Next Article in Journal
TAT-SARNet: A Transformer-Attentive Two-Stream Soccer Action Recognition Network with Multi-Dimensional Feature Fusion and Hierarchical Temporal Classification
Previous Article in Journal
Modeling Intervention Strategies to Control Hepatitis C Outbreak and Related Mortality in Bangladesh
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bounded Rational Decision-Risk Propagation Coupling Dynamics in Directed Weighted Multilayer Hypernetworks

1
School of Science, Dalian Maritime University, Dalian 116026, China
2
Department of Ship Command, Dalian Naval Academy, Dalian 116001, China
*
Authors to whom correspondence should be addressed.
Mathematics 2025, 13(18), 3010; https://doi.org/10.3390/math13183010
Submission received: 10 August 2025 / Revised: 31 August 2025 / Accepted: 8 September 2025 / Published: 17 September 2025

Abstract

Industrial symbiosis network (ISN) is crucial to improving resource utilization efficiency and promoting sustainable development. In order to mitigate the damage caused to symbiotic systems by risk propagation, this paper constructs a directed weighted multilayer hypernetwork model that considers bounded rational decision and risk propagation coupling ( U A P A H U S I S ), providing a new method for risk management in industrial symbiosis networks. This paper constructs a weighted hypernetwork model to simulate the interaction of risk information in a symbiotic network and uses a time-varying adaptive propagation mechanism to describe the changes in bounded rational decisions made by enterprises during the risk information interaction process. A directed weighted network is developed to simulate the evolution process of an industrial symbiosis network, with the network topology representing the risk propagation path. The study also considers the roles of mass media and crowd effects and innovatively introduces the assumption of decision incubation periods. The proposed coupled dynamic model is theoretically analyzed and numerically simulated by using the Microscopic Markov Chain Approach (MMCA). The findings indicate that enhancing the enterprises’ risk response willingness and risk perception ability, improving the risk recovery ability, and cooperating with timely and accurate media reports can effectively inhibit the risk propagation on ISN.

1. Introduction

Industrial symbiosis (IS) enables traditionally separate entities and companies to share and cooperate in materials, energy, and information [1], which contributes to improving sustainability [2,3] and brings environmental, economic, and social benefits [4,5]. The exchange of substances between symbiotic companies forms a dynamic and complex network known as the industrial symbiosis network (ISN).
As core nodes within industrial symbiotic networks, the stability of enterprises underpins the robust operation of the entire system. However, enterprises may encounter imbalances between the resource supply and the demand due to external environmental shifts or internal organizational coordination failures. This not only impacts their own production and operations but also transmits risks to partners through symbiotic linkages, ultimately posing significant risks to the entire industrial symbiotic system. The 2021 grounding of the Ever Given in the Suez Canal caused severe congestion and delays across global shipping networks, plunging numerous enterprises into supply chain disruptions and ultimately inflicting substantial economic losses upon multiple sectors, including automotive, retail, and electronics worldwide [6]. In 2017, Kobe Steel’s data falsification scandal triggered a global crisis of trust and safety concerns, severely undermining the credibility and reliability of the entire symbiotic network. Consequently, the stability of industrial symbiosis networks plays a vital role in societal production and economic development [7,8]. Investigating the patterns of risk propagation within industrial symbiosis networks thus holds significant theoretical and practical importance.
Implementing targeted risk management strategies to curb the propagation of risks is of significant importance. When enterprises come into contact with risk-related information through internal company systems, supply chain management systems, or industry information platforms, they are constrained by factors such as information asymmetry, resource limitations (risk management cost constraints), and cognitive biases, leading them to make ‘satisfactory solutions’ under bounded rationality rather than fully rational optimal solutions [9,10]. This paper draws on Herbert Simon’s adaptive strategy for simplifying decision dimensions [11], reducing complex and continuous risk attitudes to a binary ‘Hesitant-Positive’ typology. As an important carrier of risk information, mass media has a systematic impact on the bounded rational decision process of enterprises [12,13]. The timely and accurate nature of media reports will affect the decisions made by enterprises regarding risks. When media reports are timely and accurate, enterprises can establish effective risk warning mechanisms to prevent risks. Therefore, analyzing the bounded rational decision made by enterprises in the face of risks and the role of media reports in decision-making will help to more accurately describe the risk transmission mechanism in industrial symbiosis networks.
From a macro perspective, risk propagation in the industrial symbiosis network is considered a complex, network-driven phenomenon, which makes the complex network theory an effective tool for studying industrial risk propagation. Li et al. [14] applied the complex network theory to analyze the topological characteristics of symbiotic networks. Wang et al. [15] established a directed weighted network cascade failure model, demonstrating that the interaction between economic fluctuations and network structure is a key determinant of industrial symbiosis network vulnerability. Wu et al. [16] quantified environmental risks within steel industry symbiotic networks, providing evidence-based foundations for environmental risk mitigation strategies in industrial symbiosis networks. Shan et al. [17] developed multi-network frameworks to investigate the impact of risk information disclosure on risk propagation, subsequently exploring the influence of risk sharing on risk transmission within multi-path networks [18]. However, given the intricate information-sharing mechanisms among enterprises within industrial symbiosis networks, simple peer-to-peer information propagation models are no longer adequate. Within hypernetworks, risk information can propagate simultaneously across multiple symbiotic enterprises via hyperedges, more accurately reflecting real-world information flows [19,20]. Therefore, this paper constructs a directed weighted multilayer hypernetwork model that accounts for bounded rationality decision-making and risk propagation coupling, offering a novel approach to risk management within industrial symbiosis networks.
The main contributions of this paper are as follows:
  • This paper employs weighted hypernetwork models to simulate risk information interaction in symbiotic networks and uses a directed weighted network model to describe risk propagation among symbiotic enterprises, thereby forming a directed weighted multilayer hypernetwork model that considers bounded rational decision and risk propagation coupling ( U A P A H U S I S );
  • A time-varying adaptive communication mechanism is used to describe changes in bounded rational decisions made by enterprises during the risk information interaction process, while introducing the influence of mass media and crowd effects. During the risk propagation process the influence of the degree of symbiotic dependence between enterprises and the k-shell value of enterprises on risk propagation is considered, and the assumption of a decision incubation period is innovatively introduced;
  • The Microscopic Markov Chain Approach (MMCA) is used to perform theoretical analysis and numerical simulation of the proposed coupled dynamic model.
The rest of this paper is structured as follows. Section 2 introduces the construction process of the directed weighted multilayer hypernetwork model and the coupling mechanism of bounded rational decision and risk propagation. In Section 3, the dynamic equations satisfied by the hyperdegree of nodes in the weighted hypernetworks are calculated, and the proposed coupled dynamic model is theoretically analyzed using the Microscopic Markov Chain Approach (MMCA). Section 4 conducts numerical simulation verification of the theoretical derivations in Section 3. Based on the numerical simulation results in Section 4, Section 5 provides relevant risk management recommendations.

2. Model Description

The Kalundborg Symbiosis in Denmark is one of the world’s most famous and successful examples of industrial symbiosis [7,21,22]. The symbiosis began in the 1960s when a small number of companies (such as the Asnæs Power Station, the Statoil refinery, and the Gypsum Plasterboard Factory) spontaneously launched a resource exchange cooperation based on economic and environmental benefits. Over time, more companies (such as Novo Nordisk Pharmaceuticals and soil remediation companies) and municipal departments gradually joined in, forming a complex industrial symbiosis network through multi-level recycling of resources and by-products. In this process, cooperation among various entities gradually expanded from bilateral transactions to multilateral collaboration, ultimately propelling Kalundborg to become a global model for industrial ecologization.
This paper employs a weighted hypernetwork model to simulate risk information interaction among symbiotic enterprises and constructs a directed weighted network model that considers the relationship between resource supply and demand to generate an industrial symbiosis network. The topological structure of the network is shown in Figure 1, where the nodes in each layer are the same, but each layer exhibits different evolutionary processes and topological structures.
Next, this section first introduces the basic concepts involved in the directed weighted multilayer hypernetwork model, then describes the evolution mechanism of the network model, and finally proposes the coupling dynamics rules.

2.1. Related Concepts

2.1.1. Hypernetworks Based on Hypergraphs

Let V = v 1 , v 2 , , v n be a non-empty and finite set, and let e i = v i 1 , v i 2 , , v i j , v i k V , k = 1,2 , , j , and E = e 1 , e 2 , , e m be a family of subsets of V . The pair H = V , E is called a hypergraph, where the elements v 1 , v 2 , , v n of V are called the nodes or vertices and e i i = 1,2 , , m are called the hyperedges. The triple H = V , E , W is called a weighted hypergraph, where V = v 1 , v 2 , , v n , E = e 1 , e 2 , , e m , and W = w 1 , w 2 , , w m are the sets of nodes, hyperedges, and weights, respectively. In hypergraph, if there exists a hyperedge that encompasses two nodes, the two nodes are said to be adjacent. Suppose that Ω = V , E , W is a finite weighted hypergraph and G is a map from T = 0 ,   into Ω . For any given t 0 , G t = V t , E t , W ( t ) is a finite weighted hypergraph. A weighted hypernetwork G t , t T is a collection of weighted hypergraphs [23]. The hyperdegree of node v j is defined as the number of hyperedges associated with that node, denoted as h j = i = 1 m c i j , where c i j = 1   v j e i   0   otherwise is the element in the incidence matrix C = c i j m × n .

2.1.2. Directed Weighted Network

  • The weight matrix of the directed weighted network is defined as W = w i j n × n , where w i j 0 . In this paper, w i j represents the amount of resources provided by symbiotic enterprise v i to v j ;
  • The degree of node v i is divided into in-degree ( k i i n ) and out-degree ( k i o u t ). The degree of node v i is equal to the sum of its out-degree and in-degree ( k i = k i i n + k i o u t ) [14]. In this paper, the degree of enterprise v i represents the number of enterprises that have a symbiotic relationship with it;
  • The strength of a node is defined as the sum of the weights of the directed edges connected to that node [24,25]. The in-strength ( s i i n ) and out-strength ( s i o u t ) of node v i are defined as the following Equation (1):
      s i i n = j Ω i i n w j i ,   s i o u t = j Ω i o u t w i j ,
    where Ω i i n and Ω i o u t are the set of in-neighbors and out-neighbors of enterprise v i , respectively. The strength of enterprise v i is equal to the sum of the out-strength and in-strength, that is s i = s i i n + s i o u t ;
  • Given that resource inflows and outflows may differ significantly between symbiotic firms, this paper defines the degree of symbiotic dependence in terms of two-way resource dependence, that is as follows:
      η i j = e w i j / 2 · w i j + e w j i / 2 · w j i e w i j / 2 + e w j i / 2 .

2.1.3. Jaccard Similarity

Jaccard similarity is an effective similarity measurement method that has been widely applied in fields such as bioinformatics [26,27], machine learning [28,29], and complex networks [30,31]. In this paper, assuming that Ω i and Ω j represent the sets of neighbors of nodes v i and v j in a directed weighted network, respectively, the similarity between v i and v j is as defined below:
  J i , j = J i j = Ω i Ω j Ω i Ω j

2.1.4. K-Core

A k-shell is defined as a subgraph of a network in which the degree of each node is no less than k . By repeatedly removing nodes with degrees less than k , k-shell decomposition of the network can be obtained [32]. The k-shell value k _ s of a node indicates its core position in the network, with higher values indicating a more central position [33,34].

2.2. Generation of the Directed Weighted Multilayer Hypernetworks

2.2.1. Generation of the Social Network

The emergence of numerous social media platforms has provided numerous channels for symbiotic enterprises to exchange information. The hyperedges of the hypernetwork contain an arbitrary number of nodes and can accurately describe the high-order interactivity between symbiotic enterprises. In the hypernetwork described in this paper, nodes represent enterprises, and hyperedges represent information interactions between enterprises. This paper assumes that the formation of hyperedges follows a hyperdegree priority connection mechanism [23]. The evolution process of the network can be summarized as the addition of new node batches, the generation of new hyperedges, and the reconnection of existing hyperedges. The steps for constructing the upper-level social network are as follows.
Figure 2 presents a schematic illustration of the social network construction process, while Table 1 provides a detailed enumeration of the definitions and values of the parameters necessary for constructing the social network.
Step 1 Initialization. The initial hypernetwork is constituted by N 0 seed nodes and a hyperedge containing them.
Step 2 Growth. At each time instant one of the following scenarios occurs with corresponding probability, where q 1 + q 2 + q 3 = 1 .
  • New node batches are added with probability q 1 .
    Suppose that new node batches nodes arrive at the system according to a Poisson process N t with rate λ . When a new batch of a N t nodes is added to the network at time t, these a N t new nodes and b N t previously existing nodes are encircled by a new hyperedge, totally m 1 new hyperedges are constructed with no repetitive hyperedges. a N t and b N t are positive integers that are taken from the given probability density functions f a and g b , respectively. ( a ¯ = a f a d a < , b ¯ = b g b d b < ). The selected probability Π j t , t i for the j th node of the i th batch depends on the hyperdegree h j t , t i , that is,
      Π j t , t i = h j t , t i i , j h j t , t i ,
    where t i denotes the time when the i th batch of nodes enters into the network.
  • New hyperedges are added with probability q 2 .
    Randomly select a node in the network that is encircled by a new hyperedge along with b N t existing nodes that are selected with the probability shown in Equation (3). Repeat this process until m 2 new hyperedges without duplicates have been constructed.
  • Existing hyperedges are reconnected with probability q 3 .
    Randomly select a node and a hyperedge containing it. The selected hyperedge is then disconnected, and the node is incorporated into a newly formed hyperedge with b N t existing nodes that selected with the probability shown in Equation (3). Repeat this process until m 3 new hyperedges without duplication are reconnected.
Step 3 Repeat. Repeat step 2 until the network size reaches the preset value.

2.2.2. Generation of the ISN

This paper uses the evolution mechanism of BBV [35] and the linear preferred connection mechanism of the BA model [36] to construct the ISN. The evolution process of a directed weighted network can be summarized as the addition of nodes, the formation of new directed edges, and the disconnection of existing directed edges. Table 2 lists the parameter definitions and their values required for this section. It is important to note that enterprises in the ISN are only able to generate new directed edges with existing nodes in the same hyperedge of the social network.
Step 1 Initialization. The initial network is a fully coupled network comprising N 0 seed nodes and all initial weights set to w 0 .
Step 2 Growth. At each time instant, one of the following dynamic evolution rules is chosen, where q 1 + q 2 + q 3 = 1 .
  • New nodes are added with probability q 1 .
    A new node v n is added to the network and generate m 4 directed edges, where the number of outgoing edges follows a binomial distribution B m 4 , p 1 .The probability of selecting the existing node as the incoming node or the outgoing node of the new directed edge is expressed by Equation (5).
      Π n i = s i i n j s j i n   Π i n = s i o u t j s j o u t .
  • New directed edges are added with probability q 2 .
    Select a node v i at random, select a node v j 1 with probability Φ i j = w i j s i o u t , and select a node v k 1 with probability Φ j k = w j k s j o u t to form a new directed edge i , k 1 . Select a node v j 2 with probability Φ j i = w j i s i i n and a node v k 2 with probability Φ k j = w k j s j i n to form a new directed edge k 2 , i .
  • Existing directed edges are disconnected with probability q 3 .
    Select a node v i at random and disconnect m 5 m 5 < m 4 edges, where the number of outgoing edges follows a binomial distribution B m 5 , p 1 . The probability of selecting the node v k as the incoming node or the outgoing node of the deleted edge are given by Equation (6).
      Π i k = 1 Π i k N t 1 Π k i = 1 Π k i N t 1 ,
    where N t denotes the total number of nodes in the network at time t . When a node has all its edges disconnected from other nodes, the node is removed from the network.
Step 3: Weight update.
  • Add nodes to the network.
    The new node v n establishes a new edge with the existing node v i , and the total weight of the existing edges connected to v i is modified by ϵ . [37]. This modification is distributed proportionally among the edges based on their weights, that is
      w j i w j i + ϵ w j i s i i n , s i i n s i i n + ϵ + ω 0 , j Ω i i n ;
    Similarly,
      w i j w i j + ϵ w i j s i o u t , s i o u t s i o u t + ϵ + ω 0 , j Ω i o u t .
  • Add new directed edges.
    If there is a connection between nodes v i and v k 1 , the weight is increased by σ , otherwise, the new edges i , k 1 is established, and w i k 1 = w 0 . Similarly to new directed edge k 2 , i .
  • Disconnect existing directed edges.
    If the deleted edge is i , k , then w i j w i j + w i k × w i j s i o u t , where k Ω i o u t . Similarly to existing directed edge k , i .
Step 4: Repeat steps 2–3 until the network size reaches the set point.

2.3. Coupled Dynamics Model

In the proposed directed weighted multilayer hypernetwork model, we consider two types of risk attitudes and the impact of mass media on risk propagation in industrial symbiosis networks. We couple bounded rational decision, which is constructed as Unaware-Hesitant-Positive-Unaware ( U A H A P U ), and risk propagation, which is constructed as Susceptible–Infected–Susceptible ( S I S ), and define it as the U A P A H U S I S model. Table 3 lists the parameter symbols and definitions required for the coupled dynamics model in the order in which they appear in this paper.

2.3.1. Assumption 1: Bounded Rational Decisions on Social Networks

This paper uses a weighted hypernetwork model to simulate social networks, with the network topology representing the diffusion path of risk information. The bounded rational decisions and changes in enterprises are described as the U A H A P U process, where the U state represents unaware of risk information, A H (Aware and Hesitant) represents aware of risk information but hesitant to take self-protection and preventive actions, and A P (Aware and Positive) represents enterprises aware of risk information and taking active and effective self-protection and preventive actions.
The U state enterprises can be informed of risk information by any adjacent A H or A P state enterprises. These two types of attitudes are often in opposition to each other during the transmission process; that is, when state enterprises are exposed to both A H and A P at the same time, they can only transform into one of them, with transformation probabilities of λ H and λ P , respectively (the specific process of bounded rational decisions will be detailed in Assumption II). Considering the heterogeneity of enterprises, that is, the greater the hyperdegree, the more capable the enterprise is of exchanging and disseminating information. Assume that enterprises making bounded rational decisions have an information dissemination capability coefficient of ω i t .
  ω i t = h i t max h t ,
where h i t is the hyperdegree of enterprise v i at time t , max h t   represents the maximum hyperdegree value among all nodes in the hypernetwork at time step t .
At the same time, assume that the bounded rational decisions forgetting rates are δ H and δ P , respectively. The process of bounded rational decisions changes on social networks is shown in the first part of Figure 3a.

2.3.2. Assumption 2: Time-Varying Adaptive Propagation Rules

The study of information diffusion models in hypernetworks mainly adopts the method based on epidemic models, and the two commonly used methods are global dissemination based on the reactive process (RP) and local dissemination based on the contact process (CP) [38,39,40]. The information propagation process in the real world typically falls between these two extremes, so this paper adopts an adaptive propagation model, which allows for selective propagation of information to neighbors within the hyperedge.
In hypernetworks, the hyperdegree of a node is defined as the number of hyperedges in which the node is involved. The hyperdegree of a node is indicative of the degree of participation of the node in the network. In the threshold model of disease, nodes with higher hyperdegree are more likely to be activated, and the activation speed is faster [41]. In the context of cooperation in multigames, high hyperdegree nodes influence surrounding nodes to form a cooperator cluster, while the groups with a low hyperdegree have a lower degree of cooperation [42]. In the study of rumor propagation, the hyperdegree of nodes is used to replace the degree, and the obtained model reaches equilibrium faster than the general model [43,44].
In this paper, the nodes with large hyperdegree represent the more group interactions that this symbiotic enterprise participates in. The weight of each hyperedge w e i , i = 1,2 , , m is assumed to be equal to the sum of the hyperdegrees of the nodes in the hyperedge, and the weight of the hyperedge represents the active degree of the social circle. At each moment, each enterprise first selects an active hyperedge and then exchanges risk information with neighboring nodes in the selected active hyperedge according to the rules in Assumption 1. The probability that hyperedge e j , to which node v i belongs is selected as an active hyperedge is as follows:
  p j , i = w e j e k M i w e k ,
where M i is hyperedge set containing node v i .
It is important to note that social networks are not static entities. Consequently, information dissemination channels are subject to change over time, including the establishment of new social relationships and the dissolution of old ones. Time-varying network models have been demonstrated to capture the dynamic changes in network structures, thereby facilitating a more accurate description of the process of bounded rational decision transformation. Therefore, this paper stipulates that at every moment, the social network undergoes evolution—specifically, the addition and deletion of hyperedges—followed by a shift towards bounded rational decision-making according to the aforementioned adaptive propagation rules. As illustrated in Figure 4, the specific process of bounded rational decision transformation in social networks is demonstrated.

2.3.3. Assumption 3: Mass Media and Crowd Effects

The mass media serve as the primary and reliable source of risk-related information. However, due to information asymmetry, data acquisition lag, and limited expert interpretation, media reports do not comprehensively cover the scale and severity of risks. We employ ρ I ~ ( t ) and ρ I ( t ) to represent the scale of risk reported by the media and the actual scale of risk at time t , respectively. To describe this difference, this paper introduces a weakening factor θ 0 θ 1 , allowing ρ I ~ t = θ ρ I ( t ) .
In addition, this paper also considers environmental factors, namely the impact of crowd effects on bounded rational decisions. When hesitant firms detect a greater number of proactive symbiotic partners in their vicinity, they may shift towards a risk-positive stance. This paper denotes the crowd effect as ξ i t . Specifically, firms in state A H dynamically adjust and update their state at time t based on the state of their neighbors at the previous time step ( t 1 ), i.e.,
  ξ i t = l g 1 + j = 1 N a j i P j A P t 1 k i t ,
where a j i indicates whether nodes v j and v i are adjacent in the social network, a j i = 1 indicates that nodes v j and v i are adjacent, otherwise a j i = 0 . k i t indicates the number of nodes adjacent to node v i at time t . P j A P t 1 indicates the probability that node v j is in state A P at time t 1 .
At the same time, repeated exposure to a piece of information can increase its credibility, meaning that the more times a piece of risk information is repeated, the greater the probability that it will be believed. Therefore, this paper uses η to represent the reinforcement effect of mass media information.
In summary, under the influence of mass media and crowd effects, the probability of symbiotic enterprises changing from states U and A H to risk-positive attitudes A P is defined as decision functions g i U and g i H , respectively.
  g i U = H θ ρ I t · η k i ¯ ( t ) g i H = H θ ρ I t · η + ξ i t k i ¯ ( t ) ,
where H ( x ) denotes the step function, k i ¯ ( t ) = k k i ( t ) is the global perception ratio at time t , and k 0 k m a x ( k i ) is the control factor of the global perception ratio.
Figure 5 can help us better understand the influence of mass media and crowd effects on bounded rational decision-making. The second panel of Figure 3a represents the transition of U and A H states to A P states according to the decision probabilities g i U and g i H .

2.3.4. Assumption 4: Risk Transmission Process

In this paper, the S I S epidemic model is used to describe risk propagation in industrial symbiosis networks. Considering that the infection rate, namely the probability of susceptible individuals being infected by their infected neighbors, is always related to the susceptibility (admission rate A i ) and infectivity (transmission rate T i ) [45]. This paper makes the following assumptions about the risk propagation process.
A company’s risk perception capabilities (the comprehensive ability to identify, assess, and interpret potential risks within a symbiotic network) have a decisive impact on strategic decision-making and crisis response mechanisms [46]. Specifically, enterprises with stronger risk perception capabilities can more accurately quantify the impact of risk events, implement more targeted risk mitigation measures, and more effectively reduce their own risk exposure levels. Additionally, when partners with higher levels of symbiotic dependence encounter risks, the enterprise’s risk acceptance rate will significantly increase. For example, if an enterprise’s sole supplier experiences a production interruption, the enterprise may be unable to quickly find an alternative solution, leading to a higher risk acceptance rate. Therefore, this paper defines the risk acceptance rate of a susceptible enterprise v i with respect to its infected neighbor v j as follows:
  A i j X t = 0                  ρ I t ρ 0 φ i j t 1 α X ρ I t ρ 0               ρ 0 < ρ I t < ρ c φ i j t 1 α X           ρ I t ρ c       ,
where φ i j ( t ) represents the degree of symbiotic dependence of enterprise v i to v j at time t , α X denotes the risk perception capability of enterprises v i in state X , with X = U , A H , A P , ρ 0 denotes the minimum value of the risk scale that triggers the perception capability of enterprises, ρ c denotes the specific threshold for triggering firms’ risk perception capabilities, with 0 ρ 0 ρ c 1 . When ρ I t ρ 0 , susceptible firms are not affected by risk; when ρ I t ρ c , the risk admission rate of susceptible firms is no longer influenced by the current risk scale. To calculate the risk propagation threshold, this paper assumes that ρ 0 = ρ c = 0 .
The k-shell has the advantages of globality, robustness [47,48] and hierarchical structure [49], and performs better than other metrics in simulations of SIR and SIS models [50]. The k-shell value k _ s is a reliable predictor of influential spreaders [51]. During risk propagation, enterprises’ risk transmission capacity is closely related to its position within the network. Therefore, this paper uses Equation (14) containing k _ s to express the risk transmission rate T i t of the infected enterprise v i at time t .
  T i t = β · T m i n + 1 T m i n k _ s i t k s m i n t k _ s m a x t k s m i n t = β · k _ s i ¯ t ,
where β is the basic risk propagation rate, k _ s i t is the k-shell value of enterprise v i at time t , k _ s m a x t and k _ s m i n t represent the maximum and minimum k-shell values at time t , T m i n is the minimum risk propagation ability of a node v i , and T m i n = 10 5 is assumed in this paper.
In summary, the infection rate between v i and v j is as follows:
  χ i j X ( t ) = A i j X t · T j t                 v i   is   susceptible   and   v j   is   infectious T i t · A j i X t               v i   is   infectious   and   v j   is   susceptible 0                                                                                                 otherwise                               ,
where X = U , A P , A H .
Exposed enterprises will return to a susceptible state with probability μ . The risk propagation process is shown in Figure 3b.

2.3.5. Assumption 5: Coupling Process

Companies that are aware of risk information will constantly monitor the risk situation around them and remain vigilant at all times. This paper introduces the risk perception ability attenuation factors Γ U and Γ H , where 0 < Γ U < Γ H < 1 . Companies that take a positive attitude towards risk usually have a higher risk perception ability than the other two states, that is, α P > α H > α U , as shown in Figure 3c.
  α P = α α H = Γ H · α P = Γ H · α α U = Γ U · α P = Γ U · α ,
Additionally, this paper proposes a nonlinear coupling relationship, where the transition parameters in one layer are influenced not only by the node states in another layer but also by the topological properties of nodes in another layer. In other words, the topological structure of ISN affects the bounded rational decisions of enterprises. Specifically, the more common partners two symbiotic enterprises have, the more similar their status and roles in ISN are, and the higher the possibility that they belong to the same industry or have similar production directions. Enterprises with high similarity may have similar production models, technical routes, or market strategies, so it is easier for them to understand and accept each other’s decisions about risk information, thereby affecting the change in bounded rational decisions. See Equation (30) for a detailed expression.

2.3.6. Assumption 6: Time-Delay Effect

The formation of bounded rational decisions by enterprises requires a series of processes, such as information acquisition, information interpretation, and risk assessment, which essentially constitute a time delay in risk information perception [52,53]. This paper compares the moment of risk infection with that of bounded rational decision to more accurately describe the dynamic characteristics of risk evolution in industrial symbiosis networks. The model introduces the decision incubation period function τ i , which satisfies an exponential distribution with mean ν . Since this paper is based on a discrete Markov chain model, τ i is rounded to the nearest integer for convenience. The three following main situations can be derived:
  • Scenario 1: τ i 1 . Once an enterprise is infected with risk, it will immediately make a bounded rational decision ( A P ), that is, it will directly transition from state U I and A H I to A P I . There are only four states in the system: U S , A H S , A P S and A P I . The corresponding state transition probability tree can be seen in Figure 6;
  • Scenario 2: 1 < t < τ i . Once a company in the U S , A H S state is infected, it will enter incubation period and remain in U I and A H I states. The corresponding state transition probability tree is shown in Figure 7 (excluding the red dotted arrow);
  • Scenario 3: 1 < τ i t . The incubation period is over, and companies in the U I and A H I states realize the risks and make bounded rational decisions, that is, they shift to the A P I state. The corresponding state transition probability tree is shown in Figure 7 (including the red dotted arrow).

3. Theory Analysis

3.1. Theoretical Analysis of Hyperdegree Evolution

In this section, the mean theory [54,55] is used to analyze the hyperdegree distribution of the hypernetwork model constructed according to the hyperdegree priority connection mechanism proposed in Section 2.2.1. Supposing that h j t , t i is a continuous real variable. It can be seen that h j t , t i satisfies the following dynamical equations.
[1]
New node batches are added with probability q 1 ,
  h j t , t i t = q 1 m 1 b λ h j t , t i i , j h j t , t i ,
[2]
New hyperedges are added with probability q 2 ,
  h j t , t i t = q 2 m 2 1 N t + b h j t , t i i , j h j t , t i .
[3]
Existing hyperedges are reconnect with probability q 3 ,
  h j t , t i t = q 3 m 3 1 N t + b h j t , t i i , j h j t , t i .
where N t denotes the total number of nodes at time t , and lim t N t = q 1 a ¯ λ t .
Combining Equations (17)–(19), we can achieve
  h j t , t i t = q 1 m 1 b λ h j t , t i i , j h j t , t i + q 2 m 2 + q 3 m 3 b h j t , t i i , j h j t , t i + q 2 m 2 q 3 m 3 N t .
Since the arrival of node batches follows a Poisson distribution N t with rate λ , then E N t = q 1 λ t . Let
  x = lim t 1 q 1 λ t i , j h j t , t i ,
then we have,
  h j t , t i t = m 1 b h j t , t i x t + q 2 m 2 + q 3 m 3 b h j t , t i x q 1 λ t + q 2 m 2 q 3 m 3 q 1 a ¯ λ t .
Let A = m 1 b x + ( q 2 m 2 q 3 m 3 ) b x q 1 λ ,   B = q 2 m 2 q 3 m 3 q 1 a ¯ λ , the solution of Equation (22), with the initial condition that a node in the i th batch at its birth time satisfies h j t , t i = m 1 , is
  h j t , t i = m 1 + B A t t i A B A , j = 1,2 , 3 , , a i ,
where x satisfies the following equation,
  x = 1 q 1 λ t g b d b m 1 + B A t t i A B A d t .
It can be seen from Equation (23) that
  P h j t , t i k = P t i t · k A + B m 1 A + B 1 A ,
Because t i follows the gamma distribution i , λ , that is,
  P t i x = 1 e λ x l = 0 i 1 ( λ x ) l l ! ,
then
  P h j t , t i k = 1 e λ · t · k A + B m 1 A + B 1 A · l = 0 i 1 1 l ! λ t · k A + B m 1 A + B 1 A l ,
The final result is
  P h j t , t i = k P h j t , t i < k k = λ t m 1 A + B B + A k m 1 A + B 1 A 1 e λ · t · k A + B m 1 A + B 1 A 1 i 1 ! λ t · k A + B m 1 A + B 1 A i 1
Therefore, the hyperdegree distribution in a stable state satisfies:
  P k = P h j t , t i = k g b d b .

