Jan Treur

Jan Treur
Vrije Universiteit Amsterdam | VU · Department of Computer Science

About

1,458
Publications
223,794
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12,679
Citations
Additional affiliations
October 2023 - November 2025
The Hague University of Applied Sciences
Position
  • Senior Researcher
August 1978 - December 1985
Amsterdam University of Applied Sciences
Position
  • Lecturer
Description
  • Teaching Mathematics, Didactics of Mathematics and Computer Science, Psychology of Learning, and Educational Science.
January 1986 - January 1990
University of Amsterdam
Position
  • Professor (Assistant) of AI
Description
  • Research and Teaching in AI and its logical foundations.
Education
September 1973 - February 1976
Utrecht University
Field of study
  • Mathematics: Algebra and Mathematical Logic
September 1969 - September 1973
Utrecht University
Field of study
  • Mathematics and Mathematical Logic

Publications

Publications (1,458)
Book
Full-text available
Using self-modeling networks to model dynamics, adaptation, and control of internal mental models. For video presentations for many of the chapters, see https://www.youtube.com/playlist?list=PLtJH8O7BvdycENlCsAEraVybqz1I6T9sd.
Book
Full-text available
For presentations on topics in this book, see the following playlist: https://www.youtube.com/playlist?list=PLtJH8O7Bvdyeo1lzDWqx4fsREMQrLS1Gq. Although there is much literature on organisational learning, mathematical formalisation and computational simulation of it is considered a very challenging topic with almost no literature addressing it in...
Book
Full-text available
For presentations about topics in this book, see the following playlist: https://www.youtube.com/playlist?list=PLtJH8O7Bvdye8dZjGfhs7NnRXSodSduPU. Although there is much literature on multimodal interaction, multimodal synchrony analysis, and related behavioural adaptivity, mathematical formalisation and computational simulation of it is a nontrivi...
Book
Full-text available
For a few presentations on topics in this book, see the following playlist: https://www.youtube.com/playlist?list=PLtJH8O7BvdycAfXc-uAsiA0OC1D4eiYD5. Ensuring patient safety and security through cyberspace requires that all care professionals operate as a team and community. In order to be successful, it is of paramount importance that all members...
Article
Under review. Eating disorders involve strong obsessions with food, weight, and body shape, often carrying significant health risks or the potential to be fatal. This article is a multidisciplinary research approach, encompassing artificial intelligence, psychology, cognitive science, health science, and social science. The aim is to computationall...
Conference Paper
Full-text available
Preprint, under review. Key ingredients • Multilevel causality reification • Higher-order self-representation; representation of past/future patterns • Grounding in philosophy, biology, neuroscience, evolutionary principles. Multilevel reification for higher-order approaches often uses a linguistic/logical perspective, with terms indicating reifie...
Chapter
In this chapter, the role of subjective elements and control in social network adaptation is analysed computationally. In particular, it is analysed: (1) how the coevolution of social contagion and bonding by homophily may be controlled by the persons involved, and (2) how subjective representation states (e.g., what they know) can play a role in t...
Chapter
Full-text available
This chapter discusses the network-oriented computational analysis that was used to obtain insight on how an AI coach in cyberspace can provide support to medical teamwork and contribute to safety and security. Several options were analyzed. Many of these options were illustrated by a several realistic examples that were formalized computationally...
Chapter
This chapter introduces the reader to current technological trends that are shaping the healthcare sector and the pressing cyber security risks associated with these trends. The importance of phishing as a common attack vector is highlighted and the execution of phishing training simulations as a behavioral intervention is described. In the discuss...
Chapter
This chapter focusses on using a self-modelling network modeling approach to analyse and predict the behavior of people within organizations, specifically on the implementation of EHS standards. The study focusses on a real-world scenario in which EHS standards are implemented in a multi-level organizational learning scenario. To ensure the health...
Chapter
Although making mistakes is a crucial part of learning, it is still often being avoided in companies as it is considered as a shameful incident. This goes hand in hand with a mindset of a boss who dominantly believes that mistakes usually have negative consequences and therefore avoids them by only accepting simple tasks. Thus, there is no mechanis...
Chapter
Previous reports show that a substantial proportion of (near) medical errors in the operating theatre is attributable to ineffective communication between healthcare professionals. Speaking up about observed medical errors is a safety behaviour which promotes effective communication between health care professionals, consequently optimising patient...
Chapter
This chapter describes an extension of a safety culture within hospital organizations providing more transparency and acknowledgement of all actors, and in particular the parents. It contributes a model architecture to support a hospital to develop such an extended safety culture. It is illustrated for prevention of postpartum depression. Postpartu...
Chapter
This chapter presents an approach to enhancing neonatal care through the application of artificial intelligence (AI). Utilizing network-oriented modeling methodologies, the study aims to develop a network model to improve outcomes in neonatal respiratory support. The introduction sets the stage by outlining the significance of neonatal respiratory...
Chapter
In this chapter, it is shown how second-order adaptive agent-based network models can be used to support a medical team in healthcare institutions to adhere to specific Neonatal Hypoglycemia and Neonatal Hyperbilirubinemia treatment guidelines through the integration of an Artificial Intelligence (AI) Virtual Coach. The proposed AI Coach is designe...
Chapter
This chapter presents the use of second-order adaptive network models of hospital teams consisting of doctors and nurses, interacting together. A variety of scenarios are modelled and simulated, in relation with respiratory distress of a neonate, along with the integration of an AI-Coach for monitoring and support of such teams and of organizationa...
Chapter
In this chapter, it is shown how second-order adaptive agent-based network models can be used to model a medical team supported by a virtual AI Coach. It is illustrated for the case of a newborn baby in danger. The design of these computational agent models is based on an adaptive self-modeling network modeling approach. It also addresses how the A...
Chapter
Multilevel organisational learning concerns an interplay of different types of learning at individual, team, and organisational levels. These processes use complex dynamic and adaptive mechanisms. A second-order adaptive network model for this is introduced here and illustrated.
Chapter
This chapter describes a second-order adaptive network model for mental processes making use of shared mental models (SMM) for team performance. The chapter illustrates on the one hand the value of adequate SMM’s for safe and efficient team performance and on the other hand in cases of imperfections of such shared team models how this complicates t...
Chapter
This chapter presents an introduction to this book on a computational analysis approach for safety and security through cyberspace. It briefly introduces main concepts such as mental models, shared mental models, organizational learning, and how dynamics and adaptivity can be modeled by adaptive networks. Finally, it will provide an overview of the...
Book
Full-text available
In recent years, it has been found that the way in which environmental factors can lead to the development of mental disorders can often be explained by biological mechanisms that involve epigenetic changes of gene expression. This book introduces a multidisciplinary computational approach to model, formalise and analyse the interplay of environmen...
Conference Paper
Full-text available
This work addresses how nonlinear computational methods based on adaptive dynamical systems can be combined with probabilistic risk assessment methods and applied to analyse cybersecurity threats. For such adaptive dynamical systems, some of their characteristics or parameters are not static but adaptive. Concerning computational methods for them,...
Article
For a preliminary presentation, see https://www.youtube.com/watch?v=Z8ybhZyqcj0. Prenatal maternal stress (PNMS) has significant implications for infant temperament, primarily through alterations in the hypothalamic-pituitary-adrenal (HPA) axis and epigenetic mechanisms. This study explores the effects of PNMS on infant stress reactivity using a fi...
Article
Status: Under Submission. One of the main goals of Advanced Persistent Threat (APT) groups is to remain undetected and unidentified by the targeted organization. This study examines the possibility of using computational modelling to simulate which sectors are most likely to be attacked based on the profile of the offender. The authors provide an o...
Article
Full-text available
In this article, it is shown how second-order adaptive agent-based network models can be used to support a medical team in healthcare institutions to adhere to specific Neonatal Hypoglycemia and Neonatal Hyperbilirubinemia treatment guidelines through the integration of an Artificial Intelligence (AI) Virtual Coach. The proposed AI Coach is designe...
Conference Paper
In this paper a generic computational architecture for social interaction adaptivity and attunement is presented that was developed based on unification of a number of specific case studies addressed earlier. This architecture describes a generic multilevel multi-timescale adaptive dynamical system and is formalised and represented as a multi-order...
Conference Paper
Full-text available
This paper presents a multi-level adaptive network modelling approach to analyse and predict the behaviour of employees during phishing training simulations. The presented adaptive network model is based on elements of the COM-B framework for behavioural change which takes into account factors related to the capability, opportunity and motivation t...
Book
This two-volume set CCIS 2165-2166 constitutes the refereed proceedings of the 16th International Conference on Computational Collective Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9–11, 2024. The 67 full papers included in this book were carefully reviewed and selected from 234 submissions. The main track, covering the m...
Book
This two-volume set CCIS 2165-2166 constitutes the refereed proceedings of the 16th International Conference on Computational Collective Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9–11, 2024. The 67 full papers included in this book were carefully reviewed and selected from 234 submissions. The main track, covering the m...
Book
This two-volume set LNAI 14810-14811 constitutes the refereed proceedings of the 16th International Conference on Computational Collective Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9–11, 2024. The 59 revised full papers presented in these proceedings were carefully reviewed and selected from 234 submissions. They cover th...
Book
This two-volume set LNAI 14810-14811 constitutes the refereed proceedings of the 16th International Conference on Computational Collective Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9–11, 2024. The 59 revised full papers presented in these proceedings were carefully reviewed and selected from 234 submissions. They cover th...
Article
For a presentation video, see https://www.youtube.com/watch?v=JeeSS5QoUUc. This article presents a computational agent model that analyses the regulation of sensory processing and behavioural responses to stimuli in autism spectrum disorder (ASD). The model incorporates feedback loops and accounts for the heterogeneity, variability, and adaptivity...
Conference Paper
For a presentation, see https://youtu.be/3Md3AW5ubSM. In this paper, the adaptive interplay between bonding by homophily and adaptive mirroring by Hebbian learning within the context of joint decision-making has been explored by second-order adaptive network modeling. Second-order adaptive mechanisms were applied to capture the adaptive dynamic int...
Conference Paper
This study applies a network-oriented modelling approach to analyse the complex adaptive dynamical system describing sustainable livelihoods. The study pilots the use of a proposed adaptive temporal-causal network model to examine the dynamics of livelihood adaptation strategies. Strategies to develop the model include applying exclusion criteria t...
Conference Paper
For a presentation video, see https://youtu.be/ORi9NMG955s. In this study, we developed a fifth-order adaptive self-modelling network model to describe the involvement of paraquat in epigenetic pathways leading to dopaminergic neuronal loss, one of the most important hallmarks of Parkinson's disease (PD). This model is based on the structure and re...
Article
This article provides a computational analysis of the behavioural effects of ADHD and its underlying decision making and epigenetic factors including the DNA methylation in relation to the ST3GAL3 gene, which has been found to play an important role in ADHD. It includes a systematic literature review combined with an adaptive dynamical system model...
Conference Paper
Our investigation is aiming to answer the following research question: How does anxiety impact the academic performance of university students during exam periods? Previous research has shown that there is a correlation between anxiety and students' performance during examination periods. In this study we aim to model and test scenarios of the impa...
Method
Full-text available
In the Cybersecurity simulation lab, students, teachers and researchers work on developing advanced AI models that are used to simulate everyday cybersecurity scenarios. The scenarios range from predicting the effectiveness of phishing simulations to modeling the actions a hacker takes on a corporate network. The results of the simulations are used...
Conference Paper
For a presentation video, see https://youtu.be/ysCPfFkbs4E. This paper examines the processes of a phishing attack in a hospital setting by using a simulation-based approach to analyze the employees' responses to phishing emails. The aim is to improve organizational resilience against phishing attacks and enhance overall cybersecurity measures. The...
Conference Paper
For a presentation video, see https://youtu.be/3IuA5XFdkgQ. This paper explores how AI coaching can enhance decision-making in cyber risk management, focusing on overcoming cognitive biases like escalation of commitment and groupthink. These biases often hinder effective risk management by causing teams to stick to failing strategies and suppress d...
Conference Paper
Full-text available
For a presentation video, see https://youtu.be/-miuBtx8Rm4. This paper illustrates how to apply of an adaptive network model to analyse how the use of a Virtual Assistant to support home health devices results in less time wasted and more positive evaluations about patients being able to use these devices correctly, thus supporting safety.
Conference Paper
For a presentation video, see https://youtu.be/IedLjIZ3L2c. This paper contributes a computational analysis of the digital landscape of The Hague municipality, focusing on the interaction between citizens and local government. The focus is on a case study for the pathway from DigiD to Parking. To assess the cybersecurity of the interaction, cyber d...
Conference Paper
For a presentation video, see https://youtu.be/rjIUUpxucNg. In this paper, an adaptive network modeling approach and simulations have been used to analyse computationally how soldiers manage their electromagnetic signals on the battlefield using tools such as RETRANS and ARCAS. The approach provides a structured framework for understanding and anal...
Conference Paper
Full-text available
For cybersecurity, understanding human behaviour is important and especially in phishing attacks risks can be attributed to human error. To better understand behavioural changes we performed a computational analysis by an adaptive dynamical system represented as an adaptive network model. The base network model was refined by adding training option...
Conference Paper
Full-text available
For a presentation video, see https://youtu.be/1pY6gwhudos. This study investigates cybersecurity threats in financial organizations by developing an adaptive network model to mitigate attacks. Two distinct scenarios are examined: one where the attacker learns more efficiently than the organization, and another where the organization outpaces the a...
Conference Paper
For a presentation video, see https://youtu.be/Hbx-6rSSNh4. Insomnia disorder (ID) is a prevalent stress-related sleep disorder involving burdening symptoms related to emotional disturbances. Insomnia can be understood as a transdiagnostic process in psychiatric disorders. Understanding its complex aetiology and progression requires a nuanced appro...

Questions

Question (1)
Question
Recently I found an interesting overview paper of Thomas Valente on network interventions in general: Valente, T.W. (2012) Network Interventions. Science 337, 49-53, 2012. DOI: 10.1126/science.1217330 (see http://www.sciencemag.org/content/337/6090/49.abstract?sid=0f32a56b-ae0d-4270-af95-0314b4299ed2 At the end he writes: “To date, however, few of the many network intervention alternatives have been tested in laboratory or real-world settings, and it is unclear which network interventions work best under what conditions.” What I am looking for more specifically is work that addresses network interventions, for example in health or lifestyle context, in order to provide supporting effects from the network on specific individuals who need some support.

Network

Cited By