An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content

Content sharing in social networks is now one of the most common activities of internet users. In sharing content, users often have to make access control or privacy decisions that impact other stakeholders or co-owners. These decisions involve negotiation, either implicitly or explicitly. Over time, as users engage in these interactions, their own privacy attitudes evolve, influenced by and consequently influencing their peers. In this paper, we present a variation of the one-shot Ultimatum Game, wherein we model individual users interacting with their peers to make privacy decisions about shared content. We analyze the effects of sharing dynamics on individuals’ privacy preferences over repeated interactions of the game. We theoretically demonstrate conditions under which users’ access decisions eventually converge, and characterize this limit as a function of inherent individual preferences at the start of the game and willingness to concede these preferences over time. We provide simulations highlighting specific insights on global and local influence, short-term interactions and the effects of homophily on consensus.

[1]  Jonathan D. Cohen,et al.  The Neural Basis of Economic Decision-Making in the Ultimatum Game , 2003, Science.

[2]  Anna Cinzia Squicciarini,et al.  Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks , 2016, AAMAS.

[3]  John Krumm,et al.  Exploring end user preferences for location obfuscation, location-based services, and the value of location , 2010, UbiComp.

[4]  Depei Qian,et al.  Managing Server Clusters on Renewable Energy Mix , 2016, TAAS.

[5]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[6]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[7]  Colin Camerer,et al.  Foundations of Human Sociality - Economic Experiments and Ethnographic: Evidence From Fifteen Small-Scale Societies , 2004 .

[8]  Airi Lampinen,et al.  We're in it together: interpersonal management of disclosure in social network services , 2011, CHI.

[9]  B. Ryan The diffusion of hybrid seed corn in two Iowa communities , 1943 .

[10]  Lorrie Faith Cranor,et al.  The post that wasn't: exploring self-censorship on facebook , 2013, CSCW.

[11]  Danah Boyd,et al.  I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience , 2011, New Media Soc..

[12]  Matt Bishop,et al.  Privacy aware data sharing: balancing the usability and privacy of datasets , 2009, PETRA '09.

[13]  M. Premkumar,et al.  Resolving Multi-party Privacy Conflicts in Social Media , 2018 .

[14]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[15]  Heather Richter Lipford,et al.  Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.

[16]  William Bülow,et al.  Nothing to Hide : The False Tradeoff between Privacy and Security by Daniel J. Solove , 2012 .

[17]  Adam J. Lee,et al.  Eyeing your exposure: quantifying and controlling information sharing for improved privacy , 2011, SOUPS.

[18]  Jon M. Kleinberg,et al.  Feedback effects between similarity and social influence in online communities , 2008, KDD.

[19]  Noah E. Friedkin,et al.  A Structural Theory of Social Influence: List of Tables and Figures , 1998 .

[20]  M. Johannesson,et al.  Heritability of ultimatum game responder behavior , 2007, Proceedings of the National Academy of Sciences.

[21]  F. Squazzoni,et al.  Reputation and judgment effects in repeated trust games DSS , 2008 .

[22]  Evimaria Terzi,et al.  A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, ICDM.

[23]  A. Ozdaglar,et al.  Discrete Opinion Dynamics with Stubborn Agents , 2011 .

[24]  Alessandro Acquisti,et al.  Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .

[25]  M. Nowak,et al.  Empathy leads to fairness , 2002, Bulletin of mathematical biology.

[26]  Gail-Joon Ahn,et al.  Multiparty Authorization Framework for Data Sharing in Online Social Networks , 2011, DBSec.

[27]  Matthias R. Brust,et al.  Modeling privacy settings of an online social network from a game-theoretical perspective , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[28]  Gail-Joon Ahn,et al.  Detecting and resolving privacy conflicts for collaborative data sharing in online social networks , 2011, ACSAC '11.

[29]  Frederic Stutzman,et al.  Boundary regulation in social media , 2012, CSCW.

[30]  Pamela J. Wisniewski,et al.  Fighting for my space: coping mechanisms for sns boundary regulation , 2012, CHI.

[31]  T. Chartrand,et al.  Where is the love? The social aspects of mimicry , 2009, Philosophical Transactions of the Royal Society B: Biological Sciences.

[32]  Clark Hu,et al.  Where is the love?: Investigating multiple membership and hotel customer loyalty. , 2014 .

[33]  Ziming Zhao,et al.  Game theoretic analysis of multiparty access control in online social networks , 2014, SACMAT '14.

[34]  Michael Rovatsos,et al.  Privacy Policy Negotiation in Social Media , 2014, TAAS.

[35]  ปิยดา สมบัติวัฒนา Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .

[36]  W. Zachary,et al.  An Information Flow Model for Conflict and Fission in Small Groups , 1977, Journal of Anthropological Research.

[37]  Konstantin Avrachenkov,et al.  Cooperative Game Theory Approaches for Network Partitioning , 2017, COCOON.

[38]  Jose M. Such,et al.  Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making , 2016 .

[39]  Jon M. Kleinberg,et al.  Sequential Influence Models in Social Networks , 2010, ICWSM.

[40]  Jose M. Such,et al.  Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study , 2017, CHI.

[41]  Flaminio Squazzoni,et al.  Reputational cues in repeated trust games , 2009 .

[42]  David G. Rand,et al.  Evolution of fairness in the one-shot anonymous Ultimatum Game , 2013, Proceedings of the National Academy of Sciences.

[43]  Gail-Joon Ahn,et al.  Multiparty Access Control for Online Social Networks: Model and Mechanisms , 2013, IEEE Transactions on Knowledge and Data Engineering.

[44]  Dustin Arendt,et al.  Opinions, influence, and zealotry: a computational study on stubbornness , 2015, Computational and Mathematical Organization Theory.