How to dissolve the "privacy paradox" in social networks? A game approach based on privacy calculus

被引:0
|
作者
Zhang, Xing [1 ]
Cai, Yongtao [1 ]
Liu, Fangyu [1 ]
Zhou, Fuli [1 ,2 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Econ & Management, Zhengzhou, Peoples R China
[2] South China Univ Technol, Sch Automat Sci & Engn, Guangzhou, Peoples R China
关键词
Algorithms; Privacy paradox; Privacy calculus; Privacy security; Data value; DIFFERENTIAL PRIVACY; INFORMATION; MOBILE; USER; BEHAVIORS; ATTITUDES; FACEBOOK; LEAKAGE; IMPACT; SECURE;
D O I
10.1108/K-03-2024-0544
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
PurposeThis paper aims to propose a solution for dissolving the "privacy paradox" in social networks, and explore the feasibility of adopting a synergistic mechanism of "deep-learning algorithms" and "differential privacy algorithms" to dissolve this issue.Design/methodology/approachTo validate our viewpoint, this study constructs a game model with two algorithms as the core strategies.FindingsThe "deep-learning algorithms" offer a "profit guarantee" to both network users and operators. On the other hand, the "differential privacy algorithms" provide a "security guarantee" to both network users and operators. By combining these two approaches, the synergistic mechanism achieves a balance between "privacy security" and "data value".Practical implicationsThe findings of this paper suggest that algorithm practitioners should accelerate the innovation of algorithmic mechanisms, network operators should take responsibility for users' privacy protection, and users should develop a correct understanding of privacy. This will provide a feasible approach to achieve the balance between "privacy security" and "data value".Originality/valueThese findings offer some insights into users' privacy protection and personal data sharing.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Research on Privacy Paradox in Social Networks Based on Evolutionary Game Theory and Data Mining
    Huang, Yijun
    Lu, Tong
    Cheng, Kaige
    Wang, Jiayu
    PROCEEDINGS OF NINETEENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, 2020, : 556 - 558
  • [2] Transformative privacy calculus: Conceptualizing the personalization-privacy paradox on social media
    Cloarec, Julien
    Meyer-Waarden, Lars
    Munzel, Andreas
    PSYCHOLOGY & MARKETING, 2024, 41 (07) : 1574 - 1596
  • [3] Revisiting the Privacy Paradox on Social Media With an Extended Privacy Calculus Model: The Effect of Privacy Concerns, Privacy Self-Efficacy, and Social Capital on Privacy Management
    Chen, Hsuan-Ting
    AMERICAN BEHAVIORAL SCIENTIST, 2018, 62 (10) : 1392 - 1412
  • [4] Privacy cynicism: A new approach to the privacy paradox
    Hoffmann, Christian Pieter
    Lutz, Christoph
    Ranzini, Giulia
    CYBERPSYCHOLOGY-JOURNAL OF PSYCHOSOCIAL RESEARCH ON CYBERSPACE, 2016, 10 (04):
  • [5] Privacy Personas for IoT-Based Health Research: A Privacy Calculus Approach
    Maus, Benjamin
    Olsson, Carl Magnus
    Salvi, Dario
    FRONTIERS IN DIGITAL HEALTH, 2021, 3
  • [6] Privacy paradox in mHealth applications: An integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue
    Zhu, Mengxi
    Wu, Chuanhui
    Huang, Shijing
    Zheng, Kai
    Young, Sean D.
    Yan, Xianglin
    Yuan, Qinjian
    TELEMATICS AND INFORMATICS, 2021, 61
  • [7] SG-PAC: A stochastic game approach to generate personal privacy paradox access-control policies in social networks
    Wu, Yu
    Pan, Li
    COMPUTERS & SECURITY, 2021, 102 (102)
  • [8] The privacy paradox: how market privacy facilitates government surveillance
    Rider, Karina
    INFORMATION COMMUNICATION & SOCIETY, 2018, 21 (10) : 1369 - 1385
  • [9] Privacy preserving information dispersal in social networks based on disposition to privacy
    Vidyalakshmi, B. S.
    Wong, Raymond K.
    Chi, Chi-Hung
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 372 - 377
  • [10] Calculus of Cooperation and Game-Based Reasoning about Protocol Privacy
    More, Sara Miner
    Naumov, Pavel
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2012, 13 (03)