Abstract
As the rapid development of online social networks, the service providers collect a tremendous amount of personal data. They have the potential motivation to sell the users’ data for extra profits. To figure out the trading strategy of the service providers, we should understand the users’ behavior after they realized privacy leaked. In this paper, we build the users’ utility function and information diffusion model about privacy leakage. We take advantage of agent-based model to simulate the evolution of online social network after privacy leaked. Our result shows the service providers are almost certain to sell some personal data. If users are very attention to their privacy, the service providers more likely sell all the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zheng X, Luo G, Cai Z (2018) A fair mechanism for private data publication in online social networks [J]. IEEE Trans Netw Sci Eng 99:1–1
Zheng X, Cai Z, Li J et al (2017) Location-privacy-aware review publication mechanism for local business service systems [C] In: INFOCOM 2017—IEEE conference on computer communications, IEEE. IEEE 2017, pp 1–9
Cai Z, He Z, Guan X et al (2016) Collective data-sanitization for preventing sensitive information inference attacks in social networks [J]. IEEE Trans Dependable Secure Comput 99:1–1
He Z, Cai Z, Yu J (2017) Latent-data privacy preserving with customized data utility for social network data [J]. IEEE Trans Veh Technol 99:1–1
He Z, Cai Z, Yu J et al (2017) Cost-efficient strategies for restraining rumor spreading in mobile social networks [J]. IEEE Trans Veh Technol 99:1–1
Farmer JD, Foley D (2009) The economy needs agent-based modelling [J]. Nature 460(7256):685–686
Jiang G, Ma F, Shang J et al (2014) Evolution of knowledge sharing behavior in social commerce: an agent-based computational approach [J]. Inf Sci 278(10):250–266
Sledgianowski D, Kulviwat S (2009) Using social network sites: the effects of playfulness, critical mass and trust in a hedonic context [J]. Data Process Better Bus Edu 49(4):74–83
Gandal N (1994) Hedonic price indexes for spreadsheets and an empirical test for network externalities [J]. Rand J Econ 25(1):160–170
Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks [C]. In: ACM SIGKDD international conference on knowledge discovery and data mining, Paris, France, June 28—July. DBLP, pp 199–208
Lee W, Kim J, Yu H (2013) CT-IC: continuously activated and time-restricted independent cascade model for viral marketing [C]. In: IEEE, international conference on data mining. IEEE, pp 960–965
Barabási AL (2009) Scale-free networks: a decade and beyond [J]. Science 325(5939):412
Liu X, Liu K, Guo L et al (2013) A game-theoretic approach for achieving k-anonymity in location based services [C]. In: INFOCOM, 2013 proceedings IEEE. pp 2985–2993
Lin KY, Lu HP (2011) Why people use social networking sites: an empirical study integrating network externalities and motivation theory [J]. Comput Hum Behav 27(3):1152–1161
Acknowledgements
This work was supported by the foundation of science and technology department of Sichuan province (NO. 2017JY0073) and (NO. 2016GZ0077).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, K., Luo, G., Wu, H., Wang, C. (2019). Behavior of Social Network Users to Privacy Leakage: An Agent-Based Approach. In: Park, J., Loia, V., Choo, KK., Yi, G. (eds) Advanced Multimedia and Ubiquitous Engineering. MUE FutureTech 2018 2018. Lecture Notes in Electrical Engineering, vol 518. Springer, Singapore. https://doi.org/10.1007/978-981-13-1328-8_12
Download citation
DOI: https://doi.org/10.1007/978-981-13-1328-8_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1327-1
Online ISBN: 978-981-13-1328-8
eBook Packages: EngineeringEngineering (R0)