Infection in social networks: using network analysis to identify high-risk individuals.

نویسندگان

  • R M Christley
  • G L Pinchbeck
  • R G Bowers
  • D Clancy
  • N P French
  • R Bennett
  • J Turner
چکیده

Simulation studies using susceptible-infectious-recovered models were conducted to estimate individuals' risk of infection and time to infection in small-world and randomly mixing networks. Infection transmitted more rapidly but ultimately resulted in fewer infected individuals in the small-world, compared with the random, network. The ability of measures of network centrality to identify high-risk individuals was also assessed. "Centrality" describes an individual's position in a population; numerous parameters are available to assess this attribute. Here, the authors use the centrality measures degree (number of contacts), random-walk betweenness (a measure of the proportion of times an individual lies on the path between other individuals), shortest-path betweenness (the proportion of times an individual lies on the shortest path between other individuals), and farness (the sum of the number of steps between an individual and all other individuals). Each was associated with time to infection and risk of infection in the simulated outbreaks. In the networks examined, degree (which is the most readily measured) was at least as good as other network parameters in predicting risk of infection. Identification of more central individuals in populations may be used to inform surveillance and infection control strategies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practice of Epidemiology Infection in Social Networks: Using Network Analysis to Identify High-Risk Individuals

Simulation studies using susceptible-infectious-recovered models were conducted to estimate individuals’ risk of infection and time to infection in small-world and randomly mixing networks. Infection transmitted more rapidly but ultimately resulted in fewer infected individuals in the small-world, compared with the random, network. The ability of measures of network centrality to identify high-...

متن کامل

Network Location and Risk of Human Immunodeficiency Virus Transmission among ‎Injecting Drug Users: Results of Multiple Membership Multilevel Modeling of Social ‎Networks

Background: Despite the implementation of harm reduction program, some injecting drug users (IDU) continue to engage in high-risk behaviors. It seems that there are some social factors that contribute to risk of human immunodeficiency virus (HIV) transmission in IDUs. The aim of this study was to analysis the social network of IDUs and examines the effect of network location on HIV transmission...

متن کامل

Assessing the risk of crisis in gas distribution networks using the FAHP-PROMETHEE II method (Case study of Qazvin Province Gas Company)

Background and Aims: Natural gas is one of the most important energy sources used today in urban communities as cheap and hazardous energy. In this regard, if the government and organizations do not pay attention to the proper infrastructure for gas installations, it will create irreparable risks for that society. The assessment and management of crisis in the various processes can play a key r...

متن کامل

Virtual Social Networks Addiction and High-Risk Group among Health Science Students in Iran: A Latent Class Analysis

Background and purpose: Virtual social networks (VSNs) are among the most popular communication paths that have become an integral part of most people's lives, including students. This study aimed to investigate the prevalence of VSNs addiction and their related factors, and identify the patterns of addictive-related factors among the students in Kerman, Iran in 2019. Materials and Methods: Th...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • American journal of epidemiology

دوره 162 10  شماره 

صفحات  -

تاریخ انتشار 2005