Skip to main content

An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10575))

Included in the following conference series:

Abstract

Content sharing in social networks is now one of the most common activities of internet users. In sharing content, users often have to make access control or privacy decisions that impact other stakeholders or co-owners. These decisions involve negotiation, either implicitly or explicitly. Over time, as users engage in these interactions, their own privacy attitudes evolve, influenced by and consequently influencing their peers. In this paper, we present a variation of the one-shot Ultimatum Game, wherein we model individual users interacting with their peers to make privacy decisions about shared content. We analyze the effects of sharing dynamics on individuals’ privacy preferences over repeated interactions of the game. We theoretically demonstrate conditions under which users’ access decisions eventually converge, and characterize this limit as a function of inherent individual preferences at the start of the game and willingness to concede these preferences over time. We provide simulations highlighting specific insights on global and local influence, short-term interactions and the effects of homophily on consensus.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Note that we abstract ourselves from the actual privacy settings or access control paradigm used by the online social network provider. For each social media infrastructure or privacy policy language used, a mapping could be defined that turns available settings into values in [0, 1] and vice versa.

References

  1. Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Electronic Commerce Conference, pp. 21–29. ACM Press (2004)

    Google Scholar 

  2. Arendt, D.L., Blaha, L.M.: Opinions, influence, and zealotry: a computational study on stubbornness. Comput. Math. Organ. Theor. 21(2), 184–209 (2015)

    Article  Google Scholar 

  3. Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1563–1572. ACM (2010)

    Google Scholar 

  4. Bhumiratana, B., Bishop, M.: Privacy aware data sharing: balancing the usability and privacy of datasets. In: Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments, p. 73. ACM (2009)

    Google Scholar 

  5. Brandwatch.com. Facebook statistics from Brandwatch (2016). https://www.brandwatch.com/blog/47-facebook-statistics-2016/

  6. Bravo, G., Castellani, M., Squazzoni, F., Boero, R.: Reputation and judgment effects in repeated trust games (2008)

    Google Scholar 

  7. Brush, A.J., Krumm, J., Scott, J.: Exploring end user preferences for location obfuscation, location-based services, and the value of location. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, pp. 95–104. ACM (2010)

    Google Scholar 

  8. Camerer, C.: Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press, Princeton (2003)

    MATH  Google Scholar 

  9. Chen, J., Brust, M.R., Kiremire, A.R., Phoha, V.V.: Modeling privacy settings of an online social network from a game-theoretical perspective. In: 2013 9th International Conference Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), pp. 213–220. IEEE, October 2013

    Google Scholar 

  10. Cosley, D., Huttenlocher, D.P., Kleinberg, J.M., Lan, X., Suri, S.: Sequential influence models in social networks. In: ICWSM, vol. 10, p. 26 (2010)

    Google Scholar 

  11. Crandall, D., Cosley, D., Huttenlocher, D., Kleinberg, J., Suri, S.: Feedback effects between similarity and social influence in online communities. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 160–168. ACM (2008)

    Google Scholar 

  12. Fogues, R.L., Murukannaiah, P.K., Such, J.M., Singh, M.P.: Sharing policies in multiuser privacy scenarios: incorporating context, preferences, and arguments in decision making. ACM Trans. Comput. Hum. Interact. (TOCHI) 24(1), 5 (2017)

    Article  Google Scholar 

  13. Friedkin, N.E.: A Structural Theory of Social Influence, vol. 13. Cambridge University Press, Cambridge (2006)

    Google Scholar 

  14. Henrich, J.P.: Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small-Scale Societies. Oxford University Press on Demand, Oxford (2004)

    Book  Google Scholar 

  15. Hu, H., Ahn, G.-J.: Multiparty authorization framework for data sharing in online social networks. In: Li, Y. (ed.) DBSec 2011. LNCS, vol. 6818, pp. 29–43. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22348-8_5

    Chapter  Google Scholar 

  16. Hu, H., Ahn, G-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 103–112. ACM (2011)

    Google Scholar 

  17. Hongxin, H., Ahn, G.-J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614–1627 (2013)

    Article  Google Scholar 

  18. Hu, H., Ahn, G-J., Zhao, Z., Yang, D.: Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT), London, Ontario, pp. 93–102. ACM (2014)

    Google Scholar 

  19. John, L.K., Acquisti, A., Loewenstein, G.: Strangers on a plane: context-dependent willingness to divulge sensitive information. J. Consum. Res. 37(5), 858–873 (2011)

    Article  Google Scholar 

  20. Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We’re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3217–3226. ACM (2011)

    Google Scholar 

  21. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5(1), 6:1–6:30 (2010)

    Article  Google Scholar 

  22. Marwick, A.E., Boyd, D.: I tweet honestly, i tweet passionately: Twitter users, context collapse, and the imagined audience. New Media Soc. 13(1), 114–133 (2011)

    Article  Google Scholar 

  23. McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: homophily in social networks. Ann. Rev. Sociol. 27, 415–444 (2001)

    Article  Google Scholar 

  24. Page, K.M., Nowak, M.A.: Empathy leads to fairness. Bull. Math. Biol. 64(6), 1101–1116 (2002)

    Article  MATH  Google Scholar 

  25. Rajtmajer, S., Squicciarini, A., Griffin, C., Karumanchi, S., Tyagi, S.: Constrained social-energy minimization for multi-party sharing in online social networks. In: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, pp. 680–688. International Foundation for Autonomous Agents and Multiagent Systems (2016)

    Google Scholar 

  26. Rand, D.G., Tarnita, C.E., Ohtsuki, H., Nowak, M.A.: Evolution of fairness in the one-shot anonymous ultimatum game. Proc. Natl. Acad. Sci. 110(7), 2581–2586 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  27. Ryan, B., Gross, N.: The diffusion of hybrid seed corn in two Iowa communities. Rural Sociol. 8(1), 15–24 (1943)

    Google Scholar 

  28. Sanfey, A.G., Rilling, J.K., Aronson, J.A., Nystrom, L.E., Cohen, J.D.: The neural basis of economic decision-making in the ultimatum game. Science 300(5626), 1755–1758 (2003)

    Article  Google Scholar 

  29. Schlegel, R., Kapadia, A., Lee, A.J.: Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 14. ACM (2011)

    Google Scholar 

  30. Sleeper, M., Balebako, R., Das, S., McConahy, A.L., Wiese, J., Cranor, L.F.: The post that wasn’t: exploring self-censorship on Facebook. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, pp. 793–802. ACM (2013)

    Google Scholar 

  31. Solove, D.J.: Nothing to Hide: The False Tradeoff Between Privacy and Security. Yale University Press, New Haven (2011)

    Google Scholar 

  32. Stutzman, F., Hartzog, W.: Boundary regulation in social media. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, pp. 769–778. ACM (2012)

    Google Scholar 

  33. Such, J.M., Criado, N.: Resolving multi-party privacy conflicts in social media. IEEE Trans. Knowl. Data Eng. 28(7), 1851–1863 (2016)

    Article  Google Scholar 

  34. Such, J.M., Porter, J., Preibusch, S., Joinson, A.: Photo privacy conflicts in social media: a large-scale empirical study. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3821–3832. ACM (2017)

    Google Scholar 

  35. Such, J.M., Rovatsos, M.: Privacy policy negotiation in social media. ACM Trans. Auton. Adapt. Syst. 11(4), 1–29 (2016)

    Article  Google Scholar 

  36. van Baaren, R., Janssen, L., Chartrand, T.L., Dijksterhuis, A.: Where is the love? the social aspects of mimicry. Philos. Trans. R. Soc. B 364(1528), 2381–2389 (2009)

    Article  Google Scholar 

  37. Wallace, B., Cesarini, D., Lichtenstein, P., Johannesson, M.: Heritability of ultimatum game responder behavior. Proc. Natl. Acad. Sci. 104(40), 15631–15634 (2007)

    Article  Google Scholar 

  38. Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: “I regretted the minute i pressed share”: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM (2011)

    Google Scholar 

  39. Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: coping mechanisms for SNS boundary regulation. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 609–618. ACM (2012)

    Google Scholar 

  40. Yildiz, E., Acemoglu, D., Ozdaglar, A.E., Saberi, A., Scaglione, A.: Discrete opinion dynamics with stubborn agents (2011)

    Google Scholar 

  41. Zachary, W.W.: An information flow model for conflict and fission in small groups. J. Anthropol. Res. 33, 452–473 (1977)

    Article  Google Scholar 

  42. Zhu, Q., Rajtmajer, S., Belmonte, A.: The emergence of fairness in an agent-based ultimatum game. In: Preparation (2016)

    Google Scholar 

Download references

Acknowledgements

Portions of Dr. Squicciarini’s and Mr. Semonsen’s work were funded by Army Research Office under the auspices of Grant W911NF-13-1-0271. Portions of Dr. Squicciarini’s work were additionally supported by a National Science Foundation grant 1453080. Dr. Such was supported by the EPSRC under grant EP/M027805/2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anna Squicciarini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Rajtmajer, S., Squicciarini, A., Such, J.M., Semonsen, J., Belmonte, A. (2017). An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content. In: Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S. (eds) Decision and Game Theory for Security. GameSec 2017. Lecture Notes in Computer Science(), vol 10575. Springer, Cham. https://doi.org/10.1007/978-3-319-68711-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68711-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68710-0

  • Online ISBN: 978-3-319-68711-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics