Top Read Articles

    Published in last 1 year |  In last 2 years |  In last 3 years |  All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Research on early warning for prefabricated building workers' unsafe behaviors of working at height based on RF-SFLA-SVM
    WANG Junwu, HE Juanjuan, SONG Yinghui, LIU Yipeng, CHEN Zhao, GUO Jingyi
    China Safety Science Journal    2024, 34 (3): 1-8.   DOI: 10.16265/j.cnki.issn1003-3033.2024.03.1288
    Abstract352)   HTML0)    PDF(pc) (2281KB)(9)       Save

    In order to effectively provide early warning of the occurrence trend or state of prefabricated building workers' unsafe behaviors (PBWUBs) of working at height, and to enhance the control of PBWUBs, RF-SFLA-SVM model was proposed to conduct an early warning study on workers' unsafe behaviors. Firstly, the SHEL (Software-Hardware-Environment-Liveware) model was used to analyze the factors influencing the unsafe behaviors of prefabricated building workers in danger of working at height. RF was used to determine the key warning indicators. Then SFLA was used to find the best parameters for SVM. Finally, the RF-SFLA-SVM model was used to predict and warn about the unsafe behavioral state of the prefabricated building workers working at height, and its performance was compared with other warning models. The results show that the RF-SFLA-SVM-based warning accuracy of PBWUBs of working at height was the highest, 91.67%, which was a maximum improvement of 14% compared with the warning performance of other models. The research results can give a reference for the control and prevention of PBWUBs working at height.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Interval non-probabilistic reliability analysis of support structures for deep tunnel
    LI Xiang, WEI Heng, WANG Jingtong
    China Safety Science Journal    2023, 33 (12): 67-76.   DOI: 10.16265/j.cnki.issn1003-3033.2023.12.0546
    Abstract342)   HTML0)    PDF(pc) (5248KB)(84)       Save

    Aiming at the current situation of a lack of uncertain data, an interval non-probabilistic tool was introduced to perform a preliminary investigation in the domain of reliability analysis for the support structures of the deep tunnel. Firstly, the mechanism of the shearing slip displacement in the weak rock surrounding the deep tunnel was taken as an illustrative example, and a method was developed to calculate the total support resistance by using the combined support modes. Subsequently, based on the framework of the interval non-probabilistic theory, and meanwhile considering the influence caused by the interval extension problem, the applicability of the interval non-probabilistic tool was discussed for reliability study on the support structures of the deep tunnel. Eventually, a fluctuation range was defined to characterize the variations of the interval used for those uncertain parameters, and on this basis the difference for the level of those effects of fluctuations regarding a single-parameter and multiple-parameters coupling on the reliability of the support structures was revealed via the sensitivity analyses. The results manifest that the greater the fluctuation range of the interval for the uncertain parameters, the smaller the value of the non-probabilistic reliability index will be. Moreover, the larger the number of uncertain parameters involved in the fluctuation coupling, the higher the decrease in the value of the non-probabilistic reliability index will be. Hence, this situation makes the unfavorable effects on the reliability of the support structures more significant.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Research on disciplinary theory of saferesourcesology
    WU Chao, WANG Bing
    China Safety Science Journal    2024, 34 (1): 1-9.   DOI: 10.16265/j.cnki.issn1003-3033.2024.01.0475
    Abstract248)   HTML2)    PDF(pc) (1517KB)(43)       Save

    In order to better develop and sustainably utilize saferesources (which is newly created composite word that means the resources on safety & security in this paper), the disciplinary theory and its embryonic form of saferesourcesology (which is newly created composite word that means the science of resources of safety & security in this paper) were investigated, based on the new prospect that safety & security was a type of extremely popular and important resource. The whole study stood at the height of the science of science and viewed from the perspective of interdisciplinary science, and adopted the research methods of survey research, innovative thinking, theoretical analysis, logical induction and prediction method. Then, the definition and connotation of saferesources and saferesourcesology, the nature and classification of saferesources, the research objects and contents of saferesourcesology, the basic principles and research methods of saferesourcesology, the research directions and prospects of saferesourcesology, etc, were systematically investigated. The results show that saferesources have both the main characteristics of safety & security and resources. The characteristics of saferesources can be divided into two categories: social characteristics and their own characteristics. Eight aspects of main research contents of saferesourcesology are given from different perspectives and levels. Ten basic principles of saferesourcesology are condensed from the fundamental level of the discipline. Typical research methods of saferesourcesology are summarized based on the interdisciplinary nature. The above research results have formed the core foundational theory and disciplinary framework of saferesourcesology, which has references and guides for the follow-up research of the specific contents of saferesourcesology and the acceleration of the formation of an independent new discipline of saferesourcesology.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    A review of flight control system fault research based on QAR data
    WANG Yantao, GAO Yi, SHI Tongyu
    China Safety Science Journal    2024, 34 (4): 1-9.   DOI: 10.16265/j.cnki.issn1003-3033.2024.04.1254
    Abstract234)   HTML0)    PDF(pc) (1834KB)(0)       Save

    To systematically review the research progress and current status of fault analysis in civil aircraft flight control systems, both domestically and internationally, this review study was carried out. The study focused on identifying typical fault types of flight control systems through analysing QAR data. Firstly, the process of QAR data preprocessing and feature extraction was summarized. Secondly, based on the performance metrics achievable by fault analysis, four stages of fault research were proposed, including fault monitoring, fault identification, fault diagnosis, and fault prediction. Finally, by combining the progress and depth of domestic and international research, typical fault types of flight control systems were identified, including rudder hydraulic leakage, inconsistent elevator indications, and flap actuation delays. Commonly used QAR data items for modeling include aircraft primary control surface positions, flight attitudes, aircraft performance, left and right flap angles, and flap positions. Calculation methods encompass physical models, multivariate statistics, logical reasoning, and machine learning. The results show that through a systematic analysis of the latest research progress in subsystems such as rudder, elevator, and flaps, it is found that certain achievements have been made in fault types, parameter selection, and the improvement of calculation methods. However, the fault research stage is primarily focused on fault diagnosis or non-real-time prediction. Further emphasis is required on addressing safety assurance and practical maintenance needs to achieve real-time fault prediction technology.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Study on multidimensional quantification of individual workload of controllers
    WANG Lili, GU Qiuli
    China Safety Science Journal    2024, 34 (6): 1-9.   DOI: 10.16265/j.cnki.issn1003-3033.2024.06.1562
    Abstract233)   HTML0)    PDF(pc) (2017KB)(0)       Save

    In order to enhance the efficacious operation of the air traffic control system, a quantitative model was established by focusing on the individual load of controllers. Tests were designed to collect pre-service and post-service data on various indicators from 16 area controllers in the front line. Sensitive variables were selected to describe individual loads based on changes in test data. A comprehensive assessment index system was established that included three dimensions: psychological perception load, physiological reaction load, and mental workload. The controller individual load index model was developed. The optimal weights of the individual load index were determined by the the entropy-critic combination weighting method. The quantitative model of the controller's individual workload was finally derived. Further K-Means clustering analysis was performed based on the controller's individual load composite index. There were evident discrepancies in the workload changes of the controllers due to different individual postures. The results indicate that the post-post individual workload changes of the controllers could be classified into three distinct groups. The first group, comprising 50% of the total number of controllers, exhibited the smallest post-post individual workload growth. The second group, accounting for 43.75% of the total number of controllers, exhibited a moderate post-post individual workload growth. The third group, comprising 6.25% of the total number of controllers, exhibited the largest post-post individual workload increase. These findings align with the instructor's ratings of controller competence.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Research on fire image recognition based on scientific knowledge graph
    LI Hai, SUN Peng
    China Safety Science Journal    2023, 33 (10): 147-159.   DOI: 10.16265/j.cnki.issn1003-3033.2023.10.2088
    Abstract211)   HTML3)    PDF(pc) (18837KB)(49)       Save

    In order to comprehensively analyze the development trend and research trends of image-based fire identification technology, and more accurately provide research direction for scientific research in the field of fire detection, the Web of Science existing literature data and scientific knowledge mapping software, Python-maplotlib library, etc., were used to quantitatively analyze the characteristics of international fire image research, such as the time of publication, the author, the organisation, and the highly cited articles. This paper started with an analysis of current research hotspots and frontier trends. The results show that the number of international fire image recognition research achievements shows a wavy upward trend. The research on fire image and its related fields in Europe and America is relatively deep, while that in China is relatively late. J Comp Neurol, Remote Sens Environment, Fire Safety J, J Geophys Res Atmos are representative journals that form a cooperative network of co-cited journals. The research focuses mainly on the deep learning model of fire image recognition, forest fire image and fire impact, and fire remote sensing image recognition algorithm. The research frontiers are mainly shown in four aspects: fire smoke detection based on deep learning, forest vegetation coverage and loss of burned areas, fire detection of coal mines, industrial heat sources, electric vehicles, and flame retardancy.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Risk zoo (III): cognitive mechanisms and paths of risk metaphors based on animal imagery
    TONG Ruipeng, HU Xiangyang, YUAN Jiacong, WANG Denghui
    China Safety Science Journal    2023, 33 (12): 1-7.   DOI: 10.16265/j.cnki.issn1003-3033.2023.12.1309
    Abstract205)   HTML2)    PDF(pc) (1808KB)(26)       Save

    In order to explore the cognitive construction mechanism and role path of animal imagery in risk metaphors and to excavate the correlation property between animal imagery and risk types, the connotation of risk attributes in animal imagery was analyzed under the perspective of cognitive science. The cognitive mechanism of animal imagery was analyzed in terms of cognitive construction, cognitive process and cognitive thinking. The effectiveness of risk metaphors was explored in terms of their effects and transmission paths. The results show that risk metaphors use animal imagery to characterize the existence of different types of risks, and convey the conceptual structure of risk events through the structural transformation from animal spatial images to animal schematic imagery. As an important medium for risk knowledge dissemination, the process of risk metaphor dissemination is the result of the interaction between cultural field, knowledge field and practice field. Individuals understand and accept risk metaphor information according to the "skill-rule-knowledge" structure, and their behaviors and attitudes are changed towards the expected goal, so as to achieve the expected effect of risk metaphor and expand the means of risk perception and risk communication.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Causal analysis of construction safety accidents in hydropower projects based on unsupervised LDA
    CHEN Shu, SUN Mengwen, CHEN Yun, NIE Benwu, LI Zhi, LIU Wenzhuo
    China Safety Science Journal    2023, 33 (10): 79-85.   DOI: 10.16265/j.cnki.issn1003-3033.2023.10.1924
    Abstract203)   HTML1)    PDF(pc) (6276KB)(24)       Save

    To achieve the intelligent mining of causative factors in hydropower construction safety accident reports, 1 206 accident analysis reports were processed by using Jieba segmentation. Also, the TF-IDF (Term Frequency-Inverse Document Frequency) keyword processing algorithm for accident analysis text was proposed, which was used to determine word frequency weight and construct word vector of accident text. Furthermore, based on the TF-IDF features, the unsupervised LDA topic model was trained to extract accident topics and topic words. Finally, social network analysis was performed on the topic words to reveal the potential relationships among accidents elements and intelligently output the causes of hydropower engineering construction safety accidents. The results show that the LDA theme model can quickly dig out multiple accident data information effectively, and calculate five accident themes such as safety awareness, accident hazards and violation behaviors. Besides, the results of automatic cause analysis indicate that the most important causes of construction safety accidents in hydropower projects are violation of rules and regulations, failure to master safe operation techniques, material and equipment problems, violation of construction procedures and poor working environment. The behavior supervision of construction personnel should be strengthened, to improve the prevention ability of the main causes of accidents, which can effectively improve the safety control level of hydropower project construction.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Overview of recognition methods of pedestrian abnormal behaviors in public places
    ZHAO Rongyong, WEI Bingyu, ZHU Wenjie, ZHENG Chengyuan, LI Haonan
    China Safety Science Journal    2024, 34 (2): 83-93.   DOI: 10.16265/j.cnki.issn1003-3033.2024.02.1125
    Abstract197)   HTML2)    PDF(pc) (6468KB)(27)       Save

    The purpose of this research is to clarify the research progress of the theory and technology of pedestrian abnormal behavior recognition in public places. Firstly, with the help of China National Knowledge Infrastructure (CNKI) and the Web of Science (WOS), a broad definition and universal characteristics of abnormal pedestrian behavior in public places were given. The existing research results related to abnormal behaviors were divided into three categories: harmful behaviors, dissociable behaviors and violations. Then, from the perspective of data and technological foundations, the existing abnormal behavior recognition methods were divided into four categories: artificial design, human skeleton, Red Geen Blue(RGB) images and wearable sensors. Secondly, this study sorted out the abnormal behavior datasets of mainstream populations both domestically and internationally, and analyzed the performance of relevant algorithms on the datasets. Finally, the limitations of existing research methods in available datasets and data fusion detection were summarized, and future research directions and optimization suggestions were provided. The results indicate that these four types of abnormal behavior recognition methods have their own advantages and disadvantages. It is necessary to construct a diversified, well-defined and high-quality international benchmark dataset of abnormal behaviors among the crowd. Future research should focus on robust and accurate methods, models, and algorithms for identifying abnormal behaviors, explore multi-dimensional data fusion complementary detection methods, improve the application scenario consistency and adaptability of the theoretical results of abnormal behavior recognition, and eventually enhance the level of public place crowd safety governance.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Research on talent development systems for emergency technology and management majors to meet national needs
    WANG Li, CHEN Wentao, GUAN Wenling, SUN Aijun
    China Safety Science Journal    2024, 34 (5): 9-16.   DOI: 10.16265/j.cnki.issn1003-3033.2024.05.0128
    Abstract195)   HTML0)    PDF(pc) (3824KB)(0)       Save

    To promote the construction of emergency technology and management majors and strengthen the university talent cultivation of emergency rescue, the majors' characteristics were determined based on the national needs in emergency. Then, a talent development mode for emergency technology and management majors was proposed from aspects of professional ethics, theoretical knowledge systems, and practical technical ability. Firstly, the majors' professional ethics were clarified based on the professional ethics requirements from Teaching Standards for Emergency Rescue Technology and National Vocational Skill Standards for Emergency Rescuers. Secondly, a core curriculum system covering the entire emergency lifecycle was proposed using the PPRR(Prevention, Preparation, Response, Recovery) model including prevention, preparation, response, and recovery. Next, a combination of learning and training, integration of government-industries-research organizations was proposed to advance the cultivation of emergency skills and the enhancement of practical innovation capabilities. Finally, a talent cultivation system was developed from the perspectives of textbooks, faculties, teaching process management, a talent assessment system, and a continuous improvement mechanism. The results indicated that the talent development system integrated with public service and social responsibility attributes, full-cycle work content, disasters, and multi-subjects practical applications. Moreover, the system developed a close connection between talent cultivation and practical work needs and guided for cultivating of high-level applied talents in the emergency field who had moral and professional qualifications and theory and practice capabilities.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Identification of critical factors in chemical accidents based on text mining and improved DEMATEL method
    WANG Liang, LAI Jiayan, ZHANG Zixin, WANG Yingming
    China Safety Science Journal    2024, 34 (3): 20-28.   DOI: 10.16265/j.cnki.issn1003-3033.2024.03.0230
    Abstract192)   HTML0)    PDF(pc) (3671KB)(6)       Save

    To draw lessons from historical chemical accidents and guide the practice of chemical safety production management, a method for identifying critical factors in chemical accidents based on text mining and improved DEMATEL method was proposed. Firstly, text mining technology was used to fully mine the text information of 1 627 chemical accident investigation reports, based on which 14 chemical accident influencing factors were extracted according to related literature, laws and regulations. Then, the fuzzy DEMATEL method based on alpha-level sets was used to calculate the performance levels of the factors affecting chemical accidents. Finally, the correlations between critical factors and other factors were analyzed and the mechanism of chemical accidents was revealed. The results show that 8 chemical accident influencing factors are identified as the critical factors, i.e., extreme weather, regulations, technical procedures, hidden danger investigation, risk control, education and training, supervision and management, and operation management. These 8 critical factors have direct impact on the influence factors such as facilities and equipment, material reactions, occupational quality, job responsibilities, emergency management, and safety investment, which eventually lead to chemical accidents.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Implementation path for cultivating public health emergency management talents under overall safety and emergency response
    WANG Sitong, LONG Xuecheng, LIU Wei
    China Safety Science Journal    2024, 34 (1): 10-16.   DOI: 10.16265/j.cnki.issn1003-3033.2024.01.1364
    Abstract191)   HTML5)    PDF(pc) (2385KB)(16)       Save

    To adapt to the needs of public health emergency management and the changing talent requirements in the context of overall safety and emergency response, it is necessary to make appropriate adjustments to the public health emergency management talent development system. Firstly, the deficiencies and demands in cultivating public health emergency management talents were analysed. On this basis, the core elements in this training were clarified, including goals, types, modes, and curriculum development. Finally, the implementation path for cultivating these talents within the overall safety and emergency response was proposed. The results indicate the importance of updating educational concepts, implementing practical, experimental, and case-based teaching, integrating interdisciplinary training, enhancing collaborative and comprehensive skills, establishing a scientific evaluation system, and refining practical assessment methods to effectively enhance the construction of the public health emergency management talent development system.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Research on connotation and governance path of metaverse safety & security
    WANG Bing, WANG Bing, LIAO Huimin
    China Safety Science Journal    2024, 34 (2): 2-7.   DOI: 10.16265/j.cnki.issn1003-3033.2024.02.0921
    Abstract190)   HTML3)    PDF(pc) (1785KB)(15)       Save

    In order to clarify the connotation and governance path of metaverse safety & security and further enrich the theory of metaverse safety & security, the concept of metaverse safety & security was put forward based on a large safety & security pattern, and the basic features of metaverse safety & security were analyzed. Moreover, the governance path of metaverse safety & security was proposed. The results show that metaverse safety & security refers to the state or ability of the metaverse to reshape spatial and temporal stability, social civilization advancement and human well-being enhancement from the influence of unfavorable factors, and it has eight basic characteristics, namely, relativity, complexity, vibration, extensiveness, immediacy, relevance, publicity, and multidimensionality. Metaverse safety & security governance should integrate the development and safety & security of the metaverse, adhere to the principle of joint consultation and sharing, build a "technology-rule-society" trinity of governance models, and strive to enhance the digital safety & security capacity of the metaverse.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Research on configurational causes of employee work safety violations: from a complexity theoretical perspective
    LIU Lin, WU Jinnan, MEI Qiang
    China Safety Science Journal    2024, 34 (3): 9-19.   DOI: 10.16265/j.cnki.issn1003-3033.2024.03.0451
    Abstract179)   HTML0)    PDF(pc) (1925KB)(6)       Save

    In order to reveal the complex causality between EWSV and their multiple antecedent conditions, and to improve the efficiency of safety governance, a comprehensive model integrating contemporary deterrence theory, protection motivation theory, and social learning theory was constructed from a perspective of complexity theory. Based on this, six antecedent conditions affecting EWSV were identified from three perspectives: leader, coworker, and employee. Then, the fsQCA was used to reveal what configuration of antecedent conditions would lead to high level of EWSV. The results show that a single antecedent condition is insufficient to explain high level of EWSV but safety-specific leader punishment omission and coworker work safety violations(CWSV) play universal roles in forming high level of EWSV. Three types of driving modes composed of five condition configurations can lead to high level of EWSV. Three types of condition configurations lead to non-high level of EWSV. Reducing CWSV and improving employees' perception for formal sanctions are crucial for achieving non-high level of EWSV. Different combinations of multiple antecedent conditions can lead to high level of EWSV, and there is a complex causality (concurrency, equivalence, and asymmetry) between high level of EWSV and their antecedent conditions.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Contagion mechanism of unsafe behavior information in groups of construction workers
    NI Guodong, YANG Li, AN Yaoyao, ZHENG Yuzhuo
    China Safety Science Journal    2024, 34 (1): 43-52.   DOI: 10.16265/j.cnki.issn1003-3033.2024.01.2491
    Abstract171)   HTML2)    PDF(pc) (1902KB)(41)       Save

    In order to explore the contagion mechanism and effect of unsafe behavior information in groups of construction workers, a theoretical model of the contagion mechanism of unsafe behavior information among construction workers was constructed based on social information processing theory, theory of planned behavior, and social contagion theory. In this model, information about workmates' unsafe behaviors was served as the independent variable, and behavioral cognitive factors (i.e. behavioral attitudes, subjective norms, and perceived behavioral control) and unsafe behavioral intentions were served as mediating variables. Through developing measurement scales and creating questionnaires to collect data, the theoretical model was empirically tested based on 271 valid samples using the analysis methods of confirmatory factor analysis and structural equation modeling. The results show that workmates' intentional unsafe behaviors and workmates' unsafe communication behaviors can induce new unsafe behaviors through six contagious pathways. Moreover, as a source of contagion, the contagion effect of workmates' intentional unsafe behaviors is greater than that of workmates' unsafe communication behaviors. Managers can effectively control the contagion effect of unsafe behavior information among construction workers by controlling contagion information sources and weakening infectious media.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Analysis on research topic and curriculum setting of safety engineering undergraduate theses
    ZHAO Jinlong, JIA Chenxi, CUI Huaying, PENG Xiandu
    China Safety Science Journal    2024, 34 (2): 8-14.   DOI: 10.16265/j.cnki.issn1003-3033.2024.02.2240
    Abstract170)   HTML3)    PDF(pc) (4295KB)(11)       Save

    In order to improve the construction of undergraduate curriculum settings in the field of safety engineering, a total of 68 outstanding undergraduate theses (designs) from 38 universities in 2021 were collected and organized in this study. CiteSpace software was used to perform cluster analysis on the keywords of the theses, and the current research topics of undergraduate theses (designs) were clarified. Subsequently, the industry background of safety engineering in the 38 universities was investigated, and the differences of curriculums between representative Chinese and foreign universities in safety-related disciplines were statistically analyzed. The results show that the high-frequency keywords in the 68 theses are mainly related to the following aspects: "numerical simulation", "disaster warning", "safety management system" and "resilience". Based on the investigation results of the industry background of universities, among the 68 theses(designs), the number of theses in the direction of public safety accounts for 45.6%, and the number of papers on mine safety accounts for 8.82%, but nearly 40% of the 38 universities take mine safety as a key service area, which showed that the research directions of safety disciplines theses has shifted from focus on industry safety to "general safety science". However, the characteristic curriculums still primarily focus on industry safety, with some repetition in the content of basic curriculums. Furthermore, there is a lack of numerical simulation curriculums. These factors make it difficult for the currently offered curriculums to support students in conducting their graduation projects. Additionally, compared with safety-related disciplines in foreign universities, it was found that the number of basic curriculums in safety engineering in China is relatively high, whereas the practical curriculums show the opposite condition.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Study on network security education of college students based on KAP theory
    LI Yuanyuan, YUAN Yulin, SUI Lirui
    China Safety Science Journal    2024, 34 (5): 1-8.   DOI: 10.16265/j.cnki.issn1003-3033.2024.05.1987
    Abstract169)   HTML0)    PDF(pc) (4311KB)(0)       Save

    In order to improve the situation of network security education and the quality of network security education in colleges and universities, a cognitive-attitude-behavior theoretical model of college students was constructed. Through the distribution and screening of questionnaires, 659 valid questionnaires were obtained. SEM was used to test the influence of network security education on network security cognition, network security attitude and network security behavior in the collected data. The results show that network security education can have a significant influence on network security cognition, network security attitude and network security behavior. During the influenced process, network security cognition and network security attitude play an independent and chain intermediary role. Legal and moral education, knowledge education, practical activities, and leading by example can directly affect network security behavior. Legal and moral education has the strongest influence, followed by knowledge education. Practical activities and leading by example are the weakest. In terms of specific paths of process, legal and moral education mainly affects network security behavior through direct effect, while knowledge education, practical activities and leading by example mainly affect network security behavior indirectly through security cognition.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Risk zoo (V): practice and reflection on theory of risk metaphors based on cultural identity
    TONG Ruipeng, HU Xiangyang, YIN Xuechen, YANG Angbin
    China Safety Science Journal    2024, 34 (4): 10-16.   DOI: 10.16265/j.cnki.issn1003-3033.2024.04.2055
    Abstract163)   HTML0)    PDF(pc) (1548KB)(0)       Save

    In order to strengthen the understanding of the contribution of the risk zoo to risk culture construction and explore its practical and applied value, the mechanism and path of cultural identity of the risk zoo were explored based on cultural identity theory. As an important carrier of risk culture construction, the cultural identity path of risk zoo also follows the framework of risk culture identity system. The cultural identity system of the risk zoo was presented from two aspects: individual and group. The results show that individual identity develops progressively along the path of value identity→emotional identity→behavioral identity, and group identity develops progressively along the path of risk concept→risk communication→risk participation. Cultural identity is the basis for the practical application of the risk zoo, and the practical application framework of the risk zoo should be carried out in accordance with the cultural identity system. It can actively guide individuals to build a healthy risk awareness and lead groups to create a good risk culture through the creation of a science popularization platform that combines online and offline, and places equal emphasis on professionalism and communication.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Research on influence of emotion on miners' safety behaviour competence
    ZHANG Qian, LI Jizu, SHEN Min
    China Safety Science Journal    2024, 34 (6): 39-47.   DOI: 10.16265/j.cnki.issn1003-3033.2024.06.1742
    Abstract159)   HTML0)    PDF(pc) (4611KB)(0)       Save

    In order to reduce the occurrence of safety accidents in coal mine production, from the perspective of emotion control, based on Valence-Arousal (V-A) emotional model, combined with emotional arousal methods and physiological measurement techniques, a cognitive experiment of miners' safety behavioral competence was conducted. Attention and decision-making time under different emotional states were measured. The regression analysis was used to investigate the continuous effects of degree-of-arousal on attention and risk preference under different emotional valence. The results show that in low degree-of-arousal and positive emotions, decreasing degree-of-arousal leads to weaker attention and more risk aversion in decision making in miners. In the high degree-of-arousal and positive emotions, with the increase of degree-of-arousal, the level of attention and risk aversion of miners in decision-making first increases and then decreases, until it is lower than neutral emotions. In low degree-of-arousal and negative emotions, decreasing degree-of-arousal would make miners pay less attention and have lower risk aversion in decision-making. In the high degree-of-arousal and negative emotions, an increase in degree-of-arousal increases and then decreases the attention and risk aversion in decision making, even until they are lower than the level of neutral emotions. By contrast, in the high degree-of-arousal range, increasing degree-of-arousal in positive emotion is more likely to reduce miners' safety behavioral competence to lower than the level of neutral emotional.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Evolutionary game of construction safety supervision involved by work safety service provider
    CHEN Shu, YIN Jia, SHAO Bo, CHEN Yun, WANG Yue
    China Safety Science Journal    2023, 33 (12): 8-15.   DOI: 10.16265/j.cnki.issn1003-3033.2023.12.2163
    Abstract156)   HTML1)    PDF(pc) (4648KB)(14)       Save

    This study aims to improve the current situation of high incidence of accidents in the process of construction work safety. The possible rent-seeking phenomenon of introducing the intermediary services for work safety was analyzed. By applying the method of game theory, a 3-party evolutionary game model was established among construction enterprises, work safety service providers and government regulators. The evolutionary characteristics of the 3-party behaviors were analyzed, and the stability of the equilibrium point in the game system was simulated. The results show that the high cost of implementing safety management makes the construction enterprises and work safety service providers choose behavior strategies that are not conducive to the safety management of construction projects. Reasonable control of the maintenance and rectification costs and the safety management inputs enables them to actively implement safety management strategies. In the process of supervision, the government should focus on work safety service providers, strengthening the regulation of the providers' behaviour, and guide the construction enterprises to act in accordance with the rules, which is conductive to achieving the goal of regulating the behaviour of both sides while saving costs and inputs. Simulating the public to actively participate in the supervision of construction safety and increasing the rent-seeking costs of enterprises and the speculative costs of providers can well guide the supervision of construction enterprises and work safety service providers to standardize their behaviour.

    Table and Figures | Reference | Related Articles | Metrics | Comments0