skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Protecting Data Markets from Strategic Buyers
The growing adoption of data analytics platforms and machine learning-based solutions for decision-makers creates a significant demand for datasets, which explains the appearance of data markets. In a well-functioning data market, sellers share data in exchange for money, and buyers pay for datasets that help them solve problems. The market raises sufficient money to compensate sellers and incentivize them to keep sharing datasets. This low-friction matching of sellers and buyers distributes the value of data among participants. But designing online data markets is challenging because they must account for the strategic behavior of participants. In this paper, we introduce techniques to protect data markets from strategic participants, even when the asset traded is data. We combine those techniques into a pricing algorithm specifically designed to trade data. The evaluation includes a user study and extensive simulations. Together, the evaluation demonstrates how participants strategize and the effectiveness of our techniques.  more » « less
Award ID(s):
2040718
PAR ID:
10427797
Author(s) / Creator(s):
Date Published:
Journal Name:
Proceedings ACMSIGMOD International Conference on Management of Data
ISSN:
0730-8078
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. A standard assumption in game theory is that decision-makers have preplanned strategies telling them what actions to take for every contingency. In contrast, nonstrategic decisions often involve an on-the-spot comparison process, with longer response times (RT) for choices between more similarly appealing options. If strategic decisions also exhibit these patterns, then RT might betray private information and alter game theory predictions. Here, we examined bargaining behavior to determine whether RT reveals private information in strategic settings. Using preexisting and experimental data from eBay, we show that both buyers and sellers take hours longer to accept bad offers and to reject good offers. We find nearly identical patterns in the two datasets, indicating a causal effect of offer size on RT. However, this relationship is half as strong for rejections as for acceptances, reducing the amount of useful private information revealed by the sellers. Counter to our predictions, buyers are discouraged by slow rejections—they are less likely to counteroffer to slow sellers. We also show that a drift-diffusion model (DDM), traditionally limited to decisions on the order of seconds, can account for decisions on the order of hours, sometimes days. The DDM reveals that more experienced sellers are less cautious and more inclined to accept offers. In summary, strategic decisions are inconsistent with preplanned strategies. This underscores the need for game theory to incorporate RT as a strategic variable and broadens the applicability of the DDM to slow decisions. 
    more » « less
  2. Abstract People respond quickly when they have a clear preference and slowly when they are close to indifference. The question is whether others exploit this tendency to infer private information. In two-stage bargaining experiments, we observe that the speed with which buyers reject sellers’ offers decreases with the size of the foregone surplus. This should allow sellers to infer buyers’ values from response times (RT), creating an incentive for buyers to manipulate their RT. We experimentally identify distinct conditions under which subjects do, and do not, exhibit such strategic behaviour. These results provide the first insight into the possible use of RT as a strategic variable. 
    more » « less
  3. null (Ed.)
    Abstract Can organized illegal activities grow stronger and more advanced in response to legal pressure? In October 2013, the FBI shut down Silk Road, a thriving e-commerce market for illegal drugs. After the shock, market actors adopted a new identity verification method that enabled mass-migration to other markets, and created websites for information distribution that reduced post-shock uncertainties. The outcome was a decentralized market in which actors could operate in “open secrecy” across multiple websites. With verifiable pseudonyms and securely obfuscated real-world identities, actors could publicly discuss, plan, and participate in illegal activities. Threats from police and opportunistic criminals persisted but were no longer crippling concerns as buyers and sellers could reasonably expect that their exchange partners would be available for future business; the illegal market could operate more like a legal one. Drawing on quantitative and qualitative data, the author argues that advances in information technology have expanded the opportunity structure for cooperation and creative problem-solving in the underworld, and therefore that shocks did not hinder but rather stimulate development in digital drug markets. Data, collected in 2013–2017, include nearly one million transactions from three illicit e-commerce markets, three million messages from eight discussion forums, and website traffic from two market-independent websites. 
    more » « less
  4. The assignment game, introduced by Shapley and Shubik [1971], is a classic model for two-sided matching markets between buyers and sellers. In the original assignment game, it is assumed that payments lead to transferable utility and that buyers have unit-demand valuations for the items being sold. There has since been substantial work studying various extensions of the assignment game. The first main area of extension is to imperfectly transferable utility, which is when frictions, taxes, or fees impede the transfer of money between agents. The second is with more complex valuation functions, in particular gross substitutes valuations, which describe substitutable goods. Multiple efficient algorithms have been proposed for computing a competitive equilibrium, the standard solution concept in assignment games, in each of these two settings. However, these lines of work have been mostly independent, with no algorithmic results combining the two. Our main result is an efficient algorithm for computing competitive equilibria in a setting encompassing both those generalizations. We assume that sellers have multiple copies of each items. A buyer $$i$$'s quasi-linear utility is given by their gross substitute valuation for the bundle $$S$$ of items they are assigned to, minus the sum of the payments $$q_{ij}(p_j)$$ for each item $$j \in S$$, where $$p_j$$ is the price of item $$j$$ and $$q_{ij}$$ is piecewise linear, strictly increasing. Our algorithm combines procedures for matroid intersection problems with augmenting forest techniques from matching theory. We also show that in a mild generalization of our model without quasilinear utilities, computing a competitive equilibrium is NP-hard. 
    more » « less
  5. Network analysis has demonstrated that interconnectedness among market participants results in spillovers, amplifies or absorbs shocks, and creates other nonlinear effects that ultimately affect market health. In this paper, we propose a new directed network construct, the liquidity network, to capture the urgency to trade by connecting the initiating party in a trade to the passive party. Alongside the conventional trading network connecting sellers to buyers, we show both network types complement each other: Liquidity networks reveal valuable information, particularly when information asymmetry in the market is high, and provide a more comprehensive characterization of interconnectivity in the overnight-lending market. 
    more » « less