Skip to main content

Incentive Schemes for Privacy-Sensitive Consumers

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9406))

Included in the following conference series:

Abstract

Businesses (retailers) often offer personalized advertisements (coupons) to individuals (consumers). While proving a customized shopping experience, such coupons can provoke strong reactions from consumers who feel their privacy has been violated. Existing models for privacy try to quantify privacy risk but do not capture the subjective experience and heterogeneous expression of privacy-sensitivity. We use a Markov decision process (MDP) model for this problem. Our model captures different consumer privacy sensitivities via a time-varying state, different coupon types via an action set for the retailer, and a cost for perceived privacy violations that depends on the action and state. The simplest version of our model has two states (“Normal” and “Alerted”), two coupons (targeted and untargeted), and consumer behavior dynamics known to the retailer. We show that the optimal coupon-offering strategy for a retailer that wishes to minimize its expected discounted cost is a stationary threshold-based policy. The threshold is a function of all model parameters: the retailer offers a targeted coupon if their belief that the consumer is in the “Alerted” state is below the threshold. We extend our model and results to consumers with multiple privacy-sensitivity states as well as coupon-dependent state transition probabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hill, K.: How target figured out a teen girl was pregnant before her father did (2012). http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-outa-teen-girl-was-pregnant-before-her-father-did/

  2. Dwork, C.: Differential privacy. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 338–340. Springer, New York (2011)

    Google Scholar 

  3. Sankar, L., Kar, S., Tandon, R., Poor, H.V.: Competitive privacy in the smart grid: an information-theoretic approach. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 220–225. IEEE (2011)

    Google Scholar 

  4. Acquisti, A.: The economics of personal data and the economics of privacy. Background Paper for OECD Joint WPISP-WPIE Roundtable, vol. 1 (2010)

    Google Scholar 

  5. Ghosh, A., Roth, A.: Selling privacy at auction. Games Econ. Behav. (2013). Elsevier

    Google Scholar 

  6. Hsu, J., Huang, Z., Roth, A., Roughgarden, T., Wu, Z.S.: Private matchings and allocations. arXiv preprint arXiv:1311.2828 (2013)

  7. Venkitasubramaniam, P.: Privacy in stochastic control: a markov decision process perspective. In: Proceedings of Allerton Conference, pp. 381–388 (2013)

    Google Scholar 

  8. Feinberg, E.A., Shwartz, A., Altman, E.: Handbook of Markov Decision Processes: Methods and Applications. Kluwer Academic Publishers, Boston (2002)

    Book  MATH  Google Scholar 

  9. Lipsa, G.M., Martins, N.C.: Remote state estimation with communication costs for first-order LTI systems. IEEE Trans. Autom. Control 56(9), 2013–2025 (2011)

    Article  MathSciNet  Google Scholar 

  10. Nayyar, A., Başar, T., Teneketzis, D., Veeravalli, V.V.: Optimal strategies for communication and remote estimation with an energy harvesting sensor. IEEE Trans. Autom. Control 58(9), 2246–2260 (2013)

    Article  MathSciNet  Google Scholar 

  11. MacPhee, I., Jordan, B.: Optimal search for a moving target. Probab. Eng. Informational Sci. 9(02), 159–182 (1995)

    Article  MathSciNet  Google Scholar 

  12. Mansourifard, P., Javidi, T., Krishnamachariy, B.: Tracking of real-valued continuous markovian random processes with asymmetric cost and observation. In: American Control Conference (2015)

    Google Scholar 

  13. Ross, S.M.: Quality control under markovian deterioration. Manag. Sci. 17(9), 587–596 (1971)

    Article  MathSciNet  MATH  Google Scholar 

  14. Laourine, A., Tong, L.: Betting on gilbert-elliot channels. IEEE Trans. Wirel. Commun. 9(2), 723–733 (2010)

    Article  Google Scholar 

  15. Bertsekas, D.P.: Dynamic Programming and Optimal Control, vol. 1, 2, issue 2. Athena Scientific, Belmont (1995)

    Google Scholar 

  16. Ross, S.M.: Applied Probability Models with Optimization Applications. Courier Dover Publications, New York (2013)

    Google Scholar 

  17. Huang, C., Sankar, L., Sarwate, A.D.: Designing incentive schemes for privacy-sensitive users. ArXiV, Technical report arXiv:1508.01818 [cs.GT], August 2015

  18. Lovejoy, W.S.: Some monotonicity results for partially observed markov decision processes. Oper. Res. 35(5), 736–743 (1987)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chong Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Huang, C., Sankar, L., Sarwate, A.D. (2015). Incentive Schemes for Privacy-Sensitive Consumers. In: Khouzani, M., Panaousis, E., Theodorakopoulos, G. (eds) Decision and Game Theory for Security. GameSec 2015. Lecture Notes in Computer Science(), vol 9406. Springer, Cham. https://doi.org/10.1007/978-3-319-25594-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25594-1_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25593-4

  • Online ISBN: 978-3-319-25594-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics