An Analysis of the Mechanism and Mode Evolution for Blockchain-Empowered Research Credit Supervision Based on Prospect Theory: A Case from China
Abstract
1. Introduction
2. Literature Review
2.1. The Impact of BC on Scientific Research Credit Supervision
2.2. Factors Hindering Scientific Research Institutions from Adopting BC
2.3. Scientific Research Credit Supervision
3. Problem Description, Assumptions, and Parameter Setting of Model
3.1. Problem Description
3.2. Assumptions and Parameter Setting of Model
3.3. Description and Analysis of the Basic Model
4. Model Analysis
4.1. For Researchers
4.2. For Scientific Research Institutions
4.3. For Governments
4.4. Stability Analysis of Equilibrium Points in the Three-Party Evolutionary Game System
4.5. Analysis of the Evolutionary Model of Research Credit Regulation Empowered by BC in Scientific Research Institutions
5. Case and Simulation Analysis
5.1. Case and Parameters Setting
5.2. Simulation Analysis of Key Factors Influencing Scientific Research Institutions’ Selection of BC Regulation
5.2.1. Sensitivity Analysis of Important Influencing Factors of Scientific Research Institutions’ Selection of BC Regulation, Based on Prospect Theory
- (i)
- Sensitivity analysis of loss aversion coefficient
- (ii)
- Sensitivity analysis of risk preference coefficient
5.2.2. Sensitivity Analysis of Other Important Influencing Factors for Scientific Research Institutions’ Selection of BC Regulation
- (iii)
- Sensitivity analysis of government subsidies
- (iv)
- Sensitivity analysis of cost factors
- (v)
- Sensitivity analysis of privacy disclosure loss
5.3. Comparative Simulation Analysis of BC Regulation Versus Traditional Regulation in Scientific Research Institutions
5.3.1. Comparative Analysis of Sensitivity of Important Influencing Factors of Different Strategic Choices of Scientific Research Institutions, Based on Prospect Theory
- (i)
- Comparative analysis of sensitivity of loss aversion coefficient
- (ii)
- Comparative analysis of sensitivity of risk preference coefficient
5.3.2. Comparative Analysis on Sensitivity of Other Important Influencing Factors of Different Strategies for Scientific Research Institutions
- (iii)
- Sensitivity analysis of traditional regulation characteristics
- (iv)
- Comparative analysis of sensitivity of cost factors
- (v)
- Comparative analysis of reputation loss and penalty sensitivity
5.4. Simulation Analysis of the Evolutionary Pathways in BC-Enabled Research Integrity Regulation Patterns for Scientific Research Institutions
6. Conclusions
- (i)
- Under equivalent levels of cost, reputation loss, and penalty settings, the BC-based supervision model achieves higher regulatory effectiveness compared to traditional strategies.
- (ii)
- Beyond cost and government subsidies, risk aversion coefficients, risk preference coefficients, and privacy breach losses are key factors influencing scientific research institutions’ adoption of BC supervision.
- (iii)
- The evolutionary pathways of BC-enabled research credit supervision comprise three modes: a passive regulatory framework triggered by instances of research misconduct (Path 1), a passive regulatory paradigm triggered by government-led initiatives (Path 2), and an active regulatory pattern driven by research integrity outcomes (Path 3). This study further offers managerial insights into transitioning from Path 1 to Path 3.
- (iv)
- An analysis grounded in prospect theory reveals that research integrity is only effectively ensured when scientific research institutions implement BC-based supervision, particularly in contexts involving high-risk-seeking researchers. Furthermore, the BC-based regulatory approach demonstrates a consistently stronger deterrent effect than conventional methods across varying risk attitudes, thereby more reliably promoting research integrity.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A
| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 15 | 3 | 3 | |||
| 10 | 4 | 0.5 | |||
| 6 | 7 | 0.5 | |||
| 2 | 0.5 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 3 | 0.7 | |||
| 6 | 1 | — | — |

Appendix B
| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 0 | 3 | 3 | |||
| 10 | 1 | 0.5 | |||
| 6 | 1 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 0 | 0.7 | |||
| 6 | 1 | — | — |

| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 15 | 3 | 3 | |||
| 10 | 4 | 0.5 | |||
| 6 | 7 | 0.5 | |||
| 2 | 0.5 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 3 | 0.7 | |||
| 6 | 1 | — | — |

| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 20 | 3 | 3 | |||
| 10 | 4 | 0.5 | |||
| 6 | 7 | 0.5 | |||
| 2 | 0.2 | 0.5 | |||
| 3 | 0.2 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 9 | 0.7 | |||
| 6 | 1 | — | — |

| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 30 | 3 | 3 | |||
| 10 | 3 | 0.5 | |||
| 6 | 6 | 0.5 | |||
| 2 | 0.5 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 3 | 0.7 | |||
| 6 | 1 | — | — |

References
- Edwards, M.A.; Roy, S. Academic Research in the 21st Century: Maintaining Scientific Integrity in a Climate of Perverse Incentives and Hypercompetition. Environ. Eng. Sci. 2017, 34, 51–61. [Google Scholar] [CrossRef]
- Tang, L. Five Ways China must Cultivate Research Integrity. Nature 2019, 575, 589–591. [Google Scholar] [CrossRef]
- Liu, S.L.; Pan, Y.T. The Dilemmas and the Irrational Risks of Measuring Scientific Research Integrity: A Theoretical Reflection on the Technical Approaches to the External Norms of Scientific Research Integrity. Sci. Technol. Prog. Policy 2023, 40, 21–29. [Google Scholar] [CrossRef]
- Xie, Y.; Wang, K.; Kong, Y. Prevalence of Research Misconduct and Questionable Research Practices: A Systematic Review and Meta-analysis. Sci. Eng. Ethics 2021, 27, 41. [Google Scholar] [CrossRef] [PubMed]
- ALLEA. The European Code of Conduct for Research Integrity. Available online: https://www.allea.org/wp-content/uploads/2017/03/ALLEA-European-Code-of-Conduct-for-Research-Integrity-2017-1.pdf (accessed on 1 March 2017).
- Oransky, I. Retractions are Increasing, but not Enough. Nature 2022, 608, 9. [Google Scholar] [CrossRef] [PubMed]
- Van Noorden, R. More than 10,000 Research Papers were Retracted in 2023—A New Record. Nature 2023, 624, 479–481. [Google Scholar] [CrossRef]
- Office of Science Quality and Integrity. A Framework for Federal Scientific Integrity Policy and Practice. Available online: https://www.usgs.gov/media/files/a-framework-federal-scientific-integrity-policy-and-practice (accessed on 8 January 2025).
- National Natural Science Foundation of China. Notification of the Outcomes of Misconduct Cases (First Batch) by the National Natural Science Foundation of China. Available online: https://www.nsfc.gov.cn/publish/portal0/jd/04/info92362.htm (accessed on 20 April 2024).
- National Natural Science Foundation of China. Notification of the Outcomes of Misconduct Cases (First Batch) by the National Natural Science Foundation of China. Available online: https://www.nsfc.gov.cn/publish/portal0/jd/04/info93663.htm (accessed on 20 October 2024).
- National Natural Science Foundation of China. Case Report (2025, Issue No. 1). Available online: https://www.nsfc.gov.cn/publish/portal0/jd/04/info94739.htm (accessed on 1 April 2025).
