{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:20:31Z","timestamp":1760145631441,"version":"build-2065373602"},"reference-count":82,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T00:00:00Z","timestamp":1723075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Mobile applications (Apps) serve as vital conduits for information exchange in the mobile internet era, yet they also engender significant cybersecurity risks due to their real-time handling of vast quantities of data. This manuscript constructs a tripartite evolutionary game model, \u201cusers-App providers-government\u201d, to illuminate a pragmatic pathway for orderly information circulation within the App marketplace and sustainable industry development. It then scrutinizes the evolutionary process and emergence conditions of their stabilizing equilibrium strategies and employs simulation analysis via MATLAB. The findings reveal that (1) there exists a high degree of coupling among the strategic selections of the three parties, wherein any alteration in one actor\u2019s decision-making trajectory exerts an impact on the evolutionary course of the remaining two actors. (2) The initial strategies significantly influence the pace of evolutionary progression and its outcome. Broadly speaking, the higher the initial probabilities of users opting for information authorization, App providers adopting compliant data solicitation practices, and the government enforcing stringent oversight, the more facile the attainment of an evolutionarily optimal solution. (3) The strategic preferences of the triadic stakeholders are subject to a composite influence of respective costs, benefits, and losses. Of these, users\u2019 perceived benefits serve as the impetus for their strategic decisions, while privacy concerns act as a deterrent. App providers\u2019 strategy decisions are influenced by a number of important elements, including their corporate reputation and fines levied by the government. Costs associated with government regulations are the main barrier to the adoption of strict supervision practices. Drawing upon these analytical outcomes, we posit several feasible strategies.<\/jats:p>","DOI":"10.3390\/bdcc8080090","type":"journal-article","created":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T09:48:54Z","timestamp":1723196934000},"page":"90","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Inquiry into the Evolutionary Game among Tripartite Entities and Strategy Selection within the Framework of Personal Information Authorization"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9306-987X","authenticated-orcid":false,"given":"Jie","family":"Tang","sequence":"first","affiliation":[{"name":"China Academy of Information and Communications Technology, Beijing 100191, China"}]},{"given":"Zhiyi","family":"Peng","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, Beijing 100191, China"}]},{"given":"Wei","family":"Wei","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, Beijing 100191, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,8,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.ijinfomgt.2015.11.009","article-title":"Information security management needs more holistic approach: A literature review","volume":"36","author":"Soomro","year":"2016","journal-title":"Int. J. Inf. Manag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1016\/j.telpol.2014.10.002","article-title":"Big data\u05f3 s impact on privacy, security and consumer welfare","volume":"38","author":"Kshetri","year":"2014","journal-title":"Telecommun. Policy"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.chb.2018.01.028","article-title":"The impact of information security threat awareness on privacy-protective behaviors","volume":"83","author":"Mamonov","year":"2018","journal-title":"Comput. Hum. Behav."},{"key":"ref_4","unstructured":"IBM Security (2023, July 24). Cost of a Data Breach Report 2023 [EB\/OL]. Available online: https:\/\/www.ibm.com\/downloads\/cas\/E3G5JMBP."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.61969\/jai.1337500","article-title":"Education in the era of generative artificial intelligence (AI): Understanding the potential benefits of ChatGPT in promoting teaching and learning","volume":"7","author":"Ansah","year":"2023","journal-title":"J. AI"},{"key":"ref_6","first-page":"277","article-title":"Generative AI and ChatGPT: Applications, challenges, and AI-human collaboration","volume":"25","author":"Zheng","year":"2023","journal-title":"J. Inf. Technol. Case Appl. Res."},{"key":"ref_7","first-page":"102","article-title":"Unveiling security, privacy, and ethical concerns of ChatGPT","volume":"2","author":"Wu","year":"2024","journal-title":"J. Inf. Intell."