A. Acquisti, Privacy in electronic commerce and the economics of immediate gratification, Proceedings of the 5th ACM conference on Electronic commerce, pp.21-29, 2004.

A. Acquisti, Nudging privacy: The behavioral economics of personal information, 2009.

A. Acquisti and J. Grossklags, Privacy Attitudes and Privacy Behavior, 2004.

A. Acquisti and J. Grossklags, Privacy and rationality in individual decision making, IEEE Security Privacy, vol.3, issue.1, 2005.

M. Backes, M. Humbert, J. Pang, and Y. Zhang, Inferring social links from mobility profiles, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, vol.2, pp.1943-1957, 2017.

L. Backstrom, E. Sun, and C. Marlow, Find me if you can: improving geographical prediction with social and spatial proximity, 2010.

F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida, Characterizing user behavior in online social networks, IMC, 2009.

P. Berrang, M. Humbert, Y. Zhang, I. Lehmann, R. Eils et al., Dissecting privacy risks in biomedical data, Proceedings of the 3rd IEEE European Symposium on Security and Privacy, 2018.

A. Besmer and H. Richter-lipford, Moving beyond untagging: photo privacy in a tagged world, Proc. of SIGCHI, 2010.

G. Biczók and P. H. Chia, Interdependent Privacy: Let Me Share Your Data, FC, 2013.

I. Bilogrevic, K. Huguenin, B. A??r, M. Jadliwala, M. Gazaki et al., A Machine-Learning Based Approach to Privacy-Aware Information-Sharing in Mobile Social Networks, Pervasive and Mobile Computing (PMC), 2015.
URL : https://hal.archives-ouvertes.fr/hal-01108962

A. Chaabane, G. Acs, and M. Kaafar, You are what you like! information leakage through users' interests, NDSS, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00748162

J. Chen, J. W. Ping, Y. C. Xu, and B. C. Tan, Information privacy concern about peer disclosure in online social networks, IEEE Transactions on Engineering Management, vol.62, issue.3, pp.311-324, 2015.

H. Cho and A. Filippova, Networked privacy management in Facebook: A mixed-methods and multinational study, Proc. of CSCW, 2016.

D. Crandall, L. Backstrom, D. Cosley, S. Suri, D. Huttenlocher et al., Inferring social ties from geographic coincidences, Proc. of PNAS, p.107, 2010.

R. Dey, C. Tang, K. Ross, and N. Saxena, Estimating age privacy leakage in online social networks, INFOCOM, 2012.

R. L. Fogues, P. K. Murukannaiah, J. M. Such, and M. P. Singh, Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making, ACM Transactions on Computer-Human Interaction (TOCHI), vol.24, issue.1, p.5, 2017.

D. Fudenberg and J. Tirole, Game theory, 1991.

L. González-manzano, A. I. González-tablas, J. M. De-fuentes, and A. Ribagorda, Cooped: Co-owned personal data management, Computers & Security, vol.47, 2014.

P. E. Green and V. Srinivasan, Conjoint Analysis in Consumer Research: Issues and Outlook, Journal of Consumer Research, vol.5, issue.2, 1978.

B. Henne, C. Szongott, and M. Smith, Snapme if you can: Privacy threats of other peoples' geo-tagged media and what we can do about it, 2013.

M. Humbert, E. Ayday, J. Hubaux, and A. Telenti, Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy, CCS'13: Proc. of the 20th ACM Conf. on Computer and Communications Security, 2013.

M. Humbert, E. Ayday, J. Hubaux, and A. Telenti, On non-cooperative genomic privacy, FC, 2015.
DOI : 10.1007/978-3-662-47854-7_24

URL : http://repository.bilkent.edu.tr/bitstream/11693/28396/1/On%20non-cooperative%20genomic%20privacy.pdf

P. Ilia, I. Polakis, E. Athanasopoulos, F. Maggi, and S. Ioannidis, Face/Off: Preventing Privacy Leakage From Photos in Social Networks, CCS, 2015.

H. Jia and H. Xu, Autonomous and interdependent: Collaborative privacy management on social networking sites, Proc. of CHI, 2016.
DOI : 10.1145/2858036.2858415

S. Kokolakis, Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon, Computers Security, 2015.

D. Koller and N. Friedman, Probabilistic graphical models: principles and techniques, 2009.

D. Koller and B. Milch, Multi-agent influence diagrams for representing and solving games, Games and economic behavior, vol.45, issue.1, 2003.
DOI : 10.1016/s0899-8256(02)00544-4

URL : http://ai.stanford.edu/~koller/Papers/Koller+Milch:IJCAI01.pdf

H. Krasnova, S. Spiekermann, K. Koroleva, and T. Hildebrand, Online social networks: Why we disclose, Journal of information technology, vol.25, issue.2, 2010.
DOI : 10.1057/jit.2010.6

J. Krumm, A survey of computational location privacy. Personal and Ubiquitous Computing, vol.13, 2009.
DOI : 10.1007/s00779-008-0212-5

A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen, We're in it together: interpersonal management of disclosure in social network services, Proc. of CHI, 2011.

A. Laszka, M. Felegyhazi, and L. Buttyan, A survey of interdependent information security games, 2015.
DOI : 10.1145/2635673

URL : http://www.hit.bme.hu/~buttyan/publications/LaszkaFB14acmcsur.pdf

R. S. Laufer, H. M. Proshansky, and M. Wolfe, Some analytic dimensions of privacy, Proceedings of the Lund Conference on Architectural Psychology, 1973.

R. S. Laufer and M. Wolfe, Privacy as a concept and a social issue: A multidimensional developmental theory, Journal of social Issues, vol.33, issue.3, pp.22-42, 1977.
DOI : 10.1111/j.1540-4560.1977.tb01880.x

M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu et al., All your location are belong to us: Breaking mobile social networks for automated user location tracking, MobiHoc, 2014.
DOI : 10.1145/2632951.2632953

D. Meier, Y. A. Oswald, S. Schmid, and R. Wattenhofer, On the Windfall of Friendship: Inoculation Strategies on Social Networks, EC, 2008.

A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, You are who you know: Inferring user profiles in online social networks, WSDM, 2010.

G. Misra and J. M. Such, Pacman: Personal agent for access control in social media, IEEE Internet Computing, vol.21, issue.6, pp.18-26, 2017.

R. B. Myerson, Game theory, 2013.

A. Noulas, M. Musolesi, M. Pontil, and C. Mascolo, Inferring interests from mobility and social interactions, Proc. of NIPS Workshops, 2009.

A. Olteanu, K. Huguenin, R. Shokri, M. Humbert, and J. Hubaux, Quantifying interdependent privacy risks with location data, In IEEE Trans. Mobile Comput, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01266229

Z. D. Ozdemir, H. J. Smith, and J. H. Benamati, Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study, European Journal of Information Systems, vol.26, issue.6, pp.642-660, 2017.

X. Page, B. P. Knijnenburg, and A. Kobsa, FYI: Communication Style Preferences Underlie Differences in Locationsharing Adoption and Usage, UbiComp, 2013.

I. Polakis, G. Argyros, T. Petsios, S. Sivakorn, and A. D. Keromytis, Where's wally?: Precise user discovery attacks in location proximity services, CCS, pp.817-828, 2015.

Y. Pu and J. Grossklags, An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences, GameSec, 2014.

Y. Pu and J. Grossklags, Towards a model on the factors influencing social app users' valuation of interdependent privacy, 2015.

Y. Pu and J. Grossklags, Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios, ICIS. Assoc. for Information Systems, 2015.

Y. Pu and J. Grossklags, Valuating friends' privacy: Does anonymity of sharing personal data matter?, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, 2017.

S. Rajtmajer, A. Squicciarini, J. M. Such, J. Semonsen, and A. Belmonte, An ultimatum game model for the evolution of privacy in jointly managed content, International Conference on Decision and Game Theory for Security, pp.112-130, 2017.

K. Raynes-goldie, Aliases, creeping, and wall cleaning: Understanding privacy in the age of facebook, First Monday, vol.15, issue.1, 2010.

E. M. Redmiles, M. L. Mazurek, and J. P. Dickerson, Poster: Do users make rational security decisions?, 2018.

C. Riederer, D. Echickson, S. Huang, and A. Chaintreau, Findyou: A personal location privacy auditing tool, 2016.

J. Ross, L. Irani, M. S. Silberman, A. Zaldivar, and B. Tomlinson, Who are the crowdworkers?: Shifting demographics in mechanical turk, CHI, 2010.

R. Shokri, Privacy games: Optimal user-centric data obfuscation, PoPETS, issue.2, 2015.

R. Shokri, G. Theodorakopoulos, C. Troncoso, J. Hubaux, and J. Boudec, Protecting location privacy: optimal strategy against localization attacks, CCS'12: Proc. of the 19th ACM Conf. on Computer and Communications Security, 2012.

Y. Shoshitaishvili, C. Kruegel, and G. Vigna, Portrait of a privacy invasion; detecting relationships through large-scale photo analysis, 2015.

J. M. Such and N. Criado, Resolving multi-party privacy conflicts in social media, IEEE KDE, 2016.

J. M. Such, J. Porter, S. Preibusch, and A. Joinson, Photo privacy conflicts in social media: A large-scale empirical study, Proc. of CHI, 2017.

E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley et al., Empirical models of privacy in location sharing, UbiComp, 2010.

J. , V. Neumann, and O. Morgenstern, Theory of games and economic behavior, 2007.

N. Vratonjic, K. Huguenin, V. Bindschaedler, and J. Hubaux, A Location-Privacy Threat Stemming from the Use of Shared Public IP, IEEE Trans. on Mobile Computing (TMC), vol.13, issue.11, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00954306

G. Wang, S. Y. Schoenebeck, H. Zheng, and B. Y. Zhao, will check-in for badges": Understanding bias and misbehavior on location-based social networks, ICWSM, 2016.

A. F. Westin, Social and political dimensions of privacy, Journal of social issues, vol.59, issue.2, pp.431-453, 2003.

J. Wiese, P. G. Kelley, L. F. Cranor, L. Dabbish, J. I. Hong et al., Are you close with me? are you nearby?: Investigating social groups, closeness, and willingness to share, UbiComp, 2011.

P. Wisniewski, H. Lipford, and D. Wilson, Fighting for my space: Coping mechanisms for sns boundary regulation, Proc. of SIGCHI, 2012.

, Xlstat statistical software for microsoft excel, 2016.

F. Xu, Z. Tu, Y. Li, P. Zhang, X. Fu et al., Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data, Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2017.

H. Xu, Reframing privacy 2.0 in online social network, Pa. J. Const. L, 2011.

M. Xue, C. Ballard, K. Liu, C. Nemelka, Y. Wu et al., You can yak but you can't hide: Localizing anonymous social network users, Proceedings of the 2016 Internet Measurement Conference, pp.25-31, 2016.
DOI : 10.1145/2987443.2987449

M. Xue, Y. Liu, K. W. Ross, and H. Qian, I know where you are: thwarting privacy protection in location-based social discovery services, IEEE Conference on Computer Communications Workshops, pp.179-184, 2015.

M. Yang, Y. Yu, A. K. Bandara, and B. Nuseibeh, Adaptive sharing for online social networks: A trade-off between privacy risk and social benefit, 2014.

Y. Zheng, L. Liu, L. Wang, and X. Xie, Learning transportation mode from raw GPS data for geographic applications on the web, WWW, pp.247-256, 2008.