{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T22:38:25Z","timestamp":1720219105971},"reference-count":72,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"2","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Most popular location-based social networks, such as Facebook and Foursquare, let their (mobile) users post location and co-location (involving other users) information. Such posts bring social benefits to the users who post them but also to their friends who view them. Yet, they also represent a severe threat to the users\u2019 privacy, as co-location information introduces interdependences between users. We propose the first game-theoretic framework for analyzing the strategic behaviors, in terms of information sharing, of users of OSNs. To design parametric utility functions that are representative of the users\u2019 actual preferences, we also conduct a survey of 250 Facebook users and use conjoint analysis to quantify the users\u2019 benefits o f sharing vs. viewing (co)-location information and their preference for privacy vs. benefits. Our survey findings expose the fact that, among the users, there is a large variation, in terms of these preferences. We extensively evaluate our framework through data-driven numerical simulations. We study how users\u2019 individual preferences influence each other\u2019s decisions, we identify several factors that significantly affect these decisions (among which, the mobility data of the users), and we determine situations where dangerous patterns can emerge (e.g., a vicious circle of sharing, or an incentive to over-share) \u2013 even when the users share similar preferences.<\/jats:p>","DOI":"10.2478\/popets-2019-0017","type":"journal-article","created":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T15:27:08Z","timestamp":1557156428000},"page":"5-25","source":"Crossref","is-referenced-by-count":8,"title":["The (Co-)Location Sharing Game"],"prefix":"10.56553","volume":"2019","author":[{"given":"Alexandra-Mihaela","family":"Olteanu","sequence":"first","affiliation":[{"name":"EPFL \/ UNIL\u2013HEC Lausanne ,"}]},{"given":"Mathias","family":"Humbert","sequence":"additional","affiliation":[{"name":"Swiss Data Science Center ,"}]},{"given":"K\u00e9vin","family":"Huguenin","sequence":"additional","affiliation":[{"name":"UNIL\u2013HEC Lausanne ,"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"EPFL ,"}]}],"member":"35752","published-online":{"date-parts":[[2019,5,4]]},"reference":[{"key":"2022061123195712358_j_popets-2019-0017_ref_001_w2aab3b7b2b1b6b1ab1ab1Aa","doi-asserted-by":"crossref","unstructured":"[1] A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on Electronic commerce, pages 21\u201329. ACM, 2004.10.1145\/988772.988777","DOI":"10.1145\/988772.988777"},{"key":"2022061123195712358_j_popets-2019-0017_ref_002_w2aab3b7b2b1b6b1ab1ab2Aa","doi-asserted-by":"crossref","unstructured":"[2] A. Acquisti. Nudging privacy: The behavioral economics of personal information. IEEE Security Privacy, 2009.10.1109\/MSP.2009.163","DOI":"10.1109\/MSP.2009.163"},{"key":"2022061123195712358_j_popets-2019-0017_ref_003_w2aab3b7b2b1b6b1ab1ab3Aa","unstructured":"[3] A. Acquisti and J. Grossklags. Privacy Attitudes and Privacy Behavior. 2004."},{"key":"2022061123195712358_j_popets-2019-0017_ref_004_w2aab3b7b2b1b6b1ab1ab4Aa","doi-asserted-by":"crossref","unstructured":"[4] A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. IEEE Security Privacy, 3(1), 2005.10.1109\/MSP.2005.22","DOI":"10.1109\/MSP.2005.22"},{"key":"2022061123195712358_j_popets-2019-0017_ref_005_w2aab3b7b2b1b6b1ab1ab5Aa","doi-asserted-by":"crossref","unstructured":"[5] M. Backes, M. Humbert, J. Pang, and Y. Zhang. walk2friends: Inferring social links from mobility profiles. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 1943\u20131957. ACM, 2017.10.1145\/3133956.3133972","DOI":"10.1145\/3133956.3133972"},{"key":"2022061123195712358_j_popets-2019-0017_ref_006_w2aab3b7b2b1b6b1ab1ab6Aa","doi-asserted-by":"crossref","unstructured":"[6] L. Backstrom, E. Sun, and C. Marlow. Find me if you can: improving geographical prediction with social and spatial proximity. In WWW, 2010.10.1145\/1772690.1772698","DOI":"10.1145\/1772690.1772698"},{"key":"2022061123195712358_j_popets-2019-0017_ref_007_w2aab3b7b2b1b6b1ab1ab7Aa","doi-asserted-by":"crossref","unstructured":"[7] F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social networks. In IMC, 2009.10.1145\/1644893.1644900","DOI":"10.1145\/1644893.1644900"},{"key":"2022061123195712358_j_popets-2019-0017_ref_008_w2aab3b7b2b1b6b1ab1ab8Aa","doi-asserted-by":"crossref","unstructured":"[8] P. Berrang, M. Humbert, Y. Zhang, I. Lehmann, R. Eils, and M. Backes. Dissecting privacy risks in biomedical data. In Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P). IEEE, 2018.10.1109\/EuroSP.2018.00013","DOI":"10.1109\/EuroSP.2018.00013"},{"key":"2022061123195712358_j_popets-2019-0017_ref_009_w2aab3b7b2b1b6b1ab1ab9Aa","doi-asserted-by":"crossref","unstructured":"[9] A. Besmer and H. Richter Lipford. Moving beyond untagging: photo privacy in a tagged world. In Proc. of SIGCHI. ACM, 2010.10.1145\/1753326.1753560","DOI":"10.1145\/1753326.1753560"},{"key":"2022061123195712358_j_popets-2019-0017_ref_010_w2aab3b7b2b1b6b1ab1ac10Aa","doi-asserted-by":"crossref","unstructured":"[10] G. Bicz\u00f3k and P. H. Chia. Interdependent Privacy: Let Me Share Your Data. In FC, 2013.10.1007\/978-3-642-39884-1_29","DOI":"10.1007\/978-3-642-39884-1_29"},{"key":"2022061123195712358_j_popets-2019-0017_ref_011_w2aab3b7b2b1b6b1ab1ac11Aa","doi-asserted-by":"crossref","unstructured":"[11] I. Bilogrevic, K. Huguenin, B. A\u011f\u0131r, M. Jadliwala, M. Gazaki, and J.-P. Hubaux. A Machine-Learning Based Approach to Privacy-Aware Information-Sharing in Mobile Social Networks. Pervasive and Mobile Computing (PMC), Nov. 2015.10.1016\/j.pmcj.2015.01.006","DOI":"10.1016\/j.pmcj.2015.01.006"},{"key":"2022061123195712358_j_popets-2019-0017_ref_012_w2aab3b7b2b1b6b1ab1ac12Aa","unstructured":"[12] A. Chaabane, G. Acs, and M. Kaafar. You are what you like# information leakage through users\u2019 interests. In NDSS, 2012."