ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership

被引:1
|
作者
Wu, Hongchen [1 ]
Wang, Xinjun [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
来源
PLOS ONE | 2016年 / 11卷 / 03期
关键词
ONLINE SOCIAL NETWORKS; PRIVACY; TRUSTWORTHINESS; SATISFACTION; INTENTION; FRIENDS;
D O I
10.1371/journal.pone.0151002
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users' sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users' decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens' sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants' partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness.
引用
收藏
页数:21
相关论文
共 38 条
  • [1] Privacy Coping and Information-Sharing Behaviors in Social Media: A Comparison of Chinese and US Users
    Nemati, Hamid
    Wall, Jeffrey D.
    Chow, Anthony
    [J]. JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT, 2014, 17 (04) : 228 - 249
  • [2] Security Automation and Threat Information-Sharing Options
    Kampanakis, Panos
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (05) : 42 - 51
  • [3] Security screening metrics for information-sharing partnerships
    Yu, Wendy
    Collier, Zachary A.
    Thekdi, Shital
    [J]. RISK ANALYSIS, 2024, 44 (07) : 1560 - 1572
  • [4] ASM and Iron and Steel Society form information-sharing partnership
    不详
    [J]. ADVANCED MATERIALS & PROCESSES, 1997, 151 (03): : 45 - 45
  • [5] Road Information-Sharing System for Bicycle Users using Smartphones
    Iwasaki, Jun
    Yamamoto, Akira
    Kaneda, Shigeo
    [J]. 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 674 - 678
  • [6] Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
    Wu, Yong
    Xu, Mengyao
    Cheng, Dong
    Dai, Tao
    [J]. DECISION ANALYSIS, 2022, 19 (02) : 99 - 122
  • [7] Information-Sharing Behaviors Among Sports Fans Using #Hashtags
    Kim, Han Soo
    Cho, Kwang Min
    Kim, Minjung
    [J]. COMMUNICATION & SPORT, 2021, 9 (04) : 646 - 669
  • [8] Modeling information-sharing behaviors in BitTorrent system based on real measurement
    Jia, Jinkang
    Chen, Changjia
    [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2006, 4093 : 934 - 946
  • [9] Optimal Information-Sharing Behaviors among Hotels: Game-Theoretical Approach
    Kim, Sungsoo
    Slutsky, Steven M.
    Thapa, Brijesh
    [J]. JOURNAL OF HOSPITALITY & TOURISM RESEARCH, 2021, 45 (02) : 283 - 303
  • [10] E-security issues and policy development in an information-sharing and networked environment
    Smith, AD
    [J]. ASLIB PROCEEDINGS, 2004, 56 (05): : 272 - 285