物联网背景下隐私信息保护策略影响企业决策行为

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

:1001-4098(2010)06-0082-06吴 亮1,2,邵培基1,李良强1(1.,610054;2.,550002):物联网技术的推广应用给人们生活带来极大便利的同时,个人隐私信息也将毫无保留地被收集加工而用于商业目的,隐私信息保护受到广泛关注。本文根据物联网隐私信息保护的三种可能方案,企业作为行为主体,隐私信息作为一种商品形式,通过建立经济学价格需求模型分析每种方案的经济性及企业主体采用的可行策略。:物联网;隐私信息;经济模型;企业决策;Matlab仿真:F272:A,Dimitris[1]:(InternetOfThings,IOT),(M2M),RFID),,,,Delen[2],,,,,IOT,,,,IOT,,,IOTIOT,,1物联网环境下的隐私信息研究回顾,,,1890,,(TheRighttoPrivacy),Westin,;,[4],,,[5]:,,[6-8],[9],IOT:,,,,286(198)      系 统 工 程Vol.28,No.620106SystemsEngineeringJun.,2010:2010-03-10;:2010-04-29:(08CZZ025);(60971078);(LISS200947):(1969-),,,,,:,;(1946-),,,,,:,,,,IOT,RFID,,,IOT,,,,,,,,Google,,,[10]Westin(1967)[3]Posner:;[10]Byford[9],,IOT:(:)RFID,,(),[10],,,IOT,(),,IOT,?IOT?IOT,?IOT,IOTIOT,IOT,:IOT,,IOT;,,,,;,,,;!MATLAB,,IOT2 模型建立与分析2.1:;;IOT,,;!,,,IOT,IOT,,,,,,:,,;,,,IOT,,,:[13],IOT;[14],;[14],,,IOT,1836,:1[15],,,2.2,,M0,,Ml,M0.Ml,,[-1,1],,I.PCCQC.C(M):M0-MMl,M,,,J[12]:PC=Ij-Pn(Ml,j-M0+M)-QC,j(1):PC;Pn;Ijj;Qc;(1),MlM0-M,,:PC=Ij-QC,j(2)M0-MMl,,,,(2),(),:MlM0-M(2)M0-MMl,,,,(1)M0-MMl,(2),,2.3,,:C=F(y)+BQ+D(y,M)Q2(3):B=Ptag+Ps(4)(C-;F-,y;B-;D-,;Ptag-;Ps-),F,B,D.F,,IOTBPs;Ptag,,,D,(,)D,,,,,,,,2.4,IOT,,,,IOT,Z=f(q,p),(),QePe8420102,PeQe,P=Pe,P=Pe,(CS):CS=Qe0(Ij-PN(ML,j-M0+M)-QC)QC-QdPe(5)Ia=Ij-PN(ML,j-M0+M),CS=Qe0(Ia-QC)QC-QdPeCS=IaQd-Q+1d+1-QdPe,:S(N/N0)IaQ-Q+1+1-QPe+QePe(6),N/N02.5,,,IOT,,,,,,,(MC=MR),,,,,IOT,:R=PeQe+CS-(F(y)+BQ+D(y,N)Q2)Ia=Ij-PN(ML,j-M0+M)Pe=Ij-Qe,j,R=(Ia-Q)Q+SMM0IaQ-Q+1+1-QPe-(F+BQ+DQ2):RQ=(Ia-Q)-Q+S(M/M0)(Ia-Q)-(B+2DQ)=0(7),IOT,,,1,IOT,,,AD;,,,AC;B,,,(2.6),IOT,IOT[16]IOT,IOT,,,IOT,,(7)2.6,MATLAB2007,1856,:1F05102D100D,Ptag-11/NPs-55,Pn0(10),1,2,,M011,Ml0,,M0,(P,Q):;;(7)Q,(6),(1)128,33IOT,I,,,IOT,,,,,IOT,,,,,,IOT,,3 结论与展望IOT,,862010,,:,IOT,,;,;,,,IOT,,,,,,:[1]DimitrisKiritsis.ClosedloopPLMforintelligentproductsintheeraoftheinternetofthings[J].Computer-AidedDesign,2010,(3):101150.[2]DelenD,etal.RFIDforbettersupply-chainman-agementthroughenhancedinformationvisibility[J].ProductionandOperationsManagement,2007,16(5):613624.[3]BrandisLD,WarrenSD.Therighttoprivacy[J].HarvardLawReview,1890,(5).[4]WestinAF.Privacyandfreedom.Informationpri-vacylaw.M.Rotenberg[M].NewYork:AspenPublishers,1967.[5].[J].,2008,(4):2326.[6]SonJ-Y,etal.Internetusersinformationprivacy-protectiveresponses:Ataxonomyandanomologicalmodel[J].MISQuarterly,2008,(3):503529.[7]GefenD,KarahannaE,StraubDW.TrustandTAMonlineshopping:Anintegratedmodel[J].MISQuartery,2003,(3):5190.[8]MalhotraNK,etal.Internetusersinformationpri-vacyconcerns(IUIPC):Theconstruct,thescale,andacausalmodel[J].InformationSystemRe-search,2004,(12):336355.[9]ByfordKS.Privacyincyberspace:Constructingamodelofprivacyfortheelectroniccommunicationsenvironment[J].RutgersComputerandTechnologyLawJournal,1998,24(1):174.[10]LiXB,etal.Privacyprotectionindatamining:Aperturbationapproachforcategoricaldata[J].In-formationSystemResearch,2006,(9):254270.[11]PosnerRA.Therightofprivacy[J].GeorgiaLawReview,1978,(12):393422.[12].[J].,2002,(6):4448.[13]EPCglobalPublicPolicySteeringCommittee.GuidelinesonEPCforconsumerproducts[R].EPCglobal,2006.[14]GarfinkelSL,etal.RFIDprivacy:Anoverviewofproblemsandproposedsolutions[J].IEEESecurityandPrivacy,2005:3443.[15],.[M].:,2003:6072.[16],.RFID[J].,2008,(1):4952.TheEffectofProtectiveStrategiesforPrivacyInformationonDecision-makingBehaviorofEnterpriseinthecontextofInternetofThingsWULiang1,2,SHAOPei-ji1,LILiang-qiang1(1.SchoolofManagementandEconomics,UniversityofElectronicScienceandTechnologyofChina,Chengdu610054,China;2.SchoolofManagementandEconomics,GuizhouNormalUniversity,Guiyang550002,China)Abstract:ThepromotionandapplicationofthetechnologyofInternetofThingshasbroughtgreatconveniencetopeopleslife,butatthesametime,personalprivacyinformationwillalsobecollectedwithoutreservationandusedforcommercialpurposes.Privacyinformationprotectioniswidelyconcerned.BasedonthethreepossibleoptionsofprivacyinformationprotectioninthecontextofInternetofthings,Enterprisesaretreatedasbehavioractorsandprivacyinformationasaformofcommodityinthispaper.ThroughestablishingtheeconomicPriceDemandModel,wefinallyanalyzetheeconomicaleffi-ciencyofeveryoptionandtheviablestrategiesadoptedbycorporates.Keywords:IOT(InternetOfThings);PrivacyInformation;EconomicalModel;DecisionofEnterprises;MatlabSimula-tion876,:

1 / 6
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功