[[1] A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on Electronic commerce, pages 21–29. ACM, 2004.10.1145/988772.988777]Search in Google Scholar
[[2] A. Acquisti. Nudging privacy: The behavioral economics of personal information. IEEE Security Privacy, 2009.10.1109/MSP.2009.163]Search in Google Scholar
[[3] A. Acquisti and J. Grossklags. Privacy Attitudes and Privacy Behavior. 2004.]Search in Google Scholar
[[4] A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. IEEE Security Privacy, 3(1), 2005.10.1109/MSP.2005.22]Search in Google Scholar
[[5] M. Backes, M. Humbert, J. Pang, and Y. Zhang. walk2friends: Inferring social links from mobility profiles. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 1943–1957. ACM, 2017.10.1145/3133956.3133972]Search in Google Scholar
[[6] L. Backstrom, E. Sun, and C. Marlow. Find me if you can: improving geographical prediction with social and spatial proximity. In WWW, 2010.10.1145/1772690.1772698]Search in Google Scholar
[[7] F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social networks. In IMC, 2009.10.1145/1644893.1644900]Search in Google Scholar
[[8] P. Berrang, M. Humbert, Y. Zhang, I. Lehmann, R. Eils, and M. Backes. Dissecting privacy risks in biomedical data. In Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P). IEEE, 2018.10.1109/EuroSP.2018.00013]Search in Google Scholar
[[9] A. Besmer and H. Richter Lipford. Moving beyond untagging: photo privacy in a tagged world. In Proc. of SIGCHI. ACM, 2010.10.1145/1753326.1753560]Search in Google Scholar
[[10] G. Biczók and P. H. Chia. Interdependent Privacy: Let Me Share Your Data. In FC, 2013.10.1007/978-3-642-39884-1_29]Search in Google Scholar
[[11] I. Bilogrevic, K. Huguenin, B. Ağır, M. Jadliwala, M. Gazaki, and J.-P. Hubaux. A Machine-Learning Based Approach to Privacy-Aware Information-Sharing in Mobile Social Networks. Pervasive and Mobile Computing (PMC), Nov. 2015.10.1016/j.pmcj.2015.01.006]Search in Google Scholar
[[12] A. Chaabane, G. Acs, and M. Kaafar. You are what you like# information leakage through users’ interests. In NDSS, 2012.]Search in Google Scholar
[[13] J. Chen, J. W. Ping, Y. C. Xu, and B. C. Tan. Information privacy concern about peer disclosure in online social networks. IEEE Transactions on Engineering Management, 62(3):311–324, 2015.10.1109/TEM.2015.2432117]Search in Google Scholar
[[14] H. Cho and A. Filippova. Networked privacy management in Facebook: A mixed-methods and multinational study. In Proc. of CSCW. ACM, 2016.10.1145/2818048.2819996]Search in Google Scholar
[[15] D. Crandall, L. Backstrom, D. Cosley, S. Suri, D. Huttenlocher, and J. Kleinberg. Inferring social ties from geographic coincidences. Proc. of PNAS, 107, 2010.10.1073/pnas.1006155107]Search in Google Scholar
[[16] R. Dey, C. Tang, K. Ross, and N. Saxena. Estimating age privacy leakage in online social networks. In INFOCOM, 2012.10.1109/INFCOM.2012.6195711]Search in Google Scholar
[[17] R. L. Fogues, P. K. Murukannaiah, J. M. Such, and M. P. Singh. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI), 24(1):5, 2017.]Search in Google Scholar
[[18] D. Fudenberg and J. Tirole. Game theory. MIT press, 1991.]Search in Google Scholar
[[19] L. González-Manzano, A. I. González-Tablas, J. M. de Fuentes, and A. Ribagorda. Cooped: Co-owned personal data management. Computers & Security, 47, 2014.10.1016/j.cose.2014.06.003]Search in Google Scholar
[[20] P. E. Green and V. Srinivasan. Conjoint Analysis in Consumer Research: Issues and Outlook. Journal of Consumer Research, 5(2), 1978.10.1086/208721]Search in Google Scholar
[[21] B. Henne, C. Szongott, and M. Smith. Snapme if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In WiSec, 2013.10.1145/2462096.2462113]Search in Google Scholar
[[22] M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti. Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy. In CCS’13: Proc. of the 20th ACM Conf. on Computer and Communications Security, 2013.]Search in Google Scholar
[[23] M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti. On non-cooperative genomic privacy. In FC, 2015.10.1007/978-3-662-47854-7_24]Search in Google Scholar
[[24] P. Ilia, I. Polakis, E. Athanasopoulos, F. Maggi, and S. Ioannidis. Face/Off: Preventing Privacy Leakage From Photos in Social Networks. In CCS, 2015.10.1145/2810103.2813603]Search in Google Scholar
