The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a...The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.展开更多
The randomized response (RR) technique is an effective survey method when collecting sensitive information. This paper proposes a new non-randomized response model for survey sampling with polychotomous sensitive qu...The randomized response (RR) technique is an effective survey method when collecting sensitive information. This paper proposes a new non-randomized response model for survey sampling with polychotomous sensitive questions: Two-valued response technique. The proportion of the sensitive attribute and its estimator's variance are estimated under the simple random sampling without replacement and with replacement designs. The relation between the efficiency and the protection of privacy is discussed. The result indicates that the efficiency is in conflict with protection of privacy in the new proposed model, which is the same as that in the RR technique, but the new technique has better characteristics in sociological practice aspects than the RR technique, because it is of low cost, saving time and being operated easily.展开更多
文摘The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.
基金This research is supported by the National Natural Science Foundation of China under Grant No. 10761004, the Natural Science Foundation of Inner Mongolia under Grant Nos. 2009MS0107 and 2010MS01116, the Talent Development Foundation of Inner Mongolia (2007), and the Natural Science Foundation of Inner Mongolia University of Technology under Grant No. X200934.
文摘The randomized response (RR) technique is an effective survey method when collecting sensitive information. This paper proposes a new non-randomized response model for survey sampling with polychotomous sensitive questions: Two-valued response technique. The proportion of the sensitive attribute and its estimator's variance are estimated under the simple random sampling without replacement and with replacement designs. The relation between the efficiency and the protection of privacy is discussed. The result indicates that the efficiency is in conflict with protection of privacy in the new proposed model, which is the same as that in the RR technique, but the new technique has better characteristics in sociological practice aspects than the RR technique, because it is of low cost, saving time and being operated easily.