Strategic social network analysis

Tomasz P. Michalak, Talal Rahwan, Michael Wooldridge

Research output: Contribution to conferencePaper

Abstract

How can individuals and communities protect their privacy against social network analysis tools? How do criminals or terrorists organizations evade detection by such tools? Under which conditions can these tools be made strategy proof? These fundamental questions have attracted little attention in the literature to date, as most social network analysis tools are built around the assumption that individuals or groups in a network do not act strategically to evade such tools. With this in mind, we outline in this paper a new paradigm for social network analysis, whereby the strategic behaviour of network actors is explicitly modeled. Addressing this research challenge has various implications. For instance, it may allow two individuals to keep their relationship secret or private. It may also allow members of an activist group to conceal their membership, or even conceal the existence of their group from authoritarian regimes. Furthermore, it may assist security agencies and counter terrorism units in understanding the strategies that covert organizations use to escape detection, and give rise to new strategy-proof countermeasures.

Original languageEnglish (US)
Pages4841-4845
Number of pages5
StatePublished - Jan 1 2017
Event31st AAAI Conference on Artificial Intelligence, AAAI 2017 - San Francisco, United States
Duration: Feb 4 2017Feb 10 2017

Other

Other31st AAAI Conference on Artificial Intelligence, AAAI 2017
CountryUnited States
CitySan Francisco
Period2/4/172/10/17

Fingerprint

Electric network analysis
Terrorism

ASJC Scopus subject areas

  • Artificial Intelligence

Cite this

Michalak, T. P., Rahwan, T., & Wooldridge, M. (2017). Strategic social network analysis. 4841-4845. Paper presented at 31st AAAI Conference on Artificial Intelligence, AAAI 2017, San Francisco, United States.

Strategic social network analysis. / Michalak, Tomasz P.; Rahwan, Talal; Wooldridge, Michael.

2017. 4841-4845 Paper presented at 31st AAAI Conference on Artificial Intelligence, AAAI 2017, San Francisco, United States.

Research output: Contribution to conferencePaper

Michalak, TP, Rahwan, T & Wooldridge, M 2017, 'Strategic social network analysis' Paper presented at 31st AAAI Conference on Artificial Intelligence, AAAI 2017, San Francisco, United States, 2/4/17 - 2/10/17, pp. 4841-4845.
Michalak TP, Rahwan T, Wooldridge M. Strategic social network analysis. 2017. Paper presented at 31st AAAI Conference on Artificial Intelligence, AAAI 2017, San Francisco, United States.
Michalak, Tomasz P. ; Rahwan, Talal ; Wooldridge, Michael. / Strategic social network analysis. Paper presented at 31st AAAI Conference on Artificial Intelligence, AAAI 2017, San Francisco, United States.5 p.
@conference{1ef34aa33d5c4e478ad6d0a38faf1809,
title = "Strategic social network analysis",
abstract = "How can individuals and communities protect their privacy against social network analysis tools? How do criminals or terrorists organizations evade detection by such tools? Under which conditions can these tools be made strategy proof? These fundamental questions have attracted little attention in the literature to date, as most social network analysis tools are built around the assumption that individuals or groups in a network do not act strategically to evade such tools. With this in mind, we outline in this paper a new paradigm for social network analysis, whereby the strategic behaviour of network actors is explicitly modeled. Addressing this research challenge has various implications. For instance, it may allow two individuals to keep their relationship secret or private. It may also allow members of an activist group to conceal their membership, or even conceal the existence of their group from authoritarian regimes. Furthermore, it may assist security agencies and counter terrorism units in understanding the strategies that covert organizations use to escape detection, and give rise to new strategy-proof countermeasures.",
author = "Michalak, {Tomasz P.} and Talal Rahwan and Michael Wooldridge",
year = "2017",
month = "1",
day = "1",
language = "English (US)",
pages = "4841--4845",
note = "31st AAAI Conference on Artificial Intelligence, AAAI 2017 ; Conference date: 04-02-2017 Through 10-02-2017",

}

TY - CONF

T1 - Strategic social network analysis

AU - Michalak, Tomasz P.

AU - Rahwan, Talal

AU - Wooldridge, Michael

PY - 2017/1/1

Y1 - 2017/1/1

N2 - How can individuals and communities protect their privacy against social network analysis tools? How do criminals or terrorists organizations evade detection by such tools? Under which conditions can these tools be made strategy proof? These fundamental questions have attracted little attention in the literature to date, as most social network analysis tools are built around the assumption that individuals or groups in a network do not act strategically to evade such tools. With this in mind, we outline in this paper a new paradigm for social network analysis, whereby the strategic behaviour of network actors is explicitly modeled. Addressing this research challenge has various implications. For instance, it may allow two individuals to keep their relationship secret or private. It may also allow members of an activist group to conceal their membership, or even conceal the existence of their group from authoritarian regimes. Furthermore, it may assist security agencies and counter terrorism units in understanding the strategies that covert organizations use to escape detection, and give rise to new strategy-proof countermeasures.

AB - How can individuals and communities protect their privacy against social network analysis tools? How do criminals or terrorists organizations evade detection by such tools? Under which conditions can these tools be made strategy proof? These fundamental questions have attracted little attention in the literature to date, as most social network analysis tools are built around the assumption that individuals or groups in a network do not act strategically to evade such tools. With this in mind, we outline in this paper a new paradigm for social network analysis, whereby the strategic behaviour of network actors is explicitly modeled. Addressing this research challenge has various implications. For instance, it may allow two individuals to keep their relationship secret or private. It may also allow members of an activist group to conceal their membership, or even conceal the existence of their group from authoritarian regimes. Furthermore, it may assist security agencies and counter terrorism units in understanding the strategies that covert organizations use to escape detection, and give rise to new strategy-proof countermeasures.

UR - http://www.scopus.com/inward/record.url?scp=85030477232&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85030477232&partnerID=8YFLogxK

M3 - Paper

SP - 4841

EP - 4845

ER -