{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:29:01Z","timestamp":1771468141895,"version":"3.50.1"},"reference-count":96,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T00:00:00Z","timestamp":1648857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ariel Cyber Innovation Center in conjunction with the Israel National Cyber directorate in the Prime Minister's Office","award":["RA2000000281"],"award-info":[{"award-number":["RA2000000281"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Contemporary information-sharing environments such as Facebook offer a wide range of social and practical benefits. These environments, however, may also lead to privacy and security violations. Moreover, there is usually a trade-off between the benefits gained and the accompanying costs. Due to the uncertain nature of the information-sharing environment and the lack of technological literacy, the layperson user often fails miserably in balancing this trade-off. In this paper, we use game theory concepts to formally model this problem as a \u201cgame\u201d, in which the players are the users and the pay-off function is a combination of the benefits and costs of the information-sharing process. We introduce a novel theoretical framework called Online Information-Sharing Assistance (OISA) to evaluate the interactive nature of the information-sharing trade-off problem. Using these theoretical foundations, we develop a set of AI agents that attempt to calculate a strategy for balancing this trade-off. Finally, as a proof of concept, we conduct an empirical study in a simulated Facebook environment in which human participants compete against OISA-based AI agents, showing that significantly higher utility can be achieved using OISA.<\/jats:p>","DOI":"10.3390\/info13040183","type":"journal-article","created":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T02:59:52Z","timestamp":1648954792000},"page":"183","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Game Theory Approach for Assisting Humans in Online Information-Sharing"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1663-9699","authenticated-orcid":false,"given":"Ron S.","family":"Hirschprung","sequence":"first","affiliation":[{"name":"Department of Industrial Engineering and Management, Faculty of Engineering, Ariel University, Ariel 4070000, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0582-5832","authenticated-orcid":false,"given":"Shani","family":"Alkoby","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering and Management, Faculty of Engineering, Ariel University, Ariel 4070000, Israel"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,2]]},"reference":[{"key":"ref_1","unstructured":"ITUNews (2018, December 06). New ITU Statistics Show More than Half the world Is Now Using the Internet. Available online: https:\/\/news.itu.int\/itu-statistics-leaving-no-one-offline\/."},{"key":"ref_2","first-page":"97","article-title":"A survey of digital world opportunities and challenges for user\u2019s privacy","volume":"9","author":"Romansky","year":"2017","journal-title":"Int. J. Inf. Technol. Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1007\/s10796-017-9774-y","article-title":"Re-examining the unified theory of acceptance and use of technology (UTAUT): Towards a revised theoretical model","volume":"21","author":"Dwivedi","year":"2019","journal-title":"Inf. Syst. Front."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Asswad, J., and Marks, J.G. (2021). Data Ownership: A Survey. Information, 12.","DOI":"10.3390\/info12110465"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1108\/ICS-05-2015-0020","article-title":"Online privacy and security concerns of consumers","volume":"24","author":"Gurung","year":"2016","journal-title":"Inf. Comput. Secur."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1362\/146934717X14909733966254","article-title":"Risk, privacy and security concerns in digital retail","volume":"17","author":"Marriott","year":"2017","journal-title":"Mark. Rev."},{"key":"ref_7","unstructured":"Rotman, D. (2022, January 26). Are You Looking At Me? Social Media and Privacy Literacy, IDEALS. Available online: http:\/\/hdl.handle.net\/2142\/15339."},{"key":"ref_8","unstructured":"Brenda, J. (2019). Understanding Ecommerce Consumer Privacy from the Behavioral Marketers\u2019 Viewpoint. [Ph.D. Thesis, Walden University]."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/S0736-5853(01)00013-2","article-title":"Data privacy approaches from US and EU perspectives","volume":"19","author":"Steinke","year":"2002","journal-title":"Telemat. Inform."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bellekens, X., Hamilton, A., Seeam, P., Nieradzinska, K., Franssen, Q., and Seeam, A. (2016, January 13\u201314). Pervasive eHealth services a security and privacy risk awareness survey. Proceedings of the 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), London, UK.","DOI":"10.1109\/CyberSA.2016.7503293"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1038\/s41591-018-0272-7","article-title":"Privacy in the age of medical big data","volume":"25","author":"Price","year":"2019","journal-title":"Nat. Med."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A survey on security and privacy issues in Internet-of-Things","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1080\/13691180210159328","article-title":"Privacy as a common good in the digital world","volume":"5","author":"Regan","year":"2002","journal-title":"Inf. Commun. Soc."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10982-017-9307-3","article-title":"Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy","volume":"37","author":"Mokrosinska","year":"2018","journal-title":"Law Philos."},{"key":"ref_15","first-page":"306","article-title":"Privacy in digital age: Dead or alive? Regarding the new EU data protection regulations","volume":"4","author":"Dorraji","year":"2014","journal-title":"Soc. Technol."},{"key":"ref_16","first-page":"1","article-title":"The impact of GDPR on global technology development","volume":"22","author":"Li","year":"2019","journal-title":"J. Glob. Inf. Technol. Manag."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1002\/asi.23206","article-title":"How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost","volume":"66","author":"Min","year":"2015","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1846","DOI":"10.1016\/j.jfranklin.2017.07.002","article-title":"A compressive privacy approach to generalized information bottleneck and privacy funnel problems","volume":"355","author":"Kung","year":"2018","journal-title":"J. Frankl. Inst."},{"key":"ref_19","unstructured":"Cambridge Dictionary (Online) (2022, March 22). Information Exchange. Available online: https:\/\/dictionary.cambridge.org\/dictionary\/english\/information-exchange."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/1-4020-3670-1_7","article-title":"Information sharing","volume":"Volume 8","author":"Spink","year":"2006","journal-title":"New Directions in Human Information Behavior"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1111\/jcom.12276","article-title":"Online privacy concerns and privacy management: A meta-analytical review","volume":"67","author":"Baruh","year":"2017","journal-title":"J. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Olson, J.S., Grudin, J., and Horvitz, E. (2005, January 2\u20137). A study of preferences for sharing and privacy. Proceedings of the CHI\u201905 Extended Abstracts on Human Factors in Computing Systems, New York, NY, USA.","DOI":"10.1145\/1056808.1057073"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Puaschunder, J. (2021). A Utility Theory of Privacy and Information Sharing. Encyclopedia of Information Science and Technology, IGI Global. [5th ed.].","DOI":"10.4018\/978-1-7998-3479-3.ch031"},{"key":"ref_24","first-page":"263","article-title":"Prospect Theory: An analysis of decision under risk","volume":"47","author":"Kahneman","year":"1979","journal-title":"Econom. J. Econom. Soc."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","article-title":"A survey of intrusion detection techniques in cloud","volume":"36","author":"Modi","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1016\/j.comnet.2006.06.015","article-title":"Structured firewall design","volume":"51","author":"Gouda","year":"2007","journal-title":"Comput. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Newton, J. (2018). Evolutionary game theory: A renaissance. Games, 9.","DOI":"10.3390\/g9020031"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1177\/1043463192004001008","article-title":"On the value of game theory in social science","volume":"4","author":"Myerson","year":"1992","journal-title":"Ration. Soc."},{"key":"ref_29","unstructured":"Deng, H., Miao, D., Lei, J., and Wang, F.L. (2011). Detecting Overlapping Communities in Social Networks by Game Theory and Structural Equivalence Concept. Artificial Intelligence and Computational Intelligence, Springer."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/TSC.2016.2549019","article-title":"Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game","volume":"11","author":"Wahab","year":"2018","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Phan, C. (2007, January 29\u201331). Coalition Information Sharing. Proceedings of the MILCOM 2007\u2014IEEE Military Communications Conference, Orlando, FL, USA.","DOI":"10.1109\/MILCOM.2007.4455013"},{"key":"ref_32","unstructured":"Myers, K., Ellis, T., Lepoint, T., Moore, R.A., Archer, D., Denker, G., Lu, S., Magill, S., and Ostrovsky, R. (2017, January 6\u20138). Privacy technologies for controlled information sharing in coalition operations. Proceedings of the Symposium on Knowledge System for Coalition Operations, Los Angeles, LA, USA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Guo, Z., and Cho, J. (2021, January 7\u201311). Game Theoretic Opinion Models and Their Application in Processing Disinformation. Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain.","DOI":"10.1109\/GLOBECOM46510.2021.9685197"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s12626-019-00050-4","article-title":"Facebook Explore Feed: Perception and Consequences of the Experiment","volume":"14","author":"Kuchta","year":"2019","journal-title":"Rev. Socionetwork Strateg."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1002\/asi.23894","article-title":"How people protect their privacy on Facebook: A cost-benefit view","volume":"69","author":"Vishwanath","year":"2018","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Bhagat, S., Saminathan, K., Agarwal, A., Dowsley, R., De Cock, M., and Nascimento, A. (2018, January 10\u201313). Privacy-Preserving User Profiling with Facebook Likes. Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA.","DOI":"10.1109\/BigData.2018.8622081"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"101597","DOI":"10.1016\/j.tele.2021.101597","article-title":"Recommendation agents and information sharing through social media for coronavirus outbreak","volume":"61","author":"Nilashi","year":"2021","journal-title":"Telemat. Inform."},{"key":"ref_38","unstructured":"Wattal, S., Telang, R., Mukhopadhyay, T., and Boatwright, P. (2005). Examining the personalization-privacy tradeoff\u2014An empirical investigation with email advertisements. Carnegie Mellon University Journal Contribution, Carnegie Mellon University."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1287\/mksc.2020.1235","article-title":"Targeting and privacy in mobile advertising","volume":"40","author":"Rafieian","year":"2020","journal-title":"Marketing Science."},{"key":"ref_40","unstructured":"Rastogi, V., Suciu, D., and Hong, S. (2007, January 23\u201327). The boundary between privacy and utility in data publishing. Proceedings of the 33rd International Conference on Very Large Data Bases, Vienna, Austria."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Zhang, D. (2018, January 10\u201312). Big data security and privacy protection. Proceedings of the 8th International Conference on Management and Computer Science (ICMCS 2018), Shenyang, China.","DOI":"10.2991\/icmcs-18.2018.56"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2816","DOI":"10.1109\/TIFS.2018.2831619","article-title":"Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion","volume":"13","author":"Kalantari","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.ijhcs.2005.04.008","article-title":"Keeping ubiquitous computing to yourself: A practical model for user control of privacy","volume":"63","author":"Price","year":"2005","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.chb.2018.09.015","article-title":"Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor","volume":"95","author":"Gutierrez","year":"2019","journal-title":"Comput. Hum. Behav."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/s10916-018-0995-5","article-title":"Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain","volume":"42","author":"Zhang","year":"2018","journal-title":"J. Med. Syst."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Sun, Y., Yin, L., Sun, Z., Tian, Z., and Du, X. (2020, January 6\u20139). An IoT data sharing privacy preserving scheme. Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada.","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162939"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MIC.2018.112102519","article-title":"Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems","volume":"22","author":"Sharma","year":"2018","journal-title":"IEEE Internet Comput."},{"key":"ref_48","unstructured":"Kenneally, E., and Claffy, K. (2009, January 12\u201313). An internet data sharing framework for balancing privacy and utility. Proceedings of the Engaging Data: First International Forum on the Application and Management of Personal Electronic Information, Cambridge, MA, USA."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Bhumiratana, B., and Bishop, M. (2009, January 9\u201313). Privacy aware data sharing: Balancing the usability and privacy of datasets. Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments, Corfu, Greece.","DOI":"10.1145\/1579114.1579187"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3046676","article-title":"Analyzing and optimizing access control choice architectures in online social networks","volume":"8","author":"Hirschprung","year":"2017","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"2296","DOI":"10.1177\/1461444817714790","article-title":"Context collapse and privacy management: Diversity in Facebook friends increases online news reading and sharing","volume":"20","author":"Beam","year":"2018","journal-title":"New Media Soc."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1140\/epjds\/s13688-018-0130-3","article-title":"Collective aspects of privacy in the Twitter social network","volume":"7","author":"Garcia","year":"2018","journal-title":"EPJ Data Sci."},{"key":"ref_53","first-page":"124","article-title":"Love at first sight: The interplay between privacy dispositions and privacy calculus in online social connectivity management","volume":"19","author":"Choi","year":"2018","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_54","unstructured":"Madejskiy, M., Johnson, M., and Bellovin, S.M. (2011). The Failure of Online Social Network Privacy Settings, Columbia University. Columbia University Computer Science Technical Reports, CUCS-010-11."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Acquisti, A. (2004, January 17\u201320). Privacy in electronic commerce and the economics of immediate gratification. Proceedings of the 5th ACM Conference on Electronic Commerce, New York, NY, USA.","DOI":"10.1145\/988772.988777"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MC.2018.3191268","article-title":"User data privacy: Facebook, Cambridge Analytica, and privacy protection","volume":"51","author":"Isaak","year":"2018","journal-title":"Computer"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., Lipford, H., and Wilson, D. (2012, January 5\u201310). Fighting for my space: Coping mechanisms for SNS boundary regulation. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA.","DOI":"10.1145\/2207676.2207761"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"106382","DOI":"10.1016\/j.chb.2020.106382","article-title":"Knowledge as a strategy for privacy protection: How a privacy literacy training affects children\u2019s online disclosure behaviour","volume":"110","author":"Desimpelaere","year":"2020","journal-title":"Comput. Hum. Behav."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"18986","DOI":"10.5465\/AMBPP.2019.18986abstract","article-title":"Privacy Risk Perceptions and the Role of Evaluability, Framing and Privacy Literacy","volume":"2019","author":"Korneeva","year":"2019","journal-title":"Acad. Manag. Proc."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Pingo, Z., and Narayan, B. (2018, January 18\u201327). Privacy Literacy and the Everyday Use of Social Technologies. Proceedings of the European Conference on Information Literacy, Oulu, Finland.","DOI":"10.1007\/978-3-030-13472-3_4"},{"key":"ref_61","unstructured":"Spiering, A. (2022, March 22). Improving Cyber Security Safety Awareness Education at Dutch Elementary Schools. Available online: https:\/\/openaccess.leidenuniv.nl\/bitstream\/handle\/1887\/64565\/Spiering_A_2018_CS.docx?sequence=2."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1361-3723(14)70491-9","article-title":"Security literacy: The missing link in today\u2019s online society?","volume":"5","author":"Furnell","year":"2014","journal-title":"Comput. Fraud Secur."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"258","DOI":"10.17645\/mac.v8i2.2855","article-title":"How online privacy literacy supports self-data protection and self-determination in the age of information","volume":"8","author":"Masur","year":"2020","journal-title":"Media Commun."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/3380799.3380805","article-title":"How Privacy Concerns, Trust and Risk Beliefs, and Privacy Literacy Influence Users\u2019 Intentions to Use Privacy-Enhancing Technologies: The Case of Tor","volume":"51","author":"Harborth","year":"2020","journal-title":"ACM SIGMIS Database DATABASE Adv. Inf. Syst."},{"key":"ref_65","unstructured":"Andrew, H. (2022, March 22). Facebook\u2019s Implementing New Rules and Processes to Stop the Spread of Harmful Content. Available online: https:\/\/www.socialmediatoday.com\/news\/facebooks-implementing-new-rules-and-processes-to-stop-the-spread-of-harmf\/552481\/."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.chb.2018.06.019","article-title":"Choice defaults and social consensus effects on online information sharing: The moderating role of regulatory focus","volume":"88","author":"Craciun","year":"2018","journal-title":"Comput. Hum. Behav."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"70","DOI":"10.17705\/1thci.00129","article-title":"Exacerbating mindless compliance: The danger of justifications during privacy decision making in the context of Facebook applications","volume":"12","author":"Anaraky","year":"2020","journal-title":"AIS Trans. Hum.-Comput. Interact."},{"key":"ref_68","unstructured":"Maxwell, G. (2022, March 22). How Will the Latest Facebook Algorithm Change. Available online: https:\/\/www.falcon.io\/insights-hub\/industry-updates\/social-media-updates\/facebook-algorithm-change\/."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Gutwirth, S., Leenes, R., and de Hert, P. (2014). Do people know about privacy and data protection strategies? Towards the: Online Privacy Literacy Scale\u201d(OPLIS). Reforming European Data Protection Law, Springer.","DOI":"10.1007\/978-94-017-9385-8"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.chb.2015.11.022","article-title":"Control your Facebook: An analysis of online privacy literacy","volume":"56","author":"Bartsch","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.copsyc.2019.06.021","article-title":"Critical roles of knowledge and motivation in privacy research","volume":"31","author":"Brough","year":"2020","journal-title":"Curr. Opin. Psychol."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/TCSS.2018.2861775","article-title":"A hybrid privacy protection scheme in cyber-physical social networks","volume":"5","author":"Qu","year":"2018","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Gupta, A., Cedric, L., and Basar, T. (2010, January 15\u201317). Optimal control in the presence of an intelligent. Proceedings of the 49th IEEE Conference on Decision and Control (CDC), Atlanta, GA, USA.","DOI":"10.1109\/CDC.2010.5717544"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1109\/TIFS.2018.2790382","article-title":"A game theory based collaborative security detection method for Internet of Things systems","volume":"13","author":"Wu","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_75","unstructured":"Katz, J. (2008, January 19\u201321). Bridging game theory and cryptography: Recent results and future directions. Proceedings of the Theory of Cryptography Conference, New York, NY, USA."