[[25] H. Jia and H. Xu. Autonomous and interdependent: Collaborative privacy management on social networking sites. In Proc. of CHI. ACM, 2016.10.1145/2858036.2858415]Search in Google Scholar
[[26] S. Kokolakis. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers Security, 2015.]Search in Google Scholar
[[27] D. Koller and N. Friedman. Probabilistic graphical models: principles and techniques. 2009.]Search in Google Scholar
[[28] D. Koller and B. Milch. Multi-agent influence diagrams for representing and solving games. Games and economic behavior, 45(1), 2003.10.1016/S0899-8256(02)00544-4]Search in Google Scholar
[[29] H. Krasnova, S. Spiekermann, K. Koroleva, and T. Hildebrand. Online social networks: Why we disclose. Journal of information technology, 25(2), 2010.10.1057/jit.2010.6]Search in Google Scholar
[[30] J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6), 2009.10.1007/s00779-008-0212-5]Search in Google Scholar
[[31] A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen. We’re in it together: interpersonal management of disclosure in social network services. In Proc. of CHI, 2011.10.1145/1978942.1979420]Search in Google Scholar
[[32] A. Laszka, M. Felegyhazi, and L. Buttyan. A survey of interdependent information security games. ACM Computing Surveys, 2015.10.1145/2635673]Search in Google Scholar
[[33] R. S. Laufer, H. M. Proshansky, and M. Wolfe. Some analytic dimensions of privacy. In Proceedings of the Lund Conference on Architectural Psychology. Lund, Sweden, 1973.]Search in Google Scholar
[[34] R. S. Laufer and M. Wolfe. Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3):22–42, 1977.]Search in Google Scholar
[[35] M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu, S. Hu, and K. Ren. All your location are belong to us: Breaking mobile social networks for automated user location tracking. In MobiHoc, 2014.10.1145/2632951.2632953]Search in Google Scholar
[[36] D. Meier, Y. A. Oswald, S. Schmid, and R. Wattenhofer. On the Windfall of Friendship: Inoculation Strategies on Social Networks. In EC, 2008.10.1145/1386790.1386836]Search in Google Scholar
[[37] A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in online social networks. In WSDM, 2010.10.1145/1718487.1718519]Search in Google Scholar
[[38] G. Misra and J. M. Such. Pacman: Personal agent for access control in social media. IEEE Internet Computing, 21(6):18–26, 2017.]Search in Google Scholar
[[39] R. B. Myerson. Game theory. Harvard university press, 2013.10.2307/j.ctvjsf522]Search in Google Scholar
[[40] A. Noulas, M. Musolesi, M. Pontil, and C. Mascolo. Inferring interests from mobility and social interactions. In Proc. of NIPS Workshops, 2009.]Search in Google Scholar
[[41] A.-M. Olteanu, K. Huguenin, R. Shokri, M. Humbert, and J.-P. Hubaux. Quantifying interdependent privacy risks with location data. In IEEE Trans. Mobile Comput., 2016.10.1109/TMC.2016.2561281]Search in Google Scholar
[[42] Z. D. Ozdemir, H. J. Smith, and J. H. Benamati. Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6):642–660, 2017.]Search in Google Scholar
[[43] X. Page, B. P. Knijnenburg, and A. Kobsa. FYI: Communication Style Preferences Underlie Differences in Location-sharing Adoption and Usage. In UbiComp, 2013.10.1145/2493432.2493487]Search in Google Scholar
[[44] I. Polakis, G. Argyros, T. Petsios, S. Sivakorn, and A. D. Keromytis. Where’s wally?: Precise user discovery attacks in location proximity services. In CCS, pages 817–828, 2015.10.1145/2810103.2813605]Search in Google Scholar
[[45] Y. Pu and J. Grossklags. An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences. In GameSec, 2014.10.1007/978-3-319-12601-2_14]Search in Google Scholar
[[46] Y. Pu and J. Grossklags. Towards a model on the factors influencing social app users’ valuation of interdependent privacy. PoPETS, 2015.10.1515/popets-2016-0005]Search in Google Scholar
[[47] Y. Pu and J. Grossklags. Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios. In ICIS. Assoc. for Information Systems, 2015.]Search in Google Scholar
[[48] Y. Pu and J. Grossklags. Valuating friends’ privacy: Does anonymity of sharing personal data matter? In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, 2017.]Search in Google Scholar
[[49] S. Rajtmajer, A. Squicciarini, J. M. Such, J. Semonsen, and A. Belmonte. An ultimatum game model for the evolution of privacy in jointly managed content. In International Conference on Decision and Game Theory for Security, pages 112–130. Springer, 2017.10.1007/978-3-319-68711-7_7]Search in Google Scholar
