Skip to main content
PLOS One logoLink to PLOS One
. 2024 May 15;19(5):e0292571. doi: 10.1371/journal.pone.0292571

An evolutionary game analysis of algorithmic indirect copyright infringement from the perspective of collusion between UGC platforms and direct infringers

Jiangang Liu 1, Yuxuan Shen 1,*, Lanlan Zhou 1
Editor: Mudassir Khan2
PMCID: PMC11095730  PMID: 38748701

Abstract

User-generated content (UGC) is developing rapidly as an emerging platform form, however, the problem of indirect copyright infringement by algorithms is becoming more and more prominent, and infringement governance has become a key act in the development of UGC platforms. When infringement occurs, recommendation algorithms expand the scope and results of infringement, while platforms choose to conspire with direct infringers for their own interests, making it difficult for infringed persons to defend their rights. In order to analyse the influence of different factors in the platform ecosystem on the subject’s behavioural strategies, a "platform-infringer" evolutionary game model is constructed, and numerical simulation is used to verify the correctness of the stable results. Based on the simulation results, it is concluded that the factors of uncertain revenue, punishment and reputation loss have important influence on the decision-making behaviour of the subject of infringement governance, and accordingly, the proposed measures on the publishers, platforms and the legal level of the government are conducive to the evolution of the system to the point of positive regulation and stability of rights protection, with a view to promoting the healthier and more stable development of the UGC platforms.

1 Introduction

UGC (User Generated Content) platform refers to various forms of media and creative works created by users through the Internet and its technology [1]. UGC platforms have gradually developed and flourished along with the advancement of Internet technology, especially in China, relying on demographic advantages, ushering in explosive growth, such as the explosive Jitterbug, Xiaohongshu, Himalaya, etc. Among them, short video platforms have seen the most significant growth, according to the Report. Among them, the short video platform has grown most significantly, according to the report shows that as of June 2022, the user scale of short videos in China reached 962 million, accounting for 91.5% of Internet users as a whole. However, along with the rapid development, the problem of UGC content has gradually come to the forefront, with content that infringes on others’ copyrights being particularly prevalent. For example, Aqiyi v. A well-known short video platform APP provided users with online playing and downloading services of the infringing video through various recommendation behaviours. Meanwhile, in the case of Xuanting Entertainment Co. v. Himalaya Co., the court found that some of the infringing accounts’ real-name information was obviously fictitious, and considered that the accounts were intentionally set up for the purpose of disseminating the novels in question, and thus the court ruled that Himalaya Co. needed to bear the responsibility for the infringement of copyright. The court ruled that Himalaya was liable for the infringement. The frequent occurrence of such infringement incidents not only has a direct bearing on the survival and development of the UGC platform industry, but also makes the public indifferent to the awareness of copyright protection.

Wu Handong [2] It is proposed that in the network environment, the wide dissemination of infringing content is often the result of the joint action of the infringer and the UGC platform. That is, the infringer releases infringing content that can be disseminated, while the UGC platform provides algorithmic technical support for the dissemination of infringing content, and the combination of the two behaviours ultimately leads to the widespread dissemination of infringing content, so how to effectively govern the algorithm indirectly infringes copyright has become the primary issue for UGC platforms. When the infringed person sues the court for infringement, the court usually requires the real name information of the direct infringer, and even if the infringed person asks the platform to disclose who has committed the infringing act, the platform will not easily disclose it in most cases, so the infringed person can only sue the platform to the court. On the one hand, in order to retain more traffic through such infringing content and earn more benefits for themselves, on the other hand, in order to avoid damage to the reputation of the platform as a result of the establishment of the fact of infringement, the platform is unwilling to disclose the direct infringer’s information. Infringed person usually face two major problems when defending their rights: first, it is difficult to obtain evidence, the acquisition of evidence of infringement requires the technical cooperation of the platform, and the real name information of the direct infringer needs to be provided by the platform; second, the cost is high and the benefit is low, the time and economic cost required for defending their rights is a heavy burden for the average user, and the amount of damages awarded for a successful lawsuit is generally low. Now some scholars have constructed a two-round dynamic game model through the game tree, and obtained the conclusion that litigants can improve the settlement rate [3]. Cui Li constructed a game model between platform companies, consumers and government departments and analyzed the game relationship among the three [4].Based on the perspective of collusion between UGC platforms and direct infringers, this paper analyses the game between platforms and direct infringers in the act of indirect copyright infringement by algorithms, and analyses the reasons why infringed person in the network environment do not choose to defend their rights even though they know that they are infringed.

Current research on content governance for UGC platforms is divided into two main categories, one of which is quality content incentives. Continuously acquiring high-quality UGC contributions is critical to the survival and success of the UGC industry, especially platform companies [5] A UGC platform generates multiple ways to evaluate the quality of content, the most common of which are the number of views and downloads, the number of followers a user has, and positive ratings and reviews of the content [6, 7]These approaches make it necessary for platforms to attract empowered users in terms of both content generation and consumption, and to encourage and incentivize them to participate in content production or to consume content on an ongoing basis.More relevant to this study is another category, content censorship research. Much of the discussion concerns freedom of expression, censorship, and the pros or cons of content auditing [810] Madio examines content audits as a tool to attract content-sensitive advertisers and as a way to manage their ad prices [11]. Liu et al. investigated the economic incentives of social media platforms to review user-generated content by developing a theoretical model [12].

Scholar Xiao Hongjun thinks that algorithms play the role of "agent", as the "agent" of human beings, possessing part of the decision-making power that human beings "cede", so algorithms have an indirect subjectivity and can and should be socially responsible [13]. Blockchain and machine learning are important parts of the algorithms that make up the UGC platform. A systematic literature review has been conducted to analyze blockchain-based applications in various domains such as business process development [14], healthcare [15], IoT [16] and climate agriculture system [17]. Meanwhile, machine learning techniques allow us to identify the impact of online reviews and predict future customer’s behaviour [18]. It has been proven that both, positive and negative comments published on comparative websites, can change the customer’s opinion, which means they have great influence on the decision processes [19]. A deep learning approach to facial emotion recognition using neural network techniques has been investigated by scholars [20]. That’s why algorithms should be socially responsible, but also UGC platforms have a responsibility as users of algorithms [21]. Therefore, in the online copyright infringement, the network service provider bears mainly indirect responsibility [22]. Therefore, in the online copyright infringement, the network service provider mainly bears indirect liability. Indirect infringement" in the sense of copyright law means that although the perpetrator has not carried out the act of controlling the "exclusive right" of copyright, he intentionally induces or abets others to infringe the copyright, or provides substantial help when he knows that others intend to carry out or are carrying out the infringing act [23]. Even if UGC platforms do not intentionally promote infringing content, recommendation algorithms that compete for traffic as the underlying logic will automatically give such content recommended status, which undoubtedly provides assistance to infringing behaviour and amplifies the results of infringing damages [24].

In summary the research system of algorithmic copyright infringement in the existing research has been initially formed, and gradually carried out research in many subdivided areas, which provides this paper with a solid theoretical foundation and rich research reference. However, the existing research still has the following deficiencies: (1) the research on platform governance in the existing literature mainly focuses on content governance, governance paradigm, and infringement governance, but most of the research on infringement governance is qualitative research through qualitative observation, case analysis and other methods, and fewer literature builds a mathematical model around algorithms indirectly infringing on copyright, and carries out quantitative analysis and argumentation; (2) in the existing literature on indirect copyright infringement, most of the research is on UGC platforms, which is the same as the UGC platforms. In the existing literature on indirect infringement, most of them take the UGC platform, infringer and infringed as independent subjects, and there are few studies based on the perspective of collusion between the platform and infringer. (3) Some researchers have paid attention to the game problem in the governance of subsidy and punishment of UGC platforms, but there is still very little literature on the game between platforms and infringed persons in the indirect copyright infringement of algorithms. Therefore, this paper constructs a "platform-infringed" evolutionary game model, sets up the mechanism of "collusion between the platform and the infringers", studies the game between the platform and the infringed person in the indirect copyright infringement of algorithms, analyses the motive behind the subject’s behaviour, analyses the impact of various factors on analyse the motivation behind the subject’s behaviour, analyse the influence of each factor on the strategic behaviour, and put forward the corresponding suggestions to control the infringement accordingly.

The structure of this paper is as follows: Section 1 introduces the research background, significance and literature review. Section 2 constructs a game model of "UGC platform and infringer". Section 3 analyzes the conditions for game equilibrium. Section 4 shows the technical implementation of the method and the analysis results. Section 5 gives conclusions and recommendations about the model and a vision for the future.

2 Model construction

The basic idea of evolutionary game theory originates from the dynamic evolutionary process of the biological world, which is a combination of evolutionary theory and game theory. Its research focus and method are very different from the traditional static game, and evolutionary game theory pays more attention to the dynamic process of strategy and evolutionary equilibrium rather than the result of the game [25]. Therefore, it has been widely used in multiple fields such as enterprise strategy selection, supply chain management, and system structure evolution [2634]. In this paper, we try to use evolutionary game theory to construct a game model between UGC platform and the infringer, and explore the interactive effects of the strategic behavior of both subjects.

2.1 UGC platform

In the era of "traffic is king", users and even platforms themselves intentionally use technical measures and false registration to publish pirated and infringing content in order to attract traffic. At this point, platforms can choose between active regulation and collusion. First, the platform chooses the active supervision strategy, which means that the platform needs to increase the audit of user-generated content and reduce the strength of the recommendation algorithm for potentially infringing content, issue a notice and warning to the account, and restrict the traffic allocated to the account. Instead of reviewing allegedly infringing content and links after the fact [35]; second, the platform chooses the collusion strategy, which means that the platform no longer supervises the user-generated content, and only relies on the algorithmic automated decision-making to allocate the traffic, and pushes the content of the hotness, regardless of whether it is infringing. Platforms that choose a collusion strategy will be at risk of algorithmic infringement.

Assume that the probability that the platform chooses to actively regulate in the initial state is x (0 < x < 1), and the probability that it colludes with the infringer is 1—x. When the platform chooses to actively regulate, the platform needs to pay a certain amount of manpower and material resources to regulate, which includes the extra cost of auditing and the unfair impact brought about by other platforms choosing to collude, so assume that the platform actively regulates with the cost of C1 [36]. And when actively regulating, there is a probability of regulatory failure of a, i.e., failure to regulate and restrict infringing content in a timely manner, leading to an infringement event. When the platform chooses the collusive strategy, the platform no longer regulates user-generated content, which not only does not incur additional costs, but also brings additional benefits to the platform E1, i.e., infringing videos bring unfair benefits to the platform.

2.2 Infringed persons

When infringement occurs, the infringed person can choose to defend the right and let go of two strategies. One is to defend the right, through legal channels to sue the platform or direct infringer, at this time you need to pay a certain cost of the right, including litigation costs, evidence costs, time costs, etc., if the right to defend the success of the platform will pay a certain amount of compensation for infringement. The second is to let go, at this time the infringed’s work will be because of the Internet’s ability to disseminate, to the infringed to bring uncertain gains, may be positive, may also be negative [37]. Positive gain means that the infringing content is viewed by more people thus bringing greater traffic attention to the infringed. Negative gains are when the pirated or secondary work takes up a larger market share, resulting in a loss of traffic to one’s own work.

Assuming that the probability of the infringed choosing a rights defence strategy is y (0 < y < 1) and the probability of a laissez-faire strategy is 1—y. When the infringed chooses to defend his rights, the cost of defending his rights is C2, including the cost of time, money, and energy, etc., and the probability of success is s [38]. The infringement compensation he receives for a successful defence is F. When the infringed adopts the strategy of defending his rights and succeeds in defending his rights, the platform needs to pay the infringed the infringement compensation F, and the reputation loss caused by the infringement G. When choosing to defend the rights, the cost is certainly 0. When the infringed adopts an infringement strategy and succeeds, the platform needs to pay the infringed the infringement compensation F, as well as the reputation loss caused by the infringement G. The cost of letting go of the infringement is 0. When choosing to let go of the infringement, the infringed will be given an uncertain benefit P.

In summary, the subjects of algorithmic infringement governance include UGC platforms, infringed persons, and actual infringers of potential subjects. The subject relationship of algorithmic infringement governance is schematically shown in Fig 1.

Fig 1. Schematic diagram of subject relationship.

Fig 1

2.3 Model assumptions and benefit matrix

Based on the above evolutionary game model assumptions, the relevant profit and loss variables are selected and set as shown in Table 1:

Table 1. Parameters and their meanings.

notation hidden meaning
C1 Extra costs when UGC platforms are actively regulated
E1 UGC platforms generate additional revenue for the platform when they choose a collusion strategy
a Probability of regulatory failure when actively regulating
C2 Costs of defending rights when the infringed person chooses to do so
F Infringement damages for the infringed by platforms that have successfully defended their rights
G Reputational damage to UGC platforms after successful rights defence
s Probability of success of the infringed in defending his or her rights
P Uncertainty of benefit to the infringed from the event of infringement

According to the relationship analysis of the game subjects and the basic assumptions of the two parties, the construction of the payoff matrix of the game subjects is shown in Table 2.

Table 2. Revenue payment matrix.

UGC platform tortfeasor
(Positive, Rights) -C1+a(E1-sF-sG) a(sF-C2)
(active, permissive) -C1 aP
(collusion, rights) E1-sF-sG sF-C2
(collusion, indulgence) E1 P

Based on the above return matrix and the probability assumptions of adopting different strategies, we can obtain the expected return V11 when the platform chooses the active regulation strategy and the expected return V12 when the collusion strategy is chosen, and the average return V1 of the platform, which is:

V11=y[C1+a(E1sFsG)]+(1y)(C1)V12=y(E1sFsG)+(1y)(E1)
V1=xV11+(1x)V12=(x1)(FsyE1+Gsy)x(C1aE1y+aFsy+aGsy)

For the infringed, the expected gain V21 from choosing the rights defence strategy and the expected gain V22 from choosing the laissez-faire strategy, and the average infringed’s gain V2, i.e:

V21=xa(sFC2)+(1x)(sFC2)V22=xP+(1x)P
V2=yV21+(1y)V22=y[(x1)(C2Fs)ax(C2Fs)][PxP(x1)](y1)

From the above conclusion, we can derive the copying dynamic equation F(x) of the platform and the copying dynamic equation F(y) of the infringed:

F(x)=dxdt=x(V11V1)=x(x1)(C1+E1aE1yFsyGsy+aFsy+aGsy)
F(y)=dydt=y(V21V2)=y(y1)(C2+PFsC2x+aC2x+FsxaFsx)

According to the method proposed by Friedman D [39], the local stability of the equilibrium point of the evolutionary game is judged by constructing the Jaconbian matrix of the system, and the partial derivatives of the replication dynamic equations F(x) and F(y) with respect to x and y can be obtained sequentially, which can result in the Jaconbian matrix of the evolutionary game between the ground UGC platform and the infringed person as shown in Table 3:

Table 3. Evolutionary game Jacobi matrix for platforms and the infringed.

x(C1+E1-aE1y-Fsy-Gsy+aFsy+aGsy)+(x-1)(C1+E1-aE1y-Fsy-Gsy+aFsy+aGsy) -x(x-1)(aE1+Fs+Gs-aFs-aGs)
-y(y-1)(C2-aC2-Fs+aFs) (y-1)(C2+P-Fs-C2x+aC2x+Fsx-aFsx)+y(C2+P-Fs-C2x+aC2x+Fsx-aFsx)

3 Evolutionary game equilibrium analysis

In the evolutionary game between the platform and the infringed system, due to the asymmetry and incompleteness of information, each subject is limited rationality, so the behaviour of both parties will be affected by the influence of the other side of the game to make dynamic adjustments in order to obtain the maximum benefit. Participating subjects according to the vested interests of the continuous adjustment of strategy in pursuit of their own interests to improve, and ultimately achieve dynamic equilibrium strategy is called the evolutionary stability strategy (ESS). When F(x) = 0 and F(y) = 0, i.e., the rate of change of system strategy selection is zero, five equilibrium points of the dynamical system can be obtained, which are D1(C2+P-Fs)/(C2-aC2-Fs+aFs), (C1+E1)/(aE1+Fs+Gs-aFs-aGs), D2(0,0), D3(1,0), D4(0,1), D5 (1,1).

Asymmetric game only need to discuss the asymptotic stability of the pure strategy equilibrium can be, so do not consider D1, only need to discuss the four pure strategy Nash equilibrium points, respectively, D2 (0,0), D3 (1,0), D4 (0,1), D5 (1,1) will be pure strategy equilibrium points into the Jacobi matrix, find out the eigenvalues of each point corresponding to the Li Yapunov’s first method can be known, when the eigenvalues are all When the eigenvalues are all negative, the equilibrium point is stable; when the eigenvalues are all positive, the equilibrium point is unstable; when the eigenvalues are both positive and negative, the equilibrium point is saddle point. The eigenvalues and stability analysis of each point are shown in Table 4.

Table 4. Stability analysis of equilibrium points for pure strategies.

balance point eigenvalue (math.) stability
D2(0,0) - C1—E1 When Fs < C2 + P, D2 is a stable point, otherwise it is unstable.
Fs—P—C2
D3(1,0) C1 + E1 D3 is the point of instability or saddle point
aFs—aC2—P
D4(0,1) C2 + P—Fs D4 is stable when C2 + P < Fs and aE1 + Fs + Gs < E1 + C1 + aFs + aGs, otherwise it is unstable or saddle point
aE1—E1—C1 + Fs + Gs—aFs—aGs
D5(1,1) P + aC2—aFs D5 is stable when P+aC2 < aFs and E1+C1+aFs+aGs < aE1+Fs+Gs, otherwise it is unstable or saddle-pointed
C1 + E1—aE1—Fs—Gs + aFs + aGs

Equilibrium point I D2: When Fs < C2 + P, the system has an evolutionary stable strategy (ESS) of (0, 0), at which time the system strategy is {collusion, laissez-faire}. To achieve this stable state, the infringement of the uncertainty brought about by the benefits of P to be large enough to make the infringed out of rational consideration to choose the laissez-faire strategy; or the cost of rights, the difficulty of rights is too high, even if the success of the rights of the infringement of compensation is not enough to make up for the cost of the infringed will choose to laissez-faire strategy, this time the platform does not have to worry about the risk of litigation, the natural tendency is to conspire to strategy, in order to obtain a greater return. At the same time, the lower the probability of successful defence, the system is more likely to converge on the stability point.

Equilibrium point II D4: When C2+P<Fs and aE1+Fs+Gs<E1+C1+aFs+aGs, the system has an evolutionary stable strategy (ESS) of (0, 1), at which time the system strategy is {collusion, rights defence}. To achieve this stable state, the preconditions and equilibrium point I is the opposite, infringement brought about by the uncertainty of the benefits P to reduce or even negative benefits, or the reduction of the cost of rights and rights to increase the probability of success, the infringed person out of rational considerations will choose to defend the rights strategy. When the infringed chooses a rights defence strategy, even if the successful defence will result in the platform having to pay infringement damages and reputational damage, as long as the probability of successful defence is low enough, the platform will still take the risk of continuing to collude with the infringer. Or the additional cost of active regulation is too high, and the probability of regulatory failure is too high, which makes the platform reluctant to choose an active regulatory strategy. At this point, the higher the probability of regulatory failure, the lower the probability of successful rights defence, and the faster the system converges to that point of stability.

Equilibrium point III D5: When P+aC2 < aFs and E1+C1+aFs+aGs < aE1+Fs+Gs, the system has an evolutionary stabilisation strategy (ESS) of (1, 1), and at this point, the system strategy is {positive regulation, rights defence}. To achieve this stable state, the uncertain benefit P brought by the infringement should be reduced or even negative, or the cost of defending the right should be reduced and the probability of success of defending the right should be increased, and the infringed will choose the strategy of defending the right out of rational consideration. The conditions affecting the platform’s strategy choice are the opposite of equilibrium two, where the platform, faced with high infringement damages and huge reputational losses, tends to favour an aggressive regulatory strategy. At this point, the probability of regulatory failure has a greater impact on the stability of the system, too high or too low a probability will lead to system instability, and the lower the probability of successful rights defence, the faster the system will converge to that stability point.

4 Simulation analysis

In order to verify the correctness of the above model analysis results, and at the same time more intuitively show the influence of different parameter value taking on the strategy evolution path and stable state of the platform and the infringed, this paper analyses by numerical simulation that the platform and the infringed, under the initial strategy probability taking the values of (0.2,0.8); (0.4,0.6); (0.6,0.4); and (0.8,0.2), respectively, the Stability of the system equilibrium strategy. According to the parameter settings and stability point constraints above, the parameters are assigned values, and the dynamic evolution of the three assignment scenarios from different initial values of x, y is shown in Figs 24. Scenario one (equilibrium point I D2): C1 = 120;E1 = 100;a = 0.2;C2 = 50;F = 300;G = 500;s = 0.5;P = 150; Scenario two (equilibrium point II D4): C1 = 120;E1 = 100;a = 0.2;C2 = 50;F = 200;G = 200;s = 0.5;P = -50; Scenario three (Equilibrium III D5): C1 = 120;E1 = 100;a = 0.2;C2 = 50;F = 300;G = 500;s = 0.5;P = -70.

Fig 2. Diagram of scenario 1 evolution.

Fig 2

Fig 4. Diagram of scenario 3 evolution.

Fig 4

Fig 3. Diagram of scenario 2 evolution.

Fig 3

4.1 Impact of uncertainty gains on the outcome of the evolutionary game

In order to explore the effect of the magnitude of P under positive gain on the subject’s strategy choice, the simulation is conducted by setting P = 0, P = 100, and P = 200 respectively on the basis of the assignment of case one, and the results are shown in Figs 5 and 6. Meanwhile, in order to explore the effect of the magnitude of P under negative loss on the subject’s strategy choice, the simulation is carried out by setting P = -20, P = -50, and P = -100 respectively on the basis of the assignment of case one, and the results are shown in Figs 7 and 8. In order to generalize the evolutionary results,the initial strategy probabilityvalues for both the platform and the infringed are set to a median value of 0.5.

Fig 5. Positive P impact on platform strategy.

Fig 5

Fig 6. Positive P impact on infringed strategy.

Fig 6

Fig 7. Negative P impact on platform strategy.

Fig 7

Fig 8. Negative P impact on infringed strategy.

Fig 8

As can be seen in Figs 5 and 6, when P = 0, the infringed’s positive gain from being infringed is low, so the choice of strategy tends to be the rights defence strategy, at this time the platform is afraid of the infringed’s success in rights defence by the legal penalties as well as the loss of reputation, the platform also tends to actively regulate the strategy. When P = 100, the infringed’s strategy choice is not stable, may defend the right or may let go, this is because with the positive benefit of being infringed increases, the infringed defends the right of the uncertain benefit and choose to let go of the strategy to bring the positive benefit of being infringed on the gap between the smaller, so the infringed’s strategy choice is extremely unstable. Platforms, on the other hand, gradually converge towards collusive strategies. When P = 200, the infringed tends to favour the laissez-faire strategy due to the rationality assumption, because the infringed obtains more positive gains when laissez-faire, and the platform chooses to collude with the infringed at this point because there is no more risk of being sued.

As can be seen in Figs 7 and 8, When P is a positive benefit, and P is greater than the infringement damages minus costs from the infringed’s rights defence, the system strategy will stabilise at {collusion, indulgence}. This phenomenon is common in today’s network environment, the infringed knows that his copyright has been infringed, but due to the difficulty of defending the right, the difficulty of evidence, the cost is greater than the benefit, have no choice but to choose to let it go; or because of the infringing work for the infringed to bring a positive uncertainty of the benefit of the P is much greater than the infringement of copyright infringement compensation can be obtained by the infringed, the infringed is based on rational considerations, the choice of the strategy of laissez-faire. At this point for the platform, there is no longer the risk of the defendant, the natural choice of their own more favourable collusion strategy. But such a systematic strategy for the platform industry, the network environment, and even the social climate is extremely harmful.

When P is a negative benefit, the system strategy will be stabilised at {active regulation, defend rights}. The infringed brings negative revenue after being infringed, and in order to safeguard his own interests, he chooses the right defence strategy, so as to reduce the negative revenue brought by being infringed, thus promoting the platform to choose the active regulation strategy in order not to bear the risk of infringement. Such a systematic strategy is conducive to the ecological development of the platform industry and promotes the generation of more quality original content. However, the premise of the infringed’s choice of rights protection strategy is the high probability of success, low cost and low difficulty of rights protection, which requires the introduction of corresponding legal regulations by the government legal department, under the guidance of the normative value of safeguarding order, to provide direction and convenience for the infringed’s rights protection.

4.2 Impact of infringement compensation on the outcome of the evolutionary game after successful

Rights defence

In order to explore the effect of the size of f on the subject’s strategy choice when p is a positive gain, each parameter is assigned a value (C1 = 120;E1 = 100;a = 0.2;C2 = 50;G = 300;s = 0.5;P = 50), and the simulation is performed by setting F = 100, F = 200, and F = 600, respectively, and the results are shown in Figs 9 and 10. Meanwhile, in order to explore the effect of the size of F on the subject strategy choice when P is negative gain/loss, each parameter is assigned a value (C1 = 120;E1 = 100;a = 0.2;C2 = 50;G = 500;s = 0.5;P = -50) and the simulation is carried out by setting F = 20, F = 100, F = 200, respectively, and the results are shown in Figs 11 and 12.

Fig 9. Impact of F on platform strategy in the positive P case.

Fig 9

Fig 10. Impact of F on infringed strategy in the positive P case.

Fig 10

Fig 11. Impact of F on platform strategy in the negative P case.

Fig 11

Fig 12. Impact of F on infringed strategy in the negative P case.

Fig 12

As can be seen from Figs 9 and 10, F represents the infringement compensation from the platform to the infringed after the successful defense of the right. P is a positive benefit and F = 100 or lower, at this time, the infringed gets a lower infringement compensation after the successful defense of the right, and the platform needs to pay lower infringement compensation, the platform believes that the additional benefit obtained from collusion is greater than the infringement compensation paid, and the infringement compensation after the successful defense of the right of the infringed is insufficient to cover the cost of the defense, the system strategy is {Collusion}, and F = 100 or lower. So the system strategy at this time is {collusion, indulgence}. With the increase of F, it means that the government departments pay more attention to such cases, as well as the focus of public opinion, the penalty for such cases increases, and the system strategy is also approaching to {active regulation, rights defense}. It can be found that even when F = 600 the platform has converged to the active regulation strategy, the infringed’s strategy choice is still in an unstable state. This is because the infringed is already positive based on the existing revenue, while the compensation after successful defense is uncertain, and even the cost paid for defense may not be recovered. So the infringed’s choice is unstable.As can be seen from Figs 11 and 12, when P is a negative return, the system strategy stabilizes at {active regulation, rights defense} requiring lower infringement compensation after successful rights defense than when it is a positive return, which means that the platform and the infringed are more willing to actively regulate and defend their rights.

As the set value of F becomes larger and larger, i.e., the infringement compensation becomes higher and higher, the infringed’s infringement compensation after successfully defending his rights becomes larger and larger, and the platform collusion pays more and more, the system strategy will gradually stabilize at {positive regulation, defending rights}. When P is a positive return, F needs to reach 600 for the platform strategy to stabilize at active regulation. And when F is only 200 for negative returns, the platform strategy will stabilize in active regulation. Therefore, in the legal regulation of indirect copyright infringement by algorithms, the government legal department should increase the penalty for the platform and the infringement compensation for the infringed. However, in the case that P is positive gain, even if F = 600 is set, which is far more than the reality, the infringed’s strategy choice is only tends to defend the right but still not stabilized in the defense strategy. Visible, want to make the system strategy stabilized in the {positive regulation, rights protection} only rely on legal policy to improve the infringement penalty infringement compensation is far from enough, but also need to ensure that the probability of success of rights protection, to encourage the infringed to reasonably maintain their own copyright.

4.3 Impact of reputational loss of platforms after successful rights defence on the outcome of the evolutionary game

In order to explore the effect of the size of G on the subject’s strategy choice when P is a positive return, based on the assignment of (C1 = 120;E1 = 100;a = 0.2;C2 = 50;F = 500;s = 0.5;P = 50), the simulation is carried out by setting G = 100, G = 300, and G = 500 respectively, and the results are shown in Figs 13 and 14. At the same time, in order to explore the effect of the size of G on the subject’s strategy choice when P is a negative return, each parameter is assigned a value (C1 = 120; E1 = 100; a = 0.2; C2 = 100; F = 200; s = 0.5; P = -50), and the simulation is performed by setting G = 100, G = 300, and G = 500 respectively, and the results are shown in Figs 15 and 16.

Fig 13. Impact of G on platform strategy in the positive P case.

Fig 13

Fig 14. Impact of G on infringed strategy in the positive P case.

Fig 14

Fig 15. Impact of G on platform strategy in the negative P case.

Fig 15

Fig 16. Impact of G on infringed strategy in the negative P case.

Fig 16

As can be seen from Figs 1316, G gets progressively larger, i.e., the reputational damage inflicted on the platform by the successful defense of the infringed’s rights becomes larger and larger, the platform gradually stabilizes its convergence to an active regulatory strategy. Comparing the evolution process, it can be found that as G increases, the platform tends to positive regulatory strategy faster and faster. When P is a positive gain, the choice of strategy for the infringed shows an inverse proportional function. This is the same as the situation when the infringement compensation is raised, where platforms are afraid of bearing the reputational damage of a successful defense and thus have a higher probability of choosing an aggressive regulatory strategy. So the infringed, even if he knows he is infringed, chooses to wait for the platform’s regulatory measures to restrict the infringing content instead of directly choosing a rights defense strategy that requires additional costs. When P is a negative benefit, the change of G has almost no effect on the infringed’s strategy choice.

As can be seen from Figs 1316, it can be seen that when p is a positive benefit, the change of G makes the platform’s strategy stabilize more quickly to positive regulation compared to when P is a negative benefit. Therefore, in view of the current network status quo, when P is more likely to be positive, it is more important to raise public awareness of copyright protection, so as to protect the ecological environment of the platform industry by making the reputational damage suffered by platforms’ collusive strategies more serious.

5 Recommendations for countermeasures

The arrival of the Web 2.0 era has brought about the rapid development of network platforms, prompting the problem of user-generated content to emerge gradually, especially the problem of indirect copyright infringement by algorithms is particularly prominent, and UGC platforms, in response to the country’s strategic decision to create a clear cyberspace in the context of the need for effective governance strategies to promote the healthy development of the UGC platform industry. Previous studies have not yet carried out effective analysis and mathematical modelling of the inter-subjective relationship of interests in infringement incidents. In this paper, for the governance of algorithmic infringement on UGC platforms, we constructed a two-party evolutionary game model of "platform—infringed", set up a mechanism of "collusion between the platform and infringer", and built a two-party evolutionary game model of "platform—infringed", which is centred on the different uncertain benefits of the infringed, the compensation for infringement, and the compensation for sound infringement suffered by the platform after the infringement. The study also analyses the interaction mechanism between the two game players, and analyses the stability of the system and the evolution path under different conditions. It is found that there are three equilibrium points in the game between the UGC platform and the infringed, and the system should satisfy the equilibrium point three (1, 1) for a healthy and lasting development, and the strategy should be stable at {positive regulation, rights protection}, which needs to satisfy the conditions that P+aC2<aFs and E1+C1+aFs+aGs<aE1+Fs+Gs. Combined with the results of the simulation, we propose the following recommendations at the level of the content publisher, the platform and the governmental law. governmental legal level, the following suggestions are made:

Content publishers should consciously raise their awareness of copyright protection, take practical action to jointly protect every intellectual achievement, and create a healthy and favourable online environment for China’s content industry. Nowadays, the uncertain gain brought by infringement is often positive, and even far more than the compensation brought by the success of the right to defend, which is a higher requirement for each copyright owner, the need to give up the uncertain gain of the moment", in the face of infringement to do the first time to defend the right to sue. Otherwise, the infringed is no longer afraid of the risk of copyright infringement, and will simply copy and steal others’ original works, which will eventually drive out the good money and lead to "no one can copy". Content publishers in reference to the works of others, should be under reasonable and lawful regulations. Secondly, they should avoid directly copying or carrying other people’s original works. But the most important thing is still to adhere to the original, and strive for innovation. At the same time, they should add obvious signs and relevant rights instructions on their original works, and pay attention to collecting evidence when their original works are infringed upon, so as to facilitate the subsequent defence of rights.

If the platform wants to develop sustainably, it should not lose its sense of social responsibility for the sake of profit, and should consciously establish an effective regulatory mechanism to achieve platform self-purification. First of all, we should form a technical means of prevention, can use the content identification system, increase the user-generated content for artificial or algorithmic audit, and for the possible infringement of content to reduce the strength of the recommendation algorithm, for its account to issue a notice warning, to limit the allocation of the account traffic, in order to reduce the risk of indirect infringement of the algorithm. Secondly, we can promote the "micro-copyright" mechanism and establish a new model of win-win cooperation, whereby the platform obtains the authorisation of most copyright holders through centralised licensing in a one-stop manner, so that all users within the platform can freely use the relevant works within the platform, which not only expands the influence and visibility of the works of copyright holders, but also reduces the cost of legal use of works by content creators, which is conducive to stimulating the development of the content industry. This not only expands the influence and popularity of the copyright owner’s works, but also reduces the cost of legal use of works for content creators, which is conducive to stimulating the enthusiasm of content creators and the output of excellent original works. Finally, UGC platforms should actively carry out user support programmes, including providing direct economic incentives, professional training and guidance for original creators, guiding content creators to produce content according to the platform’s preset norms and processes, building collective values within the platform, and realising the platform’s ecological co-creation.

China’s existing legal norms for algorithmic infringement provisions are still not clear and specific, should improve the legal mechanism to protect the legitimate rights and interests of works. The first to implement the "punitive damages system", significantly increase the cost of infringement is undoubtedly an effective means of governance recommended algorithm indirect infringement. Improve the cost of infringement, algorithmic indirect infringement will be effectively curbed, so that more original creators of the legitimate rights and interests of legal protection. The second is to regulate the obligation of attention of the platform and clarify the management responsibility of the platform, because the platform is not only the operator of the cyberspace, but also the manager of this particular cyberspace, so the platform has the obligation and responsibility to review and manage the content in the cyberspace. Thirdly, the existing law does not compel the platform to provide the real name information of the direct infringer, which is also the most direct reason for the infringed person’s difficulty in defending his rights. Therefore, when an infringement incident occurs, the judicial authorities should help the infringed to find the direct infringer, or require the platform to provide the real name information of the direct infringer, so as to reduce the difficulty of defending the rights, encourage the infringed to actively defend the rights, and effectively protect the legitimate rights and interests of the copyright owner, and maintain the balance of interests of all parties.

This study reveals the two-party game between UGC platforms and infringerd in algorithmic infringement incidents. The greatest contribution of this study is the application of the two-party evolutionary game approach to algorithmic infringement and provides various insights into infringement governance. It should be noted that this study has various limitations that open the way for further research. First, direct infringer were not added to the model in order to simplify the model. However, the strategic choices of direct infringer also affect the stability of the system to some extent in actual infringement events. Second, the variable design of this study is based on the assumption of common scenarios, but there is no specific variable data collected from real cases, and inevitably there are other variables not considered, and the generalizability of the research conclusions needs to be strengthened. Third, our study only examines the indirect infringement of algorithms occurring on UGC platforms. However, for different online platforms, such as social platforms and e-commerce platforms, the penalties and benefits after the occurrence of algorithmic indirect infringement incidents are not exactly the same as those for UGC platforms. Future research can join the direct infringer to form a three-way game, and also explore how the strategy choices generated by algorithmic indirect infringement incidents occurring on different online platforms are different.

Supporting information

S1 Data. This is the numerical simulation example data.

(XLSX)

pone.0292571.s001.xlsx (10.1KB, xlsx)

Data Availability

All relevant data are within the manuscript and its Supporting Information files.

Funding Statement

Projects financed by the National Social Science Foundation "Research on the Governance Mechanism of Online Platform Enterprises under the Perspective of Quasi-Public Goods"(20BGLO96), awarded to JL, and by Social Science Foundation of Jiangsu Province" Game Analysis of the Governance Evolution of Webcasting Platforms from a Quasi-Public Goods Perspective."(KYCX22_2982), awarded to LZ. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

References

  • 1.Zhao Yuxiang, Fan Zhe, Zhu Qinghua. Conceptualization and Research Progress of User-Generated Content. Chinese Journal of Librarianship. 2012;38(05):68–81. [Google Scholar]
  • 2.Wu Handong. On the Copyright Infringement Liability of Internet Service Providers. China Law Journal. 2011;02:38–47. [Google Scholar]
  • 3.Argenton C, Wang X. Litigation and Settlement under Loss Aversion. Other publications TiSEM. 2020. [Google Scholar]
  • 4.Li Cui, Li Hong, Tao Changqi. Evolutionary game of platform enterprises, government and consumers in the context of digital economy. Journal of Business Research. 2023;167:113858. doi: 10.1016/j.jbusres.2023.113858 [DOI] [Google Scholar]
  • 5.Gupta D. Essays on the Management of Online Platforms:Bayesian Perspectives[D]. Virginian Tech. 2020. [Google Scholar]
  • 6.Levina Arriaga M. Distinction and status production on user generated content platforms:Using Bourdieu’s theory of cultural production to understand social dynamics in online fields. Information Systems Research. 2014;25(3):468–488. [Google Scholar]
  • 7.Dellarocas C. Online reputation systems: How to design one that does what you need. MIT Sloan management review. 2010;51(3): 33. [Google Scholar]
  • 8.Gillespie T. Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media[M]. Yale University Press. 2018. [Google Scholar]
  • 9.Myers West S. Censored, suspended, shadowbanned: User interpretations of content moderation on social media platforms . New Media&Society. 2018;20(11): 4366–4383. [Google Scholar]
  • 10.Gorwa R, Binns R, Katzenbach C. Algorithmic content moderation: Technical and political challenges in the automation of platform governance. Big Data&Society. 2020;7(1):2053951719897945 doi: 10.1177/2053951719897945 [DOI] [Google Scholar]
  • 11.Madio L, Quinn M. Content moderation and advertising in social media platforms.Available at SSRN. 2021;3551103. [Google Scholar]
  • 12.Liu Y, Yildirim T P, Zhang Z J. Social Media, Content Moderation, and Technology. arXiv preprint arXiv. 2101.04618,2021. [Google Scholar]
  • 13.Xiao HJ. Algorithmic responsibility: theoretical proof, panoramic portrait and governance paradigm. Management World. 2022;38(04):200–226. [Google Scholar]
  • 14.Stiehle F, Weber I. Blockchain for Business Process Enactment: A Taxonomy and Systematic Literature Review[C]. Cham:Springer International Publishing. 2022;459:5–20. [Google Scholar]
  • 15.Chinnasamy P, Albakri A, Khan M, Raja AA, Kiran A, Babu JC. Smart Contract-Enabled Secure Sharing of Health Data for a Mobile Cloud-Based E-Health System. Applied Sciences. 2023;13(6):3970. [Google Scholar]
  • 16.Jovanovic Zorka, Hou Zhe, Biswas Kamanashis, Muthukkumarasamy Vallipuram. Robust integration of blockchain and explainable federated learning for automated credit scoring. Computer Networks. 2024;243:110303. [Google Scholar]
  • 17.Ting L, Khan M, Sharma A, Ansari M. A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing&quot. Journal of Intelligent Systems. 2022;31(1):221–236. [Google Scholar]
  • 18.Khorsand R, Rafiee M, Kayvanfar V. Insights into TripAdvisor’s online reviews: The case of Tehran’s hotels. Tourism Management Perspectives. 2020;34:100673. [Google Scholar]
  • 19.Park S. Multifaceted trust in tourism service robots. Annals of Tourism Research. 2020;81:102888. [Google Scholar]
  • 20.Mudassir Khan S. Hariharasitaraman Shubham Joshi, Vishal Jain M. Ramanan A. SampathKumar, Ahmed A. Elngar. A deep learning approach for facial emotions recognition using principal component analysis and neural network techniques. The Photogrammetric Record. 2022;37:435–452. [Google Scholar]
  • 21.Quintais J. P., de Gregorio G., & Vieira Magalhães J. How platforms govern users’ copyrightprotected content: Exploring the power of private ordering and its implications. Computer Law&Security Review. 2023;48:105792. [Google Scholar]
  • 22.Liming Wang. Interpretation of the Tort Liability Law of the People’s Republic of China [M]. Beijing:China Law Press. 2010;158–159. [Google Scholar]
  • 23.Chengsi Zheng. Copyright Law [M]. Beijing:People’s University of China Press. 1997;211–212. [Google Scholar]
  • 24.Lee Jyh-An. Tripartite perspective on the copyright-sharing economy in China. Computer Law & Security Review. 2019;35(4):434–452. [Google Scholar]
  • 25.Maynard Smith J., Price G.R. The logic of Animal Conflict.Nature. 1973;246:15–18. [Google Scholar]
  • 26.Wang WB. Status and prospects of evolutionary game theory research. Statistics and Decision Making. 2009;03:158–161. [Google Scholar]
  • 27.Tan J, Zhao XY. A study of technology strategies of innovation ecosystem players—based on evolutionary game and simulation of leading and following firms. Journal of Management Science. 2022;05:13–28. [Google Scholar]
  • 28.He Z, Zhang ZZ, Yang XH. An evolutionary game analysis of knowledge sharing incentives in cloud manufacturing innovation ecosystem. Chinese Management Science. 2022;07:77–87. [Google Scholar]
  • 29.Chao Yuechao, Wang Gang. Analyzing the Effects of Governmental Policy and Solar Power on Facilitating Carbon Neutralization in the Context of Energy Transition: A Four-Party Evolutionary Game Study. Sustainablity. 2023;15:5388. [Google Scholar]
  • 30.Jin SY., Chen X. Evolutionary game analysis of digital transformation of accounting firms. China CPA. 2022;(05):23–29. [Google Scholar]
  • 31.Huang R, Xu Q, Li XW. A study on the evolutionary game of digital transformation of cultural industries. Theory and Practice of Finance and Economics. 2021;(02):125–133. [Google Scholar]
  • 32.Zhang P, Li C, Zhou M. Transaction transmission model for blockchain channels based on non-cooperative games. Sci. China Inf. Sci. 2023;66:112–105. [Google Scholar]
  • 33.Pei Y, Zhang MC, Zhou CX, Li AA. Dynamic evolutionary game-based modeling, analysis and performance enhancement of blockchain channels. IEEE/CAA J. Autom. Sinica. 2023;10(01):188–202. [Google Scholar]
  • 34.Meng XY, Han SJ, Wu LL, Si SB, Cai ZQ. Analysis of epidemic vaccination strategies by node importance and evolutionary game on complex networks. Reliability Engineering & System Safety. 2022;219:108256. [Google Scholar]
  • 35.Frosio Giancarlo. It’s all linked: How communication to the public affects internet architecture. Computer Law & Security Review. 2020;37:105410. [Google Scholar]
  • 36.Nan Guofang, Ding Ning, Li Guangyu, Li Zhiyong, Li Dahui. Two-tier regulation models for the user-generated content platform: A game theoretic analysis. Decision Support Systems. 2023;175:114034. [Google Scholar]
  • 37.Montgomery L, Priest E. Copyright and China’s Digital Cultural Industries. Chapters. 2016. [Google Scholar]
  • 38.Huang Weijun, Li Xiaoqiu. The E-commerce Law of the People’s Republic of China: E-commerce platform operators liability for third-party patent infringement. Computer Law & Security Review. 2019;35(6):105347. [Google Scholar]
  • 39.Friedman D. and Fung K.C. International trade and the internal organization of firms: an evolutionary approach. Journal of International Economics. 1996;41(1):113–137. [Google Scholar]

Decision Letter 0

Mudassir Khan

27 Nov 2023

PONE-D-23-30742Evolutionary game analysis of indirect copyright infringement by algorithms from the perspective of collusion between UGC platforms and infringersPLOS ONE

Dear Dr. Shen,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

 Academic Editor Comments: 

First, the study design is not clearly explained. It is unclear how the participants were selected and randomized, and the authors do not provide any information on the blinding of participants or investigators. This could potentially affect the validity of the study results.

==============================

Please submit your revised manuscript by Jan 11 2024 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Mudassir Khan, Ph.D

Academic Editor

PLOS ONE

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Please note that PLOS ONE has specific guidelines on code sharing for submissions in which author-generated code underpins the findings in the manuscript. In these cases, all author-generated code must be made available without restrictions upon publication of the work. Please review our guidelines at https://journals.plos.org/plosone/s/materials-and-software-sharing#loc-sharing-code and ensure that your code is shared in a way that follows best practice and facilitates reproducibility and reuse.

3. Thank you for stating the following financial disclosure: 

"National Social Science Fund of China“Research on the Governance Mechanism of Online Platform Enterprises from the Perspective of Quasi-Public Goods”(20BGLO96);Social Science Foundation of Jiangsu Province“Research on Risk Generation Mechanism and Countermeasures for Prevention and Control of Network Platform Enterprises from the Perspective of Life Cycle "(19GLBO15);"

Please state what role the funders took in the study.  If the funders had no role, please state: "The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript." 

If this statement is not correct you must amend it as needed. 

Please include this amended Role of Funder statement in your cover letter; we will change the online submission form on your behalf.

4. Please amend your list of authors on the manuscript to ensure that each author is linked to an affiliation. Authors’ affiliations should reflect the institution where the work was done (if authors moved subsequently, you can also list the new affiliation stating “current affiliation:….” as necessary).

5. Please include captions for your Supporting Information files at the end of your manuscript, and update any in-text citations to match accordingly. Please see our Supporting Information guidelines for more information: http://journals.plos.org/plosone/s/supporting-information. 

Additional Editor Comments:

First, the study design is not clearly explained. It is unclear how the participants were selected and randomized, and the authors do not provide any information on the blinding of participants or investigators. This could potentially affect the validity of the study results.

Dear Authors,

You are advised to work on Editor/reviewers comments.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #2: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: I Don't Know

Reviewer #2: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: No

Reviewer #2: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: Title: Evolutionary game analysis of indirect copyright infringement by algorithms from the

the perspective of collusion between UGC platforms and infringers

Review

# Comment to the author:

The article focuses on the challenges and dynamics related to copyright infringement on user-generated content (UGC) platforms and the development of strategies and measures to address these issues, emphasising factors affecting infringement governance decisions and promoting stability and legality in the UGC ecosystem.

#Introduction:

The introduction reflects the discussion's content and meets the publication standard.

# Model construction

The model description is understandable, using symbols to represent different variables. However, in #2.3 Model assumptions and benefits matrix:

Such as : 11 = [−1 + (1 − − )] + (1 − )(−1). The use of subscript would have been preferred for V11. i.e., V_11.

# Impact of Infringement Compensation on the Outcome of Evolutionary Games after Successful Rights Defense:

Since simulated data are employed in describing the outcome of Evolutionary Games used in modelling infringement, more statistical output data need to be displayed

Try to compute using the simulated data with the algorithm and show the outcome of at least 2 – 3 instances. This will enhance understanding of the propose algorithm.

#Figures - Labelling the graphs using English would be preferred for the reader to understand the pictorial view representing the outcome of the evolutionary game.

# Countermeasures and recommendations

The recommendations reflect the importance of the algorithm proposed and demonstrated using a simulated dataset in the article. However, much is expected for the author to suggest future research based on a wealth of understanding gained in this domain while solving this problem.

Reviewer #2: 1- Modify reference 0 to reference 1 in the following statement: UGC (User Generated Content) platform refers to various forms of media and creative works created by users

through the Internet and its technology.0

2-Arranging the references mentioned in the introduction according to the year of publication (from oldest to newest) for the research review mentioned in this section

3- Adding a paragraph at the end of the introduction that explains the general structure of the research by clarifying each section

4- Standardize table content formats

5- Section 2, in all its paragraphs, is devoid of reference to any reference

6- Explaining the proposed algorithm in clear steps or through a flow chart that summarizes what has been explained

7-The proposed future work has not been clarified to provide a future outlook for researchers in this field

8-Standardize the format of references

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: Yes: Adebayo, Paul Olujide

Reviewer #2: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Attachment

Submitted filename: PONE-D-23-30742_reviewer.docx

pone.0292571.s002.docx (14.1KB, docx)
PLoS One. 2024 May 15;19(5):e0292571. doi: 10.1371/journal.pone.0292571.r002

Author response to Decision Letter 0


28 Dec 2023

Reviewer#1:

Response to#2.3 Model assumptions and benefits matrix:

Such as : 11 = [−1 + (1 − − )] + (1 − )(−1). The use of subscript would have been preferred for V11. i.e., V_11.

Response:We appreciate the heads-up and have made changes in the text(line183-188).

Response to#Impact of Infringement Compensation on the Outcome of Evolutionary Games after Successful Rights Defense:Since simulated data are employed in describing the outcome of Evolutionary Games used in modelling infringement, more statistical output data need to be displayed.Try to compute using the simulated data with the algorithm and show the outcome of at least 2 – 3 instances. This will enhance understanding of the propose algorithm.

Response:We have listened carefully to your comments. And we have added four cases of arithmetic evolution and added Figures 7 and 8 for easier understanding.(line:300-354).

Response to#Figures - Labelling the graphs using English would be preferred for the reader to understand the pictorial view representing the outcome of the evolutionary game.

Response:Your reminder is much appreciated and we have changed all the graphs in the text to English.

Response to#Countermeasures and recommendations

The recommendations reflect the importance of the algorithm proposed and demonstrated using a simulated dataset in the article. However, much is expected for the author to suggest future research based on a wealth of understanding gained in this domain while solving this problem.

Response:We greatly appreciate your suggestions and have included suggestions for future research at the end of the article.(line:448-463)

Reviewer#2:

Response to#2: 1- Modify reference 0 to reference 1 in the following statement: UGC (User Generated Content) platform refers to various forms of media and creative works created by users

through the Internet and its technology.0

Response:We appreciate your suggestions and have completed the changes in the text.

Response to 2-Arranging the references mentioned in the introduction according to the year of publication (from oldest to newest) for the research review mentioned in this section

Response:Sorry, we didn't quite understand what you meant. But we have arranged the references from old to new and put them at the end of this letter. We hope it will meet your requirements.

Response to3-Adding a paragraph at the end of the introduction that explains the general structure of the research by clarifying each section.4- Standardize table content formats

Response:Thanks for the heads up, we've included a paragraph at the end of the introduction as an explanation(line:107-110). Harmonization of the formatting in the tables has also been completed.

Response to 5- Section 2, in all its paragraphs, is devoid of reference to any reference. 6- Explaining the proposed algorithm in clear steps or through a flow chart that summarizes what has been explained

Response:We are grateful for the suggestion. To be more clear and in accordance with the reviewer concerns, we have added a brief description as follows: "Background information on evolutionary games is included in the text(line:111-118), explaining why the use of evolutionary games was chosen to describe this type of infringement.The strategic choices of the participating subjects are also depicted in the form of a flowchart(line:160-169).”

Response to 7-The proposed future work has not been clarified to provide a future outlook for researchers in this field.

Response:We greatly appreciate your suggestions and have included suggestions for future research at the end of the article.(line:448-463)

Response to 8-Standardize the format of references

Response:We really apologize for not standardizing the format of references and have made changes.

Attachment

Submitted filename: cover letter for response.docx

pone.0292571.s003.docx (19.1KB, docx)

Decision Letter 1

Mudassir Khan

29 Feb 2024

PONE-D-23-30742R1An Evolutionary Game Analysis of Algorithmic Indirect Copyright Infringement from the Perspective of Collusion between UGC Platforms and direct InfringersPLOS ONE

Dear Dr. Shen,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Apr 14 2024 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Mudassir Khan, Ph.D

Academic Editor

PLOS ONE

Additional Editor Comments:

Dear Authors,

The introduction provides a good, generalized background of the topic that quickly gives the reader an appreciation of the wide range of applications for this technology. This section helpfully explains the motivation for the research to current and potential funding agencies. However, to make the motivation clearer and to differentiate the paper some more from other applied papers, the author may wish to provide another sentence giving examples of some of the applications of this technology, along with appropriate references.

The objective is clearly defined in the last paragraph of introduction section and clearly mentions the flow of the paper. The experimental apparatus is quite standard, and is appropriate for the study, especially given that the focus of the paper is to develop a privacy preserving platform for industrial applications.

I don’t think any additional experiments are necessary to validate the results presented here, because the results themselves are not what is important; it is the technique used to obtain these results that is important. One exception to this reasoning would be if the author could demonstrate that the results obtained using the present method are consistent with results obtained using a different technique.

There are several instances where assertions are made that are not substantiated with references. These have been noted in the appropriate sections of this paper. it would be better if you provide references to these assertions as this will make your work more concrete.

Author may wish to elaborate the problem formulation section and add some more details which will make the paper look more vital. I do not think any additional graphics are necessary. The author may also wish to give a more detailed discussion on blockchain and machine learning implementation.

The author may wish to mention why it is important to leverage blockchain to explain the motivation for his choice of specimens and accompany this with some references to other studies that demonstrate this importance.

You're requested to work on reviewers comments as well.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #2: All comments have been addressed

Reviewer #3: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #2: Yes

Reviewer #3: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #2: Yes

Reviewer #3: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #2: Yes

Reviewer #3: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #2: (No Response)

Reviewer #3: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #2: (No Response)

Reviewer #3: Author should elaborate the data collection sources and the representation of data should be more clear and concise. The authors are advised to add few latest citations, kindly read and cite: a) Smart Contract-Enabled Secure Sharing of Health Data for a Mobile Cloud-Based E-Health System. Appl. Sci. 2023, 13, 3970. https://doi.org/10.3390/app13063970, b) A deep learning approach for facial emotions recognition using principal component analysis and neural network techniques. The Photogrammetric Record, 37, 435–452.c) A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing" Journal of Intelligent Systems, vol. 31, no. 1, 2022, pp. 221-236. https://doi.org/10.1515/jisys-2022-0012

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #2: No

Reviewer #3: Yes: Dr Mahtab Alam

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

PLoS One. 2024 May 15;19(5):e0292571. doi: 10.1371/journal.pone.0292571.r004

Author response to Decision Letter 1


21 Mar 2024

Dear Editor and Reviewers:

On behalf of my co-authors, we thank you very much for giving us an opportunity to revise our manuscript, we appreciate editor and reviewers very much for their positive and constructive comments and suggestions on our manuscript entitled “An Evolutionary Game Analysis of Algorithmic Indirect Copyright Infringement from the Perspective of Collusion between UGC Platforms and direct Infringers”.

We have studied reviewer’s comments carefully and have made revision which marked in the paper. We have tried our best to revise our manuscript according to the comments.Pease find the revised version, which we would like to submit for your kind consideration.Revised portion are marked in yellow in the paper. The main corrections in the paper and the responds to the reviewer’s comments are as flowing:

Responds to Additional Editor Comments:

(1):The introduction provides a good, generalized background of the topic that quickly gives the reader an appreciation of the wide range of applications for this technology. This section helpfully explains the motivation for the research to current and potential funding agencies. However, to make the motivation clearer and to differentiate the paper some more from other applied papers, the author may wish to provide another sentence giving examples of some of the applications of this technology, along with appropriate references.

Response:We are grateful for the suggestion. To be more clear and in accordance with the reviewer concerns, we have added a brief description as follows: "References to scholars using evolutionary game methods to solve tort problems have been added(line:58-60);And papers on the many areas of evolutionary game use(line:122-125).”

(2):There are several instances where assertions are made that are not substantiated with references. These have been noted in the appropriate sections of this paper. it would be better if you provide references to these assertions as this will make your work more concrete.

Author may wish to elaborate the problem formulation section and add some more details which will make the paper look more vital. I do not think any additional graphics are necessary.

Response:We have listened carefully to your comments. About the assertion ,we have added References.(line:138-141,156-157).Regarding the assertion of replicating the dynamic part of the equation, we cite the proof of Friedman D's study(line:199-203).Regarding the problem formulation section, we have added detailed descriptions. The behavior of the participating subjects is portrayed in more detail.(line:132-136,150-152).

(3):The author may also wish to give a more detailed discussion on blockchain and machine learning implementation.

The author may wish to mention why it is important to leverage blockchain to explain the motivation for his choice of specimens and accompany this with some references to other studies that demonstrate this importance.

Response:We are very grateful for your reminder that brought to my attention the lack of a blockchain as well as a machine learning literature section.We have included references to blockchain and machine learning in the literature review section.(line:79-85)

Responds to Review Comments to the Author:

Response:We have listened very carefully to your suggestions and have enriched the research in this paper by citing the references that you have recommended.These recommended references are located at the 15th, 20th, and 17th position of the citation.

Again, we would like to express our great appreciation to you and reviewers for comments on our paper. Looking forward to hearing from you.

Thank you and best regards.

Attachment

Submitted filename: response to reviewers.docx

pone.0292571.s004.docx (12.8KB, docx)

Decision Letter 2

Mudassir Khan

3 Apr 2024

An Evolutionary Game Analysis of Algorithmic Indirect Copyright Infringement from the Perspective of Collusion between UGC Platforms and direct Infringers

PONE-D-23-30742R2

Dear Yuxuan yu Shen,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice will be generated when your article is formally accepted. Please note, if your institution has a publishing partnership with PLOS and your article meets the relevant criteria, all or part of your publication costs will be covered. Please make sure your user information is up-to-date by logging into Editorial Manager at Editorial Manager® and clicking the ‘Update My Information' link at the top of the page. If you have any questions relating to publication charges, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Mudassir Khan, Ph.D

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Thanks to the authors for the detailed response and additions. I read through the comments and skimmed the revised PDF, and the updates significantly improved the paper. I would be happy to recommend this paper for publication.

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #2: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #2: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #2: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #2: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #2: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #2: (No Response)

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #2: No

**********

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    S1 Data. This is the numerical simulation example data.

    (XLSX)

    pone.0292571.s001.xlsx (10.1KB, xlsx)
    Attachment

    Submitted filename: PONE-D-23-30742_reviewer.docx

    pone.0292571.s002.docx (14.1KB, docx)
    Attachment

    Submitted filename: cover letter for response.docx

    pone.0292571.s003.docx (19.1KB, docx)
    Attachment

    Submitted filename: response to reviewers.docx

    pone.0292571.s004.docx (12.8KB, docx)

    Data Availability Statement

    All relevant data are within the manuscript and its Supporting Information files.


    Articles from PLOS ONE are provided here courtesy of PLOS

    RESOURCES