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"2685","DOI":"10.1109\/TNET.2020.3016315","article-title":"Multi-Party Privacy Conflict Management in Online Social Networks: A Network Game Perspective","volume":"28","author":"Ding","year":"2020","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_77","unstructured":"Kotra, A. (2020). A Game Theoretic Approach Applied in k-Anonymization for Preserving Privacy in Shared Data. [Ph.D. Thesis, University of Nevada]."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Liu, F., Pan, L., and Yao, L. (2018, January 18\u201321). Evolutionary Game Based Analysis for User Privacy Protection Behaviors in Social Networks. Proceedings of the 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), Guangzhou, China.","DOI":"10.1109\/DSC.2018.00046"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G., Zhao, Z., and Yang, D. (2014, January 25\u201327). Game theoretic analysis of multiparty access control in online social networks. Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, New York, NY, USA.","DOI":"10.1145\/2613087.2613097"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3057268","article-title":"Game theory for cyber security and privacy","volume":"50","author":"Do","year":"2017","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2480741.2480742","article-title":"Game theory meets network security and privacy","volume":"45","author":"Manshaei","year":"2013","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"145","DOI":"10.3233\/ICG-2002-25304","article-title":"Game-tree search algorithm based on realization probability","volume":"25","author":"Tsuruoka","year":"2002","journal-title":"Icga J."},{"key":"ref_83","first-page":"7","article-title":"Simulated annealing","volume":"Volume 37","author":"Aarts","year":"2010","journal-title":"Simulated Annealing: Theory and Applications"},{"key":"ref_84","first-page":"82","article-title":"Hill-climbing search","volume":"81","author":"Selman","year":"2006","journal-title":"Encycl. Cogn. Sci."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Coulom, R. (2006, January 29\u201331). Efficient selectivity and backup operators in Monte-Carlo tree search. Proceedings of the International Conference on Computers and Games, Turin, Italy.","DOI":"10.1007\/978-3-540-75538-8_7"},{"key":"ref_86","unstructured":"Karl (2022, January 17). The 15 Biggest Social Media Sites and Apps. Available online: https:\/\/www.dreamgrow.com\/top-15-most-popular-social-networking-sites\/."},{"key":"ref_87","unstructured":"Statista (2022, January 17). Leading Countries Based on Facebook Audience Size as of January 2022. Available online: https:\/\/www.statista.com\/statistics\/268136\/top-15-countries-based-on-number-of-facebook-users\/."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/j.chb.2016.03.033","article-title":"A methodology for estimating the value of privacy in information disclosure systems","volume":"61","author":"Hirschprung","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1017\/S1930297500002205","article-title":"Running experiments on Amazon Mechanical Turk","volume":"5","author":"Paolacci","year":"2010","journal-title":"Judgm. Decis. Mak."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Xiao, Y., and Li, H. (2020). Privacy preserving data publishing for multiple sensitive attributes based on security level. Information, 11.","DOI":"10.3390\/info11030166"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MSP.2005.137","article-title":"Valuating privacy","volume":"3","author":"Huberman","year":"2005","journal-title":"IEEE Secur. Priv."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1370","DOI":"10.1080\/09672567.2018.1523206","article-title":"Rationality and bounded rationality: You can\u2019t have one without the other","volume":"25","author":"Sent","year":"2018","journal-title":"Eur. J. Hist. Econ. Thought"},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"101717","DOI":"10.1016\/j.tele.2021.101717","article-title":"Revisiting the privacy calculus: Why are consumers (really) willing to disclose personal data online?","volume":"65","author":"Fernandes","year":"2021","journal-title":"Telemat. Inform."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3158373","article-title":"Preserving privacy as social responsibility in online social networks","volume":"18","author":"Kekulluoglu","year":"2018","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Rass, S., An, B., Kiekintveld, C., Fang, F., and Schauer, S. (2017). An ultimatum game model for the evolution of privacy in jointly managed content. Decision and Game Theory for Security, Springer.","DOI":"10.1007\/978-3-319-68711-7"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Lampinen, A., Lehtinen, V., Lehmuskallio, A., and Tamminen, S. (2011, January 7\u201312). We\u2019re in it together: Interpersonal management of disclosure in social network services. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, BC, Canada.","DOI":"10.1145\/1978942.1979420"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/4\/183\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:49:09Z","timestamp":1760136549000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/4\/183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,2]]},"references-count":96,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,4]]}},"alternative-id":["info13040183"],"URL":"https:\/\/doi.org\/10.3390\/info13040183","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,2]]}}}