[[50] K. Raynes-Goldie. Aliases, creeping, and wall cleaning: Understanding privacy in the age of facebook. First Monday, 15(1), 2010.10.5210/fm.v15i1.2775]Search in Google Scholar
[[51] E. M. Redmiles, M. L. Mazurek, and J. P. Dickerson. Poster: Do users make rational security decisions? 2018.]Search in Google Scholar
[[52] C. Riederer, D. Echickson, S. Huang, and A. Chaintreau. Findyou: A personal location privacy auditing tool. In WWW, 2016.10.1145/2872518.2890546]Search in Google Scholar
[[53] J. Ross, L. Irani, M. S. Silberman, A. Zaldivar, and B. Tomlinson. Who are the crowdworkers?: Shifting demographics in mechanical turk. In CHI, 2010.10.1145/1753846.1753873]Search in Google Scholar
[[54] R. Shokri. Privacy games: Optimal user-centric data obfuscation. PoPETS, 2015(2), 2015.10.1515/popets-2015-0024]Search in Google Scholar
[[55] R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec. Protecting location privacy: optimal strategy against localization attacks. In CCS’12: Proc. of the 19th ACM Conf. on Computer and Communications Security, 2012.]Search in Google Scholar
[[56] Y. Shoshitaishvili, C. Kruegel, and G. Vigna. Portrait of a privacy invasion; detecting relationships through large-scale photo analysis. PoPETS, 2015.10.1515/popets-2015-0004]Search in Google Scholar
[[57] J. M. Such and N. Criado. Resolving multi-party privacy conflicts in social media. IEEE KDE, 2016.10.1109/TKDE.2016.2539165]Search in Google Scholar
[[58] J. M. Such, J. Porter, S. Preibusch, and A. Joinson. Photo privacy conflicts in social media: A large-scale empirical study. In Proc. of CHI, 2017.10.1145/3025453.3025668]Search in Google Scholar
[[59] E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical models of privacy in location sharing. In UbiComp, 2010.10.1145/1864349.1864364]Search in Google Scholar
[[60] J. Von Neumann and O. Morgenstern. Theory of games and economic behavior. Princeton university press, 2007.]Search in Google Scholar
[[61] N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux. A Location-Privacy Threat Stemming from the Use of Shared Public IP. IEEE Trans. on Mobile Computing (TMC), 13(11), Nov. 2014.10.1109/TMC.2014.2309953]Search in Google Scholar
[[62] G. Wang, S. Y. Schoenebeck, H. Zheng, and B. Y. Zhao. “will check-in for badges”: Understanding bias and misbehavior on location-based social networks. In ICWSM, 2016.]Search in Google Scholar
[[63] A. F. Westin. Social and political dimensions of privacy. Journal of social issues, 59(2):431–453, 2003.10.1111/1540-4560.00072]Search in Google Scholar
[[64] J. Wiese, P. G. Kelley, L. F. Cranor, L. Dabbish, J. I. Hong, and J. Zimmerman. Are you close with me? are you nearby?: Investigating social groups, closeness, and willingness to share. In UbiComp, 2011.10.1145/2030112.2030140]Search in Google Scholar
[[65] P. Wisniewski, H. Lipford, and D. Wilson. Fighting for my space: Coping mechanisms for sns boundary regulation. In Proc. of SIGCHI. ACM, 2012.10.1145/2207676.2207761]Search in Google Scholar
[[66] Xlstat statistical software for microsoft excel. https://www.xlstat.com/en/, 2016. last visited: Aug. 2016.]Search in Google Scholar
[[67] F. Xu, Z. Tu, Y. Li, P. Zhang, X. Fu, and D. Jin. Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2017.10.1145/3038912.3052620]Search in Google Scholar
[[68] H. Xu. Reframing privacy 2.0 in online social network. U. Pa. J. Const. L., 2011.]Search in Google Scholar
[[69] M. Xue, C. Ballard, K. Liu, C. Nemelka, Y. Wu, K. Ross, and H. Qian. You can yak but you can’t hide: Localizing anonymous social network users. In Proceedings of the 2016 Internet Measurement Conference, pages 25–31. ACM, 2016.10.1145/2987443.2987449]Search in Google Scholar
[[70] M. Xue, Y. Liu, K. W. Ross, and H. Qian. I know where you are: thwarting privacy protection in location-based social discovery services. In IEEE Conference on Computer Communications Workshops, pages 179–184. IEEE, 2015.10.1109/INFCOMW.2015.7179381]Search in Google Scholar
[[71] M. Yang, Y. Yu, A. K. Bandara, and B. Nuseibeh. Adaptive sharing for online social networks: A trade-off between privacy risk and social benefit. In TrustCom, 2014.10.1109/TrustCom.2014.10]Search in Google Scholar
[[72] Y. Zheng, L. Liu, L. Wang, and X. Xie. Learning transportation mode from raw GPS data for geographic applications on the web. In WWW, pages 247–256, 2008.10.1145/1367497.1367532]Search in Google Scholar