Skip to main content
Erschienen in: Dynamic Games and Applications 4/2021

21.04.2021

Privacy, Patience, and Protection

verfasst von: Ronen Gradwohl, Rann Smorodinsky

Erschienen in: Dynamic Games and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We analyze repeated games in which players have private information about their levels of patience and in which they would like to maintain the privacy of this information vis-à-vis third parties. We show that privacy protection in the form of shielding players’ actions from outside observers is harmful, as it limits and sometimes eliminates the possibility of attaining Pareto-optimal payoffs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
Such an association is corroborated by surveys of individuals’ privacy concerns, such as Rainie et al. [46] and Madden et al. [36].
 
2
Loosely, a mechanism satisfies \(\varepsilon \)-DP for some individual i if the distribution over the outcomes of the mechanism with i present is \(\varepsilon \)-close to the distribution with i absent [16]. See Dwork [17] for a survey and Abowd and Schmutte [1] for a discussion of DP from an economic point of view.
 
3
This is captured by the celebrated folk theorem—see, for example, Theorem 13.17 of Maschler et al. [39].
 
4
See Sect. 5 for a discussion of this assumption on the extreme nature of patience and impatience.
 
5
This future game may take the form of a bargaining game, à la Rubinstein [49], in which case they would have an advantage if they were to be perceived as patient. Alternatively, the future game could take the form of the buyer–seller bargaining model of Fudenberg and Tirole [22], where, in equilibrium, impatient buyers obtain the goods at lower prices. Given the ambiguity of the future interaction, the buyers would rather not have their type revealed in the current game.
 
6
Section 4 is significantly longer and more complex than Sect. 3, as the latter is a possibility result that involves an equilibrium construction, whereas the former is an impossibility result that shows that no equilibrium attains particular Pareto-optimal outcomes.
 
7
As an example of nonexistence, suppose payoffs consist of a sequence of \(10^k\) 0’s, then \(10^{k+1}\) 1’s, then \(10^{k+2}\) 0’s, and so on. In this case the \(\liminf \) is 0 whereas the \(\limsup \) is 1, and so the limit does not exist.
 
8
If we consider payoffs at a random period, then when there is a finite horizon this would equal the mean payoff. A natural extension of this criterion to the game with an infinite horizon is the limit of the finite horizon means, as we propose.
 
9
We will assume that the long-sighted player incurs a disutility that depends on the prior and the belief after the repeated interaction. The short-sighted player can be modeled in one of two ways: either he also incurs a disutility that depends on the prior and on the belief after the repeated interaction, or he incurs a disutility that depends on the beliefs before and after each stage. We will adopt the latter for simplicity; using the former, however, would not alter our results.
 
10
The short-sighted type may incur costs at each stage, and so we do not require his costs to be nonnegative to avoid dynamic inconsistency (see [30], for discussion).
 
11
The existence of the expectations for the costs is guaranteed by the boundedness of \(c_i\)—see, for example, Theorem 4 of Royden and Fitzpatrick [48].
 
12
Long-run payoffs in our model are the limit-of-means of stage games, and so on the same order of magnitude, but our results would be unchanged if the long-run payoffs were a large multiplicative factor of the limit-of-means, in which case the privacy cost would be small when compared with the long-run payoffs.
 
13
These are needed for Lemma 4 and consequently one claim of Theorem 2. For any game, they hold with probability 1 following a perturbation of the utilities.
 
14
An alternative definition is \(\mathrm {PF}=\{v\in V^*: \not \exists v'\in V^*~\text{ s.t. }~v'> v\}\) (the difference is in the inequality). If \(V^*\) is a rectangle, for example, then the question is whether the top and right segments are part of \(\mathrm {PF}\) or just the top right vertex. The choice of definition does not matter for our results.
 
15
The symmetry and genericity assumptions in the second bullet are necessary for our proof (in particular, for the proof of Lemma 4), but we do not know if they are necessary for the result to hold.
 
16
Recall that the limit exists with probability 1 by Definition 1.
 
17
See the proof of Proposition 5 in Fudenberg et al. [21] for details and definitions of \(I_t\) and \(m^i\).
 
18
Note that the cases are not mutually exclusive, and that the latter two would suffice. We include the first for illustrative purposes and because it involves a shorter revelation phase.
 
Literatur
1.
Zurück zum Zitat Abowd JM, Schmutte IM (2019) An economic analysis of privacy protection and statistical accuracy as social choices. Am Econ Rev 109:171–202CrossRef Abowd JM, Schmutte IM (2019) An economic analysis of privacy protection and statistical accuracy as social choices. Am Econ Rev 109:171–202CrossRef
2.
Zurück zum Zitat Acquisti A, Taylor CR, Wagman L (2016) The economics of privacy. J Econ Lit 54:442–492CrossRef Acquisti A, Taylor CR, Wagman L (2016) The economics of privacy. J Econ Lit 54:442–492CrossRef
3.
Zurück zum Zitat Ali SN, Bénabou R (2020) Image versus information: changing societal norms and optimal privacy. Am Econ J: Microecon 12(3):116–164 Ali SN, Bénabou R (2020) Image versus information: changing societal norms and optimal privacy. Am Econ J: Microecon 12(3):116–164
5.
Zurück zum Zitat Aumann RJ, Maschler M, Stearns RE (1995) Repeated games with incomplete information. MIT press, Cambridge Aumann RJ, Maschler M, Stearns RE (1995) Repeated games with incomplete information. MIT press, Cambridge
7.
Zurück zum Zitat Becker GS (1974) A theory of social interactions. J Polit Econ 82(6):1063–1093 Becker GS (1974) A theory of social interactions. J Polit Econ 82(6):1063–1093
8.
Zurück zum Zitat Benabou R, Tirole J (2006) Incentives and prosocial behavior. Am Econ Rev 96(5):1652–1678CrossRef Benabou R, Tirole J (2006) Incentives and prosocial behavior. Am Econ Rev 96(5):1652–1678CrossRef
9.
Zurück zum Zitat Bergemann D, Hörner J (2018) Should first-price auctions be transparent? Am Econ J: Microecon 10:177–218 Bergemann D, Hörner J (2018) Should first-price auctions be transparent? Am Econ J: Microecon 10:177–218
10.
Zurück zum Zitat Bernheim BD (1994) A theory of conformity. J Polit Econ 102(5):841–877CrossRef Bernheim BD (1994) A theory of conformity. J Polit Econ 102(5):841–877CrossRef
11.
Zurück zum Zitat Calzolari G, Pavan A (2006) On the optimality of privacy in sequential contracting. J Econ Theory 130:168–204MathSciNetCrossRef Calzolari G, Pavan A (2006) On the optimality of privacy in sequential contracting. J Econ Theory 130:168–204MathSciNetCrossRef
12.
Zurück zum Zitat Chaves IN (2019) Privacy in bargaining: the case of endogenous entry. Available at SSRN 3420766 Chaves IN (2019) Privacy in bargaining: the case of endogenous entry. Available at SSRN 3420766
13.
Zurück zum Zitat Chen Y, Chong S, Kash IA, Moran T, Vadhan S (2013) Truthful mechanisms for agents that value privacy. In: Proceedings of the fourteenth ACM conference on Electronic commerce. ACM, pp 215–232 Chen Y, Chong S, Kash IA, Moran T, Vadhan S (2013) Truthful mechanisms for agents that value privacy. In: Proceedings of the fourteenth ACM conference on Electronic commerce. ACM, pp 215–232
14.
Zurück zum Zitat Chen Y, Sheffet O, Vadhan S (2014) Privacy games. Web and internet economics. Springer, Newyork, pp 371–385CrossRef Chen Y, Sheffet O, Vadhan S (2014) Privacy games. Web and internet economics. Springer, Newyork, pp 371–385CrossRef
16.
Zurück zum Zitat Dinur I, Nissim K (2003) Revealing information while preserving privacy. In: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp 202–210 Dinur I, Nissim K (2003) Revealing information while preserving privacy. In: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp 202–210
17.
Zurück zum Zitat Dwork C (2008) Differential privacy: a survey of results. International conference on theory and applications of models of computation. Springer, Newyork, pp 1–19 Dwork C (2008) Differential privacy: a survey of results. International conference on theory and applications of models of computation. Springer, Newyork, pp 1–19
18.
Zurück zum Zitat Dwork C, Nissim K (2004) Privacy-preserving datamining on vertically partitioned databases. Annual international cryptology conference. Springer, Newyork, pp 528–544 Dwork C, Nissim K (2004) Privacy-preserving datamining on vertically partitioned databases. Annual international cryptology conference. Springer, Newyork, pp 528–544
19.
Zurück zum Zitat Dwork C, Smith A (2010) Differential privacy for statistics: what we know and what we want to learn. J Priv Confid 1:2 Dwork C, Smith A (2010) Differential privacy for statistics: what we know and what we want to learn. J Priv Confid 1:2
20.
Zurück zum Zitat Friedrichsen J (2013) Signals sell: designing a product line when consumers have social image concerns. Tech. rep., Discussion paper, Social Science Research Center Berlin (WZB), Research area markets and choice, research unit market behavior Friedrichsen J (2013) Signals sell: designing a product line when consumers have social image concerns. Tech. rep., Discussion paper, Social Science Research Center Berlin (WZB), Research area markets and choice, research unit market behavior
21.
Zurück zum Zitat Fudenberg D, Kreps DM, Maskin ES (1990) Repeated games with long-run and short-run players. Rev Econ Stud 57:555–573MathSciNetCrossRef Fudenberg D, Kreps DM, Maskin ES (1990) Repeated games with long-run and short-run players. Rev Econ Stud 57:555–573MathSciNetCrossRef
22.
23.
Zurück zum Zitat Fudenberg D, Villas-Boas JM (2006) Behavior-based price discrimination and customer recognition. Handb Econ Inf Syst 1:377–436 Fudenberg D, Villas-Boas JM (2006) Behavior-based price discrimination and customer recognition. Handb Econ Inf Syst 1:377–436
24.
Zurück zum Zitat Geanakoplos J, Pearce D, Stacchetti E (1989) Psychological games and sequential rationality. Games Econ Behav 1:60–79MathSciNetCrossRef Geanakoplos J, Pearce D, Stacchetti E (1989) Psychological games and sequential rationality. Games Econ Behav 1:60–79MathSciNetCrossRef
26.
Zurück zum Zitat Gilboa I, Schmeidler D (1988) Information dependent games: can common sense be common knowledge? Econ Lett 27:215–221MathSciNetCrossRef Gilboa I, Schmeidler D (1988) Information dependent games: can common sense be common knowledge? Econ Lett 27:215–221MathSciNetCrossRef
27.
Zurück zum Zitat Glazer A, Konrad K (1996) A signaling explanation for charity. Am Econ Rev 86:1019–1028 Glazer A, Konrad K (1996) A signaling explanation for charity. Am Econ Rev 86:1019–1028
28.
Zurück zum Zitat Glicksberg IL (1952) A further generalization of the Kakutani fixed point theorem, with application to Nash equilibrium points. Proceed Am Math Soc 3:170–174MathSciNetMATH Glicksberg IL (1952) A further generalization of the Kakutani fixed point theorem, with application to Nash equilibrium points. Proceed Am Math Soc 3:170–174MathSciNetMATH
29.
Zurück zum Zitat Gradwohl R, Smorodinsky R (2014) Subjective perception games and privacy. CoRR, abs/1409.1487 Gradwohl R, Smorodinsky R (2014) Subjective perception games and privacy. CoRR, abs/1409.1487
31.
Zurück zum Zitat Harrington JE Jr, Zhao W (2012) Signaling and tacit collusion in an infinitely repeated Prisoners’ Dilemma. Math Soc Sci 64(3):277–289 Harrington JE Jr, Zhao W (2012) Signaling and tacit collusion in an infinitely repeated Prisoners’ Dilemma. Math Soc Sci 64(3):277–289
32.
33.
Zurück zum Zitat Ireland N (1994) On limiting the market for status signals. J Publ Econ 53:91–110CrossRef Ireland N (1994) On limiting the market for status signals. J Publ Econ 53:91–110CrossRef
34.
36.
Zurück zum Zitat Madden M, Rainie L, Zickuhr K, Duggan M, Smith A (2014) Public perceptions of privacy and security in the post-snowden era. Pew Res Center 12(9):e0184525 Madden M, Rainie L, Zickuhr K, Duggan M, Smith A (2014) Public perceptions of privacy and security in the post-snowden era. Pew Res Center 12(9):e0184525
37.
Zurück zum Zitat Mailath GJ, Samuelson L (2006) Repeated games and reputations: long-run relationships. Oxford University Press, Oxford Mailath GJ, Samuelson L (2006) Repeated games and reputations: long-run relationships. Oxford University Press, Oxford
38.
Zurück zum Zitat Maor C, Solan E (2015) Cooperation under incomplete information on the discount factors. Int J Game Theory 44:321–346MathSciNetCrossRef Maor C, Solan E (2015) Cooperation under incomplete information on the discount factors. Int J Game Theory 44:321–346MathSciNetCrossRef
39.
Zurück zum Zitat Maschler M, Solan E, Zamir S (2013) Game Theory. Cambridge University Press, CambridgeCrossRef Maschler M, Solan E, Zamir S (2013) Game Theory. Cambridge University Press, CambridgeCrossRef
40.
Zurück zum Zitat McSherry F, Talwar K (2007) Mechanism design via differential privacy. In: Foundations of computer science, 2007. FOCS’07. 48th Annual IEEE Symposium on. IEEE, pp 94–103 McSherry F, Talwar K (2007) Mechanism design via differential privacy. In: Foundations of computer science, 2007. FOCS’07. 48th Annual IEEE Symposium on. IEEE, pp 94–103
41.
Zurück zum Zitat Nissim K, Orlandi C, Smorodinsky R (2012a) Privacy-aware mechanism design. In: Proceedings of the 13th ACM Conference on Electronic Commerce. ACM, pp 774–789 Nissim K, Orlandi C, Smorodinsky R (2012a) Privacy-aware mechanism design. In: Proceedings of the 13th ACM Conference on Electronic Commerce. ACM, pp 774–789
42.
Zurück zum Zitat Nissim K, Smorodinsky R, Tennenholtz M (2012b) Approximately optimal mechanism design via differential privacy. In: Proceedings of the 3rd innovations in theoretical computer science conference. ACM, pp 203–213 Nissim K, Smorodinsky R, Tennenholtz M (2012b) Approximately optimal mechanism design via differential privacy. In: Proceedings of the 3rd innovations in theoretical computer science conference. ACM, pp 203–213
43.
Zurück zum Zitat Osborne MJ, Rubinstein A (1994) A course in game theory. MIT press, CambridgeMATH Osborne MJ, Rubinstein A (1994) A course in game theory. MIT press, CambridgeMATH
44.
Zurück zum Zitat Posner RA (1981) The economics of privacy. Am Econ Rev 71:405–409 Posner RA (1981) The economics of privacy. Am Econ Rev 71:405–409
45.
Zurück zum Zitat Prat A (2005) The wrong kind of transparency. Am Econ Rev 95:862–877CrossRef Prat A (2005) The wrong kind of transparency. Am Econ Rev 95:862–877CrossRef
48.
Zurück zum Zitat Royden HL, Fitzpatrick P (1988) Real analysis. Macmillan, New YorkMATH Royden HL, Fitzpatrick P (1988) Real analysis. Macmillan, New YorkMATH
49.
Zurück zum Zitat Rubinstein A (1982) Perfect equilibrium in a bargaining model. Econometrica J Econ Soc. 97–109 Rubinstein A (1982) Perfect equilibrium in a bargaining model. Econometrica J Econ Soc. 97–109
50.
Zurück zum Zitat Sobel J (2009) Signaling games. Encyclopedia of complexity and systems science. Springer, Newyork, pp 8125–8139CrossRef Sobel J (2009) Signaling games. Encyclopedia of complexity and systems science. Springer, Newyork, pp 8125–8139CrossRef
51.
Zurück zum Zitat Taylor CR (2004) Consumer privacy and the market for customer information. RAND J Econ 35:631–650CrossRef Taylor CR (2004) Consumer privacy and the market for customer information. RAND J Econ 35:631–650CrossRef
Metadaten
Titel
Privacy, Patience, and Protection
verfasst von
Ronen Gradwohl
Rann Smorodinsky
Publikationsdatum
21.04.2021
Verlag
Springer US
Erschienen in
Dynamic Games and Applications / Ausgabe 4/2021
Print ISSN: 2153-0785
Elektronische ISSN: 2153-0793
DOI
https://doi.org/10.1007/s13235-021-00386-z

Weitere Artikel der Ausgabe 4/2021

Dynamic Games and Applications 4/2021 Zur Ausgabe

Premium Partner