期刊文献+

个人云服务用户采纳行为的演化博弈分析 被引量:2

Evolutionary Game Analysis on User Adoption Behavior of Personal Cloud Service
原文传递
导出
摘要 个人云服务优势的实现和市场的发展很大程度上取决于用户的采纳和持续使用。通过个人云服务用户采纳行为的研究,以期对个人云服务提供商和用户良好交互的实现提供决策支持。基于此,引入演化博弈理论,分别构建了个人云服务用户在服务协商阶段和服务使用阶段的采纳行为博弈模型以及双方博弈的支付矩阵。研究发现:在服务协商阶段,个人云服务提供商给用户带来的收益决定了双方的合作基础;在服务使用阶段,个人云服务用户在多次博弈中的行为改变了用户自身的信任值,而个人云服务提供商对用户行为信息的时间积累是进行用户信任值评估的重要依据。 The realization of the advantage of personal cloud service and the development of the market largely depend on the users' adoption and continuous use. The study on user adoption behavior of personal cloud service is expected to provide decision support for realizing a good interaction between personal cloud service providers and users. Based on this, the evolutionary game theory is introduced to respectively construct the game model of adoption behavior and the payment matrix of the two parties during the service negotiation stage and the service use stage of personal cloud service. The results show that in the stage of service negotiation, the benefit brought by personal cloud service providers to users determines the cooperation basis of both parties. During the service use phase, the behavior of the personal cloud service user in multiple games triggers the change of the user's own trust value, and the time accumulation of personal cloud service provider to user behavior information is an important basis for the evaluation of user's trust value.
出处 《图书馆学研究》 CSSCI 北大核心 2018年第5期51-57,共7页 Research on Library Science
基金 本文系国家自然科学基金青年项目:“面向个人用户的云存储服务使用行为机理及安全风险控制研究”(项目编号:71603075)的研究成果之一.
关键词 演化博弈分析 个人云服务 云服务采纳 云服务行为 evolutionary game analysis personal cloud service cloud service adoption cloud Service behavior
  • 相关文献

参考文献9

二级参考文献158

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2冯晓玉,张秀珍.图书馆在知识转移中的作用研究[J].图书馆学研究,2007(5):79-80. 被引量:16
  • 3刘芸.学生测评教学质量过程中的博弈分析[J].厦门理工学院学报,2007,15(2):101-104. 被引量:4
  • 4Tian Liqin, Lin Chuang, Sun Jinxia. A kind of prediction method of user behaviour for future trustworthy network[A ]. Proc. of ICCT' 06[ C 1. Beijing: lEvEE Press, 2006. 199 - 202.
  • 5K Murali, T V Lakshman, Detecting network intrusions via sampling:a game theoretic approach[ A ]. Proceedings of INFOCOM 2003 [ C]. San Francisco: IEEE Press, 2003. 1880 - 1889.
  • 6Wang Wenjing,M Chatterjee,K Kwiat. Coexistence with malicious nodes: A game theoretic approach [A ]. Proc of GameNets' 09[ C]. Istanbul: IEEE Press, 2009.277 - 286.
  • 7Wang Yuanzhuo,Lin Chuang, Wang Yang,Meng Kun. Security analysis of enterprise network based on stochastic game nets model[A]. Proc. of ICC'09[C]. Dresden: IEEE Press, 2009.1-5.
  • 8Drew Fudenberg, Jean Tirole. Game Theory[M]. Cambridge, Mass: MIT Press, 1991.
  • 9Wang Yuanzhuo,Lin Chuang,Yang Yang,et al.A Game-based Intrusion Tolerant Mechanism for Grid Service[C]//Proc.of the 5th International Conference on Grid and Cooperative Computing.[S.l.]:IEEE Press,2006:380-386.
  • 10Patcha A,Jung-Min Park.A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks[D].WestPoint,NY,USA:United States Military Academy,2004-06.

共引文献93

同被引文献12

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部