- Wei, H.A.; Wei, B. The Holistic Governance of Integrity in Research. Sci. Technol. Prog. Policy 2019, 36, 106–111. [Google Scholar] [CrossRef]
- Li, Y.H. Technique “Carries Tao”: On Research Integrity Construction Based on Blockchain Technology. Stud. Dialect. Nat. 2021, 37, 35–41. [Google Scholar] [CrossRef]
- Ding, K.L.; Zhang, B.H.; Chen, F.R. Rsearch on the Punishment Intensity of Scientific Research Misconduct in Academic Institutions. Stud. Sci. Sci. 2021, 39, 1345–1353. [Google Scholar] [CrossRef]
- Almaqtari, F.A. The Role of IT Governance in the Integration of AI in Accounting and Auditing Operations. Economies 2024, 12, 199. [Google Scholar] [CrossRef]
- Li, Y.; Goel, S. Making It Possible for the Auditing of AI: A Systematic Review of AI Audits and AI Auditability. Inf. Syst. Front. 2025, 27, 1121–1151. [Google Scholar] [CrossRef]
- Bhatt, P.C.; Kumar, V.; Lu, T.C.; Daim, T. Technology Convergence Assessment: Case of Blockchain within the IR 4.0 Platform. Technol. Soc. 2021, 67, 101709. [Google Scholar] [CrossRef]
- Secinaro, S.; Dal Mas, F.; Brescia, V.; Calandra, D. Blockchain in the Accounting, Auditing and Accountability Fields: A Bibliometric and Coding Analysis. Account. Audit. Account. J. 2022, 35, 168–203. [Google Scholar] [CrossRef]
- Mohan, V. On the Use of Blockchain-based Mechanisms to Tackle Academic Misconduct. Res. Policy 2019, 48, 103805. [Google Scholar] [CrossRef]
- Cardenas-Quispe, M.A.; Pacheco, A. Blockchain Ensuring Academic Integrity with a Degree Verification Prototype. Sci. Rep. 2025, 15, 9281. [Google Scholar] [CrossRef] [PubMed]
- Huo, H.; Zhong, H.Y. Evolution Analysis of Blockchain Technology Investment Based the Quality and Safety of Agricultural Supply Chain. Oper. Res. Manag. Sci. 2023, 32, 15–21. [Google Scholar]
- Li, Z.W.; Xu, X.H.; Guan, X.; Bo, Q.G.; Chen, C. Evolutionary Game Analysis for Blockchain Adoption Decisions of Two Oligopolies in An Agricultural Market. Chin. J. Manag. Sci. 2024, 33, 1–14. [Google Scholar] [CrossRef]
- Sun, R.; He, D.Y.; Su, H.L. Application of Blockchain Technology to Preventing Supply Chain Finance Based on Evolutionary Game. Chin. J. Manag. Sci. 2024, 32, 125–134. [Google Scholar] [CrossRef]
- Sun, G.Q.; Xie, Y.F. Blockchain Technology, Supply Chain Networks and Data Sharing: Based on the Perspective of Evolutionary Game. Chin. J. Manag. Sci. 2023, 31, 149–162. [Google Scholar] [CrossRef]
- Han, P.; Gu, L.; Ye, D.Y.; Li, N. Research on Evolutionary Game of Blockchain-based Government Data Sharing under Reward and Punishment. Chin. J. Manag. Sci. 2024, 38, 122–132. [Google Scholar] [CrossRef]
- Yang, S.B.; Chu, X.X.; Li, M.Q.; Feng, N. Research on Evolutionary Game Strategy of Digital Platform Privacy Protection Behaviour Driven by Blcokchain Technology. Front. Sci. Technol. Eng. Manag. 2024, 43, 17–26. [Google Scholar]
- Zhang, X. Research Misconduct in Chinese Universities: Towards an Emotional Analysis. J. Acad. Ethics 2025, 23, 1953–1970. [Google Scholar] [CrossRef]
- Kaihneman, D.; Tversky, A. Prospect Theory: An Analysis of Decision under Risk. Econometrica 1979, 47, 363–391. [Google Scholar] [CrossRef]
- Thaler, R. Mental Accounting and Consumer Choice. Mark. Sci. 1985, 4, 199–214. [Google Scholar] [CrossRef]
- Tarkhanov, I.; Fomin-Nilov, D.; Fomin, M. Application of Public Blockchain to Control the Immutability of Data in Online Scientific Periodicals. Libr. Hi Tech 2019, 37, 829–844. [Google Scholar] [CrossRef]
- Hu, F.X.; Chen, C.Q. An Investigation into the Enhancement of Research Integrity in Higher Education Institutions: A Blockchain Technology Perspective. Chin. Univ. Sci. Technol. 2022, 7, 23–27. [Google Scholar] [CrossRef]
- Chu, X.; Wang, R. Building Trust for Peer Review with a Blockchain-Based System and Intelligent Algorithms. Ser. Rev. 2025, 51, 37–42. [Google Scholar] [CrossRef]
- Yan, Q. Blockchain Contributes to the Scientific Research Integrity Management: Theoretical Demonstration and System Innovation. Sci. Technol. Prog. Policy 2021, 38, 113–120. [Google Scholar] [CrossRef]
- Marques, L.; Morais, D.; Terra, A. More than Meets the Eye: Misconduct and Decoupling Against Blockchain for Supply Chain Transparency. Prod. Oper. Manag. 2025, 34, 1057–1075. [Google Scholar] [CrossRef]
- Yang, X.; Zhang, Y.; Wang, S.; Yu, B.; Li, F.; Li, Y.; Yan, W. LedgerDB: A Centralized Ledger Database for Universal Audit and Verification. Proc. VLDB Endow. 2020, 13, 3138–3151. [Google Scholar] [CrossRef]
- Fekete, D.L.; Kiss, A. A Survey of Ledger Technology-based Databases. Future Internet 2021, 13, 197. [Google Scholar] [CrossRef]
- Yang, X.; Zhang, R.; Yue, C.; Liu, Y.; Ooi, B.C.; Gao, Q.; Zhang, Y.; Yang, H. VeDB: A Software and Hardware Enabled Trusted Relational Database. Proc. ACM Manag. Data 2023, 1, 194. [Google Scholar] [CrossRef]
- Wei, P.; Wang, D.; Zhao, Y.; Tyagi, S.K.S.; Kumar, N. Blockchain Data-based Cloud Data Integrity Protection Mechanism. Future Gener. Comput. Syst. 2020, 102, 902–911. [Google Scholar] [CrossRef]
- Altulyan, M.; Yao, L.; Kanhere, S.; Huang, C. A Blockchain Framework Data Integrity Enhanced Recommender System. Comput. Intell. 2023, 39, 104–120. [Google Scholar] [CrossRef]
- Li, X.; Huang, Y.; Liu, Y.; Yi, H.; Li, L.; Wu, Y.; Zhang, X.; Yang, X.; Lin, Y.; Jiang, G. Enhancing Data Integrity in Data-Driven Environmental Science Research through Blockchain Technology. Environ. Sci. Technol. 2025, 59, 18696–18705. [Google Scholar] [CrossRef]
- Yang, X.; Yue, C.; Zhang, W.; Liu, Y.; Ooi, B.C.; Chen, J. SecuDB: An in-enclave privacy-preserving and tamper-resistant relational database. Proc. VLDB Endow. 2024, 17, 3906–3919. [Google Scholar] [CrossRef]
- Li, D.; Zhang, M. Blockchain Technology Facilitates the Reconstruction of Research Integrity. People’s Trib. 2020, 5, 74–75. [Google Scholar]
- Iyengar, G.; Saleh, F.; Sethuraman, J.; Wang, W. Economics of Permissioned Blockchain Adoption. Manag. Sci. 2023, 69, 3415–3436. [Google Scholar] [CrossRef]
- Li, Q.X.; Ma, C.Y.; Xie, L.; Wang, Z.X.; Mao, Z.F. The Mechanisms and Strategies of Blockchain-empowered Value Creation in the Supply Chain: An Economic Analysis under Quality Information Asymmetry. J. Manag. World 2024, 40, 98–122. [Google Scholar]
- Lv, X.C.; Tian, Y.F.; Tian, S.H.; Liu, J.Y.; Kong, Q.W. Research on Multi-Agent Decision-Making in Carbon Data Quality Supervision under MRV Mechanism: A Blockchain Technology Empowerment Perspective. Chin. J. Manag. Sci. 2025, 33, 355–368. [Google Scholar] [CrossRef]
- Medina, M.J.; Baudet, C.; Lebraty, J.F. Blockchain and Agency Theory in Supply Chain Management: A Question of Trust. Int. J. Inf. Manag. 2024, 75, 102747. [Google Scholar] [CrossRef]
