[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

An Extended Ultimatum Game for Multi-Party Access Control in Social Networks

Published: 28 September 2022 Publication History

Abstract

In this article, we aim to answer an important set of questions about the potential longitudinal effects of repeated sharing and privacy settings decisions over jointly managed content among users in a social network.
We model user interactions through a repeated game in a network graph. We present a variation of the one-shot Ultimatum Game, wherein individuals interact with peers to make a decision on a piece of shared content. The outcome of this game is either success or failure, wherein success implies that a satisfactory decision for all parties is made and failure instead implies that the parties could not reach an agreement. Our proposed game is grounded in empirical data about individual decisions in repeated pairwise negotiations about jointly managed content in a social network. We consider both a “continuous” privacy model as well the “discrete” case of a model wherein privacy values are to be chosen among a fixed set of options. We formally demonstrate that over time, the system converges toward a “fair” state, wherein each individual’s preferences are accounted for. Our discrete model is validated by way of a user study, where participants are asked to propose privacy settings for own shared content from a small, discrete set of options.

References

[1]
A. Acquisti. 2004. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM Electronic Commerce Conference, ACM Press (Ed.). 21–29.
[2]
Dustin L. Arendt and Leslie M. Blaha. 2015. Opinions, influence, and zealotry: A computational study on stubbornness. Computational and Mathematical Organization Theory 21, 2 (2015), 184–209.
[3]
Andrew Besmer and Heather Richter Lipford. 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1563–1572.
[4]
Bhume Bhumiratana and Matt Bishop. 2009. Privacy aware data sharing: Balancing the usability and privacy of datasets. In Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments. ACM, 73.
[5]
Brandwatch.com. 2016. Facebook Statistics from Brandwatch. Retrieved on September 9, 2022 from https://www.brandwatch.com/blog/47-facebook-statistics-2016/.
[6]
Giangiacomo Bravo, Marco Castellani, Flaminio Squazzoni, and Riccardo Boero. 2008. Reputation and judgment effects in repeated trust games. Retrieved Sept 9, 2022 https://www.semanticscholar.org/paper/Reputation-and-judgment-effects-in-repeated-trust-Boero-Bravo/44e44fa54ce0f23aebd85c0cea7e215aa442635a.
[7]
A. J. Brush, John Krumm, and James Scott. 2010. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing. ACM, 95–104.
[8]
Colin Camerer. 2003. Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press.
[9]
Jundong Chen, Matthias R. Brust, Ankunda R. Kiremire, and Vir V. Phoha. 2013. Modeling privacy settings of an online social network from a game-theoretical perspective. In 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom). IEEE, 213–220. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6679987.
[10]
Yunong Chen, Andrew Belmonte, and Christopher Griffin. 2020. Imitation of Success Leads to Cost of Living Mediated Fairness in the Ultimatum Game. https://www.sciencedirect.com/science/article/abs/pii/S0378437121006014freelance.
[11]
Dan Cosley, Daniel P. Huttenlocher, Jon M. Kleinberg, Xiangyang Lan, and Siddharth Suri. 2010. Sequential influence models in social networks. ICWSM 10 (2010), 26.
[12]
David Crandall, Dan Cosley, Daniel Huttenlocher, Jon Kleinberg, and Siddharth Suri. 2008. Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 160–168.
[13]
Ricard L. Fogues, Pradeep K. Murukannaiah, Jose M. Such, and Munindar P. Singh. 2017. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI) 24, 1 (2017), 5.
[14]
Noah E. Friedkin. 2006. A Structural Theory of Social Influence. Vol. 13. Cambridge University Press.
[15]
Joseph Patrick Henrich. 2004. Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small-Scale Societies. Oxford University Press On Demand.
[16]
Hongxin Hu and Gail-Joon Ahn. 2011. Multiparty authorization framework for data sharing in online social networks. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 29–43.
[17]
Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 103–112.
[18]
Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2013. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7 (July 2013), 1614–1627.
[19]
Hongxin Hu, Gail-Joon Ahn, Ziming Zhao, and Dejun Yang. 2014. Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT’14). ACM, 93–102.
[20]
Mathias Humbert, Benjamin Trubert, and Kévin Huguenin. 2019. A survey on interdependent privacy. ACM Computing Surveys (CSUR) 52, 6 (2019), 1–40.
[21]
Leslie K. John, Alessandro Acquisti, and George Loewenstein. 2011. Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of Consumer Research 37, 5 (2011), 858–873.
[22]
Dilara Kekulluoglu, Nadin Kokciyan, and Pinar Yolum. 2018. Preserving privacy as social responsibility in online social networks. ACM Transactions on Internet Technology (TOIT) 18, 4 (2018), 1–22.
[23]
Abdurrahman Can Kurtan and Pinar Yolum. 2018. PELTE: Privacy estimation of images from tags. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems. 1989–1991.
[24]
A. Can Kurtan and Pınar Yolum. 2021. Assisting humans in privacy management: An agent-based approach. Autonomous Agents and Multi-Agent Systems 35, 1 (2021), 1–33.
[25]
Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We’re in it together: Interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3217–3226.
[26]
Kun Liu and Evimaria Terzi. 2010. A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data 5, 1 (Dec. 2010), Article 6, 30 pages. DOI:.
[27]
Alice E. Marwick and Danah Boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (2011), 114–133.
[28]
Julian J. McAuley and Jure Leskovec. 2012. Learning to discover social circles in ego networks. In NIPS, Vol. 2012. Citeseer, 548–556.
[29]
Miller McPherson, Lynn Smith-Lovin, and James M. Cook. 2001. Birds of a feather: Homophily in social networks. Annual Review of Sociology 27 (2001), 415–444.
[30]
Francesca Mosca, Jose M. Such, and Peter McBurney. 2020. Towards a value-driven explainable agent for collective privacy. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems. 1937–1939.
[31]
Karen M. Page and Martin A. Nowak. 2002. Empathy leads to fairness. Bulletin of Mathematical Biology 64, 6 (2002), 1101–1116.
[32]
Sarah Rajtmajer, Anna Squicciarini, Christopher Griffin, Sushama Karumanchi, and Alpana Tyagi. 2016. Constrained social-energy minimization for multi-party sharing in online social networks. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 680–688.
[33]
Sarah Michele Rajtmajer, Anna Cinzia Squicciarini, Jose M. Such, Justin Semonsen, and Andrew Belmonte. 2017. An ultimatum game model for the evolution of privacy in jointly managed content. In Proceedings of the 8th International Conference on Decision and Game Theory for Security (GameSec’17), Lecture Notes in Computer Science, Vol. 10575, Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, and Stefan Schauer (Eds.). Springer, 112–130. DOI:
[34]
David G. Rand, Corina E. Tarnita, Hisashi Ohtsuki, and Martin A. Nowak. 2013. Evolution of fairness in the one-shot anonymous Ultimatum Game. Proceedings of the National Academy of Sciences U S A 110, 7 (2013), 2581–2586.
[35]
B. Ryan and N. Gross. 1943. The diffusion of hybrid seed corn in two Iowa communities. Rural Sociology 8, 1 (1943), 15–24.
[36]
Alan G. Sanfey, James K. Rilling, Jessica A. Aronson, Leigh E. Nystrom, and Jonathan D. Cohen. 2003. The neural basis of economic decision-making in the ultimatum game. Science 300, 5626 (2003), 1755–1758.
[37]
Roman Schlegel, Apu Kapadia, and Adam J. Lee. 2011. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, 14.
[38]
Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The post that wasn’t: Exploring self-censorship on Facebook. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work. ACM, 793–802.
[39]
Daniel J. Solove. 2011. Nothing to Hide: The False Tradeoff between Privacy and Security. Yale University Press.
[40]
Frederic Stutzman and Woodrow Hartzog. 2012. Boundary regulation in social media. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. ACM, 769–778.
[41]
Jose M. Such and Natalia Criado. 2016. Resolving multi-party privacy conflicts in social media. IEEE Transactions on Knowledge and Data Engineering 28, 7 (2016), 1851–1863.
[42]
Jose M. Such, Joel Porter, Sören Preibusch, and Adam Joinson. 2017. Photo privacy conflicts in social media: A large-scale empirical study. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3821–3832.
[43]
Jose M. Such and Michael Rovatsos. 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems 11, 4 (2016), 1–29. Issue 1.
[44]
R. van Baaren, L. Janssen, T. L. Chartrand, and A. Dijksterhuis. 2009. Where is the love? The social aspects of mimicry. Philosophical Transactions of the Royal Society B 364, 1528 (2009), 2381–2389.
[45]
Björn Wallace, David Cesarini, Paul Lichtenstein, and Magnus Johannesson. 2007. Heritability of ultimatum game responder behavior. Proceedings of the National Academy of Sciences U S A 104, 40 (2007), 15631–15634.
[46]
Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, 10.
[47]
Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 609–618.
[48]
Ercan Yildiz, Daron Acemoglu, Asuman E. Ozdaglar, Amin Saberi, and Anna Scaglione. 2011. Discrete opinion dynamics with stubborn agents. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1744113.
[49]
W. W. Zachary. 1977. An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33 (1977), 452–473.
[50]
Qianru Zhu, Sarah Rajtmajer, and Andrew Belmonte. 2016. The emergence of fairness in an agent-based ultimatum game. In preparation.

