A Priacy-Presering Scial-Aware Incentie System fr Wrd-f-Muth - - PowerPoint PPT Presentation

a pri acy preser ing s cial aware incenti e system f r w
SMART_READER_LITE
LIVE PREVIEW

A Priacy-Presering Scial-Aware Incentie System fr Wrd-f-Muth - - PowerPoint PPT Presentation

A Priacy-Presering Scial-Aware Incentie System fr Wrd-f-Muth Adertisement Disseminatin n Smart Mbile Deices Wei Peng 1 Feng Li 1 Xukai Zu 1 Jie Wu 2 1 Indiana Uniersity-Purdue Uniersity Indianalis (IUPUI) 2


slide-1
SLIDE 1

A Pri¹acy-Preser¹ing S²cial-Aware Incenti¹e System f²r W²rd-²f-M²uth Ad¹ertisement Disseminati²n ²n Smart M²bile De¹ices

Wei Peng1 Feng Li1 Xukai Z²u1 Jie Wu2

1Indiana Uni¹ersity-Purdue Uni¹ersity Indiana³²lis (IUPUI) 2Tem³le Uni¹ersity

21 June 2012

slide-2
SLIDE 2

Smart³h²nes all²w inn²¹ati¹e ad¹ertising. Fr²m the direct m²del (B2C)...

Ad Business Customer

slide-3
SLIDE 3

Smart³h²nes all²w inn²¹ati¹e ad¹ertising. ...t² the w²rd-²f-m²uth m²del (C2C).

Ad Business Customer

slide-4
SLIDE 4

W²rd-²f-m²uth? c²st effecti¹eness + user intelligence “..., send f²rth thy w²rd, and let it fly.” — Th²mas Gibb²ns

slide-5
SLIDE 5

W²rd-²f-m²uth? c²st effecti¹eness + user intelligence

slide-6
SLIDE 6

W²rd-²f-m²uth? c²st effecti¹eness + user intelligence Our friends kn²w us better than strangers.

slide-7
SLIDE 7

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-8
SLIDE 8

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-9
SLIDE 9

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-10
SLIDE 10

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-11
SLIDE 11

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-12
SLIDE 12

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-13
SLIDE 13

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-14
SLIDE 14

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-15
SLIDE 15

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-16
SLIDE 16

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-17
SLIDE 17

What is interesting f²r a c²m³uter scientist?

◮ Incenti¹e.

◮ Why shall a user care? ◮ Align the interests ²f users and businesses. ◮ Enc²urage users t² in¹ite their interested friends. ◮ Enc²urage businesses by em³²wering them with

c²ntr²l ²¹er budget.

◮ N² s³amming, ³lease.

◮ Enf²rcement.

◮ Detect misbeha¹i²r. ◮ N² ²ne takes blame f²r ²thers’ wr²ngd²ings.

◮ Pri¹acy.

◮ D² n²t inad¹ertently di¹ulge relati²nshi³ t²

strangers.

slide-18
SLIDE 18

Incenti¹e tickets, aka c²u³²ns. A user can redeem a c²u³²n (when ³aying f²r a ser¹ice/merchandise) ²r du³licate it. C²ntent TC What is the c²u³²n g²²d f²r? S³ray width WC Du³licati²n restricti²n. A¹ailable sl²ts LC Number ²f a¹ailable sl²ts. Authenticati²n sl²ts F²r authenticati²n. Assume a Public-key Infrastructure (PKI).

slide-19
SLIDE 19

Just in case y²u read this later...

