Research Article Research on Digital Information Privacy Behavior of Social Network Users Based on Evolutionary Game

This article takes social network services as the research object and mainly conducts two aspects of research: ﬁ rst, based on previous research, combining the behavior characteristics of users in the social network environment related to digital information privacy, the digital information privacy of users pays attention to the in ﬂ uential factors of users ’ digital information privacy information disclosure behavior, summarize and re ﬁ ne them, establish theoretical research models, and then use structural equation modelling to empirically analyze the signi ﬁ cance of each in ﬂ uence path; then, based on the ﬁ rst part of the empirical research, the evolutionary game theory was used to analyze the interests of digital information privacy between social network users and service providers. This paper also studies the evolution of the willingness of each parameter to provide digital information to users under variable expected return conditions and uses MATLAB to analyze its evolutionary trends. It is found that the regulatory intensity coe ﬃ cient, information leakage loss, and information sensitivity are both for users and websites. It has an important impact, and the loss of information leakage and information sensitivity can a ﬀ ect the evolution direction of users ’ willingness to provide digital information and change the speed of website evolution, and the regulatory intensity coe ﬃ cient is the opposite.


Introduction
As social networks begin real-name registration, they are increasingly focusing on building an ecological environment with people at the center, and the stickiness and appeal of social networking sites for users are more obvious [1]. Correspondingly, the cost of obtaining personal privacy in social networks is getting lower and lower, which in turn leads to more and more attention of entrepreneurs or for-profit organizations for its commercial value [2]. However, due to the generally low security awareness and prevention skills of citizens on personal privacy in social networks, regulatory constraints, industry self-discipline, technical deficiencies, and social credit environment [3] are not yet perfect, resulting in some illegal individuals or organizations driven by interests using improper means to illegally collect, sell, disseminate, develop, and utilize personal privacy in social networks, which seriously threaten the security of personal privacy in social networks [4,5].
Judging from the existing research, the research on personal "information privacy" and "privacy concerns" has a long history [6][7][8][9]. As we all know, "information privacy" is an interdisciplinary and crossdomain concept. Scholars in different fields such as management, sociology, psychology, and law have studied from different theoretical perspectives and put forward related concepts and connotations [10]. With the inference attack on relating information in social networks, Ignatenko proposed that users and social network service providers should pay attention to the setting of group relationships and friend relationships in social networks [11]. Ning et al. analyzed the antecedents, and influencing results will be reduced due to the higher degree of privacy importance [12]. Hodkinson used the theory of evolutionary game to study the relationship between privacy, trust, and cooperation in shopping websites [13]. Logesh and Subramaniyaswamy used evolutionary game theory to analyze the promotion of government immunization programs [14]. Through research, they found that group dynamic learning and imitation capabilities in game theory can play an important role in the popularization of vaccine projects and the willingness of people to vaccinate [15,16]. Vanderhoven et al. used evolutionary game theory to study the formation mechanism of unified decision opinions [17]. Through the establishment of a game model, simulation software was used to simulate the strategic selection of question participants in the discussion process [18,19]. In addition, Joo and Teng used evolutionary game theory to study the conflicts of interest and cooperation in society from the perspective of dynamic learning [20]. By establishing a dynamic learning model to analyze the evolutionary stable state of the game process, it was found that conflicts and the cooperation problem have different evolutionary tendencies under different conditions [21]. Finally, the author puts forward relevant strategies and suggestions to make this kind of problem develop in a direction that is beneficial to society [22]. Through combing and analyzing the previous studies, it is found that the previous research on the private paradox has mainly focused on the same behavior of the current interests of both parties.
Palos Sánchez et al. studied and summarized the information dissemination and recommendation mechanism in social networks [23] and constructed a game model of information dissemination on social networks. Through the establishment of the evolutionary game model of both parties, they conducted an in-depth analysis of the customers and enterprise's interest relationship and dynamic evolutionary process under different strategies, influencing factors, and evolutionary path of the integrity problem in e-commerce websites. Privacy issues cannot be properly resolved, and the development of LBS sign-in services will likely enter a bottleneck period, thereby greatly limiting the rapid development of user scale and ultimately damaging the interests of all parties.
Through the research on the factors that affect the privacy of social network users, the factors that affect privacy disclosure, and the long-term dynamic game behavior between users and service providers, on the one hand, they can discover the important factors that affect users' privacy behaviors in the social network environment and further explain users and social network and the long-term evolution of the privacy interests of the online community, so as to indicate the direction and provide practical policy recommendations for the long-term development of social network service providers; on the other hand, it further broadens the research scope of evolutionary game theory and provides a new method for studying social networks. Therefore, this study will use evolutionary game theory to treat users and social network service providers as two interacting groups and, on the basis of the first part of empirical research, introduce the influencing factors of emergencies by constructing a revenue matrix and replicators. Dynamic equations are used to obtain an evolutionary game model of the private benefit game.

Method
2.1. Construction of Factors Affecting Digital Information of Social Network Users. According to social exchange theory, people will dominate their behaviors in pursuit of maximizing their own interests. These decision-making behaviors depend on the measurement of their own gains and losses, including the rewards and risks they receive. The core of the theory is that the interacting parties follow the principle of reciprocity. When their expected benefits are greater than the cost, the exchange occurs. Among them, the exchange gains include not only material gains but also psychological gains. When analyzing the user's digital information from the perspective of social exchange theory, the behavior can also be regarded as the decision-making process of the user's exchange behavior. Users' trust in service providers and members provides personal information in exchange for communication with other members and online information and also reduces the willingness to disclose information because of the importance of privacy. When this process has a positive effect, the user's willingness to provide increases, and conversely, the willingness to provide decreases.
As an indispensable tool for users to contact friends and engage in entertainment interactions, social networks also worry about the use of their information by service providers while they are enjoying the digital experience, causing them to worry about their own information. This seriously affects the user experience and causes user churn. Based on the existing research on social networks, this paper extracts the factors that affect users' digital information from the perspective of users, social networking sites, and network environment.
(1) User perspective Privacy is important: privacy emphasis refers to the possible information leakage caused by users disclosing their information to others. The fear of losing privacy is the user's subjective perception of the possibility of their own information leakage. In the Internet age, users will pay attention to privacy when filling in registration-related information on the website. With the popularity of social media, users have greater concerns about their own information (personal photos, accounts, and preferences) and other security issues, especially for mobile service applications. The focus on location privacy has also gradually increased. Users' concerns about privacy are mainly about the misuse of information and the illegal acquisition and sale of third parties. Some scholars have shown through research that privacy attaches a 2 Wireless Communications and Mobile Computing negative correlation to users' willingness to disclose digital information in the online environment, and some studies have proved that with user privacy, the increased attention will reduce the willingness of online users to disclose behaviors; that is, the greater the negative impact or loss of online users, the more negative the willingness to disclose information.
Trust index: the trust index refers to the individual's total wish to depend on others and is determined by the individual's own characteristics, growth background, and development experience. The individual's trust index can affect the user's trust in the website. The mobile Internet is virtual and unstable, which enhances the risk of user behavior. Trust can reduce the perceived risk of users, thereby increasing their willingness to disclose their information.
Experience feelings: experiential feelings were originally applied to psychology, which refers to individuals devoting themselves to an activity and ignoring the surrounding environment. Most are measured from the perspective of perceiving entertainment and emotional support. In a social network environment, perceived entertainment performance is the user's happy experience and enjoyment when using the application; emotional support is the user's emotional response to the product or service consumption experience. Emotional support obtained is the emotional care or help obtained by communicating with others and psychological comfort. In order to obtain the encouragement and help of others, it affects personal attitudes and thus affects the user's decision-making. When in the state of experiencing feelings, attention is drawn and has an impact on the user's attitude and behavior.
Perceived information controlled: it refers to the ability of individuals to control their information when it is released, including some private settings. Users with strong information control ability have better choices and judgments about their own information, which can be disclosed and which is private to maximize protection from infringement, which can reduce their concerns when using the network.
(2) Social network perspective Reputation of social networking sites: in a social network environment, the reputation of a website refers to the public, that is, the user's perception of the website's concern, integrity, and the degree of fulfilment of the agreement. The higher the reputation of the website, the more the user trusts the website, which affects the user's disclosure of relevant information to the website they trust.
Social network security: the website adopts corresponding protection measures, high-level technical support, from the user's perspective; for the user's information security considerations, the user will be willing to believe that the website's service is well-intentioned and reliable within a certain range, so as to provide a positive attitude. Provide corresponding information. If the website does not provide users with corresponding protection measures to ensure that users' digital information will not be maliciously bought or used, users will not be able to obtain the corresponding goodwill perception, which will reduce their willingness to disclose their own information.
Privacy policy of social networking sites: privacy policies have an important impact on users' privacy concerns. Privacy policies can make users feel more secure and assured. Privacy policies can negatively affect privacy concerns, which in turn increase user digital information disclosure.
(3) Network environment perspective Ease of use of social networking sites: according to the previous understanding of the concept of ease of use, coupled with the characteristics of the Internet, this article believes that the ease of use of the website is a degree to which users can feel the ease of operation and easy understanding within the website, and also includes future learning and use in the future. The website requires a sense of effort and time. When the user feels complicated to provide more information when registering and it takes longer time, it will reduce the user's willingness to provide information; if the website is not set up reasonably and the operation cannot be simple and convenient, it will affect the user's enthusiasm to participate in the website. As a result, users' willingness to provide digital information is reduced, and users are even lost.
Usefulness of social networking sites: website usefulness refers to the utility of the website that users can feel when they participate in the website. This kind of utility is not only the concessions and rewards given but also the validity, usefulness, and comfort of the information. Nowadays, the most important thing in society is personalized customization. The disclosure of personal information by users extends from the initial material rewards to the service output today. The website can provide users with high-quality services. Users naturally hope that the website can provide more and more comprehensive information for themselves. The strength of the user's willingness to provide digital information will be affected by the user's perceived size of the sites expected utility. The greater the perceived utility, the stronger the willingness; otherwise, the weaker.
Involvement of social networking sites: it refers to the time and effort invested by the user in using the website, adding the site involvement degree in the TAM model, and verifying that the user's willingness to use is directly affected by the site involvement degree. There is a correlation between involvement and use digital information. The higher the involvement of the user on the website, the more willing to answer the personal information questions raised by the website.
User digital information sensitivity: it refers to the extent to which the information provided by the user to others has been leaked and harmed. Generally, similar information has different sensitivity to different individuals, that is, the sensitivity of information varies from person to person. The sensitivity of users' digital information has a negative impact on their willingness to provide information. The higher the sensitivity of the information, the greater the risk perceived by the user, and the more difficult it is to provide. The sensitivity of the same user to the same information is also different in different situations. For example, the sensitivity of location information when shopping on a website is lower than that on social networking sites.

