4) DECISION MAKER
As shown in Fig. 2, a decision maker can get the data mining
results directly from the data miner, or from some Informa-
tion Transmitter. It is likely that the information transmitter
changes the mining results intentionally or unintentionally,
which may cause serious loss to the decision maker. Therefore,
what the decision maker concerns is whether the mining
results are credible.
In addition to investigate the privacy-protection approaches
adopted by each user role, in this paper we emphasize a common
type of approach, namely game theoretical approach,
that can be applied to many problems involving privacy protection
in data mining. The rationality is that, in the data
mining scenario, each user pursues high self-interests in terms
of privacy preservation or data utility, and the interests of
different users are correlated. Hence the interactions among
different users can be modeled as a game. By using methodologies
from game theory [8], we can get useful implications
on how each user role should behavior in an attempt to solve
his privacy problems.