Strategic Social Network Analysis

Authors

  • Tomasz Michalak University of Warsaw and University of Oxford
  • Talal Rahwan Masdar Institute of Science and Technology
  • Michael Wooldridge

DOI:

https://doi.org/10.1609/aaai.v31i1.11142

Keywords:

social network analysis, game theory, counter-terrorism

Abstract

How can individuals and communities protect their privacy against social network analysis tools? How do criminals or terrorists organizations evade detection by such tools? Under which conditions can these tools be made strategy proof? These fundamental questions have attracted little attention in the literature to date, as most social network analysis tools are built around the assumption that individuals or groups in a network do not act strategically to evade such tools. With this in mind, we outline in this paper a new paradigm for social network analysis, whereby the strategic behaviour of network actors is explicitly modeled. Addressing this research challenge has various implications. For instance, it may allow two individuals to keep their relationship secret or private. It may also allow members of an activist group to conceal their membership, or even conceal the existence of their group from authoritarian regimes. Furthermore, it may assist security agencies and counter terrorism units in understanding the strategies that covert organizations use to escape detection, and give rise to new strategy-proof countermeasures.

Downloads

Published

2017-02-12

How to Cite

Michalak, T., Rahwan, T., & Wooldridge, M. (2017). Strategic Social Network Analysis. Proceedings of the AAAI Conference on Artificial Intelligence, 31(1). https://doi.org/10.1609/aaai.v31i1.11142