An Informed Model of Personal Information Release in Social Networking Sites

The emergence of online social networks and the growing popularity of digital communication has resulted in an increasingly amount of information about individuals available on the Internet. Social network users are given the freedom to create complex digital identities, and enrich them with truthful or even fake personal information. However, this freedom has led to serious security and privacy incidents, due to the role users' identities play in establishing social and privacy settings. In this paper, we take a step toward a better understanding of online information exposure. Based on the detailed analysis of a sample of real-world data, we develop a deception model for online users. The model uses a game theoretic approach to characterizing a user's willingness to release, withhold or lie about information depending on the behavior of individuals within the user's circle of friends. In the model, we take into account both the heterogeneous nature of users and their different attitudes, as well as the different types of information they may expose online.

[1]  Drew Fudenberg,et al.  When is Reputation Bad? , 2002, Games Econ. Behav..

[2]  Tansu Alpcan,et al.  A game theoretic model for digital identity and trust in online communities , 2010, ASIACCS '10.

[3]  J. Goodman Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games , 1965 .

[4]  K. Aberer,et al.  On Reputation in Game Theory Application on Online Settings , 2004 .

[5]  Tansu Alpcan,et al.  Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.

[6]  Avanidhar Subrahmanyam,et al.  The Value of Private Information , 2005 .

[7]  C. Shapiro Consumer Information, Product Quality, and Seller Reputation , 1982 .

[8]  Rudi van Drunen,et al.  Localization of Random Pulse Point Sources Using Physically Implementable Search Algorithms , 2020, Optoelectronics, Instrumentation and Data Processing.

[9]  Danfeng Yao,et al.  The union-split algorithm and cluster-based anonymization of social networks , 2009, ASIACCS '09.

[10]  Heng Xu,et al.  Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.

[11]  Jörgen W. Weibull,et al.  Evolutionary Game Theory , 1996 .

[12]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[13]  Cliff Lampe,et al.  A familiar face(book): profile elements as signals in an online social network , 2007, CHI.

[14]  Anna Cinzia Squicciarini,et al.  Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[15]  Ronald E. Rice,et al.  Predicting user concerns about online privacy , 2007, J. Assoc. Inf. Sci. Technol..

[16]  Gary E. Bolton,et al.  How Effective are Online Reputation Mechanisms , 2002 .

[17]  Panos J. Antsaklis,et al.  Petri net supervisors for discrete event systems , 1998 .

[18]  Hassane Alla,et al.  Discrete, continuous, and hybrid Petri Nets , 2004 .

[19]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[20]  Petteri Nurmi,et al.  A Bayesian framework for online reputation systems , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[21]  Xiaolong Zhang,et al.  Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding , 2010, AMCIS.

[22]  Balachander Krishnamurthy,et al.  Privacy in dynamic social networks , 2010, WWW '10.

[23]  George Kesidis,et al.  Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.

[24]  Tad Hogg,et al.  Enhancing reputation mechanisms via online social networks , 2004, EC '04.

[25]  Cameron Marlow,et al.  Feed me: motivating newcomer contribution in social network sites , 2009, CHI.

[26]  Frank Burns,et al.  Consumer information , 1990, The Lancet.

[27]  Phillip J. Windley,et al.  Using reputation to augment explicit authorization , 2007, DIM '07.

[28]  Gail-Joon Ahn,et al.  Privacy-Enhanced User-Centric Identity Management , 2009, 2009 IEEE International Conference on Communications.

[29]  David R. Millen,et al.  Identity management: multiple presentations of self in facebook , 2007, GROUP.

[30]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.