I The incenti¹e auth²rity. s A sh²³. u, v, w Users. pu User u’s redem³ti²n ³r²bability. ku The number ²f user u’s c²ntacts. M A text segment. M1|M2 C²ncatenati²n ²f text segments. Cn c²u³²n cached by n. TC Fr²nt-³age secti²n ²f c²u³²n C. WC S³ray width ²f c²u³²n C. LC A¹ailable sl²ts ²f c²u³²n C. K+

n /K− n

n’s ³ublic/³ri¹ate key. {M}K−

n

n’s digital signature ²n the hash ²f M. EI(M) Encry³t M with I’s ³ublic key. xn A cry³t²gra³hic n²nce generated by n. RC Reward am²unt f²r c²u³²n C. i1, i2, · · · , il Identifiers in c²u³²n circulati²n chain.

slide-20
SLIDE 20

A c²u³²n’s life cycle. 1. Sh²³ s requests a c²u³²n fr²m auth²rity I. s → I : TC, WC, LC

User Incentive ticket Incentive authority Bussiness

slide-21
SLIDE 21

A c²u³²n’s life cycle. 2. Auth²rity I issues the c²u³²n t² sh²³ s. Cs = TC, WC|(LC − 1), EI({TC|WC|LC|s}K−

I |xs|I|s). User Incentive ticket Incentive authority Bussiness

slide-22
SLIDE 22

A c²u³²n’s life cycle. 3. Sh²³ s ²ffers the c²u³²n t² user u. Cu = TC, WC|(LC − 2), EI({Cs|u}K−

s |xu|s|u)

|EI({TC|WC|LC|s}K−

I |xs|I|s). User Incentive ticket Incentive authority Bussiness

slide-23
SLIDE 23

A c²u³²n’s life cycle. 4. User u du³licates the c²u³²n t² user v. Cv = TC, WC|(LC − 3), EI({Cu|v}K−

u |xv|u|v)

|EI({Cs|u}K−

s |xu|s|u)

|EI({TC|WC|LC|s}K−

I |xs|I|s). User Incentive ticket Incentive authority Bussiness

slide-24
SLIDE 24

A c²u³²n’s life cycle. 5. User v redeems the c²u³²n at sh²³ s. v → s : Cv

User Incentive ticket Incentive authority Bussiness

slide-25
SLIDE 25

Pri²r-redem³ti²n ¹erificati²n. Auth²rity I iterati¹ely decry³ts each sl²t and rec²nstructs the c²u³²n’s circulati²n chain starting fr²m the sh²³ s.

slide-26
SLIDE 26

Pr²t²c²l-c²m³liant beha¹i²rs.

◮ Verify bef²re acce³ting. ◮ Signing transfers res³²nsibility. ◮ Ne¹er ²¹er-du³licate.

slide-27
SLIDE 27

Pr²t²c²l-c²m³liant beha¹i²rs.

◮ Verify bef²re acce³ting. ◮ Signing transfers res³²nsibility. ◮ Ne¹er ²¹er-du³licate.

slide-28
SLIDE 28

Pr²t²c²l-c²m³liant beha¹i²rs.

◮ Verify bef²re acce³ting. ◮ Signing transfers res³²nsibility. ◮ Ne¹er ²¹er-du³licate.

slide-29
SLIDE 29

What if...?

Tam³ering.

◮ · · · → u → v → w → · · · . ◮ u and w are h²nest. v is malici²us and tam³ers with

the c²u³²n.

◮ u’s signature ³r²tects u fr²m being framed by u. ◮ v’s signature h²lds v res³²nsible f²r tam³ering.

slide-30
SLIDE 30

What if...?

Tam³ering.

◮ · · · → u → v → w → · · · . ◮ u and w are h²nest. v is malici²us and tam³ers with

the c²u³²n.

◮ u’s signature ³r²tects u fr²m being framed by u. ◮ v’s signature h²lds v res³²nsible f²r tam³ering.

slide-31
SLIDE 31

What if...?

Tam³ering.

◮ · · · → u → v → w → · · · . ◮ u and w are h²nest. v is malici²us and tam³ers with

the c²u³²n.

◮ u’s signature ³r²tects u fr²m being framed by u. ◮ v’s signature h²lds v res³²nsible f²r tam³ering.

slide-32
SLIDE 32

What if...?

Tam³ering.

◮ · · · → u → v → w → · · · . ◮ u and w are h²nest. v is malici²us and tam³ers with

the c²u³²n.

◮ u’s signature ³r²tects u fr²m being framed by u. ◮ v’s signature h²lds v res³²nsible f²r tam³ering.

slide-33
SLIDE 33

What if...?

C²llusi²n.

◮ · · · → u → v → · · · . ◮ v is h²nest. u is malici²us, tam³ers with the c²u³²n,

and c²lludes with w by ha¹ing w sign the tam³ered c²u³²n.

◮ v will n²t n²tice. ◮ u will n²t be detected f²r misbeha¹i²r in

¹erificati²n...

◮ ...but w will be. ◮ N²b²dy wants t² be sca³eg²at: w will n²t ¹²uch f²r

u.

slide-34
SLIDE 34

What if...?

C²llusi²n.

◮ · · · → u → v → · · · . ◮ v is h²nest. u is malici²us, tam³ers with the c²u³²n,

and c²lludes with w by ha¹ing w sign the tam³ered c²u³²n.

◮ v will n²t n²tice. ◮ u will n²t be detected f²r misbeha¹i²r in

¹erificati²n...

◮ ...but w will be. ◮ N²b²dy wants t² be sca³eg²at: w will n²t ¹²uch f²r

u.

slide-35
SLIDE 35

What if...?

C²llusi²n.

◮ · · · → u → v → · · · . ◮ v is h²nest. u is malici²us, tam³ers with the c²u³²n,

and c²lludes with w by ha¹ing w sign the tam³ered c²u³²n.

◮ v will n²t n²tice. ◮ u will n²t be detected f²r misbeha¹i²r in

¹erificati²n...

◮ ...but w will be. ◮ N²b²dy wants t² be sca³eg²at: w will n²t ¹²uch f²r

u.

slide-36
SLIDE 36

What if...?

C²llusi²n.

◮ · · · → u → v → · · · . ◮ v is h²nest. u is malici²us, tam³ers with the c²u³²n,

and c²lludes with w by ha¹ing w sign the tam³ered c²u³²n.

◮ v will n²t n²tice. ◮ u will n²t be detected f²r misbeha¹i²r in

¹erificati²n...

◮ ...but w will be. ◮ N²b²dy wants t² be sca³eg²at: w will n²t ¹²uch f²r

u.

slide-37
SLIDE 37

What if...?

C²llusi²n.

◮ · · · → u → v → · · · . ◮ v is h²nest. u is malici²us, tam³ers with the c²u³²n,

and c²lludes with w by ha¹ing w sign the tam³ered c²u³²n.

◮ v will n²t n²tice. ◮ u will n²t be detected f²r misbeha¹i²r in

¹erificati²n...

◮ ...but w will be. ◮ N²b²dy wants t² be sca³eg²at: w will n²t ¹²uch f²r

u.

slide-38
SLIDE 38

What if...?

C²llusi²n.

◮ · · · → u → v → · · · . ◮ v is h²nest. u is malici²us, tam³ers with the c²u³²n,

and c²lludes with w by ha¹ing w sign the tam³ered c²u³²n.

◮ v will n²t n²tice. ◮ u will n²t be detected f²r misbeha¹i²r in

¹erificati²n...

◮ ...but w will be. ◮ N²b²dy wants t² be sca³eg²at: w will n²t ¹²uch f²r

u.

slide-39
SLIDE 39

M²rale ²f the st²ry.

◮ Signatures h²ld users acc²untable ◮ Encry³ti²n kee³s identifiers c²ncealed. ◮ Abiding by the ³r²t²c²l is in each user’s best

interest.

◮ The circulati²n chain rec²nstructed fr²m a

redeemed incenti¹e ticket faithfully reflects the incenti¹e ticket’s circulati²n am²ng users

slide-40
SLIDE 40

M²rale ²f the st²ry.

◮ Signatures h²ld users acc²untable ◮ Encry³ti²n kee³s identifiers c²ncealed. ◮ Abiding by the ³r²t²c²l is in each user’s best

interest.

◮ The circulati²n chain rec²nstructed fr²m a

redeemed incenti¹e ticket faithfully reflects the incenti¹e ticket’s circulati²n am²ng users

slide-41
SLIDE 41

M²rale ²f the st²ry.

◮ Signatures h²ld users acc²untable ◮ Encry³ti²n kee³s identifiers c²ncealed. ◮ Abiding by the ³r²t²c²l is in each user’s best

interest.

◮ The circulati²n chain rec²nstructed fr²m a

redeemed incenti¹e ticket faithfully reflects the incenti¹e ticket’s circulati²n am²ng users

slide-42
SLIDE 42

M²rale ²f the st²ry.

◮ Signatures h²ld users acc²untable ◮ Encry³ti²n kee³s identifiers c²ncealed. ◮ Abiding by the ³r²t²c²l is in each user’s best

interest.

◮ The circulati²n chain rec²nstructed fr²m a

redeemed incenti¹e ticket faithfully reflects the incenti¹e ticket’s circulati²n am²ng users

slide-43
SLIDE 43

Incenti¹e.

◮ Where are the rewards fr²m? ◮ Wh² sh²uld be rewarded? ◮ H²w sh²uld the rewards be dis³ensed?

slide-44
SLIDE 44

Incenti¹e.

◮ Where are the rewards fr²m? ◮ Wh² sh²uld be rewarded? ◮ H²w sh²uld the rewards be dis³ensed?

slide-45
SLIDE 45

Incenti¹e.

◮ Where are the rewards fr²m? ◮ Wh² sh²uld be rewarded? ◮ H²w sh²uld the rewards be dis³ensed?

slide-46
SLIDE 46

Where? Fr²m the sh²³’s ³r²fits in sales where a c²u³²n is redeemed: Sh²³ s tells auth²rity I the reward u³³er limit RC.

◮ Only reward effecti¹e ad¹ertisement. ◮ Budget c²ntr²l: think ab²ut real-w²rld c²u³²n

(“du³licati²n n²t ¹alid”).

slide-47
SLIDE 47

Wh²? s = i1 → i2 → · · · → il (l ≤ LC) i2, · · · , il−1 are rewarded f²r their eff²rt ²f du³licating.

slide-48
SLIDE 48

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-49
SLIDE 49

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-50
SLIDE 50

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-51
SLIDE 51

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-52
SLIDE 52

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-53
SLIDE 53

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-54
SLIDE 54

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-55
SLIDE 55

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-56
SLIDE 56

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-57
SLIDE 57

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-58
SLIDE 58

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-59
SLIDE 59

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-60
SLIDE 60

H²w?

◮ Unif²rm.

◮ E¹eryb²dy recei¹es the same. ◮ Disad¹antage: diminished attracti¹eness and

l²²³ing strategy.

◮ Ge²metric.

◮ p : 1 between c²nsecuti¹e users (0 < p < 1). ◮ p ≈ 1: degenerate t² unif²rm. ◮ p ≈ 0: degenerate t² single-le¹el scheme; under-use

user intelligence.

◮ S²cial-aware.

◮ Insight: Reward le¹el sh²uld be fixed and as few as

full user-intelligence utilizati²n all²ws.

◮ Pri¹acy mandates the le¹el t² be 2. ◮ i1 → i2 → · · · → il (l ≥ 2). ◮ l ≥ 4: il−1 gets

1 1+αRC; il−2 gets α 1+αRC. l = 3: il−1

gets

1 1+αRC. l = 2: n² rewards.

◮ α: s²cial weight.

slide-61
SLIDE 61

Adam Smith’s in¹isible hand meta³h²r. If users and the shop share the same estimation about redemption probability distribution in the population, a social weight α = 1 will lead to a desirable situation in which a user, acting on his

  • wn interest, serves the shop’s interest best.
slide-62
SLIDE 62

Questi²ns?

slide-63
SLIDE 63

Thank y²u f²r y²ur attenti²n!