You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: lectures/util_rand_resp.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ $$ (eq:util-rand-one)
53
53
54
54
At this point we describe some concepts proposed by various researchers.
55
55
56
-
### {cite:t}`leysieffer1976respondent`
56
+
### Leysieffer and Warner (1976)
57
57
58
58
The response $r$ is regarded as jeopardizing with respect to $A$ or $A^{'}$ if
59
59
@@ -112,7 +112,7 @@ $$
112
112
\text{Pr}(A|\text{no})=0
113
113
$$
114
114
115
-
### {cite:t}`lanke1976degree`
115
+
### Lanke (1976)
116
116
117
117
{cite:t}`lanke1975choice` argued that "it is membership in Group A that people may want to hide, not membership in the complementary Group A'."
118
118
@@ -124,7 +124,7 @@ $$ (eq:util-rand-five-a)
124
124
125
125
Holding this measure constant, he explained under what conditions the smallest variance of the estimate was achieved with the unrelated question model or {cite:t}`warner1965randomized` original model.
126
126
127
-
### {cite:t}`fligner1977comparison`
127
+
### Fligner et al. (1977)
128
128
129
129
{cite:t}`fligner1977comparison` reached similar conclusion as {cite:t}`lanke1976degree`.
130
130
@@ -135,7 +135,7 @@ $$
135
135
$$ (eq:util-rand-six)
136
136
137
137
138
-
### {cite:t}`greenberg1977respondent`
138
+
### Greenberg et al. (1977)
139
139
140
140
{cite:t}`greenberg1977respondent` stressed the importance of examining the risk to respondents who do not belong to $A$ as well as the risk to those who do belong to the sensitive group.
141
141
@@ -484,11 +484,11 @@ Here are some comments about the model design:
484
484
485
485
## Criticisms of Proposed Privacy Measures
486
486
487
-
We can use a utilitarian approach to analyze some privacy measures.
487
+
We can use a utilitarian approach to analyze some privacy measures.
488
488
489
489
We'll enlist Python Code to help us.
490
490
491
-
### Analysis of Method of {cite:t}`lanke1976degree`
491
+
### Analysis of Method of Lanke (1976)
492
492
493
493
{cite:t}`lanke1976degree` recommends a privacy protection criterion that minimizes:
494
494
@@ -498,7 +498,7 @@ $$ (eq:util-rand-five-b)
498
498
499
499
Following Lanke's suggestion, the statistician should find the highest possible $\text{ Pr}(A|\text{yes})$ consistent with truth telling while $\text{ Pr}(A|\text{no})$ is fixed at 0. The variance is then minimized at point $X$ in {numref}`fig-lanke-analysis`.
500
500
501
-
However, we can see that in {numref}`fig-lanke-analysis`, point $Z$ offers a smaller variance that still allows cooperation of the respondents, and it is achievable following our discussion of the truth border in Part III:
501
+
However, as shown in {numref}`fig-lanke-analysis`, point $Z$ offers a smaller variance that still allows cooperation of the respondents, and it is achievable following our earlier discussion of the truth border:
{cite:t}`leysieffer1976respondent` recommend a two-dimensional measure of jeopardy that reduces to a single dimension when there is no jeopardy in a 'no' answer, which means that
551
551
@@ -560,9 +560,9 @@ $$
560
560
\text{Pr}(A|\text{no})=0
561
561
$$
562
562
563
-
This is not an optimal choice under a utilitarian approach.
563
+
This is not an optimal choice under a utilitarian approach.
564
564
565
-
### Analysis on the Method of {cite:t}`Chadhuri_Mukerjee_88`
565
+
### Analysis on the Method of Chadhuri and Mukerjee (1988)
566
566
567
567
{cite}`Chadhuri_Mukerjee_88` argued that the individual may find that since "yes" may sometimes relate to the sensitive group A, a clever respondent may falsely but safely always be inclined to respond "no".
568
568
@@ -574,21 +574,21 @@ $$
574
574
575
575
Here the gain from lying is too high for someone to volunteer a "yes" answer.
However, under a utilitarian approach there should exist other survey designs that are consistent with truthful answers.
588
588
589
589
In particular, respondents will choose to answer truthfully if the relative advantage from lying is eliminated.
590
590
591
-
We can use Python to show that the optimal model design
591
+
We can use Python to show the optimal model design
592
592
593
593
```{code-cell} ipython3
594
594
def f(x):
@@ -645,7 +645,7 @@ plt.show()
645
645
646
646
Here the optimal model design corresponds to point $Q$ in {numref}`fig-optimal-design`.
647
647
648
-
### Method of {cite:t}`greenberg1977respondent`
648
+
### Method of Greenberg et al. (1977)
649
649
650
650
{cite:t}`greenberg1977respondent` defined the hazard for an individual in $A$ as the probability that he or she is perceived as belonging to $A$:
651
651
@@ -691,7 +691,7 @@ and it follows that:
691
691
692
692
Even though this hazard can be set arbitrarily close to 0, an individual in $A$ will completely reveal his or her identity whenever truthfully answering the sensitive question.
693
693
694
-
However, under utilitarian framework, it is obviously contradictory.
694
+
However, under a utilitarian framework, this is obviously contradictory.
695
695
696
696
If the individuals are willing to volunteer this information, it seems that the randomized response design was not necessary in the first place.
697
697
@@ -710,10 +710,10 @@ If a privacy measure is not completely consistent with the rational behavior of
710
710
711
711
A utilitarian approach provides a systematic way to model respondents' behavior under the assumption that they maximize their expected utilities.
712
712
713
-
In a utilitarian analysis:
713
+
In a utilitarian analysis:
714
714
715
715
- A truth border divides the space of conditional probabilities of being perceived as belonging to the sensitive group, $\text{Pr}(A|\text{yes})$ and $\text{Pr}(A|\text{no})$, into the truth-telling region and the lying region.
716
716
717
717
- The optimal model design is obtained at the point where the truth border touches the lowest possible iso-variance curve.
718
718
719
-
A practical implication of the analysis of {cite}`ljungqvist1993unified` is that uncertainty about respondents' demands for privacy can be acknowledged by **choosing $\text{Pr}(A|\text{yes})$ and $\text{Pr}(A|\text{no})$ sufficiently close to each other**.
719
+
A practical implication of the analysis of {cite}`ljungqvist1993unified` is that uncertainty about respondents' demands for privacy can be acknowledged by **choosing $\text{Pr}(A|\text{yes})$ and $\text{Pr}(A|\text{no})$ sufficiently close to each other**.
0 commit comments