Key stakeholder perceived value’s influence on autonomous vehicles’ privacy and security governance – an evolutionary analysis based on the prospect theory

Chao Lu (School of Management, Shanghai University, Shanghai, China)
Xiaohai Xin (School of Management, Shanghai University, Shanghai, China)

Asia Pacific Journal of Innovation and Entrepreneurship

ISSN: 2398-7812

Article publication date: 14 February 2024

343

Abstract

Purpose

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.

Design/methodology/approach

For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.

Findings

The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.

Research limitations/implications

This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.

Originality/value

The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.

Keywords

Citation

Lu, C. and Xin, X. (2024), "Key stakeholder perceived value’s influence on autonomous vehicles’ privacy and security governance – an evolutionary analysis based on the prospect theory", Asia Pacific Journal of Innovation and Entrepreneurship, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/APJIE-12-2023-0242

Publisher

:

Emerald Publishing Limited

Copyright © 2024, Chao Lu and Xiaohai Xin.

License

Published in Asia Pacific Journal of Innovation and Entrepreneurship. Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode


1. Introduction

In an epoch characterized by technological progress, the convergence of autonomous vehicles (AVs) with travel behavior emerges as a pivotal domain deserving investigation. The emergence of AVs can significantly reduce road accidents, improve transportation convenience, alleviate congestion, minimize pollution and optimize both the comprehensive safety of traffic (Levy and Haddad, 2022). In addition, to expedite the technological diffusion of AVs and foster active consumer participation, enterprises actively develop relevant technology platforms, shaping employment opportunities, such as “Baidu Apollo.” The advent of AV platforms has further intensified the potential risks associated with privacy and security concerns. However, the requisite installation and deployment of intricate embedded systems for this technology have become more prone to network attacks due to the increased attack surface and increased adversarial motivations (Khan et al., 2023). For instance, when consumers contemplate the AV platform established by enterprises, they are mandated to provide a significant amount of personal privacy information to AVs, thereby elevating the risk of privacy violations and compromising information security (Becker and Axhausen, 2017). Privacy and security concerns have diminished consumer trust and acceptance of the technology (Haboucha et al., 2017). To facilitate the effective diffusion of the technology, there is an imminent need for proactive governance research.

The pledged environmental and societal advantages of AVs will only materialize if the associated privacy and security risks are adequately mitigated. In response, Wang advocated technological measures, including privacy protection via digital signatures (Wang and Fan, 2022), and Lu suggested implementing privacy-preserving techniques grounded in a Federated Learning architecture (Lu et al., 2020). These represent new responsibilities for enterprise technology, signifying the shift of contemporary enterprises from a conventional emphasis on business technology toward a focus on social responsibility (Mahnoor et al., 2021). However, the governance of the privacy dilemma of AVs requires the collaborative participation of multiple stakeholders, and it is not enough to rely on suggestions at the technical level. It is necessary to explore the interaction impact of decisions of key stakeholders from the micro process.

In the early 21st century, scholars in the Western world initiated discussions on the concept of “Responsible Innovation” (RI). RI is a dynamic process involving the collaborative participation of numerous stakeholders (Stilgoe et al., 2013). Adhering to the tenet that enterprises assume foreseeable liabilities and that all stakeholders collectively shoulder technical responsibilities, the theoretical framework of RI furnishes a conceptual foundation for the study. The proactive implementation of RI by enterprises is conducive to guiding innovation toward moral acceptability and societal satisfaction. However, existing studies predominantly concentrate on theoretical frameworks and behavioral agents, often overlooking a thorough understanding of the behavioral changes exhibited by key stakeholders (Yang et al., 2021). Therefore, the research gap lies in addressing how to guide enterprises in the implementation of RI behaviors within the practical dynamics of the “human-vehicle-road” interactive collaboration in AVs.

Previous research has demonstrated that evolutionary game theory can addresses the limitations of traditional approaches by accounting for individual and social behaviors of key stakeholders (Yuan et al., 2022). However, the theory ignores the influence of individual subjective differences and other factors on decision-making. And recent research has found that variations in the values, perceptions of profit and loss and risk attitudes among decision-makers result in significant disparities in psychological preferences (Zhang et al., 2022). These differences directly impact the perceived value of stakeholders for making decisions. Moreover, stakeholders dynamically adapt their behavioral decisions based on comparative benefits and psychological advantages within the confines of bounded rationality (Brüne and Wilson, 2020). Therefore, it is crucial to include the perceived value of key stakeholders in the evolutionary game theory for a more nuanced analysis of governance in addressing privacy and security concerns.

The research question is to scrutinize and analyze the micro-level processes involved in the governance of privacy and security issues in AVs through the implementation of RI by enterprises. Furthermore, it delves into an in-depth examination of the impact of decision-making behaviors of key stakeholders and other crucial parameters, ensuring that the research question possesses both practical significance and authenticity.

To effectively address the aforementioned issues, the study integrates key stakeholder theory, perceived value theory and prospect theory to provide a comprehensive understanding. Subsequently, we construct a model based on evolutionary game theory, wherein government, enterprises and consumers play pivotal roles as key actors. Furthermore, leveraging the established model, the objective is to elucidate equilibrium strategy choices among key stakeholders and analyze the mechanistic influence of factors on the decision-making processes of these stakeholders. Finally, the study proposes recommendations based on the findings to encourage multi-participation and effective governance of AVs, ensuring societal stability and healthy development.

This study presents three primary innovations:

  1. To tackle privacy and security challenges in AVs, the study integrates RI theory, providing novel ideas and recommendations for enterprises to fulfill their responsibilities. The research adopts an anticipatory governance approach, analyzing influencing factors to offer insights into AV-related governance issues.

  2. The study incorporates RI theory into the problem governance process, enhancing its practical application.

  3. Acknowledging the substantial impact of irrational factors on decision-makers' behavioral choices and the evolutionary game, the research incorporates prospect theory and perceived value theory.

By examining the influence of various perceived values, such as risk preference and efficiency preference, on the evolutionary game analysis, the study addresses the limitations of the evolutionary game in considering subjective factors.

2. Literature review

2.1 The governance of privacy and security in autonomous vehicles

With the advent of internet and data analysis, issues surrounding the protection or sharing of personal data have emerged as crucial nexuses of economic and policy debate (Acquisti et al., 2016). In a recent survey, 93% of respondents voiced concerns about data privacy, with identity theft and fraud being the top worries (Keszey, 2020). Without addressing privacy and security risks, the promised environmental and societal benefits of AVs will remain mere rhetoric.

The governance of privacy and security in AVs has garnered extensive attention from scholars. Zhu indicated the application of blockchain technology in the vehicular crowdsensing of AVs, thereby proposing solutions to mitigate privacy and security risks (Zhu et al., 2022). Yuan designed an aggregation scheme based on differential privacy and a reputation model of the data receiving interface circuit vehicles for the problem of data privacy leakage (Yuan et al., 2023). Research on the governance of privacy and security in AVs is vigorously progressing at the technical level. However, ethical and moral constraints are poised to be more significant issues, as ethical principles will foster fairness in technical governance (Brandao et al., 2020). However, there remains a notable deficiency in research concerning the ethical and moral aspects at the governance of privacy and security.

Drawing from considerations of ethical and moral constraints in innovation, the concept of RI was first introduced in 2003, emphasizing the shared social responsibility undertaken by actors and societal stakeholders. It guides the innovation process toward ethical acceptability, sustainable development and societal satisfaction (Owen et al., 2012). The theory of RI promotes creative approaches to assessing and managing risk, opening up new avenues for productive and socially responsible technology innovation (Maynard and Scragg, 2019). Hemphill argues that enterprises collecting and managing such data bear the responsibility of safeguarding the data against misuse and exploitation (Hemphill, 2019). Goering advocated for responsible approaches to innovation, including improved informed consent practices and default settings that require an active opt-in for sharing brain data to solve the privacy and security risks (Goering et al., 2021).

Existing research suggests that the theory of RI effectively addresses privacy security issues. However, current studies mainly focus on theoretical aspects and behavioral recommendations for individuals, neglecting the examination of micro-interactions among diverse stakeholders. The governance of AVs requires collaboration among various parties, making it essential to consider the impact of key stakeholders.

