Brain-derived neurotrophic factor is a key factor in stress adaptation and avoidance of a social stress behavioral response.Recent studies have shown that brain-derived neurotrophic factor expression in stressed mice ...Brain-derived neurotrophic factor is a key factor in stress adaptation and avoidance of a social stress behavioral response.Recent studies have shown that brain-derived neurotrophic factor expression in stressed mice is brain region–specific,particularly involving the corticolimbic system,including the ventral tegmental area,nucleus accumbens,prefrontal cortex,amygdala,and hippocampus.Determining how brain-derived neurotrophic factor participates in stress processing in different brain regions will deepen our understanding of social stress psychopathology.In this review,we discuss the expression and regulation of brain-derived neurotrophic factor in stress-sensitive brain regions closely related to the pathophysiology of depression.We focused on associated molecular pathways and neural circuits,with special attention to the brain-derived neurotrophic factor–tropomyosin receptor kinase B signaling pathway and the ventral tegmental area–nucleus accumbens dopamine circuit.We determined that stress-induced alterations in brain-derived neurotrophic factor levels are likely related to the nature,severity,and duration of stress,especially in the above-mentioned brain regions of the corticolimbic system.Therefore,BDNF might be a biological indicator regulating stress-related processes in various brain regions.展开更多
Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in ...Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in detecting suicidal ideation on social media,accurately identifying individuals who express suicidal thoughts less openly or infrequently poses a significant challenge.To tackle this,we have developed a dataset focused on Chinese suicide narratives from Weibo’s Tree Hole feature and introduced an ensemble model named Text Convolutional Neural Network based on Social Network relationships(TCNN-SN).This model enhances predictive performance by leveraging social network relationship features and applying correction factors within a weighted linear fusion framework.It is specifically designed to identify key individuals who can help uncover hidden suicidal users and clusters.Our model,assessed using the bespoke dataset and benchmarked against alternative classification approaches,demonstrates superior accuracy,F1-score and AUC metrics,achieving 88.57%,88.75%and 94.25%,respectively,outperforming traditional TextCNN models by 12.18%,10.84%and 10.85%.We assert that our methodology offers a significant advancement in the predictive identification of individuals at risk,thereby contributing to the prevention and reduction of suicide incidences.展开更多
Social robot accounts controlled by artificial intelligence or humans are active in social networks,bringing negative impacts to network security and social life.Existing social robot detection methods based on graph ...Social robot accounts controlled by artificial intelligence or humans are active in social networks,bringing negative impacts to network security and social life.Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships,which makes it difficult to accurately describe the difference between the topological relations of nodes,resulting in low detection accuracy of social robots.This paper proposes a social robot detection method with the use of an improved neural network.First,social relationship subgraphs are constructed by leveraging the user’s social network to disentangle intricate social relationships effectively.Then,a linear modulated graph attention residual network model is devised to extract the node and network topology features of the social relation subgraph,thereby generating comprehensive social relation subgraph features,and the feature-wise linear modulation module of the model can better learn the differences between the nodes.Next,user text content and behavioral gene sequences are extracted to construct social behavioral features combined with the social relationship subgraph features.Finally,social robots can be more accurately identified by combining user behavioral and relationship features.By carrying out experimental studies based on the publicly available datasets TwiBot-20 and Cresci-15,the suggested method’s detection accuracies can achieve 86.73%and 97.86%,respectively.Compared with the existing mainstream approaches,the accuracy of the proposed method is 2.2%and 1.35%higher on the two datasets.The results show that the method proposed in this paper can effectively detect social robots and maintain a healthy ecological environment of social networks.展开更多
We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwi...We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy.展开更多
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw...A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model.展开更多
With the emergence and development of social networks,people can stay in touch with friends,family,and colleagues more quickly and conveniently,regardless of their location.This ubiquitous digital internet environment...With the emergence and development of social networks,people can stay in touch with friends,family,and colleagues more quickly and conveniently,regardless of their location.This ubiquitous digital internet environment has also led to large-scale disclosure of personal privacy.Due to the complexity and subtlety of sensitive information,traditional sensitive information identification technologies cannot thoroughly address the characteristics of each piece of data,thus weakening the deep connections between text and images.In this context,this paper adopts the CLIP model as a modality discriminator.By using comparative learning between sensitive image descriptions and images,the similarity between the images and the sensitive descriptions is obtained to determine whether the images contain sensitive information.This provides the basis for identifying sensitive information using different modalities.Specifically,if the original data does not contain sensitive information,only single-modality text-sensitive information identification is performed;if the original data contains sensitive information,multimodality sensitive information identification is conducted.This approach allows for differentiated processing of each piece of data,thereby achieving more accurate sensitive information identification.The aforementioned modality discriminator can address the limitations of existing sensitive information identification technologies,making the identification of sensitive information from the original data more appropriate and precise.展开更多
Objective:Network analysis was used to explore the complex inter-relationships between social participation activities and depressive symptoms among the Chinese older population,and the differences in network structur...Objective:Network analysis was used to explore the complex inter-relationships between social participation activities and depressive symptoms among the Chinese older population,and the differences in network structures among different genders,age groups,and urban-rural residency would be compared.Methods:Based on the 2018 wave of the Chinese Longitudinal Healthy Longevity Survey(CLHLS),12,043 people aged 65 to 105 were included.The 10-item Center for Epidemiologic Studies Depression(CESD)Scale was used to assess depressive symptoms and 10 types of social participation activities were collected,including housework,tai-chi,square dancing,visiting and interacting with friends,garden work,reading newspapers or books,raising domestic animals,playing cards or mahjong,watching TV or listening to radio,and organized social activities.R 4.2.1 software was used to estimate the network model and calculate strength and bridge strength.Results:21.60%(2,601/12,043)of the participants had depressive symptoms.The total social participation score was negatively associated with depressive symptoms after adjusting for sociodemographic factors.The network of social participation and depressive symptoms showed that“D9(Inability to get going)”and“S9(Watching TV and/or listening to the radio)”had the highest strength within depressive symptoms and social participation communities,respectively,and“S1(Housework)”,“S9(Watching TV and/or listening to the radio)”,and“D5(Hopelessness)”were the most prominent bridging nodes between the two communities.Most edges linking the two communities were negative.“S5(Graden work)-D5(Hopelessness)”and“S6(Reading newspapers/books)-D4(Everything was an effort)”were the top 2 strongest negative edges.Older females had significantly denser network structures than older males.Compared to older people aged 65e80,the age group 81e105 showed higher network global strength.Conclusions:This study provides novel insights into the complex relationships between social participation and depressive symptoms.Except for doing housework,other social participation activities were found to be protective for depression levels.Different nursing strategies should be taken to prevent and alleviate depressive symptoms for different genders and older people of different ages.展开更多
Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hate...Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hatespeech, but they still suffer from ambiguity when differentiating between hateful and offensive content and theyalso lack accuracy. The work suggested in this paper uses a combination of the Whale Optimization Algorithm(WOA) and Particle Swarm Optimization (PSO) to adjust the weights of two Multi-Layer Perceptron (MLPs)for neutrosophic sets classification. During the training process of the MLP, the WOA is employed to exploreand determine the optimal set of weights. The PSO algorithm adjusts the weights to optimize the performanceof the MLP as fine-tuning. Additionally, in this approach, two separate MLP models are employed. One MLPis dedicated to predicting degrees of truth membership, while the other MLP focuses on predicting degrees offalse membership. The difference between these memberships quantifies uncertainty, indicating the degree ofindeterminacy in predictions. The experimental results indicate the superior performance of our model comparedto previous work when evaluated on the Davidson dataset.展开更多
The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is sprea...The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is spreading positive information to counterbalance the diffusion of rumor.The spreading mechanism of rumors and effective suppression strategies are significant and challenging research issues.Firstly,in order to simulate the dissemination of multiple types of information,we propose a competitive linear threshold model with state transition(CLTST)to describe the spreading process of rumor and anti-rumor in the same network.Subsequently,we put forward a community-based rumor blocking(CRB)algorithm based on influence maximization theory in social networks.Its crucial step is to identify a set of influential seeds that propagate anti-rumor information to other nodes,which includes community detection,selection of candidate anti-rumor seeds and generation of anti-rumor seed set.Under the CLTST model,the CRB algorithm has been compared with six state-of-the-art algorithms on nine online social networks to verify the performance.Experimental results show that the proposed model can better reflect the process of rumor propagation,and review the propagation mechanism of rumor and anti-rumor in online social networks.Moreover,the proposed CRB algorithm has better performance in weakening the rumor dissemination ability,which can select anti-rumor seeds in networks more accurately and achieve better performance in influence spread,sensitivity analysis,seeds distribution and running time.展开更多
Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital w...Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital world. These networks can be viewed as a collection of nodes and edges, where users and their interactions are represented as nodes and the connections between them as edges. Understanding the factors that contribute to the formation of these edges is important for studying network structure and processes. This knowledge can be applied to various areas such as identifying communities, recommending friends, and targeting online advertisements. Several factors, including node popularity and friends-of-friends relationships, influence edge formation and network growth. This research focuses on the temporal activity of nodes and its impact on edge formation. Specifically, the study examines how the minimum age of friends-of-friends edges and the average age of all edges connected to potential target nodes influence the formation of network edges. Discrete choice analysis is used to analyse the combined effect of these temporal factors and other well-known attributes like node degree (i.e., the number of connections a node has) and network distance between nodes. The findings reveal that temporal properties have a similar impact as network proximity in predicting the creation of links. By incorporating temporal features into the models, the accuracy of link prediction can be further improved.展开更多
For the longest time,peacemaking and peacekeeping were the only post-factum interventions to resolve armed conflicts usually related to a nation-state’s borders or territory.Peacebuilding has its origins in sociology...For the longest time,peacemaking and peacekeeping were the only post-factum interventions to resolve armed conflicts usually related to a nation-state’s borders or territory.Peacebuilding has its origins in sociology(Galtung,1969;1975)and is used today as a preferred concept in matters of conflict.However,this paper explores why peacebuilding,as the Secretary General of the United Nations advocates in A New Agenda for Peace,must become a nonlinear and contextual process that promotes the prevention of conflict and invites a transformative approach to addressing the linkages between peace,security,and climate.Furthermore,this paper advocates that peacebuilding grounded in social psychology and social anthropology will bring about transformative outcomes as it will build relationships at the community level and become a preventive tool to address incipient tensions within the community.Peacebuilding as social work will benefit the community and lay the necessary foundations for a sustainable future.Social workers are equipped to assess,analyze,and solve problems.Their capacity to do ongoing social diagnosis is a critical tool to prevent skirmishes degenerating into conflicts.Social work could be the much-needed resource to further develop theory and practice that contributes to active peacebuilding.展开更多
Location prediction in social media,a growing research field,employs machine learning to identify users' locations from their online activities.This technology,useful in targeted advertising and urban planning,rel...Location prediction in social media,a growing research field,employs machine learning to identify users' locations from their online activities.This technology,useful in targeted advertising and urban planning,relies on natural language processing to analyze social media content and understand the temporal dynamics and structures of social networks.A key application is predicting a Twitter user's location from their tweets,which can be challenging due to the short and unstructured nature of tweet text.To address this challenge,the research introduces a novel machine learning model called the location-aware attention LSTM(LAA-LSTM).This hybrid model combines a Long Short-Term Memory(LSTM) network with an attention mechanism.The LSTM is trained on a dataset of tweets,and the attention network focuses on extracting features related to latitude and longitude,which are crucial for pinpointing the location of a user's tweet.The result analysis shows approx.10% improvement in accuracy over other existing machine learning approaches.展开更多
The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy ...The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy can obtain good accuracy, they come at the cost of enormous computational time, and are therefore not applicable to practical scenarios in large-scale networks. In addition, the centrality heuristic algorithms that are based on network topology can be completed in relatively less time. However, they tend to fail to achieve satisfactory results because of drawbacks such as overlapped influence spread. In this work, we propose a discrete two-stage metaheuristic optimization combining quantum-behaved particle swarm optimization with Lévy flight to identify a set of the most influential spreaders. According to the framework,first, the particles in the population are tasked to conduct an exploration in the global solution space to eventually converge to an acceptable solution through the crossover and replacement operations. Second, the Lévy flight mechanism is used to perform a wandering walk on the optimal candidate solution in the population to exploit the potentially unidentified influential nodes in the network. Experiments on six real-world social networks show that the proposed algorithm achieves more satisfactory results when compared to other well-known algorithms.展开更多
With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that consid...With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that considers the trust relationship among decisionmakers(DMs).In the process of consensusmeasurement:the social network is constructed according to the social relationship among DMs,and the Louvain method is introduced to classify social networks to form subgroups.In this study,the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights.In the process of consensus improvement:A feedback mechanism with four identification and two direction rules is designed to guide the consensus of the improvement process.Based on the trust relationship among DMs,the preferences are modified,and the corresponding social network is updated to accelerate the consensus.Compared with the previous research,the proposedmodel not only allows the subgroups to be reconstructed and updated during the adjustment process,but also improves the accuracy of the adjustment by the feedbackmechanism.Finally,an example analysis is conducted to verify the effectiveness and flexibility of the proposed method.Moreover,compared with previous studies,the superiority of the proposed method in solving the LGDM problem is highlighted.展开更多
Purpose:We analyzed the structure of a community of authors working in the field of social network analysis(SNA)based on citation indicators:direct citation and bibliographic coupling metrics.We observed patterns at t...Purpose:We analyzed the structure of a community of authors working in the field of social network analysis(SNA)based on citation indicators:direct citation and bibliographic coupling metrics.We observed patterns at the micro,meso,and macro levels of analysis.Design/methodology/approach:We used bibliometric network analysis,including the“temporal quantities”approach proposed to study temporal networks.Using a two-mode network linking publications with authors and a one-mode network of citations between the works,we constructed and analyzed the networks of citation and bibliographic coupling among authors.We used an iterated saturation data collection approach.Findings:At the macro-level,we observed the global structural features of citations between authors,showing that 80%of authors have not more than 15 citations from other works.At the meso-level,we extracted the groups of authors citing each other and similar to each other according to their citation patterns.We have seen a division of authors in SNA into groups of social scientists and physicists,as well as into other groups of authors from different disciplines.We found some examples of brokerage between different groups that maintained the common identity of the field.At the micro-level,we extracted authors with extremely high values of received citations,who can be considered as the most prominent authors in the field.We examined the temporal properties of the most popular authors.Research limitations:The main challenge in this approach is the resolution of the author’s name(synonyms and homonyms).We faced the author disambiguation,or“multiple personalities”(Harzing,2015)problem.To remain consistent and comparable with our previously published articles,we used the same SNA data collected up to 2018.The analysis and conclusions on the activity,productivity,and visibility of the authors are relative only to the field of SNA.Practical implications:The proposed approach can be utilized for similar objectives and identifying key structures and characteristics in other disciplines.This may potentially inspire the application of network approaches in other research areas,creating more authors collaborating in the field of SNA.Originality/value:We identified and applied an innovative approach and methods to study the structure of scientific communities,which allowed us to get the findings going beyond those obtained with other methods.We used a new approach to temporal network analysis,which is an important addition to the analysis as it provides detailed information on different measures for the authors and pairs of authors over time.展开更多
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc...Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components.展开更多
This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. Mo...This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace.展开更多
Social Network Theory and methods have emerged as pivotal tools for dissecting intricate interdisciplinary issues in rural communities.This study aims to systematically delineate the application characteristics and tr...Social Network Theory and methods have emerged as pivotal tools for dissecting intricate interdisciplinary issues in rural communities.This study aims to systematically delineate the application characteristics and trends of Social Network Analysis(SNA)in rural community research.Using a twofold approach,we integrate a traditional literature review and CiteSpace bibliometric analysis to assess the application status and evolutionary trends of SNA methods in this context.The key findings include the following:①Chinese research trends:scholars predominantly concentrate on the“three rural”issues(related to agriculture,rural areas,and small-scale farmers)and social support mechanisms for vulnerable rural populations.With policy shifts,rural revitalization,tourism,governance,social trust,and multi-dimensional poverty are poised to emerge as hot topics for the future.For further refinement,we suggest that the application of SNA in rural community research could benefit from content expansion,long-term studies,and innovative modelling techniques.②Research by international scholars has been primarily directed toward the physical and mental health of rural residents,as well as socioeconomic issues.Despite these studies covering a range of typical cases across various nations,a conspicuous lack of thorough,systematic,and prolonged efforts focused on rural community development in specific regions remains.Additionally,health issues affecting rural residents are expected to sustain long-standing and focused international academic attention.This study contributes to a more nuanced understanding of the current applications and potential future directions of SNA in rural community studies,both in China and internationally.展开更多
Music education under the frame name of arts education has been integrated into the primary and secondary education curriculums in Hong Kong for more than 20 years,starting from 2001,the year of launching the Learning...Music education under the frame name of arts education has been integrated into the primary and secondary education curriculums in Hong Kong for more than 20 years,starting from 2001,the year of launching the Learning to Learn curriculum for the reconstruction of the education system for the younger generation.Music education,embedded into the arts education,was therefore regarded as one of the key subjects to cultivate and uplift student holistic development,focusing on aesthetic skill training and moral growth development.This research was an exploration study of music teaching practices from two private international and two general public school music teachers at the primary school level.The value of this study rested on borrowing the idea of Shulman’s pedagogical content knowledge(PCK)principle to create a social constructivist music teaching framework from five commonly-used instructional methods,namely,Orff,Kodaly,Dalcrozes,Suzuki,and Gordon’s approaches.Based on the evaluations of these four case studies,hypotheses on the differences in the PCK were tested with the types of schools and found to be no difference.The preliminary results suggested that music teachers in private international schools had similar pedagogical approaches to music instruction to teachers in aided-public schools.Additionally,the modeling,guiding,and training approach was identified as a grounded teaching method for music education at the primary school level regardless of different types of schools.Other implications like the further development of the framework were discussed.展开更多
Abstract:With the rise of new business forms,the traditional industrial-era model of binding social insurance to labor relations is facing unprecedented challenges.In the context of these new busi-ness forms,whether t...Abstract:With the rise of new business forms,the traditional industrial-era model of binding social insurance to labor relations is facing unprecedented challenges.In the context of these new busi-ness forms,whether the protection of workers’social insurance rights and interests can be“decoupled from labor relations”has become a hotly debated topic in academia,with“the ability to establish labor relations”emerging as a key variable influencing government depart-ments’policy choices on classified social insurance coverage.Based on this,the paper constructs a theoretical model of the correlation be-tween social insurance and labor relations to analyze cases concern-ing the protection of social insurance rights and interests of workers in new business forms.It examines the advantages and disadvantages of binding social insurance to labor relations and suggests promoting so-cial insurance policy innovation by transcending labor relations.The paper advocates abandoning the path dependency that starts with la-bor relations and clarifying the theoretical basis that workers’access to social insurance rights should be based on labor rather than em-ployment.To adapt to the profit model of new business forms,it pro-poses establishing a rule of“proportional responsibility for commis-sions,”where the social insurance contribution base is determined by the proportion and amount of corporate commissions.By reasonably setting rates,it will protect the healthy development of new business forms in a balanced manner.In this way,enterprises can share social insurance responsibilities according to unified rules without worrying about being classified as having a labor relationship,which helps fully protect workers’social insurance rights and interests and promotes fair competition and healthy development among enterprises.展开更多
基金supported financially by the National Natural Science Foundation of China,No.82071272(to YZ).
文摘Brain-derived neurotrophic factor is a key factor in stress adaptation and avoidance of a social stress behavioral response.Recent studies have shown that brain-derived neurotrophic factor expression in stressed mice is brain region–specific,particularly involving the corticolimbic system,including the ventral tegmental area,nucleus accumbens,prefrontal cortex,amygdala,and hippocampus.Determining how brain-derived neurotrophic factor participates in stress processing in different brain regions will deepen our understanding of social stress psychopathology.In this review,we discuss the expression and regulation of brain-derived neurotrophic factor in stress-sensitive brain regions closely related to the pathophysiology of depression.We focused on associated molecular pathways and neural circuits,with special attention to the brain-derived neurotrophic factor–tropomyosin receptor kinase B signaling pathway and the ventral tegmental area–nucleus accumbens dopamine circuit.We determined that stress-induced alterations in brain-derived neurotrophic factor levels are likely related to the nature,severity,and duration of stress,especially in the above-mentioned brain regions of the corticolimbic system.Therefore,BDNF might be a biological indicator regulating stress-related processes in various brain regions.
基金funded by Outstanding Youth Team Project of Central Universities(QNTD202308).
文摘Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in detecting suicidal ideation on social media,accurately identifying individuals who express suicidal thoughts less openly or infrequently poses a significant challenge.To tackle this,we have developed a dataset focused on Chinese suicide narratives from Weibo’s Tree Hole feature and introduced an ensemble model named Text Convolutional Neural Network based on Social Network relationships(TCNN-SN).This model enhances predictive performance by leveraging social network relationship features and applying correction factors within a weighted linear fusion framework.It is specifically designed to identify key individuals who can help uncover hidden suicidal users and clusters.Our model,assessed using the bespoke dataset and benchmarked against alternative classification approaches,demonstrates superior accuracy,F1-score and AUC metrics,achieving 88.57%,88.75%and 94.25%,respectively,outperforming traditional TextCNN models by 12.18%,10.84%and 10.85%.We assert that our methodology offers a significant advancement in the predictive identification of individuals at risk,thereby contributing to the prevention and reduction of suicide incidences.
基金This work was supported in part by the National Natural Science Foundation of China under Grants 62273272,62303375 and 61873277in part by the Key Research and Development Program of Shaanxi Province under Grant 2023-YBGY-243+2 种基金in part by the Natural Science Foundation of Shaanxi Province under Grants 2022JQ-606 and 2020-JQ758in part by the Research Plan of Department of Education of Shaanxi Province under Grant 21JK0752in part by the Youth Innovation Team of Shaanxi Universities.
文摘Social robot accounts controlled by artificial intelligence or humans are active in social networks,bringing negative impacts to network security and social life.Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships,which makes it difficult to accurately describe the difference between the topological relations of nodes,resulting in low detection accuracy of social robots.This paper proposes a social robot detection method with the use of an improved neural network.First,social relationship subgraphs are constructed by leveraging the user’s social network to disentangle intricate social relationships effectively.Then,a linear modulated graph attention residual network model is devised to extract the node and network topology features of the social relation subgraph,thereby generating comprehensive social relation subgraph features,and the feature-wise linear modulation module of the model can better learn the differences between the nodes.Next,user text content and behavioral gene sequences are extracted to construct social behavioral features combined with the social relationship subgraph features.Finally,social robots can be more accurately identified by combining user behavioral and relationship features.By carrying out experimental studies based on the publicly available datasets TwiBot-20 and Cresci-15,the suggested method’s detection accuracies can achieve 86.73%and 97.86%,respectively.Compared with the existing mainstream approaches,the accuracy of the proposed method is 2.2%and 1.35%higher on the two datasets.The results show that the method proposed in this paper can effectively detect social robots and maintain a healthy ecological environment of social networks.
基金This work was supported by the National Natural Science Foundation of China(Grant No.12072340)the China Postdoctoral Science Foundation(Grant No.2022M720727)the Jiangsu Funding Program for Excellent Postdoctoral Talent(Grant No.2022ZB130).
文摘We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy.
基金supported by the National Natural Science Foundation of China Project(No.62302540)The Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness(No.HNTS2022020)+2 种基金Natural Science Foundation of Henan Province Project(No.232300420422)The Natural Science Foundation of Zhongyuan University of Technology(No.K2023QN018)Key Research and Promotion Project of Henan Province in 2021(No.212102310480).
文摘A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model.
基金supported by the National Natural Science Foundation of China(No.62302540),with author Fangfang Shan for more information,please visit their website at https://www.nsfc.gov.cn/(accessed on 05 June 2024)Additionally,it is also funded by the Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness(No.HNTS2022020),where Fangfang Shan is an author.Further details can be found at http://xt.hnkjt.gov.cn/data/pingtai/(accessed on 05 June 2024)the Natural Science Foundation of Henan Province Youth Science Fund Project(No.232300420422),and for more information,you can visit https://kjt.henan.gov.cn(accessed on 05 June 2024).
文摘With the emergence and development of social networks,people can stay in touch with friends,family,and colleagues more quickly and conveniently,regardless of their location.This ubiquitous digital internet environment has also led to large-scale disclosure of personal privacy.Due to the complexity and subtlety of sensitive information,traditional sensitive information identification technologies cannot thoroughly address the characteristics of each piece of data,thus weakening the deep connections between text and images.In this context,this paper adopts the CLIP model as a modality discriminator.By using comparative learning between sensitive image descriptions and images,the similarity between the images and the sensitive descriptions is obtained to determine whether the images contain sensitive information.This provides the basis for identifying sensitive information using different modalities.Specifically,if the original data does not contain sensitive information,only single-modality text-sensitive information identification is performed;if the original data contains sensitive information,multimodality sensitive information identification is conducted.This approach allows for differentiated processing of each piece of data,thereby achieving more accurate sensitive information identification.The aforementioned modality discriminator can address the limitations of existing sensitive information identification technologies,making the identification of sensitive information from the original data more appropriate and precise.
基金supported by the National Key Research and Development Plan Project(grant number:2022YFC3600904)The funding organization had no role in the survey’s design,implementation,and analysis.
文摘Objective:Network analysis was used to explore the complex inter-relationships between social participation activities and depressive symptoms among the Chinese older population,and the differences in network structures among different genders,age groups,and urban-rural residency would be compared.Methods:Based on the 2018 wave of the Chinese Longitudinal Healthy Longevity Survey(CLHLS),12,043 people aged 65 to 105 were included.The 10-item Center for Epidemiologic Studies Depression(CESD)Scale was used to assess depressive symptoms and 10 types of social participation activities were collected,including housework,tai-chi,square dancing,visiting and interacting with friends,garden work,reading newspapers or books,raising domestic animals,playing cards or mahjong,watching TV or listening to radio,and organized social activities.R 4.2.1 software was used to estimate the network model and calculate strength and bridge strength.Results:21.60%(2,601/12,043)of the participants had depressive symptoms.The total social participation score was negatively associated with depressive symptoms after adjusting for sociodemographic factors.The network of social participation and depressive symptoms showed that“D9(Inability to get going)”and“S9(Watching TV and/or listening to the radio)”had the highest strength within depressive symptoms and social participation communities,respectively,and“S1(Housework)”,“S9(Watching TV and/or listening to the radio)”,and“D5(Hopelessness)”were the most prominent bridging nodes between the two communities.Most edges linking the two communities were negative.“S5(Graden work)-D5(Hopelessness)”and“S6(Reading newspapers/books)-D4(Everything was an effort)”were the top 2 strongest negative edges.Older females had significantly denser network structures than older males.Compared to older people aged 65e80,the age group 81e105 showed higher network global strength.Conclusions:This study provides novel insights into the complex relationships between social participation and depressive symptoms.Except for doing housework,other social participation activities were found to be protective for depression levels.Different nursing strategies should be taken to prevent and alleviate depressive symptoms for different genders and older people of different ages.
文摘Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hatespeech, but they still suffer from ambiguity when differentiating between hateful and offensive content and theyalso lack accuracy. The work suggested in this paper uses a combination of the Whale Optimization Algorithm(WOA) and Particle Swarm Optimization (PSO) to adjust the weights of two Multi-Layer Perceptron (MLPs)for neutrosophic sets classification. During the training process of the MLP, the WOA is employed to exploreand determine the optimal set of weights. The PSO algorithm adjusts the weights to optimize the performanceof the MLP as fine-tuning. Additionally, in this approach, two separate MLP models are employed. One MLPis dedicated to predicting degrees of truth membership, while the other MLP focuses on predicting degrees offalse membership. The difference between these memberships quantifies uncertainty, indicating the degree ofindeterminacy in predictions. The experimental results indicate the superior performance of our model comparedto previous work when evaluated on the Davidson dataset.
基金supported by the National Social Science Fund of China (Grant No.23BGL270)。
文摘The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is spreading positive information to counterbalance the diffusion of rumor.The spreading mechanism of rumors and effective suppression strategies are significant and challenging research issues.Firstly,in order to simulate the dissemination of multiple types of information,we propose a competitive linear threshold model with state transition(CLTST)to describe the spreading process of rumor and anti-rumor in the same network.Subsequently,we put forward a community-based rumor blocking(CRB)algorithm based on influence maximization theory in social networks.Its crucial step is to identify a set of influential seeds that propagate anti-rumor information to other nodes,which includes community detection,selection of candidate anti-rumor seeds and generation of anti-rumor seed set.Under the CLTST model,the CRB algorithm has been compared with six state-of-the-art algorithms on nine online social networks to verify the performance.Experimental results show that the proposed model can better reflect the process of rumor propagation,and review the propagation mechanism of rumor and anti-rumor in online social networks.Moreover,the proposed CRB algorithm has better performance in weakening the rumor dissemination ability,which can select anti-rumor seeds in networks more accurately and achieve better performance in influence spread,sensitivity analysis,seeds distribution and running time.
文摘Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital world. These networks can be viewed as a collection of nodes and edges, where users and their interactions are represented as nodes and the connections between them as edges. Understanding the factors that contribute to the formation of these edges is important for studying network structure and processes. This knowledge can be applied to various areas such as identifying communities, recommending friends, and targeting online advertisements. Several factors, including node popularity and friends-of-friends relationships, influence edge formation and network growth. This research focuses on the temporal activity of nodes and its impact on edge formation. Specifically, the study examines how the minimum age of friends-of-friends edges and the average age of all edges connected to potential target nodes influence the formation of network edges. Discrete choice analysis is used to analyse the combined effect of these temporal factors and other well-known attributes like node degree (i.e., the number of connections a node has) and network distance between nodes. The findings reveal that temporal properties have a similar impact as network proximity in predicting the creation of links. By incorporating temporal features into the models, the accuracy of link prediction can be further improved.
文摘For the longest time,peacemaking and peacekeeping were the only post-factum interventions to resolve armed conflicts usually related to a nation-state’s borders or territory.Peacebuilding has its origins in sociology(Galtung,1969;1975)and is used today as a preferred concept in matters of conflict.However,this paper explores why peacebuilding,as the Secretary General of the United Nations advocates in A New Agenda for Peace,must become a nonlinear and contextual process that promotes the prevention of conflict and invites a transformative approach to addressing the linkages between peace,security,and climate.Furthermore,this paper advocates that peacebuilding grounded in social psychology and social anthropology will bring about transformative outcomes as it will build relationships at the community level and become a preventive tool to address incipient tensions within the community.Peacebuilding as social work will benefit the community and lay the necessary foundations for a sustainable future.Social workers are equipped to assess,analyze,and solve problems.Their capacity to do ongoing social diagnosis is a critical tool to prevent skirmishes degenerating into conflicts.Social work could be the much-needed resource to further develop theory and practice that contributes to active peacebuilding.
文摘Location prediction in social media,a growing research field,employs machine learning to identify users' locations from their online activities.This technology,useful in targeted advertising and urban planning,relies on natural language processing to analyze social media content and understand the temporal dynamics and structures of social networks.A key application is predicting a Twitter user's location from their tweets,which can be challenging due to the short and unstructured nature of tweet text.To address this challenge,the research introduces a novel machine learning model called the location-aware attention LSTM(LAA-LSTM).This hybrid model combines a Long Short-Term Memory(LSTM) network with an attention mechanism.The LSTM is trained on a dataset of tweets,and the attention network focuses on extracting features related to latitude and longitude,which are crucial for pinpointing the location of a user's tweet.The result analysis shows approx.10% improvement in accuracy over other existing machine learning approaches.
基金Project supported by the Zhejiang Provincial Natural Science Foundation (Grant No.LQ20F020011)the Gansu Provincial Foundation for Distinguished Young Scholars (Grant No.23JRRA766)+1 种基金the National Natural Science Foundation of China (Grant No.62162040)the National Key Research and Development Program of China (Grant No.2020YFB1713600)。
文摘The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy can obtain good accuracy, they come at the cost of enormous computational time, and are therefore not applicable to practical scenarios in large-scale networks. In addition, the centrality heuristic algorithms that are based on network topology can be completed in relatively less time. However, they tend to fail to achieve satisfactory results because of drawbacks such as overlapped influence spread. In this work, we propose a discrete two-stage metaheuristic optimization combining quantum-behaved particle swarm optimization with Lévy flight to identify a set of the most influential spreaders. According to the framework,first, the particles in the population are tasked to conduct an exploration in the global solution space to eventually converge to an acceptable solution through the crossover and replacement operations. Second, the Lévy flight mechanism is used to perform a wandering walk on the optimal candidate solution in the population to exploit the potentially unidentified influential nodes in the network. Experiments on six real-world social networks show that the proposed algorithm achieves more satisfactory results when compared to other well-known algorithms.
基金The work was supported by Humanities and Social Sciences Fund of the Ministry of Education(No.22YJA630119)the National Natural Science Foundation of China(No.71971051)Natural Science Foundation of Hebei Province(No.G2021501004).
文摘With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that considers the trust relationship among decisionmakers(DMs).In the process of consensusmeasurement:the social network is constructed according to the social relationship among DMs,and the Louvain method is introduced to classify social networks to form subgroups.In this study,the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights.In the process of consensus improvement:A feedback mechanism with four identification and two direction rules is designed to guide the consensus of the improvement process.Based on the trust relationship among DMs,the preferences are modified,and the corresponding social network is updated to accelerate the consensus.Compared with the previous research,the proposedmodel not only allows the subgroups to be reconstructed and updated during the adjustment process,but also improves the accuracy of the adjustment by the feedbackmechanism.Finally,an example analysis is conducted to verify the effectiveness and flexibility of the proposed method.Moreover,compared with previous studies,the superiority of the proposed method in solving the LGDM problem is highlighted.
基金supported in part by the Slovenian Research Agency(VB,research program P1-0294)(VB,research project J5-2557)+2 种基金(VB,research project J5-4596)COST EU(VB,COST action CA21163(HiTEc)is prepared within the framework of the HSE University Basic Research Program.
文摘Purpose:We analyzed the structure of a community of authors working in the field of social network analysis(SNA)based on citation indicators:direct citation and bibliographic coupling metrics.We observed patterns at the micro,meso,and macro levels of analysis.Design/methodology/approach:We used bibliometric network analysis,including the“temporal quantities”approach proposed to study temporal networks.Using a two-mode network linking publications with authors and a one-mode network of citations between the works,we constructed and analyzed the networks of citation and bibliographic coupling among authors.We used an iterated saturation data collection approach.Findings:At the macro-level,we observed the global structural features of citations between authors,showing that 80%of authors have not more than 15 citations from other works.At the meso-level,we extracted the groups of authors citing each other and similar to each other according to their citation patterns.We have seen a division of authors in SNA into groups of social scientists and physicists,as well as into other groups of authors from different disciplines.We found some examples of brokerage between different groups that maintained the common identity of the field.At the micro-level,we extracted authors with extremely high values of received citations,who can be considered as the most prominent authors in the field.We examined the temporal properties of the most popular authors.Research limitations:The main challenge in this approach is the resolution of the author’s name(synonyms and homonyms).We faced the author disambiguation,or“multiple personalities”(Harzing,2015)problem.To remain consistent and comparable with our previously published articles,we used the same SNA data collected up to 2018.The analysis and conclusions on the activity,productivity,and visibility of the authors are relative only to the field of SNA.Practical implications:The proposed approach can be utilized for similar objectives and identifying key structures and characteristics in other disciplines.This may potentially inspire the application of network approaches in other research areas,creating more authors collaborating in the field of SNA.Originality/value:We identified and applied an innovative approach and methods to study the structure of scientific communities,which allowed us to get the findings going beyond those obtained with other methods.We used a new approach to temporal network analysis,which is an important addition to the analysis as it provides detailed information on different measures for the authors and pairs of authors over time.
基金supported by the National Natural Science Foundation of China(Nos.62006001,62372001)the Natural Science Foundation of Chongqing City(Grant No.CSTC2021JCYJ-MSXMX0002).
文摘Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components.
文摘This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace.
基金funded by the National Science Foundation of China [Grant No.42071200]Second Tibetan Plateau Scientific Expedition and Research Program [Grant No.2019QZKK0902]the Western China Youth Scholars Project under the Western Light Talent Training and Recruitment Program of the Chinese Academy of Sciences.
文摘Social Network Theory and methods have emerged as pivotal tools for dissecting intricate interdisciplinary issues in rural communities.This study aims to systematically delineate the application characteristics and trends of Social Network Analysis(SNA)in rural community research.Using a twofold approach,we integrate a traditional literature review and CiteSpace bibliometric analysis to assess the application status and evolutionary trends of SNA methods in this context.The key findings include the following:①Chinese research trends:scholars predominantly concentrate on the“three rural”issues(related to agriculture,rural areas,and small-scale farmers)and social support mechanisms for vulnerable rural populations.With policy shifts,rural revitalization,tourism,governance,social trust,and multi-dimensional poverty are poised to emerge as hot topics for the future.For further refinement,we suggest that the application of SNA in rural community research could benefit from content expansion,long-term studies,and innovative modelling techniques.②Research by international scholars has been primarily directed toward the physical and mental health of rural residents,as well as socioeconomic issues.Despite these studies covering a range of typical cases across various nations,a conspicuous lack of thorough,systematic,and prolonged efforts focused on rural community development in specific regions remains.Additionally,health issues affecting rural residents are expected to sustain long-standing and focused international academic attention.This study contributes to a more nuanced understanding of the current applications and potential future directions of SNA in rural community studies,both in China and internationally.
文摘Music education under the frame name of arts education has been integrated into the primary and secondary education curriculums in Hong Kong for more than 20 years,starting from 2001,the year of launching the Learning to Learn curriculum for the reconstruction of the education system for the younger generation.Music education,embedded into the arts education,was therefore regarded as one of the key subjects to cultivate and uplift student holistic development,focusing on aesthetic skill training and moral growth development.This research was an exploration study of music teaching practices from two private international and two general public school music teachers at the primary school level.The value of this study rested on borrowing the idea of Shulman’s pedagogical content knowledge(PCK)principle to create a social constructivist music teaching framework from five commonly-used instructional methods,namely,Orff,Kodaly,Dalcrozes,Suzuki,and Gordon’s approaches.Based on the evaluations of these four case studies,hypotheses on the differences in the PCK were tested with the types of schools and found to be no difference.The preliminary results suggested that music teachers in private international schools had similar pedagogical approaches to music instruction to teachers in aided-public schools.Additionally,the modeling,guiding,and training approach was identified as a grounded teaching method for music education at the primary school level regardless of different types of schools.Other implications like the further development of the framework were discussed.
基金the Humanities and Social Sciences Planning Fund Project of the Ministry of Education:“Re-search on the Transfer and Institutional Coordination Mechanism of Social Insurance Relations for Retired Military Personnel”(Project Approval Number 18YJAZH122)the Shandong Workers’Movement Insti-tute’s project“Case Study on Protection of Rights and Interests of Workers in New Business Forms Based on Grounded Theory”(Project Approval Number SDGY2023-12).
文摘Abstract:With the rise of new business forms,the traditional industrial-era model of binding social insurance to labor relations is facing unprecedented challenges.In the context of these new busi-ness forms,whether the protection of workers’social insurance rights and interests can be“decoupled from labor relations”has become a hotly debated topic in academia,with“the ability to establish labor relations”emerging as a key variable influencing government depart-ments’policy choices on classified social insurance coverage.Based on this,the paper constructs a theoretical model of the correlation be-tween social insurance and labor relations to analyze cases concern-ing the protection of social insurance rights and interests of workers in new business forms.It examines the advantages and disadvantages of binding social insurance to labor relations and suggests promoting so-cial insurance policy innovation by transcending labor relations.The paper advocates abandoning the path dependency that starts with la-bor relations and clarifying the theoretical basis that workers’access to social insurance rights should be based on labor rather than em-ployment.To adapt to the profit model of new business forms,it pro-poses establishing a rule of“proportional responsibility for commis-sions,”where the social insurance contribution base is determined by the proportion and amount of corporate commissions.By reasonably setting rates,it will protect the healthy development of new business forms in a balanced manner.In this way,enterprises can share social insurance responsibilities according to unified rules without worrying about being classified as having a labor relationship,which helps fully protect workers’social insurance rights and interests and promotes fair competition and healthy development among enterprises.