{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:43:04Z","timestamp":1764873784833,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_48","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"711-725","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game Approach"],"prefix":"10.1007","author":[{"given":"Yu","family":"Wu","sequence":"first","affiliation":[]},{"given":"Li","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Alsarkal, Y., Zhang, N., Xu, H.: Your privacy is your friend\u2019s privacy: Examining interdependent information disclosure on online social networks. In: Proceedings of the 51st Hawaii International Conference on System Sciences (2018)","DOI":"10.24251\/HICSS.2018.111"},{"issue":"6","key":"48_CR2","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1007\/s12083-015-0395-2","volume":"9","author":"V Arnaboldi","year":"2016","unstructured":"Arnaboldi, V., La Gala, M., Passarella, A., Conti, M.: Information diffusion in distributed osn: the impact of trusted relationships. Peer-to-Peer Netw. Appl. 9(6), 1195\u20131208 (2016)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"48_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.comcom.2014.05.001","volume":"49","author":"J Chen","year":"2014","unstructured":"Chen, J., Kiremire, A.R., Brust, M.R., Phoha, V.V.: Modeling online social network users\u2019 profile attribute disclosure behavior from a game theoretic perspective. Comput. Commun. 49, 18\u201332 (2014)","journal-title":"Comput. Commun."},{"issue":"3","key":"48_CR4","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TIFS.2017.2758756","volume":"13","author":"J Du","year":"2017","unstructured":"Du, J., Jiang, C., Chen, K.C., Ren, Y., Poor, H.V.: Community-structured evolutionary game for privacy protection in social networks. IEEE Trans. Inf. Forensics Secur. 13(3), 574\u2013589 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G.J., Zhao, Z., Yang, D.: Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. pp. 93\u2013102 (2014)","DOI":"10.1145\/2613087.2613097"},{"issue":"6","key":"48_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3360498","volume":"52","author":"M Humbert","year":"2019","unstructured":"Humbert, M., Trubert, B., Huguenin, K.: A survey on interdependent privacy. ACM Comput. Surveys (CSUR) 52(6), 1\u201340 (2019)","journal-title":"ACM Comput. Surveys (CSUR)"},{"issue":"2","key":"48_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2635673","volume":"47","author":"A Laszka","year":"2014","unstructured":"Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surveys (CSUR) 47(2), 1\u201338 (2014)","journal-title":"ACM Comput. Surveys (CSUR)"},{"key":"48_CR8","unstructured":"Leskovec, J., Krevl, A.: Snap datasets: Stanford large network dataset collection (2014)"},{"issue":"3","key":"48_CR9","first-page":"7","volume":"14","author":"J Lv","year":"2006","unstructured":"Lv, J., Qiu, W., Wang, Y.: An analysis of games of information security investment based on interdependent security. Chinese J. Manage. Sci. 14(3), 7\u201312 (2006)","journal-title":"Chinese J. Manage. Sci."},{"issue":"4","key":"48_CR10","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1016\/0014-2921(87)90008-0","volume":"31","author":"E Maskin","year":"1987","unstructured":"Maskin, E., Tirole, J.: A theory of dynamic oligopoly, iii: Cournot competition. Eur. Econ. Rev. 31(4), 947\u2013968 (1987)","journal-title":"Eur. Econ. Rev."},{"key":"48_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-319-12601-2_15","volume-title":"Decision and Game Theory for Security","author":"E Panaousis","year":"2014","unstructured":"Panaousis, E., Fielder, A., Malacaria, P., Hankin, C., Smeraldi, F.: Cybersecurity games and investments: a decision support approach. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 266\u2013286. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12601-2_15"},{"key":"48_CR12","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ins.2017.08.063","volume":"421","author":"S Rathore","year":"2017","unstructured":"Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.S., Park, J.H.: Social network security: Issues, challenges, threats, and solutions. Inf. Sci. 421, 43\u201369 (2017)","journal-title":"Inf. Sci."},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Griffin, C.: An informed model of personal information release in social networking sites. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing. pp. 636\u2013645. IEEE (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.137"},{"key":"48_CR14","doi-asserted-by":"crossref","unstructured":"Sun, J., Tang, J.: Models and algorithms for social influence analysis. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining. pp. 775\u2013776 (2013)","DOI":"10.1145\/2433396.2433497"},{"key":"48_CR15","doi-asserted-by":"crossref","unstructured":"Tosh, D., Sengupta, S., Kamhoua, C., Kwiat, K., Martin, A.: An evolutionary game-theoretic framework for cyber-threat information sharing. In: 2015 IEEE International Conference on Communications (ICC). pp. 7341\u20137346. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249499"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:41:06Z","timestamp":1619318466000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_48","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}