Personal Data Value Realization and Symmetry Enhancement Under Social Service Orientation: A Tripartite Evolutionary Game Approach
Abstract
1. Introduction
2. Literature Review
2.1. Personal Data Valuation
2.2. Application of Evolutionary Game Theory
3. Model Construction
3.1. Problem Description
3.2. Model Assumptions
3.3. Payoff Matrix
4. Evolutionary Game Equilibrium Analysis
4.1. Expected Payoff Function Construction
4.2. Stability Analysis
5. Simulation Analysis
5.1. The Initial Willingness and Its Impact on the Strategy Evolution of the Three Parties
5.1.1. The Impact of Initial Willingness on the Evolution of Three Parties
5.1.2. The Impact of Initial Willingness on the Evolution of Individual Strategies
5.1.3. The Impact of Initial Willingness on the Evolution of Data User Strategies
5.1.4. The Impact of Initial Intention on the Evolution of Government Policies
5.2. The Impact of Data Service Revenue and Authorization Management Costs on Individuals
5.3. The Impact of Data Abuse Profits and Violation Penalties on Data Users
5.4. The Impact of Social Benefits and Regulatory Costs on the Government
6. Conclusions
6.1. Summary and Conclusions
- In the game process, an individual’s choice to participate is the fundamental driving force behind the formation of the optimal evolutionary path. Once an individual’s initial willingness to participate is low, the choices of data users and the government will inevitably be (illegal use, low investment in regulation). Only when individuals choose to participate can the personal data value chain be sustained. At the same time, equilibrium point analysis confirms the “privacy paradox” phenomenon; when individuals perceive that the social environment is unable to protect their data rights and interests, they will still choose to participate in order to gain certain benefits to offset the losses from personal data leakage.
- For individuals, the main factors influencing their strategic behavior are the benefits of data services, participation costs, and the risks of privacy leakage. As the benefits of data services increase, individuals are more likely to participate. However, when participation costs and privacy leakage risks rise, individuals tend to choose “non-participation”. The trust benefits that data users bring through compliance are secondary factors influencing individuals’ strategic choices. This is likely because, compared to explicit benefits like data service rewards, the implicit trust benefits have less appeal for individuals.
- For data users, the economic benefits derived from utilizing personal data, the additional costs of compliant use, the profits from data abuse, and the fines for non-compliance are the key factors affecting their strategy choices. Data users are driven to develop data services to maximize economic benefits, and the greater the potential profits, the stronger their motivation to provide personal data services. Nevertheless, when the costs of compliant use are excessively high, data users may be tempted to use data non-compliantly due to speculative psychology. At this point, increasing the penalties for data abuse can encourage them to revert to compliant use.
- For the government, the primary factors influencing its strategy choices are social benefits and the additional costs of high regulatory investment. Achieving greater social benefits is not only the government’s ultimate goal, but it also enhances the expectations and positivity of individuals and data users regarding future gains, thereby boosting their enthusiasm. However, the higher the government’s regulatory costs, the lower its willingness to continue investing such high costs. The government needs to dynamically balance the regulatory costs with the social benefits achieved.
6.2. Policy Recommendations
6.3. Limitations and Further Research
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A
Parameter | Meaning |
---|---|
The probability of an individual choosing to participate, | |
The service benefits an individual gains when choosing to participate, | |
The time and effort costs of managing data when an individual chooses to participate, | |
The probability of personal privacy leakage when data users choose to use data in compliance, | |
The probability of personal privacy leakage when data users choose to use data in violation, | |
The losses caused to individuals by privacy leakage during personal data circulation and use, | |
The trust benefits brought to individuals when data users use data in compliance, | |
The probability of data users choosing to use data in compliance, | |
The total economic benefits data users gain from participating in personal data development and utilization, | |
The improper benefits data users gain from overusing personal data, | |
The total costs data users incur when choosing to use data in compliance, | |
The total costs data users incur when choosing to use data in violation, | |
The probability of data users’ non-compliant use being detected, | |
The probability of data users’ non-compliant use being detected, | |
The fine paid to the government when a data user’s non-compliant use is detected | |
The probability of the government choosing high-input regulation, | |
The total social benefits the government gains under a high-input regulation strategy when individuals choose to participate, | |
The total social benefits the government gains under a low-input regulation strategy when individuals choose to participate, | |
The regulatory costs incurred when the government chooses high-input regulation, | |
The regulatory costs incurred when the government chooses low-input regulation, |
References
- Art. 4(1) GDPR—Conditions for Consent|General Data Protection Regulation (GDPR). 2018 General Data Protection Regulation (GDPR). Available online: https://gdpr-info.eu/art-4-gdpr/ (accessed on 2 May 2025).
- Ojasalo, J.; Miskeljin, P. Proposing a preliminary concept for a personal data ecosystem. In INTED2020 Proceedings; IATED: Valencia, Spain, 2020; pp. 7451–7459. [Google Scholar]
- Kim, G.; Yoon, S. Should Personal Data Always Be Protected?: Comparison of Personal Data Utilization Policies in Foreign Countries. J. Korean Assoc. Reg. Inf. Soc. 2015, 18, 65–93. [Google Scholar]
- Choi, W.; Chun, J.W.; Lee, S.J.; Chang, S.H.; Kim, D.J.; Choi, I.Y. Development of a Mydata Platform Based on the Personal Health Record Data Sharing System in Korea. Appl. Sci. 2021, 11, 8208. [Google Scholar] [CrossRef]
- Evans, B.J. Barbarians at the Gate: Consumer-Driven Health Data Commons and the Transformation of Citizen Science. Am. J. Law Med. 2016, 42, 651–685. [Google Scholar] [CrossRef]
- Hummel, P.; Braun, M.; Dabrock, P. Own Data? Ethical Reflections on Data Ownership. Philos. Technol. 2021, 34, 545–572. [Google Scholar] [CrossRef]
- Yoon, D.; Moon, S.; Park, K.; Noh, S. Blockchain-Based Personal Data Trading System Using Decentralized Identifiers and Verifiable Credentials. In Proceedings of the 2021 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 20–22 October 2021; pp. 150–154. [Google Scholar]
- Zhu, R.; Wang, M.; Zhang, X.; Peng, X. Investigation of Personal Data Protection Mechanism Based on Blockchain Technology. Sci. Rep. 2023, 13, 21918. [Google Scholar] [CrossRef]
- Xu, L.; Liu, C. Problems and Countermeasures of Sensitive Personal Information Protection. Inf. Stud. Appl. 2022, 45, 42–49+41. [Google Scholar]
- Sun, T.; Yuan, Z.; Li, C.; Zhang, K.; Xu, J. The Value of Personal Data in Internet Commerce: A High-Stakes Field Experiment on Data Regulation Policy. Manag. Sci. 2024, 70, 2645–2660. [Google Scholar] [CrossRef]
- Shen, Y.; Guo, B.; Shen, Y.; Duan, X.; Dong, X.; Zhang, H. A Pricing Model for Big Personal Data. Tsinghua Sci. Technol. 2016, 21, 482–490. [Google Scholar] [CrossRef]
- Cinnamon, J. Social Injustice in Surveillance Capitalism. Surveill. Soc. 2017, 15, 609–625. [Google Scholar] [CrossRef]
- Janeček, V.; Malgieri, G. Commerce in Data and the Dynamically Limited Alienability Rule. Ger. Law J. 2020, 21, 924–943. [Google Scholar] [CrossRef]
- Vandercruysse, L.; D’Hauwers, R.; Bourgeus, A. Citizen-Centric Personal Data Storage in The Public Sector: An Exploration of Opportunities, Challenges, and Preconditions. J. Innov. Manag. 2023, 11, 30–53. [Google Scholar] [CrossRef]
- Radosevic, N.; Duckham, M.; Saiedur Rahaman, M.; Ho, S.; Williams, K.; Hashem, T.; Tao, Y. Spatial Data Trusts: An Emerging Governance Framework for Sharing Spatial Data. Int. J. Digit. Earth 2023, 16, 1607–1639. [Google Scholar] [CrossRef]
- Asgarinia, H.; Chomczyk Penedo, A.; Esteves, B.; Lewis, D. “Who Should I Trust with My Data?” Ethical and Legal Challenges for Innovation in New Decentralized Data Management Technologies. Information 2023, 14, 351. [Google Scholar] [CrossRef]
- Burri, M. (Ed.) Big Data and Global Trade Law; Cambridge University Press: Cambridge, UK, 2021. [Google Scholar]
- Park, H.; Oh, H.; Choi, J.K. A Profit Maximization Model for Data Consumers with Data Providers’ Incentives in Personal Data Trading Market. Data 2024, 9, 6. [Google Scholar] [CrossRef]
- Pena, B.; Kursar, B.; Clarke, R.; Vines, J. Curb Your Enthusiasm: The Dissonances of Digitising Personal Finance. In DRS Biennial Conference Series; Design Research Society: Bilbao, Spain, 2022; Volume 67. [Google Scholar] [CrossRef]
- Xu, Z.; Chen, X.; Hong, Y. Evolutionary Game—Theoretic Approach for Analyzing User Privacy Disclosure Behavior in Online Health Communities. Appl. Sci. 2022, 12, 6603. [Google Scholar] [CrossRef]
- Majeed, A.; Ullah, F.; Lee, S. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data. Sensors 2017, 17, 1059. [Google Scholar] [CrossRef]
- Wang, W.; Ying, L.; Zhang, J. The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms and Fundamental Limits. In Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, Antibes Juan-Les-Pins, France, 15–17 June 2016. [Google Scholar]
- Dimodugno, M.; Hallman, S.; Plaisent, M.; Bernard, P. The Effect of Privacy Concerns, Risk, Control, and Trust on Individuals’ Decisions to Share Personal Information: A Game Theory-Based Approach. J. Phys. Conf. Ser. 2021, 2090, 012017. [Google Scholar] [CrossRef]
- Wan, Z.; Vorobeychik, Y.; Xia, W.; Liu, Y.; Wooders, M.; Guo, J.; Yin, Z.; Clayton, E.W.; Kantarcioglu, M.; Malin, B.A. Using Game Theory to Thwart Multistage Privacy Intrusions When Sharing Data. Sci. Adv. 2021, 7, eabe9986. [Google Scholar] [CrossRef]
- Zhu, F.; Song, Z. Systematic Regulation of Personal Information Rights in the Era of Big Data. SAGE Open 2022, 12, 21582440211067529. [Google Scholar] [CrossRef]
- Zhang, Y. The Regulation of the Digital Markets. Int. J. Educ. Humanit. 2023, 9, 95–99. [Google Scholar] [CrossRef]
- Cheong, H.; Kim, B.; Vaquero, I.U. Data Valuation Model for Estimating Collateral Loans in Corporate Financial Transaction. J. Risk Financ. Manag. 2023, 16, 206. [Google Scholar] [CrossRef]
- Li, Z.; Liang, F.; Hu, H. Blockchain-Based and Value-Driven Enterprise Data Governance: A Collaborative Framework. Sustainability 2023, 15, 8578. [Google Scholar] [CrossRef]
- Lrina, R.; Rob, Z.; Peter, J.V.B. Boosting Co-Opetition with Fair Sharing Approach for Inter-Organizational Information Systems. SSRN Electron. J. 2017, 201. Available online: https://ssrn.com/abstract=2984544 (accessed on 1 July 2025).
- Park, J.K.; Park, S.K.; Lee, B.G. Priority of Challenges for Activation of MyData Business: K-MyData Case. KSII Trans. Internet Inf. Syst. TIIS 2021, 15, 3513–3533. [Google Scholar]
- Oh, S.; Chung, G.; Cho, K. New Sustainable Fintech Business Models Created by Open Application Programming Interface Technology: A Case Study of Korea’s Open Banking Application Programming Interface Platform. Sustainability 2024, 16, 7187. [Google Scholar] [CrossRef]
- Alexander, J.M. Evolutionary Game Theory. In The Stanford Encyclopedia of Philosophy; Zalta, E.N., Ed.; Metaphysics Research Lab, Stanford University: Stanford, CA, USA, 2021; Available online: https://plato.stanford.edu/archives/sum2021/entries/game-evolutionary/ (accessed on 8 May 2025).
- Acquisti, A.; Brandimarte, L.; Loewenstein, G. Secrets and Likes: The Drive for Privacy and the Difficulty of Achieving It in the Digital Age. J. Consum. Psychol. 2020, 30, 736–758. [Google Scholar] [CrossRef]
Individuals | Data Users | Governments | |
---|---|---|---|
High-Regulation | Low-Regulation | ||
Participation | compliance | , , | , , |
Non-compliance | , , | , , | |
Non-Participation | compliance | 0, , | 0, , |
Non-compliance | 0, , | 0, , |
Equilibrium Point | Eigenvalues | Eigenvalues | Eigenvalues | Stability Analysis |
---|---|---|---|---|
Saddle OR ESS | ||||
Saddle OR ESS | ||||
unstable | ||||
unstable | ||||
Saddle OR ESS | ||||
unstable | ||||
Saddle OR ESS | ||||
Saddle OR ESS |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, D.; Yu, J. Personal Data Value Realization and Symmetry Enhancement Under Social Service Orientation: A Tripartite Evolutionary Game Approach. Symmetry 2025, 17, 1069. https://doi.org/10.3390/sym17071069
Wang D, Yu J. Personal Data Value Realization and Symmetry Enhancement Under Social Service Orientation: A Tripartite Evolutionary Game Approach. Symmetry. 2025; 17(7):1069. https://doi.org/10.3390/sym17071069
Chicago/Turabian StyleWang, Dandan, and Junhao Yu. 2025. "Personal Data Value Realization and Symmetry Enhancement Under Social Service Orientation: A Tripartite Evolutionary Game Approach" Symmetry 17, no. 7: 1069. https://doi.org/10.3390/sym17071069
APA StyleWang, D., & Yu, J. (2025). Personal Data Value Realization and Symmetry Enhancement Under Social Service Orientation: A Tripartite Evolutionary Game Approach. Symmetry, 17(7), 1069. https://doi.org/10.3390/sym17071069