{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T20:16:23Z","timestamp":1764792983038,"version":"3.37.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319687100"},{"type":"electronic","value":"9783319687117"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68711-7_7","type":"book-chapter","created":{"date-parts":[[2017,10,4]],"date-time":"2017-10-04T08:23:40Z","timestamp":1507105420000},"page":"112-130","source":"Crossref","is-referenced-by-count":20,"title":["An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Rajtmajer","sequence":"first","affiliation":[]},{"given":"Anna","family":"Squicciarini","sequence":"additional","affiliation":[]},{"given":"Jose M.","family":"Such","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Semonsen","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Belmonte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,4]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Electronic Commerce Conference, pp. 21\u201329. ACM Press (2004)","DOI":"10.1145\/988772.988777"},{"issue":"2","key":"7_CR2","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/s10588-015-9181-1","volume":"21","author":"DL Arendt","year":"2015","unstructured":"Arendt, D.L., Blaha, L.M.: Opinions, influence, and zealotry: a computational study on stubbornness. Comput. Math. Organ. Theor. 21(2), 184\u2013209 (2015)","journal-title":"Comput. Math. Organ. Theor."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1563\u20131572. ACM (2010)","DOI":"10.1145\/1753326.1753560"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bhumiratana, B., Bishop, M.: Privacy aware data sharing: balancing the usability and privacy of datasets. In: Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments, p. 73. ACM (2009)","DOI":"10.1145\/1579114.1579187"},{"key":"7_CR5","unstructured":"Brandwatch.com. Facebook statistics from Brandwatch (2016). https:\/\/www.brandwatch.com\/blog\/47-facebook-statistics-2016\/"},{"key":"7_CR6","unstructured":"Bravo, G., Castellani, M., Squazzoni, F., Boero, R.: Reputation and judgment effects in repeated trust games (2008)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Brush, A.J., Krumm, J., Scott, J.: Exploring end user preferences for location obfuscation, location-based services, and the value of location. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, pp. 95\u2013104. ACM (2010)","DOI":"10.1145\/1864349.1864381"},{"key":"7_CR8","volume-title":"Behavioral Game Theory: Experiments in Strategic Interaction","author":"C Camerer","year":"2003","unstructured":"Camerer, C.: Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press, Princeton (2003)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Chen, J., Brust, M.R., Kiremire, A.R., Phoha, V.V.: Modeling privacy settings of an online social network from a game-theoretical perspective. In: 2013 9th International Conference Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), pp. 213\u2013220. IEEE, October 2013","DOI":"10.4108\/icst.collaboratecom.2013.254054"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Cosley, D., Huttenlocher, D.P., Kleinberg, J.M., Lan, X., Suri, S.: Sequential influence models in social networks. In: ICWSM, vol. 10, p. 26 (2010)","DOI":"10.1609\/icwsm.v4i1.14027"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Crandall, D., Cosley, D., Huttenlocher, D., Kleinberg, J., Suri, S.: Feedback effects between similarity and social influence in online communities. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 160\u2013168. ACM (2008)","DOI":"10.1145\/1401890.1401914"},{"issue":"1","key":"7_CR12","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/3038920","volume":"24","author":"RL Fogues","year":"2017","unstructured":"Fogues, R.L., Murukannaiah, P.K., Such, J.M., Singh, M.P.: Sharing policies in multiuser privacy scenarios: incorporating context, preferences, and arguments in decision making. ACM Trans. Comput. Hum. Interact. (TOCHI) 24(1), 5 (2017)","journal-title":"ACM Trans. Comput. Hum. Interact. (TOCHI)"},{"key":"7_CR13","volume-title":"A Structural Theory of Social Influence","author":"NE Friedkin","year":"2006","unstructured":"Friedkin, N.E.: A Structural Theory of Social Influence, vol. 13. Cambridge University Press, Cambridge (2006)"},{"key":"7_CR14","doi-asserted-by":"crossref","DOI":"10.1093\/0199262055.001.0001","volume-title":"Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small-Scale Societies","author":"JP Henrich","year":"2004","unstructured":"Henrich, J.P.: Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small-Scale Societies. Oxford University Press on Demand, Oxford (2004)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-22348-8_5","volume-title":"Data and Applications Security and Privacy XXV","author":"H Hu","year":"2011","unstructured":"Hu, H., Ahn, G.-J.: Multiparty authorization framework for data sharing in online social networks. In: Li, Y. (ed.) DBSec 2011. LNCS, vol. 6818, pp. 29\u201343. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22348-8_5"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 103\u2013112. ACM (2011)","DOI":"10.1145\/2076732.2076747"},{"issue":"7","key":"7_CR17","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1109\/TKDE.2012.97","volume":"25","author":"H Hongxin","year":"2013","unstructured":"Hongxin, H., Ahn, G.-J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614\u20131627 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G-J., Zhao, Z., Yang, D.: Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT), London, Ontario, pp. 93\u2013102. ACM (2014)","DOI":"10.1145\/2613087.2613097"},{"issue":"5","key":"7_CR19","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1086\/656423","volume":"37","author":"LK John","year":"2011","unstructured":"John, L.K., Acquisti, A., Loewenstein, G.: Strangers on a plane: context-dependent willingness to divulge sensitive information. J. Consum. Res. 37(5), 858\u2013873 (2011)","journal-title":"J. Consum. Res."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We\u2019re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3217\u20133226. ACM (2011)","DOI":"10.1145\/1978942.1979420"},{"issue":"1","key":"7_CR21","first-page":"6:1","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5(1), 6:1\u20136:30 (2010)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"1","key":"7_CR22","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1177\/1461444810365313","volume":"13","author":"AE Marwick","year":"2011","unstructured":"Marwick, A.E., Boyd, D.: I tweet honestly, i tweet passionately: Twitter users, context collapse, and the imagined audience. New Media Soc. 13(1), 114\u2013133 (2011)","journal-title":"New Media Soc."},{"key":"7_CR23","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: homophily in social networks. Ann. Rev. Sociol. 27, 415\u2013444 (2001)","journal-title":"Ann. Rev. Sociol."},{"issue":"6","key":"7_CR24","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1006\/bulm.2002.0321","volume":"64","author":"KM Page","year":"2002","unstructured":"Page, K.M., Nowak, M.A.: Empathy leads to fairness. Bull. Math. Biol. 64(6), 1101\u20131116 (2002)","journal-title":"Bull. Math. Biol."},{"key":"7_CR25","unstructured":"Rajtmajer, S., Squicciarini, A., Griffin, C., Karumanchi, S., Tyagi, S.: Constrained social-energy minimization for multi-party sharing in online social networks. In: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, pp. 680\u2013688. International Foundation for Autonomous Agents and Multiagent Systems (2016)"},{"issue":"7","key":"7_CR26","doi-asserted-by":"crossref","first-page":"2581","DOI":"10.1073\/pnas.1214167110","volume":"110","author":"DG Rand","year":"2013","unstructured":"Rand, D.G., Tarnita, C.E., Ohtsuki, H., Nowak, M.A.: Evolution of fairness in the one-shot anonymous ultimatum game. Proc. Natl. Acad. Sci. 110(7), 2581\u20132586 (2013)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"1","key":"7_CR27","first-page":"15","volume":"8","author":"B Ryan","year":"1943","unstructured":"Ryan, B., Gross, N.: The diffusion of hybrid seed corn in two Iowa communities. Rural Sociol. 8(1), 15\u201324 (1943)","journal-title":"Rural Sociol."