{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:01:22Z","timestamp":1753887682524,"version":"3.41.2"},"reference-count":21,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T00:00:00Z","timestamp":1618531200000},"content-version":"vor","delay-in-days":105,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71974063"],"award-info":[{"award-number":["71974063"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Individuals with different levels of education have substantial differences in their willingness to communicate with malicious nodes in a group; thus, the results of evolution of opinions tend to differ significantly. In this study, malicious nodes, driven by the benefits of a game, were added to groups of individuals with different levels of education, and a theoretical model of the game theory of group opinions that introduces malicious nodes was established. The influence of the proportion of malicious node spreading messages, the extent of tampering when malicious nodes spread messages, and the distribution of education levels in the group on the evolution of group opinions were considered. It was found that the rate of evolution of group opinions declined in groups with higher average education levels. The results of this study can be used to explain the phenomenon of fewer knowledge exchange behaviors in communities with high education levels, as is found in actual sociology. The reason is that highly educated individuals are more affected by distorted news when communicating. Therefore, the loss of communication with malicious nodes is greater, resulting in lower vigilance and willingness to communicate.<\/jats:p>","DOI":"10.1155\/2021\/6642698","type":"journal-article","created":{"date-parts":[[2021,4,17]],"date-time":"2021-04-17T00:20:29Z","timestamp":1618618829000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Opinion Evolution Model Based on Heterogeneous Benefit with Malicious Nodes Added"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4875-5069","authenticated-orcid":false,"given":"Junwei","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2254-460X","authenticated-orcid":false,"given":"Xi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,4,16]]},"reference":[{"key":"e_1_2_8_1_2","doi-asserted-by":"publisher","DOI":"10.1108\/jkm-07-2016-0274"},{"key":"e_1_2_8_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2009.10.003"},{"key":"e_1_2_8_3_2","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/86\/30007"},{"key":"e_1_2_8_4_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0026724"},{"key":"e_1_2_8_5_2","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.63.030901"},{"key":"e_1_2_8_6_2","doi-asserted-by":"publisher","DOI":"10.3390\/e4020035"},{"key":"e_1_2_8_7_2","doi-asserted-by":"publisher","DOI":"10.1142\/S012918310701139X"},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2011.10.015"},{"key":"e_1_2_8_9_2","first-page":"41","article-title":"Coevolutionary opinion formation games","author":"Bhawalkar K.","year":"2013","journal-title":"Theory of Computing"},{"key":"e_1_2_8_10_2","doi-asserted-by":"publisher","DOI":"10.1177\/0037549717709349"},{"key":"e_1_2_8_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.12.062"},{"key":"e_1_2_8_12_2","article-title":"Replicator based on imitation for finite and arbitrary networked communities","volume":"378","author":"Nogales J. M. S.","year":"2020","journal-title":"Applied Mathematics and Computation"},{"key":"e_1_2_8_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/jstsp.2014.2313024"},{"key":"e_1_2_8_14_2","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2015-60270-7"},{"key":"e_1_2_8_15_2","unstructured":"ZinovievD.andDuongV. A game theoretical approach to broadcast information diffusion in social networks Proceedings of the Spring Simulation Multi-conference 2011 Boston MA USA."},{"key":"e_1_2_8_16_2","doi-asserted-by":"crossref","unstructured":"QiuW. WangY. andYuJ. A game theoretical model of information dissemination in social network Proceedings Of the International Conference on Complex Systems 2013 Taichung Taiwan.","DOI":"10.1109\/ICoCS.2012.6458551"},{"key":"e_1_2_8_17_2","doi-asserted-by":"crossref","unstructured":"YuJ. WangY. LiJ. ShenH. andChengX. Analysis of competitive information dissemination in social network based on evolutionary game model Proceedings Of the Second International Conference on Cloud & Green Computing 2013 Boston MA USA.","DOI":"10.1109\/CGC.2012.126"},{"key":"e_1_2_8_18_2","doi-asserted-by":"crossref","unstructured":"CaoX. YanC. andJiangC. An evolutionary game-theoretic modeling for heterogeneous information diffusion Proceedings Of the IEEE Global Conference on Signal & Information Processing 2015 Orlando FL USA.","DOI":"10.1109\/GlobalSIP.2014.7032216"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2015.03.080"},{"key":"e_1_2_8_20_2","article-title":"Cooperation survives and cheating pays in a dynamic network structure with unreliable reputation","volume":"6","author":"Alberto A.","year":"2016","journal-title":"Scientific Reports"},{"key":"e_1_2_8_21_2","first-page":"137","article-title":"Influencing factors of user knowledge exchange in virtual academic community","volume":"38","author":"Zhong L.","year":"2020","journal-title":"Information Science"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6642698.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6642698.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6642698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T21:59:29Z","timestamp":1723240769000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6642698"}},"subtitle":[],"editor":[{"given":"Lingzhong","family":"Guo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6642698"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6642698","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-12-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6642698"}}