[Game-theory] Fwd: Game theory question

Dengji Zhao d.zhao at soton.ac.uk
Mon Mar 30 10:55:53 BST 2015


Dear all,

We have got an external guest Iraklis from Belgium attended our last game
theory reading group session (online). He got some challenging questions
for us (please see the forwarded message). If you get time, could you
please kindly check his questions and offer some quick feedback if you can.
Many thanks!

Best,
Dengji

---------- Forwarded message ----------
From: iraklis <iraklis.symeonidis at esat.kuleuven.be>
Date: 27 March 2015 at 14:01
Subject: Game theory question
To: "Zhao D." <d.zhao at soton.ac.uk>


Dear Dr Dengji Zhao,

I am Iraklis Symeonidis and yesterday I attended the Game Theory
session. First, I would like to thank you for your time and also for
giving me the opportunity to cycle some research questions.

In financial crypto of 2013 there is a paper with respect to
Applications (app) of Facebook and the privacy implications of two users
installing a privacy invasive app. For this analysis they used a game
theory approach. Although I understood the paper I have some questions
about the approach. In synopsis my questions are:

1) How can we understand if this approach that they propose is the
correct one ? (describes the world correctly) Rephrasing, if there are
two game theory simulations analyzing the same case, how can we be sure
the approach they used is the correct one ?

2) They use a formula to estimate the payoff values. They propose an
additive formula of positive externalities (other user ratings),
negative externalities (privacy invasive permissions) and the user
valuation (a rating). Is it possible to combine these different type of
parameters in one formula ? Is more mathematical question but I don't
know how lax can a payoff formula be.

3) If we have variant negative externalities such as invasive
permissions, web tracking issues and more. Is there any way to combine
these values in one formula, if you either set the parameter values
manually ? For instance, if there are 3 privacy invasive permissions
been held by an app but also is leaking 1 user attribute via web
trackers, do these values can be combined ?



Thank you for your time !

Best regards,
Iraklis Symeonidis
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.ecs.soton.ac.uk/pipermail/game-theory/attachments/20150330/53189f55/attachment-0001.html 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: chp%3A10.1007%2F978-3-642-39884-1_29.pdf
Type: application/pdf
Size: 340522 bytes
Desc: not available
Url : http://mailman.ecs.soton.ac.uk/pipermail/game-theory/attachments/20150330/53189f55/attachment-0001.pdf 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 852 bytes
Desc: not available
Url : http://mailman.ecs.soton.ac.uk/pipermail/game-theory/attachments/20150330/53189f55/attachment-0001.bin 


More information about the Game-theory mailing list