- Frizzo-Barker, J.; Chow-White, P.A.; Adams, P.R.; Mentanko, J.; Ha, D.; Green, S. Blockchain as a Disruptive Technology for Business: A Systematic Review. Int. J. Inf. Manag. 2020, 51, 102029. [Google Scholar] [CrossRef]
- Großmann, C.; Merfeld, K.; Klein, J.F.; Föller, F.; Henkel, S. Onto the Light Side of Sharing: Using the Force of Blockchain. J. Bus. Res. 2024, 175, 114507. [Google Scholar] [CrossRef]
- Cozzio, C.; Viglia, G.; Lemarie, L.; Cerutti, S. Toward an Integration of Blockchain Technology in the Food Supply Chain. J. Bus. Res. 2023, 162, 113909. [Google Scholar] [CrossRef]
- Kordestani, A.; Oghazi, P.; Mostaghel, R. Smart Contract Diffusion in the Pharmaceutical Blockchain: The Battle of Counterfeit Drugs. J. Bus. Res. 2023, 158, 113646. [Google Scholar] [CrossRef]
- Ali, I.; Sultan, P.; Aboelmaged, M. A Bibliometric Analysis of Academic Misconduct Research in Higher Education: Current Status and Future Research Opportunities. Account. Res. 2021, 28, 372–393. [Google Scholar] [CrossRef]
- Hopp, C.; Hoover, G.A. How Prevalent is Academic Misconduct in Management Research? J. Bus. Res. 2017, 80, 73–81. [Google Scholar] [CrossRef]
- Gopalakrishna, G.; Ter Riet, G.; Vink, G.; Stoop, I.; Wicherts, J.M.; Bouter, L.M. Prevalence of Questionable Research Practices, Research Misconduct and Their Potential Explanatory Factors: A Survey among Academic Researchers in the Netherlands. PLoS ONE 2022, 17, e0263023. [Google Scholar] [CrossRef]
- Were, E.; Kiplagat, J.; Kaguiri, E.; Ayikukwei, R.; Naanyu, V. Institutional Capacity to Prevent and Manage Research Misconduct: Perspectives from Kenyan Research Regulators. Res. Integr. Peer Rev. 2023, 8, 8. [Google Scholar] [CrossRef] [PubMed]
- Long, B.; Laux, S.; Lemon, B.; Guarente, A.; Davis, M.; Casadevall, A.; Fang, F.; Shi, M.; Resnik, D.B. Factors Related to the Severity of Research Misconduct Administrative Actions: An Analysis of Office of Research Integrity Case Summaries from 1993 to 2023. Account. Res. 2025, 32, 417–438. [Google Scholar] [CrossRef]
- Gorman, D.M.; Elkins, A.D.; Lawley, M. A Systems Approach to Understanding and Improving Research Integrity. Sci. Eng. Ethics 2019, 25, 211–229. [Google Scholar] [CrossRef]
- Su, N.; Chen, S.J. Analyzing the Phenomenon of Research Integrity Deficiency from a Game Theoretic Perspective. Sci. Technol. Manag. Res. 2008, 9, 292–294. [Google Scholar]
- Zhang, X.Y.; Nan, G.J. A Game Analysis of and Countermeasures Against Misconducts in Research. J. Xiamen Univ. (Arts Soc. Sci.) 2011, 6, 135–140. [Google Scholar]
- Liu, X.W.; Wang, D.W.; Qi, W. Study of University’s Scientific Research Innovation and Management Based on Evolutionary Game. Oper. Res. Manag. Sci. 2019, 28, 48–55. [Google Scholar]
- Xu, M.; Pu, Y.H. An Evolutionary Game Analysis of Research Supervision Behaviors in Higher Education Institutions under the “Streamlining Administration, Delegating Power, and Optimizing Services” Policy Framework. Fri Account. 2019, 4, 142–145. [Google Scholar]
- Wen, H.; Jia, L.S. Research on Scientific Research Integrity Policy in China’s Universities:From the Perspective of Policy Tools. Chin. High Educ. Res. 2021, 4, 48–54. [Google Scholar] [CrossRef]
- Zhou, G.H.; Zhang, Y.; Li, Y.L.; Zhao, G.T. Evolutionary Game Analysis of the Behavior of Construction Safety Management Based on Prospect Theory. J. Syst. Manag. 2012, 21, 501–509. [Google Scholar]
- Sun, W.H. A Brief Examination of Research Misconduct and the Reinforcement of Integrity in Higher Education Institutions: An Perspective from Research Administrators. Chin. Univ. Sci. Technol. 2016, 8, 28–30. [Google Scholar] [CrossRef]
- Zhao, Z.B.; Man, Q.P. Evolutionary Game Analysis of Major Infrastructure Projects Based on Prospect Theory. J. Syst. Manag. 2018, 27, 109–117. [Google Scholar]
- Diao, S.J.; Kuang, H.B.; Meng, B.; Shi, B.F. Evolutionary Game Analysis of LSSC Service Quality Control Strategy Based on Prospect Theory. Chin. J. Manag. Sci. 2021, 29, 33–45. [Google Scholar] [CrossRef]
- Shen, J.; Gao, X.; He, W.; Sun, F.; Zhang, Z.; Kong, Y.; Wan, Z.; Zhang, X.; Wang, J.; Lai, X. Prospect Theory in an Evolutionary Game: Construction of Watershed Ecological Compensation System in Taihu Lake Basin. J. Clean. Prod. 2021, 291, 125929. [Google Scholar] [CrossRef]
- Friedman, D. Evolutionary Games in Economics. Econometrica 1991, 59, 637–666. [Google Scholar] [CrossRef]
- Selten, R. A Note on Evolutionarily Stable Strategies in Asymmetric Animal Conflicts of the contribution. In Models of Strategic Rationality; Springer: Dordrecht, The Netherlands, 1988; pp. 67–75. ISBN 978-90-277-2663-6. [Google Scholar]
- Li, S.; Chen, R.; Li, Z.; Chen, X. Can Blockchain Help Curb “Greenwashing” in Green Finance?—Based on Tripartite Evolutionary Game Theory. J. Clean. Prod. 2024, 435, 140447. [Google Scholar] [CrossRef]
- Zhang, L.L. Research on the Design of China’s Scientific Research Credit Management Mechanism Under Innovation Strategy: Simulation Analysis Based on Multi-Agent Evolutionary Game Equilibrium. Sci. Technol. Manag. Res. 2024, 44, 202–211. [Google Scholar] [CrossRef]
- Shi, P.P.; Sun, G.Q.; Shi, W.P.; Zhang, L. The Intrinsic Logic and Implementation Mechanism of Blockchain Enabled E-commence Platform Governance—From the Perspective of a Tripartite Evolutionary Game. Manag. Rev. 2025, 37, 149–163. [Google Scholar] [CrossRef]
- China Communications Industry Association Block Chain Specialized Committee. Notice on the Issuance of Implementation Guidelines for the Special Policy on the Comprehensive Pilot Program for National Blockchain Innovation Applications in Chengdu. Available online: https://www.cciapcb.com.cn/article/item-2215.html (accessed on 2 January 2023).
- Long Yan Government. Notice on the Revision of the Special Blockchain Funding Subsidy Measures (2020–2023) by the Longyan Municipal Bureau of Big Data and Government Services and the Longyan Municipal Finance Bureau. Available online: http://xxgk.longyan.gov.cn/lysdsjj/zc/xzgfxwj/202309/t20230913_2035382.htm (accessed on 3 August 2023).
- Dong Hua University Center for Procurement and Tendering Management. Procurement Award Announcement for the Blockchain Research Platform System Project at Donghua University. Available online: https://ztb.dhu.edu.cn/2024/0528/c12242a345889/page.htm (accessed on 4 May 2024).
- The People’s Government of Hunan Province. Chenzhou Enforces Stringent Penalties for Violations of Science and Technology Program Regulations and Research Misconduct—Two Enterprises Have Been Prosecuted for Improper Allocation of Research Funding. Available online: http://www.hunan.gov.cn/topic/gjz/gjzywdt/202308/t20230804_29453463.html (accessed on 5 August 2023).
- The Voice of Medicin. Over Thirty Researchers Have Been Sanctioned for Scientific Misconduct, Resulting in the Revocation of Chief Physician Credentials and the Withdrawal of Additional Professional Privileges. Available online: https://mp.weixin.qq.com/s?__biz=MzA4NDI5MzYzNA==&mid=2650671422&idx=3&sn=9ba4ad27dac99a732fed37ca3ccdf900&chksm=87e3c853b09441457ae50c5deeac6dd8d004f51606f0afc1c04b5f88f547ac1b29623abe7bb2&scene=27 (accessed on 6 October 2021).
- Wen, Y.; Lv, B.F.; Zhang, X.Y.; Peng, G. A Game Study of Government Regulation and Corporate Synergy in the Construction of Data Transaction Infrastructure. Manag. Rev. 2024, 36, 42–53. [Google Scholar] [CrossRef]
- Jiang, X.; Zhao, K.; Tang, Y.Q. Research on Coordination Mechanism of Urban Emergency Supply China Based on Quadrilateral Evolutionary Game under Emergencies. Manag. Rev. 2024, 36, 246–256. [Google Scholar] [CrossRef]
- Chen, Z.; Wang, S.; Lin, C.Y.; Li, N. Studies on Ethics of Big Data Privacy in the Platform Economy Based on Evolutionary Game Theory. Nankai Econ. Stud. 2024, 92–109. [Google Scholar] [CrossRef]
- Sun, F.H.; Zhang, X.J.; Gao, X.; Zhang, K.Z.; Shen, J.Q. Cooperative Mechanism of Trans-stream Ecological Compensation Evolution Based on Reputation Effect. Resour. Ind. 2021, 23, 87–96. [Google Scholar] [CrossRef]
- Wang, Y.; Li, X.L.; Yang, L.; Zhu, M.D.; Yang, H.P.; Tripartite Stochastic Evolutionary Game and Simulation Research on User Privacy Protection of Generative Artificial Intelligence Services. Journal of Modern Information. Available online: https://link.cnki.net/urlid/22.1182.G3.20251014.1907.002 (accessed on 27 October 2025).
- Wen, H.Y. Research on the Evolution of University Network Public Opinion Based on Four-participant Evolutionary Game. Manag. Rev. 2022, 34, 158–169. [Google Scholar] [CrossRef]
- Yang, X.; Gong, G.; Tian, Y. Optimal Game Theory in Complicated Virtual-Modeling and CGF Decision-Making with Multi-Granularities. In Proceedings of the 2008 International Conference on Smart Manufacturing Application, Goyang, Republic of Korea, 9 April 2008; pp. 95–99. [Google Scholar]
- Yang, X.; Gong, G.; Tian, Y.; Yang, X.X. Generalized Optimal Game Theory in Virtual Decision-Makings. In Proceedings of the 2008 Chinese Control and Decision Conference, Yantai, China, 2 July 2008; pp. 1960–1964. [Google Scholar]
- Yang, X.; Gong, G. Research on Key Technologies of Aggregated CGF. J. Syst. Simul. 2006, 18 (Suppl. S2), 583–586. [Google Scholar] [CrossRef]





















| Parameters | Description |
|---|---|
| Government subsidy benefits received by scientific research institutions for adopting BC regulation, . | |
| The costs incurred by researchers in implementing research integrity, , . | |
| The costs incurred by researchers when engaging in research misconduct, . | |
| If scientific research institutions implement BC regulation, the implicit costs incurred by researchers engaging in research misconduct increase, . | |
| The capital investment and ongoing operational expenditures incurred by scientific research institutions for the implementation and maintenance of BC infrastructure, , . | |
| The costs incurred by scientific research institutions in implementing BC regulation, , . | |
| The costs incurred by scientific research institutions in implementing traditional regulation, . | |
| The costs incurred by governments in implementing strict regulation, , . | |
| The costs incurred by governments in implementing lenient regulation, . | |
| The reputational damage incurred by researchers as a consequence of engaging in research misconduct, . | |
| The penalties imposed by scientific research institutions on researchers for engaging in research misconduct, . | |
| The coefficient of relational penalty imposed by scientific research institutions on researchers engaging in research misconduct under traditional regulation, . | |
| The probability that scientific research institutions identify research misconduct by personnel under traditional regulation, . | |
| The reputational damage incurred by scientific research institutions as a result of researchers engaging in research misconduct, . | |
| When researchers engage in research misconduct, governments impose traditional regulation penalties on scientific research institutions, . | |
| The reputational damage incurred by governments as a result of researchers engaging in research misconduct, . | |
| Following the integration of BC within scientific research institutions, both researchers and scientific research institutions may face potential losses resulting from privacy breaches associated with research outputs, . | |
| Strict regulation, researchers’ adoption of research misconduct can offset the reputational loss incurred by governments, . | |
| When scientific research institutions implement BC regulation, researchers’ adoption of research misconduct can offset the reputational loss incurred by scientific research institutions, . | |
| Under the traditional regulation adopted by scientific research institutions, the probability of research personnel engaging in research misconduct being exposed, . | |
| The probability of research output privacy breaches under BC regulation adopted by scientific research institutions, . |
| Scientific Research Institutions | Governments | |||
|---|---|---|---|---|
| Strict Regulation | Lenient Regulation | |||
| Researchers | Research integrity | BC regulation | ||
| Traditional regulation | ||||
| Research misconduct | BC regulation | |||
| Traditional regulation | ||||
| Equilibrium Points | |
|---|---|
| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 30 | 3 | 3 | |||
| 10 | 3 | 0.5 | |||
| 6 | 6 | 0.5 | |||
| 2 | 0.5 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 3 | 0.7 | |||
| 6 | 1 | — | — |
| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 15 | 3 | 3 | |||
| 10 | 4 | 0.5 | |||
| 6 | 7 | 0.5 | |||
| 2 | 0.5 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 3 | 0.7 | |||
| 6 | 1 | — | — |
| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 0 | 3 | 3 | |||
| 10 | 1 | 0.5 | |||
| 6 | 1 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 0 | 0.7 | |||
| 6 | 1 | — | — |
| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 15 | 3 | 3 | |||
| 10 | 4 | 0.5 | |||
| 6 | 7 | 0.5 | |||
| 2 | 0.5 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 3 | 0.7 | |||
| 6 | 1 | — | — |
| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 20 | 3 | 3 | |||
| 10 | 4 | 0.5 | |||
| 6 | 7 | 0.5 | |||
| 2 | 0.2 | 0.5 | |||
| 3 | 0.2 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 9 | 0.7 | |||
| 6 | 1 | — | — |
| Parameter | Initial Value | Parameter | Initial Value | Parameter | Initial Value |
|---|---|---|---|---|---|
| 30 | 3 | 3 | |||
| 10 | 3 | 0.5 | |||
| 6 | 6 | 0.5 | |||
| 2 | 0.5 | 0.5 | |||
| 3 | 0.5 | 0.5 | |||
| 6 | 2 | 1 | |||
| 29.8 | 3 | 0.7 | |||
| 6 | 1 | — | — |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Li, G.; Zhao, Z.; Chai, R.; Zhu, M. An Analysis of the Mechanism and Mode Evolution for Blockchain-Empowered Research Credit Supervision Based on Prospect Theory: A Case from China. Mathematics 2025, 13, 3557. https://doi.org/10.3390/math13213557
Li G, Zhao Z, Chai R, Zhu M. An Analysis of the Mechanism and Mode Evolution for Blockchain-Empowered Research Credit Supervision Based on Prospect Theory: A Case from China. Mathematics. 2025; 13(21):3557. https://doi.org/10.3390/math13213557
Chicago/Turabian StyleLi, Gang, Zhihuang Zhao, Ruirui Chai, and Mengjiao Zhu. 2025. "An Analysis of the Mechanism and Mode Evolution for Blockchain-Empowered Research Credit Supervision Based on Prospect Theory: A Case from China" Mathematics 13, no. 21: 3557. https://doi.org/10.3390/math13213557
APA StyleLi, G., Zhao, Z., Chai, R., & Zhu, M. (2025). An Analysis of the Mechanism and Mode Evolution for Blockchain-Empowered Research Credit Supervision Based on Prospect Theory: A Case from China. Mathematics, 13(21), 3557. https://doi.org/10.3390/math13213557

