Browse Definitions:
Definition

social simulation

Contributor(s): Matthew Haughn

Social simulation is the application of computer-based methods and technologies to replicate human social behavior in various environments and scenarios.

Social simulations are used for various research purposes throughout the social sciences, including psychology, sociology, anthropology, economics, political science and history. In business, simulations are used for research in areas including human resources management (HRM), security, reputation management and social media marketing (SMM).

A simulation, in this context, is a computer program that represents a social process or scenario. In the most common implementation, researchers design the program to model a social situation or process and then observe the behavior of individuals in the simulation when the program runs. Commonly, simulations are used to yield predictive data about what might happen in a real-world situation. Social simulations are also used to develop and test theories and to understand the implications of human behavior.

Topics studied through social simulations have included:

  • Development of social conventions and norms.
  • Foundations of morality.
  • Effects of reputation in a competitive environment.
  • Dissemination of knowledge.
  • Development of socially desirable behaviors.

There are four main types of social simulations:

  • System-level simulations (SLS) - Explore a given situation as a whole and how individuals and groups respond to the presence of certain variables.
  • System-level modeling (SLM) - Creates a more complex and sophisticated environment and aims to be able to make predictions about the behavior of any individual entity or thing within the simulation.
  • Agent-based social simulation(ABSS) - Models societies on intelligent agents and studies their behavior within the simulated environment for the application to real-world situations.
  • Agent-based modeling (ABM) - Involves independent agents with individual-specific behaviors interacting in networks.

Computer simulations offer a middle ground between the descriptive approach, which simply documents observations about human behavior and social processes, and the experimental approach, which establishes a real-world representation of some situation for research purposes.

This was last updated in August 2017

Continue Reading About social simulation

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close