Abstract
Game theory is a methodology using mathematics models to analyze the strategic interactions between participants. It has been widely used to analyze the acceptance of system models under various conditions. In this paper, we review the basic knowledge of game theory. After extensive literature study, we propose a series of model requirements that should be paid attention in game theoretical analysis. Furthermore, we classify the existing work into two categories: games in information systems and games in network systems, which have been analyzed in accordance with the aforementioned requirements. The review shows that game theory is a good tool to analyze the adoption and acceptance of a system model and can be used for improving system design towards practical deployment. Moreover, we present the advantages and limitations of existing studies, and propose future research directions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Khazaee, P.R., Mirzadi, K., Yousefi, S.: Cooperative user and storage service providers interaction in cloud computing. In: 7th Conference on Information and Knowledge Technology (IKT), pp. 1–5. IEEE (2015)
Antoniou, J., Papadopoulou, V., Vassiliou, V., Pitsillides, A.: Cooperative user–network interactions in next generation communication networks. Comput. Netw. 54, 2239–2255 (2010). ACM
Cesana, M., Malanchini, I., Capone, A.: Modelling network selection and resource allocation in wireless access networks with non-cooperative games. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 404–409. IEEE (2008)
Maghrabi, L., Pfluegel, E.: Moving assets to the cloud: a game theoretic approach based on trust Cyber Situational Awareness. In: International Conference on Data Analytics and Assessment (CyberSA), pp. 1–5. IEEE (2015)
Furuncu, E., Sogukpinar, I.: Scalable risk assessment method for cloud computing using game theory (CCRAM). Comput. Stan. Interfaces 38, 44–50 (2015). Elsevier
He, W., Xia, C., Wang, H., Zhang, C., Ji, Y.: A game theoretical attack-defense model oriented to network security risk assessment. In: International Conference on Computer Science and Software Engineering, vol. 6, pp. 498–504. IEEE (2008)
Wang, B., Cai, J., Zhang, S., Li, J.: A network security assessment model based on attack-defense game theory. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 3, pp. 639–643. IEEE (2010)
Rzadca, K., Datta, A., Kreitz, G., Buchegger, S.: Game-theoretic mechanisms to increase data availability in decentralized storage systems. ACM Trans. Auton. Adapt. Syst. (TAAS) 10, 14:1–14:32 (2015). ACM
Ip, A.T.S., Lui, J.C.S., Liu, J.: A revenue-rewarding scheme of providing incentive for cooperative proxy caching for media streaming systems. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 4, 5:1–5:32 (2008). ACM
Biran, D., Zack, M.H., Briotta, R.J.: Competitive intelligence and information quality: a game-theoretic perspective. J. Data Inf. Qual. (JDIQ) 4, 12:1–12:20 (2013). ACM
Anastasopoulos, M.P., Vasilakos, A.V., Cottis, P.G.: An autonomic framework for reliable multicast: a game theoretical approach based on social psychology. ACM Trans. Auton. Adapt. Syst. (TAAS) 4, 21:1–21:23 (2009). ACM
Araujo, R.M., Lamb, L.C.: On the use of memory and resources in minority games. ACM Trans. Auton. Adapt. Syst. (TAAS) 4, 11:1–11:23 (2009). ACM
Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv. (CSUR) 47, 23:1–23:28 (2015). ACM
Voulkidis, A.C., Anastasopoulos, M.P., Cottis, P.G.: Energy efficiency in wireless sensor networks: a game-theoretic approach based on coalition formation. ACM Trans. Sens. Netw. (TOSN) 9, 43:1–43:27 (2013). ACM
Yen, L.H., Lin, C.M., Leung, V.C.M.: Distributed lifetime-maximized target coverage game. ACM Trans. Sens. Netw. (TOSN) 9, 46:1–46:23 (2013). ACM
Dandekar, P., Goel, A., Wellman, M.P., Wiedenbeck, B.: Strategic formation of credit networks. ACM Trans. Internet Technol. (TOIT) - Special Issue on Foundations of Social Computing 15, 3:1–3:41 (2015). ACM
Tsompanas, M.A.I., Kachris, C., Sirakoulis, G.C.: Modeling cache memory utilization on multicore using common pool resource game on cellular automata. ACM Trans. Model. Comput. Simul. (TOMACS) - Special Issue on ACAM and Special Issue Papers 26, 21:1–21:22 (2016). ACM
Coucheney, P., D’acquisto, G., Maillé, P., Naldi, M., Tuffin, B.: Influence of search neutrality on the economics of advertisement-financed content. ACM Trans. Internet Technol. (TOIT) - Special Issue on Pricing and Incentives in Networks and Systems and Regular Papers 14, 10:1–10:21 (2014)
Hoiles, W., Gharehshiran, O.N., Krishnamurthy, V., Ðào, N.D., Zhang, H.: Adaptive caching in the youtube content distribution network: a revealed preference game-theoretic learning approach. IEEE Trans. Cogn. Commun. Network. 1, 71–85 (2015). IEEE
Duan, R., Prodan, R., Li, X.: Multi-objective game theoretic scheduling of bag-of-tasks workflows on hybrid clouds. IEEE Trans. Cloud Comput. 2, 29–42 (2014). IEEE
Esposito, C., Ficco, M., Palmieri, F., Castiglione, A.: Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans. Comput. pp, 1–14 (2015). IEEE
Zhang, B., Chen, Y., Liu, K.J.R.: An indirect-reciprocity reputation game for cooperation in dynamic spectrum access networks. IEEE Trans. Wireless Commun. 11, 4328–4341 (2012). IEEE
Li, Z., Shen, H.: Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mob. Comput. 11, 1287–1303 (2012). IEEE
Shen, Y., Yan, Z., Kantola, R.: Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Comput. Secur. 47, 3–25 (2014). Elsevier
Haesanyi, J.C.: Games with incomplete information. Nobel Prize Committee (1994)
Matsui, M.: A management game model: economic traffic, leadtime and pricing setting. J. Jpn. Ind. Manag. Assoc. 53(1), 1–9 (2002). CiNii
Xu Y., Chen B., Deng Y.T., Deng G.: The government strategy research on college student’s employment based on game theory. In: International Conference on Optics Photonics and Energy Engineering, vol. 2, pp. 24–27. IEEE (2010)
Acknowledgments
This work is sponsored by the National Key Foundational Research and Development on Network and Space Security, China (grant 2016YFB0800704), the NSFC (grants 61672410 and U1536202), the 111 project (grants B08038 and B16037), the PhD grant of the Chinese Educational Ministry (grant JY0300130104), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016ZDJC-06), and Aalto University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Liang, X., Yan, Z., Zhang, P. (2016). Game Theoretical Analysis on System Adoption and Acceptance: A Review. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-49145-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49144-8
Online ISBN: 978-3-319-49145-5
eBook Packages: Computer ScienceComputer Science (R0)