Showing 1 - 6 of 6
suggest that Deming's approach lacks emphasis on the role of reinforcement. A different analysis of Deming's approach is … offered and its evolution is related to the contingencies of reinforcement for the behavior of consulting. An example is …
Persistent link: https://www.econbiz.de/10009430925
Dealing with sensitive data has been the focus of much of recent research. On one hand data disclosure may incur some risk due to security breaches, but on the other hand data sharing has many advantages. For example, revealing customer transactions at a grocery store may be beneficial when...
Persistent link: https://www.econbiz.de/10009430794
risk. Finally, we relate our framework with the k-anonymity disclosure method. The proposed framework makes the assumptions … behind k-anonymity explicit, quantifies them, and extends them in several natural directions. …
Persistent link: https://www.econbiz.de/10009430800
personally identifiable information. We have termed it Privacy Shield. Through the application of anonymity and privacy …
Persistent link: https://www.econbiz.de/10009434973
This dissertation uses game theoretic models to examine the effects of agent anonymity on markets for goods and for … information. In open, anonymous settings, such as the Internet, anonymity is relatively easy to obtain --- oftentimes another … their anonymity at some cost. It is shown that when consumers can costlessly maintain their anonymity, they all individually …
Persistent link: https://www.econbiz.de/10009475474
anonymity of reports without reducing the precision of location disclosures. We can therefore support the full functionality of …
Persistent link: https://www.econbiz.de/10009441097