Skip to main content

Behavior of Social Network Users to Privacy Leakage: An Agent-Based Approach

  • Conference paper
  • First Online:
Advanced Multimedia and Ubiquitous Engineering (MUE 2018, FutureTech 2018)

Abstract

As the rapid development of online social networks, the service providers collect a tremendous amount of personal data. They have the potential motivation to sell the users’ data for extra profits. To figure out the trading strategy of the service providers, we should understand the users’ behavior after they realized privacy leaked. In this paper, we build the users’ utility function and information diffusion model about privacy leakage. We take advantage of agent-based model to simulate the evolution of online social network after privacy leaked. Our result shows the service providers are almost certain to sell some personal data. If users are very attention to their privacy, the service providers more likely sell all the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zheng X, Luo G, Cai Z (2018) A fair mechanism for private data publication in online social networks [J]. IEEE Trans Netw Sci Eng 99:1–1

    Google Scholar 

  2. Zheng X, Cai Z, Li J et al (2017) Location-privacy-aware review publication mechanism for local business service systems [C] In: INFOCOM 2017—IEEE conference on computer communications, IEEE. IEEE 2017, pp 1–9

    Google Scholar 

  3. Cai Z, He Z, Guan X et al (2016) Collective data-sanitization for preventing sensitive information inference attacks in social networks [J]. IEEE Trans Dependable Secure Comput 99:1–1

    Article  Google Scholar 

  4. He Z, Cai Z, Yu J (2017) Latent-data privacy preserving with customized data utility for social network data [J]. IEEE Trans Veh Technol 99:1–1

    Google Scholar 

  5. He Z, Cai Z, Yu J et al (2017) Cost-efficient strategies for restraining rumor spreading in mobile social networks [J]. IEEE Trans Veh Technol 99:1–1

    Google Scholar 

  6. Farmer JD, Foley D (2009) The economy needs agent-based modelling [J]. Nature 460(7256):685–686

    Article  Google Scholar 

  7. Jiang G, Ma F, Shang J et al (2014) Evolution of knowledge sharing behavior in social commerce: an agent-based computational approach [J]. Inf Sci 278(10):250–266

    Article  MathSciNet  Google Scholar 

  8. Sledgianowski D, Kulviwat S (2009) Using social network sites: the effects of playfulness, critical mass and trust in a hedonic context [J]. Data Process Better Bus Edu 49(4):74–83

    Google Scholar 

  9. Gandal N (1994) Hedonic price indexes for spreadsheets and an empirical test for network externalities [J]. Rand J Econ 25(1):160–170

    Article  Google Scholar 

  10. Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks [C]. In: ACM SIGKDD international conference on knowledge discovery and data mining, Paris, France, June 28—July. DBLP, pp 199–208

    Google Scholar 

  11. Lee W, Kim J, Yu H (2013) CT-IC: continuously activated and time-restricted independent cascade model for viral marketing [C]. In: IEEE, international conference on data mining. IEEE, pp 960–965

    Google Scholar 

  12. Barabási AL (2009) Scale-free networks: a decade and beyond [J]. Science 325(5939):412

    Article  MathSciNet  Google Scholar 

  13. Liu X, Liu K, Guo L et al (2013) A game-theoretic approach for achieving k-anonymity in location based services [C]. In: INFOCOM, 2013 proceedings IEEE. pp 2985–2993

    Google Scholar 

  14. Lin KY, Lu HP (2011) Why people use social networking sites: an empirical study integrating network externalities and motivation theory [J]. Comput Hum Behav 27(3):1152–1161

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the foundation of science and technology department of Sichuan province (NO. 2017JY0073) and (NO. 2016GZ0077).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangchun Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, K., Luo, G., Wu, H., Wang, C. (2019). Behavior of Social Network Users to Privacy Leakage: An Agent-Based Approach. In: Park, J., Loia, V., Choo, KK., Yi, G. (eds) Advanced Multimedia and Ubiquitous Engineering. MUE FutureTech 2018 2018. Lecture Notes in Electrical Engineering, vol 518. Springer, Singapore. https://doi.org/10.1007/978-981-13-1328-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1328-8_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1327-1

  • Online ISBN: 978-981-13-1328-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics