Affiliation:
1. Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
Abstract
Online social networks (OSNs) have experienced rapid growth in recent years, and an increasing number of people now use OSNs, such as Facebook and Twitter, to share and spread information on a daily basis. As a special type of information, user personal information is also widely disseminated in such networks, posing threats to user privacy. The study on privacy information dissemination is thus useful for the development of mechanisms and tools for the effective protection of privacy information in OSNs. In this paper, we propose to apply the game theory to establish a sender–receiver game model and the Nash equilibrium to describe the behavioral strategies of users in disseminating privacy information. Factors that affect the dissemination of privacy information are also analyzed with two important aspects: intimacy and popularity of the privacy-concerning subject. Simulation experiments were conducted based on real data sets from scale-free networks and real social networks to compare and analyze the effectiveness of the model. Results show that the proposed game theory is applicable to the privacy information dissemination model, which implements intimacy and popularity in the modeling of the dissemination of privacy information in OSNs. Both the impact of the macro-level OSNs and the micro-relationships between users are evaluated on the dissemination of privacy information, which provides a new perspective for exploring the dissemination of privacy information and facilitates the development of effective mechanisms for privacy protection in OSNs.
Funder
National Natural Science Foundation of China
Subject
Computer Networks and Communications
Reference23 articles.
1. (2021). Review of the development of China’s Internet industry in 2020. Internet World, 2021, 16–19.
2. (2021). Global Digital 2021 Reports, We Are Social Inc.
3. Protecting intellectual property from insider threats: A management information security intelligence perspective;Kim;J. Intellect. Cap.,2019
4. Role extraction in complex networks and its application in control of networks;Zhou;Phys. A Stat. Mech. Its Appl.,2016
5. Collective dynamics of “small-world” networks;Watts;Nature,1998
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献