},{"key":"ref_8","unstructured":"Musto, J. (2023, June 29). OpenAI, Microsoft Face Class-Action Suit over Internet Data Use for AI Models [EB\/OL]. Available online: https:\/\/www.foxnews.com\/tech\/openai-microsoft-face-class-action-suit-internet-data-use-ai-models."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sun, Y., Zhang, Y.F., Wang, Y., and Zhang, S. (Kybernetes, 2023). Cooperative governance mechanisms for personal information security: An evolutionary game approach, Kybernetes, ahead-of-print.","DOI":"10.1108\/K-04-2023-0717"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.ijinfomgt.2019.04.011","article-title":"Stakeholder perceptions of information security policy: Analyzing personal constructs","volume":"50","author":"Samonas","year":"2020","journal-title":"Int. J. Inf. Manag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.jpubeco.2019.02.001","article-title":"Privacy and personal data collection with information externalities","volume":"173","author":"Choi","year":"2019","journal-title":"J. Public Econ."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"601","DOI":"10.25300\/MISQ\/2019\/14751","article-title":"A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts","volume":"43","author":"Wang","year":"2019","journal-title":"MIS Q."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.jnca.2016.01.008","article-title":"A survey on data leakage prevention systems","volume":"62","author":"Alneyadi","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2554","DOI":"10.1109\/ACCESS.2015.2506185","article-title":"Data and information leakage prevention within the scope of information security","volume":"3","author":"Hauer","year":"2015","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1108\/08876041011040622","article-title":"Reducing online privacy risk to facilitate e-service adoption: The influence of perceived ease of use and corporate credibility","volume":"24","author":"Featherman","year":"2010","journal-title":"J. Serv. Mark."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1770","DOI":"10.1109\/ACCESS.2020.3047337","article-title":"Online social deception and its countermeasures: A survey","volume":"9","author":"Guo","year":"2020","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25148854","article-title":"Internet users\u2019 information privacy-protective responses: A taxonomy and a nomological model","volume":"32","author":"Son","year":"2008","journal-title":"MIS Q."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1016\/j.im.2018.11.004","article-title":"Falsifying and withholding: Exploring individuals\u2019 contextual privacy-related decision-making","volume":"56","author":"Miltgen","year":"2019","journal-title":"Inf. Manag."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1428","DOI":"10.1016\/j.ijinfomgt.2016.10.006","article-title":"Let the users tell the truth: Self-disclosure intention and self-disclosure honesty in mobile social networking","volume":"37","author":"Wang","year":"2017","journal-title":"Int. J. Inf. Manag."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.lrp.2005.04.007","article-title":"Pitfalls in evaluating market orientation: An exploration of executives\u2019 interpretations","volume":"38","author":"Mason","year":"2005","journal-title":"Long Range Plan."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1057\/s41264-022-00154-z","article-title":"Trust and digital privacy: Willingness to disclose personal information to banking chatbot services","volume":"28","author":"Lappeman","year":"2023","journal-title":"J. Financ. Serv. Mark."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"103385","DOI":"10.1016\/j.jretconser.2023.103385","article-title":"Consumer s\u2019 willingness to disclose their personal data in e-commerce: A reciprocity-based social exchange perspective","volume":"74","author":"Degutis","year":"2023","journal-title":"J. Retail. Consum. Serv."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.ijinfomgt.2019.05.010","article-title":"Mobile users\u2019 information privacy concerns and the role of app permission requests","volume":"50","author":"Degirmenci","year":"2020","journal-title":"Int. J. Inf. Manag."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1111\/isj.12195","article-title":"The effect of role conflict on self-disclosure in social network sites: An integrated perspective of boundary regulation and dual process model","volume":"29","author":"Liu","year":"2019","journal-title":"Inf. Syst. J."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1002\/asi.23206","article-title":"How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost","volume":"66","author":"Min","year":"2015","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"ref_26","first-page":"3356","article-title":"Strategic approach to privacy calculus of wearable device user regarding information disclosure and continuance intention","volume":"12","author":"Cho","year":"2018","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1038\/246015a0","article-title":"The logic of animal conflict","volume":"246","author":"Smith","year":"1973","journal-title":"Nature"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1126\/science.1093411","article-title":"Evolutionary dynamics of biological games","volume":"303","author":"Nowak","year":"2004","journal-title":"Science"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"10757","DOI":"10.1073\/pnas.161155698","article-title":"Reward and punishment","volume":"98","author":"Sigmund","year":"2001","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1073\/pnas.36.1.48","article-title":"Equilibrium points in n-person games","volume":"36","author":"Nash","year":"1950","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/0025-5564(78)90077-9","article-title":"Evolutionary stable strategies and game dynamics","volume":"40","author":"Taylor","year":"1978","journal-title":"Math. Biosci."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.comnet.2018.11.036","article-title":"Incorporating social interaction into three-party game towards privacy protection in IoT","volume":"150","author":"Li","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wang, S., Chen, Z., Xiao, Y., and Lin, C. (2021). Consumer privacy protection with the growth of AI-empowered online shopping based on the evolutionary game model. Front. Public Health, 9.","DOI":"10.3389\/fpubh.2021.705777"},{"key":"ref_34","unstructured":"Binmore, K.G. (1994). Game Theory and the Social Contract: Just Playing, MIT Press."},{"key":"ref_35","first-page":"125231","article-title":"The impact of interactive dependence on privacy protection behavior based on evolutionary game","volume":"379","author":"Mengibaev","year":"2020","journal-title":"Appl. Math. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1108\/K-02-2019-0125","article-title":"The integration role of governmental information disclosure platform: An evolutionary game analysis of corporate environmental monitoring data fraud","volume":"49","author":"Peng","year":"2019","journal-title":"Kybernetes"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"109592","DOI":"10.1016\/j.jenvman.2019.109592","article-title":"An evolutionary game analysis of governments\u2019 decision-making behaviors and factors influencing watershed ecological compensation in China","volume":"251","author":"Gao","year":"2019","journal-title":"J. Environ. Manag."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"113499","DOI":"10.1016\/j.jenvman.2021.113499","article-title":"Evolutionary game analysis on industrial pollution control of local government in China","volume":"298","author":"Fan","year":"2021","journal-title":"J. Environ. Manag."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"9933796","DOI":"10.1155\/2021\/9933796","article-title":"Food safety risk communication between the food regulator and consumer in China: An evolutionary game perspective","volume":"2021","author":"Zhu","year":"2021","journal-title":"Complexity"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Peng, X., Wang, F., Wang, J., and Qian, C. (2022). Research on food safety control based on evolutionary game method from the perspective of the food supply chain. Sustainability, 14.","DOI":"10.3390\/su14138122"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Yan, H., Wei, H., and Wei, M. (2021). Exploring tourism recovery in the post-COVID-19 period: An evolutionary game theory approach. Sustainability, 13.","DOI":"10.3390\/su13169162"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1177\/1354816619898078","article-title":"Evolutionary game analysis of land income distribution in tourism development","volume":"27","author":"Qingyun","year":"2021","journal-title":"Tour. Econ."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Wang, S., Li, L., Sun, W., Guo, J., Bie, R., and Lin, K. (2017). Context sensing system analysis for privacy preservation based on game theory. Sensors, 17.","DOI":"10.3390\/s17020339"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1186\/s13673-016-0069-y","article-title":"Cooperative privacy game: A novel strategy for preserving privacy in data publishing","volume":"6","author":"Kumari","year":"2016","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Wang, Z., Yuan, C., and Li, X. (2023). Evolutionary analysis of the regulation of data abuse in digital platforms. Systems, 11.","DOI":"10.3390\/systems11040188"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Gao, Y., Zhu, Z., and Yang, J. (2023). An Evolutionary Game Analysis of Stakeholders\u2019 Decision-Making Behavior in Medical Data Sharing. Mathematics, 11.","DOI":"10.3390\/math11132921"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Zhu, G., Liu, H., and Feng, M. (2018). An evolutionary game-theoretic approach for assessing privacy protection in mHealth systems. Int. J. Environ. Res. Public Health, 15.","DOI":"10.3390\/ijerph15102196"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Liu, F., Pan, L., and Yao, L.H. (2018, January 18\u201321). Evolutionary game based analysis for user privacy protection behaviors in social networks. Proceedings of the 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), Guangzhou, China.","DOI":"10.1109\/DSC.2018.00046"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1109\/TIFS.2017.2758756","article-title":"Community-structured evolutionary game for privacy protection in social networks","volume":"13","author":"Du","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Gao, S., Ling, S., and Liu, W. (2018). The role of social media in promoting information disclosure on environmental incidents: An evolutionary game theory perspective. Sustainability, 10.","DOI":"10.20944\/preprints201809.0350.v1"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1016\/j.pmcj.2012.07.011","article-title":"Trading privacy with incentives in mobile commerce: A game theoretic approach","volume":"9","author":"Chorppath","year":"2013","journal-title":"Pervasive Mob. Comput."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Xu, Z., Chen, X., and Hong, Y. (2022). Evolutionary game\u2014Theoretic approach for analyzing user privacy disclosure behavior in online health communities. Appl. Sci., 12.","DOI":"10.3390\/app12136603"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1055817","DOI":"10.1155\/2022\/1055817","article-title":"Research on Digital Information Privacy Behavior of Social Network Users Based on Evolutionary Game","volume":"2022","author":"Gu","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"85429","DOI":"10.1109\/ACCESS.2022.3198705","article-title":"Tripartite Evolutionary Game of Multiparty Collaborative Supervision of Personal Information Security in App: Empirical Evidence From China","volume":"10","author":"Guo","year":"2022","journal-title":"IEEE Access"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Xie, Y., Ma, Y., Shen, J., and Li, A. (2022, January 14\u201316). A game theoretic approach toward privacy preserving for mobile learning data sharing. Proceedings of the 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE), Guangzhou, China.","DOI":"10.1109\/ICCECE54139.2022.9712732"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","article-title":"Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon","volume":"64","author":"Kokolakis","year":"2017","journal-title":"Comput. Secur."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","article-title":"Privacy as a concept and a social issue, A multidimensional developmental theory","volume":"33","author":"Laufer","year":"1977","journal-title":"J. Soc. Issues"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2307\/25148715","article-title":"The personalization privacy paradox, an empirical evaluation of information transparency and the willingness to be profiled online for personalization","volume":"30","author":"Awad","year":"2006","journal-title":"MIS Q."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1111\/j.1540-4560.1977.tb01882.x","article-title":"The concept privacy and its biological basis","volume":"33","author":"Klopfer","year":"1977","journal-title":"J. Soc. Issues"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/S0957-1787(99)00008-9","article-title":"Regulatory governance: Criteria for assessing the performance of regulatory systems: An application to infrastructure industries in the develo** countries of Asia","volume":"8","author":"Stern","year":"1999","journal-title":"Util. Policy"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"135","DOI":"10.2753\/MIS0742-1222260305","article-title":"The role of push-pull technology in privacy calculus: The case of location-based services","volume":"26","author":"Xu","year":"2009","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1108\/ITP-03-2018-0132","article-title":"What drives self-disclosure in mobile payment applications? The effect of privacy assurance approaches, network externality, and technology complementarity","volume":"33","author":"Gong","year":"2020","journal-title":"Inf. Technol. People"},{"key":"ref_63","first-page":"233","article-title":"Privacy and law enforcement in the European union: The data retention directive","volume":"8","author":"Bignami","year":"2007","journal-title":"Chi. J. Int\u2019l L."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1257\/pandp.20181003","article-title":"Should we treat data as labor? Moving beyond \u201cfree\u201d","volume":"108","author":"Goff","year":"2018","journal-title":"AEA Pap. Proc."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1111\/1756-2171.12382","article-title":"Competing data intermediaries","volume":"52","author":"Ichihashi","year":"2021","journal-title":"RAND J. Econ."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Bourreau, M., Hofmann, J., and Kr\u00e4mer, J. (2021). Prominence-for-Data Schemes in Digital Platform Ecosystems: Economic Implications for Platform Bias and Consumer Data Collection. Innovation Through Information Systems: Volume III: A Collection of Latest Research on Management Issues, Springer International Publishing.","DOI":"10.1007\/978-3-030-86800-0_36"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"100876","DOI":"10.1016\/j.infoecopol.2020.100876","article-title":"Separation: A cure for abuse of platform dominance?","volume":"54","author":"Gilbert","year":"2021","journal-title":"Inf. Econ. Policy"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"107910","DOI":"10.1016\/j.ijpe.2020.107910","article-title":"How to govern the big data discriminatory pricing behavior in the platform service supply chain? An examination with a three-party evolutionary game model","volume":"231","author":"Liu","year":"2021","journal-title":"Int. J. Prod. Econ."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"17483026231157204","DOI":"10.1177\/17483026231157204","article-title":"Research on the evolution of tripartite data protection strategy based on game theory","volume":"17","author":"Yang","year":"2023","journal-title":"J. Algorithms Comput. Technol."},{"key":"ref_70","first-page":"35","article-title":"An examination of the nature of trust in buyer\u2013seller relationships","volume":"61","author":"Doney","year":"1997","journal-title":"J. Mark."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1057\/palgrave.crr.1540106","article-title":"Corporate reputation and performance in Germany","volume":"3","author":"Dunbar","year":"2000","journal-title":"Corp. Reput. Rev."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1002\/smj.274","article-title":"Corporate reputation and sustained superior financial performance","volume":"23","author":"Roberts","year":"2002","journal-title":"Strateg. Manag. J."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"82","DOI":"10.2307\/41166372","article-title":"Communicating Corporate Reputation Through Stories","volume":"49","author":"Dowling","year":"2006","journal-title":"Calif. Manag. Rev."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"123","DOI":"10.2753\/MIS0742-1222220305","article-title":"Moderating Effects of Task Type on Wireless Technology Acceptance","volume":"22","author":"Fang","year":"2005","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"113858","DOI":"10.1016\/j.jbusres.2023.113858","article-title":"Evolutionary game of platform enterprises, government and consumers in the context of digital economy","volume":"167","author":"Li","year":"2023","journal-title":"J. Bus. Res."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"55","DOI":"10.2307\/3054034","article-title":"The legal cultures of Europe","volume":"30","author":"Gibson","year":"1996","journal-title":"Law Soc. Rev."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1111\/1540-4560.00067","article-title":"Consumer privacy: Balancing economic and justice considerations","volume":"59","author":"Culnan","year":"2003","journal-title":"J. Soc. Issues"},{"key":"ref_78","first-page":"95","article-title":"Bucking the Kuznets curve: Designing effective environmental regulation in developing countries","volume":"51","author":"Faure","year":"2010","journal-title":"Va. J. Int\u2019l L."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Shi, T., Xiao, H., Han, F., Chen, L., and Shi, J. (2022). A regulatory game analysis of smart aging platforms considering privacy protection. Int. J. Environ. Res. Public Health, 19.","DOI":"10.3390\/ijerph19095778"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s001910050054","article-title":"On economic applications of evolutionary game theory","volume":"8","author":"Friedman","year":"1998","journal-title":"J. Evol. Econ."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/S0022-5193(80)81038-1","article-title":"A Note On Evolutionarily Stable Strategies in Asymmetric Animal Conflicts","volume":"84","author":"Selten","year":"1980","journal-title":"J. Theor. Biol."},{"key":"ref_82","first-page":"637","article-title":"Evolutionary games in economics","volume":"59","author":"Friedman","year":"1991","journal-title":"Econom. J. Econom. Soc."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/8\/90\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:32:13Z","timestamp":1760110333000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/8\/90"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,8]]},"references-count":82,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["bdcc8080090"],"URL":"https:\/\/doi.org\/10.3390\/bdcc8080090","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2024,8,8]]}}}