A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network

Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the networks. While a variety of factors have been shown to affect the privacy strategies of these users, very little work has been done in analyzing how these factors influence each other and collectively contribute towards the users’ privacy strategies. In this paper, we analyze the influence of attribute importance, benefit, risk and network topology on the users’ attribute disclosure behavior by introducing a weighted evolutionary game model. Results show that: irrespective of risk, users are more likely to reveal their most important attributes than their least important attributes; when the users’ range of influence is increased, the risk factor plays a smaller role in attribute disclosure; the network topology exhibits a considerable effect on the privacy in an environment with risk. Received on 14 February 2013; accepted on 23 March 2014; published on 27 May 2014

[1]  Joon S. Park,et al.  A game theoretic approach for modeling optimal data sharing on Online Social Networks , 2012, 2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).

[2]  Alexandros Ntoulas,et al.  Homophily in the Digital World: A LiveJournal Case Study , 2010, IEEE Internet Computing.

[3]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[4]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[5]  D. Watts,et al.  Origins of Homophily in an Evolving Social Network1 , 2009, American Journal of Sociology.

[6]  G. Szabó,et al.  Evolutionary games on graphs , 2006, cond-mat/0607344.

[7]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[8]  Anna Cinzia Squicciarini,et al.  An Informed Model of Personal Information Release in Social Networking Sites , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[9]  S H Strogatz,et al.  Random graph models of social networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[10]  Marco Tomassini,et al.  Cooperation on Social Networks and Its Robustness , 2012, ArXiv.

[11]  Andrew K. C. Wong,et al.  Random Graphs: Structural-Contextual Dichotomy , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  Ángel Sánchez,et al.  Evolutionary game theory: Temporal and spatial effects beyond replicator dynamics , 2009, Physics of life reviews.

[13]  Y. Narahari,et al.  A Shapley Value-Based Approach to Discover Influential Nodes in Social Networks , 2011, IEEE Transactions on Automation Science and Engineering.

[14]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[15]  Éva Tardos,et al.  Strategic network formation with structural holes , 2008, EC '08.

[16]  Matthias R. Brust,et al.  Modeling privacy settings of an online social network from a game-theoretical perspective , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[17]  Anna Cinzia Squicciarini,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Collective Privacy Management in Social Networks , 2022 .

[18]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[19]  Wei Chen,et al.  Community Detection in Social Networks through Community Formation Games , 2011, IJCAI.

[20]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[21]  Robert van Rooij,et al.  The Stag Hunt and the Evolution of Social Structure , 2007, Stud Logica.

[22]  P. Berenbrink,et al.  Balls into non-uniform bins , 2014 .