Abstract
In this article, we aim to answer an important set of questions about the potential longitudinal effects of repeated sharing and privacy settings decisions over jointly managed content among users in a social network.
We model user interactions through a repeated game in a network graph. We present a variation of the one-shot Ultimatum Game, wherein individuals interact with peers to make a decision on a piece of shared content. The outcome of this game is either success or failure, wherein success implies that a satisfactory decision for all parties is made and failure instead implies that the parties could not reach an agreement. Our proposed game is grounded in empirical data about individual decisions in repeated pairwise negotiations about jointly managed content in a social network. We consider both a “continuous” privacy model as well the “discrete” case of a model wherein privacy values are to be chosen among a fixed set of options. We formally demonstrate that over time, the system converges toward a “fair” state, wherein each individual’s preferences are accounted for. Our discrete model is validated by way of a user study, where participants are asked to propose privacy settings for own shared content from a small, discrete set of options.
- [1] . 2004. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Electronic Commerce Conference, (Ed.). 21–29.Google Scholar
Digital Library
- [2] . 2015. Opinions, influence, and zealotry: A computational study on stubbornness. Computational and Mathematical Organization Theory 21, 2 (2015), 184–209.Google Scholar
Digital Library
- [3] . 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1563–1572.Google Scholar
Digital Library
- [4] . 2009. Privacy aware data sharing: Balancing the usability and privacy of datasets. In Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments. ACM, 73.Google Scholar
Digital Library
- [5] . 2016. Facebook Statistics from Brandwatch. Retrieved on September 9, 2022 from https://www.brandwatch.com/blog/47-facebook-statistics-2016/.Google Scholar
- [6] . 2008. Reputation and judgment effects in repeated trust games. Retrieved Sept 9, 2022 https://www.semanticscholar.org/paper/Reputation-and-judgment-effects-in-repeated-trust-Boero-Bravo/44e44fa54ce0f23aebd85c0cea7e215aa442635a.Google Scholar
- [7] . 2010. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing. ACM, 95–104.Google Scholar
Digital Library
- [8] . 2003. Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press.Google Scholar
- [9] . 2013. Modeling privacy settings of an online social network from a game-theoretical perspective. In 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom). IEEE, 213–220. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6679987.Google Scholar
Cross Ref
- [10] . 2020. Imitation of Success Leads to Cost of Living Mediated Fairness in the Ultimatum Game. https://www.sciencedirect.com/science/article/abs/pii/S0378437121006014freelance.Google Scholar
- [11] . 2010. Sequential influence models in social networks. ICWSM 10 (2010), 26.Google Scholar
- [12] . 2008. Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 160–168.Google Scholar
Digital Library
- [13] . 2017. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI) 24, 1 (2017), 5.Google Scholar
Digital Library
- [14] . 2006. A Structural Theory of Social Influence. Vol. 13. Cambridge University Press.Google Scholar
- [15] . 2004. Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small-Scale Societies. Oxford University Press On Demand.Google Scholar
Cross Ref
- [16] . 2011. Multiparty authorization framework for data sharing in online social networks. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 29–43.Google Scholar
Cross Ref
- [17] . 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 103–112.Google Scholar
Digital Library
- [18] . 2013. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7 (
July 2013), 1614–1627.Google ScholarDigital Library
- [19] . 2014. Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT’14). ACM, 93–102.Google Scholar
Digital Library
- [20] . 2019. A survey on interdependent privacy. ACM Computing Surveys (CSUR) 52, 6 (2019), 1–40.Google Scholar
Digital Library
- [21] . 2011. Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of Consumer Research 37, 5 (2011), 858–873.Google Scholar
Cross Ref
- [22] . 2018. Preserving privacy as social responsibility in online social networks. ACM Transactions on Internet Technology (TOIT) 18, 4 (2018), 1–22.Google Scholar
Digital Library
- [23] . 2018. PELTE: Privacy estimation of images from tags. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems. 1989–1991.Google Scholar
- [24] . 2021. Assisting humans in privacy management: An agent-based approach. Autonomous Agents and Multi-Agent Systems 35, 1 (2021), 1–33.Google Scholar
Digital Library
- [25] . 2011. We’re in it together: Interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3217–3226.Google Scholar
Digital Library
- [26] . 2010. A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data 5, 1 (
Dec. 2010), Article6 , 30 pages.DOI: .Google ScholarDigital Library
- [27] . 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (2011), 114–133.Google Scholar
Cross Ref
- [28] . 2012. Learning to discover social circles in ego networks. In NIPS, Vol. 2012. Citeseer, 548–556.Google Scholar
- [29] . 2001. Birds of a feather: Homophily in social networks. Annual Review of Sociology 27 (2001), 415–444.Google Scholar
Cross Ref
- [30] . 2020. Towards a value-driven explainable agent for collective privacy. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems. 1937–1939.Google Scholar
Digital Library
- [31] . 2002. Empathy leads to fairness. Bulletin of Mathematical Biology 64, 6 (2002), 1101–1116.Google Scholar
Cross Ref
- [32] . 2016. Constrained social-energy minimization for multi-party sharing in online social networks. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 680–688.Google Scholar
Digital Library
- [33] . 2017. An ultimatum game model for the evolution of privacy in jointly managed content. In Proceedings of the 8th International Conference on Decision and Game Theory for Security (GameSec’17),
Lecture Notes in Computer Science , Vol. 10575, , , , , and (Eds.). Springer, 112–130.DOI: Google ScholarCross Ref
- [34] . 2013. Evolution of fairness in the one-shot anonymous Ultimatum Game. Proceedings of the National Academy of Sciences U S A 110, 7 (2013), 2581–2586.Google Scholar
Cross Ref
- [35] . 1943. The diffusion of hybrid seed corn in two Iowa communities. Rural Sociology 8, 1 (1943), 15–24.Google Scholar
- [36] . 2003. The neural basis of economic decision-making in the ultimatum game. Science 300, 5626 (2003), 1755–1758.Google Scholar
Cross Ref
- [37] . 2011. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, 14.Google Scholar
Digital Library
- [38] . 2013. The post that wasn’t: Exploring self-censorship on Facebook. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work. ACM, 793–802.Google Scholar
Digital Library
- [39] . 2011. Nothing to Hide: The False Tradeoff between Privacy and Security. Yale University Press.Google Scholar
- [40] . 2012. Boundary regulation in social media. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. ACM, 769–778.Google Scholar
Digital Library
- [41] . 2016. Resolving multi-party privacy conflicts in social media. IEEE Transactions on Knowledge and Data Engineering 28, 7 (2016), 1851–1863.Google Scholar
Cross Ref
- [42] . 2017. Photo privacy conflicts in social media: A large-scale empirical study. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3821–3832.Google Scholar
Digital Library
- [43] . 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems 11, 4 (2016), 1–29. Issue 1.Google Scholar
Digital Library
- [44] . 2009. Where is the love? The social aspects of mimicry. Philosophical Transactions of the Royal Society B 364, 1528 (2009), 2381–2389.Google Scholar
Cross Ref
- [45] . 2007. Heritability of ultimatum game responder behavior. Proceedings of the National Academy of Sciences U S A 104, 40 (2007), 15631–15634.Google Scholar
Cross Ref
- [46] . 2011. I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, 10.Google Scholar
Digital Library
- [47] . 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 609–618.Google Scholar
Digital Library
- [48] . 2011. Discrete opinion dynamics with stubborn agents. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1744113.Google Scholar
- [49] . 1977. An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33 (1977), 452–473.Google Scholar
Cross Ref
- [50] . 2016. The emergence of fairness in an agent-based ultimatum game. In preparation.Google Scholar
Index Terms
An Extended Ultimatum Game for Multi-Party Access Control in Social Networks
Recommendations
The social Ultimatum Game and adaptive agents
AAMAS '11: The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3The Ultimatum Game is a key exemplar that shows how human play often deviates from "rational" strategies suggested by game-theoretic analysis. One explanation is that humans cannot put aside the assumption of being in a multi-player multi-round ...
Social Network Privacy via Evolving Access Control
WASA '09: Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and ApplicationsWe study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that ...
Multi-Party Privacy Conflict Management in Online Social Networks: A Network Game Perspective
In this work, we consider the multi-party privacy conflict (MPC) in an online social network (OSN). As many data items uploaded to the OSN are “co-owned” by multiple users with different privacy concerns, some personal information of OSN ...






Comments