How members of covert networks conceal the identities of their leaders
Centrality measures are the most commonly advocated social network analysis tools for identifying leaders of covert organizations. While the literature has predominantly focused on studying the effectiveness of existing centrality measures or developing new ones, we study the problem from the opposi...
Հիմնական հեղինակներ: | , , , |
---|---|
Ձևաչափ: | Journal article |
Լեզու: | English |
Հրապարակվել է: |
Association for Computing Machinery
2021
|
_version_ | 1826307595495800832 |
---|---|
author | Waniek, M Michalak, TP Wooldridge, M Rahwan, T |
author_facet | Waniek, M Michalak, TP Wooldridge, M Rahwan, T |
author_sort | Waniek, M |
collection | OXFORD |
description | Centrality measures are the most commonly advocated social network analysis tools for identifying leaders of covert organizations. While the literature has predominantly focused on studying the effectiveness of existing centrality measures or developing new ones, we study the problem from the opposite perspective, by focusing on how a group of leaders can avoid being identified by centrality measures as key members of a covert network. More specifically, we analyze the problem of choosing a set of edges to be added to a network to decrease the leaders' ranking according to three fundamental centrality measures, namely, degree, closeness, and betweenness. We prove that this problem is NP-complete for each measure. Moreover, we study how the leaders can construct a network from scratch, designed specifically to keep them hidden from centrality measures. We identify a network structure that not only guarantees to hide the leaders to a certain extent but also allows them to spread their influence across the network. |
first_indexed | 2024-03-07T07:05:27Z |
format | Journal article |
id | oxford-uuid:e944c955-68a5-47d1-a7c9-a36991b1c86a |
institution | University of Oxford |
language | English |
last_indexed | 2024-03-07T07:05:27Z |
publishDate | 2021 |
publisher | Association for Computing Machinery |
record_format | dspace |
spelling | oxford-uuid:e944c955-68a5-47d1-a7c9-a36991b1c86a2022-04-27T12:55:58ZHow members of covert networks conceal the identities of their leadersJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:e944c955-68a5-47d1-a7c9-a36991b1c86aEnglishSymplectic ElementsAssociation for Computing Machinery 2021Waniek, MMichalak, TPWooldridge, MRahwan, TCentrality measures are the most commonly advocated social network analysis tools for identifying leaders of covert organizations. While the literature has predominantly focused on studying the effectiveness of existing centrality measures or developing new ones, we study the problem from the opposite perspective, by focusing on how a group of leaders can avoid being identified by centrality measures as key members of a covert network. More specifically, we analyze the problem of choosing a set of edges to be added to a network to decrease the leaders' ranking according to three fundamental centrality measures, namely, degree, closeness, and betweenness. We prove that this problem is NP-complete for each measure. Moreover, we study how the leaders can construct a network from scratch, designed specifically to keep them hidden from centrality measures. We identify a network structure that not only guarantees to hide the leaders to a certain extent but also allows them to spread their influence across the network. |
spellingShingle | Waniek, M Michalak, TP Wooldridge, M Rahwan, T How members of covert networks conceal the identities of their leaders |
title | How members of covert networks conceal the identities of their leaders |
title_full | How members of covert networks conceal the identities of their leaders |
title_fullStr | How members of covert networks conceal the identities of their leaders |
title_full_unstemmed | How members of covert networks conceal the identities of their leaders |
title_short | How members of covert networks conceal the identities of their leaders |
title_sort | how members of covert networks conceal the identities of their leaders |
work_keys_str_mv | AT waniekm howmembersofcovertnetworksconcealtheidentitiesoftheirleaders AT michalaktp howmembersofcovertnetworksconcealtheidentitiesoftheirleaders AT wooldridgem howmembersofcovertnetworksconcealtheidentitiesoftheirleaders AT rahwant howmembersofcovertnetworksconcealtheidentitiesoftheirleaders |