Wireless Communications and Mobile Computing
According to the above analysis, the establishment of user information digital information influencing factor system is shown in Table 1.

Identification and Analysis of Factors Affecting Digital
Information of Social Network Users. Twelve survey respondents including college experts, website operation experts, and network users are selected for scoring, and the subjectivity of expert scoring is reduced by introducing fuzzy set theory. DE blur the expert score and convert the ternary fuzzy number into a more accurate number, so as to obtain the precise value of the interaction between various factors. The obtained 8 questionnaires are transformed by linguistic variables and ternary fuzzy numbers, and the conversion relationship is shown in Table 2.
Set the ternary fuzzy number corresponding to the judgment result as formula (1), and perform diversification on the ternary fuzzy number.
Standardize the ternary fuzzy numbers evaluated by experts to reduce the subjectivity of the judges.
Second, calculate the standard value, according to the following formula (3) and formula (4) into the left and right standard values, and then calculate the total standard value according to formula (5).
Finally, the last step is complete blurring. The calculation of the influence value of i factor given by each expert on j factor is based on formula (6); then, the average influence value of the expert group is calculated according to formula (7). Social network involvement f 10 User digital information sensitivity f 11

Wireless Communications and Mobile Computing
Record the values in the 11 * 11 matrix as shown in Table 3 to obtain the direct impact matrix: In this paper, the direct influence matrix A N * N is converted into a standardized influence matrix B N * N according to formula (9) and then into the comprehensive influence matrix C N * N according to formula (10): The comprehensive influence matrixC N * N is obtained, and then, sum each row and each column, according to the MATLAB solution; the influence degree, influence degree, centrality, and cause degree of each influence factor are shown in Table 4.

