The Anticompetitiveness of a Private Information Exchange of Prices

Author(s):  
Joseph E. Harrington
Author(s):  
Scott Flinn ◽  
Scott Buffett

This chapter discusses privacy from the perspective of the consumer of e-services. It proposes a technique for risk management assessment designed to help consumers evaluate a situation to identify and understand potential privacy concerns. The technique centers around a series of questions based on common principles of privacy protection. The chapter discusses how a consumer can understand exposure risks and how information can be controlled and monitored to mitigate the risks. It also proposes a method for assessing the consumer’s value of personal information, and a mechanism for automated negotiation is presented to facilitate fair, private information exchange. The authors believe that these or similar techniques are essential to give consumers of e-services meaningful control over the personal information they release. This forward-looking chapter provides a foundation for developing methods to empower users with control over their private information.


Author(s):  
Emma Van Goethem ◽  
Marleen Easton

There is little research on public-private information sharing partnerships within the security sector and the benefits it may bring to both sectors. This contribution uses insights from previous research on the benefits of public-private partnerships from organisational science, information management, innovation economics, and technology studies to examine whether they are also valid within the security sector. In a first phase, this analytical framework is used to screen insights from partners involved in triple-helix collaboration in the field of innovation, technology and security. In a second phase, in-depth interviews are conducted with public and private actors involved in setting up a pilot project where information exchange is central. The research results show that traditional benefits such as increased effectiveness, efficiency, improved relationships, creation of learning opportunities and obtaining a strategic, operational, and/or economic advantage that were found in other contexts are also confirmed in the security sector. In addition, Belgian security actors saw improved decision-making and service delivery, increased personnel safety and a more integrated security chain as potential benefits. Understanding these benefits may facilitate the design of future public-private partnerships in the security sector.


2008 ◽  
Vol 51 (1) ◽  
pp. 121-135 ◽  
Author(s):  
Charalampos Z. Patrikakis ◽  
Dimitris M. Kyriazanos ◽  
Neeli R. Prasad

Author(s):  
Natalia Semenova

AbstractThis study examines whether private information exchange between institutional investors and public companies in engagement dialogs on sustainability issues improves the publicly disclosed measurements of the target company’s financial and non-financial performance and transparency. It uses a unique dataset containing 326 private reports related to environmental, social, and anti-corruption recommendations to address material incidents among publicly traded MSCI World Index portfolio companies of Nordic institutional investors. The results indicate that target companies appear to have similar values with matched companies on sustainability performance and transparency ratings in the 3 years following the initiation of private reporting. Unexpected sustainability incidents are subsequently reflected in the next year’s fall in the market value of target companies relative to MSCI World Index. This paper provides empirical evidence for the legitimacy-based provision of private sustainability information used in a larger disclosure system of public companies.


Author(s):  
Amith Mandal ◽  
R. P. Ramkumar

Deliberate or inadvertent escape of classified data is undoubtedly one among the premier extreme security dangers that associations look inside the advanced period. The risk right now stretches out to the private lives: an abundance of private information is out there to interpersonal organizations and great telephone providers and is in a roundabout way exchanged to undependable outsider and fourth gathering applications. amid this work, a bland data genealogy structure LIME (Data Lineage in the Malicious Environment), is utilized for data stream over different elements that take two trademark, guideline parts (i.e., proprietor and buyer). It characterizes the exact security ensures required by such a data heredity component toward recognizable proof of a blameworthy substance, and decide the disentangling non-denial and trustworthiness suspicions. At that point create and break down a totally special dependable data exchange convention between two substances among noxious surroundings by expanding upon unmindful exchange, solid watermarking, and mark natives. At long last, an exploratory investigation to exhibit the helpfulness of convention what's more, apply structure to the important data run projections of learning outsourcing and the informal organizations. In general, LIME(Data Lineage in the Malicious Environment),lineage structure for information exchange, to be a key advance towards accomplishing responsibility by plan.


Entropy ◽  
2019 ◽  
Vol 21 (11) ◽  
pp. 1054
Author(s):  
Qiao Liu ◽  
Hui Li ◽  
Yong Wang

Secure information exchange occurs in many recently emerging cooperative-based networks, such as 5G networks (especially those with a Device to Device architecture), the Internet of Things, and vehicular ad hoc networks. However, the existing information exchange protocols only focus on either pairwise information exchange or group information exchange, and none of these protocols enable private and public information exchange to occur simultaneously. Thus, a general secure information exchange protocol for a multiuser channel is desirable. With this motivation, this paper investigates simultaneous private and public information exchange in a Multiple Inputs Multiple Outputs (MIMO) multiuser relay channel. In an aim to achieve this goal, signal alignment is chosen as the core technique. With the designed precoding matrix for each user, private information is aligned with its exchange partner, and public information forms a coding chain at the relay. With the aligned private signal and public coding chain, neither an untrusted relay nor external eavesdroppers can recover the original individual information. Performance analyses of the proposed protocol are conducted. First, we conduct transmission performance analyses from the perspective of time slot cost. Second, we conduct a security analysis for private information exchange and public information exchange. Third, we conduct secrecy sum-rate analysis for three attack scenarios: an untrusted relay attack only, an eavesdropper attack only, and both an untrusted relay and eavesdropper attack. The simulations are conducted to demonstrate that the proposed protocol can enable simultaneous private and public information exchange while resisting attacks by an undesired receiver, an untrusted relay, and external eavesdroppers.


2007 ◽  
Author(s):  
Stephen E. Humphrey ◽  
Susan Mohammed
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document