Nothing Special   »   [go: up one dir, main page]

Skip to main content

Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9406))

Included in the following conference series:

  • 1616 Accesses

Abstract

The privacy policies of an online social network play an important role in determining user involvement and satisfaction, and in turn site profit and success. In this paper, we develop a game theoretic framework to model the relationship between the set of privacy options offered by a social network site and the sharing decisions of its users within these constraints. We model the site and the users in this scenario as the leader and followers, respectively, in a Stackelberg game. We formally establish the conditions under which this game reaches a Nash equilibrium in pure strategies and provide an approximation algorithm for the site to determine a discrete set of privacy options to maximize payoff. We validate hypotheses in our model on data collected from a mock-social network of users’ privacy preferences both within and outside the context of peer influence, and demonstrate that the qualitative assumptions of our model are well-founded.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in e-commerce: Examining user scenarios and privacy preferences. In: Proceedings of the 1st ACM Conference on Electronic Commerce, EC 1999, pp. 1–8. ACM, New York (1999)

    Google Scholar 

  2. Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509–514 (2015)

    Article  Google Scholar 

  3. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, pp. 551–560. ACM, New York (2009)

    Google Scholar 

  4. Caliskan-Islam, A.: How do we decide how much to reveal? SIGCAS Comput. Soc. 45(1), 14–15 (2015)

    Article  Google Scholar 

  5. Chen, J., Brust, M.R., Kiremire, A.R., Phoha, V.V.: Modeling privacy settings of an online social network from a game-theoretical perspective. In: 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), pp. 213–220. IEEE, October 2013

    Google Scholar 

  6. Chron. What is the minimum information needed to create a facebook account? (2013). http://smallbusiness.chron.com/minimum-information-needed-create-facebook-account-27690.html

  7. Cranor, L.F., Reagle, J., Ackerman, M.S.: Beyond Concern: Understanding Net Users’ Attitudes About Online Privacy. MIT Press, Cambridge (2000)

    Google Scholar 

  8. Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 351–360. ACM, New York, April 2010

    Google Scholar 

  9. Fu, F., Chen, C., Liu, L., Wag, L.: Social dilemmas in an online social network: The structure and evolution of cooperation. Phys. Lett. A 371(1–2), 58–64 (2007)

    Article  MATH  Google Scholar 

  10. Griffin, C., Squicciarini, A.: Toward a game theoretic model of information release in social media with experimental results. In: Proceedings of the 2nd Workshop on Semantic Computing and Security, San Francisco, CA, USA, 28 May 2012

    Google Scholar 

  11. Griffin, C., Squicciarini, A., Rajtmajer, S., Tentilucci, M., Li, S.: Site-constrained privacy options for users in social networks through stackelberg games. In: Proceedings of Sixth ASE International Conference on Social Computing, May 2014

    Google Scholar 

  12. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 71–80. ACM, New York (2005)

    Google Scholar 

  13. Hansen, P., Jaumard, B., Savard, G.: New branch-and-bound rules for linear bilevel programming. SIAM J. Sci. Stat. Comput. 13(5), 1194–1217 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  14. Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: The case of the facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)

    Article  Google Scholar 

  15. Hui, P., Buchegger, S.: Groupthink and peer pressure: social influence in online social network groups. In: 2009 International Conference on Advances in Social Network Analysis and Mining (ASONAM), pp. 53–59. IEEE, Los Alamitos, July 2009

    Google Scholar 

  16. Immorlica, N., Lucier, B., Rogers, B.: Emergence of cooperation in anonymous social networks through social capital. In: Proceedings of the 11th ACM Conference on Electronic Commerce EC (2010)

    Google Scholar 

  17. Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94–100 (2007)

    Article  Google Scholar 

  18. Kayes, I., Iamnitchi, A.: A survey on privacy and security in online social networks (2015). arXiv preprint arXiv:1504.03342

  19. Krishnamurthy, B., Gill, P., Arlitt, M.: A few chirps about twitter. In: Proceedings of the First Workshop on Online Social Networks, WOSN 2008, pp. 19–24. ACM, New York (2008)

    Google Scholar 

  20. Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, WOSN 2008, pp. 37–42. ACM, New York (2008)

    Google Scholar 

  21. Lindamood, J., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Inferring private information using social network data. In: WWW 2009 Proceedings of the 18th International Conference on World Wide Web, pp. 1145–1146. ACM, New York, April 2009