Cited By

View all
  • (2024)A Bargaining-Game Framework for Multi-Party Access ControlProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657033(127-138)Online publication date: 25-Jun-2024
  • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
  • (2023)On the Emergence of Fairness in the Evolutionary Dictator Game with Edge Weight Learning2023 31st Irish Conference on Artificial Intelligence and Cognitive Science (AICS)10.1109/AICS60730.2023.10470620(1-7)Online publication date: 7-Dec-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on the Web
ACM Transactions on the Web  Volume 16, Issue 3
August 2022
155 pages
ISSN:1559-1131
EISSN:1559-114X
DOI:10.1145/3555790
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 September 2022
Online AM: 27 August 2022
Accepted: 01 March 2022
Revised: 06 December 2021
Received: 21 April 2021
Published in TWEB Volume 16, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Datasets
  2. neural networks
  3. gaze detection
  4. text tagging

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • National Science Foundation

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)76
  • Downloads (Last 6 weeks)6
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Bargaining-Game Framework for Multi-Party Access ControlProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657033(127-138)Online publication date: 25-Jun-2024
  • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
  • (2023)On the Emergence of Fairness in the Evolutionary Dictator Game with Edge Weight Learning2023 31st Irish Conference on Artificial Intelligence and Cognitive Science (AICS)10.1109/AICS60730.2023.10470620(1-7)Online publication date: 7-Dec-2023

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media