Simulation Research on the Infection of Unsafe Behavior of Employees Based on Social Network
DOI: 10.23977/acss.2022.060509 | Downloads: 12 | Views: 617
Author(s)
Jia Ziruo 1, Qi Fuqiang 1
Affiliation(s)
1 School of Transportation Science and Engineering, Civil Aviation University of China, Tianjin, China
Corresponding Author
Jia ZiruoABSTRACT
In order to study the characteristics of unsafe behavior contagion, based on the small world network, an unsafe behavior contagion model with behavioral rules such as homogenization aggregation, second-degree relationship distance of infection, influence paradox, and attenuation of behavioral contagion was constructed. The Netlogo platform was used for simulation. According to the results, it is found that the transmission of unsafe behavior has the contagion characteristics of hysteresis, emerging, and progressiveness. Whether the contagion behaviors occur was determined by the average path length of the network. The strong connection relationship in the network structure would trigger the infection of unsafe behavior. There was a significant positive correlation between the node distribution level of the network structure and the time-consuming cycle of unsafe behavior. Through research and exploration of the formation law and diffusion characteristics of unsafe behaviors in social networks, it is expected to provide theoretical support and direction guidance for the prevention and control of unsafe behaviors in social networks, thereby promoting the improvement of individual and organizational safety performance.
KEYWORDS
Unsafe Behavior, Social Network, Simulation ResearchCITE THIS PAPER
Jia Ziruo, Qi Fuqiang, Simulation Research on the Infection of Unsafe Behavior of Employees Based on Social Network. Advances in Computer, Signals and Systems (2022) Vol. 6: 63-69. DOI: http://dx.doi.org/10.23977/acss.2022.060509.
REFERENCES
[1] Wheeler L. (1966) Toward a theory of behavioral contagion. Psychological Review, 73(2),179-192.
[2] Christakis N A, Fowler J H. (2013) Social contagion theory: examining dynamic social networks and human behavior. Statistics in Medicine, 32, 556-577.
[3] Atkins C K, Greenberg B S, Korzenny F, et al.(1979) Selective exposure to televised violence. Journal of Broadcasting, 23(1), 5-13.
[4] Jones M B, Jones D R. (1996) Preferred pathways of behavioral contagion. Journal of Psychiatric Research, 29(3), 193-209.
[5] Higgins L, Range L M.(1996) Does information that a suicide victim was psychiatrically disturbed reduce the likelihood of contagion. Journal of Applied Social Psychology, 26(9), 781-785.
[6] Christakis N A, Fowler J H.(2008) The collective dynamics of smoking in a large social network. New England Journal of Medicine, 358, 2249-2258.
[7] Tsvetkova M, Macy M W.(2014) The social contagion of generosity. Plos One, 9(2), E87275.
[8] Tsvetkova M, Macy M W.(2015) The social contagion of antisocial behavior..Sociological Science, 2, 36-49.
[9] Centola D, Macy M W. (2007) Complex contagions and the weakness of long ties. American Journal of Sociology, 113(3), 702-734.
[10] Macal C M, North M J.(2005) Tutorial on agent-based modeling and simulation. Proceedings of the 37th conferecen on Winter simulation, 2-15.
[11] Klein M C A, Mogles N, Treur J, et al.(2012) Contagion of habitual behavior in social networks: an agent-based model. Privacy, Security, Risk and Trust, 2012 International Conference on and 2012 International Conference on Social Computing. IEEE, 538-545.
[12] Gonzalez-Pardo A, Cajias R, Camacho D.(2014)An agent-based simulation of Christakis-flower social model, In Recent Developments in Computational Collective Intelligence. Springer International Publishing, 69-77.
[13] Nicholas A Christakis, James H Fowler. (2007)The spread of obesity in a large social network over 32 years. New England Journal of Medicine (S0028-4793), 357(4), 370-379.
[14] Rosenquist J Niels, Joanne Murabito, James H Fowler, et al. (2010) The spread of alcohol consumption behavior in a large social network [J]. Annals of Internal Medicine (S0003-4819), 152(7), 426-433.
[15] Klein Michel C, Nataliya Mogles, Jan Treur, et al. (2012)Contagion of habitual behaviour in social networks: an agent-based model. Privacy, Security, Risk and Trust, 2012 International Conference on and 2012 International Conference on Social Computing (Social Com), IEEE. USA: IEEE, 538-545.
[16] Gonzalez-Pardo Antonio, Raul Cajias, David Camacho. (2014) An agent based simulation of christakis-fowler social model. In Recent Developments in Computational Collective Intelligence. Germany: Springer International Publishing, 69-77.
Downloads: | 19418 |
---|---|
Visits: | 296842 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks