2013
DOI: 10.1007/978-3-642-39884-1_29
|View full text |Cite
|
Sign up to set email alerts
|

Interdependent Privacy: Let Me Share Your Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
68
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 60 publications
(69 citation statements)
references
References 13 publications
1
68
0
Order By: Relevance
“…Similarly, Huber et al developed an automatic evaluation tool, AppInspect (Huber et al, 2013), and demonstrated security and privacy leakages of a large set of Facebook Apps. Furthermore, Biczók and Chia (Biczók and Chia, 2013) described the issue of users' information leaked through their friends via Apps on Facebook. This work introduced a game theoretic approach to simulate an interdependent privacy scenario of two users and one App game.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Similarly, Huber et al developed an automatic evaluation tool, AppInspect (Huber et al, 2013), and demonstrated security and privacy leakages of a large set of Facebook Apps. Furthermore, Biczók and Chia (Biczók and Chia, 2013) described the issue of users' information leaked through their friends via Apps on Facebook. This work introduced a game theoretic approach to simulate an interdependent privacy scenario of two users and one App game.…”
Section: Related Workmentioning
confidence: 99%
“…This work introduced a game theoretic approach to simulate an interdependent privacy scenario of two users and one App game. Extending the work of Biczók and Chia (Biczók and Chia, 2013) Pu and Grossklags (Pu and Grossklags, 2014) proposed a formula to estimate the payoffs. Finally, Frank et al (Frank et al, 2012) showed the existence of malicious Apps that deviate from the generic permissions pattern acquiring more information from the users, while Chia et al (Chia et al, 2012) showed that certain Apps collect more information than necessary.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, the user's profile items can be arbitrarily retrieved by an appP without automatic notification or on-demand approval by the user through friends. Since the privacy of an individual user is affected by the decisions of other users (being partly out of their control), this phenomenon is referred to as privacy interdependence [6]. From an economic point of view, sharing a user's information without her direct consent can lead to the emergence of externalities.…”
Section: Introductionmentioning
confidence: 99%
“…While sharing someone else's information may yield benefits for her (positive externality, e.g., personalized experience in social apps), it is also almost certain to cause a decrease in her utility (negative externality, e.g., exposed profile items). Existing research is limited to pointing out the existence of and risks stemming from such negative externalities in the Facebook app ecosystem [6], and its potential impact on app adoption [16,17].…”
Section: Introductionmentioning
confidence: 99%