Using Game Theory to Analyze Risk to Privacy: An Initial Insight

  • Lisa Rajbhandari
  • Einar Arthur Snekkenes
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 352)

Abstract

Today, with the advancement of information technology, there is a growing risk to privacy as identity information is being used widely. This paper discusses some of the key issues related to the use of game theory in privacy risk analysis. Using game theory, risk analysis can be based on preferences or values of benefit which the subjects can provide rather than subjective probability. In addition, it can also be used in settings where no actuarial data is available. This may increase the quality and appropriateness of the overall risk analysis process. A simple privacy scenario between a user and an online bookstore is presented to provide an initial understanding of the concept.

Keywords

game theory privacy risk analysis 

References

  1. 1.
    Anderson, H.: The privacy gambit: Toward a game theoretic approach to international data protection. Vanderbilt Journal of Entertainment and Technology Law 9(1) (2006)Google Scholar
  2. 2.
    ISO/IEC 27005: Information technology -security techniques -information security risk management (2008)Google Scholar
  3. 3.
    Bier, V.: Challenges to the acceptance of probabilistic risk analysis. Risk Analysis 19, 703–710 (1999)Google Scholar
  4. 4.
    von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1944)MATHGoogle Scholar
  5. 5.
    Shoham, Y.: Computer science and game theory. Commun. ACM 51, 74–79 (2008)CrossRefGoogle Scholar
  6. 6.
    Watson, J.: Strategy: An Introduction to Game Theory, 2nd edn. W. W. Norton & Company, New York (2008)Google Scholar
  7. 7.
    Ross, D.: Game Theory. The Stanford Encyclopedia of Philosophy. In: Zalta, E.N. (ed.) (2010), http://plato.stanford.edu/archives/fall2010/entries/game-theory/
  8. 8.
    Rasmusen, E.: Games and Information: An Introduction to Game Theory, 4th edn. Wiley-Blackwell, Chichester (2006); Indiana UniversityMATHGoogle Scholar
  9. 9.
    Fricker, J.R.: Game theory in an age of terrorism: How can statisticians contribute? Springer, Heidelberg (2006)Google Scholar
  10. 10.
    Auda, D.: Game theory in strategy development of reliability and risk management. In: Annual Reliability and Maintainability Symposium, RAMS 2007, pp. 467–472 (2007)Google Scholar
  11. 11.
    Nash, J.: Equilibrium points in n-person games. Proceedings of the National Academy of Sciences of the United States of America 36, 48–49 (1950)MathSciNetMATHCrossRefGoogle Scholar
  12. 12.
    Fudenberg, D., Tirole, J.: Game theory. MIT Press, Cambridge (1991)Google Scholar
  13. 13.
    Kardes, E., Hall, R.: Survey of literature on strategic decision making in the presence of adversaries. CREATE Report (2005)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Lisa Rajbhandari
    • 1
  • Einar Arthur Snekkenes
    • 1
  1. 1.Norwegian Information Security LabGjφvik University CollegeGjφvikNorway

Personalised recommendations