacy is more difficult than its technical protection in these environments. It then
Contents
, 2013
"... II.1 Wi-Fi service discovery.................................... 7 II.2 Energy saving mode..................................... 7 ..."
Abstract
- Add to MetaCart
(Show Context)
II.1 Wi-Fi service discovery.................................... 7 II.2 Energy saving mode..................................... 7
Identity Theft as a Teachable Moment
"... 2014 This paper examines how instances of identity theft that are sufficiently severe to induce consumers to place an extended fraud alert in their credit reports affect their risk scores, delinquencies, and other credit bureau variables on impact and thereafter. We show that for many consumers thes ..."
Abstract
- Add to MetaCart
(Show Context)
2014 This paper examines how instances of identity theft that are sufficiently severe to induce consumers to place an extended fraud alert in their credit reports affect their risk scores, delinquencies, and other credit bureau variables on impact and thereafter. We show that for many consumers these effects are relatively small and transitory. However, for a significant number of consumers, especially those with lower risk scores prior to the event, there are more persistent and generally positive effects on credit bureau variables, including risk scores. We argue that these positive changes for subprime consumers are consistent with the effect of increased salience of credit file information to the consumer at the time of the identity theft.
BRUSSELS
, 2013
"... The CEPS Digital Forum is a multi-stakeholder platform aimed at raising the level of debate about policy challenges that follow from the European Commission’s Digital Agenda for Europe. It brings together academics, telecommunications operators, broadcasters, equipment manufacturers, content provide ..."
Abstract
- Add to MetaCart
(Show Context)
The CEPS Digital Forum is a multi-stakeholder platform aimed at raising the level of debate about policy challenges that follow from the European Commission’s Digital Agenda for Europe. It brings together academics, telecommunications operators, broadcasters, equipment manufacturers, content providers, application producers, internet players, national regulators and European institutions to enable a constructive dialogue on how to achieve a successful transition to an information society for all stakeholders.
Identification, data combination and the risk of disclosure
"... Businesses routinely rely on econometric models to analyze and predict consumer behavior. Estimation of such models may require combining a firm’s internal data with external datasets to take into account sample selection, missing observations, omitted variables and errors in measurement within the ..."
Abstract
- Add to MetaCart
Businesses routinely rely on econometric models to analyze and predict consumer behavior. Estimation of such models may require combining a firm’s internal data with external datasets to take into account sample selection, missing observations, omitted variables and errors in measurement within the existing data source. In this paper we point out that these data problems can be addressed when estimating econometric models from combined data using the data mining techniques under mild assumptions regarding the data distribution. However, data combination leads to serious threats to security of consumer data: we demonstrate that point identification of an econometric model from combined data is incompatible with restrictions on the risk of individual disclosure. Consequently, if a consumer model is point identified, the firm would (implicitly or explicitly) reveal the identity of at least some of consumers in its internal data. More importantly, we provide an argument that unless the firm places a restriction on the individual disclosure risk when combining data, even if the raw combined dataset is not shared with a third party, an adversary or a competitor can gather confidential information regarding some individuals from the estimated model.
Status: [Final] Class: [Public] File: fidis-wp5-del5.2b.ID-related.crime.doc Summary
"... This deliverable contains the consolidated version of the papers that were prepared for the ID fraud Workshop, held on 18 May 2005 in Tilburg, the Netherlands. The papers discuss ID-related crimes from a legal, a socio-economic, and a technical perspective. It provides an initial presentation of the ..."
Abstract
- Add to MetaCart
This deliverable contains the consolidated version of the papers that were prepared for the ID fraud Workshop, held on 18 May 2005 in Tilburg, the Netherlands. The papers discuss ID-related crimes from a legal, a socio-economic, and a technical perspective. It provides an initial presentation of the vast array of phenomena commonly addressed as ID fraud or ID theft from the various perspectives. The legal chapter briefly discusses the EU legal framework as well as some of the national ID crime provisions. The socio-economic chapter decomposes ID linkage into ID collision, ID change, ID deletion and ID restoration in order to gain a more detailed understanding of the various types of ID crimes. It also discusses the incidence of ID crimes as well as the social and economic effects for victims and businesses. The technical chapter describes a number of technical methods of ID crime, including different perspectives on biometrics. Finally, a chapter on countermeasures describes various socio-economic and technical measures to combat ID-related crime. The objective of this deliverable is to start creating a common ground on which further interdisciplinary research on ID crimes can be developed. The chapters are separate