Submitted:
01 September 2025
Posted:
01 September 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Game players: Consumer Segmentation in the New Energy Vehicle Market
2.1. The Economic Landscape of Consumer Choice
2.2. Defining Consumer Archetypes
| Feature Dimension | Value-oriented pragmatists | Privacy-first principled people |
|---|---|---|
| Market positioning (price range) | Mainstream market of RMB 100,000-200,000 (China Association of Automobile Manufacturers, 2025) | High-end market with a value of RMB 300,000 and above (Caixin, 2024) |
| Core purchasing drivers | Cost-effectiveness, functional practicality, and economy | Brand reputation, technological leadership, user experience, and ethical identity |
| Leading privacy stance | Transactional: Willing to exchange data for convenience and functionality | Rights-based: Privacy is considered an inviolable basic right |
| Sensitivity to data misuse | Moderate, but reacts strongly when actual interests are damaged | High, highly alert to opaque operations and potential risks |
| Representative models (examples) | BYD Song and Qin PLUS (Gasgoo, 2025) | NIO ES6, Li Auto L9, and M9 (Caixin, 2024) |
3. Game Model: Strategic Analysis of Data Exchange
3.1. Game Setting: Participants, Strategies, and Payoffs
3.2. Profit Matrix and Equilibrium Analysis
| Automaker strategies | Consumer Strategy Portfolio | Automaker earnings (PayoffA) | Pragmatist Payoff (PayoffCp) | Principled Payoff (PayoffCpr) | Description of equilibrium state |
|---|---|---|---|---|---|
| Exploitation Data (ED) | Cp: SD, Cpr: WD | High Vd, high M (part of Cp), low T, high risk | Gaining functionality, sacrificing privacy | Privacy protected, functionality/branding limited | Low Trust Equilibrium (Unstable) |
| Exploitation Data (ED) | Cp: SD, Cpr: SD | Very high Vd, very high M, very low T, very high risk | Gaining functionality, but seriously compromising privacy | Core values have been violated, causing extreme dissatisfaction | Theoretically optimal in the short term, but in reality easily collapsing due to scandals |
| Protected Data (PD) | Cp: SD, Cpr: SD | Medium Vd, high M, high T, low risk, high π | Gain functionality, protect privacy | Core values are met, and satisfaction is highest | High Trust Equilibrium (Stable) |
| Protected Data (PD) | Cp: WD, Cpr: WD | Low Vd, low M, medium T | Limited functionality, but secure privacy | The core value is met, but the functional experience is poor | Low market acceptance and lack of competitiveness of car companies |
4. Rules of the Game: Integrating Deontological Ethics as a Normative Framework
4.1. Basic Theories of Deontological Ethics
4.2. Deontological and Ethical Principles Applicable to Data Privacy
4.3. Deontological Ethics as a Game Constraint
5. Model Synthesis: Construction of Dynamic Ethical Equilibrium
5.1. Introducing Time and Reputation: From Static Game to Dynamic Process
5.2. How Deontological Ethics Drives Dynamic Evolution
- Market share (M) expands because principled people will actively choose the brand and pragmatists will be more loyal;
- Brands can support higher pricing, thereby increasing profit margins (π);
- In an environment of trust, consumers are more willing to share high-quality data on a voluntary and informed basis (for example, to participate in product improvement programs), which in turn improves the quality and effectiveness of data value (Vd).
5.3. Defining Dynamic Ethical Equilibrium
6. Technical and Policy Recommendations
6.1. Technology Empowerment: Building Trust through Design
6.1.1. Applying Blockchain Technology to Achieve Transparency and Auditability
6.1.2. Adoption of Decentralized Identity (DID) and Self-Controlled Identity (SSI)
6.2. Regulatory Framework: Enforcing the Rules of the Game
6.2.1. Strengthening Global Data Protection Standards
6.2.2. Implementing the “Privacy by Design” Certification System
6.3. The role of Consumers: Activating Market Forces
7. Conclusions
References
- Abbas, SH (nd). Decentralized Identity for Autonomous Vehicles: Secure Credentialing for Self-Driving Cars . Medium. Retrieved August 22, 2025, from https://medium.com/@syedhasnaatabbas/decentralized-identity-for-autonomous-vehicles-secure-credentialing-for-self-driving-cars-4b2b20c4f586H (nd).
- Automotive World China. (2024). In-depth research report on the new energy vehicle industry . Retrieved August 22, 2025, from https://www.automotiveworld.cn/zh-cn/_6/_0/2024/90/50.html.
- Caixin. (2024). SUV Blue Book 2024 . Retrieved August 22, 2025, from https://promote.caixin.com/upload/SUV2024.pdf.
- China Association of Automobile Manufacturers. (2025, January). China Association of Automobile Manufacturers Information Release Conference . Retrieved August 22, 2025, from https://pdf.dfcfw.com/pdf/H3_AP202501171641965011_1.pdf.
- China Automobile Dealers Association. (2024, May). Analysis of the national passenger car market in April 2024. Retrieved August 22, 2025, from http://www.cada.cn/Trends/info_91_9961.html.
- Dorri, A., Steger, M., Kanhere, SS, & Jurdak, R. (2017). BlockChain: A distributed solution to automotive security and privacy . arXiv preprint arXiv:1704.00073.
- East Money Information. (2024, September). 2024 New Car Review: Hybrid Vehicle Proportion Increases, Intensifying Competition in the SUV Red Ocean . Retrieved August 22, 2025, from https://pdf.dfcfw.com/pdf/H301_AP202409111639837051_1.pdf.
- Fiveable. (nd). Utilitarianism, deontology, and virtue ethics in AI context . AI Ethics Class Notes. Retrieved August 22, 2025, from https://library.fiveable.me/artificial-intelligence-and-ethics/unit-2/utilitarianism-deontology-virtue-ethics-ai-context/study-guide/uk9lJyQbhFMjCYkC.
- Gasgoo. (2025, February 25). Global new energy rankings: Geely and Li Auto surpass Volkswagen, domestic brands hold more than half the seats . Retrieved August 22, 2025, from https://auto.gasgoo.com/news/202502/25I70419376C110.shtml.
- Kant, I. (2002). Groundwork for the metaphysics of morals (AW Wood, Trans.). Yale University Press. (Original work published 1785).
- Modern Diplomacy. (2021, December 24). Ethical aspects relating to cyberspace: Utilitarianism and deontology . Retrieved August 22, 2025, from https://moderndiplomacy.eu/2021/12/24/ethical-aspects-relating-to-cyberspace-utilitarianism-and-deontology/.
- Rajbhandari, L., & Snekkenes, E. (2010). Using game theory to analyze risk to privacy: An initial insight. In IFIP Advances in Information and Communication Technology, 352 , 41-51.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).