3.2. Theoretical Analysis Based on MMCA

MMCA has been widely used to analyze the propagation dynamics of coevolution [56,57]. In this section, MMCA is applied to analyze the risk propagation process and calculate the risk propagation threshold.
The state of an enterprise v i may be one of U S , A H S , A P S , U I , A H I , and A P I at each time step t , and the corresponding probabilities at these states are set to be P i U S t , P i A H S t , P i A P S t , P i U I t , P i A H I t , and P i A P I t , respectively. In this paper, we use γ i P t and γ i H t to denote the probability that risk-unaware enterprises do not receive risk information transmitted by neighbors with hesitant or positive attitudes, respectively.
  γ i H t = j i 1 a j i P i H t J i j ω j λ H γ i P t = j i 1 a j i P i P t J i j ω j λ P ,
where P i H t = P i A H S t + P i A H I t , P i P t = P i A P S t + P i A P I t , J i j denotes similarity between v i and v j .
It is worth noting that when enterprise v i receives risk information from symbiotic neighbors in both states A H and A P , it will only accept one view. This paper further introduces Θ i H t and Θ i P t to represent the probability that risk-unaware enterprises adopt a risk-hesitant attitude and a proactive attitude, respectively, while Θ i U t represents the probability that risk-unaware enterprises remain unaware.
  Θ i U t = γ i P t · γ i H t   Θ i H t = 1 γ i H t 1 ε 1 γ i P t 1 γ i H t   Θ i P t = 1 γ i P t ε 1 γ i P t 1 γ i H t ,
where ε 0 ε 1 is the preference value for hesitant attitudes.
In the risk transmission layer, all infected neighbors of susceptible enterprises may transmit risk to them. Therefore, the probabilities that enterprises in states U S , A H S and A P S are not infected by symbiotic neighbors are represented as follows:
  q i U t = j i 1 b j i P j I t χ i j U t q i P t = j i 1 b j i P j I t χ i j P ( t ) q i H t = j i 1 b j i P j I t χ i j H ( t ) ,
where P j I t = P j U I t + P j A H I t + P j A P I t , b j i denotes the j -row and i -column element of the adjacency matrix of ISN, in which b j i = 1 indicates that nodes v j and v i are neighbors, otherwise b j i = 0 .
The transition probabilities of node states under different incubation periods are calculated as follows:
  • Scenario 1:  τ i 1 . There are only four states in the network: U S , A H S , A P S , and A P I , and the evolution equations can be expressed as follows:
      P i U S t + 1 = P i U S t Θ i U t 1 g i U t q i U t + P i A H S t δ H 1 g i U t q i U t           + P i A P S t δ P 1 g i U t q i U t + P i A P I t δ P 1 g i U t μ P i A H S t + 1 = P i U S t Θ i H t 1 g i H t q i H t + P i A H S t 1 δ H 1 g i H t q i H t P i A P S t + 1 = P i U S t Θ i U t g i U t + Θ i H t g i H t + Θ i P t q i P t + P i A P S t δ P g i U t + 1 δ P q i P t       + P i A H S t δ H g i U t + 1 δ H g i H t q i P t + P i A P I t δ P g i U t + 1 δ P μ P i A P I t + 1 = P i U S t Θ i U t 1 g i U t 1 q i U t + Θ i H t 1 g i H t 1 q i H t + Θ i U t g i U t + Θ i H t g i H t + Θ i P t 1 q i P t       + P i A P S t δ P 1 g i U t 1 q i U t + δ P g i U t + 1 δ P 1 q i P t       + P i A H S t δ H 1 g i U t 1 q i U t + 1 δ H 1 g i H t 1 q i H t + δ H g i U t + 1 δ H 1 q i P t        + P i A P I t δ P 1 g i U t 1 μ + δ P g i U t + 1 δ P 1 μ i 1,2 , , N ,
  • Scenario 2:  1 < t < τ i . There are six states in the network: U S , A H S , A P S , U I , A H I , and A P I , and the evolution equations can be expressed as
      P i U S t + 1 = P i U S t Θ i U t 1 g i U t q i U t + P i A H S t δ H 1 g i U t q i U t + P i A P S t δ P 1 g i U t q i U t        + P i U I t Θ i U t 1 g i U t μ + P i A H I t δ H 1 g i U t μ + P i A P I t δ P 1 g i U t μ P i A H S t + 1 = P i U S t Θ i H t 1 g i H t q i H t + P i A H S t 1 δ H 1 g i H t q i H t        + P i U I t Θ i H t 1 g i H t μ + P i A H I t 1 δ H 1 g i H t μ P i A P S t + 1 = P i U S t Θ i U t g i U t + Θ i H t g i H t + Θ i P t q i P t + P i A P S t δ P g i U t + 1 δ P q i P t        + P i A H S t δ H g i U t + 1 δ H g i H t q i P t + P i U I t Θ i U t g i U t + Θ i H t g i H t + Θ i P t μ        + P i A H I t δ H g i U t + 1 δ H g i H t μ + P i A P I t δ P g i U t + 1 δ P μ P i U I t + 1 = P i U S t Θ i U t 1 g i U t 1 q i U t + P i A H S t δ H 1 g i U t 1 q i U t        + P i A P S t δ P 1 g i U t 1 q i U t + P i U I t Θ i U t 1 g i U t 1 μ        + P i A H I t δ H 1 g i U t 1 μ + P i A P I t δ P 1 g i U t 1 μ P i A H I t + 1 = P i U S t Θ i H t 1 g i H t 1 q i H t + P i A H S t 1 δ H 1 g i H t 1 q i H t        + P i U I t Θ i H t 1 g i H t 1 μ + P i A H I t 1 δ H 1 g i H t 1 μ P i A P I t + 1 = P i U S t Θ i U t g i U t + Θ i H t g i H t + Θ i P t 1 q i P t + P i A H S t δ H g i U t + 1 δ H g i H t 1 q i P t        + P i A P S t δ P g i U t + 1 δ P 1 q i P t + P i U I t Θ i U t g i U t + Θ i H t g i H t + Θ i P t 1 μ        + P i A H I t δ H g i U t + 1 δ H g i H t 1 μ + + P i A P I t δ P g i U t + 1 δ P 1 μ i 1,2 , , N
  • Scenario 3:  1 < τ i t . The transformation equations in U I , A H I , and A P I are different from that of Equation (33), represented as follows:
      P i U I t + 1 = P i U S t Θ i U t 1 g i U t 1 q i U t + P i A H S t δ H 1 g i U t 1 q i U t        + P i A P S t δ P 1 g i U t 1 q i U t + P i U I t Θ i U t 1 g i U t 1 μ        + P i A H I t δ H 1 g i U t 1 μ + P i A P I t δ P 1 g i U t 1 μ        P i U I t τ i + 1 k = t τ i + 1 t Θ i U k 1 g i U k 1 μ P i A H I t τ i + 1 k = t τ i + 1 t δ H 1 g i U k 1 μ P i A H I t + 1 = P i U S t Θ i H t 1 g i H t 1 q i H t + P i A H S t 1 δ H 1 g i H t 1 q i H t            + P i U I t Θ i H t 1 g i H t 1 μ + P i A H I t 1 δ H 1 g i H t 1 μ        P i U I t τ i + 1 k = t τ i + 1 t Θ i H k 1 g i H k 1 μ P i A H I t τ i + 1 k = t τ i + 1 t 1 δ H 1 g i H k 1 μ P i A P I t + 1 = P i U S t Θ i U t g i U t + Θ i H t g i H t + Θ i P t 1 q i P t + P i A H S t δ H g i U t + 1 δ H g i H t 1 q i P t        + P i A P S t δ P g i U t + 1 δ P 1 q i P t + P i U I t Θ i U t g i U t + Θ i H t g i H t + Θ i P t 1 μ        + P i A H I t δ H g i U t + 1 δ H g i H t 1 μ + P i A P I t δ P g i U t + 1 δ P 1 μ        + P i U I t τ i + 1 k = t τ i + 1 t Θ i U k 1 g i U k 1 μ + P i A H I t τ i + 1 k = t τ i + 1 t δ H 1 g i U k 1 μ        + P i U I t τ i + 1 k = t τ i + 1 t Θ i H k 1 g i H k 1 μ + P i A H I t τ i + 1 k = t τ i + 1 t 1 δ H 1 g i H k 1 μ ,
The risk propagation threshold β c determines whether the risk outbreaks or dies out. The epidemic threshold βc follows the rule that, if β β c , the risk will persist in the ISN, and the risk will die out [58] when β < β c .
Theorem 1.
When t , the risk propagation threshold can be expressed as follows:
  β c = μ Λ m a x H ,
where Λ m a x H  is the maximum eigenvalue of matrix H = h i j N × N  with  h i j = 1 α 1 1 Γ U P i U 1 Γ H P i H φ i j k _ s j ¯ b i j .
Proof. 
The steady state equations of each states can be written as P i X t + 1 = P i X t = P i X , where X = U S , A H S , A P S , U I , A H I , A P I . When approaches the risk propagation threshold, the proportion of infected enterprises could be assumed ε j = P j I = P j U I + P j A H I + P j A P I 1 . Therefore, Equation (32) can be approximated by q i X 1 j i b j i χ i j X ε j = 1 1 α X β j b i j φ i j k _ s j ¯ ε j , where X = U , A H , A P . In the vicinity of the propagation threshold, P i U = P i U S + P i U I P i U S , P i A P = P i A P S + P i A P I P i A P S , P i A H = P i A H S + P i A H I P i A H S . So, no matter what value τ i takes, Equations (33)–(35) can be simplified as follows:
  P i U = P i U S Θ i U 1 g i U + P i A H S δ H 1 g i U + P i A P S δ P 1 g i U P i A P = P i U S Θ i U g i U + Θ i H g i H + Θ i P + P i A P S δ P g i U + 1 δ P + P i A H S δ H g i U + 1 δ H g i H P i A H = P i U S Θ i H 1 g i H + P i A H S 1 δ H 1 g i H μ ε i = P i U S 1 α U β j b i j φ i j k _ s j ¯ ε j + P i A H S 1 α H β j b i j φ i j k _ s j ¯ ε j     + P i A H S 1 α P β j b i j φ i j k _ s j ¯ ε j ,
The fourth equation in Equation (37) can be further simplified as follows:
  j 1 α 1 1 Γ U P i U 1 Γ H P i H φ i j k _ s j ¯ b i j μ β e j i ε j = 0 ,
where e i j = 1 if i = j and e i j = 0 if i j . Therefore, the risk propagation threshold β c can be calculated via the maximum eigenvalue of matrix consist of elements h i j = 1 α 1 1 Γ U P i U 1 Γ H P i H φ i j k _ s j ¯ b i j , then Equation (36) holds. □

4. Numerical Simulation

4.1. Structural Characteristics of the Network

This section uses numerical simulation to verify the scale-free properties of the constructed multilayer hypernetwork model. When a hypernetwork (directed weighted network) has a scale-free property, the hyperdegree (degree) of the nodes satisfies a power-law distribution [36], that is, P k ~ k r . As illustrated in Figure 8, the double logarithmic coordinate images of hyperdegree, outdegree, and in-degree are presented, respectively. It is evident that a discernible linear tendency is manifest, which remains constant irrespective of variations in network size.

4.2. The Influence of Different Parameters on the Coupled Dynamics

This section investigates the impact of the parameters of the proposed U A H A P U S I S model on the scale of risk propagation through numerical experiments. All experimental results are obtained by simulating the model 50 times and taking the average. Initially, 2% of seed nodes are randomly selected as risk-infected nodes and nodes with a positive attitude toward risk. Bounded rational decision probability: λ P = 0.4 , λ H = 0.6 ; bounded rational decision forgetting rate: δ P = 0.3 , δ H = 0.3 ; risk preference: ε = 0.8 ; mass media reporting risk scale weakening factor: θ = 0.5 ; mass media information reinforcement effect: η = 4 ; global perception ratio control factor: K = 0.4 ; risk perception ability: α = 0.6 ; perception capacity decay factor: Γ U = 0.1 , Γ H = 0.6 ; risk recovery rate: μ = 0.3 ; mean of the risk incubation period function: v = 2 . (The setting of parameter values is mainly referred to: [17,18,19,59,60]. Unless otherwise specified, all assumptions and parameters remain unchanged).
Firstly, the present paper employs the MMCA and Monte Carlo (MC) simulations to analyze the changing trends in the proportions of enterprises in different states during the risk propagation process based on the above parameter values. In the context of the MC simulation, ρ X = N X N , X = U , A H , A P , S , I where N X and N represent the number of X-state enterprises and total number of nodes, respectively. In the context of MMCA, ρ X = i = 1 n P i x N , X = U , A H , A P , S , I , where P i X is the probability of node v i being in each state. As illustrated in Figure 9, the steady-state values of ρ I , ρ A P , and ρ A H were obtained through MMCA and MC simulations, respectively. The simulation results of the two methods show close agreement, indicating that MMCA is a highly effective theoretical framework for studying coupled dynamics in multiplexed networks. Consequently, all subsequent numerical simulations will utilize MMCA.
This paper compares the adaptive propagation model with the most commonly used global propagation based on the reaction process (RP) and local propagation based on the contact process (CP) in hypergraphs, with a basic infection probability of β = 0.6 . The results are shown in Figure 10a. At each time step, CP randomly selects only one hyperedge, RP propagates to all hyperedges, and AD propagates adaptively based on the weight values of the hyperedges. Therefore, CP has the smallest scale, RP has the largest scale, and AD falls between the two. Figure 10b illustrates the differences in the proportion of infected enterprises between the CP and AD models (CP-AD) and between the RP and AD models (RP-AD) at different β values (from 0 to 1, with a step size of 0.05). The results clearly show that the difference between RP and AD first increases and then decreases with the increase in beta. The difference between CP and AD shows two trends of first increasing and then decreasing with the increase in beta, and the difference between CP and AD is smaller than that between RP and AD. The experimental results are consistent with previous studies [20], confirming the validity of the experimental results and further validating the applicability of the adaptive model.
In the following section, the focus is on an examination of the impact of other parameters on risk propagation in industrial symbiosis networks.
As illustrated in Figure 11, the effects of media reporting risk scale attenuation factor θ and risk propagation rate β on the steady-state values of ρ I , ρ A H , and ρ A P are demonstrated. As the parameter θ increases, the risk scale ρ I undergoes a gradual decrease, the risk-positive attitude ρ A P undergoes a gradual increase, and the risk hesitation state ρ A H undergoes a gradual decrease. This is because the greater the risk scale attenuation factor θ , the closer the risk scale and severity portrayed in mass media reports align with real-world risk levels. This enables symbiotic enterprises to rationally assess risk threats and implement appropriate risk prevention measures, thereby minimizing the probability of risk contagion. Furthermore, it can be observed that changes in θ do not affect the risk propagation threshold β c , which is consistent with the conclusion of Theorem 1. This serves to further validate the accuracy of the proposed model.
Figure 12 shows the impact of bounded rational decision probabilities λ H , λ P , and mass media reporting attenuation factor θ on ρ I , ρ A P , and ρ A H at the steady state. With basic risk propagation rate fixed β at 0.3, λ H and λ P are varied from 0 to 1. As can be observed from Figure 12a, when λ H is fixed to any value in [ 0,1 ] , the gradual increase in λ P leads to a decrease in ρ I . This is because a larger λ P can trigger the rapid spread of positive risk attitudes (Figure 12c), while the spread of opposing hesitant risk attitudes is suppressed to some extent (Figure 12e). When λ P is large, the proportion of individuals with positive risk attitudes in the steady state is higher, leading to more companies adopting efficient self-protection measures to reduce the probability of being exposed to risk.
On the other hand, as shown in Figure 12a, when the value of λ P is fixed, the effect of λ H on ρ I can be divided into two distinct cases. When λ P is less than 0.1, ρ I does not increase with an increase in λ H but instead shows a decreasing trend. There are two main reasons for this phenomenon. First, when λ P is small ( λ P < 0.1 ), the risk-positive attitude view is difficult to spread (Figure 12c), and risk propagation is almost unaffected by positive attitudes. Second, as λ H increases, an increasing number of firms in state U S receive risk information and shift to a risk-hesitant attitude (Figure 12e), but in the absence of effective positive information propagation, this phenomenon can still suppress risk propagation to some extent. However, when λ P > 0.1 , an inversion phenomenon occurs, where the ρ I increases with increasing λ H . In particular, this phenomenon becomes more pronounced when λ P is large, as a larger λ H creates a greater barrier to the spread of positive risk attitudes (Figure 12c). Overall, enhancing the probability of bounded rationality decision-making serves as a crucial means for effective risk control. This finding aligns with the prevailing principles of risk management within ISN, similar to the risk prevention and control mechanisms within the Kalundborg industrial symbiosis system, where enterprises establish effective risk buffering systems through information sharing and coordinated action.
In Figure 12b,d,f, the change trend of ρ I , ρ A P , and ρ A H with λ H and λ P is similar to that in Figure 12a,c,e. The difference lies in the fact that as θ increases, the risk scale ρ I gradually decreases, the proportion of companies with a positive attitude towards risk ρ A P gradually increases, and the proportion of companies in a state of risk hesitation ρ A H gradually decreases. This difference can be attributed to the impact of mass media and crowd effects on risk propagation. When more and more unaware and hesitant companies decide to take effective self-protection measures through the influence of mass media and crowd effects, the risk will be further controlled. This further validates the accuracy of Figure 11 and provides a reference framework for managing risks within real-world ISN.
Figure 13 shows the effects of bounded rational decision forgetting rates δ H , δ P and mass media reporting attenuation factor θ on ρ I , ρ A P , and ρ A H at the steady state. With basic risk propagation rate fixed β at 0.3, δ H and δ P are varied from 0 to 1. As illustrated in Figure 13a, when the parameter δ H is assigned a value within the range [ 0,1 ] , the subsequent rise in δ P results in an increase in the density of ρ I .This is because a larger δ P causes the rapid disappearance of risk-positive attitudes (Figure 13c), resulting in a lower proportion of individuals with risk-positive attitudes in the steady state, making firms more exposed to risk.
On the other hand, when the value of δ P is fixed, the effect of δ H on density ρ I exhibits two distinct scenarios. When δ P < 0.15 , the density ρ I decreases as δ H increases. There are two main reasons for this. First, when δ P < 0.15 , a larger proportion of firms hold risk-positive attitudes and are less likely to forget them. By spreading these attitudes to neighboring firms, an increasing number of firms adopt efficient self-protection measures to address risks (Figure 13c). Second, when δ P < 0.15 , as δ H increases, the reduction in the proportion of risk-hesitant firms is smaller compared to when δ P is larger (Figure 13e), meaning this change does not affect risk propagation. However, when δ P > 0.15 , a reversal occurs, where density ρ I increases as δ H increases.
In Figure 13b,d,f, the change trend of ρ I , ρ A P , and ρ A H with δ H and δ P is similar to that in Figure 13a,c,e. The difference lies in the fact that as θ increases, ρ I gradually decreases, ρ A P gradually increases, and ρ A H gradually decreases. This once again verifies the accuracy of Figure 11. This simulation outcome demonstrates intrinsic consistency with the risk coordination and prevention mechanisms observed in real-world ISN. Through efficient information exchange (corresponding to higher λ P and λ H values) and sustained maintenance of safety protocols (corresponding to lower δ H and δ P values), enterprises achieve systematic risk mitigation. The conclusions provide a theoretical framework for further understanding risk governance within actual ISN.
Figure 14 analyses the impact of risk perception ability α and risk propagation rate β on ρ I at steady state, and shows the changes under different mass media reporting attenuation factors θ and different perception ability decay factors ( Γ U , Γ H ). As shown in Figure 14a, as α increases, the scale of risk propagation decreases and the risk propagation threshold increases. This is because an enterprise’s risk perception capability determines its risk admission rate. As more enterprises develop higher risk perception capabilities, the risk admission rate decreases during risk propagation in ISN, making it difficult for risks to escalate within the system. Additionally, when the propagation rate β is high, enhancing an enterprise’s risk perception capability can effectively control the scale of risk propagation. As shown in Figure 14b, for any given set of α and β , an increase in θ reduces the infection density ρ I . Therefore, simultaneously enhancing firms’ risk perception capabilities and improving the timeliness and accuracy of mass media reporting can effectively suppress risk propagation.
Figure 14c,d provide a detailed analysis of the impact of risk perception decay factors ( Γ U , Γ H ) on the scale of risk propagation ρ I , where Γ U and Γ H represent the perception decay coefficients for firms unaware of the risk and those maintaining a hesitant attitude toward the risk, respectively. As shown in Figure 14c, a decrease in Γ U and Γ H increases the scale of risk propagation and lowers the risk propagation threshold. This is primarily because enterprises’ risk perception capabilities have decreased, leading to an increase in the risk acceptance rate of susceptible enterprises, making them more prone to risk exposure. As shown in Figure 14c, as the infection probability β increases, the influence of Γ U and Γ H on the risk scale ρ I diminishes. This is mainly because, under the influence of mass media and crowd effects, when β increases, the rise in the number of infected individuals further promotes the spread of positive attitudes toward risk, thereby suppressing the proportion of companies that are unaware of risks or have hesitant attitudes toward risks to some extent, leading to a reduction in the effect of ( Γ U , Γ H ). Figure 14d shows the impact of risk perception ability α and risk transmission rate β on risk scale ρ I under different conditions of Γ U and Γ H when θ is fixed at 0.5, with the trend consistent with the above.
This finding aligns closely with the operational logic of mature industrial symbiosis systems. Taking the Kalundborg industrial symbiosis system as an example, its symbiotic enterprises have significantly enhanced their capacity for early identification and response to potential risks by establishing robust environmental monitoring and information-sharing mechanisms (equivalent to increasing α ). This has effectively prevented the diffusion and amplification of risks.
Figure 15 shows the impact of risk recovery capacity μ and risk propagation rate β on ρ I at the stable state, with θ = 0.5 . As can be observed from Figure 15a, ρ I decreases significantly as μ increases, and the risk propagation threshold increases significantly. Furthermore, when the propagation rate β is high, enhancing a company’s risk resilience can effectively control the scale of risk propagation. A company’s risk resilience is a key indicator for measuring its ability to quickly resume normal operations and minimize losses following a risk event. As μ increases, companies can more efficiently reduce risk exposure time and optimize resource allocation, thereby significantly lowering the proportion of infected companies in the system. Figure 15b draws a phase diagram of the proportion of infected enterprises changing with risk recovery capacity μ and risk propagation rate β .
Therefore, enhancing a company’s risk recovery capability not only reduces direct losses but also effectively suppresses risk diffusion within the symbiotic network, ultimately lowering the proportion of companies at risk of infection. Enterprises may systematically enhance their risk recovery capabilities and overall resilience through multi-dimensional strategies, including establishing redundant resources and backup systems, strengthening intelligent risk monitoring and response mechanisms, and improving risk adaptation capacity. This mechanism validates the core role of risk recovery capability within a company’s risk management system and provides a theoretical basis for optimizing risk response strategies.

