1. bookVolume 2019 (2019): Issue 2 (April 2019)
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year
access type Open Access

The (Co-)Location Sharing Game

Published Online: 04 May 2019
Page range: 5 - 25
Received: 31 Aug 2018
Accepted: 16 Dec 2018
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year

Most popular location-based social networks, such as Facebook and Foursquare, let their (mobile) users post location and co-location (involving other users) information. Such posts bring social benefits to the users who post them but also to their friends who view them. Yet, they also represent a severe threat to the users’ privacy, as co-location information introduces interdependences between users. We propose the first game-theoretic framework for analyzing the strategic behaviors, in terms of information sharing, of users of OSNs. To design parametric utility functions that are representative of the users’ actual preferences, we also conduct a survey of 250 Facebook users and use conjoint analysis to quantify the users’ benefits o f sharing vs. viewing (co)-location information and their preference for privacy vs. benefits. Our survey findings expose the fact that, among the users, there is a large variation, in terms of these preferences. We extensively evaluate our framework through data-driven numerical simulations. We study how users’ individual preferences influence each other’s decisions, we identify several factors that significantly affect these decisions (among which, the mobility data of the users), and we determine situations where dangerous patterns can emerge (e.g., a vicious circle of sharing, or an incentive to over-share) – even when the users share similar preferences.


[1] A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on Electronic commerce, pages 21–29. ACM, 2004.10.1145/988772.988777Search in Google Scholar

[2] A. Acquisti. Nudging privacy: The behavioral economics of personal information. IEEE Security Privacy, 2009.10.1109/MSP.2009.163Search in Google Scholar

[3] A. Acquisti and J. Grossklags. Privacy Attitudes and Privacy Behavior. 2004.Search in Google Scholar

[4] A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. IEEE Security Privacy, 3(1), 2005.10.1109/MSP.2005.22Search in Google Scholar

[5] M. Backes, M. Humbert, J. Pang, and Y. Zhang. walk2friends: Inferring social links from mobility profiles. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 1943–1957. ACM, 2017.10.1145/3133956.3133972Search in Google Scholar

[6] L. Backstrom, E. Sun, and C. Marlow. Find me if you can: improving geographical prediction with social and spatial proximity. In WWW, 2010.10.1145/1772690.1772698Search in Google Scholar

[7] F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social networks. In IMC, 2009.10.1145/1644893.1644900Search in Google Scholar

[8] P. Berrang, M. Humbert, Y. Zhang, I. Lehmann, R. Eils, and M. Backes. Dissecting privacy risks in biomedical data. In Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P). IEEE, 2018.10.1109/EuroSP.2018.00013Search in Google Scholar

[9] A. Besmer and H. Richter Lipford. Moving beyond untagging: photo privacy in a tagged world. In Proc. of SIGCHI. ACM, 2010.10.1145/1753326.1753560Search in Google Scholar

[10] G. Biczók and P. H. Chia. Interdependent Privacy: Let Me Share Your Data. In FC, 2013.10.1007/978-3-642-39884-1_29Search in Google Scholar

[11] I. Bilogrevic, K. Huguenin, B. Ağır, M. Jadliwala, M. Gazaki, and J.-P. Hubaux. A Machine-Learning Based Approach to Privacy-Aware Information-Sharing in Mobile Social Networks. Pervasive and Mobile Computing (PMC), Nov. 2015.10.1016/j.pmcj.2015.01.006Search in Google Scholar

[12] A. Chaabane, G. Acs, and M. Kaafar. You are what you like# information leakage through users’ interests. In NDSS, 2012.Search in Google Scholar

[13] J. Chen, J. W. Ping, Y. C. Xu, and B. C. Tan. Information privacy concern about peer disclosure in online social networks. IEEE Transactions on Engineering Management, 62(3):311–324, 2015.10.1109/TEM.2015.2432117Search in Google Scholar

[14] H. Cho and A. Filippova. Networked privacy management in Facebook: A mixed-methods and multinational study. In Proc. of CSCW. ACM, 2016.10.1145/2818048.2819996Search in Google Scholar

[15] D. Crandall, L. Backstrom, D. Cosley, S. Suri, D. Huttenlocher, and J. Kleinberg. Inferring social ties from geographic coincidences. Proc. of PNAS, 107, 2010.10.1073/pnas.1006155107Search in Google Scholar

[16] R. Dey, C. Tang, K. Ross, and N. Saxena. Estimating age privacy leakage in online social networks. In INFOCOM, 2012.10.1109/INFCOM.2012.6195711Search in Google Scholar

[17] R. L. Fogues, P. K. Murukannaiah, J. M. Such, and M. P. Singh. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI), 24(1):5, 2017.Search in Google Scholar

[18] D. Fudenberg and J. Tirole. Game theory. MIT press, 1991.Search in Google Scholar

[19] L. González-Manzano, A. I. González-Tablas, J. M. de Fuentes, and A. Ribagorda. Cooped: Co-owned personal data management. Computers & Security, 47, 2014.10.1016/j.cose.2014.06.003Search in Google Scholar

[20] P. E. Green and V. Srinivasan. Conjoint Analysis in Consumer Research: Issues and Outlook. Journal of Consumer Research, 5(2), 1978.10.1086/208721Search in Google Scholar

[21] B. Henne, C. Szongott, and M. Smith. Snapme if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In WiSec, 2013.10.1145/2462096.2462113Search in Google Scholar

[22] M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti. Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy. In CCS’13: Proc. of the 20th ACM Conf. on Computer and Communications Security, 2013.Search in Google Scholar

[23] M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti. On non-cooperative genomic privacy. In FC, 2015.10.1007/978-3-662-47854-7_24Search in Google Scholar

[24] P. Ilia, I. Polakis, E. Athanasopoulos, F. Maggi, and S. Ioannidis. Face/Off: Preventing Privacy Leakage From Photos in Social Networks. In CCS, 2015.10.1145/2810103.2813603Search in Google Scholar

[25] H. Jia and H. Xu. Autonomous and interdependent: Collaborative privacy management on social networking sites. In Proc. of CHI. ACM, 2016.10.1145/2858036.2858415Search in Google Scholar

[26] S. Kokolakis. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers Security, 2015.Search in Google Scholar

[27] D. Koller and N. Friedman. Probabilistic graphical models: principles and techniques. 2009.Search in Google Scholar

[28] D. Koller and B. Milch. Multi-agent influence diagrams for representing and solving games. Games and economic behavior, 45(1), 2003.10.1016/S0899-8256(02)00544-4Search in Google Scholar

[29] H. Krasnova, S. Spiekermann, K. Koroleva, and T. Hildebrand. Online social networks: Why we disclose. Journal of information technology, 25(2), 2010.10.1057/jit.2010.6Search in Google Scholar

[30] J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6), 2009.10.1007/s00779-008-0212-5Search in Google Scholar

[31] A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen. We’re in it together: interpersonal management of disclosure in social network services. In Proc. of CHI, 2011.10.1145/1978942.1979420Search in Google Scholar

[32] A. Laszka, M. Felegyhazi, and L. Buttyan. A survey of interdependent information security games. ACM Computing Surveys, 2015.10.1145/2635673Search in Google Scholar

[33] R. S. Laufer, H. M. Proshansky, and M. Wolfe. Some analytic dimensions of privacy. In Proceedings of the Lund Conference on Architectural Psychology. Lund, Sweden, 1973.Search in Google Scholar

[34] R. S. Laufer and M. Wolfe. Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues, 33(3):22–42, 1977.Search in Google Scholar

[35] M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu, S. Hu, and K. Ren. All your location are belong to us: Breaking mobile social networks for automated user location tracking. In MobiHoc, 2014.10.1145/2632951.2632953Search in Google Scholar

[36] D. Meier, Y. A. Oswald, S. Schmid, and R. Wattenhofer. On the Windfall of Friendship: Inoculation Strategies on Social Networks. In EC, 2008.10.1145/1386790.1386836Search in Google Scholar

[37] A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in online social networks. In WSDM, 2010.10.1145/1718487.1718519Search in Google Scholar

[38] G. Misra and J. M. Such. Pacman: Personal agent for access control in social media. IEEE Internet Computing, 21(6):18–26, 2017.Search in Google Scholar

[39] R. B. Myerson. Game theory. Harvard university press, 2013.10.2307/j.ctvjsf522Search in Google Scholar

[40] A. Noulas, M. Musolesi, M. Pontil, and C. Mascolo. Inferring interests from mobility and social interactions. In Proc. of NIPS Workshops, 2009.Search in Google Scholar

[41] A.-M. Olteanu, K. Huguenin, R. Shokri, M. Humbert, and J.-P. Hubaux. Quantifying interdependent privacy risks with location data. In IEEE Trans. Mobile Comput., 2016.10.1109/TMC.2016.2561281Search in Google Scholar

[42] Z. D. Ozdemir, H. J. Smith, and J. H. Benamati. Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems, 26(6):642–660, 2017.Search in Google Scholar

[43] X. Page, B. P. Knijnenburg, and A. Kobsa. FYI: Communication Style Preferences Underlie Differences in Location-sharing Adoption and Usage. In UbiComp, 2013.10.1145/2493432.2493487Search in Google Scholar

[44] I. Polakis, G. Argyros, T. Petsios, S. Sivakorn, and A. D. Keromytis. Where’s wally?: Precise user discovery attacks in location proximity services. In CCS, pages 817–828, 2015.10.1145/2810103.2813605Search in Google Scholar

[45] Y. Pu and J. Grossklags. An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences. In GameSec, 2014.10.1007/978-3-319-12601-2_14Search in Google Scholar

[46] Y. Pu and J. Grossklags. Towards a model on the factors influencing social app users’ valuation of interdependent privacy. PoPETS, 2015.10.1515/popets-2016-0005Search in Google Scholar

[47] Y. Pu and J. Grossklags. Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios. In ICIS. Assoc. for Information Systems, 2015.Search in Google Scholar

[48] Y. Pu and J. Grossklags. Valuating friends’ privacy: Does anonymity of sharing personal data matter? In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, 2017.Search in Google Scholar

[49] S. Rajtmajer, A. Squicciarini, J. M. Such, J. Semonsen, and A. Belmonte. An ultimatum game model for the evolution of privacy in jointly managed content. In International Conference on Decision and Game Theory for Security, pages 112–130. Springer, 2017.10.1007/978-3-319-68711-7_7Search in Google Scholar

[50] K. Raynes-Goldie. Aliases, creeping, and wall cleaning: Understanding privacy in the age of facebook. First Monday, 15(1), 2010.10.5210/fm.v15i1.2775Search in Google Scholar

[51] E. M. Redmiles, M. L. Mazurek, and J. P. Dickerson. Poster: Do users make rational security decisions? 2018.Search in Google Scholar

[52] C. Riederer, D. Echickson, S. Huang, and A. Chaintreau. Findyou: A personal location privacy auditing tool. In WWW, 2016.10.1145/2872518.2890546Search in Google Scholar

[53] J. Ross, L. Irani, M. S. Silberman, A. Zaldivar, and B. Tomlinson. Who are the crowdworkers?: Shifting demographics in mechanical turk. In CHI, 2010.10.1145/1753846.1753873Search in Google Scholar

[54] R. Shokri. Privacy games: Optimal user-centric data obfuscation. PoPETS, 2015(2), 2015.10.1515/popets-2015-0024Search in Google Scholar

[55] R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec. Protecting location privacy: optimal strategy against localization attacks. In CCS’12: Proc. of the 19th ACM Conf. on Computer and Communications Security, 2012.Search in Google Scholar

[56] Y. Shoshitaishvili, C. Kruegel, and G. Vigna. Portrait of a privacy invasion; detecting relationships through large-scale photo analysis. PoPETS, 2015.10.1515/popets-2015-0004Search in Google Scholar

[57] J. M. Such and N. Criado. Resolving multi-party privacy conflicts in social media. IEEE KDE, 2016.10.1109/TKDE.2016.2539165Search in Google Scholar

[58] J. M. Such, J. Porter, S. Preibusch, and A. Joinson. Photo privacy conflicts in social media: A large-scale empirical study. In Proc. of CHI, 2017.10.1145/3025453.3025668Search in Google Scholar

[59] E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical models of privacy in location sharing. In UbiComp, 2010.10.1145/1864349.1864364Search in Google Scholar

[60] J. Von Neumann and O. Morgenstern. Theory of games and economic behavior. Princeton university press, 2007.Search in Google Scholar

[61] N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux. A Location-Privacy Threat Stemming from the Use of Shared Public IP. IEEE Trans. on Mobile Computing (TMC), 13(11), Nov. 2014.10.1109/TMC.2014.2309953Search in Google Scholar

[62] G. Wang, S. Y. Schoenebeck, H. Zheng, and B. Y. Zhao. “will check-in for badges”: Understanding bias and misbehavior on location-based social networks. In ICWSM, 2016.Search in Google Scholar

[63] A. F. Westin. Social and political dimensions of privacy. Journal of social issues, 59(2):431–453, 2003.10.1111/1540-4560.00072Search in Google Scholar

[64] J. Wiese, P. G. Kelley, L. F. Cranor, L. Dabbish, J. I. Hong, and J. Zimmerman. Are you close with me? are you nearby?: Investigating social groups, closeness, and willingness to share. In UbiComp, 2011.10.1145/2030112.2030140Search in Google Scholar

[65] P. Wisniewski, H. Lipford, and D. Wilson. Fighting for my space: Coping mechanisms for sns boundary regulation. In Proc. of SIGCHI. ACM, 2012.10.1145/2207676.2207761Search in Google Scholar

[66] Xlstat statistical software for microsoft excel. https://www.xlstat.com/en/, 2016. last visited: Aug. 2016.Search in Google Scholar

[67] F. Xu, Z. Tu, Y. Li, P. Zhang, X. Fu, and D. Jin. Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2017.10.1145/3038912.3052620Search in Google Scholar

[68] H. Xu. Reframing privacy 2.0 in online social network. U. Pa. J. Const. L., 2011.Search in Google Scholar

[69] M. Xue, C. Ballard, K. Liu, C. Nemelka, Y. Wu, K. Ross, and H. Qian. You can yak but you can’t hide: Localizing anonymous social network users. In Proceedings of the 2016 Internet Measurement Conference, pages 25–31. ACM, 2016.10.1145/2987443.2987449Search in Google Scholar

[70] M. Xue, Y. Liu, K. W. Ross, and H. Qian. I know where you are: thwarting privacy protection in location-based social discovery services. In IEEE Conference on Computer Communications Workshops, pages 179–184. IEEE, 2015.10.1109/INFCOMW.2015.7179381Search in Google Scholar

[71] M. Yang, Y. Yu, A. K. Bandara, and B. Nuseibeh. Adaptive sharing for online social networks: A trade-off between privacy risk and social benefit. In TrustCom, 2014.10.1109/TrustCom.2014.10Search in Google Scholar

[72] Y. Zheng, L. Liu, L. Wang, and X. Xie. Learning transportation mode from raw GPS data for geographic applications on the web. In WWW, pages 247–256, 2008.10.1145/1367497.1367532Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo