Computational Model Library

Displaying 10 of 820 results for "Jon Norberg" clear search

Our model is hybrid agent-based and equation based model for human air-borne infectious diseases measles. It follows an SEIR (susceptible, exposed,infected, and recovered) type compartmental model with the agents moving be-tween the four state relating to infectiousness. However, the disease model canswitch back and forth between agent-based and equation based depending onthe number of infected agents. Our society model is specific using the datato create a realistic synthetic population for a county in Ireland. The modelincludes transportation with agents moving between their current location anddesired destination using predetermined destinations or destinations selectedusing a gravity model.

This model demonstrates how different psychological mechanisms and network structures generate various patterns of cultural dynamics including cultural diversity, polarization, and majority dominance, as explored by Jung, Bramson, Crano, Page, and Miller (2021). It focuses particularly on the psychological mechanisms of indirect minority influence, a concept introduced by Serge Moscovici (1976, 1980)’s genetic model of social influence, and validates how such influence can lead to social change.

Peer reviewed Simulating the Economic Impact of Boko Haram on a Cameroonian Floodplain

Mark Moritz Nathaniel Henry Sarah Laborde | Published Saturday, October 22, 2016 | Last modified Wednesday, June 07, 2017

This model examines the potential impact of market collapse on the economy and demography of fishing households in the Logone Floodplain, Cameroon.

ACT: Agent-based model of Critical Transitions

Igor Nikolic Oscar Kraan Steven Dalderop Gert Jan Kramer | Published Wednesday, October 18, 2017 | Last modified Monday, August 27, 2018

ACT is an ABM based on an existing conceptualisation of the concept of critical transitions applied to the energy transition. With the model we departed from the mean-field approach simulated relevant actor behaviour in the energy transition.

This model is programmed in Python 3.6. We model how different consensus protocols and trade network topologies affect the performance of a blockchain system. The model consists of multiple trader and miner agents (Trader.py and Tx.py), and one system agent (System.py). We investigated three consensus protocols, namely proof-of-work (PoW), proof-of-stake (PoS), and delegated proof-of-stake (DPoS). We also examined three common trade network topologies: random, small-world, and scale-free. To reproduce our results, you may need to create some databases using, e.g., MySQL; or read and write some CSV files as model configurations.

Ring Around the Kula: The Influence of Ceremonial Exchange on Network Formation

Andrea Tovinen | Published Tuesday, December 16, 2008 | Last modified Saturday, April 27, 2013

The purpose of the model is to examine the strength of network connections in a ceremonial exchange network in a non-hierarchical society.

Evaluating Government's Policies on Promoting Smart Metering Diffusion in Retail Electricity Markets

Tao Zhang | Published Monday, December 07, 2009 | Last modified Saturday, April 27, 2013

This model is a market game for evaluating the effectiveness of the UK government’s 2008-2010 policy on promoting smart metering in the UK retail electricity market. We break down the policy into four

This model studies the emergence and dynamics of generalized trust. It does so by modeling agents that engage in trust games and, based on their experience, slowly determine whether others are, in general, trustworthy.

The model aims at estimating household energy consumption and the related greenhouse gas (GHG) emissions reduction based on the behavior of the individual household under different operationalizations of the Theory of Planned Behaviour (TPB).
The original model is developed as a tool to explore households decisions regarding solar panel investments and cumulative consequences of these individual choices (i.e. diffusion of PVs, regional emissions savings, monetary savings). We extend the model to explore a methodological question regarding an interpretation of qualitative concepts from social science theories, specifically Theory of Planned Behaviour in a formal code of quantitative agent-based models (ABMs). We develop 3 versions of the model: one TPB-based ABM designed by the authors and two alternatives inspired by the TPB-ABM of Schwarz and Ernst (2009) and the TPB-ABM of Rai and Robinson (2015). The model is implemented in NetLogo.

Peer reviewed Descriptive Norm and Fraud Dynamics

Alexandra Eckert Matthias Meyer Christian Stindt | Published Tuesday, January 07, 2025 | Last modified Tuesday, March 24, 2026

The “Descriptive Norm and Fraud Dynamics” model demonstrates how fraudulent behavior can either proliferate or be contained within non-hierarchical organizations, such as peer networks, through social influence taking the form of a descriptive norm. This model expands on the fraud triangle theory, which posits that an individual must concurrently possess a financial motive, perceive an opportunity, and hold a pro-fraud attitude to engage in fraudulent activities (red agent). In the absence of any of these elements, the individual will act honestly (green agent).

The model explores variations in a descriptive norm mechanism, ranging from local distorted knowledge to global perfect knowledge. In the case of local distorted knowledge, agents primarily rely on information from their first-degree colleagues. This knowledge is often distorted because agents are slow to update their empirical expectations, which are only partially revised after one-to-one interactions. On the other end of the spectrum, local perfect knowledge is achieved by incorporating a secondary source of information into the agents’ decision-making process. Here, accurate information provided by an observer is used to update empirical expectations.

The model shows that the same variation of the descriptive norm mechanism could lead to varying aggregate fraud levels across different fraud categories. Two empirically measured norm sensitivity distributions associated with different fraud categories can be selected into the model to see the different aggregate outcomes.

Displaying 10 of 820 results for "Jon Norberg" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept