How members of covert networks conceal the identities of their leaders

Centrality measures are the most commonly advocated social network analysis tools for identifying leaders of covert organizations. While the literature has predominantly focused on studying the effectiveness of existing centrality measures or developing new ones, we study the problem from the opposi...

Ամբողջական նկարագրություն

Մատենագիտական մանրամասներ
Հիմնական հեղինակներ: Waniek, M, Michalak, TP, Wooldridge, M, Rahwan, T
Ձևաչափ: Journal article
Լեզու:English
Հրապարակվել է: Association for Computing Machinery 2021
_version_ 1826307595495800832
author Waniek, M
Michalak, TP
Wooldridge, M
Rahwan, T
author_facet Waniek, M
Michalak, TP
Wooldridge, M
Rahwan, T
author_sort Waniek, M
collection OXFORD
description Centrality measures are the most commonly advocated social network analysis tools for identifying leaders of covert organizations. While the literature has predominantly focused on studying the effectiveness of existing centrality measures or developing new ones, we study the problem from the opposite perspective, by focusing on how a group of leaders can avoid being identified by centrality measures as key members of a covert network. More specifically, we analyze the problem of choosing a set of edges to be added to a network to decrease the leaders' ranking according to three fundamental centrality measures, namely, degree, closeness, and betweenness. We prove that this problem is NP-complete for each measure. Moreover, we study how the leaders can construct a network from scratch, designed specifically to keep them hidden from centrality measures. We identify a network structure that not only guarantees to hide the leaders to a certain extent but also allows them to spread their influence across the network.
first_indexed 2024-03-07T07:05:27Z
format Journal article
id oxford-uuid:e944c955-68a5-47d1-a7c9-a36991b1c86a
institution University of Oxford
language English
last_indexed 2024-03-07T07:05:27Z
publishDate 2021
publisher Association for Computing Machinery
record_format dspace
spelling oxford-uuid:e944c955-68a5-47d1-a7c9-a36991b1c86a2022-04-27T12:55:58ZHow members of covert networks conceal the identities of their leadersJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:e944c955-68a5-47d1-a7c9-a36991b1c86aEnglishSymplectic ElementsAssociation for Computing Machinery 2021Waniek, MMichalak, TPWooldridge, MRahwan, TCentrality measures are the most commonly advocated social network analysis tools for identifying leaders of covert organizations. While the literature has predominantly focused on studying the effectiveness of existing centrality measures or developing new ones, we study the problem from the opposite perspective, by focusing on how a group of leaders can avoid being identified by centrality measures as key members of a covert network. More specifically, we analyze the problem of choosing a set of edges to be added to a network to decrease the leaders' ranking according to three fundamental centrality measures, namely, degree, closeness, and betweenness. We prove that this problem is NP-complete for each measure. Moreover, we study how the leaders can construct a network from scratch, designed specifically to keep them hidden from centrality measures. We identify a network structure that not only guarantees to hide the leaders to a certain extent but also allows them to spread their influence across the network.
spellingShingle Waniek, M
Michalak, TP
Wooldridge, M
Rahwan, T
How members of covert networks conceal the identities of their leaders
title How members of covert networks conceal the identities of their leaders
title_full How members of covert networks conceal the identities of their leaders
title_fullStr How members of covert networks conceal the identities of their leaders
title_full_unstemmed How members of covert networks conceal the identities of their leaders
title_short How members of covert networks conceal the identities of their leaders
title_sort how members of covert networks conceal the identities of their leaders
work_keys_str_mv AT waniekm howmembersofcovertnetworksconcealtheidentitiesoftheirleaders
AT michalaktp howmembersofcovertnetworksconcealtheidentitiesoftheirleaders
AT wooldridgem howmembersofcovertnetworksconcealtheidentitiesoftheirleaders
AT rahwant howmembersofcovertnetworksconcealtheidentitiesoftheirleaders