Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (6): 102-115.doi: 10.11959/j.issn.2096-109x.2023086
• Papers • Previous Articles
Shuting LIU1,2, Yinghua MA1,2, Xiuzhen CHEN1,2
Revised:
2023-04-23
Online:
2023-12-01
Published:
2023-12-01
Supported by:
CLC Number:
Shuting LIU, Yinghua MA, Xiuzhen CHEN. Evolutionary game model of information management mechanism for public opinion governance[J]. Chinese Journal of Network and Information Security, 2023, 9(6): 102-115.
"
约束条件编号 | 约束条件内容 | 从众 | 情景 | 沉默点 | 举报点 | 转发点 | 冲突点 | 中心点 |
一 | D 1>0,I1>0 | E 1>0 | 1 | √ | √ | |||
D 2>0,I2>0 | E 1<0 | 2 | √ | |||||
二 | D 1>0,I1>0 | E 1>0 | 3 | √ | ||||
D 2<0,I2>0 | E 1<0 | 4 | √ | |||||
三 | D 1>0,I1>0 | E 1>0 | 5 | √ | ||||
D 2<0,I2<0 | E 1<0 | 6 | √ | |||||
四 | D 1<0,I1>0 | E 1>0 | 7 | √ | ||||
D 2>0,I2>0 | E 1<0 | 8 | √ | |||||
五 | D 1<0,I1>0 | E 1>0 | 9 | √ | ||||
D 2<0,I2>0 | E 1<0 | 10 | √ | |||||
六 | D 1<0,I1>0 | E 1>0 | 11 | √ | ||||
D 2<0,I2<0 | E 1<0 | 12 | √ | √ | ||||
七 | D 1<0,I1<0 | E 1>0 | 13 | √ | ||||
D 2>0,I2>0 | E 1<0 | 14 | √ | |||||
八 | D 1<0,I1<0 | E 1>0 | 15 | √ | ||||
D 2<0,I2>0 | E 1<0 | 16 | √ | |||||
九 | D 1<0,I1<0 | E 1>0 | 17 | √ | ||||
D 2<0,I2<0 | E 1<0 | 18 | √ |
[1] | ALLPORT G W , POSTMAN L . The psychology of rumor[R]. 1947. |
[2] | 靖鲲鹏, 岑怡 . 社交网络舆情下的二元信息竞争 SH2IR 模型及仿真研究[J]. 情报杂志, 2022,41(1): 117-124. |
JING K P , CENG Y . SH2IR model and simulation of binary information competition under social network public opinion[J]. Journal of Intelligence. 2022,41(1): 117-124. | |
[3] | 黄炜, 余辉, 李岳峰 ,等. 网络舆情事件演化的仿真实践研究[J]. 现代情报, 2017,37(8): 65-73. |
HUANG W , YU H , LI Y F ,et al. Simulation practice of the network public opinion evolution[J]. Journal of Modern Information, 2017,37(8): 65-73. | |
[4] | PAL S , HILL A , RABEHAJA T ,et al. A blockchain-based trust management framework with verifiable interactions[R]. 2021. |
[5] | CHEN Y Z , LI Q L , WANG H . Towards trusted social networks with blockchain technology[J]. Social and Information Networks, 2018,18(1): 2796. |
[6] | CHEN J , CHEN C , SONG Q ,et al. Spread mechanism and control strategies of rumor propagation model considering rumor refutation and information feedback in emergency management[J]. Symmetry, 2021,13(9): 1694. |
[7] | WANG Z , CHEN A . On ISRC rumor spreading model for scale-free networks with self-purification mechanism[J]. Complexity, 2021(8): 1-9. |
[8] | MO L , GUO S . Consensus of linear multi-agent systems with persistent disturbances via distributed output feedback[J]. Journal of Systems Science and Complexity, 2019,32(3): 835-845. |
[9] | ZHAO L , QIU X , WANG X ,et al. Rumor spreading model considering forgetting and remembering mechanisms in inhomogeneous networks[J]. Physica A:Statistical Mechanics and its Applications, 2013,392(4): 987-994. |
[10] | ASKARIZADEH M , LADANI B T . Soft rumor control in social networks:Modeling and analysis[J]. Engineering Applications of Artificial Intelligence, 2021,100:104198. |
[11] | SIMON S , APT K R . Choosing products in social networks[C]// 8th Workshop Internet Netw Econ(WINE). 2012: 100-113. |
[12] | MACHINA M J . Expected utility hypothesis[C]// Utility and Probability. 1990: 79-95. |
[13] | WANG B , GE C , FU L ,et al. DRIMUX:dynamic rumor influence minimization with user experience in social networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2017(10): 1. |
[14] | TSCHIATSCHEK S , SINGLA A , GOMEZ RODRIGUEZ M ,et al. Fake news detection in social networks via crowd signals[C]// Companion Proceedings of the Web Conference 2018. 2018: 517-524. |
[15] | NGUYEN N P , YAN G , THAI M T ,et al. Containment of misinformation spread in online social networks[C]// Proceedings of the 4th Annual ACM Web Science Conference. 2012: 213-222. |
[16] | WEN S , JIANG J , XIANG Y ,et al. To shut them up or to clarify:restraining the spread of rumors in online social networks[J]. IEEE Transactions on Parallel & Distributed Systems, 2014,25(12): 3306-3316. |
[17] | SRINIVASAN S , DHINESH B . A social immunity based approach to suppress rumors in online social networks[J]. International Journal of Machine Learning and Cybernetics, 2021,12(2): 1-16. |
[18] | WU Y , HUANG H , ZHAO J ,et al. Using mobile nodes to control rumors in big data based on a new rumor propagation model in vehicular social networks[J]. IEEE Access, 2018:1. |
[19] | TVERSKY A , KAHNEMAN D . Advances in prospect theory:cumulative representation of uncertainty[J]. Journal of Risk and Uncertainty, 1992,5(4): 297-323. |
[20] | SKYRMS B . Dynamics of conformist bias[J]. The Monist, 2005,88(2): 260-269. |
[21] | LAHBIB A , TOUMI K , LAOUITI A ,et al. Blockchain based trust management mechanism for IoT[C]// 2019 IEEE Wireless Communications and Networking Conference (WCNC). 2019. |
[22] | LI L , KURTHS J , YANG Y ,et al. Prevention and trust evaluation scheme based on interpersonal relationships for large-scale peer-to-peer networks[J]. Mathematical Problems in Engineering, 2014,2014(3). |
[23] | YANG Z , YANG K , LEI L ,et al. Blockchain-based decentralized trust management in vehicular networks[J]. IEEE Internet of Things Journal, 2018:1. |
[24] | CHOI D , CHUN S , OH H ,et al. Rumor propagation is amplified by echo chambers in social media[J]. Scientific Reports, 2020,10(1): 1-10. |
[25] | GINTIS H . Game theory evolving:a problem-centered introduction to modeling strategic behavior[M]. Princeton: Princeton University Press, 2000. |
[26] | FRIEDMAN D . On economic applications of evolutionary game theory[J]. Journal of Evolutionary Economics, 1998(8): 15-43. |
[27] | 许伦辉, 骈宇庄, 林永杰 ,等. 基于累积前景理论的无信控路段人车通行冲突博弈分析[J]. 中国公路学报, 2022,35(1): 18. |
XU L H , PIAN Y Z , LIN Y J ,et al. Game analysis of conflicts between pedestrians and vehicular traffic on unsignalized road sections based on cumulative prospect theory[J]. China Journal of Highway and Transport. 2022,35(1): 18. | |
[28] | 吴俊明, 刘炎 . 德法兼治:网络谣言之二元治理——兼论证券市场“网络谣言”的规制[J]. 证券法苑, 2016,18(2): 374-393. |
WU J M , LIU Y . Governing both germany and law:dual governance of internet rumors——also on the regulation of "internet rumors" in the securities market[J]. Securities Law Review, 2016,18(2): 374-393. | |
[29] | 李国武 . 谣言实现的社会机制及对信息的治理[J]. 社会, 2005(4): 143-155. |
LI G W . Social Mechanism of rumor realization and information governance[J]. Society, 2005(4): 143-155. |
[1] | Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING. Analysis on anonymity and regulation of digital currency transactions based on game theory [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157. |
[2] | Wenqi SHI, Xiangyang LUO, Jiashan GUO. Social network user geolocating method based on weighted least squares [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 41-52. |
[3] | Jiaren YU, Youliang TIAN, Hui LIN. Design of miner type identification mechanism based on reputation management model [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 128-138. |
[4] | Ming YANG, Xuexian HU, Qihui ZHANG, Jianghong WEI, Wenfen LIU. Federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 99-112. |
[5] | Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI. Research on extended access control mechanism in online social network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131. |
[6] | Zhongyuan JIANG, Xianyu CHEN, Jianfeng MA. Survey of community privacy in social network [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 10-21. |
[7] | Xin ZHANG,Weizhong QIANG,Yueming WU,Deqing ZOU,Hai JIN. Mining behavior pattern of mobile malware with convolutional neural network [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 35-44. |
[8] | Pei WANG,Yan JIA,Aiping LI,Qianyue JIANG. De-anonymiation method for networks based on DeepLink [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 104-108. |
[9] | Qiang QU,Hongtao YU,Ruiyang HUANG. Attention-based approach of detecting spam in social networks [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 54-61. |
[10] | Mengyang YU,Hui LIN,Youliang TIAN. New cross-layer reputation mechanism for mobile cloud computing [J]. Chinese Journal of Network and Information Security, 2018, 4(3): 51-58. |
[11] | Qiang QU, Hongtao YU, Ruiyang HUANG. Research progress of abnormal user detection technology in social network [J]. Chinese Journal of Network and Information Security, 2018, 4(3): 13-23. |
[12] | Jian-qiong HE,You-liang TIAN,Kai ZHOU. Provably secure social network privacy-preserving scheme [J]. Chinese Journal of Network and Information Security, 2016, 2(8): 62-67. |
[13] | Tian-zhu CHEN,Yun-chuan GUO,Ben NIU,Feng-hua LI. Research progress of access control model and policy in online social networks [J]. Chinese Journal of Network and Information Security, 2016, 2(8): 1-9. |
[14] | Rui-xin YAO,Hui LI,Jin CAO. Overview of privacy preserving in social network [J]. Chinese Journal of Network and Information Security, 2016, 2(4): 33-43. |
[15] | Jian-ming ZHU,Bo GAO. Social financial information security risk analysis and prevention [J]. Chinese Journal of Network and Information Security, 2016, 2(3): 46-51. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|