Abstract
In this article, we aim to answer an important set of questions about the potential longitudinal effects of repeated sharing and privacy settings decisions over jointly managed content among users in a social network.
We model user interactions through a repeated game in a network graph. We present a variation of the one-shot Ultimatum Game, wherein individuals interact with peers to make a decision on a piece of shared content. The outcome of this game is either success or failure, wherein success implies that a satisfactory decision for all parties is made and failure instead implies that the parties could not reach an agreement. Our proposed game is grounded in empirical data about individual decisions in repeated pairwise negotiations about jointly managed content in a social network. We consider both a “continuous” privacy model as well the “discrete” case of a model wherein privacy values are to be chosen among a fixed set of options. We formally demonstrate that over time, the system converges toward a “fair” state, wherein each individual’s preferences are accounted for. Our discrete model is validated by way of a user study, where participants are asked to propose privacy settings for own shared content from a small, discrete set of options.
- [1] . 2004. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Electronic Commerce Conference, (Ed.). 21–29.Google ScholarDigital Library
- [2] . 2015. Opinions, influence, and zealotry: A computational study on stubbornness. Computational and Mathematical Organization Theory 21, 2 (2015), 184–209.Google ScholarDigital Library
- [3] . 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1563–1572.Google ScholarDigital Library
- [4] . 2009. Privacy aware data sharing: Balancing the usability and privacy of datasets. In Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments. ACM, 73.Google ScholarDigital Library
- [5] . 2016. Facebook Statistics from Brandwatch. Retrieved on September 9, 2022 from https://www.brandwatch.com/blog/47-facebook-statistics-2016/.Google Scholar
- [6] . 2008. Reputation and judgment effects in repeated trust games. Retrieved Sept 9, 2022 https://www.semanticscholar.org/paper/Reputation-and-judgment-effects-in-repeated-trust-Boero-Bravo/44e44fa54ce0f23aebd85c0cea7e215aa442635a.Google Scholar
- [7] . 2010. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing. ACM, 95–104.Google ScholarDigital Library
- [8] . 2003. Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press.Google Scholar
- [9] . 2013. Modeling privacy settings of an online social network from a game-theoretical perspective. In 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom). IEEE, 213–220. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6679987.Google ScholarCross Ref
- [10] . 2020. Imitation of Success Leads to Cost of Living Mediated Fairness in the Ultimatum Game. https://www.sciencedirect.com/science/article/abs/pii/S0378437121006014freelance.Google Scholar
- [11] . 2010. Sequential influence models in social networks. ICWSM 10 (2010), 26.Google Scholar
- [12] . 2008. Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 160–168.Google ScholarDigital Library
- [13] . 2017. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI) 24, 1 (2017), 5.Google ScholarDigital Library
- [14] . 2006. A Structural Theory of Social Influence. Vol. 13. Cambridge University Press.Google Scholar
- [15] . 2004. Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small-Scale Societies. Oxford University Press On Demand.Google ScholarCross Ref
- [16] . 2011. Multiparty authorization framework for data sharing in online social networks. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 29–43.Google ScholarCross Ref
- [17] . 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 103–112.Google ScholarDigital Library
- [18] . 2013. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7 (
July 2013), 1614–1627.Google ScholarDigital Library - [19] . 2014. Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT’14). ACM, 93–102.Google ScholarDigital Library
- [20] . 2019. A survey on interdependent privacy. ACM Computing Surveys (CSUR) 52, 6 (2019), 1–40.Google ScholarDigital Library
- [21] . 2011. Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of Consumer Research 37, 5 (2011), 858–873.Google ScholarCross Ref
- [22] . 2018. Preserving privacy as social responsibility in online social networks. ACM Transactions on Internet Technology (TOIT) 18, 4 (2018), 1–22.Google ScholarDigital Library
- [23] . 2018. PELTE: Privacy estimation of images from tags. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems. 1989–1991.Google Scholar
- [24] . 2021. Assisting humans in privacy management: An agent-based approach. Autonomous Agents and Multi-Agent Systems 35, 1 (2021), 1–33.Google ScholarDigital Library
- [25] . 2011. We’re in it together: Interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3217–3226.Google ScholarDigital Library
