Computational Model Library

Displaying 10 of 12 results threat clear search

Hybrid attacks coordinate the exploitation of vulnerabilities across domains to undermine trust in authorities and cause social unrest. Whilst such attacks have primarily been seen in active conflict zones, there is growing concern about the potential harm that can be caused by hybrid attacks more generally and a desire to discover how better to identify and react to them. In addressing such threats, it is important to be able to identify and understand an adversary’s behaviour. Game theory is the approach predominantly used in security and defence literature for this purpose. However, the underlying rationality assumption, the equilibrium concept of game theory, as well as the need to make simplifying assumptions can limit its use in the study of emerging threats. To study hybrid threats, we present a novel agent-based model in which, for the first time, agents use reinforcement learning to inform their decisions. This model allows us to investigate the behavioural strategies of threat agents with hybrid attack capabilities as well as their broader impact on the behaviours and opinions of other agents.

Hierarchy and War

Alan van Beek Michael Z. Lopate | Published Thursday, April 06, 2023

Scholars have written extensively about hierarchical international order, on the one hand, and war on the other, but surprisingly little work systematically explores the connection between the two. This disconnect is all the more striking given that empirical studies have found a strong relationship between the two. We provide a generative computational network model that explains hierarchy and war as two elements of a larger recursive process: The threat of war drives the formation of hierarchy, which in turn shapes states’ incentives for war. Grounded in canonical theories of hierarchy and war, the model explains an array of known regularities about hierarchical order and conflict. Surprisingly, we also find that many traditional results of the IR literature—including institutional persistence, balancing behavior, and systemic self-regulation—emerge from the interplay between hierarchy and war.

An Agent-Based Model to simulate agent reactions to threatening information based on the anxiety-to-approach framework of Jonas et al. (2014).
The model showcases the framework of BIS/BAS (inhibitory and approach motivated behavior) for the case of climate information, including parameters for anxiety, environmental awareness, climate scepticism and pro-environmental behavior intention.

Agents receive external information according to threat-level and information frequency. The population dynamic is based on the learning from that information as well as social contagion mechanisms through a scale-free network topology.

The model uses Netlogo 6.2 and the network extension.

The western honey bee Apis mellifera is the most important pollinator in the world. The biggest threat to managed honey bees is the ectoparasitic mite Varroa destructor and the viruses DWV (Deformed Wing Virus) and APV (Acute Paralysis Virus) it transmits. Untreated honey bee colonies are expected to die within one to three years. This led to the development of strategies for beekeepers to control the Varroa mite in honey bee colonies and ensure the health and survival of their bee colonies, so called Good Beekeeping Practice. The aim of the extension of BEEHAVE was to represent the Good Beekeeping Practice of Varroa control in Germany. The relevant measures within the Varroa control strategies are drone brood removal as a Varroa trap and the treatment of bee colonies with organic acaricides (formic and oxalic acid) to kill the mites. This extension improves BEEHAVE and builds a bridge between beekeepers in practice and in the modelling world. It vastly contributes to the future use of BEEHAVE in beekeeping education in Germany.

This model simulates economic and epidemiological interaction between citrus production and the disease Huanglongbing (HLB), which is vectored by the Asian citrus psyllid. The model is used to evaluate area-wide coordinated spraying when free-riding is possible given individuals’ beliefs in other grower participation in area-wide spraying and in the information provided by extension on the threat as HLB spread.

Resisting hostility

Sylvie Huet | Published Thursday, December 20, 2018

We propose an agent-based model leading to a decrease or an increase of hostility between agents after a major cultural threat such as a terrorist attack. The model is inspired from the Terror Management Theory and the Social Judgement Theory. An agent has a cultural identity defined through its acceptance segments about each of three different cultural worldviews (i.e., Atheist, Muslim, Christian) of the considered society. An agent’s acceptance segment is composed from its acceptable positions toward a cultural worldview, including its most acceptable position. An agent forms an attitude about another agent depending on the similarity between their cultural identities. When a terrorist attack is perpetrated in the name of an extreme cultural identity, the negatively perceived agents from this extreme cultural identity point of view tend to decrease the width of their acceptance segments in order to differentiate themselves more from the threatening cultural identity

We compare three model estimates for the time and treatment requirements to eliminate HCV among HIV-positive MSM in Victoria, Australia: a compartmental model; an ABM parametrized by surveillance data; and an ABM with a more heterogeneous population.

Institutional change

Abigail Sullivan | Published Friday, October 07, 2016 | Last modified Sunday, December 02, 2018

This model builds on another model in this library (“diffusion of culture”).

Crowd dynamics have important applications in evacuation management systems relevant to organizing safer large scale gatherings. For crowd safety, it is very important to study the evolution of potential crowd behaviours by simulating the crowd evacuation process. Planning crowd control tasks by studying the impact of crowd behaviour evolution towards evacuation could mitigate the possibility of crowd disasters. During a typical emergency evacuation scenario, conflict among agents occurs when agents intend to move to the same location as a result of the interaction with their nearest neighbours. The effect of the agent response towards their neighbourhood is vital in order to understand the effect of variation of crowd behaviour on the whole environment. In this work, we model crowd motion subject to exit congestion under uncertainty conditions in a continuous space via computer simulations. We model best-response, risk-seeking, risk-averse and risk-neutral behaviours of agents via certain game theoretic notions. We perform computer simulations with heterogeneous populations in order to study the effect of the evolution of agent behaviours towards egress flow under threat conditions. Our simulation results show the relation between the local crowd pressure and the number of injured agents. We observe that when the proportion of agents in a population of risk-seeking agents is increased, the average crowd pressure, average local density and the number of injured agents increases. Besides that, based on our simulation results, we can infer that crowd disasters could be prevented if the agent population consists entirely of risk-averse and risk-neutral agents despite circumstances that lead to threats.

Spatial model of the noisy Prisoner's Dilemma with reward shift

Matus Halas | Published Thursday, March 05, 2015 | Last modified Tuesday, May 29, 2018

Interactions of players embedded in a closed square lattice are determined by distance and overall gains and they lead to shifts of reward payoff between temptation and punishment. A new winner balancing against threats is ultimately discovered.

Displaying 10 of 12 results threat clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept