Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published July 2016 | Submitted
Book Section - Chapter Open

The Strange Case of Privacy in Equilibrium Models

Abstract

We study how privacy technologies affect user and advertiser behavior in a simple economic model of targeted advertising. In our model, a consumer first decides whether or not to buy a good, and then an advertiser chooses an advertisement to show the consumer. The consumer's value for the good is correlated with her type, which determines which ad the advertiser would prefer to show to her---and hence, the advertiser would like to use information about the consumer's purchase decision to target the ad that he shows. In our model, the advertiser is given only a differentially private signal about the consumer's behavior---which can range from no signal at all to a perfect signal, as we vary the differential privacy parameter. This allows us to study equilibrium behavior as a function of the level of privacy provided to the consumer. We show that this behavior can be highly counter-intuitive, and that the effect of adding privacy in equilibrium can be completely different from what we would expect if we ignored equilibrium incentives. Specifically, we show that increasing the level of privacy can actually increase the amount of information about the consumer's type contained in the signal the advertiser receives, lead to decreased utility for the consumer, and increased profit for the advertiser, and that generally these quantities can be non-monotonic and even discontinuous in the privacy level of the signal.

Additional Information

© 2016 ACM. A full version of this paper is available online at http://arxiv.org/abs/1508.03080. The first author was supported in part by a Simons Award for Graduate Students in Theoretical Computer Science, NSF grant CNS-1254169, and US-Israel Binational Science Foundation grant 2012348. The second author was supported in part by NSF grants CNS-1254169 and CNS-1518941, DARPA-BAA-15-29, US-Israel Binational Science Foundation grant 2012348, the Charles Lee Powell Foundation, a Google Faculty Research Award, an Okawa Foundation Research Grant, a Microsoft Faculty Fellowship, a subcontract through the DARPA Brandeis project, a grant from the HUJI Cyber Security Research Center, and a startup grant from Hebrew University's School of Computer Science. The third author was supported in part by NSF Grant CCF-1101389. The fourth author was supported in part by NSF Grant CCF-1101389, an NSF CAREER award, DARPA-BAA-15-29, and an Alfred P. Sloan Foundation Fellowship. Part of this work was completed during a stay at the Simons Institute for the Theory of Computing at Berkeley.

Attached Files

Submitted - 1508.03080v1.pdf

Files

1508.03080v1.pdf
Files (1.2 MB)
Name Size Download all
md5:5d7a1ca4a9d3c68126e93853a3dc2964
1.2 MB Preview Download

Additional details

Created:
August 20, 2023
Modified:
October 23, 2023