},{"issue":"5626","key":"7_CR28","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1126\/science.1082976","volume":"300","author":"AG Sanfey","year":"2003","unstructured":"Sanfey, A.G., Rilling, J.K., Aronson, J.A., Nystrom, L.E., Cohen, J.D.: The neural basis of economic decision-making in the ultimatum game. Science 300(5626), 1755\u20131758 (2003)","journal-title":"Science"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Schlegel, R., Kapadia, A., Lee, A.J.: Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 14. ACM (2011)","DOI":"10.1145\/2078827.2078846"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Sleeper, M., Balebako, R., Das, S., McConahy, A.L., Wiese, J., Cranor, L.F.: The post that wasn\u2019t: exploring self-censorship on Facebook. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, pp. 793\u2013802. ACM (2013)","DOI":"10.1145\/2441776.2441865"},{"key":"7_CR31","volume-title":"Nothing to Hide: The False Tradeoff Between Privacy and Security","author":"DJ Solove","year":"2011","unstructured":"Solove, D.J.: Nothing to Hide: The False Tradeoff Between Privacy and Security. Yale University Press, New Haven (2011)"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Stutzman, F., Hartzog, W.: Boundary regulation in social media. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, pp. 769\u2013778. ACM (2012)","DOI":"10.1145\/2145204.2145320"},{"issue":"7","key":"7_CR33","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1109\/TKDE.2016.2539165","volume":"28","author":"JM Such","year":"2016","unstructured":"Such, J.M., Criado, N.: Resolving multi-party privacy conflicts in social media. IEEE Trans. Knowl. Data Eng. 28(7), 1851\u20131863 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Such, J.M., Porter, J., Preibusch, S., Joinson, A.: Photo privacy conflicts in social media: a large-scale empirical study. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3821\u20133832. ACM (2017)","DOI":"10.1145\/3025453.3025668"},{"issue":"4","key":"7_CR35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2821512","volume":"11","author":"JM Such","year":"2016","unstructured":"Such, J.M., Rovatsos, M.: Privacy policy negotiation in social media. ACM Trans. Auton. Adapt. Syst. 11(4), 1\u201329 (2016)","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"issue":"1528","key":"7_CR36","doi-asserted-by":"crossref","first-page":"2381","DOI":"10.1098\/rstb.2009.0057","volume":"364","author":"R Baaren van","year":"2009","unstructured":"van Baaren, R., Janssen, L., Chartrand, T.L., Dijksterhuis, A.: Where is the love? the social aspects of mimicry. Philos. Trans. R. Soc. B 364(1528), 2381\u20132389 (2009)","journal-title":"Philos. Trans. R. Soc. B"},{"issue":"40","key":"7_CR37","doi-asserted-by":"crossref","first-page":"15631","DOI":"10.1073\/pnas.0706642104","volume":"104","author":"B Wallace","year":"2007","unstructured":"Wallace, B., Cesarini, D., Lichtenstein, P., Johannesson, M.: Heritability of ultimatum game responder behavior. Proc. Natl. Acad. Sci. 104(40), 15631\u201315634 (2007)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: \u201cI regretted the minute i pressed share\u201d: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM (2011)","DOI":"10.1145\/2078827.2078841"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: coping mechanisms for SNS boundary regulation. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 609\u2013618. ACM (2012)","DOI":"10.1145\/2207676.2207761"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Yildiz, E., Acemoglu, D., Ozdaglar, A.E., Saberi, A., Scaglione, A.: Discrete opinion dynamics with stubborn agents (2011)","DOI":"10.2139\/ssrn.1744113"},{"key":"7_CR41","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1086\/jar.33.4.3629752","volume":"33","author":"WW Zachary","year":"1977","unstructured":"Zachary, W.W.: An information flow model for conflict and fission in small groups. J. Anthropol. Res. 33, 452\u2013473 (1977)","journal-title":"J. Anthropol. Res."},{"key":"7_CR42","unstructured":"Zhu, Q., Rajtmajer, S., Belmonte, A.: The emergence of fairness in an agent-based ultimatum game. In: Preparation (2016)"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68711-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T18:54:28Z","timestamp":1693076068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68711-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319687100","9783319687117"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68711-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}