{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:09:47Z","timestamp":1756894187403,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491448"},{"type":"electronic","value":"9783319491455"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49145-5_16","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T08:52:57Z","timestamp":1478681577000},"page":"155-167","source":"Crossref","is-referenced-by-count":2,"title":["Game Theoretical Analysis on System Adoption and Acceptance: A Review"],"prefix":"10.1007","author":[{"given":"Xueqin","family":"Liang","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Khazaee, P.R., Mirzadi, K., Yousefi, S.: Cooperative user and storage service providers interaction in cloud computing. In: 7th Conference on Information and Knowledge Technology (IKT), pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/IKT.2015.7288765"},{"key":"16_CR2","doi-asserted-by":"crossref","first-page":"2239","DOI":"10.1016\/j.comnet.2010.03.013","volume":"54","author":"J Antoniou","year":"2010","unstructured":"Antoniou, J., Papadopoulou, V., Vassiliou, V., Pitsillides, A.: Cooperative user\u2013network interactions in next generation communication networks. Comput. Netw. 54, 2239\u20132255 (2010). ACM","journal-title":"Comput. Netw."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Cesana, M., Malanchini, I., Capone, A.: Modelling network selection and resource allocation in wireless access networks with non-cooperative games. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 404\u2013409. IEEE (2008)","DOI":"10.1109\/MAHSS.2008.4660055"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Maghrabi, L., Pfluegel, E.: Moving assets to the cloud: a game theoretic approach based on trust Cyber Situational Awareness. In: International Conference on Data Analytics and Assessment (CyberSA), pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/CyberSA.2015.7166120"},{"key":"16_CR5","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.csi.2014.08.007","volume":"38","author":"E Furuncu","year":"2015","unstructured":"Furuncu, E., Sogukpinar, I.: Scalable risk assessment method for cloud computing using game theory (CCRAM). Comput. Stan. Interfaces 38, 44\u201350 (2015). Elsevier","journal-title":"Comput. Stan. Interfaces"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"He, W., Xia, C., Wang, H., Zhang, C., Ji, Y.: A game theoretical attack-defense model oriented to network security risk assessment. In: International Conference on Computer Science and Software Engineering, vol. 6, pp. 498\u2013504. IEEE (2008)","DOI":"10.1109\/CSSE.2008.1651"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Wang, B., Cai, J., Zhang, S., Li, J.: A network security assessment model based on attack-defense game theory. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 3, pp. 639\u2013643. IEEE (2010)","DOI":"10.1109\/ICCASM.2010.5620536"},{"key":"16_CR8","first-page":"14:1","volume":"10","author":"K Rzadca","year":"2015","unstructured":"Rzadca, K., Datta, A., Kreitz, G., Buchegger, S.: Game-theoretic mechanisms to increase data availability in decentralized storage systems. ACM Trans. Auton. Adapt. Syst. (TAAS) 10, 14:1\u201314:32 (2015). ACM","journal-title":"ACM Trans. Auton. Adapt. Syst. (TAAS)"},{"key":"16_CR9","first-page":"5:1","volume":"4","author":"ATS Ip","year":"2008","unstructured":"Ip, A.T.S., Lui, J.C.S., Liu, J.: A revenue-rewarding scheme of providing incentive for cooperative proxy caching for media streaming systems. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 4, 5:1\u20135:32 (2008). ACM","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl. (TOMM)"},{"key":"16_CR10","first-page":"12:1","volume":"4","author":"D Biran","year":"2013","unstructured":"Biran, D., Zack, M.H., Briotta, R.J.: Competitive intelligence and information quality: a game-theoretic perspective. J. Data Inf. Qual. (JDIQ) 4, 12:1\u201312:20 (2013). ACM","journal-title":"J. Data Inf. Qual. (JDIQ)"},{"key":"16_CR11","first-page":"21:1","volume":"4","author":"MP Anastasopoulos","year":"2009","unstructured":"Anastasopoulos, M.P., Vasilakos, A.V., Cottis, P.G.: An autonomic framework for reliable multicast: a game theoretical approach based on social psychology. ACM Trans. Auton. Adapt. Syst. (TAAS) 4, 21:1\u201321:23 (2009). ACM","journal-title":"ACM Trans. Auton. Adapt. Syst. (TAAS)"},{"key":"16_CR12","first-page":"11:1","volume":"4","author":"RM Araujo","year":"2009","unstructured":"Araujo, R.M., Lamb, L.C.: On the use of memory and resources in minority games. ACM Trans. Auton. Adapt. Syst. (TAAS) 4, 11:1\u201311:23 (2009). ACM","journal-title":"ACM Trans. Auton. Adapt. Syst. (TAAS)"},{"key":"16_CR13","doi-asserted-by":"crossref","first-page":"23:1","DOI":"10.1145\/2635673","volume":"47","author":"A Laszka","year":"2015","unstructured":"Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv. (CSUR) 47, 23:1\u201323:28 (2015). ACM","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"16_CR14","first-page":"43:1","volume":"9","author":"AC Voulkidis","year":"2013","unstructured":"Voulkidis, A.C., Anastasopoulos, M.P., Cottis, P.G.: Energy efficiency in wireless sensor networks: a game-theoretic approach based on coalition formation. ACM Trans. Sens. Netw. (TOSN) 9, 43:1\u201343:27 (2013). ACM","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"16_CR15","first-page":"46:1","volume":"9","author":"LH Yen","year":"2013","unstructured":"Yen, L.H., Lin, C.M., Leung, V.C.M.: Distributed lifetime-maximized target coverage game. ACM Trans. Sens. Netw. (TOSN) 9, 46:1\u201346:23 (2013). ACM","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"16_CR16","first-page":"3:1","volume":"15","author":"P Dandekar","year":"2015","unstructured":"Dandekar, P., Goel, A., Wellman, M.P., Wiedenbeck, B.: Strategic formation of credit networks. ACM Trans. Internet Technol. (TOIT) - Special Issue on Foundations of Social Computing 15, 3:1\u20133:41 (2015). ACM","journal-title":"ACM Trans. Internet Technol. (TOIT) - Special Issue on Foundations of Social Computing"},{"key":"16_CR17","first-page":"21:1","volume":"26","author":"MAI Tsompanas","year":"2016","unstructured":"Tsompanas, M.A.I., Kachris, C., Sirakoulis, G.C.: Modeling cache memory utilization on multicore using common pool resource game on cellular automata. ACM Trans. Model. Comput. Simul. (TOMACS) - Special Issue on ACAM and Special Issue Papers 26, 21:1\u201321:22 (2016). ACM","journal-title":"ACM Trans. Model. Comput. Simul. (TOMACS) - Special Issue on ACAM and Special Issue Papers"},{"key":"16_CR18","first-page":"10:1","volume":"14","author":"P Coucheney","year":"2014","unstructured":"Coucheney, P., D\u2019acquisto, G., Maill\u00e9, P., Naldi, M., Tuffin, B.: Influence of search neutrality on the economics of advertisement-financed content. ACM Trans. Internet Technol. (TOIT) - Special Issue on Pricing and Incentives in Networks and Systems and Regular Papers 14, 10:1\u201310:21 (2014)","journal-title":"ACM Trans. Internet Technol. (TOIT) - Special Issue on Pricing and Incentives in Networks and Systems and Regular Papers"},{"key":"16_CR19","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/TCCN.2015.2488649","volume":"1","author":"W Hoiles","year":"2015","unstructured":"Hoiles, W., Gharehshiran, O.N., Krishnamurthy, V., \u00d0\u00e0o, N.D., Zhang, H.: Adaptive caching in the youtube content distribution network: a revealed preference game-theoretic learning approach. IEEE Trans. Cogn. Commun. Network. 1, 71\u201385 (2015). IEEE","journal-title":"IEEE Trans. Cogn. Commun. Network."},{"key":"16_CR20","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/TCC.2014.2303077","volume":"2","author":"R Duan","year":"2014","unstructured":"Duan, R., Prodan, R., Li, X.: Multi-objective game theoretic scheduling of bag-of-tasks workflows on hybrid clouds. IEEE Trans. Cloud Comput. 2, 29\u201342 (2014). IEEE","journal-title":"IEEE Trans. Cloud Comput."},{"key":"16_CR21","first-page":"1","volume":"pp","author":"C Esposito","year":"2015","unstructured":"Esposito, C., Ficco, M., Palmieri, F., Castiglione, A.: Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans. Comput. pp, 1\u201314 (2015). IEEE","journal-title":"IEEE Trans. Comput."},{"key":"16_CR22","doi-asserted-by":"crossref","first-page":"4328","DOI":"10.1109\/TWC.2012.102612.111844","volume":"11","author":"B Zhang","year":"2012","unstructured":"Zhang, B., Chen, Y., Liu, K.J.R.: An indirect-reciprocity reputation game for cooperation in dynamic spectrum access networks. IEEE Trans. Wireless Commun. 11, 4328\u20134341 (2012). IEEE","journal-title":"IEEE Trans. Wireless Commun."},{"key":"16_CR23","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/TMC.2011.151","volume":"11","author":"Z Li","year":"2012","unstructured":"Li, Z., Shen, H.: Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11, 1287\u20131303 (2012). IEEE","journal-title":"IEEE Trans. Mob. Comput."},{"key":"16_CR24","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.cose.2014.03.010","volume":"47","author":"Y Shen","year":"2014","unstructured":"Shen, Y., Yan, Z., Kantola, R.: Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Comput. Secur. 47, 3\u201325 (2014). Elsevier","journal-title":"Comput. Secur."},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Haesanyi, J.C.: Games with incomplete information. Nobel Prize Committee (1994)","DOI":"10.1007\/978-94-017-1504-1_2"},{"issue":"1","key":"16_CR26","first-page":"1","volume":"53","author":"M Matsui","year":"2002","unstructured":"Matsui, M.: A management game model: economic traffic, leadtime and pricing setting. J. Jpn. Ind. Manag. Assoc. 53(1), 1\u20139 (2002). CiNii","journal-title":"J. Jpn. Ind. Manag. Assoc."},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Xu Y., Chen B., Deng Y.T., Deng G.: The government strategy research on college student\u2019s employment based on game theory. In: International Conference on Optics Photonics and Energy Engineering, vol. 2, pp. 24\u201327. IEEE (2010)","DOI":"10.1109\/OPEE.2010.5507993"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy and Anonymity in Computation, Communication and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49145-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T05:50:25Z","timestamp":1749707425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49145-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491448","9783319491455"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49145-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}