{"id":"https://openalex.org/W2116911752","doi":"https://doi.org/10.1145/1160633.1160858","title":"Monopolizing markets by exploiting trust","display_name":"Monopolizing markets by exploiting trust","publication_year":2006,"publication_date":"2006-05-08","ids":{"openalex":"https://openalex.org/W2116911752","doi":"https://doi.org/10.1145/1160633.1160858","mag":"2116911752"},"language":"en","primary_location":{"id":"doi:10.1145/1160633.1160858","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1160633.1160858","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066020533","display_name":"Sandip Sen","orcid":"https://orcid.org/0000-0001-6107-4095"},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sandip Sen","raw_affiliation_strings":["University of Tulsa"],"affiliations":[{"raw_affiliation_string":"University of Tulsa","institution_ids":["https://openalex.org/I87208437"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029167201","display_name":"Dipyaman Banerjee","orcid":null},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dipyaman Banerjee","raw_affiliation_strings":["University of Tulsa"],"affiliations":[{"raw_affiliation_string":"University of Tulsa","institution_ids":["https://openalex.org/I87208437"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5066020533"],"corresponding_institution_ids":["https://openalex.org/I87208437"],"apc_list":null,"apc_paid":null,"fwci":2.2587,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.89245603,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1249","last_page":"1256"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/monopolization","display_name":"Monopolization","score":0.8400369882583618},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7747364044189453},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6679298877716064},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6197657585144043},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5912050008773804},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5255833268165588},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4950813353061676},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47847339510917664},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.4127236306667328},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3678695261478424},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.269395649433136},{"id":"https://openalex.org/keywords/monopoly","display_name":"Monopoly","score":0.12659341096878052},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.1118776798248291},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.09445232152938843},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09009695053100586}],"concepts":[{"id":"https://openalex.org/C2780757686","wikidata":"https://www.wikidata.org/wiki/Q6901878","display_name":"Monopolization","level":3,"score":0.8400369882583618},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7747364044189453},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6679298877716064},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6197657585144043},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5912050008773804},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5255833268165588},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4950813353061676},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47847339510917664},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.4127236306667328},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3678695261478424},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.269395649433136},{"id":"https://openalex.org/C2781127519","wikidata":"https://www.wikidata.org/wiki/Q43637","display_name":"Monopoly","level":2,"score":0.12659341096878052},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.1118776798248291},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.09445232152938843},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09009695053100586},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1160633.1160858","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1160633.1160858","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.44999998807907104}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1520551055","https://openalex.org/W1749773073","https://openalex.org/W1788719434","https://openalex.org/W1969066667","https://openalex.org/W2024636056","https://openalex.org/W2069433813","https://openalex.org/W2072359805","https://openalex.org/W2089561630","https://openalex.org/W2100107987","https://openalex.org/W2107589890","https://openalex.org/W2112066883","https://openalex.org/W2113454610","https://openalex.org/W2115721093","https://openalex.org/W2117929658","https://openalex.org/W2130455894","https://openalex.org/W2137345955","https://openalex.org/W2149596454","https://openalex.org/W2157034822","https://openalex.org/W2165933603","https://openalex.org/W2166250796","https://openalex.org/W2170720442","https://openalex.org/W2305409528","https://openalex.org/W2988361043","https://openalex.org/W3088727961","https://openalex.org/W4238102305"],"related_works":["https://openalex.org/W2385412863","https://openalex.org/W2273254118","https://openalex.org/W2367329993","https://openalex.org/W3114598985","https://openalex.org/W2361383877","https://openalex.org/W2388436063","https://openalex.org/W2367697524","https://openalex.org/W2367038767","https://openalex.org/W2117163556","https://openalex.org/W108653788"],"abstract_inverted_index":{"We":[0,20,46,96,115],"investigate":[1],"trust-based":[2],"relationships":[3],"in":[4,15,34,125],"electronic":[5],"supply":[6],"chains":[7],"where":[8,23],"trust":[9,64,82,99],"is":[10,122],"a":[11,43,48,69,72,86,98,129],"measure":[12],"of":[13,65,75,89,93,128],"consistency":[14],"meeting":[16,35],"negotiated":[17],"contract":[18],"deadlines.":[19,36],"consider":[21],"scenarios":[22],"contractors":[24],"assign":[25],"contracts":[26],"to":[27,54,61,83],"contractees":[28,53,108],"who":[29,109],"are":[30,40],"significantly":[31],"more":[32],"successful":[33],"The":[37,134],"task":[38],"deadlines":[39],"drawn":[41],"from":[42],"known":[44],"distribution.":[45],"present":[47,97],"probabilistic":[49],"analysis":[50],"that":[51,81,102,118],"enables":[52],"strategically":[55],"bid":[56,110],"on":[57,111],"only":[58],"certain":[59],"tasks":[60],"earn":[62],"the":[63,90,104,126,140],"their":[66],"contractors.":[67],"Once":[68],"contractee":[70],"achieves":[71],"high":[73],"level":[74],"trust,":[76],"it":[77],"can":[78],"then":[79],"exploit":[80],"increasingly":[84],"corner":[85],"larger":[87],"portion":[88],"market":[91,105,120],"share":[92],"all":[94,112],"tasks.":[95,114],"exploitation":[100],"scheme":[101],"monopolizes":[103],"against":[106],"greedy":[107],"announced":[113],"also":[116],"show":[117],"such":[119],"monopolization":[121],"not":[123],"possible":[124],"presence":[127],"trusted,":[130],"but":[131],"non-exploiting,":[132],"contractee.":[133],"exploiter":[135],"can,":[136],"however,":[137],"effectively":[138],"\"starve\"":[139],"non-exploiting":[141],"trusted":[142],"agent.":[143]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
