{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:35Z","timestamp":1750220255475,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shenzhen Science and Technology Program","award":["JCYJ20210324124205016"],"award-info":[{"award-number":["JCYJ20210324124205016"]}]},{"name":"Shenzhen Institute of Artificial Intelligence and Robotics for Society","award":["AC01202101038"],"award-info":[{"award-number":["AC01202101038"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3494106.3528675","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:08:26Z","timestamp":1653365306000},"page":"35-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Economic Analysis of Loot Box Market in Blockchain Games"],"prefix":"10.1145","author":[{"given":"Yu","family":"Jiang","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen &amp; Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"}]},{"given":"Sizheng","family":"Fan","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen &amp; Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"}]},{"given":"Wei","family":"Cai","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen &amp; Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Accessed","author":"BGN.","year":"2018","unstructured":"BGN. [n. d.]. Online Gamers Want In-Game Cryptocurrencies. Game Developers, Not So Much. https:\/\/ih.advfn.com\/news\/amp\/76923216 . Accessed : March 12, 2018 . BGN. [n. d.]. Online Gamers Want In-Game Cryptocurrencies. Game Developers, Not So Much. https:\/\/ih.advfn.com\/news\/amp\/76923216. Accessed: March 12, 2018."},{"key":"e_1_3_2_2_2_1","volume-title":"Accessed","author":"Blizzard Activision","year":"2019","unstructured":"Activision Blizzard . [n.,d.]. 2019 Annual Report. https:\/\/investor.activision.com\/static-files\/e610f6ff-cdf2-4f92-b373-4df046a590bb . Accessed : April 24, 2020. Activision Blizzard. [n.,d.]. 2019 Annual Report. https:\/\/investor.activision.com\/static-files\/e610f6ff-cdf2-4f92-b373-4df046a590bb. Accessed: April 24, 2020."},{"key":"e_1_3_2_2_3_1","volume-title":"Leung","author":"Cai Wei","year":"2018","unstructured":"Wei Cai , Zehua Wang , Jason B. Ernst , Zhen Hong , Chen Feng , and Victor C. M . Leung . 2018 . Decentralized Applications : The Blockchain-Empowered Software System. IEEE Access , Vol. 6 (17 September 2018), 53019--53033. https:\/\/doi.org\/10.1109\/ACCESS.2018.2870644 Wei Cai, Zehua Wang, Jason B. Ernst, Zhen Hong, Chen Feng, and Victor C. M. Leung. 2018. Decentralized Applications: The Blockchain-Empowered Software System. IEEE Access, Vol. 6 (17 September 2018), 53019--53033. https:\/\/doi.org\/10.1109\/ACCESS.2018.2870644"},{"key":"e_1_3_2_2_4_1","volume-title":"Loot box pricing and design. Management Science","author":"Chen Ningyuan","year":"2020","unstructured":"Ningyuan Chen , Adam N Elmachtoub , Michael L Hamilton , and Xiao Lei . 2020. Loot box pricing and design. Management Science ( 2020 ). Ningyuan Chen, Adam N Elmachtoub, Michael L Hamilton, and Xiao Lei. 2020. Loot box pricing and design. Management Science (2020)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_5_1","DOI":"10.1145\/3474085.3479238"},{"key":"e_1_3_2_2_6_1","volume-title":"Mobile Devices Strategies in Blockchain-based Federated Learning: A Dynamic Game Perspective","author":"Fan Sizheng","year":"2022","unstructured":"Sizheng Fan , Hongbo Zhang , Zehua Wang , and Wei Cai . 2022. Mobile Devices Strategies in Blockchain-based Federated Learning: A Dynamic Game Perspective . IEEE Transactions on Network Science and Engineering ( 2022 ). https:\/\/doi.org\/10.1109\/TNSE.2022.3163791 Sizheng Fan, Hongbo Zhang, Zehua Wang, and Wei Cai. 2022. Mobile Devices Strategies in Blockchain-based Federated Learning: A Dynamic Game Perspective. IEEE Transactions on Network Science and Engineering (2022). https:\/\/doi.org\/10.1109\/TNSE.2022.3163791"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.1109\/JIOT.2020.3028101"},{"key":"e_1_3_2_2_8_1","volume-title":"Effect of the Gas Price Surges on User Activity in the DAOs of the Ethereum Blockchain. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. 1--7.","author":"Faqir-Rhazoui Youssef","year":"2021","unstructured":"Youssef Faqir-Rhazoui , Miller-Janny Ariza-Garz\u00f3n , Javier Arroyo , and Samer Hassan . 2021 . Effect of the Gas Price Surges on User Activity in the DAOs of the Ethereum Blockchain. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. 1--7. Youssef Faqir-Rhazoui, Miller-Janny Ariza-Garz\u00f3n, Javier Arroyo, and Samer Hassan. 2021. Effect of the Gas Price Surges on User Activity in the DAOs of the Ethereum Blockchain. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. 1--7."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.5555\/2882747.2882758"},{"key":"e_1_3_2_2_10_1","volume-title":"Dynamic Probabilistic Selling When Customers Have Boundedly Rational Expectations. Manufacturing & Service Operations Management","author":"Huang Tingliang","year":"2020","unstructured":"Tingliang Huang and Zhe Yin . 2020. Dynamic Probabilistic Selling When Customers Have Boundedly Rational Expectations. Manufacturing & Service Operations Management ( 2020 ). Tingliang Huang and Zhe Yin. 2020. Dynamic Probabilistic Selling When Customers Have Boundedly Rational Expectations. Manufacturing & Service Operations Management (2020)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1057\/palgrave.rpm.5160073"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_12_1","DOI":"10.2307\/1914185"},{"doi-asserted-by":"crossref","unstructured":"Daniel Kahneman and Amos Tversky. 2013. Prospect theory: An analysis of decision under risk. In Handbook of the fundamentals of financial decision making: Part I. World Scientific 99--127.  Daniel Kahneman and Amos Tversky. 2013. Prospect theory: An analysis of decision under risk. In Handbook of the fundamentals of financial decision making: Part I. World Scientific 99--127.","key":"e_1_3_2_2_13_1","DOI":"10.1142\/9789814417358_0006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.1111\/poms.13087"},{"key":"e_1_3_2_2_15_1","volume-title":"Optimal Privacy-Preserving Data Collection: A Prospect Theory Perspective. In 2017 IEEE Global Communications Conference, GLOBECOM 2017","author":"Liao Guocheng","year":"2017","unstructured":"Guocheng Liao , Xu Chen , and Jianwei Huang . 2017 . Optimal Privacy-Preserving Data Collection: A Prospect Theory Perspective. In 2017 IEEE Global Communications Conference, GLOBECOM 2017 , Singapore , December 4-8, 2017. IEEE, 1--6. https:\/\/doi.org\/10.1109\/GLOCOM.2017.8254991 Guocheng Liao, Xu Chen, and Jianwei Huang. 2017. Optimal Privacy-Preserving Data Collection: A Prospect Theory Perspective. In 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017. IEEE, 1--6. https:\/\/doi.org\/10.1109\/GLOCOM.2017.8254991"},{"key":"e_1_3_2_2_16_1","volume-title":"Media Conference (GEM). 1--8. https:\/\/doi.org\/10","author":"Min Tian","year":"2019","unstructured":"Tian Min and Wei Cai . 2019 . A Security Case Study for Blockchain Games. In 2019 IEEE Games, Entertainment , Media Conference (GEM). 1--8. https:\/\/doi.org\/10 .1109\/GEM.2019.8811555 Tian Min and Wei Cai. 2019. A Security Case Study for Blockchain Games. In 2019 IEEE Games, Entertainment, Media Conference (GEM). 1--8. https:\/\/doi.org\/10.1109\/GEM.2019.8811555"},{"key":"e_1_3_2_2_17_1","volume-title":"Portrait of decentralized application users: an overview based on large-scale Ethereum data. CCF Transactions on Pervasive Computing and Interaction","author":"Min Tian","year":"2022","unstructured":"Tian Min and Wei Cai . 2022. Portrait of decentralized application users: an overview based on large-scale Ethereum data. CCF Transactions on Pervasive Computing and Interaction ( 2022 ), 1--18. Tian Min and Wei Cai. 2022. Portrait of decentralized application users: an overview based on large-scale Ethereum data. CCF Transactions on Pervasive Computing and Interaction (2022), 1--18."},{"key":"e_1_3_2_2_18_1","volume-title":"Blockchain Games: A Survey. In 2019 IEEE Conference on Games (CoG). 