期刊文献+

移动商务信任的演化博弈及动态仿真 被引量:3

Evolutionary Game and Dynamic Simulation of Trust in Mobile Commerce
下载PDF
导出
摘要 用户信任是影响移动商务成功的关键因素之一,其形成与发展是一个动态演化的过程.运用演化博弈理论,研究用户信任的演化均衡状态,并应用Netlogo进行仿真.研究显示,建立潜在用户的信任,移动商家应采取主动发出可信信号;对于老用户,应致力于提升用户满意度;监管机制应随着移动商务的发展来调整其具体政策,在严格管理的同时营造适当宽松的发展环境,对受损用户的补偿和对失信商家的惩处,在初期应较大,随着监管机构提高其发现商家失信行为的概率,额度可以逐步减小. Customer's trust is one of the critical success factors of mobile commerce. Its formation and development is a dynamic evolutionary process. Using evolutionary game theory to study the evolution of customer trust equilibrium, and simulation application Netlogo. Studies have shown that to establish the confidence of potential users, m-merchants should take the initiative to issue a credible signal; For old users, should be committed to enhance customer satisfaction; regulatory mechanisms should adjust its policy with the development of m-commerce in the strict management create appropriate and comfortable environment for development, compensation to customers and punishment to dishonesty m-merchants should be larger at an early stage, with the regulatory authorities to improve the probability of its discovery merchants acts of dishonesty, the amount can be gradually reduced.
出处 《计算机系统应用》 2013年第7期1-6,共6页 Computer Systems & Applications
基金 国家自然科学基金委创新群体资助项目(70921001/G0104) 湖南省哲学社会科学基金(11YBB394)
关键词 移动商务 信任 演化博弈 Netlogo仿真 动态 mobile commerce trust evolutionary game Netlogo simulation dynamic
  • 相关文献

参考文献14

二级参考文献80

共引文献127

同被引文献36

  • 1Li X, Liu L. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. on Knowledge Data Engineering, 2004,16(7): 843-857.
  • 2Kuter U, Golbeck J. Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models. Proc. of 22nd AAAI conf on Artificial Intelligence. Vancouver, AAAI Press. 2007. 1377-1382.
  • 3Richters O, Peixoto TP. Trust transitivity in social networks. PloS One, 2011, 6(4): 1-14.
  • 4Verbiest N, Cornelis C, Victor P, Herrera-Viedma E. Trust and distrust aggregation enhanced with path length incorporation. Fuzzy Sets and Systems, 2012, 202: 61-74.
  • 5Li X, Zhou F, Yang X. A multi-dimensional trust evaluation model for large-scale P2P computing. Journal of Parallel and Distributed Computing, 2011, 71(6): 837-847.
  • 6Sensoy M, Pan JZ, Fokoue A, Srivatsa M, Meneguzzi E Using subjective logic to handle uncertainty and conflicts. Proc of llth Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom). Liverpool, IEEE Computer Society. 2012. 1323-1326.
  • 7Jiang L, Xu J, Zhang K, Zhang H. A new evidential trust model for open distributed systems. Expert Systems with Applications, 2012, 39(3): 3772-3782.
  • 8Costa LF, Rodrigues FA, Travieso G, Villas Boas PR. Characterization of complex networks: A survey of measurements. Advances in Physics, 2007, 56(1): 167-242.
  • 9Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems 1998, 30(1): 107-117.
  • 10Kleinberg JM. Authoritative sources in a hyperlinked environment. Journal of the ACM, 1999, 46(5): 604-632.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部