Search results for "Private information retrieval"

showing 7 items of 17 documents

Incentive Schemes, Private Information and the Double-Edged Role of Competition for Agents

2013

This paper examines the effect of imperfect labor market competition on the efficiency of compensation schemes in a setting with moral hazard and risk-averse agents, who have private information on their productivity. Two vertically differentiated firms compete for agents by offering contracts with fixed and variable payments. The superior firm employs both agent types in equilibrium, but the competitive pressure exerted by the inferior firm has a strong impact on contract design: For high degrees of vertical differentiation, i.e. low competition, low-ability agents are under-incentivized and exert too little effort. For high degrees of competition, high-ability agents are over-incentivized…

MicroeconomicsCompetition (economics)IncentiveBreak-even (economics)Moral hazardRisk aversionEconomicsImperfectProductivityPrivate information retrievalIndustrial organizationSSRN Electronic Journal
researchProduct

Evaluating Project Deadweight Measures: Evidence from Finnish Business Subsidies

2009

An important problem in measuring the impacts of business subsidies is their separation from deadweight, which refers to changes that would have occurred even in the absence of intervention. Both public and private assessments have been used previously to study deadweigh, but so far little is known about how they correspond to each other. To address this issue we conducted a joint evaluation of the private and public assessments of deadweight for Finnish business projects. A unique dataset combines large register data with both public and private information on projects financed in 2000–03. First, our results suggest that the different measures for deadweight are greatly uncorrelated, and …

Public AdministrationPublic economicsGeography Planning and DevelopmentyritystuetSubsidyOrdered probitManagement Monitoring Policy and LawEnvironmental Science (miscellaneous)Private sectorUncorrelatedIntervention (law)deadweight vaikutusdeadweight effectRegister dataEconomicsJoint evaluationarviointiPrivate information retrievalEnvironment and Planning C: Government and Policy
researchProduct

Upper bound on the communication complexity of private information retrieval

1997

We construct a scheme for private information retrieval with k databases and communication complexity O(n 1/(2k−1) ).

Scheme (programming language)Information retrievalTheoretical computer scienceComputer scienceBoolean circuitConstruct (python library)Communication complexityUpper and lower boundscomputerPrivate information retrievalcomputer.programming_language
researchProduct

Environmental taxation, information precision, and information sharing

2022

We analyze how environmental taxes should be optimally levied when the regulators and firms face costs uncertainties in a Stackelberg-Cournot game. We allow linear-quadratic payoffs functions coupled with an affine information structure encompassing common and private information with noisy signals. In the first period, the regulator chooses the intensity of emissions taxes in order to reduce externalities. In the second period, facing industry-related and firm-specific shocks, firms compete in the marketplace as Cournot rivals and choose outputs. We show that, given costs uncertainties with non-uniform quality of signals across firms, the regulator sets differentiated tax policy. We also e…

Tax policyHistoryEconomics and EconometricsPolymers and PlasticsSociology and Political ScienceInformation sharingEconomic surplusCournot competitionIndustrial and Manufacturing EngineeringValue of informationMicroeconomicsCollusionEconomicsBusiness and International ManagementPrivate information retrievalExternalityFinanceJournal of Public Economic Theory
researchProduct

Participation Costs and Inefficiency in Takeover Contests

2010

We consider a takeover in which risk neutral bidders incur private costs to participate to the auction. Supposing that valuations for target firm are common knowledge, we study the optimal strategy of bidders and analyze the takeover result when they get or not toeholds in the target firm. We found that bidder's decision of participation is endogenous. By analyzing bidder's condition of participation, we found that the probability that the potential bidder with the highest valuation will not participate to the control, exists. We show that this probability increases with the size of toeholds possessed by the bidder with low valuation. Nevertheless, the size of toeholds possessed by the bidd…

TheoryofComputation_MISCELLANEOUSMicroeconomicsTheoryofComputation_GENERALCommon value auctionBusinessEnglish auctionInefficiencyPrivate information retrievalValuation (finance)Risk neutralSSRN Electronic Journal
researchProduct

Discovering Homophily in Online Social Networks

2018

During the last ten years, Online Social Networks (OSNs) have increased their popularity by becoming part of the real life of users. Despite their tremendous widespread, OSNs have introduced several privacy issues as a consequence of the nature of the information involved in these services. Indeed, the huge amount of private information produced by users of current OSNs expose the users to a number of risks. The analysis of the users’ similarity in OSNs is attracting the attention of researchers because of its implications on privacy and social marketing. In particular, the homophily between users could be used to reveal important characteristics that users would like to keep hidden, hence …

Viral marketingComputer scienceComputer Networks and CommunicationsInternet privacy02 engineering and technologyInformation SystemHomophilyHomophilyViral marketing020204 information systemsSimilarity (psychology)0202 electrical engineering electronic engineering information engineeringInformation systemPrivate information retrievalOnline Social NetworkOnline Social Networksbusiness.industryPopularitySocial marketingTie strengthPrivacy preservingHardware and ArchitectureHomophily; Online Social Networks; Privacy preserving; User profiling; Viral marketing; Software; Information Systems; Hardware and Architecture; Computer Networks and Communications020201 artificial intelligence & image processingUser profilingbusinessSoftwareInformation Systems
researchProduct

Privacy Versus Security in the Internet Era

2015

Abstract There are a lots of conflict going on in the world right now. One of this conflict we are put into discussion here, is the battle for supremacy in the internet, the battle between privacy and security. We are changing fundamentally the way we are doing things till the Internet era arrive. Every data that we use online became a product. There is no more private information, everything became public with or without the population will. There are also a lot of discussion about who have a greater power on the Internet, government, companies, hackers, criminals, terrorists, or others. Unfortunately the neuter population is catch in the middle of this battle.

education.field_of_studyGovernmentInternetBattlebusiness.industrymedia_common.quotation_subjectPopulationInternet privacyGeneral EngineeringEnergy Engineering and Power TechnologyInformation technologyComputingMilieux_LEGALASPECTSOFCOMPUTINGsecurityprivacyProduct (business)information technologyPolitical scienceThe InternetbusinesseducationPrivate information retrievalHackermedia_commonProcedia Economics and Finance
researchProduct