- [26] . 2010. A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data 5, 1 (
Dec. 2010), Article6 , 30 pages.DOI: .Google ScholarDigital Library - [27] . 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (2011), 114–133.Google ScholarCross Ref
- [28] . 2012. Learning to discover social circles in ego networks. In NIPS, Vol. 2012. Citeseer, 548–556.Google Scholar
- [29] . 2001. Birds of a feather: Homophily in social networks. Annual Review of Sociology 27 (2001), 415–444.Google ScholarCross Ref
- [30] . 2020. Towards a value-driven explainable agent for collective privacy. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems. 1937–1939.Google ScholarDigital Library
- [31] . 2002. Empathy leads to fairness. Bulletin of Mathematical Biology 64, 6 (2002), 1101–1116.Google ScholarCross Ref
- [32] . 2016. Constrained social-energy minimization for multi-party sharing in online social networks. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 680–688.Google ScholarDigital Library
- [33] . 2017. An ultimatum game model for the evolution of privacy in jointly managed content. In Proceedings of the 8th International Conference on Decision and Game Theory for Security (GameSec’17),
Lecture Notes in Computer Science , Vol. 10575, , , , , and (Eds.). Springer, 112–130.DOI: Google ScholarCross Ref - [34] . 2013. Evolution of fairness in the one-shot anonymous Ultimatum Game. Proceedings of the National Academy of Sciences U S A 110, 7 (2013), 2581–2586.Google ScholarCross Ref
- [35] . 1943. The diffusion of hybrid seed corn in two Iowa communities. Rural Sociology 8, 1 (1943), 15–24.Google Scholar
- [36] . 2003. The neural basis of economic decision-making in the ultimatum game. Science 300, 5626 (2003), 1755–1758.Google ScholarCross Ref
- [37] . 2011. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, 14.Google ScholarDigital Library
- [38] . 2013. The post that wasn’t: Exploring self-censorship on Facebook. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work. ACM, 793–802.Google ScholarDigital Library
- [39] . 2011. Nothing to Hide: The False Tradeoff between Privacy and Security. Yale University Press.Google Scholar
- [40] . 2012. Boundary regulation in social media. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. ACM, 769–778.Google ScholarDigital Library
- [41] . 2016. Resolving multi-party privacy conflicts in social media. IEEE Transactions on Knowledge and Data Engineering 28, 7 (2016), 1851–1863.Google ScholarCross Ref
- [42] . 2017. Photo privacy conflicts in social media: A large-scale empirical study. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3821–3832.Google ScholarDigital Library
- [43] . 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems 11, 4 (2016), 1–29. Issue 1.Google ScholarDigital Library
- [44] . 2009. Where is the love? The social aspects of mimicry. Philosophical Transactions of the Royal Society B 364, 1528 (2009), 2381–2389.Google ScholarCross Ref
- [45] . 2007. Heritability of ultimatum game responder behavior. Proceedings of the National Academy of Sciences U S A 104, 40 (2007), 15631–15634.Google ScholarCross Ref
- [46] . 2011. I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, 10.Google ScholarDigital Library
- [47] . 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 609–618.Google ScholarDigital Library
- [48] . 2011. Discrete opinion dynamics with stubborn agents. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1744113.Google Scholar
- [49] . 1977. An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33 (1977), 452–473.Google ScholarCross Ref
- [50] . 2016. The emergence of fairness in an agent-based ultimatum game. In preparation.Google Scholar
Index Terms
- An Extended Ultimatum Game for Multi-Party Access Control in Social Networks
Recommendations
Anomaly Detection in Player Performances in Multiplayer Online Battle Arena Games
ACSW '22: Proceedings of the 2022 Australasian Computer Science WeekEsports are digital video games that are played professionally. In recent years there has been a growing need to improve the broadcast experience by incorporating real-time data-driven analytics. In these same games, when played by the general public, ...
The social Ultimatum Game and adaptive agents
AAMAS '11: The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3The Ultimatum Game is a key exemplar that shows how human play often deviates from "rational" strategies suggested by game-theoretic analysis. One explanation is that humans cannot put aside the assumption of being in a multi-player multi-round ...
Asking Graphs "How Did I Play?" Generating Graphs through Images Via Signals
MMSports '20: Proceedings of the 3rd International Workshop on Multimedia Content Analysis in SportsCricket is a game that requires players to constantly adapt to situations and customize their game depending on opponents and playing conditions. Players and coaching staff often watch video clips to understand the strategies of opponents. Iterating ...
Comments