},{"key":"2022061123195712358_j_popets-2019-0017_ref_013_w2aab3b7b2b1b6b1ab1ac13Aa","doi-asserted-by":"crossref","unstructured":"[13] J. Chen, J. W. Ping, Y. C. Xu, and B. C. Tan. Information privacy concern about peer disclosure in online social networks. IEEE Transactions on Engineering Management, 62(3):311\u2013324, 2015.10.1109\/TEM.2015.2432117","DOI":"10.1109\/TEM.2015.2432117"},{"key":"2022061123195712358_j_popets-2019-0017_ref_014_w2aab3b7b2b1b6b1ab1ac14Aa","doi-asserted-by":"crossref","unstructured":"[14] H. Cho and A. Filippova. Networked privacy management in Facebook: A mixed-methods and multinational study. In Proc. of CSCW. ACM, 2016.10.1145\/2818048.2819996","DOI":"10.1145\/2818048.2819996"},{"key":"2022061123195712358_j_popets-2019-0017_ref_015_w2aab3b7b2b1b6b1ab1ac15Aa","doi-asserted-by":"crossref","unstructured":"[15] D. Crandall, L. Backstrom, D. Cosley, S. Suri, D. Huttenlocher, and J. Kleinberg. Inferring social ties from geographic coincidences. Proc. of PNAS, 107, 2010.10.1073\/pnas.1006155107301247421148099","DOI":"10.1073\/pnas.1006155107"},{"key":"2022061123195712358_j_popets-2019-0017_ref_016_w2aab3b7b2b1b6b1ab1ac16Aa","doi-asserted-by":"crossref","unstructured":"[16] R. Dey, C. Tang, K. Ross, and N. Saxena. Estimating age privacy leakage in online social networks. In INFOCOM, 2012.10.1109\/INFCOM.2012.6195711","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"2022061123195712358_j_popets-2019-0017_ref_017_w2aab3b7b2b1b6b1ab1ac17Aa","doi-asserted-by":"crossref","unstructured":"[17] R. L. Fogues, P. K. Murukannaiah, J. M. Such, and M. P. Singh. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI), 24(1):5, 2017.","DOI":"10.1145\/3038920"},{"key":"2022061123195712358_j_popets-2019-0017_ref_018_w2aab3b7b2b1b6b1ab1ac18Aa","unstructured":"[18] D. Fudenberg and J. Tirole. Game theory. MIT press, 1991."},{"key":"2022061123195712358_j_popets-2019-0017_ref_019_w2aab3b7b2b1b6b1ab1ac19Aa","doi-asserted-by":"crossref","unstructured":"[19] L. Gonz\u00e1lez-Manzano, A. I. Gonz\u00e1lez-Tablas, J. M. de Fuentes, and A. Ribagorda. Cooped: Co-owned personal data management. Computers & Security, 47, 2014.10.1016\/j.cose.2014.06.003","DOI":"10.1016\/j.cose.2014.06.003"},{"key":"2022061123195712358_j_popets-2019-0017_ref_020_w2aab3b7b2b1b6b1ab1ac20Aa","doi-asserted-by":"crossref","unstructured":"[20] P. E. Green and V. Srinivasan. Conjoint Analysis in Consumer Research: Issues and Outlook. Journal of Consumer Research, 5(2), 1978.10.1086\/208721","DOI":"10.1086\/208721"},{"key":"2022061123195712358_j_popets-2019-0017_ref_021_w2aab3b7b2b1b6b1ab1ac21Aa","doi-asserted-by":"crossref","unstructured":"[21] B. Henne, C. Szongott, and M. Smith. Snapme if you can: Privacy threats of other peoples\u2019 geo-tagged media and what we can do about it. In WiSec, 2013.10.1145\/2462096.2462113","DOI":"10.1145\/2462096.2462113"},{"key":"2022061123195712358_j_popets-2019-0017_ref_022_w2aab3b7b2b1b6b1ab1ac22Aa","doi-asserted-by":"crossref","unstructured":"[22] M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti. Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy. In CCS\u201913: Proc. of the 20th ACM Conf. on Computer and Communications Security, 2013.","DOI":"10.1145\/2508859.2516707"},{"key":"2022061123195712358_j_popets-2019-0017_ref_023_w2aab3b7b2b1b6b1ab1ac23Aa","doi-asserted-by":"crossref","unstructured":"[23] M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti. On non-cooperative genomic privacy. In FC, 2015.10.1007\/978-3-662-47854-7_24","DOI":"10.1007\/978-3-662-47854-7_24"},{"key":"2022061123195712358_j_popets-2019-0017_ref_024_w2aab3b7b2b1b6b1ab1ac24Aa","doi-asserted-by":"crossref","unstructured":"[24] P. Ilia, I. Polakis, E. Athanasopoulos, F. Maggi, and S. Ioannidis. Face\/Off: Preventing Privacy Leakage From Photos in Social Networks. In CCS, 2015.10.1145\/2810103.2813603","DOI":"10.1145\/2810103.2813603"},{"key":"2022061123195712358_j_popets-2019-0017_ref_025_w2aab3b7b2b1b6b1ab1ac25Aa","doi-asserted-by":"crossref","unstructured":"[25] H. Jia and H. Xu. Autonomous and interdependent: Collaborative privacy management on social networking sites. In Proc. of CHI. ACM, 2016.10.1145\/2858036.2858415","DOI":"10.1145\/2858036.2858415"},{"key":"2022061123195712358_j_popets-2019-0017_ref_026_w2aab3b7b2b1b6b1ab1ac26Aa","unstructured":"[26] S. Kokolakis. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers Security, 2015."},{"key":"2022061123195712358_j_popets-2019-0017_ref_027_w2aab3b7b2b1b6b1ab1ac27Aa","unstructured":"[27] D. Koller and N. Friedman. Probabilistic graphical models: principles and techniques. 2009."},{"key":"2022061123195712358_j_popets-2019-0017_ref_028_w2aab3b7b2b1b6b1ab1ac28Aa","doi-asserted-by":"crossref","unstructured":"[28] D. Koller and B. Milch. Multi-agent influence diagrams for representing and solving games. Games and economic behavior, 45(1), 2003.10.1016\/S0899-8256(02)00544-4","DOI":"10.1016\/S0899-8256(02)00544-4"},{"key":"2022061123195712358_j_popets-2019-0017_ref_029_w2aab3b7b2b1b6b1ab1ac29Aa","doi-asserted-by":"crossref","unstructured":"[29] H. Krasnova, S. Spiekermann, K. Koroleva, and T. Hildebrand. Online social networks: Why we disclose. Journal of information technology, 25(2), 2010.10.1057\/jit.2010.6","DOI":"10.1057\/jit.2010.6"},{"key":"2022061123195712358_j_popets-2019-0017_ref_030_w2aab3b7b2b1b6b1ab1ac30Aa","doi-asserted-by":"crossref","unstructured":"[30] J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6), 2009.10.1007\/s00779-008-0212-5","DOI":"10.1007\/s00779-008-0212-5"},{"key":"2022061123195712358_j_popets-2019-0017_ref_031_w2aab3b7b2b1b6b1ab1ac31Aa","doi-asserted-by":"crossref","unstructured":"[31] A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen. We\u2019re in it together: interpersonal management of disclosure in social network services. In Proc. of CHI, 2011.10.1145\/1978942.1979420","DOI":"10.1145\/1978942.1979420"},{"key":"2022061123195712358_j_popets-2019-0017_ref_032_w2aab3b7b2b1b6b1ab1ac32Aa","doi-asserted-by":"crossref","unstructured":"[32] A. Laszka, M. Felegyhazi, and L. Buttyan. A survey of interdependent information security games. ACM Computing Surveys, 2015.10.1145\/2635673","DOI":"10.1145\/2635673"},{"key":"2022061123195712358_j_popets-2019-0017_ref_033_w2aab3b7b2b1b6b1ab1ac33Aa","unstructured":"[33] R. S. Laufer, H. M. Proshansky, and M. Wolfe. Some analytic dimensions of privacy. In Proceedings of the Lund Conference on Architectural Psychology. Lund, Sweden, 1973."},{"key":"2022061123195712358_j_popets-2019-0017_ref_034_w2aab3b7b2b1b6b1ab1ac34Aa","doi-asserted-by":"crossref","unstructured":"[34] R. S. Laufer and M. Wolfe. Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3):22\u201342, 1977.","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"2022061123195712358_j_popets-2019-0017_ref_035_w2aab3b7b2b1b6b1ab1ac35Aa","doi-asserted-by":"crossref","unstructured":"[35] M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu, S. Hu, and K. Ren. All your location are belong to us: Breaking mobile social networks for automated user location tracking. In MobiHoc, 2014.10.1145\/2632951.2632953","DOI":"10.1145\/2632951.2632953"},{"key":"2022061123195712358_j_popets-2019-0017_ref_036_w2aab3b7b2b1b6b1ab1ac36Aa","doi-asserted-by":"crossref","unstructured":"[36] D. Meier, Y. A. Oswald, S. Schmid, and R. Wattenhofer. On the Windfall of Friendship: Inoculation Strategies on Social Networks. In EC, 2008.10.1145\/1386790.1386836","DOI":"10.1145\/1386790.1386836"},{"key":"2022061123195712358_j_popets-2019-0017_ref_037_w2aab3b7b2b1b6b1ab1ac37Aa","doi-asserted-by":"crossref","unstructured":"[37] A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in online social networks. In WSDM, 2010.10.1145\/1718487.1718519","DOI":"10.1145\/1718487.1718519"},{"key":"2022061123195712358_j_popets-2019-0017_ref_038_w2aab3b7b2b1b6b1ab1ac38Aa","doi-asserted-by":"crossref","unstructured":"[38] G. Misra and J. M. Such. Pacman: Personal agent for access control in social media. IEEE Internet Computing, 21(6):18\u201326, 2017.","DOI":"10.1109\/MIC.2017.4180831"},{"key":"2022061123195712358_j_popets-2019-0017_ref_039_w2aab3b7b2b1b6b1ab1ac39Aa","doi-asserted-by":"crossref","unstructured":"[39] R. B. Myerson. Game theory. Harvard university press, 2013.10.2307\/j.ctvjsf522","DOI":"10.2307\/j.ctvjsf522"},{"key":"2022061123195712358_j_popets-2019-0017_ref_040_w2aab3b7b2b1b6b1ab1ac40Aa","unstructured":"[40] A. Noulas, M. Musolesi, M. Pontil, and C. Mascolo. Inferring interests from mobility and social interactions. In Proc. of NIPS Workshops, 2009."},{"key":"2022061123195712358_j_popets-2019-0017_ref_041_w2aab3b7b2b1b6b1ab1ac41Aa","doi-asserted-by":"crossref","unstructured":"[41] A.-M. Olteanu, K. Huguenin, R. Shokri, M. Humbert, and J.-P. Hubaux. Quantifying interdependent privacy risks with location data. In IEEE Trans. Mobile Comput., 2016.10.1109\/TMC.2016.2561281","DOI":"10.1109\/TMC.2016.2561281"},{"key":"2022061123195712358_j_popets-2019-0017_ref_042_w2aab3b7b2b1b6b1ab1ac42Aa","doi-asserted-by":"crossref","unstructured":"[42] Z. D. Ozdemir, H. J. Smith, and J. H. Benamati. Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6):642\u2013660, 2017.","DOI":"10.1057\/s41303-017-0056-z"},{"key":"2022061123195712358_j_popets-2019-0017_ref_043_w2aab3b7b2b1b6b1ab1ac43Aa","doi-asserted-by":"crossref","unstructured":"[43] X. Page, B. P. Knijnenburg, and A. Kobsa. FYI: Communication Style Preferences Underlie Differences in Location-sharing Adoption and Usage. In UbiComp, 2013.10.1145\/2493432.2493487","DOI":"10.1145\/2493432.2493487"},{"key":"2022061123195712358_j_popets-2019-0017_ref_044_w2aab3b7b2b1b6b1ab1ac44Aa","doi-asserted-by":"crossref","unstructured":"[44] I. Polakis, G. Argyros, T. Petsios, S. Sivakorn, and A. D. Keromytis. Where\u2019s wally?: Precise user discovery attacks in location proximity services. In CCS, pages 817\u2013828, 2015.10.1145\/2810103.2813605","DOI":"10.1145\/2810103.2813605"},{"key":"2022061123195712358_j_popets-2019-0017_ref_045_w2aab3b7b2b1b6b1ab1ac45Aa","doi-asserted-by":"crossref","unstructured":"[45] Y. Pu and J. Grossklags. An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences. In GameSec, 2014.10.1007\/978-3-319-12601-2_14","DOI":"10.1007\/978-3-319-12601-2_14"},{"key":"2022061123195712358_j_popets-2019-0017_ref_046_w2aab3b7b2b1b6b1ab1ac46Aa","doi-asserted-by":"crossref","unstructured":"[46] Y. Pu and J. Grossklags. Towards a model on the factors influencing social app users\u2019 valuation of interdependent privacy. PoPETS, 2015.10.1515\/popets-2016-0005","DOI":"10.1515\/popets-2016-0005"},{"key":"2022061123195712358_j_popets-2019-0017_ref_047_w2aab3b7b2b1b6b1ab1ac47Aa","unstructured":"[47] Y. Pu and J. Grossklags. Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios. In ICIS. Assoc. for Information Systems, 2015."},{"key":"2022061123195712358_j_popets-2019-0017_ref_048_w2aab3b7b2b1b6b1ab1ac48Aa","unstructured":"[48] Y. Pu and J. Grossklags. Valuating friends\u2019 privacy: Does anonymity of sharing personal data matter? In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, 2017."},{"key":"2022061123195712358_j_popets-2019-0017_ref_049_w2aab3b7b2b1b6b1ab1ac49Aa","doi-asserted-by":"crossref","unstructured":"[49] S. Rajtmajer, A. Squicciarini, J. M. Such, J. Semonsen, and A. Belmonte. An ultimatum game model for the evolution of privacy in jointly managed content. In International Conference on Decision and Game Theory for Security, pages 112\u2013130. Springer, 2017.10.1007\/978-3-319-68711-7_7","DOI":"10.1007\/978-3-319-68711-7_7"},{"key":"2022061123195712358_j_popets-2019-0017_ref_050_w2aab3b7b2b1b6b1ab1ac50Aa","doi-asserted-by":"crossref","unstructured":"[50] K. Raynes-Goldie. Aliases, creeping, and wall cleaning: Understanding privacy in the age of facebook. First Monday, 15(1), 2010.10.5210\/fm.v15i1.2775","DOI":"10.5210\/fm.v15i1.2775"},{"key":"2022061123195712358_j_popets-2019-0017_ref_051_w2aab3b7b2b1b6b1ab1ac51Aa","unstructured":"[51] E. M. Redmiles, M. L. Mazurek, and J. P. Dickerson. Poster: Do users make rational security decisions? 2018."},{"key":"2022061123195712358_j_popets-2019-0017_ref_052_w2aab3b7b2b1b6b1ab1ac52Aa","doi-asserted-by":"crossref","unstructured":"[52] C. Riederer, D. Echickson, S. Huang, and A. Chaintreau. Findyou: A personal location privacy auditing tool. In WWW, 2016.10.1145\/2872518.2890546","DOI":"10.1145\/2872518.2890546"},{"key":"2022061123195712358_j_popets-2019-0017_ref_053_w2aab3b7b2b1b6b1ab1ac53Aa","doi-asserted-by":"crossref","unstructured":"[53] J. Ross, L. Irani, M. S. Silberman, A. Zaldivar, and B. Tomlinson. Who are the crowdworkers?: Shifting demographics in mechanical turk. In CHI, 2010.10.1145\/1753846.1753873","DOI":"10.1145\/1753846.1753873"},{"key":"2022061123195712358_j_popets-2019-0017_ref_054_w2aab3b7b2b1b6b1ab1ac54Aa","doi-asserted-by":"crossref","unstructured":"[54] R. Shokri. Privacy games: Optimal user-centric data obfuscation. PoPETS, 2015(2), 2015.10.1515\/popets-2015-0024","DOI":"10.1515\/popets-2015-0024"},{"key":"2022061123195712358_j_popets-2019-0017_ref_055_w2aab3b7b2b1b6b1ab1ac55Aa","doi-asserted-by":"crossref","unstructured":"[55] R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec. Protecting location privacy: optimal strategy against localization attacks. In CCS\u201912: Proc. of the 19th ACM Conf. on Computer and Communications Security, 2012.","DOI":"10.1145\/2382196.2382261"},{"key":"2022061123195712358_j_popets-2019-0017_ref_056_w2aab3b7b2b1b6b1ab1ac56Aa","doi-asserted-by":"crossref","unstructured":"[56] Y. Shoshitaishvili, C. Kruegel, and G. Vigna. Portrait of a privacy invasion; detecting relationships through large-scale photo analysis. PoPETS, 2015.10.1515\/popets-2015-0004","DOI":"10.1515\/popets-2015-0004"},{"key":"2022061123195712358_j_popets-2019-0017_ref_057_w2aab3b7b2b1b6b1ab1ac57Aa","doi-asserted-by":"crossref","unstructured":"[57] J. M. Such and N. Criado. Resolving multi-party privacy conflicts in social media. IEEE KDE, 2016.10.1109\/TKDE.2016.2539165","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"2022061123195712358_j_popets-2019-0017_ref_058_w2aab3b7b2b1b6b1ab1ac58Aa","doi-asserted-by":"crossref","unstructured":"[58] J. M. Such, J. Porter, S. Preibusch, and A. Joinson. Photo privacy conflicts in social media: A large-scale empirical study. In Proc. of CHI, 2017.10.1145\/3025453.3025668","DOI":"10.1145\/3025453.3025668"},{"key":"2022061123195712358_j_popets-2019-0017_ref_059_w2aab3b7b2b1b6b1ab1ac59Aa","doi-asserted-by":"crossref","unstructured":"[59] E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical models of privacy in location sharing. In UbiComp, 2010.10.1145\/1864349.1864364","DOI":"10.1145\/1864349.1864364"},{"key":"2022061123195712358_j_popets-2019-0017_ref_060_w2aab3b7b2b1b6b1ab1ac60Aa","unstructured":"[60] J. Von Neumann and O. Morgenstern. Theory of games and economic behavior. Princeton university press, 2007."},{"key":"2022061123195712358_j_popets-2019-0017_ref_061_w2aab3b7b2b1b6b1ab1ac61Aa","doi-asserted-by":"crossref","unstructured":"[61] N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux. A Location-Privacy Threat Stemming from the Use of Shared Public IP. IEEE Trans. on Mobile Computing (TMC), 13(11), Nov. 2014.10.1109\/TMC.2014.2309953","DOI":"10.1109\/TMC.2014.2309953"},{"key":"2022061123195712358_j_popets-2019-0017_ref_062_w2aab3b7b2b1b6b1ab1ac62Aa","unstructured":"[62] G. Wang, S. Y. Schoenebeck, H. Zheng, and B. Y. Zhao. \u201cwill check-in for badges\u201d: Understanding bias and misbehavior on location-based social networks. In ICWSM, 2016."},{"key":"2022061123195712358_j_popets-2019-0017_ref_063_w2aab3b7b2b1b6b1ab1ac63Aa","doi-asserted-by":"crossref","unstructured":"[63] A. F. Westin. Social and political dimensions of privacy. Journal of social issues, 59(2):431\u2013453, 2003.10.1111\/1540-4560.00072","DOI":"10.1111\/1540-4560.00072"},{"key":"2022061123195712358_j_popets-2019-0017_ref_064_w2aab3b7b2b1b6b1ab1ac64Aa","doi-asserted-by":"crossref","unstructured":"[64] J. Wiese, P. G. Kelley, L. F. Cranor, L. Dabbish, J. I. Hong, and J. Zimmerman. Are you close with me? are you nearby?: Investigating social groups, closeness, and willingness to share. In UbiComp, 2011.10.1145\/2030112.2030140","DOI":"10.1145\/2030112.2030140"},{"key":"2022061123195712358_j_popets-2019-0017_ref_065_w2aab3b7b2b1b6b1ab1ac65Aa","doi-asserted-by":"crossref","unstructured":"[65] P. Wisniewski, H. Lipford, and