Power Law Public Goods Game for Personal Information Sharing in News Comments

06/04/2019
by   Christopher Griffin, et al.
0

We propose a public goods game model of user sharing in an online commenting forum. In particular, we assume that users who share personal information incur an information cost but reap the benefits of a more extensive social interaction. Freeloaders benefit from the same social interaction but do not share personal information. The resulting public goods structure is analyzed both theoretically and empirically. In particular, we show that the proposed game always possesses equilibria and we give sufficient conditions for pure strategy equilibria to emerge. These correspond to users who always behave the same way, either sharing or hiding personal information. We present an empirical analysis of a relevant data set, showing that our model parameters can be fit and that the proposed model has better explanatory power than a corresponding null (linear) model of behavior.

READ FULL TEXT
research
03/24/2021

I Know What You Would Like to Drink: Benefits and Detriments of Sharing Personal Info with a Bartender Robot

This paper introduces benefits and detriments of a robot bartender that ...
research
05/13/2022

A Self-aware Personal Assistant for Making Personalized Privacy Decisions

Many software systems, such as online social networks enable users to sh...
research
03/09/2022

Online User Profiling to Detect Social Bots on Twitter

Social media platforms can expose influential trends in many aspects of ...
research
12/01/2020

Wireless Secret Sharing Game between Two Legitimate Users and an Eavesdropper

Wireless secret sharing is crucial to information security in the era of...
research
07/11/2023

A "Game of Like" : Online Social Network Sharing As Strategic Interaction

We argue that behavioral science models of online content-sharing overlo...
research
10/14/2020

Power in Liquid Democracy

The paper develops a theory of power for delegable proxy voting systems....
research
02/27/2023

Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis

Social Engineering has emerged as a significant threat in cyber security...

Please sign up or login with your details

Forgot password? Click here to reset