Construction of the Evolutionary Game Model of Social
Network User Digital Information. Social network is different from the general network, not only to meet the user's personalized service need but also to meet the user's emotional needs, so that users can search for people, things, and information related to themselves in a timely manner. Most of the revenue of social networks comes from advertising. The main forms of advertising include interactive games, user reviews, value-added services with advertisements, and email. Therefore, it is assumed that the social network provides accurate marketing by obtaining user information, and the additional income obtained is W 1 .
For users, users need to register and post opinions to participate in games and comments. Posting comments involve personal personality, attitudes, preferences, and friends. Therefore, when users provide "privacy" information to the website, they obtain information and services recommended by the website based on the user's interests and behavior. These include personalized recommendation services provided by the website and access to virtual currency, so that users can obtain relevant product information within a short time by browsing the page, which is beneficial to users to save time, reduce the benefits of search costs, and enjoy the cooperation of merchants through geographic location information, external benefits such as consumer discounts; in addition, unlike other virtual communities, in social networks, users more want to get social emotional needs. Social networks are interactive. In social networks, users can establish contact with relatives, friends, and strangers to obtain internal benefits such as pleasure and emotional support. Therefore, external and internal benefits obtained by users are assumed to be B 1 and B 2 , respectively. Therefore, it is assumed that the loss suffered by the user from the privacy invasion leakage is L. The loss of private information leakage is affected by the sensitivity of the information. Therefore, the information sensitivity coefficient β is set to balance the size of the information leakage loss.

Wireless Communications and Mobile Computing
During the operation of the website, the website is subject to the supervision of the government regulatory department, and the degree of supervision of the regulatory agency can affect the user's willingness to provide information. Some researchers have shown that users believe that the government maintains the network order and reduces the risk of privacy leakage. The higher the regulatory intensity, the higher the trust level, and the higher the user's security perception benefit B 3 . Similarly, the higher the supervision intensity, the more the user trusts the website, and user participation will increase accordingly. This will undoubtedly increase the website revenue. In this article, it is assumed that this part of the revenue is the trust revenue W 2 obtained by the website, so it is also subject to the supervision department regulatory strong impact. At the same time, it can also affect the input cost of website information protection. In order to avoid the penalty imposed by the regulatory agency, the website will choose its own cost of information protectionC according to the intensity of the supervision. When the supervision intensity is weak, the user will save money. Information protection measures are also relatively scarce, and the standards for software and hardware updates and privacy policies of the website are reduced. On the contrary, when the intensity of supervision is strong, the website will choose to increase costs to protect user information in order to avoid greater loss of profits. Therefore, the cost of the website is also    Happening Wireless Communications and Mobile Computing affected by the intensity of regulation. When the website does not protect user information, the website participation rate will gradually decrease, causing the loss of the website to be assumed to be R. According to the stability theorem of differential equations, the evolutionary game model of willingness to provide information between socially connected users and websites can be expressed by the following two differential equations: For an evolutionary game model, the equilibrium point obtained by the two sides of the game according to the dynamic replication equation is not necessarily the equilibrium point of the system. The system's stabilization strategy must be composed of both parties of the game. Social network users and social networking sites together constitute. According to the equations formed by the dynamic equations of social network users and websites, the five equilibrium points of the system can be obtained as A (0, 0), B (1,0), C (0, 1), D (l, L), and E(x * ,). The local stability of the system can be derived based on the local stability of the Jacobian matrix. If the evolutionary equilibrium point of the system can satisfy the Jacobian matrix, the equilibrium point can be derived as the evolutionary stable strategy. The evolution of the selection strategy of social networking sites and their users can be described by the system composed of the above equations (11) and (12). The Jacobian matrix of this system is 3. Results 3.1. Data Path Analyses. Import preprocessed sample data into the AMOS data set, estimate and test the path coefficients in the research model, and finally obtain the estimated value and significant index of each path coefficient, as shown in Table 5. It can be seen from Table 4 that the negative media exposure (GME), personal negative media exposure (PME), personal adverse event experience (PBE), and other person's adverse event experience (GBE) experienced by privacy concerns (PC) have a positive impact; personal network literacy improvement (NL) has no effect on user privacy concerns (PC); external revenue perception (ER) and internal revenue perception (IR) have positive effects on behavioral will (BI).
At the same time, the analysis report output by AMOS yields the model fit index, as showed in Table 6. It is generally believed that if the model fit can better meet the relevant standards. It indicates that the research model matches the data. A well-built model is more reasonable, and the estimated value of the path coefficient will be more meaningful. Generally speaking, the closer CMIN/DF is to 0, the better the adaptability of the model to the data. The CMIN/DF value of the model in this study is 0.16, so the model has a good match with the data. In addition, the RMR, RMSEA, CFI, NFI, IFI, and other indicators all meet the relevant judgment criteria. Although GFI index value of the model is 0.897, which does not meet its judgment criteria, its value is closer to 0.9, and other relevant indicators can meet the requirements very well. Therefore, the model of this study is considered to have a good fit.

Analysis of Private
Behavior. Reliability (reliability) test refers to measuring the reliability of data by studying the consistency, stability, and reliability of test data and results. The factor load of each dimension is between 0.670 and 0.884, and all reach the standard range (more than 0.6; those less than 0.6 are deleted). Specific values are shown in Table 7.

Simulation Analyses of Evolutionary Model.
According to the actual situation, it is assumed that the cost C of protecting user information on the website is the utility of 4 units and uses this as a reference to assign values to each parameter. The assignment is shown in Table 8. Figure 1 is the evolutionary simulation of four cases. As can be seen in Figure 1(a), x and y both gradually approached 1 and stabilized from 0.3, indicating that the evolutionary stability result of Game A is (providing, protecting), which is consistent with the simulation results. As can be seen in Figure 1(b), x gradually tends to 1 from 0.3 and finally reaches stability at 1; y gradually tends to 0 from 0.3 and finally approaches 0 at infinity and reaches a stable state, indicating that Case B simulation results are (provided, not protected), which is completely consistent with the previous system evolution analysis results. As can be seen in Figure 1(c), x and min gradually approached 1 from 0.3 and eventually reached a stable state. Compared with the website, users reach a stable speed faster. The simulation result is (provide, protect), which is consistent with the evolutionary stability analysis result. Compared with Case A, changing the size relationship between the website's perceived revenue and website protection information cost 7 Wireless Communications and Mobile Computing investment has no effect on the system's evolutionary stability results, only the evolutionary stable speed. As showed in Figure 1(d), x gradually approached from 0.3 to 1, while y approached downward from 0.3 and gradually approached 0 and eventually reached stability, indicating that the simulation result is (provided, not protected). The simulation results under this condition are consistent with the evolutionary analysis. It can be seen from the results of the numerical simulation of the above four cases that the simulation results are completely consistent with the results of the previous model evolutionary stability analysis, indicating the correctness of the model.

Discussion
Nowadays, social networks are in the golden period of development. Social networks are gradually changing the way of life and work of the current society. The mobile social network has become an irreversible trend, and the "doubleedged sword effect" of personalized services is also urgently needed. Due to the limitations of personal capabilities, the number of interviewed groups and the number of samples in this survey are limited, and the relevant results cannot be better. To explain the actual situation, it is necessary to continue to investigate the specific content of personal privacy in social networks in more depth. In the future, we should continue to deeply analyze each relevant clause in the current laws and regulations and research and put forward specific rules and suggestions for the specific content of personal privacy in the social network of the contemporary information society.

Conclusion
This paper mainly studies the influencing factors of digital information private behavior of social network users and the analysis of the game process with service providers. First, the method of questionnaire survey and structural equation model is used for empirical data analysis. The conclusion finds a significant role in influencing factors of privacy concerns and behavioral intentions of social network users, proving that the emergencies experienced by users and environmental factors of external groups will positively affect the user's privacy concern level, and the user's privacy concern and perceived benefits will also significantly affect their privacy information disclosure behavior intentions. First, the DEMATEL method is applied to the research on the influencing factors of users 'digital information. The  Wireless Communications and Mobile Computing conclusion finds the key influencing factors of users' digital information. Based on the combination of the user's perceived revenue and risk perception, the key influencing factors affecting their digital information establish the influence through the evolutionary game theory. The evolutionary game model of user digital information analyzes the changing rules of user digital information in different situations. In the future, we should consider taking out the third-party regulators separately and establishing an evolutionary model of the game between network users, network service providers, and regulators.

Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
The authors declare that they have no conflicts of interest.