Skip to main content

Game Theoretical Analysis on System Adoption and Acceptance: A Review

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10067))

Abstract

Game theory is a methodology using mathematics models to analyze the strategic interactions between participants. It has been widely used to analyze the acceptance of system models under various conditions. In this paper, we review the basic knowledge of game theory. After extensive literature study, we propose a series of model requirements that should be paid attention in game theoretical analysis. Furthermore, we classify the existing work into two categories: games in information systems and games in network systems, which have been analyzed in accordance with the aforementioned requirements. The review shows that game theory is a good tool to analyze the adoption and acceptance of a system model and can be used for improving system design towards practical deployment. Moreover, we present the advantages and limitations of existing studies, and propose future research directions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Khazaee, P.R., Mirzadi, K., Yousefi, S.: Cooperative user and storage service providers interaction in cloud computing. In: 7th Conference on Information and Knowledge Technology (IKT), pp. 1–5. IEEE (2015)

    Google Scholar 

  2. Antoniou, J., Papadopoulou, V., Vassiliou, V., Pitsillides, A.: Cooperative user–network interactions in next generation communication networks. Comput. Netw. 54, 2239–2255 (2010). ACM

    Article  MATH  Google Scholar 

  3. Cesana, M., Malanchini, I., Capone, A.: Modelling network selection and resource allocation in wireless access networks with non-cooperative games. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 404–409. IEEE (2008)

    Google Scholar 

  4. Maghrabi, L., Pfluegel, E.: Moving assets to the cloud: a game theoretic approach based on trust Cyber Situational Awareness. In: International Conference on Data Analytics and Assessment (CyberSA), pp. 1–5. IEEE (2015)

    Google Scholar 

  5. Furuncu, E., Sogukpinar, I.: Scalable risk assessment method for cloud computing using game theory (CCRAM). Comput. Stan. Interfaces 38, 44–50 (2015). Elsevier

    Article  Google Scholar 

  6. He, W., Xia, C., Wang, H., Zhang, C., Ji, Y.: A game theoretical attack-defense model oriented to network security risk assessment. In: International Conference on Computer Science and Software Engineering, vol. 6, pp. 498–504. IEEE (2008)

    Google Scholar 

  7. Wang, B., Cai, J., Zhang, S., Li, J.: A network security assessment model based on attack-defense game theory. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 3, pp. 639–643. IEEE (2010)

    Google Scholar 

  8. Rzadca, K., Datta, A., Kreitz, G., Buchegger, S.: Game-theoretic mechanisms to increase data availability in decentralized storage systems. ACM Trans. Auton. Adapt. Syst. (TAAS) 10, 14:1–14:32 (2015). ACM

    Google Scholar 

  9. Ip, A.T.S., Lui, J.C.S., Liu, J.: A revenue-rewarding scheme of providing incentive for cooperative proxy caching for media streaming systems. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 4, 5:1–5:32 (2008). ACM

    Google Scholar 

  10. Biran, D., Zack, M.H., Briotta, R.J.: Competitive intelligence and information quality: a game-theoretic perspective. J. Data Inf. Qual. (JDIQ) 4, 12:1–12:20 (2013). ACM

    Google Scholar 

  11. Anastasopoulos, M.P., Vasilakos, A.V., Cottis, P.G.: An autonomic framework for reliable multicast: a game theoretical approach based on social psychology. ACM Trans. Auton. Adapt. Syst. (TAAS) 4, 21:1–21:23 (2009). ACM

    Google Scholar 

  12. Araujo, R.M., Lamb, L.C.: On the use of memory and resources in minority games. ACM Trans. Auton. Adapt. Syst. (TAAS) 4, 11:1–11:23 (2009). ACM

    Google Scholar 

  13. Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv. (CSUR) 47, 23:1–23:28 (2015). ACM

    Google Scholar 

  14. Voulkidis, A.C., Anastasopoulos, M.P., Cottis, P.G.: Energy efficiency in wireless sensor networks: a game-theoretic approach based on coalition formation. ACM Trans. Sens. Netw. (TOSN) 9, 43:1–43:27 (2013). ACM

    Google Scholar 

  15. Yen, L.H., Lin, C.M., Leung, V.C.M.: Distributed lifetime-maximized target coverage game. ACM Trans. Sens. Netw. (TOSN) 9, 46:1–46:23 (2013). ACM

    Google Scholar 

  16. Dandekar, P., Goel, A., Wellman, M.P., Wiedenbeck, B.: Strategic formation of credit networks. ACM Trans. Internet Technol. (TOIT) - Special Issue on Foundations of Social Computing 15, 3:1–3:41 (2015). ACM

    Google Scholar 

  17. Tsompanas, M.A.I., Kachris, C., Sirakoulis, G.C.: Modeling cache memory utilization on multicore using common pool resource game on cellular automata. ACM Trans. Model. Comput. Simul. (TOMACS) - Special Issue on ACAM and Special Issue Papers 26, 21:1–21:22 (2016). ACM

    MathSciNet  Google Scholar 

  18. Coucheney, P., D’acquisto, G., Maillé, P., Naldi, M., Tuffin, B.: Influence of search neutrality on the economics of advertisement-financed content. ACM Trans. Internet Technol. (TOIT) - Special Issue on Pricing and Incentives in Networks and Systems and Regular Papers 14, 10:1–10:21 (2014)

    Google Scholar 

  19. Hoiles, W., Gharehshiran, O.N., Krishnamurthy, V., Ðào, N.D., Zhang, H.: Adaptive caching in the youtube content distribution network: a revealed preference game-theoretic learning approach. IEEE Trans. Cogn. Commun. Network. 1, 71–85 (2015). IEEE

    Article  Google Scholar 

  20. Duan, R., Prodan, R., Li, X.: Multi-objective game theoretic scheduling of bag-of-tasks workflows on hybrid clouds. IEEE Trans. Cloud Comput. 2, 29–42 (2014). IEEE

    Article  Google Scholar 

  21. Esposito, C., Ficco, M., Palmieri, F., Castiglione, A.: Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans. Comput. pp, 1–14 (2015). IEEE

    MathSciNet  Google Scholar 

  22. Zhang, B., Chen, Y., Liu, K.J.R.: An indirect-reciprocity reputation game for cooperation in dynamic spectrum access networks. IEEE Trans. Wireless Commun. 11, 4328–4341 (2012). IEEE

    Article  Google Scholar 

  23. Li, Z., Shen, H.: Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11, 1287–1303 (2012). IEEE

    Article  Google Scholar 

  24. Shen, Y., Yan, Z., Kantola, R.: Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Comput. Secur. 47, 3–25 (2014). Elsevier

    Article  Google Scholar 

  25. Haesanyi, J.C.: Games with incomplete information. Nobel Prize Committee (1994)

    Google Scholar 

  26. Matsui, M.: A management game model: economic traffic, leadtime and pricing setting. J. Jpn. Ind. Manag. Assoc. 53(1), 1–9 (2002). CiNii

    Google Scholar 

  27. Xu Y., Chen B., Deng Y.T., Deng G.: The government strategy research on college student’s employment based on game theory. In: International Conference on Optics Photonics and Energy Engineering, vol. 2, pp. 24–27. IEEE (2010)

    Google Scholar 

Download references

Acknowledgments

This work is sponsored by the National Key Foundational Research and Development on Network and Space Security, China (grant 2016YFB0800704), the NSFC (grants 61672410 and U1536202), the 111 project (grants B08038 and B16037), the PhD grant of the Chinese Educational Ministry (grant JY0300130104), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016ZDJC-06), and Aalto University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Liang, X., Yan, Z., Zhang, P. (2016). Game Theoretical Analysis on System Adoption and Acceptance: A Review. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49145-5_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49144-8

  • Online ISBN: 978-3-319-49145-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics