{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:00:47Z","timestamp":1760061647767,"version":"3.37.3"},"reference-count":37,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572528"],"award-info":[{"award-number":["61572528"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>The existing incentive mechanisms of crowdsourcing construct the expected utility function based on the assumption of rational people in traditional economics. A large number of studies in behavioral economics have demonstrated the defects of the traditional utility function and introduced a new parameter called loss aversion coefficient to calculate individual utility when it suffers a loss. In this paper, combination of behavioral economics and a payment algorithm based on the loss aversion is proposed. Compared with usual incentive mechanisms, the node utility function is redefined by the loss aversion characteristic of the node. Experimental results show that the proposed algorithm can get a higher rate of cooperation with a lower payment price and has good scalability compared with the traditional incentive mechanism.<\/jats:p>","DOI":"10.1155\/2018\/4350183","type":"journal-article","created":{"date-parts":[[2018,4,12]],"date-time":"2018-04-12T19:34:37Z","timestamp":1523561677000},"page":"1-18","source":"Crossref","is-referenced-by-count":7,"title":["Analysis of Behavioral Economics in Crowdsensing: A Loss Aversion Cooperation Model"],"prefix":"10.1155","volume":"2018","author":[{"given":"Deng","family":"Li","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]},{"given":"Liying","family":"Qiu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5586-7718","authenticated-orcid":true,"given":"Jiaqi","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software, Central South University, Changsha 410083, China"}]},{"given":"Congwen","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, Northeastern University, Qinhuangdao 066000, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2888398"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3390\/s16010088"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0508-6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1517\/14728222.2016.1125884"},{"journal-title":"Computer Science","year":"2014","key":"6"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1111\/eth.12636"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1037\/\/0033-295X.99.4.689"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25658-0_5"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2379281"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2686085"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478739"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2837029"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2415528"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5757125"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s13218-016-0477-1"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30913-2_14"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600746CM"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2645138"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2387836"},{"issue":"8","key":"31","first-page":"2025","volume":"27","year":"2016","journal-title":"Journal of Software. Ruanjian Xuebao"},{"journal-title":"Working Papers","year":"2017","key":"32"},{"journal-title":"Handbook of Behavioural Economics and Smart Decision-Making","year":"2017","key":"34"},{"volume-title":"Theories of Economic Decision-Making: Value, Risk and Affect","year":"2017","key":"35"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1057\/eej.2015.42"},{"year":"2015","key":"37"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/BF00122574"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1041.2017.00262"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2017.05.053"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1037\/a0039996"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2655266"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-015-1947-9"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1037\/xlm0000384"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2676958"},{"journal-title":"Journal of Risk & Insurance","year":"2017","key":"46"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0161477"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolecon.2016.08.008"},{"volume-title":"Monkey business: can capuchins understand money","year":"2005","key":"49"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2018\/4350183.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2018\/4350183.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2018\/4350183.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,12]],"date-time":"2018-04-12T19:34:41Z","timestamp":1523561681000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2018\/4350183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":37,"alternative-id":["4350183","4350183"],"URL":"https:\/\/doi.org\/10.1155\/2018\/4350183","relation":{},"ISSN":["1058-9244","1875-919X"],"issn-type":[{"type":"print","value":"1058-9244"},{"type":"electronic","value":"1875-919X"}],"subject":[],"published":{"date-parts":[[2018]]}}}