    Google Scholar 

  22. Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 61–70 (2011)

    Google Scholar 

  23. Ohtsuki, H., Hauert, C., Lieberman, E., Nowak, M.A.: A simple rule for the evolution of cooperation on graphs and social networks. Nature 441(7092), 502–505 (2006)

    Article  Google Scholar 

  24. Park, N., Kee, K., Valenzuela, S.: Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes. CyberPsychol. Behav. 12(6), 729–733 (2009)

    Article  Google Scholar 

  25. Rajtmajer, S.M., Griffin, C., Mikesell, D., Squicciarini, A.: A cooperate-defect model for the spread of deviant behavior in social networks. CoRR, abs/1408.2770 (2014)

    Google Scholar 

  26. Rand, D.G., Arbesman, S., Christakis, N.A.: Dynamic social networks promote cooperation in experiments with humans. Proc. Nat. Acad. Sci. 108(48), 19193–19198 (2011)

    Article  Google Scholar 

  27. Rosen, J.B.: Existence and uniqueness of equilibrium points for concave n-person games. Econometrica 33(3), 520–534 (1965)

    Article  MathSciNet  MATH  Google Scholar 

  28. Simpson, A.: On the need for user-defined fine-grained access control policies for social networking applications. In: Proceedings of the Workshop on Security in Opportunistic and SOCial Networks, SOSOC 2008. ACM, New York (2008)

    Google Scholar 

  29. Squicciarini, A., Griffin, C.: An informed model of personal information release in social networking sites. In: Proceedings of the Fourth IEEE International Conference on Information Privacy, Security, Risk and Trust, September 2012

    Google Scholar 

  30. Squicciarini, A., Griffin, C.: An informed model of personal information release in social networking sites. In: 2012 ASE/IEEE Conference on Privacy, Security, Risk and Trust, Amsterdam, Netherlands, September 2012

    Google Scholar 

  31. Squicciarini, A., Paci, F., Sundareswaran, S.: PriMa: an effective privacy protection mechanism for social networks. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 320–323 (2010)

    Google Scholar 

  32. Squicciarini, A., Shehab, M., Wede, J.: Privacy policies for shared content in social network sites. VLDB J. 19(6), 777–796 (2010)

    Article  Google Scholar 

  33. Squicciarini, A.C., Griffin, C.: Why and how to deceive: game results with sociological evidence. Soc. Netw. Anal. Min. 4(1), 161 (2014)

    Article  Google Scholar 

  34. Squicciarini, A.C., Griffin, C., Sundareswaran, S.: Towards a game theoretical model for identity validation in social network sites. In: PASSAT/SocialCom 2011, Boston, MA, USA, 9–11 October, 2011, pp. 1081–1088 (2011)

    Google Scholar 

  35. Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: WWW 2009, pp. 521–530. ACM, New York (2009)

    Google Scholar 

  36. Vicente, L., Savard, G., Jdice, J.: Descent approaches for quadratic bilevel programming. J. Optim. Theory Appl. 81(2), 379–399 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  37. Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: “I regretted the minute I pressed share”: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS 2011, pp. 10:1–10:16. ACM, New York (2011)

    Google Scholar 

  38. Wu, Z.-X., Rong, Z., Yang, H.-X.: Impact of heterogeneous activity and community structure on the evolutionary success of cooperators in social networks. Phys. Rev. E 91, 012802 (2015)

    Article  Google Scholar 

  39. Zachary, W.W.: An information flow model for conflict and fission in small groups. J. Anthropol. Res. 33(4), 452–473 (1977)

    Google Scholar 

Download references

Acknowledgements

Portions of Dr. Rajtmajer’s, Dr. Griffin’s and Dr. Squicciarini’s work were supported by the Army Research Office grant W911NF-13-1-0271. Portions of Dr. Squicciarini’s work were additionally supported by the National Science Foundation grant 1453080.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarah Rajtmajer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Rajtmajer, S., Griffin, C., Squicciarini, A. (2015). Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games. In: Khouzani, M., Panaousis, E., Theodorakopoulos, G. (eds) Decision and Game Theory for Security. GameSec 2015. Lecture Notes in Computer Science(), vol 9406. Springer, Cham. https://doi.org/10.1007/978-3-319-25594-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25594-1_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25593-4

  • Online ISBN: 978-3-319-25594-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics