{"id":"https://openalex.org/W4416210383","doi":"https://doi.org/10.1007/s41109-025-00745-4","title":"Social dilemma in internet routing security adoption and its resolution possibility through altruism, bounded rationality","display_name":"Social dilemma in internet routing security adoption and its resolution possibility through altruism, bounded rationality","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W4416210383","doi":"https://doi.org/10.1007/s41109-025-00745-4"},"language":"en","primary_location":{"id":"doi:10.1007/s41109-025-00745-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s41109-025-00745-4","pdf_url":"https://appliednetsci.springeropen.com/counter/pdf/10.1007/s41109-025-00745-4","source":{"id":"https://openalex.org/S3035517252","display_name":"Applied Network Science","issn_l":"2364-8228","issn":["2364-8228"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Network Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://appliednetsci.springeropen.com/counter/pdf/10.1007/s41109-025-00745-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009276295","display_name":"Keisuke Ishibashi","orcid":"https://orcid.org/0000-0003-1987-4456"},"institutions":[{"id":"https://openalex.org/I199080787","display_name":"International Christian University","ror":"https://ror.org/01cg0k189","country_code":"JP","type":"education","lineage":["https://openalex.org/I199080787"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Keisuke Ishibashi","raw_affiliation_strings":["College of Liberal Arts, International Christian University, 3-10-2 Osawa, Mitaka, Tokyo, 1818585, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Liberal Arts, International Christian University, 3-10-2 Osawa, Mitaka, Tokyo, 1818585, Japan","institution_ids":["https://openalex.org/I199080787"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5116929165","display_name":"Tatsuya Oryu","orcid":null},"institutions":[{"id":"https://openalex.org/I199080787","display_name":"International Christian University","ror":"https://ror.org/01cg0k189","country_code":"JP","type":"education","lineage":["https://openalex.org/I199080787"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tatsuya Oryu","raw_affiliation_strings":["College of Liberal Arts, International Christian University, 3-10-2 Osawa, Mitaka, Tokyo, 1818585, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Liberal Arts, International Christian University, 3-10-2 Osawa, Mitaka, Tokyo, 1818585, Japan","institution_ids":["https://openalex.org/I199080787"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009276295"],"corresponding_institution_ids":["https://openalex.org/I199080787"],"apc_list":{"value":790,"currency":"GBP","value_usd":969},"apc_paid":{"value":790,"currency":"GBP","value_usd":969},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45848867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.22470000386238098,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.22470000386238098,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11031","display_name":"Game Theory and Applications","score":0.09030000120401382,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.07280000299215317,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bounded-rationality","display_name":"Bounded rationality","score":0.6819000244140625},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.541700005531311},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5148000121116638},{"id":"https://openalex.org/keywords/dilemma","display_name":"Dilemma","score":0.4885999858379364},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.47099998593330383},{"id":"https://openalex.org/keywords/net-neutrality","display_name":"Net neutrality","score":0.4643999934196472},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4302999973297119},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.40939998626708984}],"concepts":[{"id":"https://openalex.org/C58694771","wikidata":"https://www.wikidata.org/wiki/Q814385","display_name":"Bounded rationality","level":2,"score":0.6819000244140625},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.541700005531311},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5148000121116638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49729999899864197},{"id":"https://openalex.org/C2778496695","wikidata":"https://www.wikidata.org/wiki/Q254128","display_name":"Dilemma","level":2,"score":0.4885999858379364},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.47099998593330383},{"id":"https://openalex.org/C539553027","wikidata":"https://www.wikidata.org/wiki/Q853467","display_name":"Net neutrality","level":3,"score":0.4643999934196472},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4302999973297119},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.40939998626708984},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4065000116825104},{"id":"https://openalex.org/C96219163","wikidata":"https://www.wikidata.org/wiki/Q649124","display_name":"Network effect","level":2,"score":0.40549999475479126},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3853999972343445},{"id":"https://openalex.org/C16118543","wikidata":"https://www.wikidata.org/wiki/Q275372","display_name":"Externality","level":2,"score":0.36649999022483826},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.3628000020980835},{"id":"https://openalex.org/C187206662","wikidata":"https://www.wikidata.org/wiki/Q55607920","display_name":"Social dilemma","level":2,"score":0.3555999994277954},{"id":"https://openalex.org/C162222271","wikidata":"https://www.wikidata.org/wiki/Q92779871","display_name":"Public good","level":2,"score":0.3549000024795532},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3499000072479248},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.3452000021934509},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.329800009727478},{"id":"https://openalex.org/C113494165","wikidata":"https://www.wikidata.org/wiki/Q41693","display_name":"Prisoner's dilemma","level":3,"score":0.31619998812675476},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.30970001220703125},{"id":"https://openalex.org/C201717286","wikidata":"https://www.wikidata.org/wiki/Q938185","display_name":"Rationality","level":2,"score":0.30079999566078186},{"id":"https://openalex.org/C138268822","wikidata":"https://www.wikidata.org/wiki/Q1051925","display_name":"Resolution (logic)","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C16520705","wikidata":"https://www.wikidata.org/wiki/Q601799","display_name":"Cournot competition","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C123676819","wikidata":"https://www.wikidata.org/wiki/Q1074338","display_name":"Perfect information","level":2,"score":0.2556000053882599}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s41109-025-00745-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s41109-025-00745-4","pdf_url":"https://appliednetsci.springeropen.com/counter/pdf/10.1007/s41109-025-00745-4","source":{"id":"https://openalex.org/S3035517252","display_name":"Applied Network Science","issn_l":"2364-8228","issn":["2364-8228"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Network Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ef78446a70a045f2bb50a237c9ba68b9","is_oa":true,"landing_page_url":"https://doaj.org/article/ef78446a70a045f2bb50a237c9ba68b9","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Applied Network Science, Vol 10, Iss 1, Pp 1-16 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s41109-025-00745-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s41109-025-00745-4","pdf_url":"https://appliednetsci.springeropen.com/counter/pdf/10.1007/s41109-025-00745-4","source":{"id":"https://openalex.org/S3035517252","display_name":"Applied Network Science","issn_l":"2364-8228","issn":["2364-8228"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Network Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5239993849","display_name":null,"funder_award_id":"22K11999","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320325763","display_name":"Telecommunications Advancement Foundation","ror":"https://ror.org/05y77zf79"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416210383.pdf","grobid_xml":"https://content.openalex.org/works/W4416210383.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W2137519579","https://openalex.org/W2151972741","https://openalex.org/W2241574583","https://openalex.org/W2287088142","https://openalex.org/W2294765562","https://openalex.org/W2613487677","https://openalex.org/W2752884022","https://openalex.org/W2901771268","https://openalex.org/W2980910426","https://openalex.org/W4229980359","https://openalex.org/W4307020411","https://openalex.org/W4387880869","https://openalex.org/W4392309701","https://openalex.org/W4402665196"],"related_works":[],"abstract_inverted_index":{"Some":[0],"types":[1],"of":[2,78,128,135,163,202],"Internet":[3,86],"security":[4,203],"countermeasures":[5],"require":[6],"cooperative":[7,56],"adoption":[8,57,93,105,180,201],"to":[9,197],"effectively":[10],"defend":[11],"against":[12,83],"cyberattacks,":[13],"such":[14,79],"as":[15],"authentication":[16],"mechanisms":[17],"that":[18,150],"prevent":[19],"spoofing":[20,84],"attacks.":[21],"In":[22],"these":[23,144],"mechanisms,":[24],"both":[25,189],"the":[26,30,34,37,40,92,120,126,133,158,161,168,182,199],"information":[27],"source":[28,35],"and":[29,39,98,132,167,192],"receiver":[31,41],"must":[32],"participate:":[33],"signs":[36],"information,":[38],"verifies":[42],"it.":[43],"Adoption":[44],"by":[45,102],"only":[46],"one":[47],"party":[48],"is":[49,75,154,165],"insufficient,":[50],"creating":[51],"a":[52,80,103,111,174],"social":[53,59,159],"dilemma":[54],"where":[55],"maximizes":[58],"welfare,":[60],"but":[61],"individual":[62],"incentives":[63],"diminish":[64],"if":[65],"others":[66],"do":[67],"not":[68],"adopt.":[69],"Resource":[70],"Public":[71],"Key":[72],"Infrastructure":[73],"(RPKI)":[74],"an":[76],"example":[77],"mechanism,":[81],"protecting":[82],"in":[85,114,177,194],"routing.":[87],"Its":[88],"effectiveness":[89],"depends":[90],"on":[91],"rate":[94],"across":[95,181],"network":[96,136,170,190],"paths":[97],"has":[99],"been":[100],"hindered":[101],"low":[104],"ratio.":[106],"However,":[107],"recent":[108],"trends":[109],"show":[110],"moderate":[112],"increase":[113],"RPKI":[115],"adoption.":[116],"This":[117],"paper":[118],"investigates":[119],"reasons":[121],"behind":[122],"this":[123],"adoption,":[124],"considering":[125],"roles":[127],"altruism,":[129],"bounded":[130,152],"rationality,":[131],"influence":[134],"externality.":[137],"Through":[138],"multi-agent":[139],"simulations,":[140],"we":[141],"explore":[142],"how":[143],"factors":[145],"interact.":[146],"Our":[147],"findings":[148],"suggest":[149],"while":[151],"rationality":[153],"crucial":[155],"for":[156,188],"overcoming":[157],"dilemma,":[160],"effect":[162],"altruism":[164],"limited,":[166],"underlying":[169],"externality":[171],"also":[172],"plays":[173],"significant":[175],"role":[176],"facilitating":[178],"spontaneous":[179],"network.":[183],"These":[184],"insights":[185],"have":[186],"implications":[187],"operators":[191],"policymakers":[193],"designing":[195],"strategies":[196],"promote":[198],"widespread":[200],"technologies.":[204]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-11-14T00:00:00"}
