skip to main content
research-article

An Extended Ultimatum Game for Multi-Party Access Control in Social Networks

Published:28 September 2022Publication History
Skip Abstract Section

Abstract

In this article, we aim to answer an important set of questions about the potential longitudinal effects of repeated sharing and privacy settings decisions over jointly managed content among users in a social network.

We model user interactions through a repeated game in a network graph. We present a variation of the one-shot Ultimatum Game, wherein individuals interact with peers to make a decision on a piece of shared content. The outcome of this game is either success or failure, wherein success implies that a satisfactory decision for all parties is made and failure instead implies that the parties could not reach an agreement. Our proposed game is grounded in empirical data about individual decisions in repeated pairwise negotiations about jointly managed content in a social network. We consider both a “continuous” privacy model as well the “discrete” case of a model wherein privacy values are to be chosen among a fixed set of options. We formally demonstrate that over time, the system converges toward a “fair” state, wherein each individual’s preferences are accounted for. Our discrete model is validated by way of a user study, where participants are asked to propose privacy settings for own shared content from a small, discrete set of options.

REFERENCES

  1. [1] Acquisti A.. 2004. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Electronic Commerce Conference, Press ACM (Ed.). 2129.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Arendt Dustin L. and Blaha Leslie M.. 2015. Opinions, influence, and zealotry: A computational study on stubbornness. Computational and Mathematical Organization Theory 21, 2 (2015), 184209.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Besmer Andrew and Lipford Heather Richter. 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 15631572.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Bhumiratana Bhume and Bishop Matt. 2009. Privacy aware data sharing: Balancing the usability and privacy of datasets. In Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments. ACM, 73.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Brandwatch.com. 2016. Facebook Statistics from Brandwatch. Retrieved on September 9, 2022 from https://www.brandwatch.com/blog/47-facebook-statistics-2016/.Google ScholarGoogle Scholar
  6. [6] Bravo Giangiacomo, Castellani Marco, Squazzoni Flaminio, and Boero Riccardo. 2008. Reputation and judgment effects in repeated trust games. Retrieved Sept 9, 2022 https://www.semanticscholar.org/paper/Reputation-and-judgment-effects-in-repeated-trust-Boero-Bravo/44e44fa54ce0f23aebd85c0cea7e215aa442635a.Google ScholarGoogle Scholar
  7. [7] Brush A. J., Krumm John, and Scott James. 2010. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing. ACM, 95104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Camerer Colin. 2003. Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press.Google ScholarGoogle Scholar
  9. [9] Chen Jundong, Brust Matthias R., Kiremire Ankunda R., and Phoha Vir V.. 2013. Modeling privacy settings of an online social network from a game-theoretical perspective. In 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom). IEEE, 213220. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6679987.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Chen Yunong, Belmonte Andrew, and Griffin Christopher. 2020. Imitation of Success Leads to Cost of Living Mediated Fairness in the Ultimatum Game. https://www.sciencedirect.com/science/article/abs/pii/S0378437121006014freelance.Google ScholarGoogle Scholar
  11. [11] Cosley Dan, Huttenlocher Daniel P., Kleinberg Jon M., Lan Xiangyang, and Suri Siddharth. 2010. Sequential influence models in social networks. ICWSM 10 (2010), 26.Google ScholarGoogle Scholar
  12. [12] Crandall David, Cosley Dan, Huttenlocher Daniel, Kleinberg Jon, and Suri Siddharth. 2008. Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 160168.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Fogues Ricard L., Murukannaiah Pradeep K., Such Jose M., and Singh Munindar P.. 2017. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI) 24, 1 (2017), 5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Friedkin Noah E.. 2006. A Structural Theory of Social Influence. Vol. 13. Cambridge University Press.Google ScholarGoogle Scholar
  15. [15] Henrich Joseph Patrick. 2004. Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small-Scale Societies. Oxford University Press On Demand.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Hu Hongxin and Ahn Gail-Joon. 2011. Multiparty authorization framework for data sharing in online social networks. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 2943.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Hu Hongxin, Ahn Gail-Joon, and Jorgensen Jan. 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 103112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Hu Hongxin, Ahn Gail-Joon, and Jorgensen Jan. 2013. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7 (July 2013), 16141627.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Hu Hongxin, Ahn Gail-Joon, Zhao Ziming, and Yang Dejun. 2014. Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT’14). ACM, 93102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Humbert Mathias, Trubert Benjamin, and Huguenin Kévin. 2019. A survey on interdependent privacy. ACM Computing Surveys (CSUR) 52, 6 (2019), 140.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] John Leslie K., Acquisti Alessandro, and Loewenstein George. 2011. Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of Consumer Research 37, 5 (2011), 858873.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Kekulluoglu Dilara, Kokciyan Nadin, and Yolum Pinar. 2018. Preserving privacy as social responsibility in online social networks. ACM Transactions on Internet Technology (TOIT) 18, 4 (2018), 122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Kurtan Abdurrahman Can and Yolum Pinar. 2018. PELTE: Privacy estimation of images from tags. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems. 19891991.Google ScholarGoogle Scholar
  24. [24] Kurtan A. Can and Yolum Pınar. 2021. Assisting humans in privacy management: An agent-based approach. Autonomous Agents and Multi-Agent Systems 35, 1 (2021), 133.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Lampinen Airi, Lehtinen Vilma, Lehmuskallio Asko, and Tamminen Sakari. 2011. We’re in it together: Interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 32173226.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Liu Kun and Terzi Evimaria. 2010. A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data 5, 1 (Dec. 2010), Article 6, 30 pages. DOI:.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Marwick Alice E. and Boyd Danah. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (2011), 114133.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] McAuley Julian J. and Leskovec Jure. 2012. Learning to discover social circles in ego networks. In NIPS, Vol. 2012. Citeseer, 548556.Google ScholarGoogle Scholar
  29. [29] McPherson Miller, Smith-Lovin Lynn, and Cook James M.. 2001. Birds of a feather: Homophily in social networks. Annual Review of Sociology 27 (2001), 415444.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Mosca Francesca, Such Jose M., and McBurney Peter. 2020. Towards a value-driven explainable agent for collective privacy. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems. 19371939.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Page Karen M. and Nowak Martin A.. 2002. Empathy leads to fairness. Bulletin of Mathematical Biology 64, 6 (2002), 11011116.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Rajtmajer Sarah, Squicciarini Anna, Griffin Christopher, Karumanchi Sushama, and Tyagi Alpana. 2016. Constrained social-energy minimization for multi-party sharing in online social networks. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 680688.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Rajtmajer Sarah Michele, Squicciarini Anna Cinzia, Such Jose M., Semonsen Justin, and Belmonte Andrew. 2017. An ultimatum game model for the evolution of privacy in jointly managed content. In Proceedings of the 8th International Conference on Decision and Game Theory for Security (GameSec’17), Lecture Notes in Computer Science, Vol. 10575, Rass Stefan, An Bo, Kiekintveld Christopher, Fang Fei, and Schauer Stefan (Eds.). Springer, 112130. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Rand David G., Tarnita Corina E., Ohtsuki Hisashi, and Nowak Martin A.. 2013. Evolution of fairness in the one-shot anonymous Ultimatum Game. Proceedings of the National Academy of Sciences U S A 110, 7 (2013), 25812586.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Ryan B. and Gross N.. 1943. The diffusion of hybrid seed corn in two Iowa communities. Rural Sociology 8, 1 (1943), 1524.Google ScholarGoogle Scholar
  36. [36] Sanfey Alan G., Rilling James K., Aronson Jessica A., Nystrom Leigh E., and Cohen Jonathan D.. 2003. The neural basis of economic decision-making in the ultimatum game. Science 300, 5626 (2003), 17551758.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Schlegel Roman, Kapadia Apu, and Lee Adam J.. 2011. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, 14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Sleeper Manya, Balebako Rebecca, Das Sauvik, McConahy Amber Lynn, Wiese Jason, and Cranor Lorrie Faith. 2013. The post that wasn’t: Exploring self-censorship on Facebook. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work. ACM, 793802.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Solove Daniel J.. 2011. Nothing to Hide: The False Tradeoff between Privacy and Security. Yale University Press.Google ScholarGoogle Scholar
  40. [40] Stutzman Frederic and Hartzog Woodrow. 2012. Boundary regulation in social media. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. ACM, 769778.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Such Jose M. and Criado Natalia. 2016. Resolving multi-party privacy conflicts in social media. IEEE Transactions on Knowledge and Data Engineering 28, 7 (2016), 18511863.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Such Jose M., Porter Joel, Preibusch Sören, and Joinson Adam. 2017. Photo privacy conflicts in social media: A large-scale empirical study. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 38213832.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Such Jose M. and Rovatsos Michael. 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems 11, 4 (2016), 129. Issue 1.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Baaren R. van, Janssen L., Chartrand T. L., and Dijksterhuis A.. 2009. Where is the love? The social aspects of mimicry. Philosophical Transactions of the Royal Society B 364, 1528 (2009), 23812389.Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Wallace Björn, Cesarini David, Lichtenstein Paul, and Johannesson Magnus. 2007. Heritability of ultimatum game responder behavior. Proceedings of the National Academy of Sciences U S A 104, 40 (2007), 1563115634.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Wang Yang, Norcie Gregory, Komanduri Saranga, Acquisti Alessandro, Leon Pedro Giovanni, and Cranor Lorrie Faith. 2011. I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, 10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Wisniewski Pamela, Lipford Heather, and Wilson David. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 609618.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Yildiz Ercan, Acemoglu Daron, Ozdaglar Asuman E., Saberi Amin, and Scaglione Anna. 2011. Discrete opinion dynamics with stubborn agents. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1744113.Google ScholarGoogle Scholar
  49. [49] Zachary W. W.. 1977. An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33 (1977), 452473.Google ScholarGoogle ScholarCross RefCross Ref
  50. [50] Zhu Qianru, Rajtmajer Sarah, and Belmonte Andrew. 2016. The emergence of fairness in an agent-based ultimatum game. In preparation.Google ScholarGoogle Scholar

Index Terms

  1. An Extended Ultimatum Game for Multi-Party Access Control in Social Networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on the Web
            ACM Transactions on the Web  Volume 16, Issue 3
            August 2022
            155 pages
            ISSN:1559-1131
            EISSN:1559-114X
            DOI:10.1145/3555790
            Issue’s Table of Contents

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 28 September 2022
            • Online AM: 27 August 2022
            • Accepted: 1 March 2022
            • Revised: 6 December 2021
            • Received: 21 April 2021
            Published in tweb Volume 16, Issue 3

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Full Text

          View this article in Full Text.

          View Full Text

          HTML Format

          View this article in HTML Format .

          View HTML Format