An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content
暂无分享,去创建一个
Anna Cinzia Squicciarini | Jose M. Such | Sarah Michele Rajtmajer | Justin Semonsen | Andrew Belmonte | A. Belmonte | A. Squicciarini | S. Rajtmajer | J. Such | Justin Semonsen
[1] Jonathan D. Cohen,et al. The Neural Basis of Economic Decision-Making in the Ultimatum Game , 2003, Science.
[2] Anna Cinzia Squicciarini,et al. Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks , 2016, AAMAS.
[3] John Krumm,et al. Exploring end user preferences for location obfuscation, location-based services, and the value of location , 2010, UbiComp.
[4] Depei Qian,et al. Managing Server Clusters on Renewable Energy Mix , 2016, TAAS.
[5] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[6] Yang Wang,et al. "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.
[7] Colin Camerer,et al. Foundations of Human Sociality - Economic Experiments and Ethnographic: Evidence From Fifteen Small-Scale Societies , 2004 .
[8] Airi Lampinen,et al. We're in it together: interpersonal management of disclosure in social network services , 2011, CHI.
[9] B. Ryan. The diffusion of hybrid seed corn in two Iowa communities , 1943 .
[10] Lorrie Faith Cranor,et al. The post that wasn't: exploring self-censorship on facebook , 2013, CSCW.
[11] Danah Boyd,et al. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience , 2011, New Media Soc..
[12] Matt Bishop,et al. Privacy aware data sharing: balancing the usability and privacy of datasets , 2009, PETRA '09.
[13] M. Premkumar,et al. Resolving Multi-party Privacy Conflicts in Social Media , 2018 .
[14] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[15] Heather Richter Lipford,et al. Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.
[16] William Bülow,et al. Nothing to Hide : The False Tradeoff between Privacy and Security by Daniel J. Solove , 2012 .
[17] Adam J. Lee,et al. Eyeing your exposure: quantifying and controlling information sharing for improved privacy , 2011, SOUPS.
[18] Jon M. Kleinberg,et al. Feedback effects between similarity and social influence in online communities , 2008, KDD.
[19] Noah E. Friedkin,et al. A Structural Theory of Social Influence: List of Tables and Figures , 1998 .
[20] M. Johannesson,et al. Heritability of ultimatum game responder behavior , 2007, Proceedings of the National Academy of Sciences.
[21] F. Squazzoni,et al. Reputation and judgment effects in repeated trust games DSS , 2008 .
[22] Evimaria Terzi,et al. A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, ICDM.
[23] A. Ozdaglar,et al. Discrete Opinion Dynamics with Stubborn Agents , 2011 .
[24] Alessandro Acquisti,et al. Strangers on a Plane: Context-Dependent Willingness to Divulge Sensitive Information , 2011 .
[25] M. Nowak,et al. Empathy leads to fairness , 2002, Bulletin of mathematical biology.
[26] Gail-Joon Ahn,et al. Multiparty Authorization Framework for Data Sharing in Online Social Networks , 2011, DBSec.
[27] Matthias R. Brust,et al. Modeling privacy settings of an online social network from a game-theoretical perspective , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[28] Gail-Joon Ahn,et al. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks , 2011, ACSAC '11.
[29] Frederic Stutzman,et al. Boundary regulation in social media , 2012, CSCW.
[30] Pamela J. Wisniewski,et al. Fighting for my space: coping mechanisms for sns boundary regulation , 2012, CHI.
[31] T. Chartrand,et al. Where is the love? The social aspects of mimicry , 2009, Philosophical Transactions of the Royal Society B: Biological Sciences.
[32] Clark Hu,et al. Where is the love?: Investigating multiple membership and hotel customer loyalty. , 2014 .
[33] Ziming Zhao,et al. Game theoretic analysis of multiparty access control in online social networks , 2014, SACMAT '14.
[34] Michael Rovatsos,et al. Privacy Policy Negotiation in Social Media , 2014, TAAS.
[35] ปิยดา สมบัติวัฒนา. Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .
[36] W. Zachary,et al. An Information Flow Model for Conflict and Fission in Small Groups , 1977, Journal of Anthropological Research.
[37] Konstantin Avrachenkov,et al. Cooperative Game Theory Approaches for Network Partitioning , 2017, COCOON.
[38] Jose M. Such,et al. Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making , 2016 .
[39] Jon M. Kleinberg,et al. Sequential Influence Models in Social Networks , 2010, ICWSM.
[40] Jose M. Such,et al. Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study , 2017, CHI.
[41] Flaminio Squazzoni,et al. Reputational cues in repeated trust games , 2009 .
[42] David G. Rand,et al. Evolution of fairness in the one-shot anonymous Ultimatum Game , 2013, Proceedings of the National Academy of Sciences.
[43] Gail-Joon Ahn,et al. Multiparty Access Control for Online Social Networks: Model and Mechanisms , 2013, IEEE Transactions on Knowledge and Data Engineering.
[44] Dustin Arendt,et al. Opinions, influence, and zealotry: a computational study on stubbornness , 2015, Computational and Mathematical Organization Theory.