{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:00:26Z","timestamp":1775052026673,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10489-021-02553-6","type":"journal-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T02:02:42Z","timestamp":1623981762000},"page":"2671-2689","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Trustworthiness two-way games via margin policy in e-commerce platforms"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1511-7266","authenticated-orcid":false,"given":"Lei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Yunqiu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shuhan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhixiang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yuqian","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"issue":"5","key":"2553_CR1","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1016\/j.im.2016.01.006","volume":"53","author":"W-T Wang","year":"2016","unstructured":"Wang W-T, Wang Y-S, Liu E-R (2016) . Inf Manag 53(5):625\u2013642","journal-title":"Inf Manag"},{"key":"2553_CR2","unstructured":"Cockrill MP, Bryant W K, Franklin D C, Mcneely M H, Ryan T J, Sweet A P, Siadek S J, Faith Jr R R, Goris J M, Malek T A, et al. (2015) Electronic commerce using a transaction network. Google Patents. US Patent 8,935,182"},{"key":"2553_CR3","unstructured":"Watson R T, Berthon P, Pitt L F, Zinkhan G M, et al. (2018) Electronic commerce: The strategic perspective. Dryden"},{"key":"2553_CR4","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.chb.2017.01.050","volume":"71","author":"T Oliveira","year":"2017","unstructured":"Oliveira T, Alhinho M, Rita P, Dhillon G (2017) . Comput Hum Behav 71:153\u2013164","journal-title":"Comput Hum Behav"},{"issue":"2","key":"2553_CR5","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.elerap.2014.11.005","volume":"14","author":"S Bertarelli","year":"2015","unstructured":"Bertarelli S (2015) . Electron Commer Res Appl 14(2):75\u201380","journal-title":"Electron Commer Res Appl"},{"key":"2553_CR6","doi-asserted-by":"publisher","first-page":"100907","DOI":"10.1016\/j.elerap.2019.100907","volume":"40","author":"Y-H Fang","year":"2020","unstructured":"Fang Y-H, Li C-Y (2020) . Electron Commer Res Appl 40:100907","journal-title":"Electron Commer Res Appl"},{"key":"2553_CR7","doi-asserted-by":"crossref","unstructured":"Zhao W, Ye S (2015) .. In: LISS 2014. Springer, pp 1465\u20131470","DOI":"10.1007\/978-3-662-43871-8_210"},{"issue":"2","key":"2553_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.5539\/ijms.v7n2p44","volume":"7","author":"S Chaabna","year":"2015","unstructured":"Chaabna S, Wang H (2015) . Int J Market Stud 7(2):44","journal-title":"Int J Market Stud"},{"key":"2553_CR9","doi-asserted-by":"publisher","first-page":"29109","DOI":"10.1109\/ACCESS.2018.2838765","volume":"6","author":"W Liu","year":"2018","unstructured":"Liu W, Feng X, Zhang F, Du Y, Yan C (2018) . IEEE Access 6:29109\u201329131","journal-title":"IEEE Access"},{"key":"2553_CR10","doi-asserted-by":"publisher","first-page":"106895","DOI":"10.1016\/j.knosys.2021.106895","volume":"219","author":"H-L Sun","year":"2021","unstructured":"Sun H-L, Liang K-P, Liao H, Chen D-B (2021) . Knowl-Based Syst 219:106895","journal-title":"Knowl-Based Syst"},{"issue":"4","key":"2553_CR11","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TSC.2015.2480393","volume":"11","author":"H Wang","year":"2018","unstructured":"Wang H, Yu C, Wang L, Yu Q (2018) . IEEE Trans Serv Comput 11(4):644\u2013657","journal-title":"IEEE Trans Serv Comput"},{"key":"2553_CR12","doi-asserted-by":"publisher","first-page":"106847","DOI":"10.1016\/j.asoc.2020.106847","volume":"98","author":"D Liang","year":"2021","unstructured":"Liang D, Dai Z, Wang M (2021) . Appl Soft Comput 98:106847","journal-title":"Appl Soft Comput"},{"issue":"1","key":"2553_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10489-013-0495-8","volume":"41","author":"S Abedinzadeh","year":"2014","unstructured":"Abedinzadeh S, Sadaoui S (2014) . Appl Intell 41(1):55\u201375","journal-title":"Appl Intell"},{"issue":"2","key":"2553_CR14","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s10489-014-0537-x","volume":"41","author":"M Mehdi","year":"2014","unstructured":"Mehdi M, Bouguila N, Bentahar J (2014) . Appl Intell 41(2):503\u2013524","journal-title":"Appl Intell"},{"key":"2553_CR15","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/j.ins.2014.02.141","volume":"277","author":"CR Choi","year":"2014","unstructured":"Choi C R, Jeong H Y (2014) . Inf Sci 277:553\u2013566","journal-title":"Inf Sci"},{"issue":"2","key":"2553_CR16","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/s10489-019-01542-0","volume":"50","author":"Y Pan","year":"2020","unstructured":"Pan Y, He F, Yu H, Li H (2020) . Appl Intell 50(2):314\u2013327","journal-title":"Appl Intell"},{"issue":"2","key":"2553_CR17","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s10489-018-1289-9","volume":"49","author":"M Ghavipour","year":"2019","unstructured":"Ghavipour M, Meybodi M R (2019) . Appl Intell 49(2):435\u2013448","journal-title":"Appl Intell"},{"issue":"4","key":"2553_CR18","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1007\/s10489-015-0734-2","volume":"44","author":"M Li","year":"2016","unstructured":"Li M, Xiang Y, Zhang B, Huang Z, Zhang J (2016) . Appl Intell 44(4):969\u2013987","journal-title":"Appl Intell"},{"issue":"5","key":"2553_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1361-3723(15)30038-5","volume":"2015","author":"A Khan","year":"2015","unstructured":"Khan A (2015) . Comput Fraud Secur 2015(5):16\u201319","journal-title":"Comput Fraud Secur"},{"issue":"2","key":"2553_CR20","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1111\/isj.12144","volume":"28","author":"Y Guo","year":"2018","unstructured":"Guo Y, Bao Y, Stuart B J, Le-Nguyen K (2018) . Inf Syst J 28(2):359\u2013383","journal-title":"Inf Syst J"},{"key":"2553_CR21","doi-asserted-by":"publisher","first-page":"107259","DOI":"10.1016\/j.asoc.2021.107259","volume":"105","author":"Y Kang","year":"2021","unstructured":"Kang Y, Jia N, Cui R, Deng J (2021) . Appl Soft Comput 105:107259","journal-title":"Appl Soft Comput"},{"key":"2553_CR22","first-page":"374","volume":"358","author":"D McGregor","year":"1960","unstructured":"McGregor D (1960) . Organ Theory 358:374","journal-title":"Organ Theory"},{"key":"2553_CR23","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.indmarman.2020.09.004","volume":"93","author":"J Aspara","year":"2021","unstructured":"Aspara J, Grant D B, Holmlund M (2021) . Ind Mark Manag 93:356\u2013369","journal-title":"Ind Mark Manag"},{"key":"2553_CR24","unstructured":"Tomljanovi\u0107 J, Turina T, Kurelovi\u0107 E K (2016) .. In: 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, pp 1546\u20131551"},{"key":"2553_CR25","doi-asserted-by":"crossref","unstructured":"Myerson R B (2013) Game theory. Harvard university press","DOI":"10.2307\/j.ctvjsf522"},{"key":"2553_CR26","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.amc.2016.07.018","volume":"292","author":"JE Bahbouhi","year":"2017","unstructured":"Bahbouhi J E, Moussa N (2017) . Appl Math Comput 292:128\u2013144","journal-title":"Appl Math Comput"},{"issue":"3","key":"2553_CR27","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1007\/s10489-020-01759-4","volume":"51","author":"W Xue","year":"2021","unstructured":"Xue W, Xu Z, Zeng X-J (2021) . Appl Intell 51(3):1227\u20131243","journal-title":"Appl Intell"},{"key":"2553_CR28","unstructured":"Roy S K, Maiti S K (2020) Appl Intell:1\u201318"},{"issue":"12","key":"2553_CR29","doi-asserted-by":"publisher","first-page":"4529","DOI":"10.1007\/s10489-020-01799-w","volume":"50","author":"K Yang","year":"2020","unstructured":"Yang K, You X, Liu S, Pan H (2020) . Appl Intell 50(12):4529\u20134542","journal-title":"Appl Intell"},{"key":"2553_CR30","unstructured":"Hamilton S N, Miller W L, Ott A, Saydjari O S (2002) .. In: 4th Information survivability workshop (ISW-2001\/2002), pp 1\u20134"},{"issue":"8","key":"2553_CR31","first-page":"2102","volume":"37","author":"F Yang","year":"2017","unstructured":"Yang F, Wang A, Wu J, Tang L (2017) . Syst Eng Theory Pract 37(8):2102\u20132110","journal-title":"Syst Eng Theory Pract"},{"issue":"3","key":"2553_CR32","first-page":"117","volume":"24","author":"L Yao","year":"2010","unstructured":"Yao L, Li Y, Wang F-j (2010) . East China Econ Manag 24(3):117\u2013119","journal-title":"East China Econ Manag"},{"key":"2553_CR33","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ins.2021.02.033","volume":"563","author":"J Zhang","year":"2021","unstructured":"Zhang J, Lou J, Qiu J, Lu J (2021) . Inf Sci 563:166\u2013182","journal-title":"Inf Sci"},{"key":"2553_CR34","unstructured":"Dixit A K, Skeath S (2015) Games of strategy: Fourth international student edition. WW Norton & Company"},{"key":"2553_CR35","unstructured":"Simon H, March J (1976) Administrative behavior organization. Free Press, New York"},{"key":"2553_CR36","unstructured":"Zhang D-g, Chen C, Cui Y-y, Zhang T (2018) Mob Netw Appl:1\u201314"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02553-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02553-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02553-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,5]],"date-time":"2023-11-05T01:56:22Z","timestamp":1699149382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02553-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,18]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["2553"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02553-6","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,18]]},"assertion":[{"value":"20 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}