Search results for "Private information retrieval"
showing 7 items of 17 documents
Incentive Schemes, Private Information and the Double-Edged Role of Competition for Agents
2013
This paper examines the effect of imperfect labor market competition on the efficiency of compensation schemes in a setting with moral hazard and risk-averse agents, who have private information on their productivity. Two vertically differentiated firms compete for agents by offering contracts with fixed and variable payments. The superior firm employs both agent types in equilibrium, but the competitive pressure exerted by the inferior firm has a strong impact on contract design: For high degrees of vertical differentiation, i.e. low competition, low-ability agents are under-incentivized and exert too little effort. For high degrees of competition, high-ability agents are over-incentivized…
Evaluating Project Deadweight Measures: Evidence from Finnish Business Subsidies
2009
An important problem in measuring the impacts of business subsidies is their separation from deadweight, which refers to changes that would have occurred even in the absence of intervention. Both public and private assessments have been used previously to study deadweigh, but so far little is known about how they correspond to each other. To address this issue we conducted a joint evaluation of the private and public assessments of deadweight for Finnish business projects. A unique dataset combines large register data with both public and private information on projects financed in 2000–03. First, our results suggest that the different measures for deadweight are greatly uncorrelated, and …
Upper bound on the communication complexity of private information retrieval
1997
We construct a scheme for private information retrieval with k databases and communication complexity O(n 1/(2k−1) ).
Environmental taxation, information precision, and information sharing
2022
We analyze how environmental taxes should be optimally levied when the regulators and firms face costs uncertainties in a Stackelberg-Cournot game. We allow linear-quadratic payoffs functions coupled with an affine information structure encompassing common and private information with noisy signals. In the first period, the regulator chooses the intensity of emissions taxes in order to reduce externalities. In the second period, facing industry-related and firm-specific shocks, firms compete in the marketplace as Cournot rivals and choose outputs. We show that, given costs uncertainties with non-uniform quality of signals across firms, the regulator sets differentiated tax policy. We also e…
Participation Costs and Inefficiency in Takeover Contests
2010
We consider a takeover in which risk neutral bidders incur private costs to participate to the auction. Supposing that valuations for target firm are common knowledge, we study the optimal strategy of bidders and analyze the takeover result when they get or not toeholds in the target firm. We found that bidder's decision of participation is endogenous. By analyzing bidder's condition of participation, we found that the probability that the potential bidder with the highest valuation will not participate to the control, exists. We show that this probability increases with the size of toeholds possessed by the bidder with low valuation. Nevertheless, the size of toeholds possessed by the bidd…
Discovering Homophily in Online Social Networks
2018
During the last ten years, Online Social Networks (OSNs) have increased their popularity by becoming part of the real life of users. Despite their tremendous widespread, OSNs have introduced several privacy issues as a consequence of the nature of the information involved in these services. Indeed, the huge amount of private information produced by users of current OSNs expose the users to a number of risks. The analysis of the users’ similarity in OSNs is attracting the attention of researchers because of its implications on privacy and social marketing. In particular, the homophily between users could be used to reveal important characteristics that users would like to keep hidden, hence …
Privacy Versus Security in the Internet Era
2015
Abstract There are a lots of conflict going on in the world right now. One of this conflict we are put into discussion here, is the battle for supremacy in the internet, the battle between privacy and security. We are changing fundamentally the way we are doing things till the Internet era arrive. Every data that we use online became a product. There is no more private information, everything became public with or without the population will. There are also a lot of discussion about who have a greater power on the Internet, government, companies, hackers, criminals, terrorists, or others. Unfortunately the neuter population is catch in the middle of this battle.