{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:09:09Z","timestamp":1726060149034},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030349851"},{"type":"electronic","value":"9783030349868"}],"license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-34986-8_2","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T10:02:47Z","timestamp":1574848967000},"page":"19-32","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Equity-Based Incentive Mechanism for Decentralized Virtual World Content Storage"],"prefix":"10.1007","author":[{"given":"Bingqing","family":"Shen","sequence":"first","affiliation":[]},{"given":"Jingzhi","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Weiming","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"issue":"3","key":"2_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2480741.2480751","volume":"45","author":"JDN Dionisio","year":"2013","unstructured":"Dionisio, J.D.N., Gilbert, R.: 3D virtual worlds and the Metaverse: current status and future possibilities. ACM Comput. Surv. (CSUR) 45(3), 34 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"2_CR2","first-page":"39","volume":"35","author":"L Tredinnick","year":"2018","unstructured":"Tredinnick, L.: Virtual realities in the business world. Bus. Inf. Rev. 35(1), 39\u201342 (2018)","journal-title":"Bus. Inf. Rev."},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.is.2017.01.004","volume":"66","author":"E Poppe","year":"2017","unstructured":"Poppe, E., Brown, R., Recker, J., Johnson, D., Vanderfeesten, I.: Design and evaluation of virtual environments mechanisms to support remote collaboration on complex process diagrams. Inf. Syst. 66, 59\u201381 (2017)","journal-title":"Inf. Syst."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, M., Leenders, M.A., Cong, L.M.: Ownership in the virtual world and the implications for long-term user innovation success. Technovation (2018)","DOI":"10.1016\/j.technovation.2018.06.002"},{"issue":"3","key":"2_CR5","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s10799-017-0283-y","volume":"19","author":"B Shen","year":"2018","unstructured":"Shen, B., Guo, J., Li, L.X.: Cost optimization in persistent virtual world design. Inf. Technol. Manage. 19(3), 155\u2013169 (2018)","journal-title":"Inf. Technol. Manage."},{"issue":"1\u20134","key":"2_CR6","first-page":"72","volume":"7","author":"EK Lua","year":"2005","unstructured":"Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun. Surv. Tutorials 7(1\u20134), 72\u201393 (2005)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"5","key":"2_CR7","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1037\/h0040968","volume":"67","author":"JS Adams","year":"1963","unstructured":"Adams, J.S.: Towards an understanding of inequity. J. Abnorm. Soc. Psychol. 67(5), 422 (1963)","journal-title":"J. Abnorm. Soc. Psychol."},{"issue":"2","key":"2_CR8","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1037\/h0036622","volume":"30","author":"W Austin","year":"1974","unstructured":"Austin, W., Walster, E.: Reactions to confirmations and disconfirmations of expectancies of equity and inequity. J. Pers. Soc. Psychol. 30(2), 208 (1974)","journal-title":"J. Pers. Soc. Psychol."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Krishnan, R., Smith, M.D., Telang, R.: The economics of peer-to-peer networks. Available at SSRN 504062 (2003)","DOI":"10.2139\/ssrn.504062"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Adar, E., Huberman, B.A.: Free riding on Gnutella. First Monday 5(10) (2000)","DOI":"10.5210\/fm.v5i10.792"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/19390450903037302","volume":"1","author":"G Hardin","year":"2009","unstructured":"Hardin, G.: The tragedy of the commons. J. Nat. Resour. Policy Res. 1(3), 243\u2013253 (2009)","journal-title":"J. Nat. Resour. Policy Res."},{"key":"2_CR12","volume-title":"Peer-to-Peer Storage: Security and Protocols","author":"N Oualha","year":"2010","unstructured":"Oualha, N., Roudier, Y.: Peer-to-Peer Storage: Security and Protocols. Nova Science Publishers Inc., New York (2010)"},{"issue":"1","key":"2_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s12083-009-0043-9","volume":"3","author":"W Liu","year":"2010","unstructured":"Liu, W., Peng, D., Lin, C., Chen, Z., Song, J.: Enhancing tit-for-tat for incentive in BitTorrent networks. Peer-to-peer Network. Appl. 3(1), 27\u201335 (2010)","journal-title":"Peer-to-peer Network. Appl."},{"key":"2_CR14","unstructured":"Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A cooperative internet backup scheme. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, p. 3. USENIX Association, June 2003"},{"issue":"12","key":"2_CR15","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1109\/TPDS.2012.338","volume":"24","author":"H Shen","year":"2012","unstructured":"Shen, H., Lin, Y., Li, Z.: Refining reputation to truly select high-QoS servers in peer-to-peer networks. IEEE Trans. Parallel Distrib. Syst. 24(12), 2439\u20132450 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-19348-4_12","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"Nouha Oualha","year":"2011","unstructured":"Oualha, N., Roudier, Y.: Securing P2P storage with a self-organizing payment scheme. In: Data Privacy Management and Autonomous Spontaneous Security, pp. 155\u2013169. Springer, Heidelberg (2010)"},{"key":"2_CR17","unstructured":"Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: Karma: a secure economic framework for peer-to-peer resource sharing. In: Workshop on Economics of Peer-to-peer Systems, vol. 35, no. 6, June 2003"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Adams, J.S.: Inequity in social exchange. In: Advances in Experimental Social Psychology, vol. 2, pp. 267\u2013299. Academic Press (1965)","DOI":"10.1016\/S0065-2601(08)60108-2"},{"issue":"1","key":"2_CR19","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1037\/h0034228","volume":"26","author":"LA Messe","year":"1973","unstructured":"Messe, L.A., Dawson, J.E., Lane, I.M.: Equity as a mediator of the effect of reward level on behavior in the Prisoner\u2019s Dilemma game. J. Pers. Soc. Psychol. 26(1), 60 (1973)","journal-title":"J. Pers. Soc. Psychol."},{"issue":"6","key":"2_CR20","doi-asserted-by":"publisher","first-page":"293","DOI":"10.3758\/BF03336306","volume":"15","author":"TL Radinsky","year":"1969","unstructured":"Radinsky, T.L.: Equity and inequity as a source of reward and punishment. Psychon. Sci. 15(6), 293\u2013295 (1969)","journal-title":"Psychon. Sci."},{"issue":"1","key":"2_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1037\/h0029208","volume":"15","author":"AW Wicker","year":"1970","unstructured":"Wicker, A.W., Bushweiler, G.: Perceived fairness and pleasantness of social exchange situations: two factorial studies of inequity. J. Pers. Soc. Psychol. 15(1), 63 (1970)","journal-title":"J. Pers. Soc. Psychol."},{"issue":"3","key":"2_CR22","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/S0022-1031(72)80002-7","volume":"8","author":"DR Schmitt","year":"1972","unstructured":"Schmitt, D.R., Marwell, G.: Withdrawal and reward reallocation as responses to inequity. J. Exp. Soc. Psychol. 8(3), 207\u2013221 (1972)","journal-title":"J. Exp. Soc. Psychol."},{"key":"2_CR23","first-page":"426","volume":"3","author":"EK Donald","year":"1999","unstructured":"Donald, E.K.: The art of computer programming. Sorting Searching 3, 426\u2013458 (1999)","journal-title":"Sorting Searching"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Knoll, M., Wacker, A., Schiele, G., Weis, T.: Bootstrapping in peer-to-peer systems. In: 2008 14th IEEE International Conference on Parallel and Distributed Systems, pp. 271\u2013278. IEEE, December 2008","DOI":"10.1109\/ICPADS.2008.26"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in E-Business Engineering for Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34986-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T10:07:57Z","timestamp":1574849277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34986-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9783030349851","9783030349868"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34986-8_2","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEBE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Business Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icebe2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.computer.org\/icebe\/2019\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}