D. Wilson. Fighting for my space: Coping mechanisms for sns boundary regulation. In Proc. of SIGCHI. ACM, 2012.10.1145\/2207676.2207761","DOI":"10.1145\/2207676.2207761"},{"key":"2022061123195712358_j_popets-2019-0017_ref_066_w2aab3b7b2b1b6b1ab1ac66Aa","unstructured":"[66] Xlstat statistical software for microsoft excel. https:\/\/www.xlstat.com\/en\/, 2016. last visited: Aug. 2016."},{"key":"2022061123195712358_j_popets-2019-0017_ref_067_w2aab3b7b2b1b6b1ab1ac67Aa","doi-asserted-by":"crossref","unstructured":"[67] F. Xu, Z. Tu, Y. Li, P. Zhang, X. Fu, and D. Jin. Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2017.10.1145\/3038912.3052620","DOI":"10.1145\/3038912.3052620"},{"key":"2022061123195712358_j_popets-2019-0017_ref_068_w2aab3b7b2b1b6b1ab1ac68Aa","unstructured":"[68] H. Xu. Reframing privacy 2.0 in online social network. U. Pa. J. Const. L., 2011."},{"key":"2022061123195712358_j_popets-2019-0017_ref_069_w2aab3b7b2b1b6b1ab1ac69Aa","doi-asserted-by":"crossref","unstructured":"[69] M. Xue, C. Ballard, K. Liu, C. Nemelka, Y. Wu, K. Ross, and H. Qian. You can yak but you can\u2019t hide: Localizing anonymous social network users. In Proceedings of the 2016 Internet Measurement Conference, pages 25\u201331. ACM, 2016.10.1145\/2987443.2987449","DOI":"10.1145\/2987443.2987449"},{"key":"2022061123195712358_j_popets-2019-0017_ref_070_w2aab3b7b2b1b6b1ab1ac70Aa","doi-asserted-by":"crossref","unstructured":"[70] M. Xue, Y. Liu, K. W. Ross, and H. Qian. I know where you are: thwarting privacy protection in location-based social discovery services. In IEEE Conference on Computer Communications Workshops, pages 179\u2013184. IEEE, 2015.10.1109\/INFCOMW.2015.7179381","DOI":"10.1109\/INFCOMW.2015.7179381"},{"key":"2022061123195712358_j_popets-2019-0017_ref_071_w2aab3b7b2b1b6b1ab1ac71Aa","doi-asserted-by":"crossref","unstructured":"[71] M. Yang, Y. Yu, A. K. Bandara, and B. Nuseibeh. Adaptive sharing for online social networks: A trade-off between privacy risk and social benefit. In TrustCom, 2014.10.1109\/TrustCom.2014.10","DOI":"10.1109\/TrustCom.2014.10"},{"key":"2022061123195712358_j_popets-2019-0017_ref_072_w2aab3b7b2b1b6b1ab1ac72Aa","doi-asserted-by":"crossref","unstructured":"[72] Y. Zheng, L. Liu, L. Wang, and X. Xie. Learning transportation mode from raw GPS data for geographic applications on the web. In WWW, pages 247\u2013256, 2008.10.1145\/1367497.1367532","DOI":"10.1145\/1367497.1367532"}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/content.sciendo.com\/view\/journals\/popets\/2019\/2\/article-p5.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2019-0017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:30:21Z","timestamp":1658334621000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2019\/popets-2019-0017.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":72,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,5,4]]},"published-print":{"date-parts":[[2019,4,1]]}},"alternative-id":["10.2478\/popets-2019-0017"],"URL":"https:\/\/doi.org\/10.2478\/popets-2019-0017","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}