2.2 Stakeholder theory and autonomous vehicles’ key stakeholders

Freeman emphasized the close relationship between stakeholders and enterprises, highlighting their significant role in the development of organizations (Freeman, 1984). As social and economic organizations, enterprises primarily aim to fulfill the needs of consumers and society through production, thereby generating profits to sustain their survival and growth. Corenell and Shapiro asserted that meeting the implicit needs of key stakeholders, such as consumers, not only enhances an enterprise’s reputation but also positively impacts its value enhancement (Cornell and Shapiro, 1987). Ansell and Gash proposed that incorporating key stakeholders, such as consumers, into collaborative governance would foster a sense of shared responsibility, thereby enhancing governance efficiency (Ansell and Gash, 2018). At the level of privacy and security governance, consumers can establish close connections with enterprises on platforms incorporating artificial intelligence technology, thereby facilitating enterprises in undertaking privacy and security governance (Wang and Wu, 2014). Furthermore, scholars argue that effective governance of privacy and security issues relies on ethical principles of mutual benefit among stakeholders like enterprises and consumers (Arthur and Owen, 2019). The governance process can achieve greater responsiveness and effectiveness only through the collaborative participation of key stakeholders, conducted in a responsible manner.

The implementation process necessitates being rooted within an innovation ecosystem comprising relevant stakeholders, such as government, enterprises and consumers (Bacq and Aguilera, 2022). Therefore, it is anticipated that significant preparation on the part of key stakeholders, including enterprises, consumers and governing authorities, would be needed before the market can fully accept AVs (Sinha et al., 2020). To investigate the challenges encountered during the diffusion of AVs, scholars identified technology firms, manufacturing companies, drivers, government and transport policy consortiums as key stakeholders (Pettigrew et al., 2018).

The exploration of privacy and security governance in the context of AVs should focus on key stakeholders to uncover crucial challenges. Furthermore, this exploration should extend beyond theoretical discussions and address the research gap in the existing literature concerning stakeholder interactions in the micro process.

2.3 The theory of evolutionary game and its application in Responsible Innovation

Using the theory of evolutionary games enables a more comprehensive examination of the micro-processes involved in stakeholders’ interactions. Currently, numerous studies have explored the implementation of RI and the process of risk management, using the evolutionary game method. In the simulation and analysis of behavioral strategies used by the government, enterprises and the general public, Yang devised a trilateral evolutionary game model. This model elucidates the manner in which RI within infrastructure projects can contribute to their sustainable development (Yang et al., 2021). Lacroix conceptualized the societal dilemma within the framework of moral progression in artificial intelligence through the application of an evolutionary game model (LaCroix and Mohseni, 2022).

However, the theory of evolutionary games also has inherent limitations For example, agent decisions are frequently asynchronous, and each agent may have unique preferences, payoffs, and strategy alternatives (Szabo and Fath, 2007). Moreover, within the realm of AVs, recent research suggests that decision-making processes are notably impacted by the attributes of key stakeholders and the element of perceived value, potentially serving as pivotal determinants (Mo et al., 2021).

2.4 Prospect theory and the perceived value

Multiple scientific inquiries have illustrated the diversity in stakeholders’ attitudes and behaviors regarding novel technology and its associated risks, influenced by a spectrum of psychological, cultural and cognitive factors (Frewer et al., 1998). Additionally, Thaler's research highlighted that individuals tend to compare and evaluate the perceived value of potential gains and losses when making decisions (Thaler, 1985).

Tversky created a prospect theory with increased explanatory efficacy, seeking a thorough investigation into the impact of irrational factors on stakeholders’ decision-making processes (Tversky and Kahneman, 1979). Prospect theory posits that stakeholders assess the gains and losses associated with a decision using reference points. In addition, stakeholders’ risk aversion and loss sensitivity will impact their assessment of perceived value, which will alter the results of behavioral choices in turn (Wang et al., 2023). The rise of prospect theory has influenced research in the fields of economy and risk management (Lindner et al., 2022).

Zheng created models to analyze the interactions between local governments and producers of new energy vehicles based on prospect theory, and then investigated the effects of various initial values on the game's evolutionary outcomes (Zheng et al., 2023). Wang proposed an evolutionary game model based on prospect theory to address the issue of building infrastructure for electric vehicle charging (Wang et al., 2022a, 2022b).

However, there is a lack of research on the application of prospect theory in the field of autonomous driving cars. As previously highlighted, the perceived value of stakeholders significantly influences the behavior of making decisions. Therefore, there is a need to further explore the use of prospect theory in studying and addressing specific challenges.

Building upon the analysis of existing studies, this research concludes that implementing RI is beneficial for proactively addressing potential privacy and security concerns in AVs. However, there is a lack of research on the micro-level implementation processes of RI. There is a need for supplementary studies that align with the collaborative dynamics of “human-vehicle-road” interactions. Additionally, while acknowledging the significant impact of key stakeholders interactions in the micro-level governance process, the current use of evolutionary game theory lacks sufficient consideration of subjective perceptual differences among stakeholders, leading to potential disparities with real-world situations.

To address the aforementioned issues, this study comprehensively examines the micro-level process of governing privacy and security issues in the implementation of RI by enterprises, taking into account the interactive influences of stakeholders and subjective perceptual differences. This study integrates prospect theory, perceived value theory, key stakeholder theory and evolutionary game theory to examine the governance of privacy and security in AVs. By exploring the micro-processes of key stakeholders’ interactions and their impact on RI, the research aims to provide insights into the privacy and security governance of AVs. Furthermore, the study conducts simulation analysis to evaluate the influence of internal and external factors and draws conclusions regarding privacy and security governance.

3. Model building and assumption

In the diffusion of AVs, the key stakeholders, namely, government, enterprises and consumers, play pivotal roles. For the governance of privacy and security issues, it is crucial to consider the differences in perceived value caused by the diversified risk preferences and interest preferences of these stakeholders. Based on the interactions among key stakeholders in AVs and the practical behaviors of stakeholders in governing privacy and security issues, this study presents the behavioral framework for governing these concerns in AVs, as depicted in Figure 1.

3.1 Model assumption

Assumption 1. Enterprises, driven by their quest to advance technologies, proactively establish data platforms. However, these platforms also give rise to potential risks, such as privacy breaches and ethical obligations (Han et al., 2023). Consequently, all parties are actively urging enterprises to further fulfill their responsibilities. So, this study assumes that the strategic choices available to enterprises are (implement RI, not implement RI), with corresponding proportions of x and 1 − x, x ∈ [0, 1]. Assuming that consumers can engage in communication, cooperation and supervision to report irresponsible behavior by enterprises, their strategic choices encompass the options of (collaborative innovation and supervision, not collaborative innovation or supervision), with corresponding proportions of y and 1 − y, y ∈ [0, 1]. In the process of privacy and security governance, the government advocates for the integration of innovation and ethics within enterprises, assuming the roles of regulating enterprises and guiding consumer participation. Therefore, the decision-making space of the government is set as (active intervention, passive intervention), with corresponding proportions of z and 1 − z, z ∈ [0, 1]. Based on the assumptions, the many strategies were laid out in a game tree, as illustrated in Figure 2.

Assumption 2. The perception gap regarding the risks and benefits of AVs can lead different perceived value and influence individual decisions (Lee et al., 2019). This study uses E to represent the perceived value of decision makers, with the expression E=iπ(ε)[V(f)Z(f)]. π(ε) represents the decision function, V(f) − Z(f) represents the difference between the valence account and the cost account, ε represents the probability. Attributable to the inclination of individuals to overestimate the likelihood of high-probability events, the decision function π(ε) exhibits the following properties: limε0w(ε)>ε, limε1w(ε)<ε, π(1) = 1, π(0) = 0. Furthermore, the decision weight function can be represented as follows:

(1) π±(ε)=εr[εr+(1±ε)r]1r

In equation (1), π±(ε) represents the valence or cost, and r is the decision sensitivity coefficient. Due to the limited research on the perceived value of privacy and security in AVs, the decision sensitivity coefficients of the valence account and the cost account are unified and represented by the symbol r. A higher value of r reflects a greater subjective identification rate of individuals.

Drawing on the research of prospect theory, decision makers demonstrate distinct characteristics. Deterministic rewards cause decision-makers to display a certain degree of risk aversion. When given a choice between two possibilities, the majority of decision-makers choose the riskier option in search of greater rewards (Wang et al., 2023). Therefore, this study decomposes decision makers' perceived value into two components: the valence account and the cost account (Wenner, 2015). The expressions for the functions of the valence account and cost account are provided as follows:

(2) V(f)={(fU0)θ,fU0λ(U0f)β,fU0,  Z(f)={δ(fU1)ϕ,fU1(U1f)σ,fU1

In equation (2), V(f) signifies the value function associated with the valence account, while λ denotes the sensitivity to valence loss aversion. On the other hand, Z(f) indicates the value function of the cost account, δ represents the sensitivity to cost loss aversion degree. U0, U1 represent the valence reference point and the cost reference point. θ, β represent the risk preference coefficient when the valence is relative to gain-loss, ϕ, σ represent the risk preference coefficient when the cost is relative to the loss-benefit, and with the risk preference coefficient become greater, the sensitivity of decision makers to risk perception will be higher.

Assumption 3. Assuming that the probability of consumer privacy leakage risk due to factors such as hacking attacks on the data platforms of AVs is denoted as p, and it will lead to consumer losses because of the negative externalities. Enterprises implementing RI as a form of expected governance can effectively mitigate potential negative externalities and steer innovation toward socially desirable and morally acceptable outcomes (Bechtsis et al., 2018).

Assumption 4. Due to individual differences among consumers, their knowledge levels regarding the development of AVs vary. Let the knowledge level be denoted as T, T ∈ [0, 1]. And the differences in consumer knowledge levels will influence their behavior toward the governance of AVs (Gkartzonikas and Gkritza, 2019). Because of the negative externalities of AVs, consumers suffer risk pDr when enterprises do not take responsibility. When consumers engage in collaborative innovation and supervision, they have to pay the cost Cc. At this point, if enterprises implement RI, consumers will gain experiential value TBc based on their firsthand experience. If consumers discover that enterprises have not implemented RI, they will legally demand compensation, and the amount of compensation is related to consumers' level of knowledge. We denote the parameter as TVc. Furthermore, consumers will receive policy support Sc guided by government’s active intervention.

Assumption 5. When enterprises engage in AVs, they will reap foundational benefits such as technological advancements, and the foundational benefits are Re. Meanwhile, enterprises will attain additional benefits Be, due to the collaborative innovation and supervision of consumers. If enterprises choose the strategy of implementing RI, their additional expenditure costs are Ce. In this scenario, the enterprises will receive subsidy support Se under government’s active intervention, although the subsidy provided is lower than the costs incurred by the enterprise. On the contrary, in the event that the enterprises fail to implement RI and is detected by consumers, enterprises will provide the compensation TVc. Moreover, the enterprise would be subjected to fines imposed under government’s active intervention, and the penalty values are Ke.

Assumption 6. The government will obtain societal benefits Bg as a result of the enterprise's decision to implement RI. However, the government may experience reputation loss pG due to privacy risks faced by consumers associated with AVs. When strategy is active intervention, government’s supervision cost will be Cs. Besides, with the aim of facilitating the achievement of privacy and security governance objectives, the government will provide incentive policies Sc, Se to enterprises and consumers. Simultaneously, the government will require irresponsible enterprises to bear financial penalties, which denoted as Ke. When strategy is passive intervention, the government does not punish and incentivize (Liu et al., 2018).

All of the parameters and abbreviations used in this study are categorized as stated in Table 1 to make understanding it easier.

3.2 Model construction

In accordance with the study's assumptions and grounded in prospect theory, the payoff matrix of key stakeholders in this evolutionary game is presented in Table 2. The matrices’ formulas delineate the government’s payoffs under diverse decisions by other stakeholders in the first row, the enterprise’s payoffs in the second row and consumers’ payoffs in the third row. For example, when enterprises opt for the implement RI and consumers choose strategies of collaborative innovation and supervision, the government’s payoffs function at the instance of choosing active intervention is V(Bg) − Z(Cs + Se + Sc).

4. Model analysis

4.1 Analysis of stakeholders’ strategies stability

According to Table 2, we computed the anticipated payoffs for enterprises opting to either implement or not implement from RI, denoted as Ex and E1−x. The mean expected payoffs were symbolized by E¯:

(3) Ex=π(y)π(z)[V(Re+Se+Be)Z(Ce)]+π(1y)π(z)[V(Re+Se)Z(Ce)]+π(y)π(1z)[V(Re+Be)Z(Ce)]+π(1y)π(1z)[V(Re)Z(Ce)]
(4) E1x=π(y)π(z)[V(Re+Be)Z(Ke+TVc)]+π(1y)π(z)[V(Re)Z(Ke)]+π(y)π(1z)[V(Re+Be)Z(TVc)]+π(1y)π(1z)[V(Re)Z(0)]
(5) E¯=xEx+(1x)Ex

According to equations (3)–(5), we derived the replicator dynamic equation applicable to enterprises engaged in the implementation of RI, as follows:

(6) F(x)=dxdt=x(ExE¯)=x(1x)(ExE1x)=x(1x){π(y)π(z)[V(Se)Z(Ce)+Z(Ke+TVc)]+π(1y)π(z)[V(Se)Z(Ce)+Z(Ke)]+π(y)π(1z)[Z(Ce)+Z(TVc)]+π(1y)π(1z)[Z(Ce)]}=x(1x)[π(y)π(z)A+π(1y)π(z)B+π(y)π(1z)C+π(1y)π(1z)D]

The expected payoffs that consumers choose collaborative innovation and supervision was denoted as Cy, and the expected payoffs that consumers choose not collaborative innovation and supervision was denoted as C1−y. The average expected payoffs were represented by C¯:

(7) Cy=π(x)π(z)[V(TBc+Sc)Z(Cc)]+π(1x)π(z)[V(Sc+TVc)Z(Cc+pDr)]+π(x)π(1z)[V(TBc)Z(Cc)]+π(1x)π(1z)[V(TVc)Z(Cc+pDr)]
(8) C1y=π(x)π(z)[V(0)Z(0)]+π(1x)π(z)[V(0)Z(pDr)]+π(x)π(1z)[V(0)Z(0)]+π(1x)π(1z)[V(0)Z(pDr)]
(9) C¯=yCy+(1y)C1y

According to equations (7)–(9), we obtained the replicator dynamic equation for consumers selecting the strategy of collaborative innovation and supervision, as follows:

(10) F(y)=dydt=y(CyC¯)=y(1y)(CyC1y)=y(1y){π(x)π(z)[V(TBc+Sc)Z(Cc)]+π(1x)π(z)[V(Sc+TVc)Z(Cc)]+π(x)π(1z)[V(TBc)Z(Cc)]+π(1x)π(1z)[V(TVc)Z(Cc)]}=y(1y)[π(x)π(z)F+π(1x)π(z)H+π(x)π(1z)I+π(1x)π(1z)J]

The expected payoffs associated with the government’s selection of strategies, whether active intervention or passive intervention were represented as Gz and G1−z, respectively. The average expected payoffs were represented by G¯:

(11) Gz=π(x)π(y)[V(Bg)Z(Cs+Se+Sc)]+π(1x)π(y)[V(Ke)Z(Cs+Sc+pG)]+π(x)π(1y)[V(Bg)Z(Cs+Se)]+π(1x)π(1y)[V(Ke)Z(Cs+pG)]
(12) G1z=π(x)π(y)[V(Bg)Z(0)]+π(1x)π(y)[V(0)Z(pG)]+π(x)π(1y)[V(Bg)Z(0)]+π(1x)π(1y)[V(0)Z(pG)]
(13) G¯=zGz+(1z)G1z

According to equations (11)–(13), we obtained the replicator dynamic equation for the government selecting active intervention, as follows:

(14) F(z)=dzdt=z(GzG¯)=z(z1)(GzG1z)=z(1z){π(x)π(y)[Z(Cs+Se+Sc)]+π(1x)π(y)[V(Ke)Z(Cs+Sc)]+π(x)π(1y)[Z(Cs+Se)]+π(1x)π(1y)[V(Ke)Z(Cs)]}=z(z1)[π(x)π(y)K+π(1x)π(y)L+π(x)π(1y)M+π(1x)π(1y)N]

Observing equations (6), for the probability of enterprises’ decision to be in a steady state, the conditions must be satisfied: F(x) = 0 and d(F(x))/dx < 0. To further analysis the replicator dynamic equation, when π(y)π(z)A + π(1 − y) π(z)B + π(y) π(1 − z)C + π(1 − y) π(1 − z)D = 0, it will lead to F(x) = 0, and it means that all strategies of enterprises are stable in this condition. If π(y)π(z)A + π(1 − y) π(z)B + π(y) π(1 − z)C + π(1 − y) π(1 − z)D < 0, when d(F(x))/dx |x=0 < 0 and d(F(x))/dx |x=1 > 0, this means x = 0 is the stable strategy and the steady state is reached when enterprises choose not to implement RI. On the contrary, if π(y)π(z)A + π(1 − y) π(z)B + π(y) π(1 − z)C + π(1 − y) π(1 − z)D > 0, when d(F(x))/dx |x=0 > 0 and d(F(x))/dx |x=1 < 0, the evolutionary equilibrium stable strategy of enterprises is x = 1, the achievement of a steady state is observed when enterprises choose to implement RI. The analyses conducted are succinctly portrayed in the replicated dynamic phase diagram, presented in Figure 3(a), illustrating the enterprises’ behavior.