5. Conclusions

The exchange of resources or by-products between enterprises in industrial symbiosis networks forms a coupled industrial ecological chain, promotes waste recycling, and balances the conflict between ecological protection and economic development. However, in the development of industrial symbiosis systems, various internal and external risk factors will inevitably lead to the spread of risk within the system. In this paper, we propose a coupled directed weighted multi-layer hypernetwork model to characterize the complex interaction between bounded rational decisions and risk propagation in enterprises under the influence of mass media and crowd effects.
This paper uses a time-varying adaptive hypernetwork model to simulate the formation process of bounded rational decisions made by enterprises in a symbiotic network and develops a risk propagation process that takes into account the degree of symbiotic dependence and k-shells. The constructed multi-layer hypernetwork evolution model has a scale-free characteristic and is very similar to a real network. This paper summarizes the role of mass media as a decision function and takes into account the crowd effect. In the process of enterprise risk state transformation, it innovatively introduces the latent period assumption of bounded rational decision-making and uses the Microscopic Markov Chain Approach to conduct theoretical analysis and numerical simulation of coupled dynamics. The proposed hypernetwork evolution model is theoretically derived with hyperdegree changes, combining theory and experiment to make the research more accurate and complete.
This study conducted an in-depth analysis of the risk diffusion mechanism in industrial symbiosis networks and drew the following important conclusions and management implications:
  • Enhancing companies’ willingness to take proactive risk response measures is a key foundation. This requires the establishment of effective mechanisms and evaluation systems, as well as regular training and case reviews to reduce companies’ forgetfulness regarding proactive risk attitudes, ensuring that risk prevention awareness continues to play an effective role.
  • Enhancing enterprises’ risk perception capabilities is the first line of defense against risk diffusion. This can be achieved by deploying intelligent monitoring systems, establishing risk warning models, and improving information sharing mechanisms, enabling enterprises to identify potential risks earlier and more accurately.
  • Improving enterprises’ risk recovery capabilities is the core means of controlling the scope of risk impact. This requires establishing comprehensive emergency response plans, stockpiling critical resources, and optimizing organizational response processes to reduce risk resolution time and minimize losses.
  • The timeliness and accuracy of mass media reporting play a significant regulatory role in risk propagation. A mechanism for information coordination between media and enterprises should be established to ensure the rapid dissemination of authoritative information and avoid the risk amplification effect caused by information distortion.
Overall, risk management in industrial symbiosis networks requires the establishment of a collaborative prevention and control system that organically combines technical means (such as big data analysis) with management innovation (such as cross-enterprise collaboration) to effectively enhance the overall resilience of the network. Future research can further explore the synergistic mechanisms of various elements in different industry contexts, as well as the in-depth application of digital technologies in risk prevention and control, to provide theoretical support and practical guidance for the construction of a safer industrial symbiosis system.

Author Contributions

Conceptualization, Y.Z.; methodology, Y.Z.; software, Y.Z.; validation, Y.Z.; formal analysis, Y.Z.; resources, Z.W.; data curation, Y.Z. and Z.W.; writing—original draft preparation, Y.Z.; writing—review and editing, Y.Z., Z.W., S.X. and P.W.; visualization, Y.Z.; supervision, Z.W., S.X. and P.W.; project administration, Z.W.; funding acquisition, P.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Fundamental Research Funds for the Central Universities, grant number N2406015.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MMCAMicroscopic Markov Chain Approach
MCMonte Carlo
ISNIndustrial symbiosis network
ISIndustrial symbiosis

References

  1. Chertow, M.R. Industrial Symbiosis: Literature and Taxonomy. Annu. Rev. Energy Environ. 2000, 25, 313–337. [Google Scholar] [CrossRef]
  2. Lombardi, D.R.; Laybourn, P. Redefining Industrial Symbiosis: Crossing Academic–Practitioner Boundaries. J. Ind. Ecol. 2012, 16, 28–37. [Google Scholar] [CrossRef]
  3. Mantese, G.C.; Amaral, D.C. Agent-Based Simulation to Evaluate and Categorize Industrial Symbiosis Indicators. J. Clean. Prod. 2018, 186, 450–464. [Google Scholar] [CrossRef]
  4. Huang, B.; Yong, G.; Zhao, J.; Domenech, T.; Liu, Z.; Chiu, S.F.; McDowall, W.; Bleischwitz, R.; Liu, J.; Yao, Y. Review of the Development of China’s Eco-Industrial Park Standard System. Resour. Conserv. Recycl. 2019, 140, 137–144. [Google Scholar] [CrossRef]
  5. Liu, Z.; Adams, M.; Cote, R.P.; Geng, Y.; Ren, J.; Chen, Q.; Liu, W.; Zhu, X. Co-Benefits Accounting for the Implementation of Eco-Industrial Development Strategies in the Scale of Industrial Park Based on Emergy Analysis. Renew. Sustain. Energy Rev. 2018, 81, 1522–1529. [Google Scholar] [CrossRef]
  6. Wan, Z.; Su, Y.; Li, Z.; Zhang, X.; Zhang, Q.; Chen, J. Analysis of the Impact of Suez Canal Blockage on the Global Shipping Network. Ocean. Coast. Manag. 2023, 245, 106868. [Google Scholar] [CrossRef]
  7. Jacobsen, N.B. Industrial Symbiosis in Kalundborg, Denmark: A Quantitative Assessment of Economic and Environmental Aspects. J. Ind. Ecol. 2006, 10, 239–255. [Google Scholar] [CrossRef]
  8. Wang, Y.; Sun, Z.; Li, P.; Zhu, Z. Small World and Stability Analysis of Industrial Coupling Symbiosis Network of Ecological Industrial Park of Oil and Gas Resource Cities. Energy Explor. Exploit. 2021, 39, 853–868. [Google Scholar] [CrossRef]
  9. Gallese, V.; Mastrogiorgio, A.; Petracca, E.; Viale, R. Embodied Bounded Rationality. In Routledge Handbook of Bounded Rationality; Viale, R., Ed.; Routledge: London, UK, 2020; pp. 377–390. ISBN 978-1-315-65835-3. [Google Scholar]
  10. Petracca, E. Embodying Bounded Rationality: From Embodied Bounded Rationality to Embodied Rationality. Front. Psychol. 2021, 12, 710607. [Google Scholar] [CrossRef]
  11. Simon, H. Administrative Behavior; a Study of Decision-Making Processes in Administrative Organization; Macmillan: New York, NY, USA, 1947. [Google Scholar]
  12. Song, Y.; Yang, N.; Zhang, Y.; Wang, J. Suppressing Risk Propagation in R&D Networks: The Role of Government Intervention. Chin. Manag. Stud. 2019, 13, 1019–1043. [Google Scholar] [CrossRef]
  13. TAO, Y.; Morgan, D.; Evans, S. How Policies Influence the Implementation of Industrial Symbiosis: A Comparison between UK and China. Asian J. Manag. Sci. Appl. 2015, 2, 1. [Google Scholar] [CrossRef]
  14. Li, X.; Xiao, R. Analyzing Network Topological Characteristics of Eco-Industrial Parks from the Perspective of Resilience: A Case Study. Ecol. Indic. 2017, 74, 403–413. [Google Scholar] [CrossRef]
  15. Wang, D.; Li, J.; Wang, Y.; Wan, K.; Song, X.; Liu, Y. Comparing the Vulnerability of Different Coal Industrial Symbiosis Networks under Economic Fluctuations. J. Clean. Prod. 2017, 149, 636–652. [Google Scholar] [CrossRef]
  16. Wu, J.; Pu, G.; Ma, Q.; Qi, H.; Wang, R. Quantitative Environmental Risk Assessment for the Iron and Steel Industrial Symbiosis Network. J. Clean. Prod. 2017, 157, 106–117. [Google Scholar] [CrossRef]
  17. Shan, H.; Guo, Q.; Wei, J. The Impact of Disclosure of Risk Information on Risk Propagation in the Industrial Symbiosis Network. Environ. Sci. Pollut. Res. 2023, 30, 45986–46003. [Google Scholar] [CrossRef]
  18. Shan, H.; Liang, J.; Pi, W. The Impact of Risk Sharing on Risk Propagation in Multiplex Networks: A Dynamic Simulation on Industrial Symbiosis. Phys. Lett. A 2025, 529, 130110. [Google Scholar] [CrossRef]
  19. Yu, P.; Wang, P.; Wang, Z.; Wang, J. Supply Chain Risk Diffusion Model Considering Multi-Factor Influences under Hypernetwork Vision. Sustainability 2022, 14, 8420. [Google Scholar] [CrossRef]
  20. Pan, Q.; Wang, Z.; Wang, H.; Tang, J. Adaptive Dissemination Process in Weighted Hypergraphs. Expert. Syst. Appl. 2025, 268, 126340. [Google Scholar] [CrossRef]
  21. Kuznetsova, E.; Louhichi, R.; Zio, E.; Farel, R. Input-Output Inoperability Model for the Risk Analysis of Eco-Industrial Parks. J. Clean. Prod. 2017, 164, 779–792. [Google Scholar] [CrossRef]
  22. Zhang, X.; Chai, L. Structural Features and Evolutionary Mechanisms of Industrial Symbiosis Networks: Comparable Analyses of Two Different Cases. J. Clean. Prod. 2019, 213, 528–539. [Google Scholar] [CrossRef]
  23. Guo, J.-L.; Zhu, X.-Y.; Suo, Q.; Forrest, J. Non-Uniform Evolving Hypergraphs and Weighted Evolving Hypergraphs. Sci. Rep. 2016, 6, 36648. [Google Scholar] [CrossRef] [PubMed]
  24. Yook, S.H.; Jeong, H.; Barabási, A.-L.; Tu, Y. Weighted Evolving Networks. Phys. Rev. Lett. 2001, 86, 5835–5838. [Google Scholar] [CrossRef]
  25. Barrat, A.; Barthélemy, M.; Pastor-Satorras, R.; Vespignani, A. The Architecture of Complex Weighted Networks. Proc. Natl. Acad. Sci. USA 2004, 101, 3747–3752. [Google Scholar] [CrossRef]
  26. Soto, J.E.; Hernández, C.; Figueroa, M. JACC-FPGA: A Hardware Accelerator for Jaccard Similarity Estimation Using FPGAs in the Cloud. Future Gener. Comput. Syst. 2023, 138, 26–42. [Google Scholar] [CrossRef]
  27. Panda, A.; Paul, A. Genetic Divergence in French Bean Accessions. Legume Res. Int. J. 2025, 48, 376–384. [Google Scholar] [CrossRef]
  28. Cekic, E.; Pinar, E.; Pinar, M.; Dagcinar, A. Deep Learning-Assisted Segmentation and Classification of Brain Tumor Types on Magnetic Resonance and Surgical Microscope Images. World Neurosurg. 2024, 182, e196–e204. [Google Scholar] [CrossRef]
  29. Al-antari, M.A.; Al-masni, M.A.; Choi, M.-T.; Han, S.-M.; Kim, T.-S. A Fully Integrated Computer-Aided Diagnosis System for Digital X-Ray Mammograms via Deep Learning Detection, Segmentation, and Classification. Int. J. Med. Inform. 2018, 117, 44–54. [Google Scholar] [CrossRef] [PubMed]
  30. Nandini, Y.V.; Jaya Lakshmi, T.; Krishna Enduri, M.; Zairul Mazwan Jilani, M. Link Prediction in Complex Hyper-Networks Leveraging HyperCentrality. IEEE Access 2025, 13, 12239–12254. [Google Scholar] [CrossRef]
  31. Fu, L.; Ma, G.; Dou, Z.; Bai, Y.; Zhao, X. Local Balance and Information Aggregation: A Method for Identifying Central Influencers in Networks. Appl. Sci. 2025, 15, 2478. [Google Scholar] [CrossRef]
  32. Verma, K.L. Thermoelastic Symmetric and Antisymmetric Wave Modes with Trigonometric Functions in Laminated Plates. Int. J. Mech. Mater. Eng. 2014, 9, 4. [Google Scholar] [CrossRef]
  33. Wang, J.; Li, C.; Xia, C. Improved Centrality Indicators to Characterize the Nodal Spreading Capability in Complex Networks. Appl. Math. Comput. 2018, 334, 388–400. [Google Scholar] [CrossRef]
  34. Li, C.; Wang, L.; Sun, S.; Xia, C. Identification of Influential Spreaders Based on Classified Neighbors in Real-World Complex Networks. Appl. Math. Comput. 2018, 320, 512–523. [Google Scholar] [CrossRef]
  35. Barrat, A.; Barthélemy, M.; Vespignani, A. Modeling the Evolution of Weighted Networks. Phys. Rev. E 2004, 70, 066149. [Google Scholar] [CrossRef] [PubMed]
  36. Barabási, A.-L.; Albert, R. Emergence of Scaling in Random Networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [PubMed]
  37. Barrat, A.; Barthélemy, M.; Vespignani, A. Weighted Evolving Networks: Coupling Topology and Weight Dynamics. Phys. Rev. Lett. 2004, 92, 228701. [Google Scholar] [CrossRef] [PubMed]
  38. Hong, Z.; Zhou, H.; Wang, Z.; Yin, Q.; Liu, J. Coupled Propagation Dynamics of Information and Infectious Disease on Two-Layer Complex Networks with Simplices. Mathematics 2023, 11, 4904. [Google Scholar] [CrossRef]
  39. Wang, J.; Hu, R.; Xu, H. Coupled Simultaneous Evolution of Policy, Enterprise Innovation Awareness, and Technology Diffusion in Multiplex Networks. Mathematics 2024, 12, 2078. [Google Scholar] [CrossRef]
  40. Wang, J.; Wang, Z.; Yu, P.; Xu, Z. The Impact of Different Strategy Update Mechanisms on Information Dissemination under Hyper Network Vision. Commun. Nonlinear Sci. Numer. Simul. 2022, 113, 106585. [Google Scholar] [CrossRef]
  41. Xu, X.-J.; He, S.; Zhang, L.-J. Dynamics of the Threshold Model on Hypergraphs. Chaos Interdiscip. J. Nonlinear Sci. 2022, 32, 023125. [Google Scholar] [CrossRef]
  42. Xu, H.; Zhang, Y.; Jin, X.; Wang, J.; Wang, Z. The Evolution of Cooperation in Multigames with Uniform Random Hypergraphs. Mathematics 2023, 11, 2409. [Google Scholar] [CrossRef]
  43. Zhang, Z.; Mei, X.; Jiang, H.; Luo, X.; Xia, Y. Dynamical Analysis of Hyper-SIR Rumor Spreading Model. Appl. Math. Comput. 2023, 446, 127887. [Google Scholar] [CrossRef]
  44. Liu, S.; Zhao, D.; Sun, Y. Effects of Higher-Order Interactions and Impulsive Vaccination for Rumor Propagation. Chaos Interdiscip. J. Nonlinear Sci. 2024, 34, 123131. [Google Scholar] [CrossRef]
  45. Wu, Q.; Fu, X.; Zhang, H.; Small, M. Oscillations and phase transition in the mean infection rate of a finite population. Int. J. Mod. Phys. C 2010, 21, 1207–1215. [Google Scholar] [CrossRef]
  46. Loder, J.; Rinscheid, A.; Wüstenhagen, R. Why Do (Some) German Car Manufacturers Go Electric? The Role of Dynamic Capabilities and Cognitive Frames. Bus. Strat. Environ. 2024, 33, 1129–1143. [Google Scholar] [CrossRef]
  47. Wang, K.-L.; Wu, C.-X.; Ai, J.; Su, Z. Complex Network Centrality Method Based on Multi-Order K-Shell Vector. Acta Phys. Sin. 2019, 68, 196402. [Google Scholar] [CrossRef]
  48. Zhou, B.; Lv, Y.; Mao, Y.; Wang, J.; Yu, S.; Xuan, Q. The Robustness of Graph K-Shell Structure Under Adversarial Attacks. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 1797–1801. [Google Scholar] [CrossRef]
  49. Choi, J.; Lim, J.; Bok, K.; Yoo, J. User Influence Determination using k-shell Decomposition in Social Networks. J. Korea Contents Assoc. 2022, 22, 46–54. [Google Scholar] [CrossRef]
  50. Kitsak, M.; Gallos, L.K.; Havlin, S.; Liljeros, F.; Muchnik, L.; Stanley, H.E.; Makse, H.A. Identification of Influential Spreaders in Complex Networks. Nat. Phys. 2010, 6, 888–893. [Google Scholar] [CrossRef]
  51. Pei, S.; Muchnik, L.; Andrade, J.; Zheng, Z.; Makse, H.A. Searching for Superspreaders of Information in Real-World Social Media. Sci. Rep. 2014, 4, 5547. [Google Scholar] [CrossRef] [PubMed]
  52. Jiang, J.; Dai, J. Time and Risk Perceptions Mediate the Causal Impact of Objective Delay on Delay Discounting: An Experimental Examination of the Implicit-Risk Hypothesis. Psychon. Bull. Rev. 2021, 28, 1399–1412. [Google Scholar] [CrossRef] [PubMed]
  53. Perrucci, D.V.; Aktaş, C.B.; Sorentino, J.; Akanbi, H.; Curabba, J. A Review of International Eco-Industrial Parks for Implementation Success in the United States. City Environ. Interact. 2022, 16, 100086. [Google Scholar] [CrossRef]
  54. Shen, A.-Z.; Guo, J.-L.; Suo, Q. Study of the Variable Growth Hypernetworks Influence on the Scaling Law. Chaos Solitons Fractals 2017, 97, 84–89. [Google Scholar] [CrossRef]
  55. Shen, A.-Z.; Guo, J.-L.; Wu, G.-L.; Jia, S.-W. The Agglomeration Phenomenon Influence on the Scaling Law of the Scientific Collaboration System. Chaos Solitons Fractals 2018, 114, 461–467. [Google Scholar] [CrossRef]
  56. Granell, C.; Gómez, S.; Arenas, A. Dynamical Interplay between Awareness and Epidemic Spreading in Multiplex Networks. Phys. Rev. Lett. 2013, 111, 128701. [Google Scholar] [CrossRef]
  57. Granell, C.; Gómez, S.; Arenas, A. Competing Spreading Processes on Multiplex Networks: Awareness and Epidemics. Phys. Rev. E 2014, 90, 012808. [Google Scholar] [CrossRef] [PubMed]
  58. Lv, S.; Wen, J.; Zhang, X. MPPINet: Multipath Permittivity Inversion Network for Tree Roots Ground-Penetrating Radar Image Recognition. IEEE Trans. Instrum. Meas. 2024, 73, 1–14. [Google Scholar] [CrossRef]
  59. Yu, P.; Wang, Z.; Sun, Y.; Wang, P. Risk Diffusion and Control under Uncertain Information Based on Hypernetwork. Mathematics 2022, 10, 4344. [Google Scholar] [CrossRef]
  60. Zhang, Z.; Zhu, K.; Wang, F. Indirect Information Propagation Model with Time-Delay Effect on Multiplex Networks. Chaos Solitons Fractals 2025, 192, 115936. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of the directed weighted multilayer hypernetwork model. Node M represents the Mass media, which is connected to every node in the network and influences the bounded rational decision-making process. The top layer corresponds to the transmission of risk information on social networks. There are three types of bounded rational decisions made by enterprises: unaware ( U ), aware and hesitant ( A H ), and aware and positive ( A P ). The middle layer represents that each node can obtain risk information from mass media reports, and each node is known ( K ). The bottom layer represents the risk propagation layer, where nodes have two states: susceptible ( S ) and infected ( I ).
Figure 1. Schematic diagram of the directed weighted multilayer hypernetwork model. Node M represents the Mass media, which is connected to every node in the network and influences the bounded rational decision-making process. The top layer corresponds to the transmission of risk information on social networks. There are three types of bounded rational decisions made by enterprises: unaware ( U ), aware and hesitant ( A H ), and aware and positive ( A P ). The middle layer represents that each node can obtain risk information from mass media reports, and each node is known ( K ). The bottom layer represents the risk propagation layer, where nodes have two states: susceptible ( S ) and infected ( I ).
Mathematics 13 03010 g001
Figure 2. Schematic diagram of the hypernetwork construction process from time t to t + 2 . The hypernetwork construction involves three operations: add nodes, add hyperedges, and reconnect hyperedges. Solid black lines represent existing hyperedges. Dashed black lines represent hyperedges removed during the reconnecting process. Dashed blue lines represent new hyperedges formed by newly added batches of nodes. Purple nodes represent the new node batches that have been added. The green nodes represent the nodes randomly selected when adding or reconnecting the hyperedge. The pink nodes represent the selected existing nodes.
Figure 2. Schematic diagram of the hypernetwork construction process from time t to t + 2 . The hypernetwork construction involves three operations: add nodes, add hyperedges, and reconnect hyperedges. Solid black lines represent existing hyperedges. Dashed black lines represent hyperedges removed during the reconnecting process. Dashed blue lines represent new hyperedges formed by newly added batches of nodes. Purple nodes represent the new node batches that have been added. The green nodes represent the nodes randomly selected when adding or reconnecting the hyperedge. The pink nodes represent the selected existing nodes.
Mathematics 13 03010 g002
Figure 3. Schematic diagram of state transitions in the coupled dynamics model.
Figure 3. Schematic diagram of state transitions in the coupled dynamics model.
Mathematics 13 03010 g003
Figure 4. Schematic diagram of state transitions from t to t + 1 according to the time-varying adaptive propagation rule. Node states are categorized as: unaware (blue), aware and hesitant (orange), and aware and positive (red). Panel (a) shows the time-varying process of the hypernetwork, where solid red lines denote newly added hyperedges and dashed blue lines represent removed hyperedges. Panel (b) illustrates the state transition under the adaptive propagation rule ( v 7 is located on hyperedges e 1 and e 4 , the active hyperedge e 1 is selected based on the probability shown in Equation (10), and information is exchanged with the neighboring nodes in e 1 , ultimately changing the state of node v 3 . Node v 5 is similar to).
Figure 4. Schematic diagram of state transitions from t to t + 1 according to the time-varying adaptive propagation rule. Node states are categorized as: unaware (blue), aware and hesitant (orange), and aware and positive (red). Panel (a) shows the time-varying process of the hypernetwork, where solid red lines denote newly added hyperedges and dashed blue lines represent removed hyperedges. Panel (b) illustrates the state transition under the adaptive propagation rule ( v 7 is located on hyperedges e 1 and e 4 , the active hyperedge e 1 is selected based on the probability shown in Equation (10), and information is exchanged with the neighboring nodes in e 1 , ultimately changing the state of node v 3 . Node v 5 is similar to).
Mathematics 13 03010 g004
Figure 5. The influence of mass media and crowd effects on bounded rational decision-making processes. Node M represents the Mass media. At time t , the unaware nodes v 1 and v 2 (blue) receive the risk information transmitted by the mass media. The thickness of the green dotted line represents the strength of the reinforcement effect of the mass media information. Nodes v 3 , v 4 , and v 5 with risk hesitant attitude (orange), in addition to receiving risk information transmitted by mass media (green dashed line), are also affected by the number of surrounding symbiotic partners with positive risk attitude, namely crowd effect (blue dashed line). At time t + 1 , the unaware node v 1 and the risk hesitant attitude node v 5 become risk-positive (red).
Figure 5. The influence of mass media and crowd effects on bounded rational decision-making processes. Node M represents the Mass media. At time t , the unaware nodes v 1 and v 2 (blue) receive the risk information transmitted by the mass media. The thickness of the green dotted line represents the strength of the reinforcement effect of the mass media information. Nodes v 3 , v 4 , and v 5 with risk hesitant attitude (orange), in addition to receiving risk information transmitted by mass media (green dashed line), are also affected by the number of surrounding symbiotic partners with positive risk attitude, namely crowd effect (blue dashed line). At time t + 1 , the unaware node v 1 and the risk hesitant attitude node v 5 become risk-positive (red).
Mathematics 13 03010 g005
Figure 6. State transition probability tree when τ i 1 .
Figure 6. State transition probability tree when τ i 1 .
Mathematics 13 03010 g006
Figure 7. State transition probability tree when 1 < t < τ i (excluding the red dotted arrow) and 1 < τ i t (including the red dotted arrow).
Figure 7. State transition probability tree when 1 < t < τ i (excluding the red dotted arrow) and 1 < τ i t (including the red dotted arrow).
Mathematics 13 03010 g007
Figure 8. Structural characteristics of the network.
Figure 8. Structural characteristics of the network.
Mathematics 13 03010 g008
Figure 9. Comparison of experimental results obtained by MMCA and MC.
Figure 9. Comparison of experimental results obtained by MMCA and MC.
Mathematics 13 03010 g009
Figure 10. (a) Comparison of infection scale ρ I under different transmission models. (b) The differences in the ρ I between the CP and AD models (CP-AD) and between the RP and AD models (RP-AD) at different β .
Figure 10. (a) Comparison of infection scale ρ I under different transmission models. (b) The differences in the ρ I between the CP and AD models (CP-AD) and between the RP and AD models (RP-AD) at different β .
Mathematics 13 03010 g010
Figure 11. Effect of media reporting risk scale attenuation factor θ and risk propagation rate β on density ρ I , ρ A P , ρ A H . (a) The evolution trend of ρ I with increasing β under different θ . (b) The evolution trend of ρ A P with increasing β under different θ . (c) The evolution trend of ρ A H with increasing β under different θ .
Figure 11. Effect of media reporting risk scale attenuation factor θ and risk propagation rate β on density ρ I , ρ A P , ρ A H . (a) The evolution trend of ρ I with increasing β under different θ . (b) The evolution trend of ρ A P with increasing β under different θ . (c) The evolution trend of ρ A H with increasing β under different θ .
Mathematics 13 03010 g011
Figure 12. Effect of the impact of bounded rational decision probabilities λ H , λ P and mass media reporting attenuation factor θ on ρ I , ρ A P , ρ A H at the steady state. (a) Dependence of ρ I on λ H , λ P when θ = 0.5 . (b) Dependence of ρ I on λ H , λ P under different θ . (c) Dependence of ρ A P on λ H , λ P when θ = 0.5 . (d) Dependence of ρ A P on λ H , λ P under different θ . (e) Dependence of ρ A H on λ H , λ P when θ = 0.5 . (f) Dependence of ρ A H on λ H , λ P under different θ .
Figure 12. Effect of the impact of bounded rational decision probabilities λ H , λ P and mass media reporting attenuation factor θ on ρ I , ρ A P , ρ A H at the steady state. (a) Dependence of ρ I on λ H , λ P when θ = 0.5 . (b) Dependence of ρ I on λ H , λ P under different θ . (c) Dependence of ρ A P on λ H , λ P when θ = 0.5 . (d) Dependence of ρ A P on λ H , λ P under different θ . (e) Dependence of ρ A H on λ H , λ P when θ = 0.5 . (f) Dependence of ρ A H on λ H , λ P under different θ .
Mathematics 13 03010 g012aMathematics 13 03010 g012b
Figure 13. Effect of the bounded rational decision forgetting rates δ H , δ P and mass media reporting attenuation factor θ on ρ I , ρ A P , ρ A H at the steady state. (a) Dependence of ρ I on δ H , δ P when θ = 0.5 . (b) Dependence of ρ I on δ H , δ P under different θ . (c) Dependence of ρ A P on δ H , δ P when θ = 0.5 . (d) Dependence of ρ A P on δ H , δ P under different θ . (e) Dependence of ρ A H on δ H , δ P when θ = 0.5 . (f) Dependence of ρ A H on δ H , δ P under different θ .
Figure 13. Effect of the bounded rational decision forgetting rates δ H , δ P and mass media reporting attenuation factor θ on ρ I , ρ A P , ρ A H at the steady state. (a) Dependence of ρ I on δ H , δ P when θ = 0.5 . (b) Dependence of ρ I on δ H , δ P under different θ . (c) Dependence of ρ A P on δ H , δ P when θ = 0.5 . (d) Dependence of ρ A P on δ H , δ P under different θ . (e) Dependence of ρ A H on δ H , δ P when θ = 0.5 . (f) Dependence of ρ A H on δ H , δ P under different θ .
Mathematics 13 03010 g013
Figure 14. Effect of risk perception ability α , risk propagation rate β , mass media reporting attenuation factor θ , and risk perception decay factors ( Γ U , Γ H ) on ρ I at the steady state. (a) Dependence of ρ I on α , β when θ = 0.5 . (b) Dependence of ρ I on α , β under different θ . (c) The evolution trend of ρ I with increasing β under different ( Γ U , Γ H ) when θ = 0.5 . (d) Dependence of ρ I on α , β under different ( Γ U , Γ H ) when θ = 0.5 .
Figure 14. Effect of risk perception ability α , risk propagation rate β , mass media reporting attenuation factor θ , and risk perception decay factors ( Γ U , Γ H ) on ρ I at the steady state. (a) Dependence of ρ I on α , β when θ = 0.5 . (b) Dependence of ρ I on α , β under different θ . (c) The evolution trend of ρ I with increasing β under different ( Γ U , Γ H ) when θ = 0.5 . (d) Dependence of ρ I on α , β under different ( Γ U , Γ H ) when θ = 0.5 .
Mathematics 13 03010 g014aMathematics 13 03010 g014b
Figure 15. Effect of risk recovery capacity μ and risk propagation rate β on ρ I at the steady state. (a) The evolution trend of ρ I with increasing β under different μ when θ = 0.5 . (b) Dependence of ρ I on μ , β when θ = 0.5 .
Figure 15. Effect of risk recovery capacity μ and risk propagation rate β on ρ I at the steady state. (a) The evolution trend of ρ I with increasing β under different μ when θ = 0.5 . (b) Dependence of ρ I on μ , β when θ = 0.5 .
Mathematics 13 03010 g015
Table 1. The definitions and values of the parameters necessary for constructing the social network.
Table 1. The definitions and values of the parameters necessary for constructing the social network.
ParametersDescriptionsValue
N 0 The number of seed nodes6
λ The rate of new node batches arrivals2
f a Probability density function describing the distribution of the number of nodes per batchU (4,6)
g b Probability density function describing the distribution of the number of selected existing nodesU (6,28)
q 1 Probability of adding new node batches0.5
q 2 Probability of adding new hyperedges0.2
q 3 Probability of reconnecting hyperedges0.3
m 1 The number of new hyperedges formed in adding new node batchesU (7,12)
m 2 The number of new hyperedges formed in adding new hyperedgesU (6,8)
m 3 The number of reconnected hyperedgesU (7,9)
Table 2. The definitions and values of the parameters necessary for constructing the ISN.
Table 2. The definitions and values of the parameters necessary for constructing the ISN.
ParametersDescriptionsValue
N 0 The number of seed nodes6
w 0 The initial weights1
q 1 Probability of adding new nodes 0.5
q 2 Probability of adding new directed edges0.3
q 3 Probability of disconnecting existing directed edges0.2
m 4 The number of directed edges generated when adding a new node8
m 5 The number of existing directed edges to disconnect2
p 1 Probability of success of an event in a binomial distribution0.5
ϵ The increase in weight when adding new nodes3
σ The increase in weight when adding new directed edges1
Table 3. Definitions of parameter symbols used in the coupled dynamics model.
Table 3. Definitions of parameter symbols used in the coupled dynamics model.
ParametersDescriptions
p j , i Probability that e j containing node v i is active
h j t , t i The hyperdegree of the j   th node of the i   th batch entering the hypernetwork
λ H Probability of U -state enterprises transforming to A H after being informed by its neighbors in state A H
λ P Probability of U -state enterprises transforming to A P after being informed by its neighbors in state A P
δ H Probability of decision forgetting for A H state
δ P Probability of decision forgetting for A P state
ξ i Crowd effect
θ Weakening factors in the scale of risk reported by the mass media
η The social reinforcement effect of mass media reports
k i ¯ Global perception ratio
k Control factor of the global perception ratio
g i U Probability of U -state enterprises transforming to A P under the influence of mass media
g i H Probability of A H -state enterprises transforming to A P under the influence of mass media and crowd effect
α Risk perception capabilities
φ i j The degree of symbiotic dependence of enterprise v i to v j
ρ 0 The minimum risk scale for triggering company’s risk perception capabilities
ρ c Specific thresholds for triggering company’s risk perception capabilities
A i X t Risk admission rate of susceptible enterprise v i
T i t Risk transmission rate of infected enterprise v i
β Basic risk propagation rate
k _ s i t The k-shell value of enterprise v i at time t
χ i j X ( t ) Risk infection rate of susceptible enterprises with X state and infected enterprises at time t
μ Probability of recovery from risks
Γ H The attenuation factor of risk perception capability of enterprises with A H -state
Γ U The attenuation factor of risk perception capability of enterprises with U -state
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zheng, Y.; Wang, Z.; Xie, S.; Wang, P. Bounded Rational Decision-Risk Propagation Coupling Dynamics in Directed Weighted Multilayer Hypernetworks. Mathematics 2025, 13, 3010. https://doi.org/10.3390/math13183010

AMA Style

Zheng Y, Wang Z, Xie S, Wang P. Bounded Rational Decision-Risk Propagation Coupling Dynamics in Directed Weighted Multilayer Hypernetworks. Mathematics. 2025; 13(18):3010. https://doi.org/10.3390/math13183010

Chicago/Turabian Style

Zheng, Yueyue, Zhiping Wang, Shijie Xie, and Peiwen Wang. 2025. "Bounded Rational Decision-Risk Propagation Coupling Dynamics in Directed Weighted Multilayer Hypernetworks" Mathematics 13, no. 18: 3010. https://doi.org/10.3390/math13183010

APA Style

Zheng, Y., Wang, Z., Xie, S., & Wang, P. (2025). Bounded Rational Decision-Risk Propagation Coupling Dynamics in Directed Weighted Multilayer Hypernetworks. Mathematics, 13(18), 3010. https://doi.org/10.3390/math13183010

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop