scholarly journals Private Information Sharing using Two Level QR Code

2018 ◽  
Vol 180 (24) ◽  
pp. 40-44
Author(s):  
V. V. ◽  
H. B.
2009 ◽  
Vol 8 (1) ◽  
pp. 57-65 ◽  
Author(s):  
Axel K.‐D. Schulz ◽  
Stephen B. Salter ◽  
Juan Claudio Lopez ◽  
Philip A. Lewis

2018 ◽  
Vol 32 (8) ◽  
pp. 3075-3104 ◽  
Author(s):  
Andrew Bird ◽  
Stephen A Karolyi ◽  
Thomas G Ruchti

Abstract To mitigate holdup by an informed incumbent lender, a private borrower may publicly share information in order to increase lender competition. Despite proprietary costs, a subset of private borrowers voluntarily share private information in loan and credit underwriting agreements. These borrowers switch lenders at a 16% higher rate and receive lower loan financing costs. For private firms that go public, we analyze changes in the net benefits of information sharing and study the potential estimation bias from unobservable borrower quality. This setting corroborates our inference that voluntary information sharing reduces lender holdup and alleviates financial constraints for private firms. Received May 25, 2017; editorial decision August 8, 2018 by Editor David Denis.


2021 ◽  
Author(s):  
Aditya Jain

We analyze demand information sharing collaboration between two manufacturers and a retailer under upstream competition. The manufacturers produce partially substitutable products, which are stocked by the retailer that sells them in the market characterized by random demand. The manufacturers are privately informed about uncertain demand and decide on whether to share this information with the retailer. We show that by not sharing information, a manufacturer ends up distorting its wholesale price upward to signal its private information to the retailer, and under upstream competition, this distortion is propagated to the competing manufacturer. Thus, although a manufacturer’s decision to not share information may benefit or hurt its own profit, this always benefits the competing manufacturer. Under low intensity of competition, signaling-driven distortions exacerbate double marginalization and hurt all parties, whereas under more intense competition, these distortions help manufacturers offset downward pressure on wholesale prices. Thus, in equilibrium similarly informed manufacturers share information in the former case but not in the latter case. Additionally, when manufacturers differ in their information accuracies, only the better-informed manufacturer shares information. The retailer always benefits from both manufacturers sharing information, and its benefits are larger when the better-informed manufacturer shares information. We show existence of a contracting mechanism the retailer can employ to enable information sharing. Finally, we analyze manufacturers’ information acquisition decisions and find that under competition, two manufacturers acquire minimal information so that they are better off not sharing information in the information sharing game. This paper was accepted by Vishal Gaur, operations management.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Shu-Chuan Chu ◽  
Lili Chen ◽  
Sachin Kumar ◽  
Saru Kumari ◽  
Joel J. P. C. Rodrigues ◽  
...  

Social networks are becoming popular, with people sharing information with their friends on social networking sites. On many of these sites, shared information can be read by all of the friends; however, not all information is suitable for mass distribution and access. Although people can form communities on some sites, this feature is not yet available on all sites. Additionally, it is inconvenient to set receivers for a message when the target community is large. One characteristic of social networks is that people who know each other tend to form densely connected clusters, and connections between clusters are relatively rare. Based on this feature, community-finding algorithms have been proposed to detect communities on social networks. However, it is difficult to apply community-finding algorithms to distributed social networks. In this paper, we propose a distributed privacy control protocol for distributed social networks. By selecting only a small portion of people from a community, our protocol can transmit information to the target community.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Mohammed S. Al-Zahrani ◽  
Heider A. M. Wahsheh ◽  
Fawaz W. Alsaade

Recently, hackers intend to reproduce malicious links utilizing several ways to mislead users. They try to control victims’ machines or get their data remotely by gaining access to private information they use via cyberspace. QR codes are two-dimensional barcodes with the capacity to encode various data types and can be viewed by digital devices, such as smartphones. However, there is no approved protocol in QR code generation; therefore, QR codes might be exposed to several questionable attacks. QR code attacks might be perpetrated using barcodes, and there are some security countermeasures. Some of these solutions are restricted to malicious link detection techniques with knowledge of cryptographic methods. Therefore, this study aims to detect malicious links embedded in 1D (linear) and 2D (QR) codes. A cybercrime attack was proposed based on barcode counterfeiting that can be used to perform online attacks. A dataset of 100000 malicious and benign URLs was created via several resources, and their lexical features were obtained. Analyses were conducted to illustrate how different features and users deal with online barcode content. Several artificial intelligence models were implemented. A decision tree classifier was identified as the most suitable model for identifying malicious URLs. Our outcomes suggested that a secure artificial intelligence barcode scanner (BarAI) is recommended to detect malicious barcode links with an accuracy of 90.243%.


2019 ◽  
Vol 35 (3) ◽  
pp. 619-650 ◽  
Author(s):  
Jean-Etienne de Bettignies ◽  
Jan Zabojnik

Abstract We study an organization, consisting of a manager and a worker, whose success depends on its ability to estimate a payoff-relevant but unknown parameter. If the manager has private information about this parameter, she has an incentive to conceal it from the worker in order to motivate him to search for additional information. Due to a time-inconsistency problem, the manager conceals her information more often than if she could commit to an information sharing policy, but even a manager with commitment power shares her information less than would be efficient. We also show that managers who are more likely to get informed are more willing to share their information and that unless the manager’s information substantially improves the worker’s productivity, managerial and worker abilities are substitutes in the firm’s profit function. (JEL D21 D82, L23)


2015 ◽  
Vol 6 (2) ◽  
pp. 208-218 ◽  
Author(s):  
Heiko Borchert

This article focuses on the information requirements of public and private stakeholders engaged in critical infrastructure protection (CIP).With its emphasis on information management rather than information sharing, the article builds on existing research suggesting that the notion of information sharing inadvertently renders cooperation more difficult as it evokes impressions of information “dominance” rather than joint information ownership. The article proposes a joint public-private information management agenda based on core issues providing actionable information to tackle immediate threats and crosscutting issues looking at the long-term issues that are relevant to understand the overall context in which critical infrastructure development occurs.


Sign in / Sign up

Export Citation Format

Share Document