Observing Figure 3(a), we can obtain the volume V11 of the probability that the enterprises choose the strategy of implementing RI and the volume V12 of the probability that the enterprises choose not to implement RI. The likelihood of implementing RI is positively correlated with the foundational benefits that enterprises gain from engaging in AVs, the financial penalties gave to enterprises by the government, the additional benefits derived from collaborative innovation with consumers, the compensation provided by enterprises to consumers and consumers’ knowledge level. Conversely, it is negatively associated with the cost incurred by enterprises to implement RI.

Observing equation (10), for the probability of consumers’ decision to be in a steady state, the conditions must be satisfied: F(y) = 0 and d(F(y))/dy < 0. To further analyze the replicator dynamic equation, when π(x)π(z)F + π(1 − x) π(z)H + π(x) π(1 − z)I + π(1 − x) π(1 − z)J = 0, it will lead to F(y) = 0, which means all strategies of consumers are stable. If π(x)π(z)F + π(1 − x) π(z)H + π(x) π(1 − z)I + π(1 − x) π(1 − z)J < 0, when d(F(z))/dz |z=0 < 0 and d(F(z))/dz |z=1 > 0, the evolutionary equilibrium stable strategy of consumers is y = 0, a steady state is reached when consumer choose not collaborative innovation or supervision. On the contrary, if π(x)π(z)F + π(1 − x) π(z)H + π(x) π(1 − z)I + π(1 − x) π(1 − z)J > 0, d(F(y))/dy |y=0 > 0 and d(F(y))/dy |y=1 > 0, the evolutionary equilibrium stable strategy of consumers is collaborative innovation and supervision. The duplicated dynamic phase diagram for consumers is depicted in Figure 3(b).

We can obtain the volume V21 of the probability that consumers choose the strategy of collaborative innovation and supervision and the volume V22 of the probability that consumers choose the strategy of not collaborative innovation or supervision. The likelihood of engaging in collaborative innovation and supervision is positively correlated with the incentive policies gave to consumers by the government, the experiential value based on consumers’ firsthand experience, the risks faced by consumers due to the negative risks of AVs, consumers’ knowledge level and the probability of consumer privacy leakage risk. Conversely, it is negatively associated with the cost borne by consumers for collaborative innovation and supervision.

Observing equation (14), for the probability of the government’s decision to be in a steady state, the conditions must be satisfied: F(z) = 0 and d(F(z))/dz < 0. To further analyze the replicator dynamic equation, when π(x)π(z)K + π(1 − x) π(z)L + π(x) π(1 − z)M + π(1 − x) π(1 − z)N = 0, F(z) = 0, it means that all strategies of the government are stable in this condition. When d(F(z))/dz |z=0 < 0 and d(F(z))/dz |z=1 > 0, resulted by π(x)π(z)K + π(1 − x) π(z)L + π(x) π(1 − z)M + π(1 − x) π(1 − z)N < 0, the evolutionary equilibrium stable strategy of the government is z = 0, a steady state is reached when the government choose active intervention. On the contrary, if π(x)π(z)K + π(1 − x) π(z)L + π(x) π(1 − z)M + π(1 − x) π(1 − z)N > 0, when d(F(z))/dz |z=0 > 0 and d(F(y))/dy |z=1 < 0, the evolutionary equilibrium stable strategy of the government is passive intervention. The duplicated dynamic phase diagram for consumers is depicted in Figure 3(c).

Analyzing Figure 3(c) allows us to ascertain the probabilities linked to the government’s selection between active intervention V31 and passive intervention V32. The likelihood of active intervention is positively correlated with the societal benefits accrued by the government, the financial penalties gave to enterprises, the probability of consumer privacy leakage risk and the government’s reputation loss. Conversely, it is negatively associated with the cost of the government for active intervention, the incentive policies gave to enterprises and consumers.

4.2 Stability analysis of the equilibrium point in the tripartite game

The decisions of stakeholders in the game model are mutually influential and subject to continuous evolution. Subsequently, a 3D dynamic system for the evolutionary game was constructed by the collective formulation as delineated below:

(15) {F(x)=dxdt=x(1x)[π(y)π(z)A+π(1y)π(z)B+π(y)π(1z)C+π(1y)π(1z)D]=0F(y)=dydt=y(1y)[π(x)π(y)F+π(1x)π(y)H+π(x)π(1y)I+π(1x)π(1y)J]=0F(z)=dzdt=z(z1)[π(x)π(z)K+π(1x)π(z)L+π(x)π(1z)M+π(1x)π(1z)N]=0

According to equation (15), let F(x) = 0, F(y) = 0, F(z) = 0, the local stable equilibrium point can be derived as follows: E1(0,0,0), E2(1,0,0), E3(0,1,0), E4(0,0,1), E5(1,1,0), E6(1,0,1), E7(0,1,1), E8(1,1,1), E9(x’, y’, z’). As x’, y’, z’ ∈ [0,1], E9(x’, y’, z’) is meaningless. Friedman draws attention to the fact that ESS is limited to pure strategies. So we only investigate the stability of 8 pure tactics in the game of evolution (Friedman, 1998). Asymptotic stability of the equilibrium point is attained when all eigenvalues of the Jacobian matrix exhibit negativity, aligning with Lyapunov's first law (Ritzberger and Weibull, 1995). The Jacobian matrix's outcomes are displayed in Table 3 after combining the known conditions to determine each eigenvalue’s positivity and negativity.

In accordance with Lyapunov’s local stability theorem, the local asymptotic stability of the evolutionary dynamics process can be achieved when the determinant Det(J) < 0, Tr(J) > 0 and the eigenvalue λ1, λ2, λ3 < 0. As is shown in Table 3, we ultimately obtained five points E1(0,0,0), E3(0,1,0), E4(0,0,1), E5(1,1,0), E7(0,1,1) which is uncertain.

If the point E1(0,0,0) is the system stability point for the gaming system, the conditions must be satisfied: D < 0, J < 0, N < 0, V(TVc) − Z(Cc) < 0 and V(Ke) − Z(Cs) < 0. If the point E3(0,1,0) is the system stability point for the gaming system, the conditions must be satisfied: C < 0, −J < 0, L < 0, Z(TVc) − Z(Ce) < 0, V(TVc) − Z(Cc) < 0 and V(Ke) − Z(Cs + Sc) < 0. If the point E4(0,0,1) is the system stability point for the gaming system, the conditions must be satisfied: B < 0, H < 0, −N < 0, V(Se) − Z(Ce) + Z(Ke) < 0, V(Sc + TVC) − Z(Cc) < 0 and Z(Cs) − V(Ke) < 0. When the point E5(1,1,0) is the system stability point for the gaming system, the conditions must be satisfied: −C < 0, −I < 0, K < 0, Z(TVc) − Z(Cc) > 0 and V(TBc) − Z(Cc) > 0. When the point E7(0,1,1) is the system stability point for the gaming system, the conditions must be satisfied: A < 0, −H < 0, −L < 0, V(Se) − Z(Ce) + Z(Ke + TVc)< 0, V(Sc + TVc) − Z(Cc) > 0. and V(Ke) − Z(Cs + Sc) > 0.

The five equilibrium points listed above are all stable locations under specific circumstances. But E3(0,1,0), E4(0,0,1) and E7(0,1,1) are difficult to achieve in real life, because the financial penalties from governments is often lower than the cost of active intervention and the compensation to consumers is often lower than the cost of consumers for collaborative innovation and supervision, which can be presented as Cs > Ke and Cc > Vc. As a result, these three stabilization points are only conceivable in theory. And the point E1(0,0,0) leans more toward the general scenario and fails to address the governance of privacy and security issues in AVs. The stabilization point E5(1,1,0) is a more desirable and useful outcome; thus, this equilibrium point is likewise disregarded.

5. Simulation analysis

To better assess parameter sensitivity and analyze the evolution of decision choices among the three-party stakeholders, this study used MATLAB software for model simulation. In the simulation, we set the start time as 0 and the end time as 10, while specific units of simulation are not explicitly defined. Some parameters such as θ, β, λ, δ, ϕ, σ refer to the reference of Tversky (Tversky and Kahneman, 1992) and Van (Van and Van, 1995), and others are set based on the conditions of system stability point. All the parameter settings are shown in Table 4. What’s more, the simulation process adopts the established approach from prior studies (Wang et al., 2022a, 2022b) where the initial value of valence reference point and cost reference point U0, U1 are set at 0.

According to Table 4, the initial stage evolution of the system at point E5(1,1,0) is illustrated in Figure 4. Figure 4 illustrates the tripartite evolutionary game, wherein initial tactics are randomly generated by MATLAB and remain unfixed, represented by distinct colored lines. After several cycles, they all reached E5(1,1,0), that is, the ESS of the government, enterprises and consumers is (Enterprises choose to implement RI, Consumers choose collaborative innovation and supervision, Government choose passive intervention). However, over time, the government realizes that even passive intervention can induce a desirable pattern of RI behavior among enterprises and consumers. Hence, E5(1,1,0) serves as the system stability point in the model under the assurance of the constraint conditions.

5.1 The effect of initial probability

The implementation of RI by enterprises benefits the governance of privacy and security issues in AVs. However, in practice, decision-making behaviors of individual stakeholders are influenced by those of other key stakeholders. To better discern the interactive effects among key stakeholders, this chapter analyzes micro-level behavioral changes resulting from initial strategy variations. Under the condition of ensuring that E5(1,1,0) is the system stability point and keeping the values of other parameters constant, taking x = y = z = 0.1, x = y = z = 0.3, x = y = z = 0.5, x = y = z = 0.7. Figure 5 depicts the strategy evolution process and outcomes.

The precise outcomes are displayed in Figure 5. The time unit (not yearly or monthly) is on the x-axis, and the probability value of the behavioral strategy is on the y-axis. As shown in Figure 5, the initial stability point of the system’s evolution remains consistent at point (1,1,0) and altering the initial probability distribution of strategy choices among game participants does not exert any discernible influence on the overarching trajectory of system evolution. However, changes in stakeholders’ initial levels of willingness have a big impact on how their behavioral strategies evolve over the course of the process.

Overall, a higher initial willingness ratio leads to faster evolution of enterprises and consumers toward stabilization strategies, while the government's evolution is slower. This indicates that in the early stage of privacy and security governance, the government should intervene actively, and consumers should opt for collaborative innovation and supervision to expedite the convergence of enterprises toward implementing RI. Moreover, the figure shows that the government converges at a significantly faster rate compared to other stakeholders. This disparity can be attributed to the government's primarily auxiliary role in the governance of issues related to AVs. Given the governance of privacy and security concerns, enterprises and consumers must shoulder greater responsibility.

Following an analysis of the impact of decision-making behaviors among key stakeholders, this study discerns that both enterprises and consumers are significantly influenced by other stakeholders, particularly enterprises. When consumers and the government adopt passive strategies, enterprises, driven by a profit-maximizing mindset, tend initially toward nonimplementation of RI. However, as time progresses, they subsequently shift toward the adoption of implementing RI. Furthermore, the study revealed that even after the government shifted its evolutionary strategy from active intervention to passive intervention, enterprises and consumers continued to evolve toward implementing RI and collaborative innovation. This observation suggests that, following a period of active government intervention, enterprises and consumers gradually acknowledged and embraced their responsibilities in addressing privacy and security concerns in AVs. While the government is less influenced by other key stakeholders, their strategic choices tend to evolve toward passive intervention. This inclination reflects a preference for market-oriented regulation in technological innovation governance. To analyze key stakeholder strategic choices more effectively, this study concentrates on factors related to enterprises and consumers. And the examination reveals that parameters solely associated with the government have a relatively minor impact on the strategic choices of key stakeholders.

5.2 Sensitivity analysis using different parameters in the initial stage

To better analyze variations in key stakeholder decision-making, this section conducts a parameter analysis focusing on crucial influencing factors. For simplicity, the analysis addresses parameters impacting the decision-making of enterprises and consumers, excluding detailed scrutiny of constant and unpredictable profit enhancement parameters, such Re, Be. The cost of consumers for collaborative innovation and supervision Cc, consumers’ knowledge level T and different perceived value factors were numerically simulated to investigate the impact of parameters on the stakeholders’ first stage of strategic evolution. To minimize the effect of initial probabilities on the rate of behavioral evolution among stakeholders, it was assumed that the initial strategies of key stakeholders were all set to 0.5.

5.2.1 Sensitivity analysis of the cost of enterprises to implement Responsible Innovation.

Figure 6 shows the effect of changing the cost of enterprises to implement RI as Ce = 2, 2.5, 3 on the evolutionary outcomes, and Figure 6(a)–(c) represents the dynamic evolutionary paths of enterprises, consumers and the government, respectively. Through Figure 6, it is observed that as costs increase, the evolutionary rate of enterprises toward the implementation of RI decreases, aligning with the realistic scenario where enterprises prioritize their own profit maximization. Conversely, consumers and the government exhibit minimal sensitivity to changes in the cost parameters, rendering their influence negligible. Similarly, this study validates a series of parameters directly related to the government, yielding similar conclusions. Therefore, in subsequent parameter analyses, only those parameters with significant impacts were considered.

5.2.2 Sensitivity analysis of the cost for collaborative innovation and supervision.

Figure 7 shows the effect of changing the cost of consumers for collaborative innovation and supervision as Cc = 1.5, 2, 3 on the evolutionary outcomes, and Figure 7(a)–7(c) represents the dynamic evolutionary paths of enterprises, consumers and the government, respectively. The figures Figure 7(a) and (b) clearly demonstrate the impact of the cost of consumers for collaborative innovation and supervision on the evolution of enterprises and consumers’ behavior strategies in privacy and security governance. It is evident that a decrease in cost results in a relatively quick convergence of enterprises and consumers toward a stabilization strategy. Conversely, when the cost exceeds a certain threshold, both enterprises and consumers switch strategies. Notably, the government shows limited sensitivity to this parameter.

The reason for this difference can be attributed to the government's auxiliary role in the governance of privacy and security in AVs. As the government primarily focuses on factors directly affecting itself, it is less influenced by factors from other stakeholders. On the other hand, for enterprises and consumers, the cost plays a crucial role. Conversely, as the cost decreases, the expected benefits from implementing RI and collaborative innovation increase, leading to an accelerated rate of evolution.

5.2.3 Sensitivity analysis of the consumers’ knowledge level.

Figure 8 shows the effect of changing consumers’ knowledge level as T = 0.5, 0.8, 0.9 on the evolutionary outcomes, and Figure 8(a)–(c) represents the dynamic evolutionary paths of enterprises, consumers and the government, respectively. It is evident from Figure 8(a) and (b), the consumers’ knowledge level positively affected the evolution of enterprises and consumers’ behavior strategies in the governance of privacy and security issues. With consumers' knowledge level increases, enterprises and consumers converge more rapidly toward a stabilization strategy. Conversely, when consumers’ knowledge level falls below a certain threshold, both enterprises and consumers undergo strategic shifts.

The rationale behind the government’s role aligns with the aforementioned analysis of the cost for collaborative innovation and supervision, where the government primarily assumes a auxiliary role in this process. On the other hand, for enterprises and consumers, a low level of consumer knowledge indicates insufficient understanding of AVs. In this model, when consumers have limited knowledge, their experiential value and compensation demands from enterprises are also affected, resulting in a decrease. Consequently, the expected benefits for consumers to choose cooperative innovation diminish. Similarly, the benefits for enterprises to refrain from implementing RI relatively increase.

5.2.4 Sensitivity analysis of the different perceived value factors

5.2.4.1 Sensitivity analysis of the sensitivity to cost loss aversion degree.

Because the initial value of valence reference point and cost reference point are set at 0 in this study, which means U0 = U1 = 0. Therefore, this study undertakes further analysis by examining the sensitivity of loss avoidance factors with respect to the cost loss aversion degree. If δ > 1, it signifies the aversion of stakeholders toward risk. Figure 8 illustrates the strategy evolution process and outcomes when δ = 1.5, 2.5, 3.5.

Illustrated in Figure 9(a) and (c), the government's behavioral strategies are positively influenced by the sensitivity to cost loss aversion, whereas consumers' behavioral strategies are adversely affected. An increase in this parameter leads to a faster convergence of the government toward a stabilization strategy, while consumers exhibit a slower convergence. Meanwhile, we found that consumers exhibit the highest sensitivity to this parameter, followed by the government.

Consumers exhibit the highest sensitivity to this parameter, which can be attributed to the influence of individual differences and subjective factors within this group. As consumers actively participate in the governance of privacy and security in AVs, they incur additional costs beyond the norm. Therefore, their willingness to invest time, effort and other resources in governance decreases as the sensitivity to cost loss aversion degree increases.

5.2.4.2 Sensitivity analysis of the sensitivity to the risk preference coefficient.

Based on the condition U0 = U1 = 0, the study take the sensitivity analysis of the risk preference coefficient when the valence is relative to gain-loss and the risk preference coefficient when the cost is relative to the loss-benefit. Taking θ = 0.8, 0.88, 0.98, Figure 10 displays the strategy evolution process and outcomes. The sensitivity to risk preference coefficient when the valence is relative to gain-loss positively affected the evolution of the enterprises and consumers’ behavior strategies and has little impact on the government's strategy.

Taking ϕ = 0.8, 0.88, 0.98, the strategy evolution process and outcomes are depicted in Figure 11. The sensitivity of the risk preference coefficient associated with cost in the context of loss-benefit positively influenced the evolution of government and enterprises’ behavior strategies, while concurrently exerting a negative impact on the evolution of consumers' behavior strategies.

According to the analysis of the sensitivity to the risk preference coefficient from Figures 10 and 11, it is found that both θ and ϕ positively affected the evolution of enterprises’ behavior strategies, while the government exhibits greater sensitivity to the risk preference coefficient when the cost is relative to the loss-benefit ϕ. Concurrently, the risk preference coefficient associated with valence concerning gain-loss, denoted as θ positively influenced the evolution of consumers’ strategies, while the risk preference coefficient related to cost in the context of loss-benefit, denoted as ϕ exerted a negative impact on the evolution of consumers.

In the event of an increase in the risk preference coefficient associated with valence concerning gain-loss, both enterprises and consumers experience an enhanced perceived value of implementing RI and engaging in collaborative innovation. As a result, the pace of their evolution accelerates. However, the government, primarily concerned with risk losses in relation to social benefits, exhibits relatively lower sensitivity to this parameter θ. The change in this parameter has a minimal impact on the perceived value and the subsequent behavior of the government.

As the parameter ϕ increases, enterprises perceive an increased risk related to penalties and compensations associated with not implementing RI. This perception accelerates their shift toward implementing. Furthermore, both consumers and the government become more sensitive to the costs involved. The government, in particular, prioritizes privacy and security governance at lower costs, resulting in an accelerated evolution toward passive intervention. Conversely, consumers maintain concerns about privacy and security issues, leading them to evolve toward collaborative innovation and supervision, albeit at a slower pace.

6. Discussion

This study integrates the theories of RI, key stakeholders and perceived value to examine the governance of privacy and security in AVs. Using the prospect theory, the study develops an evolutionary game model involving three key stakeholders. Through simulations, influential factors impacting decision-makers are identified, including consumer participation costs, consumers' knowledge levels and the perceived value of each stakeholder.

A comprehensive review of existing literature reveals a notable deficiency in current research concerning the multi-agent interactive aspects and ethical–moral dimensions of governance in privacy and security of AVs. This study advocates for the implementation of RI by enterprises, emphasizing a micro-level perspective that considers the interactive influences among key stakeholders. This approach not only aligns with real-world scenarios but also supplements ethical constraints in practice, thereby promoting the steady development of autonomous driving technology. We also explore the multi-agent interaction process of privacy and security governance in AVs, offering insights for future discussions among key stakeholders in the field of AVs. Notably, we identify the significant role of consumers in the governance of privacy and security, offering valuable insights applicable to real-world scenarios. Thus, assisting enterprises and government agencies in the tangible governance of privacy and security issues, this approach prioritizes consumers. Each stakeholder comprehensively regulates the key factors influencing their decisions, contributing to cost reduction and efficiency improvement.

Moreover, the practical application of RI theory is found to be lacking, highlighting the necessity for strengthening its connection with real-world scenarios. This study focuses on AVs and the practical implementation of RI, thereby expanding the research scope in related fields. Additionally, this study reflects on the shortcomings of evolutionary game theory at the research level. The study also addresses specific gaps in existing evolutionary game models, particularly the lack of consideration for individual stakeholder differences and subjective factors, such as the varying perceived value resulting from the valence account and the cost account.

7. Conclusion

  • The enactment of RI by enterprises successfully mitigates privacy and security risks within the framework of AVs. Enterprises’ decision-making is influenced by the strategic choices of various stakeholders, with consumers exerting a relatively stronger influence compared to other stakeholders. In contrast, the government focuses on promoting the widespread diffusion of AVs at lower costs, making it less influenced by the strategic choices of enterprises and consumers. Enterprises play a crucial role by ensuring compliance with relevant laws, regulations and privacy standards on their AV platforms. Transparent and easily understandable privacy policies should be provided by enterprises, outlining the methods of data collection, storage and usage explicitly.

  • The costs associated with consumers participation in cooperation and supervision have an impact on strategic choices. These costs not only influence consumers’ decisions but also affect enterprises’ decisions. When consumers face higher participation costs, influenced by perceived value, they are more inclined to choose nonparticipation in cooperation to reduce the burden of costs. Similarly, enterprises are indirectly influenced by consumers’ strategic choices, leading to a preference for non-implementation of RI. Therefore, consumers play a crucial role in the diffusion of AVs, and the government should prioritize policies that encourage consumer participation and establish multiple channels for supervision and reporting.

  • Consumers’ knowledge level influences strategic choices among the stakeholders. Based on the parameter analysis conducted in this study, consumers with a high level of knowledge are more inclined to participate in cooperation and supervision, while enterprises are also influenced by consumers' knowledge level, leading them to prioritize the implementation of RI. Conversely, consumers with lower knowledge levels may have limited awareness of data security risks, leading to lower concerns about personal privacy exposure. This may lead to a more permissive attitude toward data sharing and privacy protection among consumers.

  • Intriguingly, stakeholders’ perceptions of the value of decision-making will vary widely due to the influence of subjective factors like risk aversion and profit aversion. However, the final stable condition of the evolutionary process is characterized by a wide range of options and a government preference for passive intervention. The numerical simulation and parameter analysis reveal that government entities are more sensitive to the avoidance of losses compared to other external influences. Additionally, different risk preferences can significantly affect the pace of decision-making evolution for both enterprises and consumers. Therefore, when addressing privacy and security governance issues and designing behavioral norms for decision-makers, it is crucial to fully consider the irrational factors that influence decision-making (Wang et al., 2022a, 2022b).

Summarizing the research findings, this study contributes to the governance of privacy and security issues in AVs by offering new ethical and moral perspectives. By fully considering the roles of key stakeholders and the impact of various factors, it promotes the ethical development of AVs. Theoretical significance is evident in the enrichment of RI theory and the filling of gaps in evolutionary game theory, providing a reference for micro-level theoretical research.

Figures

System analysis framework for the governance of privacy and security in AVs

Figure 1.

System analysis framework for the governance of privacy and security in AVs

The structural tree of the game model

Figure 2.

The structural tree of the game model

Evolutionary phase diagram of enterprises, consumers and the government

Figure 3.

Evolutionary phase diagram of enterprises, consumers and the government

Evolution process of the system in the initial stage

Figure 4.

Evolution process of the system in the initial stage

Effect of initial probability on strategy evolution of each party

Figure 5.

Effect of initial probability on strategy evolution of each party

Stakeholders’ sensitivity to changes in the cost of enterprises for implement RI

Figure 6.

Stakeholders’ sensitivity to changes in the cost of enterprises for implement RI

Stakeholders’ sensitivity to changes in the cost of consumers for collaborative innovation and supervision

Figure 7.

Stakeholders’ sensitivity to changes in the cost of consumers for collaborative innovation and supervision

Stakeholders’ sensitivity to changes in consumers’ knowledge level

Figure 8.

Stakeholders’ sensitivity to changes in consumers’ knowledge level

Stakeholders’ sensitivity to changes in the sensitivity to cost loss aversion degree

Figure 9.

Stakeholders’ sensitivity to changes in the sensitivity to cost loss aversion degree

Stakeholders’ sensitivity to changes in the risk preference coefficient when the valence is relative to gain-loss

Figure 10.

Stakeholders’ sensitivity to changes in the risk preference coefficient when the valence is relative to gain-loss

Stakeholders’ sensitivity to changes in the risk preference coefficient when the cost is relative to the loss-benefit

Figure 11.

Stakeholders’ sensitivity to changes in the risk preference coefficient when the cost is relative to the loss-benefit

Acronyms and parameters within this study

Parameter Meaning
Re The foundational benefits that enterprises gain from engaging in AVs
Ce The cost of enterprises to implement RI
Se The incentive policies gave to enterprises by the government
Ke The financial penalties gave to enterprises by the government
Be The additional benefits of enterprises by the collaborative innovation of consumers
Vc The compensation from enterprises to consumers
Bc The experiential value based on consumers’ firsthand experience
Cc The cost of consumers for collaborative innovation and supervision
Sc The incentive policies gave to consumers by the government
Dr The risk faced by consumers due to the negative risks of AVs
Bg The societal benefits which government obtained
G The reputation loss of government
Cs The cost of the government for active intervention
p The probability of consumer privacy leakage risk
T Consumers’ knowledge level
x The decision probability of enterprises to implement RI
y The decision probability of consumers for collaborative innovation and supervision
z The decision probability of the government for active intervention

Source: By authors

Payoff matrix of the model

Government Enterprises Consumers
Collaborative innovation
and supervision
y
Not collaborative
innovation or
supervision
1 − y
Active intervention
z
Implement RI
x
V(Bg)Z(Cs+Se+Sc)
V(Re+Se+Be)Z(Ce)
V(TBc+Sc)Z(Cc)
V(Bg)Z(Cs+Se)
V(Re+Se)Z(Ce)
V(0)Z(0)
Not implement RI
1 − x
V(Ke)Z(Cs+Sc+pG)
V(Re+Be)Z(Ke+TVc)
V(Sc+TVc)Z(Cc+pDr)
V(Ke)Z(Cs+pG)
V(Re)Z(Ke)
V(0)Z(pDr)
Passive intervention
1 − z
Implement RI
x
V(Bg)Z(0)
V(Re+Be)Z(Ce)
V(TBc)Z(Cc)
V(Bg)Z(0)
V(Re)Z(Ce)
V(0)Z(0)
Not implement RI
1 − x
V(0)Z(pG)
V(Re+Be)Z(TVc)
V(TVc)Z(Cc+pDr)
V(0)Z(pG)
V(Re)Z(0)
V(0)Z(pDr)

Source: By authors

Eigenvalues of the Jacobian matrix and the stability analysis

System
Balance point
Eigenvalue
λ1
Eigenvalue
λ2
Eigenvalue
λ3
Det(J) Tr(J) Result
E1(0,0,0) D(−) J(+,−) N(+,−) DJN D + J + N Uncertain
E2(1,0,0) D(+) I(+,−) M(−) −DIM −D + I + M Instability
E3(0,1,0) C(+,−) J(+,−) L(+,−) −CJL C J + L Uncertain
E4(0,0,1) B(+,−) H(+,−) −N(+,−) −BHN B + H N Uncertain
E5(1,1,0) C(+,−) I(+,−) K(−) CIK −C I + K Uncertain
E6(1,0,1) B(+,−) F(+,−) −M(+) BFM −B + F M Instability
E7(0,1,1) A(+,−) H(+,−) −L(+,−) AHL A H L Uncertain
E8(1,1,1) A(+,−) F(+,−) −K(+) −AFK −A F K Instability

Source: By authors

Parameter settings

Parameter r θ β λ δ ϕ σ Re Be Se Ce
Initial value 0.75 0.88 0.88 2.5 2.5 0.98 0.98 2 3 1.5 2.5
Parameter Ke Vc Bc Cc Sc Dr Bg Cs G T p
Initial value 4 8 9 1.5 1 5 1.5 4 6 0.8 0.1

Source: By authors

References

Acquisti, A., Taylor, C. and Wagman, L. (2016), “The economics of privacy”, Journal of Economic Literature, Vol. 54 No. 2, pp. 442-492, doi: 10.1257/jel.54.2.442.

Ansell, C. and Gash, A. (2018), “Collaborative platforms as a governance strategy”, Journal of Public Administration Research and Theory, Vol. 28 No. 1, pp. 16-32, doi: 10.1093/jopart/mux030.

Arthur, K. and Owen, R. (2019), “A micro-ethnographic study of big data-based innovation in the financial services sector: governance, ethics and organisational practices”, Journal of Business Ethics, Vol. 160 No. 2, pp. 363-375, doi: 10.1007/s10551-019-04203-x.

Bacq, S. and Aguilera, R. (2022), “Stakeholder governance for responsible innovation: a theory of value creation, appropriation, and distribution”, Journal of Management Studies, Vol. 59 No. 1, pp. 29-60, doi: 10.1111/joms.12746.

Bechtsis, D., Tsolakis, N., Vlachos, D. and Srai, J. (2018), “Intelligent autonomous vehicles in digital supply chains: a framework for integrating innovations towards sustainable value networks”, Journal of Cleaner Production, Vol. 181, pp. 60-71, doi: 10.1016/j.jclepro.2018.01.173.

Becker, F. and Axhausen, K.W. (2017), “Literature review on surveys investigating the acceptance of automated vehicles”, Transportation, Vol. 44 No. 6, pp. 1293-1306, doi: 10.1007/s11116-017-9808-9.

Brandao, M., Jirotka, M., Webb, H. and Luff, P. (2020), “Fair navigation planning: a resource for characterizing and designing fairness in mobile robots”, Artificial Intelligence, Vol. 282, p. 103259, doi: 10.1016/j.artint.2020.103259.

Brüne, M. and Wilson, D. (2020), “Evolutionary perspectives on human behavior during the coronavirus pandemic: insights from game theory”, Evolution, Medicine, and Public Health, Vol. 2020 No. 1, pp. 181-186, doi: 10.1093/EMPH/EOAA034.

Cornell, B. and Shapiro, A.C. (1987), “Corporate stakeholders and corporate finance”, Financial Management, Vol. 16 No. 1, pp. 5-14, doi: 10.2307/3665543.

Freeman, R.E. (1984), Strategic Management: A Stakeholder Approach, Piaman Publishing, Boston, MA.

Frewer, L.J., Howard, C. and Shepherd, R. (1998), “Understanding public attitudes to technology”, Journal of Risk Research, Vol. 1 No. 3, pp. 221-235, doi: 10.1080/136698798377141.

Friedman, D. (1998), “On economic applications of evolutionary game theory”, Journal of Evolutionary Economics, Vol. 8 No. 1, pp. 15-43, doi: 10.1007/s001910050054.

Gkartzonikas, C. and Gkritza, K. (2019), “What have we learned? A review of stated preference and choice studies on autonomous vehicles”, Transportation Research Part C: Emerging Technologies, Vol. 98, pp. 323-337, doi: 10.1016/j.trc.2018.12.003.

Goering, S., Klein, E., Specker Sullivan, L., Wexler, A., Agüera y Arcas, B., Bi, G., Carmena, J.M., Fins, J.J., Friesen, P., Gallant, J. and Huggins, J.E. (2021), “Recommendations for responsible development and application of neurotechnologies”, Neuroethics, Vol. 14 No. 3, pp. 365-386, doi: 10.1007/s12152-021-09468-6.

Haboucha, C., Ishaq, R. and Shiftan, Y. (2017), “User preferences regarding autonomous vehicles”, Transportation Research Part C: Emerging Technologies, Vol. 78, pp. 37-49, doi: 10.1016/j.trc.2017.01.010.

Han, X., Zhou, Y., Chen, K., Qiu, H., Qiu, M., Liu, Y. and Zhang, T. (2023), “ADS-lead: lifelong anomaly detection in autonomous driving systems”, IEEE Transactions on Intelligent Transportation Systems, Vol. 24 No. 1, pp. 1-13, doi: 10.1109/TITS.2021.3122906.

Hemphill, T. (2019), “Techlash, responsible innovation, and the self-regulatory organization”, Journal of Responsible Innovation, Vol. 6 No. 2, pp. 240-247, doi: 10.1080/23299460.2019.1602817.

Keszey, T. (2020), “Behavioural intention to use autonomous vehicles: systematic review and empirical extension”, Transportation Research Part C: Emerging Technologies, Vol. 119, p. 102732, doi: 10.1016/j.trc.2020.102732.

Khan, R., Mehmood, A., Maple, C., Curran, K. and Song, H. (2023), “Performance analysis of blockchain-enabled security and privacy algorithms in connected and autonomous vehicles: a comprehensive review”, IEEE Transactions on Intelligent Transportation Systems, pp. 1-12, doi: 10.1109/TITS.2023.3341358.

LaCroix, T. and Mohseni, A. (2022), “The tragedy of the AI commons”, Synthese, Vol. 200 No. 4, p. 289, doi: 10.1007/s11229-022-03763-2.

Lee, J., Lee, D., Park, Y., Lee, S. and Ha, T. (2019), “Autonomous vehicles can be shared, but a feeling of ownership is important: examination of the influential factors for intention to use autonomous vehicles”, Transportation Research Part C: Emerging Technologies, Vol. 107, pp. 411-422, doi: 10.1016/j.trc.2019.08.020.

Levy, R. and Haddad, J. (2022), “Cooperative path and trajectory planning for autonomous vehicles on roads without lanes: a laboratory experimental demonstration”, Transportation Research Part C: Emerging Technologies, Vol. 144, p. 103813, doi: 10.1016/j.trc.2022.103813.

Lindner, T., Puck, J. and Stocco, G. (2022), “Asymmetric risk perception and firm financing in the institutional envelope”, International Business Review, Vol. 32 No. 3, p. 102067, doi: 10.1016/j.ibusrev.2022.102067.

Liu, Q., Yang, Q. and Xia, D. (2018), “Financial strategy optimization of Municipal solid waste clean incineration power generation based on multi-agent evolutionary game model”, IOP Conference Series. Earth and Environmental Science, Vol. 199 No. 2, pp. 22044, doi: 10.1088/1755-1315/199/2/022044.

Lu, Y., Huang, X., Zhang, K., Maharjan, S. and Zhang, Y. (2020), “Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles”, IEEE Transactions on Vehicular Technology, Vol. 69 No. 4, pp. 4298-4311, doi: 10.1109/TVT.2020.2973651.

Mahnoor, Z., Naeem, H., Iqra, A. and Sajawal, A.M. (2021), “From corporate social responsibility activities to financial performance: role of innovation and competitive advantage”, Asia Pacific Journal of Innovation and Entrepreneurship, Vol. 15 No. 1, pp. 2-13, doi: 10.1108/APJIE-04-2020-0046.

Maynard, A. and Scragg, M. (2019), “The ethical and responsible development and application of advanced brain machine interfaces”, Journal of Medical Internet Research, Vol. 21 No. 10, p. e16321, doi: 10.2196/16321.

Mo, B., Wang, Q., Moody, J., Shen, Y. and Zhao, J. (2021), “Impacts of subjective evaluations and inertia from existing travel modes on adoption of autonomous mobility-on-demand”, Transportation Research Part C: Emerging Technologies, Vol. 130, p. 103281, doi: 10.1016/j.trc.2021.103281.

Owen, R., Macnaghten, P. and Stilgoe, J. (2012), “Responsible research and innovation: from science in society to science for society, with society”, Science and Public Policy, Vol. 39 No. 6, pp. 751-760, doi: 10.1093/scipol/scs093.

Pettigrew, S., Fritschi, L. and Norman, R. (2018), “The potential implications of autonomous vehicles in and around the workplace”, International Journal of Environmental Research and Public Health, Vol. 15 No. 9, p. 1876, doi: 10.3390/ijerph15091876.

Ritzberger, K. and Weibull, J. (1995), “Evolutionary selection in normal-form games”, Econometrica, Vol. 63 No. 6, pp. 1371-1399.

Sinha, A., Chand, S., Wijayaratna, K., Vird, N. and Dixi, V. (2020), “Comprehensive safety assessment in mixed fleets with connected and automated vehicles: a crash severity and rate evaluation of conventional vehicles”, Accident Analysis and Prevention, Vol. 142, p. 105567, doi: 10.1016/j.aap.2020.105567.

Stilgoe, J., Owen, R. and Macnaghten, P. (2013), “Developing a framework for responsible innovation”, Research Policy, Vol. 42 No. 9, pp. 1568-1580, doi: 10.1016/j.respol.2013.05.008.

Szabo, G. and Fath, G. (2007), “Evolutionary games on graphs”, Physics Reports, Vol. 446 Nos 4/6, pp. 97-216, doi: 10.1016/J.PHYSREP.2007.04.004.

Thaler, R. (1985), “Mental accounting and consumer choice. Marketing science”, Marketing science (Providence, R.I.), Vol. 27 No. 1, pp. 15-25, doi: 10.1287/mksc.1070.0330.

Tversky, A. and Kahneman, D. (1992), “Advances in prospect theory: cumulative representation of uncertainty”, Journal of Risk and Uncertainty, Vol. 5 No. 4, pp. 297-323.

Tversky, A. and Kahneman, D. (1979), “Prospect theory: an analysis of decision under risk”, Econometrica, Vol. 47, pp. 263-291, doi: 10.1016/j.trpro.2020.03.139.

Van, S.E. and Van, D.P.J. (1995), “Influencing risk preference in decision making: the effects of framing and salience”, Organizational Behavior and Human Decision Processes, Vol. 63 No. 3, pp. 264-275, doi: 10.1006/obhd.1995.1078.

Wang, S. and Wu, J. (2014), “Proactive privacy practices in transition: toward ubiquitous services”, Information and Management, Vol. 51 No. 1, pp. 93-103, doi: 10.1016/j.im.2013.09.005.

Wang, Z. and Fan, J. (2022), “Flexible threshold ring signature in chronological order for privacy protection in edge computing”, IEEE Transactions on Cloud Computing, Vol. 10 No. 2, pp. 1253-1261, doi: 10.1109/TCC.2020.2974954.

Wang, J., Yang, B. and Zhai, L. (2022a), “Tripartite evolutionary game analysis of trust relationship between enterprises in a cloud manufacturing environment: a service composition perspective”, Discrete Dynamics in Nature and Society, Vol. 2022, pp. 1-17, doi: 10.1155/2022/6922627.

Wang, X.P., Zhang, Z.M., Guo, Z.H. and Sun, L.Y. (2023), “Energy structure transformation in the context of carbon neutralization: evolutionary game analysis based on inclusive development of coal and clean energy”, Journal of Cleaner Production, Vol. 398, p. 5388, doi: 10.3390/pr10081650.

Wang, Y., Fan, R., Du, K., Lin, J., Wang, D. and Wang, Y. (2022b), “Private charger installation game and its incentive mechanism considering prospect theory”, Transportation Research Part D: Transport and Environment, Vol. 113, p. 103508, doi: 10.1016/j.trd.2022.103508.

Wenner, L. (2015), “Expected prices as reference points-theory and experiments”, European Economic Review, Vol. 75, pp. 60-79, doi: 10.1016/j.euroecorev.2015.01.001.

Yang, K., Wang, W. and Xiong, W. (2021), “Promoting the sustainable development of infrastructure projects through responsible innovation: an evolutionary game analysis”, Utilities Policy, Vol. 70, p. 101196, doi: 10.1016/j.jup.2021.101196.

Yuan, M., Li, Z., Li, X., Li, L., Zhang, S. and Luo, X. (2022), “How to promote the sustainable development of prefabricated residential buildings in China: a tripartite evolutionary game analysis”, Journal of Cleaner Production, Vol. 349, p. 131423, doi: 10.1016/j.jclepro.2022.131423.

Yuan, J., Wang, Z., Xu, C., Li, H., Dai, S. and Liu, H. (2023), “Multi‐vehicle group‐aware data protection model based on differential privacy for autonomous sensor networks”, IET Circuits, Devices and Systems, IET Circuits Devices and Systems, Vol. 17 No. 4, pp. 278-290, doi: 10.1049/cds2.12140.

Zhang, Z., Wang, X., Su, C. and Sun, L. (2022), “Evolutionary game analysis of shared manufacturing quality innovation synergetic behavior considering a subject’s heterogeneous emotions”, Processes, Vol. 10 No. 7, p. 1233, doi: 10.3390/pr10071233.

Zheng, Q., Liu, X., Wang, W., Wu, Q., Deveci, M. and Pamucar, D. (2023), “The integrated prospect theory with consensus model for risk analysis of human error factors in the clinical use of medical devices”, Expert Systems with Applications, Vol. 217, p. 119507, doi: 10.1016/j.eswa.2023.119507.

Zhu, Z., Wang, X., Zhao, Y., Qiu, S., Liu, Z., Chen, B. and Wang, F.Y. (2022), “Crowdsensing intelligence by decentralized autonomous vehicles organizations and operations”, IEEE Transactions on Intelligent Vehicles, Vol. 7 No. 4, pp. 804-808, doi: 10.1109/TIV.2022.3224918.

Further reading

Lei, Y., Ye, D., Shen, S., Sui, Y., Zhu, T. and Zhou, W. (2023), “New challenges in reinforcement learning: a survey of security and privacy”, Artificial Intelligence Review, Vol. 56 No. 7, pp. 7195-7236, doi: 10.1007/s10462-022-10348-5.

Liu, N., Nikitas, A. and Parkinson, S. (2020), “Exploring expert perceptions about the cybersecurity and privacy of connected and autonomous vehicles: a thematic analysis approach”, Transportation Research Part F: Traffic Psychology and Behaviour, Vol. 75, pp. 66-86, doi: 10.1016/j.trf.2020.09.019.

Liu, Y., Quan, B., Xu, Q. and Forrest, J. (2019), “Corporate social responsibility and decision analysis in a supply chain through government subsidy”, Journal of Cleaner Production, Vol. 208, pp. 436-447, doi: 10.1016/j.jclepro.2018.10.121.

Tomas, R.F., Fernandes, P., Macedo, E., Bandeira, J.M. and Coelho, M.C. (2020), “Assessing the emission impacts of autonomous vehicles on metropolitan freeways”, Transportation Research Procedia, Vol. 47, pp. 617-624, doi: 10.1016/j.trpro.2020.03.139.

Acknowledgements

This study was supported by the National Natural Science Foundation of China (Grant No. 72174116). The authors are grateful to the reviewers for their constructive comments.

Research funding: This work was supported by the National Natural Science Foundation of China (Grant No. 72174116).

Corresponding author

Xiaohai Xin can be contacted at: xxh1002914006@126.com

Related articles