1--8. https:\/\/doi.org\/10","author":"Min T.","year":"2019","unstructured":"T. Min , H. Wang , Y. Guo , and W. Cai . 2019 . Blockchain Games: A Survey. In 2019 IEEE Conference on Games (CoG). 1--8. https:\/\/doi.org\/10 .1109\/CIG. 2019 .8848111 T. Min, H. Wang, Y. Guo, and W. Cai. 2019. Blockchain Games: A Survey. In 2019 IEEE Conference on Games (CoG). 1--8. https:\/\/doi.org\/10.1109\/CIG.2019.8848111"},{"unstructured":"Tassi P. 2018. EA now seems legitimately terrified of loot boxes after ?Battlefront 2.' Forbes (April 17). Website. https:\/\/www.forbes.com\/sites\/insertcoin\/2018\/04\/17\/ea-now-seems-legitimately-terrified-of-loot-boxes-after-battlefront-2\/'sh=51e6f001648e.  Tassi P. 2018. EA now seems legitimately terrified of loot boxes after ?Battlefront 2.' Forbes (April 17). Website. https:\/\/www.forbes.com\/sites\/insertcoin\/2018\/04\/17\/ea-now-seems-legitimately-terrified-of-loot-boxes-after-battlefront-2\/'sh=51e6f001648e.","key":"e_1_3_2_2_19_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1155\/2018\/5932183"},{"volume-title":"Cloud Based Secure Service Providing for IoTs Using Blockchain. In 2019 IEEE Global Communications Conference (GLOBECOM). 1--7.","author":"Rehman M.","unstructured":"M. Rehman , N. Javaid , M. Awais , M. Imran , and N. Naseer . 2019 . Cloud Based Secure Service Providing for IoTs Using Blockchain. In 2019 IEEE Global Communications Conference (GLOBECOM). 1--7. M. Rehman, N. Javaid, M. Awais, M. Imran, and N. Naseer. 2019. Cloud Based Secure Service Providing for IoTs Using Blockchain. In 2019 IEEE Global Communications Conference (GLOBECOM). 1--7.","key":"e_1_3_2_2_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1016\/j.ijresmar.2013.08.006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1007\/s11166-007-9029-2"},{"key":"e_1_3_2_2_24_1","volume-title":"Subjective probability and expected utility without additivity. Econometrica: Journal of the Econometric Society","author":"Schmeidler David","year":"1989","unstructured":"David Schmeidler . 1989. Subjective probability and expected utility without additivity. Econometrica: Journal of the Econometric Society ( 1989 ), 571--587. David Schmeidler. 1989. Subjective probability and expected utility without additivity. Econometrica: Journal of the Econometric Society (1989), 571--587."},{"key":"e_1_3_2_2_25_1","volume-title":"N Gayathri, S Rakesh Kumar, and C Ramesh.","author":"Sharma Sandeep Kr","year":"2020","unstructured":"Sandeep Kr Sharma , Rajiv Kumar Modanval , N Gayathri, S Rakesh Kumar, and C Ramesh. 2020 . IMPACT OF APPLICATION OF BIG DATA ON CRYPTOCURRENCY. Cryptocurrencies and Blockchain Technology Applications ( 2020), 181--195. Sandeep Kr Sharma, Rajiv Kumar Modanval, N Gayathri, S Rakesh Kumar, and C Ramesh. 2020. IMPACT OF APPLICATION OF BIG DATA ON CRYPTOCURRENCY. Cryptocurrencies and Blockchain Technology Applications (2020), 181--195."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_26_1","DOI":"10.1109\/SmartGridComm.2017.8340700"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1109\/ACCESS.2018.2805837"},{"key":"e_1_3_2_2_28_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014 . Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper , Vol. 151 , 2014 (2014), 1--32. Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, Vol. 151, 2014 (2014), 1--32."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"ASIA CCS '22","name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","location":"Nagasaki Japan"},"container-title":["Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494106.3528675","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494106.3528675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:45Z","timestamp":1750188645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494106.3528675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":28,"alternative-id":["10.1145\/3494106.3528675","10.1145\/3494106"],"URL":"https:\/\/doi.org